diff --git a/.github/workflows/dev_cippckdtz.yml b/.github/workflows/dev_cippckdtz.yml index 6e0c53e9df0a..c81980006ad4 100644 --- a/.github/workflows/dev_cippckdtz.yml +++ b/.github/workflows/dev_cippckdtz.yml @@ -27,4 +27,4 @@ jobs: app-name: 'cippckdtz' slot-name: 'Production' package: ${{ env.AZURE_FUNCTIONAPP_PACKAGE_PATH }} - publish-profile: ${{ secrets.AZUREAPPSERVICE_PUBLISHPROFILE_2101C7175BFB47E58240ABD1E72E81C2 }} \ No newline at end of file + publish-profile: ${{ secrets.AZUREAPPSERVICE_PUBLISHPROFILE_726578DA8A7243BF9D82FE123C2F6E7F }} \ No newline at end of file diff --git a/.github/workflows/dev_cippy6oom.yml b/.github/workflows/dev_cippy6oom.yml deleted file mode 100644 index c06752b5d63e..000000000000 --- a/.github/workflows/dev_cippy6oom.yml +++ /dev/null @@ -1,30 +0,0 @@ -# Docs for the Azure Web Apps Deploy action: https://github.com/azure/functions-action -# More GitHub Actions for Azure: https://github.com/Azure/actions - -name: Build and deploy Powershell project to Azure Function App - cippy6oom - -on: - push: - branches: - - dev - workflow_dispatch: - -env: - AZURE_FUNCTIONAPP_PACKAGE_PATH: '.' # set this to the path to your web app project, defaults to the repository root - -jobs: - deploy: - runs-on: windows-latest - - steps: - - name: 'Checkout GitHub Action' - uses: actions/checkout@v4 - - - name: 'Run Azure Functions Action' - uses: Azure/functions-action@v1 - id: fa - with: - app-name: 'cippy6oom' - slot-name: 'Production' - package: ${{ env.AZURE_FUNCTIONAPP_PACKAGE_PATH }} - publish-profile: ${{ secrets.AZUREAPPSERVICE_PUBLISHPROFILE_B9C635E19DF6459F8995BA602EFA638A }} \ No newline at end of file diff --git a/.github/workflows/dev_cippeln4y.yml b/.github/workflows/dev_cippz6s4d.yml similarity index 87% rename from .github/workflows/dev_cippeln4y.yml rename to .github/workflows/dev_cippz6s4d.yml index 322e8af2bcd2..d58532dffc2f 100644 --- a/.github/workflows/dev_cippeln4y.yml +++ b/.github/workflows/dev_cippz6s4d.yml @@ -1,7 +1,7 @@ # Docs for the Azure Web Apps Deploy action: https://github.com/azure/functions-action # More GitHub Actions for Azure: https://github.com/Azure/actions -name: Build and deploy Powershell project to Azure Function App - cippeln4y +name: Build and deploy Powershell project to Azure Function App - cippz6s4d on: push: @@ -24,7 +24,7 @@ jobs: uses: Azure/functions-action@v1 id: fa with: - app-name: 'cippeln4y' + app-name: 'cippz6s4d' slot-name: 'Production' package: ${{ env.AZURE_FUNCTIONAPP_PACKAGE_PATH }} - publish-profile: ${{ secrets.AZUREAPPSERVICE_PUBLISHPROFILE_B82C66E0F3BD4BDD9FFFB32FA83A68C9 }} \ No newline at end of file + publish-profile: ${{ secrets.AZUREAPPSERVICE_PUBLISHPROFILE_D27E7CF0887F4E4591F3957CCA96F0FD }} \ No newline at end of file diff --git a/Cache_SAMSetup/SAMManifest.json b/Cache_SAMSetup/SAMManifest.json index 68d8c403a42e..82bab306ef89 100644 --- a/Cache_SAMSetup/SAMManifest.json +++ b/Cache_SAMSetup/SAMManifest.json @@ -154,10 +154,10 @@ { "id": "b27a61ec-b99c-4d6a-b126-c4375d08ae30", "type": "Scope" }, { "id": "84bccea3-f856-4a8a-967b-dbe0a3d53a64", "type": "Scope" }, { "id": "280b3b69-0437-44b1-bc20-3b2fca1ee3e9", "type": "Scope" }, - { - "id": "885f682f-a990-4bad-a642-36736a74b0c7", - "type": "Scope" - } + { "id": "885f682f-a990-4bad-a642-36736a74b0c7", "type": "Scope" }, + { "id": "913b9306-0ce1-42b8-9137-6a7df690a760", "type": "Role" }, + { "id": "cb8f45a0-5c2e-4ea1-b803-84b870a7d7ec", "type": "Scope" }, + { "id": "4c06a06a-098a-4063-868e-5dfee3827264", "type": "Scope" } ] }, { diff --git a/Cleanup_OldAuditLogs/function.json b/Cleanup_OldAuditLogs/function.json new file mode 100644 index 000000000000..7e97fe568d29 --- /dev/null +++ b/Cleanup_OldAuditLogs/function.json @@ -0,0 +1,15 @@ +{ + "bindings": [ + { + "name": "Timer", + "type": "timerTrigger", + "direction": "in", + "schedule": "0 0 0 * * *" + }, + { + "name": "starter", + "type": "durableClient", + "direction": "in" + } + ] +} diff --git a/Cleanup_OldAuditLogs/run.ps1 b/Cleanup_OldAuditLogs/run.ps1 new file mode 100644 index 000000000000..738161989a1e --- /dev/null +++ b/Cleanup_OldAuditLogs/run.ps1 @@ -0,0 +1,9 @@ +# Input bindings are passed in via param block. +param($Timer) + +try { + $Tenants = Get-Tenants -IncludeAll | Where-Object { $_.customerId -ne $env:TenantId -and $_.Excluded -eq $false } + $Tenants | ForEach-Object { + Remove-CIPPGraphSubscription -cleanup $true -TenantFilter $_.defaultDomainName + } +} catch {} \ No newline at end of file diff --git a/Config/7b41924e-3051-4a23-b0d0-8cdeadc2c05a.IntuneTemplate.json b/Config/7b41924e-3051-4a23-b0d0-8cdeadc2c05a.IntuneTemplate.json index d0aea67e431c..96c82383e506 100644 --- a/Config/7b41924e-3051-4a23-b0d0-8cdeadc2c05a.IntuneTemplate.json +++ b/Config/7b41924e-3051-4a23-b0d0-8cdeadc2c05a.IntuneTemplate.json @@ -1,7 +1,7 @@ { "Displayname": "CIPP: Enable Onedrive Silent Logon and Known Folder Move", "Description": "This policy enables Onedrive Silent Logon and Known Folder move", - "RAWJson": "{\n\"added\":[\n{\n\"enabled\":true,\n\"presentationValues\":[],\n\"definition@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('9a4db949-29e4-4e31-a129-bf2b88d8fa1b')\"\n},\n{\n\"enabled\":true,\n\"presentationValues\":[\n{\n\"@odata.type\":\"#microsoft.graph.groupPolicyPresentationValueText\",\n\"value\":\"%tenantid%\",\n\"presentation@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('39147fa2-6c5e-437b-8264-19b50b891709')/presentations('fbefbbdf-5382-477c-8b6c-71f4a06e2805')\"\n},\n{\n\"@odata.type\":\"#microsoft.graph.groupPolicyPresentationValueText\",\n\"value\":\"0\",\n\"presentation@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('39147fa2-6c5e-437b-8264-19b50b891709')/presentations('35c82072-a93b-4022-be14-8684c2f6fcc2')\"\n}\n],\n\"definition@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('39147fa2-6c5e-437b-8264-19b50b891709')\"\n},\n{\n\"enabled\":true,\n\"presentationValues\":[],\n\"definition@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('81c07ba0-7512-402d-b1f6-00856975cfab')\"\n},\n{\n\"enabled\":true,\n\"presentationValues\":[],\n\"definition@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('61b07a01-7e60-4127-b086-f6b32458a5c5')\"\n},\n],\n\"updated\":[],\n\"deletedIds\":[]\n}", + "RAWJson": "{\r\n\"added\":[\r\n{\r\n\"enabled\":true,\r\n\"presentationValues\":[],\r\n\"definition@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('9a4db949-29e4-4e31-a129-bf2b88d8fa1b')\"\r\n},\r\n{\r\n\"enabled\":true,\r\n\"presentationValues\":[\r\n{\r\n\"@odata.type\":\"#microsoft.graph.groupPolicyPresentationValueText\",\r\n\"value\":\"%tenantid%\",\r\n\"presentation@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('39147fa2-6c5e-437b-8264-19b50b891709')/presentations('fbefbbdf-5382-477c-8b6c-71f4a06e2805')\"\r\n},\r\n{\r\n\"@odata.type\":\"#microsoft.graph.groupPolicyPresentationValueText\",\r\n\"value\":\"0\",\r\n\"presentation@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('39147fa2-6c5e-437b-8264-19b50b891709')/presentations('35c82072-a93b-4022-be14-8684c2f6fcc2')\"\r\n}\r\n],\r\n\"definition@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('39147fa2-6c5e-437b-8264-19b50b891709')\"\r\n},\r\n{\r\n\"enabled\":true,\r\n\"presentationValues\":[],\r\n\"definition@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('81c07ba0-7512-402d-b1f6-00856975cfab')\"\r\n},\r\n{\r\n\"enabled\":true,\r\n\"presentationValues\":[],\r\n\"definition@odata.bind\":\"https://graph.microsoft.com/beta/deviceManagement/groupPolicyDefinitions('61b07a01-7e60-4127-b086-f6b32458a5c5')\"\r\n}\r\n],\r\n\"updated\":[],\r\n\"deletedIds\":[]\r\n}", "Type": "Admin", "GUID": "7b41924e-3051-4a23-b0d0-8cdeadc2c05a.IntuneTemplate.json" } diff --git a/Modules/Az.Accounts/2.10.4/Accounts.format.ps1xml b/Modules/Az.Accounts/2.10.4/Accounts.format.ps1xml deleted file mode 100644 index 52ffd5264137..000000000000 --- a/Modules/Az.Accounts/2.10.4/Accounts.format.ps1xml +++ /dev/null @@ -1,552 +0,0 @@ - - - - - AzureErrorRecords - - Microsoft.Azure.Commands.Profile.Errors.AzureErrorRecord - Microsoft.Azure.Commands.Profile.Errors.AzureExceptionRecord - Microsoft.Azure.Commands.Profile.Errors.AzureRestExceptionRecord - - - - - - Microsoft.Azure.Commands.Profile.Errors.AzureRestExceptionRecord - - AzureErrorRecords - - - $_.InvocationInfo.HistoryId - - - - - - - - ErrorCategory - - - ErrorDetail - - - - "{" + $_.InvocationInfo.MyCommand + "}" - - - - $_.InvocationInfo.Line - - - - $_.InvocationInfo.PositionMessage - - - - $_.InvocationInfo.BoundParameters - - - - $_.InvocationInfo.UnboundParameters - - - - $_.InvocationInfo.HistoryId - - - - - - - AzureErrorRecords - $_.GetType() -eq [Microsoft.Azure.Commands.Profile.Errors.AzureRestExceptionRecord] - - - - - RequestId - - - Message - - - ServerMessage - - - ServerResponse - - - RequestMessage - - - - "{" + $_.InvocationInfo.MyCommand + "}" - - - - $_.InvocationInfo.Line - - - - $_.InvocationInfo.PositionMessage - - - StackTrace - - - - $_.InvocationInfo.HistoryId - - - - - - - AzureErrorRecords - $_.GetType() -eq [Microsoft.Azure.Commands.Profile.Errors.AzureExceptionRecord] - - - - - Message - - - StackTrace - - - - $_.Exception.GetType() - - - - "{" + $_.InvocationInfo.MyCommand + "}" - - - - $_.InvocationInfo.Line - - - - $_.InvocationInfo.PositionMessage - - - - $_.InvocationInfo.HistoryId - - - - - - - - Microsoft.Azure.Commands.Profile.CommonModule.PSAzureServiceProfile - - Microsoft.Azure.Commands.Profile.CommonModule.PSAzureServiceProfile - - - - - Left - - - - Left - - - - - - - - Left - Name - - - Left - Description - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAccessToken - - Microsoft.Azure.Commands.Profile.Models.PSAccessToken - - - - - - - Token - - - ExpiresOn - - - Type - - - TenantId - - - UserId - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscriptionPolicy - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscriptionPolicy - - - - - Left - - - - Left - - - - Left - - - - - - - - Left - locationPlacementId - - - Left - QuotaId - - - Left - SpendingLimit - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureRmAccount - - Microsoft.Azure.Commands.Profile.Models.PSAzureRmAccount - - - - - - - Id - - - Type - - - Tenants - - - Credential - - - TenantMap - - - CertificateThumbprint - - - - $_.ExtendedProperties.GetEnumerator() - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSConfig - - Microsoft.Azure.Commands.Profile.Models.PSConfig - - - - - Left - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - Key - - - Left - Value - - - Left - AppliesTo - - - Left - Scope - - - Left - HelpMessage - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/Modules/Az.Accounts/2.10.4/Accounts.generated.format.ps1xml b/Modules/Az.Accounts/2.10.4/Accounts.generated.format.ps1xml deleted file mode 100644 index 3ecc24c71496..000000000000 --- a/Modules/Az.Accounts/2.10.4/Accounts.generated.format.ps1xml +++ /dev/null @@ -1,469 +0,0 @@ - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment - - Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment - - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - Name - - - Left - ResourceManagerUrl - - - Left - ActiveDirectoryAuthority - - - Left - Type - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - Name - - - Left - Id - - - Left - TenantId - - - Left - State - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile - - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - $_.Context.Account.ToString() - - - Left - $_.Context.Subscription.Name - - - Left - $_.Context.Tenant.ToString() - - - Left - $_.Context.Environment.ToString() - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - 40 - Left - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - Name - - - Left - Account - - - Left - $_.Subscription.Name - - - Left - Environment - - - Left - $_.Tenant.ToString() - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - Id - - - Left - $_.Name - - - Left - $_.TenantCategory - - - Left - $_.Domains - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/Modules/Az.Accounts/2.10.4/Accounts.types.ps1xml b/Modules/Az.Accounts/2.10.4/Accounts.types.ps1xml deleted file mode 100644 index 31133150ebeb..000000000000 --- a/Modules/Az.Accounts/2.10.4/Accounts.types.ps1xml +++ /dev/null @@ -1,303 +0,0 @@ - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile - - - PSStandardMembers - - - SerializationDepth - 10 - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - PSStandardMembers - - - SerializationDepth - 10 - - - - - - - Microsoft.Azure.Commands.Common.Authentication.Core.AuthenticationStoreTokenCache - - - PSStandardMembers - - - SerializationMethod - SpecificProperties - - - PropertySerializationSet - - CacheData - - - - - - - - Microsoft.Azure.Commands.Common.Authentication.Core.ProtectedFileTokenCache - - - PSStandardMembers - - - SerializationMethod - SpecificProperties - - - PropertySerializationSet - - CacheData - - - - - - - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - PSStandardMembers - - - SerializationDepth - 10 - - - - - - Microsoft.Azure.Commands.Profile.Models.AzureContextConverter - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/Modules/Az.Accounts/2.10.4/Az.Accounts.psd1 b/Modules/Az.Accounts/2.10.4/Az.Accounts.psd1 deleted file mode 100644 index a37436647f15..000000000000 --- a/Modules/Az.Accounts/2.10.4/Az.Accounts.psd1 +++ /dev/null @@ -1,390 +0,0 @@ -# -# Module manifest for module 'Az.Accounts' -# -# Generated by: Microsoft Corporation -# -# Generated on: 01/12/2022 -# - -@{ - -# Script module or binary module file associated with this manifest. -RootModule = 'Az.Accounts.psm1' - -# Version number of this module. -ModuleVersion = '2.10.4' - -# Supported PSEditions -CompatiblePSEditions = 'Core', 'Desktop' - -# ID used to uniquely identify this module -GUID = '17a2feff-488b-47f9-8729-e2cec094624c' - -# Author of this module -Author = 'Microsoft Corporation' - -# Company or vendor of this module -CompanyName = 'Microsoft Corporation' - -# Copyright statement for this module -Copyright = 'Microsoft Corporation. All rights reserved.' - -# Description of the functionality provided by this module -Description = 'Microsoft Azure PowerShell - Accounts credential management cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. - -For more information on account credential management, please visit the following: https://learn.microsoft.com/powershell/azure/authenticate-azureps' - -# Minimum version of the PowerShell engine required by this module -PowerShellVersion = '5.1' - -# Name of the PowerShell host required by this module -# PowerShellHostName = '' - -# Minimum version of the PowerShell host required by this module -# PowerShellHostVersion = '' - -# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. -DotNetFrameworkVersion = '4.7.2' - -# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. -# ClrVersion = '' - -# Processor architecture (None, X86, Amd64) required by this module -# ProcessorArchitecture = '' - -# Modules that must be imported into the global environment prior to importing this module -# RequiredModules = @() - -# Assemblies that must be loaded prior to importing this module -RequiredAssemblies = 'Microsoft.Azure.PowerShell.Authentication.Abstractions.dll', - 'Microsoft.Azure.PowerShell.Authentication.dll', - 'Microsoft.Azure.PowerShell.Authenticators.dll', - 'Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll', - 'Microsoft.Azure.PowerShell.Clients.Authorization.dll', - 'Microsoft.Azure.PowerShell.Clients.Compute.dll', - 'Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll', - 'Microsoft.Azure.PowerShell.Clients.Monitor.dll', - 'Microsoft.Azure.PowerShell.Clients.Network.dll', - 'Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll', - 'Microsoft.Azure.PowerShell.Clients.ResourceManager.dll', - 'Microsoft.Azure.PowerShell.Common.dll', - 'Microsoft.Azure.PowerShell.Storage.dll', - 'Microsoft.Azure.PowerShell.Clients.Storage.Management.dll', - 'Microsoft.Azure.PowerShell.Clients.KeyVault.dll', - 'Microsoft.Azure.PowerShell.Clients.Websites.dll', - 'Hyak.Common.dll', 'Microsoft.ApplicationInsights.dll', - 'Microsoft.Azure.Common.dll', 'Microsoft.Rest.ClientRuntime.dll', - 'Microsoft.Rest.ClientRuntime.Azure.dll', - 'Microsoft.WindowsAzure.Storage.dll', - 'Microsoft.WindowsAzure.Storage.DataMovement.dll', - 'Microsoft.Azure.PowerShell.Clients.Aks.dll', - 'Microsoft.Azure.PowerShell.Strategies.dll', - 'Microsoft.Azure.PowerShell.Common.Share.dll', 'FuzzySharp.dll' - -# Script files (.ps1) that are run in the caller's environment prior to importing this module. -# ScriptsToProcess = @() - -# Type files (.ps1xml) to be loaded when importing this module -# TypesToProcess = @() - -# Format files (.ps1xml) to be loaded when importing this module -FormatsToProcess = 'Accounts.format.ps1xml', 'Accounts.generated.format.ps1xml' - -# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess -NestedModules = @() - -# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. -FunctionsToExport = @() - -# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. -CmdletsToExport = 'Disable-AzDataCollection', 'Disable-AzContextAutosave', - 'Enable-AzDataCollection', 'Enable-AzContextAutosave', - 'Remove-AzEnvironment', 'Get-AzEnvironment', 'Set-AzEnvironment', - 'Add-AzEnvironment', 'Get-AzSubscription', 'Connect-AzAccount', - 'Get-AzContext', 'Set-AzContext', 'Import-AzContext', 'Save-AzContext', - 'Get-AzTenant', 'Send-Feedback', 'Resolve-AzError', 'Select-AzContext', - 'Rename-AzContext', 'Remove-AzContext', 'Clear-AzContext', - 'Disconnect-AzAccount', 'Get-AzContextAutosaveSetting', - 'Set-AzDefault', 'Get-AzDefault', 'Clear-AzDefault', - 'Register-AzModule', 'Enable-AzureRmAlias', 'Disable-AzureRmAlias', - 'Uninstall-AzureRm', 'Invoke-AzRestMethod', 'Get-AzAccessToken', - 'Open-AzSurveyLink', 'Get-AzConfig', 'Update-AzConfig', - 'Clear-AzConfig', 'Export-AzConfig', 'Import-AzConfig' - -# Variables to export from this module -# VariablesToExport = @() - -# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. -AliasesToExport = 'Add-AzAccount', 'Login-AzAccount', 'Remove-AzAccount', - 'Logout-AzAccount', 'Select-AzSubscription', 'Resolve-Error', - 'Save-AzProfile', 'Get-AzDomain', 'Invoke-AzRest' - -# DSC resources to export from this module -# DscResourcesToExport = @() - -# List of all modules packaged with this module -# ModuleList = @() - -# List of all files packaged with this module -# FileList = @() - -# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. -PrivateData = @{ - - PSData = @{ - - # Tags applied to this module. These help with module discovery in online galleries. - Tags = 'Azure','ResourceManager','ARM','Accounts','Authentication','Environment','Subscription' - - # A URL to the license for this module. - LicenseUri = 'https://aka.ms/azps-license' - - # A URL to the main website for this project. - ProjectUri = 'https://github.com/Azure/azure-powershell' - - # A URL to an icon representing this module. - # IconUri = '' - - # ReleaseNotes of this module - ReleaseNotes = '* Enabled caching tokens when logging in with a client assertion. This fixed the incorrectly short lifespan of tokens. -* Upgraded target framework of Microsoft.Identity.Client to net461 [#20189] -* Stored ''ServicePrincipalSecret'' and ''CertificatePassword'' into ''AzKeyStore''. -* Updated the reference of Azure PowerShell Common to 1.3.67-preview.' - - # Prerelease string of this module - # Prerelease = '' - - # Flag to indicate whether the module requires explicit user acceptance for install/update/save - # RequireLicenseAcceptance = $false - - # External dependent modules of this module - # ExternalModuleDependencies = @() - - } # End of PSData hashtable - - } # End of PrivateData hashtable - -# HelpInfo URI of this module -# HelpInfoURI = '' - -# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. -# DefaultCommandPrefix = '' - -} - - -# SIG # Begin signature block -# MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor -# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA8mcJQtweKaz3m -# h+DkA4pqRJx/uE0UBm0+YGyaPKMJIKCCDYUwggYDMIID66ADAgECAhMzAAACzfNk -# v/jUTF1RAAAAAALNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NjAyWhcNMjMwNTExMjA0NjAyWjB0MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDrIzsY62MmKrzergm7Ucnu+DuSHdgzRZVCIGi9CalFrhwtiK+3FIDzlOYbs/zz -# HwuLC3hir55wVgHoaC4liQwQ60wVyR17EZPa4BQ28C5ARlxqftdp3H8RrXWbVyvQ -# aUnBQVZM73XDyGV1oUPZGHGWtgdqtBUd60VjnFPICSf8pnFiit6hvSxH5IVWI0iO -# nfqdXYoPWUtVUMmVqW1yBX0NtbQlSHIU6hlPvo9/uqKvkjFUFA2LbC9AWQbJmH+1 -# uM0l4nDSKfCqccvdI5l3zjEk9yUSUmh1IQhDFn+5SL2JmnCF0jZEZ4f5HE7ykDP+ -# oiA3Q+fhKCseg+0aEHi+DRPZAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU0WymH4CP7s1+yQktEwbcLQuR9Zww -# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh -# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzQ3MDUzMDAfBgNVHSMEGDAW -# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw -# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov -# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx -# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB -# AE7LSuuNObCBWYuttxJAgilXJ92GpyV/fTiyXHZ/9LbzXs/MfKnPwRydlmA2ak0r -# GWLDFh89zAWHFI8t9JLwpd/VRoVE3+WyzTIskdbBnHbf1yjo/+0tpHlnroFJdcDS -# MIsH+T7z3ClY+6WnjSTetpg1Y/pLOLXZpZjYeXQiFwo9G5lzUcSd8YVQNPQAGICl -# 2JRSaCNlzAdIFCF5PNKoXbJtEqDcPZ8oDrM9KdO7TqUE5VqeBe6DggY1sZYnQD+/ -# LWlz5D0wCriNgGQ/TWWexMwwnEqlIwfkIcNFxo0QND/6Ya9DTAUykk2SKGSPt0kL -# tHxNEn2GJvcNtfohVY/b0tuyF05eXE3cdtYZbeGoU1xQixPZAlTdtLmeFNly82uB -# VbybAZ4Ut18F//UrugVQ9UUdK1uYmc+2SdRQQCccKwXGOuYgZ1ULW2u5PyfWxzo4 -# BR++53OB/tZXQpz4OkgBZeqs9YaYLFfKRlQHVtmQghFHzB5v/WFonxDVlvPxy2go -# a0u9Z+ZlIpvooZRvm6OtXxdAjMBcWBAsnBRr/Oj5s356EDdf2l/sLwLFYE61t+ME -# iNYdy0pXL6gN3DxTVf2qjJxXFkFfjjTisndudHsguEMk8mEtnvwo9fOSKT6oRHhM -# 9sZ4HTg/TTMjUljmN3mBYWAWI5ExdC1inuog0xrKmOWVMIIHejCCBWKgAwIBAgIK -# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV -# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv -# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm -# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw -# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE -# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD -# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG -# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la -# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc -# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D -# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ -# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk -# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 -# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd -# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL -# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd -# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 -# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS -# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI -# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL -# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD -# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv -# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 -# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF -# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h -# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA -# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn -# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 -# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b -# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ -# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy -# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp -# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi -# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb -# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS -# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL -# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX -# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x -# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt -# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p -# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAALN82S/+NRMXVEAAAAA -# As0wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw -# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAMG -# 58z80ywcHQnfp2LHtDUOESyh/Iw7rj816YBTK9dHMEIGCisGAQQBgjcCAQwxNDAy -# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20wDQYJKoZIhvcNAQEBBQAEggEAEAk1eid3w3rHvq7VrMZEFGvJ4JokwT8JSZg/ -# wZHk3v/voSdWOuD6UNbpPPFh1hDsa3qWtuIYxLSCLrhDjlTI9Q6RuJ3MM7syRgr9 -# 9WOC84hNiRiTsUdmqAkbDPtskRRcvhmdiN0zHfaA73GqSAYznP9ll9seDroAibmB -# tbWw+IJ3vk0z1drzZ/4uKVMqqSaZ1o0mfPZRF9knWikcDowICOuy5+kl5jPQB+af -# EHuiVonnn6RtfwfVRp+/HaUSWZagLgBfviwBhrsiuVlYerLcHWnDJHaBtnMJMCgK -# VCz9YtGB1vTMA+DC+Sg7lfsTD/s4IzlyL6pyd+nwF+R64LWVmKGCFywwghcoBgor -# BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI -# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE -# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCgKNczUTYiGgzxkp0Fm8yFNC4mnlvUlj3T -# 1bH9iWQ+7wIGY3TfQGOyGBMyMDIyMTIwMTExMjYxNi45NTlaMASAAgH0oIHYpIHV -# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH -# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL -# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT -# HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv -# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAGz/iXO -# KRsbihwAAQAAAbMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV -# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv -# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg -# UENBIDIwMTAwHhcNMjIwOTIwMjAyMjAzWhcNMjMxMjE0MjAyMjAzWjCB0jELMAkG -# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx -# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z -# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg -# VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt -# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALR8 -# D7rmGICuLLBggrK9je3hJSpc9CTwbra/4Kb2eu5DZR6oCgFtCbigMuMcY31QlHr/ -# 3kuWhHJ05n4+t377PHondDDbz/dU+q/NfXSKr1pwU2OLylY0sw531VZ1sWAdyD2E -# QCEzTdLD4KJbC6wmAConiJBAqvhDyXxJ0Nuvlk74rdVEvribsDZxzClWEa4v62EN -# j/HyiCUX3MZGnY/AhDyazfpchDWoP6cJgNCSXmHV9XsJgXJ4l+AYAgaqAvN8N+Ep -# N+0TErCgFOfwZV21cg7vgenOV48gmG/EMf0LvRAeirxPUu+jNB3JSFbW1WU8Z5xs -# LEoNle35icdET+G3wDNmcSXlQYs4t94IWR541+PsUTkq0kmdP4/1O4GD54ZsJ5eU -# nLaawXOxxT1fgbWb9VRg1Z4aspWpuL5gFwHa8UNMRxsKffor6qrXVVQ1OdJOS1Jl -# evhpZlssSCVDodMc30I3fWezny6tNOofpfaPrtwJ0ukXcLD1yT+89u4uQB/rqUK6 -# J7HpkNu0fR5M5xGtOch9nyncO9alorxDfiEdb6zeqtCfcbo46u+/rfsslcGSuJFz -# lwENnU+vQ+JJ6jJRUrB+mr51zWUMiWTLDVmhLd66//Da/YBjA0Bi0hcYuO/WctfW -# k/3x87ALbtqHAbk6i1cJ8a2coieuj+9BASSjuXkBAgMBAAGjggFJMIIBRTAdBgNV -# HQ4EFgQU0BpdwlFnUgwYizhIIf9eBdyfw40wHwYDVR0jBBgwFoAUn6cVXQBeYl2D -# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv -# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy -# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov -# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l -# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB -# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD -# ggIBAFqGuzfOsAm4wAJfERmJgWW0tNLLPk6VYj53+hBmUICsqGgj9oXNNatgCq+j -# Ht03EiTzVhxteKWOLoTMx39cCcUJgDOQIH+GjuyjYVVdOCa9Fx6lI690/OBZFlz2 -# DDuLpUBuo//v3e4Kns412mO3A6mDQkndxeJSsdBSbkKqccB7TC/muFOhzg39mfij -# GICc1kZziJE/6HdKCF8p9+vs1yGUR5uzkIo+68q/n5kNt33hdaQ234VEh0wPSE+d -# CgpKRqfxgYsBT/5tXa3e8TXyJlVoG9jwXBrKnSQb4+k19jHVB3wVUflnuANJRI9a -# zWwqYFKDbZWkfQ8tpNoFfKKFRHbWomcodP1bVn7kKWUCTA8YG2RlTBtvrs3CqY3m -# ADTJUig4ckN/MG6AIr8Q+ACmKBEm4OFpOcZMX0cxasopdgxM9aSdBusaJfZ3Itl3 -# vC5C3RE97uURsVB2pvC+CnjFtt/PkY71l9UTHzUCO++M4hSGSzkfu+yBhXMGeBZq -# LXl9cffgYPcnRFjQT97Gb/bg4ssLIFuNJNNAJub+IvxhomRrtWuB4SN935oMfvG5 -# cEeZ7eyYpBZ4DbkvN44ZvER0EHRakL2xb1rrsj7c8I+auEqYztUpDnuq6BxpBIUA -# lF3UDJ0SMG5xqW/9hLMWnaJCvIerEWTFm64jthAi0BDMwnCwMIIHcTCCBVmgAwIB -# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE -# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc -# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 -# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 -# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu -# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv -# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC -# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O -# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn -# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t -# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq -# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP -# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW -# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv -# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb -# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten -# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc -# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a -# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB -# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU -# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw -# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E -# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB -# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ -# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ -# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p -# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB -# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v -# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h -# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x -# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p -# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A -# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC -# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB -# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt -# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 -# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV -# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 -# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw -# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB -# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl -# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk -# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U -# aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0 -# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAcYtE6JbdHhKlwkJe -# KoCV1JIkDmGggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu -# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv -# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN -# BgkqhkiG9w0BAQUFAAIFAOcyesgwIhgPMjAyMjEyMDEwODU4NDhaGA8yMDIyMTIw -# MjA4NTg0OFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA5zJ6yAIBADAKAgEAAgIH -# jQIB/zAHAgEAAgIRzDAKAgUA5zPMSAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor -# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA -# A4GBAAZexXr58KNoQ/8ZAkq/55e7fVH7TjF1KzYT7n9zP99xzZmA+yzbPrzbweIG -# p0hdM412/QZBw5Fg4a9qWS0Op3juHEkcXXV/YRgbyy42YF7O4u6axLh/w07SPzlt -# rb8l8RuLGG1UD0jvWGvFiN97wV28R5YAnKBFv2/E7qKni49EMYIEDTCCBAkCAQEw -# gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT -# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE -# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAGz/iXOKRsbihwA -# AQAAAbMwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B -# CRABBDAvBgkqhkiG9w0BCQQxIgQgGDkKCNxf6kaOKWqBviQFV1AuNlOk9vvlymJ7 -# iq/jhn0wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCGoTPVKhDSB7ZG0zJQ -# ZUM2jk/ll1zJGh6KOhn76k+/QjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w -# IFBDQSAyMDEwAhMzAAABs/4lzikbG4ocAAEAAAGzMCIEICuouCmv0kMUUmlvbpJr -# QPZqfFA4yUrfWLg06qr96duyMA0GCSqGSIb3DQEBCwUABIICAB9g7+7ioqqA4ikb -# lGzx2x9d0pedpXr1TcBlk0rc7wjM3Sa65/z/a46lOfX2cJoZzVY3a+n0xzCJoYWy -# pHYyDZTXyEZGlo5iq0JvqmSp5Zk4AelRLqZf701OPk+96K9X9w4MPu2DvBAB19lj -# EiIsTIBSI1ERVNzvNY1i7WxxOAQsUaFz90lFhv+8N7gdMIviubl6Ctx/ZKuqoiA2 -# DEPdlPiWK5GaYWwIQ1ctUMO7LrYsTXS/H5nKt4R8JC2a4/+ZcaStKzCQzGKFJ4d2 -# HQ0htvm1WMihxFGU7O/ZBV4o22yPsfQHdJwu1ofgSbjmwoFe1PCOv6sy/kTA9qeQ -# 9ykozGV5nHj1prX/3UxGDVANO/ePa6ryvaCZYixEDlrUjydymYI02OK0m0EPM0jK -# ZX9T1FjlnCgiIUtodharIRcfMBlQDfMyq7rFq/6kbgne9BMz1skneh+PzICNBbwc -# mnss5iarpmPKDoaAMD55BNCP1ILhU4Psp9Zgg4flVSJ+/eCj3AwuxkiPsdA93DYg -# fNEJmQMKYOMPUzeLqVq76nfuYRtp4BI6Bcv1jvhzLtEP62zYYAnuwhI5XPLX/xNU -# 9R2ce3nq9CBJ+1G/2d/0+IarVa28qIWrKQ83bTl/zxR3R63wYMGIWntqbN/pFFVU -# 5qiR/wQ4Fnyd1XyQTAZQlk7dVe2S -# SIG # End signature block diff --git a/Modules/Az.Accounts/2.10.4/Az.Accounts.psm1 b/Modules/Az.Accounts/2.10.4/Az.Accounts.psm1 deleted file mode 100644 index 769b61244ffb..000000000000 --- a/Modules/Az.Accounts/2.10.4/Az.Accounts.psm1 +++ /dev/null @@ -1,377 +0,0 @@ -# -# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session. -# -# Generated by: Microsoft Corporation -# -# Generated on: 12/01/2022 09:45:18 -# - -$PSDefaultParameterValues.Clear() -Set-StrictMode -Version Latest - -function Test-DotNet -{ - try - { - if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) - { - throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." - } - } - catch [System.Management.Automation.DriveNotFoundException] - { - Write-Verbose ".NET Framework version check failed." - } -} - -function Preload-Assembly { - param ( - [string] - $AssemblyDirectory - ) - if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) - { - try - { - Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { - try - { - Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null - } - catch { - Write-Verbose $_ - } - } - } - catch {} - } -} - -if ($true -and ($PSEdition -eq 'Desktop')) -{ - if ($PSVersionTable.PSVersion -lt [Version]'5.1') - { - throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." - } - - Test-DotNet -} - -if ($true -and ($PSEdition -eq 'Core')) -{ - if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') - { - throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." - } - if ($PSVersionTable.PSVersion -lt [Version]'7.0.6') - { - Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle." - } -} - -if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) -{ - Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { - . $_.FullName - } -} - -if (Get-Module AzureRM.profile -ErrorAction Ignore) -{ - Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") - throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") -} - -$preloadPath = (Join-Path $PSScriptRoot -ChildPath "PreloadAssemblies") -Preload-Assembly -AssemblyDirectory $preloadPath -$preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") -Preload-Assembly -AssemblyDirectory $preloadPath - -$netCorePath = (Join-Path $PSScriptRoot -ChildPath "NetCoreAssemblies") -if($PSEdition -eq 'Core' -and (Test-Path $netCorePath -ErrorAction Ignore)) -{ - try - { - $loadedAssemblies = ([System.AppDomain]::CurrentDomain.GetAssemblies() | ForEach-Object {New-Object -TypeName System.Reflection.AssemblyName -ArgumentList $_.FullName} ) - Get-ChildItem -ErrorAction Stop -Path $netCorePath -Filter "*.dll" | ForEach-Object { - $assemblyName = ([System.Reflection.AssemblyName]::GetAssemblyName($_.FullName)) - $matches = ($loadedAssemblies | Where-Object {$_.Name -eq $assemblyName.Name}) - if (-not $matches) - { - try - { - Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null - } - catch { - Write-Verbose $_ - } - } - } - } - catch {} -} - - -Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll) - - -if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) -{ - Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { - . $_.FullName - } -} - -$FilteredCommands = @() - -if ($Env:ACC_CLOUD -eq $null) -{ - $FilteredCommands | ForEach-Object { - - $existingDefault = $false - foreach ($key in $global:PSDefaultParameterValues.Keys) - { - if ($_ -like "$key") - { - $existingDefault = $true - } - } - - if (!$existingDefault) - { - $global:PSDefaultParameterValues.Add($_, - { - if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) - { - $context = Get-AzureRmContext - } - else - { - $context = Get-AzContext - } - if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { - $context.ExtendedProperties["Default Resource Group"] - } - }) - } - } -} - -[Microsoft.Azure.Commands.Profile.Utilities.CommandNotFoundHelper]::RegisterCommandNotFoundAction($ExecutionContext.InvokeCommand) - -# SIG # Begin signature block -# MIInrQYJKoZIhvcNAQcCoIInnjCCJ5oCAQExDzANBglghkgBZQMEAgEFADB5Bgor -# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCOha+soX44DX1J -# uOAv2rkeipX6ooIRox2Fj7VKuuWVOqCCDYEwggX/MIID56ADAgECAhMzAAACzI61 -# lqa90clOAAAAAALMMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NjAxWhcNMjMwNTExMjA0NjAxWjB0MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQCiTbHs68bADvNud97NzcdP0zh0mRr4VpDv68KobjQFybVAuVgiINf9aG2zQtWK -# No6+2X2Ix65KGcBXuZyEi0oBUAAGnIe5O5q/Y0Ij0WwDyMWaVad2Te4r1Eic3HWH -# UfiiNjF0ETHKg3qa7DCyUqwsR9q5SaXuHlYCwM+m59Nl3jKnYnKLLfzhl13wImV9 -# DF8N76ANkRyK6BYoc9I6hHF2MCTQYWbQ4fXgzKhgzj4zeabWgfu+ZJCiFLkogvc0 -# RVb0x3DtyxMbl/3e45Eu+sn/x6EVwbJZVvtQYcmdGF1yAYht+JnNmWwAxL8MgHMz -# xEcoY1Q1JtstiY3+u3ulGMvhAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUiLhHjTKWzIqVIp+sM2rOHH11rfQw -# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1 -# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDcwNTI5MB8GA1UdIwQYMBaAFEhu -# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu -# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w -# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3 -# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx -# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAeA8D -# sOAHS53MTIHYu8bbXrO6yQtRD6JfyMWeXaLu3Nc8PDnFc1efYq/F3MGx/aiwNbcs -# J2MU7BKNWTP5JQVBA2GNIeR3mScXqnOsv1XqXPvZeISDVWLaBQzceItdIwgo6B13 -# vxlkkSYMvB0Dr3Yw7/W9U4Wk5K/RDOnIGvmKqKi3AwyxlV1mpefy729FKaWT7edB -# d3I4+hldMY8sdfDPjWRtJzjMjXZs41OUOwtHccPazjjC7KndzvZHx/0VWL8n0NT/ -# 404vftnXKifMZkS4p2sB3oK+6kCcsyWsgS/3eYGw1Fe4MOnin1RhgrW1rHPODJTG -# AUOmW4wc3Q6KKr2zve7sMDZe9tfylonPwhk971rX8qGw6LkrGFv31IJeJSe/aUbG -# dUDPkbrABbVvPElgoj5eP3REqx5jdfkQw7tOdWkhn0jDUh2uQen9Atj3RkJyHuR0 -# GUsJVMWFJdkIO/gFwzoOGlHNsmxvpANV86/1qgb1oZXdrURpzJp53MsDaBY/pxOc -# J0Cvg6uWs3kQWgKk5aBzvsX95BzdItHTpVMtVPW4q41XEvbFmUP1n6oL5rdNdrTM -# j/HXMRk1KCksax1Vxo3qv+13cCsZAaQNaIAvt5LvkshZkDZIP//0Hnq7NnWeYR3z -# 4oFiw9N2n3bb9baQWuWPswG0Dq9YT9kb+Cs4qIIwggd6MIIFYqADAgECAgphDpDS -# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK -# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 -# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 -# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla -# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS -# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT -# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB -# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG -# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S -# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz -# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7 -# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u -# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33 -# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl -# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP -# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB -# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF -# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM -# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ -# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud -# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO -# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0 -# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y -# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p -# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y -# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB -# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw -# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA -# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY -# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj -# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd -# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ -# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf -# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ -# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j -# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B -# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96 -# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7 -# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I -# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIZgjCCGX4CAQEwgZUwfjELMAkG -# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx -# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z -# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAsyOtZamvdHJTgAAAAACzDAN -# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor -# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgCUq0ayUc -# jz7hHFZ7azicB12dzivXzqkrecqR+eVcei8wQgYKKwYBBAGCNwIBDDE0MDKgFIAS -# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN -# BgkqhkiG9w0BAQEFAASCAQAmjpiGDCDxSDgg4F1+/7Uuomc1TgnZV3/Eo2iCQYiQ -# 92dBGrniPLL0QCMMTmLpeUwFlbw5t/McLfOClj5u7gk3V1S339N2+EWLvvc/JTRl -# IkeLEg16QVymjwQpLsGp8pIZ2veHRWr9ruSqKZNpZB77uZDKsqwPgLbcqL1sO6pB -# DzC3ZhQ8P+5eVZq2uRuvn2cCdLCxfsujFM+arGJlIu4WCcwFQRh3w2l0nYH/CWEg -# N8y9OZAQ9Na4vDcstlxxJvIZwihX6k6eMeH+TU+hIlUuXxWKkZuGTpYMjYb6KT0d -# HkatPwwBxfTkM+dKeA85yOTtbCz+jftlyJeP2pXaB67AoYIXDDCCFwgGCisGAQQB -# gjcDAwExghb4MIIW9AYJKoZIhvcNAQcCoIIW5TCCFuECAQMxDzANBglghkgBZQME -# AgEFADCCAVUGCyqGSIb3DQEJEAEEoIIBRASCAUAwggE8AgEBBgorBgEEAYRZCgMB -# MDEwDQYJYIZIAWUDBAIBBQAEIN62ZOsGrcgyDywmOuqHX/GH5LmiUODdzz91mVyp -# WZyiAgZjc8fPkXgYEzIwMjIxMjAxMTAxNjA2LjQ4N1owBIACAfSggdSkgdEwgc4x -# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt -# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1p -# Y3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMg -# VFNTIEVTTjo0RDJGLUUzREQtQkVFRjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt -# U3RhbXAgU2VydmljZaCCEV8wggcQMIIE+KADAgECAhMzAAABsKHjgzLojTvAAAEA -# AAGwMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo -# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y -# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw -# MB4XDTIyMDMwMjE4NTE0MloXDTIzMDUxMTE4NTE0Mlowgc4xCzAJBgNVBAYTAlVT -# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK -# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVy -# YXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo0RDJG -# LUUzREQtQkVFRjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vydmlj -# ZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJzGbTsM19KCnQc5RC7V -# oglySXMKLut/yWWPQWD6VAlJgBexVKx2n1zgX3o/xA2ZgZ/NFGcgNDRCJ7mJiOeW -# 7xeHnoNXPlg7EjYWulfk3oOAj6a7O15GvckpYsvLcx+o8Se8CrfIb40EJ8W0Qx4T -# IXf0yDwAJ4/qO94dJ/hGabeJYg4Gp0G0uQmhwFovAWTHlD1ci+sp36AxT9wIhHqw -# /70tzMvrnDF7jmQjaVUPnjOgPOyFWZiVr7e6rkSl4anT1tLv23SWhXqMs14wolv4 -# ZeQcWP84rV2Frr1KbwkIa0vlHjlv4xG9a6nlTRfo0CYUQDfrZOMXCI5KcAN2BZ6f -# Vb09qtCdsWdNNxB0y4lwMjnuNmx85FNfzPcMZjmwAF9aRUUMLHv626I67t1+dZoV -# PpKqfSNmGtVt9DETWkmDipnGg4+BdTplvgGVq9F3KZPDFHabxbLpSWfXW90MZXOu -# FH8yCMzDJNUzeyAqytFFyLZir3j4T1Gx7lReCOUPw1puVzbWKspV7ModZjtN/IUW -# dVIdk3HPp4QN1wwdVvdXOsYdhG8kgjGyAZID5or7C/75hyKQb5F0Z+Ee04uY9K+s -# DZ3l3z8TQZWAfYurbZCMWWnmJVsu5V4PR5PO+U6D7tAtMvMULNYibT9+sxVZK/WQ -# er2JJ9q3Z7ljFs4lgpmfc6AVAgMBAAGjggE2MIIBMjAdBgNVHQ4EFgQUOt8BJDcB -# Jm4dy6ASZHrXIEfWNj8wHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIw -# XwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w -# cy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3Js -# MGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3Nv -# ZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB -# JTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcD -# CDANBgkqhkiG9w0BAQsFAAOCAgEA3XPih5sNtUfAyLnlXq6MZSpCh0TF+uG+nhIJ -# 44//cMcQGEViZ2N263NwvrQjCFOni/+oxf76jcmUhcKWLXk9hhd7vfFBhZZzcF5a -# Ns07Uligs24pveasFuhmJ4y82OYm1G1ORYsFndZdvF//NrYGxaXqUNlRHQlskV/p -# mccqO3Oi6wLHcPB1/WRTLJtYbIiiwE/uTFEFEL45wWD/1mTCPEkFX3hliXEypxXz -# dZ1k6XqGTysGAtLXUB7IC6CH26YygKQuXG8QjcJBAUG/9F3yNZOdbFvn7FinZyNc -# IVLxld7h0bELfQzhIjelj+5sBKhLcaFU0vbjbmf0WENgFmnyJNiMrL7/2FYOLsgi -# QDbJx6Dpy1EfvuRGsdL5f+jVVds5oMaKrhxgV7oEobrA6Z56nnWYN47swwouucHf -# 0ym1DQWHy2DHOFRRN7yv++zes0GSCOjRRYPK7rr1Qc+O3nsd604Ogm5nR9QqhOOc -# 2OQTrvtSgXBStu5vF6W8DPcsns53cQ4gdcR1Y9Ng5IYEwxCZzzYsq9oalxlH+ZH/ -# A6J7ZMeSNKNkrXPx6ppFXUxHuC3k4mzVyZNGWP/ZgcUOi2qV03m6Imytvi1kfGe6 -# YdCh32POgWeNH9lfKt+d1M+q4IhJLmX0E2ZZICYEb9Q0romeMX8GZ+cbhuNsFimJ -# ga/fjjswggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3 -# DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G -# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIw -# MAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAx -# MDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVT -# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK -# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l -# LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA -# 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/ -# XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1 -# hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7 -# M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3K -# Ni1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy -# 1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF80 -# 3RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQc -# NIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahha -# YQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkL -# iWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV -# 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG -# CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUp -# zxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBT -# MFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jv -# c29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYI -# KwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGG -# MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186a -# GMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3Br -# aS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsG -# AQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29t -# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN -# AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1 -# OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYA -# A7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbz -# aN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6L -# GYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3m -# Sj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0 -# SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxko -# JLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFm -# PWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC482 -# 2rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7 -# vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC0jCC -# AjsCAQEwgfyhgdSkgdEwgc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n -# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y -# YXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNv -# MSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo0RDJGLUUzREQtQkVFRjElMCMGA1UE -# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA -# Ap4vkN3fD5FNBVYZklZeS/JFPBiggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG -# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj -# cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt -# cCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOcytOIwIhgPMjAyMjEyMDEwOTA2 -# NDJaGA8yMDIyMTIwMjA5MDY0MlowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA5zK0 -# 4gIBADAKAgEAAgIE2QIB/zAHAgEAAgIRSTAKAgUA5zQGYgIBADA2BgorBgEEAYRZ -# CgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0G -# CSqGSIb3DQEBBQUAA4GBAECK9MFramy9gicImH5psA+aRNjVzkRgXEr2G/n3zCt4 -# 0GB7NfGNkgHfU+QOe3ikueh6yRn5VkVbTYzLgZumT7nAJqMWxmAhiiAq6V7+9QVG -# PrZfIsud1SLz5/hi9Mu1cpYY/546CYVb6Xvir1lz2UpmvOp8plJzdhzgOkJEsdPD -# MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 -# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh -# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA -# AAGwoeODMuiNO8AAAQAAAbAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ -# AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgvfPYnWc1+Qn3iiG0/AAE -# dejdsfW9YF5oZhRnA7b6VLUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDN -# BgtDd8uf9KTjGf1G67IfKmcNFJmeWTd6ilAy5xWEoDCBmDCBgKR+MHwxCzAJBgNV -# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w -# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m -# dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABsKHjgzLojTvAAAEAAAGwMCIEIPyJ -# 0NFMJRzXKgxZnHH3gusCnuTXpg1uTrdgC9ZNXKzlMA0GCSqGSIb3DQEBCwUABIIC -# AC9S7+OVOhjUINKKOVKOviz51585Tv0HwdX+HtKbNm5g0BiXbQ9CKc3TR9qIwnXe -# B4KP8dYh7K4R4TKP3Ahkrhak61SNfdGXm9IRjU6lkpbT0/8ykxgEEDqL4I9zzix5 -# otykHwxGnpw79llogNS988U7KurTye0c+y5SaKX7Z+BbPFTLjfZZ3msRSNdEOx4d -# 1pM+7ok8xy/ZRXn4ry5MQQGr33rPr4lOAHn5PLehiRhGCmkoQUolppd9J8qFuYK5 -# 0rApqcU2SRdPB/o8HSJdJaDCIG28tX1JqdFNc+PV1kJ2vpvECfg1pvrjoMQ6dPrd -# 7mg25LItHdfNxuFRnCbK76uAtZqdaPlSYDHHMjAGIkQZOn5iJ2F+bJDPC+3RHtSd -# 6LfluIbU+SSaeXnC7uYGkImZS6UCktVncYAkzj7+JoCIMfK9fqqLd3yEznVZ7g3y -# Hp3Z83dZH5JmviJoSZjdWzVeEyOjZUnc86qpr+wN6vQdX09o82Q3iIcaCqAMKmgM -# 4BAJ04rXtnGzjFLH/gUdOelLqU3ZL3wArj6YBsVjpeWKMFDl4wOIQmGDmvY8ltDJ -# OetFQbmFPrfvhUh6DH4nRv2zq7g2XcTsrGrYceDwEYGGwebFjnZEY3+a2f231qpp -# E8608RWz8EqS8JV9ivOfRAQGjB3T3ufs/GBoXct+MGDi -# SIG # End signature block diff --git a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Azure.Core.dll b/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Azure.Core.dll deleted file mode 100644 index bd1d09299b62..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Azure.Core.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Azure.Identity.dll b/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Azure.Identity.dll deleted file mode 100644 index 5662a76ad958..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Azure.Identity.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll b/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll deleted file mode 100644 index 02168e3b1856..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.Identity.Client.dll b/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.Identity.Client.dll deleted file mode 100644 index 083d76fc19ac..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.Identity.Client.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/FuzzySharp.dll b/Modules/Az.Accounts/2.10.4/FuzzySharp.dll deleted file mode 100644 index 5ab74bc0dd38..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/FuzzySharp.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.ApplicationInsights.dll b/Modules/Az.Accounts/2.10.4/Microsoft.ApplicationInsights.dll deleted file mode 100644 index e7c2bf178989..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.ApplicationInsights.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll deleted file mode 100644 index 26c3436b6205..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.ResourceManager.deps.json b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.ResourceManager.deps.json deleted file mode 100644 index 489b7002c380..000000000000 --- a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.ResourceManager.deps.json +++ /dev/null @@ -1,1782 +0,0 @@ -{ - "runtimeTarget": { - "name": ".NETStandard,Version=v2.0/", - "signature": "" - }, - "compilationOptions": {}, - "targets": { - ".NETStandard,Version=v2.0": {}, - ".NETStandard,Version=v2.0/": { - "Microsoft.Azure.PowerShell.Authentication.ResourceManager/1.0.0": { - "dependencies": { - "Azure.Core": "1.25.0", - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication": "1.0.0", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Aks": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Authorization": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Compute": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.KeyVault": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Monitor": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Network": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.PolicyInsights": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Storage.Management": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Websites": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Storage": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Strategies": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "NETStandard.Library": "2.0.3", - "Newtonsoft.Json": "10.0.3", - "PowerShellStandard.Library": "5.1.0" - }, - "runtime": { - "Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll": {} - } - }, - "Azure.Core/1.25.0": { - "dependencies": { - "Microsoft.Bcl.AsyncInterfaces": "1.1.1", - "System.Diagnostics.DiagnosticSource": "4.6.0", - "System.Memory.Data": "1.0.2", - "System.Numerics.Vectors": "4.5.0", - "System.Text.Encodings.Web": "4.7.2", - "System.Text.Json": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/Azure.Core.dll": { - "assemblyVersion": "1.25.0.0", - "fileVersion": "1.2500.22.33004" - } - } - }, - "Azure.Identity/1.6.1": { - "dependencies": { - "Azure.Core": "1.25.0", - "Microsoft.Identity.Client": "4.46.2", - "Microsoft.Identity.Client.Extensions.Msal": "2.23.0", - "System.Memory": "4.5.4", - "System.Security.Cryptography.ProtectedData": "4.7.0", - "System.Text.Json": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/Azure.Identity.dll": { - "assemblyVersion": "1.6.1.0", - "fileVersion": "1.600.122.40803" - } - } - }, - "Hyak.Common/1.2.2": { - "dependencies": { - "NETStandard.Library": "2.0.3", - "Newtonsoft.Json": "10.0.3", - "System.Reflection": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.4/Hyak.Common.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.2.2.0" - } - } - }, - "Microsoft.ApplicationInsights/2.13.1": { - "dependencies": { - "System.Diagnostics.DiagnosticSource": "4.6.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.ApplicationInsights.dll": { - "assemblyVersion": "2.13.1.12554", - "fileVersion": "2.13.1.12554" - } - } - }, - "Microsoft.Azure.Common/2.2.1": { - "dependencies": { - "Hyak.Common": "1.2.2", - "NETStandard.Library": "2.0.3" - }, - "runtime": { - "lib/netstandard1.4/Microsoft.Azure.Common.dll": { - "assemblyVersion": "2.0.0.0", - "fileVersion": "2.2.1.0" - } - } - }, - "Microsoft.Azure.PowerShell.Authentication.Abstractions/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Aks/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Aks.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Authorization/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Authorization.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Compute/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Compute.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.KeyVault/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.NonGeneric": "4.3.0", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.KeyVault.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Monitor/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Monitor.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Network/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Network.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.PolicyInsights/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.ResourceManager/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Storage.Management/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "System.Collections.NonGeneric": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Websites/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Websites.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Common/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Common.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Common.Share/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Common.Share.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Storage/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Storage.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Strategies/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Strategies.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Bcl.AsyncInterfaces/1.1.1": { - "dependencies": { - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Bcl.AsyncInterfaces.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "4.700.20.21406" - } - } - }, - "Microsoft.CSharp/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Dynamic.Runtime": "4.3.0", - "System.Globalization": "4.3.0", - "System.Linq": "4.3.0", - "System.Linq.Expressions": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/Microsoft.CSharp.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "Microsoft.Identity.Client/4.46.2": { - "dependencies": { - "Microsoft.IdentityModel.Abstractions": "6.22.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Identity.Client.dll": { - "assemblyVersion": "4.46.2.0", - "fileVersion": "4.46.2.0" - } - } - }, - "Microsoft.Identity.Client.Extensions.Msal/2.23.0": { - "dependencies": { - "Microsoft.Identity.Client": "4.46.2", - "System.IO.FileSystem.AccessControl": "5.0.0", - "System.Security.Cryptography.ProtectedData": "4.7.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Identity.Client.Extensions.Msal.dll": { - "assemblyVersion": "2.23.0.0", - "fileVersion": "2.23.0.0" - } - } - }, - "Microsoft.IdentityModel.Abstractions/6.22.0": { - "runtime": { - "lib/netstandard2.0/Microsoft.IdentityModel.Abstractions.dll": { - "assemblyVersion": "6.22.0.0", - "fileVersion": "6.22.0.30727" - } - } - }, - "Microsoft.NETCore.Platforms/1.1.0": {}, - "Microsoft.NETCore.Targets/1.1.0": {}, - "Microsoft.Rest.ClientRuntime/2.3.24": { - "dependencies": { - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Rest.ClientRuntime.dll": { - "assemblyVersion": "2.0.0.0", - "fileVersion": "2.3.23.0" - } - } - }, - "Microsoft.Rest.ClientRuntime.Azure/3.3.19": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Rest.ClientRuntime.Azure.dll": { - "assemblyVersion": "3.0.0.0", - "fileVersion": "3.3.18.0" - } - } - }, - "NETStandard.Library/2.0.3": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0" - } - }, - "Newtonsoft.Json/10.0.3": { - "dependencies": { - "Microsoft.CSharp": "4.3.0", - "NETStandard.Library": "2.0.3", - "System.ComponentModel.TypeConverter": "4.3.0", - "System.Runtime.Serialization.Formatters": "4.3.0", - "System.Runtime.Serialization.Primitives": "4.3.0", - "System.Xml.XmlDocument": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/Newtonsoft.Json.dll": { - "assemblyVersion": "10.0.0.0", - "fileVersion": "10.0.3.21018" - } - } - }, - "PowerShellStandard.Library/5.1.0": {}, - "System.Buffers/4.5.1": { - "runtime": { - "lib/netstandard2.0/System.Buffers.dll": { - "assemblyVersion": "4.0.3.0", - "fileVersion": "4.6.28619.1" - } - } - }, - "System.Collections/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Collections.NonGeneric/4.3.0": { - "dependencies": { - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Collections.NonGeneric.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Collections.Specialized/4.3.0": { - "dependencies": { - "System.Collections.NonGeneric": "4.3.0", - "System.Globalization": "4.3.0", - "System.Globalization.Extensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Collections.Specialized.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.ComponentModel/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.ComponentModel.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.ComponentModel.Primitives/4.3.0": { - "dependencies": { - "System.ComponentModel": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.0/System.ComponentModel.Primitives.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.ComponentModel.TypeConverter/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Collections.NonGeneric": "4.3.0", - "System.Collections.Specialized": "4.3.0", - "System.ComponentModel": "4.3.0", - "System.ComponentModel.Primitives": "4.3.0", - "System.Globalization": "4.3.0", - "System.Linq": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.5/System.ComponentModel.TypeConverter.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Diagnostics.Debug/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Diagnostics.DiagnosticSource/4.6.0": { - "dependencies": { - "System.Memory": "4.5.4" - }, - "runtime": { - "lib/netstandard1.3/System.Diagnostics.DiagnosticSource.dll": { - "assemblyVersion": "4.0.4.0", - "fileVersion": "4.700.19.46214" - } - } - }, - "System.Dynamic.Runtime/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Linq": "4.3.0", - "System.Linq.Expressions": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Dynamic.Runtime.dll": { - "assemblyVersion": "4.0.12.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Globalization/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Globalization.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0" - } - }, - "System.IO/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.IO.FileSystem/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.IO.FileSystem.AccessControl/5.0.0": { - "dependencies": { - "System.Buffers": "4.5.1", - "System.Memory": "4.5.4", - "System.Security.AccessControl": "5.0.0", - "System.Security.Principal.Windows": "5.0.0" - }, - "runtime": { - "lib/netstandard2.0/System.IO.FileSystem.AccessControl.dll": { - "assemblyVersion": "5.0.0.0", - "fileVersion": "5.0.20.51904" - } - } - }, - "System.IO.FileSystem.Primitives/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.IO.FileSystem.Primitives.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Linq/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0" - }, - "runtime": { - "lib/netstandard1.6/System.Linq.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Linq.Expressions/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Linq": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Emit.Lightweight": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.6/System.Linq.Expressions.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Memory/4.5.4": { - "dependencies": { - "System.Buffers": "4.5.1", - "System.Numerics.Vectors": "4.5.0", - "System.Runtime.CompilerServices.Unsafe": "4.7.1" - }, - "runtime": { - "lib/netstandard2.0/System.Memory.dll": { - "assemblyVersion": "4.0.1.1", - "fileVersion": "4.6.28619.1" - } - } - }, - "System.Memory.Data/1.0.2": { - "dependencies": { - "System.Text.Encodings.Web": "4.7.2", - "System.Text.Json": "4.7.2" - }, - "runtime": { - "lib/netstandard2.0/System.Memory.Data.dll": { - "assemblyVersion": "1.0.2.0", - "fileVersion": "1.0.221.20802" - } - } - }, - "System.Numerics.Vectors/4.5.0": { - "runtime": { - "lib/netstandard2.0/System.Numerics.Vectors.dll": { - "assemblyVersion": "4.1.4.0", - "fileVersion": "4.6.26515.6" - } - } - }, - "System.ObjectModel/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.ObjectModel.dll": { - "assemblyVersion": "4.0.13.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Emit/4.3.0": { - "dependencies": { - "System.IO": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Reflection.Emit.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection.Emit.ILGeneration/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Reflection.Emit.ILGeneration.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection.Emit.Lightweight/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Reflection.Emit.Lightweight.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Primitives/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.TypeExtensions/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.5/System.Reflection.TypeExtensions.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Resources.ResourceManager/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Globalization": "4.3.0", - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0" - } - }, - "System.Runtime.CompilerServices.Unsafe/4.7.1": { - "runtime": { - "lib/netstandard2.0/System.Runtime.CompilerServices.Unsafe.dll": { - "assemblyVersion": "4.0.6.0", - "fileVersion": "4.700.20.12001" - } - } - }, - "System.Runtime.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime.Handles/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime.InteropServices/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Reflection": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0" - } - }, - "System.Runtime.Serialization.Formatters/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Reflection": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Serialization.Primitives": "4.3.0" - }, - "runtime": { - "lib/netstandard1.4/System.Runtime.Serialization.Formatters.dll": { - "assemblyVersion": "4.0.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Runtime.Serialization.Primitives/4.3.0": { - "dependencies": { - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Runtime.Serialization.Primitives.dll": { - "assemblyVersion": "4.1.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Security.AccessControl/5.0.0": { - "dependencies": { - "System.Security.Principal.Windows": "5.0.0" - }, - "runtime": { - "lib/netstandard2.0/System.Security.AccessControl.dll": { - "assemblyVersion": "5.0.0.0", - "fileVersion": "5.0.20.51904" - } - } - }, - "System.Security.Cryptography.Primitives/4.3.0": { - "dependencies": { - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading": "4.3.0", - "System.Threading.Tasks": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Security.Cryptography.Primitives.dll": { - "assemblyVersion": "4.0.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Security.Cryptography.ProtectedData/4.7.0": { - "dependencies": { - "System.Memory": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/System.Security.Cryptography.ProtectedData.dll": { - "assemblyVersion": "4.0.5.0", - "fileVersion": "4.700.19.56404" - } - } - }, - "System.Security.Principal.Windows/5.0.0": { - "runtime": { - "lib/netstandard2.0/System.Security.Principal.Windows.dll": { - "assemblyVersion": "5.0.0.0", - "fileVersion": "5.0.20.51904" - } - } - }, - "System.Security.SecureString/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Text.Encoding/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Text.Encoding.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0", - "System.Text.Encoding": "4.3.0" - } - }, - "System.Text.Encodings.Web/4.7.2": { - "dependencies": { - "System.Buffers": "4.5.1", - "System.Memory": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/System.Text.Encodings.Web.dll": { - "assemblyVersion": "4.0.5.1", - "fileVersion": "4.700.21.11602" - } - } - }, - "System.Text.Json/4.7.2": { - "dependencies": { - "Microsoft.Bcl.AsyncInterfaces": "1.1.1", - "System.Buffers": "4.5.1", - "System.Memory": "4.5.4", - "System.Numerics.Vectors": "4.5.0", - "System.Runtime.CompilerServices.Unsafe": "4.7.1", - "System.Text.Encodings.Web": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/System.Text.Json.dll": { - "assemblyVersion": "4.0.1.2", - "fileVersion": "4.700.20.21406" - } - } - }, - "System.Text.RegularExpressions/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.6/System.Text.RegularExpressions.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Threading/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0", - "System.Threading.Tasks": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Threading.dll": { - "assemblyVersion": "4.0.12.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Threading.Tasks/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Threading.Tasks.Extensions/4.5.4": { - "dependencies": { - "System.Runtime.CompilerServices.Unsafe": "4.7.1" - }, - "runtime": { - "lib/netstandard2.0/System.Threading.Tasks.Extensions.dll": { - "assemblyVersion": "4.2.0.1", - "fileVersion": "4.6.28619.1" - } - } - }, - "System.Xml.ReaderWriter/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.IO.FileSystem": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Text.Encoding.Extensions": "4.3.0", - "System.Text.RegularExpressions": "4.3.0", - "System.Threading.Tasks": "4.3.0", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard1.3/System.Xml.ReaderWriter.dll": { - "assemblyVersion": "4.1.0.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Xml.XmlDocument/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Xml.XmlDocument.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Xml.XmlSerializer/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Linq": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.RegularExpressions": "4.3.0", - "System.Threading": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0", - "System.Xml.XmlDocument": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Xml.XmlSerializer.dll": { - "assemblyVersion": "4.0.12.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "Microsoft.Azure.PowerShell.Authentication/1.0.0": { - "dependencies": { - "Azure.Core": "1.25.0", - "Azure.Identity": "1.6.1", - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Aks": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Authorization": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Compute": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.KeyVault": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Monitor": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Network": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.PolicyInsights": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Storage.Management": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Websites": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Storage": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Strategies": "1.3.67-preview", - "Microsoft.Identity.Client": "4.46.2", - "Microsoft.Identity.Client.Extensions.Msal": "2.23.0", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "Microsoft.Azure.PowerShell.Authentication.dll": {} - } - } - } - }, - "libraries": { - "Microsoft.Azure.PowerShell.Authentication.ResourceManager/1.0.0": { - "type": "project", - "serviceable": false, - "sha512": "" - }, - "Azure.Core/1.25.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-X8Dd4sAggS84KScWIjEbFAdt2U1KDolQopTPoHVubG2y3CM54f9l6asVrP5Uy384NWXjsspPYaJgz5xHc+KvTA==", - "path": "azure.core/1.25.0", - "hashPath": "azure.core.1.25.0.nupkg.sha512" - }, - "Azure.Identity/1.6.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-jgN1EHSa/qDkIIM4fxc+2+1/cpNAE65JFGk2g6mXZgXpgLqvVA9kz31aa5bY0oqPrtUp+ZfaMieF2v7rs+WRBg==", - "path": "azure.identity/1.6.1", - "hashPath": "azure.identity.1.6.1.nupkg.sha512" - }, - "Hyak.Common/1.2.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-uZpnFn48nSQwHcO0/GSBZ7ExaO0sTXKv8KariXXEWLaB4Q3AeQoprYG4WpKsCT0ByW3YffETivgc5rcH5RRDvQ==", - "path": "hyak.common/1.2.2", - "hashPath": "hyak.common.1.2.2.nupkg.sha512" - }, - "Microsoft.ApplicationInsights/2.13.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-BQhLmYR06Z8TVCdxnr8WOhhovJHtqYRNeB5gePBdQ4uDOE8D4IK9HW9i6a3llELz1QHv4HtFpku6dpXMGnO22g==", - "path": "microsoft.applicationinsights/2.13.1", - "hashPath": "microsoft.applicationinsights.2.13.1.nupkg.sha512" - }, - "Microsoft.Azure.Common/2.2.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-abzRooh4ACKjzAKxRB6r+SHKW3d+IrLcgtVG81D+3kQU/OMjAZS1oDp9CDalhSbmxa84u0MHM5N+AKeTtKPoiw==", - "path": "microsoft.azure.common/2.2.1", - "hashPath": "microsoft.azure.common.2.2.1.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Authentication.Abstractions/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-nHFO8TXWgxUlyBxsFxZk2NTiV18MeYxJYj1weApqpAlaHcHixJA7500OnUs+HqqaA66QAFmKYQ9Tr4r5cB8jLw==", - "path": "microsoft.azure.powershell.authentication.abstractions/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.authentication.abstractions.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Aks/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-vdHb0jV2i2dAcSwQA8IaH6nHAVb+eoO8aYYO8nJX9xMkciIyiLOVaBDH9U6CbrrlfDJ3/rnWeW+8WGNR6Fu5cg==", - "path": "microsoft.azure.powershell.clients.aks/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.aks.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Authorization/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ZXNfDic5HZiRwAtuBsH0NMXUhcCiX6mSrHVUb0EbOS374QYph2zB1zXiaG8DoclvUFE+nlyd5ZyH1cfqotwY0g==", - "path": "microsoft.azure.powershell.clients.authorization/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.authorization.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Compute/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-G1NIn7RlFPspoExrXiwCVLIj4wghjX+usciwC84in4+sDZFf3UFGj6HgU6wXlmSLN9BxqX9NFfJBi557lF+4rg==", - "path": "microsoft.azure.powershell.clients.compute/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.compute.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ALK2mcq/Gpfwm1bEQcq8FQNvZvF6PgN5jM5q3I1PAVS2u5F1UDa1tKjrjguSQIXLiE1Lthnwts3OaA03gNe3kA==", - "path": "microsoft.azure.powershell.clients.graph.rbac/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.graph.rbac.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.KeyVault/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-WGJeLeOs0KtL/tpSSm+l6fvkblh3uXTiog8uv3ADACGxzjaLB+d+0WE9uCxF21YTUxQ4ZhJxdQN+zQ6ggBcNbg==", - "path": "microsoft.azure.powershell.clients.keyvault/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.keyvault.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Monitor/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-mdd+N2hhB6t0KACILOc7b3G7bDO5fmfLpYnFuvWykxsUpD2y6MtBJl+DnJxz4LcUvjK5djEM8Le0wef1pmUmgg==", - "path": "microsoft.azure.powershell.clients.monitor/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.monitor.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Network/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-OX2mzGPquFfAGO/xqkRfM1spAywLMy9p7ThZmE69TVp+gbR6CGVd9ZL6OBM7Na/QTMlcMwD1rD4/BQx//8b0uQ==", - "path": "microsoft.azure.powershell.clients.network/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.network.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.PolicyInsights/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-owaa5B00b+wNU/iGBBeNIMTsc49prqfW/CfTVuQJSNTjxylpGNI6dxwQdgQXbcm0+x5mhy2YliqjzJvTdjTkog==", - "path": "microsoft.azure.powershell.clients.policyinsights/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.policyinsights.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.ResourceManager/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-1fGG2qDixHzSzH0HapF34faIBF0VeCnsO76lS6UxMBEZtCvgyKydhmR7FfPH72E+Opmay1i8rLkkvXKVqA6Zdg==", - "path": "microsoft.azure.powershell.clients.resourcemanager/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.resourcemanager.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Storage.Management/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-GfKe+wh2OqLU+NiIZERaw7+W/WZx9ASUikJ1lF8OiupuUgTW/uIUY46vOTB38nLF9g6YmYk6n0GXnVibivv5KQ==", - "path": "microsoft.azure.powershell.clients.storage.management/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.storage.management.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Websites/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iYvqqHCRfpaya3p1vV3bEXqecc2GHraEGlTn1scHLLrg0zTwLXxq0AAiGX9uzzPcGgByubvgw263T0tlLJ4BUg==", - "path": "microsoft.azure.powershell.clients.websites/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.websites.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Common/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-T42Yq1XesvgiTziZ6EHXz9RHP70pQYtw8UUXRYyuGV2D7u5r5euiMXDyLhpYxvgk0HKGr/Fi4f0c/iocrkHbyg==", - "path": "microsoft.azure.powershell.common/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.common.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Common.Share/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VU1zooS2hmazP/GXN/RjD8VXy3JjtrzMgzJhEthkxwjv5o0Lu0jxx34laFO1JEbYz25Ne/e8sEiY6R92jn2xAA==", - "path": "microsoft.azure.powershell.common.share/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.common.share.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Storage/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-63NqNOYOmES56Fa75Jqf195J6PPljEeoldwnN0CmPrb2ssrijLOk33xISV7Lkc/y5bnxYOlQf1MXwTTmDODaZg==", - "path": "microsoft.azure.powershell.storage/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.storage.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Strategies/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-m43h24WmeLPU/alUUtBNzQ5H+DPXKSPQyTYujjqJ3gJZd/zFRDCE7SHpdNhMVW53H23M6iT6szxxaOo6f0eWMg==", - "path": "microsoft.azure.powershell.strategies/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.strategies.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Bcl.AsyncInterfaces/1.1.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-yuvf07qFWFqtK3P/MRkEKLhn5r2UbSpVueRziSqj0yJQIKFwG1pq9mOayK3zE5qZCTs0CbrwL9M6R8VwqyGy2w==", - "path": "microsoft.bcl.asyncinterfaces/1.1.1", - "hashPath": "microsoft.bcl.asyncinterfaces.1.1.1.nupkg.sha512" - }, - "Microsoft.CSharp/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-P+MBhIM0YX+JqROuf7i306ZLJEjQYA9uUyRDE+OqwUI5sh41e2ZbPQV3LfAPh+29cmceE1pUffXsGfR4eMY3KA==", - "path": "microsoft.csharp/4.3.0", - "hashPath": "microsoft.csharp.4.3.0.nupkg.sha512" - }, - "Microsoft.Identity.Client/4.46.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-cuW7fAkazUshVFzSx5cyKPlJFBctoAHRxUpOdcIfsaHAKhb56dY6dY7f9rjZSIZHdFu/cvf6eSnGyHdvHxGccg==", - "path": "microsoft.identity.client/4.46.2", - "hashPath": "microsoft.identity.client.4.46.2.nupkg.sha512" - }, - "Microsoft.Identity.Client.Extensions.Msal/2.23.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Q8K58FjUIVslHQlk+SIhFYjdy8B1A5Wt3GXxzLS7lnXXaSmbcGzk7d8haqLmR8z/DP99vpZC73SxMa83qSHcbQ==", - "path": "microsoft.identity.client.extensions.msal/2.23.0", - "hashPath": "microsoft.identity.client.extensions.msal.2.23.0.nupkg.sha512" - }, - "Microsoft.IdentityModel.Abstractions/6.22.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iI+9V+2ciCrbheeLjpmjcqCnhy+r6yCoEcid3nkoFWerHgjVuT6CPM4HODUTtUPe1uwks4wcnAujJ8u+IKogHQ==", - "path": "microsoft.identitymodel.abstractions/6.22.0", - "hashPath": "microsoft.identitymodel.abstractions.6.22.0.nupkg.sha512" - }, - "Microsoft.NETCore.Platforms/1.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-kz0PEW2lhqygehI/d6XsPCQzD7ff7gUJaVGPVETX611eadGsA3A877GdSlU0LRVMCTH/+P3o2iDTak+S08V2+A==", - "path": "microsoft.netcore.platforms/1.1.0", - "hashPath": "microsoft.netcore.platforms.1.1.0.nupkg.sha512" - }, - "Microsoft.NETCore.Targets/1.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-aOZA3BWfz9RXjpzt0sRJJMjAscAUm3Hoa4UWAfceV9UTYxgwZ1lZt5nO2myFf+/jetYQo4uTP7zS8sJY67BBxg==", - "path": "microsoft.netcore.targets/1.1.0", - "hashPath": "microsoft.netcore.targets.1.1.0.nupkg.sha512" - }, - "Microsoft.Rest.ClientRuntime/2.3.24": { - "type": "package", - "serviceable": true, - "sha512": "sha512-hZH7XgM3eV2jFrnq7Yf0nBD4WVXQzDrer2gEY7HMNiwio2hwDsTHO6LWuueNQAfRpNp4W7mKxcXpwXUiuVIlYw==", - "path": "microsoft.rest.clientruntime/2.3.24", - "hashPath": "microsoft.rest.clientruntime.2.3.24.nupkg.sha512" - }, - "Microsoft.Rest.ClientRuntime.Azure/3.3.19": { - "type": "package", - "serviceable": true, - "sha512": "sha512-+NVBWvRXNwaAPTZUxjUlQggsrf3X0GbiRoxYfgc3kG9E55ZxZxvZPT3nIfC4DNqzGSXUEvmLbckdXgBBzGdUaA==", - "path": "microsoft.rest.clientruntime.azure/3.3.19", - "hashPath": "microsoft.rest.clientruntime.azure.3.3.19.nupkg.sha512" - }, - "NETStandard.Library/2.0.3": { - "type": "package", - "serviceable": true, - "sha512": "sha512-st47PosZSHrjECdjeIzZQbzivYBJFv6P2nv4cj2ypdI204DO+vZ7l5raGMiX4eXMJ53RfOIg+/s4DHVZ54Nu2A==", - "path": "netstandard.library/2.0.3", - "hashPath": "netstandard.library.2.0.3.nupkg.sha512" - }, - "Newtonsoft.Json/10.0.3": { - "type": "package", - "serviceable": true, - "sha512": "sha512-hSXaFmh7hNCuEoC4XNY5DrRkLDzYHqPx/Ik23R4J86Z7PE/Y6YidhG602dFVdLBRSdG6xp9NabH3dXpcoxWvww==", - "path": "newtonsoft.json/10.0.3", - "hashPath": "newtonsoft.json.10.0.3.nupkg.sha512" - }, - "PowerShellStandard.Library/5.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iYaRvQsM1fow9h3uEmio+2m2VXfulgI16AYHaTZ8Sf7erGe27Qc8w/h6QL5UPuwv1aXR40QfzMEwcCeiYJp2cw==", - "path": "powershellstandard.library/5.1.0", - "hashPath": "powershellstandard.library.5.1.0.nupkg.sha512" - }, - "System.Buffers/4.5.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Rw7ijyl1qqRS0YQD/WycNst8hUUMgrMH4FCn1nNm27M4VxchZ1js3fVjQaANHO5f3sN4isvP4a+Met9Y4YomAg==", - "path": "system.buffers/4.5.1", - "hashPath": "system.buffers.4.5.1.nupkg.sha512" - }, - "System.Collections/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3Dcj85/TBdVpL5Zr+gEEBUuFe2icOnLalmEh9hfck1PTYbbyWuZgh4fmm2ysCLTrqLQw6t3TgTyJ+VLp+Qb+Lw==", - "path": "system.collections/4.3.0", - "hashPath": "system.collections.4.3.0.nupkg.sha512" - }, - "System.Collections.NonGeneric/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-prtjIEMhGUnQq6RnPEYLpFt8AtLbp9yq2zxOSrY7KJJZrw25Fi97IzBqY7iqssbM61Ek5b8f3MG/sG1N2sN5KA==", - "path": "system.collections.nongeneric/4.3.0", - "hashPath": "system.collections.nongeneric.4.3.0.nupkg.sha512" - }, - "System.Collections.Specialized/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Epx8PoVZR0iuOnJJDzp7pWvdfMMOAvpUo95pC4ScH2mJuXkKA2Y4aR3cG9qt2klHgSons1WFh4kcGW7cSXvrxg==", - "path": "system.collections.specialized/4.3.0", - "hashPath": "system.collections.specialized.4.3.0.nupkg.sha512" - }, - "System.ComponentModel/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VyGn1jGRZVfxnh8EdvDCi71v3bMXrsu8aYJOwoV7SNDLVhiEqwP86pPMyRGsDsxhXAm2b3o9OIqeETfN5qfezw==", - "path": "system.componentmodel/4.3.0", - "hashPath": "system.componentmodel.4.3.0.nupkg.sha512" - }, - "System.ComponentModel.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-j8GUkCpM8V4d4vhLIIoBLGey2Z5bCkMVNjEZseyAlm4n5arcsJOeI3zkUP+zvZgzsbLTYh4lYeP/ZD/gdIAPrw==", - "path": "system.componentmodel.primitives/4.3.0", - "hashPath": "system.componentmodel.primitives.4.3.0.nupkg.sha512" - }, - "System.ComponentModel.TypeConverter/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-16pQ6P+EdhcXzPiEK4kbA953Fu0MNG2ovxTZU81/qsCd1zPRsKc3uif5NgvllCY598k6bI0KUyKW8fanlfaDQg==", - "path": "system.componentmodel.typeconverter/4.3.0", - "hashPath": "system.componentmodel.typeconverter.4.3.0.nupkg.sha512" - }, - "System.Diagnostics.Debug/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ZUhUOdqmaG5Jk3Xdb8xi5kIyQYAA4PnTNlHx1mu9ZY3qv4ELIdKbnL/akbGaKi2RnNUWaZsAs31rvzFdewTj2g==", - "path": "system.diagnostics.debug/4.3.0", - "hashPath": "system.diagnostics.debug.4.3.0.nupkg.sha512" - }, - "System.Diagnostics.DiagnosticSource/4.6.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-mbBgoR0rRfl2uimsZ2avZY8g7Xnh1Mza0rJZLPcxqiMWlkGukjmRkuMJ/er+AhQuiRIh80CR/Hpeztr80seV5g==", - "path": "system.diagnostics.diagnosticsource/4.6.0", - "hashPath": "system.diagnostics.diagnosticsource.4.6.0.nupkg.sha512" - }, - "System.Dynamic.Runtime/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-SNVi1E/vfWUAs/WYKhE9+qlS6KqK0YVhnlT0HQtr8pMIA8YX3lwy3uPMownDwdYISBdmAF/2holEIldVp85Wag==", - "path": "system.dynamic.runtime/4.3.0", - "hashPath": "system.dynamic.runtime.4.3.0.nupkg.sha512" - }, - "System.Globalization/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-kYdVd2f2PAdFGblzFswE4hkNANJBKRmsfa2X5LG2AcWE1c7/4t0pYae1L8vfZ5xvE2nK/R9JprtToA61OSHWIg==", - "path": "system.globalization/4.3.0", - "hashPath": "system.globalization.4.3.0.nupkg.sha512" - }, - "System.Globalization.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-FhKmdR6MPG+pxow6wGtNAWdZh7noIOpdD5TwQ3CprzgIE1bBBoim0vbR1+AWsWjQmU7zXHgQo4TWSP6lCeiWcQ==", - "path": "system.globalization.extensions/4.3.0", - "hashPath": "system.globalization.extensions.4.3.0.nupkg.sha512" - }, - "System.IO/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3qjaHvxQPDpSOYICjUoTsmoq5u6QJAFRUITgeT/4gqkF1bajbSmb1kwSxEA8AHlofqgcKJcM8udgieRNhaJ5Cg==", - "path": "system.io/4.3.0", - "hashPath": "system.io.4.3.0.nupkg.sha512" - }, - "System.IO.FileSystem/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3wEMARTnuio+ulnvi+hkRNROYwa1kylvYahhcLk4HSoVdl+xxTFVeVlYOfLwrDPImGls0mDqbMhrza8qnWPTdA==", - "path": "system.io.filesystem/4.3.0", - "hashPath": "system.io.filesystem.4.3.0.nupkg.sha512" - }, - "System.IO.FileSystem.AccessControl/5.0.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-SxHB3nuNrpptVk+vZ/F+7OHEpoHUIKKMl02bUmYHQr1r+glbZQxs7pRtsf4ENO29TVm2TH3AEeep2fJcy92oYw==", - "path": "system.io.filesystem.accesscontrol/5.0.0", - "hashPath": "system.io.filesystem.accesscontrol.5.0.0.nupkg.sha512" - }, - "System.IO.FileSystem.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-6QOb2XFLch7bEc4lIcJH49nJN2HV+OC3fHDgsLVsBVBk3Y4hFAnOBGzJ2lUu7CyDDFo9IBWkSsnbkT6IBwwiMw==", - "path": "system.io.filesystem.primitives/4.3.0", - "hashPath": "system.io.filesystem.primitives.4.3.0.nupkg.sha512" - }, - "System.Linq/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-5DbqIUpsDp0dFftytzuMmc0oeMdQwjcP/EWxsksIz/w1TcFRkZ3yKKz0PqiYFMmEwPSWw+qNVqD7PJ889JzHbw==", - "path": "system.linq/4.3.0", - "hashPath": "system.linq.4.3.0.nupkg.sha512" - }, - "System.Linq.Expressions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-PGKkrd2khG4CnlyJwxwwaWWiSiWFNBGlgXvJpeO0xCXrZ89ODrQ6tjEWS/kOqZ8GwEOUATtKtzp1eRgmYNfclg==", - "path": "system.linq.expressions/4.3.0", - "hashPath": "system.linq.expressions.4.3.0.nupkg.sha512" - }, - "System.Memory/4.5.4": { - "type": "package", - "serviceable": true, - "sha512": "sha512-1MbJTHS1lZ4bS4FmsJjnuGJOu88ZzTT2rLvrhW7Ygic+pC0NWA+3hgAen0HRdsocuQXCkUTdFn9yHJJhsijDXw==", - "path": "system.memory/4.5.4", - "hashPath": "system.memory.4.5.4.nupkg.sha512" - }, - "System.Memory.Data/1.0.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-JGkzeqgBsiZwKJZ1IxPNsDFZDhUvuEdX8L8BDC8N3KOj+6zMcNU28CNN59TpZE/VJYy9cP+5M+sbxtWJx3/xtw==", - "path": "system.memory.data/1.0.2", - "hashPath": "system.memory.data.1.0.2.nupkg.sha512" - }, - "System.Numerics.Vectors/4.5.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-QQTlPTl06J/iiDbJCiepZ4H//BVraReU4O4EoRw1U02H5TLUIT7xn3GnDp9AXPSlJUDyFs4uWjWafNX6WrAojQ==", - "path": "system.numerics.vectors/4.5.0", - "hashPath": "system.numerics.vectors.4.5.0.nupkg.sha512" - }, - "System.ObjectModel/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-bdX+80eKv9bN6K4N+d77OankKHGn6CH711a6fcOpMQu2Fckp/Ft4L/kW9WznHpyR0NRAvJutzOMHNNlBGvxQzQ==", - "path": "system.objectmodel/4.3.0", - "hashPath": "system.objectmodel.4.3.0.nupkg.sha512" - }, - "System.Reflection/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-KMiAFoW7MfJGa9nDFNcfu+FpEdiHpWgTcS2HdMpDvt9saK3y/G4GwprPyzqjFH9NTaGPQeWNHU+iDlDILj96aQ==", - "path": "system.reflection/4.3.0", - "hashPath": "system.reflection.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-228FG0jLcIwTVJyz8CLFKueVqQK36ANazUManGaJHkO0icjiIypKW7YLWLIWahyIkdh5M7mV2dJepllLyA1SKg==", - "path": "system.reflection.emit/4.3.0", - "hashPath": "system.reflection.emit.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit.ILGeneration/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-59tBslAk9733NXLrUJrwNZEzbMAcu8k344OYo+wfSVygcgZ9lgBdGIzH/nrg3LYhXceynyvTc8t5/GD4Ri0/ng==", - "path": "system.reflection.emit.ilgeneration/4.3.0", - "hashPath": "system.reflection.emit.ilgeneration.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit.Lightweight/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-oadVHGSMsTmZsAF864QYN1t1QzZjIcuKU3l2S9cZOwDdDueNTrqq1yRj7koFfIGEnKpt6NjpL3rOzRhs4ryOgA==", - "path": "system.reflection.emit.lightweight/4.3.0", - "hashPath": "system.reflection.emit.lightweight.4.3.0.nupkg.sha512" - }, - "System.Reflection.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-rJkrJD3kBI5B712aRu4DpSIiHRtr6QlfZSQsb0hYHrDCZORXCFjQfoipo2LaMUHoT9i1B7j7MnfaEKWDFmFQNQ==", - "path": "system.reflection.extensions/4.3.0", - "hashPath": "system.reflection.extensions.4.3.0.nupkg.sha512" - }, - "System.Reflection.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-5RXItQz5As4xN2/YUDxdpsEkMhvw3e6aNveFXUn4Hl/udNTCNhnKp8lT9fnc3MhvGKh1baak5CovpuQUXHAlIA==", - "path": "system.reflection.primitives/4.3.0", - "hashPath": "system.reflection.primitives.4.3.0.nupkg.sha512" - }, - "System.Reflection.TypeExtensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-7u6ulLcZbyxB5Gq0nMkQttcdBTx57ibzw+4IOXEfR+sXYQoHvjW5LTLyNr8O22UIMrqYbchJQJnos4eooYzYJA==", - "path": "system.reflection.typeextensions/4.3.0", - "hashPath": "system.reflection.typeextensions.4.3.0.nupkg.sha512" - }, - "System.Resources.ResourceManager/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-/zrcPkkWdZmI4F92gL/TPumP98AVDu/Wxr3CSJGQQ+XN6wbRZcyfSKVoPo17ilb3iOr0cCRqJInGwNMolqhS8A==", - "path": "system.resources.resourcemanager/4.3.0", - "hashPath": "system.resources.resourcemanager.4.3.0.nupkg.sha512" - }, - "System.Runtime/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-JufQi0vPQ0xGnAczR13AUFglDyVYt4Kqnz1AZaiKZ5+GICq0/1MH/mO/eAJHt/mHW1zjKBJd7kV26SrxddAhiw==", - "path": "system.runtime/4.3.0", - "hashPath": "system.runtime.4.3.0.nupkg.sha512" - }, - "System.Runtime.CompilerServices.Unsafe/4.7.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-zOHkQmzPCn5zm/BH+cxC1XbUS3P4Yoi3xzW7eRgVpDR2tPGSzyMZ17Ig1iRkfJuY0nhxkQQde8pgePNiA7z7TQ==", - "path": "system.runtime.compilerservices.unsafe/4.7.1", - "hashPath": "system.runtime.compilerservices.unsafe.4.7.1.nupkg.sha512" - }, - "System.Runtime.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-guW0uK0fn5fcJJ1tJVXYd7/1h5F+pea1r7FLSOz/f8vPEqbR2ZAknuRDvTQ8PzAilDveOxNjSfr0CHfIQfFk8g==", - "path": "system.runtime.extensions/4.3.0", - "hashPath": "system.runtime.extensions.4.3.0.nupkg.sha512" - }, - "System.Runtime.Handles/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-OKiSUN7DmTWeYb3l51A7EYaeNMnvxwE249YtZz7yooT4gOZhmTjIn48KgSsw2k2lYdLgTKNJw/ZIfSElwDRVgg==", - "path": "system.runtime.handles/4.3.0", - "hashPath": "system.runtime.handles.4.3.0.nupkg.sha512" - }, - "System.Runtime.InteropServices/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-uv1ynXqiMK8mp1GM3jDqPCFN66eJ5w5XNomaK2XD+TuCroNTLFGeZ+WCmBMcBDyTFKou3P6cR6J/QsaqDp7fGQ==", - "path": "system.runtime.interopservices/4.3.0", - "hashPath": "system.runtime.interopservices.4.3.0.nupkg.sha512" - }, - "System.Runtime.Serialization.Formatters/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-KT591AkTNFOTbhZlaeMVvfax3RqhH1EJlcwF50Wm7sfnBLuHiOeZRRKrr1ns3NESkM20KPZ5Ol/ueMq5vg4QoQ==", - "path": "system.runtime.serialization.formatters/4.3.0", - "hashPath": "system.runtime.serialization.formatters.4.3.0.nupkg.sha512" - }, - "System.Runtime.Serialization.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Wz+0KOukJGAlXjtKr+5Xpuxf8+c8739RI1C+A2BoQZT+wMCCoMDDdO8/4IRHfaVINqL78GO8dW8G2lW/e45Mcw==", - "path": "system.runtime.serialization.primitives/4.3.0", - "hashPath": "system.runtime.serialization.primitives.4.3.0.nupkg.sha512" - }, - "System.Security.AccessControl/5.0.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-dagJ1mHZO3Ani8GH0PHpPEe/oYO+rVdbQjvjJkBRNQkX4t0r1iaeGn8+/ybkSLEan3/slM0t59SVdHzuHf2jmw==", - "path": "system.security.accesscontrol/5.0.0", - "hashPath": "system.security.accesscontrol.5.0.0.nupkg.sha512" - }, - "System.Security.Cryptography.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-7bDIyVFNL/xKeFHjhobUAQqSpJq9YTOpbEs6mR233Et01STBMXNAc/V+BM6dwYGc95gVh/Zf+iVXWzj3mE8DWg==", - "path": "system.security.cryptography.primitives/4.3.0", - "hashPath": "system.security.cryptography.primitives.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.ProtectedData/4.7.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ehYW0m9ptxpGWvE4zgqongBVWpSDU/JCFD4K7krxkQwSz/sFQjEXCUqpvencjy6DYDbn7Ig09R8GFffu8TtneQ==", - "path": "system.security.cryptography.protecteddata/4.7.0", - "hashPath": "system.security.cryptography.protecteddata.4.7.0.nupkg.sha512" - }, - "System.Security.Principal.Windows/5.0.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-t0MGLukB5WAVU9bO3MGzvlGnyJPgUlcwerXn1kzBRjwLKixT96XV0Uza41W49gVd8zEMFu9vQEFlv0IOrytICA==", - "path": "system.security.principal.windows/5.0.0", - "hashPath": "system.security.principal.windows.5.0.0.nupkg.sha512" - }, - "System.Security.SecureString/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-PnXp38O9q/2Oe4iZHMH60kinScv6QiiL2XH54Pj2t0Y6c2zKPEiAZsM/M3wBOHLNTBDFP0zfy13WN2M0qFz5jg==", - "path": "system.security.securestring/4.3.0", - "hashPath": "system.security.securestring.4.3.0.nupkg.sha512" - }, - "System.Text.Encoding/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-BiIg+KWaSDOITze6jGQynxg64naAPtqGHBwDrLaCtixsa5bKiR8dpPOHA7ge3C0JJQizJE+sfkz1wV+BAKAYZw==", - "path": "system.text.encoding/4.3.0", - "hashPath": "system.text.encoding.4.3.0.nupkg.sha512" - }, - "System.Text.Encoding.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-YVMK0Bt/A43RmwizJoZ22ei2nmrhobgeiYwFzC4YAN+nue8RF6djXDMog0UCn+brerQoYVyaS+ghy9P/MUVcmw==", - "path": "system.text.encoding.extensions/4.3.0", - "hashPath": "system.text.encoding.extensions.4.3.0.nupkg.sha512" - }, - "System.Text.Encodings.Web/4.7.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iTUgB/WtrZ1sWZs84F2hwyQhiRH6QNjQv2DkwrH+WP6RoFga2Q1m3f9/Q7FG8cck8AdHitQkmkXSY8qylcDmuA==", - "path": "system.text.encodings.web/4.7.2", - "hashPath": "system.text.encodings.web.4.7.2.nupkg.sha512" - }, - "System.Text.Json/4.7.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-TcMd95wcrubm9nHvJEQs70rC0H/8omiSGGpU4FQ/ZA1URIqD4pjmFJh2Mfv1yH1eHgJDWTi2hMDXwTET+zOOyg==", - "path": "system.text.json/4.7.2", - "hashPath": "system.text.json.4.7.2.nupkg.sha512" - }, - "System.Text.RegularExpressions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-RpT2DA+L660cBt1FssIE9CAGpLFdFPuheB7pLpKpn6ZXNby7jDERe8Ua/Ne2xGiwLVG2JOqziiaVCGDon5sKFA==", - "path": "system.text.regularexpressions/4.3.0", - "hashPath": "system.text.regularexpressions.4.3.0.nupkg.sha512" - }, - "System.Threading/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VkUS0kOBcUf3Wwm0TSbrevDDZ6BlM+b/HRiapRFWjM5O0NS0LviG0glKmFK+hhPDd1XFeSdU1GmlLhb2CoVpIw==", - "path": "system.threading/4.3.0", - "hashPath": "system.threading.4.3.0.nupkg.sha512" - }, - "System.Threading.Tasks/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-LbSxKEdOUhVe8BezB/9uOGGppt+nZf6e1VFyw6v3DN6lqitm0OSn2uXMOdtP0M3W4iMcqcivm2J6UgqiwwnXiA==", - "path": "system.threading.tasks/4.3.0", - "hashPath": "system.threading.tasks.4.3.0.nupkg.sha512" - }, - "System.Threading.Tasks.Extensions/4.5.4": { - "type": "package", - "serviceable": true, - "sha512": "sha512-zteT+G8xuGu6mS+mzDzYXbzS7rd3K6Fjb9RiZlYlJPam2/hU7JCBZBVEcywNuR+oZ1ncTvc/cq0faRr3P01OVg==", - "path": "system.threading.tasks.extensions/4.5.4", - "hashPath": "system.threading.tasks.extensions.4.5.4.nupkg.sha512" - }, - "System.Xml.ReaderWriter/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-GrprA+Z0RUXaR4N7/eW71j1rgMnEnEVlgii49GZyAjTH7uliMnrOU3HNFBr6fEDBCJCIdlVNq9hHbaDR621XBA==", - "path": "system.xml.readerwriter/4.3.0", - "hashPath": "system.xml.readerwriter.4.3.0.nupkg.sha512" - }, - "System.Xml.XmlDocument/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-lJ8AxvkX7GQxpC6GFCeBj8ThYVyQczx2+f/cWHJU8tjS7YfI6Cv6bon70jVEgs2CiFbmmM8b9j1oZVx0dSI2Ww==", - "path": "system.xml.xmldocument/4.3.0", - "hashPath": "system.xml.xmldocument.4.3.0.nupkg.sha512" - }, - "System.Xml.XmlSerializer/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-MYoTCP7EZ98RrANESW05J5ZwskKDoN0AuZ06ZflnowE50LTpbR5yRg3tHckTVm5j/m47stuGgCrCHWePyHS70Q==", - "path": "system.xml.xmlserializer/4.3.0", - "hashPath": "system.xml.xmlserializer.4.3.0.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Authentication/1.0.0": { - "type": "project", - "serviceable": false, - "sha512": "" - } - } -} \ No newline at end of file diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll deleted file mode 100644 index 990a1dc38770..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.deps.json b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.deps.json deleted file mode 100644 index bc43e9929da9..000000000000 --- a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.deps.json +++ /dev/null @@ -1,1746 +0,0 @@ -{ - "runtimeTarget": { - "name": ".NETStandard,Version=v2.0/", - "signature": "" - }, - "compilationOptions": {}, - "targets": { - ".NETStandard,Version=v2.0": {}, - ".NETStandard,Version=v2.0/": { - "Microsoft.Azure.PowerShell.Authentication/1.0.0": { - "dependencies": { - "Azure.Core": "1.25.0", - "Azure.Identity": "1.6.1", - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Aks": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Authorization": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Compute": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.KeyVault": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Monitor": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Network": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.PolicyInsights": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Storage.Management": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Websites": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Storage": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Strategies": "1.3.67-preview", - "Microsoft.Identity.Client": "4.46.2", - "Microsoft.Identity.Client.Extensions.Msal": "2.23.0", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "NETStandard.Library": "2.0.3", - "Newtonsoft.Json": "10.0.3", - "PowerShellStandard.Library": "5.1.0" - }, - "runtime": { - "Microsoft.Azure.PowerShell.Authentication.dll": {} - } - }, - "Azure.Core/1.25.0": { - "dependencies": { - "Microsoft.Bcl.AsyncInterfaces": "1.1.1", - "System.Diagnostics.DiagnosticSource": "4.6.0", - "System.Memory.Data": "1.0.2", - "System.Numerics.Vectors": "4.5.0", - "System.Text.Encodings.Web": "4.7.2", - "System.Text.Json": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/Azure.Core.dll": { - "assemblyVersion": "1.25.0.0", - "fileVersion": "1.2500.22.33004" - } - } - }, - "Azure.Identity/1.6.1": { - "dependencies": { - "Azure.Core": "1.25.0", - "Microsoft.Identity.Client": "4.46.2", - "Microsoft.Identity.Client.Extensions.Msal": "2.23.0", - "System.Memory": "4.5.4", - "System.Security.Cryptography.ProtectedData": "4.7.0", - "System.Text.Json": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/Azure.Identity.dll": { - "assemblyVersion": "1.6.1.0", - "fileVersion": "1.600.122.40803" - } - } - }, - "Hyak.Common/1.2.2": { - "dependencies": { - "NETStandard.Library": "2.0.3", - "Newtonsoft.Json": "10.0.3", - "System.Reflection": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.4/Hyak.Common.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.2.2.0" - } - } - }, - "Microsoft.ApplicationInsights/2.13.1": { - "dependencies": { - "System.Diagnostics.DiagnosticSource": "4.6.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.ApplicationInsights.dll": { - "assemblyVersion": "2.13.1.12554", - "fileVersion": "2.13.1.12554" - } - } - }, - "Microsoft.Azure.Common/2.2.1": { - "dependencies": { - "Hyak.Common": "1.2.2", - "NETStandard.Library": "2.0.3" - }, - "runtime": { - "lib/netstandard1.4/Microsoft.Azure.Common.dll": { - "assemblyVersion": "2.0.0.0", - "fileVersion": "2.2.1.0" - } - } - }, - "Microsoft.Azure.PowerShell.Authentication.Abstractions/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Aks/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Aks.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Authorization/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Authorization.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Compute/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Compute.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.KeyVault/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.NonGeneric": "4.3.0", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.KeyVault.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Monitor/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Monitor.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Network/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Network.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.PolicyInsights/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.ResourceManager/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Storage.Management/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "System.Collections.NonGeneric": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Websites/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Websites.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Common/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Common.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Common.Share/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Common.Share.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Storage/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Storage.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Strategies/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Strategies.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Bcl.AsyncInterfaces/1.1.1": { - "dependencies": { - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Bcl.AsyncInterfaces.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "4.700.20.21406" - } - } - }, - "Microsoft.CSharp/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Dynamic.Runtime": "4.3.0", - "System.Globalization": "4.3.0", - "System.Linq": "4.3.0", - "System.Linq.Expressions": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/Microsoft.CSharp.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "Microsoft.Identity.Client/4.46.2": { - "dependencies": { - "Microsoft.IdentityModel.Abstractions": "6.22.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Identity.Client.dll": { - "assemblyVersion": "4.46.2.0", - "fileVersion": "4.46.2.0" - } - } - }, - "Microsoft.Identity.Client.Extensions.Msal/2.23.0": { - "dependencies": { - "Microsoft.Identity.Client": "4.46.2", - "System.IO.FileSystem.AccessControl": "5.0.0", - "System.Security.Cryptography.ProtectedData": "4.7.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Identity.Client.Extensions.Msal.dll": { - "assemblyVersion": "2.23.0.0", - "fileVersion": "2.23.0.0" - } - } - }, - "Microsoft.IdentityModel.Abstractions/6.22.0": { - "runtime": { - "lib/netstandard2.0/Microsoft.IdentityModel.Abstractions.dll": { - "assemblyVersion": "6.22.0.0", - "fileVersion": "6.22.0.30727" - } - } - }, - "Microsoft.NETCore.Platforms/1.1.0": {}, - "Microsoft.NETCore.Targets/1.1.0": {}, - "Microsoft.Rest.ClientRuntime/2.3.24": { - "dependencies": { - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Rest.ClientRuntime.dll": { - "assemblyVersion": "2.0.0.0", - "fileVersion": "2.3.23.0" - } - } - }, - "Microsoft.Rest.ClientRuntime.Azure/3.3.19": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Rest.ClientRuntime.Azure.dll": { - "assemblyVersion": "3.0.0.0", - "fileVersion": "3.3.18.0" - } - } - }, - "NETStandard.Library/2.0.3": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0" - } - }, - "Newtonsoft.Json/10.0.3": { - "dependencies": { - "Microsoft.CSharp": "4.3.0", - "NETStandard.Library": "2.0.3", - "System.ComponentModel.TypeConverter": "4.3.0", - "System.Runtime.Serialization.Formatters": "4.3.0", - "System.Runtime.Serialization.Primitives": "4.3.0", - "System.Xml.XmlDocument": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/Newtonsoft.Json.dll": { - "assemblyVersion": "10.0.0.0", - "fileVersion": "10.0.3.21018" - } - } - }, - "PowerShellStandard.Library/5.1.0": {}, - "System.Buffers/4.5.1": { - "runtime": { - "lib/netstandard2.0/System.Buffers.dll": { - "assemblyVersion": "4.0.3.0", - "fileVersion": "4.6.28619.1" - } - } - }, - "System.Collections/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Collections.NonGeneric/4.3.0": { - "dependencies": { - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Collections.NonGeneric.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Collections.Specialized/4.3.0": { - "dependencies": { - "System.Collections.NonGeneric": "4.3.0", - "System.Globalization": "4.3.0", - "System.Globalization.Extensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Collections.Specialized.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.ComponentModel/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.ComponentModel.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.ComponentModel.Primitives/4.3.0": { - "dependencies": { - "System.ComponentModel": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.0/System.ComponentModel.Primitives.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.ComponentModel.TypeConverter/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Collections.NonGeneric": "4.3.0", - "System.Collections.Specialized": "4.3.0", - "System.ComponentModel": "4.3.0", - "System.ComponentModel.Primitives": "4.3.0", - "System.Globalization": "4.3.0", - "System.Linq": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.5/System.ComponentModel.TypeConverter.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Diagnostics.Debug/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Diagnostics.DiagnosticSource/4.6.0": { - "dependencies": { - "System.Memory": "4.5.4" - }, - "runtime": { - "lib/netstandard1.3/System.Diagnostics.DiagnosticSource.dll": { - "assemblyVersion": "4.0.4.0", - "fileVersion": "4.700.19.46214" - } - } - }, - "System.Dynamic.Runtime/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Linq": "4.3.0", - "System.Linq.Expressions": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Dynamic.Runtime.dll": { - "assemblyVersion": "4.0.12.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Globalization/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Globalization.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0" - } - }, - "System.IO/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.IO.FileSystem/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.IO.FileSystem.AccessControl/5.0.0": { - "dependencies": { - "System.Buffers": "4.5.1", - "System.Memory": "4.5.4", - "System.Security.AccessControl": "5.0.0", - "System.Security.Principal.Windows": "5.0.0" - }, - "runtime": { - "lib/netstandard2.0/System.IO.FileSystem.AccessControl.dll": { - "assemblyVersion": "5.0.0.0", - "fileVersion": "5.0.20.51904" - } - } - }, - "System.IO.FileSystem.Primitives/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.IO.FileSystem.Primitives.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Linq/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0" - }, - "runtime": { - "lib/netstandard1.6/System.Linq.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Linq.Expressions/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Linq": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Emit.Lightweight": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.6/System.Linq.Expressions.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Memory/4.5.4": { - "dependencies": { - "System.Buffers": "4.5.1", - "System.Numerics.Vectors": "4.5.0", - "System.Runtime.CompilerServices.Unsafe": "4.7.1" - }, - "runtime": { - "lib/netstandard2.0/System.Memory.dll": { - "assemblyVersion": "4.0.1.1", - "fileVersion": "4.6.28619.1" - } - } - }, - "System.Memory.Data/1.0.2": { - "dependencies": { - "System.Text.Encodings.Web": "4.7.2", - "System.Text.Json": "4.7.2" - }, - "runtime": { - "lib/netstandard2.0/System.Memory.Data.dll": { - "assemblyVersion": "1.0.2.0", - "fileVersion": "1.0.221.20802" - } - } - }, - "System.Numerics.Vectors/4.5.0": { - "runtime": { - "lib/netstandard2.0/System.Numerics.Vectors.dll": { - "assemblyVersion": "4.1.4.0", - "fileVersion": "4.6.26515.6" - } - } - }, - "System.ObjectModel/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.ObjectModel.dll": { - "assemblyVersion": "4.0.13.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Emit/4.3.0": { - "dependencies": { - "System.IO": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Reflection.Emit.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection.Emit.ILGeneration/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Reflection.Emit.ILGeneration.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection.Emit.Lightweight/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Reflection.Emit.Lightweight.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Primitives/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.TypeExtensions/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.5/System.Reflection.TypeExtensions.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Resources.ResourceManager/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Globalization": "4.3.0", - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0" - } - }, - "System.Runtime.CompilerServices.Unsafe/4.7.1": { - "runtime": { - "lib/netstandard2.0/System.Runtime.CompilerServices.Unsafe.dll": { - "assemblyVersion": "4.0.6.0", - "fileVersion": "4.700.20.12001" - } - } - }, - "System.Runtime.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime.Handles/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime.InteropServices/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Reflection": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0" - } - }, - "System.Runtime.Serialization.Formatters/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Reflection": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Serialization.Primitives": "4.3.0" - }, - "runtime": { - "lib/netstandard1.4/System.Runtime.Serialization.Formatters.dll": { - "assemblyVersion": "4.0.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Runtime.Serialization.Primitives/4.3.0": { - "dependencies": { - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Runtime.Serialization.Primitives.dll": { - "assemblyVersion": "4.1.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Security.AccessControl/5.0.0": { - "dependencies": { - "System.Security.Principal.Windows": "5.0.0" - }, - "runtime": { - "lib/netstandard2.0/System.Security.AccessControl.dll": { - "assemblyVersion": "5.0.0.0", - "fileVersion": "5.0.20.51904" - } - } - }, - "System.Security.Cryptography.Primitives/4.3.0": { - "dependencies": { - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading": "4.3.0", - "System.Threading.Tasks": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Security.Cryptography.Primitives.dll": { - "assemblyVersion": "4.0.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Security.Cryptography.ProtectedData/4.7.0": { - "dependencies": { - "System.Memory": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/System.Security.Cryptography.ProtectedData.dll": { - "assemblyVersion": "4.0.5.0", - "fileVersion": "4.700.19.56404" - } - } - }, - "System.Security.Principal.Windows/5.0.0": { - "runtime": { - "lib/netstandard2.0/System.Security.Principal.Windows.dll": { - "assemblyVersion": "5.0.0.0", - "fileVersion": "5.0.20.51904" - } - } - }, - "System.Security.SecureString/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Text.Encoding/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Text.Encoding.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0", - "System.Text.Encoding": "4.3.0" - } - }, - "System.Text.Encodings.Web/4.7.2": { - "dependencies": { - "System.Buffers": "4.5.1", - "System.Memory": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/System.Text.Encodings.Web.dll": { - "assemblyVersion": "4.0.5.1", - "fileVersion": "4.700.21.11602" - } - } - }, - "System.Text.Json/4.7.2": { - "dependencies": { - "Microsoft.Bcl.AsyncInterfaces": "1.1.1", - "System.Buffers": "4.5.1", - "System.Memory": "4.5.4", - "System.Numerics.Vectors": "4.5.0", - "System.Runtime.CompilerServices.Unsafe": "4.7.1", - "System.Text.Encodings.Web": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/System.Text.Json.dll": { - "assemblyVersion": "4.0.1.2", - "fileVersion": "4.700.20.21406" - } - } - }, - "System.Text.RegularExpressions/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.6/System.Text.RegularExpressions.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Threading/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0", - "System.Threading.Tasks": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Threading.dll": { - "assemblyVersion": "4.0.12.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Threading.Tasks/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Threading.Tasks.Extensions/4.5.4": { - "dependencies": { - "System.Runtime.CompilerServices.Unsafe": "4.7.1" - }, - "runtime": { - "lib/netstandard2.0/System.Threading.Tasks.Extensions.dll": { - "assemblyVersion": "4.2.0.1", - "fileVersion": "4.6.28619.1" - } - } - }, - "System.Xml.ReaderWriter/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.IO.FileSystem": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Text.Encoding.Extensions": "4.3.0", - "System.Text.RegularExpressions": "4.3.0", - "System.Threading.Tasks": "4.3.0", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard1.3/System.Xml.ReaderWriter.dll": { - "assemblyVersion": "4.1.0.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Xml.XmlDocument/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Xml.XmlDocument.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Xml.XmlSerializer/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Linq": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.RegularExpressions": "4.3.0", - "System.Threading": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0", - "System.Xml.XmlDocument": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Xml.XmlSerializer.dll": { - "assemblyVersion": "4.0.12.0", - "fileVersion": "4.6.24705.1" - } - } - } - } - }, - "libraries": { - "Microsoft.Azure.PowerShell.Authentication/1.0.0": { - "type": "project", - "serviceable": false, - "sha512": "" - }, - "Azure.Core/1.25.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-X8Dd4sAggS84KScWIjEbFAdt2U1KDolQopTPoHVubG2y3CM54f9l6asVrP5Uy384NWXjsspPYaJgz5xHc+KvTA==", - "path": "azure.core/1.25.0", - "hashPath": "azure.core.1.25.0.nupkg.sha512" - }, - "Azure.Identity/1.6.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-jgN1EHSa/qDkIIM4fxc+2+1/cpNAE65JFGk2g6mXZgXpgLqvVA9kz31aa5bY0oqPrtUp+ZfaMieF2v7rs+WRBg==", - "path": "azure.identity/1.6.1", - "hashPath": "azure.identity.1.6.1.nupkg.sha512" - }, - "Hyak.Common/1.2.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-uZpnFn48nSQwHcO0/GSBZ7ExaO0sTXKv8KariXXEWLaB4Q3AeQoprYG4WpKsCT0ByW3YffETivgc5rcH5RRDvQ==", - "path": "hyak.common/1.2.2", - "hashPath": "hyak.common.1.2.2.nupkg.sha512" - }, - "Microsoft.ApplicationInsights/2.13.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-BQhLmYR06Z8TVCdxnr8WOhhovJHtqYRNeB5gePBdQ4uDOE8D4IK9HW9i6a3llELz1QHv4HtFpku6dpXMGnO22g==", - "path": "microsoft.applicationinsights/2.13.1", - "hashPath": "microsoft.applicationinsights.2.13.1.nupkg.sha512" - }, - "Microsoft.Azure.Common/2.2.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-abzRooh4ACKjzAKxRB6r+SHKW3d+IrLcgtVG81D+3kQU/OMjAZS1oDp9CDalhSbmxa84u0MHM5N+AKeTtKPoiw==", - "path": "microsoft.azure.common/2.2.1", - "hashPath": "microsoft.azure.common.2.2.1.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Authentication.Abstractions/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-nHFO8TXWgxUlyBxsFxZk2NTiV18MeYxJYj1weApqpAlaHcHixJA7500OnUs+HqqaA66QAFmKYQ9Tr4r5cB8jLw==", - "path": "microsoft.azure.powershell.authentication.abstractions/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.authentication.abstractions.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Aks/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-vdHb0jV2i2dAcSwQA8IaH6nHAVb+eoO8aYYO8nJX9xMkciIyiLOVaBDH9U6CbrrlfDJ3/rnWeW+8WGNR6Fu5cg==", - "path": "microsoft.azure.powershell.clients.aks/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.aks.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Authorization/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ZXNfDic5HZiRwAtuBsH0NMXUhcCiX6mSrHVUb0EbOS374QYph2zB1zXiaG8DoclvUFE+nlyd5ZyH1cfqotwY0g==", - "path": "microsoft.azure.powershell.clients.authorization/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.authorization.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Compute/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-G1NIn7RlFPspoExrXiwCVLIj4wghjX+usciwC84in4+sDZFf3UFGj6HgU6wXlmSLN9BxqX9NFfJBi557lF+4rg==", - "path": "microsoft.azure.powershell.clients.compute/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.compute.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ALK2mcq/Gpfwm1bEQcq8FQNvZvF6PgN5jM5q3I1PAVS2u5F1UDa1tKjrjguSQIXLiE1Lthnwts3OaA03gNe3kA==", - "path": "microsoft.azure.powershell.clients.graph.rbac/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.graph.rbac.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.KeyVault/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-WGJeLeOs0KtL/tpSSm+l6fvkblh3uXTiog8uv3ADACGxzjaLB+d+0WE9uCxF21YTUxQ4ZhJxdQN+zQ6ggBcNbg==", - "path": "microsoft.azure.powershell.clients.keyvault/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.keyvault.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Monitor/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-mdd+N2hhB6t0KACILOc7b3G7bDO5fmfLpYnFuvWykxsUpD2y6MtBJl+DnJxz4LcUvjK5djEM8Le0wef1pmUmgg==", - "path": "microsoft.azure.powershell.clients.monitor/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.monitor.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Network/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-OX2mzGPquFfAGO/xqkRfM1spAywLMy9p7ThZmE69TVp+gbR6CGVd9ZL6OBM7Na/QTMlcMwD1rD4/BQx//8b0uQ==", - "path": "microsoft.azure.powershell.clients.network/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.network.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.PolicyInsights/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-owaa5B00b+wNU/iGBBeNIMTsc49prqfW/CfTVuQJSNTjxylpGNI6dxwQdgQXbcm0+x5mhy2YliqjzJvTdjTkog==", - "path": "microsoft.azure.powershell.clients.policyinsights/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.policyinsights.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.ResourceManager/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-1fGG2qDixHzSzH0HapF34faIBF0VeCnsO76lS6UxMBEZtCvgyKydhmR7FfPH72E+Opmay1i8rLkkvXKVqA6Zdg==", - "path": "microsoft.azure.powershell.clients.resourcemanager/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.resourcemanager.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Storage.Management/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-GfKe+wh2OqLU+NiIZERaw7+W/WZx9ASUikJ1lF8OiupuUgTW/uIUY46vOTB38nLF9g6YmYk6n0GXnVibivv5KQ==", - "path": "microsoft.azure.powershell.clients.storage.management/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.storage.management.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Websites/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iYvqqHCRfpaya3p1vV3bEXqecc2GHraEGlTn1scHLLrg0zTwLXxq0AAiGX9uzzPcGgByubvgw263T0tlLJ4BUg==", - "path": "microsoft.azure.powershell.clients.websites/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.websites.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Common/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-T42Yq1XesvgiTziZ6EHXz9RHP70pQYtw8UUXRYyuGV2D7u5r5euiMXDyLhpYxvgk0HKGr/Fi4f0c/iocrkHbyg==", - "path": "microsoft.azure.powershell.common/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.common.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Common.Share/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VU1zooS2hmazP/GXN/RjD8VXy3JjtrzMgzJhEthkxwjv5o0Lu0jxx34laFO1JEbYz25Ne/e8sEiY6R92jn2xAA==", - "path": "microsoft.azure.powershell.common.share/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.common.share.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Storage/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-63NqNOYOmES56Fa75Jqf195J6PPljEeoldwnN0CmPrb2ssrijLOk33xISV7Lkc/y5bnxYOlQf1MXwTTmDODaZg==", - "path": "microsoft.azure.powershell.storage/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.storage.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Strategies/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-m43h24WmeLPU/alUUtBNzQ5H+DPXKSPQyTYujjqJ3gJZd/zFRDCE7SHpdNhMVW53H23M6iT6szxxaOo6f0eWMg==", - "path": "microsoft.azure.powershell.strategies/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.strategies.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Bcl.AsyncInterfaces/1.1.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-yuvf07qFWFqtK3P/MRkEKLhn5r2UbSpVueRziSqj0yJQIKFwG1pq9mOayK3zE5qZCTs0CbrwL9M6R8VwqyGy2w==", - "path": "microsoft.bcl.asyncinterfaces/1.1.1", - "hashPath": "microsoft.bcl.asyncinterfaces.1.1.1.nupkg.sha512" - }, - "Microsoft.CSharp/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-P+MBhIM0YX+JqROuf7i306ZLJEjQYA9uUyRDE+OqwUI5sh41e2ZbPQV3LfAPh+29cmceE1pUffXsGfR4eMY3KA==", - "path": "microsoft.csharp/4.3.0", - "hashPath": "microsoft.csharp.4.3.0.nupkg.sha512" - }, - "Microsoft.Identity.Client/4.46.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-cuW7fAkazUshVFzSx5cyKPlJFBctoAHRxUpOdcIfsaHAKhb56dY6dY7f9rjZSIZHdFu/cvf6eSnGyHdvHxGccg==", - "path": "microsoft.identity.client/4.46.2", - "hashPath": "microsoft.identity.client.4.46.2.nupkg.sha512" - }, - "Microsoft.Identity.Client.Extensions.Msal/2.23.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Q8K58FjUIVslHQlk+SIhFYjdy8B1A5Wt3GXxzLS7lnXXaSmbcGzk7d8haqLmR8z/DP99vpZC73SxMa83qSHcbQ==", - "path": "microsoft.identity.client.extensions.msal/2.23.0", - "hashPath": "microsoft.identity.client.extensions.msal.2.23.0.nupkg.sha512" - }, - "Microsoft.IdentityModel.Abstractions/6.22.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iI+9V+2ciCrbheeLjpmjcqCnhy+r6yCoEcid3nkoFWerHgjVuT6CPM4HODUTtUPe1uwks4wcnAujJ8u+IKogHQ==", - "path": "microsoft.identitymodel.abstractions/6.22.0", - "hashPath": "microsoft.identitymodel.abstractions.6.22.0.nupkg.sha512" - }, - "Microsoft.NETCore.Platforms/1.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-kz0PEW2lhqygehI/d6XsPCQzD7ff7gUJaVGPVETX611eadGsA3A877GdSlU0LRVMCTH/+P3o2iDTak+S08V2+A==", - "path": "microsoft.netcore.platforms/1.1.0", - "hashPath": "microsoft.netcore.platforms.1.1.0.nupkg.sha512" - }, - "Microsoft.NETCore.Targets/1.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-aOZA3BWfz9RXjpzt0sRJJMjAscAUm3Hoa4UWAfceV9UTYxgwZ1lZt5nO2myFf+/jetYQo4uTP7zS8sJY67BBxg==", - "path": "microsoft.netcore.targets/1.1.0", - "hashPath": "microsoft.netcore.targets.1.1.0.nupkg.sha512" - }, - "Microsoft.Rest.ClientRuntime/2.3.24": { - "type": "package", - "serviceable": true, - "sha512": "sha512-hZH7XgM3eV2jFrnq7Yf0nBD4WVXQzDrer2gEY7HMNiwio2hwDsTHO6LWuueNQAfRpNp4W7mKxcXpwXUiuVIlYw==", - "path": "microsoft.rest.clientruntime/2.3.24", - "hashPath": "microsoft.rest.clientruntime.2.3.24.nupkg.sha512" - }, - "Microsoft.Rest.ClientRuntime.Azure/3.3.19": { - "type": "package", - "serviceable": true, - "sha512": "sha512-+NVBWvRXNwaAPTZUxjUlQggsrf3X0GbiRoxYfgc3kG9E55ZxZxvZPT3nIfC4DNqzGSXUEvmLbckdXgBBzGdUaA==", - "path": "microsoft.rest.clientruntime.azure/3.3.19", - "hashPath": "microsoft.rest.clientruntime.azure.3.3.19.nupkg.sha512" - }, - "NETStandard.Library/2.0.3": { - "type": "package", - "serviceable": true, - "sha512": "sha512-st47PosZSHrjECdjeIzZQbzivYBJFv6P2nv4cj2ypdI204DO+vZ7l5raGMiX4eXMJ53RfOIg+/s4DHVZ54Nu2A==", - "path": "netstandard.library/2.0.3", - "hashPath": "netstandard.library.2.0.3.nupkg.sha512" - }, - "Newtonsoft.Json/10.0.3": { - "type": "package", - "serviceable": true, - "sha512": "sha512-hSXaFmh7hNCuEoC4XNY5DrRkLDzYHqPx/Ik23R4J86Z7PE/Y6YidhG602dFVdLBRSdG6xp9NabH3dXpcoxWvww==", - "path": "newtonsoft.json/10.0.3", - "hashPath": "newtonsoft.json.10.0.3.nupkg.sha512" - }, - "PowerShellStandard.Library/5.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iYaRvQsM1fow9h3uEmio+2m2VXfulgI16AYHaTZ8Sf7erGe27Qc8w/h6QL5UPuwv1aXR40QfzMEwcCeiYJp2cw==", - "path": "powershellstandard.library/5.1.0", - "hashPath": "powershellstandard.library.5.1.0.nupkg.sha512" - }, - "System.Buffers/4.5.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Rw7ijyl1qqRS0YQD/WycNst8hUUMgrMH4FCn1nNm27M4VxchZ1js3fVjQaANHO5f3sN4isvP4a+Met9Y4YomAg==", - "path": "system.buffers/4.5.1", - "hashPath": "system.buffers.4.5.1.nupkg.sha512" - }, - "System.Collections/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3Dcj85/TBdVpL5Zr+gEEBUuFe2icOnLalmEh9hfck1PTYbbyWuZgh4fmm2ysCLTrqLQw6t3TgTyJ+VLp+Qb+Lw==", - "path": "system.collections/4.3.0", - "hashPath": "system.collections.4.3.0.nupkg.sha512" - }, - "System.Collections.NonGeneric/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-prtjIEMhGUnQq6RnPEYLpFt8AtLbp9yq2zxOSrY7KJJZrw25Fi97IzBqY7iqssbM61Ek5b8f3MG/sG1N2sN5KA==", - "path": "system.collections.nongeneric/4.3.0", - "hashPath": "system.collections.nongeneric.4.3.0.nupkg.sha512" - }, - "System.Collections.Specialized/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Epx8PoVZR0iuOnJJDzp7pWvdfMMOAvpUo95pC4ScH2mJuXkKA2Y4aR3cG9qt2klHgSons1WFh4kcGW7cSXvrxg==", - "path": "system.collections.specialized/4.3.0", - "hashPath": "system.collections.specialized.4.3.0.nupkg.sha512" - }, - "System.ComponentModel/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VyGn1jGRZVfxnh8EdvDCi71v3bMXrsu8aYJOwoV7SNDLVhiEqwP86pPMyRGsDsxhXAm2b3o9OIqeETfN5qfezw==", - "path": "system.componentmodel/4.3.0", - "hashPath": "system.componentmodel.4.3.0.nupkg.sha512" - }, - "System.ComponentModel.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-j8GUkCpM8V4d4vhLIIoBLGey2Z5bCkMVNjEZseyAlm4n5arcsJOeI3zkUP+zvZgzsbLTYh4lYeP/ZD/gdIAPrw==", - "path": "system.componentmodel.primitives/4.3.0", - "hashPath": "system.componentmodel.primitives.4.3.0.nupkg.sha512" - }, - "System.ComponentModel.TypeConverter/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-16pQ6P+EdhcXzPiEK4kbA953Fu0MNG2ovxTZU81/qsCd1zPRsKc3uif5NgvllCY598k6bI0KUyKW8fanlfaDQg==", - "path": "system.componentmodel.typeconverter/4.3.0", - "hashPath": "system.componentmodel.typeconverter.4.3.0.nupkg.sha512" - }, - "System.Diagnostics.Debug/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ZUhUOdqmaG5Jk3Xdb8xi5kIyQYAA4PnTNlHx1mu9ZY3qv4ELIdKbnL/akbGaKi2RnNUWaZsAs31rvzFdewTj2g==", - "path": "system.diagnostics.debug/4.3.0", - "hashPath": "system.diagnostics.debug.4.3.0.nupkg.sha512" - }, - "System.Diagnostics.DiagnosticSource/4.6.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-mbBgoR0rRfl2uimsZ2avZY8g7Xnh1Mza0rJZLPcxqiMWlkGukjmRkuMJ/er+AhQuiRIh80CR/Hpeztr80seV5g==", - "path": "system.diagnostics.diagnosticsource/4.6.0", - "hashPath": "system.diagnostics.diagnosticsource.4.6.0.nupkg.sha512" - }, - "System.Dynamic.Runtime/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-SNVi1E/vfWUAs/WYKhE9+qlS6KqK0YVhnlT0HQtr8pMIA8YX3lwy3uPMownDwdYISBdmAF/2holEIldVp85Wag==", - "path": "system.dynamic.runtime/4.3.0", - "hashPath": "system.dynamic.runtime.4.3.0.nupkg.sha512" - }, - "System.Globalization/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-kYdVd2f2PAdFGblzFswE4hkNANJBKRmsfa2X5LG2AcWE1c7/4t0pYae1L8vfZ5xvE2nK/R9JprtToA61OSHWIg==", - "path": "system.globalization/4.3.0", - "hashPath": "system.globalization.4.3.0.nupkg.sha512" - }, - "System.Globalization.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-FhKmdR6MPG+pxow6wGtNAWdZh7noIOpdD5TwQ3CprzgIE1bBBoim0vbR1+AWsWjQmU7zXHgQo4TWSP6lCeiWcQ==", - "path": "system.globalization.extensions/4.3.0", - "hashPath": "system.globalization.extensions.4.3.0.nupkg.sha512" - }, - "System.IO/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3qjaHvxQPDpSOYICjUoTsmoq5u6QJAFRUITgeT/4gqkF1bajbSmb1kwSxEA8AHlofqgcKJcM8udgieRNhaJ5Cg==", - "path": "system.io/4.3.0", - "hashPath": "system.io.4.3.0.nupkg.sha512" - }, - "System.IO.FileSystem/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3wEMARTnuio+ulnvi+hkRNROYwa1kylvYahhcLk4HSoVdl+xxTFVeVlYOfLwrDPImGls0mDqbMhrza8qnWPTdA==", - "path": "system.io.filesystem/4.3.0", - "hashPath": "system.io.filesystem.4.3.0.nupkg.sha512" - }, - "System.IO.FileSystem.AccessControl/5.0.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-SxHB3nuNrpptVk+vZ/F+7OHEpoHUIKKMl02bUmYHQr1r+glbZQxs7pRtsf4ENO29TVm2TH3AEeep2fJcy92oYw==", - "path": "system.io.filesystem.accesscontrol/5.0.0", - "hashPath": "system.io.filesystem.accesscontrol.5.0.0.nupkg.sha512" - }, - "System.IO.FileSystem.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-6QOb2XFLch7bEc4lIcJH49nJN2HV+OC3fHDgsLVsBVBk3Y4hFAnOBGzJ2lUu7CyDDFo9IBWkSsnbkT6IBwwiMw==", - "path": "system.io.filesystem.primitives/4.3.0", - "hashPath": "system.io.filesystem.primitives.4.3.0.nupkg.sha512" - }, - "System.Linq/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-5DbqIUpsDp0dFftytzuMmc0oeMdQwjcP/EWxsksIz/w1TcFRkZ3yKKz0PqiYFMmEwPSWw+qNVqD7PJ889JzHbw==", - "path": "system.linq/4.3.0", - "hashPath": "system.linq.4.3.0.nupkg.sha512" - }, - "System.Linq.Expressions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-PGKkrd2khG4CnlyJwxwwaWWiSiWFNBGlgXvJpeO0xCXrZ89ODrQ6tjEWS/kOqZ8GwEOUATtKtzp1eRgmYNfclg==", - "path": "system.linq.expressions/4.3.0", - "hashPath": "system.linq.expressions.4.3.0.nupkg.sha512" - }, - "System.Memory/4.5.4": { - "type": "package", - "serviceable": true, - "sha512": "sha512-1MbJTHS1lZ4bS4FmsJjnuGJOu88ZzTT2rLvrhW7Ygic+pC0NWA+3hgAen0HRdsocuQXCkUTdFn9yHJJhsijDXw==", - "path": "system.memory/4.5.4", - "hashPath": "system.memory.4.5.4.nupkg.sha512" - }, - "System.Memory.Data/1.0.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-JGkzeqgBsiZwKJZ1IxPNsDFZDhUvuEdX8L8BDC8N3KOj+6zMcNU28CNN59TpZE/VJYy9cP+5M+sbxtWJx3/xtw==", - "path": "system.memory.data/1.0.2", - "hashPath": "system.memory.data.1.0.2.nupkg.sha512" - }, - "System.Numerics.Vectors/4.5.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-QQTlPTl06J/iiDbJCiepZ4H//BVraReU4O4EoRw1U02H5TLUIT7xn3GnDp9AXPSlJUDyFs4uWjWafNX6WrAojQ==", - "path": "system.numerics.vectors/4.5.0", - "hashPath": "system.numerics.vectors.4.5.0.nupkg.sha512" - }, - "System.ObjectModel/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-bdX+80eKv9bN6K4N+d77OankKHGn6CH711a6fcOpMQu2Fckp/Ft4L/kW9WznHpyR0NRAvJutzOMHNNlBGvxQzQ==", - "path": "system.objectmodel/4.3.0", - "hashPath": "system.objectmodel.4.3.0.nupkg.sha512" - }, - "System.Reflection/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-KMiAFoW7MfJGa9nDFNcfu+FpEdiHpWgTcS2HdMpDvt9saK3y/G4GwprPyzqjFH9NTaGPQeWNHU+iDlDILj96aQ==", - "path": "system.reflection/4.3.0", - "hashPath": "system.reflection.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-228FG0jLcIwTVJyz8CLFKueVqQK36ANazUManGaJHkO0icjiIypKW7YLWLIWahyIkdh5M7mV2dJepllLyA1SKg==", - "path": "system.reflection.emit/4.3.0", - "hashPath": "system.reflection.emit.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit.ILGeneration/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-59tBslAk9733NXLrUJrwNZEzbMAcu8k344OYo+wfSVygcgZ9lgBdGIzH/nrg3LYhXceynyvTc8t5/GD4Ri0/ng==", - "path": "system.reflection.emit.ilgeneration/4.3.0", - "hashPath": "system.reflection.emit.ilgeneration.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit.Lightweight/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-oadVHGSMsTmZsAF864QYN1t1QzZjIcuKU3l2S9cZOwDdDueNTrqq1yRj7koFfIGEnKpt6NjpL3rOzRhs4ryOgA==", - "path": "system.reflection.emit.lightweight/4.3.0", - "hashPath": "system.reflection.emit.lightweight.4.3.0.nupkg.sha512" - }, - "System.Reflection.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-rJkrJD3kBI5B712aRu4DpSIiHRtr6QlfZSQsb0hYHrDCZORXCFjQfoipo2LaMUHoT9i1B7j7MnfaEKWDFmFQNQ==", - "path": "system.reflection.extensions/4.3.0", - "hashPath": "system.reflection.extensions.4.3.0.nupkg.sha512" - }, - "System.Reflection.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-5RXItQz5As4xN2/YUDxdpsEkMhvw3e6aNveFXUn4Hl/udNTCNhnKp8lT9fnc3MhvGKh1baak5CovpuQUXHAlIA==", - "path": "system.reflection.primitives/4.3.0", - "hashPath": "system.reflection.primitives.4.3.0.nupkg.sha512" - }, - "System.Reflection.TypeExtensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-7u6ulLcZbyxB5Gq0nMkQttcdBTx57ibzw+4IOXEfR+sXYQoHvjW5LTLyNr8O22UIMrqYbchJQJnos4eooYzYJA==", - "path": "system.reflection.typeextensions/4.3.0", - "hashPath": "system.reflection.typeextensions.4.3.0.nupkg.sha512" - }, - "System.Resources.ResourceManager/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-/zrcPkkWdZmI4F92gL/TPumP98AVDu/Wxr3CSJGQQ+XN6wbRZcyfSKVoPo17ilb3iOr0cCRqJInGwNMolqhS8A==", - "path": "system.resources.resourcemanager/4.3.0", - "hashPath": "system.resources.resourcemanager.4.3.0.nupkg.sha512" - }, - "System.Runtime/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-JufQi0vPQ0xGnAczR13AUFglDyVYt4Kqnz1AZaiKZ5+GICq0/1MH/mO/eAJHt/mHW1zjKBJd7kV26SrxddAhiw==", - "path": "system.runtime/4.3.0", - "hashPath": "system.runtime.4.3.0.nupkg.sha512" - }, - "System.Runtime.CompilerServices.Unsafe/4.7.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-zOHkQmzPCn5zm/BH+cxC1XbUS3P4Yoi3xzW7eRgVpDR2tPGSzyMZ17Ig1iRkfJuY0nhxkQQde8pgePNiA7z7TQ==", - "path": "system.runtime.compilerservices.unsafe/4.7.1", - "hashPath": "system.runtime.compilerservices.unsafe.4.7.1.nupkg.sha512" - }, - "System.Runtime.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-guW0uK0fn5fcJJ1tJVXYd7/1h5F+pea1r7FLSOz/f8vPEqbR2ZAknuRDvTQ8PzAilDveOxNjSfr0CHfIQfFk8g==", - "path": "system.runtime.extensions/4.3.0", - "hashPath": "system.runtime.extensions.4.3.0.nupkg.sha512" - }, - "System.Runtime.Handles/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-OKiSUN7DmTWeYb3l51A7EYaeNMnvxwE249YtZz7yooT4gOZhmTjIn48KgSsw2k2lYdLgTKNJw/ZIfSElwDRVgg==", - "path": "system.runtime.handles/4.3.0", - "hashPath": "system.runtime.handles.4.3.0.nupkg.sha512" - }, - "System.Runtime.InteropServices/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-uv1ynXqiMK8mp1GM3jDqPCFN66eJ5w5XNomaK2XD+TuCroNTLFGeZ+WCmBMcBDyTFKou3P6cR6J/QsaqDp7fGQ==", - "path": "system.runtime.interopservices/4.3.0", - "hashPath": "system.runtime.interopservices.4.3.0.nupkg.sha512" - }, - "System.Runtime.Serialization.Formatters/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-KT591AkTNFOTbhZlaeMVvfax3RqhH1EJlcwF50Wm7sfnBLuHiOeZRRKrr1ns3NESkM20KPZ5Ol/ueMq5vg4QoQ==", - "path": "system.runtime.serialization.formatters/4.3.0", - "hashPath": "system.runtime.serialization.formatters.4.3.0.nupkg.sha512" - }, - "System.Runtime.Serialization.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Wz+0KOukJGAlXjtKr+5Xpuxf8+c8739RI1C+A2BoQZT+wMCCoMDDdO8/4IRHfaVINqL78GO8dW8G2lW/e45Mcw==", - "path": "system.runtime.serialization.primitives/4.3.0", - "hashPath": "system.runtime.serialization.primitives.4.3.0.nupkg.sha512" - }, - "System.Security.AccessControl/5.0.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-dagJ1mHZO3Ani8GH0PHpPEe/oYO+rVdbQjvjJkBRNQkX4t0r1iaeGn8+/ybkSLEan3/slM0t59SVdHzuHf2jmw==", - "path": "system.security.accesscontrol/5.0.0", - "hashPath": "system.security.accesscontrol.5.0.0.nupkg.sha512" - }, - "System.Security.Cryptography.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-7bDIyVFNL/xKeFHjhobUAQqSpJq9YTOpbEs6mR233Et01STBMXNAc/V+BM6dwYGc95gVh/Zf+iVXWzj3mE8DWg==", - "path": "system.security.cryptography.primitives/4.3.0", - "hashPath": "system.security.cryptography.primitives.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.ProtectedData/4.7.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ehYW0m9ptxpGWvE4zgqongBVWpSDU/JCFD4K7krxkQwSz/sFQjEXCUqpvencjy6DYDbn7Ig09R8GFffu8TtneQ==", - "path": "system.security.cryptography.protecteddata/4.7.0", - "hashPath": "system.security.cryptography.protecteddata.4.7.0.nupkg.sha512" - }, - "System.Security.Principal.Windows/5.0.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-t0MGLukB5WAVU9bO3MGzvlGnyJPgUlcwerXn1kzBRjwLKixT96XV0Uza41W49gVd8zEMFu9vQEFlv0IOrytICA==", - "path": "system.security.principal.windows/5.0.0", - "hashPath": "system.security.principal.windows.5.0.0.nupkg.sha512" - }, - "System.Security.SecureString/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-PnXp38O9q/2Oe4iZHMH60kinScv6QiiL2XH54Pj2t0Y6c2zKPEiAZsM/M3wBOHLNTBDFP0zfy13WN2M0qFz5jg==", - "path": "system.security.securestring/4.3.0", - "hashPath": "system.security.securestring.4.3.0.nupkg.sha512" - }, - "System.Text.Encoding/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-BiIg+KWaSDOITze6jGQynxg64naAPtqGHBwDrLaCtixsa5bKiR8dpPOHA7ge3C0JJQizJE+sfkz1wV+BAKAYZw==", - "path": "system.text.encoding/4.3.0", - "hashPath": "system.text.encoding.4.3.0.nupkg.sha512" - }, - "System.Text.Encoding.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-YVMK0Bt/A43RmwizJoZ22ei2nmrhobgeiYwFzC4YAN+nue8RF6djXDMog0UCn+brerQoYVyaS+ghy9P/MUVcmw==", - "path": "system.text.encoding.extensions/4.3.0", - "hashPath": "system.text.encoding.extensions.4.3.0.nupkg.sha512" - }, - "System.Text.Encodings.Web/4.7.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iTUgB/WtrZ1sWZs84F2hwyQhiRH6QNjQv2DkwrH+WP6RoFga2Q1m3f9/Q7FG8cck8AdHitQkmkXSY8qylcDmuA==", - "path": "system.text.encodings.web/4.7.2", - "hashPath": "system.text.encodings.web.4.7.2.nupkg.sha512" - }, - "System.Text.Json/4.7.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-TcMd95wcrubm9nHvJEQs70rC0H/8omiSGGpU4FQ/ZA1URIqD4pjmFJh2Mfv1yH1eHgJDWTi2hMDXwTET+zOOyg==", - "path": "system.text.json/4.7.2", - "hashPath": "system.text.json.4.7.2.nupkg.sha512" - }, - "System.Text.RegularExpressions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-RpT2DA+L660cBt1FssIE9CAGpLFdFPuheB7pLpKpn6ZXNby7jDERe8Ua/Ne2xGiwLVG2JOqziiaVCGDon5sKFA==", - "path": "system.text.regularexpressions/4.3.0", - "hashPath": "system.text.regularexpressions.4.3.0.nupkg.sha512" - }, - "System.Threading/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VkUS0kOBcUf3Wwm0TSbrevDDZ6BlM+b/HRiapRFWjM5O0NS0LviG0glKmFK+hhPDd1XFeSdU1GmlLhb2CoVpIw==", - "path": "system.threading/4.3.0", - "hashPath": "system.threading.4.3.0.nupkg.sha512" - }, - "System.Threading.Tasks/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-LbSxKEdOUhVe8BezB/9uOGGppt+nZf6e1VFyw6v3DN6lqitm0OSn2uXMOdtP0M3W4iMcqcivm2J6UgqiwwnXiA==", - "path": "system.threading.tasks/4.3.0", - "hashPath": "system.threading.tasks.4.3.0.nupkg.sha512" - }, - "System.Threading.Tasks.Extensions/4.5.4": { - "type": "package", - "serviceable": true, - "sha512": "sha512-zteT+G8xuGu6mS+mzDzYXbzS7rd3K6Fjb9RiZlYlJPam2/hU7JCBZBVEcywNuR+oZ1ncTvc/cq0faRr3P01OVg==", - "path": "system.threading.tasks.extensions/4.5.4", - "hashPath": "system.threading.tasks.extensions.4.5.4.nupkg.sha512" - }, - "System.Xml.ReaderWriter/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-GrprA+Z0RUXaR4N7/eW71j1rgMnEnEVlgii49GZyAjTH7uliMnrOU3HNFBr6fEDBCJCIdlVNq9hHbaDR621XBA==", - "path": "system.xml.readerwriter/4.3.0", - "hashPath": "system.xml.readerwriter.4.3.0.nupkg.sha512" - }, - "System.Xml.XmlDocument/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-lJ8AxvkX7GQxpC6GFCeBj8ThYVyQczx2+f/cWHJU8tjS7YfI6Cv6bon70jVEgs2CiFbmmM8b9j1oZVx0dSI2Ww==", - "path": "system.xml.xmldocument/4.3.0", - "hashPath": "system.xml.xmldocument.4.3.0.nupkg.sha512" - }, - "System.Xml.XmlSerializer/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-MYoTCP7EZ98RrANESW05J5ZwskKDoN0AuZ06ZflnowE50LTpbR5yRg3tHckTVm5j/m47stuGgCrCHWePyHS70Q==", - "path": "system.xml.xmlserializer/4.3.0", - "hashPath": "system.xml.xmlserializer.4.3.0.nupkg.sha512" - } - } -} \ No newline at end of file diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.dll deleted file mode 100644 index 83cea74cb6c0..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authentication.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.deps.json b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.deps.json deleted file mode 100644 index 4ea1ce26d12e..000000000000 --- a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.deps.json +++ /dev/null @@ -1,2020 +0,0 @@ -{ - "runtimeTarget": { - "name": ".NETCoreApp,Version=v3.1", - "signature": "" - }, - "compilationOptions": {}, - "targets": { - ".NETCoreApp,Version=v3.1": { - "Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext/1.0.0": { - "dependencies": { - "Azure.Core": "1.25.0", - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Aks": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Authorization": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Compute": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.KeyVault": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Monitor": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Network": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.PolicyInsights": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Storage.Management": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Websites": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Storage": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Strategies": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "PowerShellStandard.Library": "5.1.0" - }, - "runtime": { - "Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll": {} - } - }, - "Azure.Core/1.25.0": { - "dependencies": { - "Microsoft.Bcl.AsyncInterfaces": "1.1.1", - "System.Diagnostics.DiagnosticSource": "4.6.0", - "System.Memory.Data": "1.0.2", - "System.Numerics.Vectors": "4.5.0", - "System.Text.Encodings.Web": "4.7.2", - "System.Text.Json": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netcoreapp2.1/Azure.Core.dll": { - "assemblyVersion": "1.25.0.0", - "fileVersion": "1.2500.22.33004" - } - } - }, - "Hyak.Common/1.2.2": { - "dependencies": { - "NETStandard.Library": "1.6.1", - "Newtonsoft.Json": "10.0.3", - "System.Reflection": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.4/Hyak.Common.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.2.2.0" - } - } - }, - "Microsoft.ApplicationInsights/2.13.1": { - "dependencies": { - "System.Diagnostics.DiagnosticSource": "4.6.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.ApplicationInsights.dll": { - "assemblyVersion": "2.13.1.12554", - "fileVersion": "2.13.1.12554" - } - } - }, - "Microsoft.Azure.Common/2.2.1": { - "dependencies": { - "Hyak.Common": "1.2.2", - "NETStandard.Library": "1.6.1" - }, - "runtime": { - "lib/netstandard1.4/Microsoft.Azure.Common.dll": { - "assemblyVersion": "2.0.0.0", - "fileVersion": "2.2.1.0" - } - } - }, - "Microsoft.Azure.PowerShell.Authentication.Abstractions/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Aks/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Aks.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Authorization/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Authorization.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Compute/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Compute.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.KeyVault/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.NonGeneric": "4.3.0", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.KeyVault.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Monitor/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Monitor.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Network/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Network.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.PolicyInsights/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.ResourceManager/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Storage.Management/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "System.Collections.NonGeneric": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Websites/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Websites.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Common/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Common.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Common.Share/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Common.Share.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Storage/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Storage.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Strategies/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Strategies.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Bcl.AsyncInterfaces/1.1.1": { - "runtime": { - "lib/netstandard2.1/Microsoft.Bcl.AsyncInterfaces.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "4.700.20.21406" - } - } - }, - "Microsoft.CSharp/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Dynamic.Runtime": "4.3.0", - "System.Globalization": "4.3.0", - "System.Linq": "4.3.0", - "System.Linq.Expressions": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "Microsoft.NETCore.Platforms/1.1.0": {}, - "Microsoft.NETCore.Targets/1.1.0": {}, - "Microsoft.Rest.ClientRuntime/2.3.24": { - "dependencies": { - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Rest.ClientRuntime.dll": { - "assemblyVersion": "2.0.0.0", - "fileVersion": "2.3.23.0" - } - } - }, - "Microsoft.Rest.ClientRuntime.Azure/3.3.19": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Rest.ClientRuntime.Azure.dll": { - "assemblyVersion": "3.0.0.0", - "fileVersion": "3.3.18.0" - } - } - }, - "Microsoft.Win32.Primitives/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "NETStandard.Library/1.6.1": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.Win32.Primitives": "4.3.0", - "System.AppContext": "4.3.0", - "System.Collections": "4.3.0", - "System.Collections.Concurrent": "4.3.0", - "System.Console": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Diagnostics.Tools": "4.3.0", - "System.Diagnostics.Tracing": "4.3.0", - "System.Globalization": "4.3.0", - "System.Globalization.Calendars": "4.3.0", - "System.IO": "4.3.0", - "System.IO.Compression": "4.3.0", - "System.IO.Compression.ZipFile": "4.3.0", - "System.IO.FileSystem": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Linq": "4.3.0", - "System.Linq.Expressions": "4.3.0", - "System.Net.Http": "4.3.0", - "System.Net.Primitives": "4.3.0", - "System.Net.Sockets": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Runtime.InteropServices.RuntimeInformation": "4.3.0", - "System.Runtime.Numerics": "4.3.0", - "System.Security.Cryptography.Algorithms": "4.3.0", - "System.Security.Cryptography.Encoding": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Security.Cryptography.X509Certificates": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Text.Encoding.Extensions": "4.3.0", - "System.Text.RegularExpressions": "4.3.0", - "System.Threading": "4.3.0", - "System.Threading.Tasks": "4.3.0", - "System.Threading.Timer": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0", - "System.Xml.XDocument": "4.3.0" - } - }, - "Newtonsoft.Json/10.0.3": { - "dependencies": { - "Microsoft.CSharp": "4.3.0", - "NETStandard.Library": "1.6.1", - "System.ComponentModel.TypeConverter": "4.3.0", - "System.Runtime.Serialization.Formatters": "4.3.0", - "System.Runtime.Serialization.Primitives": "4.3.0", - "System.Xml.XmlDocument": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/Newtonsoft.Json.dll": { - "assemblyVersion": "10.0.0.0", - "fileVersion": "10.0.3.21018" - } - } - }, - "PowerShellStandard.Library/5.1.0": {}, - "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "runtime.native.System/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0" - } - }, - "runtime.native.System.IO.Compression/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0" - } - }, - "runtime.native.System.Net.Http/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0" - } - }, - "runtime.native.System.Security.Cryptography.Apple/4.3.0": { - "dependencies": { - "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.Apple": "4.3.0" - } - }, - "runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "dependencies": { - "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0", - "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0", - "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0", - "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0", - "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0", - "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0", - "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0", - "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0", - "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0", - "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0" - } - }, - "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.Apple/4.3.0": {}, - "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": {}, - "System.AppContext/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - } - }, - "System.Buffers/4.3.0": { - "dependencies": { - "System.Diagnostics.Debug": "4.3.0", - "System.Diagnostics.Tracing": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Collections/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Collections.Concurrent/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Diagnostics.Tracing": "4.3.0", - "System.Globalization": "4.3.0", - "System.Reflection": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.Collections.NonGeneric/4.3.0": { - "dependencies": { - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Collections.Specialized/4.3.0": { - "dependencies": { - "System.Collections.NonGeneric": "4.3.0", - "System.Globalization": "4.3.0", - "System.Globalization.Extensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.ComponentModel/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - } - }, - "System.ComponentModel.Primitives/4.3.0": { - "dependencies": { - "System.ComponentModel": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.ComponentModel.TypeConverter/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Collections.NonGeneric": "4.3.0", - "System.Collections.Specialized": "4.3.0", - "System.ComponentModel": "4.3.0", - "System.ComponentModel.Primitives": "4.3.0", - "System.Globalization": "4.3.0", - "System.Linq": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Console/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.Runtime": "4.3.0", - "System.Text.Encoding": "4.3.0" - } - }, - "System.Diagnostics.Debug/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Diagnostics.DiagnosticSource/4.6.0": {}, - "System.Diagnostics.Tools/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Diagnostics.Tracing/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Dynamic.Runtime/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Linq": "4.3.0", - "System.Linq.Expressions": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Globalization/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Globalization.Calendars/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Globalization": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Globalization.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0" - } - }, - "System.IO/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.IO.Compression/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Buffers": "4.3.0", - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0", - "System.Threading.Tasks": "4.3.0", - "runtime.native.System": "4.3.0", - "runtime.native.System.IO.Compression": "4.3.0" - } - }, - "System.IO.Compression.ZipFile/4.3.0": { - "dependencies": { - "System.Buffers": "4.3.0", - "System.IO": "4.3.0", - "System.IO.Compression": "4.3.0", - "System.IO.FileSystem": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.Encoding": "4.3.0" - } - }, - "System.IO.FileSystem/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.IO.FileSystem.Primitives/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - } - }, - "System.Linq/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0" - } - }, - "System.Linq.Expressions/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Linq": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Emit.Lightweight": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Memory.Data/1.0.2": { - "dependencies": { - "System.Text.Encodings.Web": "4.7.2", - "System.Text.Json": "4.7.2" - }, - "runtime": { - "lib/netstandard2.0/System.Memory.Data.dll": { - "assemblyVersion": "1.0.2.0", - "fileVersion": "1.0.221.20802" - } - } - }, - "System.Net.Http/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Diagnostics.DiagnosticSource": "4.6.0", - "System.Diagnostics.Tracing": "4.3.0", - "System.Globalization": "4.3.0", - "System.Globalization.Extensions": "4.3.0", - "System.IO": "4.3.0", - "System.IO.FileSystem": "4.3.0", - "System.Net.Primitives": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Security.Cryptography.Algorithms": "4.3.0", - "System.Security.Cryptography.Encoding": "4.3.0", - "System.Security.Cryptography.OpenSsl": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Security.Cryptography.X509Certificates": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0", - "System.Threading.Tasks": "4.3.0", - "runtime.native.System": "4.3.0", - "runtime.native.System.Net.Http": "4.3.0", - "runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0" - } - }, - "System.Net.Primitives/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0" - } - }, - "System.Net.Sockets/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.Net.Primitives": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.Numerics.Vectors/4.5.0": {}, - "System.ObjectModel/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Reflection/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Emit/4.3.0": { - "dependencies": { - "System.IO": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Emit.ILGeneration/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Emit.Lightweight/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Primitives/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.TypeExtensions/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Resources.ResourceManager/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Globalization": "4.3.0", - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0" - } - }, - "System.Runtime.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime.Handles/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime.InteropServices/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Reflection": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0" - } - }, - "System.Runtime.InteropServices.RuntimeInformation/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Threading": "4.3.0", - "runtime.native.System": "4.3.0" - } - }, - "System.Runtime.Numerics/4.3.0": { - "dependencies": { - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0" - } - }, - "System.Runtime.Serialization.Formatters/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Reflection": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Serialization.Primitives": "4.3.0" - } - }, - "System.Runtime.Serialization.Primitives/4.3.0": { - "dependencies": { - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Security.Cryptography.Algorithms/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Collections": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Runtime.Numerics": "4.3.0", - "System.Security.Cryptography.Encoding": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0", - "runtime.native.System.Security.Cryptography.Apple": "4.3.0", - "runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0" - } - }, - "System.Security.Cryptography.Cng/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Security.Cryptography.Algorithms": "4.3.0", - "System.Security.Cryptography.Encoding": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0" - } - }, - "System.Security.Cryptography.Csp/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.IO": "4.3.0", - "System.Reflection": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Security.Cryptography.Algorithms": "4.3.0", - "System.Security.Cryptography.Encoding": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Security.Cryptography.Encoding/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Collections": "4.3.0", - "System.Collections.Concurrent": "4.3.0", - "System.Linq": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0", - "runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0" - } - }, - "System.Security.Cryptography.OpenSsl/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Runtime.Numerics": "4.3.0", - "System.Security.Cryptography.Algorithms": "4.3.0", - "System.Security.Cryptography.Encoding": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0", - "runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0" - } - }, - "System.Security.Cryptography.Primitives/4.3.0": { - "dependencies": { - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.Security.Cryptography.X509Certificates/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.Globalization.Calendars": "4.3.0", - "System.IO": "4.3.0", - "System.IO.FileSystem": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Runtime.Numerics": "4.3.0", - "System.Security.Cryptography.Algorithms": "4.3.0", - "System.Security.Cryptography.Cng": "4.3.0", - "System.Security.Cryptography.Csp": "4.3.0", - "System.Security.Cryptography.Encoding": "4.3.0", - "System.Security.Cryptography.OpenSsl": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0", - "runtime.native.System": "4.3.0", - "runtime.native.System.Net.Http": "4.3.0", - "runtime.native.System.Security.Cryptography.OpenSsl": "4.3.0" - } - }, - "System.Security.SecureString/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Text.Encoding/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Text.Encoding.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0", - "System.Text.Encoding": "4.3.0" - } - }, - "System.Text.Encodings.Web/4.7.2": { - "runtime": { - "lib/netstandard2.1/System.Text.Encodings.Web.dll": { - "assemblyVersion": "4.0.5.1", - "fileVersion": "4.700.21.11602" - } - } - }, - "System.Text.Json/4.7.2": { - "runtime": { - "lib/netcoreapp3.0/System.Text.Json.dll": { - "assemblyVersion": "4.0.1.2", - "fileVersion": "4.700.20.21406" - } - } - }, - "System.Text.RegularExpressions/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - } - }, - "System.Threading/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.Threading.Tasks/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Threading.Tasks.Extensions/4.5.4": {}, - "System.Threading.Timer/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Xml.ReaderWriter/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.IO.FileSystem": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Text.Encoding.Extensions": "4.3.0", - "System.Text.RegularExpressions": "4.3.0", - "System.Threading.Tasks": "4.3.0", - "System.Threading.Tasks.Extensions": "4.5.4" - } - }, - "System.Xml.XDocument/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Diagnostics.Tools": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Reflection": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0" - } - }, - "System.Xml.XmlDocument/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0" - } - }, - "System.Xml.XmlSerializer/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Linq": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.RegularExpressions": "4.3.0", - "System.Threading": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0", - "System.Xml.XmlDocument": "4.3.0" - } - } - } - }, - "libraries": { - "Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext/1.0.0": { - "type": "project", - "serviceable": false, - "sha512": "" - }, - "Azure.Core/1.25.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-X8Dd4sAggS84KScWIjEbFAdt2U1KDolQopTPoHVubG2y3CM54f9l6asVrP5Uy384NWXjsspPYaJgz5xHc+KvTA==", - "path": "azure.core/1.25.0", - "hashPath": "azure.core.1.25.0.nupkg.sha512" - }, - "Hyak.Common/1.2.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-uZpnFn48nSQwHcO0/GSBZ7ExaO0sTXKv8KariXXEWLaB4Q3AeQoprYG4WpKsCT0ByW3YffETivgc5rcH5RRDvQ==", - "path": "hyak.common/1.2.2", - "hashPath": "hyak.common.1.2.2.nupkg.sha512" - }, - "Microsoft.ApplicationInsights/2.13.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-BQhLmYR06Z8TVCdxnr8WOhhovJHtqYRNeB5gePBdQ4uDOE8D4IK9HW9i6a3llELz1QHv4HtFpku6dpXMGnO22g==", - "path": "microsoft.applicationinsights/2.13.1", - "hashPath": "microsoft.applicationinsights.2.13.1.nupkg.sha512" - }, - "Microsoft.Azure.Common/2.2.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-abzRooh4ACKjzAKxRB6r+SHKW3d+IrLcgtVG81D+3kQU/OMjAZS1oDp9CDalhSbmxa84u0MHM5N+AKeTtKPoiw==", - "path": "microsoft.azure.common/2.2.1", - "hashPath": "microsoft.azure.common.2.2.1.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Authentication.Abstractions/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-nHFO8TXWgxUlyBxsFxZk2NTiV18MeYxJYj1weApqpAlaHcHixJA7500OnUs+HqqaA66QAFmKYQ9Tr4r5cB8jLw==", - "path": "microsoft.azure.powershell.authentication.abstractions/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.authentication.abstractions.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Aks/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-vdHb0jV2i2dAcSwQA8IaH6nHAVb+eoO8aYYO8nJX9xMkciIyiLOVaBDH9U6CbrrlfDJ3/rnWeW+8WGNR6Fu5cg==", - "path": "microsoft.azure.powershell.clients.aks/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.aks.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Authorization/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ZXNfDic5HZiRwAtuBsH0NMXUhcCiX6mSrHVUb0EbOS374QYph2zB1zXiaG8DoclvUFE+nlyd5ZyH1cfqotwY0g==", - "path": "microsoft.azure.powershell.clients.authorization/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.authorization.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Compute/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-G1NIn7RlFPspoExrXiwCVLIj4wghjX+usciwC84in4+sDZFf3UFGj6HgU6wXlmSLN9BxqX9NFfJBi557lF+4rg==", - "path": "microsoft.azure.powershell.clients.compute/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.compute.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ALK2mcq/Gpfwm1bEQcq8FQNvZvF6PgN5jM5q3I1PAVS2u5F1UDa1tKjrjguSQIXLiE1Lthnwts3OaA03gNe3kA==", - "path": "microsoft.azure.powershell.clients.graph.rbac/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.graph.rbac.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.KeyVault/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-WGJeLeOs0KtL/tpSSm+l6fvkblh3uXTiog8uv3ADACGxzjaLB+d+0WE9uCxF21YTUxQ4ZhJxdQN+zQ6ggBcNbg==", - "path": "microsoft.azure.powershell.clients.keyvault/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.keyvault.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Monitor/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-mdd+N2hhB6t0KACILOc7b3G7bDO5fmfLpYnFuvWykxsUpD2y6MtBJl+DnJxz4LcUvjK5djEM8Le0wef1pmUmgg==", - "path": "microsoft.azure.powershell.clients.monitor/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.monitor.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Network/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-OX2mzGPquFfAGO/xqkRfM1spAywLMy9p7ThZmE69TVp+gbR6CGVd9ZL6OBM7Na/QTMlcMwD1rD4/BQx//8b0uQ==", - "path": "microsoft.azure.powershell.clients.network/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.network.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.PolicyInsights/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-owaa5B00b+wNU/iGBBeNIMTsc49prqfW/CfTVuQJSNTjxylpGNI6dxwQdgQXbcm0+x5mhy2YliqjzJvTdjTkog==", - "path": "microsoft.azure.powershell.clients.policyinsights/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.policyinsights.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.ResourceManager/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-1fGG2qDixHzSzH0HapF34faIBF0VeCnsO76lS6UxMBEZtCvgyKydhmR7FfPH72E+Opmay1i8rLkkvXKVqA6Zdg==", - "path": "microsoft.azure.powershell.clients.resourcemanager/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.resourcemanager.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Storage.Management/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-GfKe+wh2OqLU+NiIZERaw7+W/WZx9ASUikJ1lF8OiupuUgTW/uIUY46vOTB38nLF9g6YmYk6n0GXnVibivv5KQ==", - "path": "microsoft.azure.powershell.clients.storage.management/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.storage.management.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Websites/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iYvqqHCRfpaya3p1vV3bEXqecc2GHraEGlTn1scHLLrg0zTwLXxq0AAiGX9uzzPcGgByubvgw263T0tlLJ4BUg==", - "path": "microsoft.azure.powershell.clients.websites/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.websites.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Common/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-T42Yq1XesvgiTziZ6EHXz9RHP70pQYtw8UUXRYyuGV2D7u5r5euiMXDyLhpYxvgk0HKGr/Fi4f0c/iocrkHbyg==", - "path": "microsoft.azure.powershell.common/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.common.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Common.Share/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VU1zooS2hmazP/GXN/RjD8VXy3JjtrzMgzJhEthkxwjv5o0Lu0jxx34laFO1JEbYz25Ne/e8sEiY6R92jn2xAA==", - "path": "microsoft.azure.powershell.common.share/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.common.share.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Storage/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-63NqNOYOmES56Fa75Jqf195J6PPljEeoldwnN0CmPrb2ssrijLOk33xISV7Lkc/y5bnxYOlQf1MXwTTmDODaZg==", - "path": "microsoft.azure.powershell.storage/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.storage.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Strategies/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-m43h24WmeLPU/alUUtBNzQ5H+DPXKSPQyTYujjqJ3gJZd/zFRDCE7SHpdNhMVW53H23M6iT6szxxaOo6f0eWMg==", - "path": "microsoft.azure.powershell.strategies/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.strategies.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Bcl.AsyncInterfaces/1.1.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-yuvf07qFWFqtK3P/MRkEKLhn5r2UbSpVueRziSqj0yJQIKFwG1pq9mOayK3zE5qZCTs0CbrwL9M6R8VwqyGy2w==", - "path": "microsoft.bcl.asyncinterfaces/1.1.1", - "hashPath": "microsoft.bcl.asyncinterfaces.1.1.1.nupkg.sha512" - }, - "Microsoft.CSharp/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-P+MBhIM0YX+JqROuf7i306ZLJEjQYA9uUyRDE+OqwUI5sh41e2ZbPQV3LfAPh+29cmceE1pUffXsGfR4eMY3KA==", - "path": "microsoft.csharp/4.3.0", - "hashPath": "microsoft.csharp.4.3.0.nupkg.sha512" - }, - "Microsoft.NETCore.Platforms/1.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-kz0PEW2lhqygehI/d6XsPCQzD7ff7gUJaVGPVETX611eadGsA3A877GdSlU0LRVMCTH/+P3o2iDTak+S08V2+A==", - "path": "microsoft.netcore.platforms/1.1.0", - "hashPath": "microsoft.netcore.platforms.1.1.0.nupkg.sha512" - }, - "Microsoft.NETCore.Targets/1.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-aOZA3BWfz9RXjpzt0sRJJMjAscAUm3Hoa4UWAfceV9UTYxgwZ1lZt5nO2myFf+/jetYQo4uTP7zS8sJY67BBxg==", - "path": "microsoft.netcore.targets/1.1.0", - "hashPath": "microsoft.netcore.targets.1.1.0.nupkg.sha512" - }, - "Microsoft.Rest.ClientRuntime/2.3.24": { - "type": "package", - "serviceable": true, - "sha512": "sha512-hZH7XgM3eV2jFrnq7Yf0nBD4WVXQzDrer2gEY7HMNiwio2hwDsTHO6LWuueNQAfRpNp4W7mKxcXpwXUiuVIlYw==", - "path": "microsoft.rest.clientruntime/2.3.24", - "hashPath": "microsoft.rest.clientruntime.2.3.24.nupkg.sha512" - }, - "Microsoft.Rest.ClientRuntime.Azure/3.3.19": { - "type": "package", - "serviceable": true, - "sha512": "sha512-+NVBWvRXNwaAPTZUxjUlQggsrf3X0GbiRoxYfgc3kG9E55ZxZxvZPT3nIfC4DNqzGSXUEvmLbckdXgBBzGdUaA==", - "path": "microsoft.rest.clientruntime.azure/3.3.19", - "hashPath": "microsoft.rest.clientruntime.azure.3.3.19.nupkg.sha512" - }, - "Microsoft.Win32.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-9ZQKCWxH7Ijp9BfahvL2Zyf1cJIk8XYLF6Yjzr2yi0b2cOut/HQ31qf1ThHAgCc3WiZMdnWcfJCgN82/0UunxA==", - "path": "microsoft.win32.primitives/4.3.0", - "hashPath": "microsoft.win32.primitives.4.3.0.nupkg.sha512" - }, - "NETStandard.Library/1.6.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-WcSp3+vP+yHNgS8EV5J7pZ9IRpeDuARBPN28by8zqff1wJQXm26PVU8L3/fYLBJVU7BtDyqNVWq2KlCVvSSR4A==", - "path": "netstandard.library/1.6.1", - "hashPath": "netstandard.library.1.6.1.nupkg.sha512" - }, - "Newtonsoft.Json/10.0.3": { - "type": "package", - "serviceable": true, - "sha512": "sha512-hSXaFmh7hNCuEoC4XNY5DrRkLDzYHqPx/Ik23R4J86Z7PE/Y6YidhG602dFVdLBRSdG6xp9NabH3dXpcoxWvww==", - "path": "newtonsoft.json/10.0.3", - "hashPath": "newtonsoft.json.10.0.3.nupkg.sha512" - }, - "PowerShellStandard.Library/5.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iYaRvQsM1fow9h3uEmio+2m2VXfulgI16AYHaTZ8Sf7erGe27Qc8w/h6QL5UPuwv1aXR40QfzMEwcCeiYJp2cw==", - "path": "powershellstandard.library/5.1.0", - "hashPath": "powershellstandard.library.5.1.0.nupkg.sha512" - }, - "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-HdSSp5MnJSsg08KMfZThpuLPJpPwE5hBXvHwoKWosyHHfe8Mh5WKT0ylEOf6yNzX6Ngjxe4Whkafh5q7Ymac4Q==", - "path": "runtime.debian.8-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.debian.8-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-+yH1a49wJMy8Zt4yx5RhJrxO/DBDByAiCzNwiETI+1S4mPdCu0OY4djdciC7Vssk0l22wQaDLrXxXkp+3+7bVA==", - "path": "runtime.fedora.23-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.fedora.23-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-c3YNH1GQJbfIPJeCnr4avseugSqPrxwIqzthYyZDN6EuOyNOzq+y2KSUfRcXauya1sF4foESTgwM5e1A8arAKw==", - "path": "runtime.fedora.24-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.fedora.24-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.native.System/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-c/qWt2LieNZIj1jGnVNsE2Kl23Ya2aSTBuXMD6V7k9KWr6l16Tqdwq+hJScEpWER9753NWC8h96PaVNY5Ld7Jw==", - "path": "runtime.native.system/4.3.0", - "hashPath": "runtime.native.system.4.3.0.nupkg.sha512" - }, - "runtime.native.System.IO.Compression/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-INBPonS5QPEgn7naufQFXJEp3zX6L4bwHgJ/ZH78aBTpeNfQMtf7C6VrAFhlq2xxWBveIOWyFzQjJ8XzHMhdOQ==", - "path": "runtime.native.system.io.compression/4.3.0", - "hashPath": "runtime.native.system.io.compression.4.3.0.nupkg.sha512" - }, - "runtime.native.System.Net.Http/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ZVuZJqnnegJhd2k/PtAbbIcZ3aZeITq3sj06oKfMBSfphW3HDmk/t4ObvbOk/JA/swGR0LNqMksAh/f7gpTROg==", - "path": "runtime.native.system.net.http/4.3.0", - "hashPath": "runtime.native.system.net.http.4.3.0.nupkg.sha512" - }, - "runtime.native.System.Security.Cryptography.Apple/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-DloMk88juo0OuOWr56QG7MNchmafTLYWvABy36izkrLI5VledI0rq28KGs1i9wbpeT9NPQrx/wTf8U2vazqQ3Q==", - "path": "runtime.native.system.security.cryptography.apple/4.3.0", - "hashPath": "runtime.native.system.security.cryptography.apple.4.3.0.nupkg.sha512" - }, - "runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-NS1U+700m4KFRHR5o4vo9DSlTmlCKu/u7dtE5sUHVIPB+xpXxYQvgBgA6wEIeCz6Yfn0Z52/72WYsToCEPJnrw==", - "path": "runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-b3pthNgxxFcD+Pc0WSEoC0+md3MyhRS6aCEeenvNE3Fdw1HyJ18ZhRFVJJzIeR/O/jpxPboB805Ho0T3Ul7w8A==", - "path": "runtime.opensuse.13.2-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.opensuse.13.2-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-KeLz4HClKf+nFS7p/6Fi/CqyLXh81FpiGzcmuS8DGi9lUqSnZ6Es23/gv2O+1XVGfrbNmviF7CckBpavkBoIFQ==", - "path": "runtime.opensuse.42.1-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.opensuse.42.1-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.Apple/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-kVXCuMTrTlxq4XOOMAysuNwsXWpYeboGddNGpIgNSZmv1b6r/s/DPk0fYMB7Q5Qo4bY68o48jt4T4y5BVecbCQ==", - "path": "runtime.osx.10.10-x64.runtime.native.system.security.cryptography.apple/4.3.0", - "hashPath": "runtime.osx.10.10-x64.runtime.native.system.security.cryptography.apple.4.3.0.nupkg.sha512" - }, - "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-X7IdhILzr4ROXd8mI1BUCQMSHSQwelUlBjF1JyTKCjXaOGn2fB4EKBxQbCK2VjO3WaWIdlXZL3W6TiIVnrhX4g==", - "path": "runtime.osx.10.10-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.osx.10.10-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-nyFNiCk/r+VOiIqreLix8yN+q3Wga9+SE8BCgkf+2BwEKiNx6DyvFjCgkfV743/grxv8jHJ8gUK4XEQw7yzRYg==", - "path": "runtime.rhel.7-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.rhel.7-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ytoewC6wGorL7KoCAvRfsgoJPJbNq+64k2SqW6JcOAebWsFUvCCYgfzQMrnpvPiEl4OrblUlhF2ji+Q1+SVLrQ==", - "path": "runtime.ubuntu.14.04-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.ubuntu.14.04-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-I8bKw2I8k58Wx7fMKQJn2R8lamboCAiHfHeV/pS65ScKWMMI0+wJkLYlEKvgW1D/XvSl/221clBoR2q9QNNM7A==", - "path": "runtime.ubuntu.16.04-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.ubuntu.16.04-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VB5cn/7OzUfzdnC8tqAIMQciVLiq2epm2NrAm1E9OjNRyG4lVhfR61SMcLizejzQP8R8Uf/0l5qOIbUEi+RdEg==", - "path": "runtime.ubuntu.16.10-x64.runtime.native.system.security.cryptography.openssl/4.3.0", - "hashPath": "runtime.ubuntu.16.10-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "System.AppContext/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-fKC+rmaLfeIzUhagxY17Q9siv/sPrjjKcfNg1Ic8IlQkZLipo8ljcaZQu4VtI4Jqbzjc2VTjzGLF6WmsRXAEgA==", - "path": "system.appcontext/4.3.0", - "hashPath": "system.appcontext.4.3.0.nupkg.sha512" - }, - "System.Buffers/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ratu44uTIHgeBeI0dE8DWvmXVBSo4u7ozRZZHOMmK/JPpYyo0dAfgSiHlpiObMQ5lEtEyIXA40sKRYg5J6A8uQ==", - "path": "system.buffers/4.3.0", - "hashPath": "system.buffers.4.3.0.nupkg.sha512" - }, - "System.Collections/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3Dcj85/TBdVpL5Zr+gEEBUuFe2icOnLalmEh9hfck1PTYbbyWuZgh4fmm2ysCLTrqLQw6t3TgTyJ+VLp+Qb+Lw==", - "path": "system.collections/4.3.0", - "hashPath": "system.collections.4.3.0.nupkg.sha512" - }, - "System.Collections.Concurrent/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ztl69Xp0Y/UXCL+3v3tEU+lIy+bvjKNUmopn1wep/a291pVPK7dxBd6T7WnlQqRog+d1a/hSsgRsmFnIBKTPLQ==", - "path": "system.collections.concurrent/4.3.0", - "hashPath": "system.collections.concurrent.4.3.0.nupkg.sha512" - }, - "System.Collections.NonGeneric/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-prtjIEMhGUnQq6RnPEYLpFt8AtLbp9yq2zxOSrY7KJJZrw25Fi97IzBqY7iqssbM61Ek5b8f3MG/sG1N2sN5KA==", - "path": "system.collections.nongeneric/4.3.0", - "hashPath": "system.collections.nongeneric.4.3.0.nupkg.sha512" - }, - "System.Collections.Specialized/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Epx8PoVZR0iuOnJJDzp7pWvdfMMOAvpUo95pC4ScH2mJuXkKA2Y4aR3cG9qt2klHgSons1WFh4kcGW7cSXvrxg==", - "path": "system.collections.specialized/4.3.0", - "hashPath": "system.collections.specialized.4.3.0.nupkg.sha512" - }, - "System.ComponentModel/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VyGn1jGRZVfxnh8EdvDCi71v3bMXrsu8aYJOwoV7SNDLVhiEqwP86pPMyRGsDsxhXAm2b3o9OIqeETfN5qfezw==", - "path": "system.componentmodel/4.3.0", - "hashPath": "system.componentmodel.4.3.0.nupkg.sha512" - }, - "System.ComponentModel.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-j8GUkCpM8V4d4vhLIIoBLGey2Z5bCkMVNjEZseyAlm4n5arcsJOeI3zkUP+zvZgzsbLTYh4lYeP/ZD/gdIAPrw==", - "path": "system.componentmodel.primitives/4.3.0", - "hashPath": "system.componentmodel.primitives.4.3.0.nupkg.sha512" - }, - "System.ComponentModel.TypeConverter/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-16pQ6P+EdhcXzPiEK4kbA953Fu0MNG2ovxTZU81/qsCd1zPRsKc3uif5NgvllCY598k6bI0KUyKW8fanlfaDQg==", - "path": "system.componentmodel.typeconverter/4.3.0", - "hashPath": "system.componentmodel.typeconverter.4.3.0.nupkg.sha512" - }, - "System.Console/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-DHDrIxiqk1h03m6khKWV2X8p/uvN79rgSqpilL6uzpmSfxfU5ng8VcPtW4qsDsQDHiTv6IPV9TmD5M/vElPNLg==", - "path": "system.console/4.3.0", - "hashPath": "system.console.4.3.0.nupkg.sha512" - }, - "System.Diagnostics.Debug/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ZUhUOdqmaG5Jk3Xdb8xi5kIyQYAA4PnTNlHx1mu9ZY3qv4ELIdKbnL/akbGaKi2RnNUWaZsAs31rvzFdewTj2g==", - "path": "system.diagnostics.debug/4.3.0", - "hashPath": "system.diagnostics.debug.4.3.0.nupkg.sha512" - }, - "System.Diagnostics.DiagnosticSource/4.6.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-mbBgoR0rRfl2uimsZ2avZY8g7Xnh1Mza0rJZLPcxqiMWlkGukjmRkuMJ/er+AhQuiRIh80CR/Hpeztr80seV5g==", - "path": "system.diagnostics.diagnosticsource/4.6.0", - "hashPath": "system.diagnostics.diagnosticsource.4.6.0.nupkg.sha512" - }, - "System.Diagnostics.Tools/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-UUvkJfSYJMM6x527dJg2VyWPSRqIVB0Z7dbjHst1zmwTXz5CcXSYJFWRpuigfbO1Lf7yfZiIaEUesfnl/g5EyA==", - "path": "system.diagnostics.tools/4.3.0", - "hashPath": "system.diagnostics.tools.4.3.0.nupkg.sha512" - }, - "System.Diagnostics.Tracing/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-rswfv0f/Cqkh78rA5S8eN8Neocz234+emGCtTF3lxPY96F+mmmUen6tbn0glN6PMvlKQb9bPAY5e9u7fgPTkKw==", - "path": "system.diagnostics.tracing/4.3.0", - "hashPath": "system.diagnostics.tracing.4.3.0.nupkg.sha512" - }, - "System.Dynamic.Runtime/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-SNVi1E/vfWUAs/WYKhE9+qlS6KqK0YVhnlT0HQtr8pMIA8YX3lwy3uPMownDwdYISBdmAF/2holEIldVp85Wag==", - "path": "system.dynamic.runtime/4.3.0", - "hashPath": "system.dynamic.runtime.4.3.0.nupkg.sha512" - }, - "System.Globalization/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-kYdVd2f2PAdFGblzFswE4hkNANJBKRmsfa2X5LG2AcWE1c7/4t0pYae1L8vfZ5xvE2nK/R9JprtToA61OSHWIg==", - "path": "system.globalization/4.3.0", - "hashPath": "system.globalization.4.3.0.nupkg.sha512" - }, - "System.Globalization.Calendars/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-GUlBtdOWT4LTV3I+9/PJW+56AnnChTaOqqTLFtdmype/L500M2LIyXgmtd9X2P2VOkmJd5c67H5SaC2QcL1bFA==", - "path": "system.globalization.calendars/4.3.0", - "hashPath": "system.globalization.calendars.4.3.0.nupkg.sha512" - }, - "System.Globalization.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-FhKmdR6MPG+pxow6wGtNAWdZh7noIOpdD5TwQ3CprzgIE1bBBoim0vbR1+AWsWjQmU7zXHgQo4TWSP6lCeiWcQ==", - "path": "system.globalization.extensions/4.3.0", - "hashPath": "system.globalization.extensions.4.3.0.nupkg.sha512" - }, - "System.IO/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3qjaHvxQPDpSOYICjUoTsmoq5u6QJAFRUITgeT/4gqkF1bajbSmb1kwSxEA8AHlofqgcKJcM8udgieRNhaJ5Cg==", - "path": "system.io/4.3.0", - "hashPath": "system.io.4.3.0.nupkg.sha512" - }, - "System.IO.Compression/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-YHndyoiV90iu4iKG115ibkhrG+S3jBm8Ap9OwoUAzO5oPDAWcr0SFwQFm0HjM8WkEZWo0zvLTyLmbvTkW1bXgg==", - "path": "system.io.compression/4.3.0", - "hashPath": "system.io.compression.4.3.0.nupkg.sha512" - }, - "System.IO.Compression.ZipFile/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-G4HwjEsgIwy3JFBduZ9quBkAu+eUwjIdJleuNSgmUojbH6O3mlvEIme+GHx/cLlTAPcrnnL7GqvB9pTlWRfhOg==", - "path": "system.io.compression.zipfile/4.3.0", - "hashPath": "system.io.compression.zipfile.4.3.0.nupkg.sha512" - }, - "System.IO.FileSystem/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3wEMARTnuio+ulnvi+hkRNROYwa1kylvYahhcLk4HSoVdl+xxTFVeVlYOfLwrDPImGls0mDqbMhrza8qnWPTdA==", - "path": "system.io.filesystem/4.3.0", - "hashPath": "system.io.filesystem.4.3.0.nupkg.sha512" - }, - "System.IO.FileSystem.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-6QOb2XFLch7bEc4lIcJH49nJN2HV+OC3fHDgsLVsBVBk3Y4hFAnOBGzJ2lUu7CyDDFo9IBWkSsnbkT6IBwwiMw==", - "path": "system.io.filesystem.primitives/4.3.0", - "hashPath": "system.io.filesystem.primitives.4.3.0.nupkg.sha512" - }, - "System.Linq/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-5DbqIUpsDp0dFftytzuMmc0oeMdQwjcP/EWxsksIz/w1TcFRkZ3yKKz0PqiYFMmEwPSWw+qNVqD7PJ889JzHbw==", - "path": "system.linq/4.3.0", - "hashPath": "system.linq.4.3.0.nupkg.sha512" - }, - "System.Linq.Expressions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-PGKkrd2khG4CnlyJwxwwaWWiSiWFNBGlgXvJpeO0xCXrZ89ODrQ6tjEWS/kOqZ8GwEOUATtKtzp1eRgmYNfclg==", - "path": "system.linq.expressions/4.3.0", - "hashPath": "system.linq.expressions.4.3.0.nupkg.sha512" - }, - "System.Memory.Data/1.0.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-JGkzeqgBsiZwKJZ1IxPNsDFZDhUvuEdX8L8BDC8N3KOj+6zMcNU28CNN59TpZE/VJYy9cP+5M+sbxtWJx3/xtw==", - "path": "system.memory.data/1.0.2", - "hashPath": "system.memory.data.1.0.2.nupkg.sha512" - }, - "System.Net.Http/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-sYg+FtILtRQuYWSIAuNOELwVuVsxVyJGWQyOnlAzhV4xvhyFnON1bAzYYC+jjRW8JREM45R0R5Dgi8MTC5sEwA==", - "path": "system.net.http/4.3.0", - "hashPath": "system.net.http.4.3.0.nupkg.sha512" - }, - "System.Net.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-qOu+hDwFwoZPbzPvwut2qATe3ygjeQBDQj91xlsaqGFQUI5i4ZnZb8yyQuLGpDGivEPIt8EJkd1BVzVoP31FXA==", - "path": "system.net.primitives/4.3.0", - "hashPath": "system.net.primitives.4.3.0.nupkg.sha512" - }, - "System.Net.Sockets/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-m6icV6TqQOAdgt5N/9I5KNpjom/5NFtkmGseEH+AK/hny8XrytLH3+b5M8zL/Ycg3fhIocFpUMyl/wpFnVRvdw==", - "path": "system.net.sockets/4.3.0", - "hashPath": "system.net.sockets.4.3.0.nupkg.sha512" - }, - "System.Numerics.Vectors/4.5.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-QQTlPTl06J/iiDbJCiepZ4H//BVraReU4O4EoRw1U02H5TLUIT7xn3GnDp9AXPSlJUDyFs4uWjWafNX6WrAojQ==", - "path": "system.numerics.vectors/4.5.0", - "hashPath": "system.numerics.vectors.4.5.0.nupkg.sha512" - }, - "System.ObjectModel/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-bdX+80eKv9bN6K4N+d77OankKHGn6CH711a6fcOpMQu2Fckp/Ft4L/kW9WznHpyR0NRAvJutzOMHNNlBGvxQzQ==", - "path": "system.objectmodel/4.3.0", - "hashPath": "system.objectmodel.4.3.0.nupkg.sha512" - }, - "System.Reflection/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-KMiAFoW7MfJGa9nDFNcfu+FpEdiHpWgTcS2HdMpDvt9saK3y/G4GwprPyzqjFH9NTaGPQeWNHU+iDlDILj96aQ==", - "path": "system.reflection/4.3.0", - "hashPath": "system.reflection.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-228FG0jLcIwTVJyz8CLFKueVqQK36ANazUManGaJHkO0icjiIypKW7YLWLIWahyIkdh5M7mV2dJepllLyA1SKg==", - "path": "system.reflection.emit/4.3.0", - "hashPath": "system.reflection.emit.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit.ILGeneration/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-59tBslAk9733NXLrUJrwNZEzbMAcu8k344OYo+wfSVygcgZ9lgBdGIzH/nrg3LYhXceynyvTc8t5/GD4Ri0/ng==", - "path": "system.reflection.emit.ilgeneration/4.3.0", - "hashPath": "system.reflection.emit.ilgeneration.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit.Lightweight/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-oadVHGSMsTmZsAF864QYN1t1QzZjIcuKU3l2S9cZOwDdDueNTrqq1yRj7koFfIGEnKpt6NjpL3rOzRhs4ryOgA==", - "path": "system.reflection.emit.lightweight/4.3.0", - "hashPath": "system.reflection.emit.lightweight.4.3.0.nupkg.sha512" - }, - "System.Reflection.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-rJkrJD3kBI5B712aRu4DpSIiHRtr6QlfZSQsb0hYHrDCZORXCFjQfoipo2LaMUHoT9i1B7j7MnfaEKWDFmFQNQ==", - "path": "system.reflection.extensions/4.3.0", - "hashPath": "system.reflection.extensions.4.3.0.nupkg.sha512" - }, - "System.Reflection.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-5RXItQz5As4xN2/YUDxdpsEkMhvw3e6aNveFXUn4Hl/udNTCNhnKp8lT9fnc3MhvGKh1baak5CovpuQUXHAlIA==", - "path": "system.reflection.primitives/4.3.0", - "hashPath": "system.reflection.primitives.4.3.0.nupkg.sha512" - }, - "System.Reflection.TypeExtensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-7u6ulLcZbyxB5Gq0nMkQttcdBTx57ibzw+4IOXEfR+sXYQoHvjW5LTLyNr8O22UIMrqYbchJQJnos4eooYzYJA==", - "path": "system.reflection.typeextensions/4.3.0", - "hashPath": "system.reflection.typeextensions.4.3.0.nupkg.sha512" - }, - "System.Resources.ResourceManager/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-/zrcPkkWdZmI4F92gL/TPumP98AVDu/Wxr3CSJGQQ+XN6wbRZcyfSKVoPo17ilb3iOr0cCRqJInGwNMolqhS8A==", - "path": "system.resources.resourcemanager/4.3.0", - "hashPath": "system.resources.resourcemanager.4.3.0.nupkg.sha512" - }, - "System.Runtime/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-JufQi0vPQ0xGnAczR13AUFglDyVYt4Kqnz1AZaiKZ5+GICq0/1MH/mO/eAJHt/mHW1zjKBJd7kV26SrxddAhiw==", - "path": "system.runtime/4.3.0", - "hashPath": "system.runtime.4.3.0.nupkg.sha512" - }, - "System.Runtime.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-guW0uK0fn5fcJJ1tJVXYd7/1h5F+pea1r7FLSOz/f8vPEqbR2ZAknuRDvTQ8PzAilDveOxNjSfr0CHfIQfFk8g==", - "path": "system.runtime.extensions/4.3.0", - "hashPath": "system.runtime.extensions.4.3.0.nupkg.sha512" - }, - "System.Runtime.Handles/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-OKiSUN7DmTWeYb3l51A7EYaeNMnvxwE249YtZz7yooT4gOZhmTjIn48KgSsw2k2lYdLgTKNJw/ZIfSElwDRVgg==", - "path": "system.runtime.handles/4.3.0", - "hashPath": "system.runtime.handles.4.3.0.nupkg.sha512" - }, - "System.Runtime.InteropServices/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-uv1ynXqiMK8mp1GM3jDqPCFN66eJ5w5XNomaK2XD+TuCroNTLFGeZ+WCmBMcBDyTFKou3P6cR6J/QsaqDp7fGQ==", - "path": "system.runtime.interopservices/4.3.0", - "hashPath": "system.runtime.interopservices.4.3.0.nupkg.sha512" - }, - "System.Runtime.InteropServices.RuntimeInformation/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-cbz4YJMqRDR7oLeMRbdYv7mYzc++17lNhScCX0goO2XpGWdvAt60CGN+FHdePUEHCe/Jy9jUlvNAiNdM+7jsOw==", - "path": "system.runtime.interopservices.runtimeinformation/4.3.0", - "hashPath": "system.runtime.interopservices.runtimeinformation.4.3.0.nupkg.sha512" - }, - "System.Runtime.Numerics/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-yMH+MfdzHjy17l2KESnPiF2dwq7T+xLnSJar7slyimAkUh/gTrS9/UQOtv7xarskJ2/XDSNvfLGOBQPjL7PaHQ==", - "path": "system.runtime.numerics/4.3.0", - "hashPath": "system.runtime.numerics.4.3.0.nupkg.sha512" - }, - "System.Runtime.Serialization.Formatters/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-KT591AkTNFOTbhZlaeMVvfax3RqhH1EJlcwF50Wm7sfnBLuHiOeZRRKrr1ns3NESkM20KPZ5Ol/ueMq5vg4QoQ==", - "path": "system.runtime.serialization.formatters/4.3.0", - "hashPath": "system.runtime.serialization.formatters.4.3.0.nupkg.sha512" - }, - "System.Runtime.Serialization.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Wz+0KOukJGAlXjtKr+5Xpuxf8+c8739RI1C+A2BoQZT+wMCCoMDDdO8/4IRHfaVINqL78GO8dW8G2lW/e45Mcw==", - "path": "system.runtime.serialization.primitives/4.3.0", - "hashPath": "system.runtime.serialization.primitives.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.Algorithms/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-W1kd2Y8mYSCgc3ULTAZ0hOP2dSdG5YauTb1089T0/kRcN2MpSAW1izOFROrJgxSlMn3ArsgHXagigyi+ibhevg==", - "path": "system.security.cryptography.algorithms/4.3.0", - "hashPath": "system.security.cryptography.algorithms.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.Cng/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-03idZOqFlsKRL4W+LuCpJ6dBYDUWReug6lZjBa3uJWnk5sPCUXckocevTaUA8iT/MFSrY/2HXkOt753xQ/cf8g==", - "path": "system.security.cryptography.cng/4.3.0", - "hashPath": "system.security.cryptography.cng.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.Csp/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-X4s/FCkEUnRGnwR3aSfVIkldBmtURMhmexALNTwpjklzxWU7yjMk7GHLKOZTNkgnWnE0q7+BCf9N2LVRWxewaA==", - "path": "system.security.cryptography.csp/4.3.0", - "hashPath": "system.security.cryptography.csp.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.Encoding/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-1DEWjZZly9ae9C79vFwqaO5kaOlI5q+3/55ohmq/7dpDyDfc8lYe7YVxJUZ5MF/NtbkRjwFRo14yM4OEo9EmDw==", - "path": "system.security.cryptography.encoding/4.3.0", - "hashPath": "system.security.cryptography.encoding.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.OpenSsl/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-h4CEgOgv5PKVF/HwaHzJRiVboL2THYCou97zpmhjghx5frc7fIvlkY1jL+lnIQyChrJDMNEXS6r7byGif8Cy4w==", - "path": "system.security.cryptography.openssl/4.3.0", - "hashPath": "system.security.cryptography.openssl.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-7bDIyVFNL/xKeFHjhobUAQqSpJq9YTOpbEs6mR233Et01STBMXNAc/V+BM6dwYGc95gVh/Zf+iVXWzj3mE8DWg==", - "path": "system.security.cryptography.primitives/4.3.0", - "hashPath": "system.security.cryptography.primitives.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.X509Certificates/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-t2Tmu6Y2NtJ2um0RtcuhP7ZdNNxXEgUm2JeoA/0NvlMjAhKCnM1NX07TDl3244mVp3QU6LPEhT3HTtH1uF7IYw==", - "path": "system.security.cryptography.x509certificates/4.3.0", - "hashPath": "system.security.cryptography.x509certificates.4.3.0.nupkg.sha512" - }, - "System.Security.SecureString/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-PnXp38O9q/2Oe4iZHMH60kinScv6QiiL2XH54Pj2t0Y6c2zKPEiAZsM/M3wBOHLNTBDFP0zfy13WN2M0qFz5jg==", - "path": "system.security.securestring/4.3.0", - "hashPath": "system.security.securestring.4.3.0.nupkg.sha512" - }, - "System.Text.Encoding/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-BiIg+KWaSDOITze6jGQynxg64naAPtqGHBwDrLaCtixsa5bKiR8dpPOHA7ge3C0JJQizJE+sfkz1wV+BAKAYZw==", - "path": "system.text.encoding/4.3.0", - "hashPath": "system.text.encoding.4.3.0.nupkg.sha512" - }, - "System.Text.Encoding.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-YVMK0Bt/A43RmwizJoZ22ei2nmrhobgeiYwFzC4YAN+nue8RF6djXDMog0UCn+brerQoYVyaS+ghy9P/MUVcmw==", - "path": "system.text.encoding.extensions/4.3.0", - "hashPath": "system.text.encoding.extensions.4.3.0.nupkg.sha512" - }, - "System.Text.Encodings.Web/4.7.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iTUgB/WtrZ1sWZs84F2hwyQhiRH6QNjQv2DkwrH+WP6RoFga2Q1m3f9/Q7FG8cck8AdHitQkmkXSY8qylcDmuA==", - "path": "system.text.encodings.web/4.7.2", - "hashPath": "system.text.encodings.web.4.7.2.nupkg.sha512" - }, - "System.Text.Json/4.7.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-TcMd95wcrubm9nHvJEQs70rC0H/8omiSGGpU4FQ/ZA1URIqD4pjmFJh2Mfv1yH1eHgJDWTi2hMDXwTET+zOOyg==", - "path": "system.text.json/4.7.2", - "hashPath": "system.text.json.4.7.2.nupkg.sha512" - }, - "System.Text.RegularExpressions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-RpT2DA+L660cBt1FssIE9CAGpLFdFPuheB7pLpKpn6ZXNby7jDERe8Ua/Ne2xGiwLVG2JOqziiaVCGDon5sKFA==", - "path": "system.text.regularexpressions/4.3.0", - "hashPath": "system.text.regularexpressions.4.3.0.nupkg.sha512" - }, - "System.Threading/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VkUS0kOBcUf3Wwm0TSbrevDDZ6BlM+b/HRiapRFWjM5O0NS0LviG0glKmFK+hhPDd1XFeSdU1GmlLhb2CoVpIw==", - "path": "system.threading/4.3.0", - "hashPath": "system.threading.4.3.0.nupkg.sha512" - }, - "System.Threading.Tasks/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-LbSxKEdOUhVe8BezB/9uOGGppt+nZf6e1VFyw6v3DN6lqitm0OSn2uXMOdtP0M3W4iMcqcivm2J6UgqiwwnXiA==", - "path": "system.threading.tasks/4.3.0", - "hashPath": "system.threading.tasks.4.3.0.nupkg.sha512" - }, - "System.Threading.Tasks.Extensions/4.5.4": { - "type": "package", - "serviceable": true, - "sha512": "sha512-zteT+G8xuGu6mS+mzDzYXbzS7rd3K6Fjb9RiZlYlJPam2/hU7JCBZBVEcywNuR+oZ1ncTvc/cq0faRr3P01OVg==", - "path": "system.threading.tasks.extensions/4.5.4", - "hashPath": "system.threading.tasks.extensions.4.5.4.nupkg.sha512" - }, - "System.Threading.Timer/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Z6YfyYTCg7lOZjJzBjONJTFKGN9/NIYKSxhU5GRd+DTwHSZyvWp1xuI5aR+dLg+ayyC5Xv57KiY4oJ0tMO89fQ==", - "path": "system.threading.timer/4.3.0", - "hashPath": "system.threading.timer.4.3.0.nupkg.sha512" - }, - "System.Xml.ReaderWriter/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-GrprA+Z0RUXaR4N7/eW71j1rgMnEnEVlgii49GZyAjTH7uliMnrOU3HNFBr6fEDBCJCIdlVNq9hHbaDR621XBA==", - "path": "system.xml.readerwriter/4.3.0", - "hashPath": "system.xml.readerwriter.4.3.0.nupkg.sha512" - }, - "System.Xml.XDocument/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-5zJ0XDxAIg8iy+t4aMnQAu0MqVbqyvfoUVl1yDV61xdo3Vth45oA2FoY4pPkxYAH5f8ixpmTqXeEIya95x0aCQ==", - "path": "system.xml.xdocument/4.3.0", - "hashPath": "system.xml.xdocument.4.3.0.nupkg.sha512" - }, - "System.Xml.XmlDocument/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-lJ8AxvkX7GQxpC6GFCeBj8ThYVyQczx2+f/cWHJU8tjS7YfI6Cv6bon70jVEgs2CiFbmmM8b9j1oZVx0dSI2Ww==", - "path": "system.xml.xmldocument/4.3.0", - "hashPath": "system.xml.xmldocument.4.3.0.nupkg.sha512" - }, - "System.Xml.XmlSerializer/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-MYoTCP7EZ98RrANESW05J5ZwskKDoN0AuZ06ZflnowE50LTpbR5yRg3tHckTVm5j/m47stuGgCrCHWePyHS70Q==", - "path": "system.xml.xmlserializer/4.3.0", - "hashPath": "system.xml.xmlserializer.4.3.0.nupkg.sha512" - } - } -} \ No newline at end of file diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll deleted file mode 100644 index 40467ceec9d0..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authenticators.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authenticators.dll deleted file mode 100644 index 986f75fbefd1..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Authenticators.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Aks.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Aks.dll deleted file mode 100644 index c92e78c7442f..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Aks.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Compute.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Compute.dll deleted file mode 100644 index 038f420c6fcf..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Compute.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.KeyVault.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.KeyVault.dll deleted file mode 100644 index 3ca098c1fd20..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.KeyVault.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Monitor.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Monitor.dll deleted file mode 100644 index 7e33c386e70d..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Monitor.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll deleted file mode 100644 index 66bd58f2df51..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll deleted file mode 100644 index 0badd8c19368..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Websites.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Websites.dll deleted file mode 100644 index d4041ce9dac5..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Websites.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Cmdlets.Accounts.deps.json b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Cmdlets.Accounts.deps.json deleted file mode 100644 index 45fa154ab83f..000000000000 --- a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Cmdlets.Accounts.deps.json +++ /dev/null @@ -1,1866 +0,0 @@ -{ - "runtimeTarget": { - "name": ".NETStandard,Version=v2.0/", - "signature": "" - }, - "compilationOptions": {}, - "targets": { - ".NETStandard,Version=v2.0": {}, - ".NETStandard,Version=v2.0/": { - "Microsoft.Azure.PowerShell.Cmdlets.Accounts/1.0.0": { - "dependencies": { - "Azure.Core": "1.25.0", - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication": "1.0.0", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Authentication.ResourceManager": "1.0.0", - "Microsoft.Azure.PowerShell.Authenticators": "1.0.0", - "Microsoft.Azure.PowerShell.Clients.Aks": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Authorization": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Compute": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.KeyVault": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Monitor": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Network": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.PolicyInsights": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Storage.Management": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Websites": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Storage": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Strategies": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "NETStandard.Library": "2.0.3", - "Newtonsoft.Json": "10.0.3", - "PowerShellStandard.Library": "5.1.0", - "System.Security.Permissions": "4.5.0", - "FuzzySharp": "1.0.4.0" - }, - "runtime": { - "Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll": {} - } - }, - "Azure.Core/1.25.0": { - "dependencies": { - "Microsoft.Bcl.AsyncInterfaces": "1.1.1", - "System.Diagnostics.DiagnosticSource": "4.6.0", - "System.Memory.Data": "1.0.2", - "System.Numerics.Vectors": "4.5.0", - "System.Text.Encodings.Web": "4.7.2", - "System.Text.Json": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/Azure.Core.dll": { - "assemblyVersion": "1.25.0.0", - "fileVersion": "1.2500.22.33004" - } - } - }, - "Azure.Identity/1.6.1": { - "dependencies": { - "Azure.Core": "1.25.0", - "Microsoft.Identity.Client": "4.46.2", - "Microsoft.Identity.Client.Extensions.Msal": "2.23.0", - "System.Memory": "4.5.4", - "System.Security.Cryptography.ProtectedData": "4.7.0", - "System.Text.Json": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/Azure.Identity.dll": { - "assemblyVersion": "1.6.1.0", - "fileVersion": "1.600.122.40803" - } - } - }, - "Hyak.Common/1.2.2": { - "dependencies": { - "NETStandard.Library": "2.0.3", - "Newtonsoft.Json": "10.0.3", - "System.Reflection": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.4/Hyak.Common.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.2.2.0" - } - } - }, - "Microsoft.ApplicationInsights/2.13.1": { - "dependencies": { - "System.Diagnostics.DiagnosticSource": "4.6.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.ApplicationInsights.dll": { - "assemblyVersion": "2.13.1.12554", - "fileVersion": "2.13.1.12554" - } - } - }, - "Microsoft.Azure.Common/2.2.1": { - "dependencies": { - "Hyak.Common": "1.2.2", - "NETStandard.Library": "2.0.3" - }, - "runtime": { - "lib/netstandard1.4/Microsoft.Azure.Common.dll": { - "assemblyVersion": "2.0.0.0", - "fileVersion": "2.2.1.0" - } - } - }, - "Microsoft.Azure.PowerShell.Authentication.Abstractions/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Aks/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Aks.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Authorization/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Authorization.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Compute/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Compute.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.KeyVault/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.NonGeneric": "4.3.0", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.KeyVault.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Monitor/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Monitor.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Network/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Network.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.PolicyInsights/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.ResourceManager/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Storage.Management/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "System.Collections.NonGeneric": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Clients.Websites/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3", - "System.Collections.Specialized": "4.3.0", - "System.Reflection": "4.3.0", - "System.Security.SecureString": "4.3.0", - "System.Xml.XmlDocument": "4.3.0", - "System.Xml.XmlSerializer": "4.3.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Clients.Websites.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Common/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Common.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Common.Share/1.3.67-preview": { - "dependencies": { - "Hyak.Common": "1.2.2", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Common.Share.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Storage/1.3.67-preview": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Storage.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Azure.PowerShell.Strategies/1.3.67-preview": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Azure.PowerShell.Strategies.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "1.3.67.0" - } - } - }, - "Microsoft.Bcl.AsyncInterfaces/1.1.1": { - "dependencies": { - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Bcl.AsyncInterfaces.dll": { - "assemblyVersion": "1.0.0.0", - "fileVersion": "4.700.20.21406" - } - } - }, - "Microsoft.CSharp/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Dynamic.Runtime": "4.3.0", - "System.Globalization": "4.3.0", - "System.Linq": "4.3.0", - "System.Linq.Expressions": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/Microsoft.CSharp.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "Microsoft.Identity.Client/4.46.2": { - "dependencies": { - "Microsoft.IdentityModel.Abstractions": "6.22.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Identity.Client.dll": { - "assemblyVersion": "4.46.2.0", - "fileVersion": "4.46.2.0" - } - } - }, - "Microsoft.Identity.Client.Extensions.Msal/2.23.0": { - "dependencies": { - "Microsoft.Identity.Client": "4.46.2", - "System.IO.FileSystem.AccessControl": "5.0.0", - "System.Security.Cryptography.ProtectedData": "4.7.0" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Identity.Client.Extensions.Msal.dll": { - "assemblyVersion": "2.23.0.0", - "fileVersion": "2.23.0.0" - } - } - }, - "Microsoft.IdentityModel.Abstractions/6.22.0": { - "runtime": { - "lib/netstandard2.0/Microsoft.IdentityModel.Abstractions.dll": { - "assemblyVersion": "6.22.0.0", - "fileVersion": "6.22.0.30727" - } - } - }, - "Microsoft.NETCore.Platforms/1.1.0": {}, - "Microsoft.NETCore.Targets/1.1.0": {}, - "Microsoft.Rest.ClientRuntime/2.3.24": { - "dependencies": { - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Rest.ClientRuntime.dll": { - "assemblyVersion": "2.0.0.0", - "fileVersion": "2.3.23.0" - } - } - }, - "Microsoft.Rest.ClientRuntime.Azure/3.3.19": { - "dependencies": { - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "lib/netstandard2.0/Microsoft.Rest.ClientRuntime.Azure.dll": { - "assemblyVersion": "3.0.0.0", - "fileVersion": "3.3.18.0" - } - } - }, - "NETStandard.Library/2.0.3": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0" - } - }, - "Newtonsoft.Json/10.0.3": { - "dependencies": { - "Microsoft.CSharp": "4.3.0", - "NETStandard.Library": "2.0.3", - "System.ComponentModel.TypeConverter": "4.3.0", - "System.Runtime.Serialization.Formatters": "4.3.0", - "System.Runtime.Serialization.Primitives": "4.3.0", - "System.Xml.XmlDocument": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/Newtonsoft.Json.dll": { - "assemblyVersion": "10.0.0.0", - "fileVersion": "10.0.3.21018" - } - } - }, - "PowerShellStandard.Library/5.1.0": {}, - "System.Buffers/4.5.1": { - "runtime": { - "lib/netstandard2.0/System.Buffers.dll": { - "assemblyVersion": "4.0.3.0", - "fileVersion": "4.6.28619.1" - } - } - }, - "System.Collections/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Collections.NonGeneric/4.3.0": { - "dependencies": { - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Collections.NonGeneric.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Collections.Specialized/4.3.0": { - "dependencies": { - "System.Collections.NonGeneric": "4.3.0", - "System.Globalization": "4.3.0", - "System.Globalization.Extensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Collections.Specialized.