filename
stringlengths
5
142
content
stringlengths
2
26M
label
int64
0
1
ConvertTo-PseudoType_1.ps1
function ConvertTo-PseudoType { <# .Synopsis Converts objects to custom PSObjects with robust type support .Parameter TypeName The name(s) of the PseudoType(s) to be inserted into the objects for the sake of formatting .Parameter Mapping A Hashtable of property names to types (or conversion scripts) .Parameter InputObject An object to convert. .Example Get-ChildItem | Where { !$_.PsIsContainer } | Export-CSV files.csv ## Given that a CSV file of file information exists, ## And we want to rehydrate it and be able to compare things... ## We need to create a mapping of properties to types ## Optionally, we can provide scriptblocks to convert instances $Mapping = @{ Attributes = [System.IO.FileAttributes] CreationTime = [System.DateTime] CreationTimeUtc = [System.DateTime] Directory = [System.IO.DirectoryInfo] DirectoryName = [System.String] Exists = [System.Boolean] Extension = [System.String] FullName = [System.String] IsReadOnly = [System.Boolean] LastAccessTime = [System.DateTime] LastAccessTimeUtc = [System.DateTime] LastWriteTime = [System.DateTime] LastWriteTimeUtc = [System.DateTime] Length = [System.Int64] Name = [System.String] PSChildName = [System.String] PSDrive = [System.Management.Automation.PSDriveInfo] PSIsContainer = [System.Boolean] PSParentPath = [System.String] PSPath = [System.String] PSProvider = { Get-PSProvider $_ } ReparsePoint = [System.Management.Automation.PSCustomObject] VersionInfo = [System.Diagnostics.FileVersionInfo] } ## When we import, we the Selected.System.IO.FileInfo, which is what you'd get from | Select * Import-CSV | ConvertTo-PseudoType Selected.System.IO.FileInfo $Mapping ## That way, the output will look as though you had run: Get-ChildItem | Where { !$_.PsIsContainer } | Select * NOTE: Not all types are rehydrateable from CSV output -- the "VersionInfo" will be hydrated as a string... #> [CmdletBinding()] param( [Parameter(Mandatory=$true, Position=0)] [Alias("Name","Tn")] [String]$TypeName , [Parameter(Mandatory=$true, Position=1)] [Hashtable]$Mapping , [Parameter(Mandatory=$true, Position=99, ValueFromPipeline=$true)] [PSObject[]]$InputObject ) begin { $MappingFunction = @{} foreach($key in $($Mapping.Keys)) { $MappingFunction.$Key = {$_.$Key -as $Mapping.$Key} } } process { foreach($IO in $InputObject) { $Properties = @{} foreach($key in $($Mapping.Keys)) { if($Mapping.$Key -is [ScriptBlock]) { $Properties.$Key = $IO.$Key | ForEach-Object $Mapping.$Key } elseif($Mapping.$Key -is [Type]) { if($Value = $IO.$Key -as $Mapping.$Key) { $Properties.$Key = $Value } else { $Properties.$Key = $IO.$Key } } else { $Properties.$Key = [PSObject]$IO.$Key } } New-Object PSObject -Property $Properties | %{ $_.PSTypeNames.Insert(0, $TypeName); $_ } } } }
0
sample_12_37.ps1
# # Module manifest for module 'OCI.PSModules.Ospgateway' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ospgateway.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2c26fa04-4a4e-49f5-877a-c15e551fc06e' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ospgateway Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ospgateway.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOspgatewayAddress', 'Get-OCIOspgatewayAddressRule', 'Get-OCIOspgatewayInvoice', 'Get-OCIOspgatewayInvoiceLinesList', 'Get-OCIOspgatewayInvoicesList', 'Get-OCIOspgatewaySubscription', 'Get-OCIOspgatewaySubscriptionsList', 'Invoke-OCIOspgatewayAuthorizeSubscriptionPayment', 'Invoke-OCIOspgatewayDownloadPdfContent', 'Invoke-OCIOspgatewayPayInvoice', 'Invoke-OCIOspgatewayPaySubscription', 'Invoke-OCIOspgatewayVerifyAddress', 'Update-OCIOspgatewaySubscription' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ospgateway' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_52_75.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Get-AMTIDER { <# .Synopsis Lists the Intel Active Management Technology IDE redirection sessions .Description This CmdLet lists the Intel Active Management Technology (AMT) IDE redirection (IDER) sessions. .Notes Status: Status output designates whether or not the command was completed successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Get-AMTIDER ComputerName IDERSessionID IDERPath IDERState ------------ ------------- -------- --------- 192.168.1.100 1 boot.iso Disabled #> PROCESS { if (!$global:imrLib -or $AMTIDERSessions.Count -eq 0) { Write-Output "There are no open IDER sessions" return } $Results = @() ForEach ($session in $AMTIDERSessions) { $Obj = new-object psobject [Intel.Management.Redirection.IDERDeviceState]$state = new-object Intel.Management.Redirection.IDERDeviceState $output = $global:imrlib.IDERGetDeviceState($session.IDERSessionID, [ref]$state) [Intel.Management.Redirection.ClientInfo]$ci = new-object Intel.Management.Redirection.ClientInfo $output = $global:imrlib.GetClientInfo($session.IDERSessionID, [ref]$ci) $Comp = $ci.ip #Add Member to Object. Include Computer Name and Operation sucess $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name IDERSessionID -value $session.IDERSessionID $Obj | Add-Member -MemberType noteproperty -Name IDERPath -value $session.IDERPath $Obj | Add-Member -MemberType noteproperty -Name IDERState -value $state.pri_current $Results += $Obj } Write-Output $Results } } # SIG # Begin signature block # MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBh00yPyjX38zgx # 9MqB3MsgJ9KRk9uJa9ISyhV3xuIKbKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg+1p8UygffytTPotp # C9enPwvD0Jy+LCwRN0LRuUokW6cwDQYJKoZIhvcNAQEBBQAEggGAmfiHnxr3f+wq # RCqLNHPqJDwqOPkaeTMaJmTYHc8i0/byVWCo6wDwgngcHKWqKTF9WTEcjKMlNltB # NT8lANutxZiTFInrC5iOAJgbR3GfqjuDXhqp+E93V7Zi9+IuJs2HXG+JA+TLwp5H # M4KE+JUVdOqONwuvxkPlQ2NOVDiadAWWZhin5f2YUjyskwihvPNU8j9C4vZXIbeK # JvsXjNUYuKXFHP+PxThpAsLaFe78n+SoAXlvUKPCSS/J0qXHO8DPQzD6RHJicFfT # CGRni+ykU+yZhwXdahIWsejzSUt/F74T94WH7D87/rSMrrKlBv8AlEDrITspb80c # sW94kohJXqM93TnIn0QzuDNU4hsrJgjzqE5cr805wXyNSAYhsv5mB56yibCyyWLv # 0V1R5sWJpvDW9nXBQI3tl+Iq653pXkRnKdJ2ikMD19GB6rgReikNc+0/Z+hmgAJY # m2jgIF0u8dWPgkzR3RrAvN9+437tE7PX+T2xD4BN9Z2dMyYOEynGoYITfzCCE3sG # CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg # hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIEgsUbqawuqSz8FHP7/WBdjlqfaS5gbwIaxX # epnVuye7AhRzfJMBddWcAjRHjMxSwpsvTEAoQhgPMjAyMTA3MTkxNjI5MzdaoIGK # pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq # BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC # BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z # MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN # YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp # bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy # ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH # xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2 # jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ # 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE # HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX # wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby # AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0 # w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf # 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd # 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss # 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy # +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh # +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e # 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr # BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB # FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww # dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u # Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0 # dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs # exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV # cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T # qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX # VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe # cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI # uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f # ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID # S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe # jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4 # eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx # PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0 # fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl # IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1 # OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ # MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD # VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA # dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx # EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX # OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7 # lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM # PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn # K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU # LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg # HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG # wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3 # 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6 # p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL # MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw # EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE # CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1 # c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG # CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu # Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw # Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W # 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD # rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE # Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5 # k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a # JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd # 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud # 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2 # mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh # QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9 # 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC # hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI # AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG # 9w0BCQUxDxcNMjEwNzE5MTYyOTM3WjA/BgkqhkiG9w0BCQQxMgQwwIC6IyQI10Lm # XjSxMlP/0MkjVFay0/skd5B7xYviyGc1HYquzX3e51vUzR3CM68VMIHtBgsqhkiG # 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb # leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV # VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl # cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3 # DQEBAQUABIICACZRuIxoVYMp6SiRomJlLKFz//aHJiBp43naR4paLPcgAlbyV62U # B8XHRZucmzNZYEJQ6peO+nrL4hPphg94yoqgRlxruN64HR1Yj9dB5upcRP7udCbR # 0m9INLsvQoX45J9eCKjzzQB+LMzd22+cleOuKRPuhRE8TtWsAWVE11p+4H+16KXe # Zc2TJVsRs/MC66jlCR41+fCoJ2v5ucJpQaigU0MvvE8YNpjhKv/1N193f0zVrRFT # uVH48N3JvQg7DDL7AVpw/D4Zaq/RQiFhJVZ7Ukc1PR/jMq6RiOdE++fnkzJkxgV5 # GkYLEdcr6tHzBnpqkJWiiRx511lTdfMS1bm02LSwPElTJoO6h1xHWiAnJ0uNpkfv # AIMoKtaWiQveRgVWLw3yz6oa9JMZ/NZkuk5IgcXAixE+3YEhxRX6Rkg7PY20oGgZ # GkC5pBRH8full3ZyOqmOlFa1Zb3M4KnNJYcQYHge+wjjnneryzOwJ2zSwNOjbJ/7 # cCni82IBu9EG8nUNMEn65Lftyf36pH4qznys6JNQMwN/n+WCNoV+zBM/q3hopsSQ # w3VoUJvo3iMTkiUut9p2bUpetQLhg8dgD6Q9dDH5gVeVRlAKJWJS4BnRdsFwf+iO # cOjUOlBkWu9KZ7JgneosaGhirSg4uc+N0CV1AIbSyhR3KpMyCxXnOpAE # SIG # End signature block
0
2378.ps1
[CmdletBinding()] param ( [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [string]$Computername = 'localhost' ) begin { Set-StrictMode -Version Latest } process { try { $WmiResult = Get-WmiObject -Class Win32_OperatingSystem -ComputerName $ComputerName $LastBoot = $WmiResult.ConvertToDateTime($WmiResult.LastBootupTime) $ObjParams = [ordered]@{'Computername' = $Computername } ((Get-Date) - $LastBoot).psobject.properties | foreach { $ObjParams[$_.Name] = $_.Value } New-Object -TypeName PSObject -Property $ObjParams } catch { Write-Error $_.Exception.Message } } end { }
0
Deleted-ObjectsAD_2.ps1
param( $Domen, [string[]]$ObjectsDeleted ) function Ping ($Name){ $ping = new-object System.Net.NetworkInformation.Ping if ($ping.send($Name).Status -eq "Success") {$True} else {$False} trap {Write-Verbose "Error Ping"; $False; continue} } [string[]]$ObjectPath [string[]]$Disks [string[]]$Info [string[]]$Computers $Computers = Get-QADComputer -Service $Domen -OSName '*XP*','*Vista*','*7*' -SizeLimit 0 -ErrorAction SilentlyContinue | Select-Object name -ExpandProperty name foreach ($Computer in $Computers){ $Alive = Ping $Computer if ($Alive -eq "True"){ Write-Host "Seach $Computer" -BackgroundColor Blue trap {Write-Host "Error WmiObject $Computer";Continue} $Disks += Get-WmiObject win32_logicaldisk -ComputerName $Computer -ErrorAction SilentlyContinue | Where-Object {$_.Size -ne $null} if ($Disks){ foreach ($Disk in $Disks){ if ($Disk.Name -like "*:*") { $Disk = $Disk.Name.Replace(":","$") } trap {Write-Host "Error ChildItem $Computer";Continue} $ObjectPath += Get-ChildItem "\\\\$Computer\\$Disk\\*" -Recurse -ErrorAction SilentlyContinue if ($ObjectPath){ foreach ($Object in $ObjectsDeleted){ $ObjectPath | Where-Object {$_.Name -like $Object} | % { $Path = $_.FullName; Remove-Item $_.FullName -Recurse -Force -ErrorAction SilentlyContinue; $Info += "" | Select-Object @{e={$Path};n='Path'},` @{e={"Delete"};n='Action'} } } } } } } } $Info | Format-Table -AutoSize -ErrorAction SilentlyContinue
0
sample_60_25.ps1
# # Module manifest for module 'Az.Functions' # # Generated by: Microsoft Corporation # # Generated on: 7/4/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.Functions.psm1' # Version number of this module. ModuleVersion = '4.1.0' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = 'eafced71-8742-4a2c-5afd-13117428dd90' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell - Azure Functions service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. For information on Azure Functions, please visit the following: https://learn.microsoft.com/azure/azure-functions/' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'Functions.Autorest/bin/Az.Functions.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. ScriptsToProcess = 'Functions.Autorest/custom/HelperFunctions.ps1' # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = 'Functions.Autorest/custom/Functions.types.ps1xml' # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'Functions.Autorest/Az.Functions.format.ps1xml', 'Functions.Autorest/custom/Functions.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('Functions.Autorest/Az.Functions.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Get-AzFunctionApp', 'Get-AzFunctionAppAvailableLocation', 'Get-AzFunctionAppPlan', 'Get-AzFunctionAppSetting', 'New-AzFunctionApp', 'New-AzFunctionAppPlan', 'Remove-AzFunctionApp', 'Remove-AzFunctionAppPlan', 'Remove-AzFunctionAppSetting', 'Restart-AzFunctionApp', 'Start-AzFunctionApp', 'Stop-AzFunctionApp', 'Update-AzFunctionApp', 'Update-AzFunctionAppPlan', 'Update-AzFunctionAppSetting' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module ModuleList = @(@{ModuleName = 'Az.Accounts'; ModuleVersion = '3.0.1'; }) # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','PSModule','Functions' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Upgraded to Microsoft.Web API version 2023-12-01 [#25347] * Added support for creating function apps on container app [#22736]' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBHpvC9ngMH41sB # C0jov3/Ng/apahxtkxJdu3/OymwVCKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDsyKWsDLLCnms44uyXYGK+l # hT4MsEtk89H9TNpgm53EMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEATMb9KL05In4rsF5PKLTbh/FtTIvvHfzG88DLbZS2MNU5Hvf2Q0cxv3Ne # k6XcdT1ggROnWQUzvW+7dHcMcsFLP0o80S+OmXYI2fuSnlZQuRVSBvtxSkmyojUQ # T+T8bXrqp7YErZO+TQnKMxb5BX+/ty3eHS1qpVh4+c8UOkL1jG8OEnU6Rh/zyQQO # CLhUZEn6ax1O+36PL8KZznCLPsRoeA0ux9HXdbbdbx5ZbpDw/NFwWxJ6Xm9kGXX+ # mBW09L+n7ZvXi9H/kt4FEzlycF73mnGPCxPIQA+q48F5HSXwX0JcrZnBRStI5TfL # sSX++sHi+75dDMOdGAsBTFwdN9IzC6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA6exy0gALqJS7Af43OflBEgQjttyxVjysmK+PlwW7ycgIGZmsNdp1l # GBMyMDI0MDcwNDA4NDk0Ny44NjdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6jCQ+jAiGA8yMDI0MDcwNDAzMDk0 # NloYDzIwMjQwNzA1MDMwOTQ2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqMJD6 # AgEAMAcCAQACAhWoMAcCAQACAhQMMAoCBQDqMeJ6AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAHBJ5B3QSQ6Kfj+lOzWEcMX9lAOEJ1xgp2UvybbZstSgnNv6 # aXcqgAy1kr8m7iT28RavWcQ6reYsQY0CZ7+Y1Qiknb42U2V2UZ7u0vQI+odvHfeK # +YyjsQHDIdiJmfwbnj4ArGOx1diPd9PBsMWg5ckQN8HsX9l4FNBgj6mlA4oD0zsP # 2vkxpC6b/dcYOLprz28XqqS2Wtz0KuGsIIO8budJZNBf8zgbxVGeymXPTqKtd1+N # fhVTGOSpcm1M+rpXfHF1vCxhep0O4GwzkwLq5qCq7aPrJZ8ccjcR2AQwtTmQsZtk # FdTOAVHTDn9xDOKtXuc7O8Fb/HO6Bc8XXfD1hz4xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB8DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAUTjrIqCugqJGPDhoi4CxJdDoxAvvxmCFl1tmAdwKAUzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74QFAiS # 6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgrTmLiFOldkGzosiFUtf/9cbhNIj4 # o6DoAmXEWD2Da/4wDQYJKoZIhvcNAQELBQAEggIAPx3/vQBn2K4yriwomCP5nipl # mCaakRFI7pyxEVGV2vlJziKSNj4LGCYzxLoQkQuXk06B8NM0vR4Xgji021UUXd6e # 79O6RC/3oGuG6BBHotL4hcueJCm7RnBet4FWp1ys5LCc55o2QOWNwg8YESd31W4Y # yPIO/ziRorCSgzzA1tCqh9EZVQMp7+D2OpsSQ8DdD78UwyavcFOfuraa0YlEy6VG # /wzjQUUB6QsyXQMqfZck5WaXMoSlcJYdx8yeGrXmC0rIc3MQ+qES4UbhqVVzo45o # GI9M8a+Stj8dnjgFZhRJJjlbdml4BEz3vWSG2ooO/RB8juz7Mh2OQ57g7Xi04hOj # sWbljL6ALRRq9bTaUHbR6i7Cnv1d56uiX+xGNTVlhgZJLz4UVyVbBtM8swQioocS # iVY/jh8DDceeQkR3uTXmXdcTK6ezIY1vtQbi0zixH56o1yaMiLKR5qeEKLjIr4Bx # GsSeL2Ted8VUt7qKgv9BvN0AA+1uNf4WplAWTxgZOebhrvZQzg/iHiVkAjU+t98q # /iF3NAF2/nf7g7mZTaFJK1n2WcvhACCyng61G7XBm8yjL2IuD8T6J+6xaquFIGO5 # Pk4Mu9geGvtrxtuC+u3dS9U/joDMBvr5bnNxBF+rNc6oW5gchZEFhYRhQuXdQEWs # Vv+f6RlkM2+L0zbUG+U= # SIG # End signature block
0
sample_57_58.ps1
<# .SYNOPSIS Data collection tool for printing-related troubleshooting by Marius Porcolean (maporcol). .DESCRIPTION The Print-Collect.ps1 script simplifies the collection of Printing related troubleshooting data, making action plans easier. The tool is compliant with company policies, is signed & published officially, as part of the Windows CES Diag Tools repository. .LINK https://aka.ms/Print-Collect .LINK https://cesdiagtools.blob.core.windows.net/windows/Print-Collect.zip .PARAMETER AcceptEula Allows accepting the EULA without generating a GUI pop-up, for executing the script in non-interactive scenarios. For example, when running the script remotely on a different machine through a console. .PARAMETER DataPath The script saves the collected data in the folder where the script exists by default. If you want to save the data in another specific location, pass this parameter along with a destination. .PARAMETER Logs Get the 'classic' Print-Collect dataset -> dumps, event logs, registry keys, cmd outputs, etc. .PARAMETER NoDumps The script collects some memory dumps too by default. If you don't want to get the memory dumps, because that will significantly increase the size of the resulting dataset, use this flag. .PARAMETER Trace Collect live printing traces, plus others, depending on the flags used. .PARAMETER LPD Add to the live trace the providers related to LPD service. .PARAMETER Network Collect live network packets capture, along with the printing trace, but in a separate file. .PARAMETER RPC Collect live RPC trace, on top of the printing trace, but in a separate file. .PARAMETER ProcMon Collect live Process Monitor capture. .PARAMETER PSR Activate the Problem Steps Recorder tool during the live tracing. This automatically collects screenshots & information about steps performed (e.g: user left-clicked in text area of CMD.exe, user clicked close on Event Viewer) .INPUTS None. You cannot pipe objects to Print-Collect.ps1. .OUTPUTS script-output.txt & script-errors.txt + the folder with the collected data. .EXAMPLE PS> .\Print-Collect.ps1 Displays the help info. .EXAMPLE PS> .\Print-Collect.ps1 -Logs [-NoDumps] Collects the 'classic' static dataset, with or without dumps. .EXAMPLE PS> .\Print-Collect.ps1 -Trace [-LPD] [-RPC] [-Network] [-ProcMon] [-PSR] Collects Print + other optional traces, without the 'classic' static dataset. .EXAMPLE PS> .\Print-Collect.ps1 -Trace [-LPD] [-RPC] [-Network] [-ProcMon] [-PSR] -Logs [-NoDumps] Collects traces (default or optionals too) and after that a 'classic' static dataset (with or without dumps). #> param( [string]$DataPath, [switch]$AcceptEula, [switch]$Logs, [switch]$NoDumps, [switch]$Trace, [switch]$LPD, [switch]$Network, [switch]$RPC, [switch]$ProcMon, [switch]$PSR ) $toolName = "Print-Collect" $version = $toolName + " 2023-August-22" # by Marius Porcolean (maporcol@microsoft.com) # using Collect-Commons module by Gianni Bragante (gbrag@microsoft.com) $global:Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path try { Import-Module ($global:Root + "\Collect-Commons.psm1") -Force -DisableNameChecking -ErrorAction Stop } catch { Write-Host "Unable to import the helper module, can't continue without it! Exiting..." -ForegroundColor Red Write-Host ($_.Exception.Message) -ForegroundColor Red exit } Deny-IfNotAdmin Function Start-Traces { Invoke-CustomCommand "ipconfig /flushdns" Invoke-CustomCommand "nbtstat -R" Invoke-CustomCommand "KList purge" Invoke-CustomCommand "logman create trace 'Print-Trace' -ow -o '$($TracesDir)Print-Trace-$($env:COMPUTERNAME).etl' -p 'Microsoft-Windows-PrintService' 0xFFFFFFFFFFFFFFFF 0xFF -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 2048 -ets" # Spooler WPP Trace Control Guids # SPOOLSV Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A9E-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # SPOOLSS Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A9F-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # LOCALSPL Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A01-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # PrintPLM Invoke-CustomCommand "logman update trace 'print-trace' -p '{d2e1bab1-eb9b-4ba7-9123-19c01ddc4f78}' 0x7FFFFFFF 0xFF -ets" # WINSPOOL Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A02-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # WIN32SPL Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A03-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # BIDISPL Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A04-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # SPLWOW64 Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A05-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # SPLLIB Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A06-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # PERFLIB Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A07-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # ASYNCNTFY Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A08-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # #NTFY Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A09-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # GPPRNEXT Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A0A-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # SANDBOX Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A0B-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # SANDBOXHOST Invoke-CustomCommand "logman update trace 'print-trace' -p '{C9BF4A0C-D547-4d11-8242-E03A18B5BE01}' 0x7FFFFFFF 0xFF -ets" # PIPELINE Invoke-CustomCommand "logman update trace 'print-trace' -p '{AEFE45F4-8548-42B4-B1C8-25673B07AD8B}' 0x7FFFFFFF 0xFF -ets" # NTPRINT Invoke-CustomCommand "logman update trace 'print-trace' -p '{B795C7DF-07BC-4362-938E-E8ABD81A9A01}' 0x7FFFFFFF 0xFF -ets" # LPRHELP Invoke-CustomCommand "logman update trace 'print-trace' -p '{9e6d0d9b-1ce5-44b5-8b98-f32ed89077ec}' 0x7FFFFFFF 0xFF -ets" # LPRMON Invoke-CustomCommand "logman update trace 'print-trace' -p '{f30fab8e-84bb-48d4-8e80-f8967ef0fe6a}' 0x7FFFFFFF 0xFF -ets" # USBJSCRIPT Invoke-CustomCommand "logman update trace 'print-trace' -p '{B48AE058-218A-4338-9B97-9F5F9E4EB5D2}' 0x7FFFFFFF 0xFF -ets" # USBMOn Invoke-CustomCommand "logman update trace 'print-trace' -p '{99F5F45C-FD1E-439F-A910-20D0DC759D28}' 0x7FFFFFFF 0xFF -ets" # TCPMIB Invoke-CustomCommand "logman update trace 'print-trace' -p '{D3A10B55-1EAD-453d-8FC7-35DA3D6A04D2}' 0x7FFFFFFF 0xFF -ets" # TCPMON Invoke-CustomCommand "logman update trace 'print-trace' -p '{62A0EB6C-3E3E-471d-960C-7C574A72534C}' 0x7FFFFFFF 0xFF -ets" # WSDPRINT Invoke-CustomCommand "logman update trace 'print-trace' -p '{9558985e-3bc8-45ef-a2fd-2e6ff06fb886}' 0x7FFFFFFF 0xFF -ets" # WSDMON Invoke-CustomCommand "logman update trace 'print-trace' -p '{836767A6-AF31-4938-B4C0-EF86749A9AEF}' 0x7FFFFFFF 0xFF -ets" # WSDPPROXY Invoke-CustomCommand "logman update trace 'print-trace' -p '{6D1E0446-6C52-4b85-840D-D2CB10AF5C63}' 0x7FFFFFFF 0xFF -ets" # DAFWSD Invoke-CustomCommand "logman update trace 'print-trace' -p '{4ea56ff9-fc2a-4f0c-8d6e-c345bc452c80}' 0x7FFFFFFF 0xFF -ets" # FDWSD Invoke-CustomCommand "logman update trace 'print-trace' -p '{7e2dbfc7-41e8-4987-bca7-76cadfad765f}' 0x7FFFFFFF 0xFF -ets" # FDPrint Invoke-CustomCommand "logman update trace 'print-trace' -p '{79b3b0b7-f082-4cec-91bc-5e4b9cc3033a}' 0x7FFFFFFF 0xFF -ets" # WSDAPI - commented out in PrintTrace.cmd Invoke-CustomCommand "logman update trace 'print-trace' -p '{75454210-b231 - 4fea-b2b4-2cc66d7ae8aa}' 0x7FFFFFFF 0xFF -ets" # FindNetPrinters Invoke-CustomCommand "logman update trace 'print-trace' -p '{A1607A05-8D8A-4d74-82C7-460DD790648E}' 0x7FFFFFFF 0xFF -ets" # XPSPRINT Invoke-CustomCommand "logman update trace 'print-trace' -p '{CA478AB1-8B38-451D-90E4-8534EB50B9D3}' 0x7FFFFFFF 0xFF -ets" # MicrosoftRenderFilter Invoke-CustomCommand "logman update trace 'print-trace' -p '{A6D25EF4-A3B3-4E5F-A872-24E71103FBDC}' 0x7FFFFFFF 0xFF -ets" # BTHPRINT Invoke-CustomCommand "logman update trace 'print-trace' -p '{eb3b6950-120c-4575-af39-2f713248e8a3}' 0x7FFFFFFF 0xFF -ets" # DAFBTH Invoke-CustomCommand "logman update trace 'print-trace' -p '{8bbe74b4-d9fc-4052-905e-92d01579e3f1}' 0x7FFFFFFF 0xFF -ets" # BTHUSER Invoke-CustomCommand "logman update trace 'print-trace' -p '{afa85d6c-0ea6-4c6a-99b7-5be1c9f3c7a1}' 0x7FFFFFFF 0xFF -ets" # BTHPORT - commented out in PrintTrace.cmd Invoke-CustomCommand "logman update trace 'print-trace' -p '{D88ACE07-CAC0-11D8-A4C6-000D560BCBA5}' 0x7FFFFFFF 0xFF -ets" # DOXXPS Invoke-CustomCommand "logman update trace 'print-trace' -p '{0dc96237-bbd4-4bc9-8184-46df83b1f1f0}' 0x7FFFFFFF 0xFF -ets" # DOXPKG - commented out in PrintTrace.cmd Invoke-CustomCommand "logman update trace 'print-trace' -p '{0675cf90-f2b8-11db-bb42-0013729b82c4}' 0x7FFFFFFF 0xFF -ets" # XpsRchVw Invoke-CustomCommand "logman update trace 'print-trace' -p '{986de178-ea3f-4e27-bbee-34e0f61535dd}' 0x7FFFFFFF 0xFF -ets" # XpsIFilter Invoke-CustomCommand "logman update trace 'print-trace' -p '{64f02056-afd9-42d9-b221-6c94733b09b1}' 0x7FFFFFFF 0xFF -ets" # XpsShellExt Invoke-CustomCommand "logman update trace 'print-trace' -p '{2beade0b-84cd-44a5-90a7-5b6fb2ff83c8}' 0x7FFFFFFF 0xFF -ets" # XpsRender Invoke-CustomCommand "logman update trace 'print-trace' -p '{aaacb431-6067-4a42-8883-3c01526dd43a}' 0x7FFFFFFF 0xFF -ets" # inet3pp Invoke-CustomCommand "logman update trace 'print-trace' -p '{c9bf4a9e-d547-4d11-8242-e03a18b5beee}' 0x7FFFFFFF 0xFF -ets" # PrintUI WPP Trace Control Guids # PRINTUI Invoke-CustomCommand "logman update trace 'print-trace' -p '{A83C80B9-AE01-4981-91C6-94F00C0BB8AA}' 0x7FFFFFFF 0xFF -ets" # PRNNTFY Invoke-CustomCommand "logman update trace 'print-trace' -p '{09737B09-A25E-44D8-AA75-07F7572458E2}' 0x7FFFFFFF 0xFF -ets" # PRNCACHE - commented out in PrintTrace.cmd Invoke-CustomCommand "logman update trace 'print-trace' -p '{34F7D4F8-CD95-4b06-8BF6-D929DE4AD9DE}' 0x7FFFFFFF 0xFF -ets" # PRNFLDR - commented out in PrintTrace.cmd Invoke-CustomCommand "logman update trace 'print-trace' -p '{883dfb21-94ee-4c9b-9922-d5c42b552e09}' 0x7FFFFFFF 0xFF -ets" # PrintDriver WPP Trace Controls # PrintExtension Invoke-CustomCommand "logman update trace 'print-trace' -p '{19E93940-A1BD-497F-BC58-CA333880BAB4}' 0x7FFFFFFF 0xFF -ets" # JScriptLib WPP Trace Controls Invoke-CustomCommand "logman update trace 'print-trace' -p '{C59DA080-9CCE-4415-A77D-08457D7A059F}' 0x7FFFFFFF 0xFF -ets" # Roaming WPP Trace Controls # DAFPRINT Invoke-CustomCommand "logman update trace 'print-trace' -p '{3048407B-56AA-4D41-82B2-7d5F4b1CDD39}' 0x7FFFFFFF 0xFF -ets" # DAS Invoke-CustomCommand "logman update trace 'print-trace' -p '{19E464A4-7408-49BD-B960-53446AE47820}' 0x7FFFFFFF 0xFF -ets" # Driver WPP Trace Controls # MSXpsFilters Invoke-CustomCommand "logman update trace 'print-trace' -p '{9B4A618C-07B8-4182-BA5A-5B1943A92EA1}' 0x7FFFFFFF 0xFF -ets" # MXDC WPP Trace Controls # MXDC Invoke-CustomCommand "logman update trace 'print-trace' -p '{FCA72EBA-CBB3-467c-93BC-1DB4978C398D}' 0x7FFFFFFF 0xFF -ets" # PrintDialog WPP Trace Controls # PREFDLG Invoke-CustomCommand "logman update trace 'print-trace' -p '{3FB15E5D-DF1A-46FC-BEFE-27A4B82D75EE}' 0x7FFFFFFF 0xFF -ets" # DLGHOST Invoke-CustomCommand "logman update trace 'print-trace' -p '{02EA8EB9-9811-46d6-AEEE-430ADCC2AA18}' 0x7FFFFFFF 0xFF -ets" # Windows.Graphics.Printing WPP Trace Controls # MODERNPRINT Invoke-CustomCommand "logman update trace 'print-trace' -p '{DD6A31CB-C9C6-4EF9-B738-F306C29352F4}' 0x7FFFFFFF 0xFF -ets" # PrinterExtensions Invoke-CustomCommand "logman update trace 'print-trace' -p '{EC08D605-5A20-4ED0-AE54-E8C4BFFF2EEB}' 0x7FFFFFFF 0xFF -ets" # AAD Cloud AP Invoke-CustomCommand "logman update trace 'print-trace' -p '{556045FD-58C5-4A97-9881-B121F68B79C5}' 0x7FFFFFFF 0xFF -ets" # PSMWPP Invoke-CustomCommand "logman update trace 'print-trace' -p '{4a743cbb-3286-435c-a674-b428328940e4}' 0x7FFFFFFF 0xFF -ets" # PLMWPP Invoke-CustomCommand "logman update trace 'print-trace' -p '{9C6FC32A-E17A-11DF-B1C4-4EBADFD72085}' 0x7FFFFFFF 0xFF -ets" # SEBWPP Invoke-CustomCommand "logman update trace 'print-trace' -p '{e8109b99-3a2c-4961-aa83-d1a7a148ada8}' 0x7FFFFFFF 0xFF -ets" # Scan # ScanRT WPP Invoke-CustomCommand "logman update trace 'print-trace' -p '{E6F8A5FC-7FCE-4095-8661-B8E0CB7D9410}' 0x7FFFFFFF 0xFF -ets" # DeviceEnumeration WPP Invoke-CustomCommand "logman update trace 'print-trace' -p '{1B42986F-288F-4DD7-B7F9-120297715C1E}' 0x7FFFFFFF 0xFF -ets" # PrintBRM (BRMENGINE) WPP Invoke-CustomCommand "logman update trace 'print-trace' -p '{12DFC189-A85B-4B19-847B-D9AC6B716DB8}' 0x7FFFFFFF 0xFF -ets" # TraceLogging Providers - Level = default (0xFFFFFFFFFFFFFFFF for TraceLogging) # Workflow and PrintSupport # "Microsoft.Windows.Print.Workflow.API" Invoke-CustomCommand "logman update trace 'print-trace' -p '{744372de-ba26-443b-ba10-712c1a041234}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # "Microsoft.Windows.Print.Workflow.Broker" Invoke-CustomCommand "logman update trace 'print-trace' -p '{1bf554be-03c5-4f49-9b57-f3c0cbad589a}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # "Microsoft.Windows.Print.Workflow.PrintSupport" Invoke-CustomCommand "logman update trace 'print-trace' -p '{08fad69b-3394-5632-97ef-ff9c5a842b1f}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # "Microsoft.Windows.Print.Workflow.Source" Invoke-CustomCommand "logman update trace 'print-trace' -p '{be5f8487-3a5d-4477-b0c2-020679b81e56}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # "Microsoft.Windows.Print.PrintSupport" Invoke-CustomCommand "logman update trace 'print-trace' -p '{7faee4d5-95c1-5987-54c6-a7c3dfb6e56e}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # "Microsoft.Windows.Print.WorkFlowBroker" Invoke-CustomCommand "logman update trace 'print-trace' -p '{F69D3E6C-298B-466C-B84F-486E1F21E347}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # "Microsoft.Windows.Print.WorkFlowRT" Invoke-CustomCommand "logman update trace 'print-trace' -p '{cae6f32b-2553-5c24-f999-e63dde138b9f}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.PrintCore Invoke-CustomCommand "logman update trace 'print-trace' -p '{a4f32eea-babb-59b2-3828-ce92e4e20765}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft-Windows-Mobile-Print-Plugins Invoke-CustomCommand "logman update trace 'print-trace' -p '{6de9ba0e-9e72-53d2-229a-dc09205a27ea}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft-Windows-Print-Platform Invoke-CustomCommand "logman update trace 'print-trace' -p '{fd6b6ae4-7563-550d-46a4-da9fe46cad57}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PrintConfig Invoke-CustomCommand "logman update trace 'print-trace' -p '{fdcab703-6402-4959-b618-f5c3c279ef3d}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.DriverUI Invoke-CustomCommand "logman update trace 'print-trace' -p '{ffdb1efb-602c-5725-c85c-f3f1a065d72a}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.DeviceCenter Invoke-CustomCommand "logman update trace 'print-trace' -p '{4c7e30ea-beaf-5b10-ae30-451fb529c653}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PrintDeviceCapabilities Invoke-CustomCommand "logman update trace 'print-trace' -p '{FD6EC121-DC51-42FD-A559-BA984D345E2B}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PrintCoreConfig Invoke-CustomCommand "logman update trace 'print-trace' -p '{3d9d790d-fb07-539d-b66e-5a2ffb7899ca}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Shell.PrintDialog Invoke-CustomCommand "logman update trace 'print-trace' -p '{b0f40491-9ea6-5fd5-ccb1-0ec63be8b674}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Shell.PrintManager Invoke-CustomCommand "logman update trace 'print-trace' -p '{c6dba857-03f1-5c5b-350c-ef08dbd04572}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft-Windows-LifetimeManager - commented out in PrintTrace.cmd Invoke-CustomCommand "logman update trace 'print-trace' -p '{072665fb-8953-5a85-931d-d06aeab3d109}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Das Invoke-CustomCommand "logman update trace 'print-trace' -p '{ab4d9355-341e-435d-b3d2-4b0e46354e2c}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft-Windows-WSD-DafProvider Invoke-CustomCommand "logman update trace 'print-trace' -p '{e4d412ab-4c22-49ef-83ca-eafb90768512}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.WSDMon Invoke-CustomCommand "logman update trace 'print-trace' -p '{BC2DAB59-AC78-487A-903E-DB3C343C0BE3}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft-Windows-WSD-WSDApi Invoke-CustomCommand "logman update trace 'print-trace' -p '{29b47072-00ff-4d9d-852d-0eafc181a9a3}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PrintScanService Invoke-CustomCommand "logman update trace 'print-trace' -p '{cb730350-b8b7-56d7-6fa4-90e0ea74a9bb}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Shell.ServiceProvider Invoke-CustomCommand "logman update trace 'print-trace' -p '{15584c9b-7d86-5fe0-a123-4a0f438a82c0}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Windows.Internal.Shell.ModalExperience Invoke-CustomCommand "logman update trace 'print-trace' -p '{8BFE6B98-510E-478D-B868-142CD4DEDC1A}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Mobile.Shell.ServiceProvider Invoke-CustomCommand "logman update trace 'print-trace' -p '{97ff6b54-144c-524b-5fec-82b610461390}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.XpsPrint Invoke-CustomCommand "logman update trace 'print-trace' -p '{73cf4d38-21a5-41dc-93d5-c8ec31d84b70}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.XpsDocumentTargetPrint Invoke-CustomCommand "logman update trace 'print-trace' -p '{095da8da-2182-5c9a-53cd-07eca93a04ef}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.IppMon Invoke-CustomCommand "logman update trace 'print-trace' -p '{6fb61ac3-3455-4da4-8313-c1a855ee64c5}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.APMon Invoke-CustomCommand "logman update trace 'print-trace' -p '{e73d49d6-9eda-5059-74d1-b879b18cf9ae}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.WsdAdapter Invoke-CustomCommand "logman update trace 'print-trace' -p '{40dd7897-9206-5dc5-d21b-2de290ca181a}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.DafIpp Invoke-CustomCommand "logman update trace 'print-trace' -p '{6d5ca4bb-df8e-41bc-b554-8aeab241f206}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.DafIppUsb Invoke-CustomCommand "logman update trace 'print-trace' -p '{dd212385-31e6-541c-5587-3c469bb6470a}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.IppCommon Invoke-CustomCommand "logman update trace 'print-trace' -p '{acf1e4a7-9241-4fbf-9555-c27638434f8d}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.IppCommonDll Invoke-CustomCommand "logman update trace 'print-trace' -p '{e9e3a474-c716-56f4-f6f2-5d5f181c46ab}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.IppOneCore Invoke-CustomCommand "logman update trace 'print-trace' -p '{a08e69ca-2172-5c18-fe96-a2ac30857b97}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.IppConfigConverter Invoke-CustomCommand "logman update trace 'print-trace' -p '{6184BC1F-417E-4443-BCCE-9F65BF844AA7}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.HttpRest Invoke-CustomCommand "logman update trace 'print-trace' -p '{49868e3d-77fb-5083-9e09-61e3f37e0309}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.IppEmulator Invoke-CustomCommand "logman update trace 'print-trace' -p '{05af8001-5e28-5ebb-0329-a20fab346b76}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.Mopria.Service Invoke-CustomCommand "logman update trace 'print-trace' -p '{38ae712f-fad1-528e-9721-6ebefea1ab2b}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.Ecp.Service Invoke-CustomCommand "logman update trace 'print-trace' -p '{ec5b420f-d2ec-50b4-5119-083a4da63982}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.GetPrinterConfig Invoke-CustomCommand "logman update trace 'print-trace' -p '{7e247d3c-42fa-5e08-6427-f98478081d24}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.GetIppAttributes Invoke-CustomCommand "logman update trace 'print-trace' -p '{9594011E-FE68-4D05-9F06-C68A0EBE4822}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.JScriptLib Invoke-CustomCommand "logman update trace 'print-trace' -p '{2974da9a-e1f3-5c5f-2abe-f7f20f6448bc}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Security.TokenBroker - commented out in PrintTrace.cmd Invoke-CustomCommand "logman update trace 'print-trace' -p '{077b8c4a-e425-578d-f1ac-6fdf1220ff68}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.AAD.TokenBrokerPlugin.Provider - commented out in PrintTrace.cmd Invoke-CustomCommand "logman update trace 'print-trace' -p '{bfed9100-35d7-45d4-bfea-6c1d341d4c6b}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PwgRenderFilter Invoke-CustomCommand "logman update trace 'print-trace' -p '{e98cb748-3d93-4719-8209-95e0bc46eec7}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PCLmRenderFilter Invoke-CustomCommand "logman update trace 'print-trace' -p '{15fc363b-e2b4-5e55-f1d3-3b0ff726203d}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PrintToPDF Invoke-CustomCommand "logman update trace 'print-trace' -p '{63a87ca3-6662-4925-a0a8-f7bb94ef104e}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.TiffRenderFilter Invoke-CustomCommand "logman update trace 'print-trace' -p '{7617c8d5-b61c-5f45-dd42-02c19bd5f387}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.RenderFilterCommon Invoke-CustomCommand "logman update trace 'print-trace' -p '{ac521649-5ec6-5397-d1c5-749cbf5ea79b}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.USBMon Invoke-CustomCommand "logman update trace 'print-trace' -p '{3fc887c9-c23f-59cd-88b5-a6086f4bbc9e}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.Usbprint Invoke-CustomCommand "logman update trace 'print-trace' -p '{99d90395-1bb0-5932-720a-21d1be94eba3}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.DAFMCP Invoke-CustomCommand "logman update trace 'print-trace' -p '{bf3eac2a-65ca-5ecc-2076-e23c6420a687}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.CloudPrintHelper Invoke-CustomCommand "logman update trace 'print-trace' -p '{44050ea2-419d-5526-923b-b038e0f1e715}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.IppAdapterCore Invoke-CustomCommand "logman update trace 'print-trace' -p '{48111f99-b3d5-5f69-587d-be4ed8e22647}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.IppAdapterCommon Invoke-CustomCommand "logman update trace 'print-trace' -p '{fbfbd628-251d-551d-c4dd-c7820af723e4}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PrintScanDiscoveryManagement Invoke-CustomCommand "logman update trace 'print-trace' -p '{e0d2f15a-3875-5388-2239-23f2538b7636}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PDMUtilities Invoke-CustomCommand "logman update trace 'print-trace' -p '{0aef9116-5ab8-5c05-0eb3-c0721ba93354}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.WinspoolCore Invoke-CustomCommand "logman update trace 'print-trace' -p '{81d45b93-a5ff-5459-26ff-c092864200c6}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.ApMonPortMig Invoke-CustomCommand "logman update trace 'print-trace' -p '{d758d01c-7402-5923-6a27-44bdcc59a5c5}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.UsbPortMig Invoke-CustomCommand "logman update trace 'print-trace' -p '{201eb0f8-12f0-5b34-c99b-75c1541f3479}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.McpManagement Invoke-CustomCommand "logman update trace 'print-trace' -p '{7cdc2341-4d44-54aa-2899-ddb05ecf0adb}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.McpManagementUtil Invoke-CustomCommand "logman update trace 'print-trace' -p '{402d7aed-ded3-5536-3112-a2ce8baa1fdc}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.McpIppChannel Invoke-CustomCommand "logman update trace 'print-trace' -p '{ee8c758e-2e70-574f-8149-266b77c8d56a}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.McpEvtSrc Invoke-CustomCommand "logman update trace 'print-trace' -p '{b145b5c6-1a9d-50c5-7f76-39f208ed09c9}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.McpLppHelper Invoke-CustomCommand "logman update trace 'print-trace' -p '{0e46cee6-dd9a-5b24-67c6-be3a88c3f894}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.ProxyApp Invoke-CustomCommand "logman update trace 'print-trace' -p '{e604ec58-ad08-5a2c-3ecb-704c8c024881}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.GDI Invoke-CustomCommand "logman update trace 'print-trace' -p '{bad46242-e75f-541f-c2d2-ab35489f27e4}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.GpdParser Invoke-CustomCommand "logman update trace 'print-trace' -p '{c5488b38-f338-51d9-1046-be7b050f3198}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.UniLib Invoke-CustomCommand "logman update trace 'print-trace' -p '{24a149d9-e7af-59b9-10c7-b2115913ea92}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PrvSpoolss Invoke-CustomCommand "logman update trace 'print-trace' -p '{8325bcbd-4d99-5255-0722-d4387890d3c3}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.CSPs.UPPrinterInstalls Invoke-CustomCommand "logman update trace 'print-trace' -p '{5000d5f2-f6c7-59e0-eda8-c5126f0eefcd}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Scan.EsclScan Invoke-CustomCommand "logman update trace 'print-trace' -p '{2e008da9-e1b6-5cb5-0607-82066afcfff4}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Scan.EsclWiaDriver Invoke-CustomCommand "logman update trace 'print-trace' -p '{93603fbe-a752-550d-b87e-f202b0f27f9e}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Scan.EsclProtocol Invoke-CustomCommand "logman update trace 'print-trace' -p '{27a7ea23-db5c-5487-b775-89c06c43039b}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Scan.DafEscl Invoke-CustomCommand "logman update trace 'print-trace' -p '{f25e0650-deff-5306-ca0d-40abb8b107dd}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Scan.EsclEmulator Invoke-CustomCommand "logman update trace 'print-trace' -p '{3e617461-4ad0-5bb1-ce2d-796bf4794fbf}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Scan.Plugins Invoke-CustomCommand "logman update trace 'print-trace' -p '{4e880362-c4e8-5c62-7a2e-db0ee6a8f9a8}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Scan.EsclWiaCore Invoke-CustomCommand "logman update trace 'print-trace' -p '{c7c2a97e-3d49-5f78-bd33-22d8c22a7cf3}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Scan.Runtime Invoke-CustomCommand "logman update trace 'print-trace' -p '{df6dca70-9918-455f-86fe-983adc74fa0d}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Scan.WindowsImageAcquisition Invoke-CustomCommand "logman update trace 'print-trace' -p '{4a892232-6efc-54c1-1f0a-1b916a719612}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.DeviceControl Invoke-CustomCommand "logman update trace 'print-trace' -p '{5fef3144-ec00-5072-ee6b-5d0a02bb656c}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.XGC Invoke-CustomCommand "logman update trace 'print-trace' -p '{0a82e916-4637-4998-83bf-8b0f4792a7c9}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.DeviceConfiguration Invoke-CustomCommand "logman update trace 'print-trace' -p '{d43cc295-539f-5e64-77ce-78ef0e51825c}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PrinterAssociationCommon Invoke-CustomCommand "logman update trace 'print-trace' -p '{8288e29d-0fc0-56b8-03ed-7fa253155f20}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft.Windows.Print.PrintUtil Invoke-CustomCommand "logman update trace 'print-trace' -p '{ee6271a2-f93c-566a-b4a1-4eacdbce3ad3}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # ETW providers - Level = 0xFFFFFFFF # Microsoft-Windows-PrintDialogs Invoke-CustomCommand "logman update trace 'print-trace' -p '{27E76321-1E5B-4a82-BA0C-26E978F15072}' 0xFFFFFFFF 0xFF -ets" # Microsoft-Windows-PrintDrivers Invoke-CustomCommand "logman update trace 'print-trace' -p '{0E173F13-4266-4EFD-883C-79B24789B1BC}' 0xFFFFFFFF 0xFF -ets" # microsoft-windows-printservice-usbmon Invoke-CustomCommand "logman update trace 'print-trace' -p '{7f812073-b28d-4afc-9ced-b8010f914ef6}' 0xFFFFFFFF 0xFF -ets" # Microsoft-Windows-PrintService Invoke-CustomCommand "logman update trace 'print-trace' -p '{747EF6FD-E535-4d16-B510-42C90F6873A1}' 0xFFFFFFFF 0xFF -ets" # Microsoft-Windows-ProcessStateManager Invoke-CustomCommand "logman update trace 'print-trace' -p '{d49918cf-9489-4bf1-9d7b-014d864cf71f}' 0xFFFFFFFF 0xFF -ets" # Microsoft-Windows-SystemEventsBroker Invoke-CustomCommand "logman update trace 'print-trace' -p '{B6BFCC79-A3AF-4089-8D4D-0EECB1B80779}' 0xFFFFFFFF 0xFF -ets" # Adding LPD service providers following discussion with engineer Luis Canete, who was a case related to LPD. # We don't have them yet in the big list from PrintTrace.cmd, so adding extra via script parameter. if ($LPD) { # LPDSVC Invoke-CustomCommand "logman update trace 'print-trace' -p '{3EA31F33-8F51-481D-AEB7-4CA37AB12E48}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft-Windows-Spooler-LPDSVC Invoke-CustomCommand "logman update trace 'print-trace' -p '{9F44821F-1FD9-46BF-A09A-C7F751159AAF}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" } # start RPC trace if selected if ($RPC) { Invoke-CustomCommand "reg add HKEY_LOCAL_MACHINE\Software\Microsoft\OLE\Tracing /v ExecutablesToTrace /t REG_MULTI_SZ /d * /f" Invoke-CustomCommand "logman create trace 'rpc-trace' -ow -o '$($TracesDir)RPC-Trace-$($env:COMPUTERNAME).etl' -p '{B46FA1AD-B22D-4362-B072-9F5BA07B046D}' 0xFFFFFFFFFFFFFFFF 0xFF -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 1024 -ets" Invoke-CustomCommand "logman update trace 'rpc-trace' -p '{A0C4702B-51F7-4ea9-9C74-E39952C694B8}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" Invoke-CustomCommand "logman update trace 'rpc-trace' -p '{9474a749-a98d-4f52-9f45-5b20247e4f01}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" Invoke-CustomCommand "logman update trace 'rpc-trace' -p '{bda92ae8-9f11-4d49-ba1d-a4c2abca692e}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" Invoke-CustomCommand "logman update trace 'rpc-trace' -p '{6AD52B32-D609-4BE9-AE07-CE8DAE937E39}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" Invoke-CustomCommand "logman update trace 'rpc-trace' -p '{F4AED7C7-A898-4627-B053-44A7CAA12FCD}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" Invoke-CustomCommand "logman update trace 'rpc-trace' -p '{D8975F88-7DDB-4ED0-91BF-3ADF48C48E0C}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" } if ($Network) { Invoke-CustomCommand "netsh trace start capture=yes scenario=netconnection maxsize=1024 report=disabled tracefile='$($TracesDir)NETCAP-$($env:COMPUTERNAME).etl'" } if ($ProcMon) { Invoke-CustomCommand "start $($Root)\Procmon.exe '/AcceptEula /Quiet /Minimized /BackingFile $($TracesDir)$($env:COMPUTERNAME).PML'" } if ($PSR) { Invoke-CustomCommand "psr.exe /start /output $($TracesDir)PSR_$($env:COMPUTERNAME)_.zip /maxsc 99 /sc 1 /gui 1" Write-Host -ForegroundColor Yellow "WARNING: You selected the -PSR flag. This activates the Problem Steps Recorder tool, which automatically collects screenshots & information about steps performed (e.g: user left-clicked in text area of CMD.exe, user clicked close on Event Viewer, etc). Please avoid displaying sensitive information like passwords or other things." } Write-Log "Live captures started" } Function Stop-Traces { Write-Log "Stopping live captures..." Invoke-CustomCommand "logman stop 'Print-Trace' -ets" if ($RPC) { Invoke-CustomCommand "reg delete HKEY_LOCAL_MACHINE\Software\Microsoft\OLE\Tracing /v ExecutablesToTrace /f" Invoke-CustomCommand "logman stop 'rpc-trace' -ets" } if ($Network) { Invoke-CustomCommand "netsh trace stop" } if ($ProcMon) { Invoke-CustomCommand "start $($Root)\Procmon.exe '/Terminate'" } if ($PSR) { Invoke-CustomCommand "psr.exe /stop" } Invoke-CustomCommand "tasklist /svc" -DestinationFile ("Traces\tasklist-$env:COMPUTERNAME.txt") } # Check parameters # Reject execution if tracing parameters are specified without the main trace flag if (!$Trace -and ($RPC -or $Network -or $PSR -or $ProcMon)) { Write-Host -ForegroundColor Yellow "WARNING: You selected a parameter for tracing, but did not specify the main -Trace flag. Please try again, including -Trace. Consider also checking out the examples, following the instructions in the REMARKS section below." } # Reject execution if -NoDumps is specified without -Logs, as it makes no sense if (!$Logs -and $NoDumps) { Write-Host -ForegroundColor Yellow "WARNING: You selected the NoDumps parameter, but did not specify the main -Logs flag. Please try again, including -Logs. Consider also checking out the examples, following the instructions in the REMARKS section below." } # Display info, if no main parameters specified if (!$Trace -and !$Logs) { Get-Help $MyInvocation.MyCommand.Definition exit } # Initialize some global variables & output folder $resName = "$($ToolName -replace "Collect","Results")-" + $env:computername + "-" + $(get-date -f yyyyMMdd_HHmmss) # Check if a destination folder was explicitly requested if ($DataPath) { if (-not (Test-Path $DataPath)) { $answer = Read-Host "The destination folder ${DataPath} does not exist. Do you want to create it now? y/n" if ($answer -eq 'y') { New-Item -ItemType "directory" -Path $DataPath -Force | Out-Null } else { exit } } $global:resDir = $DataPath + "\" + $resName } else { $global:resDir = $global:Root + "\" + $resName } New-Item -ItemType "directory" -Path $global:resDir | Out-Null $global:outfile = $global:resDir + "\script-output.txt" $global:errfile = $global:resDir + "\script-errors.txt" $global:RdrOut = " >>""" + $global:outfile + """" $global:RdrErr = " 2>>""" + $global:errfile + """" # $fqdn = [System.Net.Dns]::GetHostByName(($env:computerName)).HostName # $OSVer = ([environment]::OSVersion.Version.Major) + ([environment]::OSVersion.Version.Minor) / 10 Write-Log $version # License Agreement if ($AcceptEula) { Write-Log "AcceptEula switch specified, silently continuing" $eula = ShowEULAIfNeeded $ToolName 2 } else { $eula = ShowEULAIfNeeded $ToolName 0 if ($eula -ne "Yes") { Write-Log "EULA declined, exiting" exit } } Write-Log "EULA accepted, continuing" # Start traces if "selected" if ($Trace) { $TracesDir = $global:resDir + "\Traces\" New-Item -itemtype directory -path $TracesDir | Out-Null Start-Traces Write-Host -ForegroundColor Cyan "Press ENTER to stop the live captures, after reproducing the issue..." Read-Host Stop-Traces if (-not $Logs) { exit } } # Collect dumps if not disabled if ($NoDumps) { Write-Log "We have the NoDumps flag, skipping collection of process dumps." } else { Write-Log "Collecting dump of the Spooler service" $pidSpooler = FindServicePid "Spooler" if ($pidSpooler) { CreateProcDump $pidSpooler $global:resDir "spoolsv" } Write-Log "Collecing the dumps of splwow64 if they exist" $list = get-process -Name "splwow64" -ErrorAction SilentlyContinue 2>>$global:errfile if (($list | Measure-Object).count -gt 0) { foreach ($proc in $list) { Write-Log ("Found splwow64.exe with PID " + $proc.Id) CreateProcDump $proc.Id $global:resDir "splwow64-$($proc.Id)" } } else { Write-Log "No splwow64 process found" } Write-Log "Collecing the dumps of PrintIsolationHost.exe processes" $list = get-process -Name "PrintIsolationHost.exe" -ErrorAction SilentlyContinue 2>>$global:errfile if (($list | Measure-Object).count -gt 0) { foreach ($proc in $list) { Write-Log ("Found PrintIsolationHost.exe with PID " + $proc.Id) CreateProcDump $proc.Id $global:resDir "PrintIsolationHost-$($proc.Id)" } } else { Write-Log "No PrintIsolationHost.exe process found" } } # Get printers information via PowerShell cmdlet Get-Printer -ErrorAction SilentlyContinue 2>>$global:errfile | Out-File $global:resDir\Get-Printer.txt Get-Printer -ErrorAction SilentlyContinue 2>>$global:errfile | Format-List * | Out-File $global:resDir\Get-Printer.txt -Append # Export relevant User registry settings Export-RegistryKey -KeyPath "HKCU:\Printers" -DestinationFile "reg-HKCU-printers.txt" Export-RegistryKey -KeyPath "HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Devices" -DestinationFile "reg-HKCU-devices.txt" Export-RegistryKey -KeyPath "HKCU:\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts" -DestinationFile "reg-HKCU-printer-ports.txt" Export-RegistryKey -KeyPath "HKCU:\Printers\ConvertUserDevModesCount" -DestinationFile "reg-HKCU-printers-DevModesCount.txt" # Export relevant Machine registry settings Export-RegistryKey -KeyPath "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print" -DestinationFile "reg-HKLM-Software-Print.txt" Export-RegistryKey -KeyPath "HKLM:\Software\Policies\Microsoft\Windows NT\Printers" -DestinationFile "reg-HKLM-Software-Print-Policies.txt" Export-RegistryKey -KeyPath "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Providers\Client Side Rendering Print Provider" -DestinationFile "reg-HKLM-Software-CSR.txt" Export-RegistryKey -KeyPath "HKLM:\System\CurrentControlSet\Control\Print" -DestinationFile "reg-HKLM-System-Print-service.txt" Export-RegistryKey -KeyPath "HKLM:\System\CurrentControlSet\Control\DeviceClasses" -DestinationFile "reg-HKLM-System-DeviceClasses.txt" Export-RegistryKey -KeyPath "HKLM:\System\CurrentControlSet\Control\DeviceContainers" -DestinationFile "reg-HKLM-System-DeviceContainers.txt" Export-RegistryKey -KeyPath "HKLM:\System\CurrentControlSet\Enum\USBPRINT" -DestinationFile "reg-HKLM-System-Enum-USBPRINT.txt" Export-RegistryKey -KeyPath "HKLM:\System\CurrentControlSet\Enum\SWD\PRINTENUM" -DestinationFile "reg-HKLM-System-Enum-SWD-PRINTENUM.txt" Export-RegistryKey -KeyPath "HKLM:\System\DriverDatabase" -DestinationFile "reg-HKLM-System-DriverDatabase.txt" Export-RegistryKey -KeyPath "HKLM:\DRIVERS\DriverDatabase" -DestinationFile "reg-HKLM-Drivers-DriverDatabase.txt" # Export spooler service configuration key Export-RegistryKey -KeyPath "HKLM:\System\CurrentControlSet\Services\Spooler" -DestinationFile "reg-HKLM-System-Services-Spooler.txt" # Get any KIR overrides configured on this device Export-RegistryKey -KeyPath "HKLM:\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides" -DestinationFile "reg-KIR-Overrides.txt" # Export relevant event logs Export-EventLog -LogName "Application" Export-EventLog -LogName "System" Export-EventLog -LogName "Microsoft-Windows-PrintService/Operational" Export-EventLog -LogName "Microsoft-Windows-PrintService/Admin" Export-EventLog -LogName "Microsoft-Windows-PrintBRM/Admin" Export-EventLog -LogName "Microsoft-Windows-DeviceSetupManager/Admin" Export-EventLog -LogName "Microsoft-Windows-DeviceSetupManager/Operational" Export-EventLog -LogName "Microsoft-Windows-TerminalServices-Printers/Admin" Export-EventLog -LogName "Microsoft-Windows-TerminalServices-Printers/Operational" # Grab also these Universal Print event logs if they exist Export-EventLog -LogName "Microsoft-Windows-PrintConnector/Operational" Export-EventLog -LogName "Microsoft-Windows-PrintConnectorUpdater/Admin" Export-EventLog -LogName "Microsoft-Windows-PrintConnectorUpdater/Session" # Get some additional information (Spooler service config, setupapi, netstat, ipconfig, gpresult) Write-Log "Copying some relevant files from %windir%\INF" New-Item -ItemType "directory" -Path "$global:resDir\Inf-SetupApi" -Force | Out-Null New-Item -ItemType "directory" -Path "$global:resDir\Inf-OEM" -Force | Out-Null Copy-Item "$env:windir\inf\Setupapi*" -Destination "$global:resDir\Inf-SetupApi" -Force Copy-Item "$env:windir\Inf\oem*.inf" -Destination "$global:resDir\Inf-OEM" -Force Invoke-CustomCommand -Command "sc.exe queryex spooler" -DestinationFile "Spooler_ServiceConfig.txt" Invoke-CustomCommand -Command "netstat -anob" -DestinationFile "netstat.txt" Invoke-CustomCommand -Command "ipconfig /all" -DestinationFile "ipconfig.txt" Invoke-CustomCommand -Command "driverquery /v" -DestinationFile "drivers.txt" Invoke-CustomCommand -Command "cscript $env:windir\System32\Printing_Admin_Scripts\en-US\prndrvr.vbs -l" -DestinationFile "prndrvr_en.txt" Invoke-CustomCommand -Command "cscript $env:windir\System32\Printing_Admin_Scripts\en-US\prnmngr.vbs -l" -DestinationFile "prnmngr_en.txt" Invoke-CustomCommand -Command "cscript $env:windir\System32\Printing_Admin_Scripts\en-US\prnjobs.vbs -l" -DestinationFile "prnjobs_en.txt" Invoke-CustomCommand -Command "cscript $env:windir\System32\Printing_Admin_Scripts\en-US\prnport.vbs -l" -DestinationFile "prnport_en.txt" Invoke-CustomCommand -Command "tree $env:windir\Inf /f" -DestinationFile "tree_inf.txt" Invoke-CustomCommand -Command "tree $env:windir\System32\DriverStore /f" -DestinationFile "tree_DriverStore.txt" Invoke-CustomCommand -Command "tree $env:windir\System32\spool /f" -DestinationFile "tree_spool.txt" Invoke-CustomCommand -Command "pnputil -e" -DestinationFile "pnputil_e.txt" Invoke-CustomCommand -Command "pnputil /export-pnpstate ""${global:resDir}\pnputil_pnpstate.pnp""" # Check version of some relevant print-related files Write-Log "Collecting versions of some printing-related files" FileVersion -Filepath ($env:windir + "\system32\localspl.dll") -Log $true FileVersion -Filepath ($env:windir + "\system32\spoolsv.exe") -Log $true FileVersion -Filepath ($env:windir + "\system32\win32spl.dll") -Log $true FileVersion -Filepath ($env:windir + "\system32\spoolss.dll") -Log $true FileVersion -Filepath ($env:windir + "\system32\PrintIsolationProxy.dll") -Log $true FileVersion -Filepath ($env:windir + "\system32\winspool.drv") -Log $true FileVersion -Filepath ($env:windir + "\system32\spool\drivers\x64\3\unidrv.dll") -Log $true # Get running processes Write-Log "Collecting details about running processes" if (ListProcsAndSvcs) { CollectSystemInfoWMI ExecQuery -Namespace "root\cimv2" -Query "select * from Win32_Product" | Sort-Object Name | Format-Table -AutoSize -Property Name, Version, Vendor, InstallDate | Out-String -Width 400 | Out-File -FilePath ($global:resDir + "\products.txt") Write-Log "Collecting the list of installed hotfixes" Get-HotFix -ErrorAction SilentlyContinue 2>>$global:errfile | Sort-Object -Property InstalledOn -ErrorAction SilentlyContinue | Out-File $global:resDir\hotfixes.txt # Notice that for gpresult /h we don't specify a -Destinationfile, because it has a dedicated output file # no need to redirect the console output stream, which in this case doesn't work anyway Invoke-CustomCommand -Command "gpresult /h ""${global:resDir}\gpresult.html""" Invoke-CustomCommand -Command "gpresult /r" -DestinationFile "gpresult.txt" } else { Write-Log "WMI is not working" $proc = Get-Process | Where-Object { $_.Name -ne "Idle" } $proc | Format-Table -AutoSize -property id, name, @{N = "WorkingSet"; E = { "{0:N0}" -f ($_.workingset / 1kb) }; a = "right" }, @{N = "VM Size"; E = { "{0:N0}" -f ($_.VirtualMemorySize / 1kb) }; a = "right" }, @{N = "Proc time"; E = { ($_.TotalProcessorTime.ToString().substring(0, 8)) } }, @{N = "Threads"; E = { $_.threads.count } }, @{N = "Handles"; E = { ($_.HandleCount) } }, StartTime, Path | Out-String -Width 300 | Out-File -FilePath ($global:resDir + "\processes.txt") CollectSystemInfoNoWMI } # ZIP the current output folder & delete it if ($global:resDir) { Write-Log "Zipping the results folder..." try { Compress-Archive -Path "$global:resDir" -DestinationPath "$global:resDir.zip" -Force Write-Host "Finished! Upload the ZIP archive to the secure case workspace." -ForegroundColor Green } catch { Write-Host "Finished! But couldn't create the ZIP archive, please do that manually & upload to the secure case workspace." -ForegroundColor Yellow exit } # Clean up the current results folder, to minimize disk space impact Remove-Item -Path "$global:resDir" -Recurse -Force } # SIG # Begin signature block # MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDuxe7Y6YD0iGWa # KvsOzXh0x8M2MQP3Yn84a7QHhu/wEKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ5WHTyahRHShZSO7S0k/WaX # V6eaa8YezV64wL0Aqy5DMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAepd1hTD/nHaNeX69DzcHJuSuS858iICMC/dDpqEmIQevDeBaBF1eT3Vu # QWih4lbEA3hrYHK1m0eOligGJNFauHWFkgqNIP3KshrmmQbGuYTu/LPukGmfAHyY # Ow8PKy9vG58GgMKrrI+hkhMydTJklyOzSb3dU0MWVoQz4Kl3TeWraUIF8XVTCo4F # hg4kNGeUhC3a7UZfmSdLKO5VBuu1YP8UnWg4G3TR0/8ZSuckm/KcqcU2N78D9Drm # gEpqYCq5WXj/jBuILgj8aieP6peMOB7iC2Iwqrnv9gtd7QO5zSRp8fupjA6EFPki # pSiIB39/0cg+Z5nMwNlD/o10v3HLHaGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC # FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCApChsJNsA2P4/K2MyNglEqXMtjq5SIIMYQrqID3P+2KQIGZlddmE+O # GBMyMDI0MDYxMjE1MDA0MS4wMDdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoTpw0wIhgPMjAyNDA2MTIxMjQ4MTNaGA8yMDI0MDYxMzEyNDgxM1owdjA8Bgor # BgEEAYRZCgQBMS4wLDAKAgUA6hOnDQIBADAJAgEAAgFGAgH/MAcCAQACAhEtMAoC # BQDqFPiNAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAPvJGnJSZLNo56HeJ # 3cyRbGz7USSNr/JjnVlpx6BGU156d5HHnv3Q0iraNXqCwSPAz0HZDlmvJ0a1rrdd # PIIVo5bRPk6TXA7juDsAGgkK1gt7DGttFGfBNm2QC/4NEdun8kT3Crg95ldiveHH # Z6N/LIAiG9IDmQSptE5EQ4zM0GkxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdzB4IzCX1hejgABAAAB3DANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCDigm6LK+rmbz6ccS7mqMLku4yqpthAwKLXGDbV7UK+bDCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EIFOnF4pq2UQ/jLypnOO5YvQ67QirEQsOFfZMvKXE # gg03MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHc # weCMwl9YXo4AAQAAAdwwIgQgSfMVTLRnPEpnLjm71akIKYjbspPV12GU+ZBoRqI9 # 90gwDQYJKoZIhvcNAQELBQAEggIAWihZ/4QF7lSjnIC0knximto5euIXs3jQvUTa # 1MDr4BBd70ba6cJY2kf3++Qvz/5fzTNU+bfVcA55co/yacUMRILh+q7u/qfZLHsM # RarjKp+mbhzSXaJQcv0lAoi4/Abe45RJkapv8C1ndFqPr1dnbzTGLu8ACwSRkU3G # HKAwffBVd2+kPkjrX9RwwnqNAfzwFJIRPb1SpXJSQQcgPG0dnghMFyQAtJK3fsaR # WRRb9uvDdZdRFaNSeJ/XVuqyw4bXMjYsXjUICRpUndQcYIkSf0uBvvofL94MIvzu # jLDm743SszsXUblOz0geviNaQAfIP0x081Els+MTa6/hw+lgKPejRcd6r9gC6BhZ # QR357yxL4W9ilOapKsIkvztTTz2Jg52ZGYhmEq9OLAb6WxJrAGlBertF85vg3GGE # ZyAw+3jif1GYXmUZskoOVbkf7AZAGBsqh0dqQ2f3ZuGcJCHS0s19b/duMoHh5puJ # c75TV2mD4vy1PD7psjXCVqQ9xtyxpBUQlx6QD0gz1aPSbZNe0lpA2OpsQ5b9klNG # 7lPOg2FT/R58WsTMciHdA+s7MAY/Qd9BL5NK5IEs61U2DYvjclbbCWTUkUnMugcV # JpBoq7u5SjxHAELKKN8VKf0pUkykSzoFEk1XCBfAZD74qIhv7VdNWjeUKbPX2Ael # Myw9OBs= # SIG # End signature block
0
3235.ps1
class ApprovalConfiguration { [int]$ExpireMinutes [System.Collections.ArrayList]$Commands ApprovalConfiguration() { $this.ExpireMinutes = 30 $this.Commands = New-Object -TypeName System.Collections.ArrayList } [hashtable]ToHash() { $hash = @{ ExpireMinutes = $this.ExpireMinutes } $cmds = New-Object -TypeName System.Collections.ArrayList $this.Commands | Foreach-Object { $cmds.Add($_.ToHash()) > $null } $hash.Commands = $cmds return $hash } static [ApprovalConfiguration] Serialize([hashtable]$DeserializedObject) { $ac = [ApprovalConfiguration]::new() $ac.ExpireMinutes = $DeserializedObject.ExpireMinutes $DeserializedObject.Commands.foreach({ $ac.Commands.Add( [ApprovalCommandConfiguration]::Serialize($_) ) > $null }) return $ac } }
0
3242.ps1
class PluginException : Exception { PluginException() {} PluginException([string]$Message) : base($Message) {} } class PluginNotFoundException : PluginException { PluginNotFoundException() {} PluginNotFoundException([string]$Message) : base($Message) {} } class PluginDisabled : PluginException { PluginDisabled() {} PluginDisabled([string]$Message) : base($Message) {} } class Plugin : BaseLogger { [string]$Name [hashtable]$Commands = @{} [version]$Version [bool]$Enabled [hashtable]$Permissions = @{} hidden [string]$_ManifestPath Plugin([Logger]$Logger) { $this.Name = $this.GetType().Name $this.Logger = $Logger $this.Enabled = $true } Plugin([string]$Name, [Logger]$Logger) { $this.Name = $Name $this.Logger = $Logger $this.Enabled = $true } [Command]FindCommand([Command]$Command) { return $this.Commands.($Command.Name) } [void]AddCommand([Command]$Command) { if (-not $this.FindCommand($Command)) { $this.LogDebug("Adding command [$($Command.Name)]") $this.Commands.Add($Command.Name, $Command) } } [void]RemoveCommand([Command]$Command) { $existingCommand = $this.FindCommand($Command) if ($existingCommand) { $this.LogDebug("Removing command [$($Command.Name)]") $this.Commands.Remove($Command.Name) } } [void]ActivateCommand([Command]$Command) { $existingCommand = $this.FindCommand($Command) if ($existingCommand) { $this.LogDebug("Activating command [$($Command.Name)]") $existingCommand.Activate() } } [void]DeactivateCommand([Command]$Command) { $existingCommand = $this.FindCommand($Command) if ($existingCommand) { $this.LogDebug("Deactivating command [$($Command.Name)]") $existingCommand.Deactivate() } } [void]AddPermission([Permission]$Permission) { if (-not $this.Permissions.ContainsKey($Permission.ToString())) { $this.LogDebug("Adding permission [$Permission.ToString()] to plugin [$($this.Name)`:$($this.Version.ToString())]") $this.Permissions.Add($Permission.ToString(), $Permission) } } [Permission]GetPermission([string]$Name) { return $this.Permissions[$Name] } [void]RemovePermission([Permission]$Permission) { if ($this.Permissions.ContainsKey($Permission.ToString())) { $this.LogDebug("Removing permission [$Permission.ToString()] from plugin [$($this.Name)`:$($this.Version.ToString())]") $this.Permissions.Remove($Permission.ToString()) } } [void]Activate() { $this.LogDebug("Activating plugin [$($this.Name)`:$($this.Version.ToString())]") $this.Enabled = $true $this.Commands.GetEnumerator() | ForEach-Object { $_.Value.Activate() } } [void]Deactivate() { $this.LogDebug("Deactivating plugin [$($this.Name)`:$($this.Version.ToString())]") $this.Enabled = $false $this.Commands.GetEnumerator() | ForEach-Object { $_.Value.Deactivate() } } [hashtable]ToHash() { $cmdPerms = @{} $this.Commands.GetEnumerator() | Foreach-Object { $cmdPerms.Add($_.Name, $_.Value.AccessFilter.Permissions.Keys) } $adhocPerms = New-Object System.Collections.ArrayList $this.Permissions.GetEnumerator() | Where-Object {$_.Value.Adhoc -eq $true} | Foreach-Object { $adhocPerms.Add($_.Name) > $null } return @{ Name = $this.Name Version = $this.Version.ToString() Enabled = $this.Enabled ManifestPath = $this._ManifestPath CommandPermissions = $cmdPerms AdhocPermissions = $adhocPerms } } }
0
Get-Installed.ps1
