filename
stringlengths 5
142
| content
stringlengths 2
26M
| label
int64 0
1
|
|---|---|---|
3465.ps1
|
function Get-ResourceGroupName
{
return getAssetName
}
function Get-DataBoxJobName
{
return getAssetName
}
function Get-StorageAccountName
{
return getAssetName
}
function Get-ProviderLocation($provider)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
$namespace = $provider.Split("/")[0]
if($provider.Contains("/"))
{
$type = $provider.Substring($namespace.Length + 1)
$location = Get-AzResourceProvider -ProviderNamespace $namespace | where {$_.ResourceTypes[0].ResourceTypeName -eq $type}
if ($location -eq $null)
{
return "West US"
} else
{
return $location.Locations[0]
}
}
return "West US"
}
return "WestUS"
}
function TestSetup-CreateResourceGroup
{
$resourceGroupName = getAssetName
$rglocation = Get-ProviderLocation "North Europe"
$resourceGroup = New-AzResourceGroup -Name $resourceGroupName -location $rglocation -Force
return $resourceGroup
}
function Assert-Tags($tags1, $tags2)
{
if($tags1.count -ne $tags2.count)
{
throw "Tag size not equal. Tag1: $tags1.count Tag2: $tags2.count"
}
foreach($key in $tags1.Keys)
{
if($tags1[$key] -ne $tags2[$key])
{
throw "Tag content not equal. Key:$key Tags1:" + $tags1[$key] + "Tags2:" + $tags2[$key]
}
}
}
function Assert-CompressionTypes($types1, $types2)
{
if($types1.Count -ne $types1.Count)
{
throw "Array size not equal. Types1: $types1.count Types2: $types2.count"
}
foreach($value1 in $types1)
{
$found = $false
foreach($value2 in $types2)
{
if($value1.CompareTo($value2) -eq 0)
{
$found = $true
break
}
}
if(-Not($found))
{
throw "Compression content not equal. " + $value1 + " cannot be found in second array"
}
}
}
function SleepInRecordMode ([int]$SleepIntervalInSec)
{
$mode = $env:AZURE_TEST_MODE
if ( $mode -ne $null -and $mode.ToUpperInvariant() -eq "RECORD")
{
Wait-Seconds $SleepIntervalInSec
}
}
| 0
|
sample_45_89.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create an in-memory object for WebHookEventSubscriptionDestination.
.Description
Create an in-memory object for WebHookEventSubscriptionDestination.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.WebHookEventSubscriptionDestination
.Link
https://learn.microsoft.com/powershell/module/Az.EventGrid/new-azeventgridwebhookeventsubscriptiondestinationobject
#>
function New-AzEventGridWebHookEventSubscriptionDestinationObject {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.WebHookEventSubscriptionDestination')]
[CmdletBinding(PositionalBinding=$false)]
Param(
[Parameter(HelpMessage="The Azure Active Directory Application ID or URI to get the access token that will be included as the bearer token in delivery requests.")]
[string]
$AzureActiveDirectoryApplicationIdOrUri,
[Parameter(HelpMessage="The Azure Active Directory Tenant ID to get the access token that will be included as the bearer token in delivery requests.")]
[string]
$AzureActiveDirectoryTenantId,
[Parameter(HelpMessage="Delivery attribute details.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.IDeliveryAttributeMapping[]]
$DeliveryAttributeMapping,
[Parameter(HelpMessage="The URL that represents the endpoint of the destination of an event subscription.")]
[string]
$EndpointUrl,
[Parameter(HelpMessage="Maximum number of events per batch.")]
[int]
$MaxEventsPerBatch,
[Parameter(HelpMessage="Minimum TLS version that should be supported by webhook endpoint.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventGrid.PSArgumentCompleterAttribute("1.0", "1.1", "1.2")]
[string]
$MinimumTlsVersionAllowed,
[Parameter(HelpMessage="Preferred batch size in Kilobytes.")]
[int]
$PreferredBatchSizeInKilobyte
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.WebHookEventSubscriptionDestination]::New()
if ($PSBoundParameters.ContainsKey('AzureActiveDirectoryApplicationIdOrUri')) {
$Object.AzureActiveDirectoryApplicationIdOrUri = $AzureActiveDirectoryApplicationIdOrUri
}
if ($PSBoundParameters.ContainsKey('AzureActiveDirectoryTenantId')) {
$Object.AzureActiveDirectoryTenantId = $AzureActiveDirectoryTenantId
}
if ($PSBoundParameters.ContainsKey('DeliveryAttributeMapping')) {
$Object.DeliveryAttributeMapping = $DeliveryAttributeMapping
}
if ($PSBoundParameters.ContainsKey('EndpointUrl')) {
$Object.EndpointUrl = $EndpointUrl
}
if ($PSBoundParameters.ContainsKey('MaxEventsPerBatch')) {
$Object.MaxEventsPerBatch = $MaxEventsPerBatch
}
if ($PSBoundParameters.ContainsKey('MinimumTlsVersionAllowed')) {
$Object.MinimumTlsVersionAllowed = $MinimumTlsVersionAllowed
}
if ($PSBoundParameters.ContainsKey('PreferredBatchSizeInKilobyte')) {
$Object.PreferredBatchSizeInKilobyte = $PreferredBatchSizeInKilobyte
}
return $Object
}
}
# SIG # Begin signature block
# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDdOCPOcOkvdilv
# LTFwIdvqyr12rg4VFw/DP9E/DDeXcqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPWf
# ZVthcICn3GnyGMdOsc0eWQ7ZOJAPICf4/EQsjhs6MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAxQMne+k7COv+Wghhr/ff0cCZn5t6/DvCMA/D
# w/ACd+5XaB2ZsdUpY/6sy9YQjwuOwb38zZ+0YPidXTJ50uz1GQOE/4daHdOSb4ha
# BnP8ihYNMYbblK6vQ268st2dr45Rl/aDmh2sywO9cXXSG9uD72Vpf9rz7dd9Yk/Y
# 5kx4ejRcGbpjp/pvLsPDM588Yv9lTqbPKELVPpREzzwdAQ70Cdbeyx0U6rXTcnI3
# K3DmtgQcFtIzdSRmLAT+jcT1GfVMGVaxoCmLrIXhFS4QhbNAw1b5uqog4UTXPu/f
# MI7ByoVjcN+x3s5BMXcYpJz1xcCpPYsVZLaki89RpYKSyuCI0KGCF5cwgheTBgor
# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBn/Ly0PkkLeFGvv6yeY1XOszEprOFzhAO+
# oW/vWw8mMQIGZjK/xPABGBMyMDI0MDUxNjA2NDIxNC43NzNaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQAB
# AAAB8zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ2MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngq
# YAb+z3IfzNpZIWS/sgfXhlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz
# 8zcn1aUD5D2r2PhzVKjHtivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVo
# mOybQ7+2jc4afzj2XJQQSmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiI
# YlGf+XV2u6oQHAkMG56xYPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxc
# QGXjnAgeeVbbPbAoELhbw+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3x
# uw3R7fJsqe7pqsnjwvniP7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE
# 71EYrcSNrOGlTm5uqq+syO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxL
# CSzqXOVOzdqA8O5Xa3E41j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJ
# wBj2FQgTiVHacvMQDgSA7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wF
# kBrf2Sjn+ieNq6Fx0tWj8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+
# cwdJ39REU43aWCwn0C+XxwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEM
# jA3ApoUx9qDrDQokMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc
# 3liO4c7nXM/UKFcAm5w61FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15
# j7q8e6elg8/cD3bv0sW4Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2s
# gAUh7+OZnb9TwJE7pbEBPJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaA
# GooT4A15/7oNj9zyzRABTUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0
# SZ8Zq65iK2hQ8IMAOVxewCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B
# 7E2odVfs6H2EYCZxUS1rgReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQ
# n5IzhfCkraT1KnZF8TI3ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9v
# ErDVBDRMjGsE/HqqY7QTSTtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5
# aOa31FyCM17/pPTIKTRiKsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJ
# IcqopVAwdbNdroZi2HN8nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc0
# 5DW8JNvZ328Jps3LJCALt0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQBu+gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e8JcjAi
# GA8yMDI0MDUxNTEwMTQxMFoYDzIwMjQwNTE2MTAxNDEwWjB3MD0GCisGAQQBhFkK
# BAExLzAtMAoCBQDp7wlyAgEAMAoCAQACAhwfAgH/MAcCAQACAhK7MAoCBQDp8Fry
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAKr1B/rLMsdEgXnXDh5Ie+HB
# Kw4SvHEicuCL/PcvkybJxi0a/BBFfOY2z6SPDMitqmzQ9fWRBbA1L/qMqS2/QCTy
# C/SlgJr6jyPJqMdksnvmWbW4vBigqIZxb7a0zAcQiCWsQFH5wu30w7O6390PzNrO
# EJ/xTdGO1e7ypgQA0f8/Zqp4AxkPMQ9PT+q3bQdyBJNNdBrUV39ysRxw6uYCm93Y
# 1fK1F14UIOPsZ0G1o5AyrdgfJ6PsJEenttQ+yQF6t41fZYQRD9mj8WEij61kJ7Yi
# UPO8RlNaTVvt8C86L3PtBJUen48Qz35tPpT4LO0lWPwdS+sqjv6Fi633rVOhbvsx
# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AfPFCkOuA8wdMQABAAAB8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCp1phL0MM3KvKpucMMB/mZ
# AUj71EbO4X5KLQhWG8eWbjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi8
# 2TSLtuG4Vkp8wBmJk/T+RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg2cCr
# DQIdbsf0+tyBTTuQrs/4PYHMxi7QbHuul90FSlYwDQYJKoZIhvcNAQELBQAEggIA
# BfGJYQSAnp7rRB1dZTYP501xkaCVTD7Axg0sNQMFhj8pbztl+yNekuQ9Trqtaj2V
# fK+0wIB+/2Kg3yhQovqwqc7gafdhlLZfuO1pKBU69D5IL9hIXHpL/VM48Xtn9Wok
# m/Oqp+3WNFbKXXimZMptEbs26aOiTS5ewH54jRS8O5kEuXWLzze5czLM3LYtyUIw
# Gd3NBWPCt3vcTyQBGOqHJ4OfzHaKY6pmIJQBhNUMlL2vW5PrG57qKqvcE2tnLqVn
# aWxX1rzq48ESij1uOM/Fy31UAZeDE1fkPyQUmJwqrO9vr+KNDO3mJ5ZoPqTivTOd
# FtJ2C2DD7cJKmmlx0XWu1OIksTBUtPERk3abPISSJYZ4BEpvptK8JBUA8jRM35V9
# VtgwUKG/JaJGQwgDTXSeTy6XtD0olZuEcK6x0s/+VCM4QA+quh5JYqkKGQsyPGad
# chWSQBAH/zIrJL0+cRPhwoCeh2EbI6W+5R8TvFw05Vh4GA7CRUAjz+3TdSUUID4y
# uNPpdyNNakCydU5FvZBV0xPbJ4dHmaUWdqG8l+PTTxULhYBPzJs5ehkSXKfed3IF
# l3P3o0YkrUDoWt1S1v50znkbq890iemhuLUTt8njB4AhdjKhKmSK6h9cTKQEF1yY
# PQaKQgLQErJ1Oi7vvikrh4v1Zy65UXqDuKIoZsZ1k60=
# SIG # End signature block
| 0
|
sample_55_68.ps1
|
@{
GUID = "1DA87E53-152B-403E-98DC-74D7B4D63D59"
Author = "PowerShell"
CompanyName = "Microsoft Corporation"
Copyright = "Copyright (c) Microsoft Corporation."
ModuleVersion = "7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion = "3.0"
CmdletsToExport = @(
'Export-Alias', 'Get-Alias', 'Import-Alias', 'New-Alias', 'Remove-Alias', 'Set-Alias', 'Export-Clixml',
'Import-Clixml', 'Measure-Command', 'Trace-Command', 'ConvertFrom-Csv', 'ConvertTo-Csv', 'Export-Csv',
'Import-Csv', 'Get-Culture', 'Format-Custom', 'Get-Date', 'Set-Date', 'Write-Debug', 'Wait-Debugger',
'Register-EngineEvent', 'Write-Error', 'Get-Event', 'New-Event', 'Remove-Event', 'Unregister-Event',
'Wait-Event', 'Get-EventSubscriber', 'Invoke-Expression', 'Out-File', 'Get-FileHash', 'Export-FormatData',
'Get-FormatData', 'Update-FormatData', 'New-Guid', 'Format-Hex', 'Get-Host', 'Read-Host', 'Write-Host',
'ConvertTo-Html', 'Write-Information', 'ConvertFrom-Json', 'ConvertTo-Json', 'Test-Json', 'Format-List',
'Import-LocalizedData', 'Send-MailMessage', 'ConvertFrom-Markdown', 'Show-Markdown', 'Get-MarkdownOption',
'Set-MarkdownOption', 'Add-Member', 'Get-Member', 'Compare-Object', 'Group-Object', 'Measure-Object',
'New-Object', 'Select-Object', 'Sort-Object', 'Tee-Object', 'Register-ObjectEvent', 'Write-Output',
'Import-PowerShellDataFile', 'Write-Progress', 'Disable-PSBreakpoint', 'Enable-PSBreakpoint',
'Get-PSBreakpoint', 'Remove-PSBreakpoint', 'Set-PSBreakpoint', 'Get-PSCallStack', 'Export-PSSession',
'Import-PSSession', 'Get-Random', 'Get-SecureRandom', 'Invoke-RestMethod', 'Debug-Runspace', 'Get-Runspace',
'Disable-RunspaceDebug', 'Enable-RunspaceDebug', 'Get-RunspaceDebug', 'Start-Sleep', 'Join-String',
'Out-String', 'Select-String', 'ConvertFrom-StringData', 'Format-Table', 'New-TemporaryFile', 'New-TimeSpan',
'Get-TraceSource', 'Set-TraceSource', 'Add-Type', 'Get-TypeData', 'Remove-TypeData', 'Update-TypeData',
'Get-UICulture', 'Get-Unique', 'Get-Uptime', 'Clear-Variable', 'Get-Variable', 'New-Variable',
'Remove-Variable', 'Set-Variable', 'Get-Verb', 'Write-Verbose', 'Write-Warning', 'Invoke-WebRequest',
'Format-Wide', 'ConvertTo-Xml', 'Select-Xml', 'Get-Error', 'Update-List', 'Unblock-File'
)
FunctionsToExport = @()
AliasesToExport = @('fhx')
NestedModules = @("Microsoft.PowerShell.Commands.Utility.dll")
HelpInfoURI = 'https://aka.ms/powershell73-help'
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABNCVSZz1rOWiT
# w+vGPnwDRC41vPJncfHs3HcOOx4I46CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICvgCI9lBrSM9eTXBET5P5Nb
# 19+nZnyUuwlDL40vJitfMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAAKkjt4fBk73iFR+KUCE1+38wsNM+Pd+F8G2pjX0GMPrshhWbxfN0PzHA
# /UAWDaiVi+z9dgSeqehax8S6Bpr28SQVpZDNumFmRnLBZYlIEss9E8eU42d54m0T
# bMJKHaoOwYW5LTZI8bFltsIB8sA+zYZ6Ej7XLx481UX/Jvzu55bfMas9n6P2OsgF
# cgsZKq6o2Z+cCELdgkpOdLWuaGQxnuwN6+4s6qoTMzT7f3tozAyS6mIJQRMQDDzz
# fhizN47/ltvBxqwKsWzzOMtA44Hqd2DPq5fJFT5p55JuHM06xwDHN9DjxBRFP1zS
# QnZz/RwDbMqFFNCxvvPRzNtha4zEiaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCeUtkhj1lo6VZjK194rTKioiSA2IJ+nVnn68IjegybawIGZpZkuVGJ
# GBMyMDI0MDcxNzAxMjA0OS45NjlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOpBi+AwIhgPMjAyNDA3MTcwODE2MzJaGA8yMDI0MDcxODA4MTYzMlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6kGL4AIBADAKAgEAAgIDOQIB/zAHAgEAAgIRhzAK
# AgUA6kLdYAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJ4/epY/wm8ynoYZ
# 4gW18O/C3A2ns7oPkIAQXGCVtmg83+9oE/WoJVVFOR+U1UCnFlK6cZ7dAHzrJ0Wv
# DxYC4uNNQfOPsSIJoeq5eKL+Xb53OHhv2J8p+Npcn7UyWEQuwE1a3jWnXcQ5YvTk
# 5lFMWynOMb2er9WvfC4/Aetihzh8MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgDUBg1PULFUtK102WkPKW2Nx98KY1RcAywRwwMwQqN7MwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH
# 9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 5Y9qwPM9tAujAAEAAAHlMCIEIICnQ8W8oAGaWKOege5vwIQtBdhe/5XE9Lggec82
# Ew9RMA0GCSqGSIb3DQEBCwUABIICAKG0jSLQ8wkvDdPZlvwyopmnsd++CK5vUxkC
# CH5SDIOrLbK3uijMz+aSmirKygu3M04+8tkBTNdN1OAieFXObYSRWZmQuM3QSBXS
# /nrkcR0iPNHy71iK8aj09wrGGOFAyQLnbnH1etF95DnSvCU1cdPsIkhi+3PXQdWn
# 5RJtxooqga/xa0QFGBPVDOCRSwp+G/MesrjA9dt17qBsuJCNILLh1jzCBeTw05V7
# jJim/zvc365pnaFG36U9h7rv3q+s0YuPZ2nK/XDSVv7g7U+3o7bL6sO8QmNRFiLR
# s8ygbH73/7O5DHp8LBwMr5MjxZgn7VQ2hf8f90t1l8hZynvl65BzLS2kFnBfBQ50
# 1SrfHgiwBmh2KG5ne1vZoEgRXQm6D8CsulAE5kpyN0MzSjEjblpxYIx2J2ymf531
# 8YLP3QoE5zc27ncRg0woSWSV3WHbjonNGoCEWqiUHRYLlzUM1npnWrUtZJey0cC0
# G6Wx8MB6XTEyiG4LVnltnw6LirntjcyJbDQk93cj4psJ8hnAycMqSE4y7wbRl3zk
# CdVgUuBhJtmM+8cyJhRycamhFbNIvSulJRk2TlAansag9zDD5PAOoxfzrcUa+TDX
# whbGOsDcA3+B25mM3ZiNAbibFxJx2TmawPJtx3anqJpj3UTyv43hcFmtikO7dt05
# 2lXL5g3V
# SIG # End signature block
| 0
|
Hack ESXi_2.ps1
|
$screen = " You see here a virtual switch. ------------ ------
#...........| |....|
--------------- ###------------ |...(|
|..%...........|########## ###-@...|
|...%...........### # ## |....|
+.......<......| ### ### |..!.|
--------------- ### ### ------
---.----- ###
|.......|####
---------
.
Clyde the Sysadmin St:7 Dx:9 Co:10 In:18 Wi:18 Ch:6 Chaotic Evil
Dlvl:3 $:120 HP:39(41) Pw:36(36) AC:6 Exp:5 T:1073
"
Set-VMHostAdvancedConfiguration -name Annotations.WelcomeMessage -value $screen
| 0
|
473.ps1
|
function Start-PPScript{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String]
$Name,
[Parameter(Mandatory=$false)]
[String]
$Arguments
)
$ScriptShortcut = Get-PPScript -Name $Name -Shortcut
$(if( -not $ScriptShortcut){
Get-PPScript -Name $Name | select -First 1
}else{
Get-PPScript -Name $ScriptShortcut.Filename
}) | %{
iex "& `"$($_.Fullname)`" $(if($Arguments){$Arguments})"
}
}
| 0
|
Set-Computername_8.ps1
|
function Set-ComputerName {
param( [switch]$help,
[string]$computerName=$(read-host "Please specify the new name of the computer"))
$usage = "set-ComputerName -computername AnewName"
if ($help) {Write-Host $usage;break}
$computer = Get-WmiObject Win32_ComputerSystem
$computer.Rename($computerName)
}
| 0
|
4351.ps1
|
function Publish-PSArtifactUtility {
[CmdletBinding(PositionalBinding = $false)]
Param
(
[Parameter(Mandatory = $true, ParameterSetName = 'PublishModule')]
[ValidateNotNullOrEmpty()]
[PSModuleInfo]
$PSModuleInfo,
[Parameter(Mandatory = $true, ParameterSetName = 'PublishScript')]
[ValidateNotNullOrEmpty()]
[PSCustomObject]
$PSScriptInfo,
[Parameter(Mandatory = $true, ParameterSetName = 'PublishModule')]
[ValidateNotNullOrEmpty()]
[string]
$ManifestPath,
[Parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[string]
$Destination,
[Parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[string]
$Repository,
[Parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[string]
$NugetApiKey,
[Parameter(Mandatory = $false)]
[pscredential]
$Credential,
[Parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[string]
$NugetPackageRoot,
[Parameter(ParameterSetName = 'PublishModule')]
[Version]
$FormatVersion,
[Parameter(ParameterSetName = 'PublishModule')]
[string]
$ReleaseNotes,
[Parameter(ParameterSetName = 'PublishModule')]
[string[]]
$Tags,
[Parameter(ParameterSetName = 'PublishModule')]
[switch]
$SkipAutomaticTags,
[Parameter(ParameterSetName = 'PublishModule')]
[Uri]
$LicenseUri,
[Parameter(ParameterSetName = 'PublishModule')]
[Uri]
$IconUri,
[Parameter(ParameterSetName = 'PublishModule')]
[Uri]
$ProjectUri,
[Parameter(ParameterSetName = 'PublishModule')]
[string[]]
$Exclude
)
Write-Verbose "Calling Publish-PSArtifactUtility"
Install-NuGetClientBinaries -CallerPSCmdlet $PSCmdlet -BootstrapNuGetExe
$PSArtifactType = $script:PSArtifactTypeModule
$Name = $null
$Description = $null
$Version = ""
$Author = $null
$CompanyName = $null
$Copyright = $null
$requireLicenseAcceptance = "false"
if ($PSModuleInfo) {
$Name = $PSModuleInfo.Name
$Description = $PSModuleInfo.Description
$Version = $PSModuleInfo.Version
$Author = $PSModuleInfo.Author
$CompanyName = $PSModuleInfo.CompanyName
$Copyright = $PSModuleInfo.Copyright
if ($PSModuleInfo.PrivateData -and
($PSModuleInfo.PrivateData.GetType().ToString() -eq "System.Collections.Hashtable") -and
$PSModuleInfo.PrivateData["PSData"] -and
($PSModuleInfo.PrivateData["PSData"].GetType().ToString() -eq "System.Collections.Hashtable")
) {
if ( -not $Tags -and $PSModuleInfo.PrivateData.PSData["Tags"]) {
$Tags = $PSModuleInfo.PrivateData.PSData.Tags
}
if ( -not $ReleaseNotes -and $PSModuleInfo.PrivateData.PSData["ReleaseNotes"]) {
$ReleaseNotes = $PSModuleInfo.PrivateData.PSData.ReleaseNotes
}
if ( -not $LicenseUri -and $PSModuleInfo.PrivateData.PSData["LicenseUri"]) {
$LicenseUri = $PSModuleInfo.PrivateData.PSData.LicenseUri
}
if ( -not $IconUri -and $PSModuleInfo.PrivateData.PSData["IconUri"]) {
$IconUri = $PSModuleInfo.PrivateData.PSData.IconUri
}
if ( -not $ProjectUri -and $PSModuleInfo.PrivateData.PSData["ProjectUri"]) {
$ProjectUri = $PSModuleInfo.PrivateData.PSData.ProjectUri
}
if ($PSModuleInfo.PrivateData.PSData["Prerelease"]) {
$psmoduleInfoPrereleaseString = $PSModuleInfo.PrivateData.PSData.Prerelease
if ($psmoduleInfoPrereleaseString -and $psmoduleInfoPrereleaseString.StartsWith("-")) {
$Version = [string]$Version + $psmoduleInfoPrereleaseString
}
else {
$Version = [string]$Version + "-" + $psmoduleInfoPrereleaseString
}
}
if ($PSModuleInfo.PrivateData.PSData["RequireLicenseAcceptance"]) {
$requireLicenseAcceptance = $PSModuleInfo.PrivateData.PSData.requireLicenseAcceptance.ToString().ToLower()
if ($requireLicenseAcceptance -eq "true") {
if ($FormatVersion -and ($FormatVersion.Major -lt $script:PSGetRequireLicenseAcceptanceFormatVersion.Major)) {
$message = $LocalizedData.requireLicenseAcceptanceNotSupported -f ($FormatVersion)
ThrowError -ExceptionName "System.InvalidOperationException" `
-ExceptionMessage $message `
-ErrorId "requireLicenseAcceptanceNotSupported" `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidData
}
if (-not $LicenseUri) {
$message = $LocalizedData.LicenseUriNotSpecified
ThrowError -ExceptionName "System.InvalidOperationException" `
-ExceptionMessage $message `
-ErrorId "LicenseUriNotSpecified" `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidData
}
$LicenseFilePath = Join-PathUtility -Path $NugetPackageRoot -ChildPath 'License.txt' -PathType File
if (-not $LicenseFilePath -or -not (Test-Path -Path $LicenseFilePath -PathType Leaf)) {
$message = $LocalizedData.LicenseTxtNotFound
ThrowError -ExceptionName "System.InvalidOperationException" `
-ExceptionMessage $message `
-ErrorId "LicenseTxtNotFound" `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidData
}
if ((Get-Content -LiteralPath $LicenseFilePath) -eq $null) {
$message = $LocalizedData.LicenseTxtEmpty
ThrowError -ExceptionName "System.InvalidOperationException" `
-ExceptionMessage $message `
-ErrorId "LicenseTxtEmpty" `
-CallerPSCmdlet $PSCmdlet `
-ErrorCategory InvalidData
}
if (-not $FormatVersion) {
$FormatVersion = $script:CurrentPSGetFormatVersion
}
}
elseif ($requireLicenseAcceptance -ne "false") {
$InvalidValueForRequireLicenseAcceptance = $LocalizedData.InvalidValueBoolean -f ($requireLicenseAcceptance, "requireLicenseAcceptance")
Write-Warning -Message $InvalidValueForRequireLicenseAcceptance
}
}
}
}
else {
$PSArtifactType = $script:PSArtifactTypeScript
$Name = $PSScriptInfo.Name
$Description = $PSScriptInfo.Description
$Version = $PSScriptInfo.Version
$Author = $PSScriptInfo.Author
$CompanyName = $PSScriptInfo.CompanyName
$Copyright = $PSScriptInfo.Copyright
if ($PSScriptInfo.'Tags') {
$Tags = $PSScriptInfo.Tags
}
if ($PSScriptInfo.'ReleaseNotes') {
$ReleaseNotes = $PSScriptInfo.ReleaseNotes
}
if ($PSScriptInfo.'LicenseUri') {
$LicenseUri = $PSScriptInfo.LicenseUri
}
if ($PSScriptInfo.'IconUri') {
$IconUri = $PSScriptInfo.IconUri
}
if ($PSScriptInfo.'ProjectUri') {
$ProjectUri = $PSScriptInfo.ProjectUri
}
}
$nuspecFiles = ""
if ($Exclude) {
$nuspecFileExcludePattern = $Exclude -Join ";"
$nuspecFiles = @{ src = "**/*.*"; exclude = $nuspecFileExcludePattern }
}
if (-not $Tags) {
$Tags = @()
}
if ($FormatVersion) {
$Tags += "$($script:PSGetFormatVersion)_$FormatVersion"
}
$DependentModuleDetails = @()
if ($PSScriptInfo) {
$Tags += "PSScript"
if ($PSScriptInfo.DefinedCommands -and -not $SkipAutomaticTags) {
if ($PSScriptInfo.DefinedFunctions) {
$Tags += "$($script:Includes)_Function"
$Tags += $PSScriptInfo.DefinedFunctions | Microsoft.PowerShell.Core\ForEach-Object { "$($script:Function)_$_" }
}
if ($PSScriptInfo.DefinedWorkflows) {
$Tags += "$($script:Includes)_Workflow"
$Tags += $PSScriptInfo.DefinedWorkflows | Microsoft.PowerShell.Core\ForEach-Object { "$($script:Workflow)_$_" }
}
$Tags += $PSScriptInfo.DefinedCommands | Microsoft.PowerShell.Core\ForEach-Object { "$($script:Command)_$_" }
}
$ValidateAndGetScriptDependencies_Params = @{
Repository = $Repository
DependentScriptInfo = $PSScriptInfo
CallerPSCmdlet = $PSCmdlet
Verbose = $VerbosePreference
Debug = $DebugPreference
}
if ($PSBoundParameters.ContainsKey('Credential')) {
$ValidateAndGetScriptDependencies_Params.Add('Credential', $Credential)
}
$DependentModuleDetails += ValidateAndGet-ScriptDependencies @ValidateAndGetScriptDependencies_Params
}
else {
$Tags += "PSModule"
$ModuleManifestHashTable = Get-ManifestHashTable -Path $ManifestPath
if (-not $SkipAutomaticTags) {
if ($PSModuleInfo.ExportedCommands.Count) {
if ($PSModuleInfo.ExportedCmdlets.Count) {
$Tags += "$($script:Includes)_Cmdlet"
$Tags += $PSModuleInfo.ExportedCmdlets.Keys | Microsoft.PowerShell.Core\ForEach-Object { "$($script:Cmdlet)_$_" }
if ($ModuleManifestHashTable -and $ModuleManifestHashTable.ContainsKey('CmdletsToExport') -and ($ModuleManifestHashTable.CmdletsToExport -eq "*")) {
$WarningMessage = $LocalizedData.ShouldIncludeCmdletsToExport -f ($ManifestPath)
Write-Warning -Message $WarningMessage
}
}
if ($PSModuleInfo.ExportedFunctions.Count) {
$Tags += "$($script:Includes)_Function"
$Tags += $PSModuleInfo.ExportedFunctions.Keys | Microsoft.PowerShell.Core\ForEach-Object { "$($script:Function)_$_" }
if ($ModuleManifestHashTable -and $ModuleManifestHashTable.ContainsKey('FunctionsToExport') -and ($ModuleManifestHashTable.FunctionsToExport -eq "*")) {
$WarningMessage = $LocalizedData.ShouldIncludeFunctionsToExport -f ($ManifestPath)
Write-Warning -Message $WarningMessage
}
}
$Tags += $PSModuleInfo.ExportedCommands.Keys | Microsoft.PowerShell.Core\ForEach-Object { "$($script:Command)_$_" }
}
$dscResourceNames = Get-ExportedDscResources -PSModuleInfo $PSModuleInfo
if ($dscResourceNames) {
$Tags += "$($script:Includes)_DscResource"
$Tags += $dscResourceNames | Microsoft.PowerShell.Core\ForEach-Object { "$($script:DscResource)_$_" }
if ($ModuleManifestHashTable -and
($ModuleManifestHashTable.ContainsKey("DscResourcesToExport") -and
$ModuleManifestHashTable.DscResourcesToExport -eq "*") -or
-not $ModuleManifestHashTable.ContainsKey("DscResourcesToExport")) {
$WarningMessage = $LocalizedData.ShouldIncludeDscResourcesToExport -f ($ManifestPath)
Write-Warning -Message $WarningMessage
}
}
$RoleCapabilityNames = Get-AvailableRoleCapabilityName -PSModuleInfo $PSModuleInfo
if ($RoleCapabilityNames) {
$Tags += "$($script:Includes)_RoleCapability"
$Tags += $RoleCapabilityNames | Microsoft.PowerShell.Core\ForEach-Object { "$($script:RoleCapability)_$_" }
}
}
$GetModuleDependencies_Params = @{
PSModuleInfo = $PSModuleInfo
Repository = $Repository
CallerPSCmdlet = $PSCmdlet
Verbose = $VerbosePreference
Debug = $DebugPreference
}
if ($PSBoundParameters.ContainsKey('Credential')) {
$GetModuleDependencies_Params.Add('Credential', $Credential)
}
$DependentModuleDetails = Get-ModuleDependencies @GetModuleDependencies_Params
}
$dependencies = @()
ForEach ($Dependency in $DependentModuleDetails) {
$ModuleName = $Dependency.Name
$VersionString = ""
if ($Dependency.Keys -Contains "RequiredVersion") {
$VersionString = "[$($Dependency.RequiredVersion)]"
}
elseif ($Dependency.Keys -Contains 'MinimumVersion' -and $Dependency.Keys -Contains 'MaximumVersion') {
$VersionString = "[$($Dependency.MinimumVersion),$($Dependency.MaximumVersion)]"
}
elseif ($Dependency.Keys -Contains 'MaximumVersion') {
$VersionString = "(,$($Dependency.MaximumVersion)]"
}
elseif ($Dependency.Keys -Contains 'MinimumVersion') {
$VersionString = "$($Dependency.MinimumVersion)"
}
$props = @{
id = $ModuleName
version = $VersionString
}
$dependencyObject = New-Object -TypeName PSCustomObject -Property $props
$dependencies += $dependencyObject
}
$params = @{
OutputPath = $NugetPackageRoot
Id = $Name
Version = $Version
Authors = $Author
Owners = $CompanyName
Description = $Description
ReleaseNotes = $ReleaseNotes
RequireLicenseAcceptance = ($requireLicenseAcceptance -eq $true)
Copyright = $Copyright
Tags = $Tags
LicenseUrl = $LicenseUri
ProjectUrl = $ProjectUri
IconUrl = $IconUri
Dependencies = $dependencies
}
if ($nuspecFiles) {
$params.Add('Files', $nuspecFiles)
}
try {
$NuspecFullName = New-NuspecFile @params
}
catch {
Write-Error -Message "Failed to create nuspec file $_.Exception" -ErrorAction Stop
}
try {
if ($DotnetCommandPath) {
$NupkgFullName = New-NugetPackage -NuspecPath $NuspecFullName -NugetPackageRoot $NugetPackageRoot -UseDotnetCli -Verbose:$VerbosePreference
}
elseif ($NuGetExePath) {
$NupkgFullName = New-NugetPackage -NuspecPath $NuspecFullName -NugetPackageRoot $NugetPackageRoot -NugetExePath $NuGetExePath -Verbose:$VerbosePreference
}
Write-Verbose -Message "Successfully created nuget package at $NupkgFullName"
}
catch {
if ($PSArtifactType -eq $script:PSArtifactTypeModule) {
$message = $LocalizedData.FailedToCreateCompressedModule -f ($_.Exception.message)
$errorId = "FailedToCreateCompressedModule"
}
else {
$message = $LocalizedData.FailedToCreateCompressedScript -f ($_.Exception.message)
$errorId = "FailedToCreateCompressedScript"
}
Write-Error -Message $message -ErrorId $errorId -Category InvalidOperation -ErrorAction Stop
}
try {
if ($DotnetCommandPath) {
Publish-NugetPackage -NupkgPath $NupkgFullName -Destination $Destination -NugetApiKey $NugetApiKey -UseDotnetCli -Verbose:$VerbosePreference
}
elseif ($NuGetExePath) {
Publish-NugetPackage -NupkgPath $NupkgFullName -Destination $Destination -NugetApiKey $NugetApiKey -NugetExePath $NuGetExePath -Verbose:$VerbosePreference
}
if ($PSArtifactType -eq "Module") {
$message = $LocalizedData.PublishedSuccessfully -f ($Name, $Destination, $Name)
}
if ($PSArtifactType -eq "Script") {
$message = $LocalizedData.PublishedScriptSuccessfully -f ($Name, $Destination, $Name)
}
Write-Verbose -Message $message
}
catch {
if ( $NugetApiKey -eq "VSTS" -and ($_.Exception.Message -match "Cannot prompt for input in non-interactive mode.")) {
$message = $LocalizedData.RegisterVSTSFeedAsNuGetPackageSource -f ($Destination, $script:VSTSAuthenticatedFeedsDocUrl)
}
else {
$message = $_.Exception.message
}
if ($PSArtifactType -eq "Module") {
$errorMessage = $LocalizedData.FailedToPublish -f ($Name, $message)
$errorId = "FailedToPublishTheModule"
}
if ($PSArtifactType -eq "Script") {
$errorMessage = $LocalizedData.FailedToPublishScript -f ($Name, $message)
$errorId = "FailedToPublishTheScript"
}
Write-Error -Message $errorMessage -ErrorId $errorId -Category InvalidOperation -ErrorAction Stop
}
}
| 0
|
sample_28_47.ps1
|
#
# Module manifest for module 'OCI.PSModules.Visualbuilder'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Visualbuilder.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '30071ced-fbc1-4b5d-9ea5-b0fb2ecea5bc'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Visualbuilder Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Visualbuilder.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIVisualbuilderVbInstance',
'Get-OCIVisualbuilderVbInstancesList',
'Get-OCIVisualbuilderWorkRequest',
'Get-OCIVisualbuilderWorkRequestErrorsList',
'Get-OCIVisualbuilderWorkRequestLogsList',
'Get-OCIVisualbuilderWorkRequestsList',
'Invoke-OCIVisualbuilderRequestSummarizedApplications',
'Move-OCIVisualbuilderVbInstanceCompartment',
'New-OCIVisualbuilderVbInstance',
'Remove-OCIVisualbuilderVbInstance',
'Start-OCIVisualbuilderVbInstance',
'Stop-OCIVisualbuilderVbInstance',
'Update-OCIVisualbuilderVbInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Visualbuilder'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
Ping-Host.ps1
|
function Ping-Host {param( [string]$HostName,
[int32]$Requests = 3)
for ($i = 1; $i -le $Requests; $i++) {
$Result = Get-WmiObject -Class Win32_PingStatus -ComputerName . -Filter "Address='$HostName'"
Start-Sleep -Seconds 1
if ($Result.StatusCode -ne 0) {return $FALSE}
}
return $TRUE
}
| 0
|
1397.ps1
|
function Grant-CComPermission
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$Identity,
[Parameter(Mandatory=$true,ParameterSetName='DefaultAccessPermissionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='MachineAccessRestrictionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='DefaultAccessPermissionDeny')]
[Parameter(Mandatory=$true,ParameterSetName='MachineAccessRestrictionDeny')]
[Switch]
$Access,
[Parameter(Mandatory=$true,ParameterSetName='DefaultLaunchPermissionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='MachineLaunchRestrictionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='DefaultLaunchPermissionDeny')]
[Parameter(Mandatory=$true,ParameterSetName='MachineLaunchRestrictionDeny')]
[Switch]
$LaunchAndActivation,
[Parameter(Mandatory=$true,ParameterSetName='DefaultAccessPermissionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='DefaultLaunchPermissionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='DefaultAccessPermissionDeny')]
[Parameter(Mandatory=$true,ParameterSetName='DefaultLaunchPermissionDeny')]
[Switch]
$Default,
[Parameter(Mandatory=$true,ParameterSetName='MachineAccessRestrictionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='MachineLaunchRestrictionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='MachineAccessRestrictionDeny')]
[Parameter(Mandatory=$true,ParameterSetName='MachineLaunchRestrictionDeny')]
[Switch]
$Limits,
[Parameter(Mandatory=$true,ParameterSetName='DefaultAccessPermissionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='MachineAccessRestrictionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='DefaultLaunchPermissionAllow')]
[Parameter(Mandatory=$true,ParameterSetName='MachineLaunchRestrictionAllow')]
[Switch]
$Allow,
[Parameter(Mandatory=$true,ParameterSetName='DefaultAccessPermissionDeny')]
[Parameter(Mandatory=$true,ParameterSetName='MachineAccessRestrictionDeny')]
[Parameter(Mandatory=$true,ParameterSetName='DefaultLaunchPermissionDeny')]
[Parameter(Mandatory=$true,ParameterSetName='MachineLaunchRestrictionDeny')]
[Switch]
$Deny,
[Parameter(ParameterSetName='DefaultAccessPermissionAllow')]
[Parameter(ParameterSetName='MachineAccessRestrictionAllow')]
[Parameter(ParameterSetName='DefaultAccessPermissionDeny')]
[Parameter(ParameterSetName='MachineAccessRestrictionDeny')]
[Switch]
$Local,
[Parameter(ParameterSetName='DefaultAccessPermissionAllow')]
[Parameter(ParameterSetName='MachineAccessRestrictionAllow')]
[Parameter(ParameterSetName='DefaultAccessPermissionDeny')]
[Parameter(ParameterSetName='MachineAccessRestrictionDeny')]
[Switch]
$Remote,
[Parameter(ParameterSetName='DefaultLaunchPermissionAllow')]
[Parameter(ParameterSetName='MachineLaunchRestrictionAllow')]
[Parameter(ParameterSetName='DefaultLaunchPermissionDeny')]
[Parameter(ParameterSetName='MachineLaunchRestrictionDeny')]
[Switch]
$LocalLaunch,
[Parameter(ParameterSetName='DefaultLaunchPermissionAllow')]
[Parameter(ParameterSetName='MachineLaunchRestrictionAllow')]
[Parameter(ParameterSetName='DefaultLaunchPermissionDeny')]
[Parameter(ParameterSetName='MachineLaunchRestrictionDeny')]
[Switch]
$RemoteLaunch,
[Parameter(ParameterSetName='DefaultLaunchPermissionAllow')]
[Parameter(ParameterSetName='MachineLaunchRestrictionAllow')]
[Parameter(ParameterSetName='DefaultLaunchPermissionDeny')]
[Parameter(ParameterSetName='MachineLaunchRestrictionDeny')]
[Switch]
$LocalActivation,
[Parameter(ParameterSetName='DefaultLaunchPermissionAllow')]
[Parameter(ParameterSetName='MachineLaunchRestrictionAllow')]
[Parameter(ParameterSetName='DefaultLaunchPermissionDeny')]
[Parameter(ParameterSetName='MachineLaunchRestrictionDeny')]
[Switch]
$RemoteActivation,
[Switch]
$PassThru
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$account = Resolve-CIdentity -Name $Identity -ErrorAction:$ErrorActionPreference
if( -not $account )
{
return
}
$comArgs = @{ }
if( $pscmdlet.ParameterSetName -like 'Default*' )
{
$typeDesc = 'default security permissions'
$comArgs.Default = $true
}
else
{
$typeDesc = 'security limits'
$comArgs.Limits = $true
}
if( $pscmdlet.ParameterSetName -like '*Access*' )
{
$permissionsDesc = 'Access'
$comArgs.Access = $true
}
else
{
$permissionsDesc = 'Launch and Activation'
$comArgs.LaunchAndActivation = $true
}
$currentSD = Get-CComSecurityDescriptor @comArgs -ErrorAction:$ErrorActionPreference
$newSd = ([wmiclass]'win32_securitydescriptor').CreateInstance()
$newSd.ControlFlags = $currentSD.ControlFlags
$newSd.Group = $currentSD.Group
$newSd.Owner = $currentSD.Owner
$trustee = ([wmiclass]'win32_trustee').CreateInstance()
$trustee.SIDString = $account.Sid.Value
$ace = ([wmiclass]'win32_ace').CreateInstance()
$accessMask = [Carbon.Security.ComAccessRights]::Execute
if( $Local -or $LocalLaunch )
{
$accessMask = $accessMask -bor [Carbon.Security.ComAccessRights]::ExecuteLocal
}
if( $Remote -or $RemoteLaunch )
{
$accessMask = $accessMask -bor [Carbon.Security.ComAccessRights]::ExecuteRemote
}
if( $LocalActivation )
{
$accessMask = $accessMask -bor [Carbon.Security.ComAccessRights]::ActivateLocal
}
if( $RemoteActivation )
{
$accessMask = $accessMask -bor [Carbon.Security.ComAccessRights]::ActivateRemote
}
Write-Verbose ("Granting {0} {1} COM {2} {3}." -f $Identity,([Carbon.Security.ComAccessRights]$accessMask),$permissionsDesc,$typeDesc)
$ace.AccessMask = $accessMask
$ace.Trustee = $trustee
$newDacl = $currentSD.DACL |
Where-Object { $_.Trustee.SIDString -ne $trustee.SIDString } |
ForEach-Object { $_.PsObject.BaseObject }
$newDacl += $ace.PsObject.BaseObject
$newSd.DACL = $newDacl
$converter = New-Object Management.ManagementClass 'Win32_SecurityDescriptorHelper'
$sdBytes = $converter.Win32SDToBinarySD( $newSd )
$regValueName = $pscmdlet.ParameterSetName -replace '(Allow|Deny)$',''
Set-CRegistryKeyValue -Path $ComRegKeyPath -Name $regValueName -Binary $sdBytes.BinarySD -ErrorAction:$ErrorActionPreference
if( $PassThru )
{
Get-CComPermission -Identity $Identity @comArgs -ErrorAction:$ErrorActionPreference
}
}
Set-Alias -Name 'Grant-ComPermissions' -Value 'Grant-CComPermission'
| 0
|
sample_36_20.ps1
|
#
# Module manifest for module 'OCI.PSModules.Ocvp'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ocvp.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '05a069dc-62d0-41ee-b47b-3fe73fff277d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ocvp Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocvp.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOcvpCluster', 'Get-OCIOcvpClustersList',
'Get-OCIOcvpEsxiHost', 'Get-OCIOcvpEsxiHostsList', 'Get-OCIOcvpSddc',
'Get-OCIOcvpSddcsList', 'Get-OCIOcvpSupportedCommitmentsList',
'Get-OCIOcvpSupportedHostShapesList',
'Get-OCIOcvpSupportedVmwareSoftwareVersionsList',
'Get-OCIOcvpWorkRequest', 'Get-OCIOcvpWorkRequestErrorsList',
'Get-OCIOcvpWorkRequestLogsList', 'Get-OCIOcvpWorkRequestsList',
'Invoke-OCIOcvpDowngradeHcx', 'Invoke-OCIOcvpInplaceUpgrade',
'Invoke-OCIOcvpRefreshHcxLicenseStatus',
'Invoke-OCIOcvpReplaceHost', 'Invoke-OCIOcvpRetrievePassword',
'Invoke-OCIOcvpSwapBilling', 'Invoke-OCIOcvpUpgradeHcx',
'Move-OCIOcvpSddcCompartment', 'New-OCIOcvpCluster',
'New-OCIOcvpEsxiHost', 'New-OCIOcvpSddc', 'Remove-OCIOcvpCluster',
'Remove-OCIOcvpEsxiHost', 'Remove-OCIOcvpSddc',
'Stop-OCIOcvpDowngradeHcx', 'Update-OCIOcvpCluster',
'Update-OCIOcvpEsxiHost', 'Update-OCIOcvpSddc'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocvp'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
Deploy VM with Static IP.ps1
|
# 1. Create a simple customizations spec:
$custSpec = New-OSCustomizationSpec -Type NonPersistent -OSType Windows -OrgName “My Organization” -FullName “MyVM” -Domain “MyDomain” –DomainAdminUsername “user” –DomainAdminPassword “password”
# 2. Modify the default network customization settings:
$custSpec | Get-OSCustomizationNicMapping | Set-OSCustomizationNicMapping -IpMode UseStaticIP -IpAddress 192.168.121.228 -SubnetMask 255.255.248.0 -Dns 192.168.108.1 -DefaultGateway 192.168.108.1
# 3. Deploy a VM from a template using the newly created customization:
New-VM -Name “MyNewVM” -Template $template -VMHost $vmHost -OSCustomizationSpec $custSpec
| 0
|
sample_42_6.ps1
|
#
# This private script adds $InterfaceType members to $psObject which invokes on $wrappedObject
#
Param(
$psObject,
$wrappedObject,
[Type]$InterfaceType
)
function GetInvoker
{
Param(
$Target,
$Method
)
if ($Method.IsGenericMethodDefinition) {
return {
$t = $Target
$m = $Method.MakeGenericMethod($args)
if (!$m.GetParameters()) {
return $m.Invoke($t, @())
}
$o = New-Object PSObject
Add-Member -InputObject $o -MemberType ScriptMethod -Name Invoke -Value {
[NuGetConsole.Host.PowerShell.Implementation.PSTypeWrapper]::InvokeMethod($t, $m, $args)
}.GetNewClosure()
return $o
}.GetNewClosure()
}
return {
[NuGetConsole.Host.PowerShell.Implementation.PSTypeWrapper]::InvokeMethod($Target, $Method, $args)
}.GetNewClosure()
}
$InterfaceType.GetMembers() | %{
$m = $_
$getter = $null
$setter = $null
if ($m.MemberType -eq [System.Reflection.MemberTypes]"Property") {
if ($m.CanRead) {
$getter = GetInvoker $wrappedObject $m.GetGetMethod()
}
if ($m.CanWrite) {
$setter = GetInvoker $wrappedObject $m.GetSetMethod()
}
$prop = New-Object Management.Automation.PSScriptProperty $m.Name, $getter, $setter
$psObject.PSObject.Properties.Add($prop)
} elseif (!$m.IsSpecialName -and
($m.MemberType -eq [System.Reflection.MemberTypes]"Method")) {
$invoker = GetInvoker $wrappedObject $m
$method = New-Object Management.Automation.PSScriptMethod $m.Name, $invoker
$psObject.PSObject.Methods.Add($method)
}
}
# SIG # Begin signature block
# MIIoKwYJKoZIhvcNAQcCoIIoHDCCKBgCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD1ecp2zeBRUg/7
# OANR53ZDEwOwZirhYRXN5XvpoxuVmaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgswghoHAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFRELB4msPv5Aq8v97SisMZW
# gyh2St379P3wi3u2d+qFMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAp5RslEFWPp7oQa0A47JqxkgghFrQOtiT5jI7gMAnZv0sVGM3lpTgcih/
# WP88PhUF5tOESUpvmf7nTsOqFfpk9fZwvUPDciVnhwGAdUywfTXBkJKR3sZzxogJ
# rYSW0SHOsy7pyLUHRrx3J4clvv3brRNnDQiszyqv9bx7Mrx9Jpo+YyqKj0t+jM+x
# +PpzXdI7wWSHgngLByyCwha3GyZz760m0zSbjW3qIX8FM2d8Ld2ogw4jpCFkIWMP
# TWw/Zust6SjRglJcJ8zbhOqwKo2bon0Qu3SIwcs89RUQnzIvuSIi2Kk11zpzhdcs
# uQsI8wD9TzXstHmel5WnPvloQ3zkQaGCF5UwgheRBgorBgEEAYI3AwMBMYIXgTCC
# F30GCSqGSIb3DQEHAqCCF24wghdqAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFQBgsq
# hkiG9w0BCRABBKCCAT8EggE7MIIBNwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBkwF9l5rRRZb2jdY1ghFhpWuiVk2lBIFh37RYUDPwNigIGZhgdcE34
# GBEyMDI0MDQyNTE4NDMzMC4yWjAEgAIB9KCB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR
# 7TCCByAwggUIoAMCAQICEzMAAAHyPjLXZKxwkZQAAQAAAfIwDQYJKoZIhvcNAQEL
# BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTU4
# WhcNMjUwMzA1MTg0NTU4WjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEAvOXzyxcKaWIMcGMZEhHmL0AbZ2CU7Sio9hSscx8dH4Fe
# l4CCK5glpqSpfSDs7znyf5Ooj9EZ6EaORfPQHdvXncxnZVmwo9UMseR1BzWPMrvR
# JSTpnYHrjb0yuEVuMLvYgef89kngrmKsl/7/M+j6b9vYdbbTVrEnPyjznroc0gF6
# pANuuQUhU+ZMpMb8wdC8aMUuqFqF1iusMde9jUSUWHCDX1w4VEb1Hw+9I4qBPdq1
# vzoI3DisWZH0MS5cGhUq0pxrO14TK6fU7FIJsLMnExDgXRlZn9Rwg+1jms+RBHEM
# iEtgaUWGMLDzGwet7h4idefKjYdUiV7qC+cBg7v22VMzfgc3C4/eosQu8CRkDAYs
# Vh/XfvlfG5ddEWHVw2ZZY0QL0uohcDc62obuA62G+2/DO778IRC9MQjr2+1hTLLL
# bHF35HROYPjUmnKYYBX3KH7UOajw9jzVZqxt/A5hw6GIYI/bqjyz+756F3+4+vi1
# vFaJ9efA9Fq5pOwrprnEE4h0cnqRGlQ55wNhpIiaHof6930oS+gh4D6Ewe6GFP3e
# iTp3EYqA2KqkX1dsJaSlTvG/lWBy/IZ9dSURceqevZi/AUbUmenRvxhRFRPn1ZoM
# WHyAlK6YIckJREyTyExAUteSLGlLltBr15S0qHxn9reQwKA5Ligmwvt1XT5pWFUC
# AwEAAaOCAUkwggFFMB0GA1UdDgQWBBSVW4cAJurQMQTOXB/AYNPmOuKGeTAfBgNV
# HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU
# aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
# CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz
# L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV
# HRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIH
# gDANBgkqhkiG9w0BAQsFAAOCAgEAPUunjuB7HwdNF6ToD2m3Dd0GXsoqYIpXEEg2
# fIOlQr/RVR83UqvV6QLJY2UijVkgpYSRM+TqN1Jv7Wj56GxfvApAHZHC0IS3ZEoX
# 6/dZM8vbwz6zppQgNhUPY1YRWmrdkDN989afhgj+bbr4qxWlFs1FlQxTqaPzucw6
# c6D2LU69HBYN7l2kS0+eFEN2OLj2F6p+sLp2bVEETIiTM8aVJb3X1hlLQr51t3gw
# YpA5IsdVxPfFXGCM9vuX3XL6x1XlGqxl8uC0bcM5sKbArVIe7UesIQq1WJG+hbnQ
# XVjO01b44u6RoH43rIJwEmg/woS7seujxsGiGhfsS85NGzcbAI9LoXekHVq+k09/
# Zv0jWdf1F1O5MxKHdLwGN5iJ/F+QOCPvf3tZwTaVESemIgykHeWFYMbLmQlr+EMG
# 9Jl4RyHvQrm30qmY7w2sH9iNtvTdy7LQyVEq9bxhQfIkOVvGSzOT8E/L7bChAcBx
# GJsLLlprMZIpiBeQUG0s4PcM9Tuo3Vk8RhtDlLdXF1jjCVCc8hB+FkimRzsed6nA
# Lw/YdFOoxBdn7gY7Sf0A61m2+Lq7wH676jZ/ZR+4FT6ZajTwyL0PA5Gd5b20LGKp
# c+te3u+oGu0mNMO9fkD9euQj3c1GN+nrdkpuKb7KRCvIZZatyGHMl9L/Pe/l/WHn
# nDNT29YwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3
# DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIw
# MAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAx
# MDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/
# XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1
# hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7
# M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3K
# Ni1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy
# 1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF80
# 3RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQc
# NIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahha
# YQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkL
# iWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV
# 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG
# CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUp
# zxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBT
# MFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYI
# KwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGG
# MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186a
# GMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3Br
# aS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsG
# AQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN
# AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1
# OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYA
# A7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbz
# aN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6L
# GYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3m
# Sj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0
# SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxko
# JLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFm
# PWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC482
# 2rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7
# vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDUDCC
# AjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAl
# BgNVBAsTHm5TaGllbGQgVFNTIEVTTjpGMDAyLTA1RTAtRDk0NzElMCMGA1UEAxMc
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAa4ve
# N3BSx9k30BHwdOUiyAoO+AiggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOnVEE8wIhgPMjAyNDA0MjUxNzI0MzFa
# GA8yMDI0MDQyNjE3MjQzMVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6dUQTwIB
# ADAKAgEAAgIC+QIB/zAHAgEAAgITNjAKAgUA6dZhzwIBADA2BgorBgEEAYRZCgQC
# MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG
# SIb3DQEBCwUAA4IBAQAQT5CgCFm2dvGB/MWUWCSR4KErAsSd4z4HJa+WTcg84Xnj
# HSq3TRKjJe5g3ovoCjKozE5IYX+hKhVJWmyaTWT0cJ8tYvci2vW4z8c8AeTytz5o
# jJVp2uyI3r7GaA3b6t1kKfS7KXUuLGoP0FmciQswd7tQruU8FdK/HxmkejJXaK9u
# wZdT71kVXmmqwuCK9nDsvx7vgJIuliOVaGi8xzIGeobtN5Wd6+N3ocaUMe0nBFE+
# O+lVuMzYBaGu1fkFtScM13eojOL5yNu3Mt+UiWCHrcdmaEbrod1WY3T7TjXhzGXo
# FTv0NMypgTAc7uzGPAT9FrgRubrGK45CYgKI4iQVMYIEDTCCBAkCAQEwgZMwfDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj
# cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIw
# DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv
# BgkqhkiG9w0BCQQxIgQgkRjsKgAU/44a0JyltmbCsS9egcszWy/ljdUiNG+/1wcw
# gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCD42j4dLjFSXNOPmOEbuQVFGxxO
# LLmep0R0lLtF10pDRDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwAhMzAAAB8j4y12SscJGUAAEAAAHyMCIEIAaaptBFgoYbFm95P0kTY+DBe5r0
# oTd2DMzW1BcSSHpVMA0GCSqGSIb3DQEBCwUABIICAE5HN4KeGDsNK8iXyQUz+UUE
# 8/cGwzuwFvWPL8wjZPas2XAR0JK2OLRDOwnP9McgYhfh+E6PAjOSZdLQFpMncdC4
# hGS/2FTvi0aRU3Dsr+7ILjZjBHq26NwNSAs720AC9cfdTtq1AOF3FCo4nvMHWjCQ
# JeP0obNoYFQ+2tZCpWNegXcRLyWUPu+NmF80O3mTBzMr/ItCRI9vSgE36Rq7GOSD
# +Ef3qwg15TqzD4pGLd8L0rhGnJnoZt+d7uWKdxrm7Z6L0jD303DfdK6dX98KRALg
# CgFFXZUebYCZ5tr9vrhDONo3Ie8YdGWPsHGA/reaQXzY8Dx30t4pAyst2YjZP0bR
# 6FOgcaSWd+cQIQoexG6rNjvjHFV8NR/0EVGcugFkfbHzvZzKqJbMl2H1gox/V2Cc
# Hp4ju1TsVcIYkVD+LaoERecE44z9HQRlwj+VNEL+U+0Jb8rbYshwAvauMZgHAOSm
# nQdrDGDiDeUC4YU05Iiad/HsNR6yT/nRg3J16nYixPoEJlxL76o92wgyi7hTHAa2
# a7amZ18ZZY9eo3fb3vLHMpTsROEJr8UKP1hTCb5MPv0D0n0r5KyaHJ8LL61jRfZZ
# GHIJjBLKzvqiB1vrK61IFxPAYmw/3I13sjMlDqZeX7FF2li3J/PmY2UnSR4zMmnZ
# 1MzyjnDkOWk5O4xVNZnw
# SIG # End signature block
| 0
|
SharePoint build script.ps1
|
#BASEPATH variable should be explicitly set in every
#build script. It represents the "root"
#of the project folder, underneath which all tools, source, config settings,
#and deployment folder lie.
$global:basepath = (resolve-path ..).path
function Set-BasePath([string]$path)
{
$global:basepath = $path
}
function Clean-DeploymentFolder
{
Clean-Path -dir (Get-FullPath 'deployment')
}
function Compile-Project
{
Run-MSBuild -msBuildArgs @(
((Get-FirstSolutionFile).Fullname),
"/target:Clean",
"/target:Build",
"/p:Configuration=Release")
}
function Create-DeploymentBatchFilesWithSolutionOnly
{
#similar to Create-DeploymentBatchFilesWithFeatureActivation, but WITHOUT Feature activation/deactivation
#Convention: project name == project folder name == Feature name == Solution name
$projectName = (Get-FirstDirectoryUnderneathSrc).name
Create-DeploymentBatchFile -filename (Get-FullPath "deployment\\deploy-any-environment.bat") -solutionName "$($projectName).wsp"
Create-UpgradeBatchFile -filename (Get-FullPath "deployment\\upgrade-any-environment.bat") -solutionName "$($projectName).wsp"
Create-RetractionBatchFile -filename (Get-FullPath "deployment\\z-retract-any-environment.bat") -solutionName "$($projectName).wsp"
}
function Create-DeploymentBatchFilesWithFeatureActivation($siteUrls)
{
#Convention: project name == project folder name == Feature name == Solution name
$projectName = (Get-FirstDirectoryUnderneathSrc).name
$siteUrls.Keys | foreach {
Create-DeploymentBatchFile -url $siteUrls[$_] -filename (Get-FullPath "deployment\\deploy-$($_).bat") -featureName $projectName -solutionName "$($projectName).wsp" -hasFeature
Create-UpgradeBatchFile -url $siteUrls[$_] -filename (Get-FullPath "deployment\\upgrade-$($_).bat") -featureName $projectName -solutionName "$($projectName).wsp" -hasFeature
Create-RetractionBatchFile -url $siteUrls[$_] -filename (Get-FullPath "deployment\\z-retract-$($_).bat") -featureName $projectName -solutionName "$($projectName).wsp" -hasFeature
}
}
function Get-FirstDirectoryUnderneathSrc
{
dir (Get-FullPath "src") | where { $_.PSIsContainer -eq $true } | select -first 1
}
function Get-FirstSolutionFile
{
dir (Get-FullPath "\\*") -include "*.sln" -recurse | select -first 1
}
#BASEPATH variable should be explicitly set in every
#build script. It represents the "root"
#of the project folder, underneath which all tools, source, config settings,
#and deployment folder lie.
$global:basepath = (resolve-path ..).path
function Set-BasePath([string]$path)
{
$global:basepath = $path
}
function Get-FullPath($localPath)
{
return join-path -path $global:basepath -childPath $localPath
}
function Run-DosCommand($program, [string[]]$programArgs)
{
write-host "Running command: $program";
write-host " Args:"
0..($programArgs.Count-1) | foreach { Write-Host " $($_+1): $($programArgs[$_])" }
& $program $programArgs
}
$wspbuilder = Get-FullPath "tools\\WSPBuilder.exe"
function Run-WspBuilder()
{
$rootDirectory = (Get-FirstDirectoryUnderneathSrc).fullname
pushd
cd $rootDirectory
Run-DosCommand -program $WSPBuilder -programArgs @("-BuildWSP",
"true",
"-OutputPath",
(Get-FullPath "deployment"),
"-ExcludePaths",
([string]::Join(";", @(
(Join-Path -path $rootDirectory -childPath "bin\\Debug"),
(Join-Path -path $rootDirectory -childPath "bin\\deploy")
))))
popd
}
$msbuild = "C:\\Windows\\Microsoft.NET\\Framework\\v3.5\\msbuild.exe"
function Run-MSBuild([string[]]$msBuildArgs)
{
Run-DosCommand $msbuild $msBuildArgs
}
function Clean-Path($dir)
{
#I don't like the SilentlyContinue option, but we need to ignore the case
#where there is no directory to delete (in this situation, an error is thrown)
del $dir -recurse -force -erroraction SilentlyContinue
mkdir $dir -erroraction SilentlyContinue | out-null
}
function Create-DeploymentBatchFile($filename, $featureName, $solutionName, $url, [switch]$allcontenturls, [switch]$hasFeature)
{
if ($hasFeature) {
$contents = [string]::Join("`n", @(`
(Emit-FeatureDeactivationBatchScript -featureName $featureName -url $url -allcontenturls:$allcontenturls), `
(Emit-SolutionRetractionBatchScript -solutionName $solutionName -allcontenturls:$allcontenturls), `
(Emit-SolutionDeploymentBatchScript -solutionName $solutionName -allcontenturls:$allcontenturls), `
(Emit-FeatureActivationBatchScript -featureName $featureName -url $url -allcontenturls:$allcontenturls)))
} else {
$contents = [string]::Join("`n", @(`
(Emit-SolutionRetractionBatchScript -solutionName $solutionName -allcontenturls:$allcontenturls), `
(Emit-SolutionDeploymentBatchScript -solutionName $solutionName -allcontenturls:$allcontenturls)))
}
Create-StsadmBatchFile -filename $filename -contents $contents
}
function Create-UpgradeBatchFile($filename, $featureName, $solutionName, $url, [switch]$hasFeature)
{
if ($hasFeature) {
$contents = [string]::Join("`n", @(`
(Emit-FeatureDeactivationBatchScript -featureName $featureName -url $url -allcontenturls:$allcontenturls), `
(Emit-SolutionUpgradeBatchScript -solutionName $solutionName -allcontenturls:$allcontenturls), `
(Emit-FeatureActivationBatchScript -featureName $featureName -url $url -allcontenturls:$allcontenturls)))
} else {
$contents = [string]::Join("`n", @(`
(Emit-SolutionUpgradeBatchScript -solutionName $solutionName -allcontenturls:$allcontenturls)))
}
Create-StsadmBatchFile -filename $filename -contents $contents
}
function Create-RetractionBatchFile($filename, $featureName, $solutionName, $url, [switch]$allcontenturls, [switch]$hasFeature)
{
if ($hasFeature) {
$contents = [string]::Join("`n", @(`
(Emit-EchoMessage -message "RETRACTING solution--press any key to continue, or CTRL+C to cancel"), `
(Emit-FeatureDeactivationBatchScript -featureName $featureName -url $url -allcontenturls:$allcontenturls), `
(Emit-SolutionRetractionBatchScript -solutionName $solutionName -allcontenturls:$allcontenturls)))
} else {
$contents = [string]::Join("`n", @(`
(Emit-EchoMessage -message "RETRACTING solution--press any key to continue, or CTRL+C to cancel"), `
(Emit-SolutionRetractionBatchScript -solutionName $solutionName -allcontenturls:$allcontenturls)))
}
Create-StsadmBatchFile -filename $filename -contents $contents
}
function Emit-EchoMessage($message)
{
return "echo $($message)`npause"
}
function Emit-FeatureDeactivationBatchScript($featureName, $url, [switch]$allcontenturls)
{
$script = @"
%STSADM% -o deactivatefeature -name $featureName -url $url
"@
return $script
}
function Emit-FeatureActivationBatchScript($featureName, $url, [switch]$allcontenturls)
{
$script = @"
%STSADM% -o activatefeature -name $featureName -url $url
"@
return $script
}
function Emit-SolutionRetractionBatchScript($solutionName, [switch]$allcontenturls)
{
$script = @"
%STSADM% -o retractsolution $(if ($allcontenturls) { "-allcontenturls" }) -immediate -name $solutionName
%STSADM% -o execadmsvcjobs
%STSADM% -o deletesolution -name $solutionName -override
%STSADM% -o execadmsvcjobs
"@
return $script
}
function Emit-SolutionDeploymentBatchScript($solutionName, [switch]$allcontenturls)
{
$script = @"
%STSADM% -o addsolution -filename $solutionName
%STSADM% -o deploysolution $(if ($allcontenturls) { "-allcontenturls" }) -immediate -allowgacdeployment -name $solutionName
%STSADM% -o execadmsvcjobs
REM second call to execadmsvcjobs allows for a little more delay. Shouldn't be necessary, but is.
%STSADM% -o execadmsvcjobs
"@
return $script
}
function Emit-SolutionUpgradeBatchScript($solutionName, [switch]$allcontenturls)
{
$script = @"
%STSADM% -o upgradesolution -immediate -allowgacdeployment -name $solutionName -filename $solutionName
%STSADM% -o execadmsvcjobs
REM second call to execadmsvcjobs allows for a little more delay. Shouldn't be necessary, but is.
%STSADM% -o execadmsvcjobs
"@
return $script
}
function Create-StsadmBatchFile($filename, $contents)
{
$header= @"
SET STSADM="%PROGRAMFILES%\\Common Files\\Microsoft Shared\\web server extensions\\12\\BIN\\stsadm.exe"
"@
$footer = @"
echo off
ECHO -------------------------------------------------------------
%STSADM% -o displaysolution -name $solutionName
pause
"@
$wholeFileContents = $header + "`n" + $contents + "`n" + $footer
Out-File -inputObject $wholeFileContents -filePath $filename -encoding ASCII
}
@@#USAGE
@@. ./helper-functions.ps1
@@
@@ Set-BasePath -path ((resolve-path ..).path)
@@ Clean-DeploymentFolder
@@ Compile-Project
@@ Run-WspBuilder
@@ Create-DeploymentBatchFilesWithSolutionOnly
@@#
@@#
@@#
| 0
|
sample_61_88.ps1
|
#
# Module manifest for module 'OCI.PSModules.Jmsjavadownloads'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Jmsjavadownloads.dll'
# Version number of this module.
ModuleVersion = '86.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a83f9369-1d29-4c1c-8c1d-33e3f88d0bf3'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Jmsjavadownloads Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Jmsjavadownloads.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIJmsjavadownloadsJavaDownloadRecordsList',
'Get-OCIJmsjavadownloadsJavaDownloadReport',
'Get-OCIJmsjavadownloadsJavaDownloadReportContent',
'Get-OCIJmsjavadownloadsJavaDownloadReportsList',
'Get-OCIJmsjavadownloadsJavaDownloadToken',
'Get-OCIJmsjavadownloadsJavaDownloadTokensList',
'Get-OCIJmsjavadownloadsJavaLicense',
'Get-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord',
'Get-OCIJmsjavadownloadsJavaLicenseAcceptanceRecordsList',
'Get-OCIJmsjavadownloadsJavaLicensesList',
'Get-OCIJmsjavadownloadsWorkRequest',
'Get-OCIJmsjavadownloadsWorkRequestErrorsList',
'Get-OCIJmsjavadownloadsWorkRequestLogsList',
'Get-OCIJmsjavadownloadsWorkRequestsList',
'Invoke-OCIJmsjavadownloadsRequestSummarizedJavaDownloadCounts',
'New-OCIJmsjavadownloadsArtifactDownloadUrl',
'New-OCIJmsjavadownloadsJavaDownloadReport',
'New-OCIJmsjavadownloadsJavaDownloadToken',
'New-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord',
'Remove-OCIJmsjavadownloadsJavaDownloadReport',
'Remove-OCIJmsjavadownloadsJavaDownloadToken',
'Remove-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord',
'Stop-OCIJmsjavadownloadsWorkRequest',
'Update-OCIJmsjavadownloadsJavaDownloadToken',
'Update-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Jmsjavadownloads'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
sample_2_36.ps1
|
#************************************************
# TS_BackupSystemStateKB2182466.ps1
# Version 1.0.1
# Date: 5/30/2012
# Author: v-kaw
# Description: [Idea ID 1922] [Windows] On Windows 2008 R2 and Windows 7 System state backup fails with event id 5 and error 2155347997
# Rule number: 1922
# Rule URL: //sharepoint/sites/rules/Rule%20Submissions/Forms/DispForm.aspx?ID=1922
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber 1922
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_BackupSystemStateKB2182466"
$PublicContent = "http://support.microsoft.com/kb/2182466"
$InternalContent = ""
$Verbosity = "Error"
$Visibility = "4"
$SupportTopicsID = "7993"
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
# **************
# Detection Logic
# **************
#Check if binaries are older than KB 2182466 (Wbengine.exe)
function CheckWbengineUpdated()
{
$Path= Join-Path -Path $Env:SystemRoot -ChildPath '\system32\Wbengine.exe'
if(CheckMinimalFileVersion $Path 6 1 7600 20754 ) #Check the version to see if it is older than the expected version which is 6.1.7600.20754 (KB2182466)in this case
{
return $true
}
else
{
return $false
}
}
function CheckWindowsBackupEvent #Check the paticular event exists.
{
$Error.Clear()
#Get the first event log '5' with error code 2155347997 on Microsoft-Windows-Backup event log over the past 7 days.
$EventLogName = "Microsoft-Windows-Backup/Operational"
$strQuery = "*[System[(EventID=5) and TimeCreated[timediff(@SystemTime) <= 604800000]] and EventData[(Data ='2155347997')]]"
$CommandToRun = "wevtutil.exe qe `"$EventLogName`" /q:`"$strQuery`" /c:1"
$Result = Invoke-Expression $CommandToRun -ErrorAction Continue
if (($Error.Count -eq 0) -and ($null -ne $Result))
{
return $true
}
return $false
}
#Check to see if rule is applicable to this computer
if (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) # Windows Server 2008 R2 or Windows 7
{
$RuleApplicable = $true
#Detect root cause
if ((-not (CheckWbengineUpdated)) -and (CheckWindowsBackupEvent))
{
$Path= Join-Path -Path $Env:SystemRoot -ChildPath '\system32\Wbengine.exe'
$FileVersionInfo = Get-FileVersionString($Path)
$RootCauseDetected = $true
add-member -inputobject $InformationCollected -membertype noteproperty -name "Wbengine.exe current version" -value $FileVersionInfo
add-member -inputobject $InformationCollected -membertype noteproperty -name "Wbengine.exe expected version" -value '6.1.7600.20754'
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -SolutionTitle $ScriptStrings.ID_BackupSystemStateKB2182466_SD
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDeQ2tJ4Y7IFExX
# sd1S0HrCzaxkn/fQB9j/gnjWTM1YuaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII2mSVou0bDfgb0XW+vDZi5A
# XPkXO5Wv+urnDwG7O4mTMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAjxCpqWgr1kJmea+6BuFyDWMzOYQbsyxCr8hTxg5gdfMrFEIpiAogPKmd
# zerTn/TaV4AuSHpXqLvFSyHzZ54R0L3aCBMVMU/ev/9rol8rCh2jqrepZcJ6OxPf
# flQdCNBAASpPH2aJ0QotMuTDbEv3y/u6z5jY856FlfO7L3QEcnH2sOY5oczh7aVr
# jvUDmcdU5/kNaPiStxGQVb5clajbw4XEM9c7rxSkJAMtonr6hdS+alX1dwRybuH+
# vbHlj4CE0wnannvnexdbVa39fJojrWMErtQoLJec/qn4h+oeA4AhbxC+6hnYiI9o
# WFhFQbCyDvqO46RzgL+CRvM08p99h6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA77CejYWspapyF4oDVSC51fXsF5QXGX890BL107GulZAIGZusyQ1ca
# GBMyMDI0MTAyODExNDAzOS43ODlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5aFrNDGHtAAEAAAH9MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJEMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAoWWs+D+Ou4JjYnRHRedu
# 0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQyG2zpxYceTjIF7HiQWbt6
# FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+SD0S+hTP1TCA/we38yZ3B
# EtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sKikeWDSnHQeTprO0zIm/b
# tagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz7tURyiD3kOxNnw5ox1eZ
# X/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6++Wb6+1ltMCPoMJHUtPP
# 3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk0IqxBDZgMoY+Ef7ffFRP
# 2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x/+QLE0pcSEh/XE1w1fcp
# 6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0gEDytapGn1ONjVkiKpVP2
# uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBHdpl28+k+ZY6m4dPFnEoG
# cJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0oH7RKMQgmsy7CVD7v55d
# OhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTpDMXA4ZW8
# +yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAY9hYX+T5AmCr
# YGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+pjlNv5XSXZrKGv8e4s5dJ
# 5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSKs2KlhYiqzbRe8QbMfKXE
# DtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/Zq+vO5523Jld6ssVuzs9
# uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTLlOL8LpXooqnr+QLYE4Bp
# Uep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vSheEkmjHA2zuM+Tgn4j5n
# +Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTOfMqFa3Ab8KDKicmp0Ath
# RNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUVkSJ5Fo/ctfDSPdCTVaIX
# XF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/RqTPvCyAhIxBVKfN/hfs4
# CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi6Guo+z3LPFl/exQaRubE
# rsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs+AOoWx24+XcyxpUkAajD
# hky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSKoqtrjinRAsBUdoOggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0MTAyOTA3NTMwM1owdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEAAgIJ5zAHAgEAAgISQjAK
# AgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQA/CC/LZ2oFgj4y
# M+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCWF4kzzIktKGUnhyd/L3j7
# RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trnzQMegLEIZHFbBaiR6h9j
# /oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fFMtqdncqg8a2hOSPYghty
# l1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0unmdz7ZrxHx5mL0kEArzE1
# Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6lfDhbaf2LYZ2H/D5el6NP
# 4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgs5OkPTWQSA1D
# MvV3y3Qb7dudJLItgNGD0Vw0jcQOl3IwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8lRB4NRzCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/XP5aFrNDGHtAAEAAAH9
# MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FYt/GwMA0GCSqGSIb3DQEB
# CwUABIICAAZkvtfxr+BebGt6MRI9y8qr3QS+nrYTG10/clgz0EzW2cqpH/0p+yH1
# uP06BYY3M2uKikfCZDVzv+M6frpNjo+fhywE9EiF3awNBwztBwzMZGMNuHZEeo6Z
# yWZV5bywMXENNTEefHZhZ9/YbIeKM5x//96v+Aeyv5Lacho7A0298exGrUrId0Jd
# q61M1g28J6QV/sVTd4ByqQ0jx4FU/SYcsK02UH1vHMiywi2EENS6Jg7vCj5MoC6T
# EjJPI015YiC5960ktf8OZFD2QU1eAVi6RY5nhrjGa6nK9MNcb0/lrtsM68Kk3aPT
# ltlFpOnFf8hSlSi64gDVOMsZRITNFNVCy2+5EU0k51Q7qYl69xMOVVMb+LXbBAv5
# i2meRT4sVL+lqZVqporRViMqZNqJ3RTg9wC97VMIdFxt32g/HSMdEjcoQvpe9vEB
# OTvVLhMwxR/G/zfTU8KplBKPNzBea6QF4+S5O4jqu8jrj1VUKCIS6eCjSeHYaJAQ
# Ij6MU1iHkE+kNuPHkPyydI8vrsa1d3Ik9BhbwZ0eM6PF2babkJ7Q9/eYQCp3u6lk
# KPof0JvtFuwjRTXJl/Pnf4LXXlfWhSOTYCFFbmSDJ04UQnp8IZ9KFiPn+PrLyRvb
# KEDT+pMKYptrOJyz6UOP4rJRNDyQfMn4qUwj8GC+Zf4Ukr8eJSQ5
# SIG # End signature block
| 0
|
sample_22_54.ps1
|
15KnownLimitations15.1ExperimentalFeaturesSomeOracleVMVirtualBoxfeaturesarelabeledasexperimental.Suchfeaturesareprovidedonan“as-is”basisandarenotformallysupported.However,feedbackandsuggestionsaboutsuchfeaturesarewelcome.Acomprehensivelistofexperimentalfeaturesisasfollows:Hardware3DaccelerationsupportforWindows,Linux,andOracleSolarisguestsHardware2DvideoplaybackaccelerationsupportforWindowsguestsMacOSXguests(macOShostsonly)ICH9chipsetemulationEFIrmwareHostCD/DVDdrivepassthroughSupportofiSCSIusinginternalnetworkingUsingOracleVMVirtualBoxandHyper-Vonthesamehost15.2KnownIssuesThefollowingsectiondescribesknownproblemswiththisreleaseofOracleVMVirtualBox.Un-lessmarkedotherwise,theseissuesareplannedtobexedinlaterreleases.ThemacOSinstallerpackagesforOracleVMVirtualBox7currentlydonotincludetheIn-ternalNetworkingfeature,whichisavailableonallotherplatforms.ThiswillbeaddressedwithanupdateofOracleVMVirtualBox7.ForsetupswhichdependonthisfunctionalityitisbesttokeepusingOracleVMVirtualBox6.1.PoorperformancewhenusingOracleVMVirtualBoxandHyper-Vonthesamehost.Toxthis,certainWindowsfeatureslike“Hyper-VPlatform”,“VirtualMachinePlatform”and“WindowsHypervisorPlatform”mustbeturnedoff,followedbyahostreboot.Additionally,theMicrosoftDeviceGuardandCredentialGuardhardwarereadinesstoolmighthavetobeusedinordertoturnoffmorefeatures.Forexample,byrunningthefollowingcommand:.\DG_Readiness_Tool_vX.X.ps1-Disable-AutoRebootNote:DisablingDeviceGuardandCredentialGuardfeatureswillhaveanimpactontheoverallsecurityofthehost.PleasecontactyourAdministratorbeforehandregardingthis.ThefollowingGuestSMP(multiprocessor)limitationsexist:421
| 0
|
1678.ps1
|
return
$srcRoot = "C:\temp\news"
$dstRoot = "C:\temp\new"
$logDir = "C:\temp\log"
if (!(Test-Path $srcRoot)) {
throw "Source path '$srcRoot' does not exist!"
}
if (!(Test-Path $logDir)) {
Write-Warning "Path '$logDir' does not exist! Creating..."
try {
md $logDir | Out-Null
} catch {
throw $_
}
}
if (!(Test-Path $dstRoot)) {
Write-Warning "Path '$dstRoot' does not exist! Creating..."
try {
md $dstRoot | Out-Null
} catch {
throw $_
}
}
Write-Host "$(date -f yyyyMMdd-HHmmss) Getting all the source files..."
$srcFiles = Get-Files $srcRoot -Recurse -Method AlphaFS
$date = Get-Date -f yyyyMMdd-HHmmss
$usedDrives = [io.driveinfo]::getdrives() | % {$_.name[0]}
$alpha = [char[]](65..90)
$availDrives = (diff $usedDrives $alpha).inputobject
if (@($availDrives).Count -lt 2) { Throw 'subst needs at least two drive letters available - one for source and one for destination. just in case' }
$srcSubstDrive = $availDrives[0] + ':'
$dstSubstDrive = $availDrives[1] + ':'
$index = 0
$total = @($srcFiles).Count
$starttime = $lasttime = Get-Date
$results = foreach ($file in $srcFiles) {
$index++
$currtime = (Get-Date) - $starttime
$avg = $currtime.TotalSeconds / $index
$last = ((Get-Date) - $lasttime).TotalSeconds
$left = $total - $index
$WrPrgParam = @{
Activity = (
"working $(Get-Date -f s)",
"Total: $($currtime -replace '\..*')",
"Avg: $('{0:N2}' -f $avg)",
"Last: $('{0:N2}' -f $last)",
"ETA: $('{0:N2}' -f ($avg * $left / 60))",
"min ($([string](Get-Date).AddSeconds($avg*$left) -replace '^.* '))"
) -join ' '
Status = "$index of $total ($left left) [$('{0:N2}' -f ($index / $total * 100))%]"
CurrentOperation = "item: $($file.fullpath)"
PercentComplete = $index / $total * 100
}
Write-Progress @WrPrgParam
$lasttime = Get-Date
subst $srcSubstDrive /d | Out-Null
subst $dstSubstDrive /d | Out-Null
$srcpath = $srcfile = $srcdir = $srcend = $srcsplit = $srcextra = $srcstop = $null
if ($file.fullpath.length -gt 240)
{
$srcpath = Split-Path $file.fullpath
$srcextra = $null
if ($srcpath.length -gt 240)
{
$srcextra = New-Object System.Collections.ArrayList
$srcsplit = $srcpath.Split('\')
$srcstop = 2
while ($srcpath.length -gt 240)
{
$srcend = $srcsplit.count - $srcstop
$srcpath = [string]::Join('\', $srcsplit[0..$srcend])
$srcstop++
}
$srcextra = [string]::Join('\', $srcsplit[($srcend + 1)..($srcend + $srcstop)])
}
subst $srcSubstDrive $srcpath
if ($srcextra)
{
$srcfile = Join-Path (Join-Path $srcSubstDrive $srcextra) $file.filename
}
else
{
$srcfile = Join-Path $srcSubstDrive $file.filename
}
}
else
{
$srcfile = $file.fullpath
}
$srcdir = Split-Path $srcfile
$dstdir = $dstfile = $dstpath = $dstend = $dstsplit = $dstextra = $dststop = $null
$dstdir = Join-Path $dstRoot $($(Split-Path $file.fullpath) -replace [regex]::Escape($srcRoot))
$dstfile = Join-Path $dstdir $file.FileName
if ($dstfile.length -gt 240)
{
$dstpath = Split-Path $dstfile
$dstextra = $null
if ($dstpath.length -gt 240)
{
$dstextra = New-Object System.Collections.ArrayList
$dstsplit = $dstpath.Split('\')
$dststop = 2
while ($dstpath.length -gt 240)
{
$dstend = $dstsplit.count - $dststop
$dstpath = [string]::Join('\', $dstsplit[0..$dstend])
$dststop++
}
$dstextra = [string]::Join('\', $dstsplit[($dstend + 1)..($dstend + $dststop)])
}
if (!(Test-Path $dstpath)) {
Write-Warning "Path '$dstpath' does not exist! Creating..."
try {
md $dstpath | Out-Null
} catch {
throw $_
}
}
subst $dstSubstDrive $dstpath
if ($dstextra)
{
$dstfile = Join-Path (Join-Path $dstSubstDrive $dstextra) $file.filename
}
else
{
$dstfile = Join-Path $dstSubstDrive $file.filename
}
}
else
{
}
$dstdir = Split-Path $dstfile
if (!(Test-Path $dstdir)) {
Write-Warning "Path '$dstdir' does not exist! Creating..."
try {
md $dstdir | Out-Null
} catch {
throw $_
}
}
$err = 'N/A'
$exists = 'N/A'
$srcsize = $file.FileSize
$srcdate = date $file.LastModified
$dstsize = 'N/A'
$dstinfo = 'N/A'
$dstsize = 'N/A'
$dstdate = 'N/A'
$newer = 'N/A'
try
{
if (!(Test-Path $dstfile)) {
if (($srcsize/1mb) -gt (200mb/1mb)) {
} else {
copy $srcfile $dstfile
}
$exists = $false
} else {
$dstinfo = gi $dstfile
$dstsize = $dstinfo.length
$dstdate = $dstinfo.LastWriteTime
if ($srcdate -eq $dstdate) {
$newer = 'Same'
} else {
if ($srcdate -gt $dstdate) {
if (($srcsize/1mb) -gt (200mb/1mb)) {
} else {
copy $srcfile $dstfile
}
$newer = $true
} else {
$newer = $false
}
}
$exists = $true
}
}
catch
{
write-host $_
$err = $_
}
$obj = [pscustomobject]@{
FullPath = $file.fullpath
SrcFile = $srcfile
SrcDrive = $srcSubstDrive
SrcPath = $srcpath
SrcExtra = $srcextra
SrcDir = $srcdir
DstFile = $dstfile
DstDrive = $dstSubstDrive
DstPath = $dstpath
DstExtra = $dstextra
DstDir = $dstdir
Error = $err
Exists = $exists
SrcSize = $srcsize
DstSize = $dstsize
Newer = $newer
SrcWrite = $srcdate
DstWrite = $dstdate
}
$obj
Write-Object $obj
Write-Host ''
$obj | Export-Csv $(Join-Path $logDir "$date-Copy.csv") -NoTypeInformation -Append
subst $srcSubstDrive /d | Out-Null
subst $dstSubstDrive /d | Out-Null
}
$results | ? {($_.error -ne 'n/a') -or ($_.srcsize -gt 0 -and $_.dstsize -eq 0)} | Export-Csv $(Join-Path $logDir "$date-Error.csv") -NoTypeInformation
| 0
|
Email-ExpiringADAccounts.ps1
|
Function GetMsgBody {
Write-Output @"
<p>Dear $name,</p>
Your ABC network account is about to expire.<br/>
Please email helpdesk@abc.com or simply hit 'reply', and include the following details to have your account extended.<br/>
<br/>
Your name:<br/>
The department you currently volunteer in:<br/>
The staff supervisor's name you currently report to:<br/>
The current status of your involvement with ABC (Staff/Student/Volunteer):<br/>
<br/>
Kind Regards,<br/>
ABC IT Services
"@
}
Get-QADUser -AccountExpiresBefore "31/01/2012" -Enabled -SizeLimit 0 | ForEach-Object {
$email = $_.mail
$name = $_.givenName
[string]$body = GetMsgBody
Send-MailMessage -BodyAsHtml:$true -Body $body -To $email -From 'helpdesk@abc.com' -SmtpServer 'smtp.abc.com' -Subject "Your account is about to expire"
}
| 0
|
sample_36_24.ps1
|
#
# Module manifest for module 'Az.DevCenter'
#
# Generated by: Microsoft Corporation
#
# Generated on: 23/04/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.DevCenter.psm1'
# Version number of this module.
ModuleVersion = '1.1.1'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = 'accceef6-8113-453a-a31c-4f2ce57893d6'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell: DevCenter cmdlets'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'DevCenter.AutoRest/bin/Az.DevCenter.private.dll',
'DevCenterData.AutoRest/bin/Az.DevCenterdata.private.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess = 'DevCenter.AutoRest\Az.DevCenter.format.ps1xml',
'DevCenterData.AutoRest\Az.DevCenterdata.format.ps1xml'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('DevCenter.AutoRest/Az.DevCenter.psm1', 'DevCenterData.AutoRest/Az.DevCenterdata.psm1')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'Deploy-AzDevCenterUserEnvironment',
'Get-AzDevCenterAdminAttachedNetwork',
'Get-AzDevCenterAdminCatalog',
'Get-AzDevCenterAdminCatalogSyncErrorDetail',
'Get-AzDevCenterAdminDevBoxDefinition',
'Get-AzDevCenterAdminDevCenter',
'Get-AzDevCenterAdminEnvironmentDefinition',
'Get-AzDevCenterAdminEnvironmentDefinitionErrorDetail',
'Get-AzDevCenterAdminEnvironmentType',
'Get-AzDevCenterAdminGallery', 'Get-AzDevCenterAdminImage',
'Get-AzDevCenterAdminImageVersion',
'Get-AzDevCenterAdminNetworkConnection',
'Get-AzDevCenterAdminNetworkConnectionHealthDetail',
'Get-AzDevCenterAdminNetworkConnectionOutboundNetworkDependencyEndpoint',
'Get-AzDevCenterAdminOperationStatus', 'Get-AzDevCenterAdminPool',
'Get-AzDevCenterAdminProject',
'Get-AzDevCenterAdminProjectAllowedEnvironmentType',
'Get-AzDevCenterAdminProjectEnvironmentType',
'Get-AzDevCenterAdminSchedule', 'Get-AzDevCenterAdminSku',
'Get-AzDevCenterAdminUsage', 'Get-AzDevCenterUserCatalog',
'Get-AzDevCenterUserDevBox', 'Get-AzDevCenterUserDevBoxAction',
'Get-AzDevCenterUserDevBoxOperation',
'Get-AzDevCenterUserDevBoxRemoteConnection',
'Get-AzDevCenterUserEnvironment',
'Get-AzDevCenterUserEnvironmentAction',
'Get-AzDevCenterUserEnvironmentDefinition',
'Get-AzDevCenterUserEnvironmentLog',
'Get-AzDevCenterUserEnvironmentOperation',
'Get-AzDevCenterUserEnvironmentOutput',
'Get-AzDevCenterUserEnvironmentType', 'Get-AzDevCenterUserPool',
'Get-AzDevCenterUserProject', 'Get-AzDevCenterUserSchedule',
'Invoke-AzDevCenterAdminExecuteCheckNameAvailability',
'Invoke-AzDevCenterUserDelayDevBoxAction',
'Invoke-AzDevCenterUserDelayEnvironmentAction',
'New-AzDevCenterAdminAttachedNetwork',
'New-AzDevCenterAdminCatalog',
'New-AzDevCenterAdminDevBoxDefinition',
'New-AzDevCenterAdminDevCenter',
'New-AzDevCenterAdminEnvironmentType',
'New-AzDevCenterAdminGallery',
'New-AzDevCenterAdminNetworkConnection', 'New-AzDevCenterAdminPool',
'New-AzDevCenterAdminProject',
'New-AzDevCenterAdminProjectEnvironmentType',
'New-AzDevCenterAdminSchedule', 'New-AzDevCenterUserDevBox',
'New-AzDevCenterUserEnvironment',
'Remove-AzDevCenterAdminAttachedNetwork',
'Remove-AzDevCenterAdminCatalog',
'Remove-AzDevCenterAdminDevBoxDefinition',
'Remove-AzDevCenterAdminDevCenter',
'Remove-AzDevCenterAdminEnvironmentType',
'Remove-AzDevCenterAdminGallery',
'Remove-AzDevCenterAdminNetworkConnection',
'Remove-AzDevCenterAdminPool', 'Remove-AzDevCenterAdminProject',
'Remove-AzDevCenterAdminProjectEnvironmentType',
'Remove-AzDevCenterAdminSchedule', 'Remove-AzDevCenterUserDevBox',
'Remove-AzDevCenterUserEnvironment', 'Repair-AzDevCenterUserDevBox',
'Restart-AzDevCenterUserDevBox', 'Skip-AzDevCenterUserDevBoxAction',
'Skip-AzDevCenterUserEnvironmentAction',
'Start-AzDevCenterAdminNetworkConnectionHealthCheck',
'Start-AzDevCenterAdminPoolHealthCheck',
'Start-AzDevCenterUserDevBox', 'Stop-AzDevCenterUserDevBox',
'Sync-AzDevCenterAdminCatalog', 'Update-AzDevCenterAdminCatalog',
'Update-AzDevCenterAdminDevBoxDefinition',
'Update-AzDevCenterAdminDevCenter',
'Update-AzDevCenterAdminEnvironmentType',
'Update-AzDevCenterAdminNetworkConnection',
'Update-AzDevCenterAdminPool', 'Update-AzDevCenterAdminProject',
'Update-AzDevCenterAdminProjectEnvironmentType',
'Update-AzDevCenterAdminSchedule',
'Update-AzDevCenterUserEnvironment'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','PSModule','DevCenter'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDg8gcMvvQoKP8L
# 6+d5xakFdF5jwRorsQJG0UKTTVj1pKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKdj
# QjjQcLEggkv94dNOF1i1MtTfb40eI453+hexO2byMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAX8EWuB8eGgOsfH7+RYNMFzaJr0YAEgydN3wf
# vvm2oWst1dWbly+B0T62REEs3N435TFPSGf0iiBfSuyGL9Gs1GBW8fcTAIfP3XLv
# gJyRXwisSjjRQPgb0A3L8bDtt1hIw8TnFRvHMt9JGqQdvGKiLV96yyyZ4v5R7Rru
# GIj7aSw0fyTbBN05F++qnYsGQX9aOKuPSiyaEvjPvbUy1xJNPjv9aEAR7fCTRiBy
# QMn4Ml8b4H4E5iDjNjlXBIbMvOuJ27U56BlEgZ2hxQc7jSjhTEfZHoOC69vPkPZ0
# nnvP/55MGj0k4aB+vem2YX1RxSU4K3jjLef0gT4iINrWER/JcqGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDcntNjf/D3BZAF1Hd6Y6UNwEjAgZxiz2PV
# xwlbP3NzCQIGZh/+xnzHGBMyMDI0MDQyMzE0MTExOC41MDRaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcd
# ldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhO
# A5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g
# 7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5v
# FJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKm
# v6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTR
# KuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODuj
# lFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzY
# C1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834
# bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGu
# YEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4w
# pmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0I
# l598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shy
# vxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LS
# mb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTx
# vfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5q
# Bk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5k
# VfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDm
# i9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJsp
# upBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvY
# h+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOW
# InVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKU
# hRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyi
# DbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnRvQQwIhgPMjAyNDA0MjMxMjUyMjBaGA8yMDI0MDQy
# NDEyNTIyMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dG9BAIBADAHAgEAAgIH
# /zAHAgEAAgISKDAKAgUA6dMOhAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AEtAJf9QQUkfnjakWpA/WTJ4s59d1ydd1YCu0doiQ7zKrtg+fPXaO+UnceDABE97
# pgPadQ3qu9K0ikm1c/cMWaf6FyR3t7zee3PwsEGTk2CPIUwLCYrMasurESYCykjm
# cyo5aeimsVVRSCr36tnZYZLeD4pEzDs6hAxbbMfDl26nMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAA
# Ad0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgP4MKH5yT2kY6zr0VGYfbVP2A1R8GKhcegp0f+kSd
# tM4wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk3
# 7UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIOmVHNIZrArpRiTxre+ot/Sc
# GrSRpjA9BFR2kZJAoOaAMA0GCSqGSIb3DQEBCwUABIICAE3kEAUQ7GTLgMdB3dFk
# PrWWI7gn7/6iOkDwOL4jdYUefEimACl+s62LkbQrtq9hHawHlWJD1+uNXZwojAE7
# lmlT5Z2/WLxq2yiA5EGgpwa69RkcbpyK4K/tkTGsyj2/8PpB0hqKaNj4csi48Yl9
# YEJD1NrrcsEtwCoCPfumYDCq3SmTVjhplxC/GNb0aYU8V3FqxGKf+SUEMdcvd2xi
# 9hAmf934tb9qje5WxEnn94qKsuVI0PrDyBXmw5rYPWuSZ+AaHaj+ldaS12cxjp7e
# Pk34csZRu0PwqobZDvb62EGr7ljQDs4PTh6hrPQ75aFiBv7hKxS4nB6xwvvi2sar
# ALzxWSeIvv5D5m1vWC4KQVTi+CTl7CIWpp4dRBmWvvdNBdUTtdXOW5kEBhKfTiKn
# UzIgttMNqZh3snTMzzCWlyMaMMXcxpoc3RrZp1NRrHL61HuSAJXP8YlQu2xWDN+K
# wEpuqM1WibOaueX7dWd95zmXCmt+67LTR1Us0kAx9g6zHBQoUNkZSyi71Vbbu+K6
# tzU8dhOYVDT5KJDhD/v/9tQdU9QoLQAZ77xZ6zHX7TR3GvdlOTkC1Xtg+fDxqt7f
# tKVoiMEMAFc5/a0MiwnyjayBjV3DxulZXegBRt5mLd7coVOxkooA/V6za/hqenYG
# U8kU7Nm7yO/sOrn1Jh11XkvE
# SIG # End signature block
| 0
|
sample_29_3.ps1
|
description = 'reactive-streams-tck'
dependencies {
api group: 'org.testng', name: 'testng', version:'7.3.0'
api project(':reactive-streams')
implementation project(':reactive-streams-examples')
}
jar {
bnd ('Bundle-Name': 'reactive-streams-jvm',
'Bundle-Vendor': 'Reactive Streams SIG',
'Bundle-Description': 'Reactive Streams TCK',
'Bundle-DocURL': 'http://reactive-streams.org',
'Bundle-Version': project.version,
'Export-Package': 'org.reactivestreams.tck.*',
'Automatic-Module-Name': 'org.reactivestreams.tck'
)
manifest {
attributes('Automatic-Module-Name': 'org.reactivestreams.tck')
attributes('Implementation-Title': project.name)
attributes('Implementation-Version': project.version)
attributes('Implementation-Url': 'https://github.com/reactive-streams/reactive-streams-jvm.git')
attributes('Specification-Title': project.name)
attributes('Specification-Version': project.version)
}
}
javadocJar {
manifest {
attributes('Implementation-Title': project.name)
attributes('Implementation-Version': project.version)
attributes('Implementation-Url': 'https://github.com/reactive-streams/reactive-streams-jvm.git')
attributes('Specification-Title': project.name)
attributes('Specification-Version': project.version)
}
}
sourcesJar {
manifest {
attributes('Implementation-Title': project.name)
attributes('Implementation-Version': project.version)
attributes('Implementation-Url': 'https://github.com/reactive-streams/reactive-streams-jvm.git')
attributes('Specification-Title': project.name)
attributes('Specification-Version': project.version)
}
}
test.useTestNG()
| 0
|
sample_52_95.ps1
|
function Disable-WACAFFeatures {
<#
.SYNOPSIS
Disables all features that are not already disabled in the selected list.
