Notices: This section not yet converted to new layout. Download stats are rolling back out.

6,039

Downloads

391

Downloads of v 0.0.72

3/29/2015

Last update

PoshDevOps

0.0.72

There are no package test results for this package

This package was approved as a trusted package on 4/24/2015.

PowerShell driven distributed DevOps

Installation notes:
- installs to: C:\ProgramFiles\PoshDevOps
- appends C:\ProgramFiles\PoshDevOps\Modules to PSModulePath environment variable

To install PoshDevOps, run the following command from the command line or from PowerShell:

C:\> choco install poshdevops

To upgrade PoshDevOps, run the following command from the command line or from PowerShell:

C:\> choco upgrade poshdevops

Files

Hide
  • tools\chocolateyInstall.ps1 Show
    try {    
        
        . "$PSScriptRoot\PoshDevOps\Install.ps1"
    
    } catch {
    
        Write-ChocolateyFailure 'PoshDevOps' $_.Exception.Message
    
        throw 
    }
    
  • tools\chocolateyUninstall.ps1 Show
    try {
    
        . "$PSScriptRoot\PoshDevOps\Uninstall.ps1"
    
    } catch {
    
        Write-ChocolateyFailure 'PoshDevOps' $_.Exception.Message
    
        throw 
    }
    
  • tools\PoshDevOps\DevOpStorage\DevOpStorage.psm1 Show
    Import-Module "$PSScriptRoot\..\OrderedDictionaryExtensions"
    Import-Module "$PSScriptRoot\..\Pson"
    
    function Get-DevOp(
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Name,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        <#
            .SYNOPSIS
            an internal utility function that retrieves a DevOp from storage
        #>
    
        $DevOpFilePath = Resolve-Path "$ProjectRootDirPath\.PoshDevOps\$Name.psd1"   
        Write-Output (Get-Content $DevOpFilePath | Out-String | ConvertFrom-Pson)
    
    }
    
    function Add-DevOp(
    [PsCustomObject]
    $Value,
    
    [switch]
    $Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        <#
            .SYNOPSIS
            an internal utility function that saves a DevOp to storage
        #>
    
        $DevOpFilePath = "$ProjectRootDirPath\.PoshDevOps\$($Value.Name).psd1"
    
        # guard against unintentionally overwriting existing DevOp
        if(!$Force.IsPresent -and (Test-Path $DevOpFilePath)){
    throw `
    @"
    Task group "$($Value.Name)" already exists
    for project "$(Resolve-Path $ProjectRootDirPath)".
    
    Task group names must be unique.
    If you want to overwrite the existing DevOp use the -Force parameter
    "@
        }
    
    Write-Debug `
    @"
    Creating DevOp file at:
    $DevOpFilePath
    Creating...
    "@
    
        New-Item -Path $DevOpFilePath -ItemType File -Force        
        Set-Content $DevOpFilePath -Value (ConvertTo-Pson -InputObject $Value -Depth 12 -Layers 12 -Strict) -Force
        
    }
    
    
    
    function Rename-DevOp(
    [string]
    [ValidateNotNullOrEmpty()]
    $OldName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    $NewName,
    
    [switch]
    $Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        <#
            .SYNOPSIS
            an internal utility function that updates the name of a DevOp in storage
        #>
        
        $OldDevOpFilePath = "$ProjectRootDirPath\.PoshDevOps\$OldName.psd1"
        $NewDevOpFilePath = "$ProjectRootDirPath\.PoshDevOps\$NewName.psd1"
    
        # guard against unintentionally overwriting existing DevOp
        if(!$Force.IsPresent -and (Test-Path $NewDevOpFilePath)){
    throw `
    @"
    Task group "$NewName" already exists
    for project "$(Resolve-Path $ProjectRootDirPath)".
    
    Task group names must be unique.
    If you want to overwrite the existing DevOp use the -Force parameter
    "@
        }
    
        # fetch DevOp
        $DevOp = Get-DevOp -Name $OldName -ProjectRootDirPath $ProjectRootDirPath
    
        # update name
        $DevOp.Name = $NewName
    
            
        #save
        mv $OldDevOpFilePath $NewDevOpFilePath -Force
        sc $NewDevOpFilePath -Value (ConvertTo-Pson -InputObject $DevOp -Depth 12 -Layers 12 -Strict) -Force
    }
    
    function Remove-DevOp(
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Name,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        <#
            .SYNOPSIS
            an internal utility function that removes a DevOp from storage
        #>
        
        $DevOpFilePath = Resolve-Path "$ProjectRootDirPath\.PoshDevOps\$Name.psd1"
        
        Remove-Item -Path $DevOpFilePath -Force
    }
    
    function Add-DevOpTask(
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $DevOpName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Name,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $PackageId,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $PackageVersion,
    
    [int]
    [ValidateScript({$_ -gt -1})]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Index,
    
    [switch]
    $Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        <#
            .SYNOPSIS
            an internal utility function that adds a task to a DevOp in storage
        #>    
        
        $DevOpFilePath = "$ProjectRootDirPath\.PoshDevOps\$DevOpName.psd1"
    
        # fetch DevOp
        $DevOp = Get-DevOp -Name $DevOpName -ProjectRootDirPath $ProjectRootDirPath
    
        # guard against unintentionally overwriting existing tasks
        if(!$Force.IsPresent -and ($DevOp.Tasks.$Name)){
    throw `
    @"
    Task "$Name" already exists in DevOp "$DevOpName"
    for project "$(Resolve-Path $ProjectRootDirPath)".
    
    Task names must be unique.
    If you want to overwrite the existing task use the -Force parameter
    "@
        }
    
        # construct task object
        $Task = @{Name=$Name;PackageId=$PackageId;PackageVersion=$PackageVersion;}
    
        # add task to taskgroup
        $DevOp.Tasks.Insert($Index,$Name,$Task)
    
        # save
        sc $DevOpFilePath -Value (ConvertTo-Pson -InputObject $DevOp -Depth 12 -Layers 12 -Strict) -Force
    }
    
    function Remove-DevOpTask(
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $DevOpName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Name,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        
        $DevOpFilePath = "$ProjectRootDirPath\.PoshDevOps\$DevOpName.psd1"
        
        # fetch DevOp
        $DevOp = Get-DevOp -Name $DevOpName -ProjectRootDirPath $ProjectRootDirPath
    
        # remove task
        $DevOp.Tasks.Remove($Name)
    
        # save
        sc $DevOpFilePath -Value (ConvertTo-Pson -InputObject $DevOp -Depth 12 -Layers 12 -Strict) -Force
    }
    
    function Rename-DevOpTask(
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $DevOpName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $OldName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $NewName,
    
    [switch]
    $Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        
        $DevOpFilePath = "$ProjectRootDirPath\.PoshDevOps\$DevOpName.psd1"
        
        # fetch DevOp
        $DevOp = Get-DevOp -Name $DevOpName -ProjectRootDirPath $ProjectRootDirPath
    
        # fetch task
        $Task = $DevOp.Tasks.$OldName
    
        # handle task not found
        if(!$Task){
    throw `
    @"
    Task "$TaskName" not found in DevOp "$DevOpName"
    for project "$(Resolve-Path $ProjectRootDirPath)".
    "@
        }
    
        # guard against unintentionally overwriting existing task
        if(!$Force.IsPresent -and ($DevOp.Tasks.$NewName)){
    throw `
    @"
    Task "$NewName" already exists in DevOp "$DevOpName"
    for project "$(Resolve-Path $ProjectRootDirPath)".
    
    Task names must be unique.
    If you want to overwrite the existing task use the -Force parameter
    "@
        }
    
        # get task index
        $Index = Get-IndexOfKeyInOrderedDictionary -Key $OldName -OrderedDictionary $DevOp.Tasks
    
        # update name
        $Task.Name = $NewName
    
        # remove old record
        $DevOp.Tasks.Remove($OldName)
    
        # insert new record
        $DevOp.Tasks.Insert($Index,$Task.Name,$Task)
    
        # save
        sc $DevOpFilePath -Value (ConvertTo-Pson -InputObject $DevOp -Depth 12 -Layers 12 -Strict) -Force
    }
    
    function Set-DevOpTaskParameter(
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $DevOpName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $TaskName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $Name,
    
    [object]
    [Parameter(
        Mandatory=$true)]
    $Value,
    
    [switch]
    $Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        
        $DevOpFilePath = "$ProjectRootDirPath\.PoshDevOps\$DevOpName.psd1"
        
        # fetch DevOp
        $DevOp = Get-DevOp -Name $DevOpName -ProjectRootDirPath $ProjectRootDirPath
    
        # fetch task
        $Task = $DevOp.Tasks.$TaskName
    
        # handle task not found
        if(!$Task){
    throw `
    @"
    Task "$TaskName" not found in DevOp "$DevOpName"
    for project "$(Resolve-Path $ProjectRootDirPath)".
    "@
        }
    
        # handle the case where this is the first parameter set
        If(!$Task.Parameters){
            $Task.Parameters = @{$Name=$Value}
        }
        # guard against unintentionally overwriting existing parameter value
        ElseIf(!$Force.IsPresent -and ($Task.Parameters.$Name)){
    throw `
    @"
    A value of $($Task.Parameters.$Name) has already been set for parameter $Name in task "$TaskName" in DevOp "$DevOpName"
    for project "$(Resolve-Path $ProjectRootDirPath)".
    
    If you want to overwrite the existing parameter value use the -Force parameter
    "@
        }
        Else{    
            $Task.Parameters.$Name = $Value
        }
        
        # save
        sc $DevOpFilePath -Value (ConvertTo-Pson -InputObject $DevOp -Depth 12 -Layers 12 -Strict) -Force
    }
    
    function Update-DevOpTaskPackageVersion(
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $DevOpName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $TaskName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $PackageVersion,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        
        $DevOpFilePath = "$ProjectRootDirPath\.PoshDevOps\$DevOpName.psd1"
        
        # fetch DevOp
        $DevOp = Get-DevOp -Name $DevOpName -ProjectRootDirPath $ProjectRootDirPath
    
        # fetch task
        $Task = $DevOp.Tasks.$TaskName
    
        # handle task not found
        if(!$Task){
    throw `
    @"
    Task "$TaskName" not found in DevOp "$DevOpName"
    for project "$(Resolve-Path $ProjectRootDirPath)".
    "@
        }
    
        # update task version
        $Task.PackageVersion = $PackageVersion
        
        # save
        sc $DevOpFilePath -Value (ConvertTo-Pson -InputObject $DevOp -Depth 12 -Layers 12 -Strict) -Force
    }
    
    Export-ModuleMember -Function @(
                        # DevOp API
                        'Get-DevOp',
                        'Add-DevOp',
                        'Rename-DevOp',
                        'Remove-DevOp',
                        # DevOp Task API
                        'Add-DevOpTask',
                        'Remove-DevOpTask',
                        'Rename-DevOpTask',
                        'Set-DevOpTaskParameter',
                        'Update-DevOpTaskPackageVersion')
  • tools\PoshDevOps\HashtableExtensions\HashtableExtensions.psm1 Show
    function Get-UnionOfHashtables(
    [Hashtable]
    [ValidateNotNull()]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $Source1,
    
    [Hashtable]
    [ValidateNotNull()]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $Source2){
        $destination = $Source1.Clone()
        Write-Debug "After adding `$Source1, destination is $($destination|Out-String)"
    
        $Source2.GetEnumerator() | ?{!$destination.ContainsKey($_.Key)} |%{$destination[$_.Key] = $_.Value}
        Write-Debug "After adding `$Source2, destination is $($destination|Out-String)"
    
        Write-Output $destination
    }
    
    Export-ModuleMember -Function Get-UnionOfHashtables
  • tools\PoshDevOps\Install.ps1 Show
    # installer based on guidelines provided by Microsoft 
    # for installing shared/3rd party powershell modules
    # (see: https://msdn.microsoft.com/en-us/library/dd878350%28v=vs.85%29.aspx )
    if($PSVersionTable.PSVersion.Major -lt 3) {
        Write-Warning "PoshDevOps requires PowerShell 3.0 or better; you have version $($Host.Version)."
        return
    }
    
    # prepare install dir
    $installRootDirPath = "$env:ProgramFiles\PoshDevOps"
    $installDirPath = "$installRootDirPath\Modules"
    
    # handle upgrade scenario
    if(Test-Path "$installRootDirPath"){
        Write-Debug 'removing previous PoshDevOps installation'
        . "$PSScriptRoot\Uninstall.ps1"
    }
    New-Item $installDirPath -ItemType Directory | Out-Null
    
    Copy-Item -Path "$PSScriptRoot" -Destination $installDirPath -Recurse
    
    $psModulePath = [Environment]::GetEnvironmentVariable('PSModulePath','Machine')
    
    # if installation dir path is not already in path then add it.
    if(!($psModulePath.Split(';').Contains($installDirPath))){
        Write-Debug "adding $installDirPath to '$env:PSModulePath'"
        
        # trim trailing semicolon if exists
        $psModulePath = $psModulePath.TrimEnd(';');
    
        # append path to PoshDevOps installation
        $psModulePath = $psModulePath + ";$installDirPath"
        
        # save
        [Environment]::SetEnvironmentVariable('PSModulePath',$psModulePath,'Machine')    
        
        # make effective in current session
        $env:PSModulePath = $env:PSModulePath + ";$installDirPath"
    }
    
  • tools\PoshDevOps\OrderedDictionaryExtensions\OrderedDictionaryExtensions.psm1 Show
    function Get-IndexOfKeyInOrderedDictionary(
    [string]
    [ValidateNotNullOrEmpty()]
    $Key,
    
    [System.Collections.Specialized.OrderedDictionary]
    [ValidateNotNullOrEmpty()]
    $OrderedDictionary){
        <#
            .SYNOPSIS
            an internal utility function to find the index of a key in an ordered dictionary
        #>
    
        $indexOfKey = -1
        $keysArray = [string[]]$OrderedDictionary.Keys
        for ($i = 0; $i -lt $OrderedDictionary.Count; $i++){
            if($keysArray[$i] -eq $Key){
                $indexOfKey = $i
                break
            }
        }
    
    Write-Output $indexOfKey
    }
    
    Export-ModuleMember -Function Get-IndexOfKeyInOrderedDictionary
  • tools\PoshDevOps\PackageManagement\nuget.exe
  • tools\PoshDevOps\PackageManagement\PackageManagement.psm1 Show
    Import-Module "$PSScriptRoot\Versioning"
    Import-Module "$PSScriptRoot\..\Pson"
    
    $DefaultPackageSources = @('https://www.myget.org/F/poshdevops')
    $NugetExecutable = "$PSScriptRoot\nuget.exe"
    
    function Get-LatestDevOpTaskPackageVersion(
    
    [string[]]
    [Parameter(
        Mandatory=$true)]
    $Source = $DefaultPackageSources,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $Id){
        
        $versions = @()
    
        foreach($packageSource in $Source){
            $uri = "$packageSource/api/v2/package-versions/$Id"
    Write-Debug "Attempting to fetch package versions:` uri: $uri "
            $versions = $versions + (Invoke-RestMethod -Uri $uri)
    Write-Debug "response from $uri was: ` $versions"
        }
        if(!$versions -or ($versions.Count -lt 1)){
    throw "no versions of $Id could be located.` searched: $Source"
        }
    
    Write-Output ([Array](Get-SortedSemanticVersions -InputArray $versions -Descending))[0]
    }
    
    function New-DevOpTaskPackageSpec(
        
        [string]
        [ValidateScript({Test-Path $_ -PathType Container})]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $OutputDirPath = '.',
    
        [switch]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $Force,
    
        [string]
        [ValidateNotNullOrEmpty()]
        [Parameter(
            ValueFromPipelineByPropertyName=$true,
            Mandatory=$true)]
        $PackageName,
    
        [string]
        [ValidateScript({ if(!$_){$true}else{$_ | Test-SemanticVersion} })]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $PackageVersion,
        
        [string]
        [ValidateNotNullOrEmpty()]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $PackageDescription,
        
        [Hashtable[]]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $PackageContributor,
        
        [System.Uri]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $PackageProjectUrl,
        
        [string[]]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $PackageTag,
        
        [Hashtable]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $PackageLicense,
        
        [Hashtable]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $PackageDependency,
        
        [Hashtable[]]
        [ValidateNotNullOrEmpty()]
        [Parameter(
            ValueFromPipelineByPropertyName=$true,
            Mandatory=$true)]
        $PackageFile){
    
        $PackageSpecFilePath = "$OutputDirPath\PackageSpec.psd1"
               
        # guard against unintentionally overwriting existing package spec
        if(!$Force.IsPresent -and (Test-Path $PackageSpecFilePath)){
    throw `
    @"
    Package spec already exists at: $(Resolve-Path $PackageSpecFilePath)
    to overwrite the existing package spec use the -Force parameter
    "@
        }
    
    Write-Debug `
    @"
    Creating package spec file at:
    $PackageSpecFilePath
    "@
    
        New-Item -Path $PackageSpecFilePath -ItemType File -Force:$Force      
    
        $PackageSpec = @{
            Name = $PackageName;
            Version = $PackageVersion;
            Description = $PackageDescription;
            Contributors = $PackageContributor;
            ProjectUrl = $PackageProjectUrl;
            Tags = $PackageTag;
            License = $PackageLicense;
            Dependencies = $PackageDependency;
            Files = $PackageFile}
    
        Set-Content $PackageSpecFilePath -Value (ConvertTo-Pson -InputObject $PackageSpec -Depth 12 -Layers 12 -Strict) -Force
        
    }
    
    function Get-DevOpTaskPackageInstallDirPath(
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Name,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Version,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
    
        Resolve-Path "$ProjectRootDirPath\.PoshDevOps\packages\$Name.$Version\PackageSpec.psd1" | Write-Output
        
    }
    
    function Get-DevOpTaskPackageSpec(
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Name,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Version,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
    
        <#
            .SYNOPSIS
            an internal utility function that retrieves a package spec from storage
        #>
    
        $PackageSpecFilePath = Get-DevOpTaskPackageInstallDirPath -Name $Name -Version $Version -ProjectRootDirPath $ProjectRootDirPath
        Get-Content $PackageSpecFilePath | Out-String | ConvertFrom-Pson | Write-Output
    
    }
    
    function Install-DevOpTaskPackage(
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Id,
    
    [string]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $Version,
    
    [string[]]
    [ValidateCount( 1, [Int]::MaxValue)]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $Source,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath='.'){
    
        <#
            .SYNOPSIS
            Installs a task package to an environment if it's not already installed
        #>
    
        $taskGroupDirPath = Resolve-Path "$ProjectRootDirPath\.PoshDevOps"
        $packagesDirPath = "$taskGroupDirPath\packages"
    
        if([string]::IsNullOrWhiteSpace($Version)){
    
            $Version = Get-LatestPackageVersion -Source $Source -Id $Id
    
    Write-Debug "using greatest available package version : $Version"
        
        }
    
        $initialOFS = $OFS
        
        try{
    
            $OFS = ';'        
            $nugetParameters = @('install',$Id,'-Source',($Source|Out-String),'-OutputDirectory',$packagesDirPath,'-Version',$Version,'-NonInteractive')
    
    Write-Debug `
    @"
    Invoking nuget:
    & $nugetExecutable $($nugetParameters|Out-String)
    "@
            & $nugetExecutable $nugetParameters
    
            # handle errors
            if ($LastExitCode -ne 0) {
                throw $Error
            }
        
        }
        Finally{
            $OFS = $initialOFS
        }
    
        #TODO: INSTALL DEPENDENCIES
    
    }
    
    function Uninstall-DevOpTaskPackage(
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Id,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Version,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath='.'){
    
        <#
            .SYNOPSIS
            Uninstalls a task package from an environment if it's installed
        #>
    
        $taskGroupDirPath = Resolve-Path "$ProjectRootDirPath\.PoshDevOps"
        $packagesDirPath = "$taskGroupDirPath\packages"
    
        $packageInstallationDir = "$packagesDirPath\$($Id).$($Version)"
    
    
        If(Test-Path $packageInstallationDir){
    Write-Debug `
    @"
    Removing package at:
    $packageInstallationDir
    "@
            Remove-Item $packageInstallationDir -Recurse -Force
        }
        Else{
    Write-Debug `
    @"
    No package to remove at:
    $packageInstallationDir
    "@
        }
    
        #TODO: UNINSTALL DEPENDENCIES
    
    }
    
    Export-ModuleMember -Variable 'DefaultPackageSources'
    Export-ModuleMember -Function @(
                                    'Install-DevOpTaskPackage',
                                    'Uninstall-DevOpTaskPackage'
                                    'Get-LatestDevOpTaskPackageVersion'
                                    'New-DevOpTaskPackageSpec')
  • tools\PoshDevOps\PackageManagement\Versioning\Versioning.psm1 Show
    $SemanticVersionRegex = "(?<Major>\d+)\.(?<Minor>\d+)\.(?<Patch>\d+)(?:-(?<PreRelease>[0-9A-Za-z-.]*))?(?:\+(?<Build>[0-9A-Za-z-.]*))?"
    
    function Test-SemanticVersion(
        [string]
        [ValidateNotNullOrEmpty()]
        [Parameter(
            Mandatory=$true,
            ValueFromPipeline=$true)]
        $SemanticVersionString){
    
        $SemanticVersionString -match $SemanticVersionRegex
    
    }
    
    function ConvertTo-SemanticVersionObject(
        [string]
        [ValidateNotNullOrEmpty()]
        [Parameter(
            Mandatory=$true)]
        $SemanticVersionString){
    
        <#
            .SYNOPSIS
            creates an object representing a v1.0 & v2.0 semantic version (see: http://semver.org/)
        #>
    
        $SemanticVersionString -match $SemanticVersionRegex |Out-Null
        $Matches.Remove(0)
        $Matches.Major = [int]$Matches.Major
        $Matches.Minor = [int]$Matches.Minor
        $Matches.Patch = [int]$Matches.Patch
    
        If($Matches.PreRelease){
            $preReleaseIdentifiers = $Matches.PreRelease.Split('.')|%{if($_ -as [long]){[long]$_}else{[string]$_}}
            $Matches.PreRelease = @{Identifiers=[object[]]$preReleaseIdentifiers}
        }
    
        $Matches.Clone() | Write-Output
    }
    
    function Compare-SemanticVersions(
        
        <#
            .SYNOPSIS
            compares v1.0 & v2.0 semantic versions (see: http://semver.org/)
        #>
    
        [string]
        $XSemVerString,
        
        [string]
        $YSemVerString){
    
        $XSemVer = ConvertTo-SemanticVersionObject -SemanticVersionString $XSemVerString
        $YSemVer = ConvertTo-SemanticVersionObject -SemanticVersionString $YSemVerString
    
        If($XSemVer.Major -ne $YSemVer.Major){
            return $XSemVer.Major - $YSemVer.Major
        }
        ElseIf($XSemVer.Minor -ne $YSemVer.Minor){
            return $XSemVer.Minor - $YSemVer.Minor
        }
        ElseIf($XSemVer.Patch -ne $YSemVer.Patch){
            return $XSemVer.Patch - $YSemVer.Patch
        }
    
        # per spec: "When major, minor, and patch are equal, a pre-release version has lower precedence than a normal version"
        If(!$XSemVer.PreRelease -and $YSemVer.PreRelease){
            return 1
        }
        ElseIf(!$XSemVer.PreRelease -and !$YSemVer.PreRelease){
            return 0
        }
        ElseIf($XSemVer.PreRelease -and !$YSemVer.PreRelease){
            return -1
        }
    
        For($i = 0;$i -lt [Math]::Min($XSemVer.PreRelease.Identifiers.Count,$YSemVer.PreRelease.Identifiers.Count);$i++){
            $XIdentifier = $XSemVer.PreRelease.Identifiers[$i]
            $YIdentifier = $YSemVer.PreRelease.Identifiers[$i]
            
            #if x and y numeric
            If(($XIdentifier -is [long]) -and ($YIdentifier -is [long])){
                
                #per spec: "identifiers consisting of only digits are compared numerically"
                $xIdentifierMinusYIdentifier = $XIdentifier - $YIdentifier
                If($xIdentifierMinusYIdentifier -ne 0){
                    return $xIdentifierMinusYIdentifier
                }
            }
            #if x or[exclusive] y is numeric
            ElseIf(($XIdentifier -is [long]) -xor ($YIdentifier -is [long])){
            
                #per spec: "Numeric identifiers always have lower precedence than non-numeric identifiers"
                If($XIdentifier -isnot [long]){
                    return 1
                }
                Else{
                    return -1
                }
            }
            #if x and y both textual
            Else{
    
                #per spec: "identifiers with letters or hyphens are compared lexically in ASCII sort order"
                If($XIdentifier -gt $YIdentifier){
                    return 1
                }
                ElseIf($XIdentifier -lt $YIdentifier){
                    return -1
                }
            }
        }
    
        #per spec: "A larger set of pre-release fields has a higher precedence than a smaller set, if all of the preceding identifiers are equal"
        return $XSemVer.PreRelease.Identifiers.Count - $YSemVer.PreRelease.Identifiers.Count
    }
    
    function Get-SortedSemanticVersions(
    [string[]]
    $InputArray,
    [switch]
    $Descending){
    
        <#
            .SYNOPSIS
            sorts v1.0 & v2.0 semantic versions (see: http://semver.org/)
        #>
     
        $counter = 0 
        $compareResultFactor = 1
        if($Descending.IsPresent){
        $compareResultFactor = -1
        }
     
        # $unsorted is the first index of the unsorted region 
        for ($unsorted = 1; $unsorted -lt $InputArray.Count; $unsorted++) 
        { 
            # Next item in the unsorted region 
            $nextItem = $InputArray[$unsorted] 
         
            # Index of insertion in the sorted region 
            $location = $unsorted 
         
            while (($location -gt 0) -and ` 
                (($compareResultFactor *(Compare-SemanticVersions -X $InputArray[$location - 1] -Y $nextItem)) -gt 0)) 
            { 
                $counter++ 
                # Shift to the right 
                $InputArray[$location] = $InputArray[$location - 1] 
                $location-- 
            } 
         