function Get-Installed { <# .SYNOPSIS This function lists data found in the registry associated with installed programs. .DESCRIPTION Describe the function in more detail Author: Stan Miller .EXAMPLE Get all apps whose display names start with a specific string and display all valuenames get-installed -re "^microsoft xna" -valuenameRE ".*" The "^" above means starts with the following string. The ".*" means match all including the empty string .EXAMPLE get-installed -re "^microsoft xna game studio platform tool$" Display the default set of valuenames for apps whose displayname starts (^) and ends ($) with "microsoft xna game studio platform tool" displayname=microsoft xna game studio platform tools displayversion=1.1.0.0 installdate=20100204 installsource=C:\\Program Files (x86)\\Microsoft XNA\\XNA Game Studio\\v3.1\\Setup\\ localpackage=C:\\Windows\\Installer\\2d09d3a5.msi madeup-gname={BED4CEEC-863F-4AB3-BA23-541764E2D2CE} madeup-loginid=System madeup-wow=1 uninstallstring=MsiExec.exe /I{BED4CEEC-863F-4AB3-BA23-541764E2D2CE} windowsinstaller=1 .EXAMPLE get-installed -re "^microsoft xna game studio platform tool" -compress $False Display the default set of valuenames for apps whose displayname starts with "^microsoft xna" only this time show all registry sources. In this case the products and uninstall areas displayname=microsoft xna game studio platform tools keypath=software\\microsoft\\windows\\currentversion\\installer\\userdata\\s-1-5-18\\products\\ceec4debf3683ba4ab324571462e2dec\\installproperties displayversion=1.1.0.0 installdate=20100204 installsource=C:\\Program Files (x86)\\Microsoft XNA\\XNA Game Studio\\v3.1\\Setup\\ localpackage=C:\\Windows\\Installer\\2d09d3a5.msi madeup-loginid=System uninstallstring=MsiExec.exe /I{BED4CEEC-863F-4AB3-BA23-541764E2D2CE} windowsinstaller=1 keypath=software\\wow6432node\\microsoft\\windows\\currentversion\\uninstall\\{bed4ceec-863f-4ab3-ba23-541764e2d2ce} displayversion=1.1.0.0 installdate=20100204 installsource=C:\\Program Files (x86)\\Microsoft XNA\\XNA Game Studio\\v3.1\\Setup\\ madeup-gname={BED4CEEC-863F-4AB3-BA23-541764E2D2CE} madeup-wow=1 uninstallstring=MsiExec.exe /I{BED4CEEC-863F-4AB3-BA23-541764E2D2CE} windowsinstaller=1 .EXAMPLE get-installed -namesummary $true Display the frequency of valuenames for all apps in all registry location only this time show all registry sources in reverse order of occurrence. UninstallString,616 DisplayName,616 Publisher,600 DisplayVersion,525 VersionMajor,490 InstallDate,474 EstimatedSize,474 InstallSource,470 Version,469 ModifyPath,461 WindowsInstaller,457 Language,396 madeup-gname,391 NoModify,366 HelpLink,323 madeup-wow,308 NoRepair,256 SystemComponent,235 LocalPackage,225 URLInfoAbout,171 VersionMinor,167 InstallLocation,159 ParentDisplayName,91 ParentKeyName,91 madeup-native,83 DisplayIcon,79 Comments,78 URLUpdateInfo,71 RegOwner,69 MoreInfoURL,66 ProductID,62 RegCompany,59 NoRemove,53 Readme,35 Contact,33 ReleaseType,26 IsMinorUpgrade,26 RegistryLocation,25 HelpTelephone,21 UninstallPath,16 LogFile,9 MajorVersion,7 APPName,6 MinorVersion,6 Size,6 QuietUninstallString,5 NoElevateOnModify,4 Inno Setup: User,3 SkuComponents,3 ShellUITransformLanguage,3 ProductGuid,3 NVI2_Package,3 Inno Setup: App Path,3 Inno Setup: Icon Group,3 CacheLocation,3 ProductCodes,3 NVI2_Timestamp,3 Inno Setup: Deselected Tasks,3 NVI2_Setup,3 Inno Setup: Setup Version,3 LogMode,3 PackageIds,3 Inno Setup: Language,2 RequiresIESysFile,2 InstanceId,2 UninstDataVerified,1 BundleVersion,1 BundleProviderKey,1 Inno Setup: Selected Components,1 FCLAppName,1 Inno Setup: Selected Tasks,1 Integrated,1 BundleUpgradeCode,1 Installed,1 SQLProductFamilyCode,1 FCLGUID,1 UninstallerCommonDir,1 BundleDetectCode,1 InstallerType,1 DisplayName_Localized,1 Inno Setup: Setup Type,1 EngineVersion,1 BundleCachePath,1 Resume,1 .EXAMPLE get-installed -re "^microsoft xna game studio platform tools$" -makeobjects $true Instead of displaying the valuenames create an object for further use displayname : microsoft xna game studio platform tools DisplayVersion : 1.1.0.0 InstallDate : 20100204 InstallLocation : InstallSource : C:\\Program Files (x86)\\Microsoft XNA\\XNA Game Studio\\v3.1\\Setup\\ LocalPackage : C:\\Windows\\Installer\\2d09d3a5.msi madeup-gname : {BED4CEEC-863F-4AB3-BA23-541764E2D2CE} madeup-native : madeup-wow : 1 QuietUninstallString : UninstallString : MsiExec.exe /I{BED4CEEC-863F-4AB3-BA23-541764E2D2CE} WindowsInstaller : 1 .EXAMPLE get-installed -re "^microsoft xna game studio" -makeobjects $true|format-table Instead of displaying the valuenames create an object for further use displayname DisplayVersion InstallDate InstallLocation InstallSource LocalPackage madeup-gname madeup-native madeup-wow QuietUninstallStrin g ----------- -------------- ----------- --------------- ------------- ------------ ------------ ------------- ---------- ------------------- microsoft xna ga... 3.1.10527.0 XNA Game Studio 3.1 1 microsoft xna ga... 3.1.10527.0 20100204 c:\\c3aa2d4649aa0... c:\\Windows\\Insta... {E1D78366-91DA-4... 1 microsoft xna ga... 3.1.10527.0 20100204 C:\\Program Files... C:\\Windows\\Insta... {007BECB0-17DD-4... 1 microsoft xna ga... 3.1.10527.0 20100204 c:\\c3aa2d4649aa0... c:\\Windows\\Insta... {0DC16794-7E69-4... 1 microsoft xna ga... 3.1.10527.0 20100204 C:\\Program Files... C:\\Windows\\Insta... {AF9BDE67-11A5-4... 1 microsoft xna ga... 3.1.10527.0 20100204 C:\\Program Files... C:\\Windows\\Insta... {3BA37E38-B53D-4... 1 microsoft xna ga... 3.1.10527.0 20100204 C:\\Program Files... C:\\Windows\\Insta... {DFB81F19-ED3A-4... 1 microsoft xna ga... 3.1.10527.0 20100204 C:\\Program Files... C:\\Windows\\Insta... {7FD30AE7-281D-4... 1 microsoft xna ga... 1.1.0.0 20100204 C:\\Program Files... C:\\Windows\\Insta... {BED4CEEC-863F-4... 1 .PARAMETER computername The computer name to query. Just one. .PARAMETER re regular expression used to select software displayname .PARAMETER compress defaults to true. Merges values by valuename from many sources of installed data. The merge means if it finds a valuename more than once it shows only the first one found. This is true except for madeup-loginid. Instead a string is created with comma separated values where the values are the loginids of sids found in the product sections. Set to false the program will separate the values by registry keypath. data from products installed by the system takes precedence over software...uninstall .PARAMETER namesummary displays a list of valuenames found in registry in descending order of frequency no other data shown if this is set to $true .PARAMETER valuenameRE regular expression to specify which valuenames to display defaults to "displayversion|windowsinstaller|uninstallstring|localpackage|installsource|installdate|madeup-|gp_" specify .* to display all valuenames valuename not in registry but madeup in this program start with madeup- madeup-wow was set for uninstall key in the software wow6432node portion of the registry madeup-native was set for uninstall key in the software native portion of the key madeup-guid was set from the uninstall subkey containing the value names madeup-loginid was set from the registry product section valuename from group policy is prepended with "gp_" .PARAMETER showupdates show update entries as well defaults to false .PARAMETER makeobjects Create objects whose properties are the merged valuenames defined by the value name defaults. #> [CmdletBinding()] param ( [Parameter(Mandatory=$False)] [Alias('computer')] [string]$computername=$env:computername, [string]$re = ".*", [boolean]$compress=$true, [boolean]$namesummary=$false, [boolean]$makeobjects=$false, [boolean]$showupdates=$false, [string]$valuenameRE="displayversion|windowsinstaller|uninstallstring|installlocation|localpackage|installsource|installdate|madeup-|gp_", [string]$makeobjectsRE="displayversion|windowsinstaller|uninstallstring|installlocation|localpackage|installsource|installdate|madeup-|gp_" ) begin { try { $regbase=[Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine,$computername) } catch [Exception] { # see if remote registry is stopped Write-Host "Failed to open registry due to " $_.Exception.Message if ($_.Exception.HResult -eq 53) { # The network path was not found exit } Write-Host "Checking if registry service started on " $computername try { Get-Service remoteregistry -ComputerName $computername|gm $remoteregistry=(Get-Service remoteregistry -ComputerName $computername).status } catch [Exception] { Write-Host "cannot reach service manager on " $computername exit } "Remote Registry status is " + $remoteregistry if ($remoteregistry -ieq "stopped") { Set-Service remoteregistry -Status Running -Computername $computername sleep 5 try { $regbase=[Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine,$computername) } catch [Exception] { return $_.Exception.Message } } else { write-Host "could not open registry for " $computername exit } } $software=@{} # Keep hash of software displaynames -> hash of keypaths -> hash of valuename->values $valuenamesfound=@{} # keep count of valuenames found $pg2displayname=@{} # set in getproductdata and used in getgrouppolicydata $sid2logid=@{} # Set it $installedbywho=@{} # track who has installed a product Function load_sid2logid { # Set $sid2logid using registry profilelist $ProfileListKey=$regbase.OpenSubKey("SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList",$False) if ($ProfileListKey -eq $null) {return "Yuck"} foreach ($guid in $ProfileListKey.GetSubKeyNames()) { if ($guid -imatch "^s-") { switch($guid.ToUpper()) { "S-1-5-18" {$sid2logid.Add("S-1-5-18","System")} "S-1-5-19" {$sid2logid.Add("S-1-5-19","Service")} "S-1-5-20" {$sid2logid.Add("S-1-5-20","Network")} default { [string]$ProfileImagePath=$ProfileListKey.OpenSubKey($guid).GetValue("ProfileImagePath") $logid=$ProfileImagePath.Split("\\")[-1] $sid2logid.Add($guid.ToUpper(),$logid) } } } } } load_sid2logid Function WantedDisplayName { param([string]$wanteddisplayname) if ($wanteddisplayname -ieq $null -or $wanteddisplayname -ieq "") { return($false) } if (-not ($wanteddisplayname -imatch $re)) { return($false) } # displayname wanted if ($showupdates) { return($true) } else { if ($wanteddisplayname -imatch "update|hotfix") { return($false) } return($true) } } } process { Function upvaluenamesfound { param([string]$valuename) if ($valuenamesfound.ContainsKey($valuename)) { $valuenamesfound.$valuename++ } else { $valuenamesfound.Add($valuename,1) } } Function getuninstalldata { param([STRING] $subkeyname) $uninstallkey=$regbase.OpenSubKey($subkeyname,$False) if ($uninstallkey -ne $null) { foreach ($gname in $uninstallkey.GetSubKeyNames()) { $prodkey=$uninstallkey.OpenSubKey($gname) $displayname=$prodkey.GetValue("displayname") $uninstallstring=$prodkey.GetValue("uninstallstring") if (WantedDisplayName($displayname) -and $uninstallstring -ine "" -and $uninstallstring -ine $null ) { $KeyPath=$subkeyname+"\\"+$gname $valuehash= @{} #"KeyPath=" + $KeyPath #"displayname='" + $displayname + "'" $valuehash.Add("madeup-gname",$gname) upvaluenamesfound("madeup-gname") if ($subkeyname -imatch "wow6432node") { $valuehash.Add("madeup-wow",1) upvaluenamesfound("madeup-wow") } else { $valuehash.Add("madeup-native",1) upvaluenamesfound("madeup-native") } foreach ($valuename in $prodkey.GetValueNames()) { $value=$prodkey.GetValue($valuename) if ($value -ine "" -and $value -ine $null) { $valuehash.Add($valuename.tolower(),$prodkey.GetValue($valuename)) upvaluenamesfound($valuename) #"added " + $valuename + "=" + $valuehash.$valuename } } $guidformat="no" if ($gname.StartsWith("{") -and $gname.EndsWith("}") -and $gname.Length -eq 38 ) {$guidformat="yes"} $tolower=$displayname.ToLower() if ($software.ContainsKey($tolower)) { $software.$tolower.Add($KeyPath.ToLower(),$valuehash) } else { $subhash=@{} $subhash.Add($KeyPath.ToLower(),$valuehash) $software.Add($tolower,$subhash) } } } } } Function getproductdatabysid { param([string]$sid) $subkeyname="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Installer\\UserData\\"+$sid+"\\Products" $productkey=$regbase.OpenSubKey($subkeyname,$False) foreach ($gname in $productkey.GetSubKeyNames()) { $prodkey=$productkey.OpenSubKey($gname).OpenSubKey("InstallProperties") try { $displayname=$prodkey.GetValue("displayname") $uninstallstring=$prodkey.GetValue("uninstallstring") $pg2displayname.Add($gname.ToLower(),$displayname) # remember packed guid } catch { $uninstallstring="" $displayname="" } if (WantedDisplayName($displayname) -and $uninstallstring -ine "" -and $uninstallstring -ine $null ) { $KeyPath=$subkeyname+"\\"+$gname + "\\InstallProperties" #"KeyPath=" + $KeyPath #"displayname='" + $displayname + "'" $valuehash= @{} $valuehash.Add("madeup-loginid",$sid2logid.$sid) foreach ($valuename in $prodkey.GetValueNames()) { $value=$prodkey.GetValue($valuename) if ($value -ine "" -and $value -ine $null) { $valuehash.Add($valuename.tolower(),$prodkey.GetValue($valuename)) upvaluenamesfound($valuename) #"added " + $valuename + "=" + $valuehash.$valuename } } $tolower=$displayname.ToLower() if ($software.ContainsKey($tolower)) { $software.$tolower.Add($KeyPath.ToLower(),$valuehash) } else { $subhash=@{} $subhash.Add($KeyPath.ToLower(),$valuehash) $software.Add($tolower,$subhash) } } } } Function getproductdata { $subkeyname="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Installer\\UserData" $userdatakey=$regbase.OpenSubKey($subkeyname,$False) foreach ($sid in $userdatakey.GetSubKeyNames()) { getproductdatabysid($sid) } } Function getgrouppolicydata { $subkeyname="SOFTWARE/Microsoft/Windows/CurrentVersion/Group Policy/AppMgmt" $gpkey=$regbase.OpenSubKey($subkeyname,$False) if ($gpkey -eq $null) { return } foreach ($gname in $gpkey.GetSubKeyNames()) { $prodkey=$gpkey.OpenSubKey($gname) $displayname=$pg2displayname.($gname.ToLower()) if (WantedDisplayName($displayname)) { $keypath=$subkeyname+ "\\" + $gname $valuehash=@{} foreach ($valuename in $prodkey.GetValueNames()) { $value=$prodkey.GetValue($valuename) if ($value -ine "" -and $value -ine $null) { $valuehash.Add("gp_"+$valuename.tolower(),$prodkey.GetValue($valuename)) upvaluenamesfound($valuename) #"added " + $valuename + "=" + $valuehash.$valuename } } $tolower=$displayname.ToLower() if ($software.ContainsKey($tolower)) { $software.$tolower.Add($KeyPath.ToLower(),$valuehash) } else { $subhash=@{} $subhash.Add($KeyPath.ToLower(),$valuehash) $software.Add($tolower,$subhash) } } } } getuninstalldata("SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall") getuninstalldata("SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall") getproductdata getgrouppolicydata #HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Installer\\UserData\\S-1-5-18\\Products\\00002109610090400000000000F01FEC\\InstallProperties if ($namesummary) { $mykeys=$valuenamesfound.keys|sort-object -Property @{Expression={[int]$valuenamesfound.$_}; Ascending=$false} foreach ($valuename in ($mykeys)) { if ($valuename -ne "" -and $valuename -ne $null) {$valuename + "," + $valuenamesfound.$valuename} } } elseif ($makeobjects) { foreach ($displayname in ($software.Keys|Sort-Object)) { if ($displayname -imatch $re) { #" " #"displayname=" + $displayname $compressedhash=@{}; foreach ($keypath in ($software.$displayname.Keys|Sort-Object)) { foreach ($valuename in ($software.$displayname.$keypath.Keys|Sort-Object)) { if (-not $compressedhash.ContainsKey($valuename)) { $compressedhash.Add($valuename,$software.$displayname.$keypath.$valuename) } elseif ($valuename -ieq "madeup-loginid") { $compressedhash.$valuename += ("," + $software.$displayname.$keypath.$valuename) } } } $obj=New-Object object $obj|Add-Member -MemberType NoteProperty "displayname" $displayname foreach ($valuename in ($valuenamesfound.keys|Sort-Object)) { if ($valuename -imatch $makeobjectsRE) { if ($compressedhash.ContainsKey($valuename)) { $obj|Add-Member -MemberType NoteProperty $valuename $compressedhash.$valuename } else { $obj|Add-Member -MemberType NoteProperty $valuename "" } } } Write-Output $obj } } } elseif ($compress) { foreach ($displayname in ($software.Keys|Sort-Object)) { if ($displayname -imatch $re) { " " "displayname=" + $displayname $compressedhash=@{}; foreach ($keypath in ($software.$displayname.Keys|Sort-Object)) { foreach ($valuename in ($software.$displayname.$keypath.Keys|Sort-Object)) { if (-not $compressedhash.ContainsKey($valuename)) { $compressedhash.Add($valuename,$software.$displayname.$keypath.$valuename) } elseif ($valuename -ieq "madeup-loginid") { $compressedhash.$valuename += ("," + $software.$displayname.$keypath.$valuename) } } } foreach ($valuename in ($compressedhash.Keys|Sort-Object)) { if ($valuename -imatch $valuenameRE) { " " + $valuename + "=" + $compressedhash.$valuename } } } } } else { foreach ($displayname in ($software.Keys|Sort-Object)) { if ($displayname -imatch $re) { " " "displayname=" + $displayname foreach ($keypath in ($software.$displayname.Keys|Sort-Object)) { " keypath=" + $keypath foreach ($valuename in ($software.$displayname.$keypath.Keys|Sort-Object)) { if ($valuename -imatch $valuenameRE) { " " + $valuename + "=" + $software.$displayname.$keypath.$valuename } } } } } } } }
0
2308.ps1
[CmdletBinding()] param ( [string[]]$OrderNumber, [string]$SpSiteUrl = 'https://sharepointsite.domain.local', [ValidateScript({ if (Test-Connection -ComputerName $_ -Quiet -Count 2) { throw "The Sharepoint server '$SpServer' appears offline" } else { $true } })] [string]$SpServer = 'spserver.domain.local', [ValidateScript({ if (Test-Path -Path ($_ | Split-Path -Parent) -PathType Container) { throw "The log file folder '$($_ | Split-Path -Parent)' does not exist" } else { $true } })] [string]$LogFilePath = 'C:\OrderAutomation\ActivityLog.log', [ValidateScript({ if (!(Test-Path -Path $_ -PathType Container)) { throw "The PDF order folder path '$($_)' does not exist" } else { $true } })] [string]$PdfOrderFolderPath = '\\sharepoint.domain.local@SSL\DavWWWRoot\documents\DellDoc', [ValidateScript({ if (!(Test-Path -Path $_ -PathType Leaf)) { throw "The orders file '$($_)' does not exist" } else { $true } })] [string]$DellOrdersFilePath = "\\$SpServer\psfiles\orders.csv", [ValidateScript({ if (!(Test-Path -Path $_ -PathType Container)) { throw "The Dell orders archive folder '$($_)' does not exist" } else { $true } })] [string]$DellOrdersArchiveFolderPath = "\\$SpServer\psfiles\DellOrdersArchive", [string]$PdfOrderArchiveFolderPath = "\\sharepoint.domain.local@SSL\DavWWWRoot\documents\DellDoc\$((Get-Date).Year)\orderbevestigingen", [ValidateScript({ if (!(Test-Path -Path $_ -PathType Container)) { throw "The PDF invoice folder path '$($_)' does not exist" } else { $true } })] [string]$PdfInvoiceFolderPath = '\\sharepoint.domain.local@SSL\DavWWWRoot\documents\DellDoc', [string]$PdfInvoiceArchiveFolderPath = "\\sharepoint.domain.local@SSL\DavWWWRoot\documents\DellDoc\$((Get-Date).Year)\facturen", [ValidateScript({ if (!(Test-Path -Path $_ -PathType Leaf)) { throw "The Sharepoint remoting credential file '$($_)' does not exist" } else { $true } })] [string]$SpServerRemoteCredFilePath = 'C:\OrderAutomation\sa_automationcred.xml', [ValidateScript({ if (!(Test-Path -Path $_ -PathType Leaf)) { throw "The Dell website credential file '$($_)' does not exist" } else { $true } })] [string]$SDellSiteCredFilePath = 'C:\OrderAutomation\dellwebsite_cred.xml', [ValidateScript({ if (!(Test-Path -Path $_ -PathType Leaf)) { throw "The Sharepoint module file '$($_)' does not exist" } else { $true } })] [string]$PdfDocUrlRootUrl = "$SpSiteUrl/documents/DellDOC", [string]$SpModuleFilePath = "C:\OrderAutomation\Sharepoint.psm1", [ValidateSet('PDFOrder', 'PDFInvoice', 'DellOrder', 'All')] [string[]]$SyncActivities = 'All' ) begin { $ErrorActionPreference = 'Stop' function Write-Log { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string]$Message, [ValidateSet(1, 2, 3)] [int]$LogLevel = 1 ) try { [pscustomobject]@{ 'Time' = Get-Date 'Message' = $Message 'Severity' = $LogLevel } | Export-Csv -Path $LogFilePath -Append -NoTypeInformation } catch { Write-Error $_.Exception.Message $false } } function Check-Process { [CmdletBinding()] param ( [Parameter()] [System.Diagnostics.Process]$Process ) process { try { if (@(0, 3010) -notcontains $Process.ExitCode) { Write-Log -Message "Process ID $($Process.Id) failed. Return value was $($Process.ExitCode)" -LogLevel '2' $false } else { Write-Log -Message "Process ID $($Process.Id) exited with successfull exit code '$($Process.ExitCode)'." $true } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' $false } } } function Test-PsRemoting { param ( [Parameter(Mandatory = $true)] $Computername ) try { $errorActionPreference = "Stop" $result = Invoke-Command -ComputerName $computername { 1 } } catch { return $false } if ($result -ne 1) { Write-Verbose "Remoting to $computerName returned an unexpected result." return $false } $true } function Get-DellOrder { [CmdletBinding()] param () begin { $ExcludedOrders = '104682878','104679730','104669658','104669580','104664833','104720177' } process { try { $AllOrders = Import-Csv -Path $DellOrdersFilePath | where {$ExcludedOrders -notcontains $_.Bestelnummer} Write-Log "Found $($AllOrders.Count) total Dell orders" $Orders = $AllOrders | where {$ExcludedOrders -notcontains $_.Bestelnummer} Write-Log "Validating the order file $DellOrdersFilePath..." $ValidFields = 'Datum van bestelling','Status','Geschatte leveringsdatum','Bestelnummer','Nummer van inkooporder' if (Compare-Object -DifferenceObject ($Orders[0].Psobject.Properties.Name) -ReferenceObject $ValidFields) { throw "Invalid fields found in orders file $DellOrdersFilePath" } $ValidOrders = @() foreach ($Order in $Orders) { if ($Order.'Nummer van inkooporder' -notmatch '^\d+$') { Write-Log "The order number '$($Order.Bestelnummer)' is invalid. Removed from order list to sync" -LogLevel 2 } else { $ValidOrders += $Order } } $ValidOrders } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' $false } } } function Archive-DellOrder { [CmdletBinding()] param () process { try { $FileNames = Get-ChildItem -Path $DellOrdersArchiveFolderPath | Select-Object -ExpandProperty Basename if ($FileNames) { [int]$LastInc = $FileNames | foreach {[int]$_.Split('_')[1]} | Sort-Object -Descending | Select-Object -First 1 $NextInc = $LastInc + 1 $FileName = "$((Get-Item $DellOrdersFilePath).BaseName)_$NextInc.csv" if (Test-Path "$DellOrdersArchiveFolderPath\$FileName") { throw "Unrecognized order archive file '$FileName' in $DellOrdersArchiveFolderPath. Unable to archive order file." } else { Move-Item -Path $DellOrdersFilePath -Destination "$DellOrdersArchiveFolderPath\$FileName" Write-Log "Succesfully moved $DellOrdersFilePath to create archive file $FileName" } } else { $FileName = "$((Get-Item $DellOrdersFilePath).BaseName)_1.csv" Move-Item -Path $DellOrdersFilePath -Destination "$DellOrdersArchiveFolderPath\$FileName" Write-Log "Succesfully moved $DellOrdersFilePath to create archive file $FileName" } $true } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' $false } } } function Get-PdfOrder { [CmdletBinding()] param ( [string[]]$OrderNumber ) process { try { if ($OrderNumber) { foreach ($Order in $OrderNumber) { $Filter = "Order_NL_REL_ENTP_$($Order)_\d{4}-\d{2}-\d{2}.pdf" $PdfOrders += Get-ChildItem -Path $PdfOrderFolderPath | where { $_.Name -match $Filter } } } else { $Filter = 'Order_NL_REL_ENTP_\d+_\d{4}-\d{2}-\d{2}.pdf' $PdfOrders = Get-ChildItem -Path $PdfOrderFolderPath | where { $_.Name -match $Filter } } if (!$PdfOrders) { Write-Log 'No PDF orders found' } else { foreach ($PdfOrder in $PdfOrders) { try { $TextFileOrder = Convert-PdfToText -PdfFilePath $PdfOrder.FullName -Force if (!$TextFileOrder) { throw "Unable to convert order PDF file $($PdfOrder.FullName) to a text file" } else { Write-Log -Message "Successfully converted PDF file $($PdfOrder.FullName) to text" Write-Log -Message "Parsing text file for required fields with regex" $Order = @{ } $Order.FilePath = $PdfOrder.FullName $TextOrder = Get-Content -Path $TextFileOrder.FullName -Raw Remove-Item -Path $TextFileOrder.FullName -Force $Order.PONumber = [regex]::Match($TextOrder, 'Uw referentie (\d+)').Groups[1].Value if (!$Order.PONumber) { throw 'Unable to parse PO number from PDF order' } $Order.Offertenummer = [regex]::Match($TextOrder, 'Offertenummer (.*)\s').Groups[1].Value if (!$Order.Offertenummer) { Write-Log -Message 'Unable to parse Offertenummer from PDF order' -LogLevel '2' } $Order.OrderNumber = [regex]::Match($TextOrder, 'Ordernummer: (\d+)').Groups[1].Value if (!$Order.OrderNumber) { throw 'Unable to parse order number from PDF order' } $Order.OrderDate = [regex]::Match($TextOrder, 'Orderdatum: (\d{1,2}-\d{1,2}-\d{4})').Groups[1].Value if (!$Order.OrderDate) { throw 'Unable to parse order date from PDF order' } $Order.ShippingCost = [regex]::Match($TextOrder, 'Transportkosten (.+)\s\s').Groups[1].Value $Order.SubTotal = [regex]::Match($TextOrder, 'Subtotaal (.*)\s\s').Groups[1].Value if (!$Order.ShippingCost -or !$Order.Subtotal) { throw 'Unable to parse delivery cost from PDF order' } $Order.TotalCost = [System.Convert]::ToDecimal($Order.Subtotal, $culture.NumberFormat) + [System.Convert]::ToDecimal($Order.ShippingCost, $culture.NumberFormat) Write-Log -Message "Successfully parsed all fields from text file $($TextFileOrder.Fullname)" [pscustomobject]$Order } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' } } } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' $false } } } function Archive-Pdf { [CmdletBinding()] [OutputType('[bool]')] param ( [Parameter(Mandatory)] [ValidateScript({ if (!(Test-Path -Path $_ -PathType Leaf)) { throw "The PDF file path '$($_)' does not exist" } else { $true } })] [string]$FilePath, [Parameter(Mandatory)] [string]$DestinationPath, [switch]$Force ) process { try { if (!(Test-Path -Path $DestinationPath -PathType Container)) { if ($Force) { New-Item -Path $DestinationPath -Type Container | Out-Null } else { throw "The archive folder path $DestinationPath does not exist and -Force was not used to create a new one" } } Move-Item -Path $FilePath -Destination $DestinationPath $true } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' $false } } } function Convert-PdfToText { [CmdletBinding()] [OutputType('System.IO.FileSystemInfo')] param ( [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidatePattern('.*\.pdf$')] [Alias('FullName')] [string]$PdfFilePath, [ValidatePattern('.*\.exe$')] [ValidateScript({ if (!(Test-Path -Path $_ -PathType Leaf)) { throw "The PDF converter EXE '$($_)' cannot be found" } else { $true } })] [string]$PdfConverterFilePath = 'C:\OrderAutomation\bin\pdftotext.exe', [switch]$Force ) process { try { $TxtOutputFilePath = "$($PdfFilePath | Split-Path -Parent)\$(($PdfFilePath | Split-Path -Leaf) -replace '\.pdf$','.txt')" if (!$Force -and (Test-Path -Path $TxtOutputFilePath)) { throw "The text file $TxtOutputFilePath already exists and the -Force param was not used. Will not overwrite existing file" } $Result = Start-Process -FilePath $PdfConverterFilePath -ArgumentList "-raw `"$PdfFilePath`"" -NoNewWindow -Wait -PassThru if (Check-Process -Process $Result) { Get-Item $TxtOutputFilePath } else { $false } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' $false } } } function Send-Alert { [CmdletBinding()] [OutputType('[bool]')] param ( [string]$ToEmailAddress = 'helpdesk@domain.local', [string]$FromEmailAddress = 'automation@domain.local', [string]$FromDisplayName = 'Order Handling Automation', [Parameter(Mandatory)] [string]$EmailSubject, [Parameter(Mandatory)] [string]$EmailBody, [string]$SmtpServer = 'antispam.domain.local' ) process { try { $Params = @{ 'From' = "$FromDisplayName <$FromEmailAddress>" 'To' = $ToEmailAddress 'Subject' = $EmailSubject 'SmtpServer' = $SmtpServer 'Body' = $EmailBody } Send-MailMessage @Params $true } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' $false } } } function Get-PdfInvoice { [CmdletBinding(DefaultParameterSetName = 'InvoiceNumber')] param ( [Parameter(ParameterSetName = 'InvoiceNumber')] [string[]]$InvoiceNumber, [Parameter(ParameterSetName = 'OrderNumber')] [string[]]$OrderNumber ) process { try { if ($InvoiceNumber) { foreach ($Invoice in $InvoiceNumber) { $Filter = "Invoice_NL_REL_ENTP_$($Invoice)_\d{4}-\d{2}-\d{2}.pdf" $PdfInvoices += Get-ChildItem -Path $PdfInvoiceFolderPath | where { $_.Name -match $Filter } } } else { $Filter = 'Invoice_NL_REL_ENTP_\d+_\d{4}-\d{2}-\d{2}.pdf' $PdfInvoices = Get-ChildItem -Path $PdfInvoiceFolderPath | where { $_.Name -match $Filter } } if ($PdfInvoices) { Write-Log -Message "$($PdfInvoices.Count) PDF invoices found" foreach ($PdfInvoice in $PdfInvoices) { try { Write-Log -Message "Converting $($PdfInvoice.FullName) to text" $TextFileInvoice = $PdfInvoice | Convert-PdfToText -Force if (!$TextFileInvoice) { throw "Unable to convert invoice PDF file $($PdfInvoice.FullName) to a text file" } else { Write-Log -Message "Succesfully converted invoice PDF to text" $Invoice = @{ } $Invoice.FilePath = $PdfInvoice.FullName $TextInvoice = Get-Content -Path $TextFileInvoice.FullName -Raw Remove-Item -Path $TextFileInvoice.FullName -Force $Invoice.InvoiceNumber = [regex]::Match($TextInvoice, 'Factuurnummer: (\d+) ').Groups[1].Value if (!$Invoice.InvoiceNumber) { throw 'Unable to parse invoice number from PDF invoice' } $Invoice.OrderNumber = [regex]::Match($TextInvoice, 'Ordernummer: (\d+)').Groups[1].Value if (!$Invoice.OrderNumber) { throw 'Unable to parse order number from PDF invoice' } elseif ($OrderNumber) { if ($OrderNumber -contains $Invoice.OrderNumber) { [pscustomobject]$Invoice } } else { [pscustomobject]$Invoice } } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' $false } } } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' $false } } } function Get-RemoteSpPurchaseOrder ($PoNumber) { Invoke-Command -Session $ServerSession -ScriptBlock { Get-SpPurchaseOrder -PoNumber $using:PoNumber | Tee-Object -Variable PurchaseOrder } } function New-RemoteSpOrder($PurchaseOrder,$OrderNumber,$TotalCost,$OrderDate) { Invoke-Command -Session $ServerSession -ScriptBlock { New-SpOrder -PurchaseOrder $PurchaseOrder -OrderNumber $using:OrderNumber -TotalCost $using:TotalCost -OrderDate $using:OrderDate -PassThru | Tee-Object -Variable Order } } function Set-RemoteSpOrder($InvoiceNumber, $PoNumber, $EstimatedDeliveryDate, $DeliveryStatus, $PdfAttachmentFileUrl) { $Params = @{ 'PassThru' = $true } if ($InvoiceNumber) { $Params.InvoiceNumber = $InvoiceNumber } if ($PoNumber) { $Params.PoNumber = $PoNumber } if ($EstimatedDeliveryDate) { $Params.EstimatedDeliveryDate = $EstimatedDeliveryDate } if ($DeliveryStatus) { $Params.DeliveryStatus = $DeliveryStatus } if ($PdfAttachmentFileUrl) { $Params.PdfAttachmentFileUrl = $PdfAttachmentFileUrl } Invoke-Command -Session $ServerSession -ScriptBlock { $Params = $using:Params Set-SpOrder -Order $Order @Params | Tee-Object -Variable Order } } function Get-RemoteSpOrder($OrderNumber) { Invoke-Command -Session $ServerSession -ScriptBlock { Get-SpOrder -OrderNumber $using:OrderNumber | Tee-Object -Variable Order } } function Convert-LocalPathToUnc ($FilePath,$Computername) { $NewPath = $FilePath -replace (":", "$") if ($NewPath.EndsWith("\")) { $NewPath = [Text.RegularExpressions.Regex]::Replace($NewPath, "\\$", "") } "\\$Computername\$NewPath" } try { if (!(Test-PsRemoting -Computername $SpServer)) { throw "PS remoting on the Sharepoint server '$SpServer' is not enabled" } else { Write-Log "Setting up PS remoting session on $SpServer with $($Cred.username) credentials" $Cred = Import-Clixml -Path $SpServerRemoteCredFilePath $Credential = New-Object System.Management.Automation.PSCredential($Cred.username, $Cred.password) $ServerSession = New-PSSession -ComputerName $SpServer -Authentication CredSSP -Credential $Credential -ConfigurationName PS2 } Write-Log "Copying Sharepoint module $SpModuleFilepath to Sharepoint server..." Copy-Item -Path $SpModuleFilePath -Destination "\\$SpServer\c$" -Force Write-Log 'Setting up global Sharepoint objects in remote session' Invoke-command -Session $ServerSession -ScriptBlock { Add-PSSnapin Microsoft.SharePoint.Powershell $global:SpSiteUrl = $using:SpSiteUrl $global:Site = new-object Microsoft.SharePoint.SPSite($SpSiteUrl) $global:SpDocSite = Get-SPWeb "$SpSiteUrl/documents" $global:SpPunchSite = Get-SPWeb "$SpSiteUrl/punch" $global:AllOrders = $SpPunchSite.Lists["Inkoop Items"].GetItems() Import-Module 'C:\Sharepoint.psm1' } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' exit } } process { try { if (($SyncActivities -contains 'PDFOrder') -or ($SyncActivities -eq 'All')) { Write-Log "Retrieving any new PDF Dell orders in $PdfOrderFolderPath..." if ($OrderNumber) { $PdfOrders = Get-PdfOrder -OrderNumber $OrderNumber } else { $PdfOrders = Get-PdfOrder } if (!$PdfOrders) { if ($OrderNumber) { Write-Log -Message "No PDF orders found matching order number(s) $($OrderNumber -join ',')" } } else { Write-Log "$($PdfOrders.Count) PDF orders found to sync" foreach ($PdfOrder in $PdfOrders) { try { Write-Log "Getting Sharepoint purchase order for PO number $($PdfOrder.PoNumber)..." $SpPurchaseOrder = Get-RemoteSpPurchaseOrder -PoNumber $PdfOrder.PoNumber if (!$SpPurchaseOrder) { Send-Alert -EmailSubject 'Failed Sharepoint purchase order match' -EmailBody "Failed to find a matching Sharepoint purchase order for PDF order number $($PdfOrder.PoNumber)" Write-Log "Failed to retrieve a Sharepoint purchase order. Emailing notification" -LogLevel '3' } else { Write-Log "Successfully retrieved Sharepoint purchase order. Attempting to add a new order to it..." if (!(New-RemoteSpOrder -OrderNumber $PdfOrder.OrderNumber -TotalCost $PdfOrder.TotalCost -OrderDate $PdfOrder.OrderDate)) { throw "Failed to attach new order number $($PdfOrder.OrderNumber) to existing PO number $($PdfOrder.PoNumber)" } else { Write-Log -Message "Successfully attached new order number $($PdfOrder.OrderNumber) to existing PO number $($SpPurchaseOrder.xml.row.ows_Inkooporder)" $PdfUrl = "$PdfDocUrlRootUrl/$($PdfOrder.FilePath | Split-Path -Leaf)" if (!($SpOrder | Set-RemoteSpOrder -PdfAttachmentFileUrl $PdfUrl)) { throw "Failed to attach order PDF URL $PdfUrl to order number $($PdfOrder.OrderNumber)" } else { Write-Log -Message "Successfully attached order PDF URL $PdfUrl to order number $($PdfOrder.OrderNumber)" if (!(Archive-Pdf -FilePath $PdfOrder.FilePath -DestinationPath $PdfOrderArchiveFolderPath)) { throw "Failed to archive PDF file $($PdfOrder.FilePath) to archive folder" } else { Write-Log -Message "Successfully archived PDF file $($PdfOrder.FilePath) to archive folder" } } } } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' } } } } if (($SyncActivities -contains 'DellOrder') -or ($SyncActivities -eq 'All')) { Write-Log "Getting Dell orders from file..." $AllDellOrders = Get-DellOrder if ($AllDellOrders -eq $false) { Send-Alert -EmailSubject 'Problem with syncing Dell orders' -EmailBody "Either the orders.csv file was not found or there was a problem with the format of the file." Write-Log -Message 'Dell order retrieval failed. Emailed notification' -LogLevel 3 } else { Write-Log "Found $($AllDellOrders.Count) total Dell order(s)" $DellOrders = $AllDellOrders | where {$_.Status -ne 'Verwerking van bestelling'} if ($DellOrders) { Write-Log "Found $($AllDellOrders.Count - $DellOrders.Count) orders in a status of 'Verwerking van bestelling'. Excluding from sync process" } else { Write-Log "No orders found in a status of 'Verwerking van bestelling'." } foreach ($DellOrder in $DellOrders) { try { $SpOrder = Get-RemoteSpOrder -OrderNumber $DellOrder.Bestelnummer if (!$SpOrder) { Send-Alert -EmailSubject 'Failed Sharepoint order match' -EmailBody "Failed to find a matching Sharepoint order for Dell order $($DellOrder.Bestelnummer)" Write-Log "Could not update Dell order inforration. Failed to find Sharepoint order $($DellOrder.Bestelnummer). Emailed notification" -LogLevel 2 } else { if (!(Set-RemoteSpOrder -PoNumber $DellOrder.'Nummer van inkooporder' -EstimatedDeliveryDate $DellOrder.'Geschatte leveringsdatum' -DeliveryStatus $DellOrder.Status)) { throw "Failed to update order number $($DellOrder.Bestelnummer) with new Dell information" } else { } } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' } } Write-Log "Archiving the Dell order file $DellOrdersFilePath to $DellOrdersArchiveFolderPath" Archive-DellOrder } } if (($SyncActivities -contains 'PDFInvoice') -or ($SyncActivities -eq 'All')) { Write-Log "Retrieving any new PDF Dell invoices in $PdfInvoiceFolderPath..." if ($OrderNumber) { $PdfInvoices = Get-PdfInvoice -OrderNumber $OrderNumber } else { $PdfInvoices = Get-PdfInvoice } if (!$PdfInvoices) { if ($OrderNumber) { Write-Log -Message "No PDF invoices found matching order number(s) $($OrderNumber -join ',')" } else { Write-Log -Message "No PDF invoices found" } } else { Write-Log "$($PdfInvoices.Count) invoices found to sync" foreach ($PdfInvoice in $PdfInvoices) { try { Write-Log "Getting Sharepoint order for order number $($PdfInvoice.OrderNumber)..." $SpOrder = Get-RemoteSpOrder -OrderNumber $PdfInvoice.OrderNumber if (!$SpOrder) { Send-Alert -EmailSubject 'Failed Sharepoint order match' -EmailBody "Failed to find a matching Sharepoint order for PDF invoice number $($PdfInvoice.InvoiceNumber)" Write-Log "Failed to find Sharepoint order. Emailed notification" -LogLevel 2 } else { if (!(Set-RemoteSpOrder -InvoiceNumber $PdfInvoice.InvoiceNumber)) { throw "Failed to update order number $($PdfInvoice.OrderNumber) with invoice number $($PdfInvoice.InvoiceNumber)" } else { Write-Log -Message "Successfully updated order number $($PdfInvoice.OrderNumber) with invoice number $($PdfInvoice.InvoiceNumber)" } $PdfUrl = "$PdfDocUrlRootUrl/$($PdfInvoice.FilePath | Split-Path -Leaf)" if (!($SpOrder | Set-RemoteSpOrder -PdfAttachmentFileUrl $PdfUrl)) { throw "Failed to attach invoice PDF URL $PdfUrl to order number $($PdfInvoice.OrderNumber)" } else { Write-Log -Message "Successfully attached invoice PDF URL $PdfUrl to order number $($PdfInvoice.OrderNumber)" if (!(Archive-Pdf -FilePath $PdfInvoice.FilePath -DestinationPath $PdfInvoiceArchiveFolderPath)) { throw "Failed to archive PDF file $($PdfInvoice.FilePath) to archive folder" } else { Write-Log -Message "Successfully archived PDF file $($PdfInvoice.FilePath) to archive folder" } } } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' } } } } } catch { Write-Log -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" -LogLevel '3' Remove-PSSession -Session $ServerSession exit 1 } } end { Remove-PSSession -Session $ServerSession }
0
Export-PSCredential_5.ps1
# Author: Hal Rottenberg <hal@halr9000.com> # Url: http://halr9000.com/article/tag/lib-authentication.ps1 # Purpose: These functions allow one to easily save network credentials to disk in a relatively # secure manner. The resulting on-disk credential file can only [1] be decrypted # by the same user account which performed the encryption. For more details, see # the help files for ConvertFrom-SecureString and ConvertTo-SecureString as well as # MSDN pages about Windows Data Protection API. # [1]: So far as I know today. Next week I'm sure a script kiddie will break it. # # Usage: Export-PSCredential [-Credential <PSCredential object>] [-Path <file to export>] # # If Credential is not specififed, user is prompted by Get-Credential cmdlet. # If not specififed, Path is "./credentials.enc.xml". # Output: FileInfo object referring to saved credentials # # Import-PSCredential [-Path <file to import>] # # If not specififed, Path is "./credentials.enc.xml". # Output: PSCredential object function Export-PSCredential { param ( $Credential = (Get-Credential), $Path = "credentials.enc.xml" ) # Look at the object type of the $Credential parameter to determine how to handle it switch ( $Credential.GetType().Name ) { # It is a credential, so continue PSCredential { continue } # It is a string, so use that as the username and prompt for the password String { $Credential = Get-Credential -credential $Credential } # In all other caess, throw an error and exit default { Throw "You must specify a credential object to export to disk." } } # Create temporary object to be serialized to disk $export = New-Object PSObject Add-Member -InputObject $export -Name Username -Value $Credential.Username ` -MemberType NoteProperty # Encrypt SecureString password using Data Protection API $EncryptedPassword = $Credential.Password | ConvertFrom-SecureString Add-Member -InputObject $export -Name EncryptedPassword -Value $EncryptedPassword ` -MemberType NoteProperty # Give object a type name which can be identified later $export.PSObject.TypeNames.Insert(0,ĺExportedPSCredentialĺ) # Export using the Export-Clixml cmdlet $export | Export-Clixml $Path Write-Host -foregroundcolor Green "Credentials saved to: " -noNewLine # Return FileInfo object referring to saved credentials Get-Item $Path } function Import-PSCredential { param ( [string]$Path = "credentials.enc.xml",[string]$cred) #modified 8/4/08 JDH #to create a global credential with a specified name # Import credential file $import = Import-Clixml $Path # Test for valid import if ( !$import.UserName -or !$import.EncryptedPassword ) { Throw "Input is not a valid ExportedPSCredential object, exiting." } $Username = $import.Username # Decrypt the password and store as a SecureString object for safekeeping $SecurePass = $import.EncryptedPassword | ConvertTo-SecureString # Build the new credential object $Credential = New-Object System.Management.Automation.PSCredential $Username, $SecurePass if ($cred) { New-Variable -Name $cred -scope Global -value $Credential } else { Write-Output $Credential } }
0
1281.ps1
function Test-CGroupMember { [CmdletBinding()] Param( [Parameter(Mandatory=$true)] [string] $GroupName, [Parameter(Mandatory=$true)] [string] $Member ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( -not (Test-CGroup -Name $GroupName) ) { Write-Error -Message ('Group ''{0}'' not found.' -f $GroupName) return } $group = Get-CGroup -Name $GroupName if( -not $group ) { return } $principal = Resolve-CIdentity -Name $Member if( -not $principal ) { return } try { return $principal.IsMemberOfLocalGroup($group.Name) } catch { Write-Error -Message ('Checking if "{0}" is a member of local group "{1}" failed: {2}' -f $principal.FullName,$group.Name,$_) } }
0
3431.ps1
[CmdletBinding()] Param( [Parameter(Mandatory=$True, Position=0)] [String]$Version, [Parameter(Mandatory=$False, Position=1)] [String]$Folder ) function SetCommandsCommonVersion([string]$FilePath, [string]$Version) { $powershellCs = Join-Path $FilePath "Common\Commands.Common\AzurePowerShell.cs" Write-Output "Updating File: $powershellCs" $content = Get-Content $powershellCs $content = $content -replace "public const string AssemblyVersion = `"([\d\.]+)`";", "public const string AssemblyVersion = `"$Version`";" $content = $content -replace "public const string AssemblyFileVersion = `"([\d\.]+)`";", "public const string AssemblyFileVersion = `"$Version`";" Set-Content -Path $powershellCs -Value $content -Encoding UTF8 } function SetArmCommonVersion([string]$FilePath, [string]$Version) { $assemblyConfig = Join-Path $FilePath "ResourceManager\Common\Commands.ResourceManager.Common\Properties\AssemblyInfo.cs" Write-Output "Updating File: $assemblyConfig" $content = Get-Content $assemblyConfig $content = $content -replace "\[assembly: AssemblyVersion\([\w\`"\.]+\)\]", "[assembly: AssemblyVersion(`"$Version`")]" $content = $content -replace "\[assembly: AssemblyFileVersion\([\w\`"\.]+\)\]", "[assembly: AssemblyFileVersion(`"$Version`")]" Set-Content -Path $assemblyConfig -Value $content -Encoding UTF8 } function SetCommonAssemlbyVersions([string]$FilePath, [string]$Version) { $commonAssemblies = Join-Path $FilePath "Common" $assemblyInfos = Get-ChildItem -Path $commonAssemblies -Filter AssemblyInfo.cs -Recurse ForEach ($assemblyInfo in $assemblyInfos) { $content = Get-Content $assemblyInfo.FullName $content = $content -replace "\[assembly: AssemblyVersion\([\w\`"\.]+\)\]", "[assembly: AssemblyVersion(`"$Version`")]" $content = $content -replace "\[assembly: AssemblyFileVersion\([\w\`"\.]+\)\]", "[assembly: AssemblyFileVersion(`"$Version`")]" Write-Output "Updating assembly version in " $assemblyInfo.FullName Set-Content -Path $assemblyInfo.FullName -Value $content -Encoding UTF8 } } if (!$Folder) { $Folder = "$PSScriptRoot\..\src" } SetCommandsCommonVersion $Folder $Version
0
LocalAdminGUI.ps1
Add-Type -AssemblyName PresentationCore Add-Type -AssemblyName PresentationFramework [xml]$XAML = @' <Window xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" Width="316" MinWidth="316" MaxWidth="316" Title="Local Admins Tool" SizeToContent="WidthAndHeight" FontSize="14" FontFamily="Consolas" Name="Window"> <Grid> <Grid.ColumnDefinitions> <ColumnDefinition Width="Auto"/> <ColumnDefinition MinWidth="100"/> </Grid.ColumnDefinitions> <Grid.RowDefinitions> <RowDefinition Height="30"/> <RowDefinition Height="30"/> <RowDefinition Height="30"/> <RowDefinition Height="Auto"/> </Grid.RowDefinitions> <Label Content="Computer: " Grid.Column="0" /> <TextBox Grid.Column="1" Name="TextBoxComputer"/> <Label Content="Domain: " Grid.Column="0" Grid.Row="1"/> <ComboBox Grid.Column="1" Grid.Row="1" Name="ComboDomain"> <ComboBox.Items> <ComboBoxItem Content="FOO"/> <ComboBoxItem Content="BAR"/> <ComboBoxItem Content="ALP"/> <ComboBoxItem Content="BET"/> <ComboBoxItem Content="GAM"/> <ComboBoxItem Content="DEL"/> </ComboBox.Items> </ComboBox> <StackPanel Grid.ColumnSpan="2" Grid.Row="2" Orientation="Horizontal"> <Button Name="ButtonList" Content="Check" Width="100"/> <Button Name="ButtonAdd" Content="Add" Width="100"/> <Button Name="ButtonCancel" Content="Cancel" Width="100"/> </StackPanel> <ListBox Grid.ColumnSpan="3" Grid.Row="3" Name="AdminsList"/> </Grid> </Window> '@ $Reader = New-Object System.Xml.XmlNodeReader $XAML $Dialog = [Windows.Markup.XamlReader]::Load($Reader) foreach ($Name in ($XAML | Select-Xml '//*/@Name' | foreach { $_.Node.Value})) { New-Variable -Name $Name -Value $Dialog.FindName($Name) -Force } $AddScriptBlock = { if ($_.Key) { if ($_.Key -ne 'Enter') { return } } $ComputerName = $TextBoxComputer.Text.Trim() $AdminsList.Items.Clear() $AdminsList.Items.Add( (New-Object System.Windows.Controls.ListBoxItem -Property @{ Content = "Adding admin account to: $ComputerName" FontWeight = 'Bold' }) ) if ($ComputerName -notmatch '^[a-z]{3}\\d{6}$') { $AdminsList.Items.Add( (New-Object System.Windows.Controls.ListBoxItem -Property @{ Content = "Wrong computer name: $ComputerName" Foreground = 'Red' } )) return } $DomainName = $ComboDomain.SelectedItem.Content if (!$PredictDomain) { $AdminsList.Items.Add( (New-Object System.Windows.Controls.ListBoxItem -Property @{ Content = "Error: can't find workstation $ComputerName in AD!" Foreground = 'Red' } )) return } if (!$DomainName) { $DomainName = $PredictDomain } try { Invoke-Command -ComputerName Endpoints -ConfigurationName $PredictDomain -ScriptBlock { param ($Computer, $Domain) Add-LocalAdmin -ComputerName $Computer -Domain $Domain } -ArgumentList $ComputerName, $DomainName -ErrorAction Stop $AdminsList.Items.Add( (New-Object System.Windows.Controls.ListBoxItem -Property @{ Content = 'Done!' Foreground = 'Green' }) ) } catch { $AdminsList.Items.Add( (New-Object System.Windows.Controls.ListBoxItem -Property @{ Content = "Error: $_" Foreground = 'Red' } )) } } $TextChangedScriptBlock = { switch -Regex ($this.Text.Trim()) { '^[a-z]{3}\\d{6}$' { $this.Background = 'LawnGreen' # And now we can check domain and try to change ComboBox value... $Searcher = New-Object ADSISearcher -ArgumentList @( [ADSI]'GC://DC=domain,DC=local', "(&(objectClass=computer)(Name=$_))" ) $Global:PredictDomain = $Searcher.FindOne().Path -replace 'GC.*?,DC=([^,]*),.*', '$1' $ComboDomain.Items | ForEach-Object { if ($_.Content -eq $PredictDomain) { $ComboDomain.SelectedItem = $_ } } if (!$Global:PredictDomain) { $ComboDomain.SelectedItem = $null } } ^$ { $this.Background = 'White' $Global:PredictDomain = $null } default { $this.Background = 'LightCoral' $Global:PredictDomain = $null } } } $ListScriptBlock = { if ($_.Key) { if ($_.Key -ne 'Enter') { return } } $AdminsList.Items.Clear() $ComputerName = $TextBoxComputer.Text if ($ComputerName -notmatch '^[a-z]{3}\\d{6}$') { $AdminsList.Items.Add( (New-Object System.Windows.Controls.ListBoxItem -Property @{ Content = "Wrong computer name!" Foreground = 'Red' } )) return } if (!$PredictDomain) { $AdminsList.Items.Add( (New-Object System.Windows.Controls.ListBoxItem -Property @{ Content = "Error: can't find workstation $ComputerName in AD!" Foreground = 'Red' } )) return } try { $AdminsList.Items.Clear() $AdminsList.Items.Add("Administrators on computer $ComputerName :") Invoke-Command -ComputerName Endpoints -ConfigurationName $PredictDomain -ScriptBlock { param ($Computer) Get-LocalAdmin -ComputerName $Computer } -ArgumentList $ComputerName -ErrorAction Stop | ForEach-Object { $AdminsList.Items.Add($_) } $AdminsList.Items.Add( (New-Object System.Windows.Controls.ListBoxItem -Property @{ Content = "Done!" ForeGround = 'Green' } )) } catch { $AdminsList.Items.Add( (New-Object System.Windows.Controls.ListBoxItem -Property @{ Content = "Error: $_" Foreground = 'Red' } )) } } $TextBoxComputer.Add_KeyDown($ListScriptBlock) $ButtonAdd.Add_Click($AddScriptBlock) $ButtonList.Add_Click($ListScriptBlock) $TextBoxComputer.Add_TextChanged($TextChangedScriptBlock) $ButtonCancel.Add_Click({$window.Close()}) $Dialog.Add_Loaded( { $this.TopMost = $true }) $Dialog.ShowDialog() | Out-Null # SIG # Begin signature block # MIIj1wYJKoZIhvcNAQcCoIIjyDCCI8QCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUVgPTlBoK1nvEkL+j1d3tsR3x # 4o2ggh8FMIIETzCCA7igAwIBAgIEBydYPTANBgkqhkiG9w0BAQUFADB1MQswCQYD # VQQGEwJVUzEYMBYGA1UEChMPR1RFIENvcnBvcmF0aW9uMScwJQYDVQQLEx5HVEUg # Q3liZXJUcnVzdCBTb2x1dGlvbnMsIEluYy4xIzAhBgNVBAMTGkdURSBDeWJlclRy # dXN0IEdsb2JhbCBSb290MB4XDTEwMDExMzE5MjAzMloXDTE1MDkzMDE4MTk0N1ow # bDELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQ # d3d3LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFu # Y2UgRVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM # 5XPm+9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT # 3JTWPNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wbl # CJEMxChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EK # mEFBIk5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8Vdte # ZOE3hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10a # UAsgEsxBu24LUTi4S8sCAwEAAaOCAW8wggFrMBIGA1UdEwEB/wQIMAYBAf8CAQEw # UwYDVR0gBEwwSjBIBgkrBgEEAbE+AQAwOzA5BggrBgEFBQcCARYtaHR0cDovL2N5 # YmVydHJ1c3Qub21uaXJvb3QuY29tL3JlcG9zaXRvcnkuY2ZtMA4GA1UdDwEB/wQE # AwIBBjCBiQYDVR0jBIGBMH+heaR3MHUxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9H # VEUgQ29ycG9yYXRpb24xJzAlBgNVBAsTHkdURSBDeWJlclRydXN0IFNvbHV0aW9u # cywgSW5jLjEjMCEGA1UEAxMaR1RFIEN5YmVyVHJ1c3QgR2xvYmFsIFJvb3SCAgGl # MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly93d3cucHVibGljLXRydXN0LmNvbS9j # Z2ktYmluL0NSTC8yMDE4L2NkcC5jcmwwHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoI # Au9jZCvDMA0GCSqGSIb3DQEBBQUAA4GBAC52hdk3lm2vifMGeIIxxEYHH2XJjrPJ # VHjm0ULfdS4eVer3+psEwHV70Xk8Bex5xFLdpgPXp1CZPwVZ2sZV9IacDWejSQSV # Mh3Hh+yFr2Ru1cVfCadAfRa6SQ2i/fbfVTBs13jGuc9YKWQWTKMggUexRJKEFhtv # Srwhxgo97TPKMIIGbzCCBVegAwIBAgIQA4uW8HDZ4h5VpUJnkuHIOjANBgkqhkiG # 9w0BAQUFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkw # FwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBBc3N1 # cmVkIElEIENBLTEwHhcNMTIwNDA0MDAwMDAwWhcNMTMwNDE4MDAwMDAwWjBHMQsw # CQYDVQQGEwJVUzERMA8GA1UEChMIRGlnaUNlcnQxJTAjBgNVBAMTHERpZ2lDZXJ0 # IFRpbWVzdGFtcCBSZXNwb25kZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDGf7tj+/F8Q0mIJnRfituiDBM1pYivqtEwyjPdo9B2gRXW1tvhNC0FIG/B # ofQXZ7dN3iETYE4Jcq1XXniQO7XMLc15uGLZTzHc0cmMCAv8teTgJ+mn7ra9Depw # 8wXb82jr+D8RM3kkwHsqfFKdphzOZB/GcvgUnE0R2KJDQXK6DqO+r9L9eNxHlRdw # bJwgwav5YWPmj5mAc7b+njHfTb/hvE+LgfzFqEM7GyQoZ8no89SRywWpFs++42Pf # 6oKhqIXcBBDsREA0NxnNMHF82j0Ctqh3sH2D3WQIE3ome/SXN8uxb9wuMn3Y07/H # iIEPkUkd8WPenFhtjzUmWSnGwHTPAgMBAAGjggM6MIIDNjAOBgNVHQ8BAf8EBAMC # B4AwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDCCAcQGA1Ud # IASCAbswggG3MIIBswYJYIZIAYb9bAcBMIIBpDA6BggrBgEFBQcCARYuaHR0cDov # L3d3dy5kaWdpY2VydC5jb20vc3NsLWNwcy1yZXBvc2l0b3J5Lmh0bTCCAWQGCCsG # AQUFBwICMIIBVh6CAVIAQQBuAHkAIAB1AHMAZQAgAG8AZgAgAHQAaABpAHMAIABD # AGUAcgB0AGkAZgBpAGMAYQB0AGUAIABjAG8AbgBzAHQAaQB0AHUAdABlAHMAIABh # AGMAYwBlAHAAdABhAG4AYwBlACAAbwBmACAAdABoAGUAIABEAGkAZwBpAEMAZQBy # AHQAIABDAFAALwBDAFAAUwAgAGEAbgBkACAAdABoAGUAIABSAGUAbAB5AGkAbgBn # ACAAUABhAHIAdAB5ACAAQQBnAHIAZQBlAG0AZQBuAHQAIAB3AGgAaQBjAGgAIABs # AGkAbQBpAHQAIABsAGkAYQBiAGkAbABpAHQAeQAgAGEAbgBkACAAYQByAGUAIABp # AG4AYwBvAHIAcABvAHIAYQB0AGUAZAAgAGgAZQByAGUAaQBuACAAYgB5ACAAcgBl # AGYAZQByAGUAbgBjAGUALjAfBgNVHSMEGDAWgBQVABIrE5iymQftHt+ivlcNK2cC # zTAdBgNVHQ4EFgQUJqoP9EMNo5gXpV8S9PiSjqnkhDQwdwYIKwYBBQUHAQEEazBp # MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQQYIKwYBBQUH # MAKGNWh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJ # RENBLTEuY3J0MH0GA1UdHwR2MHQwOKA2oDSGMmh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 # LmNvbS9EaWdpQ2VydEFzc3VyZWRJRENBLTEuY3JsMDigNqA0hjJodHRwOi8vY3Js # NC5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURDQS0xLmNybDANBgkqhkiG # 9w0BAQUFAAOCAQEAvCT5g9lmKeYy6GdDbzfLaXlHl4tifmnDitXp13GcjqH52v4k # 498mbK/g0s0vxJ8yYdB2zERcy+WPvXhnhhPiummK15cnfj2EE1YzDr992ekBaoxu # vz/PMZivhUgRXB+7ycJvKsrFxZUSDFM4GS+1lwp+hrOVPNxBZqWZyZVXrYq0xWzx # FjObvvA8rWBrH0YPdskbgkNe3R2oNWZtNV8hcTOgHArLRWmJmaX05mCs7ksBKGyR # lK+/+fLFWOptzeUAtDnjsEWFuzG2wym3BFDg7gbFFOlvzmv8m7wkfR2H3aiObVCU # NeZ8AB4TB5nkYujEj7p75UsZu62Y9rXC8YkgGDCCBqcwggWPoAMCAQICEAi8iRJ7 # eZMavRDMJtoY/+kwDQYJKoZIhvcNAQEFBQAwczELMAkGA1UEBhMCVVMxFTATBgNV # BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEyMDAG # A1UEAxMpRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2UgQ29kZSBTaWduaW5nIENBLTEw # HhcNMTIwMzE3MDAwMDAwWhcNMTMwMzIxMTIwMDAwWjB1MQswCQYDVQQGEwJQTDEb # MBkGA1UECBMSWmFjaG9kbmlvcG9tb3Jza2llMREwDwYDVQQHEwhLb3N6YWxpbjEa # MBgGA1UEChMRQmFydG9zeiBCaWVsYXdza2kxGjAYBgNVBAMTEUJhcnRvc3ogQmll # bGF3c2tpMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4lBBMNWpH82J # 81h5AQn2RPH3hFOYPZHHWI1rDKtrJ+x6fgGb1lsLprr+qzbtDqJ4i3PrdgPtHKV1 # KXhW4i6Xo4X+zmkcKaO9TTEKWt+78JxiITkdsmEoOcS88zH7zHoIODdJ250DFfIL # ET3gwTf55ZWUi5o9HAnna6D3sl011piFWmmAIg7MjbB2AE9Tb+AB2A8Gxv6Gx7Ma # 1SDY6KYoKh3BCnc5KQBuLtGmBOteT+11OdsEx0x9rEu/qhOQbhFOw/tEK7tk0har # MoAyFnWX6C/Q2lnQMcwytYD5T1Ejngen0V6fRPeLX3lfrN6xR+T98n2qOPUEAWjt # JmQ6e3cH6wIDAQABo4IDMzCCAy8wHwYDVR0jBBgwFoAUl0gD6xUIa7myWCPMlC7x # xmXSZI4wHQYDVR0OBBYEFIishvEMffoxHqt0SZTyWs37Ck/3MA4GA1UdDwEB/wQE # AwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzBpBgNVHR8EYjBgMC6gLKAqhihodHRw # Oi8vY3JsMy5kaWdpY2VydC5jb20vaGEtY3MtMjAxMWEuY3JsMC6gLKAqhihodHRw # Oi8vY3JsNC5kaWdpY2VydC5jb20vaGEtY3MtMjAxMWEuY3JsMIIBxAYDVR0gBIIB # uzCCAbcwggGzBglghkgBhv1sAwEwggGkMDoGCCsGAQUFBwIBFi5odHRwOi8vd3d3 # LmRpZ2ljZXJ0LmNvbS9zc2wtY3BzLXJlcG9zaXRvcnkuaHRtMIIBZAYIKwYBBQUH # AgIwggFWHoIBUgBBAG4AeQAgAHUAcwBlACAAbwBmACAAdABoAGkAcwAgAEMAZQBy # AHQAaQBmAGkAYwBhAHQAZQAgAGMAbwBuAHMAdABpAHQAdQB0AGUAcwAgAGEAYwBj # AGUAcAB0AGEAbgBjAGUAIABvAGYAIAB0AGgAZQAgAEQAaQBnAGkAQwBlAHIAdAAg # AEMAUAAvAEMAUABTACAAYQBuAGQAIAB0AGgAZQAgAFIAZQBsAHkAaQBuAGcAIABQ # AGEAcgB0AHkAIABBAGcAcgBlAGUAbQBlAG4AdAAgAHcAaABpAGMAaAAgAGwAaQBt # AGkAdAAgAGwAaQBhAGIAaQBsAGkAdAB5ACAAYQBuAGQAIABhAHIAZQAgAGkAbgBj # AG8AcgBwAG8AcgBhAHQAZQBkACAAaABlAHIAZQBpAG4AIABiAHkAIAByAGUAZgBl # AHIAZQBuAGMAZQAuMIGGBggrBgEFBQcBAQR6MHgwJAYIKwYBBQUHMAGGGGh0dHA6 # Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBQBggrBgEFBQcwAoZEaHR0cDovL2NhY2VydHMu # ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0SGlnaEFzc3VyYW5jZUNvZGVTaWduaW5nQ0Et # MS5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQUFAAOCAQEArHBrvyCp8Sxm # oEuhnD4ll2OZK/Ne6HnZeP5Dt7r10/TlUCDWV6L9q9rPSdn5/R8+lvmY2pDV37vX # k6587Yv7tCsH/6hJYtkMs72aG7ti+yHmGpzYv1syialVgXcY8m/b599k7t710zwv # hK7bRoT92Esi5xWtks+lkbA5K4WMwu152kXZ4sClolzPcEEUPxf7qk88+mUODDSg # LbYNdZIL78sWbQEPpQt0RQIzcR28MNd0qD+CyTFhQAKp2S8/Acrwz3WZQqhse+HA # zg7N1Vi6NHMjgXURzTPO3m2fHb6FIf0uYKlQx3bIhB2RbgtYabs7Ge80eM1YZ5aE # IWsDUQXZgTCCBr8wggWnoAMCAQICEAgcV+5dcOuboLFSDHKcGwkwDQYJKoZIhvcN # AQEFBQAwbDELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG # A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBB # c3N1cmFuY2UgRVYgUm9vdCBDQTAeFw0xMTAyMTAxMjAwMDBaFw0yNjAyMTAxMjAw # MDBaMHMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNV # BAsTEHd3dy5kaWdpY2VydC5jb20xMjAwBgNVBAMTKURpZ2lDZXJ0IEhpZ2ggQXNz # dXJhbmNlIENvZGUgU2lnbmluZyBDQS0xMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A # MIIBCgKCAQEAxfkj5pQnxIAUpIAyX0CjjW9wwOU2cXE6daSqGpKUiV6sI3HLTmd9 # QT+q40u3e76dwag4j2kvOiTpd1kSx2YEQ8INJoKJQBnyLOrnTOd8BRq4/4gJTyY3 # 7zqk+iJsiMlKG2HyrhBeb7zReZtZGGDl7im1AyqkzvGDGU9pBXMoCfsiEJMioJAZ # Gkwx8tMr2IRDrzxj/5jbINIJK1TB6v1qg+cQoxJx9dbX4RJ61eBWWs7qAVtoZVvB # P1hSM6k1YU4iy4HKNqMSywbWzxtNGH65krkSz0Am2Jo2hbMVqkeThGsHu7zVs94l # ABGJAGjBKTzqPi3uUKvXHDAGeDylECNnkQIDAQABo4IDVDCCA1AwDgYDVR0PAQH/ # BAQDAgEGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMIIBwwYDVR0gBIIBujCCAbYwggGy # BghghkgBhv1sAzCCAaQwOgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cuZGlnaWNlcnQu # Y29tL3NzbC1jcHMtcmVwb3NpdG9yeS5odG0wggFkBggrBgEFBQcCAjCCAVYeggFS # AEEAbgB5ACAAdQBzAGUAIABvAGYAIAB0AGgAaQBzACAAQwBlAHIAdABpAGYAaQBj # AGEAdABlACAAYwBvAG4AcwB0AGkAdAB1AHQAZQBzACAAYQBjAGMAZQBwAHQAYQBu # AGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcAaQBDAGUAcgB0ACAARQBWACAAQwBQ # AFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwAeQBpAG4AZwAgAFAAYQByAHQAeQAg # AEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkAYwBoACAAbABpAG0AaQB0ACAAbABp # AGEAYgBpAGwAaQB0AHkAIABhAG4AZAAgAGEAcgBlACAAaQBuAGMAbwByAHAAbwBy # AGEAdABlAGQAIABoAGUAcgBlAGkAbgAgAGIAeQAgAHIAZQBmAGUAcgBlAG4AYwBl # AC4wDwYDVR0TAQH/BAUwAwEB/zB/BggrBgEFBQcBAQRzMHEwJAYIKwYBBQUHMAGG # GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBJBggrBgEFBQcwAoY9aHR0cDovL2Nh # Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0SGlnaEFzc3VyYW5jZUVWUm9vdENB # LmNydDCBjwYDVR0fBIGHMIGEMECgPqA8hjpodHRwOi8vY3JsMy5kaWdpY2VydC5j # b20vRGlnaUNlcnRIaWdoQXNzdXJhbmNlRVZSb290Q0EuY3JsMECgPqA8hjpodHRw # Oi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRIaWdoQXNzdXJhbmNlRVZSb290 # Q0EuY3JsMB0GA1UdDgQWBBSXSAPrFQhrubJYI8yULvHGZdJkjjAfBgNVHSMEGDAW # gBSxPsNpA/i/RwHUmCYaCALvY2QrwzANBgkqhkiG9w0BAQUFAAOCAQEAggXpha+n # TL+vzj2y6mCxaN5nwtLLJuDDL5u1aw5TkIX2m+A1Av/6aYOqtHQyFDwuEEwomwqt # CAn584QRk4/LYEBW6XcvabKDmVWrRySWy39LsBC0l7/EpZkG/o7sFFAeXleXy0e5 # NNn8OqL/UCnCCmIE7t6WOm+gwoUPb/wI5DJ704SuaWAJRiac6PD//4bZyAk6ZsOn # No8YT+ixlpIuTr4LpzOQrrxuT/F+jbRGDmT5WQYiIWQAS+J6CAPnvImQnkJPAcC2 # Fn916kaypVQvjJPNETY0aihXzJQ/6XzIGAMDBH5D2vmXoVlH2hKq4G04AF01K8Ui # hssGyrx6TT0mRjCCBs0wggW1oAMCAQICEAb9+QOWA63qAArrPye7uhswDQYJKoZI # hvcNAQEFBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ # MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNz # dXJlZCBJRCBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTIxMTExMDAwMDAwMFow # YjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQ # d3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgQXNzdXJlZCBJRCBD # QS0xMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6IItmfnKwkKVpYBz # QHDSnlZUXKnE0kEGj8kz/E1FkVyBn+0snPgWWd+etSQVwpi5tHdJ3InECtqvy15r # 7a2wcTHrzzpADEZNk+yLejYIA6sMNP4YSYL+x8cxSIB8HqIPkg5QycaH6zY/2DDD # /6b3+6LNb3Mj/qxWBZDwMiEWicZwiPkFl32jx0PdAug7Pe2xQaPtP77blUjE7h6z # 8rwMK5nQxl0SQoHhg26Ccz8mSxSQrllmCsSNvtLOBq6thG9IhJtPQLnxTPKvmPv2 # zkBdXPao8S+v7Iki8msYZbHBc63X8djPHgp0XEK4aH631XcKJ1Z8D2KkPzIUYJX9 # BwSiCQIDAQABo4IDejCCA3YwDgYDVR0PAQH/BAQDAgGGMDsGA1UdJQQ0MDIGCCsG # AQUFBwMBBggrBgEFBQcDAgYIKwYBBQUHAwMGCCsGAQUFBwMEBggrBgEFBQcDCDCC # AdIGA1UdIASCAckwggHFMIIBtAYKYIZIAYb9bAABBDCCAaQwOgYIKwYBBQUHAgEW # Lmh0dHA6Ly93d3cuZGlnaWNlcnQuY29tL3NzbC1jcHMtcmVwb3NpdG9yeS5odG0w # ggFkBggrBgEFBQcCAjCCAVYeggFSAEEAbgB5ACAAdQBzAGUAIABvAGYAIAB0AGgA # aQBzACAAQwBlAHIAdABpAGYAaQBjAGEAdABlACAAYwBvAG4AcwB0AGkAdAB1AHQA # ZQBzACAAYQBjAGMAZQBwAHQAYQBuAGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcA # aQBDAGUAcgB0ACAAQwBQAC8AQwBQAFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwA # eQBpAG4AZwAgAFAAYQByAHQAeQAgAEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkA # YwBoACAAbABpAG0AaQB0ACAAbABpAGEAYgBpAGwAaQB0AHkAIABhAG4AZAAgAGEA # cgBlACAAaQBuAGMAbwByAHAAbwByAGEAdABlAGQAIABoAGUAcgBlAGkAbgAgAGIA # eQAgAHIAZQBmAGUAcgBlAG4AYwBlAC4wCwYJYIZIAYb9bAMVMBIGA1UdEwEB/wQI # MAYBAf8CAQAweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2Nz # cC5kaWdpY2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2lj # ZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwgYEGA1UdHwR6MHgw # OqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJ # RFJvb3RDQS5jcmwwOqA4oDaGNGh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdp # Q2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwHQYDVR0OBBYEFBUAEisTmLKZB+0e36K+ # Vw0rZwLNMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3zbcgPMA0GCSqGSIb3 # DQEBBQUAA4IBAQBGUD7Jtygkpzgdtlspr1LPUukxR6tWXHvVDQtBs+/sdR90OPKy # XGGinJXDUOSCuSPRujqGcq04eKx1XRcXNHJHhZRW0eu7NoR3zCSl8wQZVann4+er # Ys37iy2QwsDStZS9Xk+xBdIOPRqpFFumhjFiqKgz5Js5p8T1zh14dpQlc+Qqq8+c # dkvtX8JLFuRLcEwAiR78xXm8TBJX/l/hHrwCXaj++wc4Tw3GXZG5D2dFzdaD7eeS # DY2xaYxP+1ngIw/Sqq4AfO6cQg7PkdcntxbuD8O9fAqg7iwIVYUiuOsYGk38KiGt # STGDR5V3cdyxG0tLHBCcdxTBnU8vWpUIKRAmMYIEPDCCBDgCAQEwgYcwczELMAkG # A1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRp # Z2ljZXJ0LmNvbTEyMDAGA1UEAxMpRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2UgQ29k # ZSBTaWduaW5nIENBLTECEAi8iRJ7eZMavRDMJtoY/+kwCQYFKw4DAhoFAKB4MBgG # CisGAQQBgjcCAQwxCjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcC # AQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYE # FMbqJmtFnnZB2PoOXZkf3M3qjGomMA0GCSqGSIb3DQEBAQUABIIBAF9ziFL78vHk # 85H10PiuQ5XwMnfuzzK4rQ6s7XjzBjHlRmlJwZNJhh6nGbJoGeKtVm5SM2ZeMvAF # xBeY1W0ZqLVoaB+b6QTrmxY7ggZaMNeRyM0l5MX4Kw6ZrQdRSiwGrxHS+yQImdxb # afiGSuBFLXCc4Kyd3ijv3lJ1QdKXOhe+mjvm4cNERg3pQOFJMw82mSaeK1yNMmpL # +FDv7BNEgwvXBIDzDru8qbgAiE/WyxUEg/6ESL61SZ9zZImRKt242rycNRzs9NvM # hOO/mUOMm5uzFM2cphVGviCwYMJvuGbqzzFXlfkZrCGD54CuO66Ho1nbNZvQTY6G # XglCpiknTsahggIPMIICCwYJKoZIhvcNAQkGMYIB/DCCAfgCAQEwdjBiMQswCQYD # VQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGln # aWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBBc3N1cmVkIElEIENBLTECEAOL # lvBw2eIeVaVCZ5LhyDowCQYFKw4DAhoFAKBdMBgGCSqGSIb3DQEJAzELBgkqhkiG # 9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTEzMDMxNTIxMzU0MVowIwYJKoZIhvcNAQkE # MRYEFKxkm8oCW6n0kttvDwaGmsrZfe0IMA0GCSqGSIb3DQEBAQUABIIBAJrw872t # DgvDLC6J0hN2RPBgL2itMtPwxPKOzxSC2iYTsJv8JMrqJBwY1o8P/KipPDZm7tlv # 7zUO2krH+WdOgYvIZRTYDsDntWog++/6rVf/2yO4/ysNn5gD5ptaNuKpy84/lMzw # qEc0kDssWBkM9lBzWmqiiXKAGbnhvZvz93SfGZfCBhTJutipNCnJKVoXWbspxEYn # de7D9ZlOATJ94f8R1W/Kr7oxE377MlRLDofXA7DJscS4mYOXH/o43PlEHRAFiNlO # KYV3O90ygD2A1Dv4Hni1Agpz0y2xxYIJzd13R1sCEQS64wlApw6d2ucb9TWdEFnk # vNOfNx11O3z0cR8= # SIG # End signature block
0
sample_13_81.ps1
$FileToCollect = Join-Path $Env:windir "system32\catroot2\dberr.txt" $SectionDescription = "Catalog registration files" $FileDescription = "SP Catalog Logging file" Import-LocalizedData -BindingVariable DCStrings Write-DiagProgress -activity $DCStrings.ID_DBErrCollecting -status $DCStrings.ID_DBErrCollectingDesc CollectFiles -filesToCollect $FileToCollect -fileDescription $FileDescription -sectionDescription $SectionDescription -renameOutput $true # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKqtuIenJTL18m # oOiXgtTpGz7U79v5w7K4bXbHw6shQaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICEP # yNV0J2rqD5G51EiUtggaa1M9VIWy2UXNBpQW0AC3MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAbiy8ts4G+GAvNr9ESC9GOW9n8f7tqsyA2LB+ # ru/S265/xkLjqePYwen6Bkm42K4DVqYidUC3kRkcozx8P2N47q79mZRqQpDrzRhB # NZg0JjscMr0cLP1GyJVuqvKLUPW02emPMDlYDuBKlOwBjaxw6xFNK/NIPmH/Di5V # uNlrxZuYfFhtBch2czCbOrayVn2/tZUJIau8ZC8V1+Z+PP6MRoJrGv1/KaKGl1MX # b+msgkHjaSt8ZdBEfXykAjJIOoPUvKMQjbGqnSFuMDKMk0DwqH8MuFIVAy1ShnS6 # vBOX9GF8Ry5U8U4fpUoQv2DFRUiec2cNwjhRcfifbg9NtWF7D6GCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAT/7iDRmFzTtSsS/IwZt1cA2HmCLDxjW5l # 1tizR3sT0AIGZxqNTrt0GBMyMDI0MTAyODExNDA0Ni45NjJaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB # AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv # QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed # zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv # 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY # cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT # EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ # UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7 # b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD # oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe # h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69 # mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2 # t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx # BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X # pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t # aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t # uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM # iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw # psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL # zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR # J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB # 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX # WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV # PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE # K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smo0TAi # GA8yMDI0MTAyODA2MDgxN1oYDzIwMjQxMDI5MDYwODE3WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDqyajRAgEAMAoCAQACAgWXAgH/MAcCAQACAhK9MAoCBQDqyvpR # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALgqZtdfGHfBazKoV8/843Ip # TSU07I0JGfXJbnovL0Q0rAjuvBKveKlK32WumSyuoR4Ya2ULLIJOczpFhgxpuw7I # 82xdhNLFLuUrbVXhH2XM4mZT5Ry8Zh18jBR2WevcePllwTXcOyduzQBlvbTB2ORn # Pwfg47LNUYexuXAKFm6kwKtXFC/N72WK/zV2LeO9FPCyUETpStdYiebSahH7im5d # DaFeNF7ZKKXp2zWG7JYvrT0HcUcAQmA+eg5ov2i7hkFxQzN008G+b+58Vq1QNSaz # 4CF2D4RxTXGrf9ICHuX2BOf8c/Ap/pKcZN/ZDEIgvuEnjDO2pvNkCh9EbxicT/4x # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfI+MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCCEQ7lWXpESuLaxRseF84G # X2Oks+ftVFHxwzmV2N+teDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPja # Ph0uMVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgemtf # KediGd1+I1jEAiEUlDRd8R1QCuXoLDc7YcA8zrAwDQYJKoZIhvcNAQELBQAEggIA # ZlfAzZOnJYwI6cOVG6XGqdctjciGAvAkXrwidGqZhjCApqutd7Coi7DNRaFzwa53 # 26cwLkhiZ57WMTRWP+Y38kQMFPnJEIP1sRN8g5wtVqkVJFbYcGT2SpvbT1HP7Tl6 # juPHvuY+H7yBh4ymAboCiQReA/XeQQYb4PiqYfZ8vghj5XWKCohhpCKrJ6AnKo/M # 8iGhIbTaFCAnhc6FK92pJYeK9ktqkNJw0AvnsuVd6LJhdnIHDzNPBv/VH3ojtzV5 # toGiDqV8Sa6rik3nO4KnkVU3PJXoOMer2QHwyGDYB5fKSOGbvv0J/15gx/rt83Ho # WgmG7S8xk6KkVFrAgdF5CPix22BQX3A2m0xdwxIzW+UAAVW4WaqZzkmoBAG6GoPl # GGJaGrpCCM2UyAuoTIqKiqox/yZVekogNzd4Kti5xZBUZwVCxQUvHCQfnNgp82yS # hcY4phFuybvd1TzGNapGxnN6LXytV3H2vWudn+dk3IXYecGETPJ3KILPu4O/HSc8 # xcPzTmF3sQBSSskXdcMpLjUgodXadvTyf5p9CSS5DrKbIJJgHDofZriFlapYMK6C # Ju67vm3aE8sIcdcvwTDgz3ppKqeeUrct7sxPUqMEhE4l+sX2MkDRvD1Y6X3Reqle # OIICDsvlpxSvVN9rL1kq3YxB+Z4tCo7vpV4BJTrptZU= # SIG # End signature block
0
sample_4_31.ps1
#************************************************ # DC_CollectSqllogs.ps1 # Version 1.0.0 # Date: 10-2011 # # Description: # Collects SQL Server errorlogs and SQL Server Agent logs for all installed instances passed to script via the $Instances parameter # Can operate in "offline" mode where errorlog files are located using the registry or "online" mode # where errorlogs are enmerated and collected via xp_readerrorlog. # # Visibility: # Public - You should call this script to collect SQL Server errorlogs # # PowerShell Version: # Written to be compatible with PowerShell 1.0 # # Script Parameters: # $Instances # Array of instances to collect errorlogs for # $CollectSqlErrorlogs # Switch parameter that indicates whether to collect SQL Server errorlogs # $CollectSqlAgentLogs # Switch parameter that indicates whether to collect SQL Server Agent logs # # NOTE: This script expects the $Instances array to have been populated by the Enumerate-SqlInstances # function stored in "DSD\Scripts\SQL Server\Shared\Utilities\utils_DSD.ps1" and relies upon that format # to function properly # # Author: Dan Shaver - dansha@microsoft.com # # Revision History: # # 1.0 11/2011 DanSha # Original Version # 1.1 01/18/2012 DanSha # Eliminated $Offline switch parameter as we no longer support "online" collection # #_# Date: 5-26-2021 added Get-SqlWriterLogs # This script has dependencies on utils_CTS and utils_DSD # param( [Object[]] $instances, [switch]$CollectSqlErrorlogs, [switch] $CollectSqlAgentLogs) Import-LocalizedData -BindingVariable errorlogsCollectorStrings # # Function : Get-SqlAgentLogPath # ---------------------------- # # PowerShell Version: # Written to be compatible with PowerShell 1.0 # # Visibility: # Private/Internal - Do not call this function from your PowerShell scripts. # # Description: # This function is used to find the path to the SQL Server errorlog for a given instance of SQL Server # # Arguments: # $InstanceName # Function will find the path to the errorlogs for the instance passed # # Owner: # DanSha # # Revision History: # # 1.0 11/2011 DanSha # Original Version # 1.1 01/18/2012 DanSha # Replaced double quotes with single quotes when variable expansion not desired. # Removed logic for "online" collection # Added parameter metadata to prevent null, missing and empty parameters # function Get-SqlAgentLogPath([string]$SqlInstance) { trap { '[Get-SqlAgentLogPath] : [ERROR] Trapped exception ...' | WriteTo-StdOut Report-Error } # Check if required parameter specified if ($null -ne $SqlInstance) { # Get instance folder name under SQL Root directory $InstanceKey = Get-SqlInstanceRootKey -SqlInstanceName $SqlInstance if (($null -ne $InstanceKey) -and (0 -lt $InstanceKey.Length)) { $SqlAgentKey = Join-Path -Path $InstanceKey -ChildPath '\SqlServerAgent' # Test for valid Sql Agent registry key. if ($true -eq (Test-Path -Path $SqlAgentKey)) { if ($false -eq (Test-RegistryValueIsNull -RegistryKey $SqlAgentKey -RegistryValueName 'ErrorLogFile')) { # Get the Sql Agent Errorlog path $SqlAgentLogPath = [System.IO.Path]::GetDirectoryName((Get-ItemProperty -Path $SqlAgentKey).ErrorLogFile) # Command Fail? if ($false -eq $?) { "[Get-SqlAgentLogPath] : [ERROR] Failed to retrieve SQL Agent log path from [{0}\ErrorLogFile]" -f $SqlAgentKey | WriteTo-StdOut Report-Error } } else { "[Get-SqlAgentLogPath] : [ERROR] Failed to retrieve SQL Agent log path from [{0}\ErrorLogFile] because the 'ErrorlogFile' registry value is null" -f $SqlAgentKey | WriteTo-StdOut } } else { # Report that we could not locate the SQL Agent log path "[Get-SqlAgentLogPath] : Unable to locate SQL Agent log path for SQL Instance: [{0}]" -f $SqlInstance | WriteTo-StdOut "[Get-SqlAgentLogPath] : Registry key: [{0}] is invalid" -f $SqlAgentKey | WriteTo-StdOut Report-Error } } # if ($null -ne $InstanceKey) else { "[Get-SqlAgentLogPath] : Failed to retrieve Instance Root key [{0}]" -f $InstanceKey | WriteTo-StdOut Report-Error } } # if ($null -eq $SqlInstance) else { '[Get-SqlAgentLogPath] : Required parameter: -SqlInstance was not specified' | WriteTo-StdOut } return $SqlAgentLogPath } # # Function : Get-SqlAgentLogsOffline # ---------------------------------- # # PowerShell Version: # Written to be compatible with PowerShell 1.0 # # Visibility: # Private/Internal - Do not call this function from your PowerShell scripts. # # Description: # This function finds and collects all Sql Agent logs for the instance passed to the function # This is an "offline" collector in that it does not rely on making a connection to the SQL Server instance to # find and collect the Sql Agent log files (via xp_readerrorlog). # Finds the location of the Sql Agent logs from the registry and collects the files from the \log folder for the install # # Arguments: # $InstanceName # Function will find the path to the Sql Agent errorlog for the instance passed # # Owner: # DanSha # # Revision History: # # 1.0 11/2011 DanSha # Original Version # 1.1 01/18/2012 DanSha # Replaced double quotes with single quotes when variable expansion not desired. # Removed logic for "online" collection # Added parameter metadata to prevent null, missing and empty parameters # function Get-SqlAgentLogsOffline ([string]$InstanceToCollect ) { trap { '[Get-SqlAgentLogsOffline] : [ERROR] Trapped exception ...' | WriteTo-StdOut Report-Error } if ($null -ne $InstanceToCollect) { # Send a status message to stdout.log "[Get-SqlAgentLogsOffline] : [INFO] Attempting to collect Sql Agent logs for instance: {0}" -f $InstanceToCollect | WriteTo-StdOut # Set the SectionDescription to the instance name that errorlogs were collected from $SectionDescription = 'SQL Server Agent Logs for instance: ' + $InstanceToCollect # Get path to SQL Server Agent log files from registry $SqlAgentLogPath = Get-SqlAgentLogPath -SqlInstance $InstanceToCollect if (($null -ne $SqlAgentLogPath) -and (0 -lt $SqlAgentLogPath.Length)) { if ($true -eq (Test-Path -Path $SqlAgentLogPath)) { # Enumerate and then copy the files $Files = @() $Files = Copy-FileSql -SourcePath $SqlAgentLogPath ` -FileFilters @('SQLAGENT.