HelperFunctions.ps1
$sslCallbackCode = @"
using System.Net.Security; using System.Security.Cryptography.X509Certificates; public static class SslVerification { public static bool DisabledServerCertificateValidationCallback(object sender, X509Certificate certificate, X509Chain chain, SslPolicyErrors sslPolicyErrors) { return true; } public static void Disable() { System.Net.ServicePointManager.ServerCertificateValidationCallback = DisabledServerCertificateValidationCallback; } public static void Enable() { System.Net.ServicePointManager.ServerCertificateValidationCallback = null; } public static void DisableSsl(System.Net.Http.HttpClientHandler handler) { handler.ServerCertificateCustomValidationCallback = DisabledServerCertificateValidationCallback; } } "@ if (-not ([System.Management.Automation.PSTypeName]"SslVerification").Type) { if ($isPsCore) { Add-Type -TypeDefinition $sslCallbackCode -Language CSharp -WarningAction SilentlyContinue | Out-Null } else { Add-Type -TypeDefinition $sslCallbackCode -Language CSharp -ReferencedAssemblies @('System.Net.Http') -WarningAction SilentlyContinue | Out-Null } } function Get-DefaultCredential { Param( [string]$Message, [string]$DefaultUserName, [switch]$doNotAskForCredential ) if (Test-Path "$($bcContainerHelperConfig.hostHelperFolder)\settings.ps1") { . "$($bcContainerHelperConfig.hostHelperFolder)\settings.ps1" if (Test-Path "$($bcContainerHelperConfig.hostHelperFolder)\aes.key") { $key = Get-Content -Path "$($bcContainerHelperConfig.hostHelperFolder)\aes.key" New-Object System.Management.Automation.PSCredential ($DefaultUserName, (ConvertTo-SecureString -String $adminPassword -Key $key)) } else { New-Object System.Management.Automation.PSCredential ($DefaultUserName, (ConvertTo-SecureString -String $adminPassword)) } } else { if (!$doNotAskForCredential) { Get-Credential -username $DefaultUserName -Message $Message } } } function Get-DefaultSqlCredential { Param( [Parameter(Mandatory = $true)] [string]$containerName, [System.Management.Automation.PSCredential]$sqlCredential = $null, [switch]$doNotAskForCredential ) if ($sqlCredential -eq $null) { $containerAuth = Get-NavContainerAuth -containerName $containerName if ($containerAuth -ne "Windows") { $sqlCredential = Get-DefaultCredential -DefaultUserName "" -Message "Please enter the SQL Server System Admin credentials for container $containerName" -doNotAskForCredential:$doNotAskForCredential } } $sqlCredential } function CmdDo { Param( [string] $command = "", [string] $arguments = "", [switch] $silent, [switch] $returnValue, [string] $inputStr = "", [string] $messageIfCmdNotFound = "" ) $oldNoColor = "$env:NO_COLOR" $env:NO_COLOR = "Y" $oldEncoding = [Console]::OutputEncoding try { [Console]::OutputEncoding = [System.Text.Encoding]::UTF8 } catch {} try { $pinfo = New-Object System.Diagnostics.ProcessStartInfo $pinfo.FileName = $command $pinfo.RedirectStandardError = $true $pinfo.RedirectStandardOutput = $true if ($inputStr) { $pinfo.RedirectStandardInput = $true } $pinfo.WorkingDirectory = Get-Location $pinfo.UseShellExecute = $false $pinfo.Arguments = $arguments $pinfo.WindowStyle = [System.Diagnostics.ProcessWindowStyle]::Minimized $p = New-Object System.Diagnostics.Process $p.StartInfo = $pinfo $p.Start() | Out-Null if ($inputStr) { $p.StandardInput.WriteLine($inputStr) $p.StandardInput.Close() } $outtask = $p.StandardOutput.ReadToEndAsync() $errtask = $p.StandardError.ReadToEndAsync() $p.WaitForExit(); $message = $outtask.Result $err = $errtask.Result if ("$err" -ne "") { $message += "$err" } $message = $message.Trim() if ($p.ExitCode -eq 0) { if (!$silent) { Write-Host $message } if ($returnValue) { $message.Replace("`r", "").Split("`n") } } else { $message += "`n`nExitCode: " + $p.ExitCode + "`nCommandline: $command $arguments" throw $message } } catch [System.ComponentModel.Win32Exception] { if ($_.Exception.NativeErrorCode -eq 2) { if ($messageIfCmdNotFound) { throw $messageIfCmdNotFound } else { throw "Command $command not found, you might need to install that command." } } else { throw } } finally { try { [Console]::OutputEncoding = $oldEncoding } catch {} $env:NO_COLOR = $oldNoColor } } function DockerDo { Param( [Parameter(Mandatory = $true)] [string]$imageName, [ValidateSet('run', 'start', 'pull', 'restart', 'stop', 'rmi','build')] [string]$command = "run", [switch]$accept_eula, [switch]$accept_outdated, [switch]$detach, [switch]$silent, [string[]]$parameters = @() ) if ($accept_eula) { $parameters += "--env accept_eula=Y" } if ($accept_outdated) { $parameters += "--env accept_outdated=Y" } if ($detach) { $parameters += "--detach" } $result = $true $arguments = ("$command " + [string]::Join(" ", $parameters) + " $imageName") $pinfo = New-Object System.Diagnostics.ProcessStartInfo $pinfo.FileName = "docker.exe" $pinfo.RedirectStandardError = $true $pinfo.RedirectStandardOutput = $true $pinfo.UseShellExecute = $false $pinfo.Arguments = $arguments $p = New-Object System.Diagnostics.Process $p.StartInfo = $pinfo $p.Start() | Out-Null $outtask = $null $errtask = $p.StandardError.ReadToEndAsync() $out = "" $err = "" do { if ($outtask -eq $null) { $outtask = $p.StandardOutput.ReadLineAsync() } $outtask.Wait(100) | Out-Null if ($outtask.IsCompleted) { $outStr = $outtask.Result if ($outStr -eq $null) { break } if (!$silent) { Write-Host $outStr } $out += $outStr $outtask = $null if ($outStr.StartsWith("Please login")) { $registry = $imageName.Split("/")[0] if ($registry -eq "bcinsider.azurecr.io" -or $registry -eq "bcprivate.azurecr.io") { throw "You need to login to $registry prior to pulling images. Get credentials through the ReadyToGo program on Microsoft Collaborate." } else { throw "You need to login to $registry prior to pulling images." } } } elseif ($outtask.IsCanceled) { break } elseif ($outtask.IsFaulted) { break } } while (!($p.HasExited)) $err = $errtask.Result $p.WaitForExit(); if ($p.ExitCode -ne 0) { $result = $false if (!$silent) { $out = $out.Trim() $err = $err.Trim() if ($command -eq "run" -and "$out" -ne "") { Docker rm $out -f } $errorMessage = "" if ("$err" -ne "") { $errorMessage += "$err`r`n" if ($err.Contains("authentication required")) { $registry = $imageName.Split("/")[0] if ($registry -eq "bcinsider.azurecr.io" -or $registry -eq "bcprivate.azurecr.io") { $errorMessage += "You need to login to $registry prior to pulling images. Get credentials through the ReadyToGo program on Microsoft Collaborate.`r`n" } else { $errorMessage += "You need to login to $registry prior to pulling images.