Framework/Core/ContinuousAssurance/CAAutomation.ps1
Set-StrictMode -Version Latest class CAAutomation : ADOSVTCommandBase { hidden [string] $SubscriptionId hidden [string] $Location hidden [string] $OrganizationToScan hidden [System.Security.SecureString] $PATToken hidden [string] $PATTokenURL hidden [string] $IdentityId hidden [string] $TimeStamp #Use for new CA creation only. hidden [string] $StorageName hidden [string] $AppServicePlanName = "ADOScannerFAPlan" hidden [string] $FuncAppDefaultName = "ADOScannerFA" hidden [string] $KVDefaultName = "ADOScannerKV" hidden [string] $FuncAppName hidden [string] $AppInsightsName hidden [string] $KeyVaultName hidden [string] $ImageName hidden [datetime] $ScanTriggerTimeUTC hidden [datetime] $ScanTriggerLocalTime hidden [string] $SecretName = "PATForADOScan" hidden [string] $LASecretName = "LAKeyForADOScan" hidden [string] $AltLASecretName = "AltLAKeyForADOScan" hidden [string] $IdentitySecretName = "IdentityIdForADOScan" hidden [string] $StorageKind = "StorageV2" hidden [string] $StorageType = "Standard_LRS" hidden [string] $LAWSName = "ADOScannerLAWS" hidden [bool] $CreateLAWS hidden [string] $ProjectNames hidden [string] $ExtendedCommand hidden [string] $CRONExp hidden [bool] $ClearExtCmd hidden [bool] $updateAppSettings = $false hidden [bool] $updateSecret = $false hidden [string] $CAScanLogsContainerName = [Constants]::CAScanLogsContainerName hidden [string] $WebhookUrl hidden [string] $WebhookAuthZHeaderName hidden [string] $WebhookAuthZHeaderValue hidden [bool] $AllowSelfSignedWebhookCertificate #UCA params for dev-test support hidden [string] $RsrcTimeStamp = $null #We will apply UCA to function app with this timestamp, e.g., "200830092449" hidden [string] $NewImageName = $null #Container image will be changed to this one. hidden [string] $ModuleEnv = "Prod" #Tell CA to use 'Staging' or 'Prod' or 'Preview' module hidden [bool] $UseDevTestImage = $false #Tell CA to use dev-test (Staging) image packaged inside module hidden [int] $TriggerNextScanInMin = 0 #Scan trigger time will be updated to "Now + N" min hidden [string] $LAWSsku = "Standard" hidden [string[]] $CreatedResources = @(); hidden [string[]] $updatedAppSettings = @(); hidden [string] $RGName hidden [string] $LAWSId hidden [string] $LAWSSharedKey hidden [string] $AltLAWSId hidden [string] $AltLAWSSharedKey hidden [bool] $SetupComplete hidden [string] $messages hidden [string] $ScheduleMessage [PSObject] $ControlSettings; CAAutomation( [string] $SubId, ` [string] $Loc, ` [string] $OrgName, ` [System.Security.SecureString] $PATToken, ` [string] $PATTokenURL, ` [string] $ResourceGroupName, ` [string] $LAWorkspaceId, ` [string] $LAWorkspaceKey, ` [string] $Proj, ` [string] $IdentityResourceId, ` [string] $ExtCmd, ` [int] $ScanIntervalInHours, [InvocationInfo] $invocationContext, ` [bool] $CreateLAWS) : Base($OrgName, $invocationContext) { $this.SubscriptionId = $SubId $this.OrganizationToScan = $OrgName $this.PATToken = $PATToken $this.PATTokenURL = $PATTokenURL $this.IdentityId = $IdentityResourceId $this.ProjectNames = $Proj $this.ExtendedCommand = $ExtCmd $this.TimeStamp = (Get-Date -format "yyMMddHHmmss") $this.StorageName = "adoscannersa"+$this.TimeStamp $this.FuncAppName = $this.FuncAppDefaultName + $this.TimeStamp $this.KeyVaultName = $this.KVDefaultName+$this.TimeStamp $this.AppInsightsName = $this.FuncAppName $this.SetupComplete = $false $this.ScanTriggerTimeUTC = [System.DateTime]::UtcNow.AddMinutes(20) $this.ScanTriggerLocalTime = $(Get-Date).AddMinutes(20) $this.ControlSettings = [ConfigurationManager]::LoadServerConfigFile("ControlSettings.json"); $this.CreateLAWS = $CreateLAWS if ($null -ne $ScanIntervalInHours -and $ScanIntervalInHours -gt 0) { $this.GetCRONForScanInterval($ScanIntervalInHours); } else { $this.CRONExp = "0 $($this.ScanTriggerTimeUTC.Minute) $($this.ScanTriggerTimeUTC.Hour) * * *"; $this.ScheduleMessage = "Scan will begin at $($this.ScanTriggerLocalTime)" } if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "DockerImage.ImageName")) { $this.ImageName = $this.ControlSettings.DockerImage.ImageName } if ([string]::IsNullOrWhiteSpace($ResourceGroupName)) { $this.RGName = [Constants]::AzSKADORGName } else{ $this.RGName = $ResourceGroupName } if ([string]::IsNullOrWhiteSpace($Loc)) { $this.Location =[Constants]::AzSKADORGLocation } else { $this.Location = $Loc } if ([string]::IsNullOrWhiteSpace($LAWorkspaceId) -or [string]::IsNullOrWhiteSpace($LAWorkspaceKey) ) { if ($this.CreateLAWS -ne $true) { $this.messages = "Log Analytics Workspace details are missing. Use -CreateWorkspace switch to create a new workspace while setting up CA. Setup will continue...`r`n" } else{ $this.LAWSName += $this.TimeStamp } } else { $this.LAWSId = $LAWorkspaceId $this.LAWSSharedKey = $LAWorkspaceKey } $ModuleName = $invocationContext.MyCommand.Module.Name if(-not [string]::IsNullOrWhiteSpace($ModuleName)) { switch($ModuleName.ToLower()) { "azskpreview.ado" { $this.ModuleEnv = "preview"; break; } "azskstaging.ado" { $this.ModuleEnv = "staging" break; } } } } CAAutomation( [string] $SubId, ` [string] $OrgName, ` [System.Security.SecureString] $PATToken, ` [string] $PATTokenURL, ` [string] $ResourceGroupName, ` [string] $LAWorkspaceId, ` [string] $LAWorkspaceKey, ` [string] $AltLAWorkspaceId, ` [string] $AltLAWorkspaceKey, ` [string] $Proj, ` [string] $ExtCmd, ` [string] $WebhookUrl, ` [string] $WebhookHeaderName, ` [string] $WebhookHeaderValue, ` [bool] $AllowSelfSignedWebhookCert, [string] $RsrcTimeStamp, ` [string] $ContainerImageName, ` [string] $ModuleEnv, ` [bool] $UseDevTestImage, ` [int] $TriggerNextScanInMin, ` [int] $ScanIntervalInHours, ` [bool] $ClearExtendedCommand, ` [InvocationInfo] $invocationContext) : Base($OrgName, $invocationContext) { $this.SubscriptionId = $SubId $this.OrganizationToScan = $OrgName $this.PATToken = $PATToken $this.PATTokenURL = $PATTokenURL $this.ProjectNames = $Proj $this.ExtendedCommand = $ExtCmd $this.SetupComplete = $false $this.LAWSId = $LAWorkspaceId $this.LAWSSharedKey = $LAWorkspaceKey $this.AltLAWSId = $AltLAWorkspaceId $this.AltLAWSSharedKey = $AltLAWorkspaceKey $this.ClearExtCmd = $ClearExtendedCommand $this.WebhookUrl = $WebhookUrl $this.WebhookAuthZHeaderName = $WebhookHeaderName $this.WebhookAuthZHeaderValue = $WebhookHeaderValue $this.AllowSelfSignedWebhookCertificate = $AllowSelfSignedWebhookCert #Some stuff for dev-test support $this.NewImageName = $ContainerImageName $this.RsrcTimeStamp = $RsrcTimeStamp $this.ModuleEnv = $ModuleEnv $this.UseDevTestImage = $UseDevTestImage $this.TriggerNextScanInMin = $TriggerNextScanInMin <# $this.ControlSettings = [ConfigurationManager]::LoadServerConfigFile("ControlSettings.json"); if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "DockerImage.ImageName")) { $this.ImageName = $this.ControlSettings.DockerImage.ImageName } #> if ([string]::IsNullOrWhiteSpace($ResourceGroupName)) { $this.RGName = [Constants]::AzSKADORGName } else{ $this.RGName = $ResourceGroupName } if ($null -ne $ScanIntervalInHours -and $ScanIntervalInHours -gt 0) { $this.ScanTriggerLocalTime = $(Get-Date).AddMinutes(20) $this.ScanTriggerTimeUTC = [System.DateTime]::UtcNow.AddMinutes(20) $this.GetCRONForScanInterval($ScanIntervalInHours); } #Validate if app settings update is required based on input paramaeters. $invocationContext.BoundParameters.GetEnumerator() | foreach-object { # If input param