From ed79fb2fd720b5dbe3efe1febd855549aa4cb213 Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Fri, 31 Aug 2018 13:59:20 +0200 Subject: [PATCH 01/12] Simplified the integration with Azure Connection parameters --- arm-outputs/arm-outputs.ps1 | 2 +- .../VstsAzureHelpers_/ImportFunctions.ps1 | 249 ------ .../VstsAzureHelpers_/InitializeFunctions.ps1 | 623 --------------- .../resources.resjson/de-de/resources.resjson | 12 - .../resources.resjson/en-US/resources.resjson | 15 - .../resources.resjson/es-es/resources.resjson | 12 - .../resources.resjson/fr-fr/resources.resjson | 12 - .../resources.resjson/it-IT/resources.resjson | 12 - .../resources.resjson/ja-jp/resources.resjson | 12 - .../resources.resjson/ko-KR/resources.resjson | 12 - .../resources.resjson/ru-RU/resources.resjson | 12 - .../resources.resjson/zh-CN/resources.resjson | 12 - .../resources.resjson/zh-TW/resources.resjson | 12 - ...rt-AzureModule.AzurePreferredFallsBack.ps1 | 65 -- ...-AzureModule.AzureRMPreferredFallsBack.ps1 | 65 -- ...ort-AzureModule.BothPreferredFallsBack.ps1 | 91 --- .../Import-AzureModule.ThrowsWhenNotFound.ps1 | 22 - ...rt-AzureModule.ValidatesClassicVersion.ps1 | 13 - .../Import-FromModulePath.ImportsModules.ps1 | 68 -- ...romModulePath.ReturnsFalseWhenNotFound.ps1 | 22 - ...FromModulePath.ValidatesRMProfileFound.ps1 | 27 - .../Import-FromSdkPath.ImportsModule.ps1 | 113 --- ...t-FromSdkPath.ReturnsFalseWhenNotFound.ps1 | 24 - .../Tests/Initialize-Azure.PassesInputs.ps1 | 100 --- ...lize-Azure.ThrowsWhenServiceNameIsNull.ps1 | 15 - ...ureSubscription.ManagedServiceIdentity.ps1 | 55 -- ...ption.PassesValuesWhenAzureStackSPAuth.ps1 | 85 -- ...eSubscription.PassesValuesWhenCertAuth.ps1 | 48 -- ...PassesValuesWhenCertAuthAndEnvironment.ps1 | 63 -- ...ureSubscription.PassesValuesWhenSPAuth.ps1 | 83 -- ...bscription.PassesValuesWhenSPNCertAuth.ps1 | 35 - ...ureSubscription.PassesValuesWhenUPAuth.ps1 | 103 --- ...sefulErrorWhenSPAuthAndAddAccountFails.ps1 | 62 -- ...sefulErrorWhenUPAuthAndAddAccountFails.ps1 | 61 -- ...reSubscription.ThrowsWhenRMAndCertAuth.ps1 | 14 - ...cription.ThrowsWhenSPAuthAndClassic099.ps1 | 38 - ...Subscription.ThrowsWhenUnsupportedAuth.ps1 | 28 - .../ps_modules/VstsAzureHelpers_/Tests/L0.ts | 112 --- .../Tests/OverriddesGlobalDebugPreference.ps1 | 14 - ...urrentAzureRMSubscription.PassesValues.ps1 | 34 - ...-CurrentAzureSubscription.PassesValues.ps1 | 66 -- .../Tests/Set-UserAgent.PassesValues.ps1 | 35 - .../VstsAzureHelpers_/VstsAzureHelpers_.psm1 | 61 -- .../ps_modules/VstsAzureHelpers_/make.json | 11 - .../ps_modules/VstsAzureHelpers_/module.json | 17 - .../VstsAzureHelpers_/tsconfig.json | 6 - .../ps_modules/VstsTaskSdk/FindFunctions.ps1 | 728 ------------------ .../ps_modules/VstsTaskSdk/InputFunctions.ps1 | 493 ------------ .../VstsTaskSdk/LegacyFindFunctions.ps1 | 320 -------- .../VstsTaskSdk/LocalizationFunctions.ps1 | 150 ---- .../VstsTaskSdk/LoggingCommandFunctions.ps1 | 601 --------------- .../VstsTaskSdk/LongPathFunctions.ps1 | 205 ----- .../ps_modules/VstsTaskSdk/Minimatch.dll | Bin 18432 -> 0 bytes .../ps_modules/VstsTaskSdk/OutFunctions.ps1 | 79 -- .../VstsTaskSdk/PSGetModuleInfo.xml | Bin 23222 -> 0 bytes .../VstsTaskSdk/ServerOMFunctions.ps1 | 659 ---------------- .../resources.resjson/de-de/resources.resjson | 18 - .../resources.resjson/en-US/resources.resjson | 18 - .../resources.resjson/es-es/resources.resjson | 18 - .../resources.resjson/fr-fr/resources.resjson | 18 - .../resources.resjson/it-IT/resources.resjson | 18 - .../resources.resjson/ja-jp/resources.resjson | 18 - .../resources.resjson/ko-KR/resources.resjson | 18 - .../resources.resjson/ru-RU/resources.resjson | 18 - .../resources.resjson/zh-CN/resources.resjson | 18 - .../resources.resjson/zh-TW/resources.resjson | 18 - .../ps_modules/VstsTaskSdk/ToolFunctions.ps1 | 123 --- .../ps_modules/VstsTaskSdk/TraceFunctions.ps1 | 139 ---- .../ps_modules/VstsTaskSdk/VstsTaskSdk.dll | Bin 25408 -> 0 bytes .../ps_modules/VstsTaskSdk/VstsTaskSdk.psd1 | Bin 1738 -> 0 bytes .../ps_modules/VstsTaskSdk/VstsTaskSdk.psm1 | 168 ---- arm-outputs/ps_modules/VstsTaskSdk/lib.json | 20 - arm-outputs/run-vsts.ps1 | 31 +- arm-outputs/task.json | 2 +- 74 files changed, 25 insertions(+), 6526 deletions(-) delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/ImportFunctions.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/InitializeFunctions.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/de-de/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/en-US/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/es-es/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/fr-fr/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/it-IT/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ja-jp/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ko-KR/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ru-RU/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/zh-CN/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/zh-TW/resources.resjson delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.AzurePreferredFallsBack.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.AzureRMPreferredFallsBack.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.BothPreferredFallsBack.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.ThrowsWhenNotFound.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.ValidatesClassicVersion.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ImportsModules.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ReturnsFalseWhenNotFound.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ValidatesRMProfileFound.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromSdkPath.ImportsModule.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromSdkPath.ReturnsFalseWhenNotFound.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-Azure.PassesInputs.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-Azure.ThrowsWhenServiceNameIsNull.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ManagedServiceIdentity.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenAzureStackSPAuth.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenCertAuth.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenCertAuthAndEnvironment.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenSPAuth.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenSPNCertAuth.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenUPAuth.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsUsefulErrorWhenSPAuthAndAddAccountFails.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsUsefulErrorWhenUPAuthAndAddAccountFails.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenRMAndCertAuth.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenSPAuthAndClassic099.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenUnsupportedAuth.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/L0.ts delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/OverriddesGlobalDebugPreference.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-CurrentAzureRMSubscription.PassesValues.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-CurrentAzureSubscription.PassesValues.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-UserAgent.PassesValues.ps1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/VstsAzureHelpers_.psm1 delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/make.json delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/module.json delete mode 100644 arm-outputs/ps_modules/VstsAzureHelpers_/tsconfig.json delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/FindFunctions.ps1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/InputFunctions.ps1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/LegacyFindFunctions.ps1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/LocalizationFunctions.ps1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/LoggingCommandFunctions.ps1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/LongPathFunctions.ps1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Minimatch.dll delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/OutFunctions.ps1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/PSGetModuleInfo.xml delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/ServerOMFunctions.ps1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/de-de/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/en-US/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/es-es/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/fr-fr/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/it-IT/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ja-jp/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ko-KR/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ru-RU/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/zh-CN/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/zh-TW/resources.resjson delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/ToolFunctions.ps1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/TraceFunctions.ps1 delete mode 100644 arm-outputs/ps_modules/VstsTaskSdk/VstsTaskSdk.dll delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/VstsTaskSdk.psd1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/VstsTaskSdk.psm1 delete mode 100755 arm-outputs/ps_modules/VstsTaskSdk/lib.json diff --git a/arm-outputs/arm-outputs.ps1 b/arm-outputs/arm-outputs.ps1 index 342e6c8..28f1130 100644 --- a/arm-outputs/arm-outputs.ps1 +++ b/arm-outputs/arm-outputs.ps1 @@ -52,6 +52,6 @@ foreach ($key in $lastResourceGroupDeployment.Outputs.Keys) { } else { Write-Verbose "Updating VSTS variable '$key' to value '$value'" - Write-Host "##vso[task.setvariable variable=$prefix$key;$isSecret]$value" + Write-Host "##vso[task.setvariable variable=$prefix$key;isOutput=true;]$value" } } \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/ImportFunctions.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/ImportFunctions.ps1 deleted file mode 100644 index ea1649a..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/ImportFunctions.ps1 +++ /dev/null @@ -1,249 +0,0 @@ -function Import-AzureModule { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [ValidateSet('Azure', 'AzureRM')] - [string[]] $PreferredModule, - [string] $azurePsVersion, - [switch] $strict) - - Trace-VstsEnteringInvocation $MyInvocation - try { - Write-Verbose "Env:PSModulePath: '$env:PSMODULEPATH'" - if ($PreferredModule -contains 'Azure' -and $PreferredModule -contains 'AzureRM') { - # Attempt to import Azure and AzureRM. - $azure = (Import-FromModulePath -Classic:$true -azurePsVersion $azurePsVersion) -or (Import-FromSdkPath -Classic:$true -azurePsVersion $azurePsVersion) - $azureRM = (Import-FromModulePath -Classic:$false -azurePsVersion $azurePsVersion) -or (Import-FromSdkPath -Classic:$false -azurePsVersion $azurePsVersion) - if (!$azure -and !$azureRM) { - ThrowAzureModuleNotFoundException -azurePsVersion $azurePsVersion -modules "Azure, AzureRM" - } - } elseif ($PreferredModule -contains 'Azure') { - # Attempt to import Azure but fallback to AzureRM unless strict is specified. - if (!(Import-FromModulePath -Classic:$true -azurePsVersion $azurePsVersion) -and - !(Import-FromSdkPath -Classic:$true -azurePsVersion $azurePsVersion)) - { - if ($strict -eq $true) - { - ThrowAzureModuleNotFoundException -azurePsVersion $azurePsVersion -modules "Azure" - } - else - { - if(!(Import-FromModulePath -Classic:$false -azurePsVersion $azurePsVersion) -and - !(Import-FromSdkPath -Classic:$false -azurePsVersion $azurePsVersion)) - { - ThrowAzureModuleNotFoundException -azurePsVersion $azurePsVersion -modules "Azure, AzureRM" - } - } - } - } else { - # Attempt to import AzureRM but fallback to Azure unless strict is specified - if (!(Import-FromModulePath -Classic:$false -azurePsVersion $azurePsVersion) -and - !(Import-FromSdkPath -Classic:$false -azurePsVersion $azurePsVersion)) - { - if ($strict -eq $true) - { - ThrowAzureModuleNotFoundException -azurePsVersion $azurePsVersion -modules "AzureRM" - } - else - { - if(!(Import-FromModulePath -Classic:$true -azurePsVersion $azurePsVersion) -and - !(Import-FromSdkPath -Classic:$true -azurePsVersion $azurePsVersion)) - { - ThrowAzureModuleNotFoundException -azurePsVersion $azurePsVersion -modules "Azure, AzureRM" - } - } - } - } - - # Validate the Classic version. - $minimumVersion = [version]'0.8.10.1' - if ($script:azureModule -and $script:azureModule.Version -lt $minimumVersion) { - throw (Get-VstsLocString -Key AZ_RequiresMinVersion0 -ArgumentList $minimumVersion) - } - } finally { - Trace-VstsLeavingInvocation $MyInvocation - } -} - -function Import-FromModulePath { - [CmdletBinding()] - param( - [switch] $Classic, - [string] $azurePsVersion) - - Trace-VstsEnteringInvocation $MyInvocation - try { - # Determine which module to look for. - if ($Classic) { - $name = "Azure" - } else { - $name = "AzureRM" - } - - # Attempt to resolve the module. - Write-Verbose "Attempting to find the module '$name' from the module path." - if ($azurePsVersion) { - $module = Get-Module -Name $name -ListAvailable | Where-Object {$_.Version -eq $azurePsVersion} | Select-Object -First 1 - if (!$module) { - Write-Verbose "No module found with name: $name, version: $azurePsVersion" - return $false - } - } - else { - $module = Get-Module -Name $name -ListAvailable | Sort-Object Version -Descending | Select-Object -First 1 - $sdkVersion = Get-SdkVersion - if ((!$module) -or ($sdkVersion -and ($module.Version -lt [version]$sdkVersion))) { - return $false - } - } - - # Import the module. - Write-Host "##[command]Import-Module -Name $($module.Path) -Global" - $module = Import-Module -Name $module.Path -Global -PassThru -Force - Write-Verbose "Imported module version: $($module.Version)" - - if ($Classic) { - # Store the imported Azure module. - $script:azureModule = $module - } else { - # The AzureRM module was imported. - # Validate the AzureRM.profile module can be found. - # First check whether or not profile module is already loaded in the current session - $profileModule = Get-Module -Name AzureRm.Profile - if(!$profileModule) { - # otherwise check whether it is listed as a nested module in the azurerm module manifest ( this is valid till v 5.3.0 ) - $profileModule = (Get-Module -Name AzureRM).NestedModules | Where-Object { $_.Name.toLower() -eq "azurerm.profile" } - # otherwise check whether it is listed as a required module in the azurerm module manifest ( valid from v 5.4.0 and up ) - if(!$profileModule) { - $profileModule = (Get-Module -Name AzureRM).RequiredModules | Where-Object { $_.Name.toLower() -eq "azurerm.profile" } - } - if (!$profileModule) { - throw (Get-VstsLocString -Key AZ_AzureRMProfileModuleNotFound) - } - # Import and then store the AzureRM.profile module. - Write-Host "##[command]Import-Module -Name $($profileModule.Path) -Global" - $script:azureRMProfileModule = Import-Module -Name $profileModule.Path -Global -PassThru -Force - } else { - $script:azureRMProfileModule = $profileModule - } - Write-Verbose "Imported module version: $($script:azureRMProfileModule.Version)" - } - - return $true - } finally { - Trace-VstsLeavingInvocation $MyInvocation - } -} - -function Import-FromSdkPath { - [CmdletBinding()] - param([switch] $Classic, - [string] $azurePsVersion) - - Trace-VstsEnteringInvocation $MyInvocation - try { - if ($Classic) { - $partialPath = 'Microsoft SDKs\Azure\PowerShell\ServiceManagement\Azure\Azure.psd1' - } else { - $partialPath = 'Microsoft SDKs\Azure\PowerShell\ResourceManager\AzureResourceManager\AzureRM.Profile\AzureRM.Profile.psd1' - } - - foreach ($programFiles in @(${env:ProgramFiles(x86)}, $env:ProgramFiles)) { - if (!$programFiles) { - continue - } - - $path = [System.IO.Path]::Combine($programFiles, $partialPath) - Write-Verbose "Checking if path exists: $path" - if (Test-Path -LiteralPath $path -PathType Leaf) { - if ($azurePsVersion -and (-not ($(Get-SdkVersion) -eq $azurePsVersion))) { - continue - } - # Import the module. - Write-Host "##[command]Import-Module -Name $path -Global" - $module = Import-Module -Name $path -Global -PassThru -Force - Write-Verbose "Imported module version: $($module.Version)" - # Store the imported module. - if ($Classic) { - $script:azureModule = $module - } else { - # Import all the possible AzureRM submodules - Import-AzureRmSubmodulesFromSdkPath -path $path -programFiles $programFiles - $script:azureRMProfileModule = $module - } - return $true - } - } - - return $false - } finally { - Trace-VstsLeavingInvocation $MyInvocation - } -} - -function Get-SdkVersion { - Trace-VstsEnteringInvocation $MyInvocation - try { - $regKey = "HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" - $installedApplications = Get-ItemProperty -Path $regKey - $SdkVersion = ($installedApplications | Where-Object { $_.DisplayName -and $_.DisplayName.toLower().Contains("microsoft azure powershell") } | Select-Object -First 1).DisplayVersion - Write-Verbose "The installed sdk version is: $SdkVersion" - return $SdkVersion - } finally { - Trace-VstsLeavingInvocation $MyInvocation - } -} - -function Import-AzureRmSubmodulesFromSdkPath { - [CmdletBinding()] - param([string] $path, - [string] $programFiles) - try { - # Azure.Storage submodule needs to be imported first - $azureStorageModulePath = [System.IO.Path]::Combine($programFiles, "Microsoft SDKs\Azure\PowerShell\Storage\Azure.Storage\Azure.Storage.psd1") - Write-Host "##[command]Import-Module -Name $azureStorageModulePath -Global" - $azureStorageModule = Import-Module -Name $azureStorageModulePath -Global -PassThru -Force - Write-Verbose "Imported module version: $($azureStorageModule.Version)" - } - catch { - Write-Verbose $("The import of the Azure Storage module: \'$azureStorageModulePath\' failed with the error: $($_.Exception.Message)") - } - - # Try to import all the AzureRM submodules - $azureRmNestedModulesDirectory = Split-Path -Parent (Split-Path -Parent $path) - $azureRmNestedModules = Get-ChildItem -Path $azureRmNestedModulesDirectory -Directory - foreach ($azureRmNestedModule in $azureRmNestedModules) { - #AzureRM.Profile module has already been imported - if ($azureRmNestedModule.Name.toLower() -eq "azurerm.profile") { - continue; - } - $azureRmNestedModulePath = [System.IO.Path]::Combine($azureRmNestedModule.FullName, $azureRmNestedModule.Name + ".psd1") - try { - Write-Verbose "##[command]Import-Module -Name $azureRmNestedModulePath -Global" - $azureRmSubmodule = Import-Module -Name $azureRmNestedModulePath -Global -PassThru -Force - Write-Verbose "Imported module version: $($azureRmSubmodule.Version)" - } - catch { - Write-Verbose $("The import of the AzureRM submodule \'$azureRmNestedModulePath\' failed with the error: $($_.Exception.Message)") - } - } -} - -function ThrowAzureModuleNotFoundException { - param([string] $azurePsVersion, - [string] $modules) - Discover-AvailableAzureModules - if ($azurePsVersion) { - throw (Get-VstsLocString -Key AZ_ModuleNotFound -ArgumentList $azurePsVersion, $modules) - } else { - throw (Get-VstsLocString -Key AZ_ModuleNotFound -ArgumentList "Any version", $modules) - } -} - -function Discover-AvailableAzureModules { - $env:PSModulePath = $env:SystemDrive + "\Modules;" + $env:PSModulePath - Write-Host $(Get-VstsLocString -Key AZ_AvailableModules -ArgumentList "Azure") - Get-Module -Name Azure -ListAvailable | Select-Object Name,Version | ft - Write-Host $(Get-VstsLocString -Key AZ_AvailableModules -ArgumentList "AzureRM") - Get-Module -Name AzureRM -ListAvailable | Select-Object Name,Version | ft -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/InitializeFunctions.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/InitializeFunctions.ps1 deleted file mode 100644 index b309bbe..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/InitializeFunctions.ps1 +++ /dev/null @@ -1,623 +0,0 @@ -function Add-Certificate { - [CmdletBinding()] - param( - [Parameter(Mandatory=$true)] $Endpoint, - [Switch] $ServicePrincipal - ) - - # Add the certificate to the cert store. - $certificate = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2 - - if ($ServicePrincipal) { - $pemFileContent = $Endpoint.Auth.Parameters.ServicePrincipalCertificate - $pfxFilePath, $pfxFilePassword = ConvertTo-Pfx -pemFileContent $pemFileContent - - $certificate.Import($pfxFilePath, $pfxFilePassword, [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet) - } - else { - $bytes = [System.Convert]::FromBase64String($Endpoint.Auth.Parameters.Certificate) - $certificate.Import($bytes) - } - - $store = New-Object System.Security.Cryptography.X509Certificates.X509Store( - ([System.Security.Cryptography.X509Certificates.StoreName]::My), - ([System.Security.Cryptography.X509Certificates.StoreLocation]::CurrentUser)) - $store.Open(([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite)) - $store.Add($certificate) - $store.Close() - - #store the thumbprint in a global variable which will be used to remove the certificate later on - $script:Endpoint_Authentication_Certificate = $certificate.Thumbprint - Write-Verbose "Added certificate to the certificate store." - return $certificate -} - -function Format-Splat { - [CmdletBinding()] - param([Parameter(Mandatory = $true)][hashtable]$Hashtable) - - # Collect the parameters (names and values) in an array. - $parameters = foreach ($key in $Hashtable.Keys) { - $value = $Hashtable[$key] - # If the value is a bool, format the parameter as a switch (ending with ':'). - if ($value -is [bool]) { "-$($key):" } else { "-$key" } - $value - } - - $OFS = " " - "$parameters" # String join the array. -} - -function Initialize-AzureSubscription { - [CmdletBinding()] - param( - [Parameter(Mandatory=$true)] - $Endpoint, - [Parameter(Mandatory=$false)] - [string]$StorageAccount) - - #Set UserAgent for Azure Calls - Set-UserAgent - - # Clear context only for Azure RM - if ($Endpoint.Auth.Scheme -eq 'ServicePrincipal' -and !$script:azureModule -and (Get-Command -Name "Clear-AzureRmContext" -ErrorAction "SilentlyContinue")) { - Write-Host "##[command]Clear-AzureRmContext -Scope Process" - $null = Clear-AzureRmContext -Scope Process - Write-Host "##[command]Clear-AzureRmContext -Scope CurrentUser -Force -ErrorAction SilentlyContinue" - $null = Clear-AzureRmContext -Scope CurrentUser -Force -ErrorAction SilentlyContinue - } - - $environmentName = "AzureCloud" - if($Endpoint.Data.Environment) { - $environmentName = $Endpoint.Data.Environment - if($environmentName -eq "AzureStack") - { - Add-AzureStackAzureRmEnvironment -endpoint $Endpoint -name "AzureStack" - } - } - - $scopeLevel = "Subscription" - - If ($Endpoint.PSObject.Properties['Data']) - { - If ($Endpoint.Data.PSObject.Properties['scopeLevel']) - { - $scopeLevel = $Endpoint.Data.scopeLevel - } - } - - if ($Endpoint.Auth.Scheme -eq 'Certificate') { - # Certificate is only supported for the Azure module. - if (!$script:azureModule) { - throw (Get-VstsLocString -Key AZ_CertificateAuthNotSupported) - } - - # Add the certificate to the cert store. - $certificate = Add-Certificate -Endpoint $Endpoint - - # Setup the additional parameters. - $additional = @{ } - if ($StorageAccount) { - $additional['CurrentStorageAccountName'] = $StorageAccount - } - - # Set the subscription. - Write-Host "##[command]Set-AzureSubscription -SubscriptionName $($Endpoint.Data.SubscriptionName) -SubscriptionId $($Endpoint.Data.SubscriptionId) -Certificate ******** -Environment $environmentName $(Format-Splat $additional)" - Set-AzureSubscription -SubscriptionName $Endpoint.Data.SubscriptionName -SubscriptionId $Endpoint.Data.SubscriptionId -Certificate $certificate -Environment $environmentName @additional - Set-CurrentAzureSubscription -SubscriptionId $Endpoint.Data.SubscriptionId -StorageAccount $StorageAccount - } elseif ($Endpoint.Auth.Scheme -eq 'UserNamePassword') { - $psCredential = New-Object System.Management.Automation.PSCredential( - $Endpoint.Auth.Parameters.UserName, - (ConvertTo-SecureString $Endpoint.Auth.Parameters.Password -AsPlainText -Force)) - - # Add account (Azure). - if ($script:azureModule) { - try { - Write-Host "##[command]Add-AzureAccount -Credential $psCredential" - $null = Add-AzureAccount -Credential $psCredential - } catch { - # Provide an additional, custom, credentials-related error message. - Write-VstsTaskError -Message $_.Exception.Message - Assert-TlsError -exception $_.Exception - throw (New-Object System.Exception((Get-VstsLocString -Key AZ_CredentialsError), $_.Exception)) - } - } - - # Add account (AzureRM). - if ($script:azureRMProfileModule) { - try { - if (Get-Command -Name "Add-AzureRmAccount" -ErrorAction "SilentlyContinue") { - Write-Host "##[command] Add-AzureRMAccount -Credential $psCredential" - $null = Add-AzureRMAccount -Credential $psCredential - } else { - Write-Host "##[command] Connect-AzureRMAccount -Credential $psCredential" - $null = Connect-AzureRMAccount -Credential $psCredential - } - } catch { - # Provide an additional, custom, credentials-related error message. - Write-VstsTaskError -Message $_.Exception.Message - Assert-TlsError -exception $_.Exception - throw (New-Object System.Exception((Get-VstsLocString -Key AZ_CredentialsError), $_.Exception)) - } - } - - # Select subscription (Azure). - if ($script:azureModule) { - Set-CurrentAzureSubscription -SubscriptionId $Endpoint.Data.SubscriptionId -StorageAccount $StorageAccount - } - - # Select subscription (AzureRM). - if ($script:azureRMProfileModule) { - Set-CurrentAzureRMSubscription -SubscriptionId $Endpoint.Data.SubscriptionId - } - } - elseif ($Endpoint.Auth.Scheme -eq 'ServicePrincipal') { - - if ($Endpoint.Auth.Parameters.AuthenticationType -eq 'SPNCertificate') { - $servicePrincipalCertificate = Add-Certificate -Endpoint $Endpoint -ServicePrincipal - } - else { - $psCredential = New-Object System.Management.Automation.PSCredential( - $Endpoint.Auth.Parameters.ServicePrincipalId, - (ConvertTo-SecureString $Endpoint.Auth.Parameters.ServicePrincipalKey -AsPlainText -Force)) - } - - if ($script:azureModule -and $script:azureModule.Version -lt ([version]'0.9.9')) { - # Service principals arent supported from 0.9.9 and greater in the Azure module. - try { - Write-Host "##[command]Add-AzureAccount -ServicePrincipal -Tenant $($Endpoint.Auth.Parameters.TenantId) -Credential $psCredential" - $null = Add-AzureAccount -ServicePrincipal -Tenant $Endpoint.Auth.Parameters.TenantId -Credential $psCredential - } catch { - # Provide an additional, custom, credentials-related error message. - Write-VstsTaskError -Message $_.Exception.Message - Assert-TlsError -exception $_.Exception - throw (New-Object System.Exception((Get-VstsLocString -Key AZ_ServicePrincipalError), $_.Exception)) - } - - Set-CurrentAzureSubscription -SubscriptionId $Endpoint.Data.SubscriptionId -StorageAccount $StorageAccount - } elseif ($script:azureModule) { - # Throw if >=0.9.9 Azure. - throw (Get-VstsLocString -Key "AZ_ServicePrincipalAuthNotSupportedAzureVersion0" -ArgumentList $script:azureModule.Version) - } else { - # Else, this is AzureRM. - try { - if (Get-Command -Name "Add-AzureRmAccount" -ErrorAction "SilentlyContinue") { - if (CmdletHasMember -cmdlet "Add-AzureRMAccount" -memberName "EnvironmentName") { - - if ($Endpoint.Auth.Parameters.AuthenticationType -eq "SPNCertificate") { - Write-Host "##[command]Add-AzureRMAccount -ServicePrincipal -Tenant $($Endpoint.Auth.Parameters.TenantId) -CertificateThumbprint ****** -ApplicationId $($Endpoint.Auth.Parameters.ServicePrincipalId) -EnvironmentName $environmentName" - $null = Add-AzureRmAccount -ServicePrincipal -Tenant $Endpoint.Auth.Parameters.TenantId -CertificateThumbprint $servicePrincipalCertificate.Thumbprint -ApplicationId $Endpoint.Auth.Parameters.ServicePrincipalId -EnvironmentName $environmentName - } - else { - Write-Host "##[command]Add-AzureRMAccount -ServicePrincipal -Tenant $($Endpoint.Auth.Parameters.TenantId) -Credential $psCredential -EnvironmentName $environmentName" - $null = Add-AzureRMAccount -ServicePrincipal -Tenant $Endpoint.Auth.Parameters.TenantId -Credential $psCredential -EnvironmentName $environmentName - } - } - else { - if ($Endpoint.Auth.Parameters.AuthenticationType -eq "SPNCertificate") { - Write-Host "##[command]Add-AzureRMAccount -ServicePrincipal -Tenant $($Endpoint.Auth.Parameters.TenantId) -CertificateThumbprint ****** -ApplicationId $($Endpoint.Auth.Parameters.ServicePrincipalId) -Environment $environmentName" - $null = Add-AzureRmAccount -ServicePrincipal -Tenant $Endpoint.Auth.Parameters.TenantId -CertificateThumbprint $servicePrincipalCertificate.Thumbprint -ApplicationId $Endpoint.Auth.Parameters.ServicePrincipalId -Environment $environmentName - } - else { - Write-Host "##[command]Add-AzureRMAccount -ServicePrincipal -Tenant $($Endpoint.Auth.Parameters.TenantId) -Credential $psCredential -Environment $environmentName" - $null = Add-AzureRMAccount -ServicePrincipal -Tenant $Endpoint.Auth.Parameters.TenantId -Credential $psCredential -Environment $environmentName - } - } - } - else { - if ($Endpoint.Auth.Parameters.AuthenticationType -eq "SPNCertificate") { - Write-Host "##[command]Connect-AzureRMAccount -ServicePrincipal -Tenant $($Endpoint.Auth.Parameters.TenantId) -CertificateThumbprint ****** -ApplicationId $($Endpoint.Auth.Parameters.ServicePrincipalId) -Environment $environmentName" - $null = Connect-AzureRmAccount -ServicePrincipal -Tenant $Endpoint.Auth.Parameters.TenantId -CertificateThumbprint $servicePrincipalCertificate.Thumbprint -ApplicationId $Endpoint.Auth.Parameters.ServicePrincipalId -Environment $environmentName - } - else { - Write-Host "##[command]Connect-AzureRMAccount -ServicePrincipal -Tenant $($Endpoint.Auth.Parameters.TenantId) -Credential $psCredential -Environment $environmentName" - $null = Connect-AzureRMAccount -ServicePrincipal -Tenant $Endpoint.Auth.Parameters.TenantId -Credential $psCredential -Environment $environmentName - } - } - } - catch { - # Provide an additional, custom, credentials-related error message. - Write-VstsTaskError -Message $_.Exception.Message - Assert-TlsError -exception $_.Exception - throw (New-Object System.Exception((Get-VstsLocString -Key AZ_ServicePrincipalError), $_.Exception)) - } - - if($scopeLevel -eq "Subscription") - { - Set-CurrentAzureRMSubscription -SubscriptionId $Endpoint.Data.SubscriptionId -TenantId $Endpoint.Auth.Parameters.TenantId - } - } - } elseif ($Endpoint.Auth.Scheme -eq 'ManagedServiceIdentity') { - $accountId = $env:BUILD_BUILDID - if($env:RELEASE_RELEASEID){ - $accountId = $env:RELEASE_RELEASEID - } - $date = Get-Date -Format o - $accountId = -join($accountId, "-", $date) - $access_token = Get-MsiAccessToken $Endpoint 0 0 - try { - Write-Host "##[command]Add-AzureRmAccount -AccessToken ****** -AccountId $accountId " - $null = Add-AzureRmAccount -AccessToken $access_token -AccountId $accountId - } catch { - # Provide an additional, custom, credentials-related error message. - Write-VstsTaskError -Message $_.Exception.Message - throw (New-Object System.Exception((Get-VstsLocString -Key AZ_MsiFailure), $_.Exception)) - } - - Set-CurrentAzureRMSubscription -SubscriptionId $Endpoint.Data.SubscriptionId -TenantId $Endpoint.Auth.Parameters.TenantId - }else { - throw (Get-VstsLocString -Key AZ_UnsupportedAuthScheme0 -ArgumentList $Endpoint.Auth.Scheme) - } -} - - -# Get the Bearer Access Token from the Endpoint -function Get-MsiAccessToken { - [CmdletBinding()] - param([Parameter(Mandatory=$true)] $endpoint, - [Parameter(Mandatory=$true)] $retryCount, - [Parameter(Mandatory=$true)] $timeToWait) - - $msiClientId = ""; - if($endpoint.Data.msiClientId){ - $msiClientId = "&client_id=" + $endpoint.Data.msiClientId; - } - $tenantId = $endpoint.Auth.Parameters.TenantId - - # Prepare contents for GET - $method = "GET" - $apiVersion = "2018-02-01"; - $authUri = "http://169.254.169.254/metadata/identity/oauth2/token?api-version=" + $apiVersion + "&resource=" + $endpoint.Url + $msiClientId; - - # Call Rest API to fetch AccessToken - Write-Verbose "Fetching Access Token For MSI" - - try - { - $retryLimit = 5; - $proxyUri = Get-ProxyUri $authUri - if ($proxyUri -eq $null) - { - Write-Verbose "No proxy settings" - $response = Invoke-WebRequest -Uri $authUri -Method $method -Headers @{Metadata="true"} -UseBasicParsing - } - else - { - Write-Verbose "Using Proxy settings" - $response = Invoke-WebRequest -Uri $authUri -Method $method -Headers @{Metadata="true"} -UseDefaultCredentials -Proxy $proxyUri -ProxyUseDefaultCredentials -UseBasicParsing - } - - # Action on the based of response - if(($response.StatusCode -eq 429) -or ($response.StatusCode -eq 500)) - { - if($retryCount -lt $retryLimit) - { - $retryCount += 1 - $waitedTime = 2000 + $timeToWait * 2 - Start-Sleep -m $waitedTime - Get-MsiAccessToken $endpoint $retryCount $waitedTime - } - else - { - throw (Get-VstsLocString -Key AZ_MsiAccessTokenFetchFailure -ArgumentList $response.StatusCode, $response.StatusDescription) - } - } - elseif ($response.StatusCode -eq 200) - { - $accessToken = $response.Content | ConvertFrom-Json - return $accessToken.access_token - } - else - { - throw (Get-VstsLocString -Key AZ_MsiAccessNotConfiguredProperlyFailure -ArgumentList $response.StatusCode, $response.StatusDescription) - } - - } - catch - { - $exceptionMessage = $_.Exception.Message.ToString() - Write-Verbose "ExceptionMessage: $exceptionMessage (in function: Get-MsiAccessToken)" - if($exceptionMessage -match "400") - { - throw (Get-VstsLocString -Key AZ_MsiAccessNotConfiguredProperlyFailure -ArgumentList $response.StatusCode, $response.StatusDescription) - } - else - { - throw $_.Exception - } - } -} - - -function Set-CurrentAzureSubscription { - [CmdletBinding()] - param( - [Parameter(Mandatory=$true)] - [string]$SubscriptionId, - [string]$StorageAccount) - - $additional = @{ } - if ($script:azureModule.Version -lt ([version]'0.8.15')) { - $additional['Default'] = $true # The Default switch is required prior to 0.8.15. - } - - Write-Host "##[command]Select-AzureSubscription -SubscriptionId $SubscriptionId $(Format-Splat $additional)" - $null = Select-AzureSubscription -SubscriptionId $SubscriptionId @additional - if ($StorageAccount) { - Write-Host "##[command]Set-AzureSubscription -SubscriptionId $SubscriptionId -CurrentStorageAccountName $StorageAccount" - Set-AzureSubscription -SubscriptionId $SubscriptionId -CurrentStorageAccountName $StorageAccount - } -} - -function Set-CurrentAzureRMSubscription { - [CmdletBinding()] - param( - [Parameter(Mandatory=$true)] - [string]$SubscriptionId, - [string]$TenantId) - - $additional = @{ } - if ($TenantId) { $additional['TenantId'] = $TenantId } - - if (Get-Command -Name "Select-AzureRmSubscription" -ErrorAction "SilentlyContinue") { - Write-Host "##[command] Select-AzureRMSubscription -SubscriptionId $SubscriptionId $(Format-Splat $additional)" - $null = Select-AzureRMSubscription -SubscriptionId $SubscriptionId @additional - } - else { - Write-Host "##[command] Set-AzureRmContext -SubscriptionId $SubscriptionId $(Format-Splat $additional)" - $null = Set-AzureRmContext -SubscriptionId $SubscriptionId @additional - } -} - -function Set-UserAgent { - [CmdletBinding()] - param() - - $userAgent = Get-VstsTaskVariable -Name AZURE_HTTP_USER_AGENT - if ($userAgent) { - Set-UserAgent_Core -UserAgent $userAgent - } -} - -function Set-UserAgent_Core { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$UserAgent) - - Trace-VstsEnteringInvocation $MyInvocation - try { - [Microsoft.Azure.Common.Authentication.AzureSession]::ClientFactory.AddUserAgent($UserAgent) - } catch { - Write-Verbose "Set-UserAgent failed with exception message: $_.Exception.Message" - } finally { - Trace-VstsLeavingInvocation $MyInvocation - } -} - -function CmdletHasMember { - [CmdletBinding()] - param( - [Parameter(Mandatory=$true)] - [string]$cmdlet, - [Parameter(Mandatory=$true)] - [string]$memberName) - try{ - $hasMember = (gcm $cmdlet).Parameters.Keys.Contains($memberName) - return $hasMember - } - catch - { - return $false; - } -} - -<# - Adds Azure Stack environment to use with AzureRM command-lets when targeting Azure Stack -#> -function Add-AzureStackAzureRmEnvironment { - param ( - [Parameter(mandatory=$true, HelpMessage="The Admin ARM endpoint of the Azure Stack Environment")] - $Endpoint, - [parameter(mandatory=$true, HelpMessage="Azure Stack environment name for use with AzureRM commandlets")] - [string] $Name - ) - - $EndpointURI = $Endpoint.Url.TrimEnd("/") - - $Domain = "" - try { - $uriendpoint = [System.Uri] $EndpointURI - $i = $EndpointURI.IndexOf('.') - $Domain = ($EndpointURI.Remove(0,$i+1)).TrimEnd('/') - } - catch { - Write-Error (Get-VstsLocString -Key AZ_InvalidARMEndpoint) - } - - $ResourceManagerEndpoint = $EndpointURI - $stackdomain = $Domain - - $AzureKeyVaultDnsSuffix="vault.$($stackdomain)".ToLowerInvariant() - $AzureKeyVaultServiceEndpointResourceId= $("https://vault.