ContainerHandling/New-NavContainer.ps1
<#
.Synopsis Create or refresh a NAV/BC Container .Description Creates a new Container based on a Docker Image Adds shortcut on the desktop for Web Client and Container PowerShell prompt .Parameter accept_eula Switch, which you need to specify if you accept the eula for running NAV or Business Central on Docker containers (See https://go.microsoft.com/fwlink/?linkid=861843) .Parameter accept_insiderEula Switch, which you need to specify if you are going to create a container with an insider build of Business Central on Docker containers (See https://go.microsoft.com/fwlink/?linkid=2245051) .Parameter accept_outdated Specify accept_outdated to ignore error when running containers which are older than 90 days .Parameter containerName Name of the new Container (if the container already exists it will be replaced) .Parameter imageName Name of the image you want to use for your Container .Parameter artifactUrl Url for application artifact to use. If you also specify an ImageName, an image will be build (if it doesn't exist) using these artifacts and that will be run. .Parameter dvdPath When you are spinning up a Generic image, you need to specify the DVD path .Parameter dvdCountry When you are spinning up a Generic image, you need to specify the country version (w1, dk, etc.) (default is w1) .Parameter dvdVersion When you are spinning up a Generic image, you can specify the version (default is the version of the executables) .Parameter dvdPlatform When you are spinning up a Generic image, you can specify the platform version (default is the version of the executables) .Parameter locale Optional locale for the container. Default is to deduct the locale from the country version of the container. .Parameter setServiceTierUserLocale Include this switch if you want to set the locale for the Service Tier User (NT AUTHORITY\SYSTEM) .Parameter licenseFile Path or Secure Url of the licenseFile you want to use .Parameter credential Username and Password for the Container .Parameter AuthenticationEmail AuthenticationEmail of the admin user .Parameter memoryLimit Memory limit for the container (default is unlimited for process isolation and 8G for HyperV isolation containers) .Parameter sqlMemoryLimit Memory limit for the SQL inside the container (default is no limit) Value can be specified as 50%, 1.5G, 1500M .Parameter isolation Isolation mode for the container (default is process isolation if host and container OS match) .Parameter databaseServer Name of database server when using external SQL Server (omit if using database inside the container) .Parameter databaseInstance Name of database instance when using external SQL Server (omit if using database inside the container) .Parameter databasePrefix Prefix of databases when using external SQL Server (omit if using database inside the container) .Parameter databaseName Name of database to connect to when using external SQL Server (omit if using database inside the container) .Parameter replaceExternalDatabases Include this switch to allow New-BcContainer to create/replace databases on the external SQL Server. This parameter is ignored unless databaseServer, databasePrefix and databaseName is specified This parameter uses Remove-BcDatabase and Restore-BcDatabaseFromArtifacts to remove and create the databases Access to the SQL Server on the host must be Windows Authentication .Parameter bakFile Path or Secure Url of a bakFile if you want to restore a database in the container .Parameter bakFolder A folder in which a backup of the database(s) will be placed after the container has been created and initialized If the folder already exists, then the database(s) in this folder will be restored and used. .Parameter databaseCredential Credentials for the database connection when using external SQL Server (omit if using database inside the container) .Parameter shortcuts Location where the Shortcuts will be placed. Can be either None, Desktop or StartMenu .Parameter updateHosts Include this switch if you want to update the hosts file with the IP address of the container .Parameter useSSL Include this switch if you want to use SSL (https) with a self-signed certificate .Parameter installCertificateOnHost Include this switch if you want to use SSL (https) with a self-signed certificate .Parameter includeCSide Include this switch if you want to have Windows Client and CSide development environment available on the host. This switch will also export all objects as txt for object handling functions unless doNotExportObjectsAsText is set. .Parameter includeAL Include this switch if you want to have all objects exported as al for code merging and comparing functions unless doNotExportObjectsAsText is set. .Parameter enableSymbolLoading Include this switch if you want to do development in both CSide and VS Code to have symbols automatically generated for your changes in CSide .Parameter enableTaskScheduler Include this switch if you want to do Enable the Task Scheduler .Parameter doNotExportObjectsToText Avoid exporting objects for baseline from the container (Saves time, but you will not be able to use the object handling functions without the baseline) .Parameter alwaysPull Always pull latest version of the docker image .Parameter forceRebuild Force a rebuild of the cached image even if the generic image or os hasn't changed .Parameter useBestContainerOS Use the best Container OS based on the Host OS. If the OS doesn't match, a better public generic image is selected. .Parameter useGenericImage Specify a private (or special) generic image to use for the Container OS. .Parameter assignPremiumPlan Assign Premium plan to admin user .Parameter filesOnly Include this switch to create a filesOnly container. A filesOnly container does not contain SQL Server, IIS or the ServiceTier, it only contains the files from BC in the same locations as a normal container. A FilesOnly container can be used to compile apps and it can be used as a proxy container for an online Business Central environment .Parameter multitenant Setup container for multitenancy by adding this switch .Parameter addFontsFromPath Enumerate all fonts from this path or array of paths and install them in the container .Parameter featureKeys Optional hashtable of featureKeys, which can be applied to the container database .Parameter clickonce Specify the clickonce switch if you want to have a clickonce version of the Windows Client created .Parameter includeTestToolkit Specify this parameter to add the test toolkit and the standard tests to the container .Parameter includeTestLibrariesOnly Specify this parameter to avoid including the standard tests when adding includeTestToolkit .Parameter includeTestFrameworkOnly Only import TestFramework (do not import Test Codeunits nor TestLibraries) .Parameter includePerformanceToolkit Include the performance toolkit app (only 17.x and later) .Parameter restart Define the restart option for the container .Parameter auth Set auth to Windows, NavUserPassword or AAD depending on which authentication mechanism your container should use .Parameter timeout Specify the number of seconds to wait for activity. Default is 1800 (30 min.). -1 means wait forever. .Parameter additionalParameters This allows you to transfer an additional number of parameters to the docker run .Parameter myscripts This allows you to specify a number of scripts you want to copy to the c:\run\my folder in the container (override functionality) .Parameter TimeZoneId This parameter specifies the timezone in which you want to start the Container. .Parameter WebClientPort Use this parameter to specify which port to use for the WebClient. Default is 80 if http and 443 if https. .Parameter FileSharePort Use this parameter to specify which port to use for the File Share. Default is 8080. .Parameter ManagementServicesPort Use this parameter to specify which port to use for Management Services. Default is 7045. .Parameter ClientServicesPort Use this parameter to specify which port to use for Client Services. Default is 7046. .Parameter SoapServicesPort Use this parameter to specify which port to use for Soap Web Services. Default is 7047. .Parameter ODataServicesPort Use this parameter to specify which port to use for OData Web Services. Default is 7048. .Parameter DeveloperServicesPort Use this parameter to specify which port to use for Developer Services. Default is 7049. .Parameter PublishPorts Use this parameter to specify the ports you want to publish on the host. Default is to NOT publish any ports. This parameter is necessary if you want to be able to connect to the container from outside the host. .Parameter PublicDnsName Use this parameter to specify which public dns name is pointing to this container. This parameter is necessary if you want to be able to connect to the container from outside the host. .Parameter network Use this parameter to override the default network settings in the container (corresponds to --network on docker run) .Parameter macAddress Use this parameter to override the default mac-address settings in the container (corresponds to --mac-address on docker run) .Parameter IP Use this parameter to override the default mac-address settings in the container (corresponds to --ip on docker run) .Parameter hostIP Use this parameter to set the default host IP address in the container .Parameter dns Use this parameter to override the default dns settings in the container (corresponds to --dns on docker run) .Parameter runTxt2AlInContainer Specify a foreign container in which you want to run the txt2al tool when using -includeAL .Parameter useTraefik Set the necessary options to make the container work behind a traefik proxy as explained here https://www.axians-infoma.com/techblog/running-multiple-nav-bc-containers-on-an-azure-vm/ .Parameter useCleanDatabase Add this switch if you want to uninstall all extensions and remove the base app from the container .Parameter useNewDatabase Add this switch if you want to create a new and empty database in the container .Parameter runSandboxAsOnPrem This parameter will attempt to run sandbox artifacts as onprem (will only work with version 18 and later) .Parameter doNotCopyEntitlements Specify this parameter to avoid copying entitlements when using -useNewDatabase .Parameter copyTables Array of table names to copy from original database when using -useNewDatabase .Parameter dumpEventLog Add this switch if you want the container to dump new entries in the eventlog to the output (docker logs) every 2 seconds .Parameter doNotCheckHealth Add this switch if you want to avoid CPU usage on health check. .Parameter doNotUseRuntimePackages Include the doNotUseRuntimePackages switch if you do not want to cache and use the test apps as runtime packages (only 15.x containers) .Parameter finalizeDatabasesScriptBlock In this scriptblock you can install additional apps or import additional objects in your container. These apps/objects will be included in the backup if you specify bakFolder and this script will NOT run if a backup already exists in bakFolder. .Parameter vsixFile Specify a URL or path to a .vsix file in order to override the .vsix file in the image with this. Use Get-LatestAlLanguageExtensionUrl to get latest AL Language extension from Marketplace. Use Get-AlLanguageExtensionFromArtifacts -artifactUrl (Get-BCArtifactUrl -select NextMajor -accept_insiderEula) to get latest insider .vsix .Parameter sqlTimeout SQL Timeout for database restore operations .Example New-BcContainer -accept_eula -containerName test .Example New-BcContainer -accept_eula -containerName test -accept_insiderEula -artifactUrl (Get-BcArtifactUrl -accept_insiderEula -country dk -select NextMajor) .Example New-BcContainer -accept_eula -containerName test -multitenant .Example New-BcContainer -accept_eula -containerName test -memoryLimit 3G -artifactUrl (Get-NavArtifactUrl -nav 2017 -country w1) -updateHosts -imageName my .Example New-BcContainer -accept_eula -containerName test -artifactUrl (Get-BcArtifactUrl -type onprem -country dk) -myScripts @("c:\temp\AdditionalSetup.ps1") -AdditionalParameters @("-v c:\hostfolder:c:\containerfolder") .Example New-BcContainer -accept_eula -containerName test -credential (get-credential -credential $env:USERNAME) -licenseFile "https://www.dropbox.com/s/fhwfwjfjwhff/license.flf?dl=1" -artifactUrl (Get-BcArtifactUrl -country de) #> function New-BcContainer { Param ( [switch] $accept_eula, [switch] $accept_insiderEula, [switch] $accept_outdated = $true, [string] $containerName = $bcContainerHelperConfig.defaultContainerName, [string] $imageName = "", [string] $artifactUrl = "", [Alias('navDvdPath')] [string] $dvdPath = "", [Alias('navDvdCountry')] [string] $dvdCountry = "", [Alias('navDvdVersion')] [string] $dvdVersion = "", [Alias('navDvdPlatform')] [string] $dvdPlatform = "", [string] $locale = "", [switch] $setServiceTierUserLocale, [string] $licenseFile = "", [PSCredential] $Credential = $null, [string] $authenticationEMail = "", [string] $AadTenant = "", [string] $AadAppId = "", [string] $AadAppIdUri = "", [string] $memoryLimit = "", [string] $sqlMemoryLimit = "", [ValidateSet('','process','hyperv')] [string] $isolation = "", [string] $databaseServer = "", [string] $databaseInstance = "", [string] $databasePrefix = "", [string] $databaseName = "", [switch] $replaceExternalDatabases, [string] $bakFile = "", [string] $bakFolder = "", [PSCredential] $databaseCredential = $null, [ValidateSet('None','Desktop','StartMenu','CommonStartMenu','CommonDesktop','DesktopFolder','CommonDesktopFolder')] [string] $shortcuts='Desktop', [switch] $updateHosts, [switch] $useSSL, [switch] $installCertificateOnHost, [switch] $includeAL, [string] $runTxt2AlInContainer = $containerName, [switch] $includeCSide, [switch] $enableSymbolLoading, [switch] $enableTaskScheduler, [switch] $doNotExportObjectsToText, [switch] $alwaysPull, [switch] $forceRebuild, [switch] $useBestContainerOS, [string] $useGenericImage, [switch] $assignPremiumPlan, [switch] $multitenant, [switch] $filesOnly, [string[]] $addFontsFromPath = @(""), [hashtable] $featureKeys = $null, [switch] $clickonce, [switch] $includeTestToolkit, [switch] $includeTestLibrariesOnly, [switch] $includeTestFrameworkOnly, [switch] $includePerformanceToolkit, [ValidateSet('no','on-failure','unless-stopped','always')] [string] $restart='unless-stopped', [ValidateSet('Windows','NavUserPassword','UserPassword','AAD')] [string] $auth='Windows', [int] $timeout = 1800, [int] $sqlTimeout = 300, [string[]] $additionalParameters = @(), $myScripts = @(), [string] $TimeZoneId = $null, [int] $WebClientPort, [int] $FileSharePort, [int] $ManagementServicesPort, [int] $ClientServicesPort, [int] $SoapServicesPort, [int] $ODataServicesPort, [int] $DeveloperServicesPort, [int[]] $PublishPorts = @(), [string] $PublicDnsName, [string] $network = "", [string] $hostIP = "", [string] $macAddress = "", [string] $IP = "", [string] $dns = "", [switch] $useTraefik, [switch] $useCleanDatabase, [switch] $useNewDatabase, [switch] $runSandboxAsOnPrem, [switch] $doNotCopyEntitlements, [string[]] $copyTables = @(), [switch] $dumpEventLog, [switch] $doNotCheckHealth, [switch] $doNotUseRuntimePackages = $true, [string] $vsixFile = "", [string] $applicationInsightsKey, [scriptblock] $finalizeDatabasesScriptBlock ) $telemetryScope = InitTelemetryScope ` -name $MyInvocation.InvocationName ` -parameterValues $PSBoundParameters ` -includeParameters @("containerName","artifactUrl","isolation","imageName","multitenant","filesOnly") try { $defaultNewContainerParameters = $bcContainerHelperConfig.defaultNewContainerParameters if ($defaultNewContainerParameters -is [HashTable]) { $defaultNewContainerParameters.GetEnumerator() | ForEach-Object { if (!