filename
stringlengths
5
142
content
stringlengths
2
26M
label
int64
0
1
Monitor-FileSize.ps1
function Monitor-FileSize { <# .Synopsis Checks the file size of a given file until it reaches the specified size .Description Checks the file size of a given file until it reaches the specified size. AT that point, it alerts the user as to what the original file-size-boundry was and what it currently is. The interval at which the script runs can be specified by the user. .Parameter FilePath Path of the file that will be monitored. If not pointed to a specific file, the script will montior all sub-directories as well. ie. if pointed to C:\\ drive, will monitor ALL files on C:\\ drive .Parameter Size File size is monitored against this value. When file size is equal or greater than this value, user alert is triggered. Enter size constraints as integer values (ex: -Size 100 NOT -Size 100kb) .Parameter Interval The wait interval between the executions of the function. The value of this parameter is in seconds and default value is 5 seconds .Example Monitor-FileSize -FilePath C:\\Test -Size 100 Returns a message to the user alerting them when at least 100kb worth of memory is stored in the selected location. .Example Monitor-FileSize -FilePath C:\\Test -Size 100 -Interval 20 Checking the size of the file and all sub-directories every 20 seconds .Notes This script cannot be run as a background job and so must have a separate PowerShell window on which it can be running. Author: Paul Kiri. #> param ( [Parameter(mandatory=$true,position=0)] [string[]]$FilePath , [Parameter(mandatory=$true,position=1)] [int]$Size , [Parameter(mandatory=$false)] [int]$Interval=5 ) if((Test-Path $FilePath)) { While($FS -le $Size) { Start-Sleep -Seconds $Interval $FileSize = get-childitem $FilePath -Recurse -Include *.* | foreach-object -Process { $_.length / 1024 } | Measure-Object -Sum | Select-Object -Property Sum $FS = $FileSize.Sum } } #end if Test-Path else{"File does not exist!"} Write-Output "The files at location, $FilePath , have exceeded $Size kb and are now $('{0:N4}' -f $FileSize.Sum) kb in size." }
0
sample_24_97.ps1
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl(); let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/docker.webCore.eventHandlers.js"]; let currentScriptElement = document.querySelector("script[src='Scripts/docker.webCore.plugin.js']"); if (currentScriptElement !== null) { scripts.forEach(element => { let newScriptElement = document.createElement("script"); newScriptElement.setAttribute("src", element); newScriptElement.setAttribute("type", "text/javascript"); newScriptElement.async = false; currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling); currentScriptElement = newScriptElement; }); } // SIG // Begin signature block // SIG // MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // X+ah+KdvfCBnE3Z3QtRiyytn7w3QlVsJD1vFr4g2au+g // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmfMIIZmwIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCDoMSRY8Wr3Xn4aGohXIO2uZtb3EMgJTzDF // SIG // mXIg3CyFAzBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAMZrvOsy // SIG // YBAT2hwt/P3Ugi0wFywDKsRrw2iWollGzF9Z9e2j239E // SIG // oM3vNqVZ91pk2KSIOrAZo9nqaiLf9x1njILbKi3iYaaU // SIG // Jue9U69lVav6KMIEtgm7WzeSpKj+7fpSNUpY6nCDrHDE // SIG // H6sKltSX999YOQkAB9CodnuGnTFPwkvOD93DGHM7xcLv // SIG // kXMBBklBOcTAtyRLeNgAIqhRm7b5Q2pFImph2fXhMB/D // SIG // hYVP2lNmURgT7vpN1hvB/sOgq2ChJfehu2Q5Iz2Rjhdf // SIG // 5Swvj+5oKw7TbfPJdKWFmXbdkh61bzj+X1DAsF/EVZFk // SIG // 2kxfTV1YlsqljQShhIPT0d/hwnKhghcpMIIXJQYKKwYB // SIG // BAGCNwMDATGCFxUwghcRBgkqhkiG9w0BBwKgghcCMIIW // SIG // /gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN // SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQg3/wbauzXcTTGpFpQerX/ // SIG // kGHR+OYfsNu9s5gn9PiIazECBmXWCFac/BgTMjAyNDAz // SIG // MDQxNzA2MTUuNzQ2WjAEgAIB9KCB2KSB1TCB0jELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 // SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD // SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0 // SIG // NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB4NT8 // SIG // HxMVH35dAAEAAAHgMA0GCSqGSIb3DQEBCwUAMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5 // SIG // MDcxOVoXDTI1MDExMDE5MDcxOVowgdIxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs // SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd // SIG // VGhhbGVzIFRTUyBFU046MTc5RS00QkIwLTgyNDYxJTAj // SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp // SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC // SIG // AQCsh5zzocW70QE5xo2/+n7gYYd2S86LQMQIHS2mf85E // SIG // RVHXkis8jbd7aqKzCuxg73F3SrPqiDFG73p5R/sOd7LD // SIG // 2uq2D++tGbhawAa37Hq39JBWsjV1c8E+42qyThI5xTAa // SIG // fsovrsENk5ybsXM3HhuRQx6yCOrBehfO/ZT+snWNAQWZ // SIG // Gfbd/Xv7LzUYngOYFJ7/2HDP2yDGP0GJnfRdAfnmxWIv // SIG // jx+AJF2oTZBYCvOTiGkawxr4Z8Tmv+cxi+zooou/iff0 // SIG // B5HSRpX50X20N0FzP+f7pgTihuCaBWNZ4meUVR+T09Pr // SIG // go8HKoU2571LXyvjfsgdm/axGb6dk7+GcGMxHfQPVbGD // SIG // LmYgkm2hTJO+y8FW5JaZ8OGh1iVyZBGJib8UW3E4RPBU // SIG // MjqFZErinOTlmdvljP4+dKG5QNLQlOdwGrr1DmUaEAYf // SIG // PZxyvpuaTlyl3WDCfnHri2BfIecv3Fy0DDpqiyc+ZezC // SIG // 6hsFNMx1fjBDvC9RaNsxBEOIi+AV/GJJyl6JxxkGnEgm // SIG // i2aLdpMiVUbBUsZ9D5T7x1adGHbAjM3XosPYwGeyvbNV // SIG // sbGRhAayv6G4qV+rsYxKclAPZm1T5Y5W90eDFiNBNsSP // SIG // zTOheAHPAnmsd2Fi0/mlgmXqoiDC8cslmYPotSmPGRMz // SIG // HjUyghCOcBdcMaq+k9fzEKPvLQIDAQABo4IBSTCCAUUw // SIG // HQYDVR0OBBYEFHBeFz9unVfvErrKANV10Nkw0pnSMB8G // SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G // SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp // SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr // SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo // SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww // SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG // SIG // SIb3DQEBCwUAA4ICAQDAE84OkfwNJXTuzKhsQ9VSY4uc // SIG // lQNYR29B3NGI7b+1pMUPIsH35bpV+VLOuLQ9/tzU9SZK // SIG // YVs2gFn9sCnQMN+UcbUBtYjjdxxGdF9t53XuCoP1n28e // SIG // axB5GfW8yp0f9jeQNevsP9aW8Cc3X0XJyU93C8msK/5G // SIG // IzFnetzj9Bpau9LmuFlBPz6OaVO60EW1hKEKM2NuIQKj // SIG // nMLkXJugm9CQXkzgnkQZ7RCoIynqeKUWkLe2/b7rE/e1 // SIG // niXH2laLJpj7bGbGsIJ6SI2wWuebR37pNLw5GbWyF41O // SIG // Jq+XZ7PXZ2pwXQUtj2Nzd4SHwjxDrM6rsBy5H5BWf/W8 // SIG // cPP3kSZXbaLpB6NemnxPwKj/7JphiYeWUdKZoFukHF/u // SIG // ta3YuZAyU8whWqDMmM1EtEhG8qw2f6dijrigGDZ4JY4j // SIG // pZZXLdLiVc9moH3Mxo47CotgEtVml7zoYGTZhsONkhQd // SIG // ampaGvCmrsfUNhxyxPIHnv+a4Dp8fc0m31VHOyHETaHa // SIG // uke7/kc/j+lyrToMgqlv/q4T5qf5+xatgRk0ZHMv/4Zk // SIG // t9qeqsoJa9iuDqCQyV8RbOpcHPA/OqpVHho1MqO4VcuV // SIG // b8gPstJhpxALgPObbDnFD5c8FhebL/geX89+Tlt1+EqZ // SIG // OUojbpZyxUTzOVwrEh6r3GwvEd6sI9sNXrz4WcQ7jTCC // SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw // SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp // SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4 // SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA // SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC // SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm // SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE // SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT // SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ // SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5 // SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV // SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy // SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG // SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2 // SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ // SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q // SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL // SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU // SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb // SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID // SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj // SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v // SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely // SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV // SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K // SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ // SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U // SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v // SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 // SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI // SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv // SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B // SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU // SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC // SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ // SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT // SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS // SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB // SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0 // SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy // SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx // SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k // SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2 // SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4 // SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL // SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm // SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z // SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLUMIIC // SIG // PQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w // SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz // SIG // IFRTUyBFU046MTc5RS00QkIwLTgyNDYxJTAjBgNVBAMT // SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB // SIG // ATAHBgUrDgMCGgMVAG3z0dXwV+h8WH8j8fM2MyVOXyEM // SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpkFaPMCIYDzIwMjQw // SIG // MzA0MjIxNzUxWhgPMjAyNDAzMDUyMjE3NTFaMHQwOgYK // SIG // KwYBBAGEWQoEATEsMCowCgIFAOmQVo8CAQAwBwIBAAIC // SIG // DHgwBwIBAAICET4wCgIFAOmRqA8CAQAwNgYKKwYBBAGE // SIG // WQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh // SIG // IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAV // SIG // kZYgPzKaAcDJk+62Lg1K7hyRmEN0Nx81sUqQMBbDrcOP // SIG // vWMoyTqY+lFbfVLN2w1gEPAQ50OroC7wkGIJHvY3QzIx // SIG // cPbeCAFNRSyBg06WwroLMfVhVXdTMhGB0k7DYDpt4G5y // SIG // oVtM5APWdpSBoLIRhf1cC0+n4UcVVxSAGTNLAjGCBA0w // SIG // ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMA0GCWCGSAFl // SIG // AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN // SIG // AQkQAQQwLwYJKoZIhvcNAQkEMSIEIJoTbhbo5tbDNrgW // SIG // MbpWCy11AEtr3ovpPwIJAFS9OQ+eMIH6BgsqhkiG9w0B // SIG // CRACLzGB6jCB5zCB5DCBvQQg4+5Sv/I55W04z73O+wwg // SIG // km+E2QKWPZyZucIbCv9pCsEwgZgwgYCkfjB8MQswCQYD // SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G // SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 // SIG // IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg // SIG // VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeDU/B8TFR9+ // SIG // XQABAAAB4DAiBCBmFXKCOwUXn1oYTDJvV/srngJJ1eUj // SIG // TkAPslN10VXI/DANBgkqhkiG9w0BAQsFAASCAgBYPCVD // SIG // +iBH9/CBTJ6Oh+8nA5+rb8ZtKzJ3jakoEKHWx0YQXkj4 // SIG // qcetrdJ6mPTq5QrWOZT1dynAuucm320m6b6MWYmoAhij // SIG // rXkpzA9ZFBiNzUKI08eSo4IhPy3vXA3DrzKAf8RDLg+/ // SIG // AF1hs0COz0m5ordoFDb9gTqEccRChm7zijvpjtKjBBT7 // SIG // XEQ2pTvg6fY5fCVipiiA9AOWXeOS7t+SGOCMEHrI3NuW // SIG // aOSDmvr5TTf+889q7ohOH0fSE+y6o+R4voPuBgal1CuD // SIG // qdYSAHSNSnhvI4FAq6amiHQQQGLsmsie/Pdobb8Oboyg // SIG // 0OnR7Lj9Q9Oe7Ji/Ja5CZa7AHJJeheSHDWX9Yp4r4KVr // SIG // uiJeNwcXGSEP7VRYGdt4ipQ+6nh5ClFF3Xp6nW6TPkv2 // SIG // MRV6couFGKu98sZ46jkitPHSfrfZNqdAcp9HxCaFjR9X // SIG // AyYvkaNA4AVwSINqphw/YP4FU1CxoLfGO4KWBmlRc3KJ // SIG // D+UAoAq4IwiGGLTWYSn2HPJsYzJ0ti51KLGL8Id6eutf // SIG // X35yzw5whzdD1xRa7WhPV0+w6pCGlTPaYjYP/m9zHG/2 // SIG // B60m6+a5Kv0AHPMb1n4mpFbBcVMfXw5r0gwxeaDyd7hM // SIG // JCPQgQs2cyyTvwdnUYc2qcnkxX1mWZyLxgHZ7HegYZrP // SIG // Cd1BtP8G34dsicNQoA== // SIG // End signature block
0
Get-CrawlHealth (MOSS)_2.ps1
[reflection.assembly]::LoadWithPartialName("Microsoft.SharePoint") | out-null [reflection.assembly]::LoadWithPartialName("Microsoft.Office.Server") | out-null [reflection.assembly]::LoadWithPartialName("Microsoft.Office.Server.Search") | out-null @@#NOTE: I've set strict crawl freshness/crawl duration/success ratio threshholds. Reset as desired @@# to something that more suits your reality. @@$crawlFreshnessDayThreshhold = 2 @@$crawlDurationHourThreshhold = 4 @@$successRatioThreshhold = 0.9 function Calculate-CrawlDuration( [Microsoft.Office.Server.Search.Administration.SharePointContentSource]$contentSource) { if ($contentSource.CrawlStatus -eq [Microsoft.Office.Server.Search.Administration.CrawlStatus]::Idle) { return "Green - no current crawl" } $timespan = [datetime]::Now - $contentSource.CrawlStarted $timespanFormatted = "Running for $($timespan.TotalDays.ToString('0.00')) Days" + "($($timespan.TotalHours.ToString('0.0')) hours)" if ($timespan.TotalHours -le ($crawlDurationHourThreshhold / 2)) { return "Green - $timespanFormatted" } elseif ($timespan.TotalHours -le ($crawlDurationHourThreshhold)) { return "Yellow - $timespanFormatted" } else { return "Red - $timespanFormatted" } } function Calculate-CrawlFreshness( [Microsoft.Office.Server.Search.Administration.SharePointContentSource]$contentSource) { $timespan = [datetime]::Now - $contentSource.CrawlCompleted $timespanFormatted = "$($timespan.TotalDays.ToString('0.00')) days ago" if ($timespan.Days -le 0) { return "Green - $timespanFormatted" } elseif ($timespan.Days -lt $crawlFreshnessDayThreshhold) { return "Yellow - $timespanFormatted" } else { return "Red - $timespanFormatted" } } function Calculate-IndexHealth( [Microsoft.Office.Server.Search.Administration.SharePointContentSource]$contentSource, $successCount, $warningCount, $errorCount) { $formatted = "($($successCount)/$($warningCount)/$($errorCount))" if ($errorCount -eq 1) { return "Red - exactly 1 error, usually indicates permissions/config error - $formatted" } $successRatio = ([double]$successCount)/([double]($warningCount + $errorCount)) $successRatioMidpointToPerfection = (1.0 + $successRatioThreshhold)/2.0 if ($successRatio -ge $successRatioMidpointToPerfection) { return "Green - $formatted" } elseif ($successRatio -ge $successRatioThreshhold) { return "Yellow - $formatted" } else { return "Red - $formatted" } } function Get-CrawlHealth { $serverContext = [Microsoft.Office.Server.ServerContext]::Default $searchContext = [Microsoft.Office.Server.Search.Administration.SearchContext]::GetContext($serverContext) $content = [Microsoft.Office.Server.Search.Administration.Content]$searchContext $history = [Microsoft.Office.Server.Search.Administration.CrawlHistory]$searchContext $contentSources = $content.ContentSources | foreach { $_ } $contentSources | foreach { #unroll DataTable object into more useful DataRow object $crawlHistory = $history.GetLastCompletedCrawlHistory($_.Id) | % { $_ } add-member -inputobject $_ -membertype NoteProperty -name "CurrentCrawlDuration" -value ( Calculate-CrawlDuration $_) add-member -inputobject $_ -membertype NoteProperty -name "CompletedCrawlFreshness" -value ( Calculate-CrawlFreshness $_) add-member -inputobject $_ -membertype NoteProperty -name "IndexHealth" -value ( Calculate-IndexHealth -contentSource $_ -successCount $crawlHistory.SuccessCount -warningCount ( $crawlHistory.WarningCount) -errorCount $crawlHistory.ErrorCount) } $contentSources | select Name, CurrentCrawlDuration, CompletedCrawlFreshness, IndexHealth } @@#USAGE: -Open a PowerShell session on the SharePoint server with elevated credentials @@# (specifically, with access to the SSP - usually the SharePoint farm account) @@# -Tweak the threshholds (they may be too ambitious for your environment) @@# -Paste this text into an open PowerShell window and type (without the # mark) @@# Get-CrawlHealth | Format-List
0
2267.ps1
function Load-Form { $Form.Controls.Add($TabControl) $TabControl.Controls.AddRange(@( $TabPageGeneral, $TabPageCAS, $TabPagePrimary, $TabPageSecondary, $TabPageSiteRoles, $TabPageOther )) $TabPageGeneral.Controls.AddRange(@( $OutputBoxGeneral, $BlogLink, $LBVersions, $CBValidationOverride, $LabelHeader, $LabelGeneralRestart, $LabelGeneralOS, $LabelGeneralPS, $LabelGeneralElevated, $PBReboot, $PBOS, $PBPS, $PBElevated, $GBGeneralReboot, $GBGeneralOS, $GBGeneralPS, $GBGeneralElevated, $GBGeneralValidation, $GBGeneralVersion )) $Form.Add_Shown({Validate-RunChecks}) $Form.Add_Shown({$Form.Activate()}) [void]$Form.ShowDialog() } function Load-CAS { if (-not(($TabPageCAS.Controls | Measure-Object).Count -ge 1)) { $TabPageCAS.Controls.Clear() $TabPageCAS.Controls.AddRange(@( $ProgressBarCAS, $OutputBoxCAS, $CBCASDownloadPrereqs, $ButtonInstallCAS )) } if ($ButtonInstallCAS.Enabled -eq $false) { $ButtonInstallCAS.Enabled = $true } } function Load-Primary { if (-not(($TabPagePrimary.Controls | Measure-Object).Count -ge 1)) { $TabPagePrimary.Controls.Clear() $TabPagePrimary.Controls.AddRange(@( $ProgressBarPrimary, $OutputBoxPrimary, $CBPrimaryDownloadPrereqs, $ButtonInstallPrimarySite )) } if ($ButtonInstallPrimarySite.Enabled -eq $false) { $ButtonInstallPrimarySite.Enabled = $true } } function Load-Secondary { if (-not(($TabPageSecondary.Controls | Measure-Object).Count -ge 1)) { $TabPageSecondary.Controls.Clear() $TabPageSecondary.Controls.AddRange(@( $ProgressBarSecondary, $OutputBoxSecondary, $ButtonInstallSecondarySite )) } if ($ButtonInstallSecondarySite.Enabled -eq $false) { $ButtonInstallSecondarySite.Enabled = $true } } function Load-SiteSystemRoles { if (-not(($TabPageSiteRoles.Controls | Measure-Object).Count -ge 1)) { $TabPageSiteRoles.Controls.Clear() $TabPageSiteRoles.Controls.AddRange(@( $ProgressBarSiteRoles, $OutputBoxSiteRoles, $RadioButtonSiteRoleMP, $RadioButtonSiteRoleDP, $RadioButtonSiteRoleAppCat, $RadioButtonSiteRoleEP, $RadioButtonSiteRoleSMP, $ButtonInstallSiteRoles, $GBSiteSystemRoles )) } } function Load-Other { if (-not(($TabPageOther.Controls | Measure-Object).Count -ge 1)) { $TabPageOther.Controls.Clear() $TabPageOther.Controls.AddRange(@( $ProgressBarOther, $OutputBoxOther, $ButtonInstallOther, $RadioButtonOtherEAD, $RadioButtonOtherWSUS, $RadioButtonOtherADK, $RadioButtonOtherSMC, $RadioButtonOtherNoSMS, $GBOther )) } } function Load-SystemManagementContainer { Validate-ADGroupSearch } function Interactive-TabPages { param( [parameter(Mandatory=$true)] [ValidateSet("Enable","Disable")] $Mode ) Begin { $CurrentTabPage = $TabControl.SelectedTab.Name switch ($Mode) { "Enable" { $TabPageMode = $true } "Disable" { $TabPageMode = $false } } $TabNameArrayList = New-Object -TypeName System.Collections.ArrayList foreach ($TabNameArrayListObject in (($TabControl.TabPages.Name))) { $TabNameArrayList.Add($TabNameArrayListObject) } } Process { foreach ($TabPageObject in $TabNameArrayList) { if ($Mode -like "Disable") { if ($CurrentTabPage -like "General") { $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Central Administration Site") { $TabPageGeneral.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Primary Site") { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Secondary Site") { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Site System Roles") { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } if ($CurrentTabPage -like "Other") { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode } } else { $TabPageGeneral.Enabled = $TabPageMode $TabPageCAS.Enabled = $TabPageMode $TabPagePrimary.Enabled = $TabPageMode $TabPageSecondary.Enabled = $TabPageMode $TabPageSiteRoles.Enabled = $TabPageMode $TabPageOther.Enabled = $TabPageMode } } } } function Interactive-RadioButtons { param( [parameter(Mandatory=$true)] [ValidateSet("Enable","Disable")] $Mode, [parameter(Mandatory=$true)] [ValidateSet("Other","SiteRoles")] $Module ) Begin { switch ($Mode) { "Enable" { $TabPageRadioButtonMode = $true } "Disable" { $TabPageRadioButtonMode = $false } } } Process { if ($Module -eq "SiteRoles") { foreach ($Control in $TabPageSiteRoles.Controls) { if ($Control.GetType().ToString() -eq "System.Windows.Forms.RadioButton") { $Control.Enabled = $TabPageRadioButtonMode } if ($Control.GetType().ToString() -eq "System.Windows.Forms.ComboBox") { $Control.Enabled = $TabPageRadioButtonMode } } } if ($Module -eq "Other") { foreach ($Control in $TabPageOther.Controls) { if ($Control.GetType().ToString() -eq "System.Windows.Forms.RadioButton") { $Control.Enabled = $TabPageRadioButtonMode } if ($Control.GetType().ToString() -eq "System.Windows.Forms.ComboBox") { $Control.Enabled = $TabPageRadioButtonMode } if ($Control.GetType().ToString() -eq "System.Windows.Forms.CheckBox") { $Control.Enabled = $TabPageRadioButtonMode } if ($Control.GetType().ToString() -eq "System.Windows.Forms.TextBox") { $Control.Enabled = $TabPageRadioButtonMode } } } } } function Interactive-SiteRolesControlVisibility { param( [parameter(Mandatory=$true)] [ValidateSet("Enable","Disable")] $Mode, [parameter(Mandatory=$true)] [ValidateSet("MP","DP","AppCat","EP","SMP")] $Module ) Begin { $ControlsArrayList = New-Object System.Collections.ArrayList $ControlsArrayList.AddRange(@("Option Enrollment Point","Option Management Point","Option Distribution Point","Option Application Catalog","Option Site System Roles","Option State Migration Point")) switch ($Mode) { "Enable" { $TabPageSiteRolesVisibilityMode = $true } "Disable" { $TabPageSiteRolesVisibilityMode = $false } } } Process { $SiteRolesControls = $TabPageSiteRoles.Controls $SiteRolesControls | ForEach-Object { $CurrentControl = $_ if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.RadioButton") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.GroupBox") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.CheckBox") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.ComboBox") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } if ($CurrentControl.GetType().ToString() -eq "System.Windows.Forms.TextBox") { if (-not($ControlsArrayList -contains $CurrentControl.Name)) { if (($CurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageSiteRolesVisibilityMode } } } } } } function Interactive-OtherControlVisibility { param( [parameter(Mandatory=$true)] [ValidateSet("Enable","Disable")] $Mode, [parameter(Mandatory=$true)] [ValidateSet("EAD","WSUS","ADK","SMC","NoSMS")] $Module ) Begin { $OtherControlsArrayList = New-Object System.Collections.ArrayList $OtherControlsArrayList.AddRange(@("Option Extend Active Directory","Option Install WSUS","Option Install Windows ADK","Option System Management Container","Option Make a selection","Option No SMS on drive")) switch ($Mode) { "Enable" { $TabPageOtherVisibilityMode = $true } "Disable" { $TabPageOtherVisibilityMode = $false } } } Process { $OtherControls = $TabPageOther.Controls $OtherControls | ForEach-Object { $OtherCurrentControl = $_ if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.RadioButton") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $CurrentControl.Visible = $TabPageOtherVisibilityMode } } } if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.GroupBox") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $OtherCurrentControl.Visible = $TabPageOtherVisibilityMode } } } if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.ComboBox") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $OtherCurrentControl.Visible = $TabPageOtherVisibilityMode } } } if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.TextBox") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $OtherCurrentControl.Visible = $TabPageOtherVisibilityMode } } } if ($OtherCurrentControl.GetType().ToString() -eq "System.Windows.Forms.CheckBox") { if (-not($OtherControlsArrayList -contains $OtherCurrentControl.Name)) { if (($OtherCurrentControl.Name -eq $Module)) { $OtherCurrentControl.Visible = $TabPageOtherVisibilityMode } } } } } } function Validate-RunChecks { $ValidateCounter = 0 if (Validate-RebootPendingCheck) { $ValidateCounter++ } if (Validate-OSCheck) { $ValidateCounter++ } if (Validate-PSCheck) { $ValidateCounter++ } if (Validate-Elevated) { $ValidateCounter++ } if ($ValidateCounter -ge 4) { Interactive-TabPages -Mode Enable Write-OutputBox -OutputBoxMessage "All validation checks passed successfully" -Type "INFO: " -Object General $CBValidationOverride.Enabled = $false } else { Interactive-TabPages -Mode Disable Write-OutputBox -OutputBoxMessage "All validation checks did not pass successfully, remediate the errors and re-launch the tool or check the override checkbox to use the tool anyway" -Type "ERROR: " -Object General } } function Validate-Elevated { $UserIdentity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $UserWP = New-Object Security.Principal.WindowsPrincipal($UserIdentity) $ErrorActionPreference = "Stop" try { if ($UserWP.IsInRole("S-1-5-32-544")) { $PBElevated.Image = $ValidatedImage $LabelGeneralElevated.Visible = $true Write-OutputBox -OutputBoxMessage "User has local administrative rights, and the tool was launched elevated" -Type "INFO: " -Object General return $true } else { $PBElevated.Image = $NonValidatedImage $LabelGeneralElevated.Visible = $true Write-OutputBox -OutputBoxMessage "The tool requires local administrative rights and was not launched elevated" -Type "ERROR: " -Object General return $false } } catch [System.Exception] { Write-OutputBox -OutputBoxMessage "An error occured when attempting to query for elevation, possible due to issues contacting the domain or the tool is launched in a sub-domain. If used in a sub-domain, check the override checkbox to enable this tool" -Type "WARNING: " -Object General $PBElevated.Image = $NonValidatedImage $LabelGeneralElevated.Visible = $true $ErrorActionPreference = "Continue" } } function Validate-RebootPending { param( [parameter(Mandatory=$true)] $ComputerName ) $RebootPendingCBS = $null $RebootPendingWUAU = $null $GetOS = Get-WmiObject -Class Win32_OperatingSystem -Property BuildNumber,CSName -ComputerName $ComputerName $ConnectRegistry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]"LocalMachine",$ComputerName) if ($GetOS.BuildNumber -ge 6001) { $RegistryCBS = $ConnectRegistry.OpenSubKey("SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\").GetSubKeyNames() $RebootPendingCBS = $RegistryCBS -contains "RebootPending" } $RegistryWUAU = $ConnectRegistry.OpenSubKey("SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\").GetSubKeyNames() $RebootPendingWUAU = $RegistryWUAU -contains "RebootRequired" $RegistryPFRO = $ConnectRegistry.OpenSubKey("SYSTEM\CurrentControlSet\Control\Session Manager\") $RegistryValuePFRO = $RegistryPFRO.GetValue("PendingFileRenameOperations",$null) if ($RegistryValuePFRO) { $RebootPendingPFRO = $true } if (($RebootPendingCBS) -or ($RebootPendingWUAU) -or ($RebootPendingPFRO)) { return $true } else { return $false } } function Validate-RebootPendingCheck { $GetComputerName = $env:COMPUTERNAME $ValidateRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateRebootPending) { $PBReboot.Image = $NonValidatedImage $LabelGeneralRestart.Visible = $true Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system" -Type "ERROR: " -Object General return $false } else { $PBReboot.Image = $ValidatedImage $LabelGeneralRestart.Visible = $true Write-OutputBox -OutputBoxMessage "Pending reboot checks validated successfully" -Type "INFO: " -Object General return $true } } function Validate-OSCheck { $OSProductType = Get-WmiObject -Namespace "root\cimv2" -Class Win32_OperatingSystem | Select-Object -ExpandProperty ProductType $OSBuildNumber = Get-WmiObject -Namespace "root\cimv2" -Class Win32_OperatingSystem | Select-Object -ExpandProperty BuildNumber if (($OSProductType -eq 3) -and ($OSBuildNumber -ge 9200)) { Write-OutputBox -OutputBoxMessage "Supported operating system found" -Type "INFO: " -Object General $PBOS.Image = $ValidatedImage $LabelGeneralOS.Visible = $true return $true } else { if ($OSBuildNumber -lt 9200) { Write-OutputBox -OutputBoxMessage "The detected operating system is not supported. This tool is supported on Windows Server 2012 and above" -Type "ERROR: " -Object General $PBOS.Image = $NonValidatedImage $LabelGeneralOS.Visible = $true return $false } if ($OSProductType -eq 2) { Write-OutputBox -OutputBoxMessage "The detected system is a Domain Controller. This tool is not supported on this platform" -Type "ERROR: " -Object General $PBOS.Image = $NonValidatedImage $LabelGeneralOS.Visible = $true return $false } if ($OSProductType -eq 1) { Write-OutputBox -OutputBoxMessage "The detected operating system is a Workstation OS. This tool is not supported on this platform" -Type "ERROR: " -Object General $PBOS.Image = $NonValidatedImage $LabelGeneralOS.Visible = $true return $false } } } function Validate-PSCheck { if ($host.Version -ge "3.0") { Write-OutputBox -OutputBoxMessage "Supported version of PowerShell was detected" -Type "INFO: " -Object General $PBPS.Image = $ValidatedImage $LabelGeneralPS.Visible = $true return $true } else { Write-OutputBox -OutputBoxMessage "Unsupported version of PowerShell detected. This tool requires PowerShell 3.0 and above" -Type "ERROR: " -Object General $PBPS.Image = $NonValidatedImage $LabelGeneralPS.Visible = $true return $false } } function Validate-DomainController { param( [parameter(Mandatory=$true)] $DCName ) Process { $SchemaMaster = ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).SchemaRoleOwner.Name if (($DCName -like $SchemaMaster) -or ($DCName -like $SchemaMaster.Split(".")[0])) { Write-OutputBox -OutputBoxMessage "Specified server name is the Schema Master role owner" -Type "INFO: " -Object Other return $true } elseif (($DCName -ne $SchemaMaster) -or ($DCName -ne $SchemaMaster.Split(".")[0])) { Write-OutputBox -OutputBoxMessage "The specified server name is not the Schema Master role owner in the forest" -Type "ERROR: " -Object Other return $false } else { return $false } } } function Validate-WSUS { $WSUSErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 9200) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $WSUSErrorHandler++ } if ($WSUSErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2012 64-bit and later is supported" -Type "ERROR: " -Object Other $ButtonInstallWSUS.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateWSUSRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateWSUSRebootPending) { $ButtonInstallWSUS.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " -Object Other } else { if (($TextBoxWSUSSQLServer.Text.Length -eq 0) -and ($RadioButtonSQL.Checked -eq $true)) { Write-OutputBox -OutputBoxMessage "Please enter a SQL Server computer name" -Type "ERROR: " -Object Other } else { Install-WSUS } } } } function Install-CAS { Interactive-TabPages -Mode Disable $ProgressBarCAS.Value = 0 $OutputBoxCAS.ResetText() $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($Host.Version)" -Type "INFO: " -Object CAS $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Net-Ext","Web-Net-Ext45","Web-ASP-Net","Web-ASP-Net45","Web-ASP","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Stat-Compression","Web-Dyn-Compression","Web-Metabase","Web-WMI","Web-HTTP-Redirect","Web-Log-Libraries","Web-HTTP-Tracing","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI") } $ProgressBarCAS.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallCAS.Enabled = $false $CBCASDownloadPrereqs.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object CAS do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS } $ProgressBarCAS.PerformStep() } Write-OutputBox -OutputBoxMessage "Installation completed" -Type "INFO: " -Object CAS if ($CBCASDownloadPrereqs.Checked -eq $true) { Get-PrereqFiles -Module CAS Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object CAS $ErrorVerify = 0 $ProgressBarCAS.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS $ProgressBarCAS.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object CAS $ProgressBarCAS.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object CAS } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object CAS } } else { Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object CAS $ErrorVerify = 0 $ProgressBarCAS.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object CAS $ProgressBarCAS.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object CAS $ProgressBarCAS.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object CAS } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object CAS } } $ButtonInstallCAS.Enabled = $true $CBCASDownloadPrereqs.Enabled = $true Interactive-TabPages -Mode Enable } function Install-Primary { Interactive-TabPages -Mode Disable $ProgressBarPrimary.Value = 0 $OutputBoxPrimary.ResetText() $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object Primary $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Net-Ext","Web-Net-Ext45","Web-ASP-Net","Web-ASP-Net45","Web-ASP","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Stat-Compression","Web-Dyn-Compression","Web-Metabase","Web-WMI","Web-HTTP-Redirect","Web-Log-Libraries","Web-HTTP-Tracing","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI") } $ProgressBarPrimary.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallPrimarySite.Enabled = $false $CBPrimaryDownloadPrereqs.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Primary do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary } $ProgressBarPrimary.PerformStep() } Write-OutputBox -OutputBoxMessage "Installation completed" -Type "INFO: " -Object Primary if ($CBPrimaryDownloadPrereqs.Checked -eq $true) { Get-PrereqFiles -Module Primary Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object Primary $ErrorVerify = 0 $ProgressBarPrimary.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary $ProgressBarPrimary.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Primary $ProgressBarPrimary.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object Primary } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object Primary } } else { Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object Primary $ErrorVerify = 0 $ProgressBarPrimary.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Primary $ProgressBarPrimary.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Primary $ProgressBarPrimary.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object Primary } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object Primary } } $ButtonInstallPrimarySite.Enabled = $true $CBPrimaryDownloadPrereqs.Enabled = $true Interactive-TabPages -Mode Enable } function Install-Secondary { Interactive-TabPages -Mode Disable $ProgressBarSecondary.Value = 0 $OutputBoxSecondary.ResetText() $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object Secondary $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Metabase","Web-WMI") } $ProgressBarSecondary.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSecondarySite.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Secondary [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Secondary do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Secondary Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Secondary } $ProgressBarSecondary.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object Secondary $ErrorVerify = 0 $ProgressBarSecondary.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Secondary $ProgressBarSecondary.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object Secondary $ProgressBarSecondary.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object Secondary } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object Secondary } $ButtonInstallSecondarySite.Enabled = $true Interactive-TabPages -Mode Enable } function Install-AppCat { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("NET-Framework-Features","NET-Framework-Core","NET-HTTP-Activation","NET-Non-HTTP-Activ","NET-WCF-Services45","NET-WCF-HTTP-Activation45","RDC","WAS","WAS-Process-Model","WAS-NET-Environment","WAS-Config-APIs","Web-Server","Web-WebServer","Web-Common-Http","Web-Static-Content","Web-Default-Doc","Web-App-Dev","Web-ASP-Net","Web-ASP-Net45","Web-Net-Ext","Web-Net-Ext45","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Security","Web-Windows-Auth","Web-Filtering","Web-Mgmt-Tools","Web-Mgmt-Console","Web-Scripting-Tools","Web-Mgmt-Compat","Web-Metabase","Web-Lgcy-Mgmt-Console","Web-Lgcy-Scripting","Web-WMI") } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Install-MP { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("NET-Framework-Core","NET-Framework-45-Features","NET-Framework-45-Core","NET-WCF-TCP-PortSharing45","NET-WCF-Services45","BITS","BITS-IIS-Ext","BITS-Compact-Server","RSAT-Bits-Server","Web-Server","Web-WebServer","Web-ISAPI-Ext","Web-WMI","Web-Metabase","Web-Windows-Auth","Web-ISAPI-Ext","Web-ASP","Web-Asp-Net","Web-Asp-Net45") } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Install-DP { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("FS-FileServer","RDC","Web-WebServer","Web-Common-Http","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Redirect","Web-Health","Web-Http-Logging","Web-Performance","Web-Stat-Compression","Web-Security","Web-Filtering","Web-Windows-Auth","Web-App-Dev","Web-ISAPI-Ext","Web-Mgmt-Tools","Web-Mgmt-Console","Web-Mgmt-Compat","Web-Metabase","Web-WMI","Web-Scripting-Tools") } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Install-EP { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($ComboBoxSiteRolesEP.Text -eq "Enrollment Point") { if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("Web-Server","Web-WebServer","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Logging","Web-Stat-Compression","Web-Filtering","Web-Net-Ext","Web-Asp-Net","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Mgmt-Console","Web-Metabase","NET-Framework-Core","NET-Framework-Features","NET-HTTP-Activation","NET-Framework-45-Features","NET-Framework-45-Core","NET-Framework-45-ASPNET","NET-WCF-Services45","NET-WCF-TCP-PortSharing45") } } if ($ComboBoxSiteRolesEP.Text -eq "Enrollment Proxy Point") { if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("Web-Server","Web-WebServer","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Logging","Web-Stat-Compression","Web-Filtering","Web-Windows-Auth","Web-Net-Ext","Web-Net-Ext45","Web-Asp-Net","Web-Asp-Net45","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Mgmt-Console","Web-Metabase","NET-Framework-Core","NET-Framework-Features","NET-Framework-45-Features","NET-Framework-45-Core","NET-Framework-45-ASPNET","NET-WCF-Services45","NET-WCF-TCP-PortSharing45") } } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature -Force Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Install-SMP { Interactive-TabPages -Mode Disable Interactive-RadioButtons -Mode Disable -Module SiteRoles $ProgressBarSiteRoles.Value = 0 $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" -Type "INFO: " -Object SiteRoles $WinFeatures = @("Web-Server","Web-Common-Http","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Logging","Web-Dyn-Compression","Web-Filtering","Web-Windows-Auth","Web-Mgmt-Tools","Web-Mgmt-Console") } $ProgressBarSiteRoles.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonInstallSiteRoles.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -ge 9200) { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles } $ProgressBarSiteRoles.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting to verify that all features were successfully installed" -Type "INFO: " -Object SiteRoles $ErrorVerify = 0 $ProgressBarSiteRoles.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " -Object SiteRoles $ProgressBarSiteRoles.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object SiteRoles } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" -Type "ERROR: " -Object SiteRoles } Interactive-RadioButtons -Mode Enable -Module SiteRoles Interactive-TabPages -Mode Enable $ButtonInstallSiteRoles.Enabled = $true } function Extend-ActiveDirectorySchema { $ButtonInstallOther.Enabled = $false Interactive-RadioButtons -Mode Disable -Module Other $CurrentUser = [System.Security.Principal.WindowsIdentity]::GetCurrent() $WindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($CurrentUser) if (-not($TextBoxDC.Text -eq $WaterMarkDC)) { if (Test-Connection -ComputerName $TextBoxDC.Text -Count 1 -ErrorAction SilentlyContinue) { if (($WindowsPrincipal.IsInRole("Domain Admins")) -and ($WindowsPrincipal.IsInRole("Schema Admins"))) { $TextBoxDC.Enabled = $false do { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse to the '<ConfigMgr source files>\SMSSETUP\BIN\X64' folder." } until (Test-Path -Path "$($SetupDLLocation)\EXTADSCH.EXE") $DC = $TextBoxDC.Text $GetPath = Get-ChildItem -Recurse -Filter "EXTADSCH.EXE" -Path "$($SetupDLLocation)" $Path = $GetPath.DirectoryName + "\EXTADSCH.EXE" $Destination = "\\" + $DC + "\C$" Write-OutputBox -OutputBoxMessage "Copying EXTADSCH.EXE to the specified domain controller" -Type "INFO: " -Object Other Copy-Item $Path $Destination -Force Write-OutputBox -OutputBoxMessage "Starting to extend the Active Directory schema" -Type "INFO: " -Object Other Invoke-WmiMethod -Class Win32_Process -Name Create -ArgumentList "C:\EXTADSCH.EXE" -ComputerName $DC | Out-Null Start-Sleep -Seconds 10 $Content = Get-Content -Path "\\$($DC)\C$\extadsch.log" if ($Content -match "Successfully extended the Active Directory schema") { Write-OutputBox -OutputBoxMessage "Active Directory schema was successfully extended" -Type "INFO: " -Object Other } else { Write-OutputBox -OutputBoxMessage "Active Directory was not extended successfully, refer to C:\ExtADSch.log on the domain controller" -Type "ERROR: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "Current logged on user is not a member of the Domain Admins or Schema Admins group" -Type "ERROR: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "Unable to establish a connection to the specified domain controller" -Type "ERROR: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "Please enter a hostname of a domain controller" -Type "ERROR: " -Object Other } Interactive-RadioButtons -Mode Enable -Module Other $ButtonInstallOther.Enabled = $true $TextBoxDC.Enabled = $true } function Install-WSUS { Interactive-RadioButtons -Mode Disable -Module Other Interactive-TabPages -Mode Disable $ButtonInstallOther.Enabled = $false if ($ComboBoxOtherWSUS.Text -eq "WID") { $WinFeatures = @("UpdateServices","UpdateServices-WidDB","UpdateServices-Services","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI") } if ($ComboBoxOtherWSUS.Text -eq "SQL") { $WinFeatures = @("UpdateServices-Services","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI","UpdateServices-DB") } $ProgressBarOther.Maximum = 10 $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ProgressBarOther.PerformStep() $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-not(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Other Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" -Type "INFO: " -Object Other } $ProgressBarOther.PerformStep() } Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" -Type "INFO: " -Object Other $WSUSContentPath = Read-FolderBrowserDialog -Message "Choose a location where WSUS content will be stored, e.g. C:\WSUS" $ProgressBarOther.PerformStep() if (-not(Test-Path -Path $WSUSContentPath)) { New-Item $WSUSContentPath -ItemType Directory | Out-Null } if (Test-Path -Path "$($Env:ProgramFiles)\Update Services\Tools\WsusUtil.exe") { $WSUSUtil = "$($Env:ProgramFiles)\Update Services\Tools\WsusUtil.exe" if ($ComboBoxOtherWSUS.SelectedItem -eq "WID") { $WSUSUtilArgs = "POSTINSTALL CONTENT_DIR=$($WSUSContentPath)" } if ($ComboBoxOtherWSUS.Text -eq "SQL") { if (($TextBoxWSUSSQLServer.Text.Length -ge 1) -and ($TextBoxWSUSSQLServer.Text -notlike $WaterMarkWSUSSQLServer) -and ($TextBoxWSUSSQLInstance.Text -like $WaterMarkWSUSSQLInstance)) { Write-OutputBox -OutputBoxMessage "Choosen configuration is SQL Server, default instance" -Type "INFO: " -Object Other $WSUSUtilArgs = "POSTINSTALL SQL_INSTANCE_NAME=$($TextBoxWSUSSQLServer.Text) CONTENT_DIR=$($WSUSContentPath)" } if (($TextBoxWSUSSQLServer.Text.Length -ge 1) -and ($TextBoxWSUSSQLServer.Text -notlike $WaterMarkWSUSSQLServer) -and ($TextBoxWSUSSQLInstance.Text.Length -ge 1) -and ($TextBoxWSUSSQLInstance.Text -notlike $WaterMarkWSUSSQLInstance)) { Write-OutputBox -OutputBoxMessage "Choosen configuration is SQL Server, named instance" -Type "INFO: " -Object Other $WSUSUtilArgs = "POSTINSTALL SQL_INSTANCE_NAME=$($TextBoxWSUSSQLServer.Text)\$($TextBoxWSUSSQLInstance.Text) CONTENT_DIR=$($WSUSContentPath)" } } Write-OutputBox -OutputBoxMessage "Starting WSUS post install configuration, this will take some time" -Type "INFO: " -Object Other $ProgressBarOther.PerformStep() Start-Process -FilePath $WSUSUtil -ArgumentList $WSUSUtilArgs -NoNewWindow -Wait -RedirectStandardOutput "C:\temp.txt" | Out-Null $ProgressBarOther.PerformStep() Write-OutputBox -OutputBoxMessage "Successfully installed and configured WSUS" -Type "INFO: " -Object Other Remove-Item "C:\temp.txt" -Force $ProgressBarOther.PerformStep() } else { $ProgressBarOther.Value = 10 Write-OutputBox -OutputBoxMessage "Unable to locate $($WSUSUtil)" -Type "INFO: " -Object Other } Interactive-RadioButtons -Mode Enable -Module Other Interactive-TabPages -Mode Enable $ButtonInstallOther.Enabled = $true } function Install-ADK { Interactive-RadioButtons -Mode Disable -Module Other Interactive-TabPages -Mode Disable $ButtonInstallOther.Enabled = $false $ADKInstalledFeatures = @() $ComputerName = $env:COMPUTERNAME $UninstallKey = "SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall" $Registry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('LocalMachine',$ComputerName) $RegistryKey = $Registry.OpenSubKey($UninstallKey) $SubKeys = $RegistryKey.GetSubKeyNames() ForEach ($Key in $SubKeys) { $CurrentKey = $UninstallKey + "\\" + $Key $CurrentSubKey = $Registry.OpenSubKey($CurrentKey) $DisplayName = $CurrentSubKey.GetValue("DisplayName") if ($DisplayName -like "Windows PE x86 x64") { $ADKInstalledFeatures += $DisplayName } elseif ($DisplayName -like "User State Migration Tool") { $ADKInstalledFeatures += $DisplayName } elseif ($DisplayName -like "Windows Deployment Tools") { $ADKInstalledFeatures += $DisplayName } } if (($ComboBoxOtherADK.Text -eq "Online") -and ($ADKInstalledFeatures.Length -ne 3)) { $ADKOnlineArguments = "/norestart /q /ceip off /features OptionId.WindowsPreinstallationEnvironment OptionId.DeploymentTools OptionId.UserStateMigrationTool" $ADKDownloadFolder = "C:\Downloads" $ADKSetupFile = "adksetup.exe" switch ($ComboBoxOtherADKVersion.SelectedItem) { "Windows ADK 10" { $ADKDownloadURL = "http://go.microsoft.com/fwlink/p/?LinkId=526740" } "Windows ADK 8.1" { $ADKDownloadURL = "http://download.microsoft.com/download/6/A/E/6AEA92B0-A412-4622-983E-5B305D2EBE56/adk/adksetup.exe" } } Get-WebDownloadFile -URL $ADKDownloadURL -DownloadFolder $ADKDownloadFolder -FileName $ADKSetupFile -Module Other Write-OutputBox -OutputBoxMessage "Download completed" -Type "INFO: " -Object Other [System.Windows.Forms.Application]::DoEvents() Write-OutputBox -OutputBoxMessage "Starting Windows ADK installation" -Type "INFO: " -Object Other [System.Windows.Forms.Application]::DoEvents() Write-OutputBox -OutputBoxMessage "Downloading Windows ADK components and installing, this will take some time depending on your internet connection" -Type "INFO: " -Object Other [System.Windows.Forms.Application]::DoEvents() Start-Process -FilePath "$($ADKDownloadFolder)\$($ADKSetupFile)" -ArgumentList $ADKOnlineArguments while (Get-WmiObject -Class Win32_Process -Filter 'Name="adksetup.exe"') { [System.Windows.Forms.Application]::DoEvents() Start-Sleep -Milliseconds 500 } Write-OutputBox -OutputBoxMessage "Successfully installed Windows ADK" -Type "INFO: " -Object Other } if (($ComboBoxOtherADK.Text -eq "Offline") -and ($ADKInstalledFeatures.Length -ne 3)) { $ADKOfflineArguments = "/norestart /q /ceip off /features OptionId.WindowsPreinstallationEnvironment OptionId.DeploymentTools OptionId.UserStateMigrationTool" $ADKSetupFile = "adksetup.exe" do { $SetupLocation = Read-FolderBrowserDialog -Message "Select the folder where adksetup.exe is located" if (-not(Test-Path -Path "$($SetupLocation)\$($ADKSetupFile)")) { $ADKShellObject = New-Object -ComObject WScript.Shell $PopupValidate = $ADKShellObject.Popup("Unable to find $($ADKSetupFile) in the selected folder",0,"Unable to locate file",0) } } until (Test-Path -Path "$($SetupLocation)\$($ADKSetupFile)") Write-OutputBox -OutputBoxMessage "Starting Windows ADK installation, this will take some time" -Type "INFO: " -Object Other Start-Process -FilePath "$($SetupLocation)\$($ADKSetupFile)" -ArgumentList $ADKOfflineArguments while (Get-WmiObject -Class Win32_Process -Filter 'Name="adksetup.exe"') { [System.Windows.Forms.Application]::DoEvents() Start-Sleep -Milliseconds 500 } Write-OutputBox -OutputBoxMessage "Successfully installed Windows ADK" -Type "INFO: " -Object Other } if ($ADKInstalledFeatures.Length -eq 3) { Write-OutputBox -OutputBoxMessage "All required Windows ADK features are already installed, skipping install" -Type "INFO: " -Object Other } Interactive-RadioButtons -Mode Enable -Module Other Interactive-TabPages -Mode Enable $ButtonInstallOther.Enabled = $true } function Create-SMCContainer { $ObjectDomain = New-Object System.DirectoryServices.DirectoryEntry $ObjectContainer = $ObjectDomain.Create("container", "CN=System Management,CN=System") $ObjectContainer.SetInfo() | Out-Null $SuccssContainerCreate = Get-SMCContainer if ($SuccssContainerCreate -eq $true) { return $true } else { return $false } } function Get-SMCContainer { $ADFilter = "(&(objectClass=container)(cn=*System Management*))" $ADSearch = New-Object System.DirectoryServices.DirectorySearcher($ADFilter) $ADResult = $ADSearch.FindOne() $SuccessContainer = $ADResult.GetDirectoryEntry() if ($SuccessContainer) { return $true } else { return $false } } function Configure-SystemManagementContainer { Interactive-RadioButtons -Mode Disable -Module Other Interactive-TabPages -Mode Disable $ButtonInstallOther.Enabled = $false $ADGroupName = $Global:SMCSharedData $ShellObject = New-Object -ComObject Wscript.Shell $CurrentUser = [System.Security.Principal.WindowsIdentity]::GetCurrent() $WindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($CurrentUser) if ($WindowsPrincipal.IsInRole("Domain Admins")) { if ($CBSMCCreate.Checked -eq $true) { if (Get-SMCContainer -eq $true) { Write-OutputBox -OutputBoxMessage "Found the System Management container, will not create it" -Type "INFO: " -Object Other } else { Write-OutputBox -OutputBoxMessage "System Management container not found, creating it" -Type "INFO: " -Object Other Create-SMCContainer if (Get-SMCContainer -eq $true) { Write-OutputBox -OutputBoxMessage "System Management container created successfully" -Type "INFO: " -Object Other } } } if (Get-SMCContainer -eq $true) { Write-OutputBox -OutputBoxMessage "Found the System Management container" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Checking if '$($ADGroupName)' is already added to the System Management container" -Type "INFO: " -Object Other $ADDomain = New-Object System.DirectoryServices.DirectoryEntry | Select-Object -ExpandProperty distinguishedName $ADGroupFilter = "(&(ObjectCategory=group)(samAccountName=*$($ADGroupName)*))" $ADGroupSearch = New-Object System.DirectoryServices.DirectorySearcher($ADGroupFilter) $ADGroupSearch.FindAll() | ForEach-Object { $Object = New-Object System.Security.Principal.SecurityIdentifier $_.Properties["objectSID"][0],0 [System.Security.Principal.SecurityIdentifier]$ADGroupSID = $Object.Value } $IdentityReference = @() $ContainerObject = [ADSI]("LDAP://CN=System Management,CN=System,$($ADDomain)") $ContainerObject.ObjectSecurity.GetAccessRules($true,$true,[System.Security.Principal.SecurityIdentifier]) | ForEach-Object { $IdentityReference += $_.IdentityReference } if ($IdentityReference.Value -match $ADGroupSID.Value) { Write-OutputBox -OutputBoxMessage "'$($ADGroupName)' is already added to the System Management container" -Type "ERROR: " -Object Other } else { try { Write-OutputBox -OutputBoxMessage "Adding '$($ADGroupName)' to the System Management container" -Type "INFO: " -Object Other $ObjectGUID = New-Object GUID 00000000-0000-0000-0000-000000000000 $ContainerACE = New-Object System.DirectoryServices.ActiveDirectoryAccessRule ($ADGroupSID,"GenericAll","Allow","All",$ObjectGUID) $ContainerObject.ObjectSecurity.AddAccessRule($ContainerACE) $ContainerObject.CommitChanges() Write-OutputBox -OutputBoxMessage "Succesfully added '$($ADGroupName)' to the System Management container" -Type "INFO: " -Object Other } catch { Write-OutputBox -OutputBoxMessage "$($_.Exception.Message)" -Type "ERROR: " -Object Other } } } else { Write-OutputBox -OutputBoxMessage "Unable to find the System Management container, will not continue" -Type "ERROR: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "The current user is not a member of the Domain Admins group, please run this script as a member of the Domain Admin group" -Type "ERROR: " -Object Other } Interactive-RadioButtons -Mode Enable -Module Other Interactive-TabPages -Mode Enable $ButtonInstallOther.Enabled = $true } function Search-SMC { $FormSMCSearch.Controls.AddRange(@($ButtonSystemManagementContainerGroupSearch, $ButtonSMCOK, $TextBoxSMCGroupSearch, $TextBoxSMCGroupResult, $DGVSMCGroup, $GBSystemManagementContainerGroup, $GBSystemManagementContainerGroupSearch)) $FormSMCSearch.Add_Shown({$FormSMCSearch.Activate()}) [void]$FormSMCSearch.ShowDialog() $ButtonSMCOK.Enabled = $false if (($DGVSMCGroup.Rows | Measure-Object).Count -ge 1) { $TextBoxSMCGroupSearch.ResetText() $TextBoxSMCGroupResult.ResetText() $DGVSMCGroup.Rows.Clear() $DGVSMCGroup.Refresh() } } function Create-NoSMSOnDrive { $FilePathNoSMS = (Join-Path -Path $ComboBoxOtherNoSMS.SelectedItem -ChildPath "NO_SMS_ON_DRIVE.SMS") if (-not(Test-Path -Path $FilePathNoSMS -ErrorAction SilentlyContinue)) { try { New-Item -Path $FilePathNoSMS -ItemType File -ErrorAction Stop -Force Write-OutputBox -OutputBoxMessage "Successfully created a NO_SMS_ON_DRIVE.SMS file on target drive" -Type "INFO: " -Object Other } catch [System.Exception] { Write-OutputBox -OutputBoxMessage "Unable to create NO_SMS_ON_DRIVE.SMS file on target drive, this operatin requires elevation" -Type "WARNING: " -Object Other } } else { Write-OutputBox -OutputBoxMessage "A NO_SMS_ON_DRIVE.SMS file already exists on target drive" -Type "INFO: " -Object Other } } function Validate-ADGroupSearch { $DGVSMCGroup.Rows.Clear() $DGVSMCGroup.Refresh() } function Search-ADGroup { if ($DGVSMCGroup.Rows.Count -ge 1) { Validate-ADGroupSearch } if ($TextBoxSMCGroupSearch.Text.Length -ge 1) { $ADGroupFilter = "(&(ObjectCategory=group)(samAccountName=*$($TextBoxSMCGroupSearch.Text)*))" $ADGroupSearch = New-Object System.DirectoryServices.DirectorySearcher($ADGroupFilter) $ADGroupSearch.FindAll() | ForEach-Object { $DGVSMCGroup.Rows.Add(([string]$_.Properties.Item("samAccountName"))) | Out-Null } } else { Write-OutputBox -OutputBoxMessage "Please enter an Active Directory group to search for in the text box" -Type "ERROR: " -Object Other } } function Read-FolderBrowserDialog { param( [parameter(Mandatory=$true)] [string]$Message ) $ShellApplication = New-Object -ComObject Shell.Application $FolderBrowserDialog = $ShellApplication.BrowseForFolder(0,"$($Message)",0,17) if ($FolderBrowserDialog) { return $FolderBrowserDialog.Self.Path } else { return "" } } function Clear-OutputBox { $OutputBox.ResetText() } function Get-WebDownloadFile { param( [Parameter(Mandatory=$true)] [String]$URL, [Parameter(Mandatory=$true)] [string]$DownloadFolder, [Parameter(Mandatory=$true)] [string]$FileName, [Parameter(Mandatory=$true)] [ValidateSet("SiteRoles","Other")] [string]$Module ) Process { if ($Module -eq "SiteRoles") { $ProgressBarSiteRoles.Maximum = 100 $ProgressBarSiteRoles.Value = 0 } if ($Module -eq "Other") { $ProgressBarOther.Maximum = 100 $ProgressBarOther.Value = 0 } $WebClient = New-Object System.Net.WebClient if (-not(Test-Path -Path $DownloadFolder)) { Write-OutputBox -OutputBoxMessage "Creating download folder: $($DownloadFolder)" -Type "INFO: " -Object $Module [System.Windows.Forms.Application]::DoEvents() New-Item $DownloadFolder -ItemType Directory | Out-Null } $Global:DownloadComplete = $False $EventDataComplete = Register-ObjectEvent $WebClient DownloadFileCompleted -SourceIdentifier WebClient.DownloadFileComplete -Action {$Global:DownloadComplete = $True} $EventDataProgress = Register-ObjectEvent $WebClient DownloadProgressChanged -SourceIdentifier WebClient.DownloadProgressChanged -Action { $Global:DPCEventArgs = $EventArgs } $WebClient.DownloadFileAsync($URL, "$($DownloadFolder)\$($FileName)") Write-OutputBox -OutputBoxMessage "Downloading ($($FileName) to $($DownloadFolder)" -Type "INFO: " -Object $Module do { $PercentComplete = $Global:DPCEventArgs.ProgressPercentage $DownloadedBytes = $Global:DPCEventArgs.BytesReceived $TotalBytes = $Global:DPCEventArgs.TotalBytesToReceive if ($Module -eq "SiteRoles") { $ProgressBarSiteRoles.Value = $PercentComplete } if ($Module -eq "Other") { $ProgressBarOther.Value = $PercentComplete } [System.Windows.Forms.Application]::DoEvents() } until ($Global:DownloadComplete) $WebClient.Dispose() Unregister-Event -SourceIdentifier WebClient.DownloadProgressChanged Unregister-Event -SourceIdentifier WebClient.DownloadFileComplete } } function Get-PrereqFiles { param( [parameter(Mandatory=$true)] [ValidateSet("CAS","Primary")] [string]$Module ) do { $GetDownloadDestination = Read-FolderBrowserDialog -Message "Browse for a folder where the prerequisite files will be downloaded to." $DownloadDestination = '"' + $GetDownloadDestination + '"' } until (Test-Path -Path $GetDownloadDestination) Write-OutputBox -OutputBoxMessage "Prerequisite files will be downloaded to: $($GetDownloadDestination)" -Type "INFO: " -Object $Module do { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse to the '<ConfigMgr source files>\SMSSETUP\BIN\X64' folder." } until (Test-Path -Path "$($SetupDLLocation)\setupdl.exe") Write-OutputBox -OutputBoxMessage "Downloading prerequisite files from Microsoft" -Type "INFO: " -Object $Module do { Start-Process -FilePath "$($SetupDLLocation)\setupdl.exe" -ArgumentList $DownloadDestination -Wait } until ((Get-ChildItem -Path $GetDownloadDestination | Measure-Object).Count -ge 59) Write-OutputBox -OutputBoxMessage "Successfully downloaded all prerequisite files" -Type "INFO: " -Object $Module } function Add-SiteServerLocalAdministrators { param( [parameter(Mandatory=$true)] [string]$ComputerName ) $ErrorActionPreference = "Stop" try { $AdministratorsGroup = [ADSI](”WinNT://$($env:COMPUTERNAME)/Administrators”) $AdministratorsGroupMembers = $AdministratorsGroup.PSBase.Invoke(“Members”) foreach ($Member in $AdministratorsGroupMembers) { [array]$AdministratorsGroupMemberList += $Member.GetType().InvokeMember(“Name”, ‘GetProperty’, $null, $Member, $null) } if (($ComputerName + "`$") -in $AdministratorsGroupMemberList) { Write-OutputBox -OutputBoxMessage "Site Server '$($ComputerName)' is already a member of the local Administrators group" -Type "INFO: " -Object SiteRoles } else { $Domain = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() | Select-Object -ExpandProperty Name $Group = [ADSI]("WinNT://$($env:COMPUTERNAME)/Administrators") $Computer = [ADSI]("WinNT://$($Domain)/$($ComputerName)$") $Group.PSBase.Invoke("Add", $Computer.PSBase.Path) Write-OutputBox -OutputBoxMessage "Added Site Server '$($ComputerName)' to the local Administrators group" -Type "INFO: " -Object SiteRoles } } catch [System.Exception] { Write-OutputBox -OutputBoxMessage "An error occured when attempting to add '$($ComputerName)' to the local Administrators group" -Type "ERROR: " -Object SiteRoles } } function Write-OutputBox { param( [parameter(Mandatory=$true)] [string]$OutputBoxMessage, [ValidateSet("WARNING: ","ERROR: ","INFO: ")] [string]$Type, [parameter(Mandatory=$true)] [ValidateSet("General","CAS","Primary","Secondary","SiteRoles","Other")] [string]$Object ) Process { if ($Object -like "General") { if ($OutputBoxGeneral.Text.Length -eq 0) { $OutputBoxGeneral.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxGeneral.ScrollToCaret() } else { $OutputBoxGeneral.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxGeneral.ScrollToCaret() } } if ($Object -like "CAS") { if ($OutputBoxCAS.Text.Length -eq 0) { $OutputBoxCAS.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxCAS.ScrollToCaret() } else { $OutputBoxCAS.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxCAS.ScrollToCaret() } } if ($Object -like "Primary") { if ($OutputBoxPrimary.Text.Length -eq 0) { $OutputBoxPrimary.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxPrimary.ScrollToCaret() } else { $OutputBoxPrimary.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxPrimary.ScrollToCaret() } } if ($Object -like "Secondary") { if ($OutputBoxSecondary.Text.Length -eq 0) { $OutputBoxSecondary.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxSecondary.ScrollToCaret() } else { $OutputBoxSecondary.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxSecondary.ScrollToCaret() } } if ($Object -like "SiteRoles") { if ($OutputBoxSiteRoles.Text.Length -eq 0) { $OutputBoxSiteRoles.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxSiteRoles.ScrollToCaret() } else { $OutputBoxSiteRoles.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxSiteRoles.ScrollToCaret() } } if ($Object -like "Other") { if ($OutputBoxOther.Text.Length -eq 0) { $OutputBoxOther.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBoxOther.ScrollToCaret() } else { $OutputBoxOther.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBoxOther.ScrollToCaret() } } } } function Enter-WaterMark { param( [parameter(Mandatory=$true)] $InputObject, [parameter(Mandatory=$true)] $Text ) if ($InputObject.Text -eq $Text) { $InputObject.Text = "" $InputObject.ForeColor = "WindowText" } } function Leave-WaterMark { param( [parameter(Mandatory=$true)] $InputObject, [parameter(Mandatory=$true)] $Text ) if ($InputObject.Text -eq "") { $InputObject.Text = $Text $InputObject.ForeColor = "LightGray" } } function Leave-WaterMarkStart { param( [parameter(Mandatory=$true)] $InputObject, [parameter(Mandatory=$true)] $Text ) if ($InputObject.Text.Length -gt 0) { $InputObject.Text = $Text $InputObject.ForeColor = "LightGray" } } Add-Type -AssemblyName "System.Drawing" Add-Type -AssemblyName "System.Windows.Forms" Add-Type -AssemblyName "System.DirectoryServices" $Global:SMCSharedData = 0 $Form = New-Object System.Windows.Forms.Form $Form.Size = New-Object System.Drawing.Size(805,530) $Form.MinimumSize = New-Object System.Drawing.Size(805,530) $Form.MaximumSize = New-Object System.Drawing.Size(805,530) $Form.SizeGripStyle = "Hide" $Form.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe") $Form.Text = "ConfigMgr Prerequisites Tool 1.4.1" $FormSMCSearch = New-Object System.Windows.Forms.Form $FormSMCSearch.Size = New-Object System.Drawing.Size(505,480) $FormSMCSearch.MinimumSize = New-Object System.Drawing.Size(505,480) $FormSMCSearch.MaximumSize = New-Object System.Drawing.Size(505,480) $FormSMCSearch.SizeGripStyle = "Hide" $FormSMCSearch.