`r`n" } } } $errorMessage += "ExitCode: " + $p.ExitCode + "`r`nCommandline: docker $arguments" Write-Error -Message $errorMessage } } $result } function Get-NavContainerAuth { Param ( [string]$containerName ) Invoke-ScriptInNavContainer -containerName $containerName -ScriptBlock { $customConfigFile = Join-Path (Get-Item "C:\Program Files\Microsoft Dynamics NAV\*\Service").FullName "CustomSettings.config" [xml]$customConfig = [System.IO.File]::ReadAllText($customConfigFile) $customConfig.SelectSingleNode("//appSettings/add[@key='ClientServicesCredentialType']").Value } } function Check-BcContainerName { Param ( [string]$containerName = "" ) if ($containerName -eq "") { throw "Container name cannot be empty" } if ($containerName.Length -gt 15) { Write-Host "WARNING: Container name should not exceed 15 characters" } $first = $containerName.ToLowerInvariant()[0] if ($first -lt "a" -or $first -gt "z") { throw "Container name should start with a letter (a-z)" } $containerName.ToLowerInvariant().ToCharArray() | ForEach-Object { if (($_ -lt "a" -or $_ -gt "z") -and ($_ -lt "0" -or $_ -gt "9") -and ($_ -ne "-")) { throw "Container name contains invalid characters. Allowed characters are letters (a-z), numbers (0-9) and dashes (-)" } } } function AssumeNavContainer { Param ( [string]$containerOrImageName = "", [string]$functionName = "" ) $inspect = docker inspect $containerOrImageName | ConvertFrom-Json if ($inspect.Config.Labels.psobject.Properties.Match('maintainer').Count -eq 0 -or $inspect.Config.Labels.maintainer -ne "Dynamics SMB") { throw "Container $containerOrImageName is not a Business Central container" } [System.Version]$version = $inspect.Config.Labels.version if ("$functionName" -eq "") { $functionName = (Get-Variable MyInvocation -Scope 1).Value.MyCommand.Name } if ($version.Major -ge 15) { throw "Container $containerOrImageName does not support the function $functionName" } } function Expand-7zipArchive { Param ( [Parameter(Mandatory = $true)] [string] $Path, [string] $DestinationPath, [switch] $use7zipIfAvailable = $bcContainerHelperConfig.use7zipIfAvailable, [switch] $silent ) $7zipPath = "$env:ProgramFiles\7-Zip\7z.exe" $use7zip = $false if ($use7zipIfAvailable -and (Test-Path -Path $7zipPath -PathType Leaf)) { try { $use7zip = [System.Diagnostics.FileVersionInfo]::GetVersionInfo($7zipPath).FileMajorPart -ge 19 } catch { $use7zip = $false } } if ($use7zip) { if (!$silent) { Write-Host "using 7zip" } Set-Alias -Name 7z -Value $7zipPath $command = '7z x "{0}" -o"{1}" -aoa -r' -f $Path, $DestinationPath $global:LASTEXITCODE = 0 Invoke-Expression -Command $command | Out-Null if ($LASTEXITCODE -ne 0) { throw "Error $LASTEXITCODE extracting $path" } } else { if (!$silent) { Write-Host "using Expand-Archive" } if ([System.IO.Path]::GetExtension($path) -eq '.zip') { Expand-Archive -Path $Path -DestinationPath "$DestinationPath" -Force } else { $tempZip = Join-Path ([System.IO.Path]::GetTempPath()) "$([guid]::NewGuid().ToString()).zip" Copy-Item -Path $Path -Destination $tempZip -Force try { Expand-Archive -Path $tempZip -DestinationPath "$DestinationPath" -Force } finally { Remove-Item -Path $tempZip -Force } } } } function GetTestToolkitApps { Param( [string] $containerName, [string] $compilerFolder, [switch] $includeTestLibrariesOnly, [switch] $includeTestFrameworkOnly, [switch] $includeTestRunnerOnly, [switch] $includePerformanceToolkit ) if ($compilerFolder) { $symbolsFolder = Join-Path $compilerFolder "symbols" # Add Test Framework $apps = @() $baseAppInfo = Get-AppJsonFromAppFile -appFile (Get-ChildItem -Path $symbolsFolder -Filter 'Microsoft_Base Application_*.*.*.*.app').FullName $version = [Version]$baseAppInfo.version if ($version -ge [Version]"19.0.0.0") { $apps += @('Microsoft_Permissions Mock') } $apps += @('Microsoft_Test Runner') if (!$includeTestRunnerOnly) { $apps += @('Microsoft_Any', 'Microsoft_Library Assert', 'Microsoft_Library Variable Storage') if (!$includeTestFrameworkOnly) { # Add Test Libraries $apps += @('Microsoft_System Application Test Library', 'Microsoft_Business Foundation Test Libraries', 'Microsoft_Tests-TestLibraries','Microsoft_AI Test Toolkit') if (!$includeTestLibrariesOnly) { # Add Tests if ($version -ge [Version]"18.0.0.0") { $apps += @('Microsoft_System Application Test', 'Microsoft_Business Foundation Tests', 'Microsoft_Tests-*') } } } } if ($includePerformanceToolkit) { $apps += @('Microsoft_Performance Toolkit') if (!$includeTestFrameworkOnly) { $apps += @('Microsoft_Performance Toolkit *') } } $appFiles = @() $apps | ForEach-Object { $appFiles += @(get-childitem -Path $symbolsFolder -Filter "$($_)_*.*.*.*.app" | Where-Object {($version.Major -ge 17 -or ($_.Name -notlike 'Microsoft_Tests-Marketing_*.*.*.*.app')) -and $_.Name -notlike "Microsoft_Tests-SINGLESERVER_*.*.*.*.app"} | ForEach-Object { $_.FullName }) } $appFiles | Select-Object -Unique } else { Invoke-ScriptInBCContainer -containerName $containerName -scriptblock { Param($includeTestLibrariesOnly, $includeTestFrameworkOnly, $includeTestRunnerOnly, $includePerformanceToolkit) $version = [Version](Get-Item "C:\Program Files\Microsoft Dynamics NAV\*\Service\Microsoft.Dynamics.Nav.Server.exe").VersionInfo.FileVersion # Add Test Framework $apps = @() if (($version -ge [Version]"19.0.0.0") -and (Test-Path 'C:\Applications\TestFramework\TestLibraries\permissions mock')) { $apps += @(get-childitem -Path "C:\Applications\TestFramework\TestLibraries\permissions mock\*.*" -recurse -filter "*.app") } $apps += @(get-childitem -Path "C:\Applications\TestFramework\TestRunner\*.*" -recurse -filter "*.app") if (!$includeTestRunnerOnly) { $apps += @(get-childitem -Path "C:\Applications\TestFramework\TestLibraries\*.*" -recurse -filter "*.app") if (!$includeTestFrameworkOnly) { # Add Test Libraries $apps += "Microsoft_System Application Test Library.app", "Microsoft_Business Foundation Test Libraries.app", "Microsoft_Tests-TestLibraries.app", 'Microsoft_AI Test Toolkit.app' | ForEach-Object { @(get-childitem -Path "C:\Applications\*.*" -recurse -filter $_) } if (!$includeTestLibrariesOnly) { # Add Tests if ($version -ge [Version]"18.0.0.0") { $apps += "Microsoft_System Application Test.app", "Microsoft_Business Foundation Tests.app" | ForEach-Object { @(get-childitem -Path "C:\Applications\*.*" -recurse -filter $_) } } $apps += @(get-childitem -Path "C:\Applications\*.*" -recurse -filter "Microsoft_Tests-*.app") | Where-Object { $_ -notlike "*\Microsoft_Tests-TestLibraries.app" -and ($version.Major -ge 17 -or ($_ -notlike "*\Microsoft_Tests-Marketing.app")) -and $_ -notlike "*\Microsoft_Tests-SINGLESERVER.app" } } } } if ($includePerformanceToolkit) { $apps += @(get-childitem -Path "C:\Applications\TestFramework\PerformanceToolkit\*.*" -recurse -filter "*Toolkit.app") if (!$includeTestFrameworkOnly) { $apps += @(get-childitem -Path "C:\Applications\TestFramework\PerformanceToolkit\*.*" -recurse -filter "*.app" -exclude "*Toolkit.app") } } $apps | ForEach-Object { $appFile = Get-ChildItem -path "c:\applications.*\*.*" -recurse -filter ($_.Name).Replace(".app", "_*.app") if (!($appFile)) { $appFile = $_ } $appFile.FullName } } -argumentList $includeTestLibrariesOnly, $includeTestFrameworkOnly, $includeTestRunnerOnly, $includePerformanceToolkit } } function GetExtendedErrorMessage { Param( $errorRecord ) $exception = $errorRecord.Exception $message = $exception.Message try { if ($errorRecord.ErrorDetails) { $errorDetails = $errorRecord.ErrorDetails | ConvertFrom-Json $message += " $($errorDetails.error)`r`n$($errorDetails.error_description)" } } catch {} try { if ($exception -is [System.Management.Automation.MethodInvocationException]) { $exception = $exception.InnerException } if ($exception -is [System.Net.Http.HttpRequestException]) { $message += "`r`n$($exception.Message)" if ($exception.InnerException) { if ($exception.InnerException -and $exception.InnerException.Message) { $message += "`r`n$($exception.InnerException.Message)" } } } else { $webException = [System.Net.WebException]$exception $webResponse = $webException.Response try { if ($webResponse.StatusDescription) { $message += "`r`n$($webResponse.StatusDescription)" } } catch {} $reqstream = $webResponse.GetResponseStream() $sr = new-object System.IO.StreamReader $reqstream $result = $sr.ReadToEnd() } try { $json = $result | ConvertFrom-Json $message += "`r`n$($json.Message)" } catch { $message += "`r`n$result" } try { $correlationX = $webResponse.GetResponseHeader('ms-correlation-x') if ($correlationX) { $message += " (ms-correlation-x = $correlationX)" } } catch {} } catch {} $message } function CopyAppFilesToFolder { Param( $appFiles, [string] $folder ) if ($appFiles -is [String]) { if (!