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.ComponentModel/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.ComponentModel.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.ComponentModel.Primitives/4.3.0": { - "dependencies": { - "System.ComponentModel": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.0/System.ComponentModel.Primitives.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.ComponentModel.TypeConverter/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Collections.NonGeneric": "4.3.0", - "System.Collections.Specialized": "4.3.0", - "System.ComponentModel": "4.3.0", - "System.ComponentModel.Primitives": "4.3.0", - "System.Globalization": "4.3.0", - "System.Linq": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.5/System.ComponentModel.TypeConverter.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Diagnostics.Debug/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Diagnostics.DiagnosticSource/4.6.0": { - "dependencies": { - "System.Memory": "4.5.4" - }, - "runtime": { - "lib/netstandard1.3/System.Diagnostics.DiagnosticSource.dll": { - "assemblyVersion": "4.0.4.0", - "fileVersion": "4.700.19.46214" - } - } - }, - "System.Dynamic.Runtime/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Linq": "4.3.0", - "System.Linq.Expressions": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Dynamic.Runtime.dll": { - "assemblyVersion": "4.0.12.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Globalization/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Globalization.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0" - } - }, - "System.IO/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.IO.FileSystem/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading.Tasks": "4.3.0" - } - }, - "System.IO.FileSystem.AccessControl/5.0.0": { - "dependencies": { - "System.Buffers": "4.5.1", - "System.Memory": "4.5.4", - "System.Security.AccessControl": "5.0.0", - "System.Security.Principal.Windows": "5.0.0" - }, - "runtime": { - "lib/netstandard2.0/System.IO.FileSystem.AccessControl.dll": { - "assemblyVersion": "5.0.0.0", - "fileVersion": "5.0.20.51904" - } - } - }, - "System.IO.FileSystem.Primitives/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.IO.FileSystem.Primitives.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Linq/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0" - }, - "runtime": { - "lib/netstandard1.6/System.Linq.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Linq.Expressions/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Linq": "4.3.0", - "System.ObjectModel": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Emit.Lightweight": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.6/System.Linq.Expressions.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Memory/4.5.4": { - "dependencies": { - "System.Buffers": "4.5.1", - "System.Numerics.Vectors": "4.5.0", - "System.Runtime.CompilerServices.Unsafe": "4.7.1" - }, - "runtime": { - "lib/netstandard2.0/System.Memory.dll": { - "assemblyVersion": "4.0.1.1", - "fileVersion": "4.6.28619.1" - } - } - }, - "System.Memory.Data/1.0.2": { - "dependencies": { - "System.Text.Encodings.Web": "4.7.2", - "System.Text.Json": "4.7.2" - }, - "runtime": { - "lib/netstandard2.0/System.Memory.Data.dll": { - "assemblyVersion": "1.0.2.0", - "fileVersion": "1.0.221.20802" - } - } - }, - "System.Numerics.Vectors/4.5.0": { - "runtime": { - "lib/netstandard2.0/System.Numerics.Vectors.dll": { - "assemblyVersion": "4.1.4.0", - "fileVersion": "4.6.26515.6" - } - } - }, - "System.ObjectModel/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.ObjectModel.dll": { - "assemblyVersion": "4.0.13.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.IO": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Emit/4.3.0": { - "dependencies": { - "System.IO": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Reflection.Emit.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection.Emit.ILGeneration/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Reflection.Emit.ILGeneration.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection.Emit.Lightweight/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Reflection.Emit.Lightweight.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Reflection.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.Primitives/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Reflection.TypeExtensions/4.3.0": { - "dependencies": { - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.5/System.Reflection.TypeExtensions.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Resources.ResourceManager/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Globalization": "4.3.0", - "System.Reflection": "4.3.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0" - } - }, - "System.Runtime.CompilerServices.Unsafe/4.7.1": { - "runtime": { - "lib/netstandard2.0/System.Runtime.CompilerServices.Unsafe.dll": { - "assemblyVersion": "4.0.6.0", - "fileVersion": "4.700.20.12001" - } - } - }, - "System.Runtime.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime.Handles/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Runtime.InteropServices/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Reflection": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0" - } - }, - "System.Runtime.Serialization.Formatters/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Reflection": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Serialization.Primitives": "4.3.0" - }, - "runtime": { - "lib/netstandard1.4/System.Runtime.Serialization.Formatters.dll": { - "assemblyVersion": "4.0.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Runtime.Serialization.Primitives/4.3.0": { - "dependencies": { - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Runtime.Serialization.Primitives.dll": { - "assemblyVersion": "4.1.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Security.AccessControl/5.0.0": { - "dependencies": { - "System.Security.Principal.Windows": "5.0.0" - }, - "runtime": { - "lib/netstandard2.0/System.Security.AccessControl.dll": { - "assemblyVersion": "5.0.0.0", - "fileVersion": "5.0.20.51904" - } - } - }, - "System.Security.Cryptography.Primitives/4.3.0": { - "dependencies": { - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Threading": "4.3.0", - "System.Threading.Tasks": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Security.Cryptography.Primitives.dll": { - "assemblyVersion": "4.0.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Security.Cryptography.ProtectedData/4.7.0": { - "dependencies": { - "System.Memory": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/System.Security.Cryptography.ProtectedData.dll": { - "assemblyVersion": "4.0.5.0", - "fileVersion": "4.700.19.56404" - } - } - }, - "System.Security.Permissions/4.5.0": { - "dependencies": { - "System.Security.AccessControl": "5.0.0" - }, - "runtime": { - "lib/netstandard2.0/System.Security.Permissions.dll": { - "assemblyVersion": "4.0.1.0", - "fileVersion": "4.6.26515.6" - } - } - }, - "System.Security.Principal.Windows/5.0.0": { - "runtime": { - "lib/netstandard2.0/System.Security.Principal.Windows.dll": { - "assemblyVersion": "5.0.0.0", - "fileVersion": "5.0.20.51904" - } - } - }, - "System.Security.SecureString/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Handles": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Security.Cryptography.Primitives": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0" - } - }, - "System.Text.Encoding/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Text.Encoding.Extensions/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0", - "System.Text.Encoding": "4.3.0" - } - }, - "System.Text.Encodings.Web/4.7.2": { - "dependencies": { - "System.Buffers": "4.5.1", - "System.Memory": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/System.Text.Encodings.Web.dll": { - "assemblyVersion": "4.0.5.1", - "fileVersion": "4.700.21.11602" - } - } - }, - "System.Text.Json/4.7.2": { - "dependencies": { - "Microsoft.Bcl.AsyncInterfaces": "1.1.1", - "System.Buffers": "4.5.1", - "System.Memory": "4.5.4", - "System.Numerics.Vectors": "4.5.0", - "System.Runtime.CompilerServices.Unsafe": "4.7.1", - "System.Text.Encodings.Web": "4.7.2", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard2.0/System.Text.Json.dll": { - "assemblyVersion": "4.0.1.2", - "fileVersion": "4.700.20.21406" - } - } - }, - "System.Text.RegularExpressions/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Globalization": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Threading": "4.3.0" - }, - "runtime": { - "lib/netstandard1.6/System.Text.RegularExpressions.dll": { - "assemblyVersion": "4.1.1.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Threading/4.3.0": { - "dependencies": { - "System.Runtime": "4.3.0", - "System.Threading.Tasks": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Threading.dll": { - "assemblyVersion": "4.0.12.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Threading.Tasks/4.3.0": { - "dependencies": { - "Microsoft.NETCore.Platforms": "1.1.0", - "Microsoft.NETCore.Targets": "1.1.0", - "System.Runtime": "4.3.0" - } - }, - "System.Threading.Tasks.Extensions/4.5.4": { - "dependencies": { - "System.Runtime.CompilerServices.Unsafe": "4.7.1" - }, - "runtime": { - "lib/netstandard2.0/System.Threading.Tasks.Extensions.dll": { - "assemblyVersion": "4.2.0.1", - "fileVersion": "4.6.28619.1" - } - } - }, - "System.Xml.ReaderWriter/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.IO.FileSystem": "4.3.0", - "System.IO.FileSystem.Primitives": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Runtime.InteropServices": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Text.Encoding.Extensions": "4.3.0", - "System.Text.RegularExpressions": "4.3.0", - "System.Threading.Tasks": "4.3.0", - "System.Threading.Tasks.Extensions": "4.5.4" - }, - "runtime": { - "lib/netstandard1.3/System.Xml.ReaderWriter.dll": { - "assemblyVersion": "4.1.0.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Xml.XmlDocument/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Diagnostics.Debug": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.Encoding": "4.3.0", - "System.Threading": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Xml.XmlDocument.dll": { - "assemblyVersion": "4.0.2.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "System.Xml.XmlSerializer/4.3.0": { - "dependencies": { - "System.Collections": "4.3.0", - "System.Globalization": "4.3.0", - "System.IO": "4.3.0", - "System.Linq": "4.3.0", - "System.Reflection": "4.3.0", - "System.Reflection.Emit": "4.3.0", - "System.Reflection.Emit.ILGeneration": "4.3.0", - "System.Reflection.Extensions": "4.3.0", - "System.Reflection.Primitives": "4.3.0", - "System.Reflection.TypeExtensions": "4.3.0", - "System.Resources.ResourceManager": "4.3.0", - "System.Runtime": "4.3.0", - "System.Runtime.Extensions": "4.3.0", - "System.Text.RegularExpressions": "4.3.0", - "System.Threading": "4.3.0", - "System.Xml.ReaderWriter": "4.3.0", - "System.Xml.XmlDocument": "4.3.0" - }, - "runtime": { - "lib/netstandard1.3/System.Xml.XmlSerializer.dll": { - "assemblyVersion": "4.0.12.0", - "fileVersion": "4.6.24705.1" - } - } - }, - "Microsoft.Azure.PowerShell.Authentication/1.0.0": { - "dependencies": { - "Azure.Core": "1.25.0", - "Azure.Identity": "1.6.1", - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Aks": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Authorization": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Compute": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.KeyVault": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Monitor": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Network": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.PolicyInsights": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Storage.Management": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Websites": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Storage": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Strategies": "1.3.67-preview", - "Microsoft.Identity.Client": "4.46.2", - "Microsoft.Identity.Client.Extensions.Msal": "2.23.0", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "Microsoft.Azure.PowerShell.Authentication.dll": {} - } - }, - "Microsoft.Azure.PowerShell.Authentication.ResourceManager/1.0.0": { - "dependencies": { - "Azure.Core": "1.25.0", - "Hyak.Common": "1.2.2", - "Microsoft.ApplicationInsights": "2.13.1", - "Microsoft.Azure.Common": "2.2.1", - "Microsoft.Azure.PowerShell.Authentication": "1.0.0", - "Microsoft.Azure.PowerShell.Authentication.Abstractions": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Aks": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Authorization": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Compute": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.KeyVault": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Monitor": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Network": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.PolicyInsights": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.ResourceManager": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Storage.Management": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Clients.Websites": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Common.Share": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Storage": "1.3.67-preview", - "Microsoft.Azure.PowerShell.Strategies": "1.3.67-preview", - "Microsoft.Rest.ClientRuntime": "2.3.24", - "Microsoft.Rest.ClientRuntime.Azure": "3.3.19", - "Newtonsoft.Json": "10.0.3" - }, - "runtime": { - "Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll": {} - } - }, - "Microsoft.Azure.PowerShell.Authenticators/1.0.0": { - "dependencies": { - "Microsoft.Azure.PowerShell.Authentication": "1.0.0" - }, - "runtime": { - "Microsoft.Azure.PowerShell.Authenticators.dll": {} - } - }, - "FuzzySharp/1.0.4.0": { - "runtime": { - "FuzzySharp.dll": { - "assemblyVersion": "1.0.4.0", - "fileVersion": "0.0.0.0" - } - } - } - } - }, - "libraries": { - "Microsoft.Azure.PowerShell.Cmdlets.Accounts/1.0.0": { - "type": "project", - "serviceable": false, - "sha512": "" - }, - "Azure.Core/1.25.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-X8Dd4sAggS84KScWIjEbFAdt2U1KDolQopTPoHVubG2y3CM54f9l6asVrP5Uy384NWXjsspPYaJgz5xHc+KvTA==", - "path": "azure.core/1.25.0", - "hashPath": "azure.core.1.25.0.nupkg.sha512" - }, - "Azure.Identity/1.6.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-jgN1EHSa/qDkIIM4fxc+2+1/cpNAE65JFGk2g6mXZgXpgLqvVA9kz31aa5bY0oqPrtUp+ZfaMieF2v7rs+WRBg==", - "path": "azure.identity/1.6.1", - "hashPath": "azure.identity.1.6.1.nupkg.sha512" - }, - "Hyak.Common/1.2.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-uZpnFn48nSQwHcO0/GSBZ7ExaO0sTXKv8KariXXEWLaB4Q3AeQoprYG4WpKsCT0ByW3YffETivgc5rcH5RRDvQ==", - "path": "hyak.common/1.2.2", - "hashPath": "hyak.common.1.2.2.nupkg.sha512" - }, - "Microsoft.ApplicationInsights/2.13.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-BQhLmYR06Z8TVCdxnr8WOhhovJHtqYRNeB5gePBdQ4uDOE8D4IK9HW9i6a3llELz1QHv4HtFpku6dpXMGnO22g==", - "path": "microsoft.applicationinsights/2.13.1", - "hashPath": "microsoft.applicationinsights.2.13.1.nupkg.sha512" - }, - "Microsoft.Azure.Common/2.2.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-abzRooh4ACKjzAKxRB6r+SHKW3d+IrLcgtVG81D+3kQU/OMjAZS1oDp9CDalhSbmxa84u0MHM5N+AKeTtKPoiw==", - "path": "microsoft.azure.common/2.2.1", - "hashPath": "microsoft.azure.common.2.2.1.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Authentication.Abstractions/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-nHFO8TXWgxUlyBxsFxZk2NTiV18MeYxJYj1weApqpAlaHcHixJA7500OnUs+HqqaA66QAFmKYQ9Tr4r5cB8jLw==", - "path": "microsoft.azure.powershell.authentication.abstractions/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.authentication.abstractions.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Aks/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-vdHb0jV2i2dAcSwQA8IaH6nHAVb+eoO8aYYO8nJX9xMkciIyiLOVaBDH9U6CbrrlfDJ3/rnWeW+8WGNR6Fu5cg==", - "path": "microsoft.azure.powershell.clients.aks/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.aks.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Authorization/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ZXNfDic5HZiRwAtuBsH0NMXUhcCiX6mSrHVUb0EbOS374QYph2zB1zXiaG8DoclvUFE+nlyd5ZyH1cfqotwY0g==", - "path": "microsoft.azure.powershell.clients.authorization/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.authorization.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Compute/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-G1NIn7RlFPspoExrXiwCVLIj4wghjX+usciwC84in4+sDZFf3UFGj6HgU6wXlmSLN9BxqX9NFfJBi557lF+4rg==", - "path": "microsoft.azure.powershell.clients.compute/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.compute.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Graph.Rbac/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ALK2mcq/Gpfwm1bEQcq8FQNvZvF6PgN5jM5q3I1PAVS2u5F1UDa1tKjrjguSQIXLiE1Lthnwts3OaA03gNe3kA==", - "path": "microsoft.azure.powershell.clients.graph.rbac/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.graph.rbac.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.KeyVault/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-WGJeLeOs0KtL/tpSSm+l6fvkblh3uXTiog8uv3ADACGxzjaLB+d+0WE9uCxF21YTUxQ4ZhJxdQN+zQ6ggBcNbg==", - "path": "microsoft.azure.powershell.clients.keyvault/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.keyvault.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Monitor/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-mdd+N2hhB6t0KACILOc7b3G7bDO5fmfLpYnFuvWykxsUpD2y6MtBJl+DnJxz4LcUvjK5djEM8Le0wef1pmUmgg==", - "path": "microsoft.azure.powershell.clients.monitor/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.monitor.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Network/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-OX2mzGPquFfAGO/xqkRfM1spAywLMy9p7ThZmE69TVp+gbR6CGVd9ZL6OBM7Na/QTMlcMwD1rD4/BQx//8b0uQ==", - "path": "microsoft.azure.powershell.clients.network/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.network.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.PolicyInsights/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-owaa5B00b+wNU/iGBBeNIMTsc49prqfW/CfTVuQJSNTjxylpGNI6dxwQdgQXbcm0+x5mhy2YliqjzJvTdjTkog==", - "path": "microsoft.azure.powershell.clients.policyinsights/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.policyinsights.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.ResourceManager/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-1fGG2qDixHzSzH0HapF34faIBF0VeCnsO76lS6UxMBEZtCvgyKydhmR7FfPH72E+Opmay1i8rLkkvXKVqA6Zdg==", - "path": "microsoft.azure.powershell.clients.resourcemanager/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.resourcemanager.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Storage.Management/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-GfKe+wh2OqLU+NiIZERaw7+W/WZx9ASUikJ1lF8OiupuUgTW/uIUY46vOTB38nLF9g6YmYk6n0GXnVibivv5KQ==", - "path": "microsoft.azure.powershell.clients.storage.management/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.storage.management.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Clients.Websites/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iYvqqHCRfpaya3p1vV3bEXqecc2GHraEGlTn1scHLLrg0zTwLXxq0AAiGX9uzzPcGgByubvgw263T0tlLJ4BUg==", - "path": "microsoft.azure.powershell.clients.websites/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.clients.websites.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Common/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-T42Yq1XesvgiTziZ6EHXz9RHP70pQYtw8UUXRYyuGV2D7u5r5euiMXDyLhpYxvgk0HKGr/Fi4f0c/iocrkHbyg==", - "path": "microsoft.azure.powershell.common/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.common.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Common.Share/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VU1zooS2hmazP/GXN/RjD8VXy3JjtrzMgzJhEthkxwjv5o0Lu0jxx34laFO1JEbYz25Ne/e8sEiY6R92jn2xAA==", - "path": "microsoft.azure.powershell.common.share/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.common.share.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Storage/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-63NqNOYOmES56Fa75Jqf195J6PPljEeoldwnN0CmPrb2ssrijLOk33xISV7Lkc/y5bnxYOlQf1MXwTTmDODaZg==", - "path": "microsoft.azure.powershell.storage/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.storage.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Strategies/1.3.67-preview": { - "type": "package", - "serviceable": true, - "sha512": "sha512-m43h24WmeLPU/alUUtBNzQ5H+DPXKSPQyTYujjqJ3gJZd/zFRDCE7SHpdNhMVW53H23M6iT6szxxaOo6f0eWMg==", - "path": "microsoft.azure.powershell.strategies/1.3.67-preview", - "hashPath": "microsoft.azure.powershell.strategies.1.3.67-preview.nupkg.sha512" - }, - "Microsoft.Bcl.AsyncInterfaces/1.1.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-yuvf07qFWFqtK3P/MRkEKLhn5r2UbSpVueRziSqj0yJQIKFwG1pq9mOayK3zE5qZCTs0CbrwL9M6R8VwqyGy2w==", - "path": "microsoft.bcl.asyncinterfaces/1.1.1", - "hashPath": "microsoft.bcl.asyncinterfaces.1.1.1.nupkg.sha512" - }, - "Microsoft.CSharp/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-P+MBhIM0YX+JqROuf7i306ZLJEjQYA9uUyRDE+OqwUI5sh41e2ZbPQV3LfAPh+29cmceE1pUffXsGfR4eMY3KA==", - "path": "microsoft.csharp/4.3.0", - "hashPath": "microsoft.csharp.4.3.0.nupkg.sha512" - }, - "Microsoft.Identity.Client/4.46.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-cuW7fAkazUshVFzSx5cyKPlJFBctoAHRxUpOdcIfsaHAKhb56dY6dY7f9rjZSIZHdFu/cvf6eSnGyHdvHxGccg==", - "path": "microsoft.identity.client/4.46.2", - "hashPath": "microsoft.identity.client.4.46.2.nupkg.sha512" - }, - "Microsoft.Identity.Client.Extensions.Msal/2.23.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Q8K58FjUIVslHQlk+SIhFYjdy8B1A5Wt3GXxzLS7lnXXaSmbcGzk7d8haqLmR8z/DP99vpZC73SxMa83qSHcbQ==", - "path": "microsoft.identity.client.extensions.msal/2.23.0", - "hashPath": "microsoft.identity.client.extensions.msal.2.23.0.nupkg.sha512" - }, - "Microsoft.IdentityModel.Abstractions/6.22.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iI+9V+2ciCrbheeLjpmjcqCnhy+r6yCoEcid3nkoFWerHgjVuT6CPM4HODUTtUPe1uwks4wcnAujJ8u+IKogHQ==", - "path": "microsoft.identitymodel.abstractions/6.22.0", - "hashPath": "microsoft.identitymodel.abstractions.6.22.0.nupkg.sha512" - }, - "Microsoft.NETCore.Platforms/1.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-kz0PEW2lhqygehI/d6XsPCQzD7ff7gUJaVGPVETX611eadGsA3A877GdSlU0LRVMCTH/+P3o2iDTak+S08V2+A==", - "path": "microsoft.netcore.platforms/1.1.0", - "hashPath": "microsoft.netcore.platforms.1.1.0.nupkg.sha512" - }, - "Microsoft.NETCore.Targets/1.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-aOZA3BWfz9RXjpzt0sRJJMjAscAUm3Hoa4UWAfceV9UTYxgwZ1lZt5nO2myFf+/jetYQo4uTP7zS8sJY67BBxg==", - "path": "microsoft.netcore.targets/1.1.0", - "hashPath": "microsoft.netcore.targets.1.1.0.nupkg.sha512" - }, - "Microsoft.Rest.ClientRuntime/2.3.24": { - "type": "package", - "serviceable": true, - "sha512": "sha512-hZH7XgM3eV2jFrnq7Yf0nBD4WVXQzDrer2gEY7HMNiwio2hwDsTHO6LWuueNQAfRpNp4W7mKxcXpwXUiuVIlYw==", - "path": "microsoft.rest.clientruntime/2.3.24", - "hashPath": "microsoft.rest.clientruntime.2.3.24.nupkg.sha512" - }, - "Microsoft.Rest.ClientRuntime.Azure/3.3.19": { - "type": "package", - "serviceable": true, - "sha512": "sha512-+NVBWvRXNwaAPTZUxjUlQggsrf3X0GbiRoxYfgc3kG9E55ZxZxvZPT3nIfC4DNqzGSXUEvmLbckdXgBBzGdUaA==", - "path": "microsoft.rest.clientruntime.azure/3.3.19", - "hashPath": "microsoft.rest.clientruntime.azure.3.3.19.nupkg.sha512" - }, - "NETStandard.Library/2.0.3": { - "type": "package", - "serviceable": true, - "sha512": "sha512-st47PosZSHrjECdjeIzZQbzivYBJFv6P2nv4cj2ypdI204DO+vZ7l5raGMiX4eXMJ53RfOIg+/s4DHVZ54Nu2A==", - "path": "netstandard.library/2.0.3", - "hashPath": "netstandard.library.2.0.3.nupkg.sha512" - }, - "Newtonsoft.Json/10.0.3": { - "type": "package", - "serviceable": true, - "sha512": "sha512-hSXaFmh7hNCuEoC4XNY5DrRkLDzYHqPx/Ik23R4J86Z7PE/Y6YidhG602dFVdLBRSdG6xp9NabH3dXpcoxWvww==", - "path": "newtonsoft.json/10.0.3", - "hashPath": "newtonsoft.json.10.0.3.nupkg.sha512" - }, - "PowerShellStandard.Library/5.1.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iYaRvQsM1fow9h3uEmio+2m2VXfulgI16AYHaTZ8Sf7erGe27Qc8w/h6QL5UPuwv1aXR40QfzMEwcCeiYJp2cw==", - "path": "powershellstandard.library/5.1.0", - "hashPath": "powershellstandard.library.5.1.0.nupkg.sha512" - }, - "System.Buffers/4.5.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Rw7ijyl1qqRS0YQD/WycNst8hUUMgrMH4FCn1nNm27M4VxchZ1js3fVjQaANHO5f3sN4isvP4a+Met9Y4YomAg==", - "path": "system.buffers/4.5.1", - "hashPath": "system.buffers.4.5.1.nupkg.sha512" - }, - "System.Collections/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3Dcj85/TBdVpL5Zr+gEEBUuFe2icOnLalmEh9hfck1PTYbbyWuZgh4fmm2ysCLTrqLQw6t3TgTyJ+VLp+Qb+Lw==", - "path": "system.collections/4.3.0", - "hashPath": "system.collections.4.3.0.nupkg.sha512" - }, - "System.Collections.NonGeneric/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-prtjIEMhGUnQq6RnPEYLpFt8AtLbp9yq2zxOSrY7KJJZrw25Fi97IzBqY7iqssbM61Ek5b8f3MG/sG1N2sN5KA==", - "path": "system.collections.nongeneric/4.3.0", - "hashPath": "system.collections.nongeneric.4.3.0.nupkg.sha512" - }, - "System.Collections.Specialized/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Epx8PoVZR0iuOnJJDzp7pWvdfMMOAvpUo95pC4ScH2mJuXkKA2Y4aR3cG9qt2klHgSons1WFh4kcGW7cSXvrxg==", - "path": "system.collections.specialized/4.3.0", - "hashPath": "system.collections.specialized.4.3.0.nupkg.sha512" - }, - "System.ComponentModel/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VyGn1jGRZVfxnh8EdvDCi71v3bMXrsu8aYJOwoV7SNDLVhiEqwP86pPMyRGsDsxhXAm2b3o9OIqeETfN5qfezw==", - "path": "system.componentmodel/4.3.0", - "hashPath": "system.componentmodel.4.3.0.nupkg.sha512" - }, - "System.ComponentModel.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-j8GUkCpM8V4d4vhLIIoBLGey2Z5bCkMVNjEZseyAlm4n5arcsJOeI3zkUP+zvZgzsbLTYh4lYeP/ZD/gdIAPrw==", - "path": "system.componentmodel.primitives/4.3.0", - "hashPath": "system.componentmodel.primitives.4.3.0.nupkg.sha512" - }, - "System.ComponentModel.TypeConverter/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-16pQ6P+EdhcXzPiEK4kbA953Fu0MNG2ovxTZU81/qsCd1zPRsKc3uif5NgvllCY598k6bI0KUyKW8fanlfaDQg==", - "path": "system.componentmodel.typeconverter/4.3.0", - "hashPath": "system.componentmodel.typeconverter.4.3.0.nupkg.sha512" - }, - "System.Diagnostics.Debug/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ZUhUOdqmaG5Jk3Xdb8xi5kIyQYAA4PnTNlHx1mu9ZY3qv4ELIdKbnL/akbGaKi2RnNUWaZsAs31rvzFdewTj2g==", - "path": "system.diagnostics.debug/4.3.0", - "hashPath": "system.diagnostics.debug.4.3.0.nupkg.sha512" - }, - "System.Diagnostics.DiagnosticSource/4.6.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-mbBgoR0rRfl2uimsZ2avZY8g7Xnh1Mza0rJZLPcxqiMWlkGukjmRkuMJ/er+AhQuiRIh80CR/Hpeztr80seV5g==", - "path": "system.diagnostics.diagnosticsource/4.6.0", - "hashPath": "system.diagnostics.diagnosticsource.4.6.0.nupkg.sha512" - }, - "System.Dynamic.Runtime/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-SNVi1E/vfWUAs/WYKhE9+qlS6KqK0YVhnlT0HQtr8pMIA8YX3lwy3uPMownDwdYISBdmAF/2holEIldVp85Wag==", - "path": "system.dynamic.runtime/4.3.0", - "hashPath": "system.dynamic.runtime.4.3.0.nupkg.sha512" - }, - "System.Globalization/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-kYdVd2f2PAdFGblzFswE4hkNANJBKRmsfa2X5LG2AcWE1c7/4t0pYae1L8vfZ5xvE2nK/R9JprtToA61OSHWIg==", - "path": "system.globalization/4.3.0", - "hashPath": "system.globalization.4.3.0.nupkg.sha512" - }, - "System.Globalization.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-FhKmdR6MPG+pxow6wGtNAWdZh7noIOpdD5TwQ3CprzgIE1bBBoim0vbR1+AWsWjQmU7zXHgQo4TWSP6lCeiWcQ==", - "path": "system.globalization.extensions/4.3.0", - "hashPath": "system.globalization.extensions.4.3.0.nupkg.sha512" - }, - "System.IO/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3qjaHvxQPDpSOYICjUoTsmoq5u6QJAFRUITgeT/4gqkF1bajbSmb1kwSxEA8AHlofqgcKJcM8udgieRNhaJ5Cg==", - "path": "system.io/4.3.0", - "hashPath": "system.io.4.3.0.nupkg.sha512" - }, - "System.IO.FileSystem/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-3wEMARTnuio+ulnvi+hkRNROYwa1kylvYahhcLk4HSoVdl+xxTFVeVlYOfLwrDPImGls0mDqbMhrza8qnWPTdA==", - "path": "system.io.filesystem/4.3.0", - "hashPath": "system.io.filesystem.4.3.0.nupkg.sha512" - }, - "System.IO.FileSystem.AccessControl/5.0.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-SxHB3nuNrpptVk+vZ/F+7OHEpoHUIKKMl02bUmYHQr1r+glbZQxs7pRtsf4ENO29TVm2TH3AEeep2fJcy92oYw==", - "path": "system.io.filesystem.accesscontrol/5.0.0", - "hashPath": "system.io.filesystem.accesscontrol.5.0.0.nupkg.sha512" - }, - "System.IO.FileSystem.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-6QOb2XFLch7bEc4lIcJH49nJN2HV+OC3fHDgsLVsBVBk3Y4hFAnOBGzJ2lUu7CyDDFo9IBWkSsnbkT6IBwwiMw==", - "path": "system.io.filesystem.primitives/4.3.0", - "hashPath": "system.io.filesystem.primitives.4.3.0.nupkg.sha512" - }, - "System.Linq/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-5DbqIUpsDp0dFftytzuMmc0oeMdQwjcP/EWxsksIz/w1TcFRkZ3yKKz0PqiYFMmEwPSWw+qNVqD7PJ889JzHbw==", - "path": "system.linq/4.3.0", - "hashPath": "system.linq.4.3.0.nupkg.sha512" - }, - "System.Linq.Expressions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-PGKkrd2khG4CnlyJwxwwaWWiSiWFNBGlgXvJpeO0xCXrZ89ODrQ6tjEWS/kOqZ8GwEOUATtKtzp1eRgmYNfclg==", - "path": "system.linq.expressions/4.3.0", - "hashPath": "system.linq.expressions.4.3.0.nupkg.sha512" - }, - "System.Memory/4.5.4": { - "type": "package", - "serviceable": true, - "sha512": "sha512-1MbJTHS1lZ4bS4FmsJjnuGJOu88ZzTT2rLvrhW7Ygic+pC0NWA+3hgAen0HRdsocuQXCkUTdFn9yHJJhsijDXw==", - "path": "system.memory/4.5.4", - "hashPath": "system.memory.4.5.4.nupkg.sha512" - }, - "System.Memory.Data/1.0.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-JGkzeqgBsiZwKJZ1IxPNsDFZDhUvuEdX8L8BDC8N3KOj+6zMcNU28CNN59TpZE/VJYy9cP+5M+sbxtWJx3/xtw==", - "path": "system.memory.data/1.0.2", - "hashPath": "system.memory.data.1.0.2.nupkg.sha512" - }, - "System.Numerics.Vectors/4.5.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-QQTlPTl06J/iiDbJCiepZ4H//BVraReU4O4EoRw1U02H5TLUIT7xn3GnDp9AXPSlJUDyFs4uWjWafNX6WrAojQ==", - "path": "system.numerics.vectors/4.5.0", - "hashPath": "system.numerics.vectors.4.5.0.nupkg.sha512" - }, - "System.ObjectModel/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-bdX+80eKv9bN6K4N+d77OankKHGn6CH711a6fcOpMQu2Fckp/Ft4L/kW9WznHpyR0NRAvJutzOMHNNlBGvxQzQ==", - "path": "system.objectmodel/4.3.0", - "hashPath": "system.objectmodel.4.3.0.nupkg.sha512" - }, - "System.Reflection/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-KMiAFoW7MfJGa9nDFNcfu+FpEdiHpWgTcS2HdMpDvt9saK3y/G4GwprPyzqjFH9NTaGPQeWNHU+iDlDILj96aQ==", - "path": "system.reflection/4.3.0", - "hashPath": "system.reflection.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-228FG0jLcIwTVJyz8CLFKueVqQK36ANazUManGaJHkO0icjiIypKW7YLWLIWahyIkdh5M7mV2dJepllLyA1SKg==", - "path": "system.reflection.emit/4.3.0", - "hashPath": "system.reflection.emit.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit.ILGeneration/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-59tBslAk9733NXLrUJrwNZEzbMAcu8k344OYo+wfSVygcgZ9lgBdGIzH/nrg3LYhXceynyvTc8t5/GD4Ri0/ng==", - "path": "system.reflection.emit.ilgeneration/4.3.0", - "hashPath": "system.reflection.emit.ilgeneration.4.3.0.nupkg.sha512" - }, - "System.Reflection.Emit.Lightweight/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-oadVHGSMsTmZsAF864QYN1t1QzZjIcuKU3l2S9cZOwDdDueNTrqq1yRj7koFfIGEnKpt6NjpL3rOzRhs4ryOgA==", - "path": "system.reflection.emit.lightweight/4.3.0", - "hashPath": "system.reflection.emit.lightweight.4.3.0.nupkg.sha512" - }, - "System.Reflection.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-rJkrJD3kBI5B712aRu4DpSIiHRtr6QlfZSQsb0hYHrDCZORXCFjQfoipo2LaMUHoT9i1B7j7MnfaEKWDFmFQNQ==", - "path": "system.reflection.extensions/4.3.0", - "hashPath": "system.reflection.extensions.4.3.0.nupkg.sha512" - }, - "System.Reflection.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-5RXItQz5As4xN2/YUDxdpsEkMhvw3e6aNveFXUn4Hl/udNTCNhnKp8lT9fnc3MhvGKh1baak5CovpuQUXHAlIA==", - "path": "system.reflection.primitives/4.3.0", - "hashPath": "system.reflection.primitives.4.3.0.nupkg.sha512" - }, - "System.Reflection.TypeExtensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-7u6ulLcZbyxB5Gq0nMkQttcdBTx57ibzw+4IOXEfR+sXYQoHvjW5LTLyNr8O22UIMrqYbchJQJnos4eooYzYJA==", - "path": "system.reflection.typeextensions/4.3.0", - "hashPath": "system.reflection.typeextensions.4.3.0.nupkg.sha512" - }, - "System.Resources.ResourceManager/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-/zrcPkkWdZmI4F92gL/TPumP98AVDu/Wxr3CSJGQQ+XN6wbRZcyfSKVoPo17ilb3iOr0cCRqJInGwNMolqhS8A==", - "path": "system.resources.resourcemanager/4.3.0", - "hashPath": "system.resources.resourcemanager.4.3.0.nupkg.sha512" - }, - "System.Runtime/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-JufQi0vPQ0xGnAczR13AUFglDyVYt4Kqnz1AZaiKZ5+GICq0/1MH/mO/eAJHt/mHW1zjKBJd7kV26SrxddAhiw==", - "path": "system.runtime/4.3.0", - "hashPath": "system.runtime.4.3.0.nupkg.sha512" - }, - "System.Runtime.CompilerServices.Unsafe/4.7.1": { - "type": "package", - "serviceable": true, - "sha512": "sha512-zOHkQmzPCn5zm/BH+cxC1XbUS3P4Yoi3xzW7eRgVpDR2tPGSzyMZ17Ig1iRkfJuY0nhxkQQde8pgePNiA7z7TQ==", - "path": "system.runtime.compilerservices.unsafe/4.7.1", - "hashPath": "system.runtime.compilerservices.unsafe.4.7.1.nupkg.sha512" - }, - "System.Runtime.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-guW0uK0fn5fcJJ1tJVXYd7/1h5F+pea1r7FLSOz/f8vPEqbR2ZAknuRDvTQ8PzAilDveOxNjSfr0CHfIQfFk8g==", - "path": "system.runtime.extensions/4.3.0", - "hashPath": "system.runtime.extensions.4.3.0.nupkg.sha512" - }, - "System.Runtime.Handles/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-OKiSUN7DmTWeYb3l51A7EYaeNMnvxwE249YtZz7yooT4gOZhmTjIn48KgSsw2k2lYdLgTKNJw/ZIfSElwDRVgg==", - "path": "system.runtime.handles/4.3.0", - "hashPath": "system.runtime.handles.4.3.0.nupkg.sha512" - }, - "System.Runtime.InteropServices/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-uv1ynXqiMK8mp1GM3jDqPCFN66eJ5w5XNomaK2XD+TuCroNTLFGeZ+WCmBMcBDyTFKou3P6cR6J/QsaqDp7fGQ==", - "path": "system.runtime.interopservices/4.3.0", - "hashPath": "system.runtime.interopservices.4.3.0.nupkg.sha512" - }, - "System.Runtime.Serialization.Formatters/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-KT591AkTNFOTbhZlaeMVvfax3RqhH1EJlcwF50Wm7sfnBLuHiOeZRRKrr1ns3NESkM20KPZ5Ol/ueMq5vg4QoQ==", - "path": "system.runtime.serialization.formatters/4.3.0", - "hashPath": "system.runtime.serialization.formatters.4.3.0.nupkg.sha512" - }, - "System.Runtime.Serialization.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-Wz+0KOukJGAlXjtKr+5Xpuxf8+c8739RI1C+A2BoQZT+wMCCoMDDdO8/4IRHfaVINqL78GO8dW8G2lW/e45Mcw==", - "path": "system.runtime.serialization.primitives/4.3.0", - "hashPath": "system.runtime.serialization.primitives.4.3.0.nupkg.sha512" - }, - "System.Security.AccessControl/5.0.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-dagJ1mHZO3Ani8GH0PHpPEe/oYO+rVdbQjvjJkBRNQkX4t0r1iaeGn8+/ybkSLEan3/slM0t59SVdHzuHf2jmw==", - "path": "system.security.accesscontrol/5.0.0", - "hashPath": "system.security.accesscontrol.5.0.0.nupkg.sha512" - }, - "System.Security.Cryptography.Primitives/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-7bDIyVFNL/xKeFHjhobUAQqSpJq9YTOpbEs6mR233Et01STBMXNAc/V+BM6dwYGc95gVh/Zf+iVXWzj3mE8DWg==", - "path": "system.security.cryptography.primitives/4.3.0", - "hashPath": "system.security.cryptography.primitives.4.3.0.nupkg.sha512" - }, - "System.Security.Cryptography.ProtectedData/4.7.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-ehYW0m9ptxpGWvE4zgqongBVWpSDU/JCFD4K7krxkQwSz/sFQjEXCUqpvencjy6DYDbn7Ig09R8GFffu8TtneQ==", - "path": "system.security.cryptography.protecteddata/4.7.0", - "hashPath": "system.security.cryptography.protecteddata.4.7.0.nupkg.sha512" - }, - "System.Security.Permissions/4.5.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-9gdyuARhUR7H+p5CjyUB/zPk7/Xut3wUSP8NJQB6iZr8L3XUXTMdoLeVAg9N4rqF8oIpE7MpdqHdDHQ7XgJe0g==", - "path": "system.security.permissions/4.5.0", - "hashPath": "system.security.permissions.4.5.0.nupkg.sha512" - }, - "System.Security.Principal.Windows/5.0.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-t0MGLukB5WAVU9bO3MGzvlGnyJPgUlcwerXn1kzBRjwLKixT96XV0Uza41W49gVd8zEMFu9vQEFlv0IOrytICA==", - "path": "system.security.principal.windows/5.0.0", - "hashPath": "system.security.principal.windows.5.0.0.nupkg.sha512" - }, - "System.Security.SecureString/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-PnXp38O9q/2Oe4iZHMH60kinScv6QiiL2XH54Pj2t0Y6c2zKPEiAZsM/M3wBOHLNTBDFP0zfy13WN2M0qFz5jg==", - "path": "system.security.securestring/4.3.0", - "hashPath": "system.security.securestring.4.3.0.nupkg.sha512" - }, - "System.Text.Encoding/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-BiIg+KWaSDOITze6jGQynxg64naAPtqGHBwDrLaCtixsa5bKiR8dpPOHA7ge3C0JJQizJE+sfkz1wV+BAKAYZw==", - "path": "system.text.encoding/4.3.0", - "hashPath": "system.text.encoding.4.3.0.nupkg.sha512" - }, - "System.Text.Encoding.Extensions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-YVMK0Bt/A43RmwizJoZ22ei2nmrhobgeiYwFzC4YAN+nue8RF6djXDMog0UCn+brerQoYVyaS+ghy9P/MUVcmw==", - "path": "system.text.encoding.extensions/4.3.0", - "hashPath": "system.text.encoding.extensions.4.3.0.nupkg.sha512" - }, - "System.Text.Encodings.Web/4.7.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-iTUgB/WtrZ1sWZs84F2hwyQhiRH6QNjQv2DkwrH+WP6RoFga2Q1m3f9/Q7FG8cck8AdHitQkmkXSY8qylcDmuA==", - "path": "system.text.encodings.web/4.7.2", - "hashPath": "system.text.encodings.web.4.7.2.nupkg.sha512" - }, - "System.Text.Json/4.7.2": { - "type": "package", - "serviceable": true, - "sha512": "sha512-TcMd95wcrubm9nHvJEQs70rC0H/8omiSGGpU4FQ/ZA1URIqD4pjmFJh2Mfv1yH1eHgJDWTi2hMDXwTET+zOOyg==", - "path": "system.text.json/4.7.2", - "hashPath": "system.text.json.4.7.2.nupkg.sha512" - }, - "System.Text.RegularExpressions/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-RpT2DA+L660cBt1FssIE9CAGpLFdFPuheB7pLpKpn6ZXNby7jDERe8Ua/Ne2xGiwLVG2JOqziiaVCGDon5sKFA==", - "path": "system.text.regularexpressions/4.3.0", - "hashPath": "system.text.regularexpressions.4.3.0.nupkg.sha512" - }, - "System.Threading/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-VkUS0kOBcUf3Wwm0TSbrevDDZ6BlM+b/HRiapRFWjM5O0NS0LviG0glKmFK+hhPDd1XFeSdU1GmlLhb2CoVpIw==", - "path": "system.threading/4.3.0", - "hashPath": "system.threading.4.3.0.nupkg.sha512" - }, - "System.Threading.Tasks/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-LbSxKEdOUhVe8BezB/9uOGGppt+nZf6e1VFyw6v3DN6lqitm0OSn2uXMOdtP0M3W4iMcqcivm2J6UgqiwwnXiA==", - "path": "system.threading.tasks/4.3.0", - "hashPath": "system.threading.tasks.4.3.0.nupkg.sha512" - }, - "System.Threading.Tasks.Extensions/4.5.4": { - "type": "package", - "serviceable": true, - "sha512": "sha512-zteT+G8xuGu6mS+mzDzYXbzS7rd3K6Fjb9RiZlYlJPam2/hU7JCBZBVEcywNuR+oZ1ncTvc/cq0faRr3P01OVg==", - "path": "system.threading.tasks.extensions/4.5.4", - "hashPath": "system.threading.tasks.extensions.4.5.4.nupkg.sha512" - }, - "System.Xml.ReaderWriter/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-GrprA+Z0RUXaR4N7/eW71j1rgMnEnEVlgii49GZyAjTH7uliMnrOU3HNFBr6fEDBCJCIdlVNq9hHbaDR621XBA==", - "path": "system.xml.readerwriter/4.3.0", - "hashPath": "system.xml.readerwriter.4.3.0.nupkg.sha512" - }, - "System.Xml.XmlDocument/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-lJ8AxvkX7GQxpC6GFCeBj8ThYVyQczx2+f/cWHJU8tjS7YfI6Cv6bon70jVEgs2CiFbmmM8b9j1oZVx0dSI2Ww==", - "path": "system.xml.xmldocument/4.3.0", - "hashPath": "system.xml.xmldocument.4.3.0.nupkg.sha512" - }, - "System.Xml.XmlSerializer/4.3.0": { - "type": "package", - "serviceable": true, - "sha512": "sha512-MYoTCP7EZ98RrANESW05J5ZwskKDoN0AuZ06ZflnowE50LTpbR5yRg3tHckTVm5j/m47stuGgCrCHWePyHS70Q==", - "path": "system.xml.xmlserializer/4.3.0", - "hashPath": "system.xml.xmlserializer.4.3.0.nupkg.sha512" - }, - "Microsoft.Azure.PowerShell.Authentication/1.0.0": { - "type": "project", - "serviceable": false, - "sha512": "" - }, - "Microsoft.Azure.PowerShell.Authentication.ResourceManager/1.0.0": { - "type": "project", - "serviceable": false, - "sha512": "" - }, - "Microsoft.Azure.PowerShell.Authenticators/1.0.0": { - "type": "project", - "serviceable": false, - "sha512": "" - }, - "FuzzySharp/1.0.4.0": { - "type": "reference", - "serviceable": false, - "sha512": "" - } - } -} \ No newline at end of file diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll deleted file mode 100644 index d70eb0b48394..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml deleted file mode 100644 index 49593700d994..000000000000 --- a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml +++ /dev/null @@ -1,13328 +0,0 @@ - - - - - Add-AzEnvironment - Add - AzEnvironment - - Adds endpoints and metadata for an instance of Azure Resource Manager. - - - - The Add-AzEnvironment cmdlet adds endpoints and metadata to enable Azure Resource Manager cmdlets to connect with a new instance of Azure Resource Manager. The built-in environments AzureCloud and AzureChinaCloud target existing public instances of Azure Resource Manager. - - - - Add-AzEnvironment - - Name - - Specifies the name of the environment to add. - - System.String - - System.String - - - None - - - PublishSettingsFileUrl - - Specifies the URL from which .publishsettings files can be downloaded. - - System.String - - System.String - - - None - - - AzureKeyVaultDnsSuffix - - Dns suffix of Azure Key Vault service. Example is vault-int.azure-int.net - - System.String - - System.String - - - None - - - AzureKeyVaultServiceEndpointResourceId - - Resource identifier of Azure Key Vault data service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - TrafficManagerDnsSuffix - - Specifies the domain-name suffix for Azure Traffic Manager services. - - System.String - - System.String - - - None - - - SqlDatabaseDnsSuffix - - Specifies the domain-name suffix for Azure SQL Database servers. - - System.String - - System.String - - - None - - - AzureDataLakeStoreFileSystemEndpointSuffix - - Dns Suffix of Azure Data Lake Store FileSystem. Example: azuredatalake.net - - System.String - - System.String - - - None - - - AzureDataLakeAnalyticsCatalogAndJobEndpointSuffix - - Dns Suffix of Azure Data Lake Analytics job and catalog services - - System.String - - System.String - - - None - - - EnableAdfsAuthentication - - Indicates that Active Directory Federation Services (ADFS) on-premise authentication is allowed. - - - System.Management.Automation.SwitchParameter - - - False - - - AdTenant - - Specifies the default Active Directory tenant. - - System.String - - System.String - - - None - - - GraphAudience - - The audience for tokens authenticating with the AD Graph Endpoint. - - System.String - - System.String - - - None - - - DataLakeAudience - - The audience for tokens authenticating with the AD Data Lake services Endpoint. - - System.String - - System.String - - - None - - - ServiceEndpoint - - Specifies the endpoint for Service Management (RDFE) requests. - - System.String - - System.String - - - None - - - BatchEndpointResourceId - - The resource identifier of the Azure Batch service that is the recipient of the requested token - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpointResourceId - - The audience for tokens authenticating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpoint - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - ManagementPortalUrl - - Specifies the URL for the Management Portal. - - System.String - - System.String - - - None - - - StorageEndpoint - - Specifies the endpoint for storage (blob, table, queue, and file) access. - - System.String - - System.String - - - None - - - ActiveDirectoryEndpoint - - Specifies the base authority for Azure Active Directory authentication. - - System.String - - System.String - - - None - - - ResourceManagerEndpoint - - Specifies the URL for Azure Resource Manager requests. - - System.String - - System.String - - - None - - - GalleryEndpoint - - Specifies the endpoint for the Azure Resource Manager gallery of deployment templates. - - System.String - - System.String - - - None - - - ActiveDirectoryServiceEndpointResourceId - - Specifies the audience for tokens that authenticate requests to Azure Resource Manager or Service Management (RDFE) endpoints. - - System.String - - System.String - - - None - - - GraphEndpoint - - Specifies the URL for Graph (Active Directory metadata) requests. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointResourceId - - The resource identifier of the Azure Analysis Services resource. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointSuffix - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointResourceId - - The The resource identifier of the Azure Attestation service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointSuffix - - Dns suffix of Azure Attestation service. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointResourceId - - The The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointSuffix - - Dns suffix of Azure Synapse Analytics. - - System.String - - System.String - - - None - - - ContainerRegistryEndpointSuffix - - Suffix of Azure Container Registry. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - MicrosoftGraphEndpointResourceId - - The resource identifier of Microsoft Graph - - System.String - - System.String - - - None - - - MicrosoftGraphUrl - - Microsoft Graph Url - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Add-AzEnvironment - - Name - - Specifies the name of the environment to add. - - System.String - - System.String - - - None - - - ARMEndpoint - - The Azure Resource Manager endpoint - - System.String - - System.String - - - None - - - AzureKeyVaultDnsSuffix - - Dns suffix of Azure Key Vault service. Example is vault-int.azure-int.net - - System.String - - System.String - - - None - - - AzureKeyVaultServiceEndpointResourceId - - Resource identifier of Azure Key Vault data service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - DataLakeAudience - - The audience for tokens authenticating with the AD Data Lake services Endpoint. - - System.String - - System.String - - - None - - - BatchEndpointResourceId - - The resource identifier of the Azure Batch service that is the recipient of the requested token - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpointResourceId - - The audience for tokens authenticating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpoint - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - StorageEndpoint - - Specifies the endpoint for storage (blob, table, queue, and file) access. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointResourceId - - The resource identifier of the Azure Analysis Services resource. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointSuffix - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointResourceId - - The The resource identifier of the Azure Attestation service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointSuffix - - Dns suffix of Azure Attestation service. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointResourceId - - The The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointSuffix - - Dns suffix of Azure Synapse Analytics. - - System.String - - System.String - - - None - - - ContainerRegistryEndpointSuffix - - Suffix of Azure Container Registry. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Add-AzEnvironment - - AutoDiscover - - Discovers environments via default or configured endpoint. - - - System.Management.Automation.SwitchParameter - - - False - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Uri - - Specifies URI of the internet resource to fetch environments. - - System.Uri - - System.Uri - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - ActiveDirectoryEndpoint - - Specifies the base authority for Azure Active Directory authentication. - - System.String - - System.String - - - None - - - ActiveDirectoryServiceEndpointResourceId - - Specifies the audience for tokens that authenticate requests to Azure Resource Manager or Service Management (RDFE) endpoints. - - System.String - - System.String - - - None - - - AdTenant - - Specifies the default Active Directory tenant. - - System.String - - System.String - - - None - - - ARMEndpoint - - The Azure Resource Manager endpoint - - System.String - - System.String - - - None - - - AutoDiscover - - Discovers environments via default or configured endpoint. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - AzureAnalysisServicesEndpointResourceId - - The resource identifier of the Azure Analysis Services resource. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointSuffix - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointResourceId - - The The resource identifier of the Azure Attestation service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointSuffix - - Dns suffix of Azure Attestation service. - - System.String - - System.String - - - None - - - AzureDataLakeAnalyticsCatalogAndJobEndpointSuffix - - Dns Suffix of Azure Data Lake Analytics job and catalog services - - System.String - - System.String - - - None - - - AzureDataLakeStoreFileSystemEndpointSuffix - - Dns Suffix of Azure Data Lake Store FileSystem. Example: azuredatalake.net - - System.String - - System.String - - - None - - - AzureKeyVaultDnsSuffix - - Dns suffix of Azure Key Vault service. Example is vault-int.azure-int.net - - System.String - - System.String - - - None - - - AzureKeyVaultServiceEndpointResourceId - - Resource identifier of Azure Key Vault data service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpoint - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpointResourceId - - The audience for tokens authenticating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointResourceId - - The The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointSuffix - - Dns suffix of Azure Synapse Analytics. - - System.String - - System.String - - - None - - - BatchEndpointResourceId - - The resource identifier of the Azure Batch service that is the recipient of the requested token - - System.String - - System.String - - - None - - - ContainerRegistryEndpointSuffix - - Suffix of Azure Container Registry. - - System.String - - System.String - - - None - - - DataLakeAudience - - The audience for tokens authenticating with the AD Data Lake services Endpoint. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - EnableAdfsAuthentication - - Indicates that Active Directory Federation Services (ADFS) on-premise authentication is allowed. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - GalleryEndpoint - - Specifies the endpoint for the Azure Resource Manager gallery of deployment templates. - - System.String - - System.String - - - None - - - GraphAudience - - The audience for tokens authenticating with the AD Graph Endpoint. - - System.String - - System.String - - - None - - - GraphEndpoint - - Specifies the URL for Graph (Active Directory metadata) requests. - - System.String - - System.String - - - None - - - ManagementPortalUrl - - Specifies the URL for the Management Portal. - - System.String - - System.String - - - None - - - MicrosoftGraphEndpointResourceId - - The resource identifier of Microsoft Graph - - System.String - - System.String - - - None - - - MicrosoftGraphUrl - - Microsoft Graph Url - - System.String - - System.String - - - None - - - Name - - Specifies the name of the environment to add. - - System.String - - System.String - - - None - - - PublishSettingsFileUrl - - Specifies the URL from which .publishsettings files can be downloaded. - - System.String - - System.String - - - None - - - ResourceManagerEndpoint - - Specifies the URL for Azure Resource Manager requests. - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - ServiceEndpoint - - Specifies the endpoint for Service Management (RDFE) requests. - - System.String - - System.String - - - None - - - SqlDatabaseDnsSuffix - - Specifies the domain-name suffix for Azure SQL Database servers. - - System.String - - System.String - - - None - - - StorageEndpoint - - Specifies the endpoint for storage (blob, table, queue, and file) access. - - System.String - - System.String - - - None - - - TrafficManagerDnsSuffix - - Specifies the domain-name suffix for Azure Traffic Manager services. - - System.String - - System.String - - - None - - - Uri - - Specifies URI of the internet resource to fetch environments. - - System.Uri - - System.Uri - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.String - - - - - - - - System.Management.Automation.SwitchParameter - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment - - - - - - - - - - - - - - ----- Example 1: Creating and modifying a new environment ----- - Add-AzEnvironment -Name TestEnvironment ` - -ActiveDirectoryEndpoint TestADEndpoint ` - -ActiveDirectoryServiceEndpointResourceId TestADApplicationId ` - -ResourceManagerEndpoint TestRMEndpoint ` - -GalleryEndpoint TestGalleryEndpoint ` - -GraphEndpoint TestGraphEndpoint - -Name Resource Manager Url ActiveDirectory Authority ----- -------------------- ------------------------- -TestEnvironment TestRMEndpoint TestADEndpoint/ - -Set-AzEnvironment -Name TestEnvironment ` - -ActiveDirectoryEndpoint NewTestADEndpoint ` - -GraphEndpoint NewTestGraphEndpoint | Format-List - -Name : TestEnvironment -EnableAdfsAuthentication : False -OnPremise : False -ActiveDirectoryServiceEndpointResourceId : TestADApplicationId -AdTenant : -GalleryUrl : TestGalleryEndpoint -ManagementPortalUrl : -ServiceManagementUrl : -PublishSettingsFileUrl : -ResourceManagerUrl : TestRMEndpoint -SqlDatabaseDnsSuffix : -StorageEndpointSuffix : -ActiveDirectoryAuthority : NewTestADEndpoint -GraphUrl : NewTestGraphEndpoint -GraphEndpointResourceId : -TrafficManagerDnsSuffix : -AzureKeyVaultDnsSuffix : -DataLakeEndpointResourceId : -AzureDataLakeStoreFileSystemEndpointSuffix : -AzureDataLakeAnalyticsCatalogAndJobEndpointSuffix : -AzureKeyVaultServiceEndpointResourceId : -AzureOperationalInsightsEndpointResourceId : -AzureOperationalInsightsEndpoint : -AzureAnalysisServicesEndpointSuffix : -AzureAttestationServiceEndpointSuffix : -AzureAttestationServiceEndpointResourceId : -AzureSynapseAnalyticsEndpointSuffix : -AzureSynapseAnalyticsEndpointResourceId : -VersionProfiles : {} -ExtendedProperties : {} -BatchEndpointResourceId : - - In this example we are creating a new Azure environment with sample endpoints using Add-AzEnvironment, and then we are changing the value of the ActiveDirectoryEndpoint and GraphEndpoint attributes of the created environment using the cmdlet Set-AzEnvironment. - - - - - - ------- Example 2: Discovering a new environment via Uri ------- - <# -Uri https://configuredmetadata.net returns an array of environment metadata. The following example contains a payload for the AzureCloud default environment. - -[ - { - "portal": "https://portal.azure.com", - "authentication": { - "loginEndpoint": "https://login.microsoftonline.com/", - "audiences": [ - "https://management.core.windows.net/" - ], - "tenant": "common", - "identityProvider": "AAD" - }, - "media": "https://rest.media.azure.net", - "graphAudience": "https://graph.windows.net/", - "graph": "https://graph.windows.net/", - "name": "AzureCloud", - "suffixes": { - "azureDataLakeStoreFileSystem": "azuredatalakestore.net", - "acrLoginServer": "azurecr.io", - "sqlServerHostname": ".database.windows.net", - "azureDataLakeAnalyticsCatalogAndJob": "azuredatalakeanalytics.net", - "keyVaultDns": "vault.azure.net", - "storage": "core.windows.net", - "azureFrontDoorEndpointSuffix": "azurefd.net" - }, - "batch": "https://batch.core.windows.net/", - "resourceManager": "https://management.azure.com/", - "vmImageAliasDoc": "https://raw.githubusercontent.com/Azure/azure-rest-api-specs/master/arm-compute/quickstart-templates/aliases.json", - "activeDirectoryDataLake": "https://datalake.azure.net/", - "sqlManagement": "https://management.core.windows.net:8443/", - "gallery": "https://gallery.azure.com/" - }, -…… -] -#> - -Add-AzEnvironment -AutoDiscover -Uri https://configuredmetadata.net - -Name Resource Manager Url ActiveDirectory Authority ----- -------------------- ------------------------- -TestEnvironment TestRMEndpoint TestADEndpoint/ - - In this example, we are discovering a new Azure environment from the `https://configuredmetadata.net` Uri. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/add-azenvironment - - - Get-AzEnvironment - - - - Remove-AzEnvironment - - - - Set-AzEnvironment - - - - - - - Clear-AzConfig - Clear - AzConfig - - Clears the values of configs that are set by the user. - - - - Clears the values of configs that are set by the user. By default all the configs will be cleared. You can also specify keys of configs to clear. - - - - Clear-AzConfig - - AppliesTo - - Specifies what part of Azure PowerShell the config applies to. Possible values are: - "Az": the config applies to all modules and cmdlets of Azure PowerShell. - - Module name: the config applies to a certain module of Azure PowerShell. - For example, "Az.Storage". - Cmdlet name: the config applies to a certain cmdlet of Azure PowerShell. For example, "Get-AzKeyVault". If not specified, when getting or clearing configs, it defaults to all the above; when updating, it defaults to "Az". - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - DefaultSubscriptionForLogin - - Subscription name or GUID. Sets the default context for Azure PowerShell when logging in without specifying a subscription. - - - System.Management.Automation.SwitchParameter - - - False - - - DisplayBreakingChangeWarning - - Controls if warning messages for breaking changes are displayed or suppressed. When enabled, a breaking change warning is displayed when executing cmdlets with breaking changes in a future release. - - - System.Management.Automation.SwitchParameter - - - False - - - DisplaySurveyMessage - - When enabled, you are prompted infrequently to participate in user experience surveys for Azure PowerShell. - - - System.Management.Automation.SwitchParameter - - - False - - - EnableDataCollection - - When enabled, Azure PowerShell cmdlets send telemetry data to Microsoft to improve the customer experience. For more information, see our privacy statement: https://aka.ms/privacy - - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - Returns true if cmdlet executes correctly. - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of config changes, for example, whether changes apply only to the current process, or to all sessions started by this user. By default it is CurrentUser. - - - CurrentUser - Process - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Clear-AzConfig - - AppliesTo - - Specifies what part of Azure PowerShell the config applies to. Possible values are: - "Az": the config applies to all modules and cmdlets of Azure PowerShell. - - Module name: the config applies to a certain module of Azure PowerShell. - For example, "Az.Storage". - Cmdlet name: the config applies to a certain cmdlet of Azure PowerShell. For example, "Get-AzKeyVault". If not specified, when getting or clearing configs, it defaults to all the above; when updating, it defaults to "Az". - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Do not ask for confirmation when clearing all configs. - - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - Returns true if cmdlet executes correctly. - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of config changes, for example, whether changes apply only to the current process, or to all sessions started by this user. By default it is CurrentUser. - - - CurrentUser - Process - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - AppliesTo - - Specifies what part of Azure PowerShell the config applies to. Possible values are: - "Az": the config applies to all modules and cmdlets of Azure PowerShell. - - Module name: the config applies to a certain module of Azure PowerShell. - For example, "Az.Storage". - Cmdlet name: the config applies to a certain cmdlet of Azure PowerShell. For example, "Get-AzKeyVault". If not specified, when getting or clearing configs, it defaults to all the above; when updating, it defaults to "Az". - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - DefaultSubscriptionForLogin - - Subscription name or GUID. Sets the default context for Azure PowerShell when logging in without specifying a subscription. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - DisplayBreakingChangeWarning - - Controls if warning messages for breaking changes are displayed or suppressed. When enabled, a breaking change warning is displayed when executing cmdlets with breaking changes in a future release. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - DisplaySurveyMessage - - When enabled, you are prompted infrequently to participate in user experience surveys for Azure PowerShell. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - EnableDataCollection - - When enabled, Azure PowerShell cmdlets send telemetry data to Microsoft to improve the customer experience. For more information, see our privacy statement: https://aka.ms/privacy - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Force - - Do not ask for confirmation when clearing all configs. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - Returns true if cmdlet executes correctly. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of config changes, for example, whether changes apply only to the current process, or to all sessions started by this user. By default it is CurrentUser. - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.Boolean - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Clear-AzConfig -Force - - Clear all the configs. `-Force` suppresses the prompt for confirmation. - - - - - - -------------------------- Example 2 -------------------------- - Clear-AzConfig -EnableDataCollection - - Clear the "EnableDataCollection" config. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/clear-azconfig - - - - - - Clear-AzContext - Clear - AzContext - - Remove all Azure credentials, account, and subscription information. - - - - Remove all Azure Credentials, account, and subscription information. - - - - Clear-AzContext - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Delete all users and groups from the global scope without prompting - - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - Return a value indicating success or failure - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Clear the context only for the current PowerShell session, or for all sessions. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Delete all users and groups from the global scope without prompting - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - Return a value indicating success or failure - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Clear the context only for the current PowerShell session, or for all sessions. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.Boolean - - - - - - - - - - - - - - --------------- Example 1: Clear global context --------------- - Clear-AzContext -Scope CurrentUser - - Remove all account, subscription, and credential information for any powershell session. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/clear-azcontext - - - - - - Clear-AzDefault - Clear - AzDefault - - Clears the defaults set by the user in the current context. - - - - The Clear-AzDefault cmdlet removes the defaults set by the user depending on the switch parameters specified by the user. - - - - Clear-AzDefault - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Remove all defaults if no default is specified - - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - {{Fill PassThru Description}} - - - System.Management.Automation.SwitchParameter - - - False - - - ResourceGroup - - Clear Default Resource Group - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Remove all defaults if no default is specified - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - {{Fill PassThru Description}} - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - ResourceGroup - - Clear Default Resource Group - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.Management.Automation.SwitchParameter - - - - - - - - - - System.Boolean - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Clear-AzDefault - - This command removes all the defaults set by the user in the current context. - - - - - - -------------------------- Example 2 -------------------------- - Clear-AzDefault -ResourceGroup - - This command removes the default resource group set by the user in the current context. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/clear-azdefault - - - - - - Connect-AzAccount - Connect - AzAccount - - Connect to Azure with an authenticated account for use with cmdlets from the Az PowerShell modules. - - - - The `Connect-AzAccount` cmdlet connects to Azure with an authenticated account for use with cmdlets from the Az PowerShell modules. You can use this authenticated account only with Azure Resource Manager requests. To add an authenticated account for use with Service Management, use the `Add-AzureAccount` cmdlet from the Azure PowerShell module. If no context is found for the current user, the user's context list is populated with a context for each of their first 25 subscriptions. The list of contexts created for the user can be found by running `Get-AzContext -ListAvailable`. To skip this context population, specify the SkipContextPopulation switch parameter. After executing this cmdlet, you can disconnect from an Azure account using `Disconnect-AzAccount`. - - - - Connect-AzAccount - - AccessToken - - Specifies an access token. - > [!CAUTION] > Access tokens are a type of credential. You should take the appropriate security precautions to > keep them confidential. Access tokens also timeout and may prevent long running tasks from > completing. - - System.String - - System.String - - - None - - - AccountId - - Account Id / User Id / User Name to login with in Default (UserWithSubscriptionId) parameter set; Account ID for access token in AccessToken parameter set; Account ID for managed service in ManagedService parameter set. Can be a managed service resource ID, or the associated client ID. To use the system assigned identity, leave this field blank. - - System.String - - System.String - - - None - - - ContextName - - Name of the default Azure context for this login. For more information about Azure contexts, see Azure PowerShell context objects (/powershell/azure/context-persistence). - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Environment - - Environment containing the Azure account. - - System.String - - System.String - - - None - - - Force - - Overwrite the existing context with the same name without prompting. - - - System.Management.Automation.SwitchParameter - - - False - - - GraphAccessToken - - AccessToken for Graph Service. - - System.String - - System.String - - - None - - - KeyVaultAccessToken - - AccessToken for KeyVault Service. - - System.String - - System.String - - - None - - - MaxContextPopulation - - Max subscription number to populate contexts after login. Default is 25. To populate all subscriptions to contexts, set to -1. - - System.Int32 - - System.Int32 - - - None - - - MicrosoftGraphAccessToken - - Access token to Microsoft Graph - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - SkipContextPopulation - - Skips context population if no contexts are found. - - - System.Management.Automation.SwitchParameter - - - False - - - SkipValidation - - Skip validation for access token. - - - System.Management.Automation.SwitchParameter - - - False - - - Subscription - - Subscription Name or ID. - - System.String - - System.String - - - None - - - Tenant - - Optional tenant name or ID. - > [!NOTE] > Due to limitations of the current API, you must use a tenant ID instead of a tenant name when > connecting with a business-to-business (B2B) account. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Connect-AzAccount - - AccountId - - Account Id / User Id / User Name to login with in Default (UserWithSubscriptionId) parameter set; Account ID for access token in AccessToken parameter set; Account ID for managed service in ManagedService parameter set. Can be a managed service resource ID, or the associated client ID. To use the system assigned identity, leave this field blank. - - System.String - - System.String - - - None - - - AuthScope - - Optional OAuth scope for login, supported pre-defined values: AadGraph, AnalysisServices, Attestation, Batch, DataLake, KeyVault, OperationalInsights, Storage, Synapse. It also supports resource id like `https://storage.azure.com/`. - - System.String - - System.String - - - None - - - ContextName - - Name of the default Azure context for this login. For more information about Azure contexts, see Azure PowerShell context objects (/powershell/azure/context-persistence). - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Environment - - Environment containing the Azure account. - - System.String - - System.String - - - None - - - Force - - Overwrite the existing context with the same name without prompting. - - - System.Management.Automation.SwitchParameter - - - False - - - MaxContextPopulation - - Max subscription number to populate contexts after login. Default is 25. To populate all subscriptions to contexts, set to -1. - - System.Int32 - - System.Int32 - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - SkipContextPopulation - - Skips context population if no contexts are found. - - - System.Management.Automation.SwitchParameter - - - False - - - Subscription - - Subscription Name or ID. - - System.String - - System.String - - - None - - - Tenant - - Optional tenant name or ID. - > [!NOTE] > Due to limitations of the current API, you must use a tenant ID instead of a tenant name when > connecting with a business-to-business (B2B) account. - - System.String - - System.String - - - None - - - UseDeviceAuthentication - - Use device code authentication instead of a browser control. - - - System.Management.Automation.SwitchParameter - - - False - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Connect-AzAccount - - AccountId - - Account Id / User Id / User Name to login with in Default (UserWithSubscriptionId) parameter set; Account ID for access token in AccessToken parameter set; Account ID for managed service in ManagedService parameter set. Can be a managed service resource ID, or the associated client ID. To use the system assigned identity, leave this field blank. - - System.String - - System.String - - - None - - - AuthScope - - Optional OAuth scope for login, supported pre-defined values: AadGraph, AnalysisServices, Attestation, Batch, DataLake, KeyVault, OperationalInsights, Storage, Synapse. It also supports resource id like `https://storage.azure.com/`. - - System.String - - System.String - - - None - - - ContextName - - Name of the default Azure context for this login. For more information about Azure contexts, see Azure PowerShell context objects (/powershell/azure/context-persistence). - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Environment - - Environment containing the Azure account. - - System.String - - System.String - - - None - - - Force - - Overwrite the existing context with the same name without prompting. - - - System.Management.Automation.SwitchParameter - - - False - - - Identity - - Login using a Managed Service Identity. - - - System.Management.Automation.SwitchParameter - - - False - - - MaxContextPopulation - - Max subscription number to populate contexts after login. Default is 25. To populate all subscriptions to contexts, set to -1. - - System.Int32 - - System.Int32 - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - SkipContextPopulation - - Skips context population if no contexts are found. - - - System.Management.Automation.SwitchParameter - - - False - - - Subscription - - Subscription Name or ID. - - System.String - - System.String - - - None - - - Tenant - - Optional tenant name or ID. - > [!NOTE] > Due to limitations of the current API, you must use a tenant ID instead of a tenant name when > connecting with a business-to-business (B2B) account. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Connect-AzAccount - - ApplicationId - - Application ID of the service principal. - - System.String - - System.String - - - None - - - AuthScope - - Optional OAuth scope for login, supported pre-defined values: AadGraph, AnalysisServices, Attestation, Batch, DataLake, KeyVault, OperationalInsights, Storage, Synapse. It also supports resource id like `https://storage.azure.com/`. - - System.String - - System.String - - - None - - - CertificateThumbprint - - Certificate Hash or Thumbprint. - - System.String - - System.String - - - None - - - ContextName - - Name of the default Azure context for this login. For more information about Azure contexts, see Azure PowerShell context objects (/powershell/azure/context-persistence). - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Environment - - Environment containing the Azure account. - - System.String - - System.String - - - None - - - Force - - Overwrite the existing context with the same name without prompting. - - - System.Management.Automation.SwitchParameter - - - False - - - MaxContextPopulation - - Max subscription number to populate contexts after login. Default is 25. To populate all subscriptions to contexts, set to -1. - - System.Int32 - - System.Int32 - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - SendCertificateChain - - Specifies if the x5c claim (public key of the certificate) should be sent to the STS to achieve easy certificate rollover in Azure AD. - - - System.Management.Automation.SwitchParameter - - - False - - - ServicePrincipal - - Indicates that this account authenticates by providing service principal credentials. - - - System.Management.Automation.SwitchParameter - - - False - - - SkipContextPopulation - - Skips context population if no contexts are found. - - - System.Management.Automation.SwitchParameter - - - False - - - Subscription - - Subscription Name or ID. - - System.String - - System.String - - - None - - - Tenant - - Optional tenant name or ID. - > [!NOTE] > Due to limitations of the current API, you must use a tenant ID instead of a tenant name when > connecting with a business-to-business (B2B) account. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Connect-AzAccount - - ApplicationId - - Application ID of the service principal. - - System.String - - System.String - - - None - - - ContextName - - Name of the default Azure context for this login. For more information about Azure contexts, see Azure PowerShell context objects (/powershell/azure/context-persistence). - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Environment - - Environment containing the Azure account. - - System.String - - System.String - - - None - - - FederatedToken - - Specifies a token provided by another identity provider. The issuer and subject in this token must be first configured to be trusted by the ApplicationId. - > [!CAUTION] > Federated tokens are a type of credential. You should take the appropriate security precautions to keep them confidential. Federated tokens also timeout and may prevent long running tasks from completing. - - System.String - - System.String - - - None - - - Force - - Overwrite the existing context with the same name without prompting. - - - System.Management.Automation.SwitchParameter - - - False - - - MaxContextPopulation - - Max subscription number to populate contexts after login. Default is 25. To populate all subscriptions to contexts, set to -1. - - System.Int32 - - System.Int32 - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - ServicePrincipal - - Indicates that this account authenticates by providing service principal credentials. - - - System.Management.Automation.SwitchParameter - - - False - - - SkipContextPopulation - - Skips context population if no contexts are found. - - - System.Management.Automation.SwitchParameter - - - False - - - Subscription - - Subscription Name or ID. - - System.String - - System.String - - - None - - - Tenant - - Optional tenant name or ID. - > [!NOTE] > Due to limitations of the current API, you must use a tenant ID instead of a tenant name when > connecting with a business-to-business (B2B) account. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Connect-AzAccount - - ApplicationId - - Application ID of the service principal. - - System.String - - System.String - - - None - - - CertificatePassword - - The password required to access the pkcs#12 certificate file. - - System.Security.SecureString - - System.Security.SecureString - - - None - - - CertificatePath - - The path of certficate file in pkcs#12 format. - - System.String - - System.String - - - None - - - ContextName - - Name of the default Azure context for this login. For more information about Azure contexts, see Azure PowerShell context objects (/powershell/azure/context-persistence). - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Environment - - Environment containing the Azure account. - - System.String - - System.String - - - None - - - Force - - Overwrite the existing context with the same name without prompting. - - - System.Management.Automation.SwitchParameter - - - False - - - MaxContextPopulation - - Max subscription number to populate contexts after login. Default is 25. To populate all subscriptions to contexts, set to -1. - - System.Int32 - - System.Int32 - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - SendCertificateChain - - Specifies if the x5c claim (public key of the certificate) should be sent to the STS to achieve easy certificate rollover in Azure AD. - - - System.Management.Automation.SwitchParameter - - - False - - - ServicePrincipal - - Indicates that this account authenticates by providing service principal credentials. - - - System.Management.Automation.SwitchParameter - - - False - - - SkipContextPopulation - - Skips context population if no contexts are found. - - - System.Management.Automation.SwitchParameter - - - False - - - Subscription - - Subscription Name or ID. - - System.String - - System.String - - - None - - - Tenant - - Optional tenant name or ID. - > [!NOTE] > Due to limitations of the current API, you must use a tenant ID instead of a tenant name when > connecting with a business-to-business (B2B) account. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Connect-AzAccount - - AuthScope - - Optional OAuth scope for login, supported pre-defined values: AadGraph, AnalysisServices, Attestation, Batch, DataLake, KeyVault, OperationalInsights, Storage, Synapse. It also supports resource id like `https://storage.azure.com/`. - - System.String - - System.String - - - None - - - ContextName - - Name of the default Azure context for this login. For more information about Azure contexts, see Azure PowerShell context objects (/powershell/azure/context-persistence). - - System.String - - System.String - - - None - - - Credential - - Specifies a PSCredential object. For more information about the PSCredential object, type `Get-Help Get-Credential`. The PSCredential object provides the user ID and password for organizational ID credentials, or the application ID and secret for service principal credentials. - - System.Management.Automation.PSCredential - - System.Management.Automation.PSCredential - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Environment - - Environment containing the Azure account. - - System.String - - System.String - - - None - - - Force - - Overwrite the existing context with the same name without prompting. - - - System.Management.Automation.SwitchParameter - - - False - - - MaxContextPopulation - - Max subscription number to populate contexts after login. Default is 25. To populate all subscriptions to contexts, set to -1. - - System.Int32 - - System.Int32 - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - ServicePrincipal - - Indicates that this account authenticates by providing service principal credentials. - - - System.Management.Automation.SwitchParameter - - - False - - - SkipContextPopulation - - Skips context population if no contexts are found. - - - System.Management.Automation.SwitchParameter - - - False - - - Subscription - - Subscription Name or ID. - - System.String - - System.String - - - None - - - Tenant - - Optional tenant name or ID. - > [!NOTE] > Due to limitations of the current API, you must use a tenant ID instead of a tenant name when > connecting with a business-to-business (B2B) account. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Connect-AzAccount - - AuthScope - - Optional OAuth scope for login, supported pre-defined values: AadGraph, AnalysisServices, Attestation, Batch, DataLake, KeyVault, OperationalInsights, Storage, Synapse. It also supports resource id like `https://storage.azure.com/`. - - System.String - - System.String - - - None - - - ContextName - - Name of the default Azure context for this login. For more information about Azure contexts, see Azure PowerShell context objects (/powershell/azure/context-persistence). - - System.String - - System.String - - - None - - - Credential - - Specifies a PSCredential object. For more information about the PSCredential object, type `Get-Help Get-Credential`. The PSCredential object provides the user ID and password for organizational ID credentials, or the application ID and secret for service principal credentials. - - System.Management.Automation.PSCredential - - System.Management.Automation.PSCredential - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Environment - - Environment containing the Azure account. - - System.String - - System.String - - - None - - - Force - - Overwrite the existing context with the same name without prompting. - - - System.Management.Automation.SwitchParameter - - - False - - - MaxContextPopulation - - Max subscription number to populate contexts after login. Default is 25. To populate all subscriptions to contexts, set to -1. - - System.Int32 - - System.Int32 - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - SkipContextPopulation - - Skips context population if no contexts are found. - - - System.Management.Automation.SwitchParameter - - - False - - - Subscription - - Subscription Name or ID. - - System.String - - System.String - - - None - - - Tenant - - Optional tenant name or ID. - > [!NOTE] > Due to limitations of the current API, you must use a tenant ID instead of a tenant name when > connecting with a business-to-business (B2B) account. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - AccessToken - - Specifies an access token. - > [!CAUTION] > Access tokens are a type of credential. You should take the appropriate security precautions to > keep them confidential. Access tokens also timeout and may prevent long running tasks from > completing. - - System.String - - System.String - - - None - - - AccountId - - Account Id / User Id / User Name to login with in Default (UserWithSubscriptionId) parameter set; Account ID for access token in AccessToken parameter set; Account ID for managed service in ManagedService parameter set. Can be a managed service resource ID, or the associated client ID. To use the system assigned identity, leave this field blank. - - System.String - - System.String - - - None - - - ApplicationId - - Application ID of the service principal. - - System.String - - System.String - - - None - - - AuthScope - - Optional OAuth scope for login, supported pre-defined values: AadGraph, AnalysisServices, Attestation, Batch, DataLake, KeyVault, OperationalInsights, Storage, Synapse. It also supports resource id like `https://storage.azure.com/`. - - System.String - - System.String - - - None - - - CertificatePassword - - The password required to access the pkcs#12 certificate file. - - System.Security.SecureString - - System.Security.SecureString - - - None - - - CertificatePath - - The path of certficate file in pkcs#12 format. - - System.String - - System.String - - - None - - - CertificateThumbprint - - Certificate Hash or Thumbprint. - - System.String - - System.String - - - None - - - ContextName - - Name of the default Azure context for this login. For more information about Azure contexts, see Azure PowerShell context objects (/powershell/azure/context-persistence). - - System.String - - System.String - - - None - - - Credential - - Specifies a PSCredential object. For more information about the PSCredential object, type `Get-Help Get-Credential`. The PSCredential object provides the user ID and password for organizational ID credentials, or the application ID and secret for service principal credentials. - - System.Management.Automation.PSCredential - - System.Management.Automation.PSCredential - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Environment - - Environment containing the Azure account. - - System.String - - System.String - - - None - - - FederatedToken - - Specifies a token provided by another identity provider. The issuer and subject in this token must be first configured to be trusted by the ApplicationId. - > [!CAUTION] > Federated tokens are a type of credential. You should take the appropriate security precautions to keep them confidential. Federated tokens also timeout and may prevent long running tasks from completing. - - System.String - - System.String - - - None - - - Force - - Overwrite the existing context with the same name without prompting. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - GraphAccessToken - - AccessToken for Graph Service. - - System.String - - System.String - - - None - - - Identity - - Login using a Managed Service Identity. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - KeyVaultAccessToken - - AccessToken for KeyVault Service. - - System.String - - System.String - - - None - - - MaxContextPopulation - - Max subscription number to populate contexts after login. Default is 25. To populate all subscriptions to contexts, set to -1. - - System.Int32 - - System.Int32 - - - None - - - MicrosoftGraphAccessToken - - Access token to Microsoft Graph - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - SendCertificateChain - - Specifies if the x5c claim (public key of the certificate) should be sent to the STS to achieve easy certificate rollover in Azure AD. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - ServicePrincipal - - Indicates that this account authenticates by providing service principal credentials. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - SkipContextPopulation - - Skips context population if no contexts are found. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - SkipValidation - - Skip validation for access token. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Subscription - - Subscription Name or ID. - - System.String - - System.String - - - None - - - Tenant - - Optional tenant name or ID. - > [!NOTE] > Due to limitations of the current API, you must use a tenant ID instead of a tenant name when > connecting with a business-to-business (B2B) account. - - System.String - - System.String - - - None - - - UseDeviceAuthentication - - Use device code authentication instead of a browser control. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.String - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile - - - - - - - - - - - - - - ------------ Example 1: Connect to an Azure account ------------ - Connect-AzAccount - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -azureuser@contoso.com Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud - - - - - - - - Example 2: Connect to Azure using organizational ID credentials - $Credential = Get-Credential -Connect-AzAccount -Credential $Credential - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -azureuser@contoso.com Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud - - - - - - - - Example 3: Connect to Azure using a service principal account - $Credential = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList $ApplicationId, $SecuredPassword -Connect-AzAccount -ServicePrincipal -TenantId $TenantId -Credential $Credential - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -xxxx-xxxx-xxxx-xxxx Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud - - - - - - - - Example 4: Use an interactive login to connect to a specific tenant and subscription - Connect-AzAccount -Tenant 'xxxx-xxxx-xxxx-xxxx' -SubscriptionId 'yyyy-yyyy-yyyy-yyyy' - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -azureuser@contoso.com Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud - - - - - - - - ----- Example 5: Connect using a Managed Service Identity ----- - Connect-AzAccount -Identity -Set-AzContext -Subscription Subscription1 - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -MSI@50342 Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud - - - - - - - - Example 6: Connect using Managed Service Identity login and ClientId - $identity = Get-AzUserAssignedIdentity -ResourceGroupName 'myResourceGroup' -Name 'myUserAssignedIdentity' -Get-AzVM -ResourceGroupName contoso -Name testvm | Update-AzVM -IdentityType UserAssigned -IdentityId $identity.Id -Connect-AzAccount -Identity -AccountId $identity.ClientId # Run on the virtual machine - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -yyyy-yyyy-yyyy-yyyy Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud - - - - - - - - ------------ Example 7: Connect using certificates ------------ - $Thumbprint = 'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX' -$TenantId = 'yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy' -$ApplicationId = '00000000-0000-0000-0000-00000000' -Connect-AzAccount -CertificateThumbprint $Thumbprint -ApplicationId $ApplicationId -Tenant $TenantId -ServicePrincipal - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -xxxxxxxx-xxxx-xxxx-xxxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy AzureCloud - -Account : xxxxxxxx-xxxx-xxxx-xxxxxxxx -SubscriptionName : MyTestSubscription -SubscriptionId : zzzzzzzz-zzzz-zzzz-zzzz-zzzzzzzz -TenantId : yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy -Environment : AzureCloud - - - - - - - - -------------- Example 8: Connect with AuthScope -------------- - Connect-AzAccount -AuthScope Storage - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -yyyy-yyyy-yyyy-yyyy Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud - - - - - - - - ---------- Example 9: Connect using certificate file ---------- - $securePassword = $plainPassword | ConvertTo-SecureString -AsPlainText -Force -$TenantId = 'yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy' -$ApplicationId = 'zzzzzzzz-zzzz-zzzz-zzzz-zzzzzzzz' -Connect-AzAccount -ServicePrincipal -ApplicationId $ApplicationId -TenantId $TenantId -CertificatePath './certificatefortest.pfx' -CertificatePassword $securePassword - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy AzureCloud - - - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/connect-azaccount - - - - - - Disable-AzContextAutosave - Disable - AzContextAutosave - - Turn off autosaving Azure credentials. Your login information will be forgotten the next time you open a PowerShell window - - - - Turn off autosaving Azure credentials. Your login information will be forgotten the next time you open a PowerShell window - - - - Disable-AzContextAutosave - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - Microsoft.Azure.Commands.Common.Authentication.ContextAutosaveSettings - - - - - - - - - - - - - - ---------- Example 1: Disable autosaving the context ---------- - Disable-AzContextAutosave - - Disable autosave for the current user. - - - - - - -------------------------- Example 2 -------------------------- - Disable-AzContextAutosave -Scope Process - - - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/disable-azcontextautosave - - - - - - Disable-AzDataCollection - Disable - AzDataCollection - - Opts out of collecting data to improve the Azure PowerShell cmdlets. Data is collected by default unless you explicitly opt out. - - - - The `Disable-AzDataCollection` cmdlet is used to opt out of data collection. Azure PowerShell automatically collects telemetry data by default. To disable data collection, you must explicitly opt-out. Microsoft aggregates collected data to identify patterns of usage, to identify common issues, and to improve the experience of Azure PowerShell. Microsoft Azure PowerShell doesn't collect any private or personal data. If you've previously opted out, run the `Enable-AzDataCollection` cmdlet to re-enable data collection for the current user on the current machine. - - - - Disable-AzDataCollection - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.Void - - - - - - - - - - - - - - -- Example 1: Disabling data collection for the current user -- - Disable-AzDataCollection - - - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/disable-azdatacollection - - - Enable-AzDataCollection - - - - - - - Disable-AzureRmAlias - Disable - AzureRmAlias - - Disables AzureRm prefix aliases for Az modules. - - - - Disables AzureRm prefix aliases for Az modules. If -Module is specified, only modules listed will have aliases disabled. Otherwise all AzureRm aliases are disabled. - - - - Disable-AzureRmAlias - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Module - - Indicates which modules to disable aliases for. If none are specified, default is all enabled modules. - - System.String[] - - System.String[] - - - None - - - PassThru - - If specified, cmdlet will return all disabled aliases - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Indicates what scope aliases should be disabled for. Default is 'Process' - - - Process - CurrentUser - LocalMachine - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Module - - Indicates which modules to disable aliases for. If none are specified, default is all enabled modules. - - System.String[] - - System.String[] - - - None - - - PassThru - - If specified, cmdlet will return all disabled aliases - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Indicates what scope aliases should be disabled for. Default is 'Process' - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.String - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Disable-AzureRmAlias - - Disables all AzureRm prefixes for the current PowerShell session. - - - - - - -------------------------- Example 2 -------------------------- - Disable-AzureRmAlias -Module Az.Accounts -Scope CurrentUser - - Disables AzureRm aliases for the Az.Accounts module for both the current process and for the current user. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/disable-azurermalias - - - - - - Disconnect-AzAccount - Disconnect - AzAccount - - Disconnects a connected Azure account and removes all credentials and contexts associated with that account. - - - - The Disconnect-AzAccount cmdlet disconnects a connected Azure account and removes all credentials and contexts (subscription and tenant information) associated with that account. After executing this cmdlet, you will need to login again using Connect-AzAccount. - - - - Disconnect-AzAccount - - ApplicationId - - ServicePrincipal id (globally unique id) - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - TenantId - - Tenant id (globally unique id) - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not executed. - - - System.Management.Automation.SwitchParameter - - - False - - - - Disconnect-AzAccount - - AzureContext - - Context - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not executed. - - - System.Management.Automation.SwitchParameter - - - False - - - - Disconnect-AzAccount - - ContextName - - Name of the context to log out of - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not executed. - - - System.Management.Automation.SwitchParameter - - - False - - - - Disconnect-AzAccount - - InputObject - - The account object to remove - - Microsoft.Azure.Commands.Profile.Models.PSAzureRmAccount - - Microsoft.Azure.Commands.Profile.Models.PSAzureRmAccount - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not executed. - - - System.Management.Automation.SwitchParameter - - - False - - - - Disconnect-AzAccount - - Username - - User name of the form 'user@contoso.org' - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not executed. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - ApplicationId - - ServicePrincipal id (globally unique id) - - System.String - - System.String - - - None - - - AzureContext - - Context - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - ContextName - - Name of the context to log out of - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - InputObject - - The account object to remove - - Microsoft.Azure.Commands.Profile.Models.PSAzureRmAccount - - Microsoft.Azure.Commands.Profile.Models.PSAzureRmAccount - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - TenantId - - Tenant id (globally unique id) - - System.String - - System.String - - - None - - - Username - - User name of the form 'user@contoso.org' - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not executed. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureRmAccount - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureRmAccount - - - - - - - - - - - - - - ----------- Example 1: Logout of the current account ----------- - Disconnect-AzAccount - - Logs out of the Azure account associated with the current context. - - - - - - Example 2: Logout of the account associated with a particular context - Get-AzContext "Work" | Disconnect-AzAccount -Scope CurrentUser - - Logs out the account associated with the given context (named 'Work'). Because this uses the 'CurrentUser' scope, all credentials and contexts will be permanently deleted. - - - - - - ------------- Example 3: Log out a particular user ------------- - Disconnect-AzAccount -Username 'user1@contoso.org' - - Logs out the 'user1@contoso.org' user - all credentials and all contexts associated with this user will be removed. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/disconnect-azaccount - - - - - - Enable-AzContextAutosave - Enable - AzContextAutosave - - Azure contexts are PowerShell objects representing your active subscription to run commands against, and the authentication information needed to connect to an Azure cloud. With Azure contexts, Azure PowerShell doesn't need to reauthenticate your account each time you switch subscriptions. For more information, see Azure PowerShell context objects (https://learn.microsoft.com/powershell/azure/context-persistence). - This cmdlet allows the Azure context information to be saved and automatically loaded when you start a PowerShell process. For example, when opening a new window. - - - - Allows the Azure context information to be saved and automatically loaded when a PowerShell process starts. The context is saved at the end of the execution of any cmdlet that affects the context. For example, any profile cmdlet. If you're using user authentication, then tokens can be updated during the course of running any cmdlet. - - - - Enable-AzContextAutosave - - DefaultProfile - - The credentials, tenant, and subscription used for communication with Azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes. For example, whether changes apply only to the current process, or to all sessions started by this user. Changes made with the scope `CurrentUser` will affect all PowerShell sessions started by the user. If a particular session needs to have different settings, use the scope `Process`. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - CurrentUser - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet isn't run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with Azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes. For example, whether changes apply only to the current process, or to all sessions started by this user. Changes made with the scope `CurrentUser` will affect all PowerShell sessions started by the user. If a particular session needs to have different settings, use the scope `Process`. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - CurrentUser - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet isn't run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - Microsoft.Azure.Commands.Common.Authentication.ContextAutosaveSettings - - - - - - - - - - - - - - Example 1: Enable autosaving credentials for the current user - Enable-AzContextAutosave - - - - - - - - -------------------------- Example 2 -------------------------- - Enable-AzContextAutosave -Scope Process - - - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/enable-azcontextautosave - - - - - - Enable-AzDataCollection - Enable - AzDataCollection - - Enables Azure PowerShell to collect data to improve the user experience with the Azure PowerShell cmdlets. Executing this cmdlet opts in to data collection for the current user on the current machine. Data is collected by default unless you explicitly opt out. - - - - The `Enable-AzDataCollection` cmdlet is used to opt in to data collection. Azure PowerShell automatically collects telemetry data by default. Microsoft aggregates collected data to identify patterns of usage, to identify common issues, and to improve the experience of Azure PowerShell. Microsoft Azure PowerShell doesn't collect any private or personal data. To disable data collection, you must explicitly opt out by executing `Disable-AzDataCollection`. - - - - Enable-AzDataCollection - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.Void - - - - - - - - - - - - - - --- Example 1: Enabling data collection for the current user --- - Enable-AzDataCollection - - - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/enable-azdatacollection - - - Disable-AzDataCollection - - - - - - - Enable-AzureRmAlias - Enable - AzureRmAlias - - Enables AzureRm prefix aliases for Az modules. - - - - Enables AzureRm prefix aliases for Az modules. If -Module is specified, only modules listed will have aliases enabled. Otherwise all AzureRm aliases are enabled. - - - - Enable-AzureRmAlias - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Module - - Indicates which modules to enable aliases for. If none are specified, default is all modules. - - System.String[] - - System.String[] - - - None - - - PassThru - - If specified, cmdlet will return all aliases enabled - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Indicates what scope aliases should be enabled for. Default is 'Local' - - - Local - Process - CurrentUser - LocalMachine - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Module - - Indicates which modules to enable aliases for. If none are specified, default is all modules. - - System.String[] - - System.String[] - - - None - - - PassThru - - If specified, cmdlet will return all aliases enabled - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Indicates what scope aliases should be enabled for. Default is 'Local' - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.String - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Enable-AzureRmAlias - - Enables all AzureRm prefixes for the current PowerShell session. - - - - - - -------------------------- Example 2 -------------------------- - Enable-AzureRmAlias -Module Az.Accounts -Scope CurrentUser - - Enables AzureRm aliases for the Az.Accounts module for both the current process and for the current user. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/enable-azurermalias - - - - - - Export-AzConfig - Export - AzConfig - - Exports all the configs into a file so that it can be imported on another machine. - - - - The `Export-AzConfig` cmdlet exports all the configs that are set at the "CurrentUser" scope into a file at given path in JSON format. The file can then be imported by `Import-AzConfig` for example on another machine. - - - - Export-AzConfig - - Path - - Specifies the path of the file to which to save the configs. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Overwrites the given file if it exists. - - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - Returns a boolean value indicating success or failure. - - - System.Management.Automation.SwitchParameter - - - False - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Overwrites the given file if it exists. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - Returns a boolean value indicating success or failure. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Path - - Specifies the path of the file to which to save the configs. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.Boolean - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Export-AzConfig -Path ./config.json - - This example exports the configs to `./config.json` file which can later be imported via `Import-AzConfig`. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/export-azconfig - - - Import-AzConfig - - - - - - - Get-AzAccessToken - Get - AzAccessToken - - Get raw access token. When using -ResourceUrl, please make sure the value does match current Azure environment. You may refer to the value of `(Get-AzContext).Environment`. - - - - Get access token - - - - Get-AzAccessToken - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - IAzureContextContainer - - IAzureContextContainer - - - None - - - ResourceTypeName - - Optional resource type name, supported values: AadGraph, AnalysisServices, AppConfiguration, Arm, Attestation, Batch, DataLake, KeyVault, MSGraph, OperationalInsights, ResourceManager, Storage, Synapse. Default value is Arm if not specified. - - String - - String - - - None - - - TenantId - - Optional Tenant Id. Use tenant id of default context if not specified. - - String - - String - - - None - - - - Get-AzAccessToken - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - IAzureContextContainer - - IAzureContextContainer - - - None - - - ResourceUrl - - Resource url for that you're requesting token, e.g. 'https://graph.microsoft.com/'. - - String - - String - - - None - - - TenantId - - Optional Tenant Id. Use tenant id of default context if not specified. - - String - - String - - - None - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - IAzureContextContainer - - IAzureContextContainer - - - None - - - ResourceTypeName - - Optional resource type name, supported values: AadGraph, AnalysisServices, AppConfiguration, Arm, Attestation, Batch, DataLake, KeyVault, MSGraph, OperationalInsights, ResourceManager, Storage, Synapse. Default value is Arm if not specified. - - String - - String - - - None - - - ResourceUrl - - Resource url for that you're requesting token, e.g. 'https://graph.microsoft.com/'. - - String - - String - - - None - - - TenantId - - Optional Tenant Id. Use tenant id of default context if not specified. - - String - - String - - - None - - - - - - None - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAccessToken - - - - - - - - - - - - - - ------- Example 1 Get the access token for ARM endpoint ------- - Get-AzAccessToken - - Get access token of current account for ResourceManager endpoint - - - - - - - Example 2 Get the access token for Microsoft Graph endpoint - - Get-AzAccessToken -ResourceTypeName MSGraph - - Get access token of Microsoft Graph endpoint for current account - - - - - - - Example 3 Get the access token for Microsoft Graph endpoint - - Get-AzAccessToken -ResourceUrl "https://graph.microsoft.com/" - - Get access token of Microsoft Graph endpoint for current account - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/get-azaccesstoken - - - - - - Get-AzConfig - Get - AzConfig - - Gets the configs of Azure PowerShell. - - - - Gets the configs of Azure PowerShell. By default it lists all the configs. You can filter the result using various parameters. - > [!NOTE] > Configs have priorities. Generally speaking, Process scope has higher priority than CurrentUser scope; a config that applies to a certain cmdlet has higher priority than that applies to a module, again higher than Az. > To reduce confusion, the result of `Get-AzConfig` shows those configs that are taking effect. It is a combination of all the configs, but not literally all the configs. However, you could always view them by applying different filter parameters, such as `-Scope`. - - - - Get-AzConfig - - AppliesTo - - Specifies what part of Azure PowerShell the config applies to. Possible values are: - "Az": the config applies to all modules and cmdlets of Azure PowerShell. - - Module name: the config applies to a certain module of Azure PowerShell. - For example, "Az.Storage". - Cmdlet name: the config applies to a certain cmdlet of Azure PowerShell. For example, "Get-AzKeyVault". If not specified, when getting or clearing configs, it defaults to all the above; when updating, it defaults to "Az". - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - DefaultSubscriptionForLogin - - Subscription name or GUID. Sets the default context for Azure PowerShell when logging in without specifying a subscription. - - - System.Management.Automation.SwitchParameter - - - False - - - DisplayBreakingChangeWarning - - Controls if warning messages for breaking changes are displayed or suppressed. When enabled, a breaking change warning is displayed when executing cmdlets with breaking changes in a future release. - - - System.Management.Automation.SwitchParameter - - - False - - - DisplaySurveyMessage - - When enabled, you are prompted infrequently to participate in user experience surveys for Azure PowerShell. - - - System.Management.Automation.SwitchParameter - - - False - - - EnableDataCollection - - When enabled, Azure PowerShell cmdlets send telemetry data to Microsoft to improve the customer experience. For more information, see our privacy statement: https://aka.ms/privacy - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of config changes, for example, whether changes apply only to the current process, or to all sessions started by this user. By default it is CurrentUser. - - - CurrentUser - Process - Default - Environment - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - - None - - - - - - AppliesTo - - Specifies what part of Azure PowerShell the config applies to. Possible values are: - "Az": the config applies to all modules and cmdlets of Azure PowerShell. - - Module name: the config applies to a certain module of Azure PowerShell. - For example, "Az.Storage". - Cmdlet name: the config applies to a certain cmdlet of Azure PowerShell. For example, "Get-AzKeyVault". If not specified, when getting or clearing configs, it defaults to all the above; when updating, it defaults to "Az". - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - DefaultSubscriptionForLogin - - Subscription name or GUID. Sets the default context for Azure PowerShell when logging in without specifying a subscription. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - DisplayBreakingChangeWarning - - Controls if warning messages for breaking changes are displayed or suppressed. When enabled, a breaking change warning is displayed when executing cmdlets with breaking changes in a future release. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - DisplaySurveyMessage - - When enabled, you are prompted infrequently to participate in user experience surveys for Azure PowerShell. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - EnableDataCollection - - When enabled, Azure PowerShell cmdlets send telemetry data to Microsoft to improve the customer experience. For more information, see our privacy statement: https://aka.ms/privacy - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of config changes, for example, whether changes apply only to the current process, or to all sessions started by this user. By default it is CurrentUser. - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - - None - - - - - - None - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSConfig - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Get-AzConfig - -Key Value Applies To Scope Help Message ---- ----- ---------- ----- ------------ -EnableDataCollection False Az CurrentUser When enabled, Azure PowerShell cmdlets send telemetry data to Microsoft to improve the custom… -DefaultSubscriptionForLogin Az Default Subscription name or GUID. Sets the default context for Azure PowerShell when logging in with… -DisplayBreakingChangeWarning True Az Default Controls if warning messages for breaking changes are displayed or suppressed. When enabled, … - - Gets all the configs. - - - - - - -------------------------- Example 2 -------------------------- - Get-AzConfig -EnableDataCollection - -Key Value Applies To Scope Help Message ---- ----- ---------- ----- ------------ -EnableDataCollection False Az CurrentUser When enabled, Azure PowerShell cmdlets send telemetry data to Microsoft to improve the custom… - - Gets the "EnableDataCollection" config. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/get-azconfig - - - - - - Get-AzContext - Get - AzContext - - Gets the metadata used to authenticate Azure Resource Manager requests. - - - - The Get-AzContext cmdlet gets the current metadata used to authenticate Azure Resource Manager requests. This cmdlet gets the Active Directory account, Active Directory tenant, Azure subscription, and the targeted Azure environment. Azure Resource Manager cmdlets use these settings by default when making Azure Resource Manager requests. When the available amount of subscription exceeds the default limit of 25, some subscriptions may not show up in the results of `Get-AzContext -ListAvailable`. Please run `Connect-AzAccount -MaxContextPopulation <int>` to get more contexts. - - - - Get-AzContext - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ListAvailable - - List all available contexts in the current session. - - - System.Management.Automation.SwitchParameter - - - False - - - RefreshContextFromTokenCache - - Refresh contexts from token cache - - - System.Management.Automation.SwitchParameter - - - False - - - - Get-AzContext - - Name - - The name of the context - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - - - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ListAvailable - - List all available contexts in the current session. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Name - - The name of the context - - System.String - - System.String - - - None - - - RefreshContextFromTokenCache - - Refresh contexts from token cache - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - - - - - - - ------------ Example 1: Getting the current context ------------ - Connect-AzAccount -Get-AzContext - -Name Account SubscriptionName Environment TenantId ----- ------- ---------------- ----------- -------- -Subscription1 (xxxxxxxx-xxxx-xxxx-xxx... test@outlook.com Subscription1 AzureCloud xxxxxxxx-x... - - In this example we are logging into our account with an Azure subscription using Connect-AzAccount, and then we are getting the context of the current session by calling Get-AzContext. - - - - - - ---------- Example 2: Listing all available contexts ---------- - Get-AzContext -ListAvailable - -Name Account SubscriptionName Environment TenantId ----- ------- ---------------- ----------- -------- -Subscription1 (xxxxxxxx-xxxx-xxxx-xxx... test@outlook.com Subscription1 AzureCloud xxxxxxxx-x... -Subscription2 (xxxxxxxx-xxxx-xxxx-xxx... test@outlook.com Subscription2 AzureCloud xxxxxxxx-x... -Subscription3 (xxxxxxxx-xxxx-xxxx-xxx... test@outlook.com Subscription3 AzureCloud xxxxxxxx-x... - - In this example, all currently available contexts are displayed. The user may select one of these contexts using Select-AzContext. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/get-azcontext - - - Set-AzContext - - - - Connect-AzAccount - - - - - - - Get-AzContextAutosaveSetting - Get - AzContextAutosaveSetting - - Display metadata about the context autosave feature, including whether the context is automatically saved, and where saved context and credential information can be found. - - - - Display metadata about the context autosave feature, including whether the context is automatically saved, and where saved context and credential information can be found. - - - - Get-AzContextAutosaveSetting - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - - - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - - - - None - - - - - - - - - - Microsoft.Azure.Commands.Common.Authentication.ContextAutosaveSettings - - - - - - - - - - - - - - ------ Get context save metadata for the current session ------ - Get-AzContextAutosaveSetting - -Mode : Process -ContextDirectory : None -ContextFile : None -CacheDirectory : None -CacheFile : None -Settings : {} - - Get details about whether and where the context is saved. In the above example, the autosave feature has been disabled. - - - - - - -------- Get context save metadata for the current user -------- - Get-AzContextAutosaveSetting -Scope CurrentUser - -Mode : CurrentUser -ContextDirectory : C:\Users\contoso\AppData\Roaming\Windows Azure Powershell -ContextFile : AzureRmContext.json -CacheDirectory : C:\Users\contoso\AppData\Roaming\Windows Azure Powershell -CacheFile : TokenCache.dat -Settings : {} - - Get details about whether and where the context is saved by default for the current user. Note that this may be different than the settings that are active in the current session. In the above example, the autosave feature has been enabled, and data is saved to the default location. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/get-azcontextautosavesetting - - - - - - Get-AzDefault - Get - AzDefault - - Get the defaults set by the user in the current context. - - - - The Get-AzDefault cmdlet gets the Resource Group that the user has set as default in the current context. - - - - Get-AzDefault - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ResourceGroup - - Display Default Resource Group - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ResourceGroup - - Display Default Resource Group - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.Management.Automation.SwitchParameter - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSResourceGroup - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Get-AzDefault - -Id : /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup -Name : myResourceGroup -Properties : Microsoft.Azure.Management.Internal.Resources.Models.ResourceGroupProperties -Location : eastus -ManagedBy : -Tags : - - This command returns the current defaults if there are defaults set, or returns nothing if no default is set. - - - - - - -------------------------- Example 2 -------------------------- - Get-AzDefault -ResourceGroup - -Id : /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup -Name : myResourceGroup -Properties : Microsoft.Azure.Management.Internal.Resources.Models.ResourceGroupProperties -Location : eastus -ManagedBy : -Tags : - - This command returns the current default Resource Group if there is a default set, or returns nothing if no default is set. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/get-azdefault - - - - - - Get-AzEnvironment - Get - AzEnvironment - - Get endpoints and metadata for an instance of Azure services. - - - - The Get-AzEnvironment cmdlet gets endpoints and metadata for an instance of Azure services. - - - - Get-AzEnvironment - - Name - - Specifies the name of the Azure instance to get. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - - - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Name - - Specifies the name of the Azure instance to get. - - System.String - - System.String - - - None - - - - - - System.String - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment - - - - - - - - - - - - - - ---------- Example 1: Getting all Azure environments ---------- - Get-AzEnvironment - -Name Resource Manager Url ActiveDirectory Authority Type ----- -------------------- ------------------------- ---- -AzureUSGovernment https://management.usgovcloudapi.net/ https://login.microsoftonline.us/ Built-in -AzureCloud https://management.azure.com/ https://login.microsoftonline.com/ Built-in -AzureChinaCloud https://management.chinacloudapi.cn/ https://login.chinacloudapi.cn/ Built-in - - This example shows how to get the endpoints and metadata for the AzureCloud (default) environment. - - - - - - -------- Example 2: Getting the AzureCloud environment -------- - Get-AzEnvironment -Name AzureCloud - -Name Resource Manager Url ActiveDirectory Authority Type ----- -------------------- ------------------------- ---- -AzureCloud https://management.azure.com/ https://login.microsoftonline.com/ Built-in - - This example shows how to get the endpoints and metadata for the AzureCloud (default) environment. - - - - - - ------ Example 3: Getting the AzureChinaCloud environment ------ - Get-AzEnvironment -Name AzureChinaCloud | Format-List - -Name : AzureChinaCloud -Type : Built-in -EnableAdfsAuthentication : False -OnPremise : False -ActiveDirectoryServiceEndpointResourceId : https://management.core.chinacloudapi.cn/ -AdTenant : Common -GalleryUrl : https://gallery.azure.com/ -ManagementPortalUrl : https://go.microsoft.com/fwlink/?LinkId=301902 -ServiceManagementUrl : https://management.core.chinacloudapi.cn/ -PublishSettingsFileUrl : https://go.microsoft.com/fwlink/?LinkID=301776 -ResourceManagerUrl : https://management.chinacloudapi.cn/ -SqlDatabaseDnsSuffix : .database.chinacloudapi.cn -StorageEndpointSuffix : core.chinacloudapi.cn -ActiveDirectoryAuthority : https://login.chinacloudapi.cn/ -GraphUrl : https://graph.chinacloudapi.cn/ -GraphEndpointResourceId : https://graph.chinacloudapi.cn/ -TrafficManagerDnsSuffix : trafficmanager.cn -AzureKeyVaultDnsSuffix : vault.azure.cn -DataLakeEndpointResourceId : -AzureDataLakeStoreFileSystemEndpointSuffix : -AzureDataLakeAnalyticsCatalogAndJobEndpointSuffix : -AzureKeyVaultServiceEndpointResourceId : https://vault.azure.cn -ContainerRegistryEndpointSuffix : azurecr.cn -AzureOperationalInsightsEndpointResourceId : -AzureOperationalInsightsEndpoint : -AzureAnalysisServicesEndpointSuffix : asazure.chinacloudapi.cn -AnalysisServicesEndpointResourceId : https://region.asazure.chinacloudapi.cn -AzureAttestationServiceEndpointSuffix : -AzureAttestationServiceEndpointResourceId : -AzureSynapseAnalyticsEndpointSuffix : dev.azuresynapse.azure.cn -AzureSynapseAnalyticsEndpointResourceId : https://dev.azuresynapse.azure.cn - - This example shows how to get the endpoints and metadata for the AzureChinaCloud environment. - - - - - - ----- Example 4: Getting the AzureUSGovernment environment ----- - Get-AzEnvironment -Name AzureUSGovernment - -Name Resource Manager Url ActiveDirectory Authority Type ----- -------------------- ------------------------- ---- -AzureUSGovernment https://management.usgovcloudapi.net/ https://login.microsoftonline.us/ Built-in - - This example shows how to get the endpoints and metadata for the AzureUSGovernment environment. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/get-azenvironment - - - Add-AzEnvironment - - - - Remove-AzEnvironment - - - - Set-AzEnvironment - - - - - - - Get-AzSubscription - Get - AzSubscription - - Get subscriptions that the current account can access. - - - - The Get-AzSubscription cmdlet gets the subscription ID, subscription name, and home tenant for subscriptions that the current account can access. - - - - Get-AzSubscription - - AsJob - - Run cmdlet in the background and return a Job to track progress. - - - System.Management.Automation.SwitchParameter - - - False - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - SubscriptionId - - Specifies the ID of the subscription to get. - - System.String - - System.String - - - None - - - TenantId - - Specifies the ID of the tenant that contains subscriptions to get. - - System.String - - System.String - - - None - - - - Get-AzSubscription - - AsJob - - Run cmdlet in the background and return a Job to track progress. - - - System.Management.Automation.SwitchParameter - - - False - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - SubscriptionName - - Specifies the name of the subscription to get. - - System.String - - System.String - - - None - - - TenantId - - Specifies the ID of the tenant that contains subscriptions to get. - - System.String - - System.String - - - None - - - - - - AsJob - - Run cmdlet in the background and return a Job to track progress. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - SubscriptionId - - Specifies the ID of the subscription to get. - - System.String - - System.String - - - None - - - SubscriptionName - - Specifies the name of the subscription to get. - - System.String - - System.String - - - None - - - TenantId - - Specifies the ID of the tenant that contains subscriptions to get. - - System.String - - System.String - - - None - - - - - - System.String - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - - - - - - - - - - - - - ------- Example 1: Get all subscriptions in all tenants ------- - Get-AzSubscription - -Name Id TenantId State ----- -- -------- ----- -Subscription1 yyyy-yyyy-yyyy-yyyy aaaa-aaaa-aaaa-aaaa Enabled -Subscription2 xxxx-xxxx-xxxx-xxxx aaaa-aaaa-aaaa-aaaa Enabled -Subscription3 zzzz-zzzz-zzzz-zzzz bbbb-bbbb-bbbb-bbbb Enabled - - This command gets all subscriptions in all tenants that are authorized for the current account. - - - - - - ---- Example 2: Get all subscriptions for a specific tenant ---- - Get-AzSubscription -TenantId "aaaa-aaaa-aaaa-aaaa" - -Name Id TenantId State ----- -- -------- ----- -Subscription1 yyyy-yyyy-yyyy-yyyy aaaa-aaaa-aaaa-aaaa Enabled -Subscription2 xxxx-xxxx-xxxx-xxxx aaaa-aaaa-aaaa-aaaa Enabled - - List all subscriptions in the given tenant that are authorized for the current account. - - - - - - ---- Example 3: Get all subscriptions in the current tenant ---- - Get-AzSubscription -TenantId (Get-AzContext).Tenant - -Name Id TenantId State ----- -- -------- ----- -Subscription1 yyyy-yyyy-yyyy-yyyy aaaa-aaaa-aaaa-aaaa Enabled -Subscription2 xxxx-xxxx-xxxx-xxxx aaaa-aaaa-aaaa-aaaa Enabled - - This command gets all subscriptions in the current tenant that are authorized for the current user. - - - - - - Example 4: Change the current context to use a specific subscription - Get-AzSubscription -SubscriptionId "xxxx-xxxx-xxxx-xxxx" -TenantId "yyyy-yyyy-yyyy-yyyy" | Set-AzContext - -Name Account SubscriptionName Environment TenantId ----- ------- ---------------- ----------- -------- -Subscription1 (xxxx-xxxx-xxxx-xxxx) azureuser@micros... Subscription1 AzureCloud yyyy-yyyy-yyyy-yyyy - - This command gets the specified subscription, and then sets the current context to use it. All subsequent cmdlets in this session use the new subscription (Contoso Subscription 1) by default. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/get-azsubscription - - - - - - Get-AzTenant - Get - AzTenant - - Gets tenants that are authorized for the current user. - - - - The Get-AzTenant cmdlet gets tenants authorized for the current user. - - - - Get-AzTenant - - TenantId - - Specifies the ID of the tenant that this cmdlet gets. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - TenantId - - Specifies the ID of the tenant that this cmdlet gets. - - System.String - - System.String - - - None - - - - - - System.String - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - - - - - - - - - - - - - ---------------- Example 1: Getting all tenants ---------------- - Connect-AzAccount -Get-AzTenant - -Id Name Category Domains --- ----------- -------- ------- -xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx Microsoft Home {test0.com, test1.com, test2.microsoft.com, test3.microsoft.com...} -yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyyyyyyy Testhost Home testhost.onmicrosoft.com - - This example shows how to get all of the authorized tenants of an Azure account. - - - - - - ------------- Example 2: Getting a specific tenant ------------- - Connect-AzAccount -Get-AzTenant -TenantId xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx - -Id Name Category Domains --- ----------- -------- ------- -xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx Microsoft Home {test0.com, test1.com, test2.microsoft.com, test3.microsoft.com...} - - This example shows how to get a specific authorized tenant of an Azure account. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/get-aztenant - - - - - - Import-AzConfig - Import - AzConfig - - Imports configs from a file that was previously exported by `Export-AzConfig`. - - - - The `Import-AzConfig` cmdlet imports all the configs from a file that was previously exported by `Export-AzConfig`. The imported configs will be set at the "CurrentUser" scope, so they are consistent across PowerShell sessions. - During importing, if a config that is to be imported has already been set, its value will be overwritten. - - - - Import-AzConfig - - Path - - Specifies the path to configuration saved by using Export-AzConfig. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - PassThru - - Returns a boolean value indicating success or failure. - - - System.Management.Automation.SwitchParameter - - - False - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - PassThru - - Returns a boolean value indicating success or failure. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Path - - Specifies the path to configuration saved by using Export-AzConfig. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.Boolean - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Import-AzConfig -Path ./config.json - - This example imports configs from file `./config.json`. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/import-azconfig - - - Export-AzConfig - - - - - - - Import-AzContext - Import - AzContext - - Loads Azure authentication information from a file. - - - - The Import-AzContext cmdlet loads authentication information from a file to set the Azure environment and context. Cmdlets that you run in the current session use this information to authenticate requests to Azure Resource Manager. - - - - Import-AzContext - - AzureContext - - {{Fill AzureContext Description}} - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - - None - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Import-AzContext - - Path - - Specifies the path to context information saved by using Save-AzContext. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - AzureContext - - {{Fill AzureContext Description}} - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - - None - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Path - - Specifies the path to context information saved by using Save-AzContext. - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - - - - - - - System.String - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile - - - - - - - - - - - - - - ----- Example 1: Importing a context from a AzureRmProfile ----- - Import-AzContext -AzContext (Connect-AzAccount) - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -azureuser@contoso.com Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud - - This example imports a context from a PSAzureProfile that is passed through to the cmdlet. - - - - - - ------- Example 2: Importing a context from a JSON file ------- - Import-AzContext -Path C:\test.json - -Account SubscriptionName TenantId Environment -------- ---------------- -------- ----------- -azureuser@contoso.com Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud - - This example selects a context from a JSON file that is passed through to the cmdlet. This JSON file can be created from Save-AzContext. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/import-azcontext - - - - - - Invoke-AzRestMethod - Invoke - AzRestMethod - - Construct and perform HTTP request to Azure resource management endpoint only - - - - Construct and perform HTTP request to Azure resource management endpoint only - - - - Invoke-AzRestMethod - - ApiVersion - - Api Version - - System.String - - System.String - - - None - - - AsJob - - Run cmdlet in the background - - - System.Management.Automation.SwitchParameter - - - False - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Method - - Http Method - - - GET - POST - PUT - PATCH - DELETE - - System.String - - System.String - - - None - - - Name - - list of Target Resource Name - - System.String[] - - System.String[] - - - None - - - Payload - - JSON format payload - - System.String - - System.String - - - None - - - ResourceGroupName - - Target Resource Group Name - - System.String - - System.String - - - None - - - ResourceProviderName - - Target Resource Provider Name - - System.String - - System.String - - - None - - - ResourceType - - List of Target Resource Type - - System.String[] - - System.String[] - - - None - - - SubscriptionId - - Target Subscription Id - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Invoke-AzRestMethod - - AsJob - - Run cmdlet in the background - - - System.Management.Automation.SwitchParameter - - - False - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Method - - Http Method - - - GET - POST - PUT - PATCH - DELETE - - System.String - - System.String - - - None - - - Path - - Path of target resource URL. Hostname of Resource Manager should not be added. - - System.String - - System.String - - - None - - - Payload - - JSON format payload - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Invoke-AzRestMethod - - Uri - - Uniform Resource Identifier of the Azure resources. The target resource needs to support Azure AD authentication and the access token is derived according to resource id. If resource id is not set, its value is derived according to built-in service suffixes in current Azure Environment. - - System.Uri - - System.Uri - - - None - - - AsJob - - Run cmdlet in the background - - - System.Management.Automation.SwitchParameter - - - False - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Method - - Http Method - - - GET - POST - PUT - PATCH - DELETE - - System.String - - System.String - - - None - - - Payload - - JSON format payload - - System.String - - System.String - - - None - - - ResourceId - - Identifier URI specified by the REST API you are calling. It shouldn't be the resource id of Azure Resource Manager. - - System.Uri - - System.Uri - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - ApiVersion - - Api Version - - System.String - - System.String - - - None - - - AsJob - - Run cmdlet in the background - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Method - - Http Method - - System.String - - System.String - - - None - - - Name - - list of Target Resource Name - - System.String[] - - System.String[] - - - None - - - Path - - Path of target resource URL. Hostname of Resource Manager should not be added. - - System.String - - System.String - - - None - - - Payload - - JSON format payload - - System.String - - System.String - - - None - - - ResourceGroupName - - Target Resource Group Name - - System.String - - System.String - - - None - - - ResourceId - - Identifier URI specified by the REST API you are calling. It shouldn't be the resource id of Azure Resource Manager. - - System.Uri - - System.Uri - - - None - - - ResourceProviderName - - Target Resource Provider Name - - System.String - - System.String - - - None - - - ResourceType - - List of Target Resource Type - - System.String[] - - System.String[] - - - None - - - SubscriptionId - - Target Subscription Id - - System.String - - System.String - - - None - - - Uri - - Uniform Resource Identifier of the Azure resources. The target resource needs to support Azure AD authentication and the access token is derived according to resource id. If resource id is not set, its value is derived according to built-in service suffixes in current Azure Environment. - - System.Uri - - System.Uri - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.string - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSHttpResponse - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Invoke-AzRestMethod -Path "/subscriptions/{subscription}/resourcegroups/{resourcegroup}/providers/microsoft.operationalinsights/workspaces/{workspace}?api-version={API}" -Method GET - -Headers : {[Cache-Control, System.String[]], [Pragma, System.String[]], [x-ms-request-id, System.String[]], [Strict-Transport-Security, System.String[]]…} -Version : 1.1 -StatusCode : 200 -Method : GET -Content : { - "properties": { - "source": "Azure", - "customerId": "{customerId}", - "provisioningState": "Succeeded", - "sku": { - "name": "pergb2018", - "maxCapacityReservationLevel": 3000, - "lastSkuUpdate": "Mon, 25 May 2020 11:10:01 GMT" - }, - "retentionInDays": 30, - "features": { - "legacy": 0, - "searchVersion": 1, - "enableLogAccessUsingOnlyResourcePermissions": true - }, - "workspaceCapping": { - "dailyQuotaGb": -1.0, - "quotaNextResetTime": "Thu, 18 Jun 2020 05:00:00 GMT", - "dataIngestionStatus": "RespectQuota" - }, - "enableFailover": false, - "publicNetworkAccessForIngestion": "Enabled", - "publicNetworkAccessForQuery": "Enabled", - "createdDate": "Mon, 25 May 2020 11:10:01 GMT", - "modifiedDate": "Mon, 25 May 2020 11:10:02 GMT" - }, - "id": "/subscriptions/{subscription}/resourcegroups/{resourcegroup}/providers/microsoft.operationalinsights/workspaces/{workspace}", - "name": "{workspace}", - "type": "Microsoft.OperationalInsights/workspaces", - "location": "eastasia", - "tags": {} - } - - Get log analytics workspace by path. It only supports management plane API and Hostname of Azure Resource Manager is added according to Azure environment setting. - - - - - - - -------------------------- Example 2 -------------------------- - Invoke-AzRestMethod https://graph.microsoft.com/v1.0/me - -Headers : {[Date, System.String[]], [Cache-Control, System.String[]], [Transfer-Encoding, System.String[]], [Strict-Transport-Security, System.String[]]…} -Version : 1.1 -StatusCode : 200 -Method : GET -Content : {"@odata.context":"https://graph.microsoft.com/v1.0/$metadata#users/$entity","businessPhones":["......} - - Get current signed in user via MicrosoftGraph API. This example is equivalent to `Get-AzADUser -SignedIn`. - - - - - - -------------------------- Example 3 -------------------------- - $subscriptionId = (Get-AzContext).Subscription.ID -Invoke-AzRestMethod -SubscriptionId $subscriptionId -ResourceGroupName "test-group" -ResourceProviderName Microsoft.AppPlatform -ResourceType Spring,apps -Name "test-spring-service" -ApiVersion 2020-07-01 -Method GET - -Headers : {[Cache-Control, System.String[]], [Pragma, System.String[]], [Vary, System.String[]], [x-ms-request-id, - System.String[]]…} -Version : 1.1 -StatusCode : 200 -Method : GET -Content : {"value":[{"properties":{"public":true,"url":"https://test-spring-service-demo.azuremicroservices.io","provisioni - ngState":"Succeeded","activeDeploymentName":"default","fqdn":"test-spring-service.azuremicroservices.io","httpsOn - ly":false,"createdTime":"2022-06-22T02:57:13.272Z","temporaryDisk":{"sizeInGB":5,"mountPath":"/tmp"},"pers - istentDisk":{"sizeInGB":0,"mountPath":"/persistent"}},"type":"Microsoft.AppPlatform/Spring/apps","identity - ":null,"location":"eastus","id":"/subscriptions/$subscriptionId/resourceGroups/test-group/providers/Microsoft.AppPlatform/Spring/test-spring-service/apps/demo","name":"demo"},{"properties":{"publ - ic":false,"provisioningState":"Succeeded","activeDeploymentName":"deploy01","fqdn":"test-spring-service.azuremicr - oservices.io","httpsOnly":false,"createdTime":"2022-06-22T07:46:54.9Z","temporaryDisk":{"sizeInGB":5,"moun - tPath":"/tmp"},"persistentDisk":{"sizeInGB":0,"mountPath":"/persistent"}},"type":"Microsoft.AppPlatform/Sp - ring/apps","identity":null,"location":"eastus","id":"/subscriptions/$subscriptionId/r - esourceGroups/test-group/providers/Microsoft.AppPlatform/Spring/test-spring-service/apps/pwsh01","name":"pwsh0 - 1"}]} - - List apps under spring service "test-spring-service" - - - - - - -------------------------- Example 4 -------------------------- - $subscriptionId = (Get-AzContext).Subscription.ID -Invoke-AzRestMethod -SubscriptionId $subscriptionId -ResourceGroupName "test-group" -ResourceProviderName Microsoft.AppPlatform -ResourceType Spring -Name "test-spring-service","demo" -ApiVersion 2020-07-01 -Method GET - -Headers : {[Cache-Control, System.String[]], [Pragma, System.String[]], [Vary, System.String[]], [x-ms-request-id, - System.String[]]…} -Version : 1.1 -StatusCode : 200 -Method : GET -Content : {"properties":{"public":true,"url":"https://test-spring-service-demo.azuremicroservices.io","provisioningState":" - Succeeded","activeDeploymentName":"default","fqdn":"test-spring-service.azuremicroservices.io","httpsOnly":false, - "createdTime":"2022-06-22T02:57:13.272Z","temporaryDisk":{"sizeInGB":5,"mountPath":"/tmp"},"persistentDisk - ":{"sizeInGB":0,"mountPath":"/persistent"}},"type":"Microsoft.AppPlatform/Spring/apps","identity":null,"lo - cation":"eastus","id":"/subscriptions/$subscriptionId/resourceGroups/test-group/pr - oviders/Microsoft.AppPlatform/Spring/test-spring-service/apps/demo","name":"demo"} - - Get app "demo" under Spring cloud service "test-spring-service" - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/invoke-azrestmethod - - - - - - Open-AzSurveyLink - Open - AzSurveyLink - - Open survey link in default browser. - - - - Open survey link in default browser. - - - - Open-AzSurveyLink - - - - - - - None - - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Open-AzSurveyLink - -Opening the default browser to https://aka.ms/azpssurvey?Q_CHL=INTERCEPT - - - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/open-azsurveylink - - - - - - Register-AzModule - Register - AzModule - - FOR INTERNAL USE ONLY - Provide Runtime Support for AutoRest Generated cmdlets - - - - FOR INTERNAL USE ONLY - Provide Runtime Support for AutoRest Generated cmdlets - - - - Register-AzModule - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.Object - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Register-AzModule - - Used Internally by AutoRest-generated cmdlets - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/register-azmodule - - - - - - Remove-AzContext - Remove - AzContext - - Remove a context from the set of available contexts - - - - Remove an azure context from the set of contexts - - - - Remove-AzContext - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Remove context even if it is the default - - - System.Management.Automation.SwitchParameter - - - False - - - InputObject - - A context object, normally passed through the pipeline. - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - PassThru - - Return the removed context - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Remove-AzContext - - Name - - The name of the context - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Remove context even if it is the default - - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - Return the removed context - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Remove context even if it is the default - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - InputObject - - A context object, normally passed through the pipeline. - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - Name - - The name of the context - - System.String - - System.String - - - None - - - PassThru - - Return the removed context - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Remove-AzContext -Name Default - - Remove the context named default - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/remove-azcontext - - - - - - Remove-AzEnvironment - Remove - AzEnvironment - - Removes endpoints and metadata for connecting to a given Azure instance. - - - - The Remove-AzEnvironment cmdlet removes endpoints and metadata information for connecting to a given Azure instance. - - - - Remove-AzEnvironment - - Name - - Specifies the name of the environment to remove. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Name - - Specifies the name of the environment to remove. - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.String - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment - - - - - - - - - - - - - - ----- Example 1: Creating and removing a test environment ----- - Add-AzEnvironment -Name TestEnvironment ` - -ActiveDirectoryEndpoint TestADEndpoint ` - -ActiveDirectoryServiceEndpointResourceId TestADApplicationId ` - -ResourceManagerEndpoint TestRMEndpoint ` - -GalleryEndpoint TestGalleryEndpoint ` - -GraphEndpoint TestGraphEndpoint - -Name Resource Manager Url ActiveDirectory Authority ----- -------------------- ------------------------- -TestEnvironment TestRMEndpoint TestADEndpoint/ - -Remove-AzEnvironment -Name TestEnvironment - -Name Resource Manager Url ActiveDirectory Authority ----- -------------------- ------------------------- -TestEnvironment TestRMEndpoint TestADEndpoint/ - - This example shows how to create an environment using Add-AzEnvironment, and then how to delete the environment using Remove-AzEnvironment. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/remove-azenvironment - - - Add-AzEnvironment - - - - Get-AzEnvironment - - - - Set-AzEnvironment - - - - - - - Rename-AzContext - Rename - AzContext - - Rename an Azure context. By default contexts are named by user account and subscription. - - - - Rename an Azure context. By default contexts are named by user account and subscription. - - - - Rename-AzContext - - TargetName - - The new name of the context - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Rename the context even if the target context already exists - - - System.Management.Automation.SwitchParameter - - - False - - - InputObject - - A context object, normally passed through the pipeline. - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - PassThru - - Return the renamed context. - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Rename-AzContext - - SourceName - - The name of the context - - System.String - - System.String - - - None - - - TargetName - - The new name of the context - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Rename the context even if the target context already exists - - - System.Management.Automation.SwitchParameter - - - False - - - PassThru - - Return the renamed context. - - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Rename the context even if the target context already exists - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - InputObject - - A context object, normally passed through the pipeline. - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - PassThru - - Return the renamed context. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - SourceName - - The name of the context - - System.String - - System.String - - - None - - - TargetName - - The new name of the context - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - - - - - - - ------ Example 1: Rename a context using named parameters ------ - Rename-AzContext -SourceName "[user1@contoso.org; 12345-6789-2345-3567890]" -TargetName "Work" - - Rename the context for 'user1@contoso.org' with subscription '12345-6789-2345-3567890' to 'Work'. After this command, you will be able to target the context using 'Select-AzContext Work'. Note that you can tab through the values for 'SourceName' using tab completion. - - - - - - --- Example 2: Rename a context using positional parameters --- - Rename-AzContext "My context" "Work" - - Rename the context named "My context" to "Work". After this command, you will be able to target the context using Select-AzContext Work - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/rename-azcontext - - - - - - Resolve-AzError - Resolve - AzError - - Display detailed information about PowerShell errors, with extended details for Azure PowerShell errors. - - - - Resolves and displays detailed information about errors in the current PowerShell session, including where the error occurred in script, stack trace, and all inner and aggregate exceptions. For Azure PowerShell errors provides additional detail in debugging service issues, including complete detail about the request and server response that caused the error. - - - - Resolve-AzError - - Error - - One or more error records to resolve. If no parameters are specified, all errors in the session are resolved. - - System.Management.Automation.ErrorRecord[] - - System.Management.Automation.ErrorRecord[] - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - - Resolve-AzError - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Last - - Resolve only the last error that occurred in the session. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Error - - One or more error records to resolve. If no parameters are specified, all errors in the session are resolved. - - System.Management.Automation.ErrorRecord[] - - System.Management.Automation.ErrorRecord[] - - - None - - - Last - - Resolve only the last error that occurred in the session. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.Management.Automation.ErrorRecord[] - - - - - - - - - - Microsoft.Azure.Commands.Profile.Errors.AzureErrorRecord - - - - - - - - Microsoft.Azure.Commands.Profile.Errors.AzureExceptionRecord - - - - - - - - Microsoft.Azure.Commands.Profile.Errors.AzureRestExceptionRecord - - - - - - - - - - - - - - -------------- Example 1: Resolve the Last Error -------------- - Resolve-AzError -Last - -HistoryId: 3 - - -Message : Run Connect-AzAccount to login. -StackTrace : at Microsoft.Azure.Commands.ResourceManager.Common.AzureRMCmdlet.get_DefaultContext() in AzureRmCmdlet.cs:line 85 - at Microsoft.Azure.Commands.ResourceManager.Common.AzureRMCmdlet.LogCmdletStartInvocationInfo() in AzureRmCmdlet.cs:line 269 - at Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet.BeginProcessing() inAzurePSCmdlet.cs:line 299 - at Microsoft.Azure.Commands.ResourceManager.Common.AzureRMCmdlet.BeginProcessing() in AzureRmCmdlet.cs:line 320 - at Microsoft.Azure.Commands.Profile.GetAzureRMSubscriptionCommand.BeginProcessing() in GetAzureRMSubscription.cs:line 49 - at System.Management.Automation.Cmdlet.DoBeginProcessing() - at System.Management.Automation.CommandProcessorBase.DoBegin() -Exception : System.Management.Automation.PSInvalidOperationException -InvocationInfo : {Get-AzSubscription} -Line : Get-AzSubscription -Position : At line:1 char:1 - + Get-AzSubscription - + ~~~~~~~~~~~~~~~~~~~~~~~ -HistoryId : 3 - - Get details of the last error. - - - - - - --------- Example 2: Resolve all Errors in the Session --------- - Resolve-AzError - -HistoryId: 8 - - -RequestId : b61309e8-09c9-4f0d-ba56-08a6b28c731d -Message : Resource group 'contoso' could not be found. -ServerMessage : ResourceGroupNotFound: Resource group 'contoso' could not be found. - (System.Collections.Generic.List`1[Microsoft.Rest.Azure.CloudError]) -ServerResponse : {NotFound} -RequestMessage : {GET https://management.azure.com/subscriptions/00977cdb-163f-435f-9c32-39ec8ae61f4d/resourceGroups/co - ntoso/providers/Microsoft.Storage/storageAccounts/contoso?api-version=2016-12-01} -InvocationInfo : {Get-AzStorageAccount} -Line : Get-AzStorageAccount -ResourceGroupName contoso -Name contoso -Position : At line:1 char:1 - + Get-AzStorageAccount -ResourceGroupName contoso -Name contoso - + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -StackTrace : at Microsoft.Azure.Management.Storage.StorageAccountsOperations.<GetPropertiesWithHttpMessagesAsync - >d__8.MoveNext() - --- End of stack trace from previous location where exception was thrown --- - at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() - at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) - at Microsoft.Azure.Management.Storage.StorageAccountsOperationsExtensions.<GetPropertiesAsync>d__7. - MoveNext() - --- End of stack trace from previous location where exception was thrown --- - at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() - at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) - at Microsoft.Azure.Management.Storage.StorageAccountsOperationsExtensions.GetProperties(IStorageAcc - ountsOperations operations, String resourceGroupName, String accountName) - at Microsoft.Azure.Commands.Management.Storage.GetAzureStorageAccountCommand.ExecuteCmdlet() in C:\ - zd\azure-powershell\src\ResourceManager\Storage\Commands.Management.Storage\StorageAccount\GetAzureSto - rageAccount.cs:line 70 - at Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet.ProcessRecord() in - C:\zd\azure-powershell\src\Common\Commands.Common\AzurePSCmdlet.cs:line 642 -HistoryId : 8 - - - HistoryId: 5 - - -Message : Run Connect-AzAccount to login. -StackTrace : at Microsoft.Azure.Commands.ResourceManager.Common.AzureRMCmdlet.get_DefaultContext() in C:\zd\azur - e-powershell\src\ResourceManager\Common\Commands.ResourceManager.Common\AzureRmCmdlet.cs:line 85 - at Microsoft.Azure.Commands.ResourceManager.Common.AzureRMCmdlet.LogCmdletStartInvocationInfo() in - C:\zd\azure-powershell\src\ResourceManager\Common\Commands.ResourceManager.Common\AzureRmCmdlet.cs:lin - e 269 - at Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet.BeginProcessing() in - C:\zd\azure-powershell\src\Common\Commands.Common\AzurePSCmdlet.cs:line 299 - at Microsoft.Azure.Commands.ResourceManager.Common.AzureRMCmdlet.BeginProcessing() in C:\zd\azure-p - owershell\src\ResourceManager\Common\Commands.ResourceManager.Common\AzureRmCmdlet.cs:line 320 - at Microsoft.Azure.Commands.Profile.GetAzureRMSubscriptionCommand.BeginProcessing() in C:\zd\azure- - powershell\src\ResourceManager\Profile\Commands.Profile\Subscription\GetAzureRMSubscription.cs:line 49 - at System.Management.Automation.Cmdlet.DoBeginProcessing() - at System.Management.Automation.CommandProcessorBase.DoBegin() -Exception : System.Management.Automation.PSInvalidOperationException -InvocationInfo : {Get-AzSubscription} -Line : Get-AzSubscription -Position : At line:1 char:1 - + Get-AzSubscription - + ~~~~~~~~~~~~~~~~~~~~~~~ -HistoryId : 5 - - Get details of all errors that have occurred in the current session. - - - - - - ------------- Example 3: Resolve a Specific Error ------------- - Resolve-AzError $Error[0] - -HistoryId: 8 - - -RequestId : b61309e8-09c9-4f0d-ba56-08a6b28c731d -Message : Resource group 'contoso' could not be found. -ServerMessage : ResourceGroupNotFound: Resource group 'contoso' could not be found. - (System.Collections.Generic.List`1[Microsoft.Rest.Azure.CloudError]) -ServerResponse : {NotFound} -RequestMessage : {GET https://management.azure.com/subscriptions/00977cdb-163f-435f-9c32-39ec8ae61f4d/resourceGroups/co - ntoso/providers/Microsoft.Storage/storageAccounts/contoso?api-version=2016-12-01} -InvocationInfo : {Get-AzStorageAccount} -Line : Get-AzStorageAccount -ResourceGroupName contoso -Name contoso -Position : At line:1 char:1 - + Get-AzStorageAccount -ResourceGroupName contoso -Name contoso - + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -StackTrace : at Microsoft.Azure.Management.Storage.StorageAccountsOperations.<GetPropertiesWithHttpMessagesAsync - >d__8.MoveNext() - --- End of stack trace from previous location where exception was thrown --- - at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() - at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) - at Microsoft.Azure.Management.Storage.StorageAccountsOperationsExtensions.<GetPropertiesAsync>d__7. - MoveNext() - --- End of stack trace from previous location where exception was thrown --- - at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw() - at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) - at Microsoft.Azure.Management.Storage.StorageAccountsOperationsExtensions.GetProperties(IStorageAcc - ountsOperations operations, String resourceGroupName, String accountName) - at Microsoft.Azure.Commands.Management.Storage.GetAzureStorageAccountCommand.ExecuteCmdlet() in C:\ - zd\azure-powershell\src\ResourceManager\Storage\Commands.Management.Storage\StorageAccount\GetAzureSto - rageAccount.cs:line 70 - at Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet.ProcessRecord() in - C:\zd\azure-powershell\src\Common\Commands.Common\AzurePSCmdlet.cs:line 642 -HistoryId : 8 - - Get details of the specified error. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/resolve-azerror - - - - - - Save-AzContext - Save - AzContext - - Saves the current authentication information for use in other PowerShell sessions. - - - - The Save-AzContext cmdlet saves the current authentication information for use in other PowerShell sessions. - - - - Save-AzContext - - Profile - - Specifies the Azure context from which this cmdlet reads. If you do not specify a context, this cmdlet reads from the local default context. - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - - None - - - Path - - Specifies the path of the file to which to save authentication information. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Overwrite the given file if it exists - - - System.Management.Automation.SwitchParameter - - - False - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Overwrite the given file if it exists - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Path - - Specifies the path of the file to which to save authentication information. - - System.String - - System.String - - - None - - - Profile - - Specifies the Azure context from which this cmdlet reads. If you do not specify a context, this cmdlet reads from the local default context. - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - Microsoft.Azure.Commands.Common.Authentication.Models.AzureRmProfile - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile - - - - - - - - - - - - - - ------- Example 1: Saving the current session's context ------- - Connect-AzAccount -Save-AzContext -Path C:\test.json - - This example saves the current session's Azure context to the JSON file provided. - - - - - - -------------- Example 2: Saving a given context -------------- - Save-AzContext -Profile (Connect-AzAccount) -Path C:\test.json - - This example saves the Azure context that is passed through to the cmdlet to the JSON file provided. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/save-azcontext - - - - - - Select-AzContext - Select - AzContext - - Select a subscription and account to target in Azure PowerShell cmdlets - - - - Select a subscription to target (or account or tenant) in Azure PowerShell cmdlets. After this cmdlet, future cmdlets will target the selected context. - - - - Select-AzContext - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - InputObject - - A context object, normally passed through the pipeline. - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Select-AzContext - - Name - - The name of the context - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, tenant and subscription used for communication with azure - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - InputObject - - A context object, normally passed through the pipeline. - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - Name - - The name of the context - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - - - - - - - -------------- Example 1: Target a named context -------------- - Select-AzContext "Work" - -Name Account SubscriptionName Environment TenantId ----- ------- ---------------- ----------- -------- -Work test@outlook.com Subscription1 AzureCloud xxxxxxxx-x... - - Target future Azure PowerShell cmdlets at the account, tenant, and subscription in the 'Work' context. - - - - - - -------------------------- Example 2 -------------------------- - Select-AzContext -Name TestEnvironment -Scope Process - - - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/select-azcontext - - - - - - Send-Feedback - Send - Feedback - - Sends feedback to the Azure PowerShell team via a set of guided prompts. - - - - The Send-Feedback cmdlet sends feedback to the Azure PowerShell team. - - - - Send-Feedback - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - - - - None - - - - - - - - - - System.Void - - - - - - - - - - - - - - -------------------------- Example 1: -------------------------- - Send-Feedback - -With zero (0) being the least and ten (10) being the most, how likely are you to recommend Azure PowerShell to a friend or colleague? - -10 - -What does Azure PowerShell do well? - -Response. - -Upon what could Azure PowerShell improve? - -Response. - -Please enter your email if you are interested in providing follow up information: - -your@email.com - - - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/send-feedback - - - - - - Set-AzContext - Set - AzContext - - Sets the tenant, subscription, and environment for cmdlets to use in the current session. - - - - The Set-AzContext cmdlet sets authentication information for cmdlets that you run in the current session. The context includes tenant, subscription, and environment information. - - - - Set-AzContext - - Context - - Specifies the context for the current session. - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ExtendedProperty - - Additional context properties - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - - None - - - Force - - Overwrite the existing context with the same name, if any. - - - System.Management.Automation.SwitchParameter - - - False - - - Name - - Name of the context - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Set-AzContext - - Subscription - - The name or id of the subscription that the context should be set to. This parameter has aliases to -SubscriptionName and -SubscriptionId, so, for clarity, either of these can be used instead of -Subscription when specifying name and id, respectively. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ExtendedProperty - - Additional context properties - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - - None - - - Force - - Overwrite the existing context with the same name, if any. - - - System.Management.Automation.SwitchParameter - - - False - - - Name - - Name of the context - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Tenant - - Tenant domain name or ID - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Set-AzContext - - SubscriptionObject - - A subscription object - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - - None - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ExtendedProperty - - Additional context properties - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - - None - - - Force - - Overwrite the existing context with the same name, if any. - - - System.Management.Automation.SwitchParameter - - - False - - - Name - - Name of the context - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Set-AzContext - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ExtendedProperty - - Additional context properties - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - - None - - - Force - - Overwrite the existing context with the same name, if any. - - - System.Management.Automation.SwitchParameter - - - False - - - Name - - Name of the context - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Tenant - - Tenant domain name or ID - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Set-AzContext - - TenantObject - - A Tenant Object - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - - None - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ExtendedProperty - - Additional context properties - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - - None - - - Force - - Overwrite the existing context with the same name, if any. - - - System.Management.Automation.SwitchParameter - - - False - - - Name - - Name of the context - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - Context - - Specifies the context for the current session. - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - None - - - DefaultProfile - - The credentials, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - ExtendedProperty - - Additional context properties - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - System.Collections.Generic.IDictionary`2[System.String,System.String] - - - None - - - Force - - Overwrite the existing context with the same name, if any. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Name - - Name of the context - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Subscription - - The name or id of the subscription that the context should be set to. This parameter has aliases to -SubscriptionName and -SubscriptionId, so, for clarity, either of these can be used instead of -Subscription when specifying name and id, respectively. - - System.String - - System.String - - - None - - - SubscriptionObject - - A subscription object - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - - None - - - Tenant - - Tenant domain name or ID - - System.String - - System.String - - - None - - - TenantObject - - A Tenant Object - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - - - - - - - - - - ----------- Example 1: Set the subscription context ----------- - Set-AzContext -Subscription "xxxx-xxxx-xxxx-xxxx" - -Name Account SubscriptionName Environment TenantId ----- ------- ---------------- ----------- -------- -Work test@outlook.com Subscription1 AzureCloud xxxxxxxx-x... - - This command sets the context to use the specified subscription. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/set-azcontext - - - Get-AzContext - - - - - - - Set-AzDefault - Set - AzDefault - - Sets a default in the current context - - - - The Set-AzDefault cmdlet adds or changes the defaults in the current context. - - - - Set-AzDefault - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Create a new resource group if specified default does not exist - - - System.Management.Automation.SwitchParameter - - - False - - - ResourceGroupName - - Name of the resource group being set as default - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Force - - Create a new resource group if specified default does not exist - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - ResourceGroupName - - Name of the resource group being set as default - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.String - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSResourceGroup - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Set-AzDefault -ResourceGroupName myResourceGroup - -Id : /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup -Name : myResourceGroup -Properties : Microsoft.Azure.Management.Internal.Resources.Models.ResourceGroupProperties -Location : eastus -ManagedBy : -Tags : - - This command sets the default resource group to the resource group specified by the user. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/set-azdefault - - - - - - Set-AzEnvironment - Set - AzEnvironment - - Sets properties for an Azure environment. - - - - The Set-AzEnvironment cmdlet sets endpoints and metadata for connecting to an instance of Azure. - - - - Set-AzEnvironment - - Name - - Specifies the name of the environment to modify. - - System.String - - System.String - - - None - - - PublishSettingsFileUrl - - Specifies the URL from which .publishsettings files can be downloaded. - - System.String - - System.String - - - None - - - AzureKeyVaultDnsSuffix - - Dns suffix of Azure Key Vault service. Example is vault-int.azure-int.net - - System.String - - System.String - - - None - - - AzureKeyVaultServiceEndpointResourceId - - Resource identifier of Azure Key Vault data service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - TrafficManagerDnsSuffix - - Specifies the domain-name suffix for Azure Traffic Manager services. - - System.String - - System.String - - - None - - - SqlDatabaseDnsSuffix - - Specifies the domain-name suffix for Azure SQL Database servers. - - System.String - - System.String - - - None - - - AzureDataLakeStoreFileSystemEndpointSuffix - - Dns Suffix of Azure Data Lake Store FileSystem. Example: azuredatalake.net - - System.String - - System.String - - - None - - - AzureDataLakeAnalyticsCatalogAndJobEndpointSuffix - - Dns Suffix of Azure Data Lake Analytics job and catalog services - - System.String - - System.String - - - None - - - EnableAdfsAuthentication - - Indicates that Active Directory Federation Services (ADFS) on-premise authentication is allowed. - - - System.Management.Automation.SwitchParameter - - - False - - - AdTenant - - Specifies the default Active Directory tenant. - - System.String - - System.String - - - None - - - GraphAudience - - The audience for tokens authenticating with the AD Graph Endpoint. - - System.String - - System.String - - - None - - - DataLakeAudience - - The audience for tokens authenticating with the AD Data Lake services Endpoint. - - System.String - - System.String - - - None - - - ServiceEndpoint - - Specifies the endpoint for Service Management (RDFE) requests. - - System.String - - System.String - - - None - - - BatchEndpointResourceId - - The resource identifier of the Azure Batch service that is the recipient of the requested token - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpointResourceId - - The audience for tokens authenticating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpoint - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - ManagementPortalUrl - - Specifies the URL for the Management Portal. - - System.String - - System.String - - - None - - - StorageEndpoint - - Specifies the endpoint for storage (blob, table, queue, and file) access. - - System.String - - System.String - - - None - - - ActiveDirectoryEndpoint - - Specifies the base authority for Azure Active Directory authentication. - - System.String - - System.String - - - None - - - ResourceManagerEndpoint - - Specifies the URL for Azure Resource Manager requests. - - System.String - - System.String - - - None - - - GalleryEndpoint - - Specifies the endpoint for the Azure Resource Manager gallery of deployment templates. - - System.String - - System.String - - - None - - - ActiveDirectoryServiceEndpointResourceId - - Specifies the audience for tokens that authenticate requests to Azure Resource Manager or Service Management (RDFE) endpoints. - - System.String - - System.String - - - None - - - GraphEndpoint - - Specifies the URL for Graph (Active Directory metadata) requests. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointResourceId - - The resource identifier of the Azure Analysis Services resource. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointSuffix - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointResourceId - - The The resource identifier of the Azure Attestation service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointSuffix - - Dns suffix of Azure Attestation service. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointResourceId - - The The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointSuffix - - Dns suffix of Azure Synapse Analytics. - - System.String - - System.String - - - None - - - ContainerRegistryEndpointSuffix - - Suffix of Azure Container Registry. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - MicrosoftGraphEndpointResourceId - - The resource identifier of Microsoft Graph - - System.String - - System.String - - - None - - - MicrosoftGraphUrl - - Microsoft Graph Url - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - Set-AzEnvironment - - Name - - Specifies the name of the environment to modify. - - System.String - - System.String - - - None - - - ARMEndpoint - - The Azure Resource Manager endpoint. - - System.String - - System.String - - - None - - - AzureKeyVaultDnsSuffix - - Dns suffix of Azure Key Vault service. Example is vault-int.azure-int.net - - System.String - - System.String - - - None - - - AzureKeyVaultServiceEndpointResourceId - - Resource identifier of Azure Key Vault data service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - DataLakeAudience - - The audience for tokens authenticating with the AD Data Lake services Endpoint. - - System.String - - System.String - - - None - - - BatchEndpointResourceId - - The resource identifier of the Azure Batch service that is the recipient of the requested token - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpointResourceId - - The audience for tokens authenticating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpoint - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - StorageEndpoint - - Specifies the endpoint for storage (blob, table, queue, and file) access. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointResourceId - - The resource identifier of the Azure Analysis Services resource. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointSuffix - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointResourceId - - The The resource identifier of the Azure Attestation service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointSuffix - - Dns suffix of Azure Attestation service. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointResourceId - - The The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointSuffix - - Dns suffix of Azure Synapse Analytics. - - System.String - - System.String - - - None - - - ContainerRegistryEndpointSuffix - - Suffix of Azure Container Registry. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - - Process - CurrentUser - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - ActiveDirectoryEndpoint - - Specifies the base authority for Azure Active Directory authentication. - - System.String - - System.String - - - None - - - ActiveDirectoryServiceEndpointResourceId - - Specifies the audience for tokens that authenticate requests to Azure Resource Manager or Service Management (RDFE) endpoints. - - System.String - - System.String - - - None - - - AdTenant - - Specifies the default Active Directory tenant. - - System.String - - System.String - - - None - - - ARMEndpoint - - The Azure Resource Manager endpoint. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointResourceId - - The resource identifier of the Azure Analysis Services resource. - - System.String - - System.String - - - None - - - AzureAnalysisServicesEndpointSuffix - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointResourceId - - The The resource identifier of the Azure Attestation service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureAttestationServiceEndpointSuffix - - Dns suffix of Azure Attestation service. - - System.String - - System.String - - - None - - - AzureDataLakeAnalyticsCatalogAndJobEndpointSuffix - - Dns Suffix of Azure Data Lake Analytics job and catalog services - - System.String - - System.String - - - None - - - AzureDataLakeStoreFileSystemEndpointSuffix - - Dns Suffix of Azure Data Lake Store FileSystem. Example: azuredatalake.net - - System.String - - System.String - - - None - - - AzureKeyVaultDnsSuffix - - Dns suffix of Azure Key Vault service. Example is vault-int.azure-int.net - - System.String - - System.String - - - None - - - AzureKeyVaultServiceEndpointResourceId - - Resource identifier of Azure Key Vault data service that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpoint - - The endpoint to use when communicating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureOperationalInsightsEndpointResourceId - - The audience for tokens authenticating with the Azure Log Analytics API. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointResourceId - - The The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. - - System.String - - System.String - - - None - - - AzureSynapseAnalyticsEndpointSuffix - - Dns suffix of Azure Synapse Analytics. - - System.String - - System.String - - - None - - - BatchEndpointResourceId - - The resource identifier of the Azure Batch service that is the recipient of the requested token - - System.String - - System.String - - - None - - - ContainerRegistryEndpointSuffix - - Suffix of Azure Container Registry. - - System.String - - System.String - - - None - - - DataLakeAudience - - The audience for tokens authenticating with the AD Data Lake services Endpoint. - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant and subscription used for communication with azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - EnableAdfsAuthentication - - Indicates that Active Directory Federation Services (ADFS) on-premise authentication is allowed. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - GalleryEndpoint - - Specifies the endpoint for the Azure Resource Manager gallery of deployment templates. - - System.String - - System.String - - - None - - - GraphAudience - - The audience for tokens authenticating with the AD Graph Endpoint. - - System.String - - System.String - - - None - - - GraphEndpoint - - Specifies the URL for Graph (Active Directory metadata) requests. - - System.String - - System.String - - - None - - - ManagementPortalUrl - - Specifies the URL for the Management Portal. - - System.String - - System.String - - - None - - - MicrosoftGraphEndpointResourceId - - The resource identifier of Microsoft Graph - - System.String - - System.String - - - None - - - MicrosoftGraphUrl - - Microsoft Graph Url - - System.String - - System.String - - - None - - - Name - - Specifies the name of the environment to modify. - - System.String - - System.String - - - None - - - PublishSettingsFileUrl - - Specifies the URL from which .publishsettings files can be downloaded. - - System.String - - System.String - - - None - - - ResourceManagerEndpoint - - Specifies the URL for Azure Resource Manager requests. - - System.String - - System.String - - - None - - - Scope - - Determines the scope of context changes, for example, whether changes apply only to the current process, or to all sessions started by this user. - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - Microsoft.Azure.Commands.Profile.Common.ContextModificationScope - - - None - - - ServiceEndpoint - - Specifies the endpoint for Service Management (RDFE) requests. - - System.String - - System.String - - - None - - - SqlDatabaseDnsSuffix - - Specifies the domain-name suffix for Azure SQL Database servers. - - System.String - - System.String - - - None - - - StorageEndpoint - - Specifies the endpoint for storage (blob, table, queue, and file) access. - - System.String - - System.String - - - None - - - TrafficManagerDnsSuffix - - Specifies the domain-name suffix for Azure Traffic Manager services. - - System.String - - System.String - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.String - - - - - - - - System.Management.Automation.SwitchParameter - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment - - - - - - - - - - - - - - ----- Example 1: Creating and modifying a new environment ----- - Add-AzEnvironment -Name TestEnvironment ` - -ActiveDirectoryEndpoint TestADEndpoint ` - -ActiveDirectoryServiceEndpointResourceId TestADApplicationId ` - -ResourceManagerEndpoint TestRMEndpoint ` - -GalleryEndpoint TestGalleryEndpoint ` - -GraphEndpoint TestGraphEndpoint - -Name Resource Manager Url ActiveDirectory Authority ----- -------------------- ------------------------- -TestEnvironment TestRMEndpoint TestADEndpoint/ - -Set-AzEnvironment -Name TestEnvironment ` - -ActiveDirectoryEndpoint NewTestADEndpoint ` - -GraphEndpoint NewTestGraphEndpoint | Format-List - -Name : TestEnvironment -EnableAdfsAuthentication : False -ActiveDirectoryServiceEndpointResourceId : TestADApplicationId -AdTenant : -GalleryUrl : TestGalleryEndpoint -ManagementPortalUrl : -ServiceManagementUrl : -PublishSettingsFileUrl : -ResourceManagerUrl : TestRMEndpoint -SqlDatabaseDnsSuffix : -StorageEndpointSuffix : -ActiveDirectoryAuthority : NewTestADEndpoint -GraphUrl : NewTestGraphEndpoint -GraphEndpointResourceId : -TrafficManagerDnsSuffix : -AzureKeyVaultDnsSuffix : -AzureDataLakeStoreFileSystemEndpointSuffix : -AzureDataLakeAnalyticsCatalogAndJobEndpointSuffix : -AzureKeyVaultServiceEndpointResourceId : -BatchEndpointResourceId : -AzureOperationalInsightsEndpoint : -AzureOperationalInsightsEndpointResourceId : -AzureAttestationServiceEndpointSuffix : -AzureAttestationServiceEndpointResourceId : -AzureSynapseAnalyticsEndpointSuffix : -AzureSynapseAnalyticsEndpointResourceId : - - In this example we are creating a new Azure environment with sample endpoints using Add-AzEnvironment, and then we are changing the value of the ActiveDirectoryEndpoint and GraphEndpoint attributes of the created environment using the cmdlet Set-AzEnvironment. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/set-azenvironment - - - Add-AzEnvironment - - - - Get-AzEnvironment - - - - Remove-AzEnvironment - - - - - - - Uninstall-AzureRm - Uninstall - AzureRm - - Removes all AzureRm modules from a machine. - - - - Removes all AzureRm modules from a machine. - - - - Uninstall-AzureRm - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - PassThru - - Return list of Modules removed if specified. - - - System.Management.Automation.SwitchParameter - - - False - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - PassThru - - Return list of Modules removed if specified. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - None - - - - - - - - - - System.String - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Uninstall-AzureRm - - Running this command will remove all AzureRm modules from the machine for the version of PowerShell in which the cmdlet is run. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/uninstall-azurerm - - - - - - Update-AzConfig - Update - AzConfig - - Updates the configs of Azure PowerShell. - - - - Updates the configs of Azure PowerShell. Depending on which config to update, you may specify the scope where the config is persisted and to which module or cmdlet it applies to. - > [!NOTE] > It is discouraged to update configs in multiple PowerShell processes. Either do it in one process, or make sure the updates are at Process scope (`-Scope Process`) to avoid unexpected side-effects. - - - - Update-AzConfig - - AppliesTo - - Specifies what part of Azure PowerShell the config applies to. Possible values are: - "Az": the config applies to all modules and cmdlets of Azure PowerShell. - - Module name: the config applies to a certain module of Azure PowerShell. - For example, "Az.Storage". - Cmdlet name: the config applies to a certain cmdlet of Azure PowerShell. For example, "Get-AzKeyVault". If not specified, when getting or clearing configs, it defaults to all the above; when updating, it defaults to "Az". - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - DefaultSubscriptionForLogin - - Subscription name or GUID. Sets the default context for Azure PowerShell when logging in without specifying a subscription. - - System.String - - System.String - - - None - - - DisplayBreakingChangeWarning - - Controls if warning messages for breaking changes are displayed or suppressed. When enabled, a breaking change warning is displayed when executing cmdlets with breaking changes in a future release. - - System.Boolean - - System.Boolean - - - None - - - DisplaySurveyMessage - - When enabled, you are prompted infrequently to participate in user experience surveys for Azure PowerShell. - - System.Boolean - - System.Boolean - - - None - - - EnableDataCollection - - When enabled, Azure PowerShell cmdlets send telemetry data to Microsoft to improve the customer experience. For more information, see our privacy statement: https://aka.ms/privacy - - System.Boolean - - System.Boolean - - - None - - - Scope - - Determines the scope of config changes, for example, whether changes apply only to the current process, or to all sessions started by this user. By default it is CurrentUser. - - - CurrentUser - Process - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - - System.Management.Automation.SwitchParameter - - - False - - - - - - AppliesTo - - Specifies what part of Azure PowerShell the config applies to. Possible values are: - "Az": the config applies to all modules and cmdlets of Azure PowerShell. - - Module name: the config applies to a certain module of Azure PowerShell. - For example, "Az.Storage". - Cmdlet name: the config applies to a certain cmdlet of Azure PowerShell. For example, "Get-AzKeyVault". If not specified, when getting or clearing configs, it defaults to all the above; when updating, it defaults to "Az". - - System.String - - System.String - - - None - - - DefaultProfile - - The credentials, account, tenant, and subscription used for communication with Azure. - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - None - - - DefaultSubscriptionForLogin - - Subscription name or GUID. Sets the default context for Azure PowerShell when logging in without specifying a subscription. - - System.String - - System.String - - - None - - - DisplayBreakingChangeWarning - - Controls if warning messages for breaking changes are displayed or suppressed. When enabled, a breaking change warning is displayed when executing cmdlets with breaking changes in a future release. - - System.Boolean - - System.Boolean - - - None - - - DisplaySurveyMessage - - When enabled, you are prompted infrequently to participate in user experience surveys for Azure PowerShell. - - System.Boolean - - System.Boolean - - - None - - - EnableDataCollection - - When enabled, Azure PowerShell cmdlets send telemetry data to Microsoft to improve the customer experience. For more information, see our privacy statement: https://aka.ms/privacy - - System.Boolean - - System.Boolean - - - None - - - Scope - - Determines the scope of config changes, for example, whether changes apply only to the current process, or to all sessions started by this user. By default it is CurrentUser. - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - Microsoft.Azure.PowerShell.Common.Config.ConfigScope - - - None - - - Confirm - - Prompts you for confirmation before running the cmdlet. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - WhatIf - - Shows what would happen if the cmdlet runs. The cmdlet is not run. - - System.Management.Automation.SwitchParameter - - System.Management.Automation.SwitchParameter - - - False - - - - - - System.String - - - - - - - - System.Boolean - - - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSConfig - - - - - - - - - - - - - - -------------------------- Example 1 -------------------------- - Update-AzConfig -DefaultSubscriptionForLogin "Name of subscription" - -Key Value Applies To Scope Help Message ---- ----- ---------- ----- ------------ -DefaultSubscriptionForLogin Name of subscription Az CurrentUser Subscription name or GUID. Sets the default context for Azure PowerShell when lo… - - Sets the "DefaultSubscriptionForLogin" config as "Name of subscription". When `Connect-AzAccount` the specified subscription will be selected as the default subscription. - - - - - - -------------------------- Example 2 -------------------------- - Update-AzConfig -DisplayBreakingChangeWarning $false -AppliesTo "Az.KeyVault" - -Key Value Applies To Scope Help Message ---- ----- ---------- ----- ------------ -DisplayBreakingChangeWarning False Az.KeyVault CurrentUser Controls if warning messages for breaking changes are displayed or suppressed. When enabled,… - - Sets the "DisplayBreakingChangeWarnings" config as "$false" for "Az.KeyVault" module. This prevents all the warning messages for upcoming breaking changes in Az.KeyVault module from prompting. - - - - - - -------------------------- Example 3 -------------------------- - Update-AzConfig -EnableDataCollection $true - -Key Value Applies To Scope Help Message ---- ----- ---------- ----- ------------ -EnableDataCollection True Az CurrentUser When enabled, Azure PowerShell cmdlets send telemetry data to Microsoft to improve the customer experi… - - Sets the "EnableDataCollection" config as "$true". This enables sending the telemetry data. Setting this config is equivalent to `Enable-AzDataCollection` and `Disable-AzDataCollection`. - - - - - - - - Online Version: - https://learn.microsoft.com/powershell/module/az.accounts/update-azconfig - - - - \ No newline at end of file diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Common.Share.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Common.Share.dll deleted file mode 100644 index 1acd5257e44b..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Common.Share.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Common.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Common.dll deleted file mode 100644 index ec3cafa3f334..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Common.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Storage.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Storage.dll deleted file mode 100644 index 228de1f5dca8..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Storage.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Strategies.dll b/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Strategies.dll deleted file mode 100644 index 2e0b4c3ab6f2..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Strategies.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PSGetModuleInfo.xml b/Modules/Az.Accounts/2.10.4/PSGetModuleInfo.xml deleted file mode 100644 index adfc7dfabc6e..000000000000 --- a/Modules/Az.Accounts/2.10.4/PSGetModuleInfo.xml +++ /dev/null @@ -1,204 +0,0 @@ - - - - Microsoft.PowerShell.Commands.PSRepositoryItemInfo - System.Management.Automation.PSCustomObject - System.Object - - - Az.Accounts - 2.10.4 - Module - Microsoft Azure PowerShell - Accounts credential management cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core._x000D__x000A__x000D__x000A_For more information on account credential management, please visit the following: https://learn.microsoft.com/powershell/azure/authenticate-azureps - Microsoft Corporation - azure-sdk - Microsoft Corporation. All rights reserved. -
2022-12-06T09:00:44-05:00
- - - https://aka.ms/azps-license - https://github.com/Azure/azure-powershell - - - - System.Object[] - System.Array - System.Object - - - Azure - ResourceManager - ARM - Accounts - Authentication - Environment - Subscription - PSModule - PSEdition_Core - PSEdition_Desktop - - - - - System.Collections.Hashtable - System.Object - - - - DscResource - - - - - - - Command - - - - Disable-AzDataCollection - Disable-AzContextAutosave - Enable-AzDataCollection - Enable-AzContextAutosave - Remove-AzEnvironment - Get-AzEnvironment - Set-AzEnvironment - Add-AzEnvironment - Get-AzSubscription - Connect-AzAccount - Get-AzContext - Set-AzContext - Import-AzContext - Save-AzContext - Get-AzTenant - Send-Feedback - Resolve-AzError - Select-AzContext - Rename-AzContext - Remove-AzContext - Clear-AzContext - Disconnect-AzAccount - Get-AzContextAutosaveSetting - Set-AzDefault - Get-AzDefault - Clear-AzDefault - Register-AzModule - Enable-AzureRmAlias - Disable-AzureRmAlias - Uninstall-AzureRm - Invoke-AzRestMethod - Get-AzAccessToken - Open-AzSurveyLink - Get-AzConfig - Update-AzConfig - Clear-AzConfig - Export-AzConfig - Import-AzConfig - - - - - Cmdlet - - - - Disable-AzDataCollection - Disable-AzContextAutosave - Enable-AzDataCollection - Enable-AzContextAutosave - Remove-AzEnvironment - Get-AzEnvironment - Set-AzEnvironment - Add-AzEnvironment - Get-AzSubscription - Connect-AzAccount - Get-AzContext - Set-AzContext - Import-AzContext - Save-AzContext - Get-AzTenant - Send-Feedback - Resolve-AzError - Select-AzContext - Rename-AzContext - Remove-AzContext - Clear-AzContext - Disconnect-AzAccount - Get-AzContextAutosaveSetting - Set-AzDefault - Get-AzDefault - Clear-AzDefault - Register-AzModule - Enable-AzureRmAlias - Disable-AzureRmAlias - Uninstall-AzureRm - Invoke-AzRestMethod - Get-AzAccessToken - Open-AzSurveyLink - Get-AzConfig - Update-AzConfig - Clear-AzConfig - Export-AzConfig - Import-AzConfig - - - - - Workflow - - - - Function - - - - RoleCapability - - - - - - * Enabled caching tokens when logging in with a client assertion. This fixed the incorrectly short lifespan of tokens._x000D__x000A_* Upgraded target framework of Microsoft.Identity.Client to net461 [#20189]_x000D__x000A_* Stored 'ServicePrincipalSecret' and 'CertificatePassword' into 'AzKeyStore'._x000D__x000A_* Updated the reference of Azure PowerShell Common to 1.3.67-preview. - - - - - https://www.powershellgallery.com/api/v2 - PSGallery - NuGet - - - System.Management.Automation.PSCustomObject - System.Object - - - Microsoft Corporation. All rights reserved. - Microsoft Azure PowerShell - Accounts credential management cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core._x000D__x000A__x000D__x000A_For more information on account credential management, please visit the following: https://learn.microsoft.com/powershell/azure/authenticate-azureps - True - * Enabled caching tokens when logging in with a client assertion. This fixed the incorrectly short lifespan of tokens._x000D__x000A_* Upgraded target framework of Microsoft.Identity.Client to net461 [#20189]_x000D__x000A_* Stored 'ServicePrincipalSecret' and 'CertificatePassword' into 'AzKeyStore'._x000D__x000A_* Updated the reference of Azure PowerShell Common to 1.3.67-preview. - True - True - 1598558 - 108306227 - 7573290 - 12/6/2022 9:00:44 AM -05:00 - 12/6/2022 9:00:44 AM -05:00 - 12/16/2022 9:07:59 PM -05:00 - Azure ResourceManager ARM Accounts Authentication Environment Subscription PSModule PSEdition_Core PSEdition_Desktop PSCmdlet_Disable-AzDataCollection PSCommand_Disable-AzDataCollection PSCmdlet_Disable-AzContextAutosave PSCommand_Disable-AzContextAutosave PSCmdlet_Enable-AzDataCollection PSCommand_Enable-AzDataCollection PSCmdlet_Enable-AzContextAutosave PSCommand_Enable-AzContextAutosave PSCmdlet_Remove-AzEnvironment PSCommand_Remove-AzEnvironment PSCmdlet_Get-AzEnvironment PSCommand_Get-AzEnvironment PSCmdlet_Set-AzEnvironment PSCommand_Set-AzEnvironment PSCmdlet_Add-AzEnvironment PSCommand_Add-AzEnvironment PSCmdlet_Get-AzSubscription PSCommand_Get-AzSubscription PSCmdlet_Connect-AzAccount PSCommand_Connect-AzAccount PSCmdlet_Get-AzContext PSCommand_Get-AzContext PSCmdlet_Set-AzContext PSCommand_Set-AzContext PSCmdlet_Import-AzContext PSCommand_Import-AzContext PSCmdlet_Save-AzContext PSCommand_Save-AzContext PSCmdlet_Get-AzTenant PSCommand_Get-AzTenant PSCmdlet_Send-Feedback PSCommand_Send-Feedback PSCmdlet_Resolve-AzError PSCommand_Resolve-AzError PSCmdlet_Select-AzContext PSCommand_Select-AzContext PSCmdlet_Rename-AzContext PSCommand_Rename-AzContext PSCmdlet_Remove-AzContext PSCommand_Remove-AzContext PSCmdlet_Clear-AzContext PSCommand_Clear-AzContext PSCmdlet_Disconnect-AzAccount PSCommand_Disconnect-AzAccount PSCmdlet_Get-AzContextAutosaveSetting PSCommand_Get-AzContextAutosaveSetting PSCmdlet_Set-AzDefault PSCommand_Set-AzDefault PSCmdlet_Get-AzDefault PSCommand_Get-AzDefault PSCmdlet_Clear-AzDefault PSCommand_Clear-AzDefault PSCmdlet_Register-AzModule PSCommand_Register-AzModule PSCmdlet_Enable-AzureRmAlias PSCommand_Enable-AzureRmAlias PSCmdlet_Disable-AzureRmAlias PSCommand_Disable-AzureRmAlias PSCmdlet_Uninstall-AzureRm PSCommand_Uninstall-AzureRm PSCmdlet_Invoke-AzRestMethod PSCommand_Invoke-AzRestMethod PSCmdlet_Get-AzAccessToken PSCommand_Get-AzAccessToken PSCmdlet_Open-AzSurveyLink PSCommand_Open-AzSurveyLink PSCmdlet_Get-AzConfig PSCommand_Get-AzConfig PSCmdlet_Update-AzConfig PSCommand_Update-AzConfig PSCmdlet_Clear-AzConfig PSCommand_Clear-AzConfig PSCmdlet_Export-AzConfig PSCommand_Export-AzConfig PSCmdlet_Import-AzConfig PSCommand_Import-AzConfig PSIncludes_Cmdlet - False - 2022-12-16T21:07:59Z - 2.10.4 - Microsoft Corporation - false - Module - Az.Accounts.nuspec|Accounts.format.ps1xml|Accounts.generated.format.ps1xml|Accounts.types.ps1xml|Az.Accounts.psd1|Az.Accounts.psm1|FuzzySharp.dll|Hyak.Common.dll|Microsoft.ApplicationInsights.dll|Microsoft.Azure.Common.dll|Microsoft.Azure.PowerShell.Authentication.Abstractions.dll|Microsoft.Azure.PowerShell.Authentication.deps.json|Microsoft.Azure.PowerShell.Authentication.dll|Microsoft.Azure.PowerShell.Authentication.ResourceManager.deps.json|Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll|Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.deps.json|Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll|Microsoft.Azure.PowerShell.Authenticators.dll|Microsoft.Azure.PowerShell.Clients.Aks.dll|Microsoft.Azure.PowerShell.Clients.Authorization.dll|Microsoft.Azure.PowerShell.Clients.Compute.dll|Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll|Microsoft.Azure.PowerShell.Clients.KeyVault.dll|Microsoft.Azure.PowerShell.Clients.Monitor.dll|Microsoft.Azure.PowerShell.Clients.Network.dll|Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll|Microsoft.Azure.PowerShell.Clients.ResourceManager.dll|Microsoft.Azure.PowerShell.Clients.Storage.Management.dll|Microsoft.Azure.PowerShell.Clients.Websites.dll|Microsoft.Azure.PowerShell.Cmdlets.Accounts.deps.json|Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll|Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml|Microsoft.Azure.PowerShell.Common.dll|Microsoft.Azure.PowerShell.Common.Share.dll|Microsoft.Azure.PowerShell.Storage.dll|Microsoft.Azure.PowerShell.Strategies.dll|Microsoft.Rest.ClientRuntime.Azure.dll|Microsoft.Rest.ClientRuntime.dll|Microsoft.WindowsAzure.Storage.DataMovement.dll|Microsoft.WindowsAzure.Storage.dll|AzSharedAlcAssemblies\Azure.Core.dll|AzSharedAlcAssemblies\Azure.Identity.dll|AzSharedAlcAssemblies\Microsoft.Bcl.AsyncInterfaces.dll|AzSharedAlcAssemblies\Microsoft.Identity.Client.dll|AzSharedAlcAssemblies\Microsoft.Identity.Client.Extensions.Msal.dll|AzSharedAlcAssemblies\Microsoft.IdentityModel.Abstractions.dll|AzSharedAlcAssemblies\System.Memory.Data.dll|AzSharedAlcAssemblies\System.Text.Json.dll|en-US\about_az.help.txt|PostImportScripts\LoadAuthenticators.ps1|PreloadAssemblies\Azure.Core.dll|PreloadAssemblies\Azure.Identity.dll|PreloadAssemblies\Microsoft.Azure.PowerShell.Authenticators.dll|PreloadAssemblies\Microsoft.Bcl.AsyncInterfaces.dll|PreloadAssemblies\Microsoft.Identity.Client.dll|PreloadAssemblies\Microsoft.Identity.Client.Extensions.Msal.dll|PreloadAssemblies\Microsoft.IdentityModel.Abstractions.dll|PreloadAssemblies\Newtonsoft.Json.12.0.3.dll|PreloadAssemblies\Newtonsoft.Json.dll|PreloadAssemblies\System.Buffers.dll|PreloadAssemblies\System.Diagnostics.DiagnosticSource.dll|PreloadAssemblies\System.Memory.Data.dll|PreloadAssemblies\System.Memory.dll|PreloadAssemblies\System.Net.Http.WinHttpHandler.dll|PreloadAssemblies\System.Numerics.Vectors.dll|PreloadAssemblies\System.Private.ServiceModel.dll|PreloadAssemblies\System.Reflection.DispatchProxy.dll|PreloadAssemblies\System.Runtime.CompilerServices.Unsafe.dll|PreloadAssemblies\System.Security.AccessControl.dll|PreloadAssemblies\System.Security.Cryptography.Cng.dll|PreloadAssemblies\System.Security.Permissions.dll|PreloadAssemblies\System.Security.Principal.Windows.dll|PreloadAssemblies\System.ServiceModel.Primitives.dll|PreloadAssemblies\System.Text.Encodings.Web.dll|PreloadAssemblies\System.Text.Json.dll|PreloadAssemblies\System.Threading.Tasks.Extensions.dll|PreloadAssemblies\System.Xml.ReaderWriter.dll|StartupScripts\AzError.ps1|StartupScripts\InitializeAssemblyResolver.ps1 - 17a2feff-488b-47f9-8729-e2cec094624c - 5.1 - 4.7.2 - Microsoft Corporation - - - C:\Users\jduprey.CNS\Documents\GitHub\CIPP-API\Modules\Az.Accounts\2.10.4 -
-
-
diff --git a/Modules/Az.Accounts/2.10.4/PostImportScripts/LoadAuthenticators.ps1 b/Modules/Az.Accounts/2.10.4/PostImportScripts/LoadAuthenticators.ps1 deleted file mode 100644 index 33ef771513d0..000000000000 --- a/Modules/Az.Accounts/2.10.4/PostImportScripts/LoadAuthenticators.ps1 +++ /dev/null @@ -1,220 +0,0 @@ -if ($PSEdition -eq 'Desktop') { - try { - [Microsoft.Azure.Commands.Profile.Utilities.CustomAssemblyResolver]::Initialize() - } catch {} -} -# SIG # Begin signature block -# MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor -# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBn8ROze2QLH/c6 -# GtPhR/BPLgOtmjkNhcq+fFmu16VcrqCCDYUwggYDMIID66ADAgECAhMzAAACzfNk -# v/jUTF1RAAAAAALNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NjAyWhcNMjMwNTExMjA0NjAyWjB0MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDrIzsY62MmKrzergm7Ucnu+DuSHdgzRZVCIGi9CalFrhwtiK+3FIDzlOYbs/zz -# HwuLC3hir55wVgHoaC4liQwQ60wVyR17EZPa4BQ28C5ARlxqftdp3H8RrXWbVyvQ -# aUnBQVZM73XDyGV1oUPZGHGWtgdqtBUd60VjnFPICSf8pnFiit6hvSxH5IVWI0iO -# nfqdXYoPWUtVUMmVqW1yBX0NtbQlSHIU6hlPvo9/uqKvkjFUFA2LbC9AWQbJmH+1 -# uM0l4nDSKfCqccvdI5l3zjEk9yUSUmh1IQhDFn+5SL2JmnCF0jZEZ4f5HE7ykDP+ -# oiA3Q+fhKCseg+0aEHi+DRPZAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU0WymH4CP7s1+yQktEwbcLQuR9Zww -# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh -# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzQ3MDUzMDAfBgNVHSMEGDAW -# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw -# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov -# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx -# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB -# AE7LSuuNObCBWYuttxJAgilXJ92GpyV/fTiyXHZ/9LbzXs/MfKnPwRydlmA2ak0r -# GWLDFh89zAWHFI8t9JLwpd/VRoVE3+WyzTIskdbBnHbf1yjo/+0tpHlnroFJdcDS -# MIsH+T7z3ClY+6WnjSTetpg1Y/pLOLXZpZjYeXQiFwo9G5lzUcSd8YVQNPQAGICl -# 2JRSaCNlzAdIFCF5PNKoXbJtEqDcPZ8oDrM9KdO7TqUE5VqeBe6DggY1sZYnQD+/ -# LWlz5D0wCriNgGQ/TWWexMwwnEqlIwfkIcNFxo0QND/6Ya9DTAUykk2SKGSPt0kL -# tHxNEn2GJvcNtfohVY/b0tuyF05eXE3cdtYZbeGoU1xQixPZAlTdtLmeFNly82uB -# VbybAZ4Ut18F//UrugVQ9UUdK1uYmc+2SdRQQCccKwXGOuYgZ1ULW2u5PyfWxzo4 -# BR++53OB/tZXQpz4OkgBZeqs9YaYLFfKRlQHVtmQghFHzB5v/WFonxDVlvPxy2go -# a0u9Z+ZlIpvooZRvm6OtXxdAjMBcWBAsnBRr/Oj5s356EDdf2l/sLwLFYE61t+ME -# iNYdy0pXL6gN3DxTVf2qjJxXFkFfjjTisndudHsguEMk8mEtnvwo9fOSKT6oRHhM -# 9sZ4HTg/TTMjUljmN3mBYWAWI5ExdC1inuog0xrKmOWVMIIHejCCBWKgAwIBAgIK -# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV -# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv -# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm -# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw -# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE -# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD -# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG -# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la -# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc -# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D -# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ -# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk -# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 -# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd -# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL -# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd -# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 -# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS -# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI -# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL -# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD -# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv -# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 -# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF -# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h -# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA -# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn -# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 -# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b -# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ -# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy -# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp -# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi -# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb -# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS -# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL -# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX -# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x -# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt -# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p -# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAALN82S/+NRMXVEAAAAA -# As0wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw -# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC8M -# Xy0xGn+XGeN5xhSUhsVdQGTLtuHOS5+U3UgQ1k53MEIGCisGAQQBgjcCAQwxNDAy -# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20wDQYJKoZIhvcNAQEBBQAEggEAGUd1VemTtAIcljWuSg2ILU5nprnJM20AtKUE -# Y91di74JSxPAUwT/FwBW7kmDUUwWnRjti9z/TAEnSMJhpn6jTJgJNQqfvSC4W5Vn -# QI5VO4KjncEnxCdKdzwhnsgcKd3KC+qkz5kJU13hFjm2fs+TdwRDYSE0AoPqErPt -# +3mGJTjSCO5g4Na2SW8vyuy4KWUTnYCD1w+3Socif2U3h+uPM03PaCXlVdAKK0Kp -# 2lLJvKzu8CCh3u5qlCzLhLZlVnmKLIZrE25nZcPApet73VWqdVrnD9SwswGZ3hn2 -# 8se11uqyiTsNaGgFcL90Y0RgbBRAP2S/al/7kim24CeamcGKk6GCFygwghckBgor -# BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI -# AWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGE -# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC8ijRC87gS+FGXPJ/mWXevI/KGqcA5LdzN -# /v1mDxlsUwIGY3Tna0YrGBIyMDIyMTIwMTEwMTU0My40M1owBIACAfSggdikgdUw -# gdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS -# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT -# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd -# VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMTHE1pY3Jvc29m -# dCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAbT7gAhE -# BdIt+gABAAABtDANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE -# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z -# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ -# Q0EgMjAxMDAeFw0yMjA5MjAyMDIyMDlaFw0yMzEyMTQyMDIyMDlaMIHSMQswCQYD -# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe -# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3Nv -# ZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBU -# U1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T -# dGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtEem -# nmUHMkIfvOiu27K86ZbwWhksGwV72Dl1uGdqr2pKm+mfzoT+Yngkq9aLEf+XDtAD -# yA+2KIZU0iO8WG79eJjzz29flZpBKbKg8xl2P3O9drleuQw3TnNfNN4+QIgjMXpE -# 3txPF7M7IRLKZMiOt3FfkFWVmiXJAA7E3OIwJgphg09th3Tvzp8MT8+HOtG3bdrR -# d/y2u8VrQsQTLZiVwTZ6qDYKNT8PQZl7xFrSSO3QzXa91LipZnYOl3siGJDCee1B -# a7X1i13dQFHxKl5Ff4JzDduOBZ85e2VrpyFy1a3ayGUzBrIw59jhMbjIw9YVcQt9 -# kUWntyCmNk15WybCS+hXpEDDLVj1X5W9snmoW1qu03+unprQjWQaVuO7BfcvQdNV -# dyKSqAeKy1eT2Hcc5n1aAVeXFm6sbVJmZzPQEQR3Jr7W8YcTjkqC5hT2qrYuIcYG -# Of3Pj4OqdXm1Qqhuwtskxviv7yy3Z+PxJpxKx+2e6zGRaoQmIlLfg/a42XNVHTf6 -# Wzr5k7Q1w7v0uA/sFsgyKmI7HzKHX08xDDSmJooXA5btD6B0lx/Lqs6Qb4KthnA7 -# N2IEdJ5sjMIhyHZwBr7fzDskU/+Sgp2UnfqrN1Vda/gb+pmlbJwi8MphvElYzjT7 -# PZK2Dm4eorcjx7T2QVe3EIelLuGbxzybblZoRTkCAwEAAaOCAUkwggFFMB0GA1Ud -# DgQWBBTLRIXl8ZS4Opy7Eii3Tt44zDLZfjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP0 -# 5dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29m -# dC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw -# MjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt -# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB -# /wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOC -# AgEAEtEPBYwpt4JioSq0joGzwqYX6SoNH7YbqpgArdlnrdt6u3ukKREluKEVqS2X -# ajXxx0UkXGc4Xi9dp2bSxpuyQnTkq+IQwkg7p1dKrwAa2vdmaNzz3mrSaeUEu40y -# CThHwquQkweoG4eqRRZe19OtVSmDDNC3ZQ6Ig0qz79vivXgy5dFWk4npxA5LxSGR -# 4wBaXaIuVhoEa06vd/9/2YsQ99bCiR7SxJRt1XrQ5kJGHUi0Fhgz158qvXgfmq7q -# NqfqfTSmsQRrtbe4Zv/X+qPo/l6ae+SrLkcjRfr0ONV0vFVuNKx6Cb90D5LgNpc9 -# x8V/qIHEr+JXbWXW6mARVVqNQCmXlVHjTBjhcXwSmadR1OotcN/sKp2EOM9JPYr8 -# 6O9Y/JAZC9zug9qljKTroZTfYA7LIdcmPr69u1FSD/6ivL6HRHZd/k2EL7FtZwzN -# cRRdFF/VgpkOxHIfqvjXambwoMoT+vtGTtqgoruhhSk0bM1F/pBpi/nPZtVNLGTN -# aK8Wt6kscbC9G6f09gz/wBBJOBmvTLPOOT/3taCGSoJoDABWnK+De5pie4KX8Bxx -# KQbJvxz7vRsVJ5R6mGx+Bvav5AjsxvZZw6eQmkI0vPRckxL9TCVCfWS0uyIKmyo6 -# TdosnbBO/osre7r0jS9AH8spEqVlhFcpQNfOg/CvdS2xNVMwggdxMIIFWaADAgEC -# AhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQG -# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG -# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQg -# Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVa -# Fw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n -# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y -# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIC -# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V -# gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF -# RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3X -# D9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoP -# z130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+ -# tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5Jas -# AUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/b -# fV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuv -# XsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg -# 8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzF -# a/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqP -# nhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw -# IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf -# pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBB -# MD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0Rv -# Y3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGC -# NxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8w -# HwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmg -# R4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWlj -# Um9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEF -# BQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29D -# ZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEs -# H2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk -# wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL -# btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCg -# vxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsId -# w2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2 -# zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23K -# jgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beu -# yOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/ -# tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjm -# jJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBj -# U02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHS -# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk -# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRN -# aWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRo -# YWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQg -# VGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBlnNiQ85uX9nN4KRJt -# /gHkJx4JCKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n -# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y -# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0G -# CSqGSIb3DQEBBQUAAgUA5zKDYzAiGA8yMDIyMTIwMTA5MzUzMVoYDzIwMjIxMjAy -# MDkzNTMxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDnMoNjAgEAMAcCAQACAgrQ -# MAcCAQACAhHbMAoCBQDnM9TjAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB -# hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA -# ZK/piCRaXFXG2LtX/uxFkM4g636PdnoqkQsYT2Wt41UPOnyZIhhfI8x3xWBuC10O -# pdkSS7OBk9XOaWXhWifJkEvrOLmDVCDHTwEdhydc72RwGvNPvzRWFbDW6jPmLzvW -# Iv8sku47mEFUyEJFpm0Pkvcv9Ju283rNLgTnE+j2TzIxggQNMIIECQIBATCBkzB8 -# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk -# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N -# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAbT7gAhEBdIt+gABAAAB -# tDANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE -# MC8GCSqGSIb3DQEJBDEiBCAWrs25Aw1I2Nh8P0DJ8R770IAplhjPWPMvlR3CmyEK -# /DCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINPI93vmozBwBlFxvfr/rElr -# eFPR4ux7vXKx2ni3AfcGMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT -# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m -# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB -# IDIwMTACEzMAAAG0+4AIRAXSLfoAAQAAAbQwIgQgTTwWuulpBUWwCwXUoCvjAqcl -# OeKQzNs+akRCfe+qoLkwDQYJKoZIhvcNAQELBQAEggIAOwBoWbVlYEH6hQ7hPzhs -# xdcyFL2j17KAR44qJHtwe17Ab7WCFzal4rHDRoZ09aaOtBNTb2SMQ89yx3nJ5QPF -# uUoQE/LGgZ+8VUbt5lFF9nRFTU9q5qNvz47HRys3DqBuUBEv+14unuLFq3rbc8DR -# ZtoF/eMm8yn49dIPpKn4tsZf4UGjsYoUcVuRPpoJZcHYSQ1OJVEQbvLDFrKXbrR3 -# uxvwBUsQo3LZGyLn9zqUO9FtglcsnfVwKiuO/7Lb404JPYmIDBRBvRerMh8JZiNT -# vj6uJex1lTNkODfpNTWysM8ygyj0RWAJIK/YI0C+NwSLnOVjuZKvaIUAC7S87Apo -# B1clHog3cmQuXJsavLFbPw4miqQpzeeKDbDkbn6mf+lJioJa3Wm6IYacKaA4+rUb -# c5VzhrmlX6iFoLtw07DdVgRvoXrxUeXydV2ssN5GP76Z9Fswz4BwcSkDJgdAqLmk -# islLYlwCJ97dxUCj9K30WxHNU2AhVzeE5Ujx7kLRWVTMpcc1sexyXL0QWDj8LAWj -# xWKB4ZqdZ9Wu70ev7l4F3rDxSZSnto2vMbSxyRf0+r6dyyjepHju70dXBej3ytcJ -# d+5qHcyqmX3tolVvihAdBba+124Qu9WrMpyt5QGvBhQ8XMoa1a/cDgTOwfuxdSaC -# WBcxdRKxA1n3c0uAWxWAAeE= -# SIG # End signature block diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Azure.Core.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Azure.Core.dll deleted file mode 100644 index 53a113d8b2fe..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Azure.Core.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Azure.Identity.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Azure.Identity.dll deleted file mode 100644 index 5662a76ad958..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Azure.Identity.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Azure.PowerShell.Authenticators.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Azure.PowerShell.Authenticators.dll deleted file mode 100644 index 986f75fbefd1..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Azure.PowerShell.Authenticators.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Bcl.AsyncInterfaces.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Bcl.AsyncInterfaces.dll deleted file mode 100644 index 869ac1b86c57..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Bcl.AsyncInterfaces.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll deleted file mode 100644 index 87f0bdfe02f2..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Identity.Client.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Identity.Client.dll deleted file mode 100644 index d39e9891a8fc..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.Identity.Client.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.IdentityModel.Abstractions.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.IdentityModel.Abstractions.dll deleted file mode 100644 index ab35e1c9e9f7..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Microsoft.IdentityModel.Abstractions.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Newtonsoft.Json.12.0.3.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Newtonsoft.Json.12.0.3.dll deleted file mode 100644 index 1ac73fc9cf20..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Newtonsoft.Json.12.0.3.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Newtonsoft.Json.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Newtonsoft.Json.dll deleted file mode 100644 index db6daf3f470f..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/Newtonsoft.Json.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Diagnostics.DiagnosticSource.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Diagnostics.DiagnosticSource.dll deleted file mode 100644 index a2b54fb042de..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Diagnostics.DiagnosticSource.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Memory.Data.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Memory.Data.dll deleted file mode 100644 index 5aa381018c00..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Memory.Data.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Net.Http.WinHttpHandler.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Net.Http.WinHttpHandler.dll deleted file mode 100644 index 8bd471e74c6e..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Net.Http.WinHttpHandler.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Runtime.CompilerServices.Unsafe.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Runtime.CompilerServices.Unsafe.dll deleted file mode 100644 index 0c27a0e21c7e..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Runtime.CompilerServices.Unsafe.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.AccessControl.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.AccessControl.dll deleted file mode 100644 index e8074324cd13..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.AccessControl.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.Permissions.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.Permissions.dll deleted file mode 100644 index d1af38f0f8b7..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.Permissions.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.Principal.Windows.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.Principal.Windows.dll deleted file mode 100644 index afd187c14918..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.Principal.Windows.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Text.Json.dll b/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Text.Json.dll deleted file mode 100644 index a3a85c2b7255..000000000000 Binary files a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Text.Json.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.10.4/StartupScripts/AzError.ps1 b/Modules/Az.Accounts/2.10.4/StartupScripts/AzError.ps1 deleted file mode 100644 index 49cb3e2909c3..000000000000 --- a/Modules/Az.Accounts/2.10.4/StartupScripts/AzError.ps1 +++ /dev/null @@ -1,279 +0,0 @@ -function Write-InstallationCheckToFile -{ - Param($installationchecks) - if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore) - { - Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide") - } - - $installationchecks.Add("AzSideBySideCheck","true") - try - { - if (Test-Path $pathToInstallationChecks -ErrorAction Ignore) - { - Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop - } - - $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop - if (Test-Path $pathToInstallDir -ErrorAction Ignore) - { - New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop) - } - } - catch - { - Write-Verbose "Installation checks failed to write to file." - } -} - -if (!($env:SkipAzInstallationChecks -eq "true")) -{ - $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json" - $installationchecks = @{} - if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore)) - { - Write-InstallationCheckToFile $installationchecks - } - else - { - try - { - ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value } - } - catch - { - Write-InstallationCheckToFile $installationchecks - } - - if (!$installationchecks.ContainsKey("AzSideBySideCheck")) - { - Write-InstallationCheckToFile $installationchecks - } - } -} - -if (Get-Module AzureRM.profile -ErrorAction Ignore) -{ - Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") - throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") -} - -Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore -# SIG # Begin signature block -# MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor -# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l -# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYUwggYDMIID66ADAgECAhMzAAACzfNk -# v/jUTF1RAAAAAALNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NjAyWhcNMjMwNTExMjA0NjAyWjB0MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDrIzsY62MmKrzergm7Ucnu+DuSHdgzRZVCIGi9CalFrhwtiK+3FIDzlOYbs/zz -# HwuLC3hir55wVgHoaC4liQwQ60wVyR17EZPa4BQ28C5ARlxqftdp3H8RrXWbVyvQ -# aUnBQVZM73XDyGV1oUPZGHGWtgdqtBUd60VjnFPICSf8pnFiit6hvSxH5IVWI0iO -# nfqdXYoPWUtVUMmVqW1yBX0NtbQlSHIU6hlPvo9/uqKvkjFUFA2LbC9AWQbJmH+1 -# uM0l4nDSKfCqccvdI5l3zjEk9yUSUmh1IQhDFn+5SL2JmnCF0jZEZ4f5HE7ykDP+ -# oiA3Q+fhKCseg+0aEHi+DRPZAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU0WymH4CP7s1+yQktEwbcLQuR9Zww -# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh -# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzQ3MDUzMDAfBgNVHSMEGDAW -# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw -# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov -# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx -# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB -# AE7LSuuNObCBWYuttxJAgilXJ92GpyV/fTiyXHZ/9LbzXs/MfKnPwRydlmA2ak0r -# GWLDFh89zAWHFI8t9JLwpd/VRoVE3+WyzTIskdbBnHbf1yjo/+0tpHlnroFJdcDS -# MIsH+T7z3ClY+6WnjSTetpg1Y/pLOLXZpZjYeXQiFwo9G5lzUcSd8YVQNPQAGICl -# 2JRSaCNlzAdIFCF5PNKoXbJtEqDcPZ8oDrM9KdO7TqUE5VqeBe6DggY1sZYnQD+/ -# LWlz5D0wCriNgGQ/TWWexMwwnEqlIwfkIcNFxo0QND/6Ya9DTAUykk2SKGSPt0kL -# tHxNEn2GJvcNtfohVY/b0tuyF05eXE3cdtYZbeGoU1xQixPZAlTdtLmeFNly82uB -# VbybAZ4Ut18F//UrugVQ9UUdK1uYmc+2SdRQQCccKwXGOuYgZ1ULW2u5PyfWxzo4 -# BR++53OB/tZXQpz4OkgBZeqs9YaYLFfKRlQHVtmQghFHzB5v/WFonxDVlvPxy2go -# a0u9Z+ZlIpvooZRvm6OtXxdAjMBcWBAsnBRr/Oj5s356EDdf2l/sLwLFYE61t+ME -# iNYdy0pXL6gN3DxTVf2qjJxXFkFfjjTisndudHsguEMk8mEtnvwo9fOSKT6oRHhM -# 9sZ4HTg/TTMjUljmN3mBYWAWI5ExdC1inuog0xrKmOWVMIIHejCCBWKgAwIBAgIK -# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV -# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv -# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm -# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw -# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE -# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD -# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG -# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la -# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc -# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D -# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ -# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk -# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 -# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd -# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL -# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd -# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 -# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS -# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI -# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL -# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD -# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv -# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 -# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF -# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h -# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA -# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn -# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 -# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b -# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ -# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy -# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp -# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi -# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb -# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS -# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL -# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX -# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x -# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt -# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p -# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAALN82S/+NRMXVEAAAAA -# As0wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw -# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKR+ -# w/DaLVp8ra2PXQQVXZI6DyW6fyW+fzmibTR/vTxzMEIGCisGAQQBgjcCAQwxNDAy -# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20wDQYJKoZIhvcNAQEBBQAEggEAcHxSjOB+GJGQNykSyuFjxwS4jGMpyS2Slh5v -# dTPh8GAznr1O3byB9R4Mg6SU50rQYdQFHzyVqjm3GLh5w3saI8SmxpJS0Y+i0GTD -# LZQsG8MIDUwH8dTmOcZ6lqN3gU7/LzDoshdVDgvn6sYDWi76MtC+wyeTzNEwJFy4 -# 82ukSFPo0HZt0knolxJX/GhEKxiFh+41TmLlqNuimeu7bk+SqfEUIiRXZs7sj/Nl -# KdQsqXrLSMcJVC2c+eKiQbfSsxVlvx3l1n9c2T12R8VHRNFn5SUypTbzUYFnT/lW -# 2Y/Ka661JbZeeuuT8koGDygbKtc2vUI8e82Lc13ILarxbSxZ4KGCFygwghckBgor -# BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI -# AWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGE -# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDxxowcR695VVKvwH+hISmK66TpEzl1Bo8O -# 6ov9rsjRTQIGY3Tna0ZAGBIyMDIyMTIwMTEwMTU0NC4zOFowBIACAfSggdikgdUw -# gdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS -# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT -# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd -# VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMTHE1pY3Jvc29m -# dCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAbT7gAhE -# BdIt+gABAAABtDANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE -# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z -# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ -# Q0EgMjAxMDAeFw0yMjA5MjAyMDIyMDlaFw0yMzEyMTQyMDIyMDlaMIHSMQswCQYD -# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe -# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3Nv -# ZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBU -# U1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T -# dGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtEem -# nmUHMkIfvOiu27K86ZbwWhksGwV72Dl1uGdqr2pKm+mfzoT+Yngkq9aLEf+XDtAD -# yA+2KIZU0iO8WG79eJjzz29flZpBKbKg8xl2P3O9drleuQw3TnNfNN4+QIgjMXpE -# 3txPF7M7IRLKZMiOt3FfkFWVmiXJAA7E3OIwJgphg09th3Tvzp8MT8+HOtG3bdrR -# d/y2u8VrQsQTLZiVwTZ6qDYKNT8PQZl7xFrSSO3QzXa91LipZnYOl3siGJDCee1B -# a7X1i13dQFHxKl5Ff4JzDduOBZ85e2VrpyFy1a3ayGUzBrIw59jhMbjIw9YVcQt9 -# kUWntyCmNk15WybCS+hXpEDDLVj1X5W9snmoW1qu03+unprQjWQaVuO7BfcvQdNV -# dyKSqAeKy1eT2Hcc5n1aAVeXFm6sbVJmZzPQEQR3Jr7W8YcTjkqC5hT2qrYuIcYG -# Of3Pj4OqdXm1Qqhuwtskxviv7yy3Z+PxJpxKx+2e6zGRaoQmIlLfg/a42XNVHTf6 -# Wzr5k7Q1w7v0uA/sFsgyKmI7HzKHX08xDDSmJooXA5btD6B0lx/Lqs6Qb4KthnA7 -# N2IEdJ5sjMIhyHZwBr7fzDskU/+Sgp2UnfqrN1Vda/gb+pmlbJwi8MphvElYzjT7 -# PZK2Dm4eorcjx7T2QVe3EIelLuGbxzybblZoRTkCAwEAAaOCAUkwggFFMB0GA1Ud -# DgQWBBTLRIXl8ZS4Opy7Eii3Tt44zDLZfjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP0 -# 5dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29m -# dC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw -# MjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt -# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB -# /wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOC -# AgEAEtEPBYwpt4JioSq0joGzwqYX6SoNH7YbqpgArdlnrdt6u3ukKREluKEVqS2X -# ajXxx0UkXGc4Xi9dp2bSxpuyQnTkq+IQwkg7p1dKrwAa2vdmaNzz3mrSaeUEu40y -# CThHwquQkweoG4eqRRZe19OtVSmDDNC3ZQ6Ig0qz79vivXgy5dFWk4npxA5LxSGR -# 4wBaXaIuVhoEa06vd/9/2YsQ99bCiR7SxJRt1XrQ5kJGHUi0Fhgz158qvXgfmq7q -# NqfqfTSmsQRrtbe4Zv/X+qPo/l6ae+SrLkcjRfr0ONV0vFVuNKx6Cb90D5LgNpc9 -# x8V/qIHEr+JXbWXW6mARVVqNQCmXlVHjTBjhcXwSmadR1OotcN/sKp2EOM9JPYr8 -# 6O9Y/JAZC9zug9qljKTroZTfYA7LIdcmPr69u1FSD/6ivL6HRHZd/k2EL7FtZwzN -# cRRdFF/VgpkOxHIfqvjXambwoMoT+vtGTtqgoruhhSk0bM1F/pBpi/nPZtVNLGTN -# aK8Wt6kscbC9G6f09gz/wBBJOBmvTLPOOT/3taCGSoJoDABWnK+De5pie4KX8Bxx -# KQbJvxz7vRsVJ5R6mGx+Bvav5AjsxvZZw6eQmkI0vPRckxL9TCVCfWS0uyIKmyo6 -# TdosnbBO/osre7r0jS9AH8spEqVlhFcpQNfOg/CvdS2xNVMwggdxMIIFWaADAgEC -# AhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQG -# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG -# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQg -# Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVa -# Fw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n -# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y -# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIC -# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V -# gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF -# RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3X -# D9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoP -# z130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+ -# tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5Jas -# AUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/b -# fV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuv -# XsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg -# 8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzF -# a/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqP -# nhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw -# IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf -# pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBB -# MD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0Rv -# Y3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGC -# NxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8w -# HwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmg -# R4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWlj -# Um9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEF -# BQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29D -# ZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEs -# H2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk -# wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL -# btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCg -# vxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsId -# w2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2 -# zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23K -# jgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beu -# yOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/ -# tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjm -# jJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBj -# U02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHS -# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk -# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRN -# aWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRo -# YWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQg -# VGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBlnNiQ85uX9nN4KRJt -# /gHkJx4JCKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n -# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y -# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0G -# CSqGSIb3DQEBBQUAAgUA5zKDYzAiGA8yMDIyMTIwMTA5MzUzMVoYDzIwMjIxMjAy -# MDkzNTMxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDnMoNjAgEAMAcCAQACAgrQ -# MAcCAQACAhHbMAoCBQDnM9TjAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB -# hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA -# ZK/piCRaXFXG2LtX/uxFkM4g636PdnoqkQsYT2Wt41UPOnyZIhhfI8x3xWBuC10O -# pdkSS7OBk9XOaWXhWifJkEvrOLmDVCDHTwEdhydc72RwGvNPvzRWFbDW6jPmLzvW -# Iv8sku47mEFUyEJFpm0Pkvcv9Ju283rNLgTnE+j2TzIxggQNMIIECQIBATCBkzB8 -# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk -# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N -# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAbT7gAhEBdIt+gABAAAB -# tDANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE -# MC8GCSqGSIb3DQEJBDEiBCDsi0nSDXjcRziiWT5E6D69b2A7v61NQwDBThY8nQqf -# TDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINPI93vmozBwBlFxvfr/rElr -# eFPR4ux7vXKx2ni3AfcGMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT -# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m -# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB -# IDIwMTACEzMAAAG0+4AIRAXSLfoAAQAAAbQwIgQgTTwWuulpBUWwCwXUoCvjAqcl -# OeKQzNs+akRCfe+qoLkwDQYJKoZIhvcNAQELBQAEggIAFLxNl+dKXZasFnbmUTAC -# uek1A+3ozRRAWO9ShD699CKuuHYoXT4ZFNtWBtOvWNjE+N4nZ4a4G86nIQ0fZYRf -# Yc64Iq3fiEV6Kwk2+PfIpWJ9XKY40kT5KXJxKH9/9f7RCIgvvFOiZmqV8XB+SoQB -# hifwYxsUO6JnZz+QKFB88Lf6vMDInUyeBQnP9md4Mw4gKPOe+n1OS+b9zvoGkqGx -# gPyoZowu6cpps7xjJ/Eqa0f30N/iSayxsIwS/acp1CAqw9HJfFMIzWR8gjjOKdOE -# 1sZxEbsfHPVz1xEbES2NgY5TBJ+S99nD12WrRSRWib+nF7igkiOhIeexRkeBGRuR -# 7crxD1k3HVP+j5GuK2QFbpcceSp7QE/IlAPIeMGn3duDIGFbQ/afUbxXjav8zMDV -# k5q5InVoIGqK40kO2pq+wXFKn+0m1BIZWFUnbbMMTaFLmj7qHouNQZfhdLkv0sEX -# pyzlUVg9BlwnPpNGIObyctKT2TsHmmYqHenw0fnGb2e3LRrGYeQiw2wKI+65UN76 -# ecFxSE1cDKhk+GQuELjJ9zc/WhIrPXrONd9PeofWglvTjhas8mSpF1HroD0Rptcj -# xOGkiBur6y0wzq3BqlfWy2meFVISStCUfeAHALsqDa/fXdXud8MuVzerYM1Ky8Ug -# ar0wCCF+uxryNK3EW2QfmvY= -# SIG # End signature block diff --git a/Modules/Az.Accounts/2.10.4/StartupScripts/InitializeAssemblyResolver.ps1 b/Modules/Az.Accounts/2.10.4/StartupScripts/InitializeAssemblyResolver.ps1 deleted file mode 100644 index c72dcd9b5db3..000000000000 --- a/Modules/Az.Accounts/2.10.4/StartupScripts/InitializeAssemblyResolver.ps1 +++ /dev/null @@ -1,234 +0,0 @@ -if ($PSEdition -eq 'Desktop') { - try { - [Microsoft.Azure.Commands.Profile.Utilities.CustomAssemblyResolver]::Initialize() - } - catch { - Write-Warning $_ - } -} -else { - try { - Add-Type -Path ([System.IO.Path]::Combine($PSScriptRoot, "..", "Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll")) | Out-Null - $assemblyLoadContextFolder = [System.IO.Path]::Combine($PSScriptRoot, "..", "AzSharedAlcAssemblies") - Write-Debug "Registering Az shared AssemblyLoadContext for path: '$assemblyLoadContextFolder'." - [Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.AzAssemblyLoadContextInitializer]::RegisterAzSharedAssemblyLoadContext($assemblyLoadContextFolder) - Write-Debug "AssemblyLoadContext registered." - } - catch { - Write-Warning $_ - } -} -# SIG # Begin signature block -# MIInpQYJKoZIhvcNAQcCoIInljCCJ5ICAQExDzANBglghkgBZQMEAgEFADB5Bgor -# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCfno9x0LEd5gPe -# 4cvAg6ULJtMLR6g+Xis+I4rbSZlHZqCCDYUwggYDMIID66ADAgECAhMzAAACzfNk -# v/jUTF1RAAAAAALNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NjAyWhcNMjMwNTExMjA0NjAyWjB0MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDrIzsY62MmKrzergm7Ucnu+DuSHdgzRZVCIGi9CalFrhwtiK+3FIDzlOYbs/zz -# HwuLC3hir55wVgHoaC4liQwQ60wVyR17EZPa4BQ28C5ARlxqftdp3H8RrXWbVyvQ -# aUnBQVZM73XDyGV1oUPZGHGWtgdqtBUd60VjnFPICSf8pnFiit6hvSxH5IVWI0iO -# nfqdXYoPWUtVUMmVqW1yBX0NtbQlSHIU6hlPvo9/uqKvkjFUFA2LbC9AWQbJmH+1 -# uM0l4nDSKfCqccvdI5l3zjEk9yUSUmh1IQhDFn+5SL2JmnCF0jZEZ4f5HE7ykDP+ -# oiA3Q+fhKCseg+0aEHi+DRPZAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU0WymH4CP7s1+yQktEwbcLQuR9Zww -# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh -# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzQ3MDUzMDAfBgNVHSMEGDAW -# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw -# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov -# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx -# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB -# AE7LSuuNObCBWYuttxJAgilXJ92GpyV/fTiyXHZ/9LbzXs/MfKnPwRydlmA2ak0r -# GWLDFh89zAWHFI8t9JLwpd/VRoVE3+WyzTIskdbBnHbf1yjo/+0tpHlnroFJdcDS -# MIsH+T7z3ClY+6WnjSTetpg1Y/pLOLXZpZjYeXQiFwo9G5lzUcSd8YVQNPQAGICl -# 2JRSaCNlzAdIFCF5PNKoXbJtEqDcPZ8oDrM9KdO7TqUE5VqeBe6DggY1sZYnQD+/ -# LWlz5D0wCriNgGQ/TWWexMwwnEqlIwfkIcNFxo0QND/6Ya9DTAUykk2SKGSPt0kL -# tHxNEn2GJvcNtfohVY/b0tuyF05eXE3cdtYZbeGoU1xQixPZAlTdtLmeFNly82uB -# VbybAZ4Ut18F//UrugVQ9UUdK1uYmc+2SdRQQCccKwXGOuYgZ1ULW2u5PyfWxzo4 -# BR++53OB/tZXQpz4OkgBZeqs9YaYLFfKRlQHVtmQghFHzB5v/WFonxDVlvPxy2go -# a0u9Z+ZlIpvooZRvm6OtXxdAjMBcWBAsnBRr/Oj5s356EDdf2l/sLwLFYE61t+ME -# iNYdy0pXL6gN3DxTVf2qjJxXFkFfjjTisndudHsguEMk8mEtnvwo9fOSKT6oRHhM -# 9sZ4HTg/TTMjUljmN3mBYWAWI5ExdC1inuog0xrKmOWVMIIHejCCBWKgAwIBAgIK -# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV -# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv -# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm -# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw -# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE -# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD -# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG -# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la -# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc -# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D -# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ -# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk -# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 -# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd -# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL -# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd -# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 -# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS -# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI -# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL -# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD -# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv -# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 -# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF -# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h -# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA -# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn -# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 -# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b -# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ -# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy -# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp -# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi -# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb -# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS -# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL -# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX -# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGXYwghlyAgEBMIGVMH4x -# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt -# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p -# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAALN82S/+NRMXVEAAAAA -# As0wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw -# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMhZ -# IFKhBqIU9Smw8OeOB4Jo981qDl5AJTByMAMhXKMAMEIGCisGAQQBgjcCAQwxNDAy -# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20wDQYJKoZIhvcNAQEBBQAEggEAih4rGi5CJ0u/26i0xE29jyb/eJmmhCLovKXr -# +IWul3ByW7fChm0MV7P4PHAq7FyK7BvowBY//6+DYC3y+qFNTe6yv0QGSxuuh28K -# INxJz73byeHGK5e4lzq6RDofMRFT4qLgSMvaB71Vvk5e+duE1OL3ADDd4lqNYwvw -# gZJ58ULNclWMSDYlrjLTHDlJgQ/71i4KxgSHK5lqZNx7r4trApNETQqsX81KX1Sx -# yLIlpkM6ubjJzCCsgluOlYq1564SJaTTaWZH1hHfuRmnFaYlniDk3s+ZWpKsGVw1 -# 6ti+nHqZmjeQx7rAkSnTL/ZTkW2bCGa76mnIX/GzdwxeXo7laKGCFwAwghb8Bgor -# BgEEAYI3AwMBMYIW7DCCFugGCSqGSIb3DQEHAqCCFtkwghbVAgEDMQ8wDQYJYIZI -# AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE -# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBrzWMpz4zkcURmvZUSNBsSEdQSAxn1e151 -# VZDAUa9p+wIGY2zinEBEGBMyMDIyMTIwMTEwMTUyOC44ODhaMASAAgH0oIHQpIHN -# MIHKMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH -# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL -# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMg -# VFNTIEVTTjpERDhDLUUzMzctMkZBRTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt -# U3RhbXAgU2VydmljZaCCEVcwggcMMIIE9KADAgECAhMzAAABxQPNzSGh9O85AAEA -# AAHFMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo -# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y -# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw -# MB4XDTIyMTEwNDE5MDEzMloXDTI0MDIwMjE5MDEzMlowgcoxCzAJBgNVBAYTAlVT -# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK -# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy -# aWNhIE9wZXJhdGlvbnMxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkREOEMtRTMz -# Ny0yRkFFMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC -# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq0hds70eX23J7pappaKXRhz+ -# TT7JJ3OvVf3+N8fNpxRs5jY4hEv3BV/w5EWXbZdO4m3xj01lTI/xDkq+ytjuiPe8 -# xGXsZxDntv7L1EzMd5jISqJ+eYu8kgV056mqs8dBo55xZPPPcxf5u19zn04aMQF5 -# PXV/C4ZLSjFa9IFNcribdOm3lGW1rQRFa2jUsup6gv634q5UwH09WGGu0z89Rbtb -# yM55vmBgWV8ed6bZCZrcoYIjML8FRTvGlznqm6HtwZdXMwKHT3a/kLUSPiGAsrIg -# Ezz7NpBpeOsgs9TrwyWTZBNbBwyIACmQ34j+uR4et2hZk+NH49KhEJyYD2+dOIaD -# GB2EUNFSYcy1MkgtZt1eRqBB0m+YPYz7HjocPykKYNQZ7Tv+zglOffCiax1jOb0u -# 6IYC5X1Jr8AwTcsaDyu3qAhx8cFQN9DDgiVZw+URFZ8oyoDk6sIV1nx5zZLy+hNt -# akePX9S7Y8n1qWfAjoXPE6K0/dbTw87EOJL/BlJGcKoFTytr0zPg/MNJSb6f2a/w -# DkXoGCGWJiQrGTxjOP+R96/nIIG05eE1Lpky2FOdYMPB4DhW7tBdZautepTTuShm -# gn+GKER8AoA1gSSk1EC5ZX4cppVngJpblMBu8r/tChfHVdXviY6hDShHwQCmZqZe -# bgSYHnHl4urE+4K6ZC8CAwEAAaOCATYwggEyMB0GA1UdDgQWBBRU6rs4v1mxNYG/ -# rtpLwrVwek0FazAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV -# HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny -# bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI -# KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy -# MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0G -# CSqGSIb3DQEBCwUAA4ICAQCMqN58frMHOScciK+Cdnr6dK8fTsgQDeZ9bvQjCuxN -# IJZJ92+xpeKRCf3Xq47qdRykkKUnZC6dHhLwt1fhwyiy/LfdVQ9yf1hYZ/RpTS+z -# 0hnaoK+P/IDAiUNm32NXLhDBu0P4Sb/uCV4jOuNUcmJhppBQgQVhFx/57JYk1LCd -# jIee//GrcfbkQtiYob9Oa93DSjbsD1jqaicEnkclUN/mEm9ZsnCnA1+/OQDp/8Q4 -# cPfH94LM4J6X0NtNBeVywvWH0wuMaOJzHgDLCeJUkFE9HE8sBDVedmj6zPJAI+7o -# zLjYqw7i4RFbiStfWZSGjwt+lLJQZRWUCcT3aHYvTo1YWDZskohWg77w9fF2QbiO -# 9DfnqoZ7QozHi7RiPpbjgkJMAhrhpeTf/at2e9+HYkKObUmgPArH1Wjivwm1d7PY -# WsarL7u5qZuk36Gb1mETS1oA2XX3+C3rgtzRohP89qZVf79lVvjmg34NtICK/pMk -# 99SButghtipFSMQdbXUnS2oeLt9cKuv1MJu+gJ83qXTNkQ2QqhxtNRvbE9QqmqJQ -# w5VW/4SZze1pPXxyOTO5yDq+iRIUubqeQzmUcCkiyNuCLHWh8OLCI5mIOC1iLtVD -# f2lw9eWropwu5SDJtT/ZwqIU1qb2U+NjkNcj1hbODBRELaTTWd91RJiUI9ncJkGg -# /jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL -# BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH -# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV -# BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X -# DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR -# BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p -# Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh -# bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM -# 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm -# 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB -# RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb -# fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO -# Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw -# XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW -# /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w -# EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK -# Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 -# BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH -# CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB -# BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v -# BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM -# KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 -# LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF -# BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD -# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW -# BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny -# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH -# AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp -# L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF -# AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx -# Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ -# iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 -# pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw -# C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 -# T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO -# Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL -# mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L -# wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 -# m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE -# 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLOMIICNwIB -# ATCB+KGB0KSBzTCByjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x -# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv -# bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UE -# CxMdVGhhbGVzIFRTUyBFU046REQ4Qy1FMzM3LTJGQUUxJTAjBgNVBAMTHE1pY3Jv -# c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVACEAGvYXZJK7 -# cUo62+LvEYQEx7/noIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh -# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD -# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw -# MTAwDQYJKoZIhvcNAQEFBQACBQDnMmcuMCIYDzIwMjIxMjAxMDczNTEwWhgPMjAy -# MjEyMDIwNzM1MTBaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOcyZy4CAQAwCgIB -# AAICFdECAf8wBwIBAAICEc0wCgIFAOczuK4CAQAwNgYKKwYBBAGEWQoEAjEoMCYw -# DAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0B -# AQUFAAOBgQCTOswj+MM6eVTiEw3q9hJrqa6/FuX+SYHftyGLmtjuL90IeX33mRGw -# BfQEVyk6rhJvWFwGDZivrNFY2KPbPXL4uaaZQqMhI0Nf2jCmyx3Xipvdv70S/FPY -# T98n/dpm87dI0kdvEgS0n/ZZrQ/xi0OP0g42D5z8nCtPSREL+P5V+jGCBA0wggQJ -# AgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD -# VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk -# BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABxQPNzSGh -# 9O85AAEAAAHFMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZI -# hvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIMwVlhHOy08Z81N4nsRLbh7DCmdC1eN+ -# wd0rdjtnovvYMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgGQGxkfYkd0wK -# +V09wO0sO+sm8gAMyj5EuKPqvNQ/fLEwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzET -# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV -# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T -# dGFtcCBQQ0EgMjAxMAITMwAAAcUDzc0hofTvOQABAAABxTAiBCBwexJr6BDzq3U4 -# 2PVNGk7suAAoGmIStiopBFuo7bnv8zANBgkqhkiG9w0BAQsFAASCAgBheLveQZIh -# bYEL5BlEEX4wPamEX3ZJb0s3LyCj/AbH6IZqeiRYPA4FnHW6X6q+uq3gAqgr6EgB -# 2ZeRRuINl9NIPtlBI7szhgoCaaqINewyIUPuo5UyJY6UsTm3afIXOoSulveGQunI -# kIu+H3zJ3CZJKxG8l6I3RaBFMpLppUCIb0L+8MfZHeEgoDOb956ejBKst6xdQniG -# DGXvqtEZ9S26Vudm0DR9fFhU8GPH9uO5iEeT6bxDjmDnqw0svJM6YJ47JIjytaPy -# +clw9NgtNVRLAWB7/HTPlz5J27nrj9HX/FF1uI/xxknvRnyjpzr8l2gZm+1+gA+u -# wY3PUD8qBlP3ClrLDJbV5D1b+dgExeYkxVoiDaSNyIq6/irHsWtC7yh/eG74lbQX -# 5HaCH5rDApvxAfXKuZ5YAuD8CCuUw2kcpsdaIB1iW7cbTdNC6S+MytUYtqahLCQl -# LcVgwRUX+uibHtWAZe3sdVE0Gp/1gJf2K1uIjTv0JDCRqnAxZesB+CokLTrkI5Id -# O3nsfg7fq1fTe620ytHdZSEV3dFiF7CWJLD/xpZM5ea7Ey4HD9d62CVeeQbKHHzt -# Q1Gsq+Qg4IkhsY+LDVfaKB/olZuj0I4qGeMVOm0/U91FIshvItndmxTM6uYzJOyE -# pcF/3lYV6SafZJoiC2Xs4D2Nz4Sg1y/mgA== -# SIG # End signature block diff --git a/Modules/Az.Accounts/2.13.1/Accounts.generated.format.ps1xml b/Modules/Az.Accounts/2.13.1/Accounts.generated.format.ps1xml deleted file mode 100644 index 8271581789c7..000000000000 --- a/Modules/Az.Accounts/2.13.1/Accounts.generated.format.ps1xml +++ /dev/null @@ -1,471 +0,0 @@ - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment - - Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment - - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - Name - - - Left - ResourceManagerUrl - - - Left - ActiveDirectoryAuthority - - - Left - Type - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription - - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - Name - - - Left - Id - - - Left - TenantId - - - Left - State - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile - - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - $_.Context.Account.ToString() - - - Left - $_.Context.Subscription.Name - - - Left - $_.Context.Tenant.ToString() - - - Left - $_.Context.Environment.ToString() - - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - - - 40 - Left - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - Name - - - Left - Account - - - Left - $_.Subscription.Name - - - Left - Environment - - - Left - $_.Tenant.ToString() - - - - - - - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - Microsoft.Azure.Commands.Profile.Models.PSAzureTenant - - - - - Left - - - - Left - - - - Left - - - - Left - - - - - - - - Left - Id - - - Left - $_.Name - - - Left - $_.TenantCategory - - - Left - $_.Domains - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/Modules/Az.Accounts/2.13.1/Accounts.types.ps1xml b/Modules/Az.Accounts/2.13.1/Accounts.types.ps1xml deleted file mode 100644 index 2873f28fd663..000000000000 --- a/Modules/Az.Accounts/2.13.1/Accounts.types.ps1xml +++ /dev/null @@ -1,306 +0,0 @@ - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile - - - PSStandardMembers - - - SerializationDepth - 10 - - - - - - - Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext - - - PSStandardMembers - - - SerializationDepth - 10 - - - - - - - Microsoft.Azure.Commands.Common.Authentication.Core.AuthenticationStoreTokenCache - - - PSStandardMembers - - - SerializationMethod - SpecificProperties - - - PropertySerializationSet - - CacheData - - - - - - - - Microsoft.Azure.Commands.Common.Authentication.Core.ProtectedFileTokenCache - - - PSStandardMembers - - - SerializationMethod - SpecificProperties - - - PropertySerializationSet - - CacheData - - - - - - - - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - - - PSStandardMembers - - - SerializationDepth - 10 - - - - - - Microsoft.Azure.Commands.Profile.Models.AzureContextConverter - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/Modules/Az.Accounts/2.13.1/Hyak.Common.dll b/Modules/Az.Accounts/2.13.1/Hyak.Common.dll deleted file mode 100644 index 18a53248894f..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Hyak.Common.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.Common.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.Common.dll deleted file mode 100644 index 1c9d8e2a0ef5..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.Common.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.AssemblyLoading.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.AssemblyLoading.dll deleted file mode 100644 index 38f5f8542077..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.AssemblyLoading.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll deleted file mode 100644 index 77cc1c46f5a7..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll deleted file mode 100644 index d8429b2b6881..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authentication.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authentication.dll deleted file mode 100644 index 1503a5b6d3ac..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authentication.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll deleted file mode 100644 index acc0eb23524f..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authenticators.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authenticators.dll deleted file mode 100644 index 1d35ab395d17..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Authenticators.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Authorization.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Authorization.dll deleted file mode 100644 index 4b6131e2a0f6..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Authorization.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll deleted file mode 100644 index afd56a7b9208..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Network.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Network.dll deleted file mode 100644 index b35c96f4c5cb..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Network.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll deleted file mode 100644 index 6b3270044fbc..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll deleted file mode 100644 index eaa53e5a4ac9..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Common.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Common.dll deleted file mode 100644 index 2443eb5dd56a..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Common.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Rest.ClientRuntime.Azure.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Rest.ClientRuntime.Azure.dll deleted file mode 100644 index 1d99c7015912..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Rest.ClientRuntime.Azure.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Rest.ClientRuntime.dll b/Modules/Az.Accounts/2.13.1/Microsoft.Rest.ClientRuntime.dll deleted file mode 100644 index a4fca7488baf..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Rest.ClientRuntime.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.WindowsAzure.Storage.DataMovement.dll b/Modules/Az.Accounts/2.13.1/Microsoft.WindowsAzure.Storage.DataMovement.dll deleted file mode 100644 index 6ac672abd486..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.WindowsAzure.Storage.DataMovement.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.WindowsAzure.Storage.dll b/Modules/Az.Accounts/2.13.1/Microsoft.WindowsAzure.Storage.dll deleted file mode 100644 index 70c5ed6806c6..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.WindowsAzure.Storage.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/PostImportScripts/LoadAuthenticators.ps1 b/Modules/Az.Accounts/2.13.1/PostImportScripts/LoadAuthenticators.ps1 deleted file mode 100644 index 1a6de8a08d69..000000000000 --- a/Modules/Az.Accounts/2.13.1/PostImportScripts/LoadAuthenticators.ps1 +++ /dev/null @@ -1,222 +0,0 @@ -if ($PSEdition -eq 'Desktop') { - try { - [Microsoft.Azure.Commands.Profile.Utilities.CustomAssemblyResolver]::Initialize() - } catch {} -} -# SIG # Begin signature block -# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor -# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBn8ROze2QLH/c6 -# GtPhR/BPLgOtmjkNhcq+fFmu16VcrqCCDYUwggYDMIID66ADAgECAhMzAAADTU6R -# phoosHiPAAAAAANNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI4WhcNMjQwMzE0MTg0MzI4WjB0MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDUKPcKGVa6cboGQU03ONbUKyl4WpH6Q2Xo9cP3RhXTOa6C6THltd2RfnjlUQG+ -# Mwoy93iGmGKEMF/jyO2XdiwMP427j90C/PMY/d5vY31sx+udtbif7GCJ7jJ1vLzd -# j28zV4r0FGG6yEv+tUNelTIsFmmSb0FUiJtU4r5sfCThvg8dI/F9Hh6xMZoVti+k -# bVla+hlG8bf4s00VTw4uAZhjGTFCYFRytKJ3/mteg2qnwvHDOgV7QSdV5dWdd0+x -# zcuG0qgd3oCCAjH8ZmjmowkHUe4dUmbcZfXsgWlOfc6DG7JS+DeJak1DvabamYqH -# g1AUeZ0+skpkwrKwXTFwBRltAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUId2Img2Sp05U6XI04jli2KohL+8w -# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh -# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMDUxNzAfBgNVHSMEGDAW -# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw -# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov -# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx -# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB -# ACMET8WuzLrDwexuTUZe9v2xrW8WGUPRQVmyJ1b/BzKYBZ5aU4Qvh5LzZe9jOExD -# YUlKb/Y73lqIIfUcEO/6W3b+7t1P9m9M1xPrZv5cfnSCguooPDq4rQe/iCdNDwHT -# 6XYW6yetxTJMOo4tUDbSS0YiZr7Mab2wkjgNFa0jRFheS9daTS1oJ/z5bNlGinxq -# 2v8azSP/GcH/t8eTrHQfcax3WbPELoGHIbryrSUaOCphsnCNUqUN5FbEMlat5MuY -# 94rGMJnq1IEd6S8ngK6C8E9SWpGEO3NDa0NlAViorpGfI0NYIbdynyOB846aWAjN -# fgThIcdzdWFvAl/6ktWXLETn8u/lYQyWGmul3yz+w06puIPD9p4KPiWBkCesKDHv -# XLrT3BbLZ8dKqSOV8DtzLFAfc9qAsNiG8EoathluJBsbyFbpebadKlErFidAX8KE -# usk8htHqiSkNxydamL/tKfx3V/vDAoQE59ysv4r3pE+zdyfMairvkFNNw7cPn1kH -# Gcww9dFSY2QwAxhMzmoM0G+M+YvBnBu5wjfxNrMRilRbxM6Cj9hKFh0YTwba6M7z -# ntHHpX3d+nabjFm/TnMRROOgIXJzYbzKKaO2g1kWeyG2QtvIR147zlrbQD4X10Ab -# rRg9CpwW7xYxywezj+iNAc+QmFzR94dzJkEPUSCJPsTFMIIHejCCBWKgAwIBAgIK -# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV -# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv -# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm -# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw -# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE -# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD -# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG -# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la -# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc -# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D -# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ -# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk -# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 -# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd -# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL -# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd -# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 -# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS -# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI -# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL -# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD -# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv -# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 -# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF -# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h -# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA -# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn -# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 -# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b -# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ -# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy -# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp -# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi -# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb -# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS -# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL -# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX -# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x -# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt -# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p -# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANNTpGmGiiweI8AAAAA -# A00wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw -# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC8M -# Xy0xGn+XGeN5xhSUhsVdQGTLtuHOS5+U3UgQ1k53MEIGCisGAQQBgjcCAQwxNDAy -# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20wDQYJKoZIhvcNAQEBBQAEggEAf/y9IwVq9QTOrbQE7i6AVISmUE6gxgH9PaqX -# D6xL8+9cpj9Y6/kfZ6Zw1Z04+XY4c5dhmIJuWcRjx+i5yXFmp0fyaDfNpalcQlJv -# 1yplKVfyAsVpod7RIH4YvrwP2c/gvYSLRF9k1a/QyIT4yTfPFGaR42tZ0MAyWHhz -# t5ZdXN3dPJt865YoEzv7pPZN29w4mjfr78s6XxeYYARLHPdw/rChVioeia9TyNl9 -# QCKfm9Kar9oDLel2pMgRuonn40KhF85e93XvVLO1PMGXzljlkGWY7PmHuXiOJeyS -# xOe/+p56sTLtL2yIjl/8SDLVGi7LJ7Y93hQGv9yd8U9Tio/mVqGCF5cwgheTBgor -# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI -# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE -# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAkPO6Va7JVENY1DGO3Rgl+LBuXva2N4CJh -# CxPTspOx1QIGZQP2LMVBGBMyMDIzMDkyMDA1NTA0NC41MDZaMASAAgH0oIHRpIHO -# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH -# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL -# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk -# IFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l -# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAc1VByrnysGZHQAB -# AAABzTANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz -# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv -# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx -# MDAeFw0yMzA1MjUxOTEyMDVaFw0yNDAyMDExOTEyMDVaMIHLMQswCQYDVQQGEwJV -# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE -# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l -# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w -# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw -# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDTOCLVS2jmEWOqxzygW7s6 -# YLmm29pjvA+Ch6VL7HlTL8yUt3Z0KIzTa2O/Hvr/aJza1qEVklq7NPiOrpBAIz65 -# 7LVxwEc4BxJiv6B68a8DQiF6WAFFNaK3WHi7TfxRnqLohgNz7vZPylZQX795r8MQ -# vX56uwjj/R4hXnR7Na4Llu4mWsml/wp6VJqCuxZnu9jX4qaUxngcrfFT7+zvlXCl -# wLah2n0eGKna1dOjOgyK00jYq5vtzr5NZ+qVxqaw9DmEsj9vfqYkfQZry2JO5wmg -# XX79Ox7PLMUfqT4+8w5JkdSMoX32b1D6cDKWRUv5qjiYh4o/a9ehE/KAkUWlSPbb -# DR/aGnPJLAGPy2qA97YCBeeIJjRKURgdPlhE5O46kOju8nYJnIvxbuC2Qp2jxwc6 -# rD9M6Pvc8sZIcQ10YKZVYKs94YPSlkhwXwttbRY+jZnQiDm2ZFjH8SPe1I6ERcfe -# YX1zCYjEzdwWcm+fFZmlJA9HQW7ZJAmOECONtfK28EREEE5yzq+T3QMVPhiEfEhg -# cYsh0DeoWiYGsDiKEuS+FElMMyT456+U2ZRa2hbRQ97QcbvaAd6OVQLp3TQqNEu0 -# es5Zq0wg2CADf+QKQR/Y6+fGgk9qJNJW3Mu771KthuPlNfKss0B1zh0xa1yN4qC3 -# zoE9Uq6T8r7G3/OtSFms4wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFKGT+aY2aZrB -# AJVIZh5kicokfNWaMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G -# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv -# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs -# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 -# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy -# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH -# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBSqG3ppKIU+i/E -# MwwtotoxnKfw0SX/3T16EPbjwsAImWOZ5nLAbatopl8zFY841gb5eiL1j81h4DiE -# iXt+BJgHIA2LIhKhSscd79oMbr631DiEqf9X5LZR3V3KIYstU3K7f5Dk7tbobuHu -# +6fYM/gOx44sgRU7YQ+YTYHvv8k4mMnuiahJRlU/F2vavcHU5uhXi078K4nSRAPn -# WyX7gVi6iVMBBUF4823oPFznEcHup7VNGRtGe1xvnlMd1CuyxctM8d/oqyTsxwlJ -# AM5F/lDxnEWoSzAkad1nWvkaAeMV7+39IpXhuf9G3xbffKiyBnj3cQeiA4SxSwCd -# nx00RBlXS6r9tGDa/o9RS01FOABzKkP5CBDpm4wpKdIU74KtBH2sE5QYYn7liYWZ -# r2f/U+ghTmdOEOPkXEcX81H4dRJU28Tj/gUZdwL81xah8Kn+cB7vM/Hs3/J8tF13 -# ZPP+8NtX3vu4NrchHDJYgjOi+1JuSf+4jpF/pEEPXp9AusizmSmkBK4iVT7NwVtR -# nS1ts8qAGHGPg2HPa4b2u9meueUoqNVtMhbumI1y+d9ZkThNXBXz2aItT2C99DM3 -# T3qYqAUmvKUryVSpMLVpse4je5WN6VVlCDFKWFRH202YxEVWsZ5baN9CaqCbCS0E -# a7s9OFLaEM5fNn9m5s69lD/ekcW2qTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb -# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI -# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv -# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj -# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy -# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT -# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE -# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB -# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI -# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo -# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y -# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v -# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG -# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS -# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr -# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM -# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL -# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF -# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu -# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE -# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn -# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW -# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 -# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi -# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV -# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js -# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx -# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 -# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv -# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn -# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 -# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 -# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU -# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF -# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ -# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU -# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi -# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm -# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq -# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx -# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT -# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp -# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVF -# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK -# AQEwBwYFKw4DAhoDFQBoqfem2KKzuRZjISYifGolVOdyBKCBgzCBgKR+MHwxCzAJ -# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k -# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv -# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6LRjDzAi -# GA8yMDIzMDkxOTE4MTIzMVoYDzIwMjMwOTIwMTgxMjMxWjB3MD0GCisGAQQBhFkK -# BAExLzAtMAoCBQDotGMPAgEAMAoCAQACAhpaAgH/MAcCAQACAhNWMAoCBQDotbSP -# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh -# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALTbRIUnATvJxQER3PTF/m7f -# ea2mmC38vdy89JNDWbAETiN+HOhqZRgyGz1otnOANH++7NjRRSrh8byXARE8w1dN -# AVpbbjDea3JZt2zTkA6uRN/vjuifXHSz470WR6P8Mm3KhMtOK4AYLam5Xe1bnjAv -# JU02cI0r1MUOqkWJa/2Il+9Dm1raxizVGFUvgSLHDgxpFgfins0MBOg4RQTpRDIP -# arFUPTmbFhZfTBa2DAiHGcy9hPO1pNUY3FKdAMYkRxt9CAodlmkueGu6oiSxRd3M -# TPqGHQx9pJzJuE6yM0SZO/J0O5PnHIRc7RMdy0XikWk8D3SmDYFQOOxk7noeloYx -# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv -# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 -# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA -# Ac1VByrnysGZHQABAAABzTANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD -# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDMuF7QDQHme8LEs4NWCnOa -# 8jbgJtGZELxoEEYiDH+efzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOJm -# pfitVr1PZGgvTEdTpStUc6GNh7LNroQBKwpURpkKMIGYMIGApH4wfDELMAkGA1UE -# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc -# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 -# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHNVQcq58rBmR0AAQAAAc0wIgQgpXNo -# CR5udEHFtsK4vRweYQG6+tUY8EhPATlSEIELPDswDQYJKoZIhvcNAQELBQAEggIA -# iFTcLZ0vwFJzK+Rqanq7AynGwJuFJLGY6whQgWb+a8jLVtlCBrd5w36Xa3DfTbUO -# KSNVOq3JahGUSLZwnfm69YOiH8xujOMozBs7lgnTwoEfFchjFhGxMUxjC7YVuqph -# 82Q6e/qzSHMhNsbVoL7G/EA9lGIQ2rjxiREnh5IbiAvrrYyYrIHUGux7U/gXUE3W -# UzXMCNAuQrAXgC1I4CRfv8gRR1D1Zf27juawIsubcJ+X4NsHsrZlUChB4Jvcli5U -# +0BHtqXZl0jesLtdnxXcZQrZR8N5yMAr+J9ozW4F5l/Nw/K3JO/5XeR3tGjTpKWT -# qd9YPyvhJpn7WJGeOb60ahoyNkCPjdJXCfx7tMRYztCzlQVkqsbZmaWXAOPBpCJy -# KJW7TTHceNGuQxTbZ62LPX+3X+Li0I5QL+fN/CyvajxlbkONe6p7mEO1GwyEoBHK -# aK7p3pH45Fyn9pedZpWRnwNKFCtm7xIGrjD8dwh/SKnQQn0UZCOm6Z2MTA2dexh5 -# tckF0e9H6wsS2ty7bQjaxuIu7bRVIOv7N58yLZvZ/JpjuxTXTxJuxPmlAsBq4DPk -# 6oHV7zY0K9mbyoGUw0Hie5ZW+i15UGOQYjt9ORg38GLgv4mt3o4v78J0X1HTWDGt -# IKZzmt/ZsnE2gTde52Wujm56LnstUoCXuTKlLP5MTGA= -# SIG # End signature block diff --git a/Modules/Az.Accounts/2.13.1/StartupScripts/AzError.ps1 b/Modules/Az.Accounts/2.13.1/StartupScripts/AzError.ps1 deleted file mode 100644 index 5379b99cf34a..000000000000 --- a/Modules/Az.Accounts/2.13.1/StartupScripts/AzError.ps1 +++ /dev/null @@ -1,281 +0,0 @@ -function Write-InstallationCheckToFile -{ - Param($installationchecks) - if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore) - { - Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide") - } - - $installationchecks.Add("AzSideBySideCheck","true") - try - { - if (Test-Path $pathToInstallationChecks -ErrorAction Ignore) - { - Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop - } - - $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop - if (Test-Path $pathToInstallDir -ErrorAction Ignore) - { - New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop) - } - } - catch - { - Write-Verbose "Installation checks failed to write to file." - } -} - -if (!($env:SkipAzInstallationChecks -eq "true")) -{ - $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json" - $installationchecks = @{} - if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore)) - { - Write-InstallationCheckToFile $installationchecks - } - else - { - try - { - ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value } - } - catch - { - Write-InstallationCheckToFile $installationchecks - } - - if (!$installationchecks.ContainsKey("AzSideBySideCheck")) - { - Write-InstallationCheckToFile $installationchecks - } - } -} - -if (Get-Module AzureRM.profile -ErrorAction Ignore) -{ - Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") - throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") -} - -Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore -# SIG # Begin signature block -# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor -# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l -# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDYUwggYDMIID66ADAgECAhMzAAADTU6R -# phoosHiPAAAAAANNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI4WhcNMjQwMzE0MTg0MzI4WjB0MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDUKPcKGVa6cboGQU03ONbUKyl4WpH6Q2Xo9cP3RhXTOa6C6THltd2RfnjlUQG+ -# Mwoy93iGmGKEMF/jyO2XdiwMP427j90C/PMY/d5vY31sx+udtbif7GCJ7jJ1vLzd -# j28zV4r0FGG6yEv+tUNelTIsFmmSb0FUiJtU4r5sfCThvg8dI/F9Hh6xMZoVti+k -# bVla+hlG8bf4s00VTw4uAZhjGTFCYFRytKJ3/mteg2qnwvHDOgV7QSdV5dWdd0+x -# zcuG0qgd3oCCAjH8ZmjmowkHUe4dUmbcZfXsgWlOfc6DG7JS+DeJak1DvabamYqH -# g1AUeZ0+skpkwrKwXTFwBRltAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUId2Img2Sp05U6XI04jli2KohL+8w -# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh -# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMDUxNzAfBgNVHSMEGDAW -# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw -# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov -# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx -# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB -# ACMET8WuzLrDwexuTUZe9v2xrW8WGUPRQVmyJ1b/BzKYBZ5aU4Qvh5LzZe9jOExD -# YUlKb/Y73lqIIfUcEO/6W3b+7t1P9m9M1xPrZv5cfnSCguooPDq4rQe/iCdNDwHT -# 6XYW6yetxTJMOo4tUDbSS0YiZr7Mab2wkjgNFa0jRFheS9daTS1oJ/z5bNlGinxq -# 2v8azSP/GcH/t8eTrHQfcax3WbPELoGHIbryrSUaOCphsnCNUqUN5FbEMlat5MuY -# 94rGMJnq1IEd6S8ngK6C8E9SWpGEO3NDa0NlAViorpGfI0NYIbdynyOB846aWAjN -# fgThIcdzdWFvAl/6ktWXLETn8u/lYQyWGmul3yz+w06puIPD9p4KPiWBkCesKDHv -# XLrT3BbLZ8dKqSOV8DtzLFAfc9qAsNiG8EoathluJBsbyFbpebadKlErFidAX8KE -# usk8htHqiSkNxydamL/tKfx3V/vDAoQE59ysv4r3pE+zdyfMairvkFNNw7cPn1kH -# Gcww9dFSY2QwAxhMzmoM0G+M+YvBnBu5wjfxNrMRilRbxM6Cj9hKFh0YTwba6M7z -# ntHHpX3d+nabjFm/TnMRROOgIXJzYbzKKaO2g1kWeyG2QtvIR147zlrbQD4X10Ab -# rRg9CpwW7xYxywezj+iNAc+QmFzR94dzJkEPUSCJPsTFMIIHejCCBWKgAwIBAgIK -# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV -# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv -# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm -# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw -# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE -# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD -# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG -# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la -# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc -# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D -# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ -# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk -# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 -# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd -# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL -# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd -# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 -# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS -# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI -# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL -# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD -# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv -# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 -# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF -# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h -# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA -# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn -# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 -# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b -# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ -# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy -# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp -# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi -# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb -# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS -# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL -# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX -# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x -# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt -# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p -# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANNTpGmGiiweI8AAAAA -# A00wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw -# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKR+ -# w/DaLVp8ra2PXQQVXZI6DyW6fyW+fzmibTR/vTxzMEIGCisGAQQBgjcCAQwxNDAy -# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20wDQYJKoZIhvcNAQEBBQAEggEAAJ/05iL6/mTJTdXlA3WMNU7DPdukKaJDMocn -# pzyB1C0hLB0o81xP7YSAsUBDAKzunfQ+oBNu6n/owxsHxw8C5aiDdeX87DkrwFEN -# 6Y0/kc3H3LpC+ll1Aq78ia85raDdogkMJNqAZOpaSs/+WPQGmTqATI3FTxjzviyB -# W2d09blFshgmPNB4IKNWZrf0xAZjugWcVe7WjbSnrf9C6Uap/yfFjAm1D+Am86Dy -# 9UYWjaxYSdiYj39a4rawSz2+47doMiSNWEdRzLBWQ3mhzG79emCceHwhCMof3KYZ -# WbXjXm+C738l48ZuzZ50X/w2B7jWQCLLiIdIY0Nczh9n7W+R8qGCF5cwgheTBgor -# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI -# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE -# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDTxg5YDL/sFFSkwNmajR/hD+zpUa9/iONc -# c1T6Gn07AgIGZQPtxMFeGBMyMDIzMDkyMDA1NTA0My40MTNaMASAAgH0oIHRpIHO -# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH -# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL -# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk -# IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l -# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAdB3CKrvoxfG3QAB -# AAAB0DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz -# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv -# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx -# MDAeFw0yMzA1MjUxOTEyMTRaFw0yNDAyMDExOTEyMTRaMIHLMQswCQYDVQQGEwJV -# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE -# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l -# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w -# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw -# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDfMlfn35fvM0XAUSmI5qiG -# 0UxPi25HkSyBgzk3zpYO311d1OEEFz0QpAK23s1dJFrjB5gD+SMw5z6EwxC4CrXU -# 9KaQ4WNHqHrhWftpgo3MkJex9frmO9MldUfjUG56sIW6YVF6YjX+9rT1JDdCDHbo -# 5nZiasMigGKawGb2HqD7/kjRR67RvVh7Q4natAVu46Zf5MLviR0xN5cNG20xwBwg -# ttaYEk5XlULaBH5OnXz2eWoIx+SjDO7Bt5BuABWY8SvmRQfByT2cppEzTjt/fs0x -# p4B1cAHVDwlGwZuv9Rfc3nddxgFrKA8MWHbJF0+aWUUYIBR8Fy2guFVHoHeOze7I -# sbyvRrax//83gYqo8c5Z/1/u7kjLcTgipiyZ8XERsLEECJ5ox1BBLY6AjmbgAzDd -# Nl2Leej+qIbdBr/SUvKEC+Xw4xjFMOTUVWKWemt2khwndUfBNR7Nzu1z9L0Wv7TA -# Y/v+v6pNhAeohPMCFJc+ak6uMD8TKSzWFjw5aADkmD9mGuC86yvSKkII4MayzoUd -# seT0nfk8Y0fPjtdw2Wnejl6zLHuYXwcDau2O1DMuoiedNVjTF37UEmYT+oxC/OFX -# UGPDEQt9tzgbR9g8HLtUfEeWOsOED5xgb5rwyfvIss7H/cdHFcIiIczzQgYnsLyE -# GepoZDkKhSMR5eCB6Kcv/QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDPhAYWS0oA+ -# lOtITfjJtyl0knRRMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G -# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv -# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs -# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 -# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy -# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH -# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCXh+ckCkZaA06S -# NW+qxtS9gHQp4x7G+gdikngKItEr8otkXIrmWPYrarRWBlY91lqGiilHyIlZ3iNB -# UbaNEmaKAGMZ5YcS7IZUKPaq1jU0msyl+8og0t9C/Z26+atx3vshHrFQuSgwTHZV -# pzv7k8CYnBYoxdhI1uGhqH595mqLvtMsxEN/1so7U+b3U6LCry5uwwcz5+j8Oj0G -# UX3b+iZg+As0xTN6T0Qa8BNec/LwcyqYNEaMkW2VAKrmhvWH8OCDTcXgONnnABQH -# BfXK/fLAbHFGS1XNOtr62/iaHBGAkrCGl6Bi8Pfws6fs+w+sE9r3hX9Vg0gsRMoH -# RuMaiXsrGmGsuYnLn3AwTguMatw9R8U5vJtWSlu1CFO5P0LEvQQiMZ12sQSsQAkN -# DTs9rTjVNjjIUgoZ6XPMxlcPIDcjxw8bfeb4y4wAxM2RRoWcxpkx+6IIf2L+b7gL -# HtBxXCWJ5bMW7WwUC2LltburUwBv0SgjpDtbEqw/uDgWBerCT+Zty3Nc967iGaQj -# yYQH6H/h9Xc8smm2n6VjySRx2swnW3hr6Qx63U/xY9HL6FNhrGiFED7ZRKrnwvvX -# vMVQUIEkB7GUEeN6heY8gHLt0jLV3yzDiQA8R8p5YGgGAVt9MEwgAJNY1iHvH/8v -# zhJSZFNkH8svRztO/i3TvKrjb8ZxwjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb -# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI -# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv -# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj -# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy -# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT -# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE -# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB -# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI -# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo -# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y -# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v -# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG -# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS -# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr -# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM -# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL -# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF -# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu -# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE -# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn -# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW -# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 -# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi -# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV -# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js -# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx -# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 -# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv -# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn -# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 -# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 -# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU -# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF -# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ -# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU -# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi -# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm -# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq -# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx -# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT -# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp -# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF -# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK -# AQEwBwYFKw4DAhoDFQC8t8hT8KKUX91lU5FqRP9Cfu9MiaCBgzCBgKR+MHwxCzAJ -# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k -# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv -# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6LUDNzAi -# GA8yMDIzMDkyMDA1MzU1MVoYDzIwMjMwOTIxMDUzNTUxWjB3MD0GCisGAQQBhFkK -# BAExLzAtMAoCBQDotQM3AgEAMAoCAQACAidSAgH/MAcCAQACAhN/MAoCBQDotlS3 -# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh -# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAGtIWKlQ4xjkBGBgoktG9bqb -# W3uOsn29c3JcnP5Eq5RSCeHwCRLqC6bYPnrI0V6uJZGaSe/UiVRIjbQsr2Md6Liu -# 18E+/l27E3rd5NKZ4JapQ+nadT7roP/Q2NkZ+hK8kYvV+j0C2aCVDxM6KKvyfXN3 -# 9vIyVoMXXa4Htf6H6hiqbvBelUMohEcS20RXmTcQgBz/4JqhqXiIJBid/2SRudEp -# P4FKC/q7NZu0Kt9vaka5bpOjFkH8DSdsTmNhCnMsz3k60iD9L7fzqu6bIkCGeO9K -# urvs0V5kghKnZiJZ37Bwtng7KlequE58NxNKkuZrEiwepGU/NMZpgCsT31R2Qgwx -# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv -# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 -# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA -# AdB3CKrvoxfG3QABAAAB0DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD -# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCA5XwcAA1GbklJPMnjaBqpF -# NIgNrpeBP842Vo44Tv3PxTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIAiV -# QAZftNP/Md1E2Yw+fBXa9w6fjmTZ5WAerrTSPwnXMIGYMIGApH4wfDELMAkGA1UE -# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc -# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 -# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHQdwiq76MXxt0AAQAAAdAwIgQgqB/y -# toAW0gc8cem4mHJrpEhQ7NI8Dpr/F6zncI8TlJUwDQYJKoZIhvcNAQELBQAEggIA -# q2johekNXCez3sHPgTENMweCsqyCVgtTV3YML+gpr56aV2vz+Iuy6Bt+8tatbyVW -# ANUYA8RkAftW+u/VvBBJUl0Y/83/DHph0XoaHq0MAZ9zbVWUqU5bcocF4IbZnik9 -# rA86SRXqOrPIK/i4J2vY7dWdPdhV6C8E2jBL0Lx/qiunv2BZy4DfptkRznVY5eRG -# jOcAhlr0s20DS1ylsIuGNf1bloA5Cldc+ObtGVglNPXLKD50YKsCIl4zshQEwubA -# 42PPlGpDcH8JfZAH/ckamL/wQhCi4UdZlVR7NVSMJ19oDlV3Y2ybLw7pVs6UJsqi -# DSzEdW+634lbvORxEWsOeok0J1tlgjjUGhPjMdFh/96qcqPnInvHqvYOcmVUFfYL -# HnquWfMQxvcHyLni96fLcsfGDGsUaNNjSx4vmaIYJknwCadjHIJyChjhYNQb00bz -# aHP6UJDZf2ZcRhuaKdMGV3lWH2Wens4zDgoYSW0iES9FkqIHGh3vy2knZ2CDrY7w -# BdB8PrTm9I7XVen1DEeXtoLusGLn08Jf9UnSXoBq6hptFUJi718OsfXPN26u9/3M -# IKxkdPyvj7pir1X9GaZMyz6eCGJGGtoaBPWAYrJHXoPq/zwpRiGcbK+PLkfI8PRb -# G5flQxQzxdP1hSzAqqE+VCto96sLhASeMZ7gpL87UoQ= -# SIG # End signature block diff --git a/Modules/Az.Accounts/2.13.1/en-US/about_az.help.txt b/Modules/Az.Accounts/2.13.1/en-US/about_az.help.txt deleted file mode 100644 index fb4a5e9becd1..000000000000 --- a/Modules/Az.Accounts/2.13.1/en-US/about_az.help.txt +++ /dev/null @@ -1,50 +0,0 @@ -About topic for Azure PowerShell - about_az - -TOPIC - -about_Az - -SHORT DESCRIPTION - -The Azure Az PowerShell module is a set of cmdlets for managing Azure -resources directly from the PowerShell command line and in PowerShell -scripts. - -LONG DESCRIPTION - -Azure PowerShell provides cross-platform cmdlets for managing Azure -services. All Azure PowerShell cmdlets work on Windows PowerShell 5.1 and -supported versions of PowerShell 7. - -The Azure PowerShell cmdlets follow the naming convention {verb}-Az{noun}. - -- {verb} is an approved PowerShell verb reflecting the corresponding HTTP - operation. - -- {noun} matches or has a close equivalent to the name of the resource. - -The cmdlets produce .NET objects that can be piped between commands -simplifying the sequencing of commands making Azure PowerShell a powerful -solution for scripting and automation purposes. - -A PowerShell module is available for each Azure service. For convenience, -we provide a wrapper module named "Az" that comprises the stable modules. -Modules in preview must be installed independently or via the "AzPreview" -wrapper module. - -Azure PowerShell is frequently updated to include bug fixes and service -updates. It is recommended to plan to update to the most recent version -regularly (a minimum of twice a year). - -GETTING STARTED - -1. Connect to Azure using Connect-AzAccount - -2. Run your first command. For example, create a resource group in the - east US region. - - New-AzResourceGroup -Name "MyResoureGroup" -location "eastus" - -SEE ALSO - -Azure PowerShell documentation: https://learn.microsoft.com/powershell/azure diff --git a/Modules/Az.Accounts/2.13.1/lib/netcoreapp2.1/Azure.Core.dll b/Modules/Az.Accounts/2.13.1/lib/netcoreapp2.1/Azure.Core.dll deleted file mode 100644 index 66f3d3165b86..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netcoreapp2.1/Azure.Core.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netcoreapp2.1/Microsoft.Identity.Client.dll b/Modules/Az.Accounts/2.13.1/lib/netcoreapp2.1/Microsoft.Identity.Client.dll deleted file mode 100644 index 7e98f30fc54a..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netcoreapp2.1/Microsoft.Identity.Client.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netcoreapp3.1/Microsoft.Identity.Client.Extensions.Msal.dll b/Modules/Az.Accounts/2.13.1/lib/netcoreapp3.1/Microsoft.Identity.Client.Extensions.Msal.dll deleted file mode 100644 index 02168e3b1856..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netcoreapp3.1/Microsoft.Identity.Client.Extensions.Msal.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/Azure.Core.dll b/Modules/Az.Accounts/2.13.1/lib/netfx/Azure.Core.dll deleted file mode 100644 index 2593da6045ce..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netfx/Azure.Core.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/Microsoft.Identity.Client.Extensions.Msal.dll b/Modules/Az.Accounts/2.13.1/lib/netfx/Microsoft.Identity.Client.Extensions.Msal.dll deleted file mode 100644 index 87f0bdfe02f2..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netfx/Microsoft.Identity.Client.Extensions.Msal.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/Microsoft.Identity.Client.dll b/Modules/Az.Accounts/2.13.1/lib/netfx/Microsoft.Identity.Client.dll deleted file mode 100644 index 2a1b17bc86a4..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netfx/Microsoft.Identity.Client.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Numerics.Vectors.dll b/Modules/Az.Accounts/2.13.1/lib/netfx/System.Numerics.Vectors.dll deleted file mode 100644 index 08659724d4f8..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Numerics.Vectors.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Reflection.DispatchProxy.dll b/Modules/Az.Accounts/2.13.1/lib/netfx/System.Reflection.DispatchProxy.dll deleted file mode 100644 index 674ced0460de..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Reflection.DispatchProxy.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Security.Cryptography.Cng.dll b/Modules/Az.Accounts/2.13.1/lib/netfx/System.Security.Cryptography.Cng.dll deleted file mode 100644 index 4f4c30e080bd..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Security.Cryptography.Cng.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Text.Encodings.Web.dll b/Modules/Az.Accounts/2.13.1/lib/netfx/System.Text.Encodings.Web.dll deleted file mode 100644 index 6d2b207854ac..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Text.Encodings.Web.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Xml.ReaderWriter.dll b/Modules/Az.Accounts/2.13.1/lib/netfx/System.Xml.ReaderWriter.dll deleted file mode 100644 index 022e63a21a86..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Xml.ReaderWriter.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Azure.Identity.BrokeredAuthentication.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Azure.Identity.BrokeredAuthentication.dll deleted file mode 100644 index 4b4b2f2b663d..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Azure.Identity.BrokeredAuthentication.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Azure.Identity.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Azure.Identity.dll deleted file mode 100644 index 5662a76ad958..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Azure.Identity.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.Bcl.AsyncInterfaces.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.Bcl.AsyncInterfaces.dll deleted file mode 100644 index f2955edfecb7..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.Bcl.AsyncInterfaces.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.Identity.Client.Broker.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.Identity.Client.Broker.dll deleted file mode 100644 index 3e0a147d4bcb..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.Identity.Client.Broker.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.Identity.Client.NativeInterop.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.Identity.Client.NativeInterop.dll deleted file mode 100644 index a7d555909366..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.Identity.Client.NativeInterop.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.IdentityModel.Abstractions.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.IdentityModel.Abstractions.dll deleted file mode 100644 index f793fd89bece..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/Microsoft.IdentityModel.Abstractions.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Buffers.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Buffers.dll deleted file mode 100644 index c517a3b62cc7..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Buffers.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Memory.Data.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Memory.Data.dll deleted file mode 100644 index 6f2a3e0ad07f..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Memory.Data.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Memory.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Memory.dll deleted file mode 100644 index bdfc501e9647..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Memory.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Net.Http.WinHttpHandler.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Net.Http.WinHttpHandler.dll deleted file mode 100644 index 8bd471e74c6e..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Net.Http.WinHttpHandler.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Private.ServiceModel.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Private.ServiceModel.dll deleted file mode 100644 index 3f9f84edf0ed..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Private.ServiceModel.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.ServiceModel.Primitives.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.ServiceModel.Primitives.dll deleted file mode 100644 index c1aa0a64f8f9..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.ServiceModel.Primitives.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Text.Json.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Text.Json.dll deleted file mode 100644 index fe2154a3bf3a..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Text.Json.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Threading.Tasks.Extensions.dll b/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Threading.Tasks.Extensions.dll deleted file mode 100644 index dfab23478ab4..000000000000 Binary files a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Threading.Tasks.Extensions.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.13.1/Accounts.format.ps1xml b/Modules/Az.Accounts/2.19.0/Accounts.format.ps1xml similarity index 60% rename from Modules/Az.Accounts/2.13.1/Accounts.format.ps1xml rename to Modules/Az.Accounts/2.19.0/Accounts.format.ps1xml index 4d28aa4b2f4f..9532544948d6 100644 --- a/Modules/Az.Accounts/2.13.1/Accounts.format.ps1xml +++ b/Modules/Az.Accounts/2.19.0/Accounts.format.ps1xml @@ -336,42 +336,42 @@ - + - - + + - + - - - - - - - + + + + + + + - + - - - - - - - - - - - - + + + + + + + + + + + + @@ -411,144 +411,142 @@ - + - + - - - - - - - - - - + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/Modules/Az.Accounts/2.19.0/Accounts.generated.format.ps1xml b/Modules/Az.Accounts/2.19.0/Accounts.generated.format.ps1xml new file mode 100644 index 000000000000..3c803fe31c4d --- /dev/null +++ b/Modules/Az.Accounts/2.19.0/Accounts.generated.format.ps1xml @@ -0,0 +1,490 @@ + + + + + Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile + + Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile + + + + + Left + + + + Left + + + + Left + + + + Left + + + + + + + + Left + $_.Context.Account.ToString() + + + Left + $_.Context.Subscription.Name + + + Left + $_.Context.Tenant.ToString() + + + Left + $_.Context.Environment.ToString() + + + + + + + + Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext + + Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext + + + + + Left + + + + Left + + + + Left + + + + Left + + + + + + + + Left + $_.Subscription.Name + + + Left + $_.Subscription.Id + + + Left + Account + + + Left + Environment + + + + + + + if([System.String]::IsNullOrEmpty($_.Tenant.Name)){$_.Tenant.Id}else{"$($_.Tenant.Name) ($($_.Tenant.Id))"} + + + + + Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment + + Microsoft.Azure.Commands.Profile.Models.PSAzureEnvironment + + + + + Left + + + + Left + + + + Left + + + + + + + + Left + Name + + + Left + ResourceManagerUrl + + + Left + ActiveDirectoryAuthority + + + + + + + + Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription + + Microsoft.Azure.Commands.Profile.Models.PSAzureSubscription + + + + + Left + + + + Left + + + + Left + + + + + + + + Left + Name + + + Left + Id + + + Left + State + + + + + + + TenantId + + + + + Microsoft.Azure.Commands.Profile.Models.PSAzureTenant + + Microsoft.Azure.Commands.Profile.Models.PSAzureTenant + + + + + Left + + + + Left + + + + Left + + + + Left + + + + + + + + Left + Name + + + Left + Id + + + Left + TenantCategory + + + Left + Domains + + + + + + + + Microsoft.Azure.Commands.Profile.Models.PSHttpResponse + + Microsoft.Azure.Commands.Profile.Models.PSHttpResponse + + + + + + + StatusCode + + + + Content + + + + [Microsoft.Rest.HttpExtensions]::ToJson($_.Headers).ToString() + + + + Method + + + + RequestUri + + + + Version + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/Modules/Az.Accounts/2.19.0/Accounts.types.ps1xml b/Modules/Az.Accounts/2.19.0/Accounts.types.ps1xml new file mode 100644 index 000000000000..ddbadf54ec0c --- /dev/null +++ b/Modules/Az.Accounts/2.19.0/Accounts.types.ps1xml @@ -0,0 +1,304 @@ + + + + Microsoft.Azure.Commands.Profile.Models.Core.PSAzureProfile + + + PSStandardMembers + + + SerializationDepth + 10 + + + + + + + Microsoft.Azure.Commands.Profile.Models.Core.PSAzureContext + + + PSStandardMembers + + + SerializationDepth + 10 + + + + + + + Microsoft.Azure.Commands.Common.Authentication.Core.AuthenticationStoreTokenCache + + + PSStandardMembers + + + SerializationMethod + SpecificProperties + + + PropertySerializationSet + + CacheData + + + + + + + + Microsoft.Azure.Commands.Common.Authentication.Core.ProtectedFileTokenCache + + + PSStandardMembers + + + SerializationMethod + SpecificProperties + + + PropertySerializationSet + + CacheData + + + + + + + + Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer + + + PSStandardMembers + + + SerializationDepth + 10 + + + + + + Microsoft.Azure.Commands.Profile.Models.AzureContextConverter + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/Modules/Az.Accounts/2.13.1/Az.Accounts.psd1 b/Modules/Az.Accounts/2.19.0/Az.Accounts.psd1 similarity index 68% rename from Modules/Az.Accounts/2.13.1/Az.Accounts.psd1 rename to Modules/Az.Accounts/2.19.0/Az.Accounts.psd1 index 8b322becabf0..9ba6ebcd5811 100644 --- a/Modules/Az.Accounts/2.13.1/Az.Accounts.psd1 +++ b/Modules/Az.Accounts/2.19.0/Az.Accounts.psd1 @@ -3,7 +3,7 @@ # # Generated by: Microsoft Corporation # -# Generated on: 9/20/2023 +# Generated on: 23/04/2024 # @{ @@ -12,7 +12,7 @@ RootModule = 'Az.Accounts.psm1' # Version number of this module. -ModuleVersion = '2.13.1' +ModuleVersion = '2.19.0' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' @@ -147,8 +147,9 @@ PrivateData = @{ # IconUri = '' # ReleaseNotes of this module - ReleaseNotes = '* Added the module name in breaking change messages -* Upgraded Microsoft.ApplicationInsights version from 2.13.1 to 2.18.0 ' + ReleaseNotes = '* Preannouncement: The default interactive login experience will change from browser based to Web Account Manager (WAM) based on supported platforms, [learn more]( +https://learn.microsoft.com/en-us/entra/msal/dotnet/acquiring-tokens/desktop-mobile/wam). Only interactive login flow is influeced by WAM. This will take effect from the release of May 21st. +* Fixed secrets detection issues.' # Prerelease string of this module # Prerelease = '' @@ -173,42 +174,42 @@ PrivateData = @{ # SIG # Begin signature block -# MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor +# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAk2HPcwhsJ45gq -# tueQH3lZy0qaJUF7KlbsF568k8m1kaCCDYUwggYDMIID66ADAgECAhMzAAADTU6R -# phoosHiPAAAAAANNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCArfciiF5wF6rdA +# 5JmV66z/5b2rJ60qVEKlwuoBRzqNLaCCDYUwggYDMIID66ADAgECAhMzAAADri01 +# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI4WhcNMjQwMzE0MTg0MzI4WjB0MQsw +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDUKPcKGVa6cboGQU03ONbUKyl4WpH6Q2Xo9cP3RhXTOa6C6THltd2RfnjlUQG+ -# Mwoy93iGmGKEMF/jyO2XdiwMP427j90C/PMY/d5vY31sx+udtbif7GCJ7jJ1vLzd -# j28zV4r0FGG6yEv+tUNelTIsFmmSb0FUiJtU4r5sfCThvg8dI/F9Hh6xMZoVti+k -# bVla+hlG8bf4s00VTw4uAZhjGTFCYFRytKJ3/mteg2qnwvHDOgV7QSdV5dWdd0+x -# zcuG0qgd3oCCAjH8ZmjmowkHUe4dUmbcZfXsgWlOfc6DG7JS+DeJak1DvabamYqH -# g1AUeZ0+skpkwrKwXTFwBRltAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUId2Img2Sp05U6XI04jli2KohL+8w +# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG +# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 +# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 +# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV +# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd +# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh -# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMDUxNzAfBgNVHSMEGDAW +# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB -# ACMET8WuzLrDwexuTUZe9v2xrW8WGUPRQVmyJ1b/BzKYBZ5aU4Qvh5LzZe9jOExD -# YUlKb/Y73lqIIfUcEO/6W3b+7t1P9m9M1xPrZv5cfnSCguooPDq4rQe/iCdNDwHT -# 6XYW6yetxTJMOo4tUDbSS0YiZr7Mab2wkjgNFa0jRFheS9daTS1oJ/z5bNlGinxq -# 2v8azSP/GcH/t8eTrHQfcax3WbPELoGHIbryrSUaOCphsnCNUqUN5FbEMlat5MuY -# 94rGMJnq1IEd6S8ngK6C8E9SWpGEO3NDa0NlAViorpGfI0NYIbdynyOB846aWAjN -# fgThIcdzdWFvAl/6ktWXLETn8u/lYQyWGmul3yz+w06puIPD9p4KPiWBkCesKDHv -# XLrT3BbLZ8dKqSOV8DtzLFAfc9qAsNiG8EoathluJBsbyFbpebadKlErFidAX8KE -# usk8htHqiSkNxydamL/tKfx3V/vDAoQE59ysv4r3pE+zdyfMairvkFNNw7cPn1kH -# Gcww9dFSY2QwAxhMzmoM0G+M+YvBnBu5wjfxNrMRilRbxM6Cj9hKFh0YTwba6M7z -# ntHHpX3d+nabjFm/TnMRROOgIXJzYbzKKaO2g1kWeyG2QtvIR147zlrbQD4X10Ab -# rRg9CpwW7xYxywezj+iNAc+QmFzR94dzJkEPUSCJPsTFMIIHejCCBWKgAwIBAgIK +# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W +# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY +# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV +# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 +# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 +# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t +# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i +# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk +# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK +# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO +# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm @@ -248,67 +249,67 @@ PrivateData = @{ # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX -# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x +# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p -# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANNTpGmGiiweI8AAAAA -# A00wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw -# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPqM -# nLtedTpCCZWzygnrN5qjriZa3nvW0MEUhgHrBf/kMEIGCisGAQQBgjcCAQwxNDAy +# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA +# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw +# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIkJ +# 3Tv/Pa3nfeLUPIe4g4OP/ZliQrEGbEvuClLBsmT7MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20wDQYJKoZIhvcNAQEBBQAEggEAS7p4ZPALh+4+yJuTQhIPP+LV4A+Jom3lI5qs -# lp7zGTEfbcL8TMbAGgLGl186yuYk/eJlpkSh/cGFRhbcBzQUgXmUfAGnRYugqMXE -# VvX3Qil+ivulxYqiozTr9zWcJ3vitlWIAFJqTTmdHjP0smU7TqrS66Tk06fR4sXU -# x5BVXrlrIismo9vw+sA7wI8LHKwTB61N+w9w2QRDXotckocOV5R/T6ySpCkJfjiP -# V/Ht7VO4JbhDXBedTy9uZ6yQdaBJgmF21iJxacaeYL+StSI/OaHApGTHpJo0/l8K -# UzZmO3S3+sUX3NwAyZ6A4iTM3dGMPFTiEykJD41kS/eAZgy+TaGCFywwghcoBgor -# BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI +# b20wDQYJKoZIhvcNAQEBBQAEggEAsPaSTR5+4nDxoUlqmdy7RkYYrx5QwHl6GU6S +# PboiRxNFGj5ufBunQlxrR3J4Obeb2wY5hwcdgs1XH+sAsab6fMFNZtR0EQcj3pnF +# 9accNPvnR2eHNQt1A+uEQLMlIJXv9IZ3YMjwpV4dYgfGRB5c2lEA1YGR08ewQdfu +# XdFhXFqRFtxnsH3pM0PJIWfbck7dYRi4sFQlmStZGtUzXbzzbPYlEVtYg78GJ8FE +# GPEdy0XeapzIzzlACKHUjzRtYQ8ZlG27OcAhYNlaXaKHOCBfoxvQrkyWPP6QkZqp +# uz4gX1WXVopcrL9PKGJzFVqIbRFa5JFEIWrtn04tzeY9oDMeuaGCFykwghclBgor +# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE -# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDzkxGA6Q74EKQNCUJRJIpLLx9SAzmpu+DM -# Ytnz01KnYQIGZN5VuexfGBMyMDIzMDkyMDA2MzM0Ni4wMjVaMASAAgH0oIHYpIHV +# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAXpD5LnCxFdiDm81OJyyEl5bv5hcdjvBCy +# +USTUk+jVgIGZh/SmZY3GBMyMDI0MDQyMzE0MTExOS41ODNaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT -# HVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3Nv -# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAGybkAD -# f26plJIAAQAAAbIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV +# HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv +# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA +# 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg -# UENBIDIwMTAwHhcNMjIwOTIwMjAyMjAxWhcNMjMxMjE0MjAyMjAxWjCB0jELMAkG +# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg -# VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt -# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMqi -# ZTIde/lQ4rC+Bml5f/Wuq/xKTxrfbG23HofmQ+qZAN4GyO73PF3y9OAfpt7Qf2jc -# ldWOGUB+HzBuwllYyP3fx4MY8zvuAuB37FvoytnNC2DKnVrVlHOVcGUL9CnmhDNM -# A2/nskjIf2IoiG9J0qLYr8duvHdQJ9Li2Pq9guySb9mvUL60ogslCO9gkh6FiEDw -# MrwUr8Wja6jFpUTny8tg0N0cnCN2w4fKkp5qZcbUYFYicLSb/6A7pHCtX6xnjqwh -# mJoib3vkKJyVxbuFLRhVXxH95b0LHeNhifn3jvo2j+/4QV10jEpXVW+iC9BsTtR6 -# 9xvTjU51ZgP7BR4YDEWq7JsylSOv5B5THTDXRf184URzFhTyb8OZQKY7mqMh7c8J -# 8w1sEM4XDUF2UZNy829NVCzG2tfdEXZaHxF8RmxpQYBxyhZwY1rotuIS+gfN2eq+ -# hkAT3ipGn8/KmDwDtzAbnfuXjApgeZqwgcYJ8pDJ+y/xU6ouzJz1Bve5TTihkiA7 -# wQsQe6R60Zk9dPdNzw0MK5niRzuQZAt4GI96FhjhlUWcUZOCkv/JXM/OGu/rgSpl -# YwdmPLzzfDtXyuy/GCU5I4l08g6iifXypMgoYkkceOAAz4vx1x0BOnZWfI3fSwqN -# UvoN7ncTT+MB4Vpvf1QBppjBAQUuvui6eCG0MCVNAgMBAAGjggFJMIIBRTAdBgNV -# HQ4EFgQUmfIngFzZEZlPkjDOVluBSDDaanEwHwYDVR0jBBgwFoAUn6cVXQBeYl2D +# VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7 +# 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY +# SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4 +# dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq +# cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE +# izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J +# VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/ +# 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu +# QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm +# z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc +# c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd +# JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV +# HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD -# ggIBANxHtu3FzIabaDbWqswdKBlAhKXRCN+5CSMiv2TYa4i2QuWIm+99piwAhDhA -# Dfbqor1zyLi95Y6GQnvIWUgdeC7oL1ZtZye92zYK+EIfwYZmhS+CH4infAzUvscH -# ZF3wlrJUfPUIDGVP0lCYVse9mguvG0dqkY4ayQPEHOvJubgZZaOdg/N8dInd6fGe -# Oc+0DoGzB+LieObJ2Q0AtEt3XN3iX8Cp6+dZTX8xwE/LvhRwPpb/+nKshO7TVuve -# nwdTwqB/LT6CNPaElwFeKxKrqRTPMbHeg+i+KnBLfwmhEXsMg2s1QX7JIxfvT96m -# d0eiMjiMEO22LbOzmLMNd3LINowAnRBAJtX+3/e390B9sMGMHp+a1V+hgs62AopB -# l0p/00li30DN5wEQ5If35Zk7b/T6pEx6rJUDYCti7zCbikjKTanBnOc99zGMlej5 -# X+fC/k5ExUCrOs3/VzGRCZt5LvVQSdWqq/QMzTEmim4sbzASK9imEkjNtZZyvC1C -# sUcD1voFktld4mKMjE+uDEV3IddD+DrRk94nVzNPSuZXewfVOnXHSeqG7xM3V7fl -# 2aL4v1OhL2+JwO1Tx3B0irO1O9qbNdJk355bntd1RSVKgM22KFBHnoL7Js7pRhBi -# aKmVTQGoOb+j1Qa7q+cixGo48Vh9k35BDsJS/DLoXFSPDl4mMIIHcTCCBVmgAwIB +# ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG +# gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup +# gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU +# wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg +# oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD +# YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu +# dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3 +# 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu +# uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD +# C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY +# FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 @@ -348,42 +349,42 @@ PrivateData = @{ # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw -# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB +# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U -# aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0 -# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjhJ+EeySRfn2KCNs -# jn9cF9AUSTqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0 +# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD +# d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN -# BgkqhkiG9w0BAQUFAAIFAOi0+i0wIhgPMjAyMzA5MjAxMjU3MTdaGA8yMDIzMDky -# MTEyNTcxN1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6LT6LQIBADAKAgEAAgIR -# nAIB/zAHAgEAAgIR0DAKAgUA6LZLrQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor -# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA -# A4GBAGjRjrn62VuBz/kNRF8KdoG4YOpoAZu0e3XBc+tcCCiG1Je/ZYXUzMrrq/cz -# MFXWzdmSQRBFPRvcFJw8LcTRu4C6eQOJywts4MMoyE3nJOUUUsOB/i2h2w7L/fo0 -# 3EeEXVTQn/aSK7jkMyysxQEWOw64WNG06Sd08ZDadqbnAc7zMYIEDTCCBAkCAQEw -# gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT -# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE -# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAGybkADf26plJIA -# AQAAAbIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B -# CRABBDAvBgkqhkiG9w0BCQQxIgQgDd3716NLDTxGc+0tAskrKgBsB9PO5RK3smyU -# vyfE7/owgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTeM485+E+t4PEVieU -# oFKX7PVyLo/nzu+htJPCG04+NTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w -# IFBDQSAyMDEwAhMzAAABsm5AA39uqZSSAAEAAAGyMCIEILLYuf/URU9tiFRXIhgo -# OAyZuYAFYpFAH2I0pLSN1lWkMA0GCSqGSIb3DQEBCwUABIICAMQZqLlhmv19+CcR -# claEHbZr4MgJjWr2Da27FqRgoOLDtNaS/IZ16UHukAV7JVdIOdVroxfvVdWXh5iq -# dSAfYNMkSBBPxxLbSFnndIw7KWkp3vbxFcJ6+JsK9k54TDZAUP17OpTM11gpTYfm -# uVAWZaqh086moHKLZsjVU/rzFA3En+QY5ZticB0LytwkIY+7pS6ikN4Q3e/pzPLH -# CSa2OZN3bXezZzOWMFLQwJ2IQJLpCKs0RiICTOaOKTpsjcoK2eBLwzXsgnnNZmj/ -# q1XMWGUJbnNJH4mszFVJ6X0cUo3OJvkF9V796VoZZMUS9i0EmCUZNE0rcvPdBnIE -# c8P+QSbLudmDA+XXno2ItqeA1ZkatNLyZGYGSjK4BU48MzcHMkWKCcUlqyfUiJt7 -# 7UGXDTuCzVkqCVVo7XpJNbN7X1oLkh8yTPr5RBbmlzzykIfEkoVnYj4Qc89ohb1N -# qXKDWby0ldBFOZIgyOgRiYJ984yyeAAXvOpTexhDtDCguYGfV56U+NTMve18Oa8u -# IODMD1Nfr+JLHL+J2tkMfZGFa71tGGnI2w9W6xUltjs8XINLrF08szKC6Vlo20wl -# F09Em/cF6qbZ2cnC/BDOt3xDDnJHYOHLR9QCZABbMd7JiuH32PE5C79PbpPYzyje -# p0LB6iM1n1UYaSSFWCx/a3Itdf6/ +# BgkqhkiG9w0BAQUFAAIFAOnSOXkwIhgPMjAyNDA0MjMyMTQzMjFaGA8yMDI0MDQy +# NDIxNDMyMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dI5eQIBADAHAgEAAgIZ +# +zAHAgEAAgISnDAKAgUA6dOK+QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE +# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB +# AJGKR1qJKl/+mW5U2h2l4liBeGpbziNYtKnpBCMp30HYhdVKFaph0TxsBGaJLYLr +# Q2S7wBX5JVFvTKnTyYzepJcgAC9YkIJt78a/e5HdsTiqydcnvbuRwlJYowGhvrnT +# /TnMW2q5bQi5U7jdx4Q9DCXm0Ao6uid4NKGA32H0Rji2MYIEDTCCBAkCAQEwgZMw +# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd +# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAA +# AeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB +# BDAvBgkqhkiG9w0BCQQxIgQgBXbJgy1MwIjKcWL9Bo08SbDO58MCW4oV4x5v1jw2 +# OhQwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb +# 8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI +# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv +# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD +# QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEILE/ZDCz6TZPcDPgj4ZgWNKX +# RgchnitzlVyga3nqoA2PMA0GCSqGSIb3DQEBCwUABIICAHbfNcHOeOIlBtotceIy +# sW1Df7YVpDY9tgO3N3mV0nlVOEoUKCKEsckC2lGITqKIckTTDUwCt5igEfXeFj2L +# xRKiKb+L7tjovIhvjjusRP60VRNglcmiWYU1AX5RnF2nxhvqsqmqnHQ4Vm2YhO5j +# ZAzqS4uO1Vjy+5lxWrmRMAoUvLqChm3qu5zgZgMor5uc+lvrMkF1MLj5vxAiEh/S +# IySTwcKyaHDTyNsdvapoQ4dPgrlR7CebX8gANnXM9ug6QjNG6UwI8glzZWvjVey+ +# bZAcJEK0ZM6GtvJpkupJF5JzjrLFPmyAqMxnfVh9adayItcbNaWFJgCoFTGbeRnU +# eKzzYviEHyzHMdadACPKfx26gM1y6mR/LvfEh8OlFNc7Qk2h8wCcamSTuK+hIC0h +# SWr03FMYWa7B/3ddCiU2zatWjPKOcNdz+UYUGrqn2T70i+pEPhSRorpcF1qKFPrW +# q7n8LCRmv0ek6YX69okH7sIHWs07Cxdy5YBXSarL/uTsvtaiDimqKCJVGvfKt+4N +# 8G48w8p87Wn2ozO7kv8M+uR7IHH3yfQ3vs7Upwxxd18gIwEWZBzoiqTyCvi9JgDp +# ZLtGrFUBKWboJIt4X9JvzJnnKRFCJJbteuqYcVw4nGQoEG8xSMbhRc4UDYrcmdBG +# uZqjleiNXSPaCHCDUCO8S/8O # SIG # End signature block diff --git a/Modules/Az.Accounts/2.19.0/Az.Accounts.psm1 b/Modules/Az.Accounts/2.19.0/Az.Accounts.psm1 new file mode 100644 index 000000000000..9b6f96a418fd --- /dev/null +++ b/Modules/Az.Accounts/2.19.0/Az.Accounts.psm1 @@ -0,0 +1,367 @@ +# +# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session. +# +# Generated by: Microsoft Corporation +# +# Generated on: 04/23/2024 13:01:39 +# + +$PSDefaultParameterValues.Clear() +Set-StrictMode -Version Latest + +function Test-DotNet +{ + try + { + if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) + { + throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." + } + } + catch [System.Management.Automation.DriveNotFoundException] + { + Write-Verbose ".NET Framework version check failed." + } +} + +function Preload-Assembly { + param ( + [string] + $AssemblyDirectory + ) + if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) + { + try + { + Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { + try + { + Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null + } + catch { + Write-Verbose $_ + } + } + } + catch {} + } +} + +if ($true -and ($PSEdition -eq 'Desktop')) +{ + if ($PSVersionTable.PSVersion -lt [Version]'5.1') + { + throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." + } + + Test-DotNet +} + +if ($true -and ($PSEdition -eq 'Core')) +{ + if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') + { + throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." + } + if ($PSVersionTable.PSVersion -lt [Version]'7.0.6') + { + Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle." + } +} + +if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) +{ + Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { + . $_.FullName + } +} + +# [windows powershell] preload assemblies +if ($PSEdition -eq "Desktop") { + [Microsoft.Azure.PowerShell.AssemblyLoading.ConditionalAssemblyProvider]::GetAssemblies().Values | ForEach-Object { + $path = $_.Item1 + try { + Add-Type -Path $path -ErrorAction Ignore | Out-Null + } + catch { + Write-Verbose "Could not preload $path" + } + } +} + +# [windows powershell] preload module alc assemblies +$preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") +Preload-Assembly -AssemblyDirectory $preloadPath + +if (Get-Module AzureRM.profile -ErrorAction Ignore) +{ + Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") + throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") +} + +Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll) + + +if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) +{ + Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { + . $_.FullName + } +} + +$FilteredCommands = @() + +if ($Env:ACC_CLOUD -eq $null) +{ + $FilteredCommands | ForEach-Object { + + $existingDefault = $false + foreach ($key in $global:PSDefaultParameterValues.Keys) + { + if ($_ -like "$key") + { + $existingDefault = $true + } + } + + if (!$existingDefault) + { + $global:PSDefaultParameterValues.Add($_, + { + if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) + { + $context = Get-AzureRmContext + } + else + { + $context = Get-AzContext + } + if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { + $context.ExtendedProperties["Default Resource Group"] + } + }) + } + } +} + +[Microsoft.Azure.Commands.Profile.Utilities.CommandNotFoundHelper]::RegisterCommandNotFoundAction($ExecutionContext.InvokeCommand) + +# SIG # Begin signature block +# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvNtvf4im/SVC2 +# nQWfnzeLonIZP3bVUynaDH7cUNQ8caCCDXYwggX0MIID3KADAgECAhMzAAADrzBA +# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA +# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG +# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN +# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL +# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB +# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw +# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW +# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci +# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG +# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 +# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd +# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ +# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY +# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp +# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn +# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT +# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG +# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O +# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk +# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx +# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt +# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq +# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG +# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG +# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg +# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 +# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr +# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg +# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy +# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 +# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh +# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k +# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB +# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn +# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 +# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w +# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o +# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD +# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa +# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny +# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG +# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t +# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV +# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG +# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl +# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb +# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l +# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 +# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 +# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 +# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam +# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa +# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah +# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA +# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt +# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr +# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw +# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN +# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp +# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB +# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO +# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMHzG3KuiawpJ79RrO/q+NWd +# E8MbQp4P3Fs/QXy+tPpXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A +# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB +# BQAEggEAq5HzRJkY2Rjl7ObJlSsuEfsPYRRP2FQ1kjBZgY8HMUZ0SDVArnjBc7q+ +# PecABM8jS7mb0wJOk3BY/Sw1wXgIdFDFH+Ht6NgRPCmPtbta+hVqrzowKhHcF8lG +# mWhz9U/GhOwj3yDUz1kYahnNv9NSOrICaJXPR/WO/RH+sIyi/+ii2dg/qjtNMC81 +# RsYp60sUsOBmdo4BCRBnVEeCPiz9ttsVAiOk12zpHE7SrN/+uoIxjhVG5ePP5qFS +# ajULPoXKMjXkt4ONBQDUzVVk7YyOrQxs42lID8/o0ZzdgxzqbZmRxAkkZCcIDEhc +# 8soes8uDlg+Gmkuw63MRBJr+sWNm9aGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC +# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq +# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl +# AwQCAQUABCBQXSrWHIx5PTvWU9h8XtQuRbQRrQf9mr0Q/SFFyrDBTgIGZhfWS4el +# GBMyMDI0MDQyMzEzMTUxNC42MDJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV +# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE +# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l +# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w +# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg +# ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B +# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE +# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD +# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 +# MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz +# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv +# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z +# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV +# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB +# AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/ +# Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 +# tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060 +# akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq +# dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0 +# EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8 +# /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79 +# 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE +# blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S +# bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+ +# wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul +# IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G +# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG +# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy +# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w +# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy +# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG +# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD +# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC +# pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn +# HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6 +# ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn +# LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi +# DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ +# uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb +# n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe +# GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B +# 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv +# KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9 +# gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI +# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw +# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x +# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy +# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC +# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV +# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp +# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg +# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF +# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 +# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp +# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu +# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E +# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 +# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q +# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ +# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA +# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw +# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG +# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV +# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj +# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK +# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC +# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX +# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v +# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI +# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG +# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x +# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC +# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 +# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM +# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS +# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d +# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn +# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs +# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL +# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL +# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ +# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp +# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw +# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn +# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD +# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz +# cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w +# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIknDAiGA8yMDI0MDQyMzEyMTQy +# MFoYDzIwMjQwNDI0MTIxNDIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0iSc +# AgEAMAoCAQACAgyFAgH/MAcCAQACAhNGMAoCBQDp03YcAgEAMDYGCisGAQQBhFkK +# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ +# KoZIhvcNAQELBQADggEBAAtBkyUdrM1hwbTBWCK48MGmKRxZss6LPFkY42ZOWnXs +# VX6ZpU1Gl/LHGQnpRZk6/hinddMaf7iclXFbDMTro7W58hCrRegPfWwTzs8g1aOM +# YXNAwJW30fwOsS6mecLg5zfkvBReOfq509wnpa0Ndwg6EQMGwD/BAq7tdePiGcew +# KasjknLTpYY7fgoW2Ncb0sgNMRHJId/wLrHwD90VtvkCEnw9OPR+IbvMfWkyCTqp +# PJ3Y0U/m/Oeqqoo9GDlFnX17f/az0HZjr4SZ9LXRqz8Qa4zlmb79kpVqf6nLoXJr +# 9P9oeI7iFIEHkb+mYdtENFDUMyhhduOhsqZHXwrf3QQxggQNMIIECQIBATCBkzB8 +# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk +# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N +# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB +# 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE +# MC8GCSqGSIb3DQEJBDEiBCAdKiEc4DPF6bUDR6rTgOnmASvpjRCTWgx+wZxRd+CZ +# OjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE +# X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m +# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB +# IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgUj1W10UOl24tqW0PGjrhbdiG +# 0wEdX5mXIsSe+QniYO0wDQYJKoZIhvcNAQELBQAEggIAQJQkF2DhEg3BEczqiFPj +# Y1waHP5RRO8XvHmOkCXBSLKKc/bAITW3G+U5IhCk1SUNbc8whXKmHn51v3zZRrtV +# 6e0aj5Kw+yoqHWd97TRy6CTXFP5mQcZ5zntypGTzXyPl4FJChRYKco00KF+3CInT +# dUnVXqongTDAs/vEMenPVqAHio2tx/XaB9TAp+djEhPSFVXHPSI7n6XxUjmpmxc0 +# 98ObEi18BdhhiJssUfX/l/Wd1Roe1HbIG6NnTJ7zJXQAzcxXPaZNy4wT8yEqxwHP +# tmi19o3sFV0Gyf54Z0pL/8C57ubV0y9jBvigDfS58UsgI6k4jvQJvUN36dQqIdaK +# TJEqL9fHpO0W7hpARnO1oW8WSlG3pFYw+SwLK/NMYwtpW/lklt5VyrMqgs1sVnAd +# UNtR6eavL+0tNvIczYPxMM/727KGmgvKSQNfyI7b3vxIipAayqTRSke1o5JxWMQ2 +# Mp8CC3Y87pvdBu4AHJ7bRSFKrHB9NwfCa/+4lGgfLeQ/qr+xvpVNXOVr/1Jz5lGQ +# FBWEEwet0OBRppHHlRm+dpmQPavs1SPpPqqNQSrlEZN/DcUzZzyANBitTLB+GPUz +# B45deyNYOpLkgbS45iRf29cZXQJj0EELVW2o9OhwjyTMiAALuOwQ5AlulaF1k49o +# KX+ybhIYuoPUnwbolsZ85so= +# SIG # End signature block diff --git a/Modules/Az.Accounts/2.13.1/FuzzySharp.dll b/Modules/Az.Accounts/2.19.0/FuzzySharp.dll similarity index 92% rename from Modules/Az.Accounts/2.13.1/FuzzySharp.dll rename to Modules/Az.Accounts/2.19.0/FuzzySharp.dll index d25fb236c3e9..5c659d55b25b 100644 Binary files a/Modules/Az.Accounts/2.13.1/FuzzySharp.dll and b/Modules/Az.Accounts/2.19.0/FuzzySharp.dll differ diff --git a/Modules/Az.Accounts/2.10.4/Hyak.Common.dll b/Modules/Az.Accounts/2.19.0/Hyak.Common.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/Hyak.Common.dll rename to Modules/Az.Accounts/2.19.0/Hyak.Common.dll diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.ApplicationInsights.dll b/Modules/Az.Accounts/2.19.0/Microsoft.ApplicationInsights.dll similarity index 100% rename from Modules/Az.Accounts/2.13.1/Microsoft.ApplicationInsights.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.ApplicationInsights.dll diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.Common.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.Common.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/Microsoft.Azure.Common.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.Common.dll diff --git a/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.AssemblyLoading.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.AssemblyLoading.dll new file mode 100644 index 000000000000..c7225b8dd516 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.AssemblyLoading.dll differ diff --git a/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll new file mode 100644 index 000000000000..027cd3860f2c Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll differ diff --git a/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll new file mode 100644 index 000000000000..59ffd3568e0f Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll differ diff --git a/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authentication.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authentication.dll new file mode 100644 index 000000000000..2a280f78e867 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authentication.dll differ diff --git a/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll new file mode 100644 index 000000000000..323829018e4d Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll differ diff --git a/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authenticators.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authenticators.dll new file mode 100644 index 000000000000..a1eff76805e3 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Authenticators.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Aks.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Aks.dll similarity index 91% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Aks.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Aks.dll index 3ab15df83c30..3c782db9f65d 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Aks.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Aks.dll differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Authorization.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Authorization.dll similarity index 95% rename from Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Authorization.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Authorization.dll index 4daccbc23308..5fed56c209c6 100644 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Authorization.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Authorization.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Compute.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Compute.dll similarity index 99% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Compute.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Compute.dll index b5c2285f8237..5f76edb98887 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Compute.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Compute.dll differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll similarity index 99% rename from Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll index 5092d6e167d0..3405423a0e55 100644 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.KeyVault.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.KeyVault.dll similarity index 95% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.KeyVault.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.KeyVault.dll index b6838bea7093..8f74c8ead59e 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.KeyVault.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.KeyVault.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Monitor.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Monitor.dll similarity index 98% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Monitor.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Monitor.dll index d28204acd31a..fc72f6643a9d 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Monitor.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Monitor.dll differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Network.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Network.dll similarity index 99% rename from Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Network.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Network.dll index 9fc5c5347046..24a1bc2258a4 100644 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Network.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Network.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll similarity index 96% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll index 3a37aeb3a3d5..52b7c95b8e71 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll differ diff --git a/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll new file mode 100644 index 000000000000..d1480264ce18 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.ResourceManager.dll differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll similarity index 97% rename from Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll index cf7f80c42f80..f6f1d671b7e4 100644 Binary files a/Modules/Az.Accounts/2.10.4/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Storage.Management.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Websites.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Websites.dll similarity index 99% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Websites.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Websites.dll index 947ac62a5ac0..00a4c5274f4f 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Clients.Websites.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Clients.Websites.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll similarity index 65% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll index f2f380543ee1..8dba7d96a696 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml similarity index 97% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml index 07d9948aca17..33f3dccb1bd0 100644 --- a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml +++ b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml @@ -317,7 +317,7 @@ AzureAttestationServiceEndpointResourceId - The The resource identifier of the Azure Attestation service that is the recipient of the requested token. + The resource identifier of the Azure Attestation service that is the recipient of the requested token. System.String @@ -341,7 +341,7 @@ AzureSynapseAnalyticsEndpointResourceId - The The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. + The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. System.String @@ -586,7 +586,7 @@ AzureAttestationServiceEndpointResourceId - The The resource identifier of the Azure Attestation service that is the recipient of the requested token. + The resource identifier of the Azure Attestation service that is the recipient of the requested token. System.String @@ -610,7 +610,7 @@ AzureSynapseAnalyticsEndpointResourceId - The The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. + The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. System.String @@ -859,7 +859,7 @@ AzureAttestationServiceEndpointResourceId - The The resource identifier of the Azure Attestation service that is the recipient of the requested token. + The resource identifier of the Azure Attestation service that is the recipient of the requested token. System.String @@ -955,7 +955,7 @@ AzureSynapseAnalyticsEndpointResourceId - The The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. + The resource identifier of the Azure Synapse Analytics that is the recipient of the requested token. System.String @@ -1432,7 +1432,7 @@ TestEnvironment TestRMEndpoint TestADEndpoint/ CheckForUpgrade - When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value will be changed from false to true in Az version 11.0.0. + When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value is true. System.Management.Automation.SwitchParameter @@ -1474,6 +1474,17 @@ TestEnvironment TestRMEndpoint TestADEndpoint/ False + + DisableInstanceDiscovery + + Set it to true to disable both instance discovery and authority validation. This functionality is intended for use in scenarios where the metadata endpoint cannot be reached, such as in private clouds or Azure Stack. The process of instance discovery entails retrieving authority metadata from https://login.microsoft.com/ to validate the authority. By setting this to true, the validation of the authority is disabled. As a result, it is crucial to ensure that the configured authority host is valid and trustworthy. + + + System.Management.Automation.SwitchParameter + + + False + DisplayBreakingChangeWarning @@ -1496,6 +1507,17 @@ TestEnvironment TestRMEndpoint TestADEndpoint/ False + + DisplaySecretsWarning + + When enabled, a warning message will be displayed when the cmdlet output contains secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844 + + + System.Management.Automation.SwitchParameter + + + False + DisplaySurveyMessage @@ -1691,7 +1713,7 @@ TestEnvironment TestRMEndpoint TestADEndpoint/ CheckForUpgrade - When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value will be changed from false to true in Az version 11.0.0. + When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value is true. System.Management.Automation.SwitchParameter @@ -1736,6 +1758,18 @@ TestEnvironment TestRMEndpoint TestADEndpoint/ False + + DisableInstanceDiscovery + + Set it to true to disable both instance discovery and authority validation. This functionality is intended for use in scenarios where the metadata endpoint cannot be reached, such as in private clouds or Azure Stack. The process of instance discovery entails retrieving authority metadata from https://login.microsoft.com/ to validate the authority. By setting this to true, the validation of the authority is disabled. As a result, it is crucial to ensure that the configured authority host is valid and trustworthy. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + DisplayBreakingChangeWarning @@ -1760,6 +1794,18 @@ TestEnvironment TestRMEndpoint TestADEndpoint/ False + + DisplaySecretsWarning + + When enabled, a warning message will be displayed when the cmdlet output contains secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844 + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + DisplaySurveyMessage @@ -6143,14 +6189,25 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu Get-AzAccessToken + + AsSecureString + + Specifiy to convert output token as a secure string. + + + System.Management.Automation.SwitchParameter + + + False + DefaultProfile The credentials, account, tenant, and subscription used for communication with Azure. - IAzureContextContainer + Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - IAzureContextContainer + Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer None @@ -6160,9 +6217,9 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu Optional resource type name, supported values: AadGraph, AnalysisServices, AppConfiguration, Arm, Attestation, Batch, DataLake, KeyVault, MSGraph, OperationalInsights, ResourceManager, Storage, Synapse. Default value is Arm if not specified. - String + System.String - String + System.String None @@ -6172,9 +6229,9 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu Optional Tenant Id. Use tenant id of default context if not specified. - String + System.String - String + System.String None @@ -6182,14 +6239,25 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu Get-AzAccessToken + + AsSecureString + + Specifiy to convert output token as a secure string. + + + System.Management.Automation.SwitchParameter + + + False + DefaultProfile The credentials, account, tenant, and subscription used for communication with Azure. - IAzureContextContainer + Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - IAzureContextContainer + Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer None @@ -6199,9 +6267,9 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu Resource url for that you're requesting token, e.g. 'https://graph.microsoft.com/'. - String + System.String - String + System.String None @@ -6211,9 +6279,9 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu Optional Tenant Id. Use tenant id of default context if not specified. - String + System.String - String + System.String None @@ -6221,14 +6289,26 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu + + AsSecureString + + Specifiy to convert output token as a secure string. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + DefaultProfile The credentials, account, tenant, and subscription used for communication with Azure. - IAzureContextContainer + Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - IAzureContextContainer + Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer None @@ -6238,9 +6318,9 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu Optional resource type name, supported values: AadGraph, AnalysisServices, AppConfiguration, Arm, Attestation, Batch, DataLake, KeyVault, MSGraph, OperationalInsights, ResourceManager, Storage, Synapse. Default value is Arm if not specified. - String + System.String - String + System.String None @@ -6250,9 +6330,9 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu Resource url for that you're requesting token, e.g. 'https://graph.microsoft.com/'. - String + System.String - String + System.String None @@ -6262,9 +6342,9 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu Optional Tenant Id. Use tenant id of default context if not specified. - String + System.String - String + System.String None @@ -6289,6 +6369,14 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu + + + Microsoft.Azure.Commands.Profile.Models.PSSecureAccessToken + + + + + @@ -6364,7 +6452,7 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu CheckForUpgrade - When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value will be changed from false to true in Az version 11.0.0. + When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value is true. System.Management.Automation.SwitchParameter @@ -6406,6 +6494,17 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu False + + DisableInstanceDiscovery + + Set it to true to disable both instance discovery and authority validation. This functionality is intended for use in scenarios where the metadata endpoint cannot be reached, such as in private clouds or Azure Stack. The process of instance discovery entails retrieving authority metadata from https://login.microsoft.com/ to validate the authority. By setting this to true, the validation of the authority is disabled. As a result, it is crucial to ensure that the configured authority host is valid and trustworthy. + + + System.Management.Automation.SwitchParameter + + + False + DisplayBreakingChangeWarning @@ -6428,6 +6527,17 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu False + + DisplaySecretsWarning + + When enabled, a warning message will be displayed when the cmdlet output contains secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844 + + + System.Management.Automation.SwitchParameter + + + False + DisplaySurveyMessage @@ -6499,7 +6609,7 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu CheckForUpgrade - When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value will be changed from false to true in Az version 11.0.0. + When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value is true. System.Management.Automation.SwitchParameter @@ -6544,6 +6654,18 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu False + + DisableInstanceDiscovery + + Set it to true to disable both instance discovery and authority validation. This functionality is intended for use in scenarios where the metadata endpoint cannot be reached, such as in private clouds or Azure Stack. The process of instance discovery entails retrieving authority metadata from https://login.microsoft.com/ to validate the authority. By setting this to true, the validation of the authority is disabled. As a result, it is crucial to ensure that the configured authority host is valid and trustworthy. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + DisplayBreakingChangeWarning @@ -6568,6 +6690,18 @@ xxxxxxxx-xxxx-xxxx-xxxxxxxx Subscription1 yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyy Azu False + + DisplaySecretsWarning + + When enabled, a warning message will be displayed when the cmdlet output contains secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844 + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + DisplaySurveyMessage @@ -8884,6 +9018,17 @@ Content : {"properties":{"public":true,"url":"https://test-spring-service-dem Get app "demo" under Spring cloud service "test-spring-service" + + + + + -------------------------- Example 5 -------------------------- + # Replace *** with real values +$payload = @{principalId="***"; resourceId="***"; appRoleId="***"} | ConvertTo-Json -Depth 3 +Invoke-AzRestMethod -Method POST -Uri https://graph.microsoft.com/v1.0/servicePrincipals/***/appRoleAssignedTo -Payload $payload + + Call Microsoft Graph API to assign App Role by constructing a hashtable, converting to a JSON string, and passing the payload to `Invoke-AzRestMethod`. + @@ -10328,6 +10473,17 @@ HistoryId : 8 False + + WithCredential + + Export the credentials to the file + + + System.Management.Automation.SwitchParameter + + + False + Confirm @@ -10401,6 +10557,18 @@ HistoryId : 8 None + + WithCredential + + Export the credentials to the file + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + Confirm @@ -13240,7 +13408,7 @@ AzureSynapseAnalyticsEndpointResourceId : CheckForUpgrade - When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value will be changed from false to true in Az version 11.0.0. + When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value is true. System.Boolean @@ -13285,6 +13453,18 @@ AzureSynapseAnalyticsEndpointResourceId : None + + DisableInstanceDiscovery + + Set it to true to disable both instance discovery and authority validation. This functionality is intended for use in scenarios where the metadata endpoint cannot be reached, such as in private clouds or Azure Stack. The process of instance discovery entails retrieving authority metadata from https://login.microsoft.com/ to validate the authority. By setting this to true, the validation of the authority is disabled. As a result, it is crucial to ensure that the configured authority host is valid and trustworthy. + + System.Boolean + + System.Boolean + + + None + DisplayBreakingChangeWarning @@ -13309,6 +13489,18 @@ AzureSynapseAnalyticsEndpointResourceId : None + + DisplaySecretsWarning + + When enabled, a warning message will be displayed when the cmdlet output contains secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844 + + System.Boolean + + System.Boolean + + + None + DisplaySurveyMessage @@ -13405,7 +13597,7 @@ AzureSynapseAnalyticsEndpointResourceId : CheckForUpgrade - When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value will be changed from false to true in Az version 11.0.0. + When enabled, Azure PowerShell will check for updates automatically and display a hint message when an update is available. The default value is true. System.Boolean @@ -13450,6 +13642,18 @@ AzureSynapseAnalyticsEndpointResourceId : None + + DisableInstanceDiscovery + + Set it to true to disable both instance discovery and authority validation. This functionality is intended for use in scenarios where the metadata endpoint cannot be reached, such as in private clouds or Azure Stack. The process of instance discovery entails retrieving authority metadata from https://login.microsoft.com/ to validate the authority. By setting this to true, the validation of the authority is disabled. As a result, it is crucial to ensure that the configured authority host is valid and trustworthy. + + System.Boolean + + System.Boolean + + + None + DisplayBreakingChangeWarning @@ -13474,6 +13678,18 @@ AzureSynapseAnalyticsEndpointResourceId : None + + DisplaySecretsWarning + + When enabled, a warning message will be displayed when the cmdlet output contains secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844 + + System.Boolean + + System.Boolean + + + None + DisplaySurveyMessage @@ -13550,7 +13766,7 @@ AzureSynapseAnalyticsEndpointResourceId : - System.String + System.Boolean @@ -13558,7 +13774,7 @@ AzureSynapseAnalyticsEndpointResourceId : - System.Boolean + System.String @@ -13617,6 +13833,19 @@ EnableDataCollection True Az CurrentUser When enabled, Azure PowerShell Sets the "EnableDataCollection" config as "$true". This enables sending the telemetry data. Setting this config is equivalent to `Enable-AzDataCollection` and `Disable-AzDataCollection`. + + + + + -------------------------- Example 4 -------------------------- + Update-AzConfig -DisplaySecretsWarning $true + +Key Value Applies To Scope Help Message +--- ----- ---------- ----- ------------ +DisplaySecretsWarning True Az CurrentUser When enabled, a warning message for secrets redaction will be displ… + + Sets the "DisplaySecretsWarning" config as "$true". This enables the secrets detection during the cmdlet execution and displays a warning message if any secrets are found in the output. + diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Common.Share.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Common.Share.dll similarity index 63% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Common.Share.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Common.Share.dll index 3d53eaa669dc..79121690213c 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Common.Share.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Common.Share.dll differ diff --git a/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Common.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Common.dll new file mode 100644 index 000000000000..b79911840412 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Common.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Storage.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Storage.dll similarity index 62% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Storage.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Storage.dll index a163f556b3f8..529f297f73d1 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Storage.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Storage.dll differ diff --git a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Strategies.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Strategies.dll similarity index 87% rename from Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Strategies.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Strategies.dll index 0ccbb5ead102..b972fed1f53b 100644 Binary files a/Modules/Az.Accounts/2.13.1/Microsoft.Azure.PowerShell.Strategies.dll and b/Modules/Az.Accounts/2.19.0/Microsoft.Azure.PowerShell.Strategies.dll differ diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Rest.ClientRuntime.Azure.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Rest.ClientRuntime.Azure.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/Microsoft.Rest.ClientRuntime.Azure.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Rest.ClientRuntime.Azure.dll diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.Rest.ClientRuntime.dll b/Modules/Az.Accounts/2.19.0/Microsoft.Rest.ClientRuntime.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/Microsoft.Rest.ClientRuntime.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.Rest.ClientRuntime.dll diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.WindowsAzure.Storage.DataMovement.dll b/Modules/Az.Accounts/2.19.0/Microsoft.WindowsAzure.Storage.DataMovement.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/Microsoft.WindowsAzure.Storage.DataMovement.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.WindowsAzure.Storage.DataMovement.dll diff --git a/Modules/Az.Accounts/2.10.4/Microsoft.WindowsAzure.Storage.dll b/Modules/Az.Accounts/2.19.0/Microsoft.WindowsAzure.Storage.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/Microsoft.WindowsAzure.Storage.dll rename to Modules/Az.Accounts/2.19.0/Microsoft.WindowsAzure.Storage.dll diff --git a/Modules/Az.Accounts/2.13.1/PSGetModuleInfo.xml b/Modules/Az.Accounts/2.19.0/PSGetModuleInfo.xml similarity index 67% rename from Modules/Az.Accounts/2.13.1/PSGetModuleInfo.xml rename to Modules/Az.Accounts/2.19.0/PSGetModuleInfo.xml index 7f3fcdb49c94..f7da7d8b939a 100644 --- a/Modules/Az.Accounts/2.13.1/PSGetModuleInfo.xml +++ b/Modules/Az.Accounts/2.19.0/PSGetModuleInfo.xml @@ -7,13 +7,13 @@ Az.Accounts - 2.13.1 + 2.19.0 Module Microsoft Azure PowerShell - Accounts credential management cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core._x000D__x000A__x000D__x000A_For more information on account credential management, please visit the following: https://learn.microsoft.com/powershell/azure/authenticate-azureps Microsoft Corporation azure-sdk Microsoft Corporation. All rights reserved. -
2023-09-26T01:21:07+02:00
+
2024-04-30T02:21:02-04:00
https://aka.ms/azps-license @@ -45,14 +45,14 @@ - DscResource + RoleCapability - Command + Cmdlet @@ -98,15 +98,7 @@ - Function - - - - RoleCapability - - - - Cmdlet + Command @@ -151,6 +143,14 @@ + + DscResource + + + + Function + + Workflow @@ -158,7 +158,7 @@ - * Added the module name in breaking change messages _x000D__x000A_* Upgraded Microsoft.ApplicationInsights version from 2.13.1 to 2.18.0 + * Preannouncement: The default interactive login experience will change from browser based to Web Account Manager (WAM) based on supported platforms, [learn more](_x000D__x000A_https://learn.microsoft.com/en-us/entra/msal/dotnet/acquiring-tokens/desktop-mobile/wam). Only interactive login flow is influeced by WAM. This will take effect from the release of May 21st._x000D__x000A_* Fixed secrets detection issues. @@ -175,30 +175,30 @@ Microsoft Corporation. All rights reserved. Microsoft Azure PowerShell - Accounts credential management cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core._x000D__x000A__x000D__x000A_For more information on account credential management, please visit the following: https://learn.microsoft.com/powershell/azure/authenticate-azureps True - * Added the module name in breaking change messages _x000D__x000A_* Upgraded Microsoft.ApplicationInsights version from 2.13.1 to 2.18.0 + * Preannouncement: The default interactive login experience will change from browser based to Web Account Manager (WAM) based on supported platforms, [learn more](_x000D__x000A_https://learn.microsoft.com/en-us/entra/msal/dotnet/acquiring-tokens/desktop-mobile/wam). Only interactive login flow is influeced by WAM. This will take effect from the release of May 21st._x000D__x000A_* Fixed secrets detection issues. True True - 12674952 - 205804084 - 9678831 - 26/09/2023 01:21:07 +02:00 - 26/09/2023 01:21:07 +02:00 - 21/10/2023 12:36:30 +02:00 + 2232732 + 295871973 + 8997136 + 4/30/2024 2:21:02 AM -04:00 + 4/30/2024 2:21:02 AM -04:00 + 5/3/2024 11:57:47 PM -04:00 Azure ResourceManager ARM Accounts Authentication Environment Subscription PSModule PSEdition_Core PSEdition_Desktop PSCmdlet_Disable-AzDataCollection PSCommand_Disable-AzDataCollection PSCmdlet_Disable-AzContextAutosave PSCommand_Disable-AzContextAutosave PSCmdlet_Enable-AzDataCollection PSCommand_Enable-AzDataCollection PSCmdlet_Enable-AzContextAutosave PSCommand_Enable-AzContextAutosave PSCmdlet_Remove-AzEnvironment PSCommand_Remove-AzEnvironment PSCmdlet_Get-AzEnvironment PSCommand_Get-AzEnvironment PSCmdlet_Set-AzEnvironment PSCommand_Set-AzEnvironment PSCmdlet_Add-AzEnvironment PSCommand_Add-AzEnvironment PSCmdlet_Get-AzSubscription PSCommand_Get-AzSubscription PSCmdlet_Connect-AzAccount PSCommand_Connect-AzAccount PSCmdlet_Get-AzContext PSCommand_Get-AzContext PSCmdlet_Set-AzContext PSCommand_Set-AzContext PSCmdlet_Import-AzContext PSCommand_Import-AzContext PSCmdlet_Save-AzContext PSCommand_Save-AzContext PSCmdlet_Get-AzTenant PSCommand_Get-AzTenant PSCmdlet_Send-Feedback PSCommand_Send-Feedback PSCmdlet_Resolve-AzError PSCommand_Resolve-AzError PSCmdlet_Select-AzContext PSCommand_Select-AzContext PSCmdlet_Rename-AzContext PSCommand_Rename-AzContext PSCmdlet_Remove-AzContext PSCommand_Remove-AzContext PSCmdlet_Clear-AzContext PSCommand_Clear-AzContext PSCmdlet_Disconnect-AzAccount PSCommand_Disconnect-AzAccount PSCmdlet_Get-AzContextAutosaveSetting PSCommand_Get-AzContextAutosaveSetting PSCmdlet_Set-AzDefault PSCommand_Set-AzDefault PSCmdlet_Get-AzDefault PSCommand_Get-AzDefault PSCmdlet_Clear-AzDefault PSCommand_Clear-AzDefault PSCmdlet_Register-AzModule PSCommand_Register-AzModule PSCmdlet_Enable-AzureRmAlias PSCommand_Enable-AzureRmAlias PSCmdlet_Disable-AzureRmAlias PSCommand_Disable-AzureRmAlias PSCmdlet_Uninstall-AzureRm PSCommand_Uninstall-AzureRm PSCmdlet_Invoke-AzRestMethod PSCommand_Invoke-AzRestMethod PSCmdlet_Get-AzAccessToken PSCommand_Get-AzAccessToken PSCmdlet_Open-AzSurveyLink PSCommand_Open-AzSurveyLink PSCmdlet_Get-AzConfig PSCommand_Get-AzConfig PSCmdlet_Update-AzConfig PSCommand_Update-AzConfig PSCmdlet_Clear-AzConfig PSCommand_Clear-AzConfig PSCmdlet_Export-AzConfig PSCommand_Export-AzConfig PSCmdlet_Import-AzConfig PSCommand_Import-AzConfig PSIncludes_Cmdlet False - 2023-10-21T12:36:30Z - 2.13.1 + 2024-05-03T23:57:47Z + 2.19.0 Microsoft Corporation false Module - Az.Accounts.nuspec|Accounts.format.ps1xml|Accounts.generated.format.ps1xml|lib\netcoreapp2.1\Azure.Core.dll|Accounts.types.ps1xml|lib\netcoreapp2.1\Microsoft.Identity.Client.dll|lib\netcoreapp3.1\Microsoft.Identity.Client.Extensions.Msal.dll|Az.Accounts.psd1|lib\netfx\Azure.Core.dll|Az.Accounts.psm1|lib\netfx\Microsoft.Identity.Client.dll|FuzzySharp.dll|lib\netfx\Microsoft.Identity.Client.Extensions.Msal.dll|Hyak.Common.dll|lib\netfx\Newtonsoft.Json.dll|Microsoft.ApplicationInsights.dll|lib\netfx\System.Diagnostics.DiagnosticSource.dll|Microsoft.Azure.Common.dll|lib\netfx\System.Numerics.Vectors.dll|Microsoft.Azure.PowerShell.AssemblyLoading.dll|lib\netfx\System.Reflection.DispatchProxy.dll|Microsoft.Azure.PowerShell.Authentication.Abstractions.dll|lib\netfx\System.Runtime.CompilerServices.Unsafe.dll|Microsoft.Azure.PowerShell.Authentication.dll|lib\netfx\System.Security.Cryptography.Cng.dll|Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll|lib\netfx\System.Text.Encodings.Web.dll|Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll|lib\netfx\System.Xml.ReaderWriter.dll|Microsoft.Azure.PowerShell.Authenticators.dll|lib\netstandard2.0\Azure.Identity.BrokeredAuthentication.dll|Microsoft.Azure.PowerShell.Clients.Aks.dll|lib\netstandard2.0\Azure.Identity.dll|Microsoft.Azure.PowerShell.Clients.Authorization.dll|lib\netstandard2.0\Microsoft.Bcl.AsyncInterfaces.dll|Microsoft.Azure.PowerShell.Clients.Compute.dll|lib\netstandard2.0\Microsoft.Identity.Client.Broker.dll|Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll|lib\netstandard2.0\Microsoft.Identity.Client.NativeInterop.dll|Microsoft.Azure.PowerShell.Clients.KeyVault.dll|lib\netstandard2.0\Microsoft.IdentityModel.Abstractions.dll|Microsoft.Azure.PowerShell.Clients.Monitor.dll|lib\netstandard2.0\msalruntime.dll|Microsoft.Azure.PowerShell.Clients.Network.dll|lib\netstandard2.0\msalruntime_arm64.dll|Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll|lib\netstandard2.0\msalruntime_x005F_x86.dll|Microsoft.Azure.PowerShell.Clients.ResourceManager.dll|lib\netstandard2.0\System.Buffers.dll|Microsoft.Azure.PowerShell.Clients.Storage.Management.dll|lib\netstandard2.0\System.Memory.Data.dll|Microsoft.Azure.PowerShell.Clients.Websites.dll|lib\netstandard2.0\System.Memory.dll|Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll|lib\netstandard2.0\System.Net.Http.WinHttpHandler.dll|Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml|lib\netstandard2.0\System.Private.ServiceModel.dll|Microsoft.Azure.PowerShell.Common.dll|lib\netstandard2.0\System.Security.AccessControl.dll|Microsoft.Azure.PowerShell.Common.Share.dll|lib\netstandard2.0\System.Security.Permissions.dll|Microsoft.Azure.PowerShell.Storage.dll|lib\netstandard2.0\System.Security.Principal.Windows.dll|Microsoft.Azure.PowerShell.Strategies.dll|lib\netstandard2.0\System.ServiceModel.Primitives.dll|Microsoft.Rest.ClientRuntime.Azure.dll|lib\netstandard2.0\System.Text.Json.dll|Microsoft.Rest.ClientRuntime.dll|lib\netstandard2.0\System.Threading.Tasks.Extensions.dll|Microsoft.WindowsAzure.Storage.DataMovement.dll|PostImportScripts\LoadAuthenticators.ps1|Microsoft.WindowsAzure.Storage.dll|StartupScripts\AzError.ps1|en-US\about_az.help.txt|StartupScripts\InitializeAssemblyResolver.ps1 + Az.Accounts.nuspec|Accounts.format.ps1xml|en-US\about_az.help.txt|Accounts.generated.format.ps1xml|lib\netfx\Newtonsoft.Json.dll|Accounts.types.ps1xml|lib\netfx\System.Diagnostics.DiagnosticSource.dll|lib\netfx\System.Numerics.Vectors.dll|Az.Accounts.psd1|lib\netfx\System.Reflection.DispatchProxy.dll|Az.Accounts.psm1|lib\netfx\System.Runtime.CompilerServices.Unsafe.dll|FuzzySharp.dll|lib\netfx\System.Security.Cryptography.Cng.dll|Hyak.Common.dll|lib\netfx\System.Security.Cryptography.ProtectedData.dll|Microsoft.ApplicationInsights.dll|lib\netfx\System.Text.Encodings.Web.dll|Microsoft.Azure.Common.dll|lib\netfx\System.Xml.ReaderWriter.dll|Microsoft.Azure.PowerShell.AssemblyLoading.dll|lib\netstandard2.0\Azure.Core.dll|Microsoft.Azure.PowerShell.Authentication.Abstractions.dll|lib\netstandard2.0\Azure.Identity.Broker.dll|Microsoft.Azure.PowerShell.Authentication.dll|lib\netstandard2.0\Azure.Identity.dll|Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll|lib\netstandard2.0\Microsoft.Bcl.AsyncInterfaces.dll|Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll|lib\netstandard2.0\Microsoft.Identity.Client.Broker.dll|Microsoft.Azure.PowerShell.Authenticators.dll|lib\netstandard2.0\Microsoft.Identity.Client.dll|Microsoft.Azure.PowerShell.Clients.Aks.dll|lib\netstandard2.0\Microsoft.Identity.Client.Extensions.Msal.dll|Microsoft.Azure.PowerShell.Clients.Authorization.dll|lib\netstandard2.0\Microsoft.Identity.Client.NativeInterop.dll|Microsoft.Azure.PowerShell.Clients.Compute.dll|lib\netstandard2.0\Microsoft.IdentityModel.Abstractions.dll|Microsoft.Azure.PowerShell.Clients.Graph.Rbac.dll|lib\netstandard2.0\msalruntime.dll|Microsoft.Azure.PowerShell.Clients.KeyVault.dll|lib\netstandard2.0\msalruntime_arm64.dll|Microsoft.Azure.PowerShell.Clients.Monitor.dll|lib\netstandard2.0\msalruntime_x005F_x86.dll|Microsoft.Azure.PowerShell.Clients.Network.dll|lib\netstandard2.0\System.Buffers.dll|Microsoft.Azure.PowerShell.Clients.PolicyInsights.dll|lib\netstandard2.0\System.Memory.Data.dll|Microsoft.Azure.PowerShell.Clients.ResourceManager.dll|lib\netstandard2.0\System.Memory.dll|Microsoft.Azure.PowerShell.Clients.Storage.Management.dll|lib\netstandard2.0\System.Net.Http.WinHttpHandler.dll|Microsoft.Azure.PowerShell.Clients.Websites.dll|lib\netstandard2.0\System.Private.ServiceModel.dll|Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll|lib\netstandard2.0\System.Security.AccessControl.dll|Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll-Help.xml|lib\netstandard2.0\System.Security.Permissions.dll|Microsoft.Azure.PowerShell.Common.dll|lib\netstandard2.0\System.Security.Principal.Windows.dll|Microsoft.Azure.PowerShell.Common.Share.dll|lib\netstandard2.0\System.ServiceModel.Primitives.dll|Microsoft.Azure.PowerShell.Storage.dll|lib\netstandard2.0\System.Text.Json.dll|Microsoft.Azure.PowerShell.Strategies.dll|lib\netstandard2.0\System.Threading.Tasks.Extensions.dll|Microsoft.Rest.ClientRuntime.Azure.dll|PostImportScripts\LoadAuthenticators.ps1|Microsoft.Rest.ClientRuntime.dll|StartupScripts\AzError.ps1|Microsoft.WindowsAzure.Storage.DataMovement.dll|StartupScripts\InitializeAssemblyResolver.ps1|Microsoft.WindowsAzure.Storage.dll 17a2feff-488b-47f9-8729-e2cec094624c 5.1 4.7.2 Microsoft Corporation
- C:\Github\CIPP-API\Az.Accounts\2.13.1 + C:\GitHub\CIPP Workspace\CIPP-API\Modules\Az.Accounts\2.19.0 diff --git a/Modules/Az.Accounts/2.19.0/PostImportScripts/LoadAuthenticators.ps1 b/Modules/Az.Accounts/2.19.0/PostImportScripts/LoadAuthenticators.ps1 new file mode 100644 index 000000000000..58df34965949 --- /dev/null +++ b/Modules/Az.Accounts/2.19.0/PostImportScripts/LoadAuthenticators.ps1 @@ -0,0 +1,220 @@ +if ($PSEdition -eq 'Desktop') { + try { + [Microsoft.Azure.Commands.Profile.Utilities.CustomAssemblyResolver]::Initialize() + } catch {} +} +# SIG # Begin signature block +# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBn8ROze2QLH/c6 +# GtPhR/BPLgOtmjkNhcq+fFmu16VcrqCCDYUwggYDMIID66ADAgECAhMzAAADri01 +# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG +# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 +# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 +# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV +# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd +# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w +# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh +# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW +# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v +# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw +# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx +# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB +# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W +# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY +# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV +# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 +# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 +# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t +# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i +# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk +# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK +# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO +# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK +# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm +# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw +# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE +# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD +# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG +# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la +# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc +# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D +# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ +# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk +# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 +# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd +# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL +# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd +# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 +# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS +# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI +# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL +# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD +# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv +# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF +# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h +# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA +# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn +# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 +# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b +# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ +# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy +# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp +# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi +# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb +# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS +# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL +# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX +# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x +# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt +# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p +# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA +# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw +# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC8M +# Xy0xGn+XGeN5xhSUhsVdQGTLtuHOS5+U3UgQ1k53MEIGCisGAQQBgjcCAQwxNDAy +# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20wDQYJKoZIhvcNAQEBBQAEggEARlleFgFNWR7nxdL0xMNZJ4S8ViuRXroErByc +# e9a3TI1RzW2C60Fn0en/y1PqJrgJXu1XBPuOMLfdn5VX+XycdRRLzBr1FTsK5g46 +# f8XMguzBFfjF3iW3e4v55A2AyDOHxy2Y70zkx4XtE1Fgcn/Bx0us+VHVffJi6CLd +# P0LIhDy9ji7Wku1cnTzySAvBJ94UlRLbrjNdnKIIhL3uD50XzkNu4iJDhL1Wteo2 +# Rxdy6KSPfo4w5FT9m0dYA8AoSZdEmeqQKCFJZJPSHQGpyJltDSABVjIhQMUNONtn +# lWp0HH+rlqq2HZ3NlzO5wPvnd/153deS6OuAOkS/dOcYKeGX/KGCFykwghclBgor +# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI +# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE +# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAfICubOd1Qe2FWFvk644eAojGPK1U+zYFe +# M69enprwGgIGZh+2YfAQGBMyMDI0MDQyMzEzMTYxOS4xMDZaMASAAgH0oIHYpIHV +# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL +# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT +# HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv +# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkie +# lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg +# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG +# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx +# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z +# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg +# VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB +# 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU +# IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo +# KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn +# vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2 +# RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9 +# OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS +# qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1 +# G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++ +# 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy +# k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK +# IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV +# HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D +# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv +# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy +# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l +# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB +# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD +# ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu +# y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X +# EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi +# D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S +# QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY +# huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7 +# 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg +# Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r +# rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg +# 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH +# doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB +# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE +# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc +# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 +# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 +# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O +# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn +# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t +# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq +# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP +# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW +# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv +# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb +# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten +# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc +# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a +# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB +# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU +# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw +# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E +# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB +# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ +# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ +# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p +# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB +# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v +# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h +# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x +# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p +# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A +# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC +# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB +# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt +# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 +# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV +# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 +# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw +# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB +# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk +# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U +# aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0 +# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy +# 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN +# BgkqhkiG9w0BAQUFAAIFAOnSHRowIhgPMjAyNDA0MjMxOTQyMThaGA8yMDI0MDQy +# NDE5NDIxOFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dIdGgIBADAHAgEAAgIN +# KjAHAgEAAgIRtjAKAgUA6dNumgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE +# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB +# AAPWsZdCCWsEmxg1OXos5EufWRbruuws3CJ+wEAhXiNDRMQ7tdOCBgZR4T/JVpjA +# dTjbpz0afi31snq11zCbJoH2p291ETykxGG5oDc9PUq7jhEVlu3lAa2u4xmVD6Tp +# ANJGZ4XBHaaFo4pYqZnf+r6LSbkNZ7j7/OiTe7k9FCvYMYIEDTCCBAkCAQEwgZMw +# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd +# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAA +# Ad4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB +# BDAvBgkqhkiG9w0BCQQxIgQg1niWOz8NQyEyjrlUV1q3JbjIKZ5oAgg0PzQl/4wO +# sbAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3Mg +# rT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI +# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv +# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD +# QSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIJZsqRmMvFYOvtIgYbW9mvW3 +# 4zSiELA9VMZ+e/k6ckSaMA0GCSqGSIb3DQEBCwUABIICAKj8NiUjjyu8EV3s1TJM +# OAMvbeCrPXoHcvbGADvwx3SGqx3xE4sVWveXwsd2YyhZqd8cfUYlVQ97Z5srj4Pc +# XKMyOO+b0vBgi7mHfTMGQEuE0H7Esorthozd+C6PgUSWHkblP7zFrEOfpN0+FsOo +# 7X7pSo3I+0gAYG8LwhAq3RjQ1Mn/phWORjGKIyJY2n1ZRO05mXN3K6j329ALQxsw +# YOz4HwjgK7SZuJaRuAlLJ7IMriEHk0HcYF+LdEk+aaA6wJwhohNO7WRbxiZ2HbAr +# eeu7aOQrMNts9SGm+G4bOFwbWOY1rcrTtNx9xQfYMAng5YkpJg0efu3b20+l6VRU +# z2BPIY3pKb2MY5rzN7znkEldQN45idfQsme3WhsEIBJUA/oqsnjWti5Tj4clv1Ii +# ocsSx4e3LfptpiMIWwdKMytt+9XUi5FfnzVV4xJCyjUmWzLHxU6mqJmmGWY+FXQ0 +# kKdzU8+DtlkjWQgQ00zLVXQjaDjpE0RQpneKmOyc10T1N+1u0nxtWOaZ8Lf1S+Q1 +# 9L1WOvq0OkxS5U53mZPigW26jr9RQZFviK2rjcvf+Xe70tMtP4HCrIMi1Dry6KTc +# ShYaTpHtEUc871m61E4zD04znJuRua18aL6OuAz2ECNqWavdl3WWQ8oMVVKWfcNB +# f804NJqiQ3ABVqc7SLiXmkcz +# SIG # End signature block diff --git a/Modules/Az.Accounts/2.19.0/StartupScripts/AzError.ps1 b/Modules/Az.Accounts/2.19.0/StartupScripts/AzError.ps1 new file mode 100644 index 000000000000..bba347b523ef --- /dev/null +++ b/Modules/Az.Accounts/2.19.0/StartupScripts/AzError.ps1 @@ -0,0 +1,279 @@ +function Write-InstallationCheckToFile +{ + Param($installationchecks) + if (Get-Module AzureRM.Profile -ListAvailable -ErrorAction Ignore) + { + Write-Warning ("Both Az and AzureRM modules were detected on this machine. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide") + } + + $installationchecks.Add("AzSideBySideCheck","true") + try + { + if (Test-Path $pathToInstallationChecks -ErrorAction Ignore) + { + Remove-Item -Path $pathToInstallationChecks -ErrorAction Stop + } + + $pathToInstallDir = Split-Path -Path $pathToInstallationChecks -Parent -ErrorAction Stop + if (Test-Path $pathToInstallDir -ErrorAction Ignore) + { + New-Item -Path $pathToInstallationChecks -ErrorAction Stop -ItemType File -Value ($installationchecks | ConvertTo-Json -ErrorAction Stop) + } + } + catch + { + Write-Verbose "Installation checks failed to write to file." + } +} + +if (!($env:SkipAzInstallationChecks -eq "true")) +{ + $pathToInstallationChecks = Join-Path (Join-Path $HOME ".Azure") "AzInstallationChecks.json" + $installationchecks = @{} + if (!(Test-Path $pathToInstallationChecks -ErrorAction Ignore)) + { + Write-InstallationCheckToFile $installationchecks + } + else + { + try + { + ((Get-Content $pathToInstallationChecks -ErrorAction Stop) | ConvertFrom-Json -ErrorAction Stop).PSObject.Properties | Foreach { $installationchecks[$_.Name] = $_.Value } + } + catch + { + Write-InstallationCheckToFile $installationchecks + } + + if (!$installationchecks.ContainsKey("AzSideBySideCheck")) + { + Write-InstallationCheckToFile $installationchecks + } + } +} + +if (Get-Module AzureRM.profile -ErrorAction Ignore) +{ + Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") + throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") +} + +Update-TypeData -AppendPath (Join-Path (Get-Item $PSScriptRoot).Parent.FullName Accounts.types.ps1xml) -ErrorAction Ignore +# SIG # Begin signature block +# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT3s8rOGw0kP8l +# AbYXJ7G9hr2fOKBRtW5xO6fWVEOZvqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA +# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA +# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG +# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN +# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL +# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB +# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw +# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW +# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci +# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG +# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 +# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd +# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ +# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY +# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp +# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn +# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT +# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG +# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O +# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk +# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx +# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt +# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq +# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG +# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG +# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg +# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 +# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr +# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg +# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy +# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 +# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh +# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k +# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB +# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn +# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 +# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w +# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o +# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD +# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa +# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny +# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG +# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t +# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV +# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG +# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl +# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb +# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l +# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 +# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 +# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 +# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam +# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa +# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah +# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA +# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt +# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr +# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw +# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN +# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp +# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB +# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO +# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKR+w/DaLVp8ra2PXQQVXZI6 +# DyW6fyW+fzmibTR/vTxzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A +# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB +# BQAEggEAgva3eFK5pY77tb4cpS6ATueu8hw916JFSLj1CD6CrRvuFkBDz9FriOfS +# 6ileNmZAy4Xphf32jbLtGimOmbtY/t5pkJaGQtVaQS1xErrcOVE39nRX3K5a0Efw +# UB8XvAR44J+0oliWVURdzmrahq1CYJaeblHZG5MXhJP0MwfPkitCYs9jXL8MloUy +# v71E0KJSgPfZDacIaZa1nR8BSC1D0uiigkioLBAy7Vdg/9/I3+g9eyC4qJ8AK+BM +# 4p+V61LvyIR110FwLdNNXqzjO+oRrL0cFRmA29qjP5bT03kiVXEklfx+w2UUGbhp +# OQiLJEurQmZALDHO8Gsu7vesXzEBeaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC +# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq +# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl +# AwQCAQUABCAe/o5BsWh1Xsr2uMp6SKTlN6GTVbaDNMwASZEn0tPvaQIGZh+2YeeI +# GBMyMDI0MDQyMzEzMTUyMi4yNTNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV +# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE +# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl +# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO +# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT +# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ +# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx +# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl +# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC +# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x +# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb +# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb +# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy +# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS +# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU +# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 +# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp +# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa +# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu +# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ +# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg +# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD +# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j +# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG +# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw +# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD +# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI +# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr +# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld +# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd +# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa +# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL +# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC +# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg +# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL +# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH +# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 +# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ +# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m +# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh +# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 +# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD +# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB +# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK +# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg +# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp +# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d +# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 +# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR +# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu +# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO +# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb +# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 +# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t +# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW +# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb +# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz +# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku +# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA +# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 +# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu +# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw +# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 +# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt +# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q +# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 +# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt +# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis +# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp +# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 +# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e +# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ +# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 +# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 +# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ +# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx +# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT +# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh +# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy +# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy +# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk +# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD +# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF +# AOnSHRowIhgPMjAyNDA0MjMxOTQyMThaGA8yMDI0MDQyNDE5NDIxOFowdDA6Bgor +# BgEEAYRZCgQBMSwwKjAKAgUA6dIdGgIBADAHAgEAAgINKjAHAgEAAgIRtjAKAgUA +# 6dNumgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID +# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAPWsZdCCWsEmxg1OXos +# 5EufWRbruuws3CJ+wEAhXiNDRMQ7tdOCBgZR4T/JVpjAdTjbpz0afi31snq11zCb +# JoH2p291ETykxGG5oDc9PUq7jhEVlu3lAa2u4xmVD6TpANJGZ4XBHaaFo4pYqZnf +# +r6LSbkNZ7j7/OiTe7k9FCvYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx +# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT +# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB +# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx +# IgQgKTtEd9zpIOfZbYxmyyZE1/8xUl3l3J+YfzEMx+vLvKIwgfoGCyqGSIb3DQEJ +# EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d +# ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw +# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x +# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I +# npafKEQ9AAEAAAHeMCIEIJZsqRmMvFYOvtIgYbW9mvW34zSiELA9VMZ+e/k6ckSa +# MA0GCSqGSIb3DQEBCwUABIICAHpc9mJDGIip/NFNVJI1x9yzHkz+rdLKHeBf1DYK +# Uw3P5ZEfGWj6m/6dmddiBbB7eMt24DMeSRkjNIh2RyM3HeMIXJoobe//gFT04ewr +# I4cBJoDF6hI7DMlKLzGXFWmlHRFrHGTJhmD/O6k3+R5SPJB18NTd8K8MI+BdBMZd +# UXM069WCDXkGMjTUWF9kBrmIaH1O2SQzTFClCKlNbikWLD9PZlqMYiozjsGFMESe +# mYQH878G+CU0Gsqt9V5e7BHulAk3AaxA14MyucB0d0bS35KRzOUTadxGth96B1PD +# eAJJriJou45DenwPzc0yvZuPwsgtezT25vwWyZ6IGA9QkWcWeVBgehSZCLDaWGoB +# rblqPWOmeuhHgcgenPgP00Pne8mGgwUbe2Mcw0aMmVNviaAS89M9TpPcUiqoOtSI +# T19zYFNSTcrgK066YppzvtCG8mvtA49LCN4PzKAasWxqWNBIPdyibvgzodwNBC2y +# sq77Usgguzef7vozLDgQ/su9Dr+HlgoOJDI3n01qZQ+FoiNRs5LnGqD16ZyrkJum +# H2TEpjK9WwWj6ZaeQdZ1SDt+c83NIo71Xf966aYOcdEaBizQj8xN55licv+iX/cP +# dxyT4UR7cxVi8ETzKk0jKoyzboXqSyygHfLskt0rOGjzFsInadaholkMJrDlX7JO +# qvt/ +# SIG # End signature block diff --git a/Modules/Az.Accounts/2.13.1/StartupScripts/InitializeAssemblyResolver.ps1 b/Modules/Az.Accounts/2.19.0/StartupScripts/InitializeAssemblyResolver.ps1 similarity index 58% rename from Modules/Az.Accounts/2.13.1/StartupScripts/InitializeAssemblyResolver.ps1 rename to Modules/Az.Accounts/2.19.0/StartupScripts/InitializeAssemblyResolver.ps1 index f03e9ec7eb08..106098ca8ebd 100644 --- a/Modules/Az.Accounts/2.13.1/StartupScripts/InitializeAssemblyResolver.ps1 +++ b/Modules/Az.Accounts/2.19.0/StartupScripts/InitializeAssemblyResolver.ps1 @@ -24,42 +24,42 @@ else { } } # SIG # Begin signature block -# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCAe8RL2QVOwrz6 -# penupFKMe0U4FkbIX5RGfbRRPsEAcqCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 -# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# penupFKMe0U4FkbIX5RGfbRRPsEAcqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA +# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU -# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 -# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm -# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa -# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq -# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw +# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA +# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG +# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN +# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL +# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB +# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW -# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci +# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 -# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk -# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 -# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 -# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d -# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM -# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh -# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX -# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir -# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 -# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A -# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H -# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq +# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd +# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ +# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY +# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp +# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn +# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT +# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG +# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O +# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk +# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx +# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt +# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 @@ -99,67 +99,67 @@ else { # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr -# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw +# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp -# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB +# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMHofDlPBqmVqK1okjwWVgBB # tT7fuKbvz/K2Z2tehrjfMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB -# BQAEggEAh6WOd8mYDPLLkfaNOj1I07laB0TnfUoY3kPU8nRKXndoULPuXHTw+0TR -# ZwgvCjxyErXrV6Gpd03Xy2YcKFMOT5DHY8iV0olxkvZNHTt0oMmIUjYyCkblV3PA -# nrDZGbmmxw3FKRT/n2bQ9SNj7PNl29HgNxQxlDSEl6yJP+Bs11pyfW5uNYNVFPIj -# M5ddEr31Z9y/SwJ0oB892Anu6ZT2Cqy6Xt5XIacqNVpWG00UUVguvrHdelkLF4g4 -# dgI+UROhJfNfXgkmazGilBrufCC3LFe46BZgY3kJavyni3F3qsAujcb8+0QXczTu -# 9omGeP+6mHTHBR+9gPJW9pp+0x6O96GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC -# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq +# BQAEggEAQlCya9L0RwSdnHljRcIojb7WWS6VAfrbVetrwWWN3EWbBH2YNvq/QTSs +# NThcSKVdGn4dP8yAyQV0zLMWk32I8GtUROm21OfjMti9GkzVeD9/OZjFaQNWY0Ez +# ZRGKdpEB8bOaHNfS49PMIIBOvEjXCae9lFSl/TR7x3EhwIroEwgn1juo1fPrcUv3 +# 0ome6XF6saK5JRW18Ywnujn9plwe20Mm9sLFqDK5wq066RLK1QDKMbQw2vTTZkhO +# H9KV5To1QiBZNEJNzhGszD91jvQVcRv6SRBAfem22P48bA1h+y5vxz3RCUhMhmQM +# j1ZUKfJFoJhTqmLtFMzskpnb2eqbUaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC +# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl -# AwQCAQUABCDB/5pgJMSywQWzPV9JmKhJL6MoNIaXQMIgMZkbopcpUAIGZQQDsMbk -# GBMyMDIzMDkyMDA1NTA0NC4xNTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV +# AwQCAQUABCBuXBv1oHsDlg97cKbAvZaNiOXCOWXDwJur9w9xKgNWoQIGZhglJ+pc +# GBMyMDI0MDQyMzEzMTYxMC4xODFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l -# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w +# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg -# ghHqMIIHIDCCBQigAwIBAgITMwAAAdIhJDFKWL8tEQABAAAB0jANBgkqhkiG9w0B +# ghHtMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD -# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy -# MjFaFw0yNDAyMDExOTEyMjFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz +# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 +# NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z -# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV +# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB -# AQUAA4ICDwAwggIKAoICAQDcYIhC0QI/SPaT5+nYSBsSdhBPO2SXM40Vyyg8Fq1T -# PrMNDzxChxWUD7fbKwYGSsONgtjjVed5HSh5il75jNacb6TrZwuX+Q2++f2/8CCy -# u8TY0rxEInD3Tj52bWz5QRWVQejfdCA/n6ZzinhcZZ7+VelWgTfYC7rDrhX3TBX8 -# 9elqXmISOVIWeXiRK8h9hH6SXgjhQGGQbf2bSM7uGkKzJ/pZ2LvlTzq+mOW9iP2j -# cYEA4bpPeurpglLVUSnGGQLmjQp7Sdy1wE52WjPKdLnBF6JbmSREM/Dj9Z7okxRN -# UjYSdgyvZ1LWSilhV/wegYXVQ6P9MKjRnE8CI5KMHmq7EsHhIBK0B99dFQydL1vd -# uC7eWEjzz55Z/DyH6Hl2SPOf5KZ4lHf6MUwtgaf+MeZxkW0ixh/vL1mX8VsJTHa8 -# AH+0l/9dnWzFMFFJFG7g95nHJ6MmYPrfmoeKORoyEQRsSus2qCrpMjg/P3Z9WJAt -# FGoXYMD19NrzG4UFPpVbl3N1XvG4/uldo1+anBpDYhxQU7k1gfHn6QxdUU0TsrJ/ -# JCvLffS89b4VXlIaxnVF6QZh+J7xLUNGtEmj6dwPzoCfL7zqDZJvmsvYNk1lcbyV -# xMIgDFPoA2fZPXHF7dxahM2ZG7AAt3vZEiMtC6E/ciLRcIwzlJrBiHEenIPvxW15 -# qwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCC2n7cnR3ToP/kbEZ2XJFFmZ1kkMB8G +# AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV +# lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz +# zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf +# dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld +# 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW +# EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC +# tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK +# Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG +# 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs +# WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH +# SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU +# 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD -# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCw5iq0Ey0LlAdz2PcqchRwW5d+fitNISCv -# qD0E6W/AyiTk+TM3WhYTaxQ2pP6Or4qOV+Du7/L+k18gYr1phshxVMVnXNcdjecM -# tTWUOVAwbJoeWHaAgknNIMzXK3+zguG5TVcLEh/CVMy1J7KPE8Q0Cz56NgWzd9ur -# G+shSDKkKdhOYPXF970Mr1GCFFpe1oXjEy6aS+Heavp2wmy65mbu0AcUOPEn+hYq -# ijgLXSPqvuFmOOo5UnSV66Dv5FdkqK7q5DReox9RPEZcHUa+2BUKPjp+dQ3D4c9I -# H8727KjMD8OXZomD9A8Mr/fcDn5FI7lfZc8ghYc7spYKTO/0Z9YRRamhVWxxrIsB -# N5LrWh+18soXJ++EeSjzSYdgGWYPg16hL/7Aydx4Kz/WBTUmbGiiVUcE/I0aQU2U -# /0NzUiIFIW80SvxeDWn6I+hyVg/sdFSALP5JT7wAe8zTvsrI2hMpEVLdStFAMqan -# FYqtwZU5FoAsoPZ7h1ElWmKLZkXk8ePuALztNY1yseO0TwdueIGcIwItrlBYg1Xp -# Pz1+pMhGMVble6KHunaKo5K/ldOM0mQQT4Vjg6ZbzRIVRoDcArQ5//0875jOUvJt -# Yyc7Hl04jcmvjEIXC3HjkUYvgHEWL0QF/4f7vLAchaEZ839/3GYOdqH5VVnZrUIB -# QB6DTaUILDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI +# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F +# 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS +# ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU +# XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w +# iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ +# gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u +# er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni +# a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si +# rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf +# 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa +# WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho +# Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy @@ -198,45 +198,45 @@ else { # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL -# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN -# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp +# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ +# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn -# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD -# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ -# ptLCZsE06NtmHQzB5F1TroFSBqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD +# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD +# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI +# o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w -# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6LRwyDAiGA8yMDIzMDkxOTE5MTEw -# NFoYDzIwMjMwOTIwMTkxMTA0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDotHDI -# AgEAMAcCAQACAi5fMAcCAQACAhMzMAoCBQDotcJIAgEAMDYGCisGAQQBhFkKBAIx -# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI -# hvcNAQELBQADggEBABSMhArCfMaUns9Ybi+bd7CrSqySoFW9FQHNYSc/7Z4kVIDH -# MOSWB04XzoJV+b5q9p40kFfOlc5b184s/ZuR0zXF8NOTag0yTpWUYZDo3OrdVa45 -# g1JiqIjXs1Mpilyf/r194uoB8G63Kyxv4tyQX01/UL1ohtT88bXEDl6pNb+Xyhu/ -# 3benlypP9gr5fXHU1AcSpR/fuLO2QX4Inqqsrn8073fZkUrFfXeHgYGscjH/6A8V -# xK3x86MVX85OKS7L48K64XMJmuNzDOPMz7fbFLtwrj3tXhnU179w/GuGdvFgRaPf -# VfxZcx4y31FR1J4hDsrSVj/eGul6ZvDhEP5llugxggQNMIIECQIBATCBkzB8MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy -# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdIhJDFKWL8tEQABAAAB0jAN -# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G -# CSqGSIb3DQEJBDEiBCDABiZtIILyalxFaNkpSNLPyB6dnqa8Og8PeO2M5QwQvjCB -# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMeAIJPf30i9ZbOExU557GwWNaLH -# 0Z5s65JFga2DeaROMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh -# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD -# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw -# MTACEzMAAAHSISQxSli/LREAAQAAAdIwIgQgxHcZpEl6iRNRIzFH1U59AFtiyMD5 -# cXN76GiPGy+kKMAwDQYJKoZIhvcNAQELBQAEggIA0Ev33yJgxJMIh75Ft6iuoxJH -# qmm0N6lliYKEIWF42TZBKU4ubpdr1tca9Wt8bL/AagZ4tEEb1fKBJTwmedSQQOey -# cWdkjeXRlHqBkHEpz/u+yIl9/4KojgmxT9P0ZNfHPjQxt9Zb7wubc2N9tgJ6ZwXr -# Kx/1DZkiKwXXRbNga7yyVM924J0/xokBiDkWtWKF4UOdEAtAoQmxwtVFWnJBVVQK -# BV8bAgi4+5lGrD1PoX1/uLd1hsnr0+/qu/Lz8f20DcFmPrp+gEXLdDCvws93b9fx -# 3hSuuVawfT8XFnXEut989RtYBlYkOPgDIrUbuHj5EqmB19UnhOeFkvhMHEqq+XKo -# kO9mHo8WZOnMFYM8FeSclxl3z/3jrAEibfoXBpVXFv1F3GGt5WH+2UWs7JXTK01R -# tnDr6DRsMEIr0yw2g1cb//u0BkmcEwBXr51dNX3E0WAxqVJk9yjV+YuGLjeD569E -# wDGANqkm83LIALMCBaBAzjVoG8jVnR0gLXrca7i+ez1h/jVDl5GmGcVfdgvxzDYk -# +uMpr/FsnoEFMGiBe/9l72gXY7pnoCipoNTx6q3GA3cfzfVDw27c8AzCny1DHUvj -# cUPCdId96d7eIR//lZo+DnJdQ+rsPlDuqpPdoldS/TzlCl+5Z8idTtxp9kSqzt8O -# aZYYi6hivyQoGN3avBU= +# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dHMaDAiGA8yMDI0MDQyMzA1NTgw +# MFoYDzIwMjQwNDI0MDU1ODAwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0cxo +# AgEAMAoCAQACAhumAgH/MAcCAQACAhOWMAoCBQDp0x3oAgEAMDYGCisGAQQBhFkK +# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ +# KoZIhvcNAQELBQADggEBAHuFwnym2r7kFbUSwAIhNBE7GWHUnl4GPkTRV9TELUue +# +4ulfVp7+fozqonA3eKejtIwlMl0hIsL+l3vUYCybFUstRmWgaoyPqQ4BVQ/O0Oa +# CjOmbnTGQwNbljJOEyB1moLTvX4v2CrijfO2cffFfJ6m/+NpJEcN7wT7MDDhAl2W +# 3Bg7DrmE35fqfPIhSgMx91tBc976NzsJvMMh9ahJrkqzBokvefRb+J5EuJLSIdXp +# Go6wbgJ8PPWqXswAll/cB81QGy+IvJxx4PCDw53a4MHSQt/JiaHkW926e21LE/cZ +# 19KSnceGCzw2gLv/JUMg37LUAkNpT3ShRxh8EZMiQ/wxggQNMIIECQIBATCBkzB8 +# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk +# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N +# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB +# 7jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE +# MC8GCSqGSIb3DQEJBDEiBCCw+o8UIgMaCDLBwzpkFk6WHamsK1mus0nQulDsFH7c +# uDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIk +# Bz9oCS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m +# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB +# IDIwMTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQg6teaou3uEbPepaFO9eBh6kjY +# LknalC+ILH6PdqcEDpEwDQYJKoZIhvcNAQELBQAEggIAuWbODIE5aTbEla7G0YP5 +# 0vP2aC9Xox00BcRuMNrTbEiWD19gK7zGz9RLtvBXBBbqQacK1wmpzIAOituqIiZh +# IYG/s04+E7ykiAr6vqX2zmoBrzjb4NTXFmHCDcLk2zBbwKvSoIn4+NFP60Tf//38 +# FZB94/RISXGfdTw0J7DwR08i7x4o3qOc3y7ORKwVJMxg4/HOhFpFMU7YVQVvxpCT +# heGcH8GfduurrM8LQei7YhRJNar4FX7gu93YEpDmNCGQyVzlRqNsHiJF1wM9U9B1 +# z+kpjvZsnNXlROwI0p9jTI6cw6W+Dh5Tcp61opZuxJydnRyYier5PIBzULDeIKlw +# ZaDdwh7P6a/9JBaUHBGG3OruiEaIP5v7qXeQ+CldN3WD8dSSrHjggWTL1zC3T/v6 +# Hy/oAXDGj6VY6Zp1kj9vDP2r2O+7q1M6GMnH4nW3qmzPEXfnocokJ03y9K7wbVcC +# oTYukyn8aoPhnnzStDcOKzJ8Ha/lVwqhC41CGmRg/a2Yv3FB6M18rP8YzvTP2qq4 +# /JJi2JTw5+8NrxeGDOK74WOJl8y3iSMUNGJM2HXsq7n4HLazFyo1Ev3ZfZmb6C5z +# tWYhuc2CZJuwr/inBoYR31sqJ3ICRyT95/oZ3XlCjUb0tlBN7uHseTLTYYuOpu5W +# S6vtlLCxDfhXczjKKk6LpCI= # SIG # End signature block diff --git a/Modules/Az.Accounts/2.10.4/en-US/about_az.help.txt b/Modules/Az.Accounts/2.19.0/en-US/about_az.help.txt similarity index 100% rename from Modules/Az.Accounts/2.10.4/en-US/about_az.help.txt rename to Modules/Az.Accounts/2.19.0/en-US/about_az.help.txt diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/Newtonsoft.Json.dll b/Modules/Az.Accounts/2.19.0/lib/netfx/Newtonsoft.Json.dll similarity index 99% rename from Modules/Az.Accounts/2.13.1/lib/netfx/Newtonsoft.Json.dll rename to Modules/Az.Accounts/2.19.0/lib/netfx/Newtonsoft.Json.dll index 9f13f1f8a4fd..47dbc9e10936 100644 Binary files a/Modules/Az.Accounts/2.13.1/lib/netfx/Newtonsoft.Json.dll and b/Modules/Az.Accounts/2.19.0/lib/netfx/Newtonsoft.Json.dll differ diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Diagnostics.DiagnosticSource.dll b/Modules/Az.Accounts/2.19.0/lib/netfx/System.Diagnostics.DiagnosticSource.dll similarity index 100% rename from Modules/Az.Accounts/2.13.1/lib/netfx/System.Diagnostics.DiagnosticSource.dll rename to Modules/Az.Accounts/2.19.0/lib/netfx/System.Diagnostics.DiagnosticSource.dll diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Numerics.Vectors.dll b/Modules/Az.Accounts/2.19.0/lib/netfx/System.Numerics.Vectors.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Numerics.Vectors.dll rename to Modules/Az.Accounts/2.19.0/lib/netfx/System.Numerics.Vectors.dll diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Reflection.DispatchProxy.dll b/Modules/Az.Accounts/2.19.0/lib/netfx/System.Reflection.DispatchProxy.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Reflection.DispatchProxy.dll rename to Modules/Az.Accounts/2.19.0/lib/netfx/System.Reflection.DispatchProxy.dll diff --git a/Modules/Az.Accounts/2.13.1/lib/netfx/System.Runtime.CompilerServices.Unsafe.dll b/Modules/Az.Accounts/2.19.0/lib/netfx/System.Runtime.CompilerServices.Unsafe.dll similarity index 100% rename from Modules/Az.Accounts/2.13.1/lib/netfx/System.Runtime.CompilerServices.Unsafe.dll rename to Modules/Az.Accounts/2.19.0/lib/netfx/System.Runtime.CompilerServices.Unsafe.dll diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.Cryptography.Cng.dll b/Modules/Az.Accounts/2.19.0/lib/netfx/System.Security.Cryptography.Cng.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Security.Cryptography.Cng.dll rename to Modules/Az.Accounts/2.19.0/lib/netfx/System.Security.Cryptography.Cng.dll diff --git a/Modules/Az.Accounts/2.19.0/lib/netfx/System.Security.Cryptography.ProtectedData.dll b/Modules/Az.Accounts/2.19.0/lib/netfx/System.Security.Cryptography.ProtectedData.dll new file mode 100644 index 000000000000..a7029b32f95d Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/lib/netfx/System.Security.Cryptography.ProtectedData.dll differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Text.Encodings.Web.dll b/Modules/Az.Accounts/2.19.0/lib/netfx/System.Text.Encodings.Web.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Text.Encodings.Web.dll rename to Modules/Az.Accounts/2.19.0/lib/netfx/System.Text.Encodings.Web.dll diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Xml.ReaderWriter.dll b/Modules/Az.Accounts/2.19.0/lib/netfx/System.Xml.ReaderWriter.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Xml.ReaderWriter.dll rename to Modules/Az.Accounts/2.19.0/lib/netfx/System.Xml.ReaderWriter.dll diff --git a/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Azure.Core.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Azure.Core.dll new file mode 100644 index 000000000000..05384a2c3cf4 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Azure.Core.dll differ diff --git a/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Azure.Identity.Broker.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Azure.Identity.Broker.dll new file mode 100644 index 000000000000..2bf4a4f415b2 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Azure.Identity.Broker.dll differ diff --git a/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Azure.Identity.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Azure.Identity.dll new file mode 100644 index 000000000000..4a32fd0d9870 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Azure.Identity.dll differ diff --git a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.Bcl.AsyncInterfaces.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Bcl.AsyncInterfaces.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.Bcl.AsyncInterfaces.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Bcl.AsyncInterfaces.dll diff --git a/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.Broker.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.Broker.dll new file mode 100644 index 000000000000..a7782878cab1 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.Broker.dll differ diff --git a/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.Extensions.Msal.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.Extensions.Msal.dll new file mode 100644 index 000000000000..1a2779cfa5b1 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.Extensions.Msal.dll differ diff --git a/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.NativeInterop.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.NativeInterop.dll new file mode 100644 index 000000000000..44eb67c67dc8 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.NativeInterop.dll differ diff --git a/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.dll new file mode 100644 index 000000000000..edd48d6eb824 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.Identity.Client.dll differ diff --git a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.IdentityModel.Abstractions.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.IdentityModel.Abstractions.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/Microsoft.IdentityModel.Abstractions.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/Microsoft.IdentityModel.Abstractions.dll diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Buffers.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Buffers.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Buffers.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Buffers.dll diff --git a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/System.Memory.Data.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Memory.Data.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/System.Memory.Data.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Memory.Data.dll diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Memory.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Memory.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Memory.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Memory.dll diff --git a/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Net.Http.WinHttpHandler.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Net.Http.WinHttpHandler.dll new file mode 100644 index 000000000000..598cb6335808 Binary files /dev/null and b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Net.Http.WinHttpHandler.dll differ diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Private.ServiceModel.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Private.ServiceModel.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Private.ServiceModel.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Private.ServiceModel.dll diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Security.AccessControl.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Security.AccessControl.dll similarity index 100% rename from Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Security.AccessControl.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Security.AccessControl.dll diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Security.Permissions.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Security.Permissions.dll similarity index 100% rename from Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Security.Permissions.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Security.Permissions.dll diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Security.Principal.Windows.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Security.Principal.Windows.dll similarity index 100% rename from Modules/Az.Accounts/2.13.1/lib/netstandard2.0/System.Security.Principal.Windows.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Security.Principal.Windows.dll diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.ServiceModel.Primitives.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.ServiceModel.Primitives.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.ServiceModel.Primitives.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.ServiceModel.Primitives.dll diff --git a/Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/System.Text.Json.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Text.Json.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/AzSharedAlcAssemblies/System.Text.Json.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Text.Json.dll diff --git a/Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Threading.Tasks.Extensions.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Threading.Tasks.Extensions.dll similarity index 100% rename from Modules/Az.Accounts/2.10.4/PreloadAssemblies/System.Threading.Tasks.Extensions.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/System.Threading.Tasks.Extensions.dll diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/msalruntime.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/msalruntime.dll similarity index 100% rename from Modules/Az.Accounts/2.13.1/lib/netstandard2.0/msalruntime.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/msalruntime.dll diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/msalruntime_arm64.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/msalruntime_arm64.dll similarity index 100% rename from Modules/Az.Accounts/2.13.1/lib/netstandard2.0/msalruntime_arm64.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/msalruntime_arm64.dll diff --git a/Modules/Az.Accounts/2.13.1/lib/netstandard2.0/msalruntime_x86.dll b/Modules/Az.Accounts/2.19.0/lib/netstandard2.0/msalruntime_x86.dll similarity index 100% rename from Modules/Az.Accounts/2.13.1/lib/netstandard2.0/msalruntime_x86.dll rename to Modules/Az.Accounts/2.19.0/lib/netstandard2.0/msalruntime_x86.dll diff --git a/Modules/Az.Accounts/2.9.1/AzSharedAlcAssemblies/Azure.Core.dll b/Modules/Az.Accounts/2.9.1/AzSharedAlcAssemblies/Azure.Core.dll deleted file mode 100644 index 342eeff5cc0b..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/AzSharedAlcAssemblies/Azure.Core.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/AzSharedAlcAssemblies/Azure.Identity.dll b/Modules/Az.Accounts/2.9.1/AzSharedAlcAssemblies/Azure.Identity.dll deleted file mode 100644 index eaab4655b4fe..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/AzSharedAlcAssemblies/Azure.Identity.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/AzSharedAlcAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll b/Modules/Az.Accounts/2.9.1/AzSharedAlcAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll deleted file mode 100644 index dc7f1deb1f0e..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/AzSharedAlcAssemblies/Microsoft.Identity.Client.Extensions.Msal.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/FuzzySharp.dll b/Modules/Az.Accounts/2.9.1/FuzzySharp.dll deleted file mode 100644 index 708889b48507..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/FuzzySharp.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/Hyak.Common.dll b/Modules/Az.Accounts/2.9.1/Hyak.Common.dll deleted file mode 100644 index 18a53248894f..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/Hyak.Common.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.Common.dll b/Modules/Az.Accounts/2.9.1/Microsoft.Azure.Common.dll deleted file mode 100644 index 1c9d8e2a0ef5..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.Common.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll b/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll deleted file mode 100644 index 9a592ce40523..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authentication.Abstractions.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll b/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll deleted file mode 100644 index 99add543c9de..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authentication.ResourceManager.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authentication.dll b/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authentication.dll deleted file mode 100644 index a95c5ed04f8b..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authentication.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll b/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll deleted file mode 100644 index bde7d373c106..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.AuthenticationAssemblyLoadContext.dll and /dev/null differ diff --git a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authenticators.dll b/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authenticators.dll deleted file mode 100644 index 07a3a4ad8724..000000000000 Binary files a/Modules/Az.Accounts/2.9.1/Microsoft.Azure.PowerShell.Authenticators.dll and /dev/null differ diff --git a/Modules/Az.Storage/5.10.1/Az.Storage.psd1 b/Modules/Az.Storage/5.10.1/Az.Storage.psd1 deleted file mode 100644 index bf9a7675ace1..000000000000 --- a/Modules/Az.Storage/5.10.1/Az.Storage.psd1 +++ /dev/null @@ -1,490 +0,0 @@ -# -# Module manifest for module 'Az.Storage' -# -# Generated by: Microsoft Corporation -# -# Generated on: 9/20/2023 -# - -@{ - -# Script module or binary module file associated with this manifest. -RootModule = 'Az.Storage.psm1' - -# Version number of this module. -ModuleVersion = '5.10.1' - -# Supported PSEditions -CompatiblePSEditions = 'Core', 'Desktop' - -# ID used to uniquely identify this module -GUID = 'dfa9e4ea-1407-446d-9111-79122977ab20' - -# Author of this module -Author = 'Microsoft Corporation' - -# Company or vendor of this module -CompanyName = 'Microsoft Corporation' - -# Copyright statement for this module -Copyright = 'Microsoft Corporation. All rights reserved.' - -# Description of the functionality provided by this module -Description = 'Microsoft Azure PowerShell - Storage service data plane and management cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. Creates and manages storage accounts in Azure Resource Manager. - -For more information on Storage, please visit the following: https://learn.microsoft.com/azure/storage/' - -# Minimum version of the PowerShell engine required by this module -PowerShellVersion = '5.1' - -# Name of the PowerShell host required by this module -# PowerShellHostName = '' - -# Minimum version of the PowerShell host required by this module -# PowerShellHostVersion = '' - -# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. -DotNetFrameworkVersion = '4.7.2' - -# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. -# ClrVersion = '' - -# Processor architecture (None, X86, Amd64) required by this module -# ProcessorArchitecture = '' - -# Modules that must be imported into the global environment prior to importing this module -RequiredModules = @() - -# Assemblies that must be loaded prior to importing this module -RequiredAssemblies = 'Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll', - 'Microsoft.Azure.Storage.Common.dll', - 'Microsoft.Azure.Storage.Blob.dll', - 'Microsoft.Azure.Storage.File.dll', - 'Microsoft.Azure.Storage.Queue.dll', - 'Microsoft.Azure.Cosmos.Table.dll', - 'Microsoft.Azure.DocumentDB.Core.dll', - 'Microsoft.Azure.Storage.DataMovement.dll', - 'Microsoft.Azure.DocumentDB.Core.dll', 'Microsoft.OData.Core.dll', - 'Microsoft.OData.Edm.dll', 'Microsoft.Spatial.dll', - 'Microsoft.Azure.KeyVault.Core.dll', 'Azure.Storage.Blobs.dll', - 'Azure.Storage.Common.dll', 'Azure.Storage.Files.DataLake.dll', - 'Azure.Storage.Queues.dll', 'Azure.Storage.Files.Shares.dll', - 'Azure.Data.Tables.dll', 'System.IO.Hashing.dll' - -# Script files (.ps1) that are run in the caller's environment prior to importing this module. -# ScriptsToProcess = @() - -# Type files (.ps1xml) to be loaded when importing this module -# TypesToProcess = @() - -# Format files (.ps1xml) to be loaded when importing this module -FormatsToProcess = 'Storage.Management.format.ps1xml', 'Storage.format.ps1xml', - 'Storage.generated.format.ps1xml' - -# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess -NestedModules = @() - -# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. -FunctionsToExport = @() - -# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. -CmdletsToExport = 'Get-AzStorageAccount', 'Get-AzStorageAccountKey', - 'New-AzStorageAccount', 'New-AzStorageAccountKey', - 'Remove-AzStorageAccount', 'Set-AzCurrentStorageAccount', - 'Set-AzStorageAccount', 'Get-AzStorageAccountNameAvailability', - 'Get-AzStorageUsage', 'Update-AzStorageAccountNetworkRuleSet', - 'Get-AzStorageAccountNetworkRuleSet', - 'Add-AzStorageAccountNetworkRule', - 'Remove-AzStorageAccountNetworkRule', 'Get-AzStorageTable', - 'New-AzStorageTableSASToken', - 'New-AzStorageTableStoredAccessPolicy', 'New-AzStorageTable', - 'Remove-AzStorageTableStoredAccessPolicy', 'Remove-AzStorageTable', - 'Get-AzStorageTableStoredAccessPolicy', - 'Set-AzStorageTableStoredAccessPolicy', 'Get-AzStorageQueue', - 'New-AzStorageQueue', 'Remove-AzStorageQueue', - 'Get-AzStorageQueueStoredAccessPolicy', - 'New-AzStorageQueueSASToken', - 'New-AzStorageQueueStoredAccessPolicy', - 'Remove-AzStorageQueueStoredAccessPolicy', - 'Set-AzStorageQueueStoredAccessPolicy', 'Get-AzStorageFile', - 'Get-AzStorageFileContent', 'Get-AzStorageFileCopyState', - 'Get-AzStorageShare', 'Get-AzStorageShareStoredAccessPolicy', - 'New-AzStorageDirectory', 'New-AzStorageFileSASToken', - 'New-AzStorageShare', 'New-AzStorageShareSASToken', - 'New-AzStorageShareStoredAccessPolicy', 'Remove-AzStorageDirectory', - 'Remove-AzStorageFile', 'Remove-AzStorageShare', - 'Remove-AzStorageShareStoredAccessPolicy', - 'Set-AzStorageFileContent', 'Set-AzStorageShareQuota', - 'Set-AzStorageShareStoredAccessPolicy', 'Start-AzStorageFileCopy', - 'Stop-AzStorageFileCopy', 'New-AzStorageAccountSASToken', - 'Set-AzStorageCORSRule', 'Get-AzStorageCORSRule', - 'Get-AzStorageServiceLoggingProperty', - 'Get-AzStorageServiceMetricsProperty', 'Remove-AzStorageCORSRule', - 'Set-AzStorageServiceLoggingProperty', - 'Set-AzStorageServiceMetricsProperty', 'New-AzStorageContext', - 'Set-AzStorageContainerAcl', 'Remove-AzStorageBlob', - 'Set-AzStorageBlobContent', 'Get-AzStorageBlob', - 'Get-AzStorageBlobContent', 'Get-AzStorageBlobCopyState', - 'Get-AzStorageContainer', - 'Get-AzStorageContainerStoredAccessPolicy', - 'New-AzStorageBlobSASToken', 'New-AzStorageContainer', - 'New-AzStorageContainerSASToken', - 'New-AzStorageContainerStoredAccessPolicy', - 'Remove-AzStorageContainer', - 'Remove-AzStorageContainerStoredAccessPolicy', - 'Set-AzStorageContainerStoredAccessPolicy', - 'Start-AzStorageBlobCopy', 'Start-AzStorageBlobIncrementalCopy', - 'Stop-AzStorageBlobCopy', 'Update-AzStorageServiceProperty', - 'Get-AzStorageServiceProperty', - 'Enable-AzStorageDeleteRetentionPolicy', - 'Disable-AzStorageDeleteRetentionPolicy', - 'Enable-AzStorageStaticWebsite', 'Disable-AzStorageStaticWebsite', - 'Get-AzRmStorageContainer', 'Update-AzRmStorageContainer', - 'New-AzRmStorageContainer', 'Remove-AzRmStorageContainer', - 'Add-AzRmStorageContainerLegalHold', - 'Remove-AzRmStorageContainerLegalHold', - 'Set-AzRmStorageContainerImmutabilityPolicy', - 'Get-AzRmStorageContainerImmutabilityPolicy', - 'Remove-AzRmStorageContainerImmutabilityPolicy', - 'Lock-AzRmStorageContainerImmutabilityPolicy', - 'Set-AzStorageAccountManagementPolicy', - 'Get-AzStorageAccountManagementPolicy', - 'Remove-AzStorageAccountManagementPolicy', - 'New-AzStorageAccountManagementPolicyFilter', - 'New-AzStorageAccountManagementPolicyRule', - 'Add-AzStorageAccountManagementPolicyAction', - 'Update-AzStorageBlobServiceProperty', - 'Get-AzStorageBlobServiceProperty', - 'Enable-AzStorageBlobDeleteRetentionPolicy', - 'Disable-AzStorageBlobDeleteRetentionPolicy', - 'Revoke-AzStorageAccountUserDelegationKeys', - 'Get-AzStorageFileHandle', 'Close-AzStorageFileHandle', - 'New-AzRmStorageShare', 'Remove-AzRmStorageShare', - 'Get-AzRmStorageShare', 'Update-AzRmStorageShare', - 'Update-AzStorageFileServiceProperty', - 'Get-AzStorageFileServiceProperty', 'Restore-AzRmStorageShare', - 'Get-AzDataLakeGen2ChildItem', 'Get-AzDataLakeGen2Item', - 'New-AzDataLakeGen2Item', 'Move-AzDataLakeGen2Item', - 'Remove-AzDataLakeGen2Item', 'Update-AzDataLakeGen2Item', - 'Set-AzDataLakeGen2ItemAclObject', 'Get-AzDataLakeGen2ItemContent', - 'Invoke-AzStorageAccountFailover', 'Get-AzStorageBlobQueryResult', - 'New-AzStorageBlobQueryConfig', - 'New-AzStorageObjectReplicationPolicyRule', - 'Set-AzStorageObjectReplicationPolicy', - 'Get-AzStorageObjectReplicationPolicy', - 'Remove-AzStorageObjectReplicationPolicy', - 'Enable-AzStorageBlobRestorePolicy', - 'Disable-AzStorageBlobRestorePolicy', - 'New-AzStorageBlobRangeToRestore', 'Restore-AzStorageBlobRange', - 'Set-AzDataLakeGen2AclRecursive', - 'Update-AzDataLakeGen2AclRecursive', - 'Remove-AzDataLakeGen2AclRecursive', 'New-AzStorageEncryptionScope', - 'Update-AzStorageEncryptionScope', 'Get-AzStorageEncryptionScope', - 'Copy-AzStorageBlob', 'Set-AzStorageBlobInventoryPolicy', - 'New-AzStorageBlobInventoryPolicyRule', - 'Get-AzStorageBlobInventoryPolicy', - 'Remove-AzStorageBlobInventoryPolicy', - 'Enable-AzStorageContainerDeleteRetentionPolicy', - 'Disable-AzStorageContainerDeleteRetentionPolicy', - 'Restore-AzStorageContainer', - 'Enable-AzStorageBlobLastAccessTimeTracking', - 'Disable-AzStorageBlobLastAccessTimeTracking', - 'Set-AzStorageBlobTag', 'Get-AzStorageBlobTag', - 'Get-AzStorageBlobByTag', - 'Invoke-AzStorageAccountHierarchicalNamespaceUpgrade', - 'Stop-AzStorageAccountHierarchicalNamespaceUpgrade', - 'Set-AzStorageBlobImmutabilityPolicy', - 'Remove-AzStorageBlobImmutabilityPolicy', - 'Set-AzStorageBlobLegalHold', - 'Invoke-AzRmStorageContainerImmutableStorageWithVersioningMigration', - 'New-AzDataLakeGen2SasToken', - 'New-AzStorageAccountManagementPolicyBlobIndexMatchObject', - 'Set-AzStorageLocalUser', 'Get-AzStorageLocalUser', - 'Remove-AzStorageLocalUser', 'Get-AzStorageLocalUserKey', - 'New-AzStorageLocalUserSshPassword', - 'New-AzStorageLocalUserSshPublicKey', - 'New-AzStorageLocalUserPermissionScope', - 'Get-AzDataLakeGen2DeletedItem', - 'Restore-AzDataLakeGen2DeletedItem', 'Rename-AzStorageFile', - 'Rename-AzStorageDirectory' - -# Variables to export from this module -# VariablesToExport = @() - -# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. -AliasesToExport = 'Get-AzStorageContainerAcl', 'Start-CopyAzureStorageBlob', - 'Stop-CopyAzureStorageBlob', 'Enable-AzStorageSoftDelete', - 'Disable-AzStorageSoftDelete', 'New-AzDatalakeGen2FileSystem', - 'Remove-AzDatalakeGen2FileSystem', 'Get-AzDatalakeGen2FileSystem', - 'New-AzDataLakeGen2ItemAclObject' - -# DSC resources to export from this module -# DscResourcesToExport = @() - -# List of all modules packaged with this module -# ModuleList = @() - -# List of all files packaged with this module -# FileList = @() - -# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. -PrivateData = @{ - - PSData = @{ - - # Tags applied to this module. These help with module discovery in online galleries. - Tags = 'Azure','ResourceManager','ARM','Storage','StorageAccount' - - # A URL to the license for this module. - LicenseUri = 'https://aka.ms/azps-license' - - # A URL to the main website for this project. - ProjectUri = 'https://github.com/Azure/azure-powershell' - - # A URL to an icon representing this module. - # IconUri = '' - - # ReleaseNotes of this module - ReleaseNotes = '* Added warning messages for an upcoming breaking change that the output Permissions will be changed to a string when creating and updating a Queue access policy - - ''Get-AzStorageQueueStoredAccessPolicy'' - - ''Set-AzStorageQueueStoredAccessPolicy''' - - # Prerelease string of this module - # Prerelease = '' - - # Flag to indicate whether the module requires explicit user acceptance for install/update/save - # RequireLicenseAcceptance = $false - - # External dependent modules of this module - # ExternalModuleDependencies = @() - - } # End of PSData hashtable - - } # End of PrivateData hashtable - -# HelpInfo URI of this module -# HelpInfoURI = '' - -# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. -# DefaultCommandPrefix = '' - -} - - -# SIG # Begin signature block -# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor -# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCdRZYEGtB5KnoA -# uiFe8QrK8pFWcEZeglK0oCilGyNKK6CCDYUwggYDMIID66ADAgECAhMzAAADTU6R -# phoosHiPAAAAAANNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI4WhcNMjQwMzE0MTg0MzI4WjB0MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDUKPcKGVa6cboGQU03ONbUKyl4WpH6Q2Xo9cP3RhXTOa6C6THltd2RfnjlUQG+ -# Mwoy93iGmGKEMF/jyO2XdiwMP427j90C/PMY/d5vY31sx+udtbif7GCJ7jJ1vLzd -# j28zV4r0FGG6yEv+tUNelTIsFmmSb0FUiJtU4r5sfCThvg8dI/F9Hh6xMZoVti+k -# bVla+hlG8bf4s00VTw4uAZhjGTFCYFRytKJ3/mteg2qnwvHDOgV7QSdV5dWdd0+x -# zcuG0qgd3oCCAjH8ZmjmowkHUe4dUmbcZfXsgWlOfc6DG7JS+DeJak1DvabamYqH -# g1AUeZ0+skpkwrKwXTFwBRltAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUId2Img2Sp05U6XI04jli2KohL+8w -# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh -# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMDUxNzAfBgNVHSMEGDAW -# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw -# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov -# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx -# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB -# ACMET8WuzLrDwexuTUZe9v2xrW8WGUPRQVmyJ1b/BzKYBZ5aU4Qvh5LzZe9jOExD -# YUlKb/Y73lqIIfUcEO/6W3b+7t1P9m9M1xPrZv5cfnSCguooPDq4rQe/iCdNDwHT -# 6XYW6yetxTJMOo4tUDbSS0YiZr7Mab2wkjgNFa0jRFheS9daTS1oJ/z5bNlGinxq -# 2v8azSP/GcH/t8eTrHQfcax3WbPELoGHIbryrSUaOCphsnCNUqUN5FbEMlat5MuY -# 94rGMJnq1IEd6S8ngK6C8E9SWpGEO3NDa0NlAViorpGfI0NYIbdynyOB846aWAjN -# fgThIcdzdWFvAl/6ktWXLETn8u/lYQyWGmul3yz+w06puIPD9p4KPiWBkCesKDHv -# XLrT3BbLZ8dKqSOV8DtzLFAfc9qAsNiG8EoathluJBsbyFbpebadKlErFidAX8KE -# usk8htHqiSkNxydamL/tKfx3V/vDAoQE59ysv4r3pE+zdyfMairvkFNNw7cPn1kH -# Gcww9dFSY2QwAxhMzmoM0G+M+YvBnBu5wjfxNrMRilRbxM6Cj9hKFh0YTwba6M7z -# ntHHpX3d+nabjFm/TnMRROOgIXJzYbzKKaO2g1kWeyG2QtvIR147zlrbQD4X10Ab -# rRg9CpwW7xYxywezj+iNAc+QmFzR94dzJkEPUSCJPsTFMIIHejCCBWKgAwIBAgIK -# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV -# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv -# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm -# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw -# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE -# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD -# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG -# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la -# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc -# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D -# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ -# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk -# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 -# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd -# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL -# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd -# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 -# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS -# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI -# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL -# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD -# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv -# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 -# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF -# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h -# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA -# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn -# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 -# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b -# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ -# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy -# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp -# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi -# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb -# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS -# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL -# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX -# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x -# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt -# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p -# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANNTpGmGiiweI8AAAAA -# A00wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw -# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIENa -# IBKv7dXPoaoJ9wK3psyDBM3YbtFIrgZXGZQEsl2XMEIGCisGAQQBgjcCAQwxNDAy -# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20wDQYJKoZIhvcNAQEBBQAEggEAkOAAsRzCtsOZL/jXzAXmihgTdEsqGp1Wamop -# iJJaH+yyNapHF74Lx7tDsFV9rtgFgBTSX4lv1/5Xos4ILqgs9hu+12HolB9urO85 -# a9Ty98r21QzRMAjfBXGpVUqegX7bbWqUIkGpecQU2gs7rcwpMhHdRh73npW0NUID -# dtBihqa9OnABOY9RdmHuC3eSNVO3EBFgQhyyDAorvxJ1iCquWBcYRHQTD6zy1mop -# Zn+yg3j/ywAGYxTFBh2zRIoUxewhhrl03XuvFYLe/Zw3h6NmHMV84B37j2lIOHMD -# 23ZdviX4Chyg2XVKaiY73v4d+C8mkumGHrEaV4gY27VbXzR0+aGCF5cwgheTBgor -# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI -# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE -# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDUO9ei7DjFfyApynRMFasWAYnXZZbcyVDE -# 5tkZni6BVwIGZQPtxZzcGBMyMDIzMDkyMDA2MzM0NS4zMTJaMASAAgH0oIHRpIHO -# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH -# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL -# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk -# IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l -# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAdB3CKrvoxfG3QAB -# AAAB0DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz -# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv -# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx -# MDAeFw0yMzA1MjUxOTEyMTRaFw0yNDAyMDExOTEyMTRaMIHLMQswCQYDVQQGEwJV -# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE -# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l -# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w -# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw -# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDfMlfn35fvM0XAUSmI5qiG -# 0UxPi25HkSyBgzk3zpYO311d1OEEFz0QpAK23s1dJFrjB5gD+SMw5z6EwxC4CrXU -# 9KaQ4WNHqHrhWftpgo3MkJex9frmO9MldUfjUG56sIW6YVF6YjX+9rT1JDdCDHbo -# 5nZiasMigGKawGb2HqD7/kjRR67RvVh7Q4natAVu46Zf5MLviR0xN5cNG20xwBwg -# ttaYEk5XlULaBH5OnXz2eWoIx+SjDO7Bt5BuABWY8SvmRQfByT2cppEzTjt/fs0x -# p4B1cAHVDwlGwZuv9Rfc3nddxgFrKA8MWHbJF0+aWUUYIBR8Fy2guFVHoHeOze7I -# sbyvRrax//83gYqo8c5Z/1/u7kjLcTgipiyZ8XERsLEECJ5ox1BBLY6AjmbgAzDd -# Nl2Leej+qIbdBr/SUvKEC+Xw4xjFMOTUVWKWemt2khwndUfBNR7Nzu1z9L0Wv7TA -# Y/v+v6pNhAeohPMCFJc+ak6uMD8TKSzWFjw5aADkmD9mGuC86yvSKkII4MayzoUd -# seT0nfk8Y0fPjtdw2Wnejl6zLHuYXwcDau2O1DMuoiedNVjTF37UEmYT+oxC/OFX -# UGPDEQt9tzgbR9g8HLtUfEeWOsOED5xgb5rwyfvIss7H/cdHFcIiIczzQgYnsLyE -# GepoZDkKhSMR5eCB6Kcv/QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDPhAYWS0oA+ -# lOtITfjJtyl0knRRMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G -# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv -# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs -# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 -# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy -# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH -# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCXh+ckCkZaA06S -# NW+qxtS9gHQp4x7G+gdikngKItEr8otkXIrmWPYrarRWBlY91lqGiilHyIlZ3iNB -# UbaNEmaKAGMZ5YcS7IZUKPaq1jU0msyl+8og0t9C/Z26+atx3vshHrFQuSgwTHZV -# pzv7k8CYnBYoxdhI1uGhqH595mqLvtMsxEN/1so7U+b3U6LCry5uwwcz5+j8Oj0G -# UX3b+iZg+As0xTN6T0Qa8BNec/LwcyqYNEaMkW2VAKrmhvWH8OCDTcXgONnnABQH -# BfXK/fLAbHFGS1XNOtr62/iaHBGAkrCGl6Bi8Pfws6fs+w+sE9r3hX9Vg0gsRMoH -# RuMaiXsrGmGsuYnLn3AwTguMatw9R8U5vJtWSlu1CFO5P0LEvQQiMZ12sQSsQAkN -# DTs9rTjVNjjIUgoZ6XPMxlcPIDcjxw8bfeb4y4wAxM2RRoWcxpkx+6IIf2L+b7gL -# HtBxXCWJ5bMW7WwUC2LltburUwBv0SgjpDtbEqw/uDgWBerCT+Zty3Nc967iGaQj -# yYQH6H/h9Xc8smm2n6VjySRx2swnW3hr6Qx63U/xY9HL6FNhrGiFED7ZRKrnwvvX -# vMVQUIEkB7GUEeN6heY8gHLt0jLV3yzDiQA8R8p5YGgGAVt9MEwgAJNY1iHvH/8v -# zhJSZFNkH8svRztO/i3TvKrjb8ZxwjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb -# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI -# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv -# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj -# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy -# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT -# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE -# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB -# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI -# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo -# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y -# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v -# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG -# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS -# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr -# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM -# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL -# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF -# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu -# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE -# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn -# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW -# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 -# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi -# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV -# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js -# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx -# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 -# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv -# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn -# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 -# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 -# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU -# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF -# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ -# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU -# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi -# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm -# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq -# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx -# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT -# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp -# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF -# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK -# AQEwBwYFKw4DAhoDFQC8t8hT8KKUX91lU5FqRP9Cfu9MiaCBgzCBgKR+MHwxCzAJ -# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k -# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv -# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6LUDNzAi -# GA8yMDIzMDkyMDA1MzU1MVoYDzIwMjMwOTIxMDUzNTUxWjB3MD0GCisGAQQBhFkK -# BAExLzAtMAoCBQDotQM3AgEAMAoCAQACAidSAgH/MAcCAQACAhN/MAoCBQDotlS3 -# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh -# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAGtIWKlQ4xjkBGBgoktG9bqb -# W3uOsn29c3JcnP5Eq5RSCeHwCRLqC6bYPnrI0V6uJZGaSe/UiVRIjbQsr2Md6Liu -# 18E+/l27E3rd5NKZ4JapQ+nadT7roP/Q2NkZ+hK8kYvV+j0C2aCVDxM6KKvyfXN3 -# 9vIyVoMXXa4Htf6H6hiqbvBelUMohEcS20RXmTcQgBz/4JqhqXiIJBid/2SRudEp -# P4FKC/q7NZu0Kt9vaka5bpOjFkH8DSdsTmNhCnMsz3k60iD9L7fzqu6bIkCGeO9K -# urvs0V5kghKnZiJZ37Bwtng7KlequE58NxNKkuZrEiwepGU/NMZpgCsT31R2Qgwx -# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv -# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 -# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA -# AdB3CKrvoxfG3QABAAAB0DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD -# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDeYFGUAEuM2PdfyKpqVDZg -# WHZK0Gr4VELlXDbMaRqw0DCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIAiV -# QAZftNP/Md1E2Yw+fBXa9w6fjmTZ5WAerrTSPwnXMIGYMIGApH4wfDELMAkGA1UE -# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc -# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 -# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHQdwiq76MXxt0AAQAAAdAwIgQgqB/y -# toAW0gc8cem4mHJrpEhQ7NI8Dpr/F6zncI8TlJUwDQYJKoZIhvcNAQELBQAEggIA -# s39yxfmrlLLv67aPN3q+l4I5HIp7Rpm2QwkK5mtfgRpYl4TaYTIwNZJAGgoaOuBH -# S703Ku5L32bJhw6EmRIiDfuJ2AxsMxjXklkAiM/8VKETgAV96jNNmgiyZHY5RytW -# 6eiyRwV/Sr/jKjhcfG7I30hmajIncFg+xfQWKP0rIi9AdoZbbsNmfkgEgQUGEvQF -# vw0u6rjqPIfENBBA0o/GyFRHMZ1QyyTEYO8moZM2rr1UqPhnjJw9Qy8nrNIot3MP -# Gho9jO8czGY4UsSbHQnXIE4H+KTOCwfbDkly/fwwtDVnFsg1E46Gug2gadc0gB7I -# 05zp7aKBQtdNEIMiZ2Eizlt2azDK0lIxpHNpRrFDCDVe5Oyh9Jxyvg1Ul/jSnsOk -# plchQvr1uOSdrrh79q+iE/6u/m5h51JVJWpjRrXCxDYnbmL+JqvumbX/b9mNp8Nc -# 5LLFYosb1Rgvzb/uLiQ26AT4x27io27lGuNVzeGpSCCOI5NJcQF6KQNUjIPWXixx -# pWyySo2xJzKDLCJyEZ4aeS/8h5rdmytsbI7N8zx4SYgQi0JammzOCSSCZnrQ6Vzf -# LjnDsbB36aBKTVxod8BSJHfoRivjRkhPpElrnRovxx6itAd+YAGemQHzIS3fxY4B -# U7gosKIxh3Ypfcb+I++AwROjNWQCDJ8V4ckqhfsRKtg= -# SIG # End signature block diff --git a/Modules/Az.Storage/5.10.1/Az.Storage.psm1 b/Modules/Az.Storage/5.10.1/Az.Storage.psm1 deleted file mode 100644 index 2a2cc1640c3a..000000000000 --- a/Modules/Az.Storage/5.10.1/Az.Storage.psm1 +++ /dev/null @@ -1,363 +0,0 @@ -# -# Script module for module 'Az.Storage' that is executed when 'Az.Storage' is imported in a PowerShell session. -# -# Generated by: Microsoft Corporation -# -# Generated on: 09/20/2023 05:38:20 -# - -$PSDefaultParameterValues.Clear() -Set-StrictMode -Version Latest - -function Test-DotNet -{ - try - { - if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) - { - throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." - } - } - catch [System.Management.Automation.DriveNotFoundException] - { - Write-Verbose ".NET Framework version check failed." - } -} - -function Preload-Assembly { - param ( - [string] - $AssemblyDirectory - ) - if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) - { - try - { - Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { - try - { - Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null - } - catch { - Write-Verbose $_ - } - } - } - catch {} - } -} - -if ($true -and ($PSEdition -eq 'Desktop')) -{ - if ($PSVersionTable.PSVersion -lt [Version]'5.1') - { - throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." - } - - Test-DotNet -} - -if ($true -and ($PSEdition -eq 'Core')) -{ - if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') - { - throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." - } -} - -if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) -{ - Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { - . $_.FullName - } -} - -# [windows powershell] preload assemblies - - -# [windows powershell] preload module alc assemblies -$preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") -Preload-Assembly -AssemblyDirectory $preloadPath - -if (Get-Module AzureRM.profile -ErrorAction Ignore) -{ - Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") - throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + - "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") -} - -$module = Get-Module Az.Accounts - if ($module -ne $null -and $module.Version -lt [System.Version]"2.13.1") -{ - Write-Error "This module requires Az.Accounts version 2.13.1. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop -} -elseif ($module -eq $null) -{ - Import-Module Az.Accounts -MinimumVersion 2.13.1 -Scope Global -} -Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll) -Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Storage.dll) - - -if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) -{ - Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { - . $_.FullName - } -} - -$FilteredCommands = @('Add-AzStorageAccountNetworkRule:ResourceGroupName','Get-AzStorageAccountKey:ResourceGroupName','Get-AzStorageAccountNetworkRuleSet:ResourceGroupName','New-AzStorageAccount:ResourceGroupName','New-AzStorageAccountKey:ResourceGroupName','Remove-AzStorageAccount:ResourceGroupName','Remove-AzStorageAccountNetworkRule:ResourceGroupName','Set-AzStorageAccount:ResourceGroupName','Update-AzStorageAccountNetworkRuleSet:ResourceGroupName') - -if ($Env:ACC_CLOUD -eq $null) -{ - $FilteredCommands | ForEach-Object { - - $existingDefault = $false - foreach ($key in $global:PSDefaultParameterValues.Keys) - { - if ($_ -like "$key") - { - $existingDefault = $true - } - } - - if (!$existingDefault) - { - $global:PSDefaultParameterValues.Add($_, - { - if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) - { - $context = Get-AzureRmContext - } - else - { - $context = Get-AzContext - } - if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { - $context.ExtendedProperties["Default Resource Group"] - } - }) - } - } -} - - - -# SIG # Begin signature block -# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor -# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDwTIUolTxW5AMF -# jJJ4/I0a4JkEve1o6uz9g6Jgnx/vIKCCDYUwggYDMIID66ADAgECAhMzAAADTU6R -# phoosHiPAAAAAANNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD -# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI4WhcNMjQwMzE0MTg0MzI4WjB0MQsw -# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u -# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy -# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDUKPcKGVa6cboGQU03ONbUKyl4WpH6Q2Xo9cP3RhXTOa6C6THltd2RfnjlUQG+ -# Mwoy93iGmGKEMF/jyO2XdiwMP427j90C/PMY/d5vY31sx+udtbif7GCJ7jJ1vLzd -# j28zV4r0FGG6yEv+tUNelTIsFmmSb0FUiJtU4r5sfCThvg8dI/F9Hh6xMZoVti+k -# bVla+hlG8bf4s00VTw4uAZhjGTFCYFRytKJ3/mteg2qnwvHDOgV7QSdV5dWdd0+x -# zcuG0qgd3oCCAjH8ZmjmowkHUe4dUmbcZfXsgWlOfc6DG7JS+DeJak1DvabamYqH -# g1AUeZ0+skpkwrKwXTFwBRltAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUId2Img2Sp05U6XI04jli2KohL+8w -# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh -# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMDUxNzAfBgNVHSMEGDAW -# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw -# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov -# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx -# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB -# ACMET8WuzLrDwexuTUZe9v2xrW8WGUPRQVmyJ1b/BzKYBZ5aU4Qvh5LzZe9jOExD -# YUlKb/Y73lqIIfUcEO/6W3b+7t1P9m9M1xPrZv5cfnSCguooPDq4rQe/iCdNDwHT -# 6XYW6yetxTJMOo4tUDbSS0YiZr7Mab2wkjgNFa0jRFheS9daTS1oJ/z5bNlGinxq -# 2v8azSP/GcH/t8eTrHQfcax3WbPELoGHIbryrSUaOCphsnCNUqUN5FbEMlat5MuY -# 94rGMJnq1IEd6S8ngK6C8E9SWpGEO3NDa0NlAViorpGfI0NYIbdynyOB846aWAjN -# fgThIcdzdWFvAl/6ktWXLETn8u/lYQyWGmul3yz+w06puIPD9p4KPiWBkCesKDHv -# XLrT3BbLZ8dKqSOV8DtzLFAfc9qAsNiG8EoathluJBsbyFbpebadKlErFidAX8KE -# usk8htHqiSkNxydamL/tKfx3V/vDAoQE59ysv4r3pE+zdyfMairvkFNNw7cPn1kH -# Gcww9dFSY2QwAxhMzmoM0G+M+YvBnBu5wjfxNrMRilRbxM6Cj9hKFh0YTwba6M7z -# ntHHpX3d+nabjFm/TnMRROOgIXJzYbzKKaO2g1kWeyG2QtvIR147zlrbQD4X10Ab -# rRg9CpwW7xYxywezj+iNAc+QmFzR94dzJkEPUSCJPsTFMIIHejCCBWKgAwIBAgIK -# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV -# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv -# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm -# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw -# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE -# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD -# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG -# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la -# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc -# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D -# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ -# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk -# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 -# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd -# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL -# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd -# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 -# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS -# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI -# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL -# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD -# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv -# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 -# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf -# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF -# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h -# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA -# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn -# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 -# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b -# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ -# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy -# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp -# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi -# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb -# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS -# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL -# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX -# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x -# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt -# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p -# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANNTpGmGiiweI8AAAAA -# A00wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw -# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPQg -# 821upPbW5BDsHGmP+BUZm/k9HNe0klVGqBLyAD5jMEIGCisGAQQBgjcCAQwxNDAy -# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j -# b20wDQYJKoZIhvcNAQEBBQAEggEASgU29Su5178PTKxjc5cqgH1k4o9tV9arxiiO -# lwhTKiZXPXAdpvhQdXJf5RAH6i9cDOBwdyF7yzOzxTfXgjvzOBVFE48j/SAZP4iL -# OunWtwRoREHNmrBJ6Sc5ijPah3UoyOx3RqsTcoLZQI9VwvCSBIStBvxde4sxEv81 -# kQQ24BfE8ZwRGc2NoLjRdkz0vTOYFD3ExYMQH1UucJLhuBxiXbmm7xhOECqGzxiA -# 06IU5qSEnj+xhq3zOLZVmT2IQfHeyaNoY9bbqnRrs7hU5hGpVehJPMba9wq/mtUh -# LP3Qcdjf+LL9WKO67GyLBMpvERsUcRXKLfC37LMrx8KTE1m1gKGCF5cwgheTBgor -# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI -# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE -# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCJFwibS1li/K2/AC3GKSEfEvFzKbklas6i -# owVD/11eZQIGZQPtxMFOGBMyMDIzMDkyMDA1NTA0My4wNjdaMASAAgH0oIHRpIHO -# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH -# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL -# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk -# IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l -# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAdB3CKrvoxfG3QAB -# AAAB0DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz -# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv -# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx -# MDAeFw0yMzA1MjUxOTEyMTRaFw0yNDAyMDExOTEyMTRaMIHLMQswCQYDVQQGEwJV -# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE -# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l -# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w -# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw -# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDfMlfn35fvM0XAUSmI5qiG -# 0UxPi25HkSyBgzk3zpYO311d1OEEFz0QpAK23s1dJFrjB5gD+SMw5z6EwxC4CrXU -# 9KaQ4WNHqHrhWftpgo3MkJex9frmO9MldUfjUG56sIW6YVF6YjX+9rT1JDdCDHbo -# 5nZiasMigGKawGb2HqD7/kjRR67RvVh7Q4natAVu46Zf5MLviR0xN5cNG20xwBwg -# ttaYEk5XlULaBH5OnXz2eWoIx+SjDO7Bt5BuABWY8SvmRQfByT2cppEzTjt/fs0x -# p4B1cAHVDwlGwZuv9Rfc3nddxgFrKA8MWHbJF0+aWUUYIBR8Fy2guFVHoHeOze7I -# sbyvRrax//83gYqo8c5Z/1/u7kjLcTgipiyZ8XERsLEECJ5ox1BBLY6AjmbgAzDd -# Nl2Leej+qIbdBr/SUvKEC+Xw4xjFMOTUVWKWemt2khwndUfBNR7Nzu1z9L0Wv7TA -# Y/v+v6pNhAeohPMCFJc+ak6uMD8TKSzWFjw5aADkmD9mGuC86yvSKkII4MayzoUd -# seT0nfk8Y0fPjtdw2Wnejl6zLHuYXwcDau2O1DMuoiedNVjTF37UEmYT+oxC/OFX -# UGPDEQt9tzgbR9g8HLtUfEeWOsOED5xgb5rwyfvIss7H/cdHFcIiIczzQgYnsLyE -# GepoZDkKhSMR5eCB6Kcv/QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDPhAYWS0oA+ -# lOtITfjJtyl0knRRMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G -# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv -# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs -# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 -# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy -# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH -# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCXh+ckCkZaA06S -# NW+qxtS9gHQp4x7G+gdikngKItEr8otkXIrmWPYrarRWBlY91lqGiilHyIlZ3iNB -# UbaNEmaKAGMZ5YcS7IZUKPaq1jU0msyl+8og0t9C/Z26+atx3vshHrFQuSgwTHZV -# pzv7k8CYnBYoxdhI1uGhqH595mqLvtMsxEN/1so7U+b3U6LCry5uwwcz5+j8Oj0G -# UX3b+iZg+As0xTN6T0Qa8BNec/LwcyqYNEaMkW2VAKrmhvWH8OCDTcXgONnnABQH -# BfXK/fLAbHFGS1XNOtr62/iaHBGAkrCGl6Bi8Pfws6fs+w+sE9r3hX9Vg0gsRMoH -# RuMaiXsrGmGsuYnLn3AwTguMatw9R8U5vJtWSlu1CFO5P0LEvQQiMZ12sQSsQAkN -# DTs9rTjVNjjIUgoZ6XPMxlcPIDcjxw8bfeb4y4wAxM2RRoWcxpkx+6IIf2L+b7gL -# HtBxXCWJ5bMW7WwUC2LltburUwBv0SgjpDtbEqw/uDgWBerCT+Zty3Nc967iGaQj -# yYQH6H/h9Xc8smm2n6VjySRx2swnW3hr6Qx63U/xY9HL6FNhrGiFED7ZRKrnwvvX -# vMVQUIEkB7GUEeN6heY8gHLt0jLV3yzDiQA8R8p5YGgGAVt9MEwgAJNY1iHvH/8v -# zhJSZFNkH8svRztO/i3TvKrjb8ZxwjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb -# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI -# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv -# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj -# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy -# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT -# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE -# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB -# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI -# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo -# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y -# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v -# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG -# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS -# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr -# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM -# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL -# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF -# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu -# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE -# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn -# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW -# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 -# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi -# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV -# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js -# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx -# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v -# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 -# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv -# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn -# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 -# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 -# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU -# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF -# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ -# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU -# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi -# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm -# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq -# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx -# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT -# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp -# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF -# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK -# AQEwBwYFKw4DAhoDFQC8t8hT8KKUX91lU5FqRP9Cfu9MiaCBgzCBgKR+MHwxCzAJ -# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k -# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv -# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6LUDNzAi -# GA8yMDIzMDkyMDA1MzU1MVoYDzIwMjMwOTIxMDUzNTUxWjB3MD0GCisGAQQBhFkK -# BAExLzAtMAoCBQDotQM3AgEAMAoCAQACAidSAgH/MAcCAQACAhN/MAoCBQDotlS3 -# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh -# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAGtIWKlQ4xjkBGBgoktG9bqb -# W3uOsn29c3JcnP5Eq5RSCeHwCRLqC6bYPnrI0V6uJZGaSe/UiVRIjbQsr2Md6Liu -# 18E+/l27E3rd5NKZ4JapQ+nadT7roP/Q2NkZ+hK8kYvV+j0C2aCVDxM6KKvyfXN3 -# 9vIyVoMXXa4Htf6H6hiqbvBelUMohEcS20RXmTcQgBz/4JqhqXiIJBid/2SRudEp -# P4FKC/q7NZu0Kt9vaka5bpOjFkH8DSdsTmNhCnMsz3k60iD9L7fzqu6bIkCGeO9K -# urvs0V5kghKnZiJZ37Bwtng7KlequE58NxNKkuZrEiwepGU/NMZpgCsT31R2Qgwx -# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv -# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 -# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA -# AdB3CKrvoxfG3QABAAAB0DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD -# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDunI2HmoCbbBbEkRj4d+ba -# QJF/cprPwy+IBTpUNH3TzjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIAiV -# QAZftNP/Md1E2Yw+fBXa9w6fjmTZ5WAerrTSPwnXMIGYMIGApH4wfDELMAkGA1UE -# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc -# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 -# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHQdwiq76MXxt0AAQAAAdAwIgQgqB/y -# toAW0gc8cem4mHJrpEhQ7NI8Dpr/F6zncI8TlJUwDQYJKoZIhvcNAQELBQAEggIA -# r01ufT/BRQoI9t9ZIPBQaxxnx+SDyk96u2tYd2bb7mqmPBlJn5hQC4hPi9SKTL42 -# UtvVZ1335HKnIWJHSxaxzmIWM7YDHSyytOr+09UBUaVul/lSXM2Y+g77sl8UkL4k -# 9dD6z0jCaA7x3RAxfVAOE+wEHztq8xYGjoR4Xp3ax/FjdkNWYPO94oWbj0kL30uH -# 8KnU8xCbmezrMZBjf9nil4UgW/tK1Rwht3Xd/JiW+WtRiklX4h7SWJ+i2XnDyPNc -# OSbaQ1Fc1MddjMFD184Xs0C4hF+BBGVAmGWgeMy5UuoCG56lsOH0SVmSEpbVgEm9 -# MEa7k7ATs3Kn8lhFCO3QLpp1dey0hAjGNvwDsBkWHWXuuPoSxmHe3eEViwwwFHhH -# fLbXNKVlTbWT2sU0u74vnIS+X8dR8alwzL/dTUlb3j+mtFftnOZWc+caHoUacUbz -# bQE8Ti4gzRbATtvUCVIvx4GEcGPeq8ntfvUETF4fRLhbyoOstvsDhGNTQ1gebJf/ -# ZvIugJwBR3PTHDGWcZO0YXWPH+l0bxZ0fs0QggOi1Kb5f4oV53mwx+OXwFd7sO58 -# zX82ccaY8uTr+cpKL1YR8//+ilg/S/l/0bwtk+IDL8rAlbz029H5BrSMs2hByHLv -# mySNUdQc5z6FvLHtjMAQcUGtxL2tK+03aKNH5NrgtsE= -# SIG # End signature block diff --git a/Modules/Az.Storage/5.10.1/Azure.Storage.Blobs.dll b/Modules/Az.Storage/5.10.1/Azure.Storage.Blobs.dll deleted file mode 100644 index aa03740a7c52..000000000000 Binary files a/Modules/Az.Storage/5.10.1/Azure.Storage.Blobs.dll and /dev/null differ diff --git a/Modules/Az.Storage/5.10.1/Azure.Storage.Common.dll b/Modules/Az.Storage/5.10.1/Azure.Storage.Common.dll deleted file mode 100644 index 06a465a6d8bc..000000000000 Binary files a/Modules/Az.Storage/5.10.1/Azure.Storage.Common.dll and /dev/null differ diff --git a/Modules/Az.Storage/5.10.1/Azure.Storage.Files.DataLake.dll b/Modules/Az.Storage/5.10.1/Azure.Storage.Files.DataLake.dll deleted file mode 100644 index 67ad0e6c7bf3..000000000000 Binary files a/Modules/Az.Storage/5.10.1/Azure.Storage.Files.DataLake.dll and /dev/null differ diff --git a/Modules/Az.Storage/5.10.1/Azure.Storage.Files.Shares.dll b/Modules/Az.Storage/5.10.1/Azure.Storage.Files.Shares.dll deleted file mode 100644 index 877567a57798..000000000000 Binary files a/Modules/Az.Storage/5.10.1/Azure.Storage.Files.Shares.dll and /dev/null differ diff --git a/Modules/Az.Storage/5.10.1/Azure.Storage.Queues.dll b/Modules/Az.Storage/5.10.1/Azure.Storage.Queues.dll deleted file mode 100644 index f56b897deda6..000000000000 Binary files a/Modules/Az.Storage/5.10.1/Azure.Storage.Queues.dll and /dev/null differ diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll b/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll deleted file mode 100644 index aa85fed17669..000000000000 Binary files a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll and /dev/null differ diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll b/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll deleted file mode 100644 index 1152b0f66f49..000000000000 Binary files a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll and /dev/null differ diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll b/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll deleted file mode 100644 index 4328bd22aa2f..000000000000 Binary files a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll and /dev/null differ diff --git a/Modules/Az.Storage/6.2.0/Az.Storage.psd1 b/Modules/Az.Storage/6.2.0/Az.Storage.psd1 new file mode 100644 index 000000000000..4b5b7ee2e1f8 --- /dev/null +++ b/Modules/Az.Storage/6.2.0/Az.Storage.psd1 @@ -0,0 +1,484 @@ +# +# Module manifest for module 'Az.Storage' +# +# Generated by: Microsoft Corporation +# +# Generated on: 23/04/2024 +# + +@{ + +# Script module or binary module file associated with this manifest. +RootModule = 'Az.Storage.psm1' + +# Version number of this module. +ModuleVersion = '6.2.0' + +# Supported PSEditions +CompatiblePSEditions = 'Core', 'Desktop' + +# ID used to uniquely identify this module +GUID = 'dfa9e4ea-1407-446d-9111-79122977ab20' + +# Author of this module +Author = 'Microsoft Corporation' + +# Company or vendor of this module +CompanyName = 'Microsoft Corporation' + +# Copyright statement for this module +Copyright = 'Microsoft Corporation. All rights reserved.' + +# Description of the functionality provided by this module +Description = 'Microsoft Azure PowerShell - Storage service data plane and management cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. Creates and manages storage accounts in Azure Resource Manager. + +For more information on Storage, please visit the following: https://learn.microsoft.com/azure/storage/' + +# Minimum version of the PowerShell engine required by this module +PowerShellVersion = '5.1' + +# Name of the PowerShell host required by this module +# PowerShellHostName = '' + +# Minimum version of the PowerShell host required by this module +# PowerShellHostVersion = '' + +# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. +DotNetFrameworkVersion = '4.7.2' + +# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. +# ClrVersion = '' + +# Processor architecture (None, X86, Amd64) required by this module +# ProcessorArchitecture = '' + +# Modules that must be imported into the global environment prior to importing this module +RequiredModules = @() + +# Assemblies that must be loaded prior to importing this module +RequiredAssemblies = 'Azure.Data.Tables.dll', 'Azure.Storage.Blobs.dll', + 'Azure.Storage.Common.dll', 'Azure.Storage.Files.DataLake.dll', + 'Azure.Storage.Files.Shares.dll', 'Azure.Storage.Queues.dll', + 'Microsoft.Azure.Cosmos.Table.dll', + 'Microsoft.Azure.DocumentDB.Core.dll', + 'Microsoft.Azure.KeyVault.Core.dll', + 'Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll', + 'Microsoft.Azure.Storage.Blob.dll', + 'Microsoft.Azure.Storage.Common.dll', + 'Microsoft.Azure.Storage.DataMovement.dll', + 'Microsoft.Azure.Storage.File.dll', + 'Microsoft.Azure.Storage.Queue.dll', 'Microsoft.OData.Core.dll', + 'Microsoft.OData.Edm.dll', 'Microsoft.Spatial.dll', + 'Storage.Autorest/bin/Az.Storage.private.dll', + 'System.IO.Hashing.dll' + +# Script files (.ps1) that are run in the caller's environment prior to importing this module. +# ScriptsToProcess = @() + +# Type files (.ps1xml) to be loaded when importing this module +# TypesToProcess = @() + +# Format files (.ps1xml) to be loaded when importing this module +FormatsToProcess = 'Storage.Autorest\Az.Storage.format.ps1xml', + 'Storage.format.ps1xml', 'Storage.generated.format.ps1xml', + 'Storage.Management.format.ps1xml' + +# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess +NestedModules = @('Storage.Autorest/Az.Storage.psm1') + +# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. +FunctionsToExport = 'Get-AzStorageAccountMigration', 'Start-AzStorageAccountMigration' + +# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. +CmdletsToExport = 'Add-AzRmStorageContainerLegalHold', + 'Add-AzStorageAccountManagementPolicyAction', + 'Add-AzStorageAccountNetworkRule', 'Close-AzStorageFileHandle', + 'Copy-AzStorageBlob', 'Disable-AzStorageBlobDeleteRetentionPolicy', + 'Disable-AzStorageBlobLastAccessTimeTracking', + 'Disable-AzStorageBlobRestorePolicy', + 'Disable-AzStorageContainerDeleteRetentionPolicy', + 'Disable-AzStorageDeleteRetentionPolicy', + 'Disable-AzStorageStaticWebsite', + 'Enable-AzStorageBlobDeleteRetentionPolicy', + 'Enable-AzStorageBlobLastAccessTimeTracking', + 'Enable-AzStorageBlobRestorePolicy', + 'Enable-AzStorageContainerDeleteRetentionPolicy', + 'Enable-AzStorageDeleteRetentionPolicy', + 'Enable-AzStorageStaticWebsite', 'Get-AzDataLakeGen2ChildItem', + 'Get-AzDataLakeGen2DeletedItem', 'Get-AzDataLakeGen2Item', + 'Get-AzDataLakeGen2ItemContent', 'Get-AzRmStorageContainer', + 'Get-AzRmStorageContainerImmutabilityPolicy', + 'Get-AzRmStorageShare', 'Get-AzStorageAccount', + 'Get-AzStorageAccountKey', 'Get-AzStorageAccountManagementPolicy', + 'Get-AzStorageAccountNameAvailability', + 'Get-AzStorageAccountNetworkRuleSet', 'Get-AzStorageBlob', + 'Get-AzStorageBlobByTag', 'Get-AzStorageBlobContent', + 'Get-AzStorageBlobCopyState', 'Get-AzStorageBlobInventoryPolicy', + 'Get-AzStorageBlobQueryResult', 'Get-AzStorageBlobServiceProperty', + 'Get-AzStorageBlobTag', 'Get-AzStorageContainer', + 'Get-AzStorageContainerStoredAccessPolicy', 'Get-AzStorageCORSRule', + 'Get-AzStorageEncryptionScope', 'Get-AzStorageFile', + 'Get-AzStorageFileContent', 'Get-AzStorageFileCopyState', + 'Get-AzStorageFileHandle', 'Get-AzStorageFileServiceProperty', + 'Get-AzStorageLocalUser', 'Get-AzStorageLocalUserKey', + 'Get-AzStorageObjectReplicationPolicy', 'Get-AzStorageQueue', + 'Get-AzStorageQueueStoredAccessPolicy', + 'Get-AzStorageServiceLoggingProperty', + 'Get-AzStorageServiceMetricsProperty', + 'Get-AzStorageServiceProperty', 'Get-AzStorageShare', + 'Get-AzStorageShareStoredAccessPolicy', 'Get-AzStorageTable', + 'Get-AzStorageTableStoredAccessPolicy', 'Get-AzStorageUsage', + 'Invoke-AzRmStorageContainerImmutableStorageWithVersioningMigration', + 'Invoke-AzStorageAccountFailover', + 'Invoke-AzStorageAccountHierarchicalNamespaceUpgrade', + 'Lock-AzRmStorageContainerImmutabilityPolicy', + 'Move-AzDataLakeGen2Item', 'New-AzDataLakeGen2Item', + 'New-AzDataLakeGen2SasToken', 'New-AzRmStorageContainer', + 'New-AzRmStorageShare', 'New-AzStorageAccount', + 'New-AzStorageAccountKey', + 'New-AzStorageAccountManagementPolicyBlobIndexMatchObject', + 'New-AzStorageAccountManagementPolicyFilter', + 'New-AzStorageAccountManagementPolicyRule', + 'New-AzStorageAccountSASToken', + 'New-AzStorageBlobInventoryPolicyRule', + 'New-AzStorageBlobQueryConfig', 'New-AzStorageBlobRangeToRestore', + 'New-AzStorageBlobSASToken', 'New-AzStorageContainer', + 'New-AzStorageContainerSASToken', + 'New-AzStorageContainerStoredAccessPolicy', 'New-AzStorageContext', + 'New-AzStorageDirectory', 'New-AzStorageEncryptionScope', + 'New-AzStorageFileSASToken', + 'New-AzStorageLocalUserPermissionScope', + 'New-AzStorageLocalUserSshPassword', + 'New-AzStorageLocalUserSshPublicKey', + 'New-AzStorageObjectReplicationPolicyRule', 'New-AzStorageQueue', + 'New-AzStorageQueueSASToken', + 'New-AzStorageQueueStoredAccessPolicy', 'New-AzStorageShare', + 'New-AzStorageShareSASToken', + 'New-AzStorageShareStoredAccessPolicy', 'New-AzStorageTable', + 'New-AzStorageTableSASToken', + 'New-AzStorageTableStoredAccessPolicy', + 'Remove-AzDataLakeGen2AclRecursive', 'Remove-AzDataLakeGen2Item', + 'Remove-AzRmStorageContainer', + 'Remove-AzRmStorageContainerImmutabilityPolicy', + 'Remove-AzRmStorageContainerLegalHold', 'Remove-AzRmStorageShare', + 'Remove-AzStorageAccount', + 'Remove-AzStorageAccountManagementPolicy', + 'Remove-AzStorageAccountNetworkRule', 'Remove-AzStorageBlob', + 'Remove-AzStorageBlobImmutabilityPolicy', + 'Remove-AzStorageBlobInventoryPolicy', 'Remove-AzStorageContainer', + 'Remove-AzStorageContainerStoredAccessPolicy', + 'Remove-AzStorageCORSRule', 'Remove-AzStorageDirectory', + 'Remove-AzStorageFile', 'Remove-AzStorageLocalUser', + 'Remove-AzStorageObjectReplicationPolicy', 'Remove-AzStorageQueue', + 'Remove-AzStorageQueueStoredAccessPolicy', 'Remove-AzStorageShare', + 'Remove-AzStorageShareStoredAccessPolicy', 'Remove-AzStorageTable', + 'Remove-AzStorageTableStoredAccessPolicy', + 'Rename-AzStorageDirectory', 'Rename-AzStorageFile', + 'Restore-AzDataLakeGen2DeletedItem', 'Restore-AzRmStorageShare', + 'Restore-AzStorageBlobRange', 'Restore-AzStorageContainer', + 'Revoke-AzStorageAccountUserDelegationKeys', + 'Set-AzCurrentStorageAccount', 'Set-AzDataLakeGen2AclRecursive', + 'Set-AzDataLakeGen2ItemAclObject', + 'Set-AzRmStorageContainerImmutabilityPolicy', + 'Set-AzStorageAccount', 'Set-AzStorageAccountManagementPolicy', + 'Set-AzStorageBlobContent', 'Set-AzStorageBlobImmutabilityPolicy', + 'Set-AzStorageBlobInventoryPolicy', 'Set-AzStorageBlobLegalHold', + 'Set-AzStorageBlobTag', 'Set-AzStorageContainerAcl', + 'Set-AzStorageContainerStoredAccessPolicy', 'Set-AzStorageCORSRule', + 'Set-AzStorageFileContent', 'Set-AzStorageLocalUser', + 'Set-AzStorageObjectReplicationPolicy', + 'Set-AzStorageQueueStoredAccessPolicy', + 'Set-AzStorageServiceLoggingProperty', + 'Set-AzStorageServiceMetricsProperty', 'Set-AzStorageShareQuota', + 'Set-AzStorageShareStoredAccessPolicy', + 'Set-AzStorageTableStoredAccessPolicy', 'Start-AzStorageBlobCopy', + 'Start-AzStorageBlobIncrementalCopy', 'Start-AzStorageFileCopy', + 'Stop-AzStorageAccountHierarchicalNamespaceUpgrade', + 'Stop-AzStorageBlobCopy', 'Stop-AzStorageFileCopy', + 'Update-AzDataLakeGen2AclRecursive', 'Update-AzDataLakeGen2Item', + 'Update-AzRmStorageContainer', 'Update-AzRmStorageShare', + 'Update-AzStorageAccountNetworkRuleSet', + 'Update-AzStorageBlobServiceProperty', + 'Update-AzStorageEncryptionScope', + 'Update-AzStorageFileServiceProperty', + 'Update-AzStorageServiceProperty' + +# Variables to export from this module +# VariablesToExport = @() + +# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. +AliasesToExport = 'Disable-AzStorageSoftDelete', 'Enable-AzStorageSoftDelete', + 'Get-AzDatalakeGen2FileSystem', 'Get-AzStorageContainerAcl', + 'New-AzDatalakeGen2FileSystem', 'New-AzDataLakeGen2ItemAclObject', + 'Remove-AzDatalakeGen2FileSystem', 'Start-CopyAzureStorageBlob', + 'Stop-CopyAzureStorageBlob' + +# DSC resources to export from this module +# DscResourcesToExport = @() + +# List of all modules packaged with this module +# ModuleList = @() + +# List of all files packaged with this module +# FileList = @() + +# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. +PrivateData = @{ + + PSData = @{ + + # Tags applied to this module. These help with module discovery in online galleries. + Tags = 'Azure','ResourceManager','ARM','Storage','StorageAccount' + + # A URL to the license for this module. + LicenseUri = 'https://aka.ms/azps-license' + + # A URL to the main website for this project. + ProjectUri = 'https://github.com/Azure/azure-powershell' + + # A URL to an icon representing this module. + # IconUri = '' + + # ReleaseNotes of this module + ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data. +* Fixed object replication policy time format parsing issue [#24434] +* Updated download offset and content length calculation logic for downloading files + - ''Get-AzStorageFileContent''' + + # Prerelease string of this module + # Prerelease = '' + + # Flag to indicate whether the module requires explicit user acceptance for install/update/save + # RequireLicenseAcceptance = $false + + # External dependent modules of this module + # ExternalModuleDependencies = @() + + } # End of PSData hashtable + + } # End of PrivateData hashtable + +# HelpInfo URI of this module +# HelpInfoURI = '' + +# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. +# DefaultCommandPrefix = '' + +} + + +# SIG # Begin signature block +# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDYxFmbmqGPc5kK +# o+Yv7hXPNwtyMYY/5kFxIRRFHDA3MKCCDYUwggYDMIID66ADAgECAhMzAAADri01 +# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG +# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 +# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 +# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV +# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd +# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w +# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh +# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW +# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v +# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw +# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx +# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB +# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W +# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY +# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV +# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 +# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 +# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t +# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i +# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk +# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK +# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO +# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK +# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm +# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw +# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE +# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD +# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG +# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la +# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc +# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D +# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ +# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk +# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 +# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd +# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL +# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd +# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 +# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS +# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI +# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL +# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD +# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv +# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF +# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h +# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA +# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn +# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 +# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b +# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ +# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy +# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp +# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi +# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb +# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS +# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL +# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX +# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x +# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt +# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p +# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA +# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw +# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIM2P +# qoTvEwhrkFseMmzXxRp1quhkS0dwUsQYuuIRu/WxMEIGCisGAQQBgjcCAQwxNDAy +# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20wDQYJKoZIhvcNAQEBBQAEggEAlmXDAJokro4bHyjlh9eutgYUDKI2hDOGim5R +# pvX5EE0nEzSnbepRZ4u3qPW2cc1XcOI+yK6OAE5wtWRCoBLbeIUXTRyVXecMtjjc +# asxyNEapeMNNDQksKEEHxZKyglZFdCUkemuVVkkwyPdwU25TnbIPjatZgD5cgUxm +# T23SBy3f76Y7PXOSHrUf3Ybzd16CRJpHAR7UyqlJvXzXF7D/SsnbjbLQPrYBdPap +# xxF7FNm0r+Eg9fPMab5E5hAzaxqF2EXJ7RwhKtvtzzhT5Dq8zDcDtHp/rzPX0xVo +# j9+wzEo5oEK2xkFVoy4xG7dI7VfKG0Q9uiH2wb8Kv0OzSkabN6GCFykwghclBgor +# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI +# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE +# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC+GslYVkJCL5x8vuBseLM+R618DCmvjK4p +# LoSlY+ZxJQIGZh/SmZXGGBMyMDI0MDQyMzE0MTExNy4zMDVaMASAAgH0oIHYpIHV +# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL +# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT +# HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv +# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA +# 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg +# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG +# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx +# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z +# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg +# VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7 +# 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY +# SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4 +# dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq +# cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE +# izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J +# VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/ +# 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu +# QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm +# z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc +# c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd +# JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV +# HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D +# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv +# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy +# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l +# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB +# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD +# ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG +# gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup +# gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU +# wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg +# oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD +# YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu +# dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3 +# 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu +# uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD +# C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY +# FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB +# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE +# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc +# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 +# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 +# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O +# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn +# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t +# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq +# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP +# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW +# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv +# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb +# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten +# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc +# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a +# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB +# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU +# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw +# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E +# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB +# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ +# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ +# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p +# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB +# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v +# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h +# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x +# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p +# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A +# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC +# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB +# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt +# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 +# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV +# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 +# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw +# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB +# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk +# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U +# aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0 +# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD +# d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN +# BgkqhkiG9w0BAQUFAAIFAOnSOXkwIhgPMjAyNDA0MjMyMTQzMjFaGA8yMDI0MDQy +# NDIxNDMyMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dI5eQIBADAHAgEAAgIZ +# +zAHAgEAAgISnDAKAgUA6dOK+QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE +# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB +# AJGKR1qJKl/+mW5U2h2l4liBeGpbziNYtKnpBCMp30HYhdVKFaph0TxsBGaJLYLr +# Q2S7wBX5JVFvTKnTyYzepJcgAC9YkIJt78a/e5HdsTiqydcnvbuRwlJYowGhvrnT +# /TnMW2q5bQi5U7jdx4Q9DCXm0Ao6uid4NKGA32H0Rji2MYIEDTCCBAkCAQEwgZMw +# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd +# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAA +# AeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB +# BDAvBgkqhkiG9w0BCQQxIgQg5wcmCk8cZYroIbWmGrClYCc8C5UOH95q4+Lub9Br +# CeQwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb +# 8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI +# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv +# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD +# QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEILE/ZDCz6TZPcDPgj4ZgWNKX +# RgchnitzlVyga3nqoA2PMA0GCSqGSIb3DQEBCwUABIICAAt374S52osTwBt7LKW3 +# zPVf8QBDkYPOKoQpOv4O7i0EvT1BmGKpbZb7xlvxq4OLYYiSspNcVfMpdzmmlNyc +# /xBMjWCXygoIYEad04wFWzAHkdVGXntpjMhfgHybRjtyvHYtCqD8aAxqhAS/1TfT +# RZ5HtuufoLLbPuzp1f2zGWcRb6c2UOrPZgDg33Wm/tREQSmGV5PiYxrg54FcP2jl +# GeHfHEhGWSJSb1T8cw91RyjCUSrpKDTWrW47Xi2NKFC9+w5aWVLO31vJxBgYsvRa +# Zp8kRdbWZXb9ISkiTxpw8z1Nf6o+6Ej/R8RSb2V5GfyQTimt9hjbFQ3/KpP2I04E +# 4HsFD3idFnHoDi9TUJ4sWcJRlZLJiVS/Qe9Pv646rcvVxfGE8NtA/FDBWosyBGu3 +# gKCoCvs5hIpblrYdPvMrIVroCDC0VFVWMADiIsjiaDmmZoR8VYL1hkKbPRkaG9TN +# r2cwrc2N5ej7vrEm5oaMJ1fyso6N67FWzbTIEaHoLLwsK3Xhh/ZYd2k3o4ENO5Zk +# dj1WfTy2n9EqYg5LEsAoD0FH6wuJKX/y13jq38A1wA13QsPr8CVKcTOyEponwsCe +# TPviS2Xwssoo/8gOCcR1j3U4h/fjOOk4x2FrA94HmkbgOIgkik1zA56MxsFPuj3h +# SupC0jj4ySmgFzVB4sVhxZLt +# SIG # End signature block diff --git a/Modules/Az.Accounts/2.13.1/Az.Accounts.psm1 b/Modules/Az.Storage/6.2.0/Az.Storage.psm1 similarity index 60% rename from Modules/Az.Accounts/2.13.1/Az.Accounts.psm1 rename to Modules/Az.Storage/6.2.0/Az.Storage.psm1 index 2022fcfde49d..3d5d8023b2f6 100644 --- a/Modules/Az.Accounts/2.13.1/Az.Accounts.psm1 +++ b/Modules/Az.Storage/6.2.0/Az.Storage.psm1 @@ -1,9 +1,9 @@ # -# Script module for module 'Az.Accounts' that is executed when 'Az.Accounts' is imported in a PowerShell session. +# Script module for module 'Az.Storage' that is executed when 'Az.Storage' is imported in a PowerShell session. # # Generated by: Microsoft Corporation # -# Generated on: 09/20/2023 05:38:15 +# Generated on: 04/23/2024 13:01:44 # $PSDefaultParameterValues.Clear() @@ -63,10 +63,6 @@ if ($true -and ($PSEdition -eq 'Core')) { throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." } - if ($PSVersionTable.PSVersion -lt [Version]'7.0.6') - { - Write-Warning "This version of Az.Accounts is only supported on Windows PowerShell 5.1 and PowerShell 7.0.6 or greater, open https://aka.ms/install-powershell to learn how to upgrade. For further information, go to https://aka.ms/azpslifecycle." - } } if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) @@ -77,17 +73,7 @@ if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) } # [windows powershell] preload assemblies -if ($PSEdition -eq "Desktop") { - [Microsoft.Azure.PowerShell.AssemblyLoading.ConditionalAssemblyProvider]::GetAssemblies().Values | ForEach-Object { - $path = $_.Item1 - try { - Add-Type -Path $path -ErrorAction Ignore | Out-Null - } - catch { - Write-Verbose "Could not preload $path" - } - } -} + # [windows powershell] preload module alc assemblies $preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") @@ -101,7 +87,17 @@ if (Get-Module AzureRM.profile -ErrorAction Ignore) "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") } -Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Accounts.dll) +$module = Get-Module Az.Accounts + if ($module -ne $null -and $module.Version -lt [System.Version]"2.19.0") +{ + Write-Error "This module requires Az.Accounts version 2.19.0. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop +} +elseif ($module -eq $null) +{ + Import-Module Az.Accounts -MinimumVersion 2.19.0 -Scope Global +} +Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Storage.dll) +Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll) if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) @@ -111,7 +107,7 @@ if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) } } -$FilteredCommands = @() +$FilteredCommands = @('Add-AzStorageAccountNetworkRule:ResourceGroupName','Get-AzStorageAccountKey:ResourceGroupName','Get-AzStorageAccountNetworkRuleSet:ResourceGroupName','New-AzStorageAccount:ResourceGroupName','New-AzStorageAccountKey:ResourceGroupName','Remove-AzStorageAccount:ResourceGroupName','Remove-AzStorageAccountNetworkRule:ResourceGroupName','Set-AzStorageAccount:ResourceGroupName','Update-AzStorageAccountNetworkRuleSet:ResourceGroupName') if ($Env:ACC_CLOUD -eq $null) { @@ -146,45 +142,45 @@ if ($Env:ACC_CLOUD -eq $null) } } -[Microsoft.Azure.Commands.Profile.Utilities.CommandNotFoundHelper]::RegisterCommandNotFoundAction($ExecutionContext.InvokeCommand) + # SIG # Begin signature block -# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor +# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG -# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCb9fJw7tRJSjyo -# JEg82Xj/MrcwppXsz44viAgrYDK20aCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 -# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAsZtgBqg46Bm8p +# nc0nbKa0QfSpt17FGxmSViKRnFhkdKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA +# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p -# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB -# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU -# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 -# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm -# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa -# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq -# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE -# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw +# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA +# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG +# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN +# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL +# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB +# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW -# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci +# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 -# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk -# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 -# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 -# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d -# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM -# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh -# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX -# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir -# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 -# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A -# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H -# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq +# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd +# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ +# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY +# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp +# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn +# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT +# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG +# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O +# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk +# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx +# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt +# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 @@ -224,67 +220,67 @@ if ($Env:ACC_CLOUD -eq $null) # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr -# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw +# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp -# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB +# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO -# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBsLZoT0GL3AfKW+v1FN9bVc -# VG31uoPh0H8hDfNXM1ivMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A +# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC9KfrFmx3V4mCdgks+ymICG +# eCChmoWVgL2mpBgkmTabMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB -# BQAEggEAjm1RFaOR3jSivggTJhg8Xe4uZwJNAA0kGjYaTLK0sO7bf6gszj9yyZOW -# xl5OXc3I5e8idePoA9U2yMuNyGLP10P/SjCg/FSClm4PZr0HA1ORNDHn85kNLc+7 -# sQMWCkOiYLKNq/TudhmRGfeuEzjeZSiXKGbB65Fr5LeqGAuMNcZ5lKsP4Es7Cavs -# hG+lQd/27Lrb3xnB5LF5FZ9blmjY9UcS0hBnd6x/ynOB4WBFBjsu42fJZz2xx/04 -# panwkiuigz301YvY0maYIiNYJOWaNU32fVM+YX9b7+Iq5plTEx8XhWsexqmQTv9H -# jMkZa/2RkYvkbGfHQ3Ckw/oYI1NydKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC -# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq +# BQAEggEAgdbe6uPIOEIf76t4SUtWU5pFpt9XvcTHy0Uecnzs+vvurrzDoXxuZGje +# 236amuP6BqDaoXLZJkg1Pa8RmUwbEMF2LwZ/FLA+oGljePOUYbOIcPV6iSUQ37T9 +# Bgtk1qT4jQVPEYVGkfU3OzwBI0W+L0ARMoep63et3nCrrrLBd7tval+LTtnnKYSQ +# mBzo6+oA4Z+G0ipZ37efD/a+ahcKRH2/NsW9c1kOrAiy7zJNk2qaJLM0G2E9Xx55 +# ydJyCjxU2FFfZWIbnmhdJbKq7FCxPoaeWBflk3hML19GbkJapb8wAoZC8SHZGfJI +# wRyvVaXmj7/XiigksYFQu64YTUWAyaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC +# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl -# AwQCAQUABCCehXSh9EH4ZOe8kqIKTs5kjZxVf/mTlUUsukZabtyKDwIGZN/OPZ5t -# GBMyMDIzMDkyMDA1NTAzNS4zNjZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV +# AwQCAQUABCDlfJ5VbPhCbQBDGngPC3SfOZi4AOQ5xa9GeHXyj9RcjwIGZh/eWJle +# GBMyMDI0MDQyMzEzMTUxMy41MjVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO -# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT -# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAG6Hz8Z98F1vXwAAQAAAbowDQYJ +# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT +# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv -# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjIw -# OTIwMjAyMjE5WhcNMjMxMjE0MjAyMjE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV +# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx +# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl -# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC -# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC -# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIhOFYMzkjWAE9UVnXF9hRGv -# 0xBRxc+I5Hu3hxVFXyK3u38xusEb0pLkwjgGtDsaLLbrlMxqX3tFb/3BgEPEC3L0 -# wX76gD8zHt+wiBV5mq5BWop29qRrgMJKKCPcpQnSjs9B/4XMFFvrpdPicZDv43FL -# gz9fHqMq0LJDw5JAHGDS30TCY9OF43P4d44Z9lE7CaVS2pJMF3L453MXB5yYK/KD -# bilhERP1jxn2yl+tGCRguIAsMG0oeOhXaw8uSGOhS6ACSHb+ebi0038MFHyoTNhK -# f+SYo4OpSY3xP4+swBBTKDoYP1wH+CfxG6h9fymBJQPQZaqfl0riiDLjmDunQtH1 -# GD64Air5k9Jdwhq5wLmSWXjyFVL+IDfOpdixJ6f5o+MhE6H4t31w+prygHmd2UHQ -# 657UGx6FNuzwC+SpAHmV76MZYac4uAhTgaP47P2eeS1ockvyhl9ya+9JzPfMkug3 -# xevzFADWiLRMr066EMV7q3JSRAsnCS9GQ08C4FKPbSh8OPM33Lng0ffxANnHAAX/ -# DE7cHcx7l9jaV3Acmkj7oqir4Eh2u5YxwiaTE37XaMumX2ES3PJ5NBaXq7YdLJwy -# SD+U9pk/tl4dQ1t/Eeo7uDTliOyQkD8I74xpVB0T31/67KHfkBkFVvy6wye21V+9 -# IC8uSD++RgD3RwtN2kE/AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUimLm8QMeJa25 -# j9MWeabI2HSvZOUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD +# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC +# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh +# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa +# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD +# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF +# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ +# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd +# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ +# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM +# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV +# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl +# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC +# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S +# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD -# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAF/I8U6hbZhvDcn9 -# 6nZ6tkbSEjXPvKZ6wroaXcgstEhpgaeEwleLuPXHLzEWtuJuYz4eshmhXqFr49lb -# AcX5SN5/cEsP0xdFayb7U5P94JZd3HjFvpWRNoNBhF3SDM0A38sI2H+hjhB/VfX1 -# XcZiei1ROPAyCHcBgHLyQrEu6mnb3HhbIdr8h0Ta7WFylGhLSFW6wmzKusP6aOlm -# nGSac5NMfla6lRvTYHd28rbbCgfSm1RhTgoZj+W8DTKtiEMwubHJ3mIPKmo8xtJI -# WXPnXq6XKgldrL5cynLMX/0WX65OuWbHV5GTELdfWvGV3DaZrHPUQ/UP31Keqb2x -# jVCb30LVwgbjIvYS77N1dARkN8F/9pJ1gO4IvZWMwyMlKKFGojO1f1wbjSWcA/57 -# tsc+t2blrMWgSNHgzDr01jbPSupRjy3Ht9ZZs4xN02eiX3eG297NrtC6l4c/gzn2 -# 0eqoqWx/uHWxmTgB0F5osBuTHOe77DyEA0uhArGlgKP91jghgt/OVHoH65g0QqCt -# gZ+36mnCEg6IOhFoFrCc0fJFGVmb1+17gEe+HRMM7jBk4O06J+IooFrI3e3PJjPr -# Qano/MyE3h+zAuBWGMDRcUlNKCDU7dGnWvH3XWwLrCCIcz+3GwRUMsLsDdPW2OVv -# 7v1eEJiMSIZ2P+M7L20Q8aznU4OAMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ +# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M +# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w +# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf +# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc +# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa +# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw +# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 +# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S +# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC +# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy +# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 +# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh @@ -324,42 +320,42 @@ if ($Env:ACC_CLOUD -eq $null) # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ -# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx +# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh -# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE -# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy -# dmljZaIjCgEBMAcGBSsOAwIaAxUAdqNHe113gCJ87aZIGa5QBUqIwvKggYMwgYCk +# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox +# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy +# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF -# AOi0eZswIhgPMjAyMzA5MjAwMzQ4NDNaGA8yMDIzMDkyMTAzNDg0M1owdzA9Bgor -# BgEEAYRZCgQBMS8wLTAKAgUA6LR5mwIBADAKAgEAAgIL+AIB/zAHAgEAAgIULDAK -# AgUA6LXLGwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB -# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAClyBBu79vwaDEgr -# sDdtLY+7se9ISbk8pveb65oGP9gabWe8mNnqfg1SxEN1eW2I4ihQvT2bQVBGeDi7 -# wVO+vcDBDl/uDAaYT7wKES/l/PJORKyBmUoDGFoLJT7bHa+uqFek2mjsC8RIlpdj -# oVOh5HQksZd5HgNF4K/uv2nUyKuEMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC -# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV -# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp -# bWUtU3RhbXAgUENBIDIwMTACEzMAAAG6Hz8Z98F1vXwAAQAAAbowDQYJYIZIAWUD -# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B -# CQQxIgQgbjk/IiL8KyUtICVXFblxmt8j6F3g0s6KsH+WJzhAIqAwgfoGCyqGSIb3 -# DQEJEAIvMYHqMIHnMIHkMIG9BCApVb08M25w+tYGWsmlGtp1gy1nPcqWfqgMF3nl -# WYVzBTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u -# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp -# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB -# uh8/GffBdb18AAEAAAG6MCIEIJ9hCOdmkSHZdWHnjcQBaILiGo+/uNr71agjiWaN -# bF2dMA0GCSqGSIb3DQEBCwUABIICACgD9Dbo/LkUWEGprq7D+RTXofFwwH6qSKeh -# N1y8UNvmYAtF83AuC2amIWELSmnnblZEv1sMvjteyyLsLRuid8la04mjjLUBduUN -# yGhij+4aarTuuVuwf/Ap273AGk1mv3slKF3R7lQnObcO4SEXYYoDeBDY/HI8Pa3g -# 6FkNw18RsDp3Atj0Eun/UZaL+XCNHPJCsLoEK69bz9cxhiEwQfcEhc9kDzKTqjZV -# Yla/8Qh+WoC/0uQz1lEpQvP4vrSVOXw89ZGUicwjRHZ3Oys2IgPu5vrG3BeFZNCO -# q3ieylUYWrOBvIxZQWcHR5tqmwdQDnUHRR6vZNVxqErZ0dLdd824gFoKGUbup0MG -# SdD/k2nffp38SFvsfiDiO6DRwt49LX5ClzxeXt4LFv9GTNq4/9vlInIQoi9BujGg -# 3vJIDEVxEDZzq//guGDkz1ybPLz3/hrSzySBD5YWaVtcqapTPGMxqSOcwjFD9AbY -# 5BYD0o6/0lXAIBQVLCI4elTZToeECLJkkerZA79OU9UJFL6cdrr5s6KENdLQkXIO -# o3M2KywJgUYUVK4v2mSeUzyahW3XW0+i5K03EPAlDi4ONFZZSE5l73er2SziU0go -# a8R5O6oYM6AAPmSBTX/6EpF1vb5fkPfOSI3nBe1TBlovGg3WvWQGn9Ft5B/kSq6F -# MXMUpngZ +# AOnRnJUwIhgPMjAyNDA0MjMxMDMzNTdaGA8yMDI0MDQyNDEwMzM1N1owdDA6Bgor +# BgEEAYRZCgQBMSwwKjAKAgUA6dGclQIBADAHAgEAAgIXWjAHAgEAAgISjTAKAgUA +# 6dLuFQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID +# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAPeMyGf3Ydy+jqQvs63 +# XCZaWY7a56BswHctd6Tk8AklWwZQVK9M+hXCpDyBP05hd5gdWVf56HOP8SwAs89F +# 83kET0f+Ametk+Om8umz2PI4okluGuXg7eRsJ0iiNMPg7WgQ8Qi7VMXppToEvdFw +# yYwBmtcBpN/Gkc78aAYomHiTMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx +# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT +# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB +# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx +# IgQgjdrRH6U8dMnAFI8JzNl/HT/4OlDewNDu2AmUPsiZLf4wgfoGCyqGSIb3DQEJ +# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK +# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw +# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x +# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 +# HxMVH35dAAEAAAHgMCIEII54AP2h7Vh7o+D/3jGv808eKZ8LrGHgQ+q5KtqbazFB +# MA0GCSqGSIb3DQEBCwUABIICACRKgzYJYrIlEePcTfZkL2N6fz1LMnaQ+a90emFd +# N9IwwoKnIz769q4L2rlUewkVmPhNzSjnveUIaPSSWFuSGdjdTn7wL6GZXz+NtTNj +# INFViEphSAq7070v8leSLlcXp3bkLjLA9cKpz6pyFao0xNItQeM1paHSXUAiesN0 +# yD2cxYGOFyKu3CyfC9rkum9vsSBs2Eq7kQynpn63DCXQ/KKaGRLnk5Y73315bxIW +# mcTnr8jHe5/UWeMECdYbAiryfGSuZqcLI4pQIP4d/pewb9vQwCuneRj5yl5nMIYx +# XBGMDrASz//Ihl3cuIsNRNeCye3HOBDOM+cLjJi6b2NHLQCO2/L7HhXj7LnGcIU0 +# W2w0VhOFknh1NUaf5yKvUN1nhs7oYubuIrYAHpBRqgoW58RVowXDutqdOQzdg6Zk +# cGHZ2g/Rla43oyezD1quU+A4+OORa1vONHI8lltfrUfM/EQknm2d9nrz6E5MazG6 +# zKHCQKEquS3mwqRyKAAGWlsz6uOTteYmavtpOyTPE+kCnK/XBBYg46Cpb3p7Zsh4 +# znQpEktKVcZiqb5WIqyZFvzKTkesob2uv9bG/f8AHkJojBJCAZchnhfRRLYySj2f +# xOXDpQV+jwEqKtntwQHLKR5Auvkyx84dwt388RILKgpI6OILOh0IijAYfMnPPR54 +# HfyM # SIG # End signature block diff --git a/Modules/Az.Storage/5.10.1/Azure.Data.Tables.dll b/Modules/Az.Storage/6.2.0/Azure.Data.Tables.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Azure.Data.Tables.dll rename to Modules/Az.Storage/6.2.0/Azure.Data.Tables.dll diff --git a/Modules/Az.Storage/6.2.0/Azure.Storage.Blobs.dll b/Modules/Az.Storage/6.2.0/Azure.Storage.Blobs.dll new file mode 100644 index 000000000000..9ff4c8877aa1 Binary files /dev/null and b/Modules/Az.Storage/6.2.0/Azure.Storage.Blobs.dll differ diff --git a/Modules/Az.Storage/6.2.0/Azure.Storage.Common.dll b/Modules/Az.Storage/6.2.0/Azure.Storage.Common.dll new file mode 100644 index 000000000000..70cd1b2ddf8e Binary files /dev/null and b/Modules/Az.Storage/6.2.0/Azure.Storage.Common.dll differ diff --git a/Modules/Az.Storage/6.2.0/Azure.Storage.Files.DataLake.dll b/Modules/Az.Storage/6.2.0/Azure.Storage.Files.DataLake.dll new file mode 100644 index 000000000000..1a977ae451d0 Binary files /dev/null and b/Modules/Az.Storage/6.2.0/Azure.Storage.Files.DataLake.dll differ diff --git a/Modules/Az.Storage/6.2.0/Azure.Storage.Files.Shares.dll b/Modules/Az.Storage/6.2.0/Azure.Storage.Files.Shares.dll new file mode 100644 index 000000000000..c53a2d2a1a55 Binary files /dev/null and b/Modules/Az.Storage/6.2.0/Azure.Storage.Files.Shares.dll differ diff --git a/Modules/Az.Storage/6.2.0/Azure.Storage.Queues.dll b/Modules/Az.Storage/6.2.0/Azure.Storage.Queues.dll new file mode 100644 index 000000000000..18adb8bfda91 Binary files /dev/null and b/Modules/Az.Storage/6.2.0/Azure.Storage.Queues.dll differ diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.Cosmos.Table.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.Cosmos.Table.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.Cosmos.Table.dll rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.Cosmos.Table.dll diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.DocumentDB.Core.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.DocumentDB.Core.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.DocumentDB.Core.dll rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.DocumentDB.Core.dll diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.KeyVault.Core.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.KeyVault.Core.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.KeyVault.Core.dll rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.KeyVault.Core.dll diff --git a/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll new file mode 100644 index 000000000000..923b12c1c72d Binary files /dev/null and b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll differ diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll-Help.xml b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll-Help.xml similarity index 97% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll-Help.xml rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll-Help.xml index 3a82e6be7a49..d0d2fa1d688c 100644 --- a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll-Help.xml +++ b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll-Help.xml @@ -970,12 +970,12 @@ Add-AzRmStorageContainerLegalHold -StorageAccount $accountObject -ContainerName Example 1: Creates a ManagementPolicy Action Group object with 4 actions, then add it to a management policy rule and set to a Storage account - PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction Delete -DaysAfterCreationGreaterThan 100 -PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToArchive -daysAfterModificationGreaterThan 50 -DaysAfterLastTierChangeGreaterThan 40 -InputObject $action -PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToCool -DaysAfterLastAccessTimeGreaterThan 30 -EnableAutoTierToHotFromCool -InputObject $action -PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToHot -DaysAfterCreationGreaterThan 100 -InputObject $action -PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -SnapshotAction Delete -daysAfterCreationGreaterThan 100 -InputObject $action -PS C:\>$action + $action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction Delete -DaysAfterCreationGreaterThan 100 +$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToArchive -daysAfterModificationGreaterThan 50 -DaysAfterLastTierChangeGreaterThan 40 -InputObject $action +$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToCool -DaysAfterLastAccessTimeGreaterThan 30 -EnableAutoTierToHotFromCool -InputObject $action +$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToHot -DaysAfterCreationGreaterThan 100 -InputObject $action +$action = Add-AzStorageAccountManagementPolicyAction -SnapshotAction Delete -daysAfterCreationGreaterThan 100 -InputObject $action +$action BaseBlob.TierToCool.DaysAfterModificationGreaterThan : BaseBlob.TierToCool.DaysAfterLastAccessTimeGreaterThan : 30 @@ -1007,9 +1007,9 @@ Version.Delete.DaysAfterCreationGreaterThan : Version.TierToCold.DaysAfterCreationGreaterThan : Version.TierToHot.DaysAfterCreationGreaterThan : -PS C:\>$filter = New-AzStorageAccountManagementPolicyFilter -PS C:\>$rule = New-AzStorageAccountManagementPolicyRule -Name Test -Action $action -Filter $filter -PS C:\>$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Rule $rule +$filter = New-AzStorageAccountManagementPolicyFilter +$rule = New-AzStorageAccountManagementPolicyRule -Name Test -Action $action -Filter $filter +$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Rule $rule The first command create a ManagementPolicy Action Group object, the following 3 commands add 3 actions to the object. Then add it to a management policy rule and set to a Storage account. @@ -1018,14 +1018,14 @@ PS C:\>$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myr Example 2: Creates a ManagementPolicy Action Group object with 7 actions on snapshot and blob version, then add it to a management policy rule and set to a Storage account - PS C:\> $action = Add-AzStorageAccountManagementPolicyAction -SnapshotAction Delete -daysAfterCreationGreaterThan 40 -PS C:\> $action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -SnapshotAction TierToArchive -daysAfterCreationGreaterThan 50 -PS C:\> $action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -SnapshotAction TierToCool -daysAfterCreationGreaterThan 60 -PS C:\> $action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -BlobVersionAction Delete -daysAfterCreationGreaterThan 70 -PS C:\> $action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -BlobVersionAction TierToArchive -daysAfterCreationGreaterThan 80 -PS C:\> $action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -BlobVersionAction TierToCool -daysAfterCreationGreaterThan 90 -PS C:\> $action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -BlobVersionAction TierToCold -daysAfterCreationGreaterThan 100 -PS C:\> $action + $action = Add-AzStorageAccountManagementPolicyAction -SnapshotAction Delete -daysAfterCreationGreaterThan 40 +$action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -SnapshotAction TierToArchive -daysAfterCreationGreaterThan 50 +$action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -SnapshotAction TierToCool -daysAfterCreationGreaterThan 60 +$action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -BlobVersionAction Delete -daysAfterCreationGreaterThan 70 +$action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -BlobVersionAction TierToArchive -daysAfterCreationGreaterThan 80 +$action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -BlobVersionAction TierToCool -daysAfterCreationGreaterThan 90 +$action = Add-AzStorageAccountManagementPolicyAction -InputObject $action -BlobVersionAction TierToCold -daysAfterCreationGreaterThan 100 +$action BaseBlob.TierToCool.DaysAfterModificationGreaterThan : BaseBlob.TierToCool.DaysAfterLastAccessTimeGreaterThan : @@ -1057,9 +1057,9 @@ Version.Delete.DaysAfterCreationGreaterThan : 70 Version.TierToCold.DaysAfterCreationGreaterThan : 100 Version.TierToHot.DaysAfterCreationGreaterThan : -PS C:\>$filter = New-AzStorageAccountManagementPolicyFilter -PS C:\>$rule = New-AzStorageAccountManagementPolicyRule -Name Test -Action $action -Filter $filter -PS C:\>$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Rule $rule +$filter = New-AzStorageAccountManagementPolicyFilter +$rule = New-AzStorageAccountManagementPolicyRule -Name Test -Action $action -Filter $filter +$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Rule $rule The first command create a ManagementPolicy Action Group object, the following 5 commands add 5 actions on snapshot and blob version to the object. Then add it to a management policy rule and set to a Storage account. @@ -4343,9 +4343,9 @@ Enable Name TrackingGranularityInDays BlobType Example 1: Enables Blob Restore Policy for the Azure Storage Blob service on a Storage account - PS C:\> Enable-AzStorageBlobDeleteRetentionPolicy -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" -RetentionDays 5 + Enable-AzStorageBlobDeleteRetentionPolicy -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" -RetentionDays 5 -PS C:\> Update-AzStorageBlobServiceProperty -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" -EnableChangeFeed $true +Update-AzStorageBlobServiceProperty -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" -EnableChangeFeed $true StorageAccountName : mystorageaccount ResourceGroupName : myresourcegoup @@ -4358,9 +4358,9 @@ RestorePolicy.MinRestoreTime : ChangeFeed : True IsVersioningEnabled : True -PS C:\> Enable-AzStorageBlobRestorePolicy -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" -RestoreDays 4 +Enable-AzStorageBlobRestorePolicy -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" -RestoreDays 4 -PS C:\> Get-AzStorageBlobServiceProperty -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" +Get-AzStorageBlobServiceProperty -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" StorageAccountName : mystorageaccount ResourceGroupName : myresourcegoup @@ -5497,39 +5497,38 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObjectNone
- GetShareUsage + Filter - Specify this parameter to get the Share Usage in Bytes. + The filter of share name. When specified, only share names starting with the filter will be listed. The filter must be in format: startswith(name, `<prefix>`) + System.String - System.Management.Automation.SwitchParameter + System.String - False + None - - Name + + IncludeDeleted - Share Name + Include deleted shares, by default list shares won't include deleted shares - System.String - System.String + System.Management.Automation.SwitchParameter - None + False - SnapshotTime + IncludeSnapshot - Share SnapshotTime + Include share snapshots, by default list shares won't include share snapshots. - System.Nullable`1[System.DateTime] - System.Nullable`1[System.DateTime] + System.Management.Automation.SwitchParameter - None + False @@ -5547,39 +5546,38 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObjectNone - GetShareUsage + Filter - Specify this parameter to get the Share Usage in Bytes. + The filter of share name. When specified, only share names starting with the filter will be listed. The filter must be in format: startswith(name, `<prefix>`) + System.String - System.Management.Automation.SwitchParameter + System.String - False + None - - Name + + IncludeDeleted - Share Name + Include deleted shares, by default list shares won't include deleted shares - System.String - System.String + System.Management.Automation.SwitchParameter - None + False - SnapshotTime + IncludeSnapshot - Share SnapshotTime + Include share snapshots, by default list shares won't include share snapshots. - System.Nullable`1[System.DateTime] - System.Nullable`1[System.DateTime] + System.Management.Automation.SwitchParameter - None + False StorageAccount @@ -5596,10 +5594,22 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObject Get-AzRmStorageShare - - ResourceId + + ResourceGroupName - Input a File Share Resource Id. + Resource Group Name. + + System.String + + System.String + + + None + + + StorageAccountName + + Storage Account Name. System.String @@ -5631,13 +5641,10 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObject False - - - Get-AzRmStorageShare - - ResourceGroupName + + Name - Resource Group Name. + Share Name System.String @@ -5646,18 +5653,21 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObject None - - StorageAccountName + + SnapshotTime - Storage Account Name. + Share SnapshotTime - System.String + System.Nullable`1[System.DateTime] - System.String + System.Nullable`1[System.DateTime] None + + + Get-AzRmStorageShare DefaultProfile @@ -5671,9 +5681,9 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObjectNone - IncludeDeleted + GetShareUsage - Include deleted shares, by default list shares won't include deleted shares + Specify this parameter to get the Share Usage in Bytes. System.Management.Automation.SwitchParameter @@ -5681,66 +5691,80 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObject False - - IncludeSnapshot + + Name - Include share snapshots, by default list shares won't include share snapshots. + Share Name + System.String - System.Management.Automation.SwitchParameter + System.String - False + None - - - Get-AzRmStorageShare - - DefaultProfile + + SnapshotTime - The credentials, account, tenant, and subscription used for communication with Azure. + Share SnapshotTime - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer + System.Nullable`1[System.DateTime] - Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer + System.Nullable`1[System.DateTime] None - - IncludeDeleted + + StorageAccount - Include deleted shares, by default list shares won't include deleted shares + Storage account object + Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount - System.Management.Automation.SwitchParameter + Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount - False + None - - IncludeSnapshot + + + Get-AzRmStorageShare + + ResourceId - Include share snapshots, by default list shares won't include share snapshots. + Input a File Share Resource Id. + System.String - System.Management.Automation.SwitchParameter + System.String - False + None - - StorageAccount + + DefaultProfile - Storage account object + The credentials, account, tenant, and subscription used for communication with Azure. - Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount + Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer - Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount + Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer None + + GetShareUsage + + Specify this parameter to get the Share Usage in Bytes. + + + System.Management.Automation.SwitchParameter + + + False + @@ -5756,6 +5780,18 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObject None + + Filter + + The filter of share name. When specified, only share names starting with the filter will be listed. The filter must be in format: startswith(name, `<prefix>`) + + System.String + + System.String + + + None + GetShareUsage @@ -5868,7 +5904,7 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObject - System.String + Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount @@ -5876,7 +5912,7 @@ Get-AzRmStorageContainerImmutabilityPolicy -Container $containerObject - Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount + System.String @@ -5989,6 +6025,22 @@ testshare1 5120 TransactionOptimized This command gets a single file share snapshot with share name and snapshot time. + + + + + Example 7: List Storage file shares of a Storage account with a filter + Get-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Filter "startswith(name, test)" + +ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount + +Name QuotaGiB EnabledProtocols AccessTier Deleted Version ShareUsageBytes snapshotTime +---- -------- ---------------- ---------- ------- ------- --------------- ------------ +testshare1 5120 SMB TransactionOptimized +testshare2 5120 SMB TransactionOptimized + + This command lists all Storage file shares with names that begin with "test". + @@ -6390,7 +6442,7 @@ InProgress a70cd4a1-f223-4c86-959f-cc13eb4795a8 2020-02-10T13:45:0 ListKerbKey - Lists the Kerberos keys (if active directory enabled) for the specified storage account. Kerberos key is generated per storage account for Azure Files identity based authentication either with Azure Active Directory Domain Service (Azure AD DS) or Active Directory Domain Service (AD DS). It is used as the password of the identity registered in the domain service that represents the storage account. Kerberos key does not provide access permission to perform any control or data plane read or write operations against the storage account. + Lists the Kerberos keys (if active directory enabled) for the specified storage account. Kerberos key is generated per storage account for Azure Files identity based authentication either with Microsoft Entra Domain Service (Microsoft Entra Domain Services) or Active Directory Domain Service (AD DS). It is used as the password of the identity registered in the domain service that represents the storage account. Kerberos key does not provide access permission to perform any control or data plane read or write operations against the storage account. System.Management.Automation.SwitchParameter @@ -6416,7 +6468,7 @@ InProgress a70cd4a1-f223-4c86-959f-cc13eb4795a8 2020-02-10T13:45:0 ListKerbKey - Lists the Kerberos keys (if active directory enabled) for the specified storage account. Kerberos key is generated per storage account for Azure Files identity based authentication either with Azure Active Directory Domain Service (Azure AD DS) or Active Directory Domain Service (AD DS). It is used as the password of the identity registered in the domain service that represents the storage account. Kerberos key does not provide access permission to perform any control or data plane read or write operations against the storage account. + Lists the Kerberos keys (if active directory enabled) for the specified storage account. Kerberos key is generated per storage account for Azure Files identity based authentication either with Microsoft Entra Domain Service (Microsoft Entra Domain Services) or Active Directory Domain Service (AD DS). It is used as the password of the identity registered in the domain service that represents the storage account. Kerberos key does not provide access permission to perform any control or data plane read or write operations against the storage account. System.Management.Automation.SwitchParameter @@ -6488,14 +6540,14 @@ InProgress a70cd4a1-f223-4c86-959f-cc13eb4795a8 2020-02-10T13:45:0 -- Example 2: Get a specific access key for a Storage account -- This command gets a specific key for a Storage account. -PS C:\>(Get-AzStorageAccountKey -ResourceGroupName "RG01" -Name "mystorageaccount")| Where-Object {$_.KeyName -eq "key1"} +(Get-AzStorageAccountKey -ResourceGroupName "RG01" -Name "mystorageaccount")| Where-Object {$_.KeyName -eq "key1"} KeyName Value Permissions CreationTime ------- ----- ----------- ------------ key1 <KeyValue> Full This command gets a specific key value for a Storage account. -PS C:\>(Get-AzStorageAccountKey -ResourceGroupName "RG01" -Name "mystorageaccount")[0].Value +(Get-AzStorageAccountKey -ResourceGroupName "RG01" -Name "mystorageaccount")[0].Value <KeyValue> @@ -7253,9 +7305,9 @@ Rules : [ - Example 1: Get blob inventory policy from a Storage account - - PS C:\> $policy = Get-AzStorageBlobInventoryPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" + $policy = Get-AzStorageBlobInventoryPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -PS C:\> $policy +$policy StorageAccountName : mystorageaccount ResourceGroupName : myresourcegroup @@ -7266,7 +7318,7 @@ LastModifiedTime : 11/4/2020 9:18:30 AM Enabled : True Rules : {Test1, Test2} -PS C:\> $policy.Rules +$policy.Rules Name Enabled Destination ObjectType Format Schedule IncludeSnapshots IncludeBlobVersions BlobTypes PrefixMatch SchemaFields ---- ------- ----------- ---------- ------ -------- ---------------- ------------------- --------- ----------- ------------ @@ -7843,7 +7895,7 @@ testscope Disabled Microsoft.Keyvault https://keyvalutname.vault.azure.net:443/k -- Example 2: List all encryption scopes of a Storage account -- - PS C:\> Get-AzStorageEncryptionScope -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" + Get-AzStorageEncryptionScope -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -8322,9 +8374,9 @@ ProtocolSettings.Smb.ChannelEncryption : {AES-128-CCM, AES-128-GCM, AES-2 ------------ Example 1: Get a specified local user ------------ - PS C:\> $localUser = Get-AzStorageLocalUser -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -UserName testuser1 + $localUser = Get-AzStorageLocalUser -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -UserName testuser1 -PS C:\> $localUser +$localUser ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -8332,7 +8384,7 @@ Name Sid HomeDirectory HasSharedKe ---- --- ------------- ------------ --------- -------------- ---------------- testuser1 S-1-2-0-0000000000-000000000-0000000000-0000 / True True True [container1,...] -PS C:\> $localUser.PermissionScopes +$localUser.PermissionScopes Permissions Service ResourceName ----------- ------- ------------ @@ -8904,15 +8956,15 @@ SshAuthorizedKeys SharedKey Example 1: Get an object replication policy with specific policy Id and show its rules. - PS C:\> $policy = Get-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mydestaccount" -PolicyId 56bfa11c-81ef-4f8d-b307-5e5386e16fba + $policy = Get-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mydestaccount" -PolicyId 56bfa11c-81ef-4f8d-b307-5e5386e16fba -PS C:\> $policy +$policy ResourceGroupName StorageAccountName PolicyId EnabledTime SourceAccount DestinationAccount Rules ----------------- ------------------ -------- ----------- ------------- ------------------ ----- myresourcegroup mydestaccount 56bfa11c-81ef-4f8d-b307-5e5386e16fba mysourceaccount mydestaccount [5fa8b1d6-4985-4abd-a0b3-ec4d07295a43,...] -PS C:\> $policy.Rules +$policy.Rules RuleId SourceContainer DestinationContainer Filters.PrefixMatch Filters.MinCreationTime ------ --------------- -------------------- ------------------- ----------------------- @@ -9763,15 +9815,15 @@ $t | Wait-Job ------- Example 1: Invoke failover of a Storage account ------- - PS C:\>$account = Get-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -IncludeGeoReplicationStats -PS C:\>$account.GeoReplicationStats + $account = Get-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -IncludeGeoReplicationStats +$account.GeoReplicationStats Status LastSyncTime ------ ------------ Live 11/13/2018 2:44:22 AM -PS C:\>$job = Invoke-AzStorageAccountFailover -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Force -AsJob -PS C:\>$job | Wait-Job +$job = Invoke-AzStorageAccountFailover -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Force -AsJob +$job | Wait-Job This command check the last sync time of a Storage account then invokes failover of it, the secondary cluster will become primary after failover. Since failover takes a long time, suggest to run it in the backend with -Asjob parameter, and then wait for the job complete. @@ -10127,12 +10179,12 @@ PS C:\>$job | Wait-Job Example 1: Validate a stroage account can be upgrade to enable HierarchicalNamespace, then upgrade it to enabled HierarchicalNamespace - PS C:\> Invoke-AzStorageAccountHierarchicalNamespaceUpgrade -ResourceGroupName $rgname -Name $accountName -RequestType Validation + Invoke-AzStorageAccountHierarchicalNamespaceUpgrade -ResourceGroupName $rgname -Name $accountName -RequestType Validation True -PS C:\> $task = Invoke-AzStorageAccountHierarchicalNamespaceUpgrade -ResourceGroupName $rgname -Name $accountName -RequestType Upgrade -Force -AsJob +$task = Invoke-AzStorageAccountHierarchicalNamespaceUpgrade -ResourceGroupName $rgname -Name $accountName -RequestType Upgrade -Force -AsJob -PS C:\> $task | Wait-Job +$task | Wait-Job The first command validates if a stroage account can be upgrade to enable HierarchicalNamespace. The second command upgrade the storage account to enable HierarchicalNamespace. Since the upgrade will take time, use '-Asjob' to run it in backend, and return a task. Then wait for the task finish. @@ -11477,9 +11529,9 @@ New-AzRmStorageContainer -StorageAccount $accountObject -ContainerName "myContai Example 3: Create a storage container with EncryptionScope setting - PS C:\> $c = New-AzRmStorageContainer -ResourceGroupName "myResourceGroup" -AccountName "mystorageaccount" -Name testcontainer -DefaultEncryptionScope "testscope" -PreventEncryptionScopeOverride $true + $c = New-AzRmStorageContainer -ResourceGroupName "myResourceGroup" -AccountName "mystorageaccount" -Name testcontainer -DefaultEncryptionScope "testscope" -PreventEncryptionScopeOverride $true -PS C:\> $c +$c ResourceGroupName: myResourceGroup, StorageAccountName: mystorageaccount @@ -11487,10 +11539,10 @@ Name PublicAccess LastModified HasLegalHold HasImmutabilityPolicy ---- ------------ ------------ ------------ --------------------- testcontainer False False -PS C:\> $c.DefaultEncryptionScope +$c.DefaultEncryptionScope testscope -PS C:\> $c.DenyEncryptionScopeOverride +$c.DenyEncryptionScopeOverride True This command creates a storage container with a defalt encryptionScope, and blocks override of encryption scope from the container default. Then show the related container properties. @@ -11500,12 +11552,12 @@ True - Example 4: Create an Azure storage container with RootSquash - - PS C:\> $container = New-AzRmStorageContainer -ResourceGroupName "myersourcegroup" -AccountName "mystorageaccount" -Name "mycontainer" -RootSquash AllSquash + $container = New-AzRmStorageContainer -ResourceGroupName "myersourcegroup" -AccountName "mystorageaccount" -Name "mycontainer" -RootSquash AllSquash -PS C:\> $container.EnableNfsV3AllSquash +$container.EnableNfsV3AllSquash True -PS C:\> $container.EnableNfsV3RootSquash +$container.EnableNfsV3RootSquash False This command creates a storage container, with RootSquash property set as AllSquash. RootSquash only works on a storage account that enabled NfsV3. @@ -12082,7 +12134,7 @@ myshare Example 3: Create a Storage file share with accesstier as Hot - PS C:\>$share = New-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -AccessTier Hot + $share = New-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -AccessTier Hot ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -12097,7 +12149,7 @@ myshare Hot Example 4: Create a Storage file share snapshot of an existing share - PS C:\>$shareSnapshot = New-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -Snapshot + $shareSnapshot = New-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -Snapshot ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -12112,9 +12164,9 @@ myshare 20 Example 5: Create a Storage file share with EnabledProtocol proeprty as NFS, and RootSquash property as NoRootSquash - PS C:\>$share = New-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -EnabledProtocol NFS -RootSquash NoRootSquash + $share = New-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -EnabledProtocol NFS -RootSquash NoRootSquash -PS C:\> $share +$share ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -12122,7 +12174,7 @@ Name QuotaGiB EnabledProtocols AccessTier Deleted Version ShareUsageBytes ---- -------- ---------------- ---------- ------- ------- --------------- myshare NFS -PS C:\> $share.RootSquash +$share.RootSquash NoRootSquash This command creates a Storage file share with EnabledProtocol proeprty as NFS, and RootSquash proeprty as NoRootSquash. @@ -12333,7 +12385,7 @@ NoRootSquash AllowBlobPublicAccess - Allow public access to all blobs or containers in the storage account. The default interpretation is true for this property. + Allow anonymous access to all blobs or containers in the storage account. The default interpretation is false for this property. System.Boolean @@ -12345,7 +12397,7 @@ NoRootSquash AllowCrossTenantReplication - Gets or sets allow or disallow cross AAD tenant object replication. The default interpretation is true for this property. + Gets or sets allow or disallow cross Microsoft Entra tenant object replication. The default interpretation is false for this property. System.Boolean @@ -12357,7 +12409,7 @@ NoRootSquash AllowedCopyScope - Set restrict copy to and from Storage Accounts within an AAD tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' + Set restrict copy to and from Storage Accounts within a Microsoft Entra tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' System.String @@ -12369,7 +12421,7 @@ NoRootSquash AllowSharedKeyAccess - Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Azure Active Directory (Azure AD). The default value is null, which is equivalent to true. + Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Microsoft Entra ID. The default value is null, which is equivalent to true. System.Boolean @@ -12850,7 +12902,7 @@ NoRootSquash UserAssignedIdentityId - Set resource ids for the the new Storage Account user assigned Identity, the identity will be used with key management services like Azure KeyVault. + Set resource ids for the new Storage Account user assigned Identity, the identity will be used with key management services like Azure KeyVault. System.String @@ -12982,7 +13034,7 @@ NoRootSquash AllowBlobPublicAccess - Allow public access to all blobs or containers in the storage account. The default interpretation is true for this property. + Allow anonymous access to all blobs or containers in the storage account. The default interpretation is false for this property. System.Boolean @@ -12994,7 +13046,7 @@ NoRootSquash AllowCrossTenantReplication - Gets or sets allow or disallow cross AAD tenant object replication. The default interpretation is true for this property. + Gets or sets allow or disallow cross Microsoft Entra tenant object replication. The default interpretation is false for this property. System.Boolean @@ -13006,7 +13058,7 @@ NoRootSquash AllowedCopyScope - Set restrict copy to and from Storage Accounts within an AAD tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' + Set restrict copy to and from Storage Accounts within a Microsoft Entra tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' System.String @@ -13018,7 +13070,7 @@ NoRootSquash AllowSharedKeyAccess - Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Azure Active Directory (Azure AD). The default value is null, which is equivalent to true. + Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Microsoft Entra ID. The default value is null, which is equivalent to true. System.Boolean @@ -13499,7 +13551,7 @@ NoRootSquash UserAssignedIdentityId - Set resource ids for the the new Storage Account user assigned Identity, the identity will be used with key management services like Azure KeyVault. + Set resource ids for the new Storage Account user assigned Identity, the identity will be used with key management services like Azure KeyVault. System.String @@ -13607,7 +13659,7 @@ NoRootSquash AllowBlobPublicAccess - Allow public access to all blobs or containers in the storage account. The default interpretation is true for this property. + Allow anonymous access to all blobs or containers in the storage account. The default interpretation is false for this property. System.Boolean @@ -13619,7 +13671,7 @@ NoRootSquash AllowCrossTenantReplication - Gets or sets allow or disallow cross AAD tenant object replication. The default interpretation is true for this property. + Gets or sets allow or disallow cross Microsoft Entra tenant object replication. The default interpretation is false for this property. System.Boolean @@ -13631,7 +13683,7 @@ NoRootSquash AllowedCopyScope - Set restrict copy to and from Storage Accounts within an AAD tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' + Set restrict copy to and from Storage Accounts within a Microsoft Entra tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' System.String @@ -13643,7 +13695,7 @@ NoRootSquash AllowSharedKeyAccess - Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Azure Active Directory (Azure AD). The default value is null, which is equivalent to true. + Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Microsoft Entra ID. The default value is null, which is equivalent to true. System.Boolean @@ -13754,7 +13806,7 @@ NoRootSquash EnableAzureActiveDirectoryDomainServicesForFile - Enable Azure Files Azure Active Directory Domain Service Authentication for the storage account. + Enable Azure Files Microsoft Entra Domain Service Authentication for the storage account. System.Boolean @@ -14124,7 +14176,7 @@ NoRootSquash UserAssignedIdentityId - Set resource ids for the the new Storage Account user assigned Identity, the identity will be used with key management services like Azure KeyVault. + Set resource ids for the new Storage Account user assigned Identity, the identity will be used with key management services like Azure KeyVault. System.String @@ -14259,7 +14311,7 @@ NoRootSquash AllowBlobPublicAccess - Allow public access to all blobs or containers in the storage account. The default interpretation is true for this property. + Allow anonymous access to all blobs or containers in the storage account. The default interpretation is false for this property. System.Boolean @@ -14271,7 +14323,7 @@ NoRootSquash AllowCrossTenantReplication - Gets or sets allow or disallow cross AAD tenant object replication. The default interpretation is true for this property. + Gets or sets allow or disallow cross Microsoft Entra tenant object replication. The default interpretation is false for this property. System.Boolean @@ -14283,7 +14335,7 @@ NoRootSquash AllowedCopyScope - Set restrict copy to and from Storage Accounts within an AAD tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' + Set restrict copy to and from Storage Accounts within a Microsoft Entra tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' System.String @@ -14295,7 +14347,7 @@ NoRootSquash AllowSharedKeyAccess - Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Azure Active Directory (Azure AD). The default value is null, which is equivalent to true. + Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Microsoft Entra ID. The default value is null, which is equivalent to true. System.Boolean @@ -14415,7 +14467,7 @@ NoRootSquash EnableAzureActiveDirectoryDomainServicesForFile - Enable Azure Files Azure Active Directory Domain Service Authentication for the storage account. + Enable Azure Files Microsoft Entra Domain Service Authentication for the storage account. System.Boolean @@ -14824,7 +14876,7 @@ NoRootSquash UserAssignedIdentityId - Set resource ids for the the new Storage Account user assigned Identity, the identity will be used with key management services like Azure KeyVault. + Set resource ids for the new Storage Account user assigned Identity, the identity will be used with key management services like Azure KeyVault. System.String @@ -14923,10 +14975,10 @@ NoRootSquash - Example 6: Create a Storage account with Azure Files AAD DS Authentication, and enable large file share. + Example 6: Create a Storage account with Azure Files Microsoft Entra Domain Services Authentication, and enable large file share. New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -EnableAzureActiveDirectoryDomainServicesForFile $true -EnableLargeFileShare - This command creates a Storage account with Azure Files AAD DS Authentication, and enable large file share. + This command creates a Storage account with Azure Files Microsoft Entra Domain Services Authentication, and enable large file share. @@ -14951,23 +15003,23 @@ NoRootSquash Example 8: Create a Storage account with Queue and Table Service use account-scoped encryption key, and Require Infrastructure Encryption. - PS C:\>New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -EncryptionKeyTypeForTable Account -EncryptionKeyTypeForQueue Account -RequireInfrastructureEncryption + New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -EncryptionKeyTypeForTable Account -EncryptionKeyTypeForQueue Account -RequireInfrastructureEncryption -PS C:\>$account = Get-AzStorageAccount -ResourceGroupName $rgname -Name $accountName +$account = Get-AzStorageAccount -ResourceGroupName $rgname -Name $accountName -PS C:\>$account.Encryption.Services.Queue +$account.Encryption.Services.Queue Enabled LastEnabledTime KeyType ------- --------------- ------- True 1/9/2020 6:09:11 AM Account -PS C:\>$account.Encryption.Services.Table +$account.Encryption.Services.Table Enabled LastEnabledTime KeyType ------- --------------- ------- True 1/9/2020 6:09:11 AM Account -PS C:\> $account.Encryption.RequireInfrastructureEncryption +$account.Encryption.RequireInfrastructureEncryption True This command creates a Storage account with Queue and Table Service use account-scoped encryption key and Require Infrastructure Encryption, so Queue and Table will use same encryption key with Blob and File service, and the service will apply a secondary layer of encryption with platform managed keys for data at rest. Then get the Storage account properties, and view the encryption keytype of Queue and Table Service, and RequireInfrastructureEncryption value. @@ -14977,33 +15029,33 @@ True Example 9: Create account MinimumTlsVersion and AllowBlobPublicAccess, and disable SharedKey Access - PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -MinimumTlsVersion TLS1_1 -AllowBlobPublicAccess $false -AllowSharedKeyAccess $false + $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -MinimumTlsVersion TLS1_1 -AllowBlobPublicAccess $false -AllowSharedKeyAccess $false -PS C:\> $account.MinimumTlsVersion +$account.MinimumTlsVersion TLS1_1 -PS C:\> $account.AllowBlobPublicAccess +$account.AllowBlobPublicAccess False -PS C:\> $a.AllowSharedKeyAccess +$a.AllowSharedKeyAccess False - The command create account with MinimumTlsVersion, AllowBlobPublicAccess, and disable SharedKey access to the account, and then show the the 3 properties of the created account + The command create account with MinimumTlsVersion, AllowBlobPublicAccess, and disable SharedKey access to the account, and then show the 3 properties of the created account Example 10: Create a Storage account with RoutingPreference setting - PS C:\>$account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -PublishMicrosoftEndpoint $true -PublishInternetEndpoint $true -RoutingChoice MicrosoftRouting + $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -PublishMicrosoftEndpoint $true -PublishInternetEndpoint $true -RoutingChoice MicrosoftRouting -PS C:\>$account.RoutingPreference +$account.RoutingPreference RoutingChoice PublishMicrosoftEndpoints PublishInternetEndpoints ------------- ------------------------- ------------------------ MicrosoftRouting True True -PS C:\>$account.PrimaryEndpoints +$account.PrimaryEndpoints Blob : https://mystorageaccount.blob.core.windows.net/ Queue : https://mystorageaccount.queue.core.windows.net/ @@ -15023,15 +15075,15 @@ InternetEndpoints : {"Blob":"https://mystorageaccount-internetrouting.blob.core Example 11: Create a Storage account with EdgeZone and AllowCrossTenantReplication - PS C:\>$account = New-AzStorageAccount -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -SkuName Premium_LRS -Location westus -EdgeZone "microsoftlosangeles1" -AllowCrossTenantReplication $false + $account = New-AzStorageAccount -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -SkuName Premium_LRS -Location westus -EdgeZone "microsoftlosangeles1" -AllowCrossTenantReplication $false -PS C:\>$account.ExtendedLocation +$account.ExtendedLocation Name Type ---- ---- microsoftlosangeles1 EdgeZone -PS C:\> $account.AllowCrossTenantReplication +$account.AllowCrossTenantReplication False This command creates a Storage account with EdgeZone as "microsoftlosangeles1" and AllowCrossTenantReplication as false, then show the created account related properties. @@ -15041,12 +15093,12 @@ False Example 12: Create a Storage account with KeyExpirationPeriod and SasExpirationPeriod - PS C:\> $account = New-AzStorageAccount -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -SkuName Premium_LRS -Location eastus -KeyExpirationPeriodInDay 5 -SasExpirationPeriod "1.12:05:06" + $account = New-AzStorageAccount -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -SkuName Premium_LRS -Location eastus -KeyExpirationPeriodInDay 5 -SasExpirationPeriod "1.12:05:06" -PS C:\> $account.KeyPolicy.KeyExpirationPeriodInDays +$account.KeyPolicy.KeyExpirationPeriodInDays 5 -PS C:\> $account.SasPolicy.SasExpirationPeriod +$account.SasPolicy.SasExpirationPeriod 1.12:05:06 This command creates a Storage account with KeyExpirationPeriod and SasExpirationPeriod, then show the created account related properties. @@ -15057,26 +15109,26 @@ PS C:\> $account.SasPolicy.SasExpirationPeriod Example 12: Create a Storage account with Keyvault encryption (access Keyvault with user assigned identity) # Create KeyVault (no need if using exist keyvault) -PS C:\> $keyVault = New-AzKeyVault -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -Location eastus2euap -EnablePurgeProtection -PS C:\> $key = Add-AzKeyVaultKey -VaultName $keyvaultName -Name $keyname -Destination 'Software' +$keyVault = New-AzKeyVault -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -Location eastus2euap -EnablePurgeProtection +$key = Add-AzKeyVaultKey -VaultName $keyvaultName -Name $keyname -Destination 'Software' # create user assigned identity and grant access to keyvault (no need if using exist user assigned identity) -PS C:\> $userId = New-AzUserAssignedIdentity -ResourceGroupName $resourceGroupName -Name $userIdName -PS C:\> Set-AzKeyVaultAccessPolicy -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -ObjectId $userId.PrincipalId -PermissionsToKeys get,wrapkey,unwrapkey -BypassObjectIdValidation -PS C:\> $useridentityId= $userId.Id +$userId = New-AzUserAssignedIdentity -ResourceGroupName $resourceGroupName -Name $userIdName +Set-AzKeyVaultAccessPolicy -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -ObjectId $userId.PrincipalId -PermissionsToKeys get,wrapkey,unwrapkey -BypassObjectIdValidation +$useridentityId= $userId.Id # create Storage account with Keyvault encryption (access Keyvault with user assigned identity), then show properties -PS C:\> $account = New-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName -Kind StorageV2 -SkuName Standard_LRS -Location eastus2euap ` +$account = New-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName -Kind StorageV2 -SkuName Standard_LRS -Location eastus2euap ` -IdentityType SystemAssignedUserAssigned -UserAssignedIdentityId $useridentityId ` -KeyVaultUri $keyVault.VaultUri -KeyName $keyname -KeyVaultUserAssignedIdentityId $useridentityId -PS C:\> $account.Encryption.EncryptionIdentity +$account.Encryption.EncryptionIdentity EncryptionUserAssignedIdentity ------------------------------ /subscriptions/{subscription-id}/resourceGroups/myresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myuserid -PS C:\> $account.Encryption.KeyVaultProperties +$account.Encryption.KeyVaultProperties KeyName : wrappingKey KeyVersion : @@ -15118,12 +15170,12 @@ Disabled Example 15: Create account with account level mmutability policy - PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -SkuName Standard_LRS -Location centraluseuap -Kind StorageV2 -EnableAccountLevelImmutability -ImmutabilityPeriod 1 -ImmutabilityPolicyState Unlocked + $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -SkuName Standard_LRS -Location centraluseuap -Kind StorageV2 -EnableAccountLevelImmutability -ImmutabilityPeriod 1 -ImmutabilityPolicyState Unlocked -PS C:\> $account.ImmutableStorageWithVersioning.Enabled +$account.ImmutableStorageWithVersioning.Enabled True -PS C:\> $account.ImmutableStorageWithVersioning.ImmutabilityPolicy +$account.ImmutableStorageWithVersioning.ImmutabilityPolicy ImmutabilityPeriodSinceCreationInDays State ------------------------------------- ----- @@ -15148,17 +15200,17 @@ ImmutabilityPeriodSinceCreationInDays State Example 17: Create a Storage account with Keyvault from another tenant (access Keyvault with FederatedClientId) # create Storage account with Keyvault encryption (access Keyvault with FederatedClientId), then show properties -PS C:\> $account = New-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName -Kind StorageV2 -SkuName Standard_LRS -Location eastus2euap ` +$account = New-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName -Kind StorageV2 -SkuName Standard_LRS -Location eastus2euap ` -IdentityType SystemAssignedUserAssigned -UserAssignedIdentityId $useridentityId ` -KeyVaultUri $keyVault.VaultUri -KeyName $keyname -KeyVaultUserAssignedIdentityId $useridentityId -KeyVaultFederatedClientId $federatedClientId -PS C:\> $account.Encryption.EncryptionIdentity +$account.Encryption.EncryptionIdentity EncryptionUserAssignedIdentity EncryptionFederatedIdentityClientId ------------------------------ ----------------------------------- /subscriptions/{subscription-id}/resourceGroups/myresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myuserid ********-****-****-****-************ -PS C:\> $account.Encryption.KeyVaultProperties +$account.Encryption.KeyVaultProperties KeyName : wrappingKey KeyVersion : @@ -15493,16 +15545,16 @@ LastKeyRotationTimestamp : 3/3/2022 2:07:34 AM Example 1: Creates 2 ManagementPolicy BlobIndexMatch object3, then add them to a management policy rule filter - PS C:\> $blobindexmatch1 = New-AzStorageAccountManagementPolicyBlobIndexMatchObject -Name "tag1" -Value "value1" -PS C:\> $blobindexmatch1 + $blobindexmatch1 = New-AzStorageAccountManagementPolicyBlobIndexMatchObject -Name "tag1" -Value "value1" +$blobindexmatch1 Name Op Value ---- -- ----- tag1 == value1 -PS C:\> $blobindexmatch2 = New-AzStorageAccountManagementPolicyBlobIndexMatchObject -Name "tag2" -Value "value2" +$blobindexmatch2 = New-AzStorageAccountManagementPolicyBlobIndexMatchObject -Name "tag2" -Value "value2" -PS C:\> New-AzStorageAccountManagementPolicyFilter -PrefixMatch prefix1,prefix2 -BlobType blockBlob ` +New-AzStorageAccountManagementPolicyFilter -PrefixMatch prefix1,prefix2 -BlobType blockBlob ` -BlobIndexMatch $blobindexmatch1,$blobindexmatch2 PrefixMatch BlobTypes BlobIndexMatch @@ -15669,18 +15721,18 @@ PrefixMatch BlobTypes BlobIndexMatch Example 1: Creates a ManagementPolicy rule filter object, then add it to a management policy rule and set to a Storage account - PS C:\>$blobindexmatch1 = New-AzStorageAccountManagementPolicyBlobIndexMatchObject -Name "tag1" -Value "value1" -PS C:\>$blobindexmatch2 = New-AzStorageAccountManagementPolicyBlobIndexMatchObject -Name "tag2" -Value "value2" -PS C:\>$filter = New-AzStorageAccountManagementPolicyFilter -PrefixMatch blobprefix1,blobprefix2 -BlobType appendBlob,blockBlob -BlobIndexMatch $blobindexmatch1,$blobindexmatch2 -PS C:\>$filter + $blobindexmatch1 = New-AzStorageAccountManagementPolicyBlobIndexMatchObject -Name "tag1" -Value "value1" +$blobindexmatch2 = New-AzStorageAccountManagementPolicyBlobIndexMatchObject -Name "tag2" -Value "value2" +$filter = New-AzStorageAccountManagementPolicyFilter -PrefixMatch blobprefix1,blobprefix2 -BlobType appendBlob,blockBlob -BlobIndexMatch $blobindexmatch1,$blobindexmatch2 +$filter PrefixMatch BlobTypes BlobIndexMatch ----------- --------- -------------- {blobprefix1, blobprefix2} {appendBlob, blockBlob} {tag1, tag2} -PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction Delete -daysAfterModificationGreaterThan 100 -PS C:\>$rule = New-AzStorageAccountManagementPolicyRule -Name Test -Action $action -Filter $filter -PS C:\>$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Rule $rule +$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction Delete -daysAfterModificationGreaterThan 100 +$rule = New-AzStorageAccountManagementPolicyRule -Name Test -Action $action -Filter $filter +$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Rule $rule This command create a ManagementPolicy rule filter object. Then add it to a management policy rule and set to a Storage account. @@ -15861,15 +15913,15 @@ PS C:\>$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myr Example 1: Creates a ManagementPolicy rule object, then set to a Storage Account - PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction Delete -daysAfterModificationGreaterThan 100 -PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToArchive -daysAfterModificationGreaterThan 50 -InputObject $action -PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToCool -daysAfterModificationGreaterThan 30 -InputObject $action -PS C:\>$action = Add-AzStorageAccountManagementPolicyAction -SnapshotAction Delete -daysAfterCreationGreaterThan 100 -InputObject $action + $action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction Delete -daysAfterModificationGreaterThan 100 +$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToArchive -daysAfterModificationGreaterThan 50 -InputObject $action +$action = Add-AzStorageAccountManagementPolicyAction -BaseBlobAction TierToCool -daysAfterModificationGreaterThan 30 -InputObject $action +$action = Add-AzStorageAccountManagementPolicyAction -SnapshotAction Delete -daysAfterCreationGreaterThan 100 -InputObject $action -PS C:\>$filter = New-AzStorageAccountManagementPolicyFilter -PrefixMatch blobprefix1,blobprefix2 +$filter = New-AzStorageAccountManagementPolicyFilter -PrefixMatch blobprefix1,blobprefix2 -PS C:\>$rule = New-AzStorageAccountManagementPolicyRule -Name rule1 -Action $action -Filter $filter -PS C:\>$rule +$rule = New-AzStorageAccountManagementPolicyRule -Name rule1 -Action $action -Filter $filter +$rule Enabled : True Name : rule1 @@ -15903,7 +15955,7 @@ Definition : { } } -PS C:\>$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Rule $rule +$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Rule $rule This command create a ManagementPolicy rule object, with a ManagementPolicy action group object contains 4 actions, a ManagementPolicy rule filter object, then set the rule to a Storage Account. @@ -16025,6 +16077,18 @@ PS C:\>$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myr None + + CreationTimeLastNDay + + Filter the objects which has creation time in last N days. The valid value is between 1 to 36500. Inventory schema 'Creation-Time' is mandatory with this filter. + + System.Int32 + + System.Int32 + + + None + DefaultProfile @@ -16325,6 +16389,18 @@ PS C:\>$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myr None + + CreationTimeLastNDay + + Filter the objects which has creation time in last N days. The valid value is between 1 to 36500. Inventory schema 'Creation-Time' is mandatory with this filter. + + System.Int32 + + System.Int32 + + + None + DefaultProfile @@ -16486,16 +16562,16 @@ PS C:\>$policy = Set-AzStorageAccountManagementPolicy -ResourceGroupName "myr Example 1: Create blob inventory policy rule objects, then sets blob inventory policy with the rule objects. - PS C:\> $rule1 = New-AzStorageBlobInventoryPolicyRule -Name Test1 -Destination $containerName -Disabled -Format Csv -Schedule Daily -ContainerSchemaField Name,Metadata,PublicAccess,Last-mOdified,LeaseStatus,LeaseState,LeaseDuration,HasImmutabilityPolicy,HasLegalHold -PrefixMatch con1,con2 + $rule1 = New-AzStorageBlobInventoryPolicyRule -Name Test1 -Destination $containerName -Disabled -Format Csv -Schedule Daily -ContainerSchemaField Name,Metadata,PublicAccess,Last-mOdified,LeaseStatus,LeaseState,LeaseDuration,HasImmutabilityPolicy,HasLegalHold -PrefixMatch con1,con2 -PS C:\> $rule2 = New-AzStorageBlobInventoryPolicyRule -Name Test2 -Destination $containerName -Format Parquet -Schedule Weekly -IncludeBlobVersion -IncludeSnapshot -BlobType blockBlob,appendBlob -PrefixMatch aaa,bbb ` - -BlobSchemaField name,Creation-Time,Last-Modified,Content-Length,Content-MD5,BlobType,AccessTier,AccessTierChangeTime,Expiry-Time,hdi_isfolder,Owner,Group,Permissions,Acl,Metadata -PS C:\> $rule3 = New-AzStorageBlobInventoryPolicyRule -Name Test3 -Destination $containerName -Format Parquet -Schedule Weekly -IncludeBlobVersion -IncludeSnapshot -IncludeDeleted -BlobType blockBlob,appendBlob -PrefixMatch aaa,bbb ` - -ExcludePrefix ccc,ddd -BlobSchemaField name,Last-Modified,BlobType,AccessTier,AccessTierChangeTime,Content-Type,Content-CRC64,CopyId,x-ms-blob-sequence-number,TagCount +$rule2 = New-AzStorageBlobInventoryPolicyRule -Name Test2 -Destination $containerName -Format Parquet -Schedule Weekly -IncludeSnapshot -BlobType blockBlob,appendBlob -PrefixMatch aaa,bbb ` + -BlobSchemaField name,Creation-Time,Last-Modified,Content-Length,Content-MD5,BlobType,AccessTier,AccessTierChangeTime,Expiry-Time,hdi_isfolder,Owner,Group,Permissions,Acl,Metadata -CreationTimeLastNDay 30 +$rule3 = New-AzStorageBlobInventoryPolicyRule -Name Test3 -Destination $containerName -Format Parquet -Schedule Weekly -IncludeSnapshot -IncludeDeleted -BlobType blockBlob,appendBlob -PrefixMatch aaa,bbb ` + -ExcludePrefix ccc,ddd -BlobSchemaField name,Last-Modified,BlobType,AccessTier,AccessTierChangeTime,Content-Type,Content-CRC64,CopyId,DeletionId,Deleted,DeletedTime,RemainingRetentionDays -PS C:\> $policy = Set-AzStorageBlobInventoryPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Disabled -Rule $rule1,$rule2 +$policy = Set-AzStorageBlobInventoryPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Disabled -Rule $rule1,$rule2 -PS C:\> $policy +$policy StorageAccountName : mystorageaccount ResourceGroupName : myresourcegroup @@ -16506,13 +16582,13 @@ LastModifiedTime : 5/12/2021 8:53:38 AM Enabled : False Rules : {Test1, Test2, Test3} -PS C:\> $policy.Rules +$policy.Rules -Name Enabled Destination ObjectType Format Schedule IncludeSnapshots IncludeBlobVersions IncludeDeleted BlobTypes PrefixMatch ExcludePrefix SchemaFields ----- ------- ----------- ---------- ------ -------- ---------------- ------------------- -------------- --------- ----------- ------------- ------------ -Test1 False containername Container Csv Daily {con1, con2} {Name, Metadata, PublicAccess, Last-Modified...} -Test2 True containername Blob Parquet Weekly True True {blockBlob, appendBlob} {aaa, bbb} {Name, Creation-Time, Last-Modified, Content-Length...} -Test3 True containername Blob Parquet Weekly True True True {blockBlob, appendBlob} {aaa, bbb} {ccc, ddd} {Name, Content-Type, Content-CRC64, Last-Modified...} +Name Enabled Destination ObjectType Format Schedule IncludeSnapshots IncludeBlobVersions IncludeDeleted BlobTypes PrefixMatch ExcludePrefix SchemaFields CreationTime +---- ------- ----------- ---------- ------ -------- ---------------- ------------------- -------------- --------- ----------- ------------- ------------ ------------ +Test1 False containername Container Csv Daily {con1, con2} {Name, Metadata, PublicAccess, Last-Modified...} +Test2 True containername Blob Parquet Weekly True {blockBlob, appendBlob} {aaa, bbb} {Name, Creation-Time, Last-Modified, Content-Length...} LastNDays=30 +Test3 True containername Blob Parquet Weekly True True {blockBlob, appendBlob} {aaa, bbb} {ccc, ddd} {Name, Last-Modified, BlobType, AccessTier...} This first 3 commands create 3 BlobInventoryPolicy rule objects: rule "Test1" for contaienr inventory; rule "Test2" for blob inventory; rule "Test3" for blob inventory with more schema fields, excludePrefix specified, and IncludeDeleted enabled. The following command sets blob inventory policy to a Storage account with the 3 rule objects, then show the updated policy and rules properties. @@ -17425,13 +17501,13 @@ testscope Enabled Microsoft.Keyvault https://keyvalutname.vault.azure.net:443/k Example 1: Create permission scope objects, then create or update local user with the permission scope objects. - PS C:\> $permissionScope1 = New-AzStorageLocalUserPermissionScope -Permission rw -Service blob -ResourceName container1 + $permissionScope1 = New-AzStorageLocalUserPermissionScope -Permission rw -Service blob -ResourceName container1 -PS C:\> $permissionScope2 = New-AzStorageLocalUserPermissionScope -Permission rwd -Service file -ResourceName share2 +$permissionScope2 = New-AzStorageLocalUserPermissionScope -Permission rwd -Service file -ResourceName share2 -PS C:\> $localuser = Set-AzStorageLocalUser -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -UserName testuser1 -HomeDirectory "/" -PermissionScope $permissionScope1,$permissionScope2 +$localuser = Set-AzStorageLocalUser -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -UserName testuser1 -HomeDirectory "/" -PermissionScope $permissionScope1,$permissionScope2 -PS C:\> $localuser +$localuser ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -17439,7 +17515,7 @@ Name Sid HomeDirectory HasSharedKe ---- --- ------------- ------------ --------- -------------- ---------------- ----------------- testuser1 S-1-2-0-0000000000-000000000-0000000000-0000 / [container1,...] -PS C:\> $localuser.PermissionScopes +$localuser.PermissionScopes Permissions Service ResourceName ----------- ------- ------------ @@ -17920,13 +17996,13 @@ SshPassword Example 1: Create SSH public key objects, then create or update local user with the SSH public key objects. - PS C:\> $sshkey1 = New-AzStorageLocalUserSshPublicKey -Key "ssh-rsa keykeykeykeykey=" -Description "sshpulickey name1" + $sshkey1 = New-AzStorageLocalUserSshPublicKey -Key "ssh-rsa keykeykeykeykey=" -Description "sshpulickey name1" -PS C:\> $sshkey2 = New-AzStorageLocalUserSshPublicKey -Key "ssh-rsa keykeykeykeykew=" -Description "sshpulickey name2" +$sshkey2 = New-AzStorageLocalUserSshPublicKey -Key "ssh-rsa keykeykeykeykew=" -Description "sshpulickey name2" -PS C:\> $localuser = Set-AzStorageLocalUser -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -UserName testuser1 -HomeDirectory "/" -SshAuthorizedKey $sshkey1,$sshkey2 +$localuser = Set-AzStorageLocalUser -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -UserName testuser1 -HomeDirectory "/" -SshAuthorizedKey $sshkey1,$sshkey2 -PS C:\> $localuser +$localuser ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -17934,7 +18010,7 @@ Name Sid HomeDirectory HasSharedKe ---- --- ------------- ------------ --------- -------------- ---------------- ----------------- testuser1 S-1-2-0-0000000000-000000000-0000000000-0000 / [ssh-rsa keykeykeykeykey=,...] -PS C:\> $localuser.SshAuthorizedKeys +$localuser.SshAuthorizedKeys Description Key ----------- --- @@ -19622,7 +19698,7 @@ Remove-AzRmStorageContainerLegalHold -StorageAccount $accountObject -ContainerNa Force - Force to remove the Share and all content in it + Force to remove the Share(snapshot) and all content in it System.Management.Automation.SwitchParameter @@ -19710,7 +19786,7 @@ Remove-AzRmStorageContainerLegalHold -StorageAccount $accountObject -ContainerNa Force - Force to remove the Share and all content in it + Force to remove the Share(snapshot) and all content in it System.Management.Automation.SwitchParameter @@ -19822,7 +19898,7 @@ Remove-AzRmStorageContainerLegalHold -StorageAccount $accountObject -ContainerNa Force - Force to remove the Share and all content in it + Force to remove the Share(snapshot) and all content in it System.Management.Automation.SwitchParameter @@ -19898,7 +19974,7 @@ Remove-AzRmStorageContainerLegalHold -StorageAccount $accountObject -ContainerNa Force - Force to remove the Share and all content in it + Force to remove the Share(snapshot) and all content in it System.Management.Automation.SwitchParameter @@ -20010,7 +20086,7 @@ Remove-AzRmStorageContainerLegalHold -StorageAccount $accountObject -ContainerNa Force - Force to remove the Share and all content in it + Force to remove the Share(snapshot) and all content in it System.Management.Automation.SwitchParameter @@ -20093,7 +20169,7 @@ Remove-AzRmStorageContainerLegalHold -StorageAccount $accountObject -ContainerNa Force - Force to remove the Share and all content in it + Force to remove the Share(snapshot) and all content in it System.Management.Automation.SwitchParameter @@ -20188,7 +20264,7 @@ Remove-AzRmStorageContainerLegalHold -StorageAccount $accountObject -ContainerNa Force - Force to remove the Share and all content in it + Force to remove the Share(snapshot) and all content in it System.Management.Automation.SwitchParameter @@ -23468,9 +23544,9 @@ Remove-AzRmStorageShare -StorageAccount $accountObject -Name "myshare" ------------ Example 1: Remove and restore a share ------------ - PS C:\> Remove-AzRmStorageShare -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Name $shareName -Force + Remove-AzRmStorageShare -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Name $shareName -Force -PS C:\> Get-AzRmStorageShare -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -IncludeDeleted +Get-AzRmStorageShare -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -IncludeDeleted ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -23479,7 +23555,7 @@ Name QuotaGiB EnabledProtocol AccessTier Deleted Version test 100 TransactionOptimized share1 100 TransactionOptimized True 01D61FD1FC5498B6 -PS C:\> Restore-AzRmStorageShare -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Name $shareName -DeletedShareVersion 01D61FD1FC5498B6 +Restore-AzRmStorageShare -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Name $shareName -DeletedShareVersion 01D61FD1FC5498B6 ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -23981,15 +24057,15 @@ share1 100 Example 1: Start restores blobs in a Storage account with specific blob ranges - PS C:\> $range1 = New-AzStorageBlobRangeToRestore -StartRange container1/blob1 -EndRange container2/blob2 -PS C:\> $range2 = New-AzStorageBlobRangeToRestore -StartRange container3/blob3 -EndRange container4/blob4 -PS C:\> Restore-AzStorageBlobRange -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" -TimeToRestore (Get-Date).AddDays(-1) -BlobRestoreRange $range1,$range2 + $range1 = New-AzStorageBlobRangeToRestore -StartRange container1/blob1 -EndRange container2/blob2 +$range2 = New-AzStorageBlobRangeToRestore -StartRange container3/blob3 -EndRange container4/blob4 +Restore-AzStorageBlobRange -ResourceGroupName "myresourcegoup" -StorageAccountName "mystorageaccount" -TimeToRestore (Get-Date).AddDays(-1) -BlobRestoreRange $range1,$range2 Status RestoreId FailureReason Parameters.TimeToRestore Parameters.BlobRanges ------ --------- ------------- ------------------------ --------------------- InProgress 6ca55a8b-fca0-461a-8e4c-13927a9707e6 2020-02-10T13:58:44.6841810Z ["container1/blob1" -> "container2/blob2",...] -PS C:\> (Get-AzStorageAccount -ResourceGroupName $rgname -StorageAccountName $accountName -IncludeBlobRestoreStatus).BlobRestoreStatus +(Get-AzStorageAccount -ResourceGroupName $rgname -StorageAccountName $accountName -IncludeBlobRestoreStatus).BlobRestoreStatus Status RestoreId FailureReason Parameters.TimeToRestore Parameters.BlobRanges ------ --------- ------------- ------------------------ --------------------- @@ -25792,7 +25868,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowBlobPublicAccess - Allow or disallow public access to all blobs or containers in the storage account. + Allow or disallow anonymous access to all blobs or containers in the storage account. System.Boolean @@ -25804,7 +25880,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowCrossTenantReplication - Gets or sets allow or disallow cross AAD tenant object replication. The default interpretation is true for this property. + Gets or sets allow or disallow cross Microsoft Entra tenant object replication. The default interpretation is true for this property. System.Boolean @@ -25816,7 +25892,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowedCopyScope - Set restrict copy to and from Storage Accounts within an AAD tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' + Set restrict copy to and from Storage Accounts within a Microsoft Entra tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' System.String @@ -25828,7 +25904,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowSharedKeyAccess - Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Azure Active Directory (Azure AD). The default value is null, which is equivalent to true. + Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Microsoft Entra ID. The default value is null, which is equivalent to true. System.Boolean @@ -26309,7 +26385,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowBlobPublicAccess - Allow or disallow public access to all blobs or containers in the storage account. + Allow or disallow anonymous access to all blobs or containers in the storage account. System.Boolean @@ -26321,7 +26397,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowCrossTenantReplication - Gets or sets allow or disallow cross AAD tenant object replication. The default interpretation is true for this property. + Gets or sets allow or disallow cross Microsoft Entra tenant object replication. The default interpretation is true for this property. System.Boolean @@ -26333,7 +26409,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowedCopyScope - Set restrict copy to and from Storage Accounts within an AAD tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' + Set restrict copy to and from Storage Accounts within a Microsoft Entra tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' System.String @@ -26345,7 +26421,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowSharedKeyAccess - Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Azure Active Directory (Azure AD). The default value is null, which is equivalent to true. + Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Microsoft Entra ID. The default value is null, which is equivalent to true. System.Boolean @@ -26802,7 +26878,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowBlobPublicAccess - Allow or disallow public access to all blobs or containers in the storage account. + Allow or disallow anonymous access to all blobs or containers in the storage account. System.Boolean @@ -26814,7 +26890,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowCrossTenantReplication - Gets or sets allow or disallow cross AAD tenant object replication. The default interpretation is true for this property. + Gets or sets allow or disallow cross Microsoft Entra tenant object replication. The default interpretation is true for this property. System.Boolean @@ -26826,7 +26902,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowedCopyScope - Set restrict copy to and from Storage Accounts within an AAD tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' + Set restrict copy to and from Storage Accounts within a Microsoft Entra tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' System.String @@ -26838,7 +26914,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowSharedKeyAccess - Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Azure Active Directory (Azure AD). The default value is null, which is equivalent to true. + Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Microsoft Entra ID. The default value is null, which is equivalent to true. System.Boolean @@ -27306,7 +27382,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowBlobPublicAccess - Allow or disallow public access to all blobs or containers in the storage account. + Allow or disallow anonymous access to all blobs or containers in the storage account. System.Boolean @@ -27318,7 +27394,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowCrossTenantReplication - Gets or sets allow or disallow cross AAD tenant object replication. The default interpretation is true for this property. + Gets or sets allow or disallow cross Microsoft Entra tenant object replication. The default interpretation is true for this property. System.Boolean @@ -27330,7 +27406,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowedCopyScope - Set restrict copy to and from Storage Accounts within an AAD tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' + Set restrict copy to and from Storage Accounts within a Microsoft Entra tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' System.String @@ -27342,7 +27418,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowSharedKeyAccess - Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Azure Active Directory (Azure AD). The default value is null, which is equivalent to true. + Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Microsoft Entra ID. The default value is null, which is equivalent to true. System.Boolean @@ -27914,7 +27990,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowBlobPublicAccess - Allow or disallow public access to all blobs or containers in the storage account. + Allow or disallow anonymous access to all blobs or containers in the storage account. System.Boolean @@ -27926,7 +28002,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowCrossTenantReplication - Gets or sets allow or disallow cross AAD tenant object replication. The default interpretation is true for this property. + Gets or sets allow or disallow cross Microsoft Entra tenant object replication. The default interpretation is true for this property. System.Boolean @@ -27938,7 +28014,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowedCopyScope - Set restrict copy to and from Storage Accounts within an AAD tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' + Set restrict copy to and from Storage Accounts within a Microsoft Entra tenant or with Private Links to the same VNet. Possible values include: 'PrivateLink', 'AAD' System.String @@ -27950,7 +28026,7 @@ $policy = Set-AzRmStorageContainerImmutabilityPolicy -Container $containerObject AllowSharedKeyAccess - Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Azure Active Directory (Azure AD). The default value is null, which is equivalent to true. + Indicates whether the storage account permits requests to be authorized with the account access key via Shared Key. If false, then all requests, including shared access signatures, must be authorized with Microsoft Entra ID. The default value is null, which is equivalent to true. System.Boolean @@ -28580,7 +28656,7 @@ Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccoun - Example 10: Update a Storage account by enable Azure Files AAD DS Authentication and set DefaultSharePermission. + Example 10: Update a Storage account by enable Azure Files Microsoft Entra Domain Services Authentication and set DefaultSharePermission. $account = Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -EnableAzureActiveDirectoryDomainServicesForFile $true -DefaultSharePermission StorageFileDataSmbShareContributor $account.AzureFilesIdentityBasedAuth @@ -28589,14 +28665,14 @@ DirectoryServiceOptions ActiveDirectoryProperties ----------------------- ------------------------- ---------------------- AADDS Microsoft.Azure.Commands.Management.Storage.Models.PSActiveDirectoryProperties StorageFileDataSmbShareContributor - The command update a Storage account by enable Azure Files AAD DS Authentication. + The command update a Storage account by enable Azure Files Microsoft Entra Domain Services Authentication. Example 11: Update a Storage account by enable Files Active Directory Domain Service Authentication, and then show the File Identity Based authentication setting - PS C:\> $account = Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -EnableActiveDirectoryDomainServicesForFile $true ` + $account = Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -EnableActiveDirectoryDomainServicesForFile $true ` -ActiveDirectoryDomainName "mydomain.com" ` -ActiveDirectoryNetBiosDomainName "mydomain.com" ` -ActiveDirectoryForestName "mydomain.com" ` @@ -28606,10 +28682,10 @@ AADDS Microsoft.Azure.Commands.Management.Storage.Models.PSAct -ActiveDirectorySamAccountName "samaccountname" ` -ActiveDirectoryAccountType Computer -PS C:\> $account.AzureFilesIdentityBasedAuth.DirectoryServiceOptions +$account.AzureFilesIdentityBasedAuth.DirectoryServiceOptions AD -PS C:\> $account.AzureFilesIdentityBasedAuth.ActiveDirectoryProperties +$account.AzureFilesIdentityBasedAuth.ActiveDirectoryProperties DomainName : mydomain.com NetBiosDomainName : mydomain.com @@ -28627,15 +28703,15 @@ AccountType : Computer Example 12: Set MinimumTlsVersion, AllowBlobPublicAccess and AllowSharedKeyAccess - PS C:\> $account = Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -MinimumTlsVersion TLS1_1 -AllowBlobPublicAccess $false -AllowSharedKeyAccess $true + $account = Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -MinimumTlsVersion TLS1_1 -AllowBlobPublicAccess $false -AllowSharedKeyAccess $true -PS C:\> $account.MinimumTlsVersion +$account.MinimumTlsVersion TLS1_1 -PS C:\> $account.AllowBlobPublicAccess +$account.AllowBlobPublicAccess False -PS C:\> $a.AllowSharedKeyAccess +$a.AllowSharedKeyAccess True The command sets MinimumTlsVersion, AllowBlobPublicAccess and AllowSharedKeyAccess, and then show the the 3 properties of the account @@ -28645,15 +28721,15 @@ True Example 13: Update a Storage account with RoutingPreference setting - PS C:\>$account = Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -PublishMicrosoftEndpoint $false -PublishInternetEndpoint $true -RoutingChoice InternetRouting + $account = Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -PublishMicrosoftEndpoint $false -PublishInternetEndpoint $true -RoutingChoice InternetRouting -PS C:\>$account.RoutingPreference +$account.RoutingPreference RoutingChoice PublishMicrosoftEndpoints PublishInternetEndpoints ------------- ------------------------- ------------------------ InternetRouting False True -PS C:\>$account.PrimaryEndpoints +$account.PrimaryEndpoints Blob : https://mystorageaccount.blob.core.windows.net/ Queue : https://mystorageaccount.queue.core.windows.net/ @@ -28672,12 +28748,12 @@ InternetEndpoints : {"Blob":"https://mystorageaccount-internetrouting.blob.core Example 14: Update a Storage account with KeyExpirationPeriod and SasExpirationPeriod - PS C:\> $account = Set-AzStorageAccount -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -KeyExpirationPeriodInDay 5 -SasExpirationPeriod "1.12:05:06" -EnableHttpsTrafficOnly $true + $account = Set-AzStorageAccount -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -KeyExpirationPeriodInDay 5 -SasExpirationPeriod "1.12:05:06" -EnableHttpsTrafficOnly $true -PS C:\> $account.KeyPolicy.KeyExpirationPeriodInDays +$account.KeyPolicy.KeyExpirationPeriodInDays 5 -PS C:\> $account.SasPolicy.SasExpirationPeriod +$account.SasPolicy.SasExpirationPeriod 1.12:05:06 This command updates a Storage account with KeyExpirationPeriod and SasExpirationPeriod, then show the updated account related properties. @@ -28688,23 +28764,23 @@ PS C:\> $account.SasPolicy.SasExpirationPeriod Example 15: Update a Storage account to Keyvault encryption, and access Keyvault with user assigned identity # Create KeyVault (no need if using exist keyvault) -PS C:\> $keyVault = New-AzKeyVault -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -Location eastus2euap -EnablePurgeProtection -PS C:\> $key = Add-AzKeyVaultKey -VaultName $keyvaultName -Name $keyname -Destination 'Software' +$keyVault = New-AzKeyVault -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -Location eastus2euap -EnablePurgeProtection +$key = Add-AzKeyVaultKey -VaultName $keyvaultName -Name $keyname -Destination 'Software' # create user assigned identity and grant access to keyvault (no need if using exist user assigned identity) -PS C:\> $userId = New-AzUserAssignedIdentity -ResourceGroupName $resourceGroupName -Name $userIdName -PS C:\> Set-AzKeyVaultAccessPolicy -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -ObjectId $userId.PrincipalId -PermissionsToKeys get,wrapkey,unwrapkey -BypassObjectIdValidation -PS C:\> $useridentityId= $userId.Id +$userId = New-AzUserAssignedIdentity -ResourceGroupName $resourceGroupName -Name $userIdName +Set-AzKeyVaultAccessPolicy -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -ObjectId $userId.PrincipalId -PermissionsToKeys get,wrapkey,unwrapkey -BypassObjectIdValidation +$useridentityId= $userId.Id # Update Storage account with Keyvault encryption and access Keyvault with user assigned identity, then show properties -PS C:\> $account = Set-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName ` +$account = Set-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName ` -IdentityType UserAssigned -UserAssignedIdentityId $useridentityId ` -KeyVaultUri $keyVault.VaultUri -KeyName $keyname -KeyVaultUserAssignedIdentityId $useridentityId -PS C:\> $account.Encryption.EncryptionIdentity.EncryptionUserAssignedIdentity +$account.Encryption.EncryptionIdentity.EncryptionUserAssignedIdentity /subscriptions/{subscription-id}/resourceGroups/myresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myuserid -PS C:\> $account.Encryption.KeyVaultProperties +$account.Encryption.KeyVaultProperties KeyName : wrappingKey KeyVersion : @@ -28720,19 +28796,19 @@ LastKeyRotationTimestamp : 4/12/2021 8:17:57 AM Example 16: Update a Keyvault encrypted Storage account, from access Keyvault with user assigned identity, to access Keyvault with system assigned identity # Assign System identity to the account, and give the system assigned identity acces to the keyvault -PS C:\> $account = Set-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName -IdentityType SystemAssignedUserAssigned -PS C:\> Set-AzKeyVaultAccessPolicy -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -ObjectId $account.Identity.PrincipalId -PermissionsToKeys get,wrapkey,unwrapkey -BypassObjectIdValidation +$account = Set-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName -IdentityType SystemAssignedUserAssigned +Set-AzKeyVaultAccessPolicy -VaultName $keyvaultName -ResourceGroupName $resourceGroupName -ObjectId $account.Identity.PrincipalId -PermissionsToKeys get,wrapkey,unwrapkey -BypassObjectIdValidation # Update account from access Keyvault with user assigned identity to access Keyvault with system assigned identity $account = Set-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName -IdentityType SystemAssignedUserAssigned -KeyName $keyname -KeyVaultUri $keyvaultUri -KeyVaultUserAssignedIdentityId "" # EncryptionUserAssignedIdentity is empty, so the account access keyvault with system assigned identity -PS C:\> $account.Encryption.EncryptionIdentity +$account.Encryption.EncryptionIdentity EncryptionUserAssignedIdentity ------------------------------ -PS C:\> $account.Encryption.KeyVaultProperties +$account.Encryption.KeyVaultProperties KeyName : wrappingKey KeyVersion : @@ -28786,12 +28862,12 @@ Enabled ----- Example 19: Update account level immutability policy ----- - PS C:\> $account = Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -ImmutabilityPeriod 2 -ImmutabilityPolicyState Unlocked + $account = Set-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -ImmutabilityPeriod 2 -ImmutabilityPolicyState Unlocked -PS C:\> $account.ImmutableStorageWithVersioning.Enabled +$account.ImmutableStorageWithVersioning.Enabled True -PS C:\> $account.ImmutableStorageWithVersioning.ImmutabilityPolicy +$account.ImmutableStorageWithVersioning.ImmutabilityPolicy ImmutabilityPeriodSinceCreationInDays State ------------------------------------- ----- @@ -28804,12 +28880,12 @@ ImmutabilityPeriodSinceCreationInDays State Example 20: Update a Storage account by enable Sftp and localuser - PS C:\> $account = Set-AzStorageAccount -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -EnableSftp $true -EnableLocalUser $true + $account = Set-AzStorageAccount -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -EnableSftp $true -EnableLocalUser $true -PS C:\> $account.EnableSftp +$account.EnableSftp True -PS C:\> $account.EnableLocalUser +$account.EnableLocalUser True This command updates a Storage account by enable Sftp and localuser. To run the command succssfully, the Storage account should already enable Hierarchical Namespace. @@ -28820,16 +28896,16 @@ True Example 21: Update a Storage account with Keyvault from another tenant (access Keyvault with FederatedClientId) # create Storage account with Keyvault encryption (access Keyvault with FederatedClientId), then show properties -PS C:\> $account = Set-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName ` +$account = Set-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName ` -KeyVaultUri $keyVault.VaultUri -KeyName $keyname -KeyVaultUserAssignedIdentityId $useridentityId -KeyVaultFederatedClientId $federatedClientId -PS C:\> $account.Encryption.EncryptionIdentity +$account.Encryption.EncryptionIdentity EncryptionUserAssignedIdentity EncryptionFederatedIdentityClientId ------------------------------ ----------------------------------- /subscriptions/{subscription-id}/resourceGroups/myresourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myuserid ********-****-****-****-************ -PS C:\> $account.Encryption.KeyVaultProperties +$account.Encryption.KeyVaultProperties KeyName : wrappingKey KeyVersion : @@ -29099,6 +29175,142 @@ Rules : [ ### Microsoft.Azure.Commands.Management.Storage.Models.PSManagementPolicy ## NOTES ## RELATED LINKS + + ## PARAMETERS + ### -DefaultProfile The credentials, account, tenant, and subscription used for communication with Azure. + ```yaml Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) Aliases: AzContext, AzureRmContext, AzureCredential + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -Policy Management Policy Object to Set + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSManagementPolicy Parameter Sets: AccountNamePolicyObject, AccountObjectPolicyObject, AccountResourceIdPolicyObject Aliases: ManagementPolicy + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -ResourceGroupName Resource Group Name. + ```yaml Type: System.String Parameter Sets: AccountNamePolicyRule, AccountNamePolicyObject Aliases: + Required: True Position: 0 Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -Rule The Management Policy rules. Get the object with New-AzStorageAccountManagementPolicyRule cmdlet. + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSManagementPolicyRule[] Parameter Sets: AccountNamePolicyRule, AccountObjectPolicyRule, AccountResourceIdPolicyRule Aliases: + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -StorageAccount Storage account object + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount Parameter Sets: AccountObjectPolicyRule, AccountObjectPolicyObject Aliases: + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -StorageAccountName Storage Account Name. + ```yaml Type: System.String Parameter Sets: AccountNamePolicyRule, AccountNamePolicyObject Aliases: AccountName + Required: True Position: 1 Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -StorageAccountResourceId Storage Account Resource Id. + ```yaml Type: System.String Parameter Sets: AccountResourceIdPolicyRule, AccountResourceIdPolicyObject Aliases: + Required: True Position: 0 Default value: None Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` + ### -Confirm Prompts you for confirmation before running the cmdlet. + ```yaml Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -WhatIf Shows what would happen if the cmdlet runs. The cmdlet is not run. + ```yaml Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + ## INPUTS + ## OUTPUTS + ## NOTES + ## RELATED LINKS + + ## PARAMETERS + ### -DefaultProfile The credentials, account, tenant, and subscription used for communication with Azure. + ```yaml Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) Aliases: AzContext, AzureRmContext, AzureCredential + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -Policy Management Policy Object to Set + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSManagementPolicy Parameter Sets: AccountNamePolicyObject, AccountObjectPolicyObject, AccountResourceIdPolicyObject Aliases: ManagementPolicy + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -ResourceGroupName Resource Group Name. + ```yaml Type: System.String Parameter Sets: AccountNamePolicyRule, AccountNamePolicyObject Aliases: + Required: True Position: 0 Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -Rule The Management Policy rules. Get the object with New-AzStorageAccountManagementPolicyRule cmdlet. + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSManagementPolicyRule[] Parameter Sets: AccountNamePolicyRule, AccountObjectPolicyRule, AccountResourceIdPolicyRule Aliases: + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -StorageAccount Storage account object + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount Parameter Sets: AccountObjectPolicyRule, AccountObjectPolicyObject Aliases: + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -StorageAccountName Storage Account Name. + ```yaml Type: System.String Parameter Sets: AccountNamePolicyRule, AccountNamePolicyObject Aliases: AccountName + Required: True Position: 1 Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -StorageAccountResourceId Storage Account Resource Id. + ```yaml Type: System.String Parameter Sets: AccountResourceIdPolicyRule, AccountResourceIdPolicyObject Aliases: + Required: True Position: 0 Default value: None Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` + ### -Confirm Prompts you for confirmation before running the cmdlet. + ```yaml Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -WhatIf Shows what would happen if the cmdlet runs. The cmdlet is not run. + ```yaml Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + ## INPUTS + ## OUTPUTS + ## NOTES + ## RELATED LINKS + + ## PARAMETERS + ### -DefaultProfile The credentials, account, tenant, and subscription used for communication with Azure. + ```yaml Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) Aliases: AzContext, AzureRmContext, AzureCredential + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -Policy Management Policy Object to Set + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSManagementPolicy Parameter Sets: AccountNamePolicyObject, AccountObjectPolicyObject, AccountResourceIdPolicyObject Aliases: ManagementPolicy + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -ResourceGroupName Resource Group Name. + ```yaml Type: System.String Parameter Sets: AccountNamePolicyRule, AccountNamePolicyObject Aliases: + Required: True Position: 0 Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -Rule The Management Policy rules. Get the object with New-AzStorageAccountManagementPolicyRule cmdlet. + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSManagementPolicyRule[] Parameter Sets: AccountNamePolicyRule, AccountObjectPolicyRule, AccountResourceIdPolicyRule Aliases: + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -StorageAccount Storage account object + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount Parameter Sets: AccountObjectPolicyRule, AccountObjectPolicyObject Aliases: + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -StorageAccountName Storage Account Name. + ```yaml Type: System.String Parameter Sets: AccountNamePolicyRule, AccountNamePolicyObject Aliases: AccountName + Required: True Position: 1 Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -StorageAccountResourceId Storage Account Resource Id. + ```yaml Type: System.String Parameter Sets: AccountResourceIdPolicyRule, AccountResourceIdPolicyObject Aliases: + Required: True Position: 0 Default value: None Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` + ### -Confirm Prompts you for confirmation before running the cmdlet. + ```yaml Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -WhatIf Shows what would happen if the cmdlet runs. The cmdlet is not run. + ```yaml Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + ## INPUTS + ## OUTPUTS + ## NOTES + ## RELATED LINKS + + ## PARAMETERS + ### -DefaultProfile The credentials, account, tenant, and subscription used for communication with Azure. + ```yaml Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) Aliases: AzContext, AzureRmContext, AzureCredential + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -Policy Management Policy Object to Set + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSManagementPolicy Parameter Sets: AccountNamePolicyObject, AccountObjectPolicyObject, AccountResourceIdPolicyObject Aliases: ManagementPolicy + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -ResourceGroupName Resource Group Name. + ```yaml Type: System.String Parameter Sets: AccountNamePolicyRule, AccountNamePolicyObject Aliases: + Required: True Position: 0 Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -Rule The Management Policy rules. Get the object with New-AzStorageAccountManagementPolicyRule cmdlet. + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSManagementPolicyRule[] Parameter Sets: AccountNamePolicyRule, AccountObjectPolicyRule, AccountResourceIdPolicyRule Aliases: + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -StorageAccount Storage account object + ```yaml Type: Microsoft.Azure.Commands.Management.Storage.Models.PSStorageAccount Parameter Sets: AccountObjectPolicyRule, AccountObjectPolicyObject Aliases: + Required: True Position: Named Default value: None Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` + ### -StorageAccountName Storage Account Name. + ```yaml Type: System.String Parameter Sets: AccountNamePolicyRule, AccountNamePolicyObject Aliases: AccountName + Required: True Position: 1 Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -StorageAccountResourceId Storage Account Resource Id. + ```yaml Type: System.String Parameter Sets: AccountResourceIdPolicyRule, AccountResourceIdPolicyObject Aliases: + Required: True Position: 0 Default value: None Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` + ### -Confirm Prompts you for confirmation before running the cmdlet. + ```yaml Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### -WhatIf Shows what would happen if the cmdlet runs. The cmdlet is not run. + ```yaml Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi + Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + ## INPUTS + ## OUTPUTS + ## NOTES + ## RELATED LINKS @@ -29722,17 +29934,17 @@ Rules : [ Example 1: Create or update the blob inventory policy with BlobInventoryPolicy rule objects. - PS C:\> $rule1 = New-AzStorageBlobInventoryPolicyRule -Name Test1 -Destination $containerName -Disabled -Format Csv -Schedule Daily -ContainerSchemaField Name,Metadata,PublicAccess,Last-mOdified,LeaseStatus,LeaseState,LeaseDuration,HasImmutabilityPolicy,HasLegalHold -PrefixMatch con1,con2 + $rule1 = New-AzStorageBlobInventoryPolicyRule -Name Test1 -Destination $containerName -Disabled -Format Csv -Schedule Daily -ContainerSchemaField Name,Metadata,PublicAccess,Last-mOdified,LeaseStatus,LeaseState,LeaseDuration,HasImmutabilityPolicy,HasLegalHold -PrefixMatch con1,con2 -PS C:\> $rule2 = New-AzStorageBlobInventoryPolicyRule -Name Test2 -Destination $containerName -Format Parquet -Schedule Weekly -IncludeBlobVersion -IncludeSnapshot -BlobType blockBlob,appendBlob -PrefixMatch aaa,bbb ` +$rule2 = New-AzStorageBlobInventoryPolicyRule -Name Test2 -Destination $containerName -Format Parquet -Schedule Weekly -IncludeBlobVersion -IncludeSnapshot -BlobType blockBlob,appendBlob -PrefixMatch aaa,bbb ` -BlobSchemaField name,Creation-Time,Last-Modified,Content-Length,Content-MD5,BlobType,AccessTier,AccessTierChangeTime,Expiry-Time,hdi_isfolder,Owner,Group,Permissions,Acl,Metadata -PS C:\> $rule3 = New-AzStorageBlobInventoryPolicyRule -Name Test3 -Destination $containerName -Format Parquet -Schedule Weekly -IncludeBlobVersion -IncludeSnapshot -IncludeDeleted -BlobType blockBlob,appendBlob -PrefixMatch aaa,bbb ` +$rule3 = New-AzStorageBlobInventoryPolicyRule -Name Test3 -Destination $containerName -Format Parquet -Schedule Weekly -IncludeBlobVersion -IncludeSnapshot -IncludeDeleted -BlobType blockBlob,appendBlob -PrefixMatch aaa,bbb ` -ExcludePrefix ccc,ddd -BlobSchemaField name,Last-Modified,BlobType,AccessTier,AccessTierChangeTime,Content-Type,Content-CRC64,CopyId,x-ms-blob-sequence-number,TagCount -PS C:\> $policy = Set-AzStorageBlobInventoryPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Disabled -Rule $rule1,$rule2,$rule3 +$policy = Set-AzStorageBlobInventoryPolicy -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -Disabled -Rule $rule1,$rule2,$rule3 -PS C:\> $policy +$policy StorageAccountName : mystorageaccount ResourceGroupName : myresourcegroup @@ -29743,7 +29955,7 @@ LastModifiedTime : 5/12/2021 8:53:38 AM Enabled : False Rules : {Test1, Test2, Test3} -PS C:\> $policy.Rules +$policy.Rules Name Enabled Destination ObjectType Format Schedule IncludeSnapshots IncludeBlobVersions IncludeDeleted BlobTypes PrefixMatch ExcludePrefix SchemaFields ---- ------- ----------- ---------- ------ -------- ---------------- ------------------- -------------- --------- ----------- ------------- ------------ @@ -29758,7 +29970,7 @@ Test3 True containername Blob Parquet Weekly True True Example 2: Create or update the blob inventory policy of a Storage account with a Json format policy. - PS C:\> $policy = Set-AzStorageBlobInventoryPolicy -ResourceGroupName $resourceGroupName -StorageAccountName $accountName -Policy (@{ + $policy = Set-AzStorageBlobInventoryPolicy -ResourceGroupName $resourceGroupName -StorageAccountName $accountName -Policy (@{ Enabled=$true; Rules=(@{ Enabled=$true; @@ -29811,7 +30023,7 @@ Test3 True containername Blob Parquet Weekly True True }) -PS C:\> $policy +$policy StorageAccountName : weiadlscanary1 ResourceGroupName : weitry @@ -29822,7 +30034,7 @@ LastModifiedTime : 5/12/2021 9:02:21 AM Enabled : True Rules : {Test1, Test2, Test3} -PS C:\> $policy.Rules +$policy.Rules Name Enabled Destination ObjectType Format Schedule IncludeSnapshots IncludeBlobVersions IncludeDeleted BlobTypes PrefixMatch ExcludePrefix SchemaFields ---- ------- ----------- ---------- ------ -------- ---------------- ------------------- -------------- --------- ----------- ------------- ------------ @@ -30339,13 +30551,13 @@ Test3 False containername Blob Csv Weekly ----------- Example 1: Create or update a local user ----------- - PS C:\> $sshkey1 = New-AzStorageLocalUserSshPublicKey -Key "ssh-rsa base64encodedkey=" -Description "sshpublickey name1" + $sshkey1 = New-AzStorageLocalUserSshPublicKey -Key "ssh-rsa base64encodedkey=" -Description "sshpublickey name1" -PS C:\> $permissionScope1 = New-AzStorageLocalUserPermissionScope -Permission rw -Service blob -ResourceName container1 +$permissionScope1 = New-AzStorageLocalUserPermissionScope -Permission rw -Service blob -ResourceName container1 -PS C:\> $localuser = Set-AzStorageLocalUser -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -UserName testuser1 -HomeDirectory "/" -SshAuthorizedKey $sshkey1 -PermissionScope $permissionScope1 -HasSharedKey $true -HasSshKey $true -HasSshPassword $true +$localuser = Set-AzStorageLocalUser -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -UserName testuser1 -HomeDirectory "/" -SshAuthorizedKey $sshkey1 -PermissionScope $permissionScope1 -HasSharedKey $true -HasSshKey $true -HasSshPassword $true -PS C:\> $localuser +$localuser ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -30353,13 +30565,13 @@ Name Sid HomeDirectory HasSharedKe ---- --- ------------- ------------ --------- -------------- ---------------- testuser1 S-1-2-0-0000000000-000000000-0000000000-0000 / True True True [container1] -PS C:\> $localuser.SshAuthorizedKeys +$localuser.SshAuthorizedKeys Description Key ----------- --- sshpublickey name1 ssh-rsa base64encodedkey= -PS C:\> $localuser.PermissionScopes +$localuser.PermissionScopes Permissions Service ResourceName ----------- ------- ------------ @@ -30874,21 +31086,21 @@ testuser1 S-1-2-0-0000000000-000000000-0000000000-0000 / True Example 1: Set object replication policy to both destination and source account. - PS C:\> $rule1 = New-AzStorageObjectReplicationPolicyRule -SourceContainer src1 -DestinationContainer dest1 + $rule1 = New-AzStorageObjectReplicationPolicyRule -SourceContainer src1 -DestinationContainer dest1 -PS C:\> $rule2 = New-AzStorageObjectReplicationPolicyRule -SourceContainer src -DestinationContainer dest -MinCreationTime 2019-01-01T16:00:00Z -PrefixMatch a,abc,dd +$rule2 = New-AzStorageObjectReplicationPolicyRule -SourceContainer src -DestinationContainer dest -MinCreationTime 2019-01-01T16:00:00Z -PrefixMatch a,abc,dd -PS C:\> $srcAccount = Get-AzStorageAccount -ResourceGroupName "myresourcegroup" -AccountName "mysourceaccount" +$srcAccount = Get-AzStorageAccount -ResourceGroupName "myresourcegroup" -AccountName "mysourceaccount" -PS C:\> Set-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mydestaccount" -PolicyId default -SourceAccount $srcAccount.Id -Rule $rule1,$rule2 +Set-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mydestaccount" -PolicyId default -SourceAccount $srcAccount.Id -Rule $rule1,$rule2 ResourceGroupName StorageAccountName PolicyId EnabledTime SourceAccount DestinationAccount Rules ----------------- ------------------ -------- ----------- ------------- ------------------ ----- myresourcegroup mydestaccount 56bfa11c-81ef-4f8d-b307-5e5386e16fba mysourceaccount mydestaccount [5fa8b1d6-4985-4abd-a0b3-ec4d07295a43,...] -PS C:\> $destPolicy = Get-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mydestaccount" +$destPolicy = Get-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mydestaccount" -PS C:\> Set-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mysourceaccount" -InputObject $destPolicy +Set-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mysourceaccount" -InputObject $destPolicy ResourceGroupName StorageAccountName PolicyId EnabledTime SourceAccount DestinationAccount Rules ----------------- ------------------ -------- ----------- ------------- ------------------ ----- @@ -31793,12 +32005,12 @@ Update-AzRmStorageContainer -StorageAccount $accountObject -ContainerName "myCon - Example 4: Update an Azure storage container with RootSquash - - PS C:\> $container = Update-AzRmStorageContainer -ResourceGroupName "myersourcegroup" -AccountName "mystorageaccount" -Name "mycontainer" -RootSquash NoRootSquash + $container = Update-AzRmStorageContainer -ResourceGroupName "myersourcegroup" -AccountName "mystorageaccount" -Name "mycontainer" -RootSquash NoRootSquash -PS C:\> $container.EnableNfsV3AllSquash +$container.EnableNfsV3AllSquash False -PS C:\> $container.EnableNfsV3RootSquash +$container.EnableNfsV3RootSquash False This command updates a storage container, with RootSquash property set as NoRootSquash. RootSquash only works on a storage account that enabled NfsV3. @@ -32498,9 +32710,9 @@ False Example 1: Modifies a Storage file share's metadata and share quota with Storage account name and share name - PS C:\>$share = Update-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -QuotaGiB 200 -Metadata @{tag0="value0";tag1="value1"} + $share = Update-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -QuotaGiB 200 -Metadata @{tag0="value0";tag1="value1"} -PS C:\>$share +$share ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -32508,7 +32720,7 @@ Name QuotaGiB EnabledProtocols AccessTier Deleted Version ShareUsageBytes ---- -------- ---------------- ---------- ------- ------- --------------- myshare 200 -PS C:\>$share.Metadata +$share.Metadata Key Value --- ----- @@ -32563,9 +32775,9 @@ myshare Cool Example 5: Modifies rootsquash for a file shares in a Storage account - PS C:\>$share = Update-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -RootSquash NoRootSquash + $share = Update-AzRmStorageShare -ResourceGroupName "myresourcegroup" -StorageAccountName "mystorageaccount" -Name "myshare" -RootSquash NoRootSquash -PS C:\>$share +$share ResourceGroupName: myresourcegroup, StorageAccountName: mystorageaccount @@ -32573,7 +32785,7 @@ Name QuotaGiB EnabledProtocols AccessTier Deleted Version ShareUsageBytes ---- -------- ---------------- ---------- ------- ------- --------------- myshare -PS C:\> $share.RootSquash +$share.RootSquash NoRootSquash This command modifies share RootSquash property to NoRootSquash. RootSquash property is only avaialbe on share with EnabledProtocol as NFS. diff --git a/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll new file mode 100644 index 000000000000..9df177bd81e4 Binary files /dev/null and b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll differ diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll-Help.xml b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll-Help.xml similarity index 98% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll-Help.xml rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll-Help.xml index 24b16d0d30c6..fce61b28351f 100644 --- a/Modules/Az.Storage/5.10.1/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll-Help.xml +++ b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Cmdlets.Storage.dll-Help.xml @@ -109,6 +109,17 @@ None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + + System.Management.Automation.SwitchParameter + + + False + PassThru @@ -675,6 +686,17 @@ None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + + System.Management.Automation.SwitchParameter + + + False + FileHandle @@ -950,6 +972,18 @@ None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + File @@ -3001,7 +3035,7 @@ $destBlob = Copy-AzStorageBlob -SrcContainer "sourcecontainername" -SrcBlob "src OutputUserPrincipalName - If speicify this parameter, the user identity values returned in the owner and group fields of each list entry will be transformed from Azure Active Directory Object IDs to User Principal Names. If not speicify this parameter, the values will be returned as Azure Active Directory Object IDs. Note that group and application Object IDs are not translated because they do not have unique friendly names. + If speicify this parameter, the user identity values returned in the owner and group fields of each list entry will be transformed from Microsoft Entra Object IDs to User Principal Names. If not speicify this parameter, the values will be returned as Microsoft Entra Object IDs. Note that group and application Object IDs are not translated because they do not have unique friendly names. System.Management.Automation.SwitchParameter @@ -3110,7 +3144,7 @@ $destBlob = Copy-AzStorageBlob -SrcContainer "sourcecontainername" -SrcBlob "src OutputUserPrincipalName - If speicify this parameter, the user identity values returned in the owner and group fields of each list entry will be transformed from Azure Active Directory Object IDs to User Principal Names. If not speicify this parameter, the values will be returned as Azure Active Directory Object IDs. Note that group and application Object IDs are not translated because they do not have unique friendly names. + If speicify this parameter, the user identity values returned in the owner and group fields of each list entry will be transformed from Microsoft Entra Object IDs to User Principal Names. If not speicify this parameter, the values will be returned as Microsoft Entra Object IDs. Note that group and application Object IDs are not translated because they do not have unique friendly names. System.Management.Automation.SwitchParameter @@ -3652,8 +3686,8 @@ dir0/dir2/file3 132658834534174806 2021-05-19 07:37:33Z 3 Example 1: Get a directory from a Filesystem, and show the details - PS C:\> $dir1 = Get-AzDataLakeGen2Item -FileSystem "filesystem1" -Path "dir1/" -PS C:\> $dir1 + $dir1 = Get-AzDataLakeGen2Item -FileSystem "filesystem1" -Path "dir1/" +$dir1 FileSystem Name: filesystem1 @@ -5183,9 +5217,9 @@ blob1 BlockBlob 2097152 application/octet-stream 20 ------------ Example 8: Get blob include blob tags ------------ - PS C:\> $blobs = Get-AzStorageBlob -Container "containername" -IncludeTag + $blobs = Get-AzStorageBlob -Container "containername" -IncludeTag -PS C:\> $blobs +$blobs AccountName: storageaccountname, ContainerName: containername @@ -5195,7 +5229,7 @@ testblob BlockBlob 2097152 application/octet-stream 20 testblob2 BlockBlob 2097152 application/octet-stream 2020-07-23 09:35:04Z Hot False 2020-07-23T09:35:04.0856187Z * -PS C:\> $blobs[0].Tags +$blobs[0].Tags Name Value ---- ----- tag1 value1 @@ -7271,6 +7305,18 @@ $destBlob | Get-AzStorageBlobCopyState None + + TagCondition + + Optional Tag expression statement to check match condition. The blob request will fail when the blob tags does not match the given expression.See details in https://learn.microsoft.com/en-us/rest/api/storageservices/specifying-conditional-headers-for-blob-service-operations#tags-conditional-operations. + + System.String + + System.String + + + None + VersionId @@ -7474,6 +7520,18 @@ $destBlob | Get-AzStorageBlobCopyState None + + TagCondition + + Optional Tag expression statement to check match condition. The blob request will fail when the blob tags does not match the given expression.See details in https://learn.microsoft.com/en-us/rest/api/storageservices/specifying-conditional-headers-for-blob-service-operations#tags-conditional-operations. + + System.String + + System.String + + + None + VersionId @@ -7653,6 +7711,18 @@ $destBlob | Get-AzStorageBlobCopyState None + + TagCondition + + Optional Tag expression statement to check match condition. The blob request will fail when the blob tags does not match the given expression.See details in https://learn.microsoft.com/en-us/rest/api/storageservices/specifying-conditional-headers-for-blob-service-operations#tags-conditional-operations. + + System.String + + System.String + + + None + Confirm @@ -7870,6 +7940,18 @@ $destBlob | Get-AzStorageBlobCopyState None + + TagCondition + + Optional Tag expression statement to check match condition. The blob request will fail when the blob tags does not match the given expression.See details in https://learn.microsoft.com/en-us/rest/api/storageservices/specifying-conditional-headers-for-blob-service-operations#tags-conditional-operations. + + System.String + + System.String + + + None + VersionId @@ -7972,17 +8054,17 @@ BytesScanned FailureCount BlobQueryError --------------- Example 2: Query a blob snapshot --------------- - PS C:\> $blob = Get-AzStorageBlob -Container $containerName -Blob $blobName -SnapshotTime "2020-07-29T11:08:21.1097874Z" -Context $ctx + $blob = Get-AzStorageBlob -Container $containerName -Blob $blobName -SnapshotTime "2020-07-29T11:08:21.1097874Z" -Context $ctx -PS C:\> $inputconfig = New-AzStorageBlobQueryConfig -AsCsv -ColumnSeparator "," -QuotationCharacter """" -EscapeCharacter "\" -RecordSeparator "`n" -HasHeader +$inputconfig = New-AzStorageBlobQueryConfig -AsCsv -ColumnSeparator "," -QuotationCharacter """" -EscapeCharacter "\" -RecordSeparator "`n" -HasHeader -PS C:\> $outputconfig = New-AzStorageBlobQueryConfig -AsJson -RecordSeparator "`n" +$outputconfig = New-AzStorageBlobQueryConfig -AsJson -RecordSeparator "`n" -PS C:\> $queryString = "SELECT * FROM BlobStorage WHERE _1 LIKE '1%%'" +$queryString = "SELECT * FROM BlobStorage WHERE _1 LIKE '1%%'" -PS C:\> $result = $blob | Get-AzStorageBlobQueryResult -QueryString $queryString -ResultFile $localFilePath -InputTextConfiguration $inputconfig -OutputTextConfiguration $outputconfig +$result = $blob | Get-AzStorageBlobQueryResult -QueryString $queryString -ResultFile $localFilePath -InputTextConfiguration $inputconfig -OutputTextConfiguration $outputconfig -PS C:\> $result +$result BytesScanned FailureCount BlobQueryError ------------ ------------ -------------- @@ -7990,7 +8072,7 @@ BytesScanned FailureCount BlobQueryError -PS C:\> $result.BlobQueryError +$result.BlobQueryError Name Description IsFatal Position ---- ----------- ------- -------- @@ -8613,7 +8695,7 @@ tag2 value2 Get-AzStorageContainer - + Name Specifies the container name. If container name is empty, the cmdlet lists all the containers. Otherwise, it lists all containers that match the specified name or the regular name pattern. @@ -8917,7 +8999,7 @@ tag2 value2 None - + Name Specifies the container name. If container name is empty, the cmdlet lists all the containers. Otherwise, it lists all containers that match the specified name or the regular name pattern. @@ -9008,9 +9090,9 @@ tag2 value2 Example 3: List Azure Storage container, include deleted containers - PS C:\> $containers = Get-AzStorageContainer -IncludeDeleted -Context $ctx + $containers = Get-AzStorageContainer -IncludeDeleted -Context $ctx -PS C:\> $containers +$containers Storage Account Name: storageaccountname @@ -9019,7 +9101,7 @@ Name PublicAccess LastModified IsDelet testcon Off 8/28/2020 10:18:13 AM +00:00 testcon2 9/4/2020 12:52:37 PM +00:00 True 01D67D248986B6DA -PS C:\> $c[1].BlobContainerProperties +$c[1].BlobContainerProperties LastModified : 9/4/2020 12:52:37 PM +00:00 LeaseStatus : Unlocked @@ -9670,14 +9752,14 @@ Metadata : {} Get-AzStorageFile - - Share + + ShareName - Specifies a CloudFileShare object. This cmdlet gets a file or directory from the file share that this parameter specifies. To obtain a CloudFileShare object, use the Get-AzStorageShare cmdlet. This object contains the Storage context. If you specify this parameter, do not specify the Context parameter. + Specifies the name of the file share. This cmdlet gets a file or directory from the file share that this parameter specifies. - Microsoft.Azure.Storage.File.CloudFileShare + System.String - Microsoft.Azure.Storage.File.CloudFileShare + System.String None @@ -9742,6 +9824,17 @@ Metadata : {} None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + + System.Management.Automation.SwitchParameter + + + False + ExcludeExtendedInfo @@ -9765,29 +9858,17 @@ Metadata : {} None - - ShareClient - - ShareClient object indicated the share where the files/directories would be listed. - - Azure.Storage.Files.Shares.ShareClient - - Azure.Storage.Files.Shares.ShareClient - - - None - Get-AzStorageFile - - ShareName + + Share - Specifies the name of the file share. This cmdlet gets a file or directory from the file share that this parameter specifies. + Specifies a CloudFileShare object. This cmdlet gets a file or directory from the file share that this parameter specifies. To obtain a CloudFileShare object, use the Get-AzStorageShare cmdlet. This object contains the Storage context. If you specify this parameter, do not specify the Context parameter. - System.String + Microsoft.Azure.Storage.File.CloudFileShare - System.String + Microsoft.Azure.Storage.File.CloudFileShare None @@ -9875,6 +9956,18 @@ Metadata : {} None + + ShareClient + + ShareClient object indicated the share where the files/directories would be listed. + + Azure.Storage.Files.Shares.ShareClient + + Azure.Storage.Files.Shares.ShareClient + + + None + @@ -9938,6 +10031,18 @@ Metadata : {} None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + ExcludeExtendedInfo @@ -10314,14 +10419,26 @@ Metadata : {} Get-AzStorageFileContent - - File + + ShareName - Specifies a file as a CloudFile object. This cmdlet gets the file that this parameter specifies. To obtain a CloudFile object, use the Get-AzStorageFile cmdlet. + Specifies the name of the file share. This cmdlet downloads the contents of the file in the share this parameter specifies. - Microsoft.Azure.Storage.File.CloudFile + System.String - Microsoft.Azure.Storage.File.CloudFile + System.String + + + None + + + Path + + Specifies the path of a file. This cmdlet gets the contents the file that this parameter specifies. If the file does not exist, this cmdlet returns an error. + + System.String + + System.String None @@ -10408,6 +10525,17 @@ Metadata : {} None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + + System.Management.Automation.SwitchParameter + + + False + Force @@ -10453,18 +10581,6 @@ Metadata : {} None - - ShareFileClient - - ShareFileClient object indicated the cloud file to be downloaded. - - Azure.Storage.Files.Shares.ShareFileClient - - Azure.Storage.Files.Shares.ShareFileClient - - - None - Confirm @@ -10490,26 +10606,14 @@ Metadata : {} Get-AzStorageFileContent - - ShareName - - Specifies the name of the file share. This cmdlet downloads the contents of the file in the share this parameter specifies. - - System.String - - System.String - - - None - - - Path + + File - Specifies the path of a file. This cmdlet gets the contents the file that this parameter specifies. If the file does not exist, this cmdlet returns an error. + Specifies a file as a CloudFile object. This cmdlet gets the file that this parameter specifies. To obtain a CloudFile object, use the Get-AzStorageFile cmdlet. - System.String + Microsoft.Azure.Storage.File.CloudFile - System.String + Microsoft.Azure.Storage.File.CloudFile None @@ -10641,6 +10745,18 @@ Metadata : {} None + + ShareFileClient + + ShareFileClient object indicated the cloud file to be downloaded. + + Azure.Storage.Files.Shares.ShareFileClient + + Azure.Storage.Files.Shares.ShareFileClient + + + None + Confirm @@ -10950,6 +11066,18 @@ Metadata : {} None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + File @@ -11215,14 +11343,26 @@ Metadata : {} Get-AzStorageFileCopyState - - File + + ShareName - Specifies a CloudFile object. You can create a cloud file or obtain one by using the Get-AzStorageFile cmdlet. + Specifies the name of a share. - Microsoft.Azure.Storage.File.CloudFile + System.String - Microsoft.Azure.Storage.File.CloudFile + System.String + + + None + + + FilePath + + Specifies the path of the file relative to an Azure Storage share. + + System.String + + System.String None @@ -11275,26 +11415,25 @@ Metadata : {} None - - ServerTimeoutPerRequest + + DisAllowTrailingDot - Specifies the length of the time-out period for the server part of a request. + Disallow trailing dot (.) to suffix directory and file names. - System.Nullable`1[System.Int32] - System.Nullable`1[System.Int32] + System.Management.Automation.SwitchParameter - None + False - - ShareFileClient + + ServerTimeoutPerRequest - ShareFileClient object indicated the file to get copy status. + Specifies the length of the time-out period for the server part of a request. - Azure.Storage.Files.Shares.ShareFileClient + System.Nullable`1[System.Int32] - Azure.Storage.Files.Shares.ShareFileClient + System.Nullable`1[System.Int32] None @@ -11313,26 +11452,14 @@ Metadata : {} Get-AzStorageFileCopyState - - ShareName - - Specifies the name of a share. - - System.String - - System.String - - - None - - - FilePath + + File - Specifies the path of the file relative to an Azure Storage share. + Specifies a CloudFile object. You can create a cloud file or obtain one by using the Get-AzStorageFile cmdlet. - System.String + Microsoft.Azure.Storage.File.CloudFile - System.String + Microsoft.Azure.Storage.File.CloudFile None @@ -11397,6 +11524,18 @@ Metadata : {} None + + ShareFileClient + + ShareFileClient object indicated the file to get copy status. + + Azure.Storage.Files.Shares.ShareFileClient + + Azure.Storage.Files.Shares.ShareFileClient + + + None + WaitForComplete @@ -11459,6 +11598,18 @@ Metadata : {} None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + File @@ -11770,14 +11921,26 @@ $destfile | Get-AzStorageFileCopyState Get-AzStorageFileHandle - - File + + ShareName - CloudFile object indicated the file to list File Handles. + Name of the file share where the files/directories would be listed. - Microsoft.Azure.Storage.File.CloudFile + System.String - Microsoft.Azure.Storage.File.CloudFile + System.String + + + None + + + Path + + Path to an existing file/directory. + + System.String + + System.String None @@ -11830,6 +11993,17 @@ $destfile | Get-AzStorageFileCopyState None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + + System.Management.Automation.SwitchParameter + + + False + Recursive @@ -11853,18 +12027,6 @@ $destfile | Get-AzStorageFileCopyState None - - ShareFileClient - - ShareFileClient object indicated the file to list File Handles. - - Azure.Storage.Files.Shares.ShareFileClient - - Azure.Storage.Files.Shares.ShareFileClient - - - None - IncludeTotalCount @@ -11903,26 +12065,14 @@ $destfile | Get-AzStorageFileCopyState Get-AzStorageFileHandle - - ShareName - - Name of the file share where the files/directories would be listed. - - System.String - - System.String - - - None - - - Path + + File - Path to an existing file/directory. + CloudFile object indicated the file to list File Handles. - System.String + Microsoft.Azure.Storage.File.CloudFile - System.String + Microsoft.Azure.Storage.File.CloudFile None @@ -11998,6 +12148,18 @@ $destfile | Get-AzStorageFileCopyState None + + ShareFileClient + + ShareFileClient object indicated the file to list File Handles. + + Azure.Storage.Files.Shares.ShareFileClient + + Azure.Storage.Files.Shares.ShareFileClient + + + None + IncludeTotalCount @@ -12241,6 +12403,18 @@ $destfile | Get-AzStorageFileCopyState None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + File @@ -12499,7 +12673,7 @@ HandleId Path ClientIp ClientPort OpenTime La Get-AzStorageQueue - + Name Specifies a name. If no name is specified, the cmdlet gets a list of all the queues. If a full or partial name is specified, the cmdlet gets all queues that match the name pattern. @@ -12601,7 +12775,7 @@ HandleId Path ClientIp ClientPort OpenTime La None - + Name Specifies a name. If no name is specified, the cmdlet gets a list of all the queues. If a full or partial name is specified, the cmdlet gets all queues that match the name pattern. @@ -14081,7 +14255,7 @@ $share = Get-AzStorageShare -Name "ContosoShare06" -SkipGetProperty -Context $ct Get-AzStorageTable - + Name Specifies the table name. If the table name is empty, the cmdlet lists all the tables. Otherwise, it lists all tables that match the specified name or the regular name pattern. @@ -14183,7 +14357,7 @@ $share = Get-AzStorageShare -Name "ContosoShare06" -SkipGetProperty -Context $ct None - + Name Specifies the table name. If the table name is empty, the cmdlet lists all the tables. Otherwise, it lists all tables that match the specified name or the regular name pattern. @@ -17950,12 +18124,12 @@ New-AzStorageBlobSASToken -Container "ContainerName" -Blob "BlobName" -Permissio Example 3: Create an Azure storage container with Encryption Scope - PS C:\> $container = New-AzStorageContainer -Name "mycontainer" -DefaultEncryptionScope "myencryptscope" -PreventEncryptionScopeOverride $true + $container = New-AzStorageContainer -Name "mycontainer" -DefaultEncryptionScope "myencryptscope" -PreventEncryptionScopeOverride $true -PS C:\> $container.BlobContainerProperties.DefaultEncryptionScope +$container.BlobContainerProperties.DefaultEncryptionScope myencryptscope -PS C:\> $container.BlobContainerProperties.PreventEncryptionScopeOverride +$container.BlobContainerProperties.PreventEncryptionScopeOverride True This command creates a storage container, with default Encryption Scope as myencryptscope, and prevert blob upload with different Encryption Scope to this container. @@ -18878,7 +19052,7 @@ New-AzStorageContainerSASToken -Name "ContainerName" -Permission rwd -StartTime - The New-AzStorageContext cmdlet creates an Azure Storage context. The default Authentication of a Storage Context is OAuth (Azure AD), if only input Storage account name. See details of authentication of the Storage Service in https://learn.microsoft.com/rest/api/storageservices/authorization-for-the-azure-storage-services. + The New-AzStorageContext cmdlet creates an Azure Storage context. The default Authentication of a Storage Context is OAuth (Microsoft Entra ID), if only input Storage account name. See details of authentication of the Storage Service in https://learn.microsoft.com/rest/api/storageservices/authorization-for-the-azure-storage-services. @@ -19206,7 +19380,7 @@ New-AzStorageContainerSASToken -Name "ContainerName" -Permission rwd -StartTime EnableFileBackupRequestIntent - Required parameter to use with OAuth (Azure AD) Authentication for Files. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. + Required parameter to use with OAuth (Microsoft Entra ID) Authentication for Files. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. System.Management.Automation.SwitchParameter @@ -19253,7 +19427,7 @@ New-AzStorageContainerSASToken -Name "ContainerName" -Permission rwd -StartTime UseConnectedAccount - Indicates that this cmdlet creates an Azure Storage context with OAuth (Azure AD) Authentication. The cmdlet will use OAuth Authentication by default, when other authentication not specified. + Indicates that this cmdlet creates an Azure Storage context with OAuth (Microsoft Entra ID) Authentication. The cmdlet will use OAuth Authentication by default, when other authentication not specified. System.Management.Automation.SwitchParameter @@ -19294,7 +19468,7 @@ New-AzStorageContainerSASToken -Name "ContainerName" -Permission rwd -StartTime EnableFileBackupRequestIntent - Required parameter to use with OAuth (Azure AD) Authentication for Files. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. + Required parameter to use with OAuth (Microsoft Entra ID) Authentication for Files. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. System.Management.Automation.SwitchParameter @@ -19333,7 +19507,7 @@ New-AzStorageContainerSASToken -Name "ContainerName" -Permission rwd -StartTime UseConnectedAccount - Indicates that this cmdlet creates an Azure Storage context with OAuth (Azure AD) Authentication. The cmdlet will use OAuth Authentication by default, when other authentication not specified. + Indicates that this cmdlet creates an Azure Storage context with OAuth (Microsoft Entra ID) Authentication. The cmdlet will use OAuth Authentication by default, when other authentication not specified. System.Management.Automation.SwitchParameter @@ -19359,7 +19533,7 @@ New-AzStorageContainerSASToken -Name "ContainerName" -Permission rwd -StartTime EnableFileBackupRequestIntent - Required parameter to use with OAuth (Azure AD) Authentication for Files. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. + Required parameter to use with OAuth (Microsoft Entra ID) Authentication for Files. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. System.Management.Automation.SwitchParameter @@ -19398,7 +19572,7 @@ New-AzStorageContainerSASToken -Name "ContainerName" -Permission rwd -StartTime UseConnectedAccount - Indicates that this cmdlet creates an Azure Storage context with OAuth (Azure AD) Authentication. The cmdlet will use OAuth Authentication by default, when other authentication not specified. + Indicates that this cmdlet creates an Azure Storage context with OAuth (Microsoft Entra ID) Authentication. The cmdlet will use OAuth Authentication by default, when other authentication not specified. System.Management.Automation.SwitchParameter @@ -19666,7 +19840,7 @@ New-AzStorageContainerSASToken -Name "ContainerName" -Permission rwd -StartTime EnableFileBackupRequestIntent - Required parameter to use with OAuth (Azure AD) Authentication for Files. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. + Required parameter to use with OAuth (Microsoft Entra ID) Authentication for Files. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. System.Management.Automation.SwitchParameter @@ -19798,7 +19972,7 @@ New-AzStorageContainerSASToken -Name "ContainerName" -Permission rwd -StartTime UseConnectedAccount - Indicates that this cmdlet creates an Azure Storage context with OAuth (Azure AD) Authentication. The cmdlet will use OAuth Authentication by default, when other authentication not specified. + Indicates that this cmdlet creates an Azure Storage context with OAuth (Microsoft Entra ID) Authentication. The cmdlet will use OAuth Authentication by default, when other authentication not specified. System.Management.Automation.SwitchParameter @@ -19924,7 +20098,7 @@ $Context | Get-AzStorageBlob -Container "ContosoMain" Connect-AzAccount $Context = New-AzStorageContext -StorageAccountName "myaccountname" -UseConnectedAccount - This command creates a context by using the OAuth (Azure AD) Authentication. + This command creates a context by using the OAuth (Microsoft Entra ID) Authentication. @@ -19970,7 +20144,7 @@ New-AzStorageContext -SasToken $SasToken -BlobEndpoint "https://myaccountname.bl Example 15: Create a context by using the OAuth Authentication on File service New-AzStorageContext -StorageAccountName "myaccountname" -UseConnectedAccount -EnableFileBackupRequestIntent - This command creates a context to use the OAuth (Azure AD) authentication on File service. Parameter '-EnableFileBackupRequestIntent' is required to use OAuth (Azure AD) Authentication for File service. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. + This command creates a context to use the OAuth (Microsoft Entra ID) authentication on File service. Parameter '-EnableFileBackupRequestIntent' is required to use OAuth (Microsoft Entra ID) Authentication for File service. This will bypass any file/directory level permission checks and allow access, based on the allowed data actions, even if there are ACLs in place for those files/directories. @@ -20105,14 +20279,14 @@ New-AzStorageContext -SasToken $SasToken -BlobEndpoint "https://myaccountname.bl New-AzStorageDirectory - - Share + + ShareName - Specifies a CloudFileShare object. This cmdlet creates a folder in the file share that this parameter specifies. To obtain a CloudFileShare object, use the Get-AzStorageShare cmdlet. This object contains the storage context. If you specify this parameter, do not specify the Context parameter. + Specifies the name of the file share. This cmdlet creates a folder in the file share that this parameter specifies. - Microsoft.Azure.Storage.File.CloudFileShare + System.String - Microsoft.Azure.Storage.File.CloudFileShare + System.String None @@ -20177,26 +20351,25 @@ New-AzStorageContext -SasToken $SasToken -BlobEndpoint "https://myaccountname.bl None - - ServerTimeoutPerRequest + + DisAllowTrailingDot - Specifies the length of the time-out period for the server part of a request. + Disallow trailing dot (.) to suffix directory and file names. - System.Nullable`1[System.Int32] - System.Nullable`1[System.Int32] + System.Management.Automation.SwitchParameter - None + False - - ShareClient + + ServerTimeoutPerRequest - ShareClient object indicated the share where the files/directories would be listed. + Specifies the length of the time-out period for the server part of a request. - Azure.Storage.Files.Shares.ShareClient + System.Nullable`1[System.Int32] - Azure.Storage.Files.Shares.ShareClient + System.Nullable`1[System.Int32] None @@ -20204,14 +20377,14 @@ New-AzStorageContext -SasToken $SasToken -BlobEndpoint "https://myaccountname.bl New-AzStorageDirectory - - ShareName + + Share - Specifies the name of the file share. This cmdlet creates a folder in the file share that this parameter specifies. + Specifies a CloudFileShare object. This cmdlet creates a folder in the file share that this parameter specifies. To obtain a CloudFileShare object, use the Get-AzStorageShare cmdlet. This object contains the storage context. If you specify this parameter, do not specify the Context parameter. - System.String + Microsoft.Azure.Storage.File.CloudFileShare - System.String + Microsoft.Azure.Storage.File.CloudFileShare None @@ -20288,6 +20461,18 @@ New-AzStorageContext -SasToken $SasToken -BlobEndpoint "https://myaccountname.bl None + + ShareClient + + ShareClient object indicated the share where the files/directories would be listed. + + Azure.Storage.Files.Shares.ShareClient + + Azure.Storage.Files.Shares.ShareClient + + + None + @@ -20351,6 +20536,18 @@ New-AzStorageContext -SasToken $SasToken -BlobEndpoint "https://myaccountname.bl None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + Path @@ -21882,7 +22079,7 @@ New-AzStorageFileSASToken -ShareName "ContosoShare" -Path "FilePath" -Permission Permission - Specifies permissions in the stored access policy to access the storage queue. It is important to note that this is a string, like `rwd` (for Read, Write and Delete). + Specifies permissions in the stored access policy to access the storage queue. It is important to note that this is a string, like `raup` (for Read, Add, Update, and ProcessMessages). System.String @@ -21945,7 +22142,7 @@ New-AzStorageFileSASToken -ShareName "ContosoShare" -Path "FilePath" -Permission Permission - Specifies permissions in the stored access policy to access the storage queue. It is important to note that this is a string, like `rwd` (for Read, Write and Delete). + Specifies permissions in the stored access policy to access the storage queue. It is important to note that this is a string, like `raup` (for Read, Add, Update, and ProcessMessages). System.String @@ -23193,7 +23390,7 @@ New-AzStorageFileSASToken -ShareName "ContosoShare" -Path "FilePath" -Permission ------- Example 2: Create multiple azure storage tables ------- - PS C:\>"table1 table2 table3".split() | New-AzStorageTable + "table1 table2 table3".split() | New-AzStorageTable This command creates multiple tables. It uses the Split method of the .NET String class and then passes the names on the pipeline. @@ -24396,9 +24593,9 @@ New-AzStorageFileSASToken -ShareName "ContosoShare" -Path "FilePath" -Permission Example 1: Remove ACL recursively on a root directiry of filesystem - PS C:\>$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $id -Permission r-x -DefaultScope -PS C:\>$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $id -Permission r-x -InputObject $acl -PS C:\> Remove-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Acl $acl -Context $ctx + $acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $id -Permission r-x -DefaultScope +$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $id -Permission r-x -InputObject $acl +Remove-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Acl $acl -Context $ctx WARNING: To find the ACL Entry to remove, will only compare AccessControlType, DefaultScope and EntityId, will omit Permission. FailedEntries : @@ -24414,10 +24611,10 @@ ContinuationToken : ------- Example 2: Remove ACL recursively on a directory ------- - PS C:\> $result = Remove-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -Context $ctx + $result = Remove-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -Context $ctx WARNING: To find the ACL Entry to remove, will only compare AccessControlType, DefaultScope and EntityId, will omit Permission. -PS C:\> $result +$result FailedEntries : {dir1/dir2/file4} TotalDirectoriesSuccessfulCount : 500 @@ -24425,7 +24622,7 @@ TotalFilesSuccessfulCount : 2500 TotalFailureCount : 1 ContinuationToken : VBaHi5TfyO2ai1wYTRhIL2FjbGNibjA2c3RmATAxRDVEN0UzRENFQzZCRTAvYWRsc3Rlc3QyATAxRDY2M0ZCQTZBN0JGQTkvZGlyMC9kaXIxL2ZpbGUzFgAAAA== -PS C:\> $result.FailedEntries +$result.FailedEntries Name IsDirectory ErrorMessage ---- ----------- ------------ @@ -24433,10 +24630,10 @@ dir0/dir2/file4 False This request is not authorized to perform this opera # user need fix the failed item , then can resume with ContinuationToken -PS C:\> $result = Remove-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinuationToken $result.ContinuationToken -Context $ctx +$result = Remove-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinuationToken $result.ContinuationToken -Context $ctx WARNING: To find the ACL Entry to remove, will only compare AccessControlType, DefaultScope and EntityId, will omit Permission. -PS C:\> $result +$result FailedEntries : TotalDirectoriesSuccessfulCount : 100 @@ -24482,9 +24679,9 @@ echo "FailedEntries:"$($FailedEntries | ft) Example 4: Remove ACL recursively on a directory and ContinueOnFailure, then resume from failures one by one - PS C:\> $result = Remove-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinueOnFailure -Context $ctx + $result = Remove-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinueOnFailure -Context $ctx -PS C:\> $result +$result FailedEntries : {dir0/dir1/file1, dir0/dir2/file4} TotalDirectoriesSuccessfulCount : 100 @@ -24492,7 +24689,7 @@ TotalFilesSuccessfulCount : 500 TotalFailureCount : 2 ContinuationToken : VBaHi5TfyO2ai1wYTRhIL2FjbGNibjA2c3RmATAxRDVEN0UzRENFQzZCRTAvYWRsc3Rlc3QyATAxRDY2M0ZCQTZBN0JGQTkvZGlyMC9kaXIxL2ZpbGUzFgAAAA== -PS C:\> $result.FailedEntries +$result.FailedEntries Name IsDirectory ErrorMessage ---- ----------- ------------ @@ -24501,7 +24698,7 @@ dir0/dir2/file4 False This request is not authorized to perform this opera # user need fix the failed item , then can resume with ContinuationToken -PS C:\> foreach ($path in $result.FailedEntries.Name) +foreach ($path in $result.FailedEntries.Name) { # user code to fix failed entry in $path @@ -26198,9 +26395,9 @@ PS C:\> foreach ($path in $result.FailedEntries.Name) -- Example 1: Removes immutability policy of a Storage blob. -- - PS C:\> $blob = Remove-AzStorageBlobImmutabilityPolicy -Container $containerName -Blob $blobname + $blob = Remove-AzStorageBlobImmutabilityPolicy -Container $containerName -Blob $blobname -PS C:\> $blob +$blob AccountName: mystorageaccount, ContainerName: mycontainer @@ -26208,7 +26405,7 @@ Name BlobType Length ContentType La ---- -------- ------ ----------- ------------ ---------- ------------ --------- --------- testblob BlockBlob 10485760 application/octet-stream 2021-07-19 08:56:00Z Hot False 2021-07-19T08:56:01.8120788Z * -PS C:\> $blob.BlobProperties.ImmutabilityPolicy +$blob.BlobProperties.ImmutabilityPolicy ExpiresOn PolicyMode --------- ---------- @@ -27308,6 +27505,17 @@ ExpiresOn PolicyMode None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + + System.Management.Automation.SwitchParameter + + + False + PassThru @@ -27548,6 +27756,18 @@ ExpiresOn PolicyMode None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + PassThru @@ -27883,14 +28103,26 @@ ExpiresOn PolicyMode Remove-AzStorageFile - - File + + ShareName - Specifies a file as a CloudFile object. This cmdlet removes the file that this parameter specifies. To obtain a CloudFile object, use the Get-AzStorageFile cmdlet. + Specifies the name of the file share. This cmdlet removes the file in the share this parameter specifies. - Microsoft.Azure.Storage.File.CloudFile + System.String - Microsoft.Azure.Storage.File.CloudFile + System.String + + + None + + + Path + + Specifies the path of a file. This cmdlet deletes the file that this parameter specifies. + + System.String + + System.String None @@ -27943,6 +28175,17 @@ ExpiresOn PolicyMode None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + + System.Management.Automation.SwitchParameter + + + False + PassThru @@ -27966,18 +28209,6 @@ ExpiresOn PolicyMode None - - ShareFileClient - - ShareFileClient object indicated the file would be removed. - - Azure.Storage.Files.Shares.ShareFileClient - - Azure.Storage.Files.Shares.ShareFileClient - - - None - Confirm @@ -28003,26 +28234,14 @@ ExpiresOn PolicyMode Remove-AzStorageFile - - ShareName - - Specifies the name of the file share. This cmdlet removes the file in the share this parameter specifies. - - System.String - - System.String - - - None - - - Path + + File - Specifies the path of a file. This cmdlet deletes the file that this parameter specifies. + Specifies a file as a CloudFile object. This cmdlet removes the file that this parameter specifies. To obtain a CloudFile object, use the Get-AzStorageFile cmdlet. - System.String + Microsoft.Azure.Storage.File.CloudFile - System.String + Microsoft.Azure.Storage.File.CloudFile None @@ -28098,6 +28317,18 @@ ExpiresOn PolicyMode None + + ShareFileClient + + ShareFileClient object indicated the file would be removed. + + Azure.Storage.Files.Shares.ShareFileClient + + Azure.Storage.Files.Shares.ShareFileClient + + + None + Confirm @@ -28315,6 +28546,18 @@ ExpiresOn PolicyMode None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + File @@ -30422,14 +30665,14 @@ ExpiresOn PolicyMode Rename-AzStorageDirectory - - ShareClient + + ShareName - ShareClienr indicated the share where the directory would be listed. + Name of the file share where the directory would be listed. - Azure.Storage.Files.Shares.ShareClient + System.String - Azure.Storage.Files.Shares.ShareClient + System.String None @@ -30493,6 +30736,28 @@ ExpiresOn PolicyMode None + + DisAllowDestTrailingDot + + Disallow trailing dot (.) to suffix destination directory and destination file names. + + + System.Management.Automation.SwitchParameter + + + False + + + DisAllowSourceTrailingDot + + Disallow trailing dot (.) to suffix source directory and source file names. + + + System.Management.Automation.SwitchParameter + + + False + Force @@ -30553,13 +30818,25 @@ ExpiresOn PolicyMode Rename-AzStorageDirectory - ShareDirectoryClient + ShareClient - Source directory instance + ShareClienr indicated the share where the directory would be listed. - Azure.Storage.Files.Shares.ShareDirectoryClient + Azure.Storage.Files.Shares.ShareClient - Azure.Storage.Files.Shares.ShareDirectoryClient + Azure.Storage.Files.Shares.ShareClient + + + None + + + SourcePath + + Path to an existing directory. + + System.String + + System.String None @@ -30670,26 +30947,14 @@ ExpiresOn PolicyMode Rename-AzStorageDirectory - - ShareName - - Name of the file share where the directory would be listed. - - System.String - - System.String - - - None - - - SourcePath + + ShareDirectoryClient - Path to an existing directory. + Source directory instance - System.String + Azure.Storage.Files.Shares.ShareDirectoryClient - System.String + Azure.Storage.Files.Shares.ShareDirectoryClient None @@ -30848,6 +31113,30 @@ ExpiresOn PolicyMode None + + DisAllowDestTrailingDot + + Disallow trailing dot (.) to suffix destination directory and destination file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + + + DisAllowSourceTrailingDot + + Disallow trailing dot (.) to suffix source directory and source file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + Force @@ -31052,14 +31341,14 @@ Directory 1 testdir2 Rename-AzStorageFile - - ShareClient + + ShareName - ShareClient indicated the share where the file would be listed. + Name of the file share where the file would be listed. - Azure.Storage.Files.Shares.ShareClient + System.String - Azure.Storage.Files.Shares.ShareClient + System.String None @@ -31135,6 +31424,28 @@ Directory 1 testdir2 None + + DisAllowDestTrailingDot + + Disallow trailing dot (.) to suffix destination directory and destination file names. + + + System.Management.Automation.SwitchParameter + + + False + + + DisAllowSourceTrailingDot + + Disallow trailing dot (.) to suffix source directory and source file names. + + + System.Management.Automation.SwitchParameter + + + False + Force @@ -31195,13 +31506,13 @@ Directory 1 testdir2 Rename-AzStorageFile - ShareDirectoryClient + ShareClient - ShareDirectoryClient indicated the share where the file would be listed. + ShareClient indicated the share where the file would be listed. - Azure.Storage.Files.Shares.ShareDirectoryClient + Azure.Storage.Files.Shares.ShareClient - Azure.Storage.Files.Shares.ShareDirectoryClient + Azure.Storage.Files.Shares.ShareClient None @@ -31337,13 +31648,13 @@ Directory 1 testdir2 Rename-AzStorageFile - ShareFileClient + ShareDirectoryClient - Source file instance + ShareDirectoryClient indicated the share where the file would be listed. - Azure.Storage.Files.Shares.ShareFileClient + Azure.Storage.Files.Shares.ShareDirectoryClient - Azure.Storage.Files.Shares.ShareFileClient + Azure.Storage.Files.Shares.ShareDirectoryClient None @@ -31360,6 +31671,18 @@ Directory 1 testdir2 None + + SourcePath + + Path to an existing file. + + System.String + + System.String + + + None + AsJob @@ -31466,14 +31789,14 @@ Directory 1 testdir2 Rename-AzStorageFile - - ShareName + + ShareFileClient - Name of the file share where the file would be listed. + Source file instance - System.String + Azure.Storage.Files.Shares.ShareFileClient - System.String + Azure.Storage.Files.Shares.ShareFileClient None @@ -31490,18 +31813,6 @@ Directory 1 testdir2 None - - SourcePath - - Path to an existing file. - - System.String - - System.String - - - None - AsJob @@ -31668,6 +31979,30 @@ Directory 1 testdir2 None + + DisAllowDestTrailingDot + + Disallow trailing dot (.) to suffix destination directory and destination file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + + + DisAllowSourceTrailingDot + + Disallow trailing dot (.) to suffix source directory and source file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + Force @@ -32213,8 +32548,8 @@ File 512 testfile2 Example 1: List all deleted files or directories from a Filesystem, and restore them by pipeline - PS C:\> $items = Get-AzDataLakeGen2DeletedItem -FileSystem "filesystem1" -PS C:\> $items + $items = Get-AzDataLakeGen2DeletedItem -FileSystem "filesystem1" +$items FileSystem Name: filesystem1 @@ -32224,7 +32559,7 @@ dir0/dir1/file1 132658816156507617 2021-05-19 07:06:55Z 3 dir0/dir2 132658834541610122 2021-05-19 07:37:34Z 3 dir0/dir2/file3 132658834534174806 2021-05-19 07:37:33Z 3 -PS C:\> $items | Restore-AzDataLakeGen2DeletedItem +$items | Restore-AzDataLakeGen2DeletedItem FileSystem Name: filesystem1 @@ -32475,7 +32810,7 @@ container2 Off -------- Example 2: Restore a single deleted container -------- - PS C:\> Get-AzStorageContainer -IncludeDeleted -Context $ctx | Where-Object { $_.IsDeleted } + Get-AzStorageContainer -IncludeDeleted -Context $ctx | Where-Object { $_.IsDeleted } Storage Account Name: storageaccountname @@ -32484,7 +32819,7 @@ Name PublicAccess LastModified IsDelet container1 8/28/2020 10:18:13 AM +00:00 True 01D685BC91A88F22 container2 9/4/2020 12:52:37 PM +00:00 True 01D67D248986B6DA -PS C:\> Restore-AzStorageContainer -Name container1 -VersionId 01D685BC91A88F22 -Context $ctx +Restore-AzStorageContainer -Name container1 -VersionId 01D685BC91A88F22 -Context $ctx Storage Account Name: storageaccountname @@ -32862,9 +33197,9 @@ ContinuationToken : Example 2: Set ACL recursively on a root directory of filesystem - PS C:\> $result = Set-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Acl $acl -Context $ctx + $result = Set-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Acl $acl -Context $ctx -PS C:\> $result +$result FailedEntries : {dir1/dir2/file4} TotalDirectoriesSuccessfulCount : 500 @@ -32872,7 +33207,7 @@ TotalFilesSuccessfulCount : 2500 TotalFailureCount : 1 ContinuationToken : VBaHi5TfyO2ai1wYTRhIL2FjbGNibjA2c3RmATAxRDVEN0UzRENFQzZCRTAvYWRsc3Rlc3QyATAxRDY2M0ZCQTZBN0JGQTkvZGlyMC9kaXIxL2ZpbGUzFgAAAA== -PS C:\> $result.FailedEntries +$result.FailedEntries Name IsDirectory ErrorMessage ---- ----------- ------------ @@ -32880,9 +33215,9 @@ dir0/dir2/file4 False This request is not authorized to perform this opera # user need fix the failed item , then can resume with ContinuationToken -PS C:\> $result = Set-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Acl $acl -ContinuationToken $result.ContinuationToken -Context $ctx +$result = Set-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Acl $acl -ContinuationToken $result.ContinuationToken -Context $ctx -PS C:\> $result +$result FailedEntries : TotalDirectoriesSuccessfulCount : 100 @@ -32928,9 +33263,9 @@ echo "FailedEntries:"$($FailedEntries | ft) Example 4: Set ACL recursively on a directory and ContinueOnFailure, then resume from failures one by one - PS C:\> $result = Set-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinueOnFailure -Context $ctx + $result = Set-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinueOnFailure -Context $ctx -PS C:\> $result +$result FailedEntries : {dir0/dir1/file1, dir0/dir2/file4} TotalDirectoriesSuccessfulCount : 100 @@ -32938,7 +33273,7 @@ TotalFilesSuccessfulCount : 500 TotalFailureCount : 2 ContinuationToken : VBaHi5TfyO2ai1wYTRhIL2FjbGNibjA2c3RmATAxRDVEN0UzRENFQzZCRTAvYWRsc3Rlc3QyATAxRDY2M0ZCQTZBN0JGQTkvZGlyMC9kaXIxL2ZpbGUzFgAAAA== -PS C:\> $result.FailedEntries +$result.FailedEntries Name IsDirectory ErrorMessage ---- ----------- ------------ @@ -32947,7 +33282,7 @@ dir0/dir2/file4 False This request is not authorized to perform this opera # user need fix the failed item , then can resume with ContinuationToken -PS C:\> foreach ($path in $result.FailedEntries.Name) +foreach ($path in $result.FailedEntries.Name) { # user code to fix failed entry in $path @@ -33158,11 +33493,11 @@ dir1/dir3 True 2020-03-23 09:34:31Z rwxrw-rw- Example 2: Create an ACL object with 4 ACL entries, and update permission of an existing ACL entry - PS C:\>$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -Permission rwx -DefaultScope -PS C:\>$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType group -Permission rw- -InputObject $acl -PS C:\>$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType other -Permission "rwt" -InputObject $acl -PS C:\>$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $id -Permission rwx -InputObject $acl -PS C:\>$acl + $acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -Permission rwx -DefaultScope +$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType group -Permission rw- -InputObject $acl +$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType other -Permission "rwt" -InputObject $acl +$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $id -Permission rwx -InputObject $acl +$acl DefaultScope AccessControlType EntityId Permissions ------------ ----------------- -------- ----------- @@ -33171,8 +33506,8 @@ False Group rw- False Other rwt False User ********-****-****-****-************ rwx -PS C:\>$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $id -Permission r-x -InputObject $acl -PS C:\>$acl +$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $id -Permission r-x -InputObject $acl +$acl DefaultScope AccessControlType EntityId Permissions ------------ ----------------- -------- ----------- @@ -34890,9 +35225,9 @@ myencryptscope Example 1: Create or update immutability policy of a Storage blob. - PS C:\> $blob = Set-AzStorageBlobImmutabilityPolicy -Container $containerName -Blob $blobname -ExpiresOn (Get-Date).AddDays(100) -PolicyMode Unlocked + $blob = Set-AzStorageBlobImmutabilityPolicy -Container $containerName -Blob $blobname -ExpiresOn (Get-Date).AddDays(100) -PolicyMode Unlocked -PS C:\> $blob +$blob AccountName: mystorageaccount, ContainerName: mycontainer @@ -34900,7 +35235,7 @@ Name BlobType Length ContentType La ---- -------- ------ ----------- ------------ ---------- ------------ --------- --------- testblob BlockBlob 10485760 application/octet-stream 2021-07-19 08:56:00Z Hot False 2021-07-19T08:56:01.8120788Z * -PS C:\> $blob.BlobProperties.ImmutabilityPolicy +$blob.BlobProperties.ImmutabilityPolicy ExpiresOn PolicyMode --------- ---------- @@ -35631,9 +35966,9 @@ ExpiresOn PolicyMode ------- Example 1: Enable legal hold on a Storage blob. ------- - PS C:\> $blob = Set-AzStorageBlobLegalHold -Container $containerName -Blob $blobname -EnableLegalHold + $blob = Set-AzStorageBlobLegalHold -Container $containerName -Blob $blobname -EnableLegalHold -PS C:\> $blob +$blob AccountName: mystorageaccount, ContainerName: mycontainer @@ -35641,7 +35976,7 @@ Name BlobType Length ContentType La ---- -------- ------ ----------- ------------ ---------- ------------ --------- --------- testblob BlockBlob 10485760 application/octet-stream 2021-07-19 08:56:00Z Hot False 2021-07-19T08:56:01.8120788Z * -PS C:\> $blob.BlobProperties.HasLegalHold +$blob.BlobProperties.HasLegalHold True This command enables legal hold on a Storage blob, then show the result. The command only works when the blob container has already enabled immutable Storage with versioning. @@ -35651,9 +35986,9 @@ True Example 2: Disable legal hold on a Storage blob with pipeline. - PS C:\> $blob = Get-AzStorageBlob -Container $containerName -Blob $blobname | Set-AzStorageBlobLegalHold -DisableLegalHold + $blob = Get-AzStorageBlob -Container $containerName -Blob $blobname | Set-AzStorageBlobLegalHold -DisableLegalHold -PS C:\> $blob +$blob AccountName: mystorageaccount, ContainerName: mycontainer @@ -35661,7 +35996,7 @@ Name BlobType Length ContentType La ---- -------- ------ ----------- ------------ ---------- ------------ --------- --------- testblob BlockBlob 10485760 application/octet-stream 2021-07-19 08:56:00Z Hot False 2021-07-19T08:56:01.8120788Z * -PS C:\> $blob.BlobProperties.HasLegalHold +$blob.BlobProperties.HasLegalHold False This command disables legal hold on a Storage blob with pipeline, then show the result. The command only works when the blob container has already enabled immutable Storage with versioning. @@ -37513,14 +37848,14 @@ Set-AzStorageCORSRule -ServiceType Blob -CorsRules $CorsRules Set-AzStorageFileContent - - Share + + ShareName - Specifies a CloudFileShare object. This cmdlet uploads to a file in the file share this parameter specifies. To obtain a CloudFileShare object, use the Get-AzStorageShare cmdlet. This object contains the storage context. If you specify this parameter, do not specify the Context parameter. + Specifies the name of the file share. This cmdlet uploads to a file in the file share this parameter specifies. - Microsoft.Azure.Storage.File.CloudFileShare + System.String - Microsoft.Azure.Storage.File.CloudFileShare + System.String None @@ -37608,6 +37943,17 @@ Set-AzStorageCORSRule -ServiceType Blob -CorsRules $CorsRules None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + + System.Management.Automation.SwitchParameter + + + False + Force @@ -37653,18 +37999,6 @@ Set-AzStorageCORSRule -ServiceType Blob -CorsRules $CorsRules None - - ShareClient - - ShareClient object indicated the share where the file would be uploaded to. - - Azure.Storage.Files.Shares.ShareClient - - Azure.Storage.Files.Shares.ShareClient - - - None - Confirm @@ -37690,14 +38024,14 @@ Set-AzStorageCORSRule -ServiceType Blob -CorsRules $CorsRules Set-AzStorageFileContent - - ShareName + + Share - Specifies the name of the file share. This cmdlet uploads to a file in the file share this parameter specifies. + Specifies a CloudFileShare object. This cmdlet uploads to a file in the file share this parameter specifies. To obtain a CloudFileShare object, use the Get-AzStorageShare cmdlet. This object contains the storage context. If you specify this parameter, do not specify the Context parameter. - System.String + Microsoft.Azure.Storage.File.CloudFileShare - System.String + Microsoft.Azure.Storage.File.CloudFileShare None @@ -37830,6 +38164,18 @@ Set-AzStorageCORSRule -ServiceType Blob -CorsRules $CorsRules None + + ShareClient + + ShareClient object indicated the share where the file would be uploaded to. + + Azure.Storage.Files.Shares.ShareClient + + Azure.Storage.Files.Shares.ShareClient + + + None + Confirm @@ -37927,6 +38273,18 @@ Set-AzStorageCORSRule -ServiceType Blob -CorsRules $CorsRules None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + Force @@ -44245,6 +44603,17 @@ Start-AzStorageBlobIncrementalCopy -CloudBlob $srcBlobSnapshot.ICloudBlob -DestC None + + DisAllowDestTrailingDot + + Disallow trailing dot (.) to suffix destination directory and destination file names. + + + System.Management.Automation.SwitchParameter + + + False + Force @@ -44401,6 +44770,28 @@ Start-AzStorageBlobIncrementalCopy -CloudBlob $srcBlobSnapshot.ICloudBlob -DestC None + + DisAllowDestTrailingDot + + Disallow trailing dot (.) to suffix destination directory and destination file names. + + + System.Management.Automation.SwitchParameter + + + False + + + DisAllowSourceTrailingDot + + Disallow trailing dot (.) to suffix source directory and source file names. + + + System.Management.Automation.SwitchParameter + + + False + Force @@ -45409,6 +45800,30 @@ Start-AzStorageBlobIncrementalCopy -CloudBlob $srcBlobSnapshot.ICloudBlob -DestC None + + DisAllowDestTrailingDot + + Disallow trailing dot (.) to suffix destination directory and destination file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + + + DisAllowSourceTrailingDot + + Disallow trailing dot (.) to suffix source directory and source file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + Force @@ -46358,14 +46773,26 @@ Start-AzStorageBlobIncrementalCopy -CloudBlob $srcBlobSnapshot.ICloudBlob -DestC Stop-AzStorageFileCopy - - File + + ShareName - Specifies a CloudFile object. You can create a cloud file or obtain one by using the Get-AzStorageFile cmdlet. + Specifies the name of a share. - Microsoft.Azure.Storage.File.CloudFile + System.String - Microsoft.Azure.Storage.File.CloudFile + System.String + + + None + + + FilePath + + Specifies the path of a file. + + System.String + + System.String None @@ -46430,6 +46857,17 @@ Start-AzStorageBlobIncrementalCopy -CloudBlob $srcBlobSnapshot.ICloudBlob -DestC None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + + System.Management.Automation.SwitchParameter + + + False + Force @@ -46453,18 +46891,6 @@ Start-AzStorageBlobIncrementalCopy -CloudBlob $srcBlobSnapshot.ICloudBlob -DestC None - - ShareFileClient - - ShareFileClient object indicated the file to Stop Copy. - - Azure.Storage.Files.Shares.ShareFileClient - - Azure.Storage.Files.Shares.ShareFileClient - - - None - Confirm @@ -46490,26 +46916,14 @@ Start-AzStorageBlobIncrementalCopy -CloudBlob $srcBlobSnapshot.ICloudBlob -DestC Stop-AzStorageFileCopy - - ShareName - - Specifies the name of a share. - - System.String - - System.String - - - None - - - FilePath + + File - Specifies the path of a file. + Specifies a CloudFile object. You can create a cloud file or obtain one by using the Get-AzStorageFile cmdlet. - System.String + Microsoft.Azure.Storage.File.CloudFile - System.String + Microsoft.Azure.Storage.File.CloudFile None @@ -46597,6 +47011,18 @@ Start-AzStorageBlobIncrementalCopy -CloudBlob $srcBlobSnapshot.ICloudBlob -DestC None + + ShareFileClient + + ShareFileClient object indicated the file to Stop Copy. + + Azure.Storage.Files.Shares.ShareFileClient + + Azure.Storage.Files.Shares.ShareFileClient + + + None + Confirm @@ -46682,6 +47108,18 @@ Start-AzStorageBlobIncrementalCopy -CloudBlob $srcBlobSnapshot.ICloudBlob -DestC None + + DisAllowTrailingDot + + Disallow trailing dot (.) to suffix directory and file names. + + System.Management.Automation.SwitchParameter + + System.Management.Automation.SwitchParameter + + + False + File @@ -47203,9 +47641,9 @@ ContinuationToken : Example 2: Update ACL recursively on a directory, and resume from failure with ContinuationToken - PS C:\> $result = Update-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -Context $ctx + $result = Update-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -Context $ctx -PS C:\> $result +$result FailedEntries : {dir1/dir2/file4} TotalDirectoriesSuccessfulCount : 500 @@ -47213,7 +47651,7 @@ TotalFilesSuccessfulCount : 2500 TotalFailureCount : 1 ContinuationToken : VBaHi5TfyO2ai1wYTRhIL2FjbGNibjA2c3RmATAxRDVEN0UzRENFQzZCRTAvYWRsc3Rlc3QyATAxRDY2M0ZCQTZBN0JGQTkvZGlyMC9kaXIxL2ZpbGUzFgAAAA== -PS C:\> $result.FailedEntries +$result.FailedEntries Name IsDirectory ErrorMessage ---- ----------- ------------ @@ -47221,9 +47659,9 @@ dir0/dir2/file4 False This request is not authorized to perform this opera # user need fix the failed item , then can resume with ContinuationToken -PS C:\> $result = Update-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinuationToken $result.ContinuationToken -Context $ctx +$result = Update-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinuationToken $result.ContinuationToken -Context $ctx -PS C:\> $result +$result FailedEntries : TotalDirectoriesSuccessfulCount : 100 @@ -47278,9 +47716,9 @@ echo "FailedEntries:"$($FailedEntries | ft) Example 4: Update ACL recursively on a directory and ContinueOnFailure, then resume from failures one by one - PS C:\> $result = Update-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinueOnFailure -Context $ctx + $result = Update-AzDataLakeGen2AclRecursive -FileSystem "filesystem1" -Path "dir1" -Acl $acl -ContinueOnFailure -Context $ctx -PS C:\> $result +$result FailedEntries : {dir0/dir1/file1, dir0/dir2/file4} TotalDirectoriesSuccessfulCount : 100 @@ -47288,7 +47726,7 @@ TotalFilesSuccessfulCount : 500 TotalFailureCount : 2 ContinuationToken : VBaHi5TfyO2ai1wYTRhIL2FjbGNibjA2c3RmATAxRDVEN0UzRENFQzZCRTAvYWRsc3Rlc3QyATAxRDY2M0ZCQTZBN0JGQTkvZGlyMC9kaXIxL2ZpbGUzFgAAAA== -PS C:\> $result.FailedEntries +$result.FailedEntries Name IsDirectory ErrorMessage ---- ----------- ------------ @@ -47297,7 +47735,7 @@ dir0/dir2/file4 False This request is not authorized to perform this opera # user need fix the failed item , then can resume with ContinuationToken -PS C:\> foreach ($path in $result.FailedEntries.Name) +foreach ($path in $result.FailedEntries.Name) { # user code to fix failed entry in $path @@ -47832,7 +48270,7 @@ dir2 True 2020-03-23 09:28:36Z rwxrw-rwt -- Example 2: Update all properties on a file, and show them -- - PS C:\> $file = Update-AzDataLakeGen2Item -FileSystem "filesystem1" -Path "dir1/file1" ` + $file = Update-AzDataLakeGen2Item -FileSystem "filesystem1" -Path "dir1/file1" ` -Acl $acl ` -Property @{"ContentType" = "image/jpeg"; "ContentMD5" = "i727sP7HigloQDsqadNLHw=="; "ContentEncoding" = "UDF8"; "CacheControl" = "READ"; "ContentDisposition" = "True"; "ContentLanguage" = "EN-US"} ` -Metadata @{"tag1" = "value1"; "tag2" = "value2" } ` @@ -47840,7 +48278,7 @@ dir2 True 2020-03-23 09:28:36Z rwxrw-rwt -Owner '$superuser' ` -Group '$superuser' -PS C:\> $file +$file FileSystem Name: filesystem1 @@ -47848,7 +48286,7 @@ Path IsDirectory Length LastModified Permissio ---- ----------- ------ ------------ ----------- ----- ----- dir1/file1 False 1024 2020-03-23 09:57:33Z rwxrw-rw- $superuser $superuser -PS C:\> $file.ACL +$file.ACL DefaultScope AccessControlType EntityId Permissions ------------ ----------------- -------- ----------- @@ -47856,7 +48294,7 @@ False User rwx False Group rw- False Other rw- -PS C:\> $file.Permissions +$file.Permissions Owner : Execute, Write, Read Group : Write, Read @@ -47864,14 +48302,14 @@ Other : Write, Read StickyBit : False ExtendedAcls : False -PS C:\> $file.Properties.Metadata +$file.Properties.Metadata Key Value --- ----- tag2 value2 tag1 value1 -PS C:\> $file.Properties +$file.Properties LastModified : 3/23/2020 9:57:33 AM +00:00 diff --git a/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll new file mode 100644 index 000000000000..df579789c3fb Binary files /dev/null and b/Modules/Az.Storage/6.2.0/Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll differ diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.Blob.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.Blob.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.Blob.dll rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.Blob.dll diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.Common.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.Common.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.Common.dll rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.Common.dll diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.DataMovement.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.DataMovement.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.DataMovement.dll rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.DataMovement.dll diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.File.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.File.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.File.dll rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.File.dll diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.Queue.dll b/Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.Queue.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.Azure.Storage.Queue.dll rename to Modules/Az.Storage/6.2.0/Microsoft.Azure.Storage.Queue.dll diff --git a/Modules/Az.Storage/5.10.1/Microsoft.OData.Core.dll b/Modules/Az.Storage/6.2.0/Microsoft.OData.Core.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.OData.Core.dll rename to Modules/Az.Storage/6.2.0/Microsoft.OData.Core.dll diff --git a/Modules/Az.Storage/5.10.1/Microsoft.OData.Edm.dll b/Modules/Az.Storage/6.2.0/Microsoft.OData.Edm.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.OData.Edm.dll rename to Modules/Az.Storage/6.2.0/Microsoft.OData.Edm.dll diff --git a/Modules/Az.Storage/5.10.1/Microsoft.Spatial.dll b/Modules/Az.Storage/6.2.0/Microsoft.Spatial.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/Microsoft.Spatial.dll rename to Modules/Az.Storage/6.2.0/Microsoft.Spatial.dll diff --git a/Modules/Az.Storage/5.10.1/PSGetModuleInfo.xml b/Modules/Az.Storage/6.2.0/PSGetModuleInfo.xml similarity index 56% rename from Modules/Az.Storage/5.10.1/PSGetModuleInfo.xml rename to Modules/Az.Storage/6.2.0/PSGetModuleInfo.xml index c6e969be6b66..e52922aa0211 100644 --- a/Modules/Az.Storage/5.10.1/PSGetModuleInfo.xml +++ b/Modules/Az.Storage/6.2.0/PSGetModuleInfo.xml @@ -7,13 +7,13 @@ Az.Storage - 5.10.1 + 6.2.0 Module Microsoft Azure PowerShell - Storage service data plane and management cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. Creates and manages storage accounts in Azure Resource Manager._x000D__x000A__x000D__x000A_For more information on Storage, please visit the following: https://learn.microsoft.com/azure/storage/ Microsoft Corporation azure-sdk Microsoft Corporation. All rights reserved. -
2023-09-26T01:21:10+02:00
+
2024-04-30T02:21:06-04:00
https://aka.ms/azps-license @@ -43,384 +43,392 @@ - Command + RoleCapability + + + + + + Cmdlet + + Add-AzRmStorageContainerLegalHold + Add-AzStorageAccountManagementPolicyAction + Add-AzStorageAccountNetworkRule + Close-AzStorageFileHandle + Copy-AzStorageBlob + Disable-AzStorageBlobDeleteRetentionPolicy + Disable-AzStorageBlobLastAccessTimeTracking + Disable-AzStorageBlobRestorePolicy + Disable-AzStorageContainerDeleteRetentionPolicy + Disable-AzStorageDeleteRetentionPolicy + Disable-AzStorageStaticWebsite + Enable-AzStorageBlobDeleteRetentionPolicy + Enable-AzStorageBlobLastAccessTimeTracking + Enable-AzStorageBlobRestorePolicy + Enable-AzStorageContainerDeleteRetentionPolicy + Enable-AzStorageDeleteRetentionPolicy + Enable-AzStorageStaticWebsite + Get-AzDataLakeGen2ChildItem + Get-AzDataLakeGen2DeletedItem + Get-AzDataLakeGen2Item + Get-AzDataLakeGen2ItemContent + Get-AzRmStorageContainer + Get-AzRmStorageContainerImmutabilityPolicy + Get-AzRmStorageShare Get-AzStorageAccount Get-AzStorageAccountKey - New-AzStorageAccount - New-AzStorageAccountKey - Remove-AzStorageAccount - Set-AzCurrentStorageAccount - Set-AzStorageAccount + Get-AzStorageAccountManagementPolicy Get-AzStorageAccountNameAvailability - Get-AzStorageUsage - Update-AzStorageAccountNetworkRuleSet Get-AzStorageAccountNetworkRuleSet - Add-AzStorageAccountNetworkRule - Remove-AzStorageAccountNetworkRule - Get-AzStorageTable - New-AzStorageTableSASToken - New-AzStorageTableStoredAccessPolicy - New-AzStorageTable - Remove-AzStorageTableStoredAccessPolicy - Remove-AzStorageTable - Get-AzStorageTableStoredAccessPolicy - Set-AzStorageTableStoredAccessPolicy - Get-AzStorageQueue - New-AzStorageQueue - Remove-AzStorageQueue - Get-AzStorageQueueStoredAccessPolicy - New-AzStorageQueueSASToken - New-AzStorageQueueStoredAccessPolicy - Remove-AzStorageQueueStoredAccessPolicy - Set-AzStorageQueueStoredAccessPolicy + Get-AzStorageBlob + Get-AzStorageBlobByTag + Get-AzStorageBlobContent + Get-AzStorageBlobCopyState + Get-AzStorageBlobInventoryPolicy + Get-AzStorageBlobQueryResult + Get-AzStorageBlobServiceProperty + Get-AzStorageBlobTag + Get-AzStorageContainer + Get-AzStorageContainerStoredAccessPolicy + Get-AzStorageCORSRule + Get-AzStorageEncryptionScope Get-AzStorageFile Get-AzStorageFileContent Get-AzStorageFileCopyState + Get-AzStorageFileHandle + Get-AzStorageFileServiceProperty + Get-AzStorageLocalUser + Get-AzStorageLocalUserKey + Get-AzStorageObjectReplicationPolicy + Get-AzStorageQueue + Get-AzStorageQueueStoredAccessPolicy + Get-AzStorageServiceLoggingProperty + Get-AzStorageServiceMetricsProperty + Get-AzStorageServiceProperty Get-AzStorageShare Get-AzStorageShareStoredAccessPolicy + Get-AzStorageTable + Get-AzStorageTableStoredAccessPolicy + Get-AzStorageUsage + Invoke-AzRmStorageContainerImmutableStorageWithVersioningMigration + Invoke-AzStorageAccountFailover + Invoke-AzStorageAccountHierarchicalNamespaceUpgrade + Lock-AzRmStorageContainerImmutabilityPolicy + Move-AzDataLakeGen2Item + New-AzDataLakeGen2Item + New-AzDataLakeGen2SasToken + New-AzRmStorageContainer + New-AzRmStorageShare + New-AzStorageAccount + New-AzStorageAccountKey + New-AzStorageAccountManagementPolicyBlobIndexMatchObject + New-AzStorageAccountManagementPolicyFilter + New-AzStorageAccountManagementPolicyRule + New-AzStorageAccountSASToken + New-AzStorageBlobInventoryPolicyRule + New-AzStorageBlobQueryConfig + New-AzStorageBlobRangeToRestore + New-AzStorageBlobSASToken + New-AzStorageContainer + New-AzStorageContainerSASToken + New-AzStorageContainerStoredAccessPolicy + New-AzStorageContext New-AzStorageDirectory + New-AzStorageEncryptionScope New-AzStorageFileSASToken + New-AzStorageLocalUserPermissionScope + New-AzStorageLocalUserSshPassword + New-AzStorageLocalUserSshPublicKey + New-AzStorageObjectReplicationPolicyRule + New-AzStorageQueue + New-AzStorageQueueSASToken + New-AzStorageQueueStoredAccessPolicy New-AzStorageShare New-AzStorageShareSASToken New-AzStorageShareStoredAccessPolicy + New-AzStorageTable + New-AzStorageTableSASToken + New-AzStorageTableStoredAccessPolicy + Remove-AzDataLakeGen2AclRecursive + Remove-AzDataLakeGen2Item + Remove-AzRmStorageContainer + Remove-AzRmStorageContainerImmutabilityPolicy + Remove-AzRmStorageContainerLegalHold + Remove-AzRmStorageShare + Remove-AzStorageAccount + Remove-AzStorageAccountManagementPolicy + Remove-AzStorageAccountNetworkRule + Remove-AzStorageBlob + Remove-AzStorageBlobImmutabilityPolicy + Remove-AzStorageBlobInventoryPolicy + Remove-AzStorageContainer + Remove-AzStorageContainerStoredAccessPolicy + Remove-AzStorageCORSRule Remove-AzStorageDirectory Remove-AzStorageFile + Remove-AzStorageLocalUser + Remove-AzStorageObjectReplicationPolicy + Remove-AzStorageQueue + Remove-AzStorageQueueStoredAccessPolicy Remove-AzStorageShare Remove-AzStorageShareStoredAccessPolicy - Set-AzStorageFileContent - Set-AzStorageShareQuota - Set-AzStorageShareStoredAccessPolicy - Start-AzStorageFileCopy - Stop-AzStorageFileCopy - New-AzStorageAccountSASToken + Remove-AzStorageTable + Remove-AzStorageTableStoredAccessPolicy + Rename-AzStorageDirectory + Rename-AzStorageFile + Restore-AzDataLakeGen2DeletedItem + Restore-AzRmStorageShare + Restore-AzStorageBlobRange + Restore-AzStorageContainer + Revoke-AzStorageAccountUserDelegationKeys + Set-AzCurrentStorageAccount + Set-AzDataLakeGen2AclRecursive + Set-AzDataLakeGen2ItemAclObject + Set-AzRmStorageContainerImmutabilityPolicy + Set-AzStorageAccount + Set-AzStorageAccountManagementPolicy + Set-AzStorageBlobContent + Set-AzStorageBlobImmutabilityPolicy + Set-AzStorageBlobInventoryPolicy + Set-AzStorageBlobLegalHold + Set-AzStorageBlobTag + Set-AzStorageContainerAcl + Set-AzStorageContainerStoredAccessPolicy Set-AzStorageCORSRule - Get-AzStorageCORSRule - Get-AzStorageServiceLoggingProperty - Get-AzStorageServiceMetricsProperty - Remove-AzStorageCORSRule + Set-AzStorageFileContent + Set-AzStorageLocalUser + Set-AzStorageObjectReplicationPolicy + Set-AzStorageQueueStoredAccessPolicy Set-AzStorageServiceLoggingProperty Set-AzStorageServiceMetricsProperty - New-AzStorageContext - Set-AzStorageContainerAcl - Remove-AzStorageBlob - Set-AzStorageBlobContent - Get-AzStorageBlob - Get-AzStorageBlobContent - Get-AzStorageBlobCopyState - Get-AzStorageContainer - Get-AzStorageContainerStoredAccessPolicy - New-AzStorageBlobSASToken - New-AzStorageContainer - New-AzStorageContainerSASToken - New-AzStorageContainerStoredAccessPolicy - Remove-AzStorageContainer - Remove-AzStorageContainerStoredAccessPolicy - Set-AzStorageContainerStoredAccessPolicy + Set-AzStorageShareQuota + Set-AzStorageShareStoredAccessPolicy + Set-AzStorageTableStoredAccessPolicy Start-AzStorageBlobCopy Start-AzStorageBlobIncrementalCopy + Start-AzStorageFileCopy + Stop-AzStorageAccountHierarchicalNamespaceUpgrade Stop-AzStorageBlobCopy + Stop-AzStorageFileCopy + Update-AzDataLakeGen2AclRecursive + Update-AzDataLakeGen2Item + Update-AzRmStorageContainer + Update-AzRmStorageShare + Update-AzStorageAccountNetworkRuleSet + Update-AzStorageBlobServiceProperty + Update-AzStorageEncryptionScope + Update-AzStorageFileServiceProperty Update-AzStorageServiceProperty - Get-AzStorageServiceProperty - Enable-AzStorageDeleteRetentionPolicy + + + + + Command + + + + Add-AzRmStorageContainerLegalHold + Add-AzStorageAccountManagementPolicyAction + Add-AzStorageAccountNetworkRule + Close-AzStorageFileHandle + Copy-AzStorageBlob + Disable-AzStorageBlobDeleteRetentionPolicy + Disable-AzStorageBlobLastAccessTimeTracking + Disable-AzStorageBlobRestorePolicy + Disable-AzStorageContainerDeleteRetentionPolicy Disable-AzStorageDeleteRetentionPolicy - Enable-AzStorageStaticWebsite Disable-AzStorageStaticWebsite + Enable-AzStorageBlobDeleteRetentionPolicy + Enable-AzStorageBlobLastAccessTimeTracking + Enable-AzStorageBlobRestorePolicy + Enable-AzStorageContainerDeleteRetentionPolicy + Enable-AzStorageDeleteRetentionPolicy + Enable-AzStorageStaticWebsite + Get-AzDataLakeGen2ChildItem + Get-AzDataLakeGen2DeletedItem + Get-AzDataLakeGen2Item + Get-AzDataLakeGen2ItemContent Get-AzRmStorageContainer - Update-AzRmStorageContainer - New-AzRmStorageContainer - Remove-AzRmStorageContainer - Add-AzRmStorageContainerLegalHold - Remove-AzRmStorageContainerLegalHold - Set-AzRmStorageContainerImmutabilityPolicy Get-AzRmStorageContainerImmutabilityPolicy - Remove-AzRmStorageContainerImmutabilityPolicy - Lock-AzRmStorageContainerImmutabilityPolicy - Set-AzStorageAccountManagementPolicy - Get-AzStorageAccountManagementPolicy - Remove-AzStorageAccountManagementPolicy - New-AzStorageAccountManagementPolicyFilter - New-AzStorageAccountManagementPolicyRule - Add-AzStorageAccountManagementPolicyAction - Update-AzStorageBlobServiceProperty - Get-AzStorageBlobServiceProperty - Enable-AzStorageBlobDeleteRetentionPolicy - Disable-AzStorageBlobDeleteRetentionPolicy - Revoke-AzStorageAccountUserDelegationKeys - Get-AzStorageFileHandle - Close-AzStorageFileHandle - New-AzRmStorageShare - Remove-AzRmStorageShare Get-AzRmStorageShare - Update-AzRmStorageShare - Update-AzStorageFileServiceProperty - Get-AzStorageFileServiceProperty - Restore-AzRmStorageShare - Get-AzDataLakeGen2ChildItem - Get-AzDataLakeGen2Item - New-AzDataLakeGen2Item - Move-AzDataLakeGen2Item - Remove-AzDataLakeGen2Item - Update-AzDataLakeGen2Item - Set-AzDataLakeGen2ItemAclObject - Get-AzDataLakeGen2ItemContent - Invoke-AzStorageAccountFailover - Get-AzStorageBlobQueryResult - New-AzStorageBlobQueryConfig - New-AzStorageObjectReplicationPolicyRule - Set-AzStorageObjectReplicationPolicy - Get-AzStorageObjectReplicationPolicy - Remove-AzStorageObjectReplicationPolicy - Enable-AzStorageBlobRestorePolicy - Disable-AzStorageBlobRestorePolicy - New-AzStorageBlobRangeToRestore - Restore-AzStorageBlobRange - Set-AzDataLakeGen2AclRecursive - Update-AzDataLakeGen2AclRecursive - Remove-AzDataLakeGen2AclRecursive - New-AzStorageEncryptionScope - Update-AzStorageEncryptionScope - Get-AzStorageEncryptionScope - Copy-AzStorageBlob - Set-AzStorageBlobInventoryPolicy - New-AzStorageBlobInventoryPolicyRule - Get-AzStorageBlobInventoryPolicy - Remove-AzStorageBlobInventoryPolicy - Enable-AzStorageContainerDeleteRetentionPolicy - Disable-AzStorageContainerDeleteRetentionPolicy - Restore-AzStorageContainer - Enable-AzStorageBlobLastAccessTimeTracking - Disable-AzStorageBlobLastAccessTimeTracking - Set-AzStorageBlobTag - Get-AzStorageBlobTag - Get-AzStorageBlobByTag - Invoke-AzStorageAccountHierarchicalNamespaceUpgrade - Stop-AzStorageAccountHierarchicalNamespaceUpgrade - Set-AzStorageBlobImmutabilityPolicy - Remove-AzStorageBlobImmutabilityPolicy - Set-AzStorageBlobLegalHold - Invoke-AzRmStorageContainerImmutableStorageWithVersioningMigration - New-AzDataLakeGen2SasToken - New-AzStorageAccountManagementPolicyBlobIndexMatchObject - Set-AzStorageLocalUser - Get-AzStorageLocalUser - Remove-AzStorageLocalUser - Get-AzStorageLocalUserKey - New-AzStorageLocalUserSshPassword - New-AzStorageLocalUserSshPublicKey - New-AzStorageLocalUserPermissionScope - Get-AzDataLakeGen2DeletedItem - Restore-AzDataLakeGen2DeletedItem - Rename-AzStorageFile - Rename-AzStorageDirectory - - - - - RoleCapability - - - - - - - Workflow - - - - DscResource - - - - Function - - - - Cmdlet - - - Get-AzStorageAccount Get-AzStorageAccountKey - New-AzStorageAccount - New-AzStorageAccountKey - Remove-AzStorageAccount - Set-AzCurrentStorageAccount - Set-AzStorageAccount + Get-AzStorageAccountManagementPolicy Get-AzStorageAccountNameAvailability - Get-AzStorageUsage - Update-AzStorageAccountNetworkRuleSet Get-AzStorageAccountNetworkRuleSet - Add-AzStorageAccountNetworkRule - Remove-AzStorageAccountNetworkRule - Get-AzStorageTable - New-AzStorageTableSASToken - New-AzStorageTableStoredAccessPolicy - New-AzStorageTable - Remove-AzStorageTableStoredAccessPolicy - Remove-AzStorageTable - Get-AzStorageTableStoredAccessPolicy - Set-AzStorageTableStoredAccessPolicy - Get-AzStorageQueue - New-AzStorageQueue - Remove-AzStorageQueue - Get-AzStorageQueueStoredAccessPolicy - New-AzStorageQueueSASToken - New-AzStorageQueueStoredAccessPolicy - Remove-AzStorageQueueStoredAccessPolicy - Set-AzStorageQueueStoredAccessPolicy + Get-AzStorageBlob + Get-AzStorageBlobByTag + Get-AzStorageBlobContent + Get-AzStorageBlobCopyState + Get-AzStorageBlobInventoryPolicy + Get-AzStorageBlobQueryResult + Get-AzStorageBlobServiceProperty + Get-AzStorageBlobTag + Get-AzStorageContainer + Get-AzStorageContainerStoredAccessPolicy + Get-AzStorageCORSRule + Get-AzStorageEncryptionScope Get-AzStorageFile Get-AzStorageFileContent Get-AzStorageFileCopyState + Get-AzStorageFileHandle + Get-AzStorageFileServiceProperty + Get-AzStorageLocalUser + Get-AzStorageLocalUserKey + Get-AzStorageObjectReplicationPolicy + Get-AzStorageQueue + Get-AzStorageQueueStoredAccessPolicy + Get-AzStorageServiceLoggingProperty + Get-AzStorageServiceMetricsProperty + Get-AzStorageServiceProperty Get-AzStorageShare Get-AzStorageShareStoredAccessPolicy + Get-AzStorageTable + Get-AzStorageTableStoredAccessPolicy + Get-AzStorageUsage + Invoke-AzRmStorageContainerImmutableStorageWithVersioningMigration + Invoke-AzStorageAccountFailover + Invoke-AzStorageAccountHierarchicalNamespaceUpgrade + Lock-AzRmStorageContainerImmutabilityPolicy + Move-AzDataLakeGen2Item + New-AzDataLakeGen2Item + New-AzDataLakeGen2SasToken + New-AzRmStorageContainer + New-AzRmStorageShare + New-AzStorageAccount + New-AzStorageAccountKey + New-AzStorageAccountManagementPolicyBlobIndexMatchObject + New-AzStorageAccountManagementPolicyFilter + New-AzStorageAccountManagementPolicyRule + New-AzStorageAccountSASToken + New-AzStorageBlobInventoryPolicyRule + New-AzStorageBlobQueryConfig + New-AzStorageBlobRangeToRestore + New-AzStorageBlobSASToken + New-AzStorageContainer + New-AzStorageContainerSASToken + New-AzStorageContainerStoredAccessPolicy + New-AzStorageContext New-AzStorageDirectory + New-AzStorageEncryptionScope New-AzStorageFileSASToken + New-AzStorageLocalUserPermissionScope + New-AzStorageLocalUserSshPassword + New-AzStorageLocalUserSshPublicKey + New-AzStorageObjectReplicationPolicyRule + New-AzStorageQueue + New-AzStorageQueueSASToken + New-AzStorageQueueStoredAccessPolicy New-AzStorageShare New-AzStorageShareSASToken New-AzStorageShareStoredAccessPolicy + New-AzStorageTable + New-AzStorageTableSASToken + New-AzStorageTableStoredAccessPolicy + Remove-AzDataLakeGen2AclRecursive + Remove-AzDataLakeGen2Item + Remove-AzRmStorageContainer + Remove-AzRmStorageContainerImmutabilityPolicy + Remove-AzRmStorageContainerLegalHold + Remove-AzRmStorageShare + Remove-AzStorageAccount + Remove-AzStorageAccountManagementPolicy + Remove-AzStorageAccountNetworkRule + Remove-AzStorageBlob + Remove-AzStorageBlobImmutabilityPolicy + Remove-AzStorageBlobInventoryPolicy + Remove-AzStorageContainer + Remove-AzStorageContainerStoredAccessPolicy + Remove-AzStorageCORSRule Remove-AzStorageDirectory Remove-AzStorageFile + Remove-AzStorageLocalUser + Remove-AzStorageObjectReplicationPolicy + Remove-AzStorageQueue + Remove-AzStorageQueueStoredAccessPolicy Remove-AzStorageShare Remove-AzStorageShareStoredAccessPolicy - Set-AzStorageFileContent - Set-AzStorageShareQuota - Set-AzStorageShareStoredAccessPolicy - Start-AzStorageFileCopy - Stop-AzStorageFileCopy - New-AzStorageAccountSASToken + Remove-AzStorageTable + Remove-AzStorageTableStoredAccessPolicy + Rename-AzStorageDirectory + Rename-AzStorageFile + Restore-AzDataLakeGen2DeletedItem + Restore-AzRmStorageShare + Restore-AzStorageBlobRange + Restore-AzStorageContainer + Revoke-AzStorageAccountUserDelegationKeys + Set-AzCurrentStorageAccount + Set-AzDataLakeGen2AclRecursive + Set-AzDataLakeGen2ItemAclObject + Set-AzRmStorageContainerImmutabilityPolicy + Set-AzStorageAccount + Set-AzStorageAccountManagementPolicy + Set-AzStorageBlobContent + Set-AzStorageBlobImmutabilityPolicy + Set-AzStorageBlobInventoryPolicy + Set-AzStorageBlobLegalHold + Set-AzStorageBlobTag + Set-AzStorageContainerAcl + Set-AzStorageContainerStoredAccessPolicy Set-AzStorageCORSRule - Get-AzStorageCORSRule - Get-AzStorageServiceLoggingProperty - Get-AzStorageServiceMetricsProperty - Remove-AzStorageCORSRule + Set-AzStorageFileContent + Set-AzStorageLocalUser + Set-AzStorageObjectReplicationPolicy + Set-AzStorageQueueStoredAccessPolicy Set-AzStorageServiceLoggingProperty Set-AzStorageServiceMetricsProperty - New-AzStorageContext - Set-AzStorageContainerAcl - Remove-AzStorageBlob - Set-AzStorageBlobContent - Get-AzStorageBlob - Get-AzStorageBlobContent - Get-AzStorageBlobCopyState - Get-AzStorageContainer - Get-AzStorageContainerStoredAccessPolicy - New-AzStorageBlobSASToken - New-AzStorageContainer - New-AzStorageContainerSASToken - New-AzStorageContainerStoredAccessPolicy - Remove-AzStorageContainer - Remove-AzStorageContainerStoredAccessPolicy - Set-AzStorageContainerStoredAccessPolicy + Set-AzStorageShareQuota + Set-AzStorageShareStoredAccessPolicy + Set-AzStorageTableStoredAccessPolicy Start-AzStorageBlobCopy Start-AzStorageBlobIncrementalCopy + Start-AzStorageFileCopy + Stop-AzStorageAccountHierarchicalNamespaceUpgrade Stop-AzStorageBlobCopy - Update-AzStorageServiceProperty - Get-AzStorageServiceProperty - Enable-AzStorageDeleteRetentionPolicy - Disable-AzStorageDeleteRetentionPolicy - Enable-AzStorageStaticWebsite - Disable-AzStorageStaticWebsite - Get-AzRmStorageContainer + Stop-AzStorageFileCopy + Update-AzDataLakeGen2AclRecursive + Update-AzDataLakeGen2Item Update-AzRmStorageContainer - New-AzRmStorageContainer - Remove-AzRmStorageContainer - Add-AzRmStorageContainerLegalHold - Remove-AzRmStorageContainerLegalHold - Set-AzRmStorageContainerImmutabilityPolicy - Get-AzRmStorageContainerImmutabilityPolicy - Remove-AzRmStorageContainerImmutabilityPolicy - Lock-AzRmStorageContainerImmutabilityPolicy - Set-AzStorageAccountManagementPolicy - Get-AzStorageAccountManagementPolicy - Remove-AzStorageAccountManagementPolicy - New-AzStorageAccountManagementPolicyFilter - New-AzStorageAccountManagementPolicyRule - Add-AzStorageAccountManagementPolicyAction - Update-AzStorageBlobServiceProperty - Get-AzStorageBlobServiceProperty - Enable-AzStorageBlobDeleteRetentionPolicy - Disable-AzStorageBlobDeleteRetentionPolicy - Revoke-AzStorageAccountUserDelegationKeys - Get-AzStorageFileHandle - Close-AzStorageFileHandle - New-AzRmStorageShare - Remove-AzRmStorageShare - Get-AzRmStorageShare Update-AzRmStorageShare - Update-AzStorageFileServiceProperty - Get-AzStorageFileServiceProperty - Restore-AzRmStorageShare - Get-AzDataLakeGen2ChildItem - Get-AzDataLakeGen2Item - New-AzDataLakeGen2Item - Move-AzDataLakeGen2Item - Remove-AzDataLakeGen2Item - Update-AzDataLakeGen2Item - Set-AzDataLakeGen2ItemAclObject - Get-AzDataLakeGen2ItemContent - Invoke-AzStorageAccountFailover - Get-AzStorageBlobQueryResult - New-AzStorageBlobQueryConfig - New-AzStorageObjectReplicationPolicyRule - Set-AzStorageObjectReplicationPolicy - Get-AzStorageObjectReplicationPolicy - Remove-AzStorageObjectReplicationPolicy - Enable-AzStorageBlobRestorePolicy - Disable-AzStorageBlobRestorePolicy - New-AzStorageBlobRangeToRestore - Restore-AzStorageBlobRange - Set-AzDataLakeGen2AclRecursive - Update-AzDataLakeGen2AclRecursive - Remove-AzDataLakeGen2AclRecursive - New-AzStorageEncryptionScope + Update-AzStorageAccountNetworkRuleSet + Update-AzStorageBlobServiceProperty Update-AzStorageEncryptionScope - Get-AzStorageEncryptionScope - Copy-AzStorageBlob - Set-AzStorageBlobInventoryPolicy - New-AzStorageBlobInventoryPolicyRule - Get-AzStorageBlobInventoryPolicy - Remove-AzStorageBlobInventoryPolicy - Enable-AzStorageContainerDeleteRetentionPolicy - Disable-AzStorageContainerDeleteRetentionPolicy - Restore-AzStorageContainer - Enable-AzStorageBlobLastAccessTimeTracking - Disable-AzStorageBlobLastAccessTimeTracking - Set-AzStorageBlobTag - Get-AzStorageBlobTag - Get-AzStorageBlobByTag - Invoke-AzStorageAccountHierarchicalNamespaceUpgrade - Stop-AzStorageAccountHierarchicalNamespaceUpgrade - Set-AzStorageBlobImmutabilityPolicy - Remove-AzStorageBlobImmutabilityPolicy - Set-AzStorageBlobLegalHold - Invoke-AzRmStorageContainerImmutableStorageWithVersioningMigration - New-AzDataLakeGen2SasToken - New-AzStorageAccountManagementPolicyBlobIndexMatchObject - Set-AzStorageLocalUser - Get-AzStorageLocalUser - Remove-AzStorageLocalUser - Get-AzStorageLocalUserKey - New-AzStorageLocalUserSshPassword - New-AzStorageLocalUserSshPublicKey - New-AzStorageLocalUserPermissionScope - Get-AzDataLakeGen2DeletedItem - Restore-AzDataLakeGen2DeletedItem - Rename-AzStorageFile - Rename-AzStorageDirectory + Update-AzStorageFileServiceProperty + Update-AzStorageServiceProperty + Get-AzStorageAccountMigration + Start-AzStorageAccountMigration + + + + + DscResource + + + + Function + + + + Get-AzStorageAccountMigration + Start-AzStorageAccountMigration + + Workflow + + - * Added warning messages for an upcoming breaking change that the output Permissions will be changed to a string when creating and updating a Queue access policy_x000D__x000A_ - 'Get-AzStorageQueueStoredAccessPolicy'_x000D__x000A_ - 'Set-AzStorageQueueStoredAccessPolicy' - + * Introduced secrets detection feature to safeguard sensitive data._x000D__x000A_* Fixed object replication policy time format parsing issue [#24434]_x000D__x000A_* Updated download offset and content length calculation logic for downloading files _x000D__x000A_ - 'Get-AzStorageFileContent' + - + System.Collections.Specialized.OrderedDictionary System.Object @@ -432,11 +440,11 @@ MinimumVersion - 2.13.1 + 2.19.0 CanonicalId - nuget:Az.Accounts/2.13.1 + nuget:Az.Accounts/2.19.0 @@ -445,7 +453,7 @@ https://www.powershellgallery.com/api/v2 PSGallery NuGet - + System.Management.Automation.PSCustomObject System.Object @@ -454,31 +462,30 @@ Microsoft Corporation. All rights reserved. Microsoft Azure PowerShell - Storage service data plane and management cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. Creates and manages storage accounts in Azure Resource Manager._x000D__x000A__x000D__x000A_For more information on Storage, please visit the following: https://learn.microsoft.com/azure/storage/ True - * Added warning messages for an upcoming breaking change that the output Permissions will be changed to a string when creating and updating a Queue access policy_x000D__x000A_ - 'Get-AzStorageQueueStoredAccessPolicy'_x000D__x000A_ - 'Set-AzStorageQueueStoredAccessPolicy' + * Introduced secrets detection feature to safeguard sensitive data._x000D__x000A_* Fixed object replication policy time format parsing issue [#24434]_x000D__x000A_* Updated download offset and content length calculation logic for downloading files _x000D__x000A_ - 'Get-AzStorageFileContent' True True - 1959915 - 78641298 - 4535104 - 26/09/2023 01:21:10 +02:00 - 26/09/2023 01:21:10 +02:00 - 21/10/2023 12:36:30 +02:00 - Azure ResourceManager ARM Storage StorageAccount PSModule PSEdition_Core PSEdition_Desktop + 798288 + 108395456 + 5292883 + 4/30/2024 2:21:06 AM -04:00 + 4/30/2024 2:21:06 AM -04:00 + 5/3/2024 11:57:47 PM -04:00 + Azure ResourceManager ARM Storage StorageAccount PSModule PSEdition_Core PSEdition_Desktop PSCmdlet_Add-AzRmStorageContainerLegalHold PSCommand_Add-AzRmStorageContainerLegalHold PSCmdlet_Add-AzStorageAccountManagementPolicyAction PSCommand_Add-AzStorageAccountManagementPolicyAction PSCmdlet_Add-AzStorageAccountNetworkRule PSCommand_Add-AzStorageAccountNetworkRule PSCmdlet_Close-AzStorageFileHandle PSCommand_Close-AzStorageFileHandle PSCmdlet_Copy-AzStorageBlob PSCommand_Copy-AzStorageBlob PSCmdlet_Disable-AzStorageBlobDeleteRetentionPolicy PSCommand_Disable-AzStorageBlobDeleteRetentionPolicy PSCmdlet_Disable-AzStorageBlobLastAccessTimeTracking PSCommand_Disable-AzStorageBlobLastAccessTimeTracking PSCmdlet_Disable-AzStorageBlobRestorePolicy PSCommand_Disable-AzStorageBlobRestorePolicy PSCmdlet_Disable-AzStorageContainerDeleteRetentionPolicy PSCommand_Disable-AzStorageContainerDeleteRetentionPolicy PSCmdlet_Disable-AzStorageDeleteRetentionPolicy PSCommand_Disable-AzStorageDeleteRetentionPolicy PSCmdlet_Disable-AzStorageStaticWebsite PSCommand_Disable-AzStorageStaticWebsite PSCmdlet_Enable-AzStorageBlobDeleteRetentionPolicy PSCommand_Enable-AzStorageBlobDeleteRetentionPolicy PSCmdlet_Enable-AzStorageBlobLastAccessTimeTracking PSCommand_Enable-AzStorageBlobLastAccessTimeTracking PSCmdlet_Enable-AzStorageBlobRestorePolicy PSCommand_Enable-AzStorageBlobRestorePolicy PSCmdlet_Enable-AzStorageContainerDeleteRetentionPolicy PSCommand_Enable-AzStorageContainerDeleteRetentionPolicy PSCmdlet_Enable-AzStorageDeleteRetentionPolicy PSCommand_Enable-AzStorageDeleteRetentionPolicy PSCmdlet_Enable-AzStorageStaticWebsite PSCommand_Enable-AzStorageStaticWebsite PSCmdlet_Get-AzDataLakeGen2ChildItem PSCommand_Get-AzDataLakeGen2ChildItem PSCmdlet_Get-AzDataLakeGen2DeletedItem PSCommand_Get-AzDataLakeGen2DeletedItem PSCmdlet_Get-AzDataLakeGen2Item PSCommand_Get-AzDataLakeGen2Item PSCmdlet_Get-AzDataLakeGen2ItemContent PSCommand_Get-AzDataLakeGen2ItemContent PSCmdlet_Get-AzRmStorageContainer PSCommand_Get-AzRmStorageContainer PSCmdlet_Get-AzRmStorageContainerImmutabilityPolicy PSCommand_Get-AzRmStorageContainerImmutabilityPolicy PSCmdlet_Get-AzRmStorageShare PSCommand_Get-AzRmStorageShare PSCmdlet_Get-AzStorageAccount PSCommand_Get-AzStorageAccount PSCmdlet_Get-AzStorageAccountKey PSCommand_Get-AzStorageAccountKey PSCmdlet_Get-AzStorageAccountManagementPolicy PSCommand_Get-AzStorageAccountManagementPolicy PSCmdlet_Get-AzStorageAccountNameAvailability PSCommand_Get-AzStorageAccountNameAvailability PSCmdlet_Get-AzStorageAccountNetworkRuleSet PSCommand_Get-AzStorageAccountNetworkRuleSet PSCmdlet_Get-AzStorageBlob PSCommand_Get-AzStorageBlob PSCmdlet_Get-AzStorageBlobByTag PSCommand_Get-AzStorageBlobByTag PSCmdlet_Get-AzStorageBlobContent PSCommand_Get-AzStorageBlobContent PSCmdlet_Get-AzStorageBlobCopyState PSCommand_Get-AzStorageBlobCopyState PSCmdlet_Get-AzStorageBlobInventoryPolicy PSCommand_Get-AzStorageBlobInventoryPolicy PSCmdlet_Get-AzStorageBlobQueryResult PSCommand_Get-AzStorageBlobQueryResult PSCmdlet_Get-AzStorageBlobServiceProperty PSCommand_Get-AzStorageBlobServiceProperty PSCmdlet_Get-AzStorageBlobTag PSCommand_Get-AzStorageBlobTag PSCmdlet_Get-AzStorageContainer PSCommand_Get-AzStorageContainer PSCmdlet_Get-AzStorageContainerStoredAccessPolicy PSCommand_Get-AzStorageContainerStoredAccessPolicy PSCmdlet_Get-AzStorageCORSRule PSCommand_Get-AzStorageCORSRule PSCmdlet_Get-AzStorageEncryptionScope PSCommand_Get-AzStorageEncryptionScope PSCmdlet_Get-AzStorageFile PSCommand_Get-AzStorageFile PSCmdlet_Get-AzStorageFileContent PSCommand_Get-AzStorageFileContent PSCmdlet_Get-AzStorageFileCopyState PSCommand_Get-AzStorageFileCopyState PSCmdlet_Get-AzStorageFileHandle PSCommand_Get-AzStorageFileHandle PSCmdlet_Get-AzStorageFileServiceProperty PSCommand_Get-AzStorageFileServiceProperty PSCmdlet_Get-AzStorageLocalUser PSCommand_Get-AzStorageLocalUser PSCmdlet_Get-AzStorageLocalUserKey PSCommand_Get-AzStorageLocalUserKey PSCmdlet_Get-AzStorageObjectReplicationPolicy PSCommand_Get-AzStorageObjectReplicationPolicy PSCmdlet_Get-AzStorageQueue PSCommand_Get-AzStorageQueue PSCmdlet_Get-AzStorageQueueStoredAccessPolicy PSCommand_Get-AzStorageQueueStoredAccessPolicy PSCmdlet_Get-AzStorageServiceLoggingProperty PSCommand_Get-AzStorageServiceLoggingProperty PSCmdlet_Get-AzStorageServiceMetricsProperty PSCommand_Get-AzStorageServiceMetricsProperty PSCmdlet_Get-AzStorageServiceProperty PSCommand_Get-AzStorageServiceProperty PSCmdlet_Get-AzStorageShare PSCommand_Get-AzStorageShare PSCmdlet_Get-AzStorageShareStoredAccessPolicy PSCommand_Get-AzStorageShareStoredAccessPolicy PSCmdlet_Get-AzStorageTable PSCommand_Get-AzStorageTable PSCmdlet_Get-AzStorageTableStoredAccessPolicy PSCommand_Get-AzStorageTableStoredAccessPolicy PSCmdlet_Get-AzStorageUsage PSCommand_Get-AzStorageUsage PSCmdlet_Invoke-AzRmStorageContainerImmutableStorageWithVersioningMigration PSCommand_Invoke-AzRmStorageContainerImmutableStorageWithVersioningMigration PSCmdlet_Invoke-AzStorageAccountFailover PSCommand_Invoke-AzStorageAccountFailover PSCmdlet_Invoke-AzStorageAccountHierarchicalNamespaceUpgrade PSCommand_Invoke-AzStorageAccountHierarchicalNamespaceUpgrade PSCmdlet_Lock-AzRmStorageContainerImmutabilityPolicy PSCommand_Lock-AzRmStorageContainerImmutabilityPolicy PSCmdlet_Move-AzDataLakeGen2Item PSCommand_Move-AzDataLakeGen2Item PSCmdlet_New-AzDataLakeGen2Item PSCommand_New-AzDataLakeGen2Item PSCmdlet_New-AzDataLakeGen2SasToken PSCommand_New-AzDataLakeGen2SasToken PSCmdlet_New-AzRmStorageContainer PSCommand_New-AzRmStorageContainer PSCmdlet_New-AzRmStorageShare PSCommand_New-AzRmStorageShare PSCmdlet_New-AzStorageAccount PSCommand_New-AzStorageAccount PSCmdlet_New-AzStorageAccountKey PSCommand_New-AzStorageAccountKey PSCmdlet_New-AzStorageAccountManagementPolicyBlobIndexMatchObject PSCommand_New-AzStorageAccountManagementPolicyBlobIndexMatchObject PSCmdlet_New-AzStorageAccountManagementPolicyFilter PSCommand_New-AzStorageAccountManagementPolicyFilter PSCmdlet_New-AzStorageAccountManagementPolicyRule PSCommand_New-AzStorageAccountManagementPolicyRule PSCmdlet_New-AzStorageAccountSASToken PSCommand_New-AzStorageAccountSASToken PSCmdlet_New-AzStorageBlobInventoryPolicyRule PSCommand_New-AzStorageBlobInventoryPolicyRule PSCmdlet_New-AzStorageBlobQueryConfig PSCommand_New-AzStorageBlobQueryConfig PSCmdlet_New-AzStorageBlobRangeToRestore PSCommand_New-AzStorageBlobRangeToRestore PSCmdlet_New-AzStorageBlobSASToken PSCommand_New-AzStorageBlobSASToken PSCmdlet_New-AzStorageContainer PSCommand_New-AzStorageContainer PSCmdlet_New-AzStorageContainerSASToken PSCommand_New-AzStorageContainerSASToken PSCmdlet_New-AzStorageContainerStoredAccessPolicy PSCommand_New-AzStorageContainerStoredAccessPolicy PSCmdlet_New-AzStorageContext PSCommand_New-AzStorageContext PSCmdlet_New-AzStorageDirectory PSCommand_New-AzStorageDirectory PSCmdlet_New-AzStorageEncryptionScope PSCommand_New-AzStorageEncryptionScope PSCmdlet_New-AzStorageFileSASToken PSCommand_New-AzStorageFileSASToken PSCmdlet_New-AzStorageLocalUserPermissionScope PSCommand_New-AzStorageLocalUserPermissionScope PSCmdlet_New-AzStorageLocalUserSshPassword PSCommand_New-AzStorageLocalUserSshPassword PSCmdlet_New-AzStorageLocalUserSshPublicKey PSCommand_New-AzStorageLocalUserSshPublicKey PSCmdlet_New-AzStorageObjectReplicationPolicyRule PSCommand_New-AzStorageObjectReplicationPolicyRule PSCmdlet_New-AzStorageQueue PSCommand_New-AzStorageQueue PSCmdlet_New-AzStorageQueueSASToken PSCommand_New-AzStorageQueueSASToken PSCmdlet_New-AzStorageQueueStoredAccessPolicy PSCommand_New-AzStorageQueueStoredAccessPolicy PSCmdlet_New-AzStorageShare PSCommand_New-AzStorageShare PSCmdlet_New-AzStorageShareSASToken PSCommand_New-AzStorageShareSASToken PSCmdlet_New-AzStorageShareStoredAccessPolicy PSCommand_New-AzStorageShareStoredAccessPolicy PSCmdlet_New-AzStorageTable PSCommand_New-AzStorageTable PSCmdlet_New-AzStorageTableSASToken PSCommand_New-AzStorageTableSASToken PSCmdlet_New-AzStorageTableStoredAccessPolicy PSCommand_New-AzStorageTableStoredAccessPolicy PSCmdlet_Remove-AzDataLakeGen2AclRecursive PSCommand_Remove-AzDataLakeGen2AclRecursive PSCmdlet_Remove-AzDataLakeGen2Item PSCommand_Remove-AzDataLakeGen2Item PSCmdlet_Remove-AzRmStorageContainer PSCommand_Remove-AzRmStorageContainer PSCmdlet_Remove-AzRmStorageContainerImmutabilityPolicy PSCommand_Remove-AzRmStorageContainerImmutabilityPolicy PSCmdlet_Remove-AzRmStorageContainerLegalHold PSCommand_Remove-AzRmStorageContainerLegalHold PSCmdlet_Remove-AzRmStorageShare PSCommand_Remove-AzRmStorageShare PSCmdlet_Remove-AzStorageAccount PSCommand_Remove-AzStorageAccount PSCmdlet_Remove-AzStorageAccountManagementPolicy PSCommand_Remove-AzStorageAccountManagementPolicy PSCmdlet_Remove-AzStorageAccountNetworkRule PSCommand_Remove-AzStorageAccountNetworkRule PSCmdlet_Remove-AzStorageBlob PSCommand_Remove-AzStorageBlob PSCmdlet_Remove-AzStorageBlobImmutabilityPolicy PSCommand_Remove-AzStorageBlobImmutabilityPolicy PSCmdlet_Remove-AzStorageBlobInventoryPolicy PSCommand_Remove-AzStorageBlobInventoryPolicy PSCmdlet_Remove-AzStorageContainer PSCommand_Remove-AzStorageContainer PSCmdlet_Remove-AzStorageContainerStoredAccessPolicy PSCommand_Remove-AzStorageContainerStoredAccessPolicy PSCmdlet_Remove-AzStorageCORSRule PSCommand_Remove-AzStorageCORSRule PSCmdlet_Remove-AzStorageDirectory PSCommand_Remove-AzStorageDirectory PSCmdlet_Remove-AzStorageFile PSCommand_Remove-AzStorageFile PSCmdlet_Remove-AzStorageLocalUser PSCommand_Remove-AzStorageLocalUser PSCmdlet_Remove-AzStorageObjectReplicationPolicy PSCommand_Remove-AzStorageObjectReplicationPolicy PSCmdlet_Remove-AzStorageQueue PSCommand_Remove-AzStorageQueue PSCmdlet_Remove-AzStorageQueueStoredAccessPolicy PSCommand_Remove-AzStorageQueueStoredAccessPolicy PSCmdlet_Remove-AzStorageShare PSCommand_Remove-AzStorageShare PSCmdlet_Remove-AzStorageShareStoredAccessPolicy PSCommand_Remove-AzStorageShareStoredAccessPolicy PSCmdlet_Remove-AzStorageTable PSCommand_Remove-AzStorageTable PSCmdlet_Remove-AzStorageTableStoredAccessPolicy PSCommand_Remove-AzStorageTableStoredAccessPolicy PSCmdlet_Rename-AzStorageDirectory PSCommand_Rename-AzStorageDirectory PSCmdlet_Rename-AzStorageFile PSCommand_Rename-AzStorageFile PSCmdlet_Restore-AzDataLakeGen2DeletedItem PSCommand_Restore-AzDataLakeGen2DeletedItem PSCmdlet_Restore-AzRmStorageShare PSCommand_Restore-AzRmStorageShare PSCmdlet_Restore-AzStorageBlobRange PSCommand_Restore-AzStorageBlobRange PSCmdlet_Restore-AzStorageContainer PSCommand_Restore-AzStorageContainer PSCmdlet_Revoke-AzStorageAccountUserDelegationKeys PSCommand_Revoke-AzStorageAccountUserDelegationKeys PSCmdlet_Set-AzCurrentStorageAccount PSCommand_Set-AzCurrentStorageAccount PSCmdlet_Set-AzDataLakeGen2AclRecursive PSCommand_Set-AzDataLakeGen2AclRecursive PSCmdlet_Set-AzDataLakeGen2ItemAclObject PSCommand_Set-AzDataLakeGen2ItemAclObject PSCmdlet_Set-AzRmStorageContainerImmutabilityPolicy PSCommand_Set-AzRmStorageContainerImmutabilityPolicy PSCmdlet_Set-AzStorageAccount PSCommand_Set-AzStorageAccount PSCmdlet_Set-AzStorageAccountManagementPolicy PSCommand_Set-AzStorageAccountManagementPolicy PSCmdlet_Set-AzStorageBlobContent PSCommand_Set-AzStorageBlobContent PSCmdlet_Set-AzStorageBlobImmutabilityPolicy PSCommand_Set-AzStorageBlobImmutabilityPolicy PSCmdlet_Set-AzStorageBlobInventoryPolicy PSCommand_Set-AzStorageBlobInventoryPolicy PSCmdlet_Set-AzStorageBlobLegalHold PSCommand_Set-AzStorageBlobLegalHold PSCmdlet_Set-AzStorageBlobTag PSCommand_Set-AzStorageBlobTag PSCmdlet_Set-AzStorageContainerAcl PSCommand_Set-AzStorageContainerAcl PSCmdlet_Set-AzStorageContainerStoredAccessPolicy PSCommand_Set-AzStorageContainerStoredAccessPolicy PSCmdlet_Set-AzStorageCORSRule PSCommand_Set-AzStorageCORSRule PSCmdlet_Set-AzStorageFileContent PSCommand_Set-AzStorageFileContent PSCmdlet_Set-AzStorageLocalUser PSCommand_Set-AzStorageLocalUser PSCmdlet_Set-AzStorageObjectReplicationPolicy PSCommand_Set-AzStorageObjectReplicationPolicy PSCmdlet_Set-AzStorageQueueStoredAccessPolicy PSCommand_Set-AzStorageQueueStoredAccessPolicy PSCmdlet_Set-AzStorageServiceLoggingProperty PSCommand_Set-AzStorageServiceLoggingProperty PSCmdlet_Set-AzStorageServiceMetricsProperty PSCommand_Set-AzStorageServiceMetricsProperty PSCmdlet_Set-AzStorageShareQuota PSCommand_Set-AzStorageShareQuota PSCmdlet_Set-AzStorageShareStoredAccessPolicy PSCommand_Set-AzStorageShareStoredAccessPolicy PSCmdlet_Set-AzStorageTableStoredAccessPolicy PSCommand_Set-AzStorageTableStoredAccessPolicy PSCmdlet_Start-AzStorageBlobCopy PSCommand_Start-AzStorageBlobCopy PSCmdlet_Start-AzStorageBlobIncrementalCopy PSCommand_Start-AzStorageBlobIncrementalCopy PSCmdlet_Start-AzStorageFileCopy PSCommand_Start-AzStorageFileCopy PSCmdlet_Stop-AzStorageAccountHierarchicalNamespaceUpgrade PSCommand_Stop-AzStorageAccountHierarchicalNamespaceUpgrade PSCmdlet_Stop-AzStorageBlobCopy PSCommand_Stop-AzStorageBlobCopy PSCmdlet_Stop-AzStorageFileCopy PSCommand_Stop-AzStorageFileCopy PSCmdlet_Update-AzDataLakeGen2AclRecursive PSCommand_Update-AzDataLakeGen2AclRecursive PSCmdlet_Update-AzDataLakeGen2Item PSCommand_Update-AzDataLakeGen2Item PSCmdlet_Update-AzRmStorageContainer PSCommand_Update-AzRmStorageContainer PSCmdlet_Update-AzRmStorageShare PSCommand_Update-AzRmStorageShare PSCmdlet_Update-AzStorageAccountNetworkRuleSet PSCommand_Update-AzStorageAccountNetworkRuleSet PSCmdlet_Update-AzStorageBlobServiceProperty PSCommand_Update-AzStorageBlobServiceProperty PSCmdlet_Update-AzStorageEncryptionScope PSCommand_Update-AzStorageEncryptionScope PSCmdlet_Update-AzStorageFileServiceProperty PSCommand_Update-AzStorageFileServiceProperty PSCmdlet_Update-AzStorageServiceProperty PSCommand_Update-AzStorageServiceProperty PSIncludes_Cmdlet PSFunction_Get-AzStorageAccountMigration PSCommand_Get-AzStorageAccountMigration PSFunction_Start-AzStorageAccountMigration PSCommand_Start-AzStorageAccountMigration PSIncludes_Function False - 2023-10-21T12:36:30Z - 5.10.1 + 2024-05-03T23:57:47Z + 6.2.0 Microsoft Corporation false Module - Az.Storage.nuspec|Az.Storage.psd1|Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll-Help.xml|Az.Storage.psm1|Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll|Azure.Data.Tables.dll|Microsoft.Azure.Storage.Blob.dll|Azure.Storage.Blobs.dll|Microsoft.Azure.Storage.Common.dll|Azure.Storage.Common.dll|Microsoft.Azure.Storage.DataMovement.dll|Azure.Storage.Files.DataLake.dll|Microsoft.Azure.Storage.File.dll|Azure.Storage.Files.Shares.dll|Microsoft.Azure.Storage.Queue.dll|Azure.Storage.Queues.dll|Microsoft.OData.Core.dll|Microsoft.Azure.Cosmos.Table.dll|Microsoft.OData.Edm.dll|Microsoft.Azure.DocumentDB.Core.dll|Microsoft.Spatial.dll|Microsoft.Azure.KeyVault.Core.dll|Storage.format.ps1xml|Microsoft.Azure.PowerShell.Cmdlets.Storage.dll|Storage.generated.format.ps1xml|Microsoft.Azure.PowerShell.Cmdlets.Storage.dll-Help.xml|Storage.Management.format.ps1xml|Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll|System.IO.Hashing.dll - Get-AzStorageAccount Get-AzStorageAccountKey New-AzStorageAccount New-AzStorageAccountKey Remove-AzStorageAccount Set-AzCurrentStorageAccount Set-AzStorageAccount Get-AzStorageAccountNameAvailability Get-AzStorageUsage Update-AzStorageAccountNetworkRuleSet Get-AzStorageAccountNetworkRuleSet Add-AzStorageAccountNetworkRule Remove-AzStorageAccountNetworkRule Get-AzStorageTable New-AzStorageTableSASToken New-AzStorageTableStoredAccessPolicy New-AzStorageTable Remove-AzStorageTableStoredAccessPolicy Remove-AzStorageTable Get-AzStorageTableStoredAccessPolicy Set-AzStorageTableStoredAccessPolicy Get-AzStorageQueue New-AzStorageQueue Remove-AzStorageQueue Get-AzStorageQueueStoredAccessPolicy New-AzStorageQueueSASToken New-AzStorageQueueStoredAccessPolicy Remove-AzStorageQueueStoredAccessPolicy Set-AzStorageQueueStoredAccessPolicy Get-AzStorageFile Get-AzStorageFileContent Get-AzStorageFileCopyState Get-AzStorageShare Get-AzStorageShareStoredAccessPolicy New-AzStorageDirectory New-AzStorageFileSASToken New-AzStorageShare New-AzStorageShareSASToken New-AzStorageShareStoredAccessPolicy Remove-AzStorageDirectory Remove-AzStorageFile Remove-AzStorageShare Remove-AzStorageShareStoredAccessPolicy Set-AzStorageFileContent Set-AzStorageShareQuota Set-AzStorageShareStoredAccessPolicy Start-AzStorageFileCopy Stop-AzStorageFileCopy New-AzStorageAccountSASToken Set-AzStorageCORSRule Get-AzStorageCORSRule Get-AzStorageServiceLoggingProperty Get-AzStorageServiceMetricsProperty Remove-AzStorageCORSRule Set-AzStorageServiceLoggingProperty Set-AzStorageServiceMetricsProperty New-AzStorageContext Set-AzStorageContainerAcl Remove-AzStorageBlob Set-AzStorageBlobContent Get-AzStorageBlob Get-AzStorageBlobContent Get-AzStorageBlobCopyState Get-AzStorageContainer Get-AzStorageContainerStoredAccessPolicy New-AzStorageBlobSASToken New-AzStorageContainer New-AzStorageContainerSASToken New-AzStorageContainerStoredAccessPolicy Remove-AzStorageContainer Remove-AzStorageContainerStoredAccessPolicy Set-AzStorageContainerStoredAccessPolicy Start-AzStorageBlobCopy Start-AzStorageBlobIncrementalCopy Stop-AzStorageBlobCopy Update-AzStorageServiceProperty Get-AzStorageServiceProperty Enable-AzStorageDeleteRetentionPolicy Disable-AzStorageDeleteRetentionPolicy Enable-AzStorageStaticWebsite Disable-AzStorageStaticWebsite Get-AzRmStorageContainer Update-AzRmStorageContainer New-AzRmStorageContainer Remove-AzRmStorageContainer Add-AzRmStorageContainerLegalHold Remove-AzRmStorageContainerLegalHold Set-AzRmStorageContainerImmutabilityPolicy Get-AzRmStorageContainerImmutabilityPolicy Remove-AzRmStorageContainerImmutabilityPolicy Lock-AzRmStorageContainerImmutabilityPolicy Set-AzStorageAccountManagementPolicy Get-AzStorageAccountManagementPolicy Remove-AzStorageAccountManagementPolicy New-AzStorageAccountManagementPolicyFilter New-AzStorageAccountManagementPolicyRule Add-AzStorageAccountManagementPolicyAction Update-AzStorageBlobServiceProperty Get-AzStorageBlobServiceProperty Enable-AzStorageBlobDeleteRetentionPolicy Disable-AzStorageBlobDeleteRetentionPolicy Revoke-AzStorageAccountUserDelegationKeys Get-AzStorageFileHandle Close-AzStorageFileHandle New-AzRmStorageShare Remove-AzRmStorageShare Get-AzRmStorageShare Update-AzRmStorageShare Update-AzStorageFileServiceProperty Get-AzStorageFileServiceProperty Restore-AzRmStorageShare Get-AzDataLakeGen2ChildItem Get-AzDataLakeGen2Item New-AzDataLakeGen2Item Move-AzDataLakeGen2Item Remove-AzDataLakeGen2Item Update-AzDataLakeGen2Item Set-AzDataLakeGen2ItemAclObject Get-AzDataLakeGen2ItemContent Invoke-AzStorageAccountFailover Get-AzStorageBlobQueryResult New-AzStorageBlobQueryConfig New-AzStorageObjectReplicationPolicyRule Set-AzStorageObjectReplicationPolicy Get-AzStorageObjectReplicationPolicy Remove-AzStorageObjectReplicationPolicy Enable-AzStorageBlobRestorePolicy Disable-AzStorageBlobRestorePolicy New-AzStorageBlobRangeToRestore Restore-AzStorageBlobRange Set-AzDataLakeGen2AclRecursive Update-AzDataLakeGen2AclRecursive Remove-AzDataLakeGen2AclRecursive New-AzStorageEncryptionScope Update-AzStorageEncryptionScope Get-AzStorageEncryptionScope Copy-AzStorageBlob Set-AzStorageBlobInventoryPolicy New-AzStorageBlobInventoryPolicyRule Get-AzStorageBlobInventoryPolicy Remove-AzStorageBlobInventoryPolicy Enable-AzStorageContainerDeleteRetentionPolicy Disable-AzStorageContainerDeleteRetentionPolicy Restore-AzStorageContainer Enable-AzStorageBlobLastAccessTimeTracking Disable-AzStorageBlobLastAccessTimeTracking Set-AzStorageBlobTag Get-AzStorageBlobTag Get-AzStorageBlobByTag Invoke-AzStorageAccountHierarchicalNamespaceUpgrade Stop-AzStorageAccountHierarchicalNamespaceUpgrade Set-AzStorageBlobImmutabilityPolicy Remove-AzStorageBlobImmutabilityPolicy Set-AzStorageBlobLegalHold Invoke-AzRmStorageContainerImmutableStorageWithVersioningMigration New-AzDataLakeGen2SasToken New-AzStorageAccountManagementPolicyBlobIndexMatchObject Set-AzStorageLocalUser Get-AzStorageLocalUser Remove-AzStorageLocalUser Get-AzStorageLocalUserKey New-AzStorageLocalUserSshPassword New-AzStorageLocalUserSshPublicKey New-AzStorageLocalUserPermissionScope Get-AzDataLakeGen2DeletedItem Restore-AzDataLakeGen2DeletedItem Rename-AzStorageFile Rename-AzStorageDirectory + Az.Storage.nuspec|Microsoft.Azure.Storage.DataMovement.dll|Az.Storage.psd1|Microsoft.Azure.Storage.File.dll|Az.Storage.psm1|Microsoft.Azure.Storage.Queue.dll|Azure.Data.Tables.dll|Microsoft.OData.Core.dll|Azure.Storage.Blobs.dll|Microsoft.OData.Edm.dll|Azure.Storage.Common.dll|Microsoft.Spatial.dll|Azure.Storage.Files.DataLake.dll|Storage.format.ps1xml|Azure.Storage.Files.Shares.dll|Storage.generated.format.ps1xml|Azure.Storage.Queues.dll|Storage.Management.format.ps1xml|Microsoft.Azure.Cosmos.Table.dll|System.IO.Hashing.dll|Microsoft.Azure.DocumentDB.Core.dll|Storage.Autorest\Az.Storage.format.ps1xml|Microsoft.Azure.KeyVault.Core.dll|Storage.Autorest\Az.Storage.psm1|Microsoft.Azure.PowerShell.Cmdlets.Storage.dll|Storage.Autorest\bin\Az.Storage.private.dll|Microsoft.Azure.PowerShell.Cmdlets.Storage.dll-Help.xml|Storage.Autorest\custom\Az.Storage.custom.psm1|Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll|Storage.Autorest\exports\ProxyCmdletDefinitions.ps1|Microsoft.Azure.PowerShell.Cmdlets.Storage.Management.dll-Help.xml|Storage.Autorest\internal\Az.Storage.internal.psm1|Microsoft.Azure.PowerShell.Storage.Management.Sdk.dll|Storage.Autorest\internal\ProxyCmdletDefinitions.ps1|Microsoft.Azure.Storage.Blob.dll|Storage.Autorest\utils\Get-SubscriptionIdTestSafe.ps1|Microsoft.Azure.Storage.Common.dll|Storage.Autorest\utils\Unprotect-SecureString.ps1 dfa9e4ea-1407-446d-9111-79122977ab20 5.1 4.7.2 Microsoft Corporation
- C:\Github\CIPP-API\Modules\Az.Storage\5.10.1 + C:\GitHub\CIPP Workspace\CIPP-API\Modules\Az.Storage\6.2.0 diff --git a/Modules/Az.Storage/6.2.0/Storage.Autorest/Az.Storage.format.ps1xml b/Modules/Az.Storage/6.2.0/Storage.Autorest/Az.Storage.format.ps1xml new file mode 100644 index 000000000000..f8b5ae185e74 --- /dev/null +++ b/Modules/Az.Storage/6.2.0/Storage.Autorest/Az.Storage.format.ps1xml @@ -0,0 +1,3840 @@ + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.AccountImmutabilityPolicyProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.AccountImmutabilityPolicyProperties#Multiple + + + + + + + + + + + + + + + + + + AllowProtectedAppendWrite + + + ImmutabilityPeriodSinceCreationInDay + + + State + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.AccountSasParameters + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.AccountSasParameters#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + IPAddressOrRange + + + KeyToSign + + + Permission + + + Protocol + + + ResourceType + + + Service + + + SharedAccessExpiryTime + + + SharedAccessStartTime + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ActiveDirectoryProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ActiveDirectoryProperties#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + AccountType + + + AzureStorageSid + + + DomainGuid + + + DomainName + + + DomainSid + + + ForestName + + + NetBiosDomainName + + + SamAccountName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.AzureFilesIdentityBasedAuthentication + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.AzureFilesIdentityBasedAuthentication#Multiple + + + + + + + + + + + + + + + DefaultSharePermission + + + DirectoryServiceOption + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryCreationTime + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryCreationTime#Multiple + + + + + + + + + + + + LastNDay + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicy + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicy#Multiple + + + + + + + + + + + + + + + Name + + + ResourceGroupName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicyDefinition + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicyDefinition#Multiple + + + + + + + + + + + + + + + + + + Format + + + ObjectType + + + Schedule + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicyFilter + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicyFilter#Multiple + + + + + + + + + + + + + + + + + + IncludeBlobVersion + + + IncludeDeleted + + + IncludeSnapshot + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicyProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicyProperties#Multiple + + + + + + + + + + + + LastModifiedTime + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicyRule + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicyRule#Multiple + + + + + + + + + + + + + + + + + + Destination + + + Enabled + + + Name + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicySchema + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobInventoryPolicySchema#Multiple + + + + + + + + + + + + + + + Destination + + + Enabled + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobRestoreParameters + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobRestoreParameters#Multiple + + + + + + + + + + + + TimeToRestore + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobRestoreRange + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobRestoreRange#Multiple + + + + + + + + + + + + + + + EndRange + + + StartRange + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobRestoreStatus + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.BlobRestoreStatus#Multiple + + + + + + + + + + + + + + + + + + FailureReason + + + RestoreId + + + Status + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.CheckNameAvailabilityResult + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.CheckNameAvailabilityResult#Multiple + + + + + + + + + + + + + + + + + + Message + + + NameAvailable + + + Reason + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.CloudErrorBody + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.CloudErrorBody#Multiple + + + + + + + + + + + + + + + + + + Code + + + Message + + + Target + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.CustomDomain + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.CustomDomain#Multiple + + + + + + + + + + + + + + + Name + + + UseSubDomainName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DateAfterCreation + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DateAfterCreation#Multiple + + + + + + + + + + + + + + + DaysAfterCreationGreaterThan + + + DaysAfterLastTierChangeGreaterThan + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DateAfterModification + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DateAfterModification#Multiple + + + + + + + + + + + + + + + + + + + + + DaysAfterCreationGreaterThan + + + DaysAfterLastAccessTimeGreaterThan + + + DaysAfterLastTierChangeGreaterThan + + + DaysAfterModificationGreaterThan + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DeletedAccount + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DeletedAccount#Multiple + + + + + + + + + + + + + + + Name + + + ResourceGroupName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DeletedAccountListResult + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DeletedAccountListResult#Multiple + + + + + + + + + + + + NextLink + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DeletedAccountProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.DeletedAccountProperties#Multiple + + + + + + + + + + + + + + + + + + + + + + + + CreationTime + + + DeletionTime + + + Location + + + RestoreReference + + + StorageAccountResourceId + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Dimension + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Dimension#Multiple + + + + + + + + + + + + + + + DisplayName + + + Name + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Encryption + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Encryption#Multiple + + + + + + + + + + + + + + + KeySource + + + RequireInfrastructureEncryption + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionIdentity + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionIdentity#Multiple + + + + + + + + + + + + + + + EncryptionFederatedIdentityClientId + + + EncryptionUserAssignedIdentity + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionScope + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionScope#Multiple + + + + + + + + + + + + + + + Name + + + ResourceGroupName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionScopeKeyVaultProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionScopeKeyVaultProperties#Multiple + + + + + + + + + + + + + + + + + + CurrentVersionedKeyIdentifier + + + KeyUri + + + LastKeyRotationTimestamp + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionScopeListResult + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionScopeListResult#Multiple + + + + + + + + + + + + NextLink + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionScopeProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionScopeProperties#Multiple + + + + + + + + + + + + + + + + + + + + + + + + CreationTime + + + LastModifiedTime + + + RequireInfrastructureEncryption + + + Source + + + State + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionService + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.EncryptionService#Multiple + + + + + + + + + + + + + + + + + + Enabled + + + KeyType + + + LastEnabledTime + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Endpoints + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Endpoints#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + Blob + + + Df + + + File + + + Queue + + + Table + + + Web + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ErrorDetail + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ErrorDetail#Multiple + + + + + + + + + + + + + + + + + + Code + + + Message + + + Target + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ErrorResponseBody + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ErrorResponseBody#Multiple + + + + + + + + + + + + + + + Code + + + Message + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ExtendedLocation + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ExtendedLocation#Multiple + + + + + + + + + + + + Name + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.GeoReplicationStats + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.GeoReplicationStats#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + CanFailover + + + CanPlannedFailover + + + LastSyncTime + + + PostFailoverRedundancy + + + PostPlannedFailoverRedundancy + + + Status + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Identity + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Identity#Multiple + + + + + + + + + + + + + + + PrincipalId + + + TenantId + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ImmutableStorageAccount + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ImmutableStorageAccount#Multiple + + + + + + + + + + + + Enabled + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IPRule + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IPRule#Multiple + + + + + + + + + + + + + + + Action + + + IPAddressOrRange + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.KeyCreationTime + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.KeyCreationTime#Multiple + + + + + + + + + + + + + + + Key1 + + + Key2 + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.KeyPolicy + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.KeyPolicy#Multiple + + + + + + + + + + + + KeyExpirationPeriodInDay + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.KeyVaultProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.KeyVaultProperties#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + CurrentVersionedKeyExpirationTimestamp + + + CurrentVersionedKeyIdentifier + + + KeyName + + + KeyVaultUri + + + KeyVersion + + + LastKeyRotationTimestamp + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ListAccountSasResponse + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ListAccountSasResponse#Multiple + + + + + + + + + + + + AccountSasToken + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ListServiceSasResponse + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ListServiceSasResponse#Multiple + + + + + + + + + + + + ServiceSasToken + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.LocalUser + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.LocalUser#Multiple + + + + + + + + + + + + + + + Name + + + ResourceGroupName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.LocalUserKeys + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.LocalUserKeys#Multiple + + + + + + + + + + + + SharedKey + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.LocalUserProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.LocalUserProperties#Multiple + + + + + + + + + + + + + + + + + + + + + + + + HasSharedKey + + + HasSshKey + + + HasSshPassword + + + HomeDirectory + + + Sid + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.LocalUserRegeneratePasswordResult + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.LocalUserRegeneratePasswordResult#Multiple + + + + + + + + + + + + SshPassword + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ManagementPolicy + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ManagementPolicy#Multiple + + + + + + + + + + + + + + + Name + + + ResourceGroupName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ManagementPolicyBaseBlob + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ManagementPolicyBaseBlob#Multiple + + + + + + + + + + + + EnableAutoTierToHotFromCool + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ManagementPolicyProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ManagementPolicyProperties#Multiple + + + + + + + + + + + + LastModifiedTime + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ManagementPolicyRule + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ManagementPolicyRule#Multiple + + + + + + + + + + + + + + + Enabled + + + Name + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.MetricSpecification + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.MetricSpecification#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + AggregationType + + + Category + + + DisplayDescription + + + DisplayName + + + FillGapWithZero + + + Name + + + ResourceIdDimensionNameOverride + + + Unit + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.NetworkRuleSet + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.NetworkRuleSet#Multiple + + + + + + + + + + + + + + + Bypass + + + DefaultAction + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ObjectReplicationPolicy + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ObjectReplicationPolicy#Multiple + + + + + + + + + + + + + + + Name + + + ResourceGroupName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ObjectReplicationPolicyFilter + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ObjectReplicationPolicyFilter#Multiple + + + + + + + + + + + + MinCreationTime + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ObjectReplicationPolicyProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ObjectReplicationPolicyProperties#Multiple + + + + + + + + + + + + + + + + + + + + + DestinationAccount + + + EnabledTime + + + PolicyId + + + SourceAccount + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ObjectReplicationPolicyRule + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ObjectReplicationPolicyRule#Multiple + + + + + + + + + + + + + + + + + + DestinationContainer + + + RuleId + + + SourceContainer + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Operation + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Operation#Multiple + + + + + + + + + + + + + + + Name + + + Origin + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.OperationDisplay + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.OperationDisplay#Multiple + + + + + + + + + + + + + + + + + + + + + Description + + + Operation + + + Provider + + + Resource + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PermissionScope + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PermissionScope#Multiple + + + + + + + + + + + + + + + + + + Permission + + + ResourceName + + + Service + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateEndpointConnection + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateEndpointConnection#Multiple + + + + + + + + + + + + + + + Name + + + ResourceGroupName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateEndpointConnectionProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateEndpointConnectionProperties#Multiple + + + + + + + + + + + + ProvisioningState + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateLinkResource + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateLinkResource#Multiple + + + + + + + + + + + + Name + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateLinkResourceProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateLinkResourceProperties#Multiple + + + + + + + + + + + + GroupId + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateLinkServiceConnectionState + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.PrivateLinkServiceConnectionState#Multiple + + + + + + + + + + + + + + + + + + ActionRequired + + + Description + + + Status + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ProxyResource + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ProxyResource#Multiple + + + + + + + + + + + + Name + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Resource + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Resource#Multiple + + + + + + + + + + + + Name + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ResourceAccessRule + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ResourceAccessRule#Multiple + + + + + + + + + + + + + + + ResourceId + + + TenantId + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Restriction + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Restriction#Multiple + + + + + + + + + + + + ReasonCode + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.RoutingPreference + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.RoutingPreference#Multiple + + + + + + + + + + + + + + + + + + PublishInternetEndpoint + + + PublishMicrosoftEndpoint + + + RoutingChoice + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SasPolicy + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SasPolicy#Multiple + + + + + + + + + + + + + + + ExpirationAction + + + SasExpirationPeriod + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ServiceSasParameters + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.ServiceSasParameters#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + CacheControl + + + CanonicalizedResource + + + ContentDisposition + + + ContentEncoding + + + ContentLanguage + + + ContentType + + + IPAddressOrRange + + + Identifier + + + KeyToSign + + + PartitionKeyEnd + + + PartitionKeyStart + + + Permission + + + Protocol + + + Resource + + + RowKeyEnd + + + RowKeyStart + + + SharedAccessExpiryTime + + + SharedAccessStartTime + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Sku + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Sku#Multiple + + + + + + + + + + + + + + + Name + + + Tier + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SkuCapability + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SkuCapability#Multiple + + + + + + + + + + + + + + + Name + + + Value + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SkuInformation + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SkuInformation#Multiple + + + + + + + + + + + + + + + + + + + + + Kind + + + Name + + + ResourceType + + + Tier + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SshPublicKey + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SshPublicKey#Multiple + + + + + + + + + + + + + + + Description + + + Key + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccount + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccount#Multiple + + + + + + + + + + + + + + + + + + + + + Location + + + Name + + + Kind + + + ResourceGroupName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountCheckNameAvailabilityParameters + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountCheckNameAvailabilityParameters#Multiple + + + + + + + + + + + + Name + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountCreateParameters + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountCreateParameters#Multiple + + + + + + + + + + + + + + + Kind + + + Location + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountCreateParametersTags + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountCreateParametersTags#Multiple + + + + + + + + + + + + Item + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountInternetEndpoints + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountInternetEndpoints#Multiple + + + + + + + + + + + + + + + + + + + + + Blob + + + Df + + + File + + + Web + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountKey + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountKey#Multiple + + + + + + + + + + + + + + + + + + + + + CreationTime + + + KeyName + + + Permission + + + Value + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountListResult + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountListResult#Multiple + + + + + + + + + + + + NextLink + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountMicrosoftEndpoints + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountMicrosoftEndpoints#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + Blob + + + Df + + + File + + + Queue + + + Table + + + Web + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountMigration + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountMigration#Multiple + + + + + + + + + + + + + + + Name + + + ResourceGroupName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountMigrationProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountMigrationProperties#Multiple + + + + + + + + + + + + + + + + + + + + + MigrationFailedDetailedReason + + + MigrationFailedReason + + + MigrationStatus + + + TargetSkuName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountProperties + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountProperties#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + AccessTier + + + AccountMigrationInProgress + + + AllowBlobPublicAccess + + + AllowCrossTenantReplication + + + AllowSharedKeyAccess + + + AllowedCopyScope + + + CreationTime + + + DefaultToOAuthAuthentication + + + DnsEndpointType + + + EnableHttpsTrafficOnly + + + EnableNfsV3 + + + FailoverInProgress + + + IsHnsEnabled + + + IsLocalUserEnabled + + + IsSftpEnabled + + + IsSkuConversionBlocked + + + LargeFileSharesState + + + LastGeoFailoverTime + + + MinimumTlsVersion + + + PrimaryLocation + + + ProvisioningState + + + PublicNetworkAccess + + + SecondaryLocation + + + StatusOfPrimary + + + StatusOfSecondary + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountPropertiesCreateParameters + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountPropertiesCreateParameters#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + AccessTier + + + AllowBlobPublicAccess + + + AllowCrossTenantReplication + + + AllowSharedKeyAccess + + + AllowedCopyScope + + + DefaultToOAuthAuthentication + + + DnsEndpointType + + + EnableHttpsTrafficOnly + + + EnableNfsV3 + + + IsHnsEnabled + + + IsLocalUserEnabled + + + IsSftpEnabled + + + LargeFileSharesState + + + MinimumTlsVersion + + + PublicNetworkAccess + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountPropertiesUpdateParameters + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountPropertiesUpdateParameters#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + AccessTier + + + AllowBlobPublicAccess + + + AllowCrossTenantReplication + + + AllowSharedKeyAccess + + + AllowedCopyScope + + + DefaultToOAuthAuthentication + + + DnsEndpointType + + + EnableHttpsTrafficOnly + + + IsLocalUserEnabled + + + IsSftpEnabled + + + LargeFileSharesState + + + MinimumTlsVersion + + + PublicNetworkAccess + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountRegenerateKeyParameters + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountRegenerateKeyParameters#Multiple + + + + + + + + + + + + KeyName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountSkuConversionStatus + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountSkuConversionStatus#Multiple + + + + + + + + + + + + + + + + + + + + + EndTime + + + SkuConversionStatus + + + StartTime + + + TargetSkuName + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountUpdateParameters + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountUpdateParameters#Multiple + + + + + + + + + + + + Kind + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountUpdateParametersTags + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageAccountUpdateParametersTags#Multiple + + + + + + + + + + + + Item + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageIdentity + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.StorageIdentity#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + AccountName + + + BlobInventoryPolicyName + + + DeletedAccountName + + + EncryptionScopeName + + + Location + + + ManagementPolicyName + + + MigrationName + + + ObjectReplicationPolicyId + + + PrivateEndpointConnectionName + + + ResourceGroupName + + + SubscriptionId + + + Username + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SystemData + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.SystemData#Multiple + + + + + + + + + + + + + + + + + + + + + + + + + + + CreatedAt + + + CreatedBy + + + CreatedByType + + + LastModifiedAt + + + LastModifiedBy + + + LastModifiedByType + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.TagFilter + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.TagFilter#Multiple + + + + + + + + + + + + + + + + + + Name + + + Op + + + Value + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.TrackedResource + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.TrackedResource#Multiple + + + + + + + + + + + + + + + Name + + + Location + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.TrackedResourceTags + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.TrackedResourceTags#Multiple + + + + + + + + + + + + Item + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Usage + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.Usage#Multiple + + + + + + + + + + + + + + + + + + CurrentValue + + + Limit + + + Unit + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.UsageName + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.UsageName#Multiple + + + + + + + + + + + + + + + LocalizedValue + + + Value + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.UserAssignedIdentity + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.UserAssignedIdentity#Multiple + + + + + + + + + + + + + + + ClientId + + + PrincipalId + + + + + + + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.VirtualNetworkRule + + Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.VirtualNetworkRule#Multiple + + + + + + + + + + + + + + + + + + Action + + + State + + + VirtualNetworkResourceId + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/Modules/Az.Storage/6.2.0/Storage.Autorest/Az.Storage.psm1 b/Modules/Az.Storage/6.2.0/Storage.Autorest/Az.Storage.psm1 new file mode 100644 index 000000000000..57e0fc443888 --- /dev/null +++ b/Modules/Az.Storage/6.2.0/Storage.Autorest/Az.Storage.psm1 @@ -0,0 +1,335 @@ +# region Generated + # ---------------------------------------------------------------------------------- + # Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# http://www.apache.org/licenses/LICENSE-2.0 +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code +# is regenerated. + # ---------------------------------------------------------------------------------- + # Load required Az.Accounts module + $accountsName = 'Az.Accounts' + $accountsModule = Get-Module -Name $accountsName + if(-not $accountsModule) { + $localAccountsPath = Join-Path $PSScriptRoot 'generated\modules' + if(Test-Path -Path $localAccountsPath) { + $localAccounts = Get-ChildItem -Path $localAccountsPath -Recurse -Include 'Az.Accounts.psd1' | Select-Object -Last 1 + if($localAccounts) { + $accountsModule = Import-Module -Name ($localAccounts.FullName) -Scope Global -PassThru + } + } + if(-not $accountsModule) { + $hasAdequateVersion = (Get-Module -Name $accountsName -ListAvailable | Where-Object { $_.Version -ge [System.Version]'2.7.5' } | Measure-Object).Count -gt 0 + if($hasAdequateVersion) { + $accountsModule = Import-Module -Name $accountsName -MinimumVersion 2.7.5 -Scope Global -PassThru + } + } + } + + if(-not $accountsModule) { + Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. For installation instructions, please see: https://learn.microsoft.com/powershell/azure/install-az-ps" -ErrorAction Stop + } elseif (($accountsModule.Version -lt [System.Version]'2.7.5') -and (-not $localAccounts)) { + Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. An earlier version of Az.Accounts is imported in the current PowerShell session. If you are running test, please try to add the switch '-RegenerateSupportModule' when executing 'test-module.ps1'. Otherwise please open a new PowerShell session and import this module again.`nAdditionally, this error could indicate that multiple incompatible versions of Azure PowerShell modules are installed on your system. For troubleshooting information, please see: https://aka.ms/azps-version-error" -ErrorAction Stop + } + Write-Information "Loaded Module '$($accountsModule.Name)'" + + # Load the private module dll + $null = Import-Module -Name (Join-Path $PSScriptRoot './bin/Az.Storage.private.dll') + + # Get the private module's instance + $instance = [Microsoft.Azure.PowerShell.Cmdlets.Storage.Module]::Instance + + # Ask for the shared functionality table + $VTable = Register-AzModule + + # Tweaks the pipeline on module load + $instance.OnModuleLoad = $VTable.OnModuleLoad + + # Following two delegates are added for telemetry + $instance.GetTelemetryId = $VTable.GetTelemetryId + $instance.Telemetry = $VTable.Telemetry + + # Delegate to sanitize the output object + $instance.SanitizeOutput = $VTable.SanitizerHandler + + # Delegate to get the telemetry info + $instance.GetTelemetryInfo = $VTable.GetTelemetryInfo + + # Tweaks the pipeline per call + $instance.OnNewRequest = $VTable.OnNewRequest + + # Gets shared parameter values + $instance.GetParameterValue = $VTable.GetParameterValue + + # Allows shared module to listen to events from this module + $instance.EventListener = $VTable.EventListener + + # Gets shared argument completers + $instance.ArgumentCompleter = $VTable.ArgumentCompleter + + # The name of the currently selected Azure profile + $instance.ProfileName = $VTable.ProfileName + + # Load the custom module + $customModulePath = Join-Path $PSScriptRoot './custom/Az.Storage.custom.psm1' + if(Test-Path $customModulePath) { + $null = Import-Module -Name $customModulePath + } + + # Export nothing to clear implicit exports + Export-ModuleMember + + # Export proxy cmdlet scripts + $exportsPath = Join-Path $PSScriptRoot './exports' + $directories = Get-ChildItem -Directory -Path $exportsPath + $profileDirectory = $null + if($instance.ProfileName) { + if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { + $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } + } else { + # Don't export anything if the profile doesn't exist for the module + $exportsPath = $null + Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." + } + } elseif(($directories | Measure-Object).Count -gt 0) { + # Load the last folder if no profile is selected + $profileDirectory = $directories | Select-Object -Last 1 + } + + if($profileDirectory) { + Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" + $exportsPath = $profileDirectory.FullName + } + + if($exportsPath) { + Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } + $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath + Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) + } + + # Finalize initialization of this module + $instance.Init(); + Write-Information "Loaded Module '$($instance.Name)'" +# endregion + +# SIG # Begin signature block +# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDBSpO4nLgVZZiE +# p1iRBhK5XCm0c7tXqZhhGj3VQypBsKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA +# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA +# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG +# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN +# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL +# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB +# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw +# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW +# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci +# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG +# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 +# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd +# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ +# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY +# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp +# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn +# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT +# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG +# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O +# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk +# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx +# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt +# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq +# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG +# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG +# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg +# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 +# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr +# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg +# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy +# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 +# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh +# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k +# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB +# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn +# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 +# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w +# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o +# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD +# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa +# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny +# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG +# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t +# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV +# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG +# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl +# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb +# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l +# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 +# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 +# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 +# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam +# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa +# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah +# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA +# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt +# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr +# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw +# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN +# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp +# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB +# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO +# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICoTnpEA1PO8Cs1iKc9nO9Gs +# JFGWx4hSxcUPmz7TINXaMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A +# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB +# BQAEggEAxJ+eODr2dnay7fidsPwXwtJjGVnvSjzJLJDh9U6NlyaR9QvZfjXlZ7xb +# P7DwDabC1DjVWRekSkibPv3zmpeohkc/VMOy09yqDyiu5By8azQyQjxa/WRED8Di +# flpKqNYWKNfxNNi2amGxWpHlt/oIT9jZ6Sr6dnmU8e9FYHnZWMuV4+VjrPVFCB+N +# fuVrL+B4Qj62bMldnruIQ3ak7vs4qZQ3NRweo+OAA+Qk6AoYDRcdpdOyBJhd+ML4 +# Jw6Hs6n2JVorMb2pwDk0tG3DOLEAK1ES2YUvCnGYZb6+uPnGKuwJmxxqCalOto8C +# t0vBStaeObriO+Y9iEfh1FULmlb65qGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC +# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq +# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl +# AwQCAQUABCDrzTIKsiyLMVz/j6KrBzGvchSCVV9a54q74K1OjN8JmwIGZh+4i4gK +# GBMyMDI0MDQyMzEzMTUxNy40MDlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV +# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE +# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl +# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO +# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT +# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ +# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx +# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl +# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC +# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b +# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E +# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 +# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er +# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf +# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog +# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy +# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy +# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv +# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ +# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt +# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV +# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD +# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j +# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG +# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw +# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD +# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 +# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r +# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W +# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq +# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt +# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg +# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ +# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz +# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn +# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 +# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv +# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ +# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m +# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh +# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 +# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD +# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB +# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK +# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg +# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp +# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d +# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 +# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR +# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu +# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO +# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb +# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 +# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t +# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW +# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb +# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz +# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku +# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA +# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 +# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu +# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw +# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 +# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt +# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q +# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 +# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt +# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis +# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp +# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 +# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e +# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ +# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 +# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 +# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ +# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx +# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT +# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh +# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow +# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy +# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk +# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD +# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF +# AOnSH4QwIhgPMjAyNDA0MjMxOTUyMzZaGA8yMDI0MDQyNDE5NTIzNlowdDA6Bgor +# BgEEAYRZCgQBMSwwKjAKAgUA6dIfhAIBADAHAgEAAgIU6jAHAgEAAgIRVDAKAgUA +# 6dNxBAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID +# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACaiRtshc9G8WfVMjQ9x +# gEYZNyoQzv72BU6LutxlZM2r2C6LuYvcx7q63PWs3MxkStXHAb2esRYvBMPDXsgq +# +NN6fYXSMTKwpnHYRiK/t3Uv3SwtPXjykiR2mqVxj6/PkN2nsimpupdSo/lnOZCf +# y706cQscQBC5MafJvRllTUbaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx +# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT +# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB +# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx +# IgQgMMwsh3eiknOq7tkid2X5eRDF1ox79GlCI+jgIH02nIYwgfoGCyqGSIb3DQEJ +# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 +# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw +# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x +# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V +# yVoA0RGxAAEAAAHaMCIEIFb/iamaUnR+fesQaHni5azXdqy22buGhS1oKaTDDm+J +# MA0GCSqGSIb3DQEBCwUABIICAEigCf8U+Np5FkzDYZZ9HOA0bZ4r8mI5fTDYABX1 +# 6GlFPM1CW1DvG17pvoAmaIeyOzyXYK8914nHqYUCkKMWHkJ6rK/BW+RROjVef0QO +# ZA5JZkTcbFQFPz0zgYMAKS0aPK0lkMIlxG/ob2UoFo0B1mXfosR0lNxG5kWpTsFy +# wVXn9y8fJ6VZVQ06AsCZggOW2fhfX1RXBRH3HFa1BiPSfSR0GaQLA9UODpIGPwzx +# 1LvJXuztrkLTD3sD5mF1EVnRGWH5fOJr8DLhML3wSsM+Ns1rLvR/wUbzX2LahcMy +# 2g8C8ThFG3nrKTMf1zhZbfjIfH4JKrK6+J3RkD4wTrursTgmMHCd/Ou0rcFFHR3E +# WOHDeEjY03tsAPfHG5Q2W/d/hv7PSWsmMvgKu+gEy57vHDgiBzd4CRftFKAC3hUt +# XQ40/WVvrv2viT4IOLJLHTrzoNA+WtXMLkMRDOsx+28lFDkte7p3ln4rgHx9EHhe +# 11VKYbb9NlsZhIVguENTJFDUG4MHIyRVnfjgo/meKOV5eQf0cfHtaExM3gaSY6Nc +# ie522JbWLuFBwPwlL3nWPE9gtBejLw2M4gZgJvK7y92/q8347k6tBlB4pNtGYDMh +# +aFhienyKZT4y8EHGLPjox/AE9HmyeUcgFLo3gZZI2pPIakbGPZ5HkWEztwXjnlN +# cRKV +# SIG # End signature block diff --git a/Modules/Az.Storage/6.2.0/Storage.Autorest/bin/Az.Storage.private.dll b/Modules/Az.Storage/6.2.0/Storage.Autorest/bin/Az.Storage.private.dll new file mode 100644 index 000000000000..4bab758632a0 Binary files /dev/null and b/Modules/Az.Storage/6.2.0/Storage.Autorest/bin/Az.Storage.private.dll differ diff --git a/Modules/Az.Storage/6.2.0/Storage.Autorest/custom/Az.Storage.custom.psm1 b/Modules/Az.Storage/6.2.0/Storage.Autorest/custom/Az.Storage.custom.psm1 new file mode 100644 index 000000000000..0f3f2fc72df7 --- /dev/null +++ b/Modules/Az.Storage/6.2.0/Storage.Autorest/custom/Az.Storage.custom.psm1 @@ -0,0 +1,233 @@ +# region Generated + # Load the private module dll + $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.Storage.private.dll') + + # Load the internal module + $internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.Storage.internal.psm1' + if(Test-Path $internalModulePath) { + $null = Import-Module -Name $internalModulePath + } + + # Export nothing to clear implicit exports + Export-ModuleMember + + # Export script cmdlets + Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } + Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias) +# endregion + +# SIG # Begin signature block +# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA5y03H/4iWEUzs +# t4OdHhPLBv3R0cG86hsmM72gSRcR6aCCDYUwggYDMIID66ADAgECAhMzAAADri01 +# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG +# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 +# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 +# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV +# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd +# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w +# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh +# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW +# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v +# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw +# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx +# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB +# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W +# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY +# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV +# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 +# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 +# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t +# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i +# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk +# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK +# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO +# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK +# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm +# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw +# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE +# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD +# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG +# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la +# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc +# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D +# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ +# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk +# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 +# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd +# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL +# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd +# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 +# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS +# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI +# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL +# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD +# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv +# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF +# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h +# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA +# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn +# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 +# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b +# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ +# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy +# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp +# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi +# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb +# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS +# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL +# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX +# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x +# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt +# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p +# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA +# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw +# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOHS +# uBgUYxzLUsV0MV7ZWCnyuNrsCjc7uJNDqt/jRYdhMEIGCisGAQQBgjcCAQwxNDAy +# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20wDQYJKoZIhvcNAQEBBQAEggEA7OY8rcnSjdwuVaa+7HAfKvt5JBFCCtpQss1S +# FMlRXMrhLpJeWuWpjtD3tVg1cbzv+e28sHuqOCq0AnUo37GkNsHsPQsrJXWXAsPu +# MiJpZbrQR9fHVO7ZmCFKPYGQrzwzw59kATSB4uUnlgl7lkJUphjLeqSqcMve+DSC +# pQWsELEhL4qU4dYRHIKvNCPTvwo80SYMX7nosqmsGeksULpwhsNejG5nVoWqgRAv +# ZZ4U+tMre2dB2cot38bioL+AXwzcMv50nxu/YeudNQvy3CuPubH8Bq8pcAO9pE0Z +# 0CfXZBwQHe4GivmTKGzHWr30MbopE/tjSsIF8BLBOf8VC7g0u6GCFykwghclBgor +# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI +# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE +# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAoKLx+wCUgyVXfU7p0uXjzYIzB5KyhOmTi +# N3u5QI7j6QIGZh+4i4d1GBMyMDI0MDQyMzEzMTUxNC4wNzVaMASAAgH0oIHYpIHV +# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL +# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT +# HVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3Nv +# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJ +# WgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg +# UENBIDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkG +# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx +# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z +# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg +# VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQ +# Bgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnC +# lF2cruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf +# 7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3D +# M2K59wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4k +# UQxVhqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXl +# PczvGd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA +# 6RxvMcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagY +# mrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZ +# BO2dhzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT24 +# 93gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREl +# oR2dI6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNV +# HQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D +# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv +# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy +# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l +# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB +# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD +# ggIBALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1ca +# HVh2vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaW +# ZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50 +# WExbBSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q +# /WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C +# /2dOfDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ +# 8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wj +# MXHf0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix +# 5+7KL8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM6 +# 9ff4Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5P +# P37700vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIB +# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE +# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc +# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 +# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 +# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O +# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn +# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t +# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq +# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP +# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW +# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv +# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb +# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten +# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc +# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a +# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB +# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU +# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw +# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E +# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB +# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ +# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ +# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p +# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB +# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v +# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h +# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x +# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p +# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A +# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC +# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB +# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt +# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 +# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV +# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 +# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw +# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB +# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk +# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U +# aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0 +# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/ +# wjhXRn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN +# BgkqhkiG9w0BAQUFAAIFAOnSH4QwIhgPMjAyNDA0MjMxOTUyMzZaGA8yMDI0MDQy +# NDE5NTIzNlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dIfhAIBADAHAgEAAgIU +# 6jAHAgEAAgIRVDAKAgUA6dNxBAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE +# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB +# ACaiRtshc9G8WfVMjQ9xgEYZNyoQzv72BU6LutxlZM2r2C6LuYvcx7q63PWs3Mxk +# StXHAb2esRYvBMPDXsgq+NN6fYXSMTKwpnHYRiK/t3Uv3SwtPXjykiR2mqVxj6/P +# kN2nsimpupdSo/lnOZCfy706cQscQBC5MafJvRllTUbaMYIEDTCCBAkCAQEwgZMw +# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd +# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAA +# AdowDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB +# BDAvBgkqhkiG9w0BCQQxIgQgtr3lqmuuP/fNc9VSPqI2H77Qa4r/WsayEl3YrRTf +# tpswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09 +# 020I5ljibrW/ndICOxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI +# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv +# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD +# QSAyMDEwAhMzAAAB2o7VyVoA0RGxAAEAAAHaMCIEIFb/iamaUnR+fesQaHni5azX +# dqy22buGhS1oKaTDDm+JMA0GCSqGSIb3DQEBCwUABIICADwXfMUys7/kFn8Ix4J8 +# O6shcfUanYymUV99EXDy8dSL0GQe7Z/rU2DZT2Qjli9r4YdUc/NAFay2xC85Cl+q +# 0+3CWbiVBQXmR6bA/0BI2khWAQyljMsbe2ZgKbwBtzG6wcMQKawLakr1TBVlZoZj +# /YUvTiE1YiFkmtE7r5Eas2f5shZzBKB04nNVSUbZ6Dswjk67+uHtqQhcSlw04ZDV +# BEa0I6wM3vkVWLIFDArk7KmAwSHsuKT96IDgRaTG3O1t7hm+JZV+coqEcL8OkTIN +# pNhrnjUOrP+2DYL8dbxMEC6xayXAU9/E4vkQEbQQwf0JQLUm0nn3bv5xWobMZROh +# inxcY6u+uKPxWJzP4B+i6x4FjWNR+/VrE7xwk6R+KPTFSyp2+jUd3HRCk2f3uVNk +# YAi3t2JnfPyawLFPlpUxuNnV6y6OZoeY/s85M3BINnr2bDB41qbLKJEffBdSPIyW +# nyvOnhU+hLL/P8/sLHAsYudp286FS4H+0birbd45kTYFLlAG+8WXVihC5O6kohrm +# o5gaQ6u4CEMAcZI2VNllEtPWnkSZaEHP2b90bWp3hdW/6hs4MZB4ufhdQQuwIzul +# +v/eJJVK3D5B8PER+lUQqk27ze84WzbYDD5x55qRWnvyasFPtq4tDdljOO0TZQ/G +# Jq2cifNdf1mtew2UaqehJLcr +# SIG # End signature block diff --git a/Modules/Az.Storage/6.2.0/Storage.Autorest/exports/ProxyCmdletDefinitions.ps1 b/Modules/Az.Storage/6.2.0/Storage.Autorest/exports/ProxyCmdletDefinitions.ps1 new file mode 100644 index 000000000000..dbe4a197b86c --- /dev/null +++ b/Modules/Az.Storage/6.2.0/Storage.Autorest/exports/ProxyCmdletDefinitions.ps1 @@ -0,0 +1,711 @@ + +# ---------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# http://www.apache.org/licenses/LICENSE-2.0 +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code +# is regenerated. +# ---------------------------------------------------------------------------------- + +<# +.Synopsis +Gets the status of the ongoing migration for the specified storage account. +.Description +Gets the status of the ongoing migration for the specified storage account. +.Example +Get-AzStorageAccountMigration -AccountName myaccount -ResourceGroupName myresroucegroup + +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IStorageIdentity +.Outputs +Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IStorageAccountMigration +.Notes +COMPLEX PARAMETER PROPERTIES + +To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. + +INPUTOBJECT : Identity Parameter + [AccountName ]: The name of the storage account within the specified resource group. Storage account names must be between 3 and 24 characters in length and use numbers and lower-case letters only. + [BlobInventoryPolicyName ]: The name of the storage account blob inventory policy. It should always be 'default' + [DeletedAccountName ]: Name of the deleted storage account. + [EncryptionScopeName ]: The name of the encryption scope within the specified storage account. Encryption scope names must be between 3 and 63 characters in length and use numbers, lower-case letters and dash (-) only. Every dash (-) character must be immediately preceded and followed by a letter or number. + [Id ]: Resource identity path + [Location ]: The location of the deleted storage account. + [ManagementPolicyName ]: The name of the Storage Account Management Policy. It should always be 'default' + [MigrationName ]: The name of the Storage Account Migration. It should always be 'default' + [ObjectReplicationPolicyId ]: For the destination account, provide the value 'default'. Configure the policy on the destination account first. For the source account, provide the value of the policy ID that is returned when you download the policy that was defined on the destination account. The policy is downloaded as a JSON file. + [PrivateEndpointConnectionName ]: The name of the private endpoint connection associated with the Azure resource + [ResourceGroupName ]: The name of the resource group within the user's subscription. The name is case insensitive. + [SubscriptionId ]: The ID of the target subscription. + [Username ]: The name of local user. The username must contain lowercase letters and numbers only. It must be unique only within the storage account. +.Link +https://learn.microsoft.com/powershell/module/az.storage/get-azstorageaccountmigration +#> +function Get-AzStorageAccountMigration { +[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IStorageAccountMigration])] +[CmdletBinding(DefaultParameterSetName='Get', PositionalBinding=$false)] +param( + [Parameter(ParameterSetName='Get', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Path')] + [System.String] + # The name of the storage account within the specified resource group. + # Storage account names must be between 3 and 24 characters in length and use numbers and lower-case letters only. + ${AccountName}, + + [Parameter(ParameterSetName='Get', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Path')] + [System.String] + # The name of the resource group within the user's subscription. + # The name is case insensitive. + ${ResourceGroupName}, + + [Parameter(ParameterSetName='Get')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] + [System.String[]] + # The ID of the target subscription. + ${SubscriptionId}, + + [Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IStorageIdentity] + # Identity Parameter + ${InputObject}, + + [Parameter()] + [Alias('AzureRMContext', 'AzureCredential')] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Azure')] + [System.Management.Automation.PSObject] + # The DefaultProfile parameter is not functional. + # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + ${DefaultProfile}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Wait for .NET debugger to attach + ${Break}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be appended to the front of the pipeline + ${HttpPipelineAppend}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be prepended to the front of the pipeline + ${HttpPipelinePrepend}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Uri] + # The URI for the proxy server to use + ${Proxy}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.PSCredential] + # Credentials for a proxy server to use for the remote call + ${ProxyCredential}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Use the default credentials for the proxy + ${ProxyUseDefaultCredentials} +) + +begin { + try { + $outBuffer = $null + if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { + $PSBoundParameters['OutBuffer'] = 1 + } + $parameterSet = $PSCmdlet.ParameterSetName + + if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() + } + $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + if ($preTelemetryId -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() + [Microsoft.Azure.PowerShell.Cmdlets.Storage.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) + } else { + $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + if ($internalCalledCmdlets -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name + } else { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' + } + + $mapping = @{ + Get = 'Az.Storage.private\Get-AzStorageAccountMigration_Get'; + GetViaIdentity = 'Az.Storage.private\Get-AzStorageAccountMigration_GetViaIdentity'; + } + if (('Get') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } + } + $cmdInfo = Get-Command -Name $mapping[$parameterSet] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) + } + $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) + $scriptCmd = {& $wrappedCmd @PSBoundParameters} + $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) + $steppablePipeline.Begin($PSCmdlet) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} + +process { + try { + $steppablePipeline.Process($_) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } + + finally { + $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + +} +end { + try { + $steppablePipeline.End() + + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets + if ($preTelemetryId -eq '') { + [Microsoft.Azure.PowerShell.Cmdlets.Storage.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId + + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} +} + +<# +.Synopsis +Account Migration request can be triggered for a storage account to change its redundancy level. +The migration Customer the non-zonal redundant storage account to a zonal redundant account or vice-versa in order to have better reliability and availability. +Zone-redundant storage (ZRS) replicates your storage account synchronously across three Azure availability zones in the primary region. +.Description +Account Migration request can be triggered for a storage account to change its redundancy level. +The migration Customer the non-zonal redundant storage account to a zonal redundant account or vice-versa in order to have better reliability and availability. +Zone-redundant storage (ZRS) replicates your storage account synchronously across three Azure availability zones in the primary region. +.Example +Start-AzStorageAccountMigration -AccountName myaccount -ResourceGroupName myresourcegroup -TargetSku Standard_LRS -Name migration1 -AsJob +.Example +Get-AzStorageAccount -ResourceGroupName myresourcegroup -Name myaccount | Start-AzStorageAccountMigration -TargetSku Standard_LRS -AsJob +.Example +$properties = '{ + "properties": { + "targetSkuName": "Standard_ZRS" + } +}' + Start-AzStorageAccountMigration -ResourceGroupName myresourcegroup -AccountName myaccount -JsonString $properties -AsJob +.Example +# Before executing the cmdlet, make sure you have a json file that contains {"properties": {"targetSkuName": }} +Start-AzStorageAccountMigration -ResourceGroupName myresourcegroup -AccountName myaccount -JsonFilePath properties.json -AsJob + +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IStorageIdentity +.Outputs +System.Boolean +.Notes +COMPLEX PARAMETER PROPERTIES + +To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. + +INPUTOBJECT : Identity Parameter + [AccountName ]: The name of the storage account within the specified resource group. Storage account names must be between 3 and 24 characters in length and use numbers and lower-case letters only. + [BlobInventoryPolicyName ]: The name of the storage account blob inventory policy. It should always be 'default' + [DeletedAccountName ]: Name of the deleted storage account. + [EncryptionScopeName ]: The name of the encryption scope within the specified storage account. Encryption scope names must be between 3 and 63 characters in length and use numbers, lower-case letters and dash (-) only. Every dash (-) character must be immediately preceded and followed by a letter or number. + [Id ]: Resource identity path + [Location ]: The location of the deleted storage account. + [ManagementPolicyName ]: The name of the Storage Account Management Policy. It should always be 'default' + [MigrationName ]: The name of the Storage Account Migration. It should always be 'default' + [ObjectReplicationPolicyId ]: For the destination account, provide the value 'default'. Configure the policy on the destination account first. For the source account, provide the value of the policy ID that is returned when you download the policy that was defined on the destination account. The policy is downloaded as a JSON file. + [PrivateEndpointConnectionName ]: The name of the private endpoint connection associated with the Azure resource + [ResourceGroupName ]: The name of the resource group within the user's subscription. The name is case insensitive. + [SubscriptionId ]: The ID of the target subscription. + [Username ]: The name of local user. The username must contain lowercase letters and numbers only. It must be unique only within the storage account. +.Link +https://learn.microsoft.com/powershell/module/az.storage/start-azstorageaccountmigration +#> +function Start-AzStorageAccountMigration { +[OutputType([System.Boolean])] +[CmdletBinding(DefaultParameterSetName='CustomerExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] +param( + [Parameter(ParameterSetName='CustomerExpanded', Mandatory)] + [Parameter(ParameterSetName='CustomerViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='CustomerViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Path')] + [System.String] + # The name of the storage account within the specified resource group. + # Storage account names must be between 3 and 24 characters in length and use numbers and lower-case letters only. + ${AccountName}, + + [Parameter(ParameterSetName='CustomerExpanded', Mandatory)] + [Parameter(ParameterSetName='CustomerViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='CustomerViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Path')] + [System.String] + # The name of the resource group within the user's subscription. + # The name is case insensitive. + ${ResourceGroupName}, + + [Parameter(ParameterSetName='CustomerExpanded')] + [Parameter(ParameterSetName='CustomerViaJsonFilePath')] + [Parameter(ParameterSetName='CustomerViaJsonString')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] + [System.String] + # The ID of the target subscription. + ${SubscriptionId}, + + [Parameter(ParameterSetName='CustomerViaIdentityExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IStorageIdentity] + # Identity Parameter + ${InputObject}, + + [Parameter(ParameterSetName='CustomerExpanded', Mandatory)] + [Parameter(ParameterSetName='CustomerViaIdentityExpanded', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.PSArgumentCompleterAttribute("Standard_LRS", "Standard_GRS", "Standard_RAGRS", "Standard_ZRS", "Premium_LRS", "Premium_ZRS", "Standard_GZRS", "Standard_RAGZRS")] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Body')] + [System.String] + # Target sku name for the account + ${TargetSku}, + + [Parameter(ParameterSetName='CustomerExpanded')] + [Parameter(ParameterSetName='CustomerViaIdentityExpanded')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Body')] + [System.String] + # current value is 'default' for customer initiated migration + ${Name}, + + [Parameter(ParameterSetName='CustomerExpanded')] + [Parameter(ParameterSetName='CustomerViaIdentityExpanded')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Body')] + [System.String] + # SrpAccountMigrationType in ARM contract which is 'accountMigrations' + ${Type}, + + [Parameter(ParameterSetName='CustomerViaJsonFilePath', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Body')] + [System.String] + # Path of Json file supplied to the Customer operation + ${JsonFilePath}, + + [Parameter(ParameterSetName='CustomerViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Body')] + [System.String] + # Json string supplied to the Customer operation + ${JsonString}, + + [Parameter()] + [Alias('AzureRMContext', 'AzureCredential')] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Azure')] + [System.Management.Automation.PSObject] + # The DefaultProfile parameter is not functional. + # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + ${DefaultProfile}, + + [Parameter()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Run the command as a job + ${AsJob}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Wait for .NET debugger to attach + ${Break}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be appended to the front of the pipeline + ${HttpPipelineAppend}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be prepended to the front of the pipeline + ${HttpPipelinePrepend}, + + [Parameter()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Run the command asynchronously + ${NoWait}, + + [Parameter()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Returns true when the command succeeds + ${PassThru}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Uri] + # The URI for the proxy server to use + ${Proxy}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.PSCredential] + # Credentials for a proxy server to use for the remote call + ${ProxyCredential}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Use the default credentials for the proxy + ${ProxyUseDefaultCredentials} +) + +begin { + try { + $outBuffer = $null + if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { + $PSBoundParameters['OutBuffer'] = 1 + } + $parameterSet = $PSCmdlet.ParameterSetName + + if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() + } + $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + if ($preTelemetryId -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() + [Microsoft.Azure.PowerShell.Cmdlets.Storage.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) + } else { + $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + if ($internalCalledCmdlets -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name + } else { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' + } + + $mapping = @{ + CustomerExpanded = 'Az.Storage.private\Start-AzStorageAccountMigration_CustomerExpanded'; + CustomerViaIdentityExpanded = 'Az.Storage.private\Start-AzStorageAccountMigration_CustomerViaIdentityExpanded'; + CustomerViaJsonFilePath = 'Az.Storage.private\Start-AzStorageAccountMigration_CustomerViaJsonFilePath'; + CustomerViaJsonString = 'Az.Storage.private\Start-AzStorageAccountMigration_CustomerViaJsonString'; + } + if (('CustomerExpanded', 'CustomerViaJsonFilePath', 'CustomerViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } + } + $cmdInfo = Get-Command -Name $mapping[$parameterSet] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) + } + $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) + $scriptCmd = {& $wrappedCmd @PSBoundParameters} + $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) + $steppablePipeline.Begin($PSCmdlet) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} + +process { + try { + $steppablePipeline.Process($_) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } + + finally { + $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + +} +end { + try { + $steppablePipeline.End() + + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets + if ($preTelemetryId -eq '') { + [Microsoft.Azure.PowerShell.Cmdlets.Storage.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId + + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} +} + +# SIG # Begin signature block +# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAb2g84jFCjEdAs +# 41J0su87T7z7OzIYYOgOiQ4ApPFYt6CCDYUwggYDMIID66ADAgECAhMzAAADri01 +# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG +# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 +# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 +# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV +# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd +# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w +# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh +# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW +# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v +# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw +# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx +# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB +# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W +# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY +# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV +# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 +# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 +# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t +# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i +# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk +# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK +# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO +# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK +# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm +# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw +# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE +# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD +# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG +# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la +# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc +# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D +# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ +# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk +# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 +# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd +# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL +# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd +# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 +# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS +# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI +# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL +# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD +# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv +# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF +# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h +# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA +# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn +# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 +# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b +# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ +# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy +# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp +# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi +# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb +# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS +# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL +# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX +# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x +# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt +# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p +# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA +# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw +# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN5d +# KpB7YmASQe9oicJvjU4XZ9kAIXDs1p2+JC05PQtAMEIGCisGAQQBgjcCAQwxNDAy +# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20wDQYJKoZIhvcNAQEBBQAEggEAOXiL6fg9ERblsqFuQ7PI98GiyHd9Zxg3JipS +# QBWJQ1hH2UjKgLUikconGHIUVSoSUAkEcKEkrir4FskZztSnB+jhV+94RNXAtg8B +# O9a1pw+NeR54+cUt8MQiZgXh1KVHGYx6IvlvPb9NT5MpHf3yo89t1g0ruLRVNQZF +# qTACBCAxMCi7xzV20d67V2zVi8jUZB0yo/zZcYxW9a9KflNuSN6q6y54iOiqDm0j +# vozY/sMptNsmnkGj3DH9AiZl9tdZhk6EZYD/KCUYRqWYBE+baq8qXJoEt75aMi1W +# 4PJf6P1JJ30KTNCEPHN+ES1poCCABjHFkZ3MwPRD6rtZK2alaKGCFykwghclBgor +# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI +# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE +# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBMXVga181GW6x+WHe+WiGJgoFTe8jr1dpo +# qOTHMALa7gIGZh/+xUPBGBMyMDI0MDQyMzEzMTYxNC4xODJaMASAAgH0oIHYpIHV +# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL +# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT +# HVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3Nv +# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcd +# ldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg +# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkG +# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx +# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z +# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg +# VFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhO +# A5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g +# 7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5v +# FJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKm +# v6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTR +# KuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODuj +# lFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzY +# C1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834 +# bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGu +# YEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4w +# pmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0I +# l598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNV +# HQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D +# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv +# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy +# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l +# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB +# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD +# ggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shy +# vxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LS +# mb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTx +# vfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5q +# Bk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5k +# VfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDm +# i9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJsp +# upBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvY +# h+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOW +# InVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKU +# hRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIB +# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE +# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc +# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 +# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 +# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O +# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn +# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t +# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq +# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP +# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW +# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv +# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb +# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten +# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc +# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a +# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB +# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU +# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw +# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E +# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB +# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ +# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ +# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p +# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB +# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v +# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h +# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x +# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p +# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A +# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC +# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB +# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt +# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 +# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV +# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 +# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw +# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB +# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk +# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U +# aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0 +# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyi +# DbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN +# BgkqhkiG9w0BAQUFAAIFAOnRvQQwIhgPMjAyNDA0MjMxMjUyMjBaGA8yMDI0MDQy +# NDEyNTIyMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dG9BAIBADAHAgEAAgIH +# /zAHAgEAAgISKDAKAgUA6dMOhAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE +# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB +# AEtAJf9QQUkfnjakWpA/WTJ4s59d1ydd1YCu0doiQ7zKrtg+fPXaO+UnceDABE97 +# pgPadQ3qu9K0ikm1c/cMWaf6FyR3t7zee3PwsEGTk2CPIUwLCYrMasurESYCykjm +# cyo5aeimsVVRSCr36tnZYZLeD4pEzDs6hAxbbMfDl26nMYIEDTCCBAkCAQEwgZMw +# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd +# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAA +# Ad0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB +# BDAvBgkqhkiG9w0BCQQxIgQgyksLTQNtI8GU91zwuitk6vZibkpkYCJ2r8VrGEqf +# DbgwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk3 +# 7UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI +# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv +# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD +# QSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIOmVHNIZrArpRiTxre+ot/Sc +# GrSRpjA9BFR2kZJAoOaAMA0GCSqGSIb3DQEBCwUABIICAC1jT1QTLAmmbvqJea91 +# O0HiAuDThL2LPL8noffKRSjb8uQRjw0OY42k98I1l9SKsQPDAGL11WMva/EvL9HP +# f+E/JJGd9NQaz3Ej3dBvhVA/1zc+V9lU5ITVkzDQ7WyKZuY3EzXIO2dSZK+ocF9j +# OqL3SqoKhfkbkaGk7aCa1vJlGrhDYhqcsYe8ANAkaWYvOhdM9UwgJenjCRrNmvDF +# pyD6LGdkqOWkiJ0w4wGMA0clBybNFE05egpW2KR97qz89rp6XNeO+BIVmbGR6yrs +# r6plvMd/Kc9T7Ad8yrleYlMCJLyI9+iX2vJcoA5Zjwflbzu4LzZs8cNPkk8Fw/EL +# jzmpk1JoD0Oq/MOEw+WHxrr6eedE2wA44Ald8qaXJKCSVU/Edszp7bhGOOhjErDf +# YVYhLypxcRjSEN3fAa8DvxkVYblqoIwSOnTd2uZe4u88wiiLYPW835r/xw8/1APb +# C68ruNPSociVPttXLjzxxTrFJk5Dd0lbgkryXlPvenYrqwWos/f1bcxwROrTzWuY +# olY8d5OkiwMZA49WC0YtKi6JY4MGd/eegWlM+siTFPYSvZy5OX6JSQg0kOZgjRGz +# sDT27Acu1r0vx1qjKqBaSQhtSWnzBb/K/RrWDhzac1SdD42BNMVfUBNKUWS31vvM +# +0ZRqVotv7IRiLqgEkG2VgYF +# SIG # End signature block diff --git a/Modules/Az.Storage/6.2.0/Storage.Autorest/internal/Az.Storage.internal.psm1 b/Modules/Az.Storage/6.2.0/Storage.Autorest/internal/Az.Storage.internal.psm1 new file mode 100644 index 000000000000..4c38fbc9ad64 --- /dev/null +++ b/Modules/Az.Storage/6.2.0/Storage.Autorest/internal/Az.Storage.internal.psm1 @@ -0,0 +1,254 @@ +# region Generated + # Load the private module dll + $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.Storage.private.dll') + + # Get the private module's instance + $instance = [Microsoft.Azure.PowerShell.Cmdlets.Storage.Module]::Instance + + # Export nothing to clear implicit exports + Export-ModuleMember + + # Export proxy cmdlet scripts + $exportsPath = $PSScriptRoot + $directories = Get-ChildItem -Directory -Path $exportsPath + $profileDirectory = $null + if($instance.ProfileName) { + if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { + $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } + } else { + # Don't export anything if the profile doesn't exist for the module + $exportsPath = $null + Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." + } + } elseif(($directories | Measure-Object).Count -gt 0) { + # Load the last folder if no profile is selected + $profileDirectory = $directories | Select-Object -Last 1 + } + + if($profileDirectory) { + Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" + $exportsPath = $profileDirectory.FullName + } + + if($exportsPath) { + Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } + $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath + Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) + } +# endregion + +# SIG # Begin signature block +# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCy7aZDAGSyfmFx +# cucI97RlwuRwihoeuqeEAnHkOPtxE6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA +# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA +# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG +# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN +# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL +# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB +# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw +# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW +# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci +# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG +# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 +# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd +# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ +# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY +# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp +# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn +# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT +# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG +# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O +# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk +# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx +# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt +# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq +# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG +# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG +# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg +# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 +# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr +# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg +# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy +# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 +# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh +# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k +# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB +# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn +# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 +# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w +# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o +# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD +# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa +# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny +# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG +# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t +# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV +# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG +# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl +# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb +# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l +# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 +# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 +# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 +# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam +# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa +# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah +# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA +# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt +# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr +# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw +# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN +# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp +# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB +# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO +# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOZ6yYa7DB3+xmD8tDvpbqhN +# Ix970n4cBVEw+6C8mm8TMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A +# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB +# BQAEggEApSTRywZkG5pfZhoRxWT9J9k7JbxxB/GygvAJbACWXShC28nhNa8FP+Pp +# RcSMEvYqutgCi/RpVFnbYqH9mLGarAT7ASYVoQXg/sI9Go+vnD4EOSoimL5yqy3e +# qxIASlJc64lG40y39ANZ2BLXYzOsV+l7lvkU+a29dcS4HkebXQnrTiW5nYkStB68 +# ICZv51bIYl+NZfcVejT/11HWRkjXbksyo1FLUtYVZ1GSs80oLYk2zW0AKG9OFD+p +# CduPZ8cJ/r+LntNlU+JpIeFNt3E1IXi90z7tc1ZF8260DbTmA1kbZCwBzKlKFlI+ +# NIrkmfVgBf4Sqn6SwJLbJKKex+C9OKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC +# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq +# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl +# AwQCAQUABCDi8tBO5URUi/ldnE2+bcoMZiG25NXKMuq6UPXOG2MCtgIGZh/Gspi5 +# GBMyMDI0MDQyMzEzMTUxNi41NDJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV +# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE +# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl +# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO +# OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT +# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ +# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx +# MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl +# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC +# RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ +# pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm +# scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF +# UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr +# c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T +# 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J +# IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz +# z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U +# NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O +# ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 +# UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx +# /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh +# Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD +# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j +# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG +# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw +# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD +# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t +# 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 +# GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 +# vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu +# dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY +# nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ +# 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z +# 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC +# V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH +# BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf +# v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv +# E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ +# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m +# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh +# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 +# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD +# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB +# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK +# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg +# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp +# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d +# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 +# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR +# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu +# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO +# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb +# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 +# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t +# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW +# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb +# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz +# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku +# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA +# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 +# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu +# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw +# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 +# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt +# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q +# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 +# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt +# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis +# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp +# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 +# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e +# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ +# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 +# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 +# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ +# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx +# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT +# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh +# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 +# RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy +# dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk +# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD +# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF +# AOnSLW4wIhgPMjAyNDA0MjMyMDUxNThaGA8yMDI0MDQyNDIwNTE1OFowdzA9Bgor +# BgEEAYRZCgQBMS8wLTAKAgUA6dItbgIBADAKAgEAAgIC3QIB/zAHAgEAAgIklzAK +# AgUA6dN+7gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB +# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAL5g/H2OsBvN7sRs +# WQpifcZ3xYuCaQCapfehI/sIyCMsEeFt/2Io5kSBiNhwofo99Xxk/KCzCACcFbyA +# 216UwvxZQbZWgBcarXLP7Rn9Q+U10U19mENvKVuFTzZt3+19K/W7+QQ4Y0MOWaYZ +# uM2O+a3lHbrYuq3jAheJ+WJ8OBwrMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC +# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV +# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp +# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUD +# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B +# CQQxIgQgPYJirjhImRMXLyJQLrVsvlcFAhmAiPt+/1CMubooycwwgfoGCyqGSIb3 +# DQEJEAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xy +# MuYmKjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u +# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp +# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB +# 49+9m5ocaIMiAAEAAAHjMCIEIAjbaHNr0MEVS4sdIKFzDEisoKgKMPqA12+DiwHa +# 14RcMA0GCSqGSIb3DQEBCwUABIICAIOTbL25cV4OJg7BwjuO3LPuQk5nCWV6KsZY +# lrgixcKdMHzEpXxxJs03fGErBKkDbR5jNPSWaLIPJMrC/d//8o812nZlex/RdaAr +# mhvZsiv2JTciozQGvSwpADOtbRoNf5lzwYMMzw72isvT39o6UFOkkktJeFziGoWq +# ig+Eg1G2pZpfwjwxmRzS+q2ZBwB0Uvt99CV/Yhya8kKdr8uEMEGEXk6OKfVRy+mj +# H7Xp/yDOO4sF7n9+IQwDOUvH5qtGwrGHWFutUxPlZ47E622di/aCEFoPfwHZaZYj +# HeE9fpGhhevue9l4v/370uS7XwcV6nfANjZOMdPbpkDmkMQbrtlU2ZFD+91J7aD1 +# NvHAL5wKMceKvZ9VgkdTFaPLLhTzvWs2wQlptCKVJ6YSofbwnlYl5+Rl9luHlA7y +# dHhHMDvctomCNtjmGfAFbK5MPPZIi08A4FT9GtsIHwqwRPC7Vy+OaG/4d3hHMGOh +# z2av7Vzb1XNcrBoLWEqK7v+ArPlPVFgGP6TDng17Hw5PUqEfrsPafxD4Avke5yWr +# IH3mCsBK8Ev7/uajTwZhsCyQA7H/VYegy1WOwwJLSJc5aDWfvADH/ltCTQ0wPftQ +# Kog7qnNgj+GNK8zQjnAl/P6ndU46f2o0gatr2S6TsPf2Wz2jewEq0wtG/SxVTXdf +# eMRbHDv8 +# SIG # End signature block diff --git a/Modules/Az.Storage/6.2.0/Storage.Autorest/internal/ProxyCmdletDefinitions.ps1 b/Modules/Az.Storage/6.2.0/Storage.Autorest/internal/ProxyCmdletDefinitions.ps1 new file mode 100644 index 000000000000..b1569f704b21 --- /dev/null +++ b/Modules/Az.Storage/6.2.0/Storage.Autorest/internal/ProxyCmdletDefinitions.ps1 @@ -0,0 +1,341 @@ + +# ---------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# http://www.apache.org/licenses/LICENSE-2.0 +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code +# is regenerated. +# ---------------------------------------------------------------------------------- + +<# +.Synopsis +Lists all of the available Storage Rest API operations. +.Description +Lists all of the available Storage Rest API operations. +.Example +{{ Add code here }} +.Example +{{ Add code here }} + +.Outputs +Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IOperation +.Link +https://learn.microsoft.com/powershell/module/az.storage/get-azstorageoperation +#> +function Get-AzStorageOperation { +[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Storage.Models.IOperation])] +[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)] +param( + [Parameter()] + [Alias('AzureRMContext', 'AzureCredential')] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Azure')] + [System.Management.Automation.PSObject] + # The DefaultProfile parameter is not functional. + # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + ${DefaultProfile}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Wait for .NET debugger to attach + ${Break}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be appended to the front of the pipeline + ${HttpPipelineAppend}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be prepended to the front of the pipeline + ${HttpPipelinePrepend}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Uri] + # The URI for the proxy server to use + ${Proxy}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.PSCredential] + # Credentials for a proxy server to use for the remote call + ${ProxyCredential}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.Storage.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Use the default credentials for the proxy + ${ProxyUseDefaultCredentials} +) + +begin { + try { + $outBuffer = $null + if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { + $PSBoundParameters['OutBuffer'] = 1 + } + $parameterSet = $PSCmdlet.ParameterSetName + + $mapping = @{ + List = 'Az.Storage.private\Get-AzStorageOperation_List'; + } + + $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) + $scriptCmd = {& $wrappedCmd @PSBoundParameters} + $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) + $steppablePipeline.Begin($PSCmdlet) + } catch { + + throw + } +} + +process { + try { + $steppablePipeline.Process($_) + } catch { + + throw + } + +} +end { + try { + $steppablePipeline.End() + + } catch { + + throw + } +} +} + +# SIG # Begin signature block +# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCgt1eYSynQydyh +# 8Ml5356BTm7OPXH6jVXej6UyOvOKLKCCDYUwggYDMIID66ADAgECAhMzAAADri01 +# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG +# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 +# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 +# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV +# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd +# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w +# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh +# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW +# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v +# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw +# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx +# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB +# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W +# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY +# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV +# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 +# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 +# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t +# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i +# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk +# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK +# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO +# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK +# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm +# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw +# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE +# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD +# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG +# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la +# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc +# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D +# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ +# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk +# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 +# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd +# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL +# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd +# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 +# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS +# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI +# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL +# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD +# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv +# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf +# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF +# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h +# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA +# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn +# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 +# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b +# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ +# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy +# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp +# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi +# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb +# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS +# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL +# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX +# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x +# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt +# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p +# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA +# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw +# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKhk +# J/Bb7gUF9v97kIvcC54O3asEGquzW5jmLWLOCrq3MEIGCisGAQQBgjcCAQwxNDAy +# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20wDQYJKoZIhvcNAQEBBQAEggEAwsjPvMe1jozYm6VK4CmQ3NqL4gPLTR18VA1b +# NgLs/JXRHWz1ZImKQYjKhXT7nHN5/UUQLy0lS/pe9DU0X+NhYPKBTeGm4JVM0M5X +# eMrPdy49kb0JrOi8q/DZGBMrsWNO/2rQGXJtPIxJlVtE+5CW2zt2LICbPhUGtzhL +# rrhUcpoXm+sYm5qdVfFVtfHpcmaM2VdkdQ8Kkp7PZKvc0JTvb5jnEQUbzWlgHdgj +# 5necab154WfNY6Pmc2W/and0Gj3qXD3dQ7MFe74x49fdpds55MIAn7sXx9h35+Ni +# huIJVMY8FOi2g5UcK/g0ilgqhWP2Tzz2lvKXrYp40CEzNFJdVaGCFykwghclBgor +# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI +# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE +# WQoDATAxMA0GCWCGSAFlAwQCAQUABCD8JaBUcoM8W2QQzZ4p3yrFOXCOdLsHsXTC +# XPEqfE2fngIGZh/SmF9cGBMyMDI0MDQyMzEzMTUyMy4yOThaMASAAgH0oIHYpIHV +# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL +# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT +# HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv +# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA +# 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg +# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG +# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx +# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z +# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg +# VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7 +# 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY +# SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4 +# dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq +# cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE +# izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J +# VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/ +# 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu +# QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm +# z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc +# c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd +# JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV +# HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D +# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv +# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy +# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov +# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l +# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB +# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD +# ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG +# gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup +# gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU +# wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg +# oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD +# YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu +# dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3 +# 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu +# uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD +# C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY +# FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB +# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE +# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc +# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 +# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 +# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O +# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn +# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t +# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq +# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP +# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW +# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv +# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb +# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten +# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc +# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a +# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB +# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU +# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw +# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E +# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB +# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ +# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ +# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p +# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB +# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v +# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h +# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x +# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p +# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A +# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC +# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB +# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt +# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 +# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV +# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 +# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw +# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB +# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk +# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U +# aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0 +# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD +# d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu +# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN +# BgkqhkiG9w0BAQUFAAIFAOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQy +# NDA5NDMyMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS +# 7DAHAgEAAgISrzAKAgUA6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE +# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB +# ADCABKpo/NApeGAt90g97xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2f +# GPvThUiQemQ8jwI/aA1i5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60 +# f1cT69nPDTDg+i6ONCMmCZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMw +# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd +# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAA +# AeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB +# BDAvBgkqhkiG9w0BCQQxIgQgvj5qzxWChAVLsqkro1ZGKmBsEodEbt3CbOCn+T4u +# 4qowgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb +# 8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI +# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv +# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD +# QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNaw +# ncfq1eDXUwS6ExT0PRgiMA0GCSqGSIb3DQEBCwUABIICAFlG4P/7cv7bMR/eF15U +# CWjipOKUwPNqlyLzILj0vS+KsOk2vyv247gJzO/8muBdUuIR72yhkwy4LscKADWW +# iJewFJQCv2Rv4j63htbIbfSHfh/8aS7m3JNcJylEUWJgc72fkzDUJ3LAOLoIF+0+ +# P9ORsbLqQ8cRNqSKGwghQOw957kHFoa4SswOHXmMNuNAXfE8QuP8RRimwHZqetJp +# 6MD1mysRkGlxKELvA8L08njXzcINgpEG5h/qMYgcmeR31l+wdgwtWtDEzt+7FujK +# Wb5FH33qei0czIeBHRcw/SfMuA/1zpTvxf30r8llIJVGBHXBnGJd/gNNsQ4r6sJo +# 9bNB5W/unOa4kKWE65LoZRCyF+eXG/EXt/FV33FhXA87oJK8IMvreOt2B6YdlyeW +# BzwzaLj/VZr1PNzc/aq+FP/4ec5t5XLra+Fy2rztvJywTxXzq979WlPjUe4q6z3g +# IncnLy3kzaY5CySBFrgsVpgy+jEPWl9ps7J9yEwY/tVpybOZTfxJQDDZWidmFTrC +# Ya1qYtDz5f3CV2VVimk1DG5I/6qQbK6sxAtak8Fvn78PM0tZIB6dYol4HJmMNteW +# I4aPDjwIbtJHT0qrj+TCw9RJY1ujEeNvdgg+Q0aRjegNKpWBeGvFClHDzGipdTw9 +# rs1zkwRO5o2ybmyyjea1JaKn +# SIG # End signature block diff --git a/Modules/Az.Storage/6.2.0/Storage.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 b/Modules/Az.Storage/6.2.0/Storage.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 new file mode 100644 index 000000000000..013f81482e53 --- /dev/null +++ b/Modules/Az.Storage/6.2.0/Storage.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 @@ -0,0 +1,224 @@ +param() +if ($env:AzPSAutorestTestPlaybackMode) { + $loadEnvPath = Join-Path $PSScriptRoot '..' 