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe") $FormSMCSearch.Text = "Search for an Active Directory group" $ValidatedBase64String = "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" $ValidatedImageBytes = [Convert]::FromBase64String($ValidatedBase64String) $ValidatedMemoryStream = New-Object -TypeName IO.MemoryStream($ValidatedImageBytes, 0, $ValidatedImageBytes.Length) $ValidatedMemoryStream.Write($ValidatedImageBytes, 0, $ValidatedImageBytes.Length) $ValidatedImage = [System.Drawing.Image]::FromStream($ValidatedMemoryStream, $true) $NonValidatedBase64String = "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" $NonValidatedImageBytes = [Convert]::FromBase64String($NonValidatedBase64String) $NonValidatedMemoryStream = New-Object -TypeName IO.MemoryStream($NonValidatedImageBytes, 0, $NonValidatedImageBytes.Length) $NonValidatedMemoryStream.Write($NonValidatedImageBytes, 0, $NonValidatedImageBytes.Length) $NonValidatedImage = [System.Drawing.Image]::FromStream($NonValidatedMemoryStream, $true) $PBReboot = New-Object -TypeName System.Windows.Forms.PictureBox $PBReboot.Location = New-Object -TypeName System.Drawing.Size(203,50) $PBReboot.Size = New-Object -TypeName System.Drawing.Size(16,16) $PBOS = New-Object -TypeName System.Windows.Forms.PictureBox $PBOS.Location = New-Object -TypeName System.Drawing.Size(203,90) $PBOS.Size = New-Object -TypeName System.Drawing.Size(16,16) $PBPS = New-Object -TypeName System.Windows.Forms.PictureBox $PBPS.Location = New-Object -TypeName System.Drawing.Size(203,130) $PBPS.Size = New-Object -TypeName System.Drawing.Size(16,16) $PBElevated = New-Object -TypeName System.Windows.Forms.PictureBox $PBElevated.Location = New-Object -TypeName System.Drawing.Size(203,170) $PBElevated.Size = New-Object -TypeName System.Drawing.Size(16,16) $LBVersions = New-Object -TypeName System.Windows.Forms.ListBox $LBVersions.Location = New-Object -TypeName System.Drawing.Size(30,275) $LBVersions.Size = New-Object -TypeName System.Drawing.Size(200,80) $LBVersions.SelectionMode = "None" $LBVersions.Items.AddRange(@("ConfigMgr 2012","ConfigMgr 2012 R2","ConfigMgr vNext")) $TabPageGeneral = New-Object System.Windows.Forms.TabPage $TabPageGeneral.Location = New-Object System.Drawing.Size(10,50) $TabPageGeneral.Size = New-Object System.Drawing.Size(300,300) $TabPageGeneral.Text = "General" $TabPageGeneral.Name = "General" $TabPageGeneral.Padding = "0,0,0,0" $TabPageGeneral.BackColor = "Control" $TabPageCAS = New-Object System.Windows.Forms.TabPage $TabPageCAS.Location = New-Object System.Drawing.Size(10,50) $TabPageCAS.Size = New-Object System.Drawing.Size(300,300) $TabPageCAS.Text = "Central Administration Site" $TabPageCAS.Name = "Central Administration Site" $TabPageCAS.Padding = "0,0,0,0" $TabPageCAS.BackColor = "Control" $TabPagePrimary = New-Object System.Windows.Forms.TabPage $TabPagePrimary.Location = New-Object System.Drawing.Size(10,50) $TabPagePrimary.Size = New-Object System.Drawing.Size(300,300) $TabPagePrimary.Text = "Primary Site" $TabPagePrimary.Name = "Primary Site" $TabPagePrimary.Padding = "0,0,0,0" $TabPagePrimary.BackColor = "Control" $TabPageSecondary = New-Object System.Windows.Forms.TabPage $TabPageSecondary.Location = New-Object System.Drawing.Size(10,50) $TabPageSecondary.Size = New-Object System.Drawing.Size(300,300) $TabPageSecondary.Text = "Secondary Site" $TabPageSecondary.Name = "Secondary Site" $TabPageSecondary.Padding = "0,0,0,0" $TabPageSecondary.BackColor = "Control" $TabPageSiteRoles = New-Object System.Windows.Forms.TabPage $TabPageSiteRoles.Location = New-Object System.Drawing.Size(10,50) $TabPageSiteRoles.Size = New-Object System.Drawing.Size(300,300) $TabPageSiteRoles.Text = "Site System Roles" $TabPageSiteRoles.Name = "Site System Roles" $TabPageSiteRoles.Padding = "0,0,0,0" $TabPageSiteRoles.BackColor = "Control" $TabPageOther = New-Object System.Windows.Forms.TabPage $TabPageOther.Location = New-Object System.Drawing.Size(10,50) $TabPageOther.Size = New-Object System.Drawing.Size(300,300) $TabPageOther.Text = "Other" $TabPageOther.Name = "Other" $TabPageOther.Padding = "0,0,0,0" $TabPageOther.BackColor = "Control" $TabPageSMCComputer = New-Object System.Windows.Forms.TabPage $TabPageSMCComputer.Location = New-Object System.Drawing.Size(10,50) $TabPageSMCComputer.Size = New-Object System.Drawing.Size(300,300) $TabPageSMCComputer.Text = "Computer" $TabPageSMCComputer.Name = "Computer" $TabPageSMCComputer.Padding = "0,0,0,0" $TabPageSMCComputer.BackColor = "Control" $TabPageSMCGroup = New-Object System.Windows.Forms.TabPage $TabPageSMCGroup.Location = New-Object System.Drawing.Size(0,0) $TabPageSMCGroup.Size = New-Object System.Drawing.Size(300,300) $TabPageSMCGroup.Text = "Group " $TabPageSMCGroup.Name = "Group" $TabPageSMCGroup.Padding = "0,0,0,0" $TabPageSMCGroup.BackColor = "Control" $TabPageSMCGroup.Margin = New-Object System.Windows.Forms.Padding('0') $TabControl = New-Object System.Windows.Forms.TabControl $TabControl.Location = New-Object System.Drawing.Size(0,0) $TabControl.Size = New-Object System.Drawing.Size(805,530) $TabControl.Anchor = "Top, Bottom, Left, Right" $TabControl.Name = "Global" $TabControl.SelectedIndex = 0 $TabControl.Add_Selected([System.Windows.Forms.TabControlEventHandler]{ if ($TabControl.SelectedTab.Name -like "Central Administration Site") { Load-CAS if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxCAS.Text.Length -ge 1)) { $OutputBoxCAS.ResetText() Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Central Administration Site. Additionally you can choose to also download the prerequisite files" -Type "INFO: " -Object CAS } } } if ($TabControl.SelectedTab.Name -like "Primary Site") { Load-Primary if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxPrimary.Text.Length -ge 1)) { $OutputBoxPrimary.ResetText() Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Primary Site. Additionally you can choose to also download the prerequisite files" -Type "INFO: " -Object Primary } } } if ($TabControl.SelectedTab.Name -like "Secondary Site") { Load-Secondary if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxSecondary.Text.Length -ge 1)) { $OutputBoxSecondary.ResetText() Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Secondary Site" -Type "INFO: " -Object Secondary } } } if ($TabControl.SelectedTab.Name -like "Site System Roles") { Load-SiteSystemRoles if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxSiteRoles.Text.Length -ge 1)) { $OutputBoxSiteRoles.ResetText() Write-OutputBox -OutputBoxMessage "Make a selection from the options on the left to begin" -Type "INFO: " -Object SiteRoles } } } if ($TabControl.SelectedTab.Name -like "Other") { Load-Other if ($TabControl.SelectedTab.Enabled -eq $true) { if (-not($OutputBoxOther.Text.Length -ge 1)) { $OutputBoxOther.ResetText() Write-OutputBox -OutputBoxMessage "Make a selection from the options on the left to begin" -Type "INFO: " -Object Other } } } }) $TabControlSMC = New-Object System.Windows.Forms.TabControl $TabControlSMC.Location = New-Object System.Drawing.Size(0,0) $TabControlSMC.Size = New-Object System.Drawing.Size(800,500) $TabControlSMC.Anchor = "Top, Bottom, Left, Right" $TabControlSMC.Name = "TabControl" $TabControlSMC.SelectedIndex = 0 $TabControlSMC.Add_Selected([System.Windows.Forms.TabControlEventHandler]{ if ($TabControlSMC.SelectedTab.Name -like "Group") { $OutputBox.ResetText() if ($OutputBox.Location.Y -eq 10) { $OutputBox.Location = New-Object System.Drawing.Size(380,65) $OutputBox.Size = New-Object System.Drawing.Size(393,296) } $TabPageSMCGroup.Controls.Add($OutputBox) } }) $TabControlSMC.Add_Selected([System.Windows.Forms.TabControlEventHandler]{ if ($TabControlSMC.SelectedTab.Name -like "Computer") { $OutputBox.ResetText() if ($OutputBox.ControlAdded) { $TabPageSMCGroup.Controls.Remove($OutputBox) } $OutputBox.Location = New-Object System.Drawing.Size(10,10) $OutputBox.Size = New-Object System.Drawing.Size(763,350) $TabPageSMCComputer.Controls.Add($OutputBox) } }) $ProgressBarCAS = New-Object System.Windows.Forms.ProgressBar $ProgressBarCAS.Location = New-Object System.Drawing.Size(10,375) $ProgressBarCAS.Size = New-Object System.Drawing.Size(763,30) $ProgressBarCAS.Step = 1 $ProgressBarCAS.Value = 0 $ProgressBarPrimary = New-Object System.Windows.Forms.ProgressBar $ProgressBarPrimary.Location = New-Object System.Drawing.Size(10,375) $ProgressBarPrimary.Size = New-Object System.Drawing.Size(763,30) $ProgressBarPrimary.Step = 1 $ProgressBarPrimary.Value = 0 $ProgressBarSecondary = New-Object System.Windows.Forms.ProgressBar $ProgressBarSecondary.Location = New-Object System.Drawing.Size(10,375) $ProgressBarSecondary.Size = New-Object System.Drawing.Size(763,30) $ProgressBarSecondary.Step = 1 $ProgressBarSecondary.Value = 0 $ProgressBarSiteRoles = New-Object System.Windows.Forms.ProgressBar $ProgressBarSiteRoles.Location = New-Object System.Drawing.Size(10,375) $ProgressBarSiteRoles.Size = New-Object System.Drawing.Size(763,30) $ProgressBarSiteRoles.Step = 1 $ProgressBarSiteRoles.Value = 0 $ProgressBarOther = New-Object System.Windows.Forms.ProgressBar $ProgressBarOther.Location = New-Object System.Drawing.Size(10,375) $ProgressBarOther.Size = New-Object System.Drawing.Size(763,30) $ProgressBarOther.Step = 1 $ProgressBarOther.Value = 0 $OutputBoxGeneral = New-Object System.Windows.Forms.RichTextBox $OutputBoxGeneral.Location = New-Object System.Drawing.Size(260,60) $OutputBoxGeneral.Size = New-Object System.Drawing.Size(500,365) $OutputBoxGeneral.Font = "Courier New" $OutputBoxGeneral.BackColor = "white" $OutputBoxGeneral.ReadOnly = $true $OutputBoxGeneral.MultiLine = $True $OutputBoxCAS = New-Object System.Windows.Forms.RichTextBox $OutputBoxCAS.Location = New-Object System.Drawing.Size(10,10) $OutputBoxCAS.Size = New-Object System.Drawing.Size(763,350) $OutputBoxCAS.Font = "Courier New" $OutputBoxCAS.BackColor = "white" $OutputBoxCAS.ReadOnly = $true $OutputBoxCAS.MultiLine = $True $OutputBoxPrimary = New-Object System.Windows.Forms.RichTextBox $OutputBoxPrimary.Location = New-Object System.Drawing.Size(10,10) $OutputBoxPrimary.Size = New-Object System.Drawing.Size(763,350) $OutputBoxPrimary.Font = "Courier New" $OutputBoxPrimary.BackColor = "white" $OutputBoxPrimary.ReadOnly = $true $OutputBoxPrimary.MultiLine = $True $OutputBoxSecondary = New-Object System.Windows.Forms.RichTextBox $OutputBoxSecondary.Location = New-Object System.Drawing.Size(10,10) $OutputBoxSecondary.Size = New-Object System.Drawing.Size(763,350) $OutputBoxSecondary.Font = "Courier New" $OutputBoxSecondary.BackColor = "white" $OutputBoxSecondary.ReadOnly = $true $OutputBoxSecondary.MultiLine = $True $OutputBoxSiteRoles = New-Object System.Windows.Forms.RichTextBox $OutputBoxSiteRoles.Location = New-Object System.Drawing.Size(210,10) $OutputBoxSiteRoles.Size = New-Object System.Drawing.Size(563,350) $OutputBoxSiteRoles.Font = "Courier New" $OutputBoxSiteRoles.BackColor = "white" $OutputBoxSiteRoles.ReadOnly = $true $OutputBoxSiteRoles.MultiLine = $True $OutputBoxOther = New-Object System.Windows.Forms.RichTextBox $OutputBoxOther.Location = New-Object System.Drawing.Size(220,10) $OutputBoxOther.Size = New-Object System.Drawing.Size(553,350) $OutputBoxOther.Font = "Courier New" $OutputBoxOther.BackColor = "white" $OutputBoxOther.ReadOnly = $true $OutputBoxOther.MultiLine = $True $DGVSMCGroup = New-Object System.Windows.Forms.DataGridView $DGVSMCGroup.Location = New-Object System.Drawing.Size(10,65) $DGVSMCGroup.Size = New-Object System.Drawing.Size(360,295) $DGVSMCGroup.ColumnCount = 1 $DGVSMCGroup.ColumnHeadersVisible = $true $DGVSMCGroup.Columns[0].Name = "Active Directory group" $DGVSMCGroup.AllowUserToAddRows = $false $DGVSMCGroup.AllowUserToDeleteRows = $false $DGVSMCGroup.ReadOnly = $True $DGVSMCGroup.ColumnHeadersHeightSizeMode = "DisableResizing" $DGVSMCGroup.AutoSizeColumnsMode = "Fill" $DGVSMCGroup.RowHeadersWidthSizeMode = "DisableResizing" $DGVSMCGroup.RowHeadersVisible = $false $DGVSMCGroup.Add_CellContentClick({ $DGVSMCResult = $DGVSMCGroup.CurrentCell.Value $TextBoxSMCGroupResult.Text = $DGVSMCResult $ButtonSMCOK.Enabled = $true }) $TextBoxDC = New-Object System.Windows.Forms.TextBox $TextBoxDC.Location = New-Object System.Drawing.Size(20,428) $TextBoxDC.Size = New-Object System.Drawing.Size(170,20) $TextBoxDC.TabIndex = "0" $TextBoxDC.Name = "EAD" $TextBoxSMCLocal = New-Object System.Windows.Forms.TextBox $TextBoxSMCLocal.Location = New-Object System.Drawing.Size(38,393) $TextBoxSMCLocal.Size = New-Object System.Drawing.Size(140,20) $TextBoxSMCLocal.TabIndex = "0" $TextBoxSMCLocal.Text = $env:COMPUTERNAME $TextBoxSMCLocal.Enabled = $false $TextBoxSMCRemote = New-Object System.Windows.Forms.TextBox $TextBoxSMCRemote.Location = New-Object System.Drawing.Size(218,393) $TextBoxSMCRemote.Size = New-Object System.Drawing.Size(140,20) $TextBoxSMCRemote.TabIndex = "0" $TextBoxSMCRemote.Enabled = $false $TextBoxSMCGroupSearch = New-Object System.Windows.Forms.TextBox $TextBoxSMCGroupSearch.Location = New-Object System.Drawing.Size(20,27) $TextBoxSMCGroupSearch.Size = New-Object System.Drawing.Size(340,20) $TextBoxSMCGroupSearch.TabIndex = "0" $TextBoxSMCGroupSearch.Add_KeyPress([System.Windows.Forms.KeyPressEventHandler]{ if ($_.KeyChar -eq 13) { Write-OutputBox -OutputBoxMessage "Searching Active Directory for '$($TextBoxSMCGroupSearch.Text)'" -Type "INFO: " -Object Other Search-ADGroup } }) $TextBoxSMCGroupResult = New-Object System.Windows.Forms.TextBox $TextBoxSMCGroupResult.Location = New-Object System.Drawing.Size(20,392) $TextBoxSMCGroupResult.Size = New-Object System.Drawing.Size(340,20) $TextBoxSMCGroupResult.Enabled = $false $TextBoxWSUSSQLServer = New-Object System.Windows.Forms.TextBox $TextBoxWSUSSQLServer.Location = New-Object System.Drawing.Size(160,428) $TextBoxWSUSSQLServer.Size = New-Object System.Drawing.Size(140,20) $TextBoxWSUSSQLServer.TabIndex = "0" $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLServer.Name = "WSUS" $TextBoxWSUSSQLInstance = New-Object System.Windows.Forms.TextBox $TextBoxWSUSSQLInstance.Location = New-Object System.Drawing.Size(310,428) $TextBoxWSUSSQLInstance.Size = New-Object System.Drawing.Size(140,20) $TextBoxWSUSSQLInstance.TabIndex = "0" $TextBoxWSUSSQLInstance.Text = $env:COMPUTERNAME $TextBoxWSUSSQLInstance.Enabled = $false $TextBoxWSUSSQLInstance.Name = "WSUS" $TextBoxSiteSystemRolesMP = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesMP.Location = New-Object System.Drawing.Size(17,428) $TextBoxSiteSystemRolesMP.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesMP.TabIndex = "0" $TextBoxSiteSystemRolesMP.Name = "MP" $TextBoxSiteSystemRolesDP = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesDP.Location = New-Object System.Drawing.Size(17,428) $TextBoxSiteSystemRolesDP.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesDP.TabIndex = "0" $TextBoxSiteSystemRolesDP.Name = "DP" $TextBoxSiteSystemRolesAppCat = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesAppCat.Location = New-Object System.Drawing.Size(17,428) $TextBoxSiteSystemRolesAppCat.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesAppCat.TabIndex = "0" $TextBoxSiteSystemRolesAppCat.Name = "AppCat" $TextBoxSiteSystemRolesEP = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesEP.Location = New-Object System.Drawing.Size(197,428) $TextBoxSiteSystemRolesEP.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesEP.TabIndex = "0" $TextBoxSiteSystemRolesEP.Name = "EP" $TextBoxSiteSystemRolesSMP = New-Object System.Windows.Forms.TextBox $TextBoxSiteSystemRolesSMP.Location = New-Object System.Drawing.Size(17,428) $TextBoxSiteSystemRolesSMP.Size = New-Object System.Drawing.Size(195,20) $TextBoxSiteSystemRolesSMP.TabIndex = "0" $TextBoxSiteSystemRolesSMP.Name = "SMP" $ButtonInstallCAS = New-Object System.Windows.Forms.Button $ButtonInstallCAS.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallCAS.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallCAS.Text = "Install" $ButtonInstallCAS.TabIndex = "1" $ButtonInstallCAS.Add_Click({Install-CAS}) $ButtonInstallPrimarySite = New-Object System.Windows.Forms.Button $ButtonInstallPrimarySite.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallPrimarySite.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallPrimarySite.Text = "Install" $ButtonInstallPrimarySite.TabIndex = "1" $ButtonInstallPrimarySite.Add_Click({Install-Primary}) $ButtonInstallSecondarySite = New-Object System.Windows.Forms.Button $ButtonInstallSecondarySite.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallSecondarySite.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallSecondarySite.Text = "Install" $ButtonInstallSecondarySite.TabIndex = "1" $ButtonInstallSecondarySite.Add_Click({Install-Secondary}) $ButtonInstallSiteRoles = New-Object System.Windows.Forms.Button $ButtonInstallSiteRoles.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallSiteRoles.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallSiteRoles.Text = "Install" $ButtonInstallSiteRoles.TabIndex = "1" $ButtonInstallSiteRoles.Add_Click({ if ($RadioButtonSiteRoleMP.Checked -eq $true) { if ($TextBoxSiteSystemRolesMP.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesMP.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesMP.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesMP.Text Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Management Point role" -Type "INFO: " -Object SiteRoles Install-MP } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesMP.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Management Point role" -Type "INFO: " -Object SiteRoles Install-MP } } elseif ($RadioButtonSiteRoleDP.Checked -eq $true) { if ($TextBoxSiteSystemRolesDP.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesDP.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesDP.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesDP.Text Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Distribution Point role" -Type "INFO: " -Object SiteRoles Install-DP } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesDP.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Distribution Point role" -Type "INFO: " -Object SiteRoles Install-DP } } elseif ($RadioButtonSiteRoleAppCat.Checked -eq $true) { if ($TextBoxSiteSystemRolesAppCat.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesAppCat.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesAppCat.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesAppCat.Text Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Application Catalog role" -Type "INFO: " -Object SiteRoles Install-AppCat } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesAppCat.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a Application Catalog role" -Type "INFO: " -Object SiteRoles Install-AppCat } } elseif ($RadioButtonSiteRoleEP.Checked -eq $true) { if ($TextBoxSiteSystemRolesEP.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesEP.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesEP.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesEP.Text if (($ComboBoxSiteRolesEP.Text -eq "Enrollment Point") -or ($ComboBoxSiteRolesEP.Text -eq "Enrollment Proxy Point")) { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a $($ComboBoxSiteRolesEP.Text) role" -Type "INFO: " -Object SiteRoles Install-EP } else { Write-OutputBox -OutputBoxMessage "Please select an Enrollment Point role" -Type "INFO: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesEP.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { if (($ComboBoxSiteRolesEP.Text -eq "Enrollment Point") -or ($ComboBoxSiteRolesEP.Text -eq "Enrollment Proxy Point")) { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a $($ComboBoxSiteRolesEP.Text) role" -Type "INFO: " -Object SiteRoles Install-EP } else { Write-OutputBox -OutputBoxMessage "Please select an Enrollment Point role" -Type "INFO: " -Object SiteRoles } } } elseif ($RadioButtonSiteRoleSMP.Checked -eq $true) { if ($TextBoxSiteSystemRolesSMP.Text.Length -ge 1) { if ($TextBoxSiteSystemRolesSMP.Text.Length -gt 2) { Write-OutputBox -OutputBoxMessage "Site Server '$($TextBoxSiteSystemRolesSMP.Text)' was specified to be added to local Administrators group" -Type "INFO: " -Object SiteRoles Add-SiteServerLocalAdministrators -ComputerName $TextBoxSiteSystemRolesSMP.Text Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a State Migration Point role" -Type "INFO: " -Object SiteRoles Install-SMP } else { Write-OutputBox -OutputBoxMessage "Specified Site Server name '$($TextBoxSiteSystemRolesDP.Text)' does not meet the minimum requirements of 3 valid characters" -Type "WARNING: " -Object SiteRoles } } else { Write-OutputBox -OutputBoxMessage "Begin installing prerequisites for a State Migration Point role" -Type "INFO: " -Object SiteRoles Install-SMP } } else { Write-OutputBox -OutputBoxMessage "Please select a Site System role to install" -Type "INFO: " -Object SiteRoles } }) $ButtonInstallOther = New-Object System.Windows.Forms.Button $ButtonInstallOther.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallOther.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallOther.Text = "Install" $ButtonInstallOther.TabIndex = "1" $ButtonInstallOther.Add_Click({ if (($RadioButtonOtherEAD.Checked -eq $true) -or ($RadioButtonOtherWSUS.Checked -eq $true) -or ($RadioButtonOtherADK.Checked -eq $true) -or ($RadioButtonOtherSMC.Checked -eq $true)) { if ($RadioButtonOtherEAD.Checked -eq $true) { Write-OutputBox -OutputBoxMessage "Begin validation checks for extending Active Directory" -Type "INFO: " -Object Other Extend-ActiveDirectorySchema } if ($RadioButtonOtherWSUS.Checked -eq $true) { if (($ComboBoxOtherWSUS.Text -eq "SQL") -or ($ComboBoxOtherWSUS.Text -eq "WID")) { Write-OutputBox -OutputBoxMessage "Preparing to install WSUS features configured for $($ComboBoxOtherWSUS.Text)" -Type "INFO: " -Object Other Install-WSUS } else { Write-OutputBox -OutputBoxMessage "Please select where to install the WSUS database" -Type "INFO: " -Object Other } } if ($RadioButtonOtherADK.Checked -eq $true) { if (($ComboBoxOtherADK.Text -eq "Online") -or ($ComboBoxOtherADK.Text -eq "Offline")) { Write-OutputBox -OutputBoxMessage "Preparing for an $(($ComboBoxOtherADK.Text).ToLower()) installation of Windows ADK" -Type "INFO: " -Object Other Install-ADK } else { Write-OutputBox -OutputBoxMessage "Please select an installation option" -Type "INFO: " -Object Other } } if ($RadioButtonOtherSMC.Checked -eq $true) { Search-SMC } } elseif ($RadioButtonOtherNoSMS.Checked -eq $true) { Create-NoSMSOnDrive } else { Write-OutputBox -OutputBoxMessage "Nothing has been selected, please make a selection first" -Type "INFO: " -Object Other } }) $ButtonSystemManagementContainerGroupSearch = New-Object System.Windows.Forms.Button $ButtonSystemManagementContainerGroupSearch.Location = New-Object System.Drawing.Size(380,20) $ButtonSystemManagementContainerGroupSearch.Size = New-Object System.Drawing.Size(100,30) $ButtonSystemManagementContainerGroupSearch.Text = "Search" $ButtonSystemManagementContainerGroupSearch.TabIndex = "1" $ButtonSystemManagementContainerGroupSearch.Add_Click({ Search-ADGroup }) $ButtonSMCOK = New-Object System.Windows.Forms.Button $ButtonSMCOK.Location = New-Object System.Drawing.Size(380,385) $ButtonSMCOK.Size = New-Object System.Drawing.Size(100,30) $ButtonSMCOK.Text = "OK" $ButtonSMCOK.TabIndex = "1" $ButtonSMCOK.Enabled = $false $ButtonSMCOK.Add_Click({ $Global:SMCSharedData = $TextBoxSMCGroupResult.Text Write-OutputBox -OutputBoxMessage "Selected Active Directory group: $($Global:SMCSharedData)" -Type "INFO: " -Object Other $FormSMCSearch.Close() Configure-SystemManagementContainer }) $WaterMarkDC = "Enter Schema Master server name" $TextBoxDC.ForeColor = "LightGray" $TextBoxDC.Text = $WaterMarkDC $TextBoxDC.add_Enter({Enter-WaterMark -InputObject $TextBoxDC -Text $WaterMarkDC}) $TextBoxDC.add_Leave({Leave-WaterMark -InputObject $TextBoxDC -Text $WaterMarkDC}) $WaterMarkWSUSSQLServer = "Enter SQL Server name" $TextBoxWSUSSQLServer.ForeColor = "LightGray" $TextBoxWSUSSQLServer.Text = $WaterMarkWSUSSQLServer $TextBoxWSUSSQLServer.add_Enter({Enter-WaterMark -InputObject $TextBoxWSUSSQLServer -Text $WaterMarkWSUSSQLServer}) $TextBoxWSUSSQLServer.add_Leave({Leave-WaterMark -InputObject $TextBoxWSUSSQLServer -Text $WaterMarkWSUSSQLServer}) $TextBoxWSUSSQLServer.Name = "WSUS" $WaterMarkWSUSSQLInstance = "Enter SQL Server instance" $TextBoxWSUSSQLInstance.ForeColor = "LightGray" $TextBoxWSUSSQLInstance.Text = $WaterMarkWSUSSQLInstance $TextBoxWSUSSQLInstance.add_Enter({Enter-WaterMark -InputObject $TextBoxWSUSSQLInstance -Text $WaterMarkWSUSSQLInstance}) $TextBoxWSUSSQLInstance.add_Leave({Leave-WaterMark -InputObject $TextBoxWSUSSQLInstance -Text $WaterMarkWSUSSQLInstance}) $TextBoxWSUSSQLInstance.Name = "WSUS" $LabelHeader = New-Object System.Windows.Forms.Label $LabelHeader.Location = New-Object System.Drawing.Size(257,23) $LabelHeader.Size = New-Object System.Drawing.Size(500,30) $LabelHeader.Text = "Install ConfigMgr Prerequisites" $LabelHeader.Font = New-Object System.Drawing.Font("Verdana",12,[System.Drawing.FontStyle]::Bold) $LabelGeneralRestart = New-Object System.Windows.Forms.Label $LabelGeneralRestart.Size = New-Object System.Drawing.Size(150,15) $LabelGeneralRestart.Location = New-Object System.Drawing.Size(38,52) $LabelGeneralRestart.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Bold) $LabelGeneralRestart.Text = "Reboot required" $LabelGeneralOS = New-Object System.Windows.Forms.Label $LabelGeneralOS.Size = New-Object System.Drawing.Size(160,15) $LabelGeneralOS.Location = New-Object System.Drawing.Size(38,92) $LabelGeneralOS.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Bold) $LabelGeneralOS.Text = "Supported platform" $LabelGeneralPS = New-Object System.Windows.Forms.Label $LabelGeneralPS.Size = New-Object System.Drawing.Size(160,15) $LabelGeneralPS.Location = New-Object System.Drawing.Size(38,132) $LabelGeneralPS.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Bold) $LabelGeneralPS.Text = "PowerShell version" $LabelGeneralElevated = New-Object System.Windows.Forms.Label $LabelGeneralElevated.Size = New-Object System.Drawing.Size(160,15) $LabelGeneralElevated.Location = New-Object System.Drawing.Size(38,172) $LabelGeneralElevated.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Bold) $LabelGeneralElevated.Text = "Elevated launch" $LabelSMCCreate = New-Object System.Windows.Forms.Label $LabelSMCCreate.Location = New-Object System.Drawing.Size(418,395) $LabelSMCCreate.Size = New-Object System.Drawing.Size(150,20) $LabelSMCCreate.Text = "Create the container" $OpenLink = {[System.Diagnostics.Process]::Start("http://www.scconfigmgr.com")} $BlogLink = New-Object System.Windows.Forms.LinkLabel $BlogLink.Location = New-Object System.Drawing.Size(20,440) $BlogLink.Size = New-Object System.Drawing.Size(150,25) $BlogLink.Text = "www.scconfigmgr.com" $BlogLink.Add_Click($OpenLink) $RadioButtonSiteRoleMP = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleMP.Location = New-Object System.Drawing.Size(25,35) $RadioButtonSiteRoleMP.Size = New-Object System.Drawing.Size(120,25) $RadioButtonSiteRoleMP.Text = "Management Point" $RadioButtonSiteRoleMP.Name = "Option Management Point" $RadioButtonSiteRoleMP.Checked = $false $RadioButtonSiteRoleMP.Add_Click({ if ($RadioButtonSiteRoleMP.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $OutputBoxSiteRoles.ResetText() $ProgressBarSiteRoles.Value = 0 Write-OutputBox -OutputBoxMessage "Management Point selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Management Point site system role" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module DP Interactive-SiteRolesControlVisibility -Mode Disable -Module AppCat Interactive-SiteRolesControlVisibility -Mode Disable -Module EP Interactive-SiteRolesControlVisibility -Mode Disable -Module SMP $TabPageSiteRoles.Controls.AddRange(@($TextBoxSiteSystemRolesMP, $GBSiteSystemRolesMP)) Interactive-SiteRolesControlVisibility -Mode Enable -Module MP }) $RadioButtonSiteRoleDP = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleDP.Location = New-Object System.Drawing.Size(25,65) $RadioButtonSiteRoleDP.Size = New-Object System.Drawing.Size(120,25) $RadioButtonSiteRoleDP.Text = "Distribution Point" $RadioButtonSiteRoleDP.Name = "Option Distribution Point" $RadioButtonSiteRoleDP.Checked = $false $RadioButtonSiteRoleDP.Add_Click({ if ($RadioButtonSiteRoleDP.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $OutputBoxSiteRoles.ResetText() $ProgressBarSiteRoles.Value = 0 Write-OutputBox -OutputBoxMessage "Distribution Point selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for a Distribution Point site system role" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module MP Interactive-SiteRolesControlVisibility -Mode Disable -Module AppCat Interactive-SiteRolesControlVisibility -Mode Disable -Module EP Interactive-SiteRolesControlVisibility -Mode Disable -Module SMP $TabPageSiteRoles.Controls.AddRange(@($TextBoxSiteSystemRolesDP, $GBSiteSystemRolesDP)) Interactive-SiteRolesControlVisibility -Mode Enable -Module DP }) $RadioButtonSiteRoleAppCat = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleAppCat.Location = New-Object System.Drawing.Size(25,95) $RadioButtonSiteRoleAppCat.Size = New-Object System.Drawing.Size(120,25) $RadioButtonSiteRoleAppCat.Text = "Application Catalog" $RadioButtonSiteRoleAppCat.Name = "Option Application Catalog" $RadioButtonSiteRoleAppCat.Checked = $false $RadioButtonSiteRoleAppCat.Add_Click({ if ($RadioButtonSiteRoleAppCat.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $OutputBoxSiteRoles.ResetText() $ProgressBarSiteRoles.Value = 0 Write-OutputBox -OutputBoxMessage "Application Catalog selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for the Application Catalog site system roles" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module MP Interactive-SiteRolesControlVisibility -Mode Disable -Module DP Interactive-SiteRolesControlVisibility -Mode Disable -Module EP Interactive-SiteRolesControlVisibility -Mode Disable -Module SMP $TabPageSiteRoles.Controls.AddRange(@($TextBoxSiteSystemRolesAppCat, $GBSiteSystemRolesAppCat)) Interactive-SiteRolesControlVisibility -Mode Enable -Module AppCat }) $RadioButtonSiteRoleEP = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleEP.Location = New-Object System.Drawing.Size(25,125) $RadioButtonSiteRoleEP.Size = New-Object System.Drawing.Size(120,25) $RadioButtonSiteRoleEP.Text = "Enrollment Point" $RadioButtonSiteRoleEP.Name = "Option Enrollment Point" $RadioButtonSiteRoleEP.Checked = $false $RadioButtonSiteRoleEP.Add_Click({ if ($RadioButtonSiteRoleEP.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $ProgressBarSiteRoles.Value = 0 $ComboBoxSiteRolesEP.SelectedIndex = -1 Write-OutputBox -OutputBoxMessage "Enrollment Point selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Select to install required Windows Features for either an Enrollment Point or an Enrollment Proxy Point site system role" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module MP Interactive-SiteRolesControlVisibility -Mode Disable -Module DP Interactive-SiteRolesControlVisibility -Mode Disable -Module AppCat Interactive-SiteRolesControlVisibility -Mode Disable -Module SMP $TabPageSiteRoles.Controls.AddRange(@($ComboBoxSiteRolesEP, $TextBoxSiteSystemRolesEP, $GBEP, $GBSiteSystemRolesEP)) Interactive-SiteRolesControlVisibility -Mode Enable -Module EP }) $RadioButtonSiteRoleSMP = New-Object System.Windows.Forms.RadioButton $RadioButtonSiteRoleSMP.Location = New-Object System.Drawing.Size(25,155) $RadioButtonSiteRoleSMP.Size = New-Object System.Drawing.Size(170,25) $RadioButtonSiteRoleSMP.Text = "State Migration Point" $RadioButtonSiteRoleSMP.Name = "Option State Migration Point" $RadioButtonSiteRoleSMP.Checked = $false $RadioButtonSiteRoleSMP.Add_Click({ if ($RadioButtonSiteRoleSMP.Checked -eq $true) { $OutputBoxSiteRoles.ResetText() } $ProgressBarSiteRoles.Value = 0 Write-OutputBox -OutputBoxMessage "State Migration Point selections loaded" -Type "INFO: " -Object SiteRoles Write-OutputBox -OutputBoxMessage "Click on the Install button to install the required Windows Features for the State Migration Point site system role" -Type "INFO: " -Object SiteRoles Interactive-SiteRolesControlVisibility -Mode Disable -Module MP Interactive-SiteRolesControlVisibility -Mode Disable -Module DP Interactive-SiteRolesControlVisibility -Mode Disable -Module AppCat Interactive-SiteRolesControlVisibility -Mode Disable -Module EP $TabPageSiteRoles.Controls.AddRange(@($TextBoxSiteSystemRolesSMP, $GBSiteSystemRolesSMP)) Interactive-SiteRolesControlVisibility -Mode Enable -Module SMP }) $RadioButtonOtherEAD = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherEAD.Location = New-Object System.Drawing.Size(25,35) $RadioButtonOtherEAD.Size = New-Object System.Drawing.Size(170,25) $RadioButtonOtherEAD.Text = "Extend Active Directory" $RadioButtonOtherEAD.Name = "Option Extend Active Directory" $RadioButtonOtherEAD.Checked = $false $RadioButtonOtherEAD.Add_MouseClick({ if ($RadioButtonOtherEAD.Checked -eq $true) { $OutputBoxOther.ResetText() } $ProgressBarOther.Value = 0 $ButtonInstallOther.Text = "Extend" if ($TextBoxDC.Enabled -eq $false) { $TextBoxDC.Enabled = $true } Write-OutputBox -OutputBoxMessage "Extend Active Directory selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Enter the server name of the Schema Master server in the textbox below" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module WSUS Interactive-OtherControlVisibility -Mode Disable -Module ADK Interactive-OtherControlVisibility -Mode Disable -Module SMC Interactive-OtherControlVisibility -Mode Disable -Module NoSMS $TabPageOther.Controls.AddRange(@($TextBoxDC, $GBExtendAD)) Interactive-OtherControlVisibility -Mode Enable -Module EAD }) $RadioButtonOtherWSUS = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherWSUS.Location = New-Object System.Drawing.Size(25,65) $RadioButtonOtherWSUS.Size = New-Object System.Drawing.Size(170,25) $RadioButtonOtherWSUS.Text = "Install WSUS" $RadioButtonOtherWSUS.Name = "Option Install WSUS" $RadioButtonOtherWSUS.Checked = $false $RadioButtonOtherWSUS.Add_Click({ if ($RadioButtonOtherWSUS.Checked -eq $true) { $OutputBoxOther.ResetText() } $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLInstance.Enabled = $false $ProgressBarOther.Value = 0 if (-not($ButtonInstallOther.Text -eq "Install")) { $ButtonInstallOther.Text = "Install" } $ComboBoxOtherWSUS.SelectedIndex = -1 Write-OutputBox -OutputBoxMessage "Install WSUS selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Select whether the WSUS database should be created on a SQL Server or by creating a local Windows Internal Database (WID)" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module EAD Interactive-OtherControlVisibility -Mode Disable -Module ADK Interactive-OtherControlVisibility -Mode Disable -Module SMC Interactive-OtherControlVisibility -Mode Disable -Module NoSMS $TabPageOther.Controls.AddRange(@($ComboBoxOtherWSUS, $TextBoxWSUSSQLServer, $TextBoxWSUSSQLInstance, $GBWSUS, $GBWSUSSQL)) Interactive-OtherControlVisibility -Mode Enable -Module WSUS }) $RadioButtonOtherADK = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherADK.Location = New-Object System.Drawing.Size(25,95) $RadioButtonOtherADK.Size = New-Object System.Drawing.Size(170,25) $RadioButtonOtherADK.Text = "Install Windows ADK" $RadioButtonOtherADK.Name = "Option Install Windows ADK" $RadioButtonOtherADK.Checked = $false $RadioButtonOtherADK.Add_Click({ if ($RadioButtonOtherADK.Checked -eq $true) { $OutputBoxOther.ResetText() } $ProgressBarOther.Value = 0 if (-not($ButtonInstallOther.Text -eq "Install")) { $ButtonInstallOther.Text = "Install" } Write-OutputBox -OutputBoxMessage "Install Windows ADK selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Select whether to install Windows ADK by downloading the setup bootstrapper from the internet (Online), or by pointing to a folder where the complete redistributed Windows ADK setup files have been downloaded locally (Offline)" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module EAD Interactive-OtherControlVisibility -Mode Disable -Module WSUS Interactive-OtherControlVisibility -Mode Disable -Module SMC Interactive-OtherControlVisibility -Mode Disable -Module NoSMS $TabPageOther.Controls.AddRange(@($ComboBoxOtherADK, $ComboBoxOtherADKVersion, $GBADK, $GBADKVersion)) Interactive-OtherControlVisibility -Mode Enable -Module ADK }) $RadioButtonOtherSMC = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherSMC.Location = New-Object System.Drawing.Size(25,125) $RadioButtonOtherSMC.Size = New-Object System.Drawing.Size(181,25) $RadioButtonOtherSMC.Text = "System Management Container" $RadioButtonOtherSMC.Name = "Option System Management Container" $RadioButtonOtherSMC.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Regular) $RadioButtonOtherSMC.Checked = $false $RadioButtonOtherSMC.Add_Click({ if ($RadioButtonOtherSMC.Checked -eq $true) { $OutputBoxOther.ResetText() } $ProgressBarOther.Value = 0 if (-not($ButtonInstallOther.Text -eq "Search")) { $ButtonInstallOther.Text = "Search" } Write-OutputBox -OutputBoxMessage "System Management Container selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Click on the Search button to find an Active Directory group that contains all Site servers that will be given Full Control permissions on the System Management container. If you havn't yet created such a group containing all the Site server, please do so before you continue" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module EAD Interactive-OtherControlVisibility -Mode Disable -Module ADK Interactive-OtherControlVisibility -Mode Disable -Module WSUS Interactive-OtherControlVisibility -Mode Disable -Module NoSMS $TabPageOther.Controls.Add($CBSMCCreate) Interactive-OtherControlVisibility -Mode Enable -Module SMC }) $RadioButtonOtherNoSMS = New-Object System.Windows.Forms.RadioButton $RadioButtonOtherNoSMS.Location = New-Object System.Drawing.Size(25,155) $RadioButtonOtherNoSMS.Size = New-Object System.Drawing.Size(181,25) $RadioButtonOtherNoSMS.Text = "No SMS on drive" $RadioButtonOtherNoSMS.Name = "Option No SMS on drive" $RadioButtonOtherNoSMS.Font = New-Object System.Drawing.Font("Microsoft Sans Serif","8.25",[System.Drawing.FontStyle]::Regular) $RadioButtonOtherNoSMS.Checked = $false $RadioButtonOtherNoSMS.Add_Click({ if ($RadioButtonOtherNoSMS.Checked -eq $true) { $OutputBoxOther.ResetText() } $ProgressBarOther.Value = 0 if (-not($ButtonInstallOther.Text -eq "Create")) { $ButtonInstallOther.Text = "Create" } Write-OutputBox -OutputBoxMessage "No SMS on drive selections loaded" -Type "INFO: " -Object Other Write-OutputBox -OutputBoxMessage "Click on the Create button to create a NO_SMS_ON_DRIVE.SMS file that will instruct ConfigMgr not to use the drive for content, binaries etc" -Type "INFO: " -Object Other Interactive-OtherControlVisibility -Mode Disable -Module EAD Interactive-OtherControlVisibility -Mode Disable -Module ADK Interactive-OtherControlVisibility -Mode Disable -Module WSUS Interactive-OtherControlVisibility -Mode Disable -Module SMC $TabPageOther.Controls.AddRange(@($ComboBoxOtherNoSMS, $GBNoSMS)) $FixedDriveDeviceIDs = Get-WmiObject -Class Win32_LogicalDisk -ComputerName $env:COMPUTERNAME -Filter "DriveType = '3'" | Select-Object -ExpandProperty DeviceID | Sort-Object $ComboBoxOtherNoSMS.Items.AddRange(@($FixedDriveDeviceIDs)) Interactive-OtherControlVisibility -Mode Enable -Module NoSMS }) $RadioButtonOnline = New-Object System.Windows.Forms.RadioButton $RadioButtonOnline.Location = New-Object System.Drawing.Size(20,417) $RadioButtonOnline.Size = New-Object System.Drawing.Size(60,24) $RadioButtonOnline.Text = "Online" $RadioButtonOffline = New-Object System.Windows.Forms.RadioButton $RadioButtonOffline.Location = New-Object System.Drawing.Size(90,417) $RadioButtonOffline.Size = New-Object System.Drawing.Size(60,24) $RadioButtonOffline.Text = "Offline" $RadioButtonSMCLocal = New-Object System.Windows.Forms.RadioButton $RadioButtonSMCLocal.Location = New-Object System.Drawing.Size(20,392) $RadioButtonSMCLocal.Size = New-Object System.Drawing.Size(15,24) $RadioButtonSMCLocal.Add_Click({$TextBoxSMCRemote.Enabled = $false}) $RadioButtonSMCRemote = New-Object System.Windows.Forms.RadioButton $RadioButtonSMCRemote.Location = New-Object System.Drawing.Size(200,392) $RadioButtonSMCRemote.Size = New-Object System.Drawing.Size(15,24) $RadioButtonSMCRemote.Add_Click({$TextBoxSMCRemote.Enabled = $true}) $RadioButtonWID = New-Object System.Windows.Forms.RadioButton $RadioButtonWID.Location = New-Object System.Drawing.Size(20,417) $RadioButtonWID.Size = New-Object System.Drawing.Size(60,24) $RadioButtonWID.Text = "WID" $RadioButtonWID.Checked = $true $RadioButtonWID.Add_Click({ $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLInstance.Enabled = $false $OutputBox.Clear() }) $RadioButtonSQL = New-Object System.Windows.Forms.RadioButton $RadioButtonSQL.Location = New-Object System.Drawing.Size(90,427) $RadioButtonSQL.Size = New-Object System.Drawing.Size(45,24) $RadioButtonSQL.Text = "SQL" $RadioButtonSQL.Add_Click({ $TextBoxWSUSSQLServer.Enabled = $true $TextBoxWSUSSQLInstance.Enabled = $true Write-OutputBox -OutputBoxMessage "Specify the SQL Server computer name and instance name in the fields below" -Type "INFO: " Write-OutputBox -OutputBoxMessage "Leave the instance field empty if you're using the default instance on the SQL Server" -Type "INFO: " }) $CBValidationOverride = New-Object System.Windows.Forms.CheckBox $CBValidationOverride.Location = New-Object System.Drawing.Size(30,205) $CBValidationOverride.Size = New-Object System.Drawing.Size(180,20) $CBValidationOverride.Text = "Override validation results" $CBValidationOverride.Name = "ValidationOverride" $CBValidationOverride.Add_CheckedChanged({ switch ($CBValidationOverride.Checked) { $true { Interactive-TabPages -Mode Enable } $false { Interactive-TabPages -Mode Disable } } }) $CBSMCCreate = New-Object System.Windows.Forms.CheckBox $CBSMCCreate.Location = New-Object System.Drawing.Size(10,425) $CBSMCCreate.Size = New-Object System.Drawing.Size(250,20) $CBSMCCreate.Text = "Create the System Management container" $CBSMCCreate.Name = "SMC" $CBCASDownloadPrereqs = New-Object System.Windows.Forms.CheckBox $CBCASDownloadPrereqs.Location = New-Object System.Drawing.Size(10,425) $CBCASDownloadPrereqs.Size = New-Object System.Drawing.Size(190,20) $CBCASDownloadPrereqs.Text = "Download prerequisite files" $CBPrimaryDownloadPrereqs = New-Object System.Windows.Forms.CheckBox $CBPrimaryDownloadPrereqs.Location = New-Object System.Drawing.Size(10,425) $CBPrimaryDownloadPrereqs.Size = New-Object System.Drawing.Size(190,20) $CBPrimaryDownloadPrereqs.Text = "Download prerequisite files" $GBGeneralValidation = New-Object System.Windows.Forms.GroupBox $GBGeneralValidation.Location = New-Object System.Drawing.Size(20,20) $GBGeneralValidation.Size = New-Object System.Drawing.Size(220,210) $GBGeneralValidation.Text = "Validation checks" $GBGeneralVersion = New-Object System.Windows.Forms.GroupBox $GBGeneralVersion.Location = New-Object System.Drawing.Size(20,250) $GBGeneralVersion.Size = New-Object System.Drawing.Size(220,110) $GBGeneralVersion.Text = "Supported ConfigMgr versions" $GBGeneralReboot = New-Object System.Windows.Forms.GroupBox $GBGeneralReboot.Location = New-Object System.Drawing.Size(30,35) $GBGeneralReboot.Size = New-Object System.Drawing.Size(200,40) $GBGeneralOS = New-Object System.Windows.Forms.GroupBox $GBGeneralOS.Location = New-Object System.Drawing.Size(30,75) $GBGeneralOS.Size = New-Object System.Drawing.Size(200,40) $GBGeneralPS = New-Object System.Windows.Forms.GroupBox $GBGeneralPS.Location = New-Object System.Drawing.Size(30,115) $GBGeneralPS.Size = New-Object System.Drawing.Size(200,40) $GBGeneralElevated = New-Object System.Windows.Forms.GroupBox $GBGeneralElevated.Location = New-Object System.Drawing.Size(30,155) $GBGeneralElevated.Size = New-Object System.Drawing.Size(200,40) $GBSiteSystemRoles = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRoles.Location = New-Object System.Drawing.Size(10,10) $GBSiteSystemRoles.Size = New-Object System.Drawing.Size(190,350) $GBSiteSystemRoles.Text = "Select a Site System Role" $GBSiteSystemRoles.Name = "Option Site System Roles" $GBSiteSystemRolesMP = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesMP.Location = New-Object System.Drawing.Size(10,410) $GBSiteSystemRolesMP.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesMP.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesMP.Name = "MP" $GBSiteSystemRolesDP = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesDP.Location = New-Object System.Drawing.Size(10,410) $GBSiteSystemRolesDP.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesDP.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesDP.Name = "DP" $GBSiteSystemRolesAppCat = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesAppCat.Location = New-Object System.Drawing.Size(10,410) $GBSiteSystemRolesAppCat.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesAppCat.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesAppCat.Name = "AppCat" $GBSiteSystemRolesEP = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesEP.Location = New-Object System.Drawing.Size(190,410) $GBSiteSystemRolesEP.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesEP.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesEP.Name = "EP" $GBSiteSystemRolesSMP = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRolesSMP.Location = New-Object System.Drawing.Size(10,410) $GBSiteSystemRolesSMP.Size = New-Object System.Drawing.Size(220,45) $GBSiteSystemRolesSMP.Text = "Add Site Server to Administrators group" $GBSiteSystemRolesSMP.Name = "SMP" $GBOther = New-Object System.Windows.Forms.GroupBox $GBOther.Location = New-Object System.Drawing.Size(10,10) $GBOther.Size = New-Object System.Drawing.Size(200,350) $GBOther.Text = "Make a selection" $GBOther.Name = "Option Make a selection" $GBADK = New-Object System.Windows.Forms.GroupBox $GBADK.Location = New-Object System.Drawing.Size(10,410) $GBADK.Size = New-Object System.Drawing.Size(150,45) $GBADK.Text = "Installation methods" $GBADK.Name = "ADK" $GBADKVersion = New-Object System.Windows.Forms.GroupBox $GBADKVersion.Location = New-Object System.Drawing.Size(170,410) $GBADKVersion.Size = New-Object System.Drawing.Size(150,45) $GBADKVersion.Text = "Version" $GBADKVersion.Name = "ADK" $GBWSUS = New-Object System.Windows.Forms.GroupBox $GBWSUS.Location = New-Object System.Drawing.Size(10,410) $GBWSUS.Size = New-Object System.Drawing.Size(130,45) $GBWSUS.Text = "Database options" $GBWSUS.Name = "WSUS" $GBWSUSSQL = New-Object System.Windows.Forms.GroupBox $GBWSUSSQL.Location = New-Object System.Drawing.Size(150,410) $GBWSUSSQL.Size = New-Object System.Drawing.Size(310,45) $GBWSUSSQL.Text = "SQL Server details" $GBWSUSSQL.Name = "WSUS" $GBExtendAD = New-Object System.Windows.Forms.GroupBox $GBExtendAD.Location = New-Object System.Drawing.Size(10,410) $GBExtendAD.Size = New-Object System.Drawing.Size(190,45) $GBExtendAD.Text = "Schema Master server name" $GBExtendAD.Name = "EAD" $GBSystemManagementContainer = New-Object System.Windows.Forms.GroupBox $GBSystemManagementContainer.Location = New-Object System.Drawing.Size(10,375) $GBSystemManagementContainer.Size = New-Object System.Drawing.Size(360,45) $GBSystemManagementContainer.Text = "Add computer account to the System Management container" $GBSystemManagementContainerGroup = New-Object System.Windows.Forms.GroupBox $GBSystemManagementContainerGroup.Location = New-Object System.Drawing.Size(10,375) $GBSystemManagementContainerGroup.Size = New-Object System.Drawing.Size(360,45) $GBSystemManagementContainerGroup.Text = "Selected Active Directory group" $GBSystemManagementContainerGroupSearch = New-Object System.Windows.Forms.GroupBox $GBSystemManagementContainerGroupSearch.Location = New-Object System.Drawing.Size(10,10) $GBSystemManagementContainerGroupSearch.Size = New-Object System.Drawing.Size(360,45) $GBSystemManagementContainerGroupSearch.Text = "Search for an Active Directory group" $GBNoSMS = New-Object System.Windows.Forms.GroupBox $GBNoSMS.Location = New-Object System.Drawing.Size(10,410) $GBNoSMS.Size = New-Object System.Drawing.Size(150,45) $GBNoSMS.Text = "Select drive" $GBNoSMS.Name = "NoSMS" $GBEP = New-Object System.Windows.Forms.GroupBox $GBEP.Location = New-Object System.Drawing.Size(10,410) $GBEP.Size = New-Object System.Drawing.Size(170,45) $GBEP.Text = "Select a site system role" $GBEP.Name = "EP" $ComboBoxSiteRolesEP = New-Object System.Windows.Forms.ComboBox $ComboBoxSiteRolesEP.Location = New-Object System.Drawing.Size(20,427) $ComboBoxSiteRolesEP.Size = New-Object System.Drawing.Size(150,20) $ComboBoxSiteRolesEP.DropDownStyle = "DropDownList" $ComboBoxSiteRolesEP.Items.AddRange(@("Enrollment Point","Enrollment Proxy Point")) $ComboBoxSiteRolesEP.Name = "EP" $ComboBoxOtherWSUS = New-Object System.Windows.Forms.ComboBox $ComboBoxOtherWSUS.Location = New-Object System.Drawing.Size(20,427) $ComboBoxOtherWSUS.Size = New-Object System.Drawing.Size(110,20) $ComboBoxOtherWSUS.DropDownStyle = "DropDownList" $ComboBoxOtherWSUS.Items.AddRange(@("SQL","WID")) $ComboBoxOtherWSUS.Name = "WSUS" $ComboBoxOtherWSUS.Add_SelectedValueChanged({ if ($ComboBoxOtherWSUS.SelectedItem -eq "SQL") { $TextBoxWSUSSQLServer.Enabled = $true $TextBoxWSUSSQLInstance.Enabled = $true } if ($ComboBoxOtherWSUS.SelectedItem -eq "WID") { $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLInstance.Enabled = $false } }) $ComboBoxOtherADK = New-Object System.Windows.Forms.ComboBox $ComboBoxOtherADK.Location = New-Object System.Drawing.Size(20,427) $ComboBoxOtherADK.Size = New-Object System.Drawing.Size(130,20) $ComboBoxOtherADK.DropDownStyle = "DropDownList" $ComboBoxOtherADK.Items.AddRange(@("Online","Offline")) $ComboBoxOtherADK.SelectedIndex = "0" $ComboBoxOtherADK.Name = "ADK" $ComboBoxOtherADKVersion = New-Object System.Windows.Forms.ComboBox $ComboBoxOtherADKVersion.Location = New-Object System.Drawing.Size(180,427) $ComboBoxOtherADKVersion.Size = New-Object System.Drawing.Size(130,20) $ComboBoxOtherADKVersion.DropDownStyle = "DropDownList" $ComboBoxOtherADKVersion.Items.AddRange(@("Windows ADK 10","Windows ADK 8.1")) $ComboBoxOtherADKVersion.SelectedIndex = "0" $ComboBoxOtherADKVersion.Name = "ADK" $ComboBoxOtherNoSMS = New-Object System.Windows.Forms.ComboBox $ComboBoxOtherNoSMS.Location = New-Object System.Drawing.Size(20,427) $ComboBoxOtherNoSMS.Size = New-Object System.Drawing.Size(130,20) $ComboBoxOtherNoSMS.DropDownStyle = "DropDownList" $ComboBoxOtherNoSMS.Name = "NoSMS" Load-Form
0
sample_35_25.ps1
# # Module manifest for module 'OCI.PSModules.Dataflow' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dataflow.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '60441277-1663-4d77-af11-39ab99c7ac41' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dataflow Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataflow.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDataflowApplication', 'Get-OCIDataflowApplicationsList', 'Get-OCIDataflowPool', 'Get-OCIDataflowPoolsList', 'Get-OCIDataflowPrivateEndpoint', 'Get-OCIDataflowPrivateEndpointsList', 'Get-OCIDataflowRun', 'Get-OCIDataflowRunLog', 'Get-OCIDataflowRunLogsList', 'Get-OCIDataflowRunsList', 'Get-OCIDataflowSqlEndpoint', 'Get-OCIDataflowSqlEndpointsList', 'Get-OCIDataflowStatement', 'Get-OCIDataflowStatementsList', 'Get-OCIDataflowWorkRequest', 'Get-OCIDataflowWorkRequestErrorsList', 'Get-OCIDataflowWorkRequestLogsList', 'Get-OCIDataflowWorkRequestsList', 'Move-OCIDataflowApplicationCompartment', 'Move-OCIDataflowPoolCompartment', 'Move-OCIDataflowPrivateEndpointCompartment', 'Move-OCIDataflowRunCompartment', 'Move-OCIDataflowSqlEndpointCompartment', 'New-OCIDataflowApplication', 'New-OCIDataflowPool', 'New-OCIDataflowPrivateEndpoint', 'New-OCIDataflowRun', 'New-OCIDataflowSqlEndpoint', 'New-OCIDataflowStatement', 'Remove-OCIDataflowApplication', 'Remove-OCIDataflowPool', 'Remove-OCIDataflowPrivateEndpoint', 'Remove-OCIDataflowRun', 'Remove-OCIDataflowSqlEndpoint', 'Remove-OCIDataflowStatement', 'Start-OCIDataflowPool', 'Stop-OCIDataflowPool', 'Update-OCIDataflowApplication', 'Update-OCIDataflowPool', 'Update-OCIDataflowPrivateEndpoint', 'Update-OCIDataflowRun', 'Update-OCIDataflowSqlEndpoint' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataflow' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
670.ps1
Describe "Write-RsCatalogItem" { Context "Write-RsCatalogItem with min parameters"{ $folderName = 'SutWriteRsCatalogItem_MinParameters' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $localPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources' It "Should upload a local report in Report Server" { $localReportPath = $localPath + '\emptyReport.rdl' Write-RsCatalogItem -Path $localReportPath -RsFolder $folderPath -Description 'newDescription' $uploadedReport = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $uploadedReport.Name | Should Be 'emptyReport' $uploadedReport.Description | Should Be 'newDescription' } It "Should upload a local RsDataSource in Report Server" { $localDataSourcePath = $localPath + '\SutWriteRsFolderContent_DataSource.rsds' Write-RsCatalogItem -Path $localDataSourcePath -RsFolder $folderPath $uploadedDataSource = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSource' $uploadedDataSource.Name | Should Be 'SutWriteRsFolderContent_DataSource' } It "Should upload a local DataSet in Report Server" { $localDataSetPath = $localPath + '\UnDataset.rsd' Write-RsCatalogItem -Path $localDataSetPath -RsFolder $folderPath $uploadedDataSet = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSet' $uploadedDataSet.Name | Should Be 'UnDataset' } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Write-RsCatalogItem with hidden parameters"{ $folderName = 'SutWriteRsCatalogItem_Hidden' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName -Hidden $folderPath = '/' + $folderName $localPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources' It "Should upload a local report in Report Server" { $localReportPath = $localPath + '\emptyReport.rdl' Write-RsCatalogItem -Path $localReportPath -RsFolder $folderPath -Description 'newDescription' -Hidden $uploadedReport = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $uploadedReport.Name | Should Be 'emptyReport' $uploadedReport.Description | Should Be 'newDescription' } It "Should upload a local RsDataSource in Report Server" { $localDataSourcePath = $localPath + '\SutWriteRsFolderContent_DataSource.rsds' Write-RsCatalogItem -Path $localDataSourcePath -RsFolder $folderPath -Hidden $uploadedDataSource = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSource' $uploadedDataSource.Name | Should Be 'SutWriteRsFolderContent_DataSource' } It "Should upload a local DataSet in Report Server" { $localDataSetPath = $localPath + '\UnDataset.rsd' Write-RsCatalogItem -Path $localDataSetPath -RsFolder $folderPath -Hidden $uploadedDataSet = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSet' $uploadedDataSet.Name | Should Be 'UnDataset' } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Write-RsCatalogItem with name parameter"{ $folderName = 'SutWriteRsCatalogItem_Name' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName -Hidden $folderPath = '/' + $folderName $localPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources' It "Should upload a local report in Report Server" { $localReportPath = $localPath + '\emptyReport.rdl' Write-RsCatalogItem -Path $localReportPath -RsFolder $folderPath -Description 'newDescription' -Name 'Test Report' $uploadedReport = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $uploadedReport.Name | Should Be 'Test Report' $uploadedReport.Description | Should Be 'newDescription' } It "Should upload a local RsDataSource in Report Server" { $localDataSourcePath = $localPath + '\SutWriteRsFolderContent_DataSource.rsds' Write-RsCatalogItem -Path $localDataSourcePath -RsFolder $folderPath -Name 'Test DataSource' $uploadedDataSource = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSource' $uploadedDataSource.Name | Should Be 'Test DataSource' } It "Should upload a local DataSet in Report Server" { $localDataSetPath = $localPath + '\UnDataset.rsd' Write-RsCatalogItem -Path $localDataSetPath -RsFolder $folderPath -Name 'Test DataSet' $uploadedDataSet = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'DataSet' $uploadedDataSet.Name | Should Be 'Test DataSet' } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Write-RsCatalogItem with Proxy parameter"{ $folderName = 'SutWriteRsCatalogItem_ProxyParameter' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $proxy = New-RsWebServiceProxy $localReportPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\emptyReport.rdl' Write-RsCatalogItem -Path $localReportPath -RsFolder $folderPath -Proxy $proxy -Description 'newDescription' It "Should upload a local Report in ReportServer with Proxy Parameter" { $uploadedReport = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $uploadedReport.Name | Should Be 'emptyReport' $uploadedReport.Description | Should Be 'newDescription' } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Write-RsCatalogItem with Proxy and ReportServerUri parameter"{ $folderName = 'SutWriteRsCatalogItem_ReporServerUrioProxyParameters' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $proxy = New-RsWebServiceProxy $reportServerUri = 'http://localhost/reportserver' $localReportPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\emptyReport.rdl' Write-RsCatalogItem -Path $localReportPath -RsFolder $folderPath -Proxy $proxy -ReportServerUri $reportServerUri -Description 'newDescription' It "Should upload a local Report in ReportServer with Proxy and ReportServerUri Parameter" { $uploadedReport = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $uploadedReport.Name | Should Be 'emptyReport' $uploadedReport.Description | Should Be 'newDescription' } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Write-RsCatalogItem with ReportServerUri parameter"{ $folderName = 'SutWriteRsCatalogItem_ReportServerUriParameter' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $reportServerUri = 'http://localhost/reportserver' $localReportPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\emptyReport.rdl' Write-RsCatalogItem -Path $localReportPath -RsFolder $folderPath -ReportServerUri $reportServerUri -Description 'newDescription' It "Should upload a local Report in ReportServer with ReportServerUri Parameter" { $uploadedReport = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $uploadedReport.Name | Should Be 'emptyReport' $uploadedReport.Description | Should Be 'newDescription' } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Write-RsCatalogItem with Overwrite parameter"{ $folderName = 'SutWriteCatalogItem_OverwriteParameter' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $localReportPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\emptyReport.rdl' Write-RsCatalogItem -Path $localReportPath -RsFolder $folderPath -Description 'newDescription' $localDataSourcePath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\SutWriteRsFolderContent_DataSource.rsds' It "Should upload a local Report in ReportServer with Overwrite Parameter" { { Write-RsCatalogItem -Path $localReportPath -RsFolder $folderPath } | Should Throw { Write-RsCatalogItem -Path $localReportPath -RsFolder $folderPath -Overwrite -Description 'overwrittenDescription' } | Should Not Throw $overwrittenReport = (Get-RsFolderContent -RsFolder $folderPath ) | Where-Object TypeName -eq 'Report' $overwrittenReport.Name | Should Be 'emptyReport' $overwrittenReport.Description | Should Be 'overwrittenDescription' } Remove-RsCatalogItem -RsFolder $folderPath -Confirm:$false } Context "Write-RsCatalogItem with images"{ $jpgFolderName = 'SutWriteCatalogItem_JPGimages' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $jpgFolderName $jpgFolderPath = '/' + $jpgFolderName $localJPGImagePath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\imagesResources\PowerShellHero.jpg' Write-RsCatalogItem -Path $localJPGImagePath -RsFolder $jpgFolderPath It "Should upload a local jpg image in ReportServer" { $jpgImageResource = (Get-RsFolderContent -RsFolder $jpgFolderPath ) | Where-Object TypeName -eq 'Resource' $jpgImageResource.Name | Should Be 'PowerShellHero.jpg' $jpgImageResource.ItemMetadata.Name | Should Be 'MIMEType' $jpgImageResource.ItemMetadata.Value | Should Be 'image/jpeg' } $pngFolderName = 'SutWriteCatalogItem_PNGimages' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $pngFolderName $pngFolderPath = '/' + $pngFolderName $localPNGImagePath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\imagesResources\SSRS.png' Write-RsCatalogItem -Path $localPNGImagePath -RsFolder $pngFolderPath It "Should upload a local png image in ReportServer" { $jpgImageResource = (Get-RsFolderContent -RsFolder $pngFolderPath ) | Where-Object TypeName -eq 'Resource' $jpgImageResource.Name | Should Be 'SSRS.png' $jpgImageResource.ItemMetadata.Name | Should Be 'MIMEType' $jpgImageResource.ItemMetadata.Value | Should Be 'image/png' } Remove-RsCatalogItem -RsFolder $jpgFolderPath -Confirm:$false Remove-RsCatalogItem -RsFolder $pngFolderPath -Confirm:$false } }
0
sample_21_74.ps1
{{ $integrations := (index . "integrations") }} {{ $scratch := newScratch }} {{ range $name, $integration := $integrations }} {{ $scratch.Set "tutorials" 0 }} {{ if isset $integration "tutorials" }} {{ $hosts := slice }} {{ range $elem := index $integration "tutorials" }} {{ $url := urls.Parse $elem }} {{ $hosts = $hosts | append $url.Host }} {{ end }} {{ $scratch.Set "tutorials" (len ($hosts | uniq)) }} {{ end }} {{ $scratch.Set "videos" 0 }} {{ if isset $integration "videos" }} {{ $scratch.Set "videos" (len (index $integration "videos")) }} {{ end }} {{ $scratch.Set "blogs" 0 }} {{ if isset $integration "blogs" }} {{ $hosts := slice }} {{ range $elem := index $integration "blogs" }} {{ $url := urls.Parse $elem }} {{ $hosts = $hosts | append $url.Host }} {{ end }} {{ $scratch.Set "blogs" (len ($hosts | uniq)) }} {{ end }} {{ $scratch.Set "code" 0 }} {{ if isset $integration "code" }} {{ $scratch.Set "code" (len (index $integration "code")) }} {{ end }} {{ $rank := (add ($scratch.Get "tutorials") (add ($scratch.Get "videos") (add ($scratch.Get "blogs") ($scratch.Get "code")))) }} {{ $scratch.Add "integrations-ranked" (slice (dict "name" $name "rank" $rank)) }} {{ end }} {{ $scratch.Set "integrations" (slice) }} {{ range $int := sort ($scratch.Get "integrations-ranked") "rank" "desc" }} {{ $scratch.Add "integrations" $int.name }} {{ end }} {{ return ($scratch.Get "integrations") }}
0
Trim Working Set for PID_1.ps1
## Trim Working set Function TrimWorkingSet { param([int] $procid) <#.NOTES AUTHOR: Sunny Chakraborty(sunnyc7@gmail.com) WEBSITE: http://tekout.wordpress.com CREATED: 9/20/2012 This starts the Evil Monkey series of scripts. .DESCRIPTION MSDN - http://msdn.microsoft.com/en-us/library/windows/desktop/ms686234(v=vs.85).aspx Trim's working set to minimum levels (-1, -1) You can give a max / min values by modifying the signature. .WARNING ***********READ CAREFULLY*********** !!!! Do not use in production environment before thoroughly testing and understanding the script. !!!! Do not use this to Trim Working Set for SQL Databases, there will be data-loss. Do not use this to Trim Working Set database for msExchange store.exe I havent tried this on IIS w3wp.exe processes. More NEGATIVE effects here - http://support.microsoft.com/kb/2001745 I have primarily used this to trim browser WorkingSet data. Tested on firefox / iexplore / chrome. It works with no tab crashing. Trimming Working Set data, doesnt mean that browser Working Set values wont climb to their previous numbers. I have seen some IE windows go back to similar working set numbers. However, this script is really useful for a stuck browser and freezing screeing situations. ***********READ CAREFULLY*********** .EXAMPLE TrimWorkingSet(1920) #> $sig = @" [DllImport("kernel32.dll")] public static extern bool SetProcessWorkingSetSize( IntPtr proc, int min, int max ); "@ $apptotrim = (get-process -Id $procid).Handle Add-Type -MemberDefinition $sig -Namespace User32 -Name Util -UsingNamespace System.Text -PassThru [User32.Util]::SetProcessWorkingSetSize($apptotrim,-1,-1) } TrimWorkingSet(5960)
0
Show-ADObject.ps1
# Author: Steven Murawski http://www.mindofroot.com # This script requires the modified Show-NetMap script (originally from Doug Finke) # Show-NodeXLMap which can be found on http://poshcode.org/733 # and the NodeXL files # These can be found at http://www.codeplex.com/NodeXL/Release/ProjectReleases.aspx?ReleaseId=20494 # # Also required are the Quest AD Cmdlets. #requires -pssnapin Quest.ActiveRoles.ADManagement param ($ADClass, $MapLayout= "circular", [switch]$help, [switch]$ShowADClass, [switch]$Colorize, [switch]$NoTest) function Write-Help() { $ExampleUsage = @' To use this script, you will need the Show-Netmap script from Doug Finke, along with the NodeXL DLLs. Downloadable from http://www.codeplex.com/NodeXL/Release/ProjectReleases.aspx?ReleaseId=20494 Usage: .\\Show-ADObject.ps1 -ADClass [(AD Type Name || Array of AD Type Names}] [-Colorize] .\\Show-ADObject.ps1 -ShowADClasses Example: .\\Show-ADObject -ADClass group, organizationalunit -Colorize '@ Write-Host $ExampleUsage } #Check to see if the required files are present to run the script. function Test-Prerequisites() { $required = @{ShowNetMap = 'Show-NodeXLMap.ps1'; NetMapApp = 'Microsoft.NodeXL.ApplicationUtil.dll'; NetMapControl = 'Microsoft.NodeXL.Control.dll'; NetMapCore = 'Microsoft.NodeXL.Core.dll'; NetMapUtil = 'Microsoft.NodeXL.Util.dll'; NetMapVisual = 'Microsoft.NodeXL.Visualization.dll' } $report = @() foreach ($key in $required.Keys) { $file = $required[$($key)] if (Test-Path $file ) { Write-Debug "Found $file" } else { $report += "Missing $file" } } if ($report.count -eq 0) { Write-Debug "All prerequisites were found." return $true } else { Write-Help Write-Host "Missing files: " $report | ForEach-Object { Write-Host "`tMissing $_" } throw "Please move the needed files into the current directory!" } } #If all the prereq's are in the local directory and the script was not run #with the -help switch, load everything up! if ($NoTest -or (Test-Prerequisites)) { [Reflection.Assembly]::LoadWithPartialName("System.Drawing") | Out-Null #This is just a helper function to find the parent of an object based on the parent's distinguished name function Get-ParentFromDN() { PROCESS { $root = '^DC=(\\w+),DC=(\\w+)$' $pattern = '^(OU|CN)=(\\w+?),.*?DC=\\w+?,DC=\\w+?$' $dn = $_ if ($dn -notmatch $root) { $dn -replace $pattern, '$2' } else { $dn -replace $root, '$1.$2' } } } #This will return an array of all the Object Classes in your Active Directory function Get-ADObjectClassName() { Get-QADObject -SizeLimit 0 | Select-Object -property @{name='Name';Expression={$_.type}} -unique | Sort-Object name } function Get-ColorList() { [System.Drawing.Color] | Get-Member -memberType property -static | foreach {$_.name} } function Get-RandomColor() { param($ListOfColors) $count = $ListOfColors.count-1 $rand = New-Object System.Random $value = $rand.next(0,$count) $ListOfColors[$value] } function Get-ADMapObject() { param($TypesToMap=$(Throw 'One (or more object types as an array) are required to run this function'), [switch]$Color) $script:ColorKey = @{} if ($TypesToMap -is [string]) { if ($color) { $MapColor = Get-RandomColor Get-ColorList $script:ColorKey["$TypesToMap"] = $MapColor Get-QADObject -Type $TypesToMap | select Name, @{name='Parent';Expression={$_.ParentContainerDN | Get-ParentFromDN}}, @{name='Color';Expression={$MapColor}} } else { Get-QADObject -Type $TypesToMap | select Name, @{name='Parent';Expression={$_.ParentContainerDN | Get-ParentFromDN}} } } else { $colorList = Get-ColorList foreach ( $type in $TypesToMap ) { if ($color) { $MapColor = Get-RandomColor $colorList $colorList = $colorList | ? {$_ -ne $MapColor} $script:ColorKey["$type"] = $MapColor Get-QADObject -Type $type | select Name, @{name='Parent';Expression={$_.ParentContainerDN | Get-ParentFromDN}}, @{name='Color';Expression={$MapColor}} } else { Get-QADObject -Type $type | select Name, @{name='Parent';Expression={$_.ParentContainerDN | Get-ParentFromDN}} } } } } #Helper function stolen from Doug Finke and used to create the objects to feed to #Show-Netmap function New-SourceTarget ($s,$t,$c) { New-Object PSObject | Add-Member -pass noteproperty source $s | Add-Member -pass noteproperty target $t | Add-Member -pass noteproperty color $c } if ($help) { Write-Help } else { if ($ShowADClass) { Get-ADObjectClassName } else { #Add the Show-Netmap functions from Doug Finke . .\\Show-NodeXLMap.ps1 if ($Colorize) { $MapObjects = Get-ADMapObject -TypesToMap $ADClass -Color | % { New-SourceTarget $_.Name $_.Parent $_.Color } Write-Host "Color Key: " $ColorKey } else { $MapObjects = Get-ADMapObject -TypesToMap $ADClass | % { New-SourceTarget $_.Name $_.Parent } } $MapObjects | Show-NodeXLMap -layoutType $MapLayout } } }
0
sample_51_24.ps1
# # Module manifest for module 'OCI.PSModules.Recovery' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Recovery.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '953d757b-6410-4a6e-b5dc-2141a7da241e' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Recovery Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Recovery.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIRecoveryProtectedDatabase', 'Get-OCIRecoveryProtectedDatabasesList', 'Get-OCIRecoveryProtectionPoliciesList', 'Get-OCIRecoveryProtectionPolicy', 'Get-OCIRecoveryServiceSubnet', 'Get-OCIRecoveryServiceSubnetsList', 'Get-OCIRecoveryWorkRequest', 'Get-OCIRecoveryWorkRequestErrorsList', 'Get-OCIRecoveryWorkRequestLogsList', 'Get-OCIRecoveryWorkRequestsList', 'Invoke-OCIRecoveryFetchProtectedDatabaseConfiguration', 'Move-OCIRecoveryProtectedDatabaseCompartment', 'Move-OCIRecoveryProtectionPolicyCompartment', 'Move-OCIRecoveryServiceSubnetCompartment', 'New-OCIRecoveryProtectedDatabase', 'New-OCIRecoveryProtectionPolicy', 'New-OCIRecoveryServiceSubnet', 'Remove-OCIRecoveryProtectedDatabase', 'Remove-OCIRecoveryProtectionPolicy', 'Remove-OCIRecoveryServiceSubnet', 'Update-OCIRecoveryProtectedDatabase', 'Update-OCIRecoveryProtectionPolicy', 'Update-OCIRecoveryServiceSubnet' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Recovery' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_28_17.ps1
ConvertFrom-StringData @' EnvironmentErrorAlreadyExists=此名称和类型的环境变量已存在。 EnvironmentErrorDoesNotExists=此名称和类型的环境变量不存在。 '@ # SIG # Begin signature block # MIIoPQYJKoZIhvcNAQcCoIIoLjCCKCoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDtlVTojxIlv/hr # i3rlLNoXT23MWIut142oe45FsiP0JKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg4wghoKAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOTN # deXyJUrxrUEhdjk1mp8RN/v8P3cFjuF8d4Z5EL24MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA0Qi9Pzyt2Mb3eu1iwJvqcmJ7dN2R4h/oIV7e # CJhrIfcmRoaKf+Pt8rfXdJiad8vn0o10gA/CtVYjVzVzp6YH1qkmzzSanexlzeJo # g0AfjtoOQ+gxSX1ekoLNDEpiBjX/i65FnDvVvojXykzhqbbiM/zEbDLu7fgEM9E2 # bgwy6VwiAkqjF4eDJyMV9LU+mmT3A4MwjB1SJFcLiVnZDHh60O0PWd1jXA9PoxHI # QHzdT9Odpc0Bm3zj+HVr41SdrJW0OHcPCvvntcTtlch5h3Xft89FGkCKRo+Rs8pP # Ch0d53gscVn2fTrT+p3b5OdZvK6kw1G3lLZo7aUDTOzLFIzdNqGCF5gwgheUBgor # BgEEAYI3AwMBMYIXhDCCF4AGCSqGSIb3DQEHAqCCF3EwghdtAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAouoP5zVSoFg7psoZUBcBZ4CXfGb1bnXu7 # PsE4ifbKAwIGZhfc8eiXGBMyMDI0MDQxNzE3MDQzNy45MjJaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHuMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QAB # AAAB6zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaF # BuYbNc7hSKmktvJ15NrB/DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB # 3huvv91fZuUugIsKTnAvg2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG # 4cxKgcDAinihT8xroJWVATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARu # Co3TiRGjM2Lp4piT2lD5hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojT # dFLL5vJ9IAogWf3XAu3d7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrC # NL+Tmi/jalRto/J6bh4fPhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TY # jMPbYqG8y5xz+gI/SFyj+aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1X # b6hM5HIWA0jEAZhKEyd5hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6 # rUhudfI7k8L9KKCEufRbK5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjo # W3qs7JRMZmH9fkFkMzb6YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidV # tNqiZeWWpVjfavR+Jj/JOQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu # 4qT9O5jT2B+qAerhMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VW # ZP3+W87c/QbdbWK0sOt9Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8 # WHgDOvbwqdqsLUaM4NrertI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd # 5Bg3CWknV3uvVau14F55ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbe # I2IDqRxC4xBbRiNQ+1qHXDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXio # LVYo/2Hkyow6dI7uULJbKxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1R # VHcQtkUE7W9zxZqZ6/jPmaojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawp # azLBv997LRB0ZObNckJYyQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+ # 9dy6nmcCrVcOqbQHX7Zr8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50 # w+JoTxISQq7vBij2nitAsSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvD # Zo365vLOozmQOe/Z+pu4vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltU # dsi3HjNnieuE72fT4eWhxtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNRMIICOQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCABol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6cpDwjAi # GA8yMDI0MDQxNzEyNDkwNloYDzIwMjQwNDE4MTI0OTA2WjB4MD4GCisGAQQBhFkK # BAExMDAuMAoCBQDpykPCAgEAMAsCAQACAwDLMQIB/zAHAgEAAgISPzAKAgUA6cuV # QgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6Eg # oQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBhQW5ouvl/DsRpuseRAr7P # 6RVUNAMCDEjENjgdfrgz3I6kJOxt3G+N7YrZl4tht5zA/pDHwnYDULlpjupPjvvj # oTygWWsYf7nk9CuORB9JHTdpGx8Wn/RxLAENB1NgFe+s152v9yKDCsjCD1ftlN0/ # 28CjVpWR3K2J1D6eBSjDlSIkYkBbu6UmB3wPE/gWs9v52HP/FXuhRh/gz4V6WJxl # qY3+1B3JOl1cU3QixX7icZ7j2xFc2VO/2nVJcPc6mLkXqiK0f7Y9vipV+jVU7ANb # lvhNtiojsi9JX0Y/GMRlJ+yVEH4qs+PZiRp13b4zQLeXcm0+S/kBd8edOgMlNrpT # MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAHr4BhstbbvOO0AAQAAAeswDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ # AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQguqGWXRJaYbjtFIrM9t4v # vQFk6iK6VM3zW2/e5r62ASswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDO # t2u+X2kD4X/EgQ07ZNg0lICG3Ys17M++odSXYSws+DCBmDCBgKR+MHwxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m # dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6+AYbLW27zjtAAEAAAHrMCIEIBg6 # rSotCNS66SasI5YmDOjNPeuHtGlXXlnXamZcvlteMA0GCSqGSIb3DQEBCwUABIIC # ABR1UayIDNtY9ULwrb8kNT86LngMfTO+Vb1gkIBiL4NExg8N0G7R8Qpb1nzsEMhr # cCElAriOgp+CjibSnQm2aiMV/aO5cbaWkI50R4aFKZf8ZOSNCm/gc7v4aWzT5Tm1 # D/yxsXVrCgk1CF+GfjHxXkb15H1WZQr5yz4yFbmHWLiyahyufVkahbwdF76D2ppx # nJdykd4DBzv4ypWrD2bQOgSEMA+UrZkM5hkun/uUy7gfU3W6215V0B8Y1XBdO4/P # lAeY0tFPYR73KpvWDT/JTasvBegkI3qcV/x7WKz/t4owPwlP8Nt9vv15KwATe1nV # QUlCpTlNPUm+g11KLT2VH7YsLmVtPE+d7/s55B+8wkVXrqgumJMcCc89hhe7v+cy # H3o5ElDEuMR9Png/lO215ZYWqDQ5YJSG6voC4PdSrqSCClUrueGu9HmD+fuVhs1l # VMieKE6wDaGpAJP9I0PVLlK0IgMFxKLvFD0+H1tU3OPTQ4BBzk/TdwOuYpAvSRVi # n9eSRACRr00joEFsrbxFCCfwGLnabDxglnqLPj3BsYyYnPkSvDoOyFMwJ2WxwJIS # EHrgyPGlF7I1oVzs0KQXQ+H/rrIweXzjaxERjCbmSwf52HAcfeb/j444XpkKs0fo # 7DtB5x4Mxi60kVx7Ds3JjAAKKgZbIbDC35vVzVJWxWeJ # SIG # End signature block