is other than below 3 then app settings update will be required if($_.Key -ne "SubscriptionId" -and $_.Key -ne "ResourceGroupName" -and $_.Key -ne "PATToken" ) { $this.updateAppSettings = $true } if($_.Key -eq "PATToken" -or $_.Key -eq "AltLAWSSharedKey" -or $_.Key -eq "LAWSSharedKey") { $this.updateSecret = $true } } } CAAutomation( [string] $SubId, ` [string] $OrgName, ` [string] $ResourceGroupName, ` [string] $RsrcTimeStamp, ` [InvocationInfo] $invocationContext) : Base($OrgName, $invocationContext) { $this.SubscriptionId = $SubId $this.OrganizationToScan = $OrgName if ([string]::IsNullOrWhiteSpace($ResourceGroupName)) { $this.RGName = [Constants]::AzSKADORGName } else{ $this.RGName = $ResourceGroupName } if ([string]::IsNullOrWhiteSpace($RsrcTimeStamp)) { $this.FuncAppName = $this.FuncAppDefaultName } else{ $this.FuncAppName = $this.FuncAppDefaultName + $RsrcTimeStamp } $this.ControlSettings = [ConfigurationManager]::LoadServerConfigFile("ControlSettings.json"); if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "DockerImage.ImageName")) { $this.ImageName = $this.ControlSettings.DockerImage.ImageName } } [void] RegisterResourceProvider() { if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "ResourceProviders")) { $resourceProvider = $this.ControlSettings.ResourceProviders $resourceProvider | foreach { [ResourceHelper]::RegisterResourceProviderIfNotRegistered($_); } } } [void] GetCRONForScanInterval($ScanIntervalInHours) { $minute = $this.ScanTriggerTimeUTC.Minute $hour = $this.ScanTriggerTimeUTC.Hour $list = New-Object Collections.Generic.List[Int] #between first scan time and 00:00 hrs get "hours" when scan should trigger based on scan interval while ($hour -lt 24) { $list.Add($hour) $hour += $ScanIntervalInHours } #between 00:00 hrs and first scan time get "hours" when scan should trigger based on scan interval $hour = $this.ScanTriggerTimeUTC.Hour while ($hour -ge 0) { $list.Add($hour) $hour -= $ScanIntervalInHours } $list =$list | sort-object -Unique $hoursExpression = $list -join "," $this.CRONExp = "0 $($minute) $($hoursExpression) * * *" $this.ScheduleMessage = "Scan will trigger every $($ScanIntervalInHours) hours starting from $($this.ScanTriggerLocalTime)" } [string] ValidateUserPermissions() { $output =''; try { #Step 1: Get context. Connect to account if required $Context = @(Get-AzContext -ErrorAction SilentlyContinue ) if ($Context.count -eq 0) { $this.PublishCustomMessage("No active Azure login session found. Initiating login flow...", [MessageType]::Info); Connect-AzAccount -ErrorAction Stop $Context = @(Get-AzContext -ErrorAction SilentlyContinue) } #Step 2 : Check if Owner or Contributor role is available at subscription scope. if ($null -eq $Context) { $output = "No Azure login found. Azure login context is required to setup Continuous Assurance." } else { if($Context.Subscription.SubscriptionId -ne $this.SubscriptionId) { $Context = set-azcontext -Subscription $this.SubscriptionId -Force } $RoleAssignment = @() $Scope = "/subscriptions/"+$this.SubscriptionId $RoleAssignmentSub = @(Get-AzRoleAssignment -Scope $Scope -SignInName $Context.Account.Id -IncludeClassicAdministrators -ErrorAction SilentlyContinue) if ($RoleAssignmentSub.Count -gt 0) { $RoleAssignment = @($RoleAssignmentSub | Where-Object {$_.RoleDefinitionName -eq "Owner" -or $_.RoleDefinitionName -eq "CoAdministrator" -or $_.RoleDefinitionName -match "ServiceAdministrator"} ) } # If Sub level permissions are not adequate then check RG level permissions if ($RoleAssignment.Count -gt 0) { $output = 'OK' } else { #Step 3: Check if user has Owner permissions on provided RG name or ADOScannerRG $Scope = $Scope +"/resourceGroups/"+ $this.RGName $RoleAssignmentRG = @(Get-AzRoleAssignment -Scope $Scope -SignInName $Context.Account.Id -ErrorAction SilentlyContinue) $RoleAssignment = @($RoleAssignmentRG | Where-Object {$_.RoleDefinitionName -eq "Owner"} ) if ($RoleAssignment.Count -eq 0) { $this.PublishCustomMessage("Please make sure you have Owner role on target subscription or resource group. If your permissions were elevated recently, please run the 'Disconnect-AzAccount' command to clear the Azure cache and try again.", [MessageType]::Info); } else { $output = 'OK' } } } #Resolve projectNames if * is used in command if ($this.ProjectNames -eq "*") { $apiURL = 'https://dev.azure.com/{0}/_apis/projects?$top=1000&api-version=5.1' -f $($this.OrganizationContext.OrganizationName); $responseObj = ""; try { $responseObj = [WebRequestHelper]::InvokeGetWebRequest($apiURL); if (-not [string]::IsNullOrEmpty($responseObj) -and ($responseObj | Measure-Object).Count -gt 0) { $this.Projectnames = $ResponseObj.Name -join "," } } catch { $this.PublishCustomMessage("Project not found: Incorrect project name or you do not have neccessary permission to access the project.", [MessageType]::Error); throw; } } } catch{ $output += $_; $this.messages += $Error } return $output } #Create common resources applicable for both type of CA setups [void] CreateResources() { try { if([string]::IsNullOrWhiteSpace($this.ImageName)) { $messageData += [MessageData]::new("If you are using customized org policy, please ensure DockerImageName is defined in your ControlSettings.json") $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); } #Step 1: If RG does not exist then create new if((Get-AzResourceGroup -Name $this.RGname -ErrorAction SilentlyContinue | Measure-Object).Count -eq 0) { $RG = @(New-AzResourceGroup -Name $this.RGname -Location $this.Location) if($RG.Count -eq 0) { $this.PublishCustomMessage("New resource group '$($this.RGname)' creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("New resource group '$($this.RGname)' created", [MessageType]::Update); } } else { $this.PublishCustomMessage("Resource group [$($this.RGname)] already exists. Skipping RG creation.", [MessageType]::Update); } $this.PublishCustomMessage("Creating required resources in resource group [$($this.RGname)]....", [MessageType]::Info); #Step 2: Create app service plan "Elastic Premium" if ((($AppServPlan =Get-AzResource -ResourceGroupName $this.RGName -ResourceType 'Microsoft.web/serverfarms' -Name $this.AppServicePlanName) | Measure-Object).Count -eq 0) { $AppServPlan = New-AzResource -ResourceName $this.AppServicePlanName -ResourceGroupName $this.RGname -ResourceType Microsoft.web/serverfarms -ApiVersion "2018-02-01" -Location $this.Location -Kind Elastic -Properties @{"reserved"=$true;} -Sku @{name= "EP1";tier = "ElasticPremium";size= "EP1";family="EP";capacity= 1} -Force if($null -eq $AppServPlan) { $this.PublishCustomMessage("AppService plan [$($this.AppServicePlanName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("AppService plan [$($this.AppServicePlanName)] created", [MessageType]::Update); $this.CreatedResources += $AppServPlan.ResourceId } } else { $this.PublishCustomMessage("AppService Plan: [$($this.AppServicePlanName)] already exists. Skipping creation.", [MessageType]::Update); } #Step 3: Create storage account $StorageAcc = New-AzStorageAccount -ResourceGroupName $this.RGname -Name $this.StorageName -Type $this.StorageType -Location $this.Location -Kind $this.StorageKind -EnableHttpsTrafficOnly $true -ErrorAction Stop if($null -eq $StorageAcc) { $this.PublishCustomMessage("Storage account [$($this.StorageName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Storage [$($this.StorageName)] created", [MessageType]::Update); $this.CreatedResources += $StorageAcc.Id } #Step 4: Create LAW if applicable if ($this.CreateLAWS -eq $true) { $LAWorkspace = @(New-AzOperationalInsightsWorkspace -Location $this.Location -Name $this.LAWSName -Sku $this.LAWSsku -ResourceGroupName $this.RGname) if($LAWorkspace -eq 0) { $this.PublishCustomMessage("Log Analytics Workspace [$($this.LAWSName)] creation failed", [MessageType]::Error); } else { $this.LAWSId = $LAWorkspace.CustomerId.Guid.ToString() $SharedKeys = Get-AzOperationalInsightsWorkspaceSharedKey -Name $this.LAWSName -ResourceGroupName $this.RGname -WarningAction silentlycontinue $this.LAWSSharedKey = $SharedKeys.PrimarySharedKey $this.PublishCustomMessage("Log Analytics Workspace [$($this.LAWSName)] created", [MessageType]::Update); $this.CreatedResources += $LAWorkspace.ResourceId } } #Step 5: Create keyvault $KeyVault = New-AzKeyVault -Name $this.KeyVaultName -ResourceGroupName $this.RGname -Location $this.Location if($null -eq $KeyVault) { $this.PublishCustomMessage("Azure key vault [$($this.KeyVaultName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Azure key vault [$($this.KeyVaultName)] created", [MessageType]::Update); $this.CreatedResources += $KeyVault.resourceid } } catch { $this.PublishCustomMessage("Error occured while creating resources", [MessageType]::Error); throw; } } # ICA to setup using PATToken, by storing it in created KV and access it using system assigned identity of function app [MessageData[]] InstallAzSKADOContinuousAssurance() { [MessageData[]] $messageData = @(); $this.messages += ([Constants]::DoubleDashLine + "`r`nStarted setting up Continuous Assurance (CA)`r`n"+[Constants]::DoubleDashLine); $this.PublishCustomMessage($this.messages, [MessageType]::Info); try { $output = $this.ValidateUserPermissions(); if($output -ne 'OK') # if there is some while validating permissions output will contain exception { $this.PublishCustomMessage("Error validating permissions on the subscription", [MessageType]::Error); $messageData += [MessageData]::new($output) } else { $this.RegisterResourceProvider(); $this.CreateResources(); #Step 1,2,3,4,5 #Step 6: Create Function app $FuncApp = New-AzFunctionApp -DockerImageName $this.ImageName -SubscriptionId $this.SubscriptionId -Name $this.FuncAppName -ResourceGroupName $this.RGname -StorageAccountName $this.StorageName -IdentityType SystemAssigned -PlanName $this.AppServicePlanName if($null -eq $FuncApp) { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] created", [MessageType]::Update); $this.CreatedResources += $FuncApp.Id } #Step 7: Validate if AI got created $AppInsight = Get-AzResource -Name $this.AppInsightsName -ResourceType Microsoft.Insights/components if($null -eq $AppInsight) { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] created", [MessageType]::Update); $this.CreatedResources += $AppInsight.ResourceId } #Step 8a: Add PAT token secret to key vault $CreatedSecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.SecretName -SecretValue $this.PATToken if($null -eq $CreatedSecret) { $this.PublishCustomMessage("PAT Secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("PAT Secret created in Azure key vault", [MessageType]::Update); } #Step 8b: Add LA Shared Key secret to key vault $CreatedLASecret = $null if (-not [string]::IsNullOrEmpty($this.LAWSSharedKey)) { $secureStringKey = ConvertTo-SecureString $this.LAWSSharedKey -AsPlainText -Force $CreatedLASecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.LASecretName -SecretValue $secureStringKey if($null -eq $CreatedLASecret) { $this.PublishCustomMessage("LA shared key secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("LA shared key secret created in Azure key vault", [MessageType]::Update); } } #Step 9: Get Identity details of function app to provide access on keyvault and storage $FuncApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname $FuncAppIdentity= $FuncApp.Identity.PrincipalId $MSIAccessToKV = Set-AzKeyVaultAccessPolicy -VaultName $this.KeyVaultName -ResourceGroupName $this.RGname -PermissionsToSecrets get,list -PassThru -ObjectId $FuncAppIdentity $IsMSIAccess = $MSIAccessToKV.AccessPolicies | ForEach-Object { if ($_.ObjectId -match $FuncAppIdentity ) {return $true }} if($IsMSIAccess -eq $true) { $this.PublishCustomMessage("MSI access to Azure key vault provided", [MessageType]::Update); } else { $this.PublishCustomMessage("MSI access to Azure key vault failed", [MessageType]::Error); } $MSIAccessToSA = New-AzRoleAssignment -ObjectId $FuncAppIdentity -RoleDefinitionName "Contributor" -ResourceName $this.StorageName -ResourceGroupName $this.RGname -ResourceType Microsoft.Storage/storageAccounts if($null -eq $MSIAccessToSA) { $this.PublishCustomMessage("MSI access to storage failed", [MessageType]::Error); } else { $this.PublishCustomMessage("MSI access to storage provided", [MessageType]::Update); } #Step 10: Configure required env variables in function app for scan $uri = $CreatedSecret.Id $uri = $uri.Substring(0,$uri.LastIndexOf('/')) $sharedKeyUri = "" if (-not [string]::IsNullOrEmpty($CreatedLASecret)) { $sharedKeyUri = $CreatedLASecret.Id $sharedKeyUri = $sharedKeyUri.Substring(0,$sharedKeyUri.LastIndexOf('/')) $sharedKeyUri = "@Microsoft.KeyVault(SecretUri=$sharedKeyUri)" } #Turn on "Always ON" for function app and also fetch existing app settings and append the required ones. This has to be done as appsettings get overwritten $WebApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname #-AlwaysOn $true $ExistingAppSettings = $WebApp.SiteConfig.AppSettings #convert existing app settings from list to hashtable $AppSettingsHT = @{} foreach ($Setting in $ExistingAppSettings) { $AppSettingsHT["$($Setting.Name)"] = "$($Setting.value)" } $NewAppSettings = @{ "ScheduleTriggerTime" = $this.CRONExp; "SubscriptionId" = $this.SubscriptionId; "LAWSId" = $this.LAWSId; "LAWSSharedKey" = $sharedKeyUri; "OrgName" = $this.OrganizationToScan; "PATToken" = "@Microsoft.KeyVault(SecretUri=$uri)"; "StorageRG" = $this.RGname; "ProjectNames" = $this.ProjectNames; "ExtendedCommand" = $this.ExtendedCommand; "StorageName" = $this.StorageName; "AzSKADOModuleEnv" = $this.ModuleEnv; "AzSKADOVersion" = ""; } $AppSettings = $NewAppSettings + $AppSettingsHT $updatedWebApp = Update-AzFunctionAppSetting -Name $this.FuncAppName -ResourceGroupName $this.RGname -AppSetting $AppSettings -Force if($updatedWebApp.Count -ne $AppSettings.Count) { $this.PublishCustomMessage("App settings update failed", [MessageType]::Error); } else { $this.PublishCustomMessage("App settings updated", [MessageType]::Update); } $this.PublishCustomMessage("`r`nSetup Complete!", [MessageType]::Update); Restart-AzFunctionApp -name $this.FuncAppName -ResourceGroupName $this.RGname -SubscriptionId $this.SubscriptionId -Force $this.PublishCustomMessage($this.ScheduleMessage, [MessageType]::Update); $this.SetupComplete = $true $this.DoNotOpenOutputFolder = $true $messageData += [MessageData]::new("The following resources were created in resource group [$($this.RGName)] as part of AzSK.ADO Continuous Assurance", ($this.CreatedResources| Out-String)) } } catch { $this.PublishCustomMessage("ADO Scanner CA setup failed!", [MessageType]::Error); $this.PublishCustomMessage($_, [MessageType]::Error); $messageData += [MessageData]::new($Error) } finally { if ($this.SetupComplete -eq $false) { $this.PublishCustomMessage("CA Setup could not