$stackdomain".ToLowerInvariant()) - $StorageEndpointSuffix = ($stackdomain).ToLowerInvariant() - - # Check if endpoint data contains required data. - if($Endpoint.data.GraphUrl -eq $null) - { - $azureStackEndpointUri = $EndpointURI.ToString() + "/metadata/endpoints?api-version=2015-01-01" - $proxyUri = Get-ProxyUri $azureStackEndpointUri - - Write-Verbose "Retrieving endpoints from the $ResourceManagerEndpoint" - if ($proxyUri -eq $null) - { - Write-Verbose "No proxy settings" - $endpointData = Invoke-RestMethod -Uri $azureStackEndpointUri -Method Get -ErrorAction Stop - } - else - { - Write-Verbose "Using Proxy settings" - $endpointData = Invoke-RestMethod -Uri $azureStackEndpointUri -Method Get -Proxy $proxyUri -ErrorAction Stop - } - - if ($endpointData) - { - $authenticationData = $endpointData.authentication; - if ($authenticationData) - { - $loginEndpoint = $authenticationData.loginEndpoint - if($loginEndpoint) - { - $aadAuthorityEndpoint = $loginEndpoint - $activeDirectoryEndpoint = $loginEndpoint.TrimEnd('/') + "/" - } - - $audiences = $authenticationData.audiences - if($audiences.Count -gt 0) - { - $activeDirectoryServiceEndpointResourceId = $audiences[0] - } - } - - $graphEndpoint = $endpointData.graphEndpoint - $graphAudience = $endpointData.graphEndpoint - $galleryEndpoint = $endpointData.galleryEndpoint - } - } - else - { - $aadAuthorityEndpoint = $Endpoint.data.ActiveDirectoryAuthority.Trim("/") + "/" - $graphEndpoint = $Endpoint.data.graphUrl - $graphAudience = $Endpoint.data.graphUrl - $activeDirectoryEndpoint = $Endpoint.data.ActiveDirectoryAuthority.Trim("/") + "/" - $activeDirectoryServiceEndpointResourceId = $Endpoint.data.activeDirectoryServiceEndpointResourceId - $galleryEndpoint = $Endpoint.data.galleryUrl - } - - $azureEnvironmentParams = @{ - Name = $Name - ActiveDirectoryEndpoint = $activeDirectoryEndpoint - ActiveDirectoryServiceEndpointResourceId = $activeDirectoryServiceEndpointResourceId - ResourceManagerEndpoint = $ResourceManagerEndpoint - GalleryEndpoint = $galleryEndpoint - GraphEndpoint = $graphEndpoint - GraphAudience = $graphAudience - StorageEndpointSuffix = $StorageEndpointSuffix - AzureKeyVaultDnsSuffix = $AzureKeyVaultDnsSuffix - AzureKeyVaultServiceEndpointResourceId = $AzureKeyVaultServiceEndpointResourceId - EnableAdfsAuthentication = $aadAuthorityEndpoint.TrimEnd("/").EndsWith("/adfs", [System.StringComparison]::OrdinalIgnoreCase) - } - - $armEnv = Get-AzureRmEnvironment -Name $name - if($armEnv -ne $null) { - Write-Verbose "Updating AzureRm environment $name" -Verbose - - if (CmdletHasMember -cmdlet Remove-AzureRmEnvironment -memberName Force) { - Remove-AzureRmEnvironment -Name $name -Force | Out-Null - } - else { - Remove-AzureRmEnvironment -Name $name | Out-Null - } - } - else { - Write-Verbose "Adding AzureRm environment $name" -Verbose - } - - try { - return Add-AzureRmEnvironment @azureEnvironmentParams - } - catch { - Assert-TlsError -exception $_.Exception - throw - } -} - -function Get-ProxyUri -{ - param([String] [Parameter(Mandatory=$true)] $serverUrl) - - $proxyUri = [System.Uri]($env:AGENT_PROXYURL) - Write-Verbose -Verbose ("Reading proxy from the AGENT_PROXYURL environment variable. Proxy url specified={0}" -f $proxyUri.OriginalString) - - if($proxyUri -eq $null) - { - $proxy = [System.Net.WebRequest]::GetSystemWebProxy() - $proxyUri = $proxy.GetProxy("$serverUrl") - Write-Verbose -Verbose ("Reading proxy from IE. Proxy url specified={0}" -f $proxyUri.OriginalString) - } - - if($serverUrl -eq $null -or ([System.Uri]$serverUrl).Host -eq $proxyUri.Host) - { - return $null - } - - return $proxyUri -} - -function ConvertTo-Pfx { - param( - [String][Parameter(Mandatory = $true)] $pemFileContent - ) - - if ($ENV:Agent_TempDirectory) { - $pemFilePath = "$ENV:Agent_TempDirectory\clientcertificate.pem" - $pfxFilePath = "$ENV:Agent_TempDirectory\clientcertificate.pfx" - $pfxPasswordFilePath = "$ENV:Agent_TempDirectory\clientcertificatepassword.txt" - } - else { - $pemFilePath = "$ENV:System_DefaultWorkingDirectory\clientcertificate.pem" - $pfxFilePath = "$ENV:System_DefaultWorkingDirectory\clientcertificate.pfx" - $pfxPasswordFilePath = "$ENV:System_DefaultWorkingDirectory\clientcertificatepassword.txt" - } - - # save the PEM certificate to a PEM file - Set-Content -Path $pemFilePath -Value $pemFileContent - - # use openssl to convert the PEM file to a PFX file - $pfxFilePassword = [System.Guid]::NewGuid().ToString() - Set-Content -Path $pfxPasswordFilePath -Value $pfxFilePassword -NoNewline - - $openSSLExePath = "$PSScriptRoot\openssl\openssl.exe" - $openSSLArgs = "pkcs12 -export -in $pemFilePath -out $pfxFilePath -password file:`"$pfxPasswordFilePath`"" - - Invoke-VstsTool -FileName $openSSLExePath -Arguments $openSSLArgs -RequireExitCodeZero - - return $pfxFilePath, $pfxFilePassword -} - -function Remove-EndpointSecrets { - # remove any certificate files - if (Test-Path -Path "$ENV:System_DefaultWorkingDirectory\clientcertificate.pem") { - Write-Verbose "Removing file $ENV:System_DefaultWorkingDirectory\clientcertificate.pem" - Remove-Item -Path "$ENV:System_DefaultWorkingDirectory\clientcertificate.pem" - } - - if (Test-Path -Path "$ENV:System_DefaultWorkingDirectory\clientcertificate.pfx") { - Write-Verbose "Removing file $ENV:System_DefaultWorkingDirectory\clientcertificate.pfx" - Remove-Item -Path "$ENV:System_DefaultWorkingDirectory\clientcertificate.pfx" - } - - if (Test-Path -Path "$ENV:System_DefaultWorkingDirectory\clientcertificatepassword.txt") { - Write-Verbose "Removing file $ENV:System_DefaultWorkingDirectory\clientcertificatepassword.txt" - Remove-Item -Path "$ENV:System_DefaultWorkingDirectory\clientcertificatepassword.txt" - } - - if ($script:Endpoint_Authentication_Certificate) { - # remove the certificate from certificate store - $certificateStore = New-Object System.Security.Cryptography.X509Certificates.X509Store( - ([System.Security.Cryptography.X509Certificates.StoreName]::My), - ([System.Security.Cryptography.X509Certificates.StoreLocation]::CurrentUser)) - - $certificateStore.Open(([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite)) - - $certificates = $certificateStore.Certificates.Find([System.Security.Cryptography.X509Certificates.X509FindType]::FindByThumbprint, $script:Endpoint_Authentication_Certificate, $false) - - foreach ($certificate in $certificates) { - $certificateStore.Remove($certificate) - } - - $certificateStore.Close() - - Write-Verbose "Removed certificate from certificate store." - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/de-de/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/de-de/resources.resjson deleted file mode 100644 index ba8863f..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/de-de/resources.resjson +++ /dev/null @@ -1,12 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "Das Modul \"AzureRM.Profile\" wurde nicht gefunden. Das Modul \"AzureRM\" ist ggf. nicht vollständig installiert. Das Ausführen der folgenden PowerShell-Befehle aus einer Sitzung mit erhöhten Rechten behebt dieses Problem möglicherweise: \"Import-Module AzureRM\", \"Install-AzureRM\".", - "loc.messages.AZ_CertificateAuthNotSupported": "Zertifikatbasierte Authentifizierung wird nicht unterstützt. Das Azure PowerShell-Modul wurde nicht gefunden.", - "loc.messages.AZ_CredentialsError": "Fehler mit den für die Bereitstellung verwendeten Azure-Anmeldeinformationen.", - "loc.messages.AZ_ModuleNotFound": "Das Azure-Modul (\"{0}\") und das AzureRM-Modul (\"{0}\") wurden nicht gefunden. Wenn das Modul vor Kurzem installiert wurde, versuchen Sie es nach dem Neustart des VSTS-Aufgaben-Agents noch mal.", - "loc.messages.AZ_RequiresMinVersion0": "Die erforderliche Mindestversion ({0}) des Azure PowerShell-Moduls ist nicht installiert.", - "loc.messages.AZ_ServicePrincipalError": "Fehler im für die Bereitstellung verwendeten Dienstprinzipal.", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "Dienstprinzipalauthentifizierung wird in Version \"{0}\" des Azure-Moduls nicht unterstützt.", - "loc.messages.AZ_UnsupportedAuthScheme0": "Nicht unterstütztes Authentifizierungsschema \"{0}\" für den Azure-Endpunkt.", - "loc.messages.AZ_AvailableModules": "Die Liste verfügbarer {0}-Module:", - "loc.messages.AZ_InvalidARMEndpoint": "Der angegebene AzureRM-Endpunkt ist ungültig." -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/en-US/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/en-US/resources.resjson deleted file mode 100644 index e7b175c..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/en-US/resources.resjson +++ /dev/null @@ -1,15 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "Module 'AzureRM.Profile' not found. The 'AzureRM' module may not be fully installed. Running the following PowerShell commands from an elevated session may resolve the issue: Import-Module AzureRM ; Install-AzureRM", - "loc.messages.AZ_CertificateAuthNotSupported": "Certificate based authentication is not supported. Azure PowerShell module is not found.", - "loc.messages.AZ_CredentialsError": "There was an error with the Azure credentials used for the deployment.", - "loc.messages.AZ_ModuleNotFound": "Could not find the modules: '{1}' with Version: '{0}'. If the module was recently installed, retry after restarting the VSTS task agent.", - "loc.messages.AZ_RequiresMinVersion0": "The required minimum version ({0}) of the Azure PowerShell module is not installed.", - "loc.messages.AZ_ServicePrincipalError": "There was an error with the service principal used for the deployment.", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "Service principal authentication is not supported in version '{0}' of the Azure module.", - "loc.messages.AZ_UnsupportedAuthScheme0": "Unsupported authentication scheme '{0}' for Azure endpoint.", - "loc.messages.AZ_AvailableModules": "The list of available {0} modules:", - "loc.messages.AZ_InvalidARMEndpoint": "Specified AzureRM endpoint is invalid.", - "loc.messages.AZ_MsiAccessNotConfiguredProperlyFailure": "Could not fetch access token for Managed Service Principal. Please configure Managed Service Identity (MSI) for virtual machine 'https://aka.ms/azure-msi-docs'. Status code: '{0}', status message: {1}", - "loc.messages.AZ_MsiAccessTokenFetchFailure": "Could not fetch access token for Managed Service Principal. Status code: '{0}', status message: {1}", - "loc.messages.AZ_MsiFailure": "Could not fetch access token for Managed Service Principal. {0}" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/es-es/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/es-es/resources.resjson deleted file mode 100644 index 4c1dc0f..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/es-es/resources.resjson +++ /dev/null @@ -1,12 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "No se encuentra el módulo 'AzureRM.Profile'. Puede que el módulo 'AzureRM' no esté instalado completamente. Puede resolver el problema ejecutando los siguientes comandos de PowerShell en una sesión con permisos elevados: Import-Module AzureRM ; Install-AzureRM", - "loc.messages.AZ_CertificateAuthNotSupported": "No se admite la autenticación basada en certificados. No se encuentra el módulo Azure PowerShell.", - "loc.messages.AZ_CredentialsError": "Hubo un error con las credenciales de Azure usadas para la implementación.", - "loc.messages.AZ_ModuleNotFound": "No se encuentran ni el módulo de Azure ({0}) ni el módulo de AzureRM ({0}). Si el módulo se instaló recientemente, vuelva a intentarlo después de reiniciar el agente de tareas de VSTS.", - "loc.messages.AZ_RequiresMinVersion0": "No está instalada la versión mínima necesaria ({0}) del módulo Azure PowerShell.", - "loc.messages.AZ_ServicePrincipalError": "Error con la entidad de servicio que se usó para la implementación.", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "No se admite autenticación de entidad de servicio en la versión '{0}' del módulo Azure.", - "loc.messages.AZ_UnsupportedAuthScheme0": "Esquema de autenticación no admitido '{0}' para el punto de conexión de Azure.", - "loc.messages.AZ_AvailableModules": "Lista de módulos de {0} disponibles:", - "loc.messages.AZ_InvalidARMEndpoint": "El punto de conexión de AzureRM especificado no es válido." -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/fr-fr/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/fr-fr/resources.resjson deleted file mode 100644 index 94b6426..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/fr-fr/resources.resjson +++ /dev/null @@ -1,12 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "Module 'AzureRM.Profile' introuvable. Le module 'AzureRM' n'est peut-être pas complètement installé. L'exécution des commandes PowerShell suivantes à partir d'une session avec élévation de privilèges peut éventuellement résoudre le problème : Import-Module AzureRM ; Install-AzureRM", - "loc.messages.AZ_CertificateAuthNotSupported": "L'authentification par certificat n'est pas prise en charge. Le module Azure PowerShell est introuvable.", - "loc.messages.AZ_CredentialsError": "Une erreur s'est produite durant l'utilisation des informations d'identification Azure pour le déploiement.", - "loc.messages.AZ_ModuleNotFound": "Les modules Azure ('{0}') et AzureRM ('{0}') sont introuvables. Si le module a été installé récemment, réessayez l'opération après avoir redémarré l'agent de tâche VSTS.", - "loc.messages.AZ_RequiresMinVersion0": "La version minimale nécessaire ({0}) pour le module Azure PowerShell n'est pas installée.", - "loc.messages.AZ_ServicePrincipalError": "Erreur liée au principal du service utilisé pour le déploiement.", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "L'authentification du principal du service n'est pas prise en charge dans la version '{0}' du module Azure.", - "loc.messages.AZ_UnsupportedAuthScheme0": "Modèle d'authentification '{0}' non pris en charge pour le point de terminaison Azure.", - "loc.messages.AZ_AvailableModules": "Liste des modules {0} disponibles :", - "loc.messages.AZ_InvalidARMEndpoint": "Le point de terminaison AzureRM spécifié est non valide." -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/it-IT/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/it-IT/resources.resjson deleted file mode 100644 index f0a8f0e..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/it-IT/resources.resjson +++ /dev/null @@ -1,12 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "Il modulo 'AzureRM.Profile' non è stato trovato. È possibile che il modulo 'AzureRM' non sia completamente installato. Per risolvere il problema, provare a eseguire i comandi di PowerShell seguenti da una sessione con privilegi elevati: Import-Module AzureRM; Install-AzureRM", - "loc.messages.AZ_CertificateAuthNotSupported": "L'autenticazione basata su certificato non è supportata. Il modulo Azure PowerShell non è stato trovato.", - "loc.messages.AZ_CredentialsError": "Si è verificato un errore con le credenziali di Azure usate per la distribuzione.", - "loc.messages.AZ_ModuleNotFound": "Non è stato trovato né il modulo Azure ('{0}') né quello AzureRM ('{0}'). Se il modulo è stato installato di recente, riprovare dopo aver riavviato l'agente delle attività VSTS.", - "loc.messages.AZ_RequiresMinVersion0": "La versione minima richiesta ({0}) del modulo Azure PowerShell non è installata.", - "loc.messages.AZ_ServicePrincipalError": "Si è verificato un errore con l'entità servizio usata per la distribuzione.", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "L'autenticazione basata su entità servizio non è supportata nella versione '{0}' del modulo Azure.", - "loc.messages.AZ_UnsupportedAuthScheme0": "Lo schema di autenticazione '{0}' non è supportato per l'endpoint di Azure.", - "loc.messages.AZ_AvailableModules": "Elenco dei moduli {0} disponibili:", - "loc.messages.AZ_InvalidARMEndpoint": "L'endpoint di AzureRm specificato non è valido." -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ja-jp/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ja-jp/resources.resjson deleted file mode 100644 index 6f3e406..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ja-jp/resources.resjson +++ /dev/null @@ -1,12 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "モジュール 'AzureRM.Profile' が見つかりません。'AzureRM' モジュールが完全にインストールされていない可能性があります。管理者特権のセッションから次の PowerShell コマンドを実行すると、問題が解決する場合があります。Import-Module AzureRM ; Install-AzureRM", - "loc.messages.AZ_CertificateAuthNotSupported": "証明書に基づく認証はサポートされていません。Azure PowerShell モジュールが見つかりません。", - "loc.messages.AZ_CredentialsError": "配置に使用した Azure 資格情報にエラーがありました。", - "loc.messages.AZ_ModuleNotFound": "Azure モジュール ('{0}') も AzureRM モジュール ('{0}') も見つかりませんでした。モジュールを最近インストールした場合は、VSTS タスク エージェントを再始動してから、もう一度お試しください。", - "loc.messages.AZ_RequiresMinVersion0": "必要な最小バージョン ({0}) の Azure PowerShell モジュールがインストールされていません。", - "loc.messages.AZ_ServicePrincipalError": "配置に使用したサービス プリンシパルにエラーがありました。", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "バージョン '{0}' の Azure モジュールでは、サービス プリンシパル認証はサポートされていません。", - "loc.messages.AZ_UnsupportedAuthScheme0": "'{0}' は Azure エンドポイントではサポートされていない認証スキームです。", - "loc.messages.AZ_AvailableModules": "利用可能な {0} モジュールの一覧:", - "loc.messages.AZ_InvalidARMEndpoint": "指定した AzureRM エンドポイントは無効です。" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ko-KR/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ko-KR/resources.resjson deleted file mode 100644 index 167f2dc..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ko-KR/resources.resjson +++ /dev/null @@ -1,12 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "'AzureRM.Profile' 모듈을 찾을 수 없습니다. 'AzureRM' 모듈이 완전히 설치되지 않았을 수 있습니다. 관리자 권한 세션에서 다음 PowerShell 명령을 실행하면 이 문제가 해결될 수 있습니다. Import-Module AzureRM ; Install-AzureRM", - "loc.messages.AZ_CertificateAuthNotSupported": "인증서 기반 인증은 지원되지 않습니다. Azure PowerShell 모듈을 찾을 수 없습니다.", - "loc.messages.AZ_CredentialsError": "배포에 사용되는 Azure 자격 증명에 오류가 발생했습니다.", - "loc.messages.AZ_ModuleNotFound": "Azure 모듈('{0}')과 AzureRM 모듈('{0}')을 둘 다 찾을 수 없습니다. 모듈이 최근에 설치된 경우 VSTS 작업 에이전트를 다시 시작한 후 다시 시도하세요.", - "loc.messages.AZ_RequiresMinVersion0": "필요한 Azure PowerShell 모듈의 최소 버전({0})이 설치되지 않았습니다.", - "loc.messages.AZ_ServicePrincipalError": "배포에 사용되는 서비스 사용자에 오류가 발생했습니다.", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "서비스 사용자 인증은 Azure 모듈의 '{0}' 버전에서 지원되지 않습니다.", - "loc.messages.AZ_UnsupportedAuthScheme0": "Azure 끝점에 대해 인증 체계 '{0}'은(는) 지원되지 않습니다.", - "loc.messages.AZ_AvailableModules": "사용 가능한 {0} 모듈 목록:", - "loc.messages.AZ_InvalidARMEndpoint": "지정한 AzureRM 끝점이 잘못되었습니다." -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ru-RU/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ru-RU/resources.resjson deleted file mode 100644 index 8bfa593..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/ru-RU/resources.resjson +++ /dev/null @@ -1,12 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "Модуль \"AzureRM.Profile\" не найден. Возможно, модуль \"AzureRM\" установлен не полностью. Выполнение следующих команд PowerShell из сеанса с повышенными правами может разрешить эту проблему: Import-Module AzureRM; Install-AzureRM", - "loc.messages.AZ_CertificateAuthNotSupported": "Проверка подлинности на основе сертификатов не поддерживается. Модуль Azure PowerShell не найден.", - "loc.messages.AZ_CredentialsError": "Произошла ошибка с учетными данными Azure, используемыми для развертывания.", - "loc.messages.AZ_ModuleNotFound": "Не найдены модули Azure (\"{0}\") и AzureRM (\"{0}\"). Если модуль недавно установлен, повторите попытку после перезапуска агента задач VSTS.", - "loc.messages.AZ_RequiresMinVersion0": "Минимальная требуемая версия ({0}) модуля Azure PowerShell не установлена.", - "loc.messages.AZ_ServicePrincipalError": "Произошла ошибка с субъектом-службой, используемой для развертывания.", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "Проверка подлинности на основе субъекта-службы не поддерживается в версии \"{0}\" модуля Azure.", - "loc.messages.AZ_UnsupportedAuthScheme0": "Схема аутентификации \"{0}\" не поддерживается для конечной точки Azure.", - "loc.messages.AZ_AvailableModules": "Список доступных модулей {0}:", - "loc.messages.AZ_InvalidARMEndpoint": "Указана недопустимая конечная точка AzureRM." -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/zh-CN/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/zh-CN/resources.resjson deleted file mode 100644 index 01df588..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/zh-CN/resources.resjson +++ /dev/null @@ -1,12 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "找不到 \"AzureRM.Profile\" 模块。\"AzureRM\" 模块可能未完整安装。从提升的会话运行以下 PowerShell 命令可能解决该问题: Import-Module AzureRM;Install-AzureRM", - "loc.messages.AZ_CertificateAuthNotSupported": "不支持基于证书的身份验证。找不到 Azure PowerShell 模块。", - "loc.messages.AZ_CredentialsError": "用于部署的 Azure 凭据有错。", - "loc.messages.AZ_ModuleNotFound": "找不到 Azure 模块(“{0}”)和 AzureRM 模块(“{0}”)。如果模块是最近安装的,请在重启 VSTS 任务代理后重试。", - "loc.messages.AZ_RequiresMinVersion0": "未安装 Azure PowerShell 模块的最低必需版本({0})。", - "loc.messages.AZ_ServicePrincipalError": "用于部署的服务主体有错。", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "Azure 模块的版本“{0}”不支持服务主体身份验证。", - "loc.messages.AZ_UnsupportedAuthScheme0": "Azure 终结点不支持授权方案“{0}”。", - "loc.messages.AZ_AvailableModules": "可用 {0} 模块的列表:", - "loc.messages.AZ_InvalidARMEndpoint": "指定的 AzureRM 终结点无效。" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/zh-TW/resources.resjson b/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/zh-TW/resources.resjson deleted file mode 100644 index 95264f9..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Strings/resources.resjson/zh-TW/resources.resjson +++ /dev/null @@ -1,12 +0,0 @@ -{ - "loc.messages.AZ_AzureRMProfileModuleNotFound": "找不到 'AzureRM.Profile' 模組。'AzureRM' 模組的安裝不完整。您可以從提升權限的工作階段執行下列 PowerShell 命令來解決此問題: Import-Module AzureRM ; Install-AzureRM", - "loc.messages.AZ_CertificateAuthNotSupported": "不支援憑證型驗證。找不到 Azure PowerShell 模組。", - "loc.messages.AZ_CredentialsError": "部署用的 Azure 認證有錯誤。", - "loc.messages.AZ_ModuleNotFound": "找不到 Azure 模組 ('{0}'),也找不到 AzureRM 模組 ('{0}')。若最近才安裝該模組,請先重新啟動 VSTS 工作代理程式,然後重試。", - "loc.messages.AZ_RequiresMinVersion0": "未安裝所需最低版本 ({0}) 的 Azure PowerShell 模組。", - "loc.messages.AZ_ServicePrincipalError": "部署用的服務主體有錯誤。", - "loc.messages.AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "'{0}' 版的 Azure 模組不支援服務主體驗證。", - "loc.messages.AZ_UnsupportedAuthScheme0": "Azure 端點不支援驗證配置 '{0}'。", - "loc.messages.AZ_AvailableModules": "可用的 {0} 模組清單:", - "loc.messages.AZ_InvalidARMEndpoint": "指定的 AzureRM 端點無效。" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.AzurePreferredFallsBack.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.AzurePreferredFallsBack.ps1 deleted file mode 100644 index 67a1b14..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.AzurePreferredFallsBack.ps1 +++ /dev/null @@ -1,65 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$variableSets = @( - @{ - ClassicModulePathResult = $true - ClassicSdkPathResult = $null - RMModulePathResult = $null - RMSdkPathResult = $null - } - @{ - ClassicModulePathResult = $false - ClassicSdkPathResult = $true - RMModulePathResult = $null - RMSdkPathResult = $null - } - @{ - ClassicModulePathResult = $false - ClassicSdkPathResult = $false - RMModulePathResult = $true - RMSdkPathResult = $null - } - @{ - ClassicModulePathResult = $false - ClassicSdkPathResult = $false - RMModulePathResult = $false - RMSdkPathResult = $true - } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Import-FromModulePath - Unregister-Mock Import-FromSdkPath - Register-Mock Import-FromModulePath - Register-Mock Import-FromSdkPath - if ($variableSet.RMModulePathResult -ne $null) { - Register-Mock Import-FromModulePath { $variableSet.RMModulePathResult } -- -Classic: $false -azurePsVersion "4.1.0" - } - - if ($variableSet.RMSdkPathResult -ne $null) { - Register-Mock Import-FromSdkPath { $variableSet.RMSdkPathResult } -- -Classic: $false -azurePsVersion "4.1.0" - } - - if ($variableSet.ClassicModulePathResult -ne $null) { - Register-Mock Import-FromModulePath { $variableSet.ClassicModulePathResult } -- -Classic: $true -azurePsVersion "4.1.0" - } - - if ($variableSet.ClassicSdkPathResult -ne $null) { - Register-Mock Import-FromSdkPath { $variableSet.ClassicSdkPathResult } -- -Classic: $true -azurePsVersion "4.1.0" - } - - # Act. - & $module Import-AzureModule -PreferredModule 'Azure' -azurePsVersion '4.1.0' - - # Assert. - Assert-WasCalled Import-FromModulePath -Times $(if ($variableSet.RMModulePathResult -eq $null) { 0 } else { 1 }) -- -Classic: $false -azurePsVersion "4.1.0" - Assert-WasCalled Import-FromSdkPath -Times $(if ($variableSet.RMSdkPathResult -eq $null) { 0 } else { 1 }) -- -Classic: $false -azurePsVersion "4.1.0" - Assert-WasCalled Import-FromModulePath -Times $(if ($variableSet.ClassicModulePathResult -eq $null) { 0 } else { 1 }) -- -Classic: $true -azurePsVersion "4.1.0" - Assert-WasCalled Import-FromSdkPath -Times $(if ($variableSet.ClassicSdkPathResult -eq $null) { 0 } else { 1 }) -- -Classic: $true -azurePsVersion "4.1.0" -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.AzureRMPreferredFallsBack.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.AzureRMPreferredFallsBack.ps1 deleted file mode 100644 index 38b70d8..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.AzureRMPreferredFallsBack.ps1 +++ /dev/null @@ -1,65 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$variableSets = @( - @{ - RMModulePathResult = $true - RMSdkPathResult = $null - ClassicModulePathResult = $null - ClassicSdkPathResult = $null - } - @{ - RMModulePathResult = $false - RMSdkPathResult = $true - ClassicModulePathResult = $null - ClassicSdkPathResult = $null - } - @{ - RMModulePathResult = $false - RMSdkPathResult = $false - ClassicModulePathResult = $true - ClassicSdkPathResult = $null - } - @{ - RMModulePathResult = $false - RMSdkPathResult = $false - ClassicModulePathResult = $false - ClassicSdkPathResult = $true - } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Import-FromModulePath - Unregister-Mock Import-FromSdkPath - Register-Mock Import-FromModulePath - Register-Mock Import-FromSdkPath - if ($variableSet.RMModulePathResult -ne $null) { - Register-Mock Import-FromModulePath { $variableSet.RMModulePathResult } -- -Classic: $false -azurePsVersion "4.1.0" - } - - if ($variableSet.RMSdkPathResult -ne $null) { - Register-Mock Import-FromSdkPath { $variableSet.RMSdkPathResult } -- -Classic: $false -azurePsVersion "4.1.0" - } - - if ($variableSet.ClassicModulePathResult -ne $null) { - Register-Mock Import-FromModulePath { $variableSet.ClassicModulePathResult } -- -Classic: $true -azurePsVersion "4.1.0" - } - - if ($variableSet.ClassicSdkPathResult -ne $null) { - Register-Mock Import-FromSdkPath { $variableSet.ClassicSdkPathResult } -- -Classic: $true -azurePsVersion "4.1.0" - } - - # Act. - & $module Import-AzureModule -PreferredModule 'AzureRM' -azurePsVersion "4.1.0" - - # Assert. - Assert-WasCalled Import-FromModulePath -Times $(if ($variableSet.RMModulePathResult -eq $null) { 0 } else { 1 }) -- -Classic: $false -azurePsVersion "4.1.0" - Assert-WasCalled Import-FromSdkPath -Times $(if ($variableSet.RMSdkPathResult -eq $null) { 0 } else { 1 }) -- -Classic: $false -azurePsVersion "4.1.0" - Assert-WasCalled Import-FromModulePath -Times $(if ($variableSet.ClassicModulePathResult -eq $null) { 0 } else { 1 }) -- -Classic: $true -azurePsVersion "4.1.0" - Assert-WasCalled Import-FromSdkPath -Times $(if ($variableSet.ClassicSdkPathResult -eq $null) { 0 } else { 1 }) -- -Classic: $true -azurePsVersion "4.1.0" -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.BothPreferredFallsBack.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.BothPreferredFallsBack.ps1 deleted file mode 100644 index abdf8ff..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.BothPreferredFallsBack.ps1 +++ /dev/null @@ -1,91 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$variableSets = @( - # Combinations for only one preference matched: - @{ - ClassicModulePathResult = $true - ClassicSdkPathResult = $null - RMModulePathResult = $false - RMSdkPathResult = $false - } - @{ - ClassicModulePathResult = $false - ClassicSdkPathResult = $true - RMModulePathResult = $false - RMSdkPathResult = $false - } - @{ - ClassicModulePathResult = $false - ClassicSdkPathResult = $false - RMModulePathResult = $true - RMSdkPathResult = $null - } - @{ - ClassicModulePathResult = $false - ClassicSdkPathResult = $false - RMModulePathResult = $false - RMSdkPathResult = $true - } - # Combinations for both preferences matched: - @{ - ClassicModulePathResult = $true - ClassicSdkPathResult = $null - RMModulePathResult = $true - RMSdkPathResult = $null - } - @{ - ClassicModulePathResult = $true - ClassicSdkPathResult = $null - RMModulePathResult = $false - RMSdkPathResult = $true - } - @{ - ClassicModulePathResult = $false - ClassicSdkPathResult = $true - RMModulePathResult = $true - RMSdkPathResult = $null - } - @{ - ClassicModulePathResult = $false - ClassicSdkPathResult = $true - RMModulePathResult = $false - RMSdkPathResult = $true - } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Import-FromModulePath - Unregister-Mock Import-FromSdkPath - Register-Mock Import-FromModulePath - Register-Mock Import-FromSdkPath - if ($variableSet.RMModulePathResult -ne $null) { - Register-Mock Import-FromModulePath { $variableSet.RMModulePathResult } -- -Classic: $false -azurePsVersion "4.1.0" - } - - if ($variableSet.RMSdkPathResult -ne $null) { - Register-Mock Import-FromSdkPath { $variableSet.RMSdkPathResult } -- -Classic: $false -azurePsVersion "4.1.0" - } - - if ($variableSet.ClassicModulePathResult -ne $null) { - Register-Mock Import-FromModulePath { $variableSet.ClassicModulePathResult } -- -Classic: $true -azurePsVersion "4.1.0" - } - - if ($variableSet.ClassicSdkPathResult -ne $null) { - Register-Mock Import-FromSdkPath { $variableSet.ClassicSdkPathResult } -- -Classic: $true -azurePsVersion "4.1.0" - } - - # Act. - & $module Import-AzureModule -PreferredModule 'Azure', 'AzureRM' -azurePsVersion "4.1.0" - - # Assert. - Assert-WasCalled Import-FromModulePath -Times $(if ($variableSet.RMModulePathResult -eq $null) { 0 } else { 1 }) -- -Classic: $false -azurePsVersion "4.1.0" - Assert-WasCalled Import-FromSdkPath -Times $(if ($variableSet.RMSdkPathResult -eq $null) { 0 } else { 1 }) -- -Classic: $false -azurePsVersion "4.1.0" - Assert-WasCalled Import-FromModulePath -Times $(if ($variableSet.ClassicModulePathResult -eq $null) { 0 } else { 1 }) -- -Classic: $true -azurePsVersion "4.1.0" - Assert-WasCalled Import-FromSdkPath -Times $(if ($variableSet.ClassicSdkPathResult -eq $null) { 0 } else { 1 }) -- -Classic: $true -azurePsVersion "4.1.0" -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.ThrowsWhenNotFound.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.ThrowsWhenNotFound.ps1 deleted file mode 100644 index d5a6919..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.ThrowsWhenNotFound.ps1 +++ /dev/null @@ -1,22 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -Register-Mock Import-FromModulePath -Register-Mock Import-FromSdkPath -Register-Mock Discover-AvailableAzureModules -$variableSets = @( - @{ PreferredModule = 'Azure', 'AzureRM' } - @{ PreferredModule = 'Azure' } - @{ PreferredModule = 'AzureRM' } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - - # Act/Assert. - Assert-Throws { & $module Import-AzureModule -PreferredModule $variableSet.PreferredModule -azurePsVersion "4.1.0" } -MessagePattern "AZ_ModuleNotFound 4.1.0 Azure, AzureRM" -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.ValidatesClassicVersion.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.ValidatesClassicVersion.ps1 deleted file mode 100644 index 87b575c..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-AzureModule.ValidatesClassicVersion.ps1 +++ /dev/null @@ -1,13 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -Register-Mock Import-FromModulePath { $true } -& $module { $script:azureModule = @{ Version = [version]'0.8.10.0' } } - -# Act/Assert. -Assert-Throws { & $module Import-AzureModule -PreferredModule 'Azure' } -MessagePattern AZ_RequiresMinVersion0* diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ImportsModules.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ImportsModules.ps1 deleted file mode 100644 index 1f96286..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ImportsModules.ps1 +++ /dev/null @@ -1,68 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$variableSets = @( - @{ - Classic = $true - Modules = @( - @{ - Name = 'Azure' - Path = 'Path to Azure' - Version = [version]'4.1.0' - } - ) - } - @{ - Classic = $false - Modules = @( - @{ - Name = 'AzureRM' - Path = 'Path to AzureRM' - Version = [version]'4.1.0' - NestedModules = @( - @{ - Name = 'AzureRM.Profile' - Path = 'Path to AzureRM.profile' - } - ) - } - @{ - Name = 'AzureRM.profile' - Path = 'Path to AzureRM.profile' - Version = [version]'4.1.0' - } - ) - } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Get-Module - Unregister-Mock Import-Module - Register-Mock Get-Module { $variableSet.Modules[0] } -- -Name $variableSet.Modules[0].Name -ListAvailable - Register-Mock Import-Module { $variableSet.Modules[0] } -- -Name $variableSet.Modules[0].Path -Global -PassThru -Force - if ($variableSet.Modules.Length -eq 2) { - Register-Mock Get-Module { $variableSet.Modules[0] } -- -Name $variableSet.Modules[0].Name - Register-Mock Import-Module { $variableSet.Modules[1] } -- -Name $variableSet.Modules[1].Path -Global -PassThru -Force - } - - # Act. - $result = & $module Import-FromModulePath -Classic:($variableSet.Classic) -azurePsVersion "4.1.0" - - # Assert. - Assert-AreEqual $true $result - Assert-WasCalled Import-Module -- -Name $variableSet.Modules[0].Path -Global -PassThru -Force - if ($variableSet.Modules.Length -eq 2) { - Assert-WasCalled Import-Module -- -Name $variableSet.Modules[1].Path -Global -PassThru -Force - } - - if ($variableSet.Classic) { - Assert-AreEqual $variableSet.Modules[0] (& $module { $script:azureModule }) - } else { - Assert-AreEqual $variableSet.Modules[1] (& $module { $script:azureRMProfileModule }) - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ReturnsFalseWhenNotFound.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ReturnsFalseWhenNotFound.ps1 deleted file mode 100644 index 533da3c..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ReturnsFalseWhenNotFound.ps1 +++ /dev/null @@ -1,22 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -Register-Mock Get-Module -$variableSets = @( - @{ Classic = $true } - @{ Classic = $false } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - - # Act. - $result = & $module Import-FromModulePath -Classic:($variableSet.Classic) - - # Assert. - Assert-AreEqual $false $result -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ValidatesRMProfileFound.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ValidatesRMProfileFound.ps1 deleted file mode 100644 index 9dd4116..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromModulePath.ValidatesRMProfileFound.ps1 +++ /dev/null @@ -1,27 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$rmModule = @{ Name = 'AzureRM' ; - Path = 'Path to AzureRM' ; - Version = [version]'4.1.0' ; - NestedModules = @( - @{ - Name = "AzureRM.Websites" - } - @{ - Name = "AzureRM.Compute" - } - ); - RequiredModules = @() -} -Register-Mock Get-Module { $rmModule } -- -Name $rmModule.Name -ListAvailable -Register-Mock Get-Module { $rmModule } -- -Name $rmModule.Name -Register-Mock Import-Module { $rmModule } -- -Name $rmModule.Path -RequiredVersion "4.1.0" -Global -PassThru - -# Act/Assert. -Assert-Throws { & $module Import-FromModulePath -Classic:$false -azurePsVersion "4.1.0" } -MessagePattern AZ_AzureRMProfileModuleNotFound diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromSdkPath.ImportsModule.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromSdkPath.ImportsModule.ps1 deleted file mode 100644 index e77453f..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromSdkPath.ImportsModule.ps1 +++ /dev/null @@ -1,113 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$variableSets = @( - @{ - Classic = $true - ProgramFilesX86Defined = $true - FoundInProgramFilesX86 = $true - FoundInProgramFiles = $false - } - @{ - Classic = $true - ProgramFilesX86Defined = $true - FoundInProgramFilesX86 = $false - FoundInProgramFiles = $true - } - @{ - Classic = $true - ProgramFilesX86Defined = $true - FoundInProgramFilesX86 = $true - FoundInProgramFiles = $true - } - @{ - Classic = $false - ProgramFilesX86Defined = $true - FoundInProgramFilesX86 = $true - FoundInProgramFiles = $false - } - @{ - Classic = $false - ProgramFilesX86Defined = $true - FoundInProgramFilesX86 = $false - FoundInProgramFiles = $true - } - @{ - Classic = $false - ProgramFilesX86Defined = $true - FoundInProgramFilesX86 = $true - FoundInProgramFiles = $true - } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Test-Path - Unregister-Mock Import-Module - - # Setup the expected partial path. - if ($variableSet.Classic) { - $partialPath = 'Microsoft SDKs\Azure\PowerShell\ServiceManagement\Azure\Azure.psd1' - } else { - $partialPath = 'Microsoft SDKs\Azure\PowerShell\ResourceManager\AzureResourceManager\AzureRM.Profile\AzureRM.Profile.psd1' - } - - # Setup the Program Files environment variables. - $env:ProgramFiles = 'program files' - if ($variableSet.ProgramFilesX86Defined) { - ${env:ProgramFiles(x86)} = 'wow program files' # Windows on Windows. - } else { - ${env:ProgramFiles(x86)} = '' - } - - # Setup the PSD1 paths. - $wowPsd1 = [System.IO.Path]::Combine(${env:ProgramFiles(x86)}, $partialPath) - $psd1 = [System.IO.Path]::Combine($env:ProgramFiles, $partialPath) - - # Setup Test-Path. - if ($variableSet.FoundInProgramFilesX86) { - Register-Mock Test-Path { $true } -- -LiteralPath $wowPsd1 -PathType Leaf - } - - if ($variableSet.FoundInProgramFiles) { - Register-Mock Test-Path { $true } -- -LiteralPath $psd1 -PathType Leaf - } - - # Setup Import-Module. - if ($variableSet.FoundInProgramFilesX86) { - $expectedModule = @{ Version = [version]'1.2.3.4' } - Register-Mock Import-Module { $expectedModule } -Name $wowPsd1 -Global -PassThru -Force - } - - if ($variableSet.FoundInProgramFiles) { - $expectedModule = @{ Version = [version]'2.3.4.5' } - Register-Mock Import-Module { $expectedModule } -Name $psd1 -Global -PassThru -Force - } - - if($variableSet.Classic -eq $false) { - Register-Mock Import-AzureRmSubmodulesFromSdkPath - } - # Clear the private module variables. - & $module { $script:azureModule = $null ; $script:azureRMProfileModule = $null } - - # Act. - $result = & $module Import-FromSdkPath -Classic:($variableSet.Classic) - - # Assert. - Assert-AreEqual $true $result - if ($variableSet.FoundInProgramFilesX86) { - Assert-WasCalled Import-Module -- -Name $wowPsd1 -Global -PassThru -Force - } else { - Assert-WasCalled Import-Module -- -Name $psd1 -Global -PassThru -Force - } - - if ($variableSet.Classic) { - Assert-AreEqual $expectedModule (& $module { $script:azureModule }) - } else { - Assert-AreEqual $expectedModule (& $module { $script:azureRMProfileModule }) - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromSdkPath.ReturnsFalseWhenNotFound.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromSdkPath.ReturnsFalseWhenNotFound.ps1 deleted file mode 100644 index 6bad5d4..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Import-FromSdkPath.ReturnsFalseWhenNotFound.ps1 +++ /dev/null @@ -1,24 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru - -# Setup the Program Files environment variables. -$env:ProgramFiles = 'no such program files' -${env:ProgramFiles(x86)} = 'no such program files x86' - -# Setup the mocks. -Register-Mock Test-Path { $false } -Unregister-Mock Import-Module -Register-Mock Import-Module - -# Act. -$result = & $module Import-FromSdkPath - -# Assert. -Assert-AreEqual $false $result -Assert-WasCalled Import-Module -Times 0 diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-Azure.PassesInputs.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-Azure.PassesInputs.ps1 deleted file mode 100644 index 9d9e05c..