.DESCRIPTION
Disables all features that are not already disabled in the selected list.
.ROLE
Administrators
#>
Param([object[]] $Features)
Set-StrictMode -Version 5.0;
$SuccessfulDisables = New-Object System.Collections.ArrayList
$FailedDisables = New-Object System.Collections.ArrayList
$ErrorMessages = New-Object System.Collections.ArrayList
$DisableError = $null
# sometimes the user has not restarted their computer in a while and this script usually will not
# work until they restart and clean up whatever junk has been accumulated
$NeedRestart = $false;
foreach($Feature in $Features) {
(Disable-WindowsOptionalFeature -Online -FeatureName $Feature.Name -NoRestart -ErrorVariable DisableError -ErrorAction SilentlyContinue) | Out-Null
if ($DisableError) {
$FailedDisables += $Feature.Name
$ErrorMessages += $EnableFailure
} else {
$SuccessfulDisables += $Feature.Name
# if the state has not changed, but the script did not throw an error, let the user know they should try restarting
$VerifyEnable = Get-WindowsOptionalFeature -Online | Where-Object FeatureName -eq $Feature.Name
if ($VerifyEnable.State -eq "Enabled") {
$NeedRestart = $true;
}
}
}
# TODO: update this when there is a standard method for localizing batch notifications from powershell
# at the moment this is a hack to return a mix of success/error messages in the event that at least one state change failed.
if ($FailedDisables.Count -gt 0) {
$SuccessMessage = $SuccessfulDisables -join ", "
$FailureMessage = $FailedDisables -join ", "
$ReturnMessage = $SuccessMessage + "~" + $FailureMessage + ". " + $ErrorMessages -join ", "
throw $ReturnMessage
}
# component class will check for this and return a special error message alerting the user to restart
$NeedRestart
}
## [END] Disable-WACAFFeatures ##
function Enable-WACAFFeatures {
<#
.SYNOPSIS
Enables all features that are not already enabled in the selected list.
.DESCRIPTION
Enables all features that are not already enabled in the selected list.
.ROLE
Administrators
#>
Param([object[]] $Features)
Set-StrictMode -Version 5.0;
$SuccessfulEnables = New-Object System.Collections.ArrayList
$FailedEnables = New-Object System.Collections.ArrayList
$ErrorMessages = New-Object System.Collections.ArrayList
$EnableFailure = $null
# sometimes the user has not restarted their computer in a while and this script usually will not
# work until they restart and clean up whatever junk has been accumulated
$NeedRestart = $false;
foreach($Feature in $Features) {
(Enable-WindowsOptionalFeature -Online -FeatureName $Feature.Name -All -NoRestart -ErrorVariable EnableFailure -ErrorAction SilentlyContinue) | Out-Null
if ($EnableFailure) {
$FailedEnables += $Feature.Name
$ErrorMessages += $EnableFailure
} else {
$SuccessfulEnables += $Feature.Name
# if the state has not changed, but the script did not throw an error, let the user know they should try restarting
$VerifyEnable = Get-WindowsOptionalFeature -Online | Where-Object FeatureName -eq $Feature.Name
if ($VerifyEnable.State -eq "Disabled") {
$NeedRestart = $true;
}
}
}
# TODO: update this when there is a standard method for localizing batch notifications from powershell
# at the moment this is a hack to return a mix of success/error messages in the event that at least one state change failed.
if ($FailedEnables.Count -gt 0) {
$SuccessMessage = $SuccessfulEnables -join ", "
$FailureMessage = $FailedEnables -join ", "
$ReturnMessage = $SuccessMessage + "~" + $FailureMessage + ". " + $ErrorMessages -join ", "
throw $ReturnMessage
}
# component class will check for this and return a special error message alerting the user to restart
$NeedRestart
}
## [END] Enable-WACAFFeatures ##
function Get-WACAFAppListServer {
<#
.SYNOPSIS
Retrieves a list of software installed on this machine.
.DESCRIPTION
Retrieves a list of software installed on this machine. Servers cannot access the normal aeinv.dll library
so there is no way to replicate the Apps and Featurs page in the same way desktops can. Instead, we parse
the registry in 4 different uninstall folders and look for the property System Component. If this property
exists, this application is hidden from the user. If the property does not appear in a registry entry then
we DO return this application in the resultant list.
.ROLE
Readers
#>
$Roots = @("HKLM:", "HKCU:")
$Folders = @(
"\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall",
"\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall"
)
$Result = @()
foreach($Root in $Roots) {
foreach($Folder in $Folders) {
$Path = $Root + "\" + $Folder
Set-Location $Path -ErrorAction SilentlyContinue
$Programs = Get-ChildItem $Path -ErrorAction SilentlyContinue
foreach($Program in $Programs) {
$App = New-Object PSObject
$Hidden = $Program.GetValue("SystemComponent")
if ($Hidden -eq $null) {
# Name and version
$Name = $Program.GetValue("DisplayName")
$Version = $Program.GetValue("DisplayVersion")
# Size
$EstimatedSize = $Program.GetValue("EstimatedSize")
if ($EstimatedSize -ne $null) {
# size returned is in KB not B so we need to put it back to the right base to use the ByteConverter
$EstimatedSize = $EstimatedSize * 1024
}
# InstallDate
$InstallDate = $Program.GetValue("InstallDate")
if ($InstallDate -ne $null) {
try {
$InstallDate = [datetime]::ParseExact($InstallDate,'yyyyMMdd', $null)
}
catch {
$InstallDate = $null
}
}
# Publisher
$Publisher = $Program.GetValue("Publisher")
# UninstallString and IsRemovable
$UninstallString = $Program.GetValue("UninstallString")
if ($UninstallString) {
if ($UninstallString.ToLower().Contains("msiexec.exe")) {
# If the UninstallString uses msiexec.exe, replace the /I with /X for uninstall
if ($UninstallString.Contains("/I")) {
$UninstallString = $UninstallString.Replace("/I", "/X");
} elseif ($UninstallString.Contains("/i")) {
$UninstallString = $UninstallString.Replace("/i", "/x");
}
$IsRemovable = $true
} else {
# If the UninstallString uses an uninstall exe, then mark this app as unremovable.
$IsRemovable = $false
}
} else {
$IsRemovable = $false
}
# ID
if ($UninstallString -ne $null) {
$Id = $UninstallString
} else {
$Id = $Name + $Version
}
$App | Add-Member -MemberType NoteProperty -Name "Name" -Value $Name
$App | Add-Member -MemberType NoteProperty -Name "Version" -Value $Version
$App | Add-Member -MemberType NoteProperty -Name "Size" -Value $EstimatedSize
$App | Add-Member -MemberType NoteProperty -Name "InstallDate" -Value $InstallDate
$App | Add-Member -MemberType NoteProperty -Name "Source" -Value $null
$App | Add-Member -MemberType NoteProperty -Name "Publisher" -Value $Publisher
$App | Add-Member -MemberType NoteProperty -Name "UninstallString" -Value $UninstallString
$App | Add-Member -MemberType NoteProperty -Name "IsRemovable" -Value $IsRemovable
$App | Add-Member -MemberType NoteProperty -Name "Id" -Value $Id
$Result += $App
}
}
}
}
$Result
}
## [END] Get-WACAFAppListServer ##
function Get-WACAFAppListWindowsPC {
<#
.SYNOPSIS
Retrieves a list of all classic applications and various properties including UninstallString
to remove the application.
.DESCRIPTION
Retrieves a list of all classic applications and various properties including UninstallString
to remove the application.
.ROLE
Readers
#>
Set-StrictMode -Version 5.0;
$NativeCode = @"
namespace SME
{
using System;
using System.Runtime.InteropServices;
// INTERNAL SOURCE CODE
// CreateSoftwareInventory REF: https://microsoft.visualstudio.com/OS/_git/os?path=%2Fsdktools%2Fappcert%2Fsrc%2Ftasks%2FNativeMethods.cs&version=GBofficial%2Frsmaster
// Flag parameters REF: https://microsoft.visualstudio.com/OS/_git/os?path=%2Fbase%2Fappcompat%2Fappraiser%2Fscripts%2FTools%2FDetailedInventory%2Fmain.cpp&version=GBofficial%2Frsmaster
public static class AppInventory
{
[DllImport("aeinv.dll", CallingConvention = CallingConvention.StdCall)]
private static extern int CreateSoftwareInventory(
uint dwFlags,
[MarshalAs(UnmanagedType.BStr)] ref string pbstrIntermediateXML,
[MarshalAs(UnmanagedType.BStr)] ref string pbstrFinalXML);
public static string GetSoftwareInventory()
{
var intermediateXml = string.Empty;
var finalXml = string.Empty;
var flags = 983057U; // GAI_FLAG_SCAN_APPV | GAI_FLAG_SCAN_APPX | GAI_FLAG_SCAN_ARP | GAI_FLAG_SCAN_MISC | GAI_FLAG_APPLICATIONS | GAI_FLAG_APPLICATION_INFO
var hresult = CreateSoftwareInventory(flags, ref intermediateXml, ref finalXml);
Marshal.ThrowExceptionForHR(hresult);
return finalXml;
}
}
}
"@
function ProcessModernApp ([object] $App) {
$ModernApp = New-Object PSObject
$HiddenArp = $App.HiddenArp
# If the app is marked as hidden, do not return to viewable list
if ($HiddenArp -eq $false) {
# TODO: figure out some way to find size and install date for this source of apps
$Name = $App.Name
$Source = $App.Source
$Version = $App.Version
$Id = $App.Id
# xml details
# app has multiple root nodes so just add a temporary one to parse as XML object
$XmlString = $App.InnerXml
[xml] $Xml = "<tempRoot>$XmlString</tempRoot>"
$XmlProperties = $Xml.tempRoot.Indicators.WindowsStoreAppManifestIndicators.PackageManifest
# the package full name is used as the uninstall string for Remove-AppxPackage
$UninstallString = $XmlProperties.PackageFullName
$IsRemovable = $true
$Publisher = $XmlProperties.Package.Properties.PublisherDisplayName
# sometimes this field has been filled in and is more readable, sometimes it was left empty
$DisplayName = $XmlProperties.Package.Properties.DisplayName
$ModernApp | Add-Member -MemberType NoteProperty -Name "Name" -Value $Name
$ModernApp | Add-Member -MemberType NoteProperty -Name "Version" -Value $Version
$ModernApp | Add-Member -MemberType NoteProperty -Name "Size" -Value $null
$ModernApp | Add-Member -MemberType NoteProperty -Name "InstallDate" -Value $null
$ModernApp | Add-Member -MemberType NoteProperty -Name "Source" -Value $Source
$ModernApp | Add-Member -MemberType NoteProperty -Name "Publisher" -Value $Publisher
$ModernApp | Add-Member -MemberType NoteProperty -Name "UninstallString" -Value $UninstallString
$ModernApp | Add-Member -MemberType NoteProperty -Name "IsRemovable" -Value $IsRemovable
$ModernApp | Add-Member -MemberType NoteProperty -Name "Id" -Value $Id
$ModernApp | Add-Member -MemberType NoteProperty -Name "DisplayName" $DisplayName
return $ModernApp
}
return $null;
}
function ProcessClassicApp ([object] $App) {
$ClassicApp = New-Object PSObject
$HiddenArp = $App.HiddenArp
# If the app is marked as hidden, do not return to viewable list
if ($HiddenArp -eq $false) {
# base details
$Name = $App.Name
$Version = $App.Version
$InstallDate = $App.InstallDate
$Source = $App.Source
$Publisher = $App.Publisher
$Id = $App.Id;
# xml details
$MoreDetails = $App.Indicators.AddRemoveProgramIndicators.AddRemoveProgram
$UninstallString = $MoreDetails.UninstallString
if ($Source -eq 'Msi') {
# /X is an msiexec parameter for uninstall instead of /I for install
# /qn sets the UI level to none and /quiet insists on a silent uninstall so the user does not have to
# click a button confirming the uninstall.
if ($UninstallString.Contains("/I")) {
$UninstallString = $UninstallString.Replace("/I", "/X");
}
elseif ($UninstallString.Contains("/i")) {
$UninstallString = $UninstallString.Replace("/i", "/x");
}
$UninstallString += " /qn /quiet"
$IsRemovable = $true
}
else {
$IsRemovable = $false
}
# parsing remaning properties from registry
$RegistryKeyPath = "Registry::" + $MoreDetails.RegistryKeyPath
# square brackets in application name will result in an invalid
# character pattern error, therefore, a literalpath is used instead
$EstimatedSize = Get-ItemProperty -LiteralPath $RegistryKeyPath -Name EstimatedSize -ErrorAction SilentlyContinue
if ($EstimatedSize -ne $null) {
# size returned is in KB not B so we need to put it back to the right base to use the ByteConverter
$EstimatedSize = $EstimatedSize.EstimatedSize * 1024
}
$ClassicApp | Add-Member -MemberType NoteProperty -Name "Name" -Value $Name
$ClassicApp | Add-Member -MemberType NoteProperty -Name "Version" -Value $Version
$ClassicApp | Add-Member -MemberType NoteProperty -Name "Size" -Value $EstimatedSize
$ClassicApp | Add-Member -MemberType NoteProperty -Name "InstallDate" -Value $InstallDate
$ClassicApp | Add-Member -MemberType NoteProperty -Name "Source" -Value $Source
$ClassicApp | Add-Member -MemberType NoteProperty -Name "Publisher" -Value $Publisher
$ClassicApp | Add-Member -MemberType NoteProperty -Name "UninstallString" -Value $UninstallString
$ClassicApp | Add-Member -MemberType NoteProperty -Name "IsRemovable" -Value $IsRemovable
$ClassicApp | Add-Member -MemberType NoteProperty -Name "Id" -Value $Id
return $ClassicApp
}
return $null
}
###############################################################################
# main
###############################################################################
Add-Type -TypeDefinition $NativeCode
$Xml = [xml] ([SME.AppInventory]::GetSoftwareInventory())
$Applications = $Xml.Log.ProgramList.SelectNodes('Program')
# loop through all applications returned by this flag filtering.
# there are different parameters for modern and classic applications.
$Result = @()
foreach ($App in $Applications) {
$AppObject = $null
if ($App.source -eq 'AppxPackage') {
$AppObject = ProcessModernApp($App)
} else {
$AppObject = ProcessClassicApp($App)
}
if ($AppObject -ne $null) {
$Result += $AppObject
}
}
$Result
}
## [END] Get-WACAFAppListWindowsPC ##
function Get-WACAFFeatureList {
<#
.SYNOPSIS
Retrieves a list of all features on this node.
.DESCRIPTION
Retrieves a list of all features on this node.
.ROLE
Readers
#>
Set-StrictMode -Version 5.0;
Get-WindowsOptionalFeature -Online | Sort-Object FeatureName
}
## [END] Get-WACAFFeatureList ##
function Remove-WACAFApps {
<#
.SYNOPSIS
Uninstalls all applications selected for removal. Uses either msiexec or remove appx-package
depending on the source of the application.
.DESCRIPTION
Uninstalls all applications selected for removal. Uses either msiexec or remove appx-package
depending on the source of the application.
.ROLE
Administrators
#>
Param([object[]] $Apps)
Set-StrictMode -Version 5.0;
$SuccessMessage = "Successfully removed '{0}'"
$RemoveSuccesses = New-Object System.Collections.ArrayList
$RemoveSuccessesMessage = ""
$FailureMessage = "We couldn't remove application(s) '{0}'. Error: {1}"
$RemoveFailures = New-Object System.Collections.ArrayList
$RemoveFailuresMessage = ""
foreach ($App in $Apps) {
$Name = $App.Name
$Source = $App.Source
# modern app removal
if ($Source -eq 'AppxPackage') {
Remove-AppxPackage ($App.UninstallString) -ErrorVariable UninstallError -ErrorAction SilentlyContinue
if ($UninstallError) {
$ErrorMessage = $FailureMessage -f $Name, $UninstallError[0].Exception.Message
$RemoveFailures += $ErrorMessage
} else {
$RemoveSuccesses += $Name
}
# classic app removal
} else {
Start-Process -FilePath $env:ComSpec -ArgumentList "/c", $App.UninstallString, " /quiet /qn" -Wait -ErrorVariable UninstallError -ErrorAction SilentlyContinue
if ($UninstallError) {
$ErrorMessage = $FailureMessage -f $Name, $UninstallError[0].Exception.Message
$RemoveFailures += $ErrorMessage
} else {
$RemoveSuccesses += $Name
}
}
}
if ($RemoveFailures.Count -gt 0) {
$RemoveSuccessesMessage = $SuccessMessage -f ($RemoveSuccesses -join ", ")
$RemoveFailuresMessage = $RemoveFailures -join ", "
$ReturnMessage = $RemoveSuccessesMessage + ". " + $RemoveFailuresMessage
throw $ReturnMessage
}
}
## [END] Remove-WACAFApps ##
function Restart-WACAFCimOperatingSystem {
<#
.SYNOPSIS
Reboot Windows Operating System by using Win32_OperatingSystem provider.
.DESCRIPTION
Reboot Windows Operating System by using Win32_OperatingSystem provider.
.ROLE
Administrators
#>
##SkipCheck=true##
Param(
)
import-module CimCmdlets
Invoke-CimMethod -Namespace root/cimv2 -ClassName Win32_OperatingSystem -MethodName Reboot
}
## [END] Restart-WACAFCimOperatingSystem ##
function Get-WACAFCimWin32LogicalDisk {
<#
.SYNOPSIS
Gets Win32_LogicalDisk object.
.DESCRIPTION
Gets Win32_LogicalDisk object.
.ROLE
Readers
#>
##SkipCheck=true##
import-module CimCmdlets
Get-CimInstance -Namespace root/cimv2 -ClassName Win32_LogicalDisk
}
## [END] Get-WACAFCimWin32LogicalDisk ##
function Get-WACAFCimWin32NetworkAdapter {
<#
.SYNOPSIS
Gets Win32_NetworkAdapter object.
.DESCRIPTION
Gets Win32_NetworkAdapter object.
.ROLE
Readers
#>
##SkipCheck=true##
import-module CimCmdlets
Get-CimInstance -Namespace root/cimv2 -ClassName Win32_NetworkAdapter
}
## [END] Get-WACAFCimWin32NetworkAdapter ##
function Get-WACAFCimWin32PhysicalMemory {
<#
.SYNOPSIS
Gets Win32_PhysicalMemory object.
.DESCRIPTION
Gets Win32_PhysicalMemory object.
.ROLE
Readers
#>
##SkipCheck=true##
import-module CimCmdlets
Get-CimInstance -Namespace root/cimv2 -ClassName Win32_PhysicalMemory
}
## [END] Get-WACAFCimWin32PhysicalMemory ##
function Get-WACAFCimWin32Processor {
<#
.SYNOPSIS
Gets Win32_Processor object.
.DESCRIPTION
Gets Win32_Processor object.
.ROLE
Readers
#>
##SkipCheck=true##
import-module CimCmdlets
Get-CimInstance -Namespace root/cimv2 -ClassName Win32_Processor
}
## [END] Get-WACAFCimWin32Processor ##
function Get-WACAFClusterInventory {
<#
.SYNOPSIS
Retrieves the inventory data for a cluster.
.DESCRIPTION
Retrieves the inventory data for a cluster.
.ROLE
Readers
#>
Import-Module CimCmdlets -ErrorAction SilentlyContinue
# JEA code requires to pre-import the module (this is slow on failover cluster environment.)
Import-Module FailoverClusters -ErrorAction SilentlyContinue
Import-Module Storage -ErrorAction SilentlyContinue
<#
.SYNOPSIS
Get the name of this computer.
.DESCRIPTION
Get the best available name for this computer. The FQDN is preferred, but when not avaialble
the NetBIOS name will be used instead.
#>
function getComputerName() {
$computerSystem = Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object Name, DNSHostName
if ($computerSystem) {
$computerName = $computerSystem.DNSHostName
if ($null -eq $computerName) {
$computerName = $computerSystem.Name
}
return $computerName
}
return $null
}
<#
.SYNOPSIS
Are the cluster PowerShell cmdlets installed on this server?
.DESCRIPTION
Are the cluster PowerShell cmdlets installed on this server?
#>
function getIsClusterCmdletAvailable() {
$cmdlet = Get-Command "Get-Cluster" -ErrorAction SilentlyContinue
return !!$cmdlet
}
<#
.SYNOPSIS
Get the MSCluster Cluster CIM instance from this server.
.DESCRIPTION
Get the MSCluster Cluster CIM instance from this server.
#>
function getClusterCimInstance() {
$namespace = Get-CimInstance -Namespace root/MSCluster -ClassName __NAMESPACE -ErrorAction SilentlyContinue
if ($namespace) {
return Get-CimInstance -Namespace root/mscluster MSCluster_Cluster -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object fqdn, S2DEnabled
}
return $null
}
<#
.SYNOPSIS
Determines if the current cluster supports Failover Clusters Time Series Database.
.DESCRIPTION
Use the existance of the path value of cmdlet Get-StorageHealthSetting to determine if TSDB
is supported or not.
#>
function getClusterPerformanceHistoryPath() {
$storageSubsystem = Get-StorageSubSystem clus* -ErrorAction SilentlyContinue
$storageHealthSettings = Get-StorageHealthSetting -InputObject $storageSubsystem -Name "System.PerformanceHistory.Path" -ErrorAction SilentlyContinue
return $null -ne $storageHealthSettings
}
<#
.SYNOPSIS
Get some basic information about the cluster from the cluster.
.DESCRIPTION
Get the needed cluster properties from the cluster.
#>
function getClusterInfo() {
$returnValues = @{}
$returnValues.Fqdn = $null
$returnValues.isS2DEnabled = $false
$returnValues.isTsdbEnabled = $false
$cluster = getClusterCimInstance
if ($cluster) {
$returnValues.Fqdn = $cluster.fqdn
$isS2dEnabled = !!(Get-Member -InputObject $cluster -Name "S2DEnabled") -and ($cluster.S2DEnabled -eq 1)
$returnValues.isS2DEnabled = $isS2dEnabled
if ($isS2DEnabled) {
$returnValues.isTsdbEnabled = getClusterPerformanceHistoryPath
} else {
$returnValues.isTsdbEnabled = $false
}
}
return $returnValues
}
<#
.SYNOPSIS
Are the cluster PowerShell Health cmdlets installed on this server?
.DESCRIPTION
Are the cluster PowerShell Health cmdlets installed on this server?
s#>
function getisClusterHealthCmdletAvailable() {
$cmdlet = Get-Command -Name "Get-HealthFault" -ErrorAction SilentlyContinue
return !!$cmdlet
}
<#
.SYNOPSIS
Are the Britannica (sddc management resources) available on the cluster?
.DESCRIPTION
Are the Britannica (sddc management resources) available on the cluster?
#>
function getIsBritannicaEnabled() {
return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_Cluster -ErrorAction SilentlyContinue)
}
<#
.SYNOPSIS
Are the Britannica (sddc management resources) virtual machine available on the cluster?
.DESCRIPTION
Are the Britannica (sddc management resources) virtual machine available on the cluster?
#>
function getIsBritannicaVirtualMachineEnabled() {
return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_VirtualMachine -ErrorAction SilentlyContinue)
}
<#
.SYNOPSIS
Are the Britannica (sddc management resources) virtual switch available on the cluster?
.DESCRIPTION
Are the Britannica (sddc management resources) virtual switch available on the cluster?
#>
function getIsBritannicaVirtualSwitchEnabled() {
return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_VirtualSwitch -ErrorAction SilentlyContinue)
}
###########################################################################
# main()
###########################################################################
$clusterInfo = getClusterInfo
$result = New-Object PSObject
$result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $clusterInfo.Fqdn
$result | Add-Member -MemberType NoteProperty -Name 'IsS2DEnabled' -Value $clusterInfo.isS2DEnabled
$result | Add-Member -MemberType NoteProperty -Name 'IsTsdbEnabled' -Value $clusterInfo.isTsdbEnabled
$result | Add-Member -MemberType NoteProperty -Name 'IsClusterHealthCmdletAvailable' -Value (getIsClusterHealthCmdletAvailable)
$result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaEnabled' -Value (getIsBritannicaEnabled)
$result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaVirtualMachineEnabled' -Value (getIsBritannicaVirtualMachineEnabled)
$result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaVirtualSwitchEnabled' -Value (getIsBritannicaVirtualSwitchEnabled)
$result | Add-Member -MemberType NoteProperty -Name 'IsClusterCmdletAvailable' -Value (getIsClusterCmdletAvailable)
$result | Add-Member -MemberType NoteProperty -Name 'CurrentClusterNode' -Value (getComputerName)
$result
}
## [END] Get-WACAFClusterInventory ##
function Get-WACAFClusterNodes {
<#
.SYNOPSIS
Retrieves the inventory data for cluster nodes in a particular cluster.
.DESCRIPTION
Retrieves the inventory data for cluster nodes in a particular cluster.
.ROLE
Readers
#>
import-module CimCmdlets
# JEA code requires to pre-import the module (this is slow on failover cluster environment.)
import-module FailoverClusters -ErrorAction SilentlyContinue
###############################################################################
# Constants
###############################################################################
Set-Variable -Name LogName -Option Constant -Value "Microsoft-ServerManagementExperience" -ErrorAction SilentlyContinue
Set-Variable -Name LogSource -Option Constant -Value "SMEScripts" -ErrorAction SilentlyContinue
Set-Variable -Name ScriptName -Option Constant -Value $MyInvocation.ScriptName -ErrorAction SilentlyContinue
<#
.SYNOPSIS
Are the cluster PowerShell cmdlets installed?
.DESCRIPTION
Use the Get-Command cmdlet to quickly test if the cluster PowerShell cmdlets
are installed on this server.
#>
function getClusterPowerShellSupport() {
$cmdletInfo = Get-Command 'Get-ClusterNode' -ErrorAction SilentlyContinue
return $cmdletInfo -and $cmdletInfo.Name -eq "Get-ClusterNode"
}
<#
.SYNOPSIS
Get the cluster nodes using the cluster CIM provider.
.DESCRIPTION
When the cluster PowerShell cmdlets are not available fallback to using
the cluster CIM provider to get the needed information.
#>
function getClusterNodeCimInstances() {
# Change the WMI property NodeDrainStatus to DrainStatus to match the PS cmdlet output.
return Get-CimInstance -Namespace root/mscluster MSCluster_Node -ErrorAction SilentlyContinue | `
Microsoft.PowerShell.Utility\Select-Object @{Name="DrainStatus"; Expression={$_.NodeDrainStatus}}, DynamicWeight, Name, NodeWeight, FaultDomain, State
}
<#
.SYNOPSIS
Get the cluster nodes using the cluster PowerShell cmdlets.
.DESCRIPTION
When the cluster PowerShell cmdlets are available use this preferred function.
#>
function getClusterNodePsInstances() {
return Get-ClusterNode -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object DrainStatus, DynamicWeight, Name, NodeWeight, FaultDomain, State
}
<#
.SYNOPSIS
Use DNS services to get the FQDN of the cluster NetBIOS name.
.DESCRIPTION
Use DNS services to get the FQDN of the cluster NetBIOS name.
.Notes
It is encouraged that the caller add their approprate -ErrorAction when
calling this function.
#>
function getClusterNodeFqdn([string]$clusterNodeName) {
return ([System.Net.Dns]::GetHostEntry($clusterNodeName)).HostName
}
<#
.SYNOPSIS
Writes message to event log as warning.
.DESCRIPTION
Writes message to event log as warning.
#>
function writeToEventLog([string]$message) {
Microsoft.PowerShell.Management\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue
Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Warning `
-Message $message -ErrorAction SilentlyContinue
}
<#
.SYNOPSIS
Get the cluster nodes.
.DESCRIPTION
When the cluster PowerShell cmdlets are available get the information about the cluster nodes
using PowerShell. When the cmdlets are not available use the Cluster CIM provider.
#>
function getClusterNodes() {
$isClusterCmdletAvailable = getClusterPowerShellSupport
if ($isClusterCmdletAvailable) {
$clusterNodes = getClusterNodePsInstances
} else {
$clusterNodes = getClusterNodeCimInstances
}
$clusterNodeMap = @{}
foreach ($clusterNode in $clusterNodes) {
$clusterNodeName = $clusterNode.Name.ToLower()
try
{
$clusterNodeFqdn = getClusterNodeFqdn $clusterNodeName -ErrorAction SilentlyContinue
}
catch
{
$clusterNodeFqdn = $clusterNodeName
writeToEventLog "[$ScriptName]: The fqdn for node '$clusterNodeName' could not be obtained. Defaulting to machine name '$clusterNodeName'"
}
$clusterNodeResult = New-Object PSObject
$clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'FullyQualifiedDomainName' -Value $clusterNodeFqdn
$clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'Name' -Value $clusterNodeName
$clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'DynamicWeight' -Value $clusterNode.DynamicWeight
$clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'NodeWeight' -Value $clusterNode.NodeWeight
$clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'FaultDomain' -Value $clusterNode.FaultDomain
$clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'State' -Value $clusterNode.State
$clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'DrainStatus' -Value $clusterNode.DrainStatus
$clusterNodeMap.Add($clusterNodeName, $clusterNodeResult)
}
return $clusterNodeMap
}
###########################################################################
# main()
###########################################################################
getClusterNodes
}
## [END] Get-WACAFClusterNodes ##
function Get-WACAFDecryptedDataFromNode {
<#
.SYNOPSIS
Gets data after decrypting it on a node.
.DESCRIPTION
Decrypts data on node using a cached RSAProvider used during encryption within 3 minutes of encryption and returns the decrypted data.
This script should be imported or copied directly to other scripts, do not send the returned data as an argument to other scripts.
.PARAMETER encryptedData
Encrypted data to be decrypted (String).
.ROLE
Readers
#>
param (
[Parameter(Mandatory = $true)]
[String]
$encryptedData
)
Set-StrictMode -Version 5.0
New-Variable -Name rsaProviderInstanceName -Value "RSA" -Option Constant
function DecryptDataWithJWKOnNode {
if(Get-Variable -Scope Global -Name $rsaProviderInstanceName -EA SilentlyContinue) {
$rsaProvider = (Get-Variable -Scope Global -Name $rsaProviderInstanceName).Value
$decryptedBytes = $rsaProvider.Decrypt([Convert]::FromBase64String($encryptedData), [System.Security.Cryptography.RSAEncryptionPadding]::OaepSHA1)
return [System.Text.Encoding]::UTF8.GetString($decryptedBytes)
}
# If you copy this script directly to another, you can get rid of the throw statement and add custom error handling logic such as "Write-Error"
throw [System.InvalidOperationException] "Password decryption failed. RSACryptoServiceProvider Instance not found"
}
}
## [END] Get-WACAFDecryptedDataFromNode ##
function Get-WACAFEncryptionJWKOnNode {
<#
.SYNOPSIS
Gets encrytion JSON web key from node.
.DESCRIPTION
Gets encrytion JSON web key from node.
.ROLE
Readers
#>
Set-StrictMode -Version 5.0
New-Variable -Name rsaProviderInstanceName -Value "RSA" -Option Constant
function Get-RSAProvider
{
if(Get-Variable -Scope Global -Name $rsaProviderInstanceName -EA SilentlyContinue)
{
return (Get-Variable -Scope Global -Name $rsaProviderInstanceName).Value
}
$Global:RSA = New-Object System.Security.Cryptography.RSACryptoServiceProvider -ArgumentList 4096
return $RSA
}
function Get-JsonWebKey
{
$rsaProvider = Get-RSAProvider
$parameters = $rsaProvider.ExportParameters($false)
return [PSCustomObject]@{
kty = 'RSA'
alg = 'RSA-OAEP'
e = [Convert]::ToBase64String($parameters.Exponent)
n = [Convert]::ToBase64String($parameters.Modulus).TrimEnd('=').Replace('+', '-').Replace('/', '_')
}
}
$jwk = Get-JsonWebKey
ConvertTo-Json $jwk -Compress
}
## [END] Get-WACAFEncryptionJWKOnNode ##
function Get-WACAFServerInventory {
<#
.SYNOPSIS
Retrieves the inventory data for a server.
.DESCRIPTION
Retrieves the inventory data for a server.
.ROLE
Readers
#>
Set-StrictMode -Version 5.0
Import-Module CimCmdlets
Import-Module Storage -ErrorAction SilentlyContinue
<#
.SYNOPSIS
Converts an arbitrary version string into just 'Major.Minor'
.DESCRIPTION
To make OS version comparisons we only want to compare the major and
minor version. Build number and/os CSD are not interesting.
#>
function convertOsVersion([string]$osVersion) {
[Ref]$parsedVersion = $null
if (![Version]::TryParse($osVersion, $parsedVersion)) {
return $null
}
$version = [Version]$parsedVersion.Value
return New-Object Version -ArgumentList $version.Major, $version.Minor
}
<#
.SYNOPSIS
Determines if CredSSP is enabled for the current server or client.
.DESCRIPTION
Check the registry value for the CredSSP enabled state.
#>
function isCredSSPEnabled() {
Set-Variable credSSPServicePath -Option Constant -Value "WSMan:\localhost\Service\Auth\CredSSP"
Set-Variable credSSPClientPath -Option Constant -Value "WSMan:\localhost\Client\Auth\CredSSP"
$credSSPServerEnabled = $false;
$credSSPClientEnabled = $false;
$credSSPServerService = Get-Item $credSSPServicePath -ErrorAction SilentlyContinue
if ($credSSPServerService) {
$credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value)
}
$credSSPClientService = Get-Item $credSSPClientPath -ErrorAction SilentlyContinue
if ($credSSPClientService) {
$credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)
}
return ($credSSPServerEnabled -or $credSSPClientEnabled)
}
<#
.SYNOPSIS
Determines if the Hyper-V role is installed for the current server or client.
.DESCRIPTION
The Hyper-V role is installed when the VMMS service is available. This is much
faster then checking Get-WindowsFeature and works on Windows Client SKUs.
#>
function isHyperVRoleInstalled() {
$vmmsService = Get-Service -Name "VMMS" -ErrorAction SilentlyContinue
return $vmmsService -and $vmmsService.Name -eq "VMMS"
}
<#
.SYNOPSIS
Determines if the Hyper-V PowerShell support module is installed for the current server or client.
.DESCRIPTION
The Hyper-V PowerShell support module is installed when the modules cmdlets are available. This is much
faster then checking Get-WindowsFeature and works on Windows Client SKUs.
#>
function isHyperVPowerShellSupportInstalled() {
# quicker way to find the module existence. it doesn't load the module.
return !!(Get-Module -ListAvailable Hyper-V -ErrorAction SilentlyContinue)
}
<#
.SYNOPSIS
Determines if Windows Management Framework (WMF) 5.0, or higher, is installed for the current server or client.
.DESCRIPTION
Windows Admin Center requires WMF 5 so check the registey for WMF version on Windows versions that are less than
Windows Server 2016.
#>
function isWMF5Installed([string] $operatingSystemVersion) {
Set-Variable Server2016 -Option Constant -Value (New-Object Version '10.0') # And Windows 10 client SKUs
Set-Variable Server2012 -Option Constant -Value (New-Object Version '6.2')
$version = convertOsVersion $operatingSystemVersion
if (-not $version) {
# Since the OS version string is not properly formatted we cannot know the true installed state.
return $false
}
if ($version -ge $Server2016) {
# It's okay to assume that 2016 and up comes with WMF 5 or higher installed
return $true
}
else {
if ($version -ge $Server2012) {
# Windows 2012/2012R2 are supported as long as WMF 5 or higher is installed
$registryKey = 'HKLM:\SOFTWARE\Microsoft\PowerShell\3\PowerShellEngine'
$registryKeyValue = Get-ItemProperty -Path $registryKey -Name PowerShellVersion -ErrorAction SilentlyContinue
if ($registryKeyValue -and ($registryKeyValue.PowerShellVersion.Length -ne 0)) {
$installedWmfVersion = [Version]$registryKeyValue.PowerShellVersion
if ($installedWmfVersion -ge [Version]'5.0') {
return $true
}
}
}
}
return $false
}
<#
.SYNOPSIS
Determines if the current usser is a system administrator of the current server or client.
.DESCRIPTION
Determines if the current usser is a system administrator of the current server or client.
#>
function isUserAnAdministrator() {
return ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")
}
<#
.SYNOPSIS
Get some basic information about the Failover Cluster that is running on this server.
.DESCRIPTION
Create a basic inventory of the Failover Cluster that may be running in this server.
#>
function getClusterInformation() {
$returnValues = @{ }
$returnValues.IsS2dEnabled = $false
$returnValues.IsCluster = $false
$returnValues.ClusterFqdn = $null
$returnValues.IsBritannicaEnabled = $false
$namespace = Get-CimInstance -Namespace root/MSCluster -ClassName __NAMESPACE -ErrorAction SilentlyContinue
if ($namespace) {
$cluster = Get-CimInstance -Namespace root/MSCluster -ClassName MSCluster_Cluster -ErrorAction SilentlyContinue
if ($cluster) {
$returnValues.IsCluster = $true
$returnValues.ClusterFqdn = $cluster.Fqdn
$returnValues.IsS2dEnabled = !!(Get-Member -InputObject $cluster -Name "S2DEnabled") -and ($cluster.S2DEnabled -gt 0)
$returnValues.IsBritannicaEnabled = $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_Cluster -ErrorAction SilentlyContinue)
}
}
return $returnValues
}
<#
.SYNOPSIS
Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the passed in computer name.
.DESCRIPTION
Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the passed in computer name.
#>
function getComputerFqdnAndAddress($computerName) {
$hostEntry = [System.Net.Dns]::GetHostEntry($computerName)
$addressList = @()
foreach ($item in $hostEntry.AddressList) {
$address = New-Object PSObject
$address | Add-Member -MemberType NoteProperty -Name 'IpAddress' -Value $item.ToString()
$address | Add-Member -MemberType NoteProperty -Name 'AddressFamily' -Value $item.AddressFamily.ToString()
$addressList += $address
}
$result = New-Object PSObject
$result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $hostEntry.HostName
$result | Add-Member -MemberType NoteProperty -Name 'AddressList' -Value $addressList
return $result
}
<#
.SYNOPSIS
Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the current server or client.
.DESCRIPTION
Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the current server or client.
#>
function getHostFqdnAndAddress($computerSystem) {
$computerName = $computerSystem.DNSHostName
if (!$computerName) {
$computerName = $computerSystem.Name
}
return getComputerFqdnAndAddress $computerName
}
<#
.SYNOPSIS
Are the needed management CIM interfaces available on the current server or client.
.DESCRIPTION
Check for the presence of the required server management CIM interfaces.
#>
function getManagementToolsSupportInformation() {
$returnValues = @{ }
$returnValues.ManagementToolsAvailable = $false
$returnValues.ServerManagerAvailable = $false
$namespaces = Get-CimInstance -Namespace root/microsoft/windows -ClassName __NAMESPACE -ErrorAction SilentlyContinue
if ($namespaces) {
$returnValues.ManagementToolsAvailable = !!($namespaces | Where-Object { $_.Name -ieq "ManagementTools" })
$returnValues.ServerManagerAvailable = !!($namespaces | Where-Object { $_.Name -ieq "ServerManager" })
}
return $returnValues
}
<#
.SYNOPSIS
Check the remote app enabled or not.
.DESCRIPTION
Check the remote app enabled or not.
#>
function isRemoteAppEnabled() {
Set-Variable key -Option Constant -Value "HKLM:\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Terminal Server\\TSAppAllowList"
$registryKeyValue = Get-ItemProperty -Path $key -Name fDisabledAllowList -ErrorAction SilentlyContinue
if (-not $registryKeyValue) {
return $false
}
return $registryKeyValue.fDisabledAllowList -eq 1
}
<#
.SYNOPSIS
Check the remote app enabled or not.
.DESCRIPTION
Check the remote app enabled or not.
#>
<#
c
.SYNOPSIS
Get the Win32_OperatingSystem information as well as current version information from the registry
.DESCRIPTION
Get the Win32_OperatingSystem instance and filter the results to just the required properties.
This filtering will make the response payload much smaller. Included in the results are current version
information from the registry
#>
function getOperatingSystemInfo() {
$operatingSystemInfo = Get-CimInstance Win32_OperatingSystem | Microsoft.PowerShell.Utility\Select-Object csName, Caption, OperatingSystemSKU, Version, ProductType, OSType, LastBootUpTime, SerialNumber
$currentVersion = Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" | Microsoft.PowerShell.Utility\Select-Object CurrentBuild, UBR, DisplayVersion
$operatingSystemInfo | Add-Member -MemberType NoteProperty -Name CurrentBuild -Value $currentVersion.CurrentBuild
$operatingSystemInfo | Add-Member -MemberType NoteProperty -Name UpdateBuildRevision -Value $currentVersion.UBR
$operatingSystemInfo | Add-Member -MemberType NoteProperty -Name DisplayVersion -Value $currentVersion.DisplayVersion
return $operatingSystemInfo
}
<#
.SYNOPSIS
Get the Win32_ComputerSystem information
.DESCRIPTION
Get the Win32_ComputerSystem instance and filter the results to just the required properties.
This filtering will make the response payload much smaller.
#>
function getComputerSystemInfo() {
return Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | `
Microsoft.PowerShell.Utility\Select-Object TotalPhysicalMemory, DomainRole, Manufacturer, Model, NumberOfLogicalProcessors, Domain, Workgroup, DNSHostName, Name, PartOfDomain, SystemFamily, SystemSKUNumber
}
<#
.SYNOPSIS
Get SMBIOS locally from the passed in machineName
.DESCRIPTION
Get SMBIOS locally from the passed in machine name
#>
function getSmbiosData($computerSystem) {
<#
Array of chassis types.
The following list of ChassisTypes is copied from the latest DMTF SMBIOS specification.
REF: https://www.dmtf.org/sites/default/files/standards/documents/DSP0134_3.1.1.pdf
#>
$ChassisTypes =
@{
1 = 'Other'
2 = 'Unknown'
3 = 'Desktop'
4 = 'Low Profile Desktop'
5 = 'Pizza Box'
6 = 'Mini Tower'
7 = 'Tower'
8 = 'Portable'
9 = 'Laptop'
10 = 'Notebook'
11 = 'Hand Held'
12 = 'Docking Station'
13 = 'All in One'
14 = 'Sub Notebook'
15 = 'Space-Saving'
16 = 'Lunch Box'
17 = 'Main System Chassis'
18 = 'Expansion Chassis'
19 = 'SubChassis'
20 = 'Bus Expansion Chassis'
21 = 'Peripheral Chassis'
22 = 'Storage Chassis'
23 = 'Rack Mount Chassis'
24 = 'Sealed-Case PC'
25 = 'Multi-system chassis'
26 = 'Compact PCI'
27 = 'Advanced TCA'
28 = 'Blade'
29 = 'Blade Enclosure'
30 = 'Tablet'
31 = 'Convertible'
32 = 'Detachable'
33 = 'IoT Gateway'
34 = 'Embedded PC'
35 = 'Mini PC'
36 = 'Stick PC'
}
$list = New-Object System.Collections.ArrayList
$win32_Bios = Get-CimInstance -class Win32_Bios
$obj = New-Object -Type PSObject | Microsoft.PowerShell.Utility\Select-Object SerialNumber, Manufacturer, UUID, BaseBoardProduct, ChassisTypes, Chassis, SystemFamily, SystemSKUNumber, SMBIOSAssetTag
$obj.SerialNumber = $win32_Bios.SerialNumber
$obj.Manufacturer = $win32_Bios.Manufacturer
$computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct
if ($null -ne $computerSystemProduct) {
$obj.UUID = $computerSystemProduct.UUID
}
$baseboard = Get-CimInstance Win32_BaseBoard
if ($null -ne $baseboard) {
$obj.BaseBoardProduct = $baseboard.Product
}
$systemEnclosure = Get-CimInstance Win32_SystemEnclosure
if ($null -ne $systemEnclosure) {
$obj.SMBIOSAssetTag = $systemEnclosure.SMBIOSAssetTag
}
$obj.ChassisTypes = Get-CimInstance Win32_SystemEnclosure | Microsoft.PowerShell.Utility\Select-Object -ExpandProperty ChassisTypes
$obj.Chassis = New-Object -TypeName 'System.Collections.ArrayList'
$obj.ChassisTypes | ForEach-Object -Process {
$obj.Chassis.Add($ChassisTypes[[int]$_])
}
$obj.SystemFamily = $computerSystem.SystemFamily
$obj.SystemSKUNumber = $computerSystem.SystemSKUNumber
$list.Add($obj) | Out-Null
return $list
}
<#
.SYNOPSIS
Get the azure arc status information
.DESCRIPTION
Get the azure arc status information
#>
function getAzureArcStatus() {
$LogName = "Microsoft-ServerManagementExperience"
$LogSource = "SMEScript"
$ScriptName = "Get-ServerInventory.ps1 - getAzureArcStatus()"
$AzcmagentExecutable = "$env:ProgramFiles\AzureConnectedMachineAgent\azcmagent.exe"
Microsoft.PowerShell.Management\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue
$service = Get-Service -Name himds -ErrorVariable Err -ErrorAction SilentlyContinue
if (!!$Err) {
$Err = "Failed to retrieve HIMDS service. Details: $Err"
Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information `
-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue
return "NotInstalled"
} elseif ($service.Status -ne "Running") {
$Err = "The Azure arc agent is not running. Details: HIMDS service is $($service.Status)"
Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information `
-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue
return "Disconnected"
}
$rawStatus = Invoke-Command { & $AzcmagentExecutable show --json --log-stderr } -ErrorVariable Err 2>$null
if (!!$Err) {
$Err = "The Azure arc agent failed to communicate. Details: $rawStatus"
Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error `
-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue
return "Disconnected"
}
if (!$rawStatus) {
$Err = "The Azure arc agent is not connected. Details: $rawStatus"
Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information `
-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue
return "Disconnected"
}
return ($rawStatus | ConvertFrom-Json -ErrorAction Stop).status
}
<#
.SYNOPSIS
Gets an EnforcementMode that describes the system lockdown policy on this computer.
.DESCRIPTION
By checking the system lockdown policy, we can infer if PowerShell is in ConstrainedLanguage mode as a result of an enforced WDAC policy.
Note: $ExecutionContext.SessionState.LanguageMode should not be used within a trusted (by the WDAC policy) script context for this purpose because
the language mode returned would potentially not reflect the system-wide lockdown policy/language mode outside of the execution context.
#>
function getSystemLockdownPolicy() {
return [System.Management.Automation.Security.SystemPolicy]::GetSystemLockdownPolicy().ToString()
}
<#
.SYNOPSIS
Determines if the operating system is HCI.
.DESCRIPTION
Using the operating system 'Caption' (which corresponds to the 'ProductName' registry key at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion) to determine if a server OS is HCI.
#>
function isServerOsHCI([string] $operatingSystemCaption) {
return $operatingSystemCaption -eq "Microsoft Azure Stack HCI"
}
###########################################################################
# main()
###########################################################################
$operatingSystem = getOperatingSystemInfo
$computerSystem = getComputerSystemInfo
$isAdministrator = isUserAnAdministrator
$fqdnAndAddress = getHostFqdnAndAddress $computerSystem
$hostname = [Environment]::MachineName
$netbios = $env:ComputerName
$managementToolsInformation = getManagementToolsSupportInformation
$isWmfInstalled = isWMF5Installed $operatingSystem.Version
$clusterInformation = getClusterInformation -ErrorAction SilentlyContinue
$isHyperVPowershellInstalled = isHyperVPowerShellSupportInstalled
$isHyperVRoleInstalled = isHyperVRoleInstalled
$isCredSSPEnabled = isCredSSPEnabled
$isRemoteAppEnabled = isRemoteAppEnabled
$smbiosData = getSmbiosData $computerSystem
$azureArcStatus = getAzureArcStatus
$systemLockdownPolicy = getSystemLockdownPolicy
$isHciServer = isServerOsHCI $operatingSystem.Caption
$result = New-Object PSObject
$result | Add-Member -MemberType NoteProperty -Name 'IsAdministrator' -Value $isAdministrator
$result | Add-Member -MemberType NoteProperty -Name 'OperatingSystem' -Value $operatingSystem
$result | Add-Member -MemberType NoteProperty -Name 'ComputerSystem' -Value $computerSystem
$result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $fqdnAndAddress.Fqdn
$result | Add-Member -MemberType NoteProperty -Name 'AddressList' -Value $fqdnAndAddress.AddressList
$result | Add-Member -MemberType NoteProperty -Name 'Hostname' -Value $hostname
$result | Add-Member -MemberType NoteProperty -Name 'NetBios' -Value $netbios
$result | Add-Member -MemberType NoteProperty -Name 'IsManagementToolsAvailable' -Value $managementToolsInformation.ManagementToolsAvailable
$result | Add-Member -MemberType NoteProperty -Name 'IsServerManagerAvailable' -Value $managementToolsInformation.ServerManagerAvailable
$result | Add-Member -MemberType NoteProperty -Name 'IsWmfInstalled' -Value $isWmfInstalled
$result | Add-Member -MemberType NoteProperty -Name 'IsCluster' -Value $clusterInformation.IsCluster
$result | Add-Member -MemberType NoteProperty -Name 'ClusterFqdn' -Value $clusterInformation.ClusterFqdn
$result | Add-Member -MemberType NoteProperty -Name 'IsS2dEnabled' -Value $clusterInformation.IsS2dEnabled
$result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaEnabled' -Value $clusterInformation.IsBritannicaEnabled
$result | Add-Member -MemberType NoteProperty -Name 'IsHyperVRoleInstalled' -Value $isHyperVRoleInstalled
$result | Add-Member -MemberType NoteProperty -Name 'IsHyperVPowershellInstalled' -Value $isHyperVPowershellInstalled
$result | Add-Member -MemberType NoteProperty -Name 'IsCredSSPEnabled' -Value $isCredSSPEnabled
$result | Add-Member -MemberType NoteProperty -Name 'IsRemoteAppEnabled' -Value $isRemoteAppEnabled
$result | Add-Member -MemberType NoteProperty -Name 'SmbiosData' -Value $smbiosData
$result | Add-Member -MemberType NoteProperty -Name 'AzureArcStatus' -Value $azureArcStatus
$result | Add-Member -MemberType NoteProperty -Name 'SystemLockdownPolicy' -Value $systemLockdownPolicy
$result | Add-Member -MemberType NoteProperty -Name 'IsHciServer' -Value $isHciServer
$result
}
## [END] Get-WACAFServerInventory ##
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDF9CceSrjcnoCN
# jQk8B0kQoPGoVZw/KE1db8+UYLpgzKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGIr
# +4D/YXhGOIcFWhcforGvvXNhkOPO4JwIBRvNEpZ5MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAW4wAR2KjZgexFHnVemrhQjBENYFYIU1KUnJk
# 3QI4URo79CpzYihhxcpAt3wwxGuNIou7ptAzM4aFiDEdjs459D1fzwK8YVbtcveR
# NPSXoKWD38zYbE3E3YTwrlv3x4YIJpffQF6B6fsdp52EFiyT0xTF40Ie6wEKgjcl
# Jar4Iw11U8jcldhFIkfRb0s8JmLpW5fKssrfd/18yk0RQwMA0FJRCvMjAQvTk4dC
# BqeAf3vzMFm7AxEQaQEb8ndHYjm1ShLvYmQ/Kchgrv5I4X2siNoLCJdUXc4Cpbg+
# 24eB5Jr6+CzTns80eZv2rmpNfPAGDv2AMjJTelQmkU1LbXPCTKGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCKdTnkzMdt4UwppKegcVwWbqATimrFaxfk
# PrY2vzwcHAIGZa6LAm97GBMyMDI0MDEyOTIwMDQzMy44MTZaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJ
# WgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQ
# Bgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnC
# lF2cruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf
# 7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3D
# M2K59wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4k
# UQxVhqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXl
# PczvGd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA
# 6RxvMcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagY
# mrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZ
# BO2dhzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT24
# 93gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREl
# oR2dI6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1ca
# HVh2vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaW
# ZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50
# WExbBSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q
# /WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C
# /2dOfDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ
# 8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wj
# MXHf0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix
# 5+7KL8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM6
# 9ff4Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5P
# P37700vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/
# wjhXRn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOliQ80wIhgPMjAyNDAxMjkyMzMzMzNaGA8yMDI0MDEz
# MDIzMzMzM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6WJDzQIBADAHAgEAAgIX
# LTAHAgEAAgISNTAKAgUA6WOVTQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AA8qVsgZerLi2XsyHz/QiQt2Ej2/ogRyGrQwvaGCiWmpQhCyxJyqjsOV2ESbV0xh
# 7Fb67s6xgvB2+uJCq25MeQ4ArCwAR+/pCxPVfYdsXxycGKd2u/p2rAnYq66VvR6u
# IYe0KIYTGwV8ocQInMNtOukXjcY06qXHJ8G3z7UW4BjnMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAA
# AdowDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgcCESfe4yLrtNzFKCFPYJn3y5ZK15BqqtF9y1yyBa
# tdcwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09
# 020I5ljibrW/ndICOxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB2o7VyVoA0RGxAAEAAAHaMCIEIBOTRyTGv+2LY6DHlZQtda+E
# 40Pu2KtaOhCuTkEvWmAYMA0GCSqGSIb3DQEBCwUABIICABahw9Px1LyUI0TdWApu
# xcLrbVjz4OeFNSUvBNfxqf0iaTfwHLKx4aS2NhDnG/cf1WN9W2LMrqSZHTkb5wjG
# CP9I6TS2AXJdTsspVjAPTk6Ipd0dc8yen2oJZn1gVy3nnIULhbcPmD0pCIxnsLSV
# e25+5gGlt3irI8ptANuV2PGQPmfd1Pktm9myIp3Hf5Am3toQT6m1xO92FOFOxLjF
# 0uqdXJgw9H/pyeQE2FiQQnsLhE20l59ASF1BF/A4WVmalkl8u2Fc/WqEA9WyeoaH
# m9FzyfrsS8qx+XoPL+MHz1Kn7i8C9yymauD9pLkFdaywsvA7S+z0kKvlWUvT+yBw
# rKwv7EsaTJ9am4/+8BN4Z00RPnRpbDKi5p0SLrJGyd7QBFDb4Tkfgjbzu19y1ZD7
# RYqZGvZ2NnOHSYwukQwmF+acWj/mh0Kzs+hM+zT3a+dDmDh8esh5f/czRzVdj0JV
# wKY4aujh3bD0Z2ykxv3Vi9FR18ugjngn+a5gfEcelwCxmDZJnhJA+NQGmK67ME2N
# QRyquAWTa0Wz+Z53dC8nndrB3mHrNQ0sM54tgdlFAQffYWwetsx3zHBSZThxssWx
# xzkdC5VbJ92LHVrfa8CS7/PraTIMHS4p4C40hdbeBGFKISngB5MooRoGDgNKeiwY
# lUimmxi3OAIPm5rRfjs5srV5
# SIG # End signature block
| 0
|
Simplest animation.ps1
|
[int]$x = 0
[int]$y = 0
[int]$cX = 200
[int]$cY = 200
[int]$rad = 100
[int]$grad = 0
[float]$kfc = 0.5
$tabPag1_OnPaint= {
$tmrTim2.Enabled = $false
$g = $tabPag1.CreateGraphics()
$pen = New-Object Drawing.Pen([Drawing.Brushes]::Red)
$g.DrawRectangle($pen, [Convert]::ToInt32($cX - 100), [Convert]::ToInt32($cY - 100), $cX, $cY)
$g.FillEllipse([Drawing.Brushes]::Red, [Convert]::ToInt32($cX + $x - 10), `
[Convert]::ToInt32($cY + $y - 10), 20, 20)
$g.Dispose()
$tmrTim1.Enabled = $true
}
$tmrTim1_OnTick= {
$grad += 5
if ($gard -gt 360) { $grad -= 360 }
$x = $rad * [Math]::Cos($grad * [Math]::PI / 180)
$y = $kfc * $rad * [Math]::Sin($grad * [Math]::PI / 180)
$tabPag1.Invalidate()
}
$tabPag2_OnPaint= {
$tmrTim1.Enabled = $false
$g = $tabPag2.CreateGraphics()
$brush = New-Object Drawing.SolidBrush Blue
$font = New-Object Drawing.Font("Tahoma", (12 + $val), 1)
$msg = "Hello from GDI+!"
[float]$center = $tabPag2.DisplayRectangle.Width / 2
$size = $g.MeasureString($msg, $font)
[float]$swlpos = $center - ($size.Width / 2)
$g.DrawString($msg, $font, $brush, $swlpos, 10)
$tmrTim2.Enabled = $true
}
$tmrTim2_OnTick= {
$val += 5
if ($val -ge 50) {
$val = $null
}
$tabPag2.Invalidate()
}
function ShowMainWindow {
[void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void][Reflection.Assembly]::LoadWithPartialName("System.Drawing")
[Windows.Forms.Application]::EnableVisualStyles()
$frmMain = New-Object Windows.Forms.Form
$tabTabs = New-Object Windows.Forms.TabControl
$tabPag1 = New-Object Windows.Forms.TabPage
$tabPag2 = New-Object Windows.Forms.TabPage
$tmrTim1 = New-Object Windows.Forms.Timer
$tmrTim2 = New-Object Windows.Forms.Timer
#tabTabs
$tabTabs.Controls.AddRange(@($tabPag1, $tabPag2))
$tabTabs.Dock = "Fill"
#tabPag1
$tabPag1.Text = "Orbital moving"
$tabPag1.UseVisualStyleBackColor = $true
$tabPag1.Add_Paint($tabPag1_OnPaint)
#tabPag2
$tabPag2.Text = "Swelling font"
$tabPag2.UseVisualStyleBackColor = $true
$tabPag2.Add_Paint($tabPag2_OnPaint)
#tmrTim1
$tmrTim1.Interval = 100
$tmrTim1.Add_Tick($tmrTim1_OnTick)
#tmrTim2
$tmrTim2.Interval = 100
$tmrTim2.Add_Tick($tmrTim2_OnTick)
#frmMain
$frmMain.ClientSize = New-Object Drawing.Size(410, 430)
$frmMain.Controls.AddRange(@($tabTabs))
$frmMain.FormBorderStyle = "FixedSingle"
$frmMain.MaximizeBox = $false
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "Animation"
[void]$frmMain.ShowDialog()
}
ShowMainWindow
| 0
|
sample_64_85.ps1
|
#=======================================================================================================================================================================
# Copyright (c) Microsoft Corporation. All rights reserved.
#
# Description:
#
# ModifyProxySettings.ps1 - To be used by the installer - Modify proxy settings
#
#=======================================================================================================================================================================
<#
.SYNOPSIS
Modify proxy settings.
.DESCRIPTION
Modify proxy settings
.EXAMPLE
ModifyProxySettings.ps1 -Address <String> -Port <int> [-UserName <String>] [-Password <String>]
.PARAMETER Address
Address
.PARAMETER Port
Port
.PARAMETER UserName
UserName
.PARAMETER Password
Password
#>
param
(
# PARAMETERS
[Parameter(Mandatory=$true)]
[string] $Address,
[Parameter(Mandatory=$false)]
[int] $Port,
[Parameter(Mandatory=$false)]
[string] $UserName,
[Parameter(Mandatory=$false)]
[string] $Password
)
if ($UserName -and $UserName.Trim() -and $Password -and $Password.Trim()) {
$SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
$Creds = New-Object System.Management.Automation.PSCredential ($UserName, $SecurePassword)
if ($Port -and $Port -gt 0) {
Set-StorageSyncProxyConfiguration -Address $Address -Port $Port -ProxyCredential $Creds
}
else {
Set-StorageSyncProxyConfiguration -Address $Address -ProxyCredential $Creds
}
}
elseif ($Port -and $Port -gt 0) {
Set-StorageSyncProxyConfiguration -Address $Address -Port $Port
}
else {
Set-StorageSyncProxyConfiguration -Address $Address
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBa/kuTAExrOa4t
# BjuDXZQtU7Hzj8FT7PG0g4tSNNdy4qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICgW+t+bkthqNbmEn8nF/k84
# sCDQ+c9qvK5KDk1UQEllMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAmw1/2ybeMbZaUlIH6/SpcRVWjN/EK5F39oJ03IGsLix97ZXgdZw8hCvd
# zuxFJCc7CexYglrF+YSJdMY4ufnMDqKMwiy//f4Z253/NQFbcIO1cBc+tek5QnuG
# x28ugSiJA+38aSLUK1QpHv2U4PG8T0UY+l+ZKmeQ8ibvhuAQg7j5gCdFO1eZYNfH
# +xNGdquxzUbFX79bWXv09p6+T3sloF+ShPKf8KB1eOZZ969fxuaEzT3D00jZnNEg
# SNmG3UxmPK6sLinq9CsDGbspfeUmOYOds8FxRKDcTYehV6whW87X1ExlbB0FafZu
# f3ZZ/MAxftNh/WH4/qyN5yZkajGCCaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAQ5vdPBhBFR19BbN1WW1SZnnGllp3CRHCXfNdQSEfQcwIGZnLA63KC
# GBMyMDI0MDYyMTIxMjYxMy4zMTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOof4icwIhgPMjAyNDA2MjExOTI3MzVaGA8yMDI0MDYyMjE5MjczNVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6h/iJwIBADAHAgEAAgI5kzAHAgEAAgISKzAKAgUA
# 6iEzpwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGB+plxnnt7VJRUJHXTH
# QV7GNKem+73qrgMeRa162WuDD01ZstD9QcwleVjLV40dtpjyukTXOXyUxvXTqXVp
# lhKYbrLu+47a5hjATHMeys0/uwnmtKjvJPeVVMu5ajox8GudTvCyuaYpFY3rOE0q
# +Lmg+GdpccqdFYZ4NwsbFReBMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgTDjjS3ugpfaqPQzkAz29Ake5dnF7i2sK3Jg3s/M1UVowgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d
# ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I
# npafKEQ9AAEAAAHeMCIEIIqEFnQI2p5ng4bpf5en+XZ8gWygZmW96NAm8ClmnMVt
# MA0GCSqGSIb3DQEBCwUABIICAIzpR3Z6xQo/Dl32maGZ0Ikp1NjPzhZl8ZiLOrAh
# pQteKSaCXamGavh3/hvlpIHxS1TORZHaQlZZqMxLu19XP7WDyI+kTVMhPB12oWap
# svyRRVnJqUuoECw5A8ccQMK9qlwcSviQGxSpeWP4Gm/ImsiqZeu96FpF9ihg7umd
# wmLW1B2t/1nnAB2hb2roxrjQZzVhKNnLN4U1Z6yjyvdao3ewuNBSFUYWzO4PkZrF
# TyKHFFqqwT/k51Q6VqWoXyioch7lvnx1jYduE1Bm2WHF0ZA/Fo8alnAXrRfIQaOC
# o5HEMCMc/c8c1tdQipILdHllRAcZVHIK9GmCI01NGJCzVHTC96e3u+4HJO020Y5j
# uOGqYxJmlc+Ksx0hxuvpcmea7mHldSKS4nv1mfp37U4n+Nr1dP8zv3W5hERItNTF
# DpqJWX5R1QhwE7N8vXoAU0GRwWnpWJ1XBfnoiDXMjEl3/0QircMssl8vcCnWtNa4
# tq4yqO1AuC4SziXVA73TgfYSPY3+x0u5zImbXicB4ZI5IxnUdbsh9RjablP1LRDG
# toA3J7dqXyxUZ9kH+5BS+BO40GE7FFGM46isgaMexRjV3MM2aXyDUC8Iv5XxQMmn
# BLfa8Bs7OHrgEawzAZmoP89/qwzycBeKU4VocgTUOZ1zZE7pOJDePkEaMxgbddDl
# lAUa
# SIG # End signature block
| 0
|
18.ps1
|
. $PSScriptRoot\Shared.ps1
Describe 'TabExpansion function test' {
BeforeAll {
if ($PSVersionTable.PSVersion.Major -gt 5) {
$PSDefaultParameterValues["it:skip"] = $true
}
}
It 'Windows PowerShell v5 exports a TabExpansion function' {
$module.ExportedFunctions.Keys -contains 'TabExpansion' | Should Be $true
}
}
Describe 'TabExpansion Tests' {
Context 'Subcommand TabExpansion Tests' {
It 'Tab completes without subcommands' {
$result = & $module GitTabExpansionInternal 'git whatever '
$result | Should Be @()
}
It 'Tab completes bisect subcommands' {
$result = & $module GitTabExpansionInternal 'git bisect '
$result -contains '' | Should Be $false
$result -contains 'start' | Should Be $true
$result -contains 'run' | Should Be $true
$result2 = & $module GitTabExpansionInternal 'git bisect s'
$result2 -contains 'start' | Should Be $true
$result2 -contains 'skip' | Should Be $true
}
It 'Tab completes remote subcommands' {
$result = & $module GitTabExpansionInternal 'git remote '
$result -contains '' | Should Be $false
$result -contains 'add' | Should Be $true
$result -contains 'set-branches' | Should Be $true
$result -contains 'get-url' | Should Be $true
$result -contains 'update' | Should Be $true
$result2 = & $module GitTabExpansionInternal 'git remote s'
$result2 -contains 'set-branches' | Should Be $true
$result2 -contains 'set-head' | Should Be $true
$result2 -contains 'set-url' | Should Be $true
}
It 'Tab completes update-git-for-windows only on Windows' {
$result = & $module GitTabExpansionInternal 'git update-'
if ((($PSVersionTable.PSVersion.Major -eq 5) -or $IsWindows)) {
$result -contains '' | Should Be $false
$result -contains 'update-git-for-windows' | Should Be $true
}
else {
$result | Should BeNullOrEmpty
}
}
}
Context 'Fetch/Push/Pull TabExpansion Tests' {
BeforeEach {
&$gitbin branch -q master 2>$null
&$gitbin remote add origin . 2>$null
&$gitbin update-ref refs/remotes/origin/master $(git rev-parse master) 2>$null
&$gitbin symbolic-ref refs/remotes/origin/HEAD refs/remotes/origin/master 2>$null
}
It 'Tab completes all remotes' {
(&$gitbin remote) -contains 'origin' | Should Be $true
$result = & $module GitTabExpansionInternal 'git push '
$result -contains 'origin' | Should Be $true
}
It 'Tab completes all branches' {
$result = & $module GitTabExpansionInternal 'git push origin '
$result -contains 'master' | Should Be $true
$result -contains 'origin/master' | Should Be $true
$result -contains 'origin/HEAD' | Should Be $true
}
It 'Tab completes all :branches' {
$result = & $module GitTabExpansionInternal 'git push origin :'
$result -contains ':master' | Should Be $true
}
It 'Tab completes matching remotes' {
$result = & $module GitTabExpansionInternal 'git push or'
$result | Should BeExactly 'origin'
}
It 'Tab completes matching branches' {
$result = & $module GitTabExpansionInternal 'git push origin ma'
$result | Should BeExactly 'master'
}
It 'Tab completes matching remote/branches' {
$result = & $module GitTabExpansionInternal 'git push origin origin/ma'
$result | Should BeExactly 'origin/master'
}
It 'Tab completes matching :branches' {
$result = & $module GitTabExpansionInternal 'git push origin :ma'
$result | Should BeExactly ':master'
}
It 'Tab completes matching ref:branches' {
$result = & $module GitTabExpansionInternal 'git push origin HEAD:ma'
$result | Should BeExactly 'HEAD:master'
}
It 'Tab completes matching +ref:branches' {
$result = & $module GitTabExpansionInternal 'git push origin +HEAD:ma'
$result | Should BeExactly '+HEAD:master'
}
It 'Tab completes matching remote with preceding parameters' {
$result = & $module GitTabExpansionInternal 'git push --follow-tags -u or'
$result | Should BeExactly 'origin'
}
It 'Tab completes all branches with preceding parameters' {
$result = & $module GitTabExpansionInternal 'git push --follow-tags -u origin '
$result -contains 'master' | Should Be $true
$result -contains 'origin/master' | Should Be $true
$result -contains 'origin/HEAD' | Should Be $true
}
It 'Tab completes matching branch with preceding parameters' {
$result = & $module GitTabExpansionInternal 'git push --follow-tags -u origin ma'
$result | Should BeExactly 'master'
}
It 'Tab completes matching branch with intermixed parameters' {
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags ma'
$result | Should BeExactly 'master'
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags ma'
$result | Should BeExactly 'master'
}
It 'Tab completes matching ref:branch with intermixed parameters' {
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags HEAD:ma'
$result | Should BeExactly 'HEAD:master'
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags +HEAD:ma'
$result | Should BeExactly '+HEAD:master'
}
It 'Tab completes matching multiple push ref specs with intermixed parameters' {
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags one :two three:four ma'
$result | Should BeExactly 'master'
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags one :two three:four --crazy-param ma'
$result | Should BeExactly 'master'
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags one :two three:four HEAD:ma'
$result | Should BeExactly 'HEAD:master'
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags one :two three:four --crazy-param HEAD:ma'
$result | Should BeExactly 'HEAD:master'
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags one :two three:four +ma'
$result | Should BeExactly '+master'
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags one :two three:four --crazy-param +ma'
$result | Should BeExactly '+master'
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags one :two three:four +HEAD:ma'
$result | Should BeExactly '+HEAD:master'
$result = & $module GitTabExpansionInternal 'git push -u origin --follow-tags one :two three:four --crazy-param +HEAD:ma'
$result | Should BeExactly '+HEAD:master'
}
It 'Tab complete returns empty result for missing remote' {
$result = & $module GitTabExpansionInternal 'git push zy'
$result | Should BeNullOrEmpty
}
It 'Tab complete returns empty result for missing branch' {
$result = & $module GitTabExpansionInternal 'git push origin zy'
$result | Should BeNullOrEmpty
}
It 'Tab complete returns empty result for missing remotebranch' {
$result = & $module GitTabExpansionInternal 'git fetch origin/zy'
$result | Should BeNullOrEmpty
}
It 'Tab completes branch names with - and -- in them' {
$branchName = 'branch--for-Pester-tests'
if (&$gitbin branch --list -q $branchName) {
&$gitbin branch -D $branchName
}
&$gitbin branch $branchName
try {
$result = & $module GitTabExpansionInternal 'git push origin branch-'
$result | Should BeExactly $branchName
$result = & $module GitTabExpansionInternal 'git push --follow-tags -u origin '
$result -contains $branchName | Should Be $true
}
finally {
&$gitbin branch -D $branchName
}
}
}
Context 'Restore Source Branch TabExpansion Tests' {
It 'Tab completes source branches -s' {
$result = & $module GitTabExpansionInternal 'git restore -s mas'
$result | Should BeExactly 'master'
}
It 'Tab completes source branches --source=' {
$result = & $module GitTabExpansionInternal 'git restore --source=mas'
$result | Should BeExactly '--source=master'
}
}
Context 'Vsts' {
BeforeEach {
[System.Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssigments', '')]
$repoPath = NewGitTempRepo
&$gitbin config alias.test-vsts-pr "!f() { exec vsts code pr \`"`$`@\`"; }; f"
}
AfterEach {
RemoveGitTempRepo $repoPath
}
It 'Tab completes pr options' {
$result = & $module GitTabExpansionInternal 'git test-vsts-pr '
$result -contains 'abandon' | Should Be $true
}
}
Context 'Add/Reset/Checkout TabExpansion Tests' {
BeforeEach {
[System.Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssigments', '')]
$repoPath = NewGitTempRepo
}
AfterEach {
RemoveGitTempRepo $repoPath
}
It 'Tab completes non-ASCII file name' {
&$gitbin config core.quotepath true
$fileName = "posh$([char]8226)git.txt"
New-Item $fileName -ItemType File
$gitStatus = & $module Get-GitStatus
$result = & $module GitTabExpansionInternal 'git add ' $gitStatus
$result | Should BeExactly $fileName
}
}
Context 'Alias TabExpansion Tests' {
$addedAliases = @()
function Add-GlobalTestAlias($Name, $Value) {
if (!(&$gitbin config --global "alias.$Name")) {
&$gitbin config --global "alias.$Name" $Value
$addedAliases += $Name
}
}
BeforeAll {
[System.Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssigments', '')]
$repoPath = NewGitTempRepo -MakeInitialCommit
}
AfterAll {
$addedAliases | Where-Object { $_ } | ForEach-Object {
&$gitbin config --global --unset "alias.$_" 2>$null
}
RemoveGitTempRepo $repoPath
}
It 'Command completion includes unique list of aliases' {
$alias = "test-$(New-Guid)"
Add-GlobalTestAlias $alias config
&$gitbin config alias.$alias help
(&$gitbin config --get-all alias.$alias).Count | Should Be 2
$result = @(& $module GitTabExpansionInternal "git $alias")
$result.Count | Should Be 1
$result[0] | Should BeExactly $alias
}
It 'Tab completes when there is one alias of a given name' {
$alias = "test-$(New-Guid)"
&$gitbin config alias.$alias checkout
(&$gitbin config --get-all alias.$alias).Count | Should Be 1
$result = & $module GitTabExpansionInternal "git $alias ma"
$result | Should BeExactly 'master'
}
It 'Tab completes when there are multiple aliases of the same name' {
Add-GlobalTestAlias co checkout
&$gitbin config alias.co checkout
(&$gitbin config --get-all alias.co).Count | Should BeGreaterThan 1
$result = & $module GitTabExpansionInternal 'git co ma'
$result | Should BeExactly 'master'
}
}
Context 'PowerShell Special Chars Tests' {
BeforeAll {
[System.Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssigments', '')]
$repoPath = NewGitTempRepo -MakeInitialCommit
}
AfterAll {
RemoveGitTempRepo $repoPath
}
AfterEach {
ResetGitTempRepoWorkingDir $repoPath
}
It 'Tab completes remote name with special char as quoted' {
&$gitbin remote add '
$result = & $module GitTabExpansionInternal 'git push
$result | Should BeExactly "'
}
It 'Tab completes branch name with special char as quoted' {
&$gitbin branch '
$result = & $module GitTabExpansionInternal 'git checkout
$result | Should BeExactly "'
}
It 'Tab completes git feature branch name with special char as quoted' {
&$gitbin branch '
$result = & $module GitTabExpansionInternal 'git flow feature list
$result | Should BeExactly "'
}
It 'Tab completes a tag name with special char as quoted' {
$tag = "v1.0.0;abcdef"
&$gitbin tag $tag
$result = & $module GitTabExpansionInternal 'git show v1'
$result | Should BeExactly "'$tag'"
}
It 'Tab completes a tag name with single quote correctly' {
&$gitbin tag "v2.0.0'"
$result = & $module GitTabExpansionInternal 'git show v2'
$result | Should BeExactly "'v2.0.0'''"
}
It 'Tab completes add file in working dir with special char as quoted' {
$filename = 'foo{bar} (x86).txt';
New-Item $filename -ItemType File
$gitStatus = & $module Get-GitStatus
$result = & $module GitTabExpansionInternal 'git add ' $gitStatus
$result | Should BeExactly "'$filename'"