*') ` -FilePolicy $global:SQL:FILE_POLICY_SQL_SERVER_ERRORLOGS ` -InstanceName $InstanceToCollect ` -SectionDescription $SectionDescription ` -LCID (Get-LcidForSqlServer -SqlInstanceName $InstanceToCollect) ` -RenameCollectedFiles if (0 -eq $Files.Count) { #SQL Agent Log path is valid but no SQLAget log files exists ... "[Get-SqlAgentLogsOffline] : [INFO] There are no Sql Agent log files for instance: {0}" -f $InstanceToCollect | WriteTo-StdOut } } else # Invalid path to SQL Agent log files retrieved from registry. { # Does the log path reference a cluster disk that is offline from this node at this time? if ($true -eq (Check-IsSqlDiskResourceOnline -InstanceName $InstanceToCollect -PathToTest $SqlAgentLogPath)) { # If above function returns true the drive is online but the path is bad "[Get-SqlAgentLogsOffline] : [ERROR] Path to Sql Agent Log Files: [{0}] for instance: {1} is invalid" -f $SqlAgentLogPath, $InstanceToCollect | WriteTo-StdOut } } } else { "[Get-SqlAgentLogsOffline] : [ERROR] Could not locate errorlog path in the registry for instance: [{0}]. No Sql Agent log files will be collected. " -f $InstanceToCollect | WriteTo-StdOut } } #if ($null -eq $InstanceToCollect) else { '[Get-SqlAgentLogsOffline] : [ERROR] Required parameter: -InstanceToCollect was not specified' | WriteTo-StdOut } } # # Function : Get-ErrorlogsOffline # ------------------------------- # # PowerShell Version: # Written to be compatible with PowerShell 1.0 # # Visibility: # Private/Internal - Do not call this function from your PowerShell scripts. # # Description: # This function finds and collects all errorlogs for the instance passed to the function # This is an "offline" collector in that it does not rely on making a connection to the SQL Server instance to # find and collect the errorlog files. # Finds the location of the errorlogs from the registry and collects the files from the \log folder for the install # # Arguments: # $InstanceName # Function will find the path to the errorlogs for the instance passed # $IsClustered # This variable tells the collector whether to run an additional check if a drive appears offline preventing collection # # Owner: # DanSha # # Revision History: # # 1.0 11/2011 DanSha # Original Version # 1.1 01/18/2012 DanSha # Replaced double quotes with single quotes when variable expansion not desired. # Removed logic for "online" collection # Added parameter metadata to prevent null, missing and empty parameters # function Get-ErrorlogsOffline ([string]$InstanceToCollect) { trap { "[Get-ErrorlogsOffline] : [ERROR] Trapped exception ..." | WriteTo-StdOut Report-Error } if ($null -ne $InstanceToCollect) { # Write status message to stdout.log "[Get-ErrorlogsOffline] : [INFO] Attempting to collect errorlogs for instance: {0}" -f $InstanceToCollect | WriteTo-StdOut $SqlErrorLogPath = Get-SqlServerLogPath -SqlInstance $InstanceToCollect if ($null -ne $SqlErrorLogPath) { if ( $true -eq (Test-Path -Path $SqlErrorLogPath) ) { # Set the SectionDescription to the instance name that errorlogs were collected from $SectionDescription = 'SQL Server Errorlogs for instance: ' + $InstanceToCollect # Enumerate and then copy the files $Files = @() $Files = Copy-FileSql -SourcePath $SqlErrorLogPath ` -FileFilters @('ERRORLOG*') ` -FilePolicy $global:SQL:FILE_POLICY_SQL_SERVER_ERRORLOGS ` -InstanceName $InstanceToCollect ` -SectionDescription $SectionDescription ` -LCID (Get-LcidForSqlServer -SqlInstanceName $InstanceToCollect) ` -RenameCollectedFiles if (0 -eq $Files.Count) { "[Get-ErrorlogsOffline] : [INFO] There are no Sql errorlog files for instance: {0}" -f $InstanceToCollect | WriteTo-StdOut } } # if ( $true -eq (Test-Path -Path $SqlErrorLogPath) ) # Errorlog path is invalid else { if ($true -eq (Check-IsSqlDiskResourceOnline -InstanceName $InstanceToCollect -PathToTest $SqlErrorLogPath)) { "[Get-ErrorlogsOffline] : [ERROR] No SQL errorlogs will be collected. Path to errorlogs: [{0}] for instance: {1} is invalid" -f $SqlErrorLogPath, $InstanceToCollect | WriteTo-StdOut } } } # Couldn't locate errorlog path else { "[Get-ErrorlogsOffline] : [ERROR] No SQL errorlogs will be collected. Could not locate the errorlog path in the registry for instance: {0} is invalid" -f $InstanceToCollect | WriteTo-StdOut } } #if ($null -ne $InstanceToCollect) else { "[Get-ErrorlogsOffline] : [ERROR] Required parameter -InstanceToCollect was not specified" -f $InstanceToCollect | WriteTo-StdOut } } # # Function : Get-ErrorlogsOnline # ------------------------------- # # PowerShell Version: # Written to be compatible with PowerShell 1.0 # # Visibility: # Private/Internal - Do not call this function from your PowerShell scripts. # # Description: # This function finds and collects all errorlogs for the instance passed to the function # This is an "online" collector that utilizes SQLCMD and xp_readerrorlog to collect the SQL Server errorlogs # This collector uses the same exact scrip that PSSDiag uses in order to maintain compatibility with any # post-processing of errorlogs performed by SqlNexus # # Arguments: # $InstanceName # Function will find the path to the errorlogs for the instance passed # $NetName # This is the server or virtual SQL network name to connect to # # Owner: # DanSha # #function Get-ErrorlogsOnline ( [string]$InstanceName # , [string]$NetName ) #{ # trap # # '[Get-ErrorlogsOnline] : Trapped error ...' | WriteTo-StdOut # Show-ErrorDetails -ErrorRecord $error[0] # # # Now clear all errors since we reported them # $Error.Clear() # } # # New-Variable ERRORLOG_COLLECTOR_SCRIPT -Value 'collecterrorlog.sql' -Option ReadOnly # # if (('DEFAULT' -eq $InstanceName) -or ( 'MSSQLSERVER' -eq $InstanceName)) # { # $ConnectToName = $NetName # $ErrorlogOutFileName = "{0}__SQL_Base_Errorlog_Shutdown.out" -f $NetName # } else { # $ConnectToName = $NetName+'\'+$InstanceName # $ErrorlogOutFileName = "{0}_{1}_SQL_Base_Errorlog_Shutdown.out" -f $NetName, $InstanceName # } # # Execute-SqlScript -ConnectToName $ConnectToName ` # -ScriptToExecute $ERRORLOG_COLLECTOR_SCRIPT ` # -OutputFileName $ErrorlogOutFileName ` # -SectionDescription ("SQL Server Errorlogs for instance: {0}" -f $ConnectToName) ` # -FileDescription 'ERRORLOGS' #} # # Function : Get-SqlErrorlogs # ------------------------ # # PowerShell Version: # Written to be compatible with PowerShell 1.0 # # Visibility: # Private/Internal - Do not call this function from your PowerShell scripts. # # Description: # This function is a wrapper that calls Get-ErrorlogsOffline # This script used to support online and offline collection modes # The "online" collector utilized SQLCMD and xp_readerrorlog to collect the SQL Server errorlogs # However, xp_readerrorlog wraps lines and this caused issues for loading the files in UDE so we no longer collect in this format # # Arguments: # $InstanceName # Function will find the path to the errorlogs for the instance passed # $NetName # This is the server or virtual SQL network name to connect to # # Owner: # DanSha # # Revision History: # # 1.0 11/2011 DanSha # Original Version # 1.1 01/18/2012 DanSha # Replaced double quotes with single quotes when variable expansion not desired. # Removed logic for "online" collection # Added parameter metadata to prevent null, missing and empty parameters # # function Get-SqlErrorLogs ([object]$Instance) { trap { # Handle and report any exceptions that occur in this function, and then allow execution to resume # Since this is only a wrapper function and doesn't do much to setup the excution of Get-ErrorlogsOffline, # the called function may still succeed # '[Get-SqlErrorLogs] : [ERROR] Trapped exception ...' | WriteTo-StdOut Report-Error } # Check if required parameter was passed if ($null -ne $Instance) { # Update msdt dialog with progress message Write-DiagProgress -Activity $errorlogsCollectorStrings.ID_SQL_CollectSqlErrorlogs -Status ($errorlogsCollectorStrings.ID_SQL_CollectSqlErrorlogsDesc + ": " + $instance.InstanceName) if ($null -ne $Instance.InstanceName) { "[Get-SqlErrorLogs] : [INFO] Collecting logs for instance {0}" -f $Instance.InstanceName | WriteTo-StdOut Get-ErrorlogsOffline -InstanceToCollect $Instance.InstanceName } else { '[Get-SqlErrorLogs] : [ERROR] Passed instance name ($Instance.InstanceName) is null' | WriteTo-StdOut } } else { if ($null -eq $Instance) { '[Get-SqlErrorLogs] : [ERROR] Required parameter: -Instance was not specified' | WriteTo-StdOut } } } # # Function : Get-SqlAgentLogs # ------------------------ # # PowerShell Version: # Written to be compatible with PowerShell 1.0 # # Visibility: # Private/Internal - Do not call this function from your PowerShell scripts. # # Description: # This function is a wrapper that calls Get-SqlAgentLogsOffline # Wrapper exists in case we want to add offline and online (via xp_readerrorlog) collection modes. This is the function # # # Arguments: # $InstanceName # Function will find the path to the errorlogs for the instance passed # $NetName # This is the server or virtual SQL network name to connect to # # Owner: # DanSha # # Revision History: # # 1.0 11/2011 DanSha # Original Version # 1.1 01/18/2012 DanSha # Replaced double quotes with single quotes when variable expansion not desired. # Removed logic for "online" collection # Added parameter metadata to prevent null, missing and empty parameters # # function Get-SqlAgentLogs ([object]$Instance) { trap { '[Get-SqlAgentLogs] : [ERROR] Trapped exception ...' | WriteTo-StdOut Report-Error } # Update msdt dialog with progress message Write-DiagProgress -Activity $errorlogsCollectorStrings.ID_SQL_CollectSqlAgentlogs -Status ($errorlogsCollectorStrings.ID_SQL_CollectSqlAgentlogsDesc + ": " + $instance.InstanceName) # Check if required parameter specified if ($null -ne $Instance) { # Write to debug log "[Get-SqlAgentLogs] : [INFO] Collecting Sql Agent logs for instance {0}" -f $Instance.InstanceName | WriteTo-StdOut Get-SqlAgentLogsOffline -InstanceToCollect $Instance.InstanceName } else { '[Get-SqlAgentLogs] : [ERROR] Required parameter -Instance was not specified' | WriteTo-StdOut } } #_# add function for collecting SQL Server 2019 SqlWriterLogger function Get-SqlWriterLogs([string]$SqlVersion) { $SQLPath = (join-path ([Environment]::GetFolderPath("ProgramFiles")) "Microsoft SQL Server\$SqlVersion\Shared") if($debug -eq $true){[void]$shell.popup($SQLPath)} if ((test-path $SQLPath) -eq $true) { if($debug -eq $true){[void]$shell.popup("Valid Path")} $OutputFileName= $ComputerName + "_SQL" + $SqlVersion + "_SqlWriterLogger.Cab" if($debug -eq $true){[void]$shell.popup($OutputFileName)} #Create Array of Files to Collect [Array] $DC_GetSQLWriterLoggerOutputFiles = $SQLPath + "\SqlWriterLogger*.txt" CompressCollectFiles -filesToCollect $DC_GetSQLWriterLoggerOutputFiles -DestinationFileName $OutputFileName -fileDescription "SQL $SqlVersion SqlWriterLogger Logs" -sectionDescription "Additional Data" -Recursive -ForegroundProcess } else { if($debug -eq $true){[void]$shell.popup("Invalid Path")} } } # Clear errors at entry to script # $Error.Clear() trap { '[DC-CollectSqllogs] : [ERROR] Trapped exception ...' | WriteTo-StdOut Report-Error } if ($true -eq $global:SQL:debug) { $CollectSqlErrorlogs=$true $CollectSqlAgentLogs=$true } # Check to be sure that there is at least one SQL Server installation on target machine before proceeding # if ($true -eq (Check-SqlServerIsInstalled)) { # If $instance is null, get errorlogs for all instances installed on machine # if ($null -eq $instances) { $instances = Enumerate-SqlInstances -Offline } if ($null -ne $instances) { foreach ($instance in $instances) { if ('DEFAULT' -eq $instance.InstanceName) {$instance.InstanceName='MSSQLSERVER'} if ($true -eq $CollectSqlErrorlogs) { Get-SqlErrorlogs -Instance $instance } if ($true -eq $CollectSqlAgentLogs) { Get-SqlAgentLogs -Instance $instance } } } # if ($null -ne $instances) else { "[DC_CollectSqllogs] : [WARN] No sql server instances were found on: [{0}] yet SQL Server appears to be installed" -f $ComputerName | WriteTo-StdOut } } # if ($true -eq (Check-SqlServerIsInstalled)) else { "[DC_CollectSqllogs] : No sql server instances are installed on: [{0}]" -f $ComputerName | WriteTo-StdOut } #_# Collect SQL 90 SqlWriter Logs Write-DiagProgress -Activity $GetSQLSetupLogs.ID_SQL_setup_collect_writer_logs -Status $GetSQLSetupLogs.ID_SQL_writer_Collect_2019_Logs Get-SqlWriterLogs -SqlVersion "90" # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDYydYx/HIwdLAS # Y7ejB8Ja87sz5IBcoIZvGTLytTb586CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIWj # BGWMv8UTWC8fLZ+AQFzH9fX/nseA3O9xAYSBzm4dMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAU3wEnEQRXu04HDwNGbsNYSxkxTYiGl0JQakZ # Q69gwySoPGMtIH5DheOM4vmjsapa1VMaL64jYUQKDfH3TuWyujdTga3tI4woASRN # nBHLo4hWZZITs28E+BVnbMEmILNZOsHmozTRTfuUoeHfBFR1+FiAJkK7azhKLUnm # A5AW3pZaKSj0s3oJfUwLI7+3g5um5qd93t3JQUE8PSzxpQ3Z6hyQYHpRgnB1zknk # GR69/J3ZAJymQX3Y60p8Wk+uYD41jhbjni/uYTP1XMHIyGjaxefurwV2rY+h/Av6 # 2+tbcRoUhHTFpbPdEzaA8y5GcxPIf9+PLxufvHaec8jXRj9jz6GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAwDwKjTJnNyekHOV3wWaZI+/hoLXQTWPgh # JQOtrOy3DAIGZuspkdK5GBMyMDI0MTAyODExNDA0MC45NjdaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOh # JgwMQEj+AAEAAAH4MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjMyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # xR23pXYnD2BuODdeXs2Cu/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMT # xgckvZr1JrW0Mi4F15rx/VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf2 # 70SWAAWxQbpVIhhPWCnVV3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3 # vBuxEX2E8X50IgAHsyaR9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgE # qSrX4UiX0etqi7jUtKypgIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcT # KWtddWpnJtyl5e3gHuYoj8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO6 # 9vo/NmJ4R/f1+KucBPJ4yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXp # cU+TMcOvWP8HBWmWJQImTZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRf # gPHfOhIWQ0D8ALCY+LsiwbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1Ns # Bo9V4GZBikzX7ZjWCRgd1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpP # TAs1gd/vUogcdiL51o7shuHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBS9zsZzz57QlT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAYfk8GzzpEVnGl7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbH # B5rcNiRhFHZ93RefdPpc4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQp # gGUzyw3lETZebNLEA17A/CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJx # IuLzFVHacvWxSCKoF9hlSrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0 # UIMjjp9VRFH7nb3Ng2Q4gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35 # qLo7Daw9AsItqjFhbMcG68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI # 0TZvvUWX9ajm6SfLBTEtoTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2 # gxFlDXHCyLp5qB6BoPpc82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziL # fU1SY240OZW8ld4sS8fnybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcn # f1VTm6cmfasScYtElpjqZ9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH # 00KQq+FJT/62SB70g9g/R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5D # nG+aKRzPELCFE9GggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJuKwwIhgPMjAyNDEwMjgwNzE1NTZaGA8yMDI0 # MTAyOTA3MTU1NlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sm4rAIBADAHAgEA # AgIYGzAHAgEAAgITTTAKAgUA6ssKLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQCdo1/IodMsNY0IgWORzZg8jsEoddsFxXLB6LC/xZZN78xMGY8ik00hGbgg # j5TzOyaNz/noIF8rSswoSMgsS4ZwddVQrvYaMGqrGhpDjhieQUnGdME69mRCvIoQ # FD26RPCKzj29tv+B+uFYo+vQFAlgX6TPkk0mP1QA2f6Z3lUlDwIgMI253G8VxjqZ # RY6ZoVliBz9eAi7lBW9kULQPtVGmIUPu7ezKTBUkuCNLrcKpQnElDP3Zlk7rT4A0 # pcf9UEdis9BF366M8Ktt8LYZKi+PDCPRy/n75JCQqDqcbHIzxFw0i6SoY8K4+6yq # F0TVFbiwLm8UNadYHPkbzTwcRywIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgmOxljvvv83fCt2rNKnom1VxF2J+P2dRW+evNJApTTqkwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I # 0Zz3WjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # +KOhJgwMQEj+AAEAAAH4MCIEINY/Dw199apAunA4Ss6RSl7yGIXBNBs5M/tiHZQ6 # crrSMA0GCSqGSIb3DQEBCwUABIICAD5qmd+ktF6EXInN7yowrwaBuYWpyXP3aQyH # EtIGQV1tlwrweDQqP+vrVDYUQsEXdFSxoYVVWBUI45AzCGMJpB3nISqg2pA2Dso9 # 8efaKvi2wyMYBIDbZ7g7nU53WfM++cV311BqyffCSGMpU06jqkOTriUTYHjS1W6Y # A0YX9FN5TA1mdGqWPxyek5cVFrH7fwMd9JDlQDbh4DO2hI0r8pXluyBkLkaKqtA0 # yLOJ6n9Oy8ecmuZ4rWZiclCmTK+SbMJxRClM20C+wa2fl7ebXa677MnWBFf1f0iw # srMb0GJ+egAXbLnjcwcWpPBAfBkjHh5ppSRul3KdWfm7zD1vZwhB2UlGF97S+5n9 # LaAgTty+Wh0/qdtpkJ7duLyIeWrVG/+KTSfiZn+zoukCyZ8WDDLrSMYbcPdPCm50 # JQ09ttzpLW5y90zrZsVDiEIAGn8UDIhr39jdR6HZuXZIaoG1jkqopNlhOh4IjoZf # 441GkaTiYNkQlSL4kyRsU9+LNeA2EpMWnYAd3BX+sjtEjDvK4B9l6Ww26Juza4ws # gZdtwzuLanhYecY/ioVE1uRlxp8wAIkUVbz8Msy1FqAFjqxma+5mVbe++9hf6KXa # /TLL+T6m+zBQC7ipNeJ1wC6lRTitONWX5osRYRwGp0DDGtuyrMXCG5ChIvE5hqQI # rFnrmpBh # SIG # End signature block
0
sample_18_12.ps1
Add-AppxPackage exit cd C:\Users\sampler-win_10_x64\Desktop\ Get-AppxPackage >apps.tx cd C:\Users\sampler-win_10_x64\Desktop\ Get-AppxPackage -allusers | Select Name, PackageFullName > apps_v2.txt Get-AppxPackage | Select Name, PackageFullName > apps_v2.txt Get-AppxPackage Get-AppxPackage -Online Get-AppxPackage -h Get-AppxPackage help Get-help -Name Get-AppxPackage Get-help -Name Add-AppxPackage Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize > C:\Users\sampler-win_10_x64\Desktop\InstalledPrograms-PS.txt Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize cd .. ls /l ls cd .\sampler-win_10_x64\ ls cd .\Downloads\ ls sha1sum .\shockwave-12.3.5.205-installer.exe sha1sum shockwave-12.3.5.205-installer.exe shasum shockwave-12.3.5.205-installer.exe Get-FileHash shockwave-12.3.5.205-installer.exe sha1 Get-FileHash shockwave-12.3.5.205-installer.exe SHA1 Get-FileHash shockwave-12.3.5.205-installer.exe Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA! Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA1 Get-FileHash Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads - Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Alhorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Algorithm SHA1 clear Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SlackSetup.exe -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\ZoomInstallerFull.exe -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\PBIDesktopSetup_x64.exe -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\atlassian-jira-software-9.13.0-x64.exe -Algorithm SHA1 cd ‪C:\Program Files\WindowsApps cd C:\Program Files\WindowsApps ls cd .. ll ls cd .. ls cd '.\Program Files\' ls dir -Force Get-ACL -Path .\WindowsApps\ ls pwd $filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (5).exe" $hash = Get-FileHash -Path $filePath -Algorithm SHA1 Write-Output $hash.Hash.ToLower() $filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeStandaloneSetup.exe" $hash = Get-FileHash -Path $filePath -Algorithm SHA1 Write-Output $hash.Hash.ToLower() $filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (6).exe" $hash = Get-FileHash -Path $filePath -Algorithm SHA1 Write-Output $hash.Hash.ToLower() $filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (6).exe" $hash = Get-FileHash -Path $filePath -Algorithm SHA1 Write-Output $hash.Hash.ToLower() Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ASE_Suite.winx64 (1).zip" -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\ASE_Suite.linuxamd64.tgz -Algorithm SHA1 Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\CR202003P_300-70005715 (1).EXE" -Algorithm SHA1 Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ChromeStandaloneSetup64 (2).exe" -Algorithm SHA1 Get-FileHash -Parth "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (14).exe" -Algorithm SHA1 Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (14).exe" -Algorithm SHA1
0
1074.ps1
& (Join-Path -Path $PSScriptRoot 'Initialize-CarbonTest.ps1' -Resolve) Describe 'Read-File' { $file = '' function Lock-File { param( $Seconds ) Start-Job -ScriptBlock { $file = [IO.File]::Open($using:file, 'Open', 'Read', 'None') try { Start-Sleep -Seconds $using:Seconds } finally { $file.Close() } } do { Start-Sleep -Milliseconds 100 Write-Debug -Message ('Waiting for hosts file to get locked.') } while( (Get-Content -Path $file -ErrorAction SilentlyContinue ) ) $Global:Error.Clear() } BeforeEach { $Global:Error.Clear() $file = Join-Path -Path 'TestDrive:' -ChildPath ([IO.Path]::GetRandomFileName()) New-Item -Path $file -ItemType 'File' $file = Get-Item -Path $file | Select-Object -ExpandProperty 'FullName' } It 'should read multiple lines' { @( 'a', 'b' ) | Set-Content -Path $file $contents = Read-File -Path $file $contents.Count | Should Be 2 $contents[0] | Should Be 'a' $contents[1] | Should Be 'b' } It 'should read one line' { 'a' | Write-File -Path $file $contents = Read-File -Path $file $contents | Should Be 'a' } It 'should read empty file' { Clear-Content -Path $file $contents = Read-File -Path $file ,$contents | Should BeNullOrEmpty } It 'should read raw file' { @( 'a', 'b' ) | Set-Content -Path $file $content = Read-File -Path $file -Raw $content | Should Be ("a{0}b{0}" -f [Environment]::NewLine) } It 'should wait while file is in use' { 'b' | Set-Content -Path $file $job = Lock-File -Seconds 1 try { Read-File -Path $file | Should Be 'b' $Global:Error.Count | Should Be 0 } finally { $job | Wait-Job | Receive-Job | Write-Debug } } It 'should wait while file is in use and $Global:Error is full' { 'b' | Set-Content -Path $file $job = Lock-File -Seconds 1 try { 1..256 | ForEach-Object { Write-Error -Message $_ -ErrorAction SilentlyContinue } Read-File -Path $file | Should Be 'b' $Global:Error.Count | Should Be 256 } finally { $job | Wait-Job | Receive-Job | Write-Debug } } return It 'should control how long to wait for file to be released and report final error' { 'b' | Set-Content -Path $file $job = Lock-File -Seconds 1 try { Read-File -Path $file -MaximumTries 1 -RetryDelayMilliseconds 100 -ErrorAction SilentlyContinue | Should BeNullOrEmpty Read-File -Path $file -MaximumTries 1 -RetryDelayMilliseconds 100 -Raw -ErrorAction SilentlyContinue| Should BeNullOrEmpty $Global:Error.Count | Should Be 2 $Global:Error | Should Match 'cannot access the file' } finally { $job | Wait-Job | Receive-Job | Write-Debug } } It 'should report errors with ErrorVariable parameter' { 'b' | Set-Content -Path $file $job = Lock-File -Seconds 1 try { $result = Read-File -Path $file -MaximumTries 1 -ErrorVariable 'cmdErrors' -ErrorAction SilentlyContinue ,$result | Should BeNullOrEmpty ,$cmdErrors | Should Not BeNullOrEmpty $cmdErrors.Count | Should BeGreaterThan 0 $cmdErrors | Should Match 'cannot access the file' $Global:Error.Clear() $result = Read-File -Path $file -MaximumTries 1 -Raw -ErrorVariable 'cmdErrors2' -ErrorAction SilentlyContinue ,$result | Should BeNullOrEmpty ,$cmdErrors2 | Should Not BeNullOrEmpty $cmdErrors2.Count | Should BeGreaterThan 0 $cmdErrors2 | Should Match 'cannot access the file' } finally { $job | Wait-Job | Receive-Job | Write-Debug } } }
0
1339.ps1
function Write-IisVerbose { [CmdletBinding()] param( [Parameter(Mandatory=$true,Position=0)] [string] $SiteName, [string] $VirtualPath = '', [Parameter(Position=1)] [string] $Name, [Parameter(Position=2)] [string] $OldValue = '', [Parameter(Position=3)] [string] $NewValue = '' ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( $VirtualPath ) { $SiteName = Join-CIisVirtualPath -Path $SiteName -ChildPath $VirtualPath } Write-Verbose -Message ('[IIS Website] [{0}] {1,-34} {2} -> {3}' -f $SiteName,$Name,$OldValue,$NewValue) }
0
sample_14_15.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. Microsoft.PowerShell.Utility\Import-LocalizedData -BindingVariable Strings -FileName Strings -ErrorAction Ignore Microsoft.PowerShell.Management\Get-ChildItem -Path $PSScriptRoot\Public\*.ps1 | ForEach-Object { . $PSItem.FullName } Microsoft.PowerShell.Core\Export-ModuleMember -Function *-* # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCxzWVnoLm+Off/ # EuS1SBLlYtZ1Hmypby+DEJ4ZfmaDiKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOy8 # SoXPA3rfUjQPvd8Y5JtxDAc9SiKTWT8bTQ3kP60FMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAb2dS7bZ3WxV8SP0LGnMVscSrNh3VQndQUt4m # WTGbY1BE4bMh2t6v80pPDHYpa0eInUuKPAyt4Kp92HZ+8DarcdDb3jl95MSZDsvk # 8zYj/bb3NYxPCwUp4VoY7U2Tc0RL3rxQZigCT9e7P0Owtpqcq4Y3oeG8ORH+9TSS # oUAXq+6KyD4huvqcPyCdIDr4/RiwdNGd9XIZz43IsACMcAsTcfU+YPHwQP2zERlR # wULB56yWD78RFLC4oiypdQq2yaXpUzguzvqiL9v9fJqb25F7irjla+SrgU8ILGvs # RcQIQDcKBI6e51Eu72NwlPN1MNLaQh47VnbBslfJQxFTx33SdqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCiIcNhBDv2X6FcqLgN+J1xlfZxPReWE4JO # mgR4muO5ggIGZZ/pixEVGBMyMDI0MDEyNjAyMjcxMC44NzVaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdB3CKrvoxfG3QAB # AAAB0DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzA1MjUxOTEyMTRaFw0yNDAyMDExOTEyMTRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDfMlfn35fvM0XAUSmI5qiG # 0UxPi25HkSyBgzk3zpYO311d1OEEFz0QpAK23s1dJFrjB5gD+SMw5z6EwxC4CrXU # 9KaQ4WNHqHrhWftpgo3MkJex9frmO9MldUfjUG56sIW6YVF6YjX+9rT1JDdCDHbo # 5nZiasMigGKawGb2HqD7/kjRR67RvVh7Q4natAVu46Zf5MLviR0xN5cNG20xwBwg # ttaYEk5XlULaBH5OnXz2eWoIx+SjDO7Bt5BuABWY8SvmRQfByT2cppEzTjt/fs0x # p4B1cAHVDwlGwZuv9Rfc3nddxgFrKA8MWHbJF0+aWUUYIBR8Fy2guFVHoHeOze7I # sbyvRrax//83gYqo8c5Z/1/u7kjLcTgipiyZ8XERsLEECJ5ox1BBLY6AjmbgAzDd # Nl2Leej+qIbdBr/SUvKEC+Xw4xjFMOTUVWKWemt2khwndUfBNR7Nzu1z9L0Wv7TA # Y/v+v6pNhAeohPMCFJc+ak6uMD8TKSzWFjw5aADkmD9mGuC86yvSKkII4MayzoUd # seT0nfk8Y0fPjtdw2Wnejl6zLHuYXwcDau2O1DMuoiedNVjTF37UEmYT+oxC/OFX # UGPDEQt9tzgbR9g8HLtUfEeWOsOED5xgb5rwyfvIss7H/cdHFcIiIczzQgYnsLyE # GepoZDkKhSMR5eCB6Kcv/QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDPhAYWS0oA+ # lOtITfjJtyl0knRRMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCXh+ckCkZaA06S # NW+qxtS9gHQp4x7G+gdikngKItEr8otkXIrmWPYrarRWBlY91lqGiilHyIlZ3iNB # UbaNEmaKAGMZ5YcS7IZUKPaq1jU0msyl+8og0t9C/Z26+atx3vshHrFQuSgwTHZV # pzv7k8CYnBYoxdhI1uGhqH595mqLvtMsxEN/1so7U+b3U6LCry5uwwcz5+j8Oj0G # UX3b+iZg+As0xTN6T0Qa8BNec/LwcyqYNEaMkW2VAKrmhvWH8OCDTcXgONnnABQH # BfXK/fLAbHFGS1XNOtr62/iaHBGAkrCGl6Bi8Pfws6fs+w+sE9r3hX9Vg0gsRMoH # RuMaiXsrGmGsuYnLn3AwTguMatw9R8U5vJtWSlu1CFO5P0LEvQQiMZ12sQSsQAkN # DTs9rTjVNjjIUgoZ6XPMxlcPIDcjxw8bfeb4y4wAxM2RRoWcxpkx+6IIf2L+b7gL # HtBxXCWJ5bMW7WwUC2LltburUwBv0SgjpDtbEqw/uDgWBerCT+Zty3Nc967iGaQj # yYQH6H/h9Xc8smm2n6VjySRx2swnW3hr6Qx63U/xY9HL6FNhrGiFED7ZRKrnwvvX # vMVQUIEkB7GUEeN6heY8gHLt0jLV3yzDiQA8R8p5YGgGAVt9MEwgAJNY1iHvH/8v # zhJSZFNkH8svRztO/i3TvKrjb8ZxwjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQC8t8hT8KKUX91lU5FqRP9Cfu9MiaCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6V2FQDAi # GA8yMDI0MDEyNjAxMTEyOFoYDzIwMjQwMTI3MDExMTI4WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpXYVAAgEAMAcCAQACAgORMAcCAQACAhNqMAoCBQDpXtbAAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBADfZHZYexaQQJ+BL0oR9FCkI2VXT # K3PKXF8z/F20+J/NDw1bOOvdoJIQBOj0Cynyg5hWZhVIHHtwDlo/sMwHkwxt//oI # KwTomWc73qQTAwbqOpSeAFoMdCqGJ8SiBRHFv4E1V0f+BsAAF1jQI744Rg+z0lvu # raIHfqZyR+d8TI3s7mahM5M7xuBW+94QOQDfDLOVxcW3sxnBHDmB5bI9XNW1x6M4 # 6/rnLI8qUWs1hhWBMSdJ7IgcdI2lwRB6GHdmDVAsmWCim+JzLGoGNr1quYaAJhoH # X0UmOJ29zKh0Xbk7c0PyfeHpFtsESzoso1ILa9Ehy1rjq8+tvjlcxQSGvhAxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdB3 # CKrvoxfG3QABAAAB0DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCBIpghnZ2Y7U8RIeQ/+OI6svZs # 35e+BBx/0wxTYeQZiTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIAiVQAZf # tNP/Md1E2Yw+fBXa9w6fjmTZ5WAerrTSPwnXMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHQdwiq76MXxt0AAQAAAdAwIgQgm5S8mLJS # a8/pPK6vdacrZmPJEAl91aLZzCTISTtXJ3wwDQYJKoZIhvcNAQELBQAEggIAKxc5 # j4TS6Ewo64xq2dKGgJT54uywk2DmPlksAsrbrmYVDszGkPLj2a3Ax56hhG9rRlJz # GbdBFzK91JFyVYKalu98/vxEI4goJ7wFy2yp3kpz2SSV7d+4PoOyTpIaxu70v6/R # m4guNowVh+JRY6u/HttbCwZ29VaPfd+DtV7W12fxFly8Yp1ULKfZQoAfvNwa26P5 # 8CXnWjXhUvKRHVi7dfnIm53w6mVaZ5ZzeJCOIJP20CEo3DAlpTdE+28wmnT3eozS # cBznJQExsHirG9A8JUnjVLQjZ+8WFdJ3jYOOwWIWJeLK/3J6zQThwEliMsVx5fb4 # OEiwE9ATq2ZHUs1RalKcAdOD1Xe0jMJQzdP+qhmM0eEUmjSl93IoCmdT0dIrn2b+ # WZbPipDDvXwAsOr+QaaYyVhYOFLKFfaSXQwmmjm8ed4eWT7WcNrS8UqH12zTbvtQ # Ryuj7RglkY2oaVtjc2J4+TThGw+UKNcQLA+Nb8w+wbUuA8pNcSlufeqhEb5CplIK # teRd9fRImVjSl2gNDUidAUMcZFvLZ5gjGLXF3Wz10TUYikc3v0uEPivWxHF0urq4 # VZoeo4L+s3SvFCGSSkDbKU7xBT/Nz+R4GYkW9fh3h2e3DEnOExBnAmHznE5F6ZgR # 6XSJuBcv2ANnGRO6g7a0LWGzd3MYObQUQz4XUgs= # SIG # End signature block
0
26.ps1
. $PSScriptRoot\Shared.ps1 function GetMacOSAdjustedTempPath($Path) { if (($PSVersionTable.PSVersion.Major -ge 6) -and $IsMacOS) { return "/private${Path}" } $Path } Describe 'Get-GitDiretory Tests' { Context "Test normal repository" { BeforeAll { [System.Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssigments', '')] $origPath = Get-Location } AfterAll { Set-Location $origPath } It 'Returns $null for not a Git repo' { Set-Location $env:windir Get-GitDirectory | Should BeNullOrEmpty } It 'Returns $null for not a filesystem path' { Set-Location Alias:\ Get-GitDirectory | Should BeNullOrEmpty } It 'Returns correct path when in the root of repo' { $repoRoot = (Resolve-Path $PSScriptRoot\..).Path Set-Location $repoRoot Get-GitDirectory | Should BeExactly (MakeNativePath $repoRoot\.git) } It 'Returns correct path when under a child folder of the root of repo' { $repoRoot = (Resolve-Path $PSScriptRoot\..).Path Set-Location $PSScriptRoot Get-GitDirectory | Should BeExactly (Join-Path $repoRoot .git) } } Context 'Test worktree' { BeforeEach { [System.Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssigments', '')] $origPath = Get-Location $temp = [System.IO.Path]::GetTempPath() $repoPath = Join-Path $temp ([IO.Path]::GetRandomFileName()) $worktreePath = Join-Path $temp ([IO.Path]::GetRandomFileName()) &$gitbin init $repoPath Set-Location $repoPath &$gitbin config user.email "you@example.com" &$gitbin config user.name "Pester User" 'foo' > ./README.md &$gitbin add ./README.md &$gitbin commit -m "`"initial commit.`"" if (Test-Path $worktreePath) { Remove-Item $worktreePath -Recurse -Force } New-Item $worktreePath -ItemType Directory > $null &$gitbin worktree add -b test-worktree $worktreePath master 2>$null } AfterEach { Set-Location $origPath if (Test-Path $repoPath) { Remove-Item $repoPath -Recurse -Force } if (Test-Path $worktreePath) { Remove-Item $worktreePath -Recurse -Force } } It 'Returns the correct dir when under a worktree' { Set-Location $worktreePath $worktreeBaseName = Split-Path $worktreePath -Leaf $path = GetMacOSAdjustedTempPath $repoPath Get-GitDirectory | Should BeExactly (MakeGitPath $path\.git\worktrees\$worktreeBaseName) } } Context 'Test bare repository' { BeforeAll { [System.Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssigments', '')] $origPath = Get-Location $temp = [System.IO.Path]::GetTempPath() $bareRepoName = "test.git" $bareRepoPath = Join-Path $temp $bareRepoName if (Test-Path $bareRepoPath) { Remove-Item $bareRepoPath -Recurse -Force } &$gitbin init --bare $bareRepoPath } AfterAll { Set-Location $origPath if (Test-Path $bareRepoPath) { Remove-Item $bareRepoPath -Recurse -Force } } It 'Returns correct path when in the root of bare repo' { Set-Location $bareRepoPath Get-GitDirectory | Should BeExactly (MakeNativePath $bareRepoPath) } It 'Returns correct path when under a child folder of the root of bare repo' { Set-Location $bareRepoPath\hooks -ErrorVariable Stop $path = GetMacOSAdjustedTempPath $bareRepoPath Get-GitDirectory | Should BeExactly (MakeNativePath $path) } } Context "Test GIT_DIR environment variable" { AfterAll { Remove-Item Env:\GIT_DIR -ErrorAction SilentlyContinue } It 'Returns the value in GIT_DIR env var' { $env:GIT_DIR = MakeNativePath '/xyzzy/posh-git/.git' Get-GitDirectory | Should BeExactly $env:GIT_DIR } } }
0
3032.ps1
Set-StrictMode -Version Latest InModuleScope Pester { Describe "Should -FileContentMatchMultiline" { Context "when testing file contents" { Setup -File "test.txt" "this is line 1$([System.Environment]::NewLine)this is line 2$([System.Environment]::NewLine)Pester is awesome" It "returns true if the file matches the specified content on one line" { "$TestDrive\test.txt" | Should FileContentMatchMultiline "Pester" } It "returns true if the file matches the specified content across multiple lines" { "$TestDrive\test.txt" | Should FileContentMatchMultiline "line 2$([System.Environment]::NewLine)Pester" } It "returns false if the file does not contain the specified content" { "$TestDrive\test.txt" | Should Not FileContentMatchMultiline "Pastor" } } It 'returns correct assertion message when' { $path = 'TestDrive:\file.txt' 'abc' | Set-Content -Path $path $err = { $path | Should -FileContentMatchMultiline 'g' -Because 'reason' } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal "Expected 'g' to be found in file 'TestDrive:\file.txt', because reason, but it was not found." } } Describe "Should -Not -FileContentMatchMultiline" { It 'returns correct assertion message' { $path = 'TestDrive:\file.txt' 'abc' | Set-Content -Path $path $err = { $path | Should -Not -FileContentMatchMultiline 'a' -Because 'reason' } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal "Expected 'a' to not be found in file 'TestDrive:\file.txt', because reason, but it was found." } } }
0
Get-DefragAnalysis_1.ps1
# defrag_analysis.ps1 # # Displays Defrag Analysis Info for a remote server. # # Author: tojo2000@tojo2000.com Set-PSDebug -Strict` trap [Exception] { continue } function GenerateForm { [reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null [reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null $form1 = New-Object System.Windows.Forms.Form $richTextBox1 = New-Object System.Windows.Forms.RichTextBox $textBox1 = New-Object System.Windows.Forms.TextBox $button1 = New-Object System.Windows.Forms.Button $handler_button1_Click = { $richTextBox1.Text = '' $volumes = @(gwmi Win32_Volume -ComputerName $textBox1.Text ` -Filter 'DriveType = 3') foreach ($volume in $volumes) { $analysis = $volume.DefragAnalysis().DefragAnalysis Write-TextBox "Drive : $($volume.DriveLetter)" Write-TextBox "Volume Name : $($analysis.VolumeName)" Write-TextBox ("Volume Size : " + "{0:0.00}GB" -f ($analysis.VolumeSize/1GB)) Write-TextBox "Total Fragmentation : $($analysis.TotalPercentFragmentation)%" Write-TextBox "" Write-TextBox "Free Space : $($analysis.FreeSpacePercent)%" Write-TextBox ("Free Space Frag. : " + "$($analysis.FreeSpacePercentFragmentation)%") Write-TextBox "" Write-TextBox "Files : $($analysis.TotalFiles)" Write-TextBox "Fragmented Files : $($analysis.TotalFragmentedFiles)" Write-TextBox "File Fragmentation : $($analysis.FilePercentFragmentation)%" Write-TextBox "" Write-TextBox "Folders : $($analysis.TotalFolders)" Write-TextBox "Fragmented Folders : $($analysis.FragmentedFolders)" Write-TextBox "" Write-TextBox "MFT Usage : $($analysis.MFTPercentInUse)%" Write-TextBox "MFT Fragments : $($analysis.TotalMFTFragments)" Write-TextBox "MFT Records : $($analysis.MFTRecordCount)" Write-TextBox "" Write-TextBox ("PageFile Size : " + "{0:0.00}GB" -f ($analysis.PageFileSize/1GB)) Write-TextBox "PageFile Fragments : $($analysis.TotalPageFileFragments)" Write-TextBox "" Write-TextBox "----------------------------" } } $handler_form1_Load = { $textBox1.Select() } $form1.Name = 'form1' $form1.Text = 'Defrag Info 1.0' $form1.BackColor = [System.Drawing.Color]::FromArgb(255,227,227,227) $form1.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 428 $System_Drawing_Size.Height = 404 $form1.ClientSize = $System_Drawing_Size $form1.add_Load($handler_form1_Load) $richTextBox1.Text = '' $richTextBox1.TabIndex = 2 $richTextBox1.Name = 'richTextBox1' $richTextBox1.Font = New-Object System.Drawing.Font("Courier New",10,0,3,0) $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 343 $System_Drawing_Size.Height = 315 $richTextBox1.Size = $System_Drawing_Size $richTextBox1.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 40 $System_Drawing_Point.Y = 61 $richTextBox1.Location = $System_Drawing_Point $form1.Controls.Add($richTextBox1) $textBox1.Text = '<Enter Server Name>' $textBox1.Name = 'textBox1' $textBox1.TabIndex = 1 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 250 $System_Drawing_Size.Height = 20 $textBox1.Size = $System_Drawing_Size $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 40 $System_Drawing_Point.Y = 21 $textBox1.Location = $System_Drawing_Point $textBox1.DataBindings.DefaultDataSourceUpdateMode = 0 $form1.Controls.Add($textBox1) $button1.UseVisualStyleBackColor = $True $button1.Text = 'Analyze' $button1.DataBindings.DefaultDataSourceUpdateMode = 0 $button1.TabIndex = 0 $button1.Name = 'button1' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 75 $System_Drawing_Size.Height = 23 $button1.Size = $System_Drawing_Size $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 308 $System_Drawing_Point.Y = 19 $button1.Location = $System_Drawing_Point $button1.add_Click($handler_button1_Click) $form1.Controls.Add($button1) $form1.ShowDialog()| Out-Null } function Write-TextBox { param([string]$text) $richTextBox1.Text += "$text`n" } # Launch the form GenerateForm
0
sample_55_42.ps1
""" Microsoft IIS site management via WebAdministration powershell module :maintainer: Shane Lee <slee@saltstack.com>, Robert Booth <rbooth@saltstack.com> :platform: Windows :depends: PowerShell :depends: WebAdministration module (PowerShell) (IIS) .. versionadded:: 2016.3.0 """ import decimal import logging import os import re import salt.utils.json import salt.utils.platform import salt.utils.yaml from salt.exceptions import CommandExecutionError, SaltInvocationError log = logging.getLogger(__name__) _DEFAULT_APP = "/" _VALID_PROTOCOLS = ("ftp", "http", "https") _VALID_SSL_FLAGS = tuple(range(0, 4)) # Define the module's virtual name __virtualname__ = "win_iis" def __virtual__(): """ Load only on Windows Requires PowerShell and the WebAdministration module """ if not salt.utils.platform.is_windows(): return False, "Only available on Windows systems" powershell_info = __salt__["cmd.shell_info"]("powershell", True) if not powershell_info["installed"]: return False, "PowerShell not available" if "WebAdministration" not in powershell_info["modules"]: return False, "IIS is not installed" return __virtualname__ def _get_binding_info(host_header="", ip_address="*", port=80): """ Combine the host header, IP address, and TCP port into bindingInformation format. Binding Information specifies information to communicate with a site. It includes the IP address, the port number, and an optional host header (usually a host name) to communicate with the site. Args: host_header (str): Usually a hostname ip_address (str): The IP address port (int): The port Returns: str: A properly formatted bindingInformation string (IP:port:hostheader) eg: 192.168.0.12:80:www.contoso.com """ return ":".join([ip_address, str(port), host_header.replace(" ", "")]) def _list_certs(certificate_store="My"): """ List details of available certificates in the LocalMachine certificate store. Args: certificate_store (str): The name of the certificate store on the local machine. Returns: dict: A dictionary of certificates found in the store """ ret = dict() blacklist_keys = ["DnsNameList", "Thumbprint"] ps_cmd = [ "Get-ChildItem", "-Path", rf"'Cert:\LocalMachine\{certificate_store}'", "|", "Select-Object DnsNameList, SerialNumber, Subject, Thumbprint, Version", ] cmd_ret = _srvmgr(cmd=ps_cmd, return_json=True) try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) except ValueError: raise CommandExecutionError("Unable to parse return data as Json.") for item in items: cert_info = dict() for key in item: if key not in blacklist_keys: cert_info[key.lower()] = item[key] cert_info["dnsnames"] = [] if item["DnsNameList"]: cert_info["dnsnames"] = [name["Unicode"] for name in item["DnsNameList"]] ret[item["Thumbprint"]] = cert_info return ret def _iisVersion(): pscmd = [] pscmd.append(r"Get-ItemProperty HKLM:\\SOFTWARE\\Microsoft\\InetStp\\") pscmd.append(" | Select-Object MajorVersion, MinorVersion") cmd_ret = _srvmgr(pscmd, return_json=True) try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) except ValueError: log.error("Unable to parse return data as Json.") return -1 return decimal.Decimal( "{}.{}".format(items[0]["MajorVersion"], items[0]["MinorVersion"]) ) def _srvmgr(cmd, return_json=False): """ Execute a powershell command from the WebAdministration PS module. Args: cmd (list): The command to execute in a list return_json (bool): True formats the return in JSON, False just returns the output of the command. Returns: str: The output from the command """ if isinstance(cmd, list): cmd = " ".join(cmd) if return_json: cmd = f"ConvertTo-Json -Compress -Depth 4 -InputObject @({cmd})" cmd = f"Import-Module WebAdministration; {cmd}" ret = __salt__["cmd.run_all"](cmd, shell="powershell", python_shell=True) if ret["retcode"] != 0: log.error("Unable to execute command: %s\nError: %s", cmd, ret["stderr"]) return ret def _collection_match_to_index(pspath, colfilter, name, match): """ Returns index of collection item matching the match dictionary. """ collection = get_webconfiguration_settings( pspath, [{"name": name, "filter": colfilter}] )[0]["value"] for idx, collect_dict in enumerate(collection): if all(item in collect_dict.items() for item in match.items()): return idx return -1 def _prepare_settings(pspath, settings): """ Prepare settings before execution with get or set functions. Removes settings with a match parameter when index is not found. """ prepared_settings = [] for setting in settings: if setting.get("name", None) is None: log.warning("win_iis: Setting has no name: %s", setting) continue if setting.get("filter", None) is None: log.warning("win_iis: Setting has no filter: %s", setting) continue match = re.search(r"Collection\[(\{.*\})\]", setting["name"]) if match: name = setting["name"][: match.start(1) - 1] match_dict = salt.utils.yaml.load(match.group(1)) index = _collection_match_to_index( pspath, setting["filter"], name, match_dict ) if index == -1: log.warning("win_iis: No match found for setting: %s", setting) else: setting["name"] = setting["name"].replace(match.group(1), str(index)) prepared_settings.append(setting) else: prepared_settings.append(setting) return prepared_settings def list_sites(): """ List all the currently deployed websites. Returns: dict: A dictionary of the IIS sites and their properties. CLI Example: .. code-block:: bash salt '*' win_iis.list_sites """ ret = dict() ps_cmd = [ "Get-ChildItem", "-Path", r"'IIS:\Sites'", "|", "Select-Object applicationPool, Bindings, ID, Name, PhysicalPath, State", ] keep_keys = ("certificateHash", "certificateStoreName", "protocol", "sslFlags") cmd_ret = _srvmgr(cmd=ps_cmd, return_json=True) try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) except ValueError: raise CommandExecutionError("Unable to parse return data as Json.") for item in items: bindings = dict() for binding in item["bindings"]["Collection"]: # Ignore bindings which do not have host names if binding["protocol"] not in ["http", "https"]: continue filtered_binding = dict() for key in binding: if key in keep_keys: filtered_binding.update({key.lower(): binding[key]}) binding_info = binding["bindingInformation"].split(":", 2) ipaddress, port, hostheader = (element.strip() for element in binding_info) filtered_binding.update( {"hostheader": hostheader, "ipaddress": ipaddress, "port": port} ) bindings[binding["bindingInformation"]] = filtered_binding ret[item["name"]] = { "apppool": item["applicationPool"], "bindings": bindings, "id": item["id"], "state": item["state"], "sourcepath": item["physicalPath"], } if not ret: log.warning("No sites found in output: %s", cmd_ret["stdout"]) return ret def create_site( name, sourcepath, apppool="", hostheader="", ipaddress="*", port=80, protocol="http" ): """ Create a basic website in IIS. .. note:: This function only validates against the site name, and will return True even if the site already exists with a different configuration. It will not modify the configuration of an existing site. Args: name (str): The IIS site name. sourcepath (str): The physical path of the IIS site. apppool (str): The name of the IIS application pool. hostheader (str): The host header of the binding. Usually the hostname or website name, ie: www.contoso.com ipaddress (str): The IP address of the binding. port (int): The TCP port of the binding. protocol (str): The application protocol of the binding. (http, https, etc.) Returns: bool: True if successful, otherwise False. .. note:: If an application pool is specified, and that application pool does not already exist, it will be created. CLI Example: .. code-block:: bash salt '*' win_iis.create_site name='My Test Site' sourcepath='c:\\stage' apppool='TestPool' """ protocol = str(protocol).lower() site_path = rf"IIS:\Sites\{name}" binding_info = _get_binding_info(hostheader, ipaddress, port) current_sites = list_sites() if name in current_sites: log.debug("Site '%s' already present.", name) return True if protocol not in _VALID_PROTOCOLS: message = "Invalid protocol '{}' specified. Valid formats: {}".format( protocol, _VALID_PROTOCOLS ) raise SaltInvocationError(message) ps_cmd = [ "New-Item", "-Path", rf"'{site_path}'", "-PhysicalPath", rf"'{sourcepath}'", "-Bindings", "@{{ protocol='{0}'; bindingInformation='{1}' }};".format( protocol, binding_info ), ] if apppool: if apppool in list_apppools(): log.debug("Utilizing pre-existing application pool: %s", apppool) else: log.debug("Application pool will be created: %s", apppool) create_apppool(apppool) ps_cmd.extend( [ "Set-ItemProperty", "-Path", f"'{site_path}'", "-Name", "ApplicationPool", "-Value", f"'{apppool}'", ] ) cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to create site: {}\nError: {}".format(name, cmd_ret["stderr"]) raise CommandExecutionError(msg) log.debug("Site created successfully: %s", name) return True def modify_site(name, sourcepath=None, apppool=None): """ Modify a basic website in IIS. .. versionadded:: 2017.7.0 Args: name (str): The IIS site name. sourcepath (str): The physical path of the IIS site. apppool (str): The name of the IIS application pool. Returns: bool: True if successful, otherwise False. .. note:: If an application pool is specified, and that application pool does not already exist, it will be created. CLI Example: .. code-block:: bash salt '*' win_iis.modify_site name='My Test Site' sourcepath='c:\\new_path' apppool='NewTestPool' """ site_path = rf"IIS:\Sites\{name}" current_sites = list_sites() if name not in current_sites: log.debug("Site '%s' not defined.", name) return False ps_cmd = list() if sourcepath: ps_cmd.extend( [ "Set-ItemProperty", "-Path", rf"'{site_path}'", "-Name", "PhysicalPath", "-Value", rf"'{sourcepath}'", ] ) if apppool: if apppool in list_apppools(): log.debug("Utilizing pre-existing application pool: %s", apppool) else: log.debug("Application pool will be created: %s", apppool) create_apppool(apppool) # If ps_cmd isn't empty, we need to add a semi-colon to run two commands if ps_cmd: ps_cmd.append(";") ps_cmd.extend( [ "Set-ItemProperty", "-Path", rf"'{site_path}'", "-Name", "ApplicationPool", "-Value", rf"'{apppool}'", ] ) cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to modify site: {}\nError: {}".format(name, cmd_ret["stderr"]) raise CommandExecutionError(msg) log.debug("Site modified successfully: %s", name) return True def remove_site(name): """ Delete a website from IIS. Args: name (str): The IIS site name. Returns: bool: True if successful, otherwise False .. note:: This will not remove the application pool used by the site. CLI Example: .. code-block:: bash salt '*' win_iis.remove_site name='My Test Site' """ current_sites = list_sites() if name not in current_sites: log.debug("Site already absent: %s", name) return True ps_cmd = ["Remove-WebSite", "-Name", rf"'{name}'"] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to remove site: {}\nError: {}".format(name, cmd_ret["stderr"]) raise CommandExecutionError(msg) log.debug("Site removed successfully: %s", name) return True def stop_site(name): """ Stop a Web Site in IIS. .. versionadded:: 2017.7.0 Args: name (str): The name of the website to stop. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.stop_site name='My Test Site' """ ps_cmd = ["Stop-WebSite", rf"'{name}'"] cmd_ret = _srvmgr(ps_cmd) return cmd_ret["retcode"] == 0 def start_site(name): """ Start a Web Site in IIS. .. versionadded:: 2017.7.0 Args: name (str): The name of the website to start. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.start_site name='My Test Site' """ ps_cmd = ["Start-WebSite", rf"'{name}'"] cmd_ret = _srvmgr(ps_cmd) return cmd_ret["retcode"] == 0 def restart_site(name): """ Restart a Web Site in IIS. .. versionadded:: 2017.7.0 Args: name (str): The name of the website to restart. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.restart_site name='My Test Site' """ return stop_site(name) and start_site(name) def list_bindings(site): """ Get all configured IIS bindings for the specified site. Args: site (str): The name if the IIS Site Returns: dict: A dictionary of the binding names and properties. CLI Example: .. code-block:: bash salt '*' win_iis.list_bindings site """ ret = dict() sites = list_sites() if site not in sites: log.warning("Site not found: %s", site) return ret ret = sites[site]["bindings"] if not ret: log.warning("No bindings found for site: %s", site) return ret def create_binding( site, hostheader="", ipaddress="*", port=80, protocol="http", sslflags=None ): """ Create an IIS Web Binding. .. note:: This function only validates against the binding ipaddress:port:hostheader combination, and will return True even if the binding already exists with a different configuration. It will not modify the configuration of an existing binding. Args: site (str): The IIS site name. hostheader (str): The host header of the binding. Usually a hostname. ipaddress (str): The IP address of the binding. port (int): The TCP port of the binding. protocol (str): The application protocol of the binding. sslflags (str): The flags representing certificate type and storage of the binding. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.create_binding site='site0' hostheader='example.com' ipaddress='*' port='80' """ protocol = str(protocol).lower() name = _get_binding_info(hostheader, ipaddress, port) if protocol not in _VALID_PROTOCOLS: message = "Invalid protocol '{}' specified. Valid formats: {}".format( protocol, _VALID_PROTOCOLS ) raise SaltInvocationError(message) if sslflags: sslflags = int(sslflags) if sslflags not in _VALID_SSL_FLAGS: raise SaltInvocationError( "Invalid sslflags '{}' specified. Valid sslflags range: {}..{}".format( sslflags, _VALID_SSL_FLAGS[0], _VALID_SSL_FLAGS[-1] ) ) current_bindings = list_bindings(site) if name in current_bindings: log.debug("Binding already present: %s", name) return True if sslflags: ps_cmd = [ "New-WebBinding", "-Name", f"'{site}'", "-HostHeader", f"'{hostheader}'", "-IpAddress", f"'{ipaddress}'", "-Port", f"'{port}'", "-Protocol", f"'{protocol}'", "-SslFlags", f"{sslflags}", ] else: ps_cmd = [ "New-WebBinding", "-Name", f"'{site}'", "-HostHeader", f"'{hostheader}'", "-IpAddress", f"'{ipaddress}'", "-Port", f"'{port}'", "-Protocol", f"'{protocol}'", ] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to create binding: {}\nError: {}".format(site, cmd_ret["stderr"]) raise CommandExecutionError(msg) if name in list_bindings(site): log.debug("Binding created successfully: %s", site) return True log.error("Unable to create binding: %s", site) return False def modify_binding( site, binding, hostheader=None, ipaddress=None, port=None, sslflags=None ): """ Modify an IIS Web Binding. Use ``site`` and ``binding`` to target the binding. .. versionadded:: 2017.7.0 Args: site (str): The IIS site name. binding (str): The binding to edit. This is a combination of the IP address, port, and hostheader. It is in the following format: ipaddress:port:hostheader. For example, ``*:80:`` or ``*:80:salt.com`` hostheader (str): The host header of the binding. Usually the hostname. ipaddress (str): The IP address of the binding. port (int): The TCP port of the binding. sslflags (str): The flags representing certificate type and storage of the binding. Returns: bool: True if successful, otherwise False CLI Example: The following will seat the host header of binding ``*:80:`` for ``site0`` to ``example.com`` .. code-block:: bash salt '*' win_iis.modify_binding site='site0' binding='*:80:' hostheader='example.com' """ if sslflags is not None and sslflags not in _VALID_SSL_FLAGS: raise SaltInvocationError( "Invalid sslflags '{}' specified. Valid sslflags range: {}..{}".format( sslflags, _VALID_SSL_FLAGS[0], _VALID_SSL_FLAGS[-1] ) ) current_sites = list_sites() if site not in current_sites: log.debug("Site '%s' not defined.", site) return False current_bindings = list_bindings(site) if binding not in current_bindings: log.debug("Binding '%s' not defined.", binding) return False # Split out the binding so we can insert new ones # Use the existing value if not passed i, p, h = binding.split(":") new_binding = ":".join( [ ipaddress if ipaddress is not None else i, str(port) if port is not None else str(p), hostheader if hostheader is not None else h, ] ) if new_binding != binding: ps_cmd = [ "Set-WebBinding", "-Name", f"'{site}'", "-BindingInformation", f"'{binding}'", "-PropertyName", "BindingInformation", "-Value", f"'{new_binding}'", ] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to modify binding: {}\nError: {}".format( binding, cmd_ret["stderr"] ) raise CommandExecutionError(msg) if ( sslflags is not None and sslflags != current_sites[site]["bindings"][binding]["sslflags"] ): ps_cmd = [ "Set-WebBinding", "-Name", f"'{site}'", "-BindingInformation", f"'{new_binding}'", "-PropertyName", "sslflags", "-Value", f"'{sslflags}'", ] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to modify binding SSL Flags: {}\nError: {}".format( sslflags, cmd_ret["stderr"] ) raise CommandExecutionError(msg) log.debug("Binding modified successfully: %s", binding) return True def remove_binding(site, hostheader="", ipaddress="*", port=80): """ Remove an IIS binding. Args: site (str): The IIS site name. hostheader (str): The host header of the binding. ipaddress (str): The IP address of the binding. port (int): The TCP port of the binding. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.remove_binding site='site0' hostheader='example.com' ipaddress='*' port='80' """ name = _get_binding_info(hostheader, ipaddress, port) current_bindings = list_bindings(site) if name not in current_bindings: log.debug("Binding already absent: %s", name) return True ps_cmd = [ "Remove-WebBinding", "-HostHeader", f"'{hostheader}'", "-IpAddress", f"'{ipaddress}'", "-Port", f"'{port}'", ] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to remove binding: {}\nError: {}".format(site, cmd_ret["stderr"]) raise CommandExecutionError(msg) if name not in list_bindings(site): log.debug("Binding removed successfully: %s", site) return True log.error("Unable to remove binding: %s", site) return False def list_cert_bindings(site): """ List certificate bindings for an IIS site. .. versionadded:: 2016.11.0 Args: site (str): The IIS site name. Returns: dict: A dictionary of the binding names and properties. CLI Example: .. code-block:: bash salt '*' win_iis.list_bindings site """ ret = dict() sites = list_sites() if site not in sites: log.warning("Site not found: %s", site) return ret for binding in sites[site]["bindings"]: if sites[site]["bindings"][binding]["certificatehash"]: ret[binding] = sites[site]["bindings"][binding] if not ret: log.warning("No certificate bindings found for site: %s", site) return ret def create_cert_binding(name, site, hostheader="", ipaddress="*", port=443, sslflags=0): """ Assign a certificate to an IIS Web Binding. .. versionadded:: 2016.11.0 .. note:: The web binding that the certificate is being assigned to must already exist. Args: name (str): The thumbprint of the certificate. site (str): The IIS site name. hostheader (str): The host header of the binding. ipaddress (str): The IP address of the binding. port (int): The TCP port of the binding. sslflags (int): Flags representing certificate type and certificate storage of the binding. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.create_cert_binding name='AAA000' site='site0' hostheader='example.com' ipaddress='*' port='443' """ name = str(name).upper() binding_info = _get_binding_info(hostheader, ipaddress, port) if _iisVersion() < 8: # IIS 7.5 and earlier don't support SNI for HTTPS, therefore cert bindings don't contain the host header binding_info = binding_info.rpartition(":")[0] + ":" binding_path = r"IIS:\SslBindings\{}".format(binding_info.replace(":", "!")) if sslflags not in _VALID_SSL_FLAGS: raise SaltInvocationError( "Invalid sslflags '{}' specified. Valid sslflags range: {}..{}".format( sslflags, _VALID_SSL_FLAGS[0], _VALID_SSL_FLAGS[-1] ) ) # Verify that the target binding exists. current_bindings = list_bindings(site) if binding_info not in current_bindings: log.error("Binding not present: %s", binding_info) return False # Check to see if the certificate is already assigned. current_name = None for current_binding in current_bindings: if binding_info == current_binding: current_name = current_bindings[current_binding]["certificatehash"] log.debug("Current certificate thumbprint: %s", current_name) log.debug("New certificate thumbprint: %s", name) if name == current_name: log.debug("Certificate already present for binding: %s", name) return True # Verify that the certificate exists. certs = _list_certs() if name not in certs: log.error("Certificate not present: %s", name) return False if _iisVersion() < 8: # IIS 7.5 and earlier have different syntax for associating a certificate with a site # Modify IP spec to IIS 7.5 format iis7path = binding_path.replace(r"\*!", "\\0.0.0.0!") # win 2008 uses the following format: ip!port and not ip!port! if iis7path.endswith("!"): iis7path = iis7path[:-1] ps_cmd = [ "New-Item", "-Path", f"'{iis7path}'", "-Thumbprint", f"'{name}'", ] else: ps_cmd = [ "New-Item", "-Path", f"'{binding_path}'", "-Thumbprint", f"'{name}'", "-SSLFlags", f"{sslflags}", ] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to create certificate binding: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) new_cert_bindings = list_cert_bindings(site) if binding_info not in new_cert_bindings: log.error("Binding not present: %s", binding_info) return False if name == new_cert_bindings[binding_info]["certificatehash"]: log.debug("Certificate binding created successfully: %s", name) return True log.error("Unable to create certificate binding: %s", name) return False def remove_cert_binding(name, site, hostheader="", ipaddress="*", port=443): """ Remove a certificate from an IIS Web Binding. .. versionadded:: 2016.11.0 .. note:: This function only removes the certificate from the web binding. It does not remove the web binding itself. Args: name (str): The thumbprint of the certificate. site (str): The IIS site name. hostheader (str): The host header of the binding. ipaddress (str): The IP address of the binding. port (int): The TCP port of the binding. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.remove_cert_binding name='AAA000' site='site0' hostheader='example.com' ipaddress='*' port='443' """ name = str(name).upper() binding_info = _get_binding_info(hostheader, ipaddress, port) # Child items of IIS:\SslBindings do not return populated host header info # in all circumstances, so it's necessary to use IIS:\Sites instead. ps_cmd = [ "$Site = Get-ChildItem", "-Path", r"'IIS:\Sites'", "|", "Where-Object", rf" {{ $_.Name -Eq '{site}' }};", "$Binding = $Site.Bindings.Collection", r"| Where-Object { $_.bindingInformation", rf"-Eq '{binding_info}' }};", "$Binding.RemoveSslCertificate()", ] # Verify that the binding exists for the site, and that the target # certificate is assigned to the binding. current_cert_bindings = list_cert_bindings(site) if binding_info not in current_cert_bindings: log.warning("Binding not found: %s", binding_info) return True if name != current_cert_bindings[binding_info]["certificatehash"]: log.debug("Certificate binding already absent: %s", name) return True cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to remove certificate binding: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) new_cert_bindings = list_cert_bindings(site) if binding_info not in new_cert_bindings: log.warning("Binding not found: %s", binding_info) return True if name != new_cert_bindings[binding_info]["certificatehash"]: log.debug("Certificate binding removed successfully: %s", name) return True log.error("Unable to remove certificate binding: %s", name) return False def list_apppools(): """ List all configured IIS application pools. Returns: dict: A dictionary of IIS application pools and their details. CLI Example: .. code-block:: bash salt '*' win_iis.list_apppools """ ret = dict() ps_cmd = [] ps_cmd.append(r"Get-ChildItem -Path 'IIS:\AppPools' | Select-Object Name, State") # Include the equivalent of output from the Applications column, since this # isn't a normal property, we have to populate it via filtered output from # the Get-WebConfigurationProperty cmdlet. ps_cmd.append(r", @{ Name = 'Applications'; Expression = { $AppPool = $_.Name;") ps_cmd.append("$AppPath = 'machine/webroot/apphost';") ps_cmd.append("$FilterBase = '/system.applicationHost/sites/site/application';") ps_cmd.append("$FilterBase += \"[@applicationPool = '$($AppPool)' and @path\";") ps_cmd.append("$FilterRoot = \"$($FilterBase) = '/']/parent::*\";") ps_cmd.append("$FilterNonRoot = \"$($FilterBase) != '/']\";") ps_cmd.append( "Get-WebConfigurationProperty -Filter $FilterRoot -PsPath $AppPath -Name Name" ) ps_cmd.append(r"| ForEach-Object { $_.Value };") ps_cmd.append( "Get-WebConfigurationProperty -Filter $FilterNonRoot -PsPath $AppPath -Name" " Path" ) ps_cmd.append(r"| ForEach-Object { $_.Value } | Where-Object { $_ -ne '/' }") ps_cmd.append("} }") cmd_ret = _srvmgr(cmd=ps_cmd, return_json=True) try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) except ValueError: raise CommandExecutionError("Unable to parse return data as Json.") for item in items: applications = list() # If there are no associated apps, Applications will be an empty dict, # if there is one app, it will be a string, and if there are multiple, # it will be a dict with 'Count' and 'value' as the keys. if isinstance(item["Applications"], dict): if "value" in item["Applications"]: applications += item["Applications"]["value"] else: applications.append(item["Applications"]) ret[item["name"]] = {"state": item["state"], "applications": applications} if not ret: log.warning("No application pools found in output: %s", cmd_ret["stdout"]) return ret def create_apppool(name): """ Create an IIS application pool. .. note:: This function only validates against the application pool name, and will return True even if the application pool already exists with a different configuration. It will not modify the configuration of an existing application pool. Args: name (str): The name of the IIS application pool. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.create_apppool name='MyTestPool' """ current_apppools = list_apppools() apppool_path = rf"IIS:\AppPools\{name}" if name in current_apppools: log.debug("Application pool '%s' already present.", name) return True ps_cmd = ["New-Item", "-Path", rf"'{apppool_path}'"] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to create application pool: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) log.debug("Application pool created successfully: %s", name) return True def remove_apppool(name): """ Remove an IIS application pool. Args: name (str): The name of the IIS application pool. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.remove_apppool name='MyTestPool' """ current_apppools = list_apppools() apppool_path = rf"IIS:\AppPools\{name}" if name not in current_apppools: log.debug("Application pool already absent: %s", name) return True ps_cmd = ["Remove-Item", "-Path", rf"'{apppool_path}'", "-Recurse"] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to remove application pool: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) log.debug("Application pool removed successfully: %s", name) return True def stop_apppool(name): """ Stop an IIS application pool. .. versionadded:: 2017.7.0 Args: name (str): The name of the App Pool to stop. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.stop_apppool name='MyTestPool' """ ps_cmd = ["Stop-WebAppPool", rf"'{name}'"] cmd_ret = _srvmgr(ps_cmd) return cmd_ret["retcode"] == 0 def start_apppool(name): """ Start an IIS application pool. .. versionadded:: 2017.7.0 Args: name (str): The name of the App Pool to start. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.start_apppool name='MyTestPool' """ ps_cmd = ["Start-WebAppPool", rf"'{name}'"] cmd_ret = _srvmgr(ps_cmd) return cmd_ret["retcode"] == 0 def restart_apppool(name): """ Restart an IIS application pool. .. versionadded:: 2016.11.0 Args: name (str): The name of the IIS application pool. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.restart_apppool name='MyTestPool' """ ps_cmd = ["Restart-WebAppPool", rf"'{name}'"] cmd_ret = _srvmgr(ps_cmd) return cmd_ret["retcode"] == 0 def get_container_setting(name, container, settings): """ Get the value of the setting for the IIS container. .. versionadded:: 2016.11.0 Args: name (str): The name of the IIS container. container (str): The type of IIS container. The container types are: AppPools, Sites, SslBindings settings (dict): A dictionary of the setting names and their values. Returns: dict: A dictionary of the provided settings and their values. CLI Example: .. code-block:: bash salt '*' win_iis.get_container_setting name='MyTestPool' container='AppPools' settings="['processModel.identityType']" """ ret = dict() ps_cmd = list() ps_cmd_validate = list() container_path = rf"IIS:\{container}\{name}" if not settings: log.warning("No settings provided") return ret ps_cmd.append(r"$Settings = @{};") for setting in settings: # Build the commands to verify that the property names are valid. ps_cmd_validate.extend( [ "Get-ItemProperty", "-Path", f"'{container_path}'", "-Name", f"'{setting}'", "-ErrorAction", "Stop", "|", "Out-Null;", ] ) # Some ItemProperties are Strings and others are ConfigurationAttributes. # Since the former doesn't have a Value property, we need to account # for this. ps_cmd.append(f"$Property = Get-ItemProperty -Path '{container_path}'") ps_cmd.append(f"-Name '{setting}' -ErrorAction Stop;") ps_cmd.append(r"if (([String]::IsNullOrEmpty($Property) -eq $False) -and") ps_cmd.append(r"($Property.GetType()).Name -eq 'ConfigurationAttribute') {") ps_cmd.append(r"$Property = $Property | Select-Object") ps_cmd.append(r"-ExpandProperty Value };") ps_cmd.append(f"$Settings['{setting}'] = [String] $Property;") ps_cmd.append(r"$Property = $Null;") # Validate the setting names that were passed in. cmd_ret = _srvmgr(cmd=ps_cmd_validate, return_json=True) if cmd_ret["retcode"] != 0: message = ( "One or more invalid property names were specified for the provided" " container." ) raise SaltInvocationError(message) ps_cmd.append("$Settings") cmd_ret = _srvmgr(cmd=ps_cmd, return_json=True) try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) if isinstance(items, list): ret.update(items[0]) else: ret.update(items) except ValueError: raise CommandExecutionError("Unable to parse return data as Json.") return ret def set_container_setting(name, container, settings): """ Set the value of the setting for an IIS container. .. versionadded:: 2016.11.0 Args: name (str): The name of the IIS container. container (str): The type of IIS container. The container types are: AppPools, Sites, SslBindings settings (dict): A dictionary of the setting names and their values. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.set_container_setting name='MyTestPool' container='AppPools' settings="{'managedPipeLineMode': 'Integrated'}" """ identityType_map2string = { "0": "LocalSystem", "1": "LocalService", "2": "NetworkService", "3": "SpecificUser", "4": "ApplicationPoolIdentity", } identityType_map2numeric = { "LocalSystem": "0", "LocalService": "1", "NetworkService": "2", "SpecificUser": "3", "ApplicationPoolIdentity": "4", } ps_cmd = list() container_path = rf"IIS:\{container}\{name}" if not settings: log.warning("No settings provided") return False # Treat all values as strings for the purpose of comparing them to existing values. for setting in settings: settings[setting] = str(settings[setting]) current_settings = get_container_setting( name=name, container=container, settings=settings.keys() ) if settings == current_settings: log.debug("Settings already contain the provided values.") return True for setting in settings: # If the value is numeric, don't treat it as a string in PowerShell. try: complex(settings[setting]) value = settings[setting] except ValueError: value = f"'{settings[setting]}'" # Map to numeric to support server 2008 if ( setting == "processModel.identityType" and settings[setting] in identityType_map2numeric ): value = identityType_map2numeric[settings[setting]] ps_cmd.extend( [ "Set-ItemProperty", "-Path", f"'{container_path}'", "-Name", f"'{setting}'", "-Value", f"{value};", ] ) cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = f"Unable to set settings for {container}: {name}" raise CommandExecutionError(msg) # Get the fields post-change so that we can verify tht all values # were modified successfully. Track the ones that weren't. new_settings = get_container_setting( name=name, container=container, settings=settings.keys() ) failed_settings = dict() for setting in settings: # map identity type from numeric to string for comparing if ( setting == "processModel.identityType" and settings[setting] in identityType_map2string ): settings[setting] = identityType_map2string[settings[setting]] if str(settings[setting]) != str(new_settings[setting]): failed_settings[setting] = settings[setting] if failed_settings: log.error("Failed to change settings: %s", failed_settings) return False log.debug("Settings configured successfully: %s", settings.keys()) return True def list_apps(site): """ Get all configured IIS applications for the specified site. Args: site (str): The IIS site name. Returns: A dictionary of the application names and properties. CLI Example: .. code-block:: bash salt '*' win_iis.list_apps site """ ret = dict() ps_cmd = list() ps_cmd.append(f"Get-WebApplication -Site '{site}'") ps_cmd.append( r"| Select-Object applicationPool, path, PhysicalPath, preloadEnabled," ) ps_cmd.append(r"@{ Name='name'; Expression={ $_.path.Split('/', 2)[-1] } },") ps_cmd.append( r"@{ Name='protocols'; Expression={ @( $_.enabledProtocols.Split(',')" ) ps_cmd.append(r"| Foreach-Object { $_.Trim() } ) } }") cmd_ret = _srvmgr(cmd=ps_cmd, return_json=True) try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) except ValueError: raise CommandExecutionError("Unable to parse return data as Json.") for item in items: protocols = list() # If there are no associated protocols, protocols will be an empty dict, # if there is one protocol, it will be a string, and if there are # multiple, it will be a dict with 'Count' and 'value' as the keys. if isinstance(item["protocols"], dict): if "value" in item["protocols"]: protocols += item["protocols"]["value"] else: protocols.append(item["protocols"]) ret[item["name"]] = { "apppool": item["applicationPool"], "path": item["path"], "preload": item["preloadEnabled"], "protocols": protocols, "sourcepath": item["PhysicalPath"], } if not ret: log.warning("No apps found in output: %s", cmd_ret) return ret def create_app(name, site, sourcepath, apppool=None): """ Create an IIS application. .. note:: This function only validates against the application name, and will return True even if the application already exists with a different configuration. It will not modify the configuration of an existing application. Args: name (str): The IIS application. site (str): The IIS site name. sourcepath (str): The physical path. apppool (str): The name of the IIS application pool. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.create_app name='app0' site='site0' sourcepath='C:\\site0' apppool='site0' """ current_apps = list_apps(site) if name in current_apps: log.debug("Application already present: %s", name) return True # The target physical path must exist. if not os.path.isdir(sourcepath): log.error("Path is not present: %s", sourcepath) return False ps_cmd = [ "New-WebApplication", "-Name", f"'{name}'", "-Site", f"'{site}'", "-PhysicalPath", f"'{sourcepath}'", ] if apppool: ps_cmd.extend(["-ApplicationPool", f"'{apppool}'"]) cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to create application: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) new_apps = list_apps(site) if name in new_apps: log.debug("Application created successfully: %s", name) return True log.error("Unable to create application: %s", name) return False def remove_app(name, site): """ Remove an IIS application. Args: name (str): The application name. site (str): The IIS site name. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.remove_app name='app0' site='site0' """ current_apps = list_apps(site) if name not in current_apps: log.debug("Application already absent: %s", name) return True ps_cmd = [ "Remove-WebApplication", "-Name", f"'{name}'", "-Site", f"'{site}'", ] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to remove application: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) new_apps = list_apps(site) if name not in new_apps: log.debug("Application removed successfully: %s", name) return True log.error("Unable to remove application: %s", name) return False def list_vdirs(site, app=_DEFAULT_APP): """ Get all configured IIS virtual directories for the specified site, or for the combination of site and application. Args: site (str): The IIS site name. app (str): The IIS application. Returns: dict: A dictionary of the virtual directory names and properties. CLI Example: .. code-block:: bash salt '*' win_iis.list_vdirs site """ ret = dict() ps_cmd = [ "Get-WebVirtualDirectory", "-Site", rf"'{site}'", "-Application", rf"'{app}'", "|", "Select-Object PhysicalPath, @{ Name = 'name';", r"Expression = { $_.path.Trim('/') } }", ] cmd_ret = _srvmgr(cmd=ps_cmd, return_json=True) try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) except ValueError: raise CommandExecutionError("Unable to parse return data as Json.") for item in items: ret[item["name"]] = {"sourcepath": item["physicalPath"]} if not ret: log.warning("No vdirs found in output: %s", cmd_ret) return ret def create_vdir(name, site, sourcepath, app=_DEFAULT_APP): """ Create an IIS virtual directory. .. note:: This function only validates against the virtual directory name, and will return True even if the virtual directory already exists with a different configuration. It will not modify the configuration of an existing virtual directory. Args: name (str): The virtual directory name. site (str): The IIS site name. sourcepath (str): The physical path. app (str): The IIS application. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.create_vdir name='vd0' site='site0' sourcepath='C:\\inetpub\\vdirs\\vd0' """ current_vdirs = list_vdirs(site, app) if name in current_vdirs: log.debug("Virtual directory already present: %s", name) return True # The target physical path must exist. if not os.path.isdir(sourcepath): log.error("Path is not present: %s", sourcepath) return False ps_cmd = [ "New-WebVirtualDirectory", "-Name", rf"'{name}'", "-Site", rf"'{site}'", "-PhysicalPath", rf"'{sourcepath}'", ] if app != _DEFAULT_APP: ps_cmd.extend(["-Application", rf"'{app}'"]) cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to create virtual directory: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) new_vdirs = list_vdirs(site, app) if name in new_vdirs: log.debug("Virtual directory created successfully: %s", name) return True log.error("Unable to create virtual directory: %s", name) return False def remove_vdir(name, site, app=_DEFAULT_APP): """ Remove an IIS virtual directory. Args: name (str): The virtual directory name. site (str): The IIS site name. app (str): The IIS application. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.remove_vdir name='vdir0' site='site0' """ current_vdirs = list_vdirs(site, app) app_path = os.path.join(*app.rstrip("/").split("/")) if app_path: app_path = f"{app_path}\\" vdir_path = rf"IIS:\Sites\{site}\{app_path}{name}" if name not in current_vdirs: log.debug("Virtual directory already absent: %s", name) return True # We use Remove-Item here instead of Remove-WebVirtualDirectory, since the # latter has a bug that causes it to always prompt for user input. ps_cmd = ["Remove-Item", "-Path", rf"'{vdir_path}'", "-Recurse"] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to remove virtual directory: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) new_vdirs = list_vdirs(site, app) if name not in new_vdirs: log.debug("Virtual directory removed successfully: %s", name) return True log.error("Unable to remove virtual directory: %s", name) return False def list_backups(): r""" List the IIS Configuration Backups on the System. .. versionadded:: 2017.7.0 .. note:: Backups are made when a configuration is edited. Manual backups are stored in the ``$env:Windir\System32\inetsrv\backup`` folder. Returns: dict: A dictionary of IIS Configurations backed up on the system. CLI Example: .. code-block:: bash salt '*' win_iis.list_backups """ ret = dict() ps_cmd = [ "Get-WebConfigurationBackup", "|", "Select Name, CreationDate,", '@{N="FormattedDate"; E={$_.CreationDate.ToString("G")}}', ] cmd_ret = _srvmgr(cmd=ps_cmd, return_json=True) try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) except ValueError: raise CommandExecutionError("Unable to parse return data as Json.") for item in items: if item["FormattedDate"]: ret[item["Name"]] = item["FormattedDate"] else: ret[item["Name"]] = item["CreationDate"] if not ret: log.warning("No backups found in output: %s", cmd_ret) return ret def create_backup(name): r""" Backup an IIS Configuration on the System. .. versionadded:: 2017.7.0 .. note:: Backups are stored in the ``$env:Windir\System32\inetsrv\backup`` folder. Args: name (str): The name to give the backup Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.create_backup good_config_20170209 """ if name in list_backups(): raise CommandExecutionError(f"Backup already present: {name}") ps_cmd = ["Backup-WebConfiguration", "-Name", f"'{name}'"] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to backup web configuration: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) return name in list_backups() def remove_backup(name): """ Remove an IIS Configuration backup from the System. .. versionadded:: 2017.7.0 Args: name (str): The name of the backup to remove Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.remove_backup backup_20170209 """ if name not in list_backups(): log.debug("Backup already removed: %s", name) return True ps_cmd = ["Remove-WebConfigurationBackup", "-Name", f"'{name}'"] cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = "Unable to remove web configuration: {}\nError: {}".format( name, cmd_ret["stderr"] ) raise CommandExecutionError(msg) return name not in list_backups() def list_worker_processes(apppool): """ Returns a list of worker processes that correspond to the passed application pool. .. versionadded:: 2017.7.0 Args: apppool (str): The application pool to query Returns: dict: A dictionary of worker processes with their process IDs CLI Example: .. code-block:: bash salt '*' win_iis.list_worker_processes 'My App Pool' """ ps_cmd = ["Get-ChildItem", rf"'IIS:\AppPools\{apppool}\WorkerProcesses'"] cmd_ret = _srvmgr(cmd=ps_cmd, return_json=True) try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) except ValueError: raise CommandExecutionError("Unable to parse return data as Json.") ret = dict() for item in items: ret[item["processId"]] = item["appPoolName"] if not ret: log.warning("No backups found in output: %s", cmd_ret) return ret def get_webapp_settings(name, site, settings): r""" .. versionadded:: 2017.7.0 Get the value of the setting for the IIS web application. .. note:: Params are case sensitive :param str name: The name of the IIS web application. :param str site: The site name contains the web application. Example: Default Web Site :param str settings: A dictionary of the setting names and their values. Available settings: physicalPath, applicationPool, userName, password Returns: dict: A dictionary of the provided settings and their values. CLI Example: .. code-block:: bash salt '*' win_iis.get_webapp_settings name='app0' site='Default Web Site' settings="['physicalPath','applicationPool']" """ ret = dict() pscmd = list() availableSettings = ("physicalPath", "applicationPool", "userName", "password") if not settings: log.warning("No settings provided") return ret pscmd.append(r"$Settings = @{};") # Verify setting is ine predefined settings and append relevant query command per setting key for setting in settings: if setting in availableSettings: if setting == "userName" or setting == "password": pscmd.append( " $Property = Get-WebConfigurationProperty -Filter" " \"system.applicationHost/sites/site[@name='{}']/application[@path='/{}']/virtualDirectory[@path='/']\"".format( site, name ) ) pscmd.append(rf' -Name "{setting}" -ErrorAction Stop | select Value;') pscmd.append( r" $Property = $Property | Select-Object -ExpandProperty Value;" ) pscmd.append(rf" $Settings['{setting}'] = [String] $Property;") pscmd.append(r" $Property = $Null;") if setting == "physicalPath" or setting == "applicationPool": pscmd.append(rf" $Property = (get-webapplication {name}).{setting};") pscmd.append(rf" $Settings['{setting}'] = [String] $Property;") pscmd.append(r" $Property = $Null;") else: availSetStr = ", ".join(availableSettings) message = ( "Unexpected setting:" + setting + ". Available settings are: " + availSetStr ) raise SaltInvocationError(message) pscmd.append(" $Settings") # Run commands and return data as json cmd_ret = _srvmgr(cmd="".join(pscmd), return_json=True) # Update dict var to return data try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) if isinstance(items, list): ret.update(items[0]) else: ret.update(items) except ValueError: log.error("Unable to parse return data as Json.") if None in ret.values(): message = ( "Some values are empty - please validate site and web application names." " Some commands are case sensitive" ) raise SaltInvocationError(message) return ret def set_webapp_settings(name, site, settings): r""" .. versionadded:: 2017.7.0 Configure an IIS application. .. note:: This function only configures an existing app. Params are case sensitive. :param str name: The IIS application. :param str site: The IIS site name. :param str settings: A dictionary of the setting names and their values. - physicalPath: The physical path of the webapp. - applicationPool: The application pool for the webapp. - userName: "connectAs" user - password: "connectAs" password for user :return: A boolean representing whether all changes succeeded. :rtype: bool CLI Example: .. code-block:: bash salt '*' win_iis.set_webapp_settings name='app0' site='site0' settings="{'physicalPath': 'C:\site0', 'apppool': 'site0'}" """ pscmd = list() current_apps = list_apps(site) current_sites = list_sites() availableSettings = ("physicalPath", "applicationPool", "userName", "password") # Validate params if name not in current_apps: msg = "Application" + name + "doesn't exist" raise SaltInvocationError(msg) if site not in current_sites: msg = "Site" + site + "doesn't exist" raise SaltInvocationError(msg) if not settings: msg = "No settings provided" raise SaltInvocationError(msg) # Treat all values as strings for the purpose of comparing them to existing values & validate settings exists in predefined settings list for setting in settings.keys(): if setting in availableSettings: settings[setting] = str(settings[setting]) else: availSetStr = ", ".join(availableSettings) log.error("Unexpected setting: %s ", setting) log.error("Available settings: %s", availSetStr) msg = "Unexpected setting:" + setting + " Available settings:" + availSetStr raise SaltInvocationError(msg) # Check if settings already configured current_settings = get_webapp_settings( name=name, site=site, settings=settings.keys() ) if settings == current_settings: log.warning("Settings already contain the provided values.") return True for setting in settings: # If the value is numeric, don't treat it as a string in PowerShell. try: complex(settings[setting]) value = settings[setting] except ValueError: value = f"'{settings[setting]}'" # Append relevant update command per setting key if setting == "userName" or setting == "password": pscmd.append( " Set-WebConfigurationProperty -Filter" " \"system.applicationHost/sites/site[@name='{}']/application[@path='/{}']/virtualDirectory[@path='/']\"".format( site, name ) ) pscmd.append(f' -Name "{setting}" -Value {value};') if setting == "physicalPath" or setting == "applicationPool": pscmd.append( r' Set-ItemProperty "IIS:\Sites\{}\{}" -Name {} -Value {};'.format( site, name, setting, value ) ) if setting == "physicalPath": if not os.path.isdir(settings[setting]): msg = "Path is not present: " + settings[setting] raise SaltInvocationError(msg) # Run commands cmd_ret = _srvmgr(pscmd) # Verify commands completed successfully if cmd_ret["retcode"] != 0: msg = f"Unable to set settings for web application {name}" raise SaltInvocationError(msg) # verify changes new_settings = get_webapp_settings(name=name, site=site, settings=settings.keys()) failed_settings = dict() for setting in settings: if str(settings[setting]) != str(new_settings[setting]): failed_settings[setting] = settings[setting] if failed_settings: log.error("Failed to change settings: %s", failed_settings) return False log.debug("Settings configured successfully: %s", list(settings)) return True def get_webconfiguration_settings(name, settings): r""" Get the webconfiguration settings for the IIS PSPath. Args: name (str): The PSPath of the IIS webconfiguration settings. settings (list): A list of dictionaries containing setting name and filter. Returns: dict: A list of dictionaries containing setting name, filter and value. CLI Example: .. code-block:: bash salt '*' win_iis.get_webconfiguration_settings name='IIS:\' settings="[{'name': 'enabled', 'filter': 'system.webServer/security/authentication/anonymousAuthentication'}]" """ ret = {} ps_cmd = [r"$Settings = New-Object System.Collections.ArrayList;"] ps_cmd_validate = [] settings = _prepare_settings(name, settings) if not settings: log.warning("No settings provided") return ret for setting in settings: # Build the commands to verify that the property names are valid. ps_cmd_validate.extend( [ "Get-WebConfigurationProperty", "-PSPath", f"'{name}'", "-Filter", "'{}'".format(setting["filter"]), "-Name", "'{}'".format(setting["name"]), "-ErrorAction", "Stop", "|", "Out-Null;", ] ) # Some ItemProperties are Strings and others are ConfigurationAttributes. # Since the former doesn't have a Value property, we need to account # for this. ps_cmd.append(f"$Property = Get-WebConfigurationProperty -PSPath '{name}'") ps_cmd.append( "-Name '{}' -Filter '{}' -ErrorAction Stop;".format( setting["name"], setting["filter"] ) ) if setting["name"].split(".")[-1] == "Collection": if "value" in setting: ps_cmd.append( "$Property = $Property | select -Property {} ;".format( ",".join(list(setting["value"][0].keys())) ) ) ps_cmd.append( "$Settings.add(@{{filter='{0}';name='{1}';value=[System.Collections.ArrayList]" " @($Property)}})| Out-Null;".format(setting["filter"], setting["name"]) ) else: ps_cmd.append(r"if (([String]::IsNullOrEmpty($Property) -eq $False) -and") ps_cmd.append(r"($Property.GetType()).Name -eq 'ConfigurationAttribute') {") ps_cmd.append(r"$Property = $Property | Select-Object") ps_cmd.append(r"-ExpandProperty Value };") ps_cmd.append( "$Settings.add(@{{filter='{0}';name='{1}';value=[String] $Property}})|" " Out-Null;".format(setting["filter"], setting["name"]) ) ps_cmd.append(r"$Property = $Null;") # Validate the setting names that were passed in. cmd_ret = _srvmgr(cmd=ps_cmd_validate, return_json=True) if cmd_ret["retcode"] != 0: message = ( "One or more invalid property names were specified for the provided" " container." ) raise SaltInvocationError(message) ps_cmd.append("$Settings") cmd_ret = _srvmgr(cmd=ps_cmd, return_json=True) try: ret = salt.utils.json.loads(cmd_ret["stdout"], strict=False) except ValueError: raise CommandExecutionError("Unable to parse return data as Json.") return ret def set_webconfiguration_settings(name, settings): r""" Set the value of the setting for an IIS container. Args: name (str): The PSPath of the IIS webconfiguration settings. settings (list): A list of dictionaries containing setting name, filter and value. Returns: bool: True if successful, otherwise False CLI Example: .. code-block:: bash salt '*' win_iis.set_webconfiguration_settings name='IIS:\' settings="[{'name': 'enabled', 'filter': 'system.webServer/security/authentication/anonymousAuthentication', 'value': False}]" """ ps_cmd = [] settings = _prepare_settings(name, settings) if not settings: log.warning("No settings provided") return False # Treat all values as strings for the purpose of comparing them to existing values. for idx, setting in enumerate(settings): if setting["name"].split(".")[-1] != "Collection": settings[idx]["value"] = str(setting["value"]) current_settings = get_webconfiguration_settings(name=name, settings=settings) if settings == current_settings: log.debug("Settings already contain the provided values.") return True for setting in settings: # If the value is numeric, don't treat it as a string in PowerShell. if setting["name"].split(".")[-1] != "Collection": try: complex(setting["value"]) value = setting["value"] except ValueError: value = "'{}'".format(setting["value"]) else: configelement_list = [] for value_item in setting["value"]: configelement_construct = [] for key, value in value_item.items(): configelement_construct.append(f"{key}='{value}'") configelement_list.append( "@{" + ";".join(configelement_construct) + "}" ) value = ",".join(configelement_list) ps_cmd.extend( [ "Set-WebConfigurationProperty", "-PSPath", f"'{name}'", "-Filter", "'{}'".format(setting["filter"]), "-Name", "'{}'".format(setting["name"]), "-Value", f"{value};", ] ) cmd_ret = _srvmgr(ps_cmd) if cmd_ret["retcode"] != 0: msg = f"Unable to set settings for {name}" raise CommandExecutionError(msg) # Get the fields post-change so that we can verify tht all values # were modified successfully. Track the ones that weren't. new_settings = get_webconfiguration_settings(name=name, settings=settings) failed_settings = [] for idx, setting in enumerate(settings): is_collection = setting["name"].split(".")[-1] == "Collection" if ( not is_collection and str(setting["value"]) != str(new_settings[idx]["value"]) ) or ( is_collection and list(map(dict, setting["value"])) != list(map(dict, new_settings[idx]["value"])) ): failed_settings.append(setting) if failed_settings: log.error("Failed to change settings: %s", failed_settings) return False log.debug("Settings configured successfully: %s", settings) return True
0
ConvertTo-JaggedObjects.ps1
function ConvertTo-JaggedObjects { ################################################################################################### # .Synopsis # Convert a hashtable full of arrays into formattable objects # .Description # When you have multiple arrays that you need to somehow group together for output, ConvertTo-JaggedObjects is your solution. It takes a hashtable of arrays (strictly so that you can give a name to each array), and produces a series of objects which have a property for each source array. # .Parameter Hash # The hashtable which applies names to arrays. For example: @{English=@("one","two"); Spanish=@("uno","dos")} # .Example # $a = "one","two","three" # $b = "uno","dos","tres","cuatro" # $c = "un","deux","trois" # # ConvertTo-JaggedObjects @{English=$a; Spanish=$b; French=$c} # # .Example # It now sorts alphabetically, so you can do something like: # # $a = "one","two","three" # $b = "uno","dos","tres","cuatro" # $c = "un","deux","trois" # # ConvertTo-JaggedObjects @{"1 English"=$a; "2 Spanish"=$b; "3 French"=$c} # # Will have output like: # # 1 English 2 Spanish 3 French # --------- --------- -------- # one uno un # two dos deux # three tres trois # cuatro ################################################################################################### Param([HashTable]$hash) $max = ($hash.Values | Measure Length -Max).Maximum ForEach($i in 0..($max-1)) { $o = New-Object PSObject foreach($name in $hash.Keys | Sort) { Add-Member -in $o -Type NoteProperty -Name $name -Value $hash[$name][$i] } Write-Output $o } }
0
sample_10_25.ps1
ConvertFrom-StringData @' id_bpastarting=Starting Best Practices Analyzer id_bparunning=Running Best Practices Analyzer id_bpagenerating=Generating BPA Output '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCxgCounFaQKGyt # yYwxFjZvzFDl6rglsXWmfdWtFpiDd6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFUk2V4+CexwhMMh3dR+3ha7 # tFC4ut3C46K+xbOaJwU3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAHRpPHvGAoNVXhyQ5IBGBacC2Wq87CSBYuc8Ds3ayjTwWRAxxgM91SqGh # loeH0vVzqslMur0xmYUhiscTR4mfTpTDsHXCDlBgXxt2VKQryKAIz5mkDwh6Mbsy # eCX6XquofMqEbaEmEmc8GQcwiROlgTjdMZncCn4LEAI/Z2K++YbZlKcZ0jhSI/eO # vMIhl+FUjOL3Y3xAx4KoErDd9rXeXZK7gnindxHH7BA+r/6dF5OUH0gJhzolRcsk # 7lJ/v9UeEYZOcXK9fRbWUz+R5Xtc8QE/uNIcnx1R8oFfBVp6cjENzi1oNJ3RJ5+A # kLZ4kC70BshhSwsXmgwdZpwWabdmD6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCMNV2AEDMoD0NkqMntluTZfLVI5S5bZm+y1bsaKUmldgIGZxqPzfDc # GBMyMDI0MTAyODExNDA0MC45NTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QABAAAB5jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAjcElGzflvKADZ1D+2d/ie # YYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35Zx0gXJBE0zWanZEAjCjt # 4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo/9t6OeNezIwX5E5+VwEG # 37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMszuucaR5nMwQN6sDjG99F # zdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4JuURUBRZ0JWu0NYQBp8kh # ku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+lRZAA4iMgbcLZ2P/xSdnK # FxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/lJD1stdNo5wJG+mgXsE/ # zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCScegNzHeYtw5OmZ/7eVnRmjX # lCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJNNjVndkpWy934PIZuWTM # k360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8YB3M+u1tYeVDO/TcObGH # xaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiFBf6iYYrCjtRwF7IPdQLF # tQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+11ZM+Qu7Q5rg3Fc9MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwSkaFMQ6dyu8ZCYUpWQ8iI # rbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VYfxz1EIbPlt897MJ2sBGO # 2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQCJ55LLvyFlJ195AVo4Wy # 8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w72eRY/vWDuptrvzruFNmK # CIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWkrGjyeVJ+khzctxaLkklV # wCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YRa9pH2zvddsuBEfSFG6Cj # 0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh3ZOe+BFqJ57OXdeIDSHb # vHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z1uB0XYQP60rsMLdTlVYE # yZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMWTTeQ0IwnWG98vWv/roPe # gCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4TbVj/Lw0XvnLYNwMUA9o # uY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCffCaspKUXC72YMu5W8L/zy # TxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDi # WNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrUDAiGA8yMDI0MTAyODA2MTg1 # NloYDzIwMjQxMDI5MDYxODU2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyatQ # AgEAMAcCAQACAiZmMAcCAQACAhORMAoCBQDqyvzQAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAEBxNUvMJ0O0UDu8Og9sWf208vhSkFloumMW1RvgFdb92+TH # K6H4x3VJwAos7fSTrcyd3rBsbPaWsDzEE8lSpQZRl1tT+xqJ9FN0+DhU7VbhQzFp # lSEQLO3ZUNQUMNltvLzXqrbJuEfQiXerQxhkutzT4Cehf10MosdYIq9nQ6IhxL20 # siq9Nudp03+xjjbZmZjrxvnqZQ1GXhucuPUTYDKdOdHa+dU71t77KkdCeO70ybxR # 1x1yXXr+kaA0X/o61KSn3G2WSmzdwnX2nOuuBi5Wptv9NmwZTYfI/s4Qh0GVxQ1v # Relr66myMkPQ75xHUd8APnZdEG/h251KOccn5yUxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZQp7qAPh94QABAAAB5jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCU+YS7+NhCM4Uq2uuE+aLpd36Zn97Io66JA37Qu71shzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4aoHrMJaG8gnLO1q16hIYcR # noy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgTB6qQcMdP6fMqtySduFITAgYbREF # 90zOkmEDwIb58bEwDQYJKoZIhvcNAQELBQAEggIAHuraIGB8xQ3CZFEtQpM9y4l2 # c316s1CLrnxbH/+cFuU1kNPiyXHbbk7prb0O0b/VeWgT+82piNIhcmnaMYxkI808 # elTRaNKsKoKXIrp0n2K89gia6C1nuTrwHbesNoRFlXS0W8wTzASoa/EeqGhqxkn7 # 5kAZpzQNeh9fDO8zPM6MZTK6yEvcOcmklkhjopqhNhtmDb4IVu4MS44lM7jxZmxQ # Xd2+JUcaAbHqivh5eW78yFB0VZl62hhZnii5xMzMu9miSgYfmlYeXHXiPN8BP92c # Lu84PGPZeHMCw9fwHoE/k2Mz53K5Oxx7aTt51PeYNjg559IrlBo8Nq922EB4Mo1B # omK6ESmv5T+8mNgsB/6NCWdJvXaSu14BRkO7CroARPpBDQ6nXLlnww7dnvbtGntd # tds61Y0VqfdWW5Nca6H7m4OoLjGqc11QPqzDqwE54Ued9fTSFoh2rbimqTMnHemH # cq+1snwxSr7TVoXF8+BbXuEglvAvWusVMP80E3lyVcp3gaVVEJ4eRrPTHacj3p+2 # APFitRRIdSeARidygk5qA6+kAD7WZ1tC1D5whY+AOBzrTpenKT7b25DuqFbVgyzF # i5OReNLeM2FChS2yhOqNxCvIHkMcNIsxMG2RsZWQdaxtP4pEIhKlMKjKwCEGPVi/ # DZafeNOeJ1D5fxrlvxY= # SIG # End signature block
0
sample_3_56.ps1
ConvertFrom-StringData @' id_surfacepro3detectfirmwareversions=Detect Surface Pro 3 Firmware Versions id_surfacepro3detectfirmwareversionsdesc=Detected Surface Pro 3 Firmware Versions Update Needed '@ # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9u4k1RmE370TP # A8Tm3un9Zb5c344H2aLd6iD+16euP6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA/9 # Xmn3GE5/gqTySRt3cZsRr37cDkEqjh7E7ymUPctSMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAmHhVYimxObgNbvursXie7I1EvFmOY02xfZjC # 9KBCaWuvPTyNAcTmr97hMezAst93fgHA4mthWSLyASoihfJwuB64ufIpmhb1/1cL # NYUctmKiYMDT/U/b4d1ZUgv1hXTz81Bm6o+8e0qAAXSI4XRiUuZYxINoA2OgxSdZ # ailjWZbAjiGvYgvs1zSXoIppkiZJtQEZoeaqW1MW3eqlzQpjisc9bv/2FlpFyKs1 # /MXnaiYohw3ybHqlYgl8mPKM+nuiw1wZxCoyzva2ikNJDwFO8PgeRBTgfI73/tMi # 4/U7yCG5m/1mA+pHhc2AXBHEU8FiGFOj1zSfT4T6uHZ6jsDJr6GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBc7uBQJIGUm7Y8OM4sStahQ/MAuqitsFck # O6lHiVfX/AIGZwgI5xF4GBMyMDI0MTAxNzAwMjMyMy44OTlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB # AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv # QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed # zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv # 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY # cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT # EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ # UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7 # b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD # oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe # h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69 # mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2 # t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx # BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X # pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t # aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t # uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM # iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw # psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL # zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR # J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB # 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX # WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV # PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE # K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpv2TAi # GA8yMDI0MTAxNjE3MDExM1oYDzIwMjQxMDE3MTcwMTEzWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqum/ZAgEAMAcCAQACAghjMAcCAQACAhL6MAoCBQDqu8FZAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAIuPeJEugjcfrJV0dIkhqUMSj6Jx # 3iRgadzJiwuR/iEWUxhTU8gOGun9rcCFm3umYppbXgsuh7809igGr/ehDJvxaUiw # AAtDWlR2j8tiMLDcOwNOBhlSKF5hvn5n35wEWDpegmb/PTBmPN3G8D/0TL45WRS5 # pYXHZ6/sNc8gZQxSlAtcqj7co05HXUB0JDuoomu3Pwp/sGo0KQaM1yTVPJHjv3Xm # SQPREH90wbRGxGK++zSl/SSd1yRCEwbXBDzFutf+L5MUUX6mX2+snBPzwdknIr4W # QHP1cUj3pQIa+XeamTHwm6GBWwXeWIE4oWfVRGiq1QxC5w7RCR3Em6z6V4ExggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+ # MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCXdb6A/Bieu8rdId3yZT+CJXf3 # n90zjMuUP5MtdR7YozCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0u # MVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgWYHxiR74 # jMaMh+s9xXYccKg8Afskta3kon5CuLtJw2AwDQYJKoZIhvcNAQELBQAEggIAsxJY # NLTHijwNPV8u4yKbEY9jECavfMHL+2YkN3CbkWQ7ueWNmokFHyWd7mLUFaRGIU7m # q9/qj/igwb+cnQqENgTQ65g2MTSyl56dmaeB/1nBXLX5Xd+sjbgD4mEstqT7IACO # gA+4KrTgCkLcTgf/1oMU8E/u0kSJWMtiCdjowexCBKPU+FFvXx1kWqXf0fTzVrtw # lGa/7J1r8YmTzh3vViAyUAR2ZLrvcVefYHVf6Y/yFsti2+sBQmdSHSXL8D+bKnTw # 5/uDGNbN3Z0y0vLnKFgD4a1ktyFePv0f0US97BDJCj83YVMUv50eUqJW4zrAzLoN # nlfieqR3k+UWqE/BYCVJ8fMO9JVDdezqCnQSau/xZvDO1N/zb6N1E0bUWkDWjSdH # b+1XhwR/nC21NtEMqbqoxMODIZ/DhBmIi83wv8dk7FhnBL5xt4IA82W01CBhyX83 # oU5cDOM9mYenWzAFw0IAzA4IdS5wmXB5749iO2LWdAaJj+PMuLybiARpkrfml5Fj # AQtTBAoqdG0SLMaeV4x6KYG0TR3faa1R/wUmu8sVaxv93XWo8/NpEH4pViJe+59b # IBo00DWUYEcWusKYUHJ19bH8MdgPwf4EsQ4eSS6LTdMcHY6Cq7l4hRH6NxR3KQpc # HspsnALtHPangWeawEJfwu0ILy1osAkulTdgXZc= # SIG # End signature block
0
1819.ps1
Import-Module (Join-Path -Path $PSScriptRoot '..\Microsoft.PowerShell.Security\certificateCommon.psm1') Describe "Set/New/Remove-Service cmdlet tests" -Tags "Feature", "RequireAdminOnWindows" { BeforeAll { $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() if ( -not $IsWindows ) { $PSDefaultParameterValues["it:skip"] = $true } if ($IsWindows) { $userName = "testuserservices" $testPass = [Net.NetworkCredential]::new("", (New-ComplexPassword)).SecurePassword $creds = [pscredential]::new(".\$userName", $testPass) $SecurityDescriptorSddl = 'D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;SU)' $WrongSecurityDescriptorSddl = 'D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BB)(A;;CCLCSWLOCRRC;;;SU)' net user $userName $creds.GetNetworkCredential().Password /add > $null $testservicename1 = "testservice1" $testservicename2 = "testservice2" $svcbinaryname = "TestService" $svccmd = Get-Command $svcbinaryname $svccmd | Should -Not -BeNullOrEmpty $svcfullpath = $svccmd.Path $testservice1 = New-Service -BinaryPathName $svcfullpath -Name $testservicename1 $testservice1 | Should -Not -BeNullOrEmpty $testservice2 = New-Service -BinaryPathName $svcfullpath -Name $testservicename2 -DependsOn $testservicename1 $testservice2 | Should -Not -BeNullOrEmpty } Function CheckSecurityDescriptorSddl { Param( [Parameter(Mandatory)] $SecurityDescriptorSddl, [Parameter(Mandatory)] $ServiceName ) $Counter = 0 $ExpectedSDDL = ConvertFrom-SddlString -Sddl $SecurityDescriptorSddl $UpdatedSDDL = ConvertFrom-SddlString -Sddl (sc sdshow $ServiceName)[1] $UpdatedSDDL.Owner | Should -Be $ExpectedSDDL.Owner $UpdatedSDDL.Group | Should -Be $ExpectedSDDL.Group $UpdatedSDDL.DiscretionaryAcl.Count | Should -Be $ExpectedSDDL.DiscretionaryAcl.Count $UpdatedSDDL.DiscretionaryAcl | ForEach-Object -Process { $_ | Should -Be $ExpectedSDDL.DiscretionaryAcl[$Counter] $Counter++ } } } AfterAll { $global:PSDefaultParameterValues = $originalDefaultParameterValues if ($IsWindows) { net user $userName /delete > $null Stop-Service $testservicename2 Stop-Service $testservicename1 Remove-Service $testservicename2 Remove-Service $testservicename1 } } It "SetServiceCommand can be used as API for '<parameter>' with '<value>'" -TestCases @( @{parameter = "Name" ; value = "bar"}, @{parameter = "DisplayName" ; value = "hello"}, @{parameter = "Description" ; value = "hello world"}, @{parameter = "StartupType" ; value = "Automatic"}, @{parameter = "StartupType" ; value = "Disabled"}, @{parameter = "StartupType" ; value = "Manual"}, @{parameter = "Status" ; value = "Running"}, @{parameter = "Status" ; value = "Stopped"}, @{parameter = "Status" ; value = "Paused"}, @{parameter = "InputObject" ; script = {Get-Service | Select-Object -First 1}}, @{parameter = "Include" ; value = "foo", "bar" ; expectedNull = $true}, @{parameter = "Exclude" ; value = "foo", "bar" ; expectedNull = $true} ) { param($parameter, $value, $script, $expectedNull) $setServiceCommand = [Microsoft.PowerShell.Commands.SetServiceCommand]::new() if ($script -ne $Null) { $value = & $script } $setServiceCommand.$parameter = $value if ($expectedNull -eq $true) { $setServiceCommand.$parameter | Should -BeNullOrEmpty } else { $setServiceCommand.$parameter | Should -Be $value } } It "Set-Service parameter validation for invalid values: <script>" -TestCases @( @{ script = {Set-Service foo -StartupType bar -ErrorAction Stop}; errorid = "CannotConvertArgumentNoMessage,Microsoft.PowerShell.Commands.SetServiceCommand" }, @{ script = {Set-Service -Name $testservicename1 -SecurityDescriptorSddl $WrongSecurityDescriptorSddl }; errorid = "System.ArgumentException,Microsoft.PowerShell.Commands.SetServiceCommand" } ) { param($script, $errorid) { & $script } | Should -Throw -ErrorId $errorid } It "Sets securitydescriptor of service using Set-Service " { Set-Service -Name $TestServiceName1 -SecurityDescriptorSddl $SecurityDescriptorSddl CheckSecurityDescriptorSddl -SecurityDescriptor $SecurityDescriptorSddl -ServiceName $TestServiceName1 } It "Set-Service can change '<parameter>' to '<value>'" -TestCases @( @{parameter = "Description"; value = "hello"}, @{parameter = "DisplayName"; value = "test spooler"}, @{parameter = "StartupType"; value = "Disabled"}, @{parameter = "Status" ; value = "running" ; expected = "OK"} ) { param($parameter, $value, $expected) $currentService = Get-CimInstance -ClassName Win32_Service -Filter "Name='spooler'" $originalStartupType = (Get-Service -Name spooler).StartType try { $setServiceCommand = [Microsoft.PowerShell.Commands.SetServiceCommand]::new() $setServiceCommand.Name = "Spooler" $setServiceCommand.$parameter = $value $setServiceCommand.Invoke() $updatedService = Get-CimInstance -ClassName Win32_Service -Filter "Name='spooler'" if ($expected -eq $null) { $expected = $value } if ($parameter -eq "StartupType") { $updatedService.StartMode | Should -Be $expected } else { $updatedService.$parameter | Should -Be $expected } } finally { if ($parameter -eq "StartupType") { $setServiceCommand.StartupType = $originalStartupType } else { $setServiceCommand.$parameter = $currentService.$parameter } $setServiceCommand.Invoke() $updatedService = Get-CimInstance -ClassName Win32_Service -Filter "Name='spooler'" $updatedService.$parameter | Should -Be $currentService.$parameter } } It "NewServiceCommand can be used as API for '<parameter>' with '<value>'" -TestCases @( @{parameter = "Name" ; value = "bar"}, @{parameter = "BinaryPathName" ; value = "hello"}, @{parameter = "DisplayName" ; value = "hello world"}, @{parameter = "Description" ; value = "this is a test"}, @{parameter = "StartupType" ; value = "Automatic"}, @{parameter = "StartupType" ; value = "Disabled"}, @{parameter = "StartupType" ; value = "Manual"}, @{parameter = "SecurityDescriptorSddl" ; value = $SecurityDescriptorSddl}, @{parameter = "Credential" ; value = ( [System.Management.Automation.PSCredential]::new("username", (ConvertTo-SecureString "PlainTextPassword" -AsPlainText -Force))) } @{parameter = "DependsOn" ; value = "foo", "bar"} ) { param($parameter, $value) $newServiceCommand = [Microsoft.PowerShell.Commands.NewServiceCommand]::new() $newServiceCommand.$parameter = $value $newServiceCommand.$parameter | Should -Be $value } It "Set-Service can change credentials of a service" -Pending { try { $startUsername = "user1" $endUsername = "user2" $servicename = "testsetcredential" $testPass = [Net.NetworkCredential]::new("", (New-ComplexPassword)).SecurePassword $creds = [pscredential]::new(".\$endUsername", $testPass) net user $startUsername $creds.GetNetworkCredential().Password /add > $null net user $endUsername $creds.GetNetworkCredential().Password /add > $null $parameters = @{ Name = $servicename; BinaryPathName = "$PSHOME\pwsh.exe"; StartupType = "Manual"; Credential = $creds } $service = New-Service @parameters $service | Should -Not -BeNullOrEmpty $service = Get-CimInstance Win32_Service -Filter "name='$servicename'" $service.StartName | Should -BeExactly $creds.UserName Set-Service -Name $servicename -Credential $creds $service = Get-CimInstance Win32_Service -Filter "name='$servicename'" $service.StartName | Should -BeExactly $creds.UserName } finally { Get-CimInstance Win32_Service -Filter "name='$servicename'" | Remove-CimInstance -ErrorAction SilentlyContinue net user $startUsername /delete > $null net user $endUsername /delete > $null } } It "New-Service can create a new service called '<name>'" -TestCases @( @{name = "testautomatic"; startupType = "Automatic"; description = "foo" ; displayname = "one" ; securityDescriptorSddl = $null}, @{name = "testmanual" ; startupType = "Manual" ; description = "bar" ; displayname = "two" ; securityDescriptorSddl = $SecurityDescriptorSddl}, @{name = "testdisabled" ; startupType = "Disabled" ; description = $null ; displayname = $null ; securityDescriptorSddl = $null}, @{name = "testsddl" ; startupType = "Disabled" ; description = "foo" ; displayname = $null ; securityDescriptorSddl = $SecurityDescriptorSddl} ) { param($name, $startupType, $description, $displayname, $securityDescriptorSddl) try { $parameters = @{ Name = $name; BinaryPathName = "$PSHOME\pwsh.exe"; StartupType = $startupType; } if ($description) { $parameters += @{description = $description} } if ($displayname) { $parameters += @{displayname = $displayname} } if ($securityDescriptorSddl) { $parameters += @{SecurityDescriptorSddl = $securityDescriptorSddl} } $service = New-Service @parameters $service | Should -Not -BeNullOrEmpty $service.displayname | Should -Be $(if($displayname){$displayname}else{$name}) $service.startType | Should -Be $startupType $service = Get-CimInstance Win32_Service -Filter "name='$name'" $service | Should -Not -BeNullOrEmpty $service.Name | Should -Be $name $service.Description | Should -Be $description $expectedStartup = $( switch ($startupType) { "Automatic" {"Auto"} "Manual" {"Manual"} "Disabled" {"Disabled"} default { throw "Unsupported StartupType in TestCases" } } ) $service.StartMode | Should -Be $expectedStartup if ($displayname -eq $null) { $service.DisplayName | Should -Be $name } else { $service.DisplayName | Should -Be $displayname } if ($securityDescriptorSddl) { CheckSecurityDescriptorSddl -SecurityDescriptorSddl $SecurityDescriptorSddl -ServiceName $name } } finally { $service = Get-CimInstance Win32_Service -Filter "name='$name'" if ($service -ne $null) { $service | Remove-CimInstance } } } It "Remove-Service can remove a service" { try { $servicename = "testremoveservice" $parameters = @{ Name = $servicename; BinaryPathName = "$PSHOME\pwsh.exe" } $service = New-Service @parameters $service | Should -Not -BeNullOrEmpty Remove-Service -Name $servicename $service = Get-Service -Name $servicename -ErrorAction SilentlyContinue $service | Should -BeNullOrEmpty } finally { Get-CimInstance Win32_Service -Filter "name='$servicename'" | Remove-CimInstance -ErrorAction SilentlyContinue } } It "Remove-Service can accept a ServiceController as pipeline input" { try { $servicename = "testremoveservice" $parameters = @{ Name = $servicename; BinaryPathName = "$PSHOME\pwsh.exe" } $service = New-Service @parameters $service | Should -Not -BeNullOrEmpty Get-Service -Name $servicename | Remove-Service $service = Get-Service -Name $servicename -ErrorAction SilentlyContinue $service | Should -BeNullOrEmpty } finally { Get-CimInstance Win32_Service -Filter "name='$servicename'" | Remove-CimInstance -ErrorAction SilentlyContinue } } It "Remove-Service cannot accept a service that does not exist" { { Remove-Service -Name "testremoveservice" -ErrorAction 'Stop' } | Should -Throw -ErrorId "InvalidOperationException,Microsoft.PowerShell.Commands.RemoveServiceCommand" } It "Get-Service can get the '<property>' of a service" -Pending -TestCases @( @{property = "Description"; value = "This is a test description"} @{property = "BinaryPathName"; value = "$PSHOME\powershell.exe";}, @{property = "UserName"; value = $creds.UserName; parameters = @{ Credential = $creds }}, @{property = "StartupType"; value = "AutomaticDelayedStart";} ) { param($property, $value, $parameters) try { $servicename = "testgetservice" $startparameters = @{Name = $servicename; BinaryPathName = "$PSHOME\powershell.exe"} if($parameters -ne $null) { foreach($key in $parameters.Keys) { $startparameters.$key = $parameters.$key } } else { $startparameters.$property = $value } $service = New-Service @startparameters $service | Should -Not -BeNullOrEmpty $service = Get-Service -Name $servicename $service.$property | Should -BeExactly $value } finally { Get-CimInstance Win32_Service -Filter "name='$servicename'" | Remove-CimInstance -ErrorAction SilentlyContinue } } It "Set-Service can accept a ServiceController as pipeline input" { try { $servicename = "testsetservice" $newdisplayname = "newdisplayname" $parameters = @{ Name = $servicename; BinaryPathName = "$PSHOME\pwsh.exe" } $service = New-Service @parameters $service | Should -Not -BeNullOrEmpty Get-Service -Name $servicename | Set-Service -DisplayName $newdisplayname $service = Get-Service -Name $servicename $service.DisplayName | Should -BeExactly $newdisplayname } finally { Get-CimInstance Win32_Service -Filter "name='$servicename'" | Remove-CimInstance -ErrorAction SilentlyContinue } } It "Set-Service can accept a ServiceController as positional input" { try { $servicename = "testsetservice" $newdisplayname = "newdisplayname" $parameters = @{ Name = $servicename; BinaryPathName = "$PSHOME\pwsh.exe" } $script = { New-Service @parameters | Set-Service -DisplayName $newdisplayname } { & $script } | Should -Not -Throw $service = Get-Service -Name $servicename $service.DisplayName | Should -BeExactly $newdisplayname } finally { Get-CimInstance Win32_Service -Filter "name='$servicename'" | Remove-CimInstance -ErrorAction SilentlyContinue } } It "Using bad parameters will fail for '<name>' where '<parameter>' = '<value>'" -TestCases @( @{cmdlet="New-Service"; name = 'credtest' ; parameter = "Credential" ; value = ( [System.Management.Automation.PSCredential]::new("username", (ConvertTo-SecureString "PlainTextPassword" -AsPlainText -Force))); errorid = "CouldNotNewService,Microsoft.PowerShell.Commands.NewServiceCommand"}, @{cmdlet="New-Service"; name = 'badstarttype'; parameter = "StartupType"; value = "System"; errorid = "CannotConvertArgumentNoMessage,Microsoft.PowerShell.Commands.NewServiceCommand"}, @{cmdlet="New-Service"; name = 'winmgmt' ; parameter = "DisplayName"; value = "foo"; errorid = "CouldNotNewService,Microsoft.PowerShell.Commands.NewServiceCommand"}, @{cmdlet="Set-Service"; name = 'winmgmt' ; parameter = "StartupType"; value = "Boot"; errorid = "CannotConvertArgumentNoMessage,Microsoft.PowerShell.Commands.SetServiceCommand"} ) { param($cmdlet, $name, $parameter, $value, $errorid) $parameters = @{$parameter = $value; Name = $name; ErrorAction = "Stop"} if ($cmdlet -eq "New-Service") { $parameters += @{Binary = "$PSHOME\pwsh.exe"}; } { & $cmdlet @parameters } | Should -Throw -ErrorId $errorid } Context "Set-Service test cases on the services with dependent relationship" { BeforeEach { { Set-Service -Status Running $testservicename2 } | Should -Not -Throw (Get-Service $testservicename1).Status | Should -BeExactly "Running" (Get-Service $testservicename2).Status | Should -BeExactly "Running" } It "Set-Service can stop a service with dependency" { $script = { Set-Service -Status Stopped $testservicename2 -ErrorAction Stop } { & $script } | Should -Not -Throw (Get-Service $testservicename2).Status | Should -BeExactly "Stopped" } It "Set-Service cannot stop a service with running dependent service" { $script = { Set-Service -Status Stopped $testservicename1 -ErrorAction Stop } { & $script } | Should -Throw (Get-Service $testservicename1).Status | Should -BeExactly "Running" (Get-Service $testservicename2).Status | Should -BeExactly "Running" } It "Set-Service can stop a service with running dependent service by parameter -Force" { $script = { Set-Service -Status Stopped -Force $testservicename1 -ErrorAction Stop } { & $script } | Should -Not -Throw (Get-Service $testservicename1).Status | Should -BeExactly "Stopped" (Get-Service $testservicename2).Status | Should -BeExactly "Stopped" } } }
0
Get Twitter RSS Feed_7.ps1
param ([String] $ScreenName) $client = New-Object System.Net.WebClient $idUrl = "https://api.twitter.com/1/users/show.json?screen_name=$ScreenName" $data = $client.DownloadString($idUrl) $start = 0 $findStr = '"id":' do { $start = $data.IndexOf($findStr, $start + 1) if ($start -gt 0) { $start += $findStr.Length $end = $data.IndexOf(',', $start) $userId = $data.SubString($start, $end-$start) } } while ($start -le $data.Length -and $start -gt 0) $feed = "http://twitter.com/statuses/user_timeline/$userId.rss" $feed
0
sample_35_32.ps1
# # Add-AppxDevPackage.ps1 is a PowerShell script designed to install app # packages created by Visual Studio for developers. To run this script from # Explorer, right-click on its icon and choose "Run with PowerShell". # # Visual Studio supplies this script in the folder generated with its # "Prepare Package" command. The same folder will also contain the app # package (a .appx file), the signing certificate (a .cer file), and a # "Dependencies" subfolder containing all the framework packages used by the # app. # # This script simplifies installing these packages by automating the # following functions: # 1. Find the app package and signing certificate in the script directory # 2. Prompt the user to acquire a developer license and to install the # certificate if necessary # 3. Find dependency packages that are applicable to the operating system's # CPU architecture # 4. Install the package along with all applicable dependencies # # All command line parameters are reserved for use internally by the script. # Users should launch this script from Explorer. # # .Link # http://go.microsoft.com/fwlink/?LinkId=243053 param( [switch]$Force = $false, [switch]$GetDeveloperLicense = $false, [switch]$SkipLoggingTelemetry = $false, [string]$CertificatePath = $null ) $ErrorActionPreference = "Stop" # The language resources for this script are placed in the # "Add-AppDevPackage.resources" subfolder alongside the script. Since the # current working directory might not be the directory that contains the # script, we need to create the full path of the resources directory to # pass into Import-LocalizedData $ScriptPath = $null try { $ScriptPath = (Get-Variable MyInvocation).Value.MyCommand.Path $ScriptDir = Split-Path -Parent $ScriptPath } catch {} if (!$ScriptPath) { PrintMessageAndExit $UiStrings.ErrorNoScriptPath $ErrorCodes.NoScriptPath } $LocalizedResourcePath = Join-Path $ScriptDir "Add-AppDevPackage.resources" Import-LocalizedData -BindingVariable UiStrings -BaseDirectory $LocalizedResourcePath $ErrorCodes = Data { ConvertFrom-StringData @' Success = 0 NoScriptPath = 1 NoPackageFound = 2 ManyPackagesFound = 3 NoCertificateFound = 4 ManyCertificatesFound = 5 BadCertificate = 6 PackageUnsigned = 7 CertificateMismatch = 8 ForceElevate = 9 LaunchAdminFailed = 10 GetDeveloperLicenseFailed = 11 InstallCertificateFailed = 12 AddPackageFailed = 13 ForceDeveloperLicense = 14 CertUtilInstallFailed = 17 CertIsCA = 18 BannedEKU = 19 NoBasicConstraints = 20 NoCodeSigningEku = 21 InstallCertificateCancelled = 22 BannedKeyUsage = 23 ExpiredCertificate = 24 '@ } $IMAGE_FILE_MACHINE_i386 = 0x014c $IMAGE_FILE_MACHINE_AMD64 = 0x8664 $IMAGE_FILE_MACHINE_ARM64 = 0xAA64 $IMAGE_FILE_MACHINE_ARM = 0x01c0 $IMAGE_FILE_MACHINE_THUMB = 0x01c2 $IMAGE_FILE_MACHINE_ARMNT = 0x01c4 $MACHINE_ATTRIBUTES_UserEnabled = 0x01 $MACHINE_ATTRIBUTES_KernelEnabled = 0x02 $MACHINE_ATTRIBUTES_Wow64Container = 0x04 # First try to use IsWow64Process2 to determine the OS architecture try { $IsWow64Process2_MethodDefinition = @" [DllImport("kernel32.dll", SetLastError = true)] public static extern bool IsWow64Process2(IntPtr process, out ushort processMachine, out ushort nativeMachine); "@ $Kernel32 = Add-Type -MemberDefinition $IsWow64Process2_MethodDefinition -Name "Kernel32" -Namespace "Win32" -PassThru $Proc = Get-Process -id $pid $processMachine = New-Object uint16 $nativeMachine = New-Object uint16 $Res = $Kernel32::IsWow64Process2($Proc.Handle, [ref] $processMachine, [ref] $nativeMachine) if ($Res -eq $True) { switch ($nativeMachine) { $IMAGE_FILE_MACHINE_i386 { $ProcessorArchitecture = "x86" } $IMAGE_FILE_MACHINE_AMD64 { $ProcessorArchitecture = "amd64" } $IMAGE_FILE_MACHINE_ARM64 { $ProcessorArchitecture = "arm64" } $IMAGE_FILE_MACHINE_ARM { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_THUMB { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_ARMNT { $ProcessorArchitecture = "arm" } } } } catch { # Ignore exception and fall back to using environment variables to determine the OS architecture } $Amd64AppsSupportedOnArm64 = $False if ($null -eq $ProcessorArchitecture) { $ProcessorArchitecture = $Env:Processor_Architecture # Getting $Env:Processor_Architecture on arm64 machines will return x86. So check if the environment # variable "ProgramFiles(Arm)" is also set, if it is we know the actual processor architecture is arm64. # The value will also be x86 on amd64 machines when running the x86 version of PowerShell. if ($ProcessorArchitecture -eq "x86") { if ($null -ne ${Env:ProgramFiles(Arm)}) { $ProcessorArchitecture = "arm64" } elseif ($null -ne ${Env:ProgramFiles(x86)}) { $ProcessorArchitecture = "amd64" } } } elseif ("arm64" -eq $ProcessorArchitecture) { # If we successfully determined the OS to be arm64 with the above call to IsWow64Process2 and we're on Win11+ # we need to check for a special case where amd64 apps are supported as well. if ([Environment]::OSVersion.Version -ge (new-object 'Version' 10,0,22000)) { try { $GetMachineTypeAttributes_MethodDefinition = @" [DllImport("api-ms-win-core-processthreads-l1-1-7.dll", EntryPoint = "GetMachineTypeAttributes", ExactSpelling = true, PreserveSig = false)] public static extern void GetMachineTypeAttributes(ushort Machine, out ushort machineTypeAttributes); "@ $ProcessThreads = Add-Type -MemberDefinition $GetMachineTypeAttributes_MethodDefinition -Name "processthreads_l1_1_7" -Namespace "Win32" -PassThru $machineTypeAttributes = New-Object uint16 $ProcessThreads::GetMachineTypeAttributes($IMAGE_FILE_MACHINE_AMD64, [ref] $machineTypeAttributes) # We're looking for the case where the UserEnabled flag is set if (($machineTypeAttributes -band $MACHINE_ATTRIBUTES_UserEnabled) -ne 0) { $Amd64AppsSupportedOnArm64 = $True } } catch { # Ignore exceptions and maintain assumption that amd64 apps aren't supported on this machine } } } function PrintMessageAndExit($ErrorMessage, $ReturnCode) { Write-Host $ErrorMessage try { # Log telemetry data regarding the use of the script if possible. # There are three ways that this can be disabled: # 1. If the "TelemetryDependencies" folder isn't present. This can be excluded at build time by setting the MSBuild property AppxLogTelemetryFromSideloadingScript to false # 2. If the SkipLoggingTelemetry switch is passed to this script. # 3. If Visual Studio telemetry is disabled via the registry. $TelemetryAssembliesFolder = (Join-Path $PSScriptRoot "TelemetryDependencies") if (!$SkipLoggingTelemetry -And (Test-Path $TelemetryAssembliesFolder)) { $job = Start-Job -FilePath (Join-Path $TelemetryAssembliesFolder "LogSideloadingTelemetry.ps1") -ArgumentList $TelemetryAssembliesFolder, "VS/DesignTools/SideLoadingScript/AddAppDevPackage", $ReturnCode, $ProcessorArchitecture Wait-Job -Job $job -Timeout 60 | Out-Null } } catch { # Ignore telemetry errors } if (!$Force) { Pause } exit $ReturnCode } # # Warns the user about installing certificates, and presents a Yes/No prompt # to confirm the action. The default is set to No. # function ConfirmCertificateInstall { $Answer = $host.UI.PromptForChoice( "", $UiStrings.WarningInstallCert, [System.Management.Automation.Host.ChoiceDescription[]]@($UiStrings.PromptYesString, $UiStrings.PromptNoString), 1) return $Answer -eq 0 } # # Validates whether a file is a valid certificate using CertUtil. # This needs to be done before calling Get-PfxCertificate on the file, otherwise # the user will get a cryptic "Password: " prompt for invalid certs. # function ValidateCertificateFormat($FilePath) { # certutil -verify prints a lot of text that we don't need, so it's redirected to $null here certutil.exe -verify $FilePath > $null if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorBadCertificate -f $FilePath, $LastExitCode) $ErrorCodes.BadCertificate } # Check if certificate is expired $cert = Get-PfxCertificate $FilePath if (($cert.NotBefore -gt (Get-Date)) -or ($cert.NotAfter -lt (Get-Date))) { PrintMessageAndExit ($UiStrings.ErrorExpiredCertificate -f $FilePath) $ErrorCodes.ExpiredCertificate } } # # Verify that the developer certificate meets the following restrictions: # - The certificate must contain a Basic Constraints extension, and its # Certificate Authority (CA) property must be false. # - The certificate's Key Usage extension must be either absent, or set to # only DigitalSignature. # - The certificate must contain an Extended Key Usage (EKU) extension with # Code Signing usage. # - The certificate must NOT contain any other EKU except Code Signing and # Lifetime Signing. # # These restrictions are enforced to decrease security risks that arise from # trusting digital certificates. # function CheckCertificateRestrictions { Set-Variable -Name BasicConstraintsExtensionOid -Value "2.5.29.19" -Option Constant Set-Variable -Name KeyUsageExtensionOid -Value "2.5.29.15" -Option Constant Set-Variable -Name EkuExtensionOid -Value "2.5.29.37" -Option Constant Set-Variable -Name CodeSigningEkuOid -Value "1.3.6.1.5.5.7.3.3" -Option Constant Set-Variable -Name LifetimeSigningEkuOid -Value "1.3.6.1.4.1.311.10.3.13" -Option Constant Set-Variable -Name UwpSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.1" -Option Constant Set-Variable -Name DisposableSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.2" -Option Constant $CertificateExtensions = (Get-PfxCertificate $CertificatePath).Extensions $HasBasicConstraints = $false $HasCodeSigningEku = $false foreach ($Extension in $CertificateExtensions) { # Certificate must contain the Basic Constraints extension if ($Extension.oid.value -eq $BasicConstraintsExtensionOid) { # CA property must be false if ($Extension.CertificateAuthority) { PrintMessageAndExit $UiStrings.ErrorCertIsCA $ErrorCodes.CertIsCA } $HasBasicConstraints = $true } # If key usage is present, it must be set to digital signature elseif ($Extension.oid.value -eq $KeyUsageExtensionOid) { if ($Extension.KeyUsages -ne "DigitalSignature") { PrintMessageAndExit ($UiStrings.ErrorBannedKeyUsage -f $Extension.KeyUsages) $ErrorCodes.BannedKeyUsage } } elseif ($Extension.oid.value -eq $EkuExtensionOid) { # Certificate must contain the Code Signing EKU $EKUs = $Extension.EnhancedKeyUsages.Value if ($EKUs -contains $CodeSigningEkuOid) { $HasCodeSigningEKU = $True } # EKUs other than code signing and lifetime signing are not allowed foreach ($EKU in $EKUs) { if ($EKU -ne $CodeSigningEkuOid -and $EKU -ne $LifetimeSigningEkuOid -and $EKU -ne $UwpSigningEkuOid -and $EKU -ne $DisposableSigningEkuOid) { PrintMessageAndExit ($UiStrings.ErrorBannedEKU -f $EKU) $ErrorCodes.BannedEKU } } } } if (!$HasBasicConstraints) { PrintMessageAndExit $UiStrings.ErrorNoBasicConstraints $ErrorCodes.NoBasicConstraints } if (!$HasCodeSigningEKU) { PrintMessageAndExit $UiStrings.ErrorNoCodeSigningEku $ErrorCodes.NoCodeSigningEku } } # # Performs operations that require administrative privileges: # - Prompt the user to obtain a developer license # - Install the developer certificate (if -Force is not specified, also prompts the user to confirm) # function DoElevatedOperations { if ($GetDeveloperLicense) { Write-Host $UiStrings.GettingDeveloperLicense if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } try { Show-WindowsDeveloperLicenseRegistration } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } } if ($CertificatePath) { Write-Host $UiStrings.InstallingCertificate # Make sure certificate format is valid and usage constraints are followed ValidateCertificateFormat $CertificatePath CheckCertificateRestrictions # If -Force is not specified, warn the user and get consent if ($Force -or (ConfirmCertificateInstall)) { # Add cert to store certutil.exe -addstore TrustedPeople $CertificatePath if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorCertUtilInstallFailed -f $LastExitCode) $ErrorCodes.CertUtilInstallFailed } } else { PrintMessageAndExit $UiStrings.ErrorInstallCertificateCancelled $ErrorCodes.InstallCertificateCancelled } } } # # Checks whether the machine is missing a valid developer license. # function CheckIfNeedDeveloperLicense { $Result = $true try { $Result = (Get-WindowsDeveloperLicense | Where-Object { $_.IsValid } | Measure-Object).Count -eq 0 } catch {} return $Result } # # Launches an elevated process running the current script to perform tasks # that require administrative privileges. This function waits until the # elevated process terminates, and checks whether those tasks were successful. # function LaunchElevated { # Set up command line arguments to the elevated process $RelaunchArgs = '-ExecutionPolicy Unrestricted -file "' + $ScriptPath + '"' if ($Force) { $RelaunchArgs += ' -Force' } if ($NeedDeveloperLicense) { $RelaunchArgs += ' -GetDeveloperLicense' } if ($SkipLoggingTelemetry) { $RelaunchArgs += ' -SkipLoggingTelemetry' } if ($NeedInstallCertificate) { $RelaunchArgs += ' -CertificatePath "' + $DeveloperCertificatePath.FullName + '"' } # Launch the process and wait for it to finish try { $PowerShellExePath = (Get-Process -Id $PID).Path $AdminProcess = Start-Process $PowerShellExePath -Verb RunAs -ArgumentList $RelaunchArgs -PassThru } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorLaunchAdminFailed $ErrorCodes.LaunchAdminFailed } while (!($AdminProcess.HasExited)) { Start-Sleep -Seconds 2 } # Check if all elevated operations were successful if ($NeedDeveloperLicense) { if (CheckIfNeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } else { Write-Host $UiStrings.AcquireLicenseSuccessful } } if ($NeedInstallCertificate) { $Signature = Get-AuthenticodeSignature $DeveloperPackagePath -Verbose if ($Signature.Status -ne "Valid") { PrintMessageAndExit ($UiStrings.ErrorInstallCertificateFailed -f $Signature.Status) $ErrorCodes.InstallCertificateFailed } else { Write-Host $UiStrings.InstallCertificateSuccessful } } } # # Finds all applicable dependency packages according to OS architecture, and # installs the developer package with its dependencies. The expected layout # of dependencies is: # # <current dir> # \Dependencies # <Architecture neutral dependencies>.appx\.msix # \x86 # <x86 dependencies>.appx\.msix # \x64 # <x64 dependencies>.appx\.msix # \arm # <arm dependencies>.appx\.msix # \arm64 # <arm64 dependencies>.appx\.msix # function InstallPackageWithDependencies { $DependencyPackagesDir = (Join-Path $ScriptDir "Dependencies") $DependencyPackages = @() if (Test-Path $DependencyPackagesDir) { # Get architecture-neutral dependencies $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } # Get architecture-specific dependencies if (($ProcessorArchitecture -eq "x86" -or $ProcessorArchitecture -eq "amd64" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "x86"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if ((($ProcessorArchitecture -eq "amd64") -or ($ProcessorArchitecture -eq "arm64" -and $Amd64AppsSupportedOnArm64)) -and (Test-Path (Join-Path $DependencyPackagesDir "x64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } } Write-Host $UiStrings.InstallingPackage $AddPackageSucceeded = $False try { if ($DependencyPackages.FullName.Count -gt 0) { Write-Host $UiStrings.DependenciesFound $DependencyPackages.FullName Add-AppxPackage -Path $DeveloperPackagePath.FullName -DependencyPath $DependencyPackages.FullName -ForceApplicationShutdown } else { Add-AppxPackage -Path $DeveloperPackagePath.FullName -ForceApplicationShutdown } $AddPackageSucceeded = $? } catch { $Error[0] # Dump details about the last error } if (!$AddPackageSucceeded) { if ($NeedInstallCertificate) { PrintMessageAndExit $UiStrings.ErrorAddPackageFailedWithCert $ErrorCodes.AddPackageFailed } else { PrintMessageAndExit $UiStrings.ErrorAddPackageFailed $ErrorCodes.AddPackageFailed } } } # # Main script logic when the user launches the script without parameters. # function DoStandardOperations { # Check for an .appx or .msix file in the script directory $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } if ($PackagePath -eq $null) { $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } } $PackageCount = ($PackagePath | Measure-Object).Count # Check for an .appxbundle or .msixbundle file in the script directory $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.appxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($BundlePath -eq $null) { $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.msixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $BundleCount = ($BundlePath | Measure-Object).Count # Check for an .eappx or .emsix file in the script directory $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.eappx") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedPackagePath -eq $null) { $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.emsix") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedPackageCount = ($EncryptedPackagePath | Measure-Object).Count # Check for an .eappxbundle or .emsixbundle file in the script directory $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.eappxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedBundlePath -eq $null) { $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.emsixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedBundleCount = ($EncryptedBundlePath | Measure-Object).Count $NumberOfPackages = $PackageCount + $EncryptedPackageCount $NumberOfBundles = $BundleCount + $EncryptedBundleCount # There must be at least one package or bundle if ($NumberOfPackages + $NumberOfBundles -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoPackageFound $ErrorCodes.NoPackageFound } # We must have exactly one bundle OR no bundle and exactly one package elseif ($NumberOfBundles -gt 1 -or ($NumberOfBundles -eq 0 -and $NumberOfpackages -gt 1)) { PrintMessageAndExit $UiStrings.ErrorManyPackagesFound $ErrorCodes.ManyPackagesFound } # First attempt to install a bundle or encrypted bundle. If neither exists, fall back to packages and then encrypted packages if ($BundleCount -eq 1) { $DeveloperPackagePath = $BundlePath Write-Host ($UiStrings.BundleFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedBundleCount -eq 1) { $DeveloperPackagePath = $EncryptedBundlePath Write-Host ($UiStrings.EncryptedBundleFound -f $DeveloperPackagePath.FullName) } elseif ($PackageCount -eq 1) { $DeveloperPackagePath = $PackagePath Write-Host ($UiStrings.PackageFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedPackageCount -eq 1) { $DeveloperPackagePath = $EncryptedPackagePath Write-Host ($UiStrings.EncryptedPackageFound -f $DeveloperPackagePath.FullName) } # The package must be signed $PackageSignature = Get-AuthenticodeSignature $DeveloperPackagePath $PackageCertificate = $PackageSignature.SignerCertificate if (!$PackageCertificate) { PrintMessageAndExit $UiStrings.ErrorPackageUnsigned $ErrorCodes.PackageUnsigned } # Test if the package signature is trusted. If not, the corresponding certificate # needs to be present in the current directory and needs to be installed. $NeedInstallCertificate = ($PackageSignature.Status -ne "Valid") if ($NeedInstallCertificate) { # List all .cer files in the script directory $DeveloperCertificatePath = Get-ChildItem (Join-Path $ScriptDir "*.cer") | Where-Object { $_.Mode -NotMatch "d" } $DeveloperCertificateCount = ($DeveloperCertificatePath | Measure-Object).Count # There must be exactly 1 certificate if ($DeveloperCertificateCount -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoCertificateFound $ErrorCodes.NoCertificateFound } elseif ($DeveloperCertificateCount -gt 1) { PrintMessageAndExit $UiStrings.ErrorManyCertificatesFound $ErrorCodes.ManyCertificatesFound } Write-Host ($UiStrings.CertificateFound -f $DeveloperCertificatePath.FullName) # The .cer file must have the format of a valid certificate ValidateCertificateFormat $DeveloperCertificatePath # The package signature must match the certificate file if ($PackageCertificate -ne (Get-PfxCertificate $DeveloperCertificatePath)) { PrintMessageAndExit $UiStrings.ErrorCertificateMismatch $ErrorCodes.CertificateMismatch } } $NeedDeveloperLicense = CheckIfNeedDeveloperLicense # Relaunch the script elevated with the necessary parameters if needed if ($NeedDeveloperLicense -or $NeedInstallCertificate) { Write-Host $UiStrings.ElevateActions if ($NeedDeveloperLicense) { Write-Host $UiStrings.ElevateActionDevLicense } if ($NeedInstallCertificate) { Write-Host $UiStrings.ElevateActionCertificate } $IsAlreadyElevated = ([Security.Principal.WindowsIdentity]::GetCurrent().Groups.Value -contains "S-1-5-32-544") if ($IsAlreadyElevated) { if ($Force -and $NeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } if ($Force -and $NeedInstallCertificate) { Write-Warning $UiStrings.WarningInstallCert } } else { if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceElevate $ErrorCodes.ForceElevate } else { Write-Host $UiStrings.ElevateActionsContinue Pause } } LaunchElevated } InstallPackageWithDependencies } # # Main script entry point # if ($GetDeveloperLicense -or $CertificatePath) { DoElevatedOperations } else { DoStandardOperations PrintMessageAndExit $UiStrings.Success $ErrorCodes.Success } # SIG # Begin signature block # MIIlsAYJKoZIhvcNAQcCoIIloTCCJZ0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAYh/586NhEPWiO # +3D6/pj3+lXDRXkK9+wCdlGR7safL6CCC2cwggTvMIID16ADAgECAhMzAAAFV8+Q # 3cfRwIiMAAAAAAVXMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTEyWhcNMjQxMDE2MTk1MTEyWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCs0/kFGrFBPJjNzuVjixsArYe7PjsMayjyn3AS8PHH7QmCeCIh2iH6OGSizwdy # /HSU5bfZcxZn25YEyff6mBQplp064tc7cue5Win7lqQKjCq5eExLe7M9Ms42HJ48 # 2nviJZvVK1qNDe4Y7H58TDTSatOk0agN5GP9xQc6opv9NPHZMK3vPfbKP85w2nmm # T7wDkaDVLoMxmEmNnf2zYtUauyrx+zzLVE/dkFvaKuwxqYg5QVJNqvxqx7FoCCg1 # q5WdAyp4B0S01JxTFPqb9w185mOsIi0dk7uJ6JoOT2WOsJL1BUuV2MgmFp1Z2OIB # rwkdeB55wG8mF7az1dWGjk5NAgMBAAGjggFuMIIBajAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUZUiwqCE+1UNl9kCzINVmNMKtebcw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwODY1KzUwMTU5NzAfBgNVHSMEGDAWgBTm/F97uyIAWORyTrX0 # IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j # b20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0FfMjAxMC0wNy0wNi5jcmww # WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQDKLsNC5lAhZ0LL2vbh5pbhYDM1 # htEg3+di/58fDvtTcT+oLwq+eRPuIleUaK37eaEeynCJA7WvdJK9FjvZBC4Fbkqh # Lu6lSqplUUeJzxn620qcful+phcUszQYDyAsh4fjdTzJtx2jGeiJcD193yIoIzjN # rllXCtGVMSjryy2jiU4pczp1WOjWrCL9fz0ZvR811YZAnhyP6zu1V8pdYqeA668h # KvdfZzVp60F8ZkqnucOpa1WKiQEYEwkG5vOQdxoOxZWc+MJ6cmcNgA+7SfJbb0XX # +hsKIzK7Tb/E9dELF88573stY+AuuApvZLAsG76aU/jvqlyreUWX5M3uW2ShMIIG # cDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDE3 # WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEw # MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6Q5kUHlntcTj/QkATJ6U # rPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9RJwI6GWTzixVhL99COMu # K6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjWaxeUOpPOJj/s5v40mFfV # HV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkcvR3EVWJXcvhnuSUgNN5d # pqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YASNUwSpr5SW/Wm2uCLC0h3 # 1oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZM4BqiU2jamZjeJPVMM+V # HwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFOb8X3u7 # IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGd # BgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggr # BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQA # ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAGnTvV08pe8QWhXi4UNMi # /AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1b6/lf3mVd+UC1PHr2M1O # HhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMhKeWloWmMIpPMdJjnoUdD # 8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJN2FtB91TGcun1mHCv+KD # qw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCqtq27ckdjF/qm1qKmhuyo # EESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW77Gcf/wiS0mKbhXjpn92 # W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14yjPs3hdHcdYWch8ZaV4XC # v90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaXevfpUk30dwVPhcbYC/GO # 7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19xHkCvmGXJIuhCISWKHC1g # 2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQHTiVmx5mMxMnORd4hzbO # TsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlacvyRdUQKdannSF9PawZSO # B3slcUSrBmrm1MbfI5qWdcUxghmfMIIZmwIBATCBlTB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwAhMzAAAFV8+Q3cfRwIiMAAAAAAVXMA0GCWCGSAFlAwQC # AQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA/8sllbhmdgHazXDKfJje5 # ZPISyNOJfdmSfAvZZC8tJDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBpAGMAcgBv # AHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3DQEB # AQUABIIBABoeIsmpFKWj+/DHcj7a/ppHvpeKsn0Jb20gbWcbk1BJD4HdDsWMZdZv # JyJjJ4swk9l5qsqRgt+WFtqYMoNul3XnXo2zHpSsAeypDGTTtnvrsTtqR5YXRhfB # ZpESj2UIlW9ESxRpmJscJpEwTymVPf81VR+gXiFTCZ1cLuX6YU6A8RFJTS4YifFL # K+4ENafhVH8Rv1ImQIZt817ttK6lMJHA8TvXKHleAt/jfkrUuLZCIt7a8LRRG14h # urv+OD4yRSNTCFBDBEXni7sqBH7vIrfoVoXs1hbLXcV5JYO2CK3yHBDAZNE2163e # IcwCDObIHWcPa2p9u4USrZuCvPH6InehghcpMIIXJQYKKwYBBAGCNwMDATGCFxUw # ghcRBgkqhkiG9w0BBwKgghcCMIIW/gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYL # KoZIhvcNAQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEwMTANBglghkgB # ZQMEAgEFAAQgf6H5HE1KKmmasEjpJd+4pr328u4rgtlnMDMQIe/XhvACBmX8gwTS # NBgTMjAyNDA0MTQyMTA5MTMuNDkyWjAEgAIB9KCB2KSB1TCB0jELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IEly # ZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT # Tjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB3V1XHZXUraobAAEAAAHdMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIz # MTAxMjE5MDcwOVoXDTI1MDExMDE5MDcwOVowgdIxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046ODZERi00 # QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCoTgOUROoud5x1ER+JZ3yi # 6fvSb4qbk7XLWoqwsTFEqz0suQlitg7a4kD/k+dh12zdoOwJLUNaUGW0wxhcyund # N72GDawj7iSvj0bD9hT1Q4wV8uZqy0RcyBxy2ogGqGxObxSbqMWdGVnSjArPGnI4 # R1Jn2mPu/fwke7jfgePsYyasL3aVP5qdJgKt3mq8h/gCpr+pZK0DfM4K3GwoB8LK # r76k+pRBamKYu7ip+zAGG0ni3tKTHWrVeRFujVZ1zGDk0Srhj38nwSnUobmpS6PP # JBu6mtpmwOZe+/l9OiQHrDJKMmK+P/QoAxYx1KXB0jg7o5RQSjItevM0XS3q3aVt # GwV/RA7sdswTDGhCvDcsWsAhLgKu/vu5LRQG5d4VCrbs2AtRVGblJdgaulNe0uAi # rKkd4rS0/ajXG9qQCeI6yA3ZZeU4KKnn+YKb/mHLwTPN+G1xTcMrXd7oww9uD/Q3 # fMX1Sb7po7AUEJCuU/6stx60CfLndZx0r7RVYuUmv7mxrmBKUvIBehg1jefym73h # ZHbKE1SD6PKZFoYz7NEO5wOfrgcUAeM5YxIys+VluwQOMKZhZtuH4QZkY1eDW6fp # +/HIAI7w0n05QOg2AXL9pMdSR9nSIWkZ0njl3j0+oTBdCJeffCzLtK8N+VYlFnAE # JFDVE8UZ6hhcc+cPmbrDAwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFG6i9baMj1Ha # Rcsh0gylo9COJcPxMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAuVNmyDS4FyB1m # zHKlbn/Y5FE/yvM8iwb7uYfCa6mEds/3mjtsqNTqHPUocr8W3vRmQ7u5JFM8Usid # SGZLGWcOhQ6usmTU9zxIwBJ0RKUQS/Evpm14PjuFS0tC0pm/FyGYi7GqmdHwxHL9 # x3gPv8v6ipwkFpF4IaWhDMBjEM0ZIRsHBnV69cxqUOx08b37ue8RcWV9TJCp1hRD # Serq3fuLXlIF49J4CDsf/5d1zCtx7fE9vs7xiTQBfuf+agZO569O/cyAmxV78bYn # TTeXqF3VvvawCJEvlBg9fQGXQa7benWfjnQKrgYg5GEOZFX1DCkt9ch0DhoJhcbg # js06Vh2pa6qXSJZbMvCjbI+VPbDjYlgHfTzZchBx20GQ5ovfwTZTmMk7dGHoS2w6 # L5mVDWs5O/TnfwPde5qgnU6qxMcARlD2zD/v73WFKmibKbqQZ1LYzn/++gwIVcvH # v3us0ffD5KZZpYjtm6y90N6w+vmQlXaxjPUZuoVAwQZL2IfmI5hnXEORwelk/UXn # PPqgx5m4S4V+GXWmq3efzl3i24Mdn+y+EEEI9yoKo6gzliJ1YTRNYGLU1ix3uPPN # nf5Oy7otCtYPBGayg+5mjq7CSyjypXoHHifRQqmNbA1ClIUWtBB1FvmZCi5aISq0 # uxcI3ayDVpDwYG0M5wo3RNpuO0I02zCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # ODZERi00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WiIwoBATAHBgUrDgMCGgMVADYjRxll2zWgz8Z8og2xDnIkoxYQoIGDMIGA # pH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQAC # BQDpxqLbMCIYDzIwMjQwNDE1MDI0NTQ3WhgPMjAyNDA0MTYwMjQ1NDdaMHQwOgYK # KwYBBAGEWQoEATEsMCowCgIFAOnGotsCAQAwBwIBAAICE70wBwIBAAICEWwwCgIF # AOnH9FsCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC # AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAXn/57Q8uS0Y145cFg # 6qUh9kXLp8hRUeGzB4RRVAU75ZrTU3mwNU7RiZl2ojUQGZueyidtTMQOitcog6wF # oChqfoZkuNwVwZvx0xD/JLWl+PrWMFf6QRMUfh9KL4Ymomn+qUvuBUC4oM6K7HYH # CMN5vjto5Inw23jFjVY0sTJkWzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMA0GCWCGSAFlAwQC # AQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkE # MSIEIGUh0aiYQyWsNBZa37NcpoROgwB6HjtJDe7vjF9oEffWMIH6BgsqhkiG9w0B # CRACLzGB6jCB5zCB5DCBvQQgYf8OLZplrE94mZx7R9FZN+1AjdNpUcWPkYjjesAx # Y2YwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd1d # Vx2V1K2qGwABAAAB3TAiBCBHkFG7qdVgGocq6SvFOhLWGkfpUxXq5KzOZ509EmWZ # EDANBgkqhkiG9w0BAQsFAASCAgAAreaX+0cSWw1i0dGuy0VNlWyfOLOBlFga7jqH # JjaRYRnFElcz64CmUmL14M7Fujptdp8tFETwGp6ifSWMq5sABVWPQCijp8opC58U # Pt+npNoHKtllkhh6VNZNSzkkgPT1SBwTaBFddur0lAsEA2Amnddil3JUV7s3yf2E # XJVEVAvx/o0gkt+wXhooPtk/wBfjr83zSDP9uBpw/c75OCBrNx3LHLi9UgoRn/jt # JRFz4mQ1yfXqNvcMf3W+TQ/zhE71BXJIOYyxsUKcGSmJMedclMaJA1LWdFafPQTE # X2guhAnggxHODT2WwcFp6mlA14Pc0OTVgGhc25V4fN1Kpdp/Yau/aERUXBEKhULe # /R4vy0fabSSGw1YIjkUORu3CTLBVfPE8D4CXqqXBcVaDIAeuawVlaTVbw/5eExbK # 9DyAAYMkVToOTzrxvHSnlD50O2/8XsObRO6GCKZAJjWpu4Wz+wS2KIQtH15opO1W # BPaEE4wy/V1/ACRiA/NZRPMj+I+xjjGS49VHMN6xZb7/NSMsVMxVvVUyxFNZTGCC # RoNR1f9kfGcDhtaGLie9/3JCTZFkDnWIGPjeuqHCzOGXbMOtjXFsdb9gN8AaOCxY # mmuyJKucf7hDFtMnCNyK0/Vg/+p0VGFTe8EZw3Jb8DRQ+hnkFcN49IUhs/Rw2g/d # cbJLrA== # SIG # End signature block
0
sample_18_74.ps1
# # Module manifest for module 'OCI.PSModules.Waf' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waf.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e0acce48-3280-4a26-9a26-931bf7028140' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waf Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waf.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWafNetworkAddressList', 'Get-OCIWafNetworkAddressListsList', 'Get-OCIWafProtectionCapabilitiesList', 'Get-OCIWafProtectionCapabilityGroupTagsList', 'Get-OCIWafWebAppFirewall', 'Get-OCIWafWebAppFirewallPoliciesList', 'Get-OCIWafWebAppFirewallPolicy', 'Get-OCIWafWebAppFirewallsList', 'Get-OCIWafWorkRequest', 'Get-OCIWafWorkRequestErrorsList', 'Get-OCIWafWorkRequestLogsList', 'Get-OCIWafWorkRequestsList', 'Move-OCIWafNetworkAddressListCompartment', 'Move-OCIWafWebAppFirewallCompartment', 'Move-OCIWafWebAppFirewallPolicyCompartment', 'New-OCIWafNetworkAddressList', 'New-OCIWafWebAppFirewall', 'New-OCIWafWebAppFirewallPolicy', 'Remove-OCIWafNetworkAddressList', 'Remove-OCIWafWebAppFirewall', 'Remove-OCIWafWebAppFirewallPolicy', 'Update-OCIWafNetworkAddressList', 'Update-OCIWafWebAppFirewall', 'Update-OCIWafWebAppFirewallPolicy' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waf' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
4439.ps1
function Download-Package { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $FastPackageReference, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $Location ) Write-Debug ($LocalizedData.ProviderApiDebugMessage -f ('Download-Package')) Install-PackageUtility -FastPackageReference $FastPackageReference -Request $Request -Location $Location }
0
NTFS ACLs Folder Tree.ps1