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-Azure.PassesInputs.ps1 +++ /dev/null @@ -1,100 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -$variableSets = @( - @{ - ConnectedServiceNameSelector = 'ConnectedServiceName' - DeploymentEnvironmentName = $null - Endpoint = @{ Auth = @{ Scheme = 'ServicePrincipal' } } - StorageAccount = $null - ExpectedServiceNameInput = 'ConnectedServiceName' - ExpectedPreferredModule = ,'AzureRM' - } - @{ - ConnectedServiceNameSelector = 'ConnectedServiceName' - DeploymentEnvironmentName = $null - Endpoint = @{ Auth = @{ Scheme = 'UserNamePassword' } } - StorageAccount = $null - ExpectedServiceNameInput = 'ConnectedServiceName' - ExpectedPreferredModule = 'Azure', 'AzureRM' - } - @{ - ConnectedServiceNameSelector = 'ConnectedServiceName' - DeploymentEnvironmentName = $null - Endpoint = @{ Auth = @{ Scheme = 'UserNamePassword' } } - StorageAccount = 'Some storage account' - ExpectedServiceNameInput = 'ConnectedServiceName' - ExpectedPreferredModule = 'Azure', 'AzureRM' - } - @{ - ConnectedServiceNameSelector = 'ConnectedServiceName' - DeploymentEnvironmentName = $null - Endpoint = @{ Auth = @{ Scheme = 'Certificate' } } - StorageAccount = $null - ExpectedServiceNameInput = 'ConnectedServiceName' - ExpectedPreferredModule = ,'Azure' - } - @{ - ConnectedServiceNameSelector = 'ConnectedServiceName' - DeploymentEnvironmentName = $null - Endpoint = @{ Auth = @{ Scheme = 'Certificate' } } - StorageAccount = 'Some storage account' - ExpectedServiceNameInput = 'ConnectedServiceName' - ExpectedPreferredModule = ,'Azure' - } - @{ - ConnectedServiceNameSelector = 'ConnectedServiceNameARM' - DeploymentEnvironmentName = $null - Endpoint = @{ Auth = @{ Scheme = 'ServicePrincipal' } } - StorageAccount = $null - ExpectedServiceNameInput = 'ConnectedServiceNameARM' - ExpectedPreferredModule = ,'AzureRM' - } - @{ - ConnectedServiceNameSelector = 'ConnectedServiceNameARM' - DeploymentEnvironmentName = $null - Endpoint = @{ Auth = @{ Scheme = 'ServicePrincipal' } } - StorageAccount = 'Some storage account' - ExpectedServiceNameInput = 'ConnectedServiceNameARM' - ExpectedPreferredModule = ,'AzureRM' - } - @{ - ConnectedServiceNameSelector = $null - DeploymentEnvironmentName = 'Some deployment environment name' - StorageAccount = $null - ExpectedServiceNameInput = 'Some deployment environment name' - ExpectedPreferredModule = ,'Azure' - } - @{ - ConnectedServiceNameSelector = $null - DeploymentEnvironmentName = 'Some deployment environment name' - StorageAccount = 'Some storage account' - ExpectedServiceNameInput = 'Some deployment environment name' - ExpectedPreferredModule = ,'Azure' - } -) -Register-Mock Import-AzureModule -Register-Mock Initialize-AzureSubscription -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Get-VstsInput - Unregister-Mock Get-VstsEndpoint - Register-Mock Get-VstsInput { $variableSet.ConnectedServiceNameSelector } -- -Name ConnectedServiceNameSelector -Default 'ConnectedServiceName' - Register-Mock Get-VstsInput { $variableSet.DeploymentEnvironmentName } -- -Name DeploymentEnvironmentName - Register-Mock Get-VstsInput { "LatestVersion" } -- -TargetAzurePs - Register-Mock Get-VstsInput { 'Some service name' } -- -Name $variableSet.ExpectedServiceNameInput -Default $variableSet.DeploymentEnvironmentName - Register-Mock Get-VstsEndpoint { $variableSet.Endpoint } -- -Name 'Some service name' -Require - Register-Mock Get-VstsInput { $variableSet.StorageAccount } -- -Name StorageAccount - - # Act. - Initialize-Azure - - # Assert. - Assert-WasCalled Import-AzureModule -- -PreferredModule $variableSet.ExpectedPreferredModule -azurePsVersion "" -strict:$false - Assert-WasCalled Initialize-AzureSubscription -- -Endpoint $variableSet.Endpoint -StorageAccount $variableSet.StorageAccount -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-Azure.ThrowsWhenServiceNameIsNull.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-Azure.ThrowsWhenServiceNameIsNull.ps1 deleted file mode 100644 index c291747..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-Azure.ThrowsWhenServiceNameIsNull.ps1 +++ /dev/null @@ -1,15 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -Register-Mock Get-VstsInput { throw 'Some error message' } -- -Name $null -Require -Register-Mock Get-VstsEndpoint -Register-Mock Import-AzureModule -Register-Mock Initialize-AzureSubscription - -# Act. -Assert-Throws { Initialize-Azure } -MessagePattern 'Some error message' diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ManagedServiceIdentity.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ManagedServiceIdentity.ps1 deleted file mode 100644 index f68bf4c..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ManagedServiceIdentity.ps1 +++ /dev/null @@ -1,55 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Microsoft.PowerShell.Core\Import-Module Microsoft.PowerShell.Security -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru - -$endpoint = @{ - Auth = @{ - Parameters = @{ - ServicePrincipalId = 'Some service principal ID' - ServicePrincipalKey = 'Some service principal key' - TenantId = 'Some tenant ID' - } - Scheme = 'ManagedServiceIdentity' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - } -} - -$content = @" - {"access_token" : "Dummy Token" } -"@ - -$response = @{ - Content = $content - StatusCode = 200 - StatusDescription = 'OK' -}; - -$variableSets = @( - @{ StorageAccount = 'Some storage account' } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Add-AzureRMAccount - Unregister-Mock Set-CurrentAzureRMSubscription - Unregister-Mock Invoke-WebRequest - Unregister-Mock Set-UserAgent - Register-Mock Add-AzureRMAccount { 'some output' } - Register-Mock Set-CurrentAzureRMSubscription - Register-Mock Set-UserAgent - Register-Mock Invoke-WebRequest { $response } - - # Act. - $result = & $module Initialize-AzureSubscription -Endpoint $endpoint -StorageAccount $variableSet.StorageAccount - - Assert-AreEqual $null $result - Assert-WasCalled Set-CurrentAzureRMSubscription -- -SubscriptionId $endpoint.Data.SubscriptionId -TenantId $endpoint.Auth.Parameters.TenantId -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenAzureStackSPAuth.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenAzureStackSPAuth.ps1 deleted file mode 100644 index ccd4782..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenAzureStackSPAuth.ps1 +++ /dev/null @@ -1,85 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Microsoft.PowerShell.Core\Import-Module Microsoft.PowerShell.Security -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$endpoint = @{ - Auth = @{ - Parameters = @{ - ServicePrincipalId = 'Some service principal ID' - ServicePrincipalKey = 'Some service principal key' - TenantId = 'Some tenant ID' - } - Scheme = 'ServicePrincipal' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - Environment = 'AzureStack' - } -} -$variableSets = @( - @{ Classic = $false ; StorageAccount = $null } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Add-AzureAccount - Unregister-Mock Add-AzureRMAccount - Unregister-Mock Set-CurrentAzureSubscription - Unregister-Mock Set-CurrentAzureRMSubscription - Unregister-Mock Set-UserAgent - Register-Mock Add-AzureAccount { 'some output' } - Register-Mock Add-AzureRMAccount { 'some output' } - Register-Mock Set-CurrentAzureSubscription - Register-Mock Set-CurrentAzureRMSubscription - Register-Mock Set-UserAgent - Register-Mock Add-AzureStackAzureRmEnvironment - if ($variableSet.Classic) { - & $module { - $script:azureModule = @{ Version = [version]'0.9.8' } - $script:azureRMProfileModule = $null - } - } else { - & $module { - $script:azureModule = $null - $script:azureRMProfileModule = @{ Version = [version]'1.2.3.4' } - } - } - - # Act. - $result = & $module Initialize-AzureSubscription -Endpoint $endpoint -StorageAccount $variableSet.StorageAccount - - # Assert. - Assert-AreEqual $null $result - if ($variableSet.Classic) { - Assert-WasCalled Add-AzureAccount -ArgumentsEvaluator { - $args.Length -eq 5 -and - $args[0] -eq '-ServicePrincipal' -and - $args[1] -eq '-Tenant' -and - $args[2] -eq 'Some tenant ID' -and - $args[3] -eq '-Credential' -and - $args[4] -is [pscredential] -and - $args[4].UserName -eq 'Some service principal ID' -and - $args[4].GetNetworkCredential().Password -eq 'Some service principal key' - } - Assert-WasCalled Set-CurrentAzureSubscription -- -SubscriptionId $endpoint.Data.SubscriptionId -StorageAccount $variableSet.StorageAccount - } else { - Assert-WasCalled Add-AzureRMAccount -ArgumentsEvaluator { - $args.Length -eq 7 -and - $args[0] -eq '-ServicePrincipal' -and - $args[1] -eq '-Tenant' -and - $args[2] -eq 'Some tenant ID' -and - $args[3] -eq '-Credential' -and - $args[4] -is [pscredential] -and - $args[4].UserName -eq 'Some service principal ID' -and - $args[4].GetNetworkCredential().Password -eq 'Some service principal key' - $args[5] -eq '-Environment' - $args[6] -eq 'AzureStack' - } - Assert-WasCalled Set-CurrentAzureRMSubscription -- -SubscriptionId $endpoint.Data.SubscriptionId -TenantId $endpoint.Auth.Parameters.TenantId - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenCertAuth.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenCertAuth.ps1 deleted file mode 100644 index 277e655..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenCertAuth.ps1 +++ /dev/null @@ -1,48 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -& $module { $script:azureModule = @{ Version = [version]'1.0' } } -$endpoint = @{ - Auth = @{ - Scheme = 'Certificate' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - } -} -$certificate = 'Some certificate' -$variableSets = @( - @{ StorageAccount = $null } - @{ StorageAccount = 'Some storage account' } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Add-Certificate - Unregister-Mock Set-AzureSubscription - Unregister-Mock Set-CurrentAzureSubscription - Unregister-Mock Set-UserAgent - Register-Mock Add-Certificate { $certificate } - Register-Mock Set-AzureSubscription - Register-Mock Set-CurrentAzureSubscription - Register-Mock Set-UserAgent - - # Act. - & $module Initialize-AzureSubscription -Endpoint $endpoint -StorageAccount $variableSet.StorageAccount - - # Assert. - Assert-WasCalled Add-Certificate -- -Endpoint $endpoint - if ($variableSet.StorageAccount) { - # The CurrentStorageAccountName parameter ends in ":" for the assertion because it's splatted. - Assert-WasCalled Set-AzureSubscription -- -SubscriptionName $endpoint.Data.SubscriptionName -SubscriptionId $endpoint.Data.SubscriptionId -Certificate $certificate -Environment AzureCloud -CurrentStorageAccountName: $variableSet.StorageAccount - } else { - Assert-WasCalled Set-AzureSubscription -- -SubscriptionName $endpoint.Data.SubscriptionName -SubscriptionId $endpoint.Data.SubscriptionId -Certificate $certificate -Environment AzureCloud - } - - Assert-WasCalled Set-CurrentAzureSubscription -- -SubscriptionId $endpoint.Data.SubscriptionId -StorageAccount $variableSet.StorageAccount -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenCertAuthAndEnvironment.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenCertAuthAndEnvironment.ps1 deleted file mode 100644 index 568c951..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenCertAuthAndEnvironment.ps1 +++ /dev/null @@ -1,63 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -& $module { $script:azureModule = @{ Version = [version]'1.0' } } -$endpoint = @{ - Auth = @{ - Scheme = 'Certificate' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - } -} -$certificate = 'Some certificate' -$variableSets = @( - @{ StorageAccount = $null ; EnvironmentName = $null} - @{ StorageAccount = $null ; EnvironmentName = ""} - @{ StorageAccount = $null ; EnvironmentName = "AzureCloud"} - @{ StorageAccount = $null ; EnvironmentName = "AzureUSGovernment"} - @{ StorageAccount = 'Some storage account' ; EnvironmentName = $null} - @{ StorageAccount = 'Some storage account' ; EnvironmentName = ""} - @{ StorageAccount = 'Some storage account' ; EnvironmentName = "AzureCloud"} - @{ StorageAccount = 'Some storage account' ; EnvironmentName = "AzureUSGovernment"} -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Add-Certificate - Unregister-Mock Set-AzureSubscription - Unregister-Mock Set-CurrentAzureSubscription - Unregister-Mock Set-UserAgent - Register-Mock Add-Certificate { $certificate } - Register-Mock Set-AzureSubscription - Register-Mock Set-CurrentAzureSubscription - Register-Mock Set-UserAgent - - # Act. - & $module Initialize-AzureSubscription -Endpoint $endpoint -StorageAccount $variableSet.StorageAccount - - if( $variableSet.Environment ){ - $environmentName = $variableSet.Environment - }else{ - $environmentName = 'AzureCloud' - } - - # setting environment to endpoint - $endpoint.Data.Environment = $variableSet.Environment - - # Assert. - Assert-WasCalled Add-Certificate -- -Endpoint $endpoint - if ($variableSet.StorageAccount) { - # The CurrentStorageAccountName parameter ends in ":" for the assertion because it's splatted. - Assert-WasCalled Set-AzureSubscription -- -SubscriptionName $endpoint.Data.SubscriptionName -SubscriptionId $endpoint.Data.SubscriptionId -Certificate $certificate -Environment $environmentName -CurrentStorageAccountName: $variableSet.StorageAccount - } else { - Assert-WasCalled Set-AzureSubscription -- -SubscriptionName $endpoint.Data.SubscriptionName -SubscriptionId $endpoint.Data.SubscriptionId -Certificate $certificate -Environment $environmentName - } - - Assert-WasCalled Set-CurrentAzureSubscription -- -SubscriptionId $endpoint.Data.SubscriptionId -StorageAccount $variableSet.StorageAccount -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenSPAuth.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenSPAuth.ps1 deleted file mode 100644 index 0264994..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenSPAuth.ps1 +++ /dev/null @@ -1,83 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Microsoft.PowerShell.Core\Import-Module Microsoft.PowerShell.Security -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$endpoint = @{ - Auth = @{ - Parameters = @{ - ServicePrincipalId = 'Some service principal ID' - ServicePrincipalKey = 'Some service principal key' - TenantId = 'Some tenant ID' - } - Scheme = 'ServicePrincipal' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - } -} -$variableSets = @( - @{ Classic = $true ; StorageAccount = $null } - @{ Classic = $true ; StorageAccount = 'Some storage account' } - @{ Classic = $false ; StorageAccount = $null } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Add-AzureAccount - Unregister-Mock Add-AzureRMAccount - Unregister-Mock Set-CurrentAzureSubscription - Unregister-Mock Set-CurrentAzureRMSubscription - Unregister-Mock Set-UserAgent - Register-Mock Add-AzureAccount { 'some output' } - Register-Mock Add-AzureRMAccount { 'some output' } - Register-Mock Set-CurrentAzureSubscription - Register-Mock Set-CurrentAzureRMSubscription - Register-Mock Set-UserAgent - if ($variableSet.Classic) { - & $module { - $script:azureModule = @{ Version = [version]'0.9.8' } - $script:azureRMProfileModule = $null - } - } else { - & $module { - $script:azureModule = $null - $script:azureRMProfileModule = @{ Version = [version]'1.2.3.4' } - } - } - - # Act. - $result = & $module Initialize-AzureSubscription -Endpoint $endpoint -StorageAccount $variableSet.StorageAccount - - # Assert. - Assert-AreEqual $null $result - if ($variableSet.Classic) { - Assert-WasCalled Add-AzureAccount -ArgumentsEvaluator { - $args.Length -eq 5 -and - $args[0] -eq '-ServicePrincipal' -and - $args[1] -eq '-Tenant' -and - $args[2] -eq 'Some tenant ID' -and - $args[3] -eq '-Credential' -and - $args[4] -is [pscredential] -and - $args[4].UserName -eq 'Some service principal ID' -and - $args[4].GetNetworkCredential().Password -eq 'Some service principal key' - } - Assert-WasCalled Set-CurrentAzureSubscription -- -SubscriptionId $endpoint.Data.SubscriptionId -StorageAccount $variableSet.StorageAccount - } else { - Assert-WasCalled Add-AzureRMAccount -ArgumentsEvaluator { - $args.Length -eq 7 -and - $args[0] -eq '-ServicePrincipal' -and - $args[1] -eq '-Tenant' -and - $args[2] -eq 'Some tenant ID' -and - $args[3] -eq '-Credential' -and - $args[4] -is [pscredential] -and - $args[4].UserName -eq 'Some service principal ID' -and - $args[4].GetNetworkCredential().Password -eq 'Some service principal key' - } - Assert-WasCalled Set-CurrentAzureRMSubscription -- -SubscriptionId $endpoint.Data.SubscriptionId -TenantId $endpoint.Auth.Parameters.TenantId - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenSPNCertAuth.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenSPNCertAuth.ps1 deleted file mode 100644 index f8eaee0..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenSPNCertAuth.ps1 +++ /dev/null @@ -1,35 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 - -$endpoint = @{ - Url = "https://management.azure.com" - Auth = @{ - Parameters = @{ - TenantId = 'Tenant Id' - ServicePrincipalId = 'Service Principal Id 1' - AuthenticationType = 'SPNCertificate' - ServicePrincipalCertificate = 'Service Principal Certificate' - } - Scheme = 'ServicePrincipal' - } - Data = @{ - SubscriptionId = 'Subscription ID' - SubscriptionName = 'Subscription name' - Environment = "AzureCloud" - ActiveDirectoryServiceEndpointResourceId = "https://management.azure.com" - } -} - -Register-Mock Add-Tls12InSession { } -Register-Mock Add-AzureRMAccount { 'Add-AzureRmAccount' } -Register-Mock Set-CurrentAzureRMSubscription { 'Set-CurrentAzureRMSubscription' } -Register-Mock Set-UserAgent { } -Register-Mock Add-Certificate { } - -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$result = & $module Initialize-AzureSubscription -Endpoint $endpoint - -Assert-WasCalled Add-AzureRMAccount \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenUPAuth.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenUPAuth.ps1 deleted file mode 100644 index 2b621bb..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.PassesValuesWhenUPAuth.ps1 +++ /dev/null @@ -1,103 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Microsoft.PowerShell.Core\Import-Module Microsoft.PowerShell.Security -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$endpoint = @{ - Auth = @{ - Parameters = @{ - UserName = 'Some user name' - Password = 'Some password' - } - Scheme = 'UserNamePassword' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - } -} -$variableSets = @( - # Azure: - @{ - Azure = $true - AzureRM = $false - StorageAccount = $null - } - @{ - Azure = $true - AzureRM = $false - StorageAccount = 'Some storage account' - } - # Azure and AzureRM: - @{ - Azure = $true - AzureRM = $true - StorageAccount = $null - } - @{ - Azure = $true - AzureRM = $true - StorageAccount = 'Some storage account' - } - # AzureRM: - @{ - Azure = $false - AzureRM = $true - StorageAccount = $null - } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Add-AzureAccount - Unregister-Mock Add-AzureRMAccount - Unregister-Mock Set-CurrentAzureSubscription - Unregister-Mock Set-CurrentAzureRMSubscription - Unregister-Mock Set-UserAgent - Register-Mock Add-AzureAccount { 'some output' } - Register-Mock Add-AzureRMAccount { 'some output' } - Register-Mock Set-CurrentAzureSubscription - Register-Mock Set-CurrentAzureRMSubscription - Register-Mock Set-UserAgent - & $module { - $script:azureModule = $null - $script:azureRMProfileModule = $null - } - if ($variableSet.Azure) { - & $module { $script:azureModule = @{ Version = [version]'1.0' } } - } - - if ($variableSet.AzureRM) { - & $module { $script:azureRMProfileModule = @{ Version = [version]'1.2.3.4' } } - } - - # Act. - $result = & $module Initialize-AzureSubscription -Endpoint $endpoint -StorageAccount $variableSet.StorageAccount - - # Assert. - Assert-AreEqual $null $result - if ($variableSet.Azure) { - Assert-WasCalled Add-AzureAccount -ArgumentsEvaluator { - $args.Length -eq 2 -and - $args[0] -eq '-Credential' -and - $args[1] -is [pscredential] -and - $args[1].UserName -eq 'Some user name' -and - $args[1].GetNetworkCredential().Password -eq 'Some password' - } - Assert-WasCalled Set-CurrentAzureSubscription -- -SubscriptionId $endpoint.Data.SubscriptionId -StorageAccount $variableSet.StorageAccount - } - - if ($variableSet.AzureRM) { - Assert-WasCalled Add-AzureRMAccount -ArgumentsEvaluator { - $args.Length -eq 2 -and - $args[0] -eq '-Credential' -and - $args[1] -is [pscredential] -and - $args[1].UserName -eq 'Some user name' -and - $args[1].GetNetworkCredential().Password -eq 'Some password' - } - Assert-WasCalled Set-CurrentAzureRMSubscription -- -SubscriptionId $endpoint.Data.SubscriptionId - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsUsefulErrorWhenSPAuthAndAddAccountFails.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsUsefulErrorWhenSPAuthAndAddAccountFails.ps1 deleted file mode 100644 index 0fd2e7a..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsUsefulErrorWhenSPAuthAndAddAccountFails.ps1 +++ /dev/null @@ -1,62 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Microsoft.PowerShell.Core\Import-Module Microsoft.PowerShell.Security -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$endpoint = @{ - Auth = @{ - Parameters = @{ - ServicePrincipalId = 'Some service principal ID' - ServicePrincipalKey = 'Some service principal key' - TenantId = 'Some tenant ID' - } - Scheme = 'ServicePrincipal' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - } -} -$variableSets = @( - @{ Classic = $true } - @{ Classic = $false } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Add-AzureAccount - Unregister-Mock Add-AzureRMAccount - Unregister-Mock Write-VstsTaskError - Unregister-Mock Set-UserAgent - Register-Mock Add-AzureAccount { throw 'Some add account error' } - Register-Mock Add-AzureRMAccount { throw 'Some add account error' } - Register-Mock Write-VstsTaskError - Register-Mock Set-UserAgent - if ($variableSet.Classic) { - & $module { - $script:azureModule = @{ Version = [version]'0.9.8' } - $script:azureRMProfileModule = $null - } - } else { - & $module { - $script:azureModule = $null - $script:azureRMProfileModule = @{ Version = [version]'1.2.3.4' } - } - } - - # Act/Assert. - Assert-Throws { - & $module Initialize-AzureSubscription -Endpoint $endpoint - } -MessagePattern AZ_ServicePrincipalError - - # Assert. - Assert-WasCalled Write-VstsTaskError -- -Message 'Some add account error' - if ($variableSet.Classic) { - Assert-WasCalled Add-AzureAccount - } else { - Assert-WasCalled Add-AzureRMAccount - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsUsefulErrorWhenUPAuthAndAddAccountFails.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsUsefulErrorWhenUPAuthAndAddAccountFails.ps1 deleted file mode 100644 index 0dedd19..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsUsefulErrorWhenUPAuthAndAddAccountFails.ps1 +++ /dev/null @@ -1,61 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Microsoft.PowerShell.Core\Import-Module Microsoft.PowerShell.Security -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$endpoint = @{ - Auth = @{ - Parameters = @{ - UserName = 'Some user name' - Password = 'Some password' - } - Scheme = 'UserNamePassword' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - } -} -$variableSets = @( - @{ Classic = $true } - @{ Classic = $false } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Add-AzureAccount - Unregister-Mock Add-AzureRMAccount - Unregister-Mock Write-VstsTaskError - Unregister-Mock Set-UserAgent - Register-Mock Add-AzureAccount { throw 'Some add account error' } - Register-Mock Add-AzureRMAccount { throw 'Some add account error' } - Register-Mock Write-VstsTaskError - Register-Mock Set-UserAgent - if ($variableSet.Classic) { - & $module { - $script:azureModule = @{ Version = [version]'1.0' } - $script:azureRMProfileModule = $null - } - } else { - & $module { - $script:azureModule = $null - $script:azureRMProfileModule = @{ Version = [version]'1.2.3.4' } - } - } - - # Act/Assert. - Assert-Throws { - & $module Initialize-AzureSubscription -Endpoint $endpoint - } -MessagePattern AZ_CredentialsError - - # Assert. - Assert-WasCalled Write-VstsTaskError -- -Message 'Some add account error' - if ($variableSet.Classic) { - Assert-WasCalled Add-AzureAccount - } else { - Assert-WasCalled Add-AzureRMAccount - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenRMAndCertAuth.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenRMAndCertAuth.ps1 deleted file mode 100644 index 69f587e..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenRMAndCertAuth.ps1 +++ /dev/null @@ -1,14 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -& $module { $script:azureRMProfileModule = @{ } } -$endpoint = @{ Auth = @{ Scheme = 'Certificate' } } - -Register-Mock Set-UserAgent -# Act/Assert. -Assert-Throws { & $module Initialize-AzureSubscription -Endpoint $endpoint } -MessagePattern AZ_CertificateAuthNotSupported diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenSPAuthAndClassic099.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenSPAuthAndClassic099.ps1 deleted file mode 100644 index 77ca984..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenSPAuthAndClassic099.ps1 +++ /dev/null @@ -1,38 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Microsoft.PowerShell.Core\Import-Module Microsoft.PowerShell.Security -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$endpoint = @{ - Auth = @{ - Parameters = @{ - ServicePrincipalId = 'Some service principal ID' - ServicePrincipalKey = 'Some service principal key' - TenantId = 'Some tenant ID' - } - Scheme = 'ServicePrincipal' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - } -} -$variableSets = @( - @{ Version = [version]'0.9.9' } - @{ Version = [version]'1.0' } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - & $module { $script:azureModule = @{ Version = $args[0] } } $variableSet.Version - - Unregister-Mock Set-UserAgent - Register-Mock Set-UserAgent - # Act/Assert. - Assert-Throws { - & $module Initialize-AzureSubscription -Endpoint $endpoint - } -MessagePattern "AZ_ServicePrincipalAuthNotSupportedAzureVersion0 $($variableSet.Version)" -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenUnsupportedAuth.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenUnsupportedAuth.ps1 deleted file mode 100644 index 88c9f43..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Initialize-AzureSubscription.ThrowsWhenUnsupportedAuth.ps1 +++ /dev/null @@ -1,28 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$endpoint = @{ - Auth = @{ - Parameters = @{ - ServicePrincipalId = 'Some service principal ID' - ServicePrincipalKey = 'Some service principal key' - TenantId = 'Some tenant ID' - } - Scheme = 'Some unknown scheme' - } - Data = @{ - SubscriptionId = 'Some subscription ID' - SubscriptionName = 'Some subscription name' - } -} - -Register-Mock Set-UserAgent -# Act/Assert. -Assert-Throws { - & $module Initialize-AzureSubscription -Endpoint $endpoint -} -MessagePattern "AZ_UnsupportedAuthScheme0 Some unknown scheme" diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/L0.ts b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/L0.ts deleted file mode 100644 index b43348a..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/L0.ts +++ /dev/null @@ -1,112 +0,0 @@ -/// -/// -/// - -import Q = require('q'); -import assert = require('assert'); -import path = require('path'); -var psm = require('../../../../Tests/lib/psRunner'); -var psr = null; - -describe('Common-VstsAzureHelpers_ Suite', function () { - this.timeout(parseInt(process.env.TASK_TEST_TIMEOUT) || 20000); - - before((done) => { - if (psm.testSupported()) { - psr = new psm.PSRunner(); - psr.start(); - } - - done(); - }); - - after(function () { - if (psr) { - psr.kill(); - } - }); - - if (psm.testSupported()) { - it('(Import-AzureModule) azure preferred falls back', (done) => { - psr.run(path.join(__dirname, 'Import-AzureModule.AzurePreferredFallsBack.ps1'), done); - }) - it('(Import-AzureModule) azure rm preferred falls back', (done) => { - psr.run(path.join(__dirname, 'Import-AzureModule.AzureRMPreferredFallsBack.ps1'), done); - }) - it('(Import-AzureModule) both preferred falls back', (done) => { - psr.run(path.join(__dirname, 'Import-AzureModule.BothPreferredFallsBack.ps1'), done); - }) - it('(Import-AzureModule) throws when not found', (done) => { - psr.run(path.join(__dirname, 'Import-AzureModule.ThrowsWhenNotFound.ps1'), done); - }) - it('(Import-AzureModule) validates classic version', (done) => { - psr.run(path.join(__dirname, 'Import-AzureModule.ValidatesClassicVersion.ps1'), done); - }) - it('(Import-FromModulePath) imports modules', (done) => { - psr.run(path.join(__dirname, 'Import-FromModulePath.ImportsModules.ps1'), done); - }) - it('(Import-FromModulePath) returns false when not found', (done) => { - psr.run(path.join(__dirname, 'Import-FromModulePath.ReturnsFalseWhenNotFound.ps1'), done); - }) - it('(Import-FromModulePath) validate RM profile found', (done) => { - psr.run(path.join(__dirname, 'Import-FromModulePath.ValidatesRMProfileFound.ps1'), done); - }) - it('(Import-FromSdkPath) imports module', (done) => { - psr.run(path.join(__dirname, 'Import-FromSdkPath.ImportsModule.ps1'), done); - }) - it('(Import-FromSdkPath) returns false when not found', (done) => { - psr.run(path.join(__dirname, 'Import-FromSdkPath.ReturnsFalseWhenNotFound.ps1'), done); - }) - it('(Initialize-Azure) passes inputs', (done) => { - psr.run(path.join(__dirname, 'Initialize-Azure.PassesInputs.ps1'), done); - }) - it('(Initialize-Azure) throws when service name is null', (done) => { - psr.run(path.join(__dirname, 'Initialize-Azure.ThrowsWhenServiceNameIsNull.ps1'), done); - }) - it('(Initialize-AzureSubscription) manged service identity should pass ', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.ManagedServiceIdentity.ps1'), done); - }) - it('(Initialize-AzureSubscription) passes values when cert auth', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.PassesValuesWhenCertAuth.ps1'), done); - }) - it('(Initialize-AzureSubscription) passes values when SP auth', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.PassesValuesWhenSPAuth.ps1'), done); - }) - it('(Initialize-AzureSubscription) passes values when UP auth', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.PassesValuesWhenUPAuth.ps1'), done); - }) - it('(Initialize-AzureSubscription) throws useful error when SP auth and add account fails', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.ThrowsUsefulErrorWhenSPAuthAndAddAccountFails.ps1'), done); - }) - it('(Initialize-AzureSubscription) throws useful error when UP auth and add account fails', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.ThrowsUsefulErrorWhenUPAuthAndAddAccountFails.ps1'), done); - }) - it('(Initialize-AzureSubscription) throws when RM and cert auth', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.ThrowsWhenRMAndCertAuth.ps1'), done); - }) - it('(Initialize-AzureSubscription) passes values when cert auth and environment', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.PassesValuesWhenCertAuthAndEnvironment.ps1'), done); - }) - it('(Initialize-AzureSubscription) passes values when cert auth with service principal scheme', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.PassesValuesWhenSPNCertAuth.ps1'), done); - }) - it('(Initialize-AzureSubscription) throws when SP auth and classic 0.9.9', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.ThrowsWhenSPAuthAndClassic099.ps1'), done); - }) - it('(Initialize-AzureSubscription) throws when unsupported auth', (done) => { - psr.run(path.join(__dirname, 'Initialize-AzureSubscription.ThrowsWhenUnsupportedAuth.ps1'), done); - }) - it('(Set-CurrentAzureRMSubscription) passes values', (done) => { - psr.run(path.join(__dirname, 'Set-CurrentAzureRMSubscription.PassesValues.ps1'), done); - }) - it('(Set-CurrentAzureSubscription) passes values', (done) => { - psr.run(path.join(__dirname, 'Set-CurrentAzureSubscription.PassesValues.ps1'), done); - }) - it('(Set-UserAgent) passes values', (done) => { - psr.run(path.join(__dirname, 'Set-UserAgent.PassesValues.ps1'), done); - }) - it('Overriddes global debug preference', (done) => { - psr.run(path.join(__dirname, 'OverriddesGlobalDebugPreference.ps1'), done); - }) - } -}); \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/OverriddesGlobalDebugPreference.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/OverriddesGlobalDebugPreference.ps1 deleted file mode 100644 index 9460212..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/OverriddesGlobalDebugPreference.ps1 +++ /dev/null @@ -1,14 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -$global:DebugPreference = 'Continue' -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError - -# Act. -Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. - -# Assert. -Assert-AreEqual 'SilentlyContinue' $global:DebugPreference diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-CurrentAzureRMSubscription.PassesValues.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-CurrentAzureRMSubscription.PassesValues.ps1 deleted file mode 100644 index 10e5d93..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-CurrentAzureRMSubscription.PassesValues.ps1 +++ /dev/null @@ -1,34 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$variableSets = @( - @{ - SubscriptionId = 'Some subscription ID' - TenantId = $null - } - @{ - SubscriptionId = 'Some subscription ID' - TenantId = 'Some tenant ID' - } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Select-AzureRMSubscription - Register-Mock Select-AzureRMSubscription - - # Act. - & $module Set-CurrentAzureRMSubscription -SubscriptionId $variableSet.SubscriptionId -TenantId $variableSet.TenantId - - # Assert. - if ($variableSet.TenantId) { - # The TenantId parameter ends in ":" for the assertion because it's splatted. - Assert-WasCalled Select-AzureRMSubscription -- -SubscriptionId $variableSet.SubscriptionId -TenantId: $variableSet.TenantId - } else { - Assert-WasCalled Select-AzureRMSubscription -- -SubscriptionId $variableSet.SubscriptionId - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-CurrentAzureSubscription.PassesValues.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-CurrentAzureSubscription.PassesValues.ps1 deleted file mode 100644 index eea90d4..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-CurrentAzureSubscription.PassesValues.ps1 +++ /dev/null @@ -1,66 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru -$variableSets = @( - @{ - SubscriptionId = 'Some subscription ID' - Version = [version]'1.0' - StorageAccount = $null - ExpectDefaultSwitch = $false - } - @{ - SubscriptionId = 'Some subscription ID' - Version = [version]'0.8.14' - StorageAccount = $null - ExpectDefaultSwitch = $true - } - @{ - SubscriptionId = 'Some subscription ID' - Version = [version]'1.0' - StorageAccount = 'Some storage account' - ExpectDefaultSwitch = $false - } -) -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Select-AzureSubscription - Unregister-Mock Set-AzureSubscription - Register-Mock Select-AzureSubscription - Register-Mock Set-AzureSubscription - & $module { $script:azureModule = @{ Version = $args[0] } } $variableSet.Version - - # Act. - & $module Set-CurrentAzureSubscription -SubscriptionId $variableSet.SubscriptionId -StorageAccount $variableSet.StorageAccount - - # Assert. - if ($variableSet.ExpectDefaultSwitch) { - Assert-WasCalled Select-AzureSubscription -- -SubscriptionId $variableSet.SubscriptionId -Default: $true - } else { - Assert-WasCalled Select-AzureSubscription -- -SubscriptionId $variableSet.SubscriptionId - } - - if ($variableSet.StorageAccount) { - Assert-WasCalled Set-AzureSubscription -- -SubscriptionId $variableSet.SubscriptionId -CurrentStorageAccountName $variableSet.StorageAccount - } else { - Assert-WasCalled Set-AzureSubscription -Times 0 - } -} -<# -function Set-CurrentAzureRMSubscription { - [CmdletBinding()] - param( - [Parameter(Mandatory=$true)] - [string]$SubscriptionId, - [string]$TenantId) - - $additional = @{ } - if ($TenantId) { $additional['TenantId'] = $TenantId } - Write-Host "##[command]Select-AzureRMSubscription -SubscriptionId $SubscriptionId $(Format-Splat $additional)" - $null = Select-AzureRMSubscription -SubscriptionId $SubscriptionId @additional -} -#> \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-UserAgent.PassesValues.ps1 b/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-UserAgent.PassesValues.ps1 deleted file mode 100644 index d1761b2..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/Tests/Set-UserAgent.PassesValues.ps1 +++ /dev/null @@ -1,35 +0,0 @@ -[CmdletBinding()] -param() - -# Arrange. -. $PSScriptRoot\..\..\..\..\Tests\lib\Initialize-Test.ps1 -Unregister-Mock Import-Module -Register-Mock Write-VstsTaskError -$module = Microsoft.PowerShell.Core\Import-Module $PSScriptRoot\.. -PassThru - -$variableSets = @( - @{ - UserAgent = 'tfs_build' - } - @{ - UserAgent = '' - } -) - -foreach ($variableSet in $variableSets) { - Write-Verbose ('-' * 80) - Unregister-Mock Get-VstsTaskVariable - Unregister-Mock Set-UserAgent_Core - Register-Mock Get-VstsTaskVariable { $variableSet.UserAgent } -- -Name AZURE_HTTP_USER_AGENT - Register-Mock Set-UserAgent_Core - - # Act. - & $module Set-UserAgent - - # Assert. - if ($variableSet.UserAgent) { - Assert-WasCalled Set-UserAgent_Core -- -UserAgent 'tfs_build' - } else { - Assert-WasCalled Set-UserAgent_Core -Times 0 - } -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/VstsAzureHelpers_.psm1 b/arm-outputs/ps_modules/VstsAzureHelpers_/VstsAzureHelpers_.psm1 deleted file mode 100644 index d6f19a8..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/VstsAzureHelpers_.psm1 +++ /dev/null @@ -1,61 +0,0 @@ -# Private module-scope variables. -$script:azureModule = $null -$script:azureRMProfileModule = $null - -# Override the DebugPreference. -if ($global:DebugPreference -eq 'Continue') { - Write-Verbose '$OVERRIDING $global:DebugPreference from ''Continue'' to ''SilentlyContinue''.' - $global:DebugPreference = 'SilentlyContinue' -} - -# Import the loc strings. -Import-VstsLocStrings -LiteralPath $PSScriptRoot/module.json - -Import-Module $PSScriptRoot/../TlsHelper_ -Add-Tls12InSession - -# Dot source the private functions. -. $PSScriptRoot/InitializeFunctions.ps1 -. $PSScriptRoot/ImportFunctions.ps1 - -# This is the only public function. -function Initialize-Azure { - [CmdletBinding()] - param( [string] $azurePsVersion, - [switch] $strict ) - Trace-VstsEnteringInvocation $MyInvocation - try { - # Get the inputs. - $serviceNameInput = Get-VstsInput -Name ConnectedServiceNameSelector -Default 'ConnectedServiceName' - $serviceName = Get-VstsInput -Name $serviceNameInput -Default (Get-VstsInput -Name DeploymentEnvironmentName) - if (!$serviceName) { - # Let the task SDK throw an error message if the input isn't defined. - Get-VstsInput -Name $serviceNameInput -Require - } - - $endpoint = Get-VstsEndpoint -Name $serviceName -Require - $storageAccount = Get-VstsInput -Name StorageAccount - - # Determine which modules are preferred. - $preferredModules = @( ) - if (($endpoint.Auth.Scheme -eq 'ServicePrincipal') -or ($endpoint.Auth.Scheme -eq 'ManagedServiceIdentity')) { - $preferredModules += 'AzureRM' - } elseif ($endpoint.Auth.Scheme -eq 'UserNamePassword' -and $strict -eq $false) { - $preferredModules += 'Azure' - $preferredModules += 'AzureRM' - } else { - $preferredModules += 'Azure' - } - - # Import/initialize the Azure module. - Import-AzureModule -PreferredModule $preferredModules -azurePsVersion $azurePsVersion -strict:$strict - Initialize-AzureSubscription -Endpoint $endpoint -StorageAccount $storageAccount - } finally { - Trace-VstsLeavingInvocation $MyInvocation - } -} - -# Export only the public function. -Export-ModuleMember -Function Initialize-Azure -Export-ModuleMember -Function CmdletHasMember -Export-ModuleMember -Function Remove-EndpointSecrets \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/make.json b/arm-outputs/ps_modules/VstsAzureHelpers_/make.json deleted file mode 100644 index 421a268..