0
get-uuid_allHVs_1.ps1
#The PowerShell Talk #Building a HyperVisor Independent Script # #This script will take a VM (or host) object from the pipline, #and from that determine if you're connected to XenServer #or VMware, and return the apropriate UUID. Begin { #VMware VM Host (ESX) UUID $VMHost_UUID = @{ Name = "VMHost_UUID" Expression = { $_.Summary.Hardware.Uuid } } #XenServer Host UUID $XenHost_UUID = @{ Name = "XenHost_UUID" Expression = { $_.Uuid } } } Process { #Get the type of object we have $InputTypeName = $_.GetType().Name #Do something with that object #is it VMware? if ( $InputTypeName -eq "VMHostImpl" ) { $output = $_ | Get-View | Select-Object $VMHost_UUID #is it Xen? } elseif ($InputTypeName -eq "Host"){ $output = $_ | Select-Object $XenHost_UUID #Otherwise throw an error } else { Write-Host "`nPlease pass this script either a VMHost or VM object on the pipeline.`n" } $output }
0
sample_58_55.ps1
# # Module manifest for module 'OCI.PSModules.Ocicontrolcenter' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ocicontrolcenter.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'fc85f17d-35f9-4106-a77a-ccaa291877f6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ocicontrolcenter Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocicontrolcenter.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOcicontrolcenterMetricPropertiesList', 'Get-OCIOcicontrolcenterNamespacesList', 'Invoke-OCIOcicontrolcenterRequestSummarizedMetricData' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocicontrolcenter' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
2136.ps1
Describe "Range Operator" -Tags CI { Context "Range integer operations" { It "Range operator generates arrays of integers" { $Range = 5..8 $Range.count | Should -Be 4 $Range[0] | Should -BeOfType [int] $Range[1] | Should -BeOfType [int] $Range[2] | Should -BeOfType [int] $Range[3] | Should -BeOfType [int] $Range[0] | Should -Be 5 $Range[1] | Should -Be 6 $Range[2] | Should -Be 7 $Range[3] | Should -Be 8 } It "Range operator accepts negative integer values" { $Range = -8..-5 $Range.count | Should -Be 4 $Range[0] | Should -Be -8 $Range[1] | Should -Be -7 $Range[2] | Should -Be -6 $Range[3] | Should -Be -5 } It "Range operator support single-item sequences" { $Range = 0..0 $Range.count | Should -Be 1 $Range[0] | Should -BeOfType [int] $Range[0] | Should -Be 0 } It "Range operator works in descending order" { $Range = 4..3 $Range.count | Should -Be 2 $Range[0] | Should -Be 4 $Range[1] | Should -Be 3 } It "Range operator works for sequences of both negative and positive numbers" { $Range = -2..2 $Range.count | Should -Be 5 $Range[0] | Should -Be -2 $Range[1] | Should -Be -1 $Range[2] | Should -Be 0 $Range[3] | Should -Be 1 $Range[4] | Should -Be 2 } It "Range operator enumerator works" { $Range = -2..2 | ForEach-Object { $_ } $Range.count | Should -Be 5 $Range[0] | Should -Be -2 $Range[1] | Should -Be -1 $Range[2] | Should -Be 0 $Range[3] | Should -Be 1 $Range[4] | Should -Be 2 } It "Range operator works with variables" { $var1 = -1 $var2 = 1 $Range = $var1..$var2 $Range.count | Should -Be 3 $Range[0] | Should -Be -1 $Range[1] | Should -Be 0 $Range[2] | Should -Be 1 $Range = [int]$var2..[int]$var1 $Range.count | Should -Be 3 $Range[0] | Should -Be 1 $Range[1] | Should -Be 0 $Range[2] | Should -Be -1 $Range = $var1..$var2 | ForEach-Object { $_ } $Range.count | Should -Be 3 $Range[0] | Should -Be -1 $Range[1] | Should -Be 0 $Range[2] | Should -Be 1 $Range = [int]$var2..[int]$var1 | ForEach-Object { $_ } $Range.count | Should -Be 3 $Range[0] | Should -Be 1 $Range[1] | Should -Be 0 $Range[2] | Should -Be -1 } } Context "Character expansion" { It "Range operator generates an array of [char] from single-character operands" { $CharRange = 'A'..'E' $CharRange.count | Should -Be 5 $CharRange[0] | Should -BeOfType [char] $CharRange[1] | Should -BeOfType [char] $CharRange[2] | Should -BeOfType [char] $CharRange[3] | Should -BeOfType [char] $CharRange[4] | Should -BeOfType [char] } It "Range operator enumerator generates an array of [string] from single-character operands" { $CharRange = 'A'..'E' | ForEach-Object { $_ } $CharRange.count | Should -Be 5 $CharRange[0] | Should -BeOfType [char] $CharRange[1] | Should -BeOfType [char] $CharRange[2] | Should -BeOfType [char] $CharRange[3] | Should -BeOfType [char] $CharRange[4] | Should -BeOfType [char] } It "Range operator works in ascending and descending order" { $CharRange = 'a'..'c' $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly ([char]'a') $CharRange[1] | Should -BeExactly ([char]'b') $CharRange[2] | Should -BeExactly ([char]'c') $CharRange = 'C'..'A' $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly ([char]'C') $CharRange[1] | Should -BeExactly ([char]'B') $CharRange[2] | Should -BeExactly ([char]'A') } It "Range operator works in ascending and descending order with [char] cast" { $CharRange = [char]'a'..[char]'c' $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly ([char]'a') $CharRange[1] | Should -BeExactly ([char]'b') $CharRange[2] | Should -BeExactly ([char]'c') $CharRange = [char]"a".."c" $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly ([char]'a') $CharRange[1] | Should -BeExactly ([char]'b') $CharRange[2] | Should -BeExactly ([char]'c') $CharRange = "a"..[char]"c" $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly ([char]'a') $CharRange[1] | Should -BeExactly ([char]'b') $CharRange[2] | Should -BeExactly ([char]'c') $CharRange = [char]'C'..[char]'A' $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly ([char]'C') $CharRange[1] | Should -BeExactly ([char]'B') $CharRange[2] | Should -BeExactly ([char]'A') $CharRange = [char]"C".."A" $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly ([char]'C') $CharRange[1] | Should -BeExactly ([char]'B') $CharRange[2] | Should -BeExactly ([char]'A') $CharRange = "C"..[char]"A" $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly ([char]'C') $CharRange[1] | Should -BeExactly ([char]'B') $CharRange[2] | Should -BeExactly ([char]'A') } It "Range operator enumerator works in ascending and descending order" { $CharRange = 'a'..'c' | ForEach-Object { $_ } $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly "a" $CharRange[1] | Should -BeExactly "b" $CharRange[2] | Should -BeExactly "c" $CharRange = 'C'..'A' | ForEach-Object { $_ } $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly "C" $CharRange[1] | Should -BeExactly "B" $CharRange[2] | Should -BeExactly "A" } It "Range operator enumerator works in ascending and descending order with [char] cast" { $CharRange = [char]'a'..[char]'c' | ForEach-Object { $_ } $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly "a" $CharRange[1] | Should -BeExactly "b" $CharRange[2] | Should -BeExactly "c" $CharRange = [char]'C'..[char]'A' | ForEach-Object { $_ } $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly "C" $CharRange[1] | Should -BeExactly "B" $CharRange[2] | Should -BeExactly "A" } It "Range operator works with variables" { $var1 = 'a' $var2 = 'c' $CharRange = $var1..$var2 $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly "a" $CharRange[1] | Should -BeExactly "b" $CharRange[2] | Should -BeExactly "c" $CharRange = [char]$var2..[char]$var1 $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly "c" $CharRange[1] | Should -BeExactly "b" $CharRange[2] | Should -BeExactly "a" $CharRange = $var1..$var2 | ForEach-Object { $_ } $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly "a" $CharRange[1] | Should -BeExactly "b" $CharRange[2] | Should -BeExactly "c" $CharRange = [char]$var2..[char]$var1 | ForEach-Object { $_ } $CharRange.count | Should -Be 3 $CharRange[0] | Should -BeExactly "c" $CharRange[1] | Should -BeExactly "b" $CharRange[2] | Should -BeExactly "a" } It "Range operator works with 16-bit unicode characters" { $UnicodeRange = "`u{0110}".."`u{0114}" $UnicodeRange.count | Should -Be 5 $UnicodeRange[0] | Should -Be "`u{0110}"[0] $UnicodeRange[1] | Should -Be "`u{0111}"[0] $UnicodeRange[2] | Should -Be "`u{0112}"[0] $UnicodeRange[3] | Should -Be "`u{0113}"[0] $UnicodeRange[4] | Should -Be "`u{0114}"[0] $UnicodeRange.Where({$_ -is [char]}).count | Should -Be 5 } It "Range operator with special ranges" { $SpecRange = "0".."9" $SpecRange.count | Should -Be 10 $SpecRange.Where({$_ -is [int]}).count | Should -Be 10 $SpecRange = '0'..'9' $SpecRange.count | Should -Be 10 $SpecRange.Where({$_ -is [int]}).count | Should -Be 10 $SpecRange = [char]'0'..[char]'9' $SpecRange.count | Should -Be 10 $SpecRange.Where({$_ -is [char]}).count | Should -Be 10 } } Context "Range operator operand types" { It "Range operator works on [decimal]" { $Range = 1.1d..3.9d $Range.count | Should -Be 4 $Range[0] | Should -Be 1 $Range[1] | Should -Be 2 $Range[2] | Should -Be 3 $Range[3] | Should -Be 4 $Range.Where({$_ -is [int]}).count | Should -Be 4 } } }
0
sample_28_82.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. function Import-EditorCommand { <# .EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml #> [OutputType([Microsoft.PowerShell.EditorServices.Extensions.EditorCommand, Microsoft.PowerShell.EditorServices])] [CmdletBinding(DefaultParameterSetName='ByCommand')] param( [Parameter(Position=0, Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName, ParameterSetName='ByCommand')] [ValidateNotNullOrEmpty()] [string[]] $Command, [Parameter(Position=0, Mandatory, ParameterSetName='ByModule')] [ValidateNotNullOrEmpty()] [string[]] $Module, [switch] $Force, [switch] $PassThru ) begin { function GetCommandsFromModule { param( [Parameter(ValueFromPipeline)] [string] $ModuleToSearch ) process { if (-not $ModuleToSearch) { return } $caller = (Get-PSCallStack)[2] if ($caller.InvocationInfo.MyCommand.ScriptBlock.Module.Name -eq $ModuleToSearch) { $moduleInfo = $caller.InvocationInfo.MyCommand.ScriptBlock.Module return $moduleInfo.Invoke( { $ExecutionContext.SessionState.InvokeProvider.Item.Get('function:\*') | Where-Object ModuleName -eq $args[0] }, $ModuleToSearch) } $moduleInfo = Get-Module $ModuleToSearch -ErrorAction SilentlyContinue return $moduleInfo.ExportedFunctions.Values } } $editorCommands = @{} foreach ($existingCommand in $psEditor.GetCommands()) { $editorCommands[$existingCommand.Name] = $existingCommand } } process { switch ($PSCmdlet.ParameterSetName) { ByModule { $commands = $Module | GetCommandsFromModule } ByCommand { $commands = $Command | Get-Command -ErrorAction SilentlyContinue } } $attributeType = [Microsoft.PowerShell.EditorServices.Extensions.EditorCommandAttribute, Microsoft.PowerShell.EditorServices] foreach ($aCommand in $commands) { # Get the attribute from our command to get name info. $details = $aCommand.ScriptBlock.Attributes | Where-Object TypeId -eq $attributeType if ($details) { # TODO: Add module name to this? # Name: Expand-Expression becomes ExpandExpression if (-not $details.Name) { $details.Name = $aCommand.Name -replace '-' } # DisplayName: Expand-Expression becomes Expand Expression if (-not $details.DisplayName) { $details.DisplayName = $aCommand.Name -replace '-', ' ' } # If the editor command is already loaded skip unless force is specified. if ($editorCommands.ContainsKey($details.Name)) { if ($Force.IsPresent) { $null = $psEditor.UnregisterCommand($details.Name) } else { $PSCmdlet.WriteVerbose($Strings.EditorCommandExists -f $details.Name) continue } } # Check for a context parameter. $contextParameter = $aCommand.Parameters.Values | Where-Object ParameterType -eq ([Microsoft.PowerShell.EditorServices.Extensions.EditorContext, Microsoft.PowerShell.EditorServices]) # If one is found then add a named argument. Otherwise call the command directly. if ($contextParameter) { $sbText = '{0} -{1} $args[0]' -f $aCommand.Name, $contextParameter.Name $scriptBlock = [scriptblock]::Create($sbText) } else { $scriptBlock = [scriptblock]::Create($aCommand.Name) } $editorCommand = [Microsoft.PowerShell.EditorServices.Extensions.EditorCommand, Microsoft.PowerShell.EditorServices]::new( <# commandName: #> $details.Name, <# displayName: #> $details.DisplayName, <# suppressOutput: #> $details.SuppressOutput, <# scriptBlock: #> $scriptBlock) $PSCmdlet.WriteVerbose($Strings.EditorCommandImporting -f $details.Name) $null = $psEditor.RegisterCommand($editorCommand) if ($PassThru.IsPresent -and $editorCommand) { $editorCommand # yield } } } } } if ($PSVersionTable.PSVersion.Major -ge 5) { Register-ArgumentCompleter -CommandName Import-EditorCommand -ParameterName Module -ScriptBlock { param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters) (Get-Module).Name -like ($wordToComplete + '*') | ForEach-Object { [System.Management.Automation.CompletionResult]::new($PSItem, $PSItem, 'ParameterValue', $PSItem) } } Register-ArgumentCompleter -CommandName Import-EditorCommand -ParameterName Command -ScriptBlock { param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters) (Get-Command -ListImported).Name -like ($wordToComplete + '*') | ForEach-Object { [System.Management.Automation.CompletionResult]::new($PSItem, $PSItem, 'ParameterValue', $PSItem) } } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBCo/8RxkJRpjfH # tv88INxNRrHwrLnOrzrSY5Y80TZvAqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPZ8NEzZjgCyML6sujLTPgim # QGyG4V5qvxM+l9MjZcEpMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAiCJDkR0l5dCkRViRZEVqdXFcuPtE6Xba9AVdqBwYjI9ek0Lu2I9sXjJV # kb+uCTCifgFUaOrSD2wslL+6tuoxpebI/PlU4dwN/p5BGprYZ4mF1mo8NYYDCRBZ # COj6JsQ3fHtOVc9oN65buKr50oDD0e+4lDaYn0BGblyAmyHux7uUoSM75f7MIY23 # tfs1KnFna72pR2YfCB4SyHUVFiz3Ey36HTgJMjJ8Uf82vX4zsm0zINQ6cnIxKmh4 # tyABBawHub+P9oEIwNRJlSbNgMnsIYhkIGbUtUdPIi2FK/fvXUNbgos4PWVljX6K # xr/DVn7YSoiFMdDt59pn4TTkcG2F46GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCHtgMBZ722dTA3jk7CIPtGZHN9wyyToeqpuJmouheK0gIGZXsgcLvF # GBMyMDI0MDEwNDAyMDg1Mi4wMzJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAc4PGPdFl+fG/wABAAABzjANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MDhaFw0yNDAyMDExOTEyMDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC5CkwZ1yjYx3fnKTw/VnzwGGhKOIjqMDSuHdGg8JoJ # 2LN2nBUUkAwxhYAR4ZQWg9QbjxZ/DWrD2xeUwLnKOKNDNthX9vaKj+X5Ctxi6ioT # VU7UB5oQ4wGpkV2kmfnp0RYGdhtc58AaoUZFcvhdBlJ2yETwuCuEV6pk4J7ghGym # szr0HVqR9B2MJjV8rePL+HGIzIbYLrk0jWmaKRRPsFfxKKw3njFgFlSqaBA4SVuV # 0FYE/4t0Z9UjXUPLqw+iDeLUv3sp3h9M4oNIZ216VPlVlf3FOFRLlZg8eCeX4xla # BjWia95nXlXMXQWqaIwkgN4TsRzymgeWuVzMpRPBWk6gOjzxwXnjIcWqx1lPznIS # v/xtn1HpB+CIF5SPKkCf8lCPiZ1EtB01FzHRj+YhRWJjsRl1gLW1i0ELrrWVAFrD # PrIshBKoz6SUAyKD7yPx649SyLGBo/vJHxZgMlYirckf9eklprNDeoslhreIYzAJ # rMJ+YoWn9Dxmg/7hGC/XH8eljmJqBLqyHCmdgS+WArj84ciRGsmqRaUB/4hFGUkL # v1Ga2vEPtVByUmjHcAppJR1POmi1ATV9FusOQQxkD2nXWSKWfKApD7tGfNZMRvku # fHFwGf5NnN0Aim0ljBg1O5gs43Fok/uSe12zQL0hSP9Jf+iCL+NPTPAPJPEsbdYa # vQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDD7CEZAo5MMjpl+FWTsUyn54oXFMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCXIBYW/0UVTDDZO/fQ2XstNC4DZG8RPbrl # ZHyFt57z/VWqPut6rugayGW1UcvJuxf8REtiTtmf5SQ5N2pu0nTl6O4BtScIvM/K # 8pe/yj77x8u6vfk8Q6SDOZoFpIpVkFH3y67isf4/SfoN9M2nLb93po/OtlM9AcWT # JbqunzC+kmeLcxJmCxLcsiBMJ6ZTvSNWQnicgMuv7PF0ip9HYjzFWoNq8qnrs7g+ # +YGPXU7epl1KSBTr9UR7Hn/kNcqCiZf22DhoZPVP7+vZHTY+OXoxoEEOnzAbAlBC # up/wbXNJissiK8ZyRJXT/R4FVmE22CSvpu+p5MeRlBT42pkIhhMlqXlsdQdT9cWI # tiW8yWRpaE1ZI1my9FW8JM9DtCQti3ZuGHSNpvm4QAY/61ryrKol4RLf5F+SAl4o # zVvM8PKMeRdEmo2wOzZK4ME7D7iHzLcYp5ucw0kgsy396faczsXdnLSomXMArstG # kHvt/F3hq2eESQ2PgrX+gpdBo8uPV16ywmnpAwYqMdZM+yH6B//4MsXEu3Rg5QOo # OWdjNVB7Qm6MPJg+vDX59XvMmibAzbplxIyp7S1ky7L+g3hq6KxlKQ9abUjYpaOF # nHtKDFJ+vxzncEMVEV3IHQdjC7urqOBgO7vypeIwjQ689qu2NNuIQ6cZZgMn8EvS # SWRwDG8giTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBd # jZUbFNAyCkVE6DdVWyizTYQHzKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6T/8UzAiGA8yMDI0MDEwMzE1MzEz # MVoYDzIwMjQwMTA0MTUzMTMxWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpP/xT # AgEAMAoCAQACAijMAgH/MAcCAQACAhQZMAoCBQDpQU3TAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBABvIR4Bo97E33pX5xgtz6zGhf8ZM3/+zHvUlc8IjDzXh # OULVI7L0fFDM41XRKt+fTlRBQ3/L3Q1RMUkMBB1kbQ3FIzWuKGUpluSYvOr/UNXt # 7yYTQIqJJQ2jHgfcJaDaoPj1rR7eupGN25Ws1tPQV6ThOIKAYViYXgxjqSiytquE # rw/9JFFmHRDwBV4maNekwjS2/KA9Khh2B6Dg7DqKsV/Fampo8BTKN4ymuiuStaqm # 9//76anufC81WqKkW56o+s/eAbNqDafNFomAVZJI60E/57c7rcCajyrPcdYC0fs7 # BnJOrV6WBKRRDxo6ITpcZYBfw8/DcyE+xzCgOott33sxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAc4PGPdFl+fG/wABAAAB # zjANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDlKBd6suKBlZwCZjou2EYy7fnqYzPhMoZNs9SbTg+H # zDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIDJsz0F6L0XDUm53JRBfNMZs # zKsllLDMiaFZ3PL/LqxnMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHODxj3RZfnxv8AAQAAAc4wIgQgJHHOavCeG3n028xgYtdL/mmZ # dflS3yaXimNVVwdMrMYwDQYJKoZIhvcNAQELBQAEggIAYfmAvPLFExreHyqgst6p # blg14VG0fXq4X0jTi7WfTeKbz6aHE9bRSUUr3Hw+Xt9PClufxM87D7kmPhvvJ1HK # +Un7L18XrQORwZPS5NV/dHqmkPdF8oneAlYYIb9StQTjhrTuSUk1qNEzeiL8Oj1x # AQaCkl316Tj/ewOId0C8vTWoY1uSkxMDNCNxhDKmo9qA8IqZsVvWaGsBZi+F9f0+ # Z3/WuXqd7YMtveEiuzYqbxzdE0MH977ypKKdIzwtyCm3hFVlzwzJxxyoKoR3Neux # 2TZGTdgKcnKiPPCktJ5CIKhkgEOb8aC1/UVsRqr3BqLnEfK3BXpHHXMgX30ZhDju # yP7FmD1EW4M4yoHQuNZauX50Z4QyBTBLS+tYlbGdu3rEtkOtxVEp1+eS3R2N+OxH # lGxtRri555JiFCBKbc3Rr3sq23OXjXoJvQcKznxiOMKKHwL1amTdcImFuBI43R1P # BXmio0+7WrtD5E2Dh08JfaPxzRW6z6lFHo1fhtSZA7oJnt//SXOaxe5b4V27tp4U # L5RtebFlXBVXSeFUM6bt+FhewqVG2uQ8ss3q/onuxoVSPipSTLwCukL0/PB1Es1R # edv6xmv4iX1qn+5FZs5dFITEyPbmP1d65WNy0J6S4oDBBLuznrsg3/Gy4hGrrBmq # 3IHygDF4szo6H7Wtlr14eu0= # SIG # End signature block
0
Update VM Tools_3.ps1
######################################################## # Created by Brian English # Brian.English@charlottefl.com # eddiephoenix@gmail.com # # for Charlotte County Government # No warranty suggested or implied ######################################################## # Purpose: Cycle through all VMs on a Virtualcenter Server # and update the VMTools after Virtualcenter update ######################################################## # Notes: VMware Tools must be installed prior to updating # it. After VMware Tools is updated, the virtual # machine is restarted if needed. See Vi Toolkit # CmdLets Reference: Update-Tools ######################################################## #connect to VirtualCenter server (i.e. virtual-center-1) if ($args[0] -eq $null) {$hostName = Read-Host "What host do you want to connect to?"} else {$hostName = $args[0]} #connect to selected Virtualcenter or host server Connect-VIServer $hostName ######################################################## #get all vms listed in virtualcenter $vms = get-vm ######################################################## #check power state on each vm #if 'On' update tools Foreach ($i in $vms) { #if virtualcenter is virtualized skip it # a system restart would stop this script if ((get-vm -name $i).Name -eq $hostname) {"Skipping " + $hostname} #if primary DC or DNS is virtualized skip it too #elseif ((get-vm -name $i).Name -eq "DNS/DC/DHCP") #{"Skipping DNS/DC/DHCP server name"} else { if ((get-vm -name $i).PowerState -eq "PoweredOn") { $i Get-Date -format "hh:mm:ss" @@ update-tools -guest (get-vmguest -vm (get-vm -name $i)) Get-Date -format "hh:mm:ss" }#if #}#if }#foreach
0
1538.ps1
function New-MrFunction { [CmdletBinding()] [OutputType('System.IO.FileInfo')] param ( [ValidateScript({ If ((Get-Verb -Verb ($_ -replace '-.*$')).Verb) { $true } else { Throw "'$_' does NOT use an approved Verb." } })] [string]$Name, [ValidateScript({ If (Test-Path -Path $_ -PathType Container) { $true } else { Throw "'$_' is not a valid directory." } })] [string]$Path ) $FunctionPath = Join-Path -Path $Path -ChildPath "$Name.ps1" if (-not(Test-Path -Path $FunctionPath)) { New-Fixture -Path $Path -Name $Name Set-Content -Path $FunctionPath -Force -Value " function $($Name) { [CmdletBinding()] [OutputType('PSCustomObject')] param ( [Parameter(Mandatory, ValueFromPipeline)] [string[]]`$Param1, [ValidateNotNullOrEmpty()] [string]`$Param2 ) BEGIN { } PROCESS { foreach (`$Param in `$Param1) { } } END { } }" } else { Write-Error -Message 'Unable to create function. Specified file already exists!' } }
0
1dd696a1-0d97-40cd-9cdf-5cbe5b7fe4a4.ps1
function Write-Host { <# .SYNOPSIS Replacement of Write-Host function to work around an issue where use of Write-Host can cause an eventual problem with launching EXEs from within the same Powershell session. .DESCRIPTION This Write-Host replacement can act as a temporary workaround to an issue with some PowerShell versions currently released. The high-level description of the problem is that excessive use of Write-Host eventually leads to failures to execute EXEs from the same PowerShell session. For platforms where the problem exists, the following has been seen to reproduce the issue: for( $i = 0; $i -lt 1000; $i += 1 ) { Write-Host line }; whoami.exe; "0x{0:X}" -f $LASTEXITCODE On repro, the $LASTEXITCODE will be 0xC0000142. This issue is described by the following Connect article: https://connect.microsoft.com/PowerShell/feedback/details/496326/stability-problem-any-application-run-fails-with-lastexitcode-1073741502 Some folks workaround the issue by simply using pipeline output to display status messages. Use the pipeline in this manner may be ideal for situations where it is not used for other purposes. If you have scripts that use the pipeline for other purposes, and rely on Write-Host for non-pipeline status output, where your scripts hit this issue, perhaps this workaround may be of use. .PARAMETER Object Object to be outputed to stdout. .PARAMETER NoNewLine Specify this flag if you don't what the output to end with NewLine character .PARAMETER ForegroundColor Specifies the text color. There is no default. Use Get-Colors command to output all available colors in color. Possible color names taken from '[ConsoleColor] | gm -Static' are: Blue | DarkBlue Cyan | DarkCyan Gray | DarkGray Green | DarkGreen Magenta | DarkMagenta Red | DarkRed Yellow | DarkYellow White | Black .PARAMETER BackgroundColor Specifies the background color. There is no default. Use Get-Colors command to output all available colors in color. Possible color names taken from '[ConsoleColor] | gm -Static' are: Blue | DarkBlue Cyan | DarkCyan Gray | DarkGray Green | DarkGreen Magenta | DarkMagenta Red | DarkRed Yellow | DarkYellow White | Black .EXAMPLE Write-Console "=)", "test" -ForegroundColor Green -NoNewLine Prints all items in passed string array to stdout with green color used in console. .LINK Write-Colorized Write-Host Get-Colors #> param ( [Parameter(Mandatory = $true, Position = 0, ValueFromRemainingArguments = $true, ValueFromPipeline = $true)] [object] $Object, [object] $Separator = " ", [ConsoleColor] $ForegroundColor, [ConsoleColor] $BackgroundColor, [switch] $NoNewLine ) begin { function printObject($o) { function WriteObject([string]$s) { if ($s.Length -gt 0) { if ($consoleHost) { [Console]::Write($s); } else { $host.UI.Write($ForegroundColor, $BackgroundColor, $s) } } } # If null, exit. if ($o -eq $null) { return; } # If type is directly a string, write it directly. if ($o -is [string]) { WriteObject $o } else { # Object is not a string. See if it is enumerable. if ($o -is [System.Collections.IEnumerable]) { # Access the enumerator and print each item with any defined separation. $objectEnumerator = $o.GetEnumerator(); $printSeparator = $false; foreach ($element in $objectEnumerator) { # If separator defined, print it if this is not first item. if ($Separator -ne $null -and $printSeparator) { WriteObject $Separator } # Recursive. printObject $element # Print separator after first item. $printSeparator = $true; } } else { # Object was not a string, and it did not have a # GetEnumerator() method, so simply use the object's # ToString() method to access the printable content. WriteObject $o.ToString() } } } $consoleHost = $host.Name -eq "ConsoleHost" if (!$consoleHost) { if (!$ForegroundColor) { $ForegroundColor = $host.UI.RawUI.ForegroundColor } if (!$BackgroundColor) { $BackgroundColor = $host.ui.RawUI.BackgroundColor } } } process { if ($consoleHost) { if( $ForegroundColor ) { $previousForegroundColor = [Console]::ForegroundColor [Console]::ForegroundColor = $ForegroundColor } if( $BackgroundColor ) { $previousBackgroundColor = [Console]::BackgroundColor [Console]::BackgroundColor = $BackgroundColor } } try { printObject $Object $consoleHost if( $NoNewLine -eq $false) { [Console]::WriteLine('') # Parameterless WriteLine seems to not print a newline from ISE whereas empty string works on both cmd line/ISE. } } finally { if ($consoleHost) { if( $ForegroundColor ) { [Console]::ForegroundColor = $previousForegroundColor } if( $BackgroundColor ) { [Console]::BackgroundColor = $previousBackgroundColor } } } } } # Simple test... function Test-WriteConsole { Write-Host 'new console write'; Write-Host @(1,2,3,4) -Separator '-sep-' Write-Host @(1,2,3,4) -Separator '-sep-' -ForegroundColor Yellow Write-Host @(1,2,3,4) -Separator '-sep-' -ForegroundColor Black -BackgroundColor White Write-Host ([int32]123) -Separator '-sep-' -ForegroundColor Cyan -BackgroundColor DarkGreen Write-Host '123' -Separator '-sep-' -ForegroundColor Green -BackgroundColor Black Write-Host @([int32]123,[int32]123,[int32]123,[int32]123,[int32]123) -Separator '-sep-' -ForegroundColor Cyan -BackgroundColor DarkGreen Write-Host 'This is one write. ' -NoNewLine; Write-Host 'This is another write on the same line. ' -NoNewLine -ForegroundColor Black -BackgroundColor White Write-Host @('abc', [uint32]123, 'def', ' array on same line. ') -Separator ',' -NoNewLine -ForegroundColor Cyan -BackgroundColor DarkMagenta Write-Host 'This is the last sentence on this line.' Write-Host 'This should be on a new line.'; 1..5 | Write-Host Write-Host 1 2 3 4 5 } Test-WriteConsole
0
sample_63_74.ps1
# # Module manifest for module 'OCI.PSModules.Cloudbridge' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudbridge.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '23fab747-5070-4685-94b0-d91859b2fd98' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudbridge Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudbridge.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgent', 'Get-OCICloudbridgeAgentDependenciesList', 'Get-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgentsList', 'Get-OCICloudbridgeApplianceImagesList', 'Get-OCICloudbridgeAsset', 'Get-OCICloudbridgeAssetsList', 'Get-OCICloudbridgeAssetSource', 'Get-OCICloudbridgeAssetSourceConnectionsList', 'Get-OCICloudbridgeAssetSourcesList', 'Get-OCICloudbridgeDiscoverySchedule', 'Get-OCICloudbridgeDiscoverySchedulesList', 'Get-OCICloudbridgeEnvironment', 'Get-OCICloudbridgeEnvironmentsList', 'Get-OCICloudbridgeHistoricalMetricsList', 'Get-OCICloudbridgeInventoriesList', 'Get-OCICloudbridgeInventory', 'Get-OCICloudbridgePlugin', 'Get-OCICloudbridgeWorkRequest', 'Get-OCICloudbridgeWorkRequestErrorsList', 'Get-OCICloudbridgeWorkRequestLogsList', 'Get-OCICloudbridgeWorkRequestsList', 'Import-OCICloudbridgeInventory', 'Invoke-OCICloudbridgeAnalyzeAssets', 'Invoke-OCICloudbridgeRefreshAssetSource', 'Invoke-OCICloudbridgeSubmitHistoricalMetrics', 'Move-OCICloudbridgeAgentCompartment', 'Move-OCICloudbridgeAgentDependencyCompartment', 'Move-OCICloudbridgeAssetCompartment', 'Move-OCICloudbridgeAssetSourceCompartment', 'Move-OCICloudbridgeAssetTags', 'Move-OCICloudbridgeDiscoveryScheduleCompartment', 'Move-OCICloudbridgeEnvironmentCompartment', 'New-OCICloudbridgeAgent', 'New-OCICloudbridgeAgentDependency', 'New-OCICloudbridgeAsset', 'New-OCICloudbridgeAssetSource', 'New-OCICloudbridgeDiscoverySchedule', 'New-OCICloudbridgeEnvironment', 'New-OCICloudbridgeInventory', 'Remove-OCICloudbridgeAgent', 'Remove-OCICloudbridgeAgentDependency', 'Remove-OCICloudbridgeAsset', 'Remove-OCICloudbridgeAssetSource', 'Remove-OCICloudbridgeDiscoverySchedule', 'Remove-OCICloudbridgeEnvironment', 'Remove-OCICloudbridgeInventory', 'Stop-OCICloudbridgeWorkRequest', 'Update-OCICloudbridgeAgent', 'Update-OCICloudbridgeAgentDependency', 'Update-OCICloudbridgeAsset', 'Update-OCICloudbridgeAssetSource', 'Update-OCICloudbridgeDiscoverySchedule', 'Update-OCICloudbridgeEnvironment', 'Update-OCICloudbridgeInventory', 'Update-OCICloudbridgePlugin' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudbridge' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
936.ps1
$uniqueId=$(-join ((97..122) + (48..57) | Get-Random -Count 15 | % {[char]$_})) $apiVersion = "2015-04-08" $location = "West US 2" $resourceGroupName = "MyResourceGroup" $accountName = "mycosmosaccount-$uniqueId" $apiType = "EnableGremlin" $accountResourceType = "Microsoft.DocumentDb/databaseAccounts" $databaseName = "database1" $databaseResourceName = $accountName + "/gremlin/" + $databaseName $databaseResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases" $graphName = "graph1" $graphResourceName = $accountName + "/gremlin/" + $databaseName + "/" + $graphName $graphResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases/graphs" $locations = @( @{ "locationName"="West US 2"; "failoverPriority"=0 }, @{ "locationName"="East US 2"; "failoverPriority"=1 } ) $consistencyPolicy = @{ "defaultConsistencyLevel"="Session" } $accountProperties = @{ "capabilities"= @( @{ "name"=$apiType } ); "databaseAccountOfferType"="Standard"; "locations"=$locations; "consistencyPolicy"=$consistencyPolicy; "enableMultipleWriteLocations"="true" } New-AzResource -ResourceType $accountResourceType ` -ApiVersion $apiVersion -ResourceGroupName $resourceGroupName -Location $location ` -Name $accountName -PropertyObject $accountProperties -Force $databaseProperties = @{ "resource"=@{ "id"=$databaseName }; "options"=@{ "Throughput"= 400 } } New-AzResource -ResourceType $databaseResourceType ` -ApiVersion $apiVersion -ResourceGroupName $resourceGroupName ` -Name $databaseResourceName -PropertyObject $databaseProperties -Force $graphProperties = @{ "resource"=@{ "id"=$graphName; "partitionKey"=@{ "paths"=@("/myPartitionKey"); "kind"="Hash" }; "conflictResolutionPolicy"=@{ "mode"="lastWriterWins"; "conflictResolutionPath"="/myResolutionPath" } }; "options"=@{ "Throughput"= 400 } } New-AzResource -ResourceType $graphResourceType ` -ApiVersion $apiVersion -ResourceGroupName $resourceGroupName ` -Name $graphResourceName -PropertyObject $graphProperties -Force
0
613.ps1
param( [string]$Version, [string]$Path, [switch]$Force, $Update, [switch]$Uninstall ) $Configs = @{ Url = "http://winscp.net/download/files/20140928102737e06fdcc6e29eab780afd57975c84fa/winscp555setup.exe" Path = "$(Split-Path -Path $MyInvocation.MyCommand.Definition -Parent)\" } $Configs | ForEach-Object{ try{ $_.Result = $null if(-not $_.Path){$_.Path = $Path} $Config = $_ if(-not $Uninstall){ if($_.ConditionExclusion){ $_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue) } if(($_.ConditionExclusionResult -eq $null) -or $Force){ $_.Downloads = $_.Url | ForEach-Object{ Get-File -Url $_ -Path $Config.Path } $_.Downloads | ForEach-Object{ Start-Process -FilePath $(Join-Path $_.Path $_.Filename) -ArgumentList "/VERYSILENT /NORESTART" -Wait } $Executable = "C:\Program Files (x86)\WinSCP\WinSCP.exe";if(Test-Path $Executable){Set-Content -Path (Join-Path $PSbin.Path "WinSCP.bat") -Value "@echo off`nstart `"`" `"$Executable`" %*"} $_.Downloads | ForEach-Object{ Remove-Item $(Join-Path $_.Path $_.Filename) } if($Update){$_.Result = "AppUpdated";$_ }else{$_.Result = "AppInstalled";$_} }else{ $_.Result = "ConditionExclusion";$_ } }else{ if(Test-Path (Join-Path $PSbin.Path "WinSCP.bat")){Remove-Item (Join-Path $PSbin.Path "WinSCP.bat")} $Executable = "C:\Program Files (x86)\WinSCP\unins000.exe"; if(Test-Path $Executable){Start-Process -FilePath $Executable -ArgumentList "/VERYSILENT" -Wait} $_.Result = "AppUninstalled";$_ } }catch{ $Config.Result = "Error";$Config } }
0
push-module function v2 .ps1
# v2.0 function Push-Module { param( [parameter(position=0, mandatory=$true)] [validatenotnullorempty()] [string]$ModuleName ) # find out what this module exports (and therefore what it overwrites) $metadata = new-module -ascustomobject { param([string]$ModuleName) # import targeted module $inner = import-module $ModuleName -PassThru function GetExportedFunctions() { $inner.ExportedFunctions.values } # prevent export of inner module's exports Export-ModuleMember -Cmdlet "" -Function GetExportedFunctions } -args $ModuleName # find out which global functions might get clobbered $test = new-module -ascustomobject { param($metadata) $clobbered = @{} # grab copies of functions that would get clobbered $metadata.GetExportedFunctions() | ? { Test-Path "function:$($_.name)" } | % { $clobbered[$_.name] = gc -path "function:$($_.name)" } function GetClobberedFunctions() { $clobbered } } -args $metadata # import module $m = import-module $ModuleName -PassThru # grab clobberable (!) functions $clobbered = $test.GetClobberedFunctions() # hook up function restore $m.onremove = { $clobbered.keys | % { si -path function:global:$_ $clobbered[$_] -force } }.getnewclosure() }
0
Invoke-ISPackage.ps1
<# .SYNOPSIS Runs an SSIS package from an SQL package store. .DESCRIPTION Invoke-ISPackage.ps1 script is a wrapper around dtexec.exe to run an SSIS package. .EXAMPLE PowerShell.exe -File "C:\\Scripts\\Invoke-ISPackage.ps1" -PackagePath "SQLPSX\\sqlpsx1" -ServerInstance "Z001\\SQL1" This example connects to SSIS Server and runs the an SSIS package on Z001\\SQL1 .NOTES Version History v1.0 - Chad Miller - 6/14/2012 - Initial release #> param( [Parameter(Position=0, Mandatory=$true)] [string] $PackagePath, [Parameter(Position=1, Mandatory=$true)] [string] $ServerInstance, [Parameter(Position=2, Mandatory=$false)] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Path "$_"})] [string] $CommandFile, [Parameter(Position=3, Mandatory=$false)] [ValidateNotNullOrEmpty()] [string] $Application="Invoke-ISPackage.ps1", [Parameter(Position=4, Mandatory=$false)] [switch] $Use32Bit ) #This must be run as administrator on Windows 2008 and higher! New-EventLog -LogName Application -Source $Application -EA SilentlyContinue $Error.Clear() $ErrorActionPreference = "Stop" $exitCode = @{ 0="The package executed successfully." 1="The package failed." 3="The package was canceled by the user." 4="The utility was unable to locate the requested package. The package could not be found." 5="The utility was unable to load the requested package. The package could not be loaded." 6="The utility encountered an internal error of syntactic or semantic errors in the command line."} $events = @{"ApplicationStartEvent" = "31101"; "ApplicationStopEvent" = "31104"; "DatabaseException" = "31725"; "ConfigurationException" = "31705";"BadDataException" = "31760"} $msg =$null $MaxErrorMsgLen = 3000 ####################### function Write-Message{ Param([string]$Severity,[string]$Category,[string]$Eventid,[string]$ShortMessage=$null,[string]$Context=$null) $msg = @" Severity: $Severity Category: $Category EventID: $Eventid Short Message: $ShortMessage Context: $Context "@ $msg = $msg -replace "'" Write-EventLog -LogName Application -Source $Application -EntryType $Severity -EventId $Eventid -Category $Category -Message $msg } #Write-Message ####################### # MAIN # ####################### $options = @" /Rep E /DTS "$PackagePath" /Conf "c:\\SSISconfig\\$ServerInstance\\SSISconnection.dtsConfig" "@ if ($CommandFile) { $options += " /Com `"$CommandFile`"" } $paths = [Environment]::GetEnvironmentVariable("Path", "Machine") -split ";" if ($Use32Bit) { $dtexec = $paths | where { $_ -like "*Program Files(x86)\\Microsoft SQL Server\\*\\DTS\\Binn\\" } $dtexec += 'dtexec.exe' } if ($dtexec -eq $null) { $dtexec = $paths | where { $_ -like "*Program Files\\Microsoft SQL Server\\*\\DTS\\Binn\\" } $dtexec += 'dtexec.exe' } write-verbose "$dtexec $options" $Context = "servername = $ServerInstance`npath = $PackagePath" $msg = "ApplicationStartEvent" Write-Message -Severity Information -Category $events.ApplicationStartEvent -Eventid 1 -ShortMessage $msg -Context $Context try { $result = & $dtexec $options $result = $result -join "`n" if ($lastexitcode -eq 0) { $msg = "ApplicationStopEvent" Write-Message -Severity Information -Category $events.ApplicationStopEvent -Eventid 99 -ShortMessage $msg -Context $Context } else { throw $exitcode[$lastexitcode] } } catch { $result = "$_ `n$result" if ($result -and $result.Length -gt $MaxErrorMsgLen) { $result = $result.SubString($result.Length - $MaxErrorMsgLen) } Write-Verbose "DtExecException" Write-Message -Severity Error -Category $events.Get_Item("ConfigurationException") -Eventid 334 -ShortMessage "ConfigurationException: $result" -Context $Context throw "$result `n $("Failed to run PackagePath {0} to ServerInstance {1}" -f $PackagePath,$ServerInstance)" }
0
sample_10_28.ps1
# # Module manifest for module 'OCI.PSModules.Fleetsoftwareupdate' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Fleetsoftwareupdate.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e830226f-46c5-4916-992f-740cc29d35ab' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Fleetsoftwareupdate Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Fleetsoftwareupdate.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIFleetsoftwareupdateFsuCollectionTargets', 'Get-OCIFleetsoftwareupdateFsuAction', 'Get-OCIFleetsoftwareupdateFsuActionOutputContent', 'Get-OCIFleetsoftwareupdateFsuActionsList', 'Get-OCIFleetsoftwareupdateFsuCollection', 'Get-OCIFleetsoftwareupdateFsuCollectionsList', 'Get-OCIFleetsoftwareupdateFsuCollectionTargetsList', 'Get-OCIFleetsoftwareupdateFsuCycle', 'Get-OCIFleetsoftwareupdateFsuCyclesList', 'Get-OCIFleetsoftwareupdateFsuDiscoveriesList', 'Get-OCIFleetsoftwareupdateFsuDiscovery', 'Get-OCIFleetsoftwareupdateFsuDiscoveryTargetsList', 'Get-OCIFleetsoftwareupdateFsuJob', 'Get-OCIFleetsoftwareupdateFsuJobOutputContent', 'Get-OCIFleetsoftwareupdateFsuJobOutputsList', 'Get-OCIFleetsoftwareupdateFsuJobsList', 'Get-OCIFleetsoftwareupdateWorkRequest', 'Get-OCIFleetsoftwareupdateWorkRequestErrorsList', 'Get-OCIFleetsoftwareupdateWorkRequestLogsList', 'Get-OCIFleetsoftwareupdateWorkRequestsList', 'Invoke-OCIFleetsoftwareupdateCloneFsuCycle', 'Invoke-OCIFleetsoftwareupdateResumeFsuAction', 'Invoke-OCIFleetsoftwareupdateRetryFsuJob', 'Move-OCIFleetsoftwareupdateFsuActionCompartment', 'Move-OCIFleetsoftwareupdateFsuCollectionCompartment', 'Move-OCIFleetsoftwareupdateFsuCycleCompartment', 'Move-OCIFleetsoftwareupdateFsuDiscoveryCompartment', 'New-OCIFleetsoftwareupdateFsuAction', 'New-OCIFleetsoftwareupdateFsuCollection', 'New-OCIFleetsoftwareupdateFsuCycle', 'New-OCIFleetsoftwareupdateFsuDiscovery', 'Remove-OCIFleetsoftwareupdateFsuAction', 'Remove-OCIFleetsoftwareupdateFsuCollection', 'Remove-OCIFleetsoftwareupdateFsuCollectionTargets', 'Remove-OCIFleetsoftwareupdateFsuCycle', 'Remove-OCIFleetsoftwareupdateFsuDiscovery', 'Remove-OCIFleetsoftwareupdateFsuJob', 'Stop-OCIFleetsoftwareupdateFsuAction', 'Stop-OCIFleetsoftwareupdateFsuDiscovery', 'Update-OCIFleetsoftwareupdateFsuAction', 'Update-OCIFleetsoftwareupdateFsuCollection', 'Update-OCIFleetsoftwareupdateFsuCycle', 'Update-OCIFleetsoftwareupdateFsuDiscovery', 'Update-OCIFleetsoftwareupdateFsuJob' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Fleetsoftwareupdate' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
finddupe_20.ps1
function Get-SHA512([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.SHA512CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } $starttime=[datetime]::now write-host "FindDupe.ps1 - find and optionally delete duplicates. FindDupe.ps1 -help or FindDupe.ps1 -h for usage options." $matches = 0 # initialize number of matches for summary. $filesdeleted = 0 # number of files deleted. $bytesrec = 0 # Number of bytes recovered. if ($args -eq "-help" -or $args -eq "-h") # check for help request, if found display usage options... { "" "Usage:" " PS>.\\FindDupe.ps1 <directory/file #1> <directory/file #2> ... <directory/file #N> [-delete] [-noprompt] [-recurse] [-help]" "Options:" " -recurse recurses through all subdirectories of any specified directories." " -delete prompts to delete duplicates (but not originals.)" " -delete with -noprompt deletes duplicates without prompts (but again not originals.)" " -hidden checks hidden files, default is to ignore hidden files." " -help displays this usage option data, and ignores all other arguments." "" "Examples:" " PS>.\\finddupe.ps1 c:\\data d:\\finance -recurse" " PS>.\\finddupe.ps1 d: -recurse -delete -noprompt" " PS>.\\finddupe.ps1 c:\\users\\alice\\pictures\\ -recurse -delete" exit } # build list of files, by running dir on $args minus elements that have FindDupe.ps1 switches, recursively if specified. $files=(dir ($args | ?{$_ -ne "-delete" -and $_ -ne "-noprompt" -and $_ -ne "-recurse" -and $_ -ne "-hidden"}) -recurse:$([bool]($args -eq "-recurse")) -force:$([bool]($args -eq "-hidden")) |?{$_.psiscontainer -eq $false}) if ($files.count -lt 2) # if the number of files is less than 2, then exit { "Need at least two files to check.`a" exit } for ($i=0;$i -ne $files.count; $i++) # Cycle thru all files { if ($files[$i] -eq $null) {continue} # file was already identified as a duplicate if $null, so do next file $filecheck = $files[$i] # backup file object $files[$i] = $null # erase file object from object database, so it is not matched against itself for ($c=$i+1;$c -lt $files.count; $c++) # cycle through all files again { if ($files[$c] -eq $null) {continue} # $null = file was already checked/matched. if ($filecheck.fullname -eq $files[$c].fullname) {$files[$c]=$null;continue} # If referencing the same file, skip if ($filecheck.length -eq $files[$c].length) # if files match size then check SHA512's { if ($filecheck.SHA512 -eq $null) # if SHA512 is not already computed, compute it { $SHA512 = (get-SHA512 $filecheck.fullname) $filecheck = $filecheck | %{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $SHA512 -passthru} } if ($files[$c].SHA512 -eq $null) # resulting in no file being SHA512'ed twice. { $SHA512 = (get-SHA512 $files[$c].fullname) $files[$c] = $files[$c] | %{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $SHA512 -passthru} } if ($filecheck.SHA512 -eq $files[$c].SHA512) # Size already matched, if SHA512 matches, then it's a duplicate. { write-host "Size and SHA512 match: " -fore red -nonewline write-host "`"$($filecheck.fullname)`" and `"$($files[$c].fullname)`"" $matches += 1 # Number of matches ++ if ($args -eq "-delete") # check if user specified to delete the duplicate { if ($args -eq "-noprompt") # if -delete select, and -noprompt selected { del $files[$c].fullname # then delete the file without prompting write-host "Deleted duplicate: " -f red -nonewline write-host "`"$($files[$c].fullname).`"" } else { del $files[$c].fullname -confirm # otherwise prompt for confirmation to delete } if ((get-item -ea 0 $files[$c].fullname) -eq $null) # check if file was deleted. { $filesdeleted += 1 # update records $bytesrec += $files[$c].length } } $files[$c] = $null # erase file object so it is not checked/matched again. } } } # And loop to next inner loop file } # And loop to next file in outer/original loop write-host "" write-host "Number of Files checked: $($files.count)." # Display useful info; files checked and matches found. write-host "Number of duplicates found: $matches." Write-host "Number of duplicates deleted: $filesdeleted." # Display number of duplicate files deleted and bytes recovered. write-host "$bytesrec bytes recovered." write-host "" write-host "Time to run: $(([datetime]::now)-$starttime|select hours, minutes, seconds, milliseconds)" write-host ""
0
Findup_31.ps1
using System; using System.Collections; using System.Collections.Generic; using System.Text; using System.Security.Cryptography; using System.Runtime.InteropServices; using Microsoft.Win32; using System.IO; using System.Text.RegularExpressions; namespace Findup { public class FileLengthComparer : IComparer<FileInfo> { public int Compare(FileInfo x, FileInfo y) { return (x.Length.CompareTo(y.Length)); } } class Findup { public static Dictionary<string, List<string>> optionspaths = new Dictionary<string, List<string>> { {"/x", new List<string>()},{"/i",new List<string>()},{"/xf",new List<string>()},{"/if",new List<string>()}, {"/xd",new List<string>()},{"/id",new List<string>()},{"/paths",new List<string>()} }; public static Dictionary<string, List<Regex>> optionsregex = new Dictionary<string, List<Regex>> { {"/xr", new List<Regex>()},{"/ir",new List<Regex>()},{"/xfr",new List<Regex>()},{"/ifr",new List<Regex>()}, {"/xdr",new List<Regex>()},{"/idr",new List<Regex>()} }; public static Dictionary<string, Boolean> optionsbools = new Dictionary<string, bool> { { "/recurse", false }, { "/noerr", false }, {"/delete",false}, {"/xj", false}}; public static long numOfDupes, dupeBytes, bytesrecovered, deletedfiles = 0; // number of duplicate files found, bytes in duplicates, bytes recovered from deleting dupes, number of deleted dupes. public static long errors = 0; public static string delconfirm; public static void Main(string[] args) { DateTime startTime = DateTime.Now; Console.WriteLine("Findup.exe v2.0 - By James Gentile - JamesRaymondGentile@gmail.com - 2012."); Console.WriteLine("Findup.exe matches sizes, then SHA512 hashes to identify duplicate files."); Console.WriteLine(" "); string optionskey = "/paths"; List<FileInfo> files = new List<FileInfo>(); int i = 0; for (i = 0; i < args.Length; i++) { string argitem = args[i].ToLower(); if ((System.String.Compare(argitem, "/help", true) == 0) || (System.String.Compare(argitem, "/h", true) == 0)) { Console.WriteLine("Usage: findup.exe <file/directory #1..#N> [/recurse] [/noerr] [/x /i /xd /id /xf /if + [r]] <files/directories/regex> [/delete]"); Console.WriteLine(" "); Console.WriteLine("Options: /help - displays this help message."); Console.WriteLine(" /recurse - recurses through subdirectories when directories or file specifications (e.g. *.txt) are specified."); Console.WriteLine(" /noerr - discards error messages."); Console.WriteLine(" /delete - delete each duplicate file with confirmation."); Console.WriteLine(" /x - eXcludes if full file path starts with (or RegEx matches if /xr) one of the items following this switch until another switch is used."); Console.WriteLine(" /i - include if full file path starts with (or Regex matches if /ir) one of the items following this switch until another switch is used."); Console.WriteLine(" /xd - eXcludes all directories - minus drive/files - (using RegEx if /xdr) including subdirs following this switch until another switch is used."); Console.WriteLine(" /id - Include only directories - minus drive/files - (using RegEx if /idr) including subdirs following this switch until another switch is used."); Console.WriteLine(" /xf - eXcludes all files - minus drive/directories - (using RegEx if /xfr) following this switch until another switch is used."); Console.WriteLine(" /if - Include only files - minus drive/directories - (using RegEx if /ifr) following this switch until another switch is used."); Console.WriteLine(" [r] - Use regex for include/exclude by appending an 'r' to the option, e.g. -ir, -ifr, -idr, -xr, -xfr, -xdr."); Console.WriteLine(" /paths - not needed unless you want to specify files/dirs after an include/exclude without using another non-exclude/non-include option."); Console.WriteLine(" /xj - Exclude File and Directory Junctions."); Console.WriteLine(" "); Console.WriteLine("Examples: findup.exe c:\\\\finances /recurse /noerr /delete"); Console.WriteLine(" - Find dupes in c:\\\\finance."); Console.WriteLine(" - recurse all subdirs of c:\\\\finance."); Console.WriteLine(" - suppress error messages."); Console.WriteLine(" - deletes duplicates after consent is given."); Console.WriteLine(" findup.exe c:\\\\users\\\\alice\\\\plan.txt d:\\\\data /recurse /x d:\\\\data\\\\webpics"); Console.WriteLine(" - Find dupes in c:\\\\users\\\\alice\\\\plan.txt, d:\\\\data"); Console.WriteLine(" - recurse subdirs in d:\\\\data."); Console.WriteLine(" - exclude any files in d:\\\\data\\\\webpics and subdirs."); Console.WriteLine(" findup.exe c:\\\\data *.txt c:\\\\reports\\\\quarter.doc /xfr \\"(jim)\\""); Console.WriteLine(" - Find dupes in c:\\\\data, *.txt in current directory and c:\\\\reports\\\\quarter.doc"); Console.WriteLine(" - exclude any file with 'jim' in the name as specified by the Regex item \\"(jim)\\""); Console.WriteLine(" findup.exe c:\\\\data *.txt c:\\\\reports\\\\*quarter.doc /xr \\"[bf]\\" /ir \\"(smith)\\""); Console.WriteLine(" - Find dupes in c:\\\\data, *.txt in current directory and c:\\\\reports\\\\*quarter.doc"); Console.WriteLine(" - Include only files with 'smith' and exclude any file with letters b or f in the path name as specified by the Regex items \\"[bf]\\",\\"(smith)\\""); Console.WriteLine("Note: Exclude takes precedence over Include."); return; } if (optionsbools.ContainsKey(argitem)) { optionsbools[argitem] = true; optionskey = "/paths"; continue; } if (optionspaths.ContainsKey(argitem) || optionsregex.ContainsKey(argitem)) { optionskey = argitem; continue; } if (optionspaths.ContainsKey(optionskey)) optionspaths[optionskey].Add(args[i]); else { try { Regex rgx = new Regex(args[i], RegexOptions.Compiled); optionsregex[optionskey].Add(rgx); } catch (Exception e) {WriteErr("Regex compilation failed: " + e.Message);} } } if (optionspaths["/paths"].Count == 0) { WriteErr("No files, file specifications, or directories specified. Try findup.exe /help. Assuming current directory."); optionspaths["/paths"].Add("."); } Console.Write("Getting file info and sorting file list..."); getFiles(optionspaths["/paths"], "*.*", files, optionsbools["/recurse"], optionsbools["/xj"]); if (files.Count < 2) { WriteErr("\\nFindup.exe needs at least 2 files to compare. Try findup.exe /help"); Console.WriteLine("\\n"); return; } files.Sort(new FileLengthComparer()); Console.WriteLine("Completed!"); Console.WriteLine("Building dictionary of file sizes, SHA512 hashes and full paths..."); for (i = 0; i < (files.Count - 1); i++) { if (files[i].Length != files[i + 1].Length) continue; var breakout = false; var HashFile = new Dictionary<string, List<FileInfo>>(); long filesize = files[i].Length; while (true) { try { var _SHA512 = SHA512.Create(); using (var fstream = File.OpenRead(files[i].FullName)) { _SHA512.ComputeHash(fstream); } string SHA512string = Hash2String(_SHA512.Hash); if (!HashFile.ContainsKey(SHA512string)) HashFile[SHA512string] = new List<FileInfo>() { }; HashFile[SHA512string].Add(files[i]); } catch (Exception e) { WriteErr("Hash error: " + e.Message); } if (breakout == true) { break; } i++; if (i == (files.Count - 1)) { breakout = true; continue; } breakout = (files[i].Length != files[i + 1].Length); } foreach (var HG in HashFile) { if (HG.Value.Count > 1) // display filenames if number of files in SHA512 Hash Group > 1 { Console.WriteLine("{0:N0} Duplicate files. {1:N0} Bytes each. {2:N0} Bytes total : ", HG.Value.Count, filesize, filesize * HG.Value.Count); foreach (var finfo in HG.Value) { Console.WriteLine(finfo.FullName); numOfDupes++; dupeBytes += filesize; if (optionsbools["/delete"]) if (DeleteDupe(finfo)) { bytesrecovered += filesize; deletedfiles++; } } } } } Console.WriteLine("\\n "); Console.WriteLine("Files checked : {0:N0}", files.Count); // display statistics and return to OS. Console.WriteLine("Duplicate files : {0:N0}", numOfDupes); Console.WriteLine("Duplicate bytes : {0:N0}", dupeBytes); Console.WriteLine("Deleted duplicates : {0:N0}", deletedfiles); Console.WriteLine("Bytes recovered : {0:N0}", bytesrecovered); Console.WriteLine("Errors : {0:N0}", errors); Console.WriteLine("Execution time : " + (DateTime.Now - startTime)); } private static void WriteErr(string Str) { errors++; if (!optionsbools["/noerr"]) Console.WriteLine(Str); } private static string Hash2String(Byte[] hasharray) { string SHA512string = ""; foreach (var c in hasharray) { SHA512string += String.Format("{0:x2}", c); } return SHA512string; } private static Boolean DeleteDupe(FileInfo Filenfo) { Console.Write("Delete this file <y/N> <ENTER>?"); delconfirm = Console.ReadLine(); if ((delconfirm[0] == 'Y') || (delconfirm[0] == 'y')) { try { Filenfo.Delete(); Console.WriteLine("File Successfully deleted."); return true; } catch (Exception e) { Console.WriteLine("File could not be deleted: " + e.Message); } } return false; } private static Boolean CheckNames(string fullname) { var filePart = Path.GetFileName(fullname); // get file name only (e.g. "d:\\temp\\data.txt" -> "data.txt") var dirPart = Path.GetDirectoryName(fullname).Substring(fullname.IndexOf(Path.VolumeSeparatorChar)+2); // remove drive & file (e.g. "d:\\temp\\data.txt" -> "temp") if (CheckNamesWorker(fullname, "/x", "/xr", true)) return false; if (CheckNamesWorker(filePart, "/xf", "/xfr", true)) return false; if (CheckNamesWorker(dirPart, "/xd", "/xdr", true)) return false; if (CheckNamesWorker(fullname, "/i", "/ir", false)) return false; if (CheckNamesWorker(filePart, "/if", "/ifr", false)) return false; if (CheckNamesWorker(dirPart, "/id", "/idr", false)) return false; return true; } private static Boolean CheckNamesWorker(string filestr, string pathskey, string rgxkey, Boolean CheckType) { foreach (var filepath in optionspaths[pathskey]) { if (filestr.ToLower().StartsWith(filepath.ToLower()) == CheckType) return true; } foreach (var rgx in optionsregex[rgxkey]) { if (rgx.IsMatch(filestr) == CheckType) return true; } return false; } private static void getFiles(List<string> pathRec, string searchPattern, List<FileInfo> returnList, Boolean recursiveFlag = true, Boolean xj = true) { foreach (string d in pathRec) { getFiles(d, searchPattern, returnList, recursiveFlag, xj); } } private static void getFiles(string[] pathRec, string searchPattern, List<FileInfo> returnList, Boolean recursiveFlag = true, Boolean xj = true) { foreach (string d in pathRec) { getFiles(d, searchPattern, returnList, recursiveFlag, xj); } } private static void getFiles(string pathRec, string searchPattern, List<FileInfo> returnList, Boolean recursiveFlag = true, Boolean xj = true) { string dirPart; string filePart; if (File.Exists(pathRec)) { try { FileInfo addf = (new FileInfo(pathRec)); if (((addf.Attributes & FileAttributes.ReparsePoint) == 0) || !xj) if (CheckNames(addf.FullName)) returnList.Add(addf); } catch (Exception e) { WriteErr("Add file error: " + e.Message); } } else if (Directory.Exists(pathRec)) { try { DirectoryInfo Dir = new DirectoryInfo(pathRec); if (((Dir.Attributes & FileAttributes.ReparsePoint) == 0) || !xj) foreach (FileInfo addf in (Dir.GetFiles(searchPattern))) { if (((addf.Attributes & FileAttributes.ReparsePoint) == 0) || !xj) if (CheckNames(addf.FullName)) returnList.Add(addf); } } catch (Exception e) { WriteErr("Add files from Directory error: " + e.Message); } if (recursiveFlag) { try { getFiles((Directory.GetDirectories(pathRec)), searchPattern, returnList, recursiveFlag, xj); } catch (Exception e) { WriteErr("Add Directory error: " + e.Message); } } } else { try { filePart = Path.GetFileName(pathRec); dirPart = Path.GetDirectoryName(pathRec); } catch (Exception e) { WriteErr("Parse error on: " + pathRec); WriteErr(@"Make sure you don't end a directory with a \\ when using quotes. The console arg parser doesn't accept that."); WriteErr("Exception: " + e.Message); return; } if (filePart.IndexOfAny(new char[] {'?','*'}) >= 0) { if ((dirPart == null) || (dirPart == "")) dirPart = Directory.GetCurrentDirectory(); if (Directory.Exists(dirPart)) { getFiles(dirPart, filePart, returnList, recursiveFlag, xj); return; } } WriteErr("Invalid file path, directory path, file specification, or program option specified: " + pathRec); } } } }
0
3532.ps1
function Get-ResourceGroupLocation { $namespace = "Microsoft.RecoveryServices" $type = "vaults" $resourceProvider = Get-AzResourceProvider -ProviderNamespace $namespace | where {$_.ResourceTypes[0].ResourceTypeName -eq $type} if ($resourceProvider -eq $null) { return "westus"; } else { return $resourceProvider.Locations[0] } } function Get-RandomSuffix( [int] $size = 8) { $variableName = "NamingSuffix" if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -eq [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Record) { if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Variables.ContainsKey($variableName)) { $suffix = [Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Variables[$variableName] } else { $suffix = @((New-Guid).Guid) [Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Variables[$variableName] = $suffix } } else { $suffix = [Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Variables[$variableName] } return $suffix.Substring(0, $size) } function Create-ResourceGroup( [string] $location) { $name = "PSTestRG" + @(Get-RandomSuffix) $resourceGroup = Get-AzResourceGroup -Name $name -ErrorAction Ignore if ($resourceGroup -eq $null) { New-AzResourceGroup -Name $name -Location $location | Out-Null } return $name } function Cleanup-ResourceGroup( [string] $resourceGroupName) { $resourceGroup = Get-AzResourceGroup -Name $resourceGroupName -ErrorAction Ignore if ($resourceGroup -ne $null) { $vaults = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName foreach ($vault in $vaults) { Remove-AzRecoveryServicesVault -Vault $vault } Remove-AzResourceGroup -Name $resourceGroupName -Force } } function Test-RecoveryServicesVaultCRUD { $location = Get-ResourceGroupLocation $resourceGroupName = Create-ResourceGroup $location $name = "PSTestRSV" + @(Get-RandomSuffix) try { $vault1 = New-AzRecoveryServicesVault -Name $name -ResourceGroupName $resourceGroupName -Location $location Assert-NotNull($vault1.Name) Assert-NotNull($vault1.ID) Assert-NotNull($vault1.Type) Set-AzRecoveryServicesVaultContext -Vault $vault1 $vaults = Get-AzRecoveryServicesVault -Name $name -ResourceGroupName $resourceGroupName Assert-NotNull($vaults) Assert-True { $vaults.Count -gt 0 } foreach ($vault in $vaults) { Assert-NotNull($vault.Name) Assert-NotNull($vault.ID) Assert-NotNull($vault.Type) } $vaultBackupProperties = Get-AzRecoveryServicesBackupProperty -Vault $vault1 Assert-NotNull($vaultBackupProperties.BackupStorageRedundancy) Set-AzRecoveryServicesBackupProperties -Vault $vault1 -BackupStorageRedundancy LocallyRedundant Remove-AzRecoveryServicesVault -Vault $vault1 $vaults = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $name Assert-True { $vaults.Count -eq 0 } } finally { Cleanup-ResourceGroup $resourceGroupName } } function Test-GetRSVaultSettingsFile { $location = Get-ResourceGroupLocation $resourceGroupName = Create-ResourceGroup $location $name = "PSTestRSV" + @(Get-RandomSuffix) try { $vault = New-AzRecoveryServicesVault -Name $name -ResourceGroupName $resourceGroupName -Location $location $file = Get-AzRecoveryServicesVaultSettingsFile -Vault $vault -Backup if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -eq [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Record) { Assert-NotNull $file Assert-NotNull $file.FilePath } } finally { Cleanup-ResourceGroup $resourceGroupName } }
0
Set-OCSUser_1.ps1
###########################################################################" # # NAME: Set-OCSUser.ps1 # # AUTHOR: Jan Egil Ring # EMAIL: jan.egil.ring@powershell.no # # COMMENT: Requires Quest AD cmdlets. This script sets Active Directory user attributes for Microsoft Office Communications Server 2007. # For more info: http://janegilring.wordpress.com/2009/07/23/manage-ocs-users-with-windows-powershell # # You have a royalty-free right to use, modify, reproduce, and # distribute this script file in any way you find useful, provided that # you agree that the creator, owner above has no warranty, obligations, # or liability for such use. # # VERSION HISTORY: # 1.0 23.07.2009 - Initial release # ###########################################################################" $Username="demo.user" $Fullname="Demo User" $serverpool="pool01.ourdomain.com" $oa = @{'msRTCSIP-ArchivingEnabled'=0; 'msRTCSIP-FederationEnabled'=$true; 'msRTCSIP-InternetAccessEnabled'=$true; 'msRTCSIP-OptionFlags'=257; 'msRTCSIP-PrimaryHomeServer'=$serverpool; 'msRTCSIP-PrimaryUserAddress'=("sip:$Username@ourdomain.com"); 'msRTCSIP-UserEnabled'=$true } Set-QADUser $Fullname -oa $oa
0
sample_43_35.ps1
# # Module manifest for module 'OCI.PSModules.Aidocument' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aidocument.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '48b9296a-b4a7-43bb-8d59-3eaf832baf2a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aidocument Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aidocument.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAidocumentModel', 'Get-OCIAidocumentModelsList', 'Get-OCIAidocumentProcessorJob', 'Get-OCIAidocumentProject', 'Get-OCIAidocumentProjectsList', 'Get-OCIAidocumentWorkRequest', 'Get-OCIAidocumentWorkRequestErrorsList', 'Get-OCIAidocumentWorkRequestLogsList', 'Get-OCIAidocumentWorkRequestsList', 'Invoke-OCIAidocumentAnalyzeDocument', 'Invoke-OCIAidocumentPatchModel', 'Move-OCIAidocumentModelCompartment', 'Move-OCIAidocumentProjectCompartment', 'New-OCIAidocumentModel', 'New-OCIAidocumentProcessorJob', 'New-OCIAidocumentProject', 'Remove-OCIAidocumentModel', 'Remove-OCIAidocumentProject', 'Stop-OCIAidocumentProcessorJob', 'Stop-OCIAidocumentWorkRequest', 'Update-OCIAidocumentModel', 'Update-OCIAidocumentProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aidocument' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_45_84.ps1
ConvertFrom-StringData @' EnvironmentErrorAlreadyExists=Bu adda ve türde bir ortam değişkeni zaten var. EnvironmentErrorDoesNotExists=Bu adda ve türde bir ortam değişkeni yok. '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWIyGdoQMJ/x6U # 7uom6WVVjDDsgHh0SA5d2Jh+64bqEqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOyPJS5Q6bhrG3vOrrMDlrNU # JfCvZrVxcLQBoUtWZSHIMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAsdF9X4tfSiC7xC0CYIW+ZWv0HxXX8FHZ8PdT4YWdVkACD1QC+EzpZHM2 # 8PAOJ103hfDIFF75FcpkwpZ5ncAQCS+csHvsMvYzTY8+4oac8gTLiQpKQnhGWdLf # pSPvQHVF2B4sEF/UkcT2nokFMlCPW/T+NIOZqhw/PtUVKduDlDvbn+KTcahbHTBg # yDghyY+McRpRACw/lu6RTzQbWkLzRHvHi5CNt981m/CpDyNn2y2RMBV6kh39Au0h # 2z+tPIm8OPh46hWi5x+pnUVG6SrxRPSqQpiPemjK/mDJ/DGyo3qyY5y6tEsPUoH6 # ty5YW96XODmrOdidq45mFC89T/PcPaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDsXvZTmRIlr1pEQUQ28621toh8o29XHt2EkmBKB/CkigIGZZ/4hB1a # GBMyMDI0MDEzMDE4MjgzMi4xOTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAdebDR5XLoxRjgABAAAB1zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MzdaFw0yNDAyMDExOTEyMzdaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDErGCkN2X/UvuNCcfl0yVBNo+LIIyzG7A10X5kVgGn # p9s8mf4aZsukZu5rvLs7NqaNExcwnPuHIWdp6kswja1Yw9SxTX+E0leq+WBucIRK # WdcMumIDBgLE0Eb/3/BY95ZtT1XsnnatBFZhr0uLkDiT9HgrRb122sm7/YkyMigF # kT0JuoiSPXoLL7waUE9teI9QOkojqjRlcIC4YVNY+2UIBM5QorKNaOdz/so+TIF6 # mzxX5ny2U/o/iMFVTfvwm4T8g/Yqxwye+lOma9KK98v6vwe/ii72TMTVWwKXFdXO # ysP9GiocXt38cuP9c8aE1eH3q4FdGTgKOd0rG+xhCgsRF8GqLT7k58VpQnJ8u+yj # RW6Lomt5Rcropgf9EH8e4foDUoUyU5Q7iPgwOJxYhoKxRjGZlthDmp5ex+6U6zv9 # 5rd973668pGpCku0IB43L/BTzMcDAV4/xu6RfcVFwarN/yJq5qfZyMspH5gcaTCV # AouXkQTc8LwtfxtgIz53qMSVR9c9gkSnxM5c1tHgiMX3D2GBnQan95ty+CdTYAAh # jgBTcyj9P7OGEMhr3lyaZxjr3gps6Zmo47VOTI8tsSYHhHtD8BpBog39L5e4/lDJ # g/Oq4rGsFKSxMXuIRZ1E08dmX67XM7qmvm27O804ChEmb+COR8Wb46MFEEz62ju+ # xQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFK6nwLv9WQL3NIxEJyPuJMZ6MI2NMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBSBd3UJ+IsvdMCX+K7xqHa5UBtVC1CaXZv # HRd+stW0lXA/dTNneCW0TFrBoJY59b9fnbTouPReaku2l3X5bmhsao6DCRVuqcmh # VPAZySXGeoVfj52cLGiyZLEw6TQzu6D++vjNOGmSibO0KE9Gdv8hQERx5RG0KgrT # mk8ckeC1VUqueUQHKVCESqTDUDD8dXTLWCmm6HqmQX6/+gKDSXggwpc75hi2AbKS # o4tulMwTfXJdGdwrsiHjkz8nzIW/Z3PnMgGFU76KuzYFV0XyH9DTS/DPO86RLtQj # A5ZlVGymTPfTnw7kxoiLJN/yluMHIkHSzpaJvCiqX+Dn1QGREEnNIZeRekvLourq # PREIOTm1bJRJ065c9YX7bJ0naPixzm5y8Y2B+YIIEAi4jUraOh3oE7a4JvIW3Eg3 # oNqP7qhpd7xMLxq2WnM+U9bqWTeT4VCopAhXu2uGQexdLq7bWdcYwyEFDhS4Z9N0 # uw3h6bjB7S4MX96pfYSEV0MKFGOKbmfCUS7WemkuFqZy0oNHPPx+cfdNYeSF6bhO # PHdsro1EVd3zWIkdD1G5kEDPnEQtFartM8H+bv5zUhAUJs8qLzuFAdBZQLueD9XZ # eynjQKwEeAz63xATICh8tOUM2zMgSEhVL8Hm45SB6foes4BTC0Y8SZWov3Iahtvw # yHFbUqs1YjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAx # W9uizG3hEY89uL2uu+X+mG/rdaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6WODBDAiGA8yMDI0MDEzMDE0MTUz # MloYDzIwMjQwMTMxMTQxNTMyWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpY4ME # AgEAMAcCAQACAi6RMAcCAQACAhMsMAoCBQDpZNSEAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBADZFJ1QEa2jqoULGnL52fDha1QtxPd9xIQih+STybbWSoso2 # +lM9g7ojTjjpq4XNR1Yx8owMrClUV+mLXnYUe1hIt7/IovC7mOwvbkIUf4IHe/4h # IPA/gu6ndaRxDMCDhOLAteHeJoz8no/ky2D6Q30Ww9erkmhUqNsXM5cDUa95aOYn # PVkqsRKY5Wbh0ic1dhyJzDEDpM+MBeOym7XGNEnIUrYrfuTHN0+NbIGGjwAJ+XkJ # Ko2v+Q7mxuQcKRqSlAqnxnXZYeryl6MJxffgoBCUw+BCkmEEGkuneNGFzmPV0kJu # zgln3Xws1n8hGkzNXnqdYbZIPb4vY+OR3YUuAywxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdebDR5XLoxRjgABAAAB1zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCG91XR9pv8tJCX/l/dMkIy+pEZWYT+zyyW9hJL4f2CjDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIJzePl5LXn1PiqNjx8YN7TN1ZI0d # 1ZX/2zRdnI97rJo7MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHXmw0eVy6MUY4AAQAAAdcwIgQgKE/P/AnV6rfAAqqmG9sIsf7cs2y9 # 4l1rL/nGKD80LwAwDQYJKoZIhvcNAQELBQAEggIAnhZIR66Xz2raN2oWBNwN9kyO # hzyWFg6tXPI266QzXKVqPx3cMOFjjJHoDOcGAc1IAcmyJPbETiJdAHyoxpbZluYy # /zRt1IduYGPhEtAELjtaHfOIH6gR24bLhMSKyMafZEVH2/z8f0reXbEqf2zALAA0 # rKsMx+LD7akRR6ykQyr9ypbBKmd0i+frROR0PB8h7nEccncMNDUypzg8Jded6x7A # 77qttBp7sOY2VGll1jT8am1PETcSFq9mpKmMzhIfLCL0mCJpZTnqZF5thtA1wYbz # G+RUl7yTZgr0fsRNYQrnq7Eze9mNO6h2VysMc9nN7+u/fHV3EmR8vtHjtmV74+1t # hcm6/a46CXdZQRNJ+X3xAnamH1Prkp8i0GEc0v+a6oQ8dflDqmGT5tAadsxBJTun # IJupWyvfJq8WfuZ7rO8M6JfO7m9Ixxr5vB/wUB41OYDh0V25C3iz9FoBMJ6W7iP6 # EMz16T5FXf5GRzyVqk9mWaOchMWpJPHMVfxNCobF2p4klpHRmVPYNT33HMTcO6Wo # X5xUC3jHiFyUIu9dPYygleXDMOehlURD9C85V6EI69+q/lQkon3KUhdJbXw43ina # VmpBfEOPNyLPX8a1+SuceKIayf3w7dCQzDAekz4O3pYreFKiU0rYhgqj6FbKXbke # Ewacz4t7v+ZC+qdF210= # SIG # End signature block
0
sample_16_15.ps1
trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ continue } If (!$Is_SiteServer) { TraceOut "ConfigMgr Site Server not detected. This script gathers data only from a Site Server. Exiting." exit 0 } TraceOut "Started" Import-LocalizedData -BindingVariable ScriptStrings $sectiondescription = "Configuration Manager Server Information" # ---------------- # Write Progress # ---------------- Write-DiagProgress -Activity $ScriptStrings.ID_SCCM_ACTIVITY_CM07ServerInfo -Status $ScriptStrings.ID_SCCM_CM07ServerInfo_ServerInfo TraceOut " Getting Server Information" # ---------------------- # Current Time: # ---------------------- AddTo-CMServerSummary -Name "Current Time" -Value $CurrentTime # ------------- # Computer Name # ------------- AddTo-CMServerSummary -Name "Server Name" -Value $ComputerName # ---------- # Site Code # ---------- $Temp = Get-RegValueWithError ($Reg_SMS + "\Identification") "Site Code" AddTo-CMServerSummary -Name "Site Code" -Value $Temp # ---------- # Site Code # ---------- $Temp = Get-RegValueWithError ($Reg_SMS + "\Identification") "Parent Site Code" AddTo-CMServerSummary -Name "Parent Site Code" -Value $Temp # ---------- # Site Type # ---------- # $SiteType = Get-RegValueWithError ($Reg_SMS + "\Setup") "Type" If ($SiteType -eq 8) { AddTo-CMServerSummary -Name "Site Type" -Value "Central Administration Site" } ElseIf ($SiteType -eq 1) { AddTo-CMServerSummary -Name "Site Type" -Value "Primary Site" } ElseIf ($SiteType -eq 2) { AddTo-CMServerSummary -Name "Site Type" -Value "Secondary Site" } else { AddTo-CMServerSummary -Name "Site Type" -Value $SiteType } # ------------- # Site Version # ------------- $Temp = Get-RegValueWithError ($Reg_SMS + "\Setup") "Full Version" AddTo-CMServerSummary -Name "Site Version" -Value $Temp # ---------------- # Monthly Version # ---------------- if ($global:SiteType -eq 2) { AddTo-CMServerSummary -Name "MonthlyReleaseVersion" -Value "Not Available on a Secondary Site" } else { $Temp = Get-CimInstance -Computer $SMSProviderServer -Namespace $SMSProviderNamespace -Class SMS_Identification -ErrorAction SilentlyContinue If ($Temp -is [CimInstance]) { AddTo-CMServerSummary -Name "MonthlyReleaseVersion" -Value $Temp.MonthlyReleaseVersion } else { AddTo-CMServerSummary -Name "MonthlyReleaseVersion" -Value "Not Available" } } # ------------- # CU Level # ------------- $Temp = Get-RegValueWithError ($Reg_SMS + "\Setup") "CULevel" AddTo-CMServerSummary -Name "CU Level" -Value $Temp # ------------- # ADK Version # ------------- $global:ADKVersion = Get-ADKVersion AddTo-CMServerSummary -Name "ADK Version" -Value $global:ADKVersion # ---------------------------------------------------------- # Installation Directory - defined in utils_ConfigMgr12.ps1 # ---------------------------------------------------------- If ($null -ne $SMSInstallDir) { AddTo-CMServerSummary -Name "Installation Directory" -Value $SMSInstallDir } else { AddTo-CMServerSummary -Name "Installation Directory" -Value "Error obtaining value from Registry" } # ----------------- # Provider Location # ----------------- if ($global:SiteType -eq 2) { AddTo-CMServerSummary -Name "Provider Location" -Value "Not available on a Secondary Site" } else { If ($null -ne $global:SMSProviderServer) { AddTo-CMServerSummary -Name "Provider Location" -Value $SMSProviderServer } else { AddTo-CMServerSummary -Name "Provider Location" -Value "Error obtaining value from Registry" } } # ----------- # SQL Server # ----------- $Temp = Get-RegValue ($Reg_SMS + "\SQL Server\Site System SQL Account") "Server" AddTo-CMDatabaseSummary -Name "SQL Server" -Value $Temp -NoToSummaryQueries # -------------- # Database Name # -------------- $Temp = Get-RegValueWithError ($Reg_SMS + "\SQL Server\Site System SQL Account") "Database Name" AddTo-CMDatabaseSummary -Name "Database Name" -Value $Temp -NoToSummaryQueries # ---------------- # SQL Ports # ---------------- $Temp = Get-RegValueWithError ($Reg_SMS + "\SQL Server\Site System SQL Account") "Port" AddTo-CMDatabaseSummary -Name "SQL Port" -Value $Temp -NoToSummaryQueries $Temp = Get-RegValueWithError ($Reg_SMS + "\SQL Server\Site System SQL Account") "SSBPort" AddTo-CMDatabaseSummary -Name "SSB Port" -Value $Temp -NoToSummaryQueries # ----------------------- # SMSExec Service Status # ----------------------- $Temp = Get-Service | Where-Object {$_.Name -eq 'SMS_Executive'} | Select-Object Status If ($null -ne $Temp) { if ($Temp.Status -eq 'Running') { $Temp2 = Get-Process | Where-Object {$_.ProcessName -eq 'SMSExec'} | Select-Object StartTime AddTo-CMServerSummary -Name "SMS_Executive Status" -Value "Running. StartTime = $($Temp2.StartTime)" } else { AddTo-CMServerSummary -Name "SMS_Executive Status" -Value $Temp.Status } } Else { AddTo-CMServerSummary -Name "SMS_Executive Status" -Value "ERROR: Service Not found" } # ----------------------- # SiteComp Service Status # ----------------------- $Temp = Get-Service | Where-Object {$_.Name -eq 'SMS_SITE_COMPONENT_MANAGER'} | Select-Object Status If ($null -ne $Temp) { if ($Temp.Status -eq 'Running') { $Temp2 = Get-Process | Where-Object {$_.ProcessName -eq 'SiteComp'} | Select-Object StartTime AddTo-CMServerSummary -Name "SiteComp Status" -Value "Running. StartTime = $($Temp2.StartTime)" } else { AddTo-CMServerSummary -Name "SiteComp Status" -Value $Temp.Status } } Else { AddTo-CMServerSummary -Name "SiteComp Status" -Value "ERROR: Service Not found" } # ---------------------- # SMSExec Thread States # ---------------------- $TempFileName = $ComputerName + "_CMServer_SMSExecThreads.TXT" $OutputFile = join-path $Env:windir ("TEMP\" + $TempFileName) Get-ItemProperty HKLM:\Software\Microsoft\SMS\Components\SMS_Executive\Threads\* -ErrorAction SilentlyContinue -ErrorVariable DirError ` | Select-Object PSChildName, 'Current State', 'Startup Type', 'Requested Operation', DLL ` | Sort-Object @{Expression='Current State';Descending=$true}, @{Expression='PSChildName';Ascending=$true} ` | Format-Table -AutoSize | Out-String -Width 200 | Out-File -FilePath $OutputFile If ($DirError.Count -eq 0) { CollectFiles -filesToCollect $OutputFile -fileDescription "SMSExec Thread States" -sectionDescription $sectiondescription -noFileExtensionsOnDescription AddTo-CMServerSummary -Name "SMSExec Thread States" -Value "Review $TempFileName" -NoToSummaryReport Remove-Item $OutputFile -Force } else { AddTo-CMServerSummary -Name "SMSExec Thread States" -Value ("ERROR: " + $DirError[0].Exception.Message) -NoToSummaryReport $DirError.Clear() } # ----------------- # SQL Server SPN's # ----------------- #TraceOut " Getting SQL SPNs" #$TempFileName = ($ComputerName + "_CMServer_SQLSPN.TXT") #$FileToCollect = join-path $pwd.Path $TempFileName #$CmdToRun = ".\psexec.exe /accepteula -s $pwd\ldifde2K3x86.exe -f $FileToCollect -l serviceprincipalname -r `"(serviceprincipalname=MSSQLSvc/$ConfigMgrDBServer*)`" -p subtree" #RunCmD -commandToRun $CmdToRun -collectFiles $false #If (Test-Path $FileToCollect) { # If ((Get-Content $FileToCollect) -ne $null) { # If ((Get-Content $FileToCollect) -ne "") { # CollectFiles -filesToCollect $FileToCollect -fileDescription "SQL SPNs" -sectionDescription $sectiondescription -noFileExtensionsOnDescription # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Review $TempFileName") -NoToSummaryReport # } # Else { # TraceOut " No SPN's found. Output file was null." # # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Error. No SPNs found!") -NoToSummaryReport # } # } # Else { # TraceOut " No SPN's found. Output file was empty." # # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Error. No SPNs found!") -NoToSummaryReport # } #} #Else { # TraceOut " No SPN's found. Output file was not found." # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Error. SPN Query Failed!") -NoToSummaryReport #} # ---------------- # Write Progress # ---------------- Write-DiagProgress -Activity $ScriptStrings.ID_SCCM_ACTIVITY_CM07ServerInfo -Status $ScriptStrings.ID_SCCM_CM07ServerInfo_Hierarchy TraceOut " Getting Site Hierarchy" # ------------------ # Hierarchy Details # ------------------ $TempFileName = $ComputerName + "_CMServer_Hierarchy.txt" $OutputFile = join-path $Env:windir ("TEMP\" + $TempFileName) Run-DiagExpression .\GetCM12Hierarchy.ps1 IF (Test-Path $OutputFile) { CollectFiles -filesToCollect $OutputFile -fileDescription "Hierarchy Details" -sectionDescription $sectiondescription -noFileExtensionsOnDescription AddTo-CMServerSummary -Name "Hierarchy Details" -Value ("Review $TempFileName") -NoToSummaryReport Remove-Item $OutputFile -Force } <# $CommandLineToExecute = $Env:windir + "\system32\cscript.exe GetCM12Hierarchy.VBS" If (($RemoteStatus -eq 0) -or ($RemoteStatus -eq 1)) { # Local Execution If ($null -eq $global:DatabaseConnectionError) { RunCmD -commandToRun $CommandLineToExecute -sectionDescription $sectiondescription -filesToCollect $OutputFile -fileDescription "Hierarchy Details" -noFileExtensionsOnDescription AddTo-CMServerSummary -Name "Hierarchy Details" -Value ("Review $TempFileName") -NoToSummaryReport Remove-Item $OutputFile -Force } Else { AddTo-CMServerSummary -Name "Hierarchy Details" -Value $DatabaseConnectionError -NoToSummaryReport } } #> # ---------------- # Write Progress # ---------------- Write-DiagProgress -Activity $ScriptStrings.ID_SCCM_ACTIVITY_CM07ServerInfo -Status $ScriptStrings.ID_SCCM_CM07ServerInfo_FileVer TraceOut " Getting File Versions" # --------------------- # Binary Versions List # --------------------- $TempFileName = ($ComputerName + "_CMServer_FileVersions.TXT") $OutputFile = join-path $pwd.path $TempFileName Get-ChildItem ($SMSInstallDir + "\bin") -recurse -include *.dll,*.exe -ErrorVariable DirError -ErrorAction SilentlyContinue | ` ForEach-Object {[System.Diagnostics.FileVersionInfo]::GetVersionInfo($_)} | ` Select-Object FileName, FileVersion, ProductVersion | Format-Table -AutoSize | ` Out-File $OutputFile -Width 1000 If ($DirError.Count -eq 0) { CollectFiles -filesToCollect $OutputFile -fileDescription "Server File Versions" -sectionDescription $sectiondescription -noFileExtensionsOnDescription AddTo-CMServerSummary -Name "File Versions" -Value ("Review $TempFileName") -NoToSummaryReport } else { AddTo-CMServerSummary -Name "File Versions" -Value ("ERROR: " + $DirError[0].Exception.Message) -NoToSummaryReport $DirError.Clear() } # -------------------- # RCM Inbox File List # -------------------- TraceOut " Getting File List for RCM.box" $TempFileName = ($ComputerName + "_CMServer_RCMFileList.TXT") $OutputFile = join-path $pwd.path $TempFileName Get-ChildItem ($SMSInstallDir + "\inboxes\RCM.box") -Recurse -ErrorVariable DirError -ErrorAction SilentlyContinue | ` Select-Object CreationTime, LastAccessTime, FullName, Length, Mode | Sort-Object FullName | Format-Table -AutoSize | ` Out-File $OutputFile -Width 1000 If ($DirError.Count -eq 0) { AddTo-CMServerSummary -Name "RCM.box File List" -Value ("Review $TempFileName") -NoToSummaryReport CollectFiles -filesToCollect $OutputFile -fileDescription "RCM.box File List" -sectionDescription $sectiondescription -noFileExtensionsOnDescription } else { AddTo-CMServerSummary -Name "RCM.box File List" -Value ("ERROR: " + $DirError[0].Exception.Message) -NoToSummaryReport $DirError.Clear() } # Server Info File is collected in DC_CM12SQLInfo.ps1. Need to make sure this script runs before that. # $ServerInfo | Out-File $ServerInfoFile -Append -Width 200 TraceOut "Completed" # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBuLz0GycFAQ7KQ # LfpRFMTYdSduKXDIMT/Km56vXh0X9aCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINN2r62K9efzFqmqClW8HZZ4 # EiEUDo7jgH7RuqUeykhVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAhK/DNPiVO2UFTKiwcxbcIaNPfjV6zEjpxLIs0NbXrXur6PlOA01qDI7N # C53HjHNe1LRC5rp0h6nwwxxv1JASDx6MQWUc5+4HJInFnZlWXlj6Q6sZ+dFQUiws # Az5dCbS8azp4jsc6/W1nUlhFor6tow/LsW+W/2S5dGiZhNyvWBEa8ZEFEGwCu+O3 # 2ebtocTDIFJ8sqdaCVXcbPJzBNOUdw+3pep5emg9Bjgiq5Ku2TySWZnAx1UrjhVx # clpXpH1tDFPYQvx9PlLJCUBZND1I462hFFH2neHCeigv8bCViYr/WPW8WgPDwFMq # 2kIm/ECBkzjKsSg/ecJzGRfpY4W9BaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD5h7js0uX/xprpcS1w4HLYZ8UCVHRfmVcWnGLRPPtKEQIGZxqBxlgG # GBMyMDI0MTAyODExNDA0Mi4yMzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAiGA8yMDI0MTAyODA1MTkw # M1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZ1H # AgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFWM2U6+uXp/lZFN9GfKyEA # trE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fVKJCew6OG7JkRgr5zDklX # ZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnrKlnQGDVkrOH7GF9HYG+2 # JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5dTdvC9qaCYqt+eSrC5+s # 3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnmV9xpIrErypW2LN6/e4lr # LQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAgUsdylc26QNxX0nGAl0D4j13aeEtJzbM6kMScqnCPUzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ # T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5Weq4WPeaZKqGRCLipnTqgX # s5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIA4DBQhKoqmyTt0q/nerXxhkXt # 2aB6hZqAOVAz+2fTWmYfhlAtT/6KQ9smOpMdAMXhMOcM3I/y7O3lPvWWxrvXmOsa # HwH7T+WWTwJdQEzKTbjvK+bpDskMTofTdOcRr61uoTjQ6RlrlouVci0b0Bi8f7Ts # XqiKOhMUtS/pKPp1VHLaMJ2xX1M7X8+9ZjTHT4E0K8xTPRAYj31JKKXLnBpQj27U # M/C4GsqIyPAYEWexovwoAFsFi6fnl4VMv5HzLg/Vybke74x8qvabVIUbOif8O2PR # YzOOXd18zXQ4GX1kYG1H2EkRakbgW5KZ46yU18Gq2+Q3qtRkl1FH8xwnYlG5ddsk # GGxOVI7BZZJFTzHcNNNWMFjDMhu7R/zDh3mGLvmDOLAQ/1+HPcU6lFsOboCycjtR # y8lYg2G6P4dbeMOOhA8Ys3PiH0u6SgLQ+KxbURV9hhD3eMDDYETxg0QDBpHJjERD # C2LJ5iYQbRbTqLPqgBXP6eU282EW65pBmSdXnCQdFa1w0y77Mz0ztbdeXWgsyw6P # 0DMyuWIM6IE8LfM/IWWHBGs0Vt6U5NJ44nhJlunuG33QY1YIEhh/kCr6ogEginrw # /TE7HneFNN0sNVyaPmeGdDuYjgR7k208Ynpu1avmC8bjsx37mkYfgamJw4AsTuhz # cWbwZmbcUXCJlcdxZf4= # SIG # End signature block
0
sample_17_12.ps1
ConvertFrom-StringData @' id_mats_networkadapter=Network Adapter id_mats_networkadaptertype=Type id_mats_networkadapterspeed=Speed id_mats_ipaddresses=IP Addresses id_mats_defaultgateway=Default Gateway id_mats_dnsservers=DNS Servers id_mats_proxyenabled=Proxy Server id_enabled=Enabled id_mats_proxyserveradd=Proxy Server Adress id_mats_proxyoverride=Do not use proxy server for id_disabled=Disabled id_mats_proxyautosettings=Automatic Detect Settings id_mats_proxyautoscript=Automatic Configuration Script '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA/aq2Uw1Njui02 # IIFaeazcleKpj9aBjTCRakn0T8AJJ6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIGQBdIlEie2TGST+FFAlEv8 # Y6IwcXy3cFxyhg32Suq8MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZlnJNS964vb52LXffOJQSsZQiybz+uO3rFqqQowqm2P01n3mxZY26g51 # QBd7X6pKwqFoL7P4mX7NEu/sWsdIBGaatZlSCEG5wJwmyNanf+99ztvsUEeZ/o8p # 2E2mSBudH8IC3gCTixGnUosxej6bM0X2eQ1MXWZdW2sL+A+ij/II+zVSAntGbiza # iaUtsVX/7IEgQmPFfuGyv9Bpir2tzgcmrAbMgkHJUdRbRcxpi3TVWuChmXJK7cG3 # O/QtZ7oL7GpjsL0HAZwF+ZLD0VD75hsAhrIHw0v4HZvDGTkHohdTBYunJ6zorHIz # 8CsN6rYKrBUaLmY+DZp3y/4Cd/PUS6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDRHK4aAPrE7dIvR9QD987uFRcXYtjIqqRT3QIn3Jix3QIGZxqDjw9o # GBMyMDI0MTAyODExNDA0MS4yNDJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAiGA8yMDI0MTAyODA1MjYz # OVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZ8P # AgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQLdf34GsB8soqvapDL1eR # rPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54lVtv7R+ycSEZGir7KV1C # Tjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+80FYKXx5iFqcvs69kQXm # xZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwEh/jYgYnNOS/PJdyHj/Fy # fhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQFig7Ouj24B3wbU2l1uyvo # 5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4GzqtlwfwxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB # 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAWLtfoY7fKmKgOdGn/XCODUYCzOHgvrh7nuOBv2jAF # RzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q # FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3SpcmzGLGE6OkDlhx79aiWy # SoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIAAMboz02V3xxkkzUvEhAW # LCEK2+r58/o5RhftpkkAKI+UYpDCB+mVFa5kZ3UDJL847or4L9ip0EUmv6Fj6e2a # Vsvrvl9q6PH51sDysSmNfNIOC5zKIa8cHFenSrdT0rEeKoUTFFxwJHDCKH/edu+x # lQxgqMfgKi1tlpzPMlWXQMBiOUQ4tZUKnAahMFQALtaRIkMB7bBXgAIFzsM3Lx/K # C7IR7g6I6kYwobRpAYLBvPUEuyXH3CPqv3nnJexOHeV4ZKcwQc5HSkLz2GbGwO2j # B2kixbj2kBUoF8RqDJfiSRb/Z+iNXoX6eSNbugrTHR5IOOGxxCIBMHcHnqgnduIT # fGuWL+82Vz9CxglAvlQ6B7dVgFOvULWyNEbRv538cR+5BeoghV1pj+lB483ygc6C # K9wt6fIjbG2m+vPOCZfFo2J6tWP/PaO6xOizwbrbep7VBe1aTwr9YUAb3rSepv0O # GWRjayYc8z6wu1LdTIKmegCCx46bpL5/GQdmufZhysfb+II0rGAw0Gbc4ylUTOJH # PAqhzKEoz3lAVAOwzQ6n/DgYxnaIxWf0Uwn4KlNLZPP1ePRK2+WY6iFc6if3dWSy # GORbut4/2+xAl2jS/IC/0yy/omWcM6bXYtH57VSH4Zx0++lWFj7M1WWGNGXtsaZF # JOLFiNmCPE9dh8AUDCTf21k= # SIG # End signature block
0
Run-Defrag_3.ps1
# Run-Defrag # Defragments the targeted hard drives. # # Args: # $server: A target Server 2003 or 2008 system # $drive: An optional drive letter. If this is blank then all # drives are defragmented # $force: If this switch is set then a defrag will be forced # even if the drive is low on space # # Returns: # The result description for each drive. function Run-Defrag { param([string]$server, [string]$drive, [switch]$force) [string]$query = 'Select * from Win32_Volume where DriveType = 3' if ($drive) { $query += " And DriveLetter LIKE '$drive%'" } $volumes = Get-WmiObject -Query $query -ComputerName $server foreach ($volume in $volumes) { Write-Host "Defragmenting $($volume.DriveLetter)..." -noNewLine $result = ($volume.Defrag($force)).ReturnValue switch ($result) { 0 {Write-Host 'Success'} 1 {Write-Host 'Access Denied'} 2 {Write-Host 'Not Supported'} 3 {Write-Host 'Volume Dirty Bit Set'} 4 {Write-Host 'Not Enough Free Space'} 5 {Write-Host 'Corrupt MFT Detected'} 6 {Write-Host 'Call Cancelled'} 7 {Write-Host 'Cancellation Request Requested Too Late'} 8 {Write-Host 'Defrag In Progress'} 9 {Write-Host 'Defrag Engine Unavailable'} 10 {Write-Host 'Defrag Engine Error'} 11 {Write-Host 'Unknown Error'} } } }
0
Import-Certificate_6.ps1
#requires -Version 2.0 function Import-Certificate { param ( [IO.FileInfo] $CertFile = $(throw "Paramerter -CertFile [System.IO.FileInfo] is required."), [string[]] $StoreNames = $(throw "Paramerter -StoreNames [System.String] is required."), [switch] $LocalMachine, [switch] $CurrentUser, [string] $CertPassword, [switch] $Verbose ) begin { [void][System.Reflection.Assembly]::LoadWithPartialName("System.Security") } process { if ($Verbose) { $VerbosePreference = 'Continue' } if (-not $LocalMachine -and -not $CurrentUser) { Write-Warning "One or both of the following parameters are required: '-LocalMachine' '-CurrentUser'. Skipping certificate '$CertFile'." } try { if ($_) { $certfile = $_ } $cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2 $certfile,$CertPassword } catch { Write-Error ("Error importing '$certfile': $_ .") -ErrorAction:Continue } if ($cert -and $LocalMachine) { $StoreScope = "LocalMachine" $StoreNames | ForEach-Object { $StoreName = $_ if (Test-Path "cert:\\$StoreScope\\$StoreName") { try { $store = New-Object System.Security.Cryptography.X509Certificates.X509Store $StoreName, $StoreScope $store.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) $store.Add($cert) $store.Close() Write-Verbose "Successfully added '$certfile' to 'cert:\\$StoreScope\\$StoreName'." } catch { Write-Error ("Error adding '$certfile' to 'cert:\\$StoreScope\\$StoreName': $_ .") -ErrorAction:Continue } } else { Write-Warning "Certificate store '$StoreName' does not exist. Skipping..." } } } if ($cert -and $CurrentUser) { $StoreScope = "CurrentUser" $StoreNames | ForEach-Object { $StoreName = $_ if (Test-Path "cert:\\$StoreScope\\$StoreName") { try { $store = New-Object System.Security.Cryptography.X509Certificates.X509Store $StoreName, $StoreScope $store.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) $store.Add($cert) $store.Close() Write-Verbose "Successfully added '$certfile' to 'cert:\\$StoreScope\\$StoreName'." } catch { Write-Error ("Error adding '$certfile' to 'cert:\\$StoreScope\\$StoreName': $_ .") -ErrorAction:Continue } } else { Write-Warning "Certificate store '$StoreName' does not exist. Skipping..." } } } } end { } }
0
Invoke-ExecuteTSQL .ps1
####################### <# .SYNOPSIS Execute T-SQL Statments and return messages from SQL Server (print). .DESCRIPTION Execute T-SQL Statments and return messages from SQL Server (print). .INPUTS None You cannot pipe objects to Invoke-ExecuteTSQL .OUTPUTS PSObject : Boolean Exitcode = $True or $False indicating if the query ran successfully String ErrorMessage = The ErrorMessage if not ran successfully String Message = Messages from SQL Server (print) .EXAMPLE Invoke-ExecuteTSQL -SQLInstanceName . -DatabaseName YourDB -UserName YourUserName -PassWord YourPassword -Query $Query -verbose This command runs a T-SQL Query using UserName and Password .EXAMPLE Invoke-ExecuteTSQL -SQLInstanceName . -DatabaseName YourDB -Query $Query -verbose This command runs a T-SQL Query using TrustedConnection .LINK Invoke-ExecuteTSQL #> function Invoke-ExecuteTSQL { [cmdletbinding()] Param( [Parameter(Position=0,Mandatory = $true)] [ValidateNotNullorEmpty()] [string]$SQLInstanceName, [Parameter(Position=1,Mandatory = $true)] [ValidateNotNullorEmpty()] [string]$DatabaseName, [Parameter(Position=2)] [string]$UserName, [Parameter(Position=3)] [string]$PassWord, [Parameter(Position=4,Mandatory = $true)] [ValidateNotNullorEmpty()] [string]$Query ) function Get-SQLConnectionEvent($EventID) { write-output (Get-Event -SourceIdentifier $EventID -ErrorAction SilentlyContinue | Select -ExpandProperty SourceEventArgs | Select -ExpandProperty message) Remove-Event -SourceIdentifier $EventID -ErrorAction SilentlyContinue } try { if($Username -and $Password) { Write-Verbose "Connecting to SQL Server using trusted connection" $SqlConnection.ConnectionString = "Server=$($SQLInstanceName);Database=$($DatabaseName);Integrated Security=True" } else { Write-Verbose "Connecting to SQL Server using Username and Password" $SqlConnection.ConnectionString = "Server=$($SQLInstanceName);Database=$($DatabaseName);UID=$($Username);PWD=$($Password)" } $SqlConnection = New-Object System.Data.SqlClient.SqlConnection $SqlConnection.ConnectionString = "Server=localhost;Database=confio;Integrated Security=True" $eventID = "SQLConnectionEvent$(Get-date -format 'yyyyMMddhhmmss')"; write-verbose "Registering the event $eventID" Register-ObjectEvent -inputObject $SqlConnection -eventName InfoMessage -sourceIdentifier $eventID $SqlCmd = New-Object System.Data.SqlClient.SqlCommand $SqlCmd.Connection = $SqlConnection $SqlCmd.CommandTimeout = 0 $SqlCmd.Connection.Open() write-verbose "Running the Query" $SqlCmd.CommandText = $Query $SqlCmd.ExecuteNonQuery() | Out-Null $ExitCode = $true $Message = Get-SQLConnectionEvent $eventID $ErroMessage = "" } catch { $ExitCode = $false $Message = "" $ErroMessage = $_.exception } Finally { if ($SqlCmd.Connection.State -eq [System.Data.ConnectionState]::Open) { write-verbose "Closing Connection" $SqlCmd.Connection.Close() $SqlCmd.Connection.Dispose() } } Write-Output (New-Object psobject -Property @{ 'ExitCode' = $ExitCode 'Message' = $Message 'ErrorMessage' =$ErroMessage}) }
0
sample_23_34.ps1
# # Module manifest for module 'OCI.PSModules.Sch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Sch.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0e74736a-d7dc-4743-afef-d79b95248dee' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Sch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Sch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCISchServiceConnector', 'Get-OCISchConnectorPlugin', 'Get-OCISchConnectorPluginsList', 'Get-OCISchServiceConnector', 'Get-OCISchServiceConnectorsList', 'Get-OCISchWorkRequest', 'Get-OCISchWorkRequestErrorsList', 'Get-OCISchWorkRequestLogsList', 'Get-OCISchWorkRequestsList', 'Invoke-OCISchDeactivateServiceConnector', 'Move-OCISchServiceConnectorCompartment', 'New-OCISchServiceConnector', 'Remove-OCISchServiceConnector', 'Update-OCISchServiceConnector' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Sch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
play-note(s)_1.ps1
function Play-Note([string]$note,[int] $duration = 5) { if (!($note -match '(\\d+)')) { $note+='4' };[void]($note -match '([A-G#]{1,2})(\\d+)') [console]::Beep((440 * [math]::Pow([math]::pow(2,(1/12)), (([int] $matches[2]) - 4)* 12 + $( switch($matches[1]) { 'A' { 0 } 'A#' { 1 } 'Bb' { 1 } 'B' { 2 } 'C' { 3 } 'C#' { 4 } 'Db' { 4 } 'D' { 5 } 'D#' { 6 } 'Eb' { 6 } 'E' { 7 } 'F' { 8 } 'F#' { 9 } 'Gb' { 9 } 'G' { 10 } 'G#' { 11 } 'Ab' { 11 } }))),$duration * 100 ) } function Speak-words ([string]$words,[bool]$pause = $true) { $flag = 1 if ($pause) {$flag = 2} $voice = new-Object -com SAPI.spvoice $voice.speak($words, [int] $flag) # 2 means wait until speaking is finished to continue } function Play-Notes { $defaultduration = 5;if($args[0] -is [int]) {$defaultduration = $args[0]} for($i = 0;$i -lt $args.length;$i++) { $duration = $defaultduration if ($i -lt $args.length-1) { if ($args[$i+1] -is [int]) {$duration = $args[$i+1] } } if ($args[$i] -is [string]) { if ($args[$i].startswith("!")) { speak-words $args[$i].replace('!','') } else { play-note $args[$i] $duration } } } } play-notes A B C 20 E 10 B 10 play-notes A B C 20 E 10 B 10 play-notes F5 2 E5 2 D5 2 C5 2 B5 2 A5 2 G 4 F5 2 E5 2 D5 2 C5 2 B5 2 A5 2 G 4 play-notes 2 F5 E5 D5 C5 B5 A5 G 4 F5 E5 D5 C5 B5 A5 G 4 play-notes 4 F5 E5 D5 C5 B5 A5 G F5 E5 D5 C5 B5 A5 G play-notes "!here we go now" Db5 Db Eb Gb Ab "C#" 6 !YEAH play-notes A "!$([datetime]::now)" C
0
sample_60_83.ps1
# # Module manifest for module 'OCI.PSModules.Certificatesmanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Certificatesmanagement.dll' # Version number of this module. ModuleVersion = '89.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c420014c-ae2b-4d3a-a11e-e78a626f134b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Certificatesmanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '89.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Certificatesmanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCICertificatesmanagementAssociation', 'Get-OCICertificatesmanagementAssociationsList', 'Get-OCICertificatesmanagementCaBundle', 'Get-OCICertificatesmanagementCaBundlesList', 'Get-OCICertificatesmanagementCertificate', 'Get-OCICertificatesmanagementCertificateAuthoritiesList', 'Get-OCICertificatesmanagementCertificateAuthority', 'Get-OCICertificatesmanagementCertificateAuthorityVersion', 'Get-OCICertificatesmanagementCertificateAuthorityVersionsList', 'Get-OCICertificatesmanagementCertificatesList', 'Get-OCICertificatesmanagementCertificateVersion', 'Get-OCICertificatesmanagementCertificateVersionsList', 'Invoke-OCICertificatesmanagementRevokeCertificateAuthorityVersion', 'Invoke-OCICertificatesmanagementRevokeCertificateVersion', 'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityVersionDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateVersionDeletion', 'Move-OCICertificatesmanagementCaBundleCompartment', 'Move-OCICertificatesmanagementCertificateAuthorityCompartment', 'Move-OCICertificatesmanagementCertificateCompartment', 'New-OCICertificatesmanagementCaBundle', 'New-OCICertificatesmanagementCertificate', 'New-OCICertificatesmanagementCertificateAuthority', 'Remove-OCICertificatesmanagementCaBundle', 'Stop-OCICertificatesmanagementCertificateAuthorityDeletion', 'Stop-OCICertificatesmanagementCertificateAuthorityVersionDeletion', 'Stop-OCICertificatesmanagementCertificateDeletion', 'Stop-OCICertificatesmanagementCertificateVersionDeletion', 'Update-OCICertificatesmanagementCaBundle', 'Update-OCICertificatesmanagementCertificate', 'Update-OCICertificatesmanagementCertificateAuthority' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Certificatesmanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_62_30.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../cssesc/bin/cssesc" $args } else { & "$basedir/node$exe" "$basedir/../cssesc/bin/cssesc" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../cssesc/bin/cssesc" $args } else { & "node$exe" "$basedir/../cssesc/bin/cssesc" $args } $ret=$LASTEXITCODE } exit $ret # SIG # Begin signature block # MIIoPwYJKoZIhvcNAQcCoIIoMDCCKCwCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCkiURcyHWAOAz0 # ctFZSv+tocUq7DyFv1blzFpX3bVmHKCCDYswggYJMIID8aADAgECAhMzAAADhNlo # fWbMdUuhAAAAAAOEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwNzEzMjM0NTM4WhcNMjQwOTE1MjM0NTM4WjCBiDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj # cm9zb2Z0IDNyZCBQYXJ0eSBBcHBsaWNhdGlvbiBDb21wb25lbnQwggEiMA0GCSqG # SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDOcuqjP/XRg6pKFeMaWfpMTgEZTBne4mxd # XcEiErb/lZ9Yfxgxa8WhOA66XU+usOUDmo6z/WpI3KVFIuf4MrHh76xAL/HypU9b # H7hvCG40do0YQxmymk+O25zXQ6Z0QKyKhDNU7K79OVWiE/QNRPXDxXj65HTqT2qb # 5dVzDziesfrFpzzrkHtOzBikEEFl1oZfmZOy3lSeiiaVLwkgaoPpYMDK+WbANGXQ # LQ6aP5vyWDtknjDP2F9gjp6j+Q67bCBjIs8FpdH2IN6HAvE3X/E4YOIOrZY2JYUz # 9poFh1rrjkGuM4CT2tzdqhfkB28QOnuhEyJ+AmB3B01oL9ahNSiZAgMBAAGjggFz # MIIBbzAfBgNVHSUEGDAWBgorBgEEAYI3TBEBBggrBgEFBQcDAzAdBgNVHQ4EFgQU # HNwWRAxH9Xw4ZX9wXRlFc716vLwwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMNMjMxNTIyKzUwMTE0ODAfBgNV # HSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0Ey # MDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZF # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQ # Q0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQEL # BQADggIBACe+otxvOu3z6TOJ95EbPptRocynVoyom18xquOJSKeqDNItu2pmyVpa # iZDhPstLyuo0mXyNLPh3TAl+botuUfpFZDOGzgmqWVBrdHQxsu3t++x6Gw0BJfQv # n/c0/lU/jRTRTAp7S7jAqjqpyMc0yvrrL6xvUNn3rkLkdy2yXDHWpHdEx5JdpJDp # gn5j1tv3GGdteYdhZlb2HolacViuJSbeMdG5sDDspcw8xY1Ds4FMXq7MYqLYQsr8 # KwXJZ95SboZ09V/5MOwpKGGhle0Bc5nAErdJBNjjaBLBMGDig9OV0Z3ZIfY4jOFl # eTEsK5LOTQtSaNVD4rbG+QnMsweLag7qVM7z5IeOqE7UY/CfCEksl+hrKc3MBvdc # yPcJ289x3gRkOH09FIjRIAfFpBDSkPj4HW5LKqNSv3AbFluKx6ZgbNYhwHxQSxDq # YsTlAjtnbMjYI2RTrSIMjgGYRvfwa57ypyPdlyzm14Q5UNggsWyr1Og+QbQeW6+R # CG6FuV/nEAYrMgeHlMQBd50aVhTdBeq5CR3Gz6q4aVL7nEdDR6eYuL0U1e4EoL2O # YBok3y4rBL3r57nLEEZ6xMGAe5eHBPtgcuPw5S/aJDropeu+4BXSi5R/qGktTkbK # flJMAlfXHL6a64o88h8i8ZZ4HHHM41qxMB52j9bgaCCQFJFlLJPvMIIHejCCBWKg # AwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3Qg # Q2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYw # NzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjAN # BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGf # Qhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRg # JGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NE # t13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnn # Db6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+E # GvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+t # GSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxh # H2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AV # s70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f # 7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3D # KI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9Jaw # vEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1Ud # DgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRy # LToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDEx # XzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0 # cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDEx # XzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/ # BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2Nz # L3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAA # bwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUA # A4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+ # vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4H # Limb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6 # aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiX # mE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn # +N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAq # ZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5h # YbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/ # RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXm # r/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMyk # XcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEB # MIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNV # BAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOE2Wh9Zsx1 # S6EAAAAAA4QwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQB # gjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkE # MSIEIKdAjzVIUOmf3qGiH/Zg5jnf2vihrx4laDOzlpyoMiD8MEIGCisGAQQBgjcC # AQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAkXqdSJ83QM37v6W4N2n822gCi1CC # M0WnTmFbeU1bgUd1E76Lt9wK48HjG81vtP+16HcXRgFQTcMGew32OQMW4hs0myPj # KZ3V1bTWFi676Wt4NdPS6OkijJvE5Fy7u5fptEgIdwNYux/Qw/KbEr3+VPo22QLE # DNfukmfSKQu0TWmn2cvu4fqsonx8d+MsYv6mIkVQK6hosu+pvC8w/LRl6EnsJtRr # 7piIA7YC80XktanQpmuKay92pU/23J8EkBkmiimv0kmJ5W43Kckm4Els/dM01HYF # gA4MEWRyJO07g6cBJgmp0RPSAKNU/yXlfVkkri4nyOo9NhBIlRB03SFt4aGCF5Qw # gheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8w # DQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYK # KwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCD9OucYm0V27Bp9hgLiRr1dDpfM # FyMw/4f9G6ESbxKyHwIGZpWAM5j+GBMyMDI0MDgwMTIwMTE0Ny42NzVaMASAAgH0 # oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUw # IwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5u # U2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29m # dCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAe+JP1ah # WMyo2gABAAAB7zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDAeFw0yMzEyMDYxODQ1NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3Nv # ZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046 # OTYwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhO # akZqy17oE4BIBKsm5kX4DUmCBWI0lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypC # ipungwP9Nob4VGVE6aoMo5hZ9NytXR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTc # df7/TYvyM10jLjmLyKEegMHfvIwPmM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9 # jLOKk1y70c+Twt04/RLqruv1fGP8LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqn # IG8rgY+zDqJYQNZP8O1Yo4kSckHT43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGC # O6GqiTp50xI9ITpJXi0vEek8AejT4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0 # SIopS4gaVR4Sy/IoDv1vDWpe+I28/Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn # 6oE38tgBTCCAKvEoYOTg7r2lF0Iubt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQnti # olYIYtqSrLyXAQIlXGhZ4gNcv4dv1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3 # L/t/UfXpT/+yc7hS/FolcmrGFJTBYlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN # 53oOLSSk4ldR0HlsbT4heLlWlOElJQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1M # WqKFwrCbtrw9P8A63bAVSJzLMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1 # GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w # a2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEp # LmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUy # MFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3 # aCDudbk9EVdkP8xcQGZuIAIPRx9K1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4U # w3zN7fHEN8hhaBDb9NRaGnFWdtHxmJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4ed # dq5vtk4rRWOVvpiDBGJARKiXWB9u2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWv # XecJ2WXrJnvvQGXAfNJGETJZGpR41nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXY # d5m0Jxf2WNJSXkPGlNhrO27pPxgT111myAR61S3S2hc572zN9yoJEObE98Vy5KEM # 3ZX53cLefN81F1C9p/cAKkE6u9V6ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMF # sPT/8ieOdwClYpcw0CjZe5KBx2xLa4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtx # SSgegeJsi0fbUgdzsVMJYvqVw52WqQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL # 0Jf4Srgg+zRD9iwbc9uZrn+89odpInbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lgh # z0DoD7kEGeikKJWHdto7eVJoJhkrUcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR # +ceAYhcjx0iBiv90Mn0JiGfnA2/hLj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAV # xedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENl # cnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkz # MDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqG # SIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH # 0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPP # dzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlh # AnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP # 1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV # mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakX # W2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+ # Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9 # Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdj # bwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S # 2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57 # t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEE # AYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYB # BQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBv # c2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K # AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME # GDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRw # Oi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJB # dXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8y # MDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvh # nnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGU # GCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZ # GN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFd # PSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7 # bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy # bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJ # VGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S # 0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGE # vL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurw # J0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2l # BRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0 # IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2 # MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQBLcI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA # 6lZmxjAiGA8yMDI0MDgwMTE5NTU1MFoYDzIwMjQwODAyMTk1NTUwWjB0MDoGCisG # AQQBhFkKBAExLDAqMAoCBQDqVmbGAgEAMAcCAQACAhVmMAcCAQACAhMyMAoCBQDq # V7hGAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH # oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAJCrSU6T1liO7Qxw2wRy # 4mgWxJhqfjU1nNM5lixKXMXOespfVQG1F9bVj1OW+duj3h/3tUD8ITJSX/NzJNUk # ACg1/ieFvSIHnfVO8QPkvi/gtz9QNuBHlMLgIqmXnqxo26RQtquAw1RYXTuA091c # +zFFdZ5CTZPifnYzwCUhiLaGKDjMLC5vCfmIC4rcYkqoECnND25P3o2L6FsQ6j1H # GsVojNoao6jMFHr0K+6G1vYsmEVRElGpvS2OzRTWj4jYyxV5lV+UqkKfEzUXaJRp # q5fGf8qW+kL0aUxFK0IkrlHPp+AyZZRwYhnchsjcxo7lurZ9wGhkWaXPqq4Mn5JL # P68xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAIT # MwAAAe+JP1ahWMyo2gABAAAB7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcN # AQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDKDMdLDtGqQRnC4WD/ # IBXH5lC/Qrf9XjM7lA9V7utA8zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0E # IPBhKEW4Fo3wUz09NQx2a0DbcdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQg # Ey7DafaH/4+6GWUjNWzD6ZFMgbAgmMyiyqH6BYBXv9IwDQYJKoZIhvcNAQELBQAE # ggIAP4DeUMzuiwAk8qTCFRBIXXfDtZxWcL7O01PudlWh8++rirtaZyK51DxELLOH # sxEEVYmA+dqLaI5iH/4EVrXCsPjQyCPr6/RLzs8b6MBP3AH0Jt2QYM19+AtIfibd # 5C/jyGOExnsyEjSn4pQeIuKtkK2tfjhPoPZGx5axDoa1Is3DtcJ4IVtd2gQBp3oR # x5TYkYmBbB2U5rgvW85dSxouG7c2rqO9qA5NogQ+fk4RO9xL6T46NNcWK+kfGfI/ # mo39017qzBtL3jOFm4yrK+h5/xwrNrXIP9TBYNa8k8twMhd0LDzkI9ndjEDRlwrl # AQXumeIFXvWs1Y3sh+4wbOh6K81/hQ/8xY0qL9vqU0Dr8r3hW8K2uGPpcFtK3azi # lZJotBukk/NQnwmIVDS8llckKY2f2ht9pOR5GsCSNvlD7CFsV2FPbFLZfSYUe8Lh # hTXlCgkoz1NiGCz3LFOcVHxsoj/igkFWhs6ylhWAw8Bt8PXCZ5hZOrugIz9ZAasx # EsGm46Q13Xj2cwuXSB/FuHWMZUNOiAetUkO8MmHyjWTNSBe8wecQgpy6CT3hm3Yi # 9T9CCpyiQj6XcvpvA3zwOkDu90jIYC1VkYWo3WLXHSs+l/v3GEYRYzkJ1IC1FIt4 # AoVY1DKS5g9Q/gWqXvnDdyeBmtfW2pk5vgxYewYwhTLL0Fk= # SIG # End signature block
0
sample_65_88.ps1
]Ограничението PrintAllTranslations не може да се използва с ограничението IgnoreTranslations.†Не можете да добавите изчислената колона „%{oii_column/}“ към хибридната таблица „%{oii_table/}“. Моля, премахнете изчислената колона.•Не можете да добавяте колона „alternateOf“, използвана за агрегации, към хибридната таблица „%{oii_table/}“. Моля, премахнете колоната „alternateOf“.ýНе можете да създадете колона „alternateOf“, използвана за агрегации, която се позовава на хибридната таблица „%{oii_baseTable/}“ като своя BaseTable. Или направете препратка към базова таблица в режим DirectQuery, или премахнете колоната „alternateOf“.|Не можете да създадете няколко дяла в режим DirectQuery за таблицата „%{oii_table/}“. Поддържа се само един DirectQuery дял.åНе можете да създадете дял върху хибридна таблица „%{oii_table/}“ от тип entity, която се позовава на друг набор от данни на Power BI, SAP или Azure Analysis services (AAS) като източник на DirectQuery. Моля, премахнете този дял.ǮНе можете да конфигурирате таблица „%{oii_table/}“ като таблица с инкрементално обновяване и с разделение в реално време, тъй като изразът на заявката за данни се позовава на източници на данни „%d{datasourceNumber/}“. Една таблица с инкрементално обновяване и разделение в реално време може да използва само един източник на данни. Моля, модифицирайте израза на таблицата, за да използва само един източник на данни. Вижте https://go.microsoft.com/fwlink/?linkid=2172127, за да научите повече.^Свойството на "%{property/}" в обект ChangedProperty за тип родител "%{type/}" е несъвместимо.jArtifactType на "%{ArtifactType/}" в обект ExcludedArtifact за тип родител "%{parentType/}" е несъвместим.ZВече има обект FormatString changedProperty в колекцията, а дубликатите вече са разрешени.UВече има обект Caption changedProperty в колекцията, а дубликатите вече са разрешени.YВече има обект Description changedProperty в колекцията, а дубликатите вече са разрешени.[Вече има обект DisplayFolder changedProperty в колекцията, а дубликатите вече са разрешени.‰Таблицата с подробни данни „%{oii_table/}“ на alternateOf, която не е groupby (например Sum/Min/Max), трябва да е таблица на DirectQuery.’Таблицата за агрегация „%{oii_table/}“ не може да бъде в режим DirectQuery, когато таблицата с подробни данни „%{oii_basetable/}“ е в двоен режим.
0
Get-Constructor_2.ps1
function Get-Constructor { PARAM( [Type]$type ) $type.GetConstructors() | Format-Table @{ l="$($type.Name) Constructors" e={ "New-Object $($type.FullName) $(($_.GetParameters() | ForEach { "[{0}] `${1}" -f $($_.ToString() -split " ") }) -Join ", ")" } } } Set-Alias gctor Get-Constructor
0
2340.ps1
function Get-ActiveDirectoryUserNameMatch($FirstName,$LastName,$MiddleInitial) { if ($MiddleInitial) { $Filter = { (initials -eq $MiddleInitial) -and (surname -eq $LastName) -and (givenname -eq $FirstName) } $MatchType = 'FML' } else { $Filter = { (surname -eq $LastName) -and (givenname -eq $FirstName) } $MatchType = 'FL' } $Param = @{ 'Filter' = $Filter; 'Properties' = 'DisplayName' } $Result = Get-ADUser @Param if ($Result) { $Result | Add-Member -Type 'NoteProperty' -Name 'MatchMethod' -Value $MatchType -Force } else { $UserCount = $AllAdUsers.Count for ($i=0; $i -lt $UserCount; $i++) { $FnameDistance = Get-LevenshteinDistance -first $FirstName -second $AllAdusers[$i].Givenname -ignoreCase $LnameDistance = Get-LevenshteinDistance -first $LastName -second $AllAdusers[$i].surname -ignoreCase $TotalDistance = $FnameDistance + $LnameDistance if ($i -eq 0) { $Result = $AllAdUsers[$i] $LowestDistance = $TotalDistance } elseif ($TotalDistance -lt $LowestDistance) { $Result = $AllAdUsers[$i] $LowestDistance = $TotalDistance } } $Result | Add-Member -Type 'NoteProperty' -Name 'MatchMethod' -Value 'LowestEditDistance' -Force } $Result } function Get-LevenshteinDistance { param ([string] $first, [string] $second, [switch] $ignoreCase) $len1 = $first.length $len2 = $second.length if ($len1 -eq 0) { return $len2 } if ($len2 -eq 0) { return $len1 } if ($ignoreCase -eq $true) { $first = $first.tolowerinvariant() $second = $second.tolowerinvariant() } $dist = new-object -type 'int[,]' -arg ($len1 + 1), ($len2 + 1) for ($i = 0; $i -le $len1; $i++) { $dist[$i, 0] = $i } for ($j = 0; $j -le $len2; $j++) { $dist[0, $j] = $j } $cost = 0 for ($i = 1; $i -le $len1; $i++) { for ($j = 1; $j -le $len2; $j++) { if ($second[$j - 1] -ceq $first[$i - 1]) { $cost = 0 } else { $cost = 1 } $tempmin = [System.Math]::Min(([int]$dist[($i - 1), $j] + 1), ([int]$dist[$i, ($j - 1)] + 1)) $dist[$i, $j] = [System.Math]::Min($tempmin, ([int]$dist[($i - 1), ($j - 1)] + $cost)) } } return $dist[$len1, $len2]; } $AllAdUsers = Get-ADUser -Filter { (givenname -like '*') -and (surname -like '*') } -Properties 'DisplayName' $Content = Get-Content 'C:\users.txt' $UnknownSourceUsers = [system.Collections.ArrayList]@() foreach ($Row in $Content) { $Split = $Row.Split(' '); $LastName = $Split[$Split.Count - 1]; $FirstName = $Split[0]; $MiddleInitial = @{ $true = $Split[1]; $false = '' }[($Split.Count -eq 3) -and ($Split[1].Length -eq 1)] if (($Split.Count -gt 3) -or ($Split.Count -lt 2) -or (($Split[1].Length -ne 1) -and ($Split.Count -eq 3))) { $UnknownSourceUsers.Add($Row) | Out-Null } else { $Output = @{ 'SourceFirstName' = $FirstName 'SourceLastName' = $LastName 'SourceMiddleInitial' = $MiddleInitial 'ActiveDirectoryFirstname' = '' 'ActiveDirectoryLastName' = '' 'ActiveDirectoryDisplayName' = '' 'ActiveDirectorySamAccountName' = '' 'ActiveDirectoryStatus' = '' 'ActiveDirectoryMatchMethod' = 'NoMatch' } $AdMatch = Get-ActiveDirectoryUserNameMatch -FirstName $FirstName -LastName $LastName -MiddleInitial $MiddleInitial if (!$AdMatch) { [pscustomobject]$Output | Export-Csv -Path johnoutput.csv -Append -NoTypeInformation } else { $Output.ActiveDirectoryDisplayName = $AdMatch.DisplayName $Output.ActiveDirectoryFirstName = $AdMatch.givenName $Output.ActiveDirectoryLastName = $AdMatch.surName $Output.ActiveDirectorySamAccountName = $AdMatch.SamAccountName $Output.ActiveDirectoryStatus = $AdMatch.Enabled $Output.ActiveDirectoryMatchMethod = $AdMatch.MatchMethod [pscustomobject]$Output | Export-Csv -Path output.csv -Append -NoTypeInformation } } } Write-Host 'Unrecognized name formats' $UnknownSourceUsers
0
PS2WCF_5.ps1
<# .SYNOPSIS Functions to call WCF Services With PowerShell. .NOTES Version 1.2 11.02.2012 Requires Powershell v2 and .NET 3.5 Original version by Christian Glessner Blog: http://www.iLoveSharePoint.com Twitter: http://twitter.com/cglessner Codeplex: http://codeplex.com/iLoveSharePoint PowerShell v2.0 modification by Justin Dearing Blog: http://justaprogrammer.net Twitter: http://twitter.com/zippy1981 .LINK Blog describing original version: http://www.ilovesharepoint.com/2008/12/call-wcf-services-with-powershell.html Authoritative version of this fork: https://github.com/justaprogrammer/PowerShellWCF Posted to PoshCode.org http://poshcode.org/?lang=&q=PS2WCF #> # load WCF assemblies Add-Type -AssemblyName "System.ServiceModel" Add-Type -AssemblyName "System.Runtime.Serialization" <# .SYNOPSIS Get metadata of a service .DESCRIPTION Parses a wsdl or mex and generates a WsdlImporter object from it. .EXAMPLE Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc/mex' .EXAMPLE Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc' -HttpGet .EXAMPLE Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc?wsdl' -HttpGet #> function global:Get-WsdlImporter([CmdletBinding()][Parameter(Mandatory=$true, ValueFromPipeline=$true)][string]$WsdlUrl, [switch]$HttpGet) { if($HttpGet) { $local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::HttpGet } else { $local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::MetadataExchange } $mexClient = New-Object System.ServiceModel.Description.MetadataExchangeClient([Uri]$WsdlUrl, $mode); $mexClient.MaximumResolvedReferences = [System.Int32]::MaxValue $metadataSet = $mexClient.GetMetadata() $wsdlImporter = New-Object System.ServiceModel.Description.WsdlImporter($metadataSet) return $wsdlImporter } <# .SYNOPSIS Generate wcf proxy types .DESCRIPTION Examines a web services meta data (wsdl or mex) and generates the types for the client proxy, as well as request and response contracts. .EXAMPLE $proxyType = Get-WcfProxyType $wsdlImporter $endpoints = $wsdlImporter.ImportAllEndpoints(); $proxy = New-Object $proxyType($endpoints[0].Binding, $endpoints[0].Address); #> function global:Get-WcfProxyType( [CmdletBinding()] [Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $WsdlImporter, [Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $WsdlUrl, [string] $proxyPath ) { switch ($PsCmdlet.ParameterSetName) { "WsdlUrl" { $WsdlImporter = Get-WsdlImporter $WsdlUrl trap [Exception] { $WsdlImporter = Get-WsdlImporter $WsdlUrl -HttpGet continue } break } "WsdlImporter" { break } } $generator = new-object System.ServiceModel.Description.ServiceContractGenerator foreach($contractDescription in $wsdlImporter.ImportAllContracts()) { [void]$generator.GenerateServiceContractType($contractDescription) } $parameters = New-Object System.CodeDom.Compiler.CompilerParameters if($proxyPath -eq $null) { $parameters.GenerateInMemory = $true } else { $parameters.OutputAssembly = $proxyPath } $providerOptions = New-Object "Collections.Generic.Dictionary[String,String]" [void]$providerOptions.Add("CompilerVersion","v3.5") $compiler = New-Object Microsoft.CSharp.CSharpCodeProvider($providerOptions) $result = $compiler.CompileAssemblyFromDom($parameters, $generator.TargetCompileUnit); if($result.Errors.Count -gt 0) { throw "Proxy generation failed" } return $result.CompiledAssembly.GetTypes() | Where-Object {$_.BaseType.IsGenericType -and $_.BaseType.GetGenericTypeDefinition().FullName -eq "System.ServiceModel.ClientBase``1" } } <# .SYNOPSIS Generate wcf proxy .DESCRIPTION Generate wcf proxy in a manner similar to a Get-WebServiceProxy .EXAMPLE $proxy = Get-WcfProxy 'http://localhost.fiddler:14232/EchoService.svc/mex' $proxy.Echo("Justin Dearing"); #> function global:Get-WcfProxy( [CmdletBinding()] [Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $WsdlImporter, [Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $WsdlUrl, [Parameter(Position=1, Mandatory=$false)][string] $EndpointAddress = $null, [Parameter(Position=2, Mandatory=$false)][System.ServiceModel.Channels.Binding] $Binding = $null ) { if ($Binding -ne $null -and [string]::IsNullOrEmpty($EndpointAddress)) { throw New-Object ArgumentNullException '$EndPointAddress', 'You cannot set $Binding without setting $EndpointAddress.' } switch ($PsCmdlet.ParameterSetName) { "WsdlUrl" { $WsdlImporter = Get-WsdlImporter $WsdlUrl trap [Exception] { $WsdlImporter = Get-WsdlImporter $WsdlUrl -HttpGet continue } break } } $proxyType = Get-WcfProxyType $wsdlImporter; if ([string]::IsNullOrEmpty($EndpointAddress)) { $endpoints = $WsdlImporter.ImportAllEndpoints(); $Binding = $endpoints[0].Binding; $EndpointAddress = $endpoints[0].Address; } return New-Object $proxyType($Binding, $EndpointAddress); }
0
2881.ps1
Framework '4.7.1' task default -depends MsBuild task MsBuild { if ( $IsMacOS -OR $IsLinux ) {} else { $output = &msbuild /version /nologo 2>&1 Assert ($output -NotLike '15.0') '$output should contain 15.0' } }
0
sample_10_81.ps1
#************************************************ # TS_NetworkDTCEnabled.ps1 # Version 1.0.0 # Date: 03-23-2012 # Author: Jeremy LaBorde - jlaborde # Description: Checks to see if Network DTC # is enabled # #************************************************ . .\DistSvcs_Utils.ps1 Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_DSI_DistSvcs_RC_Activity -Status $ScriptStrings.ID_DSI_DistSvcs_RC_NetworkDTCEnabledNotice # read local DTC settings $local:security = Get-Item "registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security" # network DTC check $LocalNetworkDTCAccessOn = Get-RegKeyBool $local:security "NetworkDtcAccess" # report on local DTC settings if( !($LocalNetworkDTCAccessOn) ) { AlertKnownIssue "RC_NetworkDTCEnabled" "Network DTC Is Not Enabled (Local DTC): http://support.microsoft.com/kb/817064" "Internal" } else { if( $global:gDebugSDPOn ) { Update-DiagRootCause -id "RC_NetworkDTCEnabled" -Detected $false } } # now check cluster resources $local:clusterkeys = Get-Item "registry::HKEY_LOCAL_MACHINE\Cluster\Resources\*" -ErrorAction SilentlyContinue if( $null -ne $local:clusterkeys ) { # loop through each resource, looking for DTC ones foreach( $local:subkey in $local:clusterkeys ) { $local:type = Get-RegKeyValue $local:subkey.Name "Type" $local:name = Get-RegKeyValue $local:subkey.Name "Name" if( $null -ne $local:type -and $local:type -eq "Distributed Transaction Coordinator" ) { $ClusterResourceName = Get-RegKeyValue $local:subkey.Name "Name" if( [Environment]::OSVersion.Version -gt 5.2 ) # 7 / 2K8R2 / Vista / 2K8 { $local:security = Get-Item ("registry::" + ($local:subkey.Name + "\MSDTCPRIVATE\MSDTC\Security")) $NetworkDTCAccessOn = Get-RegKeyBool $local:security "NetworkDtcAccess" } else { # have to find the subkey that has a REG_SZ named MSDTC $local:clusternode = Get-RegistrySubKeyBasedOnEntry $local:subkey "MSDTC" "" if( $null -ne $local:clusternode ) { $local:security = ($local:clusternode.Name + "\Security") $NetworkDTCAccessOn = Get-RegKeyBool $local:security "NetworkDtcAccess" } } # report on cluster instance DTC settings if( !($NetworkDTCAccessOn) ) { $message = "Network DTC Is Not Enabled (Cluster Resource: " + $ClusterResourceName + "): http://support.microsoft.com/kb/817064" AlertKnownIssue "RC_NetworkDTCEnabled" $message "Internal" } else { if( $global:gDebugSDPOn ) { Update-DiagRootCause -id "RC_NetworkDTCEnabled" -Detected $false } } } } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDv89R5P3ztaEIP # +U5C0fxMkNd3Q+fciI9g8XlV+tRIGaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG0x # Z80PyAVAUkVlQMH8RYvEyhtV2JPyIZbCyZt9SbByMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAYt+riZ2KoJ39XCA6WMMWENMu/OsOynWhl0C0 # xGHYcghAFoaBhiHRYRFkHfS/XHhG3Kry6CN3gtJdPACBjy90CosTQ2BwfkeNTjZ4 # LN6BfPoAUS+KHdKanhaPMpzOsOlS1nUJKC9ADA0wk0hqTd/aqXRLGbAOCI2Ih6Tu # xz29zoH6NVz3AQurdZdLhQyu77vnH2WRQMMG2MK5sbpvwalj67XIb+lS/D2H5O6V # SCOePog4GUy5hmMca9MVcf7fs5Zw3+ieuQA3Ir0irYESbZXHwlA27Jyr89j0UK8m # B1iZL0JklwBrH8wvwxpMLeelLJwti39VWTSSuFocnugu0XkiZaGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBzPaqMIQrkRKA9g9a5aaMT1H49qd1ghgyl # RPbzLAYGawIGZv8ZfhF4GBMyMDI0MTAyODExNDAzOS4yMThaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv # JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja # Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V # ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm # kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK # /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm # bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL # 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w # GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc # EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25 # gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2 # HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY # xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw # gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7 # 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT # EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h # OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk # C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi # CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP # cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ # m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB # tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0 # 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0 # MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA # AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX # evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ # uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI # GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx # w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j # vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg2EzOsxEYg3A/sx/87OJO2ryiRVPvCQSIaBfypoATposwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll # QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI # wwAlMA0GCSqGSIb3DQEBCwUABIICADP/OeZEiKTsZxq4iieteoR78tGpYkRdZ1Ry # jj8SZtp4cCPuVsDI0jzZudQr6DkeG79uVkTRV9s7ahfpH9AbAQBBLsYnNbmUBrjz # Kvk3gNYNmHy5O/W1fiLtNARLSw6bK/qKvS1L8E8fV5h+NRI6W0BANLpusYtwKPjC # XWjjM/r5xheejWdv2AEZGWme2TZ5mj5/ERusZ9lD9+AMArPbnRQvqxMMY4I2cP6y # Sjbf6OKbgfGZcCSAiz8y/I+lNHoD3Om/g+DsWcSs3It1lp3FuJ8qsNK08NcsOpTh # gf4dLePYyF7N9KY4UNNvWCC0m4AHibpxrnZiod4XFgs1/BPjumdCdyJR4z/v7oJU # lA0ABnG3mRbHp7qJBq7Vv//zS6csPYVBHaloIYvOtGm3NlsaT/5w7EzHAI2Ip6Bv # 5XVYgNKv0RvkNgCNX197QIhTv2spWIbJjZ1TKkhwHthMAsgejpHv3OotmA0HXuYL # vrwInTSt2sjqjPkQBXKToXw7fnTrxUqnzxmoYYjImfrMBpBrbcD8Uq3wS0TQ7EOf # oFctWSpOuXV0TZfXK1+/JgAqobDWYvR+2UEVx4u5fGM1dRCSm5KQjA20txn6nJte # uK7kFS3zFelHf8jaU8Wr8VBYp3fp/rAb9YVAB6CoeQgNqPEkvMWlW4LfCM1Mr/dU # EDfCDJoP # SIG # End signature block
0
sample_32_26.ps1
@{ # Script module or binary module file associated with this manifest ModuleToProcess = 'nuget.psm1' # Version number of this module. ModuleVersion = '2.0.0.0' # ID used to uniquely identify this module GUID = '76e6f9c4-7045-44c0-a557-17fab0835c12' # Author of this module Author = 'NuGet Team' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2010 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'NuGet PowerShell module used for the Package Manager Console' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '2.0' # Name of the Windows PowerShell host required by this module PowerShellHostName = 'Package Manager Host' # Minimum version of the Windows PowerShell host required by this module PowerShellHostVersion = '1.2' # Minimum version of the .NET Framework required by this module DotNetFrameworkVersion = '4.0' # Minimum version of the common language runtime (CLR) required by this module CLRVersion = '' # Processor architecture (None, X86, Amd64, IA64) required by this module ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module ScriptsToProcess = @('profile.ps1') # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = @('NuGet.Types.ps1xml') # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = @('NuGet.Format.ps1xml') # Modules to import as nested modules of the module specified in ModuleToProcess NestedModules = @('NuGet.PackageManagement.PowerShellCmdlets, Version=6.11.0.31, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a') # Functions to export from this module FunctionsToExport = @('Register-TabExpansion') # Cmdlets to export from this module CmdletsToExport = @( 'Install-Package', 'Uninstall-Package', 'Update-Package', 'Get-Package', 'Get-Project', 'Sync-Package', 'Find-Package' 'Add-BindingRedirect') # Variables to export from this module VariablesToExport = '' # Aliases to export from this module AliasesToExport = '' # List of all modules packaged with this module ModuleList = @() # List of all files packaged with this module FileList = @() # Private data to pass to the module specified in ModuleToProcess PrivateData = '' } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDGEf0h03TAYX9w # gzEpL/pp8OEQCQE2XEpb2656z4yUK6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ0W # KY8USn7OJ50v9uaURsjrUTGps0vMKaJqvmZZ/pDMMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAnJ8KkNfTHiR6fnGpfRr0rFOqYW7q3bwESHYs # 9XENWaOnSaA8XifwdIVP8jTUA7H8kM/+kEeYpupIHXbLoRPJW+OxwumLdv/F/hk9 # x/XiNiR9SoO5XDEdQZKVHOmi7f9lhtim4qb7C5rUAtKYJfN9OzE3Hodkl/e32N32 # MZojMgBf0GrDO9FDS3NCrOHMzzQwXf3i+7qi5v55z/vhaChiNNEZWUBU5Eahmo5m # e/t+vTBYzKq1mBNK+WNEt1IrzDDzJrDI8N/zJ456ki3V3YP5cV4odFdsw/hdnfgz # rt1oc1eweHmPmdpIUr2bmyawpvbGYud348wGWibw1c/pO96oCKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDxZociJzoh7yNBTqKhR5mmGLgFOldePN/9 # Daf04H2K7wIGZhfWvM8gGBMyMDI0MDQyNTE4NDMzMS45MDdaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dTHnDAi # GA8yMDI0MDQyNTEyMTQyMFoYDzIwMjQwNDI2MTIxNDIwWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDp1MecAgEAMAcCAQACAgCRMAcCAQACAhNgMAoCBQDp1hkcAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAJFqozRZB0mVJUudLzDazW4N34kP # V76375EaA/DCNNdHkLAAAoSaBj03dpyl4hq+BhWgFQSSf3ru41EKMZwWHk7vDV8C # CZ2oMxYw+IT4GUgNhMNtlzF1hDBDyh7br7L6vYZOqETiV+3eW7oyGuodUUS5QteM # j1qPFjvoEHtqO551Dp6WGZaY09+a+kElIrNmhRFgmZXazkXYpyra2v6xf1Jrqm2B # y2c28DSyh+LHAQm9hI4Ru+AUOmcPUK0ejAKUmhU6tYnuLQL08dGIju55dT8Ux9Xf # 3wec16ECd64RhkkyDVuidT5SObMpHET4cmka6C+0kpRH+Fy+oiX7oq9hjcsxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu # jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCC/smE21EQXiK5WCyxDdy3S5F/m # 6NuWhvsNKlzY/4IF7DCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12 # aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQg8knQ5gty # zTMTJMQwSm2x630AlV/bEviNh8ViuNtuRwswDQYJKoZIhvcNAQELBQAEggIANmI4 # 2sBWzgStIBTfrS0KWp5Zyb5jOoCyTCjHu5gT5fiE2ShqioKlICxkfsNgyV3vwUt9 # RpV6cGx8Gc+8DuFwNatV3q+Om9TmJ7bZ2CGj1oSz0GXwuoB5K/7lu4gT/4Oc6r+A # JhWN6hU6E1TScwrQfk6yoKIjjwTxvgJHnXqqRUDfmAVXvXFOJT34ocHo3X4v7bgC # 2bCqReOMSVXyDt7Jud1uHuAwqv9Ej616uDuI0EGiBmZAhdcggHwHe6w0D6eW7U4E # okAo+K9jDqUxaPj9dy+Cz3SCPpQJEwapWXIkCExCfn1+fu/gxKSSTig0yMpvnptG # QXKa8bHPp5IAaMRQSothcCngyVFxCxia7nqae0zHk8kEcDCpsxF22vwZxc+Qgrxi # jcGJZpzaHRXC48WqS2bWx3j4jdS4f1kPamgGHNryO0YYlCstCAPr6aCU4kVD9o6P # mD8Og0h5HID5u/In+3hkiE1dr/5v8W76NRPLPv1PMEWfcSfE9Upn8doBTj+JghMo # L05qI64MMgEAbW3NrHRpPl4Yi317mbbN3M+yMT/HvvvmOZ6rgdAmrqfDisCfZFFH # rZgmU/2/2EuELyOwtDB4nztiG3VxJ8qZarAruv62fH7ZiXSuYPhCfeeeeTFlMa58 # QssCzT8gkiAX0KZDyABl5P6C6UtHNHOAXgJkZFk= # SIG # End signature block
0
sample_48_96.ps1
# Copyright (C) Intel Corporation, 2021 All Rights Reserved. function Invoke-GenerateKeyPair { <# .Synopsis Generate Key Pair. .Description This cmdlet generates a KeyPair object and adds the new key to AMT. .Notes AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Invoke-GenerateKeyPair -ComputerName 192.168.168.10 -Username admin -Password Admin!98 -KeyAlgorithm RSA -KeyLength 2048 Key Pair Generated Successfully! #> [CmdletBinding()] Param ( [Parameter(Mandatory = $true, position = 0,HelpMessage = "Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory = $false, position = 1,HelpMessage = "Digest User")] [string] $Username, [Parameter(Mandatory = $false, position = 2,HelpMessage = "Digest Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true, ValueFromPipeline=$false, position=3, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=4, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=5, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName, [Parameter(Mandatory = $true, position = 6,HelpMessage = "Valid Key Algorithm is RSA")][ValidateSet("RSA")] [string] $KeyAlgorithm, [Parameter(Mandatory = $true, position = 7,HelpMessage = "Key Length")] [string] $keyLength ) PROCESS { $Results = @() $Results += "`n" try { # Create a connection object $wsmanConnectionObject = New-Object Intel.Management.Wsman.WsmanConnection if ($Credential.username.Length -gt 0) { $wsmanConnectionObject.SetCredentials($Credential.Username, $Credential.Password) } elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $wsmanConnectionObject.SetCredentials($Username, $Password) } else { $Cred = Get-Credential $Username $wsmanConnectionObject.SetCredentials($Cred.Username, $Cred.Password) } } if ($Port -ne "16993") { if ($TLS.IsPresent) { $Port = 16993; } else { $Port = 16992; } } if($CertificateName.Length -gt 0) { $wsmanConnectionObject.Options.SetClientCertificateByCertificateName($CertificateName) } ForEach ($Comp in $ComputerName) { # Attempt Connection with Client $wsmanConnectionObject.SetHost($Comp, $Port) if( -not $wsmanConnectionObject) { $Results += "Cannot connenct `n" } # Generate Key Pair switch ($KeyAlgorithm) { "RSA" { $KeyAlgorithmProperty = "0" break } } $publicKeyManagementServiceRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_PublicKeyManagementService WHERE Name='Intel(r) AMT Public Key Management Service'") $inputObject = $publicKeyManagementServiceRef.CreateMethodInput("GenerateKeyPair") $inputObject.SetProperty("KeyAlgorithm", $KeyAlgorithmProperty) $inputObject.SetProperty("KeyLength", $keyLength) $outputObject = $publicKeyManagementServiceRef.InvokeMethod($inputObject) $returnValue = $outputObject.GetProperty("ReturnValue") if($returnValue -like "0") { # The key pair data is needed later on in the flow. # Please note that this KeyPair data is sensitive and should be kept secret, so pay attention to properly protect it in your implementation. # $publicPrivateKeyPairRef = $outputObject.GetProperty("KeyPair").Ref # $publicPrivateKeyPairInstance = $publicPrivateKeyPairRef.Get() # $keyBlob = $publicPrivateKeyPairInstance.GetProperty("DERKey") $Results += "Key Pair Generated Successfully! `n" } elseif($returnValue -like "23") # Max limit reached { $Results += "Failed to generate key pair - Max limit was reached. `n" } } } catch { $Results += "Exception Thrown:" $Results += $_.Exception.Message } Write-Output $Results } } # SIG # Begin signature block # MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCh1yS9fVqAqwKC # t7+ZSkapg2i8szQ9P27Q1PU7zBYeIaCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg8mX+C/NOvT0oi9dH # CIzg8heKTjpwn6oo+NAItSy7/V0wDQYJKoZIhvcNAQEBBQAEggGAmzS1vGx7JiAb # H7CVS3HRTCCFc26djZvQzpBvdHsPQ8trMPllxuXsSI3vPDHXQ8DveDXh992/I2bF # Wqszhktlm5D2S05oQOTkIhlGNYaPS7L7d6Y8nE5aCjpUMUgKefNPT6URbURIxCHI # jmgzWi2HJJvvNv+jSTPklDVE2rklBN2o204YSsmwERrUI+2C8Cf1Td7Je+pDOnVy # 2hRMTXP1lGyhQvXqrAg39S0G0Ap2Kvn0Mcj7JYy6/xoCCeiZRFlp0vNmHPx66Rbx # 7QWic6zxotNuZNwMcGRZMMTtxltIsxCN8PPWKF23wy9fBZmx+Mv6GaLLA+vsrRT6 # YP4HZK2deMbAYMH4Yb27NxDkt15CWjlwZxCMDMfaoJVDAxT561b83gYB0IiZ3v37 # LOjMtaqzlwYQGBg+a/yUPM/xkiZ77veft6EnF7X9QP0Gbz1asjHPFaB2k39KDtCc # y9squJ7oK5sFD339Xh84Kh6vgVfZ9bBG7U+9rb841Ur2NSD53czkoYITgDCCE3wG # CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg # hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIKmkoabGlEtjoAPo1Z0dHbFuA7m3d/uWN+yy # vNR7sacUAhUAl3kU5TcqC14TvOaN0pq0o3YnFXAYDzIwMjEwNzE5MTYzMDUzWqCB # iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl # cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww # KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw # ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN # MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg # TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM # aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l # ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T # B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi # Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL # GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q # BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8 # 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG # 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy # 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK # 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K # ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb # LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U # Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa # ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu # 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC # ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0 # cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js # MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv # LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo # dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz # 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX # VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu # k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA # 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g # XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA # iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f # XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC # A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg # no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q # uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p # sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY # dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo # ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5 # NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx # EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG # A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na # wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV # cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc # 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh # e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI # jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w # ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5 # VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT # IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo # RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr # t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB # eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm # yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG # MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g # BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy # dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2 # BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0 # LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0 # cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd # FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A # w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh # RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4 # OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv # WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH # HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL # nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf # tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p # oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq # /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi # Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD # VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT # YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp # Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG # SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI # hvcNAQkFMQ8XDTIxMDcxOTE2MzA1M1owPwYJKoZIhvcNAQkEMTIEMPVpobA8pjR/ # OjVax28gAJUSdbSKT0Ak+9YUXc5NEef9nJyThrEWF2+JhLz90EnizzCB7QYLKoZI # hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW # W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT # FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD # ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG # 9w0BAQEFAASCAgANILJUyUvikvAUqGeAgDkqH69aFwEjHpOkL8xUBQ1hg9biZBfG # jCjtB90xFT+511zEWeBD16UltA+FwYYD8h5gL4Mo1FbhADyzCDkG0acCUMkiz23H # EmUpH3HleStfhABM7Isql3DWHYm+cEIBwqukHpKF74U+juWq99ZuupfiVeJz0KU1 # YeqFmrPUl2Y4k98kaHfzEE7pKZDUsBUlBpzK0UVMmmOL3bBnfjmI/vR/pjO3f/96 # OT7S7N302sgKi9AnXPSoEBSTMXha8NqUxBJbjjw4tPXDDgwaUWC+wQ1WXDpEBbsD # aghR//dQWcHGmHwKYOo+Qm2HxJihOCx0nqaZvPweCf3A04lpC3lKPI7OInMUSK62 # 2qkFOW1DTyLgGRRIHULB0BO67EdqVX3q72lR+MTQFzQerF7ROl0ZNwD6Wp0u8B6g # ClYouZ58bf1G0GkSQWFRXOemqlG6rmOvVZTJLhXiQFoJr49UTEnCROwKEEA2u42O # EV7rxVbeeIiNJQFUs/CWuF8keNCD5IwknWV84x3WXFNDp3nIpq9HhOg5/k7e62Ku # nm4OgfkR1Utr/xMHoZyQjsak/5B20zd2CvD7d7oz10HqIxKtBw4sFvdpunS/4O9L # JqJn0gBcUOXkF25QuAx+OjC16/y5ZpZVbvsEjKxQYowaVrQZmNfG3/OOnQ== # SIG # End signature block
0
Manage ASP.NET Providers.ps1
# Manage_ASP_NET_Providers.ps1 # by Chistian Glessner # http://iLoveSharePoint.com [void][System.Reflection.Assembly]::LoadWithPartialName("System.Web") # posh 2.0: Add-Type -Assembly "System.Web" function global:Set-AppConfigPath($path=$(throw "-path is mandatory")) { [System.AppDomain]::CurrentDomain.SetData("APP_CONFIG_FILE", $path ) } function global:Get-MembershipProvider($appConfigPath=$null, $providerName=$null) { if($appConfigPath -ne $null) { Set-WebConfigPath $webConfigPath } if($providerName -eq $null) { return [System.Web.Security.Membership]::Provider } else { return [System.Web.Security.Membership]::Providers[$providerName] } } function global:Get-RoleProvider($appConfigPath=$null, $providerName=$null) { if($appConfigPath -ne $null) { Set-WebConfigPath $webConfigPath } if($providerName -eq $null) { return [System.Web.Security.Roles]::Provider } else { return [System.Web.Security.Roles]::Providers[$providerName] } } function global:Get-ProfileProvider($appConfigPath=$null, $providerName=$null) { if($appConfigPath -ne $null) { Set-WebConfigPath $webConfigPath } if($providerName -eq $null) { return [System.Web.Profile.ProfileManager]::Provider } else { return [System.Web.Profile.ProfileManager]::Providers[$providerName] } }
0