($PSBoundParameters.ContainsKey($_.Name))) { if ($_.Name -eq "Credential" -or $_.Name -eq "DatabaseCredential") { Write-Host "Default parameter $($_.Name)" Set-Variable -Name $_.Name -Value (New-Object pscredential -ArgumentList $_.Value.Username, ($_.Value.Password | ConvertTo-SecureString)) } else { Write-Host "Default parameter $($_.Name) = $($_.Value)" Set-Variable -name $_.Name -Value $_.Value } } elseif ($_.Name -eq "AdditionalParameters") { Write-Host "Merging $($_.Name)" $additionalParameters = $_.Value + $additionalParameters } elseif ($_.Name -eq "MyScripts") { Write-Host "Merging $($_.Name)" $myScripts = $_.Value + $myScripts } } } elseif ($defaultNewContainerParameters -is [PSCustomObject]) { $defaultNewContainerParameters.PSObject.Properties | ForEach-Object { if (!($PSBoundParameters.ContainsKey($_.Name))) { if ($_.Name -eq "Credential" -or $_.Name -eq "DatabaseCredential") { Write-Host "Default parameter $($_.Name)" Set-Variable -Name $_.Name -Value (New-Object pscredential -ArgumentList $_.Value.Username, ($_.Value.Password | ConvertTo-SecureString)) } else { Write-Host "Default parameter $($_.Name) = $($_.Value)" Set-Variable -name $_.Name -Value $_.Value } } elseif ($_.Name -eq "AdditionalParameters") { Write-Host "Merging $($_.Name)" $additionalParameters = $_.Value + $additionalParameters } elseif ($_.Name -eq "MyScripts") { Write-Host "Merging $($_.Name)" $myScripts = $_.Value + $myScripts } } } if (!$accept_eula) { throw "You have to accept the eula (See https://go.microsoft.com/fwlink/?linkid=861843) by specifying the -accept_eula switch to the function" } if ($includePerformanceToolkit) { if (!$includeTestToolkit) { $includeTestToolkit = $true $includeTestFrameworkOnly = $true } } Check-BcContainerName -ContainerName $containerName $imageName = $imageName.ToLowerInvariant() if (!$useSSL) { try { $hsts = (New-Object System.Net.WebClient).DownloadString('https://hstspreload.com/api/v1/status/$containerName') | ConvertFrom-Json if (($hsts.chrome) -or ($hsts.firefox) -or ($hsts.tor)) { Write-Host -ForegroundColor Red "WARNING: '$containername' is in the HSTS preload list. You cannot use the container unless you use SSL and a trusted certificate.`nAdd -useSSL and -installCertificateOnHost to use a self signed certificate and install it in trusted root certifications on the host." } } catch {} } if ($imageName -like 'microsoft/dynamics-nav:*' -or $imageName -like 'microsoft/bcsandbox:*') { throw "ERROR: Images are no longer available on Docker hub. You should use artifacts instead of specific docker images." } if ($Credential -eq $null -or $credential -eq [System.Management.Automation.PSCredential]::Empty) { if ($filesOnly) { $credential = New-Object pscredential -ArgumentList 'admin', (ConvertTo-SecureString -String (GetRandomPassword) -AsPlainText -Force) } elseif ($auth -eq "Windows") { $credential = get-credential -UserName $env:USERNAME -Message "Using Windows Authentication. Please enter your Windows credentials." } else { $credential = get-credential -Message "Using $auth Authentication. Please enter username/password for the Containter." } if ($Credential -eq $null -or $credential -eq [System.Management.Automation.PSCredential]::Empty) { throw "You have to specify credentials for your Container" } } if ($auth -eq "Windows") { if ($credential.Username.Contains('@')) { throw "You cannot use a Microsoft account, you need to use a local Windows user account (like $env:USERNAME)" } if ($credential.Username.Contains('\')) { throw "The username cannot contain domain information, you need to use a local Windows user account (like $env:USERNAME)" } } if ($auth -eq "AAD") { if ("$authenticationEMail" -eq "") { throw "When using AAD authentication, you have to specify AuthenticationEMail for the user: $($credential.UserName)" } } if ($auth -eq "UserPassword") { $auth = "NavUserPassword" } $myScripts | ForEach-Object { if ($_ -is [string]) { if ($_.StartsWith("https://", "OrdinalIgnoreCase") -or $_.StartsWith("http://", "OrdinalIgnoreCase")) { } elseif (!(Test-Path $_)) { throw "Script directory or file $_ does not exist" } } elseif ($_ -isnot [Hashtable] -and $_ -isnot [PSCustomObject]) { throw "Illegal value in myScripts" } } $os = (Get-CimInstance Win32_OperatingSystem) if ($os.OSType -ne 18 -or !$os.Version.StartsWith("10.0.")) { throw "Unknown Host Operating System" } $UBR = (Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name UBR).UBR $hostOsVersion = [System.Version]::Parse("$($os.Version).$UBR") $hostOs = "Unknown/Insider build" $bestGenericImageName = Get-BestGenericImageName -onlyMatchingBuilds -filesOnly:$filesOnly $isServerHost = $os.ProductType -eq 3 if ($os.BuildNumber -eq 22631) { $hostOs = "23H2" } elseif ($os.BuildNumber -eq 22621) { $hostOs = "22H2" } elseif ($os.BuildNumber -eq 22000) { $hostOs = "21H2" } elseif ($os.BuildNumber -eq 20348) { $hostOs = "ltsc2022" } elseif ($os.BuildNumber -eq 19045) { $hostOs = "22H2" } elseif ($os.BuildNumber -eq 19044) { $hostOs = "21H2" } elseif ($os.BuildNumber -eq 19043) { $hostOs = "21H1" } elseif ($os.BuildNumber -eq 19042) { $hostOs = "20H2" } elseif ($os.BuildNumber -eq 19041) { $hostOs = "2004" } elseif ($os.BuildNumber -eq 18363) { $hostOs = "1909" } elseif ($os.BuildNumber -eq 18362) { $hostOs = "1903" } elseif ($os.BuildNumber -eq 17763) { if ($isServerHost) { $hostOs = "ltsc2019" } else { $hostOs = "1809" } } elseif ($os.BuildNumber -eq 17134) { $hostOs = "1803" } elseif ($os.BuildNumber -eq 16299) { $hostOs = "1709" } elseif ($os.BuildNumber -eq 15063) { $hostOs = "1703" } elseif ($os.BuildNumber -eq 14393) { if ($isServerHost) { $hostOs = "ltsc2016" } else { $hostOs = "1607" } } Write-Host "BcContainerHelper is version $BcContainerHelperVersion" if ($isAdministrator) { Write-Host "BcContainerHelper is running as administrator" Write-Host "HyperV is $(Get-HypervState)" } else { Write-Host "BcContainerHelper is not running as administrator" } if ($isInsideContainer) { Write-Host "BcContainerHelper is running inside a Container" } Write-Host "Host is $($os.Caption) - $hostOsVersion" Write-Host "UsePsSession is $($bcContainerHelperConfig.usePsSession)" Write-Host "UsePwshForBc24 is $($bcContainerHelperConfig.usePwshForBc24)" Write-Host "UseWinRmSession is $($bcContainerHelperConfig.useWinRmSession)" Write-Host "UseSslForWinRmSession is $($bcContainerHelperConfig.useSslForWinRmSession)" $dockerProcess = (Get-Process "dockerd" -ErrorAction Ignore) if (!($dockerProcess)) { Write-Host -ForegroundColor Red "Dockerd process not found. Docker might not be started, not installed or not running Windows Containers. If Docker Desktop is already installed, open the system tray, right-click on the Docker icon, and select 'Switch to Windows containers...'" } $dockerVersion = docker version -f "{{.Server.Os}}/{{.Client.Version}}/{{.Server.Version}}" $dockerOS = $dockerVersion.Split('/')[0] $dockerClientVersion = $dockerVersion.Split('/')[1] $dockerServerVersion = $dockerVersion.Split('/')[2] if ("$dockerOS" -eq "") { throw "Docker service is not yet ready." } elseif ($dockerOS -ne "Windows") { throw "Docker is running $dockerOS containers, you need to switch to Windows containers." } Write-Host "Docker Client Version is $dockerClientVersion" AddTelemetryProperty -telemetryScope $telemetryScope -key "dockerClientVersion" -value $dockerClientVersion Write-Host "Docker Server Version is $dockerServerVersion" AddTelemetryProperty -telemetryScope $telemetryScope -key "dockerServerVersion" -value $dockerServerVersion $doNotGetBestImageName = $false $skipDatabase = $false if ($bakFile -ne "" -or $databaseServer -ne "" -or $databaseInstance -ne "" -or "$databasePrefix$databaseName" -ne "") { $skipDatabase = $true } if ($imageName -eq "" -and $artifactUrl -eq "" -and $dvdPath -eq "") { throw "You have to specify artifactUrl or imageName when creating a new container." } # Remove if it already exists Remove-BcContainer $containerName $createTenantAndUserInExternalDatabase = $false if ($artifactUrl) { # When using artifacts, you always use best container os - no need to replatform $useBestContainerOS = $false if ($artifactUrl -like 'https://bcinsider*') { if (!$accept_insiderEULA) { throw "You need to accept the insider EULA (https://go.microsoft.com/fwlink/?linkid=2245051) by specifying -accept_insiderEula" } } $artifactPaths = Download-Artifacts -artifactUrl $artifactUrl -includePlatform -forceRedirection:$alwaysPull $appArtifactPath = $artifactPaths[0] $platformArtifactPath = $artifactPaths[1] $appManifestPath = Join-Path $appArtifactPath "manifest.json" $appManifest = Get-Content $appManifestPath | ConvertFrom-Json if ($appManifest.version -like "21.0.*" -and $licenseFile -eq "") { Write-Host "The CRONUS Demo License shipped in Version 21.0 artifacts doesn't contain sufficient rights to all Test Libraries objects. Patching the license file." $country = $appManifest.Country.ToLowerInvariant() if (@('at','au','be','ca','ch','cz','de','dk','es','fi','fr','gb','in','is','it','mx','nl','no','nz','ru','se','us') -contains $country) { $licenseFile = "https://bcartifacts-exdbf9fwegejdqak.b02.azurefd.net/prerequisites/21demolicense/$country/3048953.bclicense" } else { $licenseFile = "https://bcartifacts-exdbf9fwegejdqak.b02.azurefd.net/prerequisites/21demolicense/w1/3048953.bclicense" } } if ($runSandboxAsOnPrem -and $appManifest.version -lt [Version]"18.0.0.0") { $runSandboxAsOnPrem = $false Write-Host -ForegroundColor Red "Cannot run sandbox artifacts before version 18 as onprem" } $bcstyle = "onprem" if (!$runSandboxAsOnPrem -and ($appManifest.PSObject.Properties.name -eq "isBcSandbox")) { if ($appManifest.isBcSandbox) { $bcstyle = "sandbox" if (!($PSBoundParameters.ContainsKey('multitenant')) -and !$skipDatabase) { $multitenant = $bcContainerHelperConfig.sandboxContainersAreMultitenantByDefault } } } if ($databaseServer -ne "" -and $databasePrefix -ne "" -and $databaseName -ne "" -and $replaceExternalDatabases) { if ($bcstyle -eq "sandbox" -and (!($PSBoundParameters.ContainsKey('multitenant')))) { $multitenant = $bcContainerHelperConfig.sandboxContainersAreMultitenantByDefault } Remove-BcDatabase -databaseServer $databaseServer -databaseInstance $databaseInstance -databaseName "$($databasePrefix)%" Restore-BcDatabaseFromArtifacts -artifactUrl $artifactUrl -databaseServer $databaseServer -databaseInstance $databaseInstance -databasePrefix $databasePrefix -databaseName $databaseName -multitenant:$multitenant -bakFile $bakFile -async $createTenantAndUserInExternalDatabase = $true $bakFile = "" $successFileName = Join-Path $bcContainerHelperConfig.containerHelperFolder "$($databasePrefix)databasescreated.txt" $myscripts += @( @{ "SetupDatabase.ps1" = "if (!(Test-Path ""$successFileName"")) { Write-Host 'Waiting for database creation to finish'; while (!(Test-Path ""$successFileName"")) { Start-Sleep -seconds 5 }; } Get-Content ""$successFileName"" | Out-Host; . 'c:\run\setupDatabase.ps1'" } ) ` } } Write-Host "Fetching all docker images" $allImages = @(docker images --format "{{.Repository}}:{{.Tag}}") Write-Host "Fetching all docker volumes" $allVolumes = @(docker volume ls --format "{{.Mountpoint}}|{{.Name}}") if ($imageName -ne "") { if ($artifactUrl -eq "") { if ($imageName -like "mcr.microsoft.com/*") { Write-Host -ForegroundColor Red "WARNING: You are running specific Docker images from mcr.microsoft.com. These images will no longer be updated and will be removed on January 2nd 2021, you should switch to user Docker artifacts. See https://freddysblog.com/2020/07/05/july-updates-are-out-they-are-the-last-on-premises-docker-images/" } if ($imageName -like "bcinsider.azurecr.io/*") { Write-Host -ForegroundColor Red "WARNING: You are running specific Docker images from bcinsider.azurecr.io. These images will no longer be updated and will be removed on January 2nd 2021, you should switch to user Docker artifacts. See https://freddysblog.com/2020/07/05/july-updates-are-out-they-are-the-last-on-premises-docker-images/" } } else { Write-Host "ArtifactUrl and ImageName specified" $mtImage = $multitenant if ($useNewDatabase -or $useCleanDatabase) { $mtImage = $false } $imageName = New-Bcimage ` -artifactUrl $artifactUrl ` -imageName $imagename ` -isolation $isolation ` -baseImage $useGenericImage ` -memory $memoryLimit ` -skipDatabase:$skipDatabase ` -multitenant:$mtImage ` -addFontsFromPath $addFontsFromPath ` -licenseFile $licensefile ` -includeTestToolkit:$includeTestToolkit ` -includeTestFrameworkOnly:$includeTestFrameworkOnly ` -includeTestLibrariesOnly:$includeTestLibrariesOnly ` -includePerformanceToolkit:$includePerformanceToolkit ` -skipIfImageAlreadyExists:(!$forceRebuild) ` -runSandboxAsOnPrem:$runSandboxAsOnPrem ` -allImages $allImages ` -filesOnly:$filesOnly if (-not ($allImages | Where-Object { $_ -eq $imageName })) { $allImages += $imageName } $artifactUrl = "" $alwaysPull = $false $useGenericImage = "" $doNotGetBestImageName = $true } } if (!