}
}
}
| 0
|
sample_15_46.ps1
|
# Copyright ?2008, Microsoft Corporation. All rights reserved.
# You may use this code and information and create derivative works of it,
# provided that the following conditions are met:
# 1. This code and information and any derivative works may only be used for
# troubleshooting a) Windows and b) products for Windows, in either case using
# the Windows Troubleshooting Platform
# 2. Any copies of this code and information
# and any derivative works must retain the above copyright notice, this list of
# conditions and the following disclaimer.
# 3. THIS CODE AND INFORMATION IS PROVIDED ``AS IS'' WITHOUT WARRANTY OF ANY KIND,
# WHETHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES
# OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IF THIS CODE AND
# INFORMATION IS USED OR MODIFIED, THE ENTIRE RISK OF USE OR RESULTS IN CONNECTION
# WITH THE USE OF THIS CODE AND INFORMATION REMAINS WITH THE USER.
if($debug -eq $true){[void]$shell.popup("Run DC_DOSDev.ps1")}
Import-LocalizedData -BindingVariable DOSDevStrings -FileName DC_DOSDev -UICulture en-us
Write-DiagProgress -Activity $DOSDevStrings.ID_DOSDev -Status $DOSDevStrings.ID_DOSDevRunning
$fileDescription = $DOSDevStrings.ID_DOSDevOutput
$sectionDescription = $DOSDevStrings.ID_DOSDevOutputDesc
$OutputFile = $ComputerName + "_DOSDev.txt"
$CommandToExecute = "cmd.exe /c dosdev.exe -a > $OutputFile"
if ($OSArchitecture -ne 'ARM')
{
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription -BackgroundExecution
}
else
{
'Skipping running {dosdev.exe} since it is not supported in ' + $OSArchitecture + ' architecture.' | WriteTo-StdOut
}
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAE00ycwLcD1FUB
# jyrqo7RWoWKZqYJeIcv6RogJZtMAVKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKy+ogU8nZXYrHHSzw+FI7S7
# ih1EyYNnuTWSGTzUtK/sMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAeTkCbUaXSr7rrTZaz8UqbULXqnKUZ4umbFnWmwddMT4nh5VumfhdN4Hr
# eSRt1CGvIRzGIxQapQiqs1FDPt+XWXhDk3v++0SAKx5YeMb+aWIzvAEw/id/q/Mt
# T1Nt/kMybb+bTGR1Xf6odnBaVOflNohimbBmeTHwPw4bMTQYsSP2IYFjUxB903qp
# dk9abTDnMT1QPeSqVvFFd8HX1HVkMRr/fbZmWMJnziXqQhVnAHHfpUSaQyb1Ya8m
# ltmKC6VhN9MqDCV95toz8n4DGLbgFBIpbKt/HoPBMwHsjHTBdG8rQvwKpjF6io+W
# cssY2FqvzI+fKO5g2ZVs7mjrOR2kUqGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAbQlRx9bqvsGMd+E5uEz9/pAh+DuuYnHUT2xaZIBF9hgIGZuto66Kd
# GBMyMDI0MTAyODExNDA0NC44MjRaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0
# Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx
# guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv
# qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD
# eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8
# ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p
# 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa
# HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD
# PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd
# uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D
# kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV
# oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3
# RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj
# fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ
# 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj
# ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX
# pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T
# ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw
# HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57
# rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf
# 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v
# DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2
# BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh
# uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU
# vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk
# 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7
# nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR
# jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY
# dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu
# nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608
# ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgt+QTpaAp
# +DroCr5fZ6ngyRq5ya/qjoDZFgG97WwVQwkwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA
# AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3
# DQEBCwUABIICADUftU7cuwU4wSzyVczhYNq1DNMwq0Zj8tdAG6qGQFBdNkLfoqjT
# +1A4cCBJwFrqawnnQoyd04C0vrF8QTi9z83z0SSR/CN3iuqyOJSNnxuEMJF7yDHQ
# hovK8sgMzlAgawGpWpUkXHnsBrwt9yHiZSBGhSQNp3xXhCkeWUdLUVvv+5AoVXhS
# zr2tp7EBP6CGPWYHzg5cIkLXrrODhSWXGqnOLQTTwZ6l6p1faF0ndOX7ybQxoeVN
# wU9D1FVcuerJH/qVbVVYvkjzSvW9UBlomisdQrUHxFSByDhHfd1xwJNkIwVE3cvv
# YPI3Vg2JxfWiIEs3rPcsOM5Mu7VDVwcz201dAxGCDxkHoCCHPh7D5wl7R96FiV9D
# vqFeoCMGKbbisYelcIgshIVPU+7bOp9/CfjBZFbG+VKOof1Ts0JihTx0SBAKwzDd
# j3obJ8Fzs3VUbldBjUMkv/J9vo8zCyDzzQdfUgGGcp+eVc9HmGqk4FmGcb+n75RL
# EhH/8AvYaFsncru0H9/GkAEpaZl5kAMxHikhUKrBytWrBSQHKiJcheD3M/bH7fKi
# nCOAXDvss141vWNdv5mDlssTVH4kf3Nc5ML0vlhtTF4Q9jgufvtQi2uWB4LtUXQA
# P5aU2MImH0B5PR5H+7XtxS9HLt42t/Ht3y7jkPX4Sbj30LIOca5cmGry
# SIG # End signature block
| 0
|
sample_8_71.ps1
|
#************************************************
# DC_ChkSym_DPM.ps1
# Version 1.0.0
# Date: 12-07-2010
# Author: Patrick Lewis - patlewis@microsoft.com
# Description: This script calls chksym to get file version information from DPM files and other files
#************************************************
PARAM($range="All", $prefix="_sym", $FolderName=$null, $FileMask=$null, $Suffix=$null, $FileDescription = $null, [switch] $Recursive)
$ProcArc = $Env:PROCESSOR_ARCHITECTURE
$ChkSymExe = "Checksym" + $ProcArc + ".exe"
$Error.Clear
Import-LocalizedData -BindingVariable LocalsCheckSym -FileName DC_ChkSym
trap [Exception]
{
$errorMessage = $Error[0].Exception.Message
$errorCode = $Error[0].Exception.ErrorRecord.FullyQualifiedErrorId
$line = $Error[0].InvocationInfo.PositionMessage
"[DC_ChkSym] Error " + $errorCode + " on line " + $line + ": $errorMessage running dc_chksym.ps1" | WriteTo-StdOut -ShortFormat
$error.Clear
}
function GetExchangeInstallFolder
{
If ((Test-Path "HKLM:SOFTWARE\Microsoft\ExchangeServer\v14") -eq $true){
[System.IO.Path]::GetDirectoryName((get-itemproperty HKLM:\SOFTWARE\Microsoft\ExchangeServer\v14\Setup).MsiInstallPath)
} ElseIf ((Test-Path "HKLM:SOFTWARE\Microsoft\Exchange\v8.0") -eq $true) {
[System.IO.Path]::GetDirectoryName((get-itemproperty HKLM:\SOFTWARE\Microsoft\Exchange\Setup).MsiInstallPath)
} Else {
$null
}
}
# function GetDPMInstallFolder
# {
# if ((Test-Path "HKLM:SOFTWARE\Microsoft\Microsoft Data Protection Manager\Setup") -eq $true)
# {
# (get-itemproperty HKLM:\SOFTWARE\Microsoft\"Microsoft Data Protection Manager"\Setup).InstallPath
# } Else {
# $null
# }
# }
Function FileExistOnFolder($PathToScan, $FileMask, [switch] $Recursive)
{
trap [Exception] {
$ErrorStd = "[FileExistOnFolder] The following error ocurred when checking if a file exists on a folder:`n"
$errorMessage = $Error[0].Exception.Message
$errorCode = $Error[0].Exception.ErrorRecord.FullyQualifiedErrorId
$line = $Error[0].InvocationInfo.PositionMessage
"$ErrorStd Error " + $errorCode + " on line " + $line + ": $errorMessage`n Path: $PathToScan`n FileMask: $FileMask" | WriteTo-StdOut -ShortFormat
$error.Clear
continue
}
$AFileExist = $false
foreach ($mask in $FileMask) {
if ($AFileExist -eq $false) {
if ([System.IO.Directory]::Exists($PathToScan)) {
if ($Recursive.IsPresent)
{
$Files = [System.IO.Directory]::GetFiles($PathToScan, $mask,[System.IO.SearchOption]::AllDirectories)
} else {
$Files = [System.IO.Directory]::GetFiles($PathToScan, $mask,[System.IO.SearchOption]::TopDirectoryOnly)
}
$AFileExist = ($Files.Count -ne 0)
}
}
}
return $AFileExist
}
Function RunChkSym ([string]$PathToScan="", [array]$FileMask = "*.*", [string]$Output="", [boolean]$Recursive=$false, [string]$Arguments="", [string]$Description="")
{
if (($Arguments -ne "") -or (Test-Path ($PathToScan)))
{
if ($PathToScan -ne "")
{
$eOutput = $Output
ForEach ($scFileMask in $FileMask){ #
$eFileMask = ($scFileMask.replace("*.*","")).toupper()
$eFileMask = ($eFileMask.replace("*.",""))
$eFileMask = ($eFileMask.replace(".*",""))
if (($eFileMask -ne "") -and (Test-Path ("$eOutput.*") )) {$eOutput += ("_" + $eFileMask)}
$symScanPath += ((Join-Path -Path $PathToScan -ChildPath $scFileMask) + ";")
}
}
if ($Description -ne "")
{
$FileDescription = $Description
} else {
$fdFileMask = [string]::join(";",$FileMask)
if ($fdFileMask -contains ";") {
$FileDescription = $PathToScan + " [" + $fdFileMask + "]"
} else {
$FileDescription = (Join-Path $PathToScan $fdFileMask)
}
}
if ($Arguments -ne "") {
$eOutput = $Output
Write-DiagProgress -Activity $LocalsCheckSym.ID_FileVersionInfo -Status $Description
$CommandToExecute = "cmd.exe /c $ChkSymExe $Arguments"
}
else {
Write-DiagProgress -Activity $LocalsCheckSym.ID_FileVersionInfo -Status ($FileDescription)# + " Recursive: " + $Recursive)
if ($Recursive -eq $true) {
$F = "-F2"
$AFileExistOnFolder = (FileExistOnFolder -PathToScan $PathToScan -FileMask $scFileMask -Recursive)
} else {
$F = "-F"
$AFileExistOnFolder = (FileExistOnFolder -PathToScan $PathToScan -FileMask $scFileMask)
}
if ($AFileExistOnFolder) {
$CommandToExecute = "cmd.exe /c $ChkSymExe $F `"$symScanPath`" -R -S -O2 `"$eOutput.CSV`" > `"$eOutput.TXT`""
} else {
"Chksym did not run against path '$PathToScan' since there are no files with mask ($scFileMask) on system" | WriteTo-StdOut -ShortFormat
$CommandToExecute = ""
}
}
if ($CommandToExecute -ne "") {
RunCmD -commandToRun $CommandToExecute -sectionDescription "File Version Information (ChkSym)" -filesToCollect ("$eOutput.*") -fileDescription $FileDescription -BackgroundExecution
}
}
else {
"Chksym did not run against path '$PathToScan' since path does not exist" | WriteTo-StdOut -ShortFormat
}
}
#Check if using $FolderName or $RangeString
if (($null -ne $FolderName) -and ($null -ne $FileMask) -and ($null -ne $Suffix)) {
$OutputBase = $ComputerName + $Prefix + $Suffix
$IsRecursive = ($Recursive.IsPresent)
RunChkSym -PathToScan $FolderName -FileMask $FileMask -Output $OutputBase -Description $FileDescription -Recursive $IsRecursive
} else {
[array] $RunChkSym = $null
Foreach ($RangeString in $range)
{
if ($RangeString -eq "All")
{
$RunChkSym += "ProgramFilesSys", "Drivers", "System32DLL", "System32Exe", "System32SYS", "Spool", "iSCSI", "Process", "RunningDrivers", "Cluster"
} else {
$RunChkSym += $RangeString
}
}
switch ($RunChkSym) {
"ProgramFilesSys" {
$OutputBase="$ComputerName$Prefix" + "_ProgramFiles_SYS"
RunChkSym -PathToScan "$Env:ProgramFiles" -FileMask "*.sys" -Output $OutputBase -Recursive $true
if (($Env:PROCESSOR_ARCHITECTURE -eq "AMD64") -or $Env:PROCESSOR_ARCHITECTURE -eq "IA64") {
$OutputBase="$ComputerName$Prefix" + "_ProgramFilesx86_SYS"
RunChkSym -PathToScan (${Env:ProgramFiles(x86)}) -FileMask "*.sys" -Output $OutputBase -Recursive $true
}
}
"Drivers" {
$OutputBase="$ComputerName$Prefix" + "_Drivers"
RunChkSym -PathToScan "$Env:SystemRoot\System32\drivers" -FileMask "*.*" -Output $OutputBase -Recursive $false
}
"System32DLL" {
$OutputBase="$ComputerName$Prefix" + "_System32_DLL"
RunChkSym -PathToScan "$Env:SystemRoot\System32" -FileMask "*.DLL" -Output $OutputBase -Recursive $false
if (($Env:PROCESSOR_ARCHITECTURE -eq "AMD64") -or $Env:PROCESSOR_ARCHITECTURE -eq "IA64") {
$OutputBase="$ComputerName$Prefix" + "_SysWOW64_DLL"
RunChkSym -PathToScan "$Env:SystemRoot\SysWOW64" -FileMask "*.dll" -Output $OutputBase -Recursive $true
}
}
"System32Exe" {
$OutputBase="$ComputerName$Prefix" + "_System32_EXE"
RunChkSym -PathToScan "$Env:SystemRoot\System32" -FileMask "*.EXE" -Output $OutputBase -Recursive $false
if (($Env:PROCESSOR_ARCHITECTURE -eq "AMD64") -or $Env:PROCESSOR_ARCHITECTURE -eq "IA64") {
$OutputBase="$ComputerName$Prefix" + "_SysWOW64_EXE"
RunChkSym -PathToScan "$Env:SystemRoot\SysWOW64" -FileMask "*.exe" -Output $OutputBase -Recursive $true
}
}
"System32SYS" {
$OutputBase="$ComputerName$Prefix" + "_System32_SYS"
RunChkSym -PathToScan "$Env:SystemRoot\System32" -FileMask "*.SYS" -Output $OutputBase -Recursive $false
if (($Env:PROCESSOR_ARCHITECTURE -eq "AMD64") -or $Env:PROCESSOR_ARCHITECTURE -eq "IA64") {
$OutputBase="$ComputerName$Prefix" + "_SysWOW64_SYS"
RunChkSym -PathToScan "$Env:SystemRoot\SysWOW64" -FileMask "*.sys" -Output $OutputBase -Recursive $true
}
}
"Spool" {
$OutputBase="$ComputerName$Prefix" + "_PrintSpool"
RunChkSym -PathToScan "$Env:SystemRoot\System32\Spool" -FileMask "*.*" -Output $OutputBase -Recursive $true
}
"Cluster" {
$OutputBase="$ComputerName$Prefix" + "_Cluster"
RunChkSym -PathToScan "$Env:SystemRoot\Cluster" -FileMask "*.*" -Output $OutputBase -Recursive $false
}
"iSCSI" {
$OutputBase="$ComputerName$Prefix" + "_MS_iSNS"
RunChkSym -PathToScan "$Env:ProgramFiles\Microsoft iSNS Server" -FileMask "*.*" -Output $OutputBase -Recursive $true
$OutputBase="$ComputerName$Prefix" + "_MS_iSCSI"
RunChkSym -PathToScan "$Env:SystemRoot\System32" -FileMask "iscsi*.*" -Output $OutputBase -Recursive $false
}
"Process" {
$OutputBase="$ComputerName$Prefix" + "_Process"
get-process | Out-File "$OutputBase.txt"
"--------------------------------" | Out-File "$OutputBase.txt" -append
tasklist -svc | Out-File "$OutputBase.txt" -append
"--------------------------------" | Out-File "$OutputBase.txt" -append
RunChkSym -Output $OutputBase -Arguments "-P * -R -O2 `"$OutputBase.CSV`" >> `"$OutputBase.TXT`"" -Description "Running Processes"
}
"RunningDrivers" {
$OutputBase="$ComputerName$Prefix" + "_RunningDrivers"
RunChkSym -Output $OutputBase -Arguments "-D -R -S -O2 `"$OutputBase.CSV`" > `"$OutputBase.TXT`"" -Description "Running Drivers"
}
"InetSrv" {
$inetSrvPath = (join-path $env:systemroot "system32\inetsrv")
$OutputBase = "$ComputerName$Prefix" + "_InetSrv"
RunChkSym -PathToScan $inetSrvPath -FileMask ("*.exe","*.dll") -Output $OutputBase -Recursive $true
}
"Exchange" {
$ExchangeFolder = GetExchangeInstallFolder
if ($null -ne $ExchangeFolder){
$OutputBase = "$ComputerName$Prefix" + "_Exchange"
RunChkSym -PathToScan $ExchangeFolder -FileMask ("*.exe","*.dll") -Output $OutputBase -Recursive $true
} else {
"Chksym did not run against Exchange since it could not find Exchange server installation folder" | WriteTo-StdOut -ShortFormat
}
}
"DPM"
{
$DPMFolder= GetDPMInstallFolder # This function can be found on file Functions.ps1
If ($null -ne $DPMFolder)
{
$DPMFolder = Join-Path $DPMFolder "bin"
$OutputBase= "$ComputerName$Prefix" + "_DPM"
RunChkSym -PathToScan $DPMFolder -FileMask("*.exe","*.dll") -Output $OutputBase -Recursive $true
} else {
"Chksym did not run against DPM since it could not find the DPM installation folder" | WriteTo-StdOut -ShortFormat
}
}
}
}
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAXz2t+QWE+inbQ
# VizcvZEWseY8wlZ2S/M19D5CDeKw8aCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBP7tsnCQnHC85p6PYbMX1GW
# 3Pu35NCXtGcKQK7OgIq/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAmUafY6AaMvZhY849ReAixAVWIyQlISOa/DV69jfjSSFac2XnbD93AwzQ
# Ef4a/q3UcGr/GhpZzwZGQOeZtrfh6WxH6RJxWGCe7bhGEr+4uVxArbZpRUxMtg2g
# 6FXebjbHxMmsW/2BnA9SnKTu7b3UQM/xLXk/INz9VuOXV2BWs5gBmG5fs0bhDCeW
# fSoPoBn2CsV2GsRCpw5fktg/uPZdL/nQng7xaqvqxpSTD4eeW5Upa7TjzkN0M4cH
# b0sCyzScEQJ7kqF0Y5JxWyXidh5+3h2BJ4+FVWmaKz/5u4ZLRH0UxdfKv4BwnGIH
# PoD09fETjvjidyok1TTCcU4NP66C6KGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDB8CM2UKOZUus0AgQfK3xSliKns55+YVQUv9QwoVvA0QIGZuspkdLK
# GBMyMDI0MTAyODExNDA0MS41MTNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOhJgwMQEj+AAEAAAH4MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMyMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxR23pXYnD2BuODdeXs2C
# u/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMTxgckvZr1JrW0Mi4F15rx
# /VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf270SWAAWxQbpVIhhPWCnV
# V3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3vBuxEX2E8X50IgAHsyaR
# 9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgEqSrX4UiX0etqi7jUtKyp
# gIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcTKWtddWpnJtyl5e3gHuYo
# j8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO69vo/NmJ4R/f1+KucBPJ4
# yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXpcU+TMcOvWP8HBWmWJQIm
# TZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRfgPHfOhIWQ0D8ALCY+Lsi
# wbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1NsBo9V4GZBikzX7ZjWCRgd
# 1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpPTAs1gd/vUogcdiL51o7s
# huHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBS9zsZzz57Q
# lT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYfk8GzzpEVnG
# l7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbHB5rcNiRhFHZ93RefdPpc
# 4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQpgGUzyw3lETZebNLEA17A
# /CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJxIuLzFVHacvWxSCKoF9hl
# SrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0UIMjjp9VRFH7nb3Ng2Q4
# gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35qLo7Daw9AsItqjFhbMcG
# 68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI0TZvvUWX9ajm6SfLBTEt
# oTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2gxFlDXHCyLp5qB6BoPpc
# 82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziLfU1SY240OZW8ld4sS8fn
# ybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcnf1VTm6cmfasScYtElpjq
# Z9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH00KQq+FJT/62SB70g9g/
# R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5DnG+aKRzPELCFE9GggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJuKwwIhgPMjAyNDEwMjgwNzE1NTZaGA8yMDI0MTAyOTA3MTU1NlowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sm4rAIBADAHAgEAAgIYGzAHAgEAAgITTTAK
# AgUA6ssKLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCdo1/IodMsNY0I
# gWORzZg8jsEoddsFxXLB6LC/xZZN78xMGY8ik00hGbggj5TzOyaNz/noIF8rSswo
# SMgsS4ZwddVQrvYaMGqrGhpDjhieQUnGdME69mRCvIoQFD26RPCKzj29tv+B+uFY
# o+vQFAlgX6TPkk0mP1QA2f6Z3lUlDwIgMI253G8VxjqZRY6ZoVliBz9eAi7lBW9k
# ULQPtVGmIUPu7ezKTBUkuCNLrcKpQnElDP3Zlk7rT4A0pcf9UEdis9BF366M8Ktt
# 8LYZKi+PDCPRy/n75JCQqDqcbHIzxFw0i6SoY8K4+6yqF0TVFbiwLm8UNadYHPkb
# zTwcRywIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg6QKMfwQXKZsL
# 37muyyini/UZZGVmwyegL79NyF85sCkwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I0Zz3WjCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+KOhJgwMQEj+AAEAAAH4
# MCIEINY/Dw199apAunA4Ss6RSl7yGIXBNBs5M/tiHZQ6crrSMA0GCSqGSIb3DQEB
# CwUABIICALjN4HcwneWiUU+5Yf7Ndf7vmSJ4BZ5lBky/OFW1975BqpspdoxrZFtV
# 9SuKW+dYgsVXIS5OKQb2Db55qEVgYXarFD0gIMMQzSa96H5OTkaaxMGO0985MbYB
# c36giBUJ6S7QRc4zpXxX38pga/sjAQaPMRYAJjEv2lpC4sZC5r/S0q2rWppPOzD+
# eh9rxG7o7IEHSTttYt8IqPtjAHwo28MH5V3MFB6pO7t1jFUv/NsTrGZPGec/J0u+
# pToJQO+Fhsgtoj0yTfkYRkQ3X1rpYEHQACIzZB+1AU3aNciCcFVXzXpGnJMW8ejz
# AnUIyhzKiQTmhSc7QGIEpYZ/WHk50EEf7wpNHQoAaTqOmenhG2y/AU/cbWgJgr12
# lxeu6H5XliwiF3erd5tzw4Ozg4NO8dDsAdQMP6YvQaXTahaMSmK865U4zrmj6VFU
# evY56rO2fd12RgbqPFCznzwM3w1gL63/5GiEeounDoybUrcu0u6tBvsumSxQ/tsv
# 8kOUKWAaycqJcKg0GFx0Nicw7X8QOfWGq/Aemi+6fn9N+lUCIp/DU+kaqKJ7RYBr
# pN/zxiMoovrLcZZeHTdM/KenXcKx7QA6U7FvSi6j/szcMSftgD/AAVeZsjGGCc04
# UehzLBzVcdNKrsxcCrO5Y9e3NyewI7zi4iJJZqApWh08R4xo/JG0
# SIG # End signature block
| 0
|
SVMotion-VM_2.ps1
|
# author: Hal Rottenberg
# Website/OpenID: http://halr9000.com
# purpose: does "real" SVMotion of a VM
# usage: get-vm | SVMotion-VM -destination (get-datastore foo)
function SVMotion-VM {
param(
[VMware.VimAutomation.Client20.DatastoreImpl]$destination
)
Begin {
$datastoreView = Get-View -VIObject $destination
$relocationSpec = New-Object VMware.Vim.VirtualMachineRelocateSpec
$relocationSpec.Datastore = $datastoreView.MoRef
}
Process {
if ( $_ -isnot [VMware.VimAutomation.Client20.VirtualMachineImpl] ) {
Write-Warning "Expected virtual machine object on pipeline. skipping $_"
continue
}
$vmView = Get-View -VIObject $_
$vmView.RelocateVM_Task($relocationSpec)
}
}
| 0
|
New-NamedPipe.ps1
|
# .NET 3.5 is required to use the System.IO.Pipes namespace
[reflection.Assembly]::LoadWithPartialName("system.core") | Out-Null
$pipeName = "pipename"
$pipeDir = [System.IO.Pipes.PipeDirection]::InOut
$pipe = New-Object system.IO.Pipes.NamedPipeServerStream( $pipeName, $pipeDir )
| 0
|
Read Gmail POP .ps1
|
<#
.AUTHOR
Will Steele (wlsteele@gmail.com)
.DEPENDENCIES
Powershell v2 (for Out-Gridview cmdlet)
.DESCRIPTION
This script is a proof of concept. Further work needs to be done. It
requires the user to enter a valid username and password for a gmail.com
account. It then attempts to form an SSL connection with the server, and,
retrieve the first email. Unfortunately it returns random results. Perhaps
someone can improve upon it.
.EXAMPLE
Get-Gmail -username 'you@gmail.com' -password '\\/0u|>p@55w0rd'
.EXTERNALHELP
None.
.FORWARDHELPTARGETNAME
None.
.INPUTS
System.Object
.LINK
http://learningpcs.blogspot.com/2012/01/powershell-v2-read-gmail-more-proof-of.html.
.NAME
Get-Gmail.ps1
.NOTES
The script is further explored to find 'From' addressses in the link above.
I have piped the $str variable to Out-Gridview. This can be changed to something
more suitable for real processing.
.OUTPUTS
System.String
.PARAMETER username
A required parameter for a valid gmail email user. Use the whole string.
.PARAMETER password
A required parameter for the account password.
.SYNOPSIS
Read .
#>
[CmdletBinding()]
param(
[Parameter(
Mandatory = $true,
Position = 0,
ValueFromPipeline = $true
)]
[ValidateNotNullOrEmpty()]
[String]
$username,
[Parameter(
Mandatory = $true,
Position = 1,
ValueFromPipeline = $true
)]
[ValidateNotNullOrEmpty()]
[String]
$password
)
Clear-Host
try {
Write-Output "Creating new TcpClient."
$tcpClient = New-Object -TypeName System.Net.Sockets.TcpClient
# Connect to gmail
$tcpClient.Connect("pop.gmail.com", 995)
if($tcpClient.Connected) {
Write-Output "You are connected to the host. Attempting to get SSL stream."
# Create new SSL Stream for tcpClient
Write-Output "Getting SSL stream."
[System.Net.Security.SslStream] $sslStream = $tcpClient.GetStream()
# Authenticating as client
Write-Output "Authenticating as client."
$sslStream.AuthenticateAsClient("pop.gmail.com");
if($sslStream.IsAuthenticated) {
Write-Output "You have authenticated. Attempting to login."
# Asssigned the writer to stream
[System.IO.StreamWriter] $sw = $sslstream
# Assigned reader to stream
[System.IO.StreamReader] $reader = $sslstream
# refer POP rfc command, there very few around 6-9 command
$sw.WriteLine("USER $username")
# sent to server
$sw.Flush()
# send pass
$sw.WriteLine("PASS $password");
$sw.Flush()
# this will retrive your first email
$sw.WriteLine("RETR 1")
$sw.Flush()
$sw.WriteLine("Quit ");
$sw.Flush();
[String] $str = [String]::Empty
[String] $strTemp = [String]::Empty
while (($strTemp = $reader.ReadLine()) -ne $null) {
# find the . character in line
if($strTemp -eq '.') {
break;
}
if ($strTemp.IndexOf('-ERR') -ne -1) {
break;
}
$str += $strTemp;
}
# Return raw data
Write-Output "`nOutput email"
$str | Out-GridView
} else {
Write-Error "You were not authenticated. Quitting."
}
} else {
Write-Error "You are not connected to the host. Quitting"
}
}
catch {
$_
}
finally {
Write-Output "Script complete."
}
| 0
|
1767.ps1
|
try
{
$defaultParamValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:Skip"] = !$IsWindows
Describe "AMSI scan should detect suspicious content" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
[System.Management.Automation.Internal.InternalTestHooks]::SetTestHook("UseDebugAmsiImplementation", $true)
}
AfterAll {
[System.Management.Automation.Internal.InternalTestHooks]::SetTestHook("UseDebugAmsiImplementation", $false)
}
It "Verifies AMSI scan detects debug suspicious content" {
$EICAR_STRING_B64 = "awZ8EmMWc3JjaAdvY2lrBgcbY20aBHBwGgROF3Z6cHJhHmBncn13cmF3HnJ9Z3plemFmYB5ndmBnHnV6f3YSF3sYexk= "
$bytes = [System.Convert]::FromBase64String($EICAR_STRING_B64)
$EICAR_STRING = -join ($bytes | ForEach-Object { [char]($_ -bxor 0x33) })
{ Invoke-Expression -Command "echo '$EICAR_STRING'" } |
Should -Throw -ErrorId "ScriptContainedMaliciousContent,Microsoft.PowerShell.Commands.InvokeExpressionCommand"
}
}
}
finally
{
if ($defaultParamValues -ne $null)
{
$Global:PSDefaultParameterValues = $defaultParamValues
}
}
| 0
|
9db524e2-1659-493b-ad36-3624e7796a76.ps1
|
## Simplest RSS Reader\n####################################################################################################\n## Save this file as Start-RssReader.ps1\n## Run it like:\n## .\\Start-RssReader "http://feeds.feedburner.com/powerscripting", "http://HuddledMasses.org/feed"\n## And then:\n## Get-RSS # to (re)fetch the feeds and view\n## Show-RSS # to view without re-fetching\n## Open-RSSItem 2 # to open an item in your browser\n####################################################################################################\nPARAM( \n [string[]]$RssReaderUrls = $(do{\n $k = Read-Host "Specify an RSS Feed URL (hit Enter when done)"\n if($k) {write-output $k}\n } while($k) )\n)\n\nfunction global:Get-RSS {\n $webClient = New-Object System.Net.WebClient\n $global:RssReaderNews = $RssReaderUrls | % { [xml]$webClient.DownloadString( $_ ) } | \n % { $_.rss.channel.item } | \n Sort { [DateTime]$_.pubDate } -Desc\n Show-RSS\n}\n\nfunction global:Show-RSS($days=7) {\n $script:index = -1\n $global:RssReaderNews | Where { ([DateTime]$_.pubDate).AddDays($days) -gt [DateTime]::Now } | \n ft @{l="Index";e={return $script:index++}},@{l="Day";e={$_.pubDate.split(",",2)[0]}}, title, link -auto\n}\n\nfunction global:Open-RssItem($index=0) {\n [Diagnostics.Process]::Start( $($global:RssReaderNews[$index].link) )\n}\n$global:RssReaderUrls = $RssReaderUrls\nGet-RSS
| 0
|
Get-DellWarranty_3.ps1
|
function Get-DellWarranty {
<#
.Synopsis
Provides warranty information for one or more Dell service tags.
.Description
Queries the Dell Website for a list of service tags and returns the warranty information as a custom object.
If a service tag has multiple warranties, they are returned as multiple separate objects.
If no service tag is specified, it will attempt to retrieve and lookup the local system's service tag.
The service tag can be provided to the command in several ways:
1. Using the -servicetag parameter
2. By passing one or more Service Tags via the pipeline
3. By passing objects that have either servicetag or serialnumber defined as a property, such as win32_bios WMI objects
See examples for details.
.Parameter ServiceTag
ALIAS: serialnumber
The Dell service tag you wish to query. Example: XYZ12A3
.Example
C:\\PS> Get-DellWarranty
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Description
-----------
If no service tags are provided, the script retrieves the local computer's serial number from WMI and queries for it.
.Example
C:\\PS> Get-DellWarranty -ServiceTag XXXX123
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Description
-----------
You can pass the service tag as a parameter, or as the first positional parameter (e.g. Get-DellWarranty XXXX123)
.Example
C:\\PS> "XXXX123","XXXX124","XXXX125" | get-dellwarranty
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Service Tag : XXXX124
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/14/2009
End Date : 6/15/2011
Days Left : 145
Service Tag : XXXX125
Description : NBD On-Site Service
Provider : DELL
Warranty Extension Notice * : No
Start Date : 6/14/2008
End Date : 6/15/2010
Days Left : 0
Description
-----------
You can pass serial numbers via the pipeline either directly or as a variable.
.Example
C:\\PS> get-wmiobject win32_bios -computername "computer1","computer2","1.2.3.4" | get-dellwarranty
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Service Tag : XXXX124
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/14/2009
End Date : 6/15/2011
Days Left : 145
Service Tag : XXXX125
Description : NBD On-Site Service
Provider : DELL
Warranty Extension Notice * : No
Start Date : 6/14/2008
End Date : 6/15/2010
Days Left : 0
Description
-----------
You can also pass any object that has a "serialnumber" or "servicetag" property. In this example, we query computers directly for their serial numbers,
and pass those results (which are WMI objects that have a serialnumber property) via pipeline directly to the command to obtain warranty information.
.Notes
AUTHOR: Justin Grote <jgrote NOSPAM-AT allieddigital NOSPAM-DOT net>
WARNING: Since Dell does not provide a formal API, this script works by screen-scraping the HTML from the Dell product support site.
Any future change to the layout or logic of this site will break the script or cause unpredictable results.
HISTORY: v1.0 [31 Jan 2011] - Initial Module Creatio
.Link
http://support.dell.com/support/topics/global.aspx/support/my_systems_info
#>
[CmdletBinding()]
param(
[Parameter(Mandatory=$False,Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$True)]
[alias("serialnumber")]
[string[]]$ServiceTag
)
PROCESS {
# If nothing was passed, retrieve the local system service tag
if ($ServiceTag -eq $null) {
write-verbose "No Service Tags provided. Using Local Computer's Service Tag"
write-verbose "START Obtaining Serial number via WMI for localhost"
$ServiceTag = (get-wmiobject win32_bios).SerialNumber
write-verbose "SUCCESS Obtaining Serial number via WMI for localhost - $ServiceTag"
}
# Detect if an array of service tags were passed via parameter and unwind them.
foreach ($strServicetag in $servicetag) {
write-verbose "START Querying Dell for Service Tag $_"
Get-DellWarrantyWorker $strServicetag
write-verbose "SUCCESS Querying Dell for Service Tag $_"
}
}
}
Function Get-DellWarrantyWorker {
Param(
[String]$serviceTag
)
#Dell Warranty URL Path
$URL = "http://support.dell.com/support/topics/global.aspx/support/my_systems_info/details?c=us&l=en&s=gen&ServiceTag=$serviceTag"
trap [System.FormatException] {
write-error -category invalidresult "The service tag $serviceTag was not found. This is either because you entered the tag incorrectly, it is not present in Dell's database, or Dell changed the format of their website causing this search to fail." -recommendedaction "Please check that you entered the service tag correctly"
return;
}
#Screenscrape the HTML for the warranty Table
$HTML = (New-Object Net.WebClient).DownloadString($URL)
If ($HTML -Match '<table[\\w\\s\\d"=%]*contract_table">.+?</table>') {
$htmltable = $Matches[0]
} else {
throw (New-Object System.FormatException)
}
$HtmlLines = $htmltable -Split "<tr" | Where-Object { $_ -Match '<td' }
$Header = ($HtmlLines[0] -Split '<td') -Replace '[\\w\\s\\d"=%:;\\-]*>|</.*' | Where-Object { $_ -ne '' }
#Convert the warranty table fields into a powershell object
For ($i = 1; $i -lt $HtmlLines.Count; $i++) {
$Output = New-Object PSObject
$Output | Add-Member NoteProperty "Service Tag" -value $serviceTag
$Values = ($HtmlLines[$i] -Split '<td') -Replace '[\\w\\s\\d"=%:;\\-]*>|</.*|<a.+?>'
For ($j = 1; $j -lt $Values.Count; $j++) {
$Output | Add-Member NoteProperty $Header[$j - 1] -Value $Values[$j]
}
#Minor formatting fix if days remaining on warranty is zero
if ($output.'Days Left' -match '<<0') {write-host -fore darkgreen "match!";$output.'Days Left' = 0}
return $Output
}
}
| 0
|
2278.ps1
|
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true, HelpMessage="Specify the Primary Site server")]
[ValidateNotNullOrEmpty()]
[string]$SiteServer
)
Begin {
try {
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
}
}
}
catch [System.UnauthorizedAccessException] {
Write-Warning -Message "Access denied" ; break
}
catch [System.Exception] {
Write-Warning -Message "Unable to determine Site Code" ; break
}
try {
Add-Type -AssemblyName "System.Drawing" -ErrorAction Stop
Add-Type -AssemblyName "System.Windows.Forms" -ErrorAction Stop
}
catch [System.UnauthorizedAccessException] {
Write-Warning -Message "Access denied when attempting to load required assemblies" ; break
}
catch [System.Exception] {
Write-Warning -Message "Unable to load required assemblies. Error message: $($_.Exception.Message) Line: $($_.InvocationInfo.ScriptLineNumber)" ; break
}
}
Process {
function Load-Form {
$Form.Controls.AddRange(@(
$ButtonStart,
$ButtonValidate,
$TextBoxMatch,
$TextBoxReplace,
$ComboBoxTypes,
$CheckBoxCopyContent,
$OutputBox,
$DGVResults,
$GBLog,
$GBResults,
$GBMatch,
$GBReplace,
$GBOptions,
$GBActions,
$StatusBar
))
$Form.Add_Shown({$Form.Activate()})
$Form.Add_Shown({Load-Connect})
$Form.ShowDialog() | Out-Null
$TextBoxMatch.Focus() | Out-Null
}
function Load-Connect {
Write-OutputBox -OutputBoxMessage "Connected to Site server '$($SiteServer)' with Site Code '$($SiteCode)'" -Type INFO
}
function Invoke-CleanControls {
param(
[parameter(Mandatory=$true)]
[ValidateSet("All","Log")]
$Option
)
if ($Option -eq "All") {
$DGVResults.Rows.Clear()
$OutputBox.ResetText()
}
if ($Option -eq "Log") {
$OutputBox.ResetText()
}
}
function Write-OutputBox {
param(
[parameter(Mandatory=$true)]
[string]$OutputBoxMessage,
[parameter(Mandatory=$true)]
[ValidateSet("WARNING","ERROR","INFO")]
[string]$Type
)
Begin {
$DateTime = (Get-Date).ToLongTimeString()
}
Process {
if ($OutputBox.Text.Length -eq 0) {
$OutputBox.Text = "$($DateTime) - $($Type): $($OutputBoxMessage)"
[System.Windows.Forms.Application]::DoEvents()
$OutputBox.SelectionStart = $OutputBox.Text.Length
$OutputBox.ScrollToCaret()
}
else {
$OutputBox.AppendText("`n$($DateTime) - $($Type): $($OutputBoxMessage)")
[System.Windows.Forms.Application]::DoEvents()
$OutputBox.SelectionStart = $OutputBox.Text.Length
$OutputBox.ScrollToCaret()
}
}
}
function Update-StatusBar {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Ready","Updating","Validating","Enumerating")]
[string]$Activity,
[parameter(Mandatory=$true)]
[string]$Text
)
$StatusBarPanelActivity.Text = $Activity
$StatusBarPanelProcessing.Text = $Text
[System.Windows.Forms.Application]::DoEvents()
}
function Update-ApplicationContentSource {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Validate","Update")]
[string]$Action,
[parameter(Mandatory=$false)]
[switch]$CopyFiles
)
Begin {
try {
Add-Type -Path (Join-Path -Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName -ChildPath "Microsoft.ConfigurationManagement.ApplicationManagement.dll") -ErrorAction Stop
Add-Type -Path (Join-Path -Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName -ChildPath "Microsoft.ConfigurationManagement.ApplicationManagement.Extender.dll") -ErrorAction Stop
Add-Type -Path (Join-Path -Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName -ChildPath "Microsoft.ConfigurationManagement.ApplicationManagement.MsiInstaller.dll") -ErrorAction Stop
}
catch [System.UnauthorizedAccessException] {
Write-OutputBox -OutputBoxMessage "Access denied when attempting to load ApplicationManagement dll's" -Type ERROR ; break
}
catch [System.Exception] {
Write-OutputBox -OutputBoxMessage "Unable to load required ApplicationManagement dll's. Make sure that you're running this tool on system where the ConfigMgr console is installed and that you're running the tool elevated" -Type ERROR ; break
}
}
Process {
if ($Action -eq "Validate") {
$AppCount = 0
Update-StatusBar -Activity Enumerating -Text " "
$Applications = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ApplicationLatest" -ComputerName $SiteServer
$ApplicationCount = ($Applications | Measure-Object).Count
foreach ($Application in $Applications) {
$AppCount++
$ApplicationName = $Application.LocalizedDisplayName
Update-StatusBar -Activity Validating -Text "Validating application $($AppCount) / $($ApplicationCount)"
if ($Application.HasContent -eq $true) {
$Application.Get()
$ApplicationXML = [Microsoft.ConfigurationManagement.ApplicationManagement.Serialization.SccmSerializer]::DeserializeFromString($Application.SDMPackageXML, $true)
foreach ($DeploymentType in $ApplicationXML.DeploymentTypes) {
$DeploymentTypeName = $DeploymentType.Title
$ExistingContentLocation = $DeploymentType.Installer.Contents[0].Location
if ($ExistingContentLocation -match [regex]::Escape($TextBoxMatch.Text)) {
$UpdatedContentLocation = $DeploymentType.Installer.Contents[0].Location -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
$DGVResults.Rows.Add($true, $ApplicationName, $DeploymentTypeName, $ExistingContentLocation, $UpdatedContentLocation)
Write-OutputBox -OutputBoxMessage "Validated deployment type '$($DeploymentTypeName)' for application '$($ApplicationName)'" -Type INFO
}
else {
Write-OutputBox -OutputBoxMessage "Validation of deployment type '$($DeploymentTypeName)' for application '$($ApplicationName)' did not match the search pattern" -Type INFO
}
}
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "Validation of application '$($ApplicationName)' detected that there was no associated content" -Type INFO
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO
if ($DGVResults.RowCount -ge 1) {
$ButtonStart.Enabled = $true
}
}
if ($Action -eq "Update") {
$AppCount = 0
$AppRowCount = 0
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) {
$AppRowCount++
}
}
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
$CellAppName = $DGVResults.Rows[$RowIndex].Cells[1].Value
$CellAppSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value
if ($CellAppSelected -eq $true) {
$AppCount++
$Application = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ApplicationLatest" -ComputerName $SiteServer -Filter "LocalizedDisplayName like '$($CellAppName)'"
if ($Application -ne $null) {
$ApplicationName = $Application.LocalizedDisplayName
Update-StatusBar -Activity Updating -Text "Updating application $($AppCount) / $($AppRowCount)"
$Application.Get()
$ApplicationXML = [Microsoft.ConfigurationManagement.ApplicationManagement.Serialization.SccmSerializer]::DeserializeFromString($Application.SDMPackageXML, $true)
foreach ($DeploymentType in $ApplicationXML.DeploymentTypes) {
$DeploymentTypeName = $DeploymentType.Title
$ExistingContentLocation = $DeploymentType.Installer.Contents[0].Location
if ($ExistingContentLocation -match [regex]::Escape($TextBoxMatch.Text)) {
$UpdatedContentLocation = $DeploymentType.Installer.Contents[0].Location -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
if ($CopyFiles -eq $true) {
if ($DeploymentType.Installer.Technology -eq "AppV") {
$AmendUpdatedContentLocation = Split-Path -Path $UpdatedContentLocation -Parent
if (-not(Test-Path -Path $AmendUpdatedContentLocation)) {
New-Item -Path $AmendUpdatedContentLocation -ItemType Directory | Out-Null
}
if (Test-Path -Path $ExistingContentLocation) {
$ExistingContentLocationItems = Get-ChildItem -Path $ExistingContentLocation
Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingContentLocation) to $($AmendUpdatedContentLocation)" -Type INFO
foreach ($ExistingContentLocationItem in $ExistingContentLocationItems) {
Copy-Item -Path $ExistingContentLocationItem.FullName -Destination $AmendUpdatedContentLocation -Force -Recurse
}
}
else {
Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingContentLocation)" -Type WARNING
}
}
else {
if (-not(Test-Path -Path $UpdatedContentLocation)) {
New-Item -Path $UpdatedContentLocation -ItemType Directory | Out-Null
}
if (Test-Path -Path $ExistingContentLocation) {
$ExistingContentLocationItems = Get-ChildItem -Path $ExistingContentLocation
Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingContentLocation) to $($UpdatedContentLocation)" -Type INFO
foreach ($ExistingContentLocationItem in $ExistingContentLocationItems) {
Copy-Item -Path $ExistingContentLocationItem.FullName -Destination $UpdatedContentLocation -Force -Recurse
}
}
else {
Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingContentLocation)" -Type WARNING
}
}
}
$ContentImporter = [Microsoft.ConfigurationManagement.ApplicationManagement.ContentImporter]::CreateContentFromFolder($UpdatedContentLocation)
$DeploymentType.Installer.Contents[0].ID = $ContentImporter.ID
$DeploymentType.Installer.Contents[0] = $ContentImporter
$UpdatedXML = [Microsoft.ConfigurationManagement.ApplicationManagement.Serialization.SccmSerializer]::SerializeToString($ApplicationXML, $true)
$Application.SDMPackageXML = $UpdatedXML
$Application.Put() | Out-Null
Write-OutputBox -OutputBoxMessage "Updated deployment type '$($DeploymentTypeName)' for application '$($ApplicationName)'" -Type INFO
[System.Windows.Forms.Application]::DoEvents()
}
}
}
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO
$ButtonStart.Enabled = $false
}
}
}
function Update-PackageContentSource {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Validate","Update")]
[string]$Action,
[parameter(Mandatory=$false)]
[switch]$CopyFiles
)
Process {
if ($Action -eq "Validate") {
$PackageCount = 0
Update-StatusBar -Activity Enumerating -Text " "
$Packages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Package" -ComputerName $SiteServer
$PackagesCount = ($Packages | Measure-Object).Count
foreach ($Package in $Packages) {
$PackageCount++
$PackageName = $Package.Name
$PackageID = $Package.PackageID
Update-StatusBar -Activity Validating -Text "Validating package $($PackageCount) / $($PackagesCount)"
if ($Package.PkgSourcePath -ne $null) {
if ($Package.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingPackageSourcePath = $Package.PkgSourcePath
$UpdatedPackageSourcePath = $Package.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
$DGVResults.Rows.Add($true, $PackageName, $ExistingPackageSourcePath, $UpdatedPackageSourcePath, $PackageID)
$DGVResults.ClearSelection()
Write-OutputBox -OutputBoxMessage "Successfully validated package '$($PackageName)'" -Type INFO
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for package '$($PackageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of package '$($PackageName)' detected that there was no associated content" -Type INFO
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO
$ButtonStart.Enabled = $true
}
if ($Action -eq "Update") {
$PackageCount = 0
$PackageRowCount = 0
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) {
$PackageRowCount++
}
}
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
$CellPackageName = $DGVResults.Rows[$RowIndex].Cells[1].Value
$CellPackageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value
$CellPackageID = $DGVResults.Rows[$RowIndex].Cells[4].Value
if ($CellPackageSelected -eq $true) {
$PackageCount++
$Package = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Package" -ComputerName $SiteServer -Filter "PackageID like '$($CellPackageID)'"
if ($Package -ne $null) {
$PackageName = $Package.Name
Update-StatusBar -Activity Validating -Text "Updating package $($PackageCount) / $($PackageRowCount)"
[System.Windows.Forms.Application]::DoEvents()
if ($Package.PkgSourcePath -ne $null) {
if ($Package.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingPackageSourcePath = $Package.PkgSourcePath
$UpdatedPackageSourcePath = $Package.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
if ($CopyFiles -eq $true) {
if (-not(Test-Path -Path $UpdatedPackageSourcePath)) {
New-Item -Path $UpdatedPackageSourcePath -ItemType Directory | Out-Null
}
if ((Get-ChildItem -Path $UpdatedPackageSourcePath | Measure-Object).Count -eq 0) {
if (Test-Path -Path $ExistingPackageSourcePath) {
$ExistingPackageSourcePathItems = Get-ChildItem -Path $ExistingPackageSourcePath
Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingPackageSourcePath) to $($UpdatedPackageSourcePath)" -Type INFO
foreach ($ExistingPackageSourcePathItem in $ExistingPackageSourcePathItems) {
Copy-Item -Path $ExistingPackageSourcePathItem.FullName -Destination $UpdatedPackageSourcePath -Force -Recurse
}
}
else {
Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingPackageSourcePath)" -Type WARNING
}
}
}
$Package.PkgSourcePath = $UpdatedPackageSourcePath
$Package.Put() | Out-Null
$ValidatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Package" -ComputerName $SiteServer -Filter "PackageID like '$($CellPackageID)'"
if ($ValidatePackage.PkgSourcePath -eq $UpdatedPackageSourcePath) {
Write-OutputBox -OutputBoxMessage "Updated package '$($PackageName)'" -Type INFO
}
else {
Write-OutputBox -OutputBoxMessage "An error occurred while updating package '$($PackageName)'" -Type ERROR
}
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for package '$($PackageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of package '$($PackageName)' detected that there was no associated content" -Type INFO
}
}
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO
$ButtonStart.Enabled = $false
}
}
}
function Update-DeploymentPackageContentSource {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Validate","Update")]
[string]$Action,
[parameter(Mandatory=$false)]
[switch]$CopyFiles
)
Process {
if ($Action -eq "Validate") {
$DeploymentPackageCount = 0
Update-StatusBar -Activity Enumerating -Text " "
$DeploymentPackages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_SoftwareUpdatesPackage" -ComputerName $SiteServer
$DeploymentPackagesCount = ($DeploymentPackages | Measure-Object).Count
foreach ($DeploymentPackage in $DeploymentPackages) {
$DeploymentPackageCount++
$DeploymentPackageName = $DeploymentPackage.Name
$DeploymentPackageID = $DeploymentPackage.PackageID
Update-StatusBar -Activity Validating -Text "Validating deployment package $($DeploymentPackageCount) / $($DeploymentPackagesCount)"
if ($DeploymentPackage.PkgSourcePath -ne $null) {
if ($DeploymentPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingDeploymentPackageSourcePath = $DeploymentPackage.PkgSourcePath
$UpdatedDeploymentPackageSourcePath = $DeploymentPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
$DGVResults.Rows.Add($true, $DeploymentPackageName, $ExistingDeploymentPackageSourcePath, $UpdatedDeploymentPackageSourcePath, $DeploymentPackageID)
Write-OutputBox -OutputBoxMessage "Successfully validated deployment package '$($DeploymentPackageName)'" -Type INFO
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for deployment package '$($DeploymentPackageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of deployment package '$($DeploymentPackageName)' detected that there was no associated content" -Type INFO
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO
$ButtonStart.Enabled = $true
}
if ($Action -eq "Update") {
$DeploymentPackageCount = 0
$DeploymentPackageRowCount = 0
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) {
$DeploymentPackageRowCount++
}
}
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
$CellDeploymentPackageName = $DGVResults.Rows[$RowIndex].Cells[1].Value
$CellDeploymentPackageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value
$CellDeploymentPackageID = $DGVResults.Rows[$RowIndex].Cells[4].Value
if ($CellDeploymentPackageSelected -eq $true) {
$DeploymentPackageCount++
$DeploymentPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_SoftwareUpdatesPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellDeploymentPackageID)'"
if ($DeploymentPackage -ne $null) {
$DeploymentPackageName = $DeploymentPackage.Name
Update-StatusBar -Activity Validating -Text "Updating package $($DeploymentPackageCount) / $($DeploymentPackageRowCount)"
[System.Windows.Forms.Application]::DoEvents()
if ($DeploymentPackage.PkgSourcePath -ne $null) {
if ($DeploymentPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingDeploymentPackageSourcePath = $DeploymentPackage.PkgSourcePath
$UpdatedDeploymentPackageSourcePath = $DeploymentPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
if ($CopyFiles -eq $true) {
if (-not(Test-Path -Path $UpdatedDeploymentPackageSourcePath)) {
New-Item -Path $UpdatedDeploymentPackageSourcePath -ItemType Directory | Out-Null
}
if ((Get-ChildItem -Path $UpdatedDeploymentPackageSourcePath | Measure-Object).Count -eq 0) {
if (Test-Path -Path $ExistingDeploymentPackageSourcePath) {
$ExistingDeploymentPackageSourcePathItems = Get-ChildItem -Path $ExistingDeploymentPackageSourcePath
Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingDeploymentPackageSourcePath) to $($UpdatedDeploymentPackageSourcePath)" -Type INFO
foreach ($ExistingDeploymentPackageSourcePathItem in $ExistingDeploymentPackageSourcePathItems) {
Copy-Item -Path $ExistingDeploymentPackageSourcePathItem.FullName -Destination $UpdatedDeploymentPackageSourcePath -Force -Recurse
}
}
else {
Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingDeploymentPackageSourcePath)" -Type WARNING
}
}
}
$DeploymentPackage.PkgSourcePath = $UpdatedDeploymentPackageSourcePath
$DeploymentPackage.Put() | Out-Null
$ValidateDeploymentPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_SoftwareUpdatesPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellDeploymentPackageID)'"
if ($ValidateDeploymentPackage.PkgSourcePath -eq $UpdatedDeploymentPackageSourcePath) {
Write-OutputBox -OutputBoxMessage "Updated deployment package '$($DeploymentPackageName)'" -Type INFO
}
else {
Write-OutputBox -OutputBoxMessage "An error occurred while updating deployment package '$($DeploymentPackageName)'" -Type ERROR
}
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for package '$($DeploymentPackageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of package '$($DeploymentPackageName)' detected that there was no associated content" -Type INFO
}
}
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO
$ButtonStart.Enabled = $false
}
}
}
function Update-DriverContentSource {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Validate","Update")]
[string]$Action,
[parameter(Mandatory=$false)]
[switch]$CopyFiles
)
Process {
if ($Action -eq "Validate") {
$DriverCount = 0
Update-StatusBar -Activity Enumerating -Text " "
$Drivers = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Driver" -ComputerName $SiteServer
$DriversCount = ($Drivers | Measure-Object).Count
foreach ($Driver in $Drivers) {
$DriverCount++
$DriverName = $Driver.LocalizedDisplayName
$DriverCIID = $Driver.CI_ID
Update-StatusBar -Activity Validating -Text "Validating driver $($DriverCount) / $($DriversCount)"
if ($Driver.ContentSourcePath -ne $null) {
if ($Driver.ContentSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingDriverSourcePath = $Driver.ContentSourcePath
$UpdatedDriverSourcePath = $Driver.ContentSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
$DGVResults.Rows.Add($true, $DriverName, $ExistingDriverSourcePath, $UpdatedDriverSourcePath, $DriverCIID)
Write-OutputBox -OutputBoxMessage "Successfully validated driver '$($DriverName)'" -Type INFO
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for driver '$($DriverName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of driver '$($DriverName)' detected that there was no associated content" -Type INFO
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO
$ButtonStart.Enabled = $true
}
if ($Action -eq "Update") {
$DriverCount = 0
$DriverRowCount = 0
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) {
$DriverRowCount++
}
}
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
$CellDriverName = $DGVResults.Rows[$RowIndex].Cells[1].Value
$CellDriverSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value
$CellDriverCIID = $DGVResults.Rows[$RowIndex].Cells[4].Value
if ($CellDriverSelected -eq $true) {
$DriverCount++
$Driver = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Driver" -ComputerName $SiteServer -Filter "CI_ID like '$($CellDriverCIID)'"
if ($Driver -ne $null) {
$DriverName = $Driver.LocalizedDisplayName
Update-StatusBar -Activity Validating -Text "Updating driver $($DriverCount) / $($DriverRowCount)"
[System.Windows.Forms.Application]::DoEvents()
if ($Driver.ContentSourcePath -ne $null) {
if ($Driver.ContentSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingDriverSourcePath = $Driver.ContentSourcePath
$UpdatedDriverSourcePath = $Driver.ContentSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
if ($CopyFiles -eq $true) {
if (-not(Test-Path -Path $UpdatedDriverSourcePath)) {
New-Item -Path $UpdatedDriverSourcePath -ItemType Directory | Out-Null
}
if ((Get-ChildItem -Path $UpdatedDriverSourcePath | Measure-Object).Count -eq 0) {
if (Test-Path -Path $ExistingDriverSourcePath) {
$ExistingDriverSourcePathItems = Get-ChildItem -Path $ExistingDriverSourcePath
Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingDriverSourcePath) to $($UpdatedDriverSourcePath)" -Type INFO
foreach ($ExistingDriverSourcePathItem in $ExistingDriverSourcePathItems) {
Copy-Item -Path $ExistingDriverSourcePathItem.FullName -Destination $UpdatedDriverSourcePath -Force -Recurse
}
}
else {
Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingDriverSourcePath)" -Type WARNING
}
}
}
$Driver.ContentSourcePath = $UpdatedDriverSourcePath
$Driver.Put() | Out-Null
$ValidateDriver = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Driver" -ComputerName $SiteServer -Filter "CI_ID like '$($CellDriverCIID)'"
if ($ValidateDriver.ContentSourcePath -eq $UpdatedDriverSourcePath) {
Write-OutputBox -OutputBoxMessage "Updated driver '$($DriverName)'" -Type INFO
}
else {
Write-OutputBox -OutputBoxMessage "An error occurred while updating driver '$($DriverName)'" -Type ERROR
}
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for driver '$($DriverName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of driver '$($DriverName)' detected that there was no associated content" -Type INFO
}
}
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO
$ButtonStart.Enabled = $false
}
}
}
function Update-DriverPackageContentSource {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Validate","Update")]
[string]$Action,
[parameter(Mandatory=$false)]
[switch]$CopyFiles
)
Process {
if ($Action -eq "Validate") {
$DriverPackageCount = 0
Update-StatusBar -Activity Enumerating -Text " "
$DriverPackages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_DriverPackage" -ComputerName $SiteServer
$DriverPackagesCount = ($DriverPackages | Measure-Object).Count
foreach ($DriverPackage in $DriverPackages) {
$DriverPackageCount++
$DriverPackageName = $DriverPackage.Name
$DriverPackageID = $DriverPackage.PackageID
Update-StatusBar -Activity Validating -Text "Validating driver package $($DriverPackageCount) / $($DriverPackagesCount)"
if ($DriverPackage.PkgSourcePath -ne $null) {
if ($DriverPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingDriverPackageSourcePath = $DriverPackage.PkgSourcePath
$UpdatedDriverPackageSourcePath = $DriverPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
$DGVResults.Rows.Add($true, $DriverPackageName, $ExistingDriverPackageSourcePath, $UpdatedDriverPackageSourcePath, $DriverPackageID)
Write-OutputBox -OutputBoxMessage "Successfully validated driver package '$($DriverPackageName)'" -Type INFO
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for driver package '$($DriverPackageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of driver package '$($DriverPackageName)' detected that there was no associated content" -Type INFO
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO
$ButtonStart.Enabled = $true
}
if ($Action -eq "Update") {
$DriverPackageCount = 0
$DriverPackageRowCount = 0
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) {
$DriverPackageRowCount++
}
}
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
$CellDriverPackageName = $DGVResults.Rows[$RowIndex].Cells[1].Value
$CellDriverPackageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value
$CellDriverPackageID = $DGVResults.Rows[$RowIndex].Cells[4].Value
if ($CellDriverPackageSelected -eq $true) {
$DriverPackageCount++
$DriverPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_DriverPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellDriverPackageID)'"
if ($DriverPackage -ne $null) {
$DriverPackageName = $DriverPackage.Name
Update-StatusBar -Activity Validating -Text "Updating driver package $($DriverPackageCount) / $($DriverPackageRowCount)"
[System.Windows.Forms.Application]::DoEvents()
if ($DriverPackage.PkgSourcePath -ne $null) {
if ($DriverPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingDriverPackageSourcePath = $DriverPackage.PkgSourcePath
$UpdatedDriverPackageSourcePath = $DriverPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
if ($CopyFiles -eq $true) {
if (-not(Test-Path -Path $UpdatedDriverPackageSourcePath)) {
New-Item -Path $UpdatedDriverPackageSourcePath -ItemType Directory | Out-Null
}
if ((Get-ChildItem -Path $UpdatedDriverPackageSourcePath | Measure-Object).Count -eq 0) {
if (Test-Path -Path $ExistingDriverPackageSourcePath) {
$ExistingDriverPackageSourcePathItems = Get-ChildItem -Path $ExistingDriverPackageSourcePath
Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingDriverPackageSourcePath) to $($UpdatedDriverPackageSourcePath)" -Type INFO
foreach ($ExistingDriverPackageSourcePathItem in $ExistingDriverPackageSourcePathItems) {
Copy-Item -Path $ExistingDriverPackageSourcePathItem.FullName -Destination $UpdatedDriverPackageSourcePath -Force -Recurse
}
}
else {
Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingDriverPackageSourcePath)" -Type WARNING
}
}
}
$DriverPackage.PkgSourcePath = $UpdatedDriverPackageSourcePath
$DriverPackage.Put() | Out-Null
$ValidateDriverPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_DriverPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellDriverPackageID)'"
if ($ValidateDriverPackage.PkgSourcePath -eq $UpdatedDriverPackageSourcePath) {
Write-OutputBox -OutputBoxMessage "Updated driver package '$($DriverPackageName)'" -Type INFO
}
else {
Write-OutputBox -OutputBoxMessage "An error occurred while updating driver package '$($DriverPackageName)'" -Type ERROR
}
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for driver package '$($DriverPackageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of driver package '$($DriverPackageName)' detected that there was no associated content" -Type INFO
}
}
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO
$ButtonStart.Enabled = $false
}
}
}
function Update-OperatingSystemImageContentSource {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Validate","Update")]
[string]$Action,
[parameter(Mandatory=$false)]
[switch]$CopyFiles
)
Process {
if ($Action -eq "Validate") {
$OperatingSystemImageCount = 0
Update-StatusBar -Activity Enumerating -Text " "
$OperatingSystemImages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ImagePackage" -ComputerName $SiteServer
$OperatingSystemImagesCount = ($OperatingSystemImages | Measure-Object).Count
foreach ($OperatingSystemImage in $OperatingSystemImages) {
$OperatingSystemImageCount++
$OperatingSystemImageName = $OperatingSystemImage.Name
$OperatingSystemImageID = $OperatingSystemImage.PackageID
Update-StatusBar -Activity Validating -Text "Validating operating system image $($OperatingSystemImageCount) / $($OperatingSystemImagesCount)"
if ($OperatingSystemImage.PkgSourcePath -ne $null) {
if ($OperatingSystemImage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingOperatingSystemImageSourcePath = $OperatingSystemImage.PkgSourcePath
$UpdatedOperatingSystemImageSourcePath = $OperatingSystemImage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
$DGVResults.Rows.Add($true, $OperatingSystemImageName, $ExistingOperatingSystemImageSourcePath, $UpdatedOperatingSystemImageSourcePath, $OperatingSystemImageID)
Write-OutputBox -OutputBoxMessage "Successfully validated operating system image '$($OperatingSystemImageName)'" -Type INFO
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for operating system image '$($OperatingSystemImageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of operating system image '$($OperatingSystemImageName)' detected that there was no associated content" -Type INFO
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO
$ButtonStart.Enabled = $true
}
if ($Action -eq "Update") {
$OperatingSystemImageCount = 0
$OperatingSystemImageRowCount = 0
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) {
$OperatingSystemImageRowCount++
}
}
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
$CellOperatingSystemImageName = $DGVResults.Rows[$RowIndex].Cells[1].Value
$CellOperatingSystemImageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value
$CellOperatingSystemImageID = $DGVResults.Rows[$RowIndex].Cells[4].Value
if ($CellOperatingSystemImageSelected -eq $true) {
$OperatingSystemImageCount++
$OperatingSystemImage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ImagePackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellOperatingSystemImageID)'"
if ($OperatingSystemImage -ne $null) {
$OperatingSystemImageName = $OperatingSystemImage.Name
Update-StatusBar -Activity Validating -Text "Updating operating system image $($OperatingSystemImageCount) / $($OperatingSystemImageRowCount)"
[System.Windows.Forms.Application]::DoEvents()
if ($OperatingSystemImage.PkgSourcePath -ne $null) {
if ($OperatingSystemImage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingOperatingSystemImageSourcePath = $OperatingSystemImage.PkgSourcePath
$UpdatedOperatingSystemImageSourcePath = $OperatingSystemImage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
$AmendUpdatedOperatingSystemImageSourcePath = Split-Path -Path $UpdatedOperatingSystemImageSourcePath -Parent
if ($CopyFiles -eq $true) {
if (-not(Test-Path -Path $AmendUpdatedOperatingSystemImageSourcePath)) {
New-Item -Path $AmendUpdatedOperatingSystemImageSourcePath -ItemType Directory | Out-Null
}
if (Test-Path -Path $ExistingOperatingSystemImageSourcePath) {
$ExistingOperatingSystemImageSourcePathItems = Get-ChildItem -Path $ExistingOperatingSystemImageSourcePath
Write-OutputBox -OutputBoxMessage "Copying wim file $($ExistingOperatingSystemImageSourcePath) to $($AmendUpdatedOperatingSystemImageSourcePath)" -Type INFO
foreach ($ExistingOperatingSystemImageSourcePathItem in $ExistingOperatingSystemImageSourcePathItems) {
Copy-Item -Path $ExistingOperatingSystemImageSourcePathItem.FullName -Destination $AmendUpdatedOperatingSystemImageSourcePath -Force -Recurse
}
}
else {
Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingOperatingSystemImageSourcePath)" -Type WARNING
}
}
if (Test-Path -Path $UpdatedOperatingSystemImageSourcePath) {
$OperatingSystemImage.Get()
$OperatingSystemImage.PkgSourcePath = $UpdatedOperatingSystemImageSourcePath
$OperatingSystemImage.Put() | Out-Null
$ValidateOperatingSystemImage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_ImagePackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellOperatingSystemImageID)'"
if ($ValidateOperatingSystemImage.PkgSourcePath -eq $UpdatedOperatingSystemImageSourcePath) {
Write-OutputBox -OutputBoxMessage "Updated operating system image '$($OperatingSystemImageName)'" -Type INFO
}
else {
Write-OutputBox -OutputBoxMessage "An error occurred while updating operating system image '$($OperatingSystemImageName)'" -Type ERROR
}
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "Unable to locate $($OperatingSystemImageName) wim file on updated content source path. Manually copy the content files or check the Copy content files to new location check box " -Type WARNING
}
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for operating system image '$($OperatingSystemImageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of operating system image '$($OperatingSystemImageName)' detected that there was no associated content" -Type INFO
}
}
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO
$ButtonStart.Enabled = $false
}
}
}
function Update-OperatingSystemPackageContentSource {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Validate","Update")]
[string]$Action,
[parameter(Mandatory=$false)]
[switch]$CopyFiles
)
Process {
if ($Action -eq "Validate") {
$OperatingSystemPackageCount = 0
Update-StatusBar -Activity Enumerating -Text " "
$OperatingSystemPackages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_OperatingSystemInstallPackage" -ComputerName $SiteServer
$OperatingSystemPackagesCount = ($OperatingSystemPackages | Measure-Object).Count
foreach ($OperatingSystemPackage in $OperatingSystemPackages) {
$OperatingSystemPackageCount++
$OperatingSystemPackageName = $OperatingSystemPackage.Name
$OperatingSystemPackageID = $OperatingSystemPackage.PackageID
Update-StatusBar -Activity Validating -Text "Validating operating system package $($OperatingSystemPackageCount) / $($OperatingSystemPackagesCount)"
if ($OperatingSystemPackage.PkgSourcePath -ne $null) {
if ($OperatingSystemPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingOperatingSystemPackageSourcePath = $OperatingSystemPackage.PkgSourcePath
$UpdatedOperatingSystemPackageSourcePath = $OperatingSystemPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
$DGVResults.Rows.Add($true, $OperatingSystemPackageName, $ExistingOperatingSystemPackageSourcePath, $UpdatedOperatingSystemPackageSourcePath, $OperatingSystemPackageID)
Write-OutputBox -OutputBoxMessage "Successfully validated operating system package '$($OperatingSystemPackageName)'" -Type INFO
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for operating system package '$($OperatingSystemPackageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of operating system package '$($OperatingSystemPackageName)' detected that there was no associated content" -Type INFO
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO
$ButtonStart.Enabled = $true
}
if ($Action -eq "Update") {
$OperatingSystemPackageCount = 0
$OperatingSystemPackageRowCount = 0
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) {
$OperatingSystemPackageRowCount++
}
}
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
$CellOperatingSystemPackageName = $DGVResults.Rows[$RowIndex].Cells[1].Value
$CellOperatingSystemPackageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value
$CellOperatingSystemPackageID = $DGVResults.Rows[$RowIndex].Cells[4].Value
if ($CellOperatingSystemPackageSelected -eq $true) {
$OperatingSystemPackageCount++
$OperatingSystemPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_OperatingSystemInstallPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellOperatingSystemPackageID)'"
if ($OperatingSystemPackage -ne $null) {
$OperatingSystemPackageName = $OperatingSystemPackage.Name
Update-StatusBar -Activity Validating -Text "Updating operating system package $($OperatingSystemPackageCount) / $($OperatingSystemPackageRowCount)"
[System.Windows.Forms.Application]::DoEvents()
if ($OperatingSystemPackage.PkgSourcePath -ne $null) {
if ($OperatingSystemPackage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingOperatingSystemPackageSourcePath = $OperatingSystemPackage.PkgSourcePath
$UpdatedOperatingSystemPackageSourcePath = $OperatingSystemPackage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
if ($CopyFiles -eq $true) {
if (-not(Test-Path -Path $UpdatedOperatingSystemPackageSourcePath)) {
New-Item -Path $UpdatedOperatingSystemPackageSourcePath -ItemType Directory | Out-Null
}
if ((Get-ChildItem -Path $UpdatedOperatingSystemPackageSourcePath | Measure-Object).Count -eq 0) {
if (Test-Path -Path $ExistingOperatingSystemPackageSourcePath) {
$ExistingOperatingSystemPackageSourcePathItems = Get-ChildItem -Path $ExistingOperatingSystemPackageSourcePath
Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingOperatingSystemPackageSourcePath) to $($UpdatedOperatingSystemPackageSourcePath)" -Type INFO
foreach ($ExistingOperatingSystemPackageSourcePathItem in $ExistingOperatingSystemPackageSourcePathItems) {
Copy-Item -Path $ExistingOperatingSystemPackageSourcePathItem.FullName -Destination $UpdatedOperatingSystemPackageSourcePath -Force -Recurse
}
}
else {
Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingOperatingSystemPackageSourcePath)" -Type WARNING
}
}
}
$OperatingSystemPackage.Get()
$OperatingSystemPackage.PkgSourcePath = $UpdatedOperatingSystemPackageSourcePath
$OperatingSystemPackage.Put() | Out-Null
$ValidateOperatingSystemPackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_OperatingSystemInstallPackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellOperatingSystemPackageID)'"
if ($ValidateOperatingSystemPackage.PkgSourcePath -eq $UpdatedOperatingSystemPackageSourcePath) {
Write-OutputBox -OutputBoxMessage "Updated operating system package '$($OperatingSystemPackageName)'" -Type INFO
}
else {
Write-OutputBox -OutputBoxMessage "An error occurred while updating operating system package '$($OperatingSystemPackageName)'" -Type ERROR
}
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for operating system package '$($OperatingSystemPackageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of operating system package '$($OperatingSystemPackageName)' detected that there was no associated content" -Type INFO
}
}
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO
$ButtonStart.Enabled = $false
}
}
}
function Update-BootImageContentSource {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Validate","Update")]
[string]$Action,
[parameter(Mandatory=$false)]
[switch]$CopyFiles
)
Process {
if ($Action -eq "Validate") {
$BootImageCount = 0
Update-StatusBar -Activity Enumerating -Text " "
$BootImages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_BootImagePackage" -ComputerName $SiteServer
$BootImagesCount = ($BootImages | Measure-Object).Count
foreach ($BootImage in $BootImages) {
$BootImageCount++
$BootImageName = $BootImage.Name
$BootImageID = $BootImage.PackageID
Update-StatusBar -Activity Validating -Text "Validating operating system image $($BootImageCount) / $($BootImagesCount)"
if ($BootImage.PkgSourcePath -ne $null) {
if ($BootImage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingBootImageSourcePath = $BootImage.PkgSourcePath
$UpdatedBootImageSourcePath = $BootImage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
$DGVResults.Rows.Add($true, $BootImageName, $ExistingBootImageSourcePath, $UpdatedBootImageSourcePath, $BootImageID)
Write-OutputBox -OutputBoxMessage "Successfully validated boot image '$($BootImageName)'" -Type INFO
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for boot image '$($BootImageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of boot image '$($BootImageName)' detected that there was no associated content" -Type INFO
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed content source validation" -Type INFO
$ButtonStart.Enabled = $true
}
if ($Action -eq "Update") {
$BootImageCount = 0
$BootImageRowCount = 0
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
if ($DGVResults.Rows[$RowIndex].Cells[0].Value -eq $true) {
$BootImageRowCount++
}
}
for ($RowIndex = 0; $RowIndex -lt $DGVResults.RowCount; $RowIndex++) {
$CellBootImageName = $DGVResults.Rows[$RowIndex].Cells[1].Value
$CellBootImageSelected = $DGVResults.Rows[$RowIndex].Cells[0].Value
$CellBootImageID = $DGVResults.Rows[$RowIndex].Cells[4].Value
if ($CellBootImageSelected -eq $true) {
$BootImageCount++
$BootImage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_BootImagePackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellBootImageID)'"
if ($BootImage -ne $null) {
$BootImageName = $BootImage.Name
Update-StatusBar -Activity Validating -Text "Updating boot image $($BootImageCount) / $($BootImageRowCount)"
[System.Windows.Forms.Application]::DoEvents()
if ($BootImage.PkgSourcePath -ne $null) {
if ($BootImage.PkgSourcePath -match [regex]::Escape($TextBoxMatch.Text)) {
$ExistingBootImageSourcePath = $BootImage.PkgSourcePath
$UpdatedBootImageSourcePath = $BootImage.PkgSourcePath -replace [regex]::Escape($TextBoxMatch.Text), $TextBoxReplace.Text
if ($CopyFiles -eq $true) {
if (-not(Test-Path -Path $UpdatedBootImageSourcePath)) {
New-Item -Path $UpdatedBootImageSourcePath -ItemType Directory | Out-Null
}
if ((Get-ChildItem -Path $UpdatedBootImageSourcePath | Measure-Object).Count -eq 0) {
if (Test-Path -Path $ExistingBootImageSourcePath) {
$ExistingBootImageSourcePathItems = Get-ChildItem -Path $ExistingBootImageSourcePath
Write-OutputBox -OutputBoxMessage "Copying content source files from $($ExistingBootImageSourcePath) to $($UpdatedBootImageSourcePath)" -Type INFO
foreach ($ExistingBootImageSourcePathItem in $ExistingBootImageSourcePathItems) {
Copy-Item -Path $ExistingBootImageSourcePathItem.FullName -Destination $UpdatedBootImageSourcePath -Force -Recurse
}
}
else {
Write-OutputBox -OutputBoxMessage "Unable to access $($ExistingBootImageSourcePath)" -Type WARNING
}
}
}
$BootImage.Get()
$BootImage.PkgSourcePath = $UpdatedBootImageSourcePath
$BootImage.Put() | Out-Null
$ValidateBootImage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_BootImagePackage" -ComputerName $SiteServer -Filter "PackageID like '$($CellBootImageID)'"
if ($ValidateBootImage.PkgSourcePath -eq $UpdatedBootImageSourcePath) {
Write-OutputBox -OutputBoxMessage "Updated boot image '$($BootImageName)'" -Type INFO
}
else {
Write-OutputBox -OutputBoxMessage "An error occurred while updating boot image '$($BootImageName)'" -Type ERROR
}
[System.Windows.Forms.Application]::DoEvents()
}
else {
Write-OutputBox -OutputBoxMessage "No matching content source for boot image '$($BootImageName)' was found" -Type INFO
}
}
else {
Write-OutputBox -OutputBoxMessage "Validation of boot image '$($BootImageName)' detected that there was no associated content" -Type INFO
}
}
}
}
Update-StatusBar -Activity Ready -Text " "
Write-OutputBox -OutputBoxMessage "Completed updating content sources" -Type INFO
$ButtonStart.Enabled = $false
}
}
}
$Form = New-Object System.Windows.Forms.Form
$Form.Size = New-Object System.Drawing.Size(900,700)
$Form.MinimumSize = New-Object System.Drawing.Size(900,700)
$Form.MaximumSize = New-Object System.Drawing.Size([System.Int32]::MaxValue,[System.Int32]::MaxValue)
$Form.SizeGripStyle = "Show"
$Form.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe")
$Form.Text = "ConfigMgr Content Source Update Tool 1.0.0"
$Form.ControlBox = $true
$Form.TopMost = $false
$ButtonStart = New-Object System.Windows.Forms.Button
$ButtonStart.Location = New-Object System.Drawing.Size(762,35)
$ButtonStart.Size = New-Object System.Drawing.Size(95,30)
$ButtonStart.Text = "Update"
$ButtonStart.TabIndex = "3"
$ButtonStart.Anchor = "Top, Right"
$ButtonStart.Enabled = $false
$ButtonStart.Add_Click({
if ($CheckBoxCopyContent.Checked -eq $true) {
$CopyFiles = $true
}
else {
$CopyFiles = $false
}
switch ($ComboBoxTypes.SelectedItem) {
"Application" {
Invoke-CleanControls -Option Log
Update-ApplicationContentSource -Action Update -CopyFiles:$CopyFiles
}
"Package" {
Invoke-CleanControls -Option Log
Update-PackageContentSource -Action Update -CopyFiles:$CopyFiles
}
"Deployment Package" {
Invoke-CleanControls -Option Log
Update-DeploymentPackageContentSource -Action Update -CopyFiles:$CopyFiles
}
"Driver" {
Invoke-CleanControls -Option Log
Update-DriverContentSource -Action Update -CopyFiles:$CopyFiles
}
"Driver Package" {
Invoke-CleanControls -Option Log
Update-DriverPackageContentSource -Action Update -CopyFiles:$CopyFiles
}
"Operating System Image" {
Invoke-CleanControls -Option Log
Update-OperatingSystemImageContentSource -Action Update -CopyFiles:$CopyFiles
}
"Operating System Package" {
Invoke-CleanControls -Option Log
Update-OperatingSystemPackageContentSource -Action Update -CopyFiles:$CopyFiles
}
"Boot Image" {
Invoke-CleanControls -Option Log
Update-BootImageContentSource -Action Update -CopyFiles:$CopyFiles
}
}
})
$ButtonValidate = New-Object System.Windows.Forms.Button
$ButtonValidate.Location = New-Object System.Drawing.Size(762,75)
$ButtonValidate.Size = New-Object System.Drawing.Size(95,30)
$ButtonValidate.Text = "Validate"
$ButtonValidate.TabIndex = "2"
$ButtonValidate.Anchor = "Top, Right"
$ButtonValidate.Enabled = $false
$ButtonValidate.Add_Click({
if ($CheckBoxCopyContent.Checked -eq $true) {
$CopyFiles = $true
}
else {
$CopyFiles = $false
}
switch ($ComboBoxTypes.SelectedItem) {
"Application" {
Invoke-CleanControls -Option All
Update-ApplicationContentSource -Action Validate -CopyFiles:$CopyFiles
}
"Package" {
Invoke-CleanControls -Option All
Update-PackageContentSource -Action Validate -CopyFiles:$CopyFiles
}
"Deployment Package" {
Invoke-CleanControls -Option All
Update-DeploymentPackageContentSource -Action Validate -CopyFiles:$CopyFiles
}
"Driver" {
Invoke-CleanControls -Option All
Update-DriverContentSource -Action Validate -CopyFiles:$CopyFiles
}
"Driver Package" {
Invoke-CleanControls -Option All
Update-DriverPackageContentSource -Action Validate -CopyFiles:$CopyFiles
}
"Operating System Image" {
Invoke-CleanControls -Option All
Update-OperatingSystemImageContentSource -Action Validate -CopyFiles:$CopyFiles
}
"Operating System Package" {
Invoke-CleanControls -Option All
Update-OperatingSystemPackageContentSource -Action Validate -CopyFiles:$CopyFiles
}
"Boot Image" {
Invoke-CleanControls -Option All
Update-BootImageContentSource -Action Validate -CopyFiles:$CopyFiles
}
}
})
$GBMatch = New-Object -TypeName System.Windows.Forms.GroupBox
$GBMatch.Location = New-Object -TypeName System.Drawing.Size(10,10)
$GBMatch.Size = New-Object -TypeName System.Drawing.Size(500,50)
$GBMatch.Anchor = "Top, Left, Right"
$GBMatch.Text = "Match pattern for Content Source locations"
$GBReplace = New-Object -TypeName System.Windows.Forms.GroupBox
$GBReplace.Location = New-Object -TypeName System.Drawing.Size(10,70)
$GBReplace.Size = New-Object -TypeName System.Drawing.Size(500,50)
$GBReplace.Anchor = "Top, Left, Right"
$GBReplace.Text = "Replace pattern for Content Source locations"
$GBOptions = New-Object -TypeName System.Windows.Forms.GroupBox
$GBOptions.Location = New-Object -TypeName System.Drawing.Size(520,10)
$GBOptions.Size = New-Object -TypeName System.Drawing.Size(220,110)
$GBOptions.Anchor = "Top, Right"
$GBOptions.Text = "Options"
$GBActions = New-Object -TypeName System.Windows.Forms.GroupBox
$GBActions.Location = New-Object -TypeName System.Drawing.Size(750,10)
$GBActions.Size = New-Object -TypeName System.Drawing.Size(120,110)
$GBActions.Anchor = "Top, Right"
$GBActions.Text = "Actions"
$GBResults = New-Object -TypeName System.Windows.Forms.GroupBox
$GBResults.Location = New-Object -TypeName System.Drawing.Size(10,130)
$GBResults.Size = New-Object -TypeName System.Drawing.Size(860,315)
$GBResults.Anchor = "Top, Bottom, Left, Right"
$GBResults.Text = "Content Source information"
$GBLog = New-Object -TypeName System.Windows.Forms.GroupBox
$GBLog.Location = New-Object -TypeName System.Drawing.Size(10,455)
$GBLog.Size = New-Object -TypeName System.Drawing.Size(860,175)
$GBLog.Anchor = "Bottom, Left, Right"
$GBLog.Text = "Logging"
$ComboBoxTypes = New-Object System.Windows.Forms.ComboBox
$ComboBoxTypes.Location = New-Object System.Drawing.Size(530,30)
$ComboBoxTypes.Size = New-Object System.Drawing.Size(200,20)
$ComboBoxTypes.Items.AddRange(@("Application","Package","Deployment Package","Driver","Driver Package","Operating System Image","Operating System Upgrade Package","Boot Image"))
$ComboBoxTypes.SelectedItem = "Application"
$ComboBoxTypes.Anchor = "Top, Right"
$ComboBoxTypes.DropDownStyle = [System.Windows.Forms.ComboBoxStyle]::DropDownList
$ComboBoxTypes.Add_SelectedIndexChanged({
$DGVResults.Rows.Clear()
$ButtonStart.Enabled = $false
if ($ComboBoxTypes.SelectedItem -eq "Application") {
$DGVResults.Columns.Clear()
$DGVResults.Columns.Insert(0,(New-Object -TypeName System.Windows.Forms.DataGridViewCheckBoxColumn))
$DGVResults.Columns[0].Name = "Update"
$DGVResults.Columns[0].Resizable = [System.Windows.Forms.DataGridViewTriState]::False
$DGVResults.Columns[0].Width = "50"
$DGVResults.Columns.Insert(1,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[1].Name = $ComboBoxTypes.SelectedItem
$DGVResults.Columns[1].Width = "200"
$DGVResults.Columns[1].ReadOnly = $true
$DGVResults.Columns.Insert(2,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[2].Name = "Deployment Type"
$DGVResults.Columns[2].AutoSizeMode = "Fill"
$DGVResults.Columns[2].ReadOnly = $true
$DGVResults.Columns.Insert(3,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[3].Name = "Existing Content Source"
$DGVResults.Columns[3].AutoSizeMode = "Fill"
$DGVResults.Columns[3].ReadOnly = $true
$DGVResults.Columns.Insert(4,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[4].Name = "Updated Content Source"
$DGVResults.Columns[4].AutoSizeMode = "Fill"
$DGVResults.Columns[4].ReadOnly = $true
}
else {
$DGVResults.Columns.Clear()
$DGVResults.Columns.Insert(0,(New-Object -TypeName System.Windows.Forms.DataGridViewCheckBoxColumn))
$DGVResults.Columns[0].Name = "Update"
$DGVResults.Columns[0].Resizable = [System.Windows.Forms.DataGridViewTriState]::False
$DGVResults.Columns[0].Width = "50"
$DGVResults.Columns.Insert(1,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[1].Name = $ComboBoxTypes.SelectedItem
$DGVResults.Columns[1].Width = "200"
$DGVResults.Columns[1].ReadOnly = $true
$DGVResults.Columns.Insert(2,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[2].Name = "Existing Content Source"
$DGVResults.Columns[2].AutoSizeMode = "Fill"
$DGVResults.Columns[2].ReadOnly = $true
$DGVResults.Columns.Insert(3,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[3].Name = "Updated Content Source"
$DGVResults.Columns[3].AutoSizeMode = "Fill"
$DGVResults.Columns[3].ReadOnly = $true
$DGVResults.Columns.Insert(4,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[4].Name = "ID"
$DGVResults.Columns[4].AutoSizeMode = "Fill"
$DGVResults.Columns[4].ReadOnly = $true
$DGVResults.Columns[4].Visible = $false
}
})
$CheckBoxCopyContent = New-Object System.Windows.Forms.CheckBox
$CheckBoxCopyContent.Location = New-Object System.Drawing.Size(530,60)
$CheckBoxCopyContent.Size = New-Object System.Drawing.Size(200,20)
$CheckBoxCopyContent.Text = "Copy content files to new location"
$CheckBoxCopyContent.Anchor = "Top, Right"
$TextBoxMatch = New-Object System.Windows.Forms.TextBox
$TextBoxMatch.Location = New-Object System.Drawing.Size(20,28)
$TextBoxMatch.Size = New-Object System.Drawing.Size(480,20)
$TextBoxMatch.TabIndex = "0"
$TextBoxMatch.Anchor = "Top, Left, Right"
$TextBoxMatch.Add_TextChanged({
if (($TextBoxMatch.Text.Length -ge 2) -and ($TextBoxReplace.Text.Length -ge 2)) {
$ButtonValidate.Enabled = $true
}
else {
$ButtonValidate.Enabled = $false
}
})
$TextBoxReplace = New-Object System.Windows.Forms.TextBox
$TextBoxReplace.Location = New-Object System.Drawing.Size(20,88)
$TextBoxReplace.Size = New-Object System.Drawing.Size(480,20)
$TextBoxReplace.TabIndex = "1"
$TextBoxReplace.Anchor = "Top, Left, Right"
$TextBoxReplace.Add_TextChanged({
if (($TextBoxMatch.Text.Length -ge 2) -and ($TextBoxReplace.Text.Length -ge 2)) {
$ButtonValidate.Enabled = $true
}
else {
$ButtonValidate.Enabled = $false
}
})
$OutputBox = New-Object System.Windows.Forms.RichTextBox
$OutputBox.Location = New-Object System.Drawing.Size(20,475)
$OutputBox.Size = New-Object System.Drawing.Size(838,145)
$OutputBox.Anchor = "Bottom, Left, Right"
$OutputBox.Font = "Courier New"
$OutputBox.BackColor = "white"
$OutputBox.ReadOnly = $true
$OutputBox.MultiLine = $true
$StatusBarPanelActivity = New-Object Windows.Forms.StatusBarPanel
$StatusBarPanelActivity.Text = "Ready"
$StatusBarPanelActivity.Width = "100"
$StatusBarPanelProcessing = New-Object Windows.Forms.StatusBarPanel
$StatusBarPanelProcessing.Text = ""
$StatusBarPanelProcessing.AutoSize = "Spring"
$StatusBar = New-Object Windows.Forms.StatusBar
$StatusBar.Size = New-Object System.Drawing.Size(500,20)
$StatusBar.ShowPanels = $true
$StatusBar.SizingGrip = $false
$StatusBar.AutoSize = "Full"
$StatusBar.Panels.AddRange(@(
$StatusBarPanelActivity,
$StatusBarPanelProcessing
))
$DGVResults = New-Object System.Windows.Forms.DataGridView
$DGVResults.Location = New-Object System.Drawing.Size(20,150)
$DGVResults.Size = New-Object System.Drawing.Size(838,285)
$DGVResults.Anchor = "Top, Bottom, Left, Right"
$DGVResults.ColumnHeadersVisible = $true
$DGVResults.Columns.Insert(0,(New-Object -TypeName System.Windows.Forms.DataGridViewCheckBoxColumn))
$DGVResults.Columns[0].Name = "Update"
$DGVResults.Columns[0].Resizable = [System.Windows.Forms.DataGridViewTriState]::False
$DGVResults.Columns[0].Width = "50"
$DGVResults.Columns.Insert(1,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[1].Name = "Application"
$DGVResults.Columns[1].Width = "200"
$DGVResults.Columns[1].ReadOnly = $true
$DGVResults.Columns.Insert(2,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[2].Name = "Deployment Type"
$DGVResults.Columns[2].AutoSizeMode = "Fill"
$DGVResults.Columns[2].ReadOnly = $true
$DGVResults.Columns.Insert(3,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[3].Name = "Existing Content Source"
$DGVResults.Columns[3].AutoSizeMode = "Fill"
$DGVResults.Columns[3].ReadOnly = $true
$DGVResults.Columns.Insert(4,(New-Object -TypeName System.Windows.Forms.DataGridViewTextBoxColumn))
$DGVResults.Columns[4].Name = "Updated Content Source"
$DGVResults.Columns[4].AutoSizeMode = "Fill"
$DGVResults.Columns[4].ReadOnly = $true
$DGVResults.AllowUserToAddRows = $false
$DGVResults.AllowUserToDeleteRows = $false
$DGVResults.ReadOnly = $false
$DGVResults.MultiSelect = $true
$DGVResults.ColumnHeadersHeightSizeMode = "DisableResizing"
$DGVResults.RowHeadersWidthSizeMode = "DisableResizing"
$DGVResults.RowHeadersVisible = $false
$DGVResults.SelectionMode = "FullRowSelect"
Load-Form
}
| 0
|
sample_9_97.ps1
|
ConvertFrom-StringData @'
id_rsop=Resultant Set of Policy (RSoP)
id_rsopobtaining=Obtaining Resultant Set of Policy (RSoP) via gpresult.exe utility
'@
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD7qNCsIl6cjNfN
# 4aMRG1f+SDL94WGsinZeFqE3ZYgIHqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEn85AhTt3Iw5Rh975v9FGiF
# FUF4SKcMISXtW4KmiI22MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEARDCXVSUmQyKt6SufDE5HcNXjYjOrfZWabD7uGTZWshTdqHj5GRRB6IHJ
# auMStAGosBLJdrD2IEOEISmqBLO1GTiAtWDvTOFPak2RS6z31hRkObedsnI0RCaJ
# PZPUgOXjeyQtyMmJNOYROqy56WuAVdh2MFURRWnI5t+u4lWDrd+T3aRN4TYQ5Qkg
# CHEaGfhhrR0yga4nNO38K1R2dWUUtcDtnb95YjvNgJx0VVlW/UvgMecFFrTFU6Be
# AQXHXw1yMo6d2HbpLZPLU8uKrHuOKCnr8DDW6aQ/EX6OnR5ComNeIVqqq2GY8MXl
# ip0ZojDPNJ38QXfFW4LXfOM2GHqK/6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBG7cpogLyYUBHAQXs9nL1hsCCASAnerXrbPaQWewZ7YgIGZutTTeOd
# GBMyMDI0MTAyODExNDAzOS4zODZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+vs7RNN3M8bTAAEAAAH6MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExMVoXDTI1MTAyMjE4MzExMVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjQzMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyhZVBM3PZcBfEpAf7fII
# hygwYVVP64USeZbSlRR3pvJebva0LQCDW45yOrtpwIpGyDGX+EbCbHhS5Td4J0Yl
# c83ztLEbbQD7M6kqR0Xj+n82cGse/QnMH0WRZLnwggJdenpQ6UciM4nMYZvdQjyb
# A4qejOe9Y073JlXv3VIbdkQH2JGyT8oB/LsvPL/kAnJ45oQIp7Sx57RPQ/0O6qay
# J2SJrwcjA8auMdAnZKOixFlzoooh7SyycI7BENHTpkVKrRV5YelRvWNTg1pH4EC2
# KO2bxsBN23btMeTvZFieGIr+D8mf1lQQs0Ht/tMOVdah14t7Yk+xl5P4Tw3xfAGg
# Hsvsa6ugrxwmKTTX1kqXH5XCdw3TVeKCax6JV+ygM5i1NroJKwBCW11Pwi0z/ki9
# 0ZeO6XfEE9mCnJm76Qcxi3tnW/Y/3ZumKQ6X/iVIJo7Lk0Z/pATRwAINqwdvzpdt
# X2hOJib4GR8is2bpKks04GurfweWPn9z6jY7GBC+js8pSwGewrffwgAbNKm82ZDF
# vqBGQQVJwIHSXpjkS+G39eyYOG2rcILBIDlzUzMFFJbNh5tDv3GeJ3EKvC4vNSAx
# tGfaG/mQhK43YjevsB72LouU78rxtNhuMXSzaHq5fFiG3zcsYHaa4+w+YmMrhTEz
# D4SAish35BjoXP1P1Ct4Va0CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRjjHKbL5WV
# 6kd06KocQHphK9U/vzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAuFbCorFrvodG
# +ZNJH3Y+Nz5QpUytQVObOyYFrgcGrxq6MUa4yLmxN4xWdL1kygaW5BOZ3xBlPY7V
# puf5b5eaXP7qRq61xeOrX3f64kGiSWoRi9EJawJWCzJfUQRThDL4zxI2pYc1wnPp
# 7Q695bHqwZ02eaOBudh/IfEkGe0Ofj6IS3oyZsJP1yatcm4kBqIH6db1+weM4q46
# NhAfAf070zF6F+IpUHyhtMbQg5+QHfOuyBzrt67CiMJSKcJ3nMVyfNlnv6yvttYz
# LK3wS+0QwJUibLYJMI6FGcSuRxKlq6RjOhK9L3QOjh0VCM11rHM11ZmN0euJbbBC
# VfQEufOLNkG88MFCUNE10SSbM/Og/CbTko0M5wbVvQJ6CqLKjtHSoeoAGPeeX24f
# 5cPYyTcKlbM6LoUdO2P5JSdI5s1JF/On6LiUT50adpRstZajbYEeX/N7RvSbkn0d
# jD3BvT2Of3Wf9gIeaQIHbv1J2O/P5QOPQiVo8+0AKm6M0TKOduihhKxAt/6Yyk17
# Fv3RIdjT6wiL2qRIEsgOJp3fILw4mQRPu3spRfakSoQe5N0e4HWFf8WW2ZL0+c83
# Qzh3VtEPI6Y2e2BO/eWhTYbIbHpqYDfAtAYtaYIde87ZymXG3MO2wUjhL9HvSQzj
# oquq+OoUmvfBUcB2e5L6QCHO6qTO7WowggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA94Z+bUJn+nKwBvII6sg0Ny7aPDaggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ4mkwIhgPMjAyNDEwMjgxMDE0MDFaGA8yMDI0MTAyOTEwMTQwMVowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sniaQIBADAHAgEAAgIa4zAHAgEAAgITSTAK
# AgUA6ssz6QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBDp2k9IO7lePSu
# N2vi99dNhT8Ur9aidO320rDGDIcPcyFVri4JRa6egypOa+QZHboICRCPw0/gWqlr
# vDCRZTwyGk5Y42nI/Ilu2wyxfwKHIFRNzSJmuD5IbQNLMl1wOoWE3WfiBV23XWqi
# qgVMrvudjR2zBKTDWoEDcFPa7iv5CUd7sAQW3tiMdpKLQri7U/CWGo0EhKQQh5XE
# qgC01E+FTTCm/kZmwXTQqMRAMGfm2Z83vJzQFqlNaOUj7KSuuVKsMWeLMNH4sRgs
# 1pvlc78R+eR2b3qHl4HaW2yz+dSUmble365gLjUpgDBcudKw24qBm3gFHJ2uSv/o
# CRYyzAghMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH6+ztE03czxtMAAQAAAfowDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgGLOcE7Uvaii/
# aR9TprrV4GqpkmzOPx2ZOKx2wA36NOUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCB98n8tya8+B2jjU/dpJRIwHwHHpco5ogNStYocbkOeVjCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+vs7RNN3M8bTAAEAAAH6
# MCIEILhY9vnDG3hQBjfXzsPIyEAOxeeRFPicwYS+g7hWGYq3MA0GCSqGSIb3DQEB
# CwUABIICAJyNgV1MaGJBRQvOBRH0bFHU+kKziB6W9eFExx6U5kTK+MiuYSmzAZ9G
# i9qliZmJqzyyk18Ip8bqrX/N+H0q1yOPkPMebFrBnp5LfXhzZsQAssGJ0JyYuA5l
# ClOZokdAmYEG2ObeqRFyUi4OtgrF6bzBM3kphcjqR/3LAfYELD85G8RmcetSxFZK
# VrOaeWSJKwfF3tOPbZNUqBk3e6EiJYvCTlNL1WbnBH+hy5YwEnatXr1XkNADbIcz
# 4CWaskd4MRMW6bAUzbMtR5BQ6tEOtCzQ7Jd8SPyxGJDQrnbr5w6lgHyzY+KMX9Iw
# jWQH+fL1vxos4690IY6maQwefyYnCD4HWJCw5yshOVsdu6+JYaWmUDJfOUTgjTs3
# izYQJ7qdAhpyrZKGpPYwU0CB1ORnuiP5hwLgFha3htohEtJHEpfEp09WHH9qDEZ9
# ySSWezznH48xI7Txe6Gs7BWBhftXKJnAghpzTTYO9hnUwNpmNJM+KRa178esZSgU
# mYZvyIytu5yuX31f93rb1Vd6behQ/DO6788G62dEhG0+B/+H+UidIUVMitbC8+SC
# SmrwulldP3DWCHcTS2N36q1ALhUXToKgCWBamsTmKhBFKU0pPLi6+sv5sy4PlZoa
# e85nBPaIYxZoD+hryMStImBgpSk13rZRt/n7UOPgNayINGAYfhUN
# SIG # End signature block
| 0
|
Add-Identity.ps1
|
param(
[Parameter(Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$true)]
[alias("Name","ComputerName")] $Computer = @($env:computername),
[string] $NTDomain = ($env:UserDomain),
[string[]] $LocalGroups = @("Administrators"),
[string[]] $Identities, # can be domain user or group
[switch] $Output,
[switch] $Add,
[switch] $Remove
)
begin{
$Global:objReport = @()
# list current members in defined group
Function ListMembers ($Group){
$members = $Group.psbase.invoke("Members") | %{$_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)}
return $members
}
}
process{
if (Test-Connection -ComputerName $Computer -Count 1 -Quiet -EA "Stop"){
foreach ($Group in $LocalGroups){
try{
$tmpComputer = [ADSI]("WinNT://" + $Computer + ",computer")
$tmpGroup = $tmpComputer.psbase.children.find($Group)
foreach ($User in $(ListMembers $tmpGroup)){
$objOutput = New-Object PSObject -Property @{
Machinename = [string]$Computer
GroupName = $Group
UserName = $User
Action = "Existing"
}#end object
$Global:objReport+= $objoutput
}
if ($Identities){
foreach ($User in $Identities){
$Action = "none"
If ($Add){
$tmpGroup.Add("WinNT://" + $NTDomain + "/" + $User)
$Action = "Added"
}
If ($Remove){
$tmpGroup.Remove("WinNT://" + $NTDomain + "/" + $User)
$Action = "Removed"
}
$objOutput = New-Object PSObject -Property @{
Machinename = [string]$Computer
GroupName = $Group
UserName = $User
Action = $Action
}#end object
$Global:objReport+= $objoutput
}
}
}
catch{
$continue = $False
$objOutput = New-Object PSObject -Property @{
Machinename = [string]$Computer
GroupName = $Group
UserName = $User
Action = $Error[0].Exception.InnerException.Message.ToString().Trim()
}#end object
$Global:objReport+= $objoutput
}
}
}
}
end{
$Global:objReport
}
| 0
|
82.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-ManagedDevices(){
[cmdletbinding()]
param
(
[switch]$IncludeEAS,
[switch]$ExcludeMDM,
$DeviceName,
$id
)
$graphApiVersion = "beta"
$Resource = "deviceManagement/managedDevices"
try {
$Count_Params = 0
if($IncludeEAS.IsPresent){ $Count_Params++ }
if($ExcludeMDM.IsPresent){ $Count_Params++ }
if($DeviceName.IsPresent){ $Count_Params++ }
if($id.IsPresent){ $Count_Params++ }
if($Count_Params -gt 1){
write-warning "Multiple parameters set, specify a single parameter -IncludeEAS, -ExcludeMDM, -deviceName, -id or no parameter against the function"
Write-Host
break
}
elseif($IncludeEAS){
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
elseif($ExcludeMDM){
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=managementAgent eq 'eas'"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
elseif($id){
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource('$id')"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get)
}
elseif($DeviceName){
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=deviceName eq '$DeviceName'"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=managementAgent eq 'mdm' and managementAgent eq 'easmdm'"
Write-Warning "EAS Devices are excluded by default, please use -IncludeEAS if you want to include those devices"
Write-Host
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Update-ManagedDevices(){
[cmdletbinding()]
param
(
$id,
$ScopeTags
)
$graphApiVersion = "beta"
$Resource = "deviceManagement/managedDevices('$id')"
try {
if($ScopeTags -eq "" -or $ScopeTags -eq $null){
$JSON = @"
{
"roleScopeTagIds": []
}
"@
}
else {
$object = New-Object –TypeName PSObject
$object | Add-Member -MemberType NoteProperty -Name 'roleScopeTagIds' -Value @($ScopeTags)
$JSON = $object | ConvertTo-Json
}
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $JSON -ContentType "application/json"
}
catch {
Write-Host
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$DeviceName = "Intune Device Name"
$IntuneDevice = Get-ManagedDevices -DeviceName "$DeviceName"
if($IntuneDevice){
if(@($IntuneDevice).count -eq 1){
write-host "Are you sure you want to remove all scope tags from '$DeviceName' (Y or N?)" -ForegroundColor Yellow
$Confirm = read-host
if($Confirm -eq "y" -or $Confirm -eq "Y"){
$DeviceID = $IntuneDevice.id
$DeviceName = $IntuneDevice.deviceName
write-host "Managed Device" $IntuneDevice.deviceName "found..." -ForegroundColor Yellow
$Result = Update-ManagedDevices -id $DeviceID -ScopeTags ""
if($Result -eq ""){
Write-Host "Managed Device '$DeviceName' patched with No Scope Tag assigned..." -ForegroundColor Gray
}
}
else {
Write-Host "Removal of all Scope Tags for '$DeviceName' was cancelled..."