            # Insert $nextItem into the sorted region 
            $InputArray[$location] = $nextItem
        } 
    
        Write-Output $InputArray
    }
    
    Export-ModuleMember -Function @(
                                    'Get-SortedSemanticVersions',
                                    'Test-SemanticVersion')
  • tools\PoshDevOps\PoshDevOps.psd1
  • tools\PoshDevOps\PoshDevOps.psm1 Show
    Import-Module "$PSScriptRoot\PackageManagement"
    Import-Module "$PSScriptRoot\DevOpStorage"
    Import-Module "$PSScriptRoot\HashtableExtensions"
    Import-Module "$PSScriptRoot\OrderedDictionaryExtensions"
    
    function Invoke-DevOp(
    
        [string]
        [ValidateNotNullOrEmpty()]
        [Parameter(
            Mandatory=$true)]
        $Name,
    
        [Hashtable]
        [Parameter(
            ValueFromPipeline=$true,
            ValueFromPipelineByPropertyName=$true)]
        $Parameters,
    
        [string[]]
        [ValidateCount( 1, [Int]::MaxValue)]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $PackageSource = $DefaultPackageSources,
    
        [String]
        [ValidateScript({Test-Path $_ -PathType Container})]
        [Parameter(
            ValueFromPipelineByPropertyName=$true)]
        $ProjectRootDirPath='.'){
        
        $DevOp = DevOpStorage\Get-DevOp -Name $Name -ProjectRootDirPath $ProjectRootDirPath
    
        if($DevOp){        
    
            foreach($task in $DevOp.Tasks.Values){
                        
                if($Parameters.($task.Name)){
    
                    if($task.Parameters){
    
    Write-Debug "Adding union of passed parameters and archived parameters to pipeline. Passed parameters will override archived parameters"
                    
                        $taskParameters = HashtableExtensions\Get-UnionOfHashtables -Source1 $Parameters.($task.Name) -Source2 $task.Parameters
    
                    }
                    else{
    
    Write-Debug "Adding passed parameters to pipeline"
    
                        $taskParameters = $Parameters.($task.Name)
                
                    }
    
                }
                elseif($task.Parameters){
    
    Write-Debug "Adding archived parameters to pipeline"    
                    $taskParameters = $task.Parameters
    
                }
                else{
                    
                    $taskParameters = @{}
                
                }
    
    Write-Debug "Adding automatic parameters to pipeline"
                
                $taskParameters.PoshDevOpsProjectRootDirPath = (Resolve-Path $ProjectRootDirPath)
                $taskParameters.PoshDevOpsTaskName = $task.Name
    
    Write-Debug "Ensuring task module package installed"
                PackageManagement\Install-DevOpTaskPackage -Id $task.PackageId -Version $task.PackageVersion -Source $PackageSource
    
                $moduleDirPath = "$ProjectRootDirPath\.PoshDevOps\packages\$($task.PackageId).$($task.PackageVersion)\$($task.PackageId)"
    Write-Debug "Importing module located at: $moduleDirPath"
                Import-Module $moduleDirPath -Force
    
    Write-Debug `
    @"
    Invoking task $($task.Name) with parameters: 
    $($taskParameters|Out-String)
    "@
                # Parameters must be PSCustomObject so [Parameter(ValueFromPipelineByPropertyName = $true)] works
                [PSCustomObject]$taskParameters.Clone() | & "$($task.PackageId)\Invoke"
    
                Remove-Module $task.PackageId
    
            }
        }
        else{
    
    throw "$Name.psd1 not found for project at $ProjectRootDirPath"
    
        }
    }
    
    function New-DevOp(
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true)]
    $Name,
    
    [switch]
    $Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        
        $DevOp = @{Name=$Name;Tasks=[ordered]@{}}
    
        DevOpStorage\Add-DevOp `
            -Value $DevOp `
            -Force:$Force `
            -ProjectRootDirPath $ProjectRootDirPath
    }
    
    function Remove-DevOp(
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $Name,
    
    [switch]$Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
    
        $confirmationPromptQuery = "Are you sure you want to delete the DevOp `"$Name`"`?"
        $confirmationPromptCaption = 'Confirm task removal'
    
        if($Force.IsPresent -or $PSCmdlet.ShouldContinue($confirmationPromptQuery,$confirmationPromptCaption)){
    
            DevOpStorage\Remove-DevOp `
                -Name $Name `
                -ProjectRootDirPath $ProjectRootDirPath
    
        }
    
    }
    
    function Rename-DevOp(
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $OldName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $NewName,
    
    [switch]
    $Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipeline=$true,
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
    
        DevOpStorage\Rename-DevOp `
            -OldName $OldName `
            -NewName $NewName `
            -Force:$Force `
            -ProjectRootDirPath $ProjectRootDirPath    
    
    }
    
    function Get-DevOp(
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $Name,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
    
        DevOpStorage\Get-DevOp -Name $Name -ProjectRootDirPath $ProjectRootDirPath | Write-Output
    
    }
    
    function Add-DevOpTask(
    [CmdletBinding(
        DefaultParameterSetName="Add-DevOpTaskLast")]
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $DevOpName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $Name,
    
    [string]
    [Parameter(
        Mandatory=$true)]
    $PackageId,
    
    [string]
    $PackageVersion,
    
    [switch]
    [Parameter(
        Mandatory=$true,
        ParameterSetName='Add-DevOpTaskFirst')]
    $First,
    
    [switch]
    [Parameter(
        ParameterSetName='Add-DevOpTaskLast')]
    $Last,
    
    [string]
    [Parameter(
        Mandatory=$true,
        ParameterSetName='Add-DevOpTaskAfter')]
    $After,
    
    [string]
    [Parameter(
        Mandatory=$true,
        ParameterSetName='Add-DevOpTaskBefore')]
    $Before,
    
    [switch]
    $Force,
    
    [string[]]
    [ValidateNotNullOrEmpty()]
    $PackageSource= $DefaultPackageSources,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipeline=$true,
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
    
        <#
            .SYNOPSIS
            Adds a new task to a DevOp
            
            .EXAMPLE
            Add-DevOpTask -DevOp "Deploy To Azure" -Name "LastTask" -PackageId "DeployNupkgToAzureWebsites" -PackageVersion "0.0.3"
            
            Description:
    
            This command adds task "LastTask" after all existing tasks in DevOp "Deploy To Azure"
    
            .EXAMPLE
            Add-DevOpTask -DevOp "Deploy To Azure" -Name "FirstTask" -PackageId "DeployNupkgToAzureWebsites" -First
    
            Description:
    
            This command adds task "FirstTask" before all existing tasks in DevOp "Deploy To Azure"
    
            .EXAMPLE
            Add-DevOpTask -DevOp "Deploy To Azure" -Name "AfterSecondTask" -PackageId "DeployNupkgToAzureWebsites" -After "SecondTask"
    
            Description:
    
            This command adds task "AfterSecondTask" after the existing task "SecondTask" in DevOp "Deploy To Azure"
    
            .EXAMPLE
            Add-DevOpTask -DevOp "Deploy To Azure" -Name "BeforeSecondTask" -PackageId "DeployNupkgToAzureWebsites" -Before "SecondTask"
    
            Description:
    
            This command adds task "BeforeSecondTask" before the existing task "SecondTask" in DevOp "Deploy To Azure"
    
        #>
    
            
            if([string]::IsNullOrWhiteSpace($PackageVersion)){
                $PackageVersion = PackageManagement\Get-LatestDevOpTaskPackageVersion -Source $PackageSource -Id $PackageId
    Write-Debug "using greatest available package version : $PackageVersion"
            }
                    
            if($First.IsPresent){
            
                $TaskIndex = 0
            
            }
            elseif('Add-DevOpTaskAfter' -eq $PSCmdlet.ParameterSetName){
                
                $DevOp = DevOpStorage\Get-DevOp -Name $DevOpName -ProjectRootDirPath $ProjectRootDirPath
                $indexOfAfter = OrderedDictionaryExtensions\Get-IndexOfKeyInOrderedDictionary -Key $After -OrderedDictionary $DevOp.Tasks
                # ensure task with key $After exists
                if($indexOfAfter -lt 0){
                    throw "A task with name $After could not be found."
                }
                $TaskIndex = $indexOfAfter + 1
            
            }
            elseif('Add-DevOpTaskBefore' -eq $PSCmdlet.ParameterSetName){        
            
                $DevOp = DevOpStorage\Get-DevOp -Name $DevOpName -ProjectRootDirPath $ProjectRootDirPath
                $indexOfBefore = OrderedDictionaryExtensions\Get-IndexOfKeyInOrderedDictionary -Key $Before -OrderedDictionary $DevOp.Tasks
                # ensure task with key $Before exists
                if($indexOfBefore -lt 0){
                    throw "A task with name $Before could not be found."
                }
                $TaskIndex = $indexOfBefore
            
            }
            else{
            
                $DevOp = DevOpStorage\Get-DevOp -Name $DevOpName -ProjectRootDirPath $ProjectRootDirPath
                $TaskIndex = $DevOp.Tasks.Count  
            }
    
            DevOpStorage\Add-DevOpTask `
                -DevOpName $DevOpName `
                -Name $Name `
                -PackageId $PackageId `
                -PackageVersion $PackageVersion `
                -Index $TaskIndex `
                -Force:$Force `
                -ProjectRootDirPath $ProjectRootDirPath
    }
    
    function Remove-DevOpTask(
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $DevOpName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $Name,
    
    [switch]$Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
    
        $confirmationPromptQuery = "Are you sure you want to remove the task with name $Name`?"
        $confirmationPromptCaption = 'Confirm task removal'
    
        if($Force.IsPresent -or $PSCmdlet.ShouldContinue($confirmationPromptQuery,$confirmationPromptCaption)){
    
            DevOpStorage\Remove-DevOpTask `
                -DevOpName $DevOpName `
                -Name $Name `
                -ProjectRootDirPath $ProjectRootDirPath
    
        }
    
    }
    
    function Rename-DevOpTask(
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $DevOpName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $OldName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $NewName,
    
    [switch]$Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
    
        DevOpStorage\Rename-DevOpTask `
            -DevOpName $DevOpName `
            -OldName $OldName `
            -NewName $NewName `
            -Force:$Force `
            -ProjectRootDirPath $ProjectRootDirPath
    
    }
    
    function Set-DevOpTaskParameter(
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $DevOpName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $TaskName,
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $Name,
    
    [object]
    [Parameter(
        Mandatory=$true)]
    $Value,
    
    [switch]
    $Force,
    
    [string]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath = '.'){
        <#
            .SYNOPSIS
            Sets configurable parameters of a task
            
            .EXAMPLE
            Set-DevOpTaskParameter -DevOpName Build -TaskName GitClone -Name GitParameters -Value Status -Force
            
            Description:
    
            This command sets the parameter "GitParameters" to "Status" for a task "GitClone" in DevOp "Build"
        #>
    
        DevOpStorage\Set-DevOpTaskParameter `
            -DevOpName $DevOpName `
            -TaskName $TaskName `
            -Name $Name `
            -Value $Value `
            -Force:$Force
    }
    
    function Update-DevOpTaskPackage(
    
    [CmdletBinding(
        DefaultParameterSetName="Update-All")]
    
    [string]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        Mandatory=$true)]
    $DevOpName,
    
    [string[]]
    [ValidateCount( 1, [Int]::MaxValue)]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true,
        ParameterSetName="Update-Single")]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true,
        ParameterSetName="Update-Multiple")]
    $Id,
    
    [string]
    [Parameter(
        Mandatory=$true,
        ValueFromPipelineByPropertyName=$true,
        ParameterSetName="Update-Single")]
    $Version,
    
    [switch]
    [Parameter(
        ParameterSetName="Update-All")]
    $All,
    
    [string[]]
    [ValidateCount( 1, [Int]::MaxValue)]
    [ValidateNotNullOrEmpty()]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $Source = $DefaultPackageSources,
    
    [String]
    [ValidateScript({Test-Path $_ -PathType Container})]
    [Parameter(
        ValueFromPipelineByPropertyName=$true)]
    $ProjectRootDirPath='.'){
    
        $DevOp = DevOpStorage\Get-DevOp -Name $DevOpName -ProjectRootDirPath $ProjectRootDirPath
    
        # build up list of package updates
        $packageUpdates = @{}
        If('Update-Multiple' -eq $PSCmdlet.ParameterSetName){
    
            foreach($packageId in $Id){
    
                $packageUpdates.Add($packageId,(PackageManagement\Get-LatestDevOpTaskPackageVersion -Source $Source -Id $packageId))
    
            }
        }
        ElseIf('Update-Single' -eq $PSCmdlet.ParameterSetName){
            
            if($Id.Length -ne 1){
                throw "Updating to an explicit package version is only allowed when updating a single package"
            }
    
            $packageUpdates.Add($Id,$Version)
        }
        Else{        
            
            foreach($task in $DevOp.Tasks.Values){
    
                $packageUpdates.Add($task.PackageId,(PackageManagement\Get-LatestDevOpTaskPackageVersion -Source $Source -Id $task.PackageId))
            
            }
        }
    
        foreach($task in $DevOp.Tasks.Values){
    
            $updatedPackageVersion = $packageUpdates.($task.PackageId)
    
            if($null -ne $updatedPackageVersion){
    
                PackageManagement\Uninstall-DevOpTaskPackage -Id $task.PackageId -Version $task.PackageVersion -ProjectRootDirPath $ProjectRootDirPath
    
    Write-Debug `
    @"
    Updating task "$($task.Name)" package "$($task.PackageId)"
    from version "$($task.PackageVersion)"
    to version "$($updatedPackageVersion)"
    "@
                DevOpStorage\Update-DevOpTaskPackageVersion `
                    -DevOpName $DevOpName `
                    -TaskName $task.Name `
                    -PackageVersion $updatedPackageVersion `
                    -ProjectRootDirPath $ProjectRootDirPath
            }
        }
    }
    
    Export-ModuleMember -Function @(
                                    # DevOp API
                                    'Invoke-DevOp',
                                    'New-DevOp',
                                    'Remove-DevOp',
                                    'Rename-DevOp',
                                    'Get-DevOp',
                        
                                    # DevOp Task API
                                    'Add-DevOpTask',
                                    'Remove-DevOpTask',
                                    'Rename-DevOpTask',
                                    'Set-DevOpTaskParameter',
    
                                    # DevOp Task Package API
                                    'Update-DevOpTaskPackage',
                                    'New-DevOpTaskPackageSpec')
    
  • tools\PoshDevOps\ProtectedData\Commands.ps1 Show
    if ($PSVersionTable.PSVersion.Major -eq 2)
    {
        $IgnoreError = 'SilentlyContinue'
    }
    else
    {
        $IgnoreError = 'Ignore'
    }
    
    $script:ValidTypes = @(
        [string]
        [System.Security.SecureString]
        [System.Management.Automation.PSCredential]
        [byte[]]
    )
    
    $script:PSCredentialHeader = [byte[]](5,12,19,75,80,20,19,11,11,6,11,13)
    
    $script:EccAlgorithmOid = '1.2.840.10045.2.1'
    
    #region Exported functions
    
    function Protect-Data
    {
        <#
        .Synopsis
           Encrypts an object using one or more digital certificates and/or passwords.
        .DESCRIPTION
           Encrypts an object using a randomly-generated AES key. AES key information is encrypted using one or more certificate public keys and/or password-derived keys, allowing the data to be securely shared among multiple users and computers.
           If certificates are used, they must be installed in either the local computer or local user's certificate stores, and the certificates' Key Usage extension must allow Key Encipherment (for RSA) or Key Agreement (for ECDH). The private keys are not required for Protect-Data.
        .PARAMETER InputObject
           The object that is to be encrypted. The object must be of one of the types returned by the Get-ProtectedDataSupportedTypes command.
        .PARAMETER Certificate
           Zero or more RSA or ECDH certificates that should be used to encrypt the data. The data can later be decrypted by using the same certificate (with its private key.)  You can pass an X509Certificate2 object to this parameter, or you can pass in a string which contains either a path to a certificate file on the file system, a path to the certificate in the Certificate provider, or a certificate thumbprint (in which case the certificate provider will be searched to find the certificate.)
        .PARAMETER UseLegacyPadding
           Optional switch specifying that when performing certificate-based encryption, PKCS#1 v1.5 padding should be used instead of the newer, more secure OAEP padding scheme.  Some certificates may not work properly with OAEP padding
        .PARAMETER Password
           Zero or more SecureString objects containing password that will be used to derive encryption keys. The data can later be decrypted by passing in a SecureString with the same value.
        .PARAMETER SkipCertificateValidation
           If specified, the command does not attempt to validate that the specified certificate(s) came from trusted publishers and have not been revoked or expired.
           This is primarily intended to allow the use of self-signed certificates.
        .PARAMETER PasswordIterationCount
           Optional positive integer value specifying the number of iteration that should be used when deriving encryption keys from the specified password(s). Defaults to 1000.
           Higher values make it more costly to crack the passwords by brute force.
        .EXAMPLE
           $encryptedObject = Protect-Data -InputObject $myString -CertificateThumbprint CB04E7C885BEAE441B39BC843C85855D97785D25 -Password (Read-Host -AsSecureString -Prompt 'Enter password to encrypt')
    
           Encrypts a string using a single RSA or ECDH certificate, and a password. Either the certificate or the password can be used when decrypting the data.
        .EXAMPLE
           $credential | Protect-Data -CertificateThumbprint 'CB04E7C885BEAE441B39BC843C85855D97785D25', 'B5A04AB031C24BCEE220D6F9F99B6F5D376753FB'
    
           Encrypts a PSCredential object using two RSA or ECDH certificates. Either private key can be used to later decrypt the data.
        .INPUTS
           Object
    
           Object must be one of the types returned by the Get-ProtectedDataSupportedTypes command.
        .OUTPUTS
           PSObject
    
           The output object contains the following properties:
    
           CipherText : An array of bytes containing the encrypted data
           Type : A string representation of the InputObject's original type (used when decrypting back to the original object later.)
           KeyData : One or more structures which contain encrypted copies of the AES key used to protect the ciphertext, and other identifying information about the way this copy of the keys was protected, such as Certificate Thumbprint, Password Hash, Salt values, and Iteration count.
        .LINK
            Unprotect-Data
        .LINK
            Add-ProtectedDataCredential
        .LINK
            Remove-ProtectedDataCredential
        .LINK
            Get-ProtectedDataSupportedTypes
        #>
    
        [CmdletBinding()]
        [OutputType([psobject])]
        param (
            [Parameter(Mandatory = $true, ValueFromPipeline = $true)]
            [ValidateScript({
                if ($script:ValidTypes -notcontains $_.GetType() -and $null -eq ($_ -as [byte[]]))
                {
                    throw "InputObject must be one of the following types: $($script:ValidTypes -join ', ')"
                }
    
                if ($_ -is [System.Security.SecureString] -and $_.Length -eq 0)
                {
                    throw 'SecureString argument contained no data.'
                }
    
                return $true
            })]
            $InputObject,
    
            [ValidateNotNullOrEmpty()]
            [AllowEmptyCollection()]
            [object[]]
            $Certificate = @(),
    
            [switch]
            $UseLegacyPadding,
    
            [ValidateNotNull()]
            [AllowEmptyCollection()]
            [ValidateScript({
                if ($_.Length -eq 0)
                {
                    throw 'You may not pass empty SecureStrings to the Password parameter'
                }
    
                return $true
            })]
            [System.Security.SecureString[]]
            $Password = @(),
    
            [ValidateRange(1,2147483647)]
            [int]
            $PasswordIterationCount = 1000,
    
            [switch]
            $SkipCertificateVerification
        )
    
        begin
        {
            $certs = @(
                foreach ($cert in $Certificate)
                {
                    try
                    {
    
                        $x509Cert = ConvertTo-X509Certificate2 -InputObject $cert -ErrorAction Stop
    
                        $params = @{
                            CertificateGroup = $x509Cert
                            SkipCertificateVerification = $SkipCertificateVerification
                        }
    
                        ValidateKeyEncryptionCertificate @params -ErrorAction Stop
                    }
                    catch
                    {
                        Write-Error -ErrorRecord $_
                    }
                }
            )
    
            if ($certs.Count -eq 0 -and $Password.Count -eq 0)
            {
                throw ('None of the specified certificates could be used for encryption, and no passwords were specified.' +
                      ' Data protection cannot be performed.')
            }
        }
    
        process
        {
            $plainText = $null
            $payload = $null
    
            try
            {
                $plainText = ConvertTo-PinnedByteArray -InputObject $InputObject
                $payload = Protect-DataWithAes -PlainText $plainText
    
                $protectedData = New-Object psobject -Property @{
                    CipherText = $payload.CipherText
                    HMAC = $payload.HMAC
                    Type = $InputObject.GetType().FullName
                    KeyData = @()
                }
    
                $params = @{
                    InputObject = $protectedData
                    Key = $payload.Key
                    IV = $payload.IV
                    Certificate = $certs
                    Password = $Password
                    PasswordIterationCount = $PasswordIterationCount
                    UseLegacyPadding = $UseLegacyPadding
                }
    
                Add-KeyData @params
    
                if ($protectedData.KeyData.Count -eq 0)
                {
                    Write-Error 'Failed to protect data with any of the supplied certificates or passwords.'
                    return
                }
                else
                {
                    $protectedData
                }
            }
            finally
            {
                if ($plainText -is [IDisposable]) { $plainText.Dispose() }
                if ($null -ne $payload)
                {
                    if ($payload.Key -is [IDisposable]) { $payload.Key.Dispose() }
                    if ($payload.IV -is [IDisposable]) { $payload.IV.Dispose() }
                }
            }
    
        } # process
    
    } # function Protect-Data
    
    function Unprotect-Data
    {
        <#
        .Synopsis
           Decrypts an object that was produced by the Protect-Data command.
        .DESCRIPTION
           Decrypts an object that was produced by the Protect-Data command. If a Certificate is used to perform the decryption, it must be installed in either the local computer or current user's certificate stores (with its private key), and the current user must have permission to use that key.
        .PARAMETER InputObject
           The ProtectedData object that is to be decrypted.
        .PARAMETER Certificate
           An RSA or ECDH certificate that will be used to decrypt the data.  You must have the certificate's private key, and it must be one of the certificates that was used to encrypt the data.  You can pass an X509Certificate2 object to this parameter, or you can pass in a string which contains either a path to a certificate file on the file system, a path to the certificate in the Certificate provider, or a certificate thumbprint (in which case the certificate provider will be searched to find the certificate.)
        .PARAMETER Password
           A SecureString containing a password that will be used to derive an encryption key. One of the InputObject's KeyData objects must be protected with this password.
        .PARAMETER SkipCertificateValidation
           If specified, the command does not attempt to validate that the specified certificate(s) came from trusted publishers and have not been revoked or expired.
           This is primarily intended to allow the use of self-signed certificates.
        .EXAMPLE
           $decryptedObject = $encryptedObject | Unprotect-Data -Password (Read-Host -AsSecureString -Prompt 'Enter password to decrypt the data')
    
           Decrypts the contents of $encryptedObject and outputs an object of the same type as what was originally passed to Protect-Data. Uses a password to decrypt the object instead of a certificate.
        .INPUTS
           PSObject
    
           The input object should be a copy of an object that was produced by Protect-Data.
        .OUTPUTS
           Object
    
           Object may be any type returned by Get-ProtectedDataSupportedTypes. Specifically, it will be an object of the type specified in the InputObject's Type property.
        .LINK
            Protect-Data
        .LINK
            Add-ProtectedDataCredential
        .LINK
            Remove-ProtectedDataCredential
        .LINK
            Get-ProtectedDataSupportedTypes
        #>
    
        [CmdletBinding(DefaultParameterSetName = 'Certificate')]
        param (
            [Parameter(Mandatory = $true, ValueFromPipeline = $true)]
            [ValidateScript({
                if (-not (Test-IsProtectedData -InputObject $_))
                {
                    throw 'InputObject argument must be a ProtectedData object.'
                }
    
                if ($null -eq $_.CipherText -or $_.CipherText.Count -eq 0)
                {
                    throw 'Protected data object contained no cipher text.'
                }
    
                $type = $_.Type -as [type]
    
                if ($null -eq $type -or $script:ValidTypes -notcontains $type)
                {
                    throw 'Protected data object specified an invalid type. Type must be one of: ' +
                          ($script:ValidTypes -join ', ')
                }
    
                return $true
            })]
            $InputObject,
    
            [Parameter(Mandatory = $true, ParameterSetName = 'Certificate')]
            [object]
            $Certificate,
    
            [Parameter(Mandatory = $true, ParameterSetName = 'Password')]
            [System.Security.SecureString]
            $Password,
    
            [switch]
            $SkipCertificateVerification
        )
    
        begin
        {
            $cert = $null
    
            if ($Certificate)
            {
                try
                {
                    $cert = ConvertTo-X509Certificate2 -InputObject $Certificate -ErrorAction Stop
    
                    $params = @{
                        CertificateGroup = $cert
                        RequirePrivateKey = $true
                        SkipCertificateVerification = $SkipCertificateVerification
                    }
    
                    $cert = ValidateKeyEncryptionCertificate @params -ErrorAction Stop
                }
                catch
                {
                    throw
                }
            }
        }
    
        process
        {
            $plainText = $null
            $aes = $null
            $key = $null
            $iv = $null
    
            if ($null -ne $cert)
            {
                $params = @{ Certificate = $cert }
            }
            else
            {
                $params = @{ Password = $Password }
            }
    
            try
            {
                $result = Unprotect-MatchingKeyData -InputObject $InputObject @params
                $key = $result.Key
                $iv = $result.IV
    
                if ($null -eq $InputObject.HMAC)
                {
                    throw 'Input Object contained no HMAC code.'
                }
    
                $hmac = $InputObject.HMAC
    
                $plainText = (Unprotect-DataWithAes -CipherText $InputObject.CipherText -Key $key -IV $iv -HMAC $hmac).PlainText
    
                ConvertFrom-ByteArray -ByteArray $plainText -Type $InputObject.Type -ByteCount $plainText.Count
            }
            catch
            {
                Write-Error -ErrorRecord $_
                return
            }
            finally
            {
                if ($plainText -is [IDisposable]) { $plainText.Dispose() }
                if ($key -is [IDisposable]) { $key.Dispose() }
                if ($iv -is [IDisposable]) { $iv.Dispose() }
            }
    