be completed. Deleting created resources...", [MessageType]::Warning); if ($this.CreatedResources.Count -ne 0) { Foreach ($resourceId in $this.CreatedResources) { Remove-AzResource -ResourceId $resourceId -Force $Index = $resourceId.LastIndexOf('/') + 1 ; $ResourceName = $resourceId.Substring($Index) $this.PublishCustomMessage("Deleted resource: [$($ResourceName)]", [MessageType]::Info); } } else{ $this.PublishCustomMessage("No resource was created.", [MessageType]::Info); } } } return $messageData } #ICA to setup using PATTokenURL and access it using user assigned identity.Here KV holding PAT is not directly accessible, it will be retrieved at runtime by the identity. [MessageData[]] InstallAzSKADOCentralContinuousAssurance() { [MessageData[]] $messageData = @(); $this.messages += ([Constants]::DoubleDashLine + "`r`nStarted setting up Continuous Assurance (CA)`r`n"+[Constants]::DoubleDashLine); $this.PublishCustomMessage($this.messages, [MessageType]::Info); try { $output = $this.ValidateUserPermissions(); if($output -ne 'OK') # if there is some while validating permissions output will contain exception { $this.PublishCustomMessage("Error validating permissions on the subscription", [MessageType]::Error); $messageData += [MessageData]::new($output) } else { $this.RegisterResourceProvider(); $this.CreateResources(); #Step 1,2,3,4,5 #Step 6a: Create Function app $FuncApp = New-AzFunctionApp -DockerImageName $this.ImageName -SubscriptionId $this.SubscriptionId -Name $this.FuncAppName -ResourceGroupName $this.RGname -StorageAccountName $this.StorageName -IdentityType UserAssigned -IdentityID $this.IdentityId -PlanName $this.AppServicePlanName if($null -eq $FuncApp) { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] creation failed. Please validate permissions on Identity and try again (Minimum required permission is 'Managed identity operator').", [MessageType]::Error); } else { $this.PublishCustomMessage("Function app [$($this.FuncAppName)] created", [MessageType]::Update); $this.CreatedResources += $FuncApp.Id #Step 6b: Enable system assigned identity. As powershell commands do not support enabling both identities together, therefore we are using api call here $url = "https://management.azure.com/subscriptions/{0}/resourceGroups/{1}/providers/Microsoft.Web/sites/{2}?api-version=2018-11-01" -f $this.SubscriptionId, $this.RGname, $this.FuncAppName $accessToken = [ContextHelper]::GetAccessToken("https://management.azure.com", "") $header = @{ "Authorization" = "Bearer " + $accessToken } $bodyObject = [PSCustomObject]@{ 'location' = $this.Location 'identity' = [PSCustomObject]@{ 'type' = 'systemassigned,userassigned' } } $bodyJson = @($bodyObject) | ConvertTo-Json try { Invoke-WebRequest -Uri $url -Method Patch -ContentType "application/json" -Headers $header -Body $bodyJson -UseBasicParsing } catch { $this.PublishCustomMessage("System assigned managed identity creation failed for function app [$($this.FuncAppName)].", [MessageType]::Error); throw; } } #Step 7: Validate if AI got created $AppInsight = Get-AzResource -Name $this.AppInsightsName -ResourceType Microsoft.Insights/components if($null -eq $AppInsight) { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] creation failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Application Insights [$($this.AppInsightsName)] created", [MessageType]::Update); $this.CreatedResources += $AppInsight.ResourceId } #Step 8: Get Identity details of function app to provide access on keyvault and storage $FuncApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname $FuncAppIdentity= $FuncApp.Identity.PrincipalId $UserAssignedIdentityClientId = $FuncApp.Identity.UserAssignedIdentities.Values.Clientid $MSIAccessToKV = Set-AzKeyVaultAccessPolicy -VaultName $this.KeyVaultName -ResourceGroupName $this.RGname -PermissionsToSecrets get,list -PassThru -ObjectId $FuncAppIdentity $IsMSIAccess = $MSIAccessToKV.AccessPolicies | ForEach-Object { if ($_.ObjectId -match $FuncAppIdentity ) {return $true }} if($IsMSIAccess -eq $true) { $this.PublishCustomMessage("MSI access to Azure key vault provided", [MessageType]::Update); } else { $this.PublishCustomMessage("MSI access to Azure key vault failed", [MessageType]::Error); } $MSIAccessToSA = New-AzRoleAssignment -ObjectId $FuncAppIdentity -RoleDefinitionName "Contributor" -ResourceName $this.StorageName -ResourceGroupName $this.RGname -ResourceType Microsoft.Storage/storageAccounts if($null -eq $MSIAccessToSA) { $this.PublishCustomMessage("MSI access to storage failed", [MessageType]::Error); } else { $this.PublishCustomMessage("MSI access to storage provided", [MessageType]::Update); } #Step 9a: Add identity Client id to key vault secret $clientId = ConvertTo-SecureString $UserAssignedIdentityClientId -AsPlainText -Force $CreatedSecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.IdentitySecretName -SecretValue $clientId if($null -eq $CreatedSecret) { $this.PublishCustomMessage("Identity secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("Identity secret created in Azure key vault", [MessageType]::Update); } #Step 9b: Add LA Shared Key to key vault secret $CreatedLASecret = $null if (-not [string]::IsNullOrEmpty($this.LAWSSharedKey)) { $secureStringKey = ConvertTo-SecureString $this.LAWSSharedKey -AsPlainText -Force $CreatedLASecret = Set-AzKeyVaultSecret -VaultName $this.KeyVaultName -Name $this.LASecretName -SecretValue $secureStringKey if($null -eq $CreatedLASecret) { $this.PublishCustomMessage("LA shared key secret creation in Azure key vault failed", [MessageType]::Error); } else { $this.PublishCustomMessage("LA shared key secret created in Azure key vault", [MessageType]::Update); } } #Step 10: Configure required env variables in function app for scan $identitySecretUri = $CreatedSecret.Id $identitySecretUri = $identitySecretUri.Substring(0,$identitySecretUri.LastIndexOf('/')) $identitySecretUri = "@Microsoft.KeyVault(SecretUri=$identitySecretUri)" $sharedKeyUri = "" if (-not [string]::IsNullOrEmpty($CreatedLASecret)) { $sharedKeyUri = $CreatedLASecret.Id $sharedKeyUri = $sharedKeyUri.Substring(0,$sharedKeyUri.LastIndexOf('/')) $sharedKeyUri = "@Microsoft.KeyVault(SecretUri=$sharedKeyUri)" } #Turn on "Always ON" for function app and also fetch existing app settings and append the required ones. This has to be done as appsettings get overwritten $WebApp = Get-AzWebApp -Name $this.FuncAppName -ResourceGroupName $this.RGname #-AlwaysOn $true $ExistingAppSettings = $WebApp.SiteConfig.AppSettings #convert existing app settings from list to hashtable $AppSettingsHT = @{} foreach ($Setting in $ExistingAppSettings) { $AppSettingsHT["$($Setting.Name)"] = "$($Setting.value)" } $NewAppSettings = @{ "ScheduleTriggerTime" = $this.CRONExp; "SubscriptionId" = $this.SubscriptionId; "LAWSId" = $this.LAWSId; "LAWSSharedKey" = $sharedKeyUri; "OrgName" = $this.OrganizationToScan; "PATTokenUrl" = $this.PATTokenURL; "StorageRG" = $this.RGname; "ProjectNames" = $this.ProjectNames; "ExtendedCommand" = $this.ExtendedCommand; "StorageName" = $this.StorageName; "AzSKADOModuleEnv" = $this.ModuleEnv; "AzSKADOVersion" = ""; "ClientId" = $identitySecretUri; } $AppSettings = $NewAppSettings + $AppSettingsHT $updatedWebApp = Update-AzFunctionAppSetting -Name $this.FuncAppName -ResourceGroupName $this.RGname -AppSetting $AppSettings -Force if($updatedWebApp.Count -ne $AppSettings.Count) { $this.PublishCustomMessage("App