($PSBoundParameters.ContainsKey('useTraefik'))) { $traefikForBcBasePath = "c:\programdata\bccontainerhelper\traefikforbc" if (Test-Path -Path (Join-Path $traefikForBcBasePath "traefik.txt") -PathType Leaf) { if (-not $PublicDnsName) { $wwwRootPath = Get-WWWRootPath if ($wwwRootPath) { $hostNameTxtFile = Join-Path $wwwRootPath "hostname.txt" if ((Test-Path $hostNameTxtFile) -and -not $PublicDnsName) { $PublicDnsName = Get-Content -Path $hostNameTxtFile } } } if ($publicDnsName) { Write-Host -ForegroundColor Yellow "WARNING: useTraefik not specified, but Traefik container was initialized, using Traefik. Specify -useTraefik:`$false if you do NOT want to use Traefik." $useTraefik = $true } } } if ($useTraefik) { $traefikForBcBasePath = "c:\programdata\bccontainerhelper\traefikforbc" if (-not (Test-Path -Path (Join-Path $traefikForBcBasePath "traefik.txt") -PathType Leaf)) { throw "Traefik container was not initialized. Please call Setup-TraefikContainerForBcContainers before using -useTraefik" } $forceHttpWithTraefik = $false if ((Get-Content (Join-Path $traefikForBcBasePath "config\traefik.toml") | Foreach-Object { $_ -match "^insecureSkipVerify = true$" } ) -notcontains $true) { $forceHttpWithTraefik = $true } if ($PublishPorts.Count -gt 0 -or $WebClientPort -or $FileSharePort -or $ManagementServicesPort -or $SoapServicesPort -or $ODataServicesPort -or $DeveloperServicesPort) { throw "When using Traefik, all external communication comes in through port 443, so you can't change the ports" } if ($forceHttpWithTraefik) { Write-Host "Disabling SSL on the container as you have configured -forceHttpWithTraefik" $useSSL = $false } else { Write-Host "Enabling SSL as otherwise all clients will see mixed HTTP / HTTPS request, which will cause problems e.g. on the mobile and modern windows clients" $useSSL = $true } $wwwRootPath = Get-WWWRootPath if ($wwwRootPath) { $hostNameTxtFile = Join-Path $wwwRootPath "hostname.txt" if ((Test-Path $hostNameTxtFile) -and -not $PublicDnsName) { $PublicDnsName = Get-Content -Path $hostNameTxtFile } } if (-not $PublicDnsName) { throw "Using Traefik only makes sense if you allow external access, so you have to provide the public DNS name (param -PublicDnsName)" } } $parameters = @() $customNavSettings = @() $customWebSettings = @() $devCountry = $dvdCountry $navVersion = $dvdVersion $bcStyle = "onprem" $downloadsPath = $bcContainerHelperConfig.bcartifactsCacheFolder if (!(Test-Path $downloadsPath)) { New-Item $downloadsPath -ItemType Directory | Out-Null } if ($imageName -eq "") { if ($artifactUrl) { if ($useGenericImage) { $imageName = $useGenericImage } else { $imageName = Get-BestGenericImageName -filesOnly:$filesOnly } } elseif ("$dvdPath" -ne "") { if ($useGenericImage) { $imageName = $useGenericImage } else { $imageName = Get-BestGenericImageName -filesOnly:$filesOnly } } elseif (Test-BcContainer -containerName $bcContainerHelperConfig.defaultContainerName) { $artifactUrl = Get-BcContainerArtifactUrl -containerName $bcContainerHelperConfig.defaultContainerName if ($artifactUrl) { if ($useGenericImage) { $imageName = $useGenericImage } else { $imageName = Get-BestGenericImageName -filesOnly:$filesOnly } } else { $imageName = Get-BcContainerImageName -containerName $bcContainerHelperConfig.defaultContainerName } } else { throw "You have to specify artifactUrl or imageName when creating a new container." } $bestImageName = $imageName } elseif ($doNotGetBestImageName) { $bestImageName = $imageName } else { if (!$imageName.Contains(':')) { $imageName += ":latest" } # Determine best container ImageName (append -ltsc2016 or -ltsc2019) $bestImageName = Get-BestBcContainerImageName -imageName $imageName if ($useBestContainerOS) { $imageName = $bestImageName } } $pullit = $alwaysPull if (!$alwaysPull) { $imageExists = $false $bestImageExists = $false $allImages | ForEach-Object { if ("$_" -eq "$imageName" -or "$_" -eq "$($imageName):latest") { $imageExists = $true } if ("$_" -eq "$bestImageName") { $bestImageExists = $true } } if ($bestImageExists) { $imageName = $bestImageName if ($artifactUrl) { $genericTagVersion = [Version](Get-BcContainerGenericTag -containerOrImageName $imageName) if ($genericTagVersion -lt [Version]"1.0.2.20") { Write-Host "Generic image is version $genericTagVersion - pulling a newer image" $pullit = $true } } } elseif ($imageExists) { Write-Host "NOTE: Add -alwaysPull or -useBestContainerOS if you want to use $bestImageName instead of $imageName." } else { $pullit = $true } } if ($pullit) { try { Write-Host "Pulling image $bestImageName" DockerDo -command pull -imageName $bestImageName | Out-Null $imageName = $bestImageName } catch { if ($imageName -eq $bestImageName) { throw } Write-Host "Pulling image $imageName" DockerDo -command pull -imageName $imageName | Out-Null } } Write-Host "Using image $imageName" $inspect = docker inspect $imageName | ConvertFrom-Json if ($sqlTimeout -ne 300) { $parameters += "--env sqlTimeout=$sqlTimeout" } if ($clickonce) { if ($useTraefik) { Write-Host "WARNING: ClickOnce doesn't work with traefik v1 (which is the one used in this version of ContainerHelper)" } $parameters += "--env clickonce=Y" } if ($applicationInsightsKey) { $parameters += "--env applicationInsightsInstrumentationKey=$applicationInsightsKey" } if ($WebClientPort) { $parameters += "--env WebClientPort=$WebClientPort" } if ($FileSharePort) { $parameters += "--env FileSharePort=$FileSharePort" } if ($ManagementServicesPort) { $parameters += "--env ManagementServicesPort=$ManagementServicesPort" } if ($ClientServicesPort) { $parameters += "--env ClientServicesPort=$ClientServicesPort" } if ($SoapServicesPort) { $parameters += "--env SoapServicesPort=$SoapServicesPort" } if ($ODataServicesPort) { $parameters += "--env ODataServicesPort=$ODataServicesPort" } if ($DeveloperServicesPort) { $parameters += "--env DeveloperServicesPort=$DeveloperServicesPort" } $networkSettings = @{} if ($bcContainerHelperConfig.mapNetworkSettings.PSObject.Properties.GetEnumerator() | Where-Object { $_.Name -eq $containerName }) { $networkSettings = $bcContainerHelperConfig.mapNetworkSettings."$containerName" if ($networkSettings -isnot [hashtable]) { $networkSettings = $networkSettings | ConvertTo-HashTable } if ($networkSettings.ContainsKey('dns') -and $dns -eq "") { $dns = $networkSettings.dns } if ($networkSettings.ContainsKey('network') -and $network -eq "") { $network = $networkSettings.network } if ($networkSettings.ContainsKey('ip') -and $ip -eq "") { $ip = $networkSettings.ip } if ($networkSettings.ContainsKey('macAddress') -and $macAddress -eq "") { $macAddress = $networkSettings.macAddress } if ($networkSettings.ContainsKey('hostIP') -and $hostIP -eq "") { $hostIP = $networkSettings.hostIP } } if ($dns -eq "hostDNS" -or ($bcContainerHelperConfig.AddHostDnsServersToNatContainers -and ($network -eq "NAT" -or $network -eq "") -and $dns -eq "")) { $dnsServers = @(Get-NetIPInterface | Where-Object { $_.ConnectionState -eq "Connected" -and $_.AddressFamily -eq "IPv4" } | ForEach-Object { Get-DnsClientServerAddress -AddressFamily IPv4 -InterfaceAlias $_.InterfaceAlias | ForEach-Object { $_.ServerAddresses } }) Write-Host "Adding DNS Servers from host: $($dnsServers -join ', ')" $dns = $dnsServers -join ',' } if ($dns) { $parameters += "--dns $($dns.Replace(',',' --dns '))" } if ($network) { $parameters += "--network $network" if ($network -ne "NAT" -and $hostIP -eq "") { $hostIP = (ipconfig | where-object { $_ –match "IPv4 Address" } | foreach-object{ $_.Split(":")[1] } | Where-Object { $_.Trim() -ne "" } ) | Select-Object -First 1 } } if ($hostIP) { $parameters += "--env hostIP=$($hostIP.Trim())" } if ($macAddress) { $parameters += "--mac-address ""$macAddress""" } if ($IP) { $parameters += "--ip ""$IP""" } $publishPorts | ForEach-Object { Write-Host "Publishing port $_" $parameters += "--publish $($_):$($_)" } if ($publicDnsName) { Write-Host "PublicDnsName is $publicDnsName" $parameters += "--env PublicDnsName=$PublicDnsName" } if ($doNotCheckHealth) { Write-Host "Disabling Health Check (always report healthy)" $parameters += '--no-healthcheck' } $containerFolder = Join-Path $bcContainerHelperConfig.hostHelperFolder "Extensions\$containerName" Remove-Item -Path $containerFolder -Force -Recurse -ErrorAction Ignore New-Item -Path $containerFolder -ItemType Directory -ErrorAction Ignore | Out-Null if ($dvdPath.StartsWith("http://", [StringComparison]::OrdinalIgnoreCase) -or $dvdPath.StartsWith("https://", [StringComparison]::OrdinalIgnoreCase)) { $tempFolder = Join-Path $containerFolder "DVD" new-item -type directory -Path $tempFolder | Out-Null $tempFile = "$tempFolder.zip" Download-File -sourceUrl $dvdPath -destinationFile $tempFile Write-Host "Extracting DVD .zip file " -NoNewline Expand-7zipArchive -Path $tempFile -DestinationPath $tempFolder Remove-Item -Path $tempFile $dvdPath = $tempFolder } elseif ($dvdPath.EndsWith(".zip", [StringComparison]::OrdinalIgnoreCase)) { $temp = Join-Path $containerFolder "NAVDVD" new-item -type directory -Path $temp | Out-Null Write-Host "Extracting DVD .zip file " -NoNewline Expand-7zipArchive -Path $dvdPath -DestinationPath $temp $dvdPath = $temp } if ($artifactUrl) { $parameters += getVolumeMountParameter -volumes $allVolumes -hostPath $downloadsPath -containerPath "c:\dl" $artifactPaths = Download-Artifacts -artifactUrl $artifactUrl -includePlatform -forceRedirection:$alwaysPull $appArtifactPath = $artifactPaths[0] $platformArtifactPath = $artifactPaths[1] $appManifestPath = Join-Path $appArtifactPath "manifest.json" $appManifest = Get-Content $appManifestPath | ConvertFrom-Json if ($runSandboxAsOnPrem -and $appManifest.version -lt [Version]"18.0.0.0") { $runSandboxAsOnPrem = $false Write-Host -ForegroundColor Red "Cannot run sandbox artifacts before version 18 as onprem" } $bcstyle = "onprem" if (!$runSandboxAsOnPrem -and ($appManifest.PSObject.Properties.name -eq "isBcSandbox")) { if ($appManifest.isBcSandbox) { $bcstyle = "sandbox" if (!($PSBoundParameters.ContainsKey('multitenant')) -and !$skipDatabase) { $multitenant = $bcContainerHelperConfig.sandboxContainersAreMultitenantByDefault } } } if ($appManifest.PSObject.Properties.name -eq "Nav") { $parameters += @("--label nav=$($appManifest.Nav)") } else { $parameters += @("--label nav=") } if ($appManifest.PSObject.Properties.name -eq "Cu") { $parameters += @("--label cu=$($appManifest.Cu)") } if ($bcStyle -eq "sandbox") { $parameters += @("--env isBcSandbox=Y") } else { $parameters += @("--env isBcSandbox=N") } $dvdVersion = $appmanifest.Version $dvdCountry = $appManifest.Country $dvdPlatform = $appManifest.Platform $devCountry = $dvdCountry $navVersion = "$dvdVersion-$dvdCountry" $parameters += @( "--label version=$dvdVersion" "--label platform=$dvdPlatform" "--label country=$dvdCountry" "--env artifactUrl=$artifactUrl" ) } elseif ("$dvdPath" -ne "") { if ("$dvdVersion" -eq "" -and (Test-Path "$dvdPath\version.txt")) { $dvdVersion = Get-Content "$dvdPath\version.txt" } if ("$dvdPlatform" -eq "" -and (Test-Path "$dvdPath\platform.txt")) { $dvdPlatform = Get-Content "$dvdPath\platform.txt" } if ("$dvdCountry" -eq "" -and (Test-Path "$dvdPath\country.txt")) { $dvdCountry = Get-Content "$dvdPath\country.txt" } if ($dvdVersion) { $navVersion = $dvdVersion } else { $navversion = (Get-Item -Path "$dvdPath\ServiceTier\program files\Microsoft Dynamics NAV\*\Service\Microsoft.Dynamics.Nav.Server.exe").VersionInfo.FileVersion } $navtag = Get-NavVersionFromVersionInfo -VersionInfo $navversion if ("$navtag" -eq "" -and "$dvdPlatform" -eq "") { $dvdPlatform = $navversion } if ($dvdCountry) { $devCountry = $dvdCountry } else { $devCountry = "w1" } $parameters += @( "--label nav=$navtag", "--label version=$navversion", "--label country=$devCountry", "--label cu=" ) if ($dvdPlatform) { $parameters += @( "--label platform=$dvdPlatform" ) } $navVersion += "-$devCountry" } elseif ($devCountry -eq "") { $devCountry = $inspect.Config.Labels.country } Write-Host "Creating Container $containerName" if ($navVersion -eq "") { if ($inspect.Config.Labels.psobject.Properties.Match('maintainer').Count -eq 0 -or $inspect.Config.Labels.maintainer -ne "Dynamics SMB") { throw "Container $imageName is not a NAV/BC container" } $navversion = "$($inspect.Config.Labels.version)-$($inspect.Config.Labels.country)" if ($inspect.Config.Env | Where-Object { $_ -eq "IsBcSandbox=Y" }) { $bcStyle = "sandbox" } } Write-Host "Style: $bcStyle" if ($multitenant) { Write-Host "Multitenant: Yes" } else { Write-Host "Multitenant: No" } $version = [System.Version]($navversion.split('-')[0]) Write-Host "Version: $version" if ($dvdPlatform) { $platformVersion = $dvdPlatform } else { if ($inspect.Config.Labels.psobject.Properties.Name -eq 'platform') { $platformVersion = $inspect.Config.Labels.platform } else { $platformVersion = "" } } if ($platformversion) { Write-Host "Platform: $platformversion" AddTelemetryProperty -telemetryScope $telemetryScope -key "platformVersion" -value $platformVersion } $genericIsDev = "" if ($imageName -like "mcr.microsoft.com/businesscentral:*-dev") { $genericIsDev = "-dev" } $genericTag = [Version]"$($inspect.Config.Labels.tag)" Write-Host "Generic Tag: $genericTag$genericIsDev" AddTelemetryProperty -telemetryScope $telemetryScope -key "applicationVersion" -value $navVersion AddTelemetryProperty -telemetryScope $telemetryScope -key "country" -value $devCountry AddTelemetryProperty -telemetryScope $telemetryScope -key "style" -value $bcStyle AddTelemetryProperty -telemetryScope $telemetryScope -key "multitenant" -value $multitenant AddTelemetryProperty -telemetryScope $telemetryScope -key "genericTag" -value "$genericTag" $containerOsVersion = [Version]"$($inspect.Config.Labels.osversion)" if ("$containerOsVersion".StartsWith('10.0.14393.')) { $containerOs = "ltsc2016" if (!