}
Write-Host
}
elseif(@($IntuneManagedDevice).count -gt 1){
Write-Host "More than one device found with name '$deviceName'..." -ForegroundColor Red
}
}
else {
Write-Host "No Intune Managed Device found with name '$deviceName'..." -ForegroundColor Red
Write-Host
}
| 0
|
3728.ps1
|
function Test-AlertChangeState
{
$alerts = Get-AzAlert -State "New" -TimeRange 1h
$alert = $alerts[0]
$oldState = $alert.State
$newState = "Closed"
$updatedAlert = Update-AzAlertState -AlertId $alert.Id -State $newState
Assert-AreEqual $newState $updatedAlert.State
$alert = Update-AzAlertState -AlertId $alert.Id -State $oldState
}
function Test-AlertsSummary
{
$summary = Measure-AzAlertStatistic -GroupBy "severity,alertstate"
Assert-AreEqual "severity" $summary.GroupBy
Assert-NotNull $summary.TotalAlerts
ForEach ($item in $summary.AggregatedCounts.Content){
Assert-AreEqual "alertState" $item.GroupedBy
Assert-NotNull $item.Count
}
}
function Test-GetAlertsFilteredByParameters
{
$severityFilter = "Sev3"
$monitorServiceFilter = "Platform"
$alerts = Get-AzAlert -Severity $severityFilter -MonitorService $monitorServiceFilter
ForEach ($alert in $alerts){
Assert-AreEqual $severityFilter $alert.Severity
Assert-AreEqual $monitorServiceFilter $alert.MonitorService
}
}
| 0
|
2119.ps1
|
Describe 'Basic debugger tests' -tag 'CI' {
BeforeAll {
Register-DebuggerHandler
}
AfterAll {
Unregister-DebuggerHandler
}
Context 'The value of $? should be preserved when exiting the debugger' {
BeforeAll {
$testScript = {
function Test-DollarQuestionMark {
[CmdletBinding()]
param()
Get-Process -id ([int]::MaxValue)
if (-not $?) {
'The value of $? was preserved during debugging.'
} else {
'The value of $? was changed to $true during debugging.'
}
}
$global:DollarQuestionMarkResults = Test-DollarQuestionMark -ErrorAction Break
}
$global:results = @(Test-Debugger -ScriptBlock $testScript -CommandQueue '$?')
}
AfterAll {
Remove-Variable -Name DollarQuestionMarkResults -Scope Global -ErrorAction Ignore
}
It 'Should show 2 debugger commands were invoked' {
$results.Count | Should -Be 2
}
It 'Should have $false output from the first $? command' {
$results[0].Output | Should -BeOfType bool
$results[0].Output | Should -Not -BeTrue
}
It 'Should have string output showing that $? was preserved as $false by the debugger' {
$global:DollarQuestionMarkResults | Should -BeOfType string
$global:DollarQuestionMarkResults | Should -BeExactly 'The value of $? was preserved during debugging.'
}
}
}
Describe "Breakpoints when set should be hit" -tag "CI" {
Context "Basic tests" {
BeforeAll {
$script = @'
'aaa'.ToString() > $null
'aa' > $null
"a" 2> $null | ForEach-Object { $_ }
'bb' > $null
'bb'.ToSTring() > $null
'bbb'
'@
$path = Setup -PassThru -File BasicTest.ps1 -Content $script
$bps = 1..6 | ForEach-Object { set-psbreakpoint -script $path -line $_ -Action { continue } }
}
AfterAll {
$bps | Remove-PSBreakPoint
}
It "A redirected breakpoint is hit" {
& $path
foreach ( $bp in $bps ) {
$bp.HitCount | Should -Be 1
}
}
}
Context "Break point on switch condition should be hit only when enumerating it" {
BeforeAll {
$script = @'
$test = 1..2
switch ($test)
{
default {}
}
'@
$path = Setup -PassThru -File SwitchScript.ps1 -Content $script
$breakpoint = Set-PSBreakpoint -Script $path -Line 2 -Action { continue }
}
AfterAll {
Remove-PSBreakpoint -Breakpoint $breakpoint
}
It "switch condition should be hit 3 times" {
$null = & $path
$breakpoint.HitCount | Should -Be 3
}
}
Context "Break point on for-statement initializer should be hit" {
BeforeAll {
$for_script_1 = @'
$test = 2
for ("string".Length;
$test -gt 0; $test--) { }
'@
$for_script_2 = @'
$test = $PSCommandPath
for (Test-Path $test;
$test -eq "blah";) { }
'@
$for_script_3 = @'
for ($test = 2;
$test -gt 0; $test--) { }
'@
$for_script_4 = @'
$test = 2
for (;$test -gt 0;
$test--) { }
'@
$for_script_5 = @'
$test = $PSCommandPath
for (;Test-Path $test;)
{
$test = "blah"
}
'@
$ForScript_1 = Setup -PassThru -File ForScript_1.ps1 -Content $for_script_1
$bp_1 = Set-PSBreakpoint -Script $ForScript_1 -Line 2 -Action { continue }
$ForScript_2 = Setup -PassThru -File ForScript_2.ps1 -Content $for_script_2
$bp_2 = Set-PSBreakpoint -Script $ForScript_2 -Line 2 -Action { continue }
$ForScript_3 = Setup -PassThru -File ForScript_3.ps1 -Content $for_script_3
$bp_3 = Set-PSBreakpoint -Script $ForScript_3 -Line 1 -Action { continue }
$ForScript_4 = Setup -PassThru -File ForScript_4.ps1 -Content $for_script_4
$bp_4 = Set-PSBreakpoint -Script $ForScript_4 -Line 2 -Action { continue }
$ForScript_5 = Setup -PassThru -File ForScript_5.ps1 -Content $for_script_5
$bp_5 = Set-PSBreakpoint -Script $ForScript_5 -Line 2 -Action { continue }
$testCases = @(
@{ Name = "expression initializer should be hit once"; Path = $ForScript_1; Breakpoint = $bp_1; HitCount = 1 }
@{ Name = "pipeline initializer should be hit once"; Path = $ForScript_2; Breakpoint = $bp_2; HitCount = 1 }
@{ Name = "assignment initializer should be hit 3 times"; Path = $ForScript_3; Breakpoint = $bp_3; HitCount = 1 }
@{ Name = "pipeline condition should be hit 3 times"; Path = $ForScript_4; Breakpoint = $bp_4; HitCount = 3 }
@{ Name = "pipeline condition should be hit 2 times"; Path = $ForScript_5; Breakpoint = $bp_5; HitCount = 2 }
)
}
AfterAll {
Get-PSBreakpoint -Script $ForScript_1, $ForScript_2, $ForScript_3, $ForScript_4, $ForScript_5 | Remove-PSBreakpoint
}
It "for-statement <Name>" -TestCases $testCases {
param($Path, $Breakpoint, $HitCount)
$null = & $Path
$Breakpoint.HitCount | Should -Be $HitCount
}
}
Context "Break point on while loop condition should be hit" {
BeforeAll {
$while_script_1 = @'
$test = "string"
while ($test.Contains("str"))
{
$test = "blah"
}
'@
$while_script_2 = @'
$test = $PSCommandPath
while (Test-Path $test)
{
$test = "blah"
}
'@
$WhileScript_1 = Setup -PassThru -File WhileScript_1.ps1 -Content $while_script_1
$bp_1 = Set-PSBreakpoint -Script $WhileScript_1 -Line 2 -Action { continue }
$WhileScript_2 = Setup -PassThru -File WhileScript_2.ps1 -Content $while_script_2
$bp_2 = Set-PSBreakpoint -Script $WhileScript_2 -Line 2 -Action { continue }
$testCases = @(
@{ Name = "expression condition should be hit 2 times"; Path = $WhileScript_1; Breakpoint = $bp_1; HitCount = 2 }
@{ Name = "pipeline condition should be hit 2 times"; Path = $WhileScript_2; Breakpoint = $bp_2; HitCount = 2 }
)
}
AfterAll {
Get-PSBreakpoint -Script $WhileScript_1, $WhileScript_2 | Remove-PSBreakpoint
}
It "while loop <Name>" -TestCases $testCases {
param($Path, $Breakpoint, $HitCount)
$null = & $Path
$Breakpoint.HitCount | Should -Be $HitCount
}
}
Context "Break point on do-while loop condition should be hit" {
BeforeAll {
$do_while_script_1 = @'
$test = "blah"
do { echo $test }
while ($test.Contains("str"))
'@
$do_while_script_2 = @'
$test = "blah"
do { echo $test }
while (Test-Path $test)
'@
$DoWhileScript_1 = Setup -PassThru -File DoWhileScript_1.ps1 -Content $do_while_script_1
$bp_1 = Set-PSBreakpoint -Script $DoWhileScript_1 -Line 2 -Action { continue }
$DoWhileScript_2 = Setup -PassThru -File DoWhileScript_2.ps1 -Content $do_while_script_2
$bp_2 = Set-PSBreakpoint -Script $DoWhileScript_2 -Line 2 -Action { continue }
$testCases = @(
@{ Name = "expression condition should be hit 2 times"; Path = $DoWhileScript_1; Breakpoint = $bp_1; HitCount = 1 }
@{ Name = "pipeline condition should be hit 2 times"; Path = $DoWhileScript_2; Breakpoint = $bp_2; HitCount = 1 }
)
}
AfterAll {
Get-PSBreakpoint -Script $DoWhileScript_1, $DoWhileScript_2 | Remove-PSBreakpoint
}
It "Do-While loop <Name>" -TestCases $testCases {
param($Path, $Breakpoint, $HitCount)
$null = & $Path
$Breakpoint.HitCount | Should -Be $HitCount
}
}
Context "Break point on do-until loop condition should be hit" {
BeforeAll {
$do_until_script_1 = @'
$test = "blah"
do { echo $test }
until ($test.Contains("bl"))
'@
$do_until_script_2 = @'
$test = $PSCommandPath
do { echo $test }
until (Test-Path $test)
'@
$DoUntilScript_1 = Setup -PassThru -File DoUntilScript_1.ps1 -Content $do_until_script_1
$bp_1 = Set-PSBreakpoint -Script $DoUntilScript_1 -Line 2 -Action { continue }
$DoUntilScript_2 = Setup -PassThru -File DoUntilScript_2.ps1 -Content $do_until_script_2
$bp_2 = Set-PSBreakpoint -Script $DoUntilScript_2 -Line 2 -Action { continue }
$testCases = @(
@{ Name = "expression condition should be hit 2 times"; Path = $DoUntilScript_1; Breakpoint = $bp_1; HitCount = 1 }
@{ Name = "pipeline condition should be hit 2 times"; Path = $DoUntilScript_2; Breakpoint = $bp_2; HitCount = 1 }
)
}
AfterAll {
Get-PSBreakpoint -Script $DoUntilScript_1, $DoUntilScript_2 | Remove-PSBreakpoint
}
It "Do-Until loop <Name>" -TestCases $testCases {
param($Path, $Breakpoint, $HitCount)
$null = & $Path
$Breakpoint.HitCount | Should -Be $HitCount
}
}
Context "Break point on if condition should be hit" {
BeforeAll {
$if_script_1 = @'
if ("string".Contains('str'))
{ }
'@
$if_script_2 = @'
if (Test-Path $PSCommandPath)
{ }
'@
$if_script_3 = @'
if ($false) {}
elseif ("string".Contains('str'))
{ }
'@
$if_script_4 = @'
if ($false) {}
elseif (Test-Path $PSCommandPath)
{ }
'@
$IfScript_1 = Setup -PassThru -File IfScript_1.ps1 -Content $if_script_1
$bp_1 = Set-PSBreakpoint -Script $IfScript_1 -Line 1 -Action { continue }
$IfScript_2 = Setup -PassThru -File IfScript_2.ps1 -Content $if_script_2
$bp_2 = Set-PSBreakpoint -Script $IfScript_2 -Line 1 -Action { continue }
$IfScript_3 = Setup -PassThru -File IfScript_3.ps1 -Content $if_script_3
$bp_3 = Set-PSBreakpoint -Script $IfScript_3 -Line 2 -Action { continue }
$IfScript_4 = Setup -PassThru -File IfScript_4.ps1 -Content $if_script_4
$bp_4 = Set-PSBreakpoint -Script $IfScript_4 -Line 2 -Action { continue }
$testCases = @(
@{ Name = "expression if-condition should be hit once"; Path = $IfScript_1; Breakpoint = $bp_1; HitCount = 1 }
@{ Name = "pipeline if-condition should be hit once"; Path = $IfScript_2; Breakpoint = $bp_2; HitCount = 1 }
@{ Name = "expression elseif-condition should be hit once"; Path = $IfScript_3; Breakpoint = $bp_3; HitCount = 1 }
@{ Name = "pipeline elseif-condition should be hit once"; Path = $IfScript_4; Breakpoint = $bp_4; HitCount = 1 }
)
}
AfterAll {
Get-PSBreakpoint -Script $IfScript_1, $IfScript_2, $IfScript_3, $IfScript_4 | Remove-PSBreakpoint
}
It "If statement <Name>" -TestCases $testCases {
param($Path, $Breakpoint, $HitCount)
$null = & $Path
$Breakpoint.HitCount | Should -Be $HitCount
}
}
}
Describe "It should be possible to reset runspace debugging" -tag "Feature" {
BeforeAll {
$script = @'
"line 1"
"line 2"
"line 3"
'@
$scriptPath = Setup -PassThru -File TestScript.ps1 -Content $script
$iss = [initialsessionstate]::CreateDefault2();
$rs = [runspacefactory]::CreateRunspace($iss)
$rs.Name = "TestRunspaceDebuggerReset"
$rs.Open()
$rs | Enable-RunspaceDebug
$debuggerBeforeReset = $rs.Debugger
$ps = [powershell]::Create()
$ps.Runspace = $rs
$result = $ps.AddScript("Set-PSBreakpoint -Script '$scriptPath' -line 1").Invoke()
$ps.Commands.Clear()
$result = $ps.AddScript("Set-PSBreakpoint -Script '$scriptPath' -line 3").Invoke()
$ps.Commands.Clear()
$breakpoints = $ps.AddScript("Get-PSBreakpoint").Invoke()
$ar = $ps.AddScript("$scriptPath").BeginInvoke()
$completed = Wait-UntilTrue { $rs.Debugger.InBreakPoint -eq $true } -timeout 10000 -interval 200
$ps.Stop()
$rs.ResetRunspaceState()
}
AfterAll {
if ( $null -ne $ps ) { $ps.Dispose() }
if ( $null -ne $ss ) { $rs.Dispose() }
}
It "2 breakpoints should have been set" {
$breakpoints.Count | Should -Be 2
}
It "The breakpoint Should have been hit" {
$completed | Should -BeTrue
}
It "The reset debugger should not be in a breakpoint" {
$rs.Debugger.InBreakPoint | Should -BeFalse
}
It "The reset debugger should not be active" {
$rs.Debugger.IsActive | Should -BeFalse
}
It "The reset debugger mode should be set to 'Default'" {
$rs.Debugger.DebugMode | Should -Be "Default"
}
It "The debugger should be the same before and after the reset" {
$rs.Debugger | Should -Be $debuggerBeforeReset
}
It "The breakpoints should be gone after reset" {
$ps.Commands.clear()
$ps.AddCommand("Get-PSBreakpoint").Invoke() | Should -BeNullOrEmpty
}
It "The script should run without a break" {
$ps.Commands.Clear()
$ps.addscript($scriptPath).Invoke().Count | Should -Be 3
}
}
| 0
|
635.ps1
|
param(
[string]$Version,
[string]$Path,
[switch]$Force,
$Update,
[switch]$Uninstall
)
$Configs = @{
Url = "http://cdn02.foxitsoftware.com/pub/foxit/reader/desktop/win/7.x/7.0/en_us/FoxitReader703.0916_prom_enu_Setup.exe"
Path = "$(Split-Path -Path $MyInvocation.MyCommand.Definition -Parent)\"
}
$Configs | ForEach-Object{
try{
$_.Result = $null
if(-not $_.Path){$_.Path = $Path}
$Config = $_
if(-not $Uninstall){
if($_.ConditionExclusion){
$_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue)
}
if(($_.ConditionExclusionResult -eq $null) -or $Force){
$_.Downloads = $_.Url | ForEach-Object{
Get-File -Url $_ -Path $Config.Path
}
$_.Downloads | ForEach-Object{
Start-Process -FilePath $(Join-Path $_.Path $_.Filename) -ArgumentList "/VERYSILENT /NORESTART" -Wait
}
$_.Downloads | ForEach-Object{
Remove-Item (Join-Path $_.Path $_.Filename) -Force
}
if($Update){
$_.Result = "AppUpdated";$_
}elseif($Downgrade){
$_.Result = "AppDowngraded";$_
}else{
$_.Result = "AppInstalled";$_
}
}else{
$_.Result = "ConditionExclusion";$_
}
}else{
$Executable = "C:\Program Files (x86)\Foxit Software\Foxit Reader\unins000.exe"; if(Test-Path $Executable){Start-Process -FilePath $Executable -ArgumentList "/VERYSILENT /NORESTART" -Wait}
$_.Result = "AppUninstalled";$_
}
}catch{
$Config.Result = "Error";$Config
}
}
| 0
|
1765.ps1
|
Import-Module HelpersSecurity
$defaultParamValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:Skip"] = !$IsWindows
try
{
Describe "Export-ModuleMember should not work across language boundaries" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$script = @'
function IEXInjectableFunction
{
param ([string] $path)
Invoke-Expression -Command "dir $path"
}
function PrivateAddTypeAndRun
{
param ([string] $source)
$type = Add-Type -TypeDefinition $source -passthru
$type::new()
}
Export-ModuleMember -Function IEXInjectableFunction
'@
$modulePathName = "modulePath_$(Get-Random -Max 9999)"
$modulePath = Join-Path $testdrive $modulePathName
New-Item -ItemType Directory $modulePath
$trustedModuleFile = Join-Path $modulePath "T1TestModule_System32.psm1"
$script | Out-File -FilePath $trustedModuleFile
}
AfterAll {
Remove-Module -Name T1TestModule_System32 -Force -ErrorAction Ignore
}
It "Verifies that IEX running in ConstrainedLanguage cannot export functions from trusted module" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
Import-Module -Name $trustedModuleFile -Force
T1TestModule_System32\IEXInjectableFunction -path 'c:\windows\system32\CodeIntegrity; Export-ModuleMember -Function *'
throw "No Error!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode -RevertLockdownMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "Modules_CannotExportMembersAccrossLanguageBoundaries,Microsoft.PowerShell.Commands.ExportModuleMemberCommand"
$result = Get-Command -Name T1TestModule_System32\PrivateAddTypeAndRun 2> $null
$result | Should -BeNullOrEmpty
}
}
Describe "Dot-source operator is not allowed in modules on locked down systems that export functions with wildcards" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$TestModulePath = Join-Path $TestDrive "Modules_$(Get-Random -Maximum 99999)"
New-Item -Path $TestModulePath -ItemType Directory -Force -ErrorAction SilentlyContinue
$scriptModuleNameA = "ModuleDotSourceWildcard_System32"
$moduleFilePathA = Join-Path $TestModulePath ($scriptModuleNameA + ".psm1")
$dotSourceNameA = "DotSourceFileNoWildCard_System32"
$dotSourceFilePathA = Join-Path $TestModulePath ($dotSourceNameA + ".ps1")
@'
function PublicDSFnA { "PublicDSFnA"; PrivateDSFnA }
function PrivateDSFnA { "PrivateDSFnA" }
'@ | Out-File -FilePath $dotSourceFilePathA
@'
. {0}
function PublicFnA {{ "PublicFnA"; PublicDSFnA }}
function PrivateFnA {{ "PrivateFnA"; PrivateDSFnA }}
Export-ModuleMember -Function "*"
'@ -f $dotSourceFilePathA | Out-File -FilePath $moduleFilePathA
$scriptModuleNameB = "ModuleDotSourceNoExport_System32"
$moduleFilePathB = Join-Path $TestModulePath ($scriptModuleNameB + ".psm1")
$dotSourceNameB = "DotSourceFileWildCard_System32"
$dotSourceFilePathB = Join-Path $TestModulePath ($dotSourceNameB + ".ps1")
@'
function PublicDSFnB { "PublicDSFnB"; PrivateDSFnB }
function PrivateDSFnB { "PrivateDSFnB" }
Export-ModuleMember -Function "*"
'@ | Out-File -FilePath $dotSourceFilePathB
@'
. {0}
function PublicFnB {{ "PublicFnB"; PrivateFnB }}
function PrivateFnB {{ "PrivateFnB" }}
'@ -f $dotSourceFilePathB | Out-File -FilePath $moduleFilePathB
$scriptModuleNameC = "ModuleDotSourceWildCardM_System32"
$moduleFilePathC = Join-Path $TestModulePath ($scriptModuleNameC + ".psm1")
$dotSourceNameC = "DotSourceFileNoWildCardM_System32"
$dotSourceFilePathC = Join-Path $TestModulePath ($dotSourceNameC + ".ps1")
$manifestFilePathC = Join-Path $TestModulePath ($scriptModuleNameC + ".psd1")
@'
function PublicDSFnC { "PublicDSFnC"; PrivateDSFnC }
function PrivateDSFnC { "PrivateDSFnC" }
'@ | Out-File -FilePath $dotSourceFilePathC
@'
. {0}
function PublicFnC {{ "PublicFnC"; PublicDSFnC }}
function PrivateFnC {{ "PrivateFnC"; PrivateDSFnC }}
Export-ModuleMember -Function "*"
'@ -f $dotSourceFilePathC | Out-File -FilePath $moduleFilePathC
'@{{ ModuleVersion = "1.0"; RootModule = "{0}"; FunctionsToExport = @("PublicFnC","PublicDSFnC") }}' -f $moduleFilePathC | Out-File -FilePath $manifestFilePathC
$scriptModuleNameD = "ModuleDotSourceNoWildcard_System32"
$moduleFilePathD = Join-Path $TestModulePath ($scriptModuleNameD + ".psm1")
$dotSourceNameD = "DotSourceFileNoWildCardD_System32"
$dotSourceFilePathD = Join-Path $TestModulePath ($dotSourceNameD + ".ps1")
@'
function PublicDSFnD { "PublicDSFnD"; PrivateDSFnD }
function PrivateDSFnD { "PrivateDSFnD" }
'@ | Out-File -FilePath $dotSourceFilePathD
@'
. {0}
function PublicFnD {{ "PublicFnD"; PublicDSFnD }}
function PrivateFnD {{ "PrivateFnD"; PrivateDSFnD }}
Export-ModuleMember -Function "PublicFnD","PublicDSFnD"
'@ -f $dotSourceFilePathD | Out-File -FilePath $moduleFilePathD
$scriptModuleNameE = "ModuleDotSourceNoExportE_System32"
$moduleFilePathE = Join-Path $TestModulePath ($scriptModuleNameE + ".psm1")
$dotSourceNameE = "DotSourceFileNoExportE_System32"
$dotSourceFilePathE = Join-Path $TestModulePath ($dotSourceNameE + ".ps1")
@'
function PublicDSFnE { "PublicDSFnE"; PrivateDSFnE }
function PrivateDSFnE { "PrivateDSFnE" }
'@ | Out-File -FilePath $dotSourceFilePathE
@'
. {0}
function PublicFnE {{ "PublicFnE"; PublicDSFnE }}
function PrivateFnE {{ "PrivateFnE"; PrivateDSFnE }}
'@ -f $dotSourceFilePathE | Out-File -FilePath $moduleFilePathE
$scriptModuleNameF = "ModuleDotSourceNestedExport_System32"
$moduleFilePathF = Join-Path $TestModulePath ($scriptModuleNameF + ".psm1")
$manifestFilePathF = Join-Path $TestModulePath ($scriptModuleNameF + ".psd1")
$nestedSourceNameF = "NestedSourceWithExport_System32"
$nestedSourceFilePathF = Join-Path $TestModulePath ($nestedSourceNameF + ".psm1")
@'
. {0}
function NestedPubFnF {{ "NestedPubFnF"; PublicDSFnE }}
Export-ModuleMember -Function *
'@ -f $dotSourceFilePathE | Out-File -FilePath $nestedSourceFilePathF
@'
function PublicFnF { "PublicFnF"; NestedPubFnF }
'@ | Out-File -FilePath $moduleFilePathF
'@{{ ModuleVersion = "1.0"; RootModule = "{0}"; NestedModules = "{1}"; FunctionsToExport = "PublicFnF","NestedPubFnF" }}' -f $moduleFilePathF,$nestedSourceFilePathF | Out-File -FilePath $manifestFilePathF
$scriptModuleNameG = "ModuleDotSourceImportExport_System32"
$moduleFilePathG = Join-Path $TestModulePath ($scriptModuleNameG + ".psm1")
$importModNameG = "ImportModWitExport_System32"
$importModFilePathG = Join-Path $TestModulePath ($importModNameG + ".psm1")
@'
. {0}
function ImportPubFnG {{ "ImportPubFnG"; PublicDSFnE }}
Export-ModuleMember -Function *
'@ -f $dotSourceFilePathE | Out-File $importModFilePathG
@'
Import-Module {0}
function PublicFnG {{ "PublicFnG"; ImportPubFnG }}
Export-ModuleMember -Function PublicFnG
'@ -f $importModFilePathG | Out-File -FilePath $moduleFilePathG
$scriptModuleNameH = "ModuleDotSourceImportExportH_System32"
$moduleFilePathH = Join-Path $TestModulePath ($scriptModuleNameH + ".psm1")
@'
. {0}
function PublicFnH {{ "PublicFnH"; PrivateFnH }}
function PrivateFnH {{ "PrivateFnH" }}
Export-ModuleMember -Function *
Export-ModuleMember -Function PublicFnH
'@ -f $dotSourceFilePathE | Out-File $moduleFilePathH
$scriptModuleNameI = "ModuleDotSourceClassesOnly_System32"
$moduleFilePathI = Join-Path $TestModulePath ($scriptModuleNameI + ".psm1")
@'
class Class1 {{ static [string] GetMessage() {{ . {0}; return "Message" }} }}
'@ -f $dotSourceFilePathE | Out-File $moduleFilePathI
$scriptManifestNameI = "ManifestDotSourceClassesOnly_System32"
$moduleManifestPathI = Join-Path $TestModulePath ($scriptManifestNameI + ".psd1")
"@{ ModuleVersion='1.0'; RootModule='$moduleFilePathI' }" | Out-File $moduleManifestPathI
$sriptModuleNameJ = "ModuleWithUsing_System32"
$moduleFilePathJ = Join-Path $TestModulePath ($sriptModuleNameJ + ".psm1")
@'
using module {0}
function PublicUsingFn {{ [Class1]::GetMessage() }}
Export-ModuleMember -Function PublicUsingFn
'@ -f $moduleManifestPathI | Out-File $moduleFilePathJ
Write-Verbose "Test module files created"
}
It "Verifies that importing trusted module in system lockdown which dot sources a ps1 file while exporting all functions with wildcard throws expected error" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Import-Module -Name $moduleFilePathA -Force 2> $null
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "Modules_SystemLockDown_CannotUseDotSourceWithWildCardFunctionExport,Microsoft.PowerShell.Commands.ImportModuleCommand"
}
It "Verifies that importing trusted module in system lockdown which dot sources a ps1 file that exports functions with wildcard throws expected error" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Import-Module -Name $moduleFilePathB -Force 2> $null
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "Modules_SystemLockDown_CannotUseDotSourceWithWildCardFunctionExport,Microsoft.PowerShell.Commands.ImportModuleCommand"
}
It "Verifies that importing trusted module in system lockdown which dot sources a ps1 file while exporting functions with wildcard but has overriding manifest export does not throw error" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$module = Import-Module -Name $manifestFilePathC -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 2
$module.ExportedCommands["PublicFnC"] | Should -Not -BeNullOrEmpty
$module.ExportedCommands["PublicDSFnC"] | Should -Not -BeNullOrEmpty
}
It "Verifies that importing trusted module in system lockdown which dot sources ps1 file but does not export functions with wildcard does not throw error" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$module = Import-Module -Name $moduleFilePathD -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 2
$module.ExportedCommands["PublicFnD"] | Should -Not -BeNullOrEmpty
$module.ExportedCommands["PublicDSFnD"] | Should -Not -BeNullOrEmpty
}
It "Verifies that importing trusted module with dotsource and wildcard function export works when not in lock down mode" {
$module = Import-Module -Name $moduleFilePathA -Force -PassThru
$module.ExportedCommands.Count | Should -Be 4
$module.ExportedCommands["PublicFnA"] | Should -Not -BeNullOrEmpty
$module.ExportedCommands["PrivateFnA"] | Should -Not -BeNullOrEmpty
$module.ExportedCommands["PublicDSFnA"] | Should -Not -BeNullOrEmpty
$module.ExportedCommands["PrivateDSFnA"] | Should -Not -BeNullOrEmpty
}
It "Verifies that importing trusted module with dotsource and no function export works without error in lockdown mode" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$module = Import-Module -Name $moduleFilePathE -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 0
}
It "Verifies that dot source manifest and module with nested module works as expected in system lock down" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$module = Import-Module -Name $manifestFilePathF -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 2
$module.ExportedCommands["PublicFnF"] | Should -Not -BeNullOrEmpty
$module.ExportedCommands["NestedPubFnF"] | Should -Not -BeNullOrEmpty
}
It "Verifies that an imported module that dot sources and exports via wilcard is detected and disallowed" {
try
{
$expectedError = $null
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$module = Import-Module -Name $moduleFilePathG -Force -PassThru -ErrorVariable expectedError 2> $null
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError[0].FullyQualifiedErrorId | Should -BeExactly "Modules_SystemLockDown_CannotUseDotSourceWithWildCardFunctionExport,Microsoft.PowerShell.Commands.ImportModuleCommand"
}
It "Verifies that a module with dot source file and multiple Export-ModuleMember calls still errors with wildcard" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$module = Import-Module -Name $moduleFilePathH -Force -PassThru 2> $null
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "Modules_SystemLockDown_CannotUseDotSourceWithWildCardFunctionExport,Microsoft.PowerShell.Commands.ImportModuleCommand"
}
It "Verifies that a classes only module with dot-source and with using directive loads successfully" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$module = Import-Module -Name $moduleFilePathJ -Force -PassThru
$result = PublicUsingFn
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module | Should -Not -BeNullOrEmpty
$result | Should -BeExactly "Message"
}
}
Describe "Call operator invocation of trusted module private function" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$scriptModuleName = "ImportTrustedManifestWithCallOperator_System32"
$moduleFileName = Join-Path $TestDrive ($scriptModuleName + ".psm1")
$manifestFileName = Join-Path $TestDrive ($scriptModuleName + ".psd1")
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName'; FunctionsToExport = 'PublicFn' }" > $manifestFileName
}
It "Verifies expected error when call operator attempts to access trusted module scope function" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
& $module PrivateFn
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "CantInvokeCallOperatorAcrossLanguageBoundaries"
}
}
Describe "Tests module table restrictions" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$moduleName = "Modules_" + (Get-RandomFileName)
$modulePath = Join-Path $TestDrive $moduleName
New-Item -ItemType Directory -Path $modulePath
$scriptModuleName = "TrustedParentModule_System32"
$scriptModulePath = Join-Path $modulePath $scriptModuleName
$moduleFileName = Join-Path $scriptModulePath ($scriptModuleName + ".psm1")
$manifestFileName = Join-Path $scriptModulePath ($scriptModuleName + ".psd1")
New-Item -ItemType Directory -Path $scriptModulePath
$scriptModuleImportName = "TrustedImportModule_System32"
$scriptModuleImportPath = Join-Path $modulePath $scriptModuleImportName
$moduleImportFileName = Join-Path $scriptModuleImportPath ($scriptModuleImportName + ".psm1")
New-Item -ItemType Directory -Path $scriptModuleImportPath
@'
Import-Module -Name {0}
function PublicFn
{{
Write-Host ""
Write-Host "PublicFn"
PrivateFn1
}}
'@ -f $scriptModuleImportName > $moduleFileName
@'
function PrivateFn1
{
Write-Host ""
Write-Host "PrivateFn1"
Write-Host "Language mode: $($ExecutionContext.SessionState.LanguageMode)"
}
'@ > $moduleImportFileName
"@{ ModuleVersion = '1.0'; NestedModules = '$moduleFileName'; FunctionsToExport = 'PublicFn' }" > $manifestFileName
$savedPSModulePath = $env:PSModulePath
$env:PSModulePath += (";" + $modulePath)
}
AfterAll {
if ($savedPSModulePath -ne $null) { $env:PSModulePath = $savedPSModulePath }
}
It "Verifies that Get-Command does not expose private module function under system lock down" {
$GetCommandPublicFnCmdInfo = $null
$GetCommandPrivateFnCmdInfo = $null
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
Import-Module -Name $scriptModuleName -Force
$GetCommandPublicFnCmdInfo = Get-Command -Name "PublicFn" 2> $null
$GetCommandPrivateFnCmdInfo = Get-Command -Name "PrivateFn1" 2> $null
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$GetCommandPublicFnCmdInfo | Should -Not -BeNullOrEmpty
$GetCommandPrivateFnCmdInfo | Should -BeNullOrEmpty
}
It "Verifies that Get-Command does not expose private function after explicitly importing nested module file under system lock down" {
$ReImportPublicFnCmdInfo = $null
$ReImportPrivateFnCmdInfo = $null
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
Import-Module -Name $scriptModuleName -Force
Import-Module -Name $scriptModuleImportName
$ReImportPublicFnCmdInfo = Get-Command -Name "PublicFn" 2> $null
$ReImportPrivateFnCmdInfo = Get-Command -Name "PrivateFn1" 2> $null
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$ReImportPublicFnCmdInfo | Should -Not -BeNullOrEmpty
$ReImportPrivateFnCmdInfo | Should -BeNullOrEmpty
}
}
Describe "Import mix of trusted and untrusted manifest and module files" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies that an untrusted manifest with a trusted module will not load under system lockdown" {
$manifestFileName = Join-Path $TestDrive "ImportUnTrustedManifestWithFnExport.psd1"
$moduleFileName = Join-Path $TestDrive "ImportUnTrustedManifestWithFnExport_System32.psm1"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName'; FunctionsToExport = 'PublicFn','PrivateFn' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
Import-Module -Name $manifestFileName -Force -ErrorAction Stop
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "Modules_MismatchedLanguageModes,Microsoft.PowerShell.Commands.ImportModuleCommand"
}
It "Verifies that an untrusted manifest with a trusted binary module does load under system lockdown" {
$modulePath = "$PSScriptRoot\Modules"
New-Item -Path $modulePath -ItemType Directory -Force
$manifestFileName = Join-Path $modulePath "ImportUnTrustedManifestWithBinFnExport.psd1"
$moduleFileName = Join-Path $modulePath "ImportUnTrustedManifestWithBinFnExport_System32.dll"
"@{ ModuleVersion = '1.0'; NestedModules = '$moduleFileName'; CmdletsToExport = 'Invoke-Hello' }" > $manifestFileName
$code = @'
using System;
using System.Management.Automation;
[Cmdlet("Invoke", "Hello")]
public sealed class InvokeHello : PSCmdlet
{
protected override void EndProcessing()
{
System.Console.WriteLine("Hello!");
}
}
'@
try { Add-Type -TypeDefinition $code -OutputAssembly $moduleFileName -ErrorAction Ignore } catch {}
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module | Should -Not -BeNullOrEmpty
$module.ExportedCommands["Invoke-Hello"] | Should -Not -BeNullOrEmpty
if ($module -ne $null) { Remove-Module -Name $module.Name -Force -ErrorAction Ignore }
}
It "Verifies that an untrusted module with nested trusted modules cannot load in a locked down system" {
$manifestFileName = Join-Path $TestDrive "ImportUnTrustedManifestWithTrustedModule.psd1"
$moduleFileName = Join-Path $TestDrive "ImportUnTrustedManifestWithTrustedModule_System32.psm1"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; NestedModules = '$moduleFileName'; FunctionsToExport = 'PublicFn','PrivateFn' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
Import-Module -Name $manifestFileName -Force -ErrorAction Stop
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "Modules_MismatchedLanguageModes,Microsoft.PowerShell.Commands.ImportModuleCommand"
}
It "Verifies that an untrusted manifest containing all trusted modules does not load under system lock down" {
$moduleFileName1 = Join-Path $TestDrive "ImportUnTrustedManifestWithTrustedModules1_System32.psm1"
$moduleFileName2 = Join-Path $TestDrive "ImportUnTrustedManifestWithTrustedModules2_System32.psm1"
$manifestFileName = Join-Path $TestDrive "ImportUnTrustedManifestWithTrustedModules.psd1"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName1
@'
function PublicFn2
{
Write-Output "PublicFn2"
}
'@ > $moduleFileName2
"@{ ModuleVersion = '1.0'; NestedModules = '$moduleFileName1'; RootModule = '$moduleFileName2'; FunctionsToExport = 'PublicFn','PrivateFn' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
Import-Module -Name $manifestFileName -Force -ErrorAction Stop
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "Modules_MismatchedLanguageModes,Microsoft.PowerShell.Commands.ImportModuleCommand"
}
}
Describe "Import trusted module files in system lockdown mode" -Tags 'Feature','RequireAdminOnWindows' {
function CreateModuleNames
{
param (
[string] $moduleName
)
$script:scriptModuleName = $moduleName
$script:moduleFileName = Join-Path $TestDrive ($moduleName + ".psm1")
}
It "Verifes that trusted module file exports no functions in system lockdown" {
CreateModuleNames "ImportTrustedModuleWithNoFnExport_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $moduleFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 0
}
It "Verifies that trusted module file exports only exported function in system lockdown" {
CreateModuleNames "ImportTrustedModuleWithFnExport_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
Export-ModuleMember -Function PublicFn
'@ > $moduleFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $moduleFileName -Force -PassThr
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 1
$module.ExportedCommands.Values[0].Name | Should -BeExactly "PublicFn"
}
It "Verifies that trusted module with wild card function export in system lockdown" {
CreateModuleNames "ImportTrustedModuleWithWildcardFnExport_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
Export-ModuleMember -Function *
'@ > $moduleFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $moduleFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 2
}
}
Describe "Import trusted manifest files in system lockdown mode" -Tags 'Feature','RequireAdminOnWindows' {
function CreateManifestNames
{
param (
[string] $moduleName,
[switch] $twoModules,
[switch] $noExtension,
[switch] $dotSourceModule
)
$script:scriptModuleName = $moduleName
$script:moduleFileName = Join-Path $TestDrive ($moduleName + ".psm1")
$script:manifestFileName = Join-Path $TestDrive ($moduleName + ".psd1")
if ($twoModules)
{
$script:moduleFileName2 = Join-Path $TestDrive ($moduleName + "2.psm1")
}
if ($noExtension)
{
$script:moduleFileNameNoExt = Join-Path $TestDrive $scriptModuleName
}
if ($dotSourceModule)
{
$script:dotmoduleFileName = Join-Path $TestDrive ($moduleName + "Dot" + ".ps1")
}
}
It "Verifies that trusted manifest exports no functions by default in lock down mode" {
CreateManifestNames "ImportTrustedManifestWithNoFnExport_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 0
}
It "Verifies that trusted manifest exports no functions through wildcard in lock down mode" {
CreateManifestNames "ImportTrustedManifestWithWildcardFnExport1_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName'; FunctionsToExport = '*' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 0
}
It "Verifies that trusted manifest exports no functions through name wildcard in lock down mode" {
CreateManifestNames "ImportTrustedManifestWithWildcardNameFnExport_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName'; FunctionsToExport = '*Fn*' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 0
}
It "Verifies that trusted manifest exports a single module function and ignores wildcard in lock down mode" {
CreateManifestNames "ImportTrustedManifestWithWildcardModFnExport_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
Export-ModuleMember -Function "PublicFn"
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName'; FunctionsToExport = '*' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 1
$module.ExportedCommands.Values[0].Name | Should -BeExactly "PublicFn"
}
It "Verifies that trusted manifest exports no functions through the cmdlets export keyword" {
CreateManifestNames "ImportTrustedManifestWithCmdletExport_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName'; CmdletsToExport = '*' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 0
}
It "Verifies that trusted manifest with wildcard exports a single function from two modules" {
CreateManifestNames "ImportTrustedManifestWithTwoMods_System32" -TwoModules
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
Export-ModuleMember -Function PublicFn
'@ > $moduleFileName
@'
function PrivateFn3
{
Write-Output "PublicFn"
}
function PrivateFn4
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName2
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName'; NestedModules = '$moduleFileName2'; FunctionsToExport = '*' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 1
$module.ExportedCommands.Values[0].Name | Should -BeExactly "PublicFn"
}
It "Verifies that trusted manifest explicitly exports a single function" {
CreateManifestNames "ImportTrustedManifestWithExportFn_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName'; FunctionsToExport = 'PublicFn' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 1
$module.ExportedCommands.Values[0].Name | Should -BeExactly "PublicFn"
}
It "Verifies that trusted manifest with nested modules exports explicit function" {
CreateManifestNames "ImportTrustedManifestWithNestedModsAndFnExport_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; NestedModules = '$moduleFileName'; FunctionsToExport = 'PublicFn' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 1
$module.ExportedCommands.Values[0].Name | Should -BeExactly "PublicFn"
}
It "Verifies that trusted manifest with nested modules exports no functions by default" {
CreateManifestNames "ImportTrustedManifestWithNestedModsAndNoFnExport_System32"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; NestedModules = '$moduleFileName' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 0
}
It "Verifies that trusted manifest with nested modules and no extension module exports explicit function" {
CreateManifestNames "ImportTrustedManifestWithNestedModsAndNoExtNoFnExport_System32" -NoExtension
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; NestedModules = '$moduleFileNameNoExt'; FunctionsToExport = 'PublicFn' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 1
$module.ExportedCommands.Values[0].Name | Should -BeExactly "PublicFn"
}
It "Verifies that trusted manifest with dot source module file respects lock down mode" {
CreateManifestNames "ImportTrustedManifestWithDotSourceModAndFnExport_System32" -DotSourceModule
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $dotmoduleFileName
@'
. {0}
function PrivateFn1
{{
Write-Output "PrivateFn1"
}}
function PrivateFn2
{{
Write-Output "PrivateFn2"
}}
'@ -f $dotmoduleFileName > $moduleFileName
"@{ ModuleVersion = '1.0'; NestedModules = '$moduleFileName'; FunctionsToExport = 'PublicFn' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 1
$module.ExportedCommands.Values[0].Name | Should -BeExactly "PublicFn"
}
}
Describe "Untrusted manifest and module files import in lock down mode" -Tags 'Feature','RequireAdminOnWindows' {
function CreateManifestNames
{
param (
[string] $moduleName
)
$script:scriptModuleName = $moduleName
$script:moduleFileName = Join-Path $TestDrive ($moduleName + ".psm1")
$script:manifestFileName = Join-Path $TestDrive ($moduleName + ".psd1")
}
It "Verifies that importing untrusted manifest in lock down mode exports all functions by default" {
CreateManifestNames "ImportUntrustedManifestWithNoFnExport"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 2
}
It "Verifies that importing untrusted manifest in lock down mode exports explicit function" {
CreateManifestNames "ImportUntrustedManifestWithFnExport"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
"@{ ModuleVersion = '1.0'; RootModule = '$moduleFileName'; FunctionsToExport = 'PrivateFn' }" > $manifestFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $manifestFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 1
$module.ExportedCommands.Values[0].Name | Should -BeExactly 'PrivateFn'
}
It "Verifies that importing untrusted module file in lock down mode exports all functions by default" {
CreateManifestNames "ImportUnTrustedModuleWithNoFnExport"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
'@ > $moduleFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $moduleFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 2
}
It "Verifies that importing untrusted module file in lock down mode exports explicit function" {
CreateManifestNames "ImportUnTrustedModuleWithFnExport"
@'
function PublicFn
{
Write-Output "PublicFn"
}
function PrivateFn
{
Write-Output "PrivateFn"
}
Export-ModuleMember -Function PublicFn
'@ > $moduleFileName
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$module = Import-Module -Name $moduleFileName -Force -PassThru
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$module.ExportedCommands.Count | Should -Be 1
$module.ExportedCommands.Values[0].Name | Should -BeExactly 'PublicFn'
}
}
Describe "Export-ModuleMember should succeed in FullLanguage mode with scriptblock created without context" -Tag 'Feature' {
BeforeAll {
$typeDef = @'
using System;
using System.Management.Automation;
using System.Management.Automation.Runspaces;
public class TestScriptBlockCreate
{
private ScriptBlock _scriptBlock;
public ScriptBlock CreateScriptBlock()
{
var thread = new System.Threading.Thread(ThreadProc);
thread.Start(null);
thread.Join();
return _scriptBlock;
}
private void ThreadProc(object state)
{
// Create script block on thread with no PowerShell context
_scriptBlock = ScriptBlock.Create(@"function Do-Nothing {}; Export-ModuleMember -Function Do-Nothing");
}
}
'@
try
{
Add-Type -TypeDefinition $typeDef
}
catch { }
}
It "Verfies that Export-ModuleMember does not throw error with context-less scriptblock" {
$scriptBlockCreator = [TestScriptBlockCreate]::new()
$testScriptBlock = $scriptBlockCreator.CreateScriptBlock()
$testScriptBlock | Should -Not -BeNullOrEmpty
{ New-Module -ScriptBlock $testScriptBlock -ErrorAction Stop } | Should -Not -Throw -Because "Scriptblock without execution context is allowed in Full Language"
}
}
Describe "New-Module should not create module from trusted scriptblock when running in ConstrainedLanguage context" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$script = @'
function ScriptFn { Write-Output $ExecutionContext.SessionState.LanguageMode }
'@
$scriptFileNameT = "NewModuleTrustedScriptBlock_System32"
$scriptFilePathT = Join-Path $TestDrive ($scriptFileNameT + ".ps1")
$script | Out-File -FilePath $scriptFilePathT
$scriptFileNameU = "NewModuleUntrustedScriptBlock"
$scriptFilePathU = Join-Path $TestDrive ($scriptFileNameU + ".ps1")
$script | Out-File -FilePath $scriptFilePathU
}
It "New-Module throws error when creating module with trusted scriptblock in ConstrainedLanguage" {
$expectedError = $null
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$sb = (Get-Command $scriptFilePathT).ScriptBlock
try
{
New-Module -Name TrustedScriptFoo -ScriptBlock $sb
throw "No Exception!"
}
catch
{
$expectedError = $_
}
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "Modules_CannotCreateModuleWithFullLanguageScriptBlock,Microsoft.PowerShell.Commands.NewModuleCommand"
}
It "New-Module succeeds in creating module with untrusted scriptblock in ConstrainedLanguage" {
$result = $null
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$sb = (Get-Command $scriptFilePathU).ScriptBlock
$m = New-Module -Name UntrustedScriptFoo -ScriptBlock $sb
Import-Module -ModuleInfo $m -Force
$result = ScriptFn
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$result | Should -BeExactly "ConstrainedLanguage"
}
}
}
finally
{
if ($defaultParamValues -ne $null)
{
$Global:PSDefaultParameterValues = $defaultParamValues
}
}
| 0
|
61.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Add-MDMApplication(){
[cmdletbinding()]
param
(
$JSON
)
$graphApiVersion = "Beta"
$App_resource = "deviceAppManagement/mobileApps"
try {
if(!$JSON){
write-host "No JSON was passed to the function, provide a JSON variable" -f Red
break
}
Test-JSON -JSON $JSON
$uri = "https://graph.microsoft.com/$graphApiVersion/$($App_resource)"
Invoke-RestMethod -Uri $uri -Method Post -ContentType "application/json" -Body $JSON -Headers $authToken
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Test-JSON(){
param (
$JSON
)
try {
$TestJSON = ConvertFrom-Json $JSON -ErrorAction Stop
$validJson = $true
}
catch {
$validJson = $false
$_.Exception
}
if (!$validJson){
Write-Host "Provided JSON isn't in valid JSON format" -f Red
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$JSON = @"
{
"@odata.type": "
"description": "MacOS Office 365",
"developer": "Microsoft",
"displayName": "MacOS Office 365",
"informationUrl": "",
"isFeatured": false,
"largeIcon": {
"type": "image/png",
"value": "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"
},
"notes": "",
"owner": "Microsoft",
"privacyInformationUrl": "",
"publisher": "Microsoft"
}
"@
write-host "Publishing" ($JSON | ConvertFrom-Json).displayName -ForegroundColor Yellow
$Create_Application = Add-MDMApplication -JSON $JSON
$Create_Application
Write-Host "Application created as $($Create_Application.displayName)/$($create_Application.id)" -ForegroundColor Cyan
Write-Host
| 0
|
394.ps1
|
param (
$TestGeneral = $true,
$TestFunctions = $true,
[ValidateSet('None', 'Default', 'Passed', 'Failed', 'Pending', 'Skipped', 'Inconclusive', 'Describe', 'Context', 'Summary', 'Header', 'Fails', 'All')]
$Show = "None",
$Include = "*",
$Exclude = ""
)
Write-Host "Starting Tests"
Write-Host "Importing Module"
Remove-Module PSFramework -ErrorAction Ignore
Import-Module "$PSScriptRoot\..\PSFramework.psd1"
Import-Module "$PSScriptRoot\..\PSFramework.psm1" -Force
Write-PSFMessage -Level Important -Message "Creating test result folder"
$null = New-Item -Path "$PSScriptRoot\..\.." -Name TestResults -ItemType Directory -Force
$totalFailed = 0
$totalRun = 0
$testresults = @()
foreach ($file in (Get-ChildItem "$PSScriptRoot\extensions" -Filter "*.ps1"))
{
. $file.FullName
}
if ($TestGeneral)
{
Write-PSFMessage -Level Important -Message "Modules imported, proceeding with general tests"
foreach ($file in (Get-ChildItem "$PSScriptRoot\general" -Filter "*.Tests.ps1"))
{
Write-PSFMessage -Level Significant -Message " Executing <c='em'>$($file.Name)</c>"
$TestOuputFile = Join-Path "$PSScriptRoot\..\..\TestResults" "TEST-$($file.BaseName).xml"
$results = Invoke-Pester -Script $file.FullName -Show $Show -PassThru -OutputFile $TestOuputFile -OutputFormat NUnitXml
foreach ($result in $results)
{
$totalRun += $result.TotalCount
$totalFailed += $result.FailedCount
$result.TestResult | Where-Object { -not $_.Passed } | ForEach-Object {
$name = $_.Name
$testresults += [pscustomobject]@{
Describe = $_.Describe
Context = $_.Context
Name = "It $name"
Result = $_.Result
Message = $_.FailureMessage
}
}
}
}
}
if ($TestFunctions)
{
Write-PSFMessage -Level Important -Message "Proceeding with individual tests"
foreach ($folder in (Get-ChildItem "$PSScriptRoot\functions"))
{
if (-not $folder.PSIsContainer) { continue }
Write-PSFMessage -Level Significant -Message " Processing Component: <c='sub'>$($folder.Name)</c>"
foreach ($file in (Get-ChildItem $folder.FullName -Recurse -File -Filter "*Tests.ps1"))
{
if ($file.Name -notlike $Include) { continue }
if ($file.Name -like $Exclude) { continue }
Write-PSFMessage -Level Significant -Message " Executing <c='em'>$($file.Name)</c>"
$TestOuputFile = Join-Path "$PSScriptRoot\..\..\TestResults" "TEST-$($file.BaseName).xml"
$results = Invoke-Pester -Script $file.FullName -Show $Show -PassThru -OutputFile $TestOuputFile -OutputFormat NUnitXml
foreach ($result in $results)
{
$totalRun += $result.TotalCount
$totalFailed += $result.FailedCount
$result.TestResult | Where-Object { -not $_.Passed } | ForEach-Object {
$name = $_.Name
$testresults += [pscustomobject]@{
Describe = $_.Describe
Context = $_.Context
Name = "It $name"
Result = $_.Result
Message = $_.FailureMessage
}
}
}
}
}
}
$testresults | Sort-Object Describe, Context, Name, Result, Message | Format-List
if ($totalFailed -eq 0) { Write-PSFMessage -Level Critical -Message "All <c='em'>$totalRun</c> tests executed without a single failure!" }
else { Write-PSFMessage -Level Critical -Message "<c='em'>$totalFailed tests</c> out of <c='sub'>$totalRun</c> tests failed!" }
if ($totalFailed -gt 0)
{
throw "$totalFailed / $totalRun tests failed!"
}
| 0
|
sample_42_10.ps1
|
#
# Module manifest for module 'OCI.PSModules.Artifacts'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Artifacts.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '1fe5e04b-2e80-402c-b279-8d3ea9eca7dc'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Artifacts Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Artifacts.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIArtifactsContainerConfiguration',
'Get-OCIArtifactsContainerImage',
'Get-OCIArtifactsContainerImageSignature',
'Get-OCIArtifactsContainerImageSignaturesList',
'Get-OCIArtifactsContainerImagesList',
'Get-OCIArtifactsContainerRepositoriesList',
'Get-OCIArtifactsContainerRepository',
'Get-OCIArtifactsGenericArtifact',
'Get-OCIArtifactsGenericArtifactByPath',
'Get-OCIArtifactsGenericArtifactsList',
'Get-OCIArtifactsRepositoriesList', 'Get-OCIArtifactsRepository',
'Move-OCIArtifactsContainerRepositoryCompartment',
'Move-OCIArtifactsRepositoryCompartment',
'New-OCIArtifactsContainerImageSignature',
'New-OCIArtifactsContainerRepository', 'New-OCIArtifactsRepository',
'Remove-OCIArtifactsContainerImage',
'Remove-OCIArtifactsContainerImageSignature',
'Remove-OCIArtifactsContainerRepository',
'Remove-OCIArtifactsContainerVersion',
'Remove-OCIArtifactsGenericArtifact',
'Remove-OCIArtifactsGenericArtifactByPath',
'Remove-OCIArtifactsRepository',
'Restore-OCIArtifactsContainerImage',
'Update-OCIArtifactsContainerConfiguration',
'Update-OCIArtifactsContainerImage',
'Update-OCIArtifactsContainerImageSignature',
'Update-OCIArtifactsContainerRepository',
'Update-OCIArtifactsGenericArtifact',
'Update-OCIArtifactsGenericArtifactByPath',
'Update-OCIArtifactsRepository'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Artifacts'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
1457.ps1
|
function Test-CDotNet
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true,ParameterSetName='v2')]
[Switch]
$V2,
[Parameter(Mandatory=$true,ParameterSetName='v4Client')]
[Parameter(Mandatory=$true,ParameterSetName='v4Full')]
[Switch]
$V4,
[Parameter(Mandatory=$true,ParameterSetName='v4Client')]
[Switch]
$Client,
[Parameter(Mandatory=$true,ParameterSetName='v4Full')]
[Switch]
$Full
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$runtimeSetupRegPath = switch( $PSCmdlet.ParameterSetName )
{
'v2' { 'hklm:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v2.0.50727' }
'v4Client' { 'hklm:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Client' }
'v4Full' { 'hklm:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full' }
default { Write-Error ('Unknown parameter set ''{0}''.' -f $PSCmdlet.ParameterSetName) }
}
if( -not $runtimeSetupRegPath )
{
return
}
if( -not (Test-CRegistryKeyValue -Path $runtimeSetupRegPath -Name 'Install') )
{
return $false
}
$value = Get-CRegistryKeyValue -Path $runtimeSetupRegPath -Name 'Install'
return ($value -eq 1)
}
| 0
|
sample_63_54.ps1
|
#
# Module manifest for module 'OCI.PSModules.Marketplacepublisher'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Marketplacepublisher.dll'
# Version number of this module.
ModuleVersion = '87.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '16f2e498-6e6b-4e22-8c36-b6c2677410c6'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Marketplacepublisher Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplacepublisher.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Confirm-OCIMarketplacepublisherAndPublishArtifact',
'Enable-OCIMarketplacepublisherTermVersion',
'Get-OCIMarketplacepublisherArtifact',
'Get-OCIMarketplacepublisherArtifactsList',
'Get-OCIMarketplacepublisherAttachment',
'Get-OCIMarketplacepublisherAttachmentContent',
'Get-OCIMarketplacepublisherAttachmentsList',
'Get-OCIMarketplacepublisherCategoriesList',
'Get-OCIMarketplacepublisherCategory',
'Get-OCIMarketplacepublisherListing',
'Get-OCIMarketplacepublisherListingRevision',
'Get-OCIMarketplacepublisherListingRevisionAttachment',
'Get-OCIMarketplacepublisherListingRevisionAttachmentsList',
'Get-OCIMarketplacepublisherListingRevisionNote',
'Get-OCIMarketplacepublisherListingRevisionNotesList',
'Get-OCIMarketplacepublisherListingRevisionPackage',
'Get-OCIMarketplacepublisherListingRevisionPackagesList',
'Get-OCIMarketplacepublisherListingRevisionsList',
'Get-OCIMarketplacepublisherListingsList',
'Get-OCIMarketplacepublisherMarket',
'Get-OCIMarketplacepublisherMarketsList',
'Get-OCIMarketplacepublisherOffer',
'Get-OCIMarketplacepublisherOfferInternalDetail',
'Get-OCIMarketplacepublisherOffersList',
'Get-OCIMarketplacepublisherProduct',
'Get-OCIMarketplacepublisherProductsList',
'Get-OCIMarketplacepublisherPublisher',
'Get-OCIMarketplacepublisherPublishersList',
'Get-OCIMarketplacepublisherTerm',
'Get-OCIMarketplacepublisherTermsList',
'Get-OCIMarketplacepublisherTermVersion',
'Get-OCIMarketplacepublisherTermVersionsList',
'Get-OCIMarketplacepublisherWorkRequest',
'Get-OCIMarketplacepublisherWorkRequestErrorsList',
'Get-OCIMarketplacepublisherWorkRequestLogsList',
'Get-OCIMarketplacepublisherWorkRequestsList',
'Invoke-OCIMarketplacepublisherCascadingDeleteListing',
'Invoke-OCIMarketplacepublisherCascadingDeleteListingRevision',
'Invoke-OCIMarketplacepublisherCloneListingRevision',
'Invoke-OCIMarketplacepublisherMarkListingRevisionPackageAsDefault',
'Invoke-OCIMarketplacepublisherPublishListingRevision',
'Invoke-OCIMarketplacepublisherPublishListingRevisionAsPrivate',
'Invoke-OCIMarketplacepublisherPublishListingRevisionPackage',
'Invoke-OCIMarketplacepublisherSubmitListingRevisionForReview',
'Invoke-OCIMarketplacepublisherUnPublishListingRevisionPackage',
'Invoke-OCIMarketplacepublisherWithdrawListingRevision',
'Move-OCIMarketplacepublisherArtifactCompartment',
'Move-OCIMarketplacepublisherListingCompartment',
'Move-OCIMarketplacepublisherListingRevisionToNewStatus',
'Move-OCIMarketplacepublisherTermCompartment',
'New-OCIMarketplacepublisherArtifact',
'New-OCIMarketplacepublisherAttachment',
'New-OCIMarketplacepublisherListing',
'New-OCIMarketplacepublisherListingRevision',
'New-OCIMarketplacepublisherListingRevisionAttachment',
'New-OCIMarketplacepublisherListingRevisionNote',
'New-OCIMarketplacepublisherListingRevisionPackage',
'New-OCIMarketplacepublisherOffer',
'New-OCIMarketplacepublisherTerm',
'New-OCIMarketplacepublisherTermVersion',
'Remove-OCIMarketplacepublisherArtifact',
'Remove-OCIMarketplacepublisherAttachment',
'Remove-OCIMarketplacepublisherListing',
'Remove-OCIMarketplacepublisherListingRevision',
'Remove-OCIMarketplacepublisherListingRevisionAttachment',
'Remove-OCIMarketplacepublisherListingRevisionNote',
'Remove-OCIMarketplacepublisherListingRevisionPackage',
'Remove-OCIMarketplacepublisherOffer',
'Remove-OCIMarketplacepublisherTerm',
'Remove-OCIMarketplacepublisherTermVersion',
'Stop-OCIMarketplacepublisherWorkRequest',
'Update-OCIMarketplacepublisherArtifact',
'Update-OCIMarketplacepublisherListing',
'Update-OCIMarketplacepublisherListingRevision',
'Update-OCIMarketplacepublisherListingRevisionAttachment',
'Update-OCIMarketplacepublisherListingRevisionAttachmentContent',
'Update-OCIMarketplacepublisherListingRevisionIconContent',
'Update-OCIMarketplacepublisherListingRevisionPackage',
'Update-OCIMarketplacepublisherOffer',
'Update-OCIMarketplacepublisherTerm',
'Update-OCIMarketplacepublisherTermVersion',
'Update-OCIMarketplacepublisherTermVersionContent'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplacepublisher'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
784.ps1
|
function Test-ScriptExtent {
[OutputType([bool], ParameterSetName='__AllParameterSets')]
[OutputType([System.Management.Automation.Language.IScriptExtent], ParameterSetName='PassThru')]
[CmdletBinding()]
param(
[Parameter(Position=0, ValueFromPipeline, ValueFromPipelineByPropertyName)]
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.IScriptExtent]
$Extent,
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.IScriptExtent]
$Inside,
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.IScriptExtent]
$After,
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.IScriptExtent]
$Before,
[Parameter(ParameterSetName='PassThru')]
[switch]
$PassThru
)
process {
if (-not $Extent) { return $false }
$passes = (-not $After -or $Extent.StartOffset -gt $After.EndOffset) -and
(-not $Before -or $Extent.EndOffset -lt $Before.StartOffset) -and
(-not $Inside -or ($Extent.StartOffset -ge $Inside.StartOffset -and
$Extent.EndOffset -le $Inside.EndOffset))
if (-not $PassThru.IsPresent) { return $passes }
if ($passes) {
$Extent
}
}
}
| 0
|
3918.ps1
|
function Test-ListReservationSummariesMonthlyWithOrderId
{
$reservationSummaries = Get-AzConsumptionReservationSummary -Grain monthly -ReservationOrderId ca69259e-bd4f-45c3-bf28-3f353f9cce9b
Assert-NotNull $reservationSummaries
Foreach($reservationSummary in $reservationSummaries)
{
Assert-NotNull $reservationSummary.AveUtilizationPercentage
Assert-NotNull $reservationSummary.Id
Assert-NotNull $reservationSummary.MaxUtilizationPercentage
Assert-NotNull $reservationSummary.MinUtilizationPercentage
Assert-NotNull $reservationSummary.Name
Assert-NotNull $reservationSummary.ReservationId
Assert-NotNull $reservationSummary.ReservationOrderId
Assert-NotNull $reservationSummary.ReservedHour
Assert-NotNull $reservationSummary.SkuName
Assert-NotNull $reservationSummary.Type
Assert-NotNull $reservationSummary.UsageDate
Assert-NotNull $reservationSummary.UsedHour
}
}
function Test-ListReservationSummariesMonthlyWithOrderIdAndId
{
$reservationSummaries = Get-AzConsumptionReservationSummary -Grain monthly -ReservationOrderId ca69259e-bd4f-45c3-bf28-3f353f9cce9b -ReservationId f37f4b70-52ba-4344-a8bd-28abfd21d640
Assert-NotNull $reservationSummaries
Foreach($reservationSummary in $reservationSummaries)
{
Assert-NotNull $reservationSummary.AveUtilizationPercentage
Assert-NotNull $reservationSummary.Id
Assert-NotNull $reservationSummary.MaxUtilizationPercentage
Assert-NotNull $reservationSummary.MinUtilizationPercentage
Assert-NotNull $reservationSummary.Name
Assert-NotNull $reservationSummary.ReservationId
Assert-NotNull $reservationSummary.ReservationOrderId
Assert-NotNull $reservationSummary.ReservedHour
Assert-NotNull $reservationSummary.SkuName
Assert-NotNull $reservationSummary.Type
Assert-NotNull $reservationSummary.UsageDate
Assert-NotNull $reservationSummary.UsedHour
}
}
function Test-ListReservationSummariesDailyWithOrderId
{
$reservationSummaries = Get-AzConsumptionReservationSummary -Grain daily -ReservationOrderId ca69259e-bd4f-45c3-bf28-3f353f9cce9b -StartDate 2017-10-01 -EndDate 2017-12-07
Assert-NotNull $reservationSummaries
Foreach($reservationSummary in $reservationSummaries)
{
Assert-NotNull $reservationSummary.AveUtilizationPercentage
Assert-NotNull $reservationSummary.Id
Assert-NotNull $reservationSummary.MaxUtilizationPercentage
Assert-NotNull $reservationSummary.MinUtilizationPercentage
Assert-NotNull $reservationSummary.Name
Assert-NotNull $reservationSummary.ReservationId
Assert-NotNull $reservationSummary.ReservationOrderId
Assert-NotNull $reservationSummary.ReservedHour
Assert-NotNull $reservationSummary.SkuName
Assert-NotNull $reservationSummary.Type
Assert-NotNull $reservationSummary.UsageDate
Assert-NotNull $reservationSummary.UsedHour
}
}
function Test-ListReservationSummariesDailyWithOrderIdAndId
{
$reservationSummaries = Get-AzConsumptionReservationSummary -Grain daily -ReservationOrderId ca69259e-bd4f-45c3-bf28-3f353f9cce9b -ReservationId f37f4b70-52ba-4344-a8bd-28abfd21d640 -StartDate 2017-10-01 -EndDate 2017-12-07
Assert-NotNull $reservationSummaries
Foreach($reservationSummary in $reservationSummaries)
{
Assert-NotNull $reservationSummary.AveUtilizationPercentage
Assert-NotNull $reservationSummary.Id
Assert-NotNull $reservationSummary.MaxUtilizationPercentage
Assert-NotNull $reservationSummary.MinUtilizationPercentage
Assert-NotNull $reservationSummary.Name
Assert-NotNull $reservationSummary.ReservationId
Assert-NotNull $reservationSummary.ReservationOrderId
Assert-NotNull $reservationSummary.ReservedHour
Assert-NotNull $reservationSummary.SkuName
Assert-NotNull $reservationSummary.Type
Assert-NotNull $reservationSummary.UsageDate
Assert-NotNull $reservationSummary.UsedHour
}
}
function Test-ListReservationDetailsWithOrderId
{
$reservationDetails = Get-AzConsumptionReservationDetail -ReservationOrderId ca69259e-bd4f-45c3-bf28-3f353f9cce9b -StartDate 2017-10-01 -EndDate 2017-12-07
Assert-NotNull $reservationDetails
Foreach($reservationDetail in $reservationDetails)
{
Assert-NotNull $reservationDetail.Id
Assert-NotNull $reservationDetail.InstanceId
Assert-NotNull $reservationDetail.Name
Assert-NotNull $reservationDetail.ReservationId
Assert-NotNull $reservationDetail.ReservationOrderId
Assert-NotNull $reservationDetail.ReservedHour
Assert-NotNull $reservationDetail.SkuName
Assert-NotNull $reservationDetail.TotalReservedQuantity
Assert-NotNull $reservationDetail.Type
Assert-NotNull $reservationDetail.UsageDate
Assert-NotNull $reservationDetail.UsedHour
}
}
function Test-ListReservationDetailsWithOrderIdAndId
{
$reservationDetails = Get-AzConsumptionReservationDetail -ReservationOrderId ca69259e-bd4f-45c3-bf28-3f353f9cce9b -ReservationId f37f4b70-52ba-4344-a8bd-28abfd21d640 -StartDate 2017-10-01 -EndDate 2017-12-07
Assert-NotNull $reservationDetails
Foreach($reservationDetail in $reservationDetails)
{
Assert-NotNull $reservationDetail.Id
Assert-NotNull $reservationDetail.InstanceId
Assert-NotNull $reservationDetail.Name
Assert-NotNull $reservationDetail.ReservationId
Assert-NotNull $reservationDetail.ReservationOrderId
Assert-NotNull $reservationDetail.ReservedHour
Assert-NotNull $reservationDetail.SkuName
Assert-NotNull $reservationDetail.TotalReservedQuantity
Assert-NotNull $reservationDetail.Type
Assert-NotNull $reservationDetail.UsageDate
Assert-NotNull $reservationDetail.UsedHour
}
}
| 0
|
sample_29_5.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create an in-memory object for VirtualMachinePlacementHint.
.Description
Create an in-memory object for VirtualMachinePlacementHint.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.NetworkCloud.Models.Api20230701.VirtualMachinePlacementHint
.Link
https://learn.microsoft.com/powershell/module/Az.NetworkCloud/new-AzNetworkCloudVirtualMachinePlacementHintObject
#>
function New-AzNetworkCloudVirtualMachinePlacementHintObject {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.NetworkCloud.Models.Api20230701.VirtualMachinePlacementHint')]
[CmdletBinding(PositionalBinding=$false)]
Param(
[Parameter(Mandatory, HelpMessage="The specification of whether this hint supports affinity or anti-affinity with the referenced resources.")]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.NetworkCloud.Support.VirtualMachinePlacementHintType])]
[Microsoft.Azure.PowerShell.Cmdlets.NetworkCloud.Support.VirtualMachinePlacementHintType]
$HintType,
[Parameter(Mandatory, HelpMessage="The resource ID of the target object that the placement hints will be checked against, e.g., the bare metal node to host the virtual machine.")]
[string]
$ResourceId,
[Parameter(Mandatory, HelpMessage="The indicator of whether the hint is a hard or soft requirement during scheduling.")]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.NetworkCloud.Support.VirtualMachineSchedulingExecution])]
[Microsoft.Azure.PowerShell.Cmdlets.NetworkCloud.Support.VirtualMachineSchedulingExecution]
$SchedulingExecution,
[Parameter(Mandatory, HelpMessage="The scope for the virtual machine affinity or anti-affinity placement hint. It should always be `"Machine`" in the case of node affinity.")]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.NetworkCloud.Support.VirtualMachinePlacementHintPodAffinityScope])]
[Microsoft.Azure.PowerShell.Cmdlets.NetworkCloud.Support.VirtualMachinePlacementHintPodAffinityScope]
$Scope
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.NetworkCloud.Models.Api20230701.VirtualMachinePlacementHint]::New()
if ($PSBoundParameters.ContainsKey('HintType')) {
$Object.HintType = $HintType
}
if ($PSBoundParameters.ContainsKey('ResourceId')) {
$Object.ResourceId = $ResourceId
}
if ($PSBoundParameters.ContainsKey('SchedulingExecution')) {
$Object.SchedulingExecution = $SchedulingExecution
}
if ($PSBoundParameters.ContainsKey('Scope')) {
$Object.Scope = $Scope
}
return $Object
}
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB2USqjIi94XYCR
# IVUrkU0JwPl3eGD8cmhL6+dBsmz5WaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDAl5odTmhJrjJ+oX55pmmw+
# KJhUDh0M7TYMeHh/yhRkMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAPp0yM0Zqxv1h0BcxvnRxcAaD92KPA+jwpLD9IlVZAonfdsWpFy24OToG
# SeJjw2udHt1K9CXa6cR7vbRpUjM2EhRk5/jb/qdsd4ey/EFqmApO3VFcJ7+emA4o
# h8S74CgpIgNFGecjhhILz0cewqqCw3qQ8dgpGuZZ3yEwdKnqgD7YQWmwLhCpLpbe
# psF5cS1jG1YCKq062YKx0gGgrnpJpEccH2S5uiIFu98wxv2OjLuFinKPlvpw2ghF
# JF4sa2XMb2/Ewd2DLkJ2zNVQVZaYIqGx55mkMsdMVCRJXzNzvLSewbTji8WW+dL/
# Orjih7XEpTqKH14Xm+Uwm1oEUyR9faGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCBfG9+5TmRiwwiyRXCzDOUHLEfxD/w70A+UEHmntZD6QIGZiAgthPg
# GBMyMDI0MDQyMzEzMTUxNi40MzhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK
# AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+
# h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx
# G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje
# 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQg6e0EbyOx/YKKiivCDjn24Mde9xcQvP2gbn9QnzKr9aUwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ
# CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me
# BeYsMA0GCSqGSIb3DQEBCwUABIICAJa5f5ktp5rP7/qtKDdvmqa1AOhChmgp8dHj
# uFutDfqvg41NwDAMxhr78s0zodDVdtnmHSaSIBWMmWr1mDdtev1sxn5hW7ze/9QN
# WnEcR9lmfENfhLeLtplNhl16lfWhOI7B5vY1iiNNq8le0BMAkpcGcy8+UY/uvGLJ
# Eg7bv6mZ8wyBBn3t8m752KE95YLhZ9wXtZrEGUutRVOm2GOngCqA5M/2d+w00VQx
# 4sZR3QvnEGFoB2mnDzuHB89Ypd8o0N49KDTROjRDIeYreCLw96vGkqMKhMm6G3Mb
# LDz2MHpsinm4teWzofzppVezOpdZGFMyF15RmICMHMEU7TfoD1xHxUDv2+4+oH/S
# XxG8qRBO3qM4UBq4i2kL/miSNIJXX4TQILcH1mUfalf5ipn34ZU6qR8JlPDfE77V
# wxewpIEQuTULmuigoyPkcMScwavwTDu8+wPov0zyIqCjPOCxc/p2X9Q0axUT8/yU
# kmYwgiEQjj1C2+KkNLsRNDZRx9wW+nie34uHfv4LPwrThbJ75b06jlbfHOjrKZTA
# 7MfzJoHPC+6h3QOGB4+urNLk60VmhDybW32iB8WYNMYrtnkpdGfZDcFAa31efoy4
# cRnh64Rip8qL9SjTyhgoZ8BMuuCIJbwr48X4t78xBF60/qRMtufHIHf5COEwgOy3
# +FjzFiFD
# SIG # End signature block
| 0
|
sample_67_91.ps1
|
ConvertFrom-StringData @'
###PSLOC
NoADModule = ActiveDirectory module is not installed. Please install the module and try again.
ComputerAccountMissing = No computer account for {0} found in OU {1}. Recovery keys are not avialable in Active Directory
ComputerAccountExists = Computer account(s) {0} look up OU {1} was {2}. Expected {3}
BitlockerKeyMissing = Computer {0} is missing Bitlocker recovery keys.
BitlockerKeyExists = Computer {0} has Bitlocker recovery keys.
Nodetachedvdisks = No detached virtual disks found
NoProtectedDisks = No virtual disks are protected by Bitlocker. Please ensure that all virtual disks are protected by Bitlocker before proceeding.
'@
# SIG # Begin signature block
# MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCIDispQUHp2R7p
# 5PDeDBJ5th/A7STCLd8MPA81KRbKcqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOO6fTQSRNxhcsTcZhNhZ+9T
# pX2vvG3uXuW+vSj3qXhGMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAojXhWtAThrojps1XpH9QubT9Ekd5blna3/eOWo88noYAkV2/8MQkJRA+
# L+QtEfqe6avU5azQqPsgOQmno4lpudWKp8HCRANh0Jv+XceEi/iBC51pyrPkCGlG
# DEp3QraD08Jp3ZuZu4KPMnQ7evMHoVeQRwity8iWKMmri4uN0IgnaJ3rzqarE8tm
# DTI8Dfm5rJI6tokwqLvodDnO0TcHOTa5q7esUeVfdRLgasfaotbQUBCSvsYf4hXF
# 9F7GAfp9ak+QGkNqP2Ny3MU6dUITQBWqa5GkZkAyyjj1Dgx6PamhR2cE0bCzerJe
# SYA4sVXCENS67MTGkx3DecfiFGOzGKGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC
# F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCB8RD8xNHA5F0qW3JQvyQ9I1PUfdMp2l6P0HfOHV9F32gIGZkYZ0Mug
# GBMyMDI0MDUxNjE4NDQyNS4zOTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHpMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp
# W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy
# C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2
# AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf
# ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq
# 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu
# 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg
# DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf
# DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI
# c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ
# 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD
# EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt
# DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq
# vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0
# Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I
# SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf
# 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39
# nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk
# V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot
# 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q
# RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow
# aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV
# QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNM
# MIICNAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM
# JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6fCYTzAiGA8yMDI0MDUxNjE0MzU1
# OVoYDzIwMjQwNTE3MTQzNTU5WjBzMDkGCisGAQQBhFkKBAExKzApMAoCBQDp8JhP
# AgEAMAYCAQACASAwBwIBAAICElcwCgIFAOnx6c8CAQAwNgYKKwYBBAGEWQoEAjEo
# MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG
# 9w0BAQsFAAOCAQEAjk+W0YnLhKp0SORNHGi4JzUkO1Yu9ka8hF0KsneXGY/w7cVX
# S7HieMN6zuxvjYkbafq4NuTYjnvv/HBW973d8eDf263+FvdNnLz8xu2aV5alXEyQ
# JBQUDYlMpBkSVUJ+RQle+NnUbJGDdNv/MyVMWMnYw1UdkslSZz11w9uAyTuy116B
# 0hAaV1nsg9IbBxI6e0aTaXzvupqytlF0OhEuIAPZtQsDUzP8i6y3G7IC9N29AZrD
# 42CxAI7zgtKauOjrfyPDYo+D+KXip+I1MMbYGQeJ9J3ZU7xTJTJeVKTfIKuWb+sH
# OrQADlVGd+SZqhcJ5LXJ/ubTEsyEFoPoODPYdzGCBA0wggQJAgEBMIGTMHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0G
# CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ
# KoZIhvcNAQkEMSIEIC2ObGlGRR/r24+tkc2yPesgTWOWedBq5e3b4w5VwsWMMIH6
# BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgKtLaxNUChCCCQdHn2k2qKB7TF8lP
# YndTxbVJzwf46x0wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MAITMwAAAehQsIDPK3KZTQABAAAB6DAiBCCn0IYn/ySGCFfhzdyA0xzr4MGrVGRb
# JrdweyhslNIENjANBgkqhkiG9w0BAQsFAASCAgC6tPW2H3xaYUriX+veduJV/3d0
# tmKkkiStyeb8Bavls/K0NGiJYPTC3HvA2IfwYg7M3Dlbzw8+blDnklA0bhzaAqJ8
# nJbS7za44BBY1McP9GVgMA8g1c3SQP/yVfYXaTrEizMKEmbE5d61zm9eDulG9Ssa
# a7bMXkZeV6pTStwx6B8Os5Zi+oJ4JTtrNpxnTCTM0/agNPrZ3mBLpXiDG6QMpxZn
# mdoBkhJxF/yIwG68Wyv62QPg7XWQeZhWMhe0wP8d7buYXewxE+majAU7q8XfHxj/
# fXm7H7wcm+m0qTfOF1ISLDB6HJbVqkJmZyKnFrweTz6dzdbTz51VK0NzXNN2IZMR
# xpaTGR7pH+1l2CYQgXYvkRoXnlnfk6nk+lqoirODg12AFZAhcp2mENseHLT7jFlK
# YQuSh8LfMfgvGQzIr2GaBXUlNdvTATCDWlTcCTFRGIDOX4gJaPViTt5+mERbpOQQ
# IRnb6ftQjK2g56fnA++9ApRDSWvJJ+m8dq2qLWlA8r/98TiuNiOPoelp9Aq3Hkii
# LDTpBoOc26FeztZ0yfIpOlnm3SQ/JavnLhIjmnMyZWZtHAOEcKqQ0G2jAD3XHowQ
# KeNip80vadcR7L66pl8x78xvsqzOCXK2fPy83yX2PREwgBD7tpHAx9tVVLGGqBAY
# z/qYROaOmvbV2NCXMg==
# SIG # End signature block
| 0
|
ActiveDirectoryFunctions.ps1
|
#.SYNOPSIS
# Gets a directory entry from ActiveDirectory based on the login user name
function Get-ADUser {
[CmdletBinding()]
param([string]$UserName=${Env:userName})
$ads = New-Object System.DirectoryServices.DirectorySearcher([ADSI]'')
$ads.filter = "(&(objectClass=Person)(samAccountName=$UserName))"
$ads.FindAll().GetEnumerator() | %{ $_.GetDirectoryEntry() }
}
#.SYNOPSIS
# Gets a directory entry from ActiveDirectory based on the computer name
function Get-ADComputer {
[CmdletBinding()]
param([string]$ComputerName=${Env:ComputerName})
$ads = New-Object System.DirectoryServices.DirectorySearcher([ADSI]'')
$ads.filter = "(&(objectClass=Computer)(name=$ComputerName))"
$ads.FindAll().GetEnumerator() | %{
$Computer = $_.GetDirectoryEntry()
$Computer = Resolve-PropertyValueCollection -InputObject $Computer
Add-Member -InputObject $Computer -Type NoteProperty -Name SID -Value $(new-object security.principal.securityidentifier $Computer.objectSID, 0)
Add-Member -InputObject $Computer -Type NoteProperty -Name GUID -Value $(new-object GUID (,[byte[]]$Computer.objectGUID))
Add-Member -InputObject $Computer -Type NoteProperty -Name CreatorSID -Value $(new-object security.principal.securityidentifier $Computer."mS-DS-CreatorSID", 0)
$Computer
}
}
#.SYNOPSIS
# Gets a directory entry from ActiveDirectory based on the group's friendly name
function Get-ADGroup {
[CmdletBinding()]
param([string]$UserName)
$ads = New-Object System.DirectoryServices.DirectorySearcher([ADSI]'')
$ads.filter = "(&(objectClass=Group)(samAccountName=$UserName))"
$ads.FindAll().GetEnumerator() | %{ $_.GetDirectoryEntry() }
}
#.SYNOPSIS
# Look up a DN from a user's (login) name
function Get-DistinguishedName {
[CmdletBinding()]
param([string]$UserName)
(Get-ADUser $UserName).DistinguishedName
}
#.SYNOPSIS
# Get Active Directory group membership recursively
#.EXAMPLE
# $groups = Get-GroupMembership (Get-DistinguishedName Jaykul)
#.EXAMPLE
# $groups = Get-GroupMembership (Get-DistinguishedName Jaykul) -RecurseLimit 0
#
# Gets the groups the user belongs to without recursing
function Get-GroupMembership {
[CmdletBinding()]
param([string]$Name,[int]$RecurseLimit=-1)
if(!$Name.StartsWith("CN=","InvariantCultureIgnoreCase")) {
$Name = Get-DistinguishedName $Name
}
$groups = ([adsi]"LDAP://$Name").MemberOf
if ($groups -and $RecurseLimit) {
Foreach ($gr in $groups) {
$groups += @(Get-GroupMembership $gr -RecurseLimit:$($RecurseLimit-1) |
? {$groups -notcontains $_})
}
}
return $groups | Convert-DistinguishedName
}
function Convert-DistinguishedName {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Position=0)]
[string]$name
)
process {
if(!$Name.StartsWith("CN=","InvariantCultureIgnoreCase")) {
$Name = Get-DistinguishedName $Name
}
$name -replace "CN=","Name=" -replace "DC=","Domain=" -replace "OU=","Org=" | ConvertFrom-PropertyString -Delimiter "," | ForEach { $_.Domain = $_.Domain -join "."; $_ } | Add-Member NoteProperty DN $name -passthru
}
}
function Resolve-PropertyValueCollection {
param(
[Parameter(ValueFromPipeline=$true)]
$InputObject
)
process {
$SingleMembers = @()
$MultiMembers = @()
$InputObject | Get-Member -Type Property | ForEach-Object {
$Name = $_.Name
if($InputObject.($Name).Count -le 1) {
$SingleMembers += $Name
} else {
$MultiMembers += $Name
}
}
$OutputObject = Select-Object -InputObject $InputObject -Property $MultiMembers
foreach($member in $singleMembers) {
Add-Member -InputObject $OutputObject -Type NoteProperty -Name $Member -Value ($InputObject.$Member)[0]
}
$OutputObject
}
}
#. SYNOPSIS
# Pretty-print the vitals on a user...
function Select-UserInfo {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true,Position=0,ParameterSetName="Input",ValueFromPipeline=$true)]
[System.DirectoryServices.DirectoryEntry[]]$InputObject
,
[Parameter(Mandatory=$true,Position=0,ParameterSetName="Name",ValueFromPipelineByPropertyName=$true)]
[string[]]$name
)
process {
switch($PSCmdlet.ParameterSetName) {
"Name" {
foreach($n in $Name) {
Write-Verbose "Getting $n User Info"
Get-ADUser $n | Resolve-PropertyValueCollection
}
}
"Input" {
foreach($io in $InputObject) {
Write-Verbose "Converting User Info for $($io.displayName)"
Resolve-PropertyValueCollection -InputObject $io
}
}
}
}
}
function Get-GroupMembers {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true,Position=0,ParameterSetName="Input",ValueFromPipeline=$true)]
[string]$GroupName
)
process {
Foreach ($member in (Get-ADGroup $GroupName).Members() ) {
new-object System.DirectoryServices.DirectoryEntry $member | Resolve-PropertyValueCollection
}
}
}
| 0
|
Download DefragTools _1.ps1
|
#requires -version 2.0
<#
.Synopsis
Downloads Channel 9 Defrag Tool Episode Video
.DESCRIPTION
Downloads Channel 9 Defrag Tool Episode Video in the format selected and to a given path.