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/make.json +++ /dev/null @@ -1,11 +0,0 @@ -{ - "externals": { - "archivePackages": [ - { - "archiveName": "openssl.zip", - "url": "https://vstsagenttools.blob.core.windows.net/tools/openssl/1.0.2/M138/openssl.zip", - "dest": "./openssl" - } - ] - } -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/module.json b/arm-outputs/ps_modules/VstsAzureHelpers_/module.json deleted file mode 100644 index 002b72a..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/module.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "messages": { - "AZ_AzureRMProfileModuleNotFound": "Module 'AzureRM.Profile' not found. The 'AzureRM' module may not be fully installed. Running the following PowerShell commands from an elevated session may resolve the issue: Import-Module AzureRM ; Install-AzureRM", - "AZ_CertificateAuthNotSupported": "Certificate based authentication is not supported. Azure PowerShell module is not found.", - "AZ_CredentialsError": "There was an error with the Azure credentials used for the deployment.", - "AZ_ModuleNotFound": "Could not find the modules: '{1}' with Version: '{0}'. If the module was recently installed, retry after restarting the VSTS task agent.", - "AZ_RequiresMinVersion0": "The required minimum version ({0}) of the Azure PowerShell module is not installed.", - "AZ_ServicePrincipalError": "There was an error with the service principal used for the deployment.", - "AZ_ServicePrincipalAuthNotSupportedAzureVersion0": "Service principal authentication is not supported in version '{0}' of the Azure module.", - "AZ_UnsupportedAuthScheme0": "Unsupported authentication scheme '{0}' for Azure endpoint.", - "AZ_AvailableModules": "The list of available {0} modules:", - "AZ_InvalidARMEndpoint": "Specified AzureRM endpoint is invalid.", - "AZ_MsiAccessNotConfiguredProperlyFailure": "Could not fetch access token for Managed Service Principal. Please configure Managed Service Identity (MSI) for virtual machine 'https://aka.ms/azure-msi-docs'. Status code: '{0}', status message: {1}", - "AZ_MsiAccessTokenFetchFailure": "Could not fetch access token for Managed Service Principal. Status code: '{0}', status message: {1}" , - "AZ_MsiFailure": "Could not fetch access token for Managed Service Principal. {0}" - } -} diff --git a/arm-outputs/ps_modules/VstsAzureHelpers_/tsconfig.json b/arm-outputs/ps_modules/VstsAzureHelpers_/tsconfig.json deleted file mode 100644 index 0438b79..0000000 --- a/arm-outputs/ps_modules/VstsAzureHelpers_/tsconfig.json +++ /dev/null @@ -1,6 +0,0 @@ -{ - "compilerOptions": { - "target": "ES6", - "module": "commonjs" - } -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/FindFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/FindFunctions.ps1 deleted file mode 100755 index 9803c2d..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/FindFunctions.ps1 +++ /dev/null @@ -1,728 +0,0 @@ -<# -.SYNOPSIS -Finds files using match patterns. - -.DESCRIPTION -Determines the find root from a list of patterns. Performs the find and then applies the glob patterns. Supports interleaved exclude patterns. Unrooted patterns are rooted using defaultRoot, unless matchOptions.matchBase is specified and the pattern is a basename only. For matchBase cases, the defaultRoot is used as the find root. - -.PARAMETER DefaultRoot -Default path to root unrooted patterns. Falls back to System.DefaultWorkingDirectory or current location. - -.PARAMETER Pattern -Patterns to apply. Supports interleaved exclude patterns. - -.PARAMETER FindOptions -When the FindOptions parameter is not specified, defaults to (New-VstsFindOptions -FollowSymbolicLinksTrue). Following soft links is generally appropriate unless deleting files. - -.PARAMETER MatchOptions -When the MatchOptions parameter is not specified, defaults to (New-VstsMatchOptions -Dot -NoBrace -NoCase). -#> -function Find-Match { - [CmdletBinding()] - param( - [Parameter()] - [string]$DefaultRoot, - [Parameter()] - [string[]]$Pattern, - $FindOptions, - $MatchOptions) - - Trace-EnteringInvocation $MyInvocation -Parameter None - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - - # Apply defaults for parameters and trace. - if (!$DefaultRoot) { - $DefaultRoot = Get-TaskVariable -Name 'System.DefaultWorkingDirectory' -Default (Get-Location).Path - } - - Write-Verbose "DefaultRoot: '$DefaultRoot'" - if (!$FindOptions) { - $FindOptions = New-FindOptions -FollowSpecifiedSymbolicLink -FollowSymbolicLinks - } - - Trace-FindOptions -Options $FindOptions - if (!$MatchOptions) { - $MatchOptions = New-MatchOptions -Dot -NoBrace -NoCase - } - - Trace-MatchOptions -Options $MatchOptions - Add-Type -LiteralPath $PSScriptRoot\Minimatch.dll - - # Normalize slashes for root dir. - $DefaultRoot = ConvertTo-NormalizedSeparators -Path $DefaultRoot - - $results = @{ } - $originalMatchOptions = $MatchOptions - foreach ($pat in $Pattern) { - Write-Verbose "Pattern: '$pat'" - - # Trim and skip empty. - $pat = "$pat".Trim() - if (!$pat) { - Write-Verbose 'Skipping empty pattern.' - continue - } - - # Clone match options. - $MatchOptions = Copy-MatchOptions -Options $originalMatchOptions - - # Skip comments. - if (!$MatchOptions.NoComment -and $pat.StartsWith('#')) { - Write-Verbose 'Skipping comment.' - continue - } - - # Set NoComment. Brace expansion could result in a leading '#'. - $MatchOptions.NoComment = $true - - # Determine whether pattern is include or exclude. - $negateCount = 0 - if (!$MatchOptions.NoNegate) { - while ($negateCount -lt $pat.Length -and $pat[$negateCount] -eq '!') { - $negateCount++ - } - - $pat = $pat.Substring($negateCount) # trim leading '!' - if ($negateCount) { - Write-Verbose "Trimmed leading '!'. Pattern: '$pat'" - } - } - - $isIncludePattern = $negateCount -eq 0 -or - ($negateCount % 2 -eq 0 -and !$MatchOptions.FlipNegate) -or - ($negateCount % 2 -eq 1 -and $MatchOptions.FlipNegate) - - # Set NoNegate. Brace expansion could result in a leading '!'. - $MatchOptions.NoNegate = $true - $MatchOptions.FlipNegate = $false - - # Trim and skip empty. - $pat = "$pat".Trim() - if (!$pat) { - Write-Verbose 'Skipping empty pattern.' - continue - } - - # Expand braces - required to accurately interpret findPath. - $expanded = $null - $preExpanded = $pat - if ($MatchOptions.NoBrace) { - $expanded = @( $pat ) - } else { - # Convert slashes on Windows before calling braceExpand(). Unfortunately this means braces cannot - # be escaped on Windows, this limitation is consistent with current limitations of minimatch (3.0.3). - Write-Verbose "Expanding braces." - $convertedPattern = $pat -replace '\\', '/' - $expanded = [Minimatch.Minimatcher]::BraceExpand( - $convertedPattern, - (ConvertTo-MinimatchOptions -Options $MatchOptions)) - } - - # Set NoBrace. - $MatchOptions.NoBrace = $true - - foreach ($pat in $expanded) { - if ($pat -ne $preExpanded) { - Write-Verbose "Pattern: '$pat'" - } - - # Trim and skip empty. - $pat = "$pat".Trim() - if (!$pat) { - Write-Verbose "Skipping empty pattern." - continue - } - - if ($isIncludePattern) { - # Determine the findPath. - $findInfo = Get-FindInfoFromPattern -DefaultRoot $DefaultRoot -Pattern $pat -MatchOptions $MatchOptions - $findPath = $findInfo.FindPath - Write-Verbose "FindPath: '$findPath'" - - if (!$findPath) { - Write-Verbose "Skipping empty path." - continue - } - - # Perform the find. - Write-Verbose "StatOnly: '$($findInfo.StatOnly)'" - [string[]]$findResults = @( ) - if ($findInfo.StatOnly) { - # Simply stat the path - all path segments were used to build the path. - if ((Test-Path -LiteralPath $findPath)) { - $findResults += $findPath - } - } else { - $findResults = Get-FindResult -Path $findPath -Options $FindOptions - } - - Write-Verbose "Found $($findResults.Count) paths." - - # Apply the pattern. - Write-Verbose "Applying include pattern." - if ($findInfo.AdjustedPattern -ne $pat) { - Write-Verbose "AdjustedPattern: '$($findInfo.AdjustedPattern)'" - $pat = $findInfo.AdjustedPattern - } - - $matchResults = [Minimatch.Minimatcher]::Filter( - $findResults, - $pat, - (ConvertTo-MinimatchOptions -Options $MatchOptions)) - - # Union the results. - $matchCount = 0 - foreach ($matchResult in $matchResults) { - $matchCount++ - $results[$matchResult.ToUpperInvariant()] = $matchResult - } - - Write-Verbose "$matchCount matches" - } else { - # Check if basename only and MatchBase=true. - if ($MatchOptions.MatchBase -and - !(Test-Rooted -Path $pat) -and - ($pat -replace '\\', '/').IndexOf('/') -lt 0) { - - # Do not root the pattern. - Write-Verbose "MatchBase and basename only." - } else { - # Root the exclude pattern. - $pat = Get-RootedPattern -DefaultRoot $DefaultRoot -Pattern $pat - Write-Verbose "After Get-RootedPattern, pattern: '$pat'" - } - - # Apply the pattern. - Write-Verbose 'Applying exclude pattern.' - $matchResults = [Minimatch.Minimatcher]::Filter( - [string[]]$results.Values, - $pat, - (ConvertTo-MinimatchOptions -Options $MatchOptions)) - - # Subtract the results. - $matchCount = 0 - foreach ($matchResult in $matchResults) { - $matchCount++ - $results.Remove($matchResult.ToUpperInvariant()) - } - - Write-Verbose "$matchCount matches" - } - } - } - - $finalResult = @( $results.Values | Sort-Object ) - Write-Verbose "$($finalResult.Count) final results" - return $finalResult - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } finally { - Trace-LeavingInvocation -InvocationInfo $MyInvocation - } -} - -<# -.SYNOPSIS -Creates FindOptions for use with Find-VstsMatch. - -.DESCRIPTION -Creates FindOptions for use with Find-VstsMatch. Contains switches to control whether to follow symlinks. - -.PARAMETER FollowSpecifiedSymbolicLink -Indicates whether to traverse descendants if the specified path is a symbolic link directory. Does not cause nested symbolic link directories to be traversed. - -.PARAMETER FollowSymbolicLinks -Indicates whether to traverse descendants of symbolic link directories. -#> -function New-FindOptions { - [CmdletBinding()] - param( - [switch]$FollowSpecifiedSymbolicLink, - [switch]$FollowSymbolicLinks) - - return New-Object psobject -Property @{ - FollowSpecifiedSymbolicLink = $FollowSpecifiedSymbolicLink.IsPresent - FollowSymbolicLinks = $FollowSymbolicLinks.IsPresent - } -} - -<# -.SYNOPSIS -Creates MatchOptions for use with Find-VstsMatch and Select-VstsMatch. - -.DESCRIPTION -Creates MatchOptions for use with Find-VstsMatch and Select-VstsMatch. Contains switches to control which pattern matching options are applied. -#> -function New-MatchOptions { - [CmdletBinding()] - param( - [switch]$Dot, - [switch]$FlipNegate, - [switch]$MatchBase, - [switch]$NoBrace, - [switch]$NoCase, - [switch]$NoComment, - [switch]$NoExt, - [switch]$NoGlobStar, - [switch]$NoNegate, - [switch]$NoNull) - - return New-Object psobject -Property @{ - Dot = $Dot.IsPresent - FlipNegate = $FlipNegate.IsPresent - MatchBase = $MatchBase.IsPresent - NoBrace = $NoBrace.IsPresent - NoCase = $NoCase.IsPresent - NoComment = $NoComment.IsPresent - NoExt = $NoExt.IsPresent - NoGlobStar = $NoGlobStar.IsPresent - NoNegate = $NoNegate.IsPresent - NoNull = $NoNull.IsPresent - } -} - -<# -.SYNOPSIS -Applies match patterns against a list of files. - -.DESCRIPTION -Applies match patterns to a list of paths. Supports interleaved exclude patterns. - -.PARAMETER ItemPath -Array of paths. - -.PARAMETER Pattern -Patterns to apply. Supports interleaved exclude patterns. - -.PARAMETER PatternRoot -Default root to apply to unrooted patterns. Not applied to basename-only patterns when Options.MatchBase is true. - -.PARAMETER Options -When the Options parameter is not specified, defaults to (New-VstsMatchOptions -Dot -NoBrace -NoCase). -#> -function Select-Match { - [CmdletBinding()] - param( - [Parameter()] - [string[]]$ItemPath, - [Parameter()] - [string[]]$Pattern, - [Parameter()] - [string]$PatternRoot, - $Options) - - - Trace-EnteringInvocation $MyInvocation -Parameter None - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - if (!$Options) { - $Options = New-MatchOptions -Dot -NoBrace -NoCase - } - - Trace-MatchOptions -Options $Options - Add-Type -LiteralPath $PSScriptRoot\Minimatch.dll - - # Hashtable to keep track of matches. - $map = @{ } - - $originalOptions = $Options - foreach ($pat in $Pattern) { - Write-Verbose "Pattern: '$pat'" - - # Trim and skip empty. - $pat = "$pat".Trim() - if (!$pat) { - Write-Verbose 'Skipping empty pattern.' - continue - } - - # Clone match options. - $Options = Copy-MatchOptions -Options $originalOptions - - # Skip comments. - if (!$Options.NoComment -and $pat.StartsWith('#')) { - Write-Verbose 'Skipping comment.' - continue - } - - # Set NoComment. Brace expansion could result in a leading '#'. - $Options.NoComment = $true - - # Determine whether pattern is include or exclude. - $negateCount = 0 - if (!$Options.NoNegate) { - while ($negateCount -lt $pat.Length -and $pat[$negateCount] -eq '!') { - $negateCount++ - } - - $pat = $pat.Substring($negateCount) # trim leading '!' - if ($negateCount) { - Write-Verbose "Trimmed leading '!'. Pattern: '$pat'" - } - } - - $isIncludePattern = $negateCount -eq 0 -or - ($negateCount % 2 -eq 0 -and !$Options.FlipNegate) -or - ($negateCount % 2 -eq 1 -and $Options.FlipNegate) - - # Set NoNegate. Brace expansion could result in a leading '!'. - $Options.NoNegate = $true - $Options.FlipNegate = $false - - # Expand braces - required to accurately root patterns. - $expanded = $null - $preExpanded = $pat - if ($Options.NoBrace) { - $expanded = @( $pat ) - } else { - # Convert slashes on Windows before calling braceExpand(). Unfortunately this means braces cannot - # be escaped on Windows, this limitation is consistent with current limitations of minimatch (3.0.3). - Write-Verbose "Expanding braces." - $convertedPattern = $pat -replace '\\', '/' - $expanded = [Minimatch.Minimatcher]::BraceExpand( - $convertedPattern, - (ConvertTo-MinimatchOptions -Options $Options)) - } - - # Set NoBrace. - $Options.NoBrace = $true - - foreach ($pat in $expanded) { - if ($pat -ne $preExpanded) { - Write-Verbose "Pattern: '$pat'" - } - - # Trim and skip empty. - $pat = "$pat".Trim() - if (!$pat) { - Write-Verbose "Skipping empty pattern." - continue - } - - # Root the pattern when all of the following conditions are true: - if ($PatternRoot -and # PatternRoot is supplied - !(Test-Rooted -Path $pat) -and # AND pattern is not rooted - # # AND MatchBase=false or not basename only - (!$Options.MatchBase -or ($pat -replace '\\', '/').IndexOf('/') -ge 0)) { - - # Root the include pattern. - $pat = Get-RootedPattern -DefaultRoot $PatternRoot -Pattern $pat - Write-Verbose "After Get-RootedPattern, pattern: '$pat'" - } - - if ($isIncludePattern) { - # Apply the pattern. - Write-Verbose 'Applying include pattern against original list.' - $matchResults = [Minimatch.Minimatcher]::Filter( - $ItemPath, - $pat, - (ConvertTo-MinimatchOptions -Options $Options)) - - # Union the results. - $matchCount = 0 - foreach ($matchResult in $matchResults) { - $matchCount++ - $map[$matchResult] = $true - } - - Write-Verbose "$matchCount matches" - } else { - # Apply the pattern. - Write-Verbose 'Applying exclude pattern against original list' - $matchResults = [Minimatch.Minimatcher]::Filter( - $ItemPath, - $pat, - (ConvertTo-MinimatchOptions -Options $Options)) - - # Subtract the results. - $matchCount = 0 - foreach ($matchResult in $matchResults) { - $matchCount++ - $map.Remove($matchResult) - } - - Write-Verbose "$matchCount matches" - } - } - } - - # return a filtered version of the original list (preserves order and prevents duplication) - $result = $ItemPath | Where-Object { $map[$_] } - Write-Verbose "$($result.Count) final results" - $result - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } finally { - Trace-LeavingInvocation -InvocationInfo $MyInvocation - } -} - -################################################################################ -# Private functions. -################################################################################ - -function Copy-MatchOptions { - [CmdletBinding()] - param($Options) - - return New-Object psobject -Property @{ - Dot = $Options.Dot -eq $true - FlipNegate = $Options.FlipNegate -eq $true - MatchBase = $Options.MatchBase -eq $true - NoBrace = $Options.NoBrace -eq $true - NoCase = $Options.NoCase -eq $true - NoComment = $Options.NoComment -eq $true - NoExt = $Options.NoExt -eq $true - NoGlobStar = $Options.NoGlobStar -eq $true - NoNegate = $Options.NoNegate -eq $true - NoNull = $Options.NoNull -eq $true - } -} - -function ConvertTo-MinimatchOptions { - [CmdletBinding()] - param($Options) - - $opt = New-Object Minimatch.Options - $opt.AllowWindowsPaths = $true - $opt.Dot = $Options.Dot -eq $true - $opt.FlipNegate = $Options.FlipNegate -eq $true - $opt.MatchBase = $Options.MatchBase -eq $true - $opt.NoBrace = $Options.NoBrace -eq $true - $opt.NoCase = $Options.NoCase -eq $true - $opt.NoComment = $Options.NoComment -eq $true - $opt.NoExt = $Options.NoExt -eq $true - $opt.NoGlobStar = $Options.NoGlobStar -eq $true - $opt.NoNegate = $Options.NoNegate -eq $true - $opt.NoNull = $Options.NoNull -eq $true - return $opt -} - -function ConvertTo-NormalizedSeparators { - [CmdletBinding()] - param([string]$Path) - - # Convert slashes. - $Path = "$Path".Replace('/', '\') - - # Remove redundant slashes. - $isUnc = $Path -match '^\\\\+[^\\]' - $Path = $Path -replace '\\\\+', '\' - if ($isUnc) { - $Path = '\' + $Path - } - - return $Path -} - -function Get-FindInfoFromPattern { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$DefaultRoot, - [Parameter(Mandatory = $true)] - [string]$Pattern, - [Parameter(Mandatory = $true)] - $MatchOptions) - - if (!$MatchOptions.NoBrace) { - throw "Get-FindInfoFromPattern expected MatchOptions.NoBrace to be true." - } - - # For the sake of determining the find path, pretend NoCase=false. - $MatchOptions = Copy-MatchOptions -Options $MatchOptions - $MatchOptions.NoCase = $false - - # Check if basename only and MatchBase=true - if ($MatchOptions.MatchBase -and - !(Test-Rooted -Path $Pattern) -and - ($Pattern -replace '\\', '/').IndexOf('/') -lt 0) { - - return New-Object psobject -Property @{ - AdjustedPattern = $Pattern - FindPath = $DefaultRoot - StatOnly = $false - } - } - - # The technique applied by this function is to use the information on the Minimatch object determine - # the findPath. Minimatch breaks the pattern into path segments, and exposes information about which - # segments are literal vs patterns. - # - # Note, the technique currently imposes a limitation for drive-relative paths with a glob in the - # first segment, e.g. C:hello*/world. It's feasible to overcome this limitation, but is left unsolved - # for now. - $minimatchObj = New-Object Minimatch.Minimatcher($Pattern, (ConvertTo-MinimatchOptions -Options $MatchOptions)) - - # The "set" field is a two-dimensional enumerable of parsed path segment info. The outer enumerable should only - # contain one item, otherwise something went wrong. Brace expansion can result in multiple items in the outer - # enumerable, but that should be turned off by the time this function is reached. - # - # Note, "set" is a private field in the .NET implementation but is documented as a feature in the nodejs - # implementation. The .NET implementation is a port and is by a different author. - $setFieldInfo = $minimatchObj.GetType().GetField('set', 'Instance,NonPublic') - [object[]]$set = $setFieldInfo.GetValue($minimatchObj) - if ($set.Count -ne 1) { - throw "Get-FindInfoFromPattern expected Minimatch.Minimatcher(...).set.Count to be 1. Actual: '$($set.Count)'" - } - - [string[]]$literalSegments = @( ) - [object[]]$parsedSegments = $set[0] - foreach ($parsedSegment in $parsedSegments) { - if ($parsedSegment.GetType().Name -eq 'LiteralItem') { - # The item is a LiteralItem when the original input for the path segment does not contain any - # unescaped glob characters. - $literalSegments += $parsedSegment.Source; - continue - } - - break; - } - - # Join the literal segments back together. Minimatch converts '\' to '/' on Windows, then squashes - # consequetive slashes, and finally splits on slash. This means that UNC format is lost, but can - # be detected from the original pattern. - $joinedSegments = [string]::Join('/', $literalSegments) - if ($joinedSegments -and ($Pattern -replace '\\', '/').StartsWith('//')) { - $joinedSegments = '/' + $joinedSegments # restore UNC format - } - - # Determine the find path. - $findPath = '' - if ((Test-Rooted -Path $Pattern)) { # The pattern is rooted. - $findPath = $joinedSegments - } elseif ($joinedSegments) { # The pattern is not rooted, and literal segements were found. - $findPath = [System.IO.Path]::Combine($DefaultRoot, $joinedSegments) - } else { # The pattern is not rooted, and no literal segements were found. - $findPath = $DefaultRoot - } - - # Clean up the path. - if ($findPath) { - $findPath = [System.IO.Path]::GetDirectoryName(([System.IO.Path]::Combine($findPath, '_'))) # Hack to remove unnecessary trailing slash. - $findPath = ConvertTo-NormalizedSeparators -Path $findPath - } - - return New-Object psobject -Property @{ - AdjustedPattern = Get-RootedPattern -DefaultRoot $DefaultRoot -Pattern $Pattern - FindPath = $findPath - StatOnly = $literalSegments.Count -eq $parsedSegments.Count - } -} - -function Get-FindResult { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Path, - [Parameter(Mandatory = $true)] - $Options) - - if (!(Test-Path -LiteralPath $Path)) { - Write-Verbose 'Path not found.' - return - } - - $Path = ConvertTo-NormalizedSeparators -Path $Path - - # Push the first item. - [System.Collections.Stack]$stack = New-Object System.Collections.Stack - $stack.Push((Get-Item -LiteralPath $Path)) - - $count = 0 - while ($stack.Count) { - # Pop the next item and yield the result. - $item = $stack.Pop() - $count++ - $item.FullName - - # Traverse. - if (($item.Attributes -band 0x00000010) -eq 0x00000010) { # Directory - if (($item.Attributes -band 0x00000400) -ne 0x00000400 -or # ReparsePoint - $Options.FollowSymbolicLinks -or - ($count -eq 1 -and $Options.FollowSpecifiedSymbolicLink)) { - - $childItems = @( Get-DirectoryChildItem -Path $Item.FullName -Force ) - [System.Array]::Reverse($childItems) - foreach ($childItem in $childItems) { - $stack.Push($childItem) - } - } - } - } -} - -function Get-RootedPattern { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$DefaultRoot, - [Parameter(Mandatory = $true)] - [string]$Pattern) - - if ((Test-Rooted -Path $Pattern)) { - return $Pattern - } - - # Normalize root. - $DefaultRoot = ConvertTo-NormalizedSeparators -Path $DefaultRoot - - # Escape special glob characters. - $DefaultRoot = $DefaultRoot -replace '(\[)(?=[^\/]+\])', '[[]' # Escape '[' when ']' follows within the path segment - $DefaultRoot = $DefaultRoot.Replace('?', '[?]') # Escape '?' - $DefaultRoot = $DefaultRoot.Replace('*', '[*]') # Escape '*' - $DefaultRoot = $DefaultRoot -replace '\+\(', '[+](' # Escape '+(' - $DefaultRoot = $DefaultRoot -replace '@\(', '[@](' # Escape '@(' - $DefaultRoot = $DefaultRoot -replace '!\(', '[!](' # Escape '!(' - - if ($DefaultRoot -like '[A-Z]:') { # e.g. C: - return "$DefaultRoot$Pattern" - } - - # Ensure root ends with a separator. - if (!$DefaultRoot.EndsWith('\')) { - $DefaultRoot = "$DefaultRoot\" - } - - return "$DefaultRoot$Pattern" -} - -function Test-Rooted { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Path) - - $Path = ConvertTo-NormalizedSeparators -Path $Path - return $Path.StartsWith('\') -or # e.g. \ or \hello or \\hello - $Path -like '[A-Z]:*' # e.g. C: or C:\hello -} - -function Trace-MatchOptions { - [CmdletBinding()] - param($Options) - - Write-Verbose "MatchOptions.Dot: '$($Options.Dot)'" - Write-Verbose "MatchOptions.FlipNegate: '$($Options.FlipNegate)'" - Write-Verbose "MatchOptions.MatchBase: '$($Options.MatchBase)'" - Write-Verbose "MatchOptions.NoBrace: '$($Options.NoBrace)'" - Write-Verbose "MatchOptions.NoCase: '$($Options.NoCase)'" - Write-Verbose "MatchOptions.NoComment: '$($Options.NoComment)'" - Write-Verbose "MatchOptions.NoExt: '$($Options.NoExt)'" - Write-Verbose "MatchOptions.NoGlobStar: '$($Options.NoGlobStar)'" - Write-Verbose "MatchOptions.NoNegate: '$($Options.NoNegate)'" - Write-Verbose "MatchOptions.NoNull: '$($Options.NoNull)'" -} - -function Trace-FindOptions { - [CmdletBinding()] - param($Options) - - Write-Verbose "FindOptions.FollowSpecifiedSymbolicLink: '$($FindOptions.FollowSpecifiedSymbolicLink)'" - Write-Verbose "FindOptions.FollowSymbolicLinks: '$($FindOptions.FollowSymbolicLinks)'" -} diff --git a/arm-outputs/ps_modules/VstsTaskSdk/InputFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/InputFunctions.ps1 deleted file mode 100755 index 846492d..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/InputFunctions.ps1 +++ /dev/null @@ -1,493 +0,0 @@ -# Hash table of known variable info. The formatted env var name is the lookup key. -# -# The purpose of this hash table is to keep track of known variables. The hash table -# needs to be maintained for multiple reasons: -# 1) to distinguish between env vars and job vars -# 2) to distinguish between secret vars and public -# 3) to know the real variable name and not just the formatted env var name. -$script:knownVariables = @{ } -$script:vault = @{ } - -<# -.SYNOPSIS -Gets an endpoint. - -.DESCRIPTION -Gets an endpoint object for the specified endpoint name. The endpoint is returned as an object with three properties: Auth, Data, and Url. - -The Data property requires a 1.97 agent or higher. - -.PARAMETER Require -Writes an error to the error pipeline if the endpoint is not found. -#> -function Get-Endpoint { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Name, - [switch]$Require) - - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - - # Get the URL. - $description = Get-LocString -Key PSLIB_EndpointUrl0 -ArgumentList $Name - $key = "ENDPOINT_URL_$Name" - $url = Get-VaultValue -Description $description -Key $key -Require:$Require - - # Get the auth object. - $description = Get-LocString -Key PSLIB_EndpointAuth0 -ArgumentList $Name - $key = "ENDPOINT_AUTH_$Name" - if ($auth = (Get-VaultValue -Description $description -Key $key -Require:$Require)) { - $auth = ConvertFrom-Json -InputObject $auth - } - - # Get the data. - $description = "'$Name' service endpoint data" - $key = "ENDPOINT_DATA_$Name" - if ($data = (Get-VaultValue -Description $description -Key $key)) { - $data = ConvertFrom-Json -InputObject $data - } - - # Return the endpoint. - if ($url -or $auth -or $data) { - New-Object -TypeName psobject -Property @{ - Url = $url - Auth = $auth - Data = $data - } - } - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } -} - -<# -.SYNOPSIS -Gets a secure file ticket. - -.DESCRIPTION -Gets the secure file ticket that can be used to download the secure file contents. - -.PARAMETER Id -Secure file id. - -.PARAMETER Require -Writes an error to the error pipeline if the ticket is not found. -#> -function Get-SecureFileTicket { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Id, - [switch]$Require) - - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - - $description = Get-LocString -Key PSLIB_Input0 -ArgumentList $Id - $key = "SECUREFILE_TICKET_$Id" - - Get-VaultValue -Description $description -Key $key -Require:$Require - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } -} - -<# -.SYNOPSIS -Gets a secure file name. - -.DESCRIPTION -Gets the name for a secure file. - -.PARAMETER Id -Secure file id. - -.PARAMETER Require -Writes an error to the error pipeline if the ticket is not found. -#> -function Get-SecureFileName { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Id, - [switch]$Require) - - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - - $description = Get-LocString -Key PSLIB_Input0 -ArgumentList $Id - $key = "SECUREFILE_NAME_$Id" - - Get-VaultValue -Description $description -Key $key -Require:$Require - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } -} - -<# -.SYNOPSIS -Gets an input. - -.DESCRIPTION -Gets the value for the specified input name. - -.PARAMETER AsBool -Returns the value as a bool. Returns true if the value converted to a string is "1" or "true" (case insensitive); otherwise false. - -.PARAMETER AsInt -Returns the value as an int. Returns the value converted to an int. Returns 0 if the conversion fails. - -.PARAMETER Default -Default value to use if the input is null or empty. - -.PARAMETER Require -Writes an error to the error pipeline if the input is null or empty. -#> -function Get-Input { - [CmdletBinding(DefaultParameterSetName = 'Require')] - param( - [Parameter(Mandatory = $true)] - [string]$Name, - [Parameter(ParameterSetName = 'Default')] - $Default, - [Parameter(ParameterSetName = 'Require')] - [switch]$Require, - [switch]$AsBool, - [switch]$AsInt) - - # Get the input from the vault. Splat the bound parameters hashtable. Splatting is required - # in order to concisely invoke the correct parameter set. - $null = $PSBoundParameters.Remove('Name') - $description = Get-LocString -Key PSLIB_Input0 -ArgumentList $Name - $key = "INPUT_$($Name.Replace(' ', '_').ToUpperInvariant())" - Get-VaultValue @PSBoundParameters -Description $description -Key $key -} - -<# -.SYNOPSIS -Gets a task variable. - -.DESCRIPTION -Gets the value for the specified task variable. - -.PARAMETER AsBool -Returns the value as a bool. Returns true if the value converted to a string is "1" or "true" (case insensitive); otherwise false. - -.PARAMETER AsInt -Returns the value as an int. Returns the value converted to an int. Returns 0 if the conversion fails. - -.PARAMETER Default -Default value to use if the input is null or empty. - -.PARAMETER Require -Writes an error to the error pipeline if the input is null or empty. -#> -function Get-TaskVariable { - [CmdletBinding(DefaultParameterSetName = 'Require')] - param( - [Parameter(Mandatory = $true)] - [string]$Name, - [Parameter(ParameterSetName = 'Default')] - $Default, - [Parameter(ParameterSetName = 'Require')] - [switch]$Require, - [switch]$AsBool, - [switch]$AsInt) - - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - $description = Get-LocString -Key PSLIB_TaskVariable0 -ArgumentList $Name - $variableKey = Get-VariableKey -Name $Name - if ($script:knownVariables.$variableKey.Secret) { - # Get secret variable. Splatting is required to concisely invoke the correct parameter set. - $null = $PSBoundParameters.Remove('Name') - $vaultKey = "SECRET_$variableKey" - Get-VaultValue @PSBoundParameters -Description $description -Key $vaultKey - } else { - # Get public variable. - $item = $null - $path = "Env:$variableKey" - if ((Test-Path -LiteralPath $path) -and ($item = Get-Item -LiteralPath $path).Value) { - # Intentionally empty. Value was successfully retrieved. - } elseif (!$script:nonInteractive) { - # The value wasn't found and the module is running in interactive dev mode. - # Prompt for the value. - Set-Item -LiteralPath $path -Value (Read-Host -Prompt $description) - if (Test-Path -LiteralPath $path) { - $item = Get-Item -LiteralPath $path - } - } - - # Get the converted value. Splatting is required to concisely invoke the correct parameter set. - $null = $PSBoundParameters.Remove('Name') - Get-Value @PSBoundParameters -Description $description -Key $variableKey -Value $item.Value - } - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } -} - -<# -.SYNOPSIS -Gets all job variables available to the task. Requires 2.104.1 agent or higher. - -.DESCRIPTION -Gets a snapshot of the current state of all job variables available to the task. -Requires a 2.104.1 agent or higher for full functionality. - -Returns an array of objects with the following properties: - [string]Name - [string]Value - [bool]Secret - -Limitations on an agent prior to 2.104.1: - 1) The return value does not include all public variables. Only public variables - that have been added using setVariable are returned. - 2) The name returned for each secret variable is the formatted environment variable - name, not the actual variable name (unless it was set explicitly at runtime using - setVariable). -#> -function Get-TaskVariableInfo { - [CmdletBinding()] - param() - - foreach ($info in $script:knownVariables.Values) { - New-Object -TypeName psobject -Property @{ - Name = $info.Name - Value = Get-TaskVariable -Name $info.Name - Secret = $info.Secret - } - } -} - -<# -.SYNOPSIS -Sets a task variable. - -.DESCRIPTION -Sets a task variable in the current task context as well as in the current job context. This allows the task variable to retrieved by subsequent tasks within the same job. -#> -function Set-TaskVariable { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Name, - [string]$Value, - [switch]$Secret) - - # Once a secret always a secret. - $variableKey = Get-VariableKey -Name $Name - [bool]$Secret = $Secret -or $script:knownVariables.$variableKey.Secret - if ($Secret) { - $vaultKey = "SECRET_$variableKey" - if (!$Value) { - # Clear the secret. - Write-Verbose "Set $Name = ''" - $script:vault.Remove($vaultKey) - } else { - # Store the secret in the vault. - Write-Verbose "Set $Name = '********'" - $script:vault[$vaultKey] = New-Object System.Management.Automation.PSCredential( - $vaultKey, - (ConvertTo-SecureString -String $Value -AsPlainText -Force)) - } - - # Clear the environment variable. - Set-Item -LiteralPath "Env:$variableKey" -Value '' - } else { - # Set the environment variable. - Write-Verbose "Set $Name = '$Value'" - Set-Item -LiteralPath "Env:$variableKey" -Value $Value - } - - # Store the metadata. - $script:knownVariables[$variableKey] = New-Object -TypeName psobject -Property @{ - Name = $name - Secret = $Secret - } - - # Persist the variable in the task context. - Write-SetVariable -Name $Name -Value $Value -Secret:$Secret -} - -######################################## -# Private functions. -######################################## -function Get-VaultValue { - [CmdletBinding(DefaultParameterSetName = 'Require')] - param( - [Parameter(Mandatory = $true)] - [string]$Description, - [Parameter(Mandatory = $true)] - [string]$Key, - [Parameter(ParameterSetName = 'Require')] - [switch]$Require, - [Parameter(ParameterSetName = 'Default')] - [object]$Default, - [switch]$AsBool, - [switch]$AsInt) - - # Attempt to get the vault value. - $value = $null - if ($psCredential = $script:vault[$Key]) { - $value = $psCredential.GetNetworkCredential().Password - } elseif (!$script:nonInteractive) { - # The value wasn't found. Prompt for the value if running in interactive dev mode. - $value = Read-Host -Prompt $Description - if ($value) { - $script:vault[$Key] = New-Object System.Management.Automation.PSCredential( - $Key, - (ConvertTo-SecureString -String $value -AsPlainText -Force)) - } - } - - Get-Value -Value $value @PSBoundParameters -} - -function Get-Value { - [CmdletBinding(DefaultParameterSetName = 'Require')] - param( - [string]$Value, - [Parameter(Mandatory = $true)] - [string]$Description, - [Parameter(Mandatory = $true)] - [string]$Key, - [Parameter(ParameterSetName = 'Require')] - [switch]$Require, - [Parameter(ParameterSetName = 'Default')] - [object]$Default, - [switch]$AsBool, - [switch]$AsInt) - - $result = $Value - if ($result) { - if ($Key -like 'ENDPOINT_AUTH_*') { - Write-Verbose "$($Key): '********'" - } else { - Write-Verbose "$($Key): '$result'" - } - } else { - Write-Verbose "$Key (empty)" - - # Write error if required. - if ($Require) { - Write-Error "$(Get-LocString -Key PSLIB_Required0 $Description)" - return - } - - # Fallback to the default if provided. - if ($PSCmdlet.ParameterSetName -eq 'Default') { - $result = $Default - $OFS = ' ' - Write-Verbose " Defaulted to: '$result'" - } else { - $result = '' - } - } - - # Convert to bool if specified. - if ($AsBool) { - if ($result -isnot [bool]) { - $result = "$result" -in '1', 'true' - Write-Verbose " Converted to bool: $result" - } - - return $result - } - - # Convert to int if specified. - if ($AsInt) { - if ($result -isnot [int]) { - try { - $result = [int]"$result" - } catch { - $result = 0 - } - - Write-Verbose " Converted to int: $result" - } - - return $result - } - - return $result -} - -function Initialize-Inputs { - # Store endpoints, inputs, and secret variables in the vault. - foreach ($variable in (Get-ChildItem -Path Env:ENDPOINT_?*, Env:INPUT_?*, Env:SECRET_?*, Env:SECUREFILE_?*)) { - # Record the secret variable metadata. This is required by Get-TaskVariable to - # retrieve the value. In a 2.104.1 agent or higher, this metadata will be overwritten - # when $env:VSTS_SECRET_VARIABLES is processed. - if ($variable.Name -like 'SECRET_?*') { - $variableKey = $variable.Name.Substring('SECRET_'.Length) - $script:knownVariables[$variableKey] = New-Object -TypeName psobject -Property @{ - # This is technically not the variable name (has underscores instead of dots), - # but it's good enough to make Get-TaskVariable work in a pre-2.104.1 agent - # where $env:VSTS_SECRET_VARIABLES is not defined. - Name = $variableKey - Secret = $true - } - } - - # Store the value in the vault. - $vaultKey = $variable.Name - if ($variable.Value) { - $script:vault[$vaultKey] = New-Object System.Management.Automation.PSCredential( - $vaultKey, - (ConvertTo-SecureString -String $variable.Value -AsPlainText -Force)) - } - - # Clear the environment variable. - Remove-Item -LiteralPath "Env:$($variable.Name)" - } - - # Record the public variable names. Env var added in 2.104.1 agent. - if ($env:VSTS_PUBLIC_VARIABLES) { - foreach ($name in (ConvertFrom-Json -InputObject $env:VSTS_PUBLIC_VARIABLES)) { - $variableKey = Get-VariableKey -Name $name - $script:knownVariables[$variableKey] = New-Object -TypeName psobject -Property @{ - Name = $name - Secret = $false - } - } - - $env:VSTS_PUBLIC_VARIABLES = '' - } - - # Record the secret variable names. Env var added in 2.104.1 agent. - if ($env:VSTS_SECRET_VARIABLES) { - foreach ($name in (ConvertFrom-Json -InputObject $env:VSTS_SECRET_VARIABLES)) { - $variableKey = Get-VariableKey -Name $name - $script:knownVariables[$variableKey] = New-Object -TypeName psobject -Property @{ - Name = $name - Secret = $true - } - } - - $env:VSTS_SECRET_VARIABLES = '' - } -} - -function Get-VariableKey { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Name) - - if ($Name -ne 'agent.jobstatus') { - $Name = $Name.Replace('.', '_') - } - - $Name.ToUpperInvariant() -} diff --git a/arm-outputs/ps_modules/VstsTaskSdk/LegacyFindFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/LegacyFindFunctions.ps1 deleted file mode 100755 index b4080ae..