(Test-Path $appFiles)) { $appFiles = @($appFiles.Split(',').Trim() | Where-Object { $_ }) } } if (!(Test-Path $folder)) { New-Item -Path $folder -ItemType Directory | Out-Null } $appFiles | Where-Object { $_ } | ForEach-Object { $appFile = "$_" if ($appFile -like "http://*" -or $appFile -like "https://*") { $appUrl = $appFile $appFileFolder = Join-Path ([System.IO.Path]::GetTempPath()) ([Guid]::NewGuid().ToString()) $appFile = Join-Path $appFileFolder ([Uri]::UnescapeDataString([System.IO.Path]::GetFileName($appUrl.Split('?')[0]))) Download-File -sourceUrl $appUrl -destinationFile $appFile CopyAppFilesToFolder -appFile $appFile -folder $folder if (Test-Path $appFileFolder) { Remove-Item -Path $appFileFolder -Force -Recurse } } elseif (Test-Path $appFile -PathType Container) { Get-ChildItem $appFile -Recurse -File | ForEach-Object { CopyAppFilesToFolder -appFile $_.FullName -folder $folder } } elseif (Test-Path $appFile -PathType Leaf) { Get-ChildItem $appFile | ForEach-Object { $appFile = $_.FullName if ($appFile -like "*.app") { $destFileName = [System.IO.Path]::GetFileName($appFile) $destFile = Join-Path $folder $destFileName if (Test-Path $destFile) { Write-Host -ForegroundColor Yellow "::WARNING::$destFileName already exists, it looks like you have multiple app files with the same name. App filenames must be unique." } Copy-Item -Path $appFile -Destination $destFile -Force $destFile } elseif ([string]::new([char[]](Get-Content $appFile @byteEncodingParam -TotalCount 2)) -eq "PK") { $tmpFolder = Join-Path ([System.IO.Path]::GetTempPath()) ([Guid]::NewGuid().ToString()) $copied = $false try { if ($appFile -notlike "*.zip") { $orgAppFile = $appFile $appFile = Join-Path ([System.IO.Path]::GetTempPath()) "$([System.IO.Path]::GetFileName($orgAppFile)).zip" Copy-Item $orgAppFile $appFile $copied = $true } Expand-Archive $appfile -DestinationPath $tmpFolder -Force CopyAppFilesToFolder -appFiles $tmpFolder -folder $folder } finally { Remove-Item -Path $tmpFolder -Recurse -Force if ($copied) { Remove-Item -Path $appFile -Force } } } } } else { Write-Host -ForegroundColor Red "::WARNING::File not found: $appFile" } } } function getCountryCode { Param( [string] $countryCode ) $countryCodes = @{ "Afghanistan" = "AF" "Åland Islands" = "AX" "Albania" = "AL" "Algeria" = "DZ" "American Samoa" = "AS" "AndorrA" = "AD" "Angola" = "AO" "Anguilla" = "AI" "Antarctica" = "AQ" "Antigua and Barbuda" = "AG" "Argentina" = "AR" "Armenia" = "AM" "Aruba" = "AW" "Australia" = "AU" "Austria" = "AT" "Azerbaijan" = "AZ" "Bahamas" = "BS" "Bahrain" = "BH" "Bangladesh" = "BD" "Barbados" = "BB" "Belarus" = "BY" "Belgium" = "BE" "Belize" = "BZ" "Benin" = "BJ" "Bermuda" = "BM" "Bhutan" = "BT" "Bolivia" = "BO" "Bosnia and Herzegovina" = "BA" "Botswana" = "BW" "Bouvet Island" = "BV" "Brazil" = "BR" "British Indian Ocean Territory" = "IO" "Brunei Darussalam" = "BN" "Bulgaria" = "BG" "Burkina Faso" = "BF" "Burundi" = "BI" "Cambodia" = "KH" "Cameroon" = "CM" "Canada" = "CA" "Cape Verde" = "CV" "Cayman Islands" = "KY" "Central African Republic" = "CF" "Chad" = "TD" "Chile" = "CL" "China" = "CN" "Christmas Island" = "CX" "Cocos (Keeling) Islands" = "CC" "Colombia" = "CO" "Comoros" = "KM" "Congo" = "CG" "Congo, The Democratic Republic of the" = "CD" "Cook Islands" = "CK" "Costa Rica" = "CR" "Cote D'Ivoire" = "CI" "Croatia" = "HR" "Cuba" = "CU" "Cyprus" = "CY" "Czech Republic" = "CZ" "Denmark" = "DK" "Djibouti" = "DJ" "Dominica" = "DM" "Dominican Republic" = "DO" "Ecuador" = "EC" "Egypt" = "EG" "El Salvador" = "SV" "Equatorial Guinea" = "GQ" "Eritrea" = "ER" "Estonia" = "EE" "Ethiopia" = "ET" "Falkland Islands (Malvinas)" = "FK" "Faroe Islands" = "FO" "Fiji" = "FJ" "Finland" = "FI" "France" = "FR" "French Guiana" = "GF" "French Polynesia" = "PF" "French Southern Territories" = "TF" "Gabon" = "GA" "Gambia" = "GM" "Georgia" = "GE" "Germany" = "DE" "Ghana" = "GH" "Gibraltar" = "GI" "Greece" = "GR" "Greenland" = "GL" "Grenada" = "GD" "Guadeloupe" = "GP" "Guam" = "GU" "Guatemala" = "GT" "Guernsey" = "GG" "Guinea" = "GN" "Guinea-Bissau" = "GW" "Guyana" = "GY" "Haiti" = "HT" "Heard Island and Mcdonald Islands" = "HM" "Holy See (Vatican City State)" = "VA" "Honduras" = "HN" "Hong Kong" = "HK" "Hungary" = "HU" "Iceland" = "IS" "India" = "IN" "Indonesia" = "ID" "Iran, Islamic Republic Of" = "IR" "Iraq" = "IQ" "Ireland" = "IE" "Isle of Man" = "IM" "Israel" = "IL" "Italy" = "IT" "Jamaica" = "JM" "Japan" = "JP" "Jersey" = "JE" "Jordan" = "JO" "Kazakhstan" = "KZ" "Kenya" = "KE" "Kiribati" = "KI" "Korea, Democratic People's Republic of" = "KP" "Korea, Republic of" = "KR" "Kuwait" = "KW" "Kyrgyzstan" = "KG" "Lao People's Democratic Republic" = "LA" "Latvia" = "LV" "Lebanon" = "LB" "Lesotho" = "LS" "Liberia" = "LR" "Libyan Arab Jamahiriya" = "LY" "Liechtenstein" = "LI" "Lithuania" = "LT" "Luxembourg" = "LU" "Macao" = "MO" "Macedonia, The Former Yugoslav Republic of" = "MK" "Madagascar" = "MG" "Malawi" = "MW" "Malaysia" = "MY" "Maldives" = "MV" "Mali" = "ML" "Malta" = "MT" "Marshall Islands" = "MH" "Martinique" = "MQ" "Mauritania" = "MR" "Mauritius" = "MU" "Mayotte" = "YT" "Mexico" = "MX" "Micronesia, Federated States of" = "FM" "Moldova, Republic of" = "MD" "Monaco" = "MC" "Mongolia" = "MN" "Montserrat" = "MS" "Morocco" = "MA" "Mozambique" = "MZ" "Myanmar" = "MM" "Namibia" = "NA" "Nauru" = "NR" "Nepal" = "NP" "Netherlands" = "NL" "Netherlands Antilles" = "AN" "New Caledonia" = "NC" "New Zealand" = "NZ" "Nicaragua" = "NI" "Niger" = "NE" "Nigeria" = "NG" "Niue" = "NU" "Norfolk Island" = "NF" "Northern Mariana Islands" = "MP" "Norway" = "NO" "Oman" = "OM" "Pakistan" = "PK" "Palau" = "PW" "Palestinian Territory, Occupied" = "PS" "Panama" = "PA" "Papua New Guinea" = "PG" "Paraguay" = "PY" "Peru" = "PE" "Philippines" = "PH" "Pitcairn" = "PN" "Poland" = "PL" "Portugal" = "PT" "Puerto Rico" = "PR" "Qatar" = "QA" "Reunion" = "RE" "Romania" = "RO" "Russian Federation" = "RU" "RWANDA" = "RW" "Saint Helena" = "SH" "Saint Kitts and Nevis" = "KN" "Saint Lucia" = "LC" "Saint Pierre and Miquelon" = "PM" "Saint Vincent and the Grenadines" = "VC" "Samoa" = "WS" "San Marino" = "SM" "Sao Tome and Principe" = "ST" "Saudi Arabia" = "SA" "Senegal" = "SN" "Serbia and Montenegro" = "CS" "Seychelles" = "SC" "Sierra Leone" = "SL" "Singapore" = "SG" "Slovakia" = "SK" "Slovenia" = "SI" "Solomon Islands" = "SB" "Somalia" = "SO" "South Africa" = "ZA" "South Georgia and the South Sandwich Islands" = "GS" "Spain" = "ES" "Sri Lanka" = "LK" "Sudan" = "SD" "Suriname" = "SR" "Svalbard and Jan Mayen" = "SJ" "Swaziland" = "SZ" "Sweden" = "SE" "Switzerland" = "CH" "Syrian Arab Republic" = "SY" "Taiwan, Province of China" = "TW" "Tajikistan" = "TJ" "Tanzania, United Republic of" = "TZ" "Thailand" = "TH" "Timor-Leste" = "TL" "Togo" = "TG" "Tokelau" = "TK" "Tonga" = "TO" "Trinidad and Tobago" = "TT" "Tunisia" = "TN" "Turkey" = "TR" "Turkmenistan" = "TM" "Turks and Caicos Islands" = "TC" "Tuvalu" = "TV" "Uganda" = "UG" "Ukraine" = "UA" "United Arab Emirates" = "AE" "United Kingdom" = "GB" "United States" = "US" "United States Minor Outlying Islands" = "UM" "Uruguay" = "UY" "Uzbekistan" = "UZ" "Vanuatu" = "VU" "Venezuela" = "VE" "Viet Nam" = "VN" "Virgin Islands, British" = "VG" "Virgin Islands, U.S." = "VI" "Wallis and Futuna" = "WF" "Western Sahara" = "EH" "Yemen" = "YE" "Zambia" = "ZM" "Zimbabwe" = "ZW" "Hong Kong SAR" = "HK" "Serbia" = "RS" "Korea" = "KR" "Taiwan" = "TW" "Vietnam" = "VN" } $countryCode = $countryCode.Trim() if ($countryCodes.ContainsValue($countryCode.ToUpperInvariant())) { return $countryCode.ToLowerInvariant() } elseif ($countryCodes.ContainsKey($countryCode)) { return ($countryCodes[$countryCode]).ToLowerInvariant() } else { throw "Country code $countryCode is illegal" } } function Get-WWWRootPath { $inetstp = Get-Item "HKLM:\SOFTWARE\Microsoft\InetStp" -ErrorAction SilentlyContinue if ($inetstp) { [System.Environment]::ExpandEnvironmentVariables($inetstp.GetValue("PathWWWRoot")) } else { "" } } function Parse-JWTtoken([string]$token) { if ($token.Contains(".") -and $token.StartsWith("eyJ")) { $tokenPayload = $token.Split(".")