####################################### # TITLE: listACL.ps1 # # AUTHOR: Santiago Fernandez Mu±oz # # # # DESC: This script generate a HTML # # report show all ACLs asociated with # # a Folder tree structure starting in # # root specified by the user # ####################################### param ([string] $computer = 'localhost', [string] $path = $(if ($help -eq $false) {Throw "A path is needed."}), [int] $level = 0, [string] $scope = 'administrator', [switch] $help = $false, [switch] $debug = $false ) #region Initializations and previous checkings #region Initialization $allowedLevels = 10 $Stamp = get-date -uformat "%Y%m%d" $report = "$PWD\\$computer.html" $comparison = "" $UNCPath = "\\\\" + $computer + "\\" + $path + "\\" #endregion #region Previou chekings if ($level -gt $allowedLevels -or $level -lt 0) {Throw "Level out of range."} if ($computer -eq 'localhost' -or $computer -ieq $env:COMPUTERNAME) { $UNCPath = $path } switch ($scope) { micro { $comparison = '($acl -notlike "*administrator*" -and $acl -notlike "*BUILTIN*" -and $acl -notlike "*NT AUTHORITY*")' } user { $comparison = '($acl -notlike "*administrator*" -and $acl -notlike "*BUILTIN*" -and $acl -notlike "*IT*" -and $acl -notlike "*NT AUTHORITY*" -and $acl -notlike "*All*")' } } #endregion #endregion #region Function definitions function drawDirectory([ref] $directory) { $dirHTML = ' <div class="' if ($directory.value.level -eq 0) { $dirHTML += 'he0_expanded' } else { $dirHTML += 'he' + $directory.value.level } $dirHTML += '"><span class="sectionTitle" tabindex="0">Folder ' + $directory.value.Folder.FullName + '</span></div> <div class="container"><div class="he' + ($directory.value.level + 1) + '"><span class="sectionTitle" tabindex="0">Access Control List</span></div> <div class="container"> <div class="heACL"> <table class="info3" cellpadding="0" cellspacing="0"> <thead> <th scope="col"><b>Owner</b></th> <th scope="col"><b>Privileges</b></th> </thead> <tbody>' foreach ($itemACL in $directory.value.ACL) { $acls = $null if ($itemACL.AccessToString -ne $null) { $acls = $itemACL.AccessToString.split("`n") } $dirHTML += '<tr><td>' + $itemACL.Owner + '</td> <td> <table> <thead> <th>User</th> <th>Control</th> <th>Privilege</th> </thead> <tbody>' foreach ($acl in $acls) { $temp = [regex]::split($acl, "(?<!(,|NT))\\s{1,}") if ($debug) { write-host "ACL(" $temp.gettype().name ")[" $temp.length "]: " $temp } if ($temp.count -eq 1) { continue } if ($scope -ne 'administrator') { if ( Invoke-Expression $comparison ) { $dirHTML += "<tr><td>" + $temp[0] + "</td><td>" + $temp[1] + "</td><td>" + $temp[2] + "</td></tr>" } } else { $dirHTML += "<tr><td>" + $temp[0] + "</td><td>" + $temp[1] + "</td><td>" + $temp[2] + "</td></tr>" } } $dirHTML += '</tbody> </table> </td> </tr>' } $dirHTML += ' </tbody> </table> </div> </div> </div>' return $dirHTML } #endregion #region Printing help message if ($help) { Write-Host @" /ĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘ\\ Ę Script gather access control lists per directory Ę \\ĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘ/ USAGE: ./listACL -computer <machine or IP> -path <path> -level <0-10> -help:[$false] PARAMETERS: computer [OPTIONAL] - Computer name or IP addres where folder is hosted (Default: localhost) path [REQUIRED] - Folder's path to query. level [OPTIONAL] - Level of folders to go down in the query. Allowd values are between 0 and $allowedLevels. 0 show that there's no limit in the going down (Default: 0) scope [OPTIONAL] - Sets the amount of information showd in the report. Allowd values are: Ę user, show important information to the user. Ę micro, show user scope information plus important information for the IT Department. Ę administrator, show all information. help [OPTIONAL] - This help. "@ exit 0 } #endregion if (Test-Path $report) { Remove-item $report } #To normalize I check if last character in the path is the folder separator character if ($path.Substring($path.Length - 1,1) -eq "\\") { $path = $path.Substring(0,$path.Length - 1) } #region Header, style and javascript functions needed by the html report @" <html dir="ltr" xmlns:v="urn:schemas-microsoft-com:vml" gpmc_reportInitialized="false"> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-16" /> <title>Access Control List for $path in $computer</title> <!-- Styles --> <style type="text/css"> body{ background-color:#FFFFFF; border:1px solid #666666; color:#000000; font-size:68%; font-family:MS Shell Dlg; margin:0px 0px 10px 0px; } table{ font-size:100%; table-layout:fixed; width:100%; } td,th{ overflow:visible; text-align:left; vertical-align:top; white-space:normal; } .title{ background:#FFFFFF; border:none; color:#333333; display:block; height:24px; margin:0px 0px -1px 0px; padding-top:4px; position:relative; table-layout:fixed; width:100%; z-index:5; } .he0_expanded{ background-color:#FEF7D6; border:1px solid #BBBBBB; color:#3333CC; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:0px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he1_expanded{ background-color:#A0BACB; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:10px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he1{ background-color:#A0BACB; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:10px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he2{ background-color:#C0D2DE; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:20px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he3{ background-color:#D9E3EA; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:30px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he4{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:40px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he4h{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:45px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he4i{ background-color:#F9F9F9; border:1px solid #BBBBBB; color:#000000; display:block; font-family:MS Shell Dlg; font-size:100%; margin-bottom:-1px; margin-left:45px; margin-right:0px; padding-bottom:5px; padding-left:21px; padding-top:4px; position:relative; width:100%; } .he5{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:50px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he5h{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; padding-left:11px; padding-right:5em; padding-top:4px; margin-bottom:-1px; margin-left:55px; margin-right:0px; position:relative; width:100%; } .he5i{ background-color:#F9F9F9; border:1px solid #BBBBBB; color:#000000; display:block; font-family:MS Shell Dlg; font-size:100%; margin-bottom:-1px; margin-left:55px; margin-right:0px; padding-left:21px; padding-bottom:5px; padding-top: 4px; position:relative; width:100%; } .he6{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:55px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he7{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:60px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he8{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:65px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he9{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:70px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he10{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:75px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he11{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:80px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .heACL { background-color:#ECFFD7; border:1px solid #BBBBBB; color:#000000; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:90px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } DIV .expando{ color:#000000; text-decoration:none; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:normal; position:absolute; right:10px; text-decoration:underline; z-index: 0; } .he0 .expando{ font-size:100%; } .info, .info3, .info4, .disalign{ line-height:1.6em; padding:0px 0px 0px 0px; margin:0px 0px 0px 0px; } .disalign TD{ padding-bottom:5px; padding-right:10px; } .info TD{ padding-right:10px; width:50%; } .info3 TD{ padding-right:10px; width:33%; } .info4 TD, .info4 TH{ padding-right:10px; width:25%; } .info5 TD, .info5 TH{ padding-right:0px; width:20%; } .info TH, .info3 TH, .info4 TH, .disalign TH{ border-bottom:1px solid #CCCCCC; padding-right:10px; } .subtable, .subtable3{ border:1px solid #CCCCCC; margin-left:0px; background:#FFFFFF; margin-bottom:10px; } .subtable TD, .subtable3 TD{ padding-left:10px; padding-right:5px; padding-top:3px; padding-bottom:3px; line-height:1.1em; width:10%; } .subtable TH, .subtable3 TH{ border-bottom:1px solid #CCCCCC; font-weight:normal; padding-left:10px; line-height:1.6em; } .subtable .footnote{ border-top:1px solid #CCCCCC; } .subtable3 .footnote, .subtable .footnote{ border-top:1px solid #CCCCCC; } .subtable_frame{ background:#D9E3EA; border:1px solid #CCCCCC; margin-bottom:10px; margin-left:15px; } .subtable_frame TD{ line-height:1.1em; padding-bottom:3px; padding-left:10px; padding-right:15px; padding-top:3px; } .subtable_frame TH{ border-bottom:1px solid #CCCCCC; font-weight:normal; padding-left:10px; line-height:1.6em; } .subtableInnerHead{ border-bottom:1px solid #CCCCCC; border-top:1px solid #CCCCCC; } .explainlink{ color:#000000; text-decoration:none; cursor:pointer; } .explainlink:hover{ color:#0000FF; text-decoration:underline; } .spacer{ background:transparent; border:1px solid #BBBBBB; color:#FFFFFF; display:block; font-family:MS Shell Dlg; font-size:100%; height:10px; margin-bottom:-1px; margin-left:43px; margin-right:0px; padding-top: 4px; position:relative; } .filler{ background:transparent; border:none; color:#FFFFFF; display:block; font:100% MS Shell Dlg; line-height:8px; margin-bottom:-1px; margin-left:43px; margin-right:0px; padding-top:4px; position:relative; } .container{ display:block; position:relative; } .rsopheader{ background-color:#A0BACB; border-bottom:1px solid black; color:#333333; font-family:MS Shell Dlg; font-size:130%; font-weight:bold; padding-bottom:5px; text-align:center; } .rsopname{ color:#333333; font-family:MS Shell Dlg; font-size:130%; font-weight:bold; padding-left:11px; } .gponame{ color:#333333; font-family:MS Shell Dlg; font-size:130%; font-weight:bold; padding-left:11px; } .gpotype{ color:#333333; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; padding-left:11px; } #uri { color:#333333; font-family:MS Shell Dlg; font-size:100%; padding-left:11px; } #dtstamp{ color:#333333; font-family:MS Shell Dlg; font-size:100%; padding-left:11px; text-align:left; width:30%; } #objshowhide { color:#000000; cursor:pointer; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; margin-right:0px; padding-right:10px; text-align:right; text-decoration:underline; z-index:2; } #gposummary { display:block; } #gpoinformation { display:block; } </style> </head> <body> <table class="title" cellpadding="0" cellspacing="0"> <tr><td colspan="2" class="gponame">Access Control List for $path on machine $computer</td></tr> <tr> <td id="dtstamp">Data obtained on: $(Get-Date)</td> <td><div id="objshowhide" tabindex="0"></div></td> </tr> </table> <div class="filler"></div> "@ | Set-Content $report #endregion #region Information gathering $colFiles = Get-ChildItem -path $UNCPath -Filter *. -Recurse -force -Verbose | Sort-Object FullName $colACLs = @() #We start going through the path pointed out by the user foreach($file in $colFiles) { #To control the current level in the tree we are in it's needed to count the number of separator characters #contained in the path. However in order to make the count correctly it's needed to delete the path #provided by the user (the parent). Once the parent has been deleted, the rest of the full name will be #string used to do the level count. #It's needed to use a REGEX object to get ALL separator character matches. $matches = (([regex]"\\\\").matches($file.FullName.substring($path.length, $file.FullName.length - $path.length))).count if ($level -ne 0 -and ($matches - 1) -gt $level) { continue } if ($debug) { Write-Host $file.FullName "->" $file.Mode } if ($file.Mode -notlike "d*") { continue } $myobj = "" | Select-Object Folder,ACL,level $myobj.Folder = $file $myobj.ACL = Get-Acl $file.FullName $myobj.level = $matches - 1 $colACLs += $myobj } #endregion #region Setting up the report '<div class="gposummary">' | Add-Content $report for ($i = 0; $i -lt $colACLs.count; $i++) { drawDirectory ([ref] $colACLs[$i]) | Add-Content $report } '</div></body></html>' | Add-Content $report #endregion
0
sample_27_27.ps1
# # Module manifest for module 'OCI.PSModules.Accessgovernancecp' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Accessgovernancecp.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c71dab6b-b390-499f-9d71-506da8082df7' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Accessgovernancecp Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Accessgovernancecp.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAccessgovernancecpGovernanceInstance', 'Get-OCIAccessgovernancecpGovernanceInstanceConfiguration', 'Get-OCIAccessgovernancecpGovernanceInstancesList', 'Move-OCIAccessgovernancecpGovernanceInstanceCompartment', 'New-OCIAccessgovernancecpGovernanceInstance', 'Remove-OCIAccessgovernancecpGovernanceInstance', 'Update-OCIAccessgovernancecpGovernanceInstance', 'Update-OCIAccessgovernancecpGovernanceInstanceConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Accessgovernancecp' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
ScheduleGPOBackups_2.ps1
Import-Module grouppolicy #region ConfigBlock # What domain are we going to backup GPOs for? $domain = "mydomain.com" # Where are we going to store the backups? $gpoBackupRootDir = "c:\\gpoBackups" # As I plan to do a new backup set each month I'll setup the directory names to reflect # the year and month in a nice sortable way. # Set this up and format to your liking, I prefer $gpoBackupRootDir\\yyyy-MM $backupDir = "$gpoBackupRootDir\\{0:yyyy-MM}" -f (Get-Date) # Perform a full backup how often? Day/Week/Month/Year? #$fullBackupFrequency = "Day" #$fullBackupFrequency = "Week" $fullBackupFrequency = "Month" #$fullBackupFrequency = "Year" # Perform Incremental backups how often? Hour/Day/Week/Month? $IncBackupFreqency = "Hour" # $IncBackupFreqency = "Day" # $IncBackupFreqency = "Week" # $IncBackupFreqency = "Month" # How many full sets to keep? # Alternatively, how far back do we keep our backup sets? $numKeepBackupSets = 12 # On what day do we want to consider the start of Week? #$startOfWeek = "Sunday" $startOfWeek = "Monday" #$startOfWeek = "Tuesday" #$startOfWeek = "Wednesday" #$startOfWeek = "Thursday" #$startOfWeek = "Friday" #$startOfWeek = "Saturday" # On what day do we want to consider the start of Month? $startOfMonth = 1 # On what day do we want to consider the start of Year? $startOfYear = 1 #endregion $currentDateTime = Get-Date $doFull = $false $doInc = $false # Does our backup directory exist? # If not attempt to create it and fail the script with an approprate error if (-not (Test-Path $backupDir)) { try { New-Item -ItemType Directory -Path $backupDir } catch { Throw $("Could not create directory $backupDir") } } # If we're here then our backup directory is in good shape # Check if we need to run a full backup or not # if we do, then run it if ( Test-Path $backupDir\\LastFullTimestamp.xml ) { # Import the timestamp from the last recorded complete full $lastFullTimestamp = Import-Clixml $backupDir\\LastFullTimestamp.xml # check to see if the timestamp is valid, if not then delete it and run a full if ( $lastFullTimestamp -isnot [datetime] ) { $doFull = $true Remove-Item $backupDir\\LastFullTimestamp.xml } else # $lastfulltimestamp is or can be boxed/cast into [datetime] { # determine how long it has been since the last recorded full $fullDelta = $currentDateTime - $lastFullTimestamp switch ($fullBackupFrequency) { Day { if ( $fullDelta.days -gt 0 ) { $doFull = $true } } Week { if ( ($currentDateTime.dayOfWeek -eq [DayOfWeek]$startOfWeek) ` -or ($fullDelta.days -gt 7) ) { $doFull = $true } } Month { if ( ($currentDateTime.day -eq $startOfMonth) ` -or ($fullDelta.days -gt 30) ) { $doFull = $true } } Year { if ( ($currentDateTime.dayofyear -eq $startOfYear) ` -or ($fullDelta.days -gt 365) ) { $doFull = $true } } } } } else # There is no recorded last completed full so we want to run one { $doFull = $true } if ($doFull) { # Run Backup of All GPOs in domain $GPOs = Get-GPO -domain $domain -All foreach ($GPO in $GPOs) { $GPOBackup = Backup-GPO $GPO.DisplayName -Path $backupDir # First build the Report path, then generate a report of the backed up settings. $ReportPath = $backupDir + "\\" + $GPO.ModificationTime.Year + "-" + $GPO.ModificationTime.Month + "-" + $GPO.ModificationTime.Day + "_" + $GPO.Displayname + "_" + $GPOBackup.Id + ".html" Get-GPOReport -Name $GPO.DisplayName -path $ReportPath -ReportType HTML } Export-Clixml -Path $backupDir\\LastFullTimestamp.xml -InputObject ($currentDateTime) } else # If we're not running a full check if we need to run an incremental backup { if ( Test-Path $backupDir\\LastIncTimestamp.xml ) { # Import the timestamp from the last recorded complete Incremental $lastIncTimestamp = Import-Clixml $backupDir\\LastIncTimestamp.xml # check to see if the timestamp is valid, if not then delete it and run an inc if ( $lastIncTimestamp -isnot [datetime] ) { # Import the timestamp from the last recorded complete full # If we're here then the timestamp is valid. It is checked earlier and if it fails # or doesn't exist then we run a full and will never get here. # determine how long it has been since the last recorded full $lastFullTimestamp = Import-Clixml $backupDir\\LastFullTimestamp.xml $IncDelta = $currentDateTime - $lastFullTimestamp $doInc = $true Remove-Item $backupDir\\LastIncTimestamp.xml } else # $lastIncTimestamp is or can be boxed/cast into [datetime] { # determine how long it has been since the last recorded full $IncDelta = $currentDateTime - $lastIncTimestamp } } else # There is no recorded last Incremental { # Import the timestamp from the last recorded complete full # If we're here then the timestamp is valid. It is checked earlier and if it fails # or doesn't exist then we run a full and will never get here. # determine how long it has been since the last recorded full $lastFullTimestamp = Import-Clixml $backupDir\\LastFullTimestamp.xml $IncDelta = $currentDateTime - $lastFullTimestamp } # If we have already determined to run an Inc we want to skip this part if ($doInc -eq $false) { switch ($IncBackupFreqency) { Hour { if ($IncDelta.hours -gt 0) { $doInc = $true } } Day { if ($IncDelta.days -gt 0) { $doInc = $true } } Week { if ( ($currentDateTime.dayOfWeek -eq [DayOfWeek]$startOfWeek) ` -or ($IncDelta.days -gt 7) ) { $doInc = $true } } Month { if ( ($currentDateTime.day -eq $startOfMonth) ` -or ($IncDelta.days -gt 30) ) { $doInc = $true } } } } # Time to check our Incremental flag and run the backup if we need to if ($doInc) { # Run Incremental Backup $GPOs = Get-GPO -domain $domain -All | Where-Object { $_.modificationTime -gt ($currentDateTime - $incDelta) } foreach ($GPO in $GPOs) { $GPOBackup = Backup-GPO $GPO.DisplayName -Path $backupDir # First build the Report path, then generate a report of the backed up settings. $ReportPath = $backupDir + "\\" + $GPO.ModificationTime.Year + "-" + $GPO.ModificationTime.Month + "-" + $GPO.ModificationTime.Day + "_" + $GPO.Displayname + ".html" Get-GPOReport -Name $GPO.DisplayName -path $ReportPath -ReportType HTML } Export-Clixml -Path $backupDir\\LastIncTimestamp.xml -InputObject ($currentDateTime) } } #TODO: Cleanup old backup sets
0
sample_6_52.ps1
#************************************************ # TS_ClusterXsigoDriverNetworkCheck.ps1 # Version 1.0.1 # Date: 6/5/2012 # Author: v-kaw # Description: [Idea ID 2169] [Windows] Xsigo network host driver can cause Cluster disconnects # Rule number: 2169 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=2169 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 2169 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_ClusterXsigoDriverNetworkCheck" $PublicContent = "" $InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2566165" $Verbosity = "Warning" $Visibility = "3" $SupportTopicsID = "8001" $Title = $ScriptStrings.ID_ClusterXsigoDriverNetworkCheck_ST $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem # specify on which environments this rule will appy { return ( (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -and #Windows Server 2008 R2 ( IsCluster ) #FailoverCluster ) } Function IsCluster #Check if this machine is cluster. { $ClusterKeyName = "HKLM:\Cluster" if (Test-Path -Path $ClusterKeyName) { return $true } else { return $false } } Function CollectedData { $FileDetected = CheckXsigoDriver if($null -ne $FileDetected) { Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Driver Name" -Value $FileDetected $FileVersion = Get-FileVersionString($FileDetected) Add-member -InputObject $InformationCollected -Membertype Noteproperty -Name "Current Version" -Value $FileVersion Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Required Version" -Value "2.7.3.0" return $true } } # ************** # Detection Logic # ************** Function CheckXsigoDriver() { $System32Folder= Join-Path -Path $Env:windir -ChildPath "System32" $Files =(($System32Folder+"\DRIVERS\XGVHBA.SYS"),($System32Folder+"\DRIVERS\XGVNIC.SYS")) foreach($File in $Files) { if(Test-Path -Path $File) { if((CheckMinimalFileVersion $File 2 6 0 0) -and (-not(CheckMinimalFileVersion $File 2 7 1 0)) ) #check if the file is between the range 2.6.00 to 2.7.10 { return $File } } } return $null } #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if (CollectedData -eq $true) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDzVe9JFHxmyj4s # +kGrdZGGYwL+W4u6NC+H8RxrhMQvt6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC9/ # HFtTQBh2XEngxWO8HSzAqCJSa65smfSu/tZzaL4fMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAC4XIAm76cfAfmyGrd9fK6bFMJjOq63Zb6FQI # IuHdjp3RIHhgLDuWsBIHmnPBMybVTqBcOIqeMF8WM5YdxzdxpNpgdQ623dqVhZJ+ # yfMaVvLxLNgCnEvPrMX7s0O5D1ib+ZNI67J/cdAwyF9mKt5w3lkAUQrwGgA4Z4pv # SFQknvGjjsyhevI7Y+HjsNj257b/FwqCk4fh9BNqpep6e/4WCC4KPav1QFtJaceq # Eh9gUZjIeyvcBFtGZkbUaGGHlEL0CGkf4htxC4DexG8J9GHQEVj/eEG4e9rDo4TM # x3EmTFEQs3UR0XNwKeGaKxuLDyHZbDA9htn9WhyYz0C020QyNKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAeW+esAOHGN5wrxmdb0Xom1U1L9ShCeLpK # WDnXdSOTaAIGZusiCs6IGBMyMDI0MTAyODExNDA0MC4yOTVaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgAu5XQWRCUnotibPerJDFcCYqGVpODu+ymI1tc01yDY8wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAJL5rHHoP05pCnoDeSoS6MuIY3kVlPtLV/OO # KiqaOt6WQxFYS2Arg4F3vZ8lArM6zO3TAMv/k1kVXJiE6ZQq3Xxi/eRVvAa1Ifaa # d/D5w9csTiS4FnR985CgkjmwHkBolUVcrwV/Tgvqr5+INaDX3R1e/QA8KCgHxz5q # bdwFv+CiInNIzH+dTFSvgFAQ77aA93+Fg/vOSPOrGrJqhAc8m8W8WYlXDJ+Kp8V6 # S8wSkEZHtkw0RC+Kgig0jXvMMuwd2z2K+5fnWvMbmTgETca4ytM6858M5atSxTkw # sYm4po5RIy2nOSI5F6clTLjy97Ba8ZlG80J9qPoJNlmGa3nEuMaLqpaWoz2/2Oep # jn9ul3palsqjPA98mwSYZnpHV1f0zaIyBOh7Dk8n3TD92+/iJFftfJwlyGEVVwff # 1IyCYFTf/oDIU/xQSrzNy/h85jOLUbV04Se2jHrvh+X3S6D6OhhS1eZbntgL67SJ # Hit/+5iGRvyf0sgSq2D/I1dv9K9SoIKYvrNjtXKZa1XRswsrnjonyON6YoLI6ayB # dt/NXSkLIqx/mQK9JU0v2WbZaJTBdlxZCT10Qao4BJ3ac2DxyqIEvFc320N74Kob # idL+Z+ALaBP+L93YCvkD2+6pVrEHjXFgw7GxJFlZsWGWmaZ8tW4aCmt3JQQv1L54 # dMYRgRvc # SIG # End signature block
0
ConvertTo-CliXml.ps1
function ConvertTo-CliXml { param( [parameter(position=0,mandatory=$true,valuefrompipeline=$true)] [validatenotnull()] [psobject]$object ) begin { $type = [type]::gettype("System.Management.Automation.Serializer") $ctor = $type.getconstructor("instance,nonpublic", $null, @([xml.xmlwriter]), $null) $sw = new-object io.stringwriter $xw = new-object xml.xmltextwriter $sw $serializer = $ctor.invoke($xw) $method = $type.getmethod("Serialize", "nonpublic,instance", $null, [type[]]@([object]), $null) $done = $type.getmethod("Done", [reflection.bindingflags]"nonpublic,instance") } process { try { $method.invoke($serializer, $object) } catch { write-warning "Could not serialize $($object.gettype()): $_" } } end { $done.invoke($serializer, @()) $sw.ToString() } }
0
1389.ps1
function Test-CPermission { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Path, [Parameter(Mandatory=$true)] [string] $Identity, [Parameter(Mandatory=$true)] [string[]] $Permission, [Carbon.Security.ContainerInheritanceFlags] $ApplyTo, [Switch] $Inherited, [Switch] $Exact ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $originalPath = $Path $Path = Resolve-Path -Path $Path -ErrorAction 'SilentlyContinue' if( -not $Path -or -not (Test-Path -Path $Path) ) { if( -not $Path ) { $Path = $originalPath } Write-Error ('Unable to test {0}''s {1} permissions: path ''{2}'' not found.' -f $Identity,($Permission -join ','),$Path) return } $providerName = Get-CPathProvider -Path $Path | Select-Object -ExpandProperty 'Name' if( $providerName -eq 'Certificate' ) { $providerName = 'CryptoKey' } if( ($providerName -eq 'FileSystem' -or $providerName -eq 'CryptoKey') -and $Exact ) { $Permission += 'Synchronize' } $rights = $Permission | ConvertTo-ProviderAccessControlRights -ProviderName $providerName if( -not $rights ) { Write-Error ('Unable to test {0}''s {1} permissions on {2}: received an unknown permission.' -f $Identity,$Permission,$Path) return } $account = Resolve-CIdentity -Name $Identity if( -not $account) { return } $rightsPropertyName = '{0}Rights' -f $providerName $inheritanceFlags = [Security.AccessControl.InheritanceFlags]::None $propagationFlags = [Security.AccessControl.PropagationFlags]::None $testApplyTo = $false if( $PSBoundParameters.ContainsKey('ApplyTo') ) { if( (Test-Path -Path $Path -PathType Leaf ) ) { Write-Warning "Can't test inheritance/propagation rules on a leaf. Please omit `ApplyTo` parameter when `Path` is a leaf." } else { $testApplyTo = $true $inheritanceFlags = ConvertTo-CInheritanceFlag -ContainerInheritanceFlag $ApplyTo $propagationFlags = ConvertTo-CPropagationFlag -ContainerInheritanceFlag $ApplyTo } } if( $providerName -eq 'CryptoKey' ) { if( (Get-Item -Path $Path | Where-Object { -not $_.HasPrivateKey } ) ) { return $true } } $acl = Get-CPermission -Path $Path -Identity $Identity -Inherited:$Inherited | Where-Object { $_.AccessControlType -eq 'Allow' } | Where-Object { $_.IsInherited -eq $Inherited } | Where-Object { if( $Exact ) { return ($_.$rightsPropertyName -eq $rights) } else { return ($_.$rightsPropertyName -band $rights) -eq $rights } } | Where-Object { if( -not $testApplyTo ) { return $true } if( $Exact ) { return ($_.InheritanceFlags -eq $inheritanceFlags) -and ($_.PropagationFlags -eq $propagationFlags) } else { return (($_.InheritanceFlags -band $inheritanceFlags) -eq $inheritanceFlags) -and ` (($_.PropagationFlags -and $propagationFlags) -eq $propagationFlags) } } if( $acl ) { return $true } else { return $false } }
0
Brushes_1.ps1
$frmMain_OnLoad= { $m_BrushSize = New-Object Drawing.Rectangle(0, 0, $picDemo.Width, $picDemo.Height) $wm = [Drawing.Drawing2D.WrapMode] $cboWraM.Items.AddRange(@($wm::Clamp, $wm::Tile, $wm::TileFlipX, $wm::TileFlipY, $wm::TileFlipXY)) $cboWraM.SelectedIndex = 0 [int]$maxHatchStyle = 53 for ($i = [Convert]::ToInt32([Drawing.Drawing2D.HatchStyle]::Min); $i -lt $maxHatchStyle; $i++) { $cboHatS.Items.Add([Drawing.Drawing2D.HatchStyle] $i) } $cboHatS.SelectedIndex = 0 $lgm = [Drawing.Drawing2D.LinearGradientMode] $cboGraM.Items.AddRange(@($lgm::BackwardDiagonal, $lgm::ForwardDiagonal, ` $lgm::Horizontal, $lgm::Vertical)) $cboGraM.SelectedIndex = 0 } $btnCol1_OnClick= { $cdlg = New-Object Windows.Forms.ColorDialog if ($cdlg.ShowDialog() -eq [Windows.Forms.Dialogresult]::OK) { $col1 = $cdlg.Color $txtCol1.Text = $cdlg.Color.ToString() $txtCol1.BackColor = $cdlg.Color } } $btnCol2_OnClick= { $cdlg = New-Object Windows.Forms.ColorDialog if ($cdlg.ShowDialog() -eq [Windows.Forms.Dialogresult]::OK) { $col2 = $cdlg.Color $txtCol2.Text = $cdlg.Color.ToString() $txtCol2.BackColor = $cdlg.Color } } $cboBruS_OnSelectedIndexChanged= { switch ($cboBruS.Text) { "Large" { $m_BrushSize = New-Object Drawing.Rectangle(0, 0, $picDemo.Width, $picDemo.Height) break } "Medium" { $m_BrushSize = New-Object Drawing.Rectangle(0, 0, [Convert]::ToInt32($picDemo.Width / 2), ` [Convert]::ToInt32($picDemo.Height / 2)) break } "Small" { $m_BrushSize = New-Object Drawing.Rectangle(0, 0, [Convert]::ToInt32($picDemo.Width / 4), ` [Convert]::ToInt32($picDemo.Height / 4)) break } } RedrawPicture } function RedrawPicture { $picDemo.CreateGraphics().Clear([Drawing.Color]::White) $picDemo.Refresh() switch ($cboBruT.Text) { "Solid" { $txtCol2.Enabled = $false $btnCol2.Enabled = $false $cboBruS.Enabled = $false $cboWraM.Enabled = $false $cboHatS.Enabled = $false $nudRota.Enabled = $false $nudGraB.Enabled = $false $cboGraM.Enabled = $false $brush = New-Object Drawing.SolidBrush $col1 break } "Hatch" { $txtCol1.Enabled = $true $btnCol1.Enabled = $true $txtCol2.Enabled = $true $btnCol2.Enabled = $true $cboBruS.Enabled = $false $cboWraM.Enabled = $false $cboHatS.Enabled = $true $nudRota.Enabled = $false $nudGraB.Enabled = $false $cboGraM.Enabled = $false $brush = New-Object ` Drawing.Drawing2D.HatchBrush([Drawing.Drawing2D.HatchStyle]$cboHatS.SelectedItem, $col1, $col2) break } "Texture" { $txtCol1.Enabled = $false $btnCol1.Enabled = $false $txtCol2.Enabled = $false $btnCol2.Enabled = $false $cboBruS.Enabled = $true $cboWraM.Enabled = $true $cboHatS.Enabled = $false $nudRota.Enabled = $true $nudGraB.Enabled = $false $cboGraM.Enabled = $false #made this path correct, please, on you machine $file = "$env:allusersprofile\\Documents\\My Drawings\\sunflower.jpg" $pic = New-Object Drawing.Bitmap($file) $brush = New-Object Drawing.TextureBrush($pic, $m_BrushSize) $brush.WrapMode = [Drawing.Drawing2D.WrapMode]$cboWraM.SelectedItem $brush.RotateTransform([Convert]::ToSingle($nudRota.Value)) break } "LinearGradient" { $txtCol1.Enabled = $true $btnCol1.Enabled = $true $txtCol2.Enabled = $true $btnCol2.Enabled = $true $cboBruS.Enabled = $true $cboWraM.Enabled = $false $cboHatS.Enabled = $false $nudGraB.Enabled = $true $cboGraM.Enabled = $true $brush = New-Object Drawing.Drawing2D.LinearGradientBrush($m_BrushSize, $col1, $col2, ` [Drawing.Drawing2D.LinearGradientMode]$cboGraM.SelectedItem) $brush.RotateTransform([Convert]::ToSingle($nudRota.Value)) $brush.SetBlendTriangularShape([Convert]::ToSingle($nudGraB.Value)) break } } $g = $picDemo.CreateGraphics() switch ($cboDraw.Text) { "Fill" { $g.FillRectangle($brush, 0, 0, $picDemo.Width, $picDemo.Height) break } "Ellipses" { $g.FillEllipse($brush, $picDemo.Width / 10, $picDemo.Height / 10, ` $picDemo.Width / 2, $picDemo.Height / 2) $g.FillEllipse($brush, $picDemo.Width / 3, $picDemo.Height / 3, ` $picDemo.Width / 2, $picDemo.Height / 2) break } "Lines" { $pen = New-Object Drawing.Pen($brush, 40) $g.DrawLine($pen, 0, 0, $picDemo.Width, $picDemo.Height) $g.DrawLine($pen, 0, 0, 0, $picDemo.Height) $g.DrawLine($pen, 0, 0, $picDemo.Height, 0) $g.DrawLine($pen, $picDemo.Width, 0, $picDemo.Width, $picDemo.Height) $g.DrawLine($pen, 0, $picDemo.Height, $picDemo.Width, $picDemo.Height) $g.DrawLine($pen, $picDemo.Width, 0, 0, $picDemo.Height) break } } } function ShowMainWindow { [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void][Reflection.Assembly]::LoadWithPartialName("System.Drawing") [Windows.Forms.Application]::EnableVisualStyles() $col1 = [Drawing.Color]::Blue $col2 = [Drawing.Color]::White $frmMain = New-Object Windows.Forms.Form $mnuMain = New-Object Windows.Forms.MainMenu $mnuFile = New-Object Windows.Forms.MenuItem $mnuExit = New-Object Windows.Forms.MenuItem $mnuHelp = New-Object Windows.Forms.MenuItem $mnuInfo = New-Object Windows.Forms.MenuItem $lblBruT = New-Object Windows.Forms.Label $lblDraw = New-Object Windows.Forms.Label $lblCol1 = New-Object Windows.Forms.Label $lblCol2 = New-Object Windows.Forms.Label $lblBruS = New-Object Windows.Forms.Label $lblWraM = New-Object Windows.Forms.Label $lblHatS = New-Object Windows.Forms.Label $lblRota = New-Object Windows.Forms.Label $lblGraB = New-Object Windows.Forms.Label $lblGraM = New-Object Windows.Forms.Label $cboBruT = New-Object Windows.Forms.ComboBox $cboDraw = New-Object Windows.Forms.ComboBox $txtCol1 = New-Object Windows.Forms.TextBox $txtCol2 = New-Object Windows.Forms.TextBox $btnCol1 = New-Object Windows.Forms.Button $btnCol2 = New-Object Windows.Forms.Button $cboBruS = New-Object Windows.Forms.ComboBox $cboWraM = New-Object Windows.Forms.ComboBox $cboHatS = New-Object Windows.Forms.ComboBox $nudRota = New-Object Windows.Forms.NumericUpDown $nudGraB = New-Object Windows.Forms.NumericUpDown $cboGraM = New-Object Windows.Forms.ComboBox $picDemo = New-Object Windows.Forms.PictureBox #mnuMain $mnuMain.MenuItems.AddRange(@($mnuFile, $mnuHelp)) #mnuFile $mnuFile.MenuItems.AddRange(@($mnuExit)) $mnuFile.Text = "&File" #mnuExit $mnuExit.Shortcut = "CtrlX" $mnuExit.Text = "E&xit" $mnuExit.Add_Click( { $frmMain.Close() } ) #mnuHelp $mnuHelp.MenuItems.AddRange(@($mnuInfo)) $mnuHelp.Text = "&Help" #mnuInfo $mnuInfo.Text = "About..." $mnuInfo.Add_Click( { ShowAboutWindow } ) #lblBruT $lblBruT.Location = New-Object Drawing.Point(8, 16) $lblBruT.Size = New-Object Drawing.Size(96, 23) $lblBruT.Text = "Brush Type:" #lblDraw $lblDraw.Location = New-Object Drawing.Point(8, 40) $lblDraw.Size = New-Object Drawing.Size(96, 23) $lblDraw.Text = "Drawing:" #lblCol1 $lblCol1.Location = New-Object Drawing.Point(8, 80) $lblCol1.Size = New-Object Drawing.Size(96, 23) $lblCol1.Text = "Color 1:" #lblCol2 $lblCol2.Location = New-Object Drawing.Point(8, 104) $lblCol2.Size = New-Object Drawing.Size(96, 23) $lblCol2.Text = "Color 2:" #lblBruS $lblBruS.Location = New-Object Drawing.Point(8, 152) $lblBruS.Size = New-Object Drawing.Size(96, 23) $lblBruS.Text = "Brush Size:" #lblWraM $lblWraM.Location = New-Object Drawing.Point(8, 184) $lblWraM.Size = New-Object Drawing.Size(96, 23) $lblWraM.Text = "Wrap Mode:" #lblHatS $lblHatS.Location = New-Object Drawing.Point(8, 216) $lblHatS.Size = New-Object Drawing.Size(96, 23) $lblHatS.Text = "Hatch Style:" #lblRota $lblRota.Location = New-Object Drawing.Point(8, 248) $lblRota.Size = New-Object Drawing.Size(96, 23) $lblRota.Text = "Rotation:" #lblGraB $lblGraB.Location = New-Object Drawing.Point(8, 280) $lblGraB.Size = New-Object Drawing.Size(104, 23) $lblGraB.Text = "Gradient Blend:" #lblGraM $lblGraM.Location = New-Object Drawing.Point(8, 312) $lblGraM.Size = New-Object Drawing.Size(104, 23) $lblGraM.Text = "Gradient Mode:" #cboBruT $cboBruT.Items.AddRange(@("Solid", "Hatch", "Texture", "LinearGradient")) $cboBruT.Location = New-Object Drawing.Point(112, 13) $cboBruT.SelectedItem = "Solid" $cboBruT.Size = New-Object Drawing.Size(176, 24) $cboBruT.Add_SelectedIndexChanged( { RedrawPicture } ) #cboDraw $cboDraw.Items.AddRange(@("Fill", "Ellipses", "Lines")) $cboDraw.Location = New-Object Drawing.Point(112, 40) $cboDraw.SelectedItem = "Fill" $cboDraw.Size = New-Object Drawing.Size(176, 24) $cboDraw.Add_SelectedIndexChanged( { RedrawPicture } ) #txtCol1 $txtCol1.BackColor = "Blue" $txtCol1.Location = New-Object Drawing.Point(112, 77) $txtCol1.Size = New-Object Drawing.Size(144, 23) $txtCol1.Text = "Color [Blue]" $txtCol1.Add_TextChanged( { RedrawPicture } ) #txtCol2 $txtCol2.Location = New-Object Drawing.Point(112, 102) $txtCol2.Size = New-Object Drawing.Size(144, 23) $txtCol2.Text = "Color [White]" $txtCol2.Add_TextChanged( { RedrawPicture } ) #btnCol1 $btnCol1.Location = New-Object Drawing.Point(256, 76) $btnCol1.Size = New-Object Drawing.Size(32, 25) $btnCol1.Text = "..." $btnCol1.Add_Click($btnCol1_OnClick) #btnCol2 $btnCol2.Location = New-Object Drawing.Point(256, 101) $btnCol2.Size = New-Object Drawing.Size(32, 25) $btnCol2.Text = "..." $btnCol2.Add_Click($btnCol2_OnClick) #cboBruS $cboBruS.Items.AddRange(@("Large", "Medium", "Small")) $cboBruS.Location = New-Object Drawing.Point(112, 149) $cboBruS.SelectedItem = "Large" $cboBruS.Size = New-Object Drawing.Size(176, 24) $cboBruS.Add_SelectedIndexChanged($cboBruS_OnSelectedIndexChanged) #cboWraM $cboWraM.Location = New-Object Drawing.Point(112, 181) $cboWraM.Size = New-Object Drawing.Size(176, 24) $cboWraM.Add_SelectedIndexChanged( { RedrawPicture } ) #cboHatS $cboHatS.Location = New-Object Drawing.Point(112, 213) $cboHatS.Size = New-Object Drawing.Size(176, 24) $cboHatS.Add_SelectedIndexChanged( { RedrawPicture } ) #nudRota [decimal]$nudRota.Increment = [int[]](5, 0, 0, 0) $nudRota.Location = New-Object Drawing.Point(112, 245) [decimal]$nudRota.Maximum = [int[]](180, 0, 0, 0) $nudRota.Size = New-Object Drawing.Size(176, 23) $nudRota.Add_ValueChanged( { RedrawPicture } ) #nudGraB $nudGraB.DecimalPlaces = 2; [decimal]$nudGraB.Increment = [int[]](1, 0, 0, 65536) $nudGraB.Location = New-Object Drawing.Point(112, 277) [decimal]$nudGraB.Maximum = [int[]](1, 0, 0, 0) $nudGraB.Size = New-Object Drawing.Size(176, 23) [decimal]$nudGraB.Value = [int[]](1, 0, 0, 0) $nudGraB.Add_ValueChanged( { RedrawPicture } ) #cboGraM $cboGraM.Location = New-Object Drawing.Point(112, 309) $cboGraM.Size = New-Object Drawing.Size(176, 24) $cboGraM.Add_SelectedIndexChanged( { RedrawPicture } ) #picDemo $picDemo.BorderStyle = "FixedSingle" $picDemo.Location = New-Object Drawing.Point(304, 16) $picDemo.Size = New-Object Drawing.Size(312, 320) #frmMain $frmMain.ClientSize = New-Object Drawing.Size(626, 371) $frmMain.Controls.AddRange(@($lblBruT, $lblDraw, $lblCol1, $lblCol2, $lblBruS, $lblWraM, ` $lblHatS, $lblRota, $lblGraB, $lblGraM, $cboBruT, $cboDraw, ` $txtCol1, $txtCol2, $btnCol1, $btnCol2, $cboBruS, $cboWraM, ` $cboHatS, $nudRota, $nudGraB, $cboGraM, $picDemo)) $frmMain.Font = New-Object Drawing.Font("Microsoft Sans Serif", 10) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.MaximizeBox = $false $frmMain.Menu = $mnuMain $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "Brushes" $frmMain.Add_Load($frmMain_OnLoad) [void]$frmMain.ShowDialog() } function ShowAboutWindow { $frmMain = New-Object Windows.Forms.Form $lblThis = New-Object Windows.Forms.Label $btnExit = New-Object Windows.Forms.Button #lblThis $lblThis.Location = New-Object Drawing.Point(5, 29) $lblThis.Size = New-Object Drawing.Size(330, 50) $lblThis.Text = "(C) 2012 Grigori Zakharov `n This is just an example that you can make better." $lblThis.TextAlign = "MiddleCenter" #btnExit $btnExit.Location = New-Object Drawing.Point(132, 97) $btnExit.Text = "Close" $btnExit.Add_Click( { $frmMain.Close() } ) #frmMain $frmMain.ClientSize = New-Object Drawing.Size(350, 137) $frmMain.ControlBox = $false $frmMain.Controls.AddRange(@($lblThis, $btnExit)) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.ShowInTaskbar = $false $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "About..." [void]$frmMain.ShowDialog() } ShowMainWindow
0
sample_58_40.ps1
param( [Parameter(Mandatory = $true)][string] $InputPath, # Full path to directory where NuGet packages to be checked are stored [Parameter(Mandatory = $true)][string] $ExtractPath, # Full path to directory where the packages will be extracted during validation [Parameter(Mandatory = $true)][string] $DotnetSymbolVersion, # Version of dotnet symbol to use [Parameter(Mandatory = $false)][switch] $CheckForWindowsPdbs, # If we should check for the existence of windows pdbs in addition to portable PDBs [Parameter(Mandatory = $false)][switch] $ContinueOnError, # If we should keep checking symbols after an error [Parameter(Mandatory = $false)][switch] $Clean, # Clean extracted symbols directory after checking symbols [Parameter(Mandatory = $false)][string] $SymbolExclusionFile # Exclude the symbols in the file from publishing to symbol server ) . $PSScriptRoot\..\tools.ps1 # Maximum number of jobs to run in parallel $MaxParallelJobs = 16 # Max number of retries $MaxRetry = 5 # Wait time between check for system load $SecondsBetweenLoadChecks = 10 # Set error codes Set-Variable -Name "ERROR_BADEXTRACT" -Option Constant -Value -1 Set-Variable -Name "ERROR_FILEDOESNOTEXIST" -Option Constant -Value -2 $WindowsPdbVerificationParam = "" if ($CheckForWindowsPdbs) { $WindowsPdbVerificationParam = "--windows-pdbs" } $ExclusionSet = New-Object System.Collections.Generic.HashSet[string]; if (!$InputPath -or !(Test-Path $InputPath)){ Write-Host "No symbols to validate." ExitWithExitCode 0 } #Check if the path exists if ($SymbolExclusionFile -and (Test-Path $SymbolExclusionFile)){ [string[]]$Exclusions = Get-Content "$SymbolExclusionFile" $Exclusions | foreach { if($_ -and $_.Trim()){$ExclusionSet.Add($_)} } } else{ Write-Host "Symbol Exclusion file does not exists. No symbols to exclude." } $CountMissingSymbols = { param( [string] $PackagePath, # Path to a NuGet package [string] $WindowsPdbVerificationParam # If we should check for the existence of windows pdbs in addition to portable PDBs ) Add-Type -AssemblyName System.IO.Compression.FileSystem Write-Host "Validating $PackagePath " # Ensure input file exist if (!(Test-Path $PackagePath)) { Write-PipelineTaskError "Input file does not exist: $PackagePath" return [pscustomobject]@{ result = $using:ERROR_FILEDOESNOTEXIST packagePath = $PackagePath } } # Extensions for which we'll look for symbols $RelevantExtensions = @('.dll', '.exe', '.so', '.dylib') # How many files are missing symbol information $MissingSymbols = 0 $PackageId = [System.IO.Path]::GetFileNameWithoutExtension($PackagePath) $PackageGuid = New-Guid $ExtractPath = Join-Path -Path $using:ExtractPath -ChildPath $PackageGuid $SymbolsPath = Join-Path -Path $ExtractPath -ChildPath 'Symbols' try { [System.IO.Compression.ZipFile]::ExtractToDirectory($PackagePath, $ExtractPath) } catch { Write-Host "Something went wrong extracting $PackagePath" Write-Host $_ return [pscustomobject]@{ result = $using:ERROR_BADEXTRACT packagePath = $PackagePath } } Get-ChildItem -Recurse $ExtractPath | Where-Object { $RelevantExtensions -contains $_.Extension } | ForEach-Object { $FileName = $_.FullName if ($FileName -Match '\\ref\\') { Write-Host "`t Ignoring reference assembly file " $FileName return } $FirstMatchingSymbolDescriptionOrDefault = { param( [string] $FullPath, # Full path to the module that has to be checked [string] $TargetServerParam, # Parameter to pass to `Symbol Tool` indicating the server to lookup for symbols [string] $WindowsPdbVerificationParam, # Parameter to pass to potential check for windows-pdbs. [string] $SymbolsPath ) $FileName = [System.IO.Path]::GetFileName($FullPath) $Extension = [System.IO.Path]::GetExtension($FullPath) # Those below are potential symbol files that the `dotnet symbol` might # return. Which one will be returned depend on the type of file we are # checking and which type of file was uploaded. # The file itself is returned $SymbolPath = $SymbolsPath + '\' + $FileName # PDB file for the module $PdbPath = $SymbolPath.Replace($Extension, '.pdb') # PDB file for R2R module (created by crossgen) $NGenPdb = $SymbolPath.Replace($Extension, '.ni.pdb') # DBG file for a .so library $SODbg = $SymbolPath.Replace($Extension, '.so.dbg') # DWARF file for a .dylib $DylibDwarf = $SymbolPath.Replace($Extension, '.dylib.dwarf') $dotnetSymbolExe = "$env:USERPROFILE\.dotnet\tools" $dotnetSymbolExe = Resolve-Path "$dotnetSymbolExe\dotnet-symbol.exe" $totalRetries = 0 while ($totalRetries -lt $using:MaxRetry) { # Save the output and get diagnostic output $output = & $dotnetSymbolExe --symbols --modules $WindowsPdbVerificationParam $TargetServerParam $FullPath -o $SymbolsPath --diagnostics | Out-String if ((Test-Path $PdbPath) -and (Test-path $SymbolPath)) { return 'Module and PDB for Module' } elseif ((Test-Path $NGenPdb) -and (Test-Path $PdbPath) -and (Test-Path $SymbolPath)) { return 'Dll, PDB and NGen PDB' } elseif ((Test-Path $SODbg) -and (Test-Path $SymbolPath)) { return 'So and DBG for SO' } elseif ((Test-Path $DylibDwarf) -and (Test-Path $SymbolPath)) { return 'Dylib and Dwarf for Dylib' } elseif (Test-Path $SymbolPath) { return 'Module' } else { $totalRetries++ } } return $null } $FileRelativePath = $FileName.Replace("$ExtractPath\", "") if (($($using:ExclusionSet) -ne $null) -and ($($using:ExclusionSet).Contains($FileRelativePath) -or ($($using:ExclusionSet).Contains($FileRelativePath.Replace("\", "/"))))){ Write-Host "Skipping $FileName from symbol validation" } else { $FileGuid = New-Guid $ExpandedSymbolsPath = Join-Path -Path $SymbolsPath -ChildPath $FileGuid $SymbolsOnMSDL = & $FirstMatchingSymbolDescriptionOrDefault ` -FullPath $FileName ` -TargetServerParam '--microsoft-symbol-server' ` -SymbolsPath "$ExpandedSymbolsPath-msdl" ` -WindowsPdbVerificationParam $WindowsPdbVerificationParam $SymbolsOnSymWeb = & $FirstMatchingSymbolDescriptionOrDefault ` -FullPath $FileName ` -TargetServerParam '--internal-server' ` -SymbolsPath "$ExpandedSymbolsPath-symweb" ` -WindowsPdbVerificationParam $WindowsPdbVerificationParam Write-Host -NoNewLine "`t Checking file " $FileName "... " if ($SymbolsOnMSDL -ne $null -and $SymbolsOnSymWeb -ne $null) { Write-Host "Symbols found on MSDL ($SymbolsOnMSDL) and SymWeb ($SymbolsOnSymWeb)" } else { $MissingSymbols++ if ($SymbolsOnMSDL -eq $null -and $SymbolsOnSymWeb -eq $null) { Write-Host 'No symbols found on MSDL or SymWeb!' } else { if ($SymbolsOnMSDL -eq $null) { Write-Host 'No symbols found on MSDL!' } else { Write-Host 'No symbols found on SymWeb!' } } } } } if ($using:Clean) { Remove-Item $ExtractPath -Recurse -Force } Pop-Location return [pscustomobject]@{ result = $MissingSymbols packagePath = $PackagePath } } function CheckJobResult( $result, $packagePath, [ref]$DupedSymbols, [ref]$TotalFailures) { if ($result -eq $ERROR_BADEXTRACT) { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "$packagePath has duplicated symbol files" $DupedSymbols.Value++ } elseif ($result -eq $ERROR_FILEDOESNOTEXIST) { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "$packagePath does not exist" $TotalFailures.Value++ } elseif ($result -gt '0') { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "Missing symbols for $result modules in the package $packagePath" $TotalFailures.Value++ } else { Write-Host "All symbols verified for package $packagePath" } } function CheckSymbolsAvailable { if (Test-Path $ExtractPath) { Remove-Item $ExtractPath -Force -Recurse -ErrorAction SilentlyContinue } $TotalPackages = 0 $TotalFailures = 0 $DupedSymbols = 0 Get-ChildItem "$InputPath\*.nupkg" | ForEach-Object { $FileName = $_.Name $FullName = $_.FullName # These packages from Arcade-Services include some native libraries that # our current symbol uploader can't handle. Below is a workaround until # we get issue: https://github.com/dotnet/arcade/issues/2457 sorted. if ($FileName -Match 'Microsoft\.DotNet\.Darc\.') { Write-Host "Ignoring Arcade-services file: $FileName" Write-Host return } elseif ($FileName -Match 'Microsoft\.DotNet\.Maestro\.Tasks\.') { Write-Host "Ignoring Arcade-services file: $FileName" Write-Host return } $TotalPackages++ Start-Job -ScriptBlock $CountMissingSymbols -ArgumentList @($FullName,$WindowsPdbVerificationParam) | Out-Null $NumJobs = @(Get-Job -State 'Running').Count while ($NumJobs -ge $MaxParallelJobs) { Write-Host "There are $NumJobs validation jobs running right now. Waiting $SecondsBetweenLoadChecks seconds to check again." sleep $SecondsBetweenLoadChecks $NumJobs = @(Get-Job -State 'Running').Count } foreach ($Job in @(Get-Job -State 'Completed')) { $jobResult = Wait-Job -Id $Job.Id | Receive-Job CheckJobResult $jobResult.result $jobResult.packagePath ([ref]$DupedSymbols) ([ref]$TotalFailures) Remove-Job -Id $Job.Id } Write-Host } foreach ($Job in @(Get-Job)) { $jobResult = Wait-Job -Id $Job.Id | Receive-Job CheckJobResult $jobResult.result $jobResult.packagePath ([ref]$DupedSymbols) ([ref]$TotalFailures) } if ($TotalFailures -gt 0 -or $DupedSymbols -gt 0) { if ($TotalFailures -gt 0) { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "Symbols missing for $TotalFailures/$TotalPackages packages" } if ($DupedSymbols -gt 0) { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "$DupedSymbols/$TotalPackages packages had duplicated symbol files and could not be extracted" } ExitWithExitCode 1 } else { Write-Host "All symbols validated!" } } function InstallDotnetSymbol { $dotnetSymbolPackageName = 'dotnet-symbol' $dotnetRoot = InitializeDotNetCli -install:$true $dotnet = "$dotnetRoot\dotnet.exe" $toolList = & "$dotnet" tool list --global if (($toolList -like "*$dotnetSymbolPackageName*") -and ($toolList -like "*$dotnetSymbolVersion*")) { Write-Host "dotnet-symbol version $dotnetSymbolVersion is already installed." } else { Write-Host "Installing dotnet-symbol version $dotnetSymbolVersion..." Write-Host 'You may need to restart your command window if this is the first dotnet tool you have installed.' & "$dotnet" tool install $dotnetSymbolPackageName --version $dotnetSymbolVersion --verbosity "minimal" --global } } try { InstallDotnetSymbol foreach ($Job in @(Get-Job)) { Remove-Job -Id $Job.Id } CheckSymbolsAvailable } catch { Write-Host $_.ScriptStackTrace Write-PipelineTelemetryError -Category 'CheckSymbols' -Message $_ ExitWithExitCode 1 }
0
sample_46_24.ps1
# # Module manifest for module 'OCI.PSModules.Osmanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osmanagement.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '08aa2c02-1476-4491-ace6-a15dc5ef7b7f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osmanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osmanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIOsmanagementPackagesToSoftwareSource', 'Disable-OCIOsmanagementModuleStreamOnManagedInstance', 'DisMount-OCIOsmanagementChildSoftwareSourceFromManagedInstance', 'DisMount-OCIOsmanagementManagedInstanceFromManagedInstanceGroup', 'DisMount-OCIOsmanagementParentSoftwareSourceFromManagedInstance', 'Enable-OCIOsmanagementModuleStreamOnManagedInstance', 'Get-OCIOsmanagementAvailablePackagesForManagedInstanceList', 'Get-OCIOsmanagementAvailableSoftwareSourcesForManagedInstanceList', 'Get-OCIOsmanagementAvailableUpdatesForManagedInstanceList', 'Get-OCIOsmanagementAvailableWindowsUpdatesForManagedInstanceList', 'Get-OCIOsmanagementErrataList', 'Get-OCIOsmanagementErratum', 'Get-OCIOsmanagementEvent', 'Get-OCIOsmanagementEventContent', 'Get-OCIOsmanagementEventReport', 'Get-OCIOsmanagementEventsList', 'Get-OCIOsmanagementManagedInstance', 'Get-OCIOsmanagementManagedInstanceErrataList', 'Get-OCIOsmanagementManagedInstanceGroup', 'Get-OCIOsmanagementManagedInstanceGroupsList', 'Get-OCIOsmanagementManagedInstancesList', 'Get-OCIOsmanagementModuleStream', 'Get-OCIOsmanagementModuleStreamProfile', 'Get-OCIOsmanagementModuleStreamProfilesList', 'Get-OCIOsmanagementModuleStreamProfilesOnManagedInstanceList', 'Get-OCIOsmanagementModuleStreamsList', 'Get-OCIOsmanagementModuleStreamsOnManagedInstanceList', 'Get-OCIOsmanagementPackagesInstalledOnManagedInstanceList', 'Get-OCIOsmanagementRelatedEventsList', 'Get-OCIOsmanagementScheduledJob', 'Get-OCIOsmanagementScheduledJobsList', 'Get-OCIOsmanagementSoftwarePackage', 'Get-OCIOsmanagementSoftwareSource', 'Get-OCIOsmanagementSoftwareSourcePackagesList', 'Get-OCIOsmanagementSoftwareSourcesList', 'Get-OCIOsmanagementUpcomingScheduledJobsList', 'Get-OCIOsmanagementWindowsUpdate', 'Get-OCIOsmanagementWindowsUpdatesInstalledOnManagedInstanceList', 'Get-OCIOsmanagementWindowsUpdatesList', 'Get-OCIOsmanagementWorkRequest', 'Get-OCIOsmanagementWorkRequestErrorsList', 'Get-OCIOsmanagementWorkRequestLogsList', 'Get-OCIOsmanagementWorkRequestsList', 'Invoke-OCIOsmanagementInstallAllPackageUpdatesOnManagedInstance', 'Invoke-OCIOsmanagementInstallAllUpdatesOnManagedInstanceGroup', 'Invoke-OCIOsmanagementInstallAllWindowsUpdatesOnManagedInstance', 'Invoke-OCIOsmanagementInstallModuleStreamProfileOnManagedInstance', 'Invoke-OCIOsmanagementInstallPackageOnManagedInstance', 'Invoke-OCIOsmanagementInstallPackageUpdateOnManagedInstance', 'Invoke-OCIOsmanagementInstallWindowsUpdateOnManagedInstance', 'Invoke-OCIOsmanagementManageModuleStreamsOnManagedInstance', 'Invoke-OCIOsmanagementRunScheduledJobNow', 'Invoke-OCIOsmanagementSearchSoftwarePackages', 'Invoke-OCIOsmanagementSkipNextScheduledJobExecution', 'Invoke-OCIOsmanagementSwitchModuleStreamOnManagedInstance', 'Mount-OCIOsmanagementChildSoftwareSourceToManagedInstance', 'Mount-OCIOsmanagementManagedInstanceToManagedInstanceGroup', 'Mount-OCIOsmanagementParentSoftwareSourceToManagedInstance', 'Move-OCIOsmanagementManagedInstanceGroupCompartment', 'Move-OCIOsmanagementScheduledJobCompartment', 'Move-OCIOsmanagementSoftwareSourceCompartment', 'New-OCIOsmanagementManagedInstanceGroup', 'New-OCIOsmanagementScheduledJob', 'New-OCIOsmanagementSoftwareSource', 'Remove-OCIOsmanagementEventContent', 'Remove-OCIOsmanagementManagedInstanceGroup', 'Remove-OCIOsmanagementModuleStreamProfileFromManagedInstance', 'Remove-OCIOsmanagementPackageFromManagedInstance', 'Remove-OCIOsmanagementPackagesFromSoftwareSource', 'Remove-OCIOsmanagementScheduledJob', 'Remove-OCIOsmanagementSoftwareSource', 'Update-OCIOsmanagementEvent', 'Update-OCIOsmanagementManagedInstance', 'Update-OCIOsmanagementManagedInstanceGroup', 'Update-OCIOsmanagementScheduledJob', 'Update-OCIOsmanagementSoftwareSource', 'Write-OCIOsmanagementEventContent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osmanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
OpsMgr.psd1.ps1
<# #Run the following code to create OpsMgr module #To Use run import-module OpsMgr; Start-OperationsManagerClientShell -ManagementServerName: "" -PersistConnection: $true -Interactive: $true; if (-not (test-path $home\\Documents\\WindowsPowerShell\\Modules\\OpsMgr)) {new-item $home\\Documents\\WindowsPowerShell\\Modules\\OpsMgr -type directory} Set-Location "C:\\Program Files\\System Center Operations Manager 2007" Copy-Item "Microsoft.EnterpriseManagement.OperationsManager.ClientShell.dll","Microsoft.EnterpriseManagement.OperationsManager.ClientShell.Format.ps1xml",` "Microsoft.EnterpriseManagement.OperationsManager.ClientShell.Types.ps1xml","Microsoft.EnterpriseManagement.OperationsManager.ClientShell.dll-help.xml",` "Microsoft.EnterpriseManagement.OperationsManager.ClientShell.Functions.ps1","Microsoft.EnterpriseManagement.OperationsManager.ClientShell.Startup.ps1",` "Microsoft.EnterpriseManagement.OperationsManager.ClientShell.NonInteractiveStartup.ps1" ` -destination $home\\Documents\\WindowsPowerShell\\Modules\\OpsMgr Set-Location "C:\\Program Files\\System Center Operations Manager 2007\\SDK Binaries" Copy-Item "Microsoft.EnterpriseManagement.OperationsManager.dll","Microsoft.EnterpriseManagement.OperationsManager.Common.dll" -destination $home\\Documents\\WindowsPowerShell\\Modules\\OpsMgr #> @{ ModuleVersion="0.0.0.1" Description="A Wrapper for Microsoft's Operations Manager Shell " Author="Chad Miller" Copyright="© 2010, Chad Miller, released under the Ms-PL" CompanyName="http://sev17.com" CLRVersion="2.0" FormatsToProcess="Microsoft.EnterpriseManagement.OperationsManager.ClientShell.Format.ps1xml" NestedModules="Microsoft.EnterpriseManagement.OperationsManager.ClientShell" RequiredAssemblies="Microsoft.EnterpriseManagement.OperationsManager.dll","Microsoft.EnterpriseManagement.OperationsManager.Common.dll" TypesToProcess="Microsoft.EnterpriseManagement.OperationsManager.ClientShell.Types.ps1xml" ScriptsToProcess="Microsoft.EnterpriseManagement.OperationsManager.ClientShell.Functions.ps1" }
0
4131.ps1
[CmdletBinding()] param ( [switch]$ActiveDirectory, [switch]$NetworkShare, [string]$NetworkSharePath, [switch]$SCCMBitlockerPassword, [switch]$SCCMReporting ) Import-Module ActiveDirectory Function Get-BitLockerRecoveryKeyId { [cmdletBinding()] Param ( [Parameter(Mandatory = $false, ValueFromPipeLine = $false)][ValidateSet("Alltypes", "TPM", "ExternalKey", "NumericPassword", "TPMAndPin", "TPMAndStartUpdKey", "TPMAndPinAndStartUpKey", "PublicKey", "PassPhrase", "TpmCertificate", "SID")]$KeyProtectorType ) $BitLocker = Get-WmiObject -Namespace "Root\cimv2\Security\MicrosoftVolumeEncryption" -Class "Win32_EncryptableVolume" switch ($KeyProtectorType) { ("Alltypes") { $Value = "0" } ("TPM") { $Value = "1" } ("ExternalKey") { $Value = "2" } ("NumericPassword") { $Value = "3" } ("TPMAndPin") { $Value = "4" } ("TPMAndStartUpdKey") { $Value = "5" } ("TPMAndPinAndStartUpKey") { $Value = "6" } ("PublicKey") { $Value = "7" } ("PassPhrase") { $Value = "8" } ("TpmCertificate") { $Value = "9" } ("SID") { $Value = "10" } default { $Value = "0" } } $Ids = $BitLocker.GetKeyProtectors($Value).volumekeyprotectorID return $ids } function Get-ADBitlockerRecoveryKeys { [CmdletBinding()] param () $ComputerName = $env:COMPUTERNAME $ADComputer = Get-ADComputer -Filter { Name -eq $ComputerName } $ADBitLockerRecoveryKeys = Get-ADObject -Filter { objectclass -eq 'msFVE-RecoveryInformation' } -SearchBase $ADComputer.DistinguishedName -Properties 'msFVE-RecoveryPassword' Return $ADBitLockerRecoveryKeys } function Get-BitlockerPassword { [CmdletBinding()][OutputType([string])] param ( [ValidateNotNullOrEmpty()][string]$ProtectorID ) $Password = manage-bde -protectors -get ($env:ProgramFiles).split("\")[0] -id $ProtectorID | Where-Object { $_.trim() -ne "" } $Password = $Password[$Password.Length - 1].Trim() Return $Password } function Initialize-HardwareInventory { [CmdletBinding()] param () $Output = "Initiate SCCM Hardware Inventory....." $SMSCli = [wmiclass] "\\localhost\root\ccm:SMS_Client" $ErrCode = ($SMSCli.TriggerSchedule("{00000000-0000-0000-0000-000000000001}")).ReturnValue If ($ErrCode -eq $null) { $Output += "Success" } else { $Output += "Failed" } Write-Output $Output } function Invoke-ADBitlockerRecoveryPasswordCleanup { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$LocalPassword, [ValidateNotNullOrEmpty()]$ADPassword ) foreach ($Password in $ADPassword) { If ($LocalPassword -ne $Password.'msFVE-RecoveryPassword') { Remove-ADObject -Identity $Password.DistinguishedName -Confirm:$false } } } function Invoke-EXE { [CmdletBinding()] param ( [String]$DisplayName, [String]$Executable, [String]$Switches ) Write-Host "Uploading"$DisplayName"....." -NoNewline If ((Test-Path $Executable) -eq $true) { $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Switches -Wait -Passthru).ExitCode } else { $ErrCode = 1 } If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed with error code "$ErrCode -ForegroundColor Red } } function New-WMIClass { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$Class ) $WMITest = Get-WmiObject $Class -ErrorAction SilentlyContinue If (($WMITest -ne "") -and ($WMITest -ne $null)) { $Output = "Deleting " + $Class + " WMI class....." Remove-WmiObject $Class $WMITest = Get-WmiObject $Class -ErrorAction SilentlyContinue If ($WMITest -eq $null) { $Output += "Success" } else { $Output += "Failed" Exit 1 } Write-Output $Output } $Output = "Creating " + $Class + " WMI class....." $newClass = New-Object System.Management.ManagementClass("root\cimv2", [string]::Empty, $null); $newClass["__CLASS"] = $Class; $newClass.Qualifiers.Add("Static", $true) $newClass.Properties.Add("ADBackup", [System.Management.CimType]::Boolean, $false) $newClass.Properties["ADBackup"].Qualifiers.Add("key", $true) $newClass.Properties["ADBackup"].Qualifiers.Add("read", $true) $newClass.Properties.Add("RecoveryPassword", [System.Management.CimType]::string, $false) $newClass.Properties["RecoveryPassword"].Qualifiers.Add("key", $true) $newClass.Properties["RecoveryPassword"].Qualifiers.Add("read", $true) $newClass.Put() | Out-Null $WMITest = Get-WmiObject $Class -ErrorAction SilentlyContinue If ($WMITest -eq $null) { $Output += "Success" } else { $Output += "Failed" Exit 1 } Write-Output $Output } function New-WMIInstance { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][boolean]$ADBackup, [ValidateNotNullOrEmpty()][string]$Class, [ValidateNotNullOrEmpty()][string]$RecoveryPassword ) $Output = "Writing Bitlocker instance to" + [char]32 + $Class + [char]32 + "class....." $Return = Set-WmiInstance -Class $Class -Arguments @{ ADBackup = $ADBackup; RecoveryPassword = $RecoveryPassword } If ($Return -like "*" + $ADBackup + "*") { $Output += "Success" } else { $Output += "Failed" } Write-Output $Output } function Publish-RecoveryPasswordToActiveDirectory { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$BitlockerID ) $ManageBDE = $env:windir + "\System32\manage-bde.exe" $Switches = "-protectors -adbackup" + [char]32 + ($env:ProgramFiles).split("\")[0] + [char]32 + "-id" + [char]32 + $BitlockerID Invoke-EXE -DisplayName "Backup Recovery Key to AD" -Executable $ManageBDE -Switches $Switches } function Remove-WMIClass { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$Class ) $WMITest = Get-WmiObject $Class -ErrorAction SilentlyContinue If (($WMITest -ne "") -and ($WMITest -ne $null)) { $Output = "Deleting " + $Class + " WMI class....." Remove-WmiObject $Class $WMITest = Get-WmiObject $Class -ErrorAction SilentlyContinue If ($WMITest -eq $null) { $Output += "Success" } else { $Output += "Failed" Exit 1 } Write-Output $Output } } Clear-Host [string]$BitlockerID = Get-BitLockerRecoveryKeyId -KeyProtectorType NumericPassword [string]$BitlockerPassword = Get-BitlockerPassword -ProtectorID $BitlockerID If ($ActiveDirectory.IsPresent) { $ADBitlockerPassword = Get-ADBitlockerRecoveryKeys If ($ADBitlockerPassword -ne $null) { If ((($ADBitlockerPassword -is [Microsoft.ActiveDirectory.Management.ADObject]) -and ($ADBitlockerPassword.'msFVE-RecoveryPassword' -ne $BitlockerPassword)) -or ($ADBitlockerPassword -isnot [Microsoft.ActiveDirectory.Management.ADObject])) { Invoke-ADBitlockerRecoveryPasswordCleanup -LocalPassword $BitlockerPassword -ADPassword $ADBitlockerPassword $ADBitlockerPassword = Get-ADBitlockerRecoveryKeys If (($ADBitlockerPassword.'msFVE-RecoveryPassword' -ne $BitlockerPassword) -or ($ADBitlockerPassword -eq $null)) { Publish-RecoveryPasswordToActiveDirectory -BitlockerID $BitlockerID $ADBitlockerPassword = $null $Count = 1 Do { $ADBitlockerPassword = Get-ADBitlockerRecoveryKeys Start-Sleep -Seconds 1 $Count += 1 } while (($ADBitlockerPassword -eq $null) -or ($Count -lt 30)) } } } else { Publish-RecoveryPasswordToActiveDirectory -BitlockerID $BitlockerID $ADBitlockerPassword = $null $Count = 1 Do { $ADBitlockerPassword = Get-ADBitlockerRecoveryKeys Start-Sleep -Seconds 1 $Count += 1 } while (($ADBitlockerPassword -eq $null) -and ($Count -lt 30)) } } If ($SCCMReporting.IsPresent) { New-WMIClass -Class Bitlocker_Reporting If ($ADBitlockerPassword.'msFVE-RecoveryPassword' -eq $BitlockerPassword) { If ($SCCMBitlockerPassword.IsPresent) { New-WMIInstance -ADBackup $true -Class Bitlocker_Reporting -RecoveryPassword $BitlockerPassword } else { New-WMIInstance -ADBackup $true -Class Bitlocker_Reporting -RecoveryPassword " " } } else { If ($SCCMBitlockerPassword.IsPresent) { New-WMIInstance -ADBackup $false -Class Bitlocker_Reporting -RecoveryPassword $BitlockerPassword } else { New-WMIInstance -ADBackup $false -Class Bitlocker_Reporting -RecoveryPassword " " } } Initialize-HardwareInventory } else { Remove-WMIClass -Class Bitlocker_Reporting } If ($NetworkShare.IsPresent) { If ((Test-Path $NetworkSharePath) -eq $true) { If ($NetworkSharePath[$NetworkSharePath.Length - 1] -ne "\") { $File = $NetworkSharePath + "\" + $env:COMPUTERNAME + ".txt" } else { $File = $NetworkSharePath + $env:COMPUTERNAME + ".txt" } If ((Test-Path $File) -eq $true) { $Output = "Deleting $env:COMPUTERNAME.txt file....." Remove-Item -Path $File -Force If ((Test-Path $File) -eq $false) { $Output += "Success" } else { $Output += "Failed" } Write-Output $Output } If ((Test-Path $File) -eq $false) { $Output = "Creating $env:COMPUTERNAME.txt file....." New-Item -Path $File -ItemType File -Force | Out-Null If ((Test-Path $File) -eq $true) { Add-Content -Path $File -Value $BitlockerPassword $Output += "Success" } else { $Output += "Failed" } Write-Output $Output } } } Write-Output " " $Output = " Bitlocker ID: " + $BitlockerID Write-Output $Output $Output = " Bitlocker Recovery Password: " + $BitlockerPassword Write-Output $Output $Output = "AD Bitlocker Recovery Password: " + $ADBitlockerPassword.'msFVE-RecoveryPassword' + [char]13 Write-Output $Output
0
466.ps1
$TypeAliasTable = @{ PSFComputer = "PSFramework.Parameter.ComputerParameter" PSFComputerParameter = "PSFramework.Parameter.ComputerParameter" PSFDateTime = "PSFramework.Parameter.DateTimeParameter" PSFDateTimeParameter = "PSFramework.Parameter.DateTimeParameter" PSFEncoding = "PSFramework.Parameter.EncodingParameter" PSFEncodingParameter = "PSFramework.Parameter.EncodingParameter" psfrgx = "PSFramework.Utility.RegexHelper" PSFSize = "PSFramework.Utility.Size" PSFTimeSpan = "PSFramework.Parameter.TimeSpanParameter" PSFTimeSpanParameter = "PSFramework.Parameter.TimeSpanParameter" PSFValidatePattern = "PSFramework.Validation.PsfValidatePatternAttribute" PSFValidateScript = "PSFramework.Validation.PsfValidateScriptAttribute" PSFValidateSet = "PSFramework.Validation.PsfValidateSetAttribute" } Set-PSFTypeAlias -Mapping $TypeAliasTable
0
sample_21_54.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. Register-EditorCommand ` -Name 'PowerShellEditorServices.OpenEditorProfile' ` -DisplayName 'Open Editor Profile' ` -SuppressOutput ` -ScriptBlock { param([Microsoft.PowerShell.EditorServices.Extensions.EditorContext, Microsoft.PowerShell.EditorServices]$context) If (!(Test-Path -Path $Profile)) { New-Item -Path $Profile -ItemType File } $psEditor.Workspace.OpenFile($Profile) } Register-EditorCommand ` -Name 'PowerShellEditorServices.OpenProfileList' ` -DisplayName 'Open Profile from List (Current User)' ` -SuppressOutput ` -ScriptBlock { param([Microsoft.PowerShell.EditorServices.Extensions.EditorContext, Microsoft.PowerShell.EditorServices]$context) $Current = Split-Path -Path $profile -Leaf $List = @($Current,'Microsoft.VSCode_profile.ps1','Microsoft.PowerShell_profile.ps1','Microsoft.PowerShellISE_profile.ps1','Profile.ps1') | Select-Object -Unique $Choices = [System.Management.Automation.Host.ChoiceDescription[]] @($List) $Selection = $host.ui.PromptForChoice('Please Select a Profile', '(Current User)', $choices,'0') $Name = $List[$Selection] $ProfileDir = Split-Path $Profile -Parent $ProfileName = Join-Path -Path $ProfileDir -ChildPath $Name If (!(Test-Path -Path $ProfileName)) { New-Item -Path $ProfileName -ItemType File } $psEditor.Workspace.OpenFile($ProfileName) } # SIG # Begin signature block # MIIrfAYJKoZIhvcNAQcCoIIrbTCCK2kCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDFBS0Ig0FJm51C # cODjNPW8AqkFKkYSxR8xormXHpuZs6CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZZDCCGWACAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMk1vUyZqLu3a6hcySgttonTlvph9xrO # 9oul+jB9Hc8YMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # fvU1UfJRPZkLi6rcl3xTpH1F3nBDlqJK6r3rTInskkSvD/vOaEoYOXHQ19+jpJxS # XytPb4DSeYV+LIHeFIXQBxc9Af/UNbgYB/WfpbLvix5p7jZWPOr97WnjQnu5kHtZ # tXgCLzp9B2CR0IBmBju9iZqm5nqDswxyssA3mvRnA705VxhSY8kY1deDUr6XhdtC # gOjkyrNmc2ZPC1kSSRINJZGei+d+Hu5lrI39ysnugFwsdG3B8VQf3aJcwULusDY9 # Pj0/WXinJ9fM9X796yJmtWQFIud0exmOEwlupPTQZUATxDTHKbBbKWLwY41OV2Q9 # /Lfn1vrATHA8CJw9b3Is8KGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCCFxQGCSqG # SIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0B # CRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCDXCtdEweJln2oHowL2CH3/wNS9l5zDKVyHbF6lDbJhjgIGZfyB14uyGBMyMDI0 # MDQwMzIxMzMzOS42MDZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBP # cGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYt # NEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # oIIRezCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJKoZIhvcN # AQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkw # NzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u # cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMz # NTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJ # KoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp+9JvipuT # tctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03vYYNrCPu # JK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhHUmfaY+79 # /CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqvvqT6lEFq # Ypi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88kG7qa2mbA # 5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0bBX9EDux2 # zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKsqR3itLT9 # qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8xfVJvumj # sBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFkdsoTVIPo # 8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n78cgAjvDS # fTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQkUNUTxRnq # GFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpFyyHSDKWj # 0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgw # VjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUF # BwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br # aW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgx # KS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNV # HQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbMcqVuf9jk # UT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1IZksZZw6F # Dq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3HeA+/y/qK # nCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ6urd+4te # UgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidNN5eoXdW+ # 9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCOzTpWHalr # qpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDovmZUNazk7 # 9Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/e6zR98Pk # plmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8+qDHmbhL # hX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d/k7Lui0K # 1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7FwjdrINW # kPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAA # FTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0 # aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9s # SuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3 # po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2 # vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GP # sjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3 # rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDP # c31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8F # A6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q # 6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1f # MHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLv # jflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGj # ggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ # ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIw # XAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMG # A1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsG # A1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJc # YmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9z # b2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz # LmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0 # MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5H # ZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2 # HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1 # JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8 # F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99J # o3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4K # WN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZ # kWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58 # oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w # /ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+ # 7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1iz # oXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIj # CgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCkfjB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOm3eZow # IhgPMjAyNDA0MDMxNDQ1NDZaGA8yMDI0MDQwNDE0NDU0NlowdzA9BgorBgEEAYRZ # CgQBMS8wLTAKAgUA6bd5mgIBADAKAgEAAgIIBwIB/zAHAgEAAgIS8zAKAgUA6bjL # GgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6Eg # oQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAI4LK7UITi50MqX/nN5GzHgd # hocMaLjAyesAnekYkdzT+hG928IJ0OWVVUAv/SWwHmHPX2AFjiSb+5vX1WdaefRa # gYkHAy13FIsnBz98DcbdA4C6SVNjgPQ4Y9GXgAI8a7zW5LyYIj1yyjNWMeWIJdIF # fpFrECv6sgE+Gx5kaHSnMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIBBQCg # ggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg # 1xxRuzy6wTEdoEqhbHocmgXyacjZ+1oVSO0oQ2Fp3fMwgfoGCyqGSIb3DQEJEAIv # MYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFjZjCB # mDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD # VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk # BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXU # raobAAEAAAHdMCIEIEbNoZmHiLbtQ10tLa9RoQ7IC5vUN4e0U1bGA7bLqgqnMA0G # CSqGSIb3DQEBCwUABIICADT3dpjef9n0/SsbUmlgdebv0fy+WhfHI9qGBPkN40wd # NM+Y120YM39i2ofrrb+5qRP5kasp9CpD3y0Qt4cdFFc9iW/3c27dCgIT9pxFSa9s # gxeKTg/QTnJi2OcwPlesxQrn6DVXrXhw5nNB6vrqJzRUcE752B36sNVVQJ2z9hLp # eA1Q516GrcowxJ2/G2O/fvGqokuAjCyLNNsQPLj72IljVKAOdWsYrPjyfbB/gDMK # 8GARaDQC4OVKWkAddA75nO7UHYIulVifRQIsincAYzsvH52C1tnR1ht7VzxPe/4Y # 7Y8G281q6imk/aZbZxpkTk9KkkdB272cHUMxNWA4DNoi4cVdwUxNoI2xpiZCpOtW # az48C1q9yHm8fL6g3Vqzuh6f9FqGsYwP9/eBexqx6d48a8Rq4AeErEff/ny0ptdD # ZugYkQWOu3IesicQXB4xQ4GQzD22LLGZT7sEjEO4B2fkczzuGnC/NuVRGNUFjpo+ # e+N6eyZEzHAOsxQv74/4PS3FBwRdO3S5g2Qcp/r1/6EUfm3aWMcSuUb8eDy0JbMa # IHAOYgScTEsOFJV76JfHVXFnqlrQkp85aw2xfmiQzbpiU1Sa8lui9tB3gdQw5Jcw # sSN/Ygni5Rm6ZutWFskPQoaCiREa+9EvFLA/l9gwWMVvqFBl7BMhJvc0wqVPUsgL # SIG # End signature block
0
sample_58_19.ps1
# # Module manifest for module 'OCI.PSModules.Jms' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Jms.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '7a9fc2a3-fd30-429b-bb7a-b66e5815c207' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Jms Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Jms.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIJmsFleetInstallationSites', 'Disable-OCIJmsDrs', 'Enable-OCIJmsDrs', 'Get-OCIJmsAnnouncementsList', 'Get-OCIJmsBlocklistsList', 'Get-OCIJmsCryptoAnalysisResult', 'Get-OCIJmsCryptoAnalysisResultsList', 'Get-OCIJmsDrsFile', 'Get-OCIJmsDrsFilesList', 'Get-OCIJmsExportSetting', 'Get-OCIJmsExportStatus', 'Get-OCIJmsFleet', 'Get-OCIJmsFleetAdvancedFeatureConfiguration', 'Get-OCIJmsFleetAgentConfiguration', 'Get-OCIJmsFleetDiagnosesList', 'Get-OCIJmsFleetsList', 'Get-OCIJmsInstallationSitesList', 'Get-OCIJmsJavaFamiliesList', 'Get-OCIJmsJavaFamily', 'Get-OCIJmsJavaMigrationAnalysisResult', 'Get-OCIJmsJavaMigrationAnalysisResultsList', 'Get-OCIJmsJavaRelease', 'Get-OCIJmsJavaReleasesList', 'Get-OCIJmsJreUsageList', 'Get-OCIJmsPerformanceTuningAnalysisResult', 'Get-OCIJmsPerformanceTuningAnalysisResultsList', 'Get-OCIJmsWorkItemsList', 'Get-OCIJmsWorkRequest', 'Get-OCIJmsWorkRequestErrorsList', 'Get-OCIJmsWorkRequestLogsList', 'Get-OCIJmsWorkRequestsList', 'Invoke-OCIJmsRequestCryptoAnalyses', 'Invoke-OCIJmsRequestJavaMigrationAnalyses', 'Invoke-OCIJmsRequestJfrRecordings', 'Invoke-OCIJmsRequestPerformanceTuningAnalyses', 'Invoke-OCIJmsScanJavaServerUsage', 'Invoke-OCIJmsScanLibraryUsage', 'Invoke-OCIJmsSummarizeApplicationInstallationUsage', 'Invoke-OCIJmsSummarizeApplicationUsage', 'Invoke-OCIJmsSummarizeDeployedApplicationInstallationUsage', 'Invoke-OCIJmsSummarizeDeployedApplicationUsage', 'Invoke-OCIJmsSummarizeInstallationUsage', 'Invoke-OCIJmsSummarizeJavaServerInstanceUsage', 'Invoke-OCIJmsSummarizeJavaServerUsage', 'Invoke-OCIJmsSummarizeJreUsage', 'Invoke-OCIJmsSummarizeLibraryUsage', 'Invoke-OCIJmsSummarizeManagedInstanceUsage', 'Invoke-OCIJmsSummarizeResourceInventory', 'Move-OCIJmsFleetCompartment', 'New-OCIJmsAgentDeployScript', 'New-OCIJmsBlocklist', 'New-OCIJmsDrsFile', 'New-OCIJmsFleet', 'Remove-OCIJmsBlocklist', 'Remove-OCIJmsCryptoAnalysisResult', 'Remove-OCIJmsDrsFile', 'Remove-OCIJmsFleet', 'Remove-OCIJmsFleetInstallationSites', 'Remove-OCIJmsJavaMigrationAnalysisResult', 'Remove-OCIJmsPerformanceTuningAnalysisResult', 'Stop-OCIJmsWorkRequest', 'Update-OCIJmsDrsFile', 'Update-OCIJmsExportSetting', 'Update-OCIJmsFleet', 'Update-OCIJmsFleetAdvancedFeatureConfiguration', 'Update-OCIJmsFleetAgentConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Jms' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
Find-AmazonBook.ps1
## Requires HttpRest http://poshcode.org/691 ## Add-Module HttpRest ##Or:## . HttpRest.ps1 ## YOU MUST Provide an Amazon Web Services key (AWSKey) and a $Book title #################################################################################################### Set-HttpDefaultUrl "http://ecs.amazonaws.com/onca/xml" FUNCTION Search-Books { PARAM( [string]$Book, [string]$AWSKey, [string]$outFile, [string]$inputDelim = ",", [int]$Count = 1 ) BEGIN { if($Book -and $(Test-Path $Book)) { return Get-Content $Book | Search-Books } elseif($Book){ $Book | Search-Books } $params = @{ Service="AWSECommerceService" AWSAccessKeyId=$AWSKey Operation="ItemSearch" SearchIndex="Books" } } PROCESS { if($_){ $book=$_ $bk = $book.Split($inputDelim) $params.Title = $bk[0].Trim() if($bk[1]) { $params.Author = $bk[1].Trim() } else { $params.Remove("Author") } $items = Invoke-Http GET -with $params | Receive-Http Xml "//*[local-name() = 'Item']" | Select Asin, DetailPageUrl, @{n="Title";e={$_.ItemAttributes.Title}}, @{n="Author";e={$_.ItemAttributes.Author}} -First $Count if($outFile) { ConvertTo-CSV -io $items | Add-Content -Path $outFile } else { $items } }} }
0
sample_6_99.ps1
# Script: tss_ExportVPNProfiles.ps1 #region ::::: Script Input PARAMETERS ::::: #$ScriptVer="1.01" #Date: 2024-03-21 [CmdletBinding()]param( [Parameter(Mandatory=$true, Position=0)] [String] $PrefixTime, [Parameter(Mandatory=$true, Position=1)] [string] $TssPhase ) function CollectNET_VpnProfiles { # Get VPN profiles $vpns = Get-CimInstance -Namespace root\cimv2\mdm\dmmap -ClassName MDM_VPNv2_01 # Export each VPN profile to an XML file $vpns | ForEach-Object { $profileName = $_.InstanceID $profileXml = $_.ProfileXML $outFile = $PrefixTime + $profileName + "_" + $TssPhase + ".xml" try { [System.IO.File]::WriteAllText($outFile, $profileXml) } catch { Write-Host "Error exporting $($profileName): $_" } } } CollectNET_VpnProfiles # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBtKSRwgdXYPHB0 # t13wNuULtGIIp4QbNPs7zkKXMGoq86CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ5J # Bw/Ec2Q5x/pBNfhIb4EcBixTPzCawX1Jwmn2gWtvMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAPUWA50ZDvGpTbz89zCn1bLcQgLJrnF2zMhln # eIVOfzWhlabV+cgPk75RaJVm1npmQvchxvD6fXrfS/qrfpH5NV/KeKQNEU/LUe7q # tPgE8j9BrQ/+MxezQTqFgLRTkjHKKe+j1VAGLmh+RrYmC2FHB8lmj8wbOJBkJHGJ # fMM2s5f5DIIlTljTvYLUfp7pDQKc8Ca+jJ+h+IDYac5XBHsurxXZq8eXJwCZvWXB # 70/IrES91cYMgzDDO/az6cCVbaxYK5qB6Qz2UeHI1LRVMRSGhMFg3QqRg+pPvkBI # zgnFwmlteLQj/ZhpqIcUiSW3F0WWgNxn0Z5Uy861J2W+u4nyDKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAp/eD/kniKLQ4u7j1uOX17pye5jAT7PcMu # EuEbegIf8QIGZwgI5wY6GBMyMDI0MTAxNzAwMjEwOC42MjFaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB # AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv # QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed # zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv # 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY # cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT # EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ # UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7 # b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD # oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe # h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69 # mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2 # t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx # BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X # pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t # aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t # uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM # iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw # psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL # zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR # J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB # 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX # WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV # PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE # K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpv2TAi # GA8yMDI0MTAxNjE3MDExM1oYDzIwMjQxMDE3MTcwMTEzWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqum/ZAgEAMAcCAQACAghjMAcCAQACAhL6MAoCBQDqu8FZAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAIuPeJEugjcfrJV0dIkhqUMSj6Jx # 3iRgadzJiwuR/iEWUxhTU8gOGun9rcCFm3umYppbXgsuh7809igGr/ehDJvxaUiw # AAtDWlR2j8tiMLDcOwNOBhlSKF5hvn5n35wEWDpegmb/PTBmPN3G8D/0TL45WRS5 # pYXHZ6/sNc8gZQxSlAtcqj7co05HXUB0JDuoomu3Pwp/sGo0KQaM1yTVPJHjv3Xm # SQPREH90wbRGxGK++zSl/SSd1yRCEwbXBDzFutf+L5MUUX6mX2+snBPzwdknIr4W # QHP1cUj3pQIa+XeamTHwm6GBWwXeWIE4oWfVRGiq1QxC5w7RCR3Em6z6V4ExggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+ # MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCC0kdygN4dbNkkolOnHor5PVFfj # 85YJs9mhznZgoa2FTTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0u # MVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgWYHxiR74 # jMaMh+s9xXYccKg8Afskta3kon5CuLtJw2AwDQYJKoZIhvcNAQELBQAEggIAlQB4 # yn2R+6P+oBQi5/ksjsPJwKHNoJPY+YBk6Q8WmHcz3Y9IJZWNj72P5UYm1y842uzH # 6/mvBRif87U5V/fvk9hFWzxN6ZcbRg5r3Wcw0Zo2vWGYhnccu9fL3Gf6NEhhWkkh # s16KVUjmU0dnWT1hFleZNzIX15A6ciyZb5q9XHAHLeFN/TxNPxS3anOLIZJZhGHm # CCKu3GwsT9rygzZ06piVaBJnxK4SwyjqX7WRuRYZENjBpI6km6P8YXkjHizWT0a1 # pdLvW2Rg5smxJLQ4Sq+KqEHfw7c0FXWX2nIYFL9GNzxmci5I0SjQfT/hCeegSD5Y # BBMZ9snWuCgTMFgXAdiYoh8bmwd2lS2BEyp7vjT18u+gXg0JqyqkuDE8hwT6UVVn # gAwt1D6MGXVtUt8ktlopHXPHD90Fikas4OXpn78zpMsgeSEe1gj4wOa1Mwe6vxRP # qyFqZoHncMOzxGm5BtEqIb8D6TvX3OJHjfIejzO2AU7JubKbvewXLwCDWoUT/Rsb # LxtHG84sT2IpK3hTTjcJmxVsYk8JL81eAZLsbe2uIfZwH5xxGmPBDfVL/9mqXLPh # Ubij+hHvazZNVVaFS4qTyquBKmqtybZz/XmpEPjy9DzvpazxAu101UaaV9xa4KoO # fdzWPLYH2l50wIbHGpySXyy4PuTk9UR1RdAxZV4= # SIG # End signature block
0
sample_42_17.ps1
# # Module manifest for module 'OCI.PSModules.Networkfirewall' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Networkfirewall.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6a784c1a-dca2-489e-beb9-d910537df35b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Networkfirewall Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkfirewall.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINetworkfirewall', 'Get-OCINetworkfirewallAddressList', 'Get-OCINetworkfirewallAddressListsList', 'Get-OCINetworkfirewallApplication', 'Get-OCINetworkfirewallApplicationGroup', 'Get-OCINetworkfirewallApplicationGroupsList', 'Get-OCINetworkfirewallApplicationsList', 'Get-OCINetworkfirewallDecryptionProfile', 'Get-OCINetworkfirewallDecryptionProfilesList', 'Get-OCINetworkfirewallDecryptionRule', 'Get-OCINetworkfirewallDecryptionRulesList', 'Get-OCINetworkfirewallMappedSecret', 'Get-OCINetworkfirewallMappedSecretsList', 'Get-OCINetworkfirewallPoliciesList', 'Get-OCINetworkfirewallPolicy', 'Get-OCINetworkfirewallSecurityRule', 'Get-OCINetworkfirewallSecurityRulesList', 'Get-OCINetworkfirewallService', 'Get-OCINetworkfirewallServiceList', 'Get-OCINetworkfirewallServiceListsList', 'Get-OCINetworkfirewallServicesList', 'Get-OCINetworkfirewallsList', 'Get-OCINetworkfirewallUrlList', 'Get-OCINetworkfirewallUrlListsList', 'Get-OCINetworkfirewallWorkRequest', 'Get-OCINetworkfirewallWorkRequestErrorsList', 'Get-OCINetworkfirewallWorkRequestLogsList', 'Get-OCINetworkfirewallWorkRequestsList', 'Invoke-OCINetworkfirewallApplyNetworkFirewallPolicy', 'Invoke-OCINetworkfirewallBulkUploadAddressLists', 'Invoke-OCINetworkfirewallBulkUploadApplicationGroups', 'Invoke-OCINetworkfirewallBulkUploadApplications', 'Invoke-OCINetworkfirewallBulkUploadDecryptionProfiles', 'Invoke-OCINetworkfirewallBulkUploadDecryptionRules', 'Invoke-OCINetworkfirewallBulkUploadMappedSecrets', 'Invoke-OCINetworkfirewallBulkUploadSecurityRules', 'Invoke-OCINetworkfirewallBulkUploadServiceLists', 'Invoke-OCINetworkfirewallBulkUploadServices', 'Invoke-OCINetworkfirewallBulkUploadUrlLists', 'Invoke-OCINetworkfirewallCloneNetworkFirewallPolicy', 'Invoke-OCINetworkfirewallMigrateNetworkFirewallPolicy', 'Move-OCINetworkfirewallCompartment', 'Move-OCINetworkfirewallPolicyCompartment', 'New-OCINetworkfirewall', 'New-OCINetworkfirewallAddressList', 'New-OCINetworkfirewallApplication', 'New-OCINetworkfirewallApplicationGroup', 'New-OCINetworkfirewallDecryptionProfile', 'New-OCINetworkfirewallDecryptionRule', 'New-OCINetworkfirewallMappedSecret', 'New-OCINetworkfirewallPolicy', 'New-OCINetworkfirewallSecurityRule', 'New-OCINetworkfirewallService', 'New-OCINetworkfirewallServiceList', 'New-OCINetworkfirewallUrlList', 'Remove-OCINetworkfirewall', 'Remove-OCINetworkfirewallAddressList', 'Remove-OCINetworkfirewallApplication', 'Remove-OCINetworkfirewallApplicationGroup', 'Remove-OCINetworkfirewallDecryptionProfile', 'Remove-OCINetworkfirewallDecryptionRule', 'Remove-OCINetworkfirewallMappedSecret', 'Remove-OCINetworkfirewallPolicy', 'Remove-OCINetworkfirewallSecurityRule', 'Remove-OCINetworkfirewallService', 'Remove-OCINetworkfirewallServiceList', 'Remove-OCINetworkfirewallUrlList', 'Stop-OCINetworkfirewallWorkRequest', 'Update-OCINetworkfirewall', 'Update-OCINetworkfirewallAddressList', 'Update-OCINetworkfirewallApplication', 'Update-OCINetworkfirewallApplicationGroup', 'Update-OCINetworkfirewallDecryptionProfile', 'Update-OCINetworkfirewallDecryptionRule', 'Update-OCINetworkfirewallMappedSecret', 'Update-OCINetworkfirewallPolicy', 'Update-OCINetworkfirewallSecurityRule', 'Update-OCINetworkfirewallService', 'Update-OCINetworkfirewallServiceList', 'Update-OCINetworkfirewallUrlList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkfirewall' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
2149.ps1
using namespace System.Management.Automation using namespace System.Management.Automation.Language using namespace System.Collections using namespace System.Collections.Generic class CompletionTestResult { [string]$CompletionText [string]$ListItemText [CompletionResultType]$ResultType [string]$ToolTip [bool]$Found [bool] Equals($Other) { if ($Other -isnot [CompletionTestResult] -and $Other -isnot [CompletionResult]) { return $false } if ($this.CompletionText -cne $Other.CompletionText -or $this.ResultType -ne $Other.ResultType) { return $false } if ($this.ListItemText -cne $Other.ListItemText -and ![string]::IsNullOrEmpty($this.ListItemText) -and ![string]::IsNullOrEmpty($Other.ListItemText)) { return $false } if ($this.ToolTip -cne $Other.ToolTip -and ![string]::IsNullOrEmpty($this.ToolTip) -and ![string]::IsNullOrEmpty($Other.ToolTip)) { return $false } return $true } } class CompletionTestCase { [CompletionTestResult[]]$ExpectedResults [string[]]$NotExpectedResults [string]$TestInput } function Get-Completions { param([string]$inputScript, [int]$cursorColumn = $inputScript.Length) $results = [System.Management.Automation.CommandCompletion]::CompleteInput( $inputScript, $cursorColumn, $null) return $results } function Get-CompletionTestCaseData { param( [Parameter(ValueFromPipeline)] [hashtable[]]$Data) process { Write-Output ([CompletionTestCase[]]$Data) } } function Test-Completions { param( [Parameter(ValueFromPipeline)] [CompletionTestCase[]]$TestCases) process { foreach ($test in $TestCases) { Context ("Command line: <" + $test.TestInput + ">") { $results = Get-Completions $test.TestInput foreach ($result in $results.CompletionMatches) { foreach ($expected in $test.ExpectedResults) { if ($expected.Equals($result)) { $expected.Found = $true } } } foreach ($expected in $test.ExpectedResults) { $skip = $false if ( $expected.CompletionText -Match "System.Management.Automation.PerformanceData|System.Management.Automation.Security" ) { $skip = $true } It ($expected.CompletionText) -skip:$skip { $expected.Found | Should -BeTrue } } foreach ($notExpected in $test.NotExpectedResults) { It "Not expected: $notExpected" { foreach ($result in $results.CompletionMatches) { $result.CompletionText | Should -Not -Be $notExpected } } } } } } } function AlphaArgumentCompleter { param( [string] $CommandName, [string] $parameterName, [string] $wordToComplete, [CommandAst] $commandAst, [IDictionary] $fakeBoundParameters) $beta = $fakeBoundParameters['beta'] $gamma = $fakeBoundParameters['Gamma'] $result = "beta: $beta gamma: $gamma command: $commandName parameterName: $parameterName wordToComplete: $wordToComplete" [CompletionResult]::new($result, $result, "ParameterValue", $result) } class BetaArgumentCompleter : IArgumentCompleter { [IEnumerable[CompletionResult]] CompleteArgument( [string] $CommandName, [string] $parameterName, [string] $wordToComplete, [CommandAst] $commandAst, [IDictionary] $fakeBoundParameters) { $resultList = [List[CompletionResult]]::new() $alpha = $fakeBoundParameters['Alpha'] $gamma = $fakeBoundParameters['Gamma'] $result = "alpha: $alpha gamma: $gamma command: $commandName parameterName: $parameterName wordToComplete: $wordToComplete" $resultList.Add([CompletionResult]::new($result, $result, "ParameterValue", $result)) return $resultList } } function TestFunction { param( [ArgumentCompleter({ AlphaArgumentCompleter @args })] $Alpha, [ArgumentCompleter([BetaArgumentCompleter])] $Beta, $Gamma ) } Describe "Script block based extensible completion" -Tags "CI" { @{ ExpectedResults = @( @{CompletionText = "beta: 11 gamma: 22 command: TestFunction parameterName: Alpha wordToComplete: aa" ResultType = "ParameterValue"}) TestInput = 'TestFunction -Beta 11 -Gamma 22 -Alpha aa' } | Get-CompletionTestCaseData | Test-Completions } Describe "Test class based extensible completion" -Tags "CI" { @{ ExpectedResults = @( @{CompletionText = "alpha: 42 gamma: 44 command: TestFunction parameterName: Beta wordToComplete: zz" ResultType = "ParameterValue"}) TestInput = 'TestFunction -Alpha 42 -Gamma 44 -Beta zz' } | Get-CompletionTestCaseData | Test-Completions } Describe "Test registration based extensible completion" -Tags "CI" { Register-ArgumentCompleter -Command TestFunction -Parameter Gamma -ScriptBlock { param( [string] $CommandName, [string] $parameterName, [string] $wordToComplete, [CommandAst] $commandAst, [IDictionary] $fakeBoundParameters) $beta = $fakeBoundParameters['beta'] $alpha = $fakeBoundParameters['alpha'] $result = "beta: $beta alpha: $alpha command: $commandName parameterName: $parameterName wordToComplete: $wordToComplete" [CompletionResult]::new($result, $result, "ParameterValue", $result) } @{ ExpectedResults = @( @{CompletionText = "beta: bb alpha: aa command: TestFunction parameterName: Gamma wordToComplete: 42" ResultType = "ParameterValue"}) TestInput = 'TestFunction -Alpha aa -Beta bb -Gamma 42' } | Get-CompletionTestCaseData | Test-Completions } Describe "Test extensible completion of native commands" -Tags "CI" { Register-ArgumentCompleter -Command netsh -Native -ScriptBlock { [CompletionResult]::new('advfirewall', 'advfirewall', "ParameterValue", 'advfirewall') [CompletionResult]::new('bridge', 'bridge', "ParameterValue", 'bridge') } @{ ExpectedResults = @( @{CompletionText = "advfirewall"; ResultType = "ParameterValue"} @{CompletionText = "bridge"; ResultType = "ParameterValue"} ) TestInput = 'netsh ' } | Get-CompletionTestCaseData | Test-Completions } Describe "Test completion of parameters for native commands" -Tags "CI" { Register-ArgumentCompleter -Native -CommandName foo -ScriptBlock { Param($wordToComplete) @("-dir", "-verbose", "-help", "-version") | Where-Object { $_ -Match "$wordToComplete*" } | ForEach-Object { [CompletionResult]::new($_, $_, [CompletionResultType]::ParameterName, $_) } } @{ ExpectedResults = @( @{CompletionText = "-version"; ResultType = "ParameterName"} @{CompletionText = "-verbose"; ResultType = "ParameterName"} @{CompletionText = "-dir"; ResultType = "ParameterName"} @{CompletionText = "-help"; ResultType = "ParameterName"} ) TestInput = 'foo -' } | Get-CompletionTestCaseData | Test-Completions @{ ExpectedResults = @( @{CompletionText = "-version"; ResultType = "ParameterName"} @{CompletionText = "-verbose"; ResultType = "ParameterName"} ) TestInput = 'foo -v' } | Get-CompletionTestCaseData | Test-Completions } Describe "Test extensible completion of using namespace" -Tags "CI" { @{ ExpectedResults = @( @{CompletionText = "System"; ResultType = "Namespace"} ) TestInput = 'Using namespace sys' }, @{ ExpectedResults = @( @{CompletionText = "System.Xml"; ResultType = "Namespace"} @{CompletionText = "System.Data"; ResultType = "Namespace"} @{CompletionText = "System.Collections"; ResultType = "Namespace"} @{CompletionText = "System.IO"; ResultType = "Namespace"} ) TestInput = 'Using namespace system.' }, @{ ExpectedResults = @( @{CompletionText = "System.Management.Automation"; ResultType = "Namespace"} ) TestInput = 'Using namespace System.Management.Automati' }, @{ ExpectedResults = @( @{CompletionText = "System.Management.Automation.Host"; ResultType = "Namespace"} @{CompletionText = "System.Management.Automation.Internal"; ResultType = "Namespace"} @{CompletionText = "System.Management.Automation.Language"; ResultType = "Namespace"} @{CompletionText = "System.Management.Automation.PerformanceData"; ResultType = "Namespace"} @{CompletionText = "System.Management.Automation.Provider"; ResultType = "Namespace"} @{CompletionText = "System.Management.Automation.Remoting"; ResultType = "Namespace"} @{CompletionText = "System.Management.Automation.Runspaces"; ResultType = "Namespace"} @{CompletionText = "System.Management.Automation.Security"; ResultType = "Namespace"} ) TestInput = 'using namespace System.Management.Automation.' } | Get-CompletionTestCaseData | Test-Completions } Describe "Type extensible completion of type after using namespace" -Tags "CI" { @{ ExpectedResults = @( @{CompletionText = "IO.TextReader"; ResultType = "Type"} ) TestInput = 'using namespace System; [TextR' }, @{ ExpectedResults = @( @{CompletionText = "TextReader"; ResultType = "Type"} ) TestInput = 'using namespace System.IO; [TextR' }, @{ ExpectedResults = @( @{CompletionText = "Alias"; ResultType = "Type"} ) TestInput = '[aliasatt' }, @{ ExpectedResults = @( @{CompletionText = "string"; ResultType = "Type"} ) TestInput = 'using namespace System; [strin' } | Get-CompletionTestCaseData | Test-Completions } Describe "Additional type name completion tests" -Tags "CI" { @{ ExpectedResults = @( @{CompletionText = "System"; ResultType = "Namespace"} @{CompletionText = "System.Security.AccessControl.SystemAcl"; ResultType = "Type"} ) TestInput = 'Get-Command -ParameterType System' }, @{ ExpectedResults = @( @{CompletionText = "System.Action"; ResultType = "Type"} @{CompletionText = "System.Activator"; ResultType = "Type"} ) TestInput = 'Get-Command -ParameterType System.' }, @{ ExpectedResults = @( @{CompletionText = "System.Collections.Generic.LinkedList"; ResultType = "Type"; ListItemText = "LinkedList<>"; ToolTip = "System.Collections.Generic.LinkedList[T]"} @{CompletionText = "System.Collections.Generic.LinkedListNode"; ResultType = "Type"; ListItemText = "LinkedListNode<>"; ToolTip = "System.Collections.Generic.LinkedListNode[T]"} @{CompletionText = "System.Collections.Generic.List"; ResultType = "Type"; ListItemText = "List<>"; ToolTip = "System.Collections.Generic.List[T]"} ) TestInput = 'Get-Command -ParameterType System.Collections.Generic.Li' }, @{ ExpectedResults = @( @{CompletionText = "System.Collections.Generic.Dictionary"; ResultType = "Type"; ListItemText = "Dictionary<>"; ToolTip = "System.Collections.Generic.Dictionary[T1, T2]"} ) TestInput = 'Get-Command -ParameterType System.Collections.Generic.Dic' } | Get-CompletionTestCaseData | Test-Completions } Describe "ArgumentCompletionsAttribute tests" -Tags "CI" { BeforeAll { function TestArgumentCompletionsAttribute { param( [ArgumentCompletions("value1", "value2", "value3")] $Alpha, $Beta ) } function TestArgumentCompletionsAttribute1 { param( [ArgumentCompletionsAttribute("value1", "value2", "value3")] $Alpha, $Beta ) } $cmdletSrc=@' using System; using System.Management.Automation; using System.Collections.Generic; namespace Test.A { [Cmdlet(VerbsCommon.Get, "ArgumentCompletions")] public class TestArgumentCompletionsAttributeCommand : PSCmdlet { [Parameter] [ArgumentCompletions("value1", "value2", "value3")] public string Param1; protected override void EndProcessing() { WriteObject(Param1); } } [Cmdlet(VerbsCommon.Get, "ArgumentCompletions1")] public class TestArgumentCompletionsAttributeCommand1 : PSCmdlet { [Parameter] [ArgumentCompletionsAttribute("value1", "value2", "value3")] public string Param1; protected override void EndProcessing() { WriteObject(Param1); } } } '@ $cls = Add-Type -TypeDefinition $cmdletSrc -PassThru | Select-Object -First 1 $testModule = Import-Module $cls.Assembly -PassThru $testCasesScript = @( @{ attributeName = "ArgumentCompletions" ; cmdletName = "TestArgumentCompletionsAttribute" }, @{ attributeName = "ArgumentCompletionsAttribute"; cmdletName = "TestArgumentCompletionsAttribute1" } ) $testCasesCSharp = @( @{ attributeName = "ArgumentCompletions" ; cmdletName = "Get-ArgumentCompletions" }, @{ attributeName = "ArgumentCompletionsAttribute"; cmdletName = "Get-ArgumentCompletions1" } ) } AfterAll { Remove-Module -ModuleInfo $testModule } It "<attributeName> works in script" -TestCases $testCasesScript { param($attributeName, $cmdletName) $line = "$cmdletName -Alpha val" $res = TaBexpansion2 -inputScript $line -cursorColumn $line.Length $res.CompletionMatches.Count | Should -Be 3 $res.CompletionMatches.CompletionText -join " " | Should -BeExactly "value1 value2 value3" { TestArgumentCompletionsAttribute -Alpha unExpectedValue } | Should -Not -Throw } It "<attributeName> works in C param($attributeName, $cmdletName) $line = "$cmdletName -Param1 val" $res = TaBexpansion2 -inputScript $line -cursorColumn $line.Length $res.CompletionMatches.Count | Should -Be 3 $res.CompletionMatches.CompletionText -join " " | Should -BeExactly "value1 value2 value3" { TestArgumentCompletionsAttribute -Param1 unExpectedValue } | Should -Not -Throw } }
0
sample_3_26.ps1
ConvertFrom-StringData @' id_citrixappsensecheck=Checking the presence of Citrix AppSense id_citrixappsensecheckdesc=Checking if Citrix AppSense is installed on machine id_citrixappsensecheckrs=Appsense application with EM 8.1 was detected in conjunction with Citrix Servers. This may cause logoff and disconnect issues with Remote Desktop Services. '@ # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCbUgtirLjw5ijB # 9IAEcKpXnNasockmBYEWgBhiP0VwgKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICA6+hkk/mrVI7xCMT5o4udU # aRBjVdJ5PmxV6JXdY2wiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAS3xQBJpt7jcABH38zbrS4fE/Pkp9Gm6UxduSJKBBBOJi/2K/wrRAnmqa # n0alE05Hs19QRiXz86NqnqqAdm597geqP3P0SZRCa7EzNhg9SdztxQeG1KTQVJVw # qW71JtVM2lqCZ4C5yzZCwFwoPBpcAQ5Q7xXqKLkHvyv/+Tbdbsqta6f/NWZ8V7N4 # v2TTgIbR8iVhKO6kM5LD1uHRcw1JD4jdSQQqO5mUOFS9bO97mCKzBWwMRDdAuhgp # f63iZ9lcCvlF/W7+2tWzj1Q0VUdXJfdQC2VJR3FnI42/WyAjcLNhGuPWyF9jhNLA # 1sJ/2DEBNg5PYdqoAtsGcWwPONaWEKGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAJqQVZUJ7T2meW6MRCAj72LYSfsHB3F094shwzhmfHWQIGZutZ6YI4 # GBMyMDI0MTAyODExNDA0MS44NjFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvXqn8bKhdWAAEAAAIAMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjUyMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAr1XaadKkP2TkunoTF573 # /tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biFIHc6LqrIeqCgT9fT/Gks # 5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfNXszWswmL9UlWo8mzyv9L # p9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6cSn0MlYukXklArChq6l+ # KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnNh9M6kDaneSz78/YtD/2p # Gpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69l5dJv71S/mH+Lxb6L692 # n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswCqjqNc3X/WIzA7GGs4HUS # 4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2BtxMKq3kneRoT27NQ7Y7n8 # ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V8f5r4HaG9zPcykOyJpRZ # y+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH6J7fJXqRPbg+H6rYLZ8X # BpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+nHkM+zgSx8+07BVZPBKs # looebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSAJSTavgkj # Kqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAKPCG9njRtIqQ # +fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdLZS0b2IDHg0yLrtdVuBi3 # FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12iO3t6jy1hPSquzGLry/2m # EZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q+HGyZv3v8et+rQYg8sF3 # PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXFRFKhcSUws7mFdIDDhZpx # qyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d45hb6PzOIF7BkcPtRtFW # 2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6DirsJ4IG9ikId941+mWDej # kj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+yLr8FLc7nbMa2lFSixzu # 96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6Mk+YuxvzprkuWQJYWfpPv # ug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVnebYRshwZIyJTsBgLZmHM7q # 2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4lT2/N0pDbn2ffAzjZkhI+ # Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivipL3sSLlWFbLrWjmSggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0MTAyOTEwNDIxM1owdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEAAgIa1wIB/zAHAgEAAgIT # PjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAb6NwhJU6A # qC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr/jfnUT+KQlJtxfDU/IHD # XlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3qKyN4MEFl3yXKar4dOwp # uXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/39OIVKvzQ2C32cLh8WRrg # +s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhkwVuch5mEOYFv2ftoL3lD # 4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP8zAakq6wB0hFJ6xpVsYT # xo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgbqoEuWST # FWZc2WsO3c+DqtAOzhSksRtomLQh2WLRdmQwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudIk/9KAk/ZJzCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAAvXqn8bKhdWAAEA # AAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcadRIs4/Ph4MA0GCSqGSIb3 # DQEBCwUABIICAA9I8sy4cRe0impVOZpsWkxke+iN8SIWYO5UnwUqG8OqNrxCIujV # z2HTQwgK3+76HwVgiY4QDcXRXC4yd8lQr7GF5e3v50YYYuYfoyFIY01uqemvxTn/ # zkS2R8zVpUlBrwRWuVNm0SwqrlWUi8OT0tahcAj0ePF/s8Uv13qP2xQk58Btaai/ # Nk16akqsI8Vw4vsZGY05A4fmCd+bamcGYc/zAzrYvk2nSCj+ggDqJwkjHJ8AamPB # U+nf8UMaHnOl3yr7r3xFnimr198EXyIw3jQa+yWO+SxUOdVV040H27rQdmxb3298 # 6fe+Nd5v04ahTkbqa+1OOuocO1B21A4TqbQ0JG8WJeWLKXf05mOoAkP9ikzL79MR # +WN0UN+KZEQKe6VkLCG056X0kLkZpoKsGVyKueKjB4wrWQXCVPhGbmPZHu2DOAkm # Ek8iaozC76jrlA/DamvzhAzsn7neFWpnTNskJrn0w82VGe/UxvncN296F57VpcId # HmwFvIRKFbGsTgNIXQe5G/aIEtRz3bcUgu6C8WsbxUSXWKKETsYDMZuoy1ToR4QM # JU4ayub7ec17ughsSWNFYqeuWVQE5uHdnsPEA6pOAOz/sAnRW/NNUuthDLdm69w4 # bHSqW3JZLx7T3QuJvya3BSfPBTMo6IbyRa3Mr9FYhcno7RSLnrhm6S/Z # SIG # End signature block
0
New-XVM_12.ps1
#Example #New-XVM -ComputerName HYPERVSVR02 -Name "TLG-INET2" -SwitchName "External(192.168.1.0/24)" -VhdType Differencing -ParentVhdPath 'D:\\vhds\\Windows #Server 2012 RC Base.vhdx' Function New-XVM { [cmdletbinding()] Param ( [Parameter(Mandatory=$false,Position=1)] [string]$ComputerName=$env:COMPUTERNAME, [Parameter(Mandatory=$true,Position=2)] [string]$Name, [Parameter(Mandatory=$true,Position=3)] [string]$SwitchName, [Parameter(Mandatory=$true,Position=4)] [ValidateSet("NoVHD","ExistingVHD","NewVHD","Differencing")] [string]$VhdType, [Parameter(Mandatory=$false,Position=5)] [hashtable]$Configuration ) DynamicParam { Switch ($VhdType) { "ExistingVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $vhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("VhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("VhdPath",$vhdPath) return $paramDictionary } "NewVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskType = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskType", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("DiskType",$diskType) $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskSize = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskSize", [uint64], $attributeCollection) $paramDictionary.Add("DiskSize",$diskSize) return $paramDictionary } "Differencing" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $parentVhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("ParentVhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("ParentVhdPath",$parentVhdPath) return $paramDictionary } } } Begin { Try { $vmHost = Get-VMHost -ComputerName $ComputerName -ErrorAction:Stop } Catch { $PSCmdlet.ThrowTerminatingError($Error[0]) } $defaultVirtualHardDiskPath = $vmHost.VirtualHardDiskPath } Process { $validConfigNames = "MemoryStartupBytes","BootDevice" $configParams = @() Switch ($VhdType) { "NoVHD" { $newVhdPath = $null } "ExistingVHD" { $newVhdPath = $vhdPath.Value } "NewVhd" { if (-not $diskType.IsSet) {$diskType.Value = "Dynamic"} if (-not $diskSize.IsSet) {$diskSize.Value = 127GB} $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" Switch ($diskType.Value) { "Fixed" { $vhdFile = New-VHD -ComputerName $ComputerName -Fixed -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } "Dynamic" { $vhdFile = New-VHD -ComputerName $ComputerName -Dynamic -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } } } "Differencing" { $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" $vhdFile = New-VHD -ComputerName $ComputerName -Differencing -ParentPath $parentVhdPath.Value -Path $newVhdPath -ErrorAction Stop } } if ($vhdFile -ne $null) { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -VHDPath '$($vhdFile.Path)'" } else { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -NoVHD" } if ($Configuration -ne $null) { foreach ($configName in $Configuration.Keys.GetEnumerator()) { if ($validConfigNames -contains $configName) { $configParams += "-$configName" + " " + $Configuration[$configName] } } $configParams = $configParams -join " " } if ($configParams.Count -eq 0) { $command += " -ErrorAction Stop" } else { $command += " $configParams -ErrorAction Stop" } Try { Invoke-Expression -Command $command } Catch { $PSCmdlet.WriteError($Error[0]) Remove-Item -Path $vhdFile.Path } } End {} }
0
sample_3_71.ps1
#$debug = $false # Load Common Library: . ./utils_cts.ps1 # Load DSD Common Function Library . ./utils_DSD.ps1 trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } $FirstTimeExecution = FirstTimeExecution if ($FirstTimeExecution) { # Auto Added Commands [AutoAdded] .\TS_AutoAddCommands_SQLsetup.ps1 EndDataCollection } else { #2nd execution. Delete the temporary flag file then exit EndDataCollection -DeleteFlagFile $True } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBCSCP6D/UvddkN # U+rJp18S47vwzHYW6TOLG7NKRLK3zaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGDi # NiC84fE1g403LEm7IXuQ13vx435CcDWuRtFrXvGlMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEALWg6xCwzN3TYzNq5vgUoSCHjH5eXdxV+ZYKx # 6R/wY/kKtEPcNTz5EGANBbahPymsXPG7rkX4eJgkE5SsyGt40MxxwVltHOZ5fu3r # yuy6BGWjtWp7wDUJHZurkdPIL5NtqWEM+UsMnNJSG+SelCQKAYSLDJKQgJDHon5l # VuYiCmHTZ9Muqf2J9EvjVeWkiXUgW3/pwXqurnpvLaIWHpVgi1sw+SHxWjMbHsbD # qJtvvMDJzKZaA1akOvtYukrBsCLLPO+JyrZvsbBmkhcUaXtUVYK0h4Y6cTv20rBq # V9bn/aHQe0U7Tdil4AQjpCdkZo005jwEiCnhQTJWt/GM5q3+I6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB4zwHg1okCN3RBEPp8O3+qLUqVHLMi/rkh # axrgGVCxAgIGZut+oGE/GBMyMDI0MTAyODExNDAzOS41NjNaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big # r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF # RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts # urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF # 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83 # 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ # t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l # RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT # shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+ # vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7 # 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A # SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt # weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc # D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL # 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO # RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H # WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn # jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va # iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC # 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K # tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW # wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w # fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0 # MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA # AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l # eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L # fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M # Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a # tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao # 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgBmIqSvibfB1MYDY5O3b8Cdbm6eFRFDLwsdy4IJsdtHAwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3 # d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU # R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICAHovv3T2KxndlhP58K501PMeJQFhKLUF # dGR9ziJwnI50zgt35R8YWMOXcHJyUYAV/U9Se89/rHlYYPDY3e60Z95ps/0tbbQv # juz1ZmuPF3PK35eXJ39pLDAOocB1OzaEbvJvE+7FnqhP1aY98RUJR64k3b4UkXsg # uYdL79SR5JH7fYDGwqZshnrhuzNGw74PO/T0aqrM/Hy9ReU0qdr/v3ekDpuI8Jii # r5kT6QjGv/+Bdm41AbZmppnQFoWC7xz+CXHcdnc6hR88RMkFHKlAsq3hNYEVxKZV # Dr6hz+Vxs5oloy1YjyBWOdCaH9y15ynYDnMNYgkdG5DBwoQZasxpNdFUDZMVwQLB # vpI+kHenwBXR+VwFU778HAN5eHpTuHgoWjatnZ27sICeS9Zd8lUFmyk2SNeLDenw # URpoHaCnjODcRqVidjPv/J7IBcdn9vMRDXJnxkSRyNFVzqJKfPuxNqtnlFEGbsMs # 99l7SVkB87mRzTzp7XdoTC0/1EAuRyU6THuYnJ0KjO2MWXROSHT6ftJtE2S1A22y # lS+J/U52nubrPj0yyVgQVaZum9GRSGAThqWnOIs+YWupjVqrSyJoyKYiSwza1l64 # 7ZefM9J7ohIuITz3DSuZQ2RNjEUgZrmeRXAIhldgikAXRyMmzWse9FTB1ZTpYx5V # 53sEptnUlEsa # SIG # End signature block
0
sample_47_89.ps1
# # Module manifest for module 'OCI.PSModules.Aianomalydetection' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aianomalydetection.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a3b1179d-3494-46fe-b212-09c2eaebfa09' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aianomalydetection Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aianomalydetection.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAianomalydetectionAiPrivateEndpoint', 'Get-OCIAianomalydetectionAiPrivateEndpointsList', 'Get-OCIAianomalydetectionDataAsset', 'Get-OCIAianomalydetectionDataAssetsList', 'Get-OCIAianomalydetectionDetectAnomalyJob', 'Get-OCIAianomalydetectionDetectAnomalyJobsList', 'Get-OCIAianomalydetectionModel', 'Get-OCIAianomalydetectionModelsList', 'Get-OCIAianomalydetectionProject', 'Get-OCIAianomalydetectionProjectsList', 'Get-OCIAianomalydetectionWorkRequest', 'Get-OCIAianomalydetectionWorkRequestErrorsList', 'Get-OCIAianomalydetectionWorkRequestLogsList', 'Get-OCIAianomalydetectionWorkRequestsList', 'Invoke-OCIAianomalydetectionDetectAnomalies', 'Move-OCIAianomalydetectionAiPrivateEndpointCompartment', 'Move-OCIAianomalydetectionDataAssetCompartment', 'Move-OCIAianomalydetectionDetectAnomalyJobCompartment', 'Move-OCIAianomalydetectionModelCompartment', 'Move-OCIAianomalydetectionProjectCompartment', 'New-OCIAianomalydetectionAiPrivateEndpoint', 'New-OCIAianomalydetectionDataAsset', 'New-OCIAianomalydetectionDetectAnomalyJob', 'New-OCIAianomalydetectionModel', 'New-OCIAianomalydetectionProject', 'Remove-OCIAianomalydetectionAiPrivateEndpoint', 'Remove-OCIAianomalydetectionDataAsset', 'Remove-OCIAianomalydetectionDetectAnomalyJob', 'Remove-OCIAianomalydetectionModel', 'Remove-OCIAianomalydetectionProject', 'Stop-OCIAianomalydetectionWorkRequest', 'Update-OCIAianomalydetectionAiPrivateEndpoint', 'Update-OCIAianomalydetectionDataAsset', 'Update-OCIAianomalydetectionDetectAnomalyJob', 'Update-OCIAianomalydetectionModel', 'Update-OCIAianomalydetectionProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aianomalydetection' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_56_78.ps1
# # Module manifest for module 'Az.Relay' # # Generated by: Microsoft Corporation # # Generated on: 23/04/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.Relay.psm1' # Version number of this module. ModuleVersion = '2.0.1' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = '668e7be1-9801-496f-a7ed-25b1077d2f23' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell: Relay cmdlets' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'Relay.Autorest/bin/Az.Relay.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'Relay.Autorest\Az.Relay.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('Relay.Autorest/Az.Relay.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Get-AzRelayAuthorizationRule', 'Get-AzRelayHybridConnection', 'Get-AzRelayKey', 'Get-AzRelayNamespace', 'Get-AzRelayNamespaceNetworkRuleSet', 'Get-AzWcfRelay', 'New-AzRelayAuthorizationRule', 'New-AzRelayHybridConnection', 'New-AzRelayKey', 'New-AzRelayNamespace', 'New-AzRelayNetworkRuleSetIPRuleObject', 'New-AzWcfRelay', 'Remove-AzRelayAuthorizationRule', 'Remove-AzRelayHybridConnection', 'Remove-AzRelayNamespace', 'Remove-AzWcfRelay', 'Set-AzRelayAuthorizationRule', 'Set-AzRelayHybridConnection', 'Set-AzRelayNamespaceNetworkRuleSet', 'Set-AzWcfRelay', 'Test-AzRelayName', 'Update-AzRelayNamespace' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','PSModule','Relay' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDr3dvriwhM5ZV/ # bu3TOadmXeC0hwsC8nYCw8APkguZxqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILRPkid+5UO1/qHKpYc8dMTK # +PCbvWYmb2/Ec6q2yT6qMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAxS/cOMnezfGYyFBJjq9JK9u/wMkNI0rsiZvD2317Oo3Zb91ggqOt6s1K # nsmbIG1hM745tc6fauDoJwR85+WivT7sF4TvLU0MsORY70UoqBYcNq55n4MeUZuR # nYzhnD5CmxK9p1qdt5bFyuX4CAxJWZ1BhE0OEjjejFboBUHKJg3/M/PWgDC6h7Ur # 6QxeY8Yhw/Pj99HMVeWeELjP/1/BBgJjeoLu+uJkg2U+1ifXyD/xVMDBBiFqzgqW # ozrAnJR4H6cMz3acS+PUSRyT56qIN4Akt5P3ZStCD7CTL54ZcepAiHkQckbXkKu/ # r4clrcF6zHggb6PC/qN66xbfsUL5yKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCnV7009xgh5+yZqvgDG6XaboQ6jGGbscxNxD+tu0Q+NAIGZiAsyX2L # GBMyMDI0MDQyMzE0MTExNy4xNjdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQyNDA0MDg0MlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIUTDAHAgEAAgISBDAKAgUA # 6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKdfQ6krn/9XKU8Iy031 # XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ0JNKwtpMkAnPoDcyylCP # CELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhAdtVx7+UUaWwr/s7KcbHa # SrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgUYnMTirfH/1n4yFZHVRaD1XwBIzE72X03mdVWsSHPnMwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aqtd0QRMsB+0i74NsgRz7z # MA0GCSqGSIb3DQEBCwUABIICABV4/cCxLh45IXi66Qg7fLbt+m5OJ8Ta0sdHZ5c3 # 05mWfFyhcKoCSpqYyXebIkZct8/wcapZA55SUCJhToq348kDC6IiqEjYhIiFH8O0 # z1l9gbIkMZrmGqJn0PwL/p4gqxqKdHr6vU9Wc7+8UvNToIWAliD7jDXiHtBnkZFv # vMIyZWFYB46D5+O7kIph/eKl7fX2OgYhcUbe5V0ZxIPZ4fYuU4pbnNrJfwSAtPOp # n6aPuBQGevbeWgqwR1JQjgji+QlAIsIjxWAneuMhXGznbNlx51yS/fAWEWjEhMtV # 8Eve1CIotMV24tZLI5tWdxS8njNnMaGlCIH77PvoxQYIMF+J5+n51T/KOmzZxIB6 # NwibJOaj40kK9u+0SAUxQWe0A35B22nQlhlY4hsVsEFVS39veDKXBC6OLyyHpj8y # 5z2oypFn5ReV4eHeP9LOZ2+o+j2El1Cx4HLDc/QZ/cWTgUfoNf3stYMTIEHwSnj/ # wgNPQsWWr8Wlchyejzo+gQIIVjweF/ApaVMOsZnOd9r0qngL3IYNuHUt7W9zOrC4 # yi4un54yCAcO9L2YSh6FDeVa/dDcVDVhNCLxkwtvZVmF2UMCUKQNZH4yDPCSmTQi # 9Ee2ykNVSoVG8c9h5JfxhieXYsRZmlSIQVEVcnbWaX8zmloJuUfSUydWciql44vJ # 3v7r # SIG # End signature block
0
sample_67_54.ps1
# # Module manifest for module 'OCI.PSModules.Apmtraces' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmtraces.dll' # Version number of this module. ModuleVersion = '90.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b8a6f9e5-94d6-4c39-9ded-9767df367b9b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmtraces Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '90.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmtraces.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmtracesAggregatedSnapshot', 'Get-OCIApmtracesQuickPicksList', 'Get-OCIApmtracesSpan', 'Get-OCIApmtracesStatusAutoActivate', 'Get-OCIApmtracesTrace', 'Get-OCIApmtracesTraceSnapshot', 'Invoke-OCIApmtracesBulkActivateAttribute', 'Invoke-OCIApmtracesBulkDeActivateAttribute', 'Invoke-OCIApmtracesBulkPinAttribute', 'Invoke-OCIApmtracesBulkUnpinAttribute', 'Invoke-OCIApmtracesBulkUpdateAttribute', 'Invoke-OCIApmtracesBulkUpdateAttributeNotes', 'Invoke-OCIApmtracesQuery', 'Write-OCIApmtracesToggleAutoActivate' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmtraces' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
1831.ps1
Describe "Tests for New-PSDrive cmdlet." -Tag "CI","RequireAdminOnWindows" { Context "Validate New-PSDrive Cmdlet with -Persist switch." { BeforeEach { $UsedDrives = Get-PSDrive | Select-Object -ExpandProperty Name $PSDriveName = 'D'..'Z' | Where-Object -FilterScript {$_ -notin $UsedDrives} | Get-Random $RemoteShare = "\\$env:COMPUTERNAME\$($env:SystemDrive.replace(':','$\'))" } AfterEach { Remove-PSDrive -Name $PSDriveName -Force -ErrorAction SilentlyContinue } It "Should not throw exception for persistent PSDrive creation." -Skip:(-not $IsWindows) { { New-PSDrive -Name $PSDriveName -PSProvider FileSystem -Root $RemoteShare -Persist -ErrorAction Stop } | Should -Not -Throw } it "Should throw exception if root is not a remote share." -Skip:(-not $IsWindows) { { New-PSDrive -Name $PSDriveName -PSProvider FileSystem -Root "TestDrive:\" -Persist -ErrorAction Stop } | Should -Throw -ErrorId 'DriveRootNotNetworkPath' } it "Should throw exception if PSDrive is not a drive letter supported by operating system." -Skip:(-not $IsWindows) { $PSDriveName = 'AB' { New-PSDrive -Name $PSDriveName -PSProvider FileSystem -Root $RemoteShare -Persist -ErrorAction Stop } | Should -Throw -ErrorId 'DriveNameNotSupportedForPersistence' } } }
0
447.ps1
Register-PSFConfigValidation -Name "credential" -ScriptBlock { param ( $Value ) $Result = New-Object PSObject -Property @{ Success = $True Value = $null Message = "" } try { if ($Value.GetType().FullName -ne "System.Management.Automation.PSCredential") { $Result.Message = "Not a credential: $Value" $Result.Success = $False return $Result } } catch { $Result.Message = "Not a credential: $Value" $Result.Success = $False return $Result } $Result.Value = $Value return $Result }
0
sample_25_55.ps1
# # Module manifest for module 'OCI.PSModules.Osubsubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osubsubscription.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '93431fa6-8de9-47fd-bff2-7f03f5335df2' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osubsubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osubsubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOsubsubscriptionCommitment', 'Get-OCIOsubsubscriptionCommitmentsList', 'Get-OCIOsubsubscriptionRateCardsList', 'Get-OCIOsubsubscriptionSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osubsubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_25_34.ps1
# # Module manifest for module 'OCI.PSModules.Identitydataplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Identitydataplane.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0db2e619-5a8a-4c35-906a-750fbc5977b8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Identitydataplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydataplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'New-OCIIdentitydataplaneScopedAccessToken', 'New-OCIIdentitydataplaneUserSecurityToken' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydataplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_67_10.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ param ( [Parameter(Mandatory=$true)] [string] $ClusterConfigFilePath, [Parameter(Mandatory=$false)] [switch] $AcceptEULA, [Parameter(Mandatory=$false)] [switch] $Force, [Parameter(Mandatory=$false)] [switch] $NoCleanupOnFailure, [Parameter(Mandatory=$false)] [switch] $FabricIsPreInstalled, [Parameter(Mandatory=$false)] [string] $FabricRuntimePackagePath, [Parameter(Mandatory=$false)] [switch] $GenerateX509Cert, [Parameter(Mandatory=$false)] [string] $GeneratedX509CertClusterConfigPath = $null, [Parameter(Mandatory=$false)] [int] $MaxPercentFailedNodes, [Parameter(Mandatory=$false)] [int] $TimeoutInSeconds ) function DeletePath([string] $pathToDelete) { if (([string]::IsNullOrEmpty($pathToDelete)) -or (!(Test-Path $pathToDelete))) { return; } Write-Host "Deleting $pathToDelete" Remove-Item $pathToDelete -Recurse -Force 2> $null if (Test-Path $pathToDelete) { Write-Warning "$pathToDelete still exists. Delete manually." } } $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } if(!$AcceptEULA.IsPresent) { $EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software. [Y] Yes [N] No [?] Help (default is "N")' if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y") { Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red" exit 1 } } $ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents" $SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll" if(!(Test-Path $SystemFabricModulePath) -and (Test-Path $DeployerBinPath)) { Write-Host "Cleaning old partially extracted DeploymentComponents at $DeployerBinPath." DeletePath($DeployerBinPath) } if(!(Test-Path $DeployerBinPath)) { $DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe" if(!(Test-Path $DCAutoExtractorPath)) { Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location." exit 1 } #Extract DeploymentComponents $DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"" # special case for older powershell versions < 5 if ($PSVersionTable.PSVersion.Major -lt 5) { $DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`"" } Write-Host "running autoextractor command: $DCAutoExtractorCommand" $DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1" if($LASTEXITCODE -eq 1) { Write-Host "Extracting DeploymentComponents Cab ran into an issue." Write-Host $DCExtractOutput exit 1 } else { Write-Host "DeploymentComponents extracted." } } if(!(Test-Path $SystemFabricModulePath)) { Write-Host "Missing expected file $SystemFabricModulePath." exit 1 } $MicrosoftServiceFabricCabFileAbsolutePath = $null if($FabricRuntimePackagePath) { $MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath)) { Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath" exit 1 } } else { $RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages" if(!(Test-Path $RuntimeBinPath)) { Write-Host "No directory exists for Runtime packages. Creating a new directory." md $RuntimeBinPath | Out-Null Write-Host "Done creating $RuntimeBinPath" } } $ClusterConfigFilePath = Resolve-Path $ClusterConfigFilePath $ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1" $CertUtilityModulePath = Join-Path -Path $ThisScriptPath -ChildPath "CertInstallUtilities.psm1" $CertSetupScript = Join-Path $ThisScriptPath -ChildPath "CertSetup.ps1" # Create Self-Signed Cert if necessary if ($GenerateX509Cert.IsPresent) { Import-Module $CertUtilityModulePath if (IsSecurityX509 -ClusterConfigFilePath $ClusterConfigFilePath) { Write-Warning "GenerateX509Cert is enabled and ClusterCredentialType is X509. ` The certificateinformation section configured on the $ClusterConfigFilePath will be igonred.` Instead, the script will generate self-signed certificates and modify json config.` Please don't apply the same settings in Production Environment." # Install Server Cert and Client Cert locally and export. $thumbprintArray = InstallCertToLocal -CertSetupScript $CertSetupScript $serverThumbprint = $thumbprintArray[0] $clientThumbprint = $thumbprintArray[1] $packageRoot = (Get-Item $DeployerBinPath).parent.FullName $serverCertificate = ExportCertificateToLocal -PackageRoot $packageRoot -CertSetupScript $CertSetupScript -ServerThumbprint $ServerThumbprint -ClientThumbprint $clientThumbprint -ClusterConfigFilePath $ClusterConfigFilePath # Install Cert Remotely if (-Not (IsOneBox -ClusterConfigFilePath $ClusterConfigFilePath)) { InstallCertToRemote -ClusterConfigFilePath $ClusterConfigFilePath -CertificatePath $serverCertificate[0] -Password $serverCertificate[1] } # Modify Json if (!(Test-Path variable:GeneratedX509CertClusterConfigPath) ` -or [string]::IsNullOrEmpty($GeneratedX509CertClusterConfigPath)) { $OutputConfigFolder = Join-Path $packageRoot "TemporaryConfig" if (-Not(Test-Path $OutputConfigFolder)) { try { New-Item -ItemType Directory -Force -Path $OutputConfigFolder -ErrorAction Stop | Out-Null } catch { Write-Error "Unable to create generated configuration directory $OutputConfigFolder. Error: $_" exit 1 } } $GeneratedX509CertClusterConfigPath = Join-Path $OutputConfigFolder "GeneratedX509CertClusterConfig.json" } ModifyJsonThumbprint -ClusterConfigFilePath $ClusterConfigFilePath -ServerThumbprint $serverThumbprint -ClientThumbprint $clientThumbprint -OutPutPath $GeneratedX509CertClusterConfigPath $ClusterConfigFilePath = $GeneratedX509CertClusterConfigPath Write-Warning "Using generated $ClusterConfigFilePath to setup cluster. Please use it when removing cluster." } else { Write-Warning 'Self-Signed certificates are not generated because X509 is not properly configured.' } } $parentVerbosePreference = $VerbosePreference # Invoke in separate AppDomain $argList = @($DeployerBinPath, $ServiceFabricPowershellModulePath, $ClusterConfigFilePath, $Force.IsPresent, $NoCleanupOnFailure.IsPresent, $FabricIsPreInstalled.IsPresent, $MicrosoftServiceFabricCabFileAbsolutePath, $MaxPercentFailedNodes, $TimeoutInSeconds, $parentVerbosePreference) Powershell -Command { param ( [Parameter(Mandatory=$true)] [string] $DeployerBinPath, [Parameter(Mandatory=$true)] [string] $ServiceFabricPowershellModulePath, [Parameter(Mandatory=$true)] [string] $ClusterConfigFilePath, [Parameter(Mandatory=$false)] [bool] $Force, [Parameter(Mandatory=$false)] [bool] $NoCleanupOnFailure, [Parameter(Mandatory=$false)] [bool] $FabricIsPreInstalled, [Parameter(Mandatory=$false)] [string] $MicrosoftServiceFabricCabFileAbsolutePath, [Parameter(Mandatory=$false)] [int] $MaxPercentFailedNodes, [Parameter(Mandatory=$false)] [int] $TimeoutInSeconds, [Parameter(Mandatory=$false)] [string] $ParentVerbosePreference ) #Add FabricCodePath Environment Path $env:path = "$($DeployerBinPath);" + $env:path #Import Service Fabric Powershell Module Import-Module $ServiceFabricPowershellModulePath if (!(Test-Path variable:MicrosoftServiceFabricCabFileAbsolutePath) ` -or [string]::IsNullOrEmpty($MicrosoftServiceFabricCabFileAbsolutePath)) { #Download Runtime Package Try { $RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion -Latest $RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $RuntimePackageDetails.GoalRuntimeVersion + ".cab" $DeploymentPackageRoot = Split-Path -parent $DeployerBinPath $RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages" $MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename if(!(Test-Path $MicrosoftServiceFabricCabFilePath)) { $Version = $RuntimePackageDetails.GoalRuntimeVersion Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded." (New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath) Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath." } $MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath } Catch { Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet, use another machine with internet connectivity to download the runtime package. Run DownloadServiceFabricRuntimePackage.ps1 -FabricRuntimePackageOutputDirectory <Path to directory where runtime package should be saved> to download the latest package. Then run CreateServiceFabricCluster.ps1 -ClusterConfigurationFilePath <ClusterConfigFilePath> -FabricRuntimePackagePath <RuntimePackagePath> to create the cluster. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } #Create a cluster Try { $VerbosePreference = $ParentVerbosePreference $params = @{ 'ClusterConfigurationFilePath' = $ClusterConfigFilePath; 'FabricRuntimePackagePath' = $MicrosoftServiceFabricCabFileAbsolutePath; 'NoCleanupOnFailure' = $NoCleanupOnFailure; 'Force' = $Force; 'FabricIsPreInstalled' = $FabricIsPreInstalled; 'MaxPercentFailedNodes' = $MaxPercentFailedNodes; } if ((Test-Path variable:TimeoutInSeconds) ` -and ($TimeoutInSeconds -gt 0)) { $params += @{'TimeoutSec' = $TimeoutInSeconds;} } New-ServiceFabricCluster @params } Catch { if($VerbosePreference -eq "SilentlyContinue") { Write-Host "Create Cluster failed. Call with -Verbose for more details" -ForegroundColor Red } else { Write-Host "Create Cluster failed. Exception: $($_.Exception.ToString())" -ForegroundColor Red } exit 1 } } -args $argList -OutputFormat Text $env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine") # SIG # Begin signature block # MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBsidXT+/Fo7MQR # hHpDJRXdy1X5mTpDyyeISZzZaPAKQqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFKxbeZatomVty3HNo77hMrh # nO52RPVNMQp4qDJCSEicMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASjor+wkAif+OVqlcYOAZ7srvVKe99QEfOqRQhmSqvbvxjHwZ6rHxu+WE # 5ZYUGDuQWvdQxd57VmxfXhBqSjVUM/BEKeLIl9Cy5hW/y1xw9yysu0/eiS1ZxEWq # 20/8MTRiJ9EZPnF25k7hqqWYXQp2H6B+Vvxg1KHATpCi3jAxEXkmySFlYM3tQb0Y # PBLNVusYvwU5Fy/gz46Blf88hz06GA+PbJFlxFI7n1f1MltezuIjy+eheQGr2K7R # 7AIpcLqf7VNbn63TyzxQJbLh9Mx9eOmHqnZ35qcpEspjpBvxLsRsIO7n8GiTPtxe # cZrOsJQldWtWca4pWKj+mR3JvcL26aGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC # FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBrQCkRCznIeZXhxoi1Rq2lc54qx/orsXiKllG++SubrQIGZk30ugg7 # GBMyMDI0MDUyMjIzMDg0MC4xODJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOn4cykwIhgPMjAyNDA1MjIyMTM1MzdaGA8yMDI0MDUyMzIxMzUzN1owdjA8Bgor # BgEEAYRZCgQBMS4wLDAKAgUA6fhzKQIBADAJAgEAAgEIAgH/MAcCAQACAhFkMAoC # BQDp+cSpAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAOeDuqQv2rt9hnyKt # xmvq5WkHYrFGaoFDrBwwGrXPwqgN8JdkXVBWIDzkqJqV3kYS3Ji7mG1t05I6T1Rq # GeP4Q2o1EBtNAhn05sLAO/gLCtUImd1Z4RJ0Ks24T381hg4vGljMiE7mL0uR6t/c # m0SSLx4LbvyDikIPDGlQ1sZW3J8xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd1dVx2V1K2qGwABAAAB3TANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCD/RvF/ZBUgf7z3gET+kYCUqPpRTTzH3SjVxlZYeCJEXjCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EIGH/Di2aZaxPeJmce0fRWTftQI3TaVHFj5GI43rA # MWNmMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHd # XVcdldStqhsAAQAAAd0wIgQgLnJVJZ7vLsXMs5FcOuTl1mmXtOKo7lEM8otypA9I # 8OYwDQYJKoZIhvcNAQELBQAEggIAAO/h+nQ4n6E/DHLc9XdJLGmDgfHwbHorkfZy # uKFuSsXHzdX83uKBaucAlVhdvx2JXjPOfH6oRMHfwvNJCxFrrU/rgV4nYwKAknyt # EXFZcBN5d/pQe5cinZJfwMJXKqyJqFpQOTXNhIBOJb9PvvJZvEIvIzsdWcC9knlV # mRqTnha2FyVbRpFUn+3XbQHy5ZuG9qpGS6WDNbjsf+LuvbG5ZU6FYL7hyP8NaxGZ # tXC0GNmDZSnwmvryZaH7UqF3S7TV3Z6txrITwSw32ZCEAtzME9qOO4Xoi2wLvD/l # aessFPpORLlMV0Xf6oGWei5rtWG1N5/g5XAlWB2SWR5Y1TbmC+MEiZSViNzGlAmZ # PNPBZ9YniVZ2eInVZ88z4RfTErSFH/Nq4juXV0oXfJREeY6e4zSWiFUKVzyuylvv # ZLjBS74XG9Pr72x6dcf5p0mztZNZwCp24uFd0sthZbtXRJPOB+1SeHmH+Z3+unUI # U5P8DPCs7K8Dt5NrGtduHjl7RSQiN4hFPzYPeEM01ZJBu9AophXDavjBN9iGHJq4 # hpBOBa+6V6EAyOlIO0mL4FcVWy/t/tx2w9C96TIgl+/K28D9h6JcjTPCtORqI/ES # q03eyC94QbTAF2eVQIDJYr7bo8oI2BPUsOQAYs3H75mHJ9fRWwGMdZwqEmrs3g3/ # KCxsWXk= # SIG # End signature block
0
2629.ps1
function Copy-SQLAgentJob{ param([string]$Source ,[string[]]$Targets ,[string]$JobName) [System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.SMO') | out-null $smosource = New-Object Microsoft.SqlServer.Management.Smo.Server $Source $JobScript = $smosource.JobServer.Jobs[$JobName].Script() foreach($Target in $Targets){ $smotarget = New-Object Microsoft.SqlServer.Management.Smo.Server $Target if($smotarget.JobServer.Jobs.Name -notcontains $JobName){ $smotarget.Databases['msdb'].ExecuteNonQuery($JobScript) } } } Copy-SQLAgentJob -Source 'SHION' -Targets 'SHION\ALBEDO' -JobName 'Backup Databases - Powershell'
0
1884.ps1
Describe "ConvertFrom-StringData DRT Unit Tests" -Tags "CI" { It "Should able to throw error when convert invalid line" { $str =@" abc def=content of def "@ { ConvertFrom-StringData $str } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.ConvertFromStringDataCommand" } } Describe "ConvertFrom-StringData" -Tags "CI" { $sampleData = @' foo = 0 bar = 1 bazz = 2 '@ It "Should not throw when called with just the stringdata switch" { { ConvertFrom-StringData -StringData 'a=b' } | Should -Not -Throw } It "Should return a hashtable" { $result = ConvertFrom-StringData -StringData 'a=b' $result | Should -BeOfType Hashtable } It "Should throw if not in x=y format" { { ConvertFrom-StringData -StringData 'ab' } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.ConvertFromStringDataCommand" { ConvertFrom-StringData -StringData 'a,b' } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.ConvertFromStringDataCommand" { ConvertFrom-StringData -StringData 'a b' } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.ConvertFromStringDataCommand" { ConvertFrom-StringData -StringData 'a\tb' } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.ConvertFromStringDataCommand" { ConvertFrom-StringData -StringData 'a:b' } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.ConvertFromStringDataCommand" } It "Should return the data on the left side in the key" { $actualValue = ConvertFrom-StringData -StringData 'a=b' $actualValue.Keys | Should -BeExactly "a" } It "Should return the data on the right side in the value" { $actualValue = ConvertFrom-StringData -StringData 'a=b' $actualValue.Values | Should -BeExactly "b" } It "Should return a keycollection for the keys" { $(ConvertFrom-StringData -StringData 'a=b').Keys.PSObject.TypeNames[0] | Should -BeExactly "System.Collections.Hashtable+KeyCollection" } It "Should return a valuecollection for the values" { $(ConvertFrom-StringData -StringData 'a=b').Values.PSObject.TypeNames[0] | Should -BeExactly "System.Collections.Hashtable+ValueCollection" } It "Should work for multiple lines" { { ConvertFrom-StringData -StringData $sampleData } | Should -Not -Throw $(ConvertFrom-StringData -StringData $sampleData).Keys | Should -BeIn @("foo", "bar", "bazz") $(ConvertFrom-StringData -StringData $sampleData).Values | Should -BeIn @("0","1","2") } } Describe "Delimiter parameter tests" -Tags "CI" { BeforeAll { $TestCases = @( @{ Delimiter = ':'; StringData = 'value:10'; ExpectedResult = @{ value = 10 } } @{ Delimiter = '-'; StringData = 'a-b' ; ExpectedResult = @{ a = 'b' } } @{ Delimiter = ','; StringData = 'c,d' ; ExpectedResult = @{ c = 'd' } } ) } It "Default delimiter '=' works" { $actualValue = ConvertFrom-StringData -StringData 'a=b' $actualValue.Values | Should -BeExactly "b" $actualValue.Keys | Should -BeExactly "a" } It "Should not throw on given delimiter" { $sampleData = @" a:b "@ { $sampleData | ConvertFrom-StringData -Delimiter ':' } | Should -Not -Throw } It 'is able to parse <StringData> with delimiter "<Delimiter> with <stringdata>"' -TestCases $TestCases { param($Delimiter, $StringData, $ExpectedResult) $Result = ConvertFrom-StringData -StringData $StringData -Delimiter $Delimiter $key = $ExpectedResult.Keys $Result.Keys | Should -BeExactly $ExpectedResult.Keys $Result[$key] | Should -BeExactly $ExpectedResult.Values } }
0
Invoke-MoveRequest.ps1
########################################################################### # # NAME: Invoke-MoveRequest.ps1 # # AUTHOR: Jan Egil Ring # EMAIL: jer@powershell.no # # COMMENT: Script to use when migrating mailboxes to Microsoft Exchange Server 2010 Cross-Forest. Prepares user objects already # moved to the target forest using Active Directory Migration Tool or other tools, and then invokes the mailbox move request. # For more information, see the following blog-post: http://blog.powershell.no/2010/04/23/exchange-server-2010-cross-forest-migration # # You have a royalty-free right to use, modify, reproduce, and # distribute this script file in any way you find useful, provided that # you agree that the creator, owner above has no warranty, obligations, # or liability for such use. # # VERSION HISTORY: # 1.0 23.04.2010 - Initial release # ########################################################################### #Adding Quest AD PowerShell Commands Snapin and Microsoft Exchange Server 2010 PowerShell Snapin Add-PSSnapin Quest.ActiveRoles.ADManagement Add-PSSnapin Microsoft.Exchange.Management.PowerShell.E2010 #Custom variables, edit this section $TargetDatabase = "Mailbox Database A" $TargetDeliveryDomain = "domain.com" $TargetForest="DomainA.local" $SourceForest="domainB.local" $SourceForestGlobalCatalog = "dc-01.domainB.local" $SourceForestCredential = Get-Credential -Credential "Domain\\SourceForestAdministrator" #Connect to source forest to collect users to migrate Connect-QADService -Service $SourceForest | Out-Null $SourceForestUsersToMigrate = Get-QADUser -SearchRoot "DomainA.local/Department A/Users" foreach ($user in $SourceForestUsersToMigrate) { Write-Host "Processing user $user" -ForegroundColor Yellow #Connect to source forest to collect source object attributes Connect-QADService -Service $SourceForest | Out-Null $TargetObject=$user.samaccountname $SourceObject=Get-QADUser $samaccountname -IncludeAllProperties $mail=$SourceObject.Mail $mailNickname=$SourceObject.mailNickname [byte[]]$msExchMailboxGUID=(Get-QADuser $samaccountname -IncludedProperties msExchMailboxGUID -DontConvertValuesToFriendlyRepresentation).msExchMailboxGUID $msExchRecipientDisplayType="-2147483642" $msExchRecipientTypeDetails="128" $msExchUserCulture=$SourceObject.msExchUserCulture $msExchVersion="44220983382016" $proxyAddresses=$SourceObject.proxyAddresses $targetAddress=$SourceObject.Mail $userAccountControl=514 #Connect to target forest to set target object attributes Connect-QADService -Service $TargetForest | Out-Null Set-QADUser -Identity $TargetObject -ObjectAttributes @{mail=$mail;mailNickname=$mailNickname;msExchMailboxGUID=$msExchMailboxGUID;msExchRecipientDisplayType=$msExchRecipientDisplayType;msExchRecipientTypeDetails=$msExchRecipientTypeDetails;msExchUserCulture=$msExchUserCulture;msExchVersion=$msExchVersion;proxyAddresses=$proxyAddresses;targetAddress=$targetAddress;userAccountControl=$userAccountControl;msExchUserCulture=$msExchUserCulture} | Out-Null #Update Exchange-attributes (LegacyExchangeDN etc.) Get-MailUser $TargetObject | Update-Recipient #Invoking a new move-request New-MoveRequest -Identity $TargetObject -RemoteLegacy -TargetDatabase $TargetDatabase -RemoteGlobalCatalog $SourceForestGlobalCatalog -RemoteCredential $SourceForestCredential -TargetDeliveryDomain $TargetDeliveryDomain #Enable target object and unset "User must change password at next logon" Enable-QADUser -Identity $TargetObject | Out-Null Set-QADUser -Identity $TargetObject -UserMustChangePassword $false | Out-Null }
0
3313.ps1
function Enable-Plugin { [PoshBot.BotCommand( Aliases = 'enableplugin', Permissions = 'manage-plugins' )] [cmdletbinding()] param( [parameter(Mandatory)] $Bot, [parameter(Mandatory, Position = 0)] [string]$Name, [parameter(Position = 1)] [string]$Version ) if ($Name -ne 'Builtin') { if ($p = $Bot.PluginManager.Plugins[$Name]) { $pv = $null if ($p.Keys.Count -gt 1) { if (-not $PSBoundParameters.ContainsKey('Version')) { $versions = $p.Keys -join ', ' | Out-String return New-PoshBotCardResponse -Type Warning -Text "Plugin [$Name] has multiple versions installed. Specify version from list`n$versions" -ThumbnailUrl $thumb.warning } else { $pv = $p[$Version] } } else { $pvKey = $p.Keys[0] $pv = $p[$pvKey] } if ($pv) { try { $Bot.PluginManager.ActivatePlugin($pv.Name, $pv.Version) return New-PoshBotCardResponse -Type Normal -Text "Plugin [$Name] activated. All commands in this plugin are now enabled." -ThumbnailUrl $thumb.success } catch { return New-PoshBotCardResponse -Type Error -Text $_.Exception.Message -Title 'Rut row' -ThumbnailUrl $thumb.rutrow } } else { return New-PoshBotCardResponse -Type Warning -Text "Plugin [$Name] version [$Version] not found." -ThumbnailUrl $thumb.warning } } else { return New-PoshBotCardResponse -Type Warning -Text "Plugin [$Name] not found." -ThumbnailUrl $thumb.warning } } else { return New-PoshBotCardResponse -Type Normal -Text "Builtin plugins can't be disabled so no need to enable them." -Title 'Ya no' } }
0
558.ps1
function Join-SPOParts { [CmdletBinding()] param ( [Parameter(Mandatory=$false, Position=1)] $Parts = $null, [Parameter(Mandatory=$false, Position=2)] $Separator = '' ) $returnValue = (($Parts | ? { $_ } | % { ([string]$_).trim($Separator) } | ? { $_ } ) -join $Separator) if (-not ($returnValue.StartsWith("http", "CurrentCultureIgnoreCase"))) { $returnValue = $Separator + $returnValue } return $returnValue }
0
Convert-BounceToX_8.ps1
# $Id: Convert-BounceToX500.ps1 610 2010-11-16 00:39:19Z jon $ # $Revision: 610 $ #.Synopsis # Convert Bounce to X500 #.Description # Convert URL Encoded address in a Bounce message to an X500 address # that can be added as an alias to the mail-enabled object #.Parameter bounceAddress # URL Encoded bounce message address# #.Example # Convert-BounceToX500 "IMCEAEX-_O=CONTOSO_OU=First+20Administrative+20Group_cn=Recipients_cn=john+5Fjacob+2Esmith@contoso.com" #.Example # "IMCEAEX-_O=CONTOSO_OU=First+20Administrative+20Group_cn=Recipients_cn=john+5Fjacob+2Esmith@contoso.com"|Convert-BounceToX500 [CmdletBinding()] PARAM ( [Parameter(Mandatory=$true,ValueFromPipeline=$true)][string]$bounceAddress ) BEGIN { Add-Type -AssemblyName System.Web|Out-Null } PROCESS { if($_) {$bounceAddress = $_} $bounceAddress = $bounceAddress -Replace "%2B","%" # This is a urlEncoded "+" $bounceAddress = $bounceAddress -Replace "%3D","=" $bounceAddress = $bounceAddress -Replace "\\+","%" $bounceAddress = $bounceAddress -Replace "_O=","/O=" $bounceAddress = $bounceAddress -Replace "_OU=","/OU=" $bounceAddress = $bounceAddress -Replace "_CN=","/CN=" if([Web.HttpUtility]::UrlDecode($bounceAddress) -match "(/o=.*)@[\\w\\d.]+$"){$matches[1]} }
0
sample_57_83.ps1
# # Module manifest for module 'PSGet_AzStackHci.EnvironmentChecker' # # Generated by: Microsoft Corporation # # Generated on: 19/01/2022 # @{ # Script module or binary module file associated with this manifest. RootModule = '' # Version number of this module. ModuleVersion = '1.2100.2671.410' # Supported PSEditions # CompatiblePSEditions = '' # ID used to uniquely identify this module GUID = '0a20dacd-fb41-47d9-a934-0f5457d793ec' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2022 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft AzStackHci Readiness Checker' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @( 'AzStackHci.StandaloneObservability.psm1' 'AzStackHci.StandaloneObservability.Helpers.psm1' ) # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @('Send-AzStackHciDiagnosticData') # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Microsoft','AzStackHci' # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCACa0/vqAEx0jV/ # Fww/6DYfH4A4bWYdPf2D/1Y3mcHuFaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG+ALl/vrUasp+sKiYu7E7pX # Ryf2M53whtQOvZJKNd+FMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAUJBvMGGTH/Ef4yDxN+pPE2qN/qzWUKmbC8IfjjYtzramymN6M3SR26MG # Y4LftT6/x1stlHFHJqMfe6olOVClZgfm6mymAxbHlo+n2eqi4QJpsQwjanS9axVU # rbQpit1jkh2R92jV71Ox1FVtgFAiWYYqGe6Q4zPBNSd1rXS3NJuzLFCyrSH9R6pk # +xpYSRC8JQX/+PsMuHqDReT63pGcfxYjclQQt+pB660sm+wkFNIO8n4CJux0wEbZ # 5rokOCL23jad/xBP2iUTKs65nOvaIBzbnMOp/6fvYdQfoEd46HC5lYp/HEsERqn3 # IAJLb1f4CnkdVQ0GfXlIQAfd5z8OuaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCsoqsk0lB/ylzgBt072WY7TdgHv2JuDCo9+VkRfkHEQwIGZjOp27vf # GBMyMDI0MDUxNjE4NDQyNS4yODdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnwnAIwIhgPMjAyNDA1MTYyMjUxNDZaGA8yMDI0MDUxNzIyNTE0NlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fCcAgIBADAHAgEAAgIRpjAHAgEAAgIRbzAKAgUA # 6fHtggIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAI4pnLR+QYde5f+qZ1u4 # h+ow3MB7jtruhTIST+f8uLk1SBLm0niiqCuxdSUDAch40loud3DfBZ54rDiV7Hu2 # mhY8FHfZXI273lSdVTsgc2/aGRpFoT66b7nNxxQdgs/ULZYKHpGw6pPOhPyWkG6B # S8tSffAJU3wB7PyOmV+K12zQMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgo5gb24C12j0xKEa6CBTz+OjNY8RZ1EICgryK0I1CGWMwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIMUK/484Qzmn64FWwcwP/fhtuvZmZGOkRd8YJwNgaiE8 # MA0GCSqGSIb3DQEBCwUABIICAETSwBWvrKOCAeu3WYq2/rB/9ApNIh4Pvm1g3zNz # 4aibE1sk8tdnoYrhcA8CWJp8P0nbwDmyZj2/UE5ht8chH0VPzVzZLRGa+On5JSeO # CYrdPweEgp+5VcCqdhyaffchtPrlkvOy0CD7zSaAOpAIJMPufhbSoNQ8G5j63VQw # BMBaF6toKtS56cNPjyUgpRrJrsBhX6/uiv9Pdr1sUwh0SIIvpUN/+f2KQUJDnAxH # uQx2ExlTC+9g6a0U9XCHUDUBALokcNbySianrQmv6jaEvH3JZtn8Qr3klvvZiLO0 # TKOAQMBPm8hIwtYMpy7j43ZtsVAs8T9JKBB737gWNlxCoBq/6UKJgUrBIoS4jyuw # yO+s7h+8obJdZoHGLt5CCwjgc48WCxOxbPj0MGDGDUgLUL6GAOx68lwZd7iPIYqV # CNVWGNSlK3ffWayk/PQQcauv3nil+M2DyQ6EdPBni5lShmXJY3NE0pQrDKpnGObJ # cjGHsw2iLUkXoN/H4FLZLsqyH+DpSCHqAR1kHS0Rlk6PyB/PQ+po5YVmwgEq1WCp # Uxs6gUWxOH0GAxfM31dAIjPS58hZWwOBsXsdQRGHiLQ2vmOUOpeVgEJabciU4E/p # vVxEWnskGfysAE7h3CAm6zfOXnVtuK++LmJGtalW6JD4mHautihGwwF9D1Mec9R0 # dQlZ # SIG # End signature block
0
sample_19_0.ps1