settings update failed", [MessageType]::Error); } else { $this.PublishCustomMessage("App settings updated", [MessageType]::Update); } $this.PublishCustomMessage("`r`nSetup Complete!", [MessageType]::Update); Restart-AzFunctionApp -name $this.FuncAppName -ResourceGroupName $this.RGname -SubscriptionId $this.SubscriptionId -Force $this.PublishCustomMessage($this.ScheduleMessage, [MessageType]::Update); $this.SetupComplete = $true $this.DoNotOpenOutputFolder = $true $messageData += [MessageData]::new("The following resources were created in resource group [$($this.RGName)] as part of AzSK.ADO Continuous Assurance", ($this.CreatedResources| Out-String)) } } catch { $this.PublishCustomMessage("ADO Scanner CA setup failed!", [MessageType]::Error); $this.PublishCustomMessage($_, [MessageType]::Error); $messageData += [MessageData]::new($Error) } finally { if ($this.SetupComplete -eq $false) { $this.PublishCustomMessage("CA Setup could not be completed. Deleting created resources...", [MessageType]::Warning); if ($this.CreatedResources.Count -ne 0) { Foreach ($resourceId in $this.CreatedResources) { Remove-AzResource -ResourceId $resourceId -Force $Index = $resourceId.LastIndexOf('/') + 1 ; $ResourceName = $resourceId.Substring($Index) $this.PublishCustomMessage("Deleted resource: [$($ResourceName)]", [MessageType]::Info); } } else{ $this.PublishCustomMessage("No resource was created.", [MessageType]::Info); } } else { $this.PublishCustomMessage([Constants]::SingleDashLine); $this.PublishCustomMessage([Constants]::CentralCAMsg); } } return $messageData } [MessageData[]] UpdateAzSKADOContinuousAssurance() { [MessageData[]] $messageData = @(); $CreatedSecret = $null $CreatedLASecret = $null $CreatedAltLASecret = $null $ExistingAppSettings = @() $appServResource = @() $this.messages += ([Constants]::DoubleDashLine + "`r`nStarted updating Continuous Assurance (CA)`r`n"+[Constants]::DoubleDashLine); $this.PublishCustomMessage($this.messages, [MessageType]::Info); try { #Step 1: Validate permissions of user on subscription $output = $this.ValidateUserPermissions(); if($output -ne 'OK') # if there is some while validating permissions output will contain exception { $this.PublishCustomMessage("Error validating permissions on the subscription", [MessageType]::Error); $messageData += [MessageData]::new($output) } else { #Step 2: Validate if RG exists. if (-not [string]::IsNullOrEmpty($this.RGname)) { $RG = Get-AzResourceGroup -Name $this.RGname -ErrorAction SilentlyContinue if ($null -eq $RG) { $messageData += [MessageData]::new("Resource group [$($this.RGname)] not found. Please validate the resource group name." ) $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); return $messageData } } #Step 3: If only subid and/or RG name params are used then display below message if ($this.updateAppSettings -eq $false -and $this.updateSecret -eq $false) { $this.PublishCustomMessage("Please use additonal parameters to perform update on LAWSId, LAWSSharedKey, OrganizationName, PATToken, PATTokenURL, ProjectNames, ExtendedCommand", [MessageType]::Info); } #Step 3.1: Get function app resource from RG to get existing app settings details $funcAppToUpdate = $this.FuncAppDefaultName + $this.RsrcTimeStamp $appServResource = @((Get-AzResource -ResourceGroupName $this.RGname -ResourceType "Microsoft.Web/Sites").Name | where {$_ -match $funcAppToUpdate}) if($appServResource.Count -eq 0) { $this.PublishCustomMessage("ADOScanner function app not found in resource group [$($this.RGname)]. Update failed!", [MessageType]::Error); return $messageData } elseif ($appServResource.Count -gt 1) { $this.PublishCustomMessage("More than one ADOScanner app service found in resource group [$($this.RGname)]. Update failed!)", [MessageType]::Error); $this.PublishCustomMessage("Consider using the '-RsrcTimeStamp' param. (E.g., to update values corresponding to 'ADOScannerFA200915172817' use '-RsrcTimeStamp 200915172817'.)", [MessageType]::Warning); return $messageData } else { $WebApp = Get-AzWebApp -Name $appServResource[0] -ResourceGroupName $this.RGname $ExistingAppSettings = $WebApp.SiteConfig.AppSettings # Check if CA setup is federated or centralized, and are the paramters provided in UCA compatible with it. if (-not [string]::IsNullOrEmpty($this.PATTokenURL) -or -not [string]::IsNullOrEmpty($this.PATToken)) { if(($ExistingAppSettings.Name -contains "PATTokenURL" -and [string]::IsNullOrEmpty($this.PATTokenURL)) -or ($ExistingAppSettings.Name -contains "PATToken" -and [string]::IsNullOrEmpty($this.PATToken)) ) { $paramUsed = [string]::Empty if ([string]::IsNullOrEmpty($this.PATTokenURL)) { $paramUsed = "PATToken" } else { $paramUsed = "PATTokenURL" } $messageData += [MessageData]::new("CA setup is not compatible with [$paramUsed]. Update failed!" ) $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); return $messageData } } } #Step 4: Update PATToken in KV (if applicable) if ($this.updateSecret -eq $true) { $kvToUpdate = $this.KVDefaultName + $this.RsrcTimeStamp #Get key vault resource from RG $keyVaultResource = @((Get-AzResource -ResourceGroupName $this.RGname -ResourceType "Microsoft.KeyVault/vaults").Name | where {$_ -match $kvToUpdate}) if($keyVaultResource.Count -eq 0) { $this.PublishCustomMessage("ADOScanner key vault not found in resource group [$($this.RGname)]. Update failed!", [MessageType]::Error); } elseif ($keyVaultResource.Count -gt 1) { $this.PublishCustomMessage("More than one ADOScanner key vault found in resource group [$($this.RGname)]. Update failed!", [MessageType]::Error); $this.PublishCustomMessage("Consider using the '-RsrcTimeStamp' param. (E.g., to update values corresponding to 'ADOScannerFA200915172817' use '-RsrcTimeStamp 200915172817'.)", [MessageType]::Warning); } else { if (-not [string]::IsNullOrEmpty($this.PATToken)) { $CreatedSecret = Set-AzKeyVaultSecret -VaultName $keyVaultResource[0] -Name $this.SecretName -SecretValue $this.PATToken if($null -eq $CreatedSecret) { $this.PublishCustomMessage("Unable to update PATToken. Please validate your permissions in access policy of the Azure key vault [$($keyVaultResource[0])]", [MessageType]::Error); } else { $this.PublishCustomMessage("PAT secret updated in [$($keyVaultResource[0])] Azure key vault", [MessageType]::Update); $this.updateAppSettings -eq $true # So that app settings can also be updated with key vault URI } } if (-not [string]::IsNullOrEmpty($this.LAWSSharedKey)) { $secureStringKey = ConvertTo-SecureString $this.LAWSSharedKey -AsPlainText -Force $CreatedLASecret = Set-AzKeyVaultSecret -VaultName $keyVaultResource[0] -Name $this.LASecretName -SecretValue $secureStringKey if($null -eq $CreatedLASecret) { $this.PublishCustomMessage("Unable to update LA shared key. Please validate your permissions in access policy of the Azure key vault '$($keyVaultResource[0])'", [MessageType]::Error); } else { $this.PublishCustomMessage("LA shared key secret updated in [$($keyVaultResource[0])] Azure key vault", [MessageType]::Update); $this.updateAppSettings -eq $true } } if (-not [string]::IsNullOrEmpty($this.AltLAWSSharedKey)) { $secureStringAltKey = ConvertTo-SecureString $this.AltLAWSSharedKey -AsPlainText -Force $CreatedAltLASecret = Set-AzKeyVaultSecret -VaultName $keyVaultResource[0] -Name $this.AltLASecretName -SecretValue $secureStringAltKey if($null -eq $CreatedAltLASecret) { $this.PublishCustomMessage("Unable