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/LegacyFindFunctions.ps1 +++ /dev/null @@ -1,320 +0,0 @@ -<# -.SYNOPSIS -Finds files or directories. - -.DESCRIPTION -Finds files or directories using advanced pattern matching. - -.PARAMETER LiteralDirectory -Directory to search. - -.PARAMETER LegacyPattern -Proprietary pattern format. The LiteralDirectory parameter is used to root any unrooted patterns. - -Separate multiple patterns using ";". Escape actual ";" in the path by using ";;". -"?" indicates a wildcard that represents any single character within a path segment. -"*" indicates a wildcard that represents zero or more characters within a path segment. -"**" as the entire path segment indicates a recursive search. -"**" within a path segment indicates a recursive intersegment wildcard. -"+:" (can be omitted) indicates an include pattern. -"-:" indicates an exclude pattern. - -The result is from the command is a union of all the matches from the include patterns, minus the matches from the exclude patterns. - -.PARAMETER IncludeFiles -Indicates whether to include files in the results. - -If neither IncludeFiles or IncludeDirectories is set, then IncludeFiles is assumed. - -.PARAMETER IncludeDirectories -Indicates whether to include directories in the results. - -If neither IncludeFiles or IncludeDirectories is set, then IncludeFiles is assumed. - -.PARAMETER Force -Indicates whether to include hidden items. - -.EXAMPLE -Find-VstsFiles -LegacyPattern "C:\Directory\Is?Match.txt" - -Given: -C:\Directory\Is1Match.txt -C:\Directory\Is2Match.txt -C:\Directory\IsNotMatch.txt - -Returns: -C:\Directory\Is1Match.txt -C:\Directory\Is2Match.txt - -.EXAMPLE -Find-VstsFiles -LegacyPattern "C:\Directory\Is*Match.txt" - -Given: -C:\Directory\IsOneMatch.txt -C:\Directory\IsTwoMatch.txt -C:\Directory\NonMatch.txt - -Returns: -C:\Directory\IsOneMatch.txt -C:\Directory\IsTwoMatch.txt - -.EXAMPLE -Find-VstsFiles -LegacyPattern "C:\Directory\**\Match.txt" - -Given: -C:\Directory\Match.txt -C:\Directory\NotAMatch.txt -C:\Directory\SubDir\Match.txt -C:\Directory\SubDir\SubSubDir\Match.txt - -Returns: -C:\Directory\Match.txt -C:\Directory\SubDir\Match.txt -C:\Directory\SubDir\SubSubDir\Match.txt - -.EXAMPLE -Find-VstsFiles -LegacyPattern "C:\Directory\**" - -Given: -C:\Directory\One.txt -C:\Directory\SubDir\Two.txt -C:\Directory\SubDir\SubSubDir\Three.txt - -Returns: -C:\Directory\One.txt -C:\Directory\SubDir\Two.txt -C:\Directory\SubDir\SubSubDir\Three.txt - -.EXAMPLE -Find-VstsFiles -LegacyPattern "C:\Directory\Sub**Match.txt" - -Given: -C:\Directory\IsNotAMatch.txt -C:\Directory\SubDir\IsAMatch.txt -C:\Directory\SubDir\IsNot.txt -C:\Directory\SubDir\SubSubDir\IsAMatch.txt -C:\Directory\SubDir\SubSubDir\IsNot.txt - -Returns: -C:\Directory\SubDir\IsAMatch.txt -C:\Directory\SubDir\SubSubDir\IsAMatch.txt -#> -function Find-Files { - [CmdletBinding()] - param( - [ValidateNotNullOrEmpty()] - [Parameter()] - [string]$LiteralDirectory, - [Parameter(Mandatory = $true)] - [string]$LegacyPattern, - [switch]$IncludeFiles, - [switch]$IncludeDirectories, - [switch]$Force) - - # Note, due to subtle implementation details of Get-PathPrefix/Get-PathIterator, - # this function does not appear to be able to search the root of a drive and other - # cases where Path.GetDirectoryName() returns empty. More details in Get-PathPrefix. - - Trace-EnteringInvocation $MyInvocation - if (!$IncludeFiles -and !$IncludeDirectories) { - $IncludeFiles = $true - } - - $includePatterns = New-Object System.Collections.Generic.List[string] - $excludePatterns = New-Object System.Collections.Generic.List[System.Text.RegularExpressions.Regex] - $LegacyPattern = $LegacyPattern.Replace(';;', "`0") - foreach ($pattern in $LegacyPattern.Split(';', [System.StringSplitOptions]::RemoveEmptyEntries)) { - $pattern = $pattern.Replace("`0", ';') - $isIncludePattern = Test-IsIncludePattern -Pattern ([ref]$pattern) - if ($LiteralDirectory -and !([System.IO.Path]::IsPathRooted($pattern))) { - # Use the root directory provided to make the pattern a rooted path. - $pattern = [System.IO.Path]::Combine($LiteralDirectory, $pattern) - } - - # Validate pattern does not end with a \. - if ($pattern[$pattern.Length - 1] -eq [System.IO.Path]::DirectorySeparatorChar) { - throw (Get-LocString -Key PSLIB_InvalidPattern0 -ArgumentList $pattern) - } - - if ($isIncludePattern) { - $includePatterns.Add($pattern) - } else { - $excludePatterns.Add((Convert-PatternToRegex -Pattern $pattern)) - } - } - - $count = 0 - foreach ($path in (Get-MatchingItems -IncludePatterns $includePatterns -ExcludePatterns $excludePatterns -IncludeFiles:$IncludeFiles -IncludeDirectories:$IncludeDirectories -Force:$Force)) { - $count++ - $path - } - - Write-Verbose "Total found: $count" - Trace-LeavingInvocation $MyInvocation -} - -######################################## -# Private functions. -######################################## -function Convert-PatternToRegex { - [CmdletBinding()] - param([string]$Pattern) - - $Pattern = [regex]::Escape($Pattern.Replace('\', '/')). # Normalize separators and regex escape. - Replace('/\*\*/', '((/.+/)|(/))'). # Replace directory globstar. - Replace('\*\*', '.*'). # Replace remaining globstars with a wildcard that can span directory separators. - Replace('\*', '[^/]*'). # Replace asterisks with a wildcard that cannot span directory separators. - # bug: should be '[^/]' instead of '.' - Replace('\?', '.') # Replace single character wildcards. - New-Object regex -ArgumentList "^$Pattern`$", ([System.Text.RegularExpressions.RegexOptions]::IgnoreCase) -} - -function Get-FileNameFilter { - [CmdletBinding()] - param([string]$Pattern) - - $index = $Pattern.LastIndexOf('\') - if ($index -eq -1 -or # Pattern does not contain a backslash. - !($Pattern = $Pattern.Substring($index + 1)) -or # Pattern ends in a backslash. - $Pattern.Contains('**')) # Last segment contains an inter-segment wildcard. - { - return '*' - } - - # bug? is this supposed to do substring? - return $Pattern -} - -function Get-MatchingItems { - [CmdletBinding()] - param( - [System.Collections.Generic.List[string]]$IncludePatterns, - [System.Collections.Generic.List[regex]]$ExcludePatterns, - [switch]$IncludeFiles, - [switch]$IncludeDirectories, - [switch]$Force) - - Trace-EnteringInvocation $MyInvocation - $allFiles = New-Object System.Collections.Generic.HashSet[string] - foreach ($pattern in $IncludePatterns) { - $pathPrefix = Get-PathPrefix -Pattern $pattern - $fileNameFilter = Get-FileNameFilter -Pattern $pattern - $patternRegex = Convert-PatternToRegex -Pattern $pattern - # Iterate over the directories and files under the pathPrefix. - Get-PathIterator -Path $pathPrefix -Filter $fileNameFilter -IncludeFiles:$IncludeFiles -IncludeDirectories:$IncludeDirectories -Force:$Force | - ForEach-Object { - # Normalize separators. - $normalizedPath = $_.Replace('\', '/') - # **/times/** will not match C:/fun/times because there isn't a trailing slash. - # So try both if including directories. - $alternatePath = "$normalizedPath/" # potential bug: it looks like this will result in a false - # positive if the item is a regular file and not a directory - - $isMatch = $false - if ($patternRegex.IsMatch($normalizedPath) -or ($IncludeDirectories -and $patternRegex.IsMatch($alternatePath))) { - $isMatch = $true - - # Test whether the path should be excluded. - foreach ($regex in $ExcludePatterns) { - if ($regex.IsMatch($normalizedPath) -or ($IncludeDirectories -and $regex.IsMatch($alternatePath))) { - $isMatch = $false - break - } - } - } - - if ($isMatch) { - $null = $allFiles.Add($_) - } - } - } - - Trace-Path -Path $allFiles -PassThru - Trace-LeavingInvocation $MyInvocation -} - -function Get-PathIterator { - [CmdletBinding()] - param( - [string]$Path, - [string]$Filter, - [switch]$IncludeFiles, - [switch]$IncludeDirectories, - [switch]$Force) - - if (!$Path) { - return - } - - # bug: this returns the dir without verifying whether exists - if ($IncludeDirectories) { - $Path - } - - Get-DirectoryChildItem -Path $Path -Filter $Filter -Force:$Force -Recurse | - ForEach-Object { - if ($_.Attributes.HasFlag([VstsTaskSdk.FS.Attributes]::Directory)) { - if ($IncludeDirectories) { - $_.FullName - } - } elseif ($IncludeFiles) { - $_.FullName - } - } -} - -function Get-PathPrefix { - [CmdletBinding()] - param([string]$Pattern) - - # Note, unable to search root directories is a limitation due to subtleties of this function - # and downstream code in Get-PathIterator that short-circuits when the path prefix is empty. - # This function uses Path.GetDirectoryName() to determine the path prefix, which will yield - # empty in some cases. See the following examples of Path.GetDirectoryName() input => output: - # C:/ => - # C:/hello => C:\ - # C:/hello/ => C:\hello - # C:/hello/world => C:\hello - # C:/hello/world/ => C:\hello\world - # C: => - # C:hello => C: - # C:hello/ => C:hello - # / => - # /hello => \ - # /hello/ => \hello - # //hello => - # //hello/ => - # //hello/world => - # //hello/world/ => \\hello\world - - $index = $Pattern.IndexOfAny([char[]]@('*'[0], '?'[0])) - if ($index -eq -1) { - # If no wildcards are found, return the directory name portion of the path. - # If there is no directory name (file name only in pattern), this will return empty string. - return [System.IO.Path]::GetDirectoryName($Pattern) - } - - [System.IO.Path]::GetDirectoryName($Pattern.Substring(0, $index)) -} - -function Test-IsIncludePattern { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [ref]$Pattern) - - # Include patterns start with +: or anything except -: - # Exclude patterns start with -: - if ($Pattern.value.StartsWith("+:")) { - # Remove the prefix. - $Pattern.value = $Pattern.value.Substring(2) - $true - } elseif ($Pattern.value.StartsWith("-:")) { - # Remove the prefix. - $Pattern.value = $Pattern.value.Substring(2) - $false - } else { - # No prefix, so leave the string alone. - $true; - } -} diff --git a/arm-outputs/ps_modules/VstsTaskSdk/LocalizationFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/LocalizationFunctions.ps1 deleted file mode 100755 index c31790c..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/LocalizationFunctions.ps1 +++ /dev/null @@ -1,150 +0,0 @@ -$script:resourceStrings = @{ } - -<# -.SYNOPSIS -Gets a localized resource string. - -.DESCRIPTION -Gets a localized resource string and optionally formats the string with arguments. - -If the format fails (due to a bad format string or incorrect expected arguments in the format string), then the format string is returned followed by each of the arguments (delimited by a space). - -If the lookup key is not found, then the lookup key is returned followed by each of the arguments (delimited by a space). - -.PARAMETER Require -Writes an error to the error pipeline if the endpoint is not found. -#> -function Get-LocString { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true, Position = 1)] - [string]$Key, - [Parameter(Position = 2)] - [object[]]$ArgumentList = @( )) - - # Due to the dynamically typed nature of PowerShell, a single null argument passed - # to an array parameter is interpreted as a null array. - if ([object]::ReferenceEquals($null, $ArgumentList)) { - $ArgumentList = @( $null ) - } - - # Lookup the format string. - $format = '' - if (!($format = $script:resourceStrings[$Key])) { - # Warn the key was not found. Prevent recursion if the lookup key is the - # "string resource key not found" lookup key. - $resourceNotFoundKey = 'PSLIB_StringResourceKeyNotFound0' - if ($key -ne $resourceNotFoundKey) { - Write-Warning (Get-LocString -Key $resourceNotFoundKey -ArgumentList $Key) - } - - # Fallback to just the key itself if there aren't any arguments to format. - if (!$ArgumentList.Count) { return $key } - - # Otherwise fallback to the key followed by the arguments. - $OFS = " " - return "$key $ArgumentList" - } - - # Return the string if there aren't any arguments to format. - if (!$ArgumentList.Count) { return $format } - - try { - [string]::Format($format, $ArgumentList) - } catch { - Write-Warning (Get-LocString -Key 'PSLIB_StringFormatFailed') - $OFS = " " - "$format $ArgumentList" - } -} - -<# -.SYNOPSIS -Imports resource strings for use with Get-VstsLocString. - -.DESCRIPTION -Imports resource strings for use with Get-VstsLocString. The imported strings are stored in an internal resource string dictionary. Optionally, if a separate resource file for the current culture exists, then the localized strings from that file then imported (overlaid) into the same internal resource string dictionary. - -Resource strings from the SDK are prefixed with "PSLIB_". This prefix should be avoided for custom resource strings. - -.Parameter LiteralPath -JSON file containing resource strings. - -.EXAMPLE -Import-VstsLocStrings -LiteralPath $PSScriptRoot\Task.json - -Imports strings from messages section in the JSON file. If a messages section is not defined, then no strings are imported. Example messages section: -{ - "messages": { - "Hello": "Hello you!", - "Hello0": "Hello {0}!" - } -} - -.EXAMPLE -Import-VstsLocStrings -LiteralPath $PSScriptRoot\Task.json - -Overlays strings from an optional separate resource file for the current culture. - -Given the task variable System.Culture is set to 'de-DE'. This variable is set by the agent based on the current culture for the job. -Given the file Task.json contains: -{ - "messages": { - "GoodDay": "Good day!", - } -} -Given the file resources.resjson\de-DE\resources.resjson: -{ - "loc.messages.GoodDay": "Guten Tag!" -} - -The net result from the import command would be one new key-value pair added to the internal dictionary: Key = 'GoodDay', Value = 'Guten Tag!' -#> -function Import-LocStrings { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$LiteralPath) - - # Validate the file exists. - if (!(Test-Path -LiteralPath $LiteralPath -PathType Leaf)) { - Write-Warning (Get-LocString -Key PSLIB_FileNotFound0 -ArgumentList $LiteralPath) - return - } - - # Load the json. - Write-Verbose "Loading resource strings from: $LiteralPath" - $count = 0 - if ($messages = (Get-Content -LiteralPath $LiteralPath -Encoding UTF8 | Out-String | ConvertFrom-Json).messages) { - # Add each resource string to the hashtable. - foreach ($member in (Get-Member -InputObject $messages -MemberType NoteProperty)) { - [string]$key = $member.Name - $script:resourceStrings[$key] = $messages."$key" - $count++ - } - } - - Write-Verbose "Loaded $count strings." - - # Get the culture. - $culture = Get-TaskVariable -Name "System.Culture" -Default "en-US" - - # Load the resjson. - $resjsonPath = "$([System.IO.Path]::GetDirectoryName($LiteralPath))\Strings\resources.resjson\$culture\resources.resjson" - if (Test-Path -LiteralPath $resjsonPath) { - Write-Verbose "Loading resource strings from: $resjsonPath" - $count = 0 - $resjson = Get-Content -LiteralPath $resjsonPath -Encoding UTF8 | Out-String | ConvertFrom-Json - foreach ($member in (Get-Member -Name loc.messages.* -InputObject $resjson -MemberType NoteProperty)) { - if (!($value = $resjson."$($member.Name)")) { - continue - } - - [string]$key = $member.Name.Substring('loc.messages.'.Length) - $script:resourceStrings[$key] = $value - $count++ - } - - Write-Verbose "Loaded $count strings." - } -} diff --git a/arm-outputs/ps_modules/VstsTaskSdk/LoggingCommandFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/LoggingCommandFunctions.ps1 deleted file mode 100755 index 595a7d8..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/LoggingCommandFunctions.ps1 +++ /dev/null @@ -1,601 +0,0 @@ -$script:loggingCommandPrefix = '##vso[' -$script:loggingCommandEscapeMappings = @( # TODO: WHAT ABOUT "="? WHAT ABOUT "%"? - New-Object psobject -Property @{ Token = ';' ; Replacement = '%3B' } - New-Object psobject -Property @{ Token = "`r" ; Replacement = '%0D' } - New-Object psobject -Property @{ Token = "`n" ; Replacement = '%0A' } - New-Object psobject -Property @{ Token = "]" ; Replacement = '%5D' } -) -# TODO: BUG: Escape % ??? -# TODO: Add test to verify don't need to escape "=". - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-AddAttachment { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Type, - [Parameter(Mandatory = $true)] - [string]$Name, - [Parameter(Mandatory = $true)] - [string]$Path, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'task' -Event 'addattachment' -Data $Path -Properties @{ - 'type' = $Type - 'name' = $Name - } -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-UploadSummary { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Path, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'task' -Event 'uploadsummary' -Data $Path -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-SetEndpoint { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Id, - [Parameter(Mandatory = $true)] - [string]$Field, - [Parameter(Mandatory = $true)] - [string]$Key, - [Parameter(Mandatory = $true)] - [string]$Value, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'task' -Event 'setendpoint' -Data $Value -Properties @{ - 'id' = $Id - 'field' = $Field - 'key' = $Key - } -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-AddBuildTag { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Value, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'build' -Event 'addbuildtag' -Data $Value -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-AssociateArtifact { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Name, - [Parameter(Mandatory = $true)] - [string]$Path, - [Parameter(Mandatory = $true)] - [string]$Type, - [hashtable]$Properties, - [switch]$AsOutput) - - $p = @{ } - if ($Properties) { - foreach ($key in $Properties.Keys) { - $p[$key] = $Properties[$key] - } - } - - $p['artifactname'] = $Name - $p['artifacttype'] = $Type - Write-LoggingCommand -Area 'artifact' -Event 'associate' -Data $Path -Properties $p -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-LogDetail { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [guid]$Id, - $ParentId, - [string]$Type, - [string]$Name, - $Order, - $StartTime, - $FinishTime, - $Progress, - [ValidateSet('Unknown', 'Initialized', 'InProgress', 'Completed')] - [Parameter()] - $State, - [ValidateSet('Succeeded', 'SucceededWithIssues', 'Failed', 'Cancelled', 'Skipped')] - [Parameter()] - $Result, - [string]$Message, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'task' -Event 'logdetail' -Data $Message -Properties @{ - 'id' = $Id - 'parentid' = $ParentId - 'type' = $Type - 'name' = $Name - 'order' = $Order - 'starttime' = $StartTime - 'finishtime' = $FinishTime - 'progress' = $Progress - 'state' = $State - 'result' = $Result - } -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-SetProgress { - [CmdletBinding()] - param( - [ValidateRange(0, 100)] - [Parameter(Mandatory = $true)] - [int]$Percent, - [string]$CurrentOperation, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'task' -Event 'setprogress' -Data $CurrentOperation -Properties @{ - 'value' = $Percent - } -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-SetResult { - [CmdletBinding(DefaultParameterSetName = 'AsOutput')] - param( - [ValidateSet("Succeeded", "SucceededWithIssues", "Failed", "Cancelled", "Skipped")] - [Parameter(Mandatory = $true)] - [string]$Result, - [string]$Message, - [Parameter(ParameterSetName = 'AsOutput')] - [switch]$AsOutput, - [Parameter(ParameterSetName = 'DoNotThrow')] - [switch]$DoNotThrow) - - Write-LoggingCommand -Area 'task' -Event 'complete' -Data $Message -Properties @{ - 'result' = $Result - } -AsOutput:$AsOutput - if ($Result -eq 'Failed' -and !$AsOutput -and !$DoNotThrow) { - # Special internal exception type to control the flow. Not currently intended - # for public usage and subject to change. - throw (New-Object VstsTaskSdk.TerminationException($Message)) - } -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-SetSecret { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Value, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'task' -Event 'setsecret' -Data $Value -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-SetVariable { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Name, - [string]$Value, - [switch]$Secret, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'task' -Event 'setvariable' -Data $Value -Properties @{ - 'variable' = $Name - 'issecret' = $Secret - } -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-TaskDebug { - [CmdletBinding()] - param( - [string]$Message, - [switch]$AsOutput) - - Write-TaskDebug_Internal @PSBoundParameters -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-TaskError { - [CmdletBinding()] - param( - [string]$Message, - [string]$ErrCode, - [string]$SourcePath, - [string]$LineNumber, - [string]$ColumnNumber, - [switch]$AsOutput) - - Write-LogIssue -Type error @PSBoundParameters -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-TaskVerbose { - [CmdletBinding()] - param( - [string]$Message, - [switch]$AsOutput) - - Write-TaskDebug_Internal @PSBoundParameters -AsVerbose -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-TaskWarning { - [CmdletBinding()] - param( - [string]$Message, - [string]$ErrCode, - [string]$SourcePath, - [string]$LineNumber, - [string]$ColumnNumber, - [switch]$AsOutput) - - Write-LogIssue -Type warning @PSBoundParameters -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-UploadFile { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Path, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'task' -Event 'uploadfile' -Data $Path -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-PrependPath { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Path, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'task' -Event 'prependpath' -Data $Path -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-UpdateBuildNumber { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Value, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'build' -Event 'updatebuildnumber' -Data $Value -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-UploadArtifact { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$ContainerFolder, - [Parameter(Mandatory = $true)] - [string]$Name, - [Parameter(Mandatory = $true)] - [string]$Path, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'artifact' -Event 'upload' -Data $Path -Properties @{ - 'containerfolder' = $ContainerFolder - 'artifactname' = $Name - } -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-UploadBuildLog { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Path, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'build' -Event 'uploadlog' -Data $Path -AsOutput:$AsOutput -} - -<# -.SYNOPSIS -See https://github.com/Microsoft/vsts-tasks/blob/master/docs/authoring/commands.md - -.PARAMETER AsOutput -Indicates whether to write the logging command directly to the host or to the output pipeline. -#> -function Write-UpdateReleaseName { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Name, - [switch]$AsOutput) - - Write-LoggingCommand -Area 'release' -Event 'updatereleasename' -Data $Name -AsOutput:$AsOutput -} - -######################################## -# Private functions. -######################################## -function Format-LoggingCommandData { - [CmdletBinding()] - param([string]$Value, [switch]$Reverse) - - if (!$Value) { - return '' - } - - if (!$Reverse) { - foreach ($mapping in $script:loggingCommandEscapeMappings) { - $Value = $Value.Replace($mapping.Token, $mapping.Replacement) - } - } else { - for ($i = $script:loggingCommandEscapeMappings.Length - 1 ; $i -ge 0 ; $i--) { - $mapping = $script:loggingCommandEscapeMappings[$i] - $Value = $Value.Replace($mapping.Replacement, $mapping.Token) - } - } - - return $Value -} - -function Format-LoggingCommand { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Area, - [Parameter(Mandatory = $true)] - [string]$Event, - [string]$Data, - [hashtable]$Properties) - - # Append the preamble. - [System.Text.StringBuilder]$sb = New-Object -TypeName System.Text.StringBuilder - $null = $sb.Append($script:loggingCommandPrefix).Append($Area).Append('.').Append($Event) - - # Append the properties. - if ($Properties) { - $first = $true - foreach ($key in $Properties.Keys) { - [string]$value = Format-LoggingCommandData $Properties[$key] - if ($value) { - if ($first) { - $null = $sb.Append(' ') - $first = $false - } else { - $null = $sb.Append(';') - } - - $null = $sb.Append("$key=$value") - } - } - } - - # Append the tail and output the value. - $Data = Format-LoggingCommandData $Data - $sb.Append(']').Append($Data).ToString() -} - -function Write-LoggingCommand { - [CmdletBinding(DefaultParameterSetName = 'Parameters')] - param( - [Parameter(Mandatory = $true, ParameterSetName = 'Parameters')] - [string]$Area, - [Parameter(Mandatory = $true, ParameterSetName = 'Parameters')] - [string]$Event, - [Parameter(ParameterSetName = 'Parameters')] - [string]$Data, - [Parameter(ParameterSetName = 'Parameters')] - [hashtable]$Properties, - [Parameter(Mandatory = $true, ParameterSetName = 'Object')] - $Command, - [switch]$AsOutput) - - if ($PSCmdlet.ParameterSetName -eq 'Object') { - Write-LoggingCommand -Area $Command.Area -Event $Command.Event -Data $Command.Data -Properties $Command.Properties -AsOutput:$AsOutput - return - } - - $command = Format-LoggingCommand -Area $Area -Event $Event -Data $Data -Properties $Properties - if ($AsOutput) { - $command - } else { - Write-Host $command - } -} - -function Write-LogIssue { - [CmdletBinding()] - param( - [ValidateSet('warning', 'error')] - [Parameter(Mandatory = $true)] - [string]$Type, - [string]$Message, - [string]$ErrCode, - [string]$SourcePath, - [string]$LineNumber, - [string]$ColumnNumber, - [switch]$AsOutput) - - $command = Format-LoggingCommand -Area 'task' -Event 'logissue' -Data $Message -Properties @{ - 'type' = $Type - 'code' = $ErrCode - 'sourcepath' = $SourcePath - 'linenumber' = $LineNumber - 'columnnumber' = $ColumnNumber - } - if ($AsOutput) { - return $command - } - - if ($Type -eq 'error') { - $foregroundColor = $host.PrivateData.ErrorForegroundColor - $backgroundColor = $host.PrivateData.ErrorBackgroundColor - if ($foregroundColor -isnot [System.ConsoleColor] -or $backgroundColor -isnot [System.ConsoleColor]) { - $foregroundColor = [System.ConsoleColor]::Red - $backgroundColor = [System.ConsoleColor]::Black - } - } else { - $foregroundColor = $host.PrivateData.WarningForegroundColor - $backgroundColor = $host.PrivateData.WarningBackgroundColor - if ($foregroundColor -isnot [System.ConsoleColor] -or $backgroundColor -isnot [System.ConsoleColor]) { - $foregroundColor = [System.ConsoleColor]::Yellow - $backgroundColor = [System.ConsoleColor]::Black - } - } - - Write-Host $command -ForegroundColor $foregroundColor -BackgroundColor $backgroundColor -} - -function Write-TaskDebug_Internal { - [CmdletBinding()] - param( - [string]$Message, - [switch]$AsVerbose, - [switch]$AsOutput) - - $command = Format-LoggingCommand -Area 'task' -Event 'debug' -Data $Message - if ($AsOutput) { - return $command - } - - if ($AsVerbose) { - $foregroundColor = $host.PrivateData.VerboseForegroundColor - $backgroundColor = $host.PrivateData.VerboseBackgroundColor - if ($foregroundColor -isnot [System.ConsoleColor] -or $backgroundColor -isnot [System.ConsoleColor]) { - $foregroundColor = [System.ConsoleColor]::Cyan - $backgroundColor = [System.ConsoleColor]::Black - } - } else { - $foregroundColor = $host.PrivateData.DebugForegroundColor - $backgroundColor = $host.PrivateData.DebugBackgroundColor - if ($foregroundColor -isnot [System.ConsoleColor] -or $backgroundColor -isnot [System.ConsoleColor]) { - $foregroundColor = [System.ConsoleColor]::DarkGray - $backgroundColor = [System.ConsoleColor]::Black - } - } - - Write-Host -Object $command -ForegroundColor $foregroundColor -BackgroundColor $backgroundColor -} diff --git a/arm-outputs/ps_modules/VstsTaskSdk/LongPathFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/LongPathFunctions.ps1 deleted file mode 100755 index d536111..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/LongPathFunctions.ps1 +++ /dev/null @@ -1,205 +0,0 @@ -######################################## -# Private functions. -######################################## -function ConvertFrom-LongFormPath { - [CmdletBinding()] - param([string]$Path) - - if ($Path) { - if ($Path.StartsWith('\\?\UNC')) { - # E.g. \\?\UNC\server\share -> \\server\share - return $Path.Substring(1, '\?\UNC'.Length) - } elseif ($Path.StartsWith('\\?\')) { - # E.g. \\?\C:\directory -> C:\directory - return $Path.Substring('\\?\'.Length) - } - } - - return $Path -} -function ConvertTo-LongFormPath { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Path) - - [string]$longFormPath = Get-FullNormalizedPath -Path $Path - if ($longFormPath -and !$longFormPath.StartsWith('\\?')) { - if ($longFormPath.StartsWith('\\')) { - # E.g. \\server\share -> \\?\UNC\server\share - return "\\?\UNC$($longFormPath.Substring(1))" - } else { - # E.g. C:\directory -> \\?\C:\directory - return "\\?\$longFormPath" - } - } - - return $longFormPath -} - -# TODO: ADD A SWITCH TO EXCLUDE FILES, A SWITCH TO EXCLUDE DIRECTORIES, AND A SWITCH NOT TO FOLLOW REPARSE POINTS. -function Get-DirectoryChildItem { - [CmdletBinding()] - param( - [string]$Path, - [ValidateNotNullOrEmpty()] - [Parameter()] - [string]$Filter = "*", - [switch]$Force, - [VstsTaskSdk.FS.FindFlags]$Flags = [VstsTaskSdk.FS.FindFlags]::LargeFetch, - [VstsTaskSdk.FS.FindInfoLevel]$InfoLevel = [VstsTaskSdk.FS.FindInfoLevel]::Basic, - [switch]$Recurse) - - $stackOfDirectoryQueues = New-Object System.Collections.Stack - while ($true) { - $directoryQueue = New-Object System.Collections.Queue - $fileQueue = New-Object System.Collections.Queue - $findData = New-Object VstsTaskSdk.FS.FindData - $longFormPath = (ConvertTo-LongFormPath $Path) - $handle = $null - try { - $handle = [VstsTaskSdk.FS.NativeMethods]::FindFirstFileEx( - [System.IO.Path]::Combine($longFormPath, $Filter), - $InfoLevel, - $findData, - [VstsTaskSdk.FS.FindSearchOps]::NameMatch, - [System.IntPtr]::Zero, - $Flags) - if (!$handle.IsInvalid) { - while ($true) { - if ($findData.fileName -notin '.', '..') { - $attributes = [VstsTaskSdk.FS.Attributes]$findData.fileAttributes - # If the item is hidden, check if $Force is specified. - if ($Force -or !$attributes.HasFlag([VstsTaskSdk.FS.Attributes]::Hidden)) { - # Create the item. - $item = New-Object -TypeName psobject -Property @{ - 'Attributes' = $attributes - 'FullName' = (ConvertFrom-LongFormPath -Path ([System.IO.Path]::Combine($Path, $findData.fileName))) - 'Name' = $findData.fileName - } - # Output directories immediately. - if ($item.Attributes.HasFlag([VstsTaskSdk.FS.Attributes]::Directory)) { - $item - # Append to the directory queue if recursive and default filter. - if ($Recurse -and $Filter -eq '*') { - $directoryQueue.Enqueue($item) - } - } else { - # Hold the files until all directories have been output. - $fileQueue.Enqueue($item) - } - } - } - - if (!([VstsTaskSdk.FS.NativeMethods]::FindNextFile($handle, $findData))) { break } - - if ($handle.IsInvalid) { - throw (New-Object -TypeName System.ComponentModel.Win32Exception -ArgumentList @( - [System.Runtime.InteropServices.Marshal]::GetLastWin32Error() - Get-LocString -Key PSLIB_EnumeratingSubdirectoriesFailedForPath0 -ArgumentList $Path - )) - } - } - } - } finally { - if ($handle -ne $null) { $handle.Dispose() } - } - - # If recursive and non-default filter, queue child directories. - if ($Recurse -and $Filter -ne '*') { - $findData = New-Object VstsTaskSdk.FS.FindData - $handle = $null - try { - $handle = [VstsTaskSdk.FS.NativeMethods]::FindFirstFileEx( - [System.IO.Path]::Combine($longFormPath, '*'), - [VstsTaskSdk.FS.FindInfoLevel]::Basic, - $findData, - [VstsTaskSdk.FS.FindSearchOps]::NameMatch, - [System.IntPtr]::Zero, - $Flags) - if (!$handle.IsInvalid) { - while ($true) { - if ($findData.fileName -notin '.', '..') { - $attributes = [VstsTaskSdk.FS.Attributes]$findData.fileAttributes - # If the item is hidden, check if $Force is specified. - if ($Force -or !$attributes.HasFlag([VstsTaskSdk.FS.Attributes]::Hidden)) { - # Collect directories only. - if ($attributes.HasFlag([VstsTaskSdk.FS.Attributes]::Directory)) { - # Create the item. - $item = New-Object -TypeName psobject -Property @{ - 'Attributes' = $attributes - 'FullName' = (ConvertFrom-LongFormPath -Path ([System.IO.Path]::Combine($Path, $findData.fileName))) - 'Name' = $findData.fileName - } - $directoryQueue.Enqueue($item) - } - } - } - - if (!([VstsTaskSdk.FS.NativeMethods]::FindNextFile($handle, $findData))) { break } - - if ($handle.IsInvalid) { - throw (New-Object -TypeName System.ComponentModel.Win32Exception -ArgumentList @( - [System.Runtime.InteropServices.Marshal]::GetLastWin32Error() - Get-LocString -Key PSLIB_EnumeratingSubdirectoriesFailedForPath0 -ArgumentList $Path - )) - } - } - } - } finally { - if ($handle -ne $null) { $handle.Dispose() } - } - } - - # Output the files. - $fileQueue - - # Push the directory queue onto the stack if any directories were found. - if ($directoryQueue.Count) { $stackOfDirectoryQueues.Push($directoryQueue) } - - # Break out of the loop if no more directory queues to process. - if (!$stackOfDirectoryQueues.Count) { break } - - # Get the next path. - $directoryQueue = $stackOfDirectoryQueues.Peek() - $Path = $directoryQueue.Dequeue().FullName - - # Pop the directory queue if it's empty. - if (!$directoryQueue.Count) { $null = $stackOfDirectoryQueues.Pop() } - } -} - -function Get-FullNormalizedPath { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$Path) - - [string]$outPath = $Path - [uint32]$bufferSize = [VstsTaskSdk.FS.NativeMethods]::GetFullPathName($Path, 0, $null, $null) - [int]$lastWin32Error = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error() - if ($bufferSize -gt 0) { - $absolutePath = New-Object System.Text.StringBuilder([int]$bufferSize) - [uint32]$length = [VstsTaskSdk.FS.NativeMethods]::GetFullPathName($Path, $bufferSize, $absolutePath, $null) - $lastWin32Error = [System.Runtime.InteropServices.Marshal]::GetLastWin32Error() - if ($length -gt 0) { - $outPath = $absolutePath.ToString() - } else { - throw (New-Object -TypeName System.ComponentModel.Win32Exception -ArgumentList @( - $lastWin32Error - Get-LocString -Key PSLIB_PathLengthNotReturnedFor0 -ArgumentList $Path - )) - } - } else { - throw (New-Object -TypeName System.ComponentModel.Win32Exception -ArgumentList @( - $lastWin32Error - Get-LocString -Key PSLIB_PathLengthNotReturnedFor0 -ArgumentList $Path - )) - } - - if ($outPath.EndsWith('\') -and !$outPath.EndsWith(':\')) { - $outPath = $outPath.TrimEnd('\') - } - - $outPath -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Minimatch.dll b/arm-outputs/ps_modules/VstsTaskSdk/Minimatch.dll deleted file mode 100755 index 700ddc426e56b08270c9dcbb1ade8ded248f98d2..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 18432 zcmeHvd3amZweLFTNJpa;OY%U-U;wdJ(iE<^0Dr1eX+yVU^ZP<}CerFP{^D;NRAvpy{Upu7qdr-p#QQK0A=EE z*j@RF!K$=fum`{t+x7$Dj;_a3@mYu3X*)Y&L6B{wNj$7;1D=Y{x>+@ezQumUhi%iz zO@BY1=+-!qPq<}p%U-3n%sDf*P#@P|Wa1p%m=FXEn4%bhfB`=%h9F>|Q;H!781527 z5HJu1N4U|d+S*S|6A90AA zkcdZ#{0VeB+M>~Zr~5WKIT}ZR`3qry$+MxwZUCkMpp6A zlnP^-LRYHRWuXsdbCpqNodtCbjqPxWp&AP6_LosJK9}1uT+)sn=XT(TXp2E@Xam*5 zPMKe?G$W3ZWHq@`VV5-rby7Zf6F~r;o>=af9Y2q?MO$37yJW9;db*vutEt&Mw*dE= z6Nqt_Zdh=pf1--OAk^fxTE;9o}~-pGxds~dH31h<)Z!q6++rR>xk zJz{CdPk> z$z#Au8q!>Hj%Z+R9P=r84Bjb~FXeL3Xo0zLOs`}dQz|)u0CZuT4B8JLU=+i3e#c`5 z>ZG(pT_9Nx6GD)ydrh0*w^_f-@2TGv@TlHf=&gTgwIVz!+!m#uGV59+jt@)=-B*K# zw%l|9bmPBpVLRIJo5lp}bD84|Ep!cGdyFTQZk>y2&4K!NqElK^oqjK@(VamUUv(2K zE^LK()C`+76YznnE|^@Vd&PvPC+unHZ})g$bs%{*i1GFsPjfhI>UCZV;pvwe$trLC zuAou;@X>CFwo3HGXfed3lY(v8Zgq@!gPBL+fr@d}10i()iA+Y=_?q`qs zER3#yrUK4B$*9+7VMzV;Rx^vBU4I-d@GI_FGq_P-Q`pyH)F-vtsK3wxxo997Os=Sl zRwd5~2O`0ED|lgVxXQxx^~aHr{MIsNRn_l`R)wp=UJJ{BzwNu>VA#Ja8pO*7r2XM= zAW?u6sfkS8_2E)aIxk0N`7L$_dbwD@x9jJi8M4Y_cr zq5u3aU@AS#cskl~vto~@=YTPhZb)8RALw{HGhMLC1znGGCSqfw?xY3oZg5@Ab>=wR z5q3)#9CMP}!tPSD7pNL*P^10K!spBquAa%M82Y8&u&ZuO$86~mrT zMu{8iU(-xQA{H*@Sm=O7aV#@Q8C-E=s@0J>hAC2-ix?&qI8BqxmGCK7nH_ASPVt(_bLbKjmgX$xwb?w^urJY^^qvYHLvXq3;z*{+gi+4>C_rGA3QQ@Oz%aN> zXZrIpI)V6c)dlK;g)Vfi%Dfhl<$A3asd!#()Lk1jORGydJaE14R}&*$9Sa;2do~5q!z<@Y>^7LKsnsR&bmOy zvz$W$4QtO|1-K|}0mgUtAgvKky}LCc=#gg&Buft_fz(Q`?O3lAtV=IL)jhj=KoW0k zs_}l7lVPCY+EwQP={O5TH3>|i4X_L$+z;BDTFULVV>*SA65Cx3d!qrz=CETfhpCv` zk>IveeKQ;=Y~%uVr{gySj=91t%XGYqX1%F-B_DiWXTC2dYE`q$%x;f64MnjR1YAqO<^IB~P zQ4pS!41)OiXP)|{kP@7bSPP*U~mG*t-R zv&+it=cW~QoaP8sq2f)QQ_}D#C*7H|pyRuctw#h#9WfcesN11R@>724xQ}&9yrvCr z^P)FYj-~%<$Io@a*VCBX>6q$CAyp*P)246?6J+mens*-(dc|Ze2lDG_MO^NR`on%h z`m^@gS5BYyt_Zj6l$2dtOb$kk*QDGB}C|ko3YbEN=b=r#_+b?^7J1eT=sNb)Ter-_D|8;aBV|89Ry6LO~5_vMtw;{Efbfa z6;qtG4@&L7L7mc2RvPxDu=(=LWMc(&Sa3Urh8?a}AcZ$ajCcYiJSwKMHmM3K8*+9u z>k7MIKw=)w5TC`+xDmJdco>?Rz4~|r?-cf*Ok)#1huO9II1;z3xk?|e!8?uwm2CE5 zQ_jLQ37KW82*(7ZQnP@wi9e3I$@p7=`E5f-7wsxQi5IM@(1C-F9hHIwQw5}#mdRSy z(}~(mfeALo6L>y&ZmG?{^W;H4N#g~DZl(qIQxK@eefk;ZnKC~WtXQS7 zVq^JHCpFi;lwJ=ZtmMwIC}K!RiHNlaHdJfJ_-txe{oEbZSL<@%f#foewHHWGH@$qY zO}gUPs+y?Q_CV@L2m$r}?qx{hpNRvG#-bQDp@&nq8FeCAg0| z9i(+1B|rBz+G5ggFkwB?M=?6ejhyeYGSE}so+@qYjboU@r3r=AS)F#9CYc+DVaa=| zwK_jiCT@S=V7?IX2MyC2#JkGNM}6-Y7JYpM=S`%098IF`uv@jW?pt6ccRAvAvgFO? zwI$ZlDOSqqo9tm0Ipy&>G}9b)DCh8z=F>DEgG|H9qP*>%`h>=5nH2~YT(y6fQz zc1`K5<`}v(=uv)I`_OBrPdm)^fWu@RC7$k1l(-EJuYPxXq~x_PPhB9?CG7Lz!om>x ze$9qs4HzTcUJH&j3{Ij=LQ$0Ui%8_Dm94RVIi?H(S;b=)T3J7CYjcXeT1&R7+vDZeR0nlfeb z_*Hqu8Eh8ARO>S*-NaS)X0*b+Ku$9YBixI69$Zc!iRHLokVr>DFcY{3;Mn2b;3f*o zlDfDO1dMozAqW_lkV-<3^^$~nvusZCPMviimnaEA7V1)(SgFUmAcb3)wcISOz+}b4 z(&bMaG!*5sd?;%+&Q5CcEbIW;M+QNT?*zjIq0wE=v zg*B*OKwbYtiVeag8aJ4@NFQg~f)!Y|F{1uNx`3^rIf)S$F*Y-Cvtc18n9VhYB@@lG zzm8Z+*#9Yz7s15Y1?)im*B}?AQPYt1Mx478q@2L{3}g_NTuwG&UV+8_R+Q^{C>;>admgfV~B3bQuf#V%E40 z=IG-*P!^_)T7nYm`z~6q@y#7Rh(o$+S-K_N-qPNR9X_w1Bg{ueZ9GPF1n=)bsIjkT z=kh}Zmgrqbv>jXU#!LF>?wC3UHEz6QGlGyl0s2=MxW@G()&bD`fv9%bf_r^F3bZDI|GdO znQQ!hdfERN;3dJwAbBe-G(z+Qph>$lme~jBCzr^q_Oi^kQR=6AMdoK-mbr--enB|@ zCh+^hSt6y4zNfq)>Tti!XVNOs`K<8Y2fm-ieBAn7ZicUl{wnZco4~h;o}F&y{KofF zwB9B7$E1}NkYSI#iUDCy^1o_2?O*ThoT5(pmmVpGECXO3)f9 z`!c8+N>R5^A9tvYLOqBftf6MQhzu}>@69O_;?`GWw%rvY2(0skhzgMo7a z+x-kL6TIKc_><5XrXSNbz|U*D0B_N+0Q`6TC}5xd9>70p?+2`cIJ;8ql{<7<1Zj&;>MnLY72|GUzSgkSVUA~6_Pq-PcMc++o5}YNs z$KX!7!FxOq)HK@VQ11=Y!n+xVsxgC_PC18KWY%Kt+79&-R}kOTUE@$MxoR=e#~teZ zzM$r!cR1AjzFOQl-Re-!xr3Tp@&vd3D|an2%txHEcrd7$^q@nv1#2-|Kj%FX8H7|Y3q3-b3Vh#VkL#5FNADwcjHRywne(g~A!4^OL(V;#KTQHx6 zI_~|e|8aMKJc|gQ8@v<#pcbGx4)s2NEwa&B4)tYd2~y0V{uNq+v_w&7MKR~9Xqiy& zJ!`K28}2GPA=K^kjPGATecz!Dcz@uYL#xl>_HL&i`hMb$&@~RVE%+yB{U1Wz0G%(p z>*;rjqLtpi&|LbPL;cXFnP*d~k+ob$DUA3$YFVr(ugTQiLfuX$T_JNGox;9?C0}vR zH5bq~v2Zfg6KpaY=mgeHrdE3spsvSmimA7{Tg*jtO&e41r7PTdZ86>AP-|$N*+h2= zbscqT8_aX*L5C`8yUp|H^N!>#+MpSyuR7FRybx zFNC_CuJZm1?*rxYgnO?03nn&84z=3*u({l6;d+Ul4th!H1XWEP^r}!#5Z7Bleo^!U z#^_;lB`p?8MaXK(J7p|+Ay##6LP@Trn}kwUchYS_T_^2z(g!Q*bf1ffozh zEifZ6C-6$ZS~@EDO@Jo(wBg{{$i7iOvXJnv6Mk4@%|7j0uBCuq3NFQNBC#PP8vWiz8F1aKYYet&~{2`Kj1sG ze)_fNcByq2B%}U&wVbAzpV9__oAiQ62I-{#3GD@H#i}s^&N6L;{_F_?a@|4d^)lzm z!0lR5N{bH8GIO#X(s#RdEtwj_A?@edqoVmvdeZe9v~I#bZ2upDpMcM=Md?4Z z>qW+={n%Tjv(L}g@1#S4n0`0?)wf!|mF`E2S8A)VH#n;O8Mb{w{4iGw2Y2e95ifmF z;A0Md#5b+zUJMw*x#OL#2!4IQct73l z3ekSL51fo}2I;r17>&~l*cLEMV;Ar%tT|EoBj7x$2B(qc0wyUA*iLH!S5XgOm+;?0 z+ky89e-8}2)s|=BLYteB%ND{30x;|zraa>j|e;^P;-gj z1a=C{2)s_C66S!MVfF{O<_odiRfj2ZH=Ptxw=W_s>jj z(ZHhv^5Yf@+`!$~1#8$Pdw_eev(=F3eZYN)Obxr)0Pp~Ipc=Ab74RyW13Uz%;|T+= z2Gltl1CIdec=!xZ1E}Mv2dqP$)_~0geiq_f12zx%a#{fV0ze%*lLp``0Cif4^SMT= z0Cn6JH3DA?*g(tZpXihH7(GL$aYEUsjcdoX2ee1DZ)(qJnqIG;tGDVsdapjD=k=m~ zi~dplGrDV%R}Cy3_%M9YSdX<#2Zp6fSU)lN8_=0Nb+(-@_im};5)T^i8dh{XUOYZL zemns@K|EC`IiJ3$Uw~&VJ)(Eg6L>$RpHI)@{aesvtRNxP57ppd{#@`I zjmJ^;v^eT!FLxMJVFuFSx2 zcCa&V<&Pe=#tK`q#bIl(J3Epc$`rHhEwp+|=1}&+1N-&?ovG#wtkzaqz243YWP6T` zX7Ynvv8|OhjO7RRx6;7J^8W2S=*udikX2!