Framework/Core/ContinuousAssurance/CAAutomation.ps1
Set-StrictMode -Version Latest class CAAutomation : ADOSVTCommandBase { hidden [string] $SubscriptionId hidden [string] $Location hidden [string] $OrganizationToScan hidden [System.Security.SecureString] $PATToken hidden [string] $PATTokenURL hidden [string] $IdentityId hidden [string] $TimeStamp #Use for new CA creation only. hidden [string] $StorageName hidden [bool] $CreateCommonDataStorageAccount = $false; hidden [string] $CommonDataSA = "adoscannercommondatasa" hidden [string] $AppServicePlanName = "ADOScannerFAPlan" hidden [string] $FuncAppDefaultName = "ADOScannerFA" hidden [string] $KVDefaultName = "ADOScannerKV" hidden [string] $FuncAppName hidden [string] $AppInsightsName hidden [string] $KeyVaultName hidden [string] $ImageName hidden [datetime] $ScanTriggerTimeUTC hidden [datetime] $ScanTriggerLocalTime hidden [string] $SecretName = "PATForADOScan" hidden [string] $LASecretName = "LAKeyForADOScan" hidden [string] $AltLASecretName = "AltLAKeyForADOScan" hidden [string] $IdentitySecretName = "IdentityIdForADOScan" hidden [string] $OAuthClientSecretName = "ClientSecretForADOScan" hidden [string] $OAuthRefreshTokenSecretName = "RefreshTokenForADOScan" hidden [string] $StorageKind = "StorageV2" hidden [string] $StorageType = "Standard_LRS" hidden [string] $LAWSName = "ADOScannerLAWS" hidden [bool] $CreateLAWS hidden [string] $ProjectNames hidden [string] $ExtendedCommand hidden [string] $CRONExp hidden [bool] $ClearExtCmd hidden [bool] $RefreshOAuthCred hidden [bool] $updateAppSettings = $false hidden [bool] $updateSecret = $false hidden [string] $CAScanLogsContainerName = [Constants]::CAScanLogsContainerName hidden [string] $WebhookUrl hidden [string] $WebhookAuthZHeaderName hidden [string] $WebhookAuthZHeaderValue hidden [bool] $AllowSelfSignedWebhookCertificate hidden [System.Security.SecureString] $OAuthApplicationId hidden [System.Security.SecureString] $OAuthClientSecret hidden [string] $OAuthAuthorizedScopes hidden [System.Security.SecureString] $OAuthRefreshToken #UCA params for dev-test support hidden [string] $RsrcTimeStamp = $null #We will apply UCA to function app with this timestamp, e.g., "200830092449" hidden [string] $NewImageName = $null #Container image will be changed to this one. hidden [string] $ModuleEnv = "Prod" #Tell CA to use 'Staging' or 'Prod' or 'Preview' module hidden [bool] $UseDevTestImage = $false #Tell CA to use dev-test (Staging) image packaged inside module hidden [int] $TriggerNextScanInMin = 0 #Scan trigger time will be updated to "Now + N" min hidden [string] $LAWSsku = "Standard" hidden [string[]] $CreatedResources = @(); hidden [string[]] $updatedAppSettings = @(); hidden [string] $RGName hidden [string] $LAWSId hidden [string] $LAWSSharedKey hidden [string] $AltLAWSId hidden [string] $AltLAWSSharedKey hidden [bool] $SetupComplete hidden [string] $messages hidden [string] $ScheduleMessage [PSObject] $ControlSettings; CAAutomation( [string] $SubId, ` [string] $Loc, ` [string] $OrgName, ` [System.Security.SecureString] $PATToken, ` [string] $PATTokenURL, ` [string] $ResourceGroupName, ` [string] $LAWorkspaceId, ` [string] $LAWorkspaceKey, ` [string] $Proj, ` [string] $IdentityResourceId, ` [string] $ExtCmd, ` [int] $ScanIntervalInHours, ` [InvocationInfo] $invocationContext, ` [bool] $CreateLAWS, ` [System.Security.SecureString] $OAuthAppId, ` [System.Security.SecureString] $ClientSecret, ` [string] $AuthorizedScopes, [bool] $createCommonDataStorageAccount) : Base($OrgName, $invocationContext) { $this.SubscriptionId = $SubId $this.OrganizationToScan = $OrgName $this.PATToken = $PATToken $this.PATTokenURL = $PATTokenURL $this.IdentityId = $IdentityResourceId $this.ProjectNames = $Proj $this.ExtendedCommand = $ExtCmd $this.TimeStamp = (Get-Date -format "yyMMddHHmmss") $this.StorageName = "adoscannersa"+$this.TimeStamp $this.FuncAppName = $this.FuncAppDefaultName + $this.TimeStamp $this.KeyVaultName = $this.KVDefaultName+$this.TimeStamp $this.AppInsightsName = $this.FuncAppName $this.SetupComplete = $false $this.ScanTriggerTimeUTC = [System.DateTime]::UtcNow.AddMinutes(20) $this.ScanTriggerLocalTime = $(Get-Date).AddMinutes(20) $this.ControlSettings = [ConfigurationManager]::LoadServerConfigFile("ControlSettings.json"); $this.CreateLAWS = $CreateLAWS $this.OAuthClientSecret = $ClientSecret $this.OAuthApplicationId = $OAuthAppId $this.OAuthAuthorizedScopes = $AuthorizedScopes $this.CreateCommonDataStorageAccount = $createCommonDataStorageAccount; if ($null -ne $ScanIntervalInHours -and $ScanIntervalInHours -gt 0) { $this.GetCRONForScanInterval($ScanIntervalInHours); } else { $this.CRONExp = "0 $($this.ScanTriggerTimeUTC.Minute) $($this.ScanTriggerTimeUTC.Hour) * * *"; $this.ScheduleMessage = "Scan will begin at $($this.ScanTriggerLocalTime)" } if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "DockerImage.ImageName")) { $this.ImageName = $this.ControlSettings.DockerImage.ImageName } if ([string]::IsNullOrWhiteSpace($ResourceGroupName)) { $this.RGName = [Constants]::AzSKADORGName } else{ $this.RGName = $ResourceGroupName } if ([string]::IsNullOrWhiteSpace($Loc)) { $this.Location =[Constants]::AzSKADORGLocation } else { $this.Location = $Loc } if ([string]::IsNullOrWhiteSpace($LAWorkspaceId) -or [string]::IsNullOrWhiteSpace($LAWorkspaceKey) ) { if ($this.CreateLAWS -ne $true) { $this.messages = "Log Analytics Workspace details are missing. Use -CreateWorkspace switch to create a new workspace while setting up CA. Setup will continue...`r`n" } else{ $this.LAWSName += $this.TimeStamp } } else { $this.LAWSId = $LAWorkspaceId $this.LAWSSharedKey = $LAWorkspaceKey } $ModuleName = $invocationContext.MyCommand.Module.Name if(-not [string]::IsNullOrWhiteSpace($ModuleName)) { switch($ModuleName.ToLower()) { "azskpreview.ado" { $this.ModuleEnv = "preview"; break; } "azskstaging.ado" { $this.ModuleEnv = "staging" break; } } } } CAAutomation( [string] $SubId, ` [string] $OrgName, ` [System.Security.SecureString] $PATToken, ` [string] $PATTokenURL, ` [string] $ResourceGroupName, ` [string] $LAWorkspaceId, ` [string] $LAWorkspaceKey, ` [string] $AltLAWorkspaceId, ` [string] $AltLAWorkspaceKey, ` [string] $Proj, ` [string] $ExtCmd, ` [string] $WebhookUrl, ` [string] $WebhookHeaderName, ` [string] $WebhookHeaderValue, ` [bool] $AllowSelfSignedWebhookCert, [string] $RsrcTimeStamp, ` [string] $ContainerImageName, ` [string] $ModuleEnv, ` [bool] $UseDevTestImage, ` [int] $TriggerNextScanInMin, ` [int] $ScanIntervalInHours, ` [bool] $ClearExtendedCommand, ` [bool] $RefreshOAuthToken, ` [InvocationInfo] $invocationContext) : Base($OrgName, $invocationContext) { $this.SubscriptionId = $SubId $this.OrganizationToScan = $OrgName $this.PATToken = $PATToken $this.PATTokenURL = $PATTokenURL $this.ProjectNames = $Proj $this.ExtendedCommand = $ExtCmd $this.SetupComplete = $false $this.LAWSId = $LAWorkspaceId $this.LAWSSharedKey = $LAWorkspaceKey $this.AltLAWSId = $AltLAWorkspaceId $this.AltLAWSSharedKey = $AltLAWorkspaceKey $this.ClearExtCmd = $ClearExtendedCommand $this.RefreshOAuthCred = $RefreshOAuthToken $this.WebhookUrl = $WebhookUrl $this.WebhookAuthZHeaderName = $WebhookHeaderName $this.WebhookAuthZHeaderValue = $WebhookHeaderValue $this.AllowSelfSignedWebhookCertificate = $AllowSelfSignedWebhookCert #Some stuff for dev-test support $this.NewImageName = $ContainerImageName $this.RsrcTimeStamp = $RsrcTimeStamp $this.ModuleEnv = $ModuleEnv $this.UseDevTestImage = $UseDevTestImage $this.TriggerNextScanInMin = $TriggerNextScanInMin <# $this.ControlSettings = [ConfigurationManager]::LoadServerConfigFile("ControlSettings.json"); if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "DockerImage.ImageName")) { $this.ImageName = $this.ControlSettings.DockerImage.ImageName } #> if ([string]::IsNullOrWhiteSpace($ResourceGroupName)) { $this.RGName = [Constants]::AzSKADORGName } else{ $this.RGName = $ResourceGroupName } if ($null -ne $ScanIntervalInHours -and $ScanIntervalInHours -gt 0) { $this.ScanTriggerLocalTime = $(Get-Date).AddMinutes(20) $this.ScanTriggerTimeUTC = [System.DateTime]::UtcNow.AddMinutes(20) $this.GetCRONForScanInterval($ScanIntervalInHours); } #Validate if app settings update is required based on input paramaeters. $invocationContext.BoundParameters.GetEnumerator() | foreach-object { # If input param is other than below 4 then app settings update will be required if($_.Key -ne "SubscriptionId" -and $_.Key -ne "ResourceGroupName" -and $_.Key -ne "PATToken" -and $_.Key -ne "OrganizationName" ) { $this.updateAppSettings = $true } if($_.Key -eq "PATToken" -or $_.Key -eq "AltLAWSSharedKey" -or $_.Key -eq "LAWSSharedKey") { $this.updateSecret = $true } } } CAAutomation( [string] $SubId, ` [string] $OrgName, ` [string] $ResourceGroupName, ` [string] $RsrcTimeStamp, ` [InvocationInfo] $invocationContext) : Base($OrgName, $invocationContext) { $this.SubscriptionId = $SubId $this.OrganizationToScan = $OrgName if ([string]::IsNullOrWhiteSpace($ResourceGroupName)) { $this.RGName = [Constants]::AzSKADORGName } else{ $this.RGName = $ResourceGroupName } if ([string]::IsNullOrWhiteSpace($RsrcTimeStamp)) { $this.FuncAppName = $this.FuncAppDefaultName } else{ $this.FuncAppName = $this.FuncAppDefaultName + $RsrcTimeStamp } $this.ControlSettings = [ConfigurationManager]::LoadServerConfigFile("ControlSettings.json"); if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "DockerImage.ImageName")) { $this.ImageName = $this.ControlSettings.DockerImage.ImageName } } [void] RegisterResourceProvider() { if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "ResourceProviders")) { $resourceProvider = $this.ControlSettings.ResourceProviders $resourceProvider | foreach { [ResourceHelper]::RegisterResourceProviderIfNotRegistered($_); } } } [void] GetCRONForScanInterval($ScanIntervalInHours) { $minute = $this.ScanTriggerTimeUTC.Minute $hour = $this.ScanTriggerTimeUTC.Hour $list = New-Object Collections.Generic.List[Int] #between first scan time and 00:00 hrs get "hours" when scan should trigger based on scan interval while ($hour -lt 24) { $list.Add($hour) $hour += $ScanIntervalInHours } #between 00:00 hrs and first scan time get "hours" when scan should trigger based on scan interval $hour = $this.ScanTriggerTimeUTC.Hour while ($hour -ge 0) { $list.Add($hour) $hour -= $ScanIntervalInHours } $list =$list | sort-object -Unique $hoursExpression = $list -join "," $this.CRONExp = "0 $($minute) $($hoursExpression) * * *" $this.ScheduleMessage = "Scan will trigger every $($ScanIntervalInHours) hours starting from $($this.ScanTriggerLocalTime)" } [string] ValidateUserPermissions() { $output =''; try { #Step 1: Get context. Connect to account if required $Context = @(Get-AzContext -ErrorAction SilentlyContinue ) if ($Context.count -eq 0) { $this.PublishCustomMessage("No active Azure login session found. Initiating login flow...", [MessageType]::Info); Connect-AzAccount -ErrorAction Stop $Context = @(Get-AzContext -ErrorAction SilentlyContinue) } #Step 2 : Check if Owner or Contributor role is available at subscription scope. if ($null -eq $Context) { $output = "No Azure login found. Azure login context is required to setup Continuous Assurance." } else { if($Context.Subscription.SubscriptionId -ne $this.SubscriptionId) { $Context = set-azcontext -Subscription $this.SubscriptionId -Force } $RoleAssignment = @() $Scope = "/subscriptions/"+$this.SubscriptionId $RoleAssignmentSub = @(Get-AzRoleAssignment -Scope $Scope -SignInName $Context.Account.Id -IncludeClassicAdministrators -ErrorAction SilentlyContinue) if ($RoleAssignmentSub.Count -gt 0) { $RoleAssignment = @($RoleAssignmentSub | Where-Object {$_.RoleDefinitionName -eq "Owner" -or $_.RoleDefinitionName -eq "CoAdministrator" -or $_.RoleDefinitionName -match "ServiceAdministrator"} ) } # If Sub level permissions are not adequate then check RG level permissions if ($RoleAssignment.Count -gt 0) { $output = 'OK' } else { #Step 3: Check if user has Owner permissions on provided RG name or ADOScannerRG $Scope = $Scope +"/resourceGroups/"+ $this.RGName $RoleAssignmentRG = @(Get-AzRoleAssignment -Scope $Scope -SignInName $Context.Account.Id -ErrorAction SilentlyContinue) $RoleAssignment = @($RoleAssignmentRG | Where-Object {$_.RoleDefinitionName -eq "Owner"} ) if ($RoleAssignment.Count -eq 0) { $this.PublishCustomMessage("Please make sure you have Owner role on target subscription or resource group. If your permissions were elevated recently, please run the 'Disconnect-AzAccount' command to clear the Azure cache and try again.", [MessageType]::Info); } else { $output = 'OK' } } } #Resolve projectNames if * is used in command if ($this.ProjectNames -eq "*") { $apiURL = 'https://dev.azure.com/{0}/_apis/projects?$top=1000&api-version=6.0' -f $($this.OrganizationContext.OrganizationName); $responseObj = ""; try { $responseObj = [WebRequestHelper]::InvokeGetWebRequest($apiURL); if (-not [string]::IsNullOrEmpty($responseObj) -and ($responseObj | Measure-Object).Count -gt 0) { $this.Projectnames = $ResponseObj.Name -join "," } } catch { $this.PublishCustomMessage("Project not found: Incorrect project name or you do not have neccessary permission to access the project.", [MessageType]::Error); throw; } } } catch{ $output += $_; $this.messages += $Error } return $output } #Create common resources applicable for both type of CA setups [void] CreateResources() { try { if([string]::IsNullOrWhiteSpace($this.ImageName)) { $messageData += [MessageData]::new("If you are using customized org policy, please ensure DockerImageName is defined in your ControlSettings.json") $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); } #Step 1: If RG does not exist then create new if((Get-AzResourceGroup -Name $this.RGname -ErrorAction SilentlyContinue | Measure-Object).Count -eq 0) { $RG = @(New-AzResourceGroup -Name $this.RGname -Location $this.Location) if($RG.Count -eq 0) { $this.PublishCustomMessage("New resource group '$($this.RGname)' creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("New resource group '$($this.RGname)' created", [MessageType]::Update); } } else { $this.PublishCustomMessage("Resource group [$($this.RGname)] already exists. Skipping RG creation.", [MessageType]::Update); } $this.PublishCustomMessage("Creating required resources in resource group [$($this.RGname)]....", [MessageType]::Info); #Step 2: Create app service plan "Elastic Premium" if ((($AppServPlan =Get-AzResource -ResourceGroupName $this.RGName -ResourceType 'Microsoft.web/serverfarms' -Name $this.AppServicePlanName) | Measure-Object).Count -eq 0) { $AppServPlan = New-AzResource -ResourceName $this.AppServicePlanName -ResourceGroupName $this.RGname -ResourceType Microsoft.web/serverfarms -ApiVersion "2018-02-01" -Location $this.Location -Kind Elastic -Properties @{"reserved"=$true;} -Sku @{name= "EP1";tier = "ElasticPremium";size= "EP1";family="EP";capacity= 1} -Force if($null -eq $AppServPlan) { $this.PublishCustomMessage("AppService plan [$($this.AppServicePlanName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("AppService plan [$($this.AppServicePlanName)] created", [MessageType]::Update); $this.CreatedResources += $AppServPlan.ResourceId } } else { $this.PublishCustomMessage("AppService Plan: [$($this.AppServicePlanName)] already exists. Skipping creation.", [MessageType]::Update); } #Step 3: Create storage account $StorageAcc = New-AzStorageAccount -ResourceGroupName $this.RGname -Name $this.StorageName -Type $this.StorageType -Location $this.Location -Kind $this.StorageKind -EnableHttpsTrafficOnly $true -ErrorAction Stop if($null -eq $StorageAcc) { $this.PublishCustomMessage("Storage account [$($this.StorageName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Storage [$($this.StorageName)] created", [MessageType]::Update); $this.CreatedResources += $StorageAcc.Id } #Step 3: Create a common storage storage account for bug logging if ($this.CreateCommonDataStorageAccount) { if ((($commondata = Get-AzResource -ResourceGroupName $this.RGName -ResourceType 'Microsoft.Storage/storageAccounts' -Name $this.CommonDataSA) | measure-object).count -eq 0) { $StorageAccountToCommonData = New-AzStorageAccount -ResourceGroupName $this.RGname -Name $this.CommonDataSA -Type $this.StorageType -Location $this.Location -Kind $this.StorageKind -EnableHttpsTrafficOnly $true -ErrorAction Stop if($null -eq $StorageAccountToCommonData) { $this.PublishCustomMessage("Storage account for common data [$($this.CommonDataSA)] creation failed.", [MessageType]::Error); } else { $this.PublishCustomMessage("Storage [$($this.CommonDataSA)] created for common data store.", [MessageType]::Update); $this.CreatedResources += $StorageAccountToCommonData.Id } } else { $this.PublishCustomMessage("Common data storage account: [$($this.CommonDataSA)] already exists. Skipping creation.", [MessageType]::Update); } } #Step 4: Create LAW if applicable if ($this.CreateLAWS -eq $true) { $LAWorkspace = @(New-AzOperationalInsightsWorkspace -Location $this.Location -Name $this.LAWSName -Sku $this.LAWSsku -ResourceGroupName $this.RGname) if($LAWorkspace -eq 0) { $this.PublishCustomMessage("Log Analytics Workspace [$($this.LAWSName)] creation failed", [MessageType]::Error); } else { $this.LAWSId = $LAWorkspace.CustomerId.Guid.ToString() $SharedKeys = Get-AzOperationalInsightsWorkspaceSharedKey -Name $this.LAWSName -ResourceGroupName $this.RGname -WarningAction silentlycontinue $this.LAWSSharedKey = $SharedKeys.PrimarySharedKey $this.PublishCustomMessage("Log Analytics Workspace [$($this.LAWSName)] created", [MessageType]::Update); $this.CreatedResources += $LAWorkspace.ResourceId } } #Step 5: Create keyvault $KeyVault = New-AzKeyVault -Name $this.KeyVaultName -ResourceGroupName $this.RGname -Location $this.Location if($null -eq $KeyVault) { $this.PublishCustomMessage("Azure key vault [$($this.KeyVaultName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Azure key vault [$($this.KeyVaultName)] created", [MessageType]::Update); $this.CreatedResources += $KeyVault.resourceid } } catch { $this.PublishCustomMessage("Error occured while creating resources", [MessageType]::Error); throw; } } [boolean] GetOAuthAccessToken() { try { #generate authorize url $scope = $this.OAuthAuthorizedScopes.Trim() $scope = $this.OAuthAuthorizedScopes.Replace(" ", "%20") $appid = [Helpers]::ConvertToPlainText($this.OAuthApplicationId) $callbackUrl = "https://localhost" $url = "https://app.vssps.visualstudio.com/oauth2/authorize?client_id=$($appid)&response_type=Assertion&scope=$($scope)&redirect_uri=$($callbackUrl)" #Get Default browser $DefaultSettingPath = 'HKCU:\SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice' $DefaultBrowserName = (Get-Item $DefaultSettingPath | Get-ItemProperty).ProgId #Handle for Edge ##edge will not open with the specified shell open command in the HKCR. if($DefaultBrowserName -eq 'AppXq0fevzme2pys62n3e0fbqa7peapykr8v') { #Open url in edge Start-Process Microsoft-edge:$URL } else { try { #Create PSDrive to HKEY_CLASSES_ROOT $null = New-PSDrive -PSProvider registry -Root 'HKEY_CLASSES_ROOT' -Name 'HKCR' #Get the default browser executable command/path $DefaultBrowserOpenCommand = (Get-Item "HKCR:\$DefaultBrowserName\shell\open\command" | Get-ItemProperty).'(default)' $DefaultBrowserPath = [regex]::Match($DefaultBrowserOpenCommand,'\".+?\"') #Open URL in browser Start-Process -FilePath $DefaultBrowserPath -ArgumentList $URL } catch { # test exception flow here $this.messages += $Error return $false } finally { #Clean up PSDrive for 'HKEY_CLASSES_ROOT Remove-PSDrive -Name 'HKCR' } } $localHostURL = Read-Host "Provide localhost url" $code = $localHostURL.Replace("https://localhost/?code=","") #get refresh token $url = "https://app.vssps.visualstudio.com/oauth2/token" $clientSecret = [Helpers]::ConvertToPlainText($this.OAuthClientSecret) $body = "client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer&client_assertion=$($clientSecret)&grant_type=urn:ietf:params:oauth:grant-type:jwt-bearer&assertion=$($code)&redirect_uri=$($callbackUrl)" try { $response = Invoke-WebRequest -Uri $url -ContentType "application/x-www-form-urlencoded" -Method POST -Body $body $response = $response.Content | ConvertFrom-Json $this.OAuthRefreshToken = ConvertTo-SecureString $response.refresh_token -AsPlainText -Force } catch { $this.messages += $Error return $false } } catch{ $this.messages += $Error return $false } return $true } # ICA to setup using PATToken, by storing it in created KV and access it using system assigned identity of function app [MessageData[]] InstallAzSKADOContinuousAssurance() { [MessageData[]] $messageData = @(); $this.messages += ([Constants]::DoubleDashLine + "`r`nStarted setting up Continuous Assurance (CA)`r`n"+[Constants]::DoubleDashLine); $this.PublishCustomMessage($this.messages, [MessageType]::Info); try { $output = $this.ValidateUserPermissions(); if($output -ne 'OK') # if there is some while validating permissions output will contain exception { $this.PublishCustomMessage("Error validating permissions on the subscription", [MessageType]::Error); $messageData += [MessageData]::new($output) } else { $this.RegisterResourceProvider(); $this.CreateResources(); #Step 1,2,3,4,5 #Step 6: Create Function app $FuncApp = New-AzFunctionApp -DockerImageName $this.ImageName -SubscriptionId $this.SubscriptionId -Name $this.FuncAppName -ResourceGroupName $this.RGname -StorageAccountName $this.StorageName -IdentityType SystemAssigned -PlanName $this.AppServicePlanName if($null -eq $FuncApp) { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] created", [MessageType]::Update); $this.CreatedResources += $FuncApp.Id } #Step 7: Validate if AI got created $AppInsight = Get-AzResource -Name $this.AppInsightsName -ResourceType Microsoft.Insights/components if($null -eq $AppInsight) { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] created", [MessageType]::Update); $this.CreatedResources += $AppInsight.ResourceId } #Step 8a: Add PAT token secret to key vault $CreatedSecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.SecretName -SecretValue $this.PATToken if($null -eq $CreatedSecret) { $this.PublishCustomMessage("PAT Secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("PAT Secret created in Azure key vault", [MessageType]::Update); } #Step 8b: Add LA Shared Key secret to key vault $CreatedLASecret = $null if (-not [string]::IsNullOrEmpty($this.LAWSSharedKey)) { $secureStringKey = ConvertTo-SecureString $this.LAWSSharedKey -AsPlainText -Force $CreatedLASecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.LASecretName -SecretValue $secureStringKey if($null -eq $CreatedLASecret) { $this.PublishCustomMessage("LA shared key secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("LA shared key secret created in Azure key vault", [MessageType]::Update); } } #Step 9: Get Identity details of function app to provide access on keyvault and storage $FuncApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname $FuncAppIdentity= $FuncApp.Identity.PrincipalId $MSIAccessToKV = Set-AzKeyVaultAccessPolicy -VaultName $this.KeyVaultName -ResourceGroupName $this.RGname -PermissionsToSecrets get,list -PassThru -ObjectId $FuncAppIdentity $IsMSIAccess = $false # Adding this block as "Set-AzKeyVaultAccessPolicy" is not creating access policy at random instances if ([string]::IsNullOrEmpty($MSIAccessToKV) -or -not [Helpers]::CheckMember($MSIAccessToKV, "AccessPolicies")) { start-sleep -Seconds 10 $MSIAccessToKV = Set-AzKeyVaultAccessPolicy -VaultName $this.KeyVaultName -ResourceGroupName $this.RGname -PermissionsToSecrets get,list -PassThru -ObjectId $FuncAppIdentity } $IsMSIAccess = $MSIAccessToKV.AccessPolicies | ForEach-Object { if ($_.ObjectId -match $FuncAppIdentity ) {return $true }} if($IsMSIAccess -eq $true) { $this.PublishCustomMessage("MSI access to Azure key vault provided", [MessageType]::Update); } else { $this.PublishCustomMessage("MSI access to Azure key vault failed", [MessageType]::Error); } $MSIAccessToSA = New-AzRoleAssignment -ObjectId $FuncAppIdentity -RoleDefinitionName "Contributor" -ResourceName $this.StorageName -ResourceGroupName $this.RGname -ResourceType Microsoft.Storage/storageAccounts if($null -eq $MSIAccessToSA) { $this.PublishCustomMessage("MSI access to storage failed", [MessageType]::Error); } else { $this.PublishCustomMessage("MSI access to storage provided", [MessageType]::Update); } #Step 10: Configure required env variables in function app for scan $uri = $CreatedSecret.Id $uri = $uri.Substring(0,$uri.LastIndexOf('/')) $sharedKeyUri = "" if (-not [string]::IsNullOrEmpty($CreatedLASecret)) { $sharedKeyUri = $CreatedLASecret.Id $sharedKeyUri = $sharedKeyUri.Substring(0,$sharedKeyUri.LastIndexOf('/')) $sharedKeyUri = "@Microsoft.KeyVault(SecretUri=$sharedKeyUri)" } #Turn on "Always ON" for function app and also fetch existing app settings and append the required ones. This has to be done as appsettings get overwritten $WebApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname #-AlwaysOn $true $ExistingAppSettings = $WebApp.SiteConfig.AppSettings #convert existing app settings from list to hashtable $AppSettingsHT = @{} foreach ($Setting in $ExistingAppSettings) { $AppSettingsHT["$($Setting.Name)"] = "$($Setting.value)" } $NewAppSettings = @{ "ScheduleTriggerTime" = $this.CRONExp; "SubscriptionId" = $this.SubscriptionId; "LAWSId" = $this.LAWSId; "LAWSSharedKey" = $sharedKeyUri; "OrgName" = $this.OrganizationToScan; "PATToken" = "@Microsoft.KeyVault(SecretUri=$uri)"; "StorageRG" = $this.RGname; "ProjectNames" = $this.ProjectNames; "ExtendedCommand" = $this.ExtendedCommand; "StorageName" = $this.StorageName; "AzSKADOModuleEnv" = $this.ModuleEnv; "AzSKADOVersion" = ""; } if ($this.CreateCommonDataStorageAccount) { $NewAppSettings["CommonDataSA"] = $this.CommonDataSA; } $AppSettings = $NewAppSettings + $AppSettingsHT $updatedWebApp = Update-AzFunctionAppSetting -Name $this.FuncAppName -ResourceGroupName $this.RGname -AppSetting $AppSettings -Force if($updatedWebApp.Count -ne $AppSettings.Count) { $this.PublishCustomMessage("App settings update failed", [MessageType]::Error); } else { $this.PublishCustomMessage("App settings updated", [MessageType]::Update); } $this.PublishCustomMessage("`r`nSetup Complete!", [MessageType]::Update); Restart-AzFunctionApp -name $this.FuncAppName -ResourceGroupName $this.RGname -SubscriptionId $this.SubscriptionId -Force $this.PublishCustomMessage($this.ScheduleMessage, [MessageType]::Update); $this.SetupComplete = $true $this.DoNotOpenOutputFolder = $true $messageData += [MessageData]::new("The following resources were created in resource group [$($this.RGName)] as part of AzSK.ADO Continuous Assurance", ($this.CreatedResources| Out-String)) } } catch { $this.PublishCustomMessage("ADO Scanner CA setup