to update alternate LA shared key. Please validate your permissions in access policy of the Azure key vault '$($keyVaultResource[0])'", [MessageType]::Error); } else { $this.PublishCustomMessage("Alternate LA shared key secret updated in [$($keyVaultResource[0])] Azure key vault", [MessageType]::Update); $this.updateAppSettings -eq $true } } } } #Step 5: Update Function app settings (if applicable) if ($this.updateAppSettings -eq $true) { #convert existing app settings from list to hashtable $AppSettingsHT = @{} foreach ($Setting in $ExistingAppSettings) { $AppSettingsHT["$($Setting.Name)"] = "$($Setting.value)" } if(-not [string]::IsNullOrEmpty($this.OrganizationToScan)) { $AppSettingsHT["OrgName"] = $this.OrganizationToScan } if((-not [string]::IsNullOrEmpty($this.PATToken)) -and (-not [string]::IsNullOrEmpty($CreatedSecret))) { $patUri = $CreatedSecret.Id $patUri = $patUri.Substring(0,$patUri.LastIndexOf('/')) $AppSettingsHT["PATToken"] = "@Microsoft.KeyVault(SecretUri=$patUri)"; } if(-not [string]::IsNullOrEmpty($this.PATTokenURL)) { $AppSettingsHT["PATTokenURL"] = $this.PATTokenURL } if(-not [string]::IsNullOrEmpty($this.LAWSId)) { $AppSettingsHT["LAWSId"] = $this.LAWSId } if((-not [string]::IsNullOrEmpty($this.LAWSSharedKey)) -and (-not [string]::IsNullOrEmpty($CreatedLASecret))) { $sharedKeyUri = $CreatedLASecret.Id $sharedKeyUri = $sharedKeyUri.Substring(0,$sharedKeyUri.LastIndexOf('/')) $AppSettingsHT["LAWSSharedKey"] = "@Microsoft.KeyVault(SecretUri=$sharedKeyUri)"; } if(-not [string]::IsNullOrEmpty($this.AltLAWSId)) { $AppSettingsHT["AltLAWSId"] = $this.AltLAWSId } if((-not [string]::IsNullOrEmpty($this.AltLAWSSharedKey)) -and (-not [string]::IsNullOrEmpty($CreatedAltLASecret))) { $altSharedKeyUri = $CreatedAltLASecret.Id $altSharedKeyUri = $altSharedKeyUri.Substring(0,$altSharedKeyUri.LastIndexOf('/')) $AppSettingsHT["AltLAWSSharedKey"] = "@Microsoft.KeyVault(SecretUri=$altSharedKeyUri)"; } if(-not [string]::IsNullOrEmpty( $this.ExtendedCommand )) { $AppSettingsHT["ExtendedCommand"] = $this.ExtendedCommand $this.PublishCustomMessage("Updating ExtendedCommand overrides the default '-ScanAllResources' behavior of CA.`r`nIf you need that, please specify '-saa' switch in your update CA '-ExtendedCommand'", [MessageType]::Info); } if(-not [string]::IsNullOrEmpty( $this.ProjectNames )) { $AppSettingsHT["ProjectNames"] = $this.ProjectNames } if(-not [string]::IsNullOrEmpty( $this.CRONExp )) { $AppSettingsHT["ScheduleTriggerTime"] = $this.CRONExp } if($this.ClearExtCmd -eq $true) { $AppSettingsHT["ExtendedCommand"] = "" } if(-not [string]::IsNullOrEmpty( $this.WebhookUrl )) { $AppSettingsHT["WebhookUrl"] = $this.WebhookUrl } if(-not [string]::IsNullOrEmpty( $this.WebhookAuthZHeaderName )) { $AppSettingsHT["WebhookAuthZHeaderName"] = $this.WebhookAuthZHeaderName } if(-not [string]::IsNullOrEmpty( $this.WebhookAuthZHeaderValue )) { $AppSettingsHT["WebhookAuthZHeaderValue"] = $this.WebhookAuthZHeaderValue } if($this.AllowSelfSignedWebhookCertificate -eq $true) { $AppSettingsHT["AllowSelfSignedWebhookCertificate"] = "True" } #------------- Begin: DEV-TEST support stuff --------------- if(-not [string]::IsNullOrEmpty( $this.NewImageName )) { Set-AzWebApp -Name $appServResource[0] -ResourceGroupName $this.RGname -ContainerImageName $this.NewImageName } if(-not [string]::IsNullOrEmpty( $this.ModuleEnv )) { $AppSettingsHT["AzSKADOModuleEnv"] = $this.ModuleEnv } if(-not [string]::IsNullOrEmpty( $this.UseDevTestImage )) { $AppSettingsHT["UseDevTestImage"] = $this.UseDevTestImage } if($this.TriggerNextScanInMin -ne 0) { $startScanUTC = [System.DateTime]::UtcNow.AddMinutes($this.TriggerNextScanInMin) $AppSettingsHT["ScheduleTriggerTime"] = "0 $($startScanUTC.Minute) $($startScanUTC.Hour) * * *" #TODO: for dev-test, can we limit daily repetition? } #------------- End: DEV-TEST support stuff --------------- $updatedWebApp = Update-AzFunctionAppSetting -Name $appServResource[0] -ResourceGroupName $this.RGname -AppSetting $AppSettingsHT -Force if($null -eq $updatedWebApp) { $this.PublishCustomMessage("App settings update failed in '$($appServResource[0])'", [MessageType]::Error); } else { $this.PublishCustomMessage("App settings updated in '$($appServResource[0])'", [MessageType]::Update); } } $this.DoNotOpenOutputFolder = $true } } catch { $this.PublishCustomMessage("ADO Scanner CA update failed!", [MessageType]::Error); $this.PublishCustomMessage($_, [MessageType]::Error); $messageData += [MessageData]::new($Error) } return $messageData } [MessageData[]] GetAzSKADOContinuousAssurance() { [MessageData[]] $messageData = @(); $this.messages += ([Constants]::DoubleDashLine + "`r`nStarted validating your AzSK.ADO Continuous Assurance (CA) setup for $($this.OrganizationToScan)`r`n"+[Constants]::DoubleDashLine); $this.PublishCustomMessage($this.messages, [MessageType]::Info); try { $output = $this.ValidateUserPermissions(); if($output -ne 'OK') # if there is issue while validating permissions output will contain exception { $this.PublishCustomMessage("Error validating permissions on the subscription", [MessageType]::Error); $messageData += [MessageData]::new($output) } else { #Step 1: Validate if RG exists. if (-not [string]::IsNullOrEmpty($this.RGname)) { $RG = Get-AzResourceGroup -Name $this.RGname -ErrorAction SilentlyContinue if ($null -eq $RG) { $messageData += [MessageData]::new("Resource group [$($this.RGname)] not found. Please validate the resource group name." ) $this.PublishCustomMessage($messageData.Message, [MessageType]::Error); return $messageData } } #Step 2: Validate if ADOScanner function app exists in the RG $this.PublishCustomMessage("Check 01: Presence of Function app..", [MessageType]::Info); $appServResource = @((Get-AzResource -ResourceGroupName $this.RGname -ResourceType "Microsoft.Web/Sites").Name | where {$_ -match $this.FuncAppName}) if($appServResource.Count -eq 0) { $this.PublishCustomMessage("Status: ADOScanner function app not found in resource group [$($this.RGname)]. Update failed!", [MessageType]::Error); return $messageData } elseif ($appServResource.Count -gt 1) { $this.PublishCustomMessage("Status: More than one ADOScanner app service found in resource group [$($this.RGname)].", [MessageType]::Error); $this.PublishCustomMessage("Consider using the '-RsrcTimeStamp' param. (E.g., For 'ADOScannerFA200915172817' use '-RsrcTimeStamp 200915172817'.)", [MessageType]::Warning); return $messageData } else { $this.FuncAppName = $appServResource[0] $this.PublishCustomMessage("Status: OK. Found the function app [$($this.FuncAppName)].", [MessageType]::Update); $this.TimeStamp = $this.FuncAppName.Replace($this.FuncAppDefaultName,"") } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); #Step 3: Validate if ADOScanner function app is setup for the org provided in command $this.PublishCustomMessage("Check 02: Validating organization name..", [MessageType]::Info); $WebApp = Get-AzWebApp -Name $appServResource[0] -ResourceGroupName $this.RGname $ExistingAppSettings = $WebApp.SiteConfig.AppSettings #convert existing app settings from list to hashtable $AppSettingsHT = @{} foreach ($Setting in $ExistingAppSettings) { $AppSettingsHT["$($Setting.Name)"] = "$($Setting.value)" } if ($AppSettingsHT["OrgName"] -ne $this.OrganizationToScan) { $this.PublishCustomMessage("Status: CA setup is configured for [$($AppSettingsHT["OrgName"])] organization and does not match with provided organization '$($this.OrganizationToScan)'.", [MessageType]::Error); return $messageData } else { $this.PublishCustomMessage("Status: OK. CA is setup for organization [$($this.OrganizationToScan)].", [MessageType]::Update); } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); #Step 4: Validate app settings for additional app settings $this.PublishCustomMessage("Check 03: Validating other app settings..", [MessageType]::Info); if ([string]::IsNullOrEmpty($AppSettingsHT["PATToken"]) -and [string]::IsNullOrEmpty($AppSettingsHT["PATTokenURL"])) { $this.PublishCustomMessage("Status: PAT token is not configured in the CA setup.", [MessageType]::Error); } else { $this.PublishCustomMessage("Status: OK. PAT token is configured in the CA setup.", [MessageType]::Update); } if ([string]::IsNullOrEmpty($AppSettingsHT["ProjectNames"])) { $this.PublishCustomMessage("Status: Project Name is not configured in the CA setup.", [MessageType]::Error); } else { $this.PublishCustomMessage("Status: OK. Project name is configured in the CA setup.", [MessageType]::Update); } if ([string]::IsNullOrEmpty($AppSettingsHT["LAWSId"]) -or [string]::IsNullOrEmpty($AppSettingsHT["LAWSSharedKey"])) { $this.PublishCustomMessage("Status: Log Analytics workspace is not configured in the CA setup.", [MessageType]::Info); } else { $this.PublishCustomMessage("Status: OK. Log analytics is configured in the CA setup.", [MessageType]::Update); } if ([string]::IsNullOrEmpty($AppSettingsHT["AltLAWSId"]) -or [string]::IsNullOrEmpty($AppSettingsHT["AltLAWSSharedKey"])) { $this.PublishCustomMessage("Status: (Info) Alternate Log Analytics workspace is not configured in the CA setup.", [MessageType]::Info); } else { $this.PublishCustomMessage("Status: OK. Alternate Log Analytics workspace is configured in the CA setup.", [MessageType]::Update); } if ([string]::IsNullOrEmpty($AppSettingsHT["ExtendedCommand"])) { $this.PublishCustomMessage("Status: (Info) Extended command is not configured in the CA setup.", [MessageType]::Info); } else { $this.PublishCustomMessage("Status: OK. Extended command is configured in the CA setup.", [MessageType]::Update); } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); #Step 4: Validate if storage exists $this.PublishCustomMessage("Check 04: Validating Storage Account..", [MessageType]::Info); $this.StorageName = "adoscannersa"+$this.TimeStamp $storageAccKey = Get-AzStorageAccountKey -ResourceGroupName $this.RGName -Name $this.StorageName if ($null -eq $storageAccKey) { $this.PublishCustomMessage("Status: Storage account not found in the CA setup.", [MessageType]::Error); } else { $StorageContext = New-AzStorageContext -StorageAccountName $this.StorageName -StorageAccountKey $storageAccKey[0].Value -Protocol Https $containerObject = Get-AzStorageContainer -Context $StorageContext -Name $this.CAScanLogsContainerName -ErrorAction SilentlyContinue if($null -eq $containerObject) { $this.PublishCustomMessage("Status: Scan logs not found in storage. (This is expected if you just setup CA as first scan may not have run yet.)", [MessageType]::Warning); } else { $CAScanDataBlobObject = $this.GetScanLogsFromStorageAccount($this.CAScanLogsContainerName, "$($this.OrganizationToScan.ToLower())/", $StorageContext) if ($null -eq $CAScanDataBlobObject) { $this.PublishCustomMessage("Status: Scan logs not found in storage for last 3 days.", [MessageType]::Error); } else { $this.PublishCustomMessage("Status: OK. Storage account contains scan logs for recent jobs as expected.", [MessageType]::Update); } } } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); #Step 5: Validate image name $this.PublishCustomMessage("Check 05: Validating Image..", [MessageType]::Info); $image = "DOCKER|"+ $this.ImageName if ( $WebApp.SiteConfig.LinuxFxVersion -eq $image) { $this.PublishCustomMessage("Status: OK. Docker image is correctly configured.", [MessageType]::Update); } else { $this.PublishCustomMessage("Status: Docker image is not correctly configured.", [MessageType]::Error); } $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); $this.PublishCustomMessage([Constants]::SingleDashLine, [MessageType]::Default); $this.PublishCustomMessage("You can use 'Update-AzSKADOContinuousAssurance' (UCA) command to modify AzSK ADO CA configurations/settings.", [MessageType]::Update); } } catch { } return $messageData } #get scan logs from storage hidden [PSObject] GetScanLogsFromStorageAccount($containerName, $scanLogsPrefixPattern, $currentContext) { # Get AzSKADO storage of the current sub $recentCAScanDataBlobObject = $null $recentLogLimitInDays = 3 $dayCounter = 0 while($dayCounter -le $recentLogLimitInDays -and $recentCAScanDataBlobObject -eq $null){ $date = [DateTime]::UtcNow.AddDays(-$dayCounter).ToString("yyyyMMdd") $recentLogsPath = $scanLogsPrefixPattern + "ADOCALogs_" + $date $recentCAScanDataBlobObject = Get-AzStorageBlob -Container $containerName -Prefix $recentLogsPath -Context $currentContext -ErrorAction SilentlyContinue $dayCounter += 1 } return $recentCAScanDataBlobObject } } # SIG # Begin signature block # MIIjoQYJKoZIhvcNAQcCoIIjkjCCI44CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCDDVeoiKEo+YlF # 1+XBMqXLx3x7khOTwMw2F6HrDRl17qCCDYEwggX/MIID56ADAgECAhMzAAABh3IX # chVZQMcJAAAAAAGHMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjAwMzA0MTgzOTQ3WhcNMjEwMzAzMTgzOTQ3WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOt8kLc7P3T7MKIhouYHewMFmnq8Ayu7FOhZCQabVwBp2VS4WyB2Qe4TQBT8aB # znANDEPjHKNdPT8Xz5cNali6XHefS8i/WXtF0vSsP8NEv6mBHuA2p1fw2wB/F0dH # sJ3GfZ5c0sPJjklsiYqPw59xJ54kM91IOgiO2OUzjNAljPibjCWfH7UzQ1TPHc4d # weils8GEIrbBRb7IWwiObL12jWT4Yh71NQgvJ9Fn6+UhD9x2uk3dLj84vwt1NuFQ # itKJxIV0fVsRNR3abQVOLqpDugbr0SzNL6o8xzOHL5OXiGGwg6ekiXA1/2XXY7yV # Fc39tledDtZjSjNbex1zzwSXAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhov4ZyO96axkJdMjpzu2zVXOJcsw # UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1 # ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDU4Mzg1MB8GA1UdIwQYMBaAFEhu # ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w # Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx # MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAixmy # S6E6vprWD9KFNIB9G5zyMuIjZAOuUJ1EK/Vlg6Fb3ZHXjjUwATKIcXbFuFC6Wr4K # NrU4DY/sBVqmab5AC/je3bpUpjtxpEyqUqtPc30wEg/rO9vmKmqKoLPT37svc2NV # BmGNl+85qO4fV/w7Cx7J0Bbqk19KcRNdjt6eKoTnTPHBHlVHQIHZpMxacbFOAkJr # qAVkYZdz7ikNXTxV+GRb36tC4ByMNxE2DF7vFdvaiZP0CVZ5ByJ2gAhXMdK9+usx # zVk913qKde1OAuWdv+rndqkAIm8fUlRnr4saSCg7cIbUwCCf116wUJ7EuJDg0vHe # yhnCeHnBbyH3RZkHEi2ofmfgnFISJZDdMAeVZGVOh20Jp50XBzqokpPzeZ6zc1/g # yILNyiVgE+RPkjnUQshd1f1PMgn3tns2Cz7bJiVUaqEO3n9qRFgy5JuLae6UweGf # AeOo3dgLZxikKzYs3hDMaEtJq8IP71cX7QXe6lnMmXU/Hdfz2p897Zd+kU+vZvKI # 3cwLfuVQgK2RZ2z+Kc3K3dRPz2rXycK5XCuRZmvGab/WbrZiC7wJQapgBodltMI5 # GMdFrBg9IeF7/rP4EqVQXeKtevTlZXjpuNhhjuR+2DMt/dWufjXpiW91bo3aH6Ea # jOALXmoxgltCp1K7hrS6gmsvj94cLRf50QQ4U8Qwggd6MIIFYqADAgECAgphDpDS # AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla # MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT # H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG # OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S # 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz # y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7 # 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u # M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33 # X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl # XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP # 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB # l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF # RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM # CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ # BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO # 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y # Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y # Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw # cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA # XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY # 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj # 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd # d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ # Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf # wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ # aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j # NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B # xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96 # eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7 # r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I # RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVdjCCFXICAQEwgZUwfjELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z # b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAYdyF3IVWUDHCQAAAAABhzAN # BglghkgBZQMEAgEFAKCBsDAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor # BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgZiHiZty5 # wbTWZTAdMvRLPuZDvHslZ/AiDyo6OfDgOf0wRAYKKwYBBAGCNwIBDDE2MDSgFIAS # AE0AaQBjAHIAbwBzAG8AZgB0oRyAGmh0dHBzOi8vd3d3Lm1pY3Jvc29mdC5jb20g # MA0GCSqGSIb3DQEBAQUABIIBAGX70vukjyAAUDWw/O0ASaUSox93371ATID4oLZn # sM/O3aOJtopPVwm+NoJvkiTU2OPjDLbR0SxzBe8rmjEpqH9gGnLYeljDIiDG32n0 # q9CosvY9PBNm22j+kRUk6U0UxW78FD+Byc1nie6AbQ3AvyTx6+stjvRZ09yerb04 # 7FzP7We3db9jXJ4TAgsY+VIBiJeQ7aZEZ1KVw+iox/hR/ZXNX89CC+4O0+Te8hWw # WEkuwIdKH8LDm0coTX8UNPIzGJKnkg4cbCLbUJZe6yrg8EJuFb16M9Kz4OY69w7i # 0qX64xUn1SD46O57/T+SqedB3rFbZQP0NvE09vO1R/kVPIqhghL+MIIS+gYKKwYB # BAGCNwMDATGCEuowghLmBgkqhkiG9w0BBwKgghLXMIIS0wIBAzEPMA0GCWCGSAFl # AwQCAQUAMIIBWQYLKoZIhvcNAQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkK # AwEwMTANBglghkgBZQMEAgEFAAQg8JK1zvSus4aogHx9eww//ghPtGuIhN2/p7RU # B0MYgcYCBmAlqWudRRgTMjAyMTAyMTUwNzM0NTEuMTQ3WjAEgAIB9KCB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaCCDk0wggT5MIID4aADAgECAhMzAAABQCMZ1l7e # lSQxAAAAAAFAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwMB4XDTIwMTAxNTE3MjgyNloXDTIyMDExMjE3MjgyNlowgdIxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29m # dCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRT # UyBFU046RkM0MS00QkQ0LUQyMjAxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0 # YW1wIFNlcnZpY2UwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCufWsz # cerVL03TPxH5gqpm7bnKSTk6VPxOy7C10FbIMJEWgBKT18HqyIKiUWFcGHJ6Phzf # IjA3RTIlYE5MCMe144hiN8KnHnf2tuAEjn8FMe0L6pwFPt+0+SdO1Cfz2U05yk/v # R+5hVkuhCwOcuMbHG1b95V7BHlDQjWZZB8nLnE596WTk5aPPdhXgcq2rIhHMll39 # HNxjzDqqbOhI2xgh2+WJPZ55BlvJhN0lCxGjMgpMwsIlQF9WOjDZ8kwO3MMH1cQ5 # 1+E9bO9Q5p1iCqqHSWyUBHs1X3QUWZmBlYBGsbyPtmdWcLkw5c5L80jnxLjzJyy6 # DSk3Y0YsuTZhaPELAgMBAAGjggEbMIIBFzAdBgNVHQ4EFgQUNUMcLiZ3RiCOjNKq # dWz454QtDmcwHwYDVR0jBBgwFoAU1WM6XIoxkPNDe3xGG8UzaFqFbVUwVgYDVR0f # BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJv # ZHVjdHMvTWljVGltU3RhUENBXzIwMTAtMDctMDEuY3JsMFoGCCsGAQUFBwEBBE4w # TDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0 # cy9NaWNUaW1TdGFQQ0FfMjAxMC0wNy0wMS5jcnQwDAYDVR0TAQH/BAIwADATBgNV # HSUEDDAKBggrBgEFBQcDCDANBgkqhkiG9w0BAQsFAAOCAQEAYwxSraBC4IL3Cvhi # EhJ8/Khto1hXc6/hjBaxJ8jP+PXFo31O8sAHYHE+LYK1FuBsFR/jyfTvJF5kifC7 # avy/Aug0bZO1jN7LTUNHKOOw2iIcX1S5EsXIpkKGQoLej2vQ7LbHRhiNSkPFUKFn # mrlwB/DzzjA/SJRxicooafx4nSfCmvvOv9OW74c6NcNP0LvnhpLgpQU2bwPuLC69 # ZbNI5WXtcxZ27zYGedOYHuzY5x/cjhp0bN2LFDlnHFrfM4C8rOtX7QdxVAhjdJAn # 0/OMNGXMK+IxOHEDwVQhEvcWdiq9yFaQShnjDxLsWwZY2VctZDt8cxveXiCO54fI # 7inq1TCCBnEwggRZoAMCAQICCmEJgSoAAAAAAAIwDQYJKoZIhvcNAQELBQAwgYgx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1p # Y3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTEwMDcw # MTIxMzY1NVoXDTI1MDcwMTIxNDY1NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCpHQ28dxGKOiDs # /BOX9fp/aZRrdFQQ1aUKAIKF++18aEssX8XD5WHCdrc+Zitb8BVTJwQxH0EbGpUd # zgkTjnxhMFmxMEQP8WCIhFRDDNdNuDgIs0Ldk6zWczBXJoKjRQ3Q6vVHgc2/JGAy # WGBG8lhHhjKEHnRhZ5FfgVSxz5NMksHEpl3RYRNuKMYa+YaAu99h/EbBJx0kZxJy # GiGKr0tkiVBisV39dx898Fd1rL2KQk1AUdEPnAY+Z3/1ZsADlkR+79BL/W7lmsqx # qPJ6Kgox8NpOBpG2iAg16HgcsOmZzTznL0S6p/TcZL2kAcEgCZN4zfy8wMlEXV4W # nAEFTyJNAgMBAAGjggHmMIIB4jAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQU # 1WM6XIoxkPNDe3xGG8UzaFqFbVUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEw # CwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/o # olxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5t # aWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5j # cnQwgaAGA1UdIAEB/wSBlTCBkjCBjwYJKwYBBAGCNy4DMIGBMD0GCCsGAQUFBwIB # FjFodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vUEtJL2RvY3MvQ1BTL2RlZmF1bHQu # aHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAFAAbwBsAGkAYwB5AF8A # UwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQAH5ohRDeLG # 4Jg/gXEDPZ2joSFvs+umzPUxvs8F4qn++ldtGTCzwsVmyWrf9efweL3HqJ4l4/m8 # 7WtUVwgrUYJEEvu5U4zM9GASinbMQEBBm9xcF/9c+V4XNZgkVkt070IQyK+/f8Z/ # 8jd9Wj8c8pl5SpFSAK84Dxf1L3mBZdmptWvkx872ynoAb0swRCQiPM/tA6WWj1kp # vLb9BOFwnzJKJ/1Vry/+tuWOM7tiX5rbV0Dp8c6ZZpCM/2pif93FSguRJuI57BlK # cWOdeyFtw5yjojz6f32WapB4pm3S4Zz5Hfw42JT0xqUKloakvZ4argRCg7i1gJsi # OCC1JeVk7Pf0v35jWSUPei45V3aicaoGig+JFrphpxHLmtgOR5qAxdDNp9DvfYPw # 4TtxCd9ddJgiCGHasFAeb73x4QDf5zEHpJM692VHeOj4qEir995yfmFrb3epgcun # Caw5u+zGy9iCtHLNHfS4hQEegPsbiSpUObJb2sgNVZl6h3M7COaYLeqN4DMuEin1 # wC9UJyH3yKxO2ii4sanblrKnQqLJzxlBTeCG+SqaoxFmMNO7dDJL32N79ZmKLxvH # Ia9Zta7cRDyXUHHXodLFVeNp3lfB0d4wwP3M5k37Db9dT+mdHhk4L7zPWAUu7w2g # UDXa7wknHNWzfjUeCLraNtvTX4/edIhJEqGCAtcwggJAAgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqXmHvITpjsyl+Yy # kRtDOQlyUVOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOPUHAwwIhgPMjAyMTAyMTUwNjAwNDRaGA8yMDIxMDIx # NjA2MDA0NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA49QcDAIBADAKAgEAAgIl # 1gIB/zAHAgEAAgIRTTAKAgUA49VtjAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA # A4GBAIDbKVDg4tOREtk+wHaJvFbgLVp52tXWkLz1ze7/HfO5BFa4IBOHrnPcuQyM # H0V4HQMPoK2v3HSxQ0+dFW40Rl1UGL983jqVYwh7Eqg7rN+H3ZncaB+IiTiTI9vo # 2Yfr5b2wHLpA2V5rQjphqBxqNzAuTAO413aksgv1v6nA8zbaMYIDDTCCAwkCAQEw # gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAFAIxnWXt6VJDEA # AAAAAUAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B # CRABBDAvBgkqhkiG9w0BCQQxIgQg9oh3UyKKCHczXPKLiP2KvNWTvm90gTOB2I2/ # gtHQw2AwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAvNrC16szSpFwk7/Ny # 8lPt2j/JynxFmxFJOqq2AgiXgzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAABQCMZ1l7elSQxAAAAAAFAMCIEICb9dx8657GfP9wxqCCx # tL8V9+s+JfrRoOh7+rM4HrNTMA0GCSqGSIb3DQEBCwUABIIBAEhu5BkJGOldotfA # jHpKRoGHsUH3IIOjub/ZXLqQBHlHOwZElZG/l/su/l95i0jEhsZHtbbRm472oAen # hyE7F3hGrpR/fvXJzekutMyWLs72i2a8Ty4La+DqcKcbTNw7rXw8PvmumhSi8WWW # TGtjBOAbU1ctUenh7JC2fgB0TQKYwH5XCDJSxJhUJbwWEY8BH/5fdFZGpBSOQHV7 # gBQQKtizkRIVXEY3lzvShN3kyh8CGbOy7ENd4PiE8Q2UURpPaHZm0lurHzzhV2Wg # +P0PdIkMRV4yWBnT0ljuocL/xHn0LZD1y6MjHF+rCV7M1N3rj2f3Nuo3ZvDeqZLy # KAGYkR0= # SIG # End signature block |