$useBestContainerOS -and $TimeZoneId -eq $null) { $timeZoneId = (Get-TimeZone).Id } } elseif ("$containerOsVersion".StartsWith('10.0.15063.')) { $containerOs = "1703" } elseif ("$containerOsVersion".StartsWith('10.0.16299.')) { $containerOs = "1709" } elseif ("$containerOsVersion".StartsWith('10.0.17134.')) { $containerOs = "1803" } elseif ("$containerOsVersion".StartsWith('10.0.17763.')) { $containerOs = "ltsc2019" } elseif ("$containerOsVersion".StartsWith('10.0.18362.')) { $containerOs = "1903" } elseif ("$containerOsVersion".StartsWith('10.0.18363.')) { $containerOs = "1909" } elseif ("$containerOsVersion".StartsWith('10.0.19041.')) { $containerOs = "2004" } elseif ("$containerOsVersion".StartsWith('10.0.19042.')) { $containerOs = "20H2" } elseif ("$containerOsVersion".StartsWith('10.0.19043.')) { $containerOs = "21H1" } elseif ("$containerOsVersion".StartsWith('10.0.19044.')) { $containerOs = "21H2" } elseif ("$containerOsVersion".StartsWith('10.0.19045.')) { $containerOs = "22H2" } elseif ("$containerOsVersion".StartsWith('10.0.20348.')) { $containerOs = "ltsc2022" } else { $containerOs = "unknown" } Write-Host "Container OS Version: $containerOsVersion ($containerOs)" Write-Host "Host OS Version: $hostOsVersion ($hostOs)" AddTelemetryProperty -telemetryScope $telemetryScope -key "hostOs" -value $hostOs AddTelemetryProperty -telemetryScope $telemetryScope -key "hostOsVersion" -value $hostOsVersion AddTelemetryProperty -telemetryScope $telemetryScope -key "containerOs" -value $containerOs AddTelemetryProperty -telemetryScope $telemetryScope -key "containerOsVersion" -value $containerOsVersion if (($hostOsVersion.Major -lt $containerOsversion.Major) -or ($hostOsVersion.Major -eq $containerOsversion.Major -and $hostOsVersion.Minor -lt $containerOsversion.Minor) -or ($hostOsVersion.Major -eq $containerOsversion.Major -and $hostOsVersion.Minor -eq $containerOsversion.Minor -and $hostOsVersion.Build -lt $containerOsversion.Build)) { throw "The container operating system is newer than the host operating system, cannot use image" } elseif ("$useGenericImage" -eq "" -and ($hostOsVersion.Major -ne $containerOsversion.Major -or $hostOsVersion.Minor -ne $containerOsversion.Minor -or $hostOsVersion.Build -ne $containerOsversion.Build -or $hostOsVersion.Revision -ne $containerOsversion.Revision)) { if ("$dvdPath" -eq "" -and $useBestContainerOS -and "$bestGenericImageName" -ne "") { # There is a generic image, which is better than the selected image Write-Host "A better Generic Container OS exists for your host ($bestGenericImageName)" $useGenericImage = $bestGenericImageName } } if ($useGenericImage -and $useGenericImage -ne $imageName) { if ("$dvdPath" -eq "" -and "$artifactUrl" -eq "") { # Extract files from image if not already done $dvdPath = Join-Path $bcContainerHelperConfig.hostHelperFolder "$($NavVersion)-Files" if (!(Test-Path "$dvdPath\allextracted")) { Extract-FilesFromBcContainerImage -imageName $imageName -path $dvdPath -force if (!(Test-Path "$dvdPath\allextracted")) { throw "Couldn't extract content from image $image" } } $parameters += @( "--label nav=$($inspect.Config.Labels.nav)", "--label version=$($inspect.Config.Labels.version)", "--label country=$($inspect.Config.Labels.country)", "--label cu=$($inspect.Config.Labels.cu)" ) if ($inspect.Config.Labels.psobject.Properties.Name -eq 'platform') { $parameters += @( "--label platform=$($inspect.Config.Labels.platform)" ) } if ($inspect.Config.Env | Where-Object { $_ -eq "IsBcSandbox=Y" }) { $parameters += @(" --env IsBcSandbox=Y" ) } } $imageName = $useGenericImage Write-Host "Using generic image $imageName" if (!$alwaysPull) { $alwaysPull = $true $allImages | ForEach-Object { if ("$_" -eq "$imageName" -or "$_" -eq "$($imageName):latest") { $alwaysPull = $false } } } if ($alwaysPull) { Write-Host "Pulling image $imageName" DockerDo -command pull -imageName $imageName | Out-Null } $inspect = docker inspect $imageName | ConvertFrom-Json $useGenericImageTagVersion = [System.Version]"$($inspect.Config.Labels.tag)" if ($artifactUrl) { if ($useGenericImageTagVersion -lt [System.Version]"0.0.9.103") { Write-Host "Generic Tag is $useGenericImageTagVersion - pulling updated generic image to use artifacts" DockerDo -command pull -imageName $imageName | Out-Null } } $containerOsVersion = [Version]"$($inspect.Config.Labels.osversion)" if ("$containerOsVersion".StartsWith('10.0.14393.')) { $containerOs = "ltsc2016" } elseif ("$containerOsVersion".StartsWith('10.0.15063.')) { $containerOs = "1703" } elseif ("$containerOsVersion".StartsWith('10.0.16299.')) { $containerOs = "1709" } elseif ("$containerOsVersion".StartsWith('10.0.17134.')) { $containerOs = "1803" } elseif ("$containerOsVersion".StartsWith('10.0.17763.')) { $containerOs = "ltsc2019" } elseif ("$containerOsVersion".StartsWith('10.0.18362.')) { $containerOs = "1903" } elseif ("$containerOsVersion".StartsWith('10.0.18363.')) { $containerOs = "1909" } elseif ("$containerOsVersion".StartsWith('10.0.19041.')) { $containerOs = "2004" } elseif ("$containerOsVersion".StartsWith('10.0.19042.')) { $containerOs = "20H2" } elseif ("$containerOsVersion".StartsWith('10.0.19043.')) { $containerOs = "21H1" } elseif ("$containerOsVersion".StartsWith('10.0.19044.')) { $containerOs = "21H2" } elseif ("$containerOsVersion".StartsWith('10.0.19045.')) { $containerOs = "22H2" } elseif ("$containerOsVersion".StartsWith('10.0.20348.')) { $containerOs = "ltsc2022" } else { $containerOs = "unknown" } Write-Host "Generic Container OS Version: $containerOsVersion ($containerOs)" $genericTagVersion = [Version]"$($inspect.Config.Labels.tag)" Write-Host "Generic Tag of better generic: $genericTagVersion" } if ($hostOsVersion -eq $containerOsVersion) { if ($isolation -eq "") { $isolation = "process" } } elseif ($hostOsVersion.Build -ge 20348 -and $containerOsVersion.Build -ge 20348) { if ($isolation -eq "") { Write-Host -ForegroundColor Yellow "WARNING: Container and host OS build is 20348 or above, defaulting to process isolation. If you encounter issues, you could try to install HyperV." $isolation = "process" } } elseif (("$hostOsVersion".StartsWith('10.0.19043.') -or "$hostOsVersion".StartsWith('10.0.19044.') -or "$hostOsVersion".StartsWith('10.0.19045.')) -and "$containerOsVersion".StartsWith("10.0.19041.")) { if ($isolation -eq "") { Write-Host -ForegroundColor Yellow "WARNING: Host OS is Windows 10 21H1 or newer and Container OS is 2004, defaulting to process isolation. If you experience problems, add -isolation hyperv." $isolation = "process" } } else { if ($isolation -eq "") { if ($isAdministrator) { if (Get-HypervState -ne "Disabled") { $isolation = "hyperv" } else { $isolation = "process" Write-Host -ForegroundColor Yellow "WARNING: Host OS and Base Image Container OS doesn't match and HyperV is not installed. If you encounter issues, you could try to install HyperV." } } else { $isolation = "hyperv" Write-Host -ForegroundColor Yellow "WARNING: Host OS and Base Image Container OS doesn't match, defaulting to hyperv. If you do not have HyperV installed or you encounter issues, you could try to specify -isolation process" } } elseif ($isolation -eq "process") { Write-Host -ForegroundColor Yellow "WARNING: Host OS and Base Image Container OS doesn't match and process isolation is specified. If you encounter issues, you could try to specify -isolation hyperv" } } Write-Host "Using $isolation isolation" if ($isolation -eq "process" -and !$isServerHost -and ($os.BuildNumber -eq 22621 -or $os.BuildNumber -eq 22631) -and $useSSL) { Write-Host -ForegroundColor Red "WARNING: Using SSL when running Windows 11 with process isolation might not work due to a bug in Windows 11. Please use HyperV isolation or disable SSL." } AddTelemetryProperty -telemetryScope $telemetryScope -key "isolation" -value $isolation if ("$locale" -eq "") { $locale = Get-LocaleFromCountry $devCountry } Write-Host "Using locale $locale" AddTelemetryProperty -telemetryScope $telemetryScope -key "locale" -value $locale if ($filesOnly -and $version.Major -lt 15) { throw "FilesOnly containers are not supported for version prior to 15" } if ((!$doNotExportObjectsToText) -and ($version -lt [System.Version]"8.0.0.0")) { throw "PowerShell Cmdlets to export objects as text are not included before NAV 2015, please specify -doNotExportObjectsToText." } if ($multitenant -and ($version -lt [System.Version]"7.1.0.0")) { throw "Multitenancy is not supported in NAV 2013" } if ($includeAL -and ($version.Major -lt 14)) { throw "IncludeAL is supported from Dynamics 365 Business Central Spring 2019 release (1904 / 14.x)" } if ($includeCSide -and ($version.Major -ge 15)) { throw "IncludeCSide is no longer supported in Dynamics 365 Business Central 2019 wave 2 release (1910 / 15.x)" } if ($enableSymbolLoading -and ($version.Major -ge 15)) { throw "EnableSymbolLoading is no longer needed in Dynamics 365 Business Central 2019 wave 2 release (1910 / 15.x)" } if ($bcContainerHelperConfig.UseVolumeForMyFolder) { $myVolumeName = "$containerName-my" if ($allVolumes | Where-Object { $_ -like "*|$myVolumeName" }) { throw "Fatal error, volume $myVolumeName already exists" } docker volume create $myVolumeName $myFolder = ((docker volume inspect $myVolumeName) | ConvertFrom-Json).MountPoint $allVolumes += "$myfolder|$myVolumeName" } else { $myFolder = Join-Path $containerFolder "my" New-Item -Path $myFolder -ItemType Directory -ErrorAction Ignore | Out-Null } if ($useTraefik) { Write-Host "Adding special CheckHealth.ps1 to enable Traefik support" $myscripts += (Join-Path $traefikForBcBasePath "my\CheckHealth.ps1") } if (-not $dumpEventLog) { Write-Host "Disabling the standard eventlog dump to container log every 2 seconds (use -dumpEventLog to enable)" Set-Content -Path (Join-Path $myFolder "MainLoop.ps1") -Value 'while ($true) { start-sleep -seconds 1 }' } $myScripts | ForEach-Object { if ($_ -is [string]) { if ($_.StartsWith("https://", "OrdinalIgnoreCase") -or $_.StartsWith("http://", "OrdinalIgnoreCase")) { $uri = [System.Uri]::new($_) $filename = [System.Uri]::UnescapeDataString($uri.Segments[$uri.Segments.Count-1]) $destinationFile = Join-Path $myFolder $filename Download-File -sourceUrl $_ -destinationFile $destinationFile if ($destinationFile.EndsWith(".zip", "OrdinalIgnoreCase")) { Write-Host "Extracting .zip file " -NoNewline Expand-7zipArchive -Path $destinationFile -DestinationPath $myFolder Remove-Item -Path $destinationFile -Force } } elseif (Test-Path $_ -PathType Container) { Copy-Item -Path "$_\*" -Destination $myFolder -Recurse -Force } else { if ($_.EndsWith(".zip", "OrdinalIgnoreCase")) { Write-Host "Extracting .zip file " -NoNewline Expand-7zipArchive -Path $_ -DestinationPath $myFolder } else { Copy-Item -Path $_ -Destination $myFolder -Force } } } elseif ($_ -is [hashtable]) { $hashtable = $_ $hashtable.Keys | ForEach-Object { Add-Content -Path (Join-Path $myFolder $_) -Value "`n$($hashtable[$_])`n" } } elseif ($_ -is [PSCustomObject]) { $psobj = $_ $psobj.PSObject.Properties | ForEach-Object { Add-Content -Path (Join-Path $myFolder $_.Name) -Value "`n$($_.Value)`n" } } } $restoreBakFolder = $false if ($bakFolder) { if (!$bakFolder.Contains('\')) { $bakFolder = Join-Path $bcContainerHelperConfig.hostHelperFolder "$bcStyle-$($NavVersion)-bakFolders\$bakFolder" } if (Test-Path (Join-Path $bakFolder "*.bak")) { $restoreBakFolder = $true if (!$multitenant) { $bakFile = Join-Path $bakFolder "database.bak" $parameters += "--env bakfile=""$bakFile""" } } } if ($multitenant -and !($usecleandatabase -or $useNewDatabase -or $restoreBakFolder)) { $parameters += "--env multitenant=Y" } if ($bakFile -and !$restoreBakFolder) { if ($bakFile.StartsWith("http://", [StringComparison]::OrdinalIgnoreCase) -or $bakFile.StartsWith("https://", [StringComparison]::OrdinalIgnoreCase)) { $temp = Join-Path $containerFolder "database.bak" Download-File -sourceUrl $bakFile -destinationFile $temp $bakFile = $temp } if (!(Test-Path $bakFile)) { throw "Database backup $bakFile doesn't exist" } if (-not $bakFile.StartsWith($bcContainerHelperConfig.hostHelperFolder, [StringComparison]::OrdinalIgnoreCase)) { $containerBakFile = Join-Path $containerFolder "database.bak" Copy-Item -Path $bakFile -Destination $containerBakFile $bakFile = $containerBakFile } if ($bakFile.StartsWith($bcContainerHelperConfig.hostHelperFolder, [StringComparison]::OrdinalIgnoreCase)) { $bakFile = "$($bcContainerHelperConfig.containerHelperFolder)$($bakFile.Substring($bcContainerHelperConfig.hostHelperFolder.Length))" } $parameters += "--env bakfile=""$bakFile""" } $vsixFile = DetermineVsixFile -vsixFile $vsixFile if ($vsixFile) { $vsixUrl = $vsixFile if ($vsixUrl.StartsWith("https://", "OrdinalIgnoreCase") -or $vsixUrl.StartsWith("http://", "OrdinalIgnoreCase")) { $uri = [Uri]::new($vsixUrl) $vsixFile = "$containerFolder\$($uri.Segments[$uri.Segments.Count-1]).vsix" Download-File -sourceUrl $vsixUrl -destinationFile $vsixFile } elseif (Test-Path $vsixUrl -PathType Leaf) { $vsixFile = "$containerFolder\$([System.IO.Path]::GetFileName($vsixUrl))" Copy-Item -Path $vsixUrl -Destination $vsixFile } else { $vsixFile = "" throw "Unable to locate vsix file ($vsixUrl)" } } if (!$restoreBakFolder) { $ext = '' if ("$licensefile" -eq "") { if ($includeCSide -and !$doNotExportObjectsToText) { throw "You must specify a license file when creating a CSide Development container or use -doNotExportObjectsToText to avoid baseline generation." } if ($includeAL -and ($version.Major -eq 14)) { throw "You must specify a license file when creating a AL Development container with this version." } $containerlicenseFile = "" } elseif ($licensefile -like "https://*" -or $licensefile -like "http://*") { Write-Host "Using license file $($licenseFile.Split('?')[0])" $licensefileUri = $licensefile $ext = [System.IO.Path]::GetExtension($licenseFile.Split('?')