%?w;=awr?BP}_z{Z(fX>FU$Yipy;`C>atNsb znr+L=#sHnE8PT4?QB=r;qGNV~y4_}hcDuRvT zSdbP4xokLVXUhQxyel(W9K)Msry@iulqpGELwU>2a+pZr<}#_eK2@S(iIllnlGH<8 zb{5H85h`pPk2!>LSw%@XzNEPdGA|KHh=ozO!Iqf<-GiM)+|wTzLn~XeV?{eNvLjm% zj~03}`Ju7QP_``5ojou%G{n9v^EwNK?BN3=M|b9mXJp%%!R+CTeW+YxXU0a~H{e(Q z*{iL}f|9BYF!0i>UBF^eu2m}RvhoLWLt}P^*P7YI-55hVH#)sgby{ld$c|)=2v(R~ zdAp62Gf$H8WFf75-o6Qduhe^eH*Kl^=5M9XwM5CDZxy%UlVs;`9%5~F&BO|4_!vvPdQprlV zyf$M(AtehYkt>*^NN|;`X{Vh#OzSOcB%8_8MOH3Pow8{t&8;2TgU&XBHrm$MXgRsl zR;$=IHacqA2-=<_16dhk>a>Tj9my9tvy{2W1DTQB;I>h8ghQcRqC6$TVCM=}9=$H2 zyLsw6lpCe()~ITiY+gP`OJ?=v@>dcvQZd^#oUt8Wl(Mqpk1~k_T6SI*;uXoocIGr< z9L-`$>#=Rip4wGmi$WW-MJItVCF9t`k&t0hb}@jwnJHP7r$ zg-uJLqe4^F9_U|+-iuyiFKofrHSPpxs#3PFKhTQ{DlOYPrHf0;?WndZTOuP4ee4VJ zs8XeOrSy?UsGqgZsk8$$xbUKZ2N=Gw^_9w*hQ|V|YmKtZx7YC(xtE}q7tl`DYi5?2o zRcktnEu<3MtuG|}JajsHA)&btYKIKNBdQjJ>Z^5CRoY<%Ty>!~rvC7URWDqpiBE+uj&d2Es_mEKu3pj8fc14e#8WK@`GOV z8DBWX(0lG@D8x7j+;)WK&!5k%`SbnUqSzFgcgC)WM>MDkg>bv4hr*K&qVJQR)*@T@ zeI4F@@iJI&a}1Y8+yFi%+#CvThNXwKNc9}iez`b@9ptVJk7))h(xW7}7e7BN`5T(W zL99-Lo=_-~@sNwPvK443ss&2EiqwQ~(G^mi&=;VWPG1*ii|41nCiG8sstR$>4TDp)VQFCwIQCMEmG}M!f1xc8vKqE zo)H6lTt%<|%Q!|!)sV}hMS?Dm?)A?1%!$NxZzSstMHU+pRbH?2GTJkm2^|p~#k6k81(grNK~r(ET2d*9%Lb$naqL!iZ%IQlJd) zwZDD)vk%{Y^j(uDID5Dz@kgjg1h@kwrg!vpwqjZ%Q{&&=^S*TQKieOg_la-3lKf66 z(byTu{^Yvf{rsmphBB|No;1-mgq9f3>hK zbn?kN*SzIN&s;z7uKb_+|M7>5=Dcw4#El<4XUD2s-O^88+Wm*GU;crM{^Q`gcD#81 zsXe!Sc>NCo?!nJrvFNrtuI)^J<2Nfl`0kVYpY@iqV6cR6+TNt{D#O_;hbo(%rFpfg z%+aNFCGkdz)G|;Kg+p-vi68Ts5wC8B@Y-TZl!pTHQjYge;UO+XrgRd@f>0Q=%2ZB- zIB9b#Ug~BFICDtY7;h6(RpGjB8u-01I5n(Zas@YsJcSoW3+8v2uRt~2PRkrZsCaP` z%M;!^hY)>E!ekmZ+mS7JOJ0e1gE5&RYTEm`K4ejh?~5E;L%bA3wjduM>CcH7;A0Z2 z39Y*cGcOcTN}LL!0@ai${3@*|MWHUcm42xHg|Sx z`{tfwk3Rjs-`(@)7u#+*@b2&fb<3*0nqD`t;EumPyk`7E?55KHhkzXnS5bT)o=#3d z-F+{9yXNOFH5^~}{vRh_efj-=znQJ>TG@X|0T&zneSN+C-Px<~SNNlRlIX`lH6K&= zS^XHJY=2iHztz#b0<#WW(T^L9EUuHv-1O++0s1PME`6S3JXWHnze|6@uekfVEW3MT zWD8De>Y6p1mBYT2o^FDY>gm-hDgI`N@NExGR&rJ1CG65?^I2{ao?ZKiy45!v%mU6o z{-pd7xp#x)`K^9S*368ckzJK@|eeCHK|wh@#b0Crf~9w6M#pe4dt zz?`bfXOcXA%di!1*2AAZ>IHR3^sUCXQ`(eW-H<5Yn`5?jbXtG5NDp!qZSh!nE9zb< ztrseM(26}cKP~cbpO68?i={JC27M@7HoJ{94MJiBHg6Jt^rDR+*ghhj8AZR?(joL5 zXRI^uV)Ov~6T{i41(qQF;Jm}5U)G~Wa1eUgi?-tx2;$Q%_HJ|9;1T4OOVPlT^5`4c zy-fVO9Xc%ZWemP8R`eKu26_g+E)%~_uQSuTGkx13bviM61?kHHSb7va|F7z)p8hw( X?dtd6e<)43|K{fYzxw~TJn(-2*CUr_ diff --git a/arm-outputs/ps_modules/VstsTaskSdk/OutFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/OutFunctions.ps1 deleted file mode 100755 index fd898d6..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/OutFunctions.ps1 +++ /dev/null @@ -1,79 +0,0 @@ -# TODO: It would be better if the Out-Default function resolved the underlying Out-Default -# command in the begin block. This would allow for supporting other modules that override -# Out-Default. -$script:outDefaultCmdlet = $ExecutionContext.InvokeCommand.GetCmdlet("Microsoft.PowerShell.Core\Out-Default") - -######################################## -# Public functions. -######################################## -function Out-Default { - [CmdletBinding(ConfirmImpact = "Medium")] - param( - [Parameter(ValueFromPipeline = $true)] - [System.Management.Automation.PSObject]$InputObject) - - begin { - #Write-Host '[Entering Begin Out-Default]' - $__sp = { & $script:outDefaultCmdlet @PSBoundParameters }.GetSteppablePipeline() - $__sp.Begin($pscmdlet) - #Write-Host '[Leaving Begin Out-Default]' - } - - process { - #Write-Host '[Entering Process Out-Default]' - if ($_ -is [System.Management.Automation.ErrorRecord]) { - Write-Verbose -Message 'Error record:' 4>&1 | Out-Default - Write-Verbose -Message (Remove-TrailingNewLine (Out-String -InputObject $_ -Width 2147483647)) 4>&1 | Out-Default - Write-Verbose -Message 'Script stack trace:' 4>&1 | Out-Default - Write-Verbose -Message "$($_.ScriptStackTrace)" 4>&1 | Out-Default - Write-Verbose -Message 'Exception:' 4>&1 | Out-Default - Write-Verbose -Message $_.Exception.ToString() 4>&1 | Out-Default - Write-TaskError -Message $_.Exception.Message - } elseif ($_ -is [System.Management.Automation.WarningRecord]) { - Write-TaskWarning -Message (Remove-TrailingNewLine (Out-String -InputObject $_ -Width 2147483647)) - } elseif ($_ -is [System.Management.Automation.VerboseRecord] -and !$global:__vstsNoOverrideVerbose) { - foreach ($private:str in (Format-DebugMessage -Object $_)) { - Write-TaskVerbose -Message $private:str - } - } elseif ($_ -is [System.Management.Automation.DebugRecord] -and !$global:__vstsNoOverrideVerbose) { - foreach ($private:str in (Format-DebugMessage -Object $_)) { - Write-TaskDebug -Message $private:str - } - } else { -# TODO: Consider using out-string here to control the width. As a security precaution it would actually be best to set it to max so wrapping doesn't interfere with secret masking. - $__sp.Process($_) - } - - #Write-Host '[Leaving Process Out-Default]' - } - - end { - #Write-Host '[Entering End Out-Default]' - $__sp.End() - #Write-Host '[Leaving End Out-Default]' - } -} - -######################################## -# Private functions. -######################################## -function Format-DebugMessage { - [CmdletBinding()] - param([psobject]$Object) - - $private:str = Out-String -InputObject $Object -Width 2147483647 - $private:str = Remove-TrailingNewLine $private:str - "$private:str".Replace("`r`n", "`n").Replace("`r", "`n").Split("`n"[0]) -} - -function Remove-TrailingNewLine { - [CmdletBinding()] - param($Str) - if ([object]::ReferenceEquals($Str, $null)) { - return $Str - } elseif ($Str.EndsWith("`r`n")) { - return $Str.Substring(0, $Str.Length - 2) - } else { - return $Str - } -} diff --git a/arm-outputs/ps_modules/VstsTaskSdk/PSGetModuleInfo.xml b/arm-outputs/ps_modules/VstsTaskSdk/PSGetModuleInfo.xml deleted file mode 100755 index 837907e84b07f17a5f5f40ba6174c07256457e60..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 23222 zcmeHPZEqX75$5Lt{SQVywJ0RN#Yuc{1GsjQGtO~>NQr^gMIlSJ<2%2ol9F5w`R(mJ z569yrcS$aHB_l;47`E0ca^5*4XE^-te|F3pb83DzQ?p_|m@_lM)1|pJH|DSAky$rg z`@3d8AEC{!=Gt80+o}EjqnY7nY<@7S_?eoa`3M--W`O4|J}>cR0%%kGo}*eGYb7oF<_JCN z+G*S8=5>J1xA*k*EKj7bYxXSlUqovzW*aB{#$8#C!#PGb@P$v^>YV9q`n5 z_#yU!f*yKI?|O7W58)5Yg@tg2XG(6@e6rAqeRiiK!M}%Z*qf3SZJt5Svqm`U`U(9< zB@T8#Yp?W9xaxtsBdeh!(0dI|sLca!vArqioW}3N2{MeALDzi2&X-8$(G9N3jW(SKV`uc zU4OK;L}*nD&7n@LbqrbGfJa{sLR~JDG5V9o3yg)C)#RVR^`F5VN9?+Jf~P8tUA*13 zBYVZ^J;mFJl^eayXFQFdw>TyHkf3V*Ep&4Vh?kH$y~YR<_4rtoK-wjaK z$MYuq(}sD9zgwX6FL<+oXL=f9CH#5)0R z<@iMDv1(#aNsUk*vI<|n9BD&X(Ia_RL?rHegeN=t!!UH`qYB1GpN7N4DCbm z_4olYq890!%OiC&szDzjN3D$UG6as@u)lC22!}DNEVq=_+nt`#Uj(%Hx75VH+&HP=T9vaXKWL#5vugWh>4#Q2+83Ep6>(43+J>{w{S6U%88VjKF7Ej?VT zcFZou$OwPAdmdQt!W|O#dCh69!u=bpkmF@!b<~D`ALbPLpiF6xq@ODo&J5?4_IYWh zbT6<9r&SFs-Sf$StKBnbkMbO01w)$KcyCt*V)OI+wkk|nn_pO(Dd+ik7dkm(PGJLA z;CvDA#1m7hi-9-4cXQ>aeux%y3a;n1cZK%?I^n))GN%j`p2Q?h0dWdS=hKVAJce~o zVCP(|%*(gCKP^1S5hQvIxpJ>QAI&a&S}6TIXS=ie$i)2cuOQul^{k8ZP^4TT7m^Xb zwK$q}jk7q2J*zv$3mK7Y4)+cEbEfCWqOWi3QFLbBg|?}0+S3&%q7|Ium!5^YjW(k~ zVfO)Piv18{Lo$=@S-9Loa$e=!b%hqqrQlZQ&_^#GetUVUWgmmWQ>>IY+x^}H+^=!v%{XeF$1U<&k}XL^P5g|Q za##M`!N^!#)TBPf^1U_S=j3witBK6FmXWF!9#$h?%SctbJ(K!Vt~Sasuw|r5P6U+w zp8LPVUn#w1q$a5S!gYrfCF;=f+@~ zNc`FVsl;iSv2%s|E*5LwLCo1bFCD6%5HJ4Hjs<2VXQhgh*onR}Y~~H!?D4JLpUX+n z@OfzeWFq%pdOn0XEuL%%pETW$YPo%sedjK(5%yYX85bD{%Aj0x(sTSeV-;==i&X?# zt)u6?zrYiH!KqflDc9m$KtFNiazZ&&pZmuLmDXHPv;#VG) zm{)Y6aSg!}fKna9`0~x&v!0-mJQg#w%&ShU2DvvB>x<*?ZA9W;jQq&yUrOUO;LU(d zPVo-_xq2$KT8~u3)mnv!DoE!->}z98)@_FK6YXIT(z;*h?dW1j-{9QkEa{zPf)mH ziB&X*=*j3N>pA?YDZ=IIohP_sqb5W@q3$9N%2g)Me-rxRv9NBas8!sz9_$AAb>LjphIjnf&sRrtHWa)o+oV0kU`>EEYtk~J4 zT($78`;+(X*>-8`XN^-Wt57w&spppcQ}|){Iep@oVtLdwu5_;|Hb#uNu43Isy~NV3 ztI%~1&l5Lpg+Q2xbn7^DQdQ2F_A$=1Y9Ng*uXi)-ny+n++3y+0%4m~R9;9)U+r=Sj zrlNdOHw{1Ct2s8(%Nm7tSpD8r?9_ECI~>NE*Q<(6eT7@&5XKO1S%s>jL{|H5%|jS= zUHdAA`bvl}rrds2jBds(o_!8uZPGUfbCF%5ZC^wzv5Ga^uMQ)#s;N4Q9G>%Fq$!~_ z`4t)Um}7m?n8LLh_1IGV(imm@=FLH_UQ_*YFv_m9$e!2pC>X>2axik=tyLho*s6VU zFp*MO5zaD3i11bIlY=R5KC0?1+%Jt$XR{((UoXX2pFB)2u&S1dlYC6&K6#k@T9kZj zp?-N7{YsU5jG=yMjP<7j>apj-$ftxO%Z*veohZ#HNx`V6MEAz!>b*P~(!KMs7c-;G z7|pPUd*@@<8k=TV{a*Rl{Q8?_I75A_n8Ou1VN9vERmi$h)Qot%W+#lTY5zC{xs^R> zI+{VLqlU9rQ3aHPIn*PLB~=}i##Z064r{1-CDF=R_0>>me7XH;X+s-pm)r!Sna%ERabvrL!RR_?{4p}<%#hA(4XB?p)th44 zWF9^Na&Z?HW7h87UA)0-6Y*=_-L-9R>f(J}eDn84(eWd2FaZaoP$KQ4K#rq)cU*1^ z`~bTv*@sT7w6vO;-0%!y^L)&Kji+CO?`AjBg|aZZW?}w_xgAo)xq-KK=`KZX-|IrZ zyg!iI9hz_VG4rww@%|&;6}FBxv^a@4rdn~-Gmkt3KN{6awWpSN^B8ZVzpvbzCcbT!?()SW|{n$f&N2)FFL}S%GZA)$k>cXCxFaL%U63ls}dh1$% zYlt_^Fs&AZtp7YBV9Pe=D26bJ9aBfk&F$2p|efp?iaAP$~+=wO8R9}vgS7&je^ z^YH`X_yu;?!F`+W9uNn!;~ijl|A07t!?~Rf{MgZhI602)_L9qYS!mjvfDwvW9J&kZM#DsPZ3Zssk^ Rx5|H+@8bU{_~3oezXKZ@|JMKj diff --git a/arm-outputs/ps_modules/VstsTaskSdk/ServerOMFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/ServerOMFunctions.ps1 deleted file mode 100755 index 177820b..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/ServerOMFunctions.ps1 +++ /dev/null @@ -1,659 +0,0 @@ -<# -.SYNOPSIS -Gets assembly reference information. - -.DESCRIPTION -Not supported for use during task execution. This function is only intended to help developers resolve the minimal set of DLLs that need to be bundled when consuming the VSTS REST SDK or TFS Extended Client SDK. The interface and output may change between patch releases of the VSTS Task SDK. - -Only a subset of the referenced assemblies may actually be required, depending on the functionality used by your task. It is best to bundle only the DLLs required for your scenario. - -Walks an assembly's references to determine all of it's dependencies. Also walks the references of the dependencies, and so on until all nested dependencies have been traversed. Dependencies are searched for in the directory of the specified assembly. NET Framework assemblies are omitted. - -See https://github.com/Microsoft/vsts-task-lib/tree/master/powershell/Docs/UsingOM.md for reliable usage when working with the TFS extended client SDK from a task. - -.PARAMETER LiteralPath -Assembly to walk. - -.EXAMPLE -Get-VstsAssemblyReference -LiteralPath C:\nuget\microsoft.teamfoundationserver.client.14.102.0\lib\net45\Microsoft.TeamFoundation.Build2.WebApi.dll -#> -function Get-AssemblyReference { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$LiteralPath) - - $ErrorActionPreference = 'Stop' - Write-Warning "Not supported for use during task execution. This function is only intended to help developers resolve the minimal set of DLLs that need to be bundled when consuming the VSTS REST SDK or TFS Extended Client SDK. The interface and output may change between patch releases of the VSTS Task SDK." - Write-Output '' - Write-Warning "Only a subset of the referenced assemblies may actually be required, depending on the functionality used by your task. It is best to bundle only the DLLs required for your scenario." - $directory = [System.IO.Path]::GetDirectoryName($LiteralPath) - $hashtable = @{ } - $queue = @( [System.Reflection.Assembly]::ReflectionOnlyLoadFrom($LiteralPath).GetName() ) - while ($queue.Count) { - # Add a blank line between assemblies. - Write-Output '' - - # Pop. - $assemblyName = $queue[0] - $queue = @( $queue | Select-Object -Skip 1 ) - - # Attempt to find the assembly in the same directory. - $assembly = $null - $path = "$directory\$($assemblyName.Name).dll" - if ((Test-Path -LiteralPath $path -PathType Leaf)) { - $assembly = [System.Reflection.Assembly]::ReflectionOnlyLoadFrom($path) - } else { - $path = "$directory\$($assemblyName.Name).exe" - if ((Test-Path -LiteralPath $path -PathType Leaf)) { - $assembly = [System.Reflection.Assembly]::ReflectionOnlyLoadFrom($path) - } - } - - # Make sure the assembly full name matches, not just the file name. - if ($assembly -and $assembly.GetName().FullName -ne $assemblyName.FullName) { - $assembly = $null - } - - # Print the assembly. - if ($assembly) { - Write-Output $assemblyName.FullName - } else { - if ($assemblyName.FullName -eq 'Newtonsoft.Json, Version=6.0.0.0, Culture=neutral, PublicKeyToken=30ad4fe6b2a6aeed') { - Write-Warning "*** NOT FOUND $($assemblyName.FullName) *** This is an expected condition when using the HTTP clients from the 15.x VSTS REST SDK. Use Get-VstsVssHttpClient to load the HTTP clients (which applies a binding redirect assembly resolver for Newtonsoft.Json). Otherwise you will need to manage the binding redirect yourself." - } else { - Write-Warning "*** NOT FOUND $($assemblyName.FullName) ***" - } - - continue - } - - # Walk the references. - $refAssemblyNames = @( $assembly.GetReferencedAssemblies() ) - for ($i = 0 ; $i -lt $refAssemblyNames.Count ; $i++) { - $refAssemblyName = $refAssemblyNames[$i] - - # Skip framework assemblies. - $fxPaths = @( - "$env:windir\Microsoft.Net\Framework64\v4.0.30319\$($refAssemblyName.Name).dll" - "$env:windir\Microsoft.Net\Framework64\v4.0.30319\WPF\$($refAssemblyName.Name).dll" - ) - $fxPath = $fxPaths | - Where-Object { Test-Path -LiteralPath $_ -PathType Leaf } | - Where-Object { [System.Reflection.Assembly]::ReflectionOnlyLoadFrom($_).GetName().FullName -eq $refAssemblyName.FullName } - if ($fxPath) { - continue - } - - # Print the reference. - Write-Output " $($refAssemblyName.FullName)" - - # Add new references to the queue. - if (!$hashtable[$refAssemblyName.FullName]) { - $queue += $refAssemblyName - $hashtable[$refAssemblyName.FullName] = $true - } - } - } -} - -<# -.SYNOPSIS -Gets a credentials object that can be used with the TFS extended client SDK. - -.DESCRIPTION -The agent job token is used to construct the credentials object. The identity associated with the token depends on the scope selected in the build/release definition (either the project collection build/release service identity, or the project build/release service identity). - -Refer to Get-VstsTfsService for a more simple to get a TFS service object. - -*** DO NOT USE Agent.ServerOMDirectory *** See https://github.com/Microsoft/vsts-task-lib/tree/master/powershell/Docs/UsingOM.md for reliable usage when working with the TFS extended client SDK from a task. - -.PARAMETER OMDirectory -Directory where the extended client object model DLLs are located. If the DLLs for the credential types are not already loaded, an attempt will be made to automatically load the required DLLs from the object model directory. - -If not specified, defaults to the directory of the entry script for the task. - -*** DO NOT USE Agent.ServerOMDirectory *** See https://github.com/Microsoft/vsts-task-lib/tree/master/powershell/Docs/UsingOM.md for reliable usage when working with the TFS extended client SDK from a task. - -.EXAMPLE -# -# Refer to Get-VstsTfsService for a more simple way to get a TFS service object. -# -$credentials = Get-VstsTfsClientCredentials -Add-Type -LiteralPath "$PSScriptRoot\Microsoft.TeamFoundation.VersionControl.Client.dll" -$tfsTeamProjectCollection = New-Object Microsoft.TeamFoundation.Client.TfsTeamProjectCollection( - (Get-VstsTaskVariable -Name 'System.TeamFoundationCollectionUri' -Require), - $credentials) -$versionControlServer = $tfsTeamProjectCollection.GetService([Microsoft.TeamFoundation.VersionControl.Client.VersionControlServer]) -$versionControlServer.GetItems('$/*').Items | Format-List -#> -function Get-TfsClientCredentials { - [CmdletBinding()] - param([string]$OMDirectory) - - Trace-EnteringInvocation -InvocationInfo $MyInvocation - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - - # Get the endpoint. - $endpoint = Get-Endpoint -Name SystemVssConnection -Require - - # Validate the type can be found. - $null = Get-OMType -TypeName 'Microsoft.TeamFoundation.Client.TfsClientCredentials' -OMKind 'ExtendedClient' -OMDirectory $OMDirectory -Require - - # Construct the credentials. - $credentials = New-Object Microsoft.TeamFoundation.Client.TfsClientCredentials($false) # Do not use default credentials. - $credentials.AllowInteractive = $false - $credentials.Federated = New-Object Microsoft.TeamFoundation.Client.OAuthTokenCredential([string]$endpoint.auth.parameters.AccessToken) - return $credentials - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } finally { - Trace-LeavingInvocation -InvocationInfo $MyInvocation - } -} - -<# -.SYNOPSIS -Gets a TFS extended client service. - -.DESCRIPTION -Gets an instance of an ITfsTeamProjectCollectionObject. - -*** DO NOT USE Agent.ServerOMDirectory *** See https://github.com/Microsoft/vsts-task-lib/tree/master/powershell/Docs/UsingOM.md for reliable usage when working with the TFS extended client SDK from a task. - -.PARAMETER TypeName -Namespace-qualified type name of the service to get. - -.PARAMETER OMDirectory -Directory where the extended client object model DLLs are located. If the DLLs for the types are not already loaded, an attempt will be made to automatically load the required DLLs from the object model directory. - -If not specified, defaults to the directory of the entry script for the task. - -*** DO NOT USE Agent.ServerOMDirectory *** See https://github.com/Microsoft/vsts-task-lib/tree/master/powershell/Docs/UsingOM.md for reliable usage when working with the TFS extended client SDK from a task. - -.PARAMETER Uri -URI to use when initializing the service. If not specified, defaults to System.TeamFoundationCollectionUri. - -.PARAMETER TfsClientCredentials -Credentials to use when initializing the service. If not specified, the default uses the agent job token to construct the credentials object. The identity associated with the token depends on the scope selected in the build/release definition (either the project collection build/release service identity, or the project build/release service identity). - -.EXAMPLE -$versionControlServer = Get-VstsTfsService -TypeName Microsoft.TeamFoundation.VersionControl.Client.VersionControlServer -$versionControlServer.GetItems('$/*').Items | Format-List -#> -function Get-TfsService { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$TypeName, - - [string]$OMDirectory, - - [string]$Uri, - - $TfsClientCredentials) - - Trace-EnteringInvocation -InvocationInfo $MyInvocation - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - - # Default the URI to the collection URI. - if (!$Uri) { - $Uri = Get-TaskVariable -Name System.TeamFoundationCollectionUri -Require - } - - # Default the credentials. - if (!$TfsClientCredentials) { - $TfsClientCredentials = Get-TfsClientCredentials -OMDirectory $OMDirectory - } - - # Validate the project collection type can be loaded. - $null = Get-OMType -TypeName 'Microsoft.TeamFoundation.Client.TfsTeamProjectCollection' -OMKind 'ExtendedClient' -OMDirectory $OMDirectory -Require - - # Load the project collection object. - $tfsTeamProjectCollection = New-Object Microsoft.TeamFoundation.Client.TfsTeamProjectCollection($Uri, $TfsClientCredentials) - - # Validate the requested type can be loaded. - $type = Get-OMType -TypeName $TypeName -OMKind 'ExtendedClient' -OMDirectory $OMDirectory -Require - - # Return the service object. - return $tfsTeamProjectCollection.GetService($type) - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } finally { - Trace-LeavingInvocation -InvocationInfo $MyInvocation - } -} - -<# -.SYNOPSIS -Gets a credentials object that can be used with the VSTS REST SDK. - -.DESCRIPTION -The agent job token is used to construct the credentials object. The identity associated with the token depends on the scope selected in the build/release definition (either the project collection build/release service identity, or the project service build/release identity). - -Refer to Get-VstsVssHttpClient for a more simple to get a VSS HTTP client. - -*** DO NOT USE Agent.ServerOMDirectory *** See https://github.com/Microsoft/vsts-task-lib/tree/master/powershell/Docs/UsingOM.md for reliable usage when working with the VSTS REST SDK from a task. - -.PARAMETER OMDirectory -Directory where the REST client object model DLLs are located. If the DLLs for the credential types are not already loaded, an attempt will be made to automatically load the required DLLs from the object model directory. - -If not specified, defaults to the directory of the entry script for the task. - -*** DO NOT USE Agent.ServerOMDirectory *** See https://github.com/Microsoft/vsts-task-lib/tree/master/powershell/Docs/UsingOM.md for reliable usage when working with the VSTS REST SDK from a task. - -.EXAMPLE -# -# Refer to Get-VstsTfsService for a more simple way to get a TFS service object. -# -# This example works using the 14.x .NET SDK. A Newtonsoft.Json 6.0 to 8.0 binding -# redirect may be required when working with the 15.x SDK. Or use Get-VstsVssHttpClient -# to avoid managing the binding redirect. -# -$vssCredentials = Get-VstsVssCredentials -$collectionUrl = New-Object System.Uri((Get-VstsTaskVariable -Name 'System.TeamFoundationCollectionUri' -Require)) -Add-Type -LiteralPath "$PSScriptRoot\Microsoft.TeamFoundation.Core.WebApi.dll" -$projectHttpClient = New-Object Microsoft.TeamFoundation.Core.WebApi.ProjectHttpClient($collectionUrl, $vssCredentials) -$projectHttpClient.GetProjects().Result -#> -function Get-VssCredentials { - [CmdletBinding()] - param([string]$OMDirectory) - - Trace-EnteringInvocation -InvocationInfo $MyInvocation - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - - # Get the endpoint. - $endpoint = Get-Endpoint -Name SystemVssConnection -Require - - # Check if the VssOAuthAccessTokenCredential type is available. - if ((Get-OMType -TypeName 'Microsoft.VisualStudio.Services.OAuth.VssOAuthAccessTokenCredential' -OMKind 'WebApi' -OMDirectory $OMDirectory)) { - # Create the federated credential. - $federatedCredential = New-Object Microsoft.VisualStudio.Services.OAuth.VssOAuthAccessTokenCredential($endpoint.auth.parameters.AccessToken) - } else { - # Validate the fallback type can be loaded. - $null = Get-OMType -TypeName 'Microsoft.VisualStudio.Services.Client.VssOAuthCredential' -OMKind 'WebApi' -OMDirectory $OMDirectory -Require - - # Create the federated credential. - $federatedCredential = New-Object Microsoft.VisualStudio.Services.Client.VssOAuthCredential($endpoint.auth.parameters.AccessToken) - } - - # Return the credentials. - return New-Object Microsoft.VisualStudio.Services.Common.VssCredentials( - (New-Object Microsoft.VisualStudio.Services.Common.WindowsCredential($false)), # Do not use default credentials. - $federatedCredential, - [Microsoft.VisualStudio.Services.Common.CredentialPromptType]::DoNotPrompt) - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } finally { - Trace-LeavingInvocation -InvocationInfo $MyInvocation - } -} - -<# -.SYNOPSIS -Gets a VSS HTTP client. - -.DESCRIPTION -Gets an instance of an VSS HTTP client. - -*** DO NOT USE Agent.ServerOMDirectory *** See https://github.com/Microsoft/vsts-task-lib/tree/master/powershell/Docs/UsingOM.md for reliable usage when working with the VSTS REST SDK from a task. - -.PARAMETER TypeName -Namespace-qualified type name of the HTTP client to get. - -.PARAMETER OMDirectory -Directory where the REST client object model DLLs are located. If the DLLs for the credential types are not already loaded, an attempt will be made to automatically load the required DLLs from the object model directory. - -If not specified, defaults to the directory of the entry script for the task. - -*** DO NOT USE Agent.ServerOMDirectory *** See https://github.com/Microsoft/vsts-task-lib/tree/master/powershell/Docs/UsingOM.md for reliable usage when working with the VSTS REST SDK from a task. - -# .PARAMETER Uri -# URI to use when initializing the HTTP client. If not specified, defaults to System.TeamFoundationCollectionUri. - -# .PARAMETER VssCredentials -# Credentials to use when initializing the HTTP client. If not specified, the default uses the agent job token to construct the credentials object. The identity associated with the token depends on the scope selected in the build/release definition (either the project collection build/release service identity, or the project build/release service identity). - -# .PARAMETER WebProxy -# WebProxy to use when initializing the HTTP client. If not specified, the default uses the proxy configuration agent current has. - -# .PARAMETER ClientCert -# ClientCert to use when initializing the HTTP client. If not specified, the default uses the client certificate agent current has. - -# .PARAMETER IgnoreSslError -# Skip SSL server certificate validation on all requests made by this HTTP client. If not specified, the default is to validate SSL server certificate. - -.EXAMPLE -$projectHttpClient = Get-VstsVssHttpClient -TypeName Microsoft.TeamFoundation.Core.WebApi.ProjectHttpClient -$projectHttpClient.GetProjects().Result -#> -function Get-VssHttpClient { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$TypeName, - - [string]$OMDirectory, - - [string]$Uri, - - $VssCredentials, - - $WebProxy = (Get-WebProxy), - - $ClientCert = (Get-ClientCertificate), - - [switch]$IgnoreSslError) - - Trace-EnteringInvocation -InvocationInfo $MyInvocation - $originalErrorActionPreference = $ErrorActionPreference - try { - $ErrorActionPreference = 'Stop' - - # Default the URI to the collection URI. - if (!$Uri) { - $Uri = Get-TaskVariable -Name System.TeamFoundationCollectionUri -Require - } - - # Cast the URI. - [uri]$Uri = New-Object System.Uri($Uri) - - # Default the credentials. - if (!$VssCredentials) { - $VssCredentials = Get-VssCredentials -OMDirectory $OMDirectory - } - - # Validate the type can be loaded. - $null = Get-OMType -TypeName $TypeName -OMKind 'WebApi' -OMDirectory $OMDirectory -Require - - # Update proxy setting for vss http client - [Microsoft.VisualStudio.Services.Common.VssHttpMessageHandler]::DefaultWebProxy = $WebProxy - - # Update client certificate setting for vss http client - $null = Get-OMType -TypeName 'Microsoft.VisualStudio.Services.Common.VssHttpRequestSettings' -OMKind 'WebApi' -OMDirectory $OMDirectory -Require - $null = Get-OMType -TypeName 'Microsoft.VisualStudio.Services.WebApi.VssClientHttpRequestSettings' -OMKind 'WebApi' -OMDirectory $OMDirectory -Require - [Microsoft.VisualStudio.Services.Common.VssHttpRequestSettings]$Settings = [Microsoft.VisualStudio.Services.WebApi.VssClientHttpRequestSettings]::Default.Clone() - - if ($ClientCert) { - $null = Get-OMType -TypeName 'Microsoft.VisualStudio.Services.WebApi.VssClientCertificateManager' -OMKind 'WebApi' -OMDirectory $OMDirectory -Require - $null = [Microsoft.VisualStudio.Services.WebApi.VssClientCertificateManager]::Instance.ClientCertificates.Add($ClientCert) - - $Settings.ClientCertificateManager = [Microsoft.VisualStudio.Services.WebApi.VssClientCertificateManager]::Instance - } - - # Skip SSL server certificate validation - [bool]$SkipCertValidation = (Get-TaskVariable -Name Agent.SkipCertValidation -AsBool) -or $IgnoreSslError - if ($SkipCertValidation) { - if ($Settings.GetType().GetProperty('ServerCertificateValidationCallback')) { - Write-Verbose "Ignore any SSL server certificate validation errors."; - $Settings.ServerCertificateValidationCallback = [VstsTaskSdk.VstsHttpHandlerSettings]::UnsafeSkipServerCertificateValidation - } - else { - # OMDirectory has older version of Microsoft.VisualStudio.Services.Common.dll - Write-Verbose "The version of 'Microsoft.VisualStudio.Services.Common.dll' does not support skip SSL server certificate validation." - } - } - - # Try to construct the HTTP client. - Write-Verbose "Constructing HTTP client." - try { - return New-Object $TypeName($Uri, $VssCredentials, $Settings) - } catch { - # Rethrow if the exception is not due to Newtonsoft.Json DLL not found. - if ($_.Exception.InnerException -isnot [System.IO.FileNotFoundException] -or - $_.Exception.InnerException.FileName -notlike 'Newtonsoft.Json, *') { - - throw - } - - # Default the OMDirectory to the directory of the entry script for the task. - if (!$OMDirectory) { - $OMDirectory = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\..") - Write-Verbose "Defaulted OM directory to: '$OMDirectory'" - } - - # Test if the Newtonsoft.Json DLL exists in the OM directory. - $newtonsoftDll = [System.IO.Path]::Combine($OMDirectory, "Newtonsoft.Json.dll") - Write-Verbose "Testing file path: '$newtonsoftDll'" - if (!(Test-Path -LiteralPath $newtonsoftDll -PathType Leaf)) { - Write-Verbose 'Not found. Rethrowing exception.' - throw - } - - # Add a binding redirect and try again. Parts of the Dev15 preview SDK have a - # dependency on the 6.0.0.0 Newtonsoft.Json DLL, while other parts reference - # the 8.0.0.0 Newtonsoft.Json DLL. - Write-Verbose "Adding assembly resolver." - $onAssemblyResolve = [System.ResolveEventHandler] { - param($sender, $e) - - if ($e.Name -like 'Newtonsoft.Json, *') { - Write-Verbose "Resolving '$($e.Name)'" - return [System.Reflection.Assembly]::LoadFrom($newtonsoftDll) - } - - Write-Verbose "Unable to resolve assembly name '$($e.Name)'" - return $null - } - [System.AppDomain]::CurrentDomain.add_AssemblyResolve($onAssemblyResolve) - try { - # Try again to construct the HTTP client. - Write-Verbose "Trying again to construct the HTTP client." - return New-Object $TypeName($Uri, $VssCredentials, $Settings) - } finally { - # Unregister the assembly resolver. - Write-Verbose "Removing assemlby resolver." - [System.AppDomain]::CurrentDomain.remove_AssemblyResolve($onAssemblyResolve) - } - } - } catch { - $ErrorActionPreference = $originalErrorActionPreference - Write-Error $_ - } finally { - Trace-LeavingInvocation -InvocationInfo $MyInvocation - } -} - -<# -.SYNOPSIS -Gets a VstsTaskSdk.VstsWebProxy - -.DESCRIPTION -Gets an instance of a VstsTaskSdk.VstsWebProxy that has same proxy configuration as Build/Release agent. - -VstsTaskSdk.VstsWebProxy implement System.Net.IWebProxy interface. - -.EXAMPLE -$webProxy = Get-VstsWebProxy -$webProxy.GetProxy(New-Object System.Uri("https://github.com/Microsoft/vsts-task-lib")) -#> -function Get-WebProxy { - [CmdletBinding()] - param() - - Trace-EnteringInvocation -InvocationInfo $MyInvocation - try { - # Min agent version that supports proxy - Assert-Agent -Minimum '2.105.7' - - $proxyUrl = Get-TaskVariable -Name Agent.ProxyUrl - $proxyUserName = Get-TaskVariable -Name Agent.ProxyUserName - $proxyPassword = Get-TaskVariable -Name Agent.ProxyPassword - $proxyBypassListJson = Get-TaskVariable -Name Agent.ProxyBypassList - [string[]]$ProxyBypassList = ConvertFrom-Json -InputObject $ProxyBypassListJson - - return New-Object -TypeName VstsTaskSdk.VstsWebProxy -ArgumentList @($proxyUrl, $proxyUserName, $proxyPassword, $proxyBypassList) - } - finally { - Trace-LeavingInvocation -InvocationInfo $MyInvocation - } -} - -<# -.SYNOPSIS -Gets a client certificate for current connected TFS instance - -.DESCRIPTION -Gets an instance of a X509Certificate2 that is the client certificate Build/Release agent used. - -.EXAMPLE -$x509cert = Get-ClientCertificate -WebRequestHandler.ClientCertificates.Add(x509cert) -#> -function Get-ClientCertificate { - [CmdletBinding()] - param() - - Trace-EnteringInvocation -InvocationInfo $MyInvocation - try { - # Min agent version that supports client certificate - Assert-Agent -Minimum '2.122.0' - - [string]$clientCert = Get-TaskVariable -Name Agent.ClientCertArchive - [string]$clientCertPassword = Get-TaskVariable -Name Agent.ClientCertPassword - - if ($clientCert -and (Test-Path -LiteralPath $clientCert -PathType Leaf)) { - return New-Object -TypeName System.Security.Cryptography.X509Certificates.X509Certificate2 -ArgumentList @($clientCert, $clientCertPassword) - } - } - finally { - Trace-LeavingInvocation -InvocationInfo $MyInvocation - } -} - -######################################## -# Private functions. -######################################## -function Get-OMType { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$TypeName, - - [ValidateSet('ExtendedClient', 'WebApi')] - [Parameter(Mandatory = $true)] - [string]$OMKind, - - [string]$OMDirectory, - - [switch]$Require) - - Trace-EnteringInvocation -InvocationInfo $MyInvocation - try { - # Default the OMDirectory to the directory of the entry script for the task. - if (!$OMDirectory) { - $OMDirectory = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\..") - Write-Verbose "Defaulted OM directory to: '$OMDirectory'" - } - - # Try to load the type. - $errorRecord = $null - Write-Verbose "Testing whether type can be loaded: '$TypeName'" - $ErrorActionPreference = 'Ignore' - try { - # Failure when attempting to cast a string to a type, transfers control to the - # catch handler even when the error action preference is ignore. The error action - # is set to Ignore so the $Error variable is not polluted. - $type = [type]$TypeName - - # Success. - Write-Verbose "The type was loaded successfully." - return $type - } catch { - # Store the error record. - $errorRecord = $_ - } - - $ErrorActionPreference = 'Stop' - Write-Verbose "The type was not loaded." - - # Build a list of candidate DLL file paths from the namespace. - $dllPaths = @( ) - $namespace = $TypeName - while ($namespace.LastIndexOf('.') -gt 0) { - # Trim the next segment from the namespace. - $namespace = $namespace.SubString(0, $namespace.LastIndexOf('.')) - - # Derive potential DLL file paths based on the namespace and OM kind (i.e. extended client vs web API). - if ($OMKind -eq 'ExtendedClient') { - if ($namespace -like 'Microsoft.TeamFoundation.*') { - $dllPaths += [System.IO.Path]::Combine($OMDirectory, "$namespace.dll") - } - } else { - if ($namespace -like 'Microsoft.TeamFoundation.*' -or - $namespace -like 'Microsoft.VisualStudio.Services' -or - $namespace -like 'Microsoft.VisualStudio.Services.*') { - - $dllPaths += [System.IO.Path]::Combine($OMDirectory, "$namespace.WebApi.dll") - $dllPaths += [System.IO.Path]::Combine($OMDirectory, "$namespace.dll") - } - } - } - - foreach ($dllPath in $dllPaths) { - # Check whether the DLL exists. - Write-Verbose "Testing leaf path: '$dllPath'" - if (!(Test-Path -PathType Leaf -LiteralPath "$dllPath")) { - Write-Verbose "Not found." - continue - } - - # Load the DLL. - Write-Verbose "Loading assembly: $dllPath" - try { - Add-Type -LiteralPath $dllPath - } catch { - # Write the information to the verbose stream and proceed to attempt to load the requested type. - # - # The requested type may successfully load now. For example, the type used with the 14.0 Web API for the - # federated credential (VssOAuthCredential) resides in Microsoft.VisualStudio.Services.Client.dll. Even - # though loading the DLL results in a ReflectionTypeLoadException when Microsoft.ServiceBus.dll (approx 3.75mb) - # is not present, enough types are loaded to use the VssOAuthCredential federated credential with the Web API - # HTTP clients. - Write-Verbose "$($_.Exception.GetType().FullName): $($_.Exception.Message)" - if ($_.Exception -is [System.Reflection.ReflectionTypeLoadException]) { - for ($i = 0 ; $i -lt $_.Exception.LoaderExceptions.Length ; $i++) { - $loaderException = $_.Exception.LoaderExceptions[$i] - Write-Verbose "LoaderExceptions[$i]: $($loaderException.GetType().FullName): $($loaderException.Message)" - } - } - } - - # Try to load the type. - Write-Verbose "Testing whether type can be loaded: '$TypeName'" - $ErrorActionPreference = 'Ignore' - try { - # Failure when attempting to cast a string to a type, transfers control to the - # catch handler even when the error action preference is ignore. The error action - # is set to Ignore so the $Error variable is not polluted. - $type = [type]$TypeName - - # Success. - Write-Verbose "The type was loaded successfully." - return $type - } catch { - $errorRecord = $_ - } - - $ErrorActionPreference = 'Stop' - Write-Verbose "The type was not loaded." - } - - # Check whether to propagate the error. - if ($Require) { - Write-Error $errorRecord - } - } finally { - Trace-LeavingInvocation -InvocationInfo $MyInvocation - } -} diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/de-de/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/de-de/resources.resjson deleted file mode 100755 index 7871c36..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/de-de/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "Agentversion {0} oder höher ist erforderlich.", - "loc.messages.PSLIB_ContainerPathNotFound0": "Der Containerpfad wurde nicht gefunden: \"{0}\".", - "loc.messages.PSLIB_EndpointAuth0": "\"{0}\"-Dienstendpunkt-Anmeldeinformationen", - "loc.messages.PSLIB_EndpointUrl0": "\"{0}\"-Dienstendpunkt-URL", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "Fehler beim Aufzählen von Unterverzeichnissen für den folgenden Pfad: \"{0}\"", - "loc.messages.PSLIB_FileNotFound0": "Die Datei wurde nicht gefunden: \"{0}\".", - "loc.messages.PSLIB_Input0": "\"{0}\"-Eingabe", - "loc.messages.PSLIB_InvalidPattern0": "Ungültiges Muster: \"{0}\"", - "loc.messages.PSLIB_LeafPathNotFound0": "Der Blattpfad wurde nicht gefunden: \"{0}\".", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "Fehler bei der Normalisierung bzw. Erweiterung des Pfads. Die Pfadlänge wurde vom Kernel32-Subsystem nicht zurückgegeben für: \"{0}\"", - "loc.messages.PSLIB_PathNotFound0": "Der Pfad wurde nicht gefunden: \"{0}\".", - "loc.messages.PSLIB_Process0ExitedWithCode1": "Der Prozess \"{0}\" wurde mit dem Code \"{1}\" beendet.", - "loc.messages.PSLIB_Required0": "Erforderlich: {0}", - "loc.messages.PSLIB_StringFormatFailed": "Fehler beim Zeichenfolgenformat.", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "Der Zeichenfolgen-Ressourcenschlüssel wurde nicht gefunden: \"{0}\".", - "loc.messages.PSLIB_TaskVariable0": "\"{0}\"-Taskvariable" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/en-US/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/en-US/resources.resjson deleted file mode 100755 index 66c17bc..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/en-US/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "Agent version {0} or higher is required.", - "loc.messages.PSLIB_ContainerPathNotFound0": "Container path not found: '{0}'", - "loc.messages.PSLIB_EndpointAuth0": "'{0}' service endpoint credentials", - "loc.messages.PSLIB_EndpointUrl0": "'{0}' service endpoint URL", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "Enumerating subdirectories failed for path: '{0}'", - "loc.messages.PSLIB_FileNotFound0": "File not found: '{0}'", - "loc.messages.PSLIB_Input0": "'{0}' input", - "loc.messages.PSLIB_InvalidPattern0": "Invalid pattern: '{0}'", - "loc.messages.PSLIB_LeafPathNotFound0": "Leaf path not found: '{0}'", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "Path normalization/expansion failed. The path length was not returned by the Kernel32 subsystem for: '{0}'", - "loc.messages.PSLIB_PathNotFound0": "Path not found: '{0}'", - "loc.messages.PSLIB_Process0ExitedWithCode1": "Process '{0}' exited with code '{1}'.", - "loc.messages.PSLIB_Required0": "Required: {0}", - "loc.messages.PSLIB_StringFormatFailed": "String format failed.", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "String resource key not found: '{0}'", - "loc.messages.PSLIB_TaskVariable0": "'{0}' task variable" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/es-es/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/es-es/resources.resjson deleted file mode 100755 index f5c9c23..