Convert-FspToUsername.ps1
Function Convert-FspToUsername { <# .SYNOPSIS Convert a FSP to a sAMAccountName .DESCRIPTION This function converts FSP's to sAMAccountName's. .PARAMETER UserSID This is the SID of the FSP in the form of S-1-5-20. These can be found in the ForeignSecurityPrincipals container of your domain. .EXAMPLE Convert-FspToUsername -UserSID "S-1-5-11","S-1-5-17","S-1-5-20" sAMAccountName Sid -------------- --- NT AUTHORITY\\Authenticated Users S-1-5-11 NT AUTHORITY\\IUSR S-1-5-17 NT AUTHORITY\\NETWORK SERVICE S-1-5-20 Description =========== This example shows passing in multipe sids to the function .EXAMPLE Get-ADObjects -ADSPath "LDAP://CN=ForeignSecurityPrincipals,DC=company,DC=com" -SearchFilter "(objectClass=foreignSecurityPrincipal)" | foreach {$_.Properties.name} |Convert-FspToUsername sAMAccountName Sid -------------- --- NT AUTHORITY\\Authenticated Users S-1-5-11 NT AUTHORITY\\IUSR S-1-5-17 NT AUTHORITY\\NETWORK SERVICE S-1-5-20 Description =========== This example takes the output of the Get-ADObjects function, and pipes it through foreach to get to the name property, and the resulting output is piped through Convert-FspToUsername. .NOTES This function currently expects a SID in the same format as you see being displayed as the name property of each object in the ForeignSecurityPrincipals container in your domain. .LINK http://scripts.patton-tech.com/wiki/PowerShell/ActiveDirectoryManagement#Convert-FspToUsername #> Param ( [Parameter( Position=0, Mandatory=$true, ValueFromPipeline=$true)] $UserSID ) Begin { } Process { foreach ($Sid in $UserSID) { try { $SAM = (New-Object System.Security.Principal.SecurityIdentifier($Sid)).Translate([System.Security.Principal.NTAccount]) $Result = New-Object -TypeName PSObject -Property @{ Sid = $Sid sAMAccountName = $SAM.Value } Return $Result } catch { $Result = New-Object -TypeName PSObject -Property @{ Sid = $Sid sAMAccountName = $Error[0].Exception.InnerException.Message.ToString().Trim() } Return $Result } } } End { } }
0
2642.ps1
param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ServerList, [Parameter(Mandatory=$false)] [string] $OutputPath=([Environment]::GetFolderPath("MyDocuments"))) if((Test-Path $OutputPath) -eq $false) { throw "Invalid -OutputPath, please use a valid file path" } if(Test-Path $ServerList){ $output=@() $machines=Get-Content $ServerList $filename=(Join-Path -Path $OutputPath -ChildPath("Environement_IP_List_"+(Get-Date -Format yyyyMMddHHmm)+".csv")) foreach($machine in $machines){ $return=New-Object System.Object if(Test-Connection $machine -Quiet -Count 1){ $ip = (Test-Connection $machine -count 1).IPV4Address.ToString() } else{ $ip = "Machine not available" } $return | Add-Member -type NoteProperty -Name "Host" -Value $machine $return | Add-Member -type NoteProperty -Name "IP" -Value $ip $output+=$return } $output | Export-CSV -Path $filename -NoTypeInformation } else{ throw "Invalid -ServerList, please use a valid file path" }
0
sample_36_56.ps1
@{ # Script module or binary module file associated with this manifest. RootModule = 'Microsoft.NetworkController.Powershell' # Version number of this module. ModuleVersion = '1.0.0.0' # ID used to uniquely identify this module GUID = '05718206-c147-47b6-83f5-92f52af61c6e' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2014 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Powershell cmdlets to manage a NetworkController deployment' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '4.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of the .NET Framework required by this module DotNetFrameworkVersion = '4.5' # Minimum version of the common language runtime (CLR) required by this module # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('ComplexTypeDefinitions.psm1', 'NetworkControllerCredential.cdxml', 'NetworkControllerIpPool.cdxml', 'NetworkControllerMacPool.cdxml', 'NetworkControllerPublicIpAddress.cdxml', 'NetworkControllerFabricRoute.cdxml', 'NetworkControllerLogicalNetwork.cdxml', 'NetworkControllerLogicalSubnet.cdxml', 'NetworkControllerServer.cdxml', 'NetworkControllerVirtualServer.cdxml', 'NetworkControllerServerInterface.cdxml', 'NetworkControllerGateway.cdxml', 'NetworkControllerGatewayPool.cdxml', 'NetworkControllerVirtualGateway.cdxml', 'NetworkControllerVirtualGatewayBgpPeer.cdxml', 'NetworkControllerVirtualGatewayBgpRouter.cdxml', 'NetworkControllerVirtualGatewayNetworkConnection.cdxml', 'NetworkControllerVirtualGatewayPolicyMap.cdxml' 'NetworkControllerVirtualNetwork.cdxml', 'NetworkControllerAccessControlList.cdxml', 'NetworkControllerAccessControlListRule.cdxml', 'NetworkControllerSecurityTag.cdxml', 'NetworkControllerInternalResourceInstances.cdxml', 'NetworkControllerMultisiteConfiguration.cdxml', 'NetworkControllerMultisitePrimary.cdxml', 'NetworkControllerState.cdxml', 'NetworkControllerStatistics.cdxml', 'NetworkControllerVirtualNetworkConfiguration.cdxml', 'NetworkControllerVirtualSwitchConfiguration.cdxml', 'NetworkControllerAuditingSettingsConfiguration.cdxml', 'NetworkControllerRoute.cdxml', 'NetworkControllerRouteTable.cdxml', 'NetworkControllerServiceInsertion.cdxml', 'NetworkControllerLoadBalancer.cdxml', 'NetworkControllerLoadBalancerBackendAddressPool.cdxml', 'NetworkControllerLoadBalancerConfiguration.cdxml', 'NetworkControllerLoadBalancerFrontendIpConfiguration.cdxml', 'NetworkControllerLoadBalancerInboundNatRule.cdxml', 'NetworkControllerLoadBalancerMux.cdxml', 'NetworkControllerLoadBalancerOutboundNatRule.cdxml', 'NetworkControllerLoadBalancerProbe.cdxml', 'NetworkControllerLoadBalancingRule.cdxml', 'NetworkControllerNetworkInterface.cdxml', 'NetworkControllerNetworkInterfaceIpConfiguration.cdxml', 'NetworkControllerVirtualSubnet.cdxml', 'NetworkcontrollerConnectivityCheck.cdxml', 'NetworkcontrollerConnectivityCheckResult.cdxml', 'NetworkcontrollerBackup.cdxml', 'NetworkcontrollerRestore.cdxml', 'NetworkcontrollerSubnetEgressReset.cdxml', 'NetworkControllerIpReservation.cdxml', 'NetworkControllerVirtualNetworkPeering.cdxml', 'NetworkControllerIDnsServerConfiguration.cdxml', 'NetworkControllerDiscovery.cdxml', 'NetworkControllerLearnedIpAddress.cdxml' ) # Functions to export from this module FunctionsToExport = '*' # Cmdlets to export from this module CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module AliasesToExport = '*' # List of all modules packaged with this module. # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess # PrivateData = '' # HelpInfo URI of this module HelpInfoURI = 'https://aka.ms/winsvr-2025-pshelp' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_54_87.ps1
. "$PSScriptRoot/../project/api.ps1" . "$PSScriptRoot/helpers.ps1" function Get-Php-From-Ini-File { param ( $IniFilePath ) $configIni = Get-IniContent($IniFilePath) if ($configIni.phpCLI -and $configIni.phpCLI.phpRuntime) { return $configIni.phpCLI.phpRuntime } return $null } function Get-Php-Ini-From-Ini-File { param ( $IniFilePath ) $configIni = Get-IniContent($IniFilePath) if ($configIni.phpCLI -and $configIni.phpCLI.iniFilePath) { return $configIni.phpCLI.iniFilePath } return $null } function Get-Php { $projectRoot = Get-Project-Root $environmentName = Get-Environment-Name if (Test-Path -Path "$projectRoot/Custom/tools/php-path.txt") { $php = Get-Content -Path "$projectRoot/Custom/tools/php-path.txt" -Raw } if (-Not $php) { $php = Get-Php-From-Ini-File -IniFilePath "$projectRoot/Custom/configuration/config-env-$environmentName.ini" } if (-Not $php) { $php = Get-Php-From-Ini-File -IniFilePath "$projectRoot/Custom/configuration/config-customer.ini" } if (-Not $php) { $php = Get-Php-From-Ini-File -IniFilePath "$projectRoot/Config/config.ini" } if (-Not $php) { $php = "php" } return $php } function Get-Php-Directory { $projectRoot = Get-Project-Root $php = Get-Php-From-Ini-File -IniFilePath "$projectRoot/Custom/configuration/config-dev.ini" if (-Not $php) { $php = Get-Php-From-Ini-File -IniFilePath "$projectRoot/Custom/configuration/config-customer.ini" } if (-Not $php) { $php = Get-Php-From-Ini-File -IniFilePath "$projectRoot/Config/config.ini" } if (-Not $php) { return $null } return Split-Path -parent $php } function Clear-Opcache { param ( $php=(Get-Php) ) if ($IsLinux) { $linuxVersion = GetLinuxVersion if ($linuxVersion -eq "rhel" -or $linuxVersion -eq "fedora") { Write-Host "Reload httpd to clear opcache" & "systemctl" "reload" "php-fpm*" } else { Write-Host "Reload apache2 to clear opcache" & "systemctl" "reload" "apache2" } } else { Write-Host "Recycle app pools to clear opcache" & $env:windir\system32\inetsrv\appcmd list apppools /state:Started /xml | & $env:windir\system32\inetsrv\appcmd recycle apppools /in if (-Not ($LastExitCode -eq 0)) { throw "Please check logs" } } }
0
2411.ps1
function Set-RegistryValueForAllUsers { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [hashtable[]]$RegistryInstance ) try { New-PSDrive -Name HKU -PSProvider Registry -Root Registry::HKEY_USERS | Out-Null $LoggedOnSids = $(Get-ChildItem HKU: | Where-Object { $_.Name -match 'S-\d-\d+-(\d+-){1,14}\d+$' } | foreach-object { $_.Name }) Write-Verbose "Found $($LoggedOnSids.Count) logged on user SIDs" foreach ($sid in $LoggedOnSids) { Write-Verbose -Message "Loading the user registry hive for the logged on SID $sid" foreach ($instance in $RegistryInstance) { if (!(Test-Path "HKU:\$sid\$($instance.Path)")) { New-Item -Path "HKU:\$sid\$($instance.Path | Split-Path -Parent)" -Name ($instance.Path | Split-Path -Leaf) -Force | Out-Null } Set-ItemProperty -Path "HKU:\$sid\$($instance.Path)" -Name $instance.Name -Value $instance.Value -Type $instance.Type -Force } } Write-Verbose "Setting Active Setup registry value to apply to all other users" foreach ($instance in $RegistryInstance) { $Guid = [guid]::NewGuid().Guid $ActiveSetupRegParentPath = 'HKLM:\Software\Microsoft\Active Setup\Installed Components' New-Item -Path $ActiveSetupRegParentPath -Name $Guid -Force | Out-Null $ActiveSetupRegPath = "HKLM:\Software\Microsoft\Active Setup\Installed Components\$Guid" Write-Verbose "Using registry path '$ActiveSetupRegPath'" switch ($instance.Type) { 'String' { $RegValueType = 'REG_SZ' } 'Dword' { $RegValueType = 'REG_DWORD' } 'Binary' { $RegValueType = 'REG_BINARY' } 'ExpandString' { $RegValueType = 'REG_EXPAND_SZ' } 'MultiString' { $RegValueType = 'REG_MULTI_SZ' } default { throw "Registry type '$($instance.Type)' not recognized" } } $ActiveSetupValue = "reg add `"{0}`" /v {1} /t {2} /d {3} /f" -f "HKCU\$($instance.Path)", $instance.Name, $RegValueType, $instance.Value Write-Verbose -Message "Active setup value is '$ActiveSetupValue'" Set-ItemProperty -Path $ActiveSetupRegPath -Name '(Default)' -Value 'Active Setup Test' -Force Set-ItemProperty -Path $ActiveSetupRegPath -Name 'Version' -Value '1' -Force Set-ItemProperty -Path $ActiveSetupRegPath -Name 'StubPath' -Value $ActiveSetupValue -Force } } catch { Write-Warning -Message $_.Exception.Message } }
0
sample_7_48.ps1
#************************************************ # TS_ClusterCAUWMINamespaceCheck.ps1 # Version 1.0.1 # Date: 1/16/2013 # Author: v-kaw # Description: [Idea ID 6519] [Windows] Invalid Class error on 2012 Clusters (SDP) # Rule number: 6519 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=6519 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 6519 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_ClusterCAUWMINamespaceCheck" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function IsCluster #Check if this machine is cluster. { $ClusterKeyName = "HKLM:\Cluster" if (Test-Path -Path $ClusterKeyName) { return $true } else { return $false } } Function AppliesToSystem { #Add your logic here to specify on which environments this rule will appy return (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2) -and (IsCluster) ) #win8 } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ if($_.Exception.ErrorCode -ne $null) { $Script:ErrorCode = "0X{0:X}" -f $_.Exception.ErrorCode } elseif ($_.Exception.HResult -ne $null) { $Script:ErrorCode = "0X{0:X}" -f $_.Exception.HResult } elseif (($_.Exception -eq $null) -and ($_.HResult -ne $null)) { $Script:ErrorCode = "0X{0:X}" -f $_.HResult } if ($_.Exception.Message -ne $null) { $Script:ErrorMessage = $_.Exception.Message } elseif ($_.ErrorDetails.Message -ne $null) { $Script:ErrorMessage = $_.ErrorDetails.Message } elseif($_.FullyQualifiedErrorId -ne $null) { $Script:ErrorMessage = $_.FullyQualifiedErrorId } continue } $Error.Clear() $Scope = [System.Management.ManagementScope] "\\.\root\Microsoft\Windows\ClusterUpdate" $Scope.Connect() if ($Error.Count -eq 0) { $query = [System.Management.ObjectQuery] "Select * from MSFT_CAUNode" $Searcher = New-Object System.Management.ManagementObjectSearcher $Searcher.Scope = $Scope $Searcher.Query = $query $Searcher.Get() } if ($Error.Count -gt 0) { $RootCauseDetected = $true $InformationCollected | add-member -membertype noteproperty -name "Cluster Node" -value $ComputerName $InformationCollected | add-member -membertype noteproperty -name "WMI namespace" -value 'root\Microsoft\Windows\ClusterUpdate' $InformationCollected | add-member -membertype noteproperty -name "WMI Class" -value 'MSFT_CAUNode' $InformationCollected | add-member -membertype noteproperty -name "Error accessing Class" -value $Script:ErrorMessage $InformationCollected | add-member -membertype noteproperty -name "Exception code" -value $Script:ErrorCode } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB+CPouWGtLilfA # nnLCONmz6uCGVOjFVZTqS9cY5RmcpKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFP4WgDEPcbiop4FMOA14jJm # Oa+e4EYgd3bC7NtyS5jyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAUfb2B3M6ayTC4FwCjVOeiAV5Symx5uZlrWjuraZY7jJpbrPkIDFSRiGO # rlGkBy//V71xKdgkuJJSWhlsvSV6G0v/KGoLaSfLPZNCwX059AiICVCEV0GnGYkf # p50zdLQlQF1Ip/gGwxJmk59H+e8xvL3KhmDCCfCccW9SwQ5UfcdNmP3ytC952rNM # Qc4LmfDIiTLPzS6EoSlKWj3W8upnIquzjzyaNF/h2dLoqMjen+QTjNEYrUvrZOv0 # FchZMKN3vIg14aa3/XKT8YoLFEepr4v3zj6PuDyobTVVM6okIPvAG0wM8gtVHugX # mgTU98+7V68D5bfeh9mNwrL1B2Qy2aGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAlCjvdYghahAcoYuvvVe4hJoPbaS2XKQq/D+dk8WsBOgIGZxp1kNwj # GBMyMDI0MTAyODExNDA0MC43MDlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1 # NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP # AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU # 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt # n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp # un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q # lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld # HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDHtxO58ehri6G5lDzDowdfYxhpSOi/O/m7amXccc4HBjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo # rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn # cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIAPMhc0ABoA1rRbkDKbEcPrVa/ # +oM/znyEElOFfbXEdX7GAKo4hp4STN+lXVBPph/2eH+QNwCcojrY0ek/umaV87IK # j6CbzfmwLnKKhZQFPP8oV3MUYWL/0gtl0KWBQdEkIKtYL1dKPqugiBwCPMN2J6Vb # RrTJPiqS69AOxyRPJBmnZQ3VJ8NG5PoaZeLiHVkIjNS1EBW5YlmTEmzZI8YfgAiE # p+z5o40JsDSfcLLRkMwKQ0vkyu1z8GeLYlx77nvRF4AmF5HKlhEvWoCatjBZHhZR # Y3uA9mqzg8S/IV5HEO0ggCtSlWCVW/h+uz3uI3Zfs6uEKSm/cP9Puu+cMS57Pdtg # 7n8vninwJDEwqdiIz18cxIlsszlK2y/o7dWA2Kd8zpih8rLU48MaDJrNNHsFNKzx # HSnSKT/w8AaL8EfBj4zoxmi9g4sKWfVPO9N6zvm2cYAdaVBw+JMUM/cFXuQjCYQ4 # qoo5dqFroTNxDQB8bPvT2qYNQnebVQdBObq9isIH8mX8c7+N/hqcZuiWJLlKNo+2 # HSsaWd23EjfF1BHa9eIHemj3N6ebcYArojxFY4/LtTunUTtg44sPrsHbBvVcAbjs # ySk3WCjqFGQ604oXuS6mSf8yBjgSbB9A3mQQsAGZ8FDKElUXUN6mRudRmgeHRG4K # VbwPiqpINDvxwNJ1DMo= # SIG # End signature block
0
New-SqlConnectionString.ps1
function New-SqlConnectionString { #.Synopsis # Create a new SQL ConnectionString #.Description # Builds a SQL ConnectionString using SQLConnectionStringBuilder with the supplied parameters #.Example # New-SqlConnectionString -Server DBServer12 -Database NorthWind -IntegratedSecurity -MaxPoolSize 4 -Pooling #.Example # New-SqlConnectionString -Server DBServer4 -Database NorthWind -Login SA -Password "" [CmdletBinding(DefaultParameterSetName='Default')] PARAM( # A full-blown connection string to start from [String]${ConnectionString}, # The name of the application associated with the connection string. [String]${ApplicationName}, # Whether asynchronous processing is allowed by the connection created by using this connection string. [Switch]${AsynchronousProcessing}, # The name of the primary data file. This includes the full path name of an attachable database. [String]${AttachDBFilename}, # The length of time (in seconds) to wait for a connection to the server before terminating the attempt and generating an error. [String]${ConnectTimeout}, # Whether a client/server or in-process connection to SQL Server should be made. [Switch]${ContextConnection}, # The SQL Server Language record name. [String]${CurrentLanguage}, # The name and/or network address of the instance of SQL Server to connect to. [Parameter(Position=0)] [Alias("Server","Address")] [String]${DataSource}, # Whether SQL Server uses SSL encryption for all data sent between the client and server if the server has a certificate installed. [Switch]${Encrypt}, # Whether the SQL Server connection pooler automatically enlists the connection in the creation thread's current transaction context. [Switch]${Enlist}, # The name or address of the partner server to connect to if the primary server is down. [String]${FailoverPartner}, # The name of the database associated with the connection. [Parameter(Position=1)] [Alias("Database")] [String]${InitialCatalog}, # Whether User ID and Password are specified in the connection (when false) or whether the current Windows account credentials are used for authentication (when true). [Switch]${IntegratedSecurity}, # The minimum time, in seconds, for the connection to live in the connection pool before being destroyed. [Int]${LoadBalanceTimeout}, # The maximum number of connections allowed in the connection pool for this specific connection string. [Int]${MaxPoolSize}, # The minimum number of connections allowed in the connection pool for this specific connection string. [Int]${MinPoolSize}, # Whether multiple active result sets can be associated with the associated connection. [Switch]${MultipleActiveResultSets}, # The name of the network library used to establish a connection to the SQL Server. [String]${NetworkLibrary}, # The size in bytes of the network packets used to communicate with an instance of SQL Server. [Int]${PacketSize}, # The password for the SQL Server account. [AllowEmptyString()] [String]${Password}, # Whether security-sensitive information, such as the password, is returned as part of the connection if the connection is open or has ever been in an open state. [Switch]${PersistSecurityInfo}, # Whether the connection will be pooled or explicitly opened every time that the connection is requested. [Switch]${Pooling}, # Whether replication is supported using the connection. [Switch]${Replication}, # How the connection maintains its association with an enlisted System.Transactions transaction. [String]${TransactionBinding}, # Whether the channel will be encrypted while bypassing walking the certificate chain to validate trust. [Switch]${TrustServerCertificate}, # The type system the application expects. [String]${TypeSystemVersion}, # The user ID to be used when connecting to SQL Server. [Alias("UserName","Login")] [String]${UserID}, # Whether to redirect the connection from the default SQL Server Express instance to a runtime-initiated instance running under the account of the caller. [Switch]${UserInstance}, # The name of the workstation connecting to SQL Server. [String]${WorkstationID}, # Whether to return the SqlConnectionStringBuilder for further modification instead of just a connection string. [Switch]${AsBuilder} ) BEGIN { if(!( 'System.Data.SqlClient.SqlConnectionStringBuilder' -as [Type] )) { $null = [Reflection.Assembly]::Load( 'System.Data, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089' ) } } PROCESS { $Builder = New-Object System.Data.SqlClient.SqlConnectionStringBuilder -Property $PSBoundParameters if($AsBuilder) { Write-Output $Builder } else { Write-Output $Builder.ToString() } } }
0
sample_26_88.ps1
<# .SYNOPSIS Demonstrates how to write a command that works with paths that do not allow wildards but must exist. .DESCRIPTION This command does not require a LiteralPath parameter because the Path parameter can handle paths that use wildcard characters. That's because this command does not "resolve" the supplied path. .EXAMPLE C:\PS> Import-FileNoWildcard -Path ..\..\Tests\foo[1].txt -WhatIf This example shows how the Path parameter can handle a path that happens to use the wildcard chars "[" and "]". #> function Import-FileNoWildcard { [CmdletBinding(SupportsShouldProcess=$true)] param( # Specifies a path to one or more locations. [Parameter(Mandatory=$true, Position=0, ParameterSetName="Path", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Path to one or more locations.")] [Alias("PSPath")] [ValidateNotNullOrEmpty()] [string[]] $Path ) begin { } process { # Modify [CmdletBinding()] to [CmdletBinding(SupportsShouldProcess=$true)] $paths = @() foreach ($aPath in $Path) { if (!(Test-Path -LiteralPath $aPath)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$aPath' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$aPath $psCmdlet.WriteError($errRecord) continue } # Resolve any relative paths $paths += $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($aPath) } foreach ($aPath in $paths) { if ($pscmdlet.ShouldProcess($aPath, 'Operation')) { # Process each path $aPath } } } end { } } # SIG # Begin signature block # MIIr5AYJKoZIhvcNAQcCoIIr1TCCK9ECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAfzLutwn2+TZtl # ROHMHoV6NbYy6BXv9v/bMMcnE/HZ76CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzDCCGcgCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJnq0gDB8hgni2ygCGyv375PpSBWhmrO # HH2a5cXZvIMbMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # VcKbZD6NmQjPiSMGDNQ7wLbSjQ0Y1HNVMrr4nh19gpAg7uOBjEoPO4xqFjQ/DMVj # n5mS1h7mXZXTKCYI9L34zDg4YMS9BQAXnKpIGitwcpo5u6ZNZeH4jW9YlamgvQP/ # kc1rmv/SKYlYzeFdcsIIuUmv5Oy7RoZChDGykrKMzvdu0Mh5Feeu9h/gRy+h5gVq # U+8U1P5cCJfbN2RvX7PAYumQJQIlf3I26OxIG4P5W2kRgmUnLWH1KdyKpXrQKswI # AfALqjTp3Zg2KhVHa57YmqsrqzmmPt6VoTgJ+qfqwQ18JDXmfTgup8mqegoDxXBg # J3SfMcmyCSMqilnzgo7K/qGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqG # SIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCBAfJIUm5AE6LLNqnT1aKAVZNTw8VS5PNkd67zCXQV5cAIGZfLqMkhFGBMyMDI0 # MDQwMzIyNTgxOS42NDFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIH # IDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MTlaFw0y # NTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/Rn7kjqMk # Z5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1tzMwCNIo # Cq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060akEZiJJz # 1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQqdskM48EB # cWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0EjK7ONhl # QfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8/ar9cG4W # 7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR792scF7tjD # 5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOEblpJzRmz # aP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7Sbbf2tGSZ # f3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+wHDYGhci # JDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mulIwIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARCpvtDPq2K # FP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTnHvQ0+8hK # y86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6ZlxKGyZw # KmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOnLD4njJwf # jIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRiDZky5OAx # oLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+uni2VmDo # 7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGbn7iVkF2W # 9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTeGEDOoIr3 # 5kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B5PVAp2xz # rosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSvKhqQpmdB # zAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9gHLuyZAQ # ezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCzcgTnGasS # we/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6bfD+jAiGA8yMDI0MDQwMzEyMDMwNloYDzIw # MjQwNDA0MTIwMzA2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpt8P6AgEAMAcC # AQACAhEoMAcCAQACAhOdMAoCBQDpuRV6AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBACueZuB4/njuoCZFlDNbY77i+HmZ3ZRK9zlO8YSEbvBJWVrQcKQC3ZtF # b3zy/dXD3gSIxxKeHXlqoJCPYWCX4EJSWEsMV/OaZ0/eo/LpiYwWuOkdm7bu08aK # hr8ETyKU+VV8nxITmWFOQYttDtryGViBwyUwf5TmTy4LT7ztXOj1OTDekDLeBx03 # KqrN2JsnxhaVnJy455h90ZwNEvWyuHiBTkhFN2lCxgJ7B0GyAEFQjHoc+3qR6Khq # 9ShG4Nire/3ScPL8R/nZWmkh6P0qMo4PyUVvts01W2O/bDCzZ6chrBXBXyKMKc4u # sIaxbQTovDgLO2/NAB4pJqfx2dyVvEAxggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB5zANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCC1e5OD+T87/I1KQNc2tKQ2ZTI/5Sx+XWZodxkrz6VXzTCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeEX74Fv0ABvQMG # 7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAHnLo8vkwtPG+kAAQAAAecwIgQgkGmWhU2omx+r0HTWnxQqlbm6/VVf6bLd701Z # X1FWRT8wDQYJKoZIhvcNAQELBQAEggIAS9r/qFl3MThr/cTPCeOsbadVQ+W5iTKB # usSEJqJrq7V6xdHFAyX4U2aivL1hN00p8e89BO3bLMr3Q1WZK7jkoOLuxSlkp+zf # vI0YvTEYwdXv2l4SAJfRi2JhOZR4Y4AvrlHpqP93rAfpUyrNGyEqlH6OzLZJELLo # YnIr+rK92uKwcPyQFso5OriYmbwuprM+ZS5jjGf+Uf95WmOfVPycIRp0FtX9vXs5 # e+n8tzT0b8n3UXb7FjuYMs+KGc20rK1yLfr2Z2v6oGP3/TI05uUTErmP0qquCann # WBPA5I6cYeqskqCLggQiH2b7RY1ca6Bp84rzEmng9mtQuwm+oP92yXJesmZqxjcf # uhbuQkIXkLPB2MaLt7WRmBFoa7nSQECUbKqYLUMDoBzBXGi/MR94lVdGyQp+uRmh # DZiSykch+8AfsB+hlbzYGhFqydiXHIjKuPoACLRV1out90V7nIZG/yJf8NR9bUR7 # yVslHcnKOt9jjUB4FI0WlTHE57G4ip4PPWtZSQVbhSMUo1IkK1p+oUzSBIxKBeW3 # ATg5OCkIUdb+GUobjEinp+k6JqAyT3KnpHTjQ0H2OMCMjSMLCDehrkgxyG6IssZ+ # /P34jVCNtP55/8GVz8lZ20pngGB4ReY7fGXH8as/7I1Dqn2J+3pzauLxEbvGH/dK # X0B1BLZQw7c= # SIG # End signature block
0
4026.ps1
function Test-RoleDefinitionCreateTests { $rdName = 'CustomRole Tests Role' $inputFilePath = Join-Path -Path $TestOutputRoot -ChildPath Resources\NewRoleDefinition.json New-AzRoleDefinitionWithId -InputFile $inputFilePath -RoleDefinitionId ee78fa8a-3cdd-418e-a4d8-949b57a33dcd $rd = Get-AzRoleDefinition -Name $rdName Assert-AreEqual "Test role" $rd.Description Assert-AreEqual $true $rd.IsCustom Assert-NotNull $rd.Actions Assert-AreEqual "Microsoft.Authorization/*/read" $rd.Actions[0] Assert-AreEqual "Microsoft.Support/*" $rd.Actions[1] Assert-NotNull $rd.AssignableScopes Assert-Null $rd.DataActions Assert-Null $rd.NotDataActions $roleDef = Get-AzRoleDefinition -Name "Reader" $roleDef.Id = $null $roleDef.Name = "New Custom Reader" $roleDef.Actions.Add("Microsoft.ClassicCompute/virtualMachines/restart/action") $roleDef.Description = "Read, monitor and restart virtual machines" $roleDef.AssignableScopes[0] = "/subscriptions/4004a9fd-d58e-48dc-aeb2-4a4aec58606f" New-AzRoleDefinitionWithId -Role $roleDef -RoleDefinitionId 678c13e9-6637-4471-8414-e95f7a660b0b $addedRoleDef = Get-AzRoleDefinition -Name "New Custom Reader" Assert-NotNull $addedRoleDef.Actions Assert-AreEqual $roleDef.Description $addedRoleDef.Description Assert-AreEqual $roleDef.AssignableScopes $addedRoleDef.AssignableScopes Assert-AreEqual $true $addedRoleDef.IsCustom Remove-AzRoleDefinition -Id $addedRoleDef.Id -Force Remove-AzRoleDefinition -Id $rd.Id -Force } function Test-RdNegativeScenarios { $rdName = 'aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa' $rdNull = Get-AzRoleDefinition -Name $rdName Assert-Null $rdNull $rdId = '85E460B3-89E9-48BA-9DCD-A8A99D64A674' $badIdException = "Cannot find role definition with id '" + $rdId + "'." $inputFilePath = Join-Path -Path $TestOutputRoot -ChildPath Resources\RoleDefinition.json Assert-Throws { Set-AzRoleDefinition -InputFile $inputFilePath } $badIdException $roleDefNotProvided = "Parameter set cannot be resolved using the specified named parameters." Assert-Throws { Set-AzRoleDefinition } $roleDefNotProvided $roleDefNotProvided = "Cannot validate argument on parameter 'InputFile'. The argument is null or empty. Provide an argument that is not null or empty, and then try the command again." Assert-Throws { Set-AzRoleDefinition -InputFile "" } $roleDefNotProvided Assert-Throws { Set-AzRoleDefinition -InputFile "" -Role $rdNull } $roleDefNotProvided $roleDefNotProvided = "Cannot validate argument on parameter 'Role'. The argument is null or empty. Provide an argument that is not null or empty, and then try the command again." Assert-Throws { Set-AzRoleDefinition -Role $rdNull } $roleDefNotProvided Assert-Throws { Set-AzRoleDefinition -InputFile $inputFilePath -Role $rd } $roleDefNotProvided $removeRoleException = "The specified role definition with ID '" + $rdId + "' does not exist." $missingSubscription = "MissingSubscription: The request did not have a provided subscription. All requests must have an associated subscription Id." Assert-Throws { Remove-AzRoleDefinition -Id $rdId -Force} $removeRoleException } function Test-RDPositiveScenarios { $rdName = 'Another tests role' $inputFilePath = Join-Path -Path $TestOutputRoot -ChildPath Resources\RoleDefinition.json $rd = New-AzRoleDefinitionWithId -InputFile $inputFilePath -RoleDefinitionId 0a0e83bc-50b9-4c4d-b2c2-3f41e1a8baf2 $rd = Get-AzRoleDefinition -Name $rdName $rd.Actions.Add('Microsoft.Authorization/*/read') $updatedRd = Set-AzRoleDefinition -Role $rd Assert-NotNull $updatedRd $deletedRd = Remove-AzRoleDefinition -Id $rd.Id -Force -PassThru Assert-AreEqual $rd.Name $deletedRd.Name $readRd = Get-AzRoleDefinition -Name $rd.Name Assert-Null $readRd } function Test-RDUpdate { $rdName = 'Another tests role' $inputFilePath = Join-Path -Path $TestOutputRoot -ChildPath Resources\RoleDefinition.json $rd = New-AzRoleDefinitionWithId -InputFile $inputFilePath -RoleDefinitionId 3d95b97a-5745-4c39-950c-0b608dea635f $rd = Get-AzRoleDefinition -Name $rdName $scopes = $rd.AssignableScopes | foreach { $_ } $rd.AssignableScopes.Clear() $rd.AssignableScopes.Add('/subscriptions/0b1f6471-1bf0-4dda-aec3-cb9272f09590/resourcegroups/rbactest') for($i = $scopes.Count - 1 ; $i -ge 0; $i--){ $rd.AssignableScopes.Add($scopes[$i]) } $updatedRd = Set-AzRoleDefinition -Role $rd Assert-NotNull $updatedRd $deletedRd = Remove-AzRoleDefinition -Id $rd.Id -Force -PassThru Assert-AreEqual $rd.Name $deletedRd.Name } function Test-RDCreateFromFile { $badScopeException = "Exception calling `"ExecuteCmdlet`" with `"0`" argument(s): `"Scope '/subscriptions/4004a9fd-d58e-48dc-aeb2-4a4aec58606f/ResourceGroups' should have even number of parts.`"" try { $inputFilePath = Join-Path -Path $TestOutputRoot -ChildPath Resources\InvalidRoleDefinition.json $rd = New-AzRoleDefinitionWithId -InputFile $inputFilePath -RoleDefinitionId 4482e4d1-8757-4d67-b3c1-5c8ccee3fdcc Assert-AreEqual "This assertion shouldn't be hit'" "New-AzRoleDefinition should've thrown an exception" } catch { Assert-AreEqual $badScopeException $_ } } function Test-RDRemove { $subscription = $(Get-AzContext).Subscription $resourceGroups = Get-AzResourceGroup | Select-Object -Last 1 -Wait $scope = "/subscriptions/" + $subscription[0].SubscriptionId $rgScope = "/subscriptions/" + $subscription[0].SubscriptionId + "/resourceGroups/" + $resourceGroups[0].ResourceGroupName $roleDef = Get-AzRoleDefinition -Name "Reader" $roleDef.Id = $null $roleDef.Name = "CustomRole123_65E1D983-ECF4-42D4-8C08-5B1FD6E86335" $roleDef.Description = "Test Remove RD" $roleDef.AssignableScopes[0] = $rgScope $Rd = New-AzRoleDefinitionWithId -Role $roleDef -RoleDefinitionId ec2eda29-6d32-446b-9070-5054af630991 Assert-NotNull $Rd $badIdException = "RoleDefinitionDoesNotExist: The specified role definition with ID '" + $Rd.Id + "' does not exist." Assert-Throws { Remove-AzRoleDefinition -Id $Rd.Id -Scope $scope -Force -PassThru} $badIdException $badIdException = "RoleDefinitionDoesNotExist: The specified role definition with ID '" + $Rd.Id + "' does not exist." Assert-Throws { Remove-AzRoleDefinition -Id $Rd.Id -Scope $scope -Force -PassThru} $badIdException $deletedRd = Remove-AzRoleDefinition -Id $Rd.Id -Scope $rgScope -Force -PassThru Assert-AreEqual $Rd.Name $deletedRd.Name } function Test-RDGet { $subscription = $(Get-AzContext).Subscription $resource = Get-AzResource | Select-Object -Last 1 -Wait Assert-NotNull $resource "Cannot find any resource to continue test execution." $subScope = "/subscriptions/" + $subscription[0].SubscriptionId $rgScope = "/subscriptions/" + $subscription[0].SubscriptionId + "/resourceGroups/" + $resource.ResourceGroupName $resourceScope = $resource.ResourceId $roleDef1 = Get-AzRoleDefinition -Name "Reader" $roleDef1.Id = $null $roleDef1.Name = "CustomRole_99CC0F56-7395-4097-A31E-CC63874AC5EF" $roleDef1.Description = "Test Get RD" $roleDef1.AssignableScopes[0] = $subScope $roleDefSubScope = New-AzRoleDefinitionWithId -Role $roleDef1 -RoleDefinitionId d4fc9f7d-2f66-49e9-ac32-d0586105c587 Assert-NotNull $roleDefSubScope $roleDef1.Id = $null $roleDef1.Name = "CustomRole_E3CC9CD7-9D0A-47EC-8C75-07C544065220" $roleDef1.Description = "Test Get RD" $roleDef1.AssignableScopes[0] = $rgScope $roleDefRGScope = New-AzRoleDefinitionWithId -Role $roleDef1 -RoleDefinitionId 6f699c1d-055a-4b2b-93ff-51e4be914a67 Assert-NotNull $roleDefRGScope $roleDef1.Id = $null $roleDef1.Name = "CustomRole_8D2E860C-5640-4B7C-BD3C-80940C715033" $roleDef1.Description = "Test Get RD" $roleDef1.AssignableScopes[0] = $resourceScope $roleDefResourceScope = New-AzRoleDefinitionWithId -Role $roleDef1 -RoleDefinitionId ede64d68-3f7d-4495-acc7-5fc2afdfe0ea Assert-NotNull $roleDefResourceScope $roles1 = Get-AzRoleDefinition -Scope $subScope $roles2 = Get-AzRoleDefinition -Scope $rgScope $roles3 = Get-AzRoleDefinition -Scope $resourceScope $deletedRd = Remove-AzRoleDefinition -Id $roleDefSubScope.Id -Scope $subScope -Force -PassThru Assert-AreEqual $roleDefSubScope.Name $deletedRd.Name $deletedRd = Remove-AzRoleDefinition -Id $roleDefRGScope.Id -Scope $rgScope -Force -PassThru Assert-AreEqual $roleDefRGScope.Name $deletedRd.Name $deletedRd = Remove-AzRoleDefinition -Id $roleDefResourceScope.Id -Scope $resourceScope -Force -PassThru Assert-AreEqual $roleDefResourceScope.Name $deletedRd.Name } function Test-RoleDefinitionDataActionsCreateTests { $rdName = 'CustomRole Tests Role New' $inputFilePath = Join-Path -Path $TestOutputRoot -ChildPath Resources\DataActionsRoleDefinition.json New-AzRoleDefinitionWithId -InputFile $inputFilePath -RoleDefinitionId e3efe8c9-d9ae-4f0e-838d-57ce43068a13 $rd = Get-AzRoleDefinition -Name $rdName Assert-AreEqual "Test role" $rd.Description Assert-AreEqual $true $rd.IsCustom Assert-NotNull $rd.DataActions Assert-AreEqual "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/*" $rd.DataActions[0] Assert-NotNull $rd.NotDataActions Assert-AreEqual "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write" $rd.NotDataActions[0] Assert-NotNull $rd.AssignableScopes Assert-Null $rd.Actions Assert-Null $rd.NotActions $roleDef = Get-AzRoleDefinition -Name "Reader" $roleDef.Id = $null $roleDef.Name = "New Custom Reader" $roleDef.DataActions.Add("Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write") $roleDef.Description = "Read, monitor and restart virtual machines" $roleDef.AssignableScopes[0] = "/subscriptions/0b1f6471-1bf0-4dda-aec3-cb9272f09590" New-AzRoleDefinitionWithId -Role $roleDef -RoleDefinitionId 3be51641-acdb-4f4a-801f-a93da8c5762d $addedRoleDef = Get-AzRoleDefinition -Name "New Custom Reader" Assert-NotNull $addedRoleDef.Actions Assert-AreEqual $roleDef.Description $addedRoleDef.Description Assert-AreEqual $roleDef.AssignableScopes $addedRoleDef.AssignableScopes Assert-AreEqual $true $addedRoleDef.IsCustom Remove-AzRoleDefinition -Id $addedRoleDef.Id -Force Remove-AzRoleDefinition -Id $rd.Id -Force } function Test-RDGetCustomRoles { $rdName = 'Another tests role' $inputFilePath = Join-Path -Path $TestOutputRoot -ChildPath Resources\RoleDefinition.json $rd = New-AzRoleDefinitionWithId -InputFile $inputFilePath -RoleDefinitionId 3d95b97a-5745-4c39-950c-0b608dea635f $rd = Get-AzRoleDefinition -Name $rdName $roles = Get-AzRoleDefinition -Custom Assert-NotNull $roles foreach($roleDefinition in $roles){ Assert-AreEqual $roleDefinition.IsCustom $true } Remove-AzRoleDefinition -Id $rd.Id -Force } function Test-RdValidateInputParameters ($cmdName) { $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/Should be 'ResourceGroups'/any group name" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/Should be 'ResourceGroups'/any group name' should begin with '/subscriptions/<subid>/resourceGroups'." Assert-Throws { invoke-expression ($cmdName + " -Scope `"" + $scope + "`" -Id D46245F8-7E18-4499-8E1F-784A6DA5BE25") } $invalidScope $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups' should have even number of parts." Assert-Throws { &$cmdName -Scope $scope -Id D46245F8-7E18-4499-8E1F-784A6DA5BE25} $invalidScope $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups' should have even number of parts." Assert-Throws { &$cmdName -Scope $scope -Id D46245F8-7E18-4499-8E1F-784A6DA5BE25} $invalidScope $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Should be 'Providers'/any provider name" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Should be 'Providers'/any provider name' should begin with '/subscriptions/<subid>/resourceGroups/<groupname>/providers'." Assert-Throws { &$cmdName -Scope $scope -Id D46245F8-7E18-4499-8E1F-784A6DA5BE25} $invalidScope $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Providers/providername" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Providers/providername' should have at least one pair of resource type and resource name. e.g. '/subscriptions/<subid>/resourceGroups/<groupname>/providers/<providername>/<resourcetype>/<resourcename>'." Assert-Throws { &$cmdName -Scope $scope -Id D46245F8-7E18-4499-8E1F-784A6DA5BE25} $invalidScope } function Test-RdValidateInputParameters2 ($cmdName) { $roleDef = Get-AzRoleDefinition -Name "Reader" $roleDef.Name = "CustomRole_99CC0F56-7395-4097-A31E-CC63874AC5EF" $roleDef.Description = "Test Get RD" $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/Should be 'ResourceGroups'/any group name" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/Should be 'ResourceGroups'/any group name' should begin with '/subscriptions/<subid>/resourceGroups'." $roleDef.AssignableScopes[0] = $scope; Assert-Throws { &$cmdName -Role $roleDef } $invalidScope $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups' should have even number of parts." $roleDef.AssignableScopes[0] = $scope; Assert-Throws { &$cmdName -Role $roleDef } $invalidScope $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups' should have even number of parts." $roleDef.AssignableScopes[0] = $scope; Assert-Throws { &$cmdName -Role $roleDef } $invalidScope $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Should be 'Providers'/any provider name" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Should be 'Providers'/any provider name' should begin with '/subscriptions/<subid>/resourceGroups/<groupname>/providers'." $roleDef.AssignableScopes[0] = $scope; Assert-Throws { &$cmdName -Role $roleDef } $invalidScope $scope = "/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Providers/providername" $invalidScope = "Scope '/subscriptions/e9ee799d-6ab2-4084-b952-e7c86344bbab/ResourceGroups/groupname/Providers/providername' should have at least one pair of resource type and resource name. e.g. '/subscriptions/<subid>/resourceGroups/<groupname>/providers/<providername>/<resourcetype>/<resourcename>'." $roleDef.AssignableScopes[0] = $scope; Assert-Throws { &$cmdName -Role $roleDef } $invalidScope } function Test-RDFilter { $readerRole = Get-AzRoleDefinition -Name "Reader" Assert-NotNull $readerRole Assert-AreEqual $readerRole.Name "Reader" $customRoles = Get-AzRoleDefinition -Custom Assert-NotNull $customRoles foreach($role in $customRoles){ Assert-NotNull $role Assert-AreEqual $role.IsCustom $true } } function Test-RDDataActionsNegativeTestCases { $rdName = 'Another tests role' $inputFilePath = Join-Path -Path $TestOutputRoot -ChildPath Resources\RoleDefinition.json $rd = New-AzRoleDefinitionWithId -InputFile $inputFilePath -RoleDefinitionId 3d95b97a-5745-4c39-950c-0b608dea635f $rd = Get-AzRoleDefinition -Name $rdName $createdRole = Get-AzRoleDefinition -Name $rdName Assert-NotNull $createdRole $expectedExceptionForActions = "'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/*' does not match any of the actions supported by the providers." $createdRole.Actions.Add("Microsoft.Storage/storageAccounts/blobServices/containers/blobs/*") Assert-Throws { New-AzRoleDefinitionWithId -Role $createdRole -RoleDefinitionId 0309cc23-a0be-471f-abeb-dd411a8422c7 } $expectedExceptionForActions $createdRole.Actions.Clear() $createdRole.DataActions.Add("Microsoft.Authorization/*/read") $expectedExceptionForDataActions = "The resource provider referenced in the action has not published any data operations." Assert-Throws { New-AzRoleDefinitionWithId -Role $createdRole -RoleDefinitionId 06801870-23ba-41ee-8bda-b0e2360164a8 } $expectedExceptionForDataActions $createdRole.DataActions.Clear() $createdRole.DataActions.Add("Microsoft.Storage/storageAccounts/blobServices/containers/blobs/*") $createdRole.NotActions.Add("Microsoft.Storage/storageAccounts/blobServices/containers/blobs/*") Assert-Throws { New-AzRoleDefinitionWithId -Role $createdRole -RoleDefinitionId e4c2893e-f945-4831-8b9f-3568eff03170 } $expectedExceptionForActions $createdRole.NotActions.Clear() $createdRole.NotDataActions.Add("Microsoft.Authorization/*/read") Assert-Throws { New-AzRoleDefinitionWithId -Role $createdRole -RoleDefinitionId a8ac9ed7-0ce6-4425-a221-c3d4c3063dc2 } $expectedExceptionForDataActions $createdRole.NotDataActions.Clear() Remove-AzRoleDefinition -Id $createdRole.Id -Force }
0
1247.ps1
function Uninstall-CUser { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true)] [ValidateLength(1,20)] [string] $Username ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( Test-CUser -Username $username ) { $user = Get-CUser -Username $Username try { if( $pscmdlet.ShouldProcess( $Username, "remove local user" ) ) { $user.Delete() } } finally { $user.Dispose() } } } Set-Alias -Name 'Remove-User' -Value 'Uninstall-CUser'
0
665.ps1
Describe "Get-RsFolderContent" { Context "Get folder with ReportServerUri parameter"{ $folderName = 'SutGetFolderReportServerUriParameter' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $reportServerUri = 'http://localhost/reportserver' $folderList = Get-RsFolderContent -ReportServerUri $reportServerUri -RsFolder / $folderCount = ($folderList | Where-Object name -eq $folderName).Count It "Should found a folder" { $folderCount | Should Be 1 } Remove-RsCatalogItem -ReportServerUri 'http://localhost/reportserver' -RsFolder $folderPath -Confirm:$false } Context "Get folder with proxy parameter"{ $folderName = 'SutGetFolderProxyParameter' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $proxy = New-RsWebServiceProxy $folderList = Get-RsFolderContent -Proxy $proxy -RsFolder / $folderCount = ($folderList | Where-Object name -eq $folderName).Count It "Should found a folder" { $folderCount | Should Be 1 } Remove-RsCatalogItem -ReportServerUri 'http://localhost/reportserver' -RsFolder $folderPath -Confirm:$false } Context "Get folder with Proxy and ReportServerUri parameter"{ $folderName = 'SutGetFolderProxyAndReportServerUriParameter' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $folderName $folderPath = '/' + $folderName $proxy = New-RsWebServiceProxy $reportServerUri = 'http://localhost/reportserver' $folderList = Get-RsFolderContent -Proxy $proxy -ReportServerUri $reportServerUri -RsFolder / $folderCount = ($folderList | Where-Object name -eq $folderName).Count It "Should found a folder" { $folderCount | Should Be 1 } Remove-RsCatalogItem -ReportServerUri 'http://localhost/reportserver' -RsFolder $folderPath -Confirm:$false } Context "Get folder inside 4 folders"{ $sutRootFolder = 'SutGetFolderParent' + [guid]::NewGuid() New-RsFolder -Path / -FolderName $sutRootFolder $currentFolderDepth = 2 $folderParentName = $sutRootFolder While ($currentFolderDepth -le 5) { $folderParentPath += '/' + $folderParentName $folderParentName = 'SutGetFolderParent' + $currentFolderDepth New-RsFolder -Path $folderParentPath -FolderName $folderParentName $currentFolderDepth +=1 } $fifthFolderPath = $folderParentPath + '/' + $folderParentName $rootFolderPath = '/' + $sutRootFolder $folderList = Get-RsFolderContent -RsFolder $rootFolderPath -Recurse $folderCount = ($folderList | Where-Object path -eq $fifthFolderPath).Count It "Should found 4 subfolders" { $folderCount | Should Be 1 $folderList.Count | Should be 4 } Remove-RsCatalogItem -ReportServerUri 'http://localhost/reportserver' -RsFolder $rootFolderPath -Confirm:$false } }
0
sample_53_94.ps1
#region ::::: Help ::::: <# .SYNOPSIS Script Name: GetLogs.ps1 Purpose: gather data from Windows Failover Cluster Nodes (default 3 Month back) Version: 1.4 Last Update: 2nd June 2020 Author: Josef Holzer Email-Alias: josefh .DESCRIPTION This script collects data from one or more computers If the script runs on a cluster node with cluster service running, it collects data from all cluster nodes .PARAMETER ComputerNames Define on which computers you want to run the script. Default is local host .PARAMETER LogPathLocal Path where we store the data. Default is SystemDrive\MS_DATA\DataTime; e.g. C:\MS_DATA\180925-101214 .PARAMETER HoursBack How much hours should we look back in the event data and collect them. Test Default =1 .PARAMETER EventLogNames Define the Eventlogs you want to gather; wildcard * is allowed Sample: -EventLogNames "System", "Application", "*CSVFS*", "*Smb*", "*winrm*", "*wmi*", "*spaces*" Alternatively define this in the parameter section on top of this script .EXAMPLE GetLogs.ps1 # simply run it without any parameter to collect all data with defaults .EXAMPLE GetLogs.ps1 -ComputerName H16N4 # run the script data collection on specific computer .EXAMPLE To access the Info´s stored in xml files, do what is done in the following sample $Inf= Import-CliXml -path "C:\MS_DATA\190221-121553\H16N1-GeneralInfoPerHost.xml" $Inf # lists all Members $Inf.Hotfix # Lists installed Hotfixes for example .EXAMPLE checkout #> #endregion ::::: Help ::::: #region ::::: Changelog - Whats New in this Version ::::: <# Changelog started at 20th of April 2020 Ver 1.3 - What´s new ? - Added function CopyFilesInReportsFoldersToLocalComputer -ComputerNames $ComputerNames From each Node additionally collecting all files in "$Env:SystemRoot\Cluster\Reports" (e.g. c:\windows\cluster\reports) to Local MS_DATA Folder - By default collect more "Event Logs" - *CSVFS*, *Hyper-V*, "*Smb*", "*spaces*" #> #endregion ::::: Changelog - Whats New in this Version ::::: #region ::::: ToDo - Ideas for the future :::::: <# [=== Processing on Customer Site - Data Collection ===] - Distribute Jobs across Hosts - Collect Disk, Volume etc. data - Create a Map - Volume --> Partition --> Disk - CSV --> Volume --> Disk --> GUID - Add most important parts of Get-NetView to GetNetInfoPerHost - Add Binary Versions - like Get-NetView does this to GetGeneralInfoPerHost [=== Processing on Engineers Machine ===] - Extract more simply *.txt files from *.xml files [=== Data Analysis ===] - System Eventlog - find most common events 5120, 1135, 6005 - Cluster Log - operational green events - Cluster Service started - clussvc.exe started - Mostly you this is due to a reboot - The current time is - gives you the local time and the difference to Cluster GMT - The logs were generated using - Tells you if logs were generated in GMT or local time - I am the form/join coordinator (offline and lowest number node) - tells you who the coordinator node is - GroupMove -Cluster Groups are Moved by cluster service - MoveType::Manual) - Tells you if the Move Group was triggered manually by the customer - General Errors, Warnings... - ERR - Errors - Case sensitive - WARN - Warnings - Case sensitive - critical - Critical Events - fatal - failed - Critical Events of Clussvc and rhs - terminated, - Cluster service terminated - Cluster service has terminated - removed from the active failover cluster membership - the node was removed from the active cluster - timeout - Timed out - STATUS_IO_TIMEOUT - deadlock - Critical Events - communication Issue - as down - are down - lost communication - is broken - is no longer accessible - Node Disconnected - Node communication to this node does no longer work - Networking issue - Disconnected - general look for Disconnected - mostly Physical Disk resource xyz has been disconnected - Lost quorum - Lost Cluster Quorum (including votes of witness resource) - Critical Events - Isolated, quarantined - isolated - Cluster Node has beem marked as beeing in isolated state - I have been quarantined - The current node says it has been quarantined - node ungracefully leaves cluster 3 times in an hour - has been quarantined - Another Node in the cluster has been quarantined - 'Start-ClusterNode –ClearQuarantine' - clussvc tried to ClearQuarantine - quarantine - General Info on nodes quarantine status - Critical Events - Disks - SetSharedPRKey: failed - tried to send SCSIReserve Command with Persistent Reservation Shared Key, but failed - Reservation.SetPrKey failed - SCSI Persistent Reservation Key failed - PR reserve failed, status 170 - SCSI Persistent Reservation failed - so you can´t access the disk - Unable to arbitrate - tried to arbitrate a disk - SCSIReserve was sent, but this node could not claim the disk - Critical Events - CSV - is no longer accessible from this cluster node - CSV is no longer accessible from this cluster node - is no longer available on this node because of - CSV is no longer available on this node because of - hopefully a reason is mentioned - STATUS_CONNECTION_DISCONNECTED - CSV has entered a paused state because of STATUS_CONNECTION_DISCONNECTED #> #endregion ::::: ToDo - Ideas for the future :::::: #region ::::: Define Script Input Parameters ::::: param( $ComputerNames = $env:COMPUTERNAME, # Pass ComputerNames e.g. H16N1, default is local host name [String]$LogPath = "$env:SystemDrive\MS_DATA\" + (Get-Date -Format 'yyMMdd-HHmmss'), # Path where the data on each remote computer will be stored [Int]$HoursBack = 2016, # Define how much hours we should look back in the eventlogs 1day= 24; 1Week=168, 1Month= 672, 3Month= 2016, 6Month= 4032, 1Year= 8064 [String]$ClusterName, # if no ClusterName is passed use local Cluster - implemented in main # Define which EventLogNames should be collected; either you pass the full Eventlogname or a mask like "*Hyper*" # To check out what the Eventlog names look like for e.g. Hyper-V: Get-WinEvent -ListLog "*Hyper-V*" $EventLogNames=( "System", #"Application", "*CSVFS*", "*Hyper-V*", "*Smb*", "*spaces*" #"*winrm*", #"*wmi*", #"Microsoft-Windows-FailoverClustering/Operational" ), # Define which cluster validation tests should run on customers Cluster Nodes $ClusterValidationTestNames=( "Cluster Configuration", "Hyper-V Configuration", "Inventory","Network", #"Storage", # Note: Storage Tests will lead to a short interruption of access to disks and should not be run in a production environment "System Configuration" ), #region ::::: Switches ::::: [switch]$NetInfo = $True # If $NetInfo is true, we call GetNetInfoPerHost to collect network related information #endregion ::::: Switches ::::: ) #endregion ::::: Define Script Input Parameters ::::: #region ::::: Define Global Variables ::::: # Section for global variables, which you don´t want to show up in the parameter region [bool]$IsClusSvcRunning = $False # variable, to save status of cluster service running/stopped #endregion ::::: Define Global Variables ::::: #region ::::: Helper Functions ::::: #function Show Progress - Global parameters $sTimeStampScriptStart= [String](Get-Date -Format 'yyMMdd-HHmmss') # Date as String to be used in Folder Name for Files e.g. MS_DATA\190820-1032 $TimeStampScriptStart = Get-Date # get the timestamp, when this script starts $TimeStampStartSaved = $Script:TimeStampScriptStart # only first time save the script start timestamp $DebugLogPath = $LogPath # Directory, where the logs are stored $DebugLogPathFull = "$DebugLogPath\$sTimeStampScriptStart-ScriptDebug.log" # FullPath of the Scripts Debug.log $DebugLogLevel = 3 # If DebugLogLevel is 3 everything is logged; 0 is disabled, 1=Light, 2= Medium, 3=All $DebugLogBuffer = @() # Collect DebugLog Messages in ShowProgress and save them later to a file $DebugLogCount = 0 # Counter for DebugLogs $DebugLogCountMax = 50 # After X Messages Save to file $DebugLogToFile = $True # Default is True, so we spew out the Debug Messages to a File $RunOnlyOnce = $True # Bool to spew out some Messages only once $ScriptFullName = $MyInvocation.InvocationName # Full Path of the Script Name <# SYNOPSIS: show what we are doing so far; should be placed on top of all other functions Owner: josefh/sergeg #> function ShowProgress { param( $MessageUser = "", # pass your own message $ForeColor = "White" # default ForeGroundColor is White ) If ($Script:DebugLogLevel -eq 0 ) { Return } # If DebugLogLevel is 0 exit this function imediately # Get the function name, that was calling ShowProgress function GetFunctionName ([int]$StackNumber = 1) { # https://stackoverflow.com/questions/3689543/is-there-a-way-to-retrieve-a-powershell-function-name-from-within-a-function return [string]$(Get-PSCallStack)[$StackNumber].FunctionName } $TimeDisplay = [String](Get-Date -Format 'yyMMdd-HHmmss') # time stamp to display on each action/function call. eg 'yyMMdd-HHmmss' $TimeStampCurrent = Get-Date $TimeDiffToStart = $TimeStampCurrent - $TimeStampScriptStart # overall duration since start of script $TimeDiffToLast = $TimeStampCurrent - $Script:TimeStampStartSaved # time elapsed since the last action $Script:TimeStampStartSaved = $TimeStampCurrent # update/save timestamp to measure next progress duration $FuncName = GetFunctionName -StackNumber 2 # Last Function Name [String]$DurScriptDisplay = "" + $TimeDiffToStart.Minutes + ":" + $TimeDiffToStart.Seconds # " ;Script ran for Min:Sec = " # display duration since script start [String]$DurFunctionDisplay = "" + $TimeDiffToLast.Minutes + ":" + $TimeDiffToLast.Seconds # " ;Last Action took Min:Sec= " # display duration of last action or function call if (-not ($TimeDiffToLast.TotalSeconds -ge 1) ) { $DurFunctionDisplay = "0:0" } If ($RunOnlyOnce){ # Only first time write the head line to explain the columns $Description= "Script Started at $sTimeStampScriptStart ScriptFullName:$ScriptFullName on Host:$($Env:ComputerName) " If (-Not ( Test-Path -Path $DebugLogPath ) ){ # if the DebugLogPath does not already exist, e.g. default is c:\MSDATA, then Create it New-Item -Path $DebugLogPath -ItemType Directory } write-host -fore Green $Description $Description | Out-File -FilePath $DebugLogPathFull -Append $Description= "TimeStamp |TimeSinceScriptStarted Min:Sec|DurationOfLastAction Min:Sec|FunctionName| UserMessage" <# Sample Output "TimeStamp |TimeSinceScriptStarted Min:Sec|DurationOfLastAction Min:Sec|FunctionName| UserMessage" 190820-103322|0:0 |0:0 |CreateFolder| Enter 190820-103322|0:0|0:0|CreateFolder| ...On Node:H16N2 creating folder: \\H16N2\C$\MS_DATA\190820-103322 190820-103322|0:0|0:0|CreateFolder| try:CreateFolder: \\H16N2\C$\MS_DATA\190820-103322 190820-103322|0:0|0:0|CreateFolder| Folder \\H16N2\C$\MS_DATA\190820-103322 could be created successfully 190820-103322|0:0|0:0|CreateFolder| Exit #> write-host $Description $Description | Out-File -FilePath $DebugLogPathFull -Append $Script:RunOnlyOnce= $False } $FullString= "$TimeDisplay|$DurScriptDisplay|$DurFunctionDisplay|$FuncName| $MessageUser" write-host -Fore $ForeColor $FullString # if $DebugLogToFile is $Ture store Output in the Logfile if ($DebugLogToFile){ $Script:DebugLogCount++ $Script:DebugLogBuffer+= $FullString if ($Script:DebugLogCount -ge $DebugLogCountMax) { write-host -ForegroundColor Yellow "Flushing DebugLogBuffer to $DebugLogPathFull" $Script:DebugLogBuffer | Out-File -FilePath $DebugLogPathFull -Append $Script:DebugLogCount= 0 # Reset DebugLogCount to 0 $Script:DebugLogBuffer= @() # Reset DebugLogBuffer to empty String } } } # End of ShowProgress # Checkout if the script runs as admin function DoIRunAsAdmin{ $currentPrincipal = New-Object Security.Principal.WindowsPrincipal ` ( [Security.Principal.WindowsIdentity]::GetCurrent() ) if ($currentPrincipal.IsInRole( [Security.Principal.WindowsBuiltInRole]::Administrator )) { return $true } else { return $false } } function CreateFolder { # SYNOPSIS: a general function to create any folder, do some checks and do reporting Param( $HostName, $FolderPath ) ShowProgress "Enter" $ErrorActionPreferenceSave = $ErrorActionPreference # Save the current ErrorActionPreference $ErrorActionPreference = 'Stop' # Change ErrorActionPreferrence to stop in order to prevent the cmdlet to handle the error on its own if (-not (Test-Path $FolderPath) ){ # if the folder does not already exist ShowProgress "...On Node:$HostName creating folder: $FolderPath" try{ ShowProgress "try:CreateFolder: $FolderPath" If ($Env:ComputerName -eq $HostName){ # if we are on the local host where we run the script New-Item -Path $FolderPath -ItemType Directory | Out-Null # Create folder on the loacal host, to make it faster and prevent issues with WinRM } else{ Invoke-Command -ComputerName $HostName -ScriptBlock { # Make it all remote capable New-Item -Path $Using:FolderPath -ItemType Directory | Out-Null # Create folder, could be remote and suppress output } } ShowProgress "Folder $FolderPath could be created successfully" #ShowProgress "...On Node:$HostName finished creating folder: $FolderPath" } Catch{ # since ErrorActionPreference is on 'Stop' we jump into the catch block if New-Item failed ShowProgress -Fore red "Catch: Error during Folder Creation" # we ran into an issue ShowProgress -Fore red "Unable to create the Folder $FolderPath on $HostName " ShowProgress -Fore Red "FullQualifiedErrorId: $($Error[0].FullyQualifiedErrorId)" ShowProgress -Fore Red "Full ErrorMessage:$_" If ($Error[0].FullyQualifiedErrorId -like "AccessDenied*"){ ShowProgress -Fore Magenta "Please check if you are running the powershell host (window) with administrative privileges" } If ($Error[0].FullyQualifiedErrorId -like "*server name cannot be resolved*"){ $HostNameFQDN= [System.Net.Dns]::GetHostEntry($HostName).HostName ShowProgress -Fore Magenta "Looks like the Server Name could not be resolved. [System.Net.Dns]::GetHostEntry(`$HostName):$HostNameFQDN " } ShowProgress -ForeColor Yellow -BackColor Black "Aborting this script now " EXIT } } $ErrorActionPreference = $ErrorActionPreferenceSave ShowProgress "Exit" } function CreateLogFolderOnHosts { # SYNOPSIS: could be only one param( $ComputerNames, $LogPath ) ShowProgress "...Start creating Log folder on Hosts: $ComputerNames" foreach($ComputerName in $ComputerNames){ ShowProgress "...Start creating Log folder on Host:$ComputerName" $LogPathDollar = $LogPath.Replace(":","$") # e.g. C:\MS-Data --> C$\MS-Data $LogPathUNC = "\\$($ComputerName)\$LogPathDollar" # e.g. \\H16N2\c$\MS-Data CreateFolder -HostName $ComputerName -FolderPath $LogPathUNC } ShowProgress "...Finished creating log folder on hosts" } function MoveDataFromAllComputersToLocalComputer { # SYNOPSIS: move remotly collected data to local folder, e.g. C:\MS_DATA\180925-101214 param( $ComputerNames ) ShowProgress "Enter" $LocalHost = $env:COMPUTERNAME $LogPathLocal = $Script:LogPath # LogPath e.g. c:\MS_DATA $ErrorActionPreferenceSave = $ErrorActionPreference # Save the current ErrorActionPreference $ErrorActionPreference = 'Stop' # Change ErrorActionPreferrence to stop in order to prevent the cmdlet to handle the error on its own $WaitSec = 10 # Wait for a couple of seconds; default 10 seconds ShowProgress "...Start moving all data files from all Hosts:$ComputerNames to local Host:$LocalHost" foreach($ComputerName in $ComputerNames){ if (-not ($ComputerName -eq $LocalHost) ){ $LogPathDollar = $LogPath.Replace(":","$") # e.g. $LogPath = C:\MS_DATA --> C$\MS_DATA $LogPathRemoteUNC = "\\$($ComputerName)\$LogPathDollar" # e.g. \\H16N2\c$\MS_DATA ShowProgress "...Start moving files from $LogPathRemoteUNC to $LogPathLocal" # Sometimes the remote path is not reachable, so we check out and handle this one time # if it becomes a reoccuring issue we should run this in a loop and try several times if ( !(Test-Path -Path $LogPathRemoteUNC) ){ ShowProgress -Fore DarkMagenta "Catch: Could not reach remote Path: $LogPathRemoteUNC" # we had an issue - lets wait and do the move then ShowProgress -Fore DarkMagenta "Let´s wait for some seconds:$WaitSec ... and try again" Start-Sleep -Seconds $WaitSec # Wait for a couple of seconds if the path is not available immediately } # if the path is available ShowProgress "Finally: Moving Remote files to Local Host " ShowProgress "...trying to collect all data files from all Hosts:$ComputerNames and move to local Host:$LocalHost ..." Move-Item -Path $LogPathRemoteUNC\* -Destination $LogPathLocal # Move Files to Local Path } } $ErrorActionPreference = $ErrorActionPreferenceSave ShowProgress "...Finished moving all data files from all Hosts:$ComputerNames to local Host:$LocalHost" ShowProgress "Exit" } function CopyFilesInReportsFoldersToLocalComputer{ # SYNOPSIS: Copy files in "C:\Windows\Cluster\Reports" from each node to local folder, e.g. C:\MS_DATA\180925-101214 #Validation Reports, #Cluster\reports, #reports, #test-cluster param( $ComputerNames ) ShowProgress "Enter" $LocalHost = $env:COMPUTERNAME $LogPathLocal = $Script:LogPath # LogPath e.g. c:\MS_DATA $ErrorActionPreferenceSave = $ErrorActionPreference # Save the current ErrorActionPreference $ErrorActionPreference = 'Stop' # Change ErrorActionPreferrence to stop in order to prevent the cmdlet to handle the error on its own $WaitSec = 10 # Wait for a couple of seconds; default 10 seconds ShowProgress "...Start Copying all files in '`$Env:SystemRoot\Windows\Cluster\Reports' from each node:$ComputerNames to local Host:$LocalHost" foreach($ComputerName in $ComputerNames){ $ReportsPath = "$Env:SystemRoot\Cluster\Reports" # Reports Path on the current Node "C:\Windows\Cluster\Reports" $ReportsPathDollar = $ReportsPath.Replace(":","$") # e.g. $ReportsPathDollar= "C$\Windows\Cluster\Reports" $ReportsPathUNC= "\\$($ComputerName)\$ReportsPathDollar" # e.g. = $ReportsPathUNC= "H16N2\C$\Windows\Cluster\Reports" ShowProgress "...Start copying files from $ReportsPathUNC to $LogPathLocal" # Sometimes the remote path is not reachable, so we check out and handle this one time # if it becomes a reoccuring issue we should run this in a loop and try several times if ( !(Test-Path -Path $ReportsPathUNC) ){ ShowProgress -Fore DarkMagenta "Catch: Could not reach remote Path: $ReportsPathUNC" # we had an issue - lets wait and do the move then ShowProgress -Fore DarkMagenta "Let´s wait for some seconds:$WaitSec ... and try again" Start-Sleep -Seconds $WaitSec # Wait for a couple of seconds if the path is not available immediately } # if the path is available ShowProgress "Finally: Copying Remote files to Local Host " ShowProgress "...trying to copy all files in $ReportsPath to $LogPathLocal" $ReportsFolder= "$LogPathLocal\$ComputerName\Reports" CreateFolder -HostName $env:COMPUTERNAME -FolderPath $ReportsFolder Copy-Item "$ReportsPathUNC\*" -Destination $ReportsFolder # Copy Reports Folder to e.g. c:\MS_DATA\H16\Reports } $ErrorActionPreference = $ErrorActionPreferenceSave ShowProgress "...Finished Copying all files in $($ReportsPathUNC) to $($ReportsFolder)" ShowProgress "Exit" } #Endof CopyFilesInReportsFoldersToLocalComputer #endregion ::::: Helper Functions ::::: #region ::::: Worker Functions to Collect Computer specific Data for each host Eventlogs, OSVersion... :::::: function GetEventLogs { # SYNOPSIS: collect eventlogs from all machines param( $ComputerNames, # the name or a list of names of the computers, local or remote you want to gather Eventlogs from $HoursBack = $Script:HoursBack, # Define how much hours we should look back in the logs; Default is script scope variable $HoursBack $LogNames # list of event log names; either you pass the full Event Log name like "System" or a mask like "*Hyper*" # Sample: $EventLogNames=("System", "Application", "*CSVFS*") ) ShowProgress "Enter" foreach($ComputerName in $ComputerNames){ # Gather all EventLogs from current ComputerName, extract only last # of hours # Walk through each LogName in LogNames e.g. ("System", "Application", "*CSVFS*") foreach($LogName in $LogNames){ $LogFamilyNames = Get-WinEvent -ListLog $LogName -ErrorAction SilentlyContinue # $LogFamilyNames could be a mask representing several Logs - a LogFamily - e.g. *SMB* # if the LogName does not exist on this computer spew out a message If ( $Null -eq $LogFamilyNames) { ShowProgress -Fore DarkMagenta "Could not find the following Log on this Computer: $LogName" } # if a Pattern like *SMB* has been passed - walk through each Logname foreach($LogFamilyName in $LogFamilyNames){ # Microsoft-Windows-SmbClient/Audit, Microsoft-Windows-SMBServer/Audit and so on $LogFileName = ($LogFamilyName.LogName).Replace("/","_") # Replace Forward Slash in EventLogNames with UnderScore $LogPathDollar = $LogPath.Replace(":","$") # e.g. C:\MS-Data --> C$\MS-Data $LogPathUNC = "\\$($ComputerName)\$LogPathDollar" # e.g. \\H16N2\c$\MS-Data $LogFileNameXML = "$LogPathUNC\$ComputerName" + "_" + $LogFileName + ".XML" $LogFileNameTXT = "$LogPathUNC\$ComputerName" + "_" + $LogFileName + ".Log" $LogFileNameEvtx = "$LogPathUNC\$ComputerName" + "_" + $LogFileName + ".evtx" #Gather SystemEventlogs ShowProgress "...Start gathering EventLog:$($LogFamilyName.LogName) for Computer:$ComputerName" # Collecting EventLogs respecting HoursBack $StartTime = (Get-Date).AddHours(-$HoursBack) # Using a Filter Hash Table to filter events that match $MinutesBack # More Info: https://blogs.technet.microsoft.com/heyscriptingguy/2014/06/03/use-filterhashtable-to-filter-event-log-with-powershell/ $Evts = Get-WinEvent -ComputerName $ComputerName -ErrorAction SilentlyContinue -FilterHashtable @{Logname=$LogFamilyName.LogName; StartTime=$StartTime} #Sorting Events and selecting properties we really need $EvtsSorted = $Evts | Sort-Object TimeCreated -Descending | Select-Object MachineName, LevelDisplayName, TimeCreated, ProviderName, Id, LogName, Message # Export Events to deserialized *.xml file $EvtsSorted | Export-CliXml -Path $LogFileNameXML # Export Events as simple *.txt file $EvtsSorted | Export-Csv -Path $LogFileNameTXT -NoTypeInformation # Gathering Eventlogs in old style *.evtx with wevtutil.exe ShowProgress "...Gathering *.evtx with Old-Style-Tool:wevtutil" $MilliSecondsBack = $HoursBack * 60 * 60 * 1000 wevtutil.exe /remote:$ComputerName epl $LogFamilyName.LogName $LogFileNameEvtx /q:"*[System[TimeCreated[timediff(@SystemTime) <=$MilliSecondsBack]]]" /ow:true <# Gathering Eventlogs in the old style as *.txt - not fully checked yet wevtutil qe Application /c:3 /rd:true /f:text https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil #> ShowProgress "...Finished gathering $($LogFamilyName.LogName) for Computer:$ComputerName" ShowProgress "-----------------------------" } } } ShowProgress "Exit" } #josefh- needs to be overworked function GetStorageInfoPerHost{ param( $ComputerNames ) ShowProgress "Enter" $LogPathLocal = $Script:LogPath #Stor physical disks and the StorageNode they are connected to $AllStorageNodeDisks=@() $NodeDisks=@() ShowProgress "Enter" $StorageNodes= Get-StorageNode foreach($StorageNode in $StorageNodes){ $Dsks= $StorageNode | Get-PhysicalDisk -PhysicallyConnected foreach($Dsk in $Dsks){ $Dsk | Add-Member -NotePropertyName StorageNodeName -NotePropertyValue $StorageNode.Name $NodeDisks+=$Dsk } $NodeDisks | Export-CliXML -Path "$LogPathLocal\$($StorageNode.Name)-DisksPhysicallyConnected.xml" $AllStorageNodeDisks+= $NodeDisks $NodeDisks= @() } #gather additional data on storage foreach($ComputerName in $ComputerNames){ $StorSubSysClus = Get-StorageSubSystem *Cluster* ShowProgress "$StorSubSysClus | Debug-StorageSubSystem" try{ $StorDebugOut= $StorSubSysClus | Debug-StorageSubSystem -ErrorAction Stop } # stop so that the error is not handled by the cmdlet catch{ write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)" } # Define our own Storage Information Object $StorInf, that takes all Info around Storage $StorInf= [PSCustomObject][ordered]@{ #S2D Info S2D = Get-ClusterS2D S2DClusParam = Get-Cluster | Select-Object S2D* # S2DBusTypes= 134144 -> S2D #Physical Disks - # Interessting props Get-PhysicalDisk | select SerialNumber, CanPool, CannotPoolReason, LogicalSectorSize, PhysicalSectorSize | ft GetPhysicalDisk = Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-PhysicalDisk } DisksPhysicallyConnected = $AllStorageNodeDisks # Physical Disks Connected to which Node + Node Name #Storage Subsystem StorSubSysClus = $StorSubSysClus StorJob = $StorSubSysClus | Get-StorageJob StorDebugOut = $StorDebugOut } # Check if we have a Health Resource $HealthResourceType= Get-ClusterResource | Where-Object {$_.ResourceType -like "*Health*" } if ($Null -ne $HealthResourceType){ # if we have a Health Resource ShowProgress "Found a Health Resource on this cluster - Storing Storage Info" #Cluster Health $StorInf | Add-Member -NotePropertyName StorHealthAction -NotePropertyValue ($StorSubSysClus | Get-StorageHealthAction ) $StorInf | Add-Member -NotePropertyName StorHealthSetting -NotePropertyValue ($StorSubSysClus | Get-StorageHealthSetting ) $StorInf | Add-Member -NotePropertyName StorHealthReport -NotePropertyValue ($StorSubSysClus | Get-StorageHealthReport ) # deprecated in 2019 - Use Get-ClusterPerformanceHistory instead. $StorInf | Add-Member -NotePropertyName HealthResParam -NotePropertyValue (Get-ClusterResource Health | Get-ClusterParameter) $StorInf | Add-Member -NotePropertyName HealthResParamVal -NotePropertyValue ((Get-ClusterResource Health | Get-ClusterParameter).Value ) } # Export Info from each Node in a Separate File ShowProgress "Export Storage from Host: $ComputerName" $StorInf | Export-CliXML -Path "$LogPathLocal\$ComputerName-StorageInfoPerHost.xml" ShowProgress "...Finished Gathering GeneralInfoPerHost - stored in $LogPathLocal\$ComputerName-StorageInfoPerHost.xml"; write-host } ShowProgress "Exit" } function GetClusterPerformanceHistory{ <# $P=Import-CliXml -path "C:\MS_DATA\200204-083456\H19N1-ClusPerf.xml" ($P.Disks).Description | Group | Sort Name # To get disks listed on each Node ($P.Disks | Where Description -like "H19N1-Disk2001") | ft Desc*, SizeInGB, Time, MetricId,Value # To get values per a special disk #> param( $ClusterName, $ComputerNames ) ShowProgress "Enter" $LogPathLocal = $Script:LogPath # Check if it is 2019 Server with CU Oct 2019 or higher $OS= (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion") $ReleaseId= [Int]$OS.ReleaseId $ReleaseIdMin= 1809 # 1809= 2019 Server + CU Oct 2019 if ($ReleaseId -lt $ReleaseIdMin){ ShowProgress -ForeColor Magenta "In this OS we did not implement Get-ClusterPerf" ShowProgress -ForeColor Magenta "OS:$($OS.ProductName); Build:$($OS.CurrentBuild); ReleaseId:$ReleaseId" ShowProgress -ForeColor Magenta "Exiting this function GetClusterPerformanceHistory" Return # Exit this function } if ($ClusterName -eq ""){ # if no cluster name was passed $ClusterName= (Get-Cluster).Name # Get local cluster name on this host } # Define empty arrays to take ClusterPerformanceHistory types foreach($ComputerName in $ComputerNames){ ShowProgress "Collecting ClusterPerformanceHistory for Computer: $ComputerName" ShowProgress "Get-VM | Get-ClusterPerf" $VMs= Get-VM -CimSession $ComputerName If ( $Null -ne $VMs ){ $ClusPerfVMs=@() $ClusPerfVHDs=@() foreach($VM in $VMs){ # Get-ClusterPerf Counters for each VM $V= $VM | Get-ClusterPerf $V | Add-Member -NotePropertyName VMName -NotePropertyValue $VM.VMName $V | Add-Member -NotePropertyName VMId -NotePropertyValue $VM.VMId $V | Add-Member -NotePropertyName State -NotePropertyValue $VM.State $ClusPerfVMs+= $V $VHDs= $VM | Select-Object VMId | Get-VHD -CimSession $ComputerName | Get-ClusterPerf $ClusPerfVHDs+= $VHD | Get-ClusterPerf } } ShowProgress "Get-PhysicalDisk | Get-ClusterPerf" $PhysicalDisks= Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-PhysicalDisk } $ClusPerfDisks=@() foreach($PhysicalDisk in $PhysicalDisks){ ShowProgress "Get-PhysicalDisk | Get-ClusterPerf - Disk $($PhysicalDisk.Description)" try{ $Dsk= $PhysicalDisk | Get-ClusterPerf $Dsk | Add-Member -NotePropertyName UniqueId -NotePropertyValue $PhysicalDisk.UniqueId $Dsk | Add-Member -NotePropertyName PhysicalLocation -NotePropertyValue $PhysicalDisk.PhysicalLocation $Dsk | Add-Member -NotePropertyName Description -NotePropertyValue $PhysicalDisk.Description $Dsk | Add-Member -NotePropertyName SizeInGB -NotePropertyValue ($PhysicalDisk.Size/1024/1024/1024) # in GB $ClusPerfDisks+= $Dsk } catch{ write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)" } } ShowProgress "Get-NetAdapter | Get-ClusterPerf" $NetAdapters= Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-NetAdapter } $ClusPerfNetAdapters=@() foreach($NetAdapter in $NetAdapters){ try{ $Nic= $NetAdapter | Get-ClusterPerf $Nic | Add-Member -NotePropertyName Name -NotePropertyValue $NetAdapter.Name $Nic | Add-Member -NotePropertyName LinkSpeed -NotePropertyValue $NetAdapter.LinkSpeed $Nic | Add-Member -NotePropertyName DeviceID -NotePropertyValue $NetAdapter.DeviceID $Nic | Add-Member -NotePropertyName SystemName -NotePropertyValue $NetAdapter.SystemName $ClusPerfNetAdapters+= $Nic } catch{ write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)" } } ShowProgress "Get-Volume | Get-ClusterPerf" $Volumes= Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-Volume } $ClusPerfVolumes=@() foreach($Volume in $Volumes){ try{ $Vol= $Volume | Get-ClusterPerf $Vol | Add-Member -NotePropertyName ObjectId -NotePropertyValue $NetAdapter.ObjectId $Vol | Add-Member -NotePropertyName UniqueId -NotePropertyValue $NetAdapter.UniqueId $Vol | Add-Member -NotePropertyName SizeInGB -NotePropertyValue ($NetAdapter.Size/1024/1024/1024) $Vol | Add-Member -NotePropertyName FileSystemType -NotePropertyValue $NetAdapter.FileSystemType $ClusPerfVolumes+= $Vol } Catch{ write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)" } } ShowProgress "Get-ClusterNode | Get-ClusterPerf Node: $ComputerName" try{ $ClusPerfClusterNode= Get-ClusterNode $ComputerName | Get-ClusterPerf } Catch{ write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)" } ShowProgress "Get-Cluster | Get-ClusterPerf" try{ $ClusPerfCluster= Get-Cluster -Name $ClusterName | Get-ClusterPerf } Catch{ write-host -ForegroundColor Cyan "FullQualifiedErrorId: $($Error[0].Exception)" } $ClusPerf= [PSCustomObject][ordered]@{ Cluster = $ClusPerfCluster ClusterNode = $ClusPerfClusterNode Disks = $ClusPerfDisks NetAdapters = $ClusPerfNetAdapters VMs = $ClusPerfVMs VHDs = $ClusPerfVHDs Volumes = $ClusPerfVolumes } # Export all ClusterPerformanceHistory Info in xml File ShowProgress "Export ClusterPerformanceHistory: $ComputerName" $ClusPerf | Export-CliXML -Path "$LogPathLocal\$ComputerName-ClusPerf.xml" ShowProgress "...Finished Gathering ClusterPerformanceHistory - stored in $LogPathLocal\$ComputerName-ClusterPerformanceHistory.xml"; write-host } # foreach($ComputerName in $ComputerNames){ } # function GetClusterPerformanceHistory{ # Gather all FirewallRules with respect to a Firewall Name Filter and return as 1 object $oFirewall Function GetFirewallRules{ param( $ComputerName, $FireWallNameFilter # e.g. "Cluster" # "*" gets all Firewall Rules, but you can add your filter e.g. "cluster" ) ShowProgress "Enter" # Gather Infos you need for your object $FireWallRules= Get-NetFirewallRule -CimSession $ComputerName | Where-Object { $_.DisplayName -like "*$FireWallNameFilter*" } $FirewallPorts= Get-NetFirewallPortFilter -CimSession $ComputerName $oFireWall= @() # Create an empty array to add your Firewall Objects one by one ForEach($FireWallRule in $FireWallRules){ # Walk through each FirewallRule ForEach($FirewallPort in $FirewallPorts){ # Walk through each Firewall Port if ($FireWallPort.InstanceId -eq $FireWallRule.Id){ # check if Id´s do match # old way to create your own Powershell Object: $F= New-Object PSObject -Property @{ $F= [PSCustomObject][ordered]@{ # Create your own Object with your properties ordered FWName= $FireWallRule.Name FWDisplayName= $FireWallRule.DisplayName FWDirection= $FireWallRule.Direction FWEnabled= $FireWallRule.Enabled FWProfile= $FireWallRule.Profile PTProtol= $FireWallPort.Protocol PTLocalPort= $FireWallPort.LocalPort PTRemotePort= $FirewallPort.RemotePort } $oFirewall+= $F # Add the current object to the Array } } } ShowProgress "Exit" Return $oFirewall #return the whole array to the global scope } # End GetFirewallRules function GetMsInfo32nfo{ param( $ComputerNames ) ShowProgress "Enter" $LogPathLocal = $Script:LogPath foreach($ComputerName in $ComputerNames){ msinfo32.exe /nfo "$LogPathLocal\$ComputerName-msinfo32.nfo" /Computer $ComputerName } ShowProgress "Exit" } function GetGeneralInfoPerHost{ param( $ComputerNames ) ShowProgress "Enter" $LogPathLocal = $Script:LogPath foreach($ComputerName in $ComputerNames){ # Read Current Windows Version from the Registry $WinNTKey = Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" } $WinVer = $WinNTKey | Select-Object ProductName, InstallationType, ReleaseId, CurrentMajorVersionNumber, CurrentMinorVersionNumber, CurrentBuild, BuildBranch, BuildLab, UBR $WinVerGUI = "$($WinVer.ProductName) - Microsoft Windows $($WinVer.InstallationType) - Version $($WinVer.ReleaseId) (OS Build $($WinVer.CurrentBuild).$($WinVer.UBR)) " $VerifierQuery = Invoke-Command -ComputerName $ComputerName -ScriptBlock { verifier.exe /query } # $VerifierQuerySettings = Invoke-Command -ComputerName $ComputerName -ScriptBlock { verifier.exe /querysettings } # $CrashControlRegKey = Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-ItemProperty -path "HKLM:System\CurrentControlSet\Control\CrashControl"} # Read Dump Type from Registry <# $DumpType "HKLM:System\CurrentControlSet\Control\CrashControl\CrashDumpEnabled" $DumpType: None 0x0, Complete memory dump 0x1, Kernel memory dump 0x2, Small memory dump 0x3, Automatic Memory Dump 0x7, if CrashDumpEnabled is 0x1 and a Key FilterPages shows up and is 0x1, then the UI shows "Active Memory Dump" if CrashDumpEnabled is 0x1 and a Key FilterPages does not show up, then the UI shows "Complete Memory Dump" Automatic memory dump 0x7 (Default 2012/ 2012R2 and beyond ) https://blogs.technet.microsoft.com/askcore/2012/09/12/windows-8-and-windows-server-2012-automatic-memory-dump/ #> if ($CrashControlRegKey.CrashDumpEnabled -eq 0) { $DumpType= "None" } if ($CrashControlRegKey.CrashDumpEnabled -eq 2) { $DumpType= "Kernel Memory Dump" } if ($CrashControlRegKey.CrashDumpEnabled -eq 3) { $DumpType= "Small Memory Dump" } if ($CrashControlRegKey.CrashDumpEnabled -eq 7) { $DumpType= "Automatic Memory Dump" } if ( ($CrashControlRegKey.CrashDumpEnabled -eq 1) -and ($Null -eq $CrashControlRegKey.FilterPages) ) { $DumpType= "Complete Memory Dump" } # Complete Memory Dump if ( ($CrashControlRegKey.CrashDumpEnabled -eq 1) -and ($CrashControlRegKey.FilterPages -eq 1) ) { $DumpType= "Active Memory Dump" } # Active Memory Dump $ComputerInfo = if ($PSVersionTable.PSVersion.Major -ge 5) { Invoke-Command -ComputerName $ComputerName -ScriptBlock { Get-ComputerInfo } } else{ "No ComputerInfo as Get-ComputerInfo only works with PS Ver. > 5" } # Get All Firewall Rules ShowProgress "Collecting FirewallRules on Host $ComputerName" $oFireWallRules= GetFirewallRules -FireWallNameFilter "*" -ComputerName $ComputerName $Process= Get-Process $Service= Get-Service # Store typical Commands that can later be used to analyze data in the Exported *.xml file $Commands= (" `$I= Import-CliXml -path 'FullPathToYourXMLFile' e.g. `$I= Import-CliXML -path `"C:\MS_DATA\191113-113833\H16N1-GeneralInfoPerHost.xml`" `$I.Hotfix `$I.CrashControlRegKey `$I.FirewallRules | sort FWDirection | Select-Object FWDirection, FWName, FWDisplayName, PTProtol, PTLocalPort | Out-GridView ") # Create the custom Object to put all Info together $GenInf= [PSCustomObject][ordered]@{ HostName= $ComputerName Hotfix= Get-Hotfix -ComputerName $ComputerName WinVer= $WinVer WinVerGUI= $WinVerGUI PSVersionTable= $PSVersionTable VerifierQuery= $VerifierQuery VerifierQuerySettings= $VerifierQuerySettings CrashControlRegKey= $CrashControlRegKey DumpType= $DumpType ComputerInfo= $ComputerInfo FirewallRules= $oFireWallRules Process= $Process Service= $Service Commands= $Commands } # Export Info from each Node in a Separate File ShowProgress "Export General Info: HostName, Hotfix, Winver, ComputerInfo, PSVersionTable from Host: $ComputerName" $GenInf | Export-CliXML -Path "$Script:LogPath\$ComputerName-GeneralInfoPerHost.xml" ShowProgress "...Finished Gathering GeneralInfoPerHost - stored in $LogPathLocal\$ComputerName-GeneralInfoPerHost.xml"; write-host } ShowProgress "Exit" } function GetNetInfoPerHost{ # SYNOPSIS: collect network related info on each host param( $ComputerNames ) ShowProgress "Enter" if ($Script:NetInfo -eq $false) { RETURN } # if the switch $NetInfo is false exit this function and do not collect any Net-data here $LogPathLocal = $Script:LogPath # LogPath e.g. C:\MS_DATA foreach($ComputerName in $ComputerNames){ ShowProgress "...Start gathering network info on Computer:$ComputerName " $net = [PSCustomObject][ordered]@{ ComputerName = $ComputerName NetIpconfig = Get-NetIPConfiguration -CimSession $ComputerName Ipconfig = Ipconfig /all IpconfigDNS = Ipconfig /DisplayDNS SmbMultichannelConnection = Get-SmbMultichannelConnection -CimSession $ComputerName SmbServerConfiguration = Get-SmbServerConfiguration -CimSession $ComputerName SmbConnection = Get-SmbConnection -CimSession $ComputerName SmbSession = Get-SmbSession -CimSession $ComputerName SmbBandWidthLimit = Get-SmbBandWidthLimit -CimSession $ComputerName -ErrorAction SilentlyContinue SmbServerNetworkInterface = Get-SmbServerNetworkInterface -CimSession $ComputerName SmbMultichannelConstraint = Get-SmbMultichannelConstraint -CimSession $ComputerName SmbWitnessClient = Get-SmbWitnessClient -CimSession $ComputerName NIC = Get-NetAdapter -CimSession $ComputerName NICAdv = Get-NetAdapterAdvancedProperty -CimSession $ComputerName -Name * NICBind = Get-NetAdapterBinding -CimSession $ComputerName –Name * NICRxTx = Get-NetAdapterChecksumOffload -CimSession $ComputerName -Name * NICHW = Get-NetAdapterHardwareInfo -CimSession $ComputerName -Name * NICRIpsec = Get-NetAdapterIPsecOffload -CimSession $ComputerName -Name * NICLso = Get-NetAdapterLso -CimSession $ComputerName -Name * NICQos = Get-NetAdapterQos -CimSession $ComputerName –Name * NICREnc = Get-NetAdapterEncapsulatedPacketTaskOffload -CimSession $ComputerName -Name * NICRdma = Get-NetAdapterRdma -CimSession $ComputerName –Name * NICRsc = Get-NetAdapterRsc -CimSession $ComputerName –Name * NICRss = Get-NetAdapterRss -CimSession $ComputerName –Name * NICSriov = Get-NetAdapterSriov -CimSession $ComputerName –Name * NICVmqQueue = Get-NetAdapterVmqQueue -CimSession $ComputerName –Name * NICVmq = Get-NetAdapterVmq -CimSession $ComputerName –Name * } # Export Info from each Node in a Separate File $net | Export-CliXML -Path "$LogPathLocal\$ComputerName-NetInfoPerHost.xml" ShowProgress "...Finished gathering network Info per computer and stored in $LogPathLocal\$ComputerName-NetInfoPerHost.xml" ShowProgress "Exit" } } #endregion ::::: Workerfunctions to Collect Computer specific Data for each host Eventlogs, OSVersion... :::::: #region ::::: Worker Functions to collect Cluster specific Info :::::: function IfClusterGetNodeNames{ # SYNOPSIS: Test nodes connection and create a list of reachable nodes ShowProgress "Enter" $ErrorActionPreferenceNow= $ErrorActionPreference $ErrorActionPreference= 'Stop' $LocalComputerName = $env:COMPUTERNAME # Checkout if the cluster service is answering on this node try{ # Check if the cluster service is running if ( (Get-Service -Name ClusSvc).Status -eq "Running" ){ ShowProgress -Fore Green "Cluster Service is running on this computer: $LocalComputerName" $Script:IsClusSvcRunning = $True } else { # if we are on a cluster, but the cluster service is not running we land here $Script:IsClusSvcRunning= $False ShowProgress -Fore DarkMagenta "Cluster Service 'clussvc' is not running on this computer " ShowProgress "Exit" # Exit this loop if cluster service is not running RETURN $LocalComputerName # Return local ComputerName, if this computer is not running cluster service to gather Logs from this Host } } catch{ # if we are not on a cluster at all we are landing here ShowProgress -Fore DarkMagenta " 'Get-Service -Name ClusSvc' did not answer - looks if we have no Cluster Service on this computer " ShowProgress "Exit" RETURN $LocalComputerName # Return local ComputerName, if this computer is not running cluster service to gather Logs from this Host } # if cluster service did not answer we do not reach the following code # if cluster service answered we reached this code and will Test Network Connections to all Cluster Nodes ShowProgress "...Start testing if we can reach the Cluster Nodes over the network" $GoodNodeNames = @() # Cluster Nodes we can reach over the network $BadNodeNames = @() # Cluster Nodes we can not reach over the network $ClusterNodeNames= (Get-ClusterNode).NodeName foreach($ClusterNodeName in $ClusterNodeNames){ if (Test-Connection -ComputerName $ClusterNodeName -Count 1 -Quiet){ # test network connection $GoodNodeNames += $ClusterNodeName } else { $BadNodeNames += $ClusterNodeName } } $Nodes = [PSCustomObject]@{ Good = $GoodNodeNames Bad = $BadNodeNames } ShowProgress -Fore Green " - Could connect to Cluster Nodes: $($Nodes.Good)" if ( '' -ne ($Nodes.Bad) ){ # if we could not connect to all Nodes and have Bad Nodes... ShowProgress -Fore Red " - Could not connect to Cluster Nodes: $($Nodes.Bad)" # ...show bad nodes } else{ ShowProgress " - Could connect to all Cluster Nodes" -ForeColor "green" } ShowProgress "...Finished testing network connection to Cluster Nodes" $ErrorActionPreference= $ErrorActionPreferenceNow ShowProgress "Exit" Return $Nodes.Good # Return only the Good Nodes we can reach } Function GetClusterLogs{ param( $ClusterName, # could be replaced by the Cluster Name as string to run remotely $HoursBack= $Script:HoursBack # How much Minutes should we look back in the logs - it´s defined in the main chapter ) ShowProgress "Enter" If (!($IsClusSvcRunning)){ ShowProgress "Exit" RETURN # Exit this function } if ($ClusterName -eq ""){ # if no cluster name was passed $ClusterName= (Get-Cluster).Name # Get local cluster name on this host } ShowProgress "...Start Gathering Cluster Logs for Cluster Name:$ClusterName" # Gather ClusterLogs from All Nodes $MinutesBack= $HoursBack * 60 Get-ClusterLog -Cluster $ClusterName -TimeSpan $MinutesBack -Destination $Script:LogPath -UseLocalTime ShowProgress "...Finished Gathering Cluster Logs for Cluster Name:$ClusterName";write-host ShowProgress "Exit" } Function GetClusterHealthLogs{ param( $ClusterName, # could be replaced by the Cluster Name as string to run remotely $HoursBack= $Script:HoursBack # How much Minutes should we look back in the logs - it´s defined in the main chapter ) ShowProgress "Enter" If (!($IsClusSvcRunning)){ ShowProgress "Exit" RETURN # Exit this function } if ($ClusterName -eq ""){ # if no cluster name was passed $ClusterName= (Get-Cluster).Name # Get local cluster name on this host } ShowProgress "...Start Gathering Cluster Health Logs for Cluster Name:$ClusterName" # Gather ClusterLogs from All Nodes $MinutesBack= $HoursBack * 60 Get-ClusterLog -Cluster $ClusterName -TimeSpan $MinutesBack -Destination $Script:LogPath -UseLocalTime -Health ShowProgress "...Finished Gathering Cluster Health Logs for Cluster Name:$ClusterName";write-host ShowProgress "Exit" } function GetClusNet{ # Get all Cluster Network Info and add Livmigration Networks + LM Order and put it in one object param( $ClusterName ) ShowProgress "Enter" If (!($IsClusSvcRunning)){ ShowProgress "Clussvc is not running" ShowProgress "Exit" RETURN # Exit this function if clussvc is not running } if ($ClusterName -eq ""){ # if no cluster name was passed $ClusterName= (Get-Cluster).Name # Get local cluster name on this host } $ResourceTypeVM= Get-ClusterResourceType -Cluster $ClusterName "Virtual Machine" | Get-ClusterParameter $ClusterNetworks= Get-ClusterNetwork -Cluster $ClusterName $LiveMigrationExludeNetworks= Get-ClusterResourceType -Cluster $ClusterName "Virtual Machine" | Get-ClusterParameter MigrationExcludeNetworks $LiveMigrationNetworkOrder = (Get-ClusterResourceType -Cluster $ClusterName "Virtual Machine" | Get-ClusterParameter MigrationNetworkOrder).Value.split(";") $ClusNet= @() foreach($ClusterNetwork in $ClusterNetworks){ $i=0 foreach($LMNetOrder in $LiveMigrationNetworkOrder){ if ($ClusterNetwork.Id -eq $LMNetOrder){ $LiveMigrationOrder= $i BREAK } else{ $LiveMigrationOrder= "no LM" } $i++ } foreach($LiveMigrationExludeNetwork in $LiveMigrationExludeNetworks){ $UsedForLiveMigration= $True if ($ClusterNetwork.Id -eq $LiveMigrationExludeNetwork.value){ $UsedForLiveMigration= $False } $L= [PSCustomObject][ordered]@{ Address = $ClusterNetwork.Address AddressMask = $ClusterNetwork.AddressMask AutoMetric = $ClusterNetwork.AutoMetric Cluster = $ClusterNetwork.Cluster Description = $ClusterNetwork.Description Id = $ClusterNetwork.Id Ipv4Addresses = $ClusterNetwork.Ipv4Addresses Ipv4PrefixLengths = $ClusterNetwork.Ipv4PrefixLengths Ipv6Addresses = $ClusterNetwork.Ipv6Addresses Ipv6PrefixLengths = $ClusterNetwork.Ipv6PrefixLengths Metric = $ClusterNetwork.Metric Name = $ClusterNetwork.Name Role = $ClusterNetwork.Role State = $ClusterNetwork.State IsUsedForLiveMigration= $UsedForLiveMigration LiveMigrationOrder = $LiveMigrationOrder } $ClusNet+=$L } } ShowProgress "Exit" Return $ClusNet } function GetClusterInfo{ param( $ClusterName ) $LogPathLocal = $Script:LogPath ShowProgress "Enter" If (!($IsClusSvcRunning)){ ShowProgress "Exit" RETURN # Exit this function if clussvc is not running } if ($ClusterName -eq ""){ # if no cluster name was passed $ClusterName= (Get-Cluster).Name # Get local cluster name on this host } $C= New-Object PSObject -Property @{ # Create your own Object with your properties Name= $ClusterName CSV= Get-ClusterSharedVolume CSVParm= Get-ClusterSharedVolume | Get-ClusterParameter CSVState= Get-ClusterSharedVolumeState Group= Get-ClusterGroup Net= Get-ClusterNetwork NetplusLM= GetClusNet -ClusterName $ClusterName NIC= Get-ClusterNetworkInterface Node= Get-ClusterNode Param= Get-Cluster -Name $ClusterName | Format-List * Quorum= Get-ClusterQuorum Res= Get-ClusterResource } # Export Cluster Info $FileName= "$LogPathLocal\$($ClusterName)_ClusterInfo.XML" $C | Export-Clixml -Path $FileName # Create "$LogPathLocal\DependencyReports" ShowProgress "...Start creating folder $LogPathLocal\DependencyReports" $LogPathDollar = $LogPathLocal.Replace(":","$") # e.g. C:\MS-Data --> C$\MS-Data $LogPathUNC = "\\$($ComputerName)\$LogPathDollar" # e.g. \\H16N2\c$\MS-Data CreateFolder -HostName $Env:ComputerName -FolderPath $DebugLogPath\DependencyReports # Create Dependency Reports and save to LogPathLocal $ClusterGroups= $C.Group ForEach($ClusterGroup in $ClusterGroups){ Get-ClusterResourceDependencyReport -Group $ClusterGroup -ErrorAction SilentlyContinue | Copy-Item -Destination "$LogPathLocal\DependencyReports" Rename-Item -Path "$LogPathLocal\DependencyReports\$($ClusterGroup.Id).htm" -NewName "$ClusterGroup-ClusGroupDependencyRep.htm" -ErrorAction SilentlyContinue } ShowProgress "...Finished Gathering ClusterInfo - stored in $FileName " ShowProgress "...Finished Gathering DependencyReports - stored in $LogPathLocal\DependencyReports" ; write-host ShowProgress "Exit" } # Collect Cluster Hive and other files you need specific to cluster Nodes function GetClusterHives{ param( $ClusterName ) ShowProgress "Enter" If (!($IsClusSvcRunning)){ ShowProgress "Exit" RETURN # Exit this function if clussvc is not running } if ($ClusterName -eq ""){ # if no cluster name was passed $ClusterName= (Get-Cluster).Name # Get local cluster name on this host } $ClusterNodes= Get-ClusterNode -Cluster $ClusterName ForEach($ClusterNode in $ClusterNodes){ # Walk through each ClusterNode $HiveFileUNCPath= $Script:LogPath.Replace(":","$") # C:\MS-Data --> C$\MS-Data $RemotePath= "\\$($ClusterNode.Name)\$HiveFileUNCPath" # \\H16N2\c$\MS-Data # Saving the cluster Hive of the current Node $TimeStamp= [String](Get-Date -Format 'yyMMdd-hhmmss') # Create a Timestamp for the Cluster Hive File $ClusterHiveFileName = "$ClusterNode-Cluster-$TimeStamp.Hiv" # let´s add a time stamp to the cluster Hive File Name to make it unique $ClusterHiveFileNameFull= "$RemotePath\$ClusterHiveFileName" # e.g. \\H16N2\c$\MS-Data\H16N2-Cluster-180705-103933.Hiv # Export Cluster Hive on the remote node Invoke-Command -ComputerName $ClusterNode.Name -ScriptBlock { Invoke-Expression "REG SAVE 'HKLM\cluster' $Using:ClusterHiveFileNameFull" } # Move Cluster Hive later from remote node to local node we run the script from ShowProgress "...Finished Gathering ClusterHives - stored in $Script:LogPath "; write-host ShowProgress "Exit" } } function GetClusterValidationInfo{ param( $ClusterName, $TestNames= $ClusterValidationTestNames ) ShowProgress "Enter" If (!($IsClusSvcRunning)){ # if the cluster service is not running on this node where the script runs, exit this function ShowProgress "Exit" RETURN # Exit this function } if ($ClusterName -eq ""){ # if no cluster name was passed $ClusterName= (Get-Cluster).Name # Get local cluster name on this host } # Extension .htm is added automatically Test-Cluster -Cluster $ClusterName -Include $TestNames -ReportName "$LogPathLocal\$ClusterName-Validation-Report" ShowProgress "Exit" } function 5120 { # SYNOPSIS: collect data for symptom System Event ID 5120 ShowProgress "Enter" # to be defined ShowProgress "Exit" } #endregion ::::: Worker Functions to collect Cluster specific Info :::::: #region ===== MAIN - Preparations ================================================== ShowProgress -Fore Green "Script Start..." # Checkout if we are running with elevated privileges $RunningAsAdmin= DoIRunAsAdmin If ($RunningAsAdmin -eq $False){ ShowProgress -Fore Red "The script does not run in privileged (admin) mode" ShowProgress -Fore DarkMagenta "so we can´t query the cluster service, can´t create a log folder, debuglogfile and so on... " ShowProgress -Fore DarkMagenta "Please run again in privileged mode as admin" ShowProgress -Fore Red "Exiting script now !" EXIT # Exit the script now as it doesn´t make sense to run this script in non privileged mode } ShowProgress -Fore Green "Running functions that should go quickly now ..." if ($ClusterName -eq ""){ # if no cluster name was passed $ClusterName= (Get-Cluster).Name # Get local cluster name on this host } #josefh - needs to be overworked in order to do the check on a remote cluster as well $ComputerNames = IfClusterGetNodeNames # Check if Cluster Service answers on the current computer; if yes get the node names we can reach over network else return local computername ShowProgress "...running data collection on ComputerNames: $ComputerNames" if ($IsClusSvcRunning) { # if script runs on a cluster create the LogFolder $LogPath on all Cluster Nodes CreateLogFolderOnHosts -ComputerNames $ComputerNames -LogPath $LogPath } else { # else if the cluster service is not running create LogFolder $LogPath on local host CreateFolder -HostName "$env:ComputerName" -FolderPath $LogPath } #endregion ===== MAIN - Preparations ================================================== #region ===== MAIN - Workerfunctions ================================================== # Run ::::: Worker Functions to collect general Info :::::: # ShowProgress -Fore Green "Running functions that take longer now ..." GetEventLogs -ComputerNames $ComputerNames -HoursBack $HoursBack -LogNames $EventLogNames GetStorageInfoPerHost -ComputerNames $ComputerNames # Storage, Disk, Volume... GetGeneralInfoPerHost -ComputerNames $ComputerNames # HostName, Hotfix, Winver etc. GetNetInfoPerHost -ComputerNames $ComputerNames # Ipconfig, Smb*, NIC* etc. GetMsInfo32nfo -ComputerNames $ComputerNames # End ::::: Worker Functions to collect general Info :::::: # Run ::::: Worker Functions to collect Cluster specific Info :::::: GetClusterLogs -ClusterName $ClusterName GetClusterHealthLogs -ClusterName $ClusterName GetClusterInfo -ClusterName $ClusterName GetClusterHives -ClusterName $ClusterName #GetClusterValidationInfo -ClusterName $ClusterName # -TestNames look for $ClusterValidationTestNames in parameter section #GetClusterPerformanceHistory -ClusterName $ClusterName -ComputerNames $ComputerNames # End ::::: Worker Functions to collect Cluster specific Info :::::: # Administrative Tasks MoveDataFromAllComputersToLocalComputer -ComputerNames $ComputerNames CopyFilesInReportsFoldersToLocalComputer -ComputerNames $ComputerNames # From each node - copy all files in c:\windows\cluster\reports to Local MS_DATA Folder # # End of Script Messages $ScriptDuration= ( (Get-Date) - $TimeStampScriptStart ) # Calculate how long the script ran ShowProgress -Fore Green "Script ran for Min:Sec - $($ScriptDuration.Minutes):$($ScriptDuration.Seconds) " $DebugLogCount= $DebugLogCountMax # to flush $DebugLogBuffer to the Logfile ShowProgress -Fore Green "Exit Script - End of Script Logs can be found in: $LogPath" # #endregion ===== MAIN - Workerfunctions ================================================== # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBIbvvVQNwa4mFg # a9BGGLD5DpbH06bPvgJhk9o0MjGwEqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIETpWrNC7SmMUFIo5/S6U9Zf # qNIh7D/OJ6r84pwinL9oMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAdJ//gx9PGOuExyuiBFwUs2ye1xVlXfB7be48trQqaNLNSxjwxHx6/vo8 # X0yiaBD4Hu9s1nkWTQcmXuiM1Q2UvzTRvEqd0tVGCtm4emynjReLVyldt730IzJM # Kt0Uuorbqffiy7OQ7hdLmxEGmcpvDjQyGBgX6D95QNhumKXH1beTyXRJfo6ZcQK4 # v+phM0A44zN8aPsFps2nsBobkRwxu1T7iSKLpHBSucFLNsPeksGM80yOk9GqDij7 # J1Q3sOImR8wKD9ryKMW1DLR4XYkvVTBB2EDStqFQmaixndwr1DroaxWXAt+QxtVr # +PtCqE6wvuLNCGWS5Qp4qk3yRzVvPaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAwRRL9ZTEjPYjzX+L+FsPVymwa9vE70VA0mayzB7wxpQIGZlcW3Vim # GBMyMDI0MDYxMjE1MDAzOC4xMzNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoUCBUwIhgPMjAyNDA2MTIxOTQyMTNaGA8yMDI0MDYxMzE5NDIxM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6hQIFQIBADAHAgEAAgIMKjAHAgEAAgIR2jAKAgUA # 6hVZlQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAB2H26nt42o/vxK3P/MZ # kPl4scck4Vuby4sQf3ugEZiJdQ/U+VoU8CKkkYmk/mM5yVMD4hOlzpQqPVQHQFNz # YtAwacWJR5o9K1XGKU+rSoRKtrGTW8eOLxYEmaQOVZfJir3WiJk1yDYLVDS2Xkbt # MkcqVhAjyeGff5rNCAS1dyv6MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgboOiH2naIpbhpsHuPQ8ospQC40cBaJe0zRmDqkwY15MwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm # KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9 # m5ocaIMiAAEAAAHjMCIEINsd2aW1Y7wtnrogb26/8zWtZkK5NN+chuZAiFvrXewx # MA0GCSqGSIb3DQEBCwUABIICAAwxwtkyFYsbVfMVFhBuPJcK3QXA58KiBxUk1L95 # GnsJwCvvbLdLaOjoX7eOe1o8vEZzaxU5XBwjD5V0I50vLf1k6NADtUITlYQCfFii # VN0YJ4Py+c+viQ4Egeu/quB7p2QxIqIXsw72VQn9JwD8lGDFS3PosNOjuIPtaekm # nRMmiiHFnr5jp38FzgiD0U480Ep8kl6VIjUe3dYYVe+8FhtqJlkKFKM2C+WfHH7c # Yc0NIPpolShoXNNx6eFNdk0UIXrWqDkt4Nbxg57SMputmLhD+DSUIXlSGQH9Kt6C # +xdScaFtRRt1Llh3DTeLNud3GZVRDTvuy/ra1R5JjNi1P4zVIdBfvpPfhh1XHuV6 # zMU1sxMCrwXHRYBNIgKptVP5NKefl+cbjmnlKHY0WxR2SVnn+S1W4vUllYDa4Kmh # VE54VWPgKz04KrRCqARV+FaauCLyslfA8UP0fqstOvYeQcTIiazfI0e+FGQoP1l3 # PK7Tc1RXz0KZ6I8GiN+9fGRKzTo5T9gKINPCzCX1hjA+zv4Wkk3nkDh8AAmEZGaM # KG63CDowuSGJ0+AJB0qwmxElErHom2UWtxcRY3FNFsV0niCs/6SQDg1O8slS3+Me # VcGWGml0z+6ogd6a9goFaO8fT4HIv16EFAbVe+hC3oVd6aWKb0dBmeehE+zYqJG+ # z7nh # SIG # End signature block
0
1658.ps1
function Get-LogonHistory { param ( [string]$Computer = $env:COMPUTERNAME, [int]$Days = 1 ) $filterXml = " <QueryList> <Query Id='0' Path='System'> <Select Path='System'> *[System[ Provider[@Name = 'Microsoft-Windows-Winlogon'] and TimeCreated[@SystemTime >= '$(date (date).AddDays(-$Days) -UFormat '%Y-%m-%dT%H:%M:%S.000Z')'] ]] </Select> </Query> </QueryList> " $ELogs = Get-WinEvent -FilterXml $filterXml -ComputerName $Computer if ($ELogs) { $(foreach ($Log in $ELogs) { switch ($Log.id) { 7001 {$ET = 'Logon'} 7002 {$ET = 'Logoff'} default {continue} } New-Object PSObject -Property @{ Time = $Log.timecreated EventType = $ET User = (New-Object System.Security.Principal.SecurityIdentifier $Log.Properties.value.value).Translate([System.Security.Principal.NTAccount]) } }) | sort time -Descending } else { Write-Host "Problem with $Computer." Write-Host "If you see a 'Network Path not found' error, try starting the Remote Registry service on that computer." Write-Host 'Or there are no logon/logoff events (XP requires auditing be turned on)' } }
0
sample_6_11.ps1
#pragma namespace("\\\\.\\Root\\CIMV2") #pragma deleteinstance ("__Namespace.Name='dcim'", FAIL) #pragma include("DCIM_iSMService.mof") /* SIG # Begin signature block */ /* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBhx84+e3ZFbQaZ */ /* IjoJvvUNG+m69/vnDn7kTNPxvSbj06CCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDd2jhaUKrv */ /* Z7xNAE2sRQ+1ZEnyrqwGQSBjgDvSNwTUwzBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYAUJz/fX0FzVYvaOVqDNn+jMb6PA9DkHVk8hfULgMjE4Bq0 */ /* wFjD/rckm60zpLEl7jyKYmZ6feb42IbdBqajruJrc0I0dUs341BLBozGGuUa6jtl */ /* ouCCwWsbeJCXEplUlKwRqeR97YJ6fPJwSgKwGc6edE2oZZavkygo9COFqrr8Dreh */ /* 6jIg7w7iGywlJcam9fkB+G+GrSn5zhrw3GqUga77QiJbgeA5KNfk1H2oVCCzY+Ge */ /* 4thPmRP5pYAUhgBnAj+L8Vd56CErNMe5iKaylFPVhDerZgsehPz2ttxY9NUHlj9w */ /* ZgOBvC8/RiUdClgZWe2jH8Uuep8+g8eY0CPbUhy0CgRkRlMeDHWy1s6GRP8hO6+L */ /* U87Dn5KgC9The3xR3uD7PB+IYEqYT7iNQy6bEjizdCQdFT6YgzVdTA6tNb/LZxsf */ /* 7P9nFPuvIjiwu6m+sPXVDtXN/usPzgqhFvHrb09icAEZWIn2MgyTnV5dk/HngC+F */ /* m4V1bvAll6hz23x6LC2hghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */ /* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */ /* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgO5oBkf9Gemjq */ /* 1GBylKubNAGYayuPvt/93JZgvdKzo28CEHq3PAT84cd9VLPG2jl1NKAYDzIwMjQw */ /* OTIwMDY1NDMyWqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */ /* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */ /* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */ /* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */ /* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */ /* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */ /* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */ /* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */ /* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */ /* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */ /* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */ /* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */ /* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */ /* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */ /* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */ /* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */ /* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */ /* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */ /* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */ /* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */ /* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */ /* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */ /* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */ /* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */ /* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */ /* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */ /* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */ /* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */ /* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */ /* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */ /* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */ /* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */ /* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */ /* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */ /* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */ /* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */ /* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */ /* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */ /* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */ /* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */ /* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */ /* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */ /* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */ /* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */ /* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */ /* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */ /* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */ /* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */ /* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */ /* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */ /* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */ /* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */ /* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */ /* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */ /* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */ /* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */ /* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */ /* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */ /* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */ /* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */ /* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */ /* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */ /* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */ /* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */ /* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */ /* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */ /* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */ /* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */ /* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */ /* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */ /* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */ /* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */ /* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */ /* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */ /* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */ /* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */ /* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */ /* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */ /* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */ /* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */ /* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */ /* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */ /* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */ /* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */ /* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */ /* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */ /* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */ /* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */ /* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */ /* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */ /* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */ /* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */ /* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */ /* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */ /* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */ /* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */ /* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */ /* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */ /* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */ /* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */ /* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */ /* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */ /* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */ /* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */ /* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */ /* MDY1NDMyWjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */ /* GZzPQDAvBgkqhkiG9w0BCQQxIgQgRxCYGoSKNiPQmJWdSuL2S5N89qHKryQHy6rc */ /* WCQmeOIwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */ /* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAVeTSKOrXnEaN0Ibcb+KW */ /* NSIH0KwKgG1ULevSCBKHB/cDyQzICjkV7AR7e9kbZKWwHKAu3wjjEYTsHuPdE32z */ /* fouk+8mxLLjv9njEZg6fv+tTtdL7qD9/OqLyd/QKnoZa36zHW5n8jXV0bwosLL8S */ /* GvjLnA7clymdztZL2UTN6pprECsn5bNznFL4tBgn8U2+uPQ0ndrae2JJSb/vVitO */ /* aEaLd/GWyXhXmC7CCam1Qi+tv3W6Zi/+RZST3mEKnKjS2A4NGC47PKYR2QHGT1OA */ /* M4tSVaY2P+IMxvshiVnfVc6lAp+QHhIrd9i2IKG39XmTnaS3i6ATR6gk82okRHqg */ /* QfvpA9DHE2nMfJBGf+eCY6k195xpQ8G0m15evJhb3fhyVrxtXws09q2AufKbVvYI */ /* 96WqVfAd1c8ny8t+xNZKgGLwWNJ86bQL5hNf6WQk76qRY2bSkHFdxErUfbag2N1q */ /* e/f6ZCN5nazPQQfiTod4Vc4RYVopezSihj7svmnlTAqE5f1m9DpsXiqOdlEToTDb */ /* NT59q9WQgUBJa2VmjVJtklX8Y+xKWXZ9SKF9Zhq4w9S5OIWPhFRnBhchtn8ooMwL */ /* +1jwKMdV1LW8X7wJ7vHJsm3570Jy9EyDNHLZj70TjRMK/LWJ4l+zXFlF3xoyW4FB */ /* vM31fj0Rpvc3GSPhkjzqIrE= */ /* SIG # End signature block */
0
sample_62_31.ps1
# # Module manifest for module 'OCI.PSModules.Audit' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Audit.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '159ba3cf-8d7b-460e-bb56-36417d6f4316' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Audit Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Audit.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAuditConfiguration', 'Get-OCIAuditEventsList', 'Update-OCIAuditConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Audit' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_66_51.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. <# .Synopsis Group Policy tools use administrative template files (.admx, .adml) to populate policy settings in the user interface. This allows administrators to manage registry-based policy settings. This script installes PowerShell Core Administrative Templates for Windows. .Notes The PowerShellCoreExecutionPolicy.admx and PowerShellCoreExecutionPolicy.adml files are expected to be at the location specified by the Path parameter with default value of the location of this script. #> [CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [string] $Path = $PSScriptRoot ) Set-StrictMode -Version 3.0 $ErrorActionPreference = 'Stop' function Test-Elevated { [CmdletBinding()] [OutputType([bool])] Param() # if the current Powershell session was called with administrator privileges, # the Administrator Group's well-known SID will show up in the Groups for the current identity. # Note that the SID won't show up unless the process is elevated. return (([Security.Principal.WindowsIdentity]::GetCurrent()).Groups -contains "S-1-5-32-544") } $IsWindowsOs = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) -or $IsWindows if (-not $IsWindowsOs) { throw 'This script must be run on Windows.' } if (-not (Test-Elevated)) { throw 'This script must be run from an elevated process.' } if ([System.Management.Automation.Platform]::IsNanoServer) { throw 'Group policy definitions are not supported on Nano Server.' } $admxName = 'PowerShellCoreExecutionPolicy.admx' $admlName = 'PowerShellCoreExecutionPolicy.adml' $admx = Get-Item -Path (Join-Path -Path $Path -ChildPath $admxName) $adml = Get-Item -Path (Join-Path -Path $Path -ChildPath $admlName) $admxTargetPath = Join-Path -Path $env:WINDIR -ChildPath "PolicyDefinitions" $admlTargetPath = Join-Path -Path $admxTargetPath -ChildPath "en-US" $files = @($admx, $adml) foreach ($file in $files) { if (-not (Test-Path -Path $file)) { throw "Could not find $($file.Name) at $Path" } } Write-Verbose "Copying $admx to $admxTargetPath" Copy-Item -Path $admx -Destination $admxTargetPath -Force $admxTargetFullPath = Join-Path -Path $admxTargetPath -ChildPath $admxName if (Test-Path -Path $admxTargetFullPath) { Write-Verbose "$admxName was installed successfully" } else { Write-Error "Could not install $admxName" } Write-Verbose "Copying $adml to $admlTargetPath" Copy-Item -Path $adml -Destination $admlTargetPath -Force $admlTargetFullPath = Join-Path -Path $admlTargetPath -ChildPath $admlName if (Test-Path -Path $admlTargetFullPath) { Write-Verbose "$admlName was installed successfully" } else { Write-Error "Could not install $admlName" } # SIG # Begin signature block # MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJ90/Icr8AC0PX # PztF6dyoFT+ucLEEg+WYsxQzIJpS/KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIARp # rUuNhtpil9vE/G9ZX3FLF/w3czFFxBwWmQqTagvjMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAMSqkASF3uhPnw6SuFRSPjkcyCT1FXcyY8mCb # t3caGD4arA9JJGQQNWtUjfMh55bb34W9nIlzZFshdM7rytsoVJtX7gLLnmKGo0M+ # x0HZwLWgJ2LDO2CMJZtqF58+5K600stAKG1JhykMhZVFPdMlKfJy/oPIIsY0sOIt # Co8saVHfuDhnXIt59GJ8KWW2arnzFwyyJKJT0kiIET2ZQelqPp6rEiZYlKnKicDm # BoIvrz7cUILq/P4Oe6T62/B7ghnC0wxy0XeJCPwptz8WtSLt7S0fRbiGQRu8SDBO # KKXpLPzaLfCgY82Kx7Ha6I8ffrFo6aSeTo1AQIdVJpI1/0p3mqGCFywwghcoBgor # BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAr1943bh/c+yRkv12Bc1zb6u290jeHmClh # mRvDx7cDEgIGZk3r1RMJGBMyMDI0MDUyMzE2NDM1MC42NDdaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHg1Pwf # ExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyH # nPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdK # s+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+ # yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/Y # cM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J # 9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+ # yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRb # cThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXd # YMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknK # XonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/ # obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLx # yyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64 # tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzK # nR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQ # RbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfa # VosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfC # PEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61 # rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsK # i2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRN # odq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJ # XxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35O # W3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx # 8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOn5u6MwIhgPMjAyNDA1MjMyMDU3MDdaGA8yMDI0MDUy # NDIwNTcwN1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6fm7owIBADAKAgEAAgIB # UQIB/zAHAgEAAgIRrjAKAgUA6fsNIwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA # A4GBAC8gCz+yZVBNmiYop7ajpMQAXW1kO0XRrxsf/BlEW45UFbeHkeUg6aDQq51a # CJ/97fJRoi+EC5VDeJd7JTNDH8f6jP6LWJWrXCBn3nJ/kghPkXYK72L0UG3TKUs+ # y/GtvKZ2SlVZgfbJ7bFEYDlvvF53YQXvfiqhRSMlAlIbcVeeMYIEDTCCBAkCAQEw # gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0A # AQAAAeAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B # CRABBDAvBgkqhkiG9w0BCQQxIgQgwMzwuPYlxgcA4Ezm4aPOJTTkPZ5ZXZn7E7mF # fI2fIFswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77 # DCCSb4TZApY9nJm5whsK/2kKwTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMCIEIFpPYqwaMGwguI4g9U4H # +3VYvz/GthJtuESyu6VtwLi6MA0GCSqGSIb3DQEBCwUABIICAI6DLreWvX+wNJpN # +3WWmjOsF80NTq0cOmaL9B72aXfcXb1pIejPeBMEoGikQrTEdHUlSyBxv3FSdGUw # Yz/70hUrMrRmy2ZXsxDK0Ij0GyuCOQtpWrw48RRCKP4WIUiflXXqcQ5RlwpxKKKX # VCr7jg+JSMtz/uS/edzO8nuZXFlu5+xgKXZSsW7lTcmzRnAB0Jodq8weXPj6zPxW # drXmwn5/OsRZRMkcXcJzr6ykxDFZirlb6b0kQKo9rRKVf9w2EfmAjRj7I1C9PZ9n # vEZ4QrMBI999JVb/gx+5gWl9oUzcZNkGYI9cWtaAJ1UIDN+XNjf1i1J7t+UXhaeH # efV3o4ozyf7VS5ClgYivHmzwRLdXyML3QWp0Rr1uxu8m/9hehrnf5xgPMK0XTssA # 0NCKfgKdc/F0UKZkr+0/0CEdc6kzYryULPgSzFpOcUT0gDZ/1H1fFcm1xIyuujSD # AX13j8Z8MS6knCjstE6NbZ1T0sIoC8ieisUcZyZ7KOlojFOFTRPp/kdjW/jnA3N4 # c0RERgqyyN65uCHYNV3x2hNxJ3bVhoNUQbAEJkMyLu+bBFnllt5/YL7Zu0wCJIHU # gg53anv3swtvlFmEt95V7aB8ZcEAjtriRUuhY4EjOHH3hv4VrvSoNOi5SKHKOmqs # HLmJw5n5OgFcecKYP0Zo4GWdY4re # SIG # End signature block
0
sample_17_91.ps1
# Clear CI_COMMIT_MESSAGE and CI_COMMIT_DESCRIPTION for please meson # when the commit message is complicated $env:CI_COMMIT_MESSAGE="" $env:CI_COMMIT_DESCRIPTION="" # force the CA cert cache to be rebuilt, in case Meson tries to access anything Write-Host "Refreshing Windows TLS CA cache" (New-Object System.Net.WebClient).DownloadString("https://github.com") >$null $env:PYTHONUTF8=1 Get-Date Write-Host "Compiling Mesa" $builddir = New-Item -Force -ItemType Directory -Name "_build" $installdir = New-Item -Force -ItemType Directory -Name "_install" $builddir=$builddir.FullName $installdir=$installdir.FullName $sourcedir=$PWD Remove-Item -Recurse -Force $builddir Remove-Item -Recurse -Force $installdir New-Item -ItemType Directory -Path $builddir New-Item -ItemType Directory -Path $installdir Write-Output "*" > $builddir\.gitignore Write-Output "*" > $installdir\.gitignore Write-Output builddir:$builddir Write-Output installdir:$installdir Write-Output sourcedir:$sourcedir $MyPath = $MyInvocation.MyCommand.Path | Split-Path -Parent . "$MyPath\mesa_init_msvc.ps1" $depsInstallPath="C:\mesa-deps" Push-Location $builddir meson setup ` --default-library=shared ` --buildtype=release ` --wrap-mode=nodownload ` -Db_ndebug=false ` -Db_vscrt=mt ` --cmake-prefix-path="$depsInstallPath" ` --pkg-config-path="$depsInstallPath\lib\pkgconfig;$depsInstallPath\share\pkgconfig" ` --prefix="$installdir" ` -Dllvm=enabled ` -Dshared-llvm=disabled ` -Dvulkan-drivers="swrast,amd,microsoft-experimental" ` -Dgallium-drivers="swrast,d3d12,zink" ` -Dgallium-va=enabled ` -Dvideo-codecs="all" ` -Dshared-glapi=enabled ` -Dgles1=enabled ` -Dgles2=enabled ` -Dgallium-opencl=icd ` -Dgallium-rusticl=false ` -Dopencl-spirv=true ` -Dmicrosoft-clc=enabled ` -Dstatic-libclc=all ` -Dspirv-to-dxil=true ` -Dbuild-tests=true ` -Dwerror=true ` -Dwarning_level=2 ` $sourcedir && ` meson install && ` meson test --num-processes 32 --print-errorlogs $buildstatus = $? Pop-Location Get-Date if (!$buildstatus) { Write-Host "Mesa build or test failed" Exit 1 } Copy-Item ".\.gitlab-ci\windows\piglit_run.ps1" -Destination $installdir Copy-Item ".\.gitlab-ci\windows\spirv2dxil_check.ps1" -Destination $installdir Copy-Item ".\.gitlab-ci\windows\spirv2dxil_run.ps1" -Destination $installdir Copy-Item ".\.gitlab-ci\windows\deqp_runner_run.ps1" -Destination $installdir Copy-Item ".\.gitlab-ci\windows\vainfo_run.ps1" -Destination $installdir Get-ChildItem -Recurse -Filter "ci" | Get-ChildItem -Include "*.txt","*.toml" | Copy-Item -Destination $installdir
0
chkhash.ps1
# calculate SHA512 of file. function Get-SHA512([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.SHA512CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } # chkhash.ps1 [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #3] [-u] [-h [path of .xml database]] # -u updates the XML file database and exits # otherwise, all files are checked against the XML file database. # -h specifies location of xml hash database $hashespath=".\\hashes.xml" del variable:\\args3 -ea 0 del variable:\\args2 -ea 0 del variable:\\xfiles -ea 0 del variable:\\files -ea 0 $args3=@() $args2=$args $nu = 0 $errs = 0 $fc = 0 $upd = $false $create = $false for($i=0;$i -lt $args2.count; $i++) { if ($args2[$i] -like "-h*") # -help specified? { "Usage: .\\chkhash.ps1 [-h] [-u] [-c] [-x <file path of hashes .xml database>] [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #n]" "Options: -h - Help display." " -c - Create hash database. If .xml hash database does not exist, -c will be assumed." " -u - Update changed files and add new files to existing database." " -x - specifies .xml database file path to use. Default is .\\hashes.xml" "" "Examples: PS>.\\chkhash.ps1 c:\\ d:\\ -c -x c:\\users\\bob\\hashes\\hashes.xml" " PS>.\\chkhash.ps1 c:\\users\\alice\\pictures\\sunset.jpg -a -x c:\\users\\alice\\hashes\\pictureshashes.xml" " PS>.\\chkhash.ps1 c:\\users\\eve\\documents d:\\media\\movies -x c:\\users\\eve\\hashes\\private.xml" "" "Note: files in subdirectories of any specified directory are automatically processed." exit } if ($args2[$i] -like "-u*") {$upd=$true;continue} # Update and Add new files to database? if ($args2[$i] -like "-c*") {$create=$true;continue} # Create database specified? if ($args2[$i] -like "-x*") {$i++;$hashespath=$args2[$i];continue} # Get hashes xml database path $args3+=@($args2[$i]) # Add files/dirs } "ChkHash.ps1 - .\\chkhash.ps1 -h for usage." "" if ($args3.count -eq 0) {exit} # Get list of files and SHA512 hash them. "Enumerating files from specified locations..." $files=@(dir $args3 -recurse -ea 0 | ?{$_.mode -notmatch "d"}) # Get list of files if ($files.count -eq 0) {"No files found. Exiting."; exit} if ($create -eq $true -or !(test-path $hashespath)) # Create database? { # Create SHA512 hashes of files and write to new database $files = $files | %{write-host "Hashing $($_.fullname) ...";add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} $files |export-clixml $hashespath "Created $hashespath" "$($files.count) file hashes saved. Exiting." exit } $xfiles=@(import-clixml $hashespath) "Loaded $($xfiles.count) file hash(es) from $hashespath" $hash=@{} for($x=0;$x -lt $xfiles.count; $x++) { if ($hash.contains($xfiles[$x].fullname)) {continue} $hash.Add($xfiles[$x].fullname,$x) } foreach($f in $files) { $n=($hash.($f.fullname)) if ($n -eq $null) { $nu++ # increment needs/needed updating count if ($upd -eq $false) {"Needs to be added: `"$($f.fullname)`"";continue} # if not updating, then continue "Hashing $($f.fullname) ..." # Create SHA512 hash of file $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} $xfiles+=@($f) # then add file + hash to list continue } $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} # Update and continue is specified. $fc++ # increment files checked. if ($xfiles[$n].SHA512 -eq $f.SHA512) # Check SHA512 for mixmatch. { continue } $errs++ # increment mixmatches if ($upd -eq $true) { $xfiles[$n]=$f; "Updated `"$($f.fullname)`"";continue} "Bad SHA-512 found: `"$($f.fullname)`"" } if ($upd -eq $true) # if database updated { $xfiles|export-clixml $hashespath # write xml database "Updated $hashespath" "$nu file hash(es) added to database." "$errs file hash(es) updated in database." exit } "$errs SHA-512 mixmatch(es) found." "$fc file(s) SHA512 matched." if ($nu -ne 0) {"$nu file(s) need to be added [run with -u option to Add file hashes to database]."}
0
sample_58_12.ps1
# # Module manifest for module 'OCI.PSModules.Marketplaceprivateoffer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Marketplaceprivateoffer.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '18d53499-afff-4406-90f6-9ce3e95e074d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Marketplaceprivateoffer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplaceprivateoffer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIMarketplaceprivateofferAttachment', 'Get-OCIMarketplaceprivateofferAttachmentContent', 'Get-OCIMarketplaceprivateofferAttachmentsList', 'Get-OCIMarketplaceprivateofferOffer', 'Get-OCIMarketplaceprivateofferOfferInternalDetail', 'Get-OCIMarketplaceprivateofferOffersList', 'New-OCIMarketplaceprivateofferAttachment', 'New-OCIMarketplaceprivateofferOffer', 'Remove-OCIMarketplaceprivateofferAttachment', 'Remove-OCIMarketplaceprivateofferOffer', 'Update-OCIMarketplaceprivateofferOffer' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplaceprivateoffer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_44_65.ps1
# # Module manifest for module 'OCI.PSModules.Genericartifactscontent' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Genericartifactscontent.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ae94c03a-b1fd-4547-8536-fbadc98c3ab2' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Genericartifactscontent Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Genericartifactscontent.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIGenericartifactscontentGenericArtifactContent', 'Get-OCIGenericartifactscontentGenericArtifactContentByPath', 'Write-OCIGenericartifactscontentGenericArtifactContentByPath' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Genericartifactscontent' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_21_41.ps1
# # Module manifest for module 'OCI.PSModules.Ospgateway' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ospgateway.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2c26fa04-4a4e-49f5-877a-c15e551fc06e' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ospgateway Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ospgateway.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOspgatewayAddress', 'Get-OCIOspgatewayAddressRule', 'Get-OCIOspgatewayInvoice', 'Get-OCIOspgatewayInvoiceLinesList', 'Get-OCIOspgatewayInvoicesList', 'Get-OCIOspgatewaySubscription', 'Get-OCIOspgatewaySubscriptionsList', 'Invoke-OCIOspgatewayAuthorizeSubscriptionPayment', 'Invoke-OCIOspgatewayDownloadPdfContent', 'Invoke-OCIOspgatewayPayInvoice', 'Invoke-OCIOspgatewayPaySubscription', 'Invoke-OCIOspgatewayVerifyAddress', 'Update-OCIOspgatewaySubscription' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ospgateway' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_65_93.ps1
# # Module manifest for module 'OCI.PSModules.Resourcemanager' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Resourcemanager.dll' # Version number of this module. ModuleVersion = '83.3.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '73e0f641-602c-4457-9e79-f05b84ced282' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Resourcemanager Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcemanager.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIResourcemanagerConfigurationSourceProvider', 'Get-OCIResourcemanagerConfigurationSourceProvidersList', 'Get-OCIResourcemanagerJob', 'Get-OCIResourcemanagerJobAssociatedResourcesList', 'Get-OCIResourcemanagerJobDetailedLogContent', 'Get-OCIResourcemanagerJobLogs', 'Get-OCIResourcemanagerJobLogsContent', 'Get-OCIResourcemanagerJobOutputsList', 'Get-OCIResourcemanagerJobsList', 'Get-OCIResourcemanagerJobTfConfig', 'Get-OCIResourcemanagerJobTfPlan', 'Get-OCIResourcemanagerJobTfState', 'Get-OCIResourcemanagerPrivateEndpoint', 'Get-OCIResourcemanagerPrivateEndpointsList', 'Get-OCIResourcemanagerReachableIp', 'Get-OCIResourcemanagerResourceDiscoveryServicesList', 'Get-OCIResourcemanagerStack', 'Get-OCIResourcemanagerStackAssociatedResourcesList', 'Get-OCIResourcemanagerStackResourceDriftDetailsList', 'Get-OCIResourcemanagerStacksList', 'Get-OCIResourcemanagerStackTfConfig', 'Get-OCIResourcemanagerStackTfState', 'Get-OCIResourcemanagerTemplate', 'Get-OCIResourcemanagerTemplateCategoriesList', 'Get-OCIResourcemanagerTemplateLogo', 'Get-OCIResourcemanagerTemplatesList', 'Get-OCIResourcemanagerTemplateTfConfig', 'Get-OCIResourcemanagerTerraformVersionsList', 'Get-OCIResourcemanagerWorkRequest', 'Get-OCIResourcemanagerWorkRequestErrorsList', 'Get-OCIResourcemanagerWorkRequestLogsList', 'Get-OCIResourcemanagerWorkRequestsList', 'Invoke-OCIResourcemanagerDetectStackDrift', 'Move-OCIResourcemanagerConfigurationSourceProviderCompartment', 'Move-OCIResourcemanagerPrivateEndpointCompartment', 'Move-OCIResourcemanagerStackCompartment', 'Move-OCIResourcemanagerTemplateCompartment', 'New-OCIResourcemanagerConfigurationSourceProvider', 'New-OCIResourcemanagerJob', 'New-OCIResourcemanagerPrivateEndpoint', 'New-OCIResourcemanagerStack', 'New-OCIResourcemanagerTemplate', 'Remove-OCIResourcemanagerConfigurationSourceProvider', 'Remove-OCIResourcemanagerPrivateEndpoint', 'Remove-OCIResourcemanagerStack', 'Remove-OCIResourcemanagerTemplate', 'Stop-OCIResourcemanagerJob', 'Update-OCIResourcemanagerConfigurationSourceProvider', 'Update-OCIResourcemanagerJob', 'Update-OCIResourcemanagerPrivateEndpoint', 'Update-OCIResourcemanagerStack', 'Update-OCIResourcemanagerTemplate' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcemanager' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_9_88.ps1
param( [string]$DataPath, [switch]$AcceptEula, [switch]$SkipLogs, [switch]$Trace, [switch]$Network, [switch]$RPC, [switch]$ProcMon, [switch]$PSR ) <# COM-COLLECT ALIAS : bpostaci, maporcol Date : 15/11/2023 Updates: v1.0 | Initial release v1.1 | 2023-11-23 Marius Porcolean (maporcol@microsoft.com) - Improved logic for collecting dumps. Previous logic resulted in dumps from irrelevant processes too. - Use already existing function Export-RegistryKey instead of Export-RegistryKey2 & instead of "manual work" - Use already existing function Export-EventLog instead of "manual work" - Use already existing function Invoke-CustomCommand instead of "manual work" - Eliminate ExpRegFeatureManagement function & just use Export-RegistryKey instead v1.2 | 2024-05-20 Marius Porcolean (maporcol@microsoft.com) - Integrate COM-Collect with the "standard" Collect-Commons.psm1 module, in order to work within TSS (i.e: add some necessary functions in COM-Collect itself) #> $SCRIPT_VERSION = "1.2" $toolName = "COM-Collect" write-host "" -ForegroundColor Magenta write-host " _____ ____ __ ___" -ForegroundColor Magenta write-host " / ___/ / __ \ / |/ /" -ForegroundColor Magenta write-host "/ /__ / /_/ / / /|_/ /" -ForegroundColor Magenta write-host "\___/ \____/ /_/ /_/" -ForegroundColor Magenta write-host "" write-host "" write-host " _____ ____ __ __ ____ _____ ______" -ForegroundColor Magenta write-host " / ___/ / __ \ / / / / / __/ / ___//_ __/" -ForegroundColor Magenta write-host "/ /__ / /_/ / / /__ / /__ / _/ / /__ / /" -ForegroundColor Magenta write-host "\___/ \____/ /____//____//___/ \___/ /_/" -ForegroundColor Magenta write-host " " write-host "[Version:" $SCRIPT_VERSION"]" write-host "" ##################################################################### ##################### SPECIFIC FUNCTIONS START ###################### ##################################################################### function Get-UserConfirmation { $confirmation = $null while ($confirmation -notin 'Y', 'N') { $confirmation = Read-Host "Do you want to continue? [Y/N]" if ($confirmation -notin 'Y', 'N') { Write-Host "Invalid input. Please enter 'Y' for Yes or 'N' for No." } } return $confirmation } Function Get-GUIDFromInputString { param ( [string]$inputString ) # Define a regular expression pattern to match the GUID $pattern = '\{[0-9A-Fa-f-]+\}' # Use Select-String to find and extract the GUID from the string $guidMatch = $inputString | Select-String -Pattern $pattern # Extract the matched GUID from the result if ($guidMatch) { $guid = $guidMatch.Matches.Value return $guid } else { return $null } } function IsNumeric($text) { $null = [Double]::TryParse($text, [System.Globalization.NumberStyles]::Number, [System.Globalization.CultureInfo]::InvariantCulture, [ref]$null) return $? } # for the Diag part Function Write-LogMessage { param( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $Message, [Parameter()] [ValidateSet('Error', 'Warning', 'Pass', 'Info')] [string] $Type = $null ) $Color = $null switch ($Type) { "Error" { $Message = (Get-Date).ToString("yyyyMMdd-HH:mm:ss.fff") + " " + "[ERROR] " + $Message $Color = 'Magenta' } "Warning" { $Message = (Get-Date).ToString("yyyyMMdd-HH:mm:ss.fff") + " " + "[WARNING] " + $Message $Color = 'Yellow' } "Pass" { $Message = (Get-Date).ToString("yyyyMMdd-HH:mm:ss.fff") + " " + "[PASS] " + $Message $Color = 'Green' } Default { $Message = (Get-Date).ToString("yyyyMMdd-HH:mm:ss.fff") + " " + "[INFO] " + $Message } } if ([string]::IsNullOrEmpty($Color)) { Write-Host $Message } else { Write-Host $Message -ForegroundColor $Color } if (!($NoLogFile)) { $Message | Out-File -FilePath $diagfile -Append } } Function Start-Traces { Invoke-CustomCommand "ipconfig /flushdns" Invoke-CustomCommand "nbtstat -R" Invoke-CustomCommand "KList purge" # initialize ETW trace with # COMSVCS provider Invoke-CustomCommand "logman create trace '$traceName' -ow -o '$($TracesDir)COM-Trace-$($env:COMPUTERNAME).etl' -p '{B46FA1AD-B22D-4362-B072-9F5BA07B046D}' 0xFFFFFFFFFFFFFFFF 0xFF -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 2048 -ets" # COMADMIN provider Invoke-CustomCommand "logman update trace '$traceName' -p '{A0C4702B-51F7-4ea9-9C74-E39952C694B8}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # DCOMSCM provider Invoke-CustomCommand "logman update trace '$traceName' -p '{9474a749-a98d-4f52-9f45-5b20247e4f01}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # OLE32 provider Invoke-CustomCommand "reg add HKEY_LOCAL_MACHINE\Software\Microsoft\OLE\Tracing /v ExecutablesToTrace /t REG_MULTI_SZ /d * /f" Invoke-CustomCommand "logman update trace '$traceName' -p '{bda92ae8-9f11-4d49-ba1d-a4c2abca692e}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # start RPC tracing if selected if ($RPC) { # Microsoft-Windows-RPC Invoke-CustomCommand "logman update trace '$traceName' -p '{6AD52B32-D609-4BE9-AE07-CE8DAE937E39}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft-Windows-RPC-Events Invoke-CustomCommand "logman update trace '$traceName' -p '{F4AED7C7-A898-4627-B053-44A7CAA12FCD}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" # Microsoft-Windows-RPCSS Invoke-CustomCommand "logman update trace '$traceName' -p '{D8975F88-7DDB-4ED0-91BF-3ADF48C48E0C}' 0xFFFFFFFFFFFFFFFF 0xFF -ets" } if ($Network) { Invoke-CustomCommand "netsh trace start capture=yes scenario=netconnection maxsize=1024 report=disabled tracefile='$($TracesDir)NETCAP-$($env:COMPUTERNAME).etl'" } if ($ProcMon) { Invoke-CustomCommand "start $($Root)\Procmon.exe '/AcceptEula /Quiet /Minimized /BackingFile $($TracesDir)$($env:COMPUTERNAME).PML'" } if ($PSR) { Invoke-CustomCommand "psr.exe /start /output $($TracesDir)PSR_$($env:COMPUTERNAME)_.zip /maxsc 99 /sc 1 /gui 1" Write-Host -ForegroundColor Yellow "WARNING: You selected the -PSR flag. This activates the Problem Steps Recorder tool, which automatically collects screenshots & information about steps performed (e.g: user left-clicked in text area of CMD.exe, user clicked close on Event Viewer, etc). Please avoid displaying sensitive information like passwords or other things." } Write-Log "Live captures started" } Function Stop-Traces { Write-Log "Stopping live captures..." Invoke-CustomCommand "logman stop '$traceName' -ets" Invoke-CustomCommand "reg delete HKEY_LOCAL_MACHINE\Software\Microsoft\OLE\Tracing /v ExecutablesToTrace /f" if ($Network) { Invoke-CustomCommand "netsh trace stop" } if ($ProcMon) { Invoke-CustomCommand "start $($Root)\Procmon.exe '/Terminate'" } if ($PSR) { Invoke-CustomCommand "psr.exe /stop" } Invoke-CustomCommand "tasklist /svc" -DestinationFile ("Traces\tasklist-$env:COMPUTERNAME.txt") } ##################################################################### ###################### SPECIFIC FUNCTIONS END ####################### ##################################################################### $global:Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path try { Import-Module ($global:Root + "\Collect-Commons.psm1") -Force -DisableNameChecking -ErrorAction Stop } catch { Write-Host "Unable to import the helper module, can't continue without it! Exiting..." -ForegroundColor Red Write-Host ($_.Exception.Message) -ForegroundColor Red exit } # Deny execution if not running as admin Deny-IfNotAdmin # Check parameters # Reject execution if tracing parameters are specified without the main trace flag if (!$Trace -and ($RPC -or $Network -or $PSR -or $ProcMon)) { Write-Host -ForegroundColor Yellow "WARNING: You selected a parameter for tracing, but did not specify the main -Trace flag. Please try again, including -Trace. Consider also checking out the examples, following the instructions in the REMARKS section below." } # Reject execution if -SkipLog specified, but -Trace was not. Makes no sense to run. if ($SkipLog -and !