[0]) $licenseFile = "$myFolder\license$ext" Download-File -sourceUrl $licenseFileUri -destinationFile $licenseFile if ((Get-Content $licenseFile -First 1) -ne "Microsoft Software License Information") { Remove-Item -Path $licenseFile -Force throw "Specified license file Uri isn't a direct download Uri" } $containerLicenseFile = "c:\run\my\license$ext" } else { Write-Host "Using license file $licenseFile" $ext = [System.IO.Path]::GetExtension($licenseFile) Copy-Item -Path $licenseFile -Destination "$myFolder\license$ext" -Force $containerLicenseFile = "c:\run\my\license$ext" } $parameters += @( "--env licenseFile=""$containerLicenseFile""" ) if ($ext -eq '.flf' -and $version.major -ge 22) { throw "The .flf license file format is not supported in Business Central version 22 and later." } } $parameters += @( "--name $containerName", "--hostname $containerName", "--env auth=$auth" "--env username=""$($credential.UserName)""", "--env ExitOnError=N", "--env locale=$locale", "--env databaseServer=""$databaseServer""", "--env databaseInstance=""$databaseInstance""", (getVolumeMountParameter -volumes $allVolumes -hostPath $bcContainerHelperConfig.hostHelperFolder -containerPath $bcContainerHelperConfig.containerHelperFolder), (getVolumeMountParameter -volumes $allVolumes -hostPath $myFolder -containerPath "C:\Run\my"), "--isolation $isolation", "--restart $restart" ) if ("$memoryLimit" -eq "" -and $isolation -eq "hyperv") { $memoryLimit = "8G" } $SqlServerMemoryLimit = 0 if ($SqlMemoryLimit) { if ($SqlMemoryLimit.EndsWith('%')) { if ($memoryLimit -ne "") { if ($memoryLimit -like '*M') { $mbytes = [int]($memoryLimit.TrimEnd('mM')) } else { $mbytes = [int](1024*([double]($memoryLimit.TrimEnd('gG')))) } $sqlServerMemoryLimit = [int]($mbytes * ([int]$SqlMemoryLimit.TrimEnd('%')) / 100) } } else { if ($SqlMemoryLimit -like '*M') { $SqlServerMemoryLimit = [int]($SqlMemoryLimit.TrimEnd('mM')) } else { $SqlServerMemoryLimit = [int](1024*([double]($SqlMemoryLimit.TrimEnd('gG')))) } } } $parameters += "--env filesOnly=$filesOnly" if ($memoryLimit) { $parameters += "--memory $memoryLimit" } if ($version.Major -gt 11) { $parameters += "--env enableApiServices=Y" } if ("$databasePrefix$databaseName" -ne "") { $parameters += "--env databaseName=""$databasePrefix$databaseName""" } if ("$authenticationEMail" -ne "") { $parameters += "--env authenticationEMail=""$authenticationEMail""" } if ($AadAppId) { $customNavSettings += @("ValidAudiences=$AadAppId;https://api.businesscentral.dynamics.com", "DisableTokenSigningCertificateValidation=True", "ExtendedSecurityTokenLifetime=24", "ClientServicesCredentialType=NavUserPassword") if ($version.Major -ge 20) { $AadTenantId = $AadTenant if (!$AadTenantId) { $AadTenantId = "Common" } $customWebSettings += @("AadApplicationId=$AadAppId","AadAuthorityUri=https://login.microsoftonline.com/$AADTenantId") } } if ($AadTenant) { $parameters += "--env AadTenant=$AadTenant" } if ($AadAppIdUri) { $parameters += "--env AppIdUri=$AadAppIdUri" } if ($PSBoundParameters.ContainsKey('enableTaskScheduler')) { $customNavSettings += @("EnableTaskScheduler=$enableTaskScheduler") } if ($enableSymbolLoading -and $version.Major -ge 11 -and $version.Major -lt 15) { $parameters += "--env enableSymbolLoading=Y" } else { $enableSymbolLoading = $false } if ($IsInsideContainer) { (' if (!$restartingInstance) { $cert = New-SelfSignedCertificate -DnsName "dontcare" -CertStoreLocation Cert:\LocalMachine\My winrm create winrm/config/Listener?Address=*+Transport=HTTPS (''@{Hostname="dontcare"; CertificateThumbprint="'' + $cert.Thumbprint + ''"}'') winrm set winrm/config/service/Auth ''@{Basic="true"}'' Write-Host "Creating Container user $username" New-LocalUser -AccountNeverExpires -PasswordNeverExpires -FullName $username -Name '+$bcContainerHelperConfig.WinRmCredentials.UserName+' -Password (ConvertTo-SecureString -string "'+([System.Runtime.InteropServices.Marshal]::PtrToStringBSTR([System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($bcContainerHelperConfig.WinRmCredentials.Password)))+'" -AsPlainText -force) | Out-Null Add-LocalGroupMember -Group administrators -Member '+$bcContainerHelperConfig.WinRmCredentials.UserName+' } ') | Add-Content -Path "$myfolder\AdditionalSetup.ps1" } elseif ($bcContainerHelperConfig.useWinRmSession -ne 'never') { # UseWinRmSession is allow or always - add winrm configuration to container $winRmPassword = "Bc$((Get-CimInstance win32_ComputerSystemProduct).UUID)!" (' if (!$restartingInstance) { Write-Host "Enable PSRemoting and setup user for winrm" Enable-PSRemoting | Out-Null Get-PSSessionConfiguration | Out-null pwsh.exe -Command "Enable-PSRemoting -WarningAction SilentlyContinue | Out-Null; Get-PSSessionConfiguration | Out-Null" $credential = New-Object PSCredential -ArgumentList "winrm", (ConvertTo-SecureString -string "'+$winRmPassword+'" -AsPlainText -force) New-LocalUser -AccountNeverExpires -PasswordNeverExpires -FullName $credential.UserName -Name $credential.UserName -Password $credential.Password | Out-Null Add-LocalGroupMember -Group administrators -Member $credential.UserName | Out-Null winrm set winrm/config/service/Auth ''@{Basic="true"}'' | Out-Null } ') | Add-Content -Path "$myfolder\AdditionalSetup.ps1" if ($bccontainerHelperConfig.useSslForWinRmSession) { $additionalParameters += @("--expose 5986") (' if (!$restartingInstance) { Write-Host "Creating self-signed certificate for winrm" $cert = New-SelfSignedCertificate -CertStoreLocation cert:\localmachine\my -DnsName $env:computername -NotBefore (get-date).AddDays(-1) -NotAfter (get-date).AddYears(5) -Provider "Microsoft RSA SChannel Cryptographic Provider" -KeyLength 2048 winrm create winrm/config/Listener?Address=*+Transport=HTTPS ("@{Hostname=""$env:computername""; CertificateThumbprint=""$($cert.Thumbprint)""}") | Out-Null } ') | Add-Content -Path "$myfolder\AdditionalSetup.ps1" } else { $additionalParameters += @("--expose 5985") (' if (!$restartingInstance) { Write-Host "Allow unencrypted communication to container" winrm set winrm/config/service ''@{AllowUnencrypted="true"}'' | Out-Null } ') | Add-Content -Path "$myfolder\AdditionalSetup.ps1" } if (-not $bccontainerHelperConfig.useSslForWinRmSession) { try { [xml]$conf = winrm get winrm/config/client -format:pretty $trustedHosts = @($conf.Client.TrustedHosts.Split(',')) if (-not $trustedHosts) { $trustedHosts = @() } $isTrusted = $trustedHosts | Where-Object { $containerName -like $_ } if (!($isTrusted)) { if (!$isAdministrator) { Write-Host "$containerName is not a trusted host. You need to get an administrator to add $containerName to the trusted winrm hosts on your machine" } else { Write-Host "Adding $containerName to trusted hosts ($($trustedHosts -join ','))" $trustedHosts += $containerName winrm set winrm/config/client "@{TrustedHosts=""$($trustedHosts -join ',')""}" | Out-Null } } if ($conf.Client.AllowUnencrypted -eq 'false') { if (!$isAdministrator) { Write-Host "Unencrypted communication is not allowed. You need to get an administrator to allow unencrypted communication" } else { Write-Host "Allow unencrypted communication" winrm set winrm/config/client '@{AllowUnencrypted="true"}' | Out-Null } } } catch { Write-Host "Unexpected error when checking winrm configuration, you might not be able to connect to the container using winrm unencrypted" } } } if ($includeCSide) { $programFilesFolder = Join-Path $containerFolder "Program Files" New-Item -Path $programFilesFolder -ItemType Directory -ErrorAction Ignore | Out-Null # Clear modified flag on all objects (@' if ($restartingInstance -eq $false -and $databaseServer -eq "localhost" -and $databaseInstance -eq "SQLEXPRESS") { sqlcmd -S 'localhost\SQLEXPRESS' -d $DatabaseName -Q "update [dbo].[Object] SET [Modified] = 0" | Out-Null } '@) | Add-Content -Path "$myfolder\AdditionalSetup.ps1" if (Test-Path $programFilesFolder) { Remove-Item $programFilesFolder -Force -Recurse -ErrorAction Ignore } New-Item $programFilesFolder -ItemType Directory -ErrorAction Ignore | Out-Null if ($useTraefik) { $winclientServer = $containerName } else { $winclientServer = '$PublicDnsName' } (' if (!(Test-Path "c:\navpfiles\*")) { Copy-Item -Path "C:\Program Files (x86)\Microsoft Dynamics NAV\*" -Destination "c:\navpfiles" -Recurse -Force -ErrorAction Ignore $destFolder = (Get-Item "c:\navpfiles\*\RoleTailored Client").FullName $ClientUserSettingsFileName = "$runPath\ClientUserSettings.config" [xml]$ClientUserSettings = Get-Content $clientUserSettingsFileName $clientUserSettings.SelectSingleNode("//configuration/appSettings/add[@key=""Server""]").value = "'+$winclientServer+'" $clientUserSettings.SelectSingleNode("//configuration/appSettings/add[@key=""ServerInstance""]").value=$ServerInstance if ($multitenant) { $clientUserSettings.SelectSingleNode("//configuration/appSettings/add[@key=""TenantId""]").value="$TenantId" } if ($clientUserSettings.SelectSingleNode("//appSettings/add[@key=""ServicesCertificateValidationEnabled""]") -ne $null) { $clientUserSettings.SelectSingleNode("//configuration/appSettings/add[@key=""ServicesCertificateValidationEnabled""]").value="false" } if ($clientUserSettings.SelectSingleNode("//appSettings/add[@key=""ClientServicesCertificateValidationEnabled""]") -ne $null) { $clientUserSettings.SelectSingleNode("//configuration/appSettings/add[@key=""ClientServicesCertificateValidationEnabled""]").value="false" } $clientUserSettings.SelectSingleNode("//configuration/appSettings/add[@key=""ClientServicesPort""]").value="$publicWinClientPort" $acsUri = "$federationLoginEndpoint" if ($acsUri -ne "") { if (!($acsUri.ToLowerInvariant().Contains("%26wreply="))) { $acsUri += "%26wreply=$publicWebBaseUrl" } } $clientUserSettings.SelectSingleNode("//configuration/appSettings/add[@key=""ACSUri""]").value = "$acsUri" $clientUserSettings.SelectSingleNode("//configuration/appSettings/add[@key=""DnsIdentity""]").value = "$dnsIdentity" $clientUserSettings.SelectSingleNode("//configuration/appSettings/add[@key=""ClientServicesCredentialType""]").value = "$Auth" $clientUserSettings.Save("$destFolder\ClientUserSettings.config") } ') | Add-Content -Path "$myfolder\AdditionalSetup.ps1" } if ($assignPremiumPlan -and !$restoreBakFolder -and !$skipDatabase) { if (!(Test-Path -Path "$myfolder\SetupNavUsers.ps1")) { ('# Invoke default behavior . "c:\run\SetupNavUsers.ps1" ') | Set-Content -Path "$myfolder\SetupNavUsers.ps1" } if ($version.Major -ge 15) { $userPlanTableName = 'User Plan$63ca2fa4-4f03-4f2b-a480-172fef340d3f' } else { $userPlanTableName = 'User Plan' } (' Get-NavServerUser -serverInstance $ServerInstance -tenant default |? LicenseType -eq "FullUser" | ForEach-Object { $UserId = $_.UserSecurityId Write-Host "Assign Premium plan for $($_.Username)" $dbName = $DatabaseName if ($multitenant) { $dbName = $TenantId } $userPlanTableName = '''+$userPlanTableName+''' Invoke-Sqlcmd -ErrorAction Ignore -ServerInstance ''localhost\SQLEXPRESS'' -Query "USE [$DbName] INSERT INTO [dbo].[$userPlanTableName] ([Plan ID],[User Security ID]) VALUES (''{8e9002c0-a1d8-4465-b952-817d2948e6e2}'',''$userId'')" } ') | Add-Content -Path "$myfolder\SetupNavUsers.ps1" } if ($useSSL) { $parameters += "--env useSSL=Y" } else { $parameters += "--env useSSL=N" } if ($includeCSide) { $parameters += "--volume ""$($programFilesFolder):C:\navpfiles""" } if ("$dvdPath" -ne "") { $parameters += getVolumeMountParameter -volumes $allVolumes -hostPath $dvdPath -containerPath "C:\NAVDVD" } if (!(Test-Path -Path "$myfolder\SetupVariables.ps1")) { ('# Invoke default behavior . "c:\run\SetupVariables.ps1" ') | Set-Content -Path "$myfolder\SetupVariables.ps1" } if (!(Test-Path -Path "$myfolder\HelperFunctions.ps1")) { ('# Invoke default behavior . "c:\run\HelperFunctions.ps1" ') | Set-Content -Path "$myfolder\HelperFunctions.ps1" } if ($version.Major -ge 24 -and $genericTag -eq [System.Version]"1.0.2.15") { Download-File -source "https://raw.githubusercontent.com/microsoft/nav-docker/98c0702dbd607580880a3c9248cd76591868447d/generic/Run/Prompt.ps1" -destinationFile (Join-Path $myFolder "Prompt.ps1") } if ($version.Major -ge 24 -and $genericTag -lt [System.Version]"1.0.2.17") { Download-File -source "https://raw.githubusercontent.com/microsoft/nav-docker/4123cbcd197df57a5d94fa15b976356c11f4bcac/generic/Run/240/navinstall.ps1" -destinationFile (Join-Path $myFolder "navinstall.ps1") Download-File -source "https://raw.githubusercontent.com/microsoft/nav-docker/4123cbcd197df57a5d94fa15b976356c11f4bcac/generic/Run/navstart.ps1" -destinationFile (Join-Path $myFolder "navstart.ps1") } if ($version.Major -ge 15 -and $version.Major -le 18 -and $genericTag -ge [System.Version]"1.0.2.15") { Write-Host "Patching container to install ASP.NET Core 1.1" Download-File -source "https://download.microsoft.com/download/6/F/B/6FB4F9D2-699B-4A40-A674-B7FF41E0E4D2/DotNetCore.1.0.7_1.1.4-WindowsHosting.exe" -destinationFile (Join-Path $myFolder "dotnetcore.exe") (' if (!(dotnet --list-runtimes | Where-Object { $_ -like "Microsoft.NetCore.App 1.1.*" })) { Write-Host "Installing ASP.NET Core 1.1"; start-process -Wait -FilePath "c:\run\my\dotnetcore.exe" -ArgumentList /quiet } ') | Add-Content -Path "$myfolder\HelperFunctions.ps1" } if ($genericTag -lt [System.Version]"1.0.2.21") { @' # Patch Microsoft.PowerShell.Archive to use en-US UI Culture (see https://github.com/PowerShell/Microsoft.PowerShell.Archive/pull/46) $psarchiveModule = 'C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.Archive\Microsoft.PowerShell.Archive.psm1' if (Test-Path $psarchiveModule) { $rule = New-Object System.Security.AccessControl.FileSystemAccessRule((whoami),'Modify', 'Allow') $acl = Get-Acl -Path $psarchiveModule; $acl.AddAccessRule($rule); Set-Acl -Path $psarchiveModule -AclObject $acl Set-Content -encoding utf8 -path $psarchiveModule -value (Get-Content -encoding utf8 -raw -path $psarchiveModule).Replace("`r`nImport-LocalizedData LocalizedData -filename ArchiveResources`r`n","`r`nImport-LocalizedData LocalizedData -filename ArchiveResources -UICulture 'en-US'`r`n") } '@ | Add-Content -Path "$myfolder\SetupVariables.ps1" } if ($updateHosts) { Copy-Item -Path (Join-Path $PSScriptRoot "updatehosts.ps1") -Destination (Join-Path $myfolder "updatehosts.ps1") -Force $parameters += "--volume ""c:\windows\system32\drivers\etc:C:\driversetc""" (' . (Join-Path $PSScriptRoot "updatehosts.ps1") -hostsFile "c:\driversetc\hosts" -theHostname "$hostname" -theIpAddress $ip if ($multitenant) { $dotidx = $hostname.indexOf(".") if ($dotidx -eq -1) { $dotidx = $hostname.Length } Get-NavTenant -serverInstance $serverInstance | ForEach-Object { $tenantHostname = $hostname.insert($dotidx,"-$($_.Id)") . (Join-Path $PSScriptRoot "updatehosts.ps1") -hostsFile "c:\driversetc\hosts" -theHostname $tenantHostname -theIpAddress $ip . (Join-Path $PSScriptRoot "updatehosts.ps1") -hostsFile "c:\windows\system32\drivers\etc\hosts" -theHostname $tenantHostname -theIpAddress $ip } } ') | Add-Content -Path "$myfolder\AdditionalOutput.ps1" (' . (Join-Path $PSScriptRoot "updatehosts.ps1") -hostsFile "c:\driversetc\hosts" ') | Add-Content -Path "$myfolder\SetupVariables.ps1" } else { Copy-Item -Path (Join-Path $PSScriptRoot "updatehosts.ps1") -Destination (Join-Path $myfolder "updatecontainerhosts.ps1") -Force (' if ($multitenant) { $dotidx = $hostname.indexOf(".") if ($dotidx -eq -1) { $dotidx = $hostname.Length } Get-NavTenant -serverInstance $serverInstance | ForEach-Object { $tenantHostname = $hostname.insert($dotidx,"-$($_.Id)") . (Join-Path $PSScriptRoot "updatecontainerhosts.ps1") -hostsFile "c:\windows\system32\drivers\etc\hosts" -theHostname $tenantHostname -theIpAddress "127.0.0.1" } } ') | Add-Content -Path "$myfolder\AdditionalOutput.ps1" (' . (Join-Path $PSScriptRoot "updatecontainerhosts.ps1") ') | Add-Content -Path "$myfolder\SetupVariables.ps1" } if ($useTraefik) { $restPart = "/$($containerName)rest" $soapPart = "/$($containerName)soap" $devPart = "/$($containerName)dev" $snapPart = "/$($containerName)snap" $dlPart = "/$($containerName)dl" $webclientPart = "/$containerName" $baseUrl = "https://$publicDnsName" $restUrl = $baseUrl + $restPart $soapUrl = $baseUrl + $soapPart $webclientUrl = $baseUrl + $webclientPart $devUrl = $baseUrl + $devPart $snapUrl = $baseUrl + $snapPart $dlUrl = $baseUrl + $dlPart $customNavSettings += @("PublicODataBaseUrl=$restUrl/odata","PublicSOAPBaseUrl=$soapUrl/ws","PublicWebBaseUrl=$webclientUrl") if ($version.Major -ge 15) { if (Test-Path "$myfolder\serviceSettings.ps1") { . "$myfolder\serviceSettings.ps1" } else { $ServerInstance = "BC" } } else { $ServerInstance = "NAV" } $webclientRule="PathPrefix:$webclientPart" $soapRule="PathPrefix:$($soapPart);ReplacePathRegex: ^$($soapPart)(.