        } # process
    
    } # function Unprotect-Data
    
    function Add-ProtectedDataHmac
    {
        <#
        .Synopsis
           Adds an HMAC authentication code to a ProtectedData object which was created with a previous version of the module.
        .DESCRIPTION
           Adds an HMAC authentication code to a ProtectedData object which was created with a previous version of the module.  The parameters and requirements are the same as for the Unprotect-Data command, as the data must be partially decrypted in order to produce the HMAC code.
        .PARAMETER InputObject
           The ProtectedData object that is to have an HMAC generated.
        .PARAMETER Certificate
           An RSA or ECDH certificate that will be used to decrypt the data.  You must have the certificate's private key, and it must be one of the certificates that was used to encrypt the data.  You can pass an X509Certificate2 object to this parameter, or you can pass in a string which contains either a path to a certificate file on the file system, a path to the certificate in the Certificate provider, or a certificate thumbprint (in which case the certificate provider will be searched to find the certificate.)
        .PARAMETER Password
           A SecureString containing a password that will be used to derive an encryption key. One of the InputObject's KeyData objects must be protected with this password.
        .PARAMETER SkipCertificateValidation
           If specified, the command does not attempt to validate that the specified certificate(s) came from trusted publishers and have not been revoked or expired.
           This is primarily intended to allow the use of self-signed certificates.
        .PARAMETER PassThru
           If specified, the command outputs the ProtectedData object after adding the HMAC.
        .EXAMPLE
           $encryptedObject | Add-ProtectedDataHmac -Password (Read-Host -AsSecureString -Prompt 'Enter password to decrypt the key data')
    
           Adds an HMAC code to the $encryptedObject object.
        .INPUTS
           PSObject
    
           The input object should be a copy of an object that was produced by Protect-Data.
        .OUTPUTS
           None, or ProtectedData object if the -PassThru switch is used.
        .LINK
            Protect-Data
        .LINK
            Unprotect-Data
        .LINK
            Add-ProtectedDataCredential
        .LINK
            Remove-ProtectedDataCredential
        .LINK
            Get-ProtectedDataSupportedTypes
        #>
    
        [CmdletBinding(DefaultParameterSetName = 'Certificate')]
        param (
            [Parameter(Mandatory = $true, ValueFromPipeline = $true)]
            [ValidateScript({
                if (-not (Test-IsProtectedData -InputObject $_))
                {
                    throw 'InputObject argument must be a ProtectedData object.'
                }
    
                if ($null -eq $_.CipherText -or $_.CipherText.Count -eq 0)
                {
                    throw 'Protected data object contained no cipher text.'
                }
    
                $type = $_.Type -as [type]
    
                if ($null -eq $type -or $script:ValidTypes -notcontains $type)
                {
                    throw 'Protected data object specified an invalid type. Type must be one of: ' +
                          ($script:ValidTypes -join ', ')
                }
    
                return $true
            })]
            $InputObject,
    
            [Parameter(Mandatory = $true, ParameterSetName = 'Certificate')]
            [object]
            $Certificate,
    
            [Parameter(Mandatory = $true, ParameterSetName = 'Password')]
            [System.Security.SecureString]
            $Password,
    
            [switch]
            $SkipCertificateVerification,
    
            [switch]
            $PassThru
        )
    
        begin
        {
            $cert = $null
    
            if ($Certificate)
            {
                try
                {
                    $cert = ConvertTo-X509Certificate2 -InputObject $Certificate -ErrorAction Stop
    
                    $params = @{
                        CertificateGroup = $cert
                        RequirePrivateKey = $true
                        SkipCertificateVerification = $SkipCertificateVerification
                    }
    
                    $cert = ValidateKeyEncryptionCertificate @params -ErrorAction Stop
                }
                catch
                {
                    throw
                }
            }
        }
    
        process
        {
            $key = $null
            $iv = $null
    
            if ($null -ne $cert)
            {
                $params = @{ Certificate = $cert }
            }
            else
            {
                $params = @{ Password = $Password }
            }
    
            try
            {
                $result = Unprotect-MatchingKeyData -InputObject $InputObject @params
                $key = $result.Key
                $iv = $result.IV
    
                $hmac = Get-Hmac -Key $key -Bytes $InputObject.CipherText
    
                if ($InputObject.PSObject.Properties['HMAC'])
                {
                    $InputObject.HMAC = $hmac
                }
                else
                {
                    Add-Member -InputObject $InputObject -Name HMAC -Value $hmac -MemberType NoteProperty
                }
    
                if ($PassThru)
                {
                    $InputObject
                }
            }
            catch
            {
                Write-Error -ErrorRecord $_
                return
            }
            finally
            {
                if ($key -is [IDisposable]) { $key.Dispose() }
                if ($iv -is [IDisposable]) { $iv.Dispose() }
            }
    
        } # process
    
    } # function Unprotect-Data
    
    function Add-ProtectedDataCredential
    {
        <#
        .Synopsis
           Adds one or more new copies of an encryption key to an object generated by Protect-Data.
        .DESCRIPTION
           This command can be used to add new certificates and/or passwords to an object that was previously encrypted by Protect-Data. The caller must provide one of the certificates or passwords that already exists in the ProtectedData object to perform this operation.
        .PARAMETER InputObject
           The ProtectedData object which was created by an earlier call to Protect-Data.
        .PARAMETER Certificate
           An RSA or ECDH certificate which was previously used to encrypt the ProtectedData structure's key.
        .PARAMETER Password
           A password which was previously used to encrypt the ProtectedData structure's key.
        .PARAMETER NewCertificate
           Zero or more RSA or ECDH certificates that should be used to encrypt the data. The data can later be decrypted by using the same certificate (with its private key.)  You can pass an X509Certificate2 object to this parameter, or you can pass in a string which contains either a path to a certificate file on the file system, a path to the certificate in the Certificate provider, or a certificate thumbprint (in which case the certificate provider will be searched to find the certificate.)
        .PARAMETER UseLegacyPadding
           Optional switch specifying that when performing certificate-based encryption, PKCS#1 v1.5 padding should be used instead of the newer, more secure OAEP padding scheme.  Some certificates may not work properly with OAEP padding
        .PARAMETER NewPassword
           Zero or more SecureString objects containing password that will be used to derive encryption keys. The data can later be decrypted by passing in a SecureString with the same value.
        .PARAMETER SkipCertificateValidation
           If specified, the command does not attempt to validate that the specified certificate(s) came from trusted publishers and have not been revoked or expired.
           This is primarily intended to allow the use of self-signed certificates.
        .PARAMETER PasswordIterationCount
           Optional positive integer value specifying the number of iteration that should be used when deriving encryption keys from the specified password(s). Defaults to 1000.
           Higher values make it more costly to crack the passwords by brute force.
        .PARAMETER Passthru
           If this switch is used, the ProtectedData object is output to the pipeline after it is modified.
        .EXAMPLE
           Add-ProtectedDataCredential -InputObject $protectedData -Certificate $oldThumbprint -NewCertificate $newThumbprints -NewPassword $newPasswords
    
           Uses the certificate with thumbprint $oldThumbprint to add new key copies to the $protectedData object. $newThumbprints would be a string array containing thumbprints, and $newPasswords would be an array of SecureString objects.
        .INPUTS
           [PSObject]
    
           The input object should be a copy of an object that was produced by Protect-Data.
        .OUTPUTS
           None, or
           [PSObject]
        .LINK
            Unprotect-Data
        .LINK
            Add-ProtectedDataCredential
        .LINK
            Remove-ProtectedDataCredential
        .LINK
            Get-ProtectedDataSupportedTypes
        #>
    
        [CmdletBinding(DefaultParameterSetName = 'Certificate')]
        param (
            [Parameter(Mandatory = $true, ValueFromPipeline = $true)]
            [ValidateScript({
                if (-not (Test-IsProtectedData -InputObject $_))
                {
                    throw 'InputObject argument must be a ProtectedData object.'
                }
    
                return $true
            })]
            $InputObject,
    
            [Parameter(Mandatory = $true, ParameterSetName = 'Certificate')]
            [object]
            $Certificate,
    
            [Parameter(ParameterSetName = 'Certificate')]
            [switch]
            $UseLegacyPaddingForDecryption,
    
            [Parameter(Mandatory = $true, ParameterSetName = 'Password')]
            [System.Security.SecureString]
            $Password,
    
            [ValidateNotNull()]
            [AllowEmptyCollection()]
            [object[]]
            $NewCertificate = @(),
    
            [switch]
            $UseLegacyPadding,
    
            [ValidateNotNull()]
            [AllowEmptyCollection()]
            [System.Security.SecureString[]]
            $NewPassword = @(),
    
            [ValidateRange(1,2147483647)]
            [int]
            $PasswordIterationCount = 1000,
    
            [switch]
            $SkipCertificateVerification,
    
            [switch]
            $Passthru
        )
    
        begin
        {
            $decryptionCert = $null
    
            if ($PSCmdlet.ParameterSetName -eq 'Certificate')
            {
                try
                {
                    $decryptionCert = ConvertTo-X509Certificate2 -InputObject $Certificate -ErrorAction Stop
    
                    $params = @{
                        CertificateGroup = $decryptionCert
                        SkipCertificateVerification = $SkipCertificateVerification
                        RequirePrivateKey = $true
                    }
    
                    $decryptionCert = ValidateKeyEncryptionCertificate @params -ErrorAction Stop
                }
                catch
                {
                    throw
                }
            }
    
            $certs = @(
                foreach ($cert in $NewCertificate)
                {
                    try
                    {
                        $x509Cert = ConvertTo-X509Certificate2 -InputObject $cert -ErrorAction Stop
    
                        $params = @{
                            CertificateGroup = $x509Cert
                            SkipCertificateVerification = $SkipCertificateVerification
                        }
    
                        ValidateKeyEncryptionCertificate @params -ErrorAction Stop
                    }
                    catch
                    {
                        Write-Error -ErrorRecord $_
                    }
                }
            )
    
            if ($certs.Count -eq 0 -and $NewPassword.Count -eq 0)
            {
                throw 'None of the specified certificates could be used for encryption, and no passwords were ' +
                      'specified. Data protection cannot be performed.'
            }
    
        } # begin
    
        process
        {
            if ($null -ne $decryptionCert)
            {
                $params = @{ Certificate = $decryptionCert }
            }
            else
            {
                $params = @{ Password = $Password }
            }
    
            $key = $null
            $iv = $null
    
            try
            {
                $result = Unprotect-MatchingKeyData -InputObject $InputObject @params
                $key = $result.Key
                $iv = $result.IV
    
                Add-KeyData -InputObject $InputObject -Key $key -IV $iv -Certificate $certs -Password $NewPassword -UseLegacyPadding:$UseLegacyPadding
            }
            catch
            {
                Write-Error -ErrorRecord $_
                return
            }
            finally
            {
                if ($key -is [IDisposable]) { $key.Dispose() }
                if ($iv -is [IDisposable]) { $iv.Dispose() }
            }
    
            if ($Passthru)
            {
                $InputObject
            }
    
        } # process
    
    } # function Add-ProtectedDataCredential
    
    function Remove-ProtectedDataCredential
    {
        <#
        .Synopsis
           Removes copies of encryption keys from a ProtectedData object.
        .DESCRIPTION
           The KeyData copies in a ProtectedData object which are associated with the specified Certificates and/or Passwords are removed from the object, unless that removal would leave no KeyData copies behind.
        .PARAMETER InputObject
           The ProtectedData object which is to be modified.
        .PARAMETER Certificate
           RSA or ECDH certificates that you wish to remove from this ProtectedData object.  You can pass an X509Certificate2 object to this parameter, or you can pass in a string which contains either a path to a certificate file on the file system, a path to the certificate in the Certificate provider, or a certificate thumbprint (in which case the certificate provider will be searched to find the certificate.)
        .PARAMETER Password
           Passwords in SecureString form which are to be removed from this ProtectedData object.
        .PARAMETER Passthru
           If this switch is used, the ProtectedData object will be written to the pipeline after processing is complete.
        .EXAMPLE
           $protectedData | Remove-ProtectedDataCredential -Certificate $thumbprints -Password $passwords
    
           Removes certificates and passwords from an existing ProtectedData object.
        .INPUTS
           [PSObject]
    
           The input object should be a copy of an object that was produced by Protect-Data.
        .OUTPUTS
           None, or
           [PSObject]
        .LINK
           Protect-Data
        .LINK
           Unprotect-Data
        .LINK
           Add-ProtectedDataCredential
        #>
    
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true, ValueFromPipeline = $true)]
            [ValidateScript({
                if (-not (Test-IsProtectedData -InputObject $_))
                {
                    throw 'InputObject argument must be a ProtectedData object.'
                }
    
                return $true
            })]
            $InputObject,
    
            [ValidateNotNull()]
            [AllowEmptyCollection()]
            [object[]]
            $Certificate,
    
            [ValidateNotNull()]
            [AllowEmptyCollection()]
            [System.Security.SecureString[]]
            $Password,
    
            [switch]
            $Passthru
        )
    
        begin
        {
            $thumbprints = @(
                $Certificate |
                ConvertTo-X509Certificate2 |
                Select-Object -ExpandProperty Thumbprint
            )
    
            $thumbprints = $thumbprints | Get-Unique
        }
    
        process
        {
            $matchingKeyData = @(
                foreach ($keyData in $InputObject.KeyData)
                {
                    if (Test-IsCertificateProtectedKeyData -InputObject $keyData)
                    {
                        if ($thumbprints -contains $keyData.Thumbprint) { $keyData }
                    }
                    elseif (Test-IsPasswordProtectedKeyData -InputObject $keyData)
                    {
                        foreach ($secureString in $Password)
                        {
                            $params = @{
                                Password = $secureString
                                Salt = $keyData.HashSalt
                                IterationCount = $keyData.IterationCount
                            }
                            if ($keyData.Hash -eq (Get-PasswordHash @params))
                            {
                                $keyData
                            }
                        }
                    }
                }
            )
    
            if ($matchingKeyData.Count -eq $InputObject.KeyData.Count)
            {
                Write-Error 'You must leave at least one copy of the ProtectedData object''s keys.'
                return
            }
    
            $InputObject.KeyData = $InputObject.KeyData | Where-Object { $matchingKeyData -notcontains $_ }
    
            if ($Passthru)
            {
                $InputObject
            }
        }
    
    } # function Remove-ProtectedDataCredential
    
    function Get-ProtectedDataSupportedTypes
    {
        <#
        .Synopsis
           Returns a list of types that can be used as the InputObject in the Protect-Data command.
        .EXAMPLE
           $types = Get-ProtectedDataSupportedTypes
        .INPUTS
           None.
        .OUTPUTS
           Type[]
        .NOTES
           This function allows you to know which InputObject types are supported by the Protect-Data and Unprotect-Data commands in this version of the module. This list may expand over time, will always be backwards-compatible with previously-encrypted data.
        .LINK
           Protect-Data
        .LINK
           Unprotect-Data
        #>
    
        [CmdletBinding()]
        [OutputType([Type[]])]
        param ( )
    
        $script:ValidTypes
    }
    
    function Get-KeyEncryptionCertificate
    {
        <#
        .Synopsis
           Finds certificates which can be used by Protect-Data and related commands.
        .DESCRIPTION
           Searches the given path, and all child paths, for certificates which can be used by Protect-Data. Such certificates must support Key Encipherment (for RSA) or Key Agreement (for ECDH) usage, and by default, must not be expired and must be issued by a trusted authority.
        .PARAMETER Path
           Path which should be searched for the certifictes. Defaults to the entire Cert: drive.
        .PARAMETER CertificateThumbprint
           Thumbprints which should be included in the search. Wildcards are allowed. Defaults to '*'.
        .PARAMETER SkipCertificateVerification
           If this switch is used, the command will include certificates which are not yet valid, expired, revoked, or issued by an untrusted authority. This can be useful if you wish to use a self-signed certificate for encryption.
        .PARAMETER RequirePrivateKey
           If this switch is used, the command will only output certificates which have a usable private key on this computer.
        .EXAMPLE
           Get-KeyEncryptionCertificate -Path Cert:\CurrentUser -RequirePrivateKey -SkipCertificateVerification
    
           Searches for certificates which support key encipherment (RSA) or key agreement (ECDH) and have a private key installed. All matching certificates are returned, and they do not need to be verified for trust, revocation or validity period.
        .EXAMPLE
           Get-KeyEncryptionCertificate -Path Cert:\CurrentUser\TrustedPeople
    
           Searches the current user's Trusted People store for certificates that can be used with Protect-Data. Certificates must be current, issued by a trusted authority, and not revoked, but they do not need to have a private key available to the current user.
        .INPUTS
           None.
        .OUTPUTS
           [System.Security.Cryptography.X509Certificates.X509Certificate2]
        .LINK
           Protect-Data
        .LINK
           Unprotect-Data
        .LINK
           Add-ProtectedDataCredential
        .LINK
           Remove-ProtectedDataCredential
        #>
    
        [CmdletBinding()]
        [OutputType([System.Security.Cryptography.X509Certificates.X509Certificate2])]
        param (
            [ValidateNotNullOrEmpty()]
            [string]
            $Path = 'Cert:\',
    
            [string]
            $CertificateThumbprint = '*',
    
            [switch]
            $SkipCertificateVerification,
    
            [switch]
            $RequirePrivateKey
        )
    
        # Suppress error output if we're doing a wildcard search (unless user specifically asks for it via -ErrorAction)
        # This is a little ugly, may rework this later now that I've made Get-KeyEncryptionCertificate public. Originally
        # it was only used to search for a single thumbprint, and threw errors back to the caller if no suitable cert could
        # be found. Now I want it to also be used as a search tool for users to identify suitable certificates. Maybe just
        # needs to be two separate functions, one internal and one public.
    
        if (-not $PSBoundParameters.ContainsKey('ErrorAction') -and
            $CertificateThumbprint -notmatch '^[A-F\d]+$')
        {
            $ErrorActionPreference = $IgnoreError
        }
    
        $certGroups = GetCertificateByThumbprint -Path $Path -Thumbprint $CertificateThumbprint -ErrorAction $IgnoreError |
                      Group-Object -Property Thumbprint
    
        if ($null -eq $certGroups)
        {
            throw "Certificate '$CertificateThumbprint' was not found."
        }
    
        $params = @{
            SkipCertificateVerification = $SkipCertificateVerification
            RequirePrivateKey = $RequirePrivateKey
        }
    
        foreach ($group in $certGroups)
        {
            ValidateKeyEncryptionCertificate -CertificateGroup $group.Group @params
        }
    
    } # function Get-KeyEncryptionCertificate
    
    #endregion
    
    #region Helper functions
    
    function ConvertTo-X509Certificate2
    {
        [CmdletBinding()]
        [OutputType([System.Security.Cryptography.X509Certificates.X509Certificate2])]
        param (
            [Parameter(ValueFromPipeline = $true)]
            [object[]] $InputObject = @()
        )
    
        process
        {
            foreach ($object in $InputObject)
            {
                if ($null -eq $object) { continue }
    
                $possibleCerts = @(
                    $object -as [System.Security.Cryptography.X509Certificates.X509Certificate2]
                    GetCertificateFromPSPath -Path $object
                ) -ne $null
    
                if ($object -match '^[A-F\d]+$' -and $possibleCerts.Count -eq 0)
                {
                    $possibleCerts = @(GetCertificateByThumbprint -Thumbprint $object)
                }
    
                $cert = $possibleCerts | Select-Object -First 1
    
                if ($null -ne $cert)
                {
                    $cert
                }
                else
                {
                    Write-Error "No certificate with identifier '$object' of type $($object.GetType().FullName) was found."
                }
            }
        }
    }
    
    function GetCertificateFromPSPath
    {
        [CmdletBinding()]
        [OutputType([System.Security.Cryptography.X509Certificates.X509Certificate2])]
        param (
            [Parameter(Mandatory = $true)]
            [string] $Path
        )
    
        if (-not (Test-Path -LiteralPath $Path)) { return }
        $resolved = Resolve-Path -LiteralPath $Path
    
        switch ($resolved.Provider.Name)
        {
            'FileSystem'
            {
                # X509Certificate2 has a constructor that takes a fileName string; using the -as operator is faster than
                # New-Object, and works just as well.
    
                return $resolved.ProviderPath -as [System.Security.Cryptography.X509Certificates.X509Certificate2]
            }
    
            'Certificate'
            {
                return (Get-Item -LiteralPath $Path) -as [System.Security.Cryptography.X509Certificates.X509Certificate2]
            }
        }
    }
    
    function GetCertificateByThumbprint
    {
        [CmdletBinding()]
        [OutputType([System.Security.Cryptography.X509Certificates.X509Certificate2])]
        param (
            [Parameter(Mandatory = $true)]
            [string] $Thumbprint,
    
            [ValidateNotNullOrEmpty()]
            [string]
            $Path = 'Cert:\'
        )
    
        return Get-ChildItem -Path $Path -Recurse -Include $Thumbprint |
               Where-Object { $_ -is [System.Security.Cryptography.X509Certificates.X509Certificate2] } |
               Sort-Object -Property HasPrivateKey -Descending
    }
    
    function Protect-DataWithAes
    {
        [CmdletBinding(DefaultParameterSetName = 'KnownKey')]
        param (
            [Parameter(Mandatory = $true)]
            [byte[]]
            $PlainText,
    
            [byte[]]
            $Key,
    
            [byte[]]
            $IV,
    
            [switch]
            $NoHMAC
        )
    
        $aes = $null
        $memoryStream = $null
        $cryptoStream = $null
    
        try
        {
            $aes = New-Object System.Security.Cryptography.AesCryptoServiceProvider
    
            if ($null -ne $Key) { $aes.Key = $Key }
            if ($null -ne $IV) { $aes.IV = $IV }
    
            $memoryStream = New-Object System.IO.MemoryStream
            $cryptoStream = New-Object System.Security.Cryptography.CryptoStream(
                $memoryStream, $aes.CreateEncryptor(), 'Write'
            )
    
            $cryptoStream.Write($PlainText, 0, $PlainText.Count)
            $cryptoStream.FlushFinalBlock()
    
            $properties = @{
                CipherText = $memoryStream.ToArray()
                HMAC = $null
            }
    
            $hmacKeySplat = @{
                Key = $Key
            }
    
            if ($null -eq $Key)
            {
                $properties['Key'] = New-Object PowerShellUtils.PinnedArray[byte](,$aes.Key)
                $hmacKeySplat['Key'] = $properties['Key']
            }
    
            if ($null -eq $IV)
            {
                $properties['IV'] = New-Object PowerShellUtils.PinnedArray[byte](,$aes.IV)
            }
    
            if (-not $NoHMAC)
            {
                $properties['HMAC'] = Get-Hmac @hmacKeySplat -Bytes $properties['CipherText']
            }
    
            New-Object psobject -Property $properties
        }
        finally
        {
            if ($null -ne $aes) { $aes.Clear() }
            if ($cryptoStream -is [IDisposable]) { $cryptoStream.Dispose() }
            if ($memoryStream -is [IDisposable]) { $memoryStream.Dispose() }
        }
    }
    
    function Get-Hmac
    {
        [OutputType([byte[]])]
        param (
            [Parameter(Mandatory = $true)]
            [byte[]] $Key,
    
            [Parameter(Mandatory = $true)]
            [byte[]] $Bytes
        )
    
        $hmac = $null
        $sha = $null
    
        try
        {
            $sha = New-Object System.Security.Cryptography.SHA256CryptoServiceProvider
            $hmac = New-Object PowerShellUtils.FipsHmacSha256(,$sha.ComputeHash($Key))
            return ,$hmac.ComputeHash($Bytes)
        }
        finally
        {
            if ($null -ne $hmac) { $hmac.Clear() }
            if ($null -ne $sha)  { $sha.Clear() }
        }
    }
    
    function Unprotect-DataWithAes
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            [byte[]]
            $CipherText,
    
            [Parameter(Mandatory = $true)]
            [byte[]]
            $Key,
    
            [Parameter(Mandatory = $true)]
            [byte[]]
            $IV,
    
            [byte[]]
            $HMAC
        )
    
        $aes = $null
        $memoryStream = $null
        $cryptoStream = $null
        $buffer = $null
    
        if ($null -ne $HMAC)
        {
            Assert-ValidHmac -Key $Key -Bytes $CipherText -Hmac $HMAC
        }
    
        try
        {
            $aes = New-Object System.Security.Cryptography.AesCryptoServiceProvider -Property @{
                Key = $Key
                IV = $IV
            }
    
            # Not sure exactly how long of a buffer we'll need to hold the decrypted data. Twice
            # the ciphertext length should be more than enough.
            $buffer = New-Object PowerShellUtils.PinnedArray[byte](2 * $CipherText.Count)
    
            $memoryStream = New-Object System.IO.MemoryStream(,$buffer)
            $cryptoStream = New-Object System.Security.Cryptography.CryptoStream(
                $memoryStream, $aes.CreateDecryptor(), 'Write'
            )
    
            $cryptoStream.Write($CipherText, 0, $CipherText.Count)
            $cryptoStream.FlushFinalBlock()
    
            $plainText = New-Object PowerShellUtils.PinnedArray[byte]($memoryStream.Position)
            [Array]::Copy($buffer.Array, $plainText.Array, $memoryStream.Position)
    
            return New-Object psobject -Property @{
                PlainText = $plainText
            }
        }
        finally
        {
            if ($null -ne $aes) { $aes.Clear() }
            if ($cryptoStream -is [IDisposable]) { $cryptoStream.Dispose() }
            if ($memoryStream -is [IDisposable]) { $memoryStream.Dispose() }
            if ($buffer -is [IDisposable]) { $buffer.Dispose() }
        }
    }
    
    function Assert-ValidHmac
    {
        [OutputType([void])]
        param (
            [Parameter(Mandatory = $true)]
            [byte[]] $Key,
    
            [Parameter(Mandatory = $true)]
            [byte[]] $Bytes,
    
            [Parameter(Mandatory = $true)]
            [byte[]] $Hmac
        )
    
        $recomputedHmac = Get-Hmac -Key $Key -Bytes $Bytes
    
        if (-not (ByteArraysAreEqual $Hmac $recomputedHmac))
        {
            throw 'Decryption failed due to invalid HMAC.'
        }
    }
    
    function ByteArraysAreEqual([byte[]] $First, [byte[]] $Second)
    {
        if ($null -eq $First)  { $First = @() }
        if ($null -eq $Second) { $Second = @() }
    
        if ($First.Length -ne $Second.Length) { return $false }
    
        $length = $First.Length
        for ($i = 0; $i -lt $length; $i++)
        {
            if ($First[$i] -ne $Second[$i]) { return $false }
        }
    
        return $true
    }
    
    function Add-KeyData
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            $InputObject,
    