[1].Replace('-', '+').Replace('_', '/') while ($tokenPayload.Length % 4) { $tokenPayload += "=" } return [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($tokenPayload)) | ConvertFrom-Json } throw "Invalid token" } function Test-BcAuthContext { Param( $bcAuthContext ) if (!(($bcAuthContext -is [Hashtable]) -and ($bcAuthContext.ContainsKey('ClientID')) -and ($bcAuthContext.ContainsKey('Credential')) -and ($bcAuthContext.ContainsKey('authority')) -and ($bcAuthContext.ContainsKey('RefreshToken')) -and ($bcAuthContext.ContainsKey('UtcExpiresOn')) -and ($bcAuthContext.ContainsKey('tenantID')) -and ($bcAuthContext.ContainsKey('AccessToken')) -and ($bcAuthContext.ContainsKey('includeDeviceLogin')) -and ($bcAuthContext.ContainsKey('deviceLoginTimeout')))) { throw 'BcAuthContext should be a HashTable created by New-BcAuthContext.' } } Function CreatePsTestToolFolder { Param( [string] $containerName, [string] $PsTestToolFolder ) $PsTestFunctionsPath = Join-Path $PsTestToolFolder "PsTestFunctions.ps1" $ClientContextPath = Join-Path $PsTestToolFolder "ClientContext.ps1" $newtonSoftDllPath = Join-Path $PsTestToolFolder "Newtonsoft.Json.dll" $clientDllPath = Join-Path $PsTestToolFolder "Microsoft.Dynamics.Framework.UI.Client.dll" if (!(Test-Path -Path $PsTestToolFolder -PathType Container)) { New-Item -Path $PsTestToolFolder -ItemType Directory | Out-Null Copy-Item -Path (Join-Path $PSScriptRoot "AppHandling\PsTestFunctions.ps1") -Destination $PsTestFunctionsPath -Force Copy-Item -Path (Join-Path $PSScriptRoot "AppHandling\ClientContext.ps1") -Destination $ClientContextPath -Force } Invoke-ScriptInBcContainer -containerName $containerName { Param([string] $myNewtonSoftDllPath, [string] $myClientDllPath) if (!(Test-Path $myNewtonSoftDllPath)) { $newtonSoftDllPath = "C:\Program Files\Microsoft Dynamics NAV\*\Service\Management\Newtonsoft.Json.dll" if (!(Test-Path $newtonSoftDllPath)) { $newtonSoftDllPath = "C:\Program Files\Microsoft Dynamics NAV\*\Service\Newtonsoft.Json.dll" } $newtonSoftDllPath = (Get-Item $newtonSoftDllPath).FullName Copy-Item -Path $newtonSoftDllPath -Destination $myNewtonSoftDllPath } if (!(Test-Path $myClientDllPath)) { $clientDllPath = "C:\Test Assemblies\Microsoft.Dynamics.Framework.UI.Client.dll" Copy-Item -Path $clientDllPath -Destination $myClientDllPath } } -argumentList (Get-BcContainerPath -containerName $containerName -Path $newtonSoftDllPath), (Get-BcContainerPath -containerName $containerName -Path $clientDllPath) } function RandomChar([string]$str) { $rnd = Get-Random -Maximum $str.length [string]$str[$rnd] } function GetRandomPassword { $cons = 'bcdfghjklmnpqrstvwxz' $voc = 'aeiouy' $numbers = '0123456789' ((RandomChar $cons).ToUpper() + ` (RandomChar $voc) + ` (RandomChar $cons) + ` (RandomChar $voc) + ` (RandomChar $numbers) + ` (RandomChar $numbers) + ` (RandomChar $numbers) + ` (RandomChar $numbers)) } function getVolumeMountParameter($volumes, $hostPath, $containerPath) { $volume = $volumes | Where-Object { $_ -like "*|$hostPath" -or $_ -like "$hostPath|*" } if ($volume) { $volumeName = $volume.Split('|')[1] "--mount source=$($volumeName),target=$containerPath" } else { "--volume ""$($hostPath):$($containerPath)""" } } function testPfxCertificate([string] $pfxFile, [SecureString] $pfxPassword, [string] $certkind) { if (!(Test-Path $pfxFile)) { throw "$certkind certificate file does not exist" } try { $cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($pfxFile, $pfxPassword) } catch { throw "Unable to read $certkind certificate. Error was $($_.Exception.Message)" } if ([DateTime]::Now -gt $cert.NotAfter) { throw "$certkind certificate expired on $($cert.GetExpirationDateString())" } if ([DateTime]::Now -gt $cert.NotAfter.AddDays(-14)) { Write-Host -ForegroundColor Yellow "$certkind certificate will expire on $($cert.GetExpirationDateString())" } } function GetHash { param( [string] $str ) $stream = [IO.MemoryStream]::new([Text.Encoding]::UTF8.GetBytes($str)) (Get-FileHash -InputStream $stream -Algorithm SHA256).Hash } function DownloadFileLow { Param( [string] $sourceUrl, [string] $destinationFile, [switch] $dontOverwrite, [switch] $useDefaultCredentials, [switch] $skipCertificateCheck, [hashtable] $headers = @{"UserAgent" = "BcContainerHelper $bcContainerHelperVersion" }, [int] $timeout = 100 ) $handler = New-Object System.Net.Http.HttpClientHandler if ($skipCertificateCheck) { Write-Host "Disabling SSL Verification on HttpClient" [SslVerification]::DisableSsl($handler) } if ($useDefaultCredentials) { $handler.UseDefaultCredentials = $true } $httpClient = New-Object System.Net.Http.HttpClient -ArgumentList $handler $httpClient.Timeout = [Timespan]::FromSeconds($timeout) $headers.Keys | ForEach-Object { $httpClient.DefaultRequestHeaders.Add($_, $headers."$_") } $stream = $null $fileStream = $null if ($dontOverwrite) { $fileMode = [System.IO.FileMode]::CreateNew } else { $fileMode = [System.IO.FileMode]::Create } try { $stream = $httpClient.GetStreamAsync($sourceUrl).GetAwaiter().GetResult() $fileStream = New-Object System.IO.Filestream($destinationFile, $fileMode) if (-not $stream.CopyToAsync($fileStream).Wait($timeout * 1000)) { throw "Timeout downloading file" } } finally { if ($fileStream) { $fileStream.Close() $fileStream.Dispose() } if ($stream) { $stream.Dispose() } } } function LoadDLL { Param( [string] $path ) $bytes = [System.IO.File]::ReadAllBytes($path) [System.Reflection.Assembly]::Load($bytes) | Out-Null } function GetAppInfo { Param( [string[]] $appFiles, [string] $compilerFolder, [string] $cacheAppInfoPath = '' ) Push-Location $appInfoCache = $null $cacheUpdated = $false if ($cacheAppInfoPath) { if (Test-Path $cacheAppInfoPath) { $appInfoCache = Get-Content -Path $cacheAppInfoPath -Encoding utf8 | ConvertFrom-Json } else { $appInfoCache = @{} } Set-Location (Split-Path $cacheAppInfoPath -parent) } Write-GroupStart -Message "Getting .app info $cacheAppInfoPath" $binPath = Join-Path $compilerFolder 'compiler/extension/bin' $alToolDll = '' if ($isLinux) { $alcPath = Join-Path $binPath 'linux' $command = Join-Path $alcPath 'altool' if (Test-Path $command) { Write-Host "Setting execute permissions on altool" & /usr/bin/env sudo pwsh -command "& chmod +x $command" $alToolExists = $true } else { Write-Host "No altool executable found. Using dotnet to run altool.dll." $command = 'dotnet' $alToolDll = Join-Path $alcPath 'altool.dll' $alToolExists = Test-Path -Path $alToolDll -PathType Leaf } } elseif ($isMacOS) { $alcPath = Join-Path $binPath 'darwin' $command = Join-Path $alcPath 'altool' if (Test-Path $command) { Write-Host "Setting execute permissions on altool" & chmod +x $command $alToolExists = $true } else { Write-Host "No altool executable found. Using dotnet to run altool.dll." $command = 'dotnet' $alToolDll = Join-Path $alcPath 'altool.dll' $alToolExists = Test-Path -Path $alToolDll -PathType Leaf } } else { $alcPath = Join-Path $binPath 'win32' $command = Join-Path $alcPath 'altool.exe' $alToolExists = Test-Path -Path $command -PathType Leaf } if (-not (Test-Path $alcPath)) { $alcPath = $binPath } $alcDllPath = $alcPath if (!($isLinux -or $isMacOS) -and !$isPsCore) { $alcDllPath = $binPath } $ErrorActionPreference = "STOP" $assembliesAdded = $false $packageStream = $null $package = $null try { foreach($path in $appFiles) { Write-Host -NoNewline "- $([System.IO.Path]::GetFileName($path))" $relativePath = Resolve-Path -Path $path -Relative if ($appInfoCache -and $appInfoCache.PSObject.Properties.Name -eq $relativePath) { $appInfo = $appInfoCache."$relativePath" Write-Host " (cached)" } else { if ($alToolExists) { $arguments = @('GetPackageManifest', """$path""") if ($alToolDll) { $arguments = @($alToolDll) + $arguments } $manifest = CmdDo -Command $command -arguments $arguments -returnValue -silent | ConvertFrom-Json $appInfo = @{ "appId" = $manifest.id "publisher" = $manifest.publisher "name" = $manifest.name "version" = $manifest.version "application" = "$(if($manifest.PSObject.Properties.Name -eq 'application'){$manifest.application})" "platform" = "$(if($manifest.PSObject.Properties.Name -eq 'platform'){$manifest.Platform})" "propagateDependencies" = ($manifest.PSObject.Properties.Name -eq 'PropagateDependencies') -and $manifest.PropagateDependencies "dependencies" = @(if($manifest.PSObject.Properties.Name -eq 'dependencies'){$manifest.dependencies | ForEach-Object { if ($_.PSObject.Properties.Name -eq 'id') { $id = $_.id } else { $id = $_.AppId }; @{ "id" = $id; "name" = $_.name; "publisher" = $_.publisher; "version" = $_.version }}}) } Write-Host " (succeeded using altool)" } else { if (!$assembliesAdded) { Add-Type -AssemblyName System.IO.Compression.FileSystem Add-Type -AssemblyName System.Text.Encoding LoadDLL -Path (Join-Path $alcDllPath Newtonsoft.Json.dll) LoadDLL -Path (Join-Path $alcDllPath System.Collections.Immutable.dll) if (Test-Path (Join-Path $alcDllPath System.IO.Packaging.dll)) { LoadDLL -Path (Join-Path $alcDllPath System.IO.Packaging.dll) } LoadDLL -Path (Join-Path $alcDllPath Microsoft.Dynamics.Nav.CodeAnalysis.dll) $assembliesAdded = $true } $packageStream = [System.IO.File]::OpenRead($path) $package = [Microsoft.Dynamics.Nav.CodeAnalysis.Packaging.NavAppPackageReader]::Create($PackageStream, $true) $manifest = $package.ReadNavAppManifest() $appInfo = @{ "appId" = $manifest.AppId "publisher" = $manifest.AppPublisher "name" = $manifest.AppName "version" = "$($manifest.AppVersion)" "dependencies" = @($manifest.Dependencies | ForEach-Object { @{ "id" = $_.AppId; "name" = $_.Name; "publisher" = $_.Publisher; "version" = "$($_.Version)" } }) "application" = "$($manifest.Application)" "platform" = "$($manifest.Platform)" "propagateDependencies" = $manifest.PropagateDependencies } $packageStream.Close() Write-Host " (succeeded using codeanalysis)" } if ($cacheAppInfoPath) { $appInfoCache | Add-Member -MemberType NoteProperty -Name $relativePath -Value $appInfo $cacheUpdated = $true } } @{ "Id" = $appInfo.appId "AppId" = $appInfo.appId "Publisher" = $appInfo.publisher "Name" = $appInfo.name "Version" = [System.Version]$appInfo.version "Dependencies" = @($appInfo.dependencies) "Path" = $path "Application" = $appInfo.application "Platform" = $appInfo.platform "PropagateDependencies" = $appInfo.propagateDependencies } } if ($cacheUpdated) { $appInfoCache | ConvertTo-Json -Depth 99 | Set-Content -Path $cacheAppInfoPath -Encoding UTF8 -Force } } catch [System.Reflection.ReflectionTypeLoadException] { Write-Host " (failed)" if ($_.Exception.LoaderExceptions) { $_.Exception.LoaderExceptions | Select-Object -Property Message | Select-Object -Unique | ForEach-Object { Write-Host "LoaderException: $($_.Message)" } } throw } finally { if ($package) { $package.Dispose() } if ($packageStream) { $packageStream.Dispose() } Pop-Location } Write-GroupEnd } function GetLatestAlLanguageExtensionVersionAndUrl { Param( [switch] $allowPrerelease ) $listing = Invoke-WebRequest -Method POST -UseBasicParsing ` -Uri https://marketplace.visualstudio.com/_apis/public/gallery/extensionquery?api-version=3.0-preview.1 ` -Body '{"filters":[{"criteria":[{"filterType":8,"value":"Microsoft.VisualStudio.Code"},{"filterType":12,"value":"4096"},{"filterType":7,"value":"ms-dynamics-smb.al"}],"pageNumber":1,"pageSize":50,"sortBy":0,"sortOrder":0}],"assetTypes":[],"flags":0x192}' ` -ContentType application/json | ConvertFrom-Json $result = $listing.results | Select-Object -First 1 -ExpandProperty extensions ` | Select-Object -ExpandProperty versions ` | Where-Object { ($allowPrerelease.IsPresent -or !(($_.properties.Key -eq 'Microsoft.VisualStudio.Code.PreRelease') -and ($_.properties | where-object { $_.Key -eq 'Microsoft.VisualStudio.Code.PreRelease' }).value -eq "true")) } ` | Select-Object -First 1 if ($result) { $vsixUrl = $result.files | Where-Object { $_.assetType -eq "Microsoft.VisualStudio.Services.VSIXPackage"} | Select-Object -ExpandProperty source if ($vsixUrl) { return $result.version, $vsixUrl } } throw "Unable to locate latest AL Language Extension from the VS Code Marketplace" } function DetermineVsixFile { Param( [string] $vsixFile ) if ($vsixFile -eq 'default') { return '' } elseif ($vsixFile -eq 'latest' -or $vsixFile -eq 'preview') { $version, $url = GetLatestAlLanguageExtensionVersionAndUrl -allowPrerelease:($vsixFile -eq 'preview') return $url } else { return $vsixFile } } # Cached Path for latest and preview versions of AL Language Extension $AlLanguageExtenssionPath = @('','') function DownloadLatestAlLanguageExtension { Param( [switch] $allowPrerelease ) # Check if we already have the latest version downloaded and located in this session if ($script:AlLanguageExtenssionPath[$allowPrerelease.IsPresent]) { $path = $script:AlLanguageExtenssionPath[$allowPrerelease.IsPresent] if (Test-Path $path -PathType Container) { return $path } else { $script:AlLanguageExtenssionPath[$allowPrerelease.IsPresent] = '' } } $mutexName = "DownloadAlLanguageExtension" $mutex = New-Object System.Threading.Mutex($false, $mutexName) try { try { if (!$mutex.WaitOne(1000)) { Write-Host "Waiting for other process downloading AL Language Extension" $mutex.WaitOne() | Out-Null Write-Host "Other process completed downloading" } } catch [System.Threading.AbandonedMutexException] { Write-Host "Other process terminated abnormally" } $version, $url = GetLatestAlLanguageExtensionVersionAndUrl -allowPrerelease:$allowPrerelease $path = Join-Path $bcContainerHelperConfig.hostHelperFolder "alLanguageExtension/$version" if (!(Test-Path $path -PathType Container)) { $AlLanguageExtensionsFolder = Join-Path $bcContainerHelperConfig.hostHelperFolder "alLanguageExtension" if (!(Test-Path $AlLanguageExtensionsFolder -PathType Container)) { New-Item -Path $AlLanguageExtensionsFolder -ItemType Directory | Out-Null } $description = "AL Language Extension" if ($allowPrerelease) { $description += " (Prerelease)" } $zipFile = "$path.zip" Download-File -sourceUrl $url -destinationFile $zipFile -Description $description Expand-7zipArchive -Path $zipFile -DestinationPath $path Remove-Item -Path $zipFile -Force } $script:AlLanguageExtenssionPath[$allowPrerelease.IsPresent] = $path return $path } finally { $mutex.ReleaseMutex() } } function RunAlTool { Param( [string[]] $arguments, [switch] $usePrereleaseAlTool = ($bccontainerHelperConfig.usePrereleaseAlTool) ) $path = DownloadLatestAlLanguageExtension -allowPrerelease:$usePrereleaseAlTool if ($isLinux) { $command = Join-Path $path 'extension/bin/linux/altool' if (Test-Path $command) { Write-Host "Setting execute permissions on altool" & /usr/bin/env sudo pwsh -command "& chmod +x $command" } else { Write-Host "No altool executable found. Using dotnet to run altool.dll." $command = 'dotnet' $arguments = @(Join-Path $path 'extension/bin/linux/altool.dll') + $arguments } } elseif ($isMacOS) { $command = Join-Path $path 'extension/bin/darwin/altool' if (Test-Path $command) { Write-Host "Setting execute permissions on altool" & chmod +x $command } else { Write-Host "No altool executable found. Using dotnet to run altool.dll." $command = 'dotnet' $arguments = @(Join-Path $path 'extension/bin/darwin/altool.dll') + $arguments } } else { $command = Join-Path $path 'extension/bin/win32/altool.exe' } CmdDo -Command $command -arguments $arguments -returnValue -silent } function GetApplicationDependency( [string] $appFile, [string] $minVersion = "0.0" ) { try { $appJson = Get-AppJsonFromAppFile -appFile $appFile } catch { Write-Host -ForegroundColor Red "Unable to read app $([System.IO.Path]::GetFileName($appFile)), ignoring application dependency check" return $minVersion } $version = $minVersion if ($appJson.PSObject.Properties.Name -eq "Application") { $version = $appJson.application } elseif ($appJson.PSObject.Properties.Name -eq "dependencies") { $baseAppDependency = $appJson.dependencies | Where-Object { $_.Name -eq "Base Application" -and $_.Publisher -eq "Microsoft" } if ($baseAppDependency) { $version = $baseAppDependency.Version } } if ([System.Version]$version -lt [System.Version]$minVersion) { $version = $minVersion } return $version } function ReplaceCDN { Param( [string] $sourceUrl, [switch] $useBlobUrl ) $bcCDNs = @( @{ "oldCDN" = "bcartifacts.azureedge.net"; "newCDN" = "bcartifacts-exdbf9fwegejdqak.b02.azurefd.net"; "blobUrl" = "bcartifacts.blob.core.windows.net" }, @{ "oldCDN" = "bcinsider.azureedge.net"; "newCDN" = "bcinsider-fvh2ekdjecfjd6gk.b02.azurefd.net"; "blobUrl" = "bcinsider.blob.core.windows.net" }, @{ "oldCDN" = "bcpublicpreview.azureedge.net"; "newCDN" = "bcpublicpreview-f2ajahg0e2cudpgh.b02.azurefd.net"; "blobUrl" = "bcpublicpreview.blob.core.windows.net" }, @{ "oldCDN" = "businesscentralapps.azureedge.net"; "newCDN" = "businesscentralapps-hkdrdkaeangzfydv.b02.azurefd.net"; "blobUrl" = "businesscentralapps.blob.core.windows.net" }, @{ "oldCDN" = "bcprivate.azureedge.net"; "newCDN" = "bcprivate-fmdwbsb3ekbkc0bt.b02.azurefd.net"; "blobUrl" = "bcprivate.blob.core.windows.net" } ) foreach($cdn in $bcCDNs) { $found = $false $cdn.blobUrl, $cdn.newCDN, $cdn.oldCDN | ForEach-Object { if ($sourceUrl.ToLowerInvariant().StartsWith("https://$_/")) { $sourceUrl = "https://$(if($useBlobUrl){$cdn.blobUrl}else{$cdn.newCDN})/$($sourceUrl.Substring($_.Length+9))" $found = $true } if ($sourceUrl -eq $_) { $sourceUrl = "$(if($useBlobUrl){$cdn.blobUrl}else{$cdn.newCDN})" $found = $true } } if ($found) { break } } $sourceUrl } function Write-GroupStart([string] $Message) { switch ($true) { $bcContainerHelperConfig.IsGitHubActions { Write-Host "::group::$Message"; break } $bcContainerHelperConfig.IsAzureDevOps { Write-Host "##[group]$Message"; break } Default { Write-Host $Message} } } function Write-GroupEnd { switch ($true) { $bcContainerHelperConfig.IsGitHubActions { Write-Host "::endgroup::"; break } $bcContainerHelperConfig.IsAzureDevOps { Write-Host "##[endgroup]"; break } } } function CopySymbolsFromContainer { Param( [string] $containerName, [string] $containerSymbolsFolder ) Invoke-ScriptInBcContainer -containerName $containerName -scriptblock { Param($appSymbolsFolder) if (Test-Path "C:\Extensions\*.app") { $paths = @( "C:\Program Files\Microsoft Dynamics NAV\*\AL Development Environment\System.app" "C:\Extensions\*.app" ) } else { $paths = @( "C:\Program Files\Microsoft Dynamics NAV\*\AL Development Environment\System.app" "C:\Applications.*\Microsoft_Application_*.app,C:\Applications\Application\Source\Microsoft_Application.app" "C:\Applications.*\Microsoft_Base Application_*.app,C:\Applications\BaseApp\Source\Microsoft_Base Application.app" "C:\Applications.*\Microsoft_System Application_*.app,C:\Applications\System Application\source\Microsoft_System Application.app" "C:\Applications.*\Microsoft_Business Foundation_*.app,C:\Applications\BusinessFoundation\source\Microsoft_Business Foundation.app" "C:\Applications.*\Microsoft_AI Test Toolkit_*.app,C:\Applications\BusinessFoundation\source\Microsoft_AI Test Toolkit.app" ) } # Include Apps only available offline "Microsoft_System Application Test Library", "Microsoft_Business Foundation Test Libraries", "Microsoft_Tests-TestLibraries" | ForEach-Object { $paths += @( "C:\Applications.*\$($_)_*.app,C:\Applications\BusinessFoundation\source\$($_).app" ) } $paths | ForEach-Object { $appFiles = $_.Split(',') $appFile = "" if (Test-Path -Path $appFiles[0]) { $appFile = $appFiles[0] } elseif (Test-Path -path $appFiles[1]) { $appFile = $appFiles[1] } if ($appFile) { Get-Item -Path $appFile | ForEach-Object { Write-Host "Copying $([System.IO.Path]::GetFileName($_.FullName)) from Container" Copy-Item -Path $_.FullName -Destination $appSymbolsFolder -Force } } } } -argumentList $containerSymbolsFolder } function GetIsolationMode { Param( [Parameter(Mandatory=$true)] [System.Version] $hostOsVersion, [Parameter(Mandatory=$true)] [System.Version] $containerOsVersion, [Parameter(Mandatory=$true)] [bool] $useSSL, [string] $isolation = '' ) if ($hostOsVersion -eq $containerOsVersion) { $recommendation = "Host and container OS match, recommended isolation mode is process." $recommendedIsolation = "process" } elseif ($hostOsVersion.Build -ge 26100) { $recommendation = "Host OS is 26100 (24H2) or above, recommended isolation mode is hyperv." $recommendedIsolation = "hyperv" } elseif ($hostOsVersion.Build -ge 22621 -and $useSSL) { $recommendation = "Host OS is 22621 (22H2) or above and you are using SSL, recommended isolation mode is hyperv." $recommendedIsolation = "hyperv" } elseif ($hostOsVersion.Build -ge 20348 -and $containerOsVersion.Build -ge 20348) { $recommendation = "Container and host OS are 20348 or above, not using SSL, recommended isolation mode is process." $recommendedIsolation = "process" } elseif (("$hostOsVersion".StartsWith('10.0.19043.') -or "$hostOsVersion".StartsWith('10.0.19044.') -or "$hostOsVersion".StartsWith('10.0.19045.')) -and "$containerOsVersion".StartsWith("10.0.19041.")) { $recommendation = "Host OS is Windows 10 21H1 or newer and Container OS is 2004, recommended isolation mode is process." $recommendedIsolation = "process" } else { $recommendation = "Host OS and Base Image Container OS doesn't match, recommended isolation mode is hyperv." $recommendedIsolation = "hyperv" } $hypervState = GetHypervState if ($recommendedIsolation -eq "hyperv") { if ($hypervState -eq "Disabled") { $recommendation += ' HyperV is not installed, recommending process isolation instead.' $recommendedIsolation = "process" } elseif ($hypervState -eq 'Unknown') { $recommendation += ' HyperV state is unknown, if you encounter problems you might need to install HyperV.' } } if ($isolation -eq '') { $isolation = $recommendedIsolation Write-Host $recommendation } elseif ($isolation -ne $recommendedIsolation) { Write-Host -ForegroundColor Yellow "WARNING: You have specified isolation mode $isolation. $recommendation If you encounter issues you could try to specify -isolation $recommendedIsolation (or remove the -isolation parameter)." } return $isolation } function GetContainerOs { Param( [Parameter(Mandatory=$true)] [Version] $containerOsVersion ) if ("$containerOsVersion".StartsWith('10.0.14393.')) { $containerOs = "ltsc2016" } elseif ("$containerOsVersion".StartsWith('10.0.15063.')) { $containerOs = "1703" } elseif ("$containerOsVersion".StartsWith('10.0.16299.')) { $containerOs = "1709" } elseif ("$containerOsVersion".StartsWith('10.0.17134.')) { $containerOs = "1803" } elseif ("$containerOsVersion".StartsWith('10.0.17763.')) { $containerOs = "ltsc2019" } elseif ("$containerOsVersion".StartsWith('10.0.18362.')) { $containerOs = "1903" } elseif ("$containerOsVersion".StartsWith('10.0.18363.')) { $containerOs = "1909" } elseif ("$containerOsVersion".StartsWith('10.0.19041.')) { $containerOs = "2004" } elseif ("$containerOsVersion".StartsWith('10.0.19042.')) { $containerOs = "20H2" } elseif ("$containerOsVersion".StartsWith('10.0.19043.')) { $containerOs = "21H1" } elseif ("$containerOsVersion".StartsWith('10.0.19044.')) { $containerOs = "21H2" } elseif ("$containerOsVersion".StartsWith('10.0.19045.')) { $containerOs = "22H2" } elseif ("$containerOsVersion".StartsWith('10.0.20348.')) { $containerOs = "ltsc2022" } else { $containerOs = "unknown" } return $containerOs } function GetHostOs { Param( [Parameter(Mandatory=$true)] [Version] $hostOsVersion, [Parameter(Mandatory=$true)] [bool] $isServerHost ) $hostOs = "Unknown/Insider build" if ($os.BuildNumber -eq 26100) { $hostOs = "24H2" } elseif ($os.BuildNumber -eq 22631) { $hostOs = "23H2" } elseif ($os.BuildNumber -eq 22621) { $hostOs = "22H2" } elseif ($os.BuildNumber -eq 22000) { $hostOs = "21H2" } elseif ($os.BuildNumber -eq 20348) { $hostOs = "ltsc2022" } elseif ($os.BuildNumber -eq 19045) { $hostOs = "22H2" } elseif ($os.BuildNumber -eq 19044) { $hostOs = "21H2" } elseif ($os.BuildNumber -eq 19043) { $hostOs = "21H1" } elseif ($os.BuildNumber -eq 19042) { $hostOs = "20H2" } elseif ($os.BuildNumber -eq 19041) { $hostOs = "2004" } elseif ($os.BuildNumber -eq 18363) { $hostOs = "1909" } elseif ($os.BuildNumber -eq 18362) { $hostOs = "1903" } elseif ($os.BuildNumber -eq 17763) { if ($isServerHost) { $hostOs = "ltsc2019" } else { $hostOs = "1809" } } elseif ($os.BuildNumber -eq 17134) { $hostOs = "1803" } elseif ($os.BuildNumber -eq 16299) { $hostOs = "1709" } elseif ($os.BuildNumber -eq 15063) { $hostOs = "1703" } elseif ($os.BuildNumber -eq 14393) { if ($isServerHost) { $hostOs = "ltsc2016" } else { $hostOs = "1607" } } return $hostOs } # SIG # Begin signature block # MIImZgYJKoZIhvcNAQcCoIImVzCCJlMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDrdQKG9LMHBKvJ # 8pdazmZX09ywt6RcR4Q+Ra9URpT+jKCCH34wggWNMIIEdaADAgECAhAOmxiO+dAt # 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV # BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa # Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy # dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD # ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC # ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E # MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy # unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF # xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1 # 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB # MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR # WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6 # nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB # YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S # UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x # q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB # NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP # TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC # AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp # Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv # bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0 # aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB # LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc # Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov # Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy # oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW # juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF # mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z # twGpn1eqXijiuZQwggYaMIIEAqADAgECAhBiHW0MUgGeO5B5FSCJIRwKMA0GCSqG # SIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0 # ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBSb290IFI0 # NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5NTlaMFQxCzAJBgNVBAYTAkdC # MRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxKzApBgNVBAMTIlNlY3RpZ28gUHVi # bGljIENvZGUgU2lnbmluZyBDQSBSMzYwggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAw # ggGKAoIBgQCbK51T+jU/jmAGQ2rAz/V/9shTUxjIztNsfvxYB5UXeWUzCxEeAEZG # bEN4QMgCsJLZUKhWThj/yPqy0iSZhXkZ6Pg2A2NVDgFigOMYzB2OKhdqfWGVoYW3 # haT29PSTahYkwmMv0b/83nbeECbiMXhSOtbam+/36F09fy1tsB8je/RV0mIk8XL/ # tfCK6cPuYHE215wzrK0h1SWHTxPbPuYkRdkP05ZwmRmTnAO5/arnY83jeNzhP06S # hdnRqtZlV59+8yv+KIhE5ILMqgOZYAENHNX9SJDm+qxp4VqpB3MV/h53yl41aHU5 # pledi9lCBbH9JeIkNFICiVHNkRmq4TpxtwfvjsUedyz8rNyfQJy/aOs5b4s+ac7I # H60B+Ja7TVM+EKv1WuTGwcLmoU3FpOFMbmPj8pz44MPZ1f9+YEQIQty/NQd/2yGg # W+ufflcZ/ZE9o1M7a5Jnqf2i2/uMSWymR8r2oQBMdlyh2n5HirY4jKnFH/9gRvd+ # QOfdRrJZb1sCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFDLrkpr/NZZILyhAQnAg # NpFcF4XmMB0GA1UdDgQWBBQPKssghyi47G9IritUpimqF6TNDDAOBgNVHQ8BAf8E # BAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDAzAb # BgNVHSAEFDASMAYGBFUdIAAwCAYGZ4EMAQQBMEsGA1UdHwREMEIwQKA+oDyGOmh0 # dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5nUm9v # dFI0Ni5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8vY3J0 # LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ1Jvb3RSNDYucDdj # MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0B # AQwFAAOCAgEABv+C4XdjNm57oRUgmxP/BP6YdURhw1aVcdGRP4Wh60BAscjW4HL9 # hcpkOTz5jUug2oeunbYAowbFC2AKK+cMcXIBD0ZdOaWTsyNyBBsMLHqafvIhrCym # laS98+QpoBCyKppP0OcxYEdU0hpsaqBBIZOtBajjcw5+w/KeFvPYfLF/ldYpmlG+ # vd0xqlqd099iChnyIMvY5HexjO2AmtsbpVn0OhNcWbWDRF/3sBp6fWXhz7DcML4i # TAWS+MVXeNLj1lJziVKEoroGs9Mlizg0bUMbOalOhOfCipnx8CaLZeVme5yELg09 # Jlo8BMe80jO37PU8ejfkP9/uPak7VLwELKxAMcJszkyeiaerlphwoKx1uHRzNyE6 # bxuSKcutisqmKL5OTunAvtONEoteSiabkPVSZ2z76mKnzAfZxCl/3dq3dUNw4rg3 # sTCggkHSRqTqlLMS7gjrhTqBmzu1L90Y1KWN/Y5JKdGvspbOrTfOXyXvmPL6E52z # 1NZJ6ctuMFBQZH3pwWvqURR8AgQdULUvrxjUYbHHj95Ejza63zdrEcxWLDX6xWls # /GDnVNueKjWUH3fTv1Y8Wdho698YADR7TNx8X8z2Bev6SivBBOHY+uqiirZtg0y9 # ShQoPzmCcn63Syatatvx157YK9hlcPmVoa1oDE5/L9Uo2bC5a4CH2RwwggZZMIIE # waADAgECAhANIM3qwHRbWKHw+Zq6JhzlMA0GCSqGSIb3DQEBDAUAMFQxCzAJBgNV # BAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxKzApBgNVBAMTIlNlY3Rp # Z28gUHVibGljIENvZGUgU2lnbmluZyBDQSBSMzYwHhcNMjExMDIyMDAwMDAwWhcN # MjQxMDIxMjM1OTU5WjBdMQswCQYDVQQGEwJESzEUMBIGA1UECAwLSG92ZWRzdGFk # ZW4xGzAZBgNVBAoMEkZyZWRkeSBLcmlzdGlhbnNlbjEbMBkGA1UEAwwSRnJlZGR5 # IEtyaXN0aWFuc2VuMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgYC5 # tlg+VRktRRkahxxaV8+DAd6vHoDpcO6w7yT24lnSoMuA6nR7kgy90Y/sHIwKE9Ww # t/px/GAY8eBePWjJrFpG8fBtJbXadRTVd/470Hs/q9t+kh6A/0ELj7wYsKSNOyuF # Poy4rtClOv9ZmrRpoDVnh8Epwg2DpklX2BNzykzBQxIbkpp+xVo2mhPNWDIesntc # 4/BnSebLGw1Vkxmu2acKkIjYrne/7lsuyL9ue0vk8TGk9JBPNPbGKJvHu9szP9oG # oH36fU1sEZ+AacXrp+onsyPf/hkkpAMHAhzQHl+5Ikvcus/cDm06twm7VywmZcas # 2rFAV5MyE6WMEaYAolwAHiPz9WAs2GDhFtZZg1tzbRjJIIgPpR+doTIcpcDBcHnN # dSdgWKrTkr2f339oT5bnJfo7oVzc/2HGWvb8Fom6LQAqSC11vWmznHYsCm72g+fo # TKqW8lLDfLF0+aFvToLosrtW9l6Z+l+RQ8MtJ9EHOm2Ny8cFLzZCDZYw32BydwcL # V5rKdy4Ica9on5xZvyMOLiFwuL4v2V4pjEgKJaGSS/IVSMEGjrM9DHT6YS4/oq9q # 20rQUmMZZQmGmEyyKQ8t11si8VHtScN5m0Li8peoWfCU9mRFxSESwTWow8d462+o # 9/SzmDxCACdFwzvfKx4JqDMm55cL+beunIvc0NsCAwEAAaOCAZwwggGYMB8GA1Ud # IwQYMBaAFA8qyyCHKLjsb0iuK1SmKaoXpM0MMB0GA1UdDgQWBBTZD6uy9ZWIIqQh # 3srYu1FlUhdM0TAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADATBgNVHSUE # DDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYDVR0gBEMwQTA1Bgwr # BgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9D # UFMwCAYGZ4EMAQQBMEkGA1UdHwRCMEAwPqA8oDqGOGh0dHA6Ly9jcmwuc2VjdGln # by5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5nQ0FSMzYuY3JsMHkGCCsGAQUF # BwEBBG0wazBEBggrBgEFBQcwAoY4aHR0cDovL2NydC5zZWN0aWdvLmNvbS9TZWN0 # aWdvUHVibGljQ29kZVNpZ25pbmdDQVIzNi5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4IBgQASEbZACurQeQN8 # WDTR+YyNpoQ29YAbbdBRhhzHkT/1ao7LE0QIOgGR4GwKRzufCAwu8pCBiMOUTDHT # ezkh0rQrG6khxBX2nSTBL5i4LwKMR08HgZBsbECciABy15yexYWoB/D0H8WuGe63 # PhGWueR4IFPbIz+jEVxfW0Nyyr7bXTecpKd1iprm+TOmzc2E6ab95dkcXdJVx6Zy # s++QrrOfQ+a57qEXkS/wnjjbN9hukL0zg+g8L4DHLKTodzfiQOampvV8QzbnB7Y8 # YjNcxR9s/nptnlQH3jorNFhktiBXvD62jc8pAIg6wyH6NxSMjtTsn7QhkIp2kusw # IQwD8hN/fZ/m6gkXZhRJWFr2WRZOz+edZ62Jf25C/NYWscwfBwn2hzRZf1HgyxkX # Al88dvvUA3kw1T6uo8aAB9IcL6Owiy7q4T+RLRF7oqx0vcw0193Yhq/gPOaUFlqz # ExP6TQ5TR9XWVPQk+a1B1ATKMLi1JShO6KWTmNkFkgkgpkW69BEwggauMIIElqAD # AgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYT # AlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2Vy # dC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAz # MjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQK # Ew5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBS # U0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDM # g/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOx # s+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09ns # ad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtA # rF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149z # k6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6 # OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qh # HGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1 # KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX # 6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0 # sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQID # AQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2F # L3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08w # DgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEB # BGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsG # AQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVz # dGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdp # Y2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgG # BmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+Y # qUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjY # C+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0 # FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6 # WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGj # VoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzp # SwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwd # eDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o # 08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n # +2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y # 3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIO # K+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIGvDCCBKSgAwIBAgIQC65mvFq6f5WH # xvnpBOMzBDANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMO # RGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNB # NDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTI0MDkyNjAwMDAwMFoXDTM1 # MTEyNTIzNTk1OVowQjELMAkGA1UEBhMCVVMxETAPBgNVBAoTCERpZ2lDZXJ0MSAw # HgYDVQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyNDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAL5qc5/2lSGrljC6W23mWaO16P2RHxjEiDtqmeOlwf0K # MCBDEr4IxHRGd7+L660x5XltSVhhK64zi9CeC9B6lUdXM0s71EOcRe8+CEJp+3R2 # O8oo76EO7o5tLuslxdr9Qq82aKcpA9O//X6QE+AcaU/byaCagLD/GLoUb35SfWHh # 43rOH3bpLEx7pZ7avVnpUVmPvkxT8c2a2yC0WMp8hMu60tZR0ChaV76Nhnj37DEY # TX9ReNZ8hIOYe4jl7/r419CvEYVIrH6sN00yx49boUuumF9i2T8UuKGn9966fR5X # 6kgXj3o5WHhHVO+NBikDO0mlUh902wS/Eeh8F/UFaRp1z5SnROHwSJ+QQRZ1fisD # 8UTVDSupWJNstVkiqLq+ISTdEjJKGjVfIcsgA4l9cbk8Smlzddh4EfvFrpVNnes4 # c16Jidj5XiPVdsn5n10jxmGpxoMc6iPkoaDhi6JjHd5ibfdp5uzIXp4P0wXkgNs+ # CO/CacBqU0R4k+8h6gYldp4FCMgrXdKWfM4N0u25OEAuEa3JyidxW48jwBqIJqIm # d93NRxvd1aepSeNeREXAu2xUDEW8aqzFQDYmr9ZONuc2MhTMizchNULpUEoA6Vva # 7b1XCB+1rxvbKmLqfY/M/SdV6mwWTyeVy5Z/JkvMFpnQy5wR14GJcv6dQ4aEKOX5 # AgMBAAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNV # HSUBAf8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgB # hv1sBwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYE # FJ9XLAN3DigVkGalY17uT5IfdqBbMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9j # cmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU # aW1lU3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzAB # hhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9j # YWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEy # NTZUaW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAD2tHh92mVvj # OIQSR9lDkfYR25tOCB3RKE/P09x7gUsmXqt40ouRl3lj+8QioVYq3igpwrPvBmZd # rlWBb0HvqT00nFSXgmUrDKNSQqGTdpjHsPy+LaalTW0qVjvUBhcHzBMutB6Hzele # dbDCzFzUy34VarPnvIWrqVogK0qM8gJhh/+qDEAIdO/KkYesLyTVOoJ4eTq7gj9U # FAL1UruJKlTnCVaM2UeUUW/8z3fvjxhN6hdT98Vr2FYlCS7Mbb4Hv5swO+aAXxWU # m3WpByXtgVQxiBlTVYzqfLDbe9PpBKDBfk+rabTFDZXoUke7zPgtd7/fvWTlCs30 # VAGEsshJmLbJ6ZbQ/xll/HjO9JbNVekBv2Tgem+mLptR7yIrpaidRJXrI+UzB6vA # lk/8a1u7cIqV0yef4uaZFORNekUgQHTqddmsPCEIYQP7xGxZBIhdmm4bhYsVA6G2 # WgNFYagLDBzpmk9104WQzYuVNsxyoVLObhx3RugaEGru+SojW4dHPoWrUhftNpFC # 5H7QEY7MhKRyrBe7ucykW7eaCuWBsBb4HOKRFVDcrZgdwaSIqMDiCLg4D+TPVgKx # 2EgEdeoHNHT9l3ZDBD+XgbF+23/zBjeCtxz+dL/9NWR6P2eZRi7zcEO1xwcdcqJs # yz/JceENc2Sg8h3KeFUCS7tpFk7CrDqkMYIGPjCCBjoCAQEwaDBUMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSswKQYDVQQDEyJTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgQ0EgUjM2AhANIM3qwHRbWKHw+Zq6JhzlMA0G # CWCGSAFlAwQCAQUAoIGEMBgGCisGAQQBgjcCAQwxCjAIoAKAAKECgAAwGQYJKoZI # hvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcC # ARUwLwYJKoZIhvcNAQkEMSIEIEjFnmC2xibVfOa61Jl9DctzWBDH/sdi7Ld5a3Tx # XAT5MA0GCSqGSIb3DQEBAQUABIICAHgDReLNo/C/dyiIMtGqu1B1LWRjPyFE8k4t # ZJVDGTf1aPTpHBAffe4Inepb8jJ/LV0CdOBxUZlELDm6bBgBv1IqQX7Qsk9Nw0l1 # ryCM6xNCBnhGnKaKJv+rOdPbRpiddDh0obLD7faodWTWNki6GLJUMN21YwxNf8yo # d+Azbhmv1U2q0KtLyi47H01IRciCnYJr75d6ZXZptISkCjVEihwUmTtLhO5lfNEg # QDO45modMdaoB8lWj01JuB6apPRXnucKN4vgDApVMm7355R6b2+j7O1sd+Dp0wAZ # Vt1tyGzNSKJGd5Hox8Pn+yipv2YnB+Wjmxe5mf/MJXkqeb0PDdW2XtOw5kRa0/bV # 9CVYD0P/oUpW/vNdOZTpP9PabrVHrTbkK0gvjM/vh/NP4ygoLS1T+CjUAOKBeAqW # Yv0hFT0zbXO386RF5E+jEe0KS587wAzJ+LXXiKtW20WTmnsjJJGoGQh9oL36U95Z # Nb4Fwo8/vIBF62LZj26orQq7NgiLpKYA5FDYwAAVPWdyN7TIWEJYO0hv7N5xROry # FlweN7gRiNF9N7Ln9uYoFbz2btrPXs8J9XV1Kg8Az6RFE1nGWFNzl2uIlPrEYFpo # W++4qn0pYZnr2AkviuT4eds1Cbh6x5UcY+SuBCugjMJdcxBNEirDiXVcPtssPV7f # yNO3jjLuoYIDIDCCAxwGCSqGSIb3DQEJBjGCAw0wggMJAgEBMHcwYzELMAkGA1UE # BhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdpQ2Vy # dCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQC65m # vFq6f5WHxvnpBOMzBDANBglghkgBZQMEAgEFAKBpMBgGCSqGSIb3DQEJAzELBgkq # hkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTI0MTAxODExNDQ1MFowLwYJKoZIhvcN # AQkEMSIEIFmJhizqV4/x8/wX1EuxsG9zZcjzoaTrEC1lHhYCLpQRMA0GCSqGSIb3 # DQEBAQUABIICAIrxBdfJfVcYc5KmwBdi8cGB3LRJyYCXufMYgerdNDH/etBzG/Vs # RH9HGqtA8XHNJjP3dSvUSyxbyihBZHccafv57qcfZ8qVymaUJDrkJLiiCodZAFvw # fxHY4VzVsVXo8CphSrHJmBKu6VXKNSGMI8N1UbZ33Fgps6pd2kjnh5epxsWLMIgP # U6UgLn6ANZjlNgWsgWMo8Zk7DkSysOlgrTGlAgzyNizHSJ3HmE1j1hPvsRaNqPHf # e5RQMdPE2CmeMQOIrJKcXMfDs+0ui5tqcyp7Lt8YjeuBD9mM4mZjMGkHJJD/5ddm # McNHK1Vt3rXcUoXuu7INFwZdHjCEktnuWYnFC9lfhbXmB4qeDUiPgUXD/MiuZHUY # KKjL+N+hAjqjdCKIT70V52smshSx2XmwjQ3YxaQMbaTotbt/vacfg/UAyVHMVRgX # 40RD9105ebRhWcNQ0BhHf2qN9CYXQkxlS2de/rLpKB0NmAUw19X6J9nt09MsmeoO # JUeRieI5akQERijhKgsGIC1QA/MNNadZwblnIX6LyXXayDownyoPpdCRLEXzKSCX # agUUF/jkkYTNwk8MNlhm30yJOP53KNDtm3gTQza+Pr51JZNwf8m1Ct3NIY7zPZoR # ySDczotOARUlndH3IGnUEfOtxTQjRQoBqAwwZw50wCNJWet2VO7f1Q30 # SIG # End signature block |