# Copyright ?2010, Microsoft Corporation. All rights reserved. # You may use this code and information and create derivative works of it, # provided that the following conditions are met: # 1. This code and information and any derivative works may only be used for # troubleshooting a) Windows and b) products for Windows, in either case using # the Windows Troubleshooting Platform # 2. Any copies of this code and information # and any derivative works must retain the above copyright notice, this list of # conditions and the following disclaimer. # 3. THIS CODE AND INFORMATION IS PROVIDED ``AS IS'' WITHOUT WARRANTY OF ANY KIND, # WHETHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES # OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IF THIS CODE AND # INFORMATION IS USED OR MODIFIED, THE ENTIRE RISK OF USE OR RESULTS IN CONNECTION # WITH THE USE OF THIS CODE AND INFORMATION REMAINS WITH THE USER. #************************************************ #************************************************ # RegistryKeyToXML.ps1 # Version 1.0.0 # Date: 05-04-2011 # Author: Jeremy LaBorde - jlaborde@microsoft.com # Description: This script provides functionality for gathering a registry key in # XML format, including data entries and permissions, along with functions # to navigate said XML data # # Note: do NOT use this format for large keys ( ex. HKCR ), as this # script uses get-item, which is considerably slower then other # methods to dump the registry # #************************************************ ########################################################### # # Last Update: 5-3-2011 # Author: jlaborde # # Description: # convert from the type of entry returned in powershell for a registry entry to a REG_* type # # Usage: # Get-REG_Type <PS_type> # # Example: # Get-REG_Type "String" # returns "REG_SZ" # ########################################################### function Get-REG_Type( [string] $local:PS_Type ) { switch( $local:PS_Type ) { "String" { return "REG_SZ" } "Binary" { return "REG_BINARY" } "DWord" { return "REG_DWORD" } "QWord" { return "REG_QWORD" } "MultiString" { return "REG_MULTI_SZ" } "ExpandString" { return "REG_EXPAND_SZ" } } return "REG_SZ" } ########################################################### # # Last Update: 4-26-2011 # Author: jlaborde # # Description: # recusive function to dump a reg key & to an XML file # # Notes: # should always wrap data returned in an external XML tag for well-formatted XML # see Get-MSDTCRegistryKeysAsXML for an example in DC_MSDTC_Collector.ps1 # # Usage: # Get-RegistryKeyAsXML <path> <recurse subkeys> <tab characters to prepend> # # Example: # Get-RegistryKeyAsXML "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" $true "`t" # ########################################################### function Get-RegistryKeyAsXML( [string]$local:path, [bool]$local:recurse, [string]$local:tabs ) { #name / header output $local:lpath = "registry::" + $local:path $local:_retv = $local:tabs + "<RegistryKey Name=`"" + $local:path + "`" >`r`n" #check to see if we can open the key... if( Test-Path( $local:lpath ) ) { $local:regkey = Get-Item( $local:lpath ) #list the rights $local:perms = ((Get-Acl $local:lpath).Access) $local:_retv = $local:_retv + $local:tabs + "`t<Permissions>`r`n" foreach( $local:perm in $local:perms ) { $local:_retv = $local:_retv + $local:tabs + "`t`t<PermEntry ID=`"" foreach( $local:t1 in $local:perm ) { $local:_retv = $local:_retv + $local:t1.IdentityReference + "`">`r`n" $local:_retv = $local:_retv + $local:tabs + "`t`t`t<Type>" + $local:t1.AccessControlType + "</Type>`r`n" $local:_retv = $local:_retv + $local:tabs + "`t`t`t<Rights>" + $local:t1.RegistryRights + "</Rights>`r`n" } $local:_retv = $local:_retv + $local:tabs + "`t`t</PermEntry>`r`n" } $local:_retv = $local:_retv + $local:tabs + "`t</Permissions>`r`n" #if there is a default value, save it $local:_retv = $local:_retv + $local:tabs + "`t<Value>" $local:default = ($local:regkey).GetValue( "", $null ) if( $local:default -ne $null ) { $local:_retv = $local:_retv + $local:default } $local:_retv = $local:_retv + "</Value>`r`n" #save (Default) type ( which should always be REG_SZ... right? ) $local:regentries = ($local:regkey).GetValueNames( ) $local:_retv = $local:_retv + $local:tabs + "`t<Type>" # if a null value, just hardcode a REG_SZ if( $local:default -ne $null ) { $local:_retv = $local:_retv + (Get-REG_Type $($local:regkey.GetValueKind( "" )) ) } else { $local:_retv = $local:_retv + "REG_SZ" } $local:_retv = $local:_retv + "</Type>`r`n" #list any entries in this key $local:_retv = $local:_retv + $local:tabs + "`t<Entries>`r`n" if( $local:regentries -ne $null ) { foreach( $local:regentry in $local:regentries ) { if( $local:regentry -eq "" ) { continue;} $local:regvalue = (Get-ItemProperty $local:lpath $local:regentry).$local:regentry $local:_retv = $local:_retv + $local:tabs + "`t`t" + "<Entry Name=`"" + $local:regentry + "`">`r`n" $local:_retv = $local:_retv + $local:tabs + "`t`t" + "<Type>" + (Get-REG_Type $($regkey.GetValueKind( $local:regentry )) ) + "</Type>`r`n" $local:_retv = $local:_retv + $local:tabs + "`t`t`t" + "<Value>" + $local:regvalue + "</Value>`r`n" $local:_retv = $local:_retv + $local:tabs + "`t`t" + "</Entry>`r`n" } } $local:_retv = $local:_retv + $local:tabs + "`t</Entries>`r`n" #recurse subkeys if( $local:recurse -eq $true ) { $local:regsubkeys = Get-Item( $local:lpath + "\*" ) -ErrorAction SilentlyContinue if( $local:regsubkeys -ne $null ) { foreach( $local:subkey in $local:regsubkeys ) { $local:_retv = $local:_retv + (Get-RegistryKeyAsXML $local:subkey $local:recurse (($local:tabs + "`t")) ) } } } } else { return ($local:tabs + "<KeyNotFound>" + $local:path + "</KeyNotFound>`r`n") } $local:_retv = $local:_retv + $local:tabs + "</RegistryKey>`r`n" return $local:_retv } ########################################################### # # Last Update: 4-26-2011 # Author: jlaborde # # Description: # return the value from XML representation of a registry hive entry # # Usage: # Get-XMLRegistryEntryValue <XMLElement> <Entry Name> # # Example: # Get-XMLRegistryEntryValue $local:security "AccountName" # where $local:security == [XMLElement] set to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security" # ########################################################### function Get-XMLRegistryEntryValue( [System.Xml.XmlElement]$local:node, [string]$local:item ) { #null or the value $local:entry = $local:node.Entries.Entry | Where-Object { $_.Name -like $local:item } if( $local:entry -eq $null ) { return $null } return $local:entry.Value } ########################################################### # # Last Update: 5-3-2011 # Author: jlaborde # # Description: # return the type from XML representation of a registry hive entry # # Usage: # Get-XMLRegistryEntryType <XMLElement> <Entry Name> # # Example: # Get-XMLRegistryEntryType $local:security "AccountName" # where $local:security == [XMLElement] set to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security" # ########################################################### function Get-XMLRegistryEntryType( [System.Xml.XmlElement]$local:node, [string]$local:item ) { #null or the value $local:entry = $local:node.Entries.Entry | Where-Object { $_.Name -like $local:item } if( $local:entry -eq $null ) { return $null } return $local:entry.Type } ########################################################### # # Last Update: 4-26-2011 # Author: jlaborde # # Description: # return true or false from XML representation of a registry hive entry # # Usage: # Get-XMLRegistryEntryOnOrOff <XMLElement> <Entry Name> # # Example: # Get-XMLRegistryEntryOnOrOff $local:security "NetworkDtcAccess" # where $local:security == [XMLElement] set to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security" # ########################################################### function Get-XMLRegistryEntryOnOrOff( [System.Xml.XmlElement]$local:node, [string]$local:item ) { #0 or null == false, else true $local:value = Get-XMLRegistryEntryValue $local:node $local:item if( $local:value -eq $null -or $local:value -eq 0 ) { return $false } return $true } ########################################################### # # Last Update: 3-31-2012 # Author: jlaborde # # Description: # return true or false from XML representation of a registry hive entry to see if it exists # # Usage: # Get-XMLRegistryEntryExists <XMLElement> <Entry Name> # # Example: # Get-XMLRegistryEntryOnOrOff $local:security "NetworkDtcAccess" # where $local:security == [XMLElement] set to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security" # ########################################################### function Get-XMLRegistryEntryExists( [System.Xml.XmlElement]$local:node, [string]$local:item ) { #null == false, else true $local:value = Get-XMLRegistryEntryValue $local:node $local:item if( $local:value -eq $null ) { return $false } return $true } ########################################################### # # Last Update: 4-26-2011 # Author: jlaborde # # Description: # return the XML element representing the registry key # # Usage: # Get-XMLRegistryKey <XMLElement> <Full Key Name> # # Example: # Get-XMLRegistryKey $local:node "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security" # where $local:node == [XMLElement] set to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC" # ########################################################### function Get-XMLRegistryKey( [System.Xml.XmlElement]$local:node, [string]$local:item ) { #null or the XMLElement $local:entry = $local:node.RegistryKey | Where-Object { $_.Name -like $local:item } return $local:entry } ########################################################### # # Last Update: 4-27-2011 # Author: jlaborde # # Description: # find XML node /subkey based on presence of an inner subkey, possibly at a certain default value # # Usage: # Get-XMLRegistryKeyBasedOnSubkey [System.Xml.XmlElement]$local:node, [string]$local:subkeyname, [string]$local:subkeyvalue # # Example: # Get-XMLRegistryKeyBasedOnSubkey $local:node, "Description", "MSDTC" # where $local:node is set to HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CID & # we're looking for the subkey who contains a subkey name Description set to default value MSDTC # ########################################################### function Get-XMLRegistryKeyBasedOnSubkey( [System.Xml.XmlElement]$local:node, [string]$local:subkeyname, [string]$local:subkeyvalue ) { # loop through this node's subkeys foreach( $local:subnode in $local:node.RegistryKey ) { # find the subkey off the looping subkey $local:s2 = Get-XMLRegistryKey $local:subnode ($local:subnode.Name + "\" + $local:subkeyname) if( $local:s2 -ne $null ) { # if we don't care about the default value, return this key if( $local:subkeyvalue -eq $null -or $local:subkeyvalue -eq "" ) { return $local:subnode } # if we do care about the default value, make sure we have one and compare it if( $local:s2.Value -ne $null -and $local:s2.Value.CompareTo( $local:subkeyvalue ) -eq 0 ) { return $local:subnode } } } return $null } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAWvLqsFCkshbie # EmNZg2k09Aqq24y7L8xYjxwM6nlBdqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJoS # LBG0R63EK0J1YhHnbC8yJ+se6VPxOQiBD/Ph5nzIMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAnpY+CtoU46UvWY677bpo0DnU+9Z1fp3bSjjv # ccB0NBpynJhvV2KOF4kobADfCZqUhs4/U9MOcXQjxEcIZtcaRv0veMjQ48H/1BLx # Gqkuc62Z8jW+tsRMoYOsd90RvvOAJcmhudOTsEsWTqFL1q+mnkwrSuIWnd5pmUKN # 7KsEEjdrqJlKObsui/EMvgCk183c+Vjx82ZH0x5gSuhoqGPE70i1OZSTjmlLaqYN # wE5q7iyNjUjcmcoz2nwjtQdGkNTxzni+kLdcNd4byD6v/rcYAZ5AxX04u45/lzCv # Z/tBBKkgQE5l4ZGzp7gFkPIQrNw8YjbHo5wCn9YmK4iyYRN9jaGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCA1DPGU8X8KZcX8+9lc2Reh06oWAdbF7G4k # IMODSer1EAIGZutwxmXdGBMyMDI0MTAyODExNDA0Mi4xMTlaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF # WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP # AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF # s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX # ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL # Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN # gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m # r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB # BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp # vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr # OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI # +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP # Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri # LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi # mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV # liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ # dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L # tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u # EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US # LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq # 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu # 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100 # DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0 # MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA # AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b # zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC # K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga # wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46 # vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW # YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgRQkG3PPu8D7S/VBmCvSAjJWgy9qzIMdTVaXW9vgVCeUwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq # Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC # AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf # HyoaMA0GCSqGSIb3DQEBCwUABIICAGcKQ9ZaGU67hEiDZZtG7Ko9QNz6kd+7dRek # 9BFpDn5D48Th9WRXn6YIE/xFSrtKJ8MXSB2eqF4gyspUBlc9oRF0GhEIOFVYGgH8 # Ld3OHn95iON7GrNapRBTyDr8uqtiSdpB1wzMkBxbnWIRXhjnmFVP4nckxazLWxF2 # 6PeRIvZUCjWpq0Z6uVBEpovw1RVtxSSLn4+uOAbRjM6UMtfEq6VJuc/Cncr/3QB1 # J1KtOtVYe7+FHw3+Hg4e0M5+9BI11jREqvJGtstY8Kch3N1SIw4nYk/XJMZpWW69 # /bFGq80DJfjOP+Sfi/9zY6yZL9wIesJZIrqSnoCL0cEagjhK3xzd+AiVs5aQ0Ybz # cUiqEwdaVS3EU5/f185znM7qo5ldYO7hxgL6TX180Fym/jG+66hbb373tfZDYHDb # egPS/3EbwvKtdrnRm5B73oeMWH82iVcBtfhUR7IDbfPhwLNfb2+ZbpqMSSsw5k/s # +6SBV+kpRSrWvPASw0OvColjj8g6jPSLVF+Svlv/W1vj5lbXhWO06sIo7fjy4iot # zJYzQjP9Ksoq7yp/IlIiWB0af2xgB7uy80FwrGXGjVfwgjmsWL5zwgoS/B1fo9XV # BKVr4XDNb6jToHeMKqJOWmpFEjMed+XvH8ust6h1Pxb+wHfr0pILbLS8+X1zeWsh # eEannHaU # SIG # End signature block
0
2164.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Specify which Store to search within")] [ValidateNotNullOrEmpty()] [ValidateSet("iTunes","GooglePlay")] [string]$Store, [parameter(Mandatory=$true, HelpMessage="Specify the app name to search for within the Store")] [ValidateNotNullOrEmpty()] [ValidatePattern("^[A-Za-z\s]*$")] [string]$AppName, [parameter(Mandatory=$false, HelpMessage="Limit search results to the specified number (only valid for iTunes Store)")] [ValidateNotNullOrEmpty()] [string]$Limit = "1" ) Begin { switch ($Store) { "iTunes" { $StoreAppName = ($AppName -replace " ", "+").ToLower() $SearchURL = "https://itunes.apple.com/search?" $URL = $SearchURL + "term=$($StoreAppName)" + "&entity=software&limit=$($Limit)" } "GooglePlay" { $StoreAppName = ($AppName -replace " ", "%20").ToLower() $SearchURL = "https://play.google.com/store/search?" $URL = $SearchURL + "q=$($StoreAppName)&c=apps&hl=en" } } } Process { switch ($Store) { "iTunes" { $WebRequest = Invoke-WebRequest -Uri $URL $WebRequestObject = ConvertFrom-Json -InputObject $WebRequest if ($WebRequestObject.Results -ne $null) { foreach ($Object in $WebRequestObject.Results) { $PSObject = [PSCustomObject]@{ "AppName" = $Object.trackCensoredName "StoreLink" = $Object.trackViewUrl } Write-Output -InputObject $PSObject } } } "GooglePlay" { $WebRequest = Invoke-WebRequest -Uri $URL $WebRequestObject = $WebRequest.Links | Where-Object { $_.innerText -like "*$($AppName)*" } if ($WebRequestObject -ne $null) { foreach ($Object in $WebRequestObject) { $PSObject = [PSCustomObject]@{ "AppName" = $Object.innerText "StoreLink" = "https://play.google.com" + $Object.href } Write-Output -InputObject $PSObject } } } } }
0
sample_29_73.ps1
# # Module manifest for module 'OCI.PSModules.Emaildataplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Emaildataplane.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'cd44400e-be7f-4e12-bd2b-ec9ea86a7a0d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Emaildataplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Emaildataplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Invoke-OCIEmaildataplaneSubmitEmail' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Emaildataplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_59_5.ps1
# # Module manifest for module 'OCI.PSModules.Sch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Sch.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0e74736a-d7dc-4743-afef-d79b95248dee' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Sch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Sch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCISchServiceConnector', 'Get-OCISchConnectorPlugin', 'Get-OCISchConnectorPluginsList', 'Get-OCISchServiceConnector', 'Get-OCISchServiceConnectorsList', 'Get-OCISchWorkRequest', 'Get-OCISchWorkRequestErrorsList', 'Get-OCISchWorkRequestLogsList', 'Get-OCISchWorkRequestsList', 'Invoke-OCISchDeactivateServiceConnector', 'Move-OCISchServiceConnectorCompartment', 'New-OCISchServiceConnector', 'Remove-OCISchServiceConnector', 'Update-OCISchServiceConnector' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Sch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
3850.ps1
function Test-StorageAccount { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; $kind = 'BlobStorage' $accessTier = 'Cool' Write-Verbose "RGName: $rgname | Loc: $loc" New-AzResourceGroup -Name $rgname -Location $loc; $job = New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype -Kind $kind -AccessTier $accessTier -AsJob $job | Wait-Job $stos = Get-AzStorageAccount -ResourceGroupName $rgname; Retry-IfException { $global:sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; } Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual $accessTier $sto.AccessTier; $stotype = 'Standard_LRS'; $accessTier = 'Hot' Retry-IfException { $global:sto = Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Type $stotype -AccessTier $accessTier -Force } $sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual $accessTier $sto.AccessTier; $stotype = 'Standard_RAGRS'; $accessTier = 'Cool' Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Type $stotype -AccessTier $accessTier -Force $sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual $accessTier $sto.AccessTier; $stotype = 'Standard_GRS'; Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Type $stotype $sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual $accessTier $sto.AccessTier; $stokey1 = Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname; New-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname -KeyName key1; $stokey2 = Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname; Assert-AreNotEqual $stokey1[0].Value $stokey2[0].Value; Assert-AreEqual $stokey2[1].Value $stokey1[1].Value; New-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname -KeyName key2; $stokey3 = Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname; Assert-AreNotEqual $stokey1[0].Value $stokey2[0].Value; Assert-AreEqual $stokey3[0].Value $stokey2[0].Value; Assert-AreNotEqual $stokey2[1].Value $stokey3[1].Value; Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureStorageAccount { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_LRS'; $kind = 'StorageV2' $loc = Get-ProviderLocation ResourceManagement; New-AzResourceGroup -Name $rgname -Location $loc; $loc = Get-ProviderLocation ResourceManagement; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype -Kind $kind; $sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Retry-IfException { Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } } finally { Clean-ResourceGroup $rgname } } function Test-GetAzureStorageAccount { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; $kind = 'StorageV2' New-AzResourceGroup -Name $rgname -Location $loc; Write-Output ("Resource Group created") New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype ; Retry-IfException { $global:sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; } Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual $false $sto.EnableHttpsTrafficOnly; $stos = Get-AzStorageAccount -ResourceGroupName $rgname; Assert-AreEqual $stoname $stos[0].StorageAccountName; Assert-AreEqual $stotype $stos[0].Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $stos[0].Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual $false $sto.EnableHttpsTrafficOnly; Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } } function Test-SetAzureStorageAccount { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; $kind = 'Storage' New-AzResourceGroup -Name $rgname -Location $loc; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype -Kind $kind -EnableHttpsTrafficOnly $true -EnableHierarchicalNamespace $true; Retry-IfException { $global:sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; } Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual $true $sto.EnableHttpsTrafficOnly; Assert-AreEqual $true $sto.EnableHierarchicalNamespace; $stos = Get-AzStorageAccount -ResourceGroupName $rgname; Assert-AreEqual $stoname $stos[0].StorageAccountName; Assert-AreEqual $stotype $stos[0].Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $stos[0].Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual $true $sto.EnableHttpsTrafficOnly; Assert-AreEqual $true $sto.EnableHierarchicalNamespace; $stotype = 'Standard_LRS'; Retry-IfException { Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Type $stotype -EnableHttpsTrafficOnly $false } $stotype = 'Standard_RAGRS'; $sto = Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Type $stotype; Assert-AreEqual $true $sto.EnableHierarchicalNamespace; $sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual $false $sto.EnableHttpsTrafficOnly; Assert-AreEqual $true $sto.EnableHierarchicalNamespace; Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } } function Test-RemoveAzureStorageAccount { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; New-AzResourceGroup -Name $rgname -Location $loc; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; Retry-IfException { Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } } finally { Clean-ResourceGroup $rgname } } function Test-SetAzureRmStorageAccountKeySource { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; New-AzResourceGroup -Name $rgname -Location $loc; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; $sto = Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -StorageEncryption Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $true $sto.Encryption.Services.Blob.Enabled Assert-AreEqual $true $sto.Encryption.Services.File.Enabled Assert-AreEqual Microsoft.Storage $sto.Encryption.KeySource; Assert-AreEqual $null $sto.Encryption.Keyvaultproperties.Keyname; Assert-AreEqual $null $sto.Encryption.Keyvaultproperties.KeyVersion; Assert-AreEqual $null $sto.Encryption.Keyvaultproperties.KeyVaultUri; $sto = Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -StorageEncryption -AssignIdentity Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreNotEqual SystemAssigned $sto.Identity.Type Assert-AreEqual $true $sto.Encryption.Services.Blob.Enabled Assert-AreEqual $true $sto.Encryption.Services.File.Enabled Assert-AreEqual Microsoft.Storage $sto.Encryption.KeySource; Assert-AreEqual $null $sto.Encryption.Keyvaultproperties.Keyname; Assert-AreEqual $null $sto.Encryption.Keyvaultproperties.KeyVersion; Assert-AreEqual $null $sto.Encryption.Keyvaultproperties.KeyVaultUri; Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } } function Test-GetAzureStorageAccountKey { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; New-AzResourceGroup -Name $rgname -Location $loc; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; Retry-IfException { $global:stokeys = Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname; } Assert-AreNotEqual $stokeys[1].Value $stokeys[0].Value; Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureStorageAccountKey { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; New-AzResourceGroup -Name $rgname -Location $loc; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; Retry-IfException { $global:stokey1 = Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname; } New-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname -KeyName key1; $stokey2 = Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname; Assert-AreNotEqual $stokey1[0].Value $stokey2[0].Value; Assert-AreEqual $stokey1[1].Value $stokey2[1].Value; New-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname -KeyName key2; $stokey3 = Get-AzStorageAccountKey -ResourceGroupName $rgname -Name $stoname; Assert-AreNotEqual $stokey1[0].Value $stokey2[0].Value; Assert-AreEqual $stokey2[0].Value $stokey3[0].Value; Assert-AreNotEqual $stokey2[1].Value $stokey3[1].Value; Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } } function Test-PipingGetAccountToGetKey { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; New-AzResourceGroup -Name $rgname -Location $loc; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; Retry-IfException { $global:stokeys = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname | Get-AzStorageAccountKey -ResourceGroupName $rgname; } Assert-AreNotEqual $stokeys[0].Value $stokeys[1].Value; Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } } function Test-PipingToSetAzureRmCurrentStorageAccount { $rgname = Get-StorageManagementTestResourceName try { $stoname = 'sto' + $rgname $stotype = 'Standard_GRS' $loc = Get-ProviderLocation ResourceManagement New-AzResourceGroup -Name $rgname -Location $loc New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype Retry-IfException { $global:sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname } $global:sto | Set-AzCurrentStorageAccount $context = Get-AzContext $sub = New-Object -TypeName Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription -ArgumentList $context.Subscription Assert-AreEqual $stoname $sub.CurrentStorageAccountName $global:sto | Remove-AzStorageAccount -Force } finally { Clean-ResourceGroup $rgname } } function Test-SetAzureRmCurrentStorageAccount { $rgname = Get-StorageManagementTestResourceName try { $stoname = 'sto' + $rgname $stotype = 'Standard_GRS' $loc = Get-ProviderLocation ResourceManagement New-AzResourceGroup -Name $rgname -Location $loc New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype Retry-IfException { $global:sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname } Set-AzCurrentStorageAccount -ResourceGroupName $rgname -StorageAccountName $stoname $context = Get-AzContext Assert-AreEqual $stoname $context.Subscription.CurrentStorageAccountName $global:sto | Remove-AzStorageAccount -Force } finally { Clean-ResourceGroup $rgname } } function Test-NetworkRule { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_LRS'; $loc = Get-ProviderLocation ResourceManagement; $ip1 = "20.11.0.0/16"; $ip2 = "10.0.0.0/7"; $ip3 = "11.1.1.0/24"; $ip4 = "28.0.2.0/19"; New-AzResourceGroup -Name $rgname -Location $loc; $global:sto = New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype -NetworkRuleSet (@{bypass="Logging,Metrics,AzureServices"; ipRules=(@{IPAddressOrRange="$ip1";Action="allow"}, @{IPAddressOrRange="$ip2";Action="allow"}); defaultAction="Deny"}) $stoacl = (Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname).NetworkRuleSet Assert-AreEqual 7 $stoacl.Bypass; Assert-AreEqual Deny $stoacl.DefaultAction; Assert-AreEqual 2 $stoacl.IpRules.Count Assert-AreEqual $ip1 $stoacl.IpRules[0].IPAddressOrRange; Assert-AreEqual $ip2 $stoacl.IpRules[1].IPAddressOrRange; Assert-AreEqual 0 $stoacl.VirtualNetworkRules.Count $sto | Update-AzStorageAccountNetworkRuleSet -verbose -Bypass AzureServices,Metrics -DefaultAction Allow -IpRule (@{IPAddressOrRange="$ip3";Action="allow"},@{IPAddressOrRange="$ip4";Action="allow"}) $stoacl = $sto | Get-AzStorageAccountNetworkRuleSet $stoacliprule = $stoacl.IpRules Assert-AreEqual 6 $stoacl.Bypass; Assert-AreEqual Allow $stoacl.DefaultAction; Assert-AreEqual 2 $stoacl.IpRules.Count Assert-AreEqual $ip3 $stoacl.IpRules[0].IPAddressOrRange; Assert-AreEqual $ip4 $stoacl.IpRules[1].IPAddressOrRange; Assert-AreEqual 0 $stoacl.VirtualNetworkRules.Count $job = Remove-AzStorageAccountNetworkRule -ResourceGroupName $rgname -Name $stoname -IPAddressOrRange "$ip3" -AsJob $job | Wait-Job $stoacl = Get-AzStorageAccountNetworkRuleSet -ResourceGroupName $rgname -Name $stoname Assert-AreEqual 6 $stoacl.Bypass; Assert-AreEqual Allow $stoacl.DefaultAction; Assert-AreEqual 1 $stoacl.IpRules.Count Assert-AreEqual $ip4 $stoacl.IpRules[0].IPAddressOrRange; Assert-AreEqual 0 $stoacl.VirtualNetworkRules.Count $job = Update-AzStorageAccountNetworkRuleSet -ResourceGroupName $rgname -Name $stoname -IpRule @() -DefaultAction Deny -Bypass None -AsJob $job | Wait-Job $stoacl = Get-AzStorageAccountNetworkRuleSet -ResourceGroupName $rgname -Name $stoname Assert-AreEqual 0 $stoacl.Bypass; Assert-AreEqual Deny $stoacl.DefaultAction; Assert-AreEqual 0 $stoacl.IpRules.Count Assert-AreEqual 0 $stoacl.VirtualNetworkRules.Count foreach($iprule in $stoacliprule) { $job = Add-AzStorageAccountNetworkRule -ResourceGroupName $rgname -Name $stoname -IpRule $iprule -AsJob $job | Wait-Job } $stoacl = Get-AzStorageAccountNetworkRuleSet -ResourceGroupName $rgname -Name $stoname Assert-AreEqual 0 $stoacl.Bypass; Assert-AreEqual Deny $stoacl.DefaultAction; Assert-AreEqual 2 $stoacl.IpRules.Count Assert-AreEqual $ip3 $stoacl.IpRules[0].IPAddressOrRange; Assert-AreEqual $ip4 $stoacl.IpRules[1].IPAddressOrRange; Assert-AreEqual 0 $stoacl.VirtualNetworkRules.Count $job = Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -AsJob -NetworkRuleSet (@{bypass="AzureServices"; ipRules=(@{IPAddressOrRange="$ip1";Action="allow"}, @{IPAddressOrRange="$ip2";Action="allow"}); defaultAction="Allow"}) $job | Wait-Job $stoacl = Get-AzStorageAccountNetworkRuleSet -ResourceGroupName $rgname -Name $stoname Assert-AreEqual 4 $stoacl.Bypass; Assert-AreEqual Allow $stoacl.DefaultAction; Assert-AreEqual 2 $stoacl.IpRules.Count Assert-AreEqual $ip1 $stoacl.IpRules[0].IPAddressOrRange; Assert-AreEqual $ip2 $stoacl.IpRules[1].IPAddressOrRange; Assert-AreEqual 0 $stoacl.VirtualNetworkRules.Count $job = Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname -AsJob $job | Wait-Job } finally { Clean-ResourceGroup $rgname } } function Test-SetAzureStorageAccountStorageV2 { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; $kind = 'Storage' New-AzResourceGroup -Name $rgname -Location $loc; $loc = Get-ProviderLocation ResourceManagement; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype -Kind $kind; Retry-IfException { $global:sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; } Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; $kind = 'StorageV2' Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -UpgradeToStorageV2; $sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } } function Test-GetAzureStorageLocationUsage { $loc = Get-ProviderLocation_Stage ResourceManagement; $usage = Get-AzStorageUsage -Location $loc Assert-AreNotEqual 0 $usage.Limit; Assert-AreNotEqual 0 $usage.CurrentValue; } function Test-NewAzureStorageAccountFileStorage { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Premium_LRS'; $kind = 'FileStorage' $loc = Get-ProviderLocation ResourceManagement; New-AzResourceGroup -Name $rgname -Location $loc; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype -Kind $kind; $sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Retry-IfException { Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } } finally { Clean-ResourceGroup $rgname } } function Test-PipingNewUpdateAccount { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stoname2 = 'sto' + $rgname + '2'; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; New-AzResourceGroup -Name $rgname -Location $loc; $global:sto = New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; Retry-IfException { $global:sto2 = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname | New-AzStorageAccount -Name $stoname2 -skuName $stotype; } Assert-AreEqual $sto.ResourceGroupName $sto2.ResourceGroupName; Assert-AreEqual $sto.Location $sto2.Location; Assert-AreNotEqual $sto.StorageAccountName $sto2.StorageAccountName; Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname | set-AzStorageAccount -UpgradeToStorageV2 $global:sto = $sto | set-AzStorageAccount -EnableHttpsTrafficOnly $true Assert-AreEqual 'StorageV2' $sto.Kind; Assert-AreEqual $true $sto.EnableHttpsTrafficOnly; Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname | Remove-AzStorageAccount -Force; $sto2 | Remove-AzStorageAccount -Force; } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureStorageAccountBlockBlobStorage { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Premium_LRS'; $kind = 'BlockBlobStorage' $loc = Get-ProviderLocation ResourceManagement; New-AzureRmResourceGroup -Name $rgname -Location $loc; New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype -Kind $kind; $sto = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Retry-IfException { Remove-AzureRmStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } } finally { Clean-ResourceGroup $rgname } } function Test-NewSetAzStorageAccountFileAADDS { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_LRS'; $kind = 'StorageV2' $loc = Get-ProviderLocation ResourceManagement; New-AzureRmResourceGroup -Name $rgname -Location $loc; $loc = Get-ProviderLocation_Stage ResourceManagement; $sto = New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype -Kind $kind -EnableAzureActiveDirectoryDomainServicesForFile $true; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual 'AADDS' $sto.AzureFilesIdentityBasedAuth.DirectoryServiceOptions; $sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual 'AADDS' $sto.AzureFilesIdentityBasedAuth.DirectoryServiceOptions; $sto = Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -EnableAzureActiveDirectoryDomainServicesForFile $false Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual 'None' $sto.AzureFilesIdentityBasedAuth.DirectoryServiceOptions; $sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual 'None' $sto.AzureFilesIdentityBasedAuth.DirectoryServiceOptions; Retry-IfException { Remove-AzureRmStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } } finally { Clean-ResourceGroup $rgname } } function Test-StorageAccountManagementPolicy { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; $loc = Get-ProviderLocation ResourceManagement; $kind = 'StorageV2' New-AzureRmResourceGroup -Name $rgname -Location $loc; $loc = Get-ProviderLocation_Stage; New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype -Kind $kind; Retry-IfException { $global:sto = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname; } Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; $action1 = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction Delete -daysAfterModificationGreaterThan 100 $action1 = Add-AzStorageAccountManagementPolicyAction -InputObject $action1 -BaseBlobAction TierToArchive -daysAfterModificationGreaterThan 50 $action1 = Add-AzStorageAccountManagementPolicyAction -InputObject $action1 -BaseBlobAction TierToCool -daysAfterModificationGreaterThan 30 $action1 = Add-AzStorageAccountManagementPolicyAction -InputObject $action1 -SnapshotAction Delete -daysAfterCreationGreaterThan 100 $filter1 = New-AzStorageAccountManagementPolicyFilter -PrefixMatch ab,cd $rule1 = New-AzStorageAccountManagementPolicyRule -Name Test -Action $action1 -Filter $filter1 $action2 = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction Delete -daysAfterModificationGreaterThan 100 $filter2 = New-AzStorageAccountManagementPolicyFilter $rule2 = New-AzStorageAccountManagementPolicyRule -Name Test2 -Action $action2 -Filter $filter2 -Disabled $policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName $rgname -StorageAccountName $stoname -Rule $rule1, $rule2 Assert-AreEqual 2 $policy.Rules.Count Assert-AreEqual $rule1.Enabled $policy.Rules[0].Enabled Assert-AreEqual $rule1.Name $policy.Rules[0].Name Assert-AreEqual $rule1.Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan $policy.Rules[0].Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan Assert-AreEqual $rule1.Definition.Actions.BaseBlob.TierToArchive.DaysAfterModificationGreaterThan $policy.Rules[0].Definition.Actions.BaseBlob.TierToArchive.DaysAfterModificationGreaterThan Assert-AreEqual $rule1.Definition.Actions.BaseBlob.TierToCool.DaysAfterModificationGreaterThan $policy.Rules[0].Definition.Actions.BaseBlob.TierToCool.DaysAfterModificationGreaterThan Assert-AreEqual $rule1.Definition.Actions.Snapshot.Delete.DaysAfterCreationGreaterThan $policy.Rules[0].Definition.Actions.Snapshot.Delete.DaysAfterCreationGreaterThan Assert-AreEqual $rule1.Definition.Filters.BlobTypes[0] $policy.Rules[0].Definition.Filters.BlobTypes[0] Assert-AreEqual $rule1.Definition.Filters.PrefixMatch.Count $policy.Rules[0].Definition.Filters.PrefixMatch.Count Assert-AreEqual $rule1.Definition.Filters.PrefixMatch[0] $policy.Rules[0].Definition.Filters.PrefixMatch[0] Assert-AreEqual $rule1.Definition.Filters.PrefixMatch[1] $policy.Rules[0].Definition.Filters.PrefixMatch[1] Assert-AreEqual $rule2.Enabled $policy.Rules[1].Enabled Assert-AreEqual $rule2.Name $policy.Rules[1].Name Assert-AreEqual $rule2.Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan $policy.Rules[1].Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan Assert-AreEqual $rule2.Definition.Actions.BaseBlob.TierToArchive $policy.Rules[1].Definition.Actions.BaseBlob.TierToArchive Assert-AreEqual $rule2.Definition.Actions.BaseBlob.TierToCool $policy.Rules[1].Definition.Actions.BaseBlob.TierToCool Assert-AreEqual $rule2.Definition.Actions.Snapshot $policy.Rules[1].Definition.Actions.Snapshot Assert-AreEqual $rule2.Definition.Filters.BlobTypes[0] $policy.Rules[1].Definition.Filters.BlobTypes[0] Assert-AreEqual $rule2.Definition.Filters.PrefixMatch $policy.Rules[1].Definition.Filters.PrefixMatch $policy = Get-AzStorageAccountManagementPolicy -ResourceGroupName $rgname -StorageAccountName $stoname Assert-AreEqual 2 $policy.Rules.Count Assert-AreEqual $rule1.Enabled $policy.Rules[0].Enabled Assert-AreEqual $rule1.Name $policy.Rules[0].Name Assert-AreEqual $rule1.Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan $policy.Rules[0].Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan Assert-AreEqual $rule1.Definition.Actions.BaseBlob.TierToArchive.DaysAfterModificationGreaterThan $policy.Rules[0].Definition.Actions.BaseBlob.TierToArchive.DaysAfterModificationGreaterThan Assert-AreEqual $rule1.Definition.Actions.BaseBlob.TierToCool.DaysAfterModificationGreaterThan $policy.Rules[0].Definition.Actions.BaseBlob.TierToCool.DaysAfterModificationGreaterThan Assert-AreEqual $rule1.Definition.Actions.Snapshot.Delete.DaysAfterCreationGreaterThan $policy.Rules[0].Definition.Actions.Snapshot.Delete.DaysAfterCreationGreaterThan Assert-AreEqual $rule1.Definition.Filters.BlobTypes[0] $policy.Rules[0].Definition.Filters.BlobTypes[0] Assert-AreEqual $rule1.Definition.Filters.PrefixMatch.Count $policy.Rules[0].Definition.Filters.PrefixMatch.Count Assert-AreEqual $rule1.Definition.Filters.PrefixMatch[0] $policy.Rules[0].Definition.Filters.PrefixMatch[0] Assert-AreEqual $rule1.Definition.Filters.PrefixMatch[1] $policy.Rules[0].Definition.Filters.PrefixMatch[1] Assert-AreEqual $rule2.Enabled $policy.Rules[1].Enabled Assert-AreEqual $rule2.Name $policy.Rules[1].Name Assert-AreEqual $rule2.Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan $policy.Rules[1].Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan Assert-AreEqual $rule2.Definition.Actions.BaseBlob.TierToArchive $policy.Rules[1].Definition.Actions.BaseBlob.TierToArchive Assert-AreEqual $rule2.Definition.Actions.BaseBlob.TierToCool $policy.Rules[1].Definition.Actions.BaseBlob.TierToCool Assert-AreEqual $rule2.Definition.Actions.Snapshot $policy.Rules[1].Definition.Actions.Snapshot Assert-AreEqual $rule2.Definition.Filters.BlobTypes[0] $policy.Rules[1].Definition.Filters.BlobTypes[0] Assert-AreEqual $rule2.Definition.Filters.PrefixMatch $policy.Rules[1].Definition.Filters.PrefixMatch Remove-AzStorageAccountManagementPolicy -ResourceGroupName $rgname -StorageAccountName $stoname $policy| Set-AzStorageAccountManagementPolicy -ResourceGroupName $rgname -StorageAccountName $stoname $policy = Get-AzStorageAccountManagementPolicy -ResourceGroupName $rgname -StorageAccountName $stoname Assert-AreEqual 2 $policy.Rules.Count Assert-AreEqual $rule1.Enabled $policy.Rules[0].Enabled Assert-AreEqual $rule1.Name $policy.Rules[0].Name Assert-AreEqual $rule1.Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan $policy.Rules[0].Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan Assert-AreEqual $rule1.Definition.Actions.BaseBlob.TierToArchive.DaysAfterModificationGreaterThan $policy.Rules[0].Definition.Actions.BaseBlob.TierToArchive.DaysAfterModificationGreaterThan Assert-AreEqual $rule1.Definition.Actions.BaseBlob.TierToCool.DaysAfterModificationGreaterThan $policy.Rules[0].Definition.Actions.BaseBlob.TierToCool.DaysAfterModificationGreaterThan Assert-AreEqual $rule1.Definition.Actions.Snapshot.Delete.DaysAfterCreationGreaterThan $policy.Rules[0].Definition.Actions.Snapshot.Delete.DaysAfterCreationGreaterThan Assert-AreEqual $rule1.Definition.Filters.BlobTypes[0] $policy.Rules[0].Definition.Filters.BlobTypes[0] Assert-AreEqual $rule1.Definition.Filters.PrefixMatch.Count $policy.Rules[0].Definition.Filters.PrefixMatch.Count Assert-AreEqual $rule1.Definition.Filters.PrefixMatch[0] $policy.Rules[0].Definition.Filters.PrefixMatch[0] Assert-AreEqual $rule1.Definition.Filters.PrefixMatch[1] $policy.Rules[0].Definition.Filters.PrefixMatch[1] Assert-AreEqual $rule2.Enabled $policy.Rules[1].Enabled Assert-AreEqual $rule2.Name $policy.Rules[1].Name Assert-AreEqual $rule2.Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan $policy.Rules[1].Definition.Actions.BaseBlob.Delete.DaysAfterModificationGreaterThan Assert-AreEqual $rule2.Definition.Actions.BaseBlob.TierToArchive $policy.Rules[1].Definition.Actions.BaseBlob.TierToArchive Assert-AreEqual $rule2.Definition.Actions.BaseBlob.TierToCool $policy.Rules[1].Definition.Actions.BaseBlob.TierToCool Assert-AreEqual $rule2.Definition.Actions.Snapshot $policy.Rules[1].Definition.Actions.Snapshot Assert-AreEqual $rule2.Definition.Filters.BlobTypes[0] $policy.Rules[1].Definition.Filters.BlobTypes[0] Assert-AreEqual $rule2.Definition.Filters.PrefixMatch $policy.Rules[1].Definition.Filters.PrefixMatch $policy| Remove-AzStorageAccountManagementPolicy Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } } function Test-NewSetAzureStorageAccount_LargeFileShare { $rgname = Get-StorageManagementTestResourceName; try { $stoname = 'sto' + $rgname; $stotype = 'Standard_LRS'; $loc = Get-ProviderLocation_Canary ResourceManagement; $kind = 'StorageV2' New-AzResourceGroup -Name $rgname -Location $loc; Write-Output ("Resource Group created") New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -SkuName $stotype -EnableLargeFileShare; Retry-IfException { $global:sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; } Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual "Enabled" $sto.LargeFileSharesState; Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -EnableLargeFileShare -SkuName $stotype -UpgradeToStorageV2; Retry-IfException { $global:sto = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; } Assert-AreEqual $stoname $sto.StorageAccountName; Assert-AreEqual $stotype $sto.Sku.Name; Assert-AreEqual $loc.ToLower().Replace(" ", "") $sto.Location; Assert-AreEqual $kind $sto.Kind; Assert-AreEqual "Enabled" $sto.LargeFileSharesState; Remove-AzStorageAccount -Force -ResourceGroupName $rgname -Name $stoname; } finally { Clean-ResourceGroup $rgname } }
0
sample_51_41.ps1
# Localized 06/28/2023 07:58 AM (GMT) 303:7.0.30723 cl_localizationdata.psd1 ConvertFrom-StringData @' ###PSLOC Troubleshoot_Title=Solución de problemas Troubleshoot_DetectDVDDevice=Comprobando dispositivo de DVD... Troubleshoot_DetectDVDvideoDecoder=Comprobando descodificador de vídeo para la reproducción de DVD... Troubleshoot_DetectDVDAudioDecoder=Comprobando descodificador de audio para la reproducción de DVD... Resolution_Title=Resolución CDRomDeviceName=Nombre PnPDeviceID=Id. Status=Estado Report_Name_CDRomDeviceInformation=Unidades de DVD o CD-ROM Report_Description_CDRomDeviceInformation=Información de unidades de DVD o CD-ROM ###PSLOC '@
0
1097.ps1
function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ShouldFindExistingSection { Assert-True (Test-IisConfigurationSection -SectionPath 'system.webServer/cgi') } function Test-ShouldNotFindMissingSection { $error.Clear() Assert-False (Test-IisConfigurationSection -SectionPath 'system.webServer/u2') Assert-Equal 2 $error.Count }
0
4474.ps1
$script:dscResourceFriendlyName = 'PSModule' $script:dcsResourceName = "MSFT_$($script:dscResourceFriendlyName)" $configurationFile = Join-Path -Path $PSScriptRoot -ChildPath "$($script:dcsResourceName).config.ps1" . $configurationFile Describe "$($script:dcsResourceName)_Integration" { $configurationName = "$($script:dcsResourceName)_SetPackageSourceAsNotTrusted_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } } $configurationName = "$($script:dcsResourceName)_InstallWithTrusted_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { $script:currentConfiguration = Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { $resourceCurrentState = $script:currentConfiguration | Where-Object -FilterScript { $_.ConfigurationName -eq $configurationName ` -and $_.ResourceId -eq "[$($script:dscResourceFriendlyName)]Integration_Test" } $resourceCurrentState.Ensure | Should -Be 'Present' $resourceCurrentState.Name | Should -Be $ConfigurationData.AllNodes.Module1_Name $resourceCurrentState.InstallationPolicy | Should -Be 'Untrusted' } It 'Should return $true when Test-DscConfiguration is run' { Test-DscConfiguration -Verbose | Should -Be $true } } $configurationName = "$($script:dcsResourceName)_UninstallModule1_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { $script:currentConfiguration = Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { $resourceCurrentState = $script:currentConfiguration | Where-Object -FilterScript { $_.ConfigurationName -eq $configurationName ` -and $_.ResourceId -eq "[$($script:dscResourceFriendlyName)]Integration_Test" } $resourceCurrentState.Ensure | Should -Be 'Absent' $resourceCurrentState.Name | Should -Be $ConfigurationData.AllNodes.Module1_Name } It 'Should return $true when Test-DscConfiguration is run' { Test-DscConfiguration -Verbose | Should -Be $true } } $configurationName = "$($script:dcsResourceName)_SetPackageSourceAsTrusted_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } } $configurationName = "$($script:dcsResourceName)_DefaultParameters_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { $script:currentConfiguration = Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { $resourceCurrentState = $script:currentConfiguration | Where-Object -FilterScript { $_.ConfigurationName -eq $configurationName ` -and $_.ResourceId -eq "[$($script:dscResourceFriendlyName)]Integration_Test" } $resourceCurrentState.Ensure | Should -Be 'Present' $resourceCurrentState.Name | Should -Be $ConfigurationData.AllNodes.Module1_Name } It 'Should return $true when Test-DscConfiguration is run' { Test-DscConfiguration -Verbose | Should -Be $true } } $configurationName = "$($script:dcsResourceName)_UsingAllowClobber_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { $script:currentConfiguration = Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { $resourceCurrentState = $script:currentConfiguration | Where-Object -FilterScript { $_.ConfigurationName -eq $configurationName ` -and $_.ResourceId -eq "[$($script:dscResourceFriendlyName)]Integration_Test" } $resourceCurrentState.Ensure | Should -Be 'Present' $resourceCurrentState.Name | Should -Be $ConfigurationData.AllNodes.Module2_Name } It 'Should return $true when Test-DscConfiguration is run' { Test-DscConfiguration -Verbose | Should -Be $true } } $configurationName = "$($script:dcsResourceName)_UninstallModule2_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { $script:currentConfiguration = Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { $resourceCurrentState = $script:currentConfiguration | Where-Object -FilterScript { $_.ConfigurationName -eq $configurationName ` -and $_.ResourceId -eq "[$($script:dscResourceFriendlyName)]Integration_Test" } $resourceCurrentState.Ensure | Should -Be 'Absent' $resourceCurrentState.Name | Should -Be $ConfigurationData.AllNodes.Module2_Name } It 'Should return $true when Test-DscConfiguration is run' { Test-DscConfiguration -Verbose | Should -Be $true } } $configurationName = "$($script:dcsResourceName)_RequiredVersion_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { $script:currentConfiguration = Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { $resourceCurrentState = $script:currentConfiguration | Where-Object -FilterScript { $_.ConfigurationName -eq $configurationName ` -and $_.ResourceId -eq "[$($script:dscResourceFriendlyName)]Integration_Test" } $resourceCurrentState.Ensure | Should -Be 'Present' $resourceCurrentState.Name | Should -Be $ConfigurationData.AllNodes.Module2_Name $resourceCurrentState.InstalledVersion | Should -Be $ConfigurationData.AllNodes.Module2_RequiredVersion } It 'Should return $true when Test-DscConfiguration is run' { Test-DscConfiguration -Verbose | Should -Be $true } } $configurationName = "$($script:dcsResourceName)_VersionRange_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { $script:currentConfiguration = Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { $resourceCurrentState = $script:currentConfiguration | Where-Object -FilterScript { $_.ConfigurationName -eq $configurationName ` -and $_.ResourceId -eq "[$($script:dscResourceFriendlyName)]Integration_Test" } $resourceCurrentState.Ensure | Should -Be 'Present' $resourceCurrentState.Name | Should -Be $ConfigurationData.AllNodes.Module2_Name $resourceCurrentState.InstalledVersion | Should -Be $ConfigurationData.AllNodes.Module2_RequiredVersion } It 'Should return $true when Test-DscConfiguration is run' { Test-DscConfiguration -Verbose | Should -Be $true } } $configurationName = "$($script:dcsResourceName)_UninstallModule2_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { $script:currentConfiguration = Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { $resourceCurrentState = $script:currentConfiguration | Where-Object -FilterScript { $_.ConfigurationName -eq $configurationName ` -and $_.ResourceId -eq "[$($script:dscResourceFriendlyName)]Integration_Test" } $resourceCurrentState.Ensure | Should -Be 'Absent' $resourceCurrentState.Name | Should -Be $ConfigurationData.AllNodes.Module2_Name } It 'Should return $true when Test-DscConfiguration is run' { Test-DscConfiguration -Verbose | Should -Be $true } } $configurationName = "$($script:dcsResourceName)_VersionRange_Config" Context ('When using configuration {0}' -f $configurationName) { It 'Should compile and apply the MOF without throwing' { { $configurationParameters = @{ OutputPath = $TestDrive ConfigurationData = $ConfigurationData } & $configurationName @configurationParameters $startDscConfigurationParameters = @{ Path = $TestDrive ComputerName = 'localhost' Wait = $true Verbose = $true Force = $true ErrorAction = 'Stop' } Start-DscConfiguration @startDscConfigurationParameters } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { $script:currentConfiguration = Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { $resourceCurrentState = $script:currentConfiguration | Where-Object -FilterScript { $_.ConfigurationName -eq $configurationName ` -and $_.ResourceId -eq "[$($script:dscResourceFriendlyName)]Integration_Test" } $resourceCurrentState.Ensure | Should -Be 'Present' $resourceCurrentState.Name | Should -Be $ConfigurationData.AllNodes.Module2_Name $resourceCurrentState.InstalledVersion | Should -Be $ConfigurationData.AllNodes.Module2_MaximumVersion } It 'Should return $true when Test-DscConfiguration is run' { Test-DscConfiguration -Verbose | Should -Be $true } } }
0
Delete-LocalAccount.ps1
<# .SYNOPSIS A script that removes a local user account .DESCRIPTION This script searches ActiveDirectory for computer accounts, for each computer account it removes the specified user account. .PARAMETER ADSPath The ActiveDirectory namespace to search for computers .PARAMETER UserName The username to remove from each computer .EXAMPLE .\\Delete-LocalAccount.ps1 -ADSPath "LDAP://OU=workstations,DC=company,DC=com" -LocalUser delete ` | Export-Csv .\\sample.csv -NoTypeInformation Description ----------- This example shows all parameters and piping the output to export-csv .NOTES This script requires the ComputerManagement and ActiveDirectoryManagement libraries The script registers it's name as an event-source on the source computer and writes events to the application log. This script assumes the includes folder is a subfolder of the current directory, if that is not the case you may receive a FullyQualifiedErrorId : CommandNotFoundException when attempting to dot-source in the libraries. .LINK http://scripts.patton-tech.com/wiki/PowerShell/Production/DeleteLocalAccount .LINK http://scripts.patton-tech.com/wiki/PowerShell/ComputerManagemenet .LINK http://scripts.patton-tech.com/wiki/PowerShell/ActiveDirectoryManagement #> Param ( [Parameter(Mandatory=$true)] [string]$ADSPath, [Parameter(Mandatory=$true)] [string]$LocalUser ) Begin { $ScriptName = $MyInvocation.MyCommand.ToString() $LogName = "Application" $ScriptPath = $MyInvocation.MyCommand.Path $Username = $env:USERDOMAIN + "\\" + $env:USERNAME New-EventLog -Source $ScriptName -LogName $LogName -ErrorAction SilentlyContinue $Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nStarted: " + (Get-Date).toString() Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message . .\\includes\\ComputerManagement.ps1 . .\\includes\\ActiveDirectoryManagement.ps1 } Process { $Workstations = Get-ADObjects -ADSPath $ADSPath $Jobs = @() foreach ($Workstation in $Workstations) { [string]$ThisWorkstation = $Workstation.Properties.name [string]$RetVal = Remove-LocalUser -ComputerName $Workstation.Properties.name -UserName $LocalUser $ThisJob = New-Object PSobject Add-Member -InputObject $ThisJob -MemberType NoteProperty -Name "ComputerName" -Value $ThisWorkstation Add-Member -InputObject $ThisJob -MemberType NoteProperty -Name "UserName" -Value $LocalUser Add-Member -InputObject $ThisJob -MemberType NoteProperty -Name "Status" -Value $RetVal.Trim() $Jobs += $ThisJob $ThisJob } $Message = [system.string]::Join("`n",($Jobs)) Write-EventLog -LogName $LogName -Source $ScriptName -EventId "101" -EntryType "Information" -Message $Message } End { $Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nFinished: " + (Get-Date).toString() Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message }
0
sample_62_42.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. <# .Synopsis Group Policy tools use administrative template files (.admx, .adml) to populate policy settings in the user interface. This allows administrators to manage registry-based policy settings. This script installes PowerShell Core Administrative Templates for Windows. .Notes The PowerShellCoreExecutionPolicy.admx and PowerShellCoreExecutionPolicy.adml files are expected to be at the location specified by the Path parameter with default value of the location of this script. #> [CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [string] $Path = $PSScriptRoot ) Set-StrictMode -Version 3.0 $ErrorActionPreference = 'Stop' function Test-Elevated { [CmdletBinding()] [OutputType([bool])] Param() # if the current Powershell session was called with administrator privileges, # the Administrator Group's well-known SID will show up in the Groups for the current identity. # Note that the SID won't show up unless the process is elevated. return (([Security.Principal.WindowsIdentity]::GetCurrent()).Groups -contains "S-1-5-32-544") } $IsWindowsOs = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) -or $IsWindows if (-not $IsWindowsOs) { throw 'This script must be run on Windows.' } if (-not (Test-Elevated)) { throw 'This script must be run from an elevated process.' } if ([System.Management.Automation.Platform]::IsNanoServer) { throw 'Group policy definitions are not supported on Nano Server.' } $admxName = 'PowerShellCoreExecutionPolicy.admx' $admlName = 'PowerShellCoreExecutionPolicy.adml' $admx = Get-Item -Path (Join-Path -Path $Path -ChildPath $admxName) $adml = Get-Item -Path (Join-Path -Path $Path -ChildPath $admlName) $admxTargetPath = Join-Path -Path $env:WINDIR -ChildPath "PolicyDefinitions" $admlTargetPath = Join-Path -Path $admxTargetPath -ChildPath "en-US" $files = @($admx, $adml) foreach ($file in $files) { if (-not (Test-Path -Path $file)) { throw "Could not find $($file.Name) at $Path" } } Write-Verbose "Copying $admx to $admxTargetPath" Copy-Item -Path $admx -Destination $admxTargetPath -Force $admxTargetFullPath = Join-Path -Path $admxTargetPath -ChildPath $admxName if (Test-Path -Path $admxTargetFullPath) { Write-Verbose "$admxName was installed successfully" } else { Write-Error "Could not install $admxName" } Write-Verbose "Copying $adml to $admlTargetPath" Copy-Item -Path $adml -Destination $admlTargetPath -Force $admlTargetFullPath = Join-Path -Path $admlTargetPath -ChildPath $admlName if (Test-Path -Path $admlTargetFullPath) { Write-Verbose "$admlName was installed successfully" } else { Write-Error "Could not install $admlName" } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJ90/Icr8AC0PX # PztF6dyoFT+ucLEEg+WYsxQzIJpS/KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIARp # rUuNhtpil9vE/G9ZX3FLF/w3czFFxBwWmQqTagvjMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAMSqkASF3uhPnw6SuFRSPjkcyCT1FXcyY8mCb # t3caGD4arA9JJGQQNWtUjfMh55bb34W9nIlzZFshdM7rytsoVJtX7gLLnmKGo0M+ # x0HZwLWgJ2LDO2CMJZtqF58+5K600stAKG1JhykMhZVFPdMlKfJy/oPIIsY0sOIt # Co8saVHfuDhnXIt59GJ8KWW2arnzFwyyJKJT0kiIET2ZQelqPp6rEiZYlKnKicDm # BoIvrz7cUILq/P4Oe6T62/B7ghnC0wxy0XeJCPwptz8WtSLt7S0fRbiGQRu8SDBO # KKXpLPzaLfCgY82Kx7Ha6I8ffrFo6aSeTo1AQIdVJpI1/0p3mqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAr1943bh/c+yRkv12Bc1zb6u290jeHmClh # mRvDx7cDEgIGZkZGrqV1GBMyMDI0MDYxNzIyMTQyOC4wNjFaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB # AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv # QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed # zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv # 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY # cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT # EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ # UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7 # b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD # oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe # h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69 # mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2 # t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx # BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X # pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t # aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t # uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM # iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw # psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL # zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR # J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB # 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX # WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV # PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE # K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hrywDAi # GA8yMDI0MDYxNzE3MzcwNFoYDzIwMjQwNjE4MTczNzA0WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqGvLAAgEAMAcCAQACAgF1MAcCAQACAhNLMAoCBQDqHERAAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAJ1eAqlPiHGpwnxBXrClAWpAmr+ # kRbR82PCeyaVF0f60L1GYFkOhqYu30i9UTIvp046gCdXFh1Uy1Cm82Wm52t8fd06 # c8GM/HqfnLlNfOwnYTHtk5NA9pge5Iy3eZmse//V6qFT0iqWPwjQhwe3ZuuNRXbP # RC61gFMvhbRJY8DDcdzwJi0uGFtNSc9iL5Ok7B+eryXmczO924oq+eSct2rB8YmD # 2C6wjqJFoPZRRsxR38/TsW2zYoCQZjjE3wDXBZH1mX1ZJgMHY2eruJGya9y/DLli # zcGUOuS8sROTUXUVz9UcvaHc7YDGL+JUrsDVv5avc3gqqR5edlvvBG6NYE0xggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+ # MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDMfc8ZXfklHO7Bzvg1HUkHBgEV # 40Ve1khTWr8PC3KuAzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0u # MVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgd1orjL9g # TJS8HYILm61dqtHwhC4Yw7WbOn59a6wVpQwwDQYJKoZIhvcNAQELBQAEggIAqNFz # M+CJ/bepTEgm8bZg8sGcKCGbfH/2dTPKfvJqpePSOSgzEMciktk2Ijhd4wPIMvSq # 6kZtZ0rqJsHrnpT0g8eCaVPSal8G3AFBSodVJhNobIpG8rcjVofYkaGFKgCmi+Ht # mY7pDsFLmQOI5vMRzqBQnWWuNYfpIFAqJL9jCpQi++ZGI+i6etLFjHiQS7qnY2ZI # c6fVSqDbbTyFsQxQ79ILZZA9MXKRTloPihWKx3IV6rUeGemUt6bdggveyQk9R1Wr # Bkg/kKWImnH37jKMvr90kpxffsaAbu3Woz23lxx841ihipzIBEw6oHzgRmCCkHQj # ScO88SMCOMhW/weEKFywutnEdErnnauphSJ4OhqOOPqqR+xG81FJCyBiXjEiCQi0 # gSShEhrA8xVfUSFDdlYorwT7ttp8rqfIAhR+ibjtWDDaExx0AOtsy2krAa/zNxoY # lmoxgJji3O1W6eIj9mHuW4/OhvaOUqSIkh+Ymq1mYhILxqYGiaijtJ1rXOra3gFP # LJ+53geghyfoayiQPa8pGzM3P0U7uYIeVnMfHP78UTXvHKFxdXyhk2OOAbMVACxo # vgvt0xCSVGzYPmLFe3f/RTytI+C2rneLUykndvpfaQ076XftF6l6wzcSHrFJ67lj # 6i6sLso46PpND7NkTfK+UCTiKeaL7pSAFqhoHZw= # SIG # End signature block
0
sample_66_67.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Lists key credentials and password credentials for an service principal. .Description Lists key credentials and password credentials for an service principal. .Link https://learn.microsoft.com/powershell/module/az.resources/get-azadspcredential #> function Get-AzADSpCredential { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Models.ApiV10.IMicrosoftGraphKeyCredential], [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Models.ApiV10.IMicrosoftGraphPasswordCredential])] [CmdletBinding(DefaultParameterSetName='ObjectIdParameterSet', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Alias("Get-AzADServicePrincipalCredential")] param( [Parameter(ParameterSetName='ObjectIdParameterSet', Mandatory, HelpMessage = "The object Id of service principal.")] [Alias('Id')] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Body')] [System.String] ${ObjectId}, [Parameter(ParameterSetName='SPNParameterSet', Mandatory, HelpMessage = "The service principal name.")] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Body')] [System.String] ${ServicePrincipalName}, [Parameter(ParameterSetName='DisplayNameParameterSet', Mandatory, HelpMessage = "Display name of the service principal.")] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Body')] [System.String] ${DisplayName}, [Parameter(ParameterSetName='SPNObjectParameterSet', Mandatory, ValueFromPipeline,HelpMessage = "The service principal object, could be used as pipeline input.")] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Models.ApiV10.IMicrosoftGraphServicePrincipal] ${ServicePrincipalObject}, [Parameter()] [Alias("AzContext", "AzureRmContext", "AzureCredential")] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { if ($PSBoundParameters['ServicePrincipalObject']) { $PSBoundParameters['ObjectId'] = $PSBoundParameters['ServicePrincipalObject'] $null = $PSBoundParameters.Remove('ServicePrincipalObject') } $sp = Get-AzADServicePrincipal @PSBoundParameters if ($sp.KeyCredentials) { $PSCmdlet.WriteObject($sp.KeyCredentials, $true) } if ($sp.PasswordCredentials) { $PSCmdlet.WriteObject($sp.PasswordCredentials, $true) } } } # SIG # Begin signature block # MIIn0gYJKoZIhvcNAQcCoIInwzCCJ78CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBGmyD9GSN9cvfe # wUZ0G85OUJbQ/lz9Z2bfzNNAIqDhGqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaMwghmfAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAgm # 5vlVz0XVM9KJtwpQNTbV2VzMgb96wdDEHL5t/MUvMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA5+Pqa2W4MX47L8ZGw0qJI38HF3wavCCQ680G # ZOIiA5q4Ggp9XhQKxf+zRjWGVY4OmeUZ99X3RB8uBGyXAfUkWTqOCDiTNnDj4WNc # Y0lBf2/50x8yModgWndqekec0mJQlhvzGd8pyxXvoPyDJ7mZz/fCMIO/tiRrxU6S # h5wDM6hW6C+kYEXKwpFKLAEI65nJF8/tfR1NAyey6jzB5FXGr3VTbi7Opjf4CYzC # SLxqOyK7s5YekZzN6DUp/ajwvMQPvpPiYXhtkRYnhecJV/4wi9caSMGguPV+Gi6F # qItlnp00Og+hWV05xYRBBHzk3M/GBmrmPMMeFaYwaMN7EfO8Z6GCFy0wghcpBgor # BgEEAYI3AwMBMYIXGTCCFxUGCSqGSIb3DQEHAqCCFwYwghcCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB+CJbyWrJGQP2JyQj1Mlq8/bVnztrWDy5u # 5+CvtWplZwIGZpe+fcngGBMyMDI0MDczMTA3MDA0Mi41NzNaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRfDCCBycwggUPoAMCAQICEzMAAAHj372b # mhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6k # DWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1N # EXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35 # fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/ # jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQB # P3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2Q # Vd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVs # bH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/c # Mmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIo # jl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ # 3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpb # udALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk1 # 93mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0 # sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlX # JAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiL # iHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ # 7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jms # CwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7es # DQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnq # zkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub # 0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy # 823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtgwggJBAgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE # 7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOpUB40wIhgPMjAyNDA3MzEwODQ1MDFaGA8yMDI0MDgw # MTA4NDUwMVoweDA+BgorBgEEAYRZCgQBMTAwLjAKAgUA6lQHjQIBADALAgEAAgMA # /x4CAf8wBwIBAAICE6IwCgIFAOpVWQ0CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYK # KwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUF # AAOBgQA7WwOU6+K0jG3+8JyBZJCusVWG9GqMUmWio094c02znIUntHNKDAkq+rEm # 7uJM8BcG0UtGqUcpnhpic9pk1ijNofhHAEJQFf3d6ZlyMDP+9Vkkki/V5sXDOIBF # Woz2h9tfkPlcKiudfakw+0oQ4yU2GZygVCJoNKBFtzebMUs7HzGCBA0wggQJAgEB # MIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9m5ocaIMi # AAEAAAHjMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN # AQkQAQQwLwYJKoZIhvcNAQkEMSIEIBr9gqVvKZ81GpSoedM7SKmGxfloKfgJbEEb # 2xhhkbhLMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgM9Qjq+Ww/mT3RIEI # 1r3CFrgyXEG3YKvDXY9McjLmJiowgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgABAAAB4zAiBCDna+qe9xf6Q9UIlMBI # 5FSJbx6pzEuLdMfAJPNSBHOBbjANBgkqhkiG9w0BAQsFAASCAgAOx2kMYBhZw5iX # u/jxLIXBJWkCy45FDIkrIoXPDwXVkNV6QFThXxQdKPVjzgx9241jO6fYa5y5Fbfv # UZLojoFddjFV4f3ucfgHygotcDMmXkVB7Cll0nFPIxMdig6VK7/y4Y0PIxa1DcP3 # N26Tm0Il7z5jwT4UDMpuZrixGh0kQCzByZpwNqbG0OPTMDtcBlIZKq+ewfPQ3VNI # px1hWspyvuLyTj5L0yKN7RYJ4EUAXN54wk3rVriQGI7mzwVjoRclggTdhPgViqv0 # yMXRmoN6NoWm5EfuY7C4S8QrWVrmrYksuqkqWomupYx8JexzMSomrrktRnkOteOc # Whs180rUv3Ee0dyTf/cD20UNR4GNBsgR/ZMG9alIJWH1Cj63TYyxFdAnDyfmzwXm # e3DGy0NBUs0l6nbAjcoXKEpdDDCYIIwyCmiGP9G/soxwIQKzYJffaFn6DIV7dlfM # 84CJLaYdWMsgZCMIuyZSVDoO+2vLqqFD9bmhzfnueMNrE3UbDEbbg3zxJd/4KXXn # vwisNKoKbGbuUxZqyyl7jGNhj+nmPw5etdTaZSxiSvXiAmf3Fd++aMWj4+LpyPnb # vgNVCMcZ7H+wJp27uDxLndJunvOQPqy+A5blD6oIaQXByY+FCKm0wgWfrsOI2yQr # 4xJBE785Y8mfjbuiDBFUI9QSPr3F6w== # SIG # End signature block
0
sample_0_3.ps1
# # Module manifest for module 'OCI.PSModules.Queue' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Queue.dll' # Version number of this module. ModuleVersion = '92.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2c5d60ce-a44b-46ce-97f7-351848bec841' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Queue Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Queue.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIQueue', 'Get-OCIQueueChannelsList', 'Get-OCIQueueMessages', 'Get-OCIQueuesList', 'Get-OCIQueueStats', 'Get-OCIQueueWorkRequest', 'Get-OCIQueueWorkRequestErrorsList', 'Get-OCIQueueWorkRequestLogsList', 'Get-OCIQueueWorkRequestsList', 'Invoke-OCIQueuePurgeQueue', 'Move-OCIQueueCompartment', 'New-OCIQueue', 'Remove-OCIQueue', 'Remove-OCIQueueMessage', 'Remove-OCIQueueMessages', 'Update-OCIQueue', 'Update-OCIQueueMessage', 'Update-OCIQueueMessages', 'Write-OCIQueueMessages' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Queue' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
Short PS Prompt.ps1
<# .Synopsis Dynamically shortens the prompt based upon window size .Notes I got really annoyed by having my PowerShell prompt extend across 2/3 of my window when in a deeply-nested directory structure. This shortens the prompt to roughly 1/3 of the window width, at a minimum showing the first and last piece of the path (usually the PSPROVIDER & the current directory) Additional detail is added, starting at the current directory's parent and working up from there. The omitted portion of the path is represented with an ellipsis (...) #> # Window title borrowed from Joel Bennett @ http://poshcode.org/1834 # This should go OUTSIDE the prompt function, it doesn't need re-evaluation # We're going to calculate a prefix for the window title # Our basic title is "PoSh - C:\\Your\\Path\\Here" showing the current path if(!$global:WindowTitlePrefix) { # But if you're running "elevated" on vista, we want to show that ... if( ([System.Environment]::OSVersion.Version.Major -gt 5) -and ( # Vista and ... new-object Security.Principal.WindowsPrincipal ( [Security.Principal.WindowsIdentity]::GetCurrent()) # current user is admin ).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) ) { $global:WindowTitlePrefix = "PoSh (ADMIN)" } else { $global:WindowTitlePrefix = "PoSh" } } function prompt { # Put the full path in the title bar for reference $host.ui.rawui.windowtitle = $global:WindowTitlePrefix + " - " + $(get-location); # Capture the maximum length of the prompt. If you want a longer prompt, adjust the math as necessary. $winWidth = $host.UI.RawUI.WindowSize.Width; $maxPromptPath = [Math]::Round($winWidth/3); # In the PowerShell ISE (version 2.0 at least), $host.UI.RawUI.WindowSize.Widthis $null. # For now, I'm just going to leave the default prompt for this scenario, as I don't work in the ISE. if (-not ($winWidth -eq $null)) { $currPath = (get-location).path; if ($currPath.length -ge $maxPromptPath){ $pathParts = $currPath.split([System.IO.Path]::DirectorySeparatorChar); # Absolute minimum path - PSPROVIDER and the current directory $myPrompt = $pathParts[0] + [System.IO.Path]::DirectorySeparatorChar+ "..." + [System.IO.Path]::DirectorySeparatorChar + $pathParts[$pathParts.length - 1]; $counter = $pathParts.length - 2; # This builds up the prompt until it reaches the maximum length we set earlier. # Start at the current directory's parent and keep going up until the whole prompt reaches the previously-determined limit. while( ($myPrompt.replace("...","..."+[System.IO.Path]::DirectorySeparatorChar+$pathParts[$counter]).length -lt $maxPromptPath) -and ($counter -ne 0)) { $myPrompt = $myPrompt.replace("...","..."+[System.IO.Path]::DirectorySeparatorChar+$pathParts[$counter]); $counter--; } $($myPrompt) + ">"; } else{ # If there's enough room for the full prompt, use the Powershell default prompt $(if (test-path variable:/PSDebugContext) { '[DBG]: ' } else { '' }) + 'PS ' + $(Get-Location) + $(if ($nestedpromptlevel -ge 1) { '>>' }) + '> ' } } }
0
664.ps1
Describe "Set-RsDatsSetReference" { Context "Set-RsDatsSetReference with minimun parameters"{ $folderName = 'SutSetRsDataSetReferenceMinParameters' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $localResourcesPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources' Write-RsFolderContent -Path $localResourcesPath -RsFolder $folderPath $report = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $dataSet = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSet' $reportDataSetReference = Get-RsItemReference -Path $report.Path | Where-Object ReferenceType -eq 'DataSet' $reportDataSetReferencePath = $reportDataSetReference.Reference Set-RsDataSetReference -Path $report.path -DataSetName $reportDataSetReference.Name -DataSetPath $dataSet.path It "Should set a RsDataSet reference" { $newReportDataSetReference = Get-RsItemReference -Path $report.Path | Where-Object ReferenceType -eq 'DataSet' $newReportDataSetReferencePath = $newReportDataSetReference.Reference $reportDataSetReferencePath | Should Not Be $newReportDataSetReferencePath $newReportDataSetReferencePath | Should Be $dataSet.Path } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Set-RsDatsSetReference with Proxy Parameter"{ $folderName = 'SutSetRsDataSetReferenceMinParameters' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $localResourcesPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources' Write-RsFolderContent -Path $localResourcesPath -RsFolder $folderPath $report = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $dataSet = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSet' $reportDataSetReference = Get-RsItemReference -Path $report.Path | Where-Object ReferenceType -eq 'DataSet' $reportDataSetReferencePath = $reportDataSetReference.Reference $proxy = New-RsWebServiceProxy Set-RsDataSetReference -Path $report.path -DataSetName $reportDataSetReference.Name -DataSetPath $dataSet.path -Proxy $proxy It "Should set a RsDataSet reference" { $newReportDataSetReference = Get-RsItemReference -Path $report.Path | Where-Object ReferenceType -eq 'DataSet' $newReportDataSetReferencePath = $newReportDataSetReference.Reference $reportDataSetReferencePath | Should Not Be $newReportDataSetReferencePath $newReportDataSetReferencePath | Should Be $dataSet.Path } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Set-RsDatsSetReference with Report Server Parameter"{ $folderName = 'SutSetRsDataSetReferenceMinParameters' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $localResourcesPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources' Write-RsFolderContent -Path $localResourcesPath -RsFolder $folderPath $report = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $dataSet = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSet' $reportDataSetReference = Get-RsItemReference -Path $report.Path | Where-Object ReferenceType -eq 'DataSet' $reportServerUri = 'http://localhost/reportserver' $reportDataSetReferencePath = $reportDataSetReference.Reference Set-RsDataSetReference -Path $report.path -DataSetName $reportDataSetReference.Name -DataSetPath $dataSet.path -ReportServerUri $reportServerUri It "Should set a RsDataSet referencee" { $newReportDataSetReference = Get-RsItemReference -Path $report.Path | Where-Object ReferenceType -eq 'DataSet' $newReportDataSetReferencePath = $newReportDataSetReference.Reference $reportDataSetReferencePath | Should Not Be $newReportDataSetReferencePath $newReportDataSetReferencePath | Should Be $dataSet.Path } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Set-RsDatsSetReference with ReportServerUri and Proxy parameters"{ $folderName = 'SutSetRsDataSetReferenceMinParameters' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $localResourcesPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources' Write-RsFolderContent -Path $localResourcesPath -RsFolder $folderPath $report = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $dataSet = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSet' $reportDataSetReference = Get-RsItemReference -Path $report.Path | Where-Object ReferenceType -eq 'DataSet' $reportServerUri = 'http://localhost/reportserver' $proxy = New-RsWebServiceProxy $reportDataSetReferencePath = $reportDataSetReference.Reference Set-RsDataSetReference -Path $report.path -DataSetName $reportDataSetReference.Name -DataSetPath $dataSet.path -ReportServerUri $reportServerUri -Proxy $proxy It "Should set a RsDataSet reference" { $newReportDataSetReference = Get-RsItemReference -Path $report.Path | Where-Object ReferenceType -eq 'DataSet' $newReportDataSetReferencePath = $newReportDataSetReference.Reference $reportDataSetReferencePath | Should Not Be $newReportDataSetReferencePath $newReportDataSetReferencePath | Should Be $dataSet.Path } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } }
0
sample_36_15.ps1