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/es-es/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "Se require la versión {0} o posterior del agente.", - "loc.messages.PSLIB_ContainerPathNotFound0": "No se encuentra la ruta de acceso del contenedor: '{0}'", - "loc.messages.PSLIB_EndpointAuth0": "Credenciales del punto de conexión de servicio '{0}'", - "loc.messages.PSLIB_EndpointUrl0": "URL del punto de conexión de servicio '{0}'", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "No se pudieron enumerar los subdirectorios de la ruta de acceso: '{0}'", - "loc.messages.PSLIB_FileNotFound0": "Archivo no encontrado: '{0}'", - "loc.messages.PSLIB_Input0": "Entrada '{0}'", - "loc.messages.PSLIB_InvalidPattern0": "Patrón no válido: '{0}'", - "loc.messages.PSLIB_LeafPathNotFound0": "No se encuentra la ruta de acceso de la hoja: '{0}'", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "No se pudo normalizar o expandir la ruta de acceso. El subsistema Kernel32 no devolvió la longitud de la ruta de acceso para: '{0}'", - "loc.messages.PSLIB_PathNotFound0": "No se encuentra la ruta de acceso: '{0}'", - "loc.messages.PSLIB_Process0ExitedWithCode1": "El proceso '{0}' finalizó con el código '{1}'.", - "loc.messages.PSLIB_Required0": "Se requiere: {0}", - "loc.messages.PSLIB_StringFormatFailed": "Error de formato de cadena.", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "No se encuentra la clave de recurso de la cadena: '{0}'", - "loc.messages.PSLIB_TaskVariable0": "Variable de tarea '{0}'" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/fr-fr/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/fr-fr/resources.resjson deleted file mode 100755 index 652870c..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/fr-fr/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "L'agent version {0} (ou une version ultérieure) est obligatoire.", - "loc.messages.PSLIB_ContainerPathNotFound0": "Le chemin du conteneur est introuvable : '{0}'", - "loc.messages.PSLIB_EndpointAuth0": "Informations d'identification du point de terminaison de service '{0}'", - "loc.messages.PSLIB_EndpointUrl0": "URL du point de terminaison de service '{0}'", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "Échec de l'énumération des sous-répertoires pour le chemin : '{0}'", - "loc.messages.PSLIB_FileNotFound0": "Fichier introuvable : {0}.", - "loc.messages.PSLIB_Input0": "Entrée '{0}'", - "loc.messages.PSLIB_InvalidPattern0": "Modèle non valide : '{0}'", - "loc.messages.PSLIB_LeafPathNotFound0": "Le chemin feuille est introuvable : '{0}'", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "Échec de la normalisation/l'expansion du chemin. La longueur du chemin n'a pas été retournée par le sous-système Kernel32 pour : '{0}'", - "loc.messages.PSLIB_PathNotFound0": "Chemin introuvable : '{0}'", - "loc.messages.PSLIB_Process0ExitedWithCode1": "Le processus '{0}' s'est arrêté avec le code '{1}'.", - "loc.messages.PSLIB_Required0": "Obligatoire : {0}", - "loc.messages.PSLIB_StringFormatFailed": "Échec du format de la chaîne.", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "Clé de la ressource de type chaîne introuvable : '{0}'", - "loc.messages.PSLIB_TaskVariable0": "Variable de tâche '{0}'" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/it-IT/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/it-IT/resources.resjson deleted file mode 100755 index 6aeb1df..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/it-IT/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "È richiesta la versione dell'agente {0} o superiore.", - "loc.messages.PSLIB_ContainerPathNotFound0": "Percorso del contenitore non trovato: '{0}'", - "loc.messages.PSLIB_EndpointAuth0": "Credenziali dell'endpoint servizio '{0}'", - "loc.messages.PSLIB_EndpointUrl0": "URL dell'endpoint servizio '{0}'", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "L'enumerazione delle sottodirectory per il percorso '{0}' non è riuscita", - "loc.messages.PSLIB_FileNotFound0": "File non trovato: '{0}'", - "loc.messages.PSLIB_Input0": "Input di '{0}'", - "loc.messages.PSLIB_InvalidPattern0": "Criterio non valido: '{0}'", - "loc.messages.PSLIB_LeafPathNotFound0": "Percorso foglia non trovato: '{0}'", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "La normalizzazione o l'espansione del percorso non è riuscita. Il sottosistema Kernel32 non ha restituito la lunghezza del percorso per '{0}'", - "loc.messages.PSLIB_PathNotFound0": "Percorso non trovato: '{0}'", - "loc.messages.PSLIB_Process0ExitedWithCode1": "Il processo '{0}' è stato terminato ed è stato restituito il codice '{1}'.", - "loc.messages.PSLIB_Required0": "Obbligatorio: {0}", - "loc.messages.PSLIB_StringFormatFailed": "Errore nel formato della stringa.", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "La chiave della risorsa stringa non è stata trovata: '{0}'", - "loc.messages.PSLIB_TaskVariable0": "Variabile dell'attività '{0}'" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ja-jp/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ja-jp/resources.resjson deleted file mode 100755 index 6b07ab6..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ja-jp/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "バージョン {0} 以降のエージェントが必要です。", - "loc.messages.PSLIB_ContainerPathNotFound0": "コンテナーのパスが見つかりません: '{0}'", - "loc.messages.PSLIB_EndpointAuth0": "'{0}' サービス エンドポイントの資格情報", - "loc.messages.PSLIB_EndpointUrl0": "'{0}' サービス エンドポイントの URL", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "パス '{0}' のサブディレクトリを列挙できませんでした", - "loc.messages.PSLIB_FileNotFound0": "ファイルが見つかりません: '{0}'", - "loc.messages.PSLIB_Input0": "'{0}' 入力", - "loc.messages.PSLIB_InvalidPattern0": "使用できないパターンです: '{0}'", - "loc.messages.PSLIB_LeafPathNotFound0": "リーフ パスが見つかりません: '{0}'", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "パスの正規化/展開に失敗しました。Kernel32 サブシステムからパス '{0}' の長さが返されませんでした", - "loc.messages.PSLIB_PathNotFound0": "パスが見つかりません: '{0}'", - "loc.messages.PSLIB_Process0ExitedWithCode1": "プロセス '{0}' がコード '{1}' で終了しました。", - "loc.messages.PSLIB_Required0": "必要: {0}", - "loc.messages.PSLIB_StringFormatFailed": "文字列のフォーマットに失敗しました。", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "文字列のリソース キーが見つかりません: '{0}'", - "loc.messages.PSLIB_TaskVariable0": "'{0}' タスク変数" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ko-KR/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ko-KR/resources.resjson deleted file mode 100755 index e58cbdc..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ko-KR/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "에이전트 버전 {0} 이상이 필요합니다.", - "loc.messages.PSLIB_ContainerPathNotFound0": "컨테이너 경로를 찾을 수 없음: '{0}'", - "loc.messages.PSLIB_EndpointAuth0": "'{0}' 서비스 끝점 자격 증명", - "loc.messages.PSLIB_EndpointUrl0": "'{0}' 서비스 끝점 URL", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "경로에 대해 하위 디렉터리를 열거하지 못함: '{0}'", - "loc.messages.PSLIB_FileNotFound0": "{0} 파일을 찾을 수 없습니다.", - "loc.messages.PSLIB_Input0": "'{0}' 입력", - "loc.messages.PSLIB_InvalidPattern0": "잘못된 패턴: '{0}'", - "loc.messages.PSLIB_LeafPathNotFound0": "Leaf 경로를 찾을 수 없음: '{0}'", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "경로 정규화/확장에 실패했습니다. 다음에 대해 Kernel32 subsystem에서 경로 길이를 반환하지 않음: '{0}'", - "loc.messages.PSLIB_PathNotFound0": "경로를 찾을 수 없음: '{0}'", - "loc.messages.PSLIB_Process0ExitedWithCode1": "'{1}' 코드로 '{0}' 프로세스가 종료되었습니다.", - "loc.messages.PSLIB_Required0": "필수: {0}", - "loc.messages.PSLIB_StringFormatFailed": "문자열을 포맷하지 못했습니다.", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "문자열 리소스 키를 찾을 수 없음: '{0}'", - "loc.messages.PSLIB_TaskVariable0": "'{0}' 작업 변수" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ru-RU/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ru-RU/resources.resjson deleted file mode 100755 index 38dd69d..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/ru-RU/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "Требуется версия агента {0} или более поздняя.", - "loc.messages.PSLIB_ContainerPathNotFound0": "Путь к контейнеру не найден: \"{0}\".", - "loc.messages.PSLIB_EndpointAuth0": "Учетные данные конечной точки службы \"{0}\"", - "loc.messages.PSLIB_EndpointUrl0": "URL-адрес конечной точки службы \"{0}\"", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "Сбой перечисления подкаталогов для пути: \"{0}\".", - "loc.messages.PSLIB_FileNotFound0": "Файл не найден: \"{0}\".", - "loc.messages.PSLIB_Input0": "Входные данные \"{0}\".", - "loc.messages.PSLIB_InvalidPattern0": "Недопустимый шаблон: \"{0}\".", - "loc.messages.PSLIB_LeafPathNotFound0": "Путь к конечному объекту не найден: \"{0}\".", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "Сбой нормализации и расширения пути. Длина пути не была возвращена подсистемой Kernel32 для: \"{0}\".", - "loc.messages.PSLIB_PathNotFound0": "Путь не найден: \"{0}\".", - "loc.messages.PSLIB_Process0ExitedWithCode1": "Процесс \"{0}\" завершил работу с кодом \"{1}\".", - "loc.messages.PSLIB_Required0": "Требуется: {0}", - "loc.messages.PSLIB_StringFormatFailed": "Сбой формата строки.", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "Ключ ресурса строки не найден: \"{0}\".", - "loc.messages.PSLIB_TaskVariable0": "Переменная задачи \"{0}\"" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/zh-CN/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/zh-CN/resources.resjson deleted file mode 100755 index 1d333de..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/zh-CN/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "需要代理版本 {0} 或更高版本。", - "loc.messages.PSLIB_ContainerPathNotFound0": "找不到容器路径:“{0}”", - "loc.messages.PSLIB_EndpointAuth0": "“{0}”服务终结点凭据", - "loc.messages.PSLIB_EndpointUrl0": "“{0}”服务终结点 URL", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "枚举路径的子目录失败:“{0}”", - "loc.messages.PSLIB_FileNotFound0": "找不到文件: {0}。", - "loc.messages.PSLIB_Input0": "“{0}”输入", - "loc.messages.PSLIB_InvalidPattern0": "无效的模式:“{0}”", - "loc.messages.PSLIB_LeafPathNotFound0": "找不到叶路径:“{0}”", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "路径规范化/扩展失败。路径长度不是由“{0}”的 Kernel32 子系统返回的", - "loc.messages.PSLIB_PathNotFound0": "找不到路径:“{0}”", - "loc.messages.PSLIB_Process0ExitedWithCode1": "过程“{0}”已退出,代码为“{1}”。", - "loc.messages.PSLIB_Required0": "必需: {0}", - "loc.messages.PSLIB_StringFormatFailed": "字符串格式无效。", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "找不到字符串资源关键字:“{0}”", - "loc.messages.PSLIB_TaskVariable0": "“{0}”任务变量" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/zh-TW/resources.resjson b/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/zh-TW/resources.resjson deleted file mode 100755 index 512509b..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/Strings/resources.resjson/zh-TW/resources.resjson +++ /dev/null @@ -1,18 +0,0 @@ -{ - "loc.messages.PSLIB_AgentVersion0Required": "需要代理程式版本 {0} 或更新的版本。", - "loc.messages.PSLIB_ContainerPathNotFound0": "找不到容器路徑: '{0}'", - "loc.messages.PSLIB_EndpointAuth0": "'{0}' 服務端點認證", - "loc.messages.PSLIB_EndpointUrl0": "'{0}' 服務端點 URL", - "loc.messages.PSLIB_EnumeratingSubdirectoriesFailedForPath0": "為路徑列舉子目錄失敗: '{0}'", - "loc.messages.PSLIB_FileNotFound0": "找不到檔案: '{0}'", - "loc.messages.PSLIB_Input0": "'{0}' 輸入", - "loc.messages.PSLIB_InvalidPattern0": "模式無效: '{0}'", - "loc.messages.PSLIB_LeafPathNotFound0": "找不到分葉路徑: '{0}'", - "loc.messages.PSLIB_PathLengthNotReturnedFor0": "路徑正規化/展開失敗。Kernel32 子系統未傳回 '{0}' 的路徑長度", - "loc.messages.PSLIB_PathNotFound0": "找不到路徑: '{0}'", - "loc.messages.PSLIB_Process0ExitedWithCode1": "處理序 '{0}' 以返回碼 '{1}' 結束。", - "loc.messages.PSLIB_Required0": "必要項: {0}", - "loc.messages.PSLIB_StringFormatFailed": "字串格式失敗。", - "loc.messages.PSLIB_StringResourceKeyNotFound0": "找不到字串資源索引鍵: '{0}'", - "loc.messages.PSLIB_TaskVariable0": "'{0}' 工作變數" -} \ No newline at end of file diff --git a/arm-outputs/ps_modules/VstsTaskSdk/ToolFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/ToolFunctions.ps1 deleted file mode 100755 index 0e82595..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/ToolFunctions.ps1 +++ /dev/null @@ -1,123 +0,0 @@ -<# -.SYNOPSIS -Asserts the agent version is at least the specified minimum. - -.PARAMETER Minimum -Minimum version - must be 2.104.1 or higher. -#> -function Assert-Agent { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [version]$Minimum) - - if (([version]'2.104.1').CompareTo($Minimum) -ge 1) { - Write-Error "Assert-Agent requires the parameter to be 2.104.1 or higher." - return - } - - $agent = Get-TaskVariable -Name 'agent.version' - if (!$agent -or $Minimum.CompareTo([version]$agent) -ge 1) { - Write-Error (Get-LocString -Key 'PSLIB_AgentVersion0Required' -ArgumentList $Minimum) - } -} - -<# -.SYNOPSIS -Asserts that a path exists. Throws if the path does not exist. - -.PARAMETER PassThru -True to return the path. -#> -function Assert-Path { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [string]$LiteralPath, - [Microsoft.PowerShell.Commands.TestPathType]$PathType = [Microsoft.PowerShell.Commands.TestPathType]::Any, - [switch]$PassThru) - - if ($PathType -eq [Microsoft.PowerShell.Commands.TestPathType]::Any) { - Write-Verbose "Asserting path exists: '$LiteralPath'" - } else { - Write-Verbose "Asserting $("$PathType".ToLowerInvariant()) path exists: '$LiteralPath'" - } - - if (Test-Path -LiteralPath $LiteralPath -PathType $PathType) { - if ($PassThru) { - return $LiteralPath - } - - return - } - - $resourceKey = switch ($PathType) { - ([Microsoft.PowerShell.Commands.TestPathType]::Container) { "PSLIB_ContainerPathNotFound0" ; break } - ([Microsoft.PowerShell.Commands.TestPathType]::Leaf) { "PSLIB_LeafPathNotFound0" ; break } - default { "PSLIB_PathNotFound0" } - } - - throw (Get-LocString -Key $resourceKey -ArgumentList $LiteralPath) -} - -<# -.SYNOPSIS -Executes an external program. - -.DESCRIPTION -Executes an external program and waits for the process to exit. - -After calling this command, the exit code of the process can be retrieved from the variable $LASTEXITCODE. - -.PARAMETER Encoding -This parameter not required for most scenarios. Indicates how to interpret the encoding from the external program. An example use case would be if an external program outputs UTF-16 XML and the output needs to be parsed. - -.PARAMETER RequireExitCodeZero -Indicates whether to write an error to the error pipeline if the exit code is not zero. -#> -function Invoke-Tool { # TODO: RENAME TO INVOKE-PROCESS? - [CmdletBinding()] - param( - [ValidatePattern('^[^\r\n]*$')] - [Parameter(Mandatory = $true)] - [string]$FileName, - [ValidatePattern('^[^\r\n]*$')] - [Parameter()] - [string]$Arguments, - [string]$WorkingDirectory, - [System.Text.Encoding]$Encoding, - [switch]$RequireExitCodeZero) - - Trace-EnteringInvocation $MyInvocation - $isPushed = $false - $originalEncoding = $null - try { - if ($Encoding) { - $originalEncoding = [System.Console]::OutputEncoding - [System.Console]::OutputEncoding = $Encoding - } - - if ($WorkingDirectory) { - Push-Location -LiteralPath $WorkingDirectory -ErrorAction Stop - $isPushed = $true - } - - $FileName = $FileName.Replace('"', '').Replace("'", "''") - Write-Host "##[command]""$FileName"" $Arguments" - Invoke-Expression "& '$FileName' --% $Arguments" - Write-Verbose "Exit code: $LASTEXITCODE" - if ($RequireExitCodeZero -and $LASTEXITCODE -ne 0) { - Write-Error (Get-LocString -Key PSLIB_Process0ExitedWithCode1 -ArgumentList ([System.IO.Path]::GetFileName($FileName)), $LASTEXITCODE) - } - } finally { - if ($originalEncoding) { - [System.Console]::OutputEncoding = $originalEncoding - } - - if ($isPushed) { - Pop-Location - } - - Trace-LeavingInvocation $MyInvocation - } -} diff --git a/arm-outputs/ps_modules/VstsTaskSdk/TraceFunctions.ps1 b/arm-outputs/ps_modules/VstsTaskSdk/TraceFunctions.ps1 deleted file mode 100755 index b8e084b..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/TraceFunctions.ps1 +++ /dev/null @@ -1,139 +0,0 @@ -<# -.SYNOPSIS -Writes verbose information about the invocation being entered. - -.DESCRIPTION -Used to trace verbose information when entering a function/script. Writes an entering message followed by a short description of the invocation. Additionally each bound parameter and unbound argument is also traced. - -.PARAMETER Parameter -Wildcard pattern to control which bound parameters are traced. -#> -function Trace-EnteringInvocation { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [System.Management.Automation.InvocationInfo]$InvocationInfo, - [string[]]$Parameter = '*') - - Write-Verbose "Entering $(Get-InvocationDescription $InvocationInfo)." - $OFS = ", " - if ($InvocationInfo.BoundParameters.Count -and $Parameter.Count) { - if ($Parameter.Count -eq 1 -and $Parameter[0] -eq '*') { - # Trace all parameters. - foreach ($key in $InvocationInfo.BoundParameters.Keys) { - Write-Verbose " $($key): '$($InvocationInfo.BoundParameters[$key])'" - } - } else { - # Trace matching parameters. - foreach ($key in $InvocationInfo.BoundParameters.Keys) { - foreach ($p in $Parameter) { - if ($key -like $p) { - Write-Verbose " $($key): '$($InvocationInfo.BoundParameters[$key])'" - break - } - } - } - } - } - - # Trace all unbound arguments. - if (@($InvocationInfo.UnboundArguments).Count) { - for ($i = 0 ; $i -lt $InvocationInfo.UnboundArguments.Count ; $i++) { - Write-Verbose " args[$i]: '$($InvocationInfo.UnboundArguments[$i])'" - } - } -} - -<# -.SYNOPSIS -Writes verbose information about the invocation being left. - -.DESCRIPTION -Used to trace verbose information when leaving a function/script. Writes a leaving message followed by a short description of the invocation. -#> -function Trace-LeavingInvocation { - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [System.Management.Automation.InvocationInfo]$InvocationInfo) - - Write-Verbose "Leaving $(Get-InvocationDescription $InvocationInfo)." -} - -<# -.SYNOPSIS -Writes verbose information about paths. - -.DESCRIPTION -Writes verbose information about the paths. The paths are sorted and a the common root is written only once, followed by each relative path. - -.PARAMETER PassThru -Indicates whether to return the sorted paths. -#> -function Trace-Path { - [CmdletBinding()] - param( - [string[]]$Path, - [switch]$PassThru) - - if ($Path.Count -eq 0) { - Write-Verbose "No paths." - if ($PassThru) { - $Path - } - } elseif ($Path.Count -eq 1) { - Write-Verbose "Path: $($Path[0])" - if ($PassThru) { - $Path - } - } else { - # Find the greatest common root. - $sorted = $Path | Sort-Object - $firstPath = $sorted[0].ToCharArray() - $lastPath = $sorted[-1].ToCharArray() - $commonEndIndex = 0 - $j = if ($firstPath.Length -lt $lastPath.Length) { $firstPath.Length } else { $lastPath.Length } - for ($i = 0 ; $i -lt $j ; $i++) { - if ($firstPath[$i] -eq $lastPath[$i]) { - if ($firstPath[$i] -eq '\') { - $commonEndIndex = $i - } - } else { - break - } - } - - if ($commonEndIndex -eq 0) { - # No common root. - Write-Verbose "Paths:" - foreach ($p in $sorted) { - Write-Verbose " $p" - } - } else { - Write-Verbose "Paths: $($Path[0].Substring(0, $commonEndIndex + 1))" - foreach ($p in $sorted) { - Write-Verbose " $($p.Substring($commonEndIndex + 1))" - } - } - - if ($PassThru) { - $sorted - } - } -} - -######################################## -# Private functions. -######################################## -function Get-InvocationDescription { - [CmdletBinding()] - param([System.Management.Automation.InvocationInfo]$InvocationInfo) - - if ($InvocationInfo.MyCommand.Path) { - $InvocationInfo.MyCommand.Path - } elseif ($InvocationInfo.MyCommand.Name) { - $InvocationInfo.MyCommand.Name - } else { - $InvocationInfo.MyCommand.CommandType - } -} diff --git a/arm-outputs/ps_modules/VstsTaskSdk/VstsTaskSdk.dll b/arm-outputs/ps_modules/VstsTaskSdk/VstsTaskSdk.dll deleted file mode 100644 index 54938ab05180ddaf77cf067f2501a1f97ee7e5cb..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 25408 zcmeIa2Urx#@+jULfkmqhP%&pQASxi36%_+2 zidj)qRLqKkIbqJC|C%A{Ip^NgryDMlC=Tgb)?ppFa_* zgD?KL5%6Dw0*IE?-Y<)GNuATFBL$w*iA?2*n3+OBijbYbF+H{2L%K|95{8flQ0QIM^F!gwgx3vTgye}Z zxvSkc0dGI?6aWPJm*)uj%Ro(CG}HVlviga*LJ z%c-k5J<6tW2zm5FiQsmeukhe)BO@9rfIMER2uTstK5*O- zp@Kg2FGIRyijg8h3==K#1PZj)1PGIe078Q?3fcfUNeC&BMM{ur610*^HW~;)GR2%S z(3DOwQpV|!gi1A1fuOl0jrf|$kd2^S3?nFvZYo2j(nM-Ks4UeiN|q`Z1USRgS`itk zLr7Y}2zbjd*FzElyi6uY84`g=F$Rz);PpxhGy!R)7_=hD0z74yA8(aaL_bs@;b4I_ z5N?~0a2Z7DNP9M-fEba;C4D=PmlWs<)n2;ynO%^dBlgZ>Rq^tSz6oC$2 zv?L^!fW#)MCWA35S_S!`5egImFq~oTHhAt3D1C?uMW6?GHI>G^47@ zv1Mj?r2*#RTfM+#fs6quE5yL%5xJ1B%%Wk%f z1!iH5S+k%p1oD^;uuKvmy~!}2fCB|kj9!FT$m6Go@DwvZjPU8LHzEQp?+N>k@b?1R z2EfZ;EcHCn1&MfKc!1}m=wX$bQV>92N!AEt46hwHLe!5}3td7m`UD-Cj)2bu4TcZT z-}^$*L>gckp{DS1@c6FYT%~n=K|-iP2|AiZz#$Yp2|2U~mjo0<;n3-*g@C&WIF5=_ zTnHFNz$Ak1NQrzCBv!Fe7 zbR06NIDA9FYa|o(zM$fzHIV$J7^skj!-tZ1y%$J$n$ZY{&qxtC+YlEAz#05c9%a$9 zXzpDY2v{m3i{=d&8Ib_vNa7e3v}Yk;b`m)V#~4V8q<~5hj?th5JmoD?4w{7IkOE)` zIZNiCg@7p$m@k2ucVm?_JdV|ky(Qvo0Hf&0qtnnXZ{&c-A#*7yvJToTHGoV)(WHUo zu!8M0DKZ^7NU8x`Mji~Xihwf-C{M%bucdJ4jBpr&L-}YjlpsOWdxj{1DnXPBbVsbI5AH z)S!W4`qig_5((@$`alxFl8!5PgchoG(wCAoe#f99n>` zBcn_*Zp9F*A*u%oNF~f;5^|;C@QM^-;^pIE1{pCS7WhU+J5g5{pHVL%KLxFY6jZbg z^3u>vItg@7m}LLFc&@cXIe|nu0D)pgBSYScxB^4th}zFUn2cT%tuiF&@=_G!57xpb zC{+O<9Ss7=K*j*&VaDOmk$~<5^e12#0b>Zr2B?g9M0gwl^9Z;RARQ@?KGD_DAb@mK zNYDom^qB-SCUw&6kTEHg;e=SE4U)rx)Q>8nT=3dIr;)n8O4w&FhU3#P+z*w{ZU;-)un1o6JrlK_f(@_<`OtcZ87;OWXi)sN*M0EfQ&_RGx(NTai&?$g( zP!qrf=pw)+=qkYFpfROT8M+6s96bbB1^QVEY_eAXx1jd`x1%p4N!SHs0IY}BN}|Ki zT1n87IHif8v=HIzMEEwuS|DjuL$&}7S_g12x&}}W))xy{Ro?)#Cg4y4dJ^;i^a&po|WK z{!da+1CqlmIxj0H1$d5B}YWvS4Aoz6>Qi+KXR zYhqW9q?~ZB2v3%Tp+KHUoWMeTBo^}Li><8?l#iT)1W8%xTvz1dALt$FALNaqL}F1S zTa*@&lxE=*fwI}@S={(|6fB6~2(uEs*kU&F;qjA*Kzb$~^x>s*2{gGsk|E*^0po`Q@_A(sex^Etx2Ofe9H1!7MDU(Dr;{rO4UT%be%r~KIbq;zf& zkDnz9;dA{({(R^PF9|t&3b{#;md8#Pxu(U(d$2iaU^@Enxap8l47u3CBm_Iw+`Lez zG)DlKzbH5>Jv~Gioyrq)BQn_>F7o1L^Wfvd6N<#4yiBe?Uj%u9k^#+Qr*KhUHJ)rv zDi`^C@kE&d5j!!ROSBK?Tvr?WH5Y|*)46O>cjHki(Fc^;!({|@3q@R<;lv;iwfADd zuzw^FcDk4=zunLtC5lhb*8E{q5OywRTN0uj!ubgq~i!tcfiK5)@U zTgS-z;7~%!`|tm6C!pwJ!w-Nfb}S`-SEX zGLw;*o)^gz_fOhO7P6DL8Ej!%Un!AnA@INl+!kDrfqoG^d2o(KafKp~=Du7#ksy%C zyp${Fg9yABxL5FP$g=q=KDGg!;t;k;hKtrSrsjxcCd% z9C2Ufo_2%^VSfKvgr^`gPsmG2{gXU+#cY0FUt!@{FkLdZ1YOMQs{U=k(Hbb8UVtPg0Afw!sRfCE#{=cjO+Ra;-lch z#Yude;Ss#?Tt8?wA_Ou%GF2$Z0*v2PSRj|5B2Gmkgglf5Z#XwYAm;Xyu|7rV$xcsC zgqcssxxXk-Ajl-pe%cQObH(_`_f2GIv@nC6j-q%%aTa`W3GdZgC;(;-H{IIGD?J^B zWODhzf^aSeszGVp5f({+^s9itK^1dTU~=UF3%KlzZjPZyAuj`Y^Rs}!9hcRmt|GvF zhWvO*puM^#Pb!~ zicXJRz)U z0wE7bK|GF7AQB{tEuwjRYb%Ssh3F5Z|5iD0H6t=Fv#%8qz*$@_EIjdL4)>pCrsi4v zrZh!3^YD4mI~_$R`B#)!J8;bc762@)FfRpsb~>SJ2x0USi!-~{A?ThPf}EoCP(eD6ljkiI3WOpg`V9|<#Zi#awfdlVV)cUl;no2xAAGQjP)Oof7@3|? zhsJgFB}*uT2}R7&a4xZ+h6;E<=vpL0*}|@Lp@Qy!zo@%=1f^Ru`SZJs65P5%@j`Bj zcWyrd(VBiZ&LcmNP{iYBW{FXdAe)P?);&$bxznfL0tGq0uI}EsU3|j(C4&06d`=!v z*hvC@dLB&Kj7))$EzCn+-IAEsQ!aGbqDPK;jTrBYOmQCakLD)A;*gt12th9b;?zY2 zLsY^ES;8NpfTJ6pL|>ox3HP0SH{a@zy}e8BCZaM)BuNSrk!TQ5P{2`H9FV1$WRgNb zp+dnlh6F`fA&w*~s~ARCRtzF3hCzB+DmYDL!PZqQSVe=Rva&QhPF9kM@We`pM&zL~ zVf!F~$14<6;8lQghKb115>#19Jb_{u8E{D&BFSpX(h)@#9(q>7B)6?o=IN8p zu`lLN|3=A9pAxuYk=D+kk4tY{xqakL=_NZQ9r6Ncq4Sr5lKkUsIr8&QO5}tXKe3Ws z^o;i6!4sXs)vunsNs0{|u=vR46-IH1W}CQXnqRNFh~ot258q54QzLhLsf&TeEJaVQ z8Z+bYVw<2*mlms~fm=+7_yE&klVpV~V8fRVf5eu6if<;Uc(bWEPQ|^Pz$E}~I4HmY zzVV>K4h8_E!F^@`AR!eoao~mnNC2O+g>XKvz_Q zG?KDXh$;WKWEbwW=A40w)q;3)H9ocJWnspmVF1X(t z8Y(-mHwxcDq_gvID@h*D!|aV=+CZVu_3oyl3q#O(O8xd$H$B;mIS0jD3qkcepL1_H z8-t7P%+D^n+`IpcjdABBg7f9Dz?fFspy(8o8=d76d z!#1#6X6@9S;m@l-IBe+SswUaO%~9i?kI!ec{aoUFuSAzpBj-^2IeWEX>9i*$B)^4O zPGPMHIHSV4&+l+OQrvcB$xG%#w>**BBj?Ia+ zvWpePW(sn^vQFiur^j}$!byJI^h}_|3KGZ0cJGp6`wfppW>O+v>wouC)qVDc_u>#9 zX5yhgK0Rl2T`}>V0wGwPLAW_cY`eK!!nVX?e-42%a7FRI_~5>Igy3AQ;MW51NrVsx z@E_=SIzM`J0eYiw2>F9|JQ#3)fIeNPuIM23)el@db-j3I zJd6;2^ol>A8G6K=z;WOOF9}LzgYxtN&tW$$BYND zd?Fs9?bJCSs3d5U7*g?op7JLpr4nf{=y%tj4NAm$fYc!;33)(T8O zmr2y02fbwz>AI63H}Lw9dh7Fo5=4kYv?KGEc18gmFF6wOi@-M)0n0-g6oP?n>&qVn z`N8V$*FP34Bv|hYx*kTAL~uwHS*u=k@d~M)>$DLjFL=n?mHod!C8%h!&@S zcTx;(`Xh~rHi9rRVOhh#4-7gJnLsK1%jp`SBq%on$`wN2dbo(!iMKhVyAFJW@HY31 zHjd$($0h8~c+}T+2ZGn3P>uk&mj!$l_v`sze0Cu6xI>FXM4u9& z#d*Mif0qxs@y|UV(D+G6b3a}5&o$=%)%<^&1H>H{@P}hX!z}1hCdGcmpJYf9v^(a^_CH)oYi zC75vxlj&_3i3Ux`AzDNkL8U8^M?|ocFaLv|<6DC6CGCL{<4<4z{dOfI9R;vBI7Ik(Ld>75Zo-9LbNEfEX_vB@!a)nH<2ydo$M6i>W zm9?F@wY`_Sxud-ui!}t(>*|okpLVF*&w&+@bo(=yL_?G!k{rkbi9s%cbM;DxjO_!s zG4q%D78r}U6|A!rH{91m+5?epy5 z$kDO8w;t5IHyXX&qTn~zOyVp$c1dE4W#heN;}=C*9^>sV-~I5t#iyU455@0pBybkX z$W8QBRA;}iT-11O^ScjP2fufYMRIqe$Qf5vN-ilc zTT2FkCao1(W;9bC-x+2ToVZ_CfkV+6r3rK>Eq)Wo2q|qcuBx)cw9P{hJF>*}?=$t=`aw6;@6)^;KIlJal&LOyyK(tUd3NIHx)%2HMN%z7!=v)w<5I-=9?@vl zyWsHm7i2DF?SI+0CVkkHahr{rZ%uTcG5^lB%+0&sAC3xJt~1xIINs))NAa15*802J zKTQ_@Al=mS5Ve}T-m<1*uR>Os;9Q8CnxX#42`Sa@mnV#WJjSTKv>~UN9(&kas_LG< z(V4A}>K2}?T;FOp&wBgMrY}iOsaYhHyTeg|bTcB88wdIY^tJZq?02$ezHg~Sb=qeS}uvpjNqm4K{xj5F?-B`#e%&oi)GuT z$NEsLu;@S1wqNyFw?3x)g+BhbdT9k;Gh)Q%RXcYMj`O@Aam_iP%~f2ra;N*5#IXH- zNvGaAL=>;AQD@4&+mS7}I6d<2ltWE7t=xD19LUtHn5w_`>8gVdsyFJ2cG&Q-Q(``& zOgwt^{MVEG>E`bbe4Jl)?B_+!;i~64t{0n*(VBS8$*&)j6%T8lw(0vt-_FYoc`tvK zi65>w?vO3_<=&N9Zm-t7KJ|6ZxIN4@@e`5`-Dqf>tmSxUDEr28W67gaTn^b8=P!LW z@?ensz!|R=zP!IveF3xi@sw}pKbhKXkkLBzbzgD#8F!n-pRW0oUvL`KG3`~x#XKhy zlX0`{8+9f59k!c-(Nxnaog155i=v)Zrpm@ND7*CNr3Bzq?4Qk3Na?@5N-IM0q7 z!@M@8>W_H;@Jxb*Jr;(~Z3QZ*iz*+?i}ma9*kD$;Akmaet*jg!Fl$p5J2BajYnyD& zfn#QK8!N7zIor-Q$vnx?8jkjC9h12j_ZR(lR^iE+OS@D?k{azTtW{L@1(q_ju_(Mw zZE6Sx8n7HRV6pfAFZ~Ci41x@5FCKF+w`Q4x0Aqv(9Mz+qKm!J2paXkw(15OgPXqo% z+2Y?OE}`xc$2F9XYdA?C>3hr#%g(P4@v-);dpVuG&%X5LqoLJ0+pP}{J-S9^>?B&+ z`Wn-StCLRU$6l_uuI|-P>g^A?JkUwRwe#zU-xyrtt_wG-bdnGdb#=2)i zQ|~F8ZqX}geCiUA^2PAf`>pEMY|emce`Wr%fz?OGwuXHv9bfk%Dnvaz_jv073z2H2 z+Oru7S6{SzyC`2V$n8*|>a$YU2@29>N1xw+HUG=kdB>-@I^R28uB|)A*lqIwM*Y4( zm#xp1*81*kf1PJ-(J}g@^n15!O#?639v(k)TT0Nal0a9!XJr&^-r}jdyjqX1;=h|y zGO_UPkHIOUgQw|UIh;QUE27ndx~u9^cMP_*0o=HShxHq?uz12eV@NGBn7R0^SrTcG z3I*0S)*#$!>_?R9UHVw&7+eCz?J)g54Hhndd*uC2_L%NjaN>iXmk>4?hB;WXtgKj$ z)>fd)th!Mv9Q`NN?7y?Db_!!+2VqGKnxzR$rpJoxh;-M%R|QRH-#knEu}nq&-d!j0 z6!pE9e`oDjjx+N%JZuP;ufN?8*C2n>Oxw|TB#)VBH zul#F;x85CmYgg46>wUXstIIv3)Me`HtA(PdH>yh>blNTvmS4?|*UIspGR;AySu~oq zKP7x_^-iAU%|X&X7Kx49vn?a<48&qSUz(fPdA2d$hZVZdQ0ajic0p(?Z=`$5KG>z) z%4Na13J3bM*x;xlBNLj{-hgW%oX3~U6W@5dJl-OSKKfLwzBqc0LBx~sn})yjxnS?? zuzFWcY_;m@xn~vTM>!waA{9@$+@rz9fCd|d$>EwoiA4HIrC}8K^wVB{s!62r^m0@x zY#WL(MY>e?u0)wcr4a>#_1jA$;|5#jMON@-gIOhQ%M*rfUd(b8YmZ=t)cFmJjx$jQVt8 zZ3;tNZTHgLQuXvBp}pdJ!4Bt?qA%e)=US_9wPa`Ak#9|UFF5bha#{6h-f`-#%iqlI zYR_7|h4D?v&~593FKrw1eGW(@_;M56g139T2!2_cop+sKBbA|1z|wA)jlA=);@d-C z`K?LIe}<}9Ol+X(jBhV-H{=~#JinxI?)8;A+hk(PURQ1_PMtDftoecLG^Dw7>syrx zA62I4@0)R9>;_+!W$Eqv<6N$x$%(!f&(CPAQ~N3_oO@)gOAXm=>`&gxrS0+?7qO)xB=SxcOB=<&SgzxfRu*MG!_f1wXG)~^I?7?Mv;qb~YQ`al_4wNcdGxg<& z+#jS;%}~i{NFMWfxwlo%=fH9E$Tc-ux$dl-rj>VxPFY;RChyji+423;%AKV1x&e_t zztD~yWlHyG@6DjS*Z(W+{ipljU$nP;uM!6B4f-5mh0Af>sz)tcfECUy82D%Ew}Ml} z{*Rj%Me=!DRVs#;S8ojzjeIYmWWoKf(fWUD=MKD+H;V+c#?DjdsF%uj^LK1+-prm}oCb6C5Cy49B^*6?hWi>Xlh^s`KtpVJsh zcaJjI^Il)8Q+*yhJO6~O>6o<*&+8{idrWAF5bAVbXAb0YV@H!z83Sc6-5j|5gY&-R zk+tTQkH1VSZVHQfvMO^)`WDB)mXCQ2o7Bc98o#PsX>3E!QBQ1i(aO*+dM$m*?7#)j z+J|3WOxk_FYJ=FeF8IVaJw=0TY3J}c<3{;-4y>=O-5!*3dX2}=f;^pq)yi1%6A#5P z>Ze!h>NI;kHGO*EyCl|=L~5me>L@t&ei8yA&sRS z{`WqSxPqC|lTPzaKjJ@IzwA8A_^0fN(XrQq23K7FYPout#R!$OMy0i#tRiDutjL%J zo?Z;5+dt=)Abh`n@S60wp34ir;pSSmi&~1p8qm-2Oami8-S0IP5|RydbQ+30&n0SoOR6p3p4m=sYPJKu||wvqiBC%?&cA3FFw6KYNj06nV}zlcC5HY zzcrvK#vy2UfX9MhN|_|)sHF`eo0B&?w=l2983-w^sL!o_JAzUj@X$jc5+caeXLsCcIQU{^LcMt4 z)XX(kzoJ*8E2ziI)$UIFvM4Ue|3>4S=U)4&bM-FmK730gAu?a}W3jjP-ME{d7M+s2 ze!$Ikt=XH3Z>t1OaVgC8ujHbSHE1bcX?uQj>caAhB7+H75m~=)Xz8pXvNDhq2w|T0 zj~NetevHvil;be9zE)FM(!GcT2?V)URB0?ZIAgG9u`qmlYi9-f+1~|O%P55GU@)fG zs{Whfh3PvpGM-)E&|g--L5s`E)XB9vWfS$%3?dRpgX4#0&wX)9t9F9tSJ`d%o=?}y z-l@)?vF`C2vBk2667#X|zogy0{7P>oMdOa;No~EclDA&1KRwr5!uX!6M%IOpCqox; zT1@l4M%8<4y>F8|yQOurPVl~IN)?}WTv6Tcf9=ea7R^n`aij#<@^?=2cMb`7Did@0 z@F4M(DWY({Oc14p(``Y4M9Z4=*=sU22xW8I(;B>qe}^S!tC zg-sYYG+AfM^8GHX3z3^vbj;;M_6_eC601mm7|@3H@)|$#(l-N= z5y%cp4rgIPu^)*`p^{;`VX=LgNz`)O!}OQOUW5;%UtTKn%9?E1f~K*hq7=;vMTcOe z`S~9!71m^#y;Rx6K&|(nW|<2!Tz`G%?N4TeY5vPGm^3tL@_)oh zYlInq=>_f=?LPO*?+#@A4it;Hnz{dxPT6gSW4qJZ-+wfA%u zWHcUK7)LvGJ1PdX4R{{i+WDq#fnh_|@b6hWg(LTz@LOq}NV{0Fq`JXTck5imAfLpW zR)fxO(v6Ms+ad67Ovz4+!)C0tG&-RjYI39amb$`_!lUm$q*y%8)BMn`k@Y^f>D2ef z4bla^#y>BdrT3VKe_{zVmHut<75Tx7UU)bCImW;3OTOhQ4+LTo0#$y{7^|B8A*nZo2WgX7iu z@9%oG=-vT=~>p}%#}X}YHpWs%zuClRnl#hJzbJ=fIs>3#FDB7MfQu=O}Xq( zKC)$N%&Uca*C!*{%D^Elw;#tzkk1&|aECfh*;-;U?@aj^AF)I>**z+2l3J_VE`+SijnNrru0%lb2Sl$sJ|Ay=jP$>Zm+g)>>7*VorRbPB(1Vx2!c zX(9JIS7Fbsv3qx=hktLFJx=Ag*?CcE`O`SbBi`QC#>Fp4tc)?@lTn~9izLQ_XFajU zDQM+~(I`h4LB}Td(ss70CzL?0>swq|O?T!6s=>M}=;xqdTZm z{rBe|8=!T^KJBF9b?Mg*M_16dpLV=L8p!gvJX0nwY5L?P3Hs?ZtNqKKrjEIEcV)y* zhS{;28yiixjhCvqwlwBUf;#PKa`qFea05ll$D1WXFVuSNjk|u_f|9j4_1)QwcTTYt zD(`*v-*ZUX!cVfzU02SLGr#P%`1Ac%37IRgdDZ^Lk7W*(E9D$o;_~X-ebZ6$+Cfo9 zmE(o?6rJ|^kGcNxrRTyaHzw?yP(1jC>y9~bPiBTpRexJy8S`MlQ1flpBTwvg{b6;v zmg2HwXU!sq$(L3Yn0*M2TBu_?xhTMs~PQSGBk1+vfOdF-Gzxe7H!keTfZ^+1zUS;o00#j_!;d(;x6k1xP~9!9X(8+ z^7`WV(Uw>A?q|lyh56*venxHeTgXN6w+<`U9vs{bWT*Gs{>PG3$6MD`K%5)3dn2Vi%5uV!=H)EOs7$@0{UZlrP2#*Wit3 zQVW-1g-fu)g}weg3kp^^1sm2=9sHcY`d?LtFWyN4jtK6+@Zk5Fd7MmeF*W;LPK}4FsRGzxLX|_-3i0cCuO}wNYpz+SxV|IA+_Rh5Xt`Zi;D<8QGu5Q__nX|;P{b^F8 zmrL$=y?08J)-4cEnfv~%0oljo=q&jIRU2soR=!OAnrcx}ZZgayZKOX(TZ+dYwS4J= zDen)@f9GS``h95gLEBgSA=@6-7`|-2^G>#Ah0(I*L9#B=ZzX45)jnpW*8cj0`T5bS zclkRqPBM<3+`8@I&KtLsXM}l=bg&v{sGh&$z2WCpGbbi*`OcV`seHluz2akTH2OM{ ziIHp3Fr}bm>BF@_AKK>UYY3Dld9TlY=w`xQdn_(IvG|xK$8K5i-J9<|zg4LyHEcUq zy{x$-j^loRv_#o-S9%WpB7H}e_P|4I_U_lWPY$LYy6b*Q)~KVEYx!c?$BNjc*U{Aq zpMx>)mQ_my_{py*&~8S?Cw8o?9_F2+Wqa~cW#yXj<8{CKm1uAN=BromVfE*Rw7mh# z+Mj3Ts=s(nYZT1!HkTtjo~6C znen0LSVbzZ|5L&De^_D3KfQ2uyAb}k1?;!8EH5Id!{tXtk7sKTl?C2&(*L@b%(8bo zEJbDMQkhJX$usglAGg`&Z2eRxqWrkJ^y}{y)cd^c@&nJ$TNh&CfKJ`Ck=m)dvnU$g&OCx=}xoT?!1zkh?9m^>f9TOBp7P@zc|uif+ap-gx!<&+NXZ{7 zQu6NI>`^G-2~h(7uM(?w=y6Yok}i<6$Rx@iJt0LTXS#Hc#L0s*q=;k+9wtLrKlMQP zx{IC~!=RAha?Y=A6e=@G!CyA!dQpg0(5;Du)1Q)@eW}_LF$vz$hZp3XHcxp&rpMfJ znQO17rUdI&uj9)av#_zYAB9Ok1qEc%`|`rNs>0p>^nF`{Y^_FRV_QALCT!Vgs)yM>&wNWXQb3iBmVd3Q2qJ`)N^>}?A0jJvkrImYy;}koKwcwrS zgo!?bPgtjpnwBx*U)_@V`&RCik5OmmKdFpOOugu`WWnfb=S$U&|4;7&_FAF1I|nnz z?98pK2@Cgs!+pTNC>yNXa>BaBuPT9^P`C&yod1h~TZp;z+NUHH)?XU9p#lC~)~#n~ zgk@6KZ|eVsc^mqRd5iyo?Qfa45|3tt$+Vxmw|rRPIEu@vwG}#o+UM(i;R{u4J-0e{I)M*PSg7Y#aY=+Zf@=? zZ^x?sjQui3)poglRDk%Ehy3Z9hWwNHZ|x_I8m94fMc(j*;i$$zPW6LjULp6!#@%TT zPM!aFW;_xEU|#yV&KF)%s+Z1>F|Oa!No~tqV>R5cb3~2hk3A3PSszG@FTEA*_Vms9 z70C4gUEjxPocAIDiWK_}x_+1g6yulbXfj$M$uF5^;L*%!_44%e5w zKUvLKT3mH-wfZ)y$CSF=1uJzOn7fBOOnUL@eZyo<%n-Tp7LL)`mE$(iXUWY}+0S0D zaJKZitZ!+-iRN?bn_o?u^15y4IH|jF;^n%M?3>#|wFC#>w4u9?SrS!?oj!4WbDw

8wuJ@>HyfDZ;=w9&`lhU;c$=Kxs zVyl3=oCzOR%(5JON~b1f_qN+!&dWl_U8}fsV#Ix3YxI$et=Qqtrbj{FWE$c^p03gw zvH`3R`Cpf{D%4sIAA!^?|@!O&A+cc|Ex;y|6?0F+wS9quHW9^=zrzn|8Li++DDT^mzVoUZBHf{%(A&` z+&F2uZRr5BJJx3?7i7uTq+cCqJ8j`#b-DS*ZPDce-qXtB9+EzMH(i&wvaNu;{++#% zcYtkc-G2VJ;sr0;Hp{x<5&6O@^OK@zp)En2H5kd8W?t#(tXU5Z@fTX(n%L1~H8J*xd0XA~tGY9FO!V{GAFRD#G3e@uMn47pstt`F{7#1- zWi49pHQ5e*sle1z<+k#Y0!F=g&RZiY9=|6+d&$Bv^Oy%)?#h}hI33WlP7MZ5srI`8 zDs#%WStH@>)5B>?n&RoQiFMb_FJ&u2u-$bQcf-@rv^-_J?e9(`T1x!=l656Xj>}^1^N?Y zEH15`x&O7D>6gB*9@02r$cOH;!{#ET_rTm5&V**TKN>0b;r!$&7 zOAU12dChrl?rV^B`RJpSS7)tK4q5!9fO%flyo3_*&h4K1ZC-4k&b8r6MwZ@JiaM)~ z+|?P{_g#wv|hI+^_}a5)~dOiu6HO_wO15Ta=@hEB<@82bDt@uz~NpDL_$1jV})P zncLo2a%j)IPX-%V{8`iIS(O(a!3qym6&}C}>;5B#_pd(&`QvX6gCiq|-yB-m+1Z-g zcv}0Id)j(=vrIALE_+?~S9_fqA;=PPxXd8|_?4dG}ryA~vq&3``QwMp3z+P|*{XsQBd)PR}pjq?*aeSuZZ! zRSve}Uh-LgC!#g_l=p1Kmv>pm+V?CrcJmz8xH#o_dB(OIMI$FLj3nmd>fAl(#7&wb zecG^fjm+4KckiE270=kN8Ii*_)Ob2PZJaG-S^BkBlM>gxoZV8x3k$bA^TtGY z@7tt9+x9W*H5SEK2-lwObj0@R961rZVGYTEzo-!}zCMc?y&%O1 zG7Ij;b)@+gJzBYZ`i5}x{cW+|S6l2U74)C1u;}1diVEIM-19nj@yVoFe~6!l z%wh{Uc5cN6D|N&D&*mS#H~7>BFH=p|<6jsSG3Qc?atAbZls%Lx^Y^#hYTvSsYPg&f zaAuI>jn3V3Xt^=l;%HyeiyFg8QdckPyCeg8Z=(>)u$VSSVt;j6wbe_ zw6|WRHhZ|_nuYUYyjeTqB4-qOB%91~SKi&KH{s{*;caH?8)~j|wf1CA91}&4Q(dOr ze1vf_*<|*suxPoIQ~R85&NbT^@0+1{t#L-gHs8oMm$4M=6ml*T-g7xa zV=ker`C3Q|ja^T>9>#dtpq1fu`P*NFZHp(A2-`rOF$QP^=qQE&uZkj*RKB7W5c!g? z0_h7Fa_}j-8E?fE5Mv6OoV^RAgq4Z;iP6kh*Od}!VRko2B_4I{(pGl8rg&SSx!qlx z-#KrM7|InfHJ`AO_eUAYF?sl^#S$BqNIJ}W(y+OYtWqR>*+<$(n%M4ZR$_+Esaf{H z-LF;mfQ%IN3Y0$53He+YYQ>eZU+u`D<)c|Fspn^AR|nVK$5^ki+Yn_&WbKc$d_mNg zeC?4#OS(vZ`qJ(l(1DzJ>%sS|AkPgw)t-el)B{!v%PXU|+Pz&4jbY(AL%HEt8Spib zPc<(?tZppIne|$c+|SB32$YYzT>e0{mtgSG^$e`!z1)IGJFu@RSev0mQr?$X4Q!rJP3>&`Zt!=+&?>AJf79Gr=vlfV zg4S?kF+F>fNu}K(Z=}gHBL`*nHQ9&g>ltj`!>A^FaraRJeb@VjRUoeQz@zZ9I|mDk zb7Yo!2RJVGI5#Ow?y=qmZv={jr^{*&IYR2*oz^L5G-brBv_Yz;wu5eD9@@M+Ao<_- zTJ<*aIe)M4x%zcPo;e*jhT|#q9?2=PugJgekDl<9dh6e&6yF`ar4mto>Tbqa^N9R^ J$g$t$@(XnB12_Nx diff --git a/arm-outputs/ps_modules/VstsTaskSdk/VstsTaskSdk.psm1 b/arm-outputs/ps_modules/VstsTaskSdk/VstsTaskSdk.psm1 deleted file mode 100755 index a1bf2c6..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/VstsTaskSdk.psm1 +++ /dev/null @@ -1,168 +0,0 @@ -[CmdletBinding()] -param( - [ValidateNotNull()] - [Parameter()] - [hashtable]$ModuleParameters = @{ }) - -if ($host.Name -ne 'ConsoleHost') { - Write-Warning "VstsTaskSdk is designed for use with powershell.exe (ConsoleHost). Output may be different when used with other hosts." -} - -# Private module variables. -[bool]$script:nonInteractive = "$($ModuleParameters['NonInteractive'])" -eq 'true' -Write-Verbose "NonInteractive: $script:nonInteractive" - -# VstsTaskSdk.dll contains the TerminationException and NativeMethods for handle long path -# We used to do inline C# in this powershell module -# However when csc compile the inline C#, it will hit process env block size limit since it's not use unicode to encode env -# To solve the env block size problem, we choose to put all inline C# into an assembly VstsTaskSdk.dll, signing it, package with the PS modules. -Write-Verbose "Loading compiled helper $PSScriptRoot\VstsTaskSdk.dll." -Add-Type -LiteralPath $PSScriptRoot\VstsTaskSdk.dll - -# Import/export functions. -. "$PSScriptRoot\FindFunctions.ps1" -. "$PSScriptRoot\InputFunctions.ps1" -. "$PSScriptRoot\LegacyFindFunctions.ps1" -. "$PSScriptRoot\LocalizationFunctions.ps1" -. "$PSScriptRoot\LoggingCommandFunctions.ps1" -. "$PSScriptRoot\LongPathFunctions.ps1" -. "$PSScriptRoot\ServerOMFunctions.ps1" -. "$PSScriptRoot\ToolFunctions.ps1" -. "$PSScriptRoot\TraceFunctions.ps1" -. "$PSScriptRoot\OutFunctions.ps1" # Load the out functions after all of the other functions are loaded. -Export-ModuleMember -Function @( - # Find functions. - 'Find-Match' - 'New-FindOptions' - 'New-MatchOptions' - 'Select-Match' - # Input functions. - 'Get-Endpoint' - 'Get-SecureFileTicket' - 'Get-SecureFileName' - 'Get-Input' - 'Get-TaskVariable' - 'Get-TaskVariableInfo' - 'Set-TaskVariable' - # Legacy find functions. - 'Find-Files' - # Localization functions. - 'Get-LocString' - 'Import-LocStrings' - # Logging command functions. - 'Write-AddAttachment' - 'Write-AddBuildTag' - 'Write-AssociateArtifact' - 'Write-LogDetail' - 'Write-PrependPath' - 'Write-SetEndpoint' - 'Write-SetProgress' - 'Write-SetResult' - 'Write-SetSecret' - 'Write-SetVariable' - 'Write-TaskDebug' - 'Write-TaskError' - 'Write-TaskVerbose' - 'Write-TaskWarning' - 'Write-UpdateBuildNumber' - 'Write-UpdateReleaseName' - 'Write-UploadArtifact' - 'Write-UploadBuildLog' - 'Write-UploadFile' - 'Write-UploadSummary' - # Out functions. - 'Out-Default' - # Server OM functions. - 'Get-AssemblyReference' - 'Get-TfsClientCredentials' - 'Get-TfsService' - 'Get-VssCredentials' - 'Get-VssHttpClient' - # Tool functions. - 'Assert-Agent' - 'Assert-Path' - 'Invoke-Tool' - # Trace functions. - 'Trace-EnteringInvocation' - 'Trace-LeavingInvocation' - 'Trace-Path' - # Proxy functions - 'Get-WebProxy' - # Client cert functions - 'Get-ClientCertificate' - ) - -# Override Out-Default globally. -$null = New-Item -Force -Path "function:\global:Out-Default" -Value (Get-Command -CommandType Function -Name Out-Default -ListImported) -New-Alias -Name Out-Default -Value "global:Out-Default" -Scope global - -# Perform some initialization in a script block to enable merging the pipelines. -$scriptText = @" -# Load the SDK resource strings. -Import-LocStrings "$PSScriptRoot\lib.json" - -# Load the module that contains ConvertTo-SecureString. -if (!(Get-Module -Name Microsoft.PowerShell.Security)) { - Write-Verbose "Importing the module 'Microsoft.PowerShell.Security'." - Import-Module -Name Microsoft.PowerShell.Security 2>&1 | - ForEach-Object { - if (`$_ -is [System.Management.Automation.ErrorRecord]) { - Write-Verbose `$_.Exception.Message - } else { - ,`$_ - } - } -} -"@ -. ([scriptblock]::Create($scriptText)) 2>&1 3>&1 4>&1 5>&1 | Out-Default - -# Create Invoke-VstsTaskScript in a special way so it is not bound to the module. -# Otherwise calling the task script block would run within the module context. -# -# An alternative way to solve the problem is to close the script block (i.e. closure). -# However, that introduces a different problem. Closed script blocks are created within -# a dynamic module. Each module gets it's own session state separate from the global -# session state. When running in a regular script context, Import-Module calls import -# the target module into the global session state. When running in a module context, -# Import-Module calls import the target module into the caller module's session state. -# -# The goal of a task may include executing ad-hoc scripts. Therefore, task scripts -# should run in regular script context. The end user specifying an ad-hoc script expects -# the module import rules to be consistent with the default behavior (i.e. imported -# into the global session state). -$null = New-Item -Force -Path "function:\global:Invoke-VstsTaskScript" -Value ([scriptblock]::Create(@' - [CmdletBinding()] - param( - [Parameter(Mandatory = $true)] - [scriptblock]$ScriptBlock) - - try { - $global:ErrorActionPreference = 'Stop' - - # Initialize the environment. - $vstsModule = Get-Module -Name VstsTaskSdk - Write-Verbose "$($vstsModule.Name) $($vstsModule.Version) commit $($vstsModule.PrivateData.PSData.CommitHash)" 4>&1 | Out-Default - & $vstsModule Initialize-Inputs 4>&1 | Out-Default - - # Remove the local variable before calling the user's script. - Remove-Variable -Name vstsModule - - # Call the user's script. - $ScriptBlock | - ForEach-Object { - # Remove the scriptblock variable before calling it. - Remove-Variable -Name ScriptBlock - & $_ 2>&1 3>&1 4>&1 5>&1 | Out-Default - } - } catch [VstsTaskSdk.TerminationException] { - # Special internal exception type to control the flow. Not currently intended - # for public usage and subject to change. - $global:__vstsNoOverrideVerbose = '' - Write-Verbose "Task script terminated." 4>&1 | Out-Default - } catch { - $global:__vstsNoOverrideVerbose = '' - Write-Verbose "Caught exception from task script." 4>&1 | Out-Default - $_ | Out-Default - Write-Host "##vso[task.complete result=Failed]" - } -'@)) diff --git a/arm-outputs/ps_modules/VstsTaskSdk/lib.json b/arm-outputs/ps_modules/VstsTaskSdk/lib.json deleted file mode 100755 index ecdc9d0..0000000 --- a/arm-outputs/ps_modules/VstsTaskSdk/lib.