            [Parameter(Mandatory = $true)]
            [byte[]]
            $Key,
    
            [Parameter(Mandatory = $true)]
            [byte[]]
            $IV,
    
            [ValidateNotNull()]
            [AllowEmptyCollection()]
            [System.Security.Cryptography.X509Certificates.X509Certificate2[]]
            $Certificate = @(),
    
            [switch]
            $UseLegacyPadding,
    
            [ValidateNotNull()]
            [AllowEmptyCollection()]
            [System.Security.SecureString[]]
            $Password = @(),
    
            [ValidateRange(1,2147483647)]
            [int]
            $PasswordIterationCount = 1000
        )
    
        if ($certs.Count -eq 0 -and $Password.Count -eq 0)
        {
            return
        }
    
        $useOAEP = -not $UseLegacyPadding
    
        $InputObject.KeyData += @(
            foreach ($cert in $Certificate)
            {
                $match = $InputObject.KeyData |
                         Where-Object { $_.Thumbprint -eq $cert.Thumbprint }
    
                if ($null -ne $match) { continue }
                Protect-KeyDataWithCertificate -Certificate $cert -Key $Key -IV $IV -UseLegacyPadding:$UseLegacyPadding
            }
    
            foreach ($secureString in $Password)
            {
                $match = $InputObject.KeyData |
                         Where-Object {
                            $params = @{
                                Password = $secureString
                                Salt = $_.HashSalt
                                IterationCount = $_.IterationCount
                            }
    
                            $null -ne $_.Hash -and $_.Hash -eq (Get-PasswordHash @params)
                         }
    
                if ($null -ne $match) { continue }
                Protect-KeyDataWithPassword -Password $secureString -Key $Key -IV $IV -IterationCount $PasswordIterationCount
            }
        )
    
    } # function Add-KeyData
    
    function Unprotect-MatchingKeyData
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            $InputObject,
    
            [Parameter(Mandatory = $true, ParameterSetName = 'Certificate')]
            [System.Security.Cryptography.X509Certificates.X509Certificate2]
            $Certificate,
    
            [Parameter(Mandatory = $true, ParameterSetName = 'Password')]
            [System.Security.SecureString]
            $Password
        )
    
        if ($PSCmdlet.ParameterSetName -eq 'Certificate')
        {
            $keyData = $InputObject.KeyData |
                        Where-Object { (Test-IsCertificateProtectedKeyData -InputObject $_) -and $_.Thumbprint -eq $Certificate.Thumbprint } |
                        Select-Object -First 1
    
            if ($null -eq $keyData)
            {
                throw "Protected data object was not encrypted with certificate '$($Certificate.Thumbprint)'."
            }
    
            try
            {
                return Unprotect-KeyDataWithCertificate -KeyData $keyData -Certificate $Certificate
            }
            catch
            {
                throw
            }
        }
        else
        {
            $keyData =
            $InputObject.KeyData |
            Where-Object {
                (Test-IsPasswordProtectedKeyData -InputObject $_) -and
                $_.Hash -eq (Get-PasswordHash -Password $Password -Salt $_.HashSalt -IterationCount $_.IterationCount)
            } |
            Select-Object -First 1
    
            if ($null -eq $keyData)
            {
                throw 'Protected data object was not encrypted with the specified password.'
            }
    
            try
            {
                return Unprotect-KeyDataWithPassword -KeyData $keyData -Password $Password
            }
            catch
            {
                throw
            }
        }
    
    } # function Unprotect-MatchingKeyData
    
    function ValidateKeyEncryptionCertificate
    {
        [CmdletBinding()]
        [OutputType([System.Security.Cryptography.X509Certificates.X509Certificate2])]
        param (
            [System.Security.Cryptography.X509Certificates.X509Certificate2[]]
            $CertificateGroup,
    
            [switch]
            $SkipCertificateVerification,
    
            [switch]
            $RequirePrivateKey
        )
    
        process
        {
            $Certificate = $CertificateGroup[0]
    
            $isEccCertificate = $Certificate.GetKeyAlgorithm() -eq $script:EccAlgorithmOid
    
            if ($Certificate.PublicKey.Key -isnot [System.Security.Cryptography.RSACryptoServiceProvider] -and
                -not $isEccCertificate)
            {
                Write-Error "Certficiate '$($Certificate.Thumbprint)' is not an RSA or ECDH certificate."
                return
            }
    
            if (-not $SkipCertificateVerification)
            {
                if ($Certificate.NotBefore -gt (Get-Date))
                {
                    Write-Error "Certificate '$($Certificate.Thumbprint)' is not yet valid."
                    return
                }
    
                if ($Certificate.NotAfter -lt (Get-Date))
                {
                    Write-Error "Certificate '$($Certificate.Thumbprint)' has expired."
                    return
                }
            }
    
            if ($isEccCertificate)
            {
                $neededKeyUsage = [System.Security.Cryptography.X509Certificates.X509KeyUsageFlags]::KeyAgreement
            }
            else
            {
                $neededKeyUsage = [System.Security.Cryptography.X509Certificates.X509KeyUsageFlags]::KeyEncipherment
            }
    
            $keyUsageFlags = 0
    
            foreach ($extension in $Certificate.Extensions)
            {
                if ($extension -is [System.Security.Cryptography.X509Certificates.X509KeyUsageExtension])
                {
                    $keyUsageFlags = $keyUsageFlags -bor $extension.KeyUsages
                }
            }
    
            if (($keyUsageFlags -band $neededKeyUsage) -ne $neededKeyUsage)
            {
                Write-Error "Certificate '$($Certificate.Thumbprint)' does not have the required $($neededKeyUsage.ToString()) Key Usage flag."
                return
            }
    
            if (-not $SkipCertificateVerification -and -not $Certificate.Verify())
            {
                Write-Error "Verification of certificate '$($Certificate.Thumbprint)' failed."
                return
            }
    
            if ($RequirePrivateKey)
            {
                $Certificate = $CertificateGroup |
                               Where-Object { TestPrivateKey -Certificate $_ } |
                               Select-Object -First 1
    
                if ($null -eq $Certificate)
                {
                    Write-Error "Could not find private key for certificate '$($CertificateGroup[0].Thumbprint)'."
                    return
                }
            }
    
            $Certificate
    
        } # process
    
    } # function ValidateKeyEncryptionCertificate
    
    function TestPrivateKey([System.Security.Cryptography.X509Certificates.X509Certificate2] $Certificate)
    {
        if (-not $Certificate.HasPrivateKey) { return $false }
        if ($Certificate.PrivateKey -is [System.Security.Cryptography.RSACryptoServiceProvider]) { return $true }
    
        $cngKey = $null
        try
        {
            if ([Security.Cryptography.X509Certificates.X509CertificateExtensionMethods]::HasCngKey($Certificate))
            {
                $cngKey = [Security.Cryptography.X509Certificates.X509Certificate2ExtensionMethods]::GetCngPrivateKey($Certificate)
                return $null -ne $cngKey -and
                       ($cngKey.AlgorithmGroup -eq [System.Security.Cryptography.CngAlgorithmGroup]::Rsa -or
                        $cngKey.AlgorithmGroup -eq [System.Security.Cryptography.CngAlgorithmGroup]::ECDiffieHellman)
            }
        }
        catch
        {
            return $false
        }
        finally
        {
            if ($cngKey -is [IDisposable]) { $cngKey.Dispose() }
        }
    }
    
    function Get-KeyGenerator
    {
        [CmdletBinding(DefaultParameterSetName = 'CreateNew')]
        [OutputType([System.Security.Cryptography.Rfc2898DeriveBytes])]
        param (
            [Parameter(Mandatory = $true)]
            [System.Security.SecureString]
            $Password,
    
            [Parameter(Mandatory = $true, ParameterSetName = 'RestoreExisting')]
            [byte[]]
            $Salt,
    
            [ValidateRange(1,2147483647)]
            [int]
            $IterationCount = 1000
        )
    
        $byteArray = $null
    
        try
        {
            $byteArray = Convert-SecureStringToPinnedByteArray -SecureString $Password
    
            if ($PSCmdlet.ParameterSetName -eq 'RestoreExisting')
            {
                $saltBytes = $Salt
            }
            else
            {
                $saltBytes = Get-RandomBytes -Count 32
            }
    
            New-Object System.Security.Cryptography.Rfc2898DeriveBytes($byteArray, $saltBytes, $IterationCount)
        }
        finally
        {
            if ($byteArray -is [IDisposable]) { $byteArray.Dispose() }
        }
    
    } # function Get-KeyGenerator
    
    function Get-PasswordHash
    {
        [CmdletBinding()]
        [OutputType([string])]
        param (
            [Parameter(Mandatory = $true)]
            [System.Security.SecureString]
            $Password,
    
            [Parameter(Mandatory = $true)]
            [byte[]]
            $Salt,
    
            [ValidateRange(1, 2147483647)]
            [int]
            $IterationCount = 1000
        )
    
        $keyGen = $null
    
        try
        {
            $keyGen = Get-KeyGenerator @PSBoundParameters
            [BitConverter]::ToString($keyGen.GetBytes(32)) -replace '[^A-F\d]'
        }
        finally
        {
            if ($keyGen -is [IDisposable]) { $keyGen.Dispose() }
        }
    
    } # function Get-PasswordHash
    
    function Get-RandomBytes
    {
        [CmdletBinding()]
        [OutputType([byte[]])]
        param (
            [Parameter(Mandatory = $true)]
            [ValidateRange(1,1000)]
            $Count
        )
    
        $rng = $null
    
        try
        {
            $rng = New-Object System.Security.Cryptography.RNGCryptoServiceProvider
            $bytes = New-Object byte[]($Count)
            $rng.GetBytes($bytes)
    
            ,$bytes
        }
        finally
        {
            if ($rng -is [IDisposable]) { $rng.Dispose() }
        }
    
    } # function Get-RandomBytes
    
    function Protect-KeyDataWithCertificate
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            [System.Security.Cryptography.X509Certificates.X509Certificate2]
            $Certificate,
    
            [byte[]]
            $Key,
    
            [byte[]]
            $IV,
    
            [switch] $UseLegacyPadding
        )
    
        if ($Certificate.PublicKey.Key -is [System.Security.Cryptography.RSACryptoServiceProvider])
        {
            Protect-KeyDataWithRsaCertificate -Certificate $Certificate -Key $Key -IV $IV -UseLegacyPadding:$UseLegacyPadding
        }
        elseif ($Certificate.GetKeyAlgorithm() -eq $script:EccAlgorithmOid)
        {
            Protect-KeyDataWithEcdhCertificate -Certificate $Certificate -Key $Key -IV $IV
        }
    }
    
    function Protect-KeyDataWithRsaCertificate
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            [System.Security.Cryptography.X509Certificates.X509Certificate2]
            $Certificate,
    
            [byte[]]
            $Key,
    
            [byte[]]
            $IV,
    
            [switch] $UseLegacyPadding
        )
    
        $useOAEP = -not $UseLegacyPadding
    
        try
        {
            New-Object psobject -Property @{
                Key = $Certificate.PublicKey.Key.Encrypt($key, $useOAEP)
                IV = $Certificate.PublicKey.Key.Encrypt($iv, $useOAEP)
                Thumbprint = $Certificate.Thumbprint
                LegacyPadding = [bool] $UseLegacyPadding
            }
        }
        catch
        {
            Write-Error -ErrorRecord $_
        }
    }
    
    function Protect-KeyDataWithEcdhCertificate
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            [System.Security.Cryptography.X509Certificates.X509Certificate2]
            $Certificate,
    
            [byte[]]
            $Key,
    
            [byte[]]
            $IV
        )
    
        $publicKey = $null
        $ephemeralKey = $null
        $ecdh = $null
        $derivedKey = $null
    
        try
        {
            $publicKey = Get-EcdhPublicKey -Certificate $cert
    
            $ephemeralKey = [System.Security.Cryptography.CngKey]::Create($publicKey.Algorithm)
            $ecdh = [System.Security.Cryptography.ECDiffieHellmanCng]$ephemeralKey
    
            $derivedKey = New-Object PowerShellUtils.PinnedArray[byte](
                ,($ecdh.DeriveKeyMaterial($publicKey) | Select-Object -First 32)
            )
    
            if ($derivedKey.Count -ne 32)
            {
                # This shouldn't happen, but just in case...
                throw "Error:  Key material derived from ECDH certificate $($Certificate.Thumbprint) was less than the required 32 bytes"
            }
    
            $ecdhIv = Get-RandomBytes -Count 16
    
            $encryptedKey = Protect-DataWithAes -PlainText $Key -Key $derivedKey -IV $ecdhIv -NoHMAC
            $encryptedIv  = Protect-DataWithAes -PlainText $IV -Key $derivedKey -IV $ecdhIv -NoHMAC
    
            New-Object psobject @{
                Key = $encryptedKey.CipherText
                IV = $encryptedIv.CipherText
                EcdhPublicKey = $ecdh.PublicKey.ToByteArray()
                EcdhIV = $ecdhIv
                Thumbprint = $Certificate.Thumbprint
            }
        }
        finally
        {
            if ($publicKey -is [IDisposable]) { $publicKey.Dispose() }
            if ($ephemeralKey -is [IDisposable]) { $ephemeralKey.Dispose() }
            if ($null -ne $ecdh) { $ecdh.Clear() }
            if ($derivedKey -is [IDisposable]) { $derivedKey.Dispose() }
        }
    }
    
    function Get-EcdhPublicKey([System.Security.Cryptography.X509Certificates.X509Certificate2] $Certificate)
    {
        # If we get here, we've already verified that the certificate has the Key Agreement usage extension,
        # and that it is an ECC algorithm cert, meaning we can treat the OIDs as ECDH algorithms.  (These OIDs
        # are shared with ECDSA, for some reason, and the ECDSA magic constants are different.)
    
        $magic = @{
            '1.2.840.10045.3.1.7' = [uint32]0x314B4345L # BCRYPT_ECDH_PUBLIC_P256_MAGIC
            '1.3.132.0.34'        = [uint32]0x334B4345L # BCRYPT_ECDH_PUBLIC_P384_MAGIC
            '1.3.132.0.35'        = [uint32]0x354B4345L # BCRYPT_ECDH_PUBLIC_P521_MAGIC
        }
    
        $algorithm = Get-AlgorithmOid -Certificate $Certificate
    
        if (-not $magic.ContainsKey($algorithm))
        {
            throw "Certificate '$($Certificate.Thumbprint)' returned an unknown Public Key Algorithm OID: '$algorithm'"
        }
    
        $size = (($cert.GetPublicKey().Count - 1) / 2)
    
        $keyBlob = [byte[]]@(
            [System.BitConverter]::GetBytes($magic[$algorithm])
            [System.BitConverter]::GetBytes($size)
            $cert.GetPublicKey() | Select-Object -Skip 1
        )
    
        return [System.Security.Cryptography.CngKey]::Import($keyBlob, [System.Security.Cryptography.CngKeyBlobFormat]::EccPublicBlob)
    }
    
    
    function Get-AlgorithmOid([System.Security.Cryptography.X509Certificates.X509Certificate] $Certificate)
    {
        $algorithmOid = $Certificate.GetKeyAlgorithm();
    
        if ($algorithmOid -eq $script:EccAlgorithmOid)
        {
            $algorithmOid = DecodeBinaryOid -Bytes $Certificate.GetKeyAlgorithmParameters()
        }
    
        return $algorithmOid
    }
    
    function DecodeBinaryOid([byte[]] $Bytes)
    {
        # Thanks to Vadims Podans (http://sysadmins.lv/) for this cool technique to take a byte array
        # and decode the OID without having to use P/Invoke to call the CryptDecodeObject function directly.
    
        [byte[]] $ekuBlob = @(
            48
            $Bytes.Count
            $Bytes
        )
    
        $asnEncodedData = New-Object System.Security.Cryptography.AsnEncodedData(,$ekuBlob)
        $enhancedKeyUsage = New-Object System.Security.Cryptography.X509Certificates.X509EnhancedKeyUsageExtension($asnEncodedData, $false)
    
        return $enhancedKeyUsage.EnhancedKeyUsages[0].Value
    }
    
    function Unprotect-KeyDataWithCertificate
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            $KeyData,
    
            [Parameter(Mandatory = $true)]
            [System.Security.Cryptography.X509Certificates.X509Certificate2]
            $Certificate
        )
    
        if ($Certificate.PublicKey.Key -is [System.Security.Cryptography.RSACryptoServiceProvider])
        {
            Unprotect-KeyDataWithRsaCertificate -KeyData $KeyData -Certificate $Certificate
        }
        elseif ($Certificate.GetKeyAlgorithm() -eq $script:EccAlgorithmOid)
        {
            Unprotect-KeyDataWithEcdhCertificate -KeyData $KeyData -Certificate $Certificate
        }
    }
    
    function Unprotect-KeyDataWithEcdhCertificate
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            $KeyData,
    
            [Parameter(Mandatory = $true)]
            [System.Security.Cryptography.X509Certificates.X509Certificate2]
            $Certificate
        )
    
        $doFinallyBlock = $true
        $key = $null
        $iv = $null
        $derivedKey = $null
        $publicKey = $null
        $privateKey = $null
        $ecdh = $null
    
        try
        {
            $privateKey = [Security.Cryptography.X509Certificates.X509Certificate2ExtensionMethods]::GetCngPrivateKey($Certificate)
    
            if ($privateKey.AlgorithmGroup -ne [System.Security.Cryptography.CngAlgorithmGroup]::ECDiffieHellman)
            {
                throw "Certificate '$($Certificate.Thumbprint)' contains a non-ECDH key pair."
            }
    
            if ($null -eq $KeyData.EcdhPublicKey -or $null -eq $KeyData.EcdhIV)
            {
                throw "Certificate '$($Certificate.Thumbprint)' is a valid ECDH certificate, but the stored KeyData structure is missing the public key and/or IV used during encryption."
            }
    
            $publicKey = [System.Security.Cryptography.CngKey]::Import($KeyData.EcdhPublicKey, [System.Security.Cryptography.CngKeyBlobFormat]::EccPublicBlob)
            $ecdh = [System.Security.Cryptography.ECDiffieHellmanCng]$privateKey
    
            $derivedKey = New-Object PowerShellUtils.PinnedArray[byte](,($ecdh.DeriveKeyMaterial($publicKey) | Select-Object -First 32))
            if ($derivedKey.Count -ne 32)
            {
                # This shouldn't happen, but just in case...
                throw "Error:  Key material derived from ECDH certificate $($Certificate.Thumbprint) was less than the required 32 bytes"
            }
    
            $key = (Unprotect-DataWithAes -CipherText $KeyData.Key -Key $derivedKey -IV $KeyData.EcdhIV).PlainText
            $iv = (Unprotect-DataWithAes -CipherText $KeyData.IV -Key $derivedKey -IV $KeyData.EcdhIV).PlainText
    
            $doFinallyBlock = $false
    
            return New-Object psobject -Property @{
                Key = $key
                IV = $iv
            }
        }
        catch
        {
            throw
        }
        finally
        {
            if ($doFinallyBlock)
            {
                if ($key -is [IDisposable]) { $key.Dispose() }
                if ($iv -is [IDisposable]) { $iv.Dispose() }
            }
    
            if ($derivedKey -is [IDisposable]) { $derivedKey.Dispose() }
            if ($privateKey -is [IDisposable]) { $privateKey.Dispose() }
            if ($publicKey -is [IDisposable]) { $publicKey.Dispose() }
            if ($null -ne $ecdh) { $ecdh.Clear() }
        }
    }
    
    function Unprotect-KeyDataWithRsaCertificate
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            $KeyData,
    
            [Parameter(Mandatory = $true)]
            [System.Security.Cryptography.X509Certificates.X509Certificate2]
            $Certificate
        )
    
        $useOAEP = -not $keyData.LegacyPadding
    
        $key = $null
        $iv = $null
        $doFinallyBlock = $true
    
        try
        {
            $key = DecryptRsaData -Certificate $Certificate -CipherText $keyData.Key -UseOaepPadding:$useOAEP
            $iv = DecryptRsaData -Certificate $Certificate -CipherText $keyData.IV -UseOaepPadding:$useOAEP
    
            $doFinallyBlock = $false
    
            return New-Object psobject -Property @{
                Key = $key
                IV = $iv
            }
        }
        catch
        {
            throw
        }
        finally
        {
            if ($doFinallyBlock)
            {
                if ($key -is [IDisposable]) { $key.Dispose() }
                if ($iv -is [IDisposable]) { $iv.Dispose() }
            }
        }
    }
    
    function DecryptRsaData([System.Security.Cryptography.X509Certificates.X509Certificate2] $Certificate,
                         [byte[]] $CipherText,
                         [switch] $UseOaepPadding)
    {
        if ($Certificate.PrivateKey -is [System.Security.Cryptography.RSACryptoServiceProvider])
        {
            return New-Object PowerShellUtils.PinnedArray[byte](
                ,$Certificate.PrivateKey.Decrypt($CipherText, $UseOaepPadding)
            )
        }
    
        # By the time we get here, we've already validated that either the certificate has an RsaCryptoServiceProvider
        # object in its PrivateKey property, or we can fetch an RSA CNG key.
    
        $cngKey = $null
        $cngRsa = $null
        try
        {
            $cngKey = [Security.Cryptography.X509Certificates.X509Certificate2ExtensionMethods]::GetCngPrivateKey($Certificate)
            $cngRsa = [Security.Cryptography.RSACng]$cngKey
            $cngRsa.EncryptionHashAlgorithm = [System.Security.Cryptography.CngAlgorithm]::Sha1
    
            if (-not $UseOaepPadding)
            {
                $cngRsa.EncryptionPaddingMode = [Security.Cryptography.AsymmetricPaddingMode]::Pkcs1
            }
    
            return New-Object PowerShellUtils.PinnedArray[byte](
                ,$cngRsa.DecryptValue($CipherText)
            )
        }
        catch
        {
            throw
        }
        finally
        {
            if ($cngKey -is [IDisposable]) { $cngKey.Dispose() }
            if ($null -ne $cngRsa) { $cngRsa.Clear() }
        }
    }
    
    function Protect-KeyDataWithPassword
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            [System.Security.SecureString]
            $Password,
    
            [Parameter(Mandatory = $true)]
            [byte[]]
            $Key,
    
            [Parameter(Mandatory = $true)]
            [byte[]]
            $IV,
    
            [ValidateRange(1,2147483647)]
            [int]
            $IterationCount = 1000
        )
    
        $keyGen = $null
        $ephemeralKey = $null
        $ephemeralIV = $null
    
        try
        {
            $keyGen = Get-KeyGenerator -Password $Password -IterationCount $IterationCount
            $ephemeralKey = New-Object PowerShellUtils.PinnedArray[byte](,$keyGen.GetBytes(32))
            $ephemeralIV = New-Object PowerShellUtils.PinnedArray[byte](,$keyGen.GetBytes(16))
    
            $hashSalt = Get-RandomBytes -Count 32
            $hash = Get-PasswordHash -Password $Password -Salt $hashSalt -IterationCount $IterationCount
    
            $encryptedKey = (Protect-DataWithAes -PlainText $Key -Key $ephemeralKey -IV $ephemeralIV -NoHMAC).CipherText
            $encryptedIV = (Protect-DataWithAes -PlainText $IV -Key $ephemeralKey -IV $ephemeralIV -NoHMAC).CipherText
    
            New-Object psobject -Property @{
                Key = $encryptedKey
                IV = $encryptedIV
                Salt = $keyGen.Salt
                IterationCount = $keyGen.IterationCount
                Hash = $hash
                HashSalt = $hashSalt
            }
        }
        catch
        {
            throw
        }
        finally
        {
            if ($keyGen -is [IDisposable]) { $keyGen.Dispose() }
            if ($ephemeralKey -is [IDisposable]) { $ephemeralKey.Dispose() }
            if ($ephemeralIV -is [IDisposable]) { $ephemeralIV.Dispose() }
        }
    
    } # function Protect-KeyDataWithPassword
    
    function Unprotect-KeyDataWithPassword
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            $KeyData,
    
            [Parameter(Mandatory = $true)]
            [System.Security.SecureString]
            $Password
        )
    
        $keyGen = $null
        $key = $null
        $iv = $null
        $ephemeralKey = $null
        $ephemeralIV = $null
    
        $doFinallyBlock = $true
    
        try
        {
            $params = @{
                Password = $Password
                Salt = $KeyData.Salt.Clone()
                IterationCount = $KeyData.IterationCount
            }
    
            $keyGen = Get-KeyGenerator @params
            $ephemeralKey = New-Object PowerShellUtils.PinnedArray[byte](,$keyGen.GetBytes(32))
            $ephemeralIV = New-Object PowerShellUtils.PinnedArray[byte](,$keyGen.GetBytes(16))
    
            $key = (Unprotect-DataWithAes -CipherText $KeyData.Key -Key $ephemeralKey -IV $ephemeralIV).PlainText
            $iv = (Unprotect-DataWithAes -CipherText $KeyData.IV -Key $ephemeralKey -IV $ephemeralIV).PlainText
    
            $doFinallyBlock = $false
    
            return New-Object psobject -Property @{
                Key = $key
                IV = $iv
            }
        }
        catch
        {
            throw
        }
        finally
        {
            if ($keyGen -is [IDisposable]) { $keyGen.Dispose() }
            if ($ephemeralKey -is [IDisposable]) { $ephemeralKey.Dispose() }
            if ($ephemeralIV -is [IDisposable]) { $ephemeralIV.Dispose() }
    
            if ($doFinallyBlock)
            {
                if ($key -is [IDisposable]) { $key.Dispose() }
                if ($iv -is [IDisposable]) { $iv.Dispose() }
            }
        }
    } # function Unprotect-KeyDataWithPassword
    
    function ConvertTo-PinnedByteArray
    {
        [CmdletBinding()]
        [OutputType([PowerShellUtils.PinnedArray[byte]])]
        param (
            [Parameter(Mandatory = $true)]
            $InputObject
        )
    
        try
        {
            switch ($InputObject.GetType().FullName)
            {
                ([string].FullName)
                {
                    $pinnedArray = Convert-StringToPinnedByteArray -String $InputObject
                    break
                }
    
                ([System.Security.SecureString].FullName)
                {
                    $pinnedArray = Convert-SecureStringToPinnedByteArray -SecureString $InputObject
                    break
                }
    
                ([System.Management.Automation.PSCredential].FullName)
                {
                    $pinnedArray = Convert-PSCredentialToPinnedByteArray -Credential $InputObject
                    break
                }
    
                default
                {
                    $byteArray = $InputObject -as [byte[]]
    
                    if ($null -eq $byteArray)
                    {
                        throw 'Something unexpected got through our parameter validation.'
                    }
                    else
                    {
                        $pinnedArray = New-Object PowerShellUtils.PinnedArray[byte](
                            ,$byteArray.Clone()
                        )
                    }
                }
    
            }
    
            $pinnedArray
        }
        catch
        {
            throw
        }
    
    } # function ConvertTo-PinnedByteArray
    
    function ConvertFrom-ByteArray
    {
        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            [byte[]]
            $ByteArray,
    
            [Parameter(Mandatory = $true)]
            [ValidateScript({
                if ($script:ValidTypes -notcontains $_)
                {
                    throw "Invalid type specified. Type must be one of: $($script:ValidTypes -join ', ')"
                }
    
                return $true
            })]
            [type]
            $Type,
    
            [UInt32]
            $StartIndex = 0,
    
            [Nullable[UInt32]]
            $ByteCount = $null
        )
    
        if ($null -eq $ByteCount)
        {
            $ByteCount = $ByteArray.Count - $StartIndex
        }
    
        if ($StartIndex + $ByteCount -gt $ByteArray.Count)
        {
            throw 'The specified index and count values exceed the bounds of the array.'
        }
    
        switch ($Type.FullName)
        {
            ([string].FullName)
            {
                Convert-ByteArrayToString -ByteArray $ByteArray -StartIndex $StartIndex -ByteCount $ByteCount
                break
            }
    
            ([System.Security.SecureString].FullName)
            {
                Convert-ByteArrayToSecureString -ByteArray $ByteArray -StartIndex $StartIndex -ByteCount $ByteCount
                break
            }
    
            ([System.Management.Automation.PSCredential].FullName)
            {
                Convert-ByteArrayToPSCredential -ByteArray $ByteArray -StartIndex $StartIndex -ByteCount $ByteCount
                break
            }
    
            ([byte[]].FullName)
            {
                $array = New-Object byte[]($ByteCount)
                [Array]::Copy($ByteArray, $StartIndex, $array, 0, $ByteCount)
    
                ,$array
                break
            }
    
            default
            {
                throw 'Something unexpected got through parameter validation.'
            }
        }
    
    } # function ConvertFrom-ByteArray
    
    function Convert-StringToPinnedByteArray
    {
        [CmdletBinding()]
        [OutputType([PowerShellUtils.PinnedArray[byte]])]
        param (
            [Parameter(Mandatory = $true)]
            [string]
            $String
        )
    
        New-Object PowerShellUtils.PinnedArray[byte](
            ,[System.Text.Encoding]::UTF8.GetBytes($String)
        )
    }
    
    function Convert-SecureStringToPinnedByteArray
    {
        [CmdletBinding()]
        [OutputType([PowerShellUtils.PinnedArray[byte]])]
        param (
            [Parameter(Mandatory = $true)]
            [System.Security.SecureString]
            $SecureString
        )
    
        try
        {
            $ptr = [System.Runtime.InteropServices.Marshal]::SecureStringToGlobalAllocUnicode($SecureString)
            $byteCount = $SecureString.Length * 2
            $pinnedArray = New-Object PowerShellUtils.PinnedArray[byte]($byteCount)
    
            [System.Runtime.InteropServices.Marshal]::Copy($ptr, $pinnedArray, 0, $byteCount)
    
            $pinnedArray
        }
        catch
        {
            throw
        }
        finally
        {
            if ($null -ne $ptr)
            {
                [System.Runtime.InteropServices.Marshal]::ZeroFreeGlobalAllocUnicode($ptr)
            }
        }
    
    } # function Convert-SecureStringToPinnedByteArray
    
    function Convert-PSCredentialToPinnedByteArray
    {
        [CmdletBinding()]
        [OutputType([PowerShellUtils.PinnedArray[byte]])]
        param (
            [Parameter(Mandatory = $true)]
            [System.Management.Automation.PSCredential]
            $Credential
        )
    
        $passwordBytes = $null
        $pinnedArray = $null
    
        try
        {
            $passwordBytes = Convert-SecureStringToPinnedByteArray -SecureString $Credential.Password
            $usernameBytes = [System.Text.Encoding]::Unicode.GetBytes($Credential.UserName)
            $sizeBytes = [System.BitConverter]::GetBytes([uint32]$usernameBytes.Count)
    
            if (-not [System.BitConverter]::IsLittleEndian) { [Array]::Reverse($sizeBytes) }
    
            $doFinallyBlock = $true
    
            try
            {
                $bufferSize = $passwordBytes.Count +
                              $usernameBytes.Count +
                              $script:PSCredentialHeader.Count +
                              $sizeBytes.Count
                $pinnedArray = New-Object PowerShellUtils.PinnedArray[byte]($bufferSize)
    
                $destIndex = 0
    
                [Array]::Copy(
                    $script:PSCredentialHeader, 0, $pinnedArray.Array, $destIndex, $script:PSCredentialHeader.Count
                )
                $destIndex += $script:PSCredentialHeader.Count
    
                [Array]::Copy($sizeBytes, 0, $pinnedArray.Array, $destIndex, $sizeBytes.Count)
                $destIndex += $sizeBytes.Count
    
                [Array]::Copy($usernameBytes, 0, $pinnedArray.Array, $destIndex, $usernameBytes.Count)
                $destIndex += $usernameBytes.Count
    
                [Array]::Copy($passwordBytes.Array, 0, $pinnedArray.Array, $destIndex, $passwordBytes.Count)
    
                $doFinallyBlock = $false
                $pinnedArray
            }
            finally
            {
                if ($doFinallyBlock)
                {
                    if ($pinnedArray -is [IDisposable]) { $pinnedArray.Dispose() }
                }
            }
        }
        catch
        {
            throw
        }
        finally
        {
            if ($passwordBytes -is [IDisposable]) { $passwordBytes.Dispose() }
        }
    
    } # function Convert-PSCredentialToPinnedByteArray
    
    function Convert-ByteArrayToString
    {
        [CmdletBinding()]
        [OutputType([string])]
        param (
            [Parameter(Mandatory = $true)]
            [byte[]]
            $ByteArray,
    
            [Parameter(Mandatory = $true)]
            [UInt32]
            $StartIndex,
    
            [Parameter(Mandatory = $true)]
            [UInt32]
            $ByteCount
        )
    
        [System.Text.Encoding]::UTF8.GetString($ByteArray, $StartIndex, $ByteCount)
    }
    
    function Convert-ByteArrayToSecureString
    {
        [CmdletBinding()]
        [OutputType([System.Security.SecureString])]
        param (
            [Parameter(Mandatory = $true)]
            [byte[]]
            $ByteArray,
    
            [Parameter(Mandatory = $true)]
            [UInt32]
            $StartIndex,
    
            [Parameter(Mandatory = $true)]
            [UInt32]
            $ByteCount
        )
    
        $chars = $null
        $memoryStream = $null
        $streamReader = $null
    
        try
        {
            $ss = New-Object System.Security.SecureString
            $memoryStream = New-Object System.IO.MemoryStream($ByteArray, $StartIndex, $ByteCount)
            $streamReader = New-Object System.IO.StreamReader($memoryStream, [System.Text.Encoding]::Unicode, $false)
            $chars = New-Object PowerShellUtils.PinnedArray[char](1024)
    
            while (($read = $streamReader.Read($chars, 0, $chars.Count)) -gt 0)
            {
                for ($i = 0; $i -lt $read; $i++)
                {
                    $ss.AppendChar($chars[$i])
                }
            }
    
            $ss.MakeReadOnly()
            $ss
        }
        finally
        {
            if ($streamReader -is [IDisposable]) { $streamReader.Dispose() }
            if ($memoryStream -is [IDisposable]) { $memoryStream.Dispose() }
            if ($chars -is [IDisposable]) { $chars.Dispose() }
        }
    
    } # function Convert-ByteArrayToSecureString
    
    function Convert-ByteArrayToPSCredential
    {
        [CmdletBinding()]
        [OutputType([System.Management.Automation.PSCredential])]
        param (
            [Parameter(Mandatory = $true)]
            [byte[]]
            $ByteArray,
    
            [Parameter(Mandatory = $true)]
            [UInt32]
            $StartIndex,
    
            [Parameter(Mandatory = $true)]
            [UInt32]
            $ByteCount
        )
    
        $message = 'Byte array is not a serialized PSCredential object.'
    
        if ($ByteCount -lt $script:PSCredentialHeader.Count + 4) { throw $message }
    
        for ($i = 0; $i -lt $script:PSCredentialHeader.Count; $i++)
        {
            if ($ByteArray[$StartIndex + $i] -ne $script:PSCredentialHeader[$i]) { throw $message }
        }
    
        $i = $StartIndex + $script:PSCredentialHeader.Count
    
        $sizeBytes = $ByteArray[$i..($i+3)]
        if (-not [System.BitConverter]::IsLittleEndian) { [array]::Reverse($sizeBytes) }
    
        $i += 4
        $size = [System.BitConverter]::ToUInt32($sizeBytes, 0)
    
        if ($ByteCount -lt $i + $size) { throw $message }
    
        $userName = [System.Text.Encoding]::Unicode.GetString($ByteArray, $i, $size)
        $i += $size
    
        try
        {
            $params = @{
                ByteArray = $ByteArray
                StartIndex = $i
                ByteCount = $StartIndex + $ByteCount - $i
            }
            $secureString = Convert-ByteArrayToSecureString @params
        }
        catch
        {
            throw $message
        }
    
        New-Object System.Management.Automation.PSCredential($userName, $secureString)
    
    } # function Convert-ByteArrayToPSCredential
    
    function Test-IsProtectedData
    {
        [CmdletBinding()]
        [OutputType([bool])]
        param (
            [Parameter(Mandatory = $true)]
            [psobject]
            $InputObject
        )
    
        $isValid = $true
    
        $cipherText = $InputObject.CipherText -as [byte[]]
        $type = $InputObject.Type -as [string]
    
        if ($null -eq $cipherText -or $cipherText.Count -eq 0 -or
            [string]::IsNullOrEmpty($type) -or
            $null -eq $InputObject.KeyData)
        {
            $isValid = $false
        }
    
        if ($isValid)
        {
            foreach ($object in $InputObject.KeyData)
            {
                if (-not (Test-IsKeyData -InputObject $object))
                {
                    $isValid = $false
                    break
                }
            }
        }
    
        return $isValid
    
    } # function Test-IsProtectedData
    
    function Test-IsKeyData
    {
        [CmdletBinding()]
        [OutputType([bool])]
        param (
            [Parameter(Mandatory = $true)]
            [psobject]
            $InputObject
        )
    
        $isValid = $true
    
        $key = $InputObject.Key -as [byte[]]
        $iv = $InputObject.IV -as [byte[]]
    
        if ($null -eq $key -or $null -eq $iv -or $key.Count -eq 0 -or $iv.Count -eq 0)
        {
            $isValid = $false
        }
    
        if ($isValid)
        {
            $isCertificate = Test-IsCertificateProtectedKeyData -InputObject $InputObject
            $isPassword = Test-IsPasswordProtectedKeydata -InputObject $InputObject
            $isValid = $isCertificate -or $isPassword
        }
    
        return $isValid
    
    } # function Test-IsKeyData
    
    function Test-IsPasswordProtectedKeyData
    {
        [CmdletBinding()]
        [OutputType([bool])]
        param (
            [Parameter(Mandatory = $true)]
            [psobject]
            $InputObject
        )
    
        $isValid = $true
    
        $salt = $InputObject.Salt -as [byte[]]
        $hash = $InputObject.Hash -as [string]
        $hashSalt = $InputObject.HashSalt -as [byte[]]
        $iterations = $InputObject.IterationCount -as [int]
    
        if ($null -eq $salt -or $salt.Count -eq 0 -or
            $null -eq $hashSalt -or $hashSalt.Count -eq 0 -or
            $null -eq $iterations -or $iterations -eq 0 -or
            $null -eq $hash -or $hash -notmatch '^[A-F\d]+$')
        {
            $isValid = $false
        }
    
        return $isValid
    
    } # function Test-IsPasswordProtectedKeyData
    
    function Test-IsCertificateProtectedKeyData
    {
        [CmdletBinding()]
        [OutputType([bool])]
        param (
            [Parameter(Mandatory = $true)]
            [psobject]
            $InputObject
        )
    
        $isValid = $true
    
        $thumbprint = $InputObject.Thumbprint -as [string]
    
        if ($null -eq $thumbprint -or $thumbprint -notmatch '^[A-F\d]+$')
        {
            $isValid = $false
        }
    
        return $isValid
    
    } # function Test-IsCertificateProtectedKeyData
    
    #endregion
    
    # SIG # Begin signature block
    # MIIhfgYJKoZIhvcNAQcCoIIhbzCCIWsCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
    # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
    # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUDcPa+jtE0RQdPndabdJGpyDB
    # yhOgghywMIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0B
    # AQUFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD
    # VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk
    # IElEIFJvb3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQsw
    # CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu
    # ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg
    # Q0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg
    # +XESpa7cJpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lT
    # XDGEKvYPmDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5
    # a3/UsDg+wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g
    # 0I6QNcZ4VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1
    # roV9Iq4/AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whf
    # GHdPAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0G
    # A1UdDgQWBBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLL
    # gjEtUYunpyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3
    # cmbYMuRCdWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmr
    # EthngYTffwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+
    # fT8r87cmNW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5Q
    # Z7dsvfPxH2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu
    # 838fYxAe+o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw
    # 8jCCBQswggPzoAMCAQICEAOiV15N2F/TLPzy+oVrWjMwDQYJKoZIhvcNAQEFBQAw
    # bzELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQ
    # d3d3LmRpZ2ljZXJ0LmNvbTEuMCwGA1UEAxMlRGlnaUNlcnQgQXNzdXJlZCBJRCBD
    # b2RlIFNpZ25pbmcgQ0EtMTAeFw0xNDA1MDUwMDAwMDBaFw0xNTA1MTMxMjAwMDBa
    # MGExCzAJBgNVBAYTAkNBMQswCQYDVQQIEwJPTjERMA8GA1UEBxMIQnJhbXB0b24x
    # GDAWBgNVBAoTD0RhdmlkIExlZSBXeWF0dDEYMBYGA1UEAxMPRGF2aWQgTGVlIFd5
    # YXR0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvcX51YAyViQE16mg
    # +IVQCQ0O8QC/wXBzTMPirnoGK9TThmxQIYgtcekZ5Xa/dWpW0xKKjaS6dRwYYXET
    # pzozoMWZbFDVrgKaqtuZNu9TD6rqK/QKf4iL/eikr0NIUL4CoSEQDeGLXDw7ntzZ
    # XKM86RuPw6MlDapfFQQFIMjsT7YaoqQNTOxhbiFoHVHqP7xL3JTS7TApa/RnNYyl
    # O7SQ7TSNsekiXGwUNxPqt6UGuOP0nyR+GtNiBcPfeUi+XaqjjBmpqgDbkEIMLDuf
    # fDO54VKvDLl8D2TxTFOcKZv61IcToOs+8z1sWTpMWI2MBuLhRR3A6iIhvilTYRBI
    # iX5FZQIDAQABo4IBrzCCAaswHwYDVR0jBBgwFoAUe2jOKarAF75JeuHlP9an90WP
    # NTIwHQYDVR0OBBYEFDS4+PmyUp+SmK2GR+NCMiLd+DpvMA4GA1UdDwEB/wQEAwIH
    # gDATBgNVHSUEDDAKBggrBgEFBQcDAzBtBgNVHR8EZjBkMDCgLqAshipodHRwOi8v
    # Y3JsMy5kaWdpY2VydC5jb20vYXNzdXJlZC1jcy1nMS5jcmwwMKAuoCyGKmh0dHA6
    # Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9hc3N1cmVkLWNzLWcxLmNybDBCBgNVHSAEOzA5
    # MDcGCWCGSAGG/WwDATAqMCgGCCsGAQUFBwIBFhxodHRwczovL3d3dy5kaWdpY2Vy
    # dC5jb20vQ1BTMIGCBggrBgEFBQcBAQR2MHQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9v
    # Y3NwLmRpZ2ljZXJ0LmNvbTBMBggrBgEFBQcwAoZAaHR0cDovL2NhY2VydHMuZGln
    # aWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEQ29kZVNpZ25pbmdDQS0xLmNydDAM
    # BgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBBQUAA4IBAQBbzAp8wys0A5LcuENslW0E
    # oz7rc0A8h+XgjJWdJOFRohE1mZRFpdkVxM0SRqw7IzlSFtTMCsVVPNwU6O7y9rCY
    # x5agx3CJBkJVDR/Y7DcOQTmmHy1zpcrKAgTznZuKUQZLpoYz/bA+Uh+bvXB9woCA
    # IRbchos1oxC+7/gjuxBMKh4NM+9NIvWs6qpnH5JeBidQDQXp3flPkla+MKrPTL/T
    # /amgna5E+9WHWnXbMFCpZ5n1bI1OvgNVZlYC/JTa4fjPEk8d16jYVP4GlRz/QUYI
    # y6IAGc/z6xpkdtpXWVCbW0dCd5ybfUYTaeCJumGpS/HSJ7JcTZj694QDOKNvhfrm
    # MIIGajCCBVKgAwIBAgIQAwGaAjr/WLFr1tXq5hfwZjANBgkqhkiG9w0BAQUFADBi
    # MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
    # d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBBc3N1cmVkIElEIENB
    # LTEwHhcNMTQxMDIyMDAwMDAwWhcNMjQxMDIyMDAwMDAwWjBHMQswCQYDVQQGEwJV
    # UzERMA8GA1UEChMIRGlnaUNlcnQxJTAjBgNVBAMTHERpZ2lDZXJ0IFRpbWVzdGFt
    # cCBSZXNwb25kZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCjZF38
    # fLPggjXg4PbGKuZJdTvMbuBTqZ8fZFnmfGt/a4ydVfiS457VWmNbAklQ2YPOb2bu
    # 3cuF6V+l+dSHdIhEOxnJ5fWRn8YUOawk6qhLLJGJzF4o9GS2ULf1ErNzlgpno75h
    # n67z/RJ4dQ6mWxT9RSOOhkRVfRiGBYxVh3lIRvfKDo2n3k5f4qi2LVkCYYhhchho
    # ubh87ubnNC8xd4EwH7s2AY3vJ+P3mvBMMWSN4+v6GYeofs/sjAw2W3rBerh4x8kG
    # LkYQyI3oBGDbvHN0+k7Y/qpA8bLOcEaD6dpAoVk62RUJV5lWMJPzyWHM0AjMa+xi
    # QpGsAsDvpPCJEY93AgMBAAGjggM1MIIDMTAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0T
    # AQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDCCAb8GA1UdIASCAbYwggGy
    # MIIBoQYJYIZIAYb9bAcBMIIBkjAoBggrBgEFBQcCARYcaHR0cHM6Ly93d3cuZGln
    # aWNlcnQuY29tL0NQUzCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBuAHkAIAB1AHMA
    # ZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGUAIABjAG8A
    # bgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBlACAAbwBmACAA
    # dABoAGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAgAGEAbgBkACAA
    # dABoAGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBnAHIAZQBlAG0A
    # ZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBiAGkAbABpAHQA
    # eQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0AGUAZAAgAGgA
    # ZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjALBglghkgBhv1s
    # AxUwHwYDVR0jBBgwFoAUFQASKxOYspkH7R7for5XDStnAs0wHQYDVR0OBBYEFGFa
    # TSS2STKdSip5GoNL9B6Jwcp9MH0GA1UdHwR2MHQwOKA2oDSGMmh0dHA6Ly9jcmwz
    # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRENBLTEuY3JsMDigNqA0hjJo
    # dHRwOi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURDQS0xLmNy
    # bDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2lj
    # ZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29t
    # L0RpZ2lDZXJ0QXNzdXJlZElEQ0EtMS5jcnQwDQYJKoZIhvcNAQEFBQADggEBAJ0l
    # fhszTbImgVybhs4jIA+Ah+WI//+x1GosMe06FxlxF82pG7xaFjkAneNshORaQPve
    # BgGMN/qbsZ0kfv4gpFetW7easGAm6mlXIV00Lx9xsIOUGQVrNZAQoHuXx/Y/5+IR
    # Qaa9YtnwJz04HShvOlIJ8OxwYtNiS7Dgc6aSwNOOMdgv420XEwbu5AO2FKvzj0On
    # cZ0h3RTKFV2SQdr5D4HRmXQNJsQOfxu19aDxxncGKBXp2JPlVRbwuwqrHNtcSCdm
    # yKOLChzlldquxC5ZoGHd2vNtomHpigtt7BIYvfdVVEADkitrwlHCCkivsNRu4PQU
    # Cjob4489yq9qjXvc2EQwggajMIIFi6ADAgECAhAPqEkGFdcAoL4hdv3F7G29MA0G
    # CSqGSIb3DQEBBQUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
    # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0
    # IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0xMTAyMTExMjAwMDBaFw0yNjAyMTAxMjAw
    # MDBaMG8xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNV
    # BAsTEHd3dy5kaWdpY2VydC5jb20xLjAsBgNVBAMTJURpZ2lDZXJ0IEFzc3VyZWQg
    # SUQgQ29kZSBTaWduaW5nIENBLTEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
    # AoIBAQCcfPmgjwrKiUtTmjzsGSJ/DMv3SETQPyJumk/6zt/G0ySR/6hSk+dy+PFG
    # hpTFqxf0eH/Ler6QJhx8Uy/lg+e7agUozKAXEUsYIPO3vfLcy7iGQEUfT/k5mNM7
    # 629ppFwBLrFm6aa43Abero1i/kQngqkDw/7mJguTSXHlOG1O/oBcZ3e11W9mZJRr
    # u4hJaNjR9H4hwebFHsnglrgJlflLnq7MMb1qWkKnxAVHfWAr2aFdvftWk+8b/HL5
    # 3z4y/d0qLDJG2l5jvNC4y0wQNfxQX6xDRHz+hERQtIwqPXQM9HqLckvgVrUTtmPp
    # P05JI+cGFvAlqwH4KEHmx9RkO12rAgMBAAGjggNDMIIDPzAOBgNVHQ8BAf8EBAMC
    # AYYwEwYDVR0lBAwwCgYIKwYBBQUHAwMwggHDBgNVHSAEggG6MIIBtjCCAbIGCGCG
    # SAGG/WwDMIIBpDA6BggrBgEFBQcCARYuaHR0cDovL3d3dy5kaWdpY2VydC5jb20v
    # c3NsLWNwcy1yZXBvc2l0b3J5Lmh0bTCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBu
    # AHkAIAB1AHMAZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0
    # AGUAIABjAG8AbgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBl
    # ACAAbwBmACAAdABoAGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAg
    # AGEAbgBkACAAdABoAGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBn
    # AHIAZQBlAG0AZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBi
    # AGkAbABpAHQAeQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0
    # AGUAZAAgAGgAZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjAS
    # BgNVHRMBAf8ECDAGAQH/AgEAMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYY
    # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2Fj
    # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MIGB
    # BgNVHR8EejB4MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl
    # cnRBc3N1cmVkSURSb290Q0EuY3JsMDqgOKA2hjRodHRwOi8vY3JsNC5kaWdpY2Vy
    # dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMB0GA1UdDgQWBBR7aM4p
    # qsAXvkl64eU/1qf3RY81MjAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823I
    # DzANBgkqhkiG9w0BAQUFAAOCAQEAe3IdZP+IyDrBt+nnqcSHu9uUkteQWTP6K4fe
    # qFuAJT8Tj5uDG3xDxOaM3zk+wxXssNo7ISV7JMFyXbhHkYETRvqcP2pRON60Jcvw
    # q9/FKAFUeRBGJNE4DyahYZBNur0o5j/xxKqb9to1U0/J8j3TbNwj7aqgTWcJ8zqA
    # PTz7NkyQ53ak3fI6v1Y1L6JMZejg1NrRx8iRai0jTzc7GZQY1NWcEDzVsRwZ/4/I
    # a5ue+K6cmZZ40c2cURVbQiZyWo0KSiOSQOiG3iLCkzrUm2im3yl/Brk8Dr2fxIac
    # gkdCcTKGCZlyCXlLnXFp9UH/fzl3ZPGEjb6LHrJ9aKOlkLEM/zCCBs0wggW1oAMC
    # AQICEAb9+QOWA63qAArrPye7uhswDQYJKoZIhvcNAQEFBQAwZTELMAkGA1UEBhMC
    # VVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0
    # LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTA2
    # MTExMDAwMDAwMFoXDTIxMTExMDAwMDAwMFowYjELMAkGA1UEBhMCVVMxFTATBgNV
    # BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8G
    # A1UEAxMYRGlnaUNlcnQgQXNzdXJlZCBJRCBDQS0xMIIBIjANBgkqhkiG9w0BAQEF
    # AAOCAQ8AMIIBCgKCAQEA6IItmfnKwkKVpYBzQHDSnlZUXKnE0kEGj8kz/E1FkVyB
    # n+0snPgWWd+etSQVwpi5tHdJ3InECtqvy15r7a2wcTHrzzpADEZNk+yLejYIA6sM
    # NP4YSYL+x8cxSIB8HqIPkg5QycaH6zY/2DDD/6b3+6LNb3Mj/qxWBZDwMiEWicZw
    # iPkFl32jx0PdAug7Pe2xQaPtP77blUjE7h6z8rwMK5nQxl0SQoHhg26Ccz8mSxSQ
    # rllmCsSNvtLOBq6thG9IhJtPQLnxTPKvmPv2zkBdXPao8S+v7Iki8msYZbHBc63X
    # 8djPHgp0XEK4aH631XcKJ1Z8D2KkPzIUYJX9BwSiCQIDAQABo4IDejCCA3YwDgYD
    # VR0PAQH/BAQDAgGGMDsGA1UdJQQ0MDIGCCsGAQUFBwMBBggrBgEFBQcDAgYIKwYB
    # BQUHAwMGCCsGAQUFBwMEBggrBgEFBQcDCDCCAdIGA1UdIASCAckwggHFMIIBtAYK
    # YIZIAYb9bAABBDCCAaQwOgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cuZGlnaWNlcnQu
    # Y29tL3NzbC1jcHMtcmVwb3NpdG9yeS5odG0wggFkBggrBgEFBQcCAjCCAVYeggFS
    # AEEAbgB5ACAAdQBzAGUAIABvAGYAIAB0AGgAaQBzACAAQwBlAHIAdABpAGYAaQBj
    # AGEAdABlACAAYwBvAG4AcwB0AGkAdAB1AHQAZQBzACAAYQBjAGMAZQBwAHQAYQBu
    # AGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcAaQBDAGUAcgB0ACAAQwBQAC8AQwBQ
    # AFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwAeQBpAG4AZwAgAFAAYQByAHQAeQAg
    # AEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkAYwBoACAAbABpAG0AaQB0ACAAbABp
    # AGEAYgBpAGwAaQB0AHkAIABhAG4AZAAgAGEAcgBlACAAaQBuAGMAbwByAHAAbwBy
    # AGEAdABlAGQAIABoAGUAcgBlAGkAbgAgAGIAeQAgAHIAZQBmAGUAcgBlAG4AYwBl
    # AC4wCwYJYIZIAYb9bAMVMBIGA1UdEwEB/wQIMAYBAf8CAQAweQYIKwYBBQUHAQEE
    # bTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQwYIKwYB
    # BQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3Vy
    # ZWRJRFJvb3RDQS5jcnQwgYEGA1UdHwR6MHgwOqA4oDaGNGh0dHA6Ly9jcmwzLmRp
    # Z2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwOqA4oDaGNGh0
    # dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5j
    # cmwwHQYDVR0OBBYEFBUAEisTmLKZB+0e36K+Vw0rZwLNMB8GA1UdIwQYMBaAFEXr
    # oq/0ksuCMS1Ri6enIZ3zbcgPMA0GCSqGSIb3DQEBBQUAA4IBAQBGUD7Jtygkpzgd
    # tlspr1LPUukxR6tWXHvVDQtBs+/sdR90OPKyXGGinJXDUOSCuSPRujqGcq04eKx1
    # XRcXNHJHhZRW0eu7NoR3zCSl8wQZVann4+erYs37iy2QwsDStZS9Xk+xBdIOPRqp
    # FFumhjFiqKgz5Js5p8T1zh14dpQlc+Qqq8+cdkvtX8JLFuRLcEwAiR78xXm8TBJX
    # /l/hHrwCXaj++wc4Tw3GXZG5D2dFzdaD7eeSDY2xaYxP+1ngIw/Sqq4AfO6cQg7P
    # kdcntxbuD8O9fAqg7iwIVYUiuOsYGk38KiGtSTGDR5V3cdyxG0tLHBCcdxTBnU8v
    # WpUIKRAmMYIEODCCBDQCAQEwgYMwbzELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERp
    # Z2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEuMCwGA1UEAxMl
    # RGlnaUNlcnQgQXNzdXJlZCBJRCBDb2RlIFNpZ25pbmcgQ0EtMQIQA6JXXk3YX9Ms
    # /PL6hWtaMzAJBgUrDgMCGgUAoHgwGAYKKwYBBAGCNwIBDDEKMAigAoAAoQKAADAZ
    # BgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYB
    # BAGCNwIBFTAjBgkqhkiG9w0BCQQxFgQUczcU4EQbsHsF+0fAtzmOYQ2luqswDQYJ
    # KoZIhvcNAQEBBQAEggEAsK4hIA69OO5v64a+iCySO2GykIekLe/KkMQksghglW4r
    # T4KCbSZsEFHaCL26wGXuU+lshVZNJpouwO3dZrJ3EZLPm0gV5V4IbdQShxFbt+ku
    # 6nwPwpS2CM+kQsCWlbOv1qrmJSR1P1FEH3iSdwvsqsljPt6WY48XK4YftM2/fu6L
    # x9cyp7qwPW2yFRTQUPQyD2pZ57rBu9pgy5y/Jsa07WX7INr7sP1mOlL1aTVaI6PC
    # dHmf170sNawIHNkAmEkWwsRMY/ARGB53b0uj+7FoeNMwhNP2sVujlnkpN+vnlR6S
    # 4KGs8OXVuoyC589/w1fevklHu2/8eoyIwuxNJwF1RaGCAg8wggILBgkqhkiG9w0B
    # CQYxggH8MIIB+AIBATB2MGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
    # dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
    # ZXJ0IEFzc3VyZWQgSUQgQ0EtMQIQAwGaAjr/WLFr1tXq5hfwZjAJBgUrDgMCGgUA
    # oF0wGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTQx
    # MTEyMDQ0MjA4WjAjBgkqhkiG9w0BCQQxFgQUq0UoWVLmx9Ow11i3PVaNjKOZUmAw
    # DQYJKoZIhvcNAQEBBQAEggEAZ6Eni3CBcUeNSuTPLQcMX+3IoPNkCPieJZafxHhk
    # jyuuZHQYtRcvmrfeJxdVuBqt4Z48r+GEm0aKyhK3yxtHXJa1kvOGlvk5aanYAgTr
    # bXqVFGTYLzz9AF2V1yDlMEOqcl6z7qB+5+WYLJD+Gi070NjcLMEH40fj2hJ2Nu0h
    # KxeND3Xr8bs36/7NTN83IylwtFcruVl3KoB1Xa3jJxFh7LHaPCV3lFLzY+eMlKih
    # lVmge5jdzimg3YZ58ab39WZqGiRuCu5lldb7dQ450vfAac8duNjQmpo27HVBbrxT
    # 8p4gxbSx9xKMrQ6DPxdYw4om1h5P4YdOwf8baPJDHI9nmQ==
    # SIG # End signature block
    
  • tools\PoshDevOps\ProtectedData\en-US\about_ProtectedData.help.txt Show
    TOPIC
        about_ProtectedData
    
    SHORT DESCRIPTION
        Provides background information about the ProtectedData module.
        
      About ProtectedData
          When you need to store secret data, such as a set of credentials, in a
          PowerShell script, you would typically use the Export-Clixml or
          ConvertFrom-SecureString cmdlets to accomplish this.  These commands
          leverage the Windows Data Protection API (DPAPI) to perform the encryption.
    
          The DPAPI is extremely convenient, but it has a limitation:  the data can
          only be decrypted by the user who originally encrypted it, and in many cases,
          this decryption can only happen on the same computer where the encryption
          took place (unless you have Credential Roaming or Roaming Profiles enabled
          in an Active Directory environment.)
    
          The ProtectedData module exists to overcome this limitation, while still
          allowing the convenience of not having to worry about managing or protecting
          encryption keys.  It does this, primarily, by leveraging digital certificates.
        
      How It Works
          When you send a piece of data to the Protect-Data command, it is encrypted
          using a randomly-generated AES key and initialization vector (IV).  Copies
          of this key and IV are then encrypted using either the public keys of RSA
          or ECDH certificates, or using a password-derived AES key (more on that later.)
    
          The resulting object can be persisted to disk with Export-Clixml, and can
          later be read back in with Import-Clixml and then passed to the
          Unprotect-Data command.  When you call Unprotect-Data, you must pass in either
          one of the passwords that was to protect the data, or the thumbprint of one
          of the certificates that was used to protect the data.  If you use a certificate
          when calling Unprotect-Data, you must have the certificate's private key.
    
      Regarding Password-derived Keys
          This module's intended use is to leverage certificate-based encryption wherever
          possible.  This is what provides security, without the need for the user to worry
          about key protection or key management; the operating system takes care of this for
          you when you install a certificate (with or without its private key.)
    
          The various -Password parameters to the ProtectedData module's commands are
          intended as a backup mechanism.  If you are unable to decrypt the data with
          a certificate for some reason, you'd be able to enter the correct password
          to retrieve it or to add a new certificate-encrypted copy of the keys.
    
          If you do use the Password functionality of the module, you're encouraged to
          always enter these passwords interactively.  If you try to persist the passwords
          in some way, you're back to the original problem:  you can either use DPAPI
          and accept its limitations, or you have to manage and protect encryption keys
          yourself.
    
          All passwords are passed to the ProtectedData commands in the form of
          SecureString objects.
    
      Supported Data Types
          All data must be serialized to a byte array before it can be encrypted.  The
          ProtectedData module supports automatic serialization / deserialization of
          PSCredential, SecureString, and String objects.  If you want to encrypt another
          data type instead, you're responsible for converting it to a byte array yourself
          first, and passing the resulting byte array to Protect-Data's -InputObject
          parameter.
    
          The ProtectedData object which is returned from the Protect-Data command includes
          a Type property.  When you pass the object to Unprotect-Data, it uses this information
          to build and return an object of the original type for you (PSCredential, SecureString,
          String or Byte[] .)
      
      Regarding In-Memory Security
          The commands in the ProtectedData module make an effort to minimize the amount
          of time that any sensitive, unencrypted data is left in memory as well, but
          this is a tricky topic in a .NET application.  The Garbage Collector can
          sometimes create copies of unencrypted byte arrays before the module has had
          a chance to pin them.  This in-memory security is provided on a "best effort"
          basis.
    
      Certificate requirements
          The RSA certificates used with this module must allow Key Encipherment in their
          Key Usage extension.  ECDH certificate must allow the Key Agreement Key Usage
          extension. All certificates must also be issued by a trusted certificate
          authority and be currently valid, unless you pass the -SkipCertificateVerification
          switch parameter when calling the various commands in the module.  This switch
          allows you to leverage self-signed certificates, etc, if you don't care about
          validating a trust chain and just want to get at the certificate's key pair.
    
          You can verify which of your certificates are usable for both encryption and
          decryption ahead of time by running the following command:
    
          Get-KeyEncryptionCertificate -RequirePrivateKey -SkipCertificateVerification
    
          (With this set of parameters, the command searches the entire Cert: drive, including
          both CurrentUser and LocalMachine stores, and as mentioned earlier, the 
          -SkipCertificateVerification switch ignores certificate validity periods, trust
          chains and revocation status.)
    
    SEE ALSO
        Protect-Data
        Unprotect-Data
        Add-ProtectedDataCredential
        Remove-ProtectedDataCredential
        Get-ProtectedDataSupportedTypes
        Get-KeyEncryptionCertificate
    
  • tools\PoshDevOps\ProtectedData\HMAC.ps1 Show
    Add-Type -ReferencedAssemblies System.Core -WarningAction SilentlyContinue -TypeDefinition @'
        namespace PowerShellUtils
        {
            using System;
            using System.Reflection;
            using System.Security.Cryptography;
    
            public class FipsHmacSha256 : HMAC
            {
                // Class exists to guarantee FIPS compliant SHA-256 HMAC, which isn't
                // the case in the built-in HMACSHA256 class in older version of the
                // .NET Framework and PowerShell.
    
                private static RNGCryptoServiceProvider rng;
    
                private static RNGCryptoServiceProvider Rng
                {
                    get
                    {
                        if (rng == null)
                        {
                            rng = new RNGCryptoServiceProvider();
                        }
    
                        return rng;
                    }
                }
    
                private static byte[] GetRandomBytes(int keyLength)
                {
                    byte[] array = new byte[keyLength];
                    Rng.GetBytes(array);
                    return array;
                }
    
                public FipsHmacSha256() : this(GetRandomBytes(64)) { }
    
                public FipsHmacSha256(byte[] key)
                {
                    BindingFlags flags = BindingFlags.Instance | BindingFlags.NonPublic;
    
                    typeof(HMAC).GetField("m_hashName", flags).SetValue(this, "SHA256");
                    typeof(HMAC).GetField("m_hash1", flags).SetValue(this, new SHA256CryptoServiceProvider());
                    typeof(HMAC).GetField("m_hash2", flags).SetValue(this, new SHA256CryptoServiceProvider());
    
                    HashSizeValue = 256;
                    Key = key;
                }
            }
        }
    '@
    
    # SIG # Begin signature block
    # MIIhfgYJKoZIhvcNAQcCoIIhbzCCIWsCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
    # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
    # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU6SvJQWGGzNPYmQKPDMpa/G21
    # EOagghywMIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0B
    # AQUFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD
    # VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk
    # IElEIFJvb3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQsw
    # CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu
    # ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg
    # Q0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg
    # +XESpa7cJpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lT
    # XDGEKvYPmDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5
    # a3/UsDg+wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g
    # 0I6QNcZ4VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1
    # roV9Iq4/AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whf
    # GHdPAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0G
    # A1UdDgQWBBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLL
    # gjEtUYunpyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3
    # cmbYMuRCdWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmr
    # EthngYTffwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+
    # fT8r87cmNW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5Q
    # Z7dsvfPxH2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu
    # 838fYxAe+o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw
    # 8jCCBQswggPzoAMCAQICEAOiV15N2F/TLPzy+oVrWjMwDQYJKoZIhvcNAQEFBQAw
    # bzELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQ
    # d3d3LmRpZ2ljZXJ0LmNvbTEuMCwGA1UEAxMlRGlnaUNlcnQgQXNzdXJlZCBJRCBD
    # b2RlIFNpZ25pbmcgQ0EtMTAeFw0xNDA1MDUwMDAwMDBaFw0xNTA1MTMxMjAwMDBa
    # MGExCzAJBgNVBAYTAkNBMQswCQYDVQQIEwJPTjERMA8GA1UEBxMIQnJhbXB0b24x
    # GDAWBgNVBAoTD0RhdmlkIExlZSBXeWF0dDEYMBYGA1UEAxMPRGF2aWQgTGVlIFd5
    # YXR0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvcX51YAyViQE16mg
    # +IVQCQ0O8QC/wXBzTMPirnoGK9TThmxQIYgtcekZ5Xa/dWpW0xKKjaS6dRwYYXET
    # pzozoMWZbFDVrgKaqtuZNu9TD6rqK/QKf4iL/eikr0NIUL4CoSEQDeGLXDw7ntzZ
    # XKM86RuPw6MlDapfFQQFIMjsT7YaoqQNTOxhbiFoHVHqP7xL3JTS7TApa/RnNYyl
    # O7SQ7TSNsekiXGwUNxPqt6UGuOP0nyR+GtNiBcPfeUi+XaqjjBmpqgDbkEIMLDuf
    # fDO54VKvDLl8D2TxTFOcKZv61IcToOs+8z1sWTpMWI2MBuLhRR3A6iIhvilTYRBI
    # iX5FZQIDAQABo4IBrzCCAaswHwYDVR0jBBgwFoAUe2jOKarAF75JeuHlP9an90WP
    # NTIwHQYDVR0OBBYEFDS4+PmyUp+SmK2GR+NCMiLd+DpvMA4GA1UdDwEB/wQEAwIH
    # gDATBgNVHSUEDDAKBggrBgEFBQcDAzBtBgNVHR8EZjBkMDCgLqAshipodHRwOi8v
    # Y3JsMy5kaWdpY2VydC5jb20vYXNzdXJlZC1jcy1nMS5jcmwwMKAuoCyGKmh0dHA6
    # Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9hc3N1cmVkLWNzLWcxLmNybDBCBgNVHSAEOzA5
    # MDcGCWCGSAGG/WwDATAqMCgGCCsGAQUFBwIBFhxodHRwczovL3d3dy5kaWdpY2Vy
    # dC5jb20vQ1BTMIGCBggrBgEFBQcBAQR2MHQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9v
    # Y3NwLmRpZ2ljZXJ0LmNvbTBMBggrBgEFBQcwAoZAaHR0cDovL2NhY2VydHMuZGln
    # aWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEQ29kZVNpZ25pbmdDQS0xLmNydDAM
    # BgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBBQUAA4IBAQBbzAp8wys0A5LcuENslW0E
    # oz7rc0A8h+XgjJWdJOFRohE1mZRFpdkVxM0SRqw7IzlSFtTMCsVVPNwU6O7y9rCY
    # x5agx3CJBkJVDR/Y7DcOQTmmHy1zpcrKAgTznZuKUQZLpoYz/bA+Uh+bvXB9woCA
    # IRbchos1oxC+7/gjuxBMKh4NM+9NIvWs6qpnH5JeBidQDQXp3flPkla+MKrPTL/T
    # /amgna5E+9WHWnXbMFCpZ5n1bI1OvgNVZlYC/JTa4fjPEk8d16jYVP4GlRz/QUYI
    # y6IAGc/z6xpkdtpXWVCbW0dCd5ybfUYTaeCJumGpS/HSJ7JcTZj694QDOKNvhfrm
    # MIIGajCCBVKgAwIBAgIQAwGaAjr/WLFr1tXq5hfwZjANBgkqhkiG9w0BAQUFADBi
    # MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
    # d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBBc3N1cmVkIElEIENB
    # LTEwHhcNMTQxMDIyMDAwMDAwWhcNMjQxMDIyMDAwMDAwWjBHMQswCQYDVQQGEwJV
    # UzERMA8GA1UEChMIRGlnaUNlcnQxJTAjBgNVBAMTHERpZ2lDZXJ0IFRpbWVzdGFt
    # cCBSZXNwb25kZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCjZF38
    # fLPggjXg4PbGKuZJdTvMbuBTqZ8fZFnmfGt/a4ydVfiS457VWmNbAklQ2YPOb2bu
    # 3cuF6V+l+dSHdIhEOxnJ5fWRn8YUOawk6qhLLJGJzF4o9GS2ULf1ErNzlgpno75h
    # n67z/RJ4dQ6mWxT9RSOOhkRVfRiGBYxVh3lIRvfKDo2n3k5f4qi2LVkCYYhhchho
    # ubh87ubnNC8xd4EwH7s2AY3vJ+P3mvBMMWSN4+v6GYeofs/sjAw2W3rBerh4x8kG
    # LkYQyI3oBGDbvHN0+k7Y/qpA8bLOcEaD6dpAoVk62RUJV5lWMJPzyWHM0AjMa+xi
    # QpGsAsDvpPCJEY93AgMBAAGjggM1MIIDMTAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0T
    # AQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDCCAb8GA1UdIASCAbYwggGy
    # MIIBoQYJYIZIAYb9bAcBMIIBkjAoBggrBgEFBQcCARYcaHR0cHM6Ly93d3cuZGln
    # aWNlcnQuY29tL0NQUzCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBuAHkAIAB1AHMA
    # ZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGUAIABjAG8A
    # bgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBlACAAbwBmACAA
    # dABoAGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAgAGEAbgBkACAA
    # dABoAGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBnAHIAZQBlAG0A
    # ZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBiAGkAbABpAHQA
    # eQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0AGUAZAAgAGgA
    # ZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjALBglghkgBhv1s
    # AxUwHwYDVR0jBBgwFoAUFQASKxOYspkH7R7for5XDStnAs0wHQYDVR0OBBYEFGFa
    # TSS2STKdSip5GoNL9B6Jwcp9MH0GA1UdHwR2MHQwOKA2oDSGMmh0dHA6Ly9jcmwz
    # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRENBLTEuY3JsMDigNqA0hjJo
    # dHRwOi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURDQS0xLmNy
    # bDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2lj
    # ZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29t
    # L0RpZ2lDZXJ0QXNzdXJlZElEQ0EtMS5jcnQwDQYJKoZIhvcNAQEFBQADggEBAJ0l
    # fhszTbImgVybhs4jIA+Ah+WI//+x1GosMe06FxlxF82pG7xaFjkAneNshORaQPve
    # BgGMN/qbsZ0kfv4gpFetW7easGAm6mlXIV00Lx9xsIOUGQVrNZAQoHuXx/Y/5+IR
    # Qaa9YtnwJz04HShvOlIJ8OxwYtNiS7Dgc6aSwNOOMdgv420XEwbu5AO2FKvzj0On
    # cZ0h3RTKFV2SQdr5D4HRmXQNJsQOfxu19aDxxncGKBXp2JPlVRbwuwqrHNtcSCdm
    # yKOLChzlldquxC5ZoGHd2vNtomHpigtt7BIYvfdVVEADkitrwlHCCkivsNRu4PQU
    # Cjob4489yq9qjXvc2EQwggajMIIFi6ADAgECAhAPqEkGFdcAoL4hdv3F7G29MA0G
    # CSqGSIb3DQEBBQUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
    # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0
    # IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0xMTAyMTExMjAwMDBaFw0yNjAyMTAxMjAw
    # MDBaMG8xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNV
    # BAsTEHd3dy5kaWdpY2VydC5jb20xLjAsBgNVBAMTJURpZ2lDZXJ0IEFzc3VyZWQg
    # SUQgQ29kZSBTaWduaW5nIENBLTEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
    # AoIBAQCcfPmgjwrKiUtTmjzsGSJ/DMv3SETQPyJumk/6zt/G0ySR/6hSk+dy+PFG
    # hpTFqxf0eH/Ler6QJhx8Uy/lg+e7agUozKAXEUsYIPO3vfLcy7iGQEUfT/k5mNM7
    # 629ppFwBLrFm6aa43Abero1i/kQngqkDw/7mJguTSXHlOG1O/oBcZ3e11W9mZJRr
    # u4hJaNjR9H4hwebFHsnglrgJlflLnq7MMb1qWkKnxAVHfWAr2aFdvftWk+8b/HL5
    # 3z4y/d0qLDJG2l5jvNC4y0wQNfxQX6xDRHz+hERQtIwqPXQM9HqLckvgVrUTtmPp
    # P05JI+cGFvAlqwH4KEHmx9RkO12rAgMBAAGjggNDMIIDPzAOBgNVHQ8BAf8EBAMC
    # AYYwEwYDVR0lBAwwCgYIKwYBBQUHAwMwggHDBgNVHSAEggG6MIIBtjCCAbIGCGCG
    # SAGG/WwDMIIBpDA6BggrBgEFBQcCARYuaHR0cDovL3d3dy5kaWdpY2VydC5jb20v
    # c3NsLWNwcy1yZXBvc2l0b3J5Lmh0bTCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBu
    # AHkAIAB1AHMAZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0
    # AGUAIABjAG8AbgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBl
    # ACAAbwBmACAAdABoAGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAg
    # AGEAbgBkACAAdABoAGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBn
    # AHIAZQBlAG0AZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBi
    # AGkAbABpAHQAeQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0
    # AGUAZAAgAGgAZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjAS
    # BgNVHRMBAf8ECDAGAQH/AgEAMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYY
    # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2Fj
    # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MIGB
    # BgNVHR8EejB4MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl
    # cnRBc3N1cmVkSURSb290Q0EuY3JsMDqgOKA2hjRodHRwOi8vY3JsNC5kaWdpY2Vy
    # dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMB0GA1UdDgQWBBR7aM4p
    # qsAXvkl64eU/1qf3RY81MjAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823I
    # DzANBgkqhkiG9w0BAQUFAAOCAQEAe3IdZP+IyDrBt+nnqcSHu9uUkteQWTP6K4fe
    # qFuAJT8Tj5uDG3xDxOaM3zk+wxXssNo7ISV7JMFyXbhHkYETRvqcP2pRON60Jcvw
    # q9/FKAFUeRBGJNE4DyahYZBNur0o5j/xxKqb9to1U0/J8j3TbNwj7aqgTWcJ8zqA
    # PTz7NkyQ53ak3fI6v1Y1L6JMZejg1NrRx8iRai0jTzc7GZQY1NWcEDzVsRwZ/4/I
    # a5ue+K6cmZZ40c2cURVbQiZyWo0KSiOSQOiG3iLCkzrUm2im3yl/Brk8Dr2fxIac
    # gkdCcTKGCZlyCXlLnXFp9UH/fzl3ZPGEjb6LHrJ9aKOlkLEM/zCCBs0wggW1oAMC
    # AQICEAb9+QOWA63qAArrPye7uhswDQYJKoZIhvcNAQEFBQAwZTELMAkGA1UEBhMC
    # VVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0
    # LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTA2
    # MTExMDAwMDAwMFoXDTIxMTExMDAwMDAwMFowYjELMAkGA1UEBhMCVVMxFTATBgNV
    # BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8G
    # A1UEAxMYRGlnaUNlcnQgQXNzdXJlZCBJRCBDQS0xMIIBIjANBgkqhkiG9w0BAQEF
    # AAOCAQ8AMIIBCgKCAQEA6IItmfnKwkKVpYBzQHDSnlZUXKnE0kEGj8kz/E1FkVyB
    # n+0snPgWWd+etSQVwpi5tHdJ3InECtqvy15r7a2wcTHrzzpADEZNk+yLejYIA6sM
    # NP4YSYL+x8cxSIB8HqIPkg5QycaH6zY/2DDD/6b3+6LNb3Mj/qxWBZDwMiEWicZw
    # iPkFl32jx0PdAug7Pe2xQaPtP77blUjE7h6z8rwMK5nQxl0SQoHhg26Ccz8mSxSQ
    # rllmCsSNvtLOBq6thG9IhJtPQLnxTPKvmPv2zkBdXPao8S+v7Iki8msYZbHBc63X
    # 8djPHgp0XEK4aH631XcKJ1Z8D2KkPzIUYJX9BwSiCQIDAQABo4IDejCCA3YwDgYD
    # VR0PAQH/BAQDAgGGMDsGA1UdJQQ0MDIGCCsGAQUFBwMBBggrBgEFBQcDAgYIKwYB
    # BQUHAwMGCCsGAQUFBwMEBggrBgEFBQcDCDCCAdIGA1UdIASCAckwggHFMIIBtAYK
    # YIZIAYb9bAABBDCCAaQwOgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cuZGlnaWNlcnQu
    # Y29tL3NzbC1jcHMtcmVwb3NpdG9yeS5odG0wggFkBggrBgEFBQcCAjCCAVYeggFS
    # AEEAbgB5ACAAdQBzAGUAIABvAGYAIAB0AGgAaQBzACAAQwBlAHIAdABpAGYAaQBj
    # AGEAdABlACAAYwBvAG4AcwB0AGkAdAB1AHQAZQBzACAAYQBjAGMAZQBwAHQAYQBu
    # AGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcAaQBDAGUAcgB0ACAAQwBQAC8AQwBQ
    # AFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwAeQBpAG4AZwAgAFAAYQByAHQAeQAg
    # AEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkAYwBoACAAbABpAG0AaQB0ACAAbABp
    # AGEAYgBpAGwAaQB0AHkAIABhAG4AZAAgAGEAcgBlACAAaQBuAGMAbwByAHAAbwBy
    # AGEAdABlAGQAIABoAGUAcgBlAGkAbgAgAGIAeQAgAHIAZQBmAGUAcgBlAG4AYwBl
    # AC4wCwYJYIZIAYb9bAMVMBIGA1UdEwEB/wQIMAYBAf8CAQAweQYIKwYBBQUHAQEE
    # bTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQwYIKwYB
    # BQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3Vy
    # ZWRJRFJvb3RDQS5jcnQwgYEGA1UdHwR6MHgwOqA4oDaGNGh0dHA6Ly9jcmwzLmRp
    # Z2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwOqA4oDaGNGh0
    # dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5j
    # cmwwHQYDVR0OBBYEFBUAEisTmLKZB+0e36K+Vw0rZwLNMB8GA1UdIwQYMBaAFEXr
    # oq/0ksuCMS1Ri6enIZ3zbcgPMA0GCSqGSIb3DQEBBQUAA4IBAQBGUD7Jtygkpzgd
    # tlspr1LPUukxR6tWXHvVDQtBs+/sdR90OPKyXGGinJXDUOSCuSPRujqGcq04eKx1
    # XRcXNHJHhZRW0eu7NoR3zCSl8wQZVann4+erYs37iy2QwsDStZS9Xk+xBdIOPRqp
    # FFumhjFiqKgz5Js5p8T1zh14dpQlc+Qqq8+cdkvtX8JLFuRLcEwAiR78xXm8TBJX
    # /l/hHrwCXaj++wc4Tw3GXZG5D2dFzdaD7eeSDY2xaYxP+1ngIw/Sqq4AfO6cQg7P
    # kdcntxbuD8O9fAqg7iwIVYUiuOsYGk38KiGtSTGDR5V3cdyxG0tLHBCcdxTBnU8v
    # WpUIKRAmMYIEODCCBDQCAQEwgYMwbzELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERp
    # Z2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEuMCwGA1UEAxMl
    # RGlnaUNlcnQgQXNzdXJlZCBJRCBDb2RlIFNpZ25pbmcgQ0EtMQIQA6JXXk3YX9Ms
    # /PL6hWtaMzAJBgUrDgMCGgUAoHgwGAYKKwYBBAGCNwIBDDEKMAigAoAAoQKAADAZ
    # BgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYB
    # BAGCNwIBFTAjBgkqhkiG9w0BCQQxFgQUANzHv3qMGd7uTCtccvpwmN7pi7MwDQYJ
    # KoZIhvcNAQEBBQAEggEAWciQHbHu8A7aDTsjmA4+SMrb4tPS92u7tdtH7oC5EtqB
    # B/uMxt12ml+aTV5uLQ2hfGpp73mC+DBmYUZ7NmyGzQHCO8iCepIpFrg6NqV1gp4h
    # PF6BeYL1BligH6FlYsgKXZa/MQDYsvrRnJdC4/yH0hujTVgAcUlUJnB6AjLm1WSw
    # NAk1sZoHSfeBbWUD3HVTSx1aiIQHzjSKhzIpkGOLhVnBp1/HUy6/b5aGO9l3Ytb/
    # 8n9U9MxyeaTlBVDvSueV8aFmKYVymNI5BuxjCjVKpjmu+I+y9MSYp/IgeGBrMofm
    # DSGWhFnGq+IQIq3yIB2meE2pfWF99Iifsm/qVW1EfqGCAg8wggILBgkqhkiG9w0B
    # CQYxggH8MIIB+AIBATB2MGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
    # dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
    # ZXJ0IEFzc3VyZWQgSUQgQ0EtMQIQAwGaAjr/WLFr1tXq5hfwZjAJBgUrDgMCGgUA
    # oF0wGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTQx
    # MTEyMDQ0MjA4WjAjBgkqhkiG9w0BCQQxFgQU55ARbXAM8IjEf6qKz8gbwRJhXjIw
    # DQYJKoZIhvcNAQEBBQAEggEAE5zHsCV8hkfTHrKzB1R5DvlXtzeqSZVBc9QS+E6b
    # u3EyBjTcpaLmICOLjGGx4f4IznW47vRLNVCvamim/veN8TIjJ0w2BZluSHR9E1oq
    # i+C+bLnnB/lgk7s/PGSqWR9ezJ3UlLupEVfBx9n3rkcEK1Lcf30MocF6lIOQh6xM
    # AFD1bV0qPXUP2Wx61Rahttr13r3cmZ++wt9wfct2F4kU7PBLK7bvsRFUi+xLoU1U
    # 56jW2LG6DYjpz6cx0nPWpTOJuyVU736q99PZrICUJrZjDihcOKFh88iyjqCBX6qY
    # Q+IR5GDvqwPMEITA44TFFzJSQv2ltwtTnG+Vwm7opljUHg==
    # SIG # End signature block
    
  • tools\PoshDevOps\ProtectedData\LICENSE
  • tools\PoshDevOps\ProtectedData\PinnedArray.ps1 Show
    Add-Type -TypeDefinition @'
        namespace PowerShellUtils
        {
            using System;
            using System.Runtime.InteropServices;
    
            public sealed class PinnedArray<T> : IDisposable
            {
                private readonly T[] array;
                private readonly GCHandle gcHandle;
                public readonly bool ClearOnDispose = true;
    
                private bool isDisposed = false;
    
                public static implicit operator T[](PinnedArray<T> pinnedArray)
                {
                    return pinnedArray.Array;
                }
    
                public T this[int key]
                {
                    get
                    {
                        if (isDisposed) { throw new ObjectDisposedException("PinnedArray"); }
                        return array[key];
                    }
    
                    set
                    {
                        if (isDisposed) { throw new ObjectDisposedException("PinnedArray"); }
                        array[key] = value;
                    }
                }
    
                public T[] Array
                {
                    get
                    {
                        if (isDisposed) { throw new ObjectDisposedException("PinnedArray"); }
                        return array;
                    }
                }
    
                public int Length
                {
                    get
                    {
                        if (isDisposed) { throw new ObjectDisposedException("PinnedArray"); }
                        return array.Length;
                    }
                }
    
                public int Count
                {
                    get { return Length; }
                }
    
                public PinnedArray(uint count)
                {
                    array = new T[count];
                    gcHandle = GCHandle.Alloc(Array, GCHandleType.Pinned);
                }
    
                public PinnedArray(uint count, bool clearOnDispose) : this(count)
                {
                    ClearOnDispose = clearOnDispose;
                }
    
                public PinnedArray(T[] array)
                {
                    if (array == null) { throw new ArgumentNullException("array"); }
    
                    this.array = array;
                    gcHandle = GCHandle.Alloc(this.array, GCHandleType.Pinned);
                }
    
                public PinnedArray(T[] array, bool clearOnDispose) : this(array)
                {
                    ClearOnDispose = clearOnDispose;
                }
    
                ~PinnedArray()
                {
                    Dispose();
                }
    
                public void Dispose()
                {
                    if (isDisposed) { return; }
    
                    if (array != null && ClearOnDispose) { System.Array.Clear(array, 0, array.Length); }
                    if (gcHandle != null) { gcHandle.Free(); }
    
                    isDisposed = true;
                }
            }
        }
    '@
    
    # SIG # Begin signature block
    # MIIhfgYJKoZIhvcNAQcCoIIhbzCCIWsCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
    # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
    # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU4y9tT75NMguTkRut5nk9XoRe
    # Y+SgghywMIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0B
    # AQUFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD
    # VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk
    # IElEIFJvb3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQsw
    # CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu
    # ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg
    # Q0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg
    # +XESpa7cJpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lT
    # XDGEKvYPmDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5
    # a3/UsDg+wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g
    # 0I6QNcZ4VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1
    # roV9Iq4/AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whf
    # GHdPAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0G
    # A1UdDgQWBBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLL
    # gjEtUYunpyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3
    # cmbYMuRCdWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmr
    # EthngYTffwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+
    # fT8r87cmNW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5Q
    # Z7dsvfPxH2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu
    # 838fYxAe+o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw
    # 8jCCBQswggPzoAMCAQICEAOiV15N2F/TLPzy+oVrWjMwDQYJKoZIhvcNAQEFBQAw
    # bzELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQ
    # d3d3LmRpZ2ljZXJ0LmNvbTEuMCwGA1UEAxMlRGlnaUNlcnQgQXNzdXJlZCBJRCBD
    # b2RlIFNpZ25pbmcgQ0EtMTAeFw0xNDA1MDUwMDAwMDBaFw0xNTA1MTMxMjAwMDBa
    # MGExCzAJBgNVBAYTAkNBMQswCQYDVQQIEwJPTjERMA8GA1UEBxMIQnJhbXB0b24x
    # GDAWBgNVBAoTD0RhdmlkIExlZSBXeWF0dDEYMBYGA1UEAxMPRGF2aWQgTGVlIFd5
    # YXR0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvcX51YAyViQE16mg
    # +IVQCQ0O8QC/wXBzTMPirnoGK9TThmxQIYgtcekZ5Xa/dWpW0xKKjaS6dRwYYXET
    # pzozoMWZbFDVrgKaqtuZNu9TD6rqK/QKf4iL/eikr0NIUL4CoSEQDeGLXDw7ntzZ
    # XKM86RuPw6MlDapfFQQFIMjsT7YaoqQNTOxhbiFoHVHqP7xL3JTS7TApa/RnNYyl
    # O7SQ7TSNsekiXGwUNxPqt6UGuOP0nyR+GtNiBcPfeUi+XaqjjBmpqgDbkEIMLDuf
    # fDO54VKvDLl8D2TxTFOcKZv61IcToOs+8z1sWTpMWI2MBuLhRR3A6iIhvilTYRBI
    # iX5FZQIDAQABo4IBrzCCAaswHwYDVR0jBBgwFoAUe2jOKarAF75JeuHlP9an90WP
    # NTIwHQYDVR0OBBYEFDS4+PmyUp+SmK2GR+NCMiLd+DpvMA4GA1UdDwEB/wQEAwIH
    # gDATBgNVHSUEDDAKBggrBgEFBQcDAzBtBgNVHR8EZjBkMDCgLqAshipodHRwOi8v
    # Y3JsMy5kaWdpY2VydC5jb20vYXNzdXJlZC1jcy1nMS5jcmwwMKAuoCyGKmh0dHA6
    # Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9hc3N1cmVkLWNzLWcxLmNybDBCBgNVHSAEOzA5
    # MDcGCWCGSAGG/WwDATAqMCgGCCsGAQUFBwIBFhxodHRwczovL3d3dy5kaWdpY2Vy
    # dC5jb20vQ1BTMIGCBggrBgEFBQcBAQR2MHQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9v
    # Y3NwLmRpZ2ljZXJ0LmNvbTBMBggrBgEFBQcwAoZAaHR0cDovL2NhY2VydHMuZGln
    # aWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEQ29kZVNpZ25pbmdDQS0xLmNydDAM
    # BgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBBQUAA4IBAQBbzAp8wys0A5LcuENslW0E
    # oz7rc0A8h+XgjJWdJOFRohE1mZRFpdkVxM0SRqw7IzlSFtTMCsVVPNwU6O7y9rCY
    # x5agx3CJBkJVDR/Y7DcOQTmmHy1zpcrKAgTznZuKUQZLpoYz/bA+Uh+bvXB9woCA
    # IRbchos1oxC+7/gjuxBMKh4NM+9NIvWs6qpnH5JeBidQDQXp3flPkla+MKrPTL/T
    # /amgna5E+9WHWnXbMFCpZ5n1bI1OvgNVZlYC/JTa4fjPEk8d16jYVP4GlRz/QUYI
    # y6IAGc/z6xpkdtpXWVCbW0dCd5ybfUYTaeCJumGpS/HSJ7JcTZj694QDOKNvhfrm
    # MIIGajCCBVKgAwIBAgIQAwGaAjr/WLFr1tXq5hfwZjANBgkqhkiG9w0BAQUFADBi
    # MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
    # d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBBc3N1cmVkIElEIENB
    # LTEwHhcNMTQxMDIyMDAwMDAwWhcNMjQxMDIyMDAwMDAwWjBHMQswCQYDVQQGEwJV
    # UzERMA8GA1UEChMIRGlnaUNlcnQxJTAjBgNVBAMTHERpZ2lDZXJ0IFRpbWVzdGFt
    # cCBSZXNwb25kZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCjZF38
    # fLPggjXg4PbGKuZJdTvMbuBTqZ8fZFnmfGt/a4ydVfiS457VWmNbAklQ2YPOb2bu
    # 3cuF6V+l+dSHdIhEOxnJ5fWRn8YUOawk6qhLLJGJzF4o9GS2ULf1ErNzlgpno75h
    # n67z/RJ4dQ6mWxT9RSOOhkRVfRiGBYxVh3lIRvfKDo2n3k5f4qi2LVkCYYhhchho
    # ubh87ubnNC8xd4EwH7s2AY3vJ+P3mvBMMWSN4+v6GYeofs/sjAw2W3rBerh4x8kG
    # LkYQyI3oBGDbvHN0+k7Y/qpA8bLOcEaD6dpAoVk62RUJV5lWMJPzyWHM0AjMa+xi
    # QpGsAsDvpPCJEY93AgMBAAGjggM1MIIDMTAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0T
    # AQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDCCAb8GA1UdIASCAbYwggGy
    # MIIBoQYJYIZIAYb9bAcBMIIBkjAoBggrBgEFBQcCARYcaHR0cHM6Ly93d3cuZGln
    # aWNlcnQuY29tL0NQUzCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBuAHkAIAB1AHMA
    # ZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGUAIABjAG8A
    # bgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBlACAAbwBmACAA
    # dABoAGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAgAGEAbgBkACAA
    # dABoAGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBnAHIAZQBlAG0A
    # ZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBiAGkAbABpAHQA
    # eQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0AGUAZAAgAGgA
    # ZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjALBglghkgBhv1s
    # AxUwHwYDVR0jBBgwFoAUFQASKxOYspkH7R7for5XDStnAs0wHQYDVR0OBBYEFGFa
    # TSS2STKdSip5GoNL9B6Jwcp9MH0GA1UdHwR2MHQwOKA2oDSGMmh0dHA6Ly9jcmwz
    # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRENBLTEuY3JsMDigNqA0hjJo
    # dHRwOi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURDQS0xLmNy
    # bDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2lj
    # ZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29t
    # L0RpZ2lDZXJ0QXNzdXJlZElEQ0EtMS5jcnQwDQYJKoZIhvcNAQEFBQADggEBAJ0l
    # fhszTbImgVybhs4jIA+Ah+WI//+x1GosMe06FxlxF82pG7xaFjkAneNshORaQPve
    # BgGMN/qbsZ0kfv4gpFetW7easGAm6mlXIV00Lx9xsIOUGQVrNZAQoHuXx/Y/5+IR
    # Qaa9YtnwJz04HShvOlIJ8OxwYtNiS7Dgc6aSwNOOMdgv420XEwbu5AO2FKvzj0On
    # cZ0h3RTKFV2SQdr5D4HRmXQNJsQOfxu19aDxxncGKBXp2JPlVRbwuwqrHNtcSCdm
    # yKOLChzlldquxC5ZoGHd2vNtomHpigtt7BIYvfdVVEADkitrwlHCCkivsNRu4PQU
    # Cjob4489yq9qjXvc2EQwggajMIIFi6ADAgECAhAPqEkGFdcAoL4hdv3F7G29MA0G
    # CSqGSIb3DQEBBQUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
    # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0
    # IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0xMTAyMTExMjAwMDBaFw0yNjAyMTAxMjAw
    # MDBaMG8xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNV
    # BAsTEHd3dy5kaWdpY2VydC5jb20xLjAsBgNVBAMTJURpZ2lDZXJ0IEFzc3VyZWQg
    # SUQgQ29kZSBTaWduaW5nIENBLTEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
    # AoIBAQCcfPmgjwrKiUtTmjzsGSJ/DMv3SETQPyJumk/6zt/G0ySR/6hSk+dy+PFG
    # hpTFqxf0eH/Ler6QJhx8Uy/lg+e7agUozKAXEUsYIPO3vfLcy7iGQEUfT/k5mNM7
    # 629ppFwBLrFm6aa43Abero1i/kQngqkDw/7mJguTSXHlOG1O/oBcZ3e11W9mZJRr
    # u4hJaNjR9H4hwebFHsnglrgJlflLnq7MMb1qWkKnxAVHfWAr2aFdvftWk+8b/HL5
    # 3z4y/d0qLDJG2l5jvNC4y0wQNfxQX6xDRHz+hERQtIwqPXQM9HqLckvgVrUTtmPp
    # P05JI+cGFvAlqwH4KEHmx9RkO12rAgMBAAGjggNDMIIDPzAOBgNVHQ8BAf8EBAMC
    # AYYwEwYDVR0lBAwwCgYIKwYBBQUHAwMwggHDBgNVHSAEggG6MIIBtjCCAbIGCGCG
    # SAGG/WwDMIIBpDA6BggrBgEFBQcCARYuaHR0cDovL3d3dy5kaWdpY2VydC5jb20v
    # c3NsLWNwcy1yZXBvc2l0b3J5Lmh0bTCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBu
    # AHkAIAB1AHMAZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0
    # AGUAIABjAG8AbgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBl
    # ACAAbwBmACAAdABoAGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAg
    # AGEAbgBkACAAdABoAGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBn
    # AHIAZQBlAG0AZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBi
    # AGkAbABpAHQAeQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0
    # AGUAZAAgAGgAZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjAS
    # BgNVHRMBAf8ECDAGAQH/AgEAMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYY
    # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2Fj
    # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MIGB
    # BgNVHR8EejB4MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl
    # cnRBc3N1cmVkSURSb290Q0EuY3JsMDqgOKA2hjRodHRwOi8vY3JsNC5kaWdpY2Vy
    # dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMB0GA1UdDgQWBBR7aM4p
    # qsAXvkl64eU/1qf3RY81MjAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823I
    # DzANBgkqhkiG9w0BAQUFAAOCAQEAe3IdZP+IyDrBt+nnqcSHu9uUkteQWTP6K4fe
    # qFuAJT8Tj5uDG3xDxOaM3zk+wxXssNo7ISV7JMFyXbhHkYETRvqcP2pRON60Jcvw
    # q9/FKAFUeRBGJNE4DyahYZBNur0o5j/xxKqb9to1U0/J8j3TbNwj7aqgTWcJ8zqA
    # PTz7NkyQ53ak3fI6v1Y1L6JMZejg1NrRx8iRai0jTzc7GZQY1NWcEDzVsRwZ/4/I
    # a5ue+K6cmZZ40c2cURVbQiZyWo0KSiOSQOiG3iLCkzrUm2im3yl/Brk8Dr2fxIac
    # gkdCcTKGCZlyCXlLnXFp9UH/fzl3ZPGEjb6LHrJ9aKOlkLEM/zCCBs0wggW1oAMC
    # AQICEAb9+QOWA63qAArrPye7uhswDQYJKoZIhvcNAQEFBQAwZTELMAkGA1UEBhMC
    # VVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0
    # LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTA2
    # MTExMDAwMDAwMFoXDTIxMTExMDAwMDAwMFowYjELMAkGA1UEBhMCVVMxFTATBgNV
    # BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8G
    # A1UEAxMYRGlnaUNlcnQgQXNzdXJlZCBJRCBDQS0xMIIBIjANBgkqhkiG9w0BAQEF
    # AAOCAQ8AMIIBCgKCAQEA6IItmfnKwkKVpYBzQHDSnlZUXKnE0kEGj8kz/E1FkVyB
    # n+0snPgWWd+etSQVwpi5tHdJ3InECtqvy15r7a2wcTHrzzpADEZNk+yLejYIA6sM
    # NP4YSYL+x8cxSIB8HqIPkg5QycaH6zY/2DDD/6b3+6LNb3Mj/qxWBZDwMiEWicZw
    # iPkFl32jx0PdAug7Pe2xQaPtP77blUjE7h6z8rwMK5nQxl0SQoHhg26Ccz8mSxSQ
    # rllmCsSNvtLOBq6thG9IhJtPQLnxTPKvmPv2zkBdXPao8S+v7Iki8msYZbHBc63X
    # 8djPHgp0XEK4aH631XcKJ1Z8D2KkPzIUYJX9BwSiCQIDAQABo4IDejCCA3YwDgYD
    # VR0PAQH/BAQDAgGGMDsGA1UdJQQ0MDIGCCsGAQUFBwMBBggrBgEFBQcDAgYIKwYB
    # BQUHAwMGCCsGAQUFBwMEBggrBgEFBQcDCDCCAdIGA1UdIASCAckwggHFMIIBtAYK
    # YIZIAYb9bAABBDCCAaQwOgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cuZGlnaWNlcnQu
    # Y29tL3NzbC1jcHMtcmVwb3NpdG9yeS5odG0wggFkBggrBgEFBQcCAjCCAVYeggFS
    # AEEAbgB5ACAAdQBzAGUAIABvAGYAIAB0AGgAaQBzACAAQwBlAHIAdABpAGYAaQBj
    # AGEAdABlACAAYwBvAG4AcwB0AGkAdAB1AHQAZQBzACAAYQBjAGMAZQBwAHQAYQBu
    # AGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcAaQBDAGUAcgB0ACAAQwBQAC8AQwBQ
    # AFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwAeQBpAG4AZwAgAFAAYQByAHQAeQAg
    # AEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkAYwBoACAAbABpAG0AaQB0ACAAbABp
    # AGEAYgBpAGwAaQB0AHkAIABhAG4AZAAgAGEAcgBlACAAaQBuAGMAbwByAHAAbwBy
    # AGEAdABlAGQAIABoAGUAcgBlAGkAbgAgAGIAeQAgAHIAZQBmAGUAcgBlAG4AYwBl
    # AC4wCwYJYIZIAYb9bAMVMBIGA1UdEwEB/wQIMAYBAf8CAQAweQYIKwYBBQUHAQEE
    # bTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQwYIKwYB
    # BQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3Vy
    # ZWRJRFJvb3RDQS5jcnQwgYEGA1UdHwR6MHgwOqA4oDaGNGh0dHA6Ly9jcmwzLmRp
    # Z2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwOqA4oDaGNGh0
    # dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5j
    # cmwwHQYDVR0OBBYEFBUAEisTmLKZB+0e36K+Vw0rZwLNMB8GA1UdIwQYMBaAFEXr
    # oq/0ksuCMS1Ri6enIZ3zbcgPMA0GCSqGSIb3DQEBBQUAA4IBAQBGUD7Jtygkpzgd
    # tlspr1LPUukxR6tWXHvVDQtBs+/sdR90OPKyXGGinJXDUOSCuSPRujqGcq04eKx1
    # XRcXNHJHhZRW0eu7NoR3zCSl8wQZVann4+erYs37iy2QwsDStZS9Xk+xBdIOPRqp
    # FFumhjFiqKgz5Js5p8T1zh14dpQlc+Qqq8+cdkvtX8JLFuRLcEwAiR78xXm8TBJX
    # /l/hHrwCXaj++wc4Tw3GXZG5D2dFzdaD7eeSDY2xaYxP+1ngIw/Sqq4AfO6cQg7P
    # kdcntxbuD8O9fAqg7iwIVYUiuOsYGk38KiGtSTGDR5V3cdyxG0tLHBCcdxTBnU8v
    # WpUIKRAmMYIEODCCBDQCAQEwgYMwbzELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERp
    # Z2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEuMCwGA1UEAxMl
    # RGlnaUNlcnQgQXNzdXJlZCBJRCBDb2RlIFNpZ25pbmcgQ0EtMQIQA6JXXk3YX9Ms
    # /PL6hWtaMzAJBgUrDgMCGgUAoHgwGAYKKwYBBAGCNwIBDDEKMAigAoAAoQKAADAZ
    # BgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYB
    # BAGCNwIBFTAjBgkqhkiG9w0BCQQxFgQUB6BAHom/eVSCSZ0zvj/mbm+P+LowDQYJ
    # KoZIhvcNAQEBBQAEggEAfNFttI4FAAqXaqiQijA46CvuXT86c8YGvcl0GLtj/qxA
    # FQZu1bIMh706nBouPl6vSEmSqhBLZrFe0LOrXucrKiM8LEw50Op4LP/NgXbOhVLf
    # VcZoZUDnedGhIYfKVLyx61M4Pzw96Gvsf8pMOxHcQqvkYJXwKif8vX0zekO1FY8h
    # rOVsn/fbKN/qLS555BJ/9u4C80M7xKd5xVRt1YI6oCwotKrTXZCPL3tqc9qcaxm/
    # droWbF0z5IgloR3fEQtso0jyEui8F+d85OHO8mp7xRWgpIFPzCTSAe52MCTDrOK2
    # H9AeRWOnPTFbKgKFc+GwvFF+8Dbw//eg7vsYnnB9SqGCAg8wggILBgkqhkiG9w0B
    # CQYxggH8MIIB+AIBATB2MGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
    # dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
    # ZXJ0IEFzc3VyZWQgSUQgQ0EtMQIQAwGaAjr/WLFr1tXq5hfwZjAJBgUrDgMCGgUA
    # oF0wGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTQx
    # MTEyMDQ0MjA5WjAjBgkqhkiG9w0BCQQxFgQUEEzuukefezdx5LM+64uN5GKGNRgw
    # DQYJKoZIhvcNAQEBBQAEggEAEEGnAx6ynX1lTPDVSuQrMzQbglKRxsqc88vf+odH
    # 9IYkB9eUIrDXEFkrHBExL3yoEblc6cCLofRRnIoJzqiw/6YffN2vYAnCxMwgcHhx
    # GG59QP9fKIEFCS0fbF5C+FLWRZasrmcJXR6BNoIgcDv7atQmZC6Vu6F3XKtZQ9LV
    # Qop1UYiRptwpjZcH5HhwePLqIe6XdM6ImLJ0YbQkMkGVdMl7InBDNhaRvJ9xnUNe
    # rybNDi10lbg3FB1IoUcqq7nyjv6cZ+HJJUyvPjS349BuVRtFbfZEIE+1i2WxCG+H
    # JSDlrVlcVKZ9UUQUUO/k5yywHGbDBFdKUBsKe6/NQGMEzA==
    # SIG # End signature block
    
