From 71fa1f714dfbf8ce203d607f8d966921f775ef0e Mon Sep 17 00:00:00 2001 From: Shawn Melton <11204251+wsmelton@users.noreply.github.com> Date: Fri, 28 May 2021 20:15:46 -0500 Subject: [PATCH] module - applying formatting changes --- src/functions/Get-Version.ps1 | 2 +- src/functions/Invoke-RestApi.ps1 | 124 ++++++++--------- src/functions/Test-Version.ps1 | 2 +- src/functions/auth/Initialize-SdkClient.ps1 | 6 +- src/functions/auth/New-Session.ps1 | 30 ++-- .../configurations/Get-Configuration.ps1 | 24 ++-- .../Search-DirectoryServiceDomain.ps1 | 10 +- src/functions/discovery/Start-Discovery.ps1 | 8 +- .../Search-DistributedEngineSite.ps1 | 14 +- .../Get-FolderPermission.ps1 | 6 +- .../New-FolderPermission.ps1 | 26 ++-- .../Remove-FolderPermission.ps1 | 8 +- .../Search-FolderPermission.ps1 | 8 +- .../Set-FolderPermission.ps1 | 22 +-- src/functions/folders/Find-Folder.ps1 | 14 +- src/functions/folders/Get-Folder.ps1 | 12 +- src/functions/folders/Get-FolderAudit.ps1 | 8 +- src/functions/folders/New-Folder.ps1 | 6 +- src/functions/folders/Remove-Folder.ps1 | 10 +- .../folders/Remove-FolderTemplate.ps1 | 10 +- src/functions/folders/Search-Folder.ps1 | 12 +- src/functions/folders/Set-Folder.ps1 | 10 +- src/functions/groups/Find-Group.ps1 | 6 +- src/functions/groups/Get-Group.ps1 | 4 +- src/functions/groups/Get-GroupMember.ps1 | 8 +- src/functions/groups/Get-GroupRole.ps1 | 8 +- src/functions/groups/Search-Group.ps1 | 8 +- .../Get-RpcPasswordType.ps1 | 8 +- .../Search-RpcPasswordType.ps1 | 10 +- src/functions/reports/Get-Report.ps1 | 8 +- src/functions/reports/Get-ReportCategory.ps1 | 4 +- src/functions/reports/New-Report.ps1 | 18 +-- .../reports/Remove-ReportCategory.ps1 | 6 +- .../reports/Search-ReportSchedule.ps1 | 8 +- src/functions/roles/Search-Role.ps1 | 10 +- .../Get-SecretDependency.ps1 | 8 +- .../Get-SecretDependencyGroup.ps1 | 8 +- .../Get-SecretDependencyRunStatus.ps1 | 6 +- .../Get-SecretDependencyStub.ps1 | 8 +- .../Get-SecretDependencyTemplate.ps1 | 6 +- .../New-SecretDependencyGroup.ps1 | 8 +- .../Remove-SecretDependency.ps1 | 12 +- .../Search-SecretDependency.ps1 | 8 +- .../Start-SecretDependency.ps1 | 10 +- .../Add-SecretTemplateField.ps1 | 2 +- .../secret-templates/Get-SecretTemplate.ps1 | 8 +- .../secret-templates/New-SecretTemplate.ps1 | 8 +- .../New-SecretTemplateField.ps1 | 4 +- .../Search-SecretTemplate.ps1 | 8 +- .../secrets/Disable-SecretCheckout.ps1 | 10 +- src/functions/secrets/Disable-SecretEmail.ps1 | 16 +-- .../secrets/Enable-SecretCheckout.ps1 | 14 +- src/functions/secrets/Enable-SecretEmail.ps1 | 16 +-- src/functions/secrets/Find-Secret.ps1 | 130 +++++++++--------- src/functions/secrets/Get-Secret.ps1 | 10 +- .../secrets/Get-SecretAttachment.ps1 | 40 +++--- src/functions/secrets/Get-SecretAudit.ps1 | 10 +- src/functions/secrets/Get-SecretField.ps1 | 22 +-- .../secrets/Get-SecretHeartbeatStatus.ps1 | 10 +- .../secrets/Get-SecretPasswordStatus.ps1 | 10 +- .../secrets/Get-SecretRpcAssociated.ps1 | 18 +-- src/functions/secrets/Get-SecretSetting.ps1 | 8 +- src/functions/secrets/Get-SecretState.ps1 | 8 +- src/functions/secrets/Get-SecretStub.ps1 | 6 +- src/functions/secrets/Get-SecretSummary.ps1 | 8 +- .../secrets/Invoke-SecretGeneratePassword.ps1 | 12 +- src/functions/secrets/New-Secret.ps1 | 4 +- src/functions/secrets/Protect-Secret.ps1 | 10 +- src/functions/secrets/Remove-Secret.ps1 | 10 +- src/functions/secrets/Restore-Secret.ps1 | 8 +- src/functions/secrets/Revoke-Secret.ps1 | 12 +- src/functions/secrets/Search-Secret.ps1 | 110 +++++++-------- .../secrets/Set-SecretExpiration.ps1 | 18 +-- src/functions/secrets/Set-SecretField.ps1 | 26 ++-- .../secrets/Set-SecretRpcAssociated.ps1 | 10 +- .../secrets/Set-SecretRpcPrivileged.ps1 | 18 +-- src/functions/secrets/Set-SecretSecurity.ps1 | 8 +- .../secrets/Start-SecretChangePassword.ps1 | 26 ++-- .../secrets/Start-SecretHeartbeat.ps1 | 10 +- .../secrets/Stop-SecretChangePassword.ps1 | 8 +- src/functions/secrets/Update-Secret.ps1 | 4 +- src/functions/users/Disable-User.ps1 | 8 +- src/functions/users/Enable-User.ps1 | 8 +- src/functions/users/Find-User.ps1 | 16 +-- src/functions/users/Get-User.ps1 | 8 +- src/functions/users/Get-UserAudit.ps1 | 8 +- src/functions/users/Get-UserRole.ps1 | 8 +- src/functions/users/Get-UserRoleAssigned.ps1 | 8 +- src/functions/users/Lock-User.ps1 | 8 +- src/functions/users/New-User.ps1 | 36 ++--- src/functions/users/Reset-UserPassword.ps1 | 8 +- src/functions/users/Search-User.ps1 | 10 +- src/functions/users/Show-CurrentUser.ps1 | 6 +- src/functions/users/Unlock-User.ps1 | 8 +- src/functions/users/Update-UserPassword.ps1 | 18 +-- 95 files changed, 685 insertions(+), 685 deletions(-) diff --git a/src/functions/Get-Version.ps1 b/src/functions/Get-Version.ps1 index 76e93974..5272d7d4 100644 --- a/src/functions/Get-Version.ps1 +++ b/src/functions/Get-Version.ps1 @@ -45,7 +45,7 @@ function Get-Version { if ($tssParams.ContainsKey('TssSession') -and $TssSession.IsValidSession()) { . $TssVersionObject -TssSession $TssSession -Invocation $PSCmdlet.MyInvocation } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/Invoke-RestApi.ps1 b/src/functions/Invoke-RestApi.ps1 index b6d8e2b6..96c38184 100644 --- a/src/functions/Invoke-RestApi.ps1 +++ b/src/functions/Invoke-RestApi.ps1 @@ -30,7 +30,7 @@ function Invoke-RestApi { [Cmdletbinding()] param( # Secret Server REST API URL - [Parameter(Mandatory,ValueFromPipelineByPropertyName, Position = 0)] + [Parameter(Mandatory, ValueFromPipelineByPropertyName, Position = 0)] [Alias('Url')] [uri] $Uri, @@ -43,7 +43,7 @@ function Invoke-RestApi { # Method used for the web request, supported by Secret Server [Parameter(ValueFromPipelineByPropertyName)] - [ValidateSet('GET','DELETE', 'PATCH', 'POST', 'PUT')] + [ValidateSet('GET', 'DELETE', 'PATCH', 'POST', 'PUT')] [string] $Method, @@ -142,72 +142,72 @@ function Invoke-RestApi { # We call Invoke-RestMethod with the parameters we've passed in. # It will take care of converting the results from JSON. Invoke-RestMethod @irmSplat | - & { process { - $in = $_ - # What it will not do is "unroll" them. - if ($in -eq 'null') { - return - } - if ($ExpandProperty) { - if ($in.$ExpandProperty) { - $in.$ExpandProperty + & { process { + $in = $_ + # What it will not do is "unroll" them. + if ($in -eq 'null') { + return } - } elseif ($in.PSObject.Properties['Value'] -and $in.Count) { - # If that's what we're dealing with - $_.Value # pass value down the pipe. - } elseif ($in.code -like '*API_*') { - $PSCmdlet.WriteError( - [Management.Automation.ErrorRecord]::new( - [Exception]::new("$($in.message)"),"$($in.code)","InvalidOperation",$in)) - $PSCmdlet.WriteVerbose("$in") - return - } elseif ($in -notlike '*&1 | - & { process { - # One more step of the pipeline will unroll each of the values. - if ($_ -is [string]) { return $_ } - if ($null -ne $_.Count -and $_.Count -eq 0) { return } - if ($PSTypeName -and # If we have a PSTypeName (to apply formatting) - $_ -isnot [Management.Automation.ErrorRecord] # and it is not an error (which we do not want to format) - ) { - $_.PSTypeNames.Clear() # then clear the existing typenames and decorate the object. - foreach ($t in $PSTypeName) { - $_.PSTypeNames.add($T) + if ($ExpandProperty) { + if ($in.$ExpandProperty) { + $in.$ExpandProperty + } + } elseif ($in.PSObject.Properties['Value'] -and $in.Count) { + # If that's what we're dealing with + $_.Value # pass value down the pipe. + } elseif ($in.code -like '*API_*') { + $PSCmdlet.WriteError( + [Management.Automation.ErrorRecord]::new( + [Exception]::new("$($in.message)"), "$($in.code)", 'InvalidOperation', $in)) + $PSCmdlet.WriteVerbose("$in") + return + } elseif ($in -notlike '*&1 | + & { process { + # One more step of the pipeline will unroll each of the values. + if ($_ -is [string]) { return $_ } + if ($null -ne $_.Count -and $_.Count -eq 0) { return } + if ($PSTypeName -and # If we have a PSTypeName (to apply formatting) + $_ -isnot [Management.Automation.ErrorRecord] # and it is not an error (which we do not want to format) + ) { + $_.PSTypeNames.Clear() # then clear the existing typenames and decorate the object. + foreach ($t in $PSTypeName) { + $_.PSTypeNames.add($T) + } } - } - if ($Property) { - foreach ($propKeyValue in $Property.GetEnumerator()) { - if ($_.PSObject.Properties[$propKeyValue.Key]) { - $_.PSObject.Properties.Remove($propKeyValue.Key) + if ($Property) { + foreach ($propKeyValue in $Property.GetEnumerator()) { + if ($_.PSObject.Properties[$propKeyValue.Key]) { + $_.PSObject.Properties.Remove($propKeyValue.Key) + } + $_.PSObject.Properties.Add($( + if ($propKeyValue.Value -as [ScriptBlock[]]) { + [PSScriptProperty]::new.Invoke(@($propKeyValue.Key) + $propKeyValue.Value) + } else { + [PSNoteProperty]::new($propKeyValue.Key, $propKeyValue.Value) + })) } - $_.PSObject.Properties.Add($( - if ($propKeyValue.Value -as [ScriptBlock[]]) { - [PSScriptProperty]::new.Invoke(@($propKeyValue.Key) + $propKeyValue.Value) - } else { - [PSNoteProperty]::new($propKeyValue.Key, $propKeyValue.Value) - })) } - } - if ($RemoveProperty) { - foreach ($propToRemove in $RemoveProperty) { - $_.PSObject.Properties.Remove($propToRemove) + if ($RemoveProperty) { + foreach ($propToRemove in $RemoveProperty) { + $_.PSObject.Properties.Remove($propToRemove) + } } - } - return $_ # output the object and we're done. - } } + return $_ # output the object and we're done. + } } #endregion Call Invoke-RestMethod } } \ No newline at end of file diff --git a/src/functions/Test-Version.ps1 b/src/functions/Test-Version.ps1 index 75d28893..d38ad795 100644 --- a/src/functions/Test-Version.ps1 +++ b/src/functions/Test-Version.ps1 @@ -39,7 +39,7 @@ function Test-Version { if ($tssParams.ContainsKey('TssSession') -and $TssSession.IsValidSession()) { . $TssVersionObject -TssSession $TssSession -Invocation $PSCmdlet.MyInvocation } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/auth/Initialize-SdkClient.ps1 b/src/functions/auth/Initialize-SdkClient.ps1 index 89bfc234..bbbdd4e2 100644 --- a/src/functions/auth/Initialize-SdkClient.ps1 +++ b/src/functions/auth/Initialize-SdkClient.ps1 @@ -60,7 +60,7 @@ function Initialize-SdkClient { $tssExe = [IO.Path]::Combine([string]$PSModuleRoot, 'bin', 'tss.exe') if ($IsLinux) { - Write-Verbose "SDK Client, tss utility, has some dependencies required on certain Linux distributions, more details: https://docs.thycotic.com/ss/10.9.0/api-scripting/sdk-cli#task_2__installing_the_sdk_client" + Write-Verbose 'SDK Client, tss utility, has some dependencies required on certain Linux distributions, more details: https://docs.thycotic.com/ss/10.9.0/api-scripting/sdk-cli#task_2__installing_the_sdk_client' } } process { @@ -85,7 +85,7 @@ function Initialize-SdkClient { Write-Verbose "SDK Client raw output: $tssRmOutput" if ($tssRmOutput -match 'Your configuration settings have been removed.') { - Write-Verbose "SDK Client configuration has been removed" + Write-Verbose 'SDK Client configuration has been removed' } else { Write-Waring "Issue removing configuration files for [$SecretServer]: $tssRmProcessOutput" return @@ -126,7 +126,7 @@ function Initialize-SdkClient { Write-Host 'SDK Client initialization completed successfully' } if ($tssInitOutput -match 'This machine is already initialized. Remove the configuration settings.') { - Write-Warning "Initialization has already been run for this host, include -Force parameter if you want to drop and reinitialize" + Write-Warning 'Initialization has already been run for this host, include -Force parameter if you want to drop and reinitialize' } } catch { Write-Warning "Issue initializing SDK Client (tss) for [$SecretServer]" diff --git a/src/functions/auth/New-Session.ps1 b/src/functions/auth/New-Session.ps1 index 2313ea53..804c149b 100644 --- a/src/functions/auth/New-Session.ps1 +++ b/src/functions/auth/New-Session.ps1 @@ -57,35 +57,35 @@ function New-Session { [OutputType('TssSession')] param( # Secret Server URL - [Parameter(Mandatory,ParameterSetName = 'new', Position = 0)] - [Parameter(Mandatory,ParameterSetName = 'sdk', Position = 0)] - [Parameter(Mandatory,ParameterSetName = 'winauth', Position = 0)] - [Parameter(Mandatory,ParameterSetName = 'clientSdk')] + [Parameter(Mandatory, ParameterSetName = 'new', Position = 0)] + [Parameter(Mandatory, ParameterSetName = 'sdk', Position = 0)] + [Parameter(Mandatory, ParameterSetName = 'winauth', Position = 0)] + [Parameter(Mandatory, ParameterSetName = 'clientSdk')] [uri] $SecretServer, # Specify a Secret Server user account. - [Parameter(Mandatory,ParameterSetName = 'new', Position = 1)] + [Parameter(Mandatory, ParameterSetName = 'new', Position = 1)] [PSCredential] [Management.Automation.CredentialAttribute()] $Credential, # Specify Access Token - [Parameter(Mandatory,ParameterSetName = 'sdk')] + [Parameter(Mandatory, ParameterSetName = 'sdk')] $AccessToken, # Utilize Windows Authentication (IWA) - [Parameter(Mandatory,ParameterSetName = 'winauth')] + [Parameter(Mandatory, ParameterSetName = 'winauth')] [switch] $UseWindowsAuth, # Utilize SDK Client - [Parameter(Mandatory,ParameterSetName = 'clientSdk')] + [Parameter(Mandatory, ParameterSetName = 'clientSdk')] [switch] $UseSdkClient, # Config path for the key/config files - [Parameter(ParameterSetName = 'clientSdk',Mandatory)] + [Parameter(ParameterSetName = 'clientSdk', Mandatory)] [ValidateScript( { Test-Path $_ -PathType Container })] [string] $ConfigPath @@ -96,8 +96,8 @@ function New-Session { $outputTssSession = [TssSession]::new() - if ($SecretServer -match "(?:\/api\/v1)|(?:\/oauth2\/token)") { - throw "Invalid argument on parameter SecretServer. Please ensure [/api/v1] or [/oauth2/token] are not provided" + if ($SecretServer -match '(?:\/api\/v1)|(?:\/oauth2\/token)') { + throw 'Invalid argument on parameter SecretServer. Please ensure [/api/v1] or [/oauth2/token] are not provided' return } else { $outputTssSession.SecretServer = $SecretServer @@ -140,7 +140,7 @@ function New-Session { if ($err.Length -gt 0) { throw $err } elseif ($_ -like '* - [cmdletbinding(DefaultParameterSetName = "filter")] + [cmdletbinding(DefaultParameterSetName = 'filter')] [OutputType('TssSecretLookup')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID to retrieve - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] - [Alias("SecretId")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] + [Alias('SecretId')] [int] $Id, # Return only secrets within a certain folder - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "folder")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'folder')] [int] $FolderId, # Include secrets in subfolders of the specified FolderId - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "folder")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'folder')] [Alias('IncludeSubFolder')] [switch] $IncludeSubFolders, # Field to filter on - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [string] $Field, # Text of the field to filter on - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [string] $FieldText, # Match the exact text of the FieldText - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [switch] $ExactMatch, # Field-slug to search # This overrides the Field filter - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [string] $FieldSlug, # Secret Template fields to return # Only exposed fields can be returned - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [Alias('ExtendedFields')] [string[]] $ExtendedField, # Return only secrets matching a certain extended type - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [int] $ExtendedTypeId, # Return only secrets matching a certain template - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [Alias('TemplateId')] [int] $SecretTemplateId, # Return only secrets within a certain site - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [int] $SiteId, # Return only secrets with a certain heartbeat status - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] - [ValidateSet('Failed','Success','Pending','Disabled','UnableToConnect','UnknownError','IncompatibleHost','AccountLockedOut','DnsMismatch','UnableToValidateServerPublicKey','Processing','ArgumentError','AccessDenied')] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] + [ValidateSet('Failed', 'Success', 'Pending', 'Disabled', 'UnableToConnect', 'UnknownError', 'IncompatibleHost', 'AccountLockedOut', 'DnsMismatch', 'UnableToValidateServerPublicKey', 'Processing', 'ArgumentError', 'AccessDenied')] [string] $HeartbeatStatus, # Include inactive/disabled secrets - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [switch] $IncludeInactive, # Exclude active secrets - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [switch] $ExcludeActive, # Secrets where template has RPC Enabled - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [switch] $RpcEnabled, # Secrets where you are not the owner and secret is explicitly shared with your user - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [switch] $SharedWithMe, # Secrets matching certain password types - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [int[]] $PasswordTypeIds, # Filter based on permission (List, View, Edit or Owner) - [Parameter(ParameterSetName = "filter")] - [ValidateSet('List','View','Edit','Owner')] + [Parameter(ParameterSetName = 'filter')] + [ValidateSet('List', 'View', 'Edit', 'Owner')] [string] $Permission, # Filter All Secrets, Recent or Favorites - [Parameter(ParameterSetName = "filter")] - [ValidateSet('All','Recent','Favorites')] + [Parameter(ParameterSetName = 'filter')] + [ValidateSet('All', 'Recent', 'Favorites')] [string] $Scope, # Exclude DoubleLocks from search results - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [Alias('ExcludeDoubleLocks')] [switch] $ExcludeDoubleLock, # Include only secrets with a specific DoubleLock ID assigned - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [int] $DoubleLockId ) @@ -173,11 +173,11 @@ function Find-Secret { if ($tssParams.ContainsKey('TssSession') -and $TssSession.IsValidSession()) { . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation if ($tssParams['Id']) { - $uri = $TssSession.ApiUrl , "secrets/lookup", $Id -join '/' + $uri = $TssSession.ApiUrl , 'secrets/lookup', $Id -join '/' } else { - $uri = $TssSession.ApiUrl, "secrets/lookup" -join '/' + $uri = $TssSession.ApiUrl, 'secrets/lookup' -join '/' $uri += "?take=$($TssSession.Take)" - $uri += "&filter.includeRestricted=true" + $uri += '&filter.includeRestricted=true' $filters = @() switch ($tssParams.Keys) { @@ -205,17 +205,17 @@ function Find-Secret { } 'Permission' { $filters += switch ($tssParams['Permission']) { - 'List' { "filter.permissionRequired=1" } - 'View' { "filter.permissionRequired=2" } - 'Edit' { "filter.permissionRequired=3" } - 'Owner' { "filter.permissionRequired=4" } + 'List' { 'filter.permissionRequired=1' } + 'View' { 'filter.permissionRequired=2' } + 'Edit' { 'filter.permissionRequired=3' } + 'Owner' { 'filter.permissionRequired=4' } } } 'Scope' { $filters += switch ($tssParams['Scope']) { - 'All' { "filter.scope=1" } - 'Recent' { "filter.scope=2" } - 'Favorite' { "filter.scope=3" } + 'All' { 'filter.scope=1' } + 'Recent' { 'filter.scope=2' } + 'Favorite' { 'filter.scope=3' } } } 'RpcEnabled' { @@ -231,7 +231,7 @@ function Find-Secret { $filters += "filter.includeActive=$($tssParams['ExcludeActive'])" } default { - if ($_ -in 'Verbose','TssSession','Raw') { continue } else { + if ($_ -in 'Verbose', 'TssSession', 'Raw') { continue } else { $filters += "filter.$($_)=$($tssParams[$_])" } } @@ -249,34 +249,34 @@ function Find-Secret { try { $restResponse = . $InvokeApi @invokeParams } catch { - Write-Warning "Issue on search request" + Write-Warning 'Issue on search request' $err = $_ . $ErrorHandling $err } if ($tssParams.ContainsKey('Id') -and $restResponse) { [TssSecretLookup]@{ - Id = $restResponse.Id + Id = $restResponse.Id SecretName = $restResponse.value } } else { if ($restResponse.records.Count -le 0 -and $restResponse.records.Length -eq 0) { - Write-Warning "No secrets found" + Write-Warning 'No secrets found' } if ($restResponse) { foreach ($secret in $restResponse.records) { - $parsedValue = $secret.value.Split('-',3).Trim() + $parsedValue = $secret.value.Split('-', 3).Trim() [TssSecretLookup]@{ - Id = $secret.id - FolderId = $parsedValue[0] + Id = $secret.id + FolderId = $parsedValue[0] SecretTemplateId = $parsedValue[1] - SecretName = $parsedValue[2] + SecretName = $parsedValue[2] } } } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-Secret.ps1 b/src/functions/secrets/Get-Secret.ps1 index 224d802a..79e29782 100644 --- a/src/functions/secrets/Get-Secret.ps1 +++ b/src/functions/secrets/Get-Secret.ps1 @@ -61,13 +61,13 @@ function Get-Secret { [OutputType('TssSecret')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,Position = 0)] + [Parameter(Mandatory, Position = 0)] [TssSession] $TssSession, # Secret ID to retrieve - [Parameter(Mandatory,Position = 0)] - [Alias("SecretId")] + [Parameter(Mandatory, Position = 0)] + [Alias('SecretId')] [int[]] $Id, @@ -156,7 +156,7 @@ function Get-Secret { 'TicketSystemId' { $getBody.Add('ticketSystemId', $TicketSystemId) } 'DoublelockPassword' { $passwd = [Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($DoublelockPassword)) - $getBody.Add('doubleLockPassword',$passwd) + $getBody.Add('doubleLockPassword', $passwd) } } @@ -184,7 +184,7 @@ function Get-Secret { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretAttachment.ps1 b/src/functions/secrets/Get-SecretAttachment.ps1 index 9f34765b..c697225c 100644 --- a/src/functions/secrets/Get-SecretAttachment.ps1 +++ b/src/functions/secrets/Get-SecretAttachment.ps1 @@ -26,25 +26,25 @@ function Get-SecretAttachment { [CmdletBinding()] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id, # Field name - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] [Alias('FieldName')] [string] $Slug, # Write contents to a file (for file attachments and SSH public/private keys) [Parameter(Mandatory)] - [ValidateScript({Test-Path $_ -PathType Container})] + [ValidateScript( { Test-Path $_ -PathType Container })] [string] $Path, @@ -83,22 +83,22 @@ function Get-SecretAttachment { process { Write-Verbose "Provided command parameters: $(. $GetInvocation $PSCmdlet.MyInvocation)" if ($tssParams.ContainsKey('TssSession') -and $TssSession.IsValidSession()) { - . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation + . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation foreach ($secret in $Id) { $currentSecret = $null $getSecretParams = @{ TssSession = $TssSession - Id = $secret + Id = $secret } if ($restrictedParams.Count -gt 0) { - $getSecretParams.Add('Comment',$Comment) - $getSecretParams.Add('ForceCheckIn',$ForceCheckIn) - $getSecretParams.Add('TicketNumber',$TicketNumber) - $getSecretParams.Add('TicketSystemId',$TicketSystemId) + $getSecretParams.Add('Comment', $Comment) + $getSecretParams.Add('ForceCheckIn', $ForceCheckIn) + $getSecretParams.Add('TicketNumber', $TicketNumber) + $getSecretParams.Add('TicketSystemId', $TicketSystemId) } $currentSecret = Get-TssSecret @getSecretParams - $currentSecretFileItem = $currentSecret.Items.Where({$_.Slug -eq $Slug}) + $currentSecretFileItem = $currentSecret.Items.Where( { $_.Slug -eq $Slug }) if ($currentSecretFileItem.IsFile) { $attachmentFilename = $currentSecretFileItem.Filename @@ -110,15 +110,15 @@ function Get-SecretAttachment { $fileAttachment = [IO.Path]::Combine($Path, $attachmentFilename) $getSecretFieldParams = @{ TssSession = $TssSession - Id = $secret - Slug = $Slug - OutFile = $fileAttachment + Id = $secret + Slug = $Slug + OutFile = $fileAttachment } if ($restrictedParams.Count -gt 0) { - $getSecretFieldParams.Add('Comment',$Comment) - $getSecretFieldParams.Add('ForceCheckIn',$ForceCheckIn) - $getSecretFieldParams.Add('TicketNumber',$TicketNumber) - $getSecretFieldParams.Add('TicketSystemId',$TicketSystemId) + $getSecretFieldParams.Add('Comment', $Comment) + $getSecretFieldParams.Add('ForceCheckIn', $ForceCheckIn) + $getSecretFieldParams.Add('TicketNumber', $TicketNumber) + $getSecretFieldParams.Add('TicketSystemId', $TicketSystemId) } Get-TssSecretField @getSecretFieldParams @@ -128,7 +128,7 @@ function Get-SecretAttachment { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretAudit.ps1 b/src/functions/secrets/Get-SecretAudit.ps1 index 6d862c42..d33c655d 100644 --- a/src/functions/secrets/Get-SecretAudit.ps1 +++ b/src/functions/secrets/Get-SecretAudit.ps1 @@ -25,13 +25,13 @@ function Get-SecretAudit { [OutputType('TssSecretAudit')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id, @@ -50,7 +50,7 @@ function Get-SecretAudit { process { Write-Verbose "Provided command parameters: $(. $GetInvocation $PSCmdlet.MyInvocation)" if ($tssParams.ContainsKey('TssSession') -and $TssSession.IsValidSession()) { - . $CheckVersion $TssSession '10.9.000032' $PSCmdlet.MyInvocation + . $CheckVersion $TssSession '10.9.000032' $PSCmdlet.MyInvocation foreach ($secret in $Id) { $restResponse = $null $uri = $TssSession.ApiUrl, 'secrets', $secret, 'audits' -join '/' @@ -76,7 +76,7 @@ function Get-SecretAudit { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretField.ps1 b/src/functions/secrets/Get-SecretField.ps1 index a3e6e743..58e39bbb 100644 --- a/src/functions/secrets/Get-SecretField.ps1 +++ b/src/functions/secrets/Get-SecretField.ps1 @@ -25,14 +25,14 @@ function Get-SecretField { [OutputType('System.String')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID to retrieve - [Parameter(Mandatory,ValueFromPipelineByPropertyName,ParameterSetName = 'field')] + [Parameter(Mandatory, ValueFromPipelineByPropertyName, ParameterSetName = 'field')] [Parameter(Mandatory, ParameterSetName = 'restricted')] - [Alias("SecretId")] + [Alias('SecretId')] [int[]] $Id, @@ -41,7 +41,7 @@ function Get-SecretField { ValueFromPipelineByPropertyName, ParameterSetName = 'field')] [Parameter(Mandatory, ParameterSetName = 'restricted')] - [Alias("FieldName")] + [Alias('FieldName')] [string] $Slug, @@ -98,23 +98,23 @@ function Get-SecretField { if ($PSCmdlet.ParameterSetName -eq 'restricted') { switch ($tssParams.Keys) { 'Comment' { - $body.Add('comment',$Comment) + $body.Add('comment', $Comment) } 'DoublelockPassword' { $passwd = [Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($DoublelockPassword)) - $body.Add('doubleLockPassword',$passwd) + $body.Add('doubleLockPassword', $passwd) } 'ForceCheckIn' { - $body.Add('forceCheckIn',$ForceCheckIn) + $body.Add('forceCheckIn', $ForceCheckIn) } 'IncludeInactive' { - $body.Add('includeInactive',[boolean]$IncludeInactive) + $body.Add('includeInactive', [boolean]$IncludeInactive) } 'TicketNumber' { - $body.Add('ticketNumber',$TicketNumber) + $body.Add('ticketNumber', $TicketNumber) } 'TicketSystemId' { - $body.Add('ticketSystemId',$TicketSystemId) + $body.Add('ticketSystemId', $TicketSystemId) } } $uri = $uri, 'restricted/fields', $Slug -join '/' @@ -150,7 +150,7 @@ function Get-SecretField { $restResponse } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretHeartbeatStatus.ps1 b/src/functions/secrets/Get-SecretHeartbeatStatus.ps1 index 5bee7314..55f536a3 100644 --- a/src/functions/secrets/Get-SecretHeartbeatStatus.ps1 +++ b/src/functions/secrets/Get-SecretHeartbeatStatus.ps1 @@ -25,13 +25,13 @@ function Get-SecretHeartbeatStatus { [OutputType('TssSecretHeartbeatStatus')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret Id - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id ) @@ -46,7 +46,7 @@ function Get-SecretHeartbeatStatus { . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation foreach ($secret in $Id) { $restResponse = $null - $uri = $TssSession.ApiUrl.Replace('api/v1','internals'), 'secret-detail', $secret, 'heartbeat-status' -join '/' + $uri = $TssSession.ApiUrl.Replace('api/v1', 'internals'), 'secret-detail', $secret, 'heartbeat-status' -join '/' $invokeParams.Uri = $uri $invokeParams.Method = 'GET' @@ -68,7 +68,7 @@ function Get-SecretHeartbeatStatus { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretPasswordStatus.ps1 b/src/functions/secrets/Get-SecretPasswordStatus.ps1 index cdbcb50c..54e14e2d 100644 --- a/src/functions/secrets/Get-SecretPasswordStatus.ps1 +++ b/src/functions/secrets/Get-SecretPasswordStatus.ps1 @@ -25,13 +25,13 @@ function Get-SecretPasswordStatus { [OutputType('TssSecretPasswordStatus')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id ) @@ -47,7 +47,7 @@ function Get-SecretPasswordStatus { . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation foreach ($secret in $Id) { $restResponse = $null - $uri = $TssSession.ApiUrl.Replace('api/v1','internals'), 'secret-detail', $secret, 'password-status' -join '/' + $uri = $TssSession.ApiUrl.Replace('api/v1', 'internals'), 'secret-detail', $secret, 'password-status' -join '/' $invokeParams.Uri = $uri $invokeParams.Method = 'GET' @@ -67,7 +67,7 @@ function Get-SecretPasswordStatus { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretRpcAssociated.ps1 b/src/functions/secrets/Get-SecretRpcAssociated.ps1 index 3de22b09..76127077 100644 --- a/src/functions/secrets/Get-SecretRpcAssociated.ps1 +++ b/src/functions/secrets/Get-SecretRpcAssociated.ps1 @@ -25,13 +25,13 @@ function Get-SecretRpcAssociated { [OutputType('TssSecretRpcAssociated')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id ) @@ -47,7 +47,7 @@ function Get-SecretRpcAssociated { . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation foreach ($secret in $Id) { $restResponse = $null - $uri = $TssSession.ApiUrl.Replace('api/v1','internals'), 'secret-detail', $secret, 'rpc' -join '/' + $uri = $TssSession.ApiUrl.Replace('api/v1', 'internals'), 'secret-detail', $secret, 'rpc' -join '/' $invokeParams.Uri = $uri $invokeParams.Method = 'GET' @@ -63,18 +63,18 @@ function Get-SecretRpcAssociated { if ($restResponse.resetSecrets.value) { foreach ($as in $restResponse.resetSecrets.value) { [TssSecretRpcAssociated]@{ - ParentSecretId = $secret - Order = $as.order + ParentSecretId = $secret + Order = $as.order AssociatedSecretId = $as.secretId - SecretName = $as.secretName + SecretName = $as.secretName SecretTemplateName = $as.secretTemplateName - FolderName = $as.folderName + FolderName = $as.folderName } } } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretSetting.ps1 b/src/functions/secrets/Get-SecretSetting.ps1 index 683dedb3..6844f5e2 100644 --- a/src/functions/secrets/Get-SecretSetting.ps1 +++ b/src/functions/secrets/Get-SecretSetting.ps1 @@ -25,13 +25,13 @@ function Get-SecretSetting { [OutputType('TssSecretSetting')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretSettingId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretSettingId')] [int[]] $Id ) @@ -68,7 +68,7 @@ function Get-SecretSetting { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretState.ps1 b/src/functions/secrets/Get-SecretState.ps1 index 7b2b8b21..24dbba15 100644 --- a/src/functions/secrets/Get-SecretState.ps1 +++ b/src/functions/secrets/Get-SecretState.ps1 @@ -25,13 +25,13 @@ function Get-SecretState { [OutputType('TssSecretDetailState')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id ) @@ -64,7 +64,7 @@ function Get-SecretState { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretStub.ps1 b/src/functions/secrets/Get-SecretStub.ps1 index 24fd0250..390f6341 100644 --- a/src/functions/secrets/Get-SecretStub.ps1 +++ b/src/functions/secrets/Get-SecretStub.ps1 @@ -33,12 +33,12 @@ function Get-SecretStub { [OutputType('TssSecret')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret Template ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] [Alias('TemplateId')] [int] $SecretTemplateId, @@ -80,7 +80,7 @@ function Get-SecretStub { [TssSecret]$restResponse } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Get-SecretSummary.ps1 b/src/functions/secrets/Get-SecretSummary.ps1 index 068c0233..1072f661 100644 --- a/src/functions/secrets/Get-SecretSummary.ps1 +++ b/src/functions/secrets/Get-SecretSummary.ps1 @@ -25,13 +25,13 @@ function Get-SecretSummary { [OutputType('TssSecretSummary')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id ) @@ -73,7 +73,7 @@ function Get-SecretSummary { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Invoke-SecretGeneratePassword.ps1 b/src/functions/secrets/Invoke-SecretGeneratePassword.ps1 index 8311d456..4197ae00 100644 --- a/src/functions/secrets/Invoke-SecretGeneratePassword.ps1 +++ b/src/functions/secrets/Invoke-SecretGeneratePassword.ps1 @@ -25,18 +25,18 @@ function Invoke-SecretGeneratePassword { [CmdletBinding()] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret Id - [Parameter(Mandatory,ValueFromPipeline)] + [Parameter(Mandatory, ValueFromPipeline)] [Alias('SecretId')] [int] $Id, # Field slug name - [Parameter(Mandatory,ValueFromPipeline)] + [Parameter(Mandatory, ValueFromPipeline)] [Alias('FieldSlug')] [string] $Slug @@ -51,7 +51,7 @@ function Invoke-SecretGeneratePassword { Write-Verbose "Provided command parameters: $(. $GetInvocation $PSCmdlet.MyInvocation)" if ($invokeGenerateParams.ContainsKey('TssSession') -and $TssSession.IsValidSession()) { . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation - $uri = $TssSession.ApiUrl.Replace('api/v1','internals'), 'secret-detail', $Id, 'generate-password', $Slug -join '/' + $uri = $TssSession.ApiUrl.Replace('api/v1', 'internals'), 'secret-detail', $Id, 'generate-password', $Slug -join '/' $invokeGenerateParams.Uri = $uri $invokeGenerateParams.Method = 'GET' @@ -65,7 +65,7 @@ function Invoke-SecretGeneratePassword { } if ($restGeneratedPassword) { - $uri = $TssSession.ApiUrl.Replace('api/v1','internals'), 'secret-detail', $Id, 'validate-password', $Slug -join '/' + $uri = $TssSession.ApiUrl.Replace('api/v1', 'internals'), 'secret-detail', $Id, 'validate-password', $Slug -join '/' $invokeValidateParams.Uri = $uri $invokeValidateParams.Method = 'POST' @@ -88,7 +88,7 @@ function Invoke-SecretGeneratePassword { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/New-Secret.ps1 b/src/functions/secrets/New-Secret.ps1 index 5f0220b7..4cd55ac8 100644 --- a/src/functions/secrets/New-Secret.ps1 +++ b/src/functions/secrets/New-Secret.ps1 @@ -43,7 +43,7 @@ function New-Secret { [OutputType('TssSecret')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, @@ -86,7 +86,7 @@ function New-Secret { [TssSecret]$restResponse } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Protect-Secret.ps1 b/src/functions/secrets/Protect-Secret.ps1 index 53a4c8d7..9c931335 100644 --- a/src/functions/secrets/Protect-Secret.ps1 +++ b/src/functions/secrets/Protect-Secret.ps1 @@ -27,13 +27,13 @@ function Protect-Secret { [cmdletbinding()] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Folder Id to modify - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id, @@ -94,7 +94,7 @@ function Protect-Secret { } if ($protectParams.ContainsKey('IncludeInactive')) { - $protectBody.Add('includeInactive',[boolean]$IncludeInactive) + $protectBody.Add('includeInactive', [boolean]$IncludeInactive) } $invokeParams.Body = $protectBody | ConvertTo-Json @@ -123,7 +123,7 @@ function Protect-Secret { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Remove-Secret.ps1 b/src/functions/secrets/Remove-Secret.ps1 index c23708c6..fffc33bd 100644 --- a/src/functions/secrets/Remove-Secret.ps1 +++ b/src/functions/secrets/Remove-Secret.ps1 @@ -25,13 +25,13 @@ function Remove-Secret { [OutputType('TssDelete')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID to disable (mark inactive) - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id ) @@ -45,7 +45,7 @@ function Remove-Secret { if ($tssParams.ContainsKey('TssSession') -and $TssSession.IsValidSession()) { . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation foreach ($secret in $Id) { - $uri = $TssSession.ApiUrl, "secrets", $secret -join '/' + $uri = $TssSession.ApiUrl, 'secrets', $secret -join '/' $invokeParams.Uri = $Uri @@ -66,7 +66,7 @@ function Remove-Secret { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Restore-Secret.ps1 b/src/functions/secrets/Restore-Secret.ps1 index fa9d7db5..929ab8f7 100644 --- a/src/functions/secrets/Restore-Secret.ps1 +++ b/src/functions/secrets/Restore-Secret.ps1 @@ -24,13 +24,13 @@ function Restore-Secret { [cmdletbinding(SupportsShouldProcess)] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Folder Id to modify - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id ) @@ -63,7 +63,7 @@ function Restore-Secret { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Revoke-Secret.ps1 b/src/functions/secrets/Revoke-Secret.ps1 index 75700a9e..44edee84 100644 --- a/src/functions/secrets/Revoke-Secret.ps1 +++ b/src/functions/secrets/Revoke-Secret.ps1 @@ -25,13 +25,13 @@ function Revoke-Secret { [OutputType('TssDelete')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id, @@ -98,13 +98,13 @@ function Revoke-Secret { 'TicketSystemId' { $expireBody.Add('ticketSystemId', $TicketSystemId) } 'DoublelockPassword' { $passwd = [Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($DoublelockPassword)) - $expireBody.Add('doubleLockPassword',$passwd) + $expireBody.Add('doubleLockPassword', $passwd) } } } $invokeParams.Body = $expireBody | ConvertTo-Json - if (-not $PSCmdlet.ShouldProcess($secret,"$($invokeParams.Method) $uri with:`t$($invokeParams.Body)`n")) { return } + if (-not $PSCmdlet.ShouldProcess($secret, "$($invokeParams.Method) $uri with:`t$($invokeParams.Body)`n")) { return } Write-Verbose "Performing the operation $($invokeParams.Method) $uri with:`t$($invokeParams.Body)`n" try { $restResponse = . $InvokeApi @invokeParams @@ -119,7 +119,7 @@ function Revoke-Secret { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Search-Secret.ps1 b/src/functions/secrets/Search-Secret.ps1 index 57fe7a18..ffd90677 100644 --- a/src/functions/secrets/Search-Secret.ps1 +++ b/src/functions/secrets/Search-Secret.ps1 @@ -51,139 +51,139 @@ function Search-Secret { .NOTES Requires TssSession object returned by New-TssSession #> - [cmdletbinding(DefaultParameterSetName = "filter")] + [cmdletbinding(DefaultParameterSetName = 'filter')] [OutputType('TssSecretSummary')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Return only secrets within a certain folder - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "folder")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'folder')] [int] $FolderId, # Include secrets in subfolders of the specified FolderId - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "folder")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'folder')] [Alias('IncludeSubFolder')] [switch] $IncludeSubFolders, # Field to filter on - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [string] $Field, # Text of the field to filter on - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [Alias('SecretName')] [string] $SearchText, # Match the exact text of the SearchText - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [switch] $ExactMatch, # Field-slug to search # This overrides the Field filter - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [string] $FieldSlug, # Secret Template fields to return # Only exposed fields can be returned - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [Alias('ExtendedFields')] [string[]] $ExtendedField, # Return only secrets matching a certain extended type - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "field")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'field')] [int] $ExtendedTypeId, # Return only secrets matching a certain template - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [Alias('TemplateId')] [int] $SecretTemplateId, # Return only secrets within a certain site - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [int] $SiteId, # Return only secrets with a certain heartbeat status - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] - [ValidateSet('Failed','Success','Pending','Disabled','UnableToConnect','UnknownError','IncompatibleHost','AccountLockedOut','DnsMismatch','UnableToValidateServerPublicKey','Processing','ArgumentError','AccessDenied')] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] + [ValidateSet('Failed', 'Success', 'Pending', 'Disabled', 'UnableToConnect', 'UnknownError', 'IncompatibleHost', 'AccountLockedOut', 'DnsMismatch', 'UnableToValidateServerPublicKey', 'Processing', 'ArgumentError', 'AccessDenied')] [string] $HeartbeatStatus, # Include inactive/disabled secrets - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [switch] $IncludeInactive, # Exclude active secrets - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [switch] $ExcludeActive, # Secrets where template has RPC Enabled - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [switch] $RpcEnabled, # Secrets where you are not the owner and secret is explicitly shared with your user - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [switch] $SharedWithMe, # Secrets matching certain password types - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [int[]] $PasswordTypeIds, # Filter based on permission (List, View, Edit or Owner) - [Parameter(ParameterSetName = "filter")] - [ValidateSet('List','View','Edit','Owner')] + [Parameter(ParameterSetName = 'filter')] + [ValidateSet('List', 'View', 'Edit', 'Owner')] [string] $Permission, # Filter All Secrets, Recent or Favorites - [Parameter(ParameterSetName = "filter")] - [ValidateSet('All','Recent','Favorites')] + [Parameter(ParameterSetName = 'filter')] + [ValidateSet('All', 'Recent', 'Favorites')] [string] $Scope, # Exclude DoubleLocks from search results - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [Alias('ExcludeDoubleLocks')] [switch] $ExcludeDoubleLock, # Include only secrets with a specific DoubleLock ID assigned - [Parameter(ParameterSetName = "filter")] - [Parameter(ParameterSetName = "secret")] + [Parameter(ParameterSetName = 'filter')] + [Parameter(ParameterSetName = 'secret')] [int] $DoubleLockId, @@ -202,7 +202,7 @@ function Search-Secret { . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation $uri = $TssSession.ApiUrl, 'secrets' -join '/' $uri += "?sortBy[0].direction=asc&sortBy[0].name=$SortBy&take=$($TssSession.Take)" - $uri += "&filter.includeRestricted=true" + $uri += '&filter.includeRestricted=true' $filters = @() switch ($tssParams.Keys) { @@ -230,17 +230,17 @@ function Search-Secret { } 'Permission' { $filters += switch ($tssParams['Permission']) { - 'List' { "filter.permissionRequired=1" } - 'View' { "filter.permissionRequired=2" } - 'Edit' { "filter.permissionRequired=3" } - 'Owner' { "filter.permissionRequired=4" } + 'List' { 'filter.permissionRequired=1' } + 'View' { 'filter.permissionRequired=2' } + 'Edit' { 'filter.permissionRequired=3' } + 'Owner' { 'filter.permissionRequired=4' } } } 'Scope' { $filters += switch ($tssParams['Scope']) { - 'All' { "filter.scope=1" } - 'Recent' { "filter.scope=2" } - 'Favorite' { "filter.scope=3" } + 'All' { 'filter.scope=1' } + 'Recent' { 'filter.scope=2' } + 'Favorite' { 'filter.scope=3' } } } 'RpcEnabled' { @@ -256,7 +256,7 @@ function Search-Secret { $filters += "filter.includeActive=$($tssParams['ExcludeActive'])" } default { - if ($_ -in 'Verbose','TssSession','Raw') { continue } else { + if ($_ -in 'Verbose', 'TssSession', 'Raw') { continue } else { $filters += "filter.$($_)=$($tssParams[$_])" } } @@ -275,13 +275,13 @@ function Search-Secret { try { $restResponse = . $InvokeApi @invokeParams } catch { - Write-Warning "Issue on search request" + Write-Warning 'Issue on search request' $err = $_ . $ErrorHandling $err } if ($restResponse.records.Count -le 0 -and $restResponse.records.Length -eq 0) { - Write-Warning "No secrets found" + Write-Warning 'No secrets found' } if ($restResponse.records) { @@ -300,7 +300,7 @@ function Search-Secret { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Set-SecretExpiration.ps1 b/src/functions/secrets/Set-SecretExpiration.ps1 index cee3d64f..44495eee 100644 --- a/src/functions/secrets/Set-SecretExpiration.ps1 +++ b/src/functions/secrets/Set-SecretExpiration.ps1 @@ -36,13 +36,13 @@ function Set-SecretExpiration { [cmdletbinding(SupportsShouldProcess, DefaultParameterSetName = 'all')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Folder Id to modify - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id, @@ -82,7 +82,7 @@ function Set-SecretExpiration { dirty = $true value = 'Template' } - $setExpirationBody.data.Add('expirationType',$type) + $setExpirationBody.data.Add('expirationType', $type) } if ($setParams.ContainsKey('Interval')) { $type = @{ @@ -93,8 +93,8 @@ function Set-SecretExpiration { dirty = $true value = $Interval } - $setExpirationBody.data.Add('expirationType',$type) - $setExpirationBody.data.Add('expirationDayInterval',$dayInterval) + $setExpirationBody.data.Add('expirationType', $type) + $setExpirationBody.data.Add('expirationDayInterval', $dayInterval) } if ($setParams.ContainsKey('DateExpiration')) { $type = @{ @@ -105,8 +105,8 @@ function Set-SecretExpiration { dirty = $true value = $DateExpiration.ToShortDateString() } - $setExpirationBody.data.Add('expirationType',$type) - $setExpirationBody.data.Add('expirationDate',$expDate) + $setExpirationBody.data.Add('expirationType', $type) + $setExpirationBody.data.Add('expirationDate', $expDate) } $invokeParams.Body = $setExpirationBody | ConvertTo-Json @@ -134,7 +134,7 @@ function Set-SecretExpiration { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Set-SecretField.ps1 b/src/functions/secrets/Set-SecretField.ps1 index 4043307f..5ebbbd25 100644 --- a/src/functions/secrets/Set-SecretField.ps1 +++ b/src/functions/secrets/Set-SecretField.ps1 @@ -55,13 +55,13 @@ function Set-SecretField { [cmdletbinding(SupportsShouldProcess, DefaultParameterSetName = 'default')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Folder Id to modify - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id, @@ -131,40 +131,40 @@ function Set-SecretField { . $CheckVersion $TssSession '10.9.0000' $PSCmdlet.MyInvocation if ($setParams.ContainsKey('Clear') -and $setParams.ContainsKey('Value')) { - Write-Warning "Clear and Value provided, only one is supported" + Write-Warning 'Clear and Value provided, only one is supported' return } if ($setParams.ContainsKey('Filename') -and $setParams.ContainsKey('Path')) { - Write-Warning "Filename and Path provided, only one is supported" + Write-Warning 'Filename and Path provided, only one is supported' return } if ($setParams.ContainsKey('Filename') -and -not $setParams.ContainsKey('Value')) { - Write-Warning "Value must be provided when using Filename" + Write-Warning 'Value must be provided when using Filename' return } foreach ($secret in $Id) { $fieldBody = @{} if ($setParams.ContainsKey('Clear')) { - $fieldBody.Add('value',"") + $fieldBody.Add('value', '') } if ($setParams.ContainsKey('Value') -and -not $setParams.ContainsKey('Filename')) { - $fieldBody.Add('value',$Value) + $fieldBody.Add('value', $Value) } if ($setParams.ContainsKey('Path')) { $pathFilename = Split-Path $Path -Leaf - $fieldBody.Add('fileName',$pathFilename) + $fieldBody.Add('fileName', $pathFilename) $fileBinary = [IO.File]::ReadAllBytes($Path) - $fieldBody.Add('fileAttachment',$fileBinary) + $fieldBody.Add('fileAttachment', $fileBinary) } if ($setParams.ContainsKey('Filename') -and $setParams.ContainsKey('Value')) { - $fieldBody.Add('fileName',$Filename) + $fieldBody.Add('fileName', $Filename) $fileBinary = [System.Text.Encoding]::UTF8.GetBytes($Value) - $fieldBody.Add('fileAttachment',$fileBinary) + $fieldBody.Add('fileAttachment', $fileBinary) } if ($restrictedParams.Count -gt 0) { @@ -201,7 +201,7 @@ function Set-SecretField { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Set-SecretRpcAssociated.ps1 b/src/functions/secrets/Set-SecretRpcAssociated.ps1 index ef9af064..5d9381e7 100644 --- a/src/functions/secrets/Set-SecretRpcAssociated.ps1 +++ b/src/functions/secrets/Set-SecretRpcAssociated.ps1 @@ -33,18 +33,18 @@ function Set-SecretRpcAssociated { [cmdletbinding(SupportsShouldProcess, DefaultParameterSetName = 'all')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("ParentSecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('ParentSecretId')] [int[]] $Id, # Secret IDs to Associate - [Parameter(Mandatory,ValueFromRemainingArguments)] + [Parameter(Mandatory, ValueFromRemainingArguments)] [int[]] $AssociatedSecretId ) @@ -92,7 +92,7 @@ function Set-SecretRpcAssociated { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Set-SecretRpcPrivileged.ps1 b/src/functions/secrets/Set-SecretRpcPrivileged.ps1 index d17caed7..eafb9cdc 100644 --- a/src/functions/secrets/Set-SecretRpcPrivileged.ps1 +++ b/src/functions/secrets/Set-SecretRpcPrivileged.ps1 @@ -30,13 +30,13 @@ function Set-SecretRpcPrivileged { [cmdletbinding(SupportsShouldProcess, DefaultParameterSetName = 'all')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Folder Id to modify - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id, @@ -62,7 +62,7 @@ function Set-SecretRpcPrivileged { . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation foreach ($secret in $Id) { $restResponse = $null - $uri = $TssSession.ApiUrl.Replace('api/v1','internals'), 'secret-detail', $secret, 'rpc' -join '/' + $uri = $TssSession.ApiUrl.Replace('api/v1', 'internals'), 'secret-detail', $secret, 'rpc' -join '/' $invokeParams.Uri = $uri $invokeParams.Method = 'PUT' @@ -77,8 +77,8 @@ function Set-SecretRpcPrivileged { dirty = $true value = $null } - $setRpcPrivBody.data.Add('changePasswordUsing',$changeUsing) - $setRpcPrivBody.data.Add('privilegedAccountSecretId',$privilegedAccount) + $setRpcPrivBody.data.Add('changePasswordUsing', $changeUsing) + $setRpcPrivBody.data.Add('privilegedAccountSecretId', $privilegedAccount) } if ($setParams.ContainsKey('PrivilegedSecretId')) { $changeUsing = @{ @@ -89,8 +89,8 @@ function Set-SecretRpcPrivileged { dirty = $true value = $PrivilegedSecretId } - $setRpcPrivBody.data.Add('changePasswordUsing',$changeUsing) - $setRpcPrivBody.data.Add('privilegedAccountSecretId',$privilegedAccount) + $setRpcPrivBody.data.Add('changePasswordUsing', $changeUsing) + $setRpcPrivBody.data.Add('privilegedAccountSecretId', $privilegedAccount) } $invokeParams.Body = $setRpcPrivBody | ConvertTo-Json @@ -115,7 +115,7 @@ function Set-SecretRpcPrivileged { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Set-SecretSecurity.ps1 b/src/functions/secrets/Set-SecretSecurity.ps1 index fea47932..48a72a7e 100644 --- a/src/functions/secrets/Set-SecretSecurity.ps1 +++ b/src/functions/secrets/Set-SecretSecurity.ps1 @@ -24,13 +24,13 @@ function Set-SecretSecurity { [cmdletbinding(SupportsShouldProcess, DefaultParameterSetName = 'all')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Folder Id to modify - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id, @@ -170,7 +170,7 @@ function Set-SecretSecurity { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Start-SecretChangePassword.ps1 b/src/functions/secrets/Start-SecretChangePassword.ps1 index 54d88d2d..647fe50c 100644 --- a/src/functions/secrets/Start-SecretChangePassword.ps1 +++ b/src/functions/secrets/Start-SecretChangePassword.ps1 @@ -24,19 +24,19 @@ function Start-SecretChangePassword { [CmdletBinding(SupportsShouldProcess)] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret Id - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id, # Next Password Type, allowed Manual or Random [Parameter(Mandatory)] - [ValidateSet('Manual','Random')] + [ValidateSet('Manual', 'Random')] [string] $Type, @@ -56,7 +56,7 @@ function Start-SecretChangePassword { . $CheckVersion $TssSession '10.9.000000' $PSCmdlet.MyInvocation foreach ($secret in $Id) { $restResponse = $null - $uri = $TssSession.ApiUrl.Replace('api/v1','internals'), 'secret-detail', $secret, 'change-password-now' -join '/' + $uri = $TssSession.ApiUrl.Replace('api/v1', 'internals'), 'secret-detail', $secret, 'change-password-now' -join '/' $invokeParams.Uri = $uri $invokeParams.Method = 'POST' @@ -64,26 +64,26 @@ function Start-SecretChangePassword { switch ($Type) { 'Manual' { if ($tssParams.ContainsKey('NextPassword')) { - $rpcBody.data.Add('NextPassword',[Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($NextPassword))) - $rpcBody.data.Add('PasswordType',1) + $rpcBody.data.Add('NextPassword', [Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($NextPassword))) + $rpcBody.data.Add('PasswordType', 1) } else { - Write-Error "-NextPassword parameter must be provided when using PasswordType of [Manual]" + Write-Error '-NextPassword parameter must be provided when using PasswordType of [Manual]' return } } 'Random' { if ($tssParams.ContainsKey('NextPassword')) { - Write-Error "-NextPassword parameter cannot be used with PasswordType of [Random]" + Write-Error '-NextPassword parameter cannot be used with PasswordType of [Random]' return } else { - $rpcBody.data.Add('NextPassword',$null) - $rpcBody.data.Add('PasswordType',0) + $rpcBody.data.Add('NextPassword', $null) + $rpcBody.data.Add('PasswordType', 0) } } } $invokeParams.Body = $rpcBody | ConvertTo-Json - if (-not $PSCmdlet.ShouldProcess("Secret ID: $secret","$($invokeParamsOther.Method) $uri with:`t$($invokeParamsOther.Body)`n")) { return } + if (-not $PSCmdlet.ShouldProcess("Secret ID: $secret", "$($invokeParamsOther.Method) $uri with:`t$($invokeParamsOther.Body)`n")) { return } Write-Verbose "$($invokeParamsOther.Method) $uri with:`t$($invokeParamsOther.Body)`n" try { $restResponse = . $InvokeApi @invokeParams @@ -99,7 +99,7 @@ function Start-SecretChangePassword { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Start-SecretHeartbeat.ps1 b/src/functions/secrets/Start-SecretHeartbeat.ps1 index d0b3a80d..f7903b2f 100644 --- a/src/functions/secrets/Start-SecretHeartbeat.ps1 +++ b/src/functions/secrets/Start-SecretHeartbeat.ps1 @@ -24,13 +24,13 @@ function Start-SecretHeartbeat { [CmdletBinding(SupportsShouldProcess)] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret Id - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id ) @@ -49,7 +49,7 @@ function Start-SecretHeartbeat { $invokeParams.Uri = $uri $invokeParams.Method = 'POST' - if (-not $PSCmdlet.ShouldProcess("Secret ID: $secret","$($invokeParamsOther.Method) $uri")) { return } + if (-not $PSCmdlet.ShouldProcess("Secret ID: $secret", "$($invokeParamsOther.Method) $uri")) { return } Write-Verbose "$($invokeParamsOther.Method) $uri" try { $restResponse = . $InvokeApi @invokeParams @@ -63,7 +63,7 @@ function Start-SecretHeartbeat { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Stop-SecretChangePassword.ps1 b/src/functions/secrets/Stop-SecretChangePassword.ps1 index 719a830e..ddef8db6 100644 --- a/src/functions/secrets/Stop-SecretChangePassword.ps1 +++ b/src/functions/secrets/Stop-SecretChangePassword.ps1 @@ -24,13 +24,13 @@ function Stop-SecretChangePassword { [CmdletBinding(SupportsShouldProcess)] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret Id - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("SecretId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('SecretId')] [int[]] $Id ) @@ -67,7 +67,7 @@ function Stop-SecretChangePassword { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/secrets/Update-Secret.ps1 b/src/functions/secrets/Update-Secret.ps1 index f7f20038..140b83e2 100644 --- a/src/functions/secrets/Update-Secret.ps1 +++ b/src/functions/secrets/Update-Secret.ps1 @@ -27,7 +27,7 @@ function Update-Secret { [OutputType('TssSecret')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, @@ -104,7 +104,7 @@ function Update-Secret { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Disable-User.ps1 b/src/functions/users/Disable-User.ps1 index 571bfffa..c2981e8d 100644 --- a/src/functions/users/Disable-User.ps1 +++ b/src/functions/users/Disable-User.ps1 @@ -24,13 +24,13 @@ function Disable-User { [CmdletBinding(SupportsShouldProcess)] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # User Id - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("UserId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('UserId')] [int[]] $Id ) @@ -72,7 +72,7 @@ function Disable-User { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Enable-User.ps1 b/src/functions/users/Enable-User.ps1 index 4b11fb22..3da02567 100644 --- a/src/functions/users/Enable-User.ps1 +++ b/src/functions/users/Enable-User.ps1 @@ -24,13 +24,13 @@ function Enable-User { [CmdletBinding(SupportsShouldProcess)] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # User Id - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("UserId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('UserId')] [int[]] $Id ) @@ -72,7 +72,7 @@ function Enable-User { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Find-User.ps1 b/src/functions/users/Find-User.ps1 index aa978924..aeadc0d8 100644 --- a/src/functions/users/Find-User.ps1 +++ b/src/functions/users/Find-User.ps1 @@ -31,12 +31,12 @@ function Find-User { [OutputType('TssUserLookup')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Filter users by Active Directory Domain - [Alias("Domain")] + [Alias('Domain')] [int] $DomainId, @@ -94,26 +94,26 @@ function Find-User { try { $restResponse = . $InvokeApi @invokeParams } catch { - Write-Warning "Issue on Find request" + Write-Warning 'Issue on Find request' $err = $_ . $ErrorHandling $err } if ($restResponse.records.Count -le 0 -and $restResponse.records.Length -eq 0) { - Write-Warning "No Users found" + Write-Warning 'No Users found' } if ($restResponse.records) { foreach ($user in $restResponse.records) { - $parsedValue = $user.value.Split('-',2).Trim() + $parsedValue = $user.value.Split('-', 2).Trim() [TssUserLookup]@{ - Id = $user.id + Id = $user.id Username = $parsedValue[0] - Email = $parsedValue[1] + Email = $parsedValue[1] } } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Get-User.ps1 b/src/functions/users/Get-User.ps1 index e14b7d88..8d8d3ece 100644 --- a/src/functions/users/Get-User.ps1 +++ b/src/functions/users/Get-User.ps1 @@ -25,13 +25,13 @@ function Get-User { [OutputType('TssUser')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # User ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("UserId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('UserId')] [int[]] $Id, @@ -85,7 +85,7 @@ function Get-User { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Get-UserAudit.ps1 b/src/functions/users/Get-UserAudit.ps1 index 0cbd8d32..76203bcc 100644 --- a/src/functions/users/Get-UserAudit.ps1 +++ b/src/functions/users/Get-UserAudit.ps1 @@ -25,13 +25,13 @@ function Get-UserAudit { [OutputType('TssUserAuditSummary')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("Id")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('Id')] [int[]] $UserId ) @@ -66,7 +66,7 @@ function Get-UserAudit { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Get-UserRole.ps1 b/src/functions/users/Get-UserRole.ps1 index 30699226..d5690c29 100644 --- a/src/functions/users/Get-UserRole.ps1 +++ b/src/functions/users/Get-UserRole.ps1 @@ -25,13 +25,13 @@ function Get-UserRole { [OutputType('TssRoleSummary')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Secret ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("UserId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('UserId')] [int[]] $Id ) @@ -68,7 +68,7 @@ function Get-UserRole { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Get-UserRoleAssigned.ps1 b/src/functions/users/Get-UserRoleAssigned.ps1 index e7e59658..10e539a6 100644 --- a/src/functions/users/Get-UserRoleAssigned.ps1 +++ b/src/functions/users/Get-UserRoleAssigned.ps1 @@ -26,13 +26,13 @@ function Get-UserRoleAssigned { [OutputType('TssUserRoleSummary')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # User ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("Id")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('Id')] [int[]] $UserId ) @@ -66,7 +66,7 @@ function Get-UserRoleAssigned { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Lock-User.ps1 b/src/functions/users/Lock-User.ps1 index fd992af4..bf6c762e 100644 --- a/src/functions/users/Lock-User.ps1 +++ b/src/functions/users/Lock-User.ps1