*) /$ServerInstance`$1" $restRule="PathPrefix:$($restPart);ReplacePathRegex: ^$($restPart)(.*) /$ServerInstance`$1" $devRule="PathPrefix:$($devPart);ReplacePathRegex: ^$($devPart)(.*) /$ServerInstance`$1" $snapRule="PathPrefix:$($snapPart);ReplacePathRegex: ^$($snapPart)(.*) /$ServerInstance`$1" $dlRule="PathPrefixStrip:$($dlPart)" $webPort = "443" if ($forceHttpWithTraefik) { $webPort = "80" } $traefikProtocol = "https" if ($forceHttpWithTraefik) { $traefikProtocol = "http" } if ($bcContainerHelperConfig.TraefikUseDnsNameAsHostName) { $traefikHostname = $publicDnsName.Split(".")[0] $additionalParameters += @("--hostname $traefikHostname") } $additionalParameters += @("-e webserverinstance=$containerName", "-e publicdnsname=$publicDnsName", "-l `"traefik.protocol=$traefikProtocol`"", "-l `"traefik.web.frontend.rule=$webclientRule`"", "-l `"traefik.web.port=$webPort`"", "-l `"traefik.soap.frontend.rule=$soapRule`"", "-l `"traefik.soap.port=7047`"", "-l `"traefik.rest.frontend.rule=$restRule`"", "-l `"traefik.rest.port=7048`"", "-l `"traefik.dev.frontend.rule=$devRule`"", "-l `"traefik.dev.port=7049`"", "-l `"traefik.snap.frontend.rule=$snapRule`"", "-l `"traefik.snap.port=7083`"", "-l `"traefik.dl.frontend.rule=$dlRule`"", "-l `"traefik.dl.port=8080`"", "-l `"traefik.dl.protocol=http`"", "-l `"traefik.enable=true`"", "-l `"traefik.frontend.entryPoints=https`"" ) (" if (-not `$restartingInstance) { Add-Content -Path 'c:\run\ServiceSettings.ps1' -Value '`$WebServerInstance = ""$containerName""' } ") | Add-Content -Path "$myfolder\AdditionalOutput.ps1" } $containerContainerFolder = Join-Path $bcContainerHelperConfig.ContainerHelperFolder "Extensions\$containerName" (" if (-not `$restartingInstance) { if (Test-Path -Path ""$containerContainerFolder\*.vsix"") { Remove-Item -Path 'C:\Run\*.vsix' Copy-Item -Path ""$containerContainerFolder\*.vsix"" -Destination 'C:\Run' -force if (Test-Path 'C:\inetpub\wwwroot\http' -PathType Container) { Remove-Item -Path 'C:\inetpub\wwwroot\http\*.vsix' Copy-Item -Path ""$containerContainerFolder\*.vsix"" -Destination 'C:\inetpub\wwwroot\http' -force } } else { Copy-Item -Path 'C:\Run\*.vsix' -Destination ""$containerContainerFolder"" -force } Copy-Item -Path 'C:\Run\*.cer' -Destination ""$containerContainerFolder"" -force } ") | Add-Content -Path "$myfolder\AdditionalOutput.ps1" if ($customNavSettings) { $customNavSettingsAdded = $false $cnt = $additionalParameters.Count-1 if ($cnt -ge 0) { 0..$cnt | ForEach-Object { $idx = $additionalParameters[$_].ToLowerInvariant().IndexOf('customnavsettings=') if ($idx -gt 0) { $additionalParameters[$_] = "$($additionalParameters[$_]),$([string]::Join(',',$customNavSettings))" $customNavSettingsAdded = $true } } } if (-not $customNavSettingsAdded) { $additionalParameters += @("--env customNavSettings=$([string]::Join(',',$customNavSettings))") } } if ($customWebSettings) { $customWebSettingsAdded = $false $cnt = $additionalParameters.Count-1 if ($cnt -ge 0) { 0..$cnt | ForEach-Object { $idx = $additionalParameters[$_].ToLowerInvariant().IndexOf('customwebsettings=') if ($idx -gt 0) { $additionalParameters[$_] = "$($additionalParameters[$_]),$([string]::Join(',',$customWebSettings))" $customWebSettingsAdded = $true } } } if (-not $customWebSettingsAdded) { $additionalParameters += @("--env customWebSettings=$([string]::Join(',',$customWebSettings))") } } #Write-Host "Parameters:" #$Parameters | ForEach-Object { if ($_) { Write-Host "$_" } } if ($additionalParameters) { Write-Host "Additional Parameters:" $additionalParameters | ForEach-Object { if ($_) { Write-Host "$_" } } } Write-Host "Files in $($myfolder):" get-childitem -Path $myfolder | ForEach-Object { Write-Host "- $($_.Name)" } Write-Host "Creating container $containerName from image $imageName" $sharedEncryptionKeyFile = "" $containerEncryptionKeyFile = Join-Path $myFolder "DynamicsNAV.key" $encryptionKeyExists = Test-Path $containerEncryptionKeyFile $passwordKeyFile = "$myfolder\aes.key" $passwordKey = New-Object Byte[] 16 [Security.Cryptography.RNGCryptoServiceProvider]::Create().GetBytes($passwordKey) $containerPasswordKeyFile = "c:\run\my\aes.key" try { Set-Content -Path $passwordKeyFile -Value $passwordKey $encPassword = ConvertFrom-SecureString -SecureString $credential.Password -Key $passwordKey $parameters += @( "--env securePassword=$encPassword", "--env passwordKeyFile=""$containerPasswordKeyFile""", "--env removePasswordKeyFile=Y" ) if ($databaseCredential -ne $null -and $databaseCredential -ne [System.Management.Automation.PSCredential]::Empty) { $encDatabasePassword = ConvertFrom-SecureString -SecureString $databaseCredential.Password -Key $passwordKey $parameters += @( "--env databaseUsername=$($databaseCredential.UserName)", "--env databaseSecurePassword=$encDatabasePassword" "--env encryptionSecurePassword=$encDatabasePassword" ) if ("$databaseServer" -ne "" -and $bcContainerHelperConfig.useSharedEncryptionKeys -and !$encryptionKeyExists) { $sharedEncryptionKeyFile = Join-Path $bcContainerHelperConfig.hostHelperFolder "EncryptionKeys\$(-join [security.cryptography.sha256managed]::new().ComputeHash([Text.Encoding]::Utf8.GetBytes(([System.Runtime.InteropServices.Marshal]::PtrToStringBSTR([System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($databaseCredential.Password))))).ForEach{$_.ToString("X2")})\DynamicsNAV-v$($version.Major).key" if (Test-Path $sharedEncryptionKeyFile) { Write-Host "Using Shared Encryption Key file" Copy-Item -Path $sharedEncryptionKeyFile -Destination $containerEncryptionKeyFile } elseif((Test-Path ($sharedEncryptionKeyFile | Split-Path -Parent)) -eq $false) { New-Item -Path ($sharedEncryptionKeyFile | Split-Path -Parent) -ItemType Directory | Out-Null } } } $parameters += $additionalParameters # $parameters | Out-host if (!(DockerDo -accept_eula -accept_outdated:$accept_outdated -detach -imageName $imageName -parameters $parameters)) { return } Wait-BcContainerReady $containerName -timeout $timeout -startlog "" if ($filesOnly -and $vsixFile) { Invoke-ScriptInBcContainer -containerName $containerName -scriptBlock { Param($vsixFile) Remove-Item -Path 'C:\Run\*.vsix' Copy-Item -Path $vsixFile -Destination 'C:\Run' -force } -argumentList (Get-BcContainerPath -containerName $containerName -path $vsixFile) } if ($sharedEncryptionKeyFile -and !(Test-Path $sharedEncryptionKeyFile)) { Write-Host "Storing Container Encryption Key file" Copy-Item -Path $containerEncryptionKeyFile -Destination $sharedEncryptionKeyFile } } finally { Remove-Item -Path $passwordKeyFile -Force -ErrorAction Ignore } Write-Host "Reading CustomSettings.config from $containerName" $customConfig = Get-BcContainerServerConfiguration -ContainerName $containerName if ($customConfig.ServerInstance) { # Only if not -filesOnly if ($SqlServerMemoryLimit -and $customConfig.databaseServer -eq "localhost" -and $customConfig.databaseInstance -eq "SQLEXPRESS") { Write-Host "Set SQL Server memory limit to $SqlServerMemoryLimit MB" Invoke-ScriptInBCContainer -containerName $containerName -scriptblock { Param($SqlServerMemoryLimit) Invoke-Sqlcmd -ServerInstance 'localhost\SQLEXPRESS' -Query "USE master EXEC sp_configure 'show advanced options', 1 RECONFIGURE WITH OVERRIDE;" Invoke-Sqlcmd -ServerInstance 'localhost\SQLEXPRESS' -Query "USE master EXEC sp_configure 'max server memory', $SqlServerMemoryLimit RECONFIGURE WITH OVERRIDE;" Invoke-Sqlcmd -ServerInstance 'localhost\SQLEXPRESS' -Query "USE master EXEC sp_configure 'show advanced options', 0 RECONFIGURE WITH OVERRIDE;" } -argumentList ($SqlServerMemoryLimit) } if ($addFontsFromPath) { Add-FontsToBcContainer -containerName $containerName -path $addFontsFromPath } if ($featureKeys) { Set-BcContainerFeatureKeys -containerName $containerName -featureKeys $featureKeys } if ("$TimeZoneId" -ne "") { Write-Host "Set TimeZone in Container to $TimeZoneId" Invoke-ScriptInBcContainer -containerName $containerName -scriptblock { Param($TimeZoneId) $OldTimeZoneId = (Get-TimeZone).Id try { if ($OldTimeZoneId -ne $TimeZoneId) { Set-TimeZone -ID $TimeZoneId } } catch { Write-Host -ForegroundColor Yellow "WARNING: Unable to set TimeZone to $TimeZoneId, TimeZone is $OldTimeZoneId" } } -argumentList $TimeZoneId } if ($setServiceTierUserLocale) { Write-Host "Set locale for Service Tier User to $locale and restart Service Tier" docker exec --user "NT AUTHORITY\SYSTEM" $containerName powershell.exe "set-culture '$locale'; . 'c:\run\prompt.ps1' -silent; . 'c:\run\serviceSettings.ps1'; Set-NavServerInstance -ServerInstance `$serverInstance -restart" } if ($useSSL -and $installCertificateOnHost) { $certPath = Join-Path $containerFolder "certificate.cer" if (Test-Path $certPath) { try { Write-Host "Importing certificate in host's certificate store" if ($isPsCore) { $params = @{ "FilePath" = "pwsh" } } else { $params = @{ "FilePath" = "powershell" } } if (!$isAdministrator) { $params += @{ "Verb" = "runAs" } } $scriptblock = { Param($certPath, $containerFolder) $cert = Import-Certificate -FilePath $certPath -CertStoreLocation "cert:\LocalMachine\Root" if ($cert) { Write-Host "Certificate with thumbprint $($cert.Thumbprint) imported successfully" Set-Content -Path (Join-Path $containerFolder "thumbprint.txt") -Value "$($cert.Thumbprint)" } } Start-Process @params -ArgumentList "-command & {$scriptBlock} -certPath '$certPath' -containerFolder '$containerFolder'" -Wait -PassThru | Out-Null } catch { Write-Host -ForegroundColor Yellow "Unable to import certificate $certPath in Trusted Root Certification Authorities, you will need to do this manually" } } } if ($shortcuts -ne "None") { Write-Host "Creating Desktop Shortcuts for $containerName" $exePath = "C:\Program Files\Internet Explorer\iexplore.exe, 3" try { $ProgramId = (Get-ItemProperty HKCU:\Software\Microsoft\windows\Shell\Associations\UrlAssociations\http\UserChoice).Progid $key = "HKLM:\SOFTWARE\Classes\$ProgramId\shell\open\command" $tempPath = (Get-ItemProperty -Path $key)."(default)" -replace " *--.*", "" $tempPath = $tempPath.Replace("`"", "") if ($tempPath -and (Test-Path $tempPath -PathType Leaf)) { $exePath = $tempPath } } catch {} if (-not [string]::IsNullOrEmpty($customConfig.PublicWebBaseUrl)) { $webClientUrl = $customConfig.PublicWebBaseUrl if ($multitenant) { $webClientUrl += "?tenant=default" } New-DesktopShortcut -Name "$containerName Web Client" -TargetPath "$webClientUrl" -IconLocation $exePath -Shortcuts $shortcuts if ($includeTestToolkit) { if ($version -ge [Version]("15.0.35528.0")) { $pageno = 130451 } else { $pageno = 130401 } if ($webClientUrl.Contains('?')) { $webClientUrl += "&page=" } else { $webClientUrl += "?page=" } New-DesktopShortcut -Name "$containerName Test Tool" -TargetPath "$webClientUrl$pageno" -IconLocation $exePath -Shortcuts $shortcuts if ($includePerformanceToolkit) { New-DesktopShortcut -Name "$containerName Performance Tool" -TargetPath "$($webClientUrl)149000" -IconLocation $exePath -Shortcuts $shortcuts } } } $vs = "Business Central" if ($version.Major -le 14) { $vs = "NAV" } $cmdPrompt = "/S /K ""prompt [$($containerName.ToUpperInvariant())] `$p`$g & echo Welcome to the $vs Container Command prompt & echo Microsoft Windows Version $($containerOsVersion.ToString())" $psPrompt = """function prompt {'[$($containerName.ToUpperInvariant())] PS '+`$executionContext.SessionState.Path.CurrentLocation+('>'*(`$nestedPromptLevel+1))+' '}; Write-Host 'Welcome to the $vs Container PowerShell prompt'; Write-Host 'Microsoft Windows Version $($containerOsVersion.ToString())'; Write-Host 'Windows PowerShell Version $($PSVersionTable.psversion.ToString())'; Write-Host; . 'c:\run\prompt.ps1' -silent""" New-DesktopShortcut -Name "$containerName Command Prompt" -TargetPath "CMD.EXE" -Arguments "/C docker.exe exec -it $containerName cmd $cmdPrompt" -Shortcuts $shortcuts New-DesktopShortcut -Name "$containerName PowerShell Prompt" -TargetPath "CMD.EXE" -Arguments "/C docker.exe exec -it $containerName powershell -noexit $psPrompt" -Shortcuts $shortcuts } if ($version -eq [System.Version]"14.10.40471.0") { Write-Host "Patching Microsoft.Dynamics.Nav.Ide.psm1 in container due to issue #859" $idepsm = Join-Path $containerFolder "14.10.40471.0-Patch-Microsoft.Dynamics.Nav.Ide.psm1" Download-File -sourceUrl 'https://bcartifacts.blob.core.windows.net/patch/14.10.40471.0/Microsoft.Dynamics.Nav.Ide.psm1' -destinationFile $idepsm Invoke-ScriptInBcContainer -containerName $containerName -scriptblock { Param($idepsm) Copy-Item -Path $idepsm -Destination 'C:\Program Files (x86)\Microsoft Dynamics NAV\140\RoleTailored Client\Microsoft.Dynamics.Nav.Ide.psm1' -Force } -argumentList (Get-BcContainerPath -containerName $containerName -path $idepsm) Remove-BcContainerSession -containerName $containerName } if ((($version -eq [System.Version]"16.0.11240.12076") -or ($version -eq [System.Version]"16.0.11240.12085")) -and $devCountry -ne "W1") { $url = "https://bcartifacts.blob.core.windows.net/patch/16.0.11240.12076/$($devCountry.ToUpper()).zip" Write-Host "Downloading new test apps for this version from $url" $zipName = Join-Path $containerFolder "16.0.11240.12076-$devCountry-Tests-Patch" Download-File -sourceUrl $url -destinationFile "$zipName.zip" Write-Host "Extracting new test apps for this version " -NoNewline Expand-7zipArchive -Path "$zipName.zip" -DestinationPath $zipname Write-Host "Patching .app files in C:\Applications\BaseApp\Test due to issue #925" Invoke-ScriptInBcContainer -containerName $containerName -scriptblock { Param($zipName, $devCountry) Copy-Item -Path (Join-Path $zipName "$devCountry\*.app") -Destination "c:\Applications\BaseApp\Test" -Force } -argumentList (Get-BcContainerPath -containerName $containerName -path $zipName), $devcountry } $sqlCredential = $databaseCredential if ($sqlCredential -eq $null -and $auth -eq "NavUserPassword") { $sqlCredential = New-Object System.Management.Automation.PSCredential ('sa', $credential.Password) } if ($restoreBakFolder) { if ($multitenant) { $dbs = Get-ChildItem -Path $bakFolder -Filter "*.bak" $tenants = $dbs | Where-Object { $_.Name -ne "app.bak" } | ForEach-Object { $_.BaseName } Invoke-ScriptInBcContainer -containerName $containerName -scriptblock { Set-NAVServerConfiguration -ServerInstance $ServerInstance -KeyName "Multitenant" -KeyValue "true" -ApplyTo ConfigFile } Restore-DatabasesInBcContainer -containerName $containerName -bakFolder $bakFolder -tenant $tenants -sqlTimeout $sqlTimeout } } else { if ($enableSymbolLoading) { # Unpublish symbols when running hybrid development Invoke-ScriptInBcContainer -containerName $containerName -scriptblock { # Unpublish only, when Apps when present # Due to bug in 14.x - do NOT remove application symbols - they are used by some system functionality #Get-NavAppInfo -ServerInstance $ServerInstance -Name "Application" -Publisher "Microsoft" -SymbolsOnly | Unpublish-NavApp Get-NavAppInfo -ServerInstance $ServerInstance -Name "Test" -Publisher "Microsoft" -SymbolsOnly | Unpublish-NavApp } } if ($includeTestToolkit) { Import-TestToolkitToBcContainer ` -containerName $containerName ` -sqlCredential $sqlCredential ` -includeTestLibrariesOnly:$includeTestLibrariesOnly ` -includeTestFrameworkOnly:$includeTestFrameworkOnly ` -includePerformanceToolkit:$includePerformanceToolkit ` -doNotUseRuntimePackages:$doNotUseRuntimePackages } } if ($includeCSide) { $winClientFolder = (Get-Item "$programFilesFolder\*\RoleTailored Client").FullName New-DesktopShortcut -Name "$containerName Windows Client" -TargetPath "$WinClientFolder\Microsoft.Dynamics.Nav.Client.exe" -Arguments "-settings:ClientUserSettings.config" -Shortcuts $shortcuts New-DesktopShortcut -Name "$containerName WinClient Debugger" -TargetPath "$WinClientFolder\Microsoft.Dynamics.Nav.Client.exe" -Arguments "-settings:ClientUserSettings.config ""DynamicsNAV:////debug""" -Shortcuts $shortcuts $databaseInstance = $customConfig.DatabaseInstance $databaseName = $customConfig.DatabaseName $databaseServer = $customConfig.DatabaseServer if ($databaseServer -eq "host.containerhelper.internal") { $databaseServer = "localhost" if ($databaseInstance) { $databaseServer += "\$databaseInstance" } } elseif ($databaseServer -eq "localhost") { $databaseServer = "$containerName" if (("$databaseInstance" -ne "") -and ("$databaseInstance" -ne "SQLEXPRESS")) { $databaseServer += "\$databaseInstance" } } else { if ($databaseInstance) { $databaseServer += "\$databaseInstance" } } if ($auth -eq "Windows") { $ntauth="1" } else { $ntauth="0" } $csideParameters = "servername=$databaseServer, Database=$databaseName, ntauthentication=$ntauth, ID=$containerName" if ($enableSymbolLoading) { $csideParameters += ",generatesymbolreference=1" } New-DesktopShortcut -Name "$containerName CSIDE" -TargetPath "$WinClientFolder\finsql.exe" -Arguments "$csideParameters" -Shortcuts $shortcuts } if (($includeCSide -or $includeAL) -and !$doNotExportObjectsToText) { # Include oldsyntax only if IncludeCSide is specified # Include newsyntax if NAV Version is greater than NAV 2017 if ($includeCSide) { $originalFolder = Join-Path $bcContainerHelperConfig.hostHelperFolder "Extensions\Original-$navversion" if (!(Test-Path $originalFolder)) { # Export base objects Export-NavContainerObjects -containerName $containerName ` -objectsFolder $originalFolder ` -filter "" ` -sqlCredential $sqlCredential ` -ExportTo 'txt folder' } } if ($version.Major -ge 15) { $alFolder = Join-Path $bcContainerHelperConfig.hostHelperFolder "Extensions\Original-$navversion-al" if (!(Test-Path $alFolder) -or (Get-ChildItem -Path $alFolder -Recurse | Measure-Object).Count -eq 0) { if (!(Test-Path $alFolder)) { New-Item $alFolder -ItemType Directory | Out-Null } if ($version -ge [Version]("15.0.35528.0")) { Invoke-ScriptInBcContainer -containerName $containerName -scriptBlock { Param($alFolder, $country) [Reflection.Assembly]::LoadWithPartialName("System.IO.Compression.Filesystem") | Out-Null if (Test-Path "C:\Applications.$country") { $baseAppSource = @(get-childitem -Path "C:\Applications.*\*.*" -recurse -filter "Base Application.Source.zip") } else { $baseAppSource = @(get-childitem -Path "C:\Applications\*.*" -recurse -filter "Base Application.Source.zip") } if ($baseAppSource.Count -ne 1) { throw "Unable to locate Base Application.Source.zip" } Write-Host "Extracting $($baseAppSource[0].FullName)" [System.IO.Compression.ZipFile]::ExtractToDirectory($baseAppSource[0].FullName, $alFolder) } -argumentList (Get-BCContainerPath -containerName $containerName -path $alFolder), $devCountry } else { $appFile = Join-Path $bcContainerHelperConfig.hostHelperFolder "Extensions\BaseApp-$navVersion.app" $appName = "Base Application" if ($version -lt [Version]("15.0.35659.0")) { $appName = "BaseApp" } Get-BcContainerApp -containerName $containerName ` -publisher Microsoft ` -appName $appName ` -appFile $appFile ` -credential $credential $appFolder = Join-Path $bcContainerHelperConfig.hostHelperFolder "Extensions\BaseApp-$navVersion" Extract-AppFileToFolder -appFilename $appFile -appFolder $appFolder 'layout','src','translations' | ForEach-Object { if (Test-Path (Join-Path $appFolder $_)) { Copy-Item -Path (Join-Path $appFolder $_) -Destination $alFolder -Recurse -Force } } Remove-Item -Path $appFolder -Recurse -Force Remove-Item -Path $appFile -Force } } } elseif ($version.Major -gt 10) { $originalFolder = Join-Path $bcContainerHelperConfig.hostHelperFolder "Extensions\Original-$navversion-newsyntax" if (!(Test-Path $originalFolder)) { # Export base objects as new syntax Export-NavContainerObjects -containerName $containerName ` -objectsFolder $originalFolder ` -filter "" ` -sqlCredential $sqlCredential ` -ExportTo 'txt folder (new syntax)' } if ($version.Major -ge 14 -and $includeAL) { $alFolder = Join-Path $bcContainerHelperConfig.hostHelperFolder "Extensions\Original-$navversion-al" if ($runTxt2AlInContainer -ne $containerName) { Write-Host "Using container $runTxt2AlInContainer to convert .txt to .al" if (Test-Path $alFolder) { Write-Host "Removing existing AL folder $alFolder" Remove-Item -Path $alFolder -Recurse -Force } } if (!(Test-Path $alFolder)) { $dotNetAddInsPackage = Join-Path $bcContainerHelperConfig.hostHelperFolder "Extensions\$containerName\coredotnetaddins.al" Copy-Item -Path (Join-Path $PSScriptRoot "..\ObjectHandling\coredotnetaddins.al") -Destination $dotNetAddInsPackage -Force if ($runTxt2AlInContainer -ne $containerName) { Write-Host "Using container $runTxt2AlInContainer to convert .txt to .al" } Convert-Txt2Al -containerName $runTxt2AlInContainer -myDeltaFolder $originalFolder -myAlFolder $alFolder -startId 50100 -dotNetAddInsPackage $dotNetAddInsPackage } } } } } if ($Version.Major -ge 22) { Invoke-ScriptInBcContainer -containerName $containerName -scriptblock { Write-Host "Cleanup old dotnet core assemblies" Remove-Item -Path 'C:\Program Files\dotnet\shared\Microsoft.NETCore.App\1.0.*' -Recurse -Force -ErrorAction SilentlyContinue Remove-Item -Path 'C:\Program Files\dotnet\shared\Microsoft.NETCore.App\1.1.*' -Recurse -Force -ErrorAction SilentlyContinue Remove-Item -Path 'C:\Program Files\dotnet\shared\Microsoft.NETCore.App\5.0.*' -Recurse -Force -ErrorAction SilentlyContinue Remove-Item -Path 'C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App\5.0.*' -Recurse -Force -ErrorAction SilentlyContinue } } if ($includeAL) { $dotnetAssembliesFolder = Join-Path $containerFolder ".netPackages" New-Item -Path $dotnetAssembliesFolder -ItemType Directory -ErrorAction Ignore | Out-Null Write-Host "Creating .net Assembly Reference Folder" Invoke-ScriptInBcContainer -containerName $containerName -scriptblock { Param($dotnetAssembliesFolder, [System.Version] $Version) $serviceTierFolder = (Get-Item "C:\Program Files\Microsoft Dynamics NAV\*\Service").FullName $paths = @() if ($Version.Major -lt 22) { $paths += @('C:\Windows\assembly', 'C:\Windows\Microsoft.NET\assembly') } else { $paths += @('C:\Program Files\dotnet\Shared') } $paths += @($serviceTierFolder) $rtcFolder = "C:\Program Files (x86)\Microsoft Dynamics NAV\*\RoleTailored Client" if (Test-Path $rtcFolder -PathType Container) { $paths += (Get-Item $rtcFolder).FullName } $mockAssembliesPath = "C:\Test Assemblies\Mock Assemblies" if (Test-Path $mockAssembliesPath -PathType Container) { $paths += $mockAssembliesPath } if ($version.Major -lt 21) { $paths += "C:\Program Files (x86)\Open XML SDK" } $paths | ForEach-Object { Write-Host "Copying DLLs from $_ to assemblyProbingPath" if ($version.Major -ge 22) { Copy-Item -Path $_ -filter '*.dll' -Destination $dotnetAssembliesFolder -Recurse -Force -ErrorAction SilentlyContinue } else { $localPath = Join-Path $dotnetAssembliesFolder ([System.IO.Path]::GetFileName($_)) if (!(Test-Path $localPath)) { New-Item -Path $localPath -ItemType Directory -Force | Out-Null } Get-ChildItem -Path $_ -Filter '*.dll' -Recurse | ForEach-Object { if (!(Test-Path (Join-Path $localPath $_.Name))) { Copy-Item -Path $_.FullName -Destination $localPath -Force -ErrorAction SilentlyContinue } } } } if ($version.Major -ge 22) { Write-Host "Removing dotnet Framework Assemblies" $dotnetServiceFolder = Join-Path $dotnetAssembliesFolder "Service" Remove-Item -Path (Join-Path $dotnetserviceFolder 'Management') -Recurse -Force -ErrorAction SilentlyContinue Remove-Item -Path (Join-Path $dotnetserviceFolder 'SideServices') -Recurse -Force -ErrorAction SilentlyContinue Remove-Item -Path (Join-Path $dotnetserviceFolder 'WindowsServiceInstaller') -Recurse -Force -ErrorAction SilentlyContinue } $serviceTierAddInsFolder = Join-Path $serviceTierFolder "Add-ins" if (!(Test-Path (Join-Path $serviceTierAddInsFolder "RTC"))) { if (Test-Path $RtcFolder -PathType Container) { new-item -itemtype symboliclink -path $ServiceTierAddInsFolder -name "RTC" -value (Get-Item $RtcFolder).FullName | Out-Null } } if ($version.Major -eq 21) { Remove-Item -Path (Join-Path $dotnetAssembliesFolder 'assembly\DocumentFormat.OpenXml.dll') -Force -ErrorAction SilentlyContinue } } -argumentList (Get-BcContainerPath -containerName $containerName -path $dotnetAssembliesFolder), $version } if ($customConfig.ServerInstance) { # Only if not -filesOnly if (($useCleanDatabase -or $useNewDatabase) -and !$restoreBakFolder) { Clean-BcContainerDatabase -containerName $containerName -useNewDatabase:$useNewDatabase -credential $credential -doNotCopyEntitlements:$doNotCopyEntitlements -copyTables $copyTables if ($multitenant) { Write-Host "Switching to multitenant" Invoke-ScriptInBCContainer -containerName $containerName -scriptblock { $customConfigFile = Join-Path (Get-Item "C:\Program Files\Microsoft Dynamics NAV\*\Service").FullName "CustomSettings.config" [xml]$customConfig = [System.IO.File]::ReadAllText($customConfigFile) $databaseServer = $customConfig.SelectSingleNode("//appSettings/add[@key='DatabaseServer']").Value $databaseInstance = $customConfig.SelectSingleNode("//appSettings/add[@key='DatabaseInstance']").Value $databaseName = $customConfig.SelectSingleNode("//appSettings/add[@key='DatabaseName']").Value Set-NavserverInstance -ServerInstance $serverInstance -stop Copy-NavDatabase -SourceDatabaseName $databaseName -DestinationDatabaseName "tenant" Remove-NavDatabase -DatabaseName $databaseName Write-Host "Exporting Application to $DatabaseName" Invoke-sqlcmd -serverinstance "$DatabaseServer\$DatabaseInstance" -Database tenant -query 'CREATE USER "NT AUTHORITY\SYSTEM" FOR LOGIN "NT AUTHORITY\SYSTEM";' Export-NAVApplication -DatabaseServer $DatabaseServer -DatabaseInstance $DatabaseInstance -DatabaseName "tenant" -DestinationDatabaseName $databaseName -Force -ServiceAccount 'NT AUTHORITY\SYSTEM' | Out-Null Write-Host "Removing Application from tenant" Remove-NAVApplication -DatabaseServer $DatabaseServer -DatabaseInstance $DatabaseInstance -DatabaseName "tenant" -Force | Out-Null Set-NAVServerConfiguration -ServerInstance $ServerInstance -KeyName "Multitenant" -KeyValue "true" -ApplyTo ConfigFile Set-NavserverInstance -ServerInstance $serverInstance -start } $allowAppDatabaseWrite = ($additionalparameters | Where-Object { $_ -like "*defaultTenantHasAllowAppDatabaseWrite=Y" }) -ne $null New-BcContainerTenant -containerName $containerName -tenantId default -allowAppDatabaseWrite:$allowAppDatabaseWrite } } elseif ($createTenantAndUserInExternalDatabase) { if ($multitenant) { $allowAppDatabaseWrite = ($additionalparameters | Where-Object { $_ -like "*defaultTenantHasAllowAppDatabaseWrite=Y" }) -ne $null New-NavContainerTenant ` -containerName $containerName ` -tenantId 'default' ` -sqlCredential $databaseCredential ` -sourceDatabase "$($databasePrefix)tenant" ` -destinationDatabase "$($databasePrefix)default" ` -allowAppDatabaseWrite:$allowAppDatabaseWrite } New-NavContainerNavUser ` -containerName $containerName ` -tenant 'default' ` -Credential $credential ` -PermissionSetId 'SUPER' ` -ChangePasswordAtNextLogOn:$false } if (!$restoreBakFolder -and $finalizeDatabasesScriptBlock) { Invoke-Command -ScriptBlock $finalizeDatabasesScriptBlock } if ($bakFolder -and !$restoreBakFolder) { Backup-BcContainerDatabases -containerName $containerName -bakFolder $bakFolder } Write-Host -ForegroundColor Green "Container $containerName successfully created" if ($useTraefik) { Write-Host -ForegroundColor Yellow "Because of Traefik, the following URLs need to be used when accessing the container from outside your Docker host:" Write-Host "Web Client: $webclientUrl" Write-Host "SOAP WebServices: $soapUrl" Write-Host "OData WebServices: $restUrl" Write-Host "Dev Service: $devUrl" Write-Host "Snapshot Service: $snapUrl" Write-Host "File downloads: $dlUrl" } if (!$doNotCheckHealth) { if (Invoke-ScriptInBcContainer -containerName $containerName -scriptblock { $result = $false try { . c:\run\healthcheck.ps1 $result = ("$LASTEXITCODE" -eq "1") } catch {} $result }) { Write-Host "Health check returns False, restarting container" Restart-BcContainer $containerName } } Write-Host Write-Host "Use:" Write-Host -ForegroundColor Yellow -NoNewline "Get-BcContainerEventLog -containerName $containerName" Write-Host " to retrieve a snapshot of the event log from the container" Write-Host -ForegroundColor Yellow -NoNewline "Get-BcContainerDebugInfo -containerName $containerName" Write-Host " to get debug information about the container" Write-Host -ForegroundColor Yellow -NoNewline "Enter-BcContainer -containerName $containerName" Write-Host " to open a PowerShell prompt inside the container" Write-Host -ForegroundColor Yellow -NoNewline "Remove-BcContainer -containerName $containerName" Write-Host " to remove the container again" Write-Host -ForegroundColor Yellow -NoNewline "docker logs $containerName" Write-Host " to retrieve information about URL's again" } } catch { TrackException -telemetryScope $telemetryScope -errorRecord $_ throw } finally { TrackTrace -telemetryScope $telemetryScope } } Set-Alias -Name New-NavContainer -Value New-BcContainer Export-ModuleMember -Function New-BcContainer -Alias New-NavContainer # SIG # Begin signature block # MIImbAYJKoZIhvcNAQcCoIImXTCCJlkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDGV0Yv5Vl6eLYQ # FisQOQL2mZ2iqDewpGW5lVSSfnQKLqCCH4QwggWNMIIEdaADAgECAhAOmxiO+dAt # 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV # BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa # Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy # dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD # ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC # ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E # MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy # unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF # xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1 # 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB # MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR # WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6 # nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB # YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S # UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x # q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB # NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP # TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC # AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp # Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv # bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0 # aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB # LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc # Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov # Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy # oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW # juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF # mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z # twGpn1eqXijiuZQwggYaMIIEAqADAgECAhBiHW0MUgGeO5B5FSCJIRwKMA0GCSqG # SIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0 # ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBSb290IFI0 # NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5NTlaMFQxCzAJBgNVBAYTAkdC # MRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxKzApBgNVBAMTIlNlY3RpZ28gUHVi # bGljIENvZGUgU2lnbmluZyBDQSBSMzYwggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAw # ggGKAoIBgQCbK51T+jU/jmAGQ2rAz/V/9shTUxjIztNsfvxYB5UXeWUzCxEeAEZG # bEN4QMgCsJLZUKhWThj/yPqy0iSZhXkZ6Pg2A2NVDgFigOMYzB2OKhdqfWGVoYW3 # haT29PSTahYkwmMv0b/83nbeECbiMXhSOtbam+/36F09fy1tsB8je/RV0mIk8XL/ # tfCK6cPuYHE215wzrK0h1SWHTxPbPuYkRdkP05ZwmRmTnAO5/arnY83jeNzhP06S # hdnRqtZlV59+8yv+KIhE5ILMqgOZYAENHNX9SJDm+qxp4VqpB3MV/h53yl41aHU5 # pledi9lCBbH9JeIkNFICiVHNkRmq4TpxtwfvjsUedyz8rNyfQJy/aOs5b4s+ac7I # H60B+Ja7TVM+EKv1WuTGwcLmoU3FpOFMbmPj8pz44MPZ1f9+YEQIQty/NQd/2yGg # W+ufflcZ/ZE9o1M7a5Jnqf2i2/uMSWymR8r2oQBMdlyh2n5HirY4jKnFH/9gRvd+ # QOfdRrJZb1sCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFDLrkpr/NZZILyhAQnAg # NpFcF4XmMB0GA1UdDgQWBBQPKssghyi47G9IritUpimqF6TNDDAOBgNVHQ8BAf8E # BAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDAzAb # BgNVHSAEFDASMAYGBFUdIAAwCAYGZ4EMAQQBMEsGA1UdHwREMEIwQKA+oDyGOmh0 # dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5nUm9v # dFI0Ni5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8vY3J0 # LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ1Jvb3RSNDYucDdj # MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0B # AQwFAAOCAgEABv+C4XdjNm57oRUgmxP/BP6YdURhw1aVcdGRP4Wh60BAscjW4HL9 # hcpkOTz5jUug2oeunbYAowbFC2AKK+cMcXIBD0ZdOaWTsyNyBBsMLHqafvIhrCym # laS98+QpoBCyKppP0OcxYEdU0hpsaqBBIZOtBajjcw5+w/KeFvPYfLF/ldYpmlG+ # vd0xqlqd099iChnyIMvY5HexjO2AmtsbpVn0OhNcWbWDRF/3sBp6fWXhz7DcML4i # TAWS+MVXeNLj1lJziVKEoroGs9Mlizg0bUMbOalOhOfCipnx8CaLZeVme5yELg09 # Jlo8BMe80jO37PU8ejfkP9/uPak7VLwELKxAMcJszkyeiaerlphwoKx1uHRzNyE6 # bxuSKcutisqmKL5OTunAvtONEoteSiabkPVSZ2z76mKnzAfZxCl/3dq3dUNw4rg3 # sTCggkHSRqTqlLMS7gjrhTqBmzu1L90Y1KWN/Y5JKdGvspbOrTfOXyXvmPL6E52z # 1NZJ6ctuMFBQZH3pwWvqURR8AgQdULUvrxjUYbHHj95Ejza63zdrEcxWLDX6xWls # /GDnVNueKjWUH3fTv1Y8Wdho698YADR7TNx8X8z2Bev6SivBBOHY+uqiirZtg0y9 # ShQoPzmCcn63Syatatvx157YK9hlcPmVoa1oDE5/L9Uo2bC5a4CH2RwwggZZMIIE # waADAgECAhANIM3qwHRbWKHw+Zq6JhzlMA0GCSqGSIb3DQEBDAUAMFQxCzAJBgNV # BAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxKzApBgNVBAMTIlNlY3Rp # Z28gUHVibGljIENvZGUgU2lnbmluZyBDQSBSMzYwHhcNMjExMDIyMDAwMDAwWhcN # MjQxMDIxMjM1OTU5WjBdMQswCQYDVQQGEwJESzEUMBIGA1UECAwLSG92ZWRzdGFk # ZW4xGzAZBgNVBAoMEkZyZWRkeSBLcmlzdGlhbnNlbjEbMBkGA1UEAwwSRnJlZGR5 # IEtyaXN0aWFuc2VuMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgYC5 # tlg+VRktRRkahxxaV8+DAd6vHoDpcO6w7yT24lnSoMuA6nR7kgy90Y/sHIwKE9Ww # t/px/GAY8eBePWjJrFpG8fBtJbXadRTVd/470Hs/q9t+kh6A/0ELj7wYsKSNOyuF # Poy4rtClOv9ZmrRpoDVnh8Epwg2DpklX2BNzykzBQxIbkpp+xVo2mhPNWDIesntc # 4/BnSebLGw1Vkxmu2acKkIjYrne/7lsuyL9ue0vk8TGk9JBPNPbGKJvHu9szP9oG # oH36fU1sEZ+AacXrp+onsyPf/hkkpAMHAhzQHl+5Ikvcus/cDm06twm7VywmZcas # 2rFAV5MyE6WMEaYAolwAHiPz9WAs2GDhFtZZg1tzbRjJIIgPpR+doTIcpcDBcHnN # dSdgWKrTkr2f339oT5bnJfo7oVzc/2HGWvb8Fom6LQAqSC11vWmznHYsCm72g+fo # TKqW8lLDfLF0+aFvToLosrtW9l6Z+l+RQ8MtJ9EHOm2Ny8cFLzZCDZYw32BydwcL # V5rKdy4Ica9on5xZvyMOLiFwuL4v2V4pjEgKJaGSS/IVSMEGjrM9DHT6YS4/oq9q # 20rQUmMZZQmGmEyyKQ8t11si8VHtScN5m0Li8peoWfCU9mRFxSESwTWow8d462+o # 9/SzmDxCACdFwzvfKx4JqDMm55cL+beunIvc0NsCAwEAAaOCAZwwggGYMB8GA1Ud # IwQYMBaAFA8qyyCHKLjsb0iuK1SmKaoXpM0MMB0GA1UdDgQWBBTZD6uy9ZWIIqQh # 3srYu1FlUhdM0TAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADATBgNVHSUE # DDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYDVR0gBEMwQTA1Bgwr # BgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9D # UFMwCAYGZ4EMAQQBMEkGA1UdHwRCMEAwPqA8oDqGOGh0dHA6Ly9jcmwuc2VjdGln # by5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5nQ0FSMzYuY3JsMHkGCCsGAQUF # BwEBBG0wazBEBggrBgEFBQcwAoY4aHR0cDovL2NydC5zZWN0aWdvLmNvbS9TZWN0 # aWdvUHVibGljQ29kZVNpZ25pbmdDQVIzNi5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4IBgQASEbZACurQeQN8 # WDTR+YyNpoQ29YAbbdBRhhzHkT/1ao7LE0QIOgGR4GwKRzufCAwu8pCBiMOUTDHT # ezkh0rQrG6khxBX2nSTBL5i4LwKMR08HgZBsbECciABy15yexYWoB/D0H8WuGe63 # PhGWueR4IFPbIz+jEVxfW0Nyyr7bXTecpKd1iprm+TOmzc2E6ab95dkcXdJVx6Zy # s++QrrOfQ+a57qEXkS/wnjjbN9hukL0zg+g8L4DHLKTodzfiQOampvV8QzbnB7Y8 # YjNcxR9s/nptnlQH3jorNFhktiBXvD62jc8pAIg6wyH6NxSMjtTsn7QhkIp2kusw # IQwD8hN/fZ/m6gkXZhRJWFr2WRZOz+edZ62Jf25C/NYWscwfBwn2hzRZf1HgyxkX # Al88dvvUA3kw1T6uo8aAB9IcL6Owiy7q4T+RLRF7oqx0vcw0193Yhq/gPOaUFlqz # ExP6TQ5TR9XWVPQk+a1B1ATKMLi1JShO6KWTmNkFkgkgpkW69BEwggauMIIElqAD # AgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYT # AlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2Vy # dC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAz # MjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQK # Ew5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBS # U0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDM # g/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOx # s+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09ns # ad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtA # rF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149z # k6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6 # OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qh # HGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1 # KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX # 6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0 # sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQID # AQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2F # L3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08w # DgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEB # BGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsG # AQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVz # dGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdp # Y2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgG # BmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+Y # qUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjY # C+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0 # FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6 # WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGj # VoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzp # SwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwd # eDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o # 08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n # +2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y # 3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIO # K+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIGwjCCBKqgAwIBAgIQBUSv85SdCDmm # v9s/X+VhFjANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMO # RGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNB # NDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0 # MTAxMzIzNTk1OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJ # bmMuMSAwHgYDVQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwv # SKOXejsqnGfcYhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsv # lmbjaedp/lvD1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4Z # GIX7ReoNYWyd/nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RCh # G4PBuOZSlbVH13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDa # Y7Mu6QXuqvYk9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S7 # 69SgLDSb495uZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0 # rRUGFOpiCBPTaR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQ # fqZcClhMAD6FaXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7Ujip # mAmhcbJsca8+uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1P # t7U20clfCKRwo+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM6 # 04qDy0B7AgMBAAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIw # ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjAL # BglghkgBhv1sBwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYD # VR0OBBYEFKW27xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0 # dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZT # SEEyNTZUaW1lU3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsG # AQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0 # dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQw # OTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa # 1t6gqbWYF7xwjU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1O # tt5s1+FgnCvt7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4 # JZ0qBXqEKZi2V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvP # nPp44pMadqJpddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3 # NG6wQSbd3lqXTzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7M # mJ4ZiQPq1JE3701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOG # v6wnLEHQmjNKqDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5 # AdzaROY63jg7B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2ny # Mpqy0tg6uLFGhmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0e # aHDAdwrUAuBcYLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9n # R2XlG3O2mflrLAZG70Ee8PBf4NvZrZCARK+AEEGKMYIGPjCCBjoCAQEwaDBUMQsw # CQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSswKQYDVQQDEyJT # ZWN0aWdvIFB1YmxpYyBDb2RlIFNpZ25pbmcgQ0EgUjM2AhANIM3qwHRbWKHw+Zq6 # JhzlMA0GCWCGSAFlAwQCAQUAoIGEMBgGCisGAQQBgjcCAQwxCjAIoAKAAKECgAAw # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGNxDJhGV6vnZXoeyHkRYnFfU3KeW9xS # g9YHLRAZ+eiTMA0GCSqGSIb3DQEBAQUABIICAH5/2AvRD2Dk4Tlfl2B1UjHjY1wG # GS/U+prHkKsq5xm+1L/jl7x36wtZ9oFZ1GFBAnP1DoalVRRuB53q0e7eUjEiTZ2T # IZnm97JDW0/mQRJbWGvy6jyZ0kDTHfysUQ0JMDlCrx59MFDlObhzvNvx9TKA9ffl # 5OypOwXdlvNua9Qzp74SUgkyS8HLi1vBBcIl4gakUbh3gu8qf5UhR4NnCjD4dFhq # 1EGIZOPb6AB2S9upipmeOyEk27UsILEDRsaI2h7711ykozfoR3WngE13s3PaqQeq # 4+Y3mmRvbh9h1iuoFmiqdA72tnCQYeNIkluS98QFMAmEmNPeK4zUMvrImjJaHtC9 # zPUtPOYu9wj0go5U0dqRZtzX7psJ2eEjhorjtgnlOwWVDldzqR1Ed6U2ZqKRK0PK # 3AqKGDu2Y480JsqIDmSZdLTTxxMUfN9Vgg/y2GCNGsvsMNBf0w45KPnr81bMhF/x # mLeI+jGBB/Tguv51oWk3gXNaAzQuGr149BYqda5rqLVHIvql20fuMEdq6aefg+aQ # 01x8Gx4Xm7enR+VSwKyc9T8eqWnU+8zmRDfQyswl/8V3u1QsvGePkJ+gRFS82RfZ # qAubwzStzzl/V6hSQ4s/rTMn4cL9EGwpGfrOMgAfuhlvpS6nm3JuZFFggv6kHJpj # M8L3RO3ABPXMOTKToYIDIDCCAxwGCSqGSIb3DQEJBjGCAw0wggMJAgEBMHcwYzEL # MAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJE # aWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBD # QQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKBpMBgGCSqGSIb3DQEJ # AzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTI0MDgyMTA3NDMxNlowLwYJ # KoZIhvcNAQkEMSIEIK638wKRTXJA1h4TOzS7yVc22wHbHMvL4+vdgcGNrFYjMA0G # CSqGSIb3DQEBAQUABIICAG7qJD1nzsa8jj+drClwKS4F5O0wTIKrCxIm6D4Wz3jm # Xutvy6+TEbLYdWN4O1OMeuLMfAy0/a95GJ6q/e0IBcX4VkoO232+khXTBLA+1lJX # g7p2jigDAJ3aGPiOx/cEj4FELlhh1CQ0M6d5G87zaJu1XR9XqzGofAgZ4okOysi3 # NXs9gkOL9Fqiud6vvkT4cgQC+1BSVGnm/xMzrEve1mczsOjK6cEDzwqZ77f6PrcL # 8BtkpIg6SClMVWzltC2s6W6EZIz0LOoc3YDDNDVd2Q9zdmTipFuntOUXz3VTvWXI # OSOWPQVJblAQ1glxIfH++zK5E6jGnXNuF2wDp6ze0G5Kt7oKF0sSoACKbGEgwaps # luNlWMoGk4ZefeZD7hrfUuJeJpnZb77dV/d7kin0TkVFzJpR0/MP9++ftXx3Rsjv # VdVHkuTSOldYOxfNMrs/hO3u5n5MjkIO3Zw0+84uj75aMSafQBSB50Rfm3kN9NDa # Jg1xSEH+2olHjJmE2oXzdnQNRNe0R8P12T5825QGUdNeyIooQqK9C0EvrL5SFYHM # yW1Hn9JYuEDBk/nTm71EqqnWsV5SBoJh42YwmVwVZ52X6IJOYVy/cZsT4Oymge6h # KOtIEsxZNIDBPki0nG19rtWhAbsWDeQXgiE/ln1j01Ca0g/WIc72UrZ4sDAcRqcU # SIG # End signature block |