  • tools\PoshDevOps\ProtectedData\ProtectedData.psd1
  • tools\PoshDevOps\ProtectedData\ProtectedData.psm1 Show
    $path = Split-Path $MyInvocation.MyCommand.Path
    
    Add-Type -Path $path\Security.Cryptography.dll -ErrorAction Stop
    
    . $path\PinnedArray.ps1
    . $path\HMAC.ps1
    . $path\Commands.ps1
    
    # SIG # Begin signature block
    # MIIhfgYJKoZIhvcNAQcCoIIhbzCCIWsCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
    # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
    # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUfHvyvqFagSCOuLtSRXFgymVn
    # I+GgghywMIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0B
    # AQUFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD
    # VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk
    # IElEIFJvb3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQsw
    # CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu
    # ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg
    # Q0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg
    # +XESpa7cJpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lT
    # XDGEKvYPmDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5
    # a3/UsDg+wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g
    # 0I6QNcZ4VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1
    # roV9Iq4/AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whf
    # GHdPAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0G
    # A1UdDgQWBBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLL
    # gjEtUYunpyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3
    # cmbYMuRCdWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmr
    # EthngYTffwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+
    # fT8r87cmNW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5Q
    # Z7dsvfPxH2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu
    # 838fYxAe+o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw
    # 8jCCBQswggPzoAMCAQICEAOiV15N2F/TLPzy+oVrWjMwDQYJKoZIhvcNAQEFBQAw
    # bzELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQ
    # d3d3LmRpZ2ljZXJ0LmNvbTEuMCwGA1UEAxMlRGlnaUNlcnQgQXNzdXJlZCBJRCBD
    # b2RlIFNpZ25pbmcgQ0EtMTAeFw0xNDA1MDUwMDAwMDBaFw0xNTA1MTMxMjAwMDBa
    # MGExCzAJBgNVBAYTAkNBMQswCQYDVQQIEwJPTjERMA8GA1UEBxMIQnJhbXB0b24x
    # GDAWBgNVBAoTD0RhdmlkIExlZSBXeWF0dDEYMBYGA1UEAxMPRGF2aWQgTGVlIFd5
    # YXR0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvcX51YAyViQE16mg
    # +IVQCQ0O8QC/wXBzTMPirnoGK9TThmxQIYgtcekZ5Xa/dWpW0xKKjaS6dRwYYXET
    # pzozoMWZbFDVrgKaqtuZNu9TD6rqK/QKf4iL/eikr0NIUL4CoSEQDeGLXDw7ntzZ
    # XKM86RuPw6MlDapfFQQFIMjsT7YaoqQNTOxhbiFoHVHqP7xL3JTS7TApa/RnNYyl
    # O7SQ7TSNsekiXGwUNxPqt6UGuOP0nyR+GtNiBcPfeUi+XaqjjBmpqgDbkEIMLDuf
    # fDO54VKvDLl8D2TxTFOcKZv61IcToOs+8z1sWTpMWI2MBuLhRR3A6iIhvilTYRBI
    # iX5FZQIDAQABo4IBrzCCAaswHwYDVR0jBBgwFoAUe2jOKarAF75JeuHlP9an90WP
    # NTIwHQYDVR0OBBYEFDS4+PmyUp+SmK2GR+NCMiLd+DpvMA4GA1UdDwEB/wQEAwIH
    # gDATBgNVHSUEDDAKBggrBgEFBQcDAzBtBgNVHR8EZjBkMDCgLqAshipodHRwOi8v
    # Y3JsMy5kaWdpY2VydC5jb20vYXNzdXJlZC1jcy1nMS5jcmwwMKAuoCyGKmh0dHA6
    # Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9hc3N1cmVkLWNzLWcxLmNybDBCBgNVHSAEOzA5
    # MDcGCWCGSAGG/WwDATAqMCgGCCsGAQUFBwIBFhxodHRwczovL3d3dy5kaWdpY2Vy
    # dC5jb20vQ1BTMIGCBggrBgEFBQcBAQR2MHQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9v
    # Y3NwLmRpZ2ljZXJ0LmNvbTBMBggrBgEFBQcwAoZAaHR0cDovL2NhY2VydHMuZGln
    # aWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEQ29kZVNpZ25pbmdDQS0xLmNydDAM
    # BgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBBQUAA4IBAQBbzAp8wys0A5LcuENslW0E
    # oz7rc0A8h+XgjJWdJOFRohE1mZRFpdkVxM0SRqw7IzlSFtTMCsVVPNwU6O7y9rCY
    # x5agx3CJBkJVDR/Y7DcOQTmmHy1zpcrKAgTznZuKUQZLpoYz/bA+Uh+bvXB9woCA
    # IRbchos1oxC+7/gjuxBMKh4NM+9NIvWs6qpnH5JeBidQDQXp3flPkla+MKrPTL/T
    # /amgna5E+9WHWnXbMFCpZ5n1bI1OvgNVZlYC/JTa4fjPEk8d16jYVP4GlRz/QUYI
    # y6IAGc/z6xpkdtpXWVCbW0dCd5ybfUYTaeCJumGpS/HSJ7JcTZj694QDOKNvhfrm
    # MIIGajCCBVKgAwIBAgIQAwGaAjr/WLFr1tXq5hfwZjANBgkqhkiG9w0BAQUFADBi
    # MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
    # d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBBc3N1cmVkIElEIENB
    # LTEwHhcNMTQxMDIyMDAwMDAwWhcNMjQxMDIyMDAwMDAwWjBHMQswCQYDVQQGEwJV
    # UzERMA8GA1UEChMIRGlnaUNlcnQxJTAjBgNVBAMTHERpZ2lDZXJ0IFRpbWVzdGFt
    # cCBSZXNwb25kZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCjZF38
    # fLPggjXg4PbGKuZJdTvMbuBTqZ8fZFnmfGt/a4ydVfiS457VWmNbAklQ2YPOb2bu
    # 3cuF6V+l+dSHdIhEOxnJ5fWRn8YUOawk6qhLLJGJzF4o9GS2ULf1ErNzlgpno75h
    # n67z/RJ4dQ6mWxT9RSOOhkRVfRiGBYxVh3lIRvfKDo2n3k5f4qi2LVkCYYhhchho
    # ubh87ubnNC8xd4EwH7s2AY3vJ+P3mvBMMWSN4+v6GYeofs/sjAw2W3rBerh4x8kG
    # LkYQyI3oBGDbvHN0+k7Y/qpA8bLOcEaD6dpAoVk62RUJV5lWMJPzyWHM0AjMa+xi
    # QpGsAsDvpPCJEY93AgMBAAGjggM1MIIDMTAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0T
    # AQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDCCAb8GA1UdIASCAbYwggGy
    # MIIBoQYJYIZIAYb9bAcBMIIBkjAoBggrBgEFBQcCARYcaHR0cHM6Ly93d3cuZGln
    # aWNlcnQuY29tL0NQUzCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBuAHkAIAB1AHMA
    # ZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGUAIABjAG8A
    # bgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBlACAAbwBmACAA
    # dABoAGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAgAGEAbgBkACAA
    # dABoAGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBnAHIAZQBlAG0A
    # ZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBiAGkAbABpAHQA
    # eQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0AGUAZAAgAGgA
    # ZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjALBglghkgBhv1s
    # AxUwHwYDVR0jBBgwFoAUFQASKxOYspkH7R7for5XDStnAs0wHQYDVR0OBBYEFGFa
    # TSS2STKdSip5GoNL9B6Jwcp9MH0GA1UdHwR2MHQwOKA2oDSGMmh0dHA6Ly9jcmwz
    # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRENBLTEuY3JsMDigNqA0hjJo
    # dHRwOi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURDQS0xLmNy
    # bDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2lj
    # ZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29t
    # L0RpZ2lDZXJ0QXNzdXJlZElEQ0EtMS5jcnQwDQYJKoZIhvcNAQEFBQADggEBAJ0l
    # fhszTbImgVybhs4jIA+Ah+WI//+x1GosMe06FxlxF82pG7xaFjkAneNshORaQPve
    # BgGMN/qbsZ0kfv4gpFetW7easGAm6mlXIV00Lx9xsIOUGQVrNZAQoHuXx/Y/5+IR
    # Qaa9YtnwJz04HShvOlIJ8OxwYtNiS7Dgc6aSwNOOMdgv420XEwbu5AO2FKvzj0On
    # cZ0h3RTKFV2SQdr5D4HRmXQNJsQOfxu19aDxxncGKBXp2JPlVRbwuwqrHNtcSCdm
    # yKOLChzlldquxC5ZoGHd2vNtomHpigtt7BIYvfdVVEADkitrwlHCCkivsNRu4PQU
    # Cjob4489yq9qjXvc2EQwggajMIIFi6ADAgECAhAPqEkGFdcAoL4hdv3F7G29MA0G
    # CSqGSIb3DQEBBQUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
    # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0
    # IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0xMTAyMTExMjAwMDBaFw0yNjAyMTAxMjAw
    # MDBaMG8xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNV
    # BAsTEHd3dy5kaWdpY2VydC5jb20xLjAsBgNVBAMTJURpZ2lDZXJ0IEFzc3VyZWQg
    # SUQgQ29kZSBTaWduaW5nIENBLTEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
    # AoIBAQCcfPmgjwrKiUtTmjzsGSJ/DMv3SETQPyJumk/6zt/G0ySR/6hSk+dy+PFG
    # hpTFqxf0eH/Ler6QJhx8Uy/lg+e7agUozKAXEUsYIPO3vfLcy7iGQEUfT/k5mNM7
    # 629ppFwBLrFm6aa43Abero1i/kQngqkDw/7mJguTSXHlOG1O/oBcZ3e11W9mZJRr
    # u4hJaNjR9H4hwebFHsnglrgJlflLnq7MMb1qWkKnxAVHfWAr2aFdvftWk+8b/HL5
    # 3z4y/d0qLDJG2l5jvNC4y0wQNfxQX6xDRHz+hERQtIwqPXQM9HqLckvgVrUTtmPp
    # P05JI+cGFvAlqwH4KEHmx9RkO12rAgMBAAGjggNDMIIDPzAOBgNVHQ8BAf8EBAMC
    # AYYwEwYDVR0lBAwwCgYIKwYBBQUHAwMwggHDBgNVHSAEggG6MIIBtjCCAbIGCGCG
    # SAGG/WwDMIIBpDA6BggrBgEFBQcCARYuaHR0cDovL3d3dy5kaWdpY2VydC5jb20v
    # c3NsLWNwcy1yZXBvc2l0b3J5Lmh0bTCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBu
    # AHkAIAB1AHMAZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0
    # AGUAIABjAG8AbgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBl
    # ACAAbwBmACAAdABoAGUAIABEAGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAg
    # AGEAbgBkACAAdABoAGUAIABSAGUAbAB5AGkAbgBnACAAUABhAHIAdAB5ACAAQQBn
    # AHIAZQBlAG0AZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBpAHQAIABsAGkAYQBi
    # AGkAbABpAHQAeQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIAYQB0
    # AGUAZAAgAGgAZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjAS
    # BgNVHRMBAf8ECDAGAQH/AgEAMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYY
    # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2Fj
    # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MIGB
    # BgNVHR8EejB4MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl
    # cnRBc3N1cmVkSURSb290Q0EuY3JsMDqgOKA2hjRodHRwOi8vY3JsNC5kaWdpY2Vy
    # dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMB0GA1UdDgQWBBR7aM4p
    # qsAXvkl64eU/1qf3RY81MjAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823I
    # DzANBgkqhkiG9w0BAQUFAAOCAQEAe3IdZP+IyDrBt+nnqcSHu9uUkteQWTP6K4fe
    # qFuAJT8Tj5uDG3xDxOaM3zk+wxXssNo7ISV7JMFyXbhHkYETRvqcP2pRON60Jcvw
    # q9/FKAFUeRBGJNE4DyahYZBNur0o5j/xxKqb9to1U0/J8j3TbNwj7aqgTWcJ8zqA
    # PTz7NkyQ53ak3fI6v1Y1L6JMZejg1NrRx8iRai0jTzc7GZQY1NWcEDzVsRwZ/4/I
    # a5ue+K6cmZZ40c2cURVbQiZyWo0KSiOSQOiG3iLCkzrUm2im3yl/Brk8Dr2fxIac
    # gkdCcTKGCZlyCXlLnXFp9UH/fzl3ZPGEjb6LHrJ9aKOlkLEM/zCCBs0wggW1oAMC
    # AQICEAb9+QOWA63qAArrPye7uhswDQYJKoZIhvcNAQEFBQAwZTELMAkGA1UEBhMC
    # VVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0
    # LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTA2
    # MTExMDAwMDAwMFoXDTIxMTExMDAwMDAwMFowYjELMAkGA1UEBhMCVVMxFTATBgNV
    # BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8G
    # A1UEAxMYRGlnaUNlcnQgQXNzdXJlZCBJRCBDQS0xMIIBIjANBgkqhkiG9w0BAQEF
    # AAOCAQ8AMIIBCgKCAQEA6IItmfnKwkKVpYBzQHDSnlZUXKnE0kEGj8kz/E1FkVyB
    # n+0snPgWWd+etSQVwpi5tHdJ3InECtqvy15r7a2wcTHrzzpADEZNk+yLejYIA6sM
    # NP4YSYL+x8cxSIB8HqIPkg5QycaH6zY/2DDD/6b3+6LNb3Mj/qxWBZDwMiEWicZw
    # iPkFl32jx0PdAug7Pe2xQaPtP77blUjE7h6z8rwMK5nQxl0SQoHhg26Ccz8mSxSQ
    # rllmCsSNvtLOBq6thG9IhJtPQLnxTPKvmPv2zkBdXPao8S+v7Iki8msYZbHBc63X
    # 8djPHgp0XEK4aH631XcKJ1Z8D2KkPzIUYJX9BwSiCQIDAQABo4IDejCCA3YwDgYD
    # VR0PAQH/BAQDAgGGMDsGA1UdJQQ0MDIGCCsGAQUFBwMBBggrBgEFBQcDAgYIKwYB
    # BQUHAwMGCCsGAQUFBwMEBggrBgEFBQcDCDCCAdIGA1UdIASCAckwggHFMIIBtAYK
    # YIZIAYb9bAABBDCCAaQwOgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cuZGlnaWNlcnQu
    # Y29tL3NzbC1jcHMtcmVwb3NpdG9yeS5odG0wggFkBggrBgEFBQcCAjCCAVYeggFS
    # AEEAbgB5ACAAdQBzAGUAIABvAGYAIAB0AGgAaQBzACAAQwBlAHIAdABpAGYAaQBj
    # AGEAdABlACAAYwBvAG4AcwB0AGkAdAB1AHQAZQBzACAAYQBjAGMAZQBwAHQAYQBu
    # AGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcAaQBDAGUAcgB0ACAAQwBQAC8AQwBQ
    # AFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwAeQBpAG4AZwAgAFAAYQByAHQAeQAg
    # AEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkAYwBoACAAbABpAG0AaQB0ACAAbABp
    # AGEAYgBpAGwAaQB0AHkAIABhAG4AZAAgAGEAcgBlACAAaQBuAGMAbwByAHAAbwBy
    # AGEAdABlAGQAIABoAGUAcgBlAGkAbgAgAGIAeQAgAHIAZQBmAGUAcgBlAG4AYwBl
    # AC4wCwYJYIZIAYb9bAMVMBIGA1UdEwEB/wQIMAYBAf8CAQAweQYIKwYBBQUHAQEE
    # bTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQwYIKwYB
    # BQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3Vy
    # ZWRJRFJvb3RDQS5jcnQwgYEGA1UdHwR6MHgwOqA4oDaGNGh0dHA6Ly9jcmwzLmRp
    # Z2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwOqA4oDaGNGh0
    # dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5j
    # cmwwHQYDVR0OBBYEFBUAEisTmLKZB+0e36K+Vw0rZwLNMB8GA1UdIwQYMBaAFEXr
    # oq/0ksuCMS1Ri6enIZ3zbcgPMA0GCSqGSIb3DQEBBQUAA4IBAQBGUD7Jtygkpzgd
    # tlspr1LPUukxR6tWXHvVDQtBs+/sdR90OPKyXGGinJXDUOSCuSPRujqGcq04eKx1
    # XRcXNHJHhZRW0eu7NoR3zCSl8wQZVann4+erYs37iy2QwsDStZS9Xk+xBdIOPRqp
    # FFumhjFiqKgz5Js5p8T1zh14dpQlc+Qqq8+cdkvtX8JLFuRLcEwAiR78xXm8TBJX
    # /l/hHrwCXaj++wc4Tw3GXZG5D2dFzdaD7eeSDY2xaYxP+1ngIw/Sqq4AfO6cQg7P
    # kdcntxbuD8O9fAqg7iwIVYUiuOsYGk38KiGtSTGDR5V3cdyxG0tLHBCcdxTBnU8v
    # WpUIKRAmMYIEODCCBDQCAQEwgYMwbzELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERp
    # Z2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEuMCwGA1UEAxMl
    # RGlnaUNlcnQgQXNzdXJlZCBJRCBDb2RlIFNpZ25pbmcgQ0EtMQIQA6JXXk3YX9Ms
    # /PL6hWtaMzAJBgUrDgMCGgUAoHgwGAYKKwYBBAGCNwIBDDEKMAigAoAAoQKAADAZ
    # BgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYB
    # BAGCNwIBFTAjBgkqhkiG9w0BCQQxFgQUUByiEzQCXqmwqOhg2XBImnlQmcQwDQYJ
    # KoZIhvcNAQEBBQAEggEAuIqDC+AL3kR1LbOXcwipwWYR343bPEv4UB//i9myoV/Y
    # ewyXuwvLtjlc/JXKPDYv4nMRz5g4/esZLj0oNH4jF80mvGclxwTXWXrbdvwyuMz2
    # N7y2WBoN6TZN9/UCr7eRlv7AFL02F3R8S9XibO1XSOFtcA4ROq/6truV0am/diLY
    # qC/YWG6JVkQriAfNQlHkiX3Gsd4k4PhWmeaA2UMcdDom+qPqd5/2+SasD1Binwxn
    # SA44i2B5dwvhG/3GC/sSkzkM3BPVBa4wRXsE6J0KJICUbauB8Z6u+iuQMUWFYQnC
    # yGJoN82fU5XF8UblCIFeTRz3KrhhCoESywu+FwI3GKGCAg8wggILBgkqhkiG9w0B
    # CQYxggH8MIIB+AIBATB2MGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
    # dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
    # ZXJ0IEFzc3VyZWQgSUQgQ0EtMQIQAwGaAjr/WLFr1tXq5hfwZjAJBgUrDgMCGgUA
    # oF0wGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMTQx
    # MTEyMDQ0MjA5WjAjBgkqhkiG9w0BCQQxFgQUtsK/suEgStPsD5HRiom0bAEEbiow
    # DQYJKoZIhvcNAQEBBQAEggEAoPoPmOH524OOT6J2YuV8WHrhuSq1OEwN/mP3Vxhh
    # cWkPB8WKXlaBe/t9/JTAr7VJwj6m3znkAVdORjhT6uztDzttSDp9H4irR/hyt/GF
    # 5MzFolIgTLdYRxDwJgSO/M9Z1/xzNbn6QP5dArH9PZ9fLc+ij4G1GyID06reE1QS
    # 3huVpOeondwzwjDirvKsr58F+/0ee14tXXCjLA2H3mJUfe19SU6hFn2og1i4f2yk
    # o7ExzMWA/GRYhhP8K5gg/eG/3VK/RlC5K+3AmedZ3XAWFBZAWm1B5ZuOpUcQkWQQ
    # RF2rNhXd+zkwMEFco/jBUjefqnzEIgaY/WR23R+dhhRXGA==
    # SIG # End signature block
    
  • tools\PoshDevOps\ProtectedData\Security.Cryptography.dll
  • tools\PoshDevOps\Pson\Pson.psm1 Show
    Set-Alias ConvertFrom-Pson Invoke-Expression -Description "Convert variable from PSON"
    
    Function ConvertTo-Pson(
    [Parameter(
        ValueFromPipeline=$true)]
    $InputObject, 
    [Int]
    $Depth = 9, 
    [Int]
    $Layers = 1,
    [Switch]
    $Strict) {
    <#
        .LINK http://stackoverflow.com/questions/15139552/save-hash-table-in-powershell-object-notation-pson
    #>
    
        $Format = $Null
        $Quote = If ($Depth -le 0) {""} Else {""""}
        $Space = If ($Layers -le 0) {""} Else {" "}
    
        If ($InputObject -eq $Null) {"`$Null"} Else {
            
            $Type = "[" + $InputObject.GetType().Name + "]"
    
            $PSON = If ($InputObject -is [Array]) {
                
                $Format = "@(", ",$Space", ")"
                
                If ($Depth -gt 1) {
    
                    For ($i = 0; $i -lt $InputObject.Count; $i++) {
    
                        ConvertTo-PSON $InputObject[$i] ($Depth - 1) ($Layers - 1) -Strict:$Strict
    
                    }
                
                }
    
            } ElseIf ($InputObject -is [Xml]) {
    
                $Type = "[Xml]"
                $String = New-Object System.IO.StringWriter
                $InputObject.Save($String)
                $Xml = "'" + ([String]$String).Replace("`'", "&apos;") + "'"
                If ($Layers -le 0) {
                
                    ($Xml -Replace "\r\n\s*", "") -Replace "\s+", " "
    
                } ElseIf ($Layers -eq 1) {
    
                    $Xml
                
                } Else {
                
                    $Xml.Replace("`r`n", "`r`n`t")
                
                }
    
                $String.Dispose()
    
            } ElseIf ($InputObject -is [DateTime]) {
    
                "$Quote$($InputObject.ToString('s'))$Quote"
            
            } ElseIf ($InputObject -is [String]) {
    
                0..11 | ForEach {$InputObject = $InputObject.Replace([String]"```'""`0`a`b`f`n`r`t`v`$"[$_], ('`' + '`''"0abfnrtv$'[$_]))}; "$Quote$InputObject$Quote"
            
            } ElseIf ($InputObject -is [Boolean]) {
    
                "`$$InputObject"
            
            } ElseIf ($InputObject -is [Char]) {
                
                If ($Strict) {[Int]$InputObject} Else {"$Quote$InputObject$Quote"}
    
            } ElseIf ($InputObject -is [ValueType]) {
    
                $InputObject
    
            } ElseIf ($InputObject -as [Hashtable]){
    
                if($InputObject -is [System.Collections.Specialized.OrderedDictionary]){              
                    $Type = "[Ordered]"  
                }
                
                $Format = "@{", ";$Space", "}"
                
                If ($Depth -gt 1){
    
                    $InputObject.GetEnumerator() | ForEach {"$Quote$($_.Name)$Quote" + "$Space=$Space" + (ConvertTo-PSON $_.Value ($Depth - 1) ($Layers - 1) -Strict:$Strict)}
                
                }
            } ElseIf ($InputObject -is [Object]) {
    
                $Format = "@{", ";$Space", "}"
    
                If ($Depth -gt 1) {
    
                    $InputObject.PSObject.Properties | ForEach {$_.Name + "$Space=$Space" + (ConvertTo-PSON $_.Value ($Depth - 1) ($Layers - 1) -Strict:$Strict)}
                
                }
            
            } Else {
    
                $InputObject
            
            }
    
            If ($Format) {
    
                $PSON = $Format[0] + (&{
    
                    If (($Layers -le 1) -or ($PSON.Count -le 0)) {
    
                        $PSON -Join $Format[1]
                    
                    } Else {
                    
                        ("`r`n" + ($PSON -Join "$($Format[1])`r`n")).Replace("`r`n", "`r`n`t") + "`r`n"
                    
                    }
                
                }) + $Format[2]
            
            }
    
            If ($Strict) {
                "$Type$PSON"
            } Else {
                "$PSON"
            }
        }
    }
    
    Export-ModuleMember -Function ConvertTo-Pson
    Export-ModuleMember -Alias ConvertFrom-Pson
  • tools\PoshDevOps\Uninstall.ps1 Show
    # remove source
    $installRootDirPath = "C:\Program Files\PoshDevOps"
    $installDirPath = "$installRootDirPath\Modules"
    
    # make idempotent
    if(Test-Path "$installRootDirPath"){
        Remove-Item $installRootDirPath -Force -Recurse
    }
    
    # remove $PSModulePath modification
    $psModulePath = [Environment]::GetEnvironmentVariable('PSModulePath','Machine')
    
    $newPSModulePathParts = @();
    $isPSModulePathModified = $false
    foreach($part in $psModulePath.Split(';')){
        if($part -eq $installDirPath){
            $isPSModulePathModified = $true
        }
        else{
            $newPSModulePathParts += $part;        
        }
    }
    
    $psModulePath = $newPSModulePathParts -join ';'
    
    if($isPSModulePathModified){
        Write-Debug "updating '$env:PSModulePath' to $psModulePath"
    
        # save
        [Environment]::SetEnvironmentVariable('PSModulePath',$psModulePath,'Machine')
    }
    

Virus Scan Results

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

Dependencies

This package has no dependencies.

Package Maintainer(s)

Software Author(s)

  • Chris Dostert

Tags

Version History

Version Downloads Last updated Status
PoshDevOps 0.0.71 205 Friday, March 27, 2015 approved
PoshDevOps 0.0.69 219 Friday, March 27, 2015 approved
PoshDevOps 0.0.68 221 Thursday, March 26, 2015 approved
PoshDevOps 0.0.64 230 Thursday, March 26, 2015 approved
PoshDevOps 0.0.63 201 Wednesday, March 25, 2015 approved
PoshDevOps 0.0.62 190 Wednesday, March 25, 2015 approved
PoshDevOps 0.0.42 253 Wednesday, March 25, 2015 approved
PoshDevOps 0.0.41 206 Tuesday, March 24, 2015 approved
Show More

Discussion for the PoshDevOps Package

Ground rules:

  • This discussion is only about PoshDevOps and the PoshDevOps package. If you have feedback for Chocolatey, please contact the google group.
  • This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
  • The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
  • Tell us what you love about the package or PoshDevOps, or tell us what needs improvement.
  • Share your experiences with the package, or extra configuration or gotchas that you've found.
  • If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.

comments powered by Disqus
Chocolatey.org uses cookies to enhance the user experience of the site.
Ok