failed!", [MessageType]::Error); $this.PublishCustomMessage($_, [MessageType]::Error); $messageData += [MessageData]::new($Error) } finally { if ($this.SetupComplete -eq $false) { $this.PublishCustomMessage("CA Setup could not be completed. Deleting created resources...", [MessageType]::Warning); if ($this.CreatedResources.Count -ne 0) { Foreach ($resourceId in $this.CreatedResources) { Remove-AzResource -ResourceId $resourceId -Force $Index = $resourceId.LastIndexOf('/') + 1 ; $ResourceName = $resourceId.Substring($Index) $this.PublishCustomMessage("Deleted resource: [$($ResourceName)]", [MessageType]::Info); } } else{ $this.PublishCustomMessage("No resource was created.", [MessageType]::Info); } } } return $messageData } #ICA to setup using PATTokenURL and access it using user assigned identity.Here KV holding PAT is not directly accessible, it will be retrieved at runtime by the identity. [MessageData[]] InstallAzSKADOCentralContinuousAssurance() { [MessageData[]] $messageData = @(); $this.messages += ([Constants]::DoubleDashLine + "`r`nStarted setting up Continuous Assurance (CA)`r`n"+[Constants]::DoubleDashLine); $this.PublishCustomMessage($this.messages, [MessageType]::Info); try { $output = $this.ValidateUserPermissions(); if($output -ne 'OK') # if there is some while validating permissions output will contain exception { $this.PublishCustomMessage("Error validating permissions on the subscription", [MessageType]::Error); $messageData += [MessageData]::new($output) } else { $this.RegisterResourceProvider(); $this.CreateResources(); #Step 1,2,3,4,5 #Step 6a: Create Function app $FuncApp = New-AzFunctionApp -DockerImageName $this.ImageName -SubscriptionId $this.SubscriptionId -Name $this.FuncAppName -ResourceGroupName $this.RGname -StorageAccountName $this.StorageName -IdentityType UserAssigned -IdentityID $this.IdentityId -PlanName $this.AppServicePlanName if($null -eq $FuncApp) { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] creation failed. Please validate permissions on Identity and try again (Minimum required permission is 'Managed identity operator').", [MessageType]::Error); } else { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] created", [MessageType]::Update); $this.CreatedResources += $FuncApp.Id #Step 6b: Enable system assigned identity. As powershell commands do not support enabling both identities together, therefore we are using api call here $url = "https://management.azure.com/subscriptions/{0}/resourceGroups/{1}/providers/Microsoft.Web/sites/{2}?api-version=2018-11-01" -f $this.SubscriptionId, $this.RGname, $this.FuncAppName $accessToken = [ContextHelper]::GetAccessToken("https://management.azure.com", "") $header = @{ "Authorization" = "Bearer " + $accessToken } $bodyObject = [PSCustomObject]@{ 'location' = $this.Location 'identity' = [PSCustomObject]@{ 'type' = 'systemassigned,userassigned' } } $bodyJson = @($bodyObject) | ConvertTo-Json try { Invoke-WebRequest -Uri $url -Method Patch -ContentType "application/json" -Headers $header -Body $bodyJson -UseBasicParsing } catch { $this.PublishCustomMessage("System assigned managed identity creation failed for function app [$($this.FuncAppName)].", [MessageType]::Error); throw; } } #Step 7: Validate if AI got created $AppInsight = Get-AzResource -Name $this.AppInsightsName -ResourceType Microsoft.Insights/components if($null -eq $AppInsight) { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] created", [MessageType]::Update); $this.CreatedResources += $AppInsight.ResourceId } #Step 8: Get Identity details of function app to provide access on keyvault and storage $FuncApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname $FuncAppIdentity= $FuncApp.Identity.PrincipalId $UserAssignedIdentityClientId = $FuncApp.Identity.UserAssignedIdentities.Values.Clientid $MSIAccessToKV = Set-AzKeyVaultAccessPolicy -VaultName $this.KeyVaultName -ResourceGroupName $this.RGname -PermissionsToSecrets get,list -PassThru -ObjectId $FuncAppIdentity $IsMSIAccess = $false # Adding this block as "Set-AzKeyVaultAccessPolicy" is not creating access policy at random instances if ([string]::IsNullOrEmpty($MSIAccessToKV) -or -not [Helpers]::CheckMember($MSIAccessToKV, "AccessPolicies")) { start-sleep -Seconds 10 $MSIAccessToKV = Set-AzKeyVaultAccessPolicy -VaultName $this.KeyVaultName -ResourceGroupName $this.RGname -PermissionsToSecrets get,list -PassThru -ObjectId $FuncAppIdentity } $IsMSIAccess = $MSIAccessToKV.AccessPolicies | ForEach-Object { if ($_.ObjectId -match $FuncAppIdentity ) {return $true }} if($IsMSIAccess -eq $true) { $this.PublishCustomMessage("MSI access to Azure key vault provided", [MessageType]::Update); } else { $this.PublishCustomMessage("MSI access to Azure key vault failed", [MessageType]::Error); } $MSIAccessToSA = New-AzRoleAssignment -ObjectId $FuncAppIdentity -RoleDefinitionName "Contributor" -ResourceName $this.StorageName -ResourceGroupName $this.RGname -ResourceType Microsoft.Storage/storageAccounts if($null -eq $MSIAccessToSA) { $this.PublishCustomMessage("MSI access to storage failed", [MessageType]::Error); } else { $this.PublishCustomMessage("MSI access to storage provided", [MessageType]::Update); } if ($this.CreateCommonDataStorageAccount) { $MSIAccessToCommonDataSA = New-AzRoleAssignment -ObjectId $FuncAppIdentity -RoleDefinitionName "Contributor" -ResourceName $this.CommonDataSA -ResourceGroupName $this.RGname -ResourceType Microsoft.Storage/storageAccounts if($null -eq $MSIAccessToCommonDataSA) { $this.PublishCustomMessage("MSI access to common data storage failed", [MessageType]::Error); } else { $this.PublishCustomMessage("MSI access to common data storage provided", [MessageType]::Update); } } #Step 9a: Add identity Client id to key vault secret $clientId = ConvertTo-SecureString $UserAssignedIdentityClientId -AsPlainText -Force $CreatedSecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.IdentitySecretName -SecretValue $clientId if($null -eq $CreatedSecret) { $this.PublishCustomMessage("Identity secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Identity secret created in Azure key vault", [MessageType]::Update); } #Step 9b: Add LA Shared Key to key vault secret $CreatedLASecret = $null if (-not [string]::IsNullOrEmpty($this.LAWSSharedKey)) { $secureStringKey = ConvertTo-SecureString $this.LAWSSharedKey -AsPlainText -Force $CreatedLASecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.LASecretName -SecretValue $secureStringKey if($null -eq $CreatedLASecret) { $this.PublishCustomMessage("LA shared key secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("LA shared key secret created in Azure key vault", [MessageType]::Update); } } #Step 10: Configure required env variables in function app for scan $identitySecretUri = $CreatedSecret.Id $identitySecretUri = $identitySecretUri.Substring(0,$identitySecretUri.LastIndexOf('/')) $identitySecretUri = "@Microsoft.KeyVault(SecretUri=$identitySecretUri)" $sharedKeyUri = "" if (-not [string]::IsNullOrEmpty($CreatedLASecret)) { $sharedKeyUri = $CreatedLASecret.Id $sharedKeyUri = $sharedKeyUri.Substring(0,$sharedKeyUri.LastIndexOf('/')) $sharedKeyUri = "@Microsoft.KeyVault(SecretUri=$sharedKeyUri)" } #Turn on "Always ON" for function app and also fetch existing app settings and append the required ones. This has to be done as appsettings get overwritten $WebApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname #-AlwaysOn $true $ExistingAppSettings = $WebApp.SiteConfig.AppSettings #convert existing app settings from list to hashtable $AppSettingsHT = @{} foreach ($Setting in $ExistingAppSettings) { $AppSettingsHT["$($Setting.Name)"] = "$($Setting.value)" } $NewAppSettings = @{ "ScheduleTriggerTime" = $this.CRONExp; "SubscriptionId" = $this.SubscriptionId; "LAWSId" = $this.LAWSId; "LAWSSharedKey" = $sharedKeyUri; "OrgName" = $this.OrganizationToScan; "PATTokenUrl" = $this.PATTokenURL; "StorageRG" = $this.RGname; "ProjectNames" = $this.ProjectNames; "ExtendedCommand" = $this.ExtendedCommand; "StorageName" = $this.StorageName; "AzSKADOModuleEnv" = $this.ModuleEnv; "AzSKADOVersion" = ""; "ClientId" = $identitySecretUri; } if ($this.CreateCommonDataStorageAccount) { $NewAppSettings["CommonDataSA"] = $this.CommonDataSA; } $AppSettings = $NewAppSettings + $AppSettingsHT $updatedWebApp = Update-AzFunctionAppSetting -Name $this.FuncAppName -ResourceGroupName $this.RGname -AppSetting $AppSettings -Force if($updatedWebApp.Count -ne $AppSettings.Count) { $this.PublishCustomMessage("App settings update failed", [MessageType]::Error); } else { $this.PublishCustomMessage("App settings updated", [MessageType]::Update); } $this.PublishCustomMessage("`r`nSetup Complete!", [MessageType]::Update); Restart-AzFunctionApp -name $this.FuncAppName -ResourceGroupName $this.RGname -SubscriptionId $this.SubscriptionId -Force $this.PublishCustomMessage($this.ScheduleMessage, [MessageType]::Update); $this.SetupComplete = $true $this.DoNotOpenOutputFolder = $true $messageData += [MessageData]::new("The following resources were created in resource group [$($this.RGName)] as part of AzSK.ADO Continuous Assurance", ($this.CreatedResources| Out-String)) } } catch { $this.PublishCustomMessage("ADO Scanner CA setup failed!", [MessageType]::Error); $this.PublishCustomMessage($_, [MessageType]::Error); $messageData += [MessageData]::new($Error) } finally { if ($this.SetupComplete -eq $false) { $this.PublishCustomMessage("CA Setup could not be completed. Deleting created resources...", [MessageType]::Warning); if ($this.CreatedResources.Count -ne 0) { Foreach ($resourceId in $this.CreatedResources) { Remove-AzResource -ResourceId $resourceId -Force $Index = $resourceId.LastIndexOf('/') + 1 ; $ResourceName = $resourceId.Substring($Index) $this.PublishCustomMessage("Deleted resource: [$($ResourceName)]", [MessageType]::Info); } } else{ $this.PublishCustomMessage("No resource was created.", [MessageType]::Info); } } else { $this.PublishCustomMessage([Constants]::SingleDashLine); $this.PublishCustomMessage([Constants]::CentralCAMsg); } } return $messageData } #ICA to setup scans using OAuth application. [MessageData[]] InstallAzSKADOOAuthBasedContinuousAssurance() { [MessageData[]] $messageData = @(); $this.messages += ([Constants]::DoubleDashLine + "`r`nStarted setting up Continuous Assurance (CA)`r`n"+[Constants]::DoubleDashLine); $this.PublishCustomMessage($this.messages, [MessageType]::Info); try { # Authorize OAuth-compliant application permissions to access resources and generate refresh token $isTokenFetched = $this.GetOAuthAccessToken(); if ($isTokenFetched -eq $true) { $output = $this.ValidateUserPermissions(); if($output -ne 'OK') # if there is some while validating permissions output will contain exception { $this.PublishCustomMessage("Error validating permissions on the subscription", [MessageType]::Error); $messageData += [MessageData]::new($output) } else { $this.RegisterResourceProvider(); $this.CreateResources(); #Step 1,2,3,4,5 #Step 6a: Create Function app $FuncApp = New-AzFunctionApp -DockerImageName $this.ImageName -SubscriptionId $this.SubscriptionId -Name $this.FuncAppName -ResourceGroupName $this.RGname -StorageAccountName $this.StorageName -IdentityType SystemAssigned -PlanName $this.AppServicePlanName if($null -eq $FuncApp) { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] created", [MessageType]::Update); $this.CreatedResources += $FuncApp.Id } #Step 7: Validate if AI got created $AppInsight = Get-AzResource -Name $this.AppInsightsName -ResourceType Microsoft.Insights/components if($null -eq $AppInsight) { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] created", [MessageType]::Update); $this.CreatedResources += $AppInsight.ResourceId } #Step 8a: Add OAuth Client secret and refresh token to key vault secret $CreatedSecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.OAuthClientSecretName -SecretValue $this.OAuthClientSecret if($null -eq $CreatedSecret) { $this.PublishCustomMessage("OAuth Client secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("OAuth Client secret created in Azure key vault", [MessageType]::Update); } # Adding expiry date to refresh token secret. $RefreshTokenExpiresInDays = [Constants]::RefreshTokenExpiresInDays; $ExpiryDate = [DateTime]::Now.AddDays($RefreshTokenExpiresInDays) $CreatedtokenSecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.OAuthRefreshTokenSecretName -SecretValue $this.OAuthRefreshToken -Expires $ExpiryDate if($null -eq $CreatedtokenSecret) { $this.PublishCustomMessage("OAuth refresh token secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("OAuth refresh token secret created in Azure key vault", [MessageType]::Update); } #Step 8b: Add LA Shared Key to key vault secret $CreatedLASecret = $null if (-not [string]::IsNullOrEmpty($this.LAWSSharedKey)) { $secureStringKey = ConvertTo-SecureString $this.LAWSSharedKey -AsPlainText -Force $CreatedLASecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.LASecretName -SecretValue $secureStringKey if($null -eq $CreatedLASecret) { $this.PublishCustomMessage("LA shared key secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("LA shared key secret created in Azure key vault", [MessageType]::Update); } } #Step 9: Get Identity details of function app to provide access on keyvault and storage #Providing set permission on keyvault to update refresh token $FuncApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname $FuncAppIdentity= $FuncApp.Identity.PrincipalId $MSIAccessToKV = Set-AzKeyVaultAccessPolicy -VaultName $this.KeyVaultName -ResourceGroupName $this.RGname -PermissionsToSecrets get,list,set -PassThru -ObjectId $FuncAppIdentity $IsMSIAccess = $false # Adding this block as "Set-AzKeyVaultAccessPolicy" is not creating access policy at random instances if ([string]::IsNullOrEmpty($MSIAccessToKV) -or -not [Helpers]::CheckMember($MSIAccessToKV, "AccessPolicies")) { start-sleep -Seconds 10 $MSIAccessToKV = Set-AzKeyVaultAccessPolicy -VaultName $this.KeyVaultName -ResourceGroupName $this.RGname -PermissionsToSecrets get,list -PassThru -ObjectId $FuncAppIdentity } $IsMSIAccess = $MSIAccessToKV.AccessPolicies | ForEach-Object { if ($_.ObjectId -match $FuncAppIdentity ) {return $true }} if($IsMSIAccess -eq $true) { $this.PublishCustomMessage("MSI access to Azure key vault provided", [MessageType]::Update); } else { $this.PublishCustomMessage("MSI access to Azure key vault failed", [MessageType]::Error); } $MSIAccessToSA = New-AzRoleAssignment -ObjectId $FuncAppIdentity -RoleDefinitionName "Contributor" -ResourceName $this.StorageName -ResourceGroupName $this.RGname -ResourceType Microsoft.Storage/storageAccounts if($null -eq $MSIAccessToSA) { $this.PublishCustomMessage("MSI access to storage failed", [MessageType]::Error); } else { $this.PublishCustomMessage("MSI access to storage provided", [MessageType]::Update); } if ($this.CreateCommonDataStorageAccount) { $MSIAccessToCommonDataSA = New-AzRoleAssignment -ObjectId $FuncAppIdentity -RoleDefinitionName "Contributor" -ResourceName $this.CommonDataSA -ResourceGroupName $this.RGname -ResourceType Microsoft.Storage/storageAccounts if($null -eq $MSIAccessToCommonDataSA) { $this.PublishCustomMessage("MSI access to common data storage failed", [MessageType]::Error); } else { $this.PublishCustomMessage("MSI access to common data storage provided", [MessageType]::Update); } } #Step 10: Configure required env variables in function app for scan $identitySecretUri = $CreatedSecret.Id $identitySecretUri = $identitySecretUri.Substring(0,$identitySecretUri.LastIndexOf('/')) $identitySecretUri = "@Microsoft.KeyVault(SecretUri=$identitySecretUri)" $tokenSecretUri = $CreatedtokenSecret.Id $tokenSecretUri = $tokenSecretUri.Substring(0,$tokenSecretUri.LastIndexOf('/')) $tokenSecretUri = "@Microsoft.KeyVault(SecretUri=$tokenSecretUri)" $sharedKeyUri = "" if (-not [string]::IsNullOrEmpty($CreatedLASecret)) { $sharedKeyUri = $CreatedLASecret.Id $sharedKeyUri = $sharedKeyUri.Substring(0,$sharedKeyUri.LastIndexOf('/')) $sharedKeyUri = "@Microsoft.KeyVault(SecretUri=$sharedKeyUri)" } #Turn on "Always ON" for function app and also fetch existing app settings and append the required ones. This has to be done as appsettings get overwritten $WebApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname #-AlwaysOn $true $ExistingAppSettings = $WebApp.SiteConfig.AppSettings #convert existing app settings from list to hashtable $AppSettingsHT = @{} foreach ($Setting in $ExistingAppSettings) { $AppSettingsHT["$($Setting.Name)"] = "$($Setting.value)" } $NewAppSettings = @{ "ScheduleTriggerTime" = $this.CRONExp; "SubscriptionId" = $this.SubscriptionId; "LAWSId" = $this.LAWSId; "LAWSSharedKey" = $sharedKeyUri; "OrgName" = $this.OrganizationToScan; "StorageRG" = $this.RGname; "ProjectNames" = $this.ProjectNames; "ExtendedCommand" = $this.ExtendedCommand; "StorageName" = $this.StorageName; "KeyVaultName" = $this.KeyVaultName; "AzSKADOModuleEnv" = $this.ModuleEnv; "AzSKADOVersion" = ""; "ClientSecret" = $identitySecretUri; "RefreshToken" = $tokenSecretUri; } if ($this.CreateCommonDataStorageAccount) { $NewAppSettings["CommonDataSA"] = $this.CommonDataSA; } $AppSettings = $NewAppSettings + $AppSettingsHT $updatedWebApp = Update-AzFunctionAppSetting -Name $this.FuncAppName -ResourceGroupName $this.RGname -AppSetting $AppSettings -Force if($updatedWebApp.Count -ne $AppSettings.Count) { $this.PublishCustomMessage("App settings update failed", [MessageType]::Error); } else { $this.PublishCustomMessage("App settings updated", [MessageType]::Update); } $this.PublishCustomMessage("`r`nSetup Complete!", [MessageType]::Update); Restart-AzFunctionApp -name $this.FuncAppName -ResourceGroupName $this.RGname -SubscriptionId $this.SubscriptionId -Force $this.PublishCustomMessage($this.ScheduleMessage, [MessageType]::Update); $this.SetupComplete = $true $this.DoNotOpenOutputFolder = $true $messageData += [MessageData]::new("The following resources were created in resource group [$($this.RGName)] as part of AzSK.ADO Continuous Assurance", ($this.CreatedResources| Out-String)) } } else { $this.PublishCustomMessage("CA Setup could not be completed. Unable to validate OAuth application.", [MessageType]::Warning); } } catch { $this.PublishCustomMessage("ADO Scanner CA setup failed!", [MessageType]::Error); $this.PublishCustomMessage($_, [MessageType]::Error); $messageData += [MessageData]::new($Error) } finally { if ($this.SetupComplete -eq $false) { $this.PublishCustomMessage("CA Setup could not be completed. Deleting created resources...", [MessageType]::Warning); if ($this.CreatedResources.Count -ne 0) { Foreach ($resourceId in $this.CreatedResources) { Remove-AzResource -ResourceId $resourceId -Force $Index = $resourceId.LastIndexOf('/') + 1 ; $ResourceName = $resourceId.Substring($Index) $this.PublishCustomMessage("Deleted resource: [$($ResourceName)]", [MessageType]::Info); } } else{ $this.PublishCustomMessage("No resource was created.", [MessageType]::Info); } } else { $this.PublishCustomMessage([Constants]::SingleDashLine); } } return $messageData } [MessageData[]] UpdateAzSKADOContinuousAssurance() { [MessageData[]] $messageData = @(); $CreatedSecret = $null $CreatedLASecret = $null $CreatedAltLASecret = $null $RefreshTokenSecret = $null $ClientSecret = $null $ExistingAppSettings = @() $appServResource = @() $setupType = [string]::Empty $this.messages += ([Constants]::DoubleDashLine + "`r`nStarted updating Continuous Assurance (CA)`r`n"+[Constants]::DoubleDashLine); $this.PublishCustomMessage($this.messages, [MessageType]::Info); try { #Step 1: Validate permissions of user on subscription $output = $this.ValidateUserPermissions(); if($output -ne 'OK') # if there is some while validating permissions output will contain exception { $this.PublishCustomMessage("Error validating permissions on the subscription", [MessageType]::Error); $messageData += [MessageData]::new($output) } else { #Step 2: Validate if RG exists. if (-not [string]::IsNullOrEmpty($this.RGname)) { $RG = Get-AzResourceGroup -Name $this.RGname -ErrorAction SilentlyContinue if ($null -eq $RG) { $messageData += [MessageData]::new("Resource group [$($this.RGname)] not found. Please validate the resource group name." ) $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); return $messageData } } #Step 3: If only subid and/or RG name params are used then display below message if ($this.updateAppSettings -eq $false -and $this.updateSecret -eq $false) { $this.PublishCustomMessage("Please use additonal parameters to perform update on LAWSId, LAWSSharedKey, OrganizationName, PATToken, PATTokenURL, ProjectNames, ExtendedCommand", [MessageType]::Info); } #Step 3.1: Get function app resource from RG to get existing app settings details $funcAppToUpdate = $this.FuncAppDefaultName + $this.RsrcTimeStamp $appServResource = @((Get-AzResource -ResourceGroupName $this.RGname -ResourceType "Microsoft.Web/Sites").Name | where {$_ -match $funcAppToUpdate}) if($appServResource.Count -eq 0) { $this.PublishCustomMessage("ADOScanner function app not found in resource group [$($this.RGname)]. Update failed!", [MessageType]::Error); return $messageData } elseif ($appServResource.Count -gt 1) { $this.PublishCustomMessage("More than one ADOScanner app service found in resource group [$($this.RGname)]. Update failed!)", [MessageType]::Error); $this.PublishCustomMessage("Consider using the '-RsrcTimeStamp' param. (E.g., to update values corresponding to 'ADOScannerFA200915172817' use '-RsrcTimeStamp 200915172817'.)", [MessageType]::Warning); return $messageData } else { $WebApp = Get-AzWebApp -Name $appServResource[0] -ResourceGroupName $this.RGname $ExistingAppSettings = $WebApp.SiteConfig.AppSettings if ($this.RefreshOAuthCred -eq $true) { if($ExistingAppSettings.Name -contains "PATTokenURL" -or $ExistingAppSettings.Name -contains "PATToken") { $messageData += [MessageData]::new("CA setup is not compatible with OAuth. Update failed!" ) $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); return $messageData } else { $setupType = "OAuth" $this.OAuthApplicationId = Read-Host "Provide app id for OAuth app:" -AsSecureString $this.OAuthClientSecret = Read-Host "Provide client Secret for OAuth app:" -AsSecureString $this.OAuthAuthorizedScopes = Read-Host "Provide authorised scopes of OAuth app" $isTokenFetched = $this.GetOAuthAccessToken(); if ($isTokenFetched -eq $true) { $this.updateSecret = $true } else { $messageData += [MessageData]::new("Unable to validate OAuth application." ) $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); return $messageData } } } # Check if CA setup is federated or centralized, and are the paramters provided in UCA compatible with it. elseif (-not [string]::IsNullOrEmpty($this.PATTokenURL) -or -not [string]::IsNullOrEmpty($this.PATToken)) { if(($ExistingAppSettings.Name -contains "PATTokenURL" -and [string]::IsNullOrEmpty($this.PATTokenURL)) -or ($ExistingAppSettings.Name -contains "PATToken" -and [string]::IsNullOrEmpty($this.PATToken)) ) { $paramUsed = [string]::Empty if ([string]::IsNullOrEmpty($this.PATTokenURL)) { $paramUsed = "PATToken" } else { $paramUsed = "PATTokenURL" } $messageData += [MessageData]::new("CA setup is not compatible with [$paramUsed]. Update failed!" ) $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); return $messageData } } } #Step 4: Update PATToken/ OAuth credentials in KV (if applicable) if ($this.updateSecret -eq $true) { $kvToUpdate = $this.KVDefaultName + $this.RsrcTimeStamp #Get key vault resource from RG $keyVaultResource = @((Get-AzResource -ResourceGroupName $this.RGname -ResourceType "Microsoft.KeyVault/vaults").Name | where {$_ -match $kvToUpdate}) if($keyVaultResource.Count -eq 0) { $this.PublishCustomMessage("ADOScanner key vault not found in resource group [$($this.RGname)]. Update failed!", [MessageType]::Error); } elseif ($keyVaultResource.Count -gt 1) { $this.PublishCustomMessage("More than one ADOScanner key vault found in resource group [$($this.RGname)]. Update failed!", [MessageType]::Error); $this.PublishCustomMessage("Consider using the '-RsrcTimeStamp' param. (E.g., to update values corresponding to 'ADOScannerFA200915172817' use '-RsrcTimeStamp 200915172817'.)", [MessageType]::Warning); } else { if(-not [string]::IsNullOrEmpty($this.OAuthRefreshToken) -and -not [string]::IsNullOrEmpty($this.OAuthClientSecret) -and $setupType -eq "OAuth") { $RefreshTokenExpiresInDays = [Constants]::RefreshTokenExpiresInDays; $ExpiryDate = [DateTime]::Now.AddDays($RefreshTokenExpiresInDays) $RefreshTokenSecret = Set-AzKeyVaultSecret -VaultName $keyVaultResource[0] -Name $this.OAuthRefreshTokenSecretName -SecretValue $this.OAuthRefreshToken -Expires $ExpiryDate $ClientSecret = Set-AzKeyVaultSecret -VaultName $keyVaultResource[0] -Name $this.OAuthClientSecretName -SecretValue $this.OAuthClientSecret if(($null -eq $RefreshTokenSecret) -or ($null -eq $ClientSecret)) { $this.PublishCustomMessage("Unable to refresh OAuth token. Please validate your permissions in access policy of the Azure key vault [$($keyVaultResource[0])]", [MessageType]::Error); } else { $this.PublishCustomMessage("OAuth token updated in [$($keyVaultResource[0])] Azure key vault", [MessageType]::Update); $this.updateAppSettings -eq $true # So that app settings can also be updated with key vault URI } } if (-not [string]::IsNullOrEmpty($this.PATToken) -and $setupType -ne "OAuth") { $CreatedSecret = Set-AzKeyVaultSecret -VaultName $keyVaultResource[0] -Name $this.SecretName -SecretValue $this.PATToken if($null -eq $CreatedSecret) { $this.PublishCustomMessage("Unable to update PATToken. Please validate your permissions in access policy of the Azure key vault [$($keyVaultResource[0])]", [MessageType]::Error); } else { $this.PublishCustomMessage("PAT secret updated in [$($keyVaultResource[0])] Azure key vault", [MessageType]::Update); $this.updateAppSettings -eq $true # So that app settings can also be updated with key vault URI } } if (-not [string]::IsNullOrEmpty($this.LAWSSharedKey)) { $secureStringKey = ConvertTo-SecureString $this.LAWSSharedKey -AsPlainText -Force $CreatedLASecret = Set-AzKeyVaultSecret -VaultName $keyVaultResource[0] -Name $this.LASecretName -SecretValue $secureStringKey if($null -eq $CreatedLASecret) { $this.PublishCustomMessage("Unable to update LA shared key. Please validate your permissions in access policy of the Azure key vault '$($keyVaultResource[0])'", [MessageType]::Error); } else { $this.PublishCustomMessage("LA shared key secret updated in [$($keyVaultResource[0])] Azure key vault", [MessageType]::Update); $this.updateAppSettings -eq $true } } if (-not [string]::IsNullOrEmpty($this.AltLAWSSharedKey)) { $secureStringAltKey = ConvertTo-SecureString $this.AltLAWSSharedKey -AsPlainText -Force $CreatedAltLASecret = Set-AzKeyVaultSecret -VaultName $keyVaultResource[0] -Name $this.AltLASecretName -SecretValue $secureStringAltKey if($null -eq $CreatedAltLASecret) { $this.PublishCustomMessage("Unable to update alternate LA shared key. Please validate your permissions in access policy of the Azure key vault '$($keyVaultResource[0])'", [MessageType]::Error); } else { $this.PublishCustomMessage("Alternate LA shared key secret updated in [$($keyVaultResource[0])] Azure key vault", [MessageType]::Update); $this.updateAppSettings -eq $true } } } } #Step 5: Update Function app settings (if applicable) if ($this.updateAppSettings -eq $true) { #convert existing app settings from list to hashtable $AppSettingsHT = @{} foreach ($Setting in $ExistingAppSettings) { $AppSettingsHT["$($Setting.Name)"] = "$($Setting.value)" } if(-not [string]::IsNullOrEmpty($this.OrganizationToScan)) { $AppSettingsHT["OrgName"] = $this.OrganizationToScan } if((-not [string]::IsNullOrEmpty($this.PATToken)) -and (-not [string]::IsNullOrEmpty($CreatedSecret))) { $patUri = $CreatedSecret.Id $patUri = $patUri.Substring(0,$patUri.LastIndexOf('/')) $AppSettingsHT["PATToken"] = "@Microsoft.KeyVault(SecretUri=$patUri)"; } if(-not [string]::IsNullOrEmpty($this.PATTokenURL) -and $setupType -ne "OAuth") { $AppSettingsHT["PATTokenURL"] = $this.PATTokenURL } if((-not [string]::IsNullOrEmpty($this.OAuthRefreshToken)) -and (-not [string]::IsNullOrEmpty($RefreshTokenSecret)) -and ($setupType -eq "OAuth")) { $tokenUri = $RefreshTokenSecret.Id $tokenUri = $tokenUri.Substring(0,$tokenUri.LastIndexOf('/')) $AppSettingsHT["RefreshToken"] = "@Microsoft.KeyVault(SecretUri=$tokenUri)"; } if((-not [string]::IsNullOrEmpty($this.OAuthClientSecret)) -and (-not [string]::IsNullOrEmpty($ClientSecret)) -and ($setupType -eq "OAuth")) { $secretUri = $ClientSecret.Id $secretUri = $secretUri.Substring(0,$secretUri.LastIndexOf('/')) $AppSettingsHT["ClientSecret"] = "@Microsoft.KeyVault(SecretUri=$secretUri)"; } if(-not [string]::IsNullOrEmpty($this.LAWSId)) { $AppSettingsHT["LAWSId"] = $this.LAWSId } if((-not [string]::IsNullOrEmpty($this.LAWSSharedKey)) -and (-not [string]::IsNullOrEmpty($CreatedLASecret))) { $sharedKeyUri = $CreatedLASecret.Id $sharedKeyUri = $sharedKeyUri.Substring(0,$sharedKeyUri.LastIndexOf('/')) $AppSettingsHT["LAWSSharedKey"] = "@Microsoft.KeyVault(SecretUri=$sharedKeyUri)"; } if(-not [string]::IsNullOrEmpty($this.AltLAWSId)) { $AppSettingsHT["AltLAWSId"] = $this.AltLAWSId } if((-not [string]::IsNullOrEmpty($this.AltLAWSSharedKey)) -and (-not [string]::IsNullOrEmpty($CreatedAltLASecret))) { $altSharedKeyUri = $CreatedAltLASecret.Id $altSharedKeyUri = $altSharedKeyUri.Substring(0,$altSharedKeyUri.LastIndexOf('/')) $AppSettingsHT["AltLAWSSharedKey"] = "@Microsoft.KeyVault(SecretUri=$altSharedKeyUri)"; } if(-not [string]::IsNullOrEmpty( $this.ExtendedCommand )) { $AppSettingsHT["ExtendedCommand"] = $this.ExtendedCommand $this.PublishCustomMessage("Updating ExtendedCommand overrides the default '-ScanAllResources' behavior of CA.`r`nIf you need that, please specify '-saa' switch in your update CA '-ExtendedCommand'", [MessageType]::Info); } if(-not [string]::IsNullOrEmpty( $this.ProjectNames )) { $AppSettingsHT["ProjectNames"] = $this.ProjectNames } if(-not [string]::IsNullOrEmpty( $this.CRONExp )) { $AppSettingsHT["ScheduleTriggerTime"] = $this.CRONExp } if($this.ClearExtCmd -eq $true) { $AppSettingsHT["ExtendedCommand"] = "" } if(-not [string]::IsNullOrEmpty( $this.WebhookUrl )) { $AppSettingsHT["WebhookUrl"] = $this.WebhookUrl } if(-not [string]::IsNullOrEmpty( $this.WebhookAuthZHeaderName )) { $AppSettingsHT["WebhookAuthZHeaderName"] = $this.WebhookAuthZHeaderName } if(-not [string]::IsNullOrEmpty( $this.WebhookAuthZHeaderValue )) { $AppSettingsHT["WebhookAuthZHeaderValue"] = $this.WebhookAuthZHeaderValue } if($this.AllowSelfSignedWebhookCertificate -eq $true) { $AppSettingsHT["AllowSelfSignedWebhookCertificate"] = "True" } #------------- Begin: DEV-TEST support stuff --------------- if(-not [string]::IsNullOrEmpty( $this.NewImageName )) { Set-AzWebApp -Name $appServResource[0] -ResourceGroupName $this.RGname -ContainerImageName $this.NewImageName } if(-not [string]::IsNullOrEmpty( $this.ModuleEnv )) { $AppSettingsHT["AzSKADOModuleEnv"] = $this.ModuleEnv } if(-not [string]::IsNullOrEmpty( $this.UseDevTestImage )) { $AppSettingsHT["UseDevTestImage"] = $this.UseDevTestImage } if($this.TriggerNextScanInMin -ne 0) { $startScanUTC = [System.DateTime]::UtcNow.AddMinutes($this.TriggerNextScanInMin) $AppSettingsHT["ScheduleTriggerTime"] = "0 $($startScanUTC.Minute) $($startScanUTC.Hour) * * *" #TODO: for dev-test, can we limit daily repetition? } #------------- End: DEV-TEST support stuff --------------- $updatedWebApp = Update-AzFunctionAppSetting -Name $appServResource[0] -ResourceGroupName $this.RGname -AppSetting $AppSettingsHT -Force if($null -eq $updatedWebApp) { $this.PublishCustomMessage("App settings update failed in '$($appServResource[0])'", [MessageType]::Error); } else { $this.PublishCustomMessage("App settings updated in '$($appServResource[0])'", [MessageType]::Update); } } $this.DoNotOpenOutputFolder = $true } } catch { $this.PublishCustomMessage("ADO Scanner CA update failed!", [MessageType]::Error); $this.PublishCustomMessage($_, [MessageType]::Error); $messageData += [MessageData]::new($Error) } return $messageData } [MessageData[]] GetAzSKADOContinuousAssurance() { [MessageData[]] $messageData = @(); $this.messages += ([Constants]::DoubleDashLine + "`r`nStarted validating your AzSK.ADO Continuous Assurance (CA) setup for $($this.OrganizationToScan)`r`n"+[Constants]::DoubleDashLine); $this.PublishCustomMessage($this.messages, [MessageType]::Info); try { $output = $this.ValidateUserPermissions(); if($output -ne 'OK') # if there is issue while validating permissions output will contain exception { $this.PublishCustomMessage("Error validating permissions on the subscription", [MessageType]::Error); $messageData += [MessageData]::new($output) } else { #Step 1: Validate if RG exists. if (-not [string]::IsNullOrEmpty($this.RGname)) { $RG = Get-AzResourceGroup -Name $this.RGname -ErrorAction SilentlyContinue if ($null -eq $RG) { $messageData += [MessageData]::new("Resource group [$($this.RGname)] not found. Please validate the resource group name." ) $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); return $messageData } } #Step 2: Validate if ADOScanner function app exists in the RG $this.PublishCustomMessage("Check 01: Presence of Function app..", [MessageType]::Info); $appServResource = @((Get-AzResource -ResourceGroupName $this.RGname -ResourceType "Microsoft.Web/Sites").Name | where {$_ -match $this.FuncAppName}) if($appServResource.Count -eq 0) { $this.PublishCustomMessage("Status: ADOScanner function app not found in resource group [$($this.RGname)]. Update failed!", [MessageType]::Error); return $messageData } elseif ($appServResource.Count -gt 1) { $this.PublishCustomMessage("Status: More than one ADOScanner app service found in resource group [$($this.RGname)].", [MessageType]::Error); $this.PublishCustomMessage("Consider using the '-RsrcTimeStamp' param. (E.g., For 'ADOScannerFA200915172817' use '-RsrcTimeStamp 200915172817'.)", [MessageType]::Warning); return $messageData } else { $this.FuncAppName = $appServResource[0] $this.PublishCustomMessage("Status: OK. Found the function app [$($this.FuncAppName)].", [MessageType]::Update); $this.TimeStamp = $this.FuncAppName.Replace($this.FuncAppDefaultName,"") } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); #Step 3: Validate if ADOScanner function app is setup for the org provided in command $this.PublishCustomMessage("Check 02: Validating organization name..", [MessageType]::Info); $WebApp = Get-AzWebApp -Name $appServResource[0] -ResourceGroupName $this.RGname $ExistingAppSettings = $WebApp.SiteConfig.AppSettings #convert existing app settings from list to hashtable $AppSettingsHT = @{} foreach ($Setting in $ExistingAppSettings) { $AppSettingsHT["$($Setting.Name)"] = "$($Setting.value)" } if ($AppSettingsHT["OrgName"] -ne $this.OrganizationToScan) { $this.PublishCustomMessage("Status: CA setup is configured for [$($AppSettingsHT["OrgName"])] organization and does not match with provided organization '$($this.OrganizationToScan)'.", [MessageType]::Error); return $messageData } else { $this.PublishCustomMessage("Status: OK. CA is setup for organization [$($this.OrganizationToScan)].", [MessageType]::Update); } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); #Step 4: Validate app settings for additional app settings $this.PublishCustomMessage("Check 03: Validating other app settings..", [MessageType]::Info); if (-not [string]::IsNullOrEmpty($AppSettingsHT["ClientSecret"]) -and -not [string]::IsNullOrEmpty($AppSettingsHT["RefreshToken"])) { #check for OAuth based setup $this.PublishCustomMessage("Status: OK. OAuth has been configured to run the CA setup.", [MessageType]::Update); } elseif ([string]::IsNullOrEmpty($AppSettingsHT["PATToken"]) -and [string]::IsNullOrEmpty($AppSettingsHT["PATTokenURL"])) { $this.PublishCustomMessage("Status: PAT token is not configured in the CA setup.", [MessageType]::Error); } else { $this.PublishCustomMessage("Status: OK. PAT token is configured in the CA setup.", [MessageType]::Update); } if ([string]::IsNullOrEmpty($AppSettingsHT["ProjectNames"])) { $this.PublishCustomMessage("Status: Project Name is not configured in the CA setup.", [MessageType]::Error); } else { $this.PublishCustomMessage("Status: OK. Project name is configured in the CA setup.", [MessageType]::Update); } if ([string]::IsNullOrEmpty($AppSettingsHT["LAWSId"]) -or [string]::IsNullOrEmpty($AppSettingsHT["LAWSSharedKey"])) { $this.PublishCustomMessage("Status: Log Analytics workspace is not configured in the CA setup.", [MessageType]::Info); } else { $this.PublishCustomMessage("Status: OK. Log analytics is configured in the CA setup.", [MessageType]::Update); } if ([string]::IsNullOrEmpty($AppSettingsHT["AltLAWSId"]) -or [string]::IsNullOrEmpty($AppSettingsHT["AltLAWSSharedKey"])) { $this.PublishCustomMessage("Status: (Info) Alternate Log Analytics workspace is not configured in the CA setup.", [MessageType]::Info); } else { $this.PublishCustomMessage("Status: OK. Alternate Log Analytics workspace is configured in the CA setup.", [MessageType]::Update); } if ([string]::IsNullOrEmpty($AppSettingsHT["ExtendedCommand"])) { $this.PublishCustomMessage("Status: (Info) Extended command is not configured in the CA setup.", [MessageType]::Info); } else { $this.PublishCustomMessage("Status: OK. Extended command is configured in the CA setup.", [MessageType]::Update); } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); #Step 4: Validate if storage exists $this.PublishCustomMessage("Check 04: Validating Storage Account..", [MessageType]::Info); $this.StorageName = "adoscannersa"+$this.TimeStamp $storageAccKey = Get-AzStorageAccountKey -ResourceGroupName $this.RGName -Name $this.StorageName if ($null -eq $storageAccKey) { $this.PublishCustomMessage("Status: Storage account not found in the CA setup.", [MessageType]::Error); } else { $StorageContext = New-AzStorageContext -StorageAccountName $this.StorageName -StorageAccountKey $storageAccKey[0].Value -Protocol Https $containerObject = Get-AzStorageContainer -Context $StorageContext -Name $this.CAScanLogsContainerName -ErrorAction SilentlyContinue if($null -eq $containerObject) { $this.PublishCustomMessage("Status: Scan logs not found in storage. (This is expected if you just setup CA as first scan may not have run yet.)", [MessageType]::Warning); } else { $CAScanDataBlobObject = $this.GetScanLogsFromStorageAccount($this.CAScanLogsContainerName, "$($this.OrganizationToScan.ToLower())/", $StorageContext) if ($null -eq $CAScanDataBlobObject) { $this.PublishCustomMessage("Status: Scan logs not found in storage for last 3 days.", [MessageType]::Error); } else { $this.PublishCustomMessage("Status: OK. Storage account contains scan logs for recent jobs as expected.", [MessageType]::Update); } } } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); #Step 5: Validate image name $this.PublishCustomMessage("Check 05: Validating Image..", [MessageType]::Info); $image = "DOCKER|"+ $this.ImageName if ( $WebApp.SiteConfig.LinuxFxVersion -eq $image) { $this.PublishCustomMessage("Status: OK. Docker image is correctly configured.", [MessageType]::Update); } else { $this.PublishCustomMessage("Status: Docker image is not correctly configured.", [MessageType]::Error); } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); $this.PublishCustomMessage("You can use 'Update-AzSKADOContinuousAssurance' (UCA) command to modify AzSK ADO CA configurations/settings.", [MessageType]::Update); } } catch { } return $messageData } #get scan logs from storage hidden [PSObject] GetScanLogsFromStorageAccount($containerName, $scanLogsPrefixPattern, $currentContext) { # Get AzSKADO storage of the current sub $recentCAScanDataBlobObject = $null $recentLogLimitInDays = 3 $dayCounter = 0 while($dayCounter -le $recentLogLimitInDays -and $recentCAScanDataBlobObject -eq $null){ $date = [DateTime]::UtcNow.AddDays(-$dayCounter).ToString("yyyyMMdd") $recentLogsPath = $scanLogsPrefixPattern + "ADOCALogs_" + $date $recentCAScanDataBlobObject = Get-AzStorageBlob -Container $containerName -Prefix $recentLogsPath -Context $currentContext -ErrorAction SilentlyContinue $dayCounter += 1 } return $recentCAScanDataBlobObject } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCArdFuZISG1Na8z # BsJ/qrUI069kDFDJ7yWeVWxujFRv7KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJNx # /q6zedz2eRLZpPbt67dmg+6SBK2M9R5sExyE3H4qMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAbaz88qovQzAtKFvgET7t6TW4Fu/mzMn4eYm4 # W6OD+46Fnol62e/E1ZytQ1Kn6DsOyVQrVhDHL3OT59So/nddr3y31jq9o9E+g2XE # P7au71JDi4122yndNMDGq1Yxp64s35dRNpONSZhFf6qXl4gLFJ3W8MCRJawrM7Ql # od4YjRG0zH8pa/mRb/R8TuU01wXJTLWjJ6uJpfkaoqW2gCKWFehb91mXqNtQN/NV # /J2BO8B+shiP9e2Eji4VecSvge4LREfJZ+MQNIzm7Igqg6l5dheOMz1bknJUuhBA # w1FSEMqnZ7FM+oI/rwlzqUhUkmY2HymIkGo9hajgP8rrWte3QaGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCCDm0e+0kGnZDvNY2/ssxBgSeEAdAxbVb4 # ZqqqUwPB0AIGZeenm/5hGBMyMDI0MDMwNzA3Mzc1MC40NDJaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gAB # AAAB8TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4 # Vg9PiugB1ya1/DRxxLW2hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4J # b+oU4PsMA2foe8gP9bQNPVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2Vi # fEfj+HR6JheNs2LLzm8FDJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4Wl # VeUS+votsPbWm+RKsH4FQNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kd # WBDRcc+JWa21SCefx5SPhJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdys # CcnIF0ZqSNAHcfI9SAv3gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqw # gSLhyB833ZDgmzxbKmJmdDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIc # wd5wHECs5rAJZ6PIyFM7Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptU # olDcVzYEdgLQSWiuFajS6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5x # wRmC7x2S/mxql8nvHSCN1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0g # MQO+qNXV/xTDOBTJ8zBcGQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0 # SjycqE5Erb4YrS1gMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl # 3U/QmFMW2eLPBknnlsfID/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICY # BbMrVSmvgDxU8jAGqMyiLoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6 # RzYL+t1zCUXmmpPmM4xcScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPv # bpflbh/bsiE5tx5cuOJEJSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfes # bOdvJrJdbm+leYLRI67N3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKs # DmTyoWnGmyTWBPiTb2rp5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJT # GnBnRMv68Ud2l5LFhOZ4nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1P # Hce1ugLvvWW1+aOSpd8NnwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXud # AsX5LoCil4rLbHfwYtGOpw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh # 7eUmPltMU8lEQOMelo/1ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZF # fCMotyG+E4XqN6ZWtKEBQiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQD7n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZN3kjAi # GA8yMDI0MDMwNjIzMTUzMFoYDzIwMjQwMzA3MjMxNTMwWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpk3eSAgEAMAcCAQACAhmxMAcCAQACAhIPMAoCBQDplMkSAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAJ7uyKvzTjPKiTFO+OLzfmPp4Pu7 # 48q7c98ZkG4Yhb7I/bwYb2ZMBtyM8YyrIeXT+FIcfBSwAAgCMV2pofDXpx8Q9B1W # lRC15j336BtmKHg6uwBc9/V+0g4oL/xHtTq6vLCmlvFXSEzVWBHJWAFaVNiBu/gW # UPC6nqzyNRd6h3NzUyYBH1HdmZsHIW83Ja+ibWa2IHUFAcebx5O2HY30lIko1jOl # HK0rfqxaQThPKqPA9wqGqUJ/ZKJ1EVnFgzEmPpuHCvxzsY0zIZSZVkYHiWQOJGO5 # Ui1HwBCMyTtesCkpuLb9ZjBBYiXS7gcWayNcjFhbLOprTKMElzRJeraTdckxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGz # RfUn6MAW1gABAAAB8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDMTA6oQ0KEg0zqC9LSwGXCc/HI # BdGXFQzZiPvz0FxKujCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5h # S7ijwao466RosB7wwEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQg3iYiHgJH # G39ohrbodU3eMGI8+zsoyKwXclMeGgPE/KUwDQYJKoZIhvcNAQELBQAEggIAVbfL # bPTTTw71qXdGKCxWtKqf0gKTLGSZxteW1QkHcvhNzgoBoC70LMdm3RSQMm57JmdZ # 5Te2nw9h2Gyf2/3TFoveIEb4IYCqWWdEtQjl2VCPntvjaJaZ+RKrsmwR3M7+ey3K # bfJgvQmKrcyfOiAIuDHkatvIhXstFJD8tm68ExeW8ektOjxJtKQk1NI98h1uLLAU # OnDiH0nbFKb6d+hLHeaLeLncIYZszIkAcLAEdDoh11PYzilXPTtEYQ1Ukng8Rw3A # Cpz9jI9dl7UrdVy7PvUzDegTY0eREHP7+YyRGkBNA1uCUAeMucE6kxFJOI/l/DiL # zvNB8tz36NgozWd42fsDwG/JLZQGeKHWaM8eseMTDkIqbhkuQJNZE3r+wxfFfIuK # nlHNgB+1F0GgOo8hwhfholGwcbIqvGep1r3fmW6zefaLkU5BiH6flyz5KTB8WsRf # PgXrTWoK60UQvKI3dQSD9j4p0fuuydVOpEeeWkEbV9TSlAqaLl/wOdhg1FAGkTmg # toMVlQ7+D4OWs3Di0mo87wyx6vZkYqVON2p48c4oRHH4t4CsgaAm/0uFPujVuj7J # /CBI8BtFgqas+Y5YCk2hx8ZWSyv83sVvT6K0/OqOzv01uC0zUPoXHWJGOM6oepZ2 # 6ebljumpgYqVp/kUxub8I8VJEP+ahFRP8BnmHZo= # SIG # End signature block |