@{ GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" NestedModules="Microsoft.PowerShell.Commands.Management.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' FunctionsToExport = @() AliasesToExport = @("gcb", "gtz", "scb") CmdletsToExport=@("Add-Content", "Clear-Content", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-ChildItem", "Get-Clipboard", "Set-Clipboard", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Test-Connection", "Remove-ItemProperty", "Rename-ItemProperty", "Resolve-Path", "Set-Content", "Set-ItemProperty", "Get-TimeZone", "Stop-Computer", "Restart-Computer") } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC7VSKADi66xWJM # 6HEA1fH30eG2InNZKlDJZkesFZvWeqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5sRkkqFV4tm2L8Ww9Nazk # vwEuj6sw3rJoUClckmtaMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASw9qPBr2D26c4DJUtEgR1sKtpXKZoemG32esSLn4w3MduZQq0+6+T9xw # VErPr8+5fxrk4TSYNMEaOVNHNZ4DG2PbXpKoZvxTG8ohL/gZxPKzaa7wCMswzCXH # bURyCt+ndFxHrpVQL2Mj1nTf0eyCIzcta7/Y/Nz4gkvC88t8SfTbTqt4e0CqbGuw # R5vkBVdKTVJ6ufdCBCr5IP31ggm6NxcJVBB0xvMK5HZmY2Uw4KSSaL2ATExO/dpe # 9+28PKGF5UMjMpFA2OBL6w2Q9yG6XaxWEgdTqlDtplOpkeROOcZ/FHpmatbhUWBE # 6yGSzrMO83nn2TDas9ByOueXZIyMzKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAA0Xk9ogon3tGAm/+JwVPrmpcx7kI3uReVzIdjAxqClQIGZYMzcQ7w # GBMyMDI0MDExMTA0MTkxNy4yNzJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOlJYA0wIhgPMjAyNDAxMTEwMjI3MjVaGA8yMDI0MDExMjAyMjcyNVowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6UlgDQIBADAKAgEAAgIbIQIB/zAHAgEAAgISuDAK # AgUA6UqxjQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFkFEliZXMyT+yX5 # rvA21SFg+y9Ujd+D6ydr3euZ86pmIpuHE9VLYFWURbr2o8/gp2tog15VATitC2FV # NzIVleDF8frsHdhnW4UoO86rPmx5TBxIZt/UkYUn5VsI2wMkNNRMBw3WpsgmKFrE # uwvY9rTRcRmMy9cqYB5i09uzr6ODMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg2j2vBIEBXI2v9Dy21ElilcCSsfo+jYNK7F0ahEawT/AwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIPBrc4TxOks9oaZ4EPUAG2fZqlTGot2+EgTfKsqe # zOdlMA0GCSqGSIb3DQEBCwUABIICAFblKZomH17OyhmUGvnjinY3COjK6c4phBfb # p5OKI1ayE3I3luCBQraD4G/oWMYa7Oi8i/ePJ2QCZ2VqMSFQWqkm4QbCzfBNTF/q # ly7IiqexIzJLLNPA8zHwOXt8ZbbbhYY1KtkiKquPwqLJTyi11afjaGsIdFnfIBk8 # 4p02RQ7NwfIoJsaVwW4HfsPSuv2yA6pPeVc0njY9lGiuXIAqjSHj0aCsSX+ZXoki # IdCGelPPBdGblW1WFNQ1FaI1cMfFsEtv55RthF1i3X9LiYE2VZyJXt/3tKBcKs5w # arK8f0pCcTSV7ggJFEK/+V9TBt4JCtmPKoIBjxc0dTm6RtsiXI/4a8dtB1CbYvR0 # eUHObSyIjvNfFsfGxweX6egdHw4IjGvOP2yaz8ULGdgRCxWKNj6E83ehCkmvj6u6 # 3Ava/boYbb/raYOY05LxJBj+tTuPbogguBRcQxedmPZ2EkDC8EUlvF8KZYTKnF9a # UynO4HLXaX2dW249fWxLLNzjFxMYj7wyVwpyhtRTy1RxYrTQlmxlFie9KbBsTamv # 8HbWkiunXbvNI7R+7/TdwOQQTUdZb2ww9W2/l0dsrPUiJGuTW4fWVZKo70Y2lXx8 # I64npc0vgGS1aUlBQgEdL14IBwaFJs5dw1tt/6rGMXuVsJ2OnZti15uISeyRy5eg # FwMCwdZ6 # SIG # End signature block
0
sample_56_75.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ function Unpublish-ServiceFabricApplication { <# .SYNOPSIS Removes the specified service fabric application .DESCRIPTION This script removes the application. .NOTES This forcefully removes all the replicas for the specified service fabric application. .PARAMETER ApplicationName The name of the application to remove. .EXAMPLE Remove-Application.ps1 -ApplicationName 'fabric:/MyApplication' #> Param ( [Parameter(Mandatory=$true)] [String] $ApplicationName ) Write-Host "Removing application..." try { [void](Test-ServiceFabricClusterConnection) } catch { Write-Warning "Unable to Verify connection to Service Fabric cluster." throw } $app = Get-ServiceFabricApplication -ApplicationName $ApplicationName if ($app) { try { $app | Remove-ServiceFabricApplication -Force } catch [System.TimeoutException] { # Catch operation timeout and continue with force remove replica. } } foreach ($node in Get-ServiceFabricNode) { [void](Get-ServiceFabricDeployedReplica -NodeName $node.NodeName -ApplicationName $ApplicationName | Remove-ServiceFabricReplica -NodeName $node.NodeName -ForceRemove) } } # SIG # Begin signature block # MIInlgYJKoZIhvcNAQcCoIInhzCCJ4MCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDf0p5XZ5kDz81y # E5omORNfSyeFeaAUWJaTQjMcud6hR6CCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGXYwghlyAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHtJacb1NjW+p6Dc/Bx2n6Wb # 037nzxF7zMGT93IJXI2aMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAWkDA25fETqDNGFcZKUHI5A+BgvONgDylWlBVpQ1j+ufAtf4rfISEf7tb # /tZ7eBuSChEKrvTaJ6DKfjEGwtg4v0pTtZMa7/MJvXzEAkqOfs4pDyXLbo8/NquZ # mRsFJIxINquk4U3t/J9QowWlhosxsx4sTU4/dmEOoND8I3/wI/6vxROelJzLiii2 # YymVX+aaO9ofY6Y29uwsvvx1EF7WHlELwgJn/TC20c39BPHOeBNC7jj3SxOVE18X # krVCvlZM4/wjcTfQtm82bzaLwCr9nSlPTxCUaQcPNTjLGA8Qux8I8AfJzozwJluv # 0PxKlGlK0cp6QVKvi62IdL1/R0kiY6GCFwAwghb8BgorBgEEAYI3AwMBMYIW7DCC # FugGCSqGSIb3DQEHAqCCFtkwghbVAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAGfLfBcx/IMfX8VKwLB9q6PEllEmm5DvKhj1sicOLx7QIGZGzP6mEF # GBMyMDIzMDUzMTIxMzUwNy41NTNaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkJELUUz # MzgtRTlBMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EVcwggcMMIIE9KADAgECAhMzAAABxjDNLtbTocD0AAEAAAHGMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIyMTEwNDE5MDEz # NFoXDTI0MDIwMjE5MDEzNFowgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNCQkQtRTMzOC1FOUExMSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA770iOr6v4Hk1m3SZj+1BR/iuofv+f6eVb7Hc21YxzAzr # o4G6kKXF47YAsEgrWWT1ogvp0IroFm8CdRZTf/DlQ0fbNNO9pCA01KJ03zH82Clm # k9ze9r1jPJ1ZJaMnsZmAy7VpY9mNqX9dhPvnW1/ZxbbiHv7qwwgw9U2ST5mfcpPu # tsI/Qr/gLC6aTI3UCYziVPZ/Qfag8NQhKkpHZO3Kr5r83cy7jz4OWPy5M2WitWv5 # bJJ5rBTW518QPEzFwzq8e8P722CWKZJFjN8etBgsK05gHeHaN9kmlpYJJL84v9Ji # aX7NFJkORhApEFZiUIaZoLxJt4pcBDzf+WD9UAjRKCrAseJ/ckzQvOn95X4Ot4as # nOuNhcCdcQWcrZoykFmEaoYkrsD7n/4nFFHwJDKUaBYZZLwPj7ux48S1Ye+cMccM # xdRSjuoG4rqJqpEd6gzfz239v36L+LtOlQhfL5cnclhNSWdmKw1THyekH96RNtOp # IE7c+9Tnsv1aE9hphejLOJxfsXTkyw0FIdilc0CP7zzUsqaCGF2mFXRwL4jfX1Ry # V7QGKEeOpvGZqQKLHVZbLD32ztW8Lfv99xQ24d/TIxO9LReuHsnwotn+8BsCrzu+ # /24vOcA9Xcpd7kIeW4zmUxhFsv4KCfiqMptZhhMAA0SqDuj23cj10smXROLUnhUC # AwEAAaOCATYwggEyMB0GA1UdDgQWBBRxX/lHiShECp1n2lMa6G1uLvNglDAfBgNV # HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU # aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG # CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV # HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC # AQALzF724jXugDU486PMBYR7Cc6aHr2nJDnGsnkqwZYmjRi28qv6S1Ly772zwm5D # I189zgAQ99xhEjW6uYkrX5UrtVu7JUQP6bBBBJ98c28FAIPIK3fkQNCv2rxRjfQM # JSdcwsJeTK7Ld09OuA5hY4PWCBgJpfY71LcaXz3FR8ANPFX6zcKYbgYOZregtpDu # b34N0QhR7wc/FcmV+g4I3IdTAoMD2/WI5ZsfKTzBUn/U3ApUhNwbOl5YSC+f9S1L # StbZLwPzMS+fLPXJUSe7SSvspfSsr/VEe0oQhmaR+5vcq+7MLw861WBVhYpJ7TB5 # YBS5ORO9XdIbcpbBFwcHPmb8iZqSIqW9JpgG76+5NQULPVzZ75z5W2R5ZiyQktiH # pMwjX2OO29Z8+nTw2tOsVCcwzH9LoELedv3PjcpbwOyLjtm1T4XHYd3qbd9DXoBj # NYkSjdi37pNp58u+rITltLKOjjQCJwj1FpnuBY825B5C0uC/NYESEKsTicEjhS/4 # ujBXLcNGDhVBl2vHE6qY/YW4ky1vcypvUrsG81gpv2+8/ihOwg4wTLO7XqikeIiU # 3ZWAUAoOpTl14tedQqxbHTDveJYR3OU0yKB2xwf87EWCAb0CJimhDmyQaKEvSV0f # LW9iVyI0wYcG4V2aVN6TrZ4mr+ffaqDQD9F+HpPhP0plAzCCB3EwggVZoAMCAQIC # EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS # b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX # DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC # 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG # Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP # 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P # XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361 # VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB # Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9 # X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e # wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw # wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr # 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e # FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj # BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n # FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw # PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j # cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3 # FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf # BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH # hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF # BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl # ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf # ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC # j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu # 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/ # GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D # YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO # xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO # Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I # 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0 # zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM # mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT # TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLOMIICNwIBATCB+KGB0KSBzTCByjEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj # cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF # U046M0JCRC1FMzM4LUU5QTExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAC01yuYmIVvsokSacJmWe8Mu2QFtoIGD # MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF # BQACBQDoIdnVMCIYDzIwMjMwNTMxMjIzNjA1WhgPMjAyMzA2MDEyMjM2MDVaMHcw # PQYKKwYBBAGEWQoEATEvMC0wCgIFAOgh2dUCAQAwCgIBAAICC1ECAf8wBwIBAAIC # Ei4wCgIFAOgjK1UCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAK # MAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAHzjQbxbRQ # uIPtzH5mKPse2sP9u5lVG2A0exY09BN7R8IaOlaycLznPjU8Hst7tQtxhcAzdj8w # D4G2SU9ShKy6eIzIyV/yp+L+czSMlmhK734L8HLh8a4KLqVfAPWRx8i6a7bCq5FE # /CM3S5EsY0Ixm/3lQflXqfiHhxWShrQVGjGCBA0wggQJAgEBMIGTMHwxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m # dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABxjDNLtbTocD0AAEAAAHGMA0GCWCG # SAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZI # hvcNAQkEMSIEICvWyoSOrsh7KDg0fTaojUlrs1+gd1WVWLLm1ei/R8seMIH6Bgsq # hkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgVjETXFXJvZgpxiZqk/BwDWA5Pxw6hehU # LpkFr9rjry0wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAIT # MwAAAcYwzS7W06HA9AABAAABxjAiBCDMUIaSeCnwcd9aMmB0NItZjniYO8xIJe+E # vy+4sqfWYDANBgkqhkiG9w0BAQsFAASCAgCtpOOsKOZwNz6CtFhc+r/yBtNi8z0M # IzTOfXtKTV8amcxuW6YEsQnX55o1+kPMa6jM1JhqrDwbHYsDlaL3PZzWvQHwc2NQ # qZgPrJToaUxhIGPpgc+emuCkH77aX259zbavG35J9dCjsoTSslx+M9bJCw0cL76c # cbLYnnZ+/qSjqwUc7qOm7O1vdoP1Cb345463DBBMXtogq3hXT5yHfmzyRUcUrIAQ # HowuEBSdPQm405K63bWlW1Ok3GGIdtGLElm8StFTZq7xFbvtrs1gN70JnmOBrlAL # Jg97gwOWH+jadYPlDmjiM2Wbyeu4lwhuag4MDa0UxVqLM7h1YP6rrPIyr6Re7XJg # TqBRGHDk3qN1GaPhbZ7diWwAn5m2s6gNO3YDwaNeyQfBE6rWV+eV+K0WXmNfBGWE # ndX3RWfvGwV+F0gSvUsIArgNx7P4mBHRpyH6SSpDv+EcMzCeNkpIOCpvK6AlJr2e # xbvDLQ6z0EA+lhD+qlUf6/qHgVcfkS7V1IOc9pARJaUELOyDbqA+ju+rs0Wvc1CE # hrOs1YX0iXTaGdbQyZf59y6a+Z756Nwzlnl0DLKEQ94K/GlH3NvcXuDik8DKl2eU # r43hkFlDDvZqMzqE8zK4oT+pmOWxANqiKSYHNoU6/ltpPaEcP8F4tzmOF6J6O3WG # x5HAGyZyuyuwBQ== # SIG # End signature block
0
sample_56_68.ps1
# # Module manifest for module 'OCI.PSModules.Aispeech' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aispeech.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '101b9a53-66d0-4458-870f-5f2f3debb208' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aispeech Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aispeech.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAispeechCustomization', 'Get-OCIAispeechCustomizationsList', 'Get-OCIAispeechTranscriptionJob', 'Get-OCIAispeechTranscriptionJobsList', 'Get-OCIAispeechTranscriptionTask', 'Get-OCIAispeechTranscriptionTasksList', 'Move-OCIAispeechCustomizationCompartment', 'Move-OCIAispeechTranscriptionJobCompartment', 'New-OCIAispeechCustomization', 'New-OCIAispeechRealtimeSessionToken', 'New-OCIAispeechTranscriptionJob', 'Remove-OCIAispeechCustomization', 'Remove-OCIAispeechTranscriptionJob', 'Stop-OCIAispeechTranscriptionJob', 'Stop-OCIAispeechTranscriptionTask', 'Update-OCIAispeechCustomization', 'Update-OCIAispeechTranscriptionJob' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aispeech' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
2758.ps1
Update-TypeData -TypeName System.Diagnostics.Process -SerializationDepth 3 -Force Get-Process
0
sample_55_95.ps1
# # Module manifest for module 'OCI.PSModules.Identitydomains' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Identitydomains.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a6c13cbd-d51d-4887-9285-9eb20c02e9cc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Identitydomains Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydomains.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIIdentitydomainsAccountMgmtInfo', 'Get-OCIIdentitydomainsAccountMgmtInfosList', 'Get-OCIIdentitydomainsAccountRecoverySetting', 'Get-OCIIdentitydomainsAccountRecoverySettingsList', 'Get-OCIIdentitydomainsApiKey', 'Get-OCIIdentitydomainsApiKeysList', 'Get-OCIIdentitydomainsApp', 'Get-OCIIdentitydomainsAppRole', 'Get-OCIIdentitydomainsAppRolesList', 'Get-OCIIdentitydomainsApprovalWorkflow', 'Get-OCIIdentitydomainsApprovalWorkflowAssignment', 'Get-OCIIdentitydomainsApprovalWorkflowAssignmentsList', 'Get-OCIIdentitydomainsApprovalWorkflowsList', 'Get-OCIIdentitydomainsApprovalWorkflowStep', 'Get-OCIIdentitydomainsApprovalWorkflowStepsList', 'Get-OCIIdentitydomainsAppsList', 'Get-OCIIdentitydomainsAuthenticationFactorSetting', 'Get-OCIIdentitydomainsAuthenticationFactorSettingsList', 'Get-OCIIdentitydomainsAuthToken', 'Get-OCIIdentitydomainsAuthTokensList', 'Get-OCIIdentitydomainsBrandingSetting', 'Get-OCIIdentitydomainsBrandingSettingsList', 'Get-OCIIdentitydomainsCloudGate', 'Get-OCIIdentitydomainsCloudGateMapping', 'Get-OCIIdentitydomainsCloudGateMappingsList', 'Get-OCIIdentitydomainsCloudGateServer', 'Get-OCIIdentitydomainsCloudGateServersList', 'Get-OCIIdentitydomainsCloudGatesList', 'Get-OCIIdentitydomainsCondition', 'Get-OCIIdentitydomainsConditionsList', 'Get-OCIIdentitydomainsCustomerSecretKey', 'Get-OCIIdentitydomainsCustomerSecretKeysList', 'Get-OCIIdentitydomainsDynamicResourceGroup', 'Get-OCIIdentitydomainsDynamicResourceGroupsList', 'Get-OCIIdentitydomainsGrant', 'Get-OCIIdentitydomainsGrantsList', 'Get-OCIIdentitydomainsGroup', 'Get-OCIIdentitydomainsGroupsList', 'Get-OCIIdentitydomainsIdentityPropagationTrust', 'Get-OCIIdentitydomainsIdentityPropagationTrustsList', 'Get-OCIIdentitydomainsIdentityProvider', 'Get-OCIIdentitydomainsIdentityProvidersList', 'Get-OCIIdentitydomainsIdentitySetting', 'Get-OCIIdentitydomainsIdentitySettingsList', 'Get-OCIIdentitydomainsKmsiSetting', 'Get-OCIIdentitydomainsKmsiSettingsList', 'Get-OCIIdentitydomainsMe', 'Get-OCIIdentitydomainsMyApiKey', 'Get-OCIIdentitydomainsMyApiKeysList', 'Get-OCIIdentitydomainsMyAppsList', 'Get-OCIIdentitydomainsMyAuthToken', 'Get-OCIIdentitydomainsMyAuthTokensList', 'Get-OCIIdentitydomainsMyCompletedApproval', 'Get-OCIIdentitydomainsMyCompletedApprovalsList', 'Get-OCIIdentitydomainsMyCustomerSecretKey', 'Get-OCIIdentitydomainsMyCustomerSecretKeysList', 'Get-OCIIdentitydomainsMyDevice', 'Get-OCIIdentitydomainsMyDevicesList', 'Get-OCIIdentitydomainsMyGroupsList', 'Get-OCIIdentitydomainsMyOAuth2ClientCredential', 'Get-OCIIdentitydomainsMyOAuth2ClientCredentialsList', 'Get-OCIIdentitydomainsMyPendingApproval', 'Get-OCIIdentitydomainsMyPendingApprovalsList', 'Get-OCIIdentitydomainsMyRequest', 'Get-OCIIdentitydomainsMyRequestableGroupsList', 'Get-OCIIdentitydomainsMyRequestsList', 'Get-OCIIdentitydomainsMySmtpCredential', 'Get-OCIIdentitydomainsMySmtpCredentialsList', 'Get-OCIIdentitydomainsMySupportAccount', 'Get-OCIIdentitydomainsMySupportAccountsList', 'Get-OCIIdentitydomainsMyTrustedUserAgent', 'Get-OCIIdentitydomainsMyTrustedUserAgentsList', 'Get-OCIIdentitydomainsMyUserDbCredential', 'Get-OCIIdentitydomainsMyUserDbCredentialsList', 'Get-OCIIdentitydomainsNetworkPerimeter', 'Get-OCIIdentitydomainsNetworkPerimetersList', 'Get-OCIIdentitydomainsNotificationSetting', 'Get-OCIIdentitydomainsNotificationSettingsList', 'Get-OCIIdentitydomainsOAuth2ClientCredential', 'Get-OCIIdentitydomainsOAuth2ClientCredentialsList', 'Get-OCIIdentitydomainsOAuthClientCertificate', 'Get-OCIIdentitydomainsOAuthClientCertificatesList', 'Get-OCIIdentitydomainsOAuthPartnerCertificate', 'Get-OCIIdentitydomainsOAuthPartnerCertificatesList', 'Get-OCIIdentitydomainsPasswordPoliciesList', 'Get-OCIIdentitydomainsPasswordPolicy', 'Get-OCIIdentitydomainsPoliciesList', 'Get-OCIIdentitydomainsPolicy', 'Get-OCIIdentitydomainsResourceTypeSchemaAttributesList', 'Get-OCIIdentitydomainsRule', 'Get-OCIIdentitydomainsRulesList', 'Get-OCIIdentitydomainsSchema', 'Get-OCIIdentitydomainsSchemasList', 'Get-OCIIdentitydomainsSecurityQuestion', 'Get-OCIIdentitydomainsSecurityQuestionSetting', 'Get-OCIIdentitydomainsSecurityQuestionSettingsList', 'Get-OCIIdentitydomainsSecurityQuestionsList', 'Get-OCIIdentitydomainsSelfRegistrationProfile', 'Get-OCIIdentitydomainsSelfRegistrationProfilesList', 'Get-OCIIdentitydomainsSetting', 'Get-OCIIdentitydomainsSettingsList', 'Get-OCIIdentitydomainsSmtpCredential', 'Get-OCIIdentitydomainsSmtpCredentialsList', 'Get-OCIIdentitydomainsUser', 'Get-OCIIdentitydomainsUserAttributesSetting', 'Get-OCIIdentitydomainsUserAttributesSettingsList', 'Get-OCIIdentitydomainsUserDbCredential', 'Get-OCIIdentitydomainsUserDbCredentialsList', 'Get-OCIIdentitydomainsUsersList', 'Invoke-OCIIdentitydomainsPatchAccountRecoverySetting', 'Invoke-OCIIdentitydomainsPatchApiKey', 'Invoke-OCIIdentitydomainsPatchApp', 'Invoke-OCIIdentitydomainsPatchAppRole', 'Invoke-OCIIdentitydomainsPatchApprovalWorkflow', 'Invoke-OCIIdentitydomainsPatchApprovalWorkflowStep', 'Invoke-OCIIdentitydomainsPatchAuthToken', 'Invoke-OCIIdentitydomainsPatchCloudGate', 'Invoke-OCIIdentitydomainsPatchCloudGateMapping', 'Invoke-OCIIdentitydomainsPatchCloudGateServer', 'Invoke-OCIIdentitydomainsPatchCondition', 'Invoke-OCIIdentitydomainsPatchCustomerSecretKey', 'Invoke-OCIIdentitydomainsPatchDynamicResourceGroup', 'Invoke-OCIIdentitydomainsPatchGrant', 'Invoke-OCIIdentitydomainsPatchGroup', 'Invoke-OCIIdentitydomainsPatchIdentityPropagationTrust', 'Invoke-OCIIdentitydomainsPatchIdentityProvider', 'Invoke-OCIIdentitydomainsPatchIdentitySetting', 'Invoke-OCIIdentitydomainsPatchKmsiSetting', 'Invoke-OCIIdentitydomainsPatchMe', 'Invoke-OCIIdentitydomainsPatchMyApiKey', 'Invoke-OCIIdentitydomainsPatchMyAuthToken', 'Invoke-OCIIdentitydomainsPatchMyCustomerSecretKey', 'Invoke-OCIIdentitydomainsPatchMyDevice', 'Invoke-OCIIdentitydomainsPatchMyOAuth2ClientCredential', 'Invoke-OCIIdentitydomainsPatchMyPendingApproval', 'Invoke-OCIIdentitydomainsPatchMyRequest', 'Invoke-OCIIdentitydomainsPatchMySmtpCredential', 'Invoke-OCIIdentitydomainsPatchNetworkPerimeter', 'Invoke-OCIIdentitydomainsPatchOAuth2ClientCredential', 'Invoke-OCIIdentitydomainsPatchPasswordPolicy', 'Invoke-OCIIdentitydomainsPatchPolicy', 'Invoke-OCIIdentitydomainsPatchRule', 'Invoke-OCIIdentitydomainsPatchSchema', 'Invoke-OCIIdentitydomainsPatchSecurityQuestion', 'Invoke-OCIIdentitydomainsPatchSecurityQuestionSetting', 'Invoke-OCIIdentitydomainsPatchSelfRegistrationProfile', 'Invoke-OCIIdentitydomainsPatchSetting', 'Invoke-OCIIdentitydomainsPatchSmtpCredential', 'Invoke-OCIIdentitydomainsPatchUser', 'Invoke-OCIIdentitydomainsPatchUserAttributesSetting', 'Invoke-OCIIdentitydomainsSearchAccountMgmtInfos', 'Invoke-OCIIdentitydomainsSearchApiKeys', 'Invoke-OCIIdentitydomainsSearchAppRoles', 'Invoke-OCIIdentitydomainsSearchApps', 'Invoke-OCIIdentitydomainsSearchAuthenticationFactorSettings', 'Invoke-OCIIdentitydomainsSearchAuthTokens', 'Invoke-OCIIdentitydomainsSearchCloudGateMappings', 'Invoke-OCIIdentitydomainsSearchCloudGates', 'Invoke-OCIIdentitydomainsSearchCloudGateServers', 'Invoke-OCIIdentitydomainsSearchConditions', 'Invoke-OCIIdentitydomainsSearchCustomerSecretKeys', 'Invoke-OCIIdentitydomainsSearchDynamicResourceGroups', 'Invoke-OCIIdentitydomainsSearchGrants', 'Invoke-OCIIdentitydomainsSearchGroups', 'Invoke-OCIIdentitydomainsSearchIdentityProviders', 'Invoke-OCIIdentitydomainsSearchIdentitySettings', 'Invoke-OCIIdentitydomainsSearchKmsiSettings', 'Invoke-OCIIdentitydomainsSearchMyApps', 'Invoke-OCIIdentitydomainsSearchMyGroups', 'Invoke-OCIIdentitydomainsSearchMyRequestableGroups', 'Invoke-OCIIdentitydomainsSearchMyRequests', 'Invoke-OCIIdentitydomainsSearchNetworkPerimeters', 'Invoke-OCIIdentitydomainsSearchNotificationSettings', 'Invoke-OCIIdentitydomainsSearchOAuth2ClientCredentials', 'Invoke-OCIIdentitydomainsSearchOAuthClientCertificates', 'Invoke-OCIIdentitydomainsSearchOAuthPartnerCertificates', 'Invoke-OCIIdentitydomainsSearchPasswordPolicies', 'Invoke-OCIIdentitydomainsSearchPolicies', 'Invoke-OCIIdentitydomainsSearchResourceTypeSchemaAttributes', 'Invoke-OCIIdentitydomainsSearchRules', 'Invoke-OCIIdentitydomainsSearchSchemas', 'Invoke-OCIIdentitydomainsSearchSecurityQuestions', 'Invoke-OCIIdentitydomainsSearchSecurityQuestionSettings', 'Invoke-OCIIdentitydomainsSearchSelfRegistrationProfiles', 'Invoke-OCIIdentitydomainsSearchSettings', 'Invoke-OCIIdentitydomainsSearchSmtpCredentials', 'Invoke-OCIIdentitydomainsSearchUserAttributesSettings', 'Invoke-OCIIdentitydomainsSearchUserDbCredentials', 'Invoke-OCIIdentitydomainsSearchUsers', 'New-OCIIdentitydomainsApiKey', 'New-OCIIdentitydomainsApp', 'New-OCIIdentitydomainsAppRole', 'New-OCIIdentitydomainsApprovalWorkflow', 'New-OCIIdentitydomainsApprovalWorkflowAssignment', 'New-OCIIdentitydomainsApprovalWorkflowStep', 'New-OCIIdentitydomainsAuthenticationFactorsRemover', 'New-OCIIdentitydomainsAuthToken', 'New-OCIIdentitydomainsCloudGate', 'New-OCIIdentitydomainsCloudGateMapping', 'New-OCIIdentitydomainsCloudGateServer', 'New-OCIIdentitydomainsCondition', 'New-OCIIdentitydomainsCustomerSecretKey', 'New-OCIIdentitydomainsDynamicResourceGroup', 'New-OCIIdentitydomainsGrant', 'New-OCIIdentitydomainsGroup', 'New-OCIIdentitydomainsIdentityPropagationTrust', 'New-OCIIdentitydomainsIdentityProvider', 'New-OCIIdentitydomainsMe', 'New-OCIIdentitydomainsMyApiKey', 'New-OCIIdentitydomainsMyAuthenticationFactorInitiator', 'New-OCIIdentitydomainsMyAuthenticationFactorsRemover', 'New-OCIIdentitydomainsMyAuthenticationFactorValidator', 'New-OCIIdentitydomainsMyAuthToken', 'New-OCIIdentitydomainsMyCustomerSecretKey', 'New-OCIIdentitydomainsMyOAuth2ClientCredential', 'New-OCIIdentitydomainsMyRequest', 'New-OCIIdentitydomainsMySmtpCredential', 'New-OCIIdentitydomainsMySupportAccount', 'New-OCIIdentitydomainsMyUserDbCredential', 'New-OCIIdentitydomainsNetworkPerimeter', 'New-OCIIdentitydomainsOAuth2ClientCredential', 'New-OCIIdentitydomainsOAuthClientCertificate', 'New-OCIIdentitydomainsOAuthPartnerCertificate', 'New-OCIIdentitydomainsPasswordPolicy', 'New-OCIIdentitydomainsPolicy', 'New-OCIIdentitydomainsRule', 'New-OCIIdentitydomainsSecurityQuestion', 'New-OCIIdentitydomainsSelfRegistrationProfile', 'New-OCIIdentitydomainsSmtpCredential', 'New-OCIIdentitydomainsUser', 'New-OCIIdentitydomainsUserDbCredential', 'Remove-OCIIdentitydomainsApiKey', 'Remove-OCIIdentitydomainsApp', 'Remove-OCIIdentitydomainsAppRole', 'Remove-OCIIdentitydomainsApprovalWorkflow', 'Remove-OCIIdentitydomainsApprovalWorkflowAssignment', 'Remove-OCIIdentitydomainsApprovalWorkflowStep', 'Remove-OCIIdentitydomainsAuthToken', 'Remove-OCIIdentitydomainsCloudGate', 'Remove-OCIIdentitydomainsCloudGateMapping', 'Remove-OCIIdentitydomainsCloudGateServer', 'Remove-OCIIdentitydomainsCondition', 'Remove-OCIIdentitydomainsCustomerSecretKey', 'Remove-OCIIdentitydomainsDynamicResourceGroup', 'Remove-OCIIdentitydomainsGrant', 'Remove-OCIIdentitydomainsGroup', 'Remove-OCIIdentitydomainsIdentityPropagationTrust', 'Remove-OCIIdentitydomainsIdentityProvider', 'Remove-OCIIdentitydomainsMyApiKey', 'Remove-OCIIdentitydomainsMyAuthToken', 'Remove-OCIIdentitydomainsMyCustomerSecretKey', 'Remove-OCIIdentitydomainsMyDevice', 'Remove-OCIIdentitydomainsMyOAuth2ClientCredential', 'Remove-OCIIdentitydomainsMySmtpCredential', 'Remove-OCIIdentitydomainsMySupportAccount', 'Remove-OCIIdentitydomainsMyTrustedUserAgent', 'Remove-OCIIdentitydomainsMyUserDbCredential', 'Remove-OCIIdentitydomainsNetworkPerimeter', 'Remove-OCIIdentitydomainsOAuth2ClientCredential', 'Remove-OCIIdentitydomainsOAuthClientCertificate', 'Remove-OCIIdentitydomainsOAuthPartnerCertificate', 'Remove-OCIIdentitydomainsPasswordPolicy', 'Remove-OCIIdentitydomainsPolicy', 'Remove-OCIIdentitydomainsRule', 'Remove-OCIIdentitydomainsSecurityQuestion', 'Remove-OCIIdentitydomainsSelfRegistrationProfile', 'Remove-OCIIdentitydomainsSmtpCredential', 'Remove-OCIIdentitydomainsUser', 'Remove-OCIIdentitydomainsUserDbCredential', 'Write-OCIIdentitydomainsAccountRecoverySetting', 'Write-OCIIdentitydomainsApp', 'Write-OCIIdentitydomainsApprovalWorkflow', 'Write-OCIIdentitydomainsAppStatusChanger', 'Write-OCIIdentitydomainsAuthenticationFactorSetting', 'Write-OCIIdentitydomainsCloudGate', 'Write-OCIIdentitydomainsCloudGateMapping', 'Write-OCIIdentitydomainsCloudGateServer', 'Write-OCIIdentitydomainsCondition', 'Write-OCIIdentitydomainsDynamicResourceGroup', 'Write-OCIIdentitydomainsGroup', 'Write-OCIIdentitydomainsIdentityPropagationTrust', 'Write-OCIIdentitydomainsIdentityProvider', 'Write-OCIIdentitydomainsIdentitySetting', 'Write-OCIIdentitydomainsKmsiSetting', 'Write-OCIIdentitydomainsMe', 'Write-OCIIdentitydomainsMePasswordChanger', 'Write-OCIIdentitydomainsNetworkPerimeter', 'Write-OCIIdentitydomainsNotificationSetting', 'Write-OCIIdentitydomainsPasswordPolicy', 'Write-OCIIdentitydomainsPolicy', 'Write-OCIIdentitydomainsRule', 'Write-OCIIdentitydomainsSchema', 'Write-OCIIdentitydomainsSecurityQuestionSetting', 'Write-OCIIdentitydomainsSelfRegistrationProfile', 'Write-OCIIdentitydomainsSetting', 'Write-OCIIdentitydomainsUser', 'Write-OCIIdentitydomainsUserCapabilitiesChanger', 'Write-OCIIdentitydomainsUserPasswordChanger', 'Write-OCIIdentitydomainsUserPasswordResetter', 'Write-OCIIdentitydomainsUserStatusChanger' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydomains' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
2976.ps1
Set-StrictMode -Version Latest $here = Split-Path -Parent $MyInvocation.MyCommand.Path $manifestPath = (Join-Path $here 'Pester.psd1') $changeLogPath = (Join-Path $here 'CHANGELOG.md') Describe -Tags 'VersionChecks' "Pester manifest and changelog" { $script:manifest = $null $script:tagVersion = $null $script:tagVersionShort = $null $script:changelogVersion = $null $script:changelogVersionShort = $null $script:tagPrerelease = $null It "has a valid manifest" { { $script:manifest = Test-ModuleManifest -Path $manifestPath -ErrorAction Stop -WarningAction SilentlyContinue } | Should -Not -Throw } It "has a valid name in the manifest" { $script:manifest.Name | Should -Be Pester } It "has a valid guid in the manifest" { $script:manifest.Guid | Should -Be 'a699dea5-2c73-4616-a270-1f7abb777e71' } if (Get-Command -Name git -ErrorAction SilentlyContinue) { $skipVersionTest = -not [bool]((git remote -v 2>&1) -match "github.com/Pester/") It "is tagged with a valid version" -skip:$skipVersionTest { $thisCommit = git log --decorate --oneline HEAD~1..HEAD if ($thisCommit -match 'tag:\s*(.*?)[,)]') { $script:tagVersion = $matches[1] $script:tagVersionShort, $script:tagPrerelease = $script:tagVersion -split "-", 2 } $script:tagVersion | Should -Not -BeNullOrEmpty $script:tagVersionShort -as [Version] | Should -Not -BeNullOrEmpty } It "has valid release notes in the manifest" -skip:$skipVersionTest { $script:manifest.PrivateData.PSData.ReleaseNotes | Should -Be "https://github.com/pester/Pester/releases/tag/$script:tagVersion" } It "tag and changelog versions are the same" -skip:$skipVersionTest { foreach ($line in (Get-Content $changeLogPath)) { if ($line -match "^\s* $script:changelogVersion = $matches.Version $script:changelogVersionShort = $script:changelogVersion -replace "-.*$", '' break } } $script:changelogVersion | Should -Be $script:tagVersion $script:changelogVersionShort | Should -Be $script:tagVersionShort } It "tag and changelog versions are the same" -skip:$skipVersionTest { $script:changelogVersion | Should -Be $script:tagVersion } It "all short versions are the same" -skip:$skipVersionTest { $script:changelogVersionShort -as [Version] | Should -Be ( $script:manifest.Version -as [Version] ) $script:manifest.Version -as [Version] | Should -Be ( $script:tagVersionShort -as [Version] ) } } It "has valid pre-release suffix in manifest (empty for stable version)" { $prereleaseFromManifest = $script:manifest.PrivateData.PSData.Prerelease | where {$_} $prereleaseFromManifest | Should -Be $script:tagPrerelease } } if ($PSVersionTable.PSVersion.Major -ge 3) { $error.Clear() Describe 'Clean treatment of the $error variable' { Context 'A Context' { It 'Performs a successful test' { $true | Should -Be $true } } It 'Did not add anything to the $error variable' { $error.Count | Should -Be 0 } } InModuleScope Pester { Describe 'SafeCommands table' { $path = $ExecutionContext.SessionState.Module.ModuleBase $filesToCheck = Get-ChildItem -Path $path -Recurse -Include *.ps1, *.psm1 -Exclude *.Tests.ps1 $callsToSafeCommands = @( foreach ($file in $filesToCheck) { $tokens = $parseErrors = $null $ast = [System.Management.Automation.Language.Parser]::ParseFile($file.FullName, [ref] $tokens, [ref] $parseErrors) $filter = { $args[0] -is [System.Management.Automation.Language.CommandAst] -and $args[0].InvocationOperator -eq [System.Management.Automation.Language.TokenKind]::Ampersand -and $args[0].CommandElements[0] -is [System.Management.Automation.Language.IndexExpressionAst] -and $args[0].CommandElements[0].Target -is [System.Management.Automation.Language.VariableExpressionAst] -and $args[0].CommandElements[0].Target.VariablePath.UserPath -match '^(?:script:)?SafeCommands$' } $ast.FindAll($filter, $true) } ) $uniqueSafeCommands = $callsToSafeCommands | ForEach-Object { $_.CommandElements[0].Index.Value } | Select-Object -Unique $missingSafeCommands = $uniqueSafeCommands | Where { -not $script:SafeCommands.ContainsKey($_) } $missingSafeCommands = $missingSafeCommands | Where { @('Get-WmiObject', 'Get-CimInstance', 'uname', 'id') -notcontains $_ } It 'The SafeCommands table contains all commands that are called from the module' { $missingSafeCommands | Should -Be $null } } } } Describe 'Public API' { It 'all non-deprecated, non-internal public commands use CmdletBinding' { $r = Get-Command -Module Pester | ? { $_.CommandType -ne 'Alias' } | ? { -not $_.CmdletBinding } | % { $_.Name } | ? { @( 'Get-TestDriveItem' 'SafeGetCommand' 'Setup' ) -notcontains $_ } $r | Should -beNullOrEmpty } } Describe 'Style rules' -Tag StyleRules { $pesterRoot = (Get-Module Pester).ModuleBase $files = @( Get-ChildItem $pesterRoot\* -Include *.ps1, *.psm1, *.psd1 Get-ChildItem (Join-Path $pesterRoot 'en-US') -Include *.ps1, *.psm1, *.psd1, *.txt -Recurse Get-ChildItem (Join-Path $pesterRoot 'Functions') -Include *.ps1, *.psm1, *.psd1 -Recurse Get-ChildItem (Join-Path $pesterRoot 'Dependencies') -Include *.ps1, *.psm1, *.psd1 -Recurse ) It 'Pester source files contain no trailing whitespace' { $badLines = @( foreach ($file in $files) { $lines = [System.IO.File]::ReadAllLines($file.FullName) $lineCount = $lines.Count for ($i = 0; $i -lt $lineCount; $i++) { if ($lines[$i] -match '\s+$') { 'File: {0}, Line: {1}' -f $file.FullName, ($i + 1) } } } ) if ($badLines.Count -gt 0) { throw "The following $($badLines.Count) lines contain trailing whitespace: $([System.Environment]::NewLine)$([System.Environment]::NewLine)$($badLines -join "$([System.Environment]::NewLine)")" } } It 'Spaces are used for indentation in all code files, not tabs' { $badLines = @( foreach ($file in $files) { $lines = [System.IO.File]::ReadAllLines($file.FullName) $lineCount = $lines.Count for ($i = 0; $i -lt $lineCount; $i++) { if ($lines[$i] -match '^[ ]*\t|^\t|^\t[ ]*') { 'File: {0}, Line: {1}' -f $file.FullName, ($i + 1) } } } ) if ($badLines.Count -gt 0) { throw "The following $($badLines.Count) lines start with a tab character: $([System.Environment]::NewLine)$([System.Environment]::NewLine)$($badLines -join "$([System.Environment]::NewLine)")" } } It 'Pester Source Files all end with a newline' { $badFiles = @( foreach ($file in $files) { $string = [System.IO.File]::ReadAllText($file.FullName) if ($string.Length -gt 0 -and $string[-1] -ne "`n") { $file.FullName } } ) if ($badFiles.Count -gt 0) { throw "The following files do not end with a newline: $([System.Environment]::NewLine)$([System.Environment]::NewLine)$($badFiles -join "$([System.Environment]::NewLine)")" } } } InModuleScope Pester { Describe 'ResolveTestScripts' { Setup -File SomeFile.ps1 Setup -File SomeFile.Tests.ps1 Setup -File SomeOtherFile.ps1 Setup -File SomeOtherFile.Tests.ps1 It 'Resolves non-wildcarded file paths regardless of whether the file ends with Tests.ps1' { $result = @(ResolveTestScripts (Join-Path $TestDrive 'SomeOtherFile.ps1')) $result.Count | Should -Be 1 $result[0].Path | Should -Be (Join-Path $TestDrive 'SomeOtherFile.ps1') } It 'Finds only *.Tests.ps1 files when the path contains wildcards' { $result = @(ResolveTestScripts (Join-Path $TestDrive '*.ps1')) $result.Count | Should -Be 2 $paths = $result | Select-Object -ExpandProperty Path ($paths -contains (Join-Path $TestDrive 'SomeFile.Tests.ps1')) | Should -Be $true ($paths -contains (Join-Path $TestDrive 'SomeOtherFile.Tests.ps1')) | Should -Be $true } It 'Finds only *.Tests.ps1 files when the path refers to a directory and does not contain wildcards' { $result = @(ResolveTestScripts $TestDrive) $result.Count | Should -Be 2 $paths = $result | Select-Object -ExpandProperty Path ($paths -contains ( Join-Path $TestDrive 'SomeFile.Tests.ps1')) | Should -Be $true ($paths -contains ( Join-Path $TestDrive 'SomeOtherFile.Tests.ps1')) | Should -Be $true } It 'Assigns empty array and hashtable to the Arguments and Parameters properties when none are specified by the caller' { $result = @(ResolveTestScripts (Join-Path $TestDrive 'SomeFile.ps1')) $result.Count | Should -Be 1 $result[0].Path | Should -Be (Join-Path $TestDrive 'SomeFile.ps1') , $result[0].Arguments | Should -Not -Be $null , $result[0].Parameters | Should -Not -Be $null $result[0].Arguments.GetType() | Should -Be ([object[]]) $result[0].Arguments.Count | Should -Be 0 $result[0].Parameters.GetType() | Should -Be ([hashtable]) $result[0].Parameters.PSBase.Count | Should -Be 0 } Context 'Passing in Dictionaries instead of Strings' { It 'Allows the use of a "p" key instead of "Path"' { $result = @(ResolveTestScripts @{ p = (Join-Path $TestDrive 'SomeFile.ps1') }) $result.Count | Should -Be 1 $result[0].Path | Should -Be (Join-Path $TestDrive 'SomeFile.ps1') } $testArgs = @('I am a string') It 'Allows the use of an "Arguments" key in the dictionary' { $result = @(ResolveTestScripts @{ Path = (Join-Path $TestDrive 'SomeFile.ps1'); Arguments = $testArgs }) $result.Count | Should -Be 1 $result[0].Path | Should -Be (Join-Path $TestDrive 'SomeFile.ps1') $result[0].Arguments.Count | Should -Be 1 $result[0].Arguments[0] | Should -Be 'I am a string' } It 'Allows the use of an "args" key in the dictionary' { $result = @(ResolveTestScripts @{ Path = (Join-Path $TestDrive 'SomeFile.ps1'); args = $testArgs }) $result.Count | Should -Be 1 $result[0].Path | Should -Be (Join-Path $TestDrive 'SomeFile.ps1') $result[0].Arguments.Count | Should -Be 1 $result[0].Arguments[0] | Should -Be 'I am a string' } It 'Allows the use of an "a" key in the dictionary' { $result = @(ResolveTestScripts @{ Path = (Join-Path $TestDrive 'SomeFile.ps1'); a = $testArgs }) $result.Count | Should -Be 1 $result[0].Path | Should -Be (Join-Path $TestDrive 'SomeFile.ps1') $result[0].Arguments.Count | Should -Be 1 $result[0].Arguments[0] | Should -Be 'I am a string' } $testParams = @{ MyKey = 'MyValue' } It 'Allows the use of a "Parameters" key in the dictionary' { $result = @(ResolveTestScripts @{ Path = (Join-Path $TestDrive 'SomeFile.ps1'); Parameters = $testParams }) $result.Count | Should -Be 1 $result[0].Path | Should -Be (Join-Path $TestDrive 'SomeFile.ps1') $result[0].Parameters.PSBase.Count | Should -Be 1 $result[0].Parameters['MyKey'] | Should -Be 'MyValue' } It 'Allows the use of a "params" key in the dictionary' { $result = @(ResolveTestScripts @{ Path = (Join-Path $TestDrive 'SomeFile.ps1'); params = $testParams }) $result.Count | Should -Be 1 $result[0].Path | Should -Be (Join-Path $TestDrive 'SomeFile.ps1') $result[0].Parameters.PSBase.Count | Should -Be 1 $result[0].Parameters['MyKey'] | Should -Be 'MyValue' } It 'Allows to pass test script string' { $result = @(ResolveTestScripts @{ Script = "Test script string" }) $result.Count | Should -Be 1 $result[0].Script | Should -Be "Test script string" $result[0].Path | Should -BeNullOrEmpty $result[0].Parameters | Should -BeNullOrEmpty $result[0].Arguments | Should -BeNullOrEmpty } It 'Throws an error if no Path is specified' { { ResolveTestScripts @{} } | Should -Throw } It 'Throws an error if a Parameters key is used, but does not contain an IDictionary object' { { ResolveTestScripts @{ P = 'P'; Params = 'A string' } } | Should -Throw } } } } Describe 'Assertion operators' { It 'Allows an operator with an identical name and test to be re-registered' { function SameNameAndScript { $true } Add-AssertionOperator -Name SameNameAndScript -Test $function:SameNameAndScript { Add-AssertionOperator -Name SameNameAndScript -Test { $true } } | Should -Not -Throw } It 'Allows an operator with an identical name, test, and alias to be re-registered' { function SameNameAndScriptAndAlias { $true } Add-AssertionOperator -Name SameNameAndScriptAndAlias -Test $function:SameNameAndScriptAndAlias -Alias SameAlias { Add-AssertionOperator -Name SameNameAndScriptAndAlias -Test { $true } -Alias SameAlias } | Should -Not -Throw } It 'Allows an operator to be registered with multiple aliases' { function MultipleAlias { $true } Add-AssertionOperator -Name MultipleAlias -Test $Function:MultipleAlias -Alias mult, multiple {Add-AssertionOperator -Name MultipleAlias -Test $Function:MultipleAlias -Alias mult, multiple} | Should -Not -Throw } It 'Does not allow an operator with a different test to be registered using an existing name' { function DifferentScriptBlockA { $true } function DifferentScriptBlockB { $false } Add-AssertionOperator -Name DifferentScriptBlock -Test $function:DifferentScriptBlockA { Add-AssertionOperator -Name DifferentScriptBlock -Test $function:DifferentScriptBlockB } | Should -Throw } It 'Does not allow an operator with a different test to be registered using an existing alias' { function DifferentAliasA { $true } function DifferentAliasB { $true } Add-AssertionOperator -Name DifferentAliasA -Test $function:DifferentAliasA -Alias DifferentAliasTest { Add-AssertionOperator -Name DifferentAliasB -Test $function:DifferentAliasB -Alias DifferentAliasTest } | Should -Throw } } Describe 'Set-StrictMode for all tests files' { $pesterRoot = (Get-Module Pester).ModuleBase $files = @( Get-ChildItem $pesterRoot\* -Include *.Tests.ps1 Get-ChildItem (Join-Path $pesterRoot 'en-US') -Include *.Tests.ps1 -Recurse Get-ChildItem (Join-Path $pesterRoot 'Functions') -Include *.Tests.ps1 -Recurse Get-ChildItem (Join-Path $pesterRoot 'Dependencies') -Include *.Tests.ps1 -Recurse ) It 'Pester tests files start with explicit declaration of StrictMode set to Latest' { $UnstrictTests = @( foreach ($file in $files) { $lines = [System.IO.File]::ReadAllLines($file.FullName) $lineCount = $lines.Count if ($lineCount -lt 3) { $linesToRead = $lineCount } else { $linestoRead = 3 } $n = 0 for ($i = 0; $i -lt $linestoRead; $i++) { if ($lines[$i] -match '\s+Set-StrictMode\ -Version\ Latest' -or $lines[$i] -match 'Set-StrictMode\ -Version\ Latest' ) { $n++ } } if ( $n -eq 0 ) { $file.FullName } } ) if ($UnstrictTests.Count -gt 0) { throw "The following $($UnstrictTests.Count) tests files doesn't contain strict mode declaration in the first three lines: $([System.Environment]::NewLine)$([System.Environment]::NewLine)$($UnstrictTests -join "$([System.Environment]::NewLine)")" } } } if ($PSVersionTable.PSVersion.Major -gt 2) { Describe "Module Pester functions help" -Tags "Help" { [String[]]$AcceptEmptyHelp = @() [String[]]$AcceptMissedHelpSynopsis = @() [String[]]$AccepteMissedHelpDescription = @('AfterAll', 'AfterEach', 'BeforeAll', 'BeforeEach', 'Get-MockDynamicParameter', 'Invoke-Mock', 'SafeGetCommand', 'Set-DynamicParameterVariable', 'Setup') [String[]]$AcceptMissedHelpParameters = @('Get-MockDynamicParameter', 'Invoke-Mock', 'Should', 'Set-DynamicParameterVariable', 'Setup') [String[]]$AcceptMissedHelpExamples = @('AfterAll', 'AfterEach', 'AfterEachFeature', 'AfterEachScenario', 'Assert-VerifiableMocks', 'BeforeAll', 'BeforeEach', 'BeforeEachFeature', 'BeforeEachScenario', 'Get-MockDynamicParameter', 'In', 'Invoke-Mock', 'SafeGetCommand', 'Set-DynamicParameterValue', 'Set-DynamicParameterVariable', 'Setup', 'Should') [String[]]$FunctionsList = (Get-Command -Module Pester | Where-Object -FilterScript { $_.CommandType -eq 'Function' }) [String[]]$FilteredFunctionList = $($FunctionsList | Where-Object -FilterScript { $AcceptEmptyHelp -notcontains $_ }) ForEach ($Function in $FilteredFunctionList) { $FunctionHelp = Get-Help -Name $Function -Full $AST = [System.Management.Automation.Language.Parser]::ParseInput((Get-Content function:$Function), [ref]$null, [ref]$null) Context "The function [$Function] - Help" { If ($AcceptMissedHelpSynopsis -notcontains $Function) { $HelpSynopsis = ($FunctionHelp.Synopsis).Trim() if ( -not [String]::IsNullOrEmpty($HelpSynopsis) ) { $HelpSynopsisBegin = $HelpSynopsis.SubString(0, $HelpSynopsis.IndexOf('[') + 2) $HelpSynopsisEnd = $HelpSynopsis.SubString($HelpSynopsis.length - 1, 1 ) } It "Synopsis for the function is filled up" { $HelpSynopsis | Should not BeNullOrEmpty $HelpSynopsisBegin | Should Not Be "$Function [[" $HelpSynopsisEnd | Should Not Be ']' $HelpSynopsis | Should Not Be $Function } } If ($AccepteMissedHelpDescription -notcontains $Function) { It "Description for the function is filled up" { $FunctionDescription = $FunctionHelp.Description $FunctionDescription | Should not BeNullOrEmpty } } $RiskMitigationParameters = 'Whatif', 'Confirm' Try { $ParametersCount = $(Measure-Object -InputObject $FunctionHelp.parameters.parameter).Count } Catch { $ParametersCount = 0 } if ( $ParametersCount -gt 0 ) { $HelpParameters = $FunctionHelp.parameters.parameter | Where-Object name -NotIn $RiskMitigationParameters } Try { [String[]]$ASTParameters = $AST.ParamBlock.Parameters.Name.variablepath.userpath | Sort-Object } Catch { $ASTParameters = $Null } If (-not [String]::IsNullOrEmpty($ASTParameters) -and $AcceptMissedHelpParameters -notcontains $Function ) { $HelpParameters | ForEach-Object { It "The parameter [$($_.Name)] contains description" { $ParameterDescription = $_.description $ParameterDescription | Should not BeNullOrEmpty } } } If ($AcceptMissedHelpExamples -notcontains $Function) { Try { $ExamplesCount = $(Measure-Object -InputObject $FunctionHelp.examples.example).Count } Catch { $ExamplesCount = 0 } it "Example - At least one example exist" { $ExamplesCount | Should BeGreaterthan 0 } If ( $ExamplesCount -gt 0 ) { foreach ($Example in $FunctionHelp.examples.example) { $StrippedExampleTitle = ($Example.Title).Replace('--------------------------', '') it "Example - remarks on [$StrippedExampleTitle] are filled up" { $Example.remarks | Should not BeNullOrEmpty } } } } } } } } InModuleScope -ModuleName Pester { Describe "Contain-AnyStringLike" { It 'Given a filter <filter> that does not match any items in collection <collection> it returns $false' -TestCases @( @{ Filter = "Unit"; Collection = "Integration" } @{ Filter = "*Unit*"; Collection = "Integration" } @{ Filter = "*Unit*", "IntegrationTest"; Collection = "Integration" } @{ Filter = "Unit"; Collection = "Low", "Medium", "High" } @{ Filter = "*Unit*"; Collection = "Low", "Medium", "High" } ) { param($Filter, $Collection) Contain-AnyStringLike -Filter $Filter -Collection $Collection | Should -BeFalse } It 'Given a filter <filter> that matches one or more items in collection <collection> it returns $true' -TestCases @( @{ Filter = "Unit"; Collection = "Unit" } @{ Filter = "*Unit*"; Collection = "UnitTest" } @{ Filter = "UnitTest", "IntegrationTest"; Collection = "UnitTest" } @{ Filter = "Low"; Collection = "Low", "Medium", "High" } @{ Filter = "Low", "Medium"; Collection = "Low", "Medium", "High" } @{ Filter = "l*"; Collection = "Low", "Medium", "High" } ) { param($Filter, $Collection) Contain-AnyStringLike -Filter $Filter -Collection $Collection | Should -BeTrue } } }
0
sample_21_88.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Creates an EventHub Namespace .Description Creates an EventHub Namespace #> function New-AzEventHubNamespace{ [Alias("New-AzEventHubNamespaceV2")] [OutputType([Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IEhNamespace])] [CmdletBinding(PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter(Mandatory, HelpMessage = "The name of EventHub namespace.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [System.String] # The name of EventHub namespace ${Name}, [Parameter(Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(HelpMessage = "The ID of the target subscription.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(HelpMessage = "Alternate name specified when alias and namespace names are same")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.String] ${AlternateName}, [Parameter(HelpMessage = "Cluster ARM ID of the Namespace.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.String] ${ClusterArmId}, [Parameter(HelpMessage = "This property disables SAS authentication for the Event Hubs namespace.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.Management.Automation.SwitchParameter] ${DisableLocalAuth}, [Parameter(HelpMessage = "Enable Infrastructure Encryption (Double Encryption)")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.Management.Automation.SwitchParameter] ${RequireInfrastructureEncryption}, [Parameter(Mandatory, HelpMessage = "Cluster ARM ID of the Namespace.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.String] ${Location}, [Parameter(HelpMessage = "Enabling this property creates a Standard Event Hubs Namespace in regions supported availability zones.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.Management.Automation.SwitchParameter] ${ZoneRedundant}, [Parameter(HelpMessage = "Properties to configure Encryption")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IKeyVaultProperties[]] ${KeyVaultProperty}, [Parameter(HelpMessage = "Type of managed service identity.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.String] ${IdentityType}, [Parameter(HelpMessage = "Properties for User Assigned Identities")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.String[]] # IdentityId ${UserAssignedIdentityId}, [Parameter(HelpMessage = "Value that indicates whether AutoInflate is enabled for eventhub namespace.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.Management.Automation.SwitchParameter] ${EnableAutoInflate}, [Parameter(HelpMessage = "Upper limit of throughput units when AutoInflate is enabled, value should be within 0 to 20 throughput units. ( '0' if AutoInflateEnabled = true)")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.Int64] ${MaximumThroughputUnit}, [Parameter(HelpMessage = "The minimum TLS version for the cluster to support, e.g. '1.2'")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.String] ${MinimumTlsVersion}, [Parameter(HelpMessage = "The minimum TLS version for the cluster to support, e.g. '1.2'")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.String] ${SkuName}, [Parameter(HelpMessage = "This determines if traffic is allowed over public network. By default it is enabled.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.String] ${PublicNetworkAccess}, [Parameter(HelpMessage = "The Event Hubs throughput units for Basic or Standard tiers, where value should be 0 to 20 throughput units. The Event Hubs premium units for Premium tier, where value should be 0 to 10 premium units.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.Int64] ${SkuCapacity}, [Parameter(HelpMessage = "Tag of EventHub Namespace.")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')] [System.Collections.Hashtable] ${Tag}, [Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Azure')] [System.Management.Automation.PSObject] ${DefaultProfile}, [Parameter(HelpMessage = "Run the command as a job")] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process{ try{ $null = $PSBoundParameters.Remove('WhatIf') $null = $PSBoundParameters.Remove('Confirm') if($PSBoundParameters.ContainsKey('SkuName')){ $PSBoundParameters.Add('SkuTier', $SkuName) } if($PSBoundParameters.ContainsKey('KeyVaultProperty')){ $PSBoundParameters.Add('KeySource', 'Microsoft.KeyVault') } if($PSBoundParameters.ContainsKey('UserAssignedIdentityId')){ $identityHashTable = @{} foreach ($resourceID in $UserAssignedIdentityId){ $identityHashTable.Add($resourceID, [Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.UserAssignedIdentity]::new()) } $PSBoundParameters.Add("UserAssignedIdentity", $identityHashTable) $null = $PSBoundParameters.Remove("UserAssignedIdentityId") } if ($PSCmdlet.ShouldProcess("EventHub Namespace $($Name)", "Create or update")) { Az.EventHub.private\New-AzEventHubNamespace_CreateExpanded @PSBoundParameters } } catch{ throw } } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBaG1LUm4xI9mvX # ea8GtXRk2x5wjlFI7uNWFjMaZUy00qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHUP/rAuw1fSxVthg8GI7egJ # IB/Jt4HFMAW64n8Pb1uDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZXTXf4cPoFggKsG07IzVY43m7uCGOZFDx0PS6DMuMEZxqv5yps7bL22n # 3QNNrgYd6nT40ku96T7TCvRelfa1GfXtlLmufU4Zb4UyJIQkS5xeu2J47tq/cntO # ojezROYfqhRCY+9HziLD18XaaJbR85O0gFeyBfmXmktSCYUyzigfVAXboM5F1nMK # K2LfLqk8bQdG7yHxwDJARvDnJbbto1WYAvbcVL/jMkX5Ip0mnVCvaRDeOWedlePa # ignHZ8vbgdG7cO1UvkRCwC3tAavMk86DFYMeR3GUx9U1F58tIs7eQVGIrFrF0/L8 # EBI/Uhm2EJE4XE/VRA/wz0qHI/tnjqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAlRdVGpve8YU9vnLb/zrAie5DuwAUbjP+f+v1QFlTjMQIGZjOahIKo # GBMyMDI0MDUxNjA2NDIxMy42MTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV # lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz # zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf # dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld # 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW # EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC # tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK # Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG # 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs # WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH # SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU # 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F # 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS # ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU # XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w # iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ # gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u # er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni # a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si # rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf # 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa # WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho # Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI # o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/khTAiGA8yMDI0MDUxNjAxNDg1 # M1oYDzIwMjQwNTE3MDE0ODUzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp7+SF # AgEAMAcCAQACAhI8MAcCAQACAhLtMAoCBQDp8TYFAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAAxEjKnSk7z0bXwcEuWQw97AgLqpP6QXnwEZM41HdkQ6IjWR # 80WQra5fw3/m4qY8wuDmJtG7uCD/olcakGKUKmhwvb3cKYRsYimEb3p8Bs0pBosm # 85tb23aIP6SaYP9RDzyFc0lbTZFgve3dvH5HBA05maKu/SGUwj6YFbCUwkePhxlc # PwoJht+JDTulGIR60ACLGdEVDfcUZs7CEO4jApeHyK2003zb9kPdjogvdegfmIm3 # t2tuHLEv2/UsXl8nukg/Rp8Xg8xspddR3tZMT6xr/Kt2tdCzUQaW67J+MZBuX6cD # +zcbEo8FH0fMF0WfCSvSurqFZiM/h6+6P21scbsxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCBTGv7+YKEAzEdl504kQtpcwG3CH6EUMwK6oGQLmEMkTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o # CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgrf1hyXgV+TDcVONGGqbNRYWZJ3gR # eAJl4GXFk1yOgFkwDQYJKoZIhvcNAQELBQAEggIAs2FpJioCJKZl/cxfoNl7C+l7 # lKRX6iy8tEhhT0grtLmodnwjBvE01z57DkDq8ADgowaTfT9AcTpkksfzppQBrZip # SWddAffqliNt0daz+eR36v0C+AXgXIn4zHQux5BGSgUO2XxDv8J6rgnGqnieMTrt # WvjI92j1ttAP+IvyumG3nLfqyTRXlwiIKMZkdl5wBLhbb6Ar9YU13Ei7nU6px3ai # bdSzp5hYmxm4GmliUmrcWsg6UYZR9tSh3/mkBnRhUaLIGesmygx1LjduChz5HdpG # CaKCGOnnUlVz+FfAF28WruSCTvTnFv7p8qPZV9bTQUCc0yscNdbtxeOs3E23KtO3 # hwyFwlCNHn6wf3PC5keih/WpZDsRgltwUJq6cjAN5zSpAr1JrmMjuRNfoWOdfICU # 5iJTU1GThEpDBWW/toafeUUYsTU1REhHREXQt4CbpYOUv1sd2luz2Ap6rlhw4MaG # 5D4/Zs2Z+ih/NLOsRenHOXaDNmOOVk7+MdlboOUJC61QTj6KLHM01smOyEpCyB9H # +zxrW+sgTXkxSFMQIsWGMOrg8bY2XHEiNlf2nnKU+zWF0xn65BsUKbZb8a6TYffW # Gxj6Nw7Bf8AgyK7d3yJbnM3Yn357GVb+6bUpHmgg+nUNAIRmcqyA9Bj0du93Zr8K # 1XO9rF1CxkmyuDW4Y54= # SIG # End signature block
0
3456.ps1
function Test-Dataset { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force try { Set-AzDataFactoryV2 -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force $linkedServicename = "foo1" Set-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -File (Join-Path 'Resources' 'linkedService.json') -Name $linkedServicename -Force $datasetname = "foo2" $expected = Set-AzDataFactoryV2Dataset -ResourceGroupName $rgname -DataFactoryName $dfname -Name $datasetname -File (Join-Path 'Resources' 'dataset.json') -Force $actual = Get-AzDataFactoryV2Dataset -ResourceGroupName $rgname -DataFactoryName $dfname -Name $datasetname Verify-AdfSubResource $expected $actual $rgname $dfname $datasetname Remove-AzDataFactoryV2Dataset -ResourceGroupName $rgname -DataFactoryName $dfname -Name $datasetname -Force } finally { CleanUp $rgname $dfname } } function Test-DatasetWithResourceId { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force try { $df = Set-AzDataFactoryV2 -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force $linkedServicename = "foo1" Set-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -File (Join-Path 'Resources' 'linkedService.json') -Name $linkedServicename -Force $dsname = "foo2" $expected = Set-AzDataFactoryV2Dataset -ResourceGroupName $rgname -DataFactoryName $dfname -Name $dsname -File (Join-Path 'Resources' 'dataset.json') -Force $actual = Get-AzDataFactoryV2Dataset -ResourceId $expected.Id Verify-AdfSubResource $expected $actual $rgname $dfname $dsname Remove-AzDataFactoryV2Dataset -ResourceId $expected.Id -Force } finally { CleanUp $rgname $dfname } } function Test-DatasetWithDataFactoryParameter { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force try { $df = Set-AzDataFactoryV2 -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force $linkedServicename = "foo1" Set-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -File (Join-Path 'Resources' 'linkedService.json') -Name $linkedServicename -Force $datasetname = "foo2" $actual = Set-AzDataFactoryV2Dataset -ResourceGroupName $rgname -DataFactoryName $dfname -Name $datasetname -File (Join-Path 'Resources' 'dataset.json') -Force $expected = Get-AzDataFactoryV2Dataset -DataFactory $df -Name $datasetname Verify-AdfSubResource $expected $actual $rgname $dfname $datasetname Remove-AzDataFactoryV2Dataset -ResourceGroupName $rgname -DataFactoryName $dfname -Name $datasetname -Force } finally { CleanUp $rgname $dfname } } function Test-DatasetPiping { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force try { Set-AzDataFactoryV2 -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force $linkedServicename = "foo1" Set-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -File (Join-Path 'Resources' 'linkedService.json') -Name $linkedServicename -Force $datasetname = "foo2" Set-AzDataFactoryV2Dataset -ResourceGroupName $rgname -DataFactoryName $dfname -Name $datasetname -File (Join-Path 'Resources' 'dataset.json') -Force Get-AzDataFactoryV2Dataset -ResourceGroupName $rgname -DataFactoryName $dfname -Name $datasetname | Remove-AzDataFactoryV2Dataset -Force Assert-ThrowsContains { Get-AzDataFactoryV2Dataset -ResourceGroupName $rgname -DataFactoryName $dfname -Name $datasetname } "NotFound" } finally { CleanUp $rgname $dfname } }
0
Invoke-PoshCode.ps1
# .Summary # Download and execute a script block from PoshCode.org # .Description # Download the code for a PoshCode script based on search of by specific index. # Execute the code as a script block, passing arguments to it. # # Note: this is scary, and you should only use it if you really know what you're doing ;) By invoking the downloaded code as a script block, we effenctively bypass the execution policy... # # Depends on the PoshCode module from http://poshcode.org/PoshCode.psm1 # # .Parameter SearchTerms # The terms to use when searching, or the Id of the spu # .Parameter ArgumentList # The arguments to be passed to the Invoked script # .Example # Invoke-PoshCode Test-Port localhost 80 # # Search for "Test-Port" and invoke the first result with the parameters "localhost" and 80 # .Example # Invoke-PoshCode 85 localhost 80 # # Fetch http://poshcode.org/get/85 and invoke it with the parameters "localhost" and 80 # .Example # Invoke-PoshCode 85 -ArgumentList @{srv="localhost";port="80"} # # Fetch http://poshcode.org/get/85 and invoke it with the parameters srv = "localhost" and port = 80 function Invoke-PoshCode { param( [Parameter(Mandatory=$true, Position=1)]$SearchTerms, [Parameter(Position=2, ValueFromRemainingArguments=$true)]$ArgumentList) Write-Verbose "Searching for: $SearchTerms" if($SearchTerms -is [int]) { $Code = Get-PoshCode -Id $SearchTerms -Passthru } else { $Code = Get-PoshCode -Query $SearchTerms | Select -First 1 | Get-PoshCode -Passthru } Invoke-Command -ScriptBlock ([ScriptBlock]::Create($Code)) -ArgumentList $ArgumentList }
0
sample_40_31.ps1
# # Module manifest for module 'OCI.PSModules.Dns' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dns.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd69f0172-1c3b-4e1b-97f5-d455d0244e12' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dns Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dns.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDnsDomainRecords', 'Get-OCIDnsResolver', 'Get-OCIDnsResolverEndpoint', 'Get-OCIDnsResolverEndpointsList', 'Get-OCIDnsResolversList', 'Get-OCIDnsRRSet', 'Get-OCIDnsSteeringPoliciesList', 'Get-OCIDnsSteeringPolicy', 'Get-OCIDnsSteeringPolicyAttachment', 'Get-OCIDnsSteeringPolicyAttachmentsList', 'Get-OCIDnsTsigKey', 'Get-OCIDnsTsigKeysList', 'Get-OCIDnsView', 'Get-OCIDnsViewsList', 'Get-OCIDnsZone', 'Get-OCIDnsZoneContent', 'Get-OCIDnsZoneRecords', 'Get-OCIDnsZonesList', 'Get-OCIDnsZoneTransferServersList', 'Invoke-OCIDnsPatchDomainRecords', 'Invoke-OCIDnsPatchRRSet', 'Invoke-OCIDnsPatchZoneRecords', 'Move-OCIDnsResolverCompartment', 'Move-OCIDnsSteeringPolicyCompartment', 'Move-OCIDnsTsigKeyCompartment', 'Move-OCIDnsViewCompartment', 'Move-OCIDnsZoneCompartment', 'New-OCIDnsResolverEndpoint', 'New-OCIDnsSteeringPolicy', 'New-OCIDnsSteeringPolicyAttachment', 'New-OCIDnsTsigKey', 'New-OCIDnsView', 'New-OCIDnsZone', 'New-OCIDnsZoneFromZoneFile', 'Remove-OCIDnsDomainRecords', 'Remove-OCIDnsResolverEndpoint', 'Remove-OCIDnsRRSet', 'Remove-OCIDnsSteeringPolicy', 'Remove-OCIDnsSteeringPolicyAttachment', 'Remove-OCIDnsTsigKey', 'Remove-OCIDnsView', 'Remove-OCIDnsZone', 'Update-OCIDnsDomainRecords', 'Update-OCIDnsResolver', 'Update-OCIDnsResolverEndpoint', 'Update-OCIDnsRRSet', 'Update-OCIDnsSteeringPolicy', 'Update-OCIDnsSteeringPolicyAttachment', 'Update-OCIDnsTsigKey', 'Update-OCIDnsView', 'Update-OCIDnsZone', 'Update-OCIDnsZoneRecords' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dns' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
Restore-Database.ps1
param($sqlserver, $filepath) #Note: Uses Changeset 59378 or higher of SQLPSX SQLServer module http://sqlpsx.codeplex.com/SourceControl/changeset/view/58378#564810 #Added FileListOnly option to Invoke-SqlRestore. The option will be included in releases after 2.3.1 import-module sqlserver -force $server = get-sqlserver $sqlserver $filepath = Resolve-Path $filepath | select -ExpandProperty Path $dbname = Get-ChildItem $filePath | select -ExpandProperty basename $dataPath = Get-SqlDefaultDir -sqlserver $server -dirtype Data $logPath = Get-SqlDefaultDir -sqlserver $server -dirtype Log $relocateFiles = @{} Invoke-SqlRestore -sqlserver $server -filepath $filepath -fileListOnly | foreach { ` if ($_.Type -eq 'L') { $physicalName = "$logPath\\{0}" -f [system.io.path]::GetFileName("$($_.PhysicalName)") } else { $physicalName = "$dataPath\\{0}" -f [system.io.path]::GetFileName("$($_.PhysicalName)") } $relocateFiles.Add("$($_.LogicalName)", "$physicalName") } $server.KillAllProcesses($dbname) Invoke-SqlRestore -sqlserver $server -dbname $dbname -filepath $filepath -relocatefiles $relocateFiles -Verbose -force
0
sample_19_69.ps1
ConvertFrom-StringData @' id_sccm_checksqlconfig=Checking SQL Database Configuration id_sccm_checksqlvalue=Checking the Value of id_sccm_checksqlconfigdesc=Trying to connect to the SQL Database '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDQtkcbKC8zZZov # vxuOT+lzEOyb1xYICerqHA11r+isgaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAXO # GKsbNPl1hGeQzx8wZi8WxD1CQ7g+aSwuq6HpxJwjMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEADjrzhl//YM5e9tDLtfsg97VxNiamNYrVDZRy # sHfl9V2tkDE1w0YJc125ejQQoYgmSStO/vhZhwvKCtu9UTXHe7FTGO7rOkmEA5ak # lHiuYQGshX+gNPnxVwNUjEjwFss+hiFm+RI5+QlyprMXLetOmQaD4umGSOyzp3tb # pXXWlJvXGCcca2U+HkJtweY4F+GYtEoiq2oKuIi3qmJdwEkW6XtpbILuUgRsbGvm # uayxdzER19+19vRdI5u+Jotn0JvMeXFdOftonxUNNTw2EgTcK1fpeK54rxB9co8U # R4PozNAc7U6a8mCcHlxk+KLqC7SFhmNeZfoV5v+ggbSIVYlgZKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBzdyRNEqJK3TH0v4qxwljHGoJbPn0LSBV5 # C4dxbNl5kQIGZuspkdLdGBMyMDI0MTAyODExNDA0Mi4xODdaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOh # JgwMQEj+AAEAAAH4MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjMyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # xR23pXYnD2BuODdeXs2Cu/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMT # xgckvZr1JrW0Mi4F15rx/VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf2 # 70SWAAWxQbpVIhhPWCnVV3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3 # vBuxEX2E8X50IgAHsyaR9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgE # qSrX4UiX0etqi7jUtKypgIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcT # KWtddWpnJtyl5e3gHuYoj8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO6 # 9vo/NmJ4R/f1+KucBPJ4yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXp # cU+TMcOvWP8HBWmWJQImTZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRf # gPHfOhIWQ0D8ALCY+LsiwbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1Ns # Bo9V4GZBikzX7ZjWCRgd1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpP # TAs1gd/vUogcdiL51o7shuHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBS9zsZzz57QlT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAYfk8GzzpEVnGl7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbH # B5rcNiRhFHZ93RefdPpc4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQp # gGUzyw3lETZebNLEA17A/CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJx # IuLzFVHacvWxSCKoF9hlSrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0 # UIMjjp9VRFH7nb3Ng2Q4gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35 # qLo7Daw9AsItqjFhbMcG68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI # 0TZvvUWX9ajm6SfLBTEtoTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2 # gxFlDXHCyLp5qB6BoPpc82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziL # fU1SY240OZW8ld4sS8fnybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcn # f1VTm6cmfasScYtElpjqZ9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH # 00KQq+FJT/62SB70g9g/R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5D # nG+aKRzPELCFE9GggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJuKwwIhgPMjAyNDEwMjgwNzE1NTZaGA8yMDI0 # MTAyOTA3MTU1NlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sm4rAIBADAHAgEA # AgIYGzAHAgEAAgITTTAKAgUA6ssKLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQCdo1/IodMsNY0IgWORzZg8jsEoddsFxXLB6LC/xZZN78xMGY8ik00hGbgg # j5TzOyaNz/noIF8rSswoSMgsS4ZwddVQrvYaMGqrGhpDjhieQUnGdME69mRCvIoQ # FD26RPCKzj29tv+B+uFYo+vQFAlgX6TPkk0mP1QA2f6Z3lUlDwIgMI253G8VxjqZ # RY6ZoVliBz9eAi7lBW9kULQPtVGmIUPu7ezKTBUkuCNLrcKpQnElDP3Zlk7rT4A0 # pcf9UEdis9BF366M8Ktt8LYZKi+PDCPRy/n75JCQqDqcbHIzxFw0i6SoY8K4+6yq # F0TVFbiwLm8UNadYHPkbzTwcRywIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgN37oTW3vuteg8GKNuZ5BcwJUzvwOvcHrlwBOmWcSp5AwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I # 0Zz3WjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # +KOhJgwMQEj+AAEAAAH4MCIEINY/Dw199apAunA4Ss6RSl7yGIXBNBs5M/tiHZQ6 # crrSMA0GCSqGSIb3DQEBCwUABIICABweHp7iGW/iiWp21tffJnFPMbju90KdaWir # dbBbCfwRokAqcqOaEt2BBSUMaVMYMx1uKH1pE1elA88Lw9KrkWo2bIuHLqsxgvo8 # Vxuh5REk6+NFdwjuAWQIAypeX2MswEXFUdOnfqcilmyby1Oy/NPuU1FoZPEWoxYs # tgLj21j+8mN2IhgC7vIG7BaouaiIqx/9CJBSPm8HQHaA/CxpGigehMEjXQKsFCEb # tEikDdxiqVAsOvyizJlNsriUtCjdVTU30p8EzovqJIheCiR+NOezgQll+t5fNFPM # DcpwSDPxaaxwQsHIZvt7SlrkOBdiFVtB9WPE3pbFZIHG8/yGP6RVL+jIr/FuqLgG # Abo7wW8Ew6LsQFXOEx4KN07YZ1oNty3wOZQc6DDn9gbZXgRuWeuVLwdmWG82ocru # qJNM1ePsKaMSP2itCq7WTKoJ99JcojLAxyjrmcbIb/CW6g3KAmLRccO+sZ4/kAv9 # T5jRF31ZmXGhOVOv744j1xV1OGZIRRn3x2H4tqKU2CtBy/u6kNuYdIBeJl+7tmPr # CSWvgtDFDfdjJB/qyHpoaiZMR7l7mPmXIWk4aJAboyWD9iciYYaarkZzjjuhBVrg # 5KOLtZgTsiMZpAEXwvhnfRMWNmNBiVORBQVRVt7kbQMlvDDfEnkjzvW3qKuFf2sO # iW/YLp0T # SIG # End signature block
0
sample_66_0.ps1
# # Module manifest for module 'OCI.PSModules.Operatoraccesscontrol' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Operatoraccesscontrol.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd1ca9ba8-0f36-4759-8992-932d0bb2c9bb' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Operatoraccesscontrol Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Operatoraccesscontrol.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIOperatoraccesscontrolOperatorAssignment', 'Get-OCIOperatoraccesscontrolAccessRequest', 'Get-OCIOperatoraccesscontrolAccessRequestHistoriesList', 'Get-OCIOperatoraccesscontrolAccessRequestsList', 'Get-OCIOperatoraccesscontrolAssignmentValidationStatus', 'Get-OCIOperatoraccesscontrolAuditLogReport', 'Get-OCIOperatoraccesscontrolInteractionsList', 'Get-OCIOperatoraccesscontrolOperatorAction', 'Get-OCIOperatoraccesscontrolOperatorActionsList', 'Get-OCIOperatoraccesscontrolOperatorControl', 'Get-OCIOperatoraccesscontrolOperatorControlAssignment', 'Get-OCIOperatoraccesscontrolOperatorControlAssignmentsList', 'Get-OCIOperatoraccesscontrolOperatorControlsList', 'Invoke-OCIOperatoraccesscontrolApproveAccessRequest', 'Invoke-OCIOperatoraccesscontrolInteractionRequest', 'Invoke-OCIOperatoraccesscontrolRejectAccessRequest', 'Invoke-OCIOperatoraccesscontrolReviewAccessRequest', 'Invoke-OCIOperatoraccesscontrolRevokeAccessRequest', 'Move-OCIOperatoraccesscontrolOperatorControlAssignmentCompartment', 'Move-OCIOperatoraccesscontrolOperatorControlCompartment', 'New-OCIOperatoraccesscontrolOperatorControl', 'New-OCIOperatoraccesscontrolOperatorControlAssignment', 'Remove-OCIOperatoraccesscontrolOperatorControl', 'Remove-OCIOperatoraccesscontrolOperatorControlAssignment', 'Update-OCIOperatoraccesscontrolOperatorControl', 'Update-OCIOperatoraccesscontrolOperatorControlAssignment' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Operatoraccesscontrol' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_31_16.ps1
# # Module manifest for module 'OCI.PSModules.Managementdashboard' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Managementdashboard.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '75973f59-c3d0-4e5a-af34-7a8a94e15cfd' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Managementdashboard Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Managementdashboard.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIManagementdashboardDashboard', 'Get-OCIManagementdashboard', 'Get-OCIManagementdashboardManagementSavedSearch', 'Get-OCIManagementdashboardManagementSavedSearchesList', 'Get-OCIManagementdashboardsList', 'Import-OCIManagementdashboardDashboard', 'Move-OCIManagementdashboardManagementSavedSearchesCompartment', 'Move-OCIManagementdashboardsCompartment', 'New-OCIManagementdashboard', 'New-OCIManagementdashboardManagementSavedSearch', 'Remove-OCIManagementdashboard', 'Remove-OCIManagementdashboardManagementSavedSearch', 'Update-OCIManagementdashboard', 'Update-OCIManagementdashboardManagementSavedSearch' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Managementdashboard' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
3522.ps1
function Test-AzDtlVMsPerLabPolicy { $policy = Set-AzDtlVMsPerLabPolicy -MaxVMs 5 -LabName $labName -ResourceGroupName $rgname $readBack = Get-AzDtlVMsPerLabPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "5" $x.Threshold } } function Test-AzDtlVMsPerUserPolicy { $policy = Set-AzDtlVMsPerUserPolicy -MaxVMs 5 -LabName $labName -ResourceGroupName $rgname $readBack = Get-AzDtlVMsPerUserPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "5" $x.Threshold } } function Test-AzDtlAllowedVMSizesPolicy { $policy = Set-AzDtlAllowedVMSizesPolicy -Enable -LabName $labName -ResourceGroupName $rgname -VmSizes Standard_A3, Standard_A0 $readBack = Get-AzDtlAllowedVMSizesPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual '["Standard_A3","Standard_A0"]' $x.Threshold } } function Test-AzDtlAutoShutdownPolicy { $policy = Set-AzDtlAutoShutdownPolicy -Time "13:30:00" -LabName $labName -ResourceGroupName $rgname $readBack = Get-AzDtlAutoShutdownPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "1330" $x.DailyRecurrence.Time } } function Test-AzDtlAutoStartPolicy { $policy = Set-AzDtlAutoStartPolicy -Time "13:30:00" -LabName $labName -ResourceGroupName $rgname $readBack = Get-AzDtlAutoStartPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "1330" $x.WeeklyRecurrence.Time } $policy = Set-AzDtlAutoStartPolicy -Time "13:30:00" -LabName $labName -ResourceGroupName $rgname -Days Monday, Tuesday $readBack = Get-AzDtlAutoStartPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "1330" $x.WeeklyRecurrence.Time Assert-AreEqualArray ([System.DayOfWeek]::Monday, [System.DayOfWeek]::Tuesday) $x.WeeklyRecurrence.Weekdays } }
0
547.ps1
function Add-SPOCurrencyFieldtoList { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string] $listTitle, [Parameter(Mandatory=$true, Position=2)] [string] $fieldName ) $newField = "<Field Type='Currency' DisplayName='$fieldName' Name='$fieldName' required='FALSE'/>" Add-SPOField $listTitle $fieldName $newField }
0
sample_54_56.ps1
@{ GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" NestedModules="Microsoft.PowerShell.Commands.Management.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' FunctionsToExport = @() AliasesToExport = @("gcb", "gtz", "scb") CmdletsToExport=@("Add-Content", "Clear-Content", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-ChildItem", "Get-Clipboard", "Set-Clipboard", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Test-Connection", "Remove-ItemProperty", "Rename-ItemProperty", "Resolve-Path", "Set-Content", "Set-ItemProperty", "Get-TimeZone", "Stop-Computer", "Restart-Computer") } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDZALKsuUJ2I+wz # JJFUZn8RCcmowiJC42TpooVsdJsPsaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKeVUXH6RYmrdcmLG3AAuP6E # YWrhdHwdLWKjlNrjCO6EMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAl/YEjTdXbWAgrwV3TI6yNg4v3kXIZXDLjl7vtUiEnmC2bS4icXjts+0B # tZotyX3QvQahYEld40Qk6dwKnMT++KPB0NoFk+fuWwk695uHkyp05cDN8h+dbGR0 # pmCBgNdhf9eyGjTwlBQm330mn57jQ1A4HSuBiNtlN2wYtFyTdduRBeYGn9CPiLCe # /a4SbrgZ4Swzxe2FkYD3UIJClfhm31dRbr1XOnsVgTEID0VcjHmQLHRYGGb1smIN # 7yuzYVoC/+t0tkeyRSpyf1iBuLsX/YLKIxpUMy9l3T6BfFls2xATWdJB9YAFOEf5 # JrWdzq7H3mUD8mRYqmNmOgyFm0Gy2aGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDaDTX/A26879BEomXxWKUXV3nCyBWKNWf8tuG1Vio5lwIGZkY8ifXY # GBMyMDI0MDYxMzAzMjY0Ny43OThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hRRhjAiGA8yMDI0MDYxMjE2NTUz # NFoYDzIwMjQwNjEzMTY1NTM0WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqFFGG # AgEAMAoCAQACAgqKAgH/MAcCAQACAhXxMAoCBQDqFaMGAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKcAYJuCMVwWwbY2FpkH3dBlR5k8pu2hPUybInZ2UOxB # mKFqz9d1j5pZoKE6+nnghc10wrR09G0wQbomO7jHpxcJ/Udcc4sQkCFH9TvtXPYa # haaO5Esevepg1+JgHzqxznFZMij5P3ZuS/mpwF49/+6Dr8F3EYAolx7nKOnJmgQP # ZSd68ebuRDqy8hIaexz7QsrA6bp0oEPqBNy3b8bR1/Lhb/gbcwbP2bcceX/nobhX # k68+UOxFY8F8PcU4HK4sfStOEcr0j/p0XBgzH86Y8cqbBs6JPSS8GzkdRnU0Hh6S # jmwSjM+Ec/NRE2nQ9cXiEmPBxvmYHzImyXVwXYaqzq0xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDIYDN/u8ku4wjbJ388SpzNbEyCrVcQTo/siKD/W1oe # 6TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgXvZxikGDTFhYPhm5NOdfjKII # uZ5HgYchGhp7pSkPLLwwDQYJKoZIhvcNAQELBQAEggIAXY/sPTgRg/lfuu+JJ0ra # YkoEnenZQhkSd0T5lJdXgqKC6kMdboXkDN2YNTNuVGJHwoSswE7voEb8tR9aeiyZ # pHWK02LMsIhJrb/H3p2XGMXT9RgI94Ue3Vu5VXEPwm7HDVi3fYqOwi+MY1LjeFOc # fUO8p8uipQdcGWkZi64QfOJ1K5Kpuc0s0FrIetDHuRMUJTQoF9tMQo/smGf9O7Hc # UZfMcMVQM3iC+786xkbp7Jl1+1EgOWlxeNQuLztxTC1HNqu855WhZbviriPHOt7F # WvI0uRZnR4c7nx+cdEJEswKec5uiQHMosKi+4Q4ExKzg0rRvxshrFPEQNuK+HupP # lqepfJETvKIieHEzwW1lMEx7hgCYOoMs7ASOGaa4miPuLQccy0I+64F+0fUADomM # H+RpxwGEukQEJvGIwPn5nYnWHYtzi1xPfLnpLh3wZcagePxPZd8rIFAAElYocEZe # EQRG7sIG+mQSQvzin/54/G+awLbyfkDBSoQw1451ZnQnjRz+XjvJD14oTSarhMIi # 5sls97RZWCx9h7hufKmk3RSSqRzMai6BuARqgGP+f7vbb2xmXa7nS1DCjF1MjHQg # 6L2dl/9v+bo+b3reKpm8bp/CxTqQ7sbPATOKNjA3Sgd1MsxKGajbtTxu4HzFMrAB # 1nm2KXLSyT79XwvAigAhMT0= # SIG # End signature block
0