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "messages": { - "PSLIB_AgentVersion0Required": "Agent version {0} or higher is required.", - "PSLIB_ContainerPathNotFound0": "Container path not found: '{0}'", - "PSLIB_EndpointAuth0": "'{0}' service endpoint credentials", - "PSLIB_EndpointUrl0": "'{0}' service endpoint URL", - "PSLIB_EnumeratingSubdirectoriesFailedForPath0": "Enumerating subdirectories failed for path: '{0}'", - "PSLIB_FileNotFound0": "File not found: '{0}'", - "PSLIB_Input0": "'{0}' input", - "PSLIB_InvalidPattern0": "Invalid pattern: '{0}'", - "PSLIB_LeafPathNotFound0": "Leaf path not found: '{0}'", - "PSLIB_PathLengthNotReturnedFor0": "Path normalization/expansion failed. The path length was not returned by the Kernel32 subsystem for: '{0}'", - "PSLIB_PathNotFound0": "Path not found: '{0}'", - "PSLIB_Process0ExitedWithCode1": "Process '{0}' exited with code '{1}'.", - "PSLIB_Required0": "Required: {0}", - "PSLIB_StringFormatFailed": "String format failed.", - "PSLIB_StringResourceKeyNotFound0": "String resource key not found: '{0}'", - "PSLIB_TaskVariable0": "'{0}' task variable" - } -} diff --git a/arm-outputs/run-vsts.ps1 b/arm-outputs/run-vsts.ps1 index deedb0e..4854b3e 100644 --- a/arm-outputs/run-vsts.ps1 +++ b/arm-outputs/run-vsts.ps1 @@ -1,12 +1,27 @@ -Write-Verbose "Entering script run-vsts.ps1" +[CmdletBinding(DefaultParameterSetName = 'None')] +param +( + [String] [Parameter(Mandatory = $true)] + $ConnectedServiceNameSelector, + + [String] [Parameter(Mandatory = $true)] + $ConnectedServiceNameARM, + + [String] [Parameter(Mandatory = $true)] + $resourceGroupName, -Import-Module $PSScriptRoot\ps_modules\VstsAzureHelpers_ -Initialize-Azure + [String] [Parameter(Mandatory = $false)] + $prefix, -$resourceGroupName = Get-VstsInput -Name resourceGroupName -Require -$prefix = Get-VstsInput -Name prefix -$outputNames = Get-VstsInput -Name outputNames -$whenLastDeploymentIsFailed = Get-VstsInput -Name whenLastDeploymentIsFailed -$deploymentNameFilter = Get-VstsInput -Name deploymentNameFilter + [String] [Parameter(Mandatory = $false)] + $outputNames, + + [String] [Parameter(Mandatory = $true)] + $whenLastDeploymentIsFailed, + + [String] [Parameter(Mandatory = $false)] + $deploymentNameFilter +) +Write-Verbose "Entering script run-vsts.ps1" .\arm-outputs.ps1 \ No newline at end of file diff --git a/arm-outputs/task.json b/arm-outputs/task.json index 57f5cca..8e313d1 100644 --- a/arm-outputs/task.json +++ b/arm-outputs/task.json @@ -92,7 +92,7 @@ ], "instanceNameFormat": "ARM Outputs", "execution": { - "PowerShell3": { + "AzurePowerShell": { "target": "$(currentDirectory)\\run-vsts.ps1" } } From f9f45a5d48aa7b20f82d09af46d63b0c72a16e00 Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Sat, 1 Sep 2018 16:25:30 +0200 Subject: [PATCH 02/12] working on complex types --- arm-outputs/GetProperties/GetProperties.psm1 | 0 arm-outputs/arm-outputs.ps1 | 59 +++++++++++++++++++- arm-outputs/run-locally.ps1 | 6 +- 3 files changed, 59 insertions(+), 6 deletions(-) create mode 100644 arm-outputs/GetProperties/GetProperties.psm1 diff --git a/arm-outputs/GetProperties/GetProperties.psm1 b/arm-outputs/GetProperties/GetProperties.psm1 new file mode 100644 index 0000000..e69de29 diff --git a/arm-outputs/arm-outputs.ps1 b/arm-outputs/arm-outputs.ps1 index 28f1130..ac02c53 100644 --- a/arm-outputs/arm-outputs.ps1 +++ b/arm-outputs/arm-outputs.ps1 @@ -1,3 +1,49 @@ +#Import-Module .\GetProperties + +function Get-Properties($Object, $MaxLevels="5", $PathName = "", $Level=0) +{ + <# + .SYNOPSIS + + .DESCRIPTION + + .PARAMETER Object + + .PARAMETER MaxLevels + + .PARAMETER PathName + + .PARAMETER Level + #> + + $rootProps = $Object | Get-Member -ErrorAction SilentlyContinue | Where-Object { $_.MemberType -match "Property"} + + foreach($prop in $rootProps) { + + $propValue = $Object | Select-Object -ExpandProperty $prop.Name + + $nameWithParents = $prop.Name + if ($Level -gt 0){ + $nameWithParents = ($PathName + "." + $prop.Name) + } + if ($propValue.GetType().ToString() -eq "System.Management.Automation.PSCustomObject"){ + Get-Properties -Object $propValue -PathName $nameWithParents -Level ($Level + 1) -MaxLevels $MaxLevels + } + else{ + if ($propValue.GetType().ToString() -eq "System.Object[]"){ + foreach($arrayItem in $propValue) { + Get-Properties -Object $arrayItem -PathName $nameWithParents + "[]" -Level ($Level + 1) -MaxLevels $MaxLevels + } + } + else{ + Write-Verbose "Updating VSTS variable '$nameWithParents' to value '$propValue'" + Write-Host "##vso[task.setvariable variable=$prefix$nameWithParents;isOutput=true;]$propValue" + } + } + } +} +Export-ModuleMember -Function 'Get-Properties' + Write-Verbose "Entering script arm-outputs.ps1" Write-Debug "ResourceGroupName= $resourceGroupName" @@ -51,7 +97,14 @@ foreach ($key in $lastResourceGroupDeployment.Outputs.Keys) { Write-Verbose "Variable '$key' is of type SecureString, ignoring..." } else { - Write-Verbose "Updating VSTS variable '$key' to value '$value'" - Write-Host "##vso[task.setvariable variable=$prefix$key;isOutput=true;]$value" + if ($value.GetType().FullName -eq "Newtonsoft.Json.Linq.JObject"){ + $objectOutput = ConvertFrom-Json $value.ToString() + Get-Properties $objectOutput + } + else{ + Write-Verbose "Updating VSTS variable '$key' to value '$value'" + Write-Host "##vso[task.setvariable variable=$prefix$key;isOutput=true;]$value" + } } -} \ No newline at end of file +} + diff --git a/arm-outputs/run-locally.ps1 b/arm-outputs/run-locally.ps1 index 996db53..29f68a7 100644 --- a/arm-outputs/run-locally.ps1 +++ b/arm-outputs/run-locally.ps1 @@ -1,6 +1,6 @@ -Login-AzureRmAccount -TenantId "xxx" -Select-AzureRmSubscription -SubscriptionName "xxx" -$resourceGroupName = "xxx" +#Login-AzureRmAccount -TenantId "7d25d723-384b-4d25-aaba-4e6c8b0762d5" +Select-AzureRmSubscription -SubscriptionName "f2da982c-fc6f-4663-ad1e-46a186f9fa84" +$resourceGroupName = "Home-Assistant-Backend" $prefix = $null [Array]$outputNames = $null $deploymentNameFilter = $null From a37a7aca6b8647135ee6d1eae0e3934638e7fc89 Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Sat, 1 Sep 2018 16:36:39 +0200 Subject: [PATCH 03/12] merge conflict --- arm-outputs/run-locally.ps1 | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/arm-outputs/run-locally.ps1 b/arm-outputs/run-locally.ps1 index 29f68a7..93a3339 100644 --- a/arm-outputs/run-locally.ps1 +++ b/arm-outputs/run-locally.ps1 @@ -1,6 +1,6 @@ -#Login-AzureRmAccount -TenantId "7d25d723-384b-4d25-aaba-4e6c8b0762d5" -Select-AzureRmSubscription -SubscriptionName "f2da982c-fc6f-4663-ad1e-46a186f9fa84" -$resourceGroupName = "Home-Assistant-Backend" +Login-AzureRmAccount -TenantId "7d25d723-384b-4d25-aaba-4e6c8b0762d5" +Select-AzureRmSubscription -SubscriptionName "Kees Prive" +$resourceGroupName = "sprint-goal-dev" $prefix = $null [Array]$outputNames = $null $deploymentNameFilter = $null From 4833bd4e4d1317a83a717dc188c9201f01ca929d Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Sat, 1 Sep 2018 17:07:21 +0200 Subject: [PATCH 04/12] Complex output now working --- arm-outputs/arm-outputs.ps1 | 13 +++++-------- arm-outputs/run-locally.ps1 | 2 +- 2 files changed, 6 insertions(+), 9 deletions(-) diff --git a/arm-outputs/arm-outputs.ps1 b/arm-outputs/arm-outputs.ps1 index ac02c53..8b08478 100644 --- a/arm-outputs/arm-outputs.ps1 +++ b/arm-outputs/arm-outputs.ps1 @@ -1,5 +1,3 @@ -#Import-Module .\GetProperties - function Get-Properties($Object, $MaxLevels="5", $PathName = "", $Level=0) { <# @@ -23,16 +21,16 @@ function Get-Properties($Object, $MaxLevels="5", $PathName = "", $Level=0) $propValue = $Object | Select-Object -ExpandProperty $prop.Name $nameWithParents = $prop.Name - if ($Level -gt 0){ + if ($Level -gt -1){ $nameWithParents = ($PathName + "." + $prop.Name) } if ($propValue.GetType().ToString() -eq "System.Management.Automation.PSCustomObject"){ Get-Properties -Object $propValue -PathName $nameWithParents -Level ($Level + 1) -MaxLevels $MaxLevels } else{ - if ($propValue.GetType().ToString() -eq "System.Object[]"){ - foreach($arrayItem in $propValue) { - Get-Properties -Object $arrayItem -PathName $nameWithParents + "[]" -Level ($Level + 1) -MaxLevels $MaxLevels + if ($propValue.GetType().ToString() -eq "System.Object[]"){ + For ($i=0; $i -lt $propValue.Length; $i++) { + Get-Properties -Object $propValue[$i] -PathName ($nameWithParents + "["+$i+"]") -Level ($Level + 1) -MaxLevels $MaxLevels } } else{ @@ -42,7 +40,6 @@ function Get-Properties($Object, $MaxLevels="5", $PathName = "", $Level=0) } } } -Export-ModuleMember -Function 'Get-Properties' Write-Verbose "Entering script arm-outputs.ps1" @@ -99,7 +96,7 @@ foreach ($key in $lastResourceGroupDeployment.Outputs.Keys) { else { if ($value.GetType().FullName -eq "Newtonsoft.Json.Linq.JObject"){ $objectOutput = ConvertFrom-Json $value.ToString() - Get-Properties $objectOutput + Get-Properties -Object $objectOutput -PathName $key -Level 0 -MaxLevels 5 } else{ Write-Verbose "Updating VSTS variable '$key' to value '$value'" diff --git a/arm-outputs/run-locally.ps1 b/arm-outputs/run-locally.ps1 index 93a3339..170228c 100644 --- a/arm-outputs/run-locally.ps1 +++ b/arm-outputs/run-locally.ps1 @@ -1,6 +1,6 @@ Login-AzureRmAccount -TenantId "7d25d723-384b-4d25-aaba-4e6c8b0762d5" Select-AzureRmSubscription -SubscriptionName "Kees Prive" -$resourceGroupName = "sprint-goal-dev" +$resourceGroupName = "Home-Assistant-Backend" $prefix = $null [Array]$outputNames = $null $deploymentNameFilter = $null From 04f7f54d5443849952a3768b3c611fc94f213cff Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Sat, 1 Sep 2018 17:19:42 +0200 Subject: [PATCH 05/12] cleaning some code --- arm-outputs/arm-outputs.ps1 | 40 +++++++++++-------------------------- 1 file changed, 12 insertions(+), 28 deletions(-) diff --git a/arm-outputs/arm-outputs.ps1 b/arm-outputs/arm-outputs.ps1 index 8b08478..f0e6b68 100644 --- a/arm-outputs/arm-outputs.ps1 +++ b/arm-outputs/arm-outputs.ps1 @@ -1,43 +1,27 @@ -function Get-Properties($Object, $MaxLevels="5", $PathName = "", $Level=0) +function Get-Properties($Object, $MaxLevels="7", $PathName = "", $Level=0) { - <# - .SYNOPSIS - - .DESCRIPTION - - .PARAMETER Object - - .PARAMETER MaxLevels - - .PARAMETER PathName - - .PARAMETER Level - #> - $rootProps = $Object | Get-Member -ErrorAction SilentlyContinue | Where-Object { $_.MemberType -match "Property"} foreach($prop in $rootProps) { - $propValue = $Object | Select-Object -ExpandProperty $prop.Name + $nameWithParents = "$PathName.$($prop.Name)" - $nameWithParents = $prop.Name - if ($Level -gt -1){ - $nameWithParents = ($PathName + "." + $prop.Name) - } - if ($propValue.GetType().ToString() -eq "System.Management.Automation.PSCustomObject"){ - Get-Properties -Object $propValue -PathName $nameWithParents -Level ($Level + 1) -MaxLevels $MaxLevels - } - else{ - if ($propValue.GetType().ToString() -eq "System.Object[]"){ + switch ($propValue.GetType().ToString()) + { + "System.Management.Automation.PSCustomObject" { + Get-Properties -Object $propValue -PathName $nameWithParents -Level ($Level + 1) -MaxLevels $MaxLevels + } + "System.Object[]"{ For ($i=0; $i -lt $propValue.Length; $i++) { - Get-Properties -Object $propValue[$i] -PathName ($nameWithParents + "["+$i+"]") -Level ($Level + 1) -MaxLevels $MaxLevels + $nameWihtArrayIndex = "$nameWithParents[$i]" + Get-Properties -Object $propValue[$i] -PathName $nameWihtArrayIndex -Level ($Level + 1) -MaxLevels $MaxLevels } } - else{ + default{ Write-Verbose "Updating VSTS variable '$nameWithParents' to value '$propValue'" Write-Host "##vso[task.setvariable variable=$prefix$nameWithParents;isOutput=true;]$propValue" } - } + } } } From 46ea3fa0a8a3fc72ac47402d729ae47a534dcb68 Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Sun, 2 Sep 2018 17:08:53 +0200 Subject: [PATCH 06/12] V4.0 almost ready --- Marketplace.md | 91 ++++++++++++++++++++++++++++++++++ README.md | 32 +++++++++++- arm-outputs/Out-ARMOutput.ps1 | 78 +++++++++++++++++++++++++++++ arm-outputs/Select-Outputs.ps1 | 30 +++++++++++ arm-outputs/arm-outputs.ps1 | 91 ---------------------------------- arm-outputs/run-locally.ps1 | 2 +- arm-outputs/run-vsts.ps1 | 2 +- vss-extension.json | 2 +- 8 files changed, 233 insertions(+), 95 deletions(-) create mode 100644 Marketplace.md create mode 100644 arm-outputs/Out-ARMOutput.ps1 create mode 100644 arm-outputs/Select-Outputs.ps1 delete mode 100644 arm-outputs/arm-outputs.ps1 diff --git a/Marketplace.md b/Marketplace.md new file mode 100644 index 0000000..7eaec76 --- /dev/null +++ b/Marketplace.md @@ -0,0 +1,91 @@ +# ARM Outputs + +This extension enables you to use the ARM Deployment outputs in your VSTS environment. + +This step will use the last successful deployment within the selected resource group. If this deployent has outputs, all of them are copied to VSTS variables by the ARM Output key. + +This outputs can then be used by default VSTS ways: ```$(same-key-as-in-arm-template)``` + +Usually this task is ran directly after the 'Azure Resource Group Deployment' task. + +[![screenshot-1](images/screenshots-vsts-arm-outputs-1.png "Screenshot-1")](images/screenshots-vsts-arm-outputs-1.png) + +## Release notes + +### Version 4.0 - 02-09-2018 + +- Support for complex outputs +- Now based on AzurePowershell task handler + - Improved performance + - Less dependencies + - Easier to port to Linux agents Powershell Core on VSTS becomes a thing + +### Version 3.0 - 01-02-2018 + +- Filter on deployment name + +### Version 2.0 - 18-11-2017 + +- LastDeploymentBehaviour added + +### Version 1.0 - 13-04-2017 + +- LastDeploymentBehaviour added + +## Parameter usage + +### Secrets + +If your output is of type ```SecureString``` the output value cannot be read and these outputs are therefore ignored. + +You can off course output your secrets as string but then these values might be exposed in logfiles (and visible via the Azure Portal as well) + +### Prefix + +Using the 'prefix' parameter, it is possible to prefix the variables used within VSTS. A prefix can be used to distinct variables coming out of ARM from regular VSTS variables. A prefix can also be to prevent collisions between ARM Output names and VSTS Variable names. + +### Output Names + +Using the 'Output Names' parameter, it is possible to process only a subset of the ARM Outputs. When this field is left empty (it is by default) all ARM Outputs are used. + +### When last deployment is failed + +Using the 'When last deployment is failed' parameter, you can choose the behaviour when the last deployment to a resource group has failed. There are two options, 1. fail the task (the default) or 2. take the last succesful deployment. + +### Filter deployment name + +Optional string to filter deployments by. This can be useful if you have concurrent deployments to the same resource group. Deployment names in VSTS are the name of the json file plus date and time, so a file CreateKeyVault.json could have a deployment name of CreateKeyVault-20180025-151538-0688. In this case, if you want to filter to deployments of this file enter CreateKeyVault as the filter + +## Complex outputs + +If your output is not a single value but a complex type, like: +``` +{ + "someKey":"someValue", + "second":{ + "foo":"bar", + "oops":{ + "asdasdasd":true, + "array":[ + { + "asd":"qqq" + }, + { + "efg":"aaa" + } + ] + } + } +} +```` +This will result in the following 5 variables: + +complex.second.foo => bar +complex.second.oops.array[0].asd => qqq +complex.second.oops.array[1].efg => aaa +complex.second.oops.asdasdasd => True +complex.someKey => someValue + +## Help & Contact + +Find me at http://case.schollaart.net/. Experiencing problems, or do you have an idea? Please let me know via [Twitter](https://twitter.com/keesschollaart) or by [mail](mailto:keesschollaart81@hotmail.com). Or even better, raise an issue on [GitHub](https://github.com/keesschollaart81/vsts-arm-outputs/issues). \ No newline at end of file diff --git a/README.md b/README.md index 8342485..5251497 100644 --- a/README.md +++ b/README.md @@ -32,6 +32,36 @@ Using the 'When last deployment is failed' parameter, you can choose the behavio Optional string to filter deployments by. This can be useful if you have concurrent deployments to the same resource group. Deployment names in VSTS are the name of the json file plus date and time, so a file CreateKeyVault.json could have a deployment name of CreateKeyVault-20180025-151538-0688. In this case, if you want to filter to deployments of this file enter CreateKeyVault as the filter +## Complex outputs + +If your output is not a single value but a complex type, like: +``` +{ + "someKey":"someValue", + "second":{ + "foo":"bar", + "oops":{ + "asdasdasd":true, + "array":[ + { + "asd":"qqq" + }, + { + "efg":"aaa" + } + ] + } + } +} +```` +This will result in the following 5 variables: + +complex.second.foo => bar +complex.second.oops.array[0].asd => qqq +complex.second.oops.array[1].efg => aaa +complex.second.oops.asdasdasd => True +complex.someKey => someValue + ## Help & Contact -Find me at http://case.schollaart.net/ \ No newline at end of file +Find me at http://case.schollaart.net/. Experiencing problems, or do you have an idea? Please let me know via [Twitter](https://twitter.com/keesschollaart) or by [mail](mailto:keesschollaart81@hotmail.com). Or even better, raise an issue on [GitHub](https://github.com/keesschollaart81/vsts-arm-outputs/issues). \ No newline at end of file diff --git a/arm-outputs/Out-ARMOutput.ps1 b/arm-outputs/Out-ARMOutput.ps1 new file mode 100644 index 0000000..4a5389d --- /dev/null +++ b/arm-outputs/Out-ARMOutput.ps1 @@ -0,0 +1,78 @@ +Write-Verbose "Entering script Out-ARMOutput.ps1" + +. .\Select-Outputs.ps1 + +Write-Debug "ResourceGroupName= $resourceGroupName" + +#region Get Latest Deployment + +$lastResourceGroupDeployments = Get-AzureRmResourceGroupDeployment -ResourceGroupName $resourceGroupName | Where-Object {$_.DeploymentName -match $deploymentNameFilter -or $deploymentNameFilter -eq $null} | Sort-Object Timestamp -Descending +$lastResourceGroupDeployment = $lastResourceGroupDeployments | Select-Object -First 1 + +if ($whenLastDeploymentIsFailed -eq "latestSuccesful" ) { + $lastDeploymentStatus = $lastResourceGroupDeployment.ProvisioningState + $deploymentName = $lastResourceGroupDeployment.DeploymentName + if ($lastResourceGroupDeployment -and $lastDeploymentStatus -ne "Succeeded") { + Write-Verbose "Deployment '$deploymentName' of Resource Group '$resourceGroupName' did not succeed ('$lastDeploymentStatus'), ingoring this deployment and finding latest succesful deployment" + } + $lastResourceGroupDeployments = $lastResourceGroupDeployments | Where-Object {$_.ProvisioningState -eq "Succeeded"} +} + +$lastResourceGroupDeployment = $lastResourceGroupDeployments | Select-Object -First 1 + +if (!$lastResourceGroupDeployment) { + throw "Deployment could not be found for Resource Group '$resourceGroupName'." +} + +$lastDeploymentStatus = $lastResourceGroupDeployment.ProvisioningState +$deploymentName = $lastResourceGroupDeployment.DeploymentName +if ($whenLastDeploymentIsFailed -eq "fail" -and $lastDeploymentStatus -ne "Succeeded") { + throw "Deployment '$deploymentName' of Resource Group '$resourceGroupName' did not succeed (status '$lastDeploymentStatus')" +} + +if (!$lastResourceGroupDeployment.Outputs) { + Write-Warning "No output parameters could be found for the deployment '$deploymentName' of Resource Group '$resourceGroupName'." + return; +} +#endregion + +$outputNamesArray = $null + +if ($outputNames) { + $outputNamesArray = $outputNames.split(',') | ForEach-Object { $_.Trim() } +} + +#region generate array with all outputs + +$Outputs = @() + +$lastResourceGroupDeployment.Outputs.GetEnumerator() | ForEach-Object { + $value = $_.Value.Value + + if ($outputNamesArray.length -gt 0 -and $outputNamesArray -notcontains $_.Key) { + Write-Debug "Variable '$($_.Key)' is not one of the $($outputNamesArray.length) given key's to set, ignoring..." + return + } + + if ($_.Value.Type -eq "SecureString") { + Write-Verbose "Variable '$($_.Key)' is of type SecureString, ignoring..." + return + } + + if ($value.GetType().Name -eq "JObject"){ + $objectOutput = ConvertFrom-Json $value.ToString() # Is this really needed? + $Outputs += Select-OutputsFromObjectTree -Object $objectOutput -PathName $_.Key -Level 0 -MaxLevels 7 + return + } + + $Outputs += [PSCustomObject]@{ + Key = $_.Key + Value = $value + } +} +#endregion + +$Outputs | ForEach-Object { + Write-Verbose "Updating VSTS variable '$($_.Key)' to value '$($_.Value)'" + Write-Output "##vso[task.setvariable variable=$prefix$($_.Key);isOutput=true;]$($_.Value)" +} \ No newline at end of file diff --git a/arm-outputs/Select-Outputs.ps1 b/arm-outputs/Select-Outputs.ps1 new file mode 100644 index 0000000..dc3e371 --- /dev/null +++ b/arm-outputs/Select-Outputs.ps1 @@ -0,0 +1,30 @@ +function Select-OutputsFromObjectTree($Object, $MaxLevels="7", $PathName = "", $Level=0) +{ + # Recursivly traverse over (nested) objects, flattening the object-tree to: parent.child.propery: value + + $OutputArray = @() + + $Object | Get-Member | Where-Object { $_.MemberType -match "Property"} | ForEach-Object { + $key = "$PathName.$($_.Name)" + $value = $Object | Select-Object -ExpandProperty $_.Name + + switch ($value.GetType().ToString()) + { + "System.Management.Automation.PSCustomObject" { + $OutputArray += Select-OutputsFromObjectTree -Object $value -PathName $key -Level ($Level + 1) -MaxLevels $MaxLevels + } + "System.Object[]"{ + For ($i=0; $i -lt $value.Length; $i++) { + $OutputArray += Select-OutputsFromObjectTree -Object $value[$i] -PathName "$key[$i]" -Level ($Level + 1) -MaxLevels $MaxLevels + } + } + default{ + $OutputArray += [PSCustomObject]@{ + Key = $key + Value = $value + } + } + } + } + return $OutputArray; +} \ No newline at end of file diff --git a/arm-outputs/arm-outputs.ps1 b/arm-outputs/arm-outputs.ps1 deleted file mode 100644 index f0e6b68..0000000 --- a/arm-outputs/arm-outputs.ps1 +++ /dev/null @@ -1,91 +0,0 @@ -function Get-Properties($Object, $MaxLevels="7", $PathName = "", $Level=0) -{ - $rootProps = $Object | Get-Member -ErrorAction SilentlyContinue | Where-Object { $_.MemberType -match "Property"} - - foreach($prop in $rootProps) { - $propValue = $Object | Select-Object -ExpandProperty $prop.Name - $nameWithParents = "$PathName.$($prop.Name)" - - switch ($propValue.GetType().ToString()) - { - "System.Management.Automation.PSCustomObject" { - Get-Properties -Object $propValue -PathName $nameWithParents -Level ($Level + 1) -MaxLevels $MaxLevels - } - "System.Object[]"{ - For ($i=0; $i -lt $propValue.Length; $i++) { - $nameWihtArrayIndex = "$nameWithParents[$i]" - Get-Properties -Object $propValue[$i] -PathName $nameWihtArrayIndex -Level ($Level + 1) -MaxLevels $MaxLevels - } - } - default{ - Write-Verbose "Updating VSTS variable '$nameWithParents' to value '$propValue'" - Write-Host "##vso[task.setvariable variable=$prefix$nameWithParents;isOutput=true;]$propValue" - } - } - } -} - -Write-Verbose "Entering script arm-outputs.ps1" - -Write-Debug "ResourceGroupName= $resourceGroupName" - -$lastResourceGroupDeployments = Get-AzureRmResourceGroupDeployment -ResourceGroupName $resourceGroupName | where {$_.DeploymentName -match $deploymentNameFilter -or $deploymentNameFilter -eq $null} | Sort-Object Timestamp -Descending -$lastResourceGroupDeployment = $lastResourceGroupDeployments | Select-Object -First 1 - -if ($whenLastDeploymentIsFailed -eq "latestSuccesful" ) { - $lastDeploymentStatus = $lastResourceGroupDeployment.ProvisioningState - $deploymentName = $lastResourceGroupDeployment.DeploymentName - if ($lastResourceGroupDeployment -and $lastDeploymentStatus -ne "Succeeded") { - Write-Verbose "Deployment '$deploymentName' of Resource Group '$resourceGroupName' did not succeed ('$lastDeploymentStatus'), ingoring this deployment and finding latest succesful deployment" - } - $lastResourceGroupDeployments = $lastResourceGroupDeployments | Where-Object {$_.ProvisioningState -eq "Succeeded"} -} - -$lastResourceGroupDeployment = $lastResourceGroupDeployments | Select-Object -First 1 - -if (!$lastResourceGroupDeployment) { - throw "Deployment could not be found for Resource Group '$resourceGroupName'." -} - -$lastDeploymentStatus = $lastResourceGroupDeployment.ProvisioningState -$deploymentName = $lastResourceGroupDeployment.DeploymentName -if ($whenLastDeploymentIsFailed -eq "fail" -and $lastDeploymentStatus -ne "Succeeded") { - throw "Deployment '$deploymentName' of Resource Group '$resourceGroupName' did not succeed (status '$lastDeploymentStatus')" -} - -if (!$lastResourceGroupDeployment.Outputs) { - Write-Warning "No output parameters could be found for the deployment '$deploymentName' of Resource Group '$resourceGroupName'." - return; -} - -$outputNamesArray = $null - -if ($outputNames) { - $outputNamesArray = $outputNames.split(',') | ForEach-Object { $_.Trim() } -} -$outputNamesCount = $outputNamesArray.length - -foreach ($key in $lastResourceGroupDeployment.Outputs.Keys) { - $type = $lastResourceGroupDeployment.Outputs.Item($key).Type - $value = $lastResourceGroupDeployment.Outputs.Item($key).Value - - if ($outputNamesCount -gt 0 -and $outputNamesArray -notcontains $key) { - Write-Debug "Variable '$key' is not one of the $outputNamesCount given key's to set, ignoring..." - continue; - } - - if ($type -eq "SecureString") { - Write-Verbose "Variable '$key' is of type SecureString, ignoring..." - } - else { - if ($value.GetType().FullName -eq "Newtonsoft.Json.Linq.JObject"){ - $objectOutput = ConvertFrom-Json $value.ToString() - Get-Properties -Object $objectOutput -PathName $key -Level 0 -MaxLevels 5 - } - else{ - Write-Verbose "Updating VSTS variable '$key' to value '$value'" - Write-Host "##vso[task.setvariable variable=$prefix$key;isOutput=true;]$value" - } - } -} - diff --git a/arm-outputs/run-locally.ps1 b/arm-outputs/run-locally.ps1 index 170228c..fcc9dec 100644 --- a/arm-outputs/run-locally.ps1 +++ b/arm-outputs/run-locally.ps1 @@ -4,4 +4,4 @@ $resourceGroupName = "Home-Assistant-Backend" $prefix = $null [Array]$outputNames = $null $deploymentNameFilter = $null -.\arm-outputs.ps1 \ No newline at end of file +.\Out-ARMOutput.ps1 \ No newline at end of file diff --git a/arm-outputs/run-vsts.ps1 b/arm-outputs/run-vsts.ps1 index 4854b3e..b0e2971 100644 --- a/arm-outputs/run-vsts.ps1 +++ b/arm-outputs/run-vsts.ps1 @@ -24,4 +24,4 @@ param ) Write-Verbose "Entering script run-vsts.ps1" -.\arm-outputs.ps1 \ No newline at end of file +.\Out-ARMOutput.ps1 \ No newline at end of file diff --git a/vss-extension.json b/vss-extension.json index a8012e0..b958e31 100644 --- a/vss-extension.json +++ b/vss-extension.json @@ -39,7 +39,7 @@ ], "content": { "details": { - "path": "readme.md" + "path": "Marketplace.md" }, "license": { "path": "LICENSE" From a6b17df0c9b6a2af17bc7a37cde4844028f684dd Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Sun, 2 Sep 2018 17:10:21 +0200 Subject: [PATCH 07/12] File rename --- .../{Select-Outputs.ps1 => Select-OutputsFromObjectTree.ps1} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename arm-outputs/{Select-Outputs.ps1 => Select-OutputsFromObjectTree.ps1} (100%) diff --git a/arm-outputs/Select-Outputs.ps1 b/arm-outputs/Select-OutputsFromObjectTree.ps1 similarity index 100% rename from arm-outputs/Select-Outputs.ps1 rename to arm-outputs/Select-OutputsFromObjectTree.ps1 From 4b0e5d927d94392fcdf5d58d23d533643be63584 Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Sun, 2 Sep 2018 17:12:20 +0200 Subject: [PATCH 08/12] Nicer markdown --- Marketplace.md | 4 +++- README.md | 4 +++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/Marketplace.md b/Marketplace.md index 7eaec76..f34d268 100644 --- a/Marketplace.md +++ b/Marketplace.md @@ -59,7 +59,7 @@ Optional string to filter deployments by. This can be useful if you have concurr ## Complex outputs If your output is not a single value but a complex type, like: -``` +``` json { "someKey":"someValue", "second":{ @@ -80,11 +80,13 @@ If your output is not a single value but a complex type, like: ```` This will result in the following 5 variables: +``` complex.second.foo => bar complex.second.oops.array[0].asd => qqq complex.second.oops.array[1].efg => aaa complex.second.oops.asdasdasd => True complex.someKey => someValue +``` ## Help & Contact diff --git a/README.md b/README.md index 5251497..b0296d1 100644 --- a/README.md +++ b/README.md @@ -35,7 +35,7 @@ Optional string to filter deployments by. This can be useful if you have concurr ## Complex outputs If your output is not a single value but a complex type, like: -``` +``` json { "someKey":"someValue", "second":{ @@ -56,11 +56,13 @@ If your output is not a single value but a complex type, like: ```` This will result in the following 5 variables: +``` complex.second.foo => bar complex.second.oops.array[0].asd => qqq complex.second.oops.array[1].efg => aaa complex.second.oops.asdasdasd => True complex.someKey => someValue +``` ## Help & Contact From a15c100f27bd9a1a5f843cd038fa97ec67410897 Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Sun, 2 Sep 2018 20:04:28 +0200 Subject: [PATCH 09/12] Fixing some bugs --- Marketplace.md | 10 +++++----- README.md | 10 +++++----- arm-outputs/Out-ARMOutput.ps1 | 4 ++-- arm-outputs/Select-OutputsFromObjectTree.ps1 | 4 ++-- 4 files changed, 14 insertions(+), 14 deletions(-) diff --git a/Marketplace.md b/Marketplace.md index f34d268..3d47910 100644 --- a/Marketplace.md +++ b/Marketplace.md @@ -81,11 +81,11 @@ If your output is not a single value but a complex type, like: This will result in the following 5 variables: ``` -complex.second.foo => bar -complex.second.oops.array[0].asd => qqq -complex.second.oops.array[1].efg => aaa -complex.second.oops.asdasdasd => True -complex.someKey => someValue +complex_someKey => someValue +complex_second_foo => bar +complex_second_oops_asdasdasd => True +complex_second_oops_array[0]_asd => qqq +complex_second_oops_array[1]_efg => aaa ``` ## Help & Contact diff --git a/README.md b/README.md index b0296d1..02d2b22 100644 --- a/README.md +++ b/README.md @@ -57,11 +57,11 @@ If your output is not a single value but a complex type, like: This will result in the following 5 variables: ``` -complex.second.foo => bar -complex.second.oops.array[0].asd => qqq -complex.second.oops.array[1].efg => aaa -complex.second.oops.asdasdasd => True -complex.someKey => someValue +complex_someKey => someValue +complex_second_foo => bar +complex_second_oops_asdasdasd => True +complex_second_oops_array[0]_asd => qqq +complex_second_oops_array[1]_efg => aaa ``` ## Help & Contact diff --git a/arm-outputs/Out-ARMOutput.ps1 b/arm-outputs/Out-ARMOutput.ps1 index 4a5389d..8800378 100644 --- a/arm-outputs/Out-ARMOutput.ps1 +++ b/arm-outputs/Out-ARMOutput.ps1 @@ -1,6 +1,6 @@ Write-Verbose "Entering script Out-ARMOutput.ps1" -. .\Select-Outputs.ps1 +. .\Select-OutputsFromObjectTree.ps1 Write-Debug "ResourceGroupName= $resourceGroupName" @@ -74,5 +74,5 @@ $lastResourceGroupDeployment.Outputs.GetEnumerator() | ForEach-Object { $Outputs | ForEach-Object { Write-Verbose "Updating VSTS variable '$($_.Key)' to value '$($_.Value)'" - Write-Output "##vso[task.setvariable variable=$prefix$($_.Key);isOutput=true;]$($_.Value)" + Write-Host "##vso[task.setvariable variable=$prefix$($_.Key);]$($_.Value)" } \ No newline at end of file diff --git a/arm-outputs/Select-OutputsFromObjectTree.ps1 b/arm-outputs/Select-OutputsFromObjectTree.ps1 index dc3e371..cebd24a 100644 --- a/arm-outputs/Select-OutputsFromObjectTree.ps1 +++ b/arm-outputs/Select-OutputsFromObjectTree.ps1 @@ -5,7 +5,7 @@ function Select-OutputsFromObjectTree($Object, $MaxLevels="7", $PathName = "", $ $OutputArray = @() $Object | Get-Member | Where-Object { $_.MemberType -match "Property"} | ForEach-Object { - $key = "$PathName.$($_.Name)" + $key = "$($PathName)_$($_.Name)" $value = $Object | Select-Object -ExpandProperty $_.Name switch ($value.GetType().ToString()) @@ -15,7 +15,7 @@ function Select-OutputsFromObjectTree($Object, $MaxLevels="7", $PathName = "", $ } "System.Object[]"{ For ($i=0; $i -lt $value.Length; $i++) { - $OutputArray += Select-OutputsFromObjectTree -Object $value[$i] -PathName "$key[$i]" -Level ($Level + 1) -MaxLevels $MaxLevels + $OutputArray += Select-OutputsFromObjectTree -Object $value[$i] -PathName "$($key)_$i" -Level ($Level + 1) -MaxLevels $MaxLevels } } default{ From 2f9e1c7197c1e16ab3addda068d7ade271450c3c Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Mon, 3 Sep 2018 07:31:36 +0200 Subject: [PATCH 10/12] Updating the docs --- Marketplace.md | 38 ++++++++++++++++++++------------------ README.md | 38 ++++++++++++++++++++------------------ 2 files changed, 40 insertions(+), 36 deletions(-) diff --git a/Marketplace.md b/Marketplace.md index 3d47910..17f2443 100644 --- a/Marketplace.md +++ b/Marketplace.md @@ -60,23 +60,25 @@ Optional string to filter deployments by. This can be useful if you have concurr If your output is not a single value but a complex type, like: ``` json -{ - "someKey":"someValue", - "second":{ - "foo":"bar", - "oops":{ - "asdasdasd":true, - "array":[ - { - "asd":"qqq" - }, - { - "efg":"aaa" - } - ] - } - } +... +"outputs": { + "someKey":"someValue", + "second": { + "foo":"bar", + "oops": { + "asdasdasd":true, + "array": [ + { + "asd":"qqq" + }, + { + "efg":"aaa" + } + ] + } + } } +... ```` This will result in the following 5 variables: @@ -84,8 +86,8 @@ This will result in the following 5 variables: complex_someKey => someValue complex_second_foo => bar complex_second_oops_asdasdasd => True -complex_second_oops_array[0]_asd => qqq -complex_second_oops_array[1]_efg => aaa +complex_second_oops_array_0_asd => qqq +complex_second_oops_array_1_efg => aaa ``` ## Help & Contact diff --git a/README.md b/README.md index 02d2b22..0223aab 100644 --- a/README.md +++ b/README.md @@ -36,23 +36,25 @@ Optional string to filter deployments by. This can be useful if you have concurr If your output is not a single value but a complex type, like: ``` json -{ - "someKey":"someValue", - "second":{ - "foo":"bar", - "oops":{ - "asdasdasd":true, - "array":[ - { - "asd":"qqq" - }, - { - "efg":"aaa" - } - ] - } - } +... +"outputs": { + "someKey":"someValue", + "second": { + "foo":"bar", + "oops": { + "asdasdasd":true, + "array": [ + { + "asd":"qqq" + }, + { + "efg":"aaa" + } + ] + } + } } +... ```` This will result in the following 5 variables: @@ -60,8 +62,8 @@ This will result in the following 5 variables: complex_someKey => someValue complex_second_foo => bar complex_second_oops_asdasdasd => True -complex_second_oops_array[0]_asd => qqq -complex_second_oops_array[1]_efg => aaa +complex_second_oops_array_0_asd => qqq +complex_second_oops_array_1_efg => aaa ``` ## Help & Contact From 02d2f3e6afa4d3e4285961ac8fb976102897a511 Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Mon, 3 Sep 2018 07:42:19 +0200 Subject: [PATCH 11/12] Last small textual fixes --- Marketplace.md | 6 +-- README.md | 56 +------------------- arm-outputs/GetProperties/GetProperties.psm1 | 0 3 files changed, 5 insertions(+), 57 deletions(-) delete mode 100644 arm-outputs/GetProperties/GetProperties.psm1 diff --git a/Marketplace.md b/Marketplace.md index 17f2443..0568480 100644 --- a/Marketplace.md +++ b/Marketplace.md @@ -12,12 +12,12 @@ Usually this task is ran directly after the 'Azure Resource Group Deployment' ta ## Release notes -### Version 4.0 - 02-09-2018 +### Version 4.0 - 03-09-2018 - Support for complex outputs - Now based on AzurePowershell task handler - Improved performance - - Less dependencies + - Less dependencies - Easier to port to Linux agents Powershell Core on VSTS becomes a thing ### Version 3.0 - 01-02-2018 @@ -30,7 +30,7 @@ Usually this task is ran directly after the 'Azure Resource Group Deployment' ta ### Version 1.0 - 13-04-2017 -- LastDeploymentBehaviour added +- Initial version ## Parameter usage diff --git a/README.md b/README.md index 0223aab..8e0d29a 100644 --- a/README.md +++ b/README.md @@ -10,61 +10,9 @@ Usually this task is ran directly after the 'Azure Resource Group Deployment' ta [![screenshot-1](images/screenshots-vsts-arm-outputs-1.png "Screenshot-1")](images/screenshots-vsts-arm-outputs-1.png) -## Secrets +## How to use -If your output is of type ```SecureString``` the output value cannot be read and these outputs are therefore ignored. - -You can off course output your secrets as string but then these values might be exposed in logfiles (and visible via the Azure Portal as well) - -## Prefix - -Using the 'prefix' parameter, it is possible to prefix the variables used within VSTS. A prefix can be used to distinct variables coming out of ARM from regular VSTS variables. A prefix can also be to prevent collisions between ARM Output names and VSTS Variable names. - -## Output Names - -Using the 'Output Names' parameter, it is possible to process only a subset of the ARM Outputs. When this field is left empty (it is by default) all ARM Outputs are used. - -## When last deployment is failed - -Using the 'When last deployment is failed' parameter, you can choose the behaviour when the last deployment to a resource group has failed. There are two options, 1. fail the task (the default) or 2. take the last succesful deployment. - -## Filter deployment name - -Optional string to filter deployments by. This can be useful if you have concurrent deployments to the same resource group. Deployment names in VSTS are the name of the json file plus date and time, so a file CreateKeyVault.json could have a deployment name of CreateKeyVault-20180025-151538-0688. In this case, if you want to filter to deployments of this file enter CreateKeyVault as the filter - -## Complex outputs - -If your output is not a single value but a complex type, like: -``` json -... -"outputs": { - "someKey":"someValue", - "second": { - "foo":"bar", - "oops": { - "asdasdasd":true, - "array": [ - { - "asd":"qqq" - }, - { - "efg":"aaa" - } - ] - } - } -} -... -```` -This will result in the following 5 variables: - -``` -complex_someKey => someValue -complex_second_foo => bar -complex_second_oops_asdasdasd => True -complex_second_oops_array_0_asd => qqq -complex_second_oops_array_1_efg => aaa -``` +Checkout the docs in the [Marketplace page](Marketplace.md) ## Help & Contact diff --git a/arm-outputs/GetProperties/GetProperties.psm1 b/arm-outputs/GetProperties/GetProperties.psm1 deleted file mode 100644 index e69de29..0000000 From 63e1375b8eb931c4aba06f07085d5d57c126250f Mon Sep 17 00:00:00 2001 From: Kees Schollaart Date: Mon, 3 Sep 2018 07:51:13 +0200 Subject: [PATCH 12/12] nicer json --- Marketplace.md | 34 ++++++++++++++++++---------------- 1 file changed, 18 insertions(+), 16 deletions(-) diff --git a/Marketplace.md b/Marketplace.md index 0568480..9eb561f 100644 --- a/Marketplace.md +++ b/Marketplace.md @@ -60,25 +60,27 @@ Optional string to filter deployments by. This can be useful if you have concurr If your output is not a single value but a complex type, like: ``` json -... -"outputs": { - "someKey":"someValue", - "second": { - "foo":"bar", - "oops": { - "asdasdasd":true, - "array": [ - { - "asd":"qqq" - }, - { - "efg":"aaa" - } - ] +{ + "parameters": {}, + "resources": {}, + "outputs": { + "someKey":"someValue", + "second": { + "foo":"bar", + "oops": { + "asdasdasd":true, + "array": [ + { + "asd":"qqq" + }, + { + "efg":"aaa" + } + ] + } } } } -... ```` This will result in the following 5 variables: