DockerMsftProvider.psm1
######################################################################################### # # Copyright (c) Microsoft Corporation. All rights reserved. # # DockerMsftProvider # ######################################################################################### Microsoft.PowerShell.Core\Set-StrictMode -Version Latest #region variables $script:Providername = "DockerMsftProvider" $script:DockerSources = $null $script:location_modules = Microsoft.PowerShell.Management\Join-Path -Path $env:TEMP -ChildPath $script:ProviderName $script:location_sources= Microsoft.PowerShell.Management\Join-Path -Path $env:LOCALAPPDATA -ChildPath $script:ProviderName $script:file_modules = Microsoft.PowerShell.Management\Join-Path -Path $script:location_sources -ChildPath "sources.txt" $script:DockerSearchIndex = "DockerSearchIndex.json" $script:Installer_Extension = "zip" $script:dockerURL = "https://go.microsoft.com/fwlink/?LinkID=825636&clcid=0x409" $separator = "|#|" $script:restartRequired = $false $script:isNanoServerInitialized = $false $script:isNanoServer = $false $script:SystemEnvironmentKey = 'HKLM:\System\CurrentControlSet\Control\Session Manager\Environment' $script:pathDockerRoot = Microsoft.PowerShell.Management\Join-Path -Path $env:ProgramFiles -ChildPath "Docker" $script:pathDockerD = Microsoft.PowerShell.Management\Join-Path -Path $script:pathDockerRoot -ChildPath "dockerd.exe" $script:pathDockerClient = Microsoft.PowerShell.Management\Join-Path -Path $script:pathDockerRoot -ChildPath "docker.exe" $script:wildcardOptions = [System.Management.Automation.WildcardOptions]::CultureInvariant -bor ` [System.Management.Automation.WildcardOptions]::IgnoreCase $script:NuGetProviderName = "NuGet" $script:NuGetBinaryProgramDataPath="$env:ProgramFiles\PackageManagement\ProviderAssemblies" $script:NuGetBinaryLocalAppDataPath="$env:LOCALAPPDATA\PackageManagement\ProviderAssemblies" $script:NuGetProvider = $null $script:nanoserverPackageProvider = "NanoServerPackage" $script:hotFixID = 'KB3176936' $script:minOsMajorBuild = 14393 $script:minOSRevision= 206 $script:MetadataFileName = 'metadata.json' $script:serviceName = "docker" $script:SemVerTypeName = 'Microsoft.PackageManagement.Provider.Utility.SemanticVersion' if('Microsoft.PackageManagement.NuGetProvider.SemanticVersion' -as [Type]) { $script:SemVerTypeName = 'Microsoft.PackageManagement.NuGetProvider.SemanticVersion' } #endregion variables #region One-Get Functions function Find-Package { [CmdletBinding()] param ( [string[]] $names, [string] $RequiredVersion, [string] $MinimumVersion, [string] $MaximumVersion ) Set-ModuleSourcesVariable $null = Install-NuGetClientBinary -CallerPSCmdlet $PSCmdlet $options = $request.Options foreach( $o in $options.Keys ) { Write-Debug ( "OPTION: {0} => {1}" -f ($o, $options[$o]) ) } $AllVersions = $null if($options.ContainsKey("AllVersions")) { $AllVersions = $options['AllVersions'] } $sources = @() if($options.ContainsKey('Source')) { $sources = $options['Source'] } if ((-not $names) -or ($names.Count -eq 0)) { $names = @('') } $allResults = @() $allSources = Get-SourceList -Sources $sources foreach($currSource in $allSources) { $Location = $currSource.SourceLocation $sourceName = $currSource.Name if($location.StartsWith("https://")) { $tempResults = @() $tempResults += Find-FromUrl -Source $Location ` -SourceName $sourceName ` -Name $names ` -MinimumVersion $MinimumVersion ` -MaximumVersion $MaximumVersion ` -RequiredVersion $RequiredVersion ` -AllVersions:$AllVersions if($tempResults) { $allResults += $tempResults } } else { Write-Error "Currently only https sources are supported. Please register with https source." } } if((-not $allResults) -or ($allResults.Count -eq 0)) { return } foreach($result in $allResults) { $swid = New-SoftwareIdentityFromDockerInfo -DockerInfo $result Write-Output $swid } } function Download-Package { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $FastPackageReference, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $Location ) DownloadPackageHelper -FastPackageReference $FastPackageReference ` -Request $Request ` -Location $Location } function Install-Package { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $fastPackageReference ) if(-not (Test-AdminPrivilege)) { ThrowError -CallerPSCmdlet $PSCmdlet ` -ExceptionName "InvalidOperationException" ` -ExceptionMessage "Administrator rights are required to install docker." ` -ErrorId "AdminPrivilegesAreRequiredForInstall" ` -ErrorCategory InvalidOperation } if(-not (IsNanoServer)) { $osVersion = (Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\').CurrentBuildNumber $osRevision = (Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\').UBR # Ensure that the host is either running a build newer than Windows Server 2016 GA or # if running Windows Server 2016 GA that it has a revision greater than 206 (KB3176936) if (($osVersion -lt $script:minOsMajorBuild) -or (($osVersion -eq $script:minOsMajorBuild) -and ($osRevision -lt $script:minOsRevision))) { ThrowError -CallerPSCmdlet $PSCmdlet ` -ExceptionName "InvalidOperationException" ` -ExceptionMessage "$script:hotFixID or later is required for docker to work" ` -ErrorId "RequiredWindowsUpdateNotInstalled" ` -ErrorCategory InvalidOperation return } } else { Write-Warning "$script:hotFixID or later is required for docker to work. Please ensure this is installed." } $options = $request.Options $update = $false $force = $false if($options) { foreach( $o in $options.Keys ) { Write-Debug ("OPTION: {0} => {1}" -f ($o, $request.Options[$o]) ) } if($options.ContainsKey('Update')) { Write-Verbose "Updating the docker installation." $update = $true } if($options.ContainsKey("Force")) { $force = $true } } if(Test-Path $script:pathDockerD) { if($update -or $force) { # Uninstall if another installation exists UninstallHelper } elseif(-not $force) { $dockerVersion = & "$script:pathDockerClient" --version $resultArr = $dockerVersion -split "," $version = ($resultArr[0].Trim() -split " ")[2] Write-Verbose "Docker $version already exists. Skipping install. Use -force to install anyway." return } } else { # Install WindowsFeature containers try { InstallContainer } catch { $ErrorMessage = $_.Exception.Message ThrowError -CallerPSCmdlet $PSCmdlet ` -ExceptionName $_.Exception.GetType().FullName ` -ExceptionMessage $ErrorMessage ` -ErrorId FailedToDownload ` -ErrorCategory InvalidOperation return } } $splitterArray = @("$separator") $resultArray = $fastPackageReference.Split($splitterArray, [System.StringSplitOptions]::None) if((-not $resultArray) -or ($resultArray.count -ne 8)){Write-Debug "Fast package reference doesn't have required parts."} $source = $resultArray[0] $name = $resultArray[1] $version = $resultArray[2] $description = $resultArray[3] $originPath = $resultArray[5] $size = $resultArray[6] $sha = $resultArray[7] $date = $resultArray[4] $Location = $script:location_modules $destination = GenerateFullPath -Location $Location ` -Name $name ` -Version $Version $downloadOutput = DownloadPackageHelper -FastPackageReference $FastPackageReference ` -Request $Request ` -Location $Location if(-not (Test-Path $destination)) { Write-Error "$destination does not exist" return } else { Write-verbose "Found $destination to install." } # Install try { Write-Verbose "Trying to unzip : $destination" $null = Expand-Archive -Path $destination -DestinationPath $env:ProgramFiles -Force # Rename the docker folder to become Docker $dummyName = 'dummyName' $null = Rename-Item -Path $script:pathDockerRoot -NewName $env:ProgramFiles\$dummyName $null = Rename-Item -Path $env:ProgramFiles\$dummyName -NewName $script:pathDockerRoot if(Test-Path $script:pathDockerD) { Write-Verbose "Trying to enable the docker service..." $service = get-service -Name Docker -WarningAction SilentlyContinue -ErrorAction SilentlyContinue if(-not $service) { $null = New-Service -Name Docker -BinaryPathName "`"$script:pathDockerD`" --run-service" } } else { Write-Error "Unable to expand docker to Program Files." } } catch { $ErrorMessage = $_.Exception.Message ThrowError -CallerPSCmdlet $PSCmdlet ` -ExceptionName $_.Exception.GetType().FullName ` -ExceptionMessage $ErrorMessage ` -ErrorId FailedToDownload ` -ErrorCategory InvalidOperation } finally { # Clean up Write-Verbose "Removing the archive: $destination" $null = remove-item $destination -Force } # Save the install information $null = SaveInfo -Source $source # Update the path variable $null = Update-PathVar if($script:restartRequired) { Write-Warning "A restart is required to enable the containers feature. Please restart your machine." } Write-Output $downloadOutput } function Uninstall-Package { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $fastPackageReference ) UninstallHelper Write-Verbose "Uninstalling container feature from windows" UninstallContainer [string[]] $splitterArray = @("$separator") [string[]] $resultArray = $fastPackageReference.Split($splitterArray, [System.StringSplitOptions]::None) if((-not $resultArray) -or ($resultArray.count -ne 3)){Write-Debug "Fast package reference doesn't have required parts."} $name = $resultArray[0] $version = $resultArray[1] $source = $resultArray[2] $dockerSWID = @{ Name = $name version = $version Source = $source versionScheme = "MultiPartNumeric" fastPackageReference = $fastPackageReference } New-SoftwareIdentity @dockerSWID } #endregion One-Get Functions #region One-Get Required Functions function Initialize-Provider { write-debug "In $($script:Providername) - Initialize-Provider" } function Get-PackageProviderName { return $script:Providername } function Get-InstalledPackage { param ( [string]$name, [string]$requiredVersion, [string]$minimumVersion, [string]$maximumVersion ) $name = 'docker' $version = '' $source = '' if(Test-Path $script:pathDockerRoot\$script:MetadataFileName) { $metaContent = (Get-Content -Path $script:pathDockerRoot\$script:MetadataFileName) if(IsNanoServer) { $jsonDll = [Microsoft.PowerShell.CoreCLR.AssemblyExtensions]::LoadFrom($PSScriptRoot + "\Json.coreclr.dll") $jsonParser = $jsonDll.GetTypes() | Where-Object name -match jsonparser $metaContentParsed = $jsonParser::FromJson($metaContent) $source = if($metaContentParsed.ContainsKey('SourceName')) {$metaContentParsed.SourceName} else {'Unable To Retrieve Source from metadata.json'} $version = if($metaContentParsed.ContainsKey('Version')) {$metaContentParsed.Version} else {'Unable To Retrieve Version from metadata.json'} } else { $metaContentParsed = (Get-Content -Path $script:pathDockerRoot\$script:MetadataFileName) | ConvertFrom-Json if($metaContentParsed) { $source = if($metaContentParsed.PSObject.properties.name -contains 'SourceName') {$metaContentParsed.SourceName} else {'Unable To Retrieve Source from metadata.json'} $version = if($metaContentParsed.PSObject.properties.name -contains 'Version') {$metaContentParsed.Version} else {'Unable To Retrieve Version from metadata.json'} } } } elseif(Test-Path $script:pathDockerD) { $dockerVersion = & "$script:pathDockerClient" --version $resultArr = $dockerVersion -split "," $version = ($resultArr[0].Trim() -split " ")[2] $source = ' ' } else { return $null } $fastPackageReference = $name + $separator + $version + $separator + $source $dockerSWID = @{ Name = $name version = $version Source = $source versionScheme = "MultiPartNumeric" fastPackageReference = $fastPackageReference } return New-SoftwareIdentity @dockerSWID } #endregion One-Get Required Functions #region Helper-Functions function SaveInfo { param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String] $Source ) # Create a file $metaFileInfo = New-Item -ItemType File -Path $script:pathDockerRoot -Name $script:MetadataFileName -Force if(-not $metaFileInfo) { # TODO: Handle File not created scenario } if(Test-Path $script:pathDockerD) { $dockerVersion = & "$script:pathDockerD" --version $resultArr = $dockerVersion -split "," $version = ($resultArr[0].Trim() -split " ")[2] $metaInfo = Microsoft.PowerShell.Utility\New-Object PSCustomObject -Property ([ordered]@{ SourceName = $source Version = $version }) $metaInfo | ConvertTo-Json > $metaFileInfo } } function UninstallHelper { if(-not (Test-AdminPrivilege)) { ThrowError -CallerPSCmdlet $PSCmdlet ` -ExceptionName "InvalidOperationException" ` -ExceptionMessage "Administrator rights are required to install docker." ` -ErrorId "AdminPrivilegesAreRequiredForInstall" ` -ErrorCategory InvalidOperation } # Stop docker service $dockerService = get-service -Name Docker -WarningAction SilentlyContinue -ErrorAction SilentlyContinue if(-not $dockerService) { # Docker service is not available Write-Warning "Docker Service is not available." } if(($dockerService.Status -eq "Started") -or ($dockerService.Status -eq "Running")) { Write-Verbose "Trying to stop docker service" $null = stop-service docker } if(Test-Path $script:pathDockerD) { Write-Verbose "Unregistering the docker service" $null = & "$script:pathDockerD" --unregister-service Write-Verbose "Removing the docker files" $null = Get-ChildItem -Path $script:pathDockerRoot -Recurse | Remove-Item -force -Recurse if(Test-Path $script:pathDockerRoot ) {$null = Remove-Item $script:pathDockerRoot -Force} } else { Write-Warning "Docker is not present under the Program Files. Please check the installation." } Write-Verbose "Removing the path variable" $null = Remove-PathVar } function InstallContainer { if(IsNanoServer) { if(HandleProvider) { $containerExists = get-package -providername NanoServerPackage -Name *container* -ErrorAction SilentlyContinue -WarningAction SilentlyContinue if($containerExists) { Write-Verbose "Containers package is already installed. Skipping the install." return } # Find Container Package $containerPackage = Find-NanoServerPackage -Name *Container* -ErrorAction SilentlyContinue -WarningAction SilentlyContinue if(-not $containerPackage) { ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage "Unable to find the Containers Package from NanoServerPackage Module." ` -ErrorId "PackageNotFound" ` -CallerPSCmdlet $PSCmdlet ` -ErrorCategory InvalidOperation } Write-Verbose "Installing Containers..." $null = $containerPackage | Install-NanoServerPackage -Force -ErrorAction SilentlyContinue -WarningAction SilentlyContinue $script:restartRequired = $true } else { ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage "Unable to load the NanoServerPackage Module." ` -ErrorId "ModuleNotFound" ` -CallerPSCmdlet $PSCmdlet ` -ErrorCategory InvalidOperation } } else { switch(Get-wmiobject -class win32_operatingsystem | select-object -ExpandProperty Caption ){ 'Microsoft Windows 10' { $containerExists = Get-WindowsOptionalFeature -Online -FeatureName Containers | Select-object -Property *,@{name='Installed';expression={$_.State -eq 'Enabled'}} } Default {$containerExists = Get-WindowsFeature -Name Containers} } if($containerExists -and $containerExists.Installed) { Write-Verbose "Containers feature is already installed. Skipping the install." return } else { Write-Verbose "Installing Containers..." switch(Get-wmiobject -class win32_operatingsystem | select-object -ExpandProperty Caption ){ 'Microsoft Windows 10' {$null = Enable-WindowsOptionalFeature -FeatureName Containers} Default {$null = Install-WindowsFeature containers} } $script:restartRequired = $true } } Write-Verbose "Installed containers" } function UninstallContainer { if(IsNanoServer) { return } else { switch(Get-wmiobject -class win32_operatingsystem | select-object -ExpandProperty Caption ){ 'Microsoft Windows 10' {$null = Disable-WindowsOptionalFeature -FeatureName Containers} Default {$null = Uninstall-WindowsFeature containers } } } } function HandleProvider { # Get the nanoServerpackage provider is present $getnanoServerPackage = Get-PackageProvider -Name $script:nanoserverPackageProvider -ErrorAction SilentlyContinue -WarningAction SilentlyContinue # if not download and install if(-not $getnanoServerPackage) { $repositories = Get-PSRepository -Name PSGallery -ErrorAction SilentlyContinue -WarningAction SilentlyContinue if(-not $repositories){$null = Register-PSRepository -Default} $nanoserverPackage = Find-Module -Name $script:nanoserverPackageProvider -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -Repository PSGallery if(-not $nanoserverPackage) { ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage "Unable to find the Containers Package from NanoServerPackage Module." ` -ErrorId "PackageNotFound" ` -CallerPSCmdlet $PSCmdlet ` -ErrorCategory InvalidOperation } # Install the provider $null = $nanoserverPackage | Install-Module -Force -SkipPublisherCheck } # Import the provider $importProvider = Import-PackageProvider -Name $script:nanoserverPackageProvider -Force -ErrorAction SilentlyContinue -WarningAction SilentlyContinue $importModule = Import-module -Name $script:nanoserverPackageProvider -Force -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -PassThru return ($importModule -and $importProvider) } function Update-PathVar { $NameOfPath = "Path" # Set the environment variable in the Local Process $envVars = [Environment]::GetEnvironmentVariable($NameOfPath) $envArr = @() $envArr = $envVars -split ';' $envFlag = $true foreach($envItem in $envArr) { if($envItem.Trim() -match [regex]::Escape($script:pathDockerRoot)) { $envFlag = $false break } } if($envFlag) { $null = [Environment]::SetEnvironmentVariable($NameOfPath, $envVars + ";" + $script:pathDockerRoot) } # Set the environment variable in the Machine $currPath = (Microsoft.PowerShell.Management\Get-ItemProperty -Path $script:SystemEnvironmentKey -Name $NameOfPath -ErrorAction SilentlyContinue).Path $currArr = @() $currArr = $currPath -split ';' $currFlag = $true foreach($currItem in $currArr) { if($currItem.Trim() -match [regex]::Escape($script:pathDockerRoot)) { $currFlag = $true break } } if($currFlag) { $null = Microsoft.PowerShell.Management\Set-ItemProperty $script:SystemEnvironmentKey -Name $NameOfPath -Value ($currPath + ";" + $script:pathDockerRoot) # Nanoserver needs a reboot to persist the registry change if(IsNanoServer) { $script:restartRequired = $true } } } function Remove-PathVar { $NameOfPath = "Path" # Set the environment variable in the Local Process $envVars = [Environment]::GetEnvironmentVariable($NameOfPath) $envArr = @() $envArr = $envVars -split ';' $envFlag = $false foreach($envItem in $envArr) { if($envItem.Trim() -match [regex]::Escape($script:pathDockerRoot)) { $envFlag = $true break } } if($envFlag) { $newPath = $envVars -replace [regex]::Escape($script:pathDockerRoot),$null $newPath = $newPath -replace (";;"), ";" $null = [Environment]::SetEnvironmentVariable($NameOfPath, $newPath) } # Set the environment variable in the Machine $currPath = (Microsoft.PowerShell.Management\Get-ItemProperty -Path $script:SystemEnvironmentKey -Name $NameOfPath -ErrorAction SilentlyContinue).Path $currArr = @() $currArr = $currPath -split ';' $currFlag = $false foreach($currItem in $currArr) { if($currItem.Trim() -match [regex]::Escape($script:pathDockerRoot)) { $currFlag = $true break } } if($currFlag) { $newPath = $envVars -replace [regex]::Escape($script:pathDockerRoot),$null $newPath = $newPath -replace (";;"), ";" $null = Microsoft.PowerShell.Management\Set-ItemProperty $script:SystemEnvironmentKey -Name $NameOfPath -Value $newPath } } function Set-ModuleSourcesVariable { if(Microsoft.PowerShell.Management\Test-Path $script:file_modules) { $script:DockerSources = DeSerialize-PSObject -Path $script:file_modules } else { $script:DockerSources = [ordered]@{} $defaultModuleSource = Microsoft.PowerShell.Utility\New-Object PSCustomObject -Property ([ordered]@{ Name = "DockerDefault" SourceLocation = $script:dockerURL Trusted=$false Registered= $true InstallationPolicy = "Untrusted" }) $script:DockerSources.Add("DockerDefault", $defaultModuleSource) Save-ModuleSources } } function DeSerialize-PSObject { [CmdletBinding(PositionalBinding=$false)] Param ( [Parameter(Mandatory=$true)] $Path ) $filecontent = Microsoft.PowerShell.Management\Get-Content -Path $Path [System.Management.Automation.PSSerializer]::Deserialize($filecontent) } function Save-ModuleSources { # check if exists if(-not (Test-Path $script:location_sources)) { $null = mkdir $script:location_sources } # seralize module Microsoft.PowerShell.Utility\Out-File -FilePath $script:file_modules ` -Force ` -InputObject ([System.Management.Automation.PSSerializer]::Serialize($script:DockerSources)) } function Get-SourceList { param ( [Parameter(Mandatory=$true)] $sources ) Set-ModuleSourcesVariable $listOfSources = @() foreach($mySource in $script:DockerSources.Values) { if((-not $sources) -or (($mySource.Name -eq $sources) -or ($mySource.SourceLocation -eq $sources))) { $tempHolder = @{} $location = $mySource."SourceLocation" $tempHolder.Add("SourceLocation", $location) $packageSourceName = $mySource.Name $tempHolder.Add("Name", $packageSourceName) $listOfSources += $tempHolder } } return $listOfSources } function Find-FromUrl { param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [Uri] $Source, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String] $SourceName, [Parameter(Mandatory=$false)] [string[]] $Name, [Parameter(Mandatory=$false)] [String] $MinimumVersion, [Parameter(Mandatory=$false)] [String] $MaximumVersion, [Parameter(Mandatory=$false)] [String] $RequiredVersion, [Parameter(Mandatory=$false)] [switch] $AllVersions ) if ([string]::IsNullOrWhiteSpace($Name)) { $Name = "*" } if ([System.Management.Automation.WildcardPattern]::ContainsWildcardCharacters($Name)) { if('docker' -notlike $Name) {return $null} } elseif('docker' -ne $Name) {return $Null} $searchFile = Get-SearchIndex -fwdLink $Location ` -SourceName $SourceName [String] $searchFileContent = Get-Content -Path $searchFile if(-not $searchFileContent) { return $null } $updatedContent = $searchFileContent.Trim(" .-`t`n`r") $contents = $updatedContent | ConvertFrom-Json $channels = $contents.channels $versions = $contents.versions $csName = $channels.cs.alias $csVersion = $channels.$csName.version $channelValues = $channels | Get-Member -MemberType NoteProperty $searchResults = @() # If name is null or whitespace, interpret as * if ([string]::IsNullOrWhiteSpace($Name)) { $Name = "*" } # if no versions are mentioned, just provide the default version, i.e.: CS if((-not ($MinimumVersion -or $MaximumVersion -or $RequiredVersion -or $AllVersions))) { $RequiredVersion = $csVersion } # if a particular version is requested, provide that version only if($RequiredVersion) { if($versions.PSObject.properties.name -contains $RequiredVersion) { $obj = Get-ResultObject -JSON $versions -Version $RequiredVersion $searchResults += $obj return $searchResults } else { return $null } } $savedVersion = New-Object $script:SemVerTypeName -ArgumentList '0.0.0' # version requirement # compare different versions foreach($channel in $channelValues) { if($channel.Name -eq "cs") { continue } else { $dockerName = "Docker" $versionName = $channel.Name $versionValue = $channels.$versionName.version if($versionName -eq $csName){$versionName = "cs"} $toggle = $false # Check if the search string has * in it if ([System.Management.Automation.WildcardPattern]::ContainsWildcardCharacters($Name)) { if($dockerName -like $Name) { $toggle = $true } else { continue } } else { if($dockerName -eq $Name) { $toggle = $true } else { continue } } $thisVersion = New-Object $script:SemVerTypeName -ArgumentList $versionValue if($MinimumVersion) { $convertedMinimumVersion = New-Object $script:SemVerTypeName -ArgumentList $MinimumVersion if($thisVersion -ge $convertedMinimumVersion) { $toggle = $true } else { $toggle = $false continue } } if($MaximumVersion) { $convertedMaximumVersion = New-Object $script:SemVerTypeName -ArgumentList $MaximumVersion if($thisVersion -le $convertedMaximumVersion) { $toggle = $true } else { $toggle = $false continue } } if($toggle) { if($thisVersion -ge $savedVersion) {$savedVersion = $thisVersion} } if($AllVersions) { if($toggle) { $obj = Get-ResultObject -JSON $versions -Version $versionValue $searchResults += $obj } } } } if(-not $AllVersions) { if($savedVersion -eq '0.0.0'){return $null} $ver = $savedVersion.ToString() $obj = Get-ResultObject -JSON $versions -Version $ver $searchResults += $obj } return $searchResults } function Get-ResultObject { param ( [Parameter(Mandatory=$true)] [string] $Version, [Parameter(Mandatory=$true)] [psobject] $JSON ) if($JSON.$Version) { $description = "" if($versions.$Version.Psobject.properties.name -contains "notes") { $URL = $versions.$Version.'notes' if($URL.StartsWith("https://")) { try { $description = (Invoke-WebRequest -Uri $URL).Content } catch { Write-verbose "Bad URL provided for description: $URL" } } else { $description = $versions.$Version.'notes' } } $obj = $versions.$Version.PSObject.Copy() $null = $obj | Add-Member NoteProperty Version $Version $null = $obj | Add-Member NoteProperty Name "Docker" $null = $obj | Add-Member NoteProperty SourceName $SourceName $null = $obj | Add-Member NoteProperty Description $description return $obj } return $null } function Get-SearchIndex { param ( [Parameter(Mandatory=$true)] [string] $fwdLink, [Parameter(Mandatory=$true)] [string] $SourceName ) $fullUrl = Resolve-FwdLink $fwdLink $searchIndex = $SourceName + "_" + $script:DockerSearchIndex $destination = Join-Path $script:location_modules $searchIndex if(-not(Test-Path $script:location_modules)) { $null = mkdir $script:location_modules } if(Test-Path $destination) { $null = Remove-Item $destination $null = DownloadFile -downloadURL $fullUrl ` -destination $destination } else { $null = DownloadFile -downloadURL $fullUrl ` -destination $destination } return $destination } function Resolve-FwdLink { param ( [parameter(Mandatory=$false)] [System.String]$Uri ) $response = Get-HttpResponse -Uri $Uri if(-not $response) { # This is not a forward link. Return the original URI return $Uri } $link = $response.Result.RequestMessage.RequestUri $fullUrl = $link.AbsoluteUri return $fullUrl } function Get-HttpResponse { param ( [Parameter(Mandatory=$false)] [System.String] $Uri ) if(-not (IsNanoServer)) { Add-Type -AssemblyName System.Net.Http } $httpClient = New-Object System.Net.Http.HttpClient $response = $httpclient.GetAsync($Uri) return $response } function New-SoftwareIdentityFromDockerInfo { param ( [Parameter(Mandatory=$true)] [PSCustomObject] $DockerInfo ) $fastPackageReference = $DockerInfo.SourceName + $separator + $DockerInfo.Name + $separator + $DockerInfo.Version + $separator + $DockerInfo.Description + $separator + $dockerInfo.date + $separator + $dockerInfo.url + $separator + $dockerInfo.size + $separator + $dockerInfo.sha256 $params = @{ FastPackageReference = $fastPackageReference; Name = $DockerInfo.Name; Version = $DockerInfo.Version; Source = $DockerInfo.SourceName; versionScheme = "MultiPartNumeric"; Summary = $DockerInfo.Description; } New-SoftwareIdentity @params } function Set-ModuleSourcesVariable { [CmdletBinding()] param([switch]$Force) if(Microsoft.PowerShell.Management\Test-Path $script:file_modules) { $script:DockerSources = DeSerialize-PSObject -Path $script:file_modules } else { $script:DockerSources = [ordered]@{} $defaultModuleSource = Microsoft.PowerShell.Utility\New-Object PSCustomObject -Property ([ordered]@{ Name = "DockerDefault" SourceLocation = $script:dockerURL Trusted=$false Registered= $true InstallationPolicy = "Untrusted" }) $script:DockerSources.Add("DockerDefault", $defaultModuleSource) Save-ModuleSources } } function Get-DynamicOptions { param ( [Microsoft.PackageManagement.MetaProvider.PowerShell.OptionCategory] $category ) switch($category) { Install { Write-Output -InputObject (New-DynamicOption -Category $category -Name "Update" -ExpectedType Switch -IsRequired $false) } } } function Add-PackageSource { [CmdletBinding()] param ( [string] $Name, [string] $Location, [bool] $Trusted ) Set-ModuleSourcesVariable $Options = $request.Options # Add new module source $moduleSource = Microsoft.PowerShell.Utility\New-Object PSCustomObject -Property ([ordered]@{ Name = $Name SourceLocation = $Location Trusted=$Trusted Registered= $true InstallationPolicy = if($Trusted) {'Trusted'} else {'Untrusted'} }) #TODO: Check if name already exists $script:DockerSources.Add($Name, $moduleSource) Save-ModuleSources Write-Output -InputObject (New-PackageSourceFromModuleSource -ModuleSource $moduleSource) } function Remove-PackageSource { param ( [string] $Name ) Set-ModuleSourcesVariable -Force if(-not $script:DockerSources.Contains($Name)) { Write-Error -Message "Package source $Name not found" ` -ErrorId "Package source $Name not found" ` -Category InvalidOperation ` -TargetObject $Name continue } $script:DockerSources.Remove($Name) Save-ModuleSources } function Resolve-PackageSource { Set-ModuleSourcesVariable $SourceName = $request.PackageSources if(-not $SourceName) { $SourceName = "*" } foreach($moduleSourceName in $SourceName) { if($request.IsCanceled) { return } $wildcardPattern = New-Object System.Management.Automation.WildcardPattern $moduleSourceName,$script:wildcardOptions $moduleSourceFound = $false $script:DockerSources.GetEnumerator() | Microsoft.PowerShell.Core\Where-Object {$wildcardPattern.IsMatch($_.Key)} | Microsoft.PowerShell.Core\ForEach-Object { $moduleSource = $script:DockerSources[$_.Key] $packageSource = New-PackageSourceFromModuleSource -ModuleSource $moduleSource Write-Output -InputObject $packageSource $moduleSourceFound = $true } if(-not $moduleSourceFound) { $sourceName = Get-SourceName -Location $moduleSourceName if($sourceName) { $moduleSource = $script:DockerSources[$sourceName] $packageSource = New-PackageSourceFromModuleSource -ModuleSource $moduleSource Write-Output -InputObject $packageSource } } } } function New-PackageSourceFromModuleSource { param ( [Parameter(Mandatory=$true)] $ModuleSource ) $packageSourceDetails = @{} # create a new package source $src = New-PackageSource -Name $ModuleSource.Name ` -Location $ModuleSource.SourceLocation ` -Trusted $ModuleSource.Trusted ` -Registered $ModuleSource.Registered ` -Details $packageSourceDetails # return the package source object. Write-Output -InputObject $src } function Get-SourceName { [CmdletBinding()] [OutputType("string")] Param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $Location ) Set-ModuleSourcesVariable foreach($psModuleSource in $script:DockerSources.Values) { if(($psModuleSource.Name -eq $Location) -or ($psModuleSource.SourceLocation -eq $Location)) { return $psModuleSource.Name } } } function DownloadPackageHelper { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $FastPackageReference, [Parameter()] [ValidateNotNullOrEmpty()] [string] $Location, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $request ) [string[]] $splitterArray = @("$separator") [string[]] $resultArray = $fastPackageReference.Split($splitterArray, [System.StringSplitOptions]::None) if((-not $resultArray) -or ($resultArray.count -ne 8)){Write-Debug "Fast package reference doesn't have required parts."} $source = $resultArray[0] $name = $resultArray[1] $version = $resultArray[2] $description = $resultArray[3] $originPath = $resultArray[5] $size = $resultArray[6] $sha = $resultArray[7] $date = $resultArray[4] $options = $request.Options foreach( $o in $options.Keys ) { Write-Debug ( "OPTION: {0} => {1}" -f ($o, $options[$o]) ) } $Force = $false if($options.ContainsKey("Force")) { $Force = $options['Force'] } if(-not (Test-Path $Location)) { if($Force) { Write-Verbose "Creating: $Location as it doesn't exist." mkdir $Location } else { $errorMessage = ("Cannot find the path '{0}' because it does not exist" -f $Location) ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $errorMessage ` -ErrorId "PathNotFound" ` -CallerPSCmdlet $PSCmdlet ` -ExceptionObject $Location ` -ErrorCategory InvalidArgument } } $fullDestinationPath = GenerateFullPath -Location $Location ` -Name $name ` -Version $Version if(Test-Path $fullDestinationPath) { if($Force) { $existingFileItem = get-item $fullDestinationPath if($existingFileItem.isreadonly) { throw "Cannot remove read-only file $fullDestinationPath. Remove read-only and use -Force again." } else { Write-Verbose "$fullDestinationPath already exists. Deleting and downloading again." Remove-Item $fullDestinationPath -Force DownloadFile -downloadUrl $originPath -destination $fullDestinationPath } } else { Write-Verbose "$fullDestinationPath already exists. Skipping save. Use -Force to overwrite." } } else { DownloadFile -downloadUrl $originPath -destination $fullDestinationPath } $hashCheck = VerifyHashCheck -destination $fullDestinationPath -hash $sha if((-not $hashCheck)) { $null = remove-item -Path $fullDestinationPath -Force Write-Error -Message "Cannot verify the file SHA256. Deleting the file." } Write-Verbose "Hash verified!" $savedWindowsPackageItem = Microsoft.PowerShell.Utility\New-Object PSCustomObject -Property ([ordered]@{ SourceName = $source Name = $name Version = $version Description = $description Date = $date URL = $originPath Size = $size sha256 = $sha }) Write-Output (New-SoftwareIdentityFromDockerInfo $savedWindowsPackageItem) } function GenerateFullPath { param ( [Parameter(Mandatory=$true)] [System.String] $Location, [Parameter(Mandatory=$true)] [System.String] $Name, [Parameter(Mandatory=$true)] [System.String] $Version ) $fileExtension = "." + $script:Installer_Extension $Name = $Name.TrimEnd($fileExtension) $fileName = $Name + "-" + $Version.ToString().replace('.','-') + $fileExtension $fullPath = Join-Path $Location $fileName return $fullPath } function DownloadFile { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [System.String] $downloadURL, [Parameter(Mandatory=$true)] [System.String] $destination ) try { if(-not (CheckDiskSpace -Destination $destination -URL $downloadURL)) { return } # Download the file if($downloadURL.StartsWith("https://")) { Write-Verbose "Downloading $downloadUrl to $destination" $saveItemPath = $PSScriptRoot + "\SaveHTTPItemUsingBITS.psm1" Import-Module "$saveItemPath" $startTime = Get-Date Write-Verbose "About to download" Invoke-WebRequest -Uri $downloadURL ` -OutFile $destination Write-Verbose "Finished downloading" $endTime = Get-Date $difference = New-TimeSpan -Start $startTime -End $endTime $downloadTime = "Downloaded in " + $difference.Hours + " hours, " + $difference.Minutes + " minutes, " + $difference.Seconds + " seconds." Write-Verbose $downloadTime } } catch { ThrowError -CallerPSCmdlet $PSCmdlet ` -ExceptionName $_.Exception.GetType().FullName ` -ExceptionMessage $_.Exception.Message ` -ExceptionObject $downloadURL ` -ErrorId FailedToDownload ` -ErrorCategory InvalidOperation } } function ThrowError { param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.Management.Automation.PSCmdlet] $CallerPSCmdlet, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ExceptionName, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ExceptionMessage, [System.Object] $ExceptionObject, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ErrorId, [parameter(Mandatory = $true)] [ValidateNotNull()] [System.Management.Automation.ErrorCategory] $ErrorCategory ) $exception = New-Object $ExceptionName $ExceptionMessage; $errorRecord = New-Object System.Management.Automation.ErrorRecord $exception, $ErrorId, $ErrorCategory, $ExceptionObject $CallerPSCmdlet.ThrowTerminatingError($errorRecord) } function CheckDiskSpace { param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Destination, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $URL ) $size = 0 if($URL.StartsWith("https://")) { $response = Get-HttpResponse -Uri $URL $size = $response.Result.Content.Headers.ContentLength } $parent = Split-Path $Destination -Parent $Drive = (Get-Item $parent).PSDrive.Name $getDriveSpace = get-ciminstance win32_logicaldisk | Where-Object {$_.DeviceID -match $Drive} | % Freespace $contentLengthInMB = [math]::Round($size/1mb, 2) $driveSpaceInIMB = [math]::Round($getDriveSpace/1mb, 2) Write-Verbose "Download size: $($contentLengthInMB)MB" Write-Verbose "Free space on the drive: $($driveSpaceInIMB)MB" if($size -ge ($getDriveSpace * 0.95)) { Write-Error "Not enough space to save the file" return $false } return $true } function VerifyHashCheck { param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Destination, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $hash ) Write-Verbose "Verifying Hash of the downloaded file." $fileHash = Get-FileHash -Path $Destination ` -Algorithm SHA256 if($fileHash.Psobject.properties.name -Contains "Hash") { $fileSha256 = $fileHash.Hash } else { Write-Verbose "Hash for the original file not available." return $false } return ($hash -ieq $fileSha256) } function Test-AdminPrivilege { [CmdletBinding()] [OutputType([bool])] Param() $myWindowsID=[System.Security.Principal.WindowsIdentity]::GetCurrent() $myWindowsPrincipal=new-object System.Security.Principal.WindowsPrincipal($myWindowsID) # Get the security principal for the Administrator role $adminRole=[System.Security.Principal.WindowsBuiltInRole]::Administrator # Check to see if we are currently running "as Administrator" return ($myWindowsPrincipal.IsInRole($adminRole)) } function IsNanoServer { if ($script:isNanoServerInitialized) { return $script:isNanoServer } else { $operatingSystem = Get-CimInstance -ClassName win32_operatingsystem $systemSKU = $operatingSystem.OperatingSystemSKU $script:isNanoServer = ($systemSKU -eq 109) -or ($systemSKU -eq 144) -or ($systemSKU -eq 143) $script:isNanoServerInitialized = $true return $script:isNanoServer } } function Install-NuGetClientBinary { [CmdletBinding(SupportsShouldProcess = $true)] param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.Management.Automation.PSCmdlet] $CallerPSCmdlet, [parameter()] [switch] $Force ) if($script:NuGetProvider) { return } $InstallNuGetProviderShouldContinueQuery = "DockerMsftProvider requires NuGet provider. The NuGet provider must be available in '{0}' or '{1}'. You can also install the NuGet provider by running 'Install-PackageProvider -Name NuGet -Force'. Do you want DockerMsftProvider to install and import the NuGet provider now?" $InstallNuGetProviderShouldContinueCaption = "NuGet provider is required to continue" $CouldNotInstallNuGetProvider = "NuGet provider is required. Please ensure that NuGet provider is installed." $DownloadingNugetProvider = "Installing NuGet provider." $bootstrapNuGetProvider = (-not $script:NuGetProvider) if($bootstrapNuGetProvider) { # Bootstrap the NuGet provider only if it is not available. # By default PackageManagement loads the latest version of the NuGet provider. $nugetProvider = PackageManagement\Get-PackageProvider -ErrorAction SilentlyContinue -WarningAction SilentlyContinue | Microsoft.PowerShell.Core\Where-Object {$_.Name -eq $script:NuGetProviderName} if($nugetProvider) { $script:NuGetProvider = $nugetProvider $bootstrapNuGetProvider = $false return } else { $nugetProvider = PackageManagement\Get-PackageProvider -ListAvailable -ErrorAction SilentlyContinue -WarningAction SilentlyContinue | Microsoft.PowerShell.Core\Where-Object {$_.Name -eq $script:NuGetProviderName} if($nugetProvider) { $null = PackageManagement\Import-PackageProvider -Name $script:NuGetProviderName -Force $nugetProvider = PackageManagement\Get-PackageProvider -ErrorAction SilentlyContinue -WarningAction SilentlyContinue | Microsoft.PowerShell.Core\Where-Object {$_.Name -eq $script:NuGetProviderName} if($nugetProvider) { $script:NuGetProvider = $nugetProvider $bootstrapNuGetProvider = $false return } } } } # We should prompt only once for bootstrapping the NuGet provider # Should continue message for bootstrapping only NuGet provider $shouldContinueQueryMessage = $InstallNuGetProviderShouldContinueQuery -f @($script:NuGetBinaryProgramDataPath,$script:NuGetBinaryLocalAppDataPath) $shouldContinueCaption = $InstallNuGetProviderShouldContinueCaption if($Force -or $request.ShouldContinue($shouldContinueQueryMessage, $shouldContinueCaption)) { if($bootstrapNuGetProvider) { Write-Verbose -Message $DownloadingNugetProvider $scope = 'CurrentUser' if(Test-AdminPrivilege) { $scope = 'AllUsers' } # Bootstrap the NuGet provider $null = PackageManagement\Install-PackageProvider -Name $script:NuGetProviderName ` -Scope $scope ` -Force # Force import ensures that nuget provider with minimum version got loaded. $null = PackageManagement\Import-PackageProvider -Name $script:NuGetProviderName ` -Force $nugetProvider = PackageManagement\Get-PackageProvider -Name $script:NuGetProviderName if ($nugetProvider) { $script:NuGetProvider = $nugetProvider } } } $message = $null $errorId = $null $failedToBootstrapNuGetProvider = $false if($bootstrapNuGetProvider -and -not $script:NuGetProvider) { $failedToBootstrapNuGetProvider = $true $message = $CouldNotInstallNuGetProvider $errorId = 'CouldNotInstallNuGetProvider' } # Throw the error message if one of the above conditions are met if($message -and $errorId) { ThrowError -ExceptionName "System.InvalidOperationException" ` -ExceptionMessage $message ` -ErrorId $errorId ` -CallerPSCmdlet $CallerPSCmdlet ` -ErrorCategory InvalidOperation } } #endregion # SIG # Begin signature block # MIIa/AYJKoZIhvcNAQcCoIIa7TCCGukCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUKpYl7BjXyoLbxqaWa7kgX133 # viagghWAMIIEwjCCA6qgAwIBAgITMwAAAMM7uBDWq3WchAAAAAAAwzANBgkqhkiG # 9w0BAQUFADB3MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSEw # HwYDVQQDExhNaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EwHhcNMTYwOTA3MTc1ODUx # WhcNMTgwOTA3MTc1ODUxWjCBsjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEMMAoGA1UECxMDQU9DMScwJQYDVQQLEx5uQ2lwaGVyIERTRSBFU046 # RDIzNi0zN0RBLTk3NjExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2UwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCiOG2wDGVZj5ZH # gCl0ZaExy6HZQZ9T2uupPuxqtiWqXH2oIj762GqMc1JPYHkpEo5alygWdvB3D6FS # qpA8al+mGJTMktlA+ydstLPRr6CBoEF+hm6RBzwVlsN9z6BVppwIZWt2lEVG6r1Y # W1y1rb0d4FsA8qwRSI0sB8sAw9IHXi/J4Jd6klQvw2m6oLXl9C73/1DldPPZYGOT # DQ98RxIaYewvksnNqblmvFpOx8Kuedkxl4jtAKl0F/2+QqRfU32OAiCiYFgZIgOP # B4A8UbHmLIyn7pNqtom4NqMiZz9G4Bm5bwILhElYcZPMq/P1Hr38/WoAD99WAm3W # FpXSFZejAgMBAAGjggEJMIIBBTAdBgNVHQ4EFgQUc3cXeGMQ8QV4IbaO4PEw84WH # F6gwHwYDVR0jBBgwFoAUIzT42VJGcArtQPt2+7MrsMM1sw8wVAYDVR0fBE0wSzBJ # oEegRYZDaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljcm9zb2Z0VGltZVN0YW1wUENBLmNybDBYBggrBgEFBQcBAQRMMEowSAYIKwYB # BQUHMAKGPGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljcm9z # b2Z0VGltZVN0YW1wUENBLmNydDATBgNVHSUEDDAKBggrBgEFBQcDCDANBgkqhkiG # 9w0BAQUFAAOCAQEASOPK1ntqWwaIWnNINY+LlmHQ4Q88h6TON0aE+6cZ2RrjBUU4 # 9STkyQ2lgvKpmIkQYWJbuNRh65IJ1HInwhD8XWd0f0JXAIrzTlL0zw3SdbrtyZ9s # P4NxqyjQ23xBiI/d13CrtfTAVlGYIY1Ahl80+0KGyuUzJLTi9350/gHaI0Jz3irw # rJ+htxF1UW/NT0AYJyRYe2el9JhgeudeKOKav3fQBlzALQmk4Ekoyq3muJHGoqfe # No4zsP/M+WQ6oBMlUq8/49sg/ryuP0EeVtNiePuxPmX5i6Knzpd3rPgKPS+9Tq1d # KLts1K4rjpASoKSs8Ubv3rwQSw0O/zTd1bc8EjCCBOswggPToAMCAQICEzMAAAF4 # JVq1zSPGX5UAAQAAAXgwDQYJKoZIhvcNAQEFBQAweTELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IENvZGUgU2ln # bmluZyBQQ0EwHhcNMTcwODExMjAxMTE1WhcNMTgwODExMjAxMTE1WjCBgjELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEMMAoGA1UECxMDQU9DMR4w # HAYDVQQDExVNaWNyb3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUA # A4IBDwAwggEKAoIBAQCZbh1TVaudsrIbXUPPB9c8S+E+dKSbskHKYlG6SGTH8jhT # hpuvGiAO87F2b9GHVN+DvszaMkGy/xQgHaGEJLfpnb3kpakic7E0bjDHdG4KnHRb # no/wfUkGLfS79o+cw//RY8Ck6yE+0czDBcxp0Gbw5JyGP+KFqvzRR/3Tv3nt/5x0 # 5ZnEOHYP+eDVikDvn/DH+oxxtiCfX3tkvtm/yX4eOb47YdmYKQjCgz2+Nil/lupY # vU0QFIjvke3jshqQINDng/vO9ys2qA0ex/q5hlLKQTST99dGoM86Ge6F723ReToq # KnGLN8kiCG7uNapOAIQrpCHZq96CVumiaA5ZvxU9AgMBAAGjggFgMIIBXDATBgNV # HSUEDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQUjuhtD3FD7tk/RKloJFX05cpgLjcw # UQYDVR0RBEowSKRGMEQxDDAKBgNVBAsTA0FPQzE0MDIGA1UEBRMrMjI5ODAzKzFh # YmY5ZTVmLWNlZDAtNDJlNi1hNjVkLWQ5MzUwOTU5ZmUwZTAfBgNVHSMEGDAWgBTL # EejK0rQWWAHJNy4zFha5TJoKHzBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0FfMDgt # MzEtMjAxMC5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8wOC0zMS0y # MDEwLmNydDANBgkqhkiG9w0BAQUFAAOCAQEAYnG/oHG/xgZYR8NAMHZ/vE9GM0e4 # 7YdhuTea2uY7pSGwM707wp8Wan0Fa6evK1PWfcd/XNOh2BpEv5o8RmKDoEsG0ECP # 13Jug7cklfKreBVHQ+Djg43VVFLZpuo7aOAVK6wjlcnpPUtn+SfH9K0aM2FjDKVJ # FW6XFKXBat5R+Zp6uOxWTxpSeMTeDC5zF6IY6ogR1uzU+9EQoRlAvkwX6po+exEL # nMLr4++P+fqOxIU+PODIoB8ijClAqwwKvLlMPa3qlrNHt+LweTMu7lvGC/RA18wU # zzXAeomuZ03blUw+bkOiVgWOk4S0RN7EnW7zjJV8gd/+G2dbToUi1cB/fTCCBbww # ggOkoAMCAQICCmEzJhoAAAAAADEwDQYJKoZIhvcNAQEFBQAwXzETMBEGCgmSJomT # 8ixkARkWA2NvbTEZMBcGCgmSJomT8ixkARkWCW1pY3Jvc29mdDEtMCsGA1UEAxMk # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTEwMDgzMTIy # MTkzMloXDTIwMDgzMTIyMjkzMloweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Ew # ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCycllcGTBkvx2aYCAgQpl2 # U2w+G9ZvzMvx6mv+lxYQ4N86dIMaty+gMuz/3sJCTiPVcgDbNVcKicquIEn08Gis # TUuNpb15S3GbRwfa/SXfnXWIz6pzRH/XgdvzvfI2pMlcRdyvrT3gKGiXGqelcnNW # 8ReU5P01lHKg1nZfHndFg4U4FtBzWwW6Z1KNpbJpL9oZC/6SdCnidi9U3RQwWfjS # jWL9y8lfRjFQuScT5EAwz3IpECgixzdOPaAyPZDNoTgGhVxOVoIoKgUyt0vXT2Pn # 0i1i8UU956wIAPZGoZ7RW4wmU+h6qkryRs83PDietHdcpReejcsRj1Y8wawJXwPT # AgMBAAGjggFeMIIBWjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTLEejK0rQW # WAHJNy4zFha5TJoKHzALBgNVHQ8EBAMCAYYwEgYJKwYBBAGCNxUBBAUCAwEAATAj # BgkrBgEEAYI3FQIEFgQU/dExTtMmipXhmGA7qDFvpjy82C0wGQYJKwYBBAGCNxQC # BAweCgBTAHUAYgBDAEEwHwYDVR0jBBgwFoAUDqyCYEBWJ5flJRP8KuEKU5VZ5KQw # UAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9j # cmwvcHJvZHVjdHMvbWljcm9zb2Z0cm9vdGNlcnQuY3JsMFQGCCsGAQUFBwEBBEgw # RjBEBggrBgEFBQcwAoY4aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0 # cy9NaWNyb3NvZnRSb290Q2VydC5jcnQwDQYJKoZIhvcNAQEFBQADggIBAFk5Pn8m # Rq/rb0CxMrVq6w4vbqhJ9+tfde1MOy3XQ60L/svpLTGjI8x8UJiAIV2sPS9MuqKo # VpzjcLu4tPh5tUly9z7qQX/K4QwXaculnCAt+gtQxFbNLeNK0rxw56gNogOlVuC4 # iktX8pVCnPHz7+7jhh80PLhWmvBTI4UqpIIck+KUBx3y4k74jKHK6BOlkU7IG9KP # cpUqcW2bGvgc8FPWZ8wi/1wdzaKMvSeyeWNWRKJRzfnpo1hW3ZsCRUQvX/TartSC # Mm78pJUT5Otp56miLL7IKxAOZY6Z2/Wi+hImCWU4lPF6H0q70eFW6NB4lhhcyTUW # X92THUmOLb6tNEQc7hAVGgBd3TVbIc6YxwnuhQ6MT20OE049fClInHLR82zKwexw # o1eSV32UjaAbSANa98+jZwp0pTbtLS8XyOZyNxL0b7E8Z4L5UrKNMxZlHg6K3RDe # ZPRvzkbU0xfpecQEtNP7LN8fip6sCvsTJ0Ct5PnhqX9GuwdgR2VgQE6wQuxO7bN2 # edgKNAltHIAxH+IOVN3lofvlRxCtZJj/UBYufL8FIXrilUEnacOTj5XJjdibIa4N # XJzwoq6GaIMMai27dmsAHZat8hZ79haDJLmIz2qoRzEvmtzjcT3XAH5iR9HOiMm4 # GPoOco3Boz2vAkBq/2mbluIQqBC0N1AI1sM9MIIGBzCCA++gAwIBAgIKYRZoNAAA # AAAAHDANBgkqhkiG9w0BAQUFADBfMRMwEQYKCZImiZPyLGQBGRYDY29tMRkwFwYK # CZImiZPyLGQBGRYJbWljcm9zb2Z0MS0wKwYDVQQDEyRNaWNyb3NvZnQgUm9vdCBD # ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHhcNMDcwNDAzMTI1MzA5WhcNMjEwNDAzMTMw # MzA5WjB3MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSEwHwYD # VQQDExhNaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EwggEiMA0GCSqGSIb3DQEBAQUA # A4IBDwAwggEKAoIBAQCfoWyx39tIkip8ay4Z4b3i48WZUSNQrc7dGE4kD+7Rp9FM # rXQwIBHrB9VUlRVJlBtCkq6YXDAm2gBr6Hu97IkHD/cOBJjwicwfyzMkh53y9Gcc # LPx754gd6udOo6HBI1PKjfpFzwnQXq/QsEIEovmmbJNn1yjcRlOwhtDlKEYuJ6yG # T1VSDOQDLPtqkJAwbofzWTCd+n7Wl7PoIZd++NIT8wi3U21StEWQn0gASkdmEScp # ZqiX5NMGgUqi+YSnEUcUCYKfhO1VeP4Bmh1QCIUAEDBG7bfeI0a7xC1Un68eeEEx # d8yb3zuDk6FhArUdDbH895uyAc4iS1T/+QXDwiALAgMBAAGjggGrMIIBpzAPBgNV # HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQjNPjZUkZwCu1A+3b7syuwwzWzDzALBgNV # HQ8EBAMCAYYwEAYJKwYBBAGCNxUBBAMCAQAwgZgGA1UdIwSBkDCBjYAUDqyCYEBW # J5flJRP8KuEKU5VZ5KShY6RhMF8xEzARBgoJkiaJk/IsZAEZFgNjb20xGTAXBgoJ # kiaJk/IsZAEZFgltaWNyb3NvZnQxLTArBgNVBAMTJE1pY3Jvc29mdCBSb290IENl # cnRpZmljYXRlIEF1dGhvcml0eYIQea0WoUqgpa1Mc1j0BxMuZTBQBgNVHR8ESTBH # MEWgQ6BBhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9taWNyb3NvZnRyb290Y2VydC5jcmwwVAYIKwYBBQUHAQEESDBGMEQGCCsGAQUF # BzAChjhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY3Jvc29m # dFJvb3RDZXJ0LmNydDATBgNVHSUEDDAKBggrBgEFBQcDCDANBgkqhkiG9w0BAQUF # AAOCAgEAEJeKw1wDRDbd6bStd9vOeVFNAbEudHFbbQwTq86+e4+4LtQSooxtYrhX # AstOIBNQmd16QOJXu69YmhzhHQGGrLt48ovQ7DsB7uK+jwoFyI1I4vBTFd1Pq5Lk # 541q1YDB5pTyBi+FA+mRKiQicPv2/OR4mS4N9wficLwYTp2OawpylbihOZxnLcVR # DupiXD8WmIsgP+IHGjL5zDFKdjE9K3ILyOpwPf+FChPfwgphjvDXuBfrTot/xTUr # XqO/67x9C0J71FNyIe4wyrt4ZVxbARcKFA7S2hSY9Ty5ZlizLS/n+YWGzFFW6J1w # lGysOUzU9nm/qhh6YinvopspNAZ3GmLJPR5tH4LwC8csu89Ds+X57H2146SodDW4 # TsVxIxImdgs8UoxxWkZDFLyzs7BNZ8ifQv+AeSGAnhUwZuhCEl4ayJ4iIdBD6Svp # u/RIzCzU2DKATCYqSCRfWupW76bemZ3KOm+9gSd0BhHudiG/m4LBJ1S2sWo9iaF2 # YbRuoROmv6pH8BJv/YoybLL+31HIjCPJZr2dHYcSZAI9La9Zj7jkIeW1sMpjtHhU # BdRBLlCslLCleKuzoJZ1GtmShxN1Ii8yqAhuoFuMJb+g74TKIdbrHk/Jmu5J4PcB # ZW+JC33Iacjmbuqnl84xKf8OxVtc2E0bodj6L54/LlUWa8kTo/0xggTmMIIE4gIB # ATCBkDB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYD # VQQDExpNaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQQITMwAAAXglWrXNI8ZflQAB # AAABeDAJBgUrDgMCGgUAoIH/MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwG # CisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMCMGCSqGSIb3DQEJBDEWBBSgDI69 # hpuXArtuZPaPd4x5GBwFhTCBngYKKwYBBAGCNwIBDDGBjzCBjKAwgC4ARABvAGMA # awBlAHIATQBzAGYAdABQAHIAbwB2AGkAZABlAHIALgBwAHMAbQAxoViAVmh0dHBz # Oi8vZ2l0aHViLmNvbS9PbmVHZXQvTWljcm9zb2Z0RG9ja2VyUHJvdmlkZXIvYmxv # Yi9tYXN0ZXIvRG9ja2VyTXNmdFByb3ZpZGVyLnBzbTEgMA0GCSqGSIb3DQEBAQUA # BIIBAHBfALDw6A5z5FFcqkNy/d6LdDl8w3zwnOTkGWgcRkpiliR4wxCJP39pxlq+ # QjMt+N+yy0zOxz0UPv6pXN7wnvVuBDbTEyjrwHRgPdNnJIlAilXGtF3JUR+btcjU # Zc0XEC9MlD3o5fXStvokfmJr2Roq0KQn8p563CbFzjhQaOfGlfFdkqjIs0yLekb5 # 4WD7F1UV3AZX54dADPVu1A4+j8kWoEMq+NNS1Rtr+E6s8N70lG32T64UIvy0XIrO # Z09k+UuO4wij1qLdGTOCXjdCL6pLAcA/YbdBPAZbTHh39NaiEXoOjzAm2OwnpxkS # dwD9n0jzvnxXLWSo1akS/LGmcZqhggIoMIICJAYJKoZIhvcNAQkGMYICFTCCAhEC # AQEwgY4wdzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEhMB8G # A1UEAxMYTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBAhMzAAAAwzu4ENardZyEAAAA # AADDMAkGBSsOAwIaBQCgXTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqG # SIb3DQEJBTEPFw0xODAyMjAyMTU5NDRaMCMGCSqGSIb3DQEJBDEWBBTWPf287+IT # GpX3JJPQUUE+i+9SojANBgkqhkiG9w0BAQUFAASCAQBc17jTECc9F2//WXKvMsqB # irnTiFUJZe4hLzXx8lPnM1fWs6N41jbNQAhzGw5ODw0Fop8K2eKoVFvF2ngKKakD # GuAhZan3D83b7MsVlEeMel1jCyEmsEKTl4plet0bJ7dhKI6KG0xmMkGD4vtm+NgD # MF+f7jfIHVxNzte3Utg5LWZLOukj+jGjVs6FXotD/ror0M/mW3vOq1+sf8JBItNV # mjqVbBwIp84TfKJT3IT7IFCgcG0jLM60Ei9WEKWMS+tVz5xzu4gO642bU+n2qzXl # QooIIDPyMx4CEjx4uCj8RtcUMU9rxN+RXx8w3+7AQnse9bSDA7GKFgx2XxMAQ1RT # SIG # End signature block |