$Trace) { Write-Host -ForegroundColor Yellow "WARNING: You selected a parameter for tracing, but did not specify the main -Trace flag. Please try again, including -Trace. Consider also checking out the examples, following the instructions in the REMARKS section below." } $resName = "$($toolName -replace "Collect","Results")-" + $env:computername + "-" + $(get-date -f yyyyMMdd_HHmmss) # Check if a destination folder was explicitly requested if ($DataPath) { if (-not (Test-Path $DataPath)) { Write-Host "The folder $DataPath does not exist. Please make sure to specify a folder that exists." -ForegroundColor Yellow exit } $global:resDir = $DataPath + "\" + $resName } else { $global:resDir = $global:Root + "\" + $resName } New-Item -ItemType Directory -Path $global:resDir | Out-Null $global:outfile = $global:resDir + "\script-output.txt" $global:errfile = $global:resDir + "\script-errors.txt" $global:diagfile = $global:resDir + "\COM-COMPLUS-DCOM-Diag.txt" Write-Log ("Command line:" + $MyInvocation.Line) # License Agreement if ($AcceptEula) { Write-Log "AcceptEula switch specified, silently continuing" $eulaAccepted = ShowEULAIfNeeded $toolName 2 } else { $eulaAccepted = ShowEULAIfNeeded $toolName 0 if ($eulaAccepted -ne "Yes") { Write-Log "EULA declined, exiting" exit } } Write-Log "EULA accepted, continuing" # Start traces if "selected" if ($Trace) { $TracesDir = $global:resDir + "\Traces\" New-Item -ItemType Directory -Path $TracesDir | Out-Null $traceName = "COM-Trace" Start-Traces Write-Host -ForegroundColor Cyan "Press ENTER to stop the live captures, after reproducing the issue..." Read-Host Stop-Traces } if ($SkipLogs) { Write-Host -ForegroundColor Yellow "SkipLogs parameter specified, exiting now." exit } Write-log "Getting list of processes & services" $WMI_AVAILABLE = $false; $result = ListProcsAndSvcs if ($result -eq $false) { Write-Log "To run this script correctly WMI should be working, but it appears to be not. Please investigate why WMI is not working." Write-Host "Do you still want to continue, despite WMI not working?" -ForegroundColor Yellow $choice = Get-UserConfirmation if ( ($choice -eq 'Y') -or ($choice -eq 'y')) { Write-Log "Continue selected, going ahead without WMI." } else { Write-Log "Stop selected, exiting..." exit } } else { Write-Log "WMI is OK" $WMI_AVAILABLE = $true } Write-log "Getting MSINFO32" Start-Process -FilePath "msinfo32.exe" -ArgumentList "/nfo $($global:resDir + "\msinfo32.nfo")" Get-ComputerInfo | Out-File -FilePath ($global:resDir + "\computerinfo.txt") Export-RegistryKey -KeyPath "HKLM:\SOFTWARE\Microsoft\Ole" -DestinationFile "reg-Ole.reg.txt" Export-RegistryKey -KeyPath "HKLM:\SOFTWARE\Microsoft\Rpc" -DestinationFile "reg-Rpc.reg.txt" Export-RegistryKey -KeyPath "SOFTWARE\Policies\Microsoft\Windows NT\Rpc" -DestinationFile "reg-Rpc-Policies.reg.txt" Invoke-CustomCommand -Command "WHOAMI /all" -DestinationFile "WHOAMI.txt" Invoke-CustomCommand -Command "netstat -anob" -DestinationFile "netstat.txt" Invoke-CustomCommand -Command "ipconfig /all" -DestinationFile "ipconfig.txt" Invoke-CustomCommand -Command "sc.exe query" -DestinationFile "Services-SCQuery.txt" Invoke-CustomCommand -Command "sc.exe queryex comsysapp" -DestinationFile "ComSysAppConfig.txt" Invoke-CustomCommand -Command "driverquery /v" -DestinationFile "drivers.txt" Invoke-CustomCommand -Command "gpresult /h" -DestinationFile "gpresult.html" Invoke-CustomCommand -Command "gpresult /r" -DestinationFile "gpresult.txt" if ($WMI_AVAILABLE) { CollectSystemInfoWMI tasklist /svc | out-file -FilePath ($global:resDir + "\tasklist.txt") Write-Log "COM Security" $Reg = [WMIClass]"\\.\root\default:StdRegProv" $DCOMMachineLaunchRestriction = $Reg.GetBinaryValue(2147483650, "software\microsoft\ole", "MachineLaunchRestriction").uValue $DCOMMachineAccessRestriction = $Reg.GetBinaryValue(2147483650, "software\microsoft\ole", "MachineAccessRestriction").uValue $DCOMDefaultLaunchPermission = $Reg.GetBinaryValue(2147483650, "software\microsoft\ole", "DefaultLaunchPermission").uValue $DCOMDefaultAccessPermission = $Reg.GetBinaryValue(2147483650, "software\microsoft\ole", "DefaultAccessPermission").uValue # Convert the current permissions to SDDL $converter = new-object system.management.ManagementClass Win32_SecurityDescriptorHelper "Default Access Permission = " + ($converter.BinarySDToSDDL($DCOMDefaultAccessPermission)).SDDL | Out-File -FilePath ($global:resDir + "\COMSecurity.txt") -Append "Default Launch Permission = " + ($converter.BinarySDToSDDL($DCOMDefaultLaunchPermission)).SDDL | Out-File -FilePath ($global:resDir + "\COMSecurity.txt") -Append "Machine Access Restriction = " + ($converter.BinarySDToSDDL($DCOMMachineAccessRestriction)).SDDL | Out-File -FilePath ($global:resDir + "\COMSecurity.txt") -Append "Machine Launch Restriction = " + ($converter.BinarySDToSDDL($DCOMMachineLaunchRestriction)).SDDL | Out-File -FilePath ($global:resDir + "\COMSecurity.txt") -Append # HOTFIXES try { Write-Log ("Retrieve installed updates from Win32_QuickFixEngineering class.") @($Line, 'This file contains the output from WMI class "win32_quickfixengineering"', $Line) | Out-File -FilePath ($global:resDir + "\" + $Prefix + 'WindowsUpdate_Hotfixes.txt') Get-CimInstance -ClassName win32_quickfixengineering | Out-File -FilePath ($global:resDir + "\" + "$($Prefix)WindowsUpdate_Hotfixes.txt") -Append # Get update id list with wmic, replaced # wmic qfe list full /format:texttable >> ($Prefix+"Hotfix-WMIC.txt") 2>> $ErrorFile } catch { Write-Log ("[$LogPrefixWU] Failed to retrieve installed Updates from Win32_QuickFixEngineering class.") $_ } # DTC transactions Get-DtcTransactionsStatistics | out-file -FilePath ($global:resDir + "\" + "com_DtcTransactionsStatistics.txt") } else { CollectSystemInfoNoWMI } #APPLICATION /SYSTEM LOGS Export-EventLog -LogName "Application" Export-EventLog -LogName "System" #FLTMC fltmc filters | out-file -filepath ($global:resDir + "\fltmc_filters.txt") fltmc volumes | out-file -filepath ($global:resDir + "\fltmc_volumes.txt") fltmc instances | out-file -filepath ($global:resDir + "\fltmc_instances.txt") #FEATURE overrides Export-RegistryKey -KeyPath "HKLM:\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides" -DestinationFile "reg-Feature-KIR-Overrides.txt" #EXPORT REGISTRY KEYS New-PSDrive -Name "HKCR" -PSProvider Registry -Root "HKEY_CLASSES_ROOT" | Out-Null Export-RegistryKey -KeyPath "HKCR:\AppID" -DestinationFile "com_appid.reg.txt" Export-RegistryKey -KeyPath "HKCR:\ActivatableClasses" -DestinationFile "com_activatibles.reg.txt" Export-RegistryKey -KeyPath "HKCR:\Interface" -DestinationFile "com_interface.reg.txt" Export-RegistryKey -KeyPath "HKCR:\CLSID" -DestinationFile "com_clsid.reg.txt" Export-RegistryKey -KeyPath "HKCR:\Wow6432Node\CLSID" -DestinationFile "com_wow64_clsid.reg.txt" Export-RegistryKey -KeyPath "HKLM:\SOFTWARE\Microsoft\COM3" -DestinationFile "com3.reg.txt" Export-RegistryKey -KeyPath "HKLM:\SOFTWARE\Microsoft\MSDTC" -DestinationFile "msdtc.reg.txt" #GET ALL COM CLASS HKLM:\Software\Classes Write-Log "GET all COM classes in HKLM:\Software\Classes" $output = Get-ChildItem HKLM:\Software\Classes -ErrorAction SilentlyContinue | Where-Object { $_.PSChildName -match '^\w+\.\w+$' -and (Test-Path -Path "$($_.PSPath)\CLSID") } | ForEach-Object { $clsid = (Get-ItemProperty -Path "$($_.PSPath)\CLSID").'(default)' [PSCustomObject]@{ 'CLSID' = $clsid 'PSChildName' = $_.PSChildName } } | Format-Table -AutoSize $output | out-file -FilePath ($global:resDir + "\" + "com_classes.txt") #COM+ APPS # List of properties $properties = @( "AccessChecksLevel", "Activation", "ApplicationAccessChecksEnabled", "ApplicationDirectory", "ApplicationProxy", "ApplicationProxyServerName", "AppPartitionID", "Authentication", "AuthenticationCapability", "Changeable", "CommandLine", "ConcurrentApps", "CreatedBy", "CRMEnabled", "CRMLogFile", "Deleteable", "Description", "DumpEnabled", "DumpOnException", "DumpOnFailfast", "DumpPath", "EventsEnabled", "ID", "Identity", "ImpersonationLevel", "IsEnabled", "IsSystem", "MaxDumpCount", "Name", "QCAuthenticateMsgs", "QCListenerMaxThreads", "QueueListenerEnabled", "QueuingEnabled", "RecycleActivationLimit", "RecycleCallLimit", "RecycleExpirationTimeout", "RecycleLifetimeLimit", "RecycleMemoryLimit", "Replicable", "RunForever", "ServiceName", "ShutdownAfter", "SoapActivated", "SoapBaseUrl", "SoapMailTo", "SoapVRoot", "SRPEnabled", "SRPTrustLevel" ) $comAdmin = New-Object -com ("COMAdmin.COMAdminCatalog") $applications = $comAdmin.GetCollection("Applications") $applications.Populate() $applications | out-file -FilePath ($global:resDir + "\complus_applications.txt") $stringBuilder = New-Object System.Text.StringBuilder foreach ($application in $applications) { # Add properties and values to the StringBuilder foreach ($p in $properties) { [void] $stringBuilder.Append($p.PadRight(30, ' ')) [void] $stringBuilder.Append(":") [void] $stringBuilder.AppendLine($application.Value($p)); } [void]$stringBuilder.AppendLine(); [void]$stringBuilder.AppendLine(); } $resultString = $stringBuilder.ToString() $resultString | out-file -FilePath ($global:resDir + "\complus_applications_props.txt") $appList = @{} $applications | ForEach-Object { $appList.Add($_.Value("ID"), $_.Name) } $appInstances = $comAdmin.GetCollection("ApplicationInstances") $appInstances.Populate() $appInstanceList = @{} $appProcessList = @{} $appInstances | ForEach-Object { $appValue = $_.Value("Application") $ProcessID = $_.Value("ProcessID") $appInstanceList.Add($appValue, $appList[$appValue]) $appProcessList.Add($appValue, $ProcessID) } $output = $appList.Keys | ForEach-Object { New-Object PSObject -Property @{ "Name" = $appList[$_] "ID" = $_ "Running" = $appInstanceList.ContainsKey($_) "PID" = $appProcessList[$_] } } $output | out-file -FilePath ($global:resDir + "\" + "complus_appInstances.txt") $output = foreach ($AppObject in $applications) { "`nApplication $($appObject.key) $($appObject.Name) ID: $($appObject.Value("Identity"))" $Components = $applications.GetCollection("Components", $AppObject.Key) $Components.populate() $components | foreach-object { "Component $($_.key) $($_.Name)" } } $output | out-file -FilePath ($global:resDir + "\" + "complus_components.txt") # DLLHOST DUMPS Write-Log "Collecing the dumps of dllhost.exe processes" if ($WMI_AVAILABLE) { $dllhosts = New-Object 'System.Collections.Generic.Dictionary[int,String]' $proc = ExecQuery -Namespace "root\cimv2" -Query "select Name, ProcessId, CommandLine from Win32_Process Where Name LIKE 'dllhost%'" foreach ($p in $proc) { $g = Get-GUIDFromInputString $p.CommandLine $dllhosts.Add($p.ProcessId, $g); } if ($dllhosts.Count -gt 0) { foreach ($appPID in $dllhosts.Keys) { $guid = $dllhosts[$appPID]; Write-Host "Dump -> $appPID $guid" $filename = "DllHost_" + $guid CreateProcDump $appPID $global:resDir $filename } } else { Write-Log "No dllhost.exe processes found" } } else { # IN CASE NO WMI # DUMP OF DLLHOSTs $list = get-process -Name "dllhost" -ErrorAction SilentlyContinue 2>>$global:errfile if (($list | Measure-Object).count -gt 0) { foreach ($proc in $list) { Write-Log ("Found dllhost.exe with PID " + $proc.Id) CreateProcDump $proc.id $global:resDir } } else { Write-Log "No dllhost.exe processes found" } } # WINMGMT DUMP Write-Log "Collecting dump of the svchost process hosting the WinMgmt service" $pidsvcWmi = FindServicePid "winmgmt" if ($pidsvcWmi) { Write-Log "Found the PID using FindServicePid" CreateProcDump $pidsvcWmi $global:resDir "svchost-WinMgmt" } else { Write-Log "Cannot find the PID using FindServicePid, looping through processes..." $list = Get-Process $found = $false if (($list) -and ($list.Count -gt 0)) { foreach ($proc in $list) { $prov = Get-Process -Id $proc.id -Module -ErrorAction SilentlyContinue | Where-Object { $_.ModuleName -eq "wmisvc.dll" } if (($prov) -and ($prov.Count -gt 0)) { Write-Log "Found the PID having wmisvc.dll loaded" CreateProcDump $proc.Id $global:resDir "svchost-WinMgmt" $found = $true break } } } if (-not $found) { Write-Log "Cannot find any process having wmisvc.dll loaded, probably the WMI service is not running" } } # RPCSS & DCOMLAUNCH DUMP Write-Log "Collecting dump of the svchost process hosting the RpcSs/EptMapper & DcomLaunch services" $pidsvcRpcSs = FindServicePid "RpcSs" $pidsvcDcomLaunch = FindServicePid "DcomLaunch" if ($pidsvcRpcSs -and $pidsvcDcomLaunch) { Write-Log "Found the PIDs using FindServicePid" CreateProcDump $pidsvcRpcSs $global:resDir "RpcSs-EptMapper" CreateProcDump $pidsvcDcomLaunch $global:resDir "DcomLaunch" } elseif ($WMI_AVAILABLE) { $RpcSs = Get-CimInstance -Class Win32_Service -Filter "Name LIKE 'rpcss'" if ($RpcSs) { CreateProcDump $RpcSs.ProcessId $global:resDir "RpcSs" } else { Write-Log "Unable to find the RpcSs service." } $DcomLaunch = Get-CimInstance -Class Win32_Service -Filter "Name LIKE 'DcomLaunch'" if ($DcomLaunch) { CreateProcDump $DcomLaunch.ProcessId $global:resDir "DcomLaunch" } else { Write-Log "Unable to find the DcomLaunch service." } } else { Write-Log "Cannot find the PIDs using FindServicePid, looping through processes..." $list = Get-Process $found = $false if (($list) -and ($list.Count -gt 0)) { foreach ($proc in $list) { $prov = Get-Process -Id $proc.Id -Module -ErrorAction SilentlyContinue | Where-Object { $_.ModuleName -eq "rpcss.dll" } if (($prov) -and ($prov.Count -gt 0)) { Write-Log "Found PID $($proc.Id) having rpcss.dll loaded, getting dump." CreateProcDump $proc.Id $global:resDir "RpcSs-DLL" $found = $true } } } if (-not $found) { Write-Log "Cannot find any process having rpcss.dll loaded, probably the services are not running." } } # EVENTSYSTEM DUMP Write-Log "Collecting dump of the svchost process hosting the COM+ Event System service" $pidsvcEvtSystem = FindServicePid "EventSystem" if ($pidsvcWmi) { Write-Log "Found the PID using FindServicePid." CreateProcDump $pidsvcEvtSystem $global:resDir "EventSystem" } elseif ($WMI_AVAILABLE) { $proc = Get-CimInstance -Class Win32_Service -Filter "Name LIKE 'EventSystem'" if ($proc) { CreateProcDump $proc.ProcessId $global:resDir "EventSystem" } } else { Write-Log "Couldn't get dump of EventSystem service." } # COPY SYSTEM COM DUMPS $sourceFolder = "$env:SystemRoot\system32\com\dmp" # Check if the source folder exists & it's not empty if ((Test-Path $sourceFolder) -and (Get-ChildItem $sourceFolder)) { # Check if the destination folder exists, and create it if not if (-not (Test-Path $($global:resDir + "\comdumps"))) { New-Item -ItemType Directory -Path $($global:resDir + "\comdumps") -Force | Out-Null } # Copy files from the source to the destination Copy-Item -Path "$sourceFolder\*" -Destination $($global:resDir + "\comdumps") -Force Write-Log "System Com Dump Files copied successfully." } else { Write-Log "System Com Dump folder does not exist or it exists but it's empty." } # Wait for MSINFO to finish, if not already, as sometimes it can take a long time. Don't wait for more than 2 minutes though. Write-Log "Waiting for msinfo32 collection if not already finished..." Wait-Process msinfo32 -Timeout 120 -ErrorAction SilentlyContinue #DIAGNOSTICS # from WMI-RPC-DCOM-Diag.ps1 by Marius Porcolean (maporcol) Write-Host " ##################################################################### ############################ DIAG START ############################# ##################################################################### " # Check OS version & get IPs $OSVer = [environment]::OSVersion.Version.Major + [environment]::OSVersion.Version.Minor * 0.1 if ($OSVer -gt 6.1) { $versionRegKey = Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" Write-LogMessage "Host: $($env:COMPUTERNAME)" Write-LogMessage "Running on: $($versionRegKey.ProductName)" Write-LogMessage "Current build number: $($versionRegKey.CurrentBuildNumber).$($versionRegKey.UBR)" Write-LogMessage "Build details: $($versionRegKey.BuildLabEx)" # TODO - try to determine when the last CU was installed...not the best option... # tried getting the last write time of the build number in the registry, but that's not possible... # can only get a LastWriteTime for a regkey, not for a regvalue # https://devblogs.microsoft.com/scripting/use-powershell-to-access-registry-last-modified-time-stamp/ $xmlQuery = @' <QueryList> <Query Id="0" Path="Setup"> <Select Path="Setup">*[System[(EventID=2)]][UserData[CbsPackageChangeState[(Client='UpdateAgentLCU' or Client='WindowsUpdateAgent') and (ErrorCode='0x0')]]]</Select> </Query> </QueryList> '@ $lastSuccessfulCU = Get-WinEvent -MaxEvents 1 -FilterXml $xmlQuery -ErrorAction SilentlyContinue if ($lastSuccessfulCU) { if ($lastSuccessfulCU.TimeCreated -le ((Get-Date).AddDays(-90))) { Write-LogMessage -Type Warning "This device looks like it may not have had cumulative updates installed recently. Check current build number ($($versionRegKey.UBR)) vs the build number in the latest KBs for this OS." } Write-LogMessage "The most recent successfully installed cumulative update was $($lastSuccessfulCU.Properties[0].Value), $(((Get-Date) - $lastSuccessfulCU.TimeCreated).Days) days ago @ $($lastSuccessfulCU.TimeCreated)." } else { Write-LogMessage -Type Warning "Could not detect any successful cumulative update installation events. Check current build number ($($versionRegKey.UBR)) vs the build number in the latest KBs for this OS." } $psver = $PSVersionTable.PSVersion.Major.ToString() + $PSVersionTable.PSVersion.Minor.ToString() if ($psver -lt "51") { Write-LogMessage -Type Warning "Windows Management Framework version $($PSVersionTable.PSVersion.ToString()) is no longer supported" } else { Write-LogMessage "Windows Management Framework version is $($PSVersionTable.PSVersion.ToString())" } Write-LogMessage "Running PowerShell build $($PSVersionTable.BuildVersion.ToString())" $iplist = Get-NetIPAddress Write-LogMessage "IP addresses of this machine: $(foreach ($ip in $iplist) {$ip.ToString() +' |'})" } else { Write-LogMessage -Type Warning "This is a legacy OS, please consider updating to a newer supported version." } Write-LogMessage "-------------------------" Write-LogMessage "Checking domain / workgroup settings..." # Check if machine is part of a domain or not $computerSystem = Get-CimInstance -ClassName "Win32_ComputerSystem" switch ($computerSystem.DomainRole) { 0 { $role = "Standalone Workstation" } 1 { $role = "Member Workstation" } 2 { $role = "Standalone Server" } 3 { $role = "Member Server" } 4 { $role = "Backup Domain Controller" } 5 { $role = "Primary Domain Controller" } Default { $role = "Unknown" } } if ($computerSystem.PartOfDomain) { Write-LogMessage "The machine is part of domain: '$($computerSystem.Domain)', having the role of '$($role)'." # TODO - more checks for domain joined machines } else { Write-LogMessage -Type Warning "The machine is not joined to a domain, it is a '$($role)'." # TODO - more checks for non-domain joined (WORKGROUP) machines } Write-LogMessage "-------------------------" Write-LogMessage "Checking services..." # check WMI, RPCSS, DcomLaunch services $services = Get-Service EventSystem, COMSysApp, RPCSS, RpcEptMapper, DcomLaunch, Winmgmt if ($services) { foreach ($service in $Services) { $msg = "The '$($service.DisplayName)' service is $($service.Status)." if ($service.Status -eq 'Running') { Write-LogMessage -Type Pass $msg } else { Write-LogMessage -Type Error $msg } if (($service.Name -eq 'COMSysApp') -and ($service.StartType -ne 'Manual')) { Write-LogMessage -Type Warning "The service also does not have its default StartupType. Default: Manual. Current setting: $($service.StartType)." } elseif (($service.Name -ne 'COMSysApp') -and ($service.StartType -ne 'Automatic')) { Write-LogMessage -Type Warning "The service also does not have its default StartupType. Default: Automatic. Current setting: $($service.StartType)." } } } else { Write-LogMessage -Type Error "Could not check the status of the services, please look into this!" } Write-LogMessage "-------------------------" Write-LogMessage "Checking COM+ settings..." # Check if COM+ is on $enableComPlus = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\COM3").'Com+Enabled' if ([string]::IsNullOrEmpty($enableComPlus)) { Write-LogMessage -Type Warning "Could not check COM+, please check manually @ HKLM:\SOFTWARE\Microsoft\COM3." } else { if ($enableComPlus -eq 1) { Write-LogMessage -Type Pass "COM+ is enabled." } elseif ($enableComPlus -eq 0) { Write-LogMessage -Type Error "COM+ is NOT enabled." } } # Check if COM+ remote access is on $remoteComPlus = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\COM3").RemoteAccessEnabled if ([string]::IsNullOrEmpty($remoteComPlus)) { Write-LogMessage -Type Warning "Could not check COM+ remote access, please check manually @ HKLM:\SOFTWARE\Microsoft\COM3." } else { if ($remoteComPlus -eq 1) { Write-LogMessage -Type Warning "COM+ remote access is enabled. By default it is off." } elseif ($remoteComPlus -eq 0) { Write-LogMessage -Type Pass "COM+ remote access is not enabled. This is ok, by default it is off." } } Write-LogMessage "-------------------------" Write-LogMessage "Checking RPC settings..." # Check if the Restrict Unauthenticated RPC clients policy is on or not $restrictRpcClients = (Get-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows NT\Rpc" -ErrorAction SilentlyContinue).RestrictRemoteClients if ([string]::IsNullOrEmpty($restrictRpcClients)) { Write-LogMessage -Type Pass "RPC restrictions via policy are not in place." } else { switch ($restrictRpcClients) { 0 { Write-LogMessage "The RPC restriction policy is set to 'None', so all connections are allowed." } 1 { Write-LogMessage "The RPC restriction policy is set to 'Authenticated', so only Authenticated RPC Clients are allowed. Exemptions are granted to interfaces that have requested them." } 2 { Write-LogMessage -Type Warning "The RPC restriction policy is set to 'Authenticated without exceptions', so only Authenticated RPC Clients are allowed, with NO exceptions. This is known to cause on the client some very tricky to investigate 'access denied' errors." } Default { Write-LogMessage -Type Error "The RPC restriction policy seems to be present, but its value seems to be wrong. It should be 0, 1 or 2, but is actually $($restrictRpcClients)." } } } # Check if RPC Endpoint Mapper Client Authentication is on or not $authEpResolution = (Get-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows NT\Rpc" -ErrorAction SilentlyContinue).EnableAuthEpResolution if (([string]::IsNullOrEmpty($authEpResolution)) -or ($authEpResolution -eq 0)) { Write-LogMessage -Type Pass "RPC Endpoint Mapper Client Authentication is not configured or disabled." } elseif ($authEpResolution -eq 1) { Write-LogMessage -Type Warning "RPC Endpoint Mapper Client Authentication is enabled, which may cause some issues with applications/components that do not know how to handle this." } # Check internet settings for RPC to see if there's a restricted port range $rpcPortsRestriction = (Get-ItemProperty -Path "HKLM:\Software\Microsoft\Rpc\Internet" -ErrorAction SilentlyContinue).UseInternetPorts if (([string]::IsNullOrEmpty($rpcPortsRestriction)) -or ($rpcPortsRestriction -eq "N")) { Write-LogMessage -Type Pass "RPC ports are not restricted." } elseif ($rpcPortsRestriction -eq "Y") { $rpcPorts = (Get-ItemProperty -Path "HKLM:\Software\Microsoft\Rpc\Internet" -ErrorAction SilentlyContinue).Ports Write-LogMessage -Type Warning "RPC ports are restricted. This may cause issues with RPC/DCOM connections. The usable port range is defined to '$($rpcPorts.ToString())'." } # Check actual dynamic port range $intSettings = Get-NetTCPSetting -SettingName Internet if ($null -eq $intSettings) { Write-LogMessage -Type Warning "The Internet TCP dynamic port range could not be read, please have a close look." } elseif ($intSettings.DynamicPortRangeStartPort -eq 49152 -and $intSettings.DynamicPortRangeNumberOfPorts -eq 16384) { Write-LogMessage -Type Pass "The Internet TCP dynamic port range is the default." } else { Write-LogMessage -Type Warning "The Internet TCP dynamic port range is NOT the default, please have a closer look." } Write-LogMessage "-------------------------" Write-LogMessage "Checking DCOM settings..." # Check if DCOM is enabled $ole = Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Ole" if ($ole.EnableDCOM -eq "Y") { Write-LogMessage -Type Pass "DCOM is enabled." } else { Write-LogMessage -Type Error "DCOM is NOT enabled! Check the settings." } # Check default DCOM Launch & Activation / Access permissions $defaultPermissions = @( @{ name = 'Everyone' short = 'WD' sid = 'S-1-1-0' launch = 'A;;CCDCSW;;;' access = 'A;;CCDCLC;;;' } @{ name = 'Administrators' short = 'BA' sid = 'S-1-5-32-544' launch = 'A;;CCDCLCSWRP;;;' } @{ name = 'Distributed COM Users' short = 'CD' sid = 'S-1-5-32-562' launch = 'A;;CCDCLCSWRP;;;' access = 'A;;CCDCLC;;;' } @{ name = 'Performance Log Users' short = 'LU' sid = 'S-1-5-32-559' launch = 'A;;CCDCLCSWRP;;;' access = 'A;;CCDCLC;;;' } @{ name = 'All Application Packages' short = 'AC' sid = 'S-1-15-2-1' launch = 'A;;CCDCSW;;;' access = 'A;;CCDC;;;' } ) # Get current permissions from registry $launchRestriction = (([wmiclass]"Win32_SecurityDescriptorHelper").BinarySDToSDDL($ole.MachineLaunchRestriction)).SDDL $accessRestriction = (([wmiclass]"Win32_SecurityDescriptorHelper").BinarySDToSDDL($ole.MachineAccessRestriction)).SDDL # Compare current vs default permissions foreach ($permission in $defaultPermissions.GetEnumerator()) { if ($permission.launch) { if ($launchRestriction.Contains($permission.launch + $permission.short) -or $launchRestriction.Contains($permission.launch + $permission.sid)) { Write-LogMessage -Type Pass "The '$($permission.name)' group is present in Launch & Activation with default permissions." } else { Write-LogMessage -Type Error "The '$($permission.name)' group is NOT present in Launch & Activation with default permissions, please verify." } } if ($permission.access) { if ($accessRestriction.Contains($permission.access + $permission.short) -or $accessRestriction.Contains($permission.access + $permission.sid)) { Write-LogMessage -Type Pass "The '$($permission.name)' group is present in Access with default permissions." } else { Write-LogMessage -Type Error "The '$($permission.name)' group is NOT present in Access with default permissions, please verify." } } $localGroup = Get-LocalGroup -SID $permission.sid -ErrorAction SilentlyContinue if ($localGroup -and !($localGroup.Name -eq $permission.name)) { Write-LogMessage -Type Warning "The name of the group is not the original English one (current name: '$($localGroup.Name)'). This is usually because the OS is in a different language & it can cause confusion in some situations, so please be aware / keep this in mind." } } # Check enabled DCOM protocols $protocols = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Rpc" -ErrorAction SilentlyContinue).'DCOM Protocols' if ([string]::IsNullOrEmpty($protocols)) { Write-LogMessage -Type Warning "No protocols specified for DCOM." } else { Write-LogMessage "Enabled protocols: $($protocols)" if ($protocols.Contains("ncacn_ip_tcp")) { Write-LogMessage -Type Pass "The list of enabled protocols contains 'ncacn_ip_tcp', which should be present by default." } else { Write-LogMessage -Type Error "The list of enabled protocols does NOT contain 'ncacn_ip_tcp', which should be present by default." } } # Check DcomScmRemoteCallFlags if ([string]::IsNullOrEmpty($ole.DCOMSCMRemoteCallFlags)) { Write-LogMessage -Type Pass "DCOMSCMRemoteCallFlags is not configured in the registry and by default it should not be there. That is ok." } else { Write-LogMessage -Type Warning "DCOMSCMRemoteCallFlags is configured in the registry with value '$($ole.DCOMSCMRemoteCallFlags)', while it should not be there by default. This does not necessarily mean there is a problem, nevertheless, please check the documentation:`nhttps://learn.microsoft.com/en-us/windows/win32/com/dcomscmremotecallflags" } # Check LegacyAuthenticationLevel if ([string]::IsNullOrEmpty($ole.LegacyAuthenticationLevel)) { Write-LogMessage -Type Pass "LegacyAuthenticationLevel is not configured in the registry, so the default is used. That is ok." } else { Write-LogMessage -Type Warning "LegacyAuthenticationLevel is configured in the registry with value '$($ole.LegacyAuthenticationLevel)', while it should not be there by default. This should not be a problem, though, as we are raising the authentication level in the OS anyway, due to the DCOM hardening. Nevertheless, please check the documentation:`nhttps://learn.microsoft.com/en-us/windows/win32/com/legacyauthenticationlevel" } # Check LegacyImpersonationLevel if ([string]::IsNullOrEmpty($ole.LegacyImpersonationLevel) -or ($ole.LegacyImpersonationLevel -eq 2)) { Write-LogMessage -Type Pass "LegacyImpersonationLevel is using the default value. That is ok." } else { Write-LogMessage -Type Warning "LegacyImpersonationLevel is configured in the registry with value '$($ole.LegacyImpersonationLevel)', while it should be '2' by default. Please check the documentation:`nhttps://learn.microsoft.com/en-us/windows/win32/com/legacyimpersonationlevel" } # Check DCOM hardening registry keys $requireIntegrityAuthLevel = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Ole\AppCompat" -ErrorAction SilentlyContinue).RequireIntegrityActivationAuthenticationLevel if ([string]::IsNullOrEmpty($requireIntegrityAuthLevel)) { Write-LogMessage -Type Pass "RequireIntegrityActivationAuthenticationLevel is not set in the registry. That is ok." } else { Write-LogMessage -Type Warning "RequireIntegrityActivationAuthenticationLevel is set in the registry to '$requireIntegrityAuthLevel'. Check info in public KB5004442.`nhttps://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" } $raiseAuthLevel = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Ole\AppCompat" -ErrorAction SilentlyContinue).RaiseActivationAuthenticationLevel if ([string]::IsNullOrEmpty($raiseAuthLevel)) { Write-LogMessage -Type Pass "RaiseActivationAuthenticationLevel is not set in the registry. That is ok." } else { Write-LogMessage -Type Warning "RaiseActivationAuthenticationLevel is set in the registry to '$raiseAuthLevel'. Check info in public KB5004442.`nhttps://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" } $disableHardeningLogging = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Ole\AppCompat" -ErrorAction SilentlyContinue).DisableAuthenticationLevelHardeningLog if ([string]::IsNullOrEmpty($disableHardeningLogging) -or ($disableHardeningLogging -eq 0)) { Write-LogMessage -Type Pass "Hardening related logging is turned on. That is ok, it should be on by default." } else { Write-LogMessage -Type Error "Hardening related logging is turned off. This is a problem, because you may have failing DCOM calls which you are not aware of. Please turn the logging back on by removing the DisableAuthenticationLevelHardeningLog entry from regkey 'HKLM:\SOFTWARE\Microsoft\Ole\AppCompat'." } # Check for any DCOM hardening events (IDs 10036/10037/10038) $sysEvents = Get-WinEvent -FilterHashtable @{ LogName = 'System' ID = 10036, 10037, 10038 } -ErrorAction SilentlyContinue if (!$sysEvents) { Write-LogMessage -Type Pass "Did not detect any DCOM hardening related events (10036, 10037, 10038) in the System log." } else { if ($sysEvents.Id.Contains(10036)) { Write-LogMessage -Type Warning "Events with ID 10036 detected in the System event log. This device seems to be acting as a DCOM server & is rejecting some incoming connections, please check." # Print the most recent 5 of them Write-LogMessage "Here are the most recent ones:" foreach ($event in ($sysEvents | Where-Object { $_.Id -eq 10036 } | Select-Object -First 5)) { Write-LogMessage "$($event.TimeCreated) - $($event.Message)" } } if ($sysEvents.Id.Contains(10037)) { Write-LogMessage -Type Warning "Events with ID 10037 detected in the System event log. This device seems to be acting as a DCOM client with explicitly set auth level & failing, please check." # Print the most recent 5 of them Write-LogMessage "Here are the most recent ones:" foreach ($event in ($sysEvents | Where-Object { $_.Id -eq 10037 } | Select-Object -First 5)) { Write-LogMessage "$($event.TimeCreated) - $($event.Message)" } } if ($sysEvents.Id.Contains(10038)) { Write-LogMessage -Type Warning "Events with ID 10038 detected in the System event log. This device seems to be acting as a DCOM client with default auth level & failing, please check." # Print the most recent 5 of them Write-LogMessage "Here are the most recent ones:" foreach ($event in ($sysEvents | Where-Object { $_.Id -eq 10038 } | Select-Object -First 5)) { Write-LogMessage "$($event.TimeCreated) - $($event.Message)" } } } Write-Host " ##################################################################### ############################# DIAG END ############################## ##################################################################### " # SIG # Begin signature block # MIIoOwYJKoZIhvcNAQcCoIIoLDCCKCgCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDIYgytwihJslxM # okPTbJBoTaJKo5mhC/mf+rOGm8VlgaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEID7j # W9BVpmu7o2kCSCX55tsLImT+MV/oXHBm6L5sONa1MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAe/sj3ntkSB24OjV01YeMrZF//NfRWDerRI7W # CjvEPEYbOa/ah0hfhlMlf7acGOPcmz1AzvvX7G/uzFmuumGjFseGpVPmDcbRHgTa # ewEAWnRhEvz2mu1SmBOlU+LSpOJ40OkaYh0JZ8jIFHlXR27kNVPtK5KI0uo1M0po # tJYD/uNgrlVcIcfzK4w2hcvZRQRStdIxwb5pPPFg+ZwVmtG0X5zaElIORRFMe10V # 09ap5PrcgkQVoMg5KlheeDKve6itJQ7ortYF0MFLXvizjwlu3YJXHuf1+hb41/qx # 1F7WyL6vf8bH04n/ZK2CsccaIiW9GKG4dC6YlxlxxHYpjzECp6GCF5YwgheSBgor # BgEEAYI3AwMBMYIXgjCCF34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDe2tRBXl5w1TLT2ESaDxbrpojHpAKUrjz/ # VaMyG7KOiAIGZxp9zrHDGBIyMDI0MTAyODExMzUyNC40NFowBIACAfSggdGkgc4w # gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT # HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg # VFNTIEVTTjo4RDAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCEe0wggcgMIIFCKADAgECAhMzAAAB88UKQ64DzB0xAAEA # AAHzMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTIzMTIwNjE4NDYwMloXDTI1MDMwNTE4NDYwMlowgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4RDAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAP6fptrhK4H2JI7lYyFueCpg # Bv7Pch/M2lkhZL+yB9eGUtiYaexS2sZfc5VyD7ySsl2LG41Qw7tkA6oJmxdSM7Pz # NyfVpQPkPavY+HNUqMe2K9YaAaPjHnCpZ7VCi/e8zPxYewqx9p0iVaN8EydUpWiY # 7JtDv7aNzhp/OPZclBBKYT2NBGgGiAPCaplqR5icjHQSY665w+vrvhPr9hpM+Ihi # UZ/5dXa7qhAcCQwbnrFg9CKSK1COM1YcAN8GpsERqqmlqy3GlE1ziJ3ZLXFVDFxA # ZeOcCB55Vts9sCgQuFvD7PdV61HC4QUlHNPqFtYSC/P0sxg9JuKgcvzD5mJajfG7 # DdHt8myp7umqyePC+eI/ux8TW61+LuTQ1Bkym+I6z//bf0fp4Dog5W0XzDrqKkTv # URitxI2s4aVObm6qr6zI7W51k54ozTFjvbw1wYMWqeO4U9sQSbr561kp+1T2PEsJ # LOpc5U7N2oDw7ldrcTjWPezsyVMXhDsFitCZunGqFO9+4iVjAjYDN47c6K9x7MnA # GPYVCBOJUdpy8xAOBIDsTm/K1qTT4wsGbQBxbgg96vwDiA4YP2hKmubIC7UnrAWQ # Gt/ZKOf6J42roXHS1aPwimDe5C9y6DfuNJp0XqrWtQRqg8hqNkIZWT6jnCfqu35z # B0nf1ERTjdpYLCfQL5fHAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUw2QV9qURUQyM # DcCmhTH2oOsNCiQwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAN/EHI/80f7v29ze # WI7hzudcz9QoVwCbnDrUXFHE/EJdFeWI2NnuwOo0/QPNRMFT21LkOqSpFKIhXXmP # urx7p6WDz9wPdu/Sxbgaj0AwviWEDkwGDfDMp2KF8nQT8cipwdfXWbC1ulOILayA # BSHv45mdv1PAkTulsQE8lBTHG4KJLn+vSzZBWKkGaL/wwRbZ4iLiYn68cjkMJoAa # ihPgDXn/ug2P3PLNEAFNQgI02tLX0p+vIQ3l2HmSo4bhCBxr3DovsIv5K65NmLRJ # nxmrrmIraFDwgwA5XF7AKkPiVkvo0OxU1LAE1c5SWzE4A7cbTA1P5wG6D8cPjcHs # Tah1V+zofYRgJnFRLWuBF4Z3a6pDGBDbCsy5NvnKQ76p37ieFp//1I3eB62ia1Cf # kjOF8KStpPUqdkXxMjfJ7Vnemd6vQKf+nXkfvA3AOQECJn7aLP01QR5gt8wab28S # sNUENEyMawT8eqpjtBNJO0O9Tv7NnBE8aOJhhQVdP5WCR90eIWkrDjZeybQx8vlo # 5rfUXIIzXv+k9MgpNGIqwMXfvRLAjBkCNXOIP/1CEQUG72miMVQs5m/O4vmJIQkh # yqilUDB1s12uhmLYc3yd8OPMlrwIxORB5J9CxCkqvzc6EGYTcwXazPyCp7eWhzTk # Nbwk29nfbwmmzcskIAu3StA8lic7MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCA1AwggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj # YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUw # LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB # ATAHBgUrDgMCGgMVAG76BizYtGFrmkU7v2DcuR/ApGcooIGDMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqyZlPMCIY # DzIwMjQxMDI4MDUwMjA3WhgPMjAyNDEwMjkwNTAyMDdaMHcwPQYKKwYBBAGEWQoE # ATEvMC0wCgIFAOrJmU8CAQAwCgIBAAICAx0CAf8wBwIBAAICEzYwCgIFAOrK6s8C # AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEK # MAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAp2k8h2eYO6vDVbcqN10TJpAy # fD4TJFIur7OmtM/y3/SJ4Yjv3DZ7p2lO4sh4FtMQPUL/m8VpmGfeaK3gtUkQh0y7 # 1vZ3xxajeGtYMyqyxkAAYfc01dG5DA8EjDNpNdWDx52k4iZWiabQiVMDpOlIWOJI # CKPVXHCiHPcx6f3D8zh9XQflC2ZWFayr1u2F99a9/IXPuZ/p5JdfpWxJSyn9TzDB # 7dn7HL9xyN45EeLdSboiAA2vZIto7hzwko2L1jII7jnSSybw0tnHbASHysbl07KW # oZfxJlNU3FCDy4YzQVEASZNVAdP4O+ndGwsxVfZ/7j0a9ZHhUvbpWiBrre8AWTGC # BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 88UKQ64DzB0xAAEAAAHzMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMx # DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEICb+NYeg/zsuYapffqCBJr5y # Pvvihji0eP9GS3c8a4wlMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgGLzZ # NIu24bhWSnzAGYmT9P5ECHzjWwb9oM7DGDo7YugwgZgwgYCkfjB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAiBCD0YJVJ # teKu5S8A1iyFoeaRLxoBS2nhN5O79yyWVUN6kjANBgkqhkiG9w0BAQsFAASCAgA1 # UpinUzptlWkmkjEp/bO1Cz1WrRmeL/SrpTMek19mFZZkt8rMxLnqgIBhY3UT0bjV # Xd3FDWJBVCbyaeKL7VkWBs+flXbvzj4FNmwa1K5gyIo86VJKrBOz0tPAj+Mdq/0e # 0JqzQcYb2xNt937kZXbIceNF8g+lN9rl2XFalZhRRv0yqyQx2282tcEpp/pI6p4q # QvUGsVSpoCyJk4aglSHFC5/Ur8YkpZ43tye9wBdtrMCLR1DY9mubeJUkz/HGhWrf # jZHN3Qj/09xDYshKdPSf5nq4+wuXBmjUts+KnmGpbl2Sa+5lwSQPKRi4OWNrkBk1 # iutd/Euzw/SjQVdNQu/2iggUr+oTQZ/f3IahhXUEWWtlI678ncZ8H9+XwfsuwF2f # 0XNI+HRsR2+tL3sCAKedHmhZCtvRH9VXLMgQRbc+6eiy8EaFiZDF6J9DczHQDahb # 3qui6Ot6IR6RIl9WUzNl7F0HosaowX3hW/YDeDIpIHDSTncSAJDDQU9RMEu4hT1a # jzrY4z+OtqrYdUm/RdPvQH8ny1gpG0yMF4MMkgZu16Zc+KQwf/8QKFvvq8KMg18g # enawNEA/r9jBmw/T9BKx9mCFeLlAuNKG7geGwaWFOFcFV14+11IplbxvpyT7eaME # f6KqMdDuapfWngFVu+/6tyyVjkwi32LGa06PKPsy0Q== # SIG # End signature block
0
sample_11_89.ps1
ConvertFrom-StringData @' id_detectmtu1514_activity=Detect MTU of 1514 id_detectmtu1514_status=Checking network adapters for an MTU of 1514. '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCyTlqI8eRcgEaO # Nk2if1xW/+WL15yC9C58rVmh7XYOu6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINoR6O7mscEmyExvW+TmCsPX # GWsSa8RybW4K6KKrUErqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAmRmox6sTMiuhxHV6AYHFXD9D1D9oGdsuvcI/eAsnqUcfY/T1s506MHiC # ZHsKUJDJScLUL3Q2efXZxRRMsr73vHy3VVYMjCAnlD+5RdmC7XxNk9JRcIdYKn52 # QfToAuyqo8R2sq81Hph7e0PvmxO1Q3c+PbCPiL9u75GbyL9rYPqMFYdKn9kk02WU # O3eU57fXipJR/MitQDTqmoLhbSYnoLfvvHRtnV7lxWFk+o55WpuEXYFhj1oCS7XB # XwL0gO/w9M7jcc42zC5GRaVWMrMQX3Enf7LQ3SIPX2rd4E9P8nMfPgVtaSm0X1AJ # ZVwXoTZ1pbEu0Akdu1MMxnBTAXLEiaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDP0yMhkRU/DB86UVVWkGmOo3CTpgHEZJ5FqFh0ZM6LSAIGZxqItyMy # GBMyMDI0MTAyODExNDA0Mi41OTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smkOTAiGA8yMDI0MTAyODA1NDg0 # MVoYDzIwMjQxMDI5MDU0ODQxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyaQ5 # AgEAMAcCAQACAgZUMAcCAQACAhPVMAoCBQDqyvW5AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAFfF191Vr1N1sln3mHz61HMNMQEgEa636VH1IhLDsW3Fa0AD # cc4HhLIGewlJNoGCXcZBml5HEec91aylUr95ZJqXwUeqPPb9X5bmbVFXObHp67Wi # gFKCbNOFbIiG8ecu331cmM1GqdiZAhT6hW4gc/LC7F/nqvDz8msZXcAtE96/FvXd # 43LKJVHk/kN5IP3SUKVHfZo6zUQvLAaoPylUdoYADAn6hMlUIcog3CD8TCcit1MW # EuBxZZBPsBMJdzSNeM+RfcmNb6nEzgkv8hGAlRMFGEp/jpNVEuQ5uey+mvVyZ/Ka # PkY+I4n2Y/SEuQKBMvP6FLyr9gfGyH8jpbHQG8gxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCC02+oIdtkGjae9af9bx48GAVQGZPvyw6L+WUza8FnqFTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh5G1u # KqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgLTk9jKlHi0Od4rfyi3FO/mCmLpu/ # ZxHUB/cVCTvgf/QwDQYJKoZIhvcNAQELBQAEggIAKhLTxhcbqnvlH3r81cnJP7jE # QmYVo+Fa/rmAf7jpBqF+mvAkOIQbKOtOKe2c0jjXnW2uSD1E1eQrtmeOM//dveRw # y+iNBGYFAJ2cDWrEUcWTwxlQTQKBUWcSibUCmlEQMdyhsCyo3Ct+zWTW+XZnlRI6 # W2vfCund+TwEchaoP6fO6frVAUvF9lKns8tgKDvlq1LYOdMOA4ohHZCIavBbpBeo # gphxsnO7wvrY9TJ70BCsXMo2mSvFigF7pkKHi3CorORq3ylD0+Iri3B4V1/TLo2y # v+siIA3uPxYyw1MW5abpeleO2rP+PNADehY97EvvkCldWUfIgSmLcJQmbjthFK8R # AplSIMPDEgygLnHnpeyu/XtFcdGEYQMwF5jbK1lPKflO/sQLrKyVH28JmGGkLpnm # yMGQsLPNsKClpHiXmbXP1C5xtavKyerC6jLEVFTQxF7FW0u4pUhylrM7mgdHtx6g # 7Ig7oQYky27xsokd91ItC73jki3ASHbG1z8GrJ6Kb4Wsbiy3k8fvIiwBa3oE9K8L # UtDDlgXpTP+3GHR/CqvxM1h954/LdOzP3MVQldkenHovrx66qOGjCelcveAdLWZO # ZHAjJwLHVySqlFczX8PJIXuG3m5O/7tp2PihPfs27TI0DnkiyZN/HfTD0DnqySdM # goW4kJ5WdKUnyLp2VG0= # SIG # End signature block
0
3916.ps1
function Get-BudgetName { return "Budget-" + (getAssetName) } function Get-NotificationKey { return "NotificationKey-" + (getAssetName) } function Get-ResourceGroupName { return "RG-" + (getAssetName) } function Test-BudgetAtSubscriptionLevel { $budgetName = Get-BudgetName $notificationKey = Get-NotificationKey $startDate = Get-Date -Day 1 $endDate = ($startDate).AddMonths(3).AddDays(-1) Write-Debug "Create a new budget $budgetName at subscription level" $budgetNew = New-AzConsumptionBudget -Amount 6000 -Name $budgetName -Category Cost -StartDate $startDate -EndDate $endDate -TimeGrain Monthly Assert-NotNull $budgetNew Assert-AreEqual 6000 $budgetNew.Amount Assert-AreEqual $budgetName $budgetNew.Name Assert-AreEqual Cost $budgetNew.Category Assert-AreEqual Monthly $budgetNew.TimeGrain Write-Debug "Get the budget $budgetName" $budgetGet = Get-AzConsumptionBudget -Name $budgetName Assert-NotNull $budgetGet Assert-AreEqual 6000 $budgetGet.Amount Assert-AreEqual $budgetName $budgetGet.Name Assert-AreEqual Cost $budgetGet.Category Assert-AreEqual Monthly $budgetGet.TimeGrain Write-Debug "Update the budget $budgetName with amount change to 7500" $budgetSet1 = Get-AzConsumptionBudget -Name $budgetName | Set-AzConsumptionBudget -Amount 7500 Assert-NotNull $budgetSet1 Assert-AreEqual 7500 $budgetSet1.Amount Write-Debug "Update the budget $budgetName with a notification $notificationKey when cost or usage reaches a threshold of 90 percent of amount" $budgetSet2 = Set-AzConsumptionBudget -Name $budgetName -NotificationKey $notificationKey -NotificationEnabled -NotificationThreshold 90 -ContactEmail johndoe@contoso.com,janesmith@contoso.com -ContactRole Owner,Reader,Contributor Assert-NotNull $budgetSet2 Assert-AreEqual $budgetName $budgetSet2.Name Assert-AreEqual 1 $budgetSet2.Notification.Count Write-Debug "Remove the budget $budgetName" $response = Remove-AzConsumptionBudget -Name $budgetName -PassThru Assert-AreEqual True $response Assert-Throws {Get-AzConsumptionBudget -Name $budgetName} } function Test-BudgetAtResourceGroupLevel { $budgetName = Get-BudgetName $notificationKey1 = Get-NotificationKey $notificationKey2 = Get-NotificationKey $resourceGroupName = Get-ResourceGroupName $startDate = Get-Date -Day 1 $endDate = ($startDate).AddMonths(3).AddDays(-1) New-AzResourceGroup -Name $resourceGroupName -Location 'West US' -Force try { Write-Debug "Create a new budget $budgetName at resource group level" $budgetNew = New-AzConsumptionBudget -Amount 6000 -Name $budgetName -ResourceGroupName $resourceGroupName -Category Cost -StartDate $startDate -EndDate $endDate -TimeGrain Monthly Assert-NotNull $budgetNew Assert-AreEqual 6000 $budgetNew.Amount Assert-AreEqual $budgetName $budgetNew.Name Assert-AreEqual Cost $budgetNew.Category Assert-AreEqual Monthly $budgetNew.TimeGrain Write-Debug "Get the budget $budgetName" $budgetGet = Get-AzConsumptionBudget -Name $budgetName -ResourceGroupName $resourceGroupName Assert-NotNull $budgetGet Assert-AreEqual 6000 $budgetGet.Amount Assert-AreEqual $budgetName $budgetGet.Name Assert-AreEqual Cost $budgetGet.Category Assert-AreEqual Monthly $budgetGet.TimeGrain Write-Debug "Update the budget $budgetName with a notification $notificationKey when cost reaches a threshold of 90 percent of amount" $budgetSet1 = Set-AzConsumptionBudget -Name $budgetName -ResourceGroupName $resourceGroupName -NotificationKey $notificationKey1 -NotificationEnabled -NotificationThreshold 90 -ContactEmail johndoe@contoso.com,janesmith@contoso.com -ContactRole Owner,Reader,Contributor Assert-NotNull $budgetSet1 Assert-AreEqual $budgetName $budgetSet1.Name Assert-AreEqual 1 $budgetSet1.Notification.Count Write-Debug "Update the budget $budgetName with a second notificaiton $notificationKey when cost reaches a threshold of 150 percent of amount" $budgetSet2 = Set-AzConsumptionBudget -Name $budgetName -ResourceGroupName $resourceGroupName -NotificationKey $notificationKey2 -NotificationEnabled -NotificationThreshold 150 -ContactEmail johndoe@contoso.com,janesmith@contoso.com -ContactRole Owner,Reader,Contributor Assert-NotNull $budgetSet2 Assert-AreEqual $budgetName $budgetSet2.Name Assert-AreEqual 2 $budgetSet2.Notification.Count Write-Debug "Remove the budget $budgetName" $response = Remove-AzConsumptionBudget -Name $budgetName -ResourceGroupName $resourceGroupName -PassThru Assert-AreEqual True $response Assert-Throws {Get-AzConsumptionBudget -Name $budgetName -ResourceGroupName $resourceGroupName} } finally { Remove-AzResourceGroup -Name $resourceGroupName -Force } } function Test-GetBudgets { $startDate = Get-Date -Day 1 $endDate = ($startDate).AddMonths(3).AddDays(-1) $budgetName = Get-BudgetName $budgetNew = New-AzConsumptionBudget -Amount 6000 -Name $budgetName -Category Cost -StartDate $startDate -EndDate $endDate -TimeGrain Monthly Assert-NotNull $budgetNew $budgets = Get-AzConsumptionBudget Assert-NotNull $budgets $response = Get-AzConsumptionBudget -Name $budgetName | Remove-AzConsumptionBudget -PassThru Assert-AreEqual True $response Assert-Throws {Get-AzConsumptionBudget -Name $budgetName} }
0
sample_35_62.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. param( [ValidateSet('Hang', 'Fail')] $TestHook ) $waitTimeoutSeconds = 300 switch ($TestHook) { 'Hang' { $waitTimeoutSeconds = 10 $jobScript = { Start-Sleep -Seconds 600 } } 'Fail' { $jobScript = { throw "This job script should fail" } } default { $jobScript = { # This registers Microsoft Update via a predifened GUID with the Windows Update Agent. # https://learn.microsoft.com/windows/win32/wua_sdk/opt-in-to-microsoft-update $serviceManager = (New-Object -ComObject Microsoft.Update.ServiceManager) $isRegistered = $serviceManager.QueryServiceRegistration('7971f918-a847-4430-9279-4a52d1efe18d').Service.IsRegisteredWithAu if (!$isRegistered) { Write-Verbose -Verbose "Opting into Microsoft Update as the Autmatic Update Service" # 7 is the combination of asfAllowPendingRegistration, asfAllowOnlineRegistration, asfRegisterServiceWithAU # AU means Automatic Updates $null = $serviceManager.AddService2('7971f918-a847-4430-9279-4a52d1efe18d', 7, '') } else { Write-Verbose -Verbose "Microsoft Update is already registered for Automatic Updates" } $isRegistered = $serviceManager.QueryServiceRegistration('7971f918-a847-4430-9279-4a52d1efe18d').Service.IsRegisteredWithAu # Return if it was successful, which is the opposite of Pending. return $isRegistered } } } Write-Verbose "Running job script: $jobScript" -Verbose $job = Start-ThreadJob -ScriptBlock $jobScript Write-Verbose "Waiting on Job for $waitTimeoutSeconds seconds" -Verbose $null = Wait-Job -Job $job -Timeout $waitTimeoutSeconds if ($job.State -ne 'Running') { Write-Verbose "Job finished. State: $($job.State)" -Verbose $result = Receive-Job -Job $job -Verbose Write-Verbose "Result: $result" -Verbose if ($result) { Write-Verbose "Registration succeeded" -Verbose exit 0 } else { Write-Verbose "Registration failed" -Verbose # at the time this was written, the MSI is ignoring the exit code exit 1 } } else { Write-Verbose "Job timed out" -Verbose Write-Verbose "Stopping Job. State: $($job.State)" -Verbose Stop-Job -Job $job # at the time this was written, the MSI is ignoring the exit code exit 258 } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKVny4bI+osaoc # I2htF+wfukTKR2MeatDVPmfofAOKNqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII4S # ABvogM1t/LBAhzzX59TamvAo1awfPxvFHeNLpdECMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAeZOEiUQd0KED67X+XBR8NP7e85rMFUI1Tg7v # JP0UqsMmq9juOE2B0CBQR8lVpqsc4/sPivthpQecZ/H9lMGcU96UUpc2M1fkryS4 # OmQW1VQzIQ4NgVn+NhGfsjddd3lk9iBxhSW8qjbsfvxYAentsJPyWNRgafPNFoWN # SpDLG/r4ESvlQ0VYZD4LYH4d//PJyexzgfYqUWyQ5nmqUw1k/s9/anJvHJYaNxn3 # L6rlLg6aKk31hkPkOEW3BK1rclF15g2FDZrHVG/Wz4VyRyY4+em36clWChUwwd8Z # WiwiF7hASVwK8YjJmSOrs4gD/Mbc9PEQP9YE5pulEYV0x6YjBKGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCEtSotAJWUjUYYlcB0CEYZPhCJZ3Y4Zcs1 # IHyG5VOWjwIGZYLgpx7OGBMyMDI0MDExMTA0MzQxNS40MjhaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJ # WgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQ # Bgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnC # lF2cruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf # 7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3D # M2K59wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4k # UQxVhqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXl # PczvGd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA # 6RxvMcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagY # mrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZ # BO2dhzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT24 # 93gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREl # oR2dI6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1ca # HVh2vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaW # ZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50 # WExbBSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q # /WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C # /2dOfDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ # 8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wj # MXHf0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix # 5+7KL8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM6 # 9ff4Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5P # P37700vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/ # wjhXRn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOlJtd0wIhgPMjAyNDAxMTEwODMzMzNaGA8yMDI0MDEx # MjA4MzMzM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6Um13QIBADAHAgEAAgIK # EDAHAgEAAgIR4TAKAgUA6UsHXQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AA8NJiz7afQjrtGvdj6ebWWM14+ny/XSkqoOkJvMxychccwctcPGujPsv++NkLiE # lkx7TC7mOrlHBGV0R5qAulgR6nYVQ5qbZ4/upOrwffDWnxDLrmjhTSl8K4W6h+6Y # mFTjOh6sHEpG6nq6RVTdehtHT1FT2KbQXvYeG48m825vMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAA # AdowDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgZEJQfsBwQ5IGJjMDWDdEgk3QhgWxJbDfEphk6nI+ # Q04wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09 # 020I5ljibrW/ndICOxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB2o7VyVoA0RGxAAEAAAHaMCIEIMnqoVJ7NL5W5ESwiYWj+nz1 # D9cE6t58xFpBKTa4u5vwMA0GCSqGSIb3DQEBCwUABIICAFMPaRk086Ecmjt2geJO # Nq/KtHkGDUnNhp93BuOP5VU26zDIx5I5jpKY2Ai4Dv7AodwPAiy4oFtrsQzXVZiE # J9okkHU1XpJNWyrQN8Ko4k+hln2p5IdXnzZZof30ABofJCU2ybd4ZaEuLsX9nsc0 # QJov+j4oGsd9f3nYlt1zNsuzBDfyCOONh/RzZYcy3dgpa38gZikFcImj+LRsR7yR # aUez0sULOle5fH/r3lCpLtkyZWPy95asCEpRAng5NyzPKR9A7l/u9d6w8b5tJbG4 # JcPESpsjBZUldtq/dKazMXJn7FvKRsKs6fro7hRquinCQ+pu5+zo3smfHgOwFRcO # +aKs+MrJQdpdvpQN2KDGn5XGriqNNIZ6MftewLeBcXyXwATBTEtAPpBhIX3Osqsi # MKF5IfdBi/j7Bi+AAwWj6W9tZq88fOkXSHZEvZ8HbmkQ5Js4/D1KpZ1eFRdCzA4f # NqJSOlZlkQrR3xvsF58c/iD1zXzHmsshqdrhwXKoWpacQgL68l8F2j75QQuuCUiJ # V7f3Mz6euEHjwvM2oU+kYwEoT6jnPiIXTw22e8cJm8X9KTWzvuuIxQeUpDUI1c3J # l5E7Ye+amdajxk41G2i5Qpqx5e/De0CRcb0tWZt6x1VtCZxd6P2m/8j+sAknTRoJ # LdcwT2/MY9asmkX0O0+vpEqz # SIG # End signature block
0
sample_35_27.ps1
# # Module manifest for module 'OCI.PSModules.Stackmonitoring' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Stackmonitoring.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '72fd42de-2724-406e-9e11-bceb4c8ef8b6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Stackmonitoring Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Stackmonitoring.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Disable-OCIStackmonitoringExternalDatabase', 'Disable-OCIStackmonitoringMetricExtension', 'Enable-OCIStackmonitoringMetricExtension', 'Export-OCIStackmonitoringMetricExtension', 'Get-OCIStackmonitoringBaselineableMetric', 'Get-OCIStackmonitoringBaselineableMetricsList', 'Get-OCIStackmonitoringConfig', 'Get-OCIStackmonitoringConfigsList', 'Get-OCIStackmonitoringDiscoveryJob', 'Get-OCIStackmonitoringDiscoveryJobLogsList', 'Get-OCIStackmonitoringDiscoveryJobsList', 'Get-OCIStackmonitoringMetricExtension', 'Get-OCIStackmonitoringMetricExtensionsList', 'Get-OCIStackmonitoringMonitoredResource', 'Get-OCIStackmonitoringMonitoredResourcesList', 'Get-OCIStackmonitoringMonitoredResourceTask', 'Get-OCIStackmonitoringMonitoredResourceTasksList', 'Get-OCIStackmonitoringMonitoredResourceType', 'Get-OCIStackmonitoringMonitoredResourceTypesList', 'Get-OCIStackmonitoringProcessSet', 'Get-OCIStackmonitoringProcessSetsList', 'Get-OCIStackmonitoringWorkRequest', 'Get-OCIStackmonitoringWorkRequestErrorsList', 'Get-OCIStackmonitoringWorkRequestLogsList', 'Get-OCIStackmonitoringWorkRequestsList', 'Invoke-OCIStackmonitoringAssociateMonitoredResources', 'Invoke-OCIStackmonitoringDisassociateMonitoredResources', 'Invoke-OCIStackmonitoringEvaluateBaselineableMetric', 'Invoke-OCIStackmonitoringManageLicense', 'Invoke-OCIStackmonitoringPublishMetricExtension', 'Invoke-OCIStackmonitoringRequestMonitoredResourcesSummarizedCount', 'Invoke-OCIStackmonitoringSearchAssociatedResources', 'Invoke-OCIStackmonitoringSearchMonitoredResourceAssociations', 'Invoke-OCIStackmonitoringSearchMonitoredResourceMembers', 'Invoke-OCIStackmonitoringSearchMonitoredResources', 'Invoke-OCIStackmonitoringTestMetricExtension', 'Move-OCIStackmonitoringConfigCompartment', 'Move-OCIStackmonitoringMetricExtensionCompartment', 'Move-OCIStackmonitoringMonitoredResourceCompartment', 'Move-OCIStackmonitoringMonitoredResourceTaskCompartment', 'Move-OCIStackmonitoringProcessSetCompartment', 'New-OCIStackmonitoringBaselineableMetric', 'New-OCIStackmonitoringConfig', 'New-OCIStackmonitoringDiscoveryJob', 'New-OCIStackmonitoringMetricExtension', 'New-OCIStackmonitoringMonitoredResource', 'New-OCIStackmonitoringMonitoredResourceTask', 'New-OCIStackmonitoringMonitoredResourceType', 'New-OCIStackmonitoringProcessSet', 'Remove-OCIStackmonitoringBaselineableMetric', 'Remove-OCIStackmonitoringConfig', 'Remove-OCIStackmonitoringDiscoveryJob', 'Remove-OCIStackmonitoringMetricExtension', 'Remove-OCIStackmonitoringMonitoredResource', 'Remove-OCIStackmonitoringMonitoredResourceType', 'Remove-OCIStackmonitoringProcessSet', 'Update-OCIStackmonitoringAndPropagateTags', 'Update-OCIStackmonitoringBaselineableMetric', 'Update-OCIStackmonitoringConfig', 'Update-OCIStackmonitoringMetricExtension', 'Update-OCIStackmonitoringMonitoredResource', 'Update-OCIStackmonitoringMonitoredResourceTask', 'Update-OCIStackmonitoringMonitoredResourceType', 'Update-OCIStackmonitoringProcessSet' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Stackmonitoring' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
Compare Table & DataRow_1.ps1
function Compare-DataRow { param( $a, $b) # @bernd_k http://pauerschell.blogspot.com/ $diff = '' $a_columncount = $a.Table.columns.count $b_columncount = $b.Table.columns.count if ( $a_columncount -ne $b_columncount) { Write-host "Tables have different number of columns" } foreach ( $i in 0..($a_columncount - 1)) { if ($a.item($i) -ne $b.item($i)) { $diff += ' ' + $a.item($i) + ' <> ' + $b.item($i) +';' } } $diff } function Compare-Table { param( $a, $b) # @bernd_k http://pauerschell.blogspot.com/ $diff = '' $a_rowcount = $a.Rows.count $b_rowcount = $b.Rows.count if ( $a_rowcount -ne $b_rowcount1) { Write-host "Tables have different number of columns" } foreach ( $i in 0..($a_rowcount - 1)) { Compare-DataRow $a.rows[$i] $b.rows[$i] } $diff } Compare-DataRow $a.tables[0].rows[0] $b.tables[0].rows[0] Compare-Table ($a.tables[0]) ($b.tables[0])
0
sample_37_34.ps1
function PSConsoleHostReadLine { Microsoft.PowerShell.Core\Set-StrictMode -Off [Microsoft.PowerShell.PSConsoleReadLine]::ReadLine($host.Runspace, $ExecutionContext) } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD/yRWgb1v9cAF2 # Fgsa5s1DKnPsG+9RpMttigLBfuGUKqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAt9WRKOrJpbVifN0+CNmTKO # 6Uw1noM98dTqLXTOiQBqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALx3TiQNsp+DXTqDmzrFVZrasYU1QQYl5rthDgHrxOjfq5v+SZ8pqADyq # s/+q1kjL5OAnUuAo9nYXCr8kIGJ8GoVXC4rVaahNjuQfSvcVsbPIYXgIW1WubN4E # CObN+03qwygkl7TP/bZMheBOrLagW/geh1QFPQlQMliQubNKA+MCHGltwz1pt4PM # bwas5Uj8Rdt1CBrkihFgh1U7Gtfn9V7ONq3g1FKuxK9rXjI0KQNh69XVu8wLYHy6 # PJLWzXIETIw6DiJaySkV9Wfo6+Z9DCuHE/rDGbSLw+fD1BTph8pPIetHuPOQc6Yx # jcTY3Pvs3LxP7ViNtJ3xthJs/Gkj56GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD0VJ/jqzHCYxkTO1Zn3fZoNDzBb10pWkIvOhji+U/1gAIGZdX8MFJV # GBMyMDI0MDIyNjAzMDQwOC4yMDhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmGaL4wIhgPMjAyNDAyMjYwOTMyNDZaGA8yMDI0MDIyNzA5MzI0NlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6YZovgIBADAHAgEAAgIQEzAHAgEAAgIRZTAKAgUA # 6Ye6PgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGwmKek3XcI95mxvJ/ie # o7HFtGPU3M2MszGxf0tFYuTnFViTxvNO8DtdgbxciqEp6wkRRsZMenW90IZVhLMC # FqlMdZ74H9FixCusLU8u5X9wuV4vAikMe2QhQoXbNXleLoAyR+Ep4BSMZdLym9bg # AfqfqZGp70rQ4zvUyFhToI2RMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgaBLxX8Gge/844EiMi5PsaqteM8FxbKZeRMNaIF69drswgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIGgmCF4LH/m3u4pOGeSXYlC78LfR16hR5SyL2BiKHdIp # MA0GCSqGSIb3DQEBCwUABIICAFEaH9NjVoSZRS+9GwVpByUHvYhEKYlS7fUOonvq # IvXcAZWt4wQhxsVr7jIAHH6SlRAKBwPvt74uViP4lza6hNynPbnBHWFBLOSYeCLG # zfuyvDPju4llivBg2IRFjXY4xBuRAKPhrjWWvZlhCVUqFPvv/Ta6+h2MjVUPRfVb # otqy7evyJHUFYzJbrw72OfufpypKr8B7INsL+7OkKcJepVSeK6BDJX8p7p84S36p # dxhcelX/VzCYh77lgJFzMYmct1axR21Nexy9e35LBMElDAH4M2Wkch8mN0IFsAtI # GhXqxfsYdeL2uvMdbo7OroYFxNfhXCFZjEl/6N+PAqJ7WgZ21fyHdCDo+3edq9YM # 6ewwhfUnABjmlHC8ZE4jn7uiosr9xKfDjKZGOePCFZhqihK5+5hkXeJmqP8RRD0y # 2csbsiaUOwVuhL6alRcRyZVljoq2S7QXgeOc9BuATy+CpJAyc5LbeS3KPK9OXU2M # 97lgP1p2qFgXTIf4ml8Nj1Zuaj+vVdGxvn8DwG7jMXrt7N/gtaxUrWuYFvIQ50I7 # qtabawwm80zPq4RV+OQ/VWznhLsTHjSjMQYQC8oZhUnkReLff+SAxk1s+WuGMJSz # +DSIFL2EfKQNk8QXedr/hp1OdF0Jogy3ubvUnVAw5ceANt4HPtlcWDAOqyvASzhK # y2wD # SIG # End signature block
0
sample_62_96.ps1
#======================================================================================================================================================================= # Copyright (c) Microsoft Corporation. All rights reserved. # # Description: # RemoveMDS.ps1 # Kill all Monitoring processes and clean up trace logs. #======================================================================================================================================================================= param( [Parameter(Mandatory=$true)] [string]$MDSFolder ) function Start-ProcessAndPipeOutput { param ( [string]$commandPath, [string]$commandArguments ) Write-Output ">>>>Executing commmand '$commandPath' with arguments '$commandArguments'" $pinfo = New-Object System.Diagnostics.ProcessStartInfo $pinfo.FileName = $commandPath $pinfo.RedirectStandardError = $true $pinfo.RedirectStandardOutput = $true $pinfo.UseShellExecute = $false $pinfo.Arguments = $commandArguments $p = New-Object System.Diagnostics.Process $p.StartInfo = $pinfo $p.Start() | Out-Null $p.WaitForExit() Write-Output ">>>>Command completed with exit code '$($p.ExitCode)'" Write-Output ">>>>Output stream: " Write-Output "$($p.StandardOutput.ReadToEnd())" Write-Output ">>>>Error stream: " Write-Output "$($p.StandardError.ReadToEnd())" } # Execution of the script begins here: $Error.Clear() $timestamp = Get-Date -UFormat "%Y%m%d-%H%M%S" $transcriptPath = Join-Path $env:TEMP "StorageSyncAgent-RemoveMDS-$timestamp.log" Start-Transcript -Path $transcriptPath try { Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentLauncher.exe /T' Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentHost.exe /T' Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentManager.exe /T' Start-ProcessAndPipeOutput "taskkill.exe" '/F /IM MonAgentCore.exe /T' } catch { Write-Output "Exception occured while attempting to kill Monitoring Agent processes: $_" Write-Output "Ignoring failures while killing Monitoring Agent processes and proceeding with the script" } $Error.Clear() # Stop and Delete Logman trace sessions to cleanup logs. $logmanCleanupScriptBlock = { # Clean up UserMode traces. Write-Output "Stopping session AfsUserModeTraceSession" cmd /c "logman -stop -as AfsUserModeTraceSession" Write-Output "`nDeleting session AfsUserModeTraceSession" cmd /c "logman -delete AfsUserModeTraceSession" # Clean up KernelMode traces. Write-Output "Stopping session AfsKernelModeTraceSession" cmd /c "logman -stop -as AfsKernelModeTraceSession" Write-Output "`nDeleting session AfsKernelModeTraceSession" cmd /c "logman -delete AfsKernelModeTraceSession" } # Starting the cleanup job. $logmanCleanupJob = Start-Job -ScriptBlock $logmanCleanupScriptBlock # Waiting for job execution. Wait-Job -Job $logmanCleanupJob -Timeout 120 # Receiving the job to see script output. Wait-Job does not show output. $logmanCleanupResultJob = Receive-Job $logmanCleanupJob foreach ($output in $logmanCleanupResultJob) { Write-Host $output } $Error.Clear() # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAmhh//P+aR9tqU # GqG65pyqv85kXFfu1CLo0XqKASYgzaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICx/wnN+pbv9QKpdvUDC4Jmg # I77ScrZZjb26BA9xa51EMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAXFnMB0cLclLk1LyXCdjGlXj/rPwu5xbPCGvzEQkuVl+cY+cLV1CvQkzP # xewK5OUVrqnJQtB+vwC39vZL13CmZzuQwFcvemu+8R6dXWOw/EFb9TB5zs/ms1ZR # ybyuJI4EWiinE5wtH3AlxagwAe6FUmOn72306PrCOBNBTvmAyvw+UViT0dDnQMhM # PHTgYFWH0BFirk9YBzQgE6n+F/UVR1Qg48KZrHUqkZU8Cb3t9qcR3o0qRBZMZUdx # nZ4V8z9jsQ3dkE5XbYbhNIT4PzxNXu6JPtuETqRzhASnvUm9aeNY/KTZ41gtX2QB # 9ibSiMdyoDG6UEn7y4nW85kd2uOaKaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCGlFaPPH+CG/PxM6S1ZO2TVYURz4HV2Mzjyd3VWlJn2gIGZkZFOXX0 # GBMyMDI0MDUzMDIwMzMwNy4zOTZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6gM3vzAiGA8yMDI0MDUzMDE3Mzcw # M1oYDzIwMjQwNTMxMTczNzAzWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqAze/ # AgEAMAoCAQACAhh0AgH/MAcCAQACAhPNMAoCBQDqBIk/AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAGywO0l3mmPMOGPKirK/90u8Sd9sSjsS5v3PsaD9v/n3 # qtVyosZTFXV6piGk3UYiKxlExvJxGh4YIwpu4vOBMQ12udpUujXdHmNrA1raHSkb # i/V9qpoC4uQiq49dSyV47t4asB55ygkYHKv1GdehBjPftRMC+9/gvqf+26zBlU6o # c9tRRYbcvQQ0/hlJGWNcIQZNDFGIQ+3XMk6paKmdFCp7jB2iQDSI/9wRBZqo7577 # VVgBsp226GaNkXmNWk2hWYTaDurltUBOgMR3NgEbodZgAsSPuJbdwaRgruVCOUGT # UPqtYRNjk+ikJk6AM0i6eGDXU0wLV59IxTsMc3e5yCIxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB # 8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCClTRseKv8X2LeKOanMvsMQpt7r3CIbePJhZS0PINV5 # AjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUb # HE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgwhjfweKtRtk5WkGdSIuDBVmy # RqU2ROUZMIKky00r8QswDQYJKoZIhvcNAQELBQAEggIAL2aHQ0O1K//uoXv0gLOv # 4HyUce6sRlFO66O2PUoMWEjZtDpn0swf477wsvboWN18j5Q2DkOf0H5K7DNtj3K+ # SQhhPHT+GXdM1MEA3+VbhIozB7Ay8YtgZLUlY13ugAKj7sLja88uZk5lB52AnIOg # mGZw/Qs5ghyzZeCx0ZlOEbyRtxVxUsnJOvCvEUVkX+WHAHV0Yl3JEzX6NS1O/Mzk # 035SJ7cddfmWoa8oLATwM/nx3g+h1e9fUm78qe5qz1rQEYT7aq0Je4OuHbz9Fpik # f+SlpdJNllqFJ7cXWkEn6NyEXSY7yTl66srcuAut4FZCa4Fij8b2HUDsQVzueTjf # 2xXD9awcZDsk8iH+MNdb97Bjv9O6RwlRlZR1UcoFUxNz0KSzxHaMmyqbDZC7BRlc # crQKZJfLaOoM2RFpxwOHVX9PeU35FNjSnFhH5AwPtJlYQ6P73D+vPMY2ZLqoRmjK # LxxtQ2obFCJyqfB/kssci4Hnngpw95SPYYFmqLFq/bizfDRUpCv+jEToP4GFrEco # xx0LWegt5ZxePyRWtH3z3NQo4VCdZGuuhjp6+e4XzyWLqqcB/OY2CzZocBHuOTOI # CkGkgojwIveoryeG8Ix5qeWTNc5I04p6v/71SoIi9pkkWC/ZqbwyP/B0eIPQMIH3 # GV32I9Rv/35Tna6IDRLY2z8= # SIG # End signature block
0
sample_61_74.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # <# Helper functions for PowerShellGet DSC Resources. #> # Import localization helper functions. $helperName = 'PowerShellGet.LocalizationHelper' $resourceModuleRoot = Split-Path -Path (Split-Path -Path $PSScriptRoot -Parent) -Parent $dscResourcesFolderFilePath = Join-Path -Path $resourceModuleRoot -ChildPath "Modules\$helperName\$helperName.psm1" Import-Module -Name $dscResourcesFolderFilePath # Import Localization Strings $script:localizedData = Get-LocalizedData -ResourceName 'PowerShellGet.ResourceHelper' -ScriptRoot $PSScriptRoot <# .SYNOPSIS This is a helper function that extract the parameters from a given table. .PARAMETER FunctionBoundParameters Specifies the hash table containing a set of parameters to be extracted. .PARAMETER ArgumentNames Specifies a list of arguments you want to extract. #> function New-SplatParameterHashTable { [CmdletBinding()] [OutputType([System.Collections.Hashtable])] param ( [Parameter(Mandatory = $true)] [System.Collections.Hashtable] $FunctionBoundParameters, [Parameter(Mandatory = $true)] [System.String[]] $ArgumentNames ) Write-Verbose -Message ($script:localizedData.CallingFunction -f $($MyInvocation.MyCommand)) $returnValue = @{} foreach ($arg in $ArgumentNames) { if ($FunctionBoundParameters.ContainsKey($arg)) { # Found an argument we are looking for, so we add it to return collection. $returnValue.Add($arg, $FunctionBoundParameters[$arg]) } } return $returnValue } <# .SYNOPSIS This is a helper function that validate that a value is correct and used correctly. .PARAMETER Value Specifies the value to be validated. .PARAMETER Type Specifies the type of argument. .PARAMETER Type Specifies the name of the provider. .OUTPUTS None. Throws an error if the test fails. #> function Test-ParameterValue { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Value, [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Type, [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ProviderName ) Write-Verbose -Message ($script:localizedData.CallingFunction -f $($MyInvocation.MyCommand)) switch ($Type) { 'SourceUri' { # Checks whether given URI represents specific scheme # Most common schemes: file, http, https, ftp $scheme = @('http', 'https', 'file', 'ftp') $newUri = $Value -as [System.URI] $returnValue = ($newUri -and $newUri.AbsoluteURI -and ($scheme -icontains $newUri.Scheme)) if ($returnValue -eq $false) { $errorMessage = $script:localizedData.InValidUri -f $Value New-InvalidArgumentException -ArgumentName $Type -Message $errorMessage } } 'DestinationPath' { $returnValue = Test-Path -Path $Value if ($returnValue -eq $false) { $errorMessage = $script:localizedData.PathDoesNotExist -f $Value New-InvalidArgumentException -ArgumentName $Type -Message $errorMessage } } 'PackageSource' { # Value can be either the package source Name or source Uri. # Check if the source is a Uri. $uri = $Value -as [System.URI] if ($uri -and $uri.AbsoluteURI) { # Check if it's a valid Uri. Test-ParameterValue -Value $Value -Type 'SourceUri' -ProviderName $ProviderName } else { # Check if it's a registered package source name. $source = PackageManagement\Get-PackageSource -Name $Value -ProviderName $ProviderName -ErrorVariable ev if ((-not $source) -or $ev) { # We do not need to throw error here as Get-PackageSource does already. Write-Verbose -Message ($script:localizedData.SourceNotFound -f $source) } } } default { $errorMessage = $script:localizedData.UnexpectedArgument -f $Type New-InvalidArgumentException -ArgumentName $Type -Message $errorMessage } } } <# .SYNOPSIS This is a helper function that does the version validation. .PARAMETER RequiredVersion Provides the required version. .PARAMETER MaximumVersion Provides the maximum version. .PARAMETER MinimumVersion Provides the minimum version. #> function Test-VersionParameter { [CmdletBinding()] param ( [Parameter()] [System.String] $RequiredVersion, [Parameter()] [System.String] $MinimumVersion, [Parameter()] [System.String] $MaximumVersion ) Write-Verbose -Message ($localizedData.CallingFunction -f $($MyInvocation.MyCommand)) $isValid = $false # Case 1: No further check required if a user provides either none or one of these: minimumVersion, maximumVersion, and requiredVersion. if ($PSBoundParameters.Count -le 1) { return $true } # Case 2: #If no RequiredVersion is provided. if (-not $PSBoundParameters.ContainsKey('RequiredVersion')) { # If no RequiredVersion, both MinimumVersion and MaximumVersion are provided. Otherwise fall into the Case #1. $isValid = $PSBoundParameters['MinimumVersion'] -le $PSBoundParameters['MaximumVersion'] } # Case 3: RequiredVersion is provided. # In this case MinimumVersion and/or MaximumVersion also are provided. Otherwise fall in to Case #1. # This is an invalid case. When RequiredVersion is provided, others are not allowed. so $isValid is false, which is already set in the init. if ($isValid -eq $false) { $errorMessage = $script:localizedData.VersionError New-InvalidArgumentException ` -ArgumentName 'RequiredVersion, MinimumVersion or MaximumVersion' ` -Message $errorMessage } } <# .SYNOPSIS This is a helper function that retrieves the InstallationPolicy from the given repository. .PARAMETER RepositoryName Provides the repository Name. #> function Get-InstallationPolicy { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $RepositoryName ) Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.MyCommand)) $repositoryObject = PackageManagement\Get-PackageSource -Name $RepositoryName -ErrorAction SilentlyContinue -WarningAction SilentlyContinue if ($repositoryObject) { return $repositoryObject.IsTrusted } } <# .SYNOPSIS This method is used to compare current and desired values for any DSC resource. .PARAMETER CurrentValues This is hash table of the current values that are applied to the resource. .PARAMETER DesiredValues This is a PSBoundParametersDictionary of the desired values for the resource. .PARAMETER ValuesToCheck This is a list of which properties in the desired values list should be checked. If this is empty then all values in DesiredValues are checked. #> function Test-DscParameterState { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Collections.Hashtable] $CurrentValues, [Parameter(Mandatory = $true)] [System.Object] $DesiredValues, [Parameter()] [System.Array] $ValuesToCheck ) $returnValue = $true if (($DesiredValues.GetType().Name -ne 'HashTable') ` -and ($DesiredValues.GetType().Name -ne 'CimInstance') ` -and ($DesiredValues.GetType().Name -ne 'PSBoundParametersDictionary')) { $errorMessage = $script:localizedData.PropertyTypeInvalidForDesiredValues -f $($DesiredValues.GetType().Name) New-InvalidArgumentException -ArgumentName 'DesiredValues' -Message $errorMessage } if (($DesiredValues.GetType().Name -eq 'CimInstance') -and ($null -eq $ValuesToCheck)) { $errorMessage = $script:localizedData.PropertyTypeInvalidForValuesToCheck New-InvalidArgumentException -ArgumentName 'ValuesToCheck' -Message $errorMessage } if (($null -eq $ValuesToCheck) -or ($ValuesToCheck.Count -lt 1)) { $keyList = $DesiredValues.Keys } else { $keyList = $ValuesToCheck } $keyList | ForEach-Object -Process { if (($_ -ne 'Verbose')) { if (($CurrentValues.ContainsKey($_) -eq $false) ` -or ($CurrentValues.$_ -ne $DesiredValues.$_) ` -or (($DesiredValues.GetType().Name -ne 'CimInstance' -and $DesiredValues.ContainsKey($_) -eq $true) -and ($null -ne $DesiredValues.$_ -and $DesiredValues.$_.GetType().IsArray))) { if ($DesiredValues.GetType().Name -eq 'HashTable' -or ` $DesiredValues.GetType().Name -eq 'PSBoundParametersDictionary') { $checkDesiredValue = $DesiredValues.ContainsKey($_) } else { # If DesiredValue is a CimInstance. $checkDesiredValue = $false if (([System.Boolean]($DesiredValues.PSObject.Properties.Name -contains $_)) -eq $true) { if ($null -ne $DesiredValues.$_) { $checkDesiredValue = $true } } } if ($checkDesiredValue) { $desiredType = $DesiredValues.$_.GetType() $fieldName = $_ if ($desiredType.IsArray -eq $true) { if (($CurrentValues.ContainsKey($fieldName) -eq $false) ` -or ($null -eq $CurrentValues.$fieldName)) { Write-Verbose -Message ($script:localizedData.PropertyValidationError -f $fieldName) -Verbose $returnValue = $false } else { $arrayCompare = Compare-Object -ReferenceObject $CurrentValues.$fieldName ` -DifferenceObject $DesiredValues.$fieldName if ($null -ne $arrayCompare) { Write-Verbose -Message ($script:localizedData.PropertiesDoesNotMatch -f $fieldName) -Verbose $arrayCompare | ForEach-Object -Process { Write-Verbose -Message ($script:localizedData.PropertyThatDoesNotMatch -f $_.InputObject, $_.SideIndicator) -Verbose } $returnValue = $false } } } else { switch ($desiredType.Name) { 'String' { if (-not [System.String]::IsNullOrEmpty($CurrentValues.$fieldName) -or ` -not [System.String]::IsNullOrEmpty($DesiredValues.$fieldName)) { Write-Verbose -Message ($script:localizedData.ValueOfTypeDoesNotMatch ` -f $desiredType.Name, $fieldName, $($CurrentValues.$fieldName), $($DesiredValues.$fieldName)) -Verbose $returnValue = $false } } 'Int32' { if (-not ($DesiredValues.$fieldName -eq 0) -or ` -not ($null -eq $CurrentValues.$fieldName)) { Write-Verbose -Message ($script:localizedData.ValueOfTypeDoesNotMatch ` -f $desiredType.Name, $fieldName, $($CurrentValues.$fieldName), $($DesiredValues.$fieldName)) -Verbose $returnValue = $false } } { $_ -eq 'Int16' -or $_ -eq 'UInt16'} { if (-not ($DesiredValues.$fieldName -eq 0) -or ` -not ($null -eq $CurrentValues.$fieldName)) { Write-Verbose -Message ($script:localizedData.ValueOfTypeDoesNotMatch ` -f $desiredType.Name, $fieldName, $($CurrentValues.$fieldName), $($DesiredValues.$fieldName)) -Verbose $returnValue = $false } } default { Write-Warning -Message ($script:localizedData.UnableToCompareProperty ` -f $fieldName, $desiredType.Name) $returnValue = $false } } } } } } } return $returnValue } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBH3QB1YDOZOOwJ # V+KQVBF6PeRCZ7EOOlwmL67tD15ypKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAHIT/wnKGNiQI7rfR8tyAuu # f0X+u3muum8RSaLE3J9BMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAcStCpz6/vdvZjcCeOwsHadLP22s0wGQJYayxph1c4DNhq0cF9Aw5/kto # im4FLT6/lyrNFZHkngPgaGpq5q5f0A92JCH1IISWb1cGRNgncEep32tfRlZP+UqW # J9K0YjedUAuLa09Fsq53WCDIrDO2loCxfoSH2Fxe2MMBScJgHGsktwZEzHl8TZDG # I1koyZMK72rgEoFZU/frPxaic1vgl/rio7h/ZdnvvPqrh6DhWXXR/yBqLz+7Dtcx # xbp2s7dT0rNi3iOHr6boim4vIzLaX+woGrPbaOxE5CjXZxN6FCMeF7aEWzGSOIds # A3F/vIW4TGgmjnD6udWJZqCUnamEIKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCYFwRQ9tc4EnatqhCx8tKi1TC9TDoJNXwByFlmbIVaLwIGZmrahRst # GBMyMDI0MDYxNzIyMTQzMi4zMDNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hqeqzAiGA8yMDI0MDYxNzExMzgx # OVoYDzIwMjQwNjE4MTEzODE5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqGp6r # AgEAMAcCAQACAiweMAcCAQACAhO+MAoCBQDqG/ArAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAISRvNqw1CNUiHlrO7b4jmGWKOI/Fv18atWYlDtq9b6I50M+ # tkIMqnn/CxhFgduYp4PN8WEKY9E8CVOX5IE8zdIU6bJRvBa7ZYatjNoHsAfhb2/9 # 5wKNY7RJAoPtNu2ExEtulgn4JUItbmmhekkf0t0FYlVUVAXOTsNBGow84A8VzHmy # GLdV3f7zWXN0tiT8XD/0n1EKJoF7APRHDNlATOKC7E0oejEsisv/mZVlqjM7cXJ4 # OTlwceGoKBMuBYmIuiF2CTQw3o2E6EipDGc3Ls+LODeHneRVno5sAJuYPxfa5BnR # 9qG4A42SuXLZHo9Jz4R80zLSgLhwE42h9z/77iUxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAYoN6Dw24/xGjajseITnrH843zz1KJ+4VUvx7rlM8n8jCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo # rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQg5e3brfAwS6VRhzVt8SOQ9jdHxPw/ # NEO1jwy80/C1LH4wDQYJKoZIhvcNAQELBQAEggIAcSr/Nve2QdlOb7GRfrMZqtHX # V3kSC0dtDJo0oMpBWkgOBDLaTTQYArNXe6PD65fAYDvoc58waoTUn95Wlf7VVZ0Y # A4In9rxiFb+SGyYSTZ9slVi5+MtG43XVrOU3FkIzEhBMlzdiCWIHx+XcfVQhhVV5 # RavvbLrEF8OI8V0SgWK2h6zsKr87/ZNi799ZQgnes1j02AjVTPJy6+bGOAE8tCfd # 9RcWkhJTqHBJ55eXqxvfX0u9LxYJq7yL20zkVFZOmCN1hUB8rIc5386F8bZG72Aj # xhhKgxi+4JeMaEVRDTLBUgDFyzEuZbXiTxPsURGklfFyu3x9ECKtumEn4XEhX18k # 3a00Au/OEK6wqrI3G3PQD+pdYs0lrAgV8+FFFjjLvM0tn+dMwEoJ4X77NsQJCK6u # aV8n8j2HOYU9SDSQI8fa91JX+dmtK+SkPzQuMh9z85VjBE2hB6Er58pS+82BLPC8 # cOnhrAyFprgnwG1+gjZ6J2MMg42LT00ex3BQ16U55lD3gzOgmham8u5lKDVjp5Z5 # 3EjFikCF8bss301xQ0TdgZ4e47Ut8Vpmb2FYkzSxucJA/+ba5cLAsPJZOYSFL+Sy # vaCPWdx2TCTH6Zyd8oOubP0MX3NAVu70tRp/1Fouq7fcjcnVASjqmThKMyLuS3F0 # 3DcQjHWYtDwUst0g+ew= # SIG # End signature block
0
254.ps1
function Remove-StringDiacritic { [CMdletBinding()] PARAM ( [ValidateNotNullOrEmpty()] [Alias('Text')] [System.String[]]$String, [System.Text.NormalizationForm]$NormalizationForm = "FormD" ) FOREACH ($StringValue in $String) { Write-Verbose -Message "$StringValue" try { $Normalized = $StringValue.Normalize($NormalizationForm) $NewString = New-Object -TypeName System.Text.StringBuilder $normalized.ToCharArray() | ForEach-Object -Process { if ([Globalization.CharUnicodeInfo]::GetUnicodeCategory($psitem) -ne [Globalization.UnicodeCategory]::NonSpacingMark) { [void]$NewString.Append($psitem) } } Write-Output $($NewString -as [string]) } Catch { Write-Error -Message $Error[0].Exception.Message } } }
0
Get-ChildItemRecurse_2.ps1
function Get-ChildItemRecurse { <# .Synopsis Does a recursive search through a PSDrive up to n levels. .Description Does a recursive directory search, allowing the user to specify the number of levels to search. .Parameter path The starting path. .Parameter fileglob (optional) the search string for matching files .Parameter levels The numer of levels to recurse. .Example # Get up to three levels of files PS> Get-ChildItemRecurse *.* -levels 3 .Notes NAME: Get-ChildItemRecurse AUTHOR: tojo2000 #Requires -Version 2.0 #> Param([Parameter(Mandatory = $true, ValueFromPipeLine = $false, Position = 0)] [string]$path = '.', [Parameter(Mandatory = $false, Position = 1, ValueFromPipeLine = $false)] [string]$fileglob = '*.*', [Parameter(Mandatory = $false, Position = 2, ValueFromPipeLine = $false)] [int]$levels = 0) if (-not (Test-Path $path)) { Write-Error "$path is an invalid path." return $false } $files = @(Get-ChildItem $path) foreach ($file in $files) { if ($file -like $fileglob) { Write-Output $file } @@ #if ($file.GetType().FullName -eq 'System.IO.DirectoryInfo') { if ($file.PSIsContainer) { if ($levels -gt 0) { Get-ChildItemRecurse -path $file.FullName ` -fileglob $fileglob ` -levels ($levels - 1) } } } }
0
240.ps1
function Get-SCSMObjectPrefix { [OutputType([psobject])] param ( [ValidateSet( 'DependentActivity', 'ManualActivity', 'ParallelActivity', 'ReviewActivity', 'RunbookAutomationActivity', 'SequentialActivity', 'IncidentRequest', 'ServiceRequest', 'Change', 'Knowledge', 'Problem', 'Release' )] [string]$ClassName ) BEGIN { Import-Module -Name Smlets $ActivitySettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ActivitySettings") $ChangeSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ChangeSettings") $KnowledgedSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.KnowledgeSettings") $ProblemSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ProblemSettings") $ReleaseSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ReleaseSettings") $ServiceRequestSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.GlobalSetting.ServiceRequestSettings") $IncidentRequestSettingsObj = Get-SCSMObject -Class (Get-SCSMClass -Name "System.WorkItem.Incident.GeneralSetting") } PROCESS { Switch ($ClassName) { "DependentActivity" { $ActivitySettingsObj.SystemWorkItemActivityDependentActivityIdPrefix } "ManualActivity" { $ActivitySettingsObj.SystemWorkItemActivityManualActivityIdPrefix } "ParallelActivity" { $ActivitySettingsObj.SystemWorkItemActivityParallelActivityIdPrefix } "ReviewActivity" { $ActivitySettingsObj.SystemWorkItemActivityReviewActivityIdPrefix } "RunbookAutomationActivity" { $ActivitySettingsObj.MicrosoftSystemCenterOrchestratorRunbookAutomationActivityBaseIdPrefix } "SequentialActivity" { $ActivitySettingsObj.SystemWorkItemActivitySequentialActivityIdPrefix } "IncidentRequest" { $IncidentRequestSettingsObj.PrefixForId } "ServiceRequest" { $ServiceRequestSettingsObj.ServiceRequestPrefix } "Change" { $ChangeSettingsObj.SystemWorkItemChangeRequestIdPrefix } "Knowledge" { $KnowledgedSettingsObj.SystemKnowledgeArticleIdPrefix } "Problem" { $ProblemSettingsObj.ProblemIdPrefix } "Release" { $ReleaseSettingsObj.SystemWorkItemReleaseRecordIdPrefix } default { [pscustomobject][ordered]@{ "DependentActivity" = $ActivitySettingsObj.SystemWorkItemActivityDependentActivityIdPrefix "ManualActivity" = $ActivitySettingsObj.SystemWorkItemActivityManualActivityIdPrefix "ParallelActivity" = $ActivitySettingsObj.SystemWorkItemActivityParallelActivityIdPrefix "ReviewActivity" = $ActivitySettingsObj.SystemWorkItemActivityReviewActivityIdPrefix "RunbookAutomationActivity" = $ActivitySettingsObj.MicrosoftSystemCenterOrchestratorRunbookAutomationActivityBaseIdPrefix "SequentialActivity" = $ActivitySettingsObj.SystemWorkItemActivitySequentialActivityIdPrefix "IncidentRequest" = $IncidentRequestSettingsObj.PrefixForId "ServiceRequest" = $ServiceRequestSettingsObj.ServiceRequestPrefix "Change" = $ChangeSettingsObj.SystemWorkItemChangeRequestIdPrefix "Knowledge" = $KnowledgedSettingsObj.SystemKnowledgeArticleIdPrefix "Problem" = $ProblemSettingsObj.ProblemIdPrefix "Release" = $ReleaseSettingsObj.SystemWorkItemReleaseRecordIdPrefix } } } } }
0
2437.ps1
[CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidatePattern('^\w+\.\w+\.\w+$')] [string]$Name, [Parameter()] [switch]$NetBiosFallback, [Parameter()] [ValidateNotNullOrEmpty()] [ValidateRange(1, [int]::MaxValue)] [int]$Timeout = 60, [Parameter()] [ValidateNotNullOrEmpty()] [string]$Server ) begin { $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop Clear-DnsClientCache } process { try { $resolveParams = @{ Name = $Name ErrorAction = 'SilentlyContinue' } if ($NetBiosFallback.IsPresent) { $resolveParams.NetBiosFallback = $true } else { $resolveParams.DnsOnly = $true } if ($PSBoundParameters.ContainsKey('Server')) { $resolveParams.Server = $Server } $timer = [Diagnostics.Stopwatch]::StartNew() while (-not (Resolve-DnsName @resolveParams)) { if ($timer.Elapsed.TotalSeconds -ge $Timeout) { throw "Timeout exceeded. Giving up on DNS record availability for [$($Name)]" } Start-Sleep -Seconds 10 } } catch { throw $_ } finally { $timer.Stop() } }
0
Remove diacritics_1.ps1
### Grťgory Schiro, 2009 ### <summary> ### Removes diacritics from string. ### </summary> ### <param name="String">String containing diacritics</param> function Remove-Diacritics([string]$String) { $objD = $String.Normalize([Text.NormalizationForm]::FormD) $sb = New-Object Text.StringBuilder for ($i = 0; $i -lt $objD.Length; $i++) { $c = [Globalization.CharUnicodeInfo]::GetUnicodeCategory($objD[$i]) if($c -ne [Globalization.UnicodeCategory]::NonSpacingMark) { [void]$sb.Append($objD[$i]) } } return("$sb".Normalize([Text.NormalizationForm]::FormC)) }
0
Add -__ Get-Help -Full_1.ps1
$executionContext.SessionState.InvokeCommand.PostCommandLookupAction = { param($CommandName, $CommandLookupEventArgs) # Only for interactive commands (and that doesn't include "prompt") # I should exclude out-default so we don't handle it on every pipeline, but ... if($CommandLookupEventArgs.CommandOrigin -eq "Runspace" -and $CommandName -ne "prompt" ) { ## Create a new script block that checks for the "-??" argument ## And if -?? exists, calls Get-Help -Full instead ## Otherwise calls the expected command $CommandLookupEventArgs.CommandScriptBlock = { if($Args.Length -eq 1 -and $Args[0] -eq "-??") { Get-Help $CommandName -Full } else { & $CommandName @args } ## Wrap it in a closure because we need $CommandName }.GetNewClosure() } } $executionContext.SessionState.InvokeCommand.PreCommandLookupAction = { param($CommandName, $CommandLookupEventArgs) if($CommandName.StartsWith("?")) { $RealCommandName = $CommandName.TrimStart("?") $CommandLookupEventArgs.CommandScriptBlock = { Get-Help $RealCommandName -Full ## Wrap it in a closure because we need $CommandName }.GetNewClosure() } }
0
1800.ps1
Describe "Pop-Location" -Tags "CI" { $startDirectory = $(Get-Location).Path BeforeEach { Set-Location $startDirectory } It "Should be able to be called without error" { { Pop-Location } | Should -Not -Throw } It "Should not take a parameter" { { Pop-Location .. } | Should -Throw } It "Should be able pop multiple times" { Push-Location .. Push-Location .. Push-Location .. Pop-Location Pop-Location Pop-Location $(Get-Location).Path | Should -Be $startDirectory } Set-Location $startDirectory }
0
sample_29_92.ps1
# # Module manifest for module 'OCI.PSModules.Identitydataplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Identitydataplane.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0db2e619-5a8a-4c35-906a-750fbc5977b8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Identitydataplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydataplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'New-OCIIdentitydataplaneScopedAccessToken', 'New-OCIIdentitydataplaneUserSecurityToken' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydataplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
sample_37_43.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module $PSScriptRoot\..\..\Common\Tracer.psm1 # Function to block the current thread until the current WaitHandle receives a signal. function WaitOne { [CmdletBinding()] Param( [Parameter(Mandatory=$true)] [System.Threading.Mutex] $Mutex, [Parameter(Mandatory=$true)] [int] $WaitTimeMinutes, [Parameter(Mandatory=$true)] [Guid] $OperationGuid, [Parameter(Mandatory=$true)] [string] $OperationDetail ) Trace-Execution "Waiting for mutex lock with operation ID: $($OperationGuid) for $($WaitTimeMinutes) minutes." Trace-Execution "$($OperationGuid) operation detail: $($OperationDetail)." $result = $Mutex.WaitOne($WaitTimeMinutes * 60 * 1000) Trace-Execution "Acquired mutex lock for operation ID: $($OperationGuid)." return $result } # Function to release the Mutex once. function ReleaseMutex { [CmdletBinding()] Param( [Parameter(Mandatory=$true)] [System.Threading.Mutex] $Mutex, [Parameter(Mandatory=$true)] [Guid] $OperationGuid ) Trace-Execution "Attempting to release mutex lock with operation ID: $($OperationGuid)." $Mutex.ReleaseMutex() Trace-Execution "Released mutex lock with operation ID: $($OperationGuid)." } Export-ModuleMember -Function WaitOne Export-ModuleMember -Function ReleaseMutex # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDL0RPOADtvSYix # yrDwHQvH3mG6Iqy955teyXEhp5FzVKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEID+3f8n41u8SoC7BaD+rRZds # JQfV0UQz0qZdUQnlOMNhMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAyVEkG/+/MQxxL1rlnDg+L8STODTmlmXyMqQ3O7RpW3/GxslgEtdq3Rr1 # G3q+Q1Sny76IQ1hZ3e3k/URfqADPo67ciyLLKUl39hHSLMNrATKnn93oyzOxrCq8 # jmXE9yF4B6S03UUmtDyzGFWmR5GGDzcqGt3z3g4ynV1eOb4uMYD6g/aC9dQqJClj # b7SD5ygyB05AiFysBbBRAIZTXHacHDEn7L/bdbbSJ3HjhgRiTVhIDxhjqLJRF4G1 # F+bA6Ek74zA3OaTRHLZQ9CN5cjhsykY8ZylSJ5ck09OZ0A08vuH37ecPzMmqP8Yf # ytzumSiIoNj9kFJMx+MCQgDrCfhoWqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCGjqF/qfFkEkxtetkUXWYEjCkxZv/9TgeDzZ+J4T0ElAIGZbqjMwjM # GBMyMDI0MDIxMjE0MDU0MC43MTlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0SLowIhgPMjAyNDAyMTIxNTM1MjJaGA8yMDI0MDIxMzE1MzUyMlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRIugIBADAHAgEAAgIMLTAHAgEAAgIT3zAKAgUA # 6XWaOgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJ4/sip+/qc1E5gdImJu # jnRmqzGk04ZAlwN+eEO5ngxK/thUYULTdSxS+evVNLBNrvTausIyrC455QI209Vi # y9VcMCYz5JMqq4O101HIfzBGX/WVsCS6sqAISzHRf/1uGkbaBAp9bfyOR7hjM6mD # NnjSS1kYcQuu8CzPUcWIgr39MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgzFsteLkvYww8hEZtofY7Rd2z/qOUasQthfd391d452UwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIE3+00phcYLWcmQs1jDY/ypqiHL25D9igsNlQ7ZB44/A # MA0GCSqGSIb3DQEBCwUABIICAAAxpN7xu/CzIl1Ea84Izu5uFBEXmkZ8fM5UDJLA # P3AWvlk6UATIda6ETNChaUZJWsZwJcjtfRmbfwc3+0+VyUxe8r92xtLwpSNK7NZt # cuKB4LFadjYbG661hmv9jzXiiw2FZz2P3da9DMTHUjB4Cy0d+afJGONB3RCxWUoH # mrEyU+hnqYnFJ26dzqnTnZGjYHfFRluyIQ2e+ErezaI/QWqoqZduCPhKz207RzTD # /WY2MKOrR11TsQX/iUz9TiU28jrG6AzpLxX3Qv8WPSK82o3Eme1qD/AwLyRow84j # 2Wj6GeTbHxij+/zdkOVNTerCYNxZJOsM+g//0cg+VYdDVi2yJ4ENnTKnSt2nFp2s # kxylTDLh30xW2Tkp1Up0pjjMZRxGkH7o8twfLa8boHuvVJRZFNOGrkiOO34kY0mv # uQI26PKkLelrXlp0uNL3beQdNq0zFZ8gA90xpbIM3LeFMIy4WUHYPl9bOckZm2v8 # M2acK/pvBBAgba7JrpBarFMljtN1i3o8VdiiQlhJIK+uURcy8aIeiCH7aH6MmZov # 7+Pw1fBKOr9uaOp0tLYNr7hV5E3eoEAhPsMKzfmbAAwJX9rS2ACZa2yhccChqZiJ # 1FatkcEgDckkAtvrlRZQ8mFmbqzChL5PJeYcfgYwN0UOpXqxSA4ODWAkOjz5tMlg # ukoO # SIG # End signature block
0
sample_4_1.ps1
ConvertFrom-StringData @' id_ctsdnsserver=DNS Server id_ctsdnsserverdescription=Collects information about DNS Server. '@ # SIG # Begin signature block # MIIoOAYJKoZIhvcNAQcCoIIoKTCCKCUCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAb4em4H6TB2GAl # jt2DkYFQ75brhfcniMgwM+NQhKOgbKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMoN # mMpY7NtKnMXCvSmob2yR+z6uvefx8k63ki9FoEkjMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAFJWiV+wdCOhLWCc7yTmA6j+gMUB8eWEEIRjw # WthuQWpF0qmi4RCctDMs96fzRraSPnBN0sYNCYHul9xI3u3SoF1XPIagYnh3vaN1 # Odm2Zc+hpsv78i7EHraS1UZ6pfcX7rnyNBWTnK7tvdevJKiq8DXrfS+YVNEYSFsH # y15ChfowM8pxry259gmT/+BgLNAg4K41WnUIZM5tRgR6MMQYyhKSXtiCB4iWuFbN # 8EWZ3t3grFgXgZ73CdJdD+WY7QBqRM8adrMKTaPabNJZa0XyTR5zshvF59w9nmD/ # twgz1ZkLJgsm2YywlXuAI2xhT4BR2dvSmSt7ONtHCm3kN6uv+6GCF5MwghePBgor # BgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDuuq9C/Ka5wx9XLlpsc3xMILZknXX4mlUU # ICl2W30OyAIGZxqGn6xKGBIyMDI0MTAyODExNDA0My4yOVowBIACAfSggdGkgc4w # gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT # HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg # VFNTIEVTTjo4OTAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCEeowggcgMIIFCKADAgECAhMzAAAB7eFfy9X3pV1zAAEA # AAHtMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTIzMTIwNjE4NDU0MVoXDTI1MDMwNTE4NDU0MVowgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4OTAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKgwwmySuupqnJwvE8LUfvMP # uDzw2lsRpDpKNxMhFvMJXJhA2zPxNovWmoVMQA8vVfuiMvj8RoRb5SM2pmz9rIzJ # bhgikU9k/bHgUExUJ12x4XaL5owyMMeLQtxNBnEzazeYUysJkBZJ8thdgMiKYUHP # yPSgtYbLdWAuYFMozjEuq/sNlTPwHZKgCZsS2nraeBKXSE6g3vdIXAT5jbhK8ZAx # aHKSkb69cPByla/AN75OCestHsBNEVc3klLbp2bbLLpJgUxFicwTd0wcJD9RAhBA # 0LycuYi90qQChYQxe0mwYSjdCszZLZIG/g+kdHNG6TNO0/5QBx4bEz0nKvBRA/k4 # ISZbphyETJENLA/iFT1/sHQDKHXg/D28mjuN7A2N4w8iSad7ItKLSu6/ajH/FEa1 # wn3IE0LkFpGS2PPuy09qiNH48MDZ+4G0KjzEqWS3neZRvsBj4JkceqEubvql0wXo # Ee/ZO/CVUF5BE3bZeNpVVHAKCOAmc17C3s96NyulSfSocuAur7UE3UPNi6RaROvv # BPTOXSJev422pSRZI6dZF97w3bW0Hq6/dWRbycV0KG1ttlnPbil4u0kRm42s3xd/ # 09M8zNlcMkEjURyJH/3VBwahkWZVsVVvatQgCzTX5mR7C9uGYZUN59f2hkbj8riA # ZSxO9Nb6vUlkzFRPYzCpAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUzhvw7PfeECoE # R8qUBl/Q0qHgIhkwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAJ3WArZF354YvR4e # L6ITr+oNjyxtuw7h6Zqdynoo837GrlkBq2IFHiOZFGGb71WKTQWjQMtaL83bxsUj # t1djDT2ne8KKluPLgSiJ+bQ253v/hTfSL37tG9btc5DevHfv5Tu+r2WTrJikYI2n # SOUnXzz8K5E+Comd+rkR15p8fYCgbjqEpZN4HsO5dqwa3qykk56cZ51Kt7fgxZmp # 5MhDSto4i1mcW4YPLj7GgPWpHPZBb67aAIdobwBCOFhQzi5OL23qS22Ppztdqavb # Ota5x4OHPuwou20tMnvCzlisDYjxxOVswB/YpbQZWMptgZ34tkZ24Qrv/t+zgZSQ # ypznUWw10bWf7OBzvMe7agYZ4IGDizxlHRkXLHuOyCb2xIUIpDkKxsC+Wv/rQ12T # lN4xHwmzaQ1SJy7YKpnTfzfdOy9OCTuIPUouB9LXocS+M3qbhUokqCMns4knNpu1 # LglCBScmshl/KiyTgPXytmeL2lTA3TdaBOZ3XRZPCJk67iDxSfqIpw8xj+IWpO7i # e2TMVTEEGlsUbqTUIg1maiKsRaYK0beXJnYh12aO0h59OQi8ZZvgnHPPuXab8TaQ # Y6LEMkexqFlWbCyg2+HLmS7+KdT751cfPD6GW+pNIVPz2sgVWFyaxY8Mk81FJKky # GgnfdXZlr+WQpxuRQzRJtCBL2qx3MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCA00wggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj # YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUw # LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB # ATAHBgUrDgMCGgMVAO4drIpMJpixjEmH6hZPHq5U8XD5oIGDMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqyaIgMCIY # DzIwMjQxMDI4MDUzOTQ0WhgPMjAyNDEwMjkwNTM5NDRaMHQwOgYKKwYBBAGEWQoE # ATEsMCowCgIFAOrJoiACAQAwBwIBAAICKSYwBwIBAAICE10wCgIFAOrK86ACAQAw # NgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgC # AQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAWZyR1R6J9m3wGmtnfPG/x6j9bWB4 # O9MKD4B8GCw/l65tXilbx4BpVA+PONWx5cSO0sSuClx6xYiBa3CNMF0Y9WEJq0Hc # 1F+D9rBslJru1mbiwPJx2+Gh5gFncGqzC+RhTGGEpRsCdlhiJuD4fpicauiDdQXg # bQp0Kd22gs4tl+oU+QsPMam4QHDC4R8OPGAvPYZ9E/SN5Ic4DR3Z/kKfBjdOKPbH # 9OGyX/5y9tnhr8SpvykPxusVR3EWU4dtbdQxMu/Pzrcl2ANquZ2/LP/PnHWoixbA # oeXJ0epsYXqt5vT3P10R1Q2iTi2MYdlbk7+453tjfjShZ1LORLTXY2fPxTGCBA0w # ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7eFf # y9X3pV1zAAEAAAHtMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYL # KoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIARN2tieqSr8S0pKn1+la/YHoVfl # S2d38C2PYABE6P9MMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgjS4NaDQI # Wx4rErcDXqXXCsjCuxIOtdnrFJ/QXjFsyjkwgZgwgYCkfjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TAiBCAkfCYc1vRr # zvunOz0YYGGigBZtYTGaXWjj3ywNb8GDnDANBgkqhkiG9w0BAQsFAASCAgBD0m6o # z6tlHhNeztJX0d8rJ+c4TVLo7toX3W/W6Q8W/Rk5/IVu0NE8q+RStYDYfi00QYb5 # x+spu5/9TbpqbC8GmZcnn2F1LRAw1MZ5/2zMPqZlGV4Ml8BPGj9z/YqZF4pZ24+j # 8bm6YP50s6T3LB75jyYh19pX/19qWc+odmM0J9VgybxhVYIvAoFkbCasxVHmhPNd # iEu5CP0erSc0oQIVG0Iae3cLDLMahh++5HEUlItA2/Z9L8yBzlU8/P64LCgeoZTA # ao1a0cQK8b7YEZ4pEZ0Iwznazn48lG5yKpglZkYx9hmZQz4Zfq++DnnxfLfBzQd0 # RsAzy7A1t1AJLOpgJfABTwFeWB7QsCsKRnQ4PcN52YZ80cHj3BvmJqNMUtHHCG+Y # lwlj+e078xNZGL6lrY9u8TSMT1MRSAOjRbA1uG4ockTc6WgTf1v/q0j/uMkpKE2W # geshDVOw1Sm8AC688Lt9mJ0BqF5oFXWaJjrODDUtp7ZQyJVZxNhHwsC8lee2sMsl # Y/GKvPuajOqo1FJYUPHkJNrKK6pO3zJI+pcSpTXoLVn7KKNhVYf+b34cNKhOnCzf # xXoHfVI5mK2nHDI+8tCw/Q5ahyQS2wWx8thEfkBixHDJ/NXJMpwkGrZi3m68TRVa # Nb6lHZ/RT5NJuWbof34iNwAwJE8rxx0j+xwjuA== # SIG # End signature block
0
109.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"   $redirectUri = "urn:ietf:wg:oauth:2.0:oob"   $resourceAppIdURI = "https://graph.microsoft.com"   $authority = "https://login.microsoftonline.com/$Tenant"   try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-CorporateDeviceIdentifiers(){ [cmdletbinding()] $graphApiVersion = "beta" $Resource = "deviceManagement/importedDeviceIdentities" try { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).value } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $ExportPath = Read-Host -Prompt "Please specify a path to export Corporate Device Identifiers to e.g. C:\IntuneOutput" if(!(Test-Path "$ExportPath")){ Write-Host Write-Host "Path '$ExportPath' doesn't exist, do you want to create this directory? Y or N?" -ForegroundColor Yellow $Confirm = read-host if($Confirm -eq "y" -or $Confirm -eq "Y"){ new-item -ItemType Directory -Path "$ExportPath" | Out-Null Write-Host } else { Write-Host "Creation of directory path was cancelled..." -ForegroundColor Red Write-Host break } } Write-Host $FileName_CSV = "CorpDeviceIdentifiers" + "_" + $(get-date -f dd-MM-yyyy-H-mm-ss) + ".csv" $CDI = Get-CorporateDeviceIdentifiers if($CDI){ foreach($CD in $CDI){ $IDI = $CD.importedDeviceIdentifier $Desc = $CD.description Write-Host "Adding '$IDI,$Desc' to '$FileName_CSV'..." -ForegroundColor Gray Add-Content -Value "$IDI,$Desc" -Path "$ExportPath\$FileName_CSV" } } else { Write-Host "No Corporate Device Identifiers found..." -ForegroundColor Red } Write-Host
0
sample_8_24.ps1
ConvertFrom-StringData @' id_printdevmodes2countcheck_st=There are several printers listed under HKU\\.DEFAULT\\Printers\\DevModes2 '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCpI8RSzDRSa3og # oOHqv3EUpkgdAs7DOLRiMKuRSauNPaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBvzkn/mWb7NZka6R6QjyDhf # kuGygMVR4ww5fcCrcGVjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAfmrQqzBflX6KJ3w9F2ao160vtAMuwWy4vJnEYPrFrkrc1QLPnNshav7 # JfgrmWI+3JccoWQnXQLvrNRb9KQ9hpbDl0XAxqxdHnmI3PWd3mlBeGhkA03SiFBL # JQTpnKZVEnVy7bXGk4PWrRKzGrz69ITJaCeJSLLHto1bTFS3753nR/K97yyEFQ6X # aqPSOYCb68M2C70VT11SXPdtVTILW13fK0MQ/mJmrFMQG3GYAt9ktEO7AoTI2ce3 # vI9KP10KXGTjvKmQWacoVr/1GAmxsBgdkRMmUOmVY1HlhsE9aFRQSylRROC2Dw37 # 53qqOK+X3QtfmeWUawjAF277Adey9KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDqQI7/L1xT+Tsqr8yk71fdOMxyqKD478wnHHQuMt99pQIGZxqGn6wm # GBMyMDI0MTAyODExNDA0MC44NjZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz # CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd # seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x # Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+ # TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ # sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9 # f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP # aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja # VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn # WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9 # 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw # qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema # ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo # ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5 # EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+ # xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7 # ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH # u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ # 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1 # 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN # ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh # y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0 # SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu # HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smiIDAiGA8yMDI0MTAyODA1Mzk0 # NFoYDzIwMjQxMDI5MDUzOTQ0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyaIg # AgEAMAcCAQACAikmMAcCAQACAhNdMAoCBQDqyvOgAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAFmckdUeifZt8BprZ3zxv8eo/W1geDvTCg+AfBgsP5eubV4p # W8eAaVQPjzjVseXEjtLErgpcesWIgWtwjTBdGPVhCatB3NRfg/awbJSa7tZm4sDy # cdvhoeYBZ3BqswvkYUxhhKUbAnZYYibg+H6YnGrog3UF4G0KdCndtoLOLZfqFPkL # DzGpuEBwwuEfDjxgLz2GfRP0jeSHOA0d2f5CnwY3Tij2x/Thsl/+cvbZ4a/Eqb8p # D8brFUdxFlOHbW3UMTLvz863JdgDarmdvyz/z5x1qIsWwKHlydHqbGF6reb09z9d # EdUNok4tjGHZW5O/uOd7Y340oWdSzkS012Nnz8UxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDvo1LcPMb5inEBegCn/gK0tK1iB0rfu9qFU5yPQsrJIDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsS # DrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgJHwmHNb0a877pzs9GGBhooAWbWEx # ml1o498sDW/Bg5wwDQYJKoZIhvcNAQELBQAEggIAJg9OkdHH68x3LTzWcIl8FoEE # d2R+KRnvJDpUlQDyTz/ye2inTNMXS20JILJTpx0wNEcU8+GYTvmQYw9oEORRbpBa # Iv08BYoMvSCifwZGLa8xHi/5aGGQtJZTqaiMvnRZHjCdjOLVRxvuSDehj18gcp6O # YydLNInnr8MISWAQn3w6ZHLcRV/aJsWcl8RFyB2rcyl3VqRppky8KNoXQtkFrM4m # xLE6S5qHRUWNHu/qY45TSn4YGu0k5brIWiaKTGGy3uKwGqabYlC9gsD+5zoUgg1i # jxGo5tkNduxxnWXWWdVzO9lYy90+ECMKnSv5XVIf0+OqAqoeFKUgzAImex26N94K # HaWX0xT/JJGSnFojOrQdJGqXRqjBuW0kN7VQOodRbw0bvw/fE5Nt36jdyq/FpTl/ # sxOLP45I0+L/gdtWG8uUqqKxU7uZQL/45rNXGbbLl5FXhoVFQsM3SNyansAo5REX # fWzwPk5C5Vu7pq9lcRjPIiHw5YgVw20VkXP69/P3pLnsVW+M64vGaf1Df9CJGU3V # 8U5kNGIEEahWx6JR23xJxcYiTdqixAVcZz6p9y4E+zsg7ZMs6LGIF/49fSuQKGlK # fKjAQ77k6eEfi9bTNcwBiX38DxV2M8z3JcJRYIWfVcwGCFmm5U+bSpQ+4FUhyny9 # c/d965vjC9D0JkzLUCY= # SIG # End signature block
0
chkhash_11.ps1
# calculate SHA512 of file. function Get-SHA512([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.SHA512CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } function noequal ( $first, $second) { foreach($s in $second) { if ($first -eq $s) {return $false} } return $true } # chkhash.ps1 [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #3] [-u] [-h [path of .xml database]] # -u updates the XML file database and exits # otherwise, all files are checked against the XML file database. # -h specifies location of xml hash database $hashespath=".\\hashes.xml" del variable:\\args3 -ea 0 del variable:\\args2 -ea 0 del variable:\\xfiles -ea 0 del variable:\\files -ea 0 del variable:\\exclude -ea 0 $args3=@() $args2=$args $nu = 0 $errs = 0 $fc = 0 $fm = 0 $upd = $false $create = $false for($i=0;$i -lt $args2.count; $i++) { if ($args2[$i] -like "-h*") # -help specified? { "Usage: .\\chkhash.ps1 [-h] [-u] [-c] [-x <file path of hashes .xml database>] [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #n] [-e <Dirs>]" "Options: -h - Help display." " -c - Create hash database. If .xml hash database does not exist, -c will be assumed." " -u - Update changed files and add new files to existing database." " -x - specifies .xml database file path to use. Default is .\\hashes.xml" " -e - exclude dirs. Put this after the files/dirs you want to check with SHA512 and needs to be fullpath (e.g. c:\\users\\bob not ..\\bob)." "" "Examples: PS>.\\chkhash.ps1 c:\\ d:\\ -c -x c:\\users\\bob\\hashes\\hashes.xml" " PS>.\\chkhash.ps1 c:\\users\\alice\\pictures\\sunset.jpg -u -x c:\\users\\alice\\hashes\\pictureshashes.xml" " PS>.\\chkhash.ps1 c:\\users\\eve\\documents d:\\media\\movies -x c:\\users\\eve\\hashes\\private.xml" " PS>.\\chkhash.ps1 c:\\users\\eve -x c:\\users\\eve\\hashes\\private.xml -e c:\\users\\eve\\hashes" "" "Note: files in subdirectories of any specified directory are automatically processed." " if you specify only an -x option, or no option and .\\hash.xml exists, only files in the database will be checked." exit } if ($args2[$i] -like "-u*") {$upd=$true;continue} # Update and Add new files to database? if ($args2[$i] -like "-c*") {$create=$true;continue} # Create database specified? if ($args2[$i] -like "-x*") { $i++ # Get hashes xml database path if ($i -ge $args2.count) { write-host "-X specified but no file path of .xml database specified. Exiting." exit } $hashespath=$args2[$i] continue } if ($args2[$i] -like "-e*") # Exclude files, dirs { do { $i++ if ($i -ge $args2.count) {break} $exclude+=@($args2[$i]) # collect array of excluded directories. if (($i+1) -ge $args2.count) {break} } while ($args2[$i+1] -notlike "-*") continue } $args3+=@($args2[$i]) # Add files/dirs } "ChkHash.ps1 - .\\chkhash.ps1 -h for usage." "" if ($args3.count -ne 0) { # Get list of files and SHA512 hash them. "Enumerating files from specified locations..." $files=@(dir -literalpath $args3 -recurse -ea 0 | ?{$_.mode -notmatch "d"} | ?{noequal $_.directoryname $exclude}) # Get list of files if ($files.count -eq 0) {"No files found. Exiting."; exit} if ($create -eq $true -or !(test-path $hashespath)) # Create database? { # Create SHA512 hashes of files and write to new database $files = $files | %{write-host "Hashing $($_.fullname) ...";add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} $files |export-clixml $hashespath "Created $hashespath" "$($files.count) file hash(es) saved. Exiting." exit } $xfiles=@(import-clixml $hashespath) # Load database } else { if (!(test-path $hashespath)) {"No database found or specified, exiting."; exit} $xfiles=@(import-clixml $hashespath) # Load database and check it if ($xfiles.count -eq 0) {"No files specified and no files in Database. Exiting.";Exit} $files=$xfiles } "Loaded $($xfiles.count) file hash(es) from $hashespath" $hash=@{} for($x=0;$x -lt $xfiles.count; $x++) # Build dictionary (hash) of filenames and indexes into file array { if ($hash.contains($xfiles[$x].fullname)) {continue} $hash.Add($xfiles[$x].fullname,$x) } foreach($f in $files) { if ((get-item -ea 0 $f.fullname) -eq $null) {continue} # skip if file no longer exists. $n=($hash.($f.fullname)) if ($n -eq $null) { $nu++ # increment needs/needed updating count if ($upd -eq $false) {"Needs to be added: `"$($f.fullname)`"";continue} # if not updating, then continue "Hashing $($f.fullname) ..." # Create SHA512 hash of file $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force} $xfiles+=@($f) # then add file + hash to list continue } $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force} # Update and continue is specified. $fc++ # File checked increment. if ($xfiles[$n].SHA512 -eq $f.SHA512) # Check SHA512 for mixmatch. {$fm++;continue} # if matched, increment file matches and continue loop $errs++ # increment mixmatches if ($upd -eq $true) { $xfiles[$n]=$f; "Updated `"$($f.fullname)`"";continue} "Bad SHA-512 found: `"$($f.fullname)`"" } if ($upd -eq $true) # if database updated { $xfiles|export-clixml $hashespath # write xml database "Updated $hashespath" "$nu file hash(es) added to database." "$errs file hash(es) updated in database." exit } "$errs SHA-512 mixmatch(es) found." "$fm file(s) SHA512 matched." "$fc file(s) checked total." if ($nu -ne 0) {"$nu file(s) need to be added [run with -u option to Add file hashes to database]."}
0
3922.ps1
function Test-ListEnrollmentAccounts { $enrollmentAccounts = Get-AzEnrollmentAccount Assert-True {$enrollmentAccounts.Count -ge 1} Assert-NotNull $enrollmentAccounts[0].ObjectId Assert-NotNull $enrollmentAccounts[0].PrincipalName } function Test-GetEnrollmentAccountWithName { $enrollmentAccounts = @(Get-AzEnrollmentAccount) $enrollmentAccountObjectId = $enrollmentAccounts[0].ObjectId $enrollmentAccount = Get-AzEnrollmentAccount -ObjectId $enrollmentAccountObjectId Assert-AreEqual $enrollmentAccountObjectId $enrollmentAccount.ObjectId Assert-NotNull $enrollmentAccount.PrincipalName }
0
sample_41_31.ps1
########################################################### # # 'ServiceHelper' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest $global:GCServiceName = "GCService" $script:GCServiceBinaryName = "gc_service.exe" $script:GCServiceDisplayName = "Guest Configuration Service" $script:GCServiceDescription = "This service monitors desired state of the machine." $global:GCArcServiceName = "GCArcService" $script:GCArcServiceBinaryName = "gc_arc_service.exe" $script:GCArcServiceDisplayName = "Guest Configuration Arc Service" $script:GCArcServiceDescription = "This service monitors desired state of the machine." $global:ExtServiceName = "ExtensionService" $script:ExtServiceBinaryName = "gc_extension_service.exe" $script:ExtDisplayName = "Guest Configuration Extension service" $script:ExtDescription = "The service installs the requested extensions" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:MigratedDataFolderName = "MigratedData" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName <# .SYNOPSIS Install GC Service. By default it calculates the GC Service Binary Path based on this GC Install Module location. .Example Install-ServiceInternal #> Function Install-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Install-ServiceInternal" if ($ServiceType -eq "GC" -and (CheckServiceExists($global:GCServiceName))) { Write-Error "GC service already exists, can not install new service" } elseif ($ServiceType -eq "Extension" -and (CheckServiceExists($global:ExtServiceName))) { Write-Error "Extension service already exists, can not install new service" } elseif ($ServiceType -eq "GCArc" -and (CheckServiceExists($global:GCArcServiceName))) { Write-Error "GC Arc service already exists, can not install new service" } else { # Default values for GC Azure Service $serviceName = $global:GCServiceName $serviceBinaryName = $script:GCServiceBinaryName $displayName = $script:GCServiceDisplayName $description = $script:GCServiceDescription if ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName $serviceBinaryName = $script:ExtServiceBinaryName $displayName = $script:ExtDisplayName $description = $script:ExtDescription } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName $serviceBinaryName = $script:GCArcServiceBinaryName $displayName = $script:GCArcServiceDisplayName $description = $script:GCArcServiceDescription } $serviceBinaryPath = Join-Path $script:GCBinariesPath $serviceBinaryName $absolutePath = [System.IO.Path]::GetFullPath($serviceBinaryPath) Write-Verbose -Message "GC Service binary path : $absolutePath." $serviceApplication = Get-Command -Name $absolutePath -TotalCount 1 if ($serviceApplication.CommandType -ne "Application") { Write-Error "Service binary type is not as expected" } $servicePathWithQuotes = '"{0}"' -f $absolutePath $serviceBinaryPathCommand = $servicePathWithQuotes + " -k netsvcs" New-Service -Name $serviceName -BinaryPathName $serviceBinaryPathCommand -DisplayName $displayName -Description $description -StartupType Automatic $command = "sc.exe config $ServiceName start= delayed-auto" $Output = Invoke-Expression -Command $Command -ErrorAction Stop if ($LASTEXITCODE -ne 0) { Write-Warning "Failed to set $ServiceName to delayed start. More details: $Output" } else { Write-Verbose "Successfully changed $ServiceName service to delayed start" } # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 10 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset= 30 actions= restart/10000/restart/20000/restart/30000" -PassThru Start-Sleep -Seconds 10 } else { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset=30 actions=restart/10000/restart/20000/restart/30000" -PassThru -Wait } if ($null -eq $configureProcess) { Write-Error "Failed to start sc.exe process to configure $serviceName service." } # on 2008R2 ExitCode is not set. if (($configureProcess.ExitCode -ne 0) -and ($null -ne $configureProcess.ExitCode)) { Write-Warning "configuring service recovery options failed with exit-code:- $($configureProcess.ExitCode)" } Write-Verbose -Message "Successfully Installed new $serviceName." } Write-Verbose -Message "Validating $serviceName Properties." # Validate service Properties as returend by Get-Service. $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is in Stopped State." } else { Write-Error -Message "$serviceName is in unexpected state: $($serviceObject.Status)" } if ($serviceObject.CanPauseAndContinue -eq $false) { Write-Verbose -Message "$serviceName has correct CanPauseAndContinue State." } else { Write-Error -Message "$serviceName has unexpected CanPauseAndContinue: $($serviceObject.CanPauseAndContinue)" } if ($serviceObject.CanShutdown -eq $false) { Write-Verbose -Message "$serviceName has correct CanShutdown State." } else { Write-Error -Message "$serviceName has unexpected CanShutdown: $($serviceObject.CanShutdown)" } if ($serviceObject.CanStop -eq $false) { Write-Verbose -Message "$serviceName has correct CanStop State." } else { Write-Error -Message "$serviceName has unexpected CanStop: $($serviceObject.CanStop)" } if ($serviceObject.ServiceType -eq "Win32OwnProcess") { Write-Verbose -Message "$serviceName will run as Win32OwnProcess." } else { Write-Error -Message "$serviceName has unexpected ServiceType: $($serviceObject.ServiceType)" } # For windows 2008 R2 + sp1 Get-Service cmdlet does not populate StartType if ($serviceObject.PSObject.Properties['StartType']) { if ($serviceObject.StartType -eq "Automatic") { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType: $($serviceObject.StartType)" } } else { # Configure recovery of the service during failure. We need to look for the value of the start type because the type will be localized based on # the language of the machine. Since we're only looking for one startType: '(DELAYED)' we can just search for that and assume that if we can't # find it then it is configured incorrectly. $ServiceStartType = ([string](sc.exe qc $serviceName | Select-String '(DELAYED)')).Split(' ',[System.StringSplitOptions]::RemoveEmptyEntries)[-1] if ($ServiceStartType -imatch '(DELAYED)') { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType or the StartType cannot be found on the object. StartType: $ServiceStartType" } } # Also validate some service properties from the registry database of scm. $serviceRegistryData = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName if ($serviceRegistryData.ImagePath -eq $serviceBinaryPathCommand) { Write-Verbose -Message "$serviceName Binary is Installed Correctly." } else { Write-Error -Message "$serviceName binary is not Installed correctly: $($serviceRegistryData.ImagePath)" } if ($serviceRegistryData.ObjectName -eq "LocalSystem") { Write-Verbose -Message "$serviceName will run under LocalSystem Account." } else { Write-Error -Message "$serviceName has unexpected AccountType: $($serviceRegistryData.ObjectName)" } if ($ServiceType -eq "GC") { if ($serviceRegistryData.DisplayName -eq $script:GCServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "GCArc") { if ($serviceRegistryData.DisplayName -eq $script:GCArcServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCArcServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "Extension") { if ($serviceRegistryData.DisplayName -eq $script:ExtDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:ExtDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } } <# .Synopsis Get Guest Config data path. #> function Get-GuestConfigDataPath { [CmdletBinding()] param () return Join-Path $env:ProgramData 'GuestConfig' } <# .Synopsis Set Acl permissions on given path #> function Set-AclPermissions { [CmdletBinding()] Param ( [Parameter()] [string] $ServiceType, [Parameter()] [string] $Path ) try { Write-Verbose -Message "Attempting to set ACL permissions on the path '$Path' with PowerShell..." if ($ServiceType -eq 'GC') { Write-Verbose -Message "Using Get-Acl" $acl = Get-Acl $Path } else { # Ext deployment fails in azure with "[System.IO.DirectoryInfo] does not contain a method named 'GetAccessControl'" error # So we are calling this only for Hybrid scenarios. Write-Verbose -Message "Using Get-Item GetAccessControl" $acl = (Get-Item $Path).GetAccessControl('Access') } # Removing inherited access rules Write-Verbose -Message "Clearing existing ACL permissions" $acl.SetAccessRuleProtection($True, $False) # Adding new access rules for the target directory Write-Verbose -Message "Setting ACL permissions for the built-in Administrator" $BuiltinAdminSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-32-544' #Built-in Administrators SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinAdminSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Setting ACL permissions for the Local System" $BuiltinLocalSystemSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-18' #Local System SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinLocalSystemSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Suceeded setting ACL permissions with PowerShell" } catch { Write-Verbose -Message "Failed to set ACL permissions with PowerShell. Attempting with icacls..." # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 5 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru Start-Sleep -Seconds 5 } else { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru -Wait $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru -Wait } if ($null -eq $processGrantAdminUserAccess) { Write-Error "Failed to start icacls.exe process to set Administrator user permission on $Path." } if ($null -eq $processGrantLocalSystemUserAccess) { Write-Error "Failed to start icacls.exe process to set LocalSystem user permission on $Path." } # on 2008R2 ExitCode is not set. if (($processGrantAdminUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantAdminUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set Administrator user permission on $Path. Exit code: $($processGrantAdminUserAccess.ExitCode)" } if (($processGrantLocalSystemUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantLocalSystemUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set LocalSystem user permission on $Path. Exit code: $($processGrantLocalSystemUserAccess.ExitCode)" } } } <# .SYNOPSIS Start the GC Service. Report Failure if service is not able to start. .Example Start-ServiceInternal #> Function Start-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Start-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Start GC Timer Service, may be retry on failure. Start-Service $serviceName $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Running') { Write-Verbose -Message "$serviceName is running." } else { Write-Error "$serviceName can not be started." } } <# .SYNOPSIS Stop the GC service and then uninstall it. .Example Uninstall-ServiceInternal #> Function Uninstall-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Uninstall-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Unregister GC Service $timeOut = [timespan]::FromMinutes(5) $stopRetry = [DateTime]::Now.Add($timeOut) $secondsBetweenRetry = 3 Stop-Service $serviceName -ErrorAction SilentlyContinue -ErrorVariable stopTimeError if (Get-Service $serviceName -ErrorAction SilentlyContinue) { if (Get-Service -Name $serviceName -ErrorAction SilentlyContinue) { while (((Get-Service -Name $serviceName).Status -ne 'Stopped') -and ([dateTime]::Now -le $stopRetry)) { Write-Verbose "Wait for service to stop" -Verbose Start-Sleep -Seconds $secondsBetweenRetry } } $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is stopped." sc.exe delete $serviceName } else { Write-Error "$serviceName can not be Uninstalled because we are not able to stop it." } } else { Write-Verbose "Service already stopped" -Verbose } # some basic validation to check service is Uninstalled. $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue if ($serviceRegistryExists -ne $null) { # sometimes the registry clean up does not happen right away. Hence do retry for the check. while (($serviceRegistryExists -ne $null) -and ([dateTime]::Now -le $stopRetry)) { Start-Sleep -Seconds $secondsBetweenRetry $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue } # if service registry entry still exist. if ($serviceRegistryExists -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Information is Present in Registry Database." } } $getService = Get-Service $serviceName -ErrorAction SilentlyContinue if ($getService -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Service is reporting status." } } Function CheckServiceExists { [CmdletBinding()] Param( [Parameter()] [string] $ServiceName = $global:GCServiceName ) if (Get-Service $serviceName -ErrorAction SilentlyContinue) { return $true } return $false } function Invoke-ScriptWithRetry { [CmdletBinding()] param( [Parameter(Mandatory = $true, Position = 0)] [ScriptBlock] $Script = {}, [Parameter()] [int] $RetryCount = 3 ) $results = $null $exceptionObject = $null $keepRetrying = $true Write-Verbose "Invoke-ScriptWithRetry:: Start time : $((Get-Date).ToString())" for($i = 0; (($i -lt $RetryCount) -and ($keepRetrying -eq $true)); $i++) { try { $exceptionObject = $null $results = Invoke-Command -ScriptBlock $Script $keepRetrying = $false } catch { Write-Verbose "Retry Count $i" Write-Warning "$_" $exceptionObject = $_ } try { # Processor utilization $processorObj = Get-WmiObject -Class win32_processor -ErrorAction SilentlyContinue if($processorObj -ne $null) { $cpuUsage = ($processorObj | Measure-Object -Property LoadPercentage -Average | Select-Object Average).Average Write-Verbose "CPU Usage : '$($cpuUsage)%'" } # Memory utilization $computerMemory = Get-WmiObject -Class win32_operatingsystem -ErrorAction SilentlyContinue if($computerMemory -ne $null) { $memory = ((($computerMemory.TotalVisibleMemorySize - $computerMemory.FreePhysicalMemory)*100)/ $computerMemory.TotalVisibleMemorySize) Write-Verbose "Memory Usage : '$($memory)%'" } } catch { Write-Warning "Failed to compute Memory/CPU usage. Error : $_" } } Write-Verbose "Invoke-ScriptWithRetry:: End time : $((Get-Date).ToString())" if($exceptionObject -ne $null) { throw $exceptionObject } return $results } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBI071bx7Qv02kc # Weh4vvZKzNcnYWFqPkN3/xZky5fV4aCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMss # vOiwDaWmswar3r1SHuBOB1NIyHWOe9fjKR9gTfsZMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEALcoAIZrP8GoAiGreNv/977Tt//lFUnGEaPm2 # CEkRVgtSZnb8/FPlfoTpxHQ7MnxBhZpzkWGyOgPxFtm4uubA4WnpBIxo6XY8bxQs # SL+Do+K2/bvwJ9+QmUKHyUV7/pTOFrCGwQ+c5kmbxXQ5TbW37BLFo1llc67fc7Hu # ttRqrUmAjcoomqJ0fHIuQpcyH56bC9Fuexi1+kY85m9N/JTEgKIofIovS7/wm2TV # CHDf4lT7PJ+ln0RHtJwmYfycBclEgSJdGCQJtJBI9jV2VdzBbO0f4Lo5NQ457kPj # 8mUUkuOL4MdKY9iyt2UcPdDTzUiyylxCGQuUugB8fMvC5fWLbKGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC7soZyl57Ulv+iQ6qh7I7TvsDJ4ix5Hg4J # t/qTPeLxfAIGZdXhReLFGBMyMDI0MDIyNjAzMDQwNS42ODZaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkie # lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB # 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU # IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo # KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn # vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2 # RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9 # OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS # qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1 # G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++ # 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy # k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK # IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu # y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X # EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi # D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S # QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY # huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7 # 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg # Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r # rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg # 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH # doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy # 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOmGTmgwIhgPMjAyNDAyMjYwNzQwMjRaGA8yMDI0MDIy # NzA3NDAyNFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6YZOaAIBADAHAgEAAgIY # FTAHAgEAAgIRJjAKAgUA6Yef6AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AJE8DO9vQ1i5FL3DofauCEsMXIUwUYD3Cp0Y5GbG2Btmv6nIHZgNmQq+1+1gH21g # gFEiCCCMOW4oSoqYBbAoVykVWxObzen4B1I3vf2USgE/SPc9HxESNatGBz3W1Rn2 # 6q8odqbBUlt5m3MVcS4ApwkPap0IwvK1ZDD9CQ5n866tMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAA # Ad4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgB+rPBJLL0ePoaeHZjATL4Qk+nq+SDuWHLVUttQJj # 7zowgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3Mg # rT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIGm08g0T6J8dQtIN2wyJZ0h+ # TCKYPWBO4ohh03lwtlgmMA0GCSqGSIb3DQEBCwUABIICACMQhMN80NCFPPTn3Lsd # icQDDoV687qusFxC1iXNebBoBK1L3Vd2G5WvHSsZ+F9w2woXVxf/N/p2CXyN8128 # xXQmhPbUch6KNz1nmwjnG5v+j2LHoBN1aD4FZLY7WH0Gd8Mjgv0VVdrgAIq+wCzV # TxuuR5O7ni9jjKLeKD2/gr8Y3pb7xhnkA7fdEmrUrK5FePlz/PDNzkY8fCj//NjF # M7KsPagqIivZMXYQJAHSNjVCOoNzRm7zjDV3QSSi3CrkgK/bsb/AHDj+1XAKBlhe # mTl593AVgKeo5xOA8oAOjQVSoz+dqe45r9w1G11kCtLJn2YGHcEotD0XRpiW8iX8 # zZGo3q8GhFn9D1Eo2cFWg1mdBV6nNgO6ihaCQtXbgVsah+g+qV3a5OyrrNpHrS8r # fCEz2veq+qOR0KEEKp8oUlA/5zUmedwzl+BH8WSSxGFIr0m1vU63TnYSHqbsDvj7 # AyDABFAKgTQ90cCkOyymrDgigsTxrqyAm0sVUAoKzvtofi3zz/Of6ivHWhuUN0Lp # TYhcqAZAJtqUvyIulBp5sWfzO+ZQbNO0YBYvoo5gYpZIYlg6WvPx0Rp8QBVAwHsv # paYIaaL0yefrWZwEhGDfsSucTUyX4oGSIvR3TEWVkoo6LSdzvO0gZdWmcTPj2qT0 # KvdseVI9MoB8g/hoS5gePN1W # SIG # End signature block
0
sample_63_26.ps1
# # Module manifest for module 'OCI.PSModules.Opensearch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Opensearch.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b54b41d9-dd21-465f-ac14-72727ada540b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Opensearch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opensearch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Backup-OCIOpensearchCluster', 'Get-OCIOpensearchCluster', 'Get-OCIOpensearchClusterBackup', 'Get-OCIOpensearchClusterBackupsList', 'Get-OCIOpensearchClustersList', 'Get-OCIOpensearchVersionsList', 'Get-OCIOpensearchWorkRequest', 'Get-OCIOpensearchWorkRequestErrorsList', 'Get-OCIOpensearchWorkRequestLogsList', 'Get-OCIOpensearchWorkRequestsList', 'Invoke-OCIOpensearchOpensearchClusterRestore', 'Invoke-OCIOpensearchResizeOpensearchClusterHorizontal', 'Invoke-OCIOpensearchResizeOpensearchClusterVertical', 'New-OCIOpensearchCluster', 'Remove-OCIOpensearchCluster', 'Remove-OCIOpensearchClusterBackup', 'Update-OCIOpensearchCluster', 'Update-OCIOpensearchClusterBackup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opensearch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
2559.ps1
param( [String[]] $DatabaseList ) "The number of parameters passed in DatabaseList is $($DatabaseList.Count)" $i = 0 foreach ($arg in $DatabaseList) { echo "The $i parameter in DatabaseList is $arg"; $i++ }
0
sample_40_54.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIIlpgYJKoZIhvcNAQcCoIIllzCCJZMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC2IwggTvMIID16ADAgECAhMzAAAK69Nl # RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT # Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5 # eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW # AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1 # PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD # s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX # ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w # S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt # aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO # 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j # cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf # E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L # fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t # ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH # g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1 # et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG # azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz # WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw # DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+ # DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS # cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/ # OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU # pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA # vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA # AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY # mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g # BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH # AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl # AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC # lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz # /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b # jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9 # TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b # 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9 # pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj # ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol # Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ # 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN # Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w # 3gI/h+5WoezrtUyFMYIZmjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB # IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ # KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB # gjcCARUwLwYJKoZIhvcNAQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1 # fU+wYXo6MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa # gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEALywn # CRgZ5Jbg9T+JXSXA/emxhO33D9HzChrgFT70wCgrW7tp1/URokTk75IG/8HGbtLX # iL3IXSOgyFttU/ir4H3aOcQeBjCqxkq6ssZdxADkj64m94v+te26Z+9T9k8IyiKf # t5AqbStTJwNPmNkJUhlsm5pl5IN/g/wrJRWAXz++Ljx1xx8fNNra6cECguorDdyQ # 5B6v+1hh2DQsxis+NcroiP9zsUgnq1TDIt7BZKF3sRQfiMn2NCvx1isCSIDCnJ4o # tPziMcJNVrXWBlNGDXdRJxIqiASkQ18u4R7PswEF2ObElDQc0qgx2fa7exbebIRh # EXe75cdB8DQWpA+ZgqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3 # DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRAB # BKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCCi # mZCYuTux/SyAj/Wn6eH50nA2Xh+qWnS2SofY6yKtOgIGZYLzv73NGBMyMDI0MDEx # MjAwNTAwOS41MDJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4 # MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR # eDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJKoZIhvcNAQEL # BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1 # WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM # aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9aXai//eNyP5M # LWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n # 9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800CcD6d/Ndoommk # d196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR # 8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChDK7klDcCw+/gV # oEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjR # UzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+m # c6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPNx/9zF1dv8yXB # dzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAAZAWoKbmtYI+C # iz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0 # IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRscv1WwJFAuyyCM # QvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEifEXlCQgFOXgM # h6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBU # oFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9z # b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEB # BGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w # cy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5j # cnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B # Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8GkEJ9oLBuvfjnd # MyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDiMDBLLWRMTJHW # VeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQIyPR2PiXQhT5P # yerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyUOzKpyMvqVaub # o+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbixYifTwAivPcK # NdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgHEh60KoZyzlBX # z3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71RKimZA/KXlWp # mBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0 # mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lyppO22ePjBjnwoE # vVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZc # UZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjrxh7lnwrxV/fM # y0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTAN # BgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9y # aXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDi # vbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5G # awcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm # ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjks # UZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvr # g0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31B # mkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PR # c6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRR # RuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSR # lJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflS # xIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHd # MIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSa # voKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYD # VR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1Ud # JQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0G # CSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHix # BpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjY # Ni6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe5 # 3Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU # hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QM # vOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1A # PMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsN # n6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFs # c/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue1 # 0CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6g # MTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm # 8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0 # aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAt # NjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEB # MAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCkfjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOlKcWUwIhgP # MjAyNDAxMTEyMTUzNDFaGA8yMDI0MDExMjIxNTM0MVowdDA6BgorBgEEAYRZCgQB # MSwwKjAKAgUA6UpxZQIBADAHAgEAAgILbTAHAgEAAgISFDAKAgUA6UvC5QIBADA2 # BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB # AAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGeF0FxESX9k7kAlf8em/6LZx+kMG0f9 # ASuN12yDhT1sNUe0BigvWBCDbStQYKDOpdDWJGwlZpEybLvWGxtwprBvi6Aw30cq # 0zo5sXB3ENmSO+1m3+Bunlzx9fOfKXtWvE8LSpeGxgp8VT/G54ifT83wO2W8ArWt # ackW1E1xPIH1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgn6dWhyUl # rNrHnXbwBn9JPJmmTF7zxPuVqA+Nrd2h030wgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U697TCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEA # AAHlMCIEIBUEIi+gKXRbN7nRWn7AhtSVz8KK9Qe7WU/sEsrIC2m5MA0GCSqGSIb3 # DQEBCwUABIICAD30eTEcIaeQ6+8DFwm7Se0IkSI63BBfgzMKSU00jiyQ4C93c4Dj # 7kg00lBtkVpIFcVx3sERzMsV6UZuAskToM6EhOF4AuNuo3MPKR6i/SX8pv6d0di8 # r5qCcN9Xq5DMeQJBtZlCX+MiEI8ZgGUpOg/XfHf3OWUiX55iDuKvCyH4gWMozmGz # uHVNj3XaTLb/xuW0NjJCC80P+sUOFT10Tb5CUFQv68btgEEri+vG6/2yg6w6CKhc # ZFOZ83uJOePxxrYswKCeiEnMALVmn3eyudjhHPS5oFMtpeDGBAeZ3dbPQOvv6MHj # pNvjZYPhxZP27sZrh5Oa3hFCoDti7W8s+QO/HSxcrXFWTNO3+7cRXexiO8hxMa2I # At+zfclBsYmP/84hlGqIuYVCNVjysCaOJO+xcRXpXY+1OgtNuS70Lepv2kraV7+p # CQDEi+DxBmCsa16DGutsnaOFVgf8kfB+yE+ESJ6s2szNQqhmz8Ys8UQCDgLFGFx7 # ZDL3xlbG74TbcxBO7wr3NC8fdFGmtSlVMpUTzh0HaTerPdhPKTzmcXjwIDNY01q8 # GrRs8z7FrpA+5Mxm/lp1hQ8YaxKDusPm5lHivx8Lombf9/3OvMizsQ6Wj5Hbuyix # jMDYH2psN7pxHKcwvCNr2mQpWhvXKv87cyRJZDBHYD5aaQfVhUhz3iDv # SIG # End signature block
0
sample_40_12.ps1
# # Module manifest for module 'OCI.PSModules.Aivision' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aivision.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'bed214c5-ac3c-4f4a-85c4-2c63f72b0adc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aivision Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aivision.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAivisionDocumentJob', 'Get-OCIAivisionImageJob', 'Get-OCIAivisionModel', 'Get-OCIAivisionModelsList', 'Get-OCIAivisionProject', 'Get-OCIAivisionProjectsList', 'Get-OCIAivisionWorkRequest', 'Get-OCIAivisionWorkRequestErrorsList', 'Get-OCIAivisionWorkRequestLogsList', 'Get-OCIAivisionWorkRequestsList', 'Invoke-OCIAivisionAnalyzeDocument', 'Invoke-OCIAivisionAnalyzeImage', 'Move-OCIAivisionModelCompartment', 'Move-OCIAivisionProjectCompartment', 'New-OCIAivisionDocumentJob', 'New-OCIAivisionImageJob', 'New-OCIAivisionModel', 'New-OCIAivisionProject', 'Remove-OCIAivisionModel', 'Remove-OCIAivisionProject', 'Stop-OCIAivisionDocumentJob', 'Stop-OCIAivisionImageJob', 'Stop-OCIAivisionWorkRequest', 'Update-OCIAivisionModel', 'Update-OCIAivisionProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aivision' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
0
1184.ps1
Set-StrictMode -Version 'Latest' & (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) Describe 'Get-ProgramInstallInfo.when getting all programs' { $programs = Get-ProgramInstallInfo It 'should get all installed programs' { $programs | Should -Not -BeNullOrEmpty } It ('should get information about each program') { foreach( $program in $programs ) { Write-Verbose -Message $program.DisplayName $program | Should Not BeNullOrEmpty [Microsoft.Win32.RegistryKey]$key = $program.Key $valueNames = $key.GetValueNames() foreach( $property in (Get-Member -InputObject $program -MemberType Property) ) { $propertyName = $property.Name Write-Verbose -Message (' {0}' -f $propertyName) if( $propertyName -eq 'Version' ) { Write-Verbose 'BREAK' } if( $propertyName -eq 'Key' ) { continue } $keyValue = $key.GetValue( $propertyName ) $propertyValue = $program.$propertyName if( $propertyName -eq 'ProductCode' ) { $propertyValue = Split-Path -Leaf -Path $key.Name [Guid]$guid = [Guid]::Empty [Guid]::TryParse( $propertyValue, [ref]$guid ) $propertyValue = $guid $keyValue = $guid } elseif( $propertyName -eq 'User' ) { if( $key.Name -match 'HKEY_USERS\\([^\\]+)\\' ) { $sddl = $Matches[1] $sid = New-Object 'Security.Principal.SecurityIdentifier' $sddl try { $propertyValue = $sid.Translate([Security.Principal.NTAccount]).Value } catch { $propertyValue = $sid.ToString() } $keyValue = $propertyValue } } $typeName = $program.GetType().GetProperty($propertyName).PropertyType.Name if( $keyValue -eq $null ) { if( $typeName -eq 'Int32' ) { $keyValue = 0 } elseif( $typeName -eq 'Version' ) { $keyValue = $null } elseif( $typeName -eq 'DateTime' ) { $keyValue = [DateTime]::MinValue } elseif( $typeName -eq 'Boolean' ) { $keyValue = $false } elseif( $typeName -eq 'Guid' ) { $keyValue = [Guid]::Empty } else { $keyValue = '' } } else { if( $typeName -eq 'DateTime' ) { [DateTime]$dateTime = [DateTime]::MinValue if( -not ([DateTime]::TryParse($keyValue,[ref]$dateTime)) ) { [DateTime]::TryParseExact( $keyValue, 'yyyyMMdd', [Globalization.CultureInfo]::CurrentCulture, [Globalization.DateTimeStyles]::None, [ref]$dateTime) } $keyValue = $dateTime } elseif( $typeName -eq 'Int32' ) { $intValue = 0 $keyValue = [Int32]::TryParse($keyValue, [ref] $intValue) $keyValue = $intValue } elseif( $typeName -eq 'Version' ) { [int]$intValue = 0 if( $keyValue -isnot [int32] -and [int]::TryParse($keyValue,[ref]$intValue) ) { $keyValue = $intValue } if( $keyValue -is [int32] ) { $major = $keyValue -shr 24 $minor = ($keyValue -band 0x00ff0000) -shr 16 $build = $keyValue -band 0x0000ffff $keyValue = New-Object 'Version' $major,$minor,$build } else { [Version]$version = $null if( [Version]::TryParse($keyValue, [ref]$version) ) { $keyValue = $version } } } } if( $keyValue -eq $null ) { $propertyValue | Should BeNullOrEmpty } else { $propertyValue | Should Be $keyValue } } } } } Describe 'Get-ProgramInstallInfo.when getting a program by name' { $p = Get-ProgramInstallInfo | Select-Object -First 1 $p2 = Get-ProgramInstallInfo $p.DisplayName It 'should get just that program' { $p2 | Should Not BeNullOrEmpty $p2 | Should Be $p } } Describe 'Get-ProgramInstallInfo.when getting programs by wildcard' { $p = Get-ProgramInstallInfo | Select-Object -First 1 $wildcard = $p.DisplayName.Substring(0,$p.DisplayName.Length - 1) $wildcard = '{0}*' -f $wildcard $p2 = Get-ProgramInstallInfo $wildcard It 'should find the program' { $p2 | Should Not BeNullOrEmpty $p2 | Should Be $p } } Describe 'Get-ProgramInstallInfo.when there are invalid integer versions' { $program = Get-ProgramInstallInfo | Select-Object -First 1 $regKeyPath = 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall\CarbonGetProgramInstallInfo' Install-RegistryKey -Path $regKeyPath try { $name = 'Carbon+Get-ProgramInstallInfo' Set-RegistryKeyValue -Path $regKeyPath -Name 'DisplayName' -String $name Set-RegistryKeyValue -Path $regKeyPath -Name 'Version' -DWord 0xff000000 $program = Get-ProgramInstallInfo -Name $name It 'should ignore the invalid version' { $program.Version | Should BeNullOrEmpty } } finally { Remove-Item -Path $regKeyPath -Recurse } }
0
Prompt _for ISE_.ps1
# just to know which file is invoked by my profile write-host "loaded . $($MyInvocation.MyCommand.Path)" if(!$global:WindowTitlePrefix) { # But if you're running "elevated" on vista, we want to show that ... if( ([System.Environment]::OSVersion.Version.Major -gt 5) -and ( # Vista and ... new-object Security.Principal.WindowsPrincipal ( [Security.Principal.WindowsIdentity]::GetCurrent()) # current user is admin ).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) ) { ##$Isadmin = $True $global:WindowTitlePrefix = "PoSh V2 (CTP3) (ADMIN)" #(get-host).UI.RawUI.Backgroundcolor="DarkRed" $psise.options.CommandPaneBackground = 'pink' clear-host } else { ##$Isadmin = $False $global:WindowTitlePrefix = "PoSh V2 (CTP3)" } } function prompt { # FIRST, make a note if there was an error in the previous command $err = !$? # Make sure Windows and .Net know where we are (they can only handle the FileSystem) [Environment]::CurrentDirectory = (Get-Location -PSProvider FileSystem).ProviderPath # Also, put the path in the title ... (don't restrict this to the FileSystem $Host.UI.RawUI.WindowTitle = "{0} - {1}/{2}@{3}" -f $global:WindowTitlePrefix, $env:USERDOMAIN, $env:USERNAME, $env:COMPUTERNAME # Determine what nesting level we are at (if any) $Nesting = "$([char]0xB7)" * $NestedPromptLevel # Generate PUSHD(push-location) Stack level string $Stack = "+" * (Get-Location -Stack).count # my New-Script and Get-PerformanceHistory functions use history IDs # So, put the ID of the command in, so we can get/invoke-history easier # eg: "r 4" will re-run the command that has [4]: in the prompt $nextCommandId = (Get-History -count 1).Id + 1 # Output prompt string # If there's an error, set the prompt foreground to "Red", otherwise, "DarkBlue" if($err) { $fg = "Red" } else { $fg = "DarkBlue" } # Notice: no angle brackets, makes it easy to paste my buffer to the web Write-Host "[${Nesting}${nextCommandId}${Stack}]" -NoNewLine -Fore $fg # "{0} - {1}/{2}@{3} {4} ({5})`n" -f $global:WindowTitlePrefix, $env:USERDOMAIN, $env:USERNAME, $env:COMPUTERNAME, $pwd.Path, $pwd.Provider.Name "{0} ({1})`n" -f $pwd.Path, $pwd.Provider.Name }
0