.EXAMPLE
Downloads all shows in WMV format to the default Downloads Folder for the user.
Get-DefragToolsShow -All -VideoType wmv
.EXAMPLE
Downloads only the last show of the series in MP4 format
Get-DefragToolsShow -Last -VideoType MP4
.NOTES
Author: Carlos Perez carlos_perez[at]darkoperator.com
#>
function Get-DefragToolsShow
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory=$false,
Position=0)]
$Path = "$($env:USERPROFILE)\\downloads",
[Parameter(Mandatory=$false,
ParameterSetName="All")]
[switch]$All = $true,
[Parameter(Mandatory=$false,
ParameterSetName="Last")]
[switch]$Last = $true,
[Parameter(Mandatory=$false)]
[ValidateSet("MP4HD","MP4","WMVHD","WMV")]
[string]$VideoType = "MP4HD"
)
Begin
{
$WebClient = New-Object System.Net.WebClient
$Global:downloadComplete = $false
$eventDataComplete = Register-ObjectEvent $WebClient DownloadFileCompleted `
-SourceIdentifier WebClient.DownloadFileComplete `
-Action {$Global:downloadComplete = $true}
$eventDataProgress = Register-ObjectEvent $WebClient DownloadProgressChanged `
-SourceIdentifier WebClient.DownloadProgressChanged `
-Action { $Global:DPCEventArgs = $EventArgs }
# Lets change to the proper path
Set-Location (Resolve-Path $Path).Path
}
Process
{
switch ($PsCmdlet.ParameterSetName)
{
"All"{$all = $true}
"Last"{$all = $false}
}
switch ($VideoType)
{
"MP4HD" {$feedURL = "http://channel9.msdn.com/Shows/Defrag-Tools/feed/mp4high"}
"MP4" {$feedURL = "http://channel9.msdn.com/Shows/Defrag-Tools/feed/mp4"}
"WMVHD" {$feedURL = "http://channel9.msdn.com/Shows/Defrag-Tools/feed/wmvhigh"}
"WMV" {$feedURL = "http://channel9.msdn.com/Shows/Defrag-Tools/feed/wmv"}
}
$feed = [xml]$WebClient.DownloadString($feedURL)
if ($All)
{
foreach ($episode in $feed.rss.channel.Item)
{
# Create a proper URI for parsing
$episodeURL = [System.Uri]$episode.enclosure.url
# Get the episode file name
$file = $episodeURL.Segments[-1]
#Check if the file exists if it does skip it
if (!(Test-Path $file))
{
Write-Progress -Activity 'Downloading file' -Status $file
$WebClient.DownloadFileAsync($episodeURL,$file)
while (!($Global:downloadComplete))
{
$pc = $Global:DPCEventArgs.ProgressPercentage
if ($pc -ne $null)
{
Write-Progress -Activity 'Downloading file' -Status $file -PercentComplete $pc
}
}
$Global:downloadComplete = $false
}
}
}
else
{
$episodeURL = [System.Uri]$feed.rss.channel.Item[0].enclosure.url
# Get the episode file name
$file = $episodeURL.Segments[-1]
#Check if the file exists if it does skip it
if (!(Test-Path $file))
{
Write-Progress -Activity 'Downloading file' -Status $file
$WebClient.DownloadFileAsync($episodeURL,$file)
# Lets wait for it to finish
while (!($Global:downloadComplete))
{
$pc = $Global:DPCEventArgs.ProgressPercentage
if ($pc -ne $null)
{
Write-Progress -Activity 'Downloading file' -Status $file -PercentComplete $pc
}
}
}
}
}
End
{
Unregister-Event -SourceIdentifier WebClient.DownloadProgressChanged
Unregister-Event -SourceIdentifier WebClient.DownloadFileComplete
$Global:downloadComplete = $null
$Global:DPCEventArgs = $null
[GC]::Collect()
}
}
| 0
|
sample_21_72.ps1
|
# Copyright 2021-2023 VMware, Inc.
# SPDX-License-Identifier: Apache-2
<#
.SYNOPSIS
VMware Tools script for managing the Salt minion on a Windows guest
.DESCRIPTION
This script manages the Salt minion on a Windows guest. The minion is a OneDir
build hosted on https://repo.saltproject.io/salt/py3/onedir/. You can install
the minion, remove it, check script dependencies, get the Salt minion
installation status, and reset the Salt minion configuration.
When this script is run without any parameters, the action is obtained from
guestVars (if present). If no action is found, the script will exit with a
scriptFailed exit code.
If an action is passed on the CLI or found in guestVars, minion config options
(master=198.51.100.1, etc.) are queried from guestVars. Config options are then
obtained from tools.conf. Config options obtained from tools.conf will overwrite
any config options obtained from guestVars with the same name. Config options
passed on the CLI will overwrite any config options obtained from either of the
previous two methods. The order of precedence is CLI options first, then
tools.conf, and finally guestVars.
This script returns exit codes to signal its success or failure. The exit codes
are as follows:
0 - scriptSuccess
126 - scriptFailed
130 - scriptTerminated
If the Status option is passed, then the exit code will signal the status of the
Salt minion installation. Status exit codes are as follows:
100 - installed
101 - installing
102 - notInstalled
103 - installFailed
104 - removing
105 - removeFailed
106 - externalInstall
NOTE: This script must be run with Administrator privileges
.EXAMPLE
PS>svtminion.ps1 -Install
PS>svtminion.ps1 -Install -MinionVersion 3004-1 master=192.168.10.10 id=dev_box
PS>svtminion.ps1 -Install -Source https://my.domain.com/vmtools/salt
.EXAMPLE
PS>svtminion.ps1 -Clear
.EXAMPLE
PS>svtminion.ps1 -Status
.EXAMPLE
PS>svtminion.ps1 -Depend
.EXAMPLE
PS>svtminion.ps1 -Remove -LogLevel debug
#>
[CmdletBinding(DefaultParameterSetName = "Install")]
param(
[Parameter(Mandatory=$false, ParameterSetName="Install")]
[Alias("i")]
# Downloads, installs, and starts the salt-minion service. Exits with
# scriptFailed exit (126) code under the following conditions:
# - Existing Standard Salt Installation detected
# - Unknown status found
# - Installation in progress
# - Removal in progress
# - Installation failed
# - Missing script dependencies
#
# Exits with scriptSuccess exit code (0) under the following conditions:
# - Installed successfully
# - Already installed
[Switch] $Install,
[Parameter(Mandatory=$false, ParameterSetName="Install")]
[Alias("m")]
# The version of Salt minion to install. Default is "latest".
[String] $MinionVersion="latest",
[Parameter(Mandatory=$false, ParameterSetName="Install")]
[Alias("j")]
# The url or path to the repo containing the installers and, preferably, the
# repo.json file. This would contain a directory structure similar to that
# found at the default location:
#
# https://repo.saltproject.io/salt/py3/onedir
#
# The root of this directory preferably contains a file named `repo.json`
# which contains the information about the installer versions available.
# If this file not available, this script will scan the directory for the
# requested version.
#
# This can handle most common protocols: http, https, ftp, unc, local
[String] $Source="https://repo.saltproject.io/salt/py3/onedir",
[Parameter(Mandatory=$false, ParameterSetName="Install",
Position=0, ValueFromRemainingArguments=$true)]
# Any number of minion config options specified by the name of the config
# option as found in Salt documentation. All options will be lower-cased and
# written to the minion config as passed. All values are in the key=value
# format. For example: master=localhost
[String[]] $ConfigOptions,
[Parameter(Mandatory=$false, ParameterSetName="Remove")]
[Alias("r")]
# Stops and uninstalls the salt-minion service. Exits with scriptFailed exit
# code (126) under the following conditions:
# - Unknown status found
# - Installation in progress
# - Removal in progress
# - Installation failed
# - Missing script dependencies
#
# Exits with scriptSuccess exit code (0) under the following conditions:
# - Removed successfully
# - Already removed
[Switch] $Remove,
[Parameter(Mandatory=$false, ParameterSetName="Clear")]
[Alias("c")]
# Resets the salt-minion by randomizing the minion ID and removing the
# minion keys. The randomized minion ID will be the old minion ID, an
# underscore, and 5 random digits.
#
# Exits with scriptFailed exit code (126) under the following conditions:
# - Unknown status found
# - Missing script dependencies
#
# Exits with scriptSuccess exit code (0) under the following conditions:
# - Cleared successfully
# - Not installed
[Switch] $Clear,
[Parameter(Mandatory=$false, ParameterSetName="Status")]
[Alias("s")]
# Gets the status of the Salt minion installation. This command returns an
# exit code that corresponds to one of the following:
# 100 - installed
# 101 - installing
# 102 - notInstalled
# 103 - installFailed
# 104 - removing
# 105 - removeFailed
# 106 - externalInstall
#
# Exits with scriptFailed exit code (126) under the following conditions:
# - Unknown status found
# - Missing script dependencies
[Switch] $Status,
[Parameter(Mandatory=$false, ParameterSetName="Depend")]
[Alias("d")]
# Ensures the required dependencies are available. Exits with a scriptFailed
# exit code (126) if any dependencies are missing. Exits with a
# scriptSuccess exit code (0) if all dependencies are present.
[Switch] $Depend,
[Parameter(Mandatory=$false, ParameterSetName="Install")]
[Parameter(ParameterSetName="Clear")]
[Parameter(ParameterSetName="Status")]
[Parameter(ParameterSetName="Depend")]
[Parameter(ParameterSetName="Remove")]
[Alias("l")]
[ValidateSet(
"silent",
"error",
"warning",
"info",
"debug",
IgnoreCase=$true)]
[String]
# Sets the log level to display and log. Default is warning. Silent
# suppresses all logging output. Available options are:
# - silent
# - error
# - warning
# - info
# - debug
# Logs are placed in C:\Windows\temp and are named according to the action
# the script is performing and a timestamp for when the script was run.
# This is a sample name:
# `vmware-svtminion-<action>-<timestamp>.log`
$LogLevel = "warning",
[Parameter(Mandatory=$false, ParameterSetName="Help")]
[Parameter(ParameterSetName="Install")]
[Parameter(ParameterSetName="Clear")]
[Parameter(ParameterSetName="Status")]
[Parameter(ParameterSetName="Depend")]
[Parameter(ParameterSetName="Remove")]
[Alias("h")]
[Switch]
# Displays help for this script.
$Help,
[Parameter(Mandatory=$false, ParameterSetName="Version")]
[Parameter(ParameterSetName="Install")]
[Parameter(ParameterSetName="Clear")]
[Parameter(ParameterSetName="Status")]
[Parameter(ParameterSetName="Depend")]
[Parameter(ParameterSetName="Remove")]
[Alias("v")]
[Switch]
# Displays the version of this script.
$Version
)
# Set TLS1.2 as default
[System.Net.ServicePointManager]::SecurityProtocol = `
[System.Net.SecurityProtocolType]'Tls12'
################################ HELP/VERSION ##################################
# We'll put these functions first because they don't require administrator
# privileges to run
# Check for help switch
if ($help) {
# Get the full script name
$this_script = & {$myInvocation.ScriptName}
Get-Help $this_script -Detailed
exit 0
}
# This value is populated via CICD during build
# $script_version = "SCRIPT_VERSION_REPLACE"
$script_version = "1.6"
if ($Version) {
Write-Host $script_version
exit 0
}
# Only run on 64-bit architecture
if ( [System.IntPtr]::Size -eq 4 ) {
Write-Host "This script only supports 64-bit architecture"
exit 0
}
################################# STATUS CODES #################################
$STATUS_CODES = @{
"scriptSuccess" = 0;
"installed" = 100;
"installing" = 101;
"notInstalled" = 102;
"installFailed" = 103;
"removing" = 104;
"removeFailed" = 105;
"externalInstall" = 106;
"scriptFailed" = 126;
"scriptTerminated" = 130;
100 = "installed";
101 = "installing";
102 = "notInstalled";
103 = "installFailed"
104 = "removing";
105 = "removeFailed";
106 = "externalInstall";
}
################################ REQUIREMENTS ##################################
# Make sure the script is run as Administrator
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
if (!($Principal.IsInRole(
[System.Security.Principal.WindowsBuiltInRole]::Administrator
))) {
Write-Host "This script must run as Administrator" -ForegroundColor Red
exit $STATUS_CODES["scriptFailed"]
}
################################# LOGGING ######################################
$LOG_LEVELS = @{
"silent" = 0;
"error" = 1;
"warning" = 2;
"info" = 3;
"debug" = 4
}
$log_level_value = $LOG_LEVELS[$LogLevel.ToLower()]
################################# SETTINGS #####################################
$global:ErrorActionPreference = "Stop"
$global:ProgressPreference = "SilentlyContinue"
$Script:log_cleared = $false
$download_retry_count = 5
$script_date = Get-Date -Format "yyyyMMddHHmmss"
$script_name = $MyInvocation.MyCommand.Name
$script_log_dir = "$env:SystemRoot\Temp"
# log file name: vmware-svtminion-{0}-20211019152012.log
$script_log_base_name = "vmware-$($script_name.Split(".")[0])-{0}"
$script_log_name = "$script_log_base_name-$script_date.log"
$script_log_file_count = 5
$action_list = @("install", "remove", "depend", "clear", "status")
################################# VARIABLES ####################################
# Repository locations and names
$salt_name = "salt"
$base_url = $Source
$default_source = "https://repo.saltproject.io/salt/py3/onedir"
$pre_3006_source = "https://repo.saltproject.io/salt/vmware-tools-onedir"
# Salt file and directory locations
$base_salt_install_location = "$env:ProgramFiles\Salt Project"
$salt_dir = "$base_salt_install_location\$salt_name"
$salt_bin = "$salt_dir\salt\salt.exe" # Tiamat Builds
$salt_minion_bin = "$salt_dir\salt-minion.exe" # Relenv Builds
$ssm_bin = "$salt_dir\ssm.exe"
$base_salt_config_location = "$env:ProgramData\Salt Project"
$salt_root_dir = "$base_salt_config_location\$salt_name"
$salt_config_dir = "$salt_root_dir\conf"
$salt_config_name = "minion"
$salt_config_file = "$salt_config_dir\$salt_config_name"
$salt_pki_dir = "$salt_config_dir\pki\$salt_config_name"
$salt_log_dir = "$salt_root_dir\var\log\salt"
# Files/Dirs to remove
$file_dirs_to_remove = New-Object System.Collections.Generic.List[String]
$file_dirs_to_remove.Add($base_salt_config_location) | Out-Null
$file_dirs_to_remove.Add($base_salt_install_location) | Out-Null
# Old Salt install location left behind by older versions of Salt
# Pre 3004
$file_dirs_to_remove.Add("C:\salt") | Out-Null
## VMware registry locations
$salt_base_reg = "HKLM:\SOFTWARE\Salt Project\salt"
$vmtools_base_reg = "HKLM:\SOFTWARE\VMware, Inc.\VMware Tools"
$vmtools_salt_minion_status_name = "SaltMinionStatus"
try{
$reg_key = Get-ItemProperty $vmtools_base_reg
} catch {
if (Test-Path $vmtools_base_reg) {
$msg = "VMware Tools not installed: $_"
Write-Host $msg
exit $STATUS_CODES["scriptFailed"]
}
}
if (!($reg_key.PSObject.Properties.Name -contains "InstallPath")) {
if (Test-Path $vmtools_base_reg) {
# Only error out on systems with VMware Tools installed
$msg = "Unable to find VMware Tools installation"
Write-Host $msg
exit $STATUS_CODES["scriptFailed"]
}
} else {
## VMware file and directory locations
$vmtools_reg = Get-ItemProperty -Path $vmtools_base_reg -Name "InstallPath"
$vmtools_base_dir = $vmtools_reg.InstallPath
$vmtools_conf_dir = "$env:ProgramData\VMware\VMware Tools"
$vmtools_conf_file = "$vmtools_conf_dir\tools.conf"
$vmtoolsd_bin = "$vmtools_base_dir\vmtoolsd.exe"
}
# If VMTools reg path exists, then we're on a VMTools system
if ( Test-Path $vmtools_base_reg ) {
$reg_path = $vmtools_base_reg
} else {
$reg_path = $salt_base_reg
if ( !(Test-Path $salt_base_reg) ) {
New-Item -Path "$salt_base_reg" -Force
}
}
## VMware guestVars file and directory locations
$guestvars_base = "guestinfo./vmware.components"
$guestvars_section = "salt_minion"
$guestvars_salt = "$guestvars_base.$guestvars_section"
$guestvars_salt_args = "$guestvars_salt.args"
$guestvars_salt_desired_state = "$guestvars_salt.desiredstate"
################################ TEST FUNCTIONS ################################
function Get-Version {
return $script_version
}
############################### HELPER FUNCTIONS ###############################
function Clear-OldLogs {
$filter = "*$script_log_base_name*.log" -f $Action.ToLower()
$files = Get-ChildItem $script_log_dir -Filter $filter | Sort-Object
$total_files = $files.Count
try {
foreach ($file in $files) {
if ($total_files -ge $script_log_file_count) {
# Remove the file/dir/synlink/junction
$file_obj = Get-Item -Path $file.FullName
if ($file_obj -is [System.IO.DirectoryInfo]) {
[System.IO.Directory]::Delete(`
$file.FullName, $true) | Out-Null
} else {
[System.IO.File]::Delete($file.FullName) | Out-Null
}
$total_files -= 1
} else {
break
}
}
} finally {
$Script:log_cleared = $true
}
}
function Write-Log {
# Function for writing logs to the screen and to the log file
#
# Args:
# Message (string): The log message
# Level (string):
# The log level. Must be one of error, info, warning, debug. Default
# is info
[CmdletBinding()]
param(
[Parameter(Mandatory=$true, Position=0)]
[String] $Message,
[Parameter()]
[ValidateSet("error", "info", "warning", "debug", IgnoreCase=$true)]
[String] $Level = "info"
)
$Level = $Level.ToUpper()
$level_text = $Level + " " * (7 - $Level.Length)
$script_pid = $PID + " " * (5 - $PID.Length)
if ( $LOG_LEVELS[$Level.ToLower()] -le $log_level_value ) {
$date_time = Get-Date -Format "yyyy-MM-dd:HH:mm:ss.ffff"
$timestamp = Get-Date -Format "HH:mm:ss.ffff"
$log_message = "[$timestamp] [$level_text] $Message"
$log_file_message = "[$date_time] [$script_pid] [$level_text] $Message"
if (!(Test-Path($script_log_dir))) {
Write-Host "[$timestamp] [INFO ] : Creating log file directory"
New-Item -Path $script_log_dir -Type Directory | Out-Null
}
if (!($action_list -contains $Action)) { $Action = "Default" }
if (!$Script:log_cleared) {
Clear-OldLogs
}
$log_path = "$script_log_dir\$script_log_name" -f $Action
Add-Content -Path $log_path.ToLower() -Value $log_file_message
switch ($Level) {
"ERROR" { $color = "Red" }
"WARNING" { $color = "Yellow" }
default { $color = "White"}
}
Write-Host $log_message -ForegroundColor $color
}
}
function Get-ScriptRunningStatus {
# Try to detect if this script is already running under another process
#
# Returns True if running, otherwise False
Write-Log "Checking for a running instance of this script" -Level info
#Get all running powershell processes
$filter = "Name='powershell.exe' AND CommandLine LIKE '%$script_name%'"
$processes = Get-WmiObject Win32_Process -Filter $filter | `
Select-Object CommandLine,ProcessId
$process_found = $false
foreach ($process in $processes) {
[Int32]$process_pid = $process.ProcessId
[String]$process_cmd = $process.commandline
#Are other instances of this script already running?
if (($process_cmd -match $script_name) -And ($process_pid -ne $PID)) {
$process_found = $true
}
}
if ($process_found) {
Write-Log "Found running instance in PID: $process_pid" -Level debug
return $true
} else {
Write-Log "Running instance not detected" -Level debug
return $false
}
}
function Get-Status {
# Read the status out of the registry. If the key is missing that means
# notInstalled
#
# Returns the error level number
$script_running_status = Get-ScriptRunningStatus
Write-Log "Getting status" -Level info
try {
$current_status = Get-ItemProperty `
-Path $reg_path `
-Name $vmtools_salt_minion_status_name
$current_status = $current_status.($vmtools_salt_minion_status_name)
Write-Log "Found status code: $current_status" -Level debug
} catch {
Write-Log "Key not set, not installed : $_" -Level debug
$current_status = $STATUS_CODES["notInstalled"]
}
# If status is 101 or 104 (installing or removing) but there isn't another
# script running, then the status is installFailed or removeFailed
$list_ing = @($STATUS_CODES["installing"], $STATUS_CODES["removing"])
if (($list_ing -contains $current_status) -and !($script_running_status)) {
switch ($current_status) {
$STATUS_CODES["installing"] {
Write-Log "Found failed install" -Level debug
$current_status = $STATUS_CODES["installFailed"]
}
$STATUS_CODES["removing"] {
Write-Log "Found failed remove" -Level debug
$current_status = $STATUS_CODES["removeFailed"]
}
}
}
if ($STATUS_CODES.keys -contains $current_status) {
$status_lookup = $STATUS_CODES[$current_status]
Write-Log "Found status: $status_lookup" -Level debug
} else {
Write-Log "Unknown status code: $current_status" -Level debug
}
return $current_status
}
function Set-Status {
# Set the numeric value of the status in the registry. notInstalled means to
# remove the key
#
# Args:
# NewStatus (string):
# The status to set. Must be one of the following:
# - installed
# - installing
# - notInstalled
# - installFailed
# - removing
# - removeFailed
# - externalInstall
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateSet(
"installed",
"installing",
"notInstalled",
"installFailed",
"removing",
"removeFailed",
"externalInstall"
)]
[String] $NewStatus
)
Write-Log "Setting status: $NewStatus" -Level info
$status_code = $STATUS_CODES[$NewStatus]
# If it's notInstalled, just remove the property name
if ($status_code -eq $STATUS_CODES["notInstalled"]) {
try {
Remove-ItemProperty -Path "$reg_path"`
-Name $vmtools_salt_minion_status_name
$key = "$reg_path\$vmtools_salt_minion_status_name"
Write-Log "Removed reg key: $key" -Level debug
Write-Log "Set status to $NewStatus" -Level debug
} catch [System.Management.Automation.PSArgumentException] {
Write-Log "Reg key not present: $key" -Level debug
Write-Log "Status already set to: $NewStatus" -Level debug
} catch {
Write-Log "Error removing reg key: $_" -Level error
exit $STATUS_CODES["scriptFailed"]
}
} else {
try {
New-ItemProperty -Path "$reg_path"`
-Name $vmtools_salt_minion_status_name `
-Value $status_code `
-Force | Out-Null
Write-Log "Set status to $NewStatus" -Level debug
} catch {
if (Test-Path $vmtools_base_reg) {
Write-Log "Error writing status: $_" -Level error
exit $STATUS_CODES["scriptFailed"]
} else {
Write-Log "Error writing status: $_" -Level warning
}
}
}
}
function Set-FailedStatus {
# Sets the status if either add or remove fails, each sets a different
# status if it fails
switch ($Action.ToLower()) {
"install" { Set-Status installFailed }
"remove" { Set-Status removeFailed }
}
}
function Get-WebFile{
# Downloads a file from the web. Enables the TLS1.2 protocol. If the
# download times out, wait 10 seconds and try again. Continues retrying
# until the download retry count max is reached
#
# Used by:
# - Get-SaltFromWeb
#
# Args:
# Url (string): The url for the file to download
# OutFile (string): The location to put the downloaded file
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Url,
[Parameter(Mandatory=$true)]
[String] $OutFile
)
$parent_dir = Split-Path $OutFile
if ( !( Test-Path $parent_dir )) {
New-Item $parent_dir -Type Directory | Out-Null
}
$url_name = $Url.SubString($Url.LastIndexOf('/'))
$tries = 1
$success = $false
while (!$success){
try {
# Download the file
$msg = "Downloading (try: $tries/$download_retry_count): $url_name"
Write-Log $msg -Level debug
Invoke-WebRequest -Uri $Url -OutFile $OutFile
} catch {
Write-Log "Error downloading: $Url" -Level warning
Write-Log "Error message: $_" -Level warning
} finally {
$tries++
if ((Test-Path -Path "$OutFile") `
-and `
((Get-Item "$OutFile").Length -gt 0kb
)) {
Write-Log "Finished downloading: $url_name" -Level debug
$success = $true
} else {
if ($tries -gt $download_retry_count) {
Write-Log "Retry count exceeded" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
Write-Log "Trying again after 10 seconds" -Level warning
Start-Sleep -Seconds 10
}
}
}
}
function Get-HashFromFile {
# Gets the hash for the file from the hash file which contains a list of
# hashes and their files
#
# Used by:
# - Get-SaltFromWeb
#
# Args:
# HashFile (string): The file containing the hashes
# FileName (string): The name of the file to search for in the hash file
#
# Returns:
# Returns the hash for the specified file
# Errors:
# If there is an error, set the failed status and exit with an error
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $HashFile,
[Parameter(Mandatory=$true)]
[String] $FileName
)
Write-Log "Loading hashfile: $HashFile" -Level debug
$lines = Get-Content -Path $HashFile
Write-Log "Searching for hash for: $FileName" -Level debug
foreach ($line in $lines) {
$file_hash, $file_name = $line -split "\s+"
if ($FileName -eq $file_name) {
Write-Log "Found hash: $file_hash" -Level debug
return $file_hash
}
}
Write-Log "No hash found for: $FileName" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
function Expand-ZipFile {
# Extract a zip file
#
# Used by:
# - Install-SaltMinion
#
# Args:
# ZipFile (string): The file to extract
# Destination (string): The location to extract to
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
[CmdletBinding()]
param(
[Parameter(Mandatory = $true)]
[string] $ZipFile,
[Parameter(Mandatory = $true)]
[string] $Destination
)
if (!(Test-Path -Path $Destination)) {
Write-Log "Creating missing directory: $Destination" -Level debug
New-Item -ItemType directory -Path $Destination
}
Write-Log "Unzipping '$ZipFile' to '$Destination'" -Level debug
if ($PSVersionTable.PSVersion.Major -ge 5) {
# PowerShell 5 introduced Expand-Archive
Write-Log "Using Expand-Archive to unzip"
try{
Expand-Archive -Path $ZipFile -DestinationPath $Destination -Force
} catch {
Write-Log "Failed to unzip $ZipFile : $_" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
} else {
# This method will work with older versions of powershell, but it is
# slow
Write-Log "Using Shell.Application to unzip"
$objShell = New-Object -Com Shell.Application
$objZip = $objShell.NameSpace($ZipFile)
try{
foreach ($item in $objZip.Items()) {
$objShell.Namespace($Destination).CopyHere($item, 0x14)
}
} catch {
Write-Log "Failed to unzip $ZipFile : $_" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
Write-Log "Finished unzipping '$ZipFile' to '$Destination'" -Level debug
}
function Add-SystemPathValue{
# Add a new entry to the system path environment variable. Only adds the new
# path if it does not already exist.
#
# Used by:
# - Install-SaltMinion
#
# Args:
# Path (string): The target path to add
#
# Warning:
# Logs a warning if the target path does not exist
[Cmdletbinding()]
param (
[parameter(Mandatory=$True)]
[String]$Path
)
$key = "HKLM:\System\CurrentControlSet\Control\Session Manager\Environment"
# Make sure the target folder exists
Write-Log "Ensuring target path exists" -Level debug
if (!(Test-Path $Path)) {
Write-Log "Target path does not exist: $Path" -Level warning
}
Write-Log "Getting current system path" -Level debug
$current_path = (Get-ItemProperty -Path $key -Name Path).Path
$new_path_list = New-Object System.Collections.Generic.List[String]
Write-Log "Verifying the target path is not already present" -Level debug
$regex_path = $Path.Replace("\", "\\")
foreach ($item in $current_path.Split(";")) {
# Bail if we find the new path in the current path
if ($item -imatch "^$regex_path(\\)?$") {
Write-Log "Target path already exists: $Path" -Level warning
return
} else {
# Add the item to our new path array
$new_path_list.Add($item) | Out-Null
}
}
# Add the new path to the array
Write-Log "Adding target path: $Path" -Level debug
$new_path_list.Add($Path) | Out-Null
$new_path = $new_path_list -join ";"
try{
Write-Log "Updating system path" -Level debug
Set-ItemProperty -Path $key -Name Path -Value $new_path
} catch {
Write-Log "Failed to add $Path the system path" -Level warning
Write-Log "Tried to write: $new_path" -Level warning
Write-Log "Error message: $_" -Level warning
}
$env:Path = [System.Environment]::GetEnvironmentVariable("Path","Machine")
}
function Remove-SystemPathValue {
# Removes the specified target path from the system path environment
# variable
#
# Used by:
# - Remove-SaltMinion
#
# Args
# Path (string): The target path to remove
[Cmdletbinding()]
param (
[parameter(Mandatory=$True)]
[String]$Path
)
Write-Log "Removing from system path: $Path" -Level info
$key = "HKLM:\System\CurrentControlSet\Control\Session Manager\Environment"
Write-Log "Getting current system path" -Level debug
$current_path = (Get-ItemProperty -Path $key -Name Path).Path
$new_path_list = New-Object System.Collections.Generic.List[String]
Write-Log "Searching for $Path" -Level debug
$regex_path = $Path.Replace("\", "\\")
$removed = 0
foreach ($item in $current_path.Split(";")) {
# Don't add if we find the new path
if ($item -imatch "^$regex_path(\\)?$") {
Write-Log "Removing target path: $Path" -Level debug
$removed = 1
} else {
# Add the item to our new path array
$new_path_list.Add($item) | Out-Null
}
}
if ($removed) {
$new_path = $new_path_list -join ";"
try {
Write-Log "Updating system path" -Level debug
Set-ItemProperty -Path $key -Name Path -Value $new_path
} catch {
$msg = "Failed to remove $Path from the system path: $new_path"
Write-Log $msg -Level warning
Write-Log "Tried to write: $new_path" -Level warning
Write-Log "Error message: $_" -level warning
}
}
$env:Path = [System.Environment]::GetEnvironmentVariable("Path","Machine")
}
function Remove-FileOrFolder {
# Removes a file or a folder recursively from the system. Takes ownership of
# the file or directory before removing
#
# Used by:
# - Remove-SaltMinion
# - Reset-SaltMinion
#
# Args:
# Path (string): The file or folder to remove
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path
)
if (!(Test-Path -Path $Path)) {
Write-Log "Path not found: $Path" -Level debug
return
}
$tries = 1
$max_tries = 5
$success = $false
while (!$success) {
$msg = "Removing (try: $tries/$max_tries): $Path"
Write-Log $msg -Level debug
try {
# Remove the file/dir/symlink/junction
if ((Get-Item -Path $Path) -is [System.IO.DirectoryInfo]) {
if (Get-IsReparsePoint -Path $Path) {
Write-Log "Removing reparse point" -Level debug
[System.IO.Directory]::Delete($Path, $true) | Out-Null
} else {
Write-Log "Removing directory" -Level debug
# Handles nested readonly files
Remove-Item -Path $Path -Force -Recurse
}
} else {
Write-Log "Removing file" -Level debug
[System.IO.File]::Delete($Path) | Out-Null
}
} catch {
Write-Log "Error removing: $Path" -Level warning
Write-Log "Error message: $_" -Level warning
} finally {
$tries++
if (!(Test-Path -Path $Path)) {
Write-Log "Finished removing $Path" -Level debug
$success = $true
} else {
if ($tries -gt $max_tries) {
Write-Log "Retry count exceeded" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
if ((Get-Item -Path $Path) -is [System.IO.DirectoryInfo]) {
Write-Log "Taking ownership: $Path" -Level debug
takeown /a /r /d Y /f $Path *> $null
if ($LASTEXITCODE) {
Write-Log "Directory does not exist" -Level debug
}
}
Write-Log "Trying again after 5 seconds" -Level warning
Start-Sleep -Seconds 5
}
}
}
}
function Get-GuestVars {
# Get guestvars data using vmtoolsd.exe
# They can be set on the host using vmrun.exe
#
# vmrun writeVariable "d:\VMWare\Windows Server 2019\Windows Server
# 2019.vmx" guestVar /vmware.components.salt_minion.args
# "master=192.168.0.12 id=test_id"
#
# Used by:
# - Get-ConfigGuestVars
#
# Args:
# GuestVarsPath (string):
# The option to get from the guestvars repository. Likely one of the
# following:
# - Action: guestinfo.vmware.components.salt_minion
# - Minion Config: guestinfo.vmware.components.salt_minion.args
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $GuestVarsPath
)
If ( !$vmtoolsd_bin -or !(Test-Path $vmtoolsd_bin) ) {
$msg = "vmtoolsd.exe not found. GuestVars data will not be available"
Write-Log $msg -Level warning
return ""
}
$arguments = "--cmd `"info-get $GuestVarsPath`""
try {
$ProcessInfo = New-Object System.Diagnostics.ProcessStartInfo
$ProcessInfo.FileName = $vmtoolsd_bin
$ProcessInfo.Arguments = $arguments
$ProcessInfo.RedirectStandardError = $true
$ProcessInfo.RedirectStandardOutput = $true
$ProcessInfo.UseShellExecute = $false
$Process = New-Object System.Diagnostics.Process
$Process.StartInfo = $ProcessInfo
$Process.Start() | Out-Null
$Process.WaitForExit()
$stdout = $Process.StandardOutput.ReadToEnd()
$exitcode = $Process.ExitCode
} catch {
$msg = "vmtoolsd.exe encountered an error. " +
"GuestVars data will not be available"
Write-Log $msg -Level warning
return ""
}
if ($exitcode -eq 0) {
return $stdout.Trim()
} else {
return ""
}
}
function _parse_config {
# Parse config options that are in the format key=value. These can be passed
# on the cli, guestvars, or tools.conf
#
# Used by:
# - Get-ConfigCLI
# - Get-ConfigGuestVars
# - Get-ConfigToolsConf
#
# Args:
# KeyValues (string[])
# A list of string values in the key=value format
#
# Returns:
# A hash table containing the config options and their values
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String[]] $KeyValues
)
$config_options = @{}
foreach ($key_value in $KeyValues.Split()) {
if ($key_value -like "*=*") {
Write-Log "Found config: $key_value" -Level debug
$key, $value = $key_value -split "="
if ($value) {
$config_options[$key.ToLower()] = $value.ToLower()
} else {
Write-Log "No config value specified: $key_value" -Level warning
}
} else {
Write-Log "Invalid config format ignored: $key_value" -Level warning
}
}
$count = $config_options.Count
Write-Log "Found $count config options" -Level debug
return $config_options
}
function Get-ConfigCLI {
# Get salt-minion configuration options from arguments passed on the
# command line. These key/value pairs are already in the ConfigOptions
# variable populated by the powershell cli parser. They should be a space
# delimited list of options in the key=value format.
#
# Used by:
# - Get-MinionConfig
#
# Return hashtable
Write-Log "Checking for CLI config options" -Level debug
if ($ConfigOptions) {
return _parse_config $ConfigOptions
} else {
Write-Log "Minion config not passed on CLI" -Level debug
}
}
function Get-ConfigGuestVars {
# Get salt-minion configuration options defined in the guestvars. That
# should be a space delimited list of options in the key=value format.
#
# Used by:
# - Get-MinionConfig
#
# Return hashtable
Write-Log "Checking for GuestVars config options" -Level debug
$config_options = Get-GuestVars -GuestVarsPath $guestvars_salt_args
if ($config_options) {
return _parse_config $config_options
} else {
Write-Log "Minion config not defined in guestvars" -Level debug
}
}
function Read-IniContent {
# Create a hash table with values from an ini file. Each section will
# contain a sub hash table with key/value pairs
#
# Used by:
# - Get-ConfigToolsConf
#
# Args:
# FilePath (string): The location of the ini file to read
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $FilePath
)
if (!(Test-Path -Path $FilePath)) {
Write-Log "File not found: $FilePath" -Level warning
return @{}
}
$ini = @{}
switch -regex -file $FilePath {
# [Section]
"^(?![#,;])\[(.+)\]$" {
$section = $matches[1]
$ini[$section.Trim()] = @{}
}
# key=value
"^(?![#,;])(.+?)\s*=(.*)$" {
$key,$value = $matches[1..2]
$ini[$section.Trim()][$key.Trim()] = $value.Trim()
}
}
return $ini
}
function Get-ConfigToolsConf {
# Get salt-minion configuration options defined in tools.conf. That should
# be all keys/value pairs under the [salt_minion] section of the tools.conf
# ini file.
#
# Used by:
# - Get-MinionConfig
#
# Return hashtable
if ( !$vmtools_conf_file -or !(Test-Path $vmtools_conf_file) ) {
Write-Log "tools.conf not found" -Level debug
return @{}
}
$config_options = Read-IniContent -FilePath $vmtools_conf_file
Write-Log "Checking for tools.conf config options" -Level debug
if ($config_options.ContainsKey($guestvars_section)) {
$count = $config_options[$guestvars_section].Count
Write-Log "Found $count config options" -Level debug
return $config_options[$guestvars_section]
} else {
Write-Log "Minion config not defined in tools.conf" -Level debug
return @{}
}
}
function Get-MinionConfig {
# Get the minion config values to be placed in the minion config file. The
# Order of priority is as follows:
# - Get config from GuestVars (defined by VMware Tools)
# - Get config from tools.conf (defined by VMware Tools - older method),
# overwrites guestVars with the same name
# - Get config from the CLI (options passed to the script), overwrites
# guestVars and tools.conf settings with the same name
# - No config found, use Salt minion defaults (master: salt, id: hostname)
#
# Used by:
# - Add-MinionConfig
#
# Returns a hash table of options or null if no options found
Write-Log "Getting minion config" -Level info
$config_options = @{}
# Get guestVars config, conflicting values will be overwritten by guestvars
$gv_config = Get-ConfigGuestVars
if ($gv_config) {
foreach ($row in $gv_config.GetEnumerator()) {
if ($row.Value) {
$config_options[$row.Name] = $row.Value
}
}
}
# Get tools.conf config first
$tc_config = Get-ConfigToolsConf
if ($tc_config) {
foreach ($row in $tc_config.GetEnumerator()) {
if ($row.Value) {
$config_options[$row.Name] = $row.Value
}
}
}
# Get cli config, conflicting values will be overwritten by cli
$cli_config = Get-ConfigCLI
if ($cli_config) {
foreach ($row in $cli_config.GetEnumerator()) {
if ($row.Value) {
$config_options[$row.Name] = $row.Value
}
}
}
return $config_options
}
function Get-IsReparsePoint {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path
)
$fd_path = Get-Item -Path $Path
return [bool]($fd_path.Attributes -band [IO.FileAttributes]::ReparsePoint)
}
function Get-IsSecureOwner {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path
)
$acl = Get-Acl -Path $Path
$owner = (($acl | Select-Object Owner).Owner).ToLower()
if ($owner -eq "nt authority\system") {
return $true
}
if ($owner -eq "builtin\administrators") {
return $true
}
return $false
}
function Set-Security {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path,
[Parameter(Mandatory=$false)]
[String] $Owner = "BUILTIN\Administrators"
)
Write-Log "Setting Security: $Path" -Level info
Write-Log "Getting ACL: $Path" -Level debug
$path_acl = Get-Acl -Path $Path
Write-Log "Setting Sddl" -Level debug
$Sddl = 'D:PAI(A;OICI;0x1200a9;;;WD)(A;OICI;FA;;;SY)(A;OICI;FA;;;BA)'
$path_acl.SetSecurityDescriptorSddlForm($Sddl)
Write-Log "Setting Owner" -Level debug
$path_acl.SetOwner([System.Security.Principal.NTAccount]"$Owner")
Write-Log "Writing New ACL" -Level debug
Set-Acl -Path $Path -AclObject $path_acl
}
function New-SecureDirectory {
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[String] $Path
)
if (Test-Path -Path $Path) {
if (Get-IsReparsePoint -Path $Path) {
Write-Log "Found reparse point: $Path" -Level warning
Write-Log "Renaming reparse point (.insecure): $Path" -Level warning
Move-item -Path $Path `
-Destination "$Path-$script_date.insecure" | Out-Null
$msg = "Insecure reparse point renamed: $Path-$script_date.insecure"
Write-Log $msg -Level debug
}
}
if (Test-Path -Path $Path) {
if (!(Get-IsSecureOwner -Path $Path)) {
Write-Log "Found insecure owner: $Path" -Level warning
Write-Log "Renaming file/dir (.insecure): $Path" -Level warning
Move-Item -Path $Path `
-Destination "$Path-$script_date.insecure" | Out-Null
$msg = "Insecure file/dir renamed: $Path-$script_date.insecure"
Write-Log $msg -Level debug
}
}
$tries = 1
$max_tries = 5
while ($true) {
# Remove any existing file or directory if it exists
if (Test-Path -Path $Path) {
Write-Log "Removing existing file/directory: $Path" -Level debug
Remove-FileOrFolder -Path $Path
}
$msg = "Creating secure directory (try: $tries/$max_tries): $Path"
Write-Log $msg -Level debug
try {
New-Item -Path $Path -Type Directory | Out-Null
} catch {
if ($tries -le $max_tries) {
$msg = "Failed to create directory: $Path. Trying again..."
Write-Log $msg -Level warning
$tries++
continue
} else {
$msg = "Failed to create secure directory. Try limit exceeded."
Write-Log $msg -Level error
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
Set-Security -Path $Path
if((Get-ChildItem -Path $Path | Measure-Object).Count -ne 0) {
# Someone is competing with us
if ($tries -le $max_tries) {
$msg = "Expected empty directory. Trying again..."
Write-Log $msg -Level warning
$tries += 1
continue
} else {
$msg = "Expected empty directory. Try limit exceeded."
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
Write-Log "Secure directory created successfully" -Level debug
break
}
}
function Add-MinionConfig {
# Write minion config options to the minion config file
# New-SecureDirectory will handle reparse points and ownership issues
New-SecureDirectory -Path $base_salt_config_location
# Child directories will inherit permissions from the parent
if ( !( Test-Path -path $salt_root_dir ) ) {
New-Item -Path $salt_root_dir -Type Directory | Out-Null
}
if ( !( Test-Path -path $salt_config_dir ) ) {
New-Item -Path $salt_config_dir -Type Directory | Out-Null
}
if ( !( Test-Path -path $salt_pki_dir ) ) {
New-Item -Path "$salt_pki_dir" -Type Directory | Out-Null
}
if ( !( Test-Path -path $salt_log_dir ) ) {
New-Item -Path "$salt_log_dir" -Type Directory | Out-Null
}
# Create additional directories
$cache_dir = "$salt_root_dir\var\cache\salt\minion"
if ( !( Test-Path -path "$salt_config_dir\minion.d" ) ) {
New-Item -Path "$salt_config_dir\minion.d" -Type Directory | Out-Null
}
if ( !( Test-Path -path "$cache_dir\extmods\grains" ) ) {
New-Item -Path "$cache_dir\extmods\grains" -Type Directory | Out-Null
}
if ( !( Test-Path -path "$cache_dir\proc" ) ) {
New-Item -Path "$cache_dir\proc" -Type Directory | Out-Null
}
if ( !( Test-Path -path "$salt_root_dir\var\run" ) ) {
New-Item -Path "$salt_root_dir\var\run" -Type Directory | Out-Null
}
# Get the minion config
$config_options = Get-MinionConfig
if ($config_options.Count -eq 0) {
Write-Log "No minion config found. Defaults will be used" -Level debug
}
# These settings are for pre 3004 versions of Salt
# Add root_dir to point to ProgramData
$config_options["root_dir"] = $salt_root_dir
# Add log_file to point to ProgramData
$config_options["log_file"] = "$salt_log_dir\minion"
$new_content = New-Object System.Collections.Generic.List[String]
$comment = "# Minion configuration file - created by VMTools Salt script"
$new_content.Add($comment)
foreach ($row in $config_options.GetEnumerator()) {
$new_content.Add("$($row.Name): $($row.Value)") | Out-Null
}
$config_content = $new_content -join "`r`n"
try {
Write-Log "Writing minion config" -Level info
Set-Content -Path $salt_config_file -Value $config_content
Write-Log "Finished writing minion config" -Level debug
} catch {
$msg = "Failed to write minion config: $config_content : $_"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
function Start-MinionService {
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[String] $ServiceName = "salt-minion"
)
try {
$service = Get-Service -Name $ServiceName
} catch {
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
# We'll hard fail here because the service is not present
Write-Log "$ServiceName is not installed" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
# Not sure this is needed as the Start-Service cmdlet seems to wait until
# the service is started before returning
$tries = 1
$max_tries = 5
while ($service.Status -ne "Running") {
if ($service.Status -eq "Stopped") {
# Start the minion service
Write-Log "Starting the $ServiceName service" -Level info
try {
Start-Service -Name $ServiceName *> $null
} catch {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
$service.Refresh()
if ($service.Status -eq "Running") {
Write-Log "Service started successfully" -Level debug
} else {
if ($tries -le $max_tries) {
$msg = "Service not started. Waiting 1 second to try again..."
Write-Log $msg -Level debug
$tries += 1
Start-Sleep -Seconds 1
} else {
$msg = "Failed to start the $ServiceName service. "
$msg += "Exceeded max tries"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
}
function Stop-MinionService {
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[String] $ServiceName = "salt-minion"
)
try {
$service = Get-Service -Name $ServiceName
} catch {
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
# We'll return here because we don't need to stop a service that
# isn't installed
Write-Log "$ServiceName is not installed" -Level info
return
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
# Not sure this is needed as the Stop-Service cmdlet seems to wait until
# the service is stopped before returning
$tries = 1
$max_tries = 5
while ($service.Status -ne "Stopped") {
if (($service.Status -eq "Running") -or `
($service.Status -eq "Paused")) {
# Start the minion service
Write-Log "Stop the $ServiceName service" -Level info
try {
Stop-Service -Name $ServiceName *> $null
} catch {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
$service.Refresh()
if ($service.Status -eq "Stopped") {
Write-Log "Service stopped successfully" -Level debug
} else {
if ($tries -le $max_tries) {
$msg = "Service not stopped. Waiting 1 second to try again..."
Write-Log $msg -Level debug
$tries += 1
Start-Sleep -Seconds 1
} else {
$msg = "Failed to stop the $ServiceName service. "
$msg += "Exceeded max tries"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
}
function Get-RandomizedMinionId {
# Generate a randomized minion id
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[String] $Prefix = "minion",
[Parameter(Mandatory=$false)]
[String] $Length = 5
)
$chars = (0x30..0x39) + ( 0x41..0x5A) + ( 0x61..0x7A)
$rand_chars = $chars | Get-Random -Count $Length
$rand_string = -join ($rand_chars | ForEach-Object {[char]$_})
return -join ($Prefix, "_", $rand_string)
}
############################### MAIN FUNCTIONS #################################
function Confirm-Dependencies {
# Check that the required dependencies for this script are present on the
# system
#
# Return:
# Bool: False if missing dependencies, otherwise True
$deps_present = $true
Write-Log "Checking dependencies" -Level info
# Files required by this script
$salt_dep_files = @{}
# $salt_dep_files["dep_name.exe"] = "path\to\dep_name.exe"
foreach ($file in $salt_dep_files.Keys) {
Write-Log "Looking for $file in $($salt_dep_files[$file])" -Level debug
if(!(Test-Path("$($salt_dep_files[$file])\$file"))) {
$msg = "Unable to find $file in $($salt_dep_files[$file])"
Write-Log $msg -Level error
$deps_present = $false
}
}
return $deps_present
}
function Get-SaltVersion {
# This function is needed for unit testing
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path
)
if ( Test-Path -Path "$Path\salt-call.exe" ) {
# 3006 and later packages
Write-Log "Running: $Path\salt-call.exe" -Level debug
$ver = . $Path\salt-call.exe --version
} elseif ( Test-Path -Path "$Path\bin\python.exe" ) {
# Pre 3006 Packages
$python_bin = "$Path\bin\python.exe"
Write-Log "Running: $python_bin" -Level debug
$ver = . $python_bin -E -s $Path\bin\Scripts\salt-call --version
} elseif ( Test-Path -Path "$Path\bin\salt.exe" ) {
# Tiamat Packages
Write-Log "Running: $Path\bin\salt.exe" -Level debug
$ver = . $Path\bin\salt.exe --version
}
return $ver.Trim("salt-call ")
}
function Find-StandardSaltInstallation {
# Find an existing standard Salt installation
#
# Return:
# Bool: True if standard installation found, otherwise False
# First we'll look for the install_dir registry entry
# If we find that, we'll use it to detect the version
# This works for 3004 and newer versions of Salt
$salt_path = $null
try {
$dir_path = (Get-Item -Path $salt_base_reg).GetValue("install_dir")
} catch {}
if ($dir_path -ne $null) {
$dir_path = [System.Environment]::ExpandEnvironmentVariables($dir_path)
Write-Host $dir_path
if ( Test-Path -Path $dir_path ) {
$version = Get-SaltVersion -Path $dir_path
Write-Log "Standard Installation detected" -Level error
Write-Log "Version: $version" -Level error
Write-Log "Path: $dir_path" -Level error
return $true
}
}
# We'll look in the old C:\salt location for python.exe
# This handles all older versions of Salt
if (Test-Path -Path "C:\salt\bin\python.exe") {
$version = Get-SaltVersion -Path "C:\salt"
Write-Log "Standard Installation detected" -Level error
Write-Log "Version: $version" -Level error
Write-Log "Path: C:\salt" -Level error
return $true
}
Write-Log "Standard Installation not detected" -Level debug
return $false
}
function Convert-PSObjectToHashtable {
param (
[Parameter(ValueFromPipeline)]
$InputObject
)
if ($null -eq $InputObject) { return $null }
$is_enum = $InputObject -is [System.Collections.IEnumerable]
$not_string = $InputObject -isnot [string]
if ($is_enum -and $not_string) {
$collection = @(
foreach ($object in $InputObject) {
Convert-PSObjectToHashtable $object
}
)
Write-Output -NoEnumerate $collection
} elseif ($InputObject -is [PSObject]) {
$hash = @{}
foreach ($property in $InputObject.PSObject.Properties) {
$hash[$property.Name] = Convert-PSObjectToHashtable $property.Value
}
$hash
} else {
$InputObject
}
}
function Get-MajorVersion {
# Parses a version string and returns the major version
#
# Args:
# Version (string): The Version to parse
[CmdletBinding()]
param(
[Parameter(Mandatory=$true, Position=0)]
[String] $Version
)
if ( !($Version.Contains(".")) -and ($Version.ToLower() -ne "latest")) {
return $Version
}
try {
$parsed_version = [System.Version]::Parse($Version)
return $parsed_version.Major.ToString()
} catch {
# We might hit this if there is text in the minor version
$regex = [regex]"^(\d+)\.([\w\-]+)$"
$match = $regex.Match($Version)
if ( $match.Success ) {
return $match.Groups[1].Value
}
}
return ""
}
function Get-SaltPackageInfo {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $MinionVersion
)
if ( $MinionVersion.ToLower() -ne "latest" ) {
# A specific version has been passed.
# Let's check if we're looking at the default location hosted by Salt
# If we are, we'll want to adjust for pre-3006 versions if passed
# If the user specified a Source, we just trust they have it set up for
# the version they are passing
$uri = [System.Uri]($base_url)
if ( $uri.AbsoluteUri -eq $default_source ) {
# Let's check for a pre 3006 version
$major_version = Get-MajorVersion -Version $MinionVersion
if ( $major_version -lt "3006" ) {
# This is an older version, use the older URL
$base_url = $pre_3006_source
} else {
# This is a new URL, and a version was passed, let's look in
# minor
if ( $MinionVersion.ToLower() -ne $major_version.ToLower() ) {
$base_url = "$base_url/minor"
}
}
}
}
$enc = [System.Text.Encoding]::UTF8
try {
$response = Invoke-WebRequest -Uri "$base_url/repo.json" `
-UseBasicParsing
if ($response.Content.GetType().Name -eq "Byte[]") {
$psobj = $enc.GetString($response.Content) | ConvertFrom-Json
} else {
$psobj = $response.Content | ConvertFrom-Json
}
$hash = Convert-PSObjectToHashtable $psobj
} catch {
Write-Log "repo.json not found at: $base_url" -Level debug
$hash = @{}
}
$salt_file_name = ""
$salt_version = ""
$salt_sha512 = ""
$search_version = $MinionVersion.ToLower()
if ($hash.Contains($search_version)) {
foreach ($item in $hash.($search_version).Keys) {
if ($item.EndsWith(".zip")) {
if ($item.Contains("amd64")) {
$salt_file_name = $hash.($search_version).($item).name
$salt_version = $hash.($search_version).($item).version
$salt_sha512 = $hash.($search_version).($item).SHA512
}
}
}
}
if ($salt_file_name -and $salt_version -and $salt_sha512) {
$salt_url = @($base_url, $salt_version, $salt_file_name) -join "/"
$major_version = Get-MajorVersion -Version $salt_version
if ( $major_version -ge "3006" ) {
if ( !($base_url.Contains("minor")) ) {
$salt_url = @(
$base_url, "minor", $salt_version, $salt_file_name
) -join "/"
}
}
Write-Log "Found installer: $salt_file_name" -Level debug
Write-Log "Found version: $salt_version" -Level debug
Write-Log "Found sha512: $salt_sha512" -Level debug
Write-Log "Found URL: $salt_url" -Level debug
return @{
url = $salt_url;
hash = $salt_sha512;
file_name = $salt_file_name;
version = $salt_version
}
} else {
# Since there's no repo.json, we need to look in the directory for the
# URL and HASH. The version can also be `latest` but expects a symlink
# named `latest` that points to the directory containing the latest
# version of Salt
$salt_file_name = $null
$salt_version = $null
# Fix URL
$major_version = Get-MajorVersion -Version $search_version
if ( $major_version -ge "3006" ) {
if ( !($base_url.Contains("minor")) ) {
$base_url = @($base_url, "minor") -join "/"
}
}
# Invoke-WebRequest will not work on a local file directory so we need
# to detect the URL scheme. Use Invoke-WebRequest to get the directory
# contents if URL scheme is http/https/ftp. Not tested with FTP
if ($base_url -match "^(http\:|https\:|ftp\:).*") {
$dir_url = @($base_url, $search_version) -join "/"
Write-Log "Looking for version in web directory: $dir_url" `
-Level debug
try {
$dir_contents = Invoke-WebRequest -Uri $dir_url -UseBasicParsing
} catch {
Write-Log "Directory not found: $dir_url" -Level debug
return @{}
}
# Look for the zip file in the directory
foreach ($link in $dir_contents.Links) {
if ($link.href.EndsWith(".zip")) {
if ($link.href.Contains("-amd64")) {
$salt_file_name = $link.href
}
}
}
}
# Get the directory contents if URL is Drive Letter or UNC
elseif ($base_url -match "^(\w\:|\\\\).*") {
$dir_url = "$base_url\$search_version"
Write-Log "Looking for version in local directory: $dir_url" `
-Level debug
try {
$salt_file_name = Get-ChildItem -Path $dir_url -Filter "*.zip"
} catch {
Write-Log "Directory not found: $dir_url" -Level debug
return @{}
}
if ($salt_file_name.Length -gt 0) {
$salt_file_name = $salt_file_name[0].Name
}
} else {
Write-Log "Unknown source url type: $dir_url" -Level debug
return @{}
}
# Verify that we found a file name
if ($salt_file_name.Length -eq 0) {
Write-Log "Zip file not found in directory: $dir_url" -Level debug
return @{}
}
# Since we have a zip file, get the version and sha file from it
if ( $salt_file_name.Contains("onedir") ) {
$salt_version = (
$salt_file_name -split "-onedir-"
)[0].Split("-", 2)[1]
} else {
$salt_version = (
$salt_file_name -split "-windows-"
)[0].Split("-", 2)[1]
}
$sha_file_name = "salt-$($salt_version)_SHA512"
# Get the contents of the sha file
try {
# We can use Invoke-WebRequest as long as we're looking at a file
$response = Invoke-WebRequest -Uri "$dir_url/$sha_file_name" `
-UseBasicParsing
} catch {
Write-Log "Could not retrieve sha file: $dir_url/$sha_file_name" `
-Level debug
return @{}
}
$salt_sha512 = $null
# Get the sha out of the sha file
ForEach ($line in $response.RawContent.Split([Environment]::NewLine)) {
if ($line.EndsWith(".zip")) {
$salt_sha512 = $line.Split()[0]
}
}
# Verify that a sha was retrieved
if ($null -eq $salt_sha512) {
Write-Log "Sha not found in file: $dir_url/$sha_file_name" `
-Level debug
return @{}
}
Write-Log "Found installer: $salt_file_name" -Level debug
Write-Log "Found version: $salt_version" -Level debug
Write-Log "Found sha512: $salt_sha512" -Level debug
return @{
url = @($dir_url, $salt_file_name) -join "/";
hash = $salt_sha512;
file_name = $salt_file_name;
version = $salt_version
}
}
}
function Get-FileHash {
# Get-FileHash is a built-in cmdlet in powershell 5+ but we need to support
# powershell 3. This will overwrite the powershell 5 commandlet only for
# this script. But it will provide the missing cmdlet for powershell 3
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path,
[Parameter(Mandatory=$false)]
[ValidateSet(
"SHA1",
"SHA256",
"SHA384",
"SHA512",
# https://serverfault.com/questions/820300/
# why-isnt-mactripledes-algorithm-output-in-powershell-stable
"MACTripleDES", # don't use
"MD5",
"RIPEMD160",
IgnoreCase=$true)]
[String] $Algorithm = "SHA256"
)
if ( !(Test-Path $Path) ) {
Write-Log "Invalid path for hashing: $Path" -Level debug
return @{}
}
if ( (Get-Item -Path $Path) -isnot [System.IO.FileInfo]) {
Write-Log "Not a file for hashing: $Path" -Level debug
return @{}
}
$Path = Resolve-Path -Path $Path
Switch ($Algorithm) {
SHA1 {
# We're doing this in 2 lines to comply with the 80 char limit
$hasher = [System.Security.Cryptography.SHA1CryptoServiceProvider]
$hasher = $hasher::Create()
}
SHA256 {
$hasher = [System.Security.Cryptography.SHA256]::Create()
}
SHA384 {
$hasher = [System.Security.Cryptography.SHA384]::Create()
}
SHA512 {
$hasher = [System.Security.Cryptography.SHA512]::Create()
}
MACTripleDES {
$hasher = [System.Security.Cryptography.MACTripleDES]::Create()
}
MD5 {
$hasher = [System.Security.Cryptography.MD5]::Create()
}
RIPEMD160 {
$hasher = [System.Security.Cryptography.RIPEMD160]::Create()
}
}
Write-Log "Hashing using $Algorithm algorithm" -Level debug
try {
$data = [System.IO.File]::OpenRead($Path)
$hash = $hasher.ComputeHash($data)
$hash = [System.BitConverter]::ToString($hash) -replace "-",""
return @{
Path = $Path;
Algorithm = $Algorithm.ToUpper();
Hash = $hash
}
} catch {
Write-Log "Error hashing: $Path" -Level debug
return @{}
} finally {
if ($null -ne $data) {
$data.Close()
}
}
}
function Get-SaltFromWeb {
# Download the Salt OneDir zip file from the web and verify the hash
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
# Make sure the download directory exists
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Url,
[Parameter(Mandatory=$true)]
[String] $Destination,
[Parameter(Mandatory=$true)]
[String] $Hash
)
# Download the Salt file
Write-Log "Downloading Salt" -Level info
Get-WebFile -Url $Url -OutFile $Destination
# Get the hash for the Salt file
$file_hash = (Get-FileHash -Path $Destination -Algorithm SHA512).Hash
Write-Log "Verifying hash" -Level info
if ($file_hash -like $Hash) {
Write-Log "Hash verified" -Level debug
} else {
Write-Log "Failed to verify hash:" -Level error
Write-Log " - $file_hash" -Level error
Write-Log " - $Hash" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
function New-SaltCallScript {
# Create the salt-call.bat script for Tiamat builds
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
# The location to create the script
[String] $Path
)
$content = @(
":: Copyright (c) 2021-2023 VMware, Inc. All rights reserved.",
"",
":: Script for starting the Salt-Minion",
":: Accepts all parameters that Salt-Minion Accepts",
"@ echo off",
"",
":: Define Variables",
"Set SaltBin=%~dp0\salt\salt.exe",
"",
"net session >nul 2>&1",
"if %errorLevel%==0 (",
" :: Launch Script",
" `"%SaltBin%`" call %*",
") else (",
" echo ***** This script must be run as Administrator *****",
")"
)
$file_content = $content -join "`r`n"
Set-Content -Path $Path -Value $file_content
}
function New-SaltMinionScript {
# Create the salt-minion.bat script for Tiamat builds
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
# The location to create the script
[String] $Path
)
$content = @(
":: Copyright (c) 2021-2023 VMware, Inc. All rights reserved.",
"",
":: Script for starting the Salt-Minion"
":: Accepts all parameters that Salt-Minion Accepts",
"@ echo off",
"",
":: Define Variables",
"Set SaltBin=%~dp0\salt\salt.exe",
"",
"net session >nul 2>&1",
'if %errorLevel%==0 (',
" :: Launch Script",
" `"%SaltBin%`" minion %*",
") else (",
" echo ***** This script must be run as Administrator *****",
")"
)
$file_content = $content -join "`r`n"
Set-Content -Path $Path -Value $file_content
}
function Install-SaltMinion-Tiamat {
# Installs the Tiamat build of the Salt minion. Performs the following:
# - Copies the helper scripts into C:\ProgramFiles\Salt Project\Salt
# - Registers the salt-minion service
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
# 1. Copy the helper scripts into Program Files
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Version
)
Write-Log "Copying scripts ($Version)" -Level info
try {
Write-Log "Creating $salt_dir\salt-call.bat" -Level debug
New-SaltCallScript -Path "$salt_dir\salt-call.bat"
} catch {
Write-Log "Failed to create $salt_dir\salt-call.bat" -Level error
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
try {
Write-Log "Creating $salt_dir\salt-minion.bat" -Level debug
New-SaltMinionScript -Path "$salt_dir\salt-minion.bat"
} catch {
Write-Log "Failed to create $salt_dir\salt-minion.bat" -Level error
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
# 2. Register the salt-minion service
Write-Log "Registering the salt-minion service ($Version)" -Level info
& $ssm_bin install salt-minion "$salt_bin" `
"minion -c """"$salt_config_dir"""" -l quiet" *> $null
$description = "Salt Minion from VMware Tools ($Version)"
& $ssm_bin set salt-minion Description $description
}
function Install-SaltMinion-Relenv {
# Installs the Relenv build of the Salt minion. Performs the following:
# - Registers the salt-minion service
# 1. Register the salt-minion service
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Version
)
Write-Log "Registering the salt-minion service ($Version)" -Level info
#
& $ssm_bin install salt-minion "$salt_minion_bin" `
"-c """"$salt_config_dir"""" -l quiet" *> $null
$description = "Salt Minion from VMware Tools ($Version)"
& $ssm_bin set salt-minion Description $description
}
function Install-SaltMinion
{
# Installs the Salt minion. Performs the following:
# - Expands the zipfile into C:\Program Files\Salt Project
# - Detects Relenv vs Tiamat build and calls the appropriate install
# function
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
# 1. Unzip into Program Files
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String] $Path,
[Parameter(Mandatory=$true)]
[String] $Version
)
Write-Log "Unzipping Salt (this may take a few minutes)" -Level info
Expand-ZipFile -ZipFile $Path -Destination $base_salt_install_location
Write-Log "Removing zipfile: $Path" -Level debug
Remove-Item -Path $Path
# 2. Determine if this is a Tiamat package or a Relenv package
# - salt-minion.exe in the root = Relenv = post-3005
# - salt\salt.exe in the root = Tiamat = pre-3006
if ( Test-Path -Path "$salt_minion_bin") {
Write-Log "Found post-3005 Package"
Install-SaltMinion-Relenv -Version $Version
}
elseif ( Test-Path -Path "$salt_bin" ) {
Write-Log "Found pre-3006 Package"
Install-SaltMinion-Tiamat -Version $Version
} else {
Write-Log "Unknown Package Type" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
# Common service settings
Write-Log "Configuring the salt-minion service" -Level info
& $ssm_bin set salt-minion Start SERVICE_AUTO_START *> $null
& $ssm_bin set salt-minion AppStopMethodConsole 24000 *> $null
& $ssm_bin set salt-minion AppStopMethodWindow 2000 *> $null
& $ssm_bin set salt-minion AppRestartDelay 60000 *> $null
# 3. Verify that the service is installed
try {
Get-Service -Name salt-minion
Write-Log "salt-minion service installed successfully" -Level debug
} catch {
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
$msg = "Failed to install salt-minion service"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
# 4. Modify the system path
Write-Log "Adding Salt to the path" -Level info
Add-SystemPathValue -Path $salt_dir
}
function Remove-SaltMinion {
# Uninstall the Salt minion. Performs the following steps:
# - Stop the salt-minion service
# - Remove the salt-minion service
# - Remove the directories in Program Files and ProgramData
# - Remove the registry entries
# - Remove the entry from the system path
#
# Error:
# Sets the failed status and exits with a scriptFailed exit code
# Does the service exist
try {
# This command will throw an exception if the service is missing
$service = Get-Service -Name salt-minion
# Stop the minion service
Stop-MinionService
# Delete the service
Write-Log "Uninstalling salt-minion service" -Level info
$service = Get-WmiObject -Class Win32_Service `
-Filter "Name='salt-minion'"
$service.delete() *> $null
try {
# This command will throw an exception if the service is missing
$service = Get-Service -Name salt-minion
# If we were able to connect to the service, no exception thrown,
# then we failed to remove the service
Write-Log "Failed to uninstall salt-minion service" -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
} catch {
# This would catch a missing service after the removal meaning the
# service was removed successfully
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
$msg = "Finished uninstalling salt-minion service"
Write-Log $msg -Level debug
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
} catch {
# This would catch a missing service before trying to Stop and Remove it
# That would mean the service is already removed
switch ($_.FullyQualifiedErrorId.Split(",")[0]) {
"NoServiceFoundForGivenName" {
# We'll return here because we don't need to remove a service
# that isn't installed
Write-Log "salt-minion service not found" -Level warning
}
Default {
Write-Log $_ -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
}
}
# 3. Remove the files
# Do this in a for loop for logging
foreach ($item in $file_dirs_to_remove) {
Remove-FileOrFolder -Path $item
}
# 4. Remove entry from the path
Remove-SystemPathValue -Path $salt_dir
}
function Reset-SaltMinion {
# Resets the salt-minion environment in preperation for imaging. Performs
# the following steps:
# - Remove minion_id file
# - Randomize the minion id in the minion config
# - Remove the minion public and private keys
Write-Log "Resetting Salt minion" -Level info
Remove-FileOrFolder "$salt_config_file\minion_id"
# Comment out id: in the minion config
$new_content = New-Object System.Collections.Generic.List[String]
if (Test-Path -Path "$salt_config_file") {
Write-Log "Searching minion config file for id" -Level debug
foreach ($line in Get-Content $salt_config_file) {
if ($line -match "^id:.*$") {
Write-Log "Commenting out the id" -Level debug
$new_content.Add("#" + $line) | Out-Null
$random_id = Get-RandomizedMinionId -Prefix $line.Split("")[1]
$new_content.Add("id: $random_id") | Out-Null
} else {
$new_content.Add($line) | Out-Null
}
}
$config_content = $new_content -join "`r`n"
Write-Log "Writing new minion config"
try {
Set-Content -Path $salt_config_file -Value $config_content
} catch {
Write-Log "Failed to write new minion config : $_" -Level error
exit $STATUS_CODES["scriptFailed"]
}
}
# Remove minion keys (minion.pem and minion.pub"
Remove-FileOrFolder -Path "$salt_pki_dir\minion.pem"
Remove-FileOrFolder -Path "$salt_pki_dir\minion.pub"
Write-Log "Salt minion reset successfully" -Level info
}
function Install {
# Set status and update the log
Write-Log "Installing Salt minion" -Level info
Set-Status installing
# Make sure the base install location exists
if ( !( Test-Path -Path $base_salt_install_location) ) {
Write-Log "Creating directory: $base_salt_install_location" -Level debug
New-Item -Path $base_salt_install_location -Type Directory | Out-Null
}
# Get URL from repo.json
$info = Get-SaltPackageInfo -MinionVersion $MinionVersion
if ($info.Count -eq 0) {
$msg = "Failed to get Package Info for Version: $MinionVersion"
Write-Log $msg -Level error
Set-FailedStatus
exit $STATUS_CODES["scriptFailed"]
}
$zip_file = "$base_salt_install_location\$($info.file_name)"
# Download Salt from the Web
Get-SaltFromWeb -Url $info.url -Destination $zip_file -Hash $info.hash
# Install the Salt Package
Install-SaltMinion -Path $zip_file -Version $info.version
# Generate and update the minion config
Add-MinionConfig
# Start the Minion Service
Start-MinionService
# Update the Status and output the Log
Set-Status installed
Write-Log "Salt minion installed successfully" -Level info
}
function Remove {
Write-Log "Removing Salt minion" -Level info
Set-Status removing
Remove-SaltMinion
Set-Status notInstalled
Write-Log "Salt minion removed successfully" -Level info
}
################################### MAIN #######################################
function Main {
# Check for Action. If not specified on the command line, get it from
# guestVars
if ($Install) { $Action = "install" }
if ($Status) { $Action = "status" }
if ($Depend) { $Action = "depend" }
if ($Clear) { $Action = "clear" }
if ($Remove) { $Action = "remove" }
if (!$Action) {
# We're not logging yet because we don't know the status
$Action = Get-GuestVars -GuestVarsPath $guestvars_salt_desired_state
if (!$Action) {
$msg = "No action found in guestVars or specified on CLI"
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
Write-Host "Please specify an action" -ForegroundColor Yellow
return $STATUS_CODES["scriptFailed"]
}
switch ($Action.ToLower()) {
"present" { $Action = "install" }
"absent" { $Action = "remove" }
}
}
if (!($action_list -contains $Action.ToLower())) {
$msg = "Invalid action: $Action - Must be one of [$action_list]"
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
Write-Host "Please specify a valid action" -ForegroundColor Yellow
return $STATUS_CODES["scriptFailed"]
}
# Let's confirm dependencies
if (!(Confirm-Dependencies)) {
Write-Log "Missing script dependencies" -Level error
Write-Host "Missing script dependencies" -ForegroundColor Red
return $STATUS_CODES["scriptFailed"]
}
# Perform the action
switch ($Action.ToLower()) {
"depend" {
# If we've gotten this far, dependencies have been confirmed
Write-Host "Found all dependencies"
return $STATUS_CODES["scriptSuccess"]
}
"install" {
# Let's make sure there's not already a standard Salt installation
# on the system
if (Find-StandardSaltInstallation) {
$msg = "Found an existing Salt installation on the system."
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
return $STATUS_CODES["externalInstall"]
}
# If status is installed, installing, or removing, bail out
$current_status = Get-Status
if ($STATUS_CODES.keys -notcontains $current_status) {
$msg = "Unknown status code: $current_status"
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
return $STATUS_CODES["scriptFailed"]
}
switch ($current_status) {
$STATUS_CODES["installed"] {
Write-Host "Already installed"
return $STATUS_CODES["scriptSuccess"]
}
$STATUS_CODES["installing"] {
Write-Host "Installation in progress"
return $STATUS_CODES["scriptFailed"]
}
$STATUS_CODES["removing"] {
Write-Host "Removal in progress"
return $STATUS_CODES["scriptFailed"]
}
$STATUS_CODES["removeFailed"] {
# We want to clean up anything left behind by a failed
# remove
Remove
}
$STATUS_CODES["installFailed"] {
# We want to clean up anything left behind by a failed
# install
Remove
}
}
Install
Write-Host "Salt minion installed successfully"
return $STATUS_CODES["scriptSuccess"]
}
"remove" {
# Let's make sure we're not trying to remove a standard Salt
# installation on the system
if (Find-StandardSaltInstallation) {
$msg = "Found an existing Salt installation on the system."
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
return $STATUS_CODES["externalInstall"]
}
# If status is installing, notInstalled, or removing, bail out
$current_status = Get-Status
if ($STATUS_CODES.keys -notcontains $current_status) {
$msg = "Unknown status code: $current_status"
Write-Host $msg -Level error
return $STATUS_CODES["scriptFailed"]
}
switch ($current_status) {
$STATUS_CODES["installing"] {
Write-Host "Installation in progress"
return $STATUS_CODES["scriptFailed"]
}
$STATUS_CODES["notInstalled"] {
Write-Host "Already uninstalled"
return $STATUS_CODES["scriptSuccess"]
}
$STATUS_CODES["removing"] {
Write-Host "Removal in progress"
return $STATUS_CODES["scriptFailed"]
}
}
Remove
Write-Host "Salt minion removed successfully"
return $STATUS_CODES["scriptSuccess"]
}
"clear" {
# If not installed (0), bail out
$current_status = Get-Status
if ($STATUS_CODES.keys -notcontains $current_status) {
$msg = "Unknown status code: $current_status"
Write-Host $msg -Level error
return $STATUS_CODES["scriptFailed"]
}
if ($current_status -ne $STATUS_CODES["installed"]) {
Write-Host "Not installed. Reset will not continue"
return $STATUS_CODES["scriptSuccess"]
}
Reset-SaltMinion
Write-Host "Salt minion reset successfully"
return $STATUS_CODES["scriptSuccess"]
}
"status" {
# Let's check for a standard Salt installation first
if (Find-StandardSaltInstallation) {
$msg = "Found an existing Salt installation on the system."
Write-Log $msg -Level error
Write-Host $msg -ForegroundColor Red
return $STATUS_CODES["externalInstall"]
}
$exit_code = Get-Status
if ($STATUS_CODES.keys -notcontains $exit_code) {
Write-Host "Unknown status code: $exit_code"
return $STATUS_CODES["scriptFailed"]
}
Write-Host "Found status: $($STATUS_CODES[$exit_code])"
return $exit_code
}
}
}
# Allow importing for testing
if (($Action) -and ($Action.ToLower() -eq "test")) {
exit $STATUS_CODES["scriptSuccess"]
}
try {
$exit_code = Main
exit $exit_code
} finally {
if ($null -eq $exit_code) {
Write-Host "Script Terminated..."
exit $STATUS_CODES["scriptTerminated"]
}
}
| 0
|
sample_37_95.ps1
|
#
# Module manifest for module 'OCI.PSModules.Containerinstances'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Containerinstances.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '3c897ac4-90c6-4ac2-9c82-899415d38f04'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Containerinstances Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Containerinstances.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIContainerinstancesContainer',
'Get-OCIContainerinstancesContainerInstance',
'Get-OCIContainerinstancesContainersList',
'Get-OCIContainerinstanceshapesList',
'Get-OCIContainerinstancesList',
'Get-OCIContainerinstancesWorkRequest',
'Get-OCIContainerinstancesWorkRequestErrorsList',
'Get-OCIContainerinstancesWorkRequestLogsList',
'Get-OCIContainerinstancesWorkRequestsList',
'Invoke-OCIContainerinstancesRetrieveLogs',
'Move-OCIContainerinstancesContainerInstanceCompartment',
'New-OCIContainerinstancesContainerInstance',
'Remove-OCIContainerinstancesContainerInstance',
'Restart-OCIContainerinstancesContainerInstance',
'Start-OCIContainerinstancesContainerInstance',
'Stop-OCIContainerinstancesContainerInstance',
'Update-OCIContainerinstancesContainer',
'Update-OCIContainerinstancesContainerInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Containerinstances'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
587.ps1
|
function Connect-FTP{
param (
[parameter(Mandatory=$true)]
[string[]]$Name,
[parameter(Mandatory=$false)]
[string]$User,
[parameter(Mandatory=$false)]
[int]$Port,
[switch]$Secure,
[parameter(Mandatory=$false)]
[string]$PrivatKey
)
if (Get-Command "winscp"){
$Servers = Get-RemoteConnection -Name $Name
if(!(Get-ChildItem -Path $PSconfigs.Path -Filter $PStemplates.WinSCP.Name -Recurse)){
Write-Host "Copy $($PStemplates.WinSCP.Name) file to the config folder"
Copy-Item -Path $PStemplates.WinSCP.FullName -Destination (Join-Path -Path $PSconfigs.Path -ChildPath $PStemplates.WinSCP.Name)
}
$IniFile = $(Get-ChildItem -Path $PSconfigs.Path -Filter $PStemplates.WinSCP.Name -Recurse).FullName
$SftpPort = 22
$FtpPort = 21
foreach($Server in $Servers){
if(!$Port){
$Server.Protocol | %{
if($_.Name -eq "ftp"){
$Protocol = "ftp"
if($_.Port -ne ""){
$Port = $_.Port
}else{
$Port = $FtpPort
}
}elseif($_.Name -eq "sftp"){
$Protocol = "sftp"
if($_.Port -ne ""){
$Port = $_.Port
}else{
$Port = $SftpPort
}
}
}
}
if(!$Port -or $Port -eq 0){
if($Secure){
$Port = $SftpPort
}else{
$Port = $FtpPort
}
}
if(!$Protocol){
if($Secure){
$Protocol = "sftp"
}else{
$Protocol = "ftp"
}
}
$Servername = $Server.Name
if(!$User){$User = $Server.User}
if(!$PrivatKey){$PrivatKey = Invoke-Expression ($Command = '"' + $Server.PrivatKey + '"')}
if($PrivatKey){
Invoke-Expression ("WinSCP $Protocol"+"://$User@$Servername"+":$Port"+" /privatekey='$PrivatKey'" + " /ini=$IniFile")
}else{
Invoke-Expression ("WinSCP $Protocol"+"://$User@$Servername"+":$Port" + " /ini=$IniFile")
}
}
}
}
| 0
|
2807.ps1
|
if (Get-Command logparser.exe) {
$lpquery = @"
SELECT
COUNT(Value) as ct,
Value
FROM
*LogUserAssist.tsv
GROUP BY
Value
ORDER BY
ct ASC
"@
& logparser -stats:off -i:csv -dtlines:0 -fixedsep:on -rtp:-1 "$lpquery"
} else {
$ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName)
"${ScriptName} requires logparser.exe in the path."
}
| 0
|
Compare-Drive.ps1
|
param($ComputerName1,$ComputerName2)
$a = gwmi win32_volume -filter "DriveType=3" -computername $ComputerName1 | where {@('Y:','Z:') -notcontains $_.DriveLetter} | select name, @{n='capacity'; e={[math]::truncate($_.Capacity/1GB)}}
$b = gwmi win32_volume -filter "DriveType=3" -computername $ComputerName2 | where {@('Y:','Z:') -notcontains $_.DriveLetter} | select name, @{n='capacity'; e={[math]::truncate($_.Capacity/1GB)}}
Compare-Object -ReferenceObject $a -DifferenceObject $b -Property name,capacity -PassThru |
select-object name, @{n='ComputerName1';e={$ComputerName1}}, @{n='ComputerName2';e={$ComputerName2}},
@{n='Capacity1';e={$name = $_.name; $drive = $a | ? { $_.name -eq $name }; if ($drive.capacity) {$drive.capacity} else {0} }},
@{n='Capacity2';e={$name = $_.name; $drive = $b | ? { $_.name -eq $name }; if ($drive.capacity) {$drive.capacity} else {0} }} |
Sort-Object -Property name -Unique
#get-content .\\serverpairs.txt | %{$servers = $_ -split ','; .\\compare-drive.ps1 $servers[0] $servers[1] } | ogv
| 0
|
d599ff7e-17c4-40a4-b3fc-8666dd953df5.ps1
|
function Get-VCTime() {
return (Get-View "ServiceInstance-ServiceInstance").CurrentTime()
}
$lastCheckTime = Get-VCTime
while ($true)
{
$modifiedVMs = @()
$freshEventsStartTime = $lastCheckTime
$lastCheckTime = Get-VCTime
# Get all the VM network edit events
foreach ($event in Get-VIEvent -Start $freshEventsStartTime -Types Info)
{
if ($event.GetType().FullName -eq "VimApi.VmReconfiguredEvent" -and
$event.configSpec -ne $null)
{
foreach ($change in $event.configSpec.deviceChange)
{
if ($change.operation -eq "edit" -and
$change.device -ne $null -and
$change.device.GetType().FullName -eq "VimApi.VirtualPCNet32")
{
# VM's networking was reconfigured.
$vmId = $event.vm.vm.Type + '-' + $event.vm.vm.Value
$modifiedVMs += Get-VM -Id $vmId
}
}
}
}
# Did one of these edits violate isolation?
foreach ($vm in $modifiedVMs | select -Unique)
{
$intranetNics = $vm.NetworkAdapters | where { $_.NetworkName -eq 'Intranet' }
$dmzNics = $vm.NetworkAdapters | where { $_.NetworkName -eq 'DMZ' }
if ($intranetNics -ne $null -and $dmzNics -ne $null)
{
# Send an email notification
$message = "VM '" + $vm.Name + "' violates network isolation rules!"
Write-Host $message -ForegroundColor Yellow
# Use .Net’s SmtpClient to send mail. Just tell it which SMTP server to use
(New-Object 'System.Net.Mail.SmtpClient' 'smtp.example1234.com').Send(
'NetworkMonitor@example1234.com', # Sender
'john.doe@example1234.com', # Recipient
'Network isolation violation', # Subject
$message)
}
}
Start-Sleep 60
} # while ($true)
| 0
|
sample_1_59.ps1
|
ConvertFrom-StringData @'
id_dpm_getsysinfo_activity=Gathering system information
id_dpm_status_getsysinfo=Running DC_GetSystemInfo.ps1
'@
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBP8804NUk2Cd6X
# TbYBVKAucqhb0u31qtYwBWnmfjNBdqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGI5U0fTidlIloVRZR2Cztwd
# 0LwJgZ7JhflLL4fNPIFYMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAPn6aEJDk8XgAGYobitfN0GR/aZFhaFY8uaaD6fR1C2j4NcBy+6PrC6mE
# oxxNYIWQKMLKtQ+BqM5HG5FayNlYGDfVQO6oNfk3DMTqZZckLkRTCahDnmG/IsNF
# 8ek5xs6O7vOzezAFQ9yOrvErkEWXCElHzLSPtQxYXLs/rm5RMmbD8FsoUE4M7S01
# DBfvOZKbYIynX3zvMTzsbY71Ex+othnMD5QTzIO6UJcCJVj6bFFY+kq0ApuRTJdL
# ZJMCxy5SzUXpIekchGWyvHWNU0qSLt0qfbtggyRl/AFwtmZPw/HzYxXjr4lhcYyC
# zQO50Ea64gx+MDQrY7iNbkune31j86GCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAO9pscrMHhBPC92VEKTqvp5mNKAnczIyU+ISWWXpog9wIGZuto66JV
# GBMyMDI0MTAyODExNDA0Mi4wMzdaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0
# Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx
# guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv
# qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD
# eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8
# ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p
# 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa
# HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD
# PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd
# uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D
# kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV
# oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3
# RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj
# fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ
# 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj
# ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX
# pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T
# ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw
# HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57
# rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf
# 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v
# DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2
# BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh
# uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU
# vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk
# 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7
# nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR
# jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY
# dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu
# nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608
# ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgVuPeqQZx
# ls8dQontF8pahmmVPZ149gzuOfWB0cKTZsYwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA
# AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3
# DQEBCwUABIICAEDZzqiHsuvk4esFpl0ny0Vu69Vv8I/OKAQYUOixQrVjK/mfC2Vw
# YqwX5CSNyTj08/dZCfMM48pi8dbqe83T4lVISsPUeBmRInVwL+0V01vaZuR/Mfu1
# YU1+CRpBYGWZQ7AMdct2o78ZbFDwvYUsYqokW5H8dupHG+3nEvpLJdfChRV75+8+
# 2jWPWDd0MW4ZvHJVNeWOuoeIdHmVa/BEQSJ9DrNOwlMiB4PyBM9/VBf0Hfr1dart
# pmaw6EhHbVj11QxjZi257IRC6CoJdbMp4LOB6n3hKiCQiNJWI8MugXr7sZq+QnOp
# vnaUDZpY25hK2SXh7Zzz+t9Au7j/tqoAiqXlt/1wv9mbFQGNVA9TNRbvOKzpaaW1
# 8kAbWUAZxbRL2rAiBoWg0azsffO52AcCFRbhCobQAKZb8jWh9viphNLUCkc+5Nj8
# dbfr3/bXVbdxJVzEkpJVawV0AwUSWZukACgnGFS512DEMJfBwpHt1eHntk/VemXz
# xaVQ+vu1myMnaVTIkcFhat9+K+i3bOyC41usGSFiZZafrPQKYTbhKxc6Hpj++XAn
# l8rDCd4iOEo01+PshE6ogMZSyPboh7OESac/1VHdjHemPrWV2OsgzLfcBafh4lNH
# G0Odts5GYsg0nVkCVaZ5ICKxvd7WcPh1AUZ4EP2JYEPkEkQLtnCFjQWv
# SIG # End signature block
| 0
|
3251.ps1
|
class ParsedCommand {
[string]$CommandString
[string]$Plugin = $null
[string]$Command = $null
[string]$Version = $null
[hashtable]$NamedParameters = @{}
[System.Collections.ArrayList]$PositionalParameters = (New-Object System.Collections.ArrayList)
[datetime]$Time = (Get-Date).ToUniversalTime()
[string]$From = $null
[string]$FromName = $null
[hashtable]$CallingUserInfo = @{}
[string]$To = $null
[string]$ToName = $null
[Message]$OriginalMessage
[pscustomobject]Summarize() {
$o = $this | Select-Object -Property * -ExcludeProperty NamedParameters
if ($this.Plugin -eq 'Builtin') {
$np = $this.NamedParameters.GetEnumerator() | Where-Object {$_.Name -ne 'Bot'}
$o | Add-Member -MemberType NoteProperty -Name NamedParameters -Value $np
} else {
$o | Add-Member -MemberType NoteProperty -Name NamedParameters -Value $this.NamedParameters
}
return [pscustomobject]$o
}
}
| 0
|
sample_46_12.ps1
|
$if$($operatingSystem$ == Linux)FROM mcr.microsoft.com/$dockerBaseImage$
COPY ./bin/release/linux-x64/publish /app
COPY ./bin/release/linux-x64/publish/Linux/CosmicCertificateInstaller .
COPY ./bin/release/linux-x64/publish/config/config.test.json .
ENTRYPOINT ["/app/$projectname$"]$endif$$if$ ($operatingSystem$|$targetFramework$ == Windows|netcoreapp3.1)# escape=`
# Installer image
FROM mcr.microsoft.com/$dockerBaseImage$ AS installer
SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"]
# Retrieve .NET Core Runtime
# USER ContainerAdministrator
RUN $dotnet_version = '3.1.5'; `
Invoke-WebRequest -OutFile dotnet-installer.exe https://download.visualstudio.microsoft.com/download/pr/962fa33f-e57c-4e8a-abc9-01882ff74e3d/23e11ee6c3da863fa1489f951aa7e75e/dotnet-sdk-3.1.417-win-x64.exe; `
$dotnet_sha512 = '79fe1de714101c1437ca2ee8201dac96f684a94e7cc72e2331d46f422a89f4573581d8904769547a193f97986a4951c8f8466970eb849f60202f8ee7a57e30c6'; `
if ((Get-FileHash dotnet-installer.exe -Algorithm sha512).Hash -ne $dotnet_sha512) { `
Write-Host 'CHECKSUM VERIFICATION FAILED!'; `
exit 1; `
}; `
`
./dotnet-installer.exe /S
USER ContainerAdministrator
WORKDIR /app
COPY ./bin/Release .
ENTRYPOINT ["powershell.exe", "./Scripts/EntryPoint.ps1"]$endif$$if$ ($operatingSystem$|$targetFramework$ == Windows|net6.0)FROM mcr.microsoft.com/$dockerBaseImage$
USER ContainerAdministrator
WORKDIR /app
COPY ./bin/Release .
ENTRYPOINT ["powershell.exe", "./Scripts/EntryPoint.ps1"]$endif$$if$ ($operatingSystem$|$targetFramework$ == Windows|net472)FROM mcr.microsoft.com/$dockerBaseImage$
USER ContainerAdministrator
WORKDIR /app
COPY ./bin/Release .
ENTRYPOINT ["powershell.exe", "./Scripts/EntryPoint.ps1"]$endif$
| 0
|
4426.ps1
|
function Find-Script {
[CmdletBinding(HelpUri = 'https://go.microsoft.com/fwlink/?LinkId=619785')]
[outputtype("PSCustomObject[]")]
Param
(
[Parameter(ValueFromPipelineByPropertyName = $true,
Position = 0)]
[ValidateNotNullOrEmpty()]
[string[]]
$Name,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[ValidateNotNull()]
[string]
$MinimumVersion,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[ValidateNotNull()]
[string]
$MaximumVersion,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[ValidateNotNull()]
[string]
$RequiredVersion,
[Parameter()]
[switch]
$AllVersions,
[Parameter()]
[switch]
$IncludeDependencies,
[Parameter()]
[ValidateNotNull()]
[string]
$Filter,
[Parameter()]
[ValidateNotNull()]
[string[]]
$Tag,
[Parameter()]
[ValidateNotNull()]
[ValidateSet('Function', 'Workflow')]
[string[]]
$Includes,
[Parameter()]
[ValidateNotNull()]
[string[]]
$Command,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[ValidateNotNullOrEmpty()]
[Uri]
$Proxy,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[PSCredential]
$ProxyCredential,
[Parameter()]
[ValidateNotNullOrEmpty()]
[string[]]
$Repository,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[PSCredential]
$Credential,
[Parameter()]
[switch]
$AllowPrerelease
)
Begin {
Install-NuGetClientBinaries -CallerPSCmdlet $PSCmdlet -Proxy $Proxy -ProxyCredential $ProxyCredential
}
Process {
$ValidationResult = Validate-VersionParameters -CallerPSCmdlet $PSCmdlet `
-Name $Name `
-MinimumVersion $MinimumVersion `
-MaximumVersion $MaximumVersion `
-RequiredVersion $RequiredVersion `
-AllVersions:$AllVersions `
-AllowPrerelease:$AllowPrerelease
if (-not $ValidationResult) {
return
}
$PSBoundParameters['Provider'] = $script:PSModuleProviderName
$PSBoundParameters[$script:PSArtifactType] = $script:PSArtifactTypeScript
if ($AllowPrerelease) {
$PSBoundParameters[$script:AllowPrereleaseVersions] = $true
}
$null = $PSBoundParameters.Remove("AllowPrerelease")
if ($PSBoundParameters.ContainsKey("Repository")) {
$PSBoundParameters["Source"] = $Repository
$null = $PSBoundParameters.Remove("Repository")
$ev = $null
$repositories = Get-PSRepository -Name $Repository -ErrorVariable ev -verbose:$false
if ($ev) { return }
$RepositoriesWithoutScriptSourceLocation = $false
foreach ($repo in $repositories) {
if (-not $repo.ScriptSourceLocation) {
$message = $LocalizedData.ScriptSourceLocationIsMissing -f ($repo.Name)
Write-Error -Message $message `
-ErrorId 'ScriptSourceLocationIsMissing' `
-Category InvalidArgument `
-TargetObject $repo.Name `
-Exception 'System.ArgumentException'
$RepositoriesWithoutScriptSourceLocation = $true
}
}
if ($RepositoriesWithoutScriptSourceLocation) {
return
}
}
$PSBoundParameters["MessageResolver"] = $script:PackageManagementMessageResolverScriptBlockForScriptCmdlets
$scriptsFoundInPSGallery = @()
$isRepositoryNullOrPSGallerySpecified = $false
if ($Repository -and ($Repository -Contains $Script:PSGalleryModuleSource)) {
$isRepositoryNullOrPSGallerySpecified = $true
}
elseif (-not $Repository) {
$psgalleryRepo = Get-PSRepository -Name $Script:PSGalleryModuleSource `
-ErrorAction SilentlyContinue `
-WarningAction SilentlyContinue
if ($psgalleryRepo) {
$isRepositoryNullOrPSGallerySpecified = $true
}
}
PackageManagement\Find-Package @PSBoundParameters | Microsoft.PowerShell.Core\ForEach-Object {
$psgetItemInfo = New-PSGetItemInfo -SoftwareIdentity $_ -Type $script:PSArtifactTypeScript
if ($psgetItemInfo.Type -eq $script:PSArtifactTypeScript) {
if ($AllVersions -and -not $AllowPrerelease) {
if ($psgetItemInfo.AdditionalMetadata -and $psgetItemInfo.AdditionalMetadata.IsPrerelease -eq $false) {
$psgetItemInfo
}
}
else {
$psgetItemInfo
}
} elseif ($PSBoundParameters['Name'] -and -not (Test-WildcardPattern -Name ($Name | Microsoft.PowerShell.Core\Where-Object { $psgetItemInfo.Name -like $_ }))) {
$message = $LocalizedData.MatchInvalidType -f ($psgetItemInfo.Name, $psgetItemInfo.Type, $script:PSArtifactTypeScript)
Write-Error -Message $message `
-ErrorId 'MatchInvalidType' `
-Category InvalidArgument `
-TargetObject $Name
}
if ($psgetItemInfo -and
$isRepositoryNullOrPSGallerySpecified -and
$script:TelemetryEnabled -and
($psgetItemInfo.Repository -eq $Script:PSGalleryModuleSource)) {
$scriptsFoundInPSGallery += $psgetItemInfo.Name
}
}
if ($isRepositoryNullOrPSGallerySpecified) {
Log-ArtifactNotFoundInPSGallery -SearchedName $Name -FoundName $scriptsFoundInPSGallery -operationName PSGET_FIND_SCRIPT
}
}
}
| 0
|
2069.ps1
|
Import-Module HelpersCommon
$powershellCoreModules = @(
"CimCmdlets"
"Microsoft.PowerShell.Host"
"Microsoft.PowerShell.Core"
"Microsoft.PowerShell.Diagnostics"
"Microsoft.PowerShell.Management"
"Microsoft.PowerShell.Security"
"Microsoft.PowerShell.Utility"
"Microsoft.WsMan.Management"
"PackageManagement"
)
$extension = ".zip"
if ([System.Management.Automation.Platform]::IsWindows)
{
$extension = ".cab"
}
if([System.Management.Automation.Platform]::IsWindows)
{
$userHelpRoot = Join-Path $HOME "Documents/PowerShell/Help/"
}
else
{
$userModulesRoot = [System.Management.Automation.Platform]::SelectProductNameForDirectory([System.Management.Automation.Platform+XDG_Type]::USER_MODULES)
$userHelpRoot = Join-Path $userModulesRoot -ChildPath ".." -AdditionalChildPath "Help"
}
$testCases = @{
"CimCmdlets" = @{
HelpFiles = "Microsoft.Management.Infrastructure.CimCmdlets.dll-help.xml"
HelpInfoFiles = "CimCmdlets_fb6cc51d-c096-4b38-b78d-0fed6277096a_HelpInfo.xml"
CompressedFiles = "CimCmdlets_fb6cc51d-c096-4b38-b78d-0fed6277096a_en-US_HelpContent$extension"
HelpInstallationPath = "$pshome\Modules\CimCmdlets\en-US"
HelpInstallationPathHome = "$userHelpRoot\CimCmdlets\en-US"
}
"Microsoft.PowerShell.Archive" = @{
HelpFiles = "Microsoft.PowerShell.Archive-help.xml"
HelpInfoFiles = "Microsoft.PowerShell.Archive_eb74e8da-9ae2-482a-a648-e96550fb8733_HelpInfo.xml"
CompressedFiles = "Microsoft.PowerShell.Archive_eb74e8da-9ae2-482a-a648-e96550fb8733_en-US_HelpContent$extension"
HelpInstallationPath = "$pshome\Modules\Microsoft.PowerShell.Archive\en-US"
}
"Microsoft.PowerShell.Core" = @{
HelpFiles = "System.Management.Automation.dll-help.xml"
HelpInfoFiles = "Microsoft.PowerShell.Core_00000000-0000-0000-0000-000000000000_HelpInfo.xml"
CompressedFiles = "Microsoft.PowerShell.Core_00000000-0000-0000-0000-000000000000_en-US_HelpContent$extension"
HelpInstallationPath = "$pshome\en-US"
HelpInstallationPathHome = "$userHelpRoot\en-US"
}
"Microsoft.PowerShell.Diagnostics" = @{
HelpFiles = "Microsoft.PowerShell.Commands.Diagnostics.dll-help.xml"
HelpInfoFiles = "Microsoft.PowerShell.Diagnostics_ca046f10-ca64-4740-8ff9-2565dba61a4f_HelpInfo.xml"
CompressedFiles = "Microsoft.PowerShell.Diagnostics_ca046f10-ca64-4740-8ff9-2565dba61a4f_en-US_helpcontent$extension"
HelpInstallationPath = "$pshome\en-US"
HelpInstallationPathHome = "$userHelpRoot\en-US"
}
"Microsoft.PowerShell.Host" = @{
HelpFiles = "Microsoft.PowerShell.ConsoleHost.dll-help.xml"
HelpInfoFiles = "Microsoft.PowerShell.Host_56d66100-99a0-4ffc-a12d-eee9a6718aef_HelpInfo.xml"
CompressedFiles = "Microsoft.PowerShell.Host_56d66100-99a0-4ffc-a12d-eee9a6718aef_en-US_helpcontent$extension"
HelpInstallationPath = "$pshome\en-US"
HelpInstallationPathHome = "$userHelpRoot\en-US"
}
"Microsoft.PowerShell.LocalAccounts" = @{
HelpFiles = "Microsoft.Powershell.LocalAccounts.dll-help.xml"
HelpInfoFiles = "Microsoft.PowerShell.LocalAccounts_8e362604-2c0b-448f-a414-a6a690a644e2_HelpInfo.xml"
CompressedFiles = "Microsoft.PowerShell.LocalAccounts_8e362604-2c0b-448f-a414-a6a690a644e2_en-US_HelpContent$extension"
HelpInstallationPath = "$pshome\Modules\Microsoft.PowerShell.LocalAccounts\en-US"
HelpInstallationPathHome = "$userHelpRoot\Microsoft.PowerShell.LocalAccounts\en-US"
}
"Microsoft.PowerShell.Management" = @{
HelpFiles = "Microsoft.PowerShell.Commands.Management.dll-help.xml"
HelpInfoFiles = "Microsoft.PowerShell.Management_eefcb906-b326-4e99-9f54-8b4bb6ef3c6d_HelpInfo.xml"
CompressedFiles = "Microsoft.PowerShell.Management_eefcb906-b326-4e99-9f54-8b4bb6ef3c6d_en-US_helpcontent$extension"
HelpInstallationPath = "$pshome\en-US"
HelpInstallationPathHome = "$userHelpRoot\en-US"
}
"Microsoft.PowerShell.Security" = @{
HelpFiles = "Microsoft.PowerShell.Security.dll-help.xml"
HelpInfoFiles = "Microsoft.PowerShell.Security_a94c8c7e-9810-47c0-b8af-65089c13a35a_HelpInfo.xml"
CompressedFiles = "Microsoft.PowerShell.Security_a94c8c7e-9810-47c0-b8af-65089c13a35a_en-US_helpcontent$extension"
HelpInstallationPath = "$pshome\en-US"
HelpInstallationPathHome = "$userHelpRoot\en-US"
}
"Microsoft.PowerShell.Utility" = @{
HelpFiles = "Microsoft.PowerShell.Commands.Utility.dll-Help.xml", "Microsoft.PowerShell.Utility-help.xml"
HelpInfoFiles = "Microsoft.PowerShell.Utility_1da87e53-152b-403e-98dc-74d7b4d63d59_HelpInfo.xml"
CompressedFiles = "Microsoft.PowerShell.Utility_1da87e53-152b-403e-98dc-74d7b4d63d59_en-US_helpcontent$extension"
HelpInstallationPath = "$pshome\en-US"
HelpInstallationPathHome = "$userHelpRoot\en-US"
}
"Microsoft.WSMan.Management" = @{
HelpFiles = "Microsoft.WSMan.Management.dll-help.xml"
HelpInfoFiles = "Microsoft.WsMan.Management_766204A6-330E-4263-A7AB-46C87AFC366C_HelpInfo.xml"
CompressedFiles = "Microsoft.WsMan.Management_766204A6-330E-4263-A7AB-46C87AFC366C_en-US_helpcontent$extension"
HelpInstallationPath = "$pshome\en-US"
HelpInstallationPathHome = "$userHelpRoot\en-US"
}
"PackageManagement" = @{
HelpFiles = "Microsoft.PowerShell.PackageManagement.dll-help.xml"
HelpInfoFiles = "PackageManagement_4ae9fd46-338a-459c-8186-07f910774cb8_HelpInfo.xml"
CompressedFiles = "PackageManagement_4ae9fd46-338a-459c-8186-07f910774cb8_en-US_helpcontent$extension"
HelpInstallationPath = "$pshome\Modules\PackageManagement\en-US"
HelpInstallationPathHome = "$userHelpRoot\PackageManagement\en-US"
}
"PowershellGet" = @{
HelpFiles = "PSGet.psm1-help.xml"
HelpInfoFiles = "PowershellGet_1d73a601-4a6c-43c5-ba3f-619b18bbb404_HelpInfo.xml"
CompressedFiles = "PowershellGet_1d73a601-4a6c-43c5-ba3f-619b18bbb404_en-US_helpcontent$extension"
HelpInstallationPath = "$pshome\Modules\PowershellGet\en-US"
HelpInstallationPathHome = "$userHelpRoot\PackageManagement\en-US"
}
}
$modulesInBox = @("Microsoft.PowerShell.Core"
Get-Module -ListAvailable | ForEach-Object{$_.Name}
)
function GetFiles
{
param (
[string]$fileType = "*help.xml",
[ValidateNotNullOrEmpty()]
[string]$path
)
Get-ChildItem $path -Include $fileType -Recurse -ErrorAction SilentlyContinue | Select-Object -ExpandProperty FullName
}
function ValidateInstalledHelpContent
{
param (
[ValidateNotNullOrEmpty()]
[string]$moduleName,
[switch]$UserScope
)
if($UserScope)
{
$params = @{ Path = $testCases[$moduleName].HelpInstallationPathHome }
}
else
{
$params = @{ Path = $testCases[$moduleName].HelpInstallationPath }
}
$helpFilesInstalled = @(GetFiles @params | ForEach-Object {Split-Path $_ -Leaf})
$expectedHelpFiles = @($testCases[$moduleName].HelpFiles)
$helpFilesInstalled.Count | Should -Be $expectedHelpFiles.Count
foreach ($fileName in $expectedHelpFiles)
{
$helpFilesInstalled -contains $fileName | Should -BeTrue
}
}
function RunUpdateHelpTests
{
param (
[string]$tag = "CI",
[switch]$useSourcePath,
[switch]$userscope
)
foreach ($moduleName in $modulesInBox)
{
if ($powershellCoreModules -contains $moduleName)
{
It "Validate Update-Help for module '$moduleName' with scope as '$userscope'" -Skip:(!(Test-CanWriteToPsHome) -and $userscope -eq $false) {
if($userscope)
{
$params = @{Path = $testCases[$moduleName].HelpInstallationPathHome}
$updateScope = @{Scope = 'CurrentUser'}
}
else
{
$params = @{Path = $testCases[$moduleName].HelpInstallationPath}
$updateScope = @{Scope = 'AllUsers'}
}
$commonParam = @{
Include = @("*help.xml")
Recurse = $true
ErrorAction = 'SilentlyContinue'
}
$params += $commonParam
Get-ChildItem @params |
Remove-Item -Force -ErrorAction SilentlyContinue
if ((Get-UICulture).Name -ne "en-Us")
{
if ($useSourcePath)
{
Update-Help -Module $moduleName -Force -UICulture en-US -SourcePath "$PSScriptRoot\assets" @updateScope
}
else
{
Update-Help -Module $moduleName -Force -UICulture en-US @updateScope
}
}
else
{
if ($useSourcePath)
{
Update-Help -Module $moduleName -Force -SourcePath "$PSScriptRoot\assets" @updateScope
}
else
{
Update-Help -Module $moduleName -Force @updateScope
}
}
if($userscope)
{
ValidateInstalledHelpContent -moduleName $moduleName -UserScope
}
else
{
ValidateInstalledHelpContent -moduleName $moduleName
}
}
if ($tag -eq "CI")
{
break
}
}
}
}
function RunSaveHelpTests
{
param (
[string]$tag = "CI"
)
foreach ($moduleName in $modulesInBox)
{
if ($powershellCoreModules -contains $moduleName)
{
try
{
$saveHelpFolder = Join-Path $TestDrive (Get-Random).ToString()
New-Item $saveHelpFolder -Force -ItemType Directory > $null
if($moduleName -eq 'PackageManagement')
{
$pending = $true
}
It "Validate Save-Help for the '$moduleName' module" -Pending:$pending {
if ((Get-UICulture).Name -ne "en-Us")
{
Save-Help -Module $moduleName -Force -UICulture en-US -DestinationPath $saveHelpFolder
}
else
{
Save-Help -Module $moduleName -Force -DestinationPath $saveHelpFolder
}
ValidateSaveHelp -moduleName $moduleName -path $saveHelpFolder
}
if($pending)
{
$pending = $false
}
if ($tag -eq "CI")
{
break
}
}
finally
{
Remove-Item $saveHelpFolder -Force -ErrorAction SilentlyContinue -Recurse
}
}
}
}
function ValidateSaveHelp
{
param (
[string]$moduleName,
[string]$path
)
$compressedFile = GetFiles -fileType "*$extension" -path $path | ForEach-Object {Split-Path $_ -Leaf}
$expectedCompressedFile = $testCases[$moduleName].CompressedFiles
$expectedCompressedFile | Should -Not -BeNullOrEmpty -Because "Test data (expectedCompressedFile) should never be null"
$compressedFile | Should -Be $expectedCompressedFile -Because "Save-Help for $module should download '$expectedCompressedFile'"
$helpInfoFile = GetFiles -fileType "*HelpInfo.xml" -path $path | ForEach-Object {Split-Path $_ -Leaf}
$expectedHelpInfoFile = $testCases[$moduleName].HelpInfoFiles
$expectedHelpInfoFile | Should -Not -BeNullOrEmpty -Because "Test data (expectedHelpInfoFile) should never be null"
$helpInfoFile | Should -Be $expectedHelpInfoFile -Because "Save-Help for $module should download '$expectedHelpInfoFile'"
}
Describe "Validate Update-Help from the Web for one PowerShell module." -Tags @('CI', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunUpdateHelpTests -tag "CI" -Scope 'AllUsers'
}
Describe "Validate Update-Help from the Web for one PowerShell module for user scope." -Tags @('CI', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunUpdateHelpTests -tag "CI" -Scope 'CurrentUser'
}
Describe "Validate Update-Help from the Web for all PowerShell modules." -Tags @('Feature', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunUpdateHelpTests -tag "Feature" -Scope 'AllUsers'
}
Describe "Validate Update-Help from the Web for all PowerShell modules for user scope." -Tags @('Feature', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunUpdateHelpTests -tag "Feature" -Scope 'CurrentUser'
}
Describe "Validate Update-Help -SourcePath for one PowerShell module." -Tags @('CI', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunUpdateHelpTests -tag "CI" -useSourcePath -Scope 'AllUsers'
}
Describe "Validate Update-Help -SourcePath for one PowerShell module for user scope." -Tags @('CI', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunUpdateHelpTests -tag "CI" -useSourcePath -Scope 'CurrentUser'
}
Describe "Validate Update-Help -SourcePath for all PowerShell modules." -Tags @('Feature', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunUpdateHelpTests -tag "Feature" -useSourcePath -Scope 'AllUsers'
}
Describe "Validate Update-Help -SourcePath for all PowerShell modules for user scope." -Tags @('Feature', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunUpdateHelpTests -tag "Feature" -useSourcePath -Scope 'CurrentUser'
}
Describe "Validate 'Save-Help -DestinationPath for one PowerShell modules." -Tags @('CI', 'RequireAdminOnWindows') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunSaveHelpTests -tag "CI"
}
Describe "Validate 'Save-Help -DestinationPath for all PowerShell modules." -Tags @('Feature', 'RequireAdminOnWindows') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
RunSaveHelpTests -tag "Feature"
}
| 0
|
1439.ps1
|
function Get-CCertificate
{
[CmdletBinding(DefaultParameterSetName='ByFriendlyName')]
[OutputType([Security.Cryptography.X509Certificates.X509Certificate2])]
param(
[Parameter(Mandatory=$true,ParameterSetName='ByPath')]
[string]
$Path,
[Parameter(ParameterSetName='ByPath')]
$Password,
[Parameter(ParameterSetName='ByPath')]
[Security.Cryptography.X509Certificates.X509KeyStorageFlags]
$KeyStorageFlags,
[Parameter(Mandatory=$true,ParameterSetName='ByThumbprint')]
[Parameter(Mandatory=$true,ParameterSetName='ByThumbprintCustomStoreName')]
[string]
$Thumbprint,
[Parameter(Mandatory=$true,ParameterSetName='ByFriendlyName')]
[Parameter(Mandatory=$true,ParameterSetName='ByFriendlyNameCustomStoreName')]
[string]
$FriendlyName,
[Parameter(Mandatory=$true,ParameterSetName='ByFriendlyName')]
[Parameter(Mandatory=$true,ParameterSetName='ByFriendlyNameCustomStoreName')]
[Parameter(Mandatory=$true,ParameterSetName='ByThumbprint')]
[Parameter(Mandatory=$true,ParameterSetName='ByThumbprintCustomStoreName')]
[Security.Cryptography.X509Certificates.StoreLocation]
$StoreLocation,
[Parameter(Mandatory=$true,ParameterSetName='ByFriendlyName')]
[Parameter(Mandatory=$true,ParameterSetName='ByThumbprint')]
[Security.Cryptography.X509Certificates.StoreName]
$StoreName,
[Parameter(Mandatory=$true,ParameterSetName='ByFriendlyNameCustomStoreName')]
[Parameter(Mandatory=$true,ParameterSetName='ByThumbprintCustomStoreName')]
[string]
$CustomStoreName
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
function Add-PathMember
{
param(
[Parameter(Mandatory,VAlueFromPipeline=$true)]
[Security.Cryptography.X509Certificates.X509Certificate2]
$Certificate,
[Parameter(Mandatory)]
[string]
$Path
)
process
{
$Certificate | Add-Member -MemberType NoteProperty -Name 'Path' -Value $Path -PassThru
}
}
function Resolve-CertificateProviderFriendlyPath
{
param(
[Parameter(Mandatory,ValueFromPipelineByPropertyName)]
[string]
$PSPath,
[Parameter(Mandatory,ValueFromPipelineByPropertyName)]
[Management.Automation.PSDriveInfo]
$PSDrive
)
process
{
$qualifier = '{0}:' -f $PSDrive.Name
$path = $PSPath | Split-Path -NoQualifier
Join-Path -Path $qualifier -ChildPath $path
}
}
if( $PSCmdlet.ParameterSetName -eq 'ByPath' )
{
if( -not (Test-Path -Path $Path -PathType Leaf) )
{
Write-Error ('Certificate ''{0}'' not found.' -f $Path)
return
}
Get-Item -Path $Path |
ForEach-Object {
$item = $_
if( $item -is [Security.Cryptography.X509Certificates.X509Certificate2] )
{
$certFriendlyPath = $item | Resolve-CertificateProviderFriendlyPath
return $item | Add-PathMember -Path $certFriendlyPath
}
elseif( $item -is [IO.FileInfo] )
{
try
{
$ctorParams = @( $item.FullName, $Password )
if( $KeyStorageFlags )
{
$ctorParams += $KeyStorageFlags
}
return New-Object 'Security.Cryptography.X509Certificates.X509Certificate2' $ctorParams | Add-PathMember -Path $item.FullName
}
catch
{
$ex = $_.Exception
while( $ex.InnerException )
{
$ex = $ex.InnerException
}
Write-Error -Message ('Failed to create X509Certificate2 object from file ''{0}'': {1}' -f $item.FullName,$ex.Message)
}
}
}
}
else
{
$storeLocationPath = '*'
if( $StoreLocation )
{
$storeLocationPath = $StoreLocation
}
$storeNamePath = '*'
if( $PSCmdlet.ParameterSetName -like '*CustomStoreName' )
{
$storeNamePath = $CustomStoreName
}
else
{
$storeNamePath = $StoreName
if( $StoreName -eq [Security.Cryptography.X509Certificates.StoreName]::CertificateAuthority )
{
$storeNamePath = 'CA'
}
}
if( $pscmdlet.ParameterSetName -like 'ByThumbprint*' )
{
$certPath = 'cert:\{0}\{1}\{2}' -f $storeLocationPath,$storeNamePath,$Thumbprint
if( (Test-Path -Path $certPath) )
{
foreach( $certPathItem in (Get-ChildItem -Path $certPath) )
{
$path = $certPathItem | Resolve-CertificateProviderFriendlyPath
$certPathItem | Add-PathMember -Path $path
}
}
return
}
elseif( $PSCmdlet.ParameterSetName -like 'ByFriendlyName*' )
{
$certPath = Join-Path -Path 'cert:' -ChildPath $storeLocationPath
$certPath = Join-Path -Path $certPath -ChildPath $storeNamePath
$certPath = Join-Path -Path $certPath -ChildPath '*'
return Get-ChildItem -Path $certPath |
Where-Object { $_.FriendlyName -eq $FriendlyName } |
ForEach-Object {
$friendlyPath = $_ | Resolve-CertificateProviderFriendlyPath
$_ | Add-PathMember -Path $friendlyPath
}
}
Write-Error "Unknown parameter set '$($pscmdlet.ParameterSetName)'."
}
}
| 0
|
2509.ps1
|
$computer = "localhost"
$chart = New-Object -ComObject msgraph.application
$chart.visible = $true
$chart.datasheet.cells.item(1,1) = "Time"
$chart.datasheet.cells.item(1,2) = "ReliabilityMetric"
$r = 2
Get-WmiObject -Class win32_reliabilityStabilityMetrics -computername $computer|
Select-Object -First 254 |
ForEach-Object {
$chart.datasheet.cells.item($r,1) =
[Management.ManagementDatetimeConverter]::ToDateTime($_.TimeGenerated)
$chart.datasheet.cells.item($r,2) = $_.SystemStabilityIndex
$r++
}
| 0
|
sample_1_7.ps1
|
#************************************************
# DC_TaskListSvc.ps1
# Version 1.1
# Date: 2014,2019
# Author: Boyd Benson (bbenson@microsoft.com)
# Description: Collects information about running services
# Called from: Networking Diagnostics
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Import-LocalizedData -BindingVariable ScriptVariable
# Write-DiagProgress -Activity $ScriptVariable.ID_CTSSMBClient -Status $ScriptVariable.ID_CTSSMBClientDescription
function RunTaskListSvc ([string]$TaskListSvcCommandToExecute="")
{
$TaskListSvcCommandToExecuteLength = $TaskListSvcCommandToExecute.Length + 6
"=" * ($TaskListSvcCommandToExecuteLength) | Out-File -FilePath $OutputFile -append
"tasklist $TaskListSvcCommandToExecute" | Out-File -FilePath $OutputFile -append
"=" * ($TaskListSvcCommandToExecuteLength) | Out-File -FilePath $OutputFile -append
$CommandToExecute = "cmd.exe /c tasklist.exe " + $TaskListSvcCommandToExecute + " >> $OutputFile "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
"`n`n`n" | Out-File -FilePath $OutputFile -append
}
$sectionDescription = "TaskListSvc"
$OutputFile= $Computername + "_TaskListSvc_info.TXT"
"====================================================" | Out-File -FilePath $OutputFile -append
"TaskList Output with SvcHost Information" | Out-File -FilePath $OutputFile -append
"====================================================" | Out-File -FilePath $OutputFile -append
"Overview" | Out-File -FilePath $OutputFile -append
"----------------------------------------------------" | Out-File -FilePath $OutputFile -append
" 1. tasklist /svc" | Out-File -FilePath $OutputFile -append
" 2. tasklist /v" | Out-File -FilePath $OutputFile -append
" 3. tasklist /M" | Out-File -FilePath $OutputFile -append
"====================================================" | Out-File -FilePath $OutputFile -append
"`n`n`n`n`n" | Out-File -FilePath $OutputFile -append
RunTaskListSvc "/svc"
RunTaskListSvc "/v" #_#
RunTaskListSvc "/M" #_#
CollectFiles -filesToCollect $OutputFile -fileDescription "TaskList Output with SvcHost Information" -SectionDescription $sectionDescription
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDrWN/vdAdEfB9m
# NJZJjW7+Z4SkouQGalOlwAFiaOhtd6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAnZIUheU/kuooUhkj4JwZmJ
# 0GJrcE6UOnGqmrKnFis3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAcufclD2zeQqiqz1S5IhDvdgwSSxkl93/o8YlmA2gpo0Sk4YeGfk5gSA6
# XUtzyljcmrmTtC6Uwoabv6hUmzrH6GpBlYrWwQpFRfCsQvC6HiXwK4gGZIRDQQ/D
# TTLn4VU2u4miED0Rcs+p+bjefo//pJppZdTPB+hmaygAf9/3v2yMXAdvGBx5PDvr
# wgx1TlNavoWi2fsaF6unZ48DFflFI9xja47KSeFfDTAdiO7MvokqKB06+UKXmz3w
# 26EH0kG+wDawUtE14pPYzoksQQ39RQEhEG6hTvCPNJGqi3ubHHi/ul17fVeMRdii
# I/n/iLHCXwVhubmycn3MWYRpxh8Ce6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBatz79neWBoa9TNu6uOA1wSkt8qACo9b1bNY4iHyXRjAIGZxp1kNwx
# GBMyMDI0MTAyODExNDA0Mi4zMDJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u
# 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ
# t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy
# 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi
# JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR
# FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG
# zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS
# IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn
# jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU
# QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c
# ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v
# 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S
# bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh
# wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A
# yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ
# S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5
# wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR
# AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F
# bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8
# 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY
# z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M
# hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy
# m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr
# aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1
# NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP
# AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU
# 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt
# n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp
# un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q
# lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld
# HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCDjeohfYZZxIbh30AwnY7GfCQR9B+sIqh2Xzc9/oRQxZTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo
# rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn
# cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIAf8Xr5E7Qok2VpTwTobvTzjz6
# rsQaMp4HMiwW905IOuuTXxs1X3ojEoujOxT8hnbh/fcgMzNsBipKa1JxQ9ZOkSDg
# ma86AygVRdOgmn5UcGPjafyQuuTlb7C0X/Ds1plv1dpVIG2oD7Y6vl7Uw6b5KDTD
# N3j+lIB2Qi9LVUEoOxnLMkcmeGaUnfOMB6N1aEqgMVTR+NeXKhfGBwqSqbWK/Jqe
# A2pQYj080iN6FS5Kuh8+ui/zZAs7gdgNmaLHAvrVySE/7pXUNcGK9AjVZL51vp0D
# ExX3vPBIDPGroL/b4/48ssjCopTYLTJcCT1lbtn4ErWhWVGBbI+WfoMaPIxO3QU0
# nRx6Ua9dVYmjhBIcmTF7z3mVwqr0bLtuVbkxv3y06EZpHTkuLA55GIg6BVmhNx6r
# MwDeA1kA3JJ1HQUZIzf61Fdn4SE35zBQ8fd638buosndDf1vBGrS8UW1ZqMlW/o0
# WGm4Opm5gUXle1Db1YpiiAgcj30t0Ua9AYZdAUcGq7nDxq5fbCmJ0t0tvtAJ4C0Z
# nTTdGLn3RX4UERQTqpolInbk6oW5uPTzKP9Yf0J+GNnkNbTwfXjV0Nr33eLad5qx
# UvY9OUG2lHgq8rX3Z+/sBAV9pOsrlSuwhTyQdX4Tith7Lxh04qye+gf4oNqGC0er
# uipfkTMY2WYl+cKZ69M=
# SIG # End signature block
| 0
|
4220.ps1
|
function Invoke-SqlQuery {
param (
[String]$ConnectionString,
[String]$Sqlserver,
[String]$Username,
[String]$Password,
[String]$Catalog,
[String]$Database,
[String]$Query
)
if (!$Database){
$Database = ";"
} else {
$Database = "$Database;"
}
if (!$Catalog){
$Catalog = "Initial Catalog=Master;"
} else {
$Catalog = "Initial Catalog=$Catalog;"
}
if ($Username -and $Password){
$Authentication = "User Id=$Username;Password=$Password;"
} else {
$Authentication = "Integrated Security=True;"
}
if (!$query){
$Query = 'SELECT @@version';
}
$SqlConnection = New-Object System.Data.SqlClient.SqlConnection
$SqlConnection.ConnectionString = "Data Source=$Sqlserver;$Catalog$Authentication$Database"
$SqlCmd = New-Object System.Data.SqlClient.SqlCommand
$SqlCmd.CommandText = $Query
$SqlCmd.Connection = $SqlConnection
$SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter
$SqlAdapter.SelectCommand = $SqlCmd
$DataSet = New-Object System.Data.DataSet
$SqlAdapter.Fill($DataSet)
$DataSet.Tables[0]
}
| 0
|
Get-MailboxesOverSizeLim.ps1
|
# -------------------------------------------------------------------------------
# Script: Get-MailboxesOverSizeLimit.ps1
# Author: Chris Brown
# Date: 04/04/2011 10:41:00
# Keywords:
# comments:
#
# Versioning
# 04/04/2011 CJB Initial Script
#
# -------------------------------------------------------------------------------
# ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠
# ~ ~ ~ Variables ~ ~ ~
# ~~ Mail Server Details ~~
$SmtpServer = "mailserver.yourdomain.local"
$FromAddress = "alerts@yourdomain.com"
$ToAddress = "HelpDesk@yourdomain.com"
$Subject = "[Exchange] Mailboxes over size limits"
#
#
# ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠
if ( (Get-PSSnapin -Name Microsoft.Exchange.Management.PowerShell.E2010 -ErrorAction SilentlyContinue) -eq $null) {
Write-Verbose "Exchange 2010 snapin is not loaded. Loading it now."
try { Add-PSSnapin Microsoft.Exchange.Management.PowerShell.E2010; Write-Verbose "Loaded Exchange 2010 snapin" }
catch { Write-Error "Could not load Exchange 2010 snapins!"; }
}
$overLimit = Get-Mailbox | Get-MailboxStatistics -WarningAction SilentlyContinue | Where {"ProhibitSend","MailboxDisabled" -contains $_.StorageLimitStatus}
if ($overLimit.Count -gt 0) {
$mailBody = $overLimit | ft DisplayName,TotalItemSize,StorageLimitStatus | Out-String
Send-MailMessage -Body $mailBody.ToString() -From $FromAddress -SmtpServer $SmtpServer -Subject $Subject -To $toAddress
} else {
"No results"
}
| 0
|
sample_7_81.ps1
|
[dynamic, provider("dcismprovider")]
class DCIM_LocalRoleBasedAuthorizationService : CIM_RoleBasedAuthorizationService
{
[
Description ("CreationClassName indicates the name of the class or the subclass that is used in the creation of an instance. When used with the other key properties of this class, this property allows all instances of this class and its subclasses to be uniquely identified. The property value shall be \"DCIM_LocalRoleBasedAuthorizationService\"."),
Key,
Maxlen (256),
Override ("CreationClassName")
]
string CreationClassName;
[
Description ("The user-friendly name for this instance. The property value shall be \"DCIM Local Role Based Authorization Service\"."),
Override ("ElementName"),
Required
]
string ElementName;
[
Description ("The Name of the scoping System. The property value shall be \"systemmc\"."),
Key,
Maxlen (256),
Override ("SystemName"),
Propagated ("CIM_System.Name")
]
string SystemName;
[
Description ("This property uniquely identifies the Service and provides an indication of the functionality. The property value shall be \" DCIM Local Role Based Authorization Service\"."),
Key,
Maxlen (256),
Override ("Name")
]
string Name;
[
Description ("The CreationClassName of the scoping System. The property value shall be \"DCIM_SPComputerSystem\"."),
Key,
Maxlen (256),
Override ("SystemCreationClassName"),
Propagated ("CIM_System.CreationClassName")
]
string SystemCreationClassName;
};
/* SIG # Begin signature block */
/* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */
/* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */
/* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCP7dJcwIDcOQlN */
/* cXqumSAcWtDwDEeJW5fvln9/EJVk96CCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */
/* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */
/* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */
/* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */
/* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */
/* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */
/* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */
/* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */
/* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */
/* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */
/* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */
/* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */
/* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */
/* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */
/* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */
/* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */
/* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */
/* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */
/* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */
/* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */
/* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */
/* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */
/* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */
/* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */
/* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */
/* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */
/* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */
/* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */
/* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */
/* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */
/* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */
/* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */
/* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */
/* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */
/* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */
/* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */
/* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */
/* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */
/* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */
/* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */
/* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */
/* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */
/* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */
/* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */
/* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */
/* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */
/* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */
/* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */
/* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */
/* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */
/* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */
/* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */
/* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */
/* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */
/* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */
/* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */
/* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */
/* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */
/* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */
/* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */
/* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */
/* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */
/* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */
/* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */
/* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */
/* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */
/* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */
/* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */
/* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */
/* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */
/* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */
/* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */
/* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */
/* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */
/* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */
/* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */
/* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */
/* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */
/* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */
/* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */
/* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */
/* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */
/* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */
/* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */
/* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */
/* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */
/* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */
/* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */
/* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */
/* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */
/* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */
/* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */
/* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */
/* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */
/* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */
/* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */
/* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */
/* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */
/* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */
/* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */
/* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */
/* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */
/* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDUXFlcLyb1 */
/* DoVwrChZWzBSOa/KcQVbfFztYQ6C1yJcPzBABgorBgEEAYI3AgEMMTIwMKAWgBQA */
/* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */
/* hkiG9w0BAQEFAASCAYAXUVDfgLHuxbCyU0gud5K4EyQkJ6d7yg752mPo960YTPSL */
/* Sbkm19iWt/G3W2kdKOLLFc6gPZqMDYMg9H5KaEYnhB2zT7LbCGgt8LO49O4QwxIi */
/* 7Op69Avrn1X9+eBZO0/Zch0c4VsNvCeL+TLEbNxgGdEDRu5scHBsThn/GVPmcn+5 */
/* tqrHD07g0eKLNQLLL2VGFH/hqCBsTC4ATECzKULn0nGe3JsTErag1JeeTKWtBDRa */
/* Da3wAeQLH5nsGASqKtZsggt2gWEv5ytt1EuTj2UFZGlNOIxWInfk3rsz3FFUOSad */
/* 1mD8h/bvd8r5BH9BJ2R37pN+P/Tv5gR3ryjHDbsrjyIGeT1PWoY7968G/6uMBZUx */
/* rM1K/3WChR71uQ/nq+LfrBkmtyAgRMvVLrzYbhD/AZ8pBMU1s1rYzsXCeCTLOlJy */
/* S25FjDi5e0HK0y7cvlGPdw30waMC17aNBFxegkIYZt4gAYWquXr4xn5/IAN2Pd0V */
/* 8zmslyUaYCum0lbsWd+hghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */
/* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */
/* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQguqgY3tnZZJl8 */
/* NFjpJwcMSjW69hj0zNUckewwSvoNf2ICEG0HCFfITrePxw5syLQOWeoYDzIwMjQw */
/* OTIwMDcwMTEyWqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */
/* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */
/* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */
/* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */
/* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */
/* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */
/* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */
/* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */
/* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */
/* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */
/* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */
/* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */
/* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */
/* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */
/* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */
/* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */
/* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */
/* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */
/* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */
/* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */
/* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */
/* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */
/* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */
/* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */
/* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */
/* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */
/* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */
/* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */
/* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */
/* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */
/* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */
/* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */
/* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */
/* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */
/* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */
/* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */
/* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */
/* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */
/* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */
/* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */
/* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */
/* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */
/* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */
/* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */
/* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */
/* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */
/* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */
/* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */
/* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */
/* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */
/* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */
/* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */
/* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */
/* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */
/* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */
/* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */
/* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */
/* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */
/* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */
/* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */
/* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */
/* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */
/* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */
/* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */
/* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */
/* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */
/* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */
/* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */
/* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */
/* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */
/* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */
/* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */
/* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */
/* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */
/* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */
/* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */
/* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */
/* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */
/* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */
/* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */
/* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */
/* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */
/* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */
/* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */
/* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */
/* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */
/* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */
/* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */
/* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */
/* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */
/* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */
/* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */
/* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */
/* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */
/* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */
/* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */
/* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */
/* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */
/* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */
/* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */
/* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */
/* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */
/* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */
/* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */
/* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */
/* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */
/* MDcwMTEyWjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */
/* GZzPQDAvBgkqhkiG9w0BCQQxIgQgeba5hrKXIQc/QhJ5ic9kBMyiXofMGver+sQu */
/* vWzH5qMwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */
/* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAjrYxFI9nrRkLS5xyjupq */
/* yfNO7QoFGHeWPLqsrTxGsZFR7RjF4hnAvpaH59MWsmNGCYJuXcO9uep2R0MofD84 */
/* W2qdNMYsDNkxOks8YTQtKnlUQVslJA7bZGFuYy+BcZ2xgcsuBL4W2zKJATyZROkY */
/* VE3couKCRaQVC6g4mosV/M37QyHtX3bJ7kYwuKfUTZwXdpq5Vdwdv34iE7CUJpZU */
/* mV1SlzeYjxtKc7Ogj5dEmmcTR6Wf47tp0dI0+Bnt8IJ7fmfnLJY1zmzXw/b1px+m */
/* E8kZwfam8GMGJyq1NSS4rarYilCmvod64KwUZKu0uw9XrzpZrNIP2Xljaj4SpOei */
/* 9gE4O1rzjmwgATFfhYQ8TivnbQ5t0zSSe3RrXb62B3kOSphm/sRugfE23Ob/7gZC */
/* XhHgSoTxvlgldI+DS7DgrpYq0d0kBGF0Eps+lSe7gIPf6pUXrBpasJc0CNE5S9/C */
/* Z6HZihxETZ4U7IbrBuEF3SzMUEU2lzN/TMqAEvV1iLh0CBG2F+NNYHmg9GZaTh1P */
/* alAnzGywqPJVISpQGKZQURki+QdGSwZxPHygd/dKA5Wg57N5z8eK2NQgyqBQI36B */
/* 5k42Ud4O4tguYUPWyNzNSjsJhq97Vh+DvPLIdyL7ygMgPZat7s2XN1qxQy/iMzWj */
/* 4MHRuQW3Y3P/5Qitwu182Vo= */
/* SIG # End signature block */
| 0
|
sample_41_4.ps1
|
@{
GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @( 'MSFT_MpComputerStatus.cdxml',
'MSFT_MpPreference.cdxml',
'MSFT_MpThreat.cdxml',
'MSFT_MpThreatCatalog.cdxml',
'MSFT_MpThreatDetection.cdxml',
'MSFT_MpScan.cdxml',
'MSFT_MpSignature.cdxml',
'MSFT_MpWDOScan.cdxml',
'MSFT_MpRollback.cdxml'
)
FunctionsToExport = @( 'Get-MpPreference',
'Set-MpPreference',
'Add-MpPreference',
'Remove-MpPreference',
'Get-MpComputerStatus',
'Get-MpThreat',
'Get-MpThreatCatalog',
'Get-MpThreatDetection',
'Start-MpScan',
'Update-MpSignature',
'Remove-MpThreat',
'Start-MpWDOScan',
'Start-MpRollback'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '3.0'
}
# SIG # Begin signature block
# MIIllgYJKoZIhvcNAQcCoIIlhzCCJYMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7
# MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ
# mTCCGZUCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiqaVqK3TgLMEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAv1uJ+e+9OY2v17aC27EGCXji
# Yw5Exspv4dTWfbUyJUuiR7jlnSg8vtn3v7sD1PgNDSqjb0cbgylmIEqg0XHMb2f2
# 10q53JJEKaUWzJORxlE2Ez/9TOCRrCJ75c1Qv2nl/rzNz3iWCRvjIAPZkVPHpn6s
# NaCX+Jl1wTbJlbSf+/1CD7RoBHk1o0Fq+1pZkqCzVvioZu5BxwAaWHJQdKwyYaV9
# kujlcq9HjmNT1WBKHfBzqUxYwQehKrPZdinM5Hwbq5Ym2TixcLmxIoDX9bcF+a61
# /5jDbIjKnmYIO8kMDHq5ZryVbj6I5VKHSXjzNU5V0EB4EHT8RT186gBqVK0BGaGC
# FygwghckBgorBgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDSxVW9nlzb6PqreGdErw9x
# 6jeF/KW0L7vYOjGQhAzBRAIGZbqhFQVFGBIyMDI0MDIwMjAyNTYwNi4zNVowBIAC
# AfSggdikgdUwgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# LTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm
# MCQGA1UECxMdVGhhbGVzIFRTUyBFU046MTc5RS00QkIwLTgyNDYxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgIT
# MwAAAeDU/B8TFR9+XQABAAAB4DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEwMTIxOTA3MTlaFw0yNTAxMTAxOTA3MTla
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEArIec86HFu9EBOcaNv/p+4GGHdkvOi0DECB0tpn/OREVR15IrPI23e2qi
# swrsYO9xd0qz6ogxRu96eUf7Dneyw9rqtg/vrRm4WsAGt+x6t/SQVrI1dXPBPuNq
# sk4SOcUwGn7KL67BDZOcm7FzNx4bkUMesgjqwXoXzv2U/rJ1jQEFmRn23f17+y81
# GJ4DmBSe/9hwz9sgxj9BiZ30XQH55sViL48fgCRdqE2QWArzk4hpGsMa+GfE5r/n
# MYvs6KKLv4n39AeR0kaV+dF9tDdBcz/n+6YE4obgmgVjWeJnlFUfk9PT64KPByqF
# Nue9S18r437IHZv2sRm+nZO/hnBjMR30D1Wxgy5mIJJtoUyTvsvBVuSWmfDhodYl
# cmQRiYm/FFtxOETwVDI6hWRK4pzk5Znb5Yz+PnShuUDS0JTncBq69Q5lGhAGHz2c
# cr6bmk5cpd1gwn5x64tgXyHnL9xctAw6aosnPmXswuobBTTMdX4wQ7wvUWjbMQRD
# iIvgFfxiScpeiccZBpxIJotmi3aTIlVGwVLGfQ+U+8dWnRh2wIzN16LD2MBnsr2z
# VbGxkYQGsr+huKlfq7GMSnJQD2ZtU+WOVvdHgxYjQTbEj80zoXgBzwJ5rHdhYtP5
# pYJl6qIgwvHLJZmD6LUpjxkTMx41MoIQjnAXXDGqvpPX8xCj7y0CAwEAAaOCAUkw
# ggFFMB0GA1UdDgQWBBRwXhc/bp1X7xK6ygDVddDZMNKZ0jAfBgNVHSMEGDAWgBSf
# pxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w
# JTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAC
# hlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29m
# dCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAA
# MBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG
# 9w0BAQsFAAOCAgEAwBPODpH8DSV07syobEPVUmOLnJUDWEdvQdzRiO2/taTFDyLB
# 9+W6VflSzri0Pf7c1PUmSmFbNoBZ/bAp0DDflHG1AbWI43ccRnRfbed17gqD9Z9v
# HmsQeRn1vMqdH/Y3kDXr7D/WlvAnN19FyclPdwvJrCv+RiMxZ3rc4/QaWrvS5rhZ
# QT8+jmlTutBFtYShCjNjbiECo5zC5FyboJvQkF5M4J5EGe0QqCMp6nilFpC3tv2+
# 6xP3tZ4lx9pWiyaY+2xmxrCCekiNsFrnm0d+6TS8ORm1sheNTiavl2ez12dqcF0F
# LY9jc3eEh8I8Q6zOq7AcuR+QVn/1vHDz95EmV22i6QejXpp8T8Co/+yaYYmHllHS
# maBbpBxf7rWt2LmQMlPMIVqgzJjNRLRIRvKsNn+nYo64oBg2eCWOI6WWVy3S4lXP
# ZqB9zMaOOwqLYBLVZpe86GBk2YbDjZIUHWpqWhrwpq7H1DYccsTyB57/muA6fH3N
# Jt9VRzshxE2h2rpHu/5HP4/pcq06DIKpb/6uE+an+fsWrYEZNGRzL/+GZLfanqrK
# CWvYrg6gkMlfEWzqXBzwPzqqVR4aNTKjuFXLlW/ID7LSYacQC4Dzm2w5xQ+XPBYX
# my/4Hl/Pfk5bdfhKmTlKI26WcsVE8zlcKxIeq9xsLxHerCPbDV68+FnEO40wggdx
# MIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGI
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN
# aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5
# MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciEL
# eaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa
# 4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxR
# MTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEByd
# Uv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi9
# 47SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi
# ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+
# /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY
# 7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtco
# dgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH
# 29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94
# q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcV
# AQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0G
# A1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQB
# gjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v
# cGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgw
# GQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
# /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f
# BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJv
# ZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4w
# TDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIB
# AJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRs
# fNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6
# Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveV
# tihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKB
# GUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoy
# GtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE
# cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU
# a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+
# k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0
# +CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cir
# Ooo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEA
# oYHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0w
# KwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAk
# BgNVBAsTHVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxN
# aWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBt89HV
# 8FfofFh/I/HzNjMlTl8hDKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA6WZw/DAiGA8yMDI0MDIwMjAzMzUyNFoY
# DzIwMjQwMjAzMDMzNTI0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpZnD8AgEA
# MAcCAQACAh61MAcCAQACAhJJMAoCBQDpZ8J8AgEAMDYGCisGAQQBhFkKBAIxKDAm
# MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN
# AQEFBQADgYEAJrkoNr5/uD3w9FGKdVRrFfWvsaGc5zUFsn/35imMalISoQ9MxM+D
# Xq+1XtGkHdrN/4VQxGsXY2E84f315iJA9ImU8aN0HJV1hzXZqxJP6uMilbCHA4S2
# YGAcKvZwaqMrkVvUSl8yo0xWhh8aHgqlkix3kCTydz2z8zEDDHqQHxkxggQNMIIE
# CQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw
# JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeDU/B8T
# FR9+XQABAAAB4DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqG
# SIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCD4RF4XXT8qLzsu2tD867tViZvDV4h6
# FLO/H14haA4/czCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOPuUr/yOeVt
# OM+9zvsMIJJvhNkClj2cmbnCGwr/aQrBMIGYMIGApH4wfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwIgQgCzGZu+SWQHaF
# CYORP+gnZsFBDvMuRKcJwow+MWU5lPwwDQYJKoZIhvcNAQELBQAEggIAKYc1N0aw
# fXqAvxnskk5kyIZrQVqz/Riqx+87xdlyqhmTviAAIkZ5VkfMmaLu/o6BwxxbGpfz
# oPVygLOtL0ggl7MYeaZ7Cocs6oFsQ7QmIhTIjqINMELWaiFz3Eb09WJdZK8Qe9/u
# zlxZHgzrB9500kaQaxN8sBQYtfw81nQ0lvjrRAJ2h2J4w9zHWACpxL7DGNT2Evkn
# AIN0gxEBoUWpVoRIN4M7ND0GO3OFd9A7Y1cyJRywlxa07q+eU5Y9bUjp5fqMg1MK
# 0f4YiI3DiA7k6N7kRcnaijFugUx70/MpJuTsaVGk0t+OOgYyBwqaskM/0pQTGkw7
# gP+OiDbb+Y1inEbzASQ3Thylnm270VWrNC7HXAJO/3WMGM02Pa0I51sJC5z+hIiH
# jpxn7AoR+g76tolWQLpplgWdgw3ZFVWKZkWWPkn0QDp22fuIegF9h7LwNRPptAme
# Fmk0WpA1HN1X/W1imuOevRwRPbWv1ptw/8XXAEpFtUn08eqIDHWR1ORTgfKsDwHg
# 2Dgq6GDGkBIVUK51qPRe4gu3LnvAneBtKqXMdRSohF5ZStwhMm5AP5NqxFVR9Cp7
# 3boJtJH6VywButw47VNuPErWJgKacR9dRL2OjV2qUzf6L0KU8QIn04OPsoPxL5ye
# IaG0sRdh3INUJrz1VGejjNSFr2+3yE8orxE=
# SIG # End signature block
| 0
|
sample_13_76.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Get the details of an Azure Load Testing resource.
.Description
Get the details of an Azure Load Testing resource.
.Example
{{ Add code here }}
.Example
{{ Add code here }}
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Models.Api20221201.ILoadTestResource
.Link
https://learn.microsoft.com/powershell/module/az.loadtesting/get-azload
#>
function Get-AzLoad {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Models.Api20221201.ILoadTestResource])]
[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)]
param(
[Parameter(ParameterSetName='Get', Mandatory)]
[Alias('LoadTestName')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Path')]
[System.String]
# Name of the Azure Load Testing resource.
${Name},
[Parameter(ParameterSetName='Get', Mandatory)]
[Parameter(ParameterSetName='List1', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Path')]
[System.String]
# Name of the resource group.
${ResourceGroupName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String[]]
# The ID of the subscription.
${SubscriptionId},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
try {
Az.LoadTesting.internal\Get-AzLoad @PSBoundParameters
}
catch {
throw
}
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBzs21hg4J0ChO4
# F/9xINfBt04rz/1oeTUIjFHOib1c3KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIxAvnrJakV9tsl6x6EJJiVL
# GkEyitAqBvEOzx82UwnWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAJzso219vcnjvBDiPLtg66A73hB/hPUAWDDK5Jw+IdYlc47gA+xSaQc+O
# 7mV+lBbcJkrhHqKC05thKyuSPQl/edty1wHxWbhWZLiZNsDOPElQPBnegmVGN4OF
# CKeRpyNEN0U1xvGvkjlr/yE/ZZ5MbAU9Njqy5ZzCcqyKXyt+g6vcBitknqtFPX+h
# 7PnKTirMh24D+we6dJlR/zhKITnN+l0dvFH15B620HqvdXSSA/Jh0fhj8X5alLoX
# RXolr6vzWvZGvsx0+zz7rBwxa+Tpb38QAQLm0Cy+3YFY8J4u/0GySnfJnFzDoQD6
# PJGvM5ZMgHsIZ4Y8mYBK03GzShiaN6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCOj/dIpMCqrk8zTpgtUfx1QO1iinc9+Yx3PEVJgE/o5QIGZhfWS4l1
# GBMyMDI0MDQyMzEzMTYxNC4xNTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/
# Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1
# tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060
# akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq
# dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0
# EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8
# /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79
# 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE
# blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S
# bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+
# wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul
# IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC
# pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn
# HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6
# ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn
# LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi
# DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+
# uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb
# n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe
# GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B
# 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv
# KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9
# gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz
# cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIknDAiGA8yMDI0MDQyMzEyMTQy
# MFoYDzIwMjQwNDI0MTIxNDIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0iSc
# AgEAMAoCAQACAgyFAgH/MAcCAQACAhNGMAoCBQDp03YcAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAAtBkyUdrM1hwbTBWCK48MGmKRxZss6LPFkY42ZOWnXs
# VX6ZpU1Gl/LHGQnpRZk6/hinddMaf7iclXFbDMTro7W58hCrRegPfWwTzs8g1aOM
# YXNAwJW30fwOsS6mecLg5zfkvBReOfq509wnpa0Ndwg6EQMGwD/BAq7tdePiGcew
# KasjknLTpYY7fgoW2Ncb0sgNMRHJId/wLrHwD90VtvkCEnw9OPR+IbvMfWkyCTqp
# PJ3Y0U/m/Oeqqoo9GDlFnX17f/az0HZjr4SZ9LXRqz8Qa4zlmb79kpVqf6nLoXJr
# 9P9oeI7iFIEHkb+mYdtENFDUMyhhduOhsqZHXwrf3QQxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB
# 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAHqWRQZpivBokA8xU+WZwwieJC4sUndR3jxKz/MDVX
# PTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE
# X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgUj1W10UOl24tqW0PGjrhbdiG
# 0wEdX5mXIsSe+QniYO0wDQYJKoZIhvcNAQELBQAEggIAp7wKbNTKtZyOSMsowibS
# wqxdv6Pib7bJFkmSl5cgrJ/zil/JwDm2uElFoVw4+8sO6O3VDOQI60/2Kt5H/mJ0
# WWDSHlyrQZ/Hz7fK1kDYq0DxcEHsJG/zCq6RnFR8y8e04Bq4Vqm1rOOMZQuFhQI0
# oUn88vdCONy/JNuk0/F/HbogR0CzB8Lagfun5yV6HpBPMoVJnvolaCT6e2KuwB7A
# lXAs1we98/nr7bdM3ZFfFKFanVsJngh1hBm7yA3YZy/zmcGh+JGv5AH1DgRrpLak
# djh86z1fWu5WL1FU8NUHxpWNjPIr+lu48zfa81Bx4RH8f4Pz2vwIVjMSw1nAqW7E
# v1OozQh+Kx1TOO/+W9x6YsFQ2+SljfQNt37d/ZymvZG5Aat7Mf+hpZ0ijyqxmP3e
# hk8Q/ibp49hm99TIxjTfiCHJKvYnGoF0SADZDGZjDmG6PcLFBe1lcQ4J5KQZTo90
# asDolf9zp5Oh8uV6QB7nc1YgN/KFrfVnzzUphqHYcpn5XE/VAk5AIrfk4OXplblf
# VgOnWwS5HiyENPUQMATym2qTN4JRedYCMa5wbPsUYW5IALd522psrcXl+GvCKwl3
# hl6jw6IJtrwU9pzcAYNI71JYi7KdQcwhm/5Ca/6qEvc3Tv73wDTSY5apl5mOZmd1
# 1nE7BpnNvvoL41LaczrBGEc=
# SIG # End signature block
| 0
|
sample_4_18.ps1
|
#************************************************
# TS_ServicingPendingXml.ps1
# Version 1.0.1
# Date: 6/6/2012
# Author: v-alyao
# Description: [Idea ID 3472] [Windows] Pending Transactions Rule Idea - Pending.xml
# Rule number: 3472
# Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=3472
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber 3472
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_ServicingPendingXml"
$PublicContent = "http://support.microsoft.com/kb/2509997"
$InternalContent = ""
$Verbosity = "Warning"
$Visibility = "4"
$SupportTopicsID = "8110"
$Title = $ScriptStrings.ID_ServicingPendingXml_ST
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
Function AppliesToSystem
{
#Add your logic here to specify on which environments this rule will appy
return ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or #Win Vista/Server 2008
(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or #Win 7/Server 2008 R2
(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) -or
($OSVersion.Major -eq 10))
}
# **************
# Detection Logic
# **************
$PendingXmlPath=Join-path -Path $Env:windir "Winsxs\pending.xml"
Function CheckPendingXML()
{
return Test-Path -Path $PendingXmlPath
}
#Check to see if rule is applicable to this computer
if (AppliesToSystem)
{
$RuleApplicable = $true
if (CheckPendingXML)
{
$RootCauseDetected = $true
#Add information to InformationCollected
$InformationCollected | add-member -membertype noteproperty -name "File Name" -value $PendingXmlPath
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAsJdYR32egKkO6
# zjFgeGxD5y3Z1Rkd8E5qdd1d1aFDqKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKbn
# C3+davS0rJXYqlZhhB8ACqDcGgbUidTiSC3FVWQMMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEARQeSLlNuftgZMvdKFDX+sRt9ZTjnQzkBbMIw
# FWU2VxWQ4eVTDOGfYI/W8wxxYoglwhfRFy7tis1eSoOYwWhiQ8Wp/urjem7szaW9
# rMtMqizG9hsfcSSNoPhCp74CaOgj/FaCDTrbJZDUHLae6il7s2OMEmnfNp+4ue7m
# kkgZyTmBIDz4F1yFsOP/5ajAfAHmETsQXZujkvchOFCxgrMbyPUO8NaAUe/+2kHf
# KXPgQihVXb1a2nSDVlUQvhaclVtuePabJlrKSnQwNCV9wixhIZrQDeISJrCxOWA7
# bZbE6UilgdznMfWQDwASVx46aFg9pg3xH/IFJTrKi9v0StuelaGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBbQMp8NjLT96eyDOX2ZaDdIuWq7MjLRCa/
# 6+rr5uL9ewIGZutKd/MuGBMyMDI0MTAxNzAwMjMyMy42NDdaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/xI4
# fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# yeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4d
# U4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqh
# hxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAn
# ncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTM
# KjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L
# 0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr
# 9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqf
# RuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbi
# aboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA
# 4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49
# tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUA
# p6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyf
# OievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkG
# Zjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3
# kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU
# 3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0T
# y0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOd
# gRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tyt
# uulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3
# XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTS
# Y4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUl
# cnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOq6sSYwIhgPMjAyNDEwMTYyMTM5NTBaGA8yMDI0
# MTAxNzIxMzk1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6rqxJgIBADAHAgEA
# AgIgXjAHAgEAAgIT3DAKAgUA6rwCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQAxrHar6E0qXwEy/BG8HVTYduAtwmCE63wSeGsK2IhVymYiOaScSSM4//PC
# fAvPIsmTfLxY80vhvR7Q3WbDExoYiPkucKqMQwF+lQwI1C3rkUBaKB2p5hzq5uZk
# TKS84+qLxfoDz/X5od20nuVwPyk9GSTLdrhAs7rNxUIGskjQJw9EyJijAARNsk7u
# JuCc4P+ukuE3gFHOVM4M3LUXrIMuUwqtvBDLHYOB0rphISZXl075Yq/Vgzrj8Bem
# 75u6UD3meJQ5BGUAjlvm5RvYYW4B0TLcvIgaLVmgfrXQ/Y90wY02kVlGfCvK9Lvu
# A2w8KfHYCK1sMpvjb96cLRWJL0kGMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgoSVeEbcXV944eG9cHQF6Cba4RpTddnlrD1xGrB+oxmMwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDjSEV8
# upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# /xI4fPfBZdahAAEAAAH/MCIEIMq4V/O0frvYnME1TOX/zvGqnTReD0m9O1WSYr6T
# pBw5MA0GCSqGSIb3DQEBCwUABIICAF1D4/buto8oIEQxepjZToaRlZh+A+9oEr+E
# 7Xz8RT8GEApZ2J+Ko+zN3TVw7hNjXrzHJ2P+1DzHSIZrh6wc5ISXeasJclDxlZ8W
# 3ARCmvkCk0tZF7t/pUw3o7fTLn3uMyhFgEBuUIyeeEmGb0mWo1QP/gHs6pRfCb5+
# JDUkas4nUa7GbtAs/pUZWZGMQlfs/d93zS7amjalW0CpIzEhdXJaExP/tSOhOUU3
# bN9yJpvC3nJN9JPpUXQqiagF2qFiBqsnPeL/ALibfSlkt5KdkmGvrzklF9Ka+a+y
# OGqpKsboZOl+QX1x+37EpK6BuOF5MOZNFqgqWcZV78ee1TyPByfh6afaJb6afO47
# UufXq1C13Hu6pr0zYHS4WFvD9pOcnaV0FasQvO2QPn8FNIoCT7O2jmvh/FwbsB1E
# tj7tW17frN/aTGfeTzAVe2UKRMaYyq8BWPppMjnYDah/eiUmkw9Jg3Y0Tcb41PQw
# aHI2ibZBKaqDxcTbf3kLisKslOn64B6+RFKNXAwis1q8Gc6of8mZTVpPVd3sm8Tz
# cmCQdlk4jW6yd8mfkoFvd6WnQZJaHfQqLCBODRa7lK7LAngVJYF1dz4SXGBmuJd8
# UUW/Y3373zubsxVU+gyhHU22+2Vp4le8nzJZ2+j7nSbsB7SNILt4z7Aq3FAeQLZy
# j/aWOtw+
# SIG # End signature block
| 0
|
PowerSmug - Sync Smugmug.ps1
|
# PowerSmug photo sync script v1.0
# This PowerShell script will syncronize a folder of images with a users SmugMug account
# Please set the appropriate variables in the User Defined Variables region
# For more information visit
#
# Images are uploaded to a gallery with the same name as the folder they are contained in.
# All folders below the Photo Directory path and the images they contain will be uploaded to SmugMug
# Folders that end in _ are ignored, so if you don't want to sync a folder with SmugMug, just add an underscore at the end
#
# Copyright 2008 Shell Tools, LLC
#Region User Defined Variables
$ApiKey = 'uVUvCbXP3f6MgO9wIRJn21YCIgEidVly'
$EmailAddress = '[SmugMug Email]'
$Password = '[SmugMug Password]'
$PhotoDirectory = '[Path To Photos]'
$filesToInclude = @('*.jpg','*.png','*.tif','*.cr2')
$worldSearchable = 1
$smugSearchable = 1
# Professional Accounts Only
$watermark=0
$watermarkId=0
#Email Variables
$smtpServer = '[SMTP Server]'
$smtpUser = '[SMTP User]'
$smtpPassword = '[SMTP Password]'
$smtpFrom = 'PowerSmug@shelltools.net'
#EndRegion
#Region Global Variables
$baseUrl = 'http://api.smugmug.com/hack/rest/1.2.0/'
$userAgent = 'PowerSmug v1.0'
$logFile = 'PowerSmug.log'
$script:SessionId = $null
$script:startStringState = $false
$script:valueState = $false
$script:arrayState = $false
$script:saveArrayState = $false
$script:datFileDirty = $false
$script:datFile = @()
$script:albumList = $null
$script:imageList = $null
#EndRegion
#region Helper Functions
function SendEmail([string] $to, [string] $subject, [string] $msg)
{
$smtpMail = new-Object System.Net.Mail.SmtpClient $smtpServer
$smtpMail.DeliveryMethod = [System.Net.Mail.SmtpDeliveryMethod]'Network'
$smtpMail.Credentials = new-Object System.Net.NetworkCredential $smtpUser, $smtpPassword
$smtpMail.Send($smtpFrom, $to, $subject, $msg)
}
function Get-MD5([System.IO.FileInfo] $file = $(Throw 'Usage: Get-MD5 [System.IO.FileInfo]'))
{
# This Get-MD5 function sourced from:
# http://blogs.msdn.com/powershell/archive/2006/04/25/583225.aspx
$stream = $null;
$cryptoServiceProvider = [System.Security.Cryptography.MD5CryptoServiceProvider];
$hashAlgorithm = new-object $cryptoServiceProvider
$stream = $file.OpenRead();
$hashByteArray = $hashAlgorithm.ComputeHash($stream);
$stream.Close();
## We have to be sure that we close the file stream if any exceptions are thrown.
trap
{
if ($stream -ne $null) { $stream.Close(); }
break;
}
# Convert the MD5 hash to Hex
$hashByteArray | foreach { $result += $_.ToString("X2") }
return $result
}
function SendWebRequest([string]$method, $queryParams, $ssl = $false)
{
$url = $baseUrl
if ($ssl -eq $true) {
$url = $url.Replace("http", "https")
}
$url += "?method=$method"
foreach ($key in $queryParams.Keys) {
$url += "&$key=" + $queryParams[$key]
}
$wc = New-Object Net.WebClient
$wc.Headers.Add("user-agent", $userAgent)
[xml]$webResult = $wc.DownloadString($url)
CheckResponseForError $webResult
return $webResult.rsp
}
# Adds image information to our data file
function AddFile ([System.IO.FileInfo]$file, $smugId) {
$a = 1 | Select-Object Name, SmugId, LastModifiedTime;
$a.Name = $file.Name
$a.SmugId = $smugId
$a.LastModifiedTime = $file.LastWriteTimeUtc.ToString()
$script:datFile += $a
# $script:datFileDirty = $true
#we are now saving the file after each upload to prevent duplicates when there is a failure
AppendDataFile $datFilePath $a
}
# writes the data file to the local directory
# each directory will have a data file with information for images contained in it
function SaveDataFile($filePath, $clearFile=$true)
{
if ($script:datFileDirty -eq $false) { $script:datFile = @(); return }
[System.IO.File]::Delete($filePath)
$sortedFile = $script:datFile | sort-Object -property Name
$sortedFile | Export-Csv $filePath
$script:datFileDirty = $false
# mark the file as hidden
ls $filePath | foreach { $_.Attributes = $_.Attributes -bor [System.IO.FileAttributes]::Hidden }
if ($clearFile -eq $true) {
# clear the variable
$script:datFile = @()
}
}
# appends a new row to the data file
function AppendDataFile($filePath, $record)
{
if (test-Path $datFilePath) {
$newLine = [System.String]::Format('{0},{1},"{2}"', $a.Name, $a.SmugId, $a.LastModifiedTime)
Add-Content $filePath $newLine
}
else
{
$script:datFileDirty = $true
SaveDataFile $filePath $false
}
}
# ensure our web request was successful
function CheckResponseForError($xmlResponse)
{
if ($xmlResponse.rsp.stat -eq 'fail') {
throw $webResult.rsp.err.msg
}
}
#endregion
#region Login/Logout
function Login()
{
if ($script:SessionId -ne $null) { return }
$ht = @{APIKey=$ApiKey;EmailAddress=$EmailAddress;Password=$Password}
$loginResult = SendWebRequest "smugmug.login.withPassword" $ht $true
if ($loginResult.stat -eq "ok") {
$script:SessionId = $loginResult.Login.Session.id
}
else {
Throw "Error on login: " + $loginResult.Message
}
}
function Logout()
{
if ($script:SessionId -eq $null) { return }
$ht = @{SessionID=$script:SessionId}
$logoutResult = SendWebRequest "smugmug.logout" $ht
}
#endregion
#region Images
# this method is only needed if we cannot find the PowerSmug.dat file.
# preventing us from uploading duplicate images
function GetImage($name, $album)
{
Login
$image = $script:imageList.Images | Where-Object { $_.FileName -eq $name }
if ($image -ne $null) { return $image }
# we are using heavy because we need the file name
$ht = @{SessionID=$script:SessionId;AlbumID=$album.id;Heavy=1;AlbumKey=$album.Key}
[xml]$script:imageList = SendWebRequest "smugmug.images.get" $ht
return $script:imageList.Images.Image | Where-Object { $_.FileName -eq $name }
}
function UploadFile($file, $albumName)
{
$album = GetAlbum $albumName
# $image = GetImage $file.Name $album
# if ($image -ne $null) { return $image.id }
$url = "http://upload.smugmug.com/" + $file.Name
$wc = New-Object Net.WebClient
$hash = Get-MD5 $file
$wc.Headers.Add("user-agent", $userAgent)
$wc.Headers.Add("ContentMd5", $hash)
$wc.Headers.Add("X-Smug-FileName", $file.Name)
$wc.Headers.Add("X-Smug-AlbumID", $album.id)
$wc.Headers.Add("X-Smug-SessionID", $script:SessionId)
$wc.Headers.Add("X-Smug-Version", "1.2.0")
$wc.Headers.Add("X-Smug-ResponseType", "REST")
$webResult = $wc.UploadFile($url, "PUT", $file.FullName)
[xml]$webResult = [System.Text.Encoding]::ASCII.GetString($webResult)
CheckResponseForError $webResult
return $webResult.rsp.Image.id
}
function UploadExistingFile($file, $id)
{
Login
$url = "http://upload.smugmug.com/" + $file.Name
$wc = New-Object Net.WebClient
$hash = Get-MD5 $file
$wc.Headers.Add("user-agent", $userAgent)
$wc.Headers.Add("ContentMd5", $hash)
$wc.Headers.Add("X-Smug-FileName", $file.Name)
$wc.Headers.Add("X-Smug-ImageID", $id)
$wc.Headers.Add("X-Smug-SessionID", $script:SessionId)
$wc.Headers.Add("X-Smug-Version", "1.2.0")
$wc.Headers.Add("X-Smug-ResponseType", "REST")
$webResult = $wc.UploadFile($url, "PUT", $file.FullName)
[xml]$webResult = [System.Text.Encoding]::ASCII.GetString($webResult)
CheckResponseForError $webResult
return $webResult.rsp
}
#endregion
#region Album
function GetAlbumList($forceRefresh=$false) {
Login
if ($forceRefresh -eq $false) {
if ($script:albumList -ne $null) { return }
}
$ht = @{SessionID=$script:SessionId}
$script:albumList = SendWebRequest "smugmug.albums.get" $ht
}
function GetAlbum($name)
{
#before we create an album ensure it doesn't already exist
GetAlbumList
$album = $script:albumList.Albums.Album | Where-Object { $_.Title -eq $name }
if ($album -ne $null) { return $album }
Write-Host "Creating album: $name"
$ht = @{SessionID=$script:SessionId;Title=$name;CategoryID=0;Public=0;
X2Larges=0;X3Larges=0;Originals=0;Watermarking=$watermark;
WatermarkID=$watermarkId;WorldSearchable=$worldSearchable;SmugSearchable=$smugSearchable}
$result = SendWebRequest "smugmug.albums.create" $ht
# be sure we refresh the album list after creation
GetAlbumList $true
return $result.Album
}
#endregion
#region Process File
function ProcessFile([System.IO.FileInfo]$file, $albumName)
{
$photoObject = $script:datFile | Where-Object { $_.Name -eq $file.Name }
if ($photoObject -ne $null) {
if ($photoObject.LastModifiedTime -ne $file.LastWriteTimeUtc.ToString()) {
# file has been modified, so re-upload the file
write-Host "Updating existing file: " $file.FullName
UploadExistingFile $file $photoObject.SmugId
$photoObject.LastModifiedTime = $file.LastWriteTimeUtc.ToString()
# mark the dat file as dirty so it will be saved after processing this folder
$script:datFileDirty = $true
}
}
else {
#file doesn't exist in local file, upload to SmugMug
write-Host "Uploading new file: " $file.FullName
$id = UploadFile $file $albumName
AddFile $file $id
}
}
#endregion
#region Main Script
# this section will look through all sub-directories of $PhotoDirectory and upload the images to SmugMug
Get-ChildItem -recurse $PhotoDirectory | Where-Object { $_.Attributes -band [System.IO.FileAttributes]::Directory } | foreach {
# don't process folders that end in _
if ($_.FullName.EndsWith("_") -eq $false) {
$datFilePath = $_.FullName + "\\PowerSmug.dat"
if (test-Path $datFilePath) {
# casting as array to ensure we have an array returned
[array]$script:datFile = import-Csv $datFilePath
}
$albumName = $_.FullName.Remove(0, $PhotoDirectory.Length).Trim('\\')
$path = $_.FullName + "\\*"
foreach ($file in get-ChildItem $path -include $filesToInclude) {
ProcessFile $file $albumName
}
SaveDataFile $datFilePath
$script:imageList = $null
}
}
Logout
$date = Get-Date
Write-Host "Script Completed: $date"
trap [Exception] {
$date = Get-Date
$Msg = $date.ToString() + " ; " + $_.Exception.GetType().FullName + " ; " + $_.Exception.Message
Add-Content $logFile $Msg
SendEmail $EmailAddress "PowerSmug Error" $Msg
break
}
#endregion
| 0
|
sample_14_12.ps1
|
# Copyright (C) 2020,2023 VMware, Inc. All rights reserved.
. ".\utils.ps1"
try {
# IIS 7 and above
$applicationHostConfigPath = Join-Path $env:windir "system32\inetsrv\config\applicationHost.config"
if (Test-Path $applicationHostConfigPath) {
$result = ((Get-Content $applicationHostConfigPath) | Select-String -Pattern "bindingInformation" -Context 0,1).Line
Write-Host ($result -replace "/>", "/>`n")
if ($result -ne $null) {
$installPath = Join-Path $env:windir "system32\inetsrv\"
Write-Host "IIS InstallPath="$installPath
}
}
# IIS 6 and below
$metaBaseXmlPath = Join-Path $env:windir "system32\inetsrv\MetaBase.xml"
if (Test-Path $metaBaseXmlPath) {
$result = ((Get-Content $metaBaseXmlPath) | Select-String -Pattern "Bindings" -Context 0,1).Line
Write-Host ($result -replace "/>", "/>`n")
if ($result -ne $null) {
$installPath = Join-Path $env:windir "system32\inetsrv\"
Write-Host "IIS InstallPath="$installPath
}
}
} catch [System.Exception] {
logError -function "get-iis-ports-info" -command "$_.message" -message "$_.TargetSite"
}
| 0
|
TabExpansion_10.ps1
|
## Tab-Completion
#################
## Please dot souce this script file.
## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list.
##
## What this can do is:
##
## [datetime]::n<tab>
## [datetime]::now.d<tab>
## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell"
## $c = [ref]$a; $d = [ref]$b,$c
## $d[0].V<tab>[0][0].Get<tab>
## $d[1].V<tab>[0,0].tos<tab>
## $function:a<tab>
## $env:a<tab>
## [System.Type].a<tab>
## [datetime].Assembly.a<tab>
## ).a<tab> # shows System.Type properties and methods...
## #native command name expansion
## fsu<tab>
## #command option name expansion (for fsutil ipconfig net powershell only)
## fsutil <tab>
## ipconfig <tab>
## net <tab>
## powershell <tab>
## #TypeNames and Type accelerators expansion
## [Dec<tab>
## [system.Man<tab>.auto<tab>.p<tab>
## New-Object -TypeName IO.Dir<tab>
## New-Object System.win<tab>.for<tab>.bu<tab>
## #ProgIDs expansion
## New-Object -Com shel<tab>
## #Enum option expansion
## Set-ExecutionPolicy <tab>
## Set-ExecutionPolicy All<tab>
## Set-ExcusionPolisy -ex <tab>
## Get-TraceSource Inte<tab>
## iex -Errora <tab> -wa Sil<tab>
## #WmiClasses expansion
## Get-WmiObject -class Win32_<tab>
## gwmi __Instance<tab>
## #Encoding expansion
## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab>
## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab>
## #PSProvider name expansion
## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab>
## Get-PSProvider <tab>
## pwd -psp al<tab>
## #PSDrive name expansion
## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab>
## Get-PSDrive <tab>
## pwd -psd <tab>
## #PSSnapin name expansion
## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab>
## Get-Command -PSSnapin <tab>
## Remove-PSSnapin <tab>
## Get-PSSnapin M<tab>
## #Eventlog name and expansion
## Get-Eventlog -Log <tab>
## Get-Eventlog w<tab>
## #Eventlog's entrytype expansion
## Get-EventLog -EntryType <tab>
## Get-EventLog -EntryType Er<tab>
## Get-EventLog -Ent <tab>
## #Service name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab>
## New-Service -DependsOn <tab>
## New-Service -Dep e<tab>
## Get-Service -n <tab>
## Get-Service <tab>,a<tab>,p<tab>
## gsv <tab>
## #Service display name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab>
## Get-Service -Dis <tab>
## gsv -Dis <tab>,w<tab>,b<tab>
## #Cmdlet and Topic name expansion (this also support default help and man function)
## Get-Help [-Name] about_<tab>
## Get-Help <tab>
## #Category name expansion (this also support default help and man function)
## Get-Help -Category c<tab>,<tab>
## #Command name expansion
## Get-Command [-Name] <tab>
## Get-Command -Name <tab>
## gcm a<tab>,<tab>
## #Scope expansion
## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias
## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab>
## Clear-Variable -Scope G<tab>
## Set-Alias -s <tab>
## #Process name expansion
## [Get-Process | Stop-Process] [-Name] <tab>
## Stop-Process -Name <tab>
## Stop-Process -N pow<tab>
## Get-Process <tab>
## ps power<tab>
## #Trace sources expansion
## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab>
## #Trace -ListenerOption expansion
## [Set-TraceSource | Trace-Command] -ListenerOption <tab>
## Set-TraceSource -Lis <tab>,n<tab>
## #Trace -Option expansion
## [Set-TraceSource | Trace-Command] -Option <tab>
## Set-TraceSource -op <tab>,con<tab>
## #ItemType expansion
## New-Item -Item <tab>
## ni -ItemType d<tab>
## #ErrorAction and WarningAction option expansion
## CMDLET [-ErrorAction | -WarningAction] <tab>
## CMDLET -Errora s<tab>
## CMDLET -ea con<tab>
## CMDLET -wa <tab>
## #Continuous expansion with comma when parameter can treat multiple option
## # if there are spaces, occur display bug in the line
## # if strings contains '$' or '-', not work
## Get-Command -CommandType <tab>,<tab><tab>,cm<tab>
## pwd -psp <tab>,f<tab>,va<tab>
## Get-EventLog -EntryType <tab>,i<tab>,s<tab>
## #Enum expansion in method call expression
## # this needs one or more spaces after left parenthesis or comma
## $str = "day night"
## $str.Split( " ",<space>rem<tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR
## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success
## $type = [System.Type]
## $type.GetMembers(<space>Def<tab>
## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab>
## # this can do continuous enum expansion with comma and no spaces
## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>"
## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab>
## #Better '$_.' expansion when cmdlet output objects or method return objects
## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> }
## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB }
## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> }
## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" }
## $data = Get-Process
## $data[2,4,5] | % { $_.<tab>
## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type
## #Property name expansion by -Property parameter
## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object |
## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab>
## Select-Object -ExcludeProperty <tab>
## Select-Object -ExpandProperty <tab>
## gcm Get-Acl|select -exp Par<tab>
## ps |group na<tab>
## ls | ft A<tab>,M<tab>,L<tab>
## #Hashtable key expansion in the variable name and '.<tab>'
## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} }
## $hash.pow<tab>.pro<tab>
## #Parameter expansion for function, filter and script
## man -f<tab>
## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1
## .\\foobar.ps1 -<tab> -b<tab>
## #Enum expansion for function, filter and scripts
## # this can do continuous enum expansion with comma and no spaces
## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab>
## #Enum expansion for assignment expression
## #needs space(s) after '=' and comma
## #strongly-typed with -as operator and space(s)
## $ErrorActionPreference =<space><tab>
## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3
## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab>
## #Path expansion with variable and '\\' or '/'
## $PWD\\../../<tab>\\<tab>
## "$env:SystemDrive/pro<tab>/<tab>
## #Operator expansion which starts with '-'
## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2'
## 1..9 -co<tab> 5
## #Keyword expansion
## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } }
## #Variable name expansion (only global scope)
## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab>
## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab>
## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab>
## Tee-Object -Variable <tab>
## gv pro<tab>,<tab>
## Remove-Variable -Name out<tab>,<tab>,ps<tab>
## ... | ... | tee -v <tab>
## #Alias name expansion
## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab>
## Export-Alias -Name <tab>
## Get-Alias i<tab>,e<tab>,a<tab>
## epal -n for<tab>
## #Property name expansion with -groupBy parameter
## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab>
## ps | ft -g <tab>
## gcm | Format-Wide -GroupBy Par<tab>
## #Type accelerators expansion with no charactors
## [<tab>
## New-Object -typename <tab>
## New-Object <tab>
## # File glob expansion with '@'
## ls *.txt@<tab>
## ls file.txt, foo1.txt, 'bar``[1``].txt', 'foo bar .txt' # 1 <tab> expanding with comma
## ls * -Filter *.txt # 2 <tab> refactoring
## ls *.txt # 3 <tab> (or 1 <tab> & 1 <shift>+<tab>) return original glob pattern
## This can also use '^'(hat) or '~'(tilde) for Excluding
## ls <hat>*.txt@<tab>
## ls foo.ps1, 'bar``[1``].xml' # 1 <tab> expanding with comma
## ls * -Filter * -Excluding *.txt # 2 <tab> refactoring
## *.txt<tilde>foo*<tilde>bar*@<tab>
## ls file.txt # 1 <tab> expanding with comma
## ls * -Filter *.txt -Excluding foo*, bar* # 2 <tab> refactoring
## # Ported history expansion from V2CTP3 TabExpansion with '#' ( #<pattern> or #<id> )
## ls * -Filter * -Excluding foo*, bar*<Enter>
## #ls<tab>
## #1<tab>
## # Command buffer stack with ';'(semicolon)
## ls * -Filter * -Excluding foo*, bar*<semicolon><tab> # push command1
## echo "PowerShell"<semicolon><tab> # push command2
## get-process<semicolon><tab> # push command3
## {COMMAND}<Enter> # execute another command
## get-process # Auto pop command3 from stack by LIFO
## This can also hand-operated pop with ';,'(semicolon&comma) or ';:'(semicolon&colon)
## get-process; <semicolon><comma><tab>
## get-process; echo "PowerShell" # pop command2 from stack by LIFO
## # Function name expansion after 'function' or 'filter' keywords
## function cl<tab>
## #Switch syntax option expansion
## switch -w<tab> -f<tab>
## #Better powershell.exe option expansion with '-'
## powershell -no<tab> -<tab> -en<tab>
### Generate ProgIDs list...
if ( Test-Path $PSHOME\\ProgIDs.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\ProgIDs.txt
$_ProgID = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\")
$_ProgID = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_subkey in $_HKCR.GetSubKeyNames() )
{
foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") )
{
if ($_i -ne $null)
{
$_ProgID.Add($_i.GetValue(""))
}
}
}
'$_ProgID was updated...' | Out-Host
$_ProgID = $_ProgID|sort -Unique
Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose
}
### Generate TypeNames list...
if ( Test-Path $PSHOME\\TypeNames.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\TypeNames.txt
$_TypeNames = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_TypeNames = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() )
{
foreach ( $_type in $_asm.GetTypes() )
{
$_TypeNames.Add($_type.FullName)
}
}
'$_TypeNames was updated...' | Out-Host
$_TypeNames = $_TypeNames | sort -Unique
Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose
}
if ( Test-Path $PSHOME\\TypeNames_System.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\TypeNames_System.txt
$_TypeNames_System = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.'
'$_TypeNames_System was updated...' | Out-Host
Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose
}
### Generate WMIClasses list...
if ( Test-Path $PSHOME\\WMIClasses.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\WMIClasses.txt
$_WMIClasses = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_WMIClasses = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_class in gwmi -List )
{
$_WMIClasses.Add($_class.Name)
}
$_WMIClasses = $_WMIClasses | sort -Unique
'$_WMIClasses was updated...' | Out-Host
Set-Content -Value $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose
}
[Reflection.Assembly]::LoadWithPartialName( "System.Windows.Forms" ) | Out-Null
$global:_cmdstack = New-Object Collections.Stack
$global:_snapin = $null
$global:_TypeAccelerators = "ADSI", "Array", "Bool", "Byte", "Char", "Decimal", "Double", "float", "hashtable", "int", "Long", "PSObject", "ref",
"Regex", "ScriptBlock", "Single", "String", "switch", "Type", "WMI", "WMIClass", "WMISearcher", "xml"
iex (@'
function prompt {
if ($_cmdstack.Count -gt 0) {
$line = $global:_cmdstack.Pop() -replace '([[\\]\\(\\)+{}?~%])','{$1}'
[System.Windows.Forms.SendKeys]::SendWait($line)
}
'@ + @"
${function:prompt}
}
"@)
function Write-ClassNames ( $data, $i, $prefix='', $sep='.' )
{
$preItem = ""
foreach ( $class in $data -like $_opt )
{
$Item = $class.Split($sep)
if ( $preItem -ne $Item[$i] )
{
if ( $i+1 -eq $Item.Count )
{
if ( $prefix -eq "[" )
{
$suffix = "]"
}
elseif ( $sep -eq "_" )
{
$suffix = ""
}
else
{
$suffix = " "
}
}
else
{
$suffix = ""
}
$prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix
$preItem = $Item[$i]
}
}
}
function Get-PipeLineObject {
$i = -2
$property = $null
do {
$str = $line.Split("|")
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1]
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
if ( $_cmdlet -eq "?" )
{
$_cmdlet = "Where-Object"
}
$global:_exp = $_cmdlet
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0]
}
if ( "Select-Object" -eq $_cmdlet )
{
if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' )
{
$property = $Matches[1] + ";" + $property
}
}
$i--
} while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet )
if ( $global:_forgci -eq $null )
{
$a = @(ls "Alias:\\")[0]
$e = @(ls "Env:\\")[0]
$f = @(ls "Function:\\")[0]
$h = @(ls "HKCU:\\")[0]
$v = @(ls "Variable:\\")[0]
$c = @(ls "cert:\\")[0]
$global:_forgci = gi $PSHOME\\powershell.exe |
Add-Member 'NoteProperty' CommandType $f.CommandType -P |
Add-Member 'NoteProperty' Definition $a.Definition -P |
Add-Member 'NoteProperty' Description $a.Description -P |
Add-Member 'NoteProperty' Key $e.Key -P |
Add-Member 'NoteProperty' Location $c.Location -P |
Add-Member 'NoteProperty' LocationName $c.LocationName -P |
Add-Member 'NoteProperty' Options $a.Options -P |
Add-Member 'NoteProperty' ReferencedCommand $a.ReferencedCommand -P |
Add-Member 'NoteProperty' ResolvedCommand $a.ResolvedCommand -P |
Add-Member 'NoteProperty' ScriptBlock $f.ScriptBlock -P |
Add-Member 'NoteProperty' StoreNames $c.StoreNames -P |
Add-Member 'NoteProperty' SubKeyCount $h.SubKeyCount -P |
Add-Member 'NoteProperty' Value $e.Value -P |
Add-Member 'NoteProperty' ValueCount $h.ValueCount -P |
Add-Member 'NoteProperty' Visibility $a.Visibility -P |
Add-Member 'NoteProperty' Property $h.Property -P |
Add-Member 'NoteProperty' ResolvedCommandName $a.ResolvedCommandName -P |
Add-Member 'ScriptMethod' Close {} -P |
Add-Member 'ScriptMethod' CreateSubKey {} -P |
Add-Member 'ScriptMethod' DeleteSubKey {} -P |
Add-Member 'ScriptMethod' DeleteSubKeyTree {} -P |
Add-Member 'ScriptMethod' DeleteValue {} -P |
Add-Member 'ScriptMethod' Flush {} -P |
Add-Member 'ScriptMethod' GetSubKeyNames {} -P |
Add-Member 'ScriptMethod' GetValue {} -P |
Add-Member 'ScriptMethod' GetValueKind {} -P |
Add-Member 'ScriptMethod' GetValueNames {} -P |
Add-Member 'ScriptMethod' IsValidValue {} -P |
Add-Member 'ScriptMethod' OpenSubKey {} -P |
Add-Member 'ScriptMethod' SetValue {} -P
}
if ( $global:_mix -eq $null )
{
$f = gi $PSHOME\\powershell.exe
$t = [type]
$s = ""
$global:_mix = `
Add-Member -InputObject (New-Object PSObject) 'NoteProperty' Mode $f.Mode -P |
Add-Member 'NoteProperty' Assembly $t.Assembly -P |
Add-Member 'NoteProperty' AssemblyQualifiedName $t.AssemblyQualifiedName -P |
Add-Member 'NoteProperty' Attributes $f.Attributes -P |
Add-Member 'NoteProperty' BaseType $t.BaseType -P |
Add-Member 'NoteProperty' ContainsGenericParameters $t.ContainsGenericParameters -P |
Add-Member 'NoteProperty' CreationTime $f.CreationTime -P |
Add-Member 'NoteProperty' CreationTimeUtc $f.CreationTimeUtc -P |
Add-Member 'NoteProperty' DeclaringMethod $t.DeclaringMethod -P |
Add-Member 'NoteProperty' DeclaringType $t.DeclaringType -P |
Add-Member 'NoteProperty' Exists $f.Exists -P |
Add-Member 'NoteProperty' Extension $f.Extension -P |
Add-Member 'NoteProperty' FullName $f.FullName -P |
Add-Member 'NoteProperty' GenericParameterAttributes $t.GenericParameterAttributes -P |
Add-Member 'NoteProperty' GenericParameterPosition $t.GenericParameterPosition -P |
Add-Member 'NoteProperty' GUID $t.GUID -P |
Add-Member 'NoteProperty' HasElementType $t.HasElementType -P |
Add-Member 'NoteProperty' IsAbstract $t.IsAbstract -P |
Add-Member 'NoteProperty' IsAnsiClass $t.IsAnsiClass -P |
Add-Member 'NoteProperty' IsArray $t.IsArray -P |
Add-Member 'NoteProperty' IsAutoClass $t.IsAutoClass -P |
Add-Member 'NoteProperty' IsAutoLayout $t.IsAutoLayout -P |
Add-Member 'NoteProperty' IsByRef $t.IsByRef -P |
Add-Member 'NoteProperty' IsClass $t.IsClass -P |
Add-Member 'NoteProperty' IsCOMObject $t.IsCOMObject -P |
Add-Member 'NoteProperty' IsContextful $t.IsContextful -P |
Add-Member 'NoteProperty' IsEnum $t.IsEnum -P |
Add-Member 'NoteProperty' IsExplicitLayout $t.IsExplicitLayout -P |
Add-Member 'NoteProperty' IsGenericParameter $t.IsGenericParameter -P |
Add-Member 'NoteProperty' IsGenericType $t.IsGenericType -P |
Add-Member 'NoteProperty' IsGenericTypeDefinition $t.IsGenericTypeDefinition -P |
Add-Member 'NoteProperty' IsImport $t.IsImport -P |
Add-Member 'NoteProperty' IsInterface $t.IsInterface -P |
Add-Member 'NoteProperty' IsLayoutSequential $t.IsLayoutSequential -P |
Add-Member 'NoteProperty' IsMarshalByRef $t.IsMarshalByRef -P |
Add-Member 'NoteProperty' IsNested $t.IsNested -P |
Add-Member 'NoteProperty' IsNestedAssembly $t.IsNestedAssembly -P |
Add-Member 'NoteProperty' IsNestedFamANDAssem $t.IsNestedFamANDAssem -P |
Add-Member 'NoteProperty' IsNestedFamily $t.IsNestedFamily -P |
Add-Member 'NoteProperty' IsNestedFamORAssem $t.IsNestedFamORAssem -P |
Add-Member 'NoteProperty' IsNestedPrivate $t.IsNestedPrivate -P |
Add-Member 'NoteProperty' IsNestedPublic $t.IsNestedPublic -P |
Add-Member 'NoteProperty' IsNotPublic $t.IsNotPublic -P |
Add-Member 'NoteProperty' IsPointer $t.IsPointer -P |
Add-Member 'NoteProperty' IsPrimitive $t.IsPrimitive -P |
Add-Member 'NoteProperty' IsPublic $t.IsPublic -P |
Add-Member 'NoteProperty' IsSealed $t.IsSealed -P |
Add-Member 'NoteProperty' IsSerializable $t.IsSerializable -P |
Add-Member 'NoteProperty' IsSpecialName $t.IsSpecialName -P |
Add-Member 'NoteProperty' IsUnicodeClass $t.IsUnicodeClass -P |
Add-Member 'NoteProperty' IsValueType $t.IsValueType -P |
Add-Member 'NoteProperty' IsVisible $t.IsVisible -P |
Add-Member 'NoteProperty' LastAccessTime $f.LastAccessTime -P |
Add-Member 'NoteProperty' LastAccessTimeUtc $f.LastAccessTimeUtc -P |
Add-Member 'NoteProperty' LastWriteTime $f.LastWriteTime -P |
Add-Member 'NoteProperty' LastWriteTimeUtc $f.LastWriteTimeUtc -P |
Add-Member 'NoteProperty' MemberType $t.MemberType -P |
Add-Member 'NoteProperty' MetadataToken $t.MetadataToken -P |
Add-Member 'NoteProperty' Module $t.Module -P |
Add-Member 'NoteProperty' Name $t.Name -P |
Add-Member 'NoteProperty' Namespace $t.Namespace -P |
Add-Member 'NoteProperty' Parent $f.Parent -P |
Add-Member 'NoteProperty' ReflectedType $t.ReflectedType -P |
Add-Member 'NoteProperty' Root $f.Root -P |
Add-Member 'NoteProperty' StructLayoutAttribute $t.StructLayoutAttribute -P |
Add-Member 'NoteProperty' TypeHandle $t.TypeHandle -P |
Add-Member 'NoteProperty' TypeInitializer $t.TypeInitializer -P |
Add-Member 'NoteProperty' UnderlyingSystemType $t.UnderlyingSystemType -P |
Add-Member 'NoteProperty' PSChildName $f.PSChildName -P |
Add-Member 'NoteProperty' PSDrive $f.PSDrive -P |
Add-Member 'NoteProperty' PSIsContainer $f.PSIsContainer -P |
Add-Member 'NoteProperty' PSParentPath $f.PSParentPath -P |
Add-Member 'NoteProperty' PSPath $f.PSPath -P |
Add-Member 'NoteProperty' PSProvider $f.PSProvider -P |
Add-Member 'NoteProperty' BaseName $f.BaseName -P |
Add-Member 'ScriptMethod' Clone {} -P |
Add-Member 'ScriptMethod' CompareTo {} -P |
Add-Member 'ScriptMethod' Contains {} -P |
Add-Member 'ScriptMethod' CopyTo {} -P |
Add-Member 'ScriptMethod' Create {} -P |
Add-Member 'ScriptMethod' CreateObjRef {} -P |
Add-Member 'ScriptMethod' CreateSubdirectory {} -P |
Add-Member 'ScriptMethod' Delete {} -P |
Add-Member 'ScriptMethod' EndsWith {} -P |
Add-Member 'ScriptMethod' FindInterfaces {} -P |
Add-Member 'ScriptMethod' FindMembers {} -P |
Add-Member 'ScriptMethod' GetAccessControl {} -P |
Add-Member 'ScriptMethod' GetArrayRank {} -P |
Add-Member 'ScriptMethod' GetConstructor {} -P |
Add-Member 'ScriptMethod' GetConstructors {} -P |
Add-Member 'ScriptMethod' GetCustomAttributes {} -P |
Add-Member 'ScriptMethod' GetDefaultMembers {} -P |
Add-Member 'ScriptMethod' GetDirectories {} -P |
Add-Member 'ScriptMethod' GetElementType {} -P |
Add-Member 'ScriptMethod' GetEnumerator {} -P |
Add-Member 'ScriptMethod' GetEvent {} -P |
Add-Member 'ScriptMethod' GetEvents {} -P |
Add-Member 'ScriptMethod' GetField {} -P |
Add-Member 'ScriptMethod' GetFields {} -P |
Add-Member 'ScriptMethod' GetFiles {} -P |
Add-Member 'ScriptMethod' GetFileSystemInfos {} -P |
Add-Member 'ScriptMethod' GetGenericArguments {} -P |
Add-Member 'ScriptMethod' GetGenericParameterConstraints {} -P |
Add-Member 'ScriptMethod' GetGenericTypeDefinition {} -P |
Add-Member 'ScriptMethod' GetInterface {} -P |
Add-Member 'ScriptMethod' GetInterfaceMap {} -P |
Add-Member 'ScriptMethod' GetInterfaces {} -P |
Add-Member 'ScriptMethod' GetLifetimeService {} -P |
Add-Member 'ScriptMethod' GetMember {} -P |
Add-Member 'ScriptMethod' GetMembers {} -P |
Add-Member 'ScriptMethod' GetMethod {} -P |
Add-Member 'ScriptMethod' GetMethods {} -P |
Add-Member 'ScriptMethod' GetNestedType {} -P |
Add-Member 'ScriptMethod' GetNestedTypes {} -P |
Add-Member 'ScriptMethod' GetObjectData {} -P |
Add-Member 'ScriptMethod' GetProperties {} -P |
Add-Member 'ScriptMethod' GetProperty {} -P |
Add-Member 'ScriptMethod' GetTypeCode {} -P |
Add-Member 'ScriptMethod' IndexOf {} -P |
Add-Member 'ScriptMethod' IndexOfAny {} -P |
Add-Member 'ScriptMethod' InitializeLifetimeService {} -P |
Add-Member 'ScriptMethod' Insert {} -P |
Add-Member 'ScriptMethod' InvokeMember {} -P |
Add-Member 'ScriptMethod' IsAssignableFrom {} -P |
Add-Member 'ScriptMethod' IsDefined {} -P |
Add-Member 'ScriptMethod' IsInstanceOfType {} -P |
Add-Member 'ScriptMethod' IsNormalized {} -P |
Add-Member 'ScriptMethod' IsSubclassOf {} -P |
Add-Member 'ScriptMethod' LastIndexOf {} -P |
Add-Member 'ScriptMethod' LastIndexOfAny {} -P |
Add-Member 'ScriptMethod' MakeArrayType {} -P |
Add-Member 'ScriptMethod' MakeByRefType {} -P |
Add-Member 'ScriptMethod' MakeGenericType {} -P |
Add-Member 'ScriptMethod' MakePointerType {} -P |
Add-Member 'ScriptMethod' MoveTo {} -P |
Add-Member 'ScriptMethod' Normalize {} -P |
Add-Member 'ScriptMethod' PadLeft {} -P |
Add-Member 'ScriptMethod' PadRight {} -P |
Add-Member 'ScriptMethod' Refresh {} -P |
Add-Member 'ScriptMethod' Remove {} -P |
Add-Member 'ScriptMethod' Replace {} -P |
Add-Member 'ScriptMethod' SetAccessControl {} -P |
Add-Member 'ScriptMethod' Split {} -P |
Add-Member 'ScriptMethod' StartsWith {} -P |
Add-Member 'ScriptMethod' Substring {} -P |
Add-Member 'ScriptMethod' ToCharArray {} -P |
Add-Member 'ScriptMethod' ToLower {} -P |
Add-Member 'ScriptMethod' ToLowerInvariant {} -P |
Add-Member 'ScriptMethod' ToUpper {} -P |
Add-Member 'ScriptMethod' ToUpperInvariant {} -P |
Add-Member 'ScriptMethod' Trim {} -P |
Add-Member 'ScriptMethod' TrimEnd {} -P |
Add-Member 'ScriptMethod' TrimStart {} -P |
Add-Member 'NoteProperty' Chars $s.Chars -P
}
if ( "Add-Member" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Compare-Object" -eq $_cmdlet )
{
$global:_dummy = (Compare-Object 1 2)[0]
}
if ( "ConvertFrom-SecureString" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "ConvertTo-SecureString" -eq $_cmdlet )
{
$global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force
}
if ( "ForEach-Object" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Acl" -eq $_cmdlet )
{
$global:_dummy = Get-Acl
}
if ( "Get-Alias" -eq $_cmdlet )
{
$global:_dummy = (Get-Alias)[0]
}
if ( "Get-AuthenticodeSignature" -eq $_cmdlet )
{
$global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe
}
if ( "Get-ChildItem" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-Command" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Get-Content" -eq $_cmdlet )
{
$global:_dummy = (type $PSHOME\\profile.ps1)[0]
}
if ( "Get-Credential" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Culture" -eq $_cmdlet )
{
$global:_dummy = Get-Culture
}
if ( "Get-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( "Get-Event" -eq $_cmdlet )
{
$global:_dummy = (Get-Event)[0]
}
if ( "Get-EventLog" -eq $_cmdlet )
{
$global:_dummy = Get-EventLog Windows` PowerShell -Newest 1
}
if ( "Get-ExecutionPolicy" -eq $_cmdlet )
{
$global:_dummy = Get-ExecutionPolicy
}
if ( "Get-Help" -eq $_cmdlet )
{
$global:_dummy = Get-Help Add-Content
}
if ( "Get-History" -eq $_cmdlet )
{
$global:_dummy = Get-History -Count 1
}
if ( "Get-Host" -eq $_cmdlet )
{
$global:_dummy = Get-Host
}
if ( "Get-Item" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-ItemProperty" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Location" -eq $_cmdlet )
{
$global:_dummy = Get-Location
}
if ( "Get-Member" -eq $_cmdlet )
{
$global:_dummy = (1|Get-Member)[0]
}
if ( "Get-Module" -eq $_cmdlet )
{
$global:_dummy = (Get-Module)[0]
}
if ( "Get-PfxCertificate" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Process" -eq $_cmdlet )
{
$global:_dummy = ps powershell
}
if ( "Get-PSBreakpoint" -eq $_cmdlet )
{
$global:_dummy =
Add-Member -InputObject (New-Object PSObject) 'NoteProperty' Action '' -P |
Add-Member 'NoteProperty' Command '' -P |
Add-Member 'NoteProperty' Enabled '' -P |
Add-Member 'NoteProperty' HitCount '' -P |
Add-Member 'NoteProperty' Id '' -P |
Add-Member 'NoteProperty' Script '' -P
}
if ( "Get-PSCallStack" -eq $_cmdlet )
{
$global:_dummy = Get-PSCallStack
}
if ( "Get-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Function
}
if ( "Get-PSProvider" -eq $_cmdlet )
{
$global:_dummy = Get-PSProvider FileSystem
}
if ( "Get-PSSnapin" -eq $_cmdlet )
{
$global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core
}
if ( "Get-Service" -eq $_cmdlet )
{
$global:_dummy = (Get-Service)[0]
}
if ( "Get-TraceSource" -eq $_cmdlet )
{
$global:_dummy = Get-TraceSource AddMember
}
if ( "Get-UICulture" -eq $_cmdlet )
{
$global:_dummy = Get-UICulture
}
if ( "Get-Variable" -eq $_cmdlet )
{
$global:_dummy = Get-Variable _
}
if ( "Get-WmiObject" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Group-Object" -eq $_cmdlet )
{
$global:_dummy = 1 | group
}
if ( "Measure-Command" -eq $_cmdlet )
{
$global:_dummy = Measure-Command {}
}
if ( "Measure-Object" -eq $_cmdlet )
{
$global:_dummy = Measure-Object
}
if ( "New-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Alias
}
if ( "New-TimeSpan" -eq $_cmdlet )
{
$global:_dummy = New-TimeSpan
}
if ( "Resolve-Path" -eq $_cmdlet )
{
$global:_dummy = $PWD
}
if ( "Select-String" -eq $_cmdlet )
{
$global:_dummy = " " | Select-String " "
}
if ( "Set-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( $property -ne $null)
{
foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) )
{
$global:_dummy = @($global:_dummy.$name)[0]
}
}
}
function TabExpansion {
# This is the default function to use for tab expansion. It handles simple
# member expansion on variables, variable name expansion and parameter completion
# on commands. It doesn't understand strings so strings containing ; | ( or { may
# cause expansion to fail.
param($line, $lastWord)
& {
# Helper function to write out the matching set of members. It depends
# on dynamic scoping to get $_base, _$expression and $_pat
function Write-Members ($sep='.')
{
# evaluate the expression to get the object to examine...
Invoke-Expression ('$_val=' + $_expression)
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
$_method = [Management.Automation.PSMemberTypes] `
'Method,CodeMethod,ScriptMethod,ParameterizedProperty'
if ($sep -eq '.')
{
$members =
(
[Object[]](Get-Member -InputObject $_val.PSextended $_pat) +
[Object[]](Get-Member -InputObject $_val.PSadapted $_pat) +
[Object[]](Get-Member -InputObject $_val.PSbase $_pat)
)
if ( $_val -is [Hashtable] )
{
[Microsoft.PowerShell.Commands.MemberDefinition[]]$_keys = $null
foreach ( $_name in $_val.Keys )
{
$_keys += `
New-Object Microsoft.PowerShell.Commands.MemberDefinition `
[int],$_name,"Property",0
}
$members += [Object[]]$_keys | ? { $_.Name -like $_pat }
}
foreach ($_m in $members | sort membertype,name -Unique)
{
if ($_m.MemberType -band $_method)
{
# Return a method...
$_base + $_expression + $sep + $_m.name + '('
}
else {
# Return a property...
$_base + $_expression + $sep + $_m.name
}
}
}
else
{
foreach ($_m in Get-Member -Static -InputObject $_val $_pat |
Sort-Object membertype,name)
{
if ($_m.MemberType -band $_method)
{
# Return a method...
$_base + $_expression + $sep + $_m.name + '('
}
else {
# Return a property...
$_base + $_expression + $sep + $_m.name
}
}
}
}
switch -regex ($lastWord)
{
# Handle property and method expansion at '$_'
'(^.*)(\\$_\\.)(\\w*)$' {
$_base = $matches[1]
$_expression = '$global:_dummy'
$_pat = $matches[3] + '*'
$global:_dummy = $null
Get-PipeLineObject
if ( $global:_dummy -eq $null )
{
if ( $global:_exp -match '^\\$.*\\(.*$' )
{
$type = ( iex $_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' )
{
$tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1]
$type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' )
{
$global:_dummy = @(iex $Matches[1])[0]
}
else
{
$global:_dummy = $global:_mix
}
}
Write-Members
break;
}
# Handle property and method expansion rooted at variables...
# e.g. $a.b.<tab>
'(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
$_pat = $matches[4] + '*'
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle simple property and method expansion on static members...
# e.g. [datetime]::n<tab>
'(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
$_pat = $matches[4] + '*'
Write-Members '::'
break;
}
# Handle complex property and method expansion on static members
# where there are intermediate properties...
# e.g. [datetime]::now.d<tab>
'(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' {
$_base = $matches[1] # everything before the expression
$_expression = $matches[2].TrimEnd('.') # expression less trailing '.'
$_pat = $matches[5] + '*' # the member to look for...
Write-Members
break;
}
# Handle variable name expansion...
'(^.*\\$)(\\w+)$' {
$_prefix = $matches[1]
$_varName = $matches[2]
foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*'))
{
$_prefix + $_v.name
}
break;
}
# Handle env&function drives variable name expansion...
'(^.*\\$)(.*\\:)(\\w+)$' {
$_prefix = $matches[1]
$_drive = $matches[2]
$_varName = $matches[3]
if ($_drive -eq "env:" -or $_drive -eq "function:")
{
foreach ($_v in Get-ChildItem ($_drive + $_varName + '*'))
{
$_prefix + $_drive + $_v.name
}
}
break;
}
# Handle array's element property and method expansion
# where there are intermediate properties...
# e.g. foo[0].n.b<tab>
'(^.*)(\\$((\\w+\\.)|(\\w+(\\[(\\w|,)+\\])+\\.))+)(\\w*)$'
{
$_base = $matches[1]
$_expression = $matches[2].TrimEnd('.')
$_pat = $Matches[8] + '*'
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle property and method expansion rooted at type object...
# e.g. [System.Type].a<tab>
'(^\\[(\\w|\\.)+\\])\\.(\\w*)$'
{
if ( $(iex $Matches[1]) -isnot [System.Type] ) { break; }
$_expression = $Matches[1]
$_pat = $Matches[$matches.Count-1] + '*'
Write-Members
break;
}
# Handle complex property and method expansion on type object members
# where there are intermediate properties...
# e.g. [datetime].Assembly.a<tab>
'^(\\[(\\w|\\.)+\\]\\.(\\w+\\.)+)(\\w*)$' {
$_expression = $matches[1].TrimEnd('.') # expression less trailing '.'
$_pat = $matches[4] + '*' # the member to look for...
if ( $(iex $_expression) -eq $null ) { break; }
Write-Members
break;
}
# Handle property and method expansion rooted at close parenthes...
# e.g. (123).a<tab>
'^(.*)\\)((\\w|\\.)*)\\.(\\w*)$' {
$_base = $Matches[1] + ")"
if ( $matches[3] -eq $null) { $_expression = '[System.Type]' }
else { $_expression = '[System.Type]' + $Matches[2] }
$_pat = $matches[4] + '*'
iex "$_expression | Get-Member $_pat | sort MemberType,Name" |
% {
if ( $_.MemberType -like "*Method*" -or $_.MemberType -like "*Parameterized*" ) { $parenthes = "(" }
if ( $Matches[2] -eq "" ) { $_base + "." + $_.Name + $parenthes }
else { $_base + $Matches[2] + "." + $_.Name + $parenthes }
}
break;
}
# Handle .NET type name expansion ...
# e.g. [Microsoft.PowerShell.Com<tab>
'^\\[((\\w+\\.?)*)$' {
$_opt = $matches[1] + '*'
if ( $_opt -eq "*" )
{
$_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]'
}
else
{
$_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]'
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) '['
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) '['
}
break;
}
# Handle file/directory name which contains $env: variable
# e.g. $env:windir\\<tab>
'^\\$(env:)?\\w+([\\\\/][^\\\\/]*)*$' {
$path = iex ('"' + $Matches[0] + '"')
if ( $Matches[2].Length -gt 1 )
{
$parent = Split-Path $path -Parent
$leaf = (Split-Path $path -Leaf) + '*'
}
else
{
$parent = $path
$leaf = '*'
}
if ( Test-Path $parent )
{
$i = $Matches[0].LastIndexOfAny("/\\")
$_base = $Matches[0].Substring(0,$i+1)
[IO.Directory]::GetFileSystemEntries( $parent, $leaf ) | % { $_base + ($_.Split("\\/")[-1] -replace '([\\$\\s&])','`$1' -replace '([[\\]])', '````$1') }
}
}
# Handle file glob expansion ...
# e.g. *.txt~about*@<tab>
'^(\\^?([^~]+))(~(.*))*@$' {
if ( $Matches[1] -notlike "^*" )
{
$include = $Matches[2] -replace '``','`'
if ( $Matches[3] )
{
$exclude = $Matches[3].Split("~", "RemoveEmptyEntries" -as [System.StringSplitOptions]) -replace '``','`'
}
}
else
{
$include = "*"
$exclude = $Matches[2] -replace '``','`'
}
$fse = [IO.Directory]::GetFileSystemEntries($PWD)
$fse = $fse -replace '.*[\\\\/]([^/\\\\]*)$','$1'
% -in ($fse -like $include) { $fse = $_; $exclude | % { $fse = $fse -notlike $_ } }
$fse = $fse -replace '^.*\\s.*$', ('"$0"')
$fse = $fse -replace '([\\[\\]])', '````$1' -replace '^.*([\\[\\]]).*$', ('"$0"')
$fse = $fse -replace '""', '"'
$OFS = ", "; "$fse"
$OFS = ", "; "* -Filter $include " + $(if($exclude){"-Exclude $exclude"})
$Matches[0].Substring(0, $Matches[0].Length-1)
break;
}
# Handle command buffer stack...
'(.*);(.?)$' {
$_base = $Matches[1]
if ( $Matches[2] -eq ":" -or $Matches[2] -eq "," )
{
if ( $_cmdstack.Count -gt 0 )
{
$_base + $global:_cmdstack.Pop()
}
else
{
""
}
}
elseif ( $Matches[2] -eq "" )
{
$global:_cmdstack.Push($line.SubString(0,$line.Length-1))
[System.Windows.Forms.SendKeys]::SendWait("{ESC}")
}
}
# Do completion on parameters...
'^-([\\w0-9]*)' {
$_pat = $matches[1] + '*'
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_cmdlet -match '\\{([^\\{\\}]*)$')
{
$_cmdlet = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_cmdlet -match '\\(([^()]*)$')
{
$_cmdlet = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'All' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'All' $_cmdlet.Definition)[0]
}
if ( $_cmdlet.name -eq "powershell.exe" )
{
if ( $global:_PSexeOption )
{
$global:_PSexeOption -like "-$_pat" -replace '^(-[^,]+).*$', '$1' | sort
}
else
{
($global:_PSexeOption = powershell.exe -?) -like "-$_pat" -replace '^(-[^,]+).*$', '$1' | sort
}
break;
}
if ( $_cmdlet.CommandType -eq "Cmdlet" )
{
# expand the parameter sets and emit the matching elements
foreach ($_n in $_cmdlet.ParameterSets |
Select-Object -expand parameters | Sort-Object -Unique name)
{
$_n = $_n.name
if ($_n -like $_pat) { '-' + $_n }
}
break;
}
elseif ( "ExternalScript", "Function", "Filter" -contains $_cmdlet.CommandType )
{
if ( $_cmdlet.CommandType -eq "ExternalScript" )
{
$_fsr = New-Object IO.StreamReader $_cmdlet.Definition
$_def = "Function _Dummy { $($_fsr.ReadToEnd()) }"
$_fsr.Close()
iex $_def
$_cmdlet = "_Dummy"
}
if ( ((gi "Function:$_cmdlet").Definition -replace '\\n').Split("{")[0] -match 'param\\((.*\\))\\s*[;\\.&a-zA-Z]*\\s*$' )
{
( ( ( $Matches[1].Split('$', "RemoveEmptyEntries" -as [System.StringSplitOptions]) -replace `
'^(\\w+)(.*)','$1' ) -notmatch '^\\s+$' ) -notmatch '^\\s*\\[.*\\]\\s*$' ) -like $_pat | sort | % { '-' + $_ }
}
break;
}
elseif ( $line -match 'switch\\s+(-\\w+\\s+)*-(\\w*)$')
{
$_pat = $Matches[2] + '*'
"regex", "wildcard", "exact", "casesensitive", "file" -like $_pat -replace '^(.*)$', '-$1'
break;
}
elseif ( $_cmdlet -eq $null )
{
"-and", "-as", "-band", "-bnot", "-bor", "-bxor", "-ccontains", "-ceq", "-cge", "-cgt", "-cle", "-clike", "-clt",
"-cmatch", "-cne", "-cnotcontains", "-cnotlike", "-cnotmatch", "-contains", "-creplace", "-csplit", "-eq", "-f", "-ge",
"-gt", "-icontains", "-ieq", "-ige", "-igt", "-ile", "-ilike", "-ilt", "-imatch", "-ine", "-inotcontains", "-inotlike",
"-inotmatch", "-ireplace", "-is", "-isnot", "-isplit", "-join", "-le", "-like", "-lt", "-match", "-ne", "-not", "-notcontains",
"-notlike", "-notmatch", "-or", "-replace", "-split", "-xor" -like "-$_pat"
}
break;
}
# Tab complete against history either #<pattern> or #<id>
'^#(\\w*)' {
$_pattern = $matches[1]
if ($_pattern -match '^[0-9]+$')
{
Get-History -ea SilentlyContinue -Id $_pattern | Foreach { $_.CommandLine }
}
else
{
$_pattern = '*' + $_pattern + '*'
Get-History | Sort-Object -Descending Id| Foreach { $_.CommandLine } | where { $_ -like $_pattern }
}
break;
}
# try to find a matching command...
default {
$lastex = [regex]::Split($line, '[|;]')[-1]
if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)"\\w+"\\s*-as\\s+$' )
{
if ( $Matches[6] -ne $nul )
{
$brackets = "[]"
}
'['+ $global:_enum + $brackets + ']'
break;
}
if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)\\s*(\\w*)$' )
{
$_pat = $Matches[7] + '*'
$_type = @(iex $Matches[1])[0].GetType()
if ( $_type.IsEnum )
{
$global:_enum = $_type.FullName
[Enum]::GetValues($_type) -like $_pat -replace '^(.*)$','"$1"'
break;
}
}
$lastex = [regex]::Split($line, '[|;=]')[-1]
if ($lastex -match '[[$].*\\w+\\(.*-as\\s*$')
{
'['+ $global:_enum + ']'
}
elseif ( $lastex -match '([[$].*(\\w+))\\((.*)$' )
#elseif ( $lastex -match '([[$].*(\\w+))\\(([^)]*)$' )
{
$_method = $Matches[1]
if ( $Matches[3] -match "(.*)((`"|')(\\w+,)+(\\w*))$" )
{
$continuous = $true
$_opt = $Matches[5] + '*'
$_base = $Matches[2].TrimStart('"') -replace '(.*,)\\w+$','$1'
$position = $Matches[1].Split(",").Length
}
else
{
$continuous = $false
$_opt = ($Matches[3].Split(',')[-1] -replace '^\\s*','') + "*"
$position = $Matches[3].Split(",").Length
}
if ( ($_mdefs = iex ($_method + ".OverloadDefinitions")) -eq $null )
{
$tname, $mname = $_method.Split(":", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_mdefs = iex ($tname + '.GetMember("' + $mname + '") | % { $_.ToString() }')
}
foreach ( $def in $_mdefs )
{
[void] ($def -match '\\((.*)\\)')
foreach ( $param in [regex]::Split($Matches[1], ', ')[$position-1] )
{
if ($param -eq $null -or $param -eq "")
{
continue;
}
$type = $param.split()[0]
if ( $type -like '*`[*' -or $type -eq "Params" -or $type -eq "" )
{
continue;
}
$fullname = @($_typenames -like "*$type*")
foreach ( $name in $fullname )
{
if ( $continuous -eq $true -and ( $name -as [System.Type] ).IsEnum )
{
$output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$',($_base + '$1')
$output | sort
}
elseif ( ( $name -as [System.Type] ).IsEnum )
{
$global:_enum = $name
$output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$','"$1"'
$output | sort
}
}
}
}
if ( $output -ne $null )
{
break;
}
}
if ( $line -match '(function|filter)\\s+(\\w*)$')
{
$_pat = 'function:\\' + $Matches[2] + '*'
Get-ChildItem $_pat| % { $_.Name }
break;
}
if ( $line[-1] -eq " " )
{
$_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-1]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet.Definition)[0]
}
if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name )
{
"Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" | sort
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name )
{
Get-TraceSource | % { $_.Name } | sort -Unique
break;
}
if ( "New-Object" -eq $_cmdlet.Name )
{
$_TypeAccelerators
break;
}
if ( $_cmdlet.Noun -like "*WMI*" )
{
$_WMIClasses
break;
}
if ( "Get-Process" -eq $_cmdlet.Name )
{
Get-Process | % { $_.Name } | sort
break;
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin
break;
}
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" )
{
Get-PSDrive | sort
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name )
{
Get-EventLog -List | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name -or "man" -eq $_cmdlet.Name )
{
Get-Help -Category all | % { $_.Name } | sort -Unique
break;
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
Get-Service | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name )
{
Get-Command -CommandType All | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name )
{
Get-PipeLineObject
$_dummy | Get-Member -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name )
{
Get-Variable -Scope Global | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name )
{
Get-Alias | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( $line[-1] -eq " " )
{
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_cmdlet -match '\\{([^\\{\\}]*)$')
{
$_cmdlet = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_cmdlet -match '\\(([^()]*)$')
{
$_cmdlet = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'Application' $_cmdlet)[0]
if ( $_cmdlet.Name -eq "powershell.exe" )
{
"-PSConsoleFile", "-Version", "-NoLogo", "-NoExit", "-Sta", "-NoProfile", "-NonInteractive",
"-InputFormat", "-OutputFormat", "-EncodedCommand", "-File", "-Command" | sort
break;
}
if ( $_cmdlet.Name -eq "fsutil.exe" )
{
"behavior query", "behavior set", "dirty query", "dirty set",
"file findbysid", "file queryallocranges", "file setshortname", "file setvaliddata", "file setzerodata", "file createnew",
"fsinfo drives", "fsinfo drivetype", "fsinfo volumeinfo", "fsinfo ntfsinfo", "fsinfo statistics",
"hardlink create", "objectid query", "objectid set", "objectid delete", "objectid create",
"quota disable", "quota track", "quota enforce", "quota violations", "quota modify", "quota query",
"reparsepoint query", "reparsepoint delete", "sparse setflag", "sparse queryflag", "sparse queryrange", "sparse setrange",
"usn createjournal", "usn deletejournal", "usn enumdata", "usn queryjournal", "usn readdata", "volume dismount", "volume diskfree" | sort
break;
}
if ( $_cmdlet.Name -eq "net.exe" )
{
"ACCOUNTS ", " COMPUTER ", " CONFIG ", " CONTINUE ", " FILE ", " GROUP ", " HELP ",
"HELPMSG ", " LOCALGROUP ", " NAME ", " PAUSE ", " PRINT ", " SEND ", " SESSION ",
"SHARE ", " START ", " STATISTICS ", " STOP ", " TIME ", " USE ", " USER ", " VIEW" | sort
break;
}
if ( $_cmdlet.Name -eq "ipconfig.exe" )
{
"/?", "/all", "/renew", "/release", "/flushdns", "/displaydns",
"/registerdns", "/showclassid", "/setclassid"
break;
}
}
if ( $line -match '\\w+\\s+(\\w+(\\.|[^\\s\\.])*)$' )
{
#$_opt = $Matches[1] + '*'
$_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-2]
$_opt = $Matches[1].Split(" ,")[-1] + '*'
$_base = $Matches[1].Substring(0,$Matches[1].Length-$Matches[1].Split(" ,")[-1].length)
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet.Definition)[0]
}
if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name )
{
"Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" -like $_opt | sort
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name )
{
Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "New-Object" -eq $_cmdlet.Name )
{
$_TypeAccelerators -like $_opt
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1)
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1)
break;
}
if ( $_cmdlet.Name -like "*WMI*" )
{
Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_'
break;
}
if ( "Get-Process" -eq $_cmdlet.Name )
{
Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-PSProvider" -eq $_cmdlet.Name )
{
Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name )
{
Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name -or "man" -eq $_cmdlet.Name )
{
Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique
break;
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name )
{
Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name )
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name )
{
Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( $line -match '(-(\\w+))\\s+([^-]*$)' )
{
$_param = $matches[2] + '*'
$_opt = $Matches[3].Split(" ,")[-1] + '*'
$_base = $Matches[3].Substring(0,$Matches[3].Length-$Matches[3].Split(" ,")[-1].length)
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_cmdlet -match '\\{([^\\{\\}]*)$')
{
$_cmdlet = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_cmdlet -match '\\(([^()]*)$')
{
$_cmdlet = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias,ExternalScript,Filter,Function' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias,ExternalScript,Filter,Function' $_cmdlet.Definition)[0]
}
if ( $_param.TrimEnd("*") -eq "ea" -or $_param.TrimEnd("*") -eq "wa" )
{
"SilentlyContinue", "Stop", "Continue", "Inquire" |
? { $_ -like $_opt } | sort -Unique
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide" -contains $_cmdlet.Name `
-and "groupBy" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name }
break;
}
if ( $_param.TrimEnd("*") -eq "ev" -or $_param.TrimEnd("*") -eq "ov" -or
"ErrorVariable" -like $_param -or "OutVariable" -like $_param)
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort
break;
}
if ( "Tee-Object" -eq $_cmdlet.Name -and "Variable" -like $_param )
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Export-Alias", "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Out-File","Export-CSV","Select-String","Export-Clixml" -contains $_cmdlet.Name `
-and "Encoding" -like $_param)
{
"Unicode", "UTF7", "UTF8", "ASCII", "UTF32", "BigEndianUnicode", "Default", "OEM" |
? { $_ -like $_opt } | sort -Unique
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "New-Object" -like $_cmdlet.Name )
{
if ( "ComObject" -like $_param )
{
$_ProgID -like $_opt | % { $_ -replace '\\s','` ' }
break;
}
if ( "TypeName" -like $_param )
{
if ( $_opt -eq "*" )
{
$_TypeAccelerators -like $_opt
}
else
{
$_TypeAccelerators -like $_opt
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1)
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1)
}
break;
}
}
if ( "New-Item" -eq $_cmdlet.Name )
{
if ( "ItemType" -like $_param )
{
"directory", "file" -like $_opt
break;
}
}
if ( "Get-Location", "Get-PSDrive", "Get-PSProvider", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name `
-and "PSProvider" -like $_param )
{
Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Location" -eq $_cmdlet.Name -and "PSDrive" -like $_param )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" -like $_param )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name -and "PSSnapin" -like $_param)
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + $_ }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" `
-contains $_cmdlet.Name -and "Name" -like $_param )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + $_ }
break;
}
}
if ( "Clear-Variable", "Export-Alias", "Get-Alias", "Get-PSDrive", "Get-Variable", "Import-Alias",
"New-Alias", "New-PSDrive", "New-Variable", "Remove-Variable", "Set-Alias", "Set-Variable" `
-contains $_cmdlet.Name -and "Scope" -like $_param )
{
"Global", "Local", "Script" -like $_opt
break;
}
if ( "Get-Process", "Stop-Process", "Wait-Process" -contains $_cmdlet.Name -and "Name" -like $_param )
{
Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name -and "LogName" -like $_param )
{
Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name -or "man" -eq $_cmdlet.Name )
{
if ( "Name" -like $_param )
{
Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique
break;
}
if ( "Category" -like $_param )
{
"Alias", "Cmdlet", "Provider", "General", "FAQ",
"Glossary", "HelpFile", "All" -like $_opt | sort | % { $_base + $_ }
break;
}
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
if ( "Name" -like $_param )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "DisplayName" -like $_param )
{
Get-Service -Name $_opt | sort DisplayName | % { $_base + ($_.DisplayName -replace '\\s','` ') }
break;
}
}
if ( "New-Service" -eq $_cmdlet.Name -and "dependsOn" -like $_param )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-EventLog" -eq $_cmdlet.Name -and "EntryType" -like $_param )
{
"Error", "Information", "FailureAudit", "SuccessAudit", "Warning" -like $_opt | sort | % { $_base + $_ }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name -and "Name" -like $_param )
{
Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( $_cmdlet.Noun -like "*WMI*" )
{
if ( "Class" -like $_param )
{
Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_'
break;
}
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name -and "Property" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Select-Object" -eq $_cmdlet.Name )
{
if ( "ExcludeProperty" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "ExpandProperty" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name }
break;
}
}
if ( "ExternalScript", "Function", "Filter" -contains $_cmdlet.CommandType )
{
if ( $_cmdlet.CommandType -eq "ExternalScript" )
{
$_fsr = New-Object IO.StreamReader $_cmdlet.Definition
$_def = "Function _Dummy { $($_fsr.ReadToEnd()) }"
$_fsr.Close()
iex $_def
$_cmdlet = "_Dummy"
}
if ( ((gi "Function:$_cmdlet").Definition -replace '\\n').Split("{")[0] -match 'param\\((.*\\))\\s*[;\\.&a-zA-Z]*\\s*$' )
{
$Matches[1].Split(',', "RemoveEmptyEntries" -as [System.StringSplitOptions]) -like "*$_param" |
% { $_.Split("$ )`r`n", "RemoveEmptyEntries" -as [System.StringSplitOptions])[0] -replace '^\\[(.*)\\]$','$1' -as "System.Type" } |
? { $_.IsEnum } | % { [Enum]::GetNames($_) -like $_opt | sort } | % { $_base + $_ }
}
break;
}
select -InputObject $_cmdlet -ExpandProperty ParameterSets | select -ExpandProperty Parameters |
? { $_.Name -like $_param } | ? { $_.ParameterType.IsEnum } |
% { [Enum]::GetNames($_.ParameterType) } | ? { $_ -like $_opt } | sort -Unique | % { $_base + $_ }
}
if ( $line[-1] -match "\\s" ) { break; }
if ( $lastWord -ne $null -and $lastWord.IndexOfAny('/\\') -eq -1 ) {
$command = $lastWord.Substring( ($lastWord -replace '([^\\|\\(;={]*)$').Length )
$_base = $lastWord.Substring( 0, ($lastWord -replace '([^\\|\\(;={]*)$').Length )
$pattern = $command + "*"
"begin {", "break", "catch {", "continue", "data {", "do {", "else {", "elseif (",
"end {", "exit", "filter ", "for (", "foreach ", "from", "function ", "if (", "in",
"param (", "process {", "return", "switch ", "throw ", "trap ", "until (", "while (" `
-like $pattern | % { $_base + $_ }
gcm -Name $pattern -CommandType All | % { $_base + $_.Name } | sort -Unique
}
}
}
}
}
| 0
|
Get-GroupMembership_1.ps1
|
## Get-DistinguishedName -- look up a DN from a user's (login) name
function Get-DistinguishedName {
Param($UserName)
$ads = New-Object System.DirectoryServices.DirectorySearcher([ADSI]'')
$ads.filter = "(&(objectClass=Person)(samAccountName=$UserName))"
$s = $ads.FindOne()
return $s.GetDirectoryEntry().DistinguishedName
}
## Get-GroupMembership -- Get AD group membership recursively
function Get-GroupMembership {
Param($DNName,[int]$RecurseLimit=-1)
$groups = ([adsi]"LDAP://$DNName").MemberOf
if ($groups -and $RecurseLimit) {
Foreach ($gr in $groups) {
$groups += @(Get-GroupMembership $gr -RecurseLimit:$($RecurseLimit-1) |
? {$groups -notcontains $_})
}
}
return $groups
}
## Usage:
#################################################################################
## $groups = Get-GroupMembership (Get-DistinguishedName Jaykul)
## # To turn recursion off:
## $groups = Get-GroupMembership (Get-DistinguishedName Jaykul) -RecurseLimit 0
| 0
|
sample_33_58.ps1
|
#
# Module manifest for module 'OCI.PSModules.Servicecatalog'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Servicecatalog.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a52480f0-e7d7-4302-871e-ae7f3a42fc02'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Servicecatalog Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicecatalog.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIServicecatalog', 'Get-OCIServicecatalogApplicationsList',
'Get-OCIServicecatalogAssociation',
'Get-OCIServicecatalogAssociationsList',
'Get-OCIServicecatalogPrivateApplication',
'Get-OCIServicecatalogPrivateApplicationActionDownloadLogo',
'Get-OCIServicecatalogPrivateApplicationPackage',
'Get-OCIServicecatalogPrivateApplicationPackageActionDownloadConfig',
'Get-OCIServicecatalogPrivateApplicationPackagesList',
'Get-OCIServicecatalogPrivateApplicationsList',
'Get-OCIServicecatalogsList', 'Get-OCIServicecatalogWorkRequest',
'Get-OCIServicecatalogWorkRequestErrorsList',
'Get-OCIServicecatalogWorkRequestLogsList',
'Get-OCIServicecatalogWorkRequestsList',
'Invoke-OCIServicecatalogBulkReplaceServiceCatalogAssociations',
'Move-OCIServicecatalogCompartment',
'Move-OCIServicecatalogPrivateApplicationCompartment',
'New-OCIServicecatalog', 'New-OCIServicecatalogAssociation',
'New-OCIServicecatalogPrivateApplication',
'Remove-OCIServicecatalog', 'Remove-OCIServicecatalogAssociation',
'Remove-OCIServicecatalogPrivateApplication',
'Update-OCIServicecatalog',
'Update-OCIServicecatalogPrivateApplication'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicecatalog'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
New-ElevatedTask.ps1
|
#requires -version 2.0
####################################################################################################
## Version History
## 2.0 - First version with shortcut support
## - Still weak on documentation of the arguments, sorry ...
## 2.5 - Improved defaults and documentation (run with -?)
## 2.6 - CTP 3 version, with AutoHelp and CmdletBinding
function New-ElevatedTask {
<#
.SYNOPSIS
Creates a new "On Demand Only" scheduled task to run an "Elevated" application, and a shortcut to launch it.
.DESCRIPTION
New-ElevatedTask creates a scheduled task on Vista or Windows7 which runs "On Demand" with full priviledges (Elevated) and then creates a shortcut to launch it on demand.
It works by exploiting the import from XML feature of schtasks.exe /Create /XML ... and the ability to run tasks on demand via schtasks.exe /run /tn ...
You may specify the shortcut path as a folder path (which must exist), with a name for the new file (ending in .lnk), or you may specify one of the "SpecialFolder" names like "QuickLaunch" or "CommonDesktop" followed by the name. The shortcut feature depends on the New-Shortcut function (a separate script).
NOTE: You MUST run this in an elevated PowerShell instance.
.Example
New-ElevatedTask C:\\Windows\\Notepad.exe
Will create a task to run notepad elevated, and creates a shortcut to run it the current folder, named "Notepad.lnk"
.Example
New-ElevatedTask C:\\Windows\\Notepad.exe -Shortcut QuickLaunch\\Editor.lnk -FriendlyName "Run Notepad" -TaskName "Elevated Text Editor"
Will create a task to run notepad elevated, and names it "Elevated Text Editor". Also creates a shortcut on the QuickLaunch bar with the name "Run Notepad.lnk" and the tooltip "Elevated Text Editor"
.NOTE
Must be run from an elevated PowerShell instance
Some features depend on New-Shortcut (which is also available on the repository: http://PoshCode.org/search/New-Shortcut)
#>
[CmdletBinding()]
param(
$TargetPath = ""
, $Arguments = ""
, $WorkingDirectory = $(Split-Path -parent (Resolve-Path $TargetPath))
, $FriendlyName = $(Split-Path $TargetPath -leaf)
, $TaskName = $( "Elevated $friendlyName" )
, $IconLocation = $null
, $ShortcutPath = $null
, $Hotkey = $Null
, $UserName = $null
, $password = $null
,
[System.Management.Automation.PSCredential]
$credential = $null
)
$SchTasks = Join-Path ([Environment]::GetFolderPath("System")) "schtasks.exe"
if(-not (Test-Path $SchTasks) ) {
$SchTasks = Read-Host "You need to set the correct location for the SchTasks.exe application on your system"
}
if($args -contains "-?" -or $TargetPath.Trim(" ").Length -eq 0 -or (-not (Test-Path $TargetPath) )) {
if( -not($args -contains "-?")) { Write-Error "TargetPath must be an existing file for the scheduled task to point at!" }
Write-Host $UseMessage
return
}
$xml = @"
<?xml version="1.0" encoding="UTF-16"?>
<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
<RegistrationInfo>
<Author>{4}</Author>
<Description>Run {0} "As Administrator"</Description>
</RegistrationInfo>
<Triggers />
<Principals>
<Principal id="Author">
<UserId>{4}</UserId>
<LogonType>{5}</LogonType>
<RunLevel>HighestAvailable</RunLevel>
</Principal>
</Principals>
<Settings>
<MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>
<DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
<StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
<AllowHardTerminate>true</AllowHardTerminate>
<StartWhenAvailable>false</StartWhenAvailable>
<RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
<AllowStartOnDemand>true</AllowStartOnDemand>
<Enabled>true</Enabled>
<Hidden>false</Hidden>
<RunOnlyIfIdle>false</RunOnlyIfIdle>
<DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
<UseUnifiedSchedulingEngine>false</UseUnifiedSchedulingEngine>
<WakeToRun>false</WakeToRun>
<ExecutionTimeLimit>P3D</ExecutionTimeLimit>
<Priority>7</Priority>
</Settings>
<Actions Context="Author">
<Exec>
<Command>{1}</Command>
<Arguments>{2}</Arguments>
<WorkingDirectory>{3}</WorkingDirectory>
</Exec>
</Actions>
</Task>
"@
$xFile = [IO.Path]::GetTempFileName()
# if they specify a user name, assume they want to do password authentication
if($UserName -ne $null -and $password -ne $null) {
$xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $UserName, "Password" | set-content $xFile
&$SchTasks /Create /XML $xFile /TN $taskname /RU $UserName /RP $password
# if they didn't include a password, prompt them for one ...
} elseif($UserName -ne $null -and $password -eq $null) {
$xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $UserName, "Password" | set-content $xFile
&$SchTasks /Create /XML $xFile /TN $taskname /RU $UserName /RP
# if they supplied credentials instead, use that
} elseif($credential -ne $null) {
$xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $($Credential.UserName), "Password" | set-content $xFile
&$SchTasks /Create /XML $xFile /TN $taskname /RU $credential.UserName /RP $($Credential.GetNetworkCredential().Password)
} else {
# if they suppplied neither user nor credentials, lets assume they want the "current" user
$UserName = ([Security.Principal.WindowsIdentity]::GetCurrent().Name)
# if they passed a password, use that
if($password -ne $null) {
$xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $UserName, "Password" | set-content $xFile
&$SchTasks /Create /XML $xFile /TN $taskname /RU $UserName /RP $password
# otherwise, there are no special credentials needed, "Interactive" means only "this" user can run it.
} else {
$xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $UserName, "InteractiveToken" | set-content $xFile
&$SchTasks /Create /XML $xFile /TN $taskname
}
}
if($IconLocation -eq $null -or $IconLocation.Length -eq 0) {
$IconLocation = $TargetPath
}
if(([IO.FileInfo]$ShortcutPath).Extension.Length -eq 0 ) {
$ShortcutPath = "$ShortcutPath\\$FriendlyName.lnk"
$Description = $TaskName
} else {
$Description = $FriendlyName
}
## New-ShortCut $TargetPath $LinkPath $Arguments $WorkingDirectory $WindowStyle $IconLocation $Hotkey $Description
if(Get-Command New-Shortcut -ErrorAction SilentlyContinue) {
New-Shortcut -Target $SchTasks -LinkPath $ShortcutPath -Arg "/Run /TN `"$TaskName`"" -WorkingDirectory $WorkingDirectory -Window "Minimized" -Icon $IconLocation -Hotkey $Hotkey -Description $Description
}
}
| 0
|
sample_45_2.ps1
|
parameters:
# Which publishing infra should be used. THIS SHOULD MATCH THE VERSION ON THE BUILD MANIFEST.
# Publishing V1 is no longer supported
# Publishing V2 is no longer supported
# Publishing V3 is the default
- name: publishingInfraVersion
displayName: Which version of publishing should be used to promote the build definition?
type: number
default: 3
values:
- 3
- name: BARBuildId
displayName: BAR Build Id
type: number
default: 0
- name: PromoteToChannelIds
displayName: Channel to promote BARBuildId to
type: string
default: ''
- name: enableSourceLinkValidation
displayName: Enable SourceLink validation
type: boolean
default: false
- name: enableSigningValidation
displayName: Enable signing validation
type: boolean
default: true
- name: enableSymbolValidation
displayName: Enable symbol validation
type: boolean
default: false
- name: enableNugetValidation
displayName: Enable NuGet validation
type: boolean
default: true
- name: publishInstallersAndChecksums
displayName: Publish installers and checksums
type: boolean
default: true
- name: SDLValidationParameters
type: object
default:
enable: false
publishGdn: false
continueOnError: false
params: ''
artifactNames: ''
downloadArtifacts: true
# These parameters let the user customize the call to sdk-task.ps1 for publishing
# symbols & general artifacts as well as for signing validation
- name: symbolPublishingAdditionalParameters
displayName: Symbol publishing additional parameters
type: string
default: ''
- name: artifactsPublishingAdditionalParameters
displayName: Artifact publishing additional parameters
type: string
default: ''
- name: signingValidationAdditionalParameters
displayName: Signing validation additional parameters
type: string
default: ''
# Which stages should finish execution before post-build stages start
- name: validateDependsOn
type: object
default:
- build
- name: publishDependsOn
type: object
default:
- Validate
# Optional: Call asset publishing rather than running in a separate stage
- name: publishAssetsImmediately
type: boolean
default: false
stages:
- ${{ if or(eq( parameters.enableNugetValidation, 'true'), eq(parameters.enableSigningValidation, 'true'), eq(parameters.enableSourceLinkValidation, 'true'), eq(parameters.SDLValidationParameters.enable, 'true')) }}:
- stage: Validate
dependsOn: ${{ parameters.validateDependsOn }}
displayName: Validate Build Assets
variables:
- template: common-variables.yml
- template: /eng/common/templates/variables/pool-providers.yml
jobs:
- job:
displayName: NuGet Validation
condition: and(succeededOrFailed(), eq( ${{ parameters.enableNugetValidation }}, 'true'))
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: VSEngSS-MicroBuild2022-1ES
demands: Cmd
# If it's not devdiv, it's dnceng
${{ else }}:
name: $(DncEngInternalBuildPool)
demands: ImageOverride -equals windows.vs2019.amd64
steps:
- template: setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: DownloadBuildArtifacts@0
displayName: Download Package Artifacts
inputs:
buildType: specific
buildVersionToDownload: specific
project: $(AzDOProjectName)
pipeline: $(AzDOPipelineId)
buildId: $(AzDOBuildId)
artifactName: PackageArtifacts
checkDownloadedFiles: true
- task: PowerShell@2
displayName: Validate
inputs:
filePath: $(Build.SourcesDirectory)/eng/common/post-build/nuget-validation.ps1
arguments: -PackagesPath $(Build.ArtifactStagingDirectory)/PackageArtifacts/
-ToolDestinationPath $(Agent.BuildDirectory)/Extract/
- job:
displayName: Signing Validation
condition: and( eq( ${{ parameters.enableSigningValidation }}, 'true'), ne( variables['PostBuildSign'], 'true'))
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: VSEngSS-MicroBuild2022-1ES
demands: Cmd
# If it's not devdiv, it's dnceng
${{ else }}:
name: $(DncEngInternalBuildPool)
demands: ImageOverride -equals windows.vs2019.amd64
steps:
- template: setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: DownloadBuildArtifacts@0
displayName: Download Package Artifacts
inputs:
buildType: specific
buildVersionToDownload: specific
project: $(AzDOProjectName)
pipeline: $(AzDOPipelineId)
buildId: $(AzDOBuildId)
artifactName: PackageArtifacts
checkDownloadedFiles: true
itemPattern: |
**
!**/Microsoft.SourceBuild.Intermediate.*.nupkg
# This is necessary whenever we want to publish/restore to an AzDO private feed
# Since sdk-task.ps1 tries to restore packages we need to do this authentication here
# otherwise it'll complain about accessing a private feed.
- task: NuGetAuthenticate@1
displayName: 'Authenticate to AzDO Feeds'
# Signing validation will optionally work with the buildmanifest file which is downloaded from
# Azure DevOps above.
- task: PowerShell@2
displayName: Validate
inputs:
filePath: eng\common\sdk-task.ps1
arguments: -task SigningValidation -restore -msbuildEngine vs
/p:PackageBasePath='$(Build.ArtifactStagingDirectory)/PackageArtifacts'
/p:SignCheckExclusionsFile='$(Build.SourcesDirectory)/eng/SignCheckExclusionsFile.txt'
${{ parameters.signingValidationAdditionalParameters }}
- template: ../steps/publish-logs.yml
parameters:
StageLabel: 'Validation'
JobLabel: 'Signing'
- job:
displayName: SourceLink Validation
condition: eq( ${{ parameters.enableSourceLinkValidation }}, 'true')
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: VSEngSS-MicroBuild2022-1ES
demands: Cmd
# If it's not devdiv, it's dnceng
${{ else }}:
name: $(DncEngInternalBuildPool)
demands: ImageOverride -equals windows.vs2019.amd64
steps:
- template: setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: DownloadBuildArtifacts@0
displayName: Download Blob Artifacts
inputs:
buildType: specific
buildVersionToDownload: specific
project: $(AzDOProjectName)
pipeline: $(AzDOPipelineId)
buildId: $(AzDOBuildId)
artifactName: BlobArtifacts
checkDownloadedFiles: true
- task: PowerShell@2
displayName: Validate
inputs:
filePath: $(Build.SourcesDirectory)/eng/common/post-build/sourcelink-validation.ps1
arguments: -InputPath $(Build.ArtifactStagingDirectory)/BlobArtifacts/
-ExtractPath $(Agent.BuildDirectory)/Extract/
-GHRepoName $(Build.Repository.Name)
-GHCommit $(Build.SourceVersion)
-SourcelinkCliVersion $(SourceLinkCLIVersion)
continueOnError: true
- template: /eng/common/templates/job/execute-sdl.yml
parameters:
enable: ${{ parameters.SDLValidationParameters.enable }}
publishGuardianDirectoryToPipeline: ${{ parameters.SDLValidationParameters.publishGdn }}
additionalParameters: ${{ parameters.SDLValidationParameters.params }}
continueOnError: ${{ parameters.SDLValidationParameters.continueOnError }}
artifactNames: ${{ parameters.SDLValidationParameters.artifactNames }}
downloadArtifacts: ${{ parameters.SDLValidationParameters.downloadArtifacts }}
- ${{ if ne(parameters.publishAssetsImmediately, 'true') }}:
- stage: publish_using_darc
${{ if or(eq(parameters.enableNugetValidation, 'true'), eq(parameters.enableSigningValidation, 'true'), eq(parameters.enableSourceLinkValidation, 'true'), eq(parameters.SDLValidationParameters.enable, 'true')) }}:
dependsOn: ${{ parameters.publishDependsOn }}
${{ else }}:
dependsOn: ${{ parameters.validateDependsOn }}
displayName: Publish using Darc
variables:
- template: common-variables.yml
- template: /eng/common/templates/variables/pool-providers.yml
jobs:
- job:
displayName: Publish Using Darc
timeoutInMinutes: 120
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: VSEngSS-MicroBuild2022-1ES
demands: Cmd
# If it's not devdiv, it's dnceng
${{ else }}:
name: $(DncEngInternalBuildPool)
demands: ImageOverride -equals windows.vs2019.amd64
steps:
- template: setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: NuGetAuthenticate@1
- task: PowerShell@2
displayName: Publish Using Darc
inputs:
filePath: $(Build.SourcesDirectory)/eng/common/post-build/publish-using-darc.ps1
arguments: -BuildId $(BARBuildId)
-PublishingInfraVersion ${{ parameters.publishingInfraVersion }}
-AzdoToken '$(publishing-dnceng-devdiv-code-r-build-re)'
-MaestroToken '$(MaestroApiAccessToken)'
-WaitPublishingFinish true
-ArtifactsPublishingAdditionalParameters '${{ parameters.artifactsPublishingAdditionalParameters }}'
-SymbolPublishingAdditionalParameters '${{ parameters.symbolPublishingAdditionalParameters }}'
| 0
|
2352.ps1
|
Import-Module ActiveDirectory
try {
$uap_docs = Import-Csv C:\scripts\All-Doc-2013-Password-Policy\all-docs-2013-password-policy.csv
$ad_pw_ages = @();
foreach ($user in $uap_docs) {
$ad_pw_ages += Get-AdUser $user.Username -Properties passwordlastset | % {"$($_.Givenname) $($_.Surname), $($_.PasswordLastSet)`n"}
}
$oFrom = New-Object system.net.Mail.MailAddress 'adbertram@gmail.com','Adam Bertram';
$oTo = New-Object system.net.Mail.MailAddress 'jdoe@email.com', 'John Doe'
$oMsg = New-Object System.Net.Mail.MailMessage $oFrom, $oTo
$oMsg.Subject = 'Daily Doc Password Changes'
$oMsg.Body = "Here is the most recent list of docs and their password ages.`n`n$ad_pw_ages"
$sSmtpServer = 'smtp.email.com';
$oSmtpClient = new-object Net.Mail.SmtpClient($sSmtpServer);
$oSmtpClient.Send($oMsg);
} catch [System.Exception] {
return $_.Exception.Message;
}
| 0
|
sample_58_70.ps1
|
# ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
[CmdletBinding(DefaultParametersetName="Unsecure")]
param (
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeName,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeType,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeIpAddressOrFQDN,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $ExistingClientConnectionEndpoint,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $UpgradeDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $FaultDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $AcceptEULA,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $Force,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $NoCleanupOnFailure,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $BypassUpgradeStateValidation,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $FabricIsPreInstalled,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[string] $FabricRuntimePackagePath,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[int] $TimeoutInSeconds,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[switch] $X509Credential,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $ServerCertThumbprint,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreLocation,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreName,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $FindValueThumbprint,
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[switch] $WindowsCredential
)
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
$IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)
if(!$IsAdmin)
{
Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red"
exit 1
}
if(!$AcceptEULA.IsPresent)
{
$EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software.
[Y] Yes [N] No [?] Help (default is "N")'
if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y")
{
Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red"
exit 1
}
}
$ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition)
$DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents"
if(!(Test-Path $DeployerBinPath))
{
$DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe"
if(!(Test-Path $DCAutoExtractorPath))
{
Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location."
exit 1
}
#Extract DeploymentComponents
$DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`""
# special case for older powershell versions < 5
if ($PSVersionTable.PSVersion.Major -lt 5)
{
$DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`""
}
Write-Host "running autoextractor command: $DCAutoExtractorCommand"
$DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1"
if($LASTEXITCODE -eq 1)
{
Write-Host "Extracting DeploymentComponents Cab ran into an issue."
Write-Host $DCExtractOutput
exit 1
}
else
{
Write-Host "DeploymentComponents extracted."
}
}
$SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll"
if(!(Test-Path $SystemFabricModulePath))
{
Write-Host "Run the script local to the Standalone package directory."
exit 1
}
$MicrosoftServiceFabricCabFileAbsolutePath = $null
if ((Test-Path variable:FabricRuntimePackagePath) `
-and ![string]::IsNullOrEmpty($FabricRuntimePackagePath))
{
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath
if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath))
{
Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath"
exit 1
}
Write-Verbose "Using runtime package $MicrosoftServiceFabricCabFileAbsolutePath"
}
else
{
$RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages"
if(!(Test-Path $RuntimeBinPath))
{
Write-Host "No directory exists for Runtime packages. Creating a new directory."
md $RuntimeBinPath | Out-Null
Write-Host "Done creating $RuntimeBinPath"
}
Write-Verbose "Will use downloaded runtime package for deployment from $RuntimeBinPath"
}
$ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1"
if (!(Test-Path variable:TimeoutInSeconds) `
-or ($TimeoutInSeconds -le 0))
{
$TimeoutInSeconds = 300
Write-Verbose "TimeoutInSeconds was not set. Defaulting to $TimeoutInSeconds seconds."
}
$parentVerbosePreference = $VerbosePreference
# Invoke in separate AppDomain
if($X509Credential)
{
Write-Verbose "X509Credential: $X509Credential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $false;
"X509Credential" = $true;
"ServerCertThumbprint" = $ServerCertThumbprint;
"StoreLocation" = $StoreLocation;
"StoreName" = $StoreName;
"FindValueThumbprint" = $FindValueThumbprint;
}
}
else
{
if($WindowsCredential)
{
Write-Verbose "WindowsCredential: $WindowsCredential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $true;
}
}
else
{
Write-Verbose "Not X509Credential nor WindowsCredential."
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
}
}
}
if ($parentVerbosePreference -ne "SilentlyContinue")
{
$argList.Keys | ForEach-Object { Write-Verbose "$($_)=$($argList.$_)" }
}
$standaloneArgsFilepath=Join-Path $([System.IO.Path]::GetTempPath()) "SFStandaloneArgs.txt"
if (Test-Path $standaloneArgsFilepath)
{
Remove-Item $standaloneArgsFilepath -Force 2> $null
}
$argList.Keys | ForEach-Object { Add-Content $standaloneArgsFilepath "$($_)=$($argList.$_)" }
$standaloneArgsFilepath = Resolve-Path $standaloneArgsFilepath
$shelloutArgs = @( $standaloneArgsFilepath )
Powershell -Command {
param (
[Parameter(Mandatory=$true)]
[string] $ParamFilepath
)
Get-Content $ParamFilepath | Where-Object {$_.length -gt 0} | Where-Object {!$_.StartsWith("#")} | ForEach-Object {
$var = $_.Split('=')
if ($var.Length -eq 2)
{
New-Variable -Name $var[0] -Value $var[1] -Force
}
}
Remove-Item $ParamFilepath -Force 2> $null
if (![string]::IsNullOrEmpty($Force)) { $Force = [Convert]::ToBoolean($Force); } else { $Force = $false}
if (![string]::IsNullOrEmpty($NoCleanupOnFailure)) { $NoCleanupOnFailure = [Convert]::ToBoolean($NoCleanupOnFailure); } else { $NoCleanupOnFailure = $false}
if (![string]::IsNullOrEmpty($BypassUpgradeStateValidation)) { $BypassUpgradeStateValidation = [Convert]::ToBoolean($BypassUpgradeStateValidation); } else { $BypassUpgradeStateValidation = $false}
if (![string]::IsNullOrEmpty($FabricIsPreInstalled)) { $FabricIsPreInstalled = [Convert]::ToBoolean($FabricIsPreInstalled); } else { $FabricIsPreInstalled = $false}
if (![string]::IsNullOrEmpty($WindowsCredential)) { $WindowsCredential = [Convert]::ToBoolean($WindowsCredential); } else { $WindowsCredential = $false}
if (![string]::IsNullOrEmpty($X509Credential)) { $X509Credential = [Convert]::ToBoolean($X509Credential); } else { $X509Credential = $false}
if (![string]::IsNullOrEmpty($TimeoutInSeconds)) { $TimeoutInSeconds = [Convert]::ToInt32($TimeoutInSeconds); }
#Add FabricCodePath Environment Path
$env:path = "$($DeployerBinPath);" + $env:path
#Import Service Fabric Powershell Module
Import-Module $ServiceFabricPowershellModulePath
Try
{
# Connect to the existing cluster
Write-Verbose "Connecting to the cluster at $ExistingClientConnectionEndpoint"
if($X509Credential)
{
Connect-ServiceFabricCluster -ConnectionEndpoint $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint
}
else
{
if($WindowsCredential)
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -WindowsCredential
}
else
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint
}
}
}
Catch
{
Write-Host "Cannot form client connection to cluster. Check your ClientConnectionEndpoint and security credentials. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
if ($ClusterConnection -eq $null) {
Write-Host "Could not form client connection to cluster. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($FabricIsPreInstalled)
{
Write-Host "Switch FabricIsPreInstalled is set, so assuming Fabric runtime is already installed on the machine."
}
elseif (!(Test-Path variable:MicrosoftServiceFabricCabFileAbsolutePath) `
-or [string]::IsNullOrEmpty($MicrosoftServiceFabricCabFileAbsolutePath))
{
Try
{
# Get runtime package details
$UpgradeStatus = Get-ServiceFabricClusterUpgrade
}
Catch
{
Write-Host "Could not query current cluster version. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($UpgradeStatus.UpgradeState -ne "RollingForwardCompleted" -And $UpgradeStatus.UpgradeState -ne "RollingBackCompleted")
{
if ($BypassUpgradeStateValidation)
{
Write-Host "BypassUpgradeStateValidation is set but cannot be used without FabricRuntimePackagePath when cluster version cannot be automatically inferred from the upgrade state." -ForegroundColor Red
}
Write-Host "New node cannot be added to the cluster while upgrade is in progress or before cluster has finished bootstrapping. To monitor upgrade state run Get-ServiceFabricClusterUpgrade and wait until UpgradeState switches to either RollingForwardCompleted or RollingBackCompleted." -ForegroundColor Red
exit 1
}
Try
{
$RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $UpgradeStatus.TargetCodeVersion + ".cab"
$DeploymentPackageRoot = Split-Path -parent $DeployerBinPath
$RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages"
$MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename
if (!(Test-Path $MicrosoftServiceFabricCabFilePath))
{
$RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion
$RequiredPackage = $RuntimePackageDetails.RuntimePackages | where { $_.Version -eq $UpgradeStatus.TargetCodeVersion }
if ($RequiredPackage -eq $null)
{
Write-Host "The required runtime version is no longer supported. Please upgrade your cluster to the latest version before adding a node." -ForegroundColor Red
exit 1
}
$Version = $UpgradeStatus.TargetCodeVersion
Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded."
(New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath)
Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath."
}
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath
}
Catch
{
Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet run Get-ServiceFabricClusterUpgrade and note the TargetCodeVersion. Run Get-ServiceFabricRuntimeSupportedVersion from a machine connected to the internet to get the download links for all supported fabric versions. Download the package corresponding to your TargetCodeVersion. Pass -FabricRuntimePackageOutputDirectory <Path to runtime package> to AddNode.ps1 in addition to other parameters. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
}
#Add Node to an existing cluster
Try
{
$AddNodeTimeoutDuration=[System.TimeSpan]::FromSeconds($TimeoutInSeconds)
$AddNodeTimeout=[System.DateTime]::UtcNow + $AddNodeTimeoutDuration
Get-ServiceFabricNode | ft
$VerbosePreference = $parentVerbosePreference
$params = @{
'NodeName' = $NodeName;
'NodeType' = $NodeType;
'IpAddressOrFQDN' = $NodeIpAddressOrFQDN;
'UpgradeDomain' = $UpgradeDomain;
'FaultDomain' = $FaultDomain;
'FabricRuntimePackagePath' = $MicrosoftServiceFabricCabFileAbsolutePath;
'NoCleanupOnFailure' = $NoCleanupOnFailure;
'Force' = $Force;
'BypassUpgradeStateValidation' = $BypassUpgradeStateValidation;
'FabricIsPreInstalled' = $FabricIsPreInstalled;
}
if ((Test-Path variable:TimeoutInSeconds) `
-and ($TimeoutInSeconds -gt 0))
{
$params += @{'TimeoutSec' = $TimeoutInSeconds;}
}
Write-Host "Adding Node $NodeName"
Add-ServiceFabricNode @params
Write-Host "Waiting for node to join cluster." -NoNewline
$nodeJoined=$false
$firstRun=$true
do
{
if (!$nodeJoined -and !$firstRun)
{
Write-Host "." -NoNewline
Start-Sleep -s 10
}
$result=Get-ServiceFabricNode | Where-Object { [System.String]::Compare($_.NodeName, $NodeName, [System.StringComparison]::InvariantCulture) -eq 0 }
$nodeJoined=$result.Count -gt 0
$firstRun=$false
} while(!$nodeJoined -and ([System.DateTime]::UtcNow -lt $AddNodeTimeout))
Write-Host "" # Newline
if(-not $nodeJoined)
{
Write-Host "Node did not join within timeout of $TimeoutInSeconds seconds." -ForegroundColor Red
exit 1
}
Get-ServiceFabricNode | ft
Write-Host "Node $NodeName joined the cluster!" -ForegroundColor Green
}
Catch
{
if($VerbosePreference -eq "SilentlyContinue")
{
Write-Host "Add Node failed. Call with -Verbose for more details" -ForegroundColor Red
}
Write-Host "Add node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
} -args $shelloutArgs -OutputFormat Text
$env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine")
# SIG # Begin signature block
# MIInkwYJKoZIhvcNAQcCoIInhDCCJ4ACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaWS1eDTImCPqr
# XkXx+JOiU509Id8D94uRE9I3NDASNqCCDXYwggX0MIID3KADAgECAhMzAAACy7d1
# OfsCcUI2AAAAAALLMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NTU5WhcNMjMwNTExMjA0NTU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC3sN0WcdGpGXPZIb5iNfFB0xZ8rnJvYnxD6Uf2BHXglpbTEfoe+mO//oLWkRxA
# wppditsSVOD0oglKbtnh9Wp2DARLcxbGaW4YanOWSB1LyLRpHnnQ5POlh2U5trg4
# 3gQjvlNZlQB3lL+zrPtbNvMA7E0Wkmo+Z6YFnsf7aek+KGzaGboAeFO4uKZjQXY5
# RmMzE70Bwaz7hvA05jDURdRKH0i/1yK96TDuP7JyRFLOvA3UXNWz00R9w7ppMDcN
# lXtrmbPigv3xE9FfpfmJRtiOZQKd73K72Wujmj6/Su3+DBTpOq7NgdntW2lJfX3X
# a6oe4F9Pk9xRhkwHsk7Ju9E/AgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUrg/nt/gj+BBLd1jZWYhok7v5/w4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzQ3MDUyODAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAJL5t6pVjIRlQ8j4dAFJ
# ZnMke3rRHeQDOPFxswM47HRvgQa2E1jea2aYiMk1WmdqWnYw1bal4IzRlSVf4czf
# zx2vjOIOiaGllW2ByHkfKApngOzJmAQ8F15xSHPRvNMmvpC3PFLvKMf3y5SyPJxh
# 922TTq0q5epJv1SgZDWlUlHL/Ex1nX8kzBRhHvc6D6F5la+oAO4A3o/ZC05OOgm4
# EJxZP9MqUi5iid2dw4Jg/HvtDpCcLj1GLIhCDaebKegajCJlMhhxnDXrGFLJfX8j
# 7k7LUvrZDsQniJZ3D66K+3SZTLhvwK7dMGVFuUUJUfDifrlCTjKG9mxsPDllfyck
# 4zGnRZv8Jw9RgE1zAghnU14L0vVUNOzi/4bE7wIsiRyIcCcVoXRneBA3n/frLXvd
# jDsbb2lpGu78+s1zbO5N0bhHWq4j5WMutrspBxEhqG2PSBjC5Ypi+jhtfu3+x76N
# mBvsyKuxx9+Hm/ALnlzKxr4KyMR3/z4IRMzA1QyppNk65Ui+jB14g+w4vole33M1
# pVqVckrmSebUkmjnCshCiH12IFgHZF7gRwE4YZrJ7QjxZeoZqHaKsQLRMp653beB
# fHfeva9zJPhBSdVcCW7x9q0c2HVPLJHX9YCUU714I+qtLpDGrdbZxD9mikPqL/To
# /1lDZ0ch8FtePhME7houuoPcMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGXMwghlvAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAALLt3U5+wJxQjYAAAAAAsswDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFV94myVv8uodI4+8m0NDbyF
# cRyY34Apv8ogTu5v5GZjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAInhes6D877KOvR15z4pDd2ewFPcgA5RydZ8Entglk0yuUoNItHYKWGJu
# hIbJ2UdTrO0nlz4uw6FQxJWJ9YvmI15T/EZxxeWz+WVHk/JIR9ElGQROFKLjCG2m
# sM1ggbu6jyRN8ZTsDNyR9bJxNq1qoY4IKOowD97x6Ff6SchnkAVMSMr2UGLvDQm4
# MmvSqpQ8P6DDATb4LHPJbKiI+813ij44l3a00Jx5A23ZlBAQGikP5W4yYie4KvGE
# BS3Y/YmSkqVbVCGs3XkEuuOmbBrW4Sa53IeIJxDMJIXCqG4E6Y0gOZYIJ4D97gId
# hzXw3CHgiWrfHSBvYoKEh1P6N9O8TqGCFv0wghb5BgorBgEEAYI3AwMBMYIW6TCC
# FuUGCSqGSIb3DQEHAqCCFtYwghbSAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDtZhZYULhKRRZu2bJynolzk3BAy9ipiYGye/p15XUn+gIGY+5PEE50
# GBMyMDIzMDIxODAyNTAwNi43MDlaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxMkJDLUUz
# QUUtNzRFQjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EVQwggcMMIIE9KADAgECAhMzAAAByk/Cs+0DDRhsAAEAAAHKMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIyMTEwNDE5MDE0
# MFoXDTI0MDIwMjE5MDE0MFowgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjEyQkMtRTNBRS03NEVCMSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEAwwGcq9j50rWEkcLSlGZLweUVfxXRaUjiPsyaNVxPdMRs
# 3CVe58siu/EkaVt7t7PNTPko/s8lNtusAeLEnzki44yxk2c9ekm8E1SQ2YV9b8/L
# OxfKapZ8tVlPyxw6DmFzNFQjifVm8EiZ7lFRoY448vpcbBD18qjYNF/2Z3SQchcs
# dV1N9Y6V2WGl55VmLqFRX5+dptdjreBXzi3WW9TsoCEWcYCBK5wYgS9tT2SSSTza
# e3jmdw40g+LOIyrVPF2DozkStv6JBDPvwahXWpKGpO7rHrKF+o7ECN/ViQFMZyp/
# vxePiUABDNqzEUI8s7klYmeHXvjeQOq/CM3C/Y8bj3fJObnZH7eAXvRDnxT8R6W/
# uD1mGUJvv9M9BMu3nhKpKmSxzzO5LtcMEh2tMXxhMGGNMUP3DOEK3X+2/LD1Z03u
# sJTk5pHNoH/gDIvbp787Cw40tsApiAvtrHYwub0TqIv8Zy62l8n8s/Mv/P764CTq
# rxcXzalBHh+Xy4XPjmadnPkZJycp3Kczbkg9QbvJp0H/0FswHS+efFofpDNJwLh1
# hs/aMi1K/ozEv7/WLIPsDgK16fU/axybqMKk0NOxgelUjAYKl4wU0Y6Q4q9N/9Pw
# AS0csifQhY1ooQfAI0iDCCSEATslD8bTO0tRtqdcIdavOReqzoPdvAv3Dr1XXQ8C
# AwEAAaOCATYwggEyMB0GA1UdDgQWBBT6x/6lS4ESQ8KZhd0RgU7RYXM8fzAfBgNV
# HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU
# aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
# CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz
# L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV
# HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC
# AQDY0HkqCS3KuKefFX8/rm/dtD9066dKEleNqriwZqsM4Ym8Ew4QiqOqO7mWoYYY
# 4K5y8eXSOHKNXOfpO6RbaYj8jCOcJAB5tqLl5hiMgaMbAVLrl1hlix9sloO45LON
# 0JphKva3D6AVKA7P78mA9iRHZYUVrRiyfvQjWxmUnxhis8fom92+/RHcEZ1Dh5+p
# 4gzeeL84Yl00Wyq9EcgBKKfgq0lCjWNSq1AUG1sELlgXOSvKZ4/lXXH+MfhcHe91
# WLIaZkS/Hu9wdTT6I14BC97yhDsZWXAl0IJ801I6UtEFpCsTeOyZBJ7CF0rf5lxJ
# 8tE9ojNsyqXJKuwVn0ewCMkZqz/cEwv9FEx8QmsZ0ZNodTtsl+V9dZm+eUrMKZk6
# PKsKArtQ+jHkfVsHgKODloelpOmHqgX7UbO0NVnIlpP55gQTqV76vU7wRXpUfz7K
# hE3BZXNgwG05dRnCXDwrhhYz+Itbzs1K1R8I4YMDJjW90ASCg9Jf+xygRKZGKHjo
# 2Bs2XyaKuN1P6FFCIVXN7KgHl/bZiakGq7k5TQ4OXK5xkhCHhjdgHuxj3hK5AaOy
# +GXxO/jbyqGRqeSxf+TTPuWhDWurIo33RMDGe5DbImjcbcj6dVhQevqHClR1OHSf
# r+8m1hWRJGlC1atcOWKajArwOURqJSVlThwVgIyzGNmjzjCCB3EwggVZoAMCAQIC
# EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS
# b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX
# DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC
# 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG
# Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP
# 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P
# XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361
# VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB
# Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9
# X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e
# wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw
# wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr
# 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e
# FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj
# BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n
# FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw
# PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j
# cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3
# FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf
# BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH
# hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF
# BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl
# ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf
# ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC
# j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu
# 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/
# GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D
# YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO
# xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO
# Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I
# 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0
# zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM
# mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT
# TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLLMIICNAIBATCB+KGB0KSBzTCByjEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj
# cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF
# U046MTJCQy1FM0FFLTc0RUIxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAKOO55cMT4syPP6nClg2IWfajMqkoIGD
# MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
# A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF
# BQACBQDnmh8LMCIYDzIwMjMwMjE3MjM0MzA3WhgPMjAyMzAyMTgyMzQzMDdaMHQw
# OgYKKwYBBAGEWQoEATEsMCowCgIFAOeaHwsCAQAwBwIBAAICJ0wwBwIBAAICEZ0w
# CgIFAOebcIsCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgC
# AQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQDUrVZ55zFEOMDH
# xKaXnTpCDznfPZEx9BCoHg33vREQ2X+25B8dCkYQw074jzfqja5O8e7VOKQqInfr
# wxuF619Uie05nRXI/du28cr+symmgqRYu6I0NqO5l7MwfqanY3SEEHmyKs4gKdFx
# dVvt4dpYVz4oBsgJNi9W60QpyX8DEjGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU
# aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAByk/Cs+0DDRhsAAEAAAHKMA0GCWCGSAFl
# AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN
# AQkEMSIEIIv7ZvkSOi/Ncqr68IPgRRO9lBqnil7+3KZ0rq742QgLMIH6BgsqhkiG
# 9w0BCRACLzGB6jCB5zCB5DCBvQQgEz0b85vrVU2slZAk4jt1SDEk6IzZAwVCoWwF
# 3KzcGuAwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AcpPwrPtAw0YbAABAAAByjAiBCBs2NLOHeQZicslZyYgpO23DnJ5iMSGZ1v1oe0Y
# 0PkU5zANBgkqhkiG9w0BAQsFAASCAgAT5hYA2TWujsKrl+C1JK2tU9OUvEebjHY3
# rrcAa5NwOjC7hZMQ/9mu4D87Bb2G9oajAyBhCnGS7h9wpBgZMU3JrgIRPiTGrbM8
# i8wb0vlC7RVhUEVjIO8ulPN3flAntBr/uMAzpeCtfZrkoE1+e8+hZO+Uef/zs857
# LIM2eDo6Er0uzESbVYLrUG/8hzKeVdD4oFl5EbfnzSKvvxw7giw4SfSJZumX0VEu
# l0quh76lySajUqAQoERiKQyfhQHFx/wMXD5GSS3L6EWx85pJDVc5TDTf5EYBIEKe
# gg+mFLjTPMO+6TwKIe13j2zgQlvvnVQgBj7eCC6JOW/v1GcKl4knk2+0NlFj4q0j
# xrWAWcmOLYrzckV0oQj1GR+MBwc/TLm9N+pBGo46DpA2qFqoQw3bS01HPQYMph1X
# h5XLppipV2VQn4tO5xoVs1jW8I9CS4FfLUxLLnhwyMMk9LrvjOwEXBZ//ibxo4v6
# Fa61FsELFMzXIFw8b7rXDusLvpSv7KjNeEMNIGWrkioAH7fL71ab5zivj7sAjsBu
# AdHcWy+u+/pSH8ndde71ZjVtzV069iRnO9RmhcjrjE1KfhHrT770MUogxS7uZq7o
# diQqAN+Ev3lVlWeedyPwNcNxrnChN404aMUOP7fOSkEBO55jPNwwOy3Jtv1WDz3/
# wNY0LEZyDw==
# SIG # End signature block
| 0
|
3036.ps1
|
function Should-Exist($ActualValue, [switch] $Negate, [string] $Because) {
[bool] $succeeded = & $SafeCommands['Test-Path'] $ActualValue
if ($Negate) {
$succeeded = -not $succeeded
}
$failureMessage = ''
if (-not $succeeded) {
if ($Negate) {
$failureMessage = "Expected path $(Format-Nicely $ActualValue) to not exist,$(Format-Because $Because) but it did exist."
}
else {
$failureMessage = "Expected path $(Format-Nicely $ActualValue) to exist,$(Format-Because $Because) but it did not exist."
}
}
return & $SafeCommands['New-Object'] psobject -Property @{
Succeeded = $succeeded
FailureMessage = $failureMessage
}
}
Add-AssertionOperator -Name Exist `
-InternalName Should-Exist `
-Test ${function:Should-Exist}
function ShouldExistFailureMessage() {
}
function NotShouldExistFailureMessage() {
}
| 0
|
sample_57_69.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dts'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dts.dll'
# Version number of this module.
ModuleVersion = '86.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '08adf9d8-a13f-4a0f-896f-df35c155c839'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dts Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dts.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'DisMount-OCIDtsDevicesFromTransferPackage',
'Get-OCIDtsApplianceExportJob', 'Get-OCIDtsApplianceExportJobsList',
'Get-OCIDtsShippingVendorsList', 'Get-OCIDtsTransferAppliance',
'Get-OCIDtsTransferApplianceCertificateAuthorityCertificate',
'Get-OCIDtsTransferApplianceEncryptionPassphrase',
'Get-OCIDtsTransferApplianceEntitlement',
'Get-OCIDtsTransferApplianceEntitlementList',
'Get-OCIDtsTransferAppliancesList', 'Get-OCIDtsTransferDevice',
'Get-OCIDtsTransferDevicesList', 'Get-OCIDtsTransferJob',
'Get-OCIDtsTransferJobsList', 'Get-OCIDtsTransferPackage',
'Get-OCIDtsTransferPackagesList',
'Mount-OCIDtsDevicesToTransferPackage',
'Move-OCIDtsApplianceExportJobCompartment',
'Move-OCIDtsTransferJobCompartment', 'New-OCIDtsApplianceExportJob',
'New-OCIDtsTransferAppliance',
'New-OCIDtsTransferApplianceAdminCredentials',
'New-OCIDtsTransferApplianceEntitlement',
'New-OCIDtsTransferDevice', 'New-OCIDtsTransferJob',
'New-OCIDtsTransferPackage', 'Remove-OCIDtsApplianceExportJob',
'Remove-OCIDtsTransferAppliance', 'Remove-OCIDtsTransferDevice',
'Remove-OCIDtsTransferJob', 'Remove-OCIDtsTransferPackage',
'Update-OCIDtsApplianceExportJob', 'Update-OCIDtsTransferAppliance',
'Update-OCIDtsTransferDevice', 'Update-OCIDtsTransferJob',
'Update-OCIDtsTransferPackage'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dts'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
My Profile.ps1
|
## If your PC doesn't have this set already, someone could tamper with this script...
## but at least now, they can't tamper with any of the scripts that I auto-load!
Set-ExecutionPolicy AllSigned Process
## Set the profile directory first, so we can refer to it from now on.
Set-Variable ProfileDir (Split-Path $MyInvocation.MyCommand.Path -Parent) -Option AllScope
## I determine which modules to pre-load here (in this SIGNED script)
$AutoModules = 'Autoload', 'Strings', 'Authenticode', 'HttpRest', 'PoshCode', 'PowerTab', 'ResolveAliases', 'PSCX'
###################################################################################################
## Preload all the modules in AutoModules, printing out their names in color based on status
## No errors while loading modules (I will save them and print them out later)
$ErrorActionPreference = "SilentlyContinue"
Write-Host "Loading Modules: " -Fore Cyan -NoNewLine
$AutoRunErrors = @()
ForEach( $module in $AutoModules ) {
Import-Module $module -EA SilentlyContinue -EV +script:AutoRunErrors
if($?) {
Write-Host "$module " -fore Cyan -NoNewLine
} else {
Write-Host "$module " -fore Red -NoNewLine
}
}
###################################################################################################
Write-Host
$ErrorActionPreference = "Continue"
# Write out the error messages if we missed loading any modules
if($AutoRunErrors) { $AutoRunErrors | Out-String | Write-Host -Fore Red }
###################################################################################################
## I have a few additional custom type and format data items which take prescedence over anyone else's
Update-TypeData -PrependPath "$ProfileDir\\Formats\\Types.ps1xml"
Update-FormatData -PrependPath "$ProfileDir\\Formats\\Formats.ps1xml"
###################################################################################################
## Developer tools stuff ...
## I need InstallUtil, MSBuild, and TF (TFS) and they're all in the.Net RuntimeDirectory OR Visual Studio*\\Common7\\IDE
$Env:Path = [System.Runtime.InteropServices.RuntimeEnvironment]::GetRuntimeDirectory() + ";" +
@(Get-Item C:\\Program*Files*\\*Visual?Studio*\\Common7\\IDE\\TF.exe -EA 0| Sort LastWriteTime -Desc)[0].Directory +
";$Env:Path"
if(!(Get-Command TF.exe -ErrorAction SilentlyContinue)) {
Write-Warning "Could not locate TF.exe in Visual Studio\\Common7. It may not be installed on this PC"
}
###################################################################################################
## And a couple of functions that can't be saved as script files, and aren't worth modularizing
## Elipsis shortcut for Select -Expand name
${function:...} = { process { $_.$($args[0]) } }
## The Trinary shortcut function
function ?: {
param([ScriptBlock]$trueblock,[ScriptBlock]$falseblock)
process {
if($_){
&$trueblock $_
} else {
&$falseblock $_
}
}
}
## Pre-load a few of my functions in case I need them.
## In particular, a couple that are better than PSCX's versions
Autoload New-ShortCut
Autoload Edit-File
Autoload Get-PerformanceHistory
###################################################################################################
## Custom aliases I can't live without
Set-Alias exec Invoke-Expression -Option AllScope -Description "Personal Function alias"
Set-Alias edit Edit-File -Option AllScope -Description "Personal Function alias"
Set-Alias rand Get-Random -Option AllScope -Description "Personal Cmdlet Alias"
Set-Alias say Out-Speech -Option AllScope -Description "Personal Script Alias"
Set-Alias gph Get-PerformanceHistory -Option AllScope -Description "Personal Script Alias"
###################################################################################################
## I love my random quotes ...
Set-Variable QuoteDir (Resolve-Path (Join-Path (Split-Path $ProfileDir -parent) "@stuff\\Quotes")) -Scope Global -Option AllScope -Description "Personal PATH Variable"
Set-Alias RandomLine Select-RandomLine -Option AllScope -Description "Personal Script Alias"
Set-Alias Get-Quote Select-RandomLine -Option AllScope -Description "Personal Script Alias"
Set-Alias gq Select-RandomLine -Option AllScope -Description "Personal Script Alias"
###################################################################################################
## I add my "Scripts" directory and all of its direct subfolders to my PATH
$ENV:PATH = Get-ChildItem $ProfileDir\\Script[s],$ProfileDir\\Scripts\\* |
Where-Object { $_.PsIsContainer } |
ForEach-Object { $_.FullName } |
Join ";" -append $ENV:PATH -unique
## I like all of my sessions to start in my profile directory
Set-Location $ProfileDir
## My prompt function is in it's own script
. Set-Prompt
## And finally, relax the code signing restriction so we can actually get work done
Set-ExecutionPolicy RemoteSigned Process
## Get a random quote, and print it in yellow :D
Write-Host $(Get-Quote) -Fore Yellow
# SIG # Begin signature block
# MIIIDQYJKoZIhvcNAQcCoIIH/jCCB/oCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUTf/G2RuXibbNw/GxUxoBclEt
# kOKgggUrMIIFJzCCBA+gAwIBAgIQKQm90jYWUDdv7EgFkuELajANBgkqhkiG9w0B
# AQUFADCBlTELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0
# IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYD
# VQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xHTAbBgNVBAMTFFVUTi1VU0VS
# Rmlyc3QtT2JqZWN0MB4XDTEwMDUxNDAwMDAwMFoXDTExMDUxNDIzNTk1OVowgZUx
# CzAJBgNVBAYTAlVTMQ4wDAYDVQQRDAUwNjg1MDEUMBIGA1UECAwLQ29ubmVjdGlj
# dXQxEDAOBgNVBAcMB05vcndhbGsxFjAUBgNVBAkMDTQ1IEdsb3ZlciBBdmUxGjAY
# BgNVBAoMEVhlcm94IENvcnBvcmF0aW9uMRowGAYDVQQDDBFYZXJveCBDb3Jwb3Jh
# dGlvbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMfUdxwiuWDb8zId
# KuMg/jw0HndEcIsP5Mebw56t3+Rb5g4QGMBoa8a/N8EKbj3BnBQDJiY5Z2DGjf1P
# n27g2shrDaNT1MygjYfLDntYzNKMJk4EjbBOlR5QBXPM0ODJDROg53yHcvVaXSMl
# 498SBhXVSzPmgprBJ8FDL00o1IIAAhYUN3vNCKPBXsPETsKtnezfzBg7lOjzmljC
# mEOoBGT1g2NrYTq3XqNo8UbbDR8KYq5G101Vl0jZEnLGdQFyh8EWpeEeksv7V+YD
# /i/iXMSG8HiHY7vl+x8mtBCf0MYxd8u1IWif0kGgkaJeTCVwh1isMrjiUnpWX2NX
# +3PeTmsCAwEAAaOCAW8wggFrMB8GA1UdIwQYMBaAFNrtZHQUnBQ8q92Zqb1bKE2L
# PMnYMB0GA1UdDgQWBBTK0OAaUIi5wvnE8JonXlTXKWENvTAOBgNVHQ8BAf8EBAMC
# B4AwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhC
# AQEEBAMCBBAwRgYDVR0gBD8wPTA7BgwrBgEEAbIxAQIBAwIwKzApBggrBgEFBQcC
# ARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwQgYDVR0fBDswOTA3oDWg
# M4YxaHR0cDovL2NybC51c2VydHJ1c3QuY29tL1VUTi1VU0VSRmlyc3QtT2JqZWN0
# LmNybDA0BggrBgEFBQcBAQQoMCYwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNv
# bW9kb2NhLmNvbTAhBgNVHREEGjAYgRZKb2VsLkJlbm5ldHRAWGVyb3guY29tMA0G
# CSqGSIb3DQEBBQUAA4IBAQAEss8yuj+rZvx2UFAgkz/DueB8gwqUTzFbw2prxqee
# zdCEbnrsGQMNdPMJ6v9g36MRdvAOXqAYnf1RdjNp5L4NlUvEZkcvQUTF90Gh7OA4
# rC4+BjH8BA++qTfg8fgNx0T+MnQuWrMcoLR5ttJaWOGpcppcptdWwMNJ0X6R2WY7
# bBPwa/CdV0CIGRRjtASbGQEadlWoc1wOfR+d3rENDg5FPTAIdeRVIeA6a1ZYDCYb
# 32UxoNGArb70TCpV/mTWeJhZmrPFoJvT+Lx8ttp1bH2/nq6BDAIvu0VGgKGxN4bA
# T3WE6MuMS2fTc1F8PCGO3DAeA9Onks3Ufuy16RhHqeNcMYICTDCCAkgCAQEwgaow
# gZUxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtl
# IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMY
# aHR0cDovL3d3dy51c2VydHJ1c3QuY29tMR0wGwYDVQQDExRVVE4tVVNFUkZpcnN0
# LU9iamVjdAIQKQm90jYWUDdv7EgFkuELajAJBgUrDgMCGgUAoHgwGAYKKwYBBAGC
# NwIBDDEKMAigAoAAoQKAADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAjBgkqhkiG9w0BCQQxFgQURIrjK39r
# ycFCQgjjCok8yydU410wDQYJKoZIhvcNAQEBBQAEggEAaDce6yCDu4TU2JQzCji+
# JlREUjrc5achsjJXN3KqaElxEn4WDX2SZzSy+AfgthUkt0g+usfQhLDmqNBaXJnw
# vlrvlq64ABY2z/fBUv5KurXOiSvDxWSGJTflN960TQsKdaO1dzisOSUxizUGAold
# r4JvfnsRXGRTFSGnlOvi54VhOlypgsZuh0BXL2JF/6huGWNKXL1eXKz/gFArIeHB
# +EcOenddxaUtlhmVV9s3As/MQS1/NRfFy5qa6gmG0nj9Vpn+2nzwMeMiXE4dAiJc
# nQ09/WOFXrjhZZIEyNwwdl6lVoJTsL1XTIFOiU2UFK9V8xhNSjIqaGMj9uK1KP5u
# zQ==
# SIG # End signature block
| 0
|
sample_18_48.ps1
|
# Localized 06/28/2023 07:58 AM (GMT) 303:7.0.30723 cl_localizationdata.psd1
ConvertFrom-StringData @'
###PSLOC
Troubleshoot_Title=Диагностика
Troubleshoot_DetectDVDDevice=Проверка устройства чтения и/или записи DVD-дисков...
Troubleshoot_DetectDVDvideoDecoder=Проверка видеодекодера для воспроизведения DVD-диска...
Troubleshoot_DetectDVDAudioDecoder=Проверка аудиодекодера для воспроизведения DVD-диска...
Resolution_Title=Разрешение
CDRomDeviceName=Имя
PnPDeviceID=ИД
Status=Состояние
Report_Name_CDRomDeviceInformation=DVD-дисководы и дисководы компакт-дисков
Report_Description_CDRomDeviceInformation=Сведения о DVD-дисководах и дисководах компакт-дисков
###PSLOC
'@
| 0
|
sample_48_32.ps1
|
#
# Module manifest for module 'Az.DataBoxEdge'
#
# Generated by: Microsoft Corporation
#
# Generated on: 5/16/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.DataBoxEdge.psm1'
# Version number of this module.
ModuleVersion = '1.1.1'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = '3c11ef12-c79f-45fe-acdf-a2c784d99c97'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell - DataBoxEdge service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core.
For more information on DataBoxEdge, please visit the following: https://learn.microsoft.com/en-us/azure/databox-online/'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'Microsoft.Azure.Management.DataBoxEdge.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess =
'Microsoft.Azure.PowerShell.Cmdlets.DataBoxEdge.generated.format.ps1xml'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @()
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-AzDataBoxEdgeBandwidthSchedule', 'Get-AzDataBoxEdgeDevice',
'Get-AzDataBoxEdgeJob', 'Get-AzDataBoxEdgeOrder',
'Get-AzDataBoxEdgeRole', 'Get-AzDataBoxEdgeShare',
'Get-AzDataBoxEdgeStorageAccount',
'Get-AzDataBoxEdgeStorageAccountCredential',
'Get-AzDataBoxEdgeStorageContainer', 'Get-AzDataBoxEdgeTrigger',
'Get-AzDataBoxEdgeUser', 'Invoke-AzDataBoxEdgeDevice',
'Invoke-AzDataBoxEdgeShare', 'Invoke-AzDataBoxEdgeStorageContainer',
'New-AzDataBoxEdgeBandwidthSchedule', 'New-AzDataBoxEdgeDevice',
'New-AzDataBoxEdgeOrder', 'New-AzDataBoxEdgeRole',
'New-AzDataBoxEdgeShare', 'New-AzDataBoxEdgeStorageAccount',
'New-AzDataBoxEdgeStorageAccountCredential',
'New-AzDataBoxEdgeStorageContainer', 'New-AzDataBoxEdgeTrigger',
'New-AzDataBoxEdgeUser', 'Remove-AzDataBoxEdgeBandwidthSchedule',
'Remove-AzDataBoxEdgeDevice', 'Remove-AzDataBoxEdgeOrder',
'Remove-AzDataBoxEdgeRole', 'Remove-AzDataBoxEdgeShare',
'Remove-AzDataBoxEdgeStorageAccount',
'Remove-AzDataBoxEdgeStorageAccountCredential',
'Remove-AzDataBoxEdgeStorageContainer',
'Remove-AzDataBoxEdgeTrigger', 'Remove-AzDataBoxEdgeUser',
'Set-AzDataBoxEdgeBandwidthSchedule', 'Set-AzDataBoxEdgeRole',
'Set-AzDataBoxEdgeShare',
'Set-AzDataBoxEdgeStorageAccountCredential',
'Set-AzDataBoxEdgeUser'
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','DataBoxEdge'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Removed the outdated deps.json file.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDgeSCBHi8PdRD4
# Gf76KvDSkDiFLujVrD5m+9GDlmaYlaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH/o9MhE5TgAyM2XfSYdPrVs
# fwU/T7cwp4rxCzL5zyDEMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAOrOc9GYVwZwgSTCOzHYy9vjMqJCyteP2Gl/mLma72XUm+vAPZ0lW6N+P
# uueKDRmVoa3zWJH9xzRyN9+xHpWeFvphXZ1t1/IInzD80sfroXd/Yw/qOmRoMwGo
# LKQZYhRtleGFk0izrcLVMFc7k6xssJ2crWBb3aYJt50xizcTIub2AW85cUkL5DVX
# 3GI5XhhNPsRATDUpLuSpC98qrHidv9tezAUQpVuqeuGc9Yo/zDkWgAP9shN2RyLD
# jd/v7HVSEgybqeNFbQq/iAFIqH79xzcIXtpgOftg4xmxVj2d0WibpwoF0ujxll0k
# UyT8CuIVTrbKt+DOeJeIDTkrnhvhZ6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCZ5q8ByS3MfuVM21sF32YIW8d1u2FIZbYdfBTkn2NcGwIGZjOaebNz
# GBMyMDI0MDUxNjA3MjMzMy42MTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f
# gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y
# u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS
# AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9
# 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE
# cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM
# BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM
# sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6
# +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU
# /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV
# mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY
# VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ
# SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk
# Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5
# zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3
# eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F
# udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T
# T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4
# Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB
# wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53
# qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs
# Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9
# YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr
# i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kdzAiGA8yMDI0MDUxNjAxNDgz
# OVoYDzIwMjQwNTE3MDE0ODM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+R3
# AgEAMAoCAQACAhdjAgH/MAcCAQACAhPkMAoCBQDp8TX3AgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAGgUSBK7uVURyU4HK/dJr1vVD5ZLQF2IVTBpgme2LkAy
# RNPOKxKPE5Ryfb8O9qjgD8qFoiA1ozsu7EFE0Z9/Rqk84cbeSEfs3ona7Atp4Vjb
# 6SxQgYFjGDlB43H0tjt6UrRKDp7ulM/Hpx9N96oEvr+sFS9/5M9THX/JkjED/UJ+
# Ow3mjJ+TZHdAn+/N0bYvK61QpGQeV3lgEa7Xx8hzYx0VaMYL7Zwea7M7OuTf1U0J
# tHqhpE4iAMv/UePbfUzs3zF3kt0adYNWzXmf1pdu4KO2ssdUPFHWHCJ3gTkcOB6y
# FOZidY/WZAQAG5gZWAUqBxPDLoUWk+QuDrzBDwv9igUxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB
# 8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBaeIPzg34wD4RO8ZLeHahRy2GxoTi/BB7pheidSFQm
# XDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUb
# HE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQggJX3U7IzUMEK7mnRzIEEZ3gJ
# GNt/5ZfESO4QGjDmG2swDQYJKoZIhvcNAQELBQAEggIAlpAoc4PJ79VEE5WTUgqH
# Kccc7bpDHK8L+htjkQK2s1SSurmMuYM//iJmOGmOx9iieRW3dKo0DjHdmu1XfuyL
# pktuWJAEPvh/MF7I7x5HAWRc+2YoHbN+q/249eVDs1K5SxbXXrRJHiUPw6snRdfj
# 0QNX1StRUkCGYExN6lD+r9ekQTU4q6ybdJ5qIV/F+eitE3p/g5Bh4aWkvnSlbZlN
# Mqf57gs4N12hI2XAamfebiLP3oL08fADx9OMLb7WWy6C/n1eHx+U36SMt1bjTxEk
# e9XA5qFlGnnfnuc/GqJA7NJKh5earCGWeTj9g21hOa13l0hwR/jn8GhRIy/5/OdI
# D1gwJ/XWIk0OKjjjFXuokmwA4wkpP46NIct7G8JjOLNE4sx/hQmnYD0vYd7quXQQ
# rAgTJDJirZpRoJ+Wkcx/dEcXhzmYCUiatpNGB8bRAIiZfrMerqhlQy5dxxBoB0Rn
# 7J7zXAH8u52AZ1EvxlWX1U+fHwxhW1jVyf1UVvslL/9bIa4DRdB6QsfIiL6FIwi0
# HLU6mF+Db7qgL3QZiAO0rUV56EOgE/qTFwYbqKUuQ8irvhrPWD1tHGom834kkON0
# 6JPSxFNF4yKYL9Fv4f3ZjbYkZCK0gwZ971/4+c2HU8ETbBOCwUsNa/daCjB30H5l
# LKBDSvYu2ovMZHNmsNR3Yjg=
# SIG # End signature block
| 0
|
sample_56_93.ps1
|
param([int]$Count=50, [int]$DelayMilliseconds=200)
function Write-Item($itemCount) {
$i = 1
while ($i -le $itemCount) {
$str = "Output $i"
Write-Output $str
# In the gutter on the left, right click and select "Add Conditional Breakpoint"
# on the next line. Use the condition: $i -eq 25
$i = $i + 1
# Slow down execution a bit so user can test the "Pause debugger" feature.
Start-Sleep -Milliseconds $DelayMilliseconds
}
}
# Do-Work will be underlined in green if you haven't disable script analysis.
# Hover over the function name below to see the PSScriptAnalyzer warning that "Do-Work"
# doesn't use an approved verb.
function Do-Work($workCount) {
Write-Output "Doing work..."
Write-Item $workcount
Write-Host "Done!"
}
Do-Work $Count
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCmPxPw4GEjt7RE
# 9WjigrPYFWNHkCPAcENwArTB4+eceaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINe8so2xcuhsBOFOFRweK3gc
# g5xH7hhmoTkmVZegNyflMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAVUVtm3z0Y/paOKSB+U6lrsJs5LhL/7QYxT19XSG/rtVKao3tjY2Ng6ct
# Uj5VYZYnWYcK1zuTn5H3aeWCYCwBIzlKWIqZirfg0Yjzp/3CEzCwl6/NdADEV+cL
# 8vKNk3HH6lGjEjJNI89w0/4dRO2GVRkHaXlVMIRKoDzOztcKXYE/1/Uo2qGDfEf2
# zmTwbqt+iIyI65s0u2M+2fUkQ5ohKMTVx8huv/JIjWilucqKNsxLsFopMmlFThwS
# nkgZ+nSmJlhHpuleUFxwjeyJDyMF67VaeR064fQV8fg8ZvWZt4kJaWkDwyUUc+hD
# zz4F1gPk9CiR+XuPrt+rv0Q4yhVL0qGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCd+QKRhKjAyPL+DtTmYbLRcpnfzq1uZXhqBhOXPHxRbQIGZjOsD7be
# GBMyMDI0MDUwNDAwMDA1Ny42NjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnfe+gwIhgPMjAyNDA1MDMyMzA2MTZaGA8yMDI0MDUwNDIzMDYxNlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6d976AIBADAHAgEAAgII5TAHAgEAAgIRdzAKAgUA
# 6eDNaAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAE42BV4TjzrO4e8MzduR
# TIhukwFONTrsablZ+qdQ+v7PGkBooZIwWxzYdZ6BggvWhANOZhkdONHTu2sJrmek
# xj0YUvp+9m51Lqoxrf2ZqO8NEirR07NX7s1CxN1DU3pP9dQ6JXzA2aNE0xqySQzW
# BUsdk9tsKuGv0axMCec0xjTvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgeRSW5+++wv/ROaskEiJQVSUoKD/w2gA8jF3UqKu/684wgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEII+z1YG2NS3Xd7KHQ5AsD3zoHSOZnaxTAIWLw/sW9Jpc
# MA0GCSqGSIb3DQEBCwUABIICAF3XwxgpGGXefLwFRCjvKYwsDwlAJz5zAzulxztV
# tvCm9vgZOUaapPYKuvhjwELnWFf42ZpLTeycqLl4l8EBOjdPftQ06pH3LcdqRW3Z
# rJyOQQgPcIhC9aWUTWZEtHEmaCgVCy6+PmnxE5gulM2doN8qW3N/azKyH3g1nuJO
# 1ngRLW+5BeHd6BKHVJKtL63n1PdAbZiq3XZrzVzvNA14DlVLvQAkxgCdKTGmb0Cq
# OJ4uVlYSmDlhSfP8OEKL5R8/IfLwfMS8aWsL6WUzfmTvZss7Dk8KfOdasvv1+VVb
# WRB73lukGCU1WTM9agquLX5ysJoakdgk9G5LeBTTAZzQHa8H1iACGSRIsWhESfyV
# e0FIxI8B41M/9C0Sfs1QQjEvxZ/zVRuhLxwMVQk1zLcUsPuZD17NrhYdWD/bm0ui
# cx5jG4ZnN3J2Ig8JN6uktJdkL4Yh4YOLS2nSIYv2uf/2neRuJzSUxuSInY/KkNYJ
# crBaPXTqqnQ3/TEFg8RYm28jMznw+LEbj562DA+6Q8AVH5jH5mZ49LTIdfXuR6OS
# NAZPB2zV0Qp9AduEQ2yqkFT+AQxlQ+d1duJr5uSxxvrawL+vr4J2J9k5dehLQzkS
# wPMtFb0Iov5ht1Rq2vHwzvnL9RiSZwB7BsWOeVTJMnSlGkh8z6hcQsZtOWnqxjA3
# wkFY
# SIG # End signature block
| 0
|
sample_40_51.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Gets the specified catalog within the project
.Description
Gets the specified catalog within the project
.Example
{{ Add code here }}
.Example
{{ Add code here }}
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.IDevCenterdataIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.Api20231001Preview.ICatalog
.Outputs
System.String
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <IDevCenterdataIdentity>: Identity Parameter
[Name <String>]: The name of an action that will take place on a Dev Box.
[CatalogName <String>]: The name of the catalog
[DefinitionName <String>]: The name of the environment definition
[DevBoxName <String>]: The name of a Dev Box.
[EnvironmentName <String>]: The name of the environment.
[Id <String>]: Resource identity path
[PoolName <String>]: The name of a pool of Dev Boxes.
[ProjectName <String>]: The DevCenter Project upon which to execute operations.
[ScheduleName <String>]: The name of a schedule.
[UserId <String>]: The AAD object id of the user. If value is 'me', the identity is taken from the authentication context.
.Link
https://learn.microsoft.com/powershell/module/az.devcenter/get-azdevcenterusercatalog
#>
function Get-AzDevCenterUserCatalog {
[OutputType([System.String], [Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.Api20231001Preview.ICatalog])]
[CmdletBinding(DefaultParameterSetName = 'List', PositionalBinding = $false)]
param(
[Parameter(ParameterSetName = 'Get', Mandatory)]
[Parameter(ParameterSetName = 'GetViaIdentity', Mandatory)]
[Parameter(ParameterSetName = 'List', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Uri')]
[System.String]
# The DevCenter-specific URI to operate on.
${Endpoint},
[Parameter(ParameterSetName = 'GetViaIdentityByDevCenter', Mandatory)]
[Parameter(ParameterSetName = 'ListByDevCenter', Mandatory)]
[Parameter(ParameterSetName = 'GetByDevCenter', Mandatory)]
[Alias('DevCenter')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Uri')]
[System.String]
# The DevCenter upon which to execute operations.
${DevCenterName},
[Parameter(ParameterSetName = 'Get', Mandatory)]
[Parameter(ParameterSetName = 'GetByDevCenter', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')]
[System.String]
# The name of the catalog
${CatalogName},
[Parameter(ParameterSetName = 'Get', Mandatory)]
[Parameter(ParameterSetName = 'List', Mandatory)]
[Parameter(ParameterSetName = 'ListByDevCenter', Mandatory)]
[Parameter(ParameterSetName = 'GetByDevCenter', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')]
[System.String]
# The DevCenter Project upon which to execute operations.
${ProjectName},
[Parameter(ParameterSetName = 'GetViaIdentity', Mandatory, ValueFromPipeline)]
[Parameter(ParameterSetName = 'GetViaIdentityByDevCenter', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.IDevCenterdataIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
if (-not $PSBoundParameters.ContainsKey('Endpoint')) {
$Endpoint = GetEndpointFromResourceGraph -DevCenterName $DevCenterName -Project $ProjectName
$null = $PSBoundParameters.Add("Endpoint", $Endpoint)
$null = $PSBoundParameters.Remove("DevCenterName")
}
else {
$Endpoint = ValidateAndProcessEndpoint -Endpoint $Endpoint
$PSBoundParameters["Endpoint"] = $Endpoint
}
Az.DevCenterdata.internal\Get-AzDevCenterUserCatalog @PSBoundParameters
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDKr08C8cIReyGg
# vf8+mP2Dl4A1Ahxw1OHIz5did61KSKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIADYR4FTaSQ78ddEl+Dg/hby
# xg/qzQmvvjLpvD2mWnuBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEADNS2g7Vb6EZ+gdl8LxeEeLbvXicF/aRlrui36cSg9y15nr+CLFXDwpKJ
# l5Qsx0MIUrqyNvV8Zmvq9mp2mJy/3qxz/59JCbSD0+G8AebQqFND8yjR0HObuGnv
# isfbcUDyg99zqdMIL3T4Gk/fPtll36rNbGfnkXLUjmUyRtezO0Z2YJyTKpqWMpRK
# 6eTn6LiuPEi/KIPl9kOMYepw6pslgxV8xFTPqPBZ/ZRPBg0d4tv6lsgss4vUBOTr
# Lt7QgQM5wSTEMpvY/sbjW0EgwWeCIGNKXhZyOkdX17fzuI2LEiVFpjLVyl8bfqFO
# S2HWT06njht22xSRveU7Dxfis5FGP6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBWDs8ef34vO2+/6mDTrI1+O1082SqkzsMw5WloCPrUlQIGZh+2YeeG
# GBMyMDI0MDQyMzEzMTUyMi4yMjZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnSHRowIhgPMjAyNDA0MjMxOTQyMThaGA8yMDI0MDQyNDE5NDIxOFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dIdGgIBADAHAgEAAgINKjAHAgEAAgIRtjAKAgUA
# 6dNumgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAPWsZdCCWsEmxg1OXos
# 5EufWRbruuws3CJ+wEAhXiNDRMQ7tdOCBgZR4T/JVpjAdTjbpz0afi31snq11zCb
# JoH2p291ETykxGG5oDc9PUq7jhEVlu3lAa2u4xmVD6TpANJGZ4XBHaaFo4pYqZnf
# +r6LSbkNZ7j7/OiTe7k9FCvYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgdHlLa4ZbJzirqCH8MAWdHEalhYIM30XpEbZxytjtVGIwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d
# ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I
# npafKEQ9AAEAAAHeMCIEIJZsqRmMvFYOvtIgYbW9mvW34zSiELA9VMZ+e/k6ckSa
# MA0GCSqGSIb3DQEBCwUABIICAFh9o5uI1xpqrTuwmvQUJbSQfrMM7WI7I9TjmboU
# ed1n6VFqIjnp6q8mLt9g66Sle8y02WgFab5mbsfbbl6gJF1yRhrdE7NGwPRIrWaE
# +a6a6vKNJzxETuqo/ZHFqszyUo6AitwZTxAAxJt1eb7a7TZhKPYjstVk9jNeFpVX
# X0nNoOOx0WZ7Vi07lu/KwTSEDUpf9QM+oJQIRB7OGnJhTGz46w3K6I2e5YOWOUiw
# 1HxyY7PPn0AjLtQqjGj9MyXyopKsQoyUZxJVs2HioT5PtnFUhFBJpJclgW/FhARW
# ws4AVcMxljKkL1RO5H3KBK83vKl/UeAqKsNKv7cFvwew3vxt6qSUWWGEw+koPx9J
# hxr/QX+TEgpQljjRDdHfpVVd7YyNFo5SwiRDSKWg0hxqk5okVg7zW58bIDty/tMG
# rDwqjKs3bzvZw1BVHaMGBmsv4G004EH2pH9c1lnsbbz86OHnYQ4uPCEuTPa1ebs5
# WUYH+sB69o/1amDWupr6YHhqbyvYvucOx2OVcHNwN1uDJ3N9X2A4pxuGXJF/Jx0B
# kX0S7Fx/a9gcsRLVxO2wzTy3SN8yhZepMxvJFgL4GXXrMHdZkXJXGvKbQZYYsIwf
# lPfka9Fcan9KqP/5kVjsU6iTrovtYVU+1pGV2RIHHYRbtFa5Ipx1lHa9A/Dpv1FQ
# VM8X
# SIG # End signature block
| 0
|
Magister SOAP Webrequest.ps1
|
# Execute-MagisterSOAP.ps1
# We are reading a list of students from a Magister SOAP webrequest.
# 20120330
# Paul Wiegmans
Clear
Set-StrictMode -Version 2
$mijnpad = Split-Path -parent $MyInvocation.MyCommand.Definition
Echo "Mijn pad is: $mijnpad "
# This is the Magister webquery URL
$layout = "Basis"
$username = "user"
$passwd = "pass"
$WebqueryUrl = "https://bonhoeffer.swp.nl:8800/doc?Function=GetData"`
+"&Library=Data&SessionToken=$username%3B$passwd&Layout=$layout"`
+"&Parameters=leerjaar%3D1112&Type=CSV"
function Doe-Webquery ($Url) {
# .SYNOPSIS
# Voert een SOAP webquery uit
# .DESCRIPTION
# Voert een SOAP webquery uit.
# Retourneert het resultaat van de qebquery in een array met string
# .PARAMETER Url
# De URL van de webquery
# .EXAMPLE
# $lines = Doe-Webquery "https://bonhoeffer.swp.nl:8800/doc?Bladibla..."
# .NOTES
# Auteur: Paul Wiegmans
# Datum: 30 mrt 2012
$request = [System.Net.WebRequest]::Create($Url)
$response = $request.GetResponse()
$requestStream = $response.GetResponseStream()
$MagisterEncoding = [System.Text.Encoding]::UTF7
# We must read the Magister webquery in UTF7 to preserve the accents!
$readStream = new-object System.IO.StreamReader( $requestStream, $MagisterEncoding )
$result = $readStream.ReadToEnd() -split "`n" # convert to array of strings
$readStream.Close()
$response.Close()
return $result
}
$lines = Doe-Webquery $WebQueryUrl
Echo "Webquery geeft $($lines.count) regels"
$velden = $lines[0] -split ";" # list of fieldnames
$lijst = $lines[1..$lines.Count] #
# uitvoer naar file
$lines | Out-File -FilePath "$mijnpad\\soap.csv" -Encoding utf8 # encoding is utf8 of ascii
| 0
|
2153.ps1
|
$imageName = "remotetestimage"
Describe "Basic remoting test with docker" -tags @("Scenario","Slow"){
BeforeAll {
$Timeout = 600
$dockerimage = docker images --format "{{ .Repository }}" $imageName
if ( $dockerimage -ne $imageName ) {
$pending = $true
write-warning "Docker image '$imageName' not found, not running tests"
return
}
else {
$pending = $false
}
Write-Verbose -verbose "setting up docker container PowerShell server"
$server = docker run -d $imageName powershell -c Start-Sleep -Seconds $timeout
Write-Verbose -verbose "setting up docker container PowerShell client"
$client = docker run -d $imageName powershell -c Start-Sleep -Seconds $timeout
Write-Verbose -verbose "Getting path to PowerShell"
$powershellcorepath = docker exec $server powershell -c "(get-childitem 'c:\program files\powershell\*\pwsh.exe').fullname"
if ( ! $powershellcorepath )
{
$pending = $true
write-warning "Cannot find powershell executable, not running tests"
return
}
$powershellcoreversion = ($powershellcorepath -split "[\\/]")[-2]
$powershellcoreConfiguration = "powershell.${powershellcoreversion}"
write-verbose -verbose "getting server hostname"
$serverhostname = docker exec $server hostname
write-verbose -verbose "getting client hostname"
$clienthostname = docker exec $client hostname
write-verbose -verbose "getting powershell full version"
$fullVersion = docker exec $client powershell -c "`$psversiontable.psversion.tostring()"
if ( ! $fullVersion )
{
$pending = $true
write-warning "Cannot determine PowerShell full version, not running tests"
return
}
write-verbose -verbose "getting powershell version"
$coreVersion = docker exec $client "$powershellcorepath" -c "`$psversiontable.psversion.tostring()"
if ( ! $coreVersion )
{
$pending = $true
write-warning "Cannot determine PowerShell version, not running tests"
return
}
}
AfterAll {
if ( $pending -eq $false ) {
docker rm -f $server
docker rm -f $client
}
}
It "Full powershell can get correct remote powershell version" -pending:$pending {
$result = docker exec $client powershell -c "`$ss = [security.securestring]::new(); '11aa!!AA'.ToCharArray() | ForEach-Object { `$ss.appendchar(`$_)}; `$c = [pscredential]::new('testuser',`$ss); `$ses=new-pssession $serverhostname -configurationname $powershellcoreConfiguration -auth basic -credential `$c; invoke-command -session `$ses { `$psversiontable.psversion.tostring() }"
$result | should be $coreVersion
}
It "Full powershell can get correct remote powershell full version" -pending:$pending {
$result = docker exec $client powershell -c "`$ss = [security.securestring]::new(); '11aa!!AA'.ToCharArray() | ForEach-Object { `$ss.appendchar(`$_)}; `$c = [pscredential]::new('testuser',`$ss); `$ses=new-pssession $serverhostname -auth basic -credential `$c; invoke-command -session `$ses { `$psversiontable.psversion.tostring() }"
$result | should be $fullVersion
}
It "Core powershell can get correct remote powershell version" -pending:$pending {
$result = docker exec $client "$powershellcorepath" -c "`$ss = [security.securestring]::new(); '11aa!!AA'.ToCharArray() | ForEach-Object { `$ss.appendchar(`$_)}; `$c = [pscredential]::new('testuser',`$ss); `$ses=new-pssession $serverhostname -configurationname $powershellcoreConfiguration -auth basic -credential `$c; invoke-command -session `$ses { `$psversiontable.psversion.tostring() }"
$result | should be $coreVersion
}
It "Core powershell can get correct remote powershell full version" -pending:$pending {
$result = docker exec $client "$powershellcorepath" -c "`$ss = [security.securestring]::new(); '11aa!!AA'.ToCharArray() | ForEach-Object { `$ss.appendchar(`$_)}; `$c = [pscredential]::new('testuser',`$ss); `$ses=new-pssession $serverhostname -auth basic -credential `$c; invoke-command -session `$ses { `$psversiontable.psversion.tostring() }"
$result | should be $fullVersion
}
}
| 0
|
100.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-AuditCategories(){
[cmdletbinding()]
param
(
$Name
)
$graphApiVersion = "Beta"
$Resource = "deviceManagement/auditEvents/getAuditCategories"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-AuditEvents(){
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$Category,
[Parameter(Mandatory=$false)]
[ValidateRange(1,30)]
[Int]$days
)
$graphApiVersion = "Beta"
$Resource = "deviceManagement/auditEvents"
if($days){ $days }
else { $days = 30 }
$daysago = "{0:s}" -f (get-date).AddDays(-$days) + "Z"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)?`$filter=category eq '$Category' and activityDateTime gt $daysago"
Write-Verbose $uri
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$AuditCategories = Get-AuditCategories
Write-Host "Intune Audit Categories:" -ForegroundColor Yellow
$menu = @{}
for ($i=1;$i -le $AuditCategories.count; $i++)
{ Write-Host "$i. $($AuditCategories[$i-1])"
$menu.Add($i,($AuditCategories[$i-1]))}
Write-Host
[int]$ans = Read-Host 'Enter Category Name (Numerical value)'
$selection = $menu.Item($ans)
if($selection){
$selection
Write-Host
write-host "-------------------------------------------------------------------"
Write-Host
$Events = Get-AuditEvents -Category $selection
if($Events){
foreach($Event in ($Events | Sort-Object -Property activityDateTime )){
Write-Host $Event.displayName -f Yellow
Write-Host "Component Name:" $Event.componentName
Write-Host "Activity Type:" $Event.activityType
Write-Host "Activity Date Time:" $Event.activityDateTime
Write-Host "Application:" $Event.actor.applicationDisplayName
if($Event.activityResult -eq "Success"){
Write-Host "Activity Result:" $Event.activityResult -ForegroundColor Green
}
else {
Write-Host "Activity Result:" $Event.activityResult -ForegroundColor Red
}
Write-Host
Write-Host "User Information" -ForegroundColor Cyan
$Event.actor
Write-Host "Resource Information" -ForegroundColor Cyan
$Event.resources
Write-Host "-------------------------------------------------------------------"
Write-Host
}
}
else {
Write-Host "No audit events found for '$selection' in the past month..." -ForegroundColor Cyan
Write-Host
Write-Host "-------------------------------------------------------------------"
Write-Host
}
}
| 0
|
sample_45_16.ps1
|
#
# Module manifest for module 'OCI.PSModules.Computeinstanceagent'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Computeinstanceagent.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '29321a90-4dd4-4c81-80f1-cc9ba6c1fdd3'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Computeinstanceagent Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Computeinstanceagent.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIComputeinstanceagentInstanceagentAvailablePluginsList',
'Get-OCIComputeinstanceagentInstanceAgentCommand',
'Get-OCIComputeinstanceagentInstanceAgentCommandExecution',
'Get-OCIComputeinstanceagentInstanceAgentCommandExecutionsList',
'Get-OCIComputeinstanceagentInstanceAgentCommandsList',
'Get-OCIComputeinstanceagentInstanceAgentPlugin',
'Get-OCIComputeinstanceagentInstanceAgentPluginsList',
'New-OCIComputeinstanceagentInstanceAgentCommand',
'Stop-OCIComputeinstanceagentInstanceAgentCommand'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Computeinstanceagent'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
sample_12_34.ps1
|
#************************************************
# DC_WebClient-Component.ps1
# Version 1.0
# Date: 2009-2014
# Author: Boyd Benson (bbenson@microsoft.com)
# Description: Collects information about WebClient/WebDAV.
# Called from: Networking Diagnostics
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Import-LocalizedData -BindingVariable ScriptVariable
Write-DiagProgress -Activity $ScriptVariable.ID_CTSWebClient -Status $ScriptVariable.ID_CTSWebClientDescription
# detect OS version and SKU
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
function RunNetSH ([string]$NetSHCommandToExecute="")
{
Write-DiagProgress -Activity $ScriptVariable.ID_CTSWebClient -Status "netsh $NetSHCommandToExecute"
$NetSHCommandToExecuteLength = $NetSHCommandToExecute.Length + 6
"`n`n`n" + "-" * ($NetSHCommandToExecuteLength) + "`r`n" + "netsh $NetSHCommandToExecute" + "`r`n" + "-" * ($NetSHCommandToExecuteLength) | Out-File -FilePath $OutputFile -append
$CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFile "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
}
#----------Registry
$OutputFile= $Computername + "_WebClient_reg_output.TXT"
$CurrentVersionKeys = "HKLM\SYSTEM\CurrentControlSet\services\WebClient",
"HKLM\System\CurrentControlSet\Services\MRxDAV",
"HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider",
"HKCU\Network",
"HKCU\Software\Microsoft\Office\14.0\Common\Internet",
"HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings"
$sectionDescription = "WebClient"
RegQuery -RegistryKeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "WebClient registry output" -SectionDescription $sectionDescription
#Windows Server 2008+
if ($bn -gt 6000)
{
#----------Netsh
$OutputFile = $ComputerName + "_WebClient_netsh_winhttp-proxy-settings.txt"
RunNetSH -NetSHCommandToExecute "winhttp show proxy"
CollectFiles -filesToCollect $OutputFile -fileDescription "WebClient-WinHTTP-proxy-settings" -SectionDescription $sectionDescription
}
#Windows Server 2003
else
{
#----------ProxyCfg
$OutputFile = $ComputerName + "_WebClient_proxycfg.txt"
$CommandToExecute = "cmd.exe /c proxycfg.exe >> $OutputFile "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
CollectFiles -filesToCollect $OutputFile -fileDescription "WebClient-WinHTTP-proxy-settings_proxycfg" -SectionDescription $sectionDescription
}
#----------Driver Information for WebClient
#$OutputFileSym = "_WebClient"
# Array of file names to pass to checksym
#[array]$arrFileNames = @("davclnt.dll","webclnt.dll")
# Call DC_ChkSym.ps1 with array of files
#Run-DiagExpression .\DC_ChkSym.ps1 -FolderName "$Env:SystemRoot\System32" -FileMask $arrFileNames -Prefix $OutputFileSym -Suffix "_binaries_dll" -FileDescription "WebClient Driver Versions" -Recursive $true
#Run-DiagExpression .\DC_ChkSym.ps1 -FolderName "$Env:SystemRoot\System32\drivers" -FileMask "mrxdav.sys" -Prefix $OutputFileSym -Suffix "_binaries_sys" -FileDescription "Offline Files and Folders Driver Versions"
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBNnjttSe4LwR7G
# Za3ALC7VXCkrS2GVebpjsJIGEZpI3aCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMI5kaY7ypXliDurX2LLvp9W
# WzW8SDF/JYUu6dxSlLLxMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAl1eopaykGN4wzF8zF5pvruBjqLY8Yrl0DSa9e+RItoqwWhn3MulW8FSC
# NoG1GytyiqAUUDySg3Ks7OF7atCBnA4XJXVivxp54v8QlXVGchxFx7L7D8XQSmuX
# tOoIKonScyV90WfQUASgZX1nz7mqcFwkPTPuABKQFTrPjoSLGAkjKRKMhepcc9v0
# fC/+QBRYLGCVo5U2DBx+Lnw3jRMrHZXz/RMGzt0ou8yb4sGbTNSnvTAfL+R9sMd7
# cThVn2OBd2o3320YtjtjD8JJa42jWjL3PPOOGJCmZ6+ohs16yCFLblnw2H2oZ2vn
# RJmm8WG9f2zezaducHuJYssOTKOdQaGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBz9fr9wx3OQgOkS+ui5iZhX5IVYT3Ogf8PLlNlO5iaxgIGZutLSAPe
# GBMyMDI0MTAyODExNDA0My44MTlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4fPfBZdahAAEAAAH/MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjRDMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyeiV0pB7bg8/qc/mkiDd
# JXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4dU4VCkAZEXqvkxP5QNTtB
# G5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqhhxfHFV7vhtmqHLCCmDxh
# ZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAnncUdtp1xjGmCpdBMygk/
# K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTMKjYD6pLeBP0hZDh5P3f4
# xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L0SdR7qQlv5pwDNerbK3Y
# SEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr9/fIEpPAlC8YisxXaGX4
# RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqfRuWzdUir0Z3jiOOtaDq7
# XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbiaboi12usV8axtlT/dCeP
# C4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA4y3s6G+gQ35o90j2i6am
# aa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49tdsWTIgZWVOSS9uUHhSY
# kbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTD+pXk/rT/
# d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOSNN5MpLiyun
# m866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUAp6WtgolIrativXjOG1lI
# jayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyfOievfbsIzTk/G51+uiUJ
# k772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkGZjq/O4Z/PcmVGtjGps2T
# CtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3kN8N56jpl9kotLhdvd89
# RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU3dLYTAI91gTNUF7BA9q1
# EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0Ty0PD83aCt79Ra0IdDIMS
# uwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOdgRe8tXdGrgDoBeuVOK+c
# RClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tytuulYYcRK95qihF0irQs6
# /WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3XRROwAv016ICuT8hY1In
# yW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTSY4OGuGU1SXaH49JSP3t8
# yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUlcnPkwRLFRPXFspmggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0MTAyOTA5Mzk0OVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEAAgIFPAIB/zAHAgEAAgIU
# KTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAuUNJmV2WE
# mZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaHyPjIBqzVVX+OsCmMA4rC
# SBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cqWgcxpcvR5+XFiKoxtNrZ
# +ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedWcWiD6dyYPjiJ10ZllDJA
# kIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7aY8kNavDIwAwm/WFtYzSw
# Fv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4swD4QJBUY7k+61Fk5XlZ
# u6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgM+Vnndrn
# wRmd4MtFkfe4ED+8thdHxyWNWDGgnT5g2wYwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDjSEV8upyn/TCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/xI4fPfBZdahAAEA
# AAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJkD9cXZckbMA0GCSqGSIb3
# DQEBCwUABIICAMQyqhXOGw16vs0AooQRm0bu3lkeRZ0H92j5O68va7P88Pj3sEhM
# 45f3sN0S4DYdOejODq8PzvnRUigcWtYtgQSHhqHBer0WjMvHCaEkDDrnxVbQe3cJ
# cC345qki67HEdeo7KyD5MByte33XEHlqrVGC4JAxmtyiLsf8+K43CrRc6yXFYpum
# t82TdPvQgTuSKQV/gnsGytaApr0XArjnTtVDD2ytAiwkNI/L57FB/jZDhH/NqEa4
# huFCVUX9oVQ3B2Nw/OXT+JYQIJNgKg/wv6RHne9egIVBpS7Tq2EeD0KzgBk5FjGk
# ZZUJovSg1ADz1FDNeDx0v3vKdgJsqeukqLLj/Bh58A0yddHLuTqMbGcEhA6SLNRN
# mZtbYSF/oGVYjbkpfVNeVVFhxAPrfgitoMuxb1h+rp4gQQMI4nku7JKt+CQZ6wSa
# bVom+zk+ofGdDN3VduhBpJpc98qLWpHNzbyMbGmDpp94+rbBZfbQ6VvjPMVmEGDH
# 3n5fZfJ/5roFzMSoHHv9lCm1RQgPx3HhLypSvOOgGQegMZcYZ5bZo8/8syVi5mmB
# dlE9VeGIAdy6gjqYCOjWPSGloTICmKuaODgzWRajUwBJj3rdgHOR5xQvjdM4Covu
# y/fQD13XCGRXHg07DwbYI38HdLdGa+EgdHw1sFlnQ1ESb+SQJQ5cU55c
# SIG # End signature block
| 0
|
sample_59_45.ps1
|
#
# Module manifest for module 'OCI.PSModules.Certificates'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Certificates.dll'
# Version number of this module.
ModuleVersion = '86.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2be0ad0a-0889-41e0-b5ab-448d9fc6f7c4'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Certificates Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Certificates.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCICertificatesCaBundle',
'Get-OCICertificatesCertificateAuthorityBundle',
'Get-OCICertificatesCertificateAuthorityBundleVersionsList',
'Get-OCICertificatesCertificateBundle',
'Get-OCICertificatesCertificateBundleVersionsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Certificates'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
| 0
|
15.ps1
|
try {
$poshgitPath = join-path (Get-ToolsLocation) 'poshgit'
$currentVersionPath = Get-ChildItem "$poshgitPath\*posh-git*\" | Sort-Object -Property LastWriteTime | Select-Object -Last 1
if(Test-Path $PROFILE) {
$oldProfile = @(Get-Content $PROFILE)
. $currentVersionPath\src\Utils.ps1
$oldProfileEncoding = Get-FileEncoding $PROFILE
$newProfile = @()
foreach($line in $oldProfile) {
if ($line -like '*PoshGitPrompt*') { continue; }
if ($line -like '*Load posh-git example profile*') { continue; }
if($line -like '. *posh-git*profile.example.ps1*') {
continue;
}
if($line -like 'Import-Module *\src\posh-git.psd1*') {
continue;
}
$newProfile += $line
}
Set-Content -path $profile -value $newProfile -Force -Encoding $oldProfileEncoding
}
try {
if (test-path($poshgitPath)) {
Write-Host "Attempting to remove existing `'$poshgitPath`'."
remove-item $poshgitPath -recurse -force
}
} catch {
Write-Host "Could not remove `'$poshgitPath`'"
}
} catch {
try {
if($oldProfile){ Set-Content -path $PROFILE -value $oldProfile -Force -Encoding $oldProfileEncoding }
}
catch {}
throw
}
| 0
|
sample_65_45.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create an in-memory object for Databricks.
.Description
Create an in-memory object for Databricks.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.Databricks
.Link
https://learn.microsoft.com/powershell/module/Az.MachineLearningServices/new-AzMLWorkspaceDatabricksObject
#>
function New-AzMLWorkspaceDatabricksObject {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.Databricks')]
[CmdletBinding(PositionalBinding=$false)]
Param(
[Parameter(HelpMessage="The description of the Machine Learning compute.")]
[string]
$Description,
[Parameter(HelpMessage="Opt-out of local authentication and ensure customers can use only MSI and AAD exclusively for authentication.")]
[bool]
$DisableLocalAuth,
[Parameter(HelpMessage="ARM resource id of the underlying compute.")]
[string]
$ResourceId,
[Parameter(HelpMessage="Databricks access token.")]
[string]
$AccessToken,
[Parameter(HelpMessage="Workspace Url.")]
[string]
$WorkspaceUrl
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.Databricks]::New()
$Object.Type = 'Databricks'
if ($PSBoundParameters.ContainsKey('Description')) {
$Object.Description = $Description
}
if ($PSBoundParameters.ContainsKey('DisableLocalAuth')) {
$Object.DisableLocalAuth = $DisableLocalAuth
}
if ($PSBoundParameters.ContainsKey('ResourceId')) {
$Object.ResourceId = $ResourceId
}
if ($PSBoundParameters.ContainsKey('Type')) {
}
if ($PSBoundParameters.ContainsKey('AccessToken')) {
$Object.AccessToken = $AccessToken
}
if ($PSBoundParameters.ContainsKey('WorkspaceUrl')) {
$Object.WorkspaceUrl = $WorkspaceUrl
}
return $Object
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBuUr/qhZxypy/j
# NdRpR7AevvrSWsm8USChGKEUNd9R/6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEHOpS4PVWQ4xDWsPnAdhUv3
# vLqFisNS08JVRFuwDELWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAoWK1XBHeHbktrIBees3mGj1ldOVFIoP6C2VIy1TEf2xzdb88/9VA66pF
# zmpZ3tCWFB5RbpNvsYXM6sRvtmXoxq22ARSAX8L6XwNxHh1q0mZ7nQFg1pwgdoJo
# b/5blfHYqMi3dPNEfhCONWukSPrYqYE688myGCJeh2PPfhi/Xjhoq0Ly+oBuYPix
# uFR2MbwO8ivUxlqCuBXr2QRPuuMRPUzMYr5jKwF15TQT4ErnazITOQ5qi5DvC6q9
# /S/wSrqvmPFrhBlL61JS8+bkZT0JMqpFyCEwe9ws3GfOC7/InYuxjtPj+efAi/Mv
# HEoq8D5SGo8rJk4Prgh2eTix55kJlaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAuwH0Zuaonz133Olu0W4uFAF8sKLSOoweP73/DL1C0BQIGZpfQk26i
# GBMyMDI0MDczMTA3MDA0Mi4zODRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOpUGaQwIhgPMjAyNDA3MzExMDAyMTJaGA8yMDI0MDgwMTEwMDIxMlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6lQZpAIBADAHAgEAAgIWlDAHAgEAAgISgTAKAgUA
# 6lVrJAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAH13cG6kOg3UO4+kLfMr
# dsSkn5Pz4eR228Ukb+ThepXMxdhfLaLWlI2TSEXh+F9+urZXfP+aNzShsT9gjeBi
# tY5UifJICrbNx2veSOtxZsf8VP64mbx6Em4qwIBnX5HlxQZmfQG9Y0MW/T33Q7XC
# +cS6+Mygpd5fvKJkPv3PEcVSMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgseBokCbeoUpkNtf+0kulVQorc474HtdhKzlHbPOO22wwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEIGLRjvCM29kcWgfIUg/K2HwPYCHanWybsnAUWWPRQoWm
# MA0GCSqGSIb3DQEBCwUABIICAA9i7rVQuupOUH4LwLFPrwyeTBkENV4CzH1cee6L
# GoJZ1AKXUxfDYPbcYhDfBbJT+7DfqXVnwBYj1SAgn5X8vq/9nbGwrJHYddzLrOuu
# WLVZYQNrpSvIIauC4LHpVyFW5mgSzhix8E2BGmB1XQK8zBxJkDdRCzu1STurfXKx
# YJm91XjzbOjI+Ym7rigtAaWy6tVhsprWOPyV5XSahLIpTqyDavxnjlGg4yQvHKnH
# jRws0qdAs5nHimbzE/wjIAEh9uNyOsqACwDK4kKduCQDZuyUkkqr0/v2N0zlCTNw
# 6jgnERotlL72czsfbM9+KiC44KPSQiMHQoHviXc9fsfwK9qQ8srcdcvm/VeWMpFU
# 7U6xvsVZ8fMsFqda9A6qV+BuR9YoTtm6NM9lgM/OQ9mGW0PgY5akWSXUtJ5ZgozC
# X+IyfocX1qQsD3MfPNnjfy5OtqQmc4p8//ZbRcszeHoVlidPyc8BmaLzCzcdZJSU
# xK9Ejt0KaMvHMmZvawjLXc7AEj1P0lY99c332waOZkZlPp6LXW1ItlG/ZzD/n94t
# IsARHNBDwzTQT+SeRW73GwKPs4tBZIfLieesTmvwJeXd3lvrNtAPQ+wtdzGmSWT2
# SgnHenro24No47gEguKFi0lV+trO3atrvUpiVsIvEHd7sIYNZwVdH1YCByOMz4RW
# 6WSc
# SIG # End signature block
| 0
|
sample_20_50.ps1
|
# diag_uex.psm1
# Created by tdimli
# March 2020
#
# Diagnostic functions for UEX area
# version
$UEX_version = "1.0.240717.0"
# Area and Area/Component arrays
$UEX = @("xray_uex_wmi", "xray_uex_eventlog")
#Component/Diagnostic Function arrays
$xray_uex_wmi = @("uex_wmi_KB2020286")
$xray_uex_eventlog = @("uex_eventlog_KB5042230")
# begin: diagnostic functions
#region wmi
#region uex_wmi_KB2020286
<#
Component: WMI
Checks for:
WMI repository size which can cause issues if grown over 500MB/1GB
Created by: tdimli
#>
function uex_wmi_KB2020286
{
param(
[Parameter(Mandatory=$true,
Position=0)]
[Boolean]
$offline
)
$issueMsg = @"
Larger WMI repository sizes in %windir%\system32\wbem\repository can cause logon delays
and performance issues.
When the WMI repository size exceeds 500MB, you may encounter such performance issues.
When the size exceeds 1GB, then you will likely encounter performance issues.
The WMI repository size on this machine is {0}
For further information on this issue and how to resolve it:
https://learn.microsoft.com/en-us/troubleshoot/windows-server/performance/large-wmi-repository-cause-slow-logon
"@
if($offline) {
LogWrite "Cannot run offline, skipping"
return $RETURNCODE_SKIPPED
}
# Look for the issue
try
{
$issueFound = $false
$repSize = 0
$repFile = Get-Item $env:windir\System32\wbem\Repository\OBJECTS.DATA -ErrorAction Ignore
$repSize = $repFile.Length
if ($repSize -eq 0) {
# no repository?
LogWrite "WMI repository file missing or empty!"
}
elseif ($repSize -gt 500*1024*1024) {
$issueFound = $true
if ($repSize -gt 1024*1024*1024) {
# >1GB
$issueType = $ISSUETYPE_ERROR
$repSize = "$(([int](1000 * $repSize/(1024*1024*1024))/1000)) GB"
}
else {
# >500MB
$issueType = $ISSUETYPE_INFO
$repSize = "$([int]($repSize/(1024*1024))) MB"
}
}
if ($issueFound) {
# issue present
$issueMsg = [string]::Format($issueMsg, $repSize)
ReportIssue $issueMsg $issueType
}
}
catch {
LogWrite "Failed - exiting! (Error: $_)"
return $RETURNCODE_FAILED
}
return $RETURNCODE_SUCCESS
}
#endregion uex_wmi_KB2020286
#endregion wmi
#region eventlog
#region uex_eventlog_KB5042230
<#
Component: EventLog
Checks for:
Number of entries under event log registry, which can cause issues if too many
#>
function uex_eventlog_KB5042230
{
param(
[Parameter(Mandatory=$true,
Position=0)]
[Boolean]
$offline
)
$issueMsg = @"
There are high number of event sources ({0}) registered under the Event Log
registry key:
"HKLM\SYSTEM\CurrentControlSet\Services\EventLog"
The Event Log service relies on this registry structure to register all event
sources and channels.
Too many entries here may cause issues with Event Log and may lead to problems
such as events being written in the wrong log etc.
Note: This might not be directly related to the issue you are troubleshooting.
If you are troubleshooting an issue related Event Log service and/or events
being written incorrectly, this is likely related.
Resolution:
Inspect the registry keys and subkeys in the path HKLM\SYSTEM\CurrentControlSet\Services\EventLog
Remove the duplicated/unwanted entries.
Then restart the machine.
For further information on the Event Log event sources and registry structure:
https://learn.microsoft.com/en-us/windows/win32/eventlog/event-sources?redirectedfrom=MSDN
"@
if($offline) {
LogWrite "Cannot run offline, skipping"
return $RETURNCODE_SKIPPED
}
# Look for the issue
try
{
$issueFound = $false
$issueType = $ISSUETYPE_INFO
$numEntries = (Get-ChildItem -Path "HKLM:\SYSTEM\CurrentControlSet\Services\EventLog" -Recurse -ErrorAction Ignore).Count
if ($numEntries -gt 2000) {
# high number of entries
$issueFound = $true
if ($numEntries -gt 10000) {
$issueType = $ISSUETYPE_ERROR
}
}
if ($issueFound) {
# issue present
$issueMsg = [string]::Format($issueMsg, $numEntries)
ReportIssue $issueMsg $issueType
}
}
catch {
LogWrite "Failed - exiting! (Error: $_)"
return $RETURNCODE_FAILED
}
return $RETURNCODE_SUCCESS
}
#endregion uex_eventlog_KB5042230
#endregion eventlog
# end: diagnostic functions
Export-ModuleMember -Function * -Variable *
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCZ8vQMlwiwy1IU
# m3ZU0kht7hPaYLEmsZ41nGgyH+DKH6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICTy
# MDczNzSYO3zeSekvbpkboAX/dfapu9kEqAVTG/pbMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAMm1rIizszb7rmPiw0tLvTRdYppXnsb0J6suL
# xZxeufNG4hfeOXrXOzTAt/IMiMTaMmRxOKdFp8ysJ6dE7sHvpRkCcZiPHpsmMGWu
# 8O8oWpx42b4yEgHHMUNNaPeR4aYGdOrrt33AxyqgwbdvT4OUzPuiUAK9wUMR1H3g
# FTRvIBLovTU+7lDQR2xpPKCLIktJN7BfLmP9PFlzL/r44IWWTHXobW9GAm+eylxM
# IQC6d4hyHTWVdqcvR/QD2o3moghRvJyF21s6jp8P3WE5mLYM19BYQ8tOCUYyjji+
# iAj+98ek1XHRYvhZummzG8pIzpupyJUlKpg8cIXWGdivlPDeQKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAVPhlEHvRKlJhSLYv9noMOHG7i2qQ6Qoro
# 9Yqv83dWLAIGZutTTcj4GBMyMDI0MTAyODExMzMyMi43OTJaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+vs7
# RNN3M8bTAAEAAAH6MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExMVoXDTI1MTAyMjE4MzExMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjQzMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# yhZVBM3PZcBfEpAf7fIIhygwYVVP64USeZbSlRR3pvJebva0LQCDW45yOrtpwIpG
# yDGX+EbCbHhS5Td4J0Ylc83ztLEbbQD7M6kqR0Xj+n82cGse/QnMH0WRZLnwggJd
# enpQ6UciM4nMYZvdQjybA4qejOe9Y073JlXv3VIbdkQH2JGyT8oB/LsvPL/kAnJ4
# 5oQIp7Sx57RPQ/0O6qayJ2SJrwcjA8auMdAnZKOixFlzoooh7SyycI7BENHTpkVK
# rRV5YelRvWNTg1pH4EC2KO2bxsBN23btMeTvZFieGIr+D8mf1lQQs0Ht/tMOVdah
# 14t7Yk+xl5P4Tw3xfAGgHsvsa6ugrxwmKTTX1kqXH5XCdw3TVeKCax6JV+ygM5i1
# NroJKwBCW11Pwi0z/ki90ZeO6XfEE9mCnJm76Qcxi3tnW/Y/3ZumKQ6X/iVIJo7L
# k0Z/pATRwAINqwdvzpdtX2hOJib4GR8is2bpKks04GurfweWPn9z6jY7GBC+js8p
# SwGewrffwgAbNKm82ZDFvqBGQQVJwIHSXpjkS+G39eyYOG2rcILBIDlzUzMFFJbN
# h5tDv3GeJ3EKvC4vNSAxtGfaG/mQhK43YjevsB72LouU78rxtNhuMXSzaHq5fFiG
# 3zcsYHaa4+w+YmMrhTEzD4SAish35BjoXP1P1Ct4Va0CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRjjHKbL5WV6kd06KocQHphK9U/vzAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAuFbCorFrvodG+ZNJH3Y+Nz5QpUytQVObOyYFrgcGrxq6MUa4yLmxN4xW
# dL1kygaW5BOZ3xBlPY7Vpuf5b5eaXP7qRq61xeOrX3f64kGiSWoRi9EJawJWCzJf
# UQRThDL4zxI2pYc1wnPp7Q695bHqwZ02eaOBudh/IfEkGe0Ofj6IS3oyZsJP1yat
# cm4kBqIH6db1+weM4q46NhAfAf070zF6F+IpUHyhtMbQg5+QHfOuyBzrt67CiMJS
# KcJ3nMVyfNlnv6yvttYzLK3wS+0QwJUibLYJMI6FGcSuRxKlq6RjOhK9L3QOjh0V
# CM11rHM11ZmN0euJbbBCVfQEufOLNkG88MFCUNE10SSbM/Og/CbTko0M5wbVvQJ6
# CqLKjtHSoeoAGPeeX24f5cPYyTcKlbM6LoUdO2P5JSdI5s1JF/On6LiUT50adpRs
# tZajbYEeX/N7RvSbkn0djD3BvT2Of3Wf9gIeaQIHbv1J2O/P5QOPQiVo8+0AKm6M
# 0TKOduihhKxAt/6Yyk17Fv3RIdjT6wiL2qRIEsgOJp3fILw4mQRPu3spRfakSoQe
# 5N0e4HWFf8WW2ZL0+c83Qzh3VtEPI6Y2e2BO/eWhTYbIbHpqYDfAtAYtaYIde87Z
# ymXG3MO2wUjhL9HvSQzjoquq+OoUmvfBUcB2e5L6QCHO6qTO7WowggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA94Z+bUJn+nKw
# BvII6sg0Ny7aPDaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ4mkwIhgPMjAyNDEwMjgxMDE0MDFaGA8yMDI0
# MTAyOTEwMTQwMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sniaQIBADAHAgEA
# AgIa4zAHAgEAAgITSTAKAgUA6ssz6QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBDp2k9IO7lePSuN2vi99dNhT8Ur9aidO320rDGDIcPcyFVri4JRa6egypO
# a+QZHboICRCPw0/gWqlrvDCRZTwyGk5Y42nI/Ilu2wyxfwKHIFRNzSJmuD5IbQNL
# Ml1wOoWE3WfiBV23XWqiqgVMrvudjR2zBKTDWoEDcFPa7iv5CUd7sAQW3tiMdpKL
# Qri7U/CWGo0EhKQQh5XEqgC01E+FTTCm/kZmwXTQqMRAMGfm2Z83vJzQFqlNaOUj
# 7KSuuVKsMWeLMNH4sRgs1pvlc78R+eR2b3qHl4HaW2yz+dSUmble365gLjUpgDBc
# udKw24qBm3gFHJ2uSv/oCRYyzAghMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH6+ztE03czxtMAAQAAAfowDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgK+qrH8H0Dr832eWqlRhBFRbkw/JHanFYFmyCiqi6dNowgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCB98n8tya8+B2jjU/dpJRIwHwHHpco5ogNStYoc
# bkOeVjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# +vs7RNN3M8bTAAEAAAH6MCIEILhY9vnDG3hQBjfXzsPIyEAOxeeRFPicwYS+g7hW
# GYq3MA0GCSqGSIb3DQEBCwUABIICAF2Qooxx6P7AVy8aNkaM62v91Fkx5iwXIhDs
# OwJnL6a3TeO9dxJ1nGWjzUKF75W3V9SItwjtk6/Sib1YawxxCpMV973Xm6QPXneY
# EbZCNGZRERQB3s1Cfk1R32P7EL1uxkFIqCGJWne9m0QlXjp3rFMIEdKeXNejuL0Z
# 4Rj+v205+ZnvU5keGXfdD+V1AgUbnOv5ezOgwGAebfqXajeuO5mb/1IvzBny6FwG
# anUW5A2OtX5uBDl2dgiTwCXvj31WqLuzRNcoFEFkL0cJsm/fVS8Hy6j4BJWhpl39
# sQuCUjSvVvDCMf8aCoiL67A9lsbeY5/FjR9NnBF2Sd06EB7isJTesWSu4zKzqjfd
# HYPaqCoYzu9UoDntXJmMKgNhRAG/21aASCbh1qKiO7dSrvIcXnNkLD6pcdzA9fP0
# 5hIjEKWYx4ItXg/v6YwxlBbVWULkq5NJ/vyOQHtc4ieEleEy3cU5h1B3ov8vQZId
# su9bxFPd+7zLQzmH+WlfD8xx9il5D0AKx0i/jiPi2N/3dBkK1uZlio5BiwdYCjxF
# 67xanyx+QP1i/bAFF7/hT4aLQ/my9clnVlE6RbTTGy2cYfNJzKkymyrpaHlWQaRw
# qloAjjPzZL3+isOkgUv3VciqxjoHDvQRMgV4Ydp06wHqmdHhujooC4hyev+4krYT
# NH5r8J7B
# SIG # End signature block
| 0
|
sample_53_92.ps1
|
<# File tss_Perf-Collect.ps1 [Folderpath]
#>
param(
[string]$Folderpath = (Split-Path $MyInvocation.MyCommand.Path -Parent)
)
#region ::::: Configruation parameters ----------------------------------------------#
$VerDate = "2021.04.30.0"
#endregion ::::: Configruation parameters --------------------------------------------#
#region [Initialisations] -----------------------------------------------------------#
$version = "Perf-Collect (20180307) v" + $VerDate
# by Gianni Bragante - gbrag@microsoft.com
# mod by WalterE 2021-04-30
Function Write-Log {
param( [string] $msg )
$msg = (get-date).ToString("yyyyMMdd HH:mm:ss.fff") + " " + $msg
Write-Host $msg
$msg | Out-File -FilePath $outfile -Append
}
Function ExecQuery {
param(
[string] $NameSpace,
[string] $Query
)
Write-Log ("Executing query " + $Query)
if ($PSVersionTable.psversion.ToString() -ge "3.0") {
$ret = Get-CimInstance -Namespace $NameSpace -Query $Query -ErrorAction Continue 2>>$errfile
} else {
$ret = Get-CimInstance -Namespace $NameSpace -Query $Query -ErrorAction Continue 2>>$errfile
}
Write-Log (($ret | Measure-Object).count.ToString() + " results")
return $ret
}
$tbPerfV1 = New-Object system.Data.DataTable “Perf”
$col = New-Object system.Data.DataColumn Name,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Open,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Close,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Collect,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Library,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn InstallType,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn PerfIniFile,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn IniExists,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Disabled,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn FirstCounter,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn FirstHelp,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn LastCounter,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn LastHelp,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn ObjectList,([string])
$tbPerfV1.Columns.Add($col)
$myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$myWindowsPrincipal = new-object System.Security.Principal.WindowsPrincipal($myWindowsID)
$adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator
if (-not $myWindowsPrincipal.IsInRole($adminRole)) {
Write-Output "This script needs to be run as Administrator"
#exit
}
if ($Folderpath) { $Root = $Folderpath }
else { $Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path }
$resName = "Perf-" + $env:computername +"-" + $(get-date -f yyyyMMdd_HHmmss)
$resDir = $Root + "\" + $resName
$outfile = $resDir + "\script-output.txt"
$errfile = $resDir + "\script-errors.txt"
$RdrOut = " >>""" + $outfile + """"
$RdrErr = " 2>>""" + $errfile + """"
$SysInfoFile = ($resDir + "\SystemInfo.txt")
New-Item -itemtype directory -path $resDir | Out-Null
Write-Log $version
$cult = Get-Culture
$cultHex = ('{0:X4}' -f $cult.LCID)
Copy-Item ($env:SystemRoot + "\system32\perfc*.dat") $resDir
Copy-Item ($env:SystemRoot + "\system32\perfd*.dat") $resDir
Copy-Item ($env:SystemRoot + "\system32\perfh*.dat") $resDir
Copy-Item ($env:SystemRoot + "\system32\perfi*.dat") $resDir
(get-itemproperty -ErrorAction SilentlyContinue -literalpath ("HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\CurrentLanguage")).Counter | Out-File ($resDir + "\Counter.txt")
(get-itemproperty -ErrorAction SilentlyContinue -literalpath ("HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\CurrentLanguage")).Help | Out-File ($resDir + "\Help.txt")
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services"
$cmd = "reg export ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services"" """ + $resDir + "\Services.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"
$cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"" """ + $resDir + "\Perflib.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Saving registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"
$cmd = "reg save ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"" """ + $resDir + "\Perflib.hiv"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup"
$cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup"" """ + $resDir + "\FWSetup.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$svc = "HKLM:\SYSTEM\CurrentControlSet\Services"
New-PSDrive -PSProvider registry -Root HKEY_LOCAL_MACHINE -Name HKLM -ErrorAction SilentlyContinue | Out-Null
$Keys = Get-ChildItem $svc
ForEach ($Item in $Keys) {
$perf = ($svc + "\" + $item.PSChildName + "\Performance")
$reg = Get-ItemProperty $perf -ErrorAction SilentlyContinue
if ($reg) {
Write-Log $item.PSChildName
$row = $tbPerfV1.NewRow()
if ($reg.PerfIniFile) {
$inipath = ($env:windir + "\INF\" + $item.PSChildName + "\" + $cultHex + "\" + $reg.PerfIniFile).TrimEnd([char]0)
if (Test-Path $inipath) {
$row.IniExists = "Yes"
} else {
$row.IniExists = "No"
}
} else {
$row.IniExists = ""
}
$row.Name = $item.PSChildName
$row.Open = $reg.Open
$row.Close = $reg.Close
$row.Collect = $reg.Collect
$row.Library = $reg.Library
$row.InstallType = $reg.InstallType
$row.PerfIniFile = $reg.PerfIniFile
$row.Disabled = $reg.'Disable Performance Counters'
$row.FirstCounter = $reg.'First Counter'
$row.FirstHelp = $reg.'First Help'
$row.LastCounter = $reg.'Last Counter'
$row.LastHelp = $reg.'Last Help'
$row.ObjectList = $reg.'Object List'
$tbPerfV1.Rows.Add($row)
}
}
$tbPerfV1 | Export-Csv $resDir"\PerfV1.csv" -noType
Write-Log "Enumerating performance counters"
$cmd = "typeperf.exe -q > """ + $resDir + "\typeperf.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log "Enumerating performance counters with instances"
$cmd = "typeperf.exe -qx > """ + $resDir + "\typeperf-inst.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log "Enumerating 32bit performance counters"
$cmd = $env:windir + "\SysWOW64\typeperf.exe -q > """ + $resDir + "\typeperf32.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log "Enumerating 32bit performance counters"
$cmd = $env:windir + "\SysWOW64\typeperf.exe -qx > """ + $resDir + "\typeperf32-inst.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log "Enumerating WMI performance classes"
Get-CimInstance -Query "select * from meta_class where __CLASS like '%Win32_Perf%'" | Select-Object -Property __CLASS | Sort-Object -Property __CLASS | Out-File ($resDir + "\WMIPerfClasses.txt")
<# #_# 2021-04-30
Write-Log "Exporting Application log"
$cmd = "wevtutil epl Application """+ $resDir + "\" + $env:computername + "-Application.evtx""" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting System log"
$cmd = "wevtutil epl System """+ $resDir + "\" + $env:computername + "-System.evtx""" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
#>
Write-Log "Collecting system information"
$pad = 27
$OS = ExecQuery -Namespace "root\cimv2" -Query "select Caption, CSName, OSArchitecture, BuildNumber, InstallDate, LastBootUpTime, LocalDateTime, TotalVisibleMemorySize, FreePhysicalMemory, SizeStoredInPagingFiles, FreeSpaceInPagingFiles from Win32_OperatingSystem"
$CS = ExecQuery -Namespace "root\cimv2" -Query "select Model, Manufacturer, SystemType, NumberOfProcessors, NumberOfLogicalProcessors, TotalPhysicalMemory, DNSHostName, Domain from Win32_ComputerSystem"
$BIOS = ExecQuery -Namespace "root\cimv2" -query "select BIOSVersion, Manufacturer, ReleaseDate, SMBIOSBIOSVersion from Win32_BIOS"
$TZ = ExecQuery -Namespace "root\cimv2" -Query "select Description from Win32_TimeZone"
$PR = ExecQuery -Namespace "root\cimv2" -Query "select Name, Caption from Win32_Processor"
"Computer name".PadRight($pad) + " : " + $OS.CSName | Out-File -FilePath $SysInfoFile -Append
"Model".PadRight($pad) + " : " + $CS.Model | Out-File -FilePath $SysInfoFile -Append
"Manufacturer".PadRight($pad) + " : " + $CS.Manufacturer | Out-File -FilePath $SysInfoFile -Append
"BIOS Version".PadRight($pad) + " : " + $BIOS.BIOSVersion | Out-File -FilePath $SysInfoFile -Append
"BIOS Manufacturer".PadRight($pad) + " : " + $BIOS.Manufacturer | Out-File -FilePath $SysInfoFile -Append
"BIOS Release date".PadRight($pad) + " : " + $BIOS.ReleaseDate | Out-File -FilePath $SysInfoFile -Append
"SMBIOS Version".PadRight($pad) + " : " + $BIOS.SMBIOSBIOSVersion | Out-File -FilePath $SysInfoFile -Append
"SystemType".PadRight($pad) + " : " + $CS.SystemType | Out-File -FilePath $SysInfoFile -Append
"Processor".PadRight($pad) + " : " + $PR.Name + " / " + $PR.Caption | Out-File -FilePath $SysInfoFile -Append
"Processors physical/logical".PadRight($pad) + " : " + $CS.NumberOfProcessors + " / " + $CS.NumberOfLogicalProcessors | Out-File -FilePath $SysInfoFile -Append
"Memory physical/visible".PadRight($pad) + " : " + ("{0:N0}" -f ($CS.TotalPhysicalMemory/1mb)) + " MB / " + ("{0:N0}" -f ($OS.TotalVisibleMemorySize/1kb)) + " MB" | Out-File -FilePath $SysInfoFile -Append
"Free physical memory".PadRight($pad) + " : " + ("{0:N0}" -f ($OS.FreePhysicalMemory/1kb)) + " MB" | Out-File -FilePath $SysInfoFile -Append
"Paging files size / free".PadRight($pad) + " : " + ("{0:N0}" -f ($OS.SizeStoredInPagingFiles/1kb)) + " MB / " + ("{0:N0}" -f ($OS.FreeSpaceInPagingFiles/1kb)) + " MB" | Out-File -FilePath $SysInfoFile -Append
"Operating System".PadRight($pad) + " : " + $OS.Caption + " " + $OS.OSArchitecture | Out-File -FilePath $SysInfoFile -Append
"Build Number".PadRight($pad) + " : " + $OS.BuildNumber | Out-File -FilePath $SysInfoFile -Append
"Time zone".PadRight($pad) + " : " + $TZ.Description | Out-File -FilePath $SysInfoFile -Append
"Install date".PadRight($pad) + " : " + $OS.InstallDate | Out-File -FilePath $SysInfoFile -Append
"Last boot time".PadRight($pad) + " : " + $OS.LastBootUpTime | Out-File -FilePath $SysInfoFile -Append
"Local time".PadRight($pad) + " : " + $OS.LocalDateTime | Out-File -FilePath $SysInfoFile -Append
"DNS Hostname".PadRight($pad) + " : " + $CS.DNSHostName | Out-File -FilePath $SysInfoFile -Append
"Domain".PadRight($pad) + " : " + $CS.Domain | Out-File -FilePath $SysInfoFile -Append
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA0cNPmmhStC95x
# YKdwoFt/XvVwVaxYdhBURvHmGXzP5KCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKSv
# 7Kn0dJWgF1vEqG3//k6psvxkb02BVkZ7BEcHc5EqMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA6GpWRScNOfdgXRBpyrKSewyBucd+tsq/LYF9
# 5HQKO7bBJI+B71JNHdYATTVcxr9faAMkiVk/orQTxkipqqHhbBTiXko4D42VJyvn
# 7YthUd23s4laX9BOvae0Ia6YX5ACp0V2Ff6pKmVLnDfsaZ1wLkid/N5Wk7keOp0C
# WW6KiSgTJ7d8KpXUE+D1HO6/UTrHZnb/K59ntP6TYqM7ebZo6lKoy+2MRqSrN3+m
# qVBq4KQftpFtatNhy5QeSqyoa76jx597Q0iIYvZCufQ45bsYMLGWJq4m7FCnUMya
# yYLOfIDRMz4fPt+F+vIyZj0rzfbVc9MiPn6voTOAkaiHPycv5qGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCD1lCWOTr+JjFeLWpMS0aKgf43rVSWiQO2z
# WF6F4hvI2AIGZldTgNdfGBMyMDI0MDYxMjE1MDA0MC41NThaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV
# 8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVj
# tZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC
# 7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJ
# bsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmU
# Xs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwne
# tSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfF
# cS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4
# eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdth
# FCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCW
# ACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKv
# NNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3u
# fASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3
# ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwL
# hP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrX
# a2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0gan
# hFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVl
# UE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIo
# ycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iO
# aKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqv
# E8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhS
# gCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv
# 1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhf
# iB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOoTm/4wIhgPMjAyNDA2MTIxMjAxMDJaGA8yMDI0MDYx
# MzEyMDEwMlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6hOb/gIBADAHAgEAAgIU
# +DAHAgEAAgISGTAKAgUA6hTtfgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AJ/FJuetAVWJI9zIVgs/G6PJb2Htizs7thkptzHLKrRyIkqJv/q6dRq8CoHs3W9P
# BVpwGoeYDNFqHTXGjcScJjSLFlL8KdtZ2Xe1nwjxChR8Ta+kTgfbll+of7DjBs4h
# ou5X0dKwo0yyYMSYERBYeeIbZsDaI5CElxB95kDskp2pMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAA
# AeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgSN29J+YcN1Xf/y1lojGtDl/Uv5UXmxfYbQoDyR8c
# c1IwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4
# d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEIFXEVszJvDLGPe6VS+bkhFGz
# m96spv2wtK27KDsu4aKpMA0GCSqGSIb3DQEBCwUABIICAATANfOW6mY9bIN6MkQ4
# 8M3y3mXH8n2rimjMXO1i1CmUC7+qsL/LCkJo8RsRmbwVNK+XA/yjxb1UdLzWHPw2
# RRuiuZlD+ooKeZww0ECDnXW/IIoBrtm9cFKGJxwG+ycfJLZ/h/JLwUfeyKLw+UlC
# +K4P+jBaYEddKV4t9sSjoPy2u2iNhIzqXH6kGnaevW085mkF3AVYccQK4NaeYb5Y
# 7/iBVEu1Bto3v0NXPn9+BRyXf+hd4NWtIuK6wZKQfbxx2vdJxbh2L/I72vm0AxhP
# wdxXnlrqtylg3tUr9g8KPgHejN09QUoUL2nKhIwZiYh7LJJX+5qplY7j2V0WeayI
# CyB+NgmCEVCgG8qWjPxplniK3+PiUC/Bvmi8ZpGaboheApET6Sa+RGbjsjnSPqdV
# SVlvJzoeGqqcfDgbuMUpnnElFMrSzwZqQNPJoD6ZK8N5rRY4T4DMNA7p2IHqXdYs
# o/fE3d1+kPZo1FVGArTxBZE3ltzfLrR57r2PFmoGNZUQA8Fup1+VhZPdlAm48+C+
# ph+S1Yk4XdXnLB0pHO9/dzoWLig1oqlLGEIBV6ibuSjF5f45DU9wynAdmgmkSeOK
# QKqg93Vus9F+frwD6RYeh4LDWRUQNwEShWKkmnxJqBrVz7K+fhRMXuFXXGPLLmIq
# aWthX8Z/rnc3t4XGaYQFOv5Z
# SIG # End signature block
| 0
|
Set-FSMORoleOwner.ps1
|
Function Set-FSMORoleOwner {
<#
.SYNOPSIS
Performs a transfer of a FSMO role to a specified Domain Controller.
.DESCRIPTION
Performs a transfer of a FSMO role to a specified Domain Controller.
.PARAMETER DomainController
Fully Qualified Domain Name of the Domain Controller to take a transfer role to
.PARAMETER Role
Name of the role to transfer to domain controller
.PARAMETER Transfer
Transfers the specified role and give to specified domain controller.
.PARAMETER Seize
Seize the specified role and give to specified domain controller.
.PARAMETER PassThru
Show the FSMO role owners after performing action
.NOTES
Name: Set-FSMORoleOwner
Author: Boe Prox
DateCreated: 06/9/2011
.EXAMPLE
Set-FSMORoleOwner -DomainController DC1.Rivendell.com -Role RidRole
Description
-----------
Transfers the RidRole to DC1.Rivendell.com
.EXAMPLE
Set-FSMORoleOwner -DomainController DC1.Rivendell.com -Role PdcRole -Transfer -PassThru
NamingRole : dc2.rivendell.com
Domain : rivendell.com
RidRole : dc2.rivendell.com
Forest : rivendell.com
InfrastructureRole : dc2.rivendell.com
SchemaRole : dc2.rivendell.com
PdcRole : dc1.rivendell.com
Description
-----------
Transfers the PdcRole to DC1.Rivendell.com and displays the current FSMO Role Owners.
.EXAMPLE
Set-FSMORoleOwner -DomainController DC1.Rivendell.com -Role PdcRole,RidRole,SchemaRole -Transfer -PassThru
NamingRole : dc2.rivendell.com
Domain : rivendell.com
RidRole : dc1.rivendell.com
Forest : rivendell.com
InfrastructureRole : dc2.rivendell.com
SchemaRole : dc1.rivendell.com
PdcRole : dc1.rivendell.com
Description
-----------
Transfers the PdcRole,RidRole and SchemaRole to DC1.Rivendell.com and displays the current FSMO Role Owners.
.EXAMPLE
Set-FSMORoleOwner -DomainController DC1.Rivendell.com -Role PdcRole -Seize -PassThru
WARNING: Performing this action is irreversible!
The Domain Controller that originally holds this role should be rebuilt to avoid issues on the domain!
NamingRole : dc2.rivendell.com
Domain : rivendell.com
RidRole : dc2.rivendell.com
Forest : rivendell.com
InfrastructureRole : dc2.rivendell.com
SchemaRole : dc2.rivendell.com
PdcRole : dc1.rivendell.com
Description
-----------
Seizes the PdcRole and places it on DC1.Rivendell.com and displays the current FSMO Role Owners.
#>
[cmdletbinding(
SupportsShouldProcess = 'True',
ConfirmImpact = 'High',
DefaultParameterSetName = 'Transfer'
)]
Param (
[parameter(Position=1,Mandatory = 'True',ValueFromPipeline = 'True',
HelpMessage='Enter the Fully Qualified Domain Name of the Domain Controller')]
[ValidateCount(1,1)]
[string[]]$DomainController,
[parameter(Position=2,Mandatory = 'True',
HelpMessage = "InfrastructureRole,NamingRole,PdcRole,RidRole,SchemaRole")]
[Alias('fsmo','fsmorole')]
[ValidateSet('InfrastructureRole','NamingRole','PdcRole','RidRole','SchemaRole')]
[ValidateCount(1,5)]
[string[]]$Role,
[parameter(Position=4,ParameterSetName='Transfer')]
[Switch]$Transfer,
[parameter(Position=4,ParameterSetName='Seize')]
[Switch]$Seize,
[parameter(Position=5)]
[switch]$PassThru
)
Begin {}
Process {
Try {
Write-Verbose "Connecting to Forest"
$forest = [system.directoryservices.activedirectory.Forest]::GetCurrentForest()
Write-Verbose "Locating $DomainController"
$dc = $forest.domains | ForEach {
$_.Domaincontrollers | Where {
$_.Name -eq $DomainController
}
}
}
Catch {
Write-Warning "$($Error)"
Break
}
If (-NOT [string]::IsNullOrEmpty($dc)) {
ForEach ($r in $role) {
Switch ($PScmdlet.ParameterSetName) {
"Transfer" {
Write-Verbose "Beginning transfer of $r to $DomainController"
If ($PScmdlet.ShouldProcess("$DomainController","Transfer Role: $($Role)")) {
Try {
$dc.TransferRoleOwnership($r)
}
Catch {
Write-Warning "$($Error[0])"
Break
}
}
}
"Seize" {
Write-Warning "Performing this action is irreversible!`nThe Domain Controller that originally holds this role should be rebuilt to avoid issues on the domain!"
Write-Verbose "Seizing $r and placing on $DomainController"
If ($PScmdlet.ShouldProcess("$DomainController","Seize Role: $($Role)")) {
Try {
$dc.SeizeRoleOwnership($r)
}
Catch {
Write-Warning "$($Error[0])"
Break
}
}
}
Default {
Write-Warning "You must specify either -Transfer or -Seize!"
Break
}
}
}
}
Else {
Write-Warning "Unable to locate $DomainController!"
Break
}
}
End {
If ($PSBoundParameters['PassThru']) {
$forest = [system.directoryservices.activedirectory.Forest]::GetCurrentForest()
ForEach ($domain in $forest.domains) {
$forestproperties = @{
Forest = $Forest.name
Domain = $domain.name
SchemaRole = $forest.SchemaRoleOwner
NamingRole = $forest.NamingRoleOwner
RidRole = $Domain.RidRoleOwner
PdcRole = $Domain.PdcRoleOwner
InfrastructureRole = $Domain.InfrastructureRoleOwner
}
$newobject = New-Object PSObject -Property $forestproperties
$newobject.PSTypeNames.Insert(0,"ForestRoles")
$newobject
}
}
}
}
| 0
|
sample_15_91.ps1
|
# ---------------------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# ---------------------------------------------------------------------------------------------
# Prevent installing more than once per session
if (Test-Path variable:global:__VSCodeOriginalPrompt) {
return;
}
# Disable shell integration when the language mode is restricted
if ($ExecutionContext.SessionState.LanguageMode -ne "FullLanguage") {
return;
}
$Global:__VSCodeOriginalPrompt = $function:Prompt
$Global:__LastHistoryId = -1
# Store the nonce in script scope and unset the global
$Nonce = $env:VSCODE_NONCE
$env:VSCODE_NONCE = $null
$osVersion = [System.Environment]::OSVersion.Version
$isWindows10 = $IsWindows10 -and $osVersion.Major -eq 10 -and $osVersion.Minor -eq 0 -and $osVersion.Build -lt 22000
if ($env:VSCODE_ENV_REPLACE) {
$Split = $env:VSCODE_ENV_REPLACE.Split(":")
foreach ($Item in $Split) {
$Inner = $Item.Split('=', 2)
[Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':'))
}
$env:VSCODE_ENV_REPLACE = $null
}
if ($env:VSCODE_ENV_PREPEND) {
$Split = $env:VSCODE_ENV_PREPEND.Split(":")
foreach ($Item in $Split) {
$Inner = $Item.Split('=', 2)
[Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':') + [Environment]::GetEnvironmentVariable($Inner[0]))
}
$env:VSCODE_ENV_PREPEND = $null
}
if ($env:VSCODE_ENV_APPEND) {
$Split = $env:VSCODE_ENV_APPEND.Split(":")
foreach ($Item in $Split) {
$Inner = $Item.Split('=', 2)
[Environment]::SetEnvironmentVariable($Inner[0], [Environment]::GetEnvironmentVariable($Inner[0]) + $Inner[1].Replace('\x3a', ':'))
}
$env:VSCODE_ENV_APPEND = $null
}
function Global:__VSCode-Escape-Value([string]$value) {
# NOTE: In PowerShell v6.1+, this can be written `$value -replace '…', { … }` instead of `[regex]::Replace`.
# Replace any non-alphanumeric characters.
[regex]::Replace($value, "[$([char]0x1b)\\\n;]", { param($match)
# Encode the (ascii) matches as `\x<hex>`
-Join (
[System.Text.Encoding]::UTF8.GetBytes($match.Value) | ForEach-Object { '\x{0:x2}' -f $_ }
)
})
}
function Global:Prompt() {
$FakeCode = [int]!$global:?
# NOTE: We disable strict mode for the scope of this function because it unhelpfully throws an
# error when $LastHistoryEntry is null, and is not otherwise useful.
Set-StrictMode -Off
$LastHistoryEntry = Get-History -Count 1
$Result = ""
# Skip finishing the command if the first command has not yet started
if ($Global:__LastHistoryId -ne -1) {
if ($LastHistoryEntry.Id -eq $Global:__LastHistoryId) {
# Don't provide a command line or exit code if there was no history entry (eg. ctrl+c, enter on no command)
$Result += "$([char]0x1b)]633;D`a"
}
else {
# Command finished exit code
# OSC 633 ; D [; <ExitCode>] ST
$Result += "$([char]0x1b)]633;D;$FakeCode`a"
}
}
# Prompt started
# OSC 633 ; A ST
$Result += "$([char]0x1b)]633;A`a"
# Current working directory
# OSC 633 ; <Property>=<Value> ST
$Result += if ($pwd.Provider.Name -eq 'FileSystem') { "$([char]0x1b)]633;P;Cwd=$(__VSCode-Escape-Value $pwd.ProviderPath)`a" }
# Before running the original prompt, put $? back to what it was:
if ($FakeCode -ne 0) {
Write-Error "failure" -ea ignore
}
# Run the original prompt
$Result += $Global:__VSCodeOriginalPrompt.Invoke()
# Write command started
$Result += "$([char]0x1b)]633;B`a"
$Global:__LastHistoryId = $LastHistoryEntry.Id
return $Result
}
# Only send the command executed sequence when PSReadLine is loaded, if not shell integration should
# still work thanks to the command line sequence
if (Get-Module -Name PSReadLine) {
$__VSCodeOriginalPSConsoleHostReadLine = $function:PSConsoleHostReadLine
function Global:PSConsoleHostReadLine {
$CommandLine = $__VSCodeOriginalPSConsoleHostReadLine.Invoke()
# Command line
# OSC 633 ; E ; <CommandLine?> ; <Nonce?> ST
$Result = "$([char]0x1b)]633;E;"
$Result += $(__VSCode-Escape-Value $CommandLine)
# Only send the nonce if the OS is not Windows 10 as it seems to echo to the terminal
# sometimes
if ($IsWindows10 -eq $false) {
$Result += ";$Nonce"
}
$Result += "`a"
# Command executed
# OSC 633 ; C ST
$Result += "$([char]0x1b)]633;C`a"
# Write command executed sequence directly to Console to avoid the new line from Write-Host
[Console]::Write($Result)
$CommandLine
}
}
# Set IsWindows property
if ($PSVersionTable.PSVersion -lt "6.0") {
# Windows PowerShell is only available on Windows
[Console]::Write("$([char]0x1b)]633;P;IsWindows=$true`a")
}
else {
[Console]::Write("$([char]0x1b)]633;P;IsWindows=$IsWindows`a")
}
# Set ContinuationPrompt property
$ContinuationPrompt = (Get-PSReadLineOption).ContinuationPrompt
if ($ContinuationPrompt) {
[Console]::Write("$([char]0x1b)]633;P;ContinuationPrompt=$(__VSCode-Escape-Value $ContinuationPrompt)`a")
}
# Set always on key handlers which map to default VS Code keybindings
function Set-MappedKeyHandler {
param ([string[]] $Chord, [string[]]$Sequence)
try {
$Handler = Get-PSReadLineKeyHandler -Chord $Chord | Select-Object -First 1
}
catch [System.Management.Automation.ParameterBindingException] {
# PowerShell 5.1 ships with PSReadLine 2.0.0 which does not have -Chord,
# so we check what's bound and filter it.
$Handler = Get-PSReadLineKeyHandler -Bound | Where-Object -FilterScript { $_.Key -eq $Chord } | Select-Object -First 1
}
if ($Handler) {
Set-PSReadLineKeyHandler -Chord $Sequence -Function $Handler.Function
}
}
$Global:__VSCodeHaltCompletions = $false
function Set-MappedKeyHandlers {
Set-MappedKeyHandler -Chord Ctrl+Spacebar -Sequence 'F12,a'
Set-MappedKeyHandler -Chord Alt+Spacebar -Sequence 'F12,b'
Set-MappedKeyHandler -Chord Shift+Enter -Sequence 'F12,c'
Set-MappedKeyHandler -Chord Shift+End -Sequence 'F12,d'
# Conditionally enable suggestions
if ($env:VSCODE_SUGGEST -eq '1') {
Remove-Item Env:VSCODE_SUGGEST
# VS Code send completions request (may override Ctrl+Spacebar)
Set-PSReadLineKeyHandler -Chord 'F12,e' -ScriptBlock {
Send-Completions
}
# Suggest trigger characters
Set-PSReadLineKeyHandler -Chord "-" -ScriptBlock {
[Microsoft.PowerShell.PSConsoleReadLine]::Insert("-")
if (!$Global:__VSCodeHaltCompletions) {
Send-Completions
}
}
Set-PSReadLineKeyHandler -Chord 'F12,y' -ScriptBlock {
$Global:__VSCodeHaltCompletions = $true
}
Set-PSReadLineKeyHandler -Chord 'F12,z' -ScriptBlock {
$Global:__VSCodeHaltCompletions = $false
}
}
}
function Send-Completions {
$commandLine = ""
$cursorIndex = 0
# TODO: Since fuzzy matching exists, should completions be provided only for character after the
# last space and then filter on the client side? That would let you trigger ctrl+space
# anywhere on a word and have full completions available
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$commandLine, [ref]$cursorIndex)
$completionPrefix = $commandLine
# Get completions
$result = "$([char]0x1b)]633;Completions"
if ($completionPrefix.Length -gt 0) {
# Get and send completions
$completions = TabExpansion2 -inputScript $completionPrefix -cursorColumn $cursorIndex
if ($null -ne $completions.CompletionMatches) {
$result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength);$($cursorIndex);"
$result += $completions.CompletionMatches | ConvertTo-Json -Compress
}
}
$result += "`a"
Write-Host -NoNewLine $result
}
# Register key handlers if PSReadLine is available
if (Get-Module -Name PSReadLine) {
Set-MappedKeyHandlers
}
| 0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.