'test' 'loadEnv.ps1' + . ($loadEnvPath) + return $env.SubscriptionId +} +return (Get-AzContext).Subscription.Id +# SIG # Begin signature block +# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvmGT2RlJhp/rC +# DOiTnt/3S1Bv3biEMflyZwWMS2xRdKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA +# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA +# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG +# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN +# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL +# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB +# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw +# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW +# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci +# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG +# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 +# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd +# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ +# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY +# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp +# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn +# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT +# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG +# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O +# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk +# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx +# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt +# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq +# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG +# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG +# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg +# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 +# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr +# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg +# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy +# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 +# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh +# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k +# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB +# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn +# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 +# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w +# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o +# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD +# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa +# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny +# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG +# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t +# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV +# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG +# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl +# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb +# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l +# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 +# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 +# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 +# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam +# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa +# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah +# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA +# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt +# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr +# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw +# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN +# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp +# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB +# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO +# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPSNBc+wDke3rcRSTQbfFzLx +# ZjDqn60fWPPP7nkeXd5aMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A +# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB +# BQAEggEAI3AiRqpKxDyY7Xif/O/Va9yF+UPFe20J42a4XVPNzG9UHBXXA5c4vG/h +# WMPt2wFxo+nVwLEVw/Vfumaj1Ole5LgOLfKN9AKQMJtVgm+JuHrQ1h1U0C3xU5ti +# LxK9ZYrXq3lyolRiP3qiaPAo1eYf8iUt20LxH2l7dQqWuK1CLsir/frf2+bmIgGs +# OHvHG6VmcFCiuWHvTniht2RlgU8z0lGIJieXerc9lg+C16CLIbWnUs1R8GYvCiZf +# 6M8VBXoc4IyArAJhOydXzCnZ7RTfHhJPlRSgZonmsasaotIraOoI0ruU7ZJNqDTJ +# 89QYVGXxgzZmqGrF9Nwtiz2qyrz6gKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC +# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq +# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl +# AwQCAQUABCB2AsYG22qL48D3SeNieGLygsNGPcW/pJNXg/Iz9gpf4gIGZhf9t0/J +# GBMyMDI0MDQyMzEzMTYxMi4wNTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV +# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE +# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l +# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w +# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg +# ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B +# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE +# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD +# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 +# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz +# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv +# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z +# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV +# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB +# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 +# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob +# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs +# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC +# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I +# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU +# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR +# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO +# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ +# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX +# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh +# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G +# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG +# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy +# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w +# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy +# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG +# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD +# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG +# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM +# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe +# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV +# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI +# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM +# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF +# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO +# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x +# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT +# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu +# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI +# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw +# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x +# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy +# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC +# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV +# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp +# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg +# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF +# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 +# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp +# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu +# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E +# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 +# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q +# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ +# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA +# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw +# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG +# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV +# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj +# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK +# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC +# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX +# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v +# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI +# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG +# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x +# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC +# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 +# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM +# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS +# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d +# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn +# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs +# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL +# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL +# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ +# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp +# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw +# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn +# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD +# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC +# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w +# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dGk+zAiGA8yMDI0MDQyMzAzMDk0 +# N1oYDzIwMjQwNDI0MDMwOTQ3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0aT7 +# AgEAMAoCAQACAh2yAgH/MAcCAQACAhQBMAoCBQDp0vZ7AgEAMDYGCisGAQQBhFkK +# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ +# KoZIhvcNAQELBQADggEBAG3Tuff4zR8zcaVgTLUDfl0xfRocWtx6pvLTWn5lo6N9 +# Ak/XTdyVZV3oFZBAbtKglmbTcLN40qFbmrGuTqIuiHb7JQZlTjW5F+EQgD7YsS4c +# wJ6YQVFrXtZDUB0EICL7yMptISLaBGXZPelWUJ7qLaIFu9jwk1lhSiJBBWtmOqXf +# qbtcuT8D1Y1cggfTZkt8vGF4GZRkEaQwd14QQKGm8fLz4WwtzneqbM0vXhNcJy6o +# Q/GCqSvXz1qE8em5Ym2ZtBL14QDm8x+/D8tLpZXCx6+AsR26NUgkkQjRyuEunW+c +# KSokVvA6lrCyTg8VerFU7w8xbfbO2/dRz4EkBrijI9MxggQNMIIECQIBATCBkzB8 +# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk +# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N +# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB +# 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE +# MC8GCSqGSIb3DQEJBDEiBCATp/j+fbIONwltPGMNVeIQjZybF0MAHj7rLvCN7SYL +# ejCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q +# FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m +# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB +# IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgkSVAVMCQP43gRUUZLldZpT1L +# MwzkyidT5GxFNcH73KkwDQYJKoZIhvcNAQELBQAEggIAc3aHnCGQVnA2KNO7B3g0 +# kvOq2AawC/1uRNCNzsBDkZmz+9gEikRhIunONhyjxsxjKJ+lNOjQ3yqhrEExk22l +# lZoecpkJZSexfZyDf3DITt/AJ42CeYjxuqHfDIlkZFuIRtmrUFuidWEZC/w4T2sm +# NcO1aLAO7diSR4eNqW22H5Hte6cZaO4IuWWK8J8Rj81ILicIro7JNp44RkP3b0XJ +# MZPFNNCr5k1D4rVGy1+ppO+0OpBQW/RhNsxctFgaeaTr8haC8qjrLghdYOnQ1mG7 +# rmIdaCGaZGMC9kCm3CCgKyNEU3CSs/toRc/tO6bCLTdzQrJFCgHsgp1FcCyhsX9v +# yu7srmvk7NFp4I1YG1CkjGVPOwtiZkQp6D0b2rZ+W6g819sanOgTvLXfgXRgwSkX +# ObyF9ZRi0/rWNo/aWaDC5Nd0okqwge9jWeJVb3EEh0f39LriH+z1pkpl1yUJ6J7L +# tiVGCGumGPyh2cTLvlKWvghyFxqw4LI8XuRSaiipzHvlClAFUfGwlvNqa5j0n66f +# TVr/5lJ3EDVmmWcXupLMOVeYZl5rhDC5z0q9WfwrEnovIrMzQhSTMbmpCj7Vvolf +# 3cbYbsn6P6qb99uYjAULxwj4yJ8/n/MsGoJuDbmtZb0YClsvk2GiMfQuvP4a9VTb +# HUBQuT+5Y6jH3O7nrXoa07o= +# SIG # End signature block diff --git a/Modules/Az.Storage/6.2.0/Storage.Autorest/utils/Unprotect-SecureString.ps1 b/Modules/Az.Storage/6.2.0/Storage.Autorest/utils/Unprotect-SecureString.ps1 new file mode 100644 index 000000000000..cf788c695ba0 --- /dev/null +++ b/Modules/Az.Storage/6.2.0/Storage.Autorest/utils/Unprotect-SecureString.ps1 @@ -0,0 +1,231 @@ +#This script converts securestring to plaintext + +param( + [Parameter(Mandatory, ValueFromPipeline)] + [System.Security.SecureString] + ${SecureString} +) + +$ssPtr = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($SecureString) +try { + $plaintext = [System.Runtime.InteropServices.Marshal]::PtrToStringBSTR($ssPtr) +} finally { + [System.Runtime.InteropServices.Marshal]::ZeroFreeBSTR($ssPtr) +} + +return $plaintext +# SIG # Begin signature block +# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor +# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG +# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT7ZbNoY98P1cW +# CLQEXghewcRRqpuzw+uOgG2nbQ8aHaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA +# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD +# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p +# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw +# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u +# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy +# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA +# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG +# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN +# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL +# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB +# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE +# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw +# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW +# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci +# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j +# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG +# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 +# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd +# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ +# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY +# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp +# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn +# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT +# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG +# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O +# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk +# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx +# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt +# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq +# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG +# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG +# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg +# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 +# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr +# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg +# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy +# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 +# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh +# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k +# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB +# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn +# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 +# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w +# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o +# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD +# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa +# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny +# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG +# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t +# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV +# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 +# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG +# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl +# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb +# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l +# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 +# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 +# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 +# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam +# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa +# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah +# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA +# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt +# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr +# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw +# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN +# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp +# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB +# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO +# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAmRZNAgxcDFKH97A6YERhvK +# rSJCqORTlbGk5c1WcUAXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A +# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB +# BQAEggEAmDM3dETWF3IZty6w755Po2MXNNpeqpQk84QAyw9GvwX8JDoov6aPzDL0 +# T4U6RU/y2fQ7DEGwyFIScXm6R4RRpeF1X8fooQEb/lvtIW9/cm77MUh9ph7mleZD +# 8lMVnGm6NGrr0Y/Yie2YDT0AqRUSZjaJJOvZF2+l4LdgZ3i/LpERKRxlBfmyQ0ud +# lHvrYW7FWg/fNXjzYq6aJ86c0sdrWT23PFbUIkTosc6XoP4VZrNiUHrGpMYlImWo +# fpYIQgDx9cCehT/o5b7dnL+b/dYTPukH+yzgXRX8hvQ9sqll2QOv3FBr30/sseZs +# nQdSgouPdEmqQIAHbsrGOlwN2SPE06GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC +# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq +# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl +# AwQCAQUABCBlkG1rco6/gfcB+/9WbE+emoQWqDJpdLg2r4YtaeUqywIGZh/SmGKc +# GBMyMDI0MDQyMzEzMTYwOC44MzhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV +# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE +# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl +# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO +# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT +# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ +# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x +# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv +# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx +# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV +# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl +# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC +# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC +# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 +# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 +# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C +# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH +# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD +# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 +# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD +# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN +# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA +# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS +# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc +# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi +# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD +# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j +# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG +# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu +# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw +# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD +# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk +# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi +# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI +# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU +# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi +# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH +# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 +# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq +# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp +# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR +# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr +# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ +# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m +# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh +# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 +# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD +# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB +# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK +# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg +# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp +# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d +# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 +# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR +# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu +# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO +# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb +# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 +# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t +# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW +# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb +# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz +# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku +# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA +# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 +# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu +# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw +# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 +# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt +# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q +# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 +# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt +# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis +# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp +# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 +# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e +# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ +# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 +# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 +# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ +# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx +# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT +# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh +# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz +# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy +# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk +# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH +# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD +# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF +# AOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQyNDA5NDMyMVowdDA6Bgor +# BgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS7DAHAgEAAgISrzAKAgUA +# 6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID +# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBADCABKpo/NApeGAt90g9 +# 7xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2fGPvThUiQemQ8jwI/aA1i +# 5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60f1cT69nPDTDg+i6ONCMm +# CZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx +# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT +# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt +# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB +# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx +# IgQgsRv4cjVs4y/8KrveJd1Oaj/9lqy4WkVrSG/DYx+FF/EwgfoGCyqGSIb3DQEJ +# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 +# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw +# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x +# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q +# wPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNawncfq1eDXUwS6ExT0PRgi +# MA0GCSqGSIb3DQEBCwUABIICAE8flGdYSBxZQbf6rWazn9Jo2/v1cQBELWuSZMAp +# 4ZFnlzLTnQkI0YhFiJKQx9tFDWo2oBzzAl3+2APe8iG2DPLnmuVcJK/BBCHdhM55 +# PuQRD7bG60pJmbZiOAQZh6VtuUSyf1KLf1bQOlrwCgbraov/G7SvQuf2OsRgJoT4 +# /EtfZDMnAqB/bGYTorxAJ1uWxEhrfVM2ZoNivLTINSNVW56XWUkydaHV07X0UBi3 +# xJyNoda12CRkhX2x8T/+Ea+0ADgUmyjN317QgcXMsLqqTfWTjkoqpQekGCZlELjS +# gdpFmTznq2hcKCav3hZs/nchyHWGo5uW+NpIVQK3zfHlYFurTi0/YU0xlgmhVpsp +# zUIygFaLWcqHW0kWRaI135FGyTJZIya4Njj8K+ZmJDV7wZAhzy5Y3u2d0/p2IzY2 +# 46CwBv90rnrwuZ2a0l+yDJKjYa8pQdexCB//hbbLXrMO9t4qUaPN3gXduNP2fP3j +# s37EDXQqzTNHumsjgs0zbAgKGxp4yZJT7DZY4nZ8dHJr80XfyR/APEo6e7yb/MVl +# uIvPjQ+lfflGDksA5jZ6BHS/qCDBkkFmQd4Kw/cDIepTyo03rEEnIae06a2LSJVO +# e5wfYZJ52Prr+kRSkTlmS48tf/ys9YRtGoFD7GsqVZOUrfsJtNcP6rySpEl95pFU +# uYZT +# SIG # End signature block diff --git a/Modules/Az.Storage/5.10.1/Storage.Management.format.ps1xml b/Modules/Az.Storage/6.2.0/Storage.Management.format.ps1xml similarity index 75% rename from Modules/Az.Storage/5.10.1/Storage.Management.format.ps1xml rename to Modules/Az.Storage/6.2.0/Storage.Management.format.ps1xml index a690eb9ee4b3..5f226c4f32df 100644 --- a/Modules/Az.Storage/5.10.1/Storage.Management.format.ps1xml +++ b/Modules/Az.Storage/6.2.0/Storage.Management.format.ps1xml @@ -579,7 +579,7 @@ Left - + @@ -615,7 +615,7 @@ Left - $_.snapshotTime.ToUniversalTime().ToString("s")+"Z" + $_.SnapshotTime.ToUniversalTime().ToString("s")+"Z" @@ -1007,6 +1007,10 @@ Left + + Left + + @@ -1063,6 +1067,10 @@ Left $_.Definition.SchemaFields + + Left + if ($_.Definition.Filters.CreationTime.LastNDays -ne $null) {"LastNDays=$($_.Definition.Filters.CreationTime.LastNDays)"} + @@ -1194,217 +1202,219 @@ - + - - - + + + - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/Modules/Az.Storage/5.10.1/Storage.format.ps1xml b/Modules/Az.Storage/6.2.0/Storage.format.ps1xml similarity index 70% rename from Modules/Az.Storage/5.10.1/Storage.format.ps1xml rename to Modules/Az.Storage/6.2.0/Storage.format.ps1xml index d36e74507b78..09a2db4a1453 100644 --- a/Modules/Az.Storage/5.10.1/Storage.format.ps1xml +++ b/Modules/Az.Storage/6.2.0/Storage.format.ps1xml @@ -627,42 +627,42 @@ - + - - + + - + - - - - - - - + + + + + + + - + - - - - - - - - - - - + + + + + + + + + + + @@ -702,142 +702,144 @@ - + - - + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/Modules/Az.Storage/5.10.1/Storage.generated.format.ps1xml b/Modules/Az.Storage/6.2.0/Storage.generated.format.ps1xml similarity index 84% rename from Modules/Az.Storage/5.10.1/Storage.generated.format.ps1xml rename to Modules/Az.Storage/6.2.0/Storage.generated.format.ps1xml index f56694f5bfa6..2c61e5d604a3 100644 --- a/Modules/Az.Storage/5.10.1/Storage.generated.format.ps1xml +++ b/Modules/Az.Storage/6.2.0/Storage.generated.format.ps1xml @@ -707,39 +707,39 @@ - - + + - + - - - - - - - + + + + + + + - + - - - - - - - - - - - - + + + + + + + + + + + + @@ -782,64 +782,64 @@ - + - - - - - - + + + + + + - - + + - + - + - - + + - + - - - - - - - - - - - - + + + + + + + + + + + + - - - - - - - - - - - - + + + + + + + + + + + + @@ -882,41 +882,41 @@ - - - + + + - - - + + + - - - - - - + + + + + + - - - - - + + + + + - - - - - - - - - - - - - + + + + + + + + + + + + + diff --git a/Modules/Az.Storage/5.10.1/System.IO.Hashing.dll b/Modules/Az.Storage/6.2.0/System.IO.Hashing.dll similarity index 100% rename from Modules/Az.Storage/5.10.1/System.IO.Hashing.dll rename to Modules/Az.Storage/6.2.0/System.IO.Hashing.dll diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertAdminPassword.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertAdminPassword.ps1 new file mode 100644 index 000000000000..2b92dc01a0ab --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertAdminPassword.ps1 @@ -0,0 +1,25 @@ + +function Get-CIPPAlertAdminPassword { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + param( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + try { + $TenantId = (Get-Tenants | Where-Object -Property defaultDomainName -EQ $TenantFilter).customerId + $AlertData = New-GraphGETRequest -uri "https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments?`$filter=roleDefinitionId eq '62e90394-69f5-4237-9190-012177145e10'&`$expand=principal" -tenantid $($TenantFilter) | Where-Object { ($_.principalOrganizationId -EQ $TenantId) -and ($_.principal.'@odata.type' -eq '#microsoft.graph.user') } | ForEach-Object { + $LastChanges = New-GraphGETRequest -uri "https://graph.microsoft.com/beta/users/$($_.principalId)?`$select=UserPrincipalName,lastPasswordChangeDateTime" -tenant $($TenantFilter) + if ($LastChanges.LastPasswordChangeDateTime -gt (Get-Date).AddDays(-1)) { + $LastChanges | Select-Object -Property UserPrincipalName, lastPasswordChangeDateTime + } + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + } catch { + Write-AlertMessage -tenant $($TenantFilter) -message "Could not get admin password changes for $($TenantFilter): $(Get-NormalizedError -message $_.Exception.message)" + } +} diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertApnCertExpiry.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertApnCertExpiry.ps1 new file mode 100644 index 000000000000..25d63b23ebcd --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertApnCertExpiry.ps1 @@ -0,0 +1,24 @@ +function Get-CIPPAlertApnCertExpiry { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + Param ( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + + try { + $Apn = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/deviceManagement/applePushNotificationCertificate' -tenantid $TenantFilter + $AlertData = if ($Apn.expirationDateTime -lt (Get-Date).AddDays(30) -and $Apn.expirationDateTime -gt (Get-Date).AddDays(-7)) { + $Apn | Select-Object -Property appleIdentifier, expirationDateTime + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + + } catch { + #no error because if a tenant does not have an APN, it'll error anyway. + #Write-AlertMessage -tenant $($TenantFilter) -message "Failed to check APN certificate expiry for $($TenantFilter): $(Get-NormalizedError -message $_.Exception.message)" + } +} diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertAppSecretExpiry.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertAppSecretExpiry.ps1 new file mode 100644 index 000000000000..cc4884df294b --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertAppSecretExpiry.ps1 @@ -0,0 +1,35 @@ +function Get-CIPPAlertAppSecretExpiry { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + Param ( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + + try { + Write-Host "Checking app expire for $($TenantFilter)" + $appList = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/applications?`$select=appId,displayName,passwordCredentials" -tenantid $TenantFilter + $AlertData = foreach ($App in $applist) { + Write-Host "checking $($App.displayName)" + if ($App.passwordCredentials) { + foreach ($Credential in $App.passwordCredentials) { + if ($Credential.endDateTime -lt (Get-Date).AddDays(30) -and $Credential.endDateTime -gt (Get-Date).AddDays(-7)) { + Write-Host ("Application '{0}' has secrets expiring on {1}" -f $App.displayName, $Credential.endDateTime) + @{ DisplayName = $App.displayName; Expires = $Credential.endDateTime } + } + } + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + + } else { + Write-Host "Skipping app expire for $($TenantFilter)" + } + } catch { + #Write-AlertMessage -tenant $($TenantFilter) -message "Failed to check App registration expiry for $($TenantFilter): $(Get-NormalizedError -message $_.Exception.message)" + } +} + diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertDefenderMalware.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertDefenderMalware.ps1 new file mode 100644 index 000000000000..6129c3b6ab3f --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertDefenderMalware.ps1 @@ -0,0 +1,23 @@ + +function Get-CIPPAlertDefenderMalware { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + param( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + try { + $TenantId = (Get-Tenants | Where-Object -Property defaultDomainName -EQ $TenantFilter).customerId + $AlertData = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/tenantRelationships/managedTenants/windowsDeviceMalwareStates?`$top=999&`$filter=tenantId eq '$($TenantId)'" | Where-Object { $_.malwareThreatState -eq 'Active' } | ForEach-Object { + "$($_.managedDeviceName): Malware found and active. Severity: $($_.MalwareSeverity). Malware name: $($_.MalwareDisplayName)" + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + + } catch { + Write-AlertMessage -tenant $($TenantFilter) -message "Could not get malware data for $($TenantFilter): $(Get-NormalizedError -message $_.Exception.message)" + } +} diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertDefenderStatus.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertDefenderStatus.ps1 new file mode 100644 index 000000000000..cccb46f13f5b --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertDefenderStatus.ps1 @@ -0,0 +1,22 @@ +function Get-CIPPAlertDefenderStatus { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + param( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + try { + $TenantId = (Get-Tenants | Where-Object -Property defaultDomainName -EQ $TenantFilter).customerId + $AlertData = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/tenantRelationships/managedTenants/windowsProtectionStates?`$top=999&`$filter=tenantId eq '$($TenantId)'" | Where-Object { $_.realTimeProtectionEnabled -eq $false -or $_.MalwareprotectionEnabled -eq $false } | ForEach-Object { + "$($_.managedDeviceName) - Real Time Protection: $($_.realTimeProtectionEnabled) & Malware Protection: $($_.MalwareprotectionEnabled)" + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + + } catch { + Write-AlertMessage -tenant $($TenantFilter) -message "Could not get defender status for $($TenantFilter): $(Get-NormalizedError -message $_.Exception.message)" + } +} diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertDepTokenExpiry.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertDepTokenExpiry.ps1 new file mode 100644 index 000000000000..c67ff7bc39d0 --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertDepTokenExpiry.ps1 @@ -0,0 +1,29 @@ +function Get-CIPPAlertDepTokenExpiry { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + Param ( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + + try { + try { + $DepTokens = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/deviceManagement/depOnboardingSettings' -tenantid $TenantFilter).value + $AlertData = foreach ($Dep in $DepTokens) { + if ($Dep.tokenExpirationDateTime -lt (Get-Date).AddDays(30) -and $Dep.tokenExpirationDateTime -gt (Get-Date).AddDays(-7)) { + 'Apple Device Enrollment Program token expiring on {0}' -f $Dep.tokenExpirationDateTime + } + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + + } catch {} + + + } catch { + Write-AlertMessage -tenant $($TenantFilter) -message "Failed to check Apple Device Enrollment Program token expiry for $($TenantFilter): $(Get-NormalizedError -message $_.Exception.message)" + } +} diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertExpiringLicenses.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertExpiringLicenses.ps1 new file mode 100644 index 000000000000..bf41dbc3e74c --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertExpiringLicenses.ps1 @@ -0,0 +1,26 @@ +function Get-CIPPAlertExpiringLicenses { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + Param ( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + try { + $AlertData = Get-CIPPLicenseOverview -TenantFilter $TenantFilter | ForEach-Object { + $timeTorenew = [int64]$_.TimeUntilRenew + if ($timeTorenew -lt 30 -and $_.TimeUntilRenew -gt 0) { + Write-Host "$($_.License) will expire in $($_.TimeUntilRenew) days. The estimated term is $($_.EstTerm)" + "$($_.License) will expire in $($_.TimeUntilRenew) days. The estimated term is $($_.EstTerm)" + } + + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + + } catch { + } +} + diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertMFAAdmins.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertMFAAdmins.ps1 similarity index 60% rename from Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertMFAAdmins.ps1 rename to Modules/CIPPCore/Public/Alerts/Get-CIPPAlertMFAAdmins.ps1 index 7b2a83e349a2..d1eb7df2c93a 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertMFAAdmins.ps1 +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertMFAAdmins.ps1 @@ -1,30 +1,33 @@ -function Push-CIPPAlertMFAAdmins { +function Get-CIPPAlertMFAAdmins { <# .FUNCTIONALITY Entrypoint #> [CmdletBinding()] Param ( - [Parameter(Mandatory = $true)] - $Item + [Parameter(Mandatory = $false)] + $input, + $TenantFilter ) try { - $CAPolicies = (New-GraphGetRequest -Uri 'https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies?$top=999' -tenantid $Item.tenant -ErrorAction Stop) + $CAPolicies = (New-GraphGetRequest -Uri 'https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies?$top=999' -tenantid $TenantFilter -ErrorAction Stop) foreach ($Policy in $CAPolicies) { if ($policy.grantControls.customAuthenticationFactors -eq 'RequireDuoMfa') { $DuoActive = $true } } if (!$DuoActive) { - $users = New-GraphGETRequest -uri 'https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails?$top=999&$filter=IsAdmin eq true' -tenantid $($Item.tenant) | Where-Object -Property 'isMfaRegistered' -EQ $false + $users = New-GraphGETRequest -uri 'https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails?$top=999&$filter=IsAdmin eq true' -tenantid $($TenantFilter) | Where-Object -Property 'isMfaRegistered' -EQ $false if ($users.UserPrincipalName) { - Write-AlertMessage -tenant $Item.tenant -message "The following admins do not have MFA registered: $($users.UserPrincipalName -join ', ')" + $AlertData = "The following admins do not have MFA registered: $($users.UserPrincipalName -join ', ')" + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + } } else { - Write-LogMessage -message 'Potentially using Duo for MFA, could not check MFA status for Admins with 100% accuracy' -API 'MFA Alerts - Informational' -tenant $Item.tenant -sev Info + Write-LogMessage -message 'Potentially using Duo for MFA, could not check MFA status for Admins with 100% accuracy' -API 'MFA Alerts - Informational' -tenant $TenantFilter -sev Info } } catch { - Write-LogMessage -message "Failed to check MFA status for Admins: $($_.exception.message)" -API 'MFA Alerts - Informational' -tenant $Item.tenant -sev Error + Write-LogMessage -message "Failed to check MFA status for Admins: $($_.exception.message)" -API 'MFA Alerts - Informational' -tenant $TenantFilter -sev Error } } \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertMFAAlertUsers.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertMFAAlertUsers.ps1 similarity index 56% rename from Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertMFAAlertUsers.ps1 rename to Modules/CIPPCore/Public/Alerts/Get-CIPPAlertMFAAlertUsers.ps1 index e97d7f173c26..386dbde00c5f 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertMFAAlertUsers.ps1 +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertMFAAlertUsers.ps1 @@ -1,22 +1,25 @@ -function Push-CIPPAlertMFAAlertUsers { +function Get-CIPPAlertMFAAlertUsers { <# .FUNCTIONALITY Entrypoint #> [CmdletBinding()] Param ( - [Parameter(Mandatory = $true)] - $Item + [Parameter(Mandatory = $false)] + $input, + $TenantFilter ) try { - $users = New-GraphGETRequest -uri 'https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails?$top=999&filter=isMfaRegistered eq false and userType eq ''member''&$select=userPrincipalName,lastUpdatedDateTime,isMfaRegistered' -tenantid $($Item.tenant) + $users = New-GraphGETRequest -uri 'https://graph.microsoft.com/beta/reports/authenticationMethods/userRegistrationDetails?$top=999&filter=isMfaRegistered eq false and userType eq ''member''&$select=userPrincipalName,lastUpdatedDateTime,isMfaRegistered' -tenantid $($TenantFilter) if ($users.UserPrincipalName) { - Write-AlertMessage -tenant $Item.tenant -message "The following $($users.Count) users do not have MFA registered: $($users.UserPrincipalName -join ', ')" + $AlertData = "The following $($users.Count) users do not have MFA registered: $($users.UserPrincipalName -join ', ')" + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + } } catch { - Write-LogMessage -message "Failed to check MFA status for all users: $($_.exception.message)" -API 'MFA Alerts - Informational' -tenant $Item.tenant -sev Info + Write-LogMessage -message "Failed to check MFA status for all users: $($_.exception.message)" -API 'MFA Alerts - Informational' -tenant $TenantFilter -sev Info } } diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNewAppApproval.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNewAppApproval.ps1 new file mode 100644 index 000000000000..9fe0dc66271d --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNewAppApproval.ps1 @@ -0,0 +1,21 @@ + +function Get-CIPPAlertNewAppApproval { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + param( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + try { + $Approvals = New-GraphGetRequest -Uri 'https://graph.microsoft.com/beta/identityGovernance/appConsent/appConsentRequests' -tenantid $TenantFilter | Where-Object -Property requestStatus -EQ 'inProgress' + if ($Approvals.count -gt 1) { + $AlertData = "There are $($Approvals.count) App Approval(s) pending." + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + } + } catch { + } +} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertNewRole.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNewRole.ps1 similarity index 61% rename from Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertNewRole.ps1 rename to Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNewRole.ps1 index 1945d32c3148..65fc84b35315 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertNewRole.ps1 +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNewRole.ps1 @@ -1,18 +1,19 @@ -function Push-CIPPAlertNewRole { +function Get-CIPPAlertNewRole { <# .FUNCTIONALITY Entrypoint #> [CmdletBinding()] Param ( - [Parameter(Mandatory = $true)] - $Item + [Parameter(Mandatory = $false)] + $input, + $TenantFilter ) $Deltatable = Get-CIPPTable -Table DeltaCompare try { - $Filter = "PartitionKey eq 'AdminDelta' and RowKey eq '{0}'" -f $Item.tenantid + $Filter = "PartitionKey eq 'AdminDelta' and RowKey eq '{0}'" -f $TenantFilter $AdminDelta = (Get-CIPPAzDataTableEntity @Deltatable -Filter $Filter).delta | ConvertFrom-Json -ErrorAction SilentlyContinue - $NewDelta = (New-GraphGetRequest -uri "https://graph.microsoft.com/v1.0/directoryRoles?`$expand=members" -tenantid $Item.tenant) | Select-Object displayname, Members | ForEach-Object { + $NewDelta = (New-GraphGetRequest -uri "https://graph.microsoft.com/v1.0/directoryRoles?`$expand=members" -tenantid $TenantFilter) | Select-Object displayname, Members | ForEach-Object { @{ GroupName = $_.displayname Members = $_.Members.UserPrincipalName @@ -21,20 +22,21 @@ function Push-CIPPAlertNewRole { $NewDeltatoSave = $NewDelta | ConvertTo-Json -Depth 10 -Compress -ErrorAction SilentlyContinue | Out-String $DeltaEntity = @{ PartitionKey = 'AdminDelta' - RowKey = [string]$Item.tenantid + RowKey = [string]$TenantFilter delta = "$NewDeltatoSave" } Add-CIPPAzDataTableEntity @DeltaTable -Entity $DeltaEntity -Force if ($AdminDelta) { - foreach ($Group in $NewDelta) { + $AlertData = foreach ($Group in $NewDelta) { $OldDelta = $AdminDelta | Where-Object { $_.GroupName -eq $Group.GroupName } $Group.members | Where-Object { $_ -notin $OldDelta.members } | ForEach-Object { - Write-AlertMessage -tenant $($Item.tenant) -message "$_ has been added to the $($Group.GroupName) Role" + "$_ has been added to the $($Group.GroupName) Role" } } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData } } catch { - Write-AlertMessage -tenant $($Item.tenant) -message "Could not get get role changes for $($Item.tenant): $(Get-NormalizedError -message $_.Exception.message)" + Write-AlertMessage -tenant $($TenantFilter) -message "Could not get get role changes for $($TenantFilter): $(Get-NormalizedError -message $_.Exception.message)" } } diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNoCAConfig.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNoCAConfig.ps1 new file mode 100644 index 000000000000..2875b082fa6a --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertNoCAConfig.ps1 @@ -0,0 +1,28 @@ +function Get-CIPPAlertNoCAConfig { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + Param ( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + + try { + $CAAvailable = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscribedSkus' -tenantid $TenantFilter -erroraction stop).serviceplans + if ('AAD_PREMIUM' -in $CAAvailable.servicePlanName) { + $CAPolicies = (New-GraphGetRequest -uri 'https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies' -tenantid $TenantFilter) + if (!$CAPolicies.id) { + $AlertData = 'Conditional Access is available, but no policies could be found.' + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + + } + } + + } catch { + Write-AlertMessage -tenant $($TenantFilter) -message "Conditional Access Config Alert: Error occurred: $(Get-NormalizedError -message $_.Exception.message)" + } + +} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertOverusedLicenses.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertOverusedLicenses.ps1 similarity index 52% rename from Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertOverusedLicenses.ps1 rename to Modules/CIPPCore/Public/Alerts/Get-CIPPAlertOverusedLicenses.ps1 index 8897ab42a184..dedead01d535 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertOverusedLicenses.ps1 +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertOverusedLicenses.ps1 @@ -1,30 +1,34 @@ -function Push-CIPPAlertOverusedLicenses { +function Get-CIPPAlertOverusedLicenses { <# .FUNCTIONALITY Entrypoint #> [CmdletBinding()] Param ( - [Parameter(Mandatory = $true)] - $Item + [Parameter(Mandatory = $false)] + $input, + $TenantFilter ) try { $LicenseTable = Get-CIPPTable -TableName ExcludedLicenses $ExcludedSkuList = Get-CIPPAzDataTableEntity @LicenseTable - New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscribedSkus' -tenantid $Item.tenant | ForEach-Object { + $AlertData = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscribedSkus' -tenantid $TenantFilter | ForEach-Object { $skuid = $_ foreach ($sku in $skuid) { if ($sku.skuId -in $ExcludedSkuList.GUID) { continue } $PrettyName = ($ConvertTable | Where-Object { $_.GUID -eq $sku.skuid }).'Product_Display_Name' | Select-Object -Last 1 if (!$PrettyName) { $PrettyName = $sku.skuPartNumber } if ($sku.prepaidUnits.enabled - $sku.consumedUnits -lt 0) { - Write-AlertMessage -tenant $($Item.tenant) -message "$PrettyName has Overused licenses. Using $($_.consumedUnits) of $($_.prepaidUnits.enabled)." + "$PrettyName has Overused licenses. Using $($_.consumedUnits) of $($_.prepaidUnits.enabled)." } } + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + } catch { - Write-AlertMessage -tenant $($Item.tenant) -message "Overused Licenses Alert Error occurred: $(Get-NormalizedError -message $_.Exception.message)" + Write-AlertMessage -tenant $($TenantFilter) -message "Overused Licenses Alert Error occurred: $(Get-NormalizedError -message $_.Exception.message)" } } diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertQuotaUsed.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertQuotaUsed.ps1 new file mode 100644 index 000000000000..675dbeb8251e --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertQuotaUsed.ps1 @@ -0,0 +1,27 @@ +function Get-CIPPAlertQuotaUsed { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + Param ( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + + + try { + $AlertData = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/reports/getMailboxUsageDetail(period='D7')?`$format=application/json" -tenantid $TenantFilter | ForEach-Object { + if ($_.StorageUsedInBytes -eq 0) { return } + $PercentLeft = [math]::round($_.StorageUsedInBytes / $_.prohibitSendReceiveQuotaInBytes * 100) + if ($Input) { $Value = $input } else { $Value = 90 } + if ($PercentLeft -gt $Value) { + "$($_.UserPrincipalName): Mailbox is more than $($value)% full. Mailbox is $PercentLeft% full" + } + + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + } catch { + } +} diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertSecDefaultsUpsell.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertSecDefaultsUpsell.ps1 new file mode 100644 index 000000000000..8f3ff0fd48c2 --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertSecDefaultsUpsell.ps1 @@ -0,0 +1,27 @@ +function Get-CIPPAlertSecDefaultsUpsell { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + Param ( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + + try { + try { + $SecDefaults = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/policies/identitySecurityDefaultsEnforcementPolicy' -tenantid $TenantFilter) + if ($SecDefaults.isEnabled -eq $false -and $SecDefaults.securityDefaultsUpsell.action -in @('autoEnable', 'autoEnabledNotify')) { + $AlertData = 'Security Defaults will be automatically enabled on {0}' -f $SecDefaults.securityDefaultsUpsell.dueDateTime + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + + } + } catch {} + + } catch { + # Error handling + } +} + diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertSharepointQuota.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertSharepointQuota.ps1 similarity index 54% rename from Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertSharepointQuota.ps1 rename to Modules/CIPPCore/Public/Alerts/Get-CIPPAlertSharepointQuota.ps1 index 579ab727c851..db33c5a1a4f1 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertSharepointQuota.ps1 +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertSharepointQuota.ps1 @@ -1,24 +1,26 @@ -function Push-CIPPAlertSharepointQuota { +function Get-CIPPAlertSharepointQuota { <# .FUNCTIONALITY Entrypoint #> [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - $Item + Param ( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter ) Try { - $tenantName = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/domains' -tenantid $Item.Tenant | Where-Object { $_.isInitial -eq $true }).id.Split('.')[0] - $sharepointToken = (Get-GraphToken -scope "https://$($tenantName)-admin.sharepoint.com/.default" -tenantid $Item.Tenant) + $tenantName = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/domains' -tenantid $TenantFilter | Where-Object { $_.isInitial -eq $true }).id.Split('.')[0] + $sharepointToken = (Get-GraphToken -scope "https://$($tenantName)-admin.sharepoint.com/.default" -tenantid $TenantFilter) $sharepointToken.Add('accept', 'application/json') $sharepointQuota = (Invoke-RestMethod -Method 'GET' -Headers $sharepointToken -Uri "https://$($tenantName)-admin.sharepoint.com/_api/StorageQuotas()?api-version=1.3.2" -ErrorAction Stop).value if ($sharepointQuota) { - if ($Item.value -Is [Boolean]) { $Value = 90 } else { $Value = $Item.value } + if ($input -Is [Boolean]) { $Value = 90 } else { $Value = $input } $UsedStoragePercentage = [int](($sharepointQuota.GeoUsedStorageMB / $sharepointQuota.TenantStorageMB) * 100) if ($UsedStoragePercentage -gt $Value) { - Write-AlertMessage -tenant $($Item.tenant) -message "SharePoint Storage is at $($UsedStoragePercentage)%. Your alert threshold is $($Value)%" + $AlertData = "SharePoint Storage is at $($UsedStoragePercentage)%. Your alert threshold is $($Value)%" + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData } } } catch { diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertUnusedLicenses.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertUnusedLicenses.ps1 similarity index 53% rename from Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertUnusedLicenses.ps1 rename to Modules/CIPPCore/Public/Alerts/Get-CIPPAlertUnusedLicenses.ps1 index b83ae1fb4701..5344c17d9ce3 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertUnusedLicenses.ps1 +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertUnusedLicenses.ps1 @@ -1,30 +1,32 @@ -function Push-CIPPAlertUnusedLicenses { +function Get-CIPPAlertUnusedLicenses { <# .FUNCTIONALITY Entrypoint #> [CmdletBinding()] Param ( - [Parameter(Mandatory = $true)] - $Item + [Parameter(Mandatory = $false)] + $input, + $TenantFilter ) try { $LicenseTable = Get-CIPPTable -TableName ExcludedLicenses $ExcludedSkuList = Get-CIPPAzDataTableEntity @LicenseTable - New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscribedSkus' -tenantid $Item.tenant | ForEach-Object { + $AlertData = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscribedSkus' -tenantid $TenantFilter | ForEach-Object { $skuid = $_ foreach ($sku in $skuid) { if ($sku.skuId -in $ExcludedSkuList.GUID) { continue } $PrettyName = ($ConvertTable | Where-Object { $_.GUID -eq $sku.skuid }).'Product_Display_Name' | Select-Object -Last 1 if (!$PrettyName) { $PrettyName = $sku.skuPartNumber } if ($sku.prepaidUnits.enabled - $sku.consumedUnits -gt 0) { - Write-AlertMessage -tenant $($Item.tenant) -message "$PrettyName has unused licenses. Using $($_.consumedUnits) of $($_.prepaidUnits.enabled)." + "$PrettyName has unused licenses. Using $($_.consumedUnits) of $($_.prepaidUnits.enabled)." } } } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData } catch { - Write-AlertMessage -tenant $($Item.tenant) -message "Unused Licenses Alert Error occurred: $(Get-NormalizedError -message $_.Exception.message)" + Write-AlertMessage -tenant $($TenantFilter) -message "Unused Licenses Alert Error occurred: $(Get-NormalizedError -message $_.Exception.message)" } } diff --git a/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertVppTokenExpiry.ps1 b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertVppTokenExpiry.ps1 new file mode 100644 index 000000000000..6fb0c2695d57 --- /dev/null +++ b/Modules/CIPPCore/Public/Alerts/Get-CIPPAlertVppTokenExpiry.ps1 @@ -0,0 +1,30 @@ +function Get-CIPPAlertVppTokenExpiry { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + Param ( + [Parameter(Mandatory = $false)] + $input, + $TenantFilter + ) + try { + try { + $VppTokens = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/deviceAppManagement/vppTokens' -tenantid $TenantFilter).value + $AlertData = foreach ($Vpp in $VppTokens) { + if ($Vpp.state -ne 'valid') { + 'Apple Volume Purchase Program Token is not valid, new token required' + } + if ($Vpp.expirationDateTime -lt (Get-Date).AddDays(30) -and $Vpp.expirationDateTime -gt (Get-Date).AddDays(-7)) { + 'Apple Volume Purchase Program token expiring on {0}' -f $Vpp.expirationDateTime + } + } + Write-AlertTrace -cmdletName $MyInvocation.MyCommand -tenantFilter $TenantFilter -data $AlertData + + } catch {} + + } catch { + # Error handling + } +} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/CippQueue/Invoke-ListCippQueue.ps1 b/Modules/CIPPCore/Public/CippQueue/Invoke-ListCippQueue.ps1 index 9a70341c884c..d04193b88d3a 100644 --- a/Modules/CIPPCore/Public/CippQueue/Invoke-ListCippQueue.ps1 +++ b/Modules/CIPPCore/Public/CippQueue/Invoke-ListCippQueue.ps1 @@ -53,7 +53,7 @@ function Invoke-ListCippQueue { PercentComplete = [math]::Round(((($TotalCompleted + $TotalFailed) / $Queue.TotalTasks) * 100), 1) PercentFailed = [math]::Round((($TotalFailed / $Queue.TotalTasks) * 100), 1) PercentRunning = [math]::Round((($TotalRunning / $Queue.TotalTasks) * 100), 1) - Tasks = $Tasks + Tasks = @($Tasks) Status = $Queue.Status Timestamp = $Queue.Timestamp } diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Domain Analyser/Push-DomainAnalyserTenant.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Domain Analyser/Push-DomainAnalyserTenant.ps1 index d8aa48ac28e9..729ffbccee8b 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Domain Analyser/Push-DomainAnalyserTenant.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Domain Analyser/Push-DomainAnalyserTenant.ps1 @@ -22,7 +22,7 @@ function Push-DomainAnalyserTenant { try { $Domains = New-GraphGetRequest -uri 'https://graph.microsoft.com/v1.0/domains' -tenantid $Tenant.customerId | Where-Object { ($_.id -notlike '*.microsoftonline.com' -and $_.id -NotLike '*.exclaimer.cloud' -and $_.id -Notlike '*.excl.cloud' -and $_.id -NotLike '*.codetwo.online' -and $_.id -NotLike '*.call2teams.com' -and $_.isVerified) } - $TenantDomains = foreach ($d in $domains) { + $TenantDomains = foreach ($d in $Domains) { [PSCustomObject]@{ Tenant = $Tenant.defaultDomainName TenantGUID = $Tenant.customerId @@ -42,27 +42,27 @@ function Push-DomainAnalyserTenant { if ($DomainCount -gt 0) { Write-Host "$DomainCount tenant Domains" try { - $TenantDomainObjects = foreach ($Domain in $TenantDomains) { - $TenantDetails = ($Domain | ConvertTo-Json -Compress).ToString() - $Filter = "PartitionKey eq '{0}' and RowKey eq '{1}'" -f $Domain.Tenant, $Domain.Domain + $TenantDomainObjects = foreach ($TenantDomain in $TenantDomains) { + $TenantDetails = ($TenantDomain | ConvertTo-Json -Compress).ToString() + $Filter = "PartitionKey eq '{0}' and RowKey eq '{1}'" -f $TenantDomain.Tenant, $TenantDomain.Domain $OldDomain = Get-CIPPAzDataTableEntity @DomainTable -Filter $Filter if ($OldDomain) { Remove-AzDataTableEntity @DomainTable -Entity $OldDomain | Out-Null } - $Filter = "PartitionKey eq 'TenantDomains' and RowKey eq '{0}'" -f $Domain.Domain + $Filter = "PartitionKey eq 'TenantDomains' and RowKey eq '{0}'" -f $TenantDomain.Domain $Domain = Get-CIPPAzDataTableEntity @DomainTable -Filter $Filter - if (!$Domain -or $null -eq $Domain.TenantGUID) { - $DomainObject = [pscustomobject]@{ + if (!$Domain -or $null -eq $TenantDomain.TenantGUID) { + $Domain = [pscustomobject]@{ DomainAnalyser = '' TenantDetails = $TenantDetails - TenantId = $Domain.Tenant - TenantGUID = $Domain.TenantGUID + TenantId = $TenantDomain.Tenant + TenantGUID = $TenantDomain.TenantGUID DkimSelectors = '' MailProviders = '' - RowKey = $Domain.Domain + RowKey = $TenantDomain.Domain PartitionKey = 'TenantDomains' } @@ -70,7 +70,6 @@ function Push-DomainAnalyserTenant { $DomainObject.DkimSelectors = $OldDomain.DkimSelectors $DomainObject.MailProviders = $OldDomain.MailProviders } - $Domain = $DomainObject } else { $Domain.TenantDetails = $TenantDetails if ($OldDomain) { diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-AddAlertSubscription_Queue.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-AddAlertSubscription_Queue.ps1 deleted file mode 100644 index 27bcafc91bf3..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-AddAlertSubscription_Queue.ps1 +++ /dev/null @@ -1,16 +0,0 @@ -function Push-AddAlertSubscription_Queue { - <# - .FUNCTIONALITY - Entrypoint - #> - param($QueueItem, $TriggerMetadata) - - try { - Write-Information ($QueueItem | ConvertTo-Json) - New-CIPPGraphSubscription @QueueItem - Write-Information "Added webhook subscription for $($QueueItem.TenantFilter)" - } catch { - Write-Error "Unable to add webhook subscription $($_.Exception.Message)" - } - -} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertAdminPassword.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertAdminPassword.ps1 deleted file mode 100644 index b0cd6985acb5..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertAdminPassword.ps1 +++ /dev/null @@ -1,22 +0,0 @@ - -function Push-CIPPAlertAdminPassword { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [pscustomobject]$Item - ) - try { - New-GraphGETRequest -uri "https://graph.microsoft.com/beta/roleManagement/directory/roleAssignments?`$filter=roleDefinitionId eq '62e90394-69f5-4237-9190-012177145e10'&`$expand=principal" -tenantid $($Item.tenant) | Where-Object { ($_.principalOrganizationId -EQ $Item.tenantid) -and ($_.principal.'@odata.type' -eq '#microsoft.graph.user') } | ForEach-Object { - $LastChanges = New-GraphGETRequest -uri "https://graph.microsoft.com/beta/users/$($_.principalId)?`$select=UserPrincipalName,lastPasswordChangeDateTime" -tenant $($Item.tenant) - if ($LastChanges.LastPasswordChangeDateTime -gt (Get-Date).AddDays(-1)) { - Write-AlertMessage -tenant $($Item.tenant) -message "Admin password has been changed for $($LastChanges.UserPrincipalName) in last 24 hours" - } - } - } catch { - Write-AlertMessage -tenant $($Item.tenant) -message "Could not get admin password changes for $($Item.tenant): $(Get-NormalizedError -message $_.Exception.message)" - } -} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertApnCertExpiry.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertApnCertExpiry.ps1 deleted file mode 100644 index a612a39ad14c..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertApnCertExpiry.ps1 +++ /dev/null @@ -1,21 +0,0 @@ -function Push-CIPPAlertApnCertExpiry { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - Param ( - [Parameter(Mandatory = $true)] - $Item - ) - - try { - $Apn = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/deviceManagement/applePushNotificationCertificate' -tenantid $Item.tenant - if ($Apn.expirationDateTime -lt (Get-Date).AddDays(30) -and $Apn.expirationDateTime -gt (Get-Date).AddDays(-7)) { - Write-AlertMessage -tenant $($Item.tenant) -message ('Intune: Apple Push Notification certificate for {0} is expiring on {1}' -f $Apn.appleIdentifier, $Apn.expirationDateTime) - } - } catch { - #no error because if a tenant does not have an APN, it'll error anyway. - #Write-AlertMessage -tenant $($Item.Tenant) -message "Failed to check APN certificate expiry for $($Item.Tenant): $(Get-NormalizedError -message $_.Exception.message)" - } -} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertAppSecretExpiry.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertAppSecretExpiry.ps1 deleted file mode 100644 index d150958f5628..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertAppSecretExpiry.ps1 +++ /dev/null @@ -1,37 +0,0 @@ -function Push-CIPPAlertAppSecretExpiry { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - Param ( - [Parameter(Mandatory = $true)] - $Item - ) - - try { - $Filter = "RowKey eq 'AppSecretExpiry' and PartitionKey eq '{0}'" -f $Item.tenantid - $LastRun = Get-CIPPAzDataTableEntity @LastRunTable -Filter $Filter - $Yesterday = (Get-Date).AddDays(-1) - if (-not $LastRun.Timestamp.DateTime -or ($LastRun.Timestamp.DateTime -le $Yesterday)) { - Write-Host "Checking app expire for $($Item.tenant)" - $appList = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/applications?`$select=appId,displayName,passwordCredentials" -tenantid $Item.tenant - foreach ($App in $applist) { - Write-Host "checking $($App.displayName)" - if ($App.passwordCredentials) { - foreach ($Credential in $App.passwordCredentials) { - if ($Credential.endDateTime -lt (Get-Date).AddDays(30) -and $Credential.endDateTime -gt (Get-Date).AddDays(-7)) { - Write-Host ("Application '{0}' has secrets expiring on {1}" -f $App.displayName, $Credential.endDateTime) - Write-AlertMessage -tenant $($Item.Tenant) -message ("Application '{0}' has secrets expiring on {1}" -f $App.displayName, $Credential.endDateTime) - } - } - } - } - } else { - Write-Host "Skipping app expire for $($Item.tenant)" - } - } catch { - #Write-AlertMessage -tenant $($Item.Tenant) -message "Failed to check App registration expiry for $($Item.Tenant): $(Get-NormalizedError -message $_.Exception.message)" - } -} - diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertDefenderMalware.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertDefenderMalware.ps1 deleted file mode 100644 index 7a2bfed92590..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertDefenderMalware.ps1 +++ /dev/null @@ -1,19 +0,0 @@ - -function Push-CIPPAlertDefenderMalware { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - $Item - ) - try { - New-GraphGetRequest -uri "https://graph.microsoft.com/beta/tenantRelationships/managedTenants/windowsDeviceMalwareStates?`$top=999&`$filter=tenantId eq '$($Item.tenantid)'" | Where-Object { $_.malwareThreatState -eq 'Active' } | ForEach-Object { - Write-AlertMessage -tenant $($Item.tenant) -message "$($_.managedDeviceName): Malware found and active. Severity: $($_.MalwareSeverity). Malware name: $($_.MalwareDisplayName)" - } - } catch { - Write-AlertMessage -tenant $($Item.tenant) -message "Could not get malware data for $($Item.tenant): $(Get-NormalizedError -message $_.Exception.message)" - } -} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertDefenderStatus.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertDefenderStatus.ps1 deleted file mode 100644 index 1a8c186b1f71..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertDefenderStatus.ps1 +++ /dev/null @@ -1,18 +0,0 @@ -function Push-CIPPAlertDefenderStatus { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - $Item - ) - try { - New-GraphGetRequest -uri "https://graph.microsoft.com/beta/tenantRelationships/managedTenants/windowsProtectionStates?`$top=999&`$filter=tenantId eq '$($Item.tenantid)'" | Where-Object { $_.realTimeProtectionEnabled -eq $false -or $_.MalwareprotectionEnabled -eq $false } | ForEach-Object { - Write-AlertMessage -tenant $($Item.tenant) -message "$($_.managedDeviceName) - Real Time Protection: $($_.realTimeProtectionEnabled) & Malware Protection: $($_.MalwareprotectionEnabled)" - } - } catch { - Write-AlertMessage -tenant $($Item.tenant) -message "Could not get defender status for $($Item.tenant): $(Get-NormalizedError -message $_.Exception.message)" - } -} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertDepTokenExpiry.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertDepTokenExpiry.ps1 deleted file mode 100644 index 0a1ddad5863f..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertDepTokenExpiry.ps1 +++ /dev/null @@ -1,35 +0,0 @@ -function Push-CIPPAlertDepTokenExpiry { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - Param ( - [Parameter(Mandatory = $true)] - $Item - ) - $LastRunTable = Get-CIPPTable -Table AlertLastRun - - try { - $Filter = "RowKey eq 'DepTokenExpiry' and PartitionKey eq '{0}'" -f $Item.tenantid - $LastRun = Get-CIPPAzDataTableEntity @LastRunTable -Filter $Filter - $Yesterday = (Get-Date).AddDays(-1) - if (-not $LastRun.Timestamp.DateTime -or ($LastRun.Timestamp.DateTime -le $Yesterday)) { - try { - $DepTokens = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/deviceManagement/depOnboardingSettings' -tenantid $Item.tenant).value - foreach ($Dep in $DepTokens) { - if ($Dep.tokenExpirationDateTime -lt (Get-Date).AddDays(30) -and $Dep.tokenExpirationDateTime -gt (Get-Date).AddDays(-7)) { - Write-AlertMessage -tenant $($Item.tenant) -message ('Apple Device Enrollment Program token expiring on {0}' -f $Dep.tokenExpirationDateTime) - } - } - } catch {} - $LastRun = @{ - RowKey = 'DepTokenExpiry' - PartitionKey = $Item.tenantid - } - Add-CIPPAzDataTableEntity @LastRunTable -Entity $LastRun -Force - } - } catch { - Write-AlertMessage -tenant $($Item.tenant) -message "Failed to check Apple Device Enrollment Program token expiry for $($Item.tenant): $(Get-NormalizedError -message $_.Exception.message)" - } -} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertExpiringLicenses.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertExpiringLicenses.ps1 deleted file mode 100644 index f13939b7086a..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertExpiringLicenses.ps1 +++ /dev/null @@ -1,22 +0,0 @@ -function Push-CIPPAlertExpiringLicenses { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - Param ( - [Parameter(Mandatory = $true)] - $Item - ) - try { - Get-CIPPLicenseOverview -TenantFilter $Item.tenant | ForEach-Object { - $timeTorenew = [int64]$_.TimeUntilRenew - if ($timeTorenew -lt 30 -and $_.TimeUntilRenew -gt 0) { - Write-Host "$($_.License) will expire in $($_.TimeUntilRenew) days. The estimated term is $($_.EstTerm)" - Write-AlertMessage -tenant $($Item.tenant) -message "$($_.License) will expire in $($_.TimeUntilRenew) days. The estimated term is $($_.EstTerm)" - } - } - } catch { - } -} - diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertNewAppApproval.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertNewAppApproval.ps1 deleted file mode 100644 index 254f9bbbb394..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertNewAppApproval.ps1 +++ /dev/null @@ -1,19 +0,0 @@ - -function Push-CIPPAlertNewAppApproval { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [pscustomobject]$Item - ) - try { - $Approvals = New-GraphGetRequest -Uri 'https://graph.microsoft.com/beta/identityGovernance/appConsent/appConsentRequests' -tenantid $item.tenant | Where-Object -Property requestStatus -EQ 'inProgress' - if ($Approvals.count -gt 1) { - Write-AlertMessage -tenant $($Item.tenant) -message "There is are $($Approvals.count) App Approvals waiting." - } - } catch { - } -} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertNoCAConfig.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertNoCAConfig.ps1 deleted file mode 100644 index 75de187daed7..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertNoCAConfig.ps1 +++ /dev/null @@ -1,24 +0,0 @@ -function Push-CIPPAlertNoCAConfig { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - Param ( - [Parameter(Mandatory = $true)] - $Item - ) - - try { - $CAAvailable = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscribedSkus' -tenantid $Item.Tenant -erroraction stop).serviceplans - if ('AAD_PREMIUM' -in $CAAvailable.servicePlanName) { - $CAPolicies = (New-GraphGetRequest -uri 'https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies' -tenantid $Item.Tenant) - if (!$CAPolicies.id) { - Write-AlertMessage -tenant $($Item.tenant) -message 'Conditional Access is available, but no policies could be found.' - } - } - } catch { - Write-AlertMessage -tenant $($Item.tenant) -message "Conditional Access Config Alert: Error occurred: $(Get-NormalizedError -message $_.Exception.message)" - } - -} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertQuotaUsed.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertQuotaUsed.ps1 deleted file mode 100644 index 762c4f04457f..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertQuotaUsed.ps1 +++ /dev/null @@ -1,26 +0,0 @@ -function Push-CIPPAlertQuotaUsed { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - Param ( - [Parameter(Mandatory = $true)] - $Item - ) - - - try { - New-GraphGetRequest -uri "https://graph.microsoft.com/beta/reports/getMailboxUsageDetail(period='D7')?`$format=application/json" -tenantid $Item.tenant | ForEach-Object { - if ($_.StorageUsedInBytes -eq 0) { continue } - $PercentLeft = [math]::round($_.StorageUsedInBytes / $_.prohibitSendReceiveQuotaInBytes * 100) - if ($Item.value -eq $true) { - if ($Item.value) { $Value = $Item.value } else { $Value = 90 } - if ($PercentLeft -gt 90) { - Write-AlertMessage -tenant $($Item.tenant) -message "$($_.UserPrincipalName): Mailbox is more than $($value)% full. Mailbox is $PercentLeft% full" - } - } - } - } catch { - } -} diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertSecDefaultsUpsell.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertSecDefaultsUpsell.ps1 deleted file mode 100644 index bfa15eefa2da..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertSecDefaultsUpsell.ps1 +++ /dev/null @@ -1,35 +0,0 @@ -function Push-CIPPAlertSecDefaultsUpsell { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - Param ( - [Parameter(Mandatory = $true)] - $Item - ) - $LastRunTable = Get-CIPPTable -Table AlertLastRun - - - try { - $Filter = "RowKey eq 'SecDefaultsUpsell' and PartitionKey eq '{0}'" -f $Item.tenantid - $LastRun = Get-CIPPAzDataTableEntity @LastRunTable -Filter $Filter - $Yesterday = (Get-Date).AddDays(-1) - if (-not $LastRun.Timestamp.DateTime -or ($LastRun.Timestamp.DateTime -le $Yesterday)) { - try { - $SecDefaults = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/policies/identitySecurityDefaultsEnforcementPolicy' -tenantid $Item.tenant) - if ($SecDefaults.isEnabled -eq $false -and $SecDefaults.securityDefaultsUpsell.action -in @('autoEnable', 'autoEnabledNotify')) { - Write-AlertMessage -tenant $($Item.tenant) -message ('Security Defaults will be automatically enabled on {0}' -f $SecDefaults.securityDefaultsUpsell.dueDateTime) - } - } catch {} - $LastRun = @{ - RowKey = 'SecDefaultsUpsell' - PartitionKey = $Item.tenantid - } - Add-CIPPAzDataTableEntity @LastRunTable -Entity $LastRun -Force - } - } catch { - # Error handling - } -} - diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertVppTokenExpiry.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertVppTokenExpiry.ps1 deleted file mode 100644 index 6cbab2e3c0ff..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-CIPPAlertVppTokenExpiry.ps1 +++ /dev/null @@ -1,39 +0,0 @@ -function Push-CIPPAlertVppTokenExpiry { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - Param ( - [Parameter(Mandatory = $true)] - $Item - ) - $LastRunTable = Get-CIPPTable -Table AlertLastRun - - - try { - $Filter = "RowKey eq 'VppTokenExpiry' and PartitionKey eq '{0}'" -f $Item.tenantid - $LastRun = Get-CIPPAzDataTableEntity @LastRunTable -Filter $Filter - $Yesterday = (Get-Date).AddDays(-1) - if (-not $LastRun.Timestamp.DateTime -or ($LastRun.Timestamp.DateTime -le $Yesterday)) { - try { - $VppTokens = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/deviceAppManagement/vppTokens' -tenantid $Item.tenant).value - foreach ($Vpp in $VppTokens) { - if ($Vpp.state -ne 'valid') { - Write-AlertMessage -tenant $($Item.tenant) -message 'Apple Volume Purchase Program Token is not valid, new token required' - } - if ($Vpp.expirationDateTime -lt (Get-Date).AddDays(30) -and $Vpp.expirationDateTime -gt (Get-Date).AddDays(-7)) { - Write-AlertMessage -tenant $($Item.tenant) -message ('Apple Volume Purchase Program token expiring on {0}' -f $Vpp.expirationDateTime) - } - } - } catch {} - $LastRun = @{ - RowKey = 'VppTokenExpiry' - PartitionKey = $Item.tenantid - } - Add-CIPPAzDataTableEntity @LastRunTable -Entity $LastRun -Force - } - } catch { - # Error handling - } -} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecOnboardTenantQueue.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecOnboardTenantQueue.ps1 index 221068716478..78223a4bdf93 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecOnboardTenantQueue.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecOnboardTenantQueue.ps1 @@ -346,6 +346,29 @@ Function Push-ExecOnboardTenantQueue { } if ($OnboardingSteps.Step4.Status -eq 'succeeded') { + if ($Item.StandardsExcludeAllTenants -eq $true) { + $Settings = @{ + 'OverrideAllTenants' = @{ + 'remediate' = $true + } + } + $object = [PSCustomObject]@{ + Tenant = $Tenant.defaultDomainName + AddedBy = 'Onboarding' + AppliedAt = (Get-Date).ToString('s') + Standards = $Settings + v2 = $true + } | ConvertTo-Json -Depth 10 + + $Table = Get-CippTable -tablename 'standards' + $Table.Force = $true + Add-CIPPAzDataTableEntity @Table -Entity @{ + JSON = "$object" + RowKey = [string]$Tenant.defaultDomainName + PartitionKey = 'standards' + } + $Logs.Add([PSCustomObject]@{ Date = Get-Date -UFormat $DateFormat; Log = 'Set All Tenant Standards Exclusion' }) + } $Logs.Add([PSCustomObject]@{ Date = Get-Date -UFormat $DateFormat; Log = "Testing API access for $($Tenant.defaultDomainName)" }) $OnboardingSteps.Step5.Status = 'running' $OnboardingSteps.Step5.Message = 'Testing API access' diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecScheduledCommand.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecScheduledCommand.ps1 index 6013a2e05b7c..ddfa5a2f29eb 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecScheduledCommand.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecScheduledCommand.ps1 @@ -19,20 +19,26 @@ function Push-ExecScheduledCommand { $results = "Task Failed: $($_.Exception.Message)" } - Write-Host 'ran the command' - if ($results -is [String]) { - $results = @{ Results = $results } - } - if ($results -is [array] -and $results[0] -is [string]) { - $results = $results | Where-Object { $_ -is [string] } - $results = $results | ForEach-Object { @{ Results = $_ } } - } - - if ($results -is [string]) { - $StoredResults = $results + Write-Host 'ran the command. Processing results' + if ($item.command -like 'Get-CIPPAlert*') { + $results = @($results) + $TaskType = 'Alert' } else { - $results = $results | Select-Object * -ExcludeProperty RowKey, PartitionKey - $StoredResults = $results | ConvertTo-Json -Compress -Depth 20 | Out-String + $TaskType = 'Scheduled Task' + if ($results -is [String]) { + $results = @{ Results = $results } + } + if ($results -is [array] -and $results[0] -is [string]) { + $results = $results | Where-Object { $_ -is [string] } + $results = $results | ForEach-Object { @{ Results = $_ } } + } + + if ($results -is [string]) { + $StoredResults = $results + } else { + $results = $results | Select-Object * -ExcludeProperty RowKey, PartitionKey + $StoredResults = $results | ConvertTo-Json -Compress -Depth 20 | Out-String + } } if ($StoredResults.Length -gt 64000 -or $task.Tenant -eq 'AllTenants') { @@ -40,7 +46,7 @@ function Push-ExecScheduledCommand { } } catch { $errorMessage = $_.Exception.Message - if ($task.Recurrence -gt 0) { $State = 'Failed - Planned' } else { $State = 'Failed' } + if ($task.Recurrence -ne 0) { $State = 'Failed - Planned' } else { $State = 'Failed' } Update-AzDataTableEntity @Table -Entity @{ PartitionKey = $task.PartitionKey RowKey = $task.RowKey @@ -49,28 +55,31 @@ function Push-ExecScheduledCommand { } Write-LogMessage -API 'Scheduler_UserTasks' -tenant $tenant -message "Failed to execute task $($task.Name): $errorMessage" -sev Error } + Write-Host 'Sending task results to target. Updating the task state.' - - $TableDesign = '' - $HTML = ($results | Select-Object * -ExcludeProperty RowKey, PartitionKey | ConvertTo-Html -Fragment) -replace '', "$TableDesign
" | Out-String - $title = "Scheduled Task $($task.Name)" - Write-Host $title - switch -wildcard ($task.PostExecution) { - '*psa*' { Send-CIPPAlert -Type 'psa' -Title $title -HTMLContent $HTML } - '*email*' { Send-CIPPAlert -Type 'email' -Title $title -HTMLContent $HTML } - '*webhook*' { - $Webhook = [PSCustomObject]@{ - 'Tenant' = $tenant - 'TaskInfo' = $Item.TaskInfo - 'Results' = $Results + if ($Results) { + $TableDesign = '' + $FinalResults = if ($results -is [array] -and $results[0] -is [string]) { $Results | ConvertTo-Html -Fragment -Property @{ l = 'Text'; e = { $_ } } } else { $Results | ConvertTo-Html -Fragment } + $HTML = $FinalResults -replace '
', "$TableDesign
" | Out-String + $title = "$TaskType - $($task.Name)" + Write-Host 'Scheduler: Sending the results to the target.' + Write-Host "The content of results is: $Results" + switch -wildcard ($task.PostExecution) { + '*psa*' { Send-CIPPAlert -Type 'psa' -Title $title -HTMLContent $HTML } + '*email*' { Send-CIPPAlert -Type 'email' -Title $title -HTMLContent $HTML } + '*webhook*' { + $Webhook = [PSCustomObject]@{ + 'Tenant' = $tenant + 'TaskInfo' = $Item.TaskInfo + 'Results' = $Results + } + Send-CIPPAlert -Type 'webhook' -Title $title -JSONContent $($Webhook | ConvertTo-Json -Depth 20) } - Send-CIPPAlert -Type 'webhook' -Title $title -JSONContent $($Webhook | ConvertTo-Json -Depth 20) } } + Write-Host 'Sent the results to the target. Updating the task state.' - Write-Host 'ran the command' - - if ($task.Recurrence -le '0' -or $task.Recurrence -eq $null) { + if ($task.Recurrence -eq '0' -or $task.Recurrence -eq $null) { Update-AzDataTableEntity @Table -Entity @{ PartitionKey = $task.PartitionKey RowKey = $task.RowKey @@ -78,8 +87,18 @@ function Push-ExecScheduledCommand { TaskState = 'Completed' } } else { - $nextRun = (Get-Date).AddDays($task.Recurrence) - $nextRunUnixTime = [int64]($nextRun - (Get-Date '1/1/1970')).TotalSeconds + #if recurrence is just a number, add it in days. + if ($task.Recurrence -match '^\d+$') { + $task.Recurrence = $task.Recurrence + 'd' + } + $secondsToAdd = switch -Regex ($task.Recurrence) { + '(\d+)m$' { [int64]$matches[1] * 60 } + '(\d+)h$' { [int64]$matches[1] * 3600 } + '(\d+)d$' { [int64]$matches[1] * 86400 } + default { throw "Unsupported recurrence format: $($task.Recurrence)" } + } + $nextRunUnixTime = [int64]$task.ScheduledTime + [int64]$secondsToAdd + Write-Host "The job is recurring and should occur again at: $nextRunUnixTime" Update-AzDataTableEntity @Table -Entity @{ PartitionKey = $task.PartitionKey RowKey = $task.RowKey diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-GetPendingWebhooks.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-GetPendingWebhooks.ps1 index 7cef525b561d..4b292fdd7041 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-GetPendingWebhooks.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-GetPendingWebhooks.ps1 @@ -5,7 +5,7 @@ function Push-GetPendingWebhooks { #> Param($Item) $Table = Get-CIPPTable -TableName WebhookIncoming - $Webhooks = Get-CIPPAzDataTableEntity @Table -Property RowKey, FunctionName + $Webhooks = Get-CIPPAzDataTableEntity @Table -Property RowKey, FunctionName -First 10000 $WebhookCount = ($Webhooks | Measure-Object).Count $Message = 'Processing {0} webhooks' -f $WebhookCount Write-LogMessage -API 'Webhooks' -message $Message -sev Info diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-SchedulerAlert.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-SchedulerAlert.ps1 deleted file mode 100644 index 12aa7b58f394..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-SchedulerAlert.ps1 +++ /dev/null @@ -1,67 +0,0 @@ -function Push-SchedulerAlert { - <# - .FUNCTIONALITY - Entrypoint - #> - param ( - $Item - ) - - try { - $Table = Get-CIPPTable -Table SchedulerConfig - if ($Item.Tag -eq 'AllTenants') { - $Filter = "RowKey eq 'AllTenants' and PartitionKey eq 'Alert'" - } else { - $Filter = "RowKey eq '{0}' and PartitionKey eq 'Alert'" -f $Item.Tenantid - } - $Alerts = Get-CIPPAzDataTableEntity @Table -Filter $Filter - - $IgnoreList = @('Etag', 'PartitionKey', 'Timestamp', 'RowKey', 'tenantid', 'tenant', 'type') - $AlertList = $Alerts | Select-Object * -ExcludeProperty $IgnoreList - foreach ($task in ($AlertList.psobject.members | Where-Object { $_.MemberType -EQ 'NoteProperty' -and $_.value -ne $false })) { - $Table = Get-CIPPTable -TableName AlertRunCheck - $Filter = "PartitionKey eq '{0}' and RowKey eq '{1}' and Timestamp ge datetime'{2}'" -f $Item.Tenant, $task.Name, (Get-Date).AddMinutes(-10).ToUniversalTime().ToString('yyyy-MM-ddTHH:mm:ss') - $ExistingMessage = Get-CIPPAzDataTableEntity @Table -Filter $Filter - if (!$ExistingMessage) { - $Item = [pscustomobject]@{ - Tenant = $Item.Tenant - Tenantid = $Item.Tenantid - value = $Task.value - } - $Function = "Push-CIPPAlert$($Task.Name)" - & $Function -Item $Item - #Push-OutputBinding -Name QueueItemOut -Value $Item - $Item | Add-Member -MemberType NoteProperty -Name 'RowKey' -Value $task.Name -Force - $Item | Add-Member -MemberType NoteProperty -Name 'PartitionKey' -Value $Item.Tenant -Force - - if ($null -eq $Item.Tenant) { - Write-Host ($Item | ConvertTo-Json) - } else { - try { - $null = Add-CIPPAzDataTableEntity @Table -Entity $Item -Force -ErrorAction Stop - } catch { - Write-Host "################### Error updating alert $($_.Exception.Message) - Task:$($Task.Name) PK:$($Item.PartitionKey)" - } - } - } else { - Write-Host ('ALERTS: Duplicate run found. Ignoring. Tenant: {0}, Task: {1}' -f $Item.Tenant, $task.Name) - } - } - <#if (($Batch | Measure-Object).Count -gt 0) { - $InputObject = [PSCustomObject]@{ - OrchestratorName = 'AlertsOrchestrator' - SkipLog = $true - Batch = @($Batch) - } - #Write-Host ($Batch | ConvertTo-Json) - $InstanceId = Start-NewOrchestration -FunctionName 'CIPPOrchestrator' -InputObject ($InputObject | ConvertTo-Json -Depth 5) - Write-Host "Started alert orchestration with ID = '$InstanceId'" - #$Orchestrator = New-OrchestrationCheckStatusResponse -Request $Request -InstanceId $InstanceId - } else { - Write-Host 'No alerts to process' - }#> - } catch { - $Message = 'Exception on line {0} - {1}' -f $_.InvocationInfo.ScriptLineNumber, $_.Exception.Message - Write-LogMessage -message $Message -API 'Alerts' -tenant $Item.tenant -sev Error - } -} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-Schedulerwebhookcreation.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-Schedulerwebhookcreation.ps1 index d3a02c62063d..d3ca1dc6b455 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-Schedulerwebhookcreation.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-Schedulerwebhookcreation.ps1 @@ -4,7 +4,48 @@ function Push-Schedulerwebhookcreation { Entrypoint #> param ( - $QueueItem, $TriggerMetadata + $item ) + $Table = Get-CIPPTable -TableName 'SchedulerConfig' + $WebhookTable = Get-CIPPTable -TableName 'WebhookTable' + $Row = Get-CIPPAzDataTableEntity @Table -Filter "RowKey eq '$($item.SchedulerRow)'" + if (!$Row) { + Write-Host "No row found for $($item.SchedulerRow). Full received item was $($item | ConvertTo-Json)" + return + } else { + if ($Row.tenantid -eq 'AllTenants') { + $Tenants = (Get-Tenants).defaultDomainName + } else { + $Tenants = (Get-Tenants | Where-Object { $_.customerId -eq $Row.tenantid }).defaultDomainName + } + foreach ($Tenant in $Tenants) { + Write-Host "Working on $Tenant - $($Row.tenantid)" + #use the queueitem to see if we already have a webhook for this tenant + webhooktype. If we do, delete this row from SchedulerConfig. + $Webhook = Get-CIPPAzDataTableEntity @WebhookTable -Filter "PartitionKey eq '$Tenant' and Version eq '2' and Resource eq '$($Row.webhookType)'" + if ($Webhook) { + Write-Host "Found existing webhook for $Tenant - $($Row.webhookType)" + if ($Row.tenantid -ne 'AllTenants') { + Remove-AzDataTableEntity @Table -Entity $Row + } + } else { + Write-Host "No existing webhook for $Tenant - $($Row.webhookType) - Time to create." + try { + $NewSub = New-CIPPGraphSubscription -TenantFilter $Tenant -EventType $Row.webhookType -BaseURL $Row.CIPPURL -auditLogAPI $true + if ($NewSub.Success -and $Row.tenantid -ne 'AllTenants') { + Remove-AzDataTableEntity @Table -Entity $Row + } else { + Write-Host "Failed to create webhook for $Tenant - $($Row.webhookType) - $($_.Exception.Message)" + Write-LogMessage -message "Failed to create webhook for $Tenant - $($Row.webhookType)" -Sev 'Error' -LogData $_.Exception + } + } catch { + Write-Host "Failed to create webhook for $Tenant - $($Row.webhookType): $($_.Exception.Message)" + Write-LogMessage -message "Failed to create webhook for $Tenant - $($Row.webhookType)" -Sev 'Error' -LogData $_.Exception + + } + + } + } + } + } \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Standards/Push-GetStandards.ps1 b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Standards/Push-GetStandards.ps1 new file mode 100644 index 000000000000..fa1b43313add --- /dev/null +++ b/Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Standards/Push-GetStandards.ps1 @@ -0,0 +1,25 @@ +function Push-GetStandards { + <# + .FUNCTIONALITY + Entrypoint + #> + Param($Item) + + $Params = $Item.StandardParams | ConvertTo-Json | ConvertFrom-Json -AsHashtable + try { + $AllTasks = Get-CIPPStandards @Params + foreach ($task in $AllTasks) { + [PSCustomObject]@{ + Tenant = $task.Tenant + Standard = $task.Standard + Settings = $task.Settings + QueueId = $Item.QueueId + QueueName = '{0} - {1}' -f $task.Standard, $Task.Tenant + FunctionName = 'CIPPStandard' + } + } + } catch { + Write-Host "GetStandards Exception $($_.Exception.Message)" + } + +} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecDurableFunctions.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecDurableFunctions.ps1 new file mode 100644 index 000000000000..6028762273c6 --- /dev/null +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecDurableFunctions.ps1 @@ -0,0 +1,170 @@ +function Invoke-ExecDurableFunctions { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding(SupportsShouldProcess = $true)] + param($Request, $TriggerMetadata) + + $APIName = 'ExecDurableStats' + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' + + # Collect info + $StorageContext = New-AzStorageContext -ConnectionString $env:AzureWebJobsStorage + $FunctionName = $env:WEBSITE_SITE_NAME + + # Get orchestrators + $InstancesTable = Get-CippTable -TableName ('{0}Instances' -f $FunctionName) + $Yesterday = (Get-Date).AddDays(-1).ToUniversalTime().ToString('yyyy-MM-ddTHH:mm:ssZ') + $Filter = "CreatedTime ge datetime'$Yesterday' or RuntimeStatus eq 'Pending' or RuntimeStatus eq 'Running'" + $Instances = Get-CippAzDataTableEntity @InstancesTable -Filter $Filter + + switch ($Request.Query.Action) { + 'ListOrchestrators' { + $Orchestrators = foreach ($Instance in $Instances) { + $Json = $Instance.Input -replace '^"(.+)"$', '$1' -replace '\\"', '"' + + if ($Json -notmatch '^http' -and ![string]::IsNullOrEmpty($Json)) { + if (Test-Json -Json $Json -ErrorAction SilentlyContinue) { + $Instance.Input = $Json | ConvertFrom-Json + if (![string]::IsNullOrEmpty($Instance.Input.OrchestratorName)) { + $Instance.Name = $Instance.Input.OrchestratorName + } + } else { + #Write-Host $Instance.Input + if ($Json -match '\"OrchestratorName\":\"(.+?)\"') { + $Instance.Name = $Matches[1] + } + $Instance.Input = 'Invalid JSON' + } + } + $Instance + } + + $Body = [PSCustomObject]@{ + Orchestrators = @($Orchestrators) + } + } + 'ListOrchestratorHistory' { + if ($Request.Query.PartitionKey) { + $HistoryTable = Get-CippTable -TableName ('{0}History' -f $FunctionName) + $Filter = "PartitionKey eq '{0}'" -f $Request.Query.PartitionKey + $History = Get-CippAzDataTableEntity @HistoryTable -Filter $Filter -Property RowKey, Timestamp, EventType, Name, IsPlayed, OrchestrationStatus | Select-Object * -ExcludeProperty ETag + + $Body = [PSCustomObject]@{ + Results = @($History) + } + } else { + $Body = [PSCustomObject]@{ + Results = @('PartitionKey is required') + } + } + } + 'ListStats' { + $OrchestratorsByStatus = $Instances | Group-Object -Property RuntimeStatus + + if ($OrchestratorsByStatus.Name -contains 'Pending') { + $PendingOrchestrators = $OrchestratorsByStatus | Where-Object -Property Name -EQ 'Pending' | Select-Object -ExpandProperty Group + $Pending30MinCount = $PendingOrchestrators | Where-Object { $_.CreatedTime -lt (Get-Date).AddMinutes(-30).ToUniversalTime() } | Measure-Object | Select-Object -ExpandProperty Count + } + + $Queues = Get-AzStorageQueue -Context $StorageContext -Name ('{0}*' -f $FunctionName) | Select-Object -Property Name, ApproximateMessageCount + + $Body = [PSCustomObject]@{ + Orchestrators = @($OrchestratorsByStatus | Select-Object Count, Name) + Pending30MinCount = $Pending30MinCount ?? 0 + Queues = @($Queues) + } + } + 'ResetDurables' { + try { + $Queues = Get-AzStorageQueue -Context $StorageContext -Name ('{0}*' -f $FunctionName) | Select-Object -Property Name, ApproximateMessageCount, QueueClient + + $RunningQueues = $Queues | Where-Object { $_.ApproximateMessageCount -gt 0 } + foreach ($Queue in $RunningQueues) { + Write-Information "- Removing queue: $($Queue.Name), message count: $($Queue.ApproximateMessageCount)" + if ($PSCmdlet.ShouldProcess($Queue.Name, 'Clear Queue')) { + $Queue.QueueClient.ClearMessagesAsync() + } + } + + $RunningInstances = $Instances | Where-Object { $_.RuntimeStatus -eq 'Running' -or $_.RuntimeStatus -eq 'Pending' } + if (($RunningInstances | Measure-Object).Count -gt 0) { + if ($PSCmdlet.ShouldProcess('Orchestrators', 'Mark Failed')) { + foreach ($Instance in $RunningInstances) { + $Instance.RuntimeStatus = 'Failed' + Update-AzDataTableEntity @InstancesTable -Entity $Instance + } + } + } + + $QueueTable = Get-CippTable -TableName 'CippQueue' + $CippQueue = Invoke-ListCippQueue + $QueueEntities = foreach ($Queue in $CippQueue) { + if ($Queue.Status -eq 'Running') { + $Queue.TotalTasks = $Queue.CompletedTasks + $Queue | Select-Object -Property PartitionKey, RowKey, TotalTasks + } + } + if (($QueueEntities | Measure-Object).Count -gt 0) { + if ($PSCmdlet.ShouldProcess('Queues', 'Mark Failed')) { + Update-AzDataTableEntity @QueueTable -Entity $QueueEntities + } + } + + $CippQueueTasks = Get-CippTable -TableName 'CippQueueTasks' + $RunningTasks = Get-CIPPAzDataTableEntity @CippQueueTasks -Filter "Status eq 'Running'" -Property RowKey, PartitionKey, Status + if (($RunningTasks | Measure-Object).Count -gt 0) { + if ($PSCmdlet.ShouldProcess('Tasks', 'Mark Failed')) { + $UpdatedTasks = foreach ($Task in $RunningTasks) { + $Task.Status = 'Failed' + $Task + } + Update-AzDataTableEntity @CippQueueTasks -Entity $UpdatedTasks + } + } + + $Body = [PSCustomObject]@{ + Message = 'Durable Queues reset successfully' + } + + } catch { + $Body = [PSCustomObject]@{ + Message = "Error resetting durables: $($_.Exception.Message)" + Exception = Get-CippException -Exception $_ + } + } + } + 'PurgeOrchestrators' { + $HistoryTable = Get-CippTable -TableName ('{0}History' -f $FunctionName) + if ($Request.Query.PartitionKey) { + $HistoryEntities = Get-CIPPAzDataTableEntity @HistoryTable -Filter "PartitionKey eq '$($Request.Query.PartitionKey)'" -Property RowKey, PartitionKey + Remove-AzDataTableEntity @HistoryTable -Entity $HistoryEntities + $Instance = Get-CIPPAzDataTableEntity @InstancesTable -Filter "PartitionKey eq '$($Request.Query.PartitionKey)'" -Property RowKey, PartitionKey + Remove-AzDataTableEntity @InstancesTable -Entity $Instance + $Body = [PSCustomObject]@{ + Results = 'Orchestrator {0} purged successfully' -f $Request.Query.PartitionKey + } + } else { + Remove-AzDataTable @InstancesTable + Remove-AzDataTable @HistoryTable + $BlobContainer = '{0}-largemessages' -f $Function.Name + if (Get-AzStorageContainer -Name $BlobContainer -Context $StorageContext -ErrorAction SilentlyContinue) { + Write-Information "- Removing blob container: $BlobContainer" + if ($PSCmdlet.ShouldProcess($BlobContainer, 'Remove Blob Container')) { + Remove-AzStorageContainer -Name $BlobContainer -Context $StorageContext -Confirm:$false -Force + } + } + $null = Get-CippTable -TableName ('{0}History' -f $FunctionName) + $Body = [PSCustomObject]@{ + Message = 'Orchestrators purged successfully' + } + } + } + } + + Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ + StatusCode = [HttpStatusCode]::OK + Body = $Body + }) +} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecEditTemplate.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecEditTemplate.ps1 index 1be43b61462d..4998a8447406 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecEditTemplate.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecEditTemplate.ps1 @@ -15,7 +15,7 @@ Function Invoke-ExecEditTemplate { $Table = Get-CippTable -tablename 'templates' $Table.Force = $true $guid = $request.body.guid - $JSON = $request.body | Select-Object * -ExcludeProperty GUID | ConvertTo-Json + $JSON = ConvertTo-Json -Compress -Depth 100 -InputObject ($request.body | Select-Object * -ExcludeProperty GUID) $Type = $request.Query.Type if ($Type -eq 'IntuneTemplate') { diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecPartnerWebhook.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecPartnerWebhook.ps1 index a5af73c686da..d6efbbe307f0 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecPartnerWebhook.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Core/Invoke-ExecPartnerWebhook.ps1 @@ -14,6 +14,12 @@ function Invoke-ExecPartnerWebhook { try { $Uri = 'https://api.partnercenter.microsoft.com/webhooks/v1/registration' $Results = New-GraphGetRequest -uri $Uri -tenantid $env:TenantID -NoAuthCheck $true -scope 'https://api.partnercenter.microsoft.com/.default' + + $ConfigTable = Get-CIPPTable -TableName Config + $WebhookConfig = Get-CIPPAzDataTableEntity @ConfigTable -Filter "RowKey eq 'PartnerWebhookOnboarding'" + if ($WebhookConfig.StandardsExcludeAllTenants -eq $true) { + $Results | Add-Member -MemberType NoteProperty -Name 'standardsExcludeAllTenants' -Value $true -Force + } } catch {} if (!$Results) { $Results = [PSCustomObject]@{ @@ -24,15 +30,25 @@ function Invoke-ExecPartnerWebhook { } } 'CreateSubscription' { - $BaseURL = ([System.Uri]$request.headers.'x-ms-original-url').Host + $BaseURL = ([System.Uri]$Request.Headers.'x-ms-original-url').Host $Webhook = @{ TenantFilter = $env:TenantId PartnerCenter = $true BaseURL = $BaseURL - EventType = $Request.body.EventType - ExecutingUser = $Request.headers.'x-ms-client-principal' + EventType = $Request.Body.EventType + ExecutingUser = $Request.Headers.'x-ms-client-principal' } $Results = New-CIPPGraphSubscription @Webhook + + if ($Request.Body.standardsExcludeAllTenants -eq $true) { + $ConfigTable = Get-CIPPTable -TableName Config + $PartnerWebhookOnboarding = [PSCustomObject]@{ + PartitionKey = 'Config' + RowKey = 'PartnerWebhookOnboarding' + StandardsExcludeAllTenants = $true + } + Add-CIPPAzDataTableEntity @ConfigTable -Entity $PartnerWebhookOnboarding -Force | Out-Null + } } 'SendTest' { $Results = New-GraphPOSTRequest -uri 'https://api.partnercenter.microsoft.com/webhooks/v1/registration/validationEvents' -tenantid $env:TenantID -NoAuthCheck $true -scope 'https://api.partnercenter.microsoft.com/.default' diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Scheduler/Invoke-AddScheduledItem.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Scheduler/Invoke-AddScheduledItem.ps1 index 9c7021dfaae9..44dbfa761030 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Scheduler/Invoke-AddScheduledItem.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Scheduler/Invoke-AddScheduledItem.ps1 @@ -7,7 +7,12 @@ Function Invoke-AddScheduledItem { #> [CmdletBinding()] param($Request, $TriggerMetadata) - $Result = Add-CIPPScheduledTask -Task $Request.body -hidden $false + if ($Request.query.hidden -eq $null) { + $hidden = $false + } else { + $hidden = $true + } + $Result = Add-CIPPScheduledTask -Task $Request.body -hidden $hidden Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message $Result -Sev 'Info' Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ diff --git a/Modules/CIPPCore/Public/Entrypoints/Invoke-ListScheduledItems.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Scheduler/Invoke-ListScheduledItems.ps1 similarity index 68% rename from Modules/CIPPCore/Public/Entrypoints/Invoke-ListScheduledItems.ps1 rename to Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Scheduler/Invoke-ListScheduledItems.ps1 index 17a650f11196..71aa6aa536fe 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Invoke-ListScheduledItems.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Scheduler/Invoke-ListScheduledItems.ps1 @@ -11,7 +11,13 @@ Function Invoke-ListScheduledItems { # Write to the Azure Functions log stream. Write-Host 'PowerShell HTTP trigger function processed a request.' $Table = Get-CIPPTable -TableName 'ScheduledTasks' - $ScheduledTasks = foreach ($Task in Get-CIPPAzDataTableEntity @Table -Filter "PartitionKey eq 'ScheduledTask' and Hidden ne 'True'") { + if ($Request.query.Showhidden -eq 'true') { + $HiddenTasks = $false + } else { + $HiddenTasks = $true + } + $Tasks = Get-CIPPAzDataTableEntity @Table -Filter "PartitionKey eq 'ScheduledTask'" | Where-Object { $_.Hidden -ne $HiddenTasks } + $ScheduledTasks = foreach ($Task in $tasks) { $Task.Parameters = $Task.Parameters | ConvertFrom-Json $Task } diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionMapping.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionMapping.ps1 index 5e408d64e1ef..e848d7df1669 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionMapping.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionMapping.ps1 @@ -39,11 +39,9 @@ Function Invoke-ExecExtensionMapping { 'Halo' { $body = Set-HaloMapping -CIPPMapping $Table -APIName $APIName -Request $Request } - 'NinjaOrgs' { $Body = Set-NinjaOneOrgMapping -CIPPMapping $Table -APIName $APIName -Request $Request } - 'NinjaFields' { $Body = Set-NinjaOneFieldMapping -CIPPMapping $Table -APIName $APIName -Request $Request -TriggerMetadata $TriggerMetadata } @@ -58,7 +56,6 @@ Function Invoke-ExecExtensionMapping { if ($Request.Query.AutoMapping) { switch ($Request.Query.AutoMapping) { 'NinjaOrgs' { - #Push-OutputBinding -Name NinjaProcess -Value @{'NinjaAction' = 'StartAutoMapping' } $Batch = [PSCustomObject]@{ 'NinjaAction' = 'StartAutoMapping' 'FunctionName' = 'NinjaOneQueue' diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionSync.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionSync.ps1 index c7b436294b74..3abce0100b91 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionSync.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionSync.ps1 @@ -44,10 +44,6 @@ Function Invoke-ExecExtensionSync { if ($Request.Query.TenantID) { $Tenant = $TenantsToProcess | Where-Object { $_.RowKey -eq $Request.Query.TenantID } if (($Tenant | Measure-Object).count -eq 1) { - <#Push-OutputBinding -Name NinjaProcess -Value @{ - 'NinjaAction' = 'SyncTenant' - 'MappedTenant' = $Tenant - }#> $Batch = [PSCustomObject]@{ 'NinjaAction' = 'SyncTenant' 'MappedTenant' = $Tenant @@ -67,9 +63,6 @@ Function Invoke-ExecExtensionSync { } } else { - <#Push-OutputBinding -Name NinjaProcess -Value @{ - 'NinjaAction' = 'SyncTenants' - }#> $Batch = [PSCustomObject]@{ 'NinjaAction' = 'SyncTenants' 'FunctionName' = 'NinjaOneQueue' diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionsConfig.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionsConfig.ps1 index 772e36bfac74..50675339a8f8 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionsConfig.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/CIPP/Settings/Invoke-ExecExtensionsConfig.ps1 @@ -1,6 +1,6 @@ - using namespace System.Net +using namespace System.Net - Function Invoke-ExecExtensionsConfig { +Function Invoke-ExecExtensionsConfig { <# .FUNCTIONALITY Entrypoint @@ -8,64 +8,74 @@ [CmdletBinding()] param($Request, $TriggerMetadata) - $APIName = $TriggerMetadata.FunctionName -Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' + $APIName = $TriggerMetadata.FunctionName + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' -#Connect-AzAccount -UseDeviceAuthentication -# Write to the Azure Functions log stream. -Write-Host 'PowerShell HTTP trigger function processed a request.' -$results = try { - if ($Request.body.CIPPAPI.Enabled) { - $APIConfig = New-CIPPAPIConfig -ExecutingUser $request.headers.'x-ms-client-principal' -resetpassword $request.body.CIPPAPI.ResetPassword - $AddedText = $APIConfig.Results - } - - # Check if NinjaOne URL is set correctly and the intance has at least version 5.6 - if ($request.body.NinjaOne) { - try { - [version]$Version = (Invoke-WebRequest -Method GET -Uri "https://$(($request.body.NinjaOne.Instance -replace '/ws','') -replace 'https://','')/app-version.txt" -ea stop).content - } catch { - throw "Failed to connect to NinjaOne check your Instance is set correctly eg 'app.ninjarmmm.com'" + #Connect-AzAccount -UseDeviceAuthentication + # Write to the Azure Functions log stream. + Write-Host 'PowerShell HTTP trigger function processed a request.' + $results = try { + if ($Request.body.CIPPAPI.Enabled) { + $APIConfig = New-CIPPAPIConfig -ExecutingUser $request.headers.'x-ms-client-principal' -resetpassword $request.body.CIPPAPI.ResetPassword + $AddedText = $APIConfig.Results } - if ($Version -lt [version]'5.6.0.0') { - throw "NinjaOne 5.6.0.0 is required. This will be rolling out regionally between the end of November and mid-December. Please try again at a later date." + + # Check if NinjaOne URL is set correctly and the intance has at least version 5.6 + if ($request.body.NinjaOne) { + try { + [version]$Version = (Invoke-WebRequest -Method GET -Uri "https://$(($request.body.NinjaOne.Instance -replace '/ws','') -replace 'https://','')/app-version.txt" -ea stop).content + } catch { + throw "Failed to connect to NinjaOne check your Instance is set correctly eg 'app.ninjarmmm.com'" + } + if ($Version -lt [version]'5.6.0.0') { + throw 'NinjaOne 5.6.0.0 is required. This will be rolling out regionally between the end of November and mid-December. Please try again at a later date.' + } } - } - $Table = Get-CIPPTable -TableName Extensionsconfig - foreach ($APIKey in ([pscustomobject]$request.body).psobject.properties.name) { - Write-Host "Working on $apikey" - if ($request.body.$APIKey.APIKey -eq "SentToKeyVault" -or $request.body.$APIKey.APIKey -eq "") { - Write-Host "Not sending to keyvault. Key previously set or left blank." - } else { - Write-Host "writing API Key to keyvault, and clearing." - Write-Host "$ENV:WEBSITE_DEPLOYMENT_ID" - if ($request.body.$APIKey.APIKey) { - $null = Set-AzKeyVaultSecret -VaultName $ENV:WEBSITE_DEPLOYMENT_ID -Name $APIKey -SecretValue (ConvertTo-SecureString -String $request.body.$APIKey.APIKey -AsPlainText -Force) + $Table = Get-CIPPTable -TableName Extensionsconfig + foreach ($APIKey in ([pscustomobject]$request.body).psobject.properties.name) { + Write-Host "Working on $apikey" + if ($request.body.$APIKey.APIKey -eq 'SentToKeyVault' -or $request.body.$APIKey.APIKey -eq '') { + Write-Host 'Not sending to keyvault. Key previously set or left blank.' + } else { + Write-Host 'writing API Key to keyvault, and clearing.' + Write-Host "$ENV:WEBSITE_DEPLOYMENT_ID" + if ($request.body.$APIKey.APIKey) { + if ($env:AzureWebJobsStorage -eq 'UseDevelopmentStorage=true') { + $DevSecretsTable = Get-CIPPTable -tablename 'DevSecrets' + $Secret = [PSCustomObject]@{ + 'PartitionKey' = $APIKey + 'RowKey' = $APIKey + 'APIKey' = $request.body.$APIKey.APIKey + } + Add-CIPPAzDataTableEntity @DevSecretsTable -Entity $Secret -Force + } else { + $null = Set-AzKeyVaultSecret -VaultName $ENV:WEBSITE_DEPLOYMENT_ID -Name $APIKey -SecretValue (ConvertTo-SecureString -String $request.body.$APIKey.APIKey -AsPlainText -Force) + } + } + $request.body.$APIKey.APIKey = 'SentToKeyVault' } - $request.body.$APIKey.APIKey = "SentToKeyVault" } - } - $body = $request.body | Select-Object * -ExcludeProperty APIKey, Enabled | ConvertTo-Json -Depth 10 -Compress - $Config = @{ - 'PartitionKey' = 'CippExtensions' - 'RowKey' = 'Config' - 'config' = [string]$body - } + $body = $request.body | Select-Object * -ExcludeProperty APIKey, Enabled | ConvertTo-Json -Depth 10 -Compress + $Config = @{ + 'PartitionKey' = 'CippExtensions' + 'RowKey' = 'Config' + 'config' = [string]$body + } - Add-CIPPAzDataTableEntity @Table -Entity $Config -Force | Out-Null - "Successfully set the configuration. $AddedText" -} catch { - "Failed to set configuration: $($_.Exception.message) Linenumber: $($_.InvocationInfo.ScriptLineNumber)" -} + Add-CIPPAzDataTableEntity @Table -Entity $Config -Force | Out-Null + "Successfully set the configuration. $AddedText" + } catch { + "Failed to set configuration: $($_.Exception.message) Linenumber: $($_.InvocationInfo.ScriptLineNumber)" + } -$body = [pscustomobject]@{'Results' = $Results } + $body = [pscustomobject]@{'Results' = $Results } -# Associate values to output bindings by calling 'Push-OutputBinding'. -Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ - StatusCode = [HttpStatusCode]::OK - Body = $body - }) + # Associate values to output bindings by calling 'Push-OutputBinding'. + Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ + StatusCode = [HttpStatusCode]::OK + Body = $body + }) - } +} diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Endpoint/MEM/Invoke-AddIntuneTemplate.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Endpoint/MEM/Invoke-AddIntuneTemplate.ps1 index ca7815ec778b..b4c3471b4fca 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Endpoint/MEM/Invoke-AddIntuneTemplate.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Endpoint/MEM/Invoke-AddIntuneTemplate.ps1 @@ -9,20 +9,20 @@ Function Invoke-AddIntuneTemplate { param($Request, $TriggerMetadata) $APIName = $TriggerMetadata.FunctionName - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' + Write-LogMessage -user $Request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' $GUID = (New-Guid).GUID - try { - if ($Request.body.rawJSON) { - if (!$Request.body.displayname) { throw 'You must enter a displayname' } - if ($null -eq ($Request.body.Rawjson | ConvertFrom-Json)) { throw 'the JSON is invalid' } - + try { + if ($Request.Body.RawJSON) { + if (!$Request.Body.displayName) { throw 'You must enter a displayname' } + if ($null -eq ($Request.Body.RawJSON | ConvertFrom-Json)) { throw 'the JSON is invalid' } + $object = [PSCustomObject]@{ - Displayname = $request.body.displayname - Description = $request.body.description - RAWJson = $request.body.RawJSON - Type = $request.body.TemplateType + Displayname = $Request.Body.displayName + Description = $Request.Body.description + RAWJson = $Request.Body.RawJSON + Type = $Request.Body.TemplateType GUID = $GUID } | ConvertTo-Json $Table = Get-CippTable -tablename 'templates' @@ -32,39 +32,39 @@ Function Invoke-AddIntuneTemplate { RowKey = "$GUID" PartitionKey = 'IntuneTemplate' } - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message "Created intune policy template named $($Request.body.displayname) with GUID $GUID" -Sev 'Debug' + Write-LogMessage -user $Request.headers.'x-ms-client-principal' -API $APINAME -message "Created intune policy template named $($Request.Body.displayName) with GUID $GUID" -Sev 'Debug' $body = [pscustomobject]@{'Results' = 'Successfully added template' } } else { - $TenantFilter = $request.query.TenantFilter - $URLName = $Request.query.URLName - $ID = $request.query.id + $TenantFilter = $Request.Query.TenantFilter + $URLName = $Request.Query.URLName + $ID = $Request.Query.id switch ($URLName) { 'deviceCompliancePolicies' { $Type = 'deviceCompliancePolicies' $Template = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/deviceManagement/$($urlname)/$($ID)?`$expand=scheduledActionsForRule(`$expand=scheduledActionConfigurations)" -tenantid $tenantfilter - $DisplayName = $template.displayName + $DisplayName = $Template.displayName $TemplateJson = ConvertTo-Json -InputObject $Template -Depth 10 -Compress } 'managedAppPolicies' { $Type = 'AppProtection' $Template = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/deviceAppManagement/$($urlname)('$($ID)')" -tenantid $tenantfilter - $DisplayName = $template.displayName + $DisplayName = $Template.displayName $TemplateJson = ConvertTo-Json -InputObject $Template -Depth 10 -Compress } 'configurationPolicies' { $Type = 'Catalog' $Template = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/deviceManagement/$($urlname)('$($ID)')?`$expand=settings" -tenantid $tenantfilter | Select-Object name, description, settings, platforms, technologies, templateReference $TemplateJson = $Template | ConvertTo-Json -Depth 10 - $DisplayName = $template.name + $DisplayName = $Template.name - } + } 'deviceConfigurations' { $Type = 'Device' $Template = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/deviceManagement/$($urlname)/$($ID)" -tenantid $tenantfilter | Select-Object * -ExcludeProperty id, lastModifiedDateTime, '@odata.context', 'ScopeTagIds', 'supportsScopeTags', 'createdDateTime' Write-Host ($Template | ConvertTo-Json) - $DisplayName = $template.displayName + $DisplayName = $Template.displayName $TemplateJson = ConvertTo-Json -InputObject $Template -Depth 10 -Compress } 'groupPolicyConfigurations' { @@ -98,7 +98,7 @@ Function Invoke-AddIntuneTemplate { deletedIds = @() } - + $TemplateJson = (ConvertTo-Json -InputObject $inputvar -Depth 15 -Compress) } @@ -118,12 +118,12 @@ Function Invoke-AddIntuneTemplate { RowKey = "$GUID" PartitionKey = 'IntuneTemplate' } - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message "Created intune policy template $($Request.body.displayname) with GUID $GUID using an original policy from a tenant" -Sev 'Debug' + Write-LogMessage -user $Request.headers.'x-ms-client-principal' -API $APINAME -message "Created intune policy template $($Request.Body.displayName) with GUID $GUID using an original policy from a tenant" -Sev 'Debug' $body = [pscustomobject]@{'Results' = 'Successfully added template' } } } catch { - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message "Intune Template Deployment failed: $($_.Exception.Message)" -Sev 'Error' + Write-LogMessage -user $Request.headers.'x-ms-client-principal' -API $APINAME -message "Intune Template Deployment failed: $($_.Exception.Message)" -Sev 'Error' $body = [pscustomobject]@{'Results' = "Intune Template Deployment failed: $($_.Exception.Message)" } } diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Endpoint/MEM/Invoke-AddPolicy.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Endpoint/MEM/Invoke-AddPolicy.ps1 index 3cf7126bd8b4..ac6648f814dc 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Endpoint/MEM/Invoke-AddPolicy.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Endpoint/MEM/Invoke-AddPolicy.ps1 @@ -9,21 +9,21 @@ Function Invoke-AddPolicy { param($Request, $TriggerMetadata) $APIName = $TriggerMetadata.FunctionName - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' + Write-LogMessage -user $Request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' - $Tenants = ($Request.body | Select-Object Select_*).psobject.properties.value + $Tenants = ($Request.Body | Select-Object Select_*).psobject.properties.value if ('AllTenants' -in $Tenants) { $Tenants = (Get-Tenants).defaultDomainName } - $displayname = $request.body.Displayname - $description = $request.body.Description - $AssignTo = if ($request.body.Assignto -ne 'on') { $request.body.Assignto } - $RawJSON = $Request.body.RawJSON + $displayname = $Request.Body.displayName + $description = $Request.Body.Description + $AssignTo = if ($Request.Body.AssignTo -ne 'on') { $Request.Body.AssignTo } + $RawJSON = $Request.Body.RAWJson $results = foreach ($Tenant in $tenants) { - if ($Request.body.replacemap.$tenant) { - ([pscustomobject]$Request.body.replacemap.$tenant).psobject.properties | ForEach-Object { $RawJson = $RawJson -replace $_.name, $_.value } + if ($Request.Body.replacemap.$tenant) { + ([pscustomobject]$Request.Body.replacemap.$tenant).psobject.properties | ForEach-Object { $RawJson = $RawJson -replace $_.name, $_.value } } try { - switch ($Request.body.TemplateType) { + switch ($Request.Body.TemplateType) { 'AppProtection' { $TemplateType = ($RawJSON | ConvertFrom-Json).'@odata.type' -replace '#microsoft.graph.', '' $TemplateTypeURL = "$($TemplateType)s" @@ -81,14 +81,14 @@ Function Invoke-AddPolicy { } } - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($Tenant) -message "Added policy $($Displayname)" -Sev 'Info' + Write-LogMessage -user $Request.headers.'x-ms-client-principal' -API $APINAME -tenant $($Tenant) -message "Added policy $($Displayname)" -Sev 'Info' if ($AssignTo) { - Set-CIPPAssignedPolicy -GroupName $AssignTo -PolicyId $CreateRequest.id -Type $TemplateTypeURL -TenantFilter $tenant + Set-CIPPAssignedPolicy -GroupName $AssignTo -PolicyId $CreateRequest.id -Type $TemplateTypeURL -TenantFilter $tenant } "Successfully added policy for $($Tenant)" } catch { "Failed to add policy for $($Tenant): $($_.Exception.Message)" - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($Tenant) -message "Failed adding policy $($Displayname). Error: $($_.Exception.Message)" -Sev 'Error' + Write-LogMessage -user $Request.headers.'x-ms-client-principal' -API $APINAME -tenant $($Tenant) -message "Failed adding policy $($Displayname). Error: $($_.Exception.Message)" -Sev 'Error' continue } diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Identity/Administration/Users/Invoke-AddUser.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Identity/Administration/Users/Invoke-AddUser.ps1 index 41c1004a8cf6..861ea01e85c4 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Identity/Administration/Users/Invoke-AddUser.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Identity/Administration/Users/Invoke-AddUser.ps1 @@ -11,61 +11,65 @@ Function Invoke-AddUser { $APIName = 'AddUser' Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' - $Results = [System.Collections.ArrayList]@() - $userobj = $Request.body + $Results = [System.Collections.Generic.List[string]]::new() + $UserObj = $Request.body # Write to the Azure Functions log stream. Write-Host 'PowerShell HTTP trigger function processed a request.' try { - $license = $userobj.license - $Aliases = ($userobj.AddedAliases).Split([Environment]::NewLine) - $password = if ($userobj.password) { $userobj.password } else { New-passwordString } - $UserprincipalName = "$($UserObj.username)@$($UserObj.domain)" + $license = $UserObj.license + $Aliases = ($UserObj.AddedAliases) -split '\s' + $password = if ($UserObj.password) { $UserObj.password } else { New-passwordString } + $UserprincipalName = "$($UserObj.Username)@$($UserObj.Domain)" $BodyToship = [pscustomobject] @{ - 'givenName' = $userobj.firstname - 'surname' = $userobj.lastname + 'givenName' = $UserObj.FirstName + 'surname' = $UserObj.LastName 'accountEnabled' = $true - 'displayName' = $UserObj.Displayname - 'department' = $userobj.department - 'mailNickname' = $UserObj.username + 'displayName' = $UserObj.DisplayName + 'department' = $UserObj.Department + 'mailNickname' = $UserObj.Username 'userPrincipalName' = $UserprincipalName 'usageLocation' = $UserObj.usageLocation - 'city' = $userobj.city - 'country' = $userobj.country - 'jobtitle' = $userObj.jobtitle - 'mobilePhone' = $userobj.mobilePhone - 'streetAddress' = $userobj.streetAddress - 'postalCode' = $userobj.postalCode - 'companyName' = $userobj.companyName + 'city' = $UserObj.City + 'country' = $UserObj.Country + 'jobtitle' = $UserObj.Jobtitle + 'mobilePhone' = $UserObj.MobilePhone + 'streetAddress' = $UserObj.streetAddress + 'postalCode' = $UserObj.PostalCode + 'companyName' = $UserObj.CompanyName 'passwordProfile' = @{ - 'forceChangePasswordNextSignIn' = [bool]$UserObj.mustchangepass + 'forceChangePasswordNextSignIn' = [bool]$UserObj.MustChangePass 'password' = $password } - } - if ($userobj.businessPhone) { $bodytoShip | Add-Member -NotePropertyName businessPhones -NotePropertyValue @($userobj.businessPhone) } - if ($userobj.addedAttributes) { + } + if ($userobj.businessPhone) { $bodytoShip | Add-Member -NotePropertyName businessPhones -NotePropertyValue @($UserObj.businessPhone) } + if ($UserObj.addedAttributes) { Write-Host 'Found added attribute' - Write-Host "Added attributes: $($userobj.addedAttributes | ConvertTo-Json)" - $userobj.addedAttributes.getenumerator() | ForEach-Object { + Write-Host "Added attributes: $($UserObj.addedAttributes | ConvertTo-Json)" + $UserObj.addedAttributes.GetEnumerator() | ForEach-Object { $results.add("Added property $($_.Key) with value $($_.value)") $bodytoShip | Add-Member -NotePropertyName $_.Key -NotePropertyValue $_.Value } } $bodyToShip = ConvertTo-Json -Depth 10 -InputObject $BodyToship -Compress - $GraphRequest = New-GraphPostRequest -uri 'https://graph.microsoft.com/beta/users' -tenantid $Userobj.tenantid -type POST -body $BodyToship -verbose - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($userobj.tenantid) -message "Created user $($userobj.displayname) with id $($GraphRequest.id) " -Sev 'Info' + $GraphRequest = New-GraphPostRequest -uri 'https://graph.microsoft.com/beta/users' -tenantid $UserObj.tenantID -type POST -body $BodyToship -verbose + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($UserObj.tenantID) -message "Created user $($UserObj.displayname) with id $($GraphRequest.id) " -Sev 'Info' $results.add('Created user.') $results.add("Username: $($UserprincipalName)") $results.add("Password: $password") } catch { - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($userobj.tenantid) -message "Failed to create user. Error:$($_.Exception.Message)" -Sev 'Error' + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($UserObj.tenantID) -message "Failed to create user. Error:$($_.Exception.Message)" -Sev 'Error' $body = $results.add("Failed to create user. $($_.Exception.Message)" ) + Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ + StatusCode = [HttpStatusCode]::OK + Body = $Body + }) exit 1 } try { if ($license) { - Write-Host ($userobj | ConvertTo-Json) - $licenses = (($userobj | Select-Object 'License_*').psobject.properties | Where-Object { $_.value -EQ $true }).name -replace 'License_', '' + Write-Host ($UserObj | ConvertTo-Json) + $licenses = (($UserObj | Select-Object 'License_*').psobject.properties | Where-Object { $_.value -EQ $true }).name -replace 'License_', '' Write-Host "Lics are: $licences" $LicenseBody = if ($licenses.count -ge 2) { $liclist = foreach ($license in $Licenses) { '{"disabledPlans": [],"skuId": "' + $license + '" },' } @@ -74,15 +78,13 @@ Function Invoke-AddUser { '{"addLicenses": [ {"disabledPlans": [],"skuId": "' + $licenses + '" }],"removeLicenses": [ ]}' } Write-Host $LicenseBody - $LicRequest = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($GraphRequest.id)/assignlicense" -tenantid $Userobj.tenantid -type POST -body $LicenseBody -verbose - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($userobj.tenantid) -message "Assigned user $($userobj.displayname) license $($licences)" -Sev 'Info' + $LicRequest = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($GraphRequest.id)/assignlicense" -tenantid $UserObj.tenantID -type POST -body $LicenseBody -verbose + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($UserObj.tenantid) -message "Assigned user $($UserObj.DisplayName) license $($licences)" -Sev 'Info' $body = $results.add('Assigned licenses.') } - } - - catch { - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($userobj.tenantid) -message "Failed to assign the license. Error:$($_.Exception.Message)" -Sev 'Error' + } catch { + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($userobj.tenantID) -message "Failed to assign the license. Error:$($_.Exception.Message)" -Sev 'Error' $body = $results.add("Failed to assign the license. $($_.Exception.Message)") } @@ -90,37 +92,37 @@ Function Invoke-AddUser { if ($Aliases) { foreach ($Alias in $Aliases) { Write-Host $Alias - New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($GraphRequest.id)" -tenantid $Userobj.tenantid -type 'patch' -body "{`"mail`": `"$Alias`"}" -verbose + New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($GraphRequest.id)" -tenantid $UserObj.tenantID -type 'patch' -body "{`"mail`": `"$Alias`"}" -verbose } - New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($GraphRequest.id)" -tenantid $Userobj.tenantid -type 'patch' -body "{`"mail`": `"$UserprincipalName`"}" -verbose - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($userobj.tenantid) -message "Added alias $($Alias) to $($userobj.displayname)" -Sev 'Info' + New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($GraphRequest.id)" -tenantid $UserObj.tenantID -type 'patch' -body "{`"mail`": `"$UserprincipalName`"}" -verbose + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($UserObj.tenantID) -message "Added alias $($Alias) to $($UserObj.DisplayName)" -Sev 'Info' $body = $results.add("Added Aliases: $($Aliases -join ',')") } } catch { - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($userobj.tenantid) -message "Failed to create the Aliases. Error:$($_.Exception.Message)" -Sev 'Error' + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $($userobj.tenantID) -message "Failed to create the Aliases. Error:$($_.Exception.Message)" -Sev 'Error' $body = $results.add("Failed to create the Aliases: $($_.Exception.Message)") } if ($Request.body.CopyFrom -ne '') { - $CopyFrom = Set-CIPPCopyGroupMembers -ExecutingUser $request.headers.'x-ms-client-principal' -tenantid $Userobj.tenantid -CopyFromId $Request.body.CopyFrom -UserID $UserprincipalName -TenantFilter $Userobj.tenantid + $CopyFrom = Set-CIPPCopyGroupMembers -ExecutingUser $request.headers.'x-ms-client-principal' -CopyFromId $Request.body.CopyFrom -UserID $UserprincipalName -TenantFilter $UserObj.tenantID $results.Add($CopyFrom.Success -join ', ') - $results.Add($CopyFrom.Error -join ', ') + $results.Add($CopyFrom.Error -join ', ') } - + if ($Request.body.setManager) { $ManagerBody = [PSCustomObject]@{'@odata.id' = "https://graph.microsoft.com/beta/users/$($Request.body.setManager.value)" } $ManagerBodyJSON = ConvertTo-Json -Compress -Depth 10 -InputObject $ManagerBody - New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($GraphRequest.id)/manager/`$ref" -tenantid $Userobj.tenantid -type PUT -body $ManagerBodyJSON -Verbose - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $Userobj.tenantid -message "Set $($UserObj.DisplayName)'s manager to $($Request.body.setManager.label)" -Sev 'Info' + New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($GraphRequest.id)/manager/`$ref" -tenantid $UserObj.tenantID -type PUT -body $ManagerBodyJSON -Verbose + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $UserObj.tenantID -message "Set $($UserObj.DisplayName)'s manager to $($Request.body.setManager.label)" -Sev 'Info' $results.add("Success. Set $($UserObj.DisplayName)'s manager to $($Request.body.setManager.label)") } - + $copyFromResults = @{ 'Success' = $CopyFrom.Success 'Error' = $CopyFrom.Error } $body = [pscustomobject] @{ - 'Results' = @($results) + 'Results' = @($results) 'Username' = $UserprincipalName 'Password' = $password 'CopyFrom' = $copyFromResults diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Identity/Administration/Users/Invoke-EditUser.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Identity/Administration/Users/Invoke-EditUser.ps1 index 5a29285bd695..cb925b1cda70 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Identity/Administration/Users/Invoke-EditUser.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Identity/Administration/Users/Invoke-EditUser.ps1 @@ -10,9 +10,9 @@ Function Invoke-EditUser { $APIName = $TriggerMetadata.FunctionName Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' - - $userobj = $Request.body - if ($userobj.Userid -eq '') { + + $UserObj = $Request.body + if ($UserObj.UserID -eq '') { $body = @{'Results' = @('Failed to edit user. No user ID provided') } Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ StatusCode = [HttpStatusCode]::BadRequest @@ -20,9 +20,9 @@ Function Invoke-EditUser { }) return } - $Results = [System.Collections.ArrayList]@() - $licenses = ($userobj | Select-Object 'License_*').psobject.properties.value - $Aliases = if ($userobj.AddedAliases) { ($userobj.AddedAliases).Split([Environment]::NewLine) } + $Results = [System.Collections.Generic.List[string]]::new() + $licenses = ($UserObj | Select-Object 'License_*').psobject.properties.value + $Aliases = if ($UserObj.AddedAliases) { ($UserObj.AddedAliases) -split '\s' } $AddToGroups = $Request.body.AddToGroups $RemoveFromGroups = $Request.body.RemoveFromGroups @@ -31,23 +31,23 @@ Function Invoke-EditUser { #Edit the user try { Write-Host "$([boolean]$UserObj.mustchangepass)" - $Email = "$($UserObj.username)@$($UserObj.domain)" - $UserprincipalName = "$($UserObj.username)@$($UserObj.domain)" + $Email = "$($UserObj.Username)@$($UserObj.Domain)" + $UserprincipalName = "$($UserObj.Username)@$($UserObj.Domain)" $BodyToship = [pscustomobject] @{ - 'givenName' = $userobj.firstname - 'surname' = $userobj.lastname - 'city' = $userobj.city - 'country' = $userobj.country - 'department' = $userobj.department - 'displayName' = $UserObj.Displayname - 'postalCode' = $userobj.postalCode - 'companyName' = $userobj.companyName + 'givenName' = $UserObj.firstName + 'surname' = $UserObj.LastName + 'city' = $UserObj.City + 'country' = $UserObj.Country + 'department' = $UserObj.Department + 'displayName' = $UserObj.DisplayName + 'postalCode' = $UserObj.PostalCode + 'companyName' = $UserObj.CompanyName 'jobTitle' = $UserObj.JobTitle 'userPrincipalName' = $Email - 'usageLocation' = $UserObj.usageLocation - 'mobilePhone' = $userobj.mobilePhone - 'streetAddress' = $userobj.streetAddress - 'businessPhones' = @($userobj.businessPhone) + 'usageLocation' = $UserObj.usagelocation + 'mobilePhone' = $UserObj.MobilePhone + 'streetAddress' = $UserObj.streetAddress + 'businessPhones' = @($UserObj.BusinessPhone) 'passwordProfile' = @{ 'forceChangePasswordNextSignIn' = [boolean]$UserObj.mustchangepass } @@ -55,26 +55,26 @@ Function Invoke-EditUser { $NonEmptyProperties = $_.psobject.Properties | Select-Object -ExpandProperty Name $_ | Select-Object -Property $NonEmptyProperties } - if ($userobj.addedAttributes) { + if ($UserObj.addedAttributes) { Write-Host 'Found added attribute' - Write-Host "Added attributes: $($userobj.addedAttributes | ConvertTo-Json)" - $userobj.addedAttributes.getenumerator() | ForEach-Object { + Write-Host "Added attributes: $($UserObj.addedAttributes | ConvertTo-Json)" + $UserObj.addedAttributes.getenumerator() | ForEach-Object { $results.add("Edited property $($_.Key) with value $($_.Value)") $bodytoShip | Add-Member -NotePropertyName $_.Key -NotePropertyValue $_.Value -Force } } $bodyToShip = ConvertTo-Json -Depth 10 -InputObject $BodyToship -Compress - $null = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($userobj.Userid)" -tenantid $Userobj.tenantid -type PATCH -body $BodyToship -verbose + $null = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($UserObj.UserID)" -tenantid $UserObj.tenantID -type PATCH -body $BodyToship -verbose $results.add( 'Success. The user has been edited.' ) - Write-LogMessage -API $APINAME -tenant ($UserObj.tenantid) -user $request.headers.'x-ms-client-principal' -message "Edited user $($userobj.displayname) with id $($userobj.Userid)" -Sev 'Info' - if ($userobj.password) { - $passwordProfile = [pscustomobject]@{'passwordProfile' = @{ 'password' = $userobj.password; 'forceChangePasswordNextSignIn' = [boolean]$UserObj.mustchangepass } } | ConvertTo-Json - $null = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($userobj.Userid)" -tenantid $Userobj.tenantid -type PATCH -body $PasswordProfile -verbose - $results.add("Success. The password has been set to $($userobj.password)") - Write-LogMessage -API $APINAME -tenant ($UserObj.tenantid) -user $request.headers.'x-ms-client-principal' -message "Reset $($userobj.displayname)'s Password" -Sev 'Info' + Write-LogMessage -API $APINAME -tenant ($UserObj.tenantID) -user $request.headers.'x-ms-client-principal' -message "Edited user $($UserObj.DisplayName) with id $($UserObj.UserID)" -Sev 'Info' + if ($UserObj.password) { + $passwordProfile = [pscustomobject]@{'passwordProfile' = @{ 'password' = $UserObj.password; 'forceChangePasswordNextSignIn' = [boolean]$UserObj.mustchangepass } } | ConvertTo-Json + $null = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($UserObj.UserID)" -tenantid $UserObj.tenantID -type PATCH -body $PasswordProfile -verbose + $results.add("Success. The password has been set to $($UserObj.password)") + Write-LogMessage -API $APINAME -tenant ($UserObj.tenantID) -user $request.headers.'x-ms-client-principal' -message "Reset $($UserObj.DisplayName)'s Password" -Sev 'Info' } } catch { - Write-LogMessage -API $APINAME -tenant ($UserObj.tenantid) -user $request.headers.'x-ms-client-principal' -message "User edit API failed. $($_.Exception.Message)" -Sev 'Error' + Write-LogMessage -API $APINAME -tenant ($UserObj.tenantID) -user $request.headers.'x-ms-client-principal' -message "User edit API failed. $($_.Exception.Message)" -Sev 'Error' $results.add( "Failed to edit user. $($_.Exception.Message)") } @@ -82,123 +82,124 @@ Function Invoke-EditUser { #Reassign the licenses try { - if ($licenses -or $userobj.RemoveAllLicenses) { - $licenses = (($userobj | Select-Object 'License_*').psobject.properties | Where-Object { $_.value -EQ $true }).name -replace 'License_', '' - $CurrentLicenses = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/users/$($userobj.Userid)" -tenantid $Userobj.tenantid + if ($licenses -or $UserObj.RemoveAllLicenses) { + $licenses = (($UserObj | Select-Object 'License_*').psobject.properties | Where-Object { $_.value -EQ $true }).name -replace 'License_', '' + $CurrentLicenses = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/users/$($UserObj.UserID)" -tenantid $UserObj.tenantID $RemovalList = ($CurrentLicenses.assignedLicenses | Where-Object -Property skuid -NotIn $licenses).skuid $LicensesToRemove = if ($RemovalList) { ConvertTo-Json @( $RemovalList ) } else { '[]' } $liclist = foreach ($license in $Licenses) { '{"disabledPlans": [],"skuId": "' + $license + '" },' } $LicenseBody = '{"addLicenses": [' + $LicList + '], "removeLicenses": ' + $LicensesToRemove + '}' - if ($userobj.RemoveAllLicenses) { $LicenseBody = '{"addLicenses": [], "removeLicenses": ' + $LicensesToRemove + '}' } + if ($UserObj.RemoveAllLicenses) { $LicenseBody = '{"addLicenses": [], "removeLicenses": ' + $LicensesToRemove + '}' } Write-Host $LicenseBody - $null = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($userobj.Userid)/assignlicense" -tenantid $Userobj.tenantid -type POST -body $LicenseBody -verbose + $null = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($UserObj.UserID)/assignlicense" -tenantid $UserObj.tenantID -type POST -body $LicenseBody -verbose - Write-LogMessage -API $APINAME -tenant ($UserObj.tenantid) -user $request.headers.'x-ms-client-principal' -message "Changed user $($userobj.displayname) license. Sent info: $licensebody" -Sev 'Info' + Write-LogMessage -API $APINAME -tenant ($UserObj.tenantID) -user $request.headers.'x-ms-client-principal' -message "Changed user $($UserObj.DisplayName) license. Sent info: $licensebody" -Sev 'Info' $results.add( 'Success. User license has been edited.' ) } } catch { - Write-LogMessage -API $APINAME -tenant ($UserObj.tenantid) -user $request.headers.'x-ms-client-principal' -message "License assign API failed. $($_.Exception.Message)" -Sev 'Error' + Write-LogMessage -API $APINAME -tenant ($UserObj.tenantID) -user $request.headers.'x-ms-client-principal' -message "License assign API failed. $($_.Exception.Message)" -Sev 'Error' $results.add( "We've failed to assign the license. $($_.Exception.Message)") } #Add Aliases, removal currently not supported. try { if ($Aliases) { + Write-Host ($Aliases | ConvertTo-Json) foreach ($Alias in $Aliases) { - New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($userobj.Userid)" -tenantid $Userobj.tenantid -type 'patch' -body "{`"mail`": `"$Alias`"}" -verbose + New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($UserObj.UserID)" -tenantid $UserObj.tenantID -type 'patch' -body "{`"mail`": `"$Alias`"}" -verbose } - New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($userobj.Userid)" -tenantid $Userobj.tenantid -type 'patch' -body "{`"mail`": `"$UserprincipalName`"}" -verbose - Write-LogMessage -API $APINAME -tenant ($UserObj.tenantid) -user $request.headers.'x-ms-client-principal' -message "Added Aliases to $($userobj.displayname)" -Sev 'Info' - $results.add( 'Success. added aliasses to user.') + New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($UserObj.UserID)" -tenantid $UserObj.tenantID -type 'patch' -body "{`"mail`": `"$UserprincipalName`"}" -verbose + Write-LogMessage -API $APINAME -tenant ($UserObj.tenantID) -user $request.headers.'x-ms-client-principal' -message "Added Aliases to $($UserObj.DisplayName)" -Sev 'Info' + $results.add( 'Success. added aliases to user.') } } catch { - Write-LogMessage -API $APINAME -tenant ($UserObj.tenantid) -user $request.headers.'x-ms-client-principal' -message "Alias API failed. $($_.Exception.Message)" -Sev 'Error' + Write-LogMessage -API $APINAME -tenant ($UserObj.tenantID) -user $request.headers.'x-ms-client-principal' -message "Alias API failed. $($_.Exception.Message)" -Sev 'Error' $results.add( "Successfully edited user. The password is $password. We've failed to create the Aliases: $($_.Exception.Message)") } if ($Request.body.CopyFrom -ne '') { - $CopyFrom = Set-CIPPCopyGroupMembers -ExecutingUser $request.headers.'x-ms-client-principal' -tenantid $Userobj.tenantid -CopyFromId $Request.body.CopyFrom -UserID $UserprincipalName -TenantFilter $Userobj.tenantid + $CopyFrom = Set-CIPPCopyGroupMembers -ExecutingUser $request.headers.'x-ms-client-principal' -CopyFromId $Request.body.CopyFrom -UserID $UserprincipalName -TenantFilter $UserObj.tenantID $results.AddRange($CopyFrom) } if ($AddToGroups) { - $AddToGroups | ForEach-Object { + $AddToGroups | ForEach-Object { $GroupType = $_.value.groupType -join ',' $GroupID = $_.value.groupid $GroupName = $_.value.groupName Write-Host "About to add $($UserObj.userPrincipalName) to $GroupName. Group ID is: $GroupID and type is: $GroupType" - + try { if ($GroupType -eq 'Distribution list' -or $GroupType -eq 'Mail-Enabled Security') { Write-Host 'Adding to group via Add-DistributionGroupMember ' - $Params = @{ Identity = $GroupID; Member = $UserObj.Userid; BypassSecurityGroupManagerCheck = $true } - New-ExoRequest -tenantid $Userobj.tenantid -cmdlet 'Add-DistributionGroupMember' -cmdParams $params -UseSystemMailbox $true + $Params = @{ Identity = $GroupID; Member = $UserObj.UserID; BypassSecurityGroupManagerCheck = $true } + New-ExoRequest -tenantid $UserObj.tenantID -cmdlet 'Add-DistributionGroupMember' -cmdParams $params -UseSystemMailbox $true } else { - + Write-Host 'Adding to group via Graph' $UserBody = [PSCustomObject]@{ - '@odata.id' = "https://graph.microsoft.com/beta/directoryObjects/$($UserObj.Userid)" + '@odata.id' = "https://graph.microsoft.com/beta/directoryObjects/$($UserObj.UserID)" } $UserBodyJSON = ConvertTo-Json -Compress -Depth 10 -InputObject $UserBody - New-GraphPostRequest -uri "https://graph.microsoft.com/beta/groups/$GroupID/members/`$ref" -tenantid $Userobj.tenantid -type POST -body $UserBodyJSON -Verbose + New-GraphPostRequest -uri "https://graph.microsoft.com/beta/groups/$GroupID/members/`$ref" -tenantid $UserObj.tenantID -type POST -body $UserBodyJSON -Verbose } - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $Userobj.tenantid -message "Added $($UserObj.DisplayName) to $GroupName group" -Sev 'Info' + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $UserObj.tenantID -message "Added $($UserObj.DisplayName) to $GroupName group" -Sev 'Info' $null = $results.add("Success. $($UserObj.DisplayName) has been added to $GroupName") } catch { - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $Userobj.tenantid -message "Failed to add member $($UserObj.DisplayName) to $GroupName. Error:$($_.Exception.Message)" -Sev 'Error' + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $UserObj.tenantID -message "Failed to add member $($UserObj.DisplayName) to $GroupName. Error:$($_.Exception.Message)" -Sev 'Error' $null = $results.add("Failed to add member $($UserObj.DisplayName) to $GroupName : $($_.Exception.Message)") } - } + } } if ($Request.body.setManager) { $ManagerBody = [PSCustomObject]@{'@odata.id' = "https://graph.microsoft.com/beta/users/$($Request.body.setManager.value)" } $ManagerBodyJSON = ConvertTo-Json -Compress -Depth 10 -InputObject $ManagerBody - New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($userobj.Userid)/manager/`$ref" -tenantid $Userobj.tenantid -type PUT -body $ManagerBodyJSON -Verbose - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $Userobj.tenantid -message "Set $($UserObj.DisplayName)'s manager to $($Request.body.setManager.label)" -Sev 'Info' + New-GraphPostRequest -uri "https://graph.microsoft.com/beta/users/$($UserObj.UserID)/manager/`$ref" -tenantid $UserObj.tenantID -type PUT -body $ManagerBodyJSON -Verbose + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $UserObj.tenantID -message "Set $($UserObj.DisplayName)'s manager to $($Request.body.setManager.label)" -Sev 'Info' $results.add("Success. Set $($UserObj.DisplayName)'s manager to $($Request.body.setManager.label)") } - + if ($RemoveFromGroups) { - $RemoveFromGroups | ForEach-Object { + $RemoveFromGroups | ForEach-Object { $GroupType = $_.value.groupType -join ',' $GroupID = $_.value.groupid $GroupName = $_.value.groupName Write-Host "About to remove $($UserObj.userPrincipalName) from $GroupName. Group ID is: $GroupID and type is: $GroupType" - + try { if ($GroupType -eq 'Distribution list' -or $GroupType -eq 'Mail-Enabled Security') { Write-Host 'Removing From group via Remove-DistributionGroupMember ' - $Params = @{ Identity = $GroupID; Member = $UserObj.Userid; BypassSecurityGroupManagerCheck = $true } - New-ExoRequest -tenantid $Userobj.tenantid -cmdlet 'Remove-DistributionGroupMember' -cmdParams $params -UseSystemMailbox $true + $Params = @{ Identity = $GroupID; Member = $UserObj.UserID; BypassSecurityGroupManagerCheck = $true } + New-ExoRequest -tenantid $UserObj.tenantID -cmdlet 'Remove-DistributionGroupMember' -cmdParams $params -UseSystemMailbox $true } else { - + Write-Host 'Removing From group via Graph' - New-GraphPostRequest -uri "https://graph.microsoft.com/beta/groups/$GroupID/members/$($UserObj.Userid)/`$ref" -tenantid $Userobj.tenantid -type DELETE + New-GraphPostRequest -uri "https://graph.microsoft.com/beta/groups/$GroupID/members/$($UserObj.UserID)/`$ref" -tenantid $UserObj.tenantID -type DELETE } - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $Userobj.tenantid -message "Removed $($UserObj.DisplayName) from $GroupName group" -Sev 'Info' + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $UserObj.tenantID -message "Removed $($UserObj.DisplayName) from $GroupName group" -Sev 'Info' $null = $results.add("Success. $($UserObj.DisplayName) has been removed from $GroupName") } catch { - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $Userobj.tenantid -message "Failed to remove member $($UserObj.DisplayName) from $GroupName. Error:$($_.Exception.Message)" -Sev 'Error' + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $UserObj.tenantID -message "Failed to remove member $($UserObj.DisplayName) from $GroupName. Error:$($_.Exception.Message)" -Sev 'Error' $null = $results.add("Failed to remove member $($UserObj.DisplayName) from $GroupName : $($_.Exception.Message)") } - } + } } $body = @{'Results' = @($results) } diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-AddAlert.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-AddAlert.ps1 index 6cc440842493..ab279d752d81 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-AddAlert.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-AddAlert.ps1 @@ -9,96 +9,43 @@ Function Invoke-AddAlert { param($Request, $TriggerMetadata) $APIName = $TriggerMetadata.FunctionName Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' - - $Tenants = $Request.body.tenantFilter + $URL = ($request.headers.'x-ms-original-url').split('/api') | Select-Object -First 1 + $Tenants = $request.body.tenantFilter $Table = get-cipptable -TableName 'SchedulerConfig' - - $Results = foreach ($Tenant in $tenants) { + $Results = foreach ($Tenant in $Tenants) { try { - Write-Host "Working on $Tenant" - if ($tenant -ne 'AllTenants') { - $TenantID = (get-tenants | Where-Object -Property defaultDomainName -EQ $Tenant).customerId - } else { - $TenantID = 'AllTenants' - } - if ($Request.body.SetAlerts) { - $CompleteObject = @{ - tenant = $tenant - tenantid = $TenantID - AdminPassword = [bool]$Request.body.AdminPassword - DefenderMalware = [bool]$Request.body.DefenderMalware - DefenderStatus = [bool]$Request.body.DefenderStatus - MFAAdmins = [bool]$Request.body.MFAAdmins - MFAAlertUsers = [bool]$Request.body.MFAAlertUsers - NewGA = [bool]$Request.body.NewGA - NewRole = [bool]$Request.body.NewRole - QuotaUsed = [int]$Request.body.QuotaUsedQuota - UnusedLicenses = [bool]$Request.body.UnusedLicenses - OverusedLicenses = [bool]$Request.body.OverusedLicenses - AppSecretExpiry = [bool]$Request.body.AppSecretExpiry - ApnCertExpiry = [bool]$Request.body.ApnCertExpiry - VppTokenExpiry = [bool]$Request.body.VppTokenExpiry - DepTokenExpiry = [bool]$Request.body.DepTokenExpiry - NoCAConfig = [bool]$Request.body.NoCAConfig - SecDefaultsUpsell = [bool]$Request.body.SecDefaultsUpsell - SharePointQuota = [int]$Request.body.SharePointQuotaQuota - ExpiringLicenses = [bool]$Request.body.ExpiringLicenses - NewAppApproval = [bool]$Request.body.NewAppApproval - type = 'Alert' - RowKey = $TenantID - PartitionKey = 'Alert' - } - $Table = get-cipptable -TableName 'SchedulerConfig' - Add-CIPPAzDataTableEntity @Table -Entity $CompleteObject -Force - } else { - $URL = ($request.headers.'x-ms-original-url').split('/api') | Select-Object -First 1 - if ($Tenant -eq 'AllTenants') { - Get-Tenants | ForEach-Object { - $params = @{ - TenantFilter = $_.defaultDomainName - auditLogAPI = $true - operations = $Request.body.ifs.selection - BaseURL = $URL - ExecutingUser = $Request.headers.'x-ms-client-principal' - } - Push-OutputBinding -Name Subscription -Value $Params - } - $CompleteObject = @{ - tenant = 'AllTenants' - type = 'webhookcreation' - RowKey = 'AllTenantsWebhookCreation' - PartitionKey = 'webhookcreation' - } - Add-CIPPAzDataTableEntity @Table -Entity $CompleteObject -Force - } else { - $params = @{ - TenantFilter = $tenant - auditLogAPI = $true - operations = $Request.body.ifs.selection - BaseURL = $URL - ExecutingUser = $Request.headers.'x-ms-client-principal' - } - New-CIPPGraphSubscription @params - } - $CompleteObject = @{ - Tenant = [string]$tenant - if = [string](ConvertTo-Json -Depth 10 -Compress -InputObject $Request.body.ifs) - execution = [string](ConvertTo-Json -Depth 10 -Compress -InputObject $Request.body.do) - type = 'WebhookAlert' - RowKey = [string](New-Guid) - PartitionKey = 'WebhookAlert' - } - Add-CIPPAzDataTableEntity @Table -Entity $CompleteObject -Force - + Write-Host "Working on $($Tenant.value) - $($Tenant.fullValue.displayName)" + $CompleteObject = @{ + tenant = [string]$($Tenant.value) + tenantid = [string]$($Tenant.fullValue.customerId) + webhookType = [string]$request.body.logbook.value + type = 'webhookcreation' + RowKey = "$($Tenant.value)-$($request.body.logbook.value)" + PartitionKey = 'webhookcreation' + Configured = $false + CIPPURL = [string]$URL } - "Successfully added Alert for $($Tenant) to queue." - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $tenant -message "Successfully added Alert for $($Tenant) to queue." -Sev 'Info' + Add-CIPPAzDataTableEntity @Table -Entity $CompleteObject -Force + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $tenant.fullValue.defaultDomainName -message "Successfully added Audit Log Webhook for $($Tenant.fullValue.displayName) to queue." -Sev 'Info' } catch { - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $tenant -message "Failed to add Alert for for $($Tenant) to queue" -Sev 'Error' + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $tenant.fullValue.defaultDomainName -message "Failed to add Audit Log Webhook for $($Tenant.fullValue.displayName) to queue" -Sev 'Error' "Failed to add Alert for for $($Tenant) to queue $($_.Exception.message)" } } - + $Conditions = $request.body.conditions | ConvertTo-Json -Compress -Depth 10 | Out-String + $TenantsJson = $Tenants | ConvertTo-Json -Compress -Depth 10 | Out-String + $Actions = $request.body.actions | ConvertTo-Json -Compress -Depth 10 | Out-String + $CompleteObject = @{ + Tenants = [string]$TenantsJson + Conditions = [string]$Conditions + Actions = [string]$Actions + type = $request.body.logbook.value + RowKey = [string](New-Guid) + PartitionKey = 'Webhookv2' + } + $WebhookTable = get-cipptable -TableName 'WebhookRules' + Add-CIPPAzDataTableEntity @WebhookTable -Entity $CompleteObject -Force + $Results = "Added Audit Log Alert for $($Tenants.count) tenants. It may take up to four hours before Microsoft starts delivering these alerts." $body = [pscustomobject]@{'Results' = @($results) } # Associate values to output bindings by calling 'Push-OutputBinding'. @@ -107,4 +54,4 @@ Function Invoke-AddAlert { Body = $body }) -} +} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-ListAlertsQueue.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-ListAlertsQueue.ps1 new file mode 100644 index 000000000000..4cbcff576e97 --- /dev/null +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-ListAlertsQueue.ps1 @@ -0,0 +1,61 @@ +using namespace System.Net + +Function Invoke-ListAlertsQueue { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + param($Request, $TriggerMetadata) + + $APIName = $TriggerMetadata.FunctionName + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' + + + # Write to the Azure Functions log stream. + Write-Host 'PowerShell HTTP trigger function processed a request.' + $WebhookTable = Get-CIPPTable -TableName 'WebhookRules' + $WebhookRules = Get-CIPPAzDataTableEntity @WebhookTable + + $ScheduledTasks = Get-CIPPTable -TableName 'ScheduledTasks' + $ScheduledTasks = Get-CIPPAzDataTableEntity @ScheduledTasks | Where-Object { $_.hidden -eq $true } + + $AllTasksArrayList = [system.collections.generic.list[object]]::new() + + foreach ($Task in $WebhookRules) { + $Conditions = $Task.Conditions | ConvertFrom-Json -ErrorAction SilentlyContinue + $TranslatedConditions = ($Conditions | ForEach-Object { "When $($_.Property.label) is $($_.Operator.label) $($_.input.value)" }) -join ' and ' + $TranslatedActions = ($Task.Actions | ConvertFrom-Json -ErrorAction SilentlyContinue).label -join ',' + $TaskEntry = [PSCustomObject]@{ + Tenants = ($Task.Tenants | ConvertFrom-Json -ErrorAction SilentlyContinue).fullValue.defaultDomainName -join ',' + Conditions = $TranslatedConditions + Actions = $TranslatedActions + LogType = $Task.type + EventType = 'Audit log Alert' + RowKey = $Task.RowKey + PartitionKey = $Task.PartitionKey + RepeatsEvery = 'When received' + } + $AllTasksArrayList.Add($TaskEntry) + } + + foreach ($Task in $ScheduledTasks) { + $TaskEntry = [PSCustomObject]@{ + RowKey = $Task.RowKey + PartitionKey = $Task.PartitionKey + Tenants = $Task.Tenant + Conditions = $Task.Name + Actions = $Task.PostExecution + LogType = 'Scripted' + EventType = 'Scheduled Task' + RepeatsEvery = $Task.Recurrence + } + $AllTasksArrayList.Add($TaskEntry) + } + # Associate values to output bindings by calling 'Push-OutputBinding'. + Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ + StatusCode = [HttpStatusCode]::OK + Body = @($AllTasksArrayList) + }) + +} diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-PublicWebhooks.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-PublicWebhooks.ps1 index e81e26af2191..a65084e28bdc 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-PublicWebhooks.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-PublicWebhooks.ps1 @@ -11,7 +11,6 @@ function Invoke-PublicWebhooks { $WebhookIncoming = Get-CIPPTable -TableName WebhookIncoming $Webhooks = Get-CIPPAzDataTableEntity @WebhookTable Write-Host 'Received request' - Write-Host "CIPPID: $($request.Query.CIPPID)" $url = ($request.headers.'x-ms-original-url').split('/API') | Select-Object -First 1 Write-Host $url if ($Webhooks.Resource -eq 'M365AuditLogs') { @@ -33,12 +32,7 @@ function Invoke-PublicWebhooks { $StatusCode = [HttpStatusCode]::OK } elseif ($Request.Query.CIPPID -in $Webhooks.RowKey) { Write-Host 'Found matching CIPPID' - - Write-Host 'Received request' - Write-Host "CIPPID: $($request.Query.CIPPID)" $url = ($request.headers.'x-ms-original-url').split('/API') | Select-Object -First 1 - Write-Host $url - $Webhookinfo = $Webhooks | Where-Object -Property RowKey -EQ $Request.query.CIPPID if ($Request.Query.Type -eq 'GraphSubscription') { @@ -70,72 +64,165 @@ function Invoke-PublicWebhooks { } Add-CIPPAzDataTableEntity @WebhookIncoming -Entity $Entity } else { - # Auditlog Subscriptions - try { - foreach ($ReceivedItem In ($Request.body)) { - $ReceivedItem = [pscustomobject]$ReceivedItem - Write-Host "Received Item: $($ReceivedItem | ConvertTo-Json -Depth 15 -Compress))" - $TenantFilter = (Get-Tenants | Where-Object -Property customerId -EQ $ReceivedItem.TenantId).defaultDomainName - Write-Host "Webhook TenantFilter: $TenantFilter" - $ConfigTable = get-cipptable -TableName 'SchedulerConfig' - $Alertconfig = Get-CIPPAzDataTableEntity @ConfigTable | Where-Object { $_.Tenant -eq $TenantFilter -or $_.Tenant -eq 'AllTenants' } - $Operations = @(($AlertConfig.if | ConvertFrom-Json -ErrorAction SilentlyContinue).selection) + 'UserLoggedIn' - $Webhookinfo = $Webhooks | Where-Object -Property RowKey -EQ $Request.query.CIPPID - #Increased download efficiency: only download the data we need for processing. Todo: Change this to load from table or dynamic source. - $MappingTable = [pscustomobject]@{ - 'UserLoggedIn' = 'Audit.AzureActiveDirectory' - 'Add member to role.' = 'Audit.AzureActiveDirectory' - 'Disable account.' = 'Audit.AzureActiveDirectory' - 'Update StsRefreshTokenValidFrom Timestamp.' = 'Audit.AzureActiveDirectory' - 'Enable account.' = 'Audit.AzureActiveDirectory' - 'Disable Strong Authentication.' = 'Audit.AzureActiveDirectory' - 'Reset user password.' = 'Audit.AzureActiveDirectory' - 'Add service principal.' = 'Audit.AzureActiveDirectory' - 'HostedIP' = 'Audit.AzureActiveDirectory' - 'badRepIP' = 'Audit.AzureActiveDirectory' - 'UserLoggedInFromUnknownLocation' = 'Audit.AzureActiveDirectory' - 'customfield' = 'AnyLog' - 'anyAlert' = 'AnyLog' - 'New-InboxRule' = 'Audit.Exchange' - 'Set-InboxRule' = 'Audit.Exchange' - } - #Compare $Operations to $MappingTable. If there is a match, we make a new variable called $LogsToDownload - #Example: $Operations = 'UserLoggedIn', 'Set-InboxRule' makes : $LogsToDownload = @('Audit.AzureActiveDirectory',Audit.Exchange) - $LogsToDownload = $Operations | Where-Object { $MappingTable.$_ } | ForEach-Object { $MappingTable.$_ } - Write-Host "Our operations: $Operations" - Write-Host "Logs to download: $LogsToDownload" - if ($ReceivedItem.ContentType -in $LogsToDownload -or 'AnyLog' -in $LogsToDownload) { - if ($ReceivedItem.ContentType -eq 'Audit.SharePoint') { continue } - $Data = New-GraphPostRequest -type GET -uri "https://manage.office.com/api/v1.0/$($ReceivedItem.tenantId)/activity/feed/audit/$($ReceivedItem.contentid)" -tenantid $TenantFilter -scope 'https://manage.office.com/.default' - } else { - Write-Host "No data to download for $($ReceivedItem.ContentType)" - continue - } - Write-Host "Data found: $($data.count) items" - $DataToProcess = if ('anylog' -NotIn $LogsToDownload) { $Data | Where-Object -Property Operation -In $Operations } else { $Data } - Write-Host "Data to process found: $($DataToProcess.count) items" - foreach ($Item in $DataToProcess) { - Write-Host "Processing $($item.operation)" + if ($request.headers.'x-ms-original-url' -notlike '*version=2*') { + return "Not replying to this webhook or processing it, as it's not a version 2 webhook." + } else { + try { + foreach ($ReceivedItem In $Request.body) { + $ReceivedItem = [pscustomobject]$ReceivedItem + $TenantFilter = (Get-Tenants | Where-Object -Property customerId -EQ $ReceivedItem.TenantId).defaultDomainName + Write-Host "Webhook TenantFilter: $TenantFilter" + $ConfigTable = get-cipptable -TableName 'WebhookRules' + $Configuration = (Get-CIPPAzDataTableEntity @ConfigTable) | Where-Object { $_.Tenants -match $TenantFilter -or $_.Tenants -match 'AllTenants' } | ForEach-Object { + [pscustomobject]@{ + Tenants = ($_.Tenants | ConvertFrom-Json).fullValue + Conditions = $_.Conditions + Actions = $_.Actions + LogType = $_.Type + } + } + if (!$Configuration.Tenants) { + Write-Host 'No tenants found for this webhook, probably an old entry. Skipping.' + continue + } + Write-Host "Webhook: The received content-type for $($TenantFilter) is $($ReceivedItem.ContentType)" + if ($ReceivedItem.ContentType -in $Configuration.LogType) { + $Data = New-GraphPostRequest -type GET -uri "https://manage.office.com/api/v1.0/$($ReceivedItem.tenantId)/activity/feed/audit/$($ReceivedItem.contentid)" -tenantid $TenantFilter -scope 'https://manage.office.com/.default' + } else { + Write-Host "No data to download for $($ReceivedItem.ContentType)" + continue + } + - ## Push webhook data to table - $Entity = [PSCustomObject]@{ - PartitionKey = 'Webhook' - RowKey = [string](New-Guid).Guid - Type = 'AuditLog' - Data = [string]($Item | ConvertTo-Json -Depth 10) - CIPPURL = $CIPPURL - TenantFilter = $TenantFilter - FunctionName = 'PublicWebhookProcess' + $PreProccessedData = $Data | Select-Object *, CIPPAction, CIPPClause, CIPPGeoLocation, CIPPBadRepIP, CIPPHostedIP, CIPPIPDetected, CIPPLocationInfo, CIPPExtendedProperties, CIPPDeviceProperties, CIPPParameters, CIPPModifiedProperties -ErrorAction SilentlyContinue + $LocationTable = Get-CIPPTable -TableName 'knownlocationdb' + $ProcessedData = foreach ($Data in $PreProccessedData) { + if ($Data.ExtendedProperties) { + $Data.CIPPExtendedProperties = ($Data.ExtendedProperties | ConvertTo-Json) + $Data.ExtendedProperties | ForEach-Object { $data | Add-Member -NotePropertyName $_.Name -NotePropertyValue $_.Value -Force -ErrorAction SilentlyContinue } + } + if ($Data.DeviceProperties) { + $Data.CIPPDeviceProperties = ($Data.DeviceProperties | ConvertTo-Json) + $Data.DeviceProperties | ForEach-Object { $data | Add-Member -NotePropertyName $_.Name -NotePropertyValue $_.Value -Force -ErrorAction SilentlyContinue } + } + if ($Data.parameters) { + $Data.CIPPParameters = ($Data.parameters | ConvertTo-Json) + $Data.parameters | ForEach-Object { $data | Add-Member -NotePropertyName $_.Name -NotePropertyValue $_.Value -Force -ErrorAction SilentlyContinue } + } + if ($Data.ModifiedProperties) { + $Data.CIPPModifiedProperties = ($Data.ModifiedProperties | ConvertTo-Json) + $Data.ModifiedProperties | ForEach-Object { $data | Add-Member -NotePropertyName "$($_.Name)" -NotePropertyValue "$($_.NewValue)" -Force -ErrorAction SilentlyContinue } + } + if ($Data.ModifiedProperties) { $Data.ModifiedProperties | ForEach-Object { $data | Add-Member -NotePropertyName $("Previous_Value_$($_.Name)") -NotePropertyValue "$($_.OldValue)" -Force -ErrorAction SilentlyContinue } } + + if ($data.clientip) { + if ($data.clientip -match '^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}:\d+$') { + $data.clientip = $data.clientip -replace ':\d+$', '' # Remove the port number if present + } + $Location = Get-CIPPAzDataTableEntity @LocationTable -Filter "RowKey eq '$($data.clientIp)'" | Select-Object -Last 1 + if ($Location) { + Write-Host 'Webhook: Got IP from cache' + $Country = $Location.CountryOrRegion + $City = $Location.City + $Proxy = $Location.Proxy + $hosting = $Location.Hosting + $ASName = $Location.ASName + } else { + Write-Host 'Webhook: We have to do a lookup' + $Location = Get-CIPPGeoIPLocation -IP $data.clientip + $Country = if ($Location.CountryCode) { $Location.CountryCode } else { 'Unknown' } + $City = if ($Location.City) { $Location.City } else { 'Unknown' } + $Proxy = if ($Location.Proxy -ne $null) { $Location.Proxy } else { 'Unknown' } + $hosting = if ($Location.Hosting -ne $null) { $Location.Hosting } else { 'Unknown' } + $ASName = if ($Location.ASName) { $Location.ASName } else { 'Unknown' } + $IP = $data.ClientIP + $LocationInfo = @{ + RowKey = [string]$data.clientip + PartitionKey = [string]$data.id + Tenant = [string]$TenantFilter + CountryOrRegion = "$Country" + City = "$City" + Proxy = "$Proxy" + Hosting = "$hosting" + ASName = "$ASName" + } + try { + $null = Add-CIPPAzDataTableEntity @LocationTable -Entity $LocationInfo -Force + } catch { + Write-Host "Webhook: Failed to add location info for $($data.clientip) to cache: $($_.Exception.Message)" + + } + } + $Data.CIPPGeoLocation = $Country + $Data.CIPPBadRepIP = $Proxy + $Data.CIPPHostedIP = $hosting + $Data.CIPPIPDetected = $IP + $Data.CIPPLocationInfo = ($Location | ConvertTo-Json) + } + $Data | Select-Object * -ExcludeProperty ExtendedProperties, DeviceProperties, parameters + } + + #Filter data based on conditions. + $Where = $Configuration | ForEach-Object { + $conditions = $_.Conditions | ConvertFrom-Json | Where-Object { $_.Input.value -ne '' } + $actions = $_.Actions + $conditionStrings = foreach ($condition in $conditions) { + $value = if ($condition.Input.value -is [array]) { + $arrayAsString = $condition.Input.value | ForEach-Object { + "'$_'" + } + "@($($arrayAsString -join ', '))" + } else { "'$($condition.Input.value)'" } + "`$(`$_.$($condition.Property.label)) -$($condition.Operator.value) $value" + } + if ($conditionStrings.Count -gt 1) { + $finalCondition = $conditionStrings -join ' -AND ' + } else { + $finalCondition = $conditionStrings + } + [PSCustomObject]@{ + clause = $finalCondition + expectedAction = $actions + } + + } + Write-Host "Webhook: The list of operations in the data are $($ProcessedData.operation -join ', ')" + + $DataToProcess = foreach ($clause in $Where) { + Write-Host "Webhook: Processing clause: $($clause.clause)" + Write-Host "Webhook: If this clause would be true, the action would be: $($clause.expectedAction)" + $ReturnedData = $ProcessedData | Where-Object { Invoke-Expression $clause.clause } + if ($ReturnedData) { + $ReturnedData = foreach ($item in $ReturnedData) { + $item.CIPPAction = $clause.expectedAction + $item.CIPPClause = ($clause.clause | ForEach-Object { "When $($_.Property.label) is $($_.Operator.label) $($_.input.value)" }) -join ' and ' + $item + } + } + $ReturnedData + } + + Write-Host "Webhook: Data to process found: $($DataToProcess.count) items" + foreach ($Item in $DataToProcess) { + Write-Host "Processing $($item.operation)" + ## Push webhook data to table + $Entity = [PSCustomObject]@{ + PartitionKey = 'Webhook' + RowKey = [string]$item.id + Type = 'AuditLog' + Data = [string]($Item | ConvertTo-Json -Depth 10) + CIPPURL = $CIPPURL + TenantFilter = $TenantFilter + FunctionName = 'PublicWebhookProcess' + } + Add-CIPPAzDataTableEntity @WebhookIncoming -Entity $Entity -Force } - Add-CIPPAzDataTableEntity @WebhookIncoming -Entity $Entity -Force - #Invoke-CippWebhookProcessing -TenantFilter $TenantFilter -Data $Item -CIPPPURL $url } + } catch { + Write-Host "Webhook Failed: $($_.Exception.Message). Line number $($_.InvocationInfo.ScriptLineNumber)" } - } catch { - Write-Host "Webhook Failed: $($_.Exception.Message). Line number $($_.InvocationInfo.ScriptLineNumber)" } } - $Body = 'Webhook Recieved' $StatusCode = [HttpStatusCode]::OK diff --git a/Modules/CIPPCore/Public/Invoke-RemoveQueuedAlert.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-RemoveQueuedAlert.ps1 similarity index 84% rename from Modules/CIPPCore/Public/Invoke-RemoveQueuedAlert.ps1 rename to Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-RemoveQueuedAlert.ps1 index d69ed68c84e0..7552c2afe222 100644 --- a/Modules/CIPPCore/Public/Invoke-RemoveQueuedAlert.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Alerts/Invoke-RemoveQueuedAlert.ps1 @@ -10,13 +10,21 @@ Function Invoke-RemoveQueuedAlert { $APIName = $TriggerMetadata.FunctionName Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' - $Table = Get-CIPPTable -TableName 'SchedulerConfig' + + if ($Request.query.EventType -eq 'Audit log Alert') { + $Table = 'WebhookRules' + } else { + $Table = 'ScheduledTasks' + } + + $Table = Get-CIPPTable -TableName $Table $ID = $request.query.id try { - $Filter = "RowKey eq '{0}' and PartitionKey eq 'Alert'" -f $ID + $Filter = "RowKey eq '{0}'" -f $ID $Alert = Get-CIPPAzDataTableEntity @Table -Filter $Filter -Property PartitionKey, RowKey Remove-AzDataTableEntity @Table -Entity $Alert Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message "Removed application queue for $ID." -Sev 'Info' + $body = [pscustomobject]@{'Results' = 'Successfully removed from queue.' } } catch { Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message "Failed to remove from queue $ID. $($_.Exception.Message)" -Sev 'Error' diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Invoke-ExecOnboardTenant.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Invoke-ExecOnboardTenant.ps1 index 2048509e85d1..84492fe68a70 100644 --- a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Invoke-ExecOnboardTenant.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Invoke-ExecOnboardTenant.ps1 @@ -13,73 +13,86 @@ function Invoke-ExecOnboardTenant { if ($Id) { try { $OnboardTable = Get-CIPPTable -TableName 'TenantOnboarding' - $TenantOnboarding = Get-CIPPAzDataTableEntity @OnboardTable -Filter "RowKey eq '$Id'" - if (!$TenantOnboarding -or [bool]$Request.Query.Retry) { - $OnboardingSteps = [PSCustomObject]@{ - 'Step1' = @{ - 'Status' = 'pending' - 'Title' = 'Step 1: GDAP Invite' - 'Message' = 'Waiting for onboarding job to start' - } - 'Step2' = @{ - 'Status' = 'pending' - 'Title' = 'Step 2: GDAP Role Test' - 'Message' = 'Waiting for Step 1' - } - 'Step3' = @{ - 'Status' = 'pending' - 'Title' = 'Step 3: GDAP Group Mapping' - 'Message' = 'Waiting for Step 2' + if ($Request.Query.Cancel -eq $true) { + $TenantOnboarding = Get-CIPPAzDataTableEntity @OnboardTable -Filter "RowKey eq '$Id'" + if ($TenantOnboarding) { + Remove-AzDataTableEntity @OnboardTable -Entity $TenantOnboarding + $Results = @{'Results' = 'Onboarding job canceled' } + $StatusCode = [HttpStatusCode]::OK + } else { + $Results = 'Onboarding job not found' + $StatusCode = [HttpStatusCode]::NotFound + } + } else { + $TenMinutesAgo = (Get-Date).AddMinutes(-10).ToString('yyyy-MM-ddTHH:mm:ssZ') + $TenantOnboarding = Get-CIPPAzDataTableEntity @OnboardTable -Filter "RowKey eq '$Id' and Timestamp ge datetime'$TenMinutesAgo'" + if (!$TenantOnboarding -or [bool]$Request.Query.Retry) { + $OnboardingSteps = [PSCustomObject]@{ + 'Step1' = @{ + 'Status' = 'pending' + 'Title' = 'Step 1: GDAP Invite' + 'Message' = 'Waiting for onboarding job to start' + } + 'Step2' = @{ + 'Status' = 'pending' + 'Title' = 'Step 2: GDAP Role Test' + 'Message' = 'Waiting for Step 1' + } + 'Step3' = @{ + 'Status' = 'pending' + 'Title' = 'Step 3: GDAP Group Mapping' + 'Message' = 'Waiting for Step 2' + } + 'Step4' = @{ + 'Status' = 'pending' + 'Title' = 'Step 4: CPV Refresh' + 'Message' = 'Waiting for Step 3' + } + 'Step5' = @{ + 'Status' = 'pending' + 'Title' = 'Step 5: Graph API Test' + 'Message' = 'Waiting for Step 4' + } } - 'Step4' = @{ - 'Status' = 'pending' - 'Title' = 'Step 4: CPV Refresh' - 'Message' = 'Waiting for Step 3' + $TenantOnboarding = [PSCustomObject]@{ + PartitionKey = 'Onboarding' + RowKey = [string]$Id + CustomerId = '' + Status = 'queued' + OnboardingSteps = [string](ConvertTo-Json -InputObject $OnboardingSteps -Compress) + Relationship = '' + Logs = '' + Exception = '' } - 'Step5' = @{ - 'Status' = 'pending' - 'Title' = 'Step 5: Graph API Test' - 'Message' = 'Waiting for Step 4' + Add-CIPPAzDataTableEntity @OnboardTable -Entity $TenantOnboarding -Force -ErrorAction Stop + + $Item = [pscustomobject]@{ + FunctionName = 'ExecOnboardTenantQueue' + id = $Id + Roles = $Request.Body.gdapRoles + AddMissingGroups = $Request.Body.addMissingGroups + AutoMapRoles = $Request.Body.autoMapRoles + StandardsExcludeAllTenants = $Request.Body.standardsExcludeAllTenants } - } - $TenantOnboarding = [PSCustomObject]@{ - PartitionKey = 'Onboarding' - RowKey = [string]$Id - CustomerId = '' - Status = 'queued' - OnboardingSteps = [string](ConvertTo-Json -InputObject $OnboardingSteps -Compress) - Relationship = '' - Logs = '' - Exception = '' - } - Add-CIPPAzDataTableEntity @OnboardTable -Entity $TenantOnboarding -Force -ErrorAction Stop - $Item = [pscustomobject]@{ - FunctionName = 'ExecOnboardTenantQueue' - id = $Id - Roles = $Request.Body.gdapRoles - AddMissingGroups = $Request.Body.addMissingGroups - AutoMapRoles = $Request.Body.autoMapRoles + $InputObject = @{ + OrchestratorName = 'OnboardingOrchestrator' + Batch = @($Item) + } + $InstanceId = Start-NewOrchestration -FunctionName 'CIPPOrchestrator' -InputObject ($InputObject | ConvertTo-Json -Depth 5 -Compress) } - $InputObject = @{ - OrchestratorName = 'OnboardingOrchestrator' - Batch = @($Item) - } - $InstanceId = Start-NewOrchestration -FunctionName 'CIPPOrchestrator' -InputObject ($InputObject | ConvertTo-Json -Depth 5 -Compress) + $Steps = $TenantOnboarding.OnboardingSteps | ConvertFrom-Json + $OnboardingSteps = foreach ($Step in $Steps.PSObject.Properties.Name) { $Steps.$Step } + $Relationship = try { $TenantOnboarding.Relationship | ConvertFrom-Json -ErrorAction Stop } catch { @{} } + $Logs = try { $TenantOnboarding.Logs | ConvertFrom-Json -ErrorAction Stop } catch { @{} } + $TenantOnboarding.OnboardingSteps = $OnboardingSteps + $TenantOnboarding.Relationship = $Relationship + $TenantOnboarding.Logs = $Logs + $Results = $TenantOnboarding + $StatusCode = [HttpStatusCode]::OK } - - $Steps = $TenantOnboarding.OnboardingSteps | ConvertFrom-Json - $OnboardingSteps = foreach ($Step in $Steps.PSObject.Properties.Name) { $Steps.$Step } - $Relationship = try { $TenantOnboarding.Relationship | ConvertFrom-Json -ErrorAction Stop } catch { @{} } - $Logs = try { $TenantOnboarding.Logs | ConvertFrom-Json -ErrorAction Stop } catch { @{} } - $TenantOnboarding.OnboardingSteps = $OnboardingSteps - $TenantOnboarding.Relationship = $Relationship - $TenantOnboarding.Logs = $Logs - $Results = $TenantOnboarding - - $StatusCode = [HttpStatusCode]::OK } catch { $ErrorMsg = Get-NormalizedError -message $($_.Exception.Message) $Results = "Function Error: $($_.InvocationInfo.ScriptLineNumber) - $ErrorMsg" diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Invoke-ListTenantOnboarding.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Invoke-ListTenantOnboarding.ps1 new file mode 100644 index 000000000000..c3fbd33947af --- /dev/null +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/Administration/Invoke-ListTenantOnboarding.ps1 @@ -0,0 +1,30 @@ +function Invoke-ListTenantOnboarding { + Param( + $Request, + $TriggerMetadata + ) + try { + $OnboardTable = Get-CIPPTable -TableName 'TenantOnboarding' + $TenantOnboardings = Get-CIPPAzDataTableEntity @OnboardTable + $Results = foreach ($TenantOnboarding in $TenantOnboardings) { + $Steps = $TenantOnboarding.OnboardingSteps | ConvertFrom-Json + $OnboardingSteps = foreach ($Step in $Steps.PSObject.Properties.Name) { $Steps.$Step } + $Relationship = try { $TenantOnboarding.Relationship | ConvertFrom-Json -ErrorAction Stop } catch { @{} } + $Logs = try { $TenantOnboarding.Logs | ConvertFrom-Json -ErrorAction Stop } catch { @{} } + $TenantOnboarding.OnboardingSteps = $OnboardingSteps + $TenantOnboarding.Relationship = $Relationship + $TenantOnboarding.Logs = $Logs + $TenantOnboarding + } + $StatusCode = [HttpStatusCode]::OK + } catch { + $ErrorMsg = Get-NormalizedError -message $($_.Exception.Message) + $Results = "Function Error: $($_.InvocationInfo.ScriptLineNumber) - $ErrorMsg" + $StatusCode = [HttpStatusCode]::BadRequest + } + # Associate values to output bindings by calling 'Push-OutputBinding'. + Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ + StatusCode = $StatusCode + Body = $Results + }) +} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/GDAP/Invoke-ExecGDAPRemoveGArole.ps1 b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/GDAP/Invoke-ExecGDAPRemoveGArole.ps1 new file mode 100644 index 000000000000..319118877545 --- /dev/null +++ b/Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/GDAP/Invoke-ExecGDAPRemoveGArole.ps1 @@ -0,0 +1,53 @@ +using namespace System.Net +Function Invoke-ExecGDAPRemoveGArole { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + param($Request, $TriggerMetadata) + + $APIName = $TriggerMetadata.FunctionName + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' + + $GDAPID = $request.query.GDAPId + + try { + $CheckActive = New-GraphGetRequest -NoAuthCheck $True -uri "https://graph.microsoft.com/beta/tenantRelationships/delegatedAdminRelationships/$($GDAPID)" -tenantid $env:TenantID + if ($CheckActive.status -eq 'active' -AND '62e90394-69f5-4237-9190-012177145e10' -in $CheckActive.accessDetails.unifiedRoles.roleDefinitionId) { + $AddedHeader = @{'If-Match' = $CheckActive.'@odata.etag' } + + $RawJSON = [pscustomobject]@{ + accessDetails = [pscustomobject]@{ + unifiedRoles = @( + ($CheckActive.accessDetails.unifiedRoles | Where-Object { $_.roleDefinitionId -ne '62e90394-69f5-4237-9190-012177145e10' }) + ) + } + } | ConvertTo-Json -Depth 3 + + New-GraphPOSTRequest -NoAuthCheck $True -uri "https://graph.microsoft.com/beta/tenantRelationships/delegatedAdminRelationships/$($GDAPID)" -tenantid $env:TenantID -type PATCH -body $RawJSON -AddedHeaders $AddedHeader + + $Message = "Removed Global Administrator from $($GDAPID)" + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message $Message -Sev 'Info' + } else { + if ($CheckActive.status -ne 'active') { + $Message = "Relationship status is currently $($CheckActive.status), it is not possible to remove the Global Administrator role in this state." + } + if ('62e90394-69f5-4237-9190-012177145e10' -notin $CheckActive.accessDetails.unifiedRoles.roleDefinitionId) { + $Message = "This relationship does not contain the Global Administrator role." + } + } + } catch { + $Message = "Unexpected error patching GDAP relationship: $($_.Exception.Message)" + Write-Host "GDAP ERROR: $($_.Exception.Message)" + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -tenant $env:TenantID -message "$($Message): $($_.Exception.Message)" -Sev 'Error' + } + + $body = @{ + Message = $Message + } + Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ + StatusCode = [HttpStatusCode]::OK + Body = $body + }) +} diff --git a/Modules/CIPPCore/Public/Entrypoints/Invoke-AddTenantAllowBlockList.ps1 b/Modules/CIPPCore/Public/Entrypoints/Invoke-AddTenantAllowBlockList.ps1 new file mode 100644 index 000000000000..c94b9ecf1ea2 --- /dev/null +++ b/Modules/CIPPCore/Public/Entrypoints/Invoke-AddTenantAllowBlockList.ps1 @@ -0,0 +1,52 @@ +using namespace System.Net + +Function Invoke-AddTenantAllowBlockList { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + param($Request, $TriggerMetadata) + + $APIName = $TriggerMetadata.FunctionName + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APIName -message 'Accessed this API' -Sev 'Debug' + + $blocklistobj = $Request.body + + # Write to the Azure Functions log stream. + Write-Host 'PowerShell HTTP trigger function processed a request.' + try { + $ExoRequest = @{ + tenantid = $Request.body.tenantid + cmdlet = 'New-TenantAllowBlockListItems' + cmdParams = @{ + Entries = [string[]]$blocklistobj.entries + ListType = [string]$blocklistobj.listType + Notes = [string]$blocklistobj.notes + $blocklistobj.listMethod = [bool]$true + } + } + + if ($blocklistobj.NoExpiration -eq $true) { + $ExoRequest.cmdParams.NoExpiration = $true + } + + New-ExoRequest @ExoRequest + + $result = "Successfully added $($blocklistobj.Entries) as type $($blocklistobj.ListType) to the $($blocklistobj.listMethod) list" + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APIName -tenant $Request.body.tenantid -message $result -Sev 'Info' + } catch { + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + $result = "Failed to create blocklist. Error: $ErrorMessage" + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APIName -tenant $Request.body.tenantid -message $result -Sev 'Error' + } + + # Associate values to output bindings by calling 'Push-OutputBinding'. + Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ + StatusCode = [HttpStatusCode]::OK + Body = @{ + 'Results' = $result + 'Request' = $ExoRequest + } + }) +} diff --git a/Modules/CIPPCore/Public/Entrypoints/Invoke-ListAlertsQueue.ps1 b/Modules/CIPPCore/Public/Entrypoints/Invoke-ListAlertsQueue.ps1 deleted file mode 100644 index cb26d77ec876..000000000000 --- a/Modules/CIPPCore/Public/Entrypoints/Invoke-ListAlertsQueue.ps1 +++ /dev/null @@ -1,56 +0,0 @@ -using namespace System.Net - -Function Invoke-ListAlertsQueue { - <# - .FUNCTIONALITY - Entrypoint - #> - [CmdletBinding()] - param($Request, $TriggerMetadata) - - $APIName = $TriggerMetadata.FunctionName - Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' - - - # Write to the Azure Functions log stream. - Write-Host 'PowerShell HTTP trigger function processed a request.' - $Table = Get-CIPPTable -TableName 'SchedulerConfig' - $Filter = "PartitionKey eq 'Alert'" - $QueuedApps = Get-CIPPAzDataTableEntity @Table -Filter $Filter - - $CurrentStandards = foreach ($QueueFile in $QueuedApps) { - [PSCustomObject]@{ - tenantName = $QueueFile.tenant - AdminPassword = [bool]$QueueFile.AdminPassword - DefenderMalware = [bool]$QueueFile.DefenderMalware - DefenderStatus = [bool]$QueueFile.DefenderStatus - MFAAdmins = [bool]$QueueFile.MFAAdmins - MFAAlertUsers = [bool]$QueueFile.MFAAlertUsers - NewGA = [bool]$QueueFile.NewGA - NewRole = [bool]$QueueFile.NewRole - QuotaUsed = [bool]$QueueFile.QuotaUsed - UnusedLicenses = [bool]$QueueFile.UnusedLicenses - OverusedLicenses = [bool]$QueueFile.OverusedLicenses - AppSecretExpiry = [bool]$QueueFile.AppSecretExpiry - ApnCertExpiry = [bool]$QueueFile.ApnCertExpiry - VppTokenExpiry = [bool]$QueueFile.VppTokenExpiry - DepTokenExpiry = [bool]$QueueFile.DepTokenExpiry - NoCAConfig = [bool]$QueueFile.NoCAConfig - SecDefaultsUpsell = [bool]$QueueFile.SecDefaultsUpsell - SharePointQuota = [bool]$QueueFile.SharePointQuota - ExpiringLicenses = [bool]$QueueFile.ExpiringLicenses - NewAppApproval = [bool]$QueueFile.NewAppApproval - SharePointQuotaQuota = [int]$QueueFile.SharePointQuota - QuotaUsedQuota = [int]$QueueFile.QuotaUsed - tenantId = $QueueFile.tenantid - } - } - - - # Associate values to output bindings by calling 'Push-OutputBinding'. - Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ - StatusCode = [HttpStatusCode]::OK - Body = @($CurrentStandards) - }) - -} diff --git a/Modules/CIPPCore/Public/Entrypoints/Invoke-ListStandards.ps1 b/Modules/CIPPCore/Public/Entrypoints/Invoke-ListStandards.ps1 index 9f5df838f246..ef3e205c8467 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Invoke-ListStandards.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/Invoke-ListStandards.ps1 @@ -12,7 +12,13 @@ Function Invoke-ListStandards { Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' if ($Request.Query.ShowConsolidated -eq $true) { - $CurrentStandards = @(Get-CIPPStandards -TenantFilter $Request.Query.TenantFilter) + $StandardQuery = @{ + TenantFilter = $Request.Query.TenantFilter + } + if ($Request.Query.TenantFilter -eq 'AllTenants') { + $StandardQuery.ListAllTenants = $true + } + $CurrentStandards = @(Get-CIPPStandards @StandardQuery) } else { $Table = Get-CippTable -tablename 'standards' $Filter = "PartitionKey eq 'standards'" diff --git a/Modules/CIPPCore/Public/Entrypoints/Invoke-ListTenantAllowBlockList.ps1 b/Modules/CIPPCore/Public/Entrypoints/Invoke-ListTenantAllowBlockList.ps1 index 2c4951898ad9..ed51de874171 100644 --- a/Modules/CIPPCore/Public/Entrypoints/Invoke-ListTenantAllowBlockList.ps1 +++ b/Modules/CIPPCore/Public/Entrypoints/Invoke-ListTenantAllowBlockList.ps1 @@ -11,7 +11,6 @@ Function Invoke-ListTenantAllowBlockList { $APIName = $TriggerMetadata.FunctionName Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Accessed this API' -Sev 'Debug' - # Write to the Azure Functions log stream. Write-Host 'PowerShell HTTP trigger function processed a request.' @@ -19,7 +18,7 @@ Function Invoke-ListTenantAllowBlockList { $TenantFilter = $Request.Query.TenantFilter $ListTypes = 'Sender','Url','FileHash' try { - $Request = ForEach ($_ in $ListTypes) { + $cmdletArray = $ListTypes | ForEach-Object { @{ CmdletInput = @{ CmdletName = 'Get-TenantAllowBlockListItems' @@ -27,7 +26,7 @@ Function Invoke-ListTenantAllowBlockList { } } } - $BatchResults = New-ExoBulkRequest -tenantid $TenantFilter -cmdletArray $Request + $BatchResults = New-ExoBulkRequest -tenantid $TenantFilter -cmdletArray $cmdletArray $StatusCode = [HttpStatusCode]::OK } catch { diff --git a/Modules/CIPPCore/Public/Entrypoints/Invoke-RemoveTenantAllowBlockList.ps1 b/Modules/CIPPCore/Public/Entrypoints/Invoke-RemoveTenantAllowBlockList.ps1 new file mode 100644 index 000000000000..d9f99772b4d8 --- /dev/null +++ b/Modules/CIPPCore/Public/Entrypoints/Invoke-RemoveTenantAllowBlockList.ps1 @@ -0,0 +1,44 @@ +using namespace System.Net + +Function Invoke-RemoveTenantAllowBlockList { + <# + .FUNCTIONALITY + Entrypoint + #> + [CmdletBinding()] + param($Request, $TriggerMetadata) + + $APIName = $TriggerMetadata.FunctionName + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APIName -message 'Accessed this API' -Sev 'Debug' + + # Write to the Azure Functions log stream. + Write-Host 'PowerShell HTTP trigger function processed a request.' + try { + $ExoRequest = @{ + tenantid = $Request.query.tenantfilter + cmdlet = 'Remove-TenantAllowBlockListItems' + cmdParams = @{ + Entries = [string[]]$Request.query.entries + ListType = [string]$Request.query.listType + } + } + + New-ExoRequest @ExoRequest + + $result = "Successfully removed $($Request.query.entries) from Block/Allow list" + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APIName -tenant $Request.query.tenantfilter -message $result -Sev 'Info' + } catch { + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + $result = "Failed to remove $($Request.query.entries). Error: $ErrorMessage" + Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APIName -tenant $Request.query.tenantfilter -message $result -Sev 'Error' + } + + # Associate values to output bindings by calling 'Push-OutputBinding'. + Push-OutputBinding -Name Response -Value ([HttpResponseContext]@{ + StatusCode = [HttpStatusCode]::OK + Body = @{ + 'Results' = $result + 'Request' = $ExoRequest + } + }) +} diff --git a/Modules/CIPPCore/Public/GraphHelper/Get-Tenants.ps1 b/Modules/CIPPCore/Public/GraphHelper/Get-Tenants.ps1 index abac15b401cf..c38b5c1c59b3 100644 --- a/Modules/CIPPCore/Public/GraphHelper/Get-Tenants.ps1 +++ b/Modules/CIPPCore/Public/GraphHelper/Get-Tenants.ps1 @@ -36,7 +36,7 @@ function Get-Tenants { } if ($CleanOld) { - $GDAPRelationships = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/tenantRelationships/delegatedAdminRelationships?`$filter=status eq 'active' and not startsWith(displayName,'MLT_')&`$select=customer,autoExtendDuration,endDateTime" -NoAuthCheck:$true + $GDAPRelationships = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/tenantRelationships/delegatedAdminRelationships?`$filter=status eq 'active' and not startsWith(displayName,'MLT_')&`$select=customer,autoExtendDuration,endDateTime`$top=300" -NoAuthCheck:$true $GDAPList = foreach ($Relationship in $GDAPRelationships) { [PSCustomObject]@{ customerId = $Relationship.customer.tenantId @@ -55,7 +55,7 @@ function Get-Tenants { if (($BuildRequired -or $TriggerRefresh.IsPresent) -and $PartnerTenantState.state -ne 'owntenant') { #get the full list of tenants - $GDAPRelationships = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/tenantRelationships/delegatedAdminRelationships?`$filter=status eq 'active' and not startsWith(displayName,'MLT_')&`$select=customer,autoExtendDuration,endDateTime" -NoAuthCheck:$true + $GDAPRelationships = New-GraphGetRequest -uri "https://graph.microsoft.com/beta/tenantRelationships/delegatedAdminRelationships?`$filter=status eq 'active' and not startsWith(displayName,'MLT_')&`$select=customer,autoExtendDuration,endDateTime&`$top=300" -NoAuthCheck:$true $GDAPList = foreach ($Relationship in $GDAPRelationships) { [PSCustomObject]@{ customerId = $Relationship.customer.tenantId @@ -87,7 +87,7 @@ function Get-Tenants { if (-not $SkipDomains.IsPresent) { try { Write-Host "Getting domains for $($_.Name)." - $Domains = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/domains' -tenantid $LatestRelationship.customerId -NoAuthCheck:$true -ErrorAction Stop + $Domains = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/domains?$top=999' -tenantid $LatestRelationship.customerId -NoAuthCheck:$true -ErrorAction Stop $defaultDomainName = ($Domains | Where-Object { $_.isDefault -eq $true }).id $initialDomainName = ($Domains | Where-Object { $_.isInitial -eq $true }).id } catch { @@ -128,7 +128,7 @@ function Get-Tenants { $IncludedTenantsCache = [system.collections.generic.list[object]]::new() if ($PartnerTenantState.state -eq 'PartnerTenantAvailable') { # Add partner tenant if env is set - $Domains = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/domains' -tenantid $env:TenantID -NoAuthCheck:$true + $Domains = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/domains?$top=999' -tenantid $env:TenantID -NoAuthCheck:$true $IncludedTenantsCache.Add([PSCustomObject]@{ RowKey = $env:TenantID PartitionKey = 'Tenants' diff --git a/Modules/CIPPCore/Public/GraphHelper/New-ExoBulkRequest.ps1 b/Modules/CIPPCore/Public/GraphHelper/New-ExoBulkRequest.ps1 index 3197e0606748..deb7f2fd1d56 100644 --- a/Modules/CIPPCore/Public/GraphHelper/New-ExoBulkRequest.ps1 +++ b/Modules/CIPPCore/Public/GraphHelper/New-ExoBulkRequest.ps1 @@ -12,7 +12,7 @@ function New-ExoBulkRequest ($tenantid, $cmdletArray, $useSystemMailbox, $Anchor Authorization = "Bearer $($token.access_token)" Prefer = 'odata.maxpagesize = 1000;odata.continue-on-error' 'parameter-based-routing' = $true - 'X-AnchorMailbox' = $anchor + 'X-AnchorMailbox' = $Anchor } try { if ($Select) { $Select = "`$select=$Select" } @@ -37,7 +37,7 @@ function New-ExoBulkRequest ($tenantid, $cmdletArray, $useSystemMailbox, $Anchor if ($cmdparams.User) { $Anchor = $cmdparams.User } if (!$Anchor -or $useSystemMailbox) { $OnMicrosoft = $Tenant.initialDomainName - $anchor = "UPN:SystemMailbox{8cc370d3-822a-4ab8-a926-bb94bd0641a9}@$($OnMicrosoft)" + $Anchor = "UPN:SystemMailbox{8cc370d3-822a-4ab8-a926-bb94bd0641a9}@$($OnMicrosoft)" } $headers['X-AnchorMailbox'] = $Anchor $Headers['X-CmdletName'] = $cmd.CmdletInput.CmdletName diff --git a/Modules/CIPPCore/Public/GraphHelper/Write-AlertTrace.ps1 b/Modules/CIPPCore/Public/GraphHelper/Write-AlertTrace.ps1 new file mode 100644 index 000000000000..787ccba38f5e --- /dev/null +++ b/Modules/CIPPCore/Public/GraphHelper/Write-AlertTrace.ps1 @@ -0,0 +1,41 @@ +function Write-AlertTrace { + <# + .FUNCTIONALITY + Internal function. Pleases most of write-alertmessage for alerting purposes + #> + Param( + $cmdletName, + $data, + $tenantFilter + ) + $Table = Get-CIPPTable -tablename AlertLastRun + $PartitionKey = (Get-Date -UFormat '%Y%m%d').ToString() + #Get current row and compare the $logData object. If it's the same, don't write it. + $Row = Get-CIPPAzDataTableEntity @table -Filter "RowKey eq '$($tenantFilter)-$($cmdletName)' and PartitionKey eq '$PartitionKey'" + try { + $RowData = $Row.LogData + $Compare = Compare-Object $RowData ($data | ConvertTo-Json -Compress -Depth 10 | Out-String) + if ($Compare) { + $LogData = ConvertTo-Json $data -Compress -Depth 10 | Out-String + $TableRow = @{ + 'PartitionKey' = $PartitionKey + 'RowKey' = "$($tenantFilter)-$($cmdletName)" + 'LogData' = [string]$LogData + } + $Table.Entity = $TableRow + Add-CIPPAzDataTableEntity @Table -Force | Out-Null + return $data + } + } catch { + $LogData = ConvertTo-Json $data -Compress -Depth 10 | Out-String + $TableRow = @{ + 'PartitionKey' = $PartitionKey + 'RowKey' = "$($tenantFilter)-$($cmdletName)" + 'LogData' = [string]$LogData + } + $Table.Entity = $TableRow + Add-CIPPAzDataTableEntity @Table -Force | Out-Null + return $data + } + +} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/GraphHelper/Write-LogMessage.ps1 b/Modules/CIPPCore/Public/GraphHelper/Write-LogMessage.ps1 index 8dec84538272..08b06d792cc6 100644 --- a/Modules/CIPPCore/Public/GraphHelper/Write-LogMessage.ps1 +++ b/Modules/CIPPCore/Public/GraphHelper/Write-LogMessage.ps1 @@ -24,7 +24,7 @@ function Write-LogMessage { if (!$tenant) { $tenant = 'None' } if (!$username) { $username = 'CIPP' } - if ($sev -eq 'Debug' -and $env:DebugMode -ne 'true') { + if ($sev -eq 'Debug' -and $env:DebugMode -ne $true) { Write-Information 'Not writing to log file - Debug mode is not enabled.' return } diff --git a/Modules/CIPPCore/Public/Invoke-CIPPPartnerWebhookProcessing.ps1 b/Modules/CIPPCore/Public/Invoke-CIPPPartnerWebhookProcessing.ps1 index 5a16c69d530d..076f30aeeaa0 100644 --- a/Modules/CIPPCore/Public/Invoke-CIPPPartnerWebhookProcessing.ps1 +++ b/Modules/CIPPCore/Public/Invoke-CIPPPartnerWebhookProcessing.ps1 @@ -56,9 +56,22 @@ function Invoke-CippPartnerWebhookProcessing { Logs = '' Exception = '' } + + $OnboardItem = @{ Id = $Id } + + # Check for partner webhook onboarding settings + $ConfigTable = Get-CIPPTable -TableName Config + $WebhookConfig = Get-CIPPAzDataTableEntity @ConfigTable -Filter "RowKey eq 'PartnerWebhookOnboarding'" + if ($WebhookConfig.StandardsExcludeAllTenants -eq $true) { + $OnboardItem.StandardsExcludeAllTenants = $true + } + + # Add onboarding entry to the table $OnboardTable = Get-CIPPTable -TableName 'TenantOnboarding' Add-CIPPAzDataTableEntity @OnboardTable -Entity $TenantOnboarding -Force -ErrorAction Stop - Push-ExecOnboardTenantQueue -Item @{ Id = $Id } + + # Start onboarding + Push-ExecOnboardTenantQueue -Item $OnboardItem } else { if ($AuditLog) { Write-LogMessage -API 'Webhooks' -message "Partner Center $($Data.EventName) audit log webhook received" -LogData $AuditObj -Sev 'Alert' diff --git a/Modules/CIPPCore/Public/Invoke-CIPPStandardsRun.ps1 b/Modules/CIPPCore/Public/Invoke-CIPPStandardsRun.ps1 index 56476c2acc35..dee975be7ca1 100644 --- a/Modules/CIPPCore/Public/Invoke-CIPPStandardsRun.ps1 +++ b/Modules/CIPPCore/Public/Invoke-CIPPStandardsRun.ps1 @@ -11,20 +11,16 @@ function Invoke-CIPPStandardsRun { #For each item in our object, run the queue. $Queue = New-CippQueueEntry -Name "Applying Standards ($TenantFilter)" -TotalTasks ($AllTasks | Measure-Object).Count - $Batch = foreach ($task in $AllTasks) { - [PSCustomObject]@{ - Tenant = $task.Tenant - Standard = $task.Standard - Settings = $task.Settings - QueueId = $Queue.RowKey - QueueName = '{0} - {1}' -f $task.Standard, $Task.Tenant - FunctionName = 'CIPPStandard' - } - } $InputObject = [PSCustomObject]@{ - OrchestratorName = 'Standards' - Batch = @($Batch) + OrchestratorName = 'StandardsOrchestrator' + QueueFunction = @{ + FunctionName = 'GetStandards' + QueueId = $Queue.RowKey + StandardParams = @{ + TenantFilter = $TenantFilter + } + } } $InstanceId = Start-NewOrchestration -FunctionName 'CIPPOrchestrator' -InputObject ($InputObject | ConvertTo-Json -Depth 5 -Compress) diff --git a/Modules/CIPPCore/Public/Invoke-CIPPWebhookProcessing.ps1 b/Modules/CIPPCore/Public/Invoke-CIPPWebhookProcessing.ps1 index 86e7e8a41c3f..402e91d285ff 100644 --- a/Modules/CIPPCore/Public/Invoke-CIPPWebhookProcessing.ps1 +++ b/Modules/CIPPCore/Public/Invoke-CIPPWebhookProcessing.ps1 @@ -9,243 +9,85 @@ function Invoke-CippWebhookProcessing { $APIName = 'Process webhook', $ExecutingUser ) - $ConfigTable = get-cipptable -TableName 'SchedulerConfig' - $LocationTable = Get-CIPPTable -TableName 'knownlocationdb' - $TrustedIPsTable = Get-CIPPTable -TableName 'trustedIps' - $Alertconfig = Get-CIPPAzDataTableEntity @ConfigTable -Filter "Tenant eq '$tenantfilter'" - if (!$Alertconfig) { - $Alertconfig = Get-CIPPAzDataTableEntity @ConfigTable -Filter "Tenant eq 'AllTenants'" - } - - if ($data.userId -eq 'Not Available') { $data.userId = $data.userKey } - if ($data.Userkey -eq 'Not Available') { $data.Userkey = $data.userId } - if ($data.clientip) { - $TrustedIps = Get-CIPPAzDataTableEntity @TrustedIPsTable -Filter "PartitionKey eq '$($TenantFilter)' and RowKey eq '$($data.clientip)' and state eq 'Trusted'" - Write-Host "TrustedIPs: $($TrustedIps | ConvertTo-Json -Depth 15 -Compress)" - #First we perform a lookup in the knownlocationdb table to see if we have a location for this IP address. - $Location = Get-CIPPAzDataTableEntity @LocationTable -Filter "RowKey eq '$($data.clientip)'" | Select-Object -Last 1 - #If we have a location, we use that. If not, we perform a lookup in the GeoIP database. - if ($Location) { - Write-Host 'Using known location' - $Country = $Location.CountryOrRegion - $City = $Location.City - $Proxy = $Location.Proxy - $hosting = $Location.Hosting - $ASName = $Location.ASName - } else { - Write-Host 'We have to do a lookup' - if ($data.clientip -match '^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}:\d+$') { - $data.clientip = $data.clientip -replace ':\d+$', '' # Remove the port number if present - } - $Location = Get-CIPPGeoIPLocation -IP $data.clientip - $Country = if ($Location.CountryCode) { $Location.CountryCode } else { 'Unknown' } - $City = if ($Location.City) { $Location.City } else { 'Unknown' } - $Proxy = if ($Location.Proxy -ne $null) { $Location.Proxy } else { 'Unknown' } - $hosting = if ($Location.Hosting -ne $null) { $Location.Hosting } else { 'Unknown' } - $ASName = if ($Location.ASName) { $Location.ASName } else { 'Unknown' } - $IP = $data.ClientIP - $LocationInfo = @{ - RowKey = [string]$data.clientip - PartitionKey = [string]$data.UserId - Tenant = [string]$TenantFilter - CountryOrRegion = "$Country" - City = "$City" - Proxy = "$Proxy" - Hosting = "$hosting" - ASName = "$ASName" - } - $null = Add-CIPPAzDataTableEntity @LocationTable -Entity $LocationInfo -Force - } - } - $TableObj = [PSCustomObject]::new() - if ($Data.ExtendedProperties) { $Data.ExtendedProperties | ForEach-Object { $TableObj | Add-Member -NotePropertyName $_.Name -NotePropertyValue $_.Value } } - if ($Data.DeviceProperties) { $Data.DeviceProperties | ForEach-Object { $TableObj | Add-Member -NotePropertyName $_.Name -NotePropertyValue $_.Value } } - if ($Data.parameters) { $Data.parameters | ForEach-Object { $TableObj | Add-Member -NotePropertyName $_.Name -NotePropertyValue $_.Value } } - $ExtendedPropertiesIgnoreList = @( + <# $ExtendedPropertiesIgnoreList = @( 'OAuth2:Authorize' 'OAuth2:Token' 'SAS:EndAuth' 'SAS:ProcessAuth' 'Login:reprocess' - ) - if ($TableObj.RequestType -in $ExtendedPropertiesIgnoreList) { - Write-Host 'No need to process this operation.' - return '' - } + ) #> + Write-Host "Received data. Our Action List is $($data.CIPPAction)" - $AllowedLocations = ($Alertconfig.if | ConvertFrom-Json -ErrorAction SilentlyContinue).allowedcountries.value - Write-Host "These are the allowed locations: $($AllowedLocations)" - Write-Host "Operation: $($data.operation)" - switch ($data.operation) { - { 'UserLoggedIn' -eq $data.operation -and $proxy -eq $true -and !$TrustedIps } { $data.operation = 'BadRepIP' } - { 'UserLoggedIn' -eq $data.operation -and $hosting -eq $true -and !$TrustedIps } { $data.operation = 'HostedIP' } - { 'UserLoggedIn' -eq $data.operation -and $Country -notin $AllowedLocations -and $data.ResultStatus -eq 'Success' -and $TableObj.ResultStatusDetail -eq 'Success' } { - Write-Host "$($country) is not in $($AllowedLocations)" - $data.operation = 'UserLoggedInFromUnknownLocation' - } - { 'UserloggedIn' -eq $data.operation -and $data.UserType -eq 2 -and $data.ResultStatus -eq 'Success' -and $TableObj.ResultStatusDetail -eq 'Success' } { $data.operation = 'AdminLoggedIn' } - default { break } - } - Write-Host "Rewrote to operation: $($data.operation)" - #Check if we actually need to do anything, and if not, break away. - foreach ($AlertSetting in $Alertconfig) { - $ifs = $AlertSetting.If | ConvertFrom-Json - $Dos = $AlertSetting.execution | ConvertFrom-Json - if ($data.operation -notin $Ifs.selection -and 'AnyAlert' -notin $ifs.selection -and ($ifs.count -le 1 -and $ifs.selection -ne 'customField')) { - Write-Host 'Not an operation to do anything for. storing IP info' - if ($data.ClientIP -and $data.operation -like '*LoggedIn*') { - Write-Host 'Add IP and potential location to knownlocation db for this specific user.' - $IP = $data.ClientIP - if ($IP -match '^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}:\d+$') { - $IP = $IP -replace ':\d+$', '' # Remove the port number if present + $ActionList = ($data.CIPPAction | ConvertFrom-Json -ErrorAction SilentlyContinue).value + $ActionResults = foreach ($action in $ActionList) { + Write-Host "this is our action: $($action | ConvertTo-Json -Depth 15 -Compress))" + switch ($action) { + 'disableUser' { + Set-CIPPSignInState -TenantFilter $TenantFilter -User $data.UserId -AccountEnabled $false -APIName 'Alert Engine' -ExecutingUser 'Alert Engine' + } + 'becremediate' { + $username = (New-GraphGetRequest -uri "https://graph.microsoft.com/beta/users/$($data.UserId)" -tenantid $TenantFilter).UserPrincipalName + Set-CIPPResetPassword -userid $username -tenantFilter $TenantFilter -APIName 'Alert Engine' -ExecutingUser 'Alert Engine' + Set-CIPPSignInState -userid $username -AccountEnabled $false -tenantFilter $TenantFilter -APIName 'Alert Engine' -ExecutingUser 'Alert Engine' + Revoke-CIPPSessions -userid $username -username $username -ExecutingUser 'Alert Engine' -APIName 'Alert Engine' -tenantFilter $TenantFilter + $RuleDisabled = 0 + New-ExoRequest -anchor $username -tenantid $TenantFilter -cmdlet 'get-inboxrule' -cmdParams @{Mailbox = $username } | ForEach-Object { + $null = New-ExoRequest -anchor $username -tenantid $TenantFilter -cmdlet 'Disable-InboxRule' -cmdParams @{Confirm = $false; Identity = $_.Identity } + "Disabled Inbox Rule $($_.Identity) for $username" + $RuleDisabled ++ } - $LocationInfo = @{ - RowKey = [string]$ip - PartitionKey = [string]$data.UserId - Tenant = [string]$TenantFilter - CountryOrRegion = "$Country" - City = "$City" - Proxy = "$Proxy" - Hosting = "$hosting" - ASName = "$ASName" - Region = "$($location.region)" - RegionName = "$($location.regionName)" - org = "$($location.org)" - zip = "$($location.zip)" - mobile = "$($location.mobile)" - lat = "$($location.lat)" - lon = "$($location.lon)" - isp = "$($location.isp)" - Country = "$($location.country)" + if ($RuleDisabled) { + "Disabled $RuleDisabled Inbox Rules for $username" + } else { + "No Inbox Rules found for $username. We have not disabled any rules." } - $null = Add-CIPPAzDataTableEntity @LocationTable -Entity $LocationInfo -Force + "Completed BEC Remediate for $username" + Write-LogMessage -API 'BECRemediate' -tenant $tenantfilter -message "Executed Remediation for $username" -sev 'Info' } - Continue - } else { - $ConditionMet = $true - } - foreach ($field in $ifs.field) { - $parts = $field -split ' ', 3 - $key = $parts[0] - $operator = $parts[1] - $value = $parts[2] - if (!$value) { - Write-Host 'blank value, skip' - continue - } - if ($value -contains ',') { - $valueArray = "(@($value -split ','))" - $dynamicIf = "`$data.$key -$operator $valueArray" - } else { - $dynamicIf = "`$data.$key -$operator '$value'" - } - if (Invoke-Expression $dynamicIf) { - Write-Host "Condition met: $dynamicIf" - $ConditionMet = $true - } else { - Write-Host "Condition not met: $dynamicIf" - $ConditionMet = $false + 'cippcommand' { + $CommandSplat = @{} + $action.parameters.psobject.properties | ForEach-Object { $CommandSplat.Add($_.name, $_.value) } + if ($CommandSplat['userid']) { $CommandSplat['userid'] = $data.userid } + if ($CommandSplat['tenantfilter']) { $CommandSplat['tenantfilter'] = $tenantfilter } + if ($CommandSplat['tenant']) { $CommandSplat['tenant'] = $tenantfilter } + if ($CommandSplat['user']) { $CommandSplat['user'] = $data.userid } + if ($CommandSplat['username']) { $CommandSplat['username'] = $data.userid } + & $action.command.value @CommandSplat } } - - if ($ConditionMet) { - #we're doing two loops, one first to collect the results of any action taken, then the second to pass those results via email etc. - $ActionResults = foreach ($action in $dos) { - Write-Host "this is our action: $($action | ConvertTo-Json -Depth 15 -Compress))" - switch ($action.execute) { - 'disableUser' { - Set-CIPPSignInState -TenantFilter $TenantFilter -User $data.UserId -AccountEnabled $false -APIName 'Alert Engine' -ExecutingUser 'Alert Engine' - } - 'becremediate' { - $username = (New-GraphGetRequest -uri "https://graph.microsoft.com/beta/users/$($data.UserId)" -tenantid $TenantFilter).UserPrincipalName - Set-CIPPResetPassword -userid $username -tenantFilter $TenantFilter -APIName 'Alert Engine' -ExecutingUser 'Alert Engine' - Set-CIPPSignInState -userid $username -AccountEnabled $false -tenantFilter $TenantFilter -APIName 'Alert Engine' -ExecutingUser 'Alert Engine' - Revoke-CIPPSessions -userid $username -username $username -ExecutingUser 'Alert Engine' -APIName 'Alert Engine' -tenantFilter $TenantFilter - $RuleDisabled = 0 - New-ExoRequest -anchor $username -tenantid $TenantFilter -cmdlet 'get-inboxrule' -cmdParams @{Mailbox = $username } | ForEach-Object { - $null = New-ExoRequest -anchor $username -tenantid $TenantFilter -cmdlet 'Disable-InboxRule' -cmdParams @{Confirm = $false; Identity = $_.Identity } - "Disabled Inbox Rule $($_.Identity) for $username" - $RuleDisabled ++ - } - if ($RuleDisabled) { - "Disabled $RuleDisabled Inbox Rules for $username" - } else { - "No Inbox Rules found for $username. We have not disabled any rules." - } - "Completed BEC Remediate for $username" - Write-LogMessage -API 'BECRemediate' -tenant $tenantfilter -message "Executed Remediation for $username" -sev 'Info' - } - 'store' { - Write-Host "Using $($action.connectionstring) as connectionstring to ship data" - $Context = New-AzDataTableContext -ConnectionString $action.ConnectionString -TableName 'AuditLog' - Write-Host 'Creating table if it does not exist' - New-AzDataTable -Context $Context | Out-Null - Write-Host 'Uploading data to table' - $TableObj = @{ - RowKey = [string]$data.id - PartitionKey = [string]$TenantFilter - Tenant = [string]$tenantfilter - Operation = [string]$data.operation - RawData = [string]($data | ConvertTo-Json -Depth 15 -Compress) - IP = [string]$data.clientip - Country = [string]$Country - City = [string]$City - Proxy = [string]$Proxy - Hosting = [string]$hosting - ASName = [string]$ASName - } - Add-CIPPAzDataTableEntity -Context $Context -Entity $TableObj - 'Succesfully stored log' - } - 'cippcommand' { - $CommandSplat = @{} - $action.parameters.psobject.properties | ForEach-Object { $CommandSplat.Add($_.name, $_.value) } - if ($CommandSplat['userid']) { $CommandSplat['userid'] = $data.userid } - if ($CommandSplat['tenantfilter']) { $CommandSplat['tenantfilter'] = $tenantfilter } - if ($CommandSplat['tenant']) { $CommandSplat['tenant'] = $tenantfilter } - if ($CommandSplat['user']) { $CommandSplat['user'] = $data.userid } - if ($CommandSplat['username']) { $CommandSplat['username'] = $data.userid } - & $action.command.value @CommandSplat - } - } + } + Write-Host 'Going to create the content' + foreach ($action in $ActionList ) { + switch ($action) { + 'generatemail' { + Write-Host 'Going to create the email' + $GenerateEmail = New-CIPPAlertTemplate -format 'html' -data $Data -ActionResults $ActionResults + Write-Host 'Going to send the mail' + Send-CIPPAlert -Type 'email' -Title $GenerateEmail.title -HTMLContent $GenerateEmail.htmlcontent -TenantFilter $TenantFilter + Write-Host 'email should be sent' } - Write-Host 'Going to create the content' - foreach ($action in $dos) { - switch ($action.execute) { - 'generatemail' { - Write-Host 'Going to create the email' - $GenerateEmail = New-CIPPAlertTemplate -format 'html' -data $Data -LocationInfo $Location -ActionResults $ActionResults - Write-Host 'Going to send the mail' - Send-CIPPAlert -Type 'email' -Title $GenerateEmail.title -HTMLContent $GenerateEmail.htmlcontent -TenantFilter $TenantFilter - Write-Host 'email should be sent' - - } - 'generatePSA' { - $GenerateEmail = New-CIPPAlertTemplate -format 'html' -data $Data -LocationInfo $Location -ActionResults $ActionResults - Send-CIPPAlert -Type 'psa' -Title $GenerateEmail.title -HTMLContent $GenerateEmail.htmlcontent -TenantFilter $TenantFilter - } - 'generateWebhook' { - Write-Host 'Generating the webhook content' - $GenerateJSON = New-CIPPAlertTemplate -format 'json' -data $Data -ActionResults $ActionResults - $JsonContent = @{ - Title = $GenerateJSON.Title - ActionUrl = $GenerateJSON.ButtonUrl - RawData = $Data - IP = $data.ClientIP - PotentialCountry = $Country - PotentialCity = $City - PotentialProxy = $Proxy - PotentialHosting = $hosting - PotentialASName = $ASName - ActionsTaken = [string]($ActionResults | ConvertTo-Json -Depth 15 -Compress) - } | ConvertTo-Json -Depth 15 -Compress - Write-Host 'Sending Webhook Content' + 'generatePSA' { + $GenerateEmail = New-CIPPAlertTemplate -format 'html' -data $Data -ActionResults $ActionResults + Send-CIPPAlert -Type 'psa' -Title $GenerateEmail.title -HTMLContent $GenerateEmail.htmlcontent -TenantFilter $TenantFilter + } + 'generateWebhook' { + Write-Host 'Generating the webhook content' + $LocationInfo = $Data.CIPPLocationInfo | ConvertFrom-Json -ErrorAction SilentlyContinue + $GenerateJSON = New-CIPPAlertTemplate -format 'json' -data $Data -ActionResults $ActionResults + $JsonContent = @{ + Title = $GenerateJSON.Title + ActionUrl = $GenerateJSON.ButtonUrl + RawData = $Data + IP = $data.ClientIP + PotentialLocationInfo = $LocationInfo + ActionsTaken = [string]($ActionResults | ConvertTo-Json -Depth 15 -Compress) + } | ConvertTo-Json -Depth 15 -Compress + Write-Host 'Sending Webhook Content' - Send-CIPPAlert -Type 'webhook' -Title $GenerateJSON.Title -JSONContent $JsonContent -TenantFilter $TenantFilter - } - } + Send-CIPPAlert -Type 'webhook' -Title $GenerateJSON.Title -JSONContent $JsonContent -TenantFilter $TenantFilter } } } } + diff --git a/Modules/CIPPCore/Public/New-CIPPAlertTemplate.ps1 b/Modules/CIPPCore/Public/New-CIPPAlertTemplate.ps1 index 442d149133a9..c502a2ea1bf7 100644 --- a/Modules/CIPPCore/Public/New-CIPPAlertTemplate.ps1 +++ b/Modules/CIPPCore/Public/New-CIPPAlertTemplate.ps1 @@ -16,17 +16,17 @@ function New-CIPPAlertTemplate { $AfterButtonText = '' $RuleTable = '' $Table = '' - $LocationInfo = $LocationInfo | Select-Object * -ExcludeProperty Etag, PartitionKey, RowKey, TimeStamp + $LocationInfo = $Data.CIPPLocationInfo | ConvertFrom-Json -ErrorAction SilentlyContinue | Select-Object * -ExcludeProperty Etag, PartitionKey, TimeStamp switch ($Data.Operation) { 'New-InboxRule' { $Title = "$($TenantFilter) - New Rule Detected for $($data.UserId)" - $RuleTable = ($TableObj | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') - $ParameterName + $RuleTable = ($Data.CIPPParameters | ConvertFrom-Json | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') + $IntroText = "

A new rule has been created for the user $($data.UserId). You should check if this rule is not malicious. The rule information can be found in the table below.

$RuleTable" if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonUrl = "$CIPPPURL/identity/administration/ViewBec?userId=$($data.UserId)&tenantDomain=$($data.OrganizationId)" $ButtonText = 'Start BEC Investigation' @@ -34,13 +34,12 @@ function New-CIPPAlertTemplate { } 'Set-inboxrule' { $Title = "$($TenantFilter) - Rule Edit Detected for $($data.UserId)" - $RuleTable = ($TableObj | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') - $ParameterName + $RuleTable = ($Data.CIPPParameters | ConvertFrom-Json | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') $IntroText = "

A rule has been edited for the user $($data.UserId). You should check if this rule is not malicious. The rule information can be found in the table below.

$RuleTable" if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonUrl = "$CIPPPURL/identity/administration/ViewBec?userId=$($data.UserId)&tenantDomain=$($data.OrganizationId)" $ButtonText = 'Start BEC Investigation' @@ -48,12 +47,12 @@ function New-CIPPAlertTemplate { } 'Add member to role.' { $Title = "$($TenantFilter) - Role change detected for $($data.ObjectId)" - $Table = ($data.ModifiedProperties | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') - $IntroText = "

$($data.UserId) has added $($data.ObjectId) to the $(($data.ModifiedProperties | Where-Object -Property Name -EQ 'Role.DisplayName').NewValue) role. The information about the role can be found in the table below.

$Table" + $Table = ($data.CIPPModifiedProperties | ConvertFrom-Json | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') + $IntroText = "

$($data.UserId) has added $($data.ObjectId) to the $(($data.'Role.DisplayName')) role. The information about the role can be found in the table below.

$Table" if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonUrl = "$CIPPPURL/identity/administration/roles?customerId=$($data.OrganizationId)" $ButtonText = 'Role Management' @@ -66,7 +65,7 @@ function New-CIPPAlertTemplate { if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonUrl = "$CIPPPURL/identity/administration/users?customerId=$($data.OrganizationId)" $ButtonText = 'User Management' @@ -79,7 +78,7 @@ function New-CIPPAlertTemplate { if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonText = 'User Management' $AfterButtonText = '

If this is incorrect, use the user management screen to unblock the users sign-in

' @@ -91,7 +90,7 @@ function New-CIPPAlertTemplate { if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonText = 'User Management' $AfterButtonText = '

If this is incorrect, use the user management screen to unblock the users sign-in

' @@ -102,7 +101,7 @@ function New-CIPPAlertTemplate { if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonUrl = "$CIPPPURL/identity/administration/users?customerId=$($data.OrganizationId)" $ButtonText = 'User Management' @@ -110,12 +109,12 @@ function New-CIPPAlertTemplate { } 'Remove Member from a role.' { $Title = "$($TenantFilter) - Role change detected for $($data.ObjectId)" - $Table = ($data.ModifiedProperties | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') + $Table = ($data.CIPPModifiedProperties | ConvertFrom-Json | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') $IntroText = "

$($data.UserId) has removed $($data.ObjectId) to the $(($data.ModifiedProperties | Where-Object -Property Name -EQ 'Role.DisplayName').NewValue) role. The information about the role can be found in the table below.

$Table" if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonUrl = "$CIPPPURL/identity/administration/roles?customerId=$($data.OrganizationId)" $ButtonText = 'Role Management' @@ -129,70 +128,13 @@ function New-CIPPAlertTemplate { if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonUrl = "$CIPPPURL/identity/administration/users?customerId=$($data.OrganizationId)" $ButtonText = 'User Management' $AfterButtonText = '

If this is incorrect, use the user management screen to unblock the users sign-in

' } - 'AdminLoggedIn' { - $Table = ($TableObj | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - if ($Appname) { $AppName = $AppName.'Application Name' } else { $appName = $data.ApplicationId } - $Title = "$($TenantFilter) - an admin account has logged on" - $IntroText = "$($data.UserId) ($($data.Userkey)) has logged on from IP $($data.ClientIP) to the application $($Appname). See the table below for more information. $Table" - if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } - if ($LocationInfo) { - $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" - } - $ButtonUrl = "$CIPPPURL/identity/administration/ViewBec?userId=$($data.UserKey)&tenantDomain=$($data.OrganizationId)" - $ButtonText = 'User Management' - $AfterButtonText = '

If this is incorrect, use the user management screen to block the user and revoke the sessions

' - - } - 'UserLoggedInFromUnknownLocation' { - $Table = ($TableObj | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - if ($Appname) { $AppName = $AppName.'Application Name' } else { $appName = $data.ApplicationId } - $Title = "$($TenantFilter) - a user has logged on from a potentially unsafe location" - $IntroText = "$($data.UserId) ($($data.Userkey)) has logged on from IP $($data.ClientIP) to the application $($Appname). According to our database this is located in $($LocationInfo.Country) - $($LocationInfo.City).

You have set up alerts to be notified when this happens. See the table below for more info.$Table" - if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } - if ($LocationInfo) { - $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" - } - $ButtonUrl = "$CIPPPURL/identity/administration/ViewBec?userId=$($data.ObjectId)&tenantDomain=$($data.OrganizationId)" - $ButtonText = 'User Management' - $AfterButtonText = '

If this is incorrect, use the user management screen to block the user and revoke the sessions

' - } - 'BadRepIP' { - $Table = ($TableObj | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - if ($Appname) { $AppName = $AppName.'Application Name' } else { $appName = $data.ApplicationId } - $Title = "$($TenantFilter) - a user has logged on from a potentially unsafe location" - $IntroText = "$($data.UserId) ($($data.Userkey)) has logged on from IP $($data.ClientIP) to the application $($Appname). According to our database this is located in $($LocationInfo.Country) - $($LocationInfo.City), but is a VPN, Proxy, or IP anonimizing service.

You have set up alerts to be notified when this happens. See the table below for more info.$Table" - if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } - if ($LocationInfo) { - $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" - } - $ButtonUrl = "$CIPPPURL/tenant/tools/geoiplookup?ip=$($data.ClientIP)&SearchNow=true&customerId=$($data.OrganizationId)" - $ButtonText = 'Whitelist IP' - $AfterButtonText = '

If this is incorrect, you can whitelist the following IP.

' - } - 'HostedIP' { - $Table = ($TableObj | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - if ($Appname) { $AppName = $AppName.'Application Name' } else { $appName = $data.ApplicationId } - $Title = "$($TenantFilter) - a user has logged on from a potentially unsafe location" - $IntroText = "$($data.UserId) ($($data.Userkey)) has logged on from IP $($data.ClientIP) to the application $($Appname). According to our database this is located in $($LocationInfo.Country) - $($LocationInfo.City), but this IP is also belonging to a Hosting Provider, such as Microsoft, Google, or other cloud service.

You have set up alerts to be notified when this happens. See the table below for more info.$Table" - if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } - if ($LocationInfo) { - $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" - } - $ButtonUrl = "$CIPPPURL/tenant/tools/geoiplookup?ip=$($data.ClientIP)&SearchNow=true&customerId=$($data.OrganizationId)" - $ButtonText = 'Whitelist IP' - $AfterButtonText = '

If this is incorrect, you can whitelist the following IP.

' - } 'Add service principal.' { if ($Appname) { $AppName = $AppName.'Application Name' } else { $appName = $data.ApplicationId } $Title = "$($TenantFilter) - Service Principal $($data.ObjectId) has been added." @@ -200,7 +142,7 @@ function New-CIPPAlertTemplate { if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $IntroText = "$($data.ObjectId) has been added by $($data.UserId)." $ButtonUrl = "$CIPPPURL/tenant/administration/enterprise-apps?customerId=?customerId=$($data.OrganizationId)" @@ -209,25 +151,38 @@ function New-CIPPAlertTemplate { 'Remove service principal.' { if ($Appname) { $AppName = $AppName.'Application Name' } else { $appName = $data.ApplicationId } $Title = "$($TenantFilter) - Service Principal $($data.ObjectId) has been removed." - $Table = ($data.ModifiedProperties | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') + $Table = ($data.CIPPModifiedProperties | ConvertFrom-Json | ConvertTo-Html -Fragment | Out-String).Replace('
', '
') if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $IntroText = "$($data.ObjectId) has been added by $($data.UserId)." $ButtonUrl = "$CIPPPURL/tenant/administration/enterprise-apps?customerId=?customerId=$($data.OrganizationId)" $ButtonText = 'Enterprise Apps' } - + 'UserLoggedIn' { + $Table = ($data | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') + if ($Appname) { $AppName = $AppName.'Application Name' } else { $appName = $data.ApplicationId } + $Title = "$($TenantFilter) - a user has logged on from a location you've set up to receive alerts for." + $IntroText = "$($data.UserId) ($($data.Userkey)) has logged on from IP $($data.ClientIP) to the application $($Appname). According to our database this is located in $($LocationInfo.Country) - $($LocationInfo.City).

You have set up alerts to be notified when this happens. See the table below for more info.$Table" + if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } + if ($LocationInfo) { + $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" + } + $ButtonUrl = "$CIPPPURL/identity/administration/ViewBec?userId=$($data.ObjectId)&tenantDomain=$($data.OrganizationId)" + $ButtonText = 'User Management' + $AfterButtonText = '

If this is incorrect, use the user management screen to block the user and revoke the sessions

' + } default { $Title = 'A custom alert has occured' $Table = ($data | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = "

You have setup CIPP to send you a custom alert for the event $($Data.operation)

$Table" + $IntroText = "

You have setup CIPP to send you a custom alert for the audit events that follow this filter: $($data.cippclause)

$Table" if ($ActionResults) { $IntroText = $IntroText + "

Based on the rule, the following actions have been taken: $($ActionResults -join '
' )

" } if ($LocationInfo) { $LocationTable = ($LocationInfo | ConvertTo-Html -Fragment -As List | Out-String).Replace('
', '
') - $IntroText = $IntroText + "

The location information for this IP is as follows:

$LocationTable" + $IntroText = $IntroText + "

The (potential) location information for this IP is as follows:

$LocationTable" } $ButtonUrl = "$CIPPPURL/identity/administration/users?customerId=$($data.OrganizationId)" $ButtonText = 'User Management' diff --git a/Modules/CIPPCore/Public/New-CIPPCAPolicy.ps1 b/Modules/CIPPCore/Public/New-CIPPCAPolicy.ps1 index fa13c6b67e5f..10f92773ee22 100644 --- a/Modules/CIPPCore/Public/New-CIPPCAPolicy.ps1 +++ b/Modules/CIPPCore/Public/New-CIPPCAPolicy.ps1 @@ -139,13 +139,13 @@ function New-CIPPCAPolicy { $users = New-GraphGETRequest -uri 'https://graph.microsoft.com/beta/users?$select=id,displayName' -tenantid $TenantFilter $groups = New-GraphGETRequest -uri 'https://graph.microsoft.com/beta/groups?$select=id,displayName' -tenantid $TenantFilter - if ($JSONObj.conditions.users.includeUsers -notin 'All', 'None', 'GuestOrExternalUsers') { $JSONObj.conditions.users.includeUsers = @(($users | Where-Object -Property displayName -In $JSONObj.conditions.users.includeUsers).id) } + if ($JSONObj.conditions.users.includeUsers -and $JSONObj.conditions.users.includeUsers -notin 'All', 'None', 'GuestOrExternalUsers') { $JSONObj.conditions.users.includeUsers = @(($users | Where-Object -Property displayName -In $JSONObj.conditions.users.includeUsers).id) } if ($JSONObj.conditions.users.excludeUsers) { $JSONObj.conditions.users.excludeUsers = @(($users | Where-Object -Property displayName -In $JSONObj.conditions.users.excludeUsers).id) } # Check the included and excluded groups foreach ($groupType in 'includeGroups', 'excludeGroups') { if ($JSONObj.conditions.users.PSObject.Properties.Name -contains $groupType) { - $JSONObj.conditions.users.$groupType = Replace-GroupNameWithId -groupNames $JSONObj.conditions.users.$groupType + $JSONObj.conditions.users.$groupType = @(Replace-GroupNameWithId -groupNames $JSONObj.conditions.users.$groupType) } } } catch { @@ -155,7 +155,7 @@ function New-CIPPCAPolicy { } } $JsonObj.PSObject.Properties.Remove('LocationInfo') - $RawJSON = $JSONObj | ConvertTo-Json -Depth 10 + $RawJSON = $JSONObj | ConvertTo-Json -Depth 10 -Compress Write-Host $RawJSON try { Write-Host 'Checking' diff --git a/Modules/CIPPCore/Public/New-CIPPGraphSubscription.ps1 b/Modules/CIPPCore/Public/New-CIPPGraphSubscription.ps1 index 378df5a1cb48..f7d0eb366389 100644 --- a/Modules/CIPPCore/Public/New-CIPPGraphSubscription.ps1 +++ b/Modules/CIPPCore/Public/New-CIPPGraphSubscription.ps1 @@ -19,64 +19,48 @@ function New-CIPPGraphSubscription { Write-Host "Operations are: $operations" try { if ($auditLogAPI) { - $MappingTable = [pscustomobject]@{ - 'UserLoggedIn' = 'Audit.AzureActiveDirectory' - 'Add member to role.' = 'Audit.AzureActiveDirectory' - 'Disable account.' = 'Audit.AzureActiveDirectory' - 'Update StsRefreshTokenValidFrom Timestamp.' = 'Audit.AzureActiveDirectory' - 'Enable account.' = 'Audit.AzureActiveDirectory' - 'Disable Strong Authentication.' = 'Audit.AzureActiveDirectory' - 'Reset user password.' = 'Audit.AzureActiveDirectory' - 'Add service principal.' = 'Audit.AzureActiveDirectory' - 'HostedIP' = 'Audit.AzureActiveDirectory' - 'badRepIP' = 'Audit.AzureActiveDirectory' - 'UserLoggedInFromUnknownLocation' = 'Audit.AzureActiveDirectory' - 'customfield' = 'AnyLog' - 'anyAlert' = 'AnyLog' - 'New-InboxRule' = 'Audit.Exchange' - 'Set-InboxRule' = 'Audit.Exchange' - } - $EventTypes = $operations | Where-Object { $MappingTable.$_ } | ForEach-Object { $MappingTable.$_ } - if ('anyLog' -in $EventTypes) { $EventTypes = @('Audit.AzureActiveDirectory', 'Audit.Exchange', 'Audit.SharePoint', 'Audit.General') } - foreach ($EventType in $EventTypes) { - $CIPPID = (New-Guid).GUID - $Resource = $EventType - $CIPPAuditURL = "$BaseURL/API/Publicwebhooks?EventType=$EventType&CIPPID=$CIPPID" - $AuditLogParams = @{ - webhook = @{ - 'address' = $CIPPAuditURL + $CIPPID = (New-Guid).GUID + $Resource = $EventType + $CIPPAuditURL = "$BaseURL/API/Publicwebhooks?EventType=$EventType&CIPPID=$CIPPID&version=2" + $AuditLogParams = @{ + webhook = @{ + 'address' = $CIPPAuditURL + } + } | ConvertTo-Json + #List existing webhook subscriptions in table + $WebhookFilter = "PartitionKey eq '$($TenantFilter)' and Resource eq '$Resource' and Version eq '2'" + $ExistingWebhooks = Get-CIPPAzDataTableEntity @WebhookTable -Filter $WebhookFilter + $MatchedWebhook = $ExistingWebhooks + try { + if (!$MatchedWebhook) { + $WebhookRow = @{ + PartitionKey = [string]$TenantFilter + RowKey = [string]$CIPPID + Resource = $Resource + Expiration = 'Does Not Expire' + WebhookNotificationUrl = [string]$CIPPAuditURL + Version = '2' } - } | ConvertTo-Json - #List existing webhook subscriptions in table - $WebhookFilter = "PartitionKey eq '$($TenantFilter)'" - $ExistingWebhooks = Get-CIPPAzDataTableEntity @WebhookTable -Filter $WebhookFilter - $MatchedWebhook = $ExistingWebhooks | Where-Object { $_.Resource -eq $Resource } - try { - if (!$MatchedWebhook) { - $WebhookRow = @{ - PartitionKey = [string]$TenantFilter - RowKey = [string]$CIPPID - Resource = $Resource - Expiration = 'Does Not Expire' - WebhookNotificationUrl = [string]$CIPPAuditURL - } - Add-CIPPAzDataTableEntity @WebhookTable -Entity $WebhookRow - Write-Host "Creating webhook subscription for $EventType" - $AuditLog = New-GraphPOSTRequest -uri "https://manage.office.com/api/v1.0/$($TenantFilter)/activity/feed/subscriptions/start?contentType=$EventType&PublisherIdentifier=$($TenantFilter)" -tenantid $TenantFilter -type POST -scope 'https://manage.office.com/.default' -body $AuditLogparams -verbose + Add-CIPPAzDataTableEntity @WebhookTable -Entity $WebhookRow + Write-Host "Creating webhook subscription for $EventType" - Write-LogMessage -user $ExecutingUser -API $APIName -message "Created Webhook subscription for $($TenantFilter) for the log $($EventType)" -Sev 'Info' -tenant $TenantFilter - } else { - Write-LogMessage -user $ExecutingUser -API $APIName -message "No webhook creation required for $($TenantFilter). Already exists" -Sev 'Info' -tenant $TenantFilter - } - } catch { - if ($_.Exception.Message -like '*already exists*') { - Write-LogMessage -user $ExecutingUser -API $APIName -message "Webhook subscription for $($TenantFilter) already exists" -Sev 'Info' -tenant $TenantFilter - } else { - Remove-AzDataTableEntity @WebhookTable -Entity @{ PartitionKey = $TenantFilter; RowKey = $CIPPID } | Out-Null - Write-LogMessage -user $ExecutingUser -API $APIName -message "Failed to create Webhook Subscription for $($TenantFilter): $($_.Exception.Message)" -Sev 'Error' -tenant $TenantFilter - } + $AuditLog = New-GraphPOSTRequest -uri "https://manage.office.com/api/v1.0/$($TenantFilter)/activity/feed/subscriptions/start?contentType=$EventType&PublisherIdentifier=$($TenantFilter)" -tenantid $TenantFilter -type POST -scope 'https://manage.office.com/.default' -body $AuditLogparams -verbose + Write-LogMessage -user $ExecutingUser -API $APIName -message "Created Webhook subscription for $($TenantFilter) for the log $($EventType)" -Sev 'Info' -tenant $TenantFilter + } else { + Write-LogMessage -user $ExecutingUser -API $APIName -message "No webhook creation required for $($TenantFilter). Already exists" -Sev 'Info' -tenant $TenantFilter + } + return @{ success = $true; message = "Created Webhook subscription for $($TenantFilter) for the log $($EventType)" } + } catch { + if ($_.Exception.Message -like '*already exists*') { + return @{ success = $true; message = "Webhook exists for $($TenantFilter) for the log $($EventType)" } + Write-LogMessage -user $ExecutingUser -API $APIName -message "Webhook subscription for $($TenantFilter) already exists" -Sev 'Info' -tenant $TenantFilter + } else { + Remove-AzDataTableEntity @WebhookTable -Entity @{ PartitionKey = $TenantFilter; RowKey = $CIPPID } | Out-Null + Write-LogMessage -user $ExecutingUser -API $APIName -message "Failed to create Webhook Subscription for $($TenantFilter): $($_.Exception.Message)" -Sev 'Error' -tenant $TenantFilter + return @{ success = $false; message = "Failed to create Webhook Subscription for $($TenantFilter): $($_.Exception.Message)" } } } + } elseif ($PartnerCenter.IsPresent) { $WebhookFilter = "PartitionKey eq '$($env:TenantId)'" $ExistingWebhooks = Get-CIPPAzDataTableEntity @WebhookTable -Filter $WebhookFilter diff --git a/Modules/CIPPCore/Public/Remove-CIPPGraphSubscription.ps1 b/Modules/CIPPCore/Public/Remove-CIPPGraphSubscription.ps1 index 2847bdb24e99..88138b99ccc3 100644 --- a/Modules/CIPPCore/Public/Remove-CIPPGraphSubscription.ps1 +++ b/Modules/CIPPCore/Public/Remove-CIPPGraphSubscription.ps1 @@ -5,34 +5,52 @@ function Remove-CIPPGraphSubscription { $CIPPID, $APIName = 'Remove Graph Webhook', $Type, - $ExecutingUser + $EventType, + $ExecutingUser, + $Cleanup = $false ) try { - $WebhookTable = Get-CIPPTable -TableName webhookTable - if ($type -eq 'AuditLog') { - $WebhookRow = Get-CIPPAzDataTableEntity @WebhookTable | Where-Object { $_.PartitionKey -eq $TenantFilter } + if ($Cleanup) { + #list all subscriptions on the management API + $Subscriptions = New-GraphPOSTRequest -type GET -uri "https://manage.office.com/api/v1.0/$($TenantFilter)/activity/feed/subscriptions/list" -scope 'https://manage.office.com/.default' -tenantid $TenantFilter -verbose + foreach ($Sub in $Subscriptions | Where-Object { $_.webhook.address -like '*CIPP*' -and $_.webhook.address -notlike '*version=2*' }) { + Try { + $AuditLog = New-GraphPOSTRequest -uri "https://manage.office.com/api/v1.0/$($TenantFilter)/activity/feed/subscriptions/stop?contentType=$($sub.contentType)" -scope 'https://manage.office.com/.default' -tenantid $TenantFilter -type POST -body '{}' -verbose + Try { + $WebhookRow = Get-CIPPAzDataTableEntity @WebhookTable | Where-Object { $_.PartitionKey -eq $TenantFilter -and $_.Resource -eq $EventType -and $_.version -ne '2' } + $null = Remove-AzDataTableEntity @WebhookTable -Entity $Entity + } catch { + Write-LogMessage -user $ExecutingUser -API $APIName -message 'Deleted an audit log webhook that was already removed from CIPP' -Sev 'Info' -tenant $TenantFilter + + } + } catch { + Write-LogMessage -user $ExecutingUser -API $APIName -message "Failed to cleanup old audit logs: $($_.Exception.Message)" -Sev 'Error' -tenant $TenantFilter + } + } } else { - $WebhookRow = Get-CIPPAzDataTableEntity @WebhookTable | Where-Object { $_.RowKey -eq $CIPPID } - } - $Entity = $WebhookRow | Select-Object PartitionKey, RowKey - if ($Type -eq 'AuditLog') { - try { - foreach ($EventType in $WebhookRow.EventType) { + $WebhookTable = Get-CIPPTable -TableName webhookTable + if ($type -eq 'AuditLog') { + $WebhookRow = Get-CIPPAzDataTableEntity @WebhookTable | Where-Object { $_.PartitionKey -eq $TenantFilter -and $_.Resource -eq $EventType } + } else { + $WebhookRow = Get-CIPPAzDataTableEntity @WebhookTable | Where-Object { $_.RowKey -eq $CIPPID } + } + $Entity = $WebhookRow | Select-Object PartitionKey, RowKey + if ($Type -eq 'AuditLog') { + try { $AuditLog = New-GraphPOSTRequest -uri "https://manage.office.com/api/v1.0/$($TenantFilter)/activity/feed/subscriptions/stop?contentType=$($EventType)" -scope 'https://manage.office.com/.default' -tenantid $TenantFilter -type POST -body '{}' -verbose - } - } catch { - Write-LogMessage -user $ExecutingUser -API $APIName -message "Failed to remove webhook subscription at Microsoft's side: $($_.Exception.Message)" -Sev 'Error' -tenant $TenantFilter + } catch { + Write-LogMessage -user $ExecutingUser -API $APIName -message "Failed to remove webhook subscription at Microsoft's side: $($_.Exception.Message)" -Sev 'Error' -tenant $TenantFilter + } + $null = Remove-AzDataTableEntity @WebhookTable -Entity $Entity + } else { + $OldID = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscriptions' -tenantid $TenantFilter) | Where-Object { $_.notificationUrl -eq $WebhookRow.WebhookNotificationUrl } + $GraphRequest = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/subscriptions/$($oldId.ID)" -tenantid $TenantFilter -type DELETE -body {} -Verbose + $null = Remove-AzDataTableEntity @WebhookTable -Entity $Entity } - $null = Remove-AzDataTableEntity @WebhookTable -Entity $Entity - } else { - $OldID = (New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/subscriptions' -tenantid $TenantFilter) | Where-Object { $_.notificationUrl -eq $WebhookRow.WebhookNotificationUrl } - $GraphRequest = New-GraphPostRequest -uri "https://graph.microsoft.com/beta/subscriptions/$($oldId.ID)" -tenantid $TenantFilter -type DELETE -body {} -Verbose - $null = Remove-AzDataTableEntity @WebhookTable -Entity $Entity + return "Removed webhook subscription to $($WebhookRow.resource) for $($TenantFilter)" } - return "Removed webhook subscription to $($WebhookRow.resource) for $($TenantFilter)" - } catch { Write-LogMessage -user $ExecutingUser -API $APIName -message "Failed to renew Webhook Subscription: $($_.Exception.Message)" -Sev 'Error' -tenant $TenantFilter return "Failed to remove Webhook Subscription $($GraphRequest.value.notificationUrl): $($_.Exception.Message)" } -} \ No newline at end of file +} diff --git a/Modules/CIPPCore/Public/Remove-CIPPGroups.ps1 b/Modules/CIPPCore/Public/Remove-CIPPGroups.ps1 index aa9eeed5b90c..e37df34f2bf0 100644 --- a/Modules/CIPPCore/Public/Remove-CIPPGroups.ps1 +++ b/Modules/CIPPCore/Public/Remove-CIPPGroups.ps1 @@ -39,5 +39,9 @@ function Remove-CIPPGroups { "Could not remove $($using:Username) from group $($Groupname): $($_.Exception.Message). This is likely because its a Dynamic Group or synched with active directory" } } + if (!$Returnval) { + $Returnval = "$($Username) is not a member of any groups." + Write-LogMessage -user $ExecutingUser -API $APIName -message "$($Username) is not a member of any groups" -Sev 'Info' -tenant $TenantFilter + } return $Returnval } diff --git a/Modules/CIPPCore/Public/SAMManifest.json b/Modules/CIPPCore/Public/SAMManifest.json index f4ee6e523f9a..4fce3279465c 100644 --- a/Modules/CIPPCore/Public/SAMManifest.json +++ b/Modules/CIPPCore/Public/SAMManifest.json @@ -154,7 +154,10 @@ { "id": "b27a61ec-b99c-4d6a-b126-c4375d08ae30", "type": "Scope" }, { "id": "84bccea3-f856-4a8a-967b-dbe0a3d53a64", "type": "Scope" }, { "id": "280b3b69-0437-44b1-bc20-3b2fca1ee3e9", "type": "Scope" }, - { "id": "885f682f-a990-4bad-a642-36736a74b0c7", "type": "Scope" } + { "id": "885f682f-a990-4bad-a642-36736a74b0c7", "type": "Scope" }, + { "id": "913b9306-0ce1-42b8-9137-6a7df690a760", "type": "Role"}, + { "id": "cb8f45a0-5c2e-4ea1-b803-84b870a7d7ec", "type": "Scope"}, + { "id": "4c06a06a-098a-4063-868e-5dfee3827264", "type": "Scope"} ] }, { diff --git a/Modules/CIPPCore/Public/Set-CIPPAuthenticationPolicy.ps1 b/Modules/CIPPCore/Public/Set-CIPPAuthenticationPolicy.ps1 index 3e5c4b7a680f..380e7b2a4b30 100644 --- a/Modules/CIPPCore/Public/Set-CIPPAuthenticationPolicy.ps1 +++ b/Modules/CIPPCore/Public/Set-CIPPAuthenticationPolicy.ps1 @@ -21,7 +21,8 @@ function Set-CIPPAuthenticationPolicy { $CurrentInfo = New-GraphGetRequest -Uri "https://graph.microsoft.com/beta/policies/authenticationmethodspolicy/authenticationMethodConfigurations/$AuthenticationMethodId" -tenantid $Tenant $CurrentInfo.state = $State } catch { - Write-LogMessage -user $ExecutingUser -API $APIName -tenant $Tenant -message "Could not get CurrentInfo for $AuthenticationMethodId. Error:$($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -user $ExecutingUser -API $APIName -tenant $Tenant -message "Could not get CurrentInfo for $AuthenticationMethodId. Error:$ErrorMessage" -sev Error Return "Could not get CurrentInfo for $AuthenticationMethodId. Error:$($_.exception.message)" } @@ -117,7 +118,8 @@ function Set-CIPPAuthenticationPolicy { return "Set $AuthenticationMethodId state to $State $OptionalLogMessage" } catch { - Write-LogMessage -user $ExecutingUser -API $APIName -tenant $Tenant -message "Failed to $State $AuthenticationMethodId Support: $($_.exception.message)" -sev Error -LogData (Get-CippException -Exception $_) - return "Failed to $State $AuthenticationMethodId Support: $($_.exception.message)" + Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -user $ExecutingUser -API $APIName -tenant $Tenant -message "Failed to $State $AuthenticationMethodId Support: $ErrorMessage" -sev Error -LogData (Get-CippException -Exception $_) + return "Failed to $State $AuthenticationMethodId Support: $ErrorMessage" } } \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Set-CIPPDefaultAPDeploymentProfile.ps1 b/Modules/CIPPCore/Public/Set-CIPPDefaultAPDeploymentProfile.ps1 index 1d36a83e29d6..d953ee938285 100644 --- a/Modules/CIPPCore/Public/Set-CIPPDefaultAPDeploymentProfile.ps1 +++ b/Modules/CIPPCore/Public/Set-CIPPDefaultAPDeploymentProfile.ps1 @@ -50,14 +50,18 @@ function Set-CIPPDefaultAPDeploymentProfile { } } } + $Profiles = $Profiles[0] } if (!$Profiles) { if ($PSCmdlet.ShouldProcess($displayName, 'Add Autopilot profile')) { $GraphRequest = New-GraphPostRequest -uri 'https://graph.microsoft.com/beta/deviceManagement/windowsAutopilotDeploymentProfiles' -body $body -tenantid $tenantfilter Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APIName -tenant $($tenantfilter) -message "Added Autopilot profile $($displayname)" -Sev 'Info' } + } else { + $GraphRequest = $Profiles } - if ($AssignTo) { + + if ($AssignTo -eq $true) { $AssignBody = '{"target":{"@odata.type":"#microsoft.graph.allDevicesAssignmentTarget"}}' if ($PSCmdlet.ShouldProcess($AssignTo, "Assign Autopilot profile $displayname")) { $null = New-GraphPOSTRequest -uri "https://graph.microsoft.com/beta/deviceManagement/windowsAutopilotDeploymentProfiles/$($GraphRequest.id)/assignments" -tenantid $tenantfilter -type POST -body $AssignBody diff --git a/Modules/CIPPCore/Public/Set-CIPPProfilePhoto.ps1 b/Modules/CIPPCore/Public/Set-CIPPProfilePhoto.ps1 new file mode 100644 index 000000000000..5ea431302eec --- /dev/null +++ b/Modules/CIPPCore/Public/Set-CIPPProfilePhoto.ps1 @@ -0,0 +1,21 @@ +function Set-CIPPProfilePhoto { + [CmdletBinding()] + param( + $TenantFilter, + $id, + [ValidateSet('users', 'groups', 'teams')] + $type = 'users', + $ContentType = 'image/png', + $PhotoBase64, + $executingUser + ) + try { + $PhotoBytes = [Convert]::FromBase64String($PhotoBase64) + New-GraphPOSTRequest -uri "https://graph.microsoft.com/beta/$type/$id/photo/`$value" -tenantid $tenantfilter -type PUT -body $PhotoBytes -ContentType $ContentType + "Successfully set profile photo for $id" + Write-LogMessage -user $executingUser -API 'Set-CIPPUserProfilePhoto' -message "Successfully set profile photo for $id" -Sev 'Info' -tenant $TenantFilter + } catch { + "Failed to set profile photo for $id : $_" + Write-LogMessage -user $executingUser -API 'Set-CIPPUserProfilePhoto' -message "Failed to set profile photo for $id : $_" -Sev 'Error' -tenant $TenantFilter + } +} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Standards/Get-CIPPStandards.ps1 b/Modules/CIPPCore/Public/Standards/Get-CIPPStandards.ps1 index 11f4f51f1aaf..5b73e19eae98 100644 --- a/Modules/CIPPCore/Public/Standards/Get-CIPPStandards.ps1 +++ b/Modules/CIPPCore/Public/Standards/Get-CIPPStandards.ps1 @@ -1,7 +1,8 @@ function Get-CIPPStandards { param( [Parameter(Mandatory = $false)] - [string]$TenantFilter = 'allTenants' + [string]$TenantFilter = 'allTenants', + [switch]$ListAllTenants ) #Write-Host "Getting standards for tenant - $($tenantFilter)" @@ -16,39 +17,60 @@ function Get-CIPPStandards { $Tenants = $Tenants | Where-Object { $_.defaultDomainName -eq $TenantFilter -or $_.customerId -eq $TenantFilter } } - foreach ($Tenant in $Tenants) { - #Write-Host "`r`n###### Tenant: $($Tenant.defaultDomainName)" - $StandardsTenant = $Standards | Where-Object { $_.Tenant -eq $Tenant.defaultDomainName } - + if ($ListAllTenants.IsPresent) { $ComputedStandards = @{} - if ($StandardsTenant.Standards.OverrideAllTenants.remediate -ne $true) { - #Write-Host 'AllTenant Standards apply to this tenant.' - foreach ($StandardName in $StandardsAllTenants.Standards.PSObject.Properties.Name) { - $CurrentStandard = $StandardsAllTenants.Standards.$StandardName - #Write-Host ($CurrentStandard | ConvertTo-Json -Depth 10) - if ($CurrentStandard.remediate -eq $true -or $CurrentStandard.alert -eq $true -or $CurrentStandard.report -eq $true) { - #Write-Host "AllTenant Standard $StandardName" - $ComputedStandards[$StandardName] = $CurrentStandard - } + foreach ($StandardName in $StandardsAllTenants.Standards.PSObject.Properties.Name) { + $CurrentStandard = $StandardsAllTenants.Standards.$StandardName + #Write-Host ($CurrentStandard | ConvertTo-Json -Depth 10) + if ($CurrentStandard.remediate -eq $true -or $CurrentStandard.alert -eq $true -or $CurrentStandard.report -eq $true) { + #Write-Host "AllTenant Standard $StandardName" + $ComputedStandards[$StandardName] = $CurrentStandard + } + } + foreach ($Standard in $ComputedStandards.Keys) { + [pscustomobject]@{ + Tenant = 'AllTenants' + Standard = $Standard + Settings = $ComputedStandards.$Standard } } + } else { + foreach ($Tenant in $Tenants) { + #Write-Host "`r`n###### Tenant: $($Tenant.defaultDomainName)" + $StandardsTenant = $Standards | Where-Object { $_.Tenant -eq $Tenant.defaultDomainName } + + $ComputedStandards = @{} + if ($StandardsTenant.Standards.OverrideAllTenants.remediate -ne $true) { + #Write-Host 'AllTenant Standards apply to this tenant.' + foreach ($StandardName in $StandardsAllTenants.Standards.PSObject.Properties.Name) { + $CurrentStandard = $StandardsAllTenants.Standards.$StandardName + #Write-Host ($CurrentStandard | ConvertTo-Json -Depth 10) + if ($CurrentStandard.remediate -eq $true -or $CurrentStandard.alert -eq $true -or $CurrentStandard.report -eq $true) { + #Write-Host "AllTenant Standard $StandardName" + $ComputedStandards[$StandardName] = $CurrentStandard + } + } + } - foreach ($StandardName in $StandardsTenant.Standards.PSObject.Properties.Name) { - if ($StandardName -eq 'OverrideAllTenants') { continue } - $CurrentStandard = $StandardsTenant.Standards.$StandardName + foreach ($StandardName in $StandardsTenant.Standards.PSObject.Properties.Name) { + if ($StandardName -eq 'OverrideAllTenants') { continue } + $CurrentStandard = $StandardsTenant.Standards.$StandardName - if ($CurrentStandard.remediate -eq $true -or $CurrentStandard.alert -eq $true -or $CurrentStandard.report -eq $true) { - if (!$ComputedStandards[$StandardName] ) { - #Write-Host "Applying tenant level $StandardName" - $ComputedStandards[$StandardName] = $CurrentStandard - } else { - foreach ($Setting in $CurrentStandard.PSObject.Properties.Name) { - if ($CurrentStandard.$Setting -ne $false -and $CurrentStandard.$Setting -ne $ComputedStandards[$StandardName].$($Setting) -and [string]::IsNullOrEmpty($CurrentStandard.$Setting)) { - #Write-Host "Overriding $Setting for $StandardName at tenant level" - if ($ComputedStandards[$StandardName].PSObject.Properties.Name -contains $Setting) { - $ComputedStandards[$StandardName].$($Setting) = $CurrentStandard.$Setting - } else { - $ComputedStandards[$StandardName] | Add-Member -NotePropertyName $Setting -NotePropertyValue $CurrentStandard.$Setting + if ($CurrentStandard.remediate -eq $true -or $CurrentStandard.alert -eq $true -or $CurrentStandard.report -eq $true) { + #Write-Host "`r`nTenant: $StandardName" + if (!$ComputedStandards[$StandardName] ) { + #Write-Host "Applying tenant level $StandardName" + $ComputedStandards[$StandardName] = $CurrentStandard + } else { + foreach ($Setting in $CurrentStandard.PSObject.Properties.Name) { + #Write-Host "$Setting - Current: $($CurrentStandard.$Setting) | Computed: $($ComputedStandards[$StandardName].$($Setting))" + if ($CurrentStandard.$Setting -ne $false -and $CurrentStandard.$Setting -ne $ComputedStandards[$StandardName].$($Setting) -and ![string]::IsNullOrEmpty($CurrentStandard.$Setting)) { + #Write-Host "Overriding $Setting for $StandardName at tenant level" + if ($ComputedStandards[$StandardName].PSObject.Properties.Name -contains $Setting) { + $ComputedStandards[$StandardName].$($Setting) = $CurrentStandard.$Setting + } else { + $ComputedStandards[$StandardName] | Add-Member -NotePropertyName $Setting -NotePropertyValue $CurrentStandard.$Setting + } } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAPConfig.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAPConfig.ps1 index 84f58505ea12..6311c6680421 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAPConfig.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAPConfig.ps1 @@ -4,18 +4,19 @@ function Invoke-CIPPStandardAPConfig { Internal #> param($Tenant, $Settings) - If ($Settings.remediate -eq $true) { + If ($Settings.remediate -eq $true) { $APINAME = 'Standards' try { Write-Host $($settings | ConvertTo-Json -Depth 100) if ($settings.NotLocalAdmin -eq $true) { $usertype = 'Standard' } else { $usertype = 'Administrator' } $DeploymentMode = if ($settings.DeploymentMode -eq 'true') { 'shared' } else { 'singleUser' } - Set-CIPPDefaultAPDeploymentProfile -tenantFilter $tenant -displayname $settings.DisplayName -description $settings.Description -usertype $usertype -DeploymentMode $DeploymentMode -assignto $settings.AssignTo -devicenameTemplate $Settings.DeviceNameTemplate -allowWhiteGlove $Settings.allowWhiteGlove -CollectHash $Settings.CollectHash -hideChangeAccount $Settings.HideChangeAccount -hidePrivacy $Settings.HidePrivacy -hideTerms $Settings.HideTerms -Autokeyboard $Settings.Autokeyboard + Set-CIPPDefaultAPDeploymentProfile -tenantFilter $tenant -displayname $settings.DisplayName -description $settings.Description -usertype $usertype -DeploymentMode $DeploymentMode -assignto $settings.Assignto -devicenameTemplate $Settings.DeviceNameTemplate -allowWhiteGlove $Settings.allowWhiteGlove -CollectHash $Settings.CollectHash -hideChangeAccount $Settings.HideChangeAccount -hidePrivacy $Settings.HidePrivacy -hideTerms $Settings.HideTerms -Autokeyboard $Settings.Autokeyboard } catch { - #Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create Default Autopilot config: $($_.exception.message)" -sev 'Error' - throw $_.Exception.Message + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + #Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create Default Autopilot config: $ErrorMessage" -sev 'Error' + throw $ErrorMessage } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAPESP.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAPESP.ps1 index 5d40bdfdfaba..2749ec946573 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAPESP.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAPESP.ps1 @@ -9,7 +9,8 @@ function Invoke-CIPPStandardAPESP { try { Set-CIPPDefaultAPEnrollment -TenantFilter $Tenant -ShowProgress $Settings.ShowProgress -BlockDevice $Settings.blockDevice -AllowReset $Settings.AllowReset -EnableLog $Settings.EnableLog -ErrorMessage $Settings.ErrorMessage -TimeOutInMinutes $Settings.TimeOutInMinutes -AllowFail $Settings.AllowFail -OBEEOnly $Settings.OBEEOnly } catch { - throw $_.Exception.Message + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + throw $ErrorMessage } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardActivityBasedTimeout.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardActivityBasedTimeout.ps1 index 11093e73a29e..90d632232fe6 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardActivityBasedTimeout.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardActivityBasedTimeout.ps1 @@ -23,7 +23,8 @@ function Invoke-CIPPStandardActivityBasedTimeout { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Activity Based Timeout is already enabled' -sev Info } } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable Activity Based Timeout $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable Activity Based Timeout $ErrorMessage" -sev Error } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAddDKIM.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAddDKIM.ps1 index ec489153cf4e..b4673244d148 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAddDKIM.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAddDKIM.ps1 @@ -32,7 +32,8 @@ function Invoke-CIPPStandardAddDKIM { $BatchResults | ForEach-Object { if ($_.error) { $ErrorCounter ++ - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable DKIM. Error: $($_.Exception.Message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.error + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable DKIM. Error: $ErrorMessage" -sev Error } } # Set-domains @@ -48,7 +49,8 @@ function Invoke-CIPPStandardAddDKIM { $BatchResults = New-ExoBulkRequest -tenantid $tenant -cmdletArray @($Request) -useSystemMailbox $true $BatchResults | ForEach-Object { if ($_.error) { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set DKIM. Error: $($_.Exception.Message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.error + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set DKIM. Error: $ErrorMessage" -sev Error $ErrorCounter ++ } @@ -72,7 +74,7 @@ function Invoke-CIPPStandardAddDKIM { } if ($Settings.report -eq $true) { - if ($null -eq $NewDomains -and $null -eq $SetDomains) { $DKIMState = $true } else { $DKIMState = $false } + $DKIMState = if ($null -eq $NewDomains -and $null -eq $SetDomains) { $true } else { $false } Add-CIPPBPAField -FieldName 'DKIM' -FieldValue $DKIMState -StoreAs bool -Tenant $tenant } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAnonReportDisable.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAnonReportDisable.ps1 index f703045ad91f..411342e5ab3e 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAnonReportDisable.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAnonReportDisable.ps1 @@ -15,7 +15,8 @@ function Invoke-CIPPStandardAnonReportDisable { New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/beta/admin/reportSettings' -Type patch -Body '{"displayConcealedNames": false}' -ContentType 'application/json' -AsApp $true Write-LogMessage -API 'Standards' -tenant $tenant -message 'Anonymous Reports Disabled.' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable anonymous reports. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable anonymous reports. Error: $ErrorMessage" -sev Error } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAntiPhishPolicy.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAntiPhishPolicy.ps1 index fa1707346122..b96e9f47ec89 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAntiPhishPolicy.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAntiPhishPolicy.ps1 @@ -27,7 +27,7 @@ function Invoke-CIPPStandardAntiPhishPolicy { ($CurrentState.MailboxIntelligenceQuarantineTag -eq $Settings.MailboxIntelligenceQuarantineTag) if ($Settings.remediate -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Anti-phishing Policy already correctly configured' -sev Info } else { $cmdparams = @{ @@ -57,7 +57,8 @@ function Invoke-CIPPStandardAntiPhishPolicy { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Created Anti-phishing Policy' -sev Info } } catch { - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Anti-phishing Policy. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Anti-phishing Policy. Error: $ErrorMessage" -sev Error } } } @@ -65,7 +66,7 @@ function Invoke-CIPPStandardAntiPhishPolicy { if ($Settings.alert -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Anti-phishing Policy is enabled' -sev Info } else { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Anti-phishing Policy is not enabled' -sev Alert diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAtpPolicyForO365.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAtpPolicyForO365.ps1 index 3db0920e1538..e969b5ae062d 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAtpPolicyForO365.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAtpPolicyForO365.ps1 @@ -6,7 +6,7 @@ function Invoke-CIPPStandardAtpPolicyForO365 { param($Tenant, $Settings) $AtpPolicyForO365State = New-ExoRequest -tenantid $Tenant -cmdlet 'Get-AtpPolicyForO365' | - Select-Object EnableATPForSPOTeamsODB, EnableSafeDocs, AllowSafeDocsOpen + Select-Object EnableATPForSPOTeamsODB, EnableSafeDocs, AllowSafeDocsOpen $StateIsCorrect = if ( ($AtpPolicyForO365State.EnableATPForSPOTeamsODB -eq $true) -and @@ -15,27 +15,28 @@ function Invoke-CIPPStandardAtpPolicyForO365 { ) { $true } else { $false } if ($Settings.remediate -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Atp Policy For O365 already set.' -sev Info } else { $cmdparams = @{ EnableATPForSPOTeamsODB = $true - EnableSafeDocs = $true - AllowSafeDocsOpen = $Settings.AllowSafeDocsOpen + EnableSafeDocs = $true + AllowSafeDocsOpen = $Settings.AllowSafeDocsOpen } try { New-ExoRequest -tenantid $Tenant -cmdlet 'Set-AntiPhishPolicy' -cmdparams $cmdparams Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Updated Atp Policy For O365' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to set Atp Policy For O365. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to set Atp Policy For O365. Error: $ErrorMessage" -sev Error } } } if ($Settings.alert -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Atp Policy For O365 is enabled' -sev Info } else { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Atp Policy For O365 is not enabled' -sev Alert diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAuditLog.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAuditLog.ps1 index 80e6f0ca9a5c..fb68e60d11c7 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAuditLog.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAuditLog.ps1 @@ -42,6 +42,7 @@ function Invoke-CIPPStandardAuditLog { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Unified Audit Log is not enabled' -sev Alert } } + if ($Settings.report -eq $true) { Add-CIPPBPAField -FieldName 'AuditLog' -FieldValue $AuditLogEnabled -StoreAs bool -Tenant $tenant diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAutoExpandArchive.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAutoExpandArchive.ps1 index e7eb7107ee26..1763b0f83171 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAutoExpandArchive.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAutoExpandArchive.ps1 @@ -7,6 +7,8 @@ function Invoke-CIPPStandardAutoExpandArchive { $CurrentState = (New-ExoRequest -tenantid $Tenant -cmdlet 'Get-OrganizationConfig').AutoExpandingArchiveEnabled If ($Settings.remediate -eq $true) { + Write-Host 'Time to remediate' + if ($CurrentState) { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Auto Expanding Archive is already enabled.' -sev Info } else { @@ -14,7 +16,8 @@ function Invoke-CIPPStandardAutoExpandArchive { New-ExoRequest -tenantid $Tenant -cmdlet 'Set-OrganizationConfig' -cmdParams @{AutoExpandingArchive = $true } Write-LogMessage -API 'Standards' -tenant $tenant -message 'Added Auto Expanding Archive.' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Auto Expanding Archives. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Auto Expanding Archives. Error: $ErrorMessage" -sev Error } } } @@ -29,6 +32,7 @@ function Invoke-CIPPStandardAutoExpandArchive { } if ($Settings.report -eq $true) { + Add-CIPPBPAField -FieldName 'AutoExpandingArchive' -FieldValue $CurrentState -StoreAs bool -Tenant $tenant } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardBranding.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardBranding.ps1 new file mode 100644 index 000000000000..0fa6ed4b3813 --- /dev/null +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardBranding.ps1 @@ -0,0 +1,70 @@ +function Invoke-CIPPStandardBranding { + <# + .FUNCTIONALITY + Internal + #> + + param($Tenant, $Settings) + $TenantId = Get-Tenants | Where-Object -Property defaultDomainName -EQ $Tenant + + try { + $CurrentState = New-GraphGetRequest -Uri "https://graph.microsoft.com/beta/organization/$($TenantId.customerId)/branding/localizations/0" -tenantID $Tenant -AsApp $true + } catch { + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -Tenant $Tenant -Message "Could not get the branding for $Tenant. This tenant might not have premium licenses available: $ErrorMessage" -Sev Error + } + + $StateIsCorrect = ($CurrentState.signInPageText -eq $Settings.signInPageText) -and + ($CurrentState.usernameHintText -eq $Settings.usernameHintText) -and + ($CurrentState.loginPageTextVisibilitySettings.hideAccountResetCredentials -eq $Settings.hideAccountResetCredentials) -and + ($CurrentState.loginPageLayoutConfiguration.layoutTemplateType -eq $Settings.layoutTemplateType) -and + ($CurrentState.loginPageLayoutConfiguration.isHeaderShown -eq $Settings.isHeaderShown) -and + ($CurrentState.loginPageLayoutConfiguration.isFooterShown -eq $Settings.isFooterShown) + + If ($Settings.remediate -eq $true) { + if ($StateIsCorrect -eq $true) { + Write-LogMessage -API 'Standards' -Tenant $Tenant -Message "Branding is already applied correctly." -Sev Info + } else { + try { + $GraphRequest = @{ + tenantID = $Tenant + uri = "https://graph.microsoft.com/beta/organization/$($TenantId.customerId)/branding/localizations/0" + AsApp = $true + Type = 'PATCH' + ContentType = 'application/json; charset=utf-8' + Body = [pscustomobject]@{ + signInPageText = $Settings.signInPageText + usernameHintText = $Settings.usernameHintText + loginPageTextVisibilitySettings = [pscustomobject]@{ + hideAccountResetCredentials = $Settings.hideAccountResetCredentials + } + loginPageLayoutConfiguration = [pscustomobject]@{ + layoutTemplateType = $Settings.layoutTemplateType + isHeaderShown = $Settings.isHeaderShown + isFooterShown = $Settings.isFooterShown + } + } | ConvertTo-Json -Compress + } + New-GraphPostRequest @GraphRequest + Write-LogMessage -API 'Standards' -Tenant $Tenant -Message "Successfully updated branding." -Sev Info + } catch { + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -Tenant $Tenant -Message "Failed to update branding. Error: $($ErrorMessage)" -Sev Error + } + } + + } + + If ($Settings.alert -eq $true) { + + if ($StateIsCorrect -eq $true) { + Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Branding is correctly set.' -Sev Info + } else { + Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Branding is incorrectly set.' -Sev Alert + } + } + + If ($Settings.report -eq $true) { + Add-CIPPBPAField -FieldName 'Branding' -FieldValue [bool]$StateIsCorrect -StoreAs bool -Tenant $Tenant + } +} diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardConditionalAccess.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardConditionalAccess.ps1 index fb7e177126b2..4e7a3b0b34e0 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardConditionalAccess.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardConditionalAccess.ps1 @@ -16,7 +16,8 @@ function Invoke-CIPPStandardConditionalAccess { $JSONObj = (Get-AzDataTableEntity @Table -Filter $Filter).JSON $CAPolicy = New-CIPPCAPolicy -TenantFilter $tenant -state $request.body.NewState -RawJSON $JSONObj -Overwrite $true -APIName $APIName -ExecutingUser $request.headers.'x-ms-client-principal' -ReplacePattern 'displayName' } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create or update conditional access rule $($JSONObj.displayName): $($_.exception.message)" -sev 'Error' + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create or update conditional access rule $($JSONObj.displayName). Error: $ErrorMessage" -sev 'Error' } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDelegateSentItems.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDelegateSentItems.ps1 index c430a8d42358..0407d9b3555e 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDelegateSentItems.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDelegateSentItems.ps1 @@ -4,7 +4,8 @@ function Invoke-CIPPStandardDelegateSentItems { Internal #> param($Tenant, $Settings) - $Mailboxes = New-ExoRequest -tenantid $Tenant -cmdlet 'Get-Mailbox' -cmdParams @{ RecipientTypeDetails = @('UserMailbox', 'SharedMailbox') } | Where-Object { $_.MessageCopyForSendOnBehalfEnabled -eq $false -or $_.MessageCopyForSentAsEnabled -eq $false } + $Mailboxes = New-ExoRequest -tenantid $Tenant -cmdlet 'Get-Mailbox' -cmdParams @{ RecipientTypeDetails = @('UserMailbox', 'SharedMailbox') } | + Where-Object { $_.MessageCopyForSendOnBehalfEnabled -eq $false -or $_.MessageCopyForSentAsEnabled -eq $false } If ($Settings.remediate -eq $true) { @@ -21,12 +22,14 @@ function Invoke-CIPPStandardDelegateSentItems { $BatchResults = New-ExoBulkRequest -tenantid $tenant -cmdletArray $Request $BatchResults | ForEach-Object { if ($_.error) { - Write-Host "Failed to apply Delegate Sent Items Style to $($_.target) Error: $($_.error)" - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Delegate Sent Items Style to $($_.error.target) Error: $($_.error)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.error + Write-Host "Failed to apply Delegate Sent Items Style to $($_.target) Error: $ErrorMessage" + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Delegate Sent Items Style to $($_.error.target) Error: $ErrorMessage" -sev Error } } } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Delegate Sent Items Style. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Delegate Sent Items Style. Error: $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Delegate Sent Items Style already enabled.' -sev Info diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDeletedUserRentention.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDeletedUserRentention.ps1 index 830b8e9d3b5d..902e545d8a30 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDeletedUserRentention.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDeletedUserRentention.ps1 @@ -8,6 +8,8 @@ function Invoke-CIPPStandardDeletedUserRentention { $StateSetCorrectly = if ($CurrentInfo.deletedUserPersonalSiteRetentionPeriodInDays -eq 365) { $true } else { $false } If ($Settings.remediate -eq $true) { + Write-Host 'Time to remediate' + if ($StateSetCorrectly -eq $false) { try { $body = '{"deletedUserPersonalSiteRetentionPeriodInDays": 365}' @@ -15,7 +17,8 @@ function Invoke-CIPPStandardDeletedUserRentention { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Set deleted user rentention of OneDrive to 1 year' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set deleted user rentention of OneDrive to 1 year: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set deleted user rentention of OneDrive to 1 year. Error: $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Deleted user rentention of OneDrive is already set to 1 year' -sev Info diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDisableAddShortcutsToOneDrive.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDisableAddShortcutsToOneDrive.ps1 index 2b7e9454583c..d080ca55f0c5 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDisableAddShortcutsToOneDrive.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDisableAddShortcutsToOneDrive.ps1 @@ -4,7 +4,10 @@ function Invoke-CIPPStandardDisableAddShortcutsToOneDrive { Internal #> param($Tenant, $Settings) + If ($Settings.remediate -eq $true) { + Write-Host 'Time to remediate' + function GetTenantRequestXml { return @' param($Tenant, $Settings) - $CurrentSetting = New-GraphGetRequest -Uri "https://graph.microsoft.com/beta/organization/$tenant/settings/peopleInsights" -tenantid $Tenant -AsApp $true - + try { + # TODO This does not work without Global Admin permissions for some reason. Throws an "EXCEPTION: Tenant admin role is required" error. -Bobby + $CurrentSetting = New-GraphGetRequest -Uri "https://graph.microsoft.com/beta/organization/$Tenant/settings/peopleInsights" -tenantid $Tenant -AsApp $true + } catch { + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to get Viva insights settings. Error: $ErrorMessage" -sev Error + Exit + } + If ($Settings.remediate -eq $true) { - + Write-Host 'Time to remediate' + if ($CurrentSetting.isEnabledInOrganization -eq $false) { - Write-LogMessage -API 'Standards' -tenant $tenant -message 'Viva is already disabled.' -sev Info + Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Viva is already disabled.' -sev Info } else { try { - # TODO This does not work. Throws an "EXCEPTION: Tenant admin role is required" error. Cant figure out how to fix -Bobby - New-GraphPOSTRequest -Uri "https://graph.microsoft.com/beta/organization/$tenant/settings/peopleInsights" -tenantid $Tenant -AsApp $true -Type PATCH -Body '{"isEnabledInOrganization": false}' -ContentType 'application/json' - Write-LogMessage -API 'Standards' -tenant $tenant -message 'Disabled Viva insights' -sev Info + # TODO This does not work without Global Admin permissions for some reason. Throws an "EXCEPTION: Tenant admin role is required" error. -Bobby + New-GraphPOSTRequest -Uri "https://graph.microsoft.com/beta/organization/$Tenant/settings/peopleInsights" -tenantid $Tenant -AsApp $true -Type PATCH -Body '{"isEnabledInOrganization": false}' -ContentType 'application/json' + Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Disabled Viva insights' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable Viva for all users. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to disable Viva for all users. Error: $ErrorMessage" -sev Error } } } @@ -24,14 +33,14 @@ function Invoke-CIPPStandardDisableViva { if ($Settings.alert -eq $true) { if ($CurrentSetting.isEnabledInOrganization -eq $false) { - Write-LogMessage -API 'Standards' -tenant $tenant -message 'Viva is disabled' -sev Info + Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Viva is disabled' -sev Info } else { - Write-LogMessage -API 'Standards' -tenant $tenant -message 'Viva is not disabled' -sev Alert + Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Viva is not disabled' -sev Alert } } if ($Settings.report -eq $true) { - Add-CIPPBPAField -FieldName 'DisableViva' -FieldValue $CurrentSetting.isEnabledInOrganization -StoreAs bool -Tenant $tenant + Add-CIPPBPAField -FieldName 'DisableViva' -FieldValue $CurrentSetting.isEnabledInOrganization -StoreAs bool -Tenant $Tenant } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableAppConsentRequests.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableAppConsentRequests.ps1 index 604cc6044665..835d6a9dfe94 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableAppConsentRequests.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableAppConsentRequests.ps1 @@ -61,7 +61,8 @@ function Invoke-CIPPStandardEnableAppConsentRequests { Write-LogMessage -API 'Standards' -tenant $tenant -message "Enabled App consent admin requests for the following roles: $RoleNames" -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable App consent admin requests. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable App consent admin requests. Error: $ErrorMessage" -sev Error } } if ($Settings.alert -eq $true) { diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableCustomerLockbox.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableCustomerLockbox.ps1 index 891f0b02f04c..a7d8bd090172 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableCustomerLockbox.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableCustomerLockbox.ps1 @@ -15,10 +15,9 @@ function Invoke-CIPPStandardEnableCustomerLockbox { New-ExoRequest -tenantid $Tenant -cmdlet 'Set-OrganizationConfig' -cmdParams @{ CustomerLockboxEnabled = $true } -UseSystemMailbox $true Write-LogMessage -API 'Standards' -tenant $tenant -message 'Successfully enabled Customer Lockbox' -sev Info } - } catch [System.Management.Automation.RuntimeException] { - Write-LogMessage -API 'Standards' -tenant $tenant -message 'Failed to enable Customer Lockbox. E5 license required' -sev Error } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable Customer Lockbox. Error: $($_.Exception.Message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable Customer Lockbox. Error: $ErrorMessage" -sev Error } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableMailTips.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableMailTips.ps1 index f115d78ed483..516af7e005ed 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableMailTips.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableMailTips.ps1 @@ -10,21 +10,22 @@ function Invoke-CIPPStandardEnableMailTips { if ($Settings.remediate -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'All MailTips are already enabled.' -sev Info } else { try { New-ExoRequest -tenantid $Tenant -cmdlet 'Set-OrganizationConfig' -cmdparams @{ MailTipsAllTipsEnabled = $true; MailTipsExternalRecipientsTipsEnabled = $true; MailTipsGroupMetricsEnabled = $true; MailTipsLargeAudienceThreshold = $Settings.MailTipsLargeAudienceThreshold } Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Enabled all MailTips' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to enable all MailTips. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to enable all MailTips. Error: $ErrorMessage" -sev Error } } } if ($Settings.alert -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'All MailTips are enabled' -sev Info } else { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Not all MailTips are enabled' -sev Alert diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableMailboxAuditing.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableMailboxAuditing.ps1 index 4e8bce44e202..460569529242 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableMailboxAuditing.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableMailboxAuditing.ps1 @@ -14,7 +14,8 @@ function Invoke-CIPPStandardEnableMailboxAuditing { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Tenant level mailbox audit enabled' -sev Info $LogMessage = 'Tenant level mailbox audit enabled. ' } catch { - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to enable tenant level mailbox audit. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to enable tenant level mailbox audit. Error: $ErrorMessage" -sev Error } } else { $LogMessage = 'Tenant level mailbox audit already enabled. ' @@ -34,8 +35,9 @@ function Invoke-CIPPStandardEnableMailboxAuditing { $BatchResults = New-ExoBulkRequest -tenantid $tenant -cmdletArray $Request $BatchResults | ForEach-Object { if ($_.error) { - Write-Host "Failed to enable user level mailbox audit for $($_.target). Error: $($_.error)" - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to enable user level mailbox audit for $($_.target). Error: $($_.error)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.error + Write-Host "Failed to enable user level mailbox audit for $($_.target). Error: $ErrorMessage" + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to enable user level mailbox audit for $($_.target). Error: $ErrorMessage" -sev Error } } @@ -54,8 +56,9 @@ function Invoke-CIPPStandardEnableMailboxAuditing { $BatchResults = New-ExoBulkRequest -tenantid $tenant -cmdletArray $Request $BatchResults | ForEach-Object { if ($_.error) { - Write-Host "Failed to disable mailbox audit bypass for $($_.target). Error: $($_.error)" - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable mailbox audit bypass for $($_.target). Error: $($_.error)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.error + Write-Host "Failed to disable mailbox audit bypass for $($_.target). Error: $ErrorMessage" + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable mailbox audit bypass for $($_.target). Error: $ErrorMessage" -sev Error } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableOnlineArchiving.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableOnlineArchiving.ps1 index 6bdfb84af353..92e387dc07ef 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableOnlineArchiving.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableOnlineArchiving.ps1 @@ -29,12 +29,14 @@ function Invoke-CIPPStandardEnableOnlineArchiving { $BatchResults = New-ExoBulkRequest -tenantid $tenant -cmdletArray $Request $BatchResults | ForEach-Object { if ($_.error) { - Write-Host "Failed to Enable Online Archiving for $($_.Target). Error: $($_.error)" - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to Enable Online Archiving for $($_.Target). Error: $($_.error)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.error + Write-Host "Failed to Enable Online Archiving for $($_.Target). Error: $ErrorMessage" + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to Enable Online Archiving for $($_.Target). Error: $ErrorMessage" -sev Error } } } catch { - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to Enable Online Archiving for all accounts. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to Enable Online Archiving for all accounts. Error: $ErrorMessage" -sev Error } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExConnector.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExConnector.ps1 index c3fa08403a21..275cda358879 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExConnector.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExConnector.ps1 @@ -23,7 +23,8 @@ function Invoke-CIPPStandardExConnector { Write-LogMessage -API $APINAME -tenant $Tenant -message "Created transport rule for $($Tenant, $Settings)" -sev info } } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create or update Exchange Connector Rule: $($_.exception.message)" -sev 'Error' + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create or update Exchange Connector Rule: $ErrorMessage" -sev 'Error' } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExcludedfileExt.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExcludedfileExt.ps1 index 46b5a16b03dc..321c13c46ad8 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExcludedfileExt.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExcludedfileExt.ps1 @@ -31,7 +31,8 @@ function Invoke-CIPPStandardExcludedfileExt { $null = New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/beta/admin/sharepoint/settings' -AsApp $true -Type patch -Body $body -ContentType 'application/json' Write-LogMessage -API 'Standards' -tenant $tenant -message "Added $($Settings.ext) to excluded synced files" -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to add $($Settings.ext) to excluded synced files: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to add $($Settings.ext) to excluded synced files: $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message "Excluded synced files already contains $($Settings.ext)" -sev Info diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExternalMFATrusted.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExternalMFATrusted.ps1 index 6b94e6084f49..56b2338a6b8c 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExternalMFATrusted.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardExternalMFATrusted.ps1 @@ -22,7 +22,8 @@ function Invoke-CIPPStandardExternalMFATrusted { $null = New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/v1.0/policies/crossTenantAccessPolicy/default' -Type patch -Body $NewBody -ContentType 'application/json' Write-LogMessage -API 'Standards' -tenant $tenant -message "Set External MFA Trusted to $StateMessage." -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set External MFA Trusted to $StateMessage. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set External MFA Trusted to $StateMessage. Error: $ErrorMessage" -sev Error } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardGlobalQuarantineNotifications.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardGlobalQuarantineNotifications.ps1 new file mode 100644 index 000000000000..3f8d24cf35b8 --- /dev/null +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardGlobalQuarantineNotifications.ps1 @@ -0,0 +1,58 @@ +function Invoke-CIPPStandardGlobalQuarantineNotifications { + <# + .FUNCTIONALITY + Internal + #> + param ($Tenant, $Settings) + + # Exit if invalid state in the frontend is selected + try { + $WantedState = [timespan]$Settings.NotificationInterval + } catch { + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Invalid state selected for Global Quarantine Notifications. Error: $ErrorMessage" -sev Error + Exit + } + + $CurrentState = New-ExoRequest -tenantid $Tenant -cmdlet 'Get-QuarantinePolicy' -cmdParams @{ QuarantinePolicyType = 'GlobalQuarantinePolicy' } + + # This might take the cake on ugly hacky stuff i've done, + # but i just cant understand why the API returns the values it does and not a timespan like the equivalent powershell command does + # If you know why, please let me know -Bobby + $CurrentState.EndUserSpamNotificationFrequency = switch ($CurrentState.EndUserSpamNotificationFrequency) { + 'PT4H' { New-TimeSpan -Hours 4 } + 'P1D' { New-TimeSpan -Days 1 } + 'P7D' { New-TimeSpan -Days 7 } + Default { $null } + } + + if ($Settings.remediate -eq $true) { + + Write-Host 'Time to remediate' + if ($CurrentState.EndUserSpamNotificationFrequency -eq $WantedState) { + Write-LogMessage -API 'Standards' -tenant $tenant -message "Global Quarantine Notifications are already set to the desired value of $WantedState" -sev Info + } else { + try { + New-ExoRequest -tenantid $Tenant -cmdlet 'Set-QuarantinePolicy' -cmdParams @{Identity = $CurrentState.Identity; EndUserSpamNotificationFrequency = [string]$WantedState } -useSystemmailbox $true + Write-LogMessage -API 'Standards' -tenant $tenant -message "Set Global Quarantine Notifications to $WantedState" -sev Info + } catch { + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set Global Quarantine Notifications to $WantedState. Error: $ErrorMessage" -sev Error + } + } + } + + if ($Settings.alert -eq $true) { + + if ($CurrentState.EndUserSpamNotificationFrequency -eq $WantedState) { + Write-LogMessage -API 'Standards' -tenant $tenant -message "Global Quarantine Notifications are set to the desired value of $WantedState" -sev Info + } else { + Write-LogMessage -API 'Standards' -tenant $tenant -message "Global Quarantine Notifications are not set to the desired value of $WantedState" -sev Alert + } + } + + if ($Settings.report -eq $true) { + + Add-CIPPBPAField -FieldName 'GlobalQuarantineNotificationsSet' -FieldValue [string]$CurrentState.EndUserSpamNotificationFrequency -StoreAs string -Tenant $tenant + } +} \ No newline at end of file diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardGroupTemplate.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardGroupTemplate.ps1 index 9c90f355a04c..0249bc747b42 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardGroupTemplate.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardGroupTemplate.ps1 @@ -58,7 +58,8 @@ function Invoke-CIPPStandardGroupTemplate { } } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create group: $($_.exception.message)" -sev 'Error' + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create group: $ErrorMessage" -sev 'Error' } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardIntuneTemplate.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardIntuneTemplate.ps1 index ac65df6ff388..5a78adfa373a 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardIntuneTemplate.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardIntuneTemplate.ps1 @@ -108,7 +108,8 @@ function Invoke-CIPPStandardIntuneTemplate { } Write-LogMessage -API 'Standards' -tenant $tenant -message "Successfully added Intune Template policy for $($Tenant)" -sev 'Info' } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create or update Intune Template: $($_.exception.message)" -sev 'Error' + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to create or update Intune Template: $ErrorMessage" -sev 'Error' } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardMailContacts.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardMailContacts.ps1 index bbd3bcc18b08..563e76cdc4ff 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardMailContacts.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardMailContacts.ps1 @@ -30,10 +30,12 @@ function Invoke-CIPPStandardMailContacts { New-GraphPostRequest -tenantid $tenant -Uri "https://graph.microsoft.com/v1.0/organization/$($TenantID.id)" -asApp $true -Type patch -Body (ConvertTo-Json -InputObject $body) -ContentType 'application/json' Write-LogMessage -API 'Standards' -tenant $tenant -message 'Contact emails set.' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set contact emails: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set contact emails: $ErrorMessage" -sev Error } } } + if ($Settings.alert -eq $true) { if ($CurrentInfo.marketingNotificationEmails -eq $Contacts.MarketingContact) { diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardMalwareFilterPolicy.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardMalwareFilterPolicy.ps1 index 614ca0d32442..178c5b048861 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardMalwareFilterPolicy.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardMalwareFilterPolicy.ps1 @@ -23,18 +23,18 @@ function Invoke-CIPPStandardMalwareFilterPolicy { if ($Settings.remediate -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Malware Filter Policy already correctly configured' -sev Info } else { $cmdparams = @{ - EnableFileFilter = $true - FileTypeAction = $Settings.FileTypeAction - ZapEnabled = $true - QuarantineTag = $Settings.QuarantineTag - EnableInternalSenderAdminNotifications = $Settings.EnableInternalSenderAdminNotifications - InternalSenderAdminAddress = $Settings.InternalSenderAdminAddress - EnableExternalSenderAdminNotifications = $Settings.EnableExternalSenderAdminNotifications - ExternalSenderAdminAddress = $Settings.ExternalSenderAdminAddress + EnableFileFilter = $true + FileTypeAction = $Settings.FileTypeAction + ZapEnabled = $true + QuarantineTag = $Settings.QuarantineTag + EnableInternalSenderAdminNotifications = $Settings.EnableInternalSenderAdminNotifications + InternalSenderAdminAddress = $Settings.InternalSenderAdminAddress + EnableExternalSenderAdminNotifications = $Settings.EnableExternalSenderAdminNotifications + ExternalSenderAdminAddress = $Settings.ExternalSenderAdminAddress } try { @@ -48,14 +48,15 @@ function Invoke-CIPPStandardMalwareFilterPolicy { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Created Malware Filter Policy' -sev Info } } catch { - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Malware Filter Policy. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Malware Filter Policy. Error: $ErrorMessage" -sev Error } } } if ($Settings.alert -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Malware Filter Policy is enabled' -sev Info } else { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Malware Filter Policy is not enabled' -sev Alert diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardNudgeMFA.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardNudgeMFA.ps1 index d8ac22ff9cc1..473a75ab15c7 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardNudgeMFA.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardNudgeMFA.ps1 @@ -21,7 +21,8 @@ function Invoke-CIPPStandardNudgeMFA { $CurrentInfo.registrationEnforcement.authenticationMethodsRegistrationCampaign.state = $Settings.state $CurrentInfo.registrationEnforcement.authenticationMethodsRegistrationCampaign.snoozeDurationInDays = $Settings.snoozeDurationInDays } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to $($Settings.state) Authenticator App Nudge: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to $($Settings.state) Authenticator App Nudge: $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message "Authenticator App Nudge is already set to $($Settings.state) with a snooze duration of $($Settings.snoozeDurationInDays)" -sev Info diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOauthConsent.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOauthConsent.ps1 index 6f7f89afa33f..235feac18ab3 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOauthConsent.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOauthConsent.ps1 @@ -5,6 +5,7 @@ function Invoke-CIPPStandardOauthConsent { #> param($tenant, $settings) $State = New-GraphGetRequest -Uri 'https://graph.microsoft.com/beta/policies/authorizationPolicy/authorizationPolicy' -tenantid $tenant + $StateIsCorrect = if ($State.permissionGrantPolicyIdsAssignedToDefaultUserRole -eq 'managePermissionGrantsForSelf.cipp-consent-policy') { $true } else { $false } If ($Settings.remediate -eq $true) { $AllowedAppIdsForTenant = $Settings.AllowedApps -split ',' @@ -31,19 +32,19 @@ function Invoke-CIPPStandardOauthConsent { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Application Consent Mode has been enabled.' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Application Consent Mode Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Application Consent Mode Error: $ErrorMessage" -sev Error } } if ($Settings.alert -eq $true) { - if ($State.permissionGrantPolicyIdsAssignedToDefaultUserRole -eq 'managePermissionGrantsForSelf.cipp-consent-policy') { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Application Consent Mode is enabled.' -sev Info } else { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Application Consent Mode is not enabled.' -sev Alert } } if ($Settings.report -eq $true) { - if ($State.permissionGrantPolicyIdsAssignedToDefaultUserRole -eq 'managePermissionGrantsForSelf.cipp-consent-policy') { $UserQuota = $true } else { $UserQuota = $false } - Add-CIPPBPAField -FieldName 'OauthConsent' -FieldValue $UserQuota -StoreAs bool -Tenant $tenant + Add-CIPPBPAField -FieldName 'OauthConsent' -FieldValue $StateIsCorrect -StoreAs bool -Tenant $tenant } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOauthConsentLowSec.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOauthConsentLowSec.ps1 index f9acb24fd399..42814d48cfb6 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOauthConsentLowSec.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOauthConsentLowSec.ps1 @@ -13,7 +13,8 @@ function Invoke-CIPPStandardOauthConsentLowSec { } Write-LogMessage -API 'Standards' -tenant $tenant -message 'Application Consent Mode(microsoft-user-default-low) has been enabled.' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Application Consent Mode (microsoft-user-default-low) Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to apply Application Consent Mode (microsoft-user-default-low) Error: $ErrorMessage" -sev Error } } if ($Settings.alert -eq $true) { diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOutBoundSpamAlert.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOutBoundSpamAlert.ps1 index 5c2d82854118..a786a7d044b8 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOutBoundSpamAlert.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardOutBoundSpamAlert.ps1 @@ -14,7 +14,8 @@ function Invoke-CIPPStandardOutBoundSpamAlert { New-ExoRequest -tenantid $tenant -cmdlet 'Set-HostedOutboundSpamFilterPolicy' -cmdparams @{ Identity = 'Default'; NotifyOutboundSpam = $true; NotifyOutboundSpamRecipients = $Contacts } -useSystemMailbox $true Write-LogMessage -API 'Standards' -tenant $tenant -message "Set outbound spam filter alert to $($Contacts)" -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set outbound spam contact to $($Contacts). $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set outbound spam contact to $($Contacts). $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message "Outbound spam filter alert is already set to $($CurrentInfo.NotifyOutboundSpamRecipients)" -sev Info diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPWcompanionAppAllowedState.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPWcompanionAppAllowedState.ps1 index 02c2b337e7d0..22a46a14a2e4 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPWcompanionAppAllowedState.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPWcompanionAppAllowedState.ps1 @@ -32,7 +32,8 @@ function Invoke-CIPPStandardPWcompanionAppAllowedState { (New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy/authenticationMethodConfigurations/microsoftAuthenticator' -Type patch -Body $body -ContentType 'application/json') Write-LogMessage -API 'Standards' -tenant $tenant -message "Set companionAppAllowedState to $($Settings.state)." -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set companionAppAllowedState to $($Settings.state). Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set companionAppAllowedState to $($Settings.state). Error: $ErrorMessage" -sev Error } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPasswordExpireDisabled.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPasswordExpireDisabled.ps1 index b6e28f20a7b3..1e0daba708c2 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPasswordExpireDisabled.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPasswordExpireDisabled.ps1 @@ -21,7 +21,8 @@ function Invoke-CIPPStandardPasswordExpireDisabled { New-GraphPostRequest -type Patch -tenantid $Tenant -uri "https://graph.microsoft.com/v1.0/domains/$($_.id)" -body $Body Write-LogMessage -API 'Standards' -tenant $tenant -message "Disabled Password Expiration for $($_.id)." -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable Password Expiration for $($_.id). Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable Password Expiration for $($_.id). Error: $ErrorMessage" -sev Error } } } else { diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPhishProtection.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPhishProtection.ps1 index 8e8a764c65bd..8d0e37ffe6b0 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPhishProtection.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardPhishProtection.ps1 @@ -39,7 +39,8 @@ function Invoke-CIPPStandardPhishProtection { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Enabled Logon Screen Phishing Protection system' -sev Info } } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set Logon Screen Phishing Protection System for $($Tenant): $($_.Exception.Message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set Logon Screen Phishing Protection System for $($Tenant): $ErrorMessage" -sev Error } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardRotateDKIM.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardRotateDKIM.ps1 index b6eb1bcbd322..e149d3aec70d 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardRotateDKIM.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardRotateDKIM.ps1 @@ -14,7 +14,8 @@ function Invoke-CIPPStandardRotateDKIM { (New-ExoRequest -tenantid $tenant -cmdlet 'Rotate-DkimSigningConfig' -cmdparams @{ KeySize = 2048; Identity = $_.Identity } -useSystemMailbox $true) Write-LogMessage -API 'Standards' -tenant $tenant -message "Rotated DKIM for $($_.Identity)" -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to rotate DKIM Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to rotate DKIM Error: $ErrorMessage" -sev Error } } } else { diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeAttachmentPolicy.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeAttachmentPolicy.ps1 index dcfea2914646..24d6c424d036 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeAttachmentPolicy.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeAttachmentPolicy.ps1 @@ -19,7 +19,7 @@ function Invoke-CIPPStandardSafeAttachmentPolicy { if ($Settings.remediate -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Safe Attachment Policy already correctly configured' -sev Info } else { $cmdparams = @{ @@ -40,14 +40,15 @@ function Invoke-CIPPStandardSafeAttachmentPolicy { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Created Safe Attachment Policy' -sev Info } } catch { - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Safe Attachment Policy. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Safe Attachment Policy. Error: $ErrorMessage" -sev Error } } } if ($Settings.alert -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Safe Attachment Policy is enabled' -sev Info } else { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Safe Attachment Policy is not enabled' -sev Alert diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeLinksPolicy.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeLinksPolicy.ps1 index 9fb55e32e795..65471148d7c8 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeLinksPolicy.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeLinksPolicy.ps1 @@ -25,20 +25,20 @@ function Invoke-CIPPStandardSafeLinksPolicy { if ($Settings.remediate -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'SafeLink Policy already correctly configured' -sev Info } else { $cmdparams = @{ - EnableSafeLinksForEmail = $true - EnableSafeLinksForTeams = $true - EnableSafeLinksForOffice = $true - TrackClicks = $true - ScanUrls = $true - EnableForInternalSenders = $true - DeliverMessageAfterScan = $true - AllowClickThrough = $Settings.AllowClickThrough - DisableUrlRewrite = $Settings.DisableUrlRewrite - EnableOrganizationBranding = $Settings.EnableOrganizationBranding + EnableSafeLinksForEmail = $true + EnableSafeLinksForTeams = $true + EnableSafeLinksForOffice = $true + TrackClicks = $true + ScanUrls = $true + EnableForInternalSenders = $true + DeliverMessageAfterScan = $true + AllowClickThrough = $Settings.AllowClickThrough + DisableUrlRewrite = $Settings.DisableUrlRewrite + EnableOrganizationBranding = $Settings.EnableOrganizationBranding } try { @@ -52,14 +52,15 @@ function Invoke-CIPPStandardSafeLinksPolicy { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Created SafeLink Policy' -sev Info } } catch { - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create SafeLink Policy. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create SafeLink Policy. Error: $ErrorMessage" -sev Error } } } if ($Settings.alert -eq $true) { - if ($StateIsCorrect) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'SafeLink Policy is enabled' -sev Info } else { Write-LogMessage -API 'Standards' -tenant $Tenant -message 'SafeLink Policy is not enabled' -sev Alert diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeSendersDisable.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeSendersDisable.ps1 index 04a5a63543c2..4f01cbc8b55f 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeSendersDisable.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSafeSendersDisable.ps1 @@ -7,17 +7,31 @@ function Invoke-CIPPStandardSafeSendersDisable { If ($Settings.remediate -eq $true) { try { - $Mailboxes = New-ExoRequest -tenantid $Tenant -cmdlet 'Get-Mailbox' | ForEach-Object { - try { - $username = $_.UserPrincipalName - New-ExoRequest -tenantid $Tenant -cmdlet 'Set-MailboxJunkEmailConfiguration' -cmdParams @{Identity = $_.GUID ; TrustedRecipientsAndDomains = $null } -anchor $username - } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not disbale SafeSenders list for $($username): $($_.Exception.message)" -sev Warn + $Mailboxes = New-ExoRequest -tenantid $Tenant -cmdlet 'Get-Mailbox' -select 'UserPrincipalName' + $Request = $Mailboxes | ForEach-Object { + @{ + CmdletInput = @{ + CmdletName = 'Set-MailboxJunkEmailConfiguration' + Parameters = @{ + Identity = $_.UserPrincipalName + TrustedRecipientsAndDomains = $null + } + } + } + } + + $BatchResults = New-ExoBulkRequest -tenantid $tenant -cmdletArray $Request + $BatchResults | ForEach-Object { + if ($_.error) { + $ErrorMessage = Get-NormalizedError -Message $_.error + Write-Host "Failed to Disable SafeSenders for $($_.target). Error: $ErrorMessage" + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to Disable SafeSenders for $($_.target). Error: $ErrorMessage" -sev Error } } Write-LogMessage -API 'Standards' -tenant $tenant -message 'Safe Senders disabled' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable SafeSenders. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable SafeSenders. Error: $ErrorMessage" -sev Error } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSecurityDefaults.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSecurityDefaults.ps1 index 3b5d2acb4001..10b41322367d 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSecurityDefaults.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSecurityDefaults.ps1 @@ -15,7 +15,8 @@ function Invoke-CIPPStandardSecurityDefaults { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Enabled Security Defaults.' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable Security Defaults. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable Security Defaults. Error: $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Security Defaults is already enabled.' -sev Info diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSendFromAlias.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSendFromAlias.ps1 index b98708679fa1..ce7d56f76454 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSendFromAlias.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSendFromAlias.ps1 @@ -13,7 +13,8 @@ function Invoke-CIPPStandardSendFromAlias { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Send from alias enabled.' -sev Info $CurrentInfo = $true } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable send from alias. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable send from alias. Error: $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Send from alias is already enabled.' -sev Info diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSendReceiveLimitTenant.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSendReceiveLimitTenant.ps1 index 90924c9028bd..ef65fb0b9c56 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSendReceiveLimitTenant.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSendReceiveLimitTenant.ps1 @@ -27,7 +27,8 @@ function Invoke-CIPPStandardSendReceiveLimitTenant { } Write-LogMessage -API 'Standards' -tenant $tenant -message "Successfully set the tenant send($($Settings.SendLimit)MB) and receive($($Settings.ReceiveLimit)MB) limits" -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set the tenant send and receive limits. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set the tenant send and receive limits. Error: $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message "The tenant send($($Settings.SendLimit)MB) and receive($($Settings.ReceiveLimit)MB) limits are already set correctly" -sev Info diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSpoofWarn.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSpoofWarn.ps1 index f18f805ce086..54acd8ffed62 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSpoofWarn.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSpoofWarn.ps1 @@ -19,7 +19,8 @@ function Invoke-CIPPStandardSpoofWarn { New-ExoRequest -tenantid $Tenant -cmdlet 'Set-ExternalInOutlook' -cmdParams @{ Enabled = $status; } Write-LogMessage -API 'Standards' -tenant $tenant -message "Outlook external spoof warnings set to $status." -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set Outlook external spoof warnings to $status. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set Outlook external spoof warnings to $status. Error: $ErrorMessage" -sev Error } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardTenantDefaultTimezone.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardTenantDefaultTimezone.ps1 index 2388bdaa7a85..a9bb46c8f53e 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardTenantDefaultTimezone.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardTenantDefaultTimezone.ps1 @@ -6,25 +6,27 @@ function Invoke-CIPPStandardTenantDefaultTimezone { param($Tenant, $Settings) $CurrentState = New-GraphGetRequest -Uri 'https://graph.microsoft.com/beta/admin/sharepoint/settings' -tenantid $Tenant -AsApp $true - $StateIsCorrect = $CurrentState.tenantDefaultTimezone -eq $Settings.Timezone + $ExpectedTimezone = $Settings.Timezone.value + $StateIsCorrect = $CurrentState.tenantDefaultTimezone -eq $ExpectedTimezone If ($Settings.remediate -eq $true) { - if ($StateIsCorrect) { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Tenant Default Timezone is already set to $($Settings.Timezone)" -sev Info + if ($StateIsCorrect -eq $true) { + Write-LogMessage -API 'Standards' -tenant $tenant -message "Tenant Default Timezone is already set to $ExpectedTimezone" -sev Info } else { try { - New-GraphPostRequest -tenantid $tenant -uri 'https://graph.microsoft.com/beta/admin/sharepoint/settings' -AsApp $true -Type PATCH -Body "{`"tenantDefaultTimezone`": `"$($Settings.Timezone)`"}" -ContentType 'application/json' - Write-LogMessage -API 'Standards' -tenant $tenant -message "Updated Tenant Default Timezone to $($Settings.Timezone)" -sev Info + New-GraphPostRequest -tenantid $tenant -uri 'https://graph.microsoft.com/beta/admin/sharepoint/settings' -AsApp $true -Type PATCH -Body "{`"tenantDefaultTimezone`": `"$ExpectedTimezone`"}" -ContentType 'application/json' + Write-LogMessage -API 'Standards' -tenant $tenant -message "Successfully updated Tenant Default Timezone to $ExpectedTimezone" -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set Tenant Default Timezone. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set Tenant Default Timezone. Error: $ErrorMessage" -sev Error } } } if ($Settings.alert -eq $true) { - if ($StateIsCorrect) { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Tenant Default Timezone is set to $($Settings.Timezone)." -sev Info + if ($StateIsCorrect -eq $true) { + Write-LogMessage -API 'Standards' -tenant $tenant -message "Tenant Default Timezone is set to $ExpectedTimezone." -sev Info } else { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Tenant Default Timezone is not set to the desired value.' -sev Alert } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardTransportRuleTemplate.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardTransportRuleTemplate.ps1 index 7158f550154d..83372682cbac 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardTransportRuleTemplate.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardTransportRuleTemplate.ps1 @@ -28,7 +28,8 @@ function Invoke-CIPPStandardTransportRuleTemplate { Write-LogMessage -API $APINAME -tenant $Tenant -message "Created transport rule for $($tenantfilter)" -sev 'Debug' } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not create transport rule for $($tenantfilter): $($_.Exception.message)" -sev 'Error' + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not create transport rule for $($tenantfilter): $ErrorMessage" -sev 'Error' } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardUndoOauth.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardUndoOauth.ps1 index 6607f851d480..51cef2225307 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardUndoOauth.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardUndoOauth.ps1 @@ -6,7 +6,6 @@ function Invoke-CIPPStandardUndoOauth { param($Tenant, $Settings) $CurrentState = New-GraphGetRequest -tenantid $Tenant -Uri 'https://graph.microsoft.com/beta/policies/authorizationPolicy/authorizationPolicy?$select=permissionGrantPolicyIdsAssignedToDefaultUserRole' $State = if ($CurrentState.permissionGrantPolicyIdsAssignedToDefaultUserRole -eq 'ManagePermissionGrantsForSelf.microsoft-user-default-legacy') { $true } else { $false } - $State If ($Settings.remediate -eq $true) { @@ -18,7 +17,8 @@ function Invoke-CIPPStandardUndoOauth { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Application Consent Mode has been disabled.' -sev Info $CurrentState.permissionGrantPolicyIdsAssignedToDefaultUserRole = 'ManagePermissionGrantsForSelf.microsoft-user-default-legacy' } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set Application Consent Mode to disabled. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set Application Consent Mode to disabled. Error: $ErrorMessage" -sev Error } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardUserSubmissions.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardUserSubmissions.ps1 index 44401e0aba6e..c4c15c525441 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardUserSubmissions.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardUserSubmissions.ps1 @@ -24,7 +24,8 @@ function Invoke-CIPPStandardUserSubmissions { Write-LogMessage -API 'Standards' -tenant $tenant -message "User Submission policy set to $status." -sev Info } } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set User Submission policy to $status. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set User Submission policy to $status. Error: $ErrorMessage" -sev Error } } else { # Policy is not set correctly, disable the policy. @@ -36,7 +37,8 @@ function Invoke-CIPPStandardUserSubmissions { Write-LogMessage -API 'Standards' -tenant $tenant -message "User Submission policy set to $status." -sev Info } } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set User Submission policy to $status. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Could not set User Submission policy to $status. Error: $ErrorMessage" -sev Error } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardcalDefault.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardcalDefault.ps1 index 829a18543092..6c94488a32d8 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardcalDefault.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardcalDefault.ps1 @@ -36,12 +36,14 @@ function Invoke-CIPPStandardcalDefault { Write-LogMessage -API 'Standards' -tenant $Tenant -message "Set default folder permission for $($Mailbox.UserPrincipalName):\$($_.Name) to $($Settings.permissionlevel)" -sev Debug $SuccessCounter++ } catch { - Write-Host "Setting cal failed: $($_.exception.message)" - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Could not set default calendar permissions for $($Mailbox.UserPrincipalName). Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-Host "Setting cal failed: $ErrorMessage" + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Could not set default calendar permissions for $($Mailbox.UserPrincipalName). Error: $ErrorMessage" -sev Error } } } catch { - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Could not set default calendar permissions for $($Mailbox.UserPrincipalName). Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Could not set default calendar permissions for $($Mailbox.UserPrincipalName). Error: $ErrorMessage" -sev Error } $processedMailboxes++ if ($processedMailboxes % 25 -eq 0) { diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandarddisableMacSync.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandarddisableMacSync.ps1 index 6f93e4160d97..8b1203113522 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandarddisableMacSync.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandarddisableMacSync.ps1 @@ -14,7 +14,8 @@ function Invoke-CIPPStandarddisableMacSync { New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/beta/admin/sharepoint/settings' -AsApp $true -Type patch -Body $body -ContentType 'application/json' Write-LogMessage -API 'Standards' -tenant $tenant -message 'Disabled Mac OneDrive Sync' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable Mac OneDrive Sync: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable Mac OneDrive Sync: $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Mac OneDrive Sync is already disabled' -sev Info diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardfwdAdminAlerts.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardfwdAdminAlerts.ps1 index c3bfc78d2819..344e75fd3e19 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardfwdAdminAlerts.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardfwdAdminAlerts.ps1 @@ -6,6 +6,6 @@ function Invoke-CIPPStandardfwdAdminAlerts { param($Tenant, $Settings) If ($Settings.remediate -eq $true) { - #This isn't done yet. + # TODO This isn't done yet. } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneDeviceReg.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneDeviceReg.ps1 index 446dd5036cd0..e261dbfb859c 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneDeviceReg.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneDeviceReg.ps1 @@ -5,31 +5,36 @@ function Invoke-CIPPStandardintuneDeviceReg { #> param($Tenant, $Settings) $PreviousSetting = New-GraphGetRequest -uri 'https://graph.microsoft.com/beta/policies/deviceRegistrationPolicy' -tenantid $Tenant + $StateIsCorrect = if ($PreviousSetting.userDeviceQuota -eq $Settings.max) { $true } else { $false } If ($Settings.remediate -eq $true) { + if ($PreviousSetting.userDeviceQuota -eq $Settings.max) { Write-LogMessage -API 'Standards' -tenant $tenant -message "User device quota is already set to $($Settings.max)" -sev Info } else { try { $PreviousSetting.userDeviceQuota = $Settings.max - $Newbody = ConvertTo-Json -Compress -InputObject $PreviousSetting + $Newbody = ConvertTo-Json -Compress -InputObject $PreviousSetting -Depth 5 $null = New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/beta/policies/deviceRegistrationPolicy' -Type PUT -Body $NewBody -ContentType 'application/json' Write-LogMessage -API 'Standards' -tenant $tenant -message "Set user device quota to $($Settings.max)" -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set user device quota to $($Settings.max) : $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set user device quota to $($Settings.max) : $ErrorMessage" -sev Error } } } + if ($Settings.alert -eq $true) { - if ($PreviousSetting.userDeviceQuota -eq $Settings.max) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $tenant -message "User device quota is set to $($Settings.max)" -sev Info } else { Write-LogMessage -API 'Standards' -tenant $tenant -message "User device quota is not set to $($Settings.max)" -sev Alert } } + if ($Settings.report -eq $true) { - if ($PreviousSetting.userDeviceQuota -eq $Settings.max) { $UserQuota = $true } else { $UserQuota = $false } - Add-CIPPBPAField -FieldName 'intuneDeviceReg' -FieldValue $UserQuota -StoreAs bool -Tenant $tenant + + Add-CIPPBPAField -FieldName 'intuneDeviceReg' -FieldValue $StateIsCorrect -StoreAs bool -Tenant $tenant } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneDeviceRetirementDays.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneDeviceRetirementDays.ps1 index b0b188aac679..8f5a1dc0ef46 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneDeviceRetirementDays.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneDeviceRetirementDays.ps1 @@ -5,6 +5,7 @@ function Invoke-CIPPStandardintuneDeviceRetirementDays { #> param($Tenant, $Settings) $CurrentInfo = (New-GraphGetRequest -Uri 'https://graph.microsoft.com/beta/deviceManagement/managedDeviceCleanupSettings' -tenantid $Tenant) + $StateIsCorrect = if ($PreviousSetting.DeviceInactivityBeforeRetirementInDays -eq $Settings.days) { $true } else { $false } If ($Settings.remediate -eq $true) { @@ -16,14 +17,15 @@ function Invoke-CIPPStandardintuneDeviceRetirementDays { (New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/beta/deviceManagement/managedDeviceCleanupSettings' -Type PATCH -Body $body -ContentType 'application/json') Write-LogMessage -API 'Standards' -tenant $tenant -message "Enabled DeviceInactivityBeforeRetirementInDays for $($Settings.days) days." -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable DeviceInactivityBeforeRetirementInDays. Error: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to enable DeviceInactivityBeforeRetirementInDays. Error: $ErrorMessage" -sev Error } } } if ($Settings.alert -eq $true) { - if ($CurrentInfo.DeviceInactivityBeforeRetirementInDays -eq $Settings.days) { + if ($StateIsCorrect -eq $true) { Write-LogMessage -API 'Standards' -tenant $tenant -message 'DeviceInactivityBeforeRetirementInDays is enabled.' -sev Info } else { Write-LogMessage -API 'Standards' -tenant $tenant -message 'DeviceInactivityBeforeRetirementInDays is not enabled.' -sev Alert @@ -31,8 +33,7 @@ function Invoke-CIPPStandardintuneDeviceRetirementDays { } if ($Settings.report -eq $true) { - $UserQuota = if ($PreviousSetting.DeviceInactivityBeforeRetirementInDays -eq $Settings.days) { $true } else { $false } - Add-CIPPBPAField -FieldName 'intuneDeviceRetirementDays' -FieldValue $UserQuota -StoreAs bool -Tenant $tenant + Add-CIPPBPAField -FieldName 'intuneDeviceRetirementDays' -FieldValue $StateIsCorrect -StoreAs bool -Tenant $tenant } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneRequireMFA.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneRequireMFA.ps1 index 4fb519f8ffe2..9698085e6cb7 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneRequireMFA.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardintuneRequireMFA.ps1 @@ -17,7 +17,8 @@ function Invoke-CIPPStandardintuneRequireMFA { New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/beta/policies/deviceRegistrationPolicy' -Type PUT -Body $NewBody -ContentType 'application/json' Write-LogMessage -API 'Standards' -tenant $tenant -message 'Set required to use MFA when joining/registering Entra Devices' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set require to use MFA when joining/registering Entra Devices: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set require to use MFA when joining/registering Entra Devices: $ErrorMessage" -sev Error } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardlaps.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardlaps.ps1 index ee3a5e14611c..84f24cffa73d 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardlaps.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardlaps.ps1 @@ -17,8 +17,9 @@ function Invoke-CIPPStandardlaps { New-GraphPostRequest -tenantid $Tenant -Uri 'https://graph.microsoft.com/beta/policies/deviceRegistrationPolicy' -Type PUT -Body $NewBody -ContentType 'application/json' Write-LogMessage -API 'Standards' -tenant $Tenant -message 'LAPS has been enabled.' -sev Info } catch { + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message $PreviousSetting.localAdminPassword.isEnabled = $false - Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to enable LAPS: $($_.exception.message)" -sev Error + Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to enable LAPS: $ErrorMessage" -sev Error } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardsharingCapability.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardsharingCapability.ps1 index 9dc1dac6e9fa..cbe6519ce66f 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardsharingCapability.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardsharingCapability.ps1 @@ -20,7 +20,8 @@ function Invoke-CIPPStandardsharingCapability { $null = New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/beta/admin/sharepoint/settings' -AsApp $true -Type patch -Body "{`"sharingCapability`":`"$($Settings.Level)`"}" -ContentType 'application/json' Write-LogMessage -API 'Standards' -tenant $tenant -message "Set sharing level to $($Settings.Level) from $($CurrentInfo.sharingCapability)" -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set sharing level to $($Settings.Level): $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to set sharing level to $($Settings.Level): $ErrorMessage" -sev Error } } } diff --git a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardunmanagedSync.ps1 b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardunmanagedSync.ps1 index 48df11eb0840..8a234d8eff2a 100644 --- a/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardunmanagedSync.ps1 +++ b/Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardunmanagedSync.ps1 @@ -14,7 +14,8 @@ function Invoke-CIPPStandardunmanagedSync { #$null = New-GraphPostRequest -tenantid $tenant -Uri 'https://graph.microsoft.com/beta/admin/sharepoint/settings' -AsApp $true -Type patch -Body $body -ContentType 'application/json' Write-LogMessage -API 'Standards' -tenant $tenant -message 'The unmanaged Sync standard has been temporarily disabled.' -sev Info } catch { - Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable Sync for unmanaged devices: $($_.exception.message)" -sev Error + $ErrorMessage = Get-NormalizedError -Message $_.Exception.Message + Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to disable Sync for unmanaged devices: $ErrorMessage" -sev Error } } else { Write-LogMessage -API 'Standards' -tenant $tenant -message 'Sync for unmanaged devices is already disabled' -sev Info diff --git a/Modules/CIPPCore/Public/Test-CIPPAccessPermissions.ps1 b/Modules/CIPPCore/Public/Test-CIPPAccessPermissions.ps1 index 110f2fde20e4..f8a83a85bcaf 100644 --- a/Modules/CIPPCore/Public/Test-CIPPAccessPermissions.ps1 +++ b/Modules/CIPPCore/Public/Test-CIPPAccessPermissions.ps1 @@ -7,6 +7,7 @@ function Test-CIPPAccessPermissions { ) Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message 'Started permissions check' -Sev 'Debug' $Messages = [System.Collections.Generic.List[string]]::new() + $ErrorMessages = [System.Collections.Generic.List[string]]::new() $MissingPermissions = [System.Collections.Generic.List[string]]::new() $Links = [System.Collections.Generic.List[object]]::new() $AccessTokenDetails = [PSCustomObject]@{ @@ -41,7 +42,7 @@ function Test-CIPPAccessPermissions { Write-Host 'Setting success to false due to nonmaching token.' $Success = $false - $Messages.Add('Your refresh token does not match key vault, clear your cache or wait 30 minutes.') | Out-Null + $ErrorMessages.Add('Your refresh token does not match key vault, clear your cache or wait 30 minutes.') | Out-Null $Links.Add([PSCustomObject]@{ Text = 'Clear Token Cache' Href = 'https://docs.cipp.app/setup/installation/cleartokencache' @@ -69,7 +70,7 @@ function Test-CIPPAccessPermissions { } if ($AccessTokenDetails.Name -eq '') { - $Messages.Add('Your refresh token is invalid, check for line breaks or missing characters.') | Out-Null + $ErrorMessages.Add('Your refresh token is invalid, check for line breaks or missing characters.') | Out-Null Write-Host 'Setting success to false invalid token.' $Success = $false @@ -77,7 +78,7 @@ function Test-CIPPAccessPermissions { if ($AccessTokenDetails.AuthMethods -contains 'mfa') { $Messages.Add('Your access token contains the MFA claim.') | Out-Null } else { - $Messages.Add('Your access token does not contain the MFA claim, Refresh your SAM tokens.') | Out-Null + $ErrorMessages.Add('Your access token does not contain the MFA claim, Refresh your SAM tokens.') | Out-Null Write-Host 'Setting success to False due to invalid list of claims.' $Success = $false @@ -108,15 +109,19 @@ function Test-CIPPAccessPermissions { } catch { Write-LogMessage -user $request.headers.'x-ms-client-principal' -API $APINAME -message "Permissions check failed: $($_) " -Sev 'Error' - $Messages.Add("We could not connect to the API to retrieve the permissions. There might be a problem with the secure application model configuration. The returned error is: $(Get-NormalizedError -message $_)") | Out-Null + $ErrorMessages.Add("We could not connect to the API to retrieve the permissions. There might be a problem with the secure application model configuration. The returned error is: $(Get-NormalizedError -message $_)") | Out-Null Write-Host 'Setting success to False due to not being able to connect.' $Success = $false } + if ($Success -eq $true) { + $Messages.Add('No service account issues have been found. CIPP is ready for use.') | Out-Null + } return [PSCustomObject]@{ AccessTokenDetails = $AccessTokenDetails Messages = @($Messages) + ErrorMessages = @($ErrorMessages) MissingPermissions = @($MissingPermissions) Links = @($Links) Success = $Success diff --git a/Modules/CippExtensions/NinjaOne/Get-NinjaOneToken.ps1 b/Modules/CippExtensions/NinjaOne/Get-NinjaOneToken.ps1 index 0b1692148531..d4cb86838ed5 100644 --- a/Modules/CippExtensions/NinjaOne/Get-NinjaOneToken.ps1 +++ b/Modules/CippExtensions/NinjaOne/Get-NinjaOneToken.ps1 @@ -1,13 +1,18 @@ function Get-NinjaOneToken { [CmdletBinding()] param ( - $Configuration + $Configuration ) if (!$ENV:NinjaClientSecret) { - $null = Connect-AzAccount -Identity - $ClientSecret = (Get-AzKeyVaultSecret -VaultName $ENV:WEBSITE_DEPLOYMENT_ID -Name 'NinjaOne' -AsPlainText) + if ($env:AzureWebJobsStorage -eq 'UseDevelopmentStorage=true') { + $DevSecretsTable = Get-CIPPTable -tablename 'DevSecrets' + $ClientSecret = (Get-CIPPAzDataTableEntity @DevSecretsTable -Filter "PartitionKey eq 'NinjaOne' and RowKey eq 'NinjaOne'").APIKey + } else { + $null = Connect-AzAccount -Identity + $ClientSecret = (Get-AzKeyVaultSecret -VaultName $ENV:WEBSITE_DEPLOYMENT_ID -Name 'NinjaOne' -AsPlainText) + } } else { $ClientSecret = $ENV:NinjaClientSecret } @@ -21,7 +26,7 @@ function Get-NinjaOneToken { } try { - + $token = Invoke-RestMethod -Uri "https://$($Configuration.Instance -replace '/ws','')/ws/oauth/token" -Method Post -Body $body -ContentType 'application/x-www-form-urlencoded' } catch { $Message = if ($_.ErrorDetails.Message) { @@ -29,7 +34,7 @@ function Get-NinjaOneToken { } else { $_.Exception.message } - Write-LogMessage -Message $Message -sev error -API 'NinjaOne' + Write-LogMessage -Message $Message -sev error -API 'NinjaOne' } return $token diff --git a/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneExtensionScheduler.ps1 b/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneExtensionScheduler.ps1 index bdc8a35137c7..1faf7d92c833 100644 --- a/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneExtensionScheduler.ps1 +++ b/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneExtensionScheduler.ps1 @@ -32,11 +32,6 @@ function Invoke-NinjaOneExtensionScheduler { if ($Null -eq $LastRunTime -or $LastRunTime -le (Get-Date).addhours(-25) -or $TimeSetting -eq $CurrentInterval) { Write-Host 'Executing' $Batch = foreach ($Tenant in $TenantsToProcess | Sort-Object lastEndTime) { - <#Push-OutputBinding -Name NinjaProcess -Value @{ - 'NinjaAction' = 'SyncTenant' - 'MappedTenant' = $Tenant - } - Start-Sleep -Seconds 1#> [PSCustomObject]@{ 'NinjaAction' = 'SyncTenant' 'MappedTenant' = $Tenant @@ -79,10 +74,6 @@ function Invoke-NinjaOneExtensionScheduler { } $CatchupTenants = $TenantsToProcess | Where-Object { (((($_.lastEndTime -eq $Null) -or ($_.lastStartTime -gt $_.lastEndTime)) -and ($_.lastStartTime -lt (Get-Date).AddMinutes(-30)))) -or ($_.lastStartTime -lt $LastRunTime) } $Batch = foreach ($Tenant in $CatchupTenants) { - #Push-OutputBinding -Name NinjaProcess -Value @{ - # 'NinjaAction' = 'SyncTenant' - # 'MappedTenant' = $Tenant - #} [PSCustomObject]@{ NinjaAction = 'SyncTenant' MappedTenant = $Tenant diff --git a/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneOrgMapping.ps1 b/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneOrgMapping.ps1 index 3f3faeccef0e..6ea239b73e36 100644 --- a/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneOrgMapping.ps1 +++ b/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneOrgMapping.ps1 @@ -94,12 +94,6 @@ function Invoke-NinjaOneOrgMapping { # Now Let match on remaining Tenants $Batch = Foreach ($Tenant in $Tenants | Where-Object { $_.customerId -notin $MatchedM365Tenants.customerId }) { - <#Push-OutputBinding -Name NinjaProcess -Value @{ - 'NinjaAction' = 'AutoMapTenant' - 'M365Tenant' = $Tenant - 'NinjaOrgs' = $NinjaOrgs | Where-Object { $_.id -notin $MatchedNinjaOrgs } - 'NinjaDevices' = $ParsedNinjaDevices - }#> [PSCustomObject]@{ 'NinjaAction' = 'AutoMapTenant' 'M365Tenant' = $Tenant diff --git a/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneSync.ps1 b/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneSync.ps1 index 26e372124a99..5567ddb7c1b8 100644 --- a/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneSync.ps1 +++ b/Modules/CippExtensions/NinjaOne/Invoke-NinjaOneSync.ps1 @@ -8,11 +8,6 @@ function Invoke-NinjaOneSync { $Batch = foreach ($Tenant in $TenantsToProcess) { - <#Push-OutputBinding -Name NinjaProcess -Value @{ - 'NinjaAction' = 'SyncTenant' - 'MappedTenant' = $Tenant - } - Start-Sleep -Seconds 1#> [PSCustomObject]@{ 'NinjaAction' = 'SyncTenant' 'MappedTenant' = $Tenant diff --git a/Modules/CippExtensions/Private/Get-HaloToken.ps1 b/Modules/CippExtensions/Private/Get-HaloToken.ps1 index 0c26b909eec5..5c407c02a5f0 100644 --- a/Modules/CippExtensions/Private/Get-HaloToken.ps1 +++ b/Modules/CippExtensions/Private/Get-HaloToken.ps1 @@ -3,14 +3,21 @@ function Get-HaloToken { param ( $Configuration ) - if ($Configuration.ClientId) { - $null = Connect-AzAccount -Identity + if (![string]::IsNullOrEmpty($Configuration.ClientID)) { + if ($env:AzureWebJobsStorage -eq 'UseDevelopmentStorage=true') { + $DevSecretsTable = Get-CIPPTable -tablename 'DevSecrets' + $Secret = (Get-CIPPAzDataTableEntity @DevSecretsTable -Filter "PartitionKey eq 'HaloPSA' and RowKey eq 'HaloPSA'").APIKey + } else { + $null = Connect-AzAccount -Identity + $Secret = Get-AzKeyVaultSecret -VaultName $ENV:WEBSITE_DEPLOYMENT_ID -Name 'HaloPSA' -AsPlainText + } $body = @{ grant_type = 'client_credentials' - client_id = $Configuration.ClientId - client_secret = (Get-AzKeyVaultSecret -VaultName $ENV:WEBSITE_DEPLOYMENT_ID -Name 'HaloPSA' -AsPlainText) + client_id = $Configuration.ClientID + client_secret = $Secret scope = 'all' } + Write-Host ($body | ConvertTo-Json) if ($Configuration.Tenant -ne 'None') { $Tenant = "?tenant=$($Configuration.Tenant)" } $token = Invoke-RestMethod -Uri "$($Configuration.AuthURL)/token$Tenant" -Method Post -Body $body -ContentType 'application/x-www-form-urlencoded' return $token diff --git a/Scheduler_Extensions/function.json b/Scheduler_Extensions/function.json index 7474f0f13334..c178a68af69f 100644 --- a/Scheduler_Extensions/function.json +++ b/Scheduler_Extensions/function.json @@ -6,12 +6,6 @@ "direction": "in", "type": "timerTrigger" }, - { - "type": "queue", - "direction": "out", - "name": "NinjaProcess", - "queueName": "NinjaOneQueue" - }, { "name": "starter", "type": "durableClient", diff --git a/Scheduler_GetQueue/run.ps1 b/Scheduler_GetQueue/run.ps1 index eed2fb079169..87d355d1476c 100644 --- a/Scheduler_GetQueue/run.ps1 +++ b/Scheduler_GetQueue/run.ps1 @@ -10,6 +10,7 @@ $Tasks = foreach ($Tenant in $Tenants) { Tag = 'SingleTenant' TenantID = $Tenant.tenantid Type = $Tenant.type + RowKey = $Tenant.RowKey } } else { Write-Information 'All tenants, doing them all' @@ -20,6 +21,7 @@ $Tasks = foreach ($Tenant in $Tenants) { Tag = 'AllTenants' TenantID = $t.customerId Type = $Tenant.type + RowKey = $Tenant.RowKey } } } @@ -34,6 +36,7 @@ $Batch = foreach ($Task in $Tasks) { Tag = $task.tag Type = $task.type QueueId = $Queue.RowKey + SchedulerRow = $Task.RowKey QueueName = '{0} - {1}' -f $Task.Type, $task.tenant FunctionName = "Scheduler$($Task.Type)" } diff --git a/UpdatePermissions/run.ps1 b/UpdatePermissions/run.ps1 index 84f10e0cbce3..00ea3b7e9ad2 100644 --- a/UpdatePermissions/run.ps1 +++ b/UpdatePermissions/run.ps1 @@ -2,14 +2,15 @@ param($Timer) try { - $Tenants = Get-Tenants -IncludeAll -TriggerRefresh | Where-Object { $_.customerId -ne $env:TenantId -and $_.Excluded -eq $false } | ForEach-Object { $_ | Add-Member -NotePropertyName FunctionName -NotePropertyValue 'UpdatePermissionsQueue'; $_ } + $Tenants = Get-Tenants -IncludeAll -TriggerRefresh | Where-Object { $_.customerId -ne $env:TenantId -and $_.Excluded -eq $false } + $Queue = New-CippQueueEntry -Name 'Update Permissions' -TotalTasks ($Tenants | Measure-Object).Count + $TenantBatch = $Tenants | Select-Object defaultDomainName, customerId, displayName, @{n = 'FunctionName'; exp = { 'UpdatePermissionsQueue' } }, @{n = 'QueueId'; exp = { $Queue.RowKey } } if (($Tenants | Measure-Object).Count -gt 0) { $InputObject = [PSCustomObject]@{ OrchestratorName = 'UpdatePermissionsOrchestrator' - Batch = @($Tenants) + Batch = @($TenantBatch) } - #Write-Host ($InputObject | ConvertTo-Json) $InstanceId = Start-NewOrchestration -FunctionName 'CIPPOrchestrator' -InputObject ($InputObject | ConvertTo-Json -Depth 5 -Compress) Write-Host "Started permissions orchestration with ID = '$InstanceId'" } diff --git a/Z_CIPPHttpTrigger/function.json b/Z_CIPPHttpTrigger/function.json index a77f42a0ea97..179d246817ff 100644 --- a/Z_CIPPHttpTrigger/function.json +++ b/Z_CIPPHttpTrigger/function.json @@ -39,12 +39,6 @@ "name": "gradientqueue", "queueName": "billqueue" }, - { - "type": "queue", - "direction": "out", - "name": "NinjaProcess", - "queueName": "NinjaOneQueue" - }, { "type": "queue", "direction": "out", diff --git a/version_latest.txt b/version_latest.txt index 25c1b355a168..3b867ccd76c3 100644 --- a/version_latest.txt +++ b/version_latest.txt @@ -1 +1 @@ -5.6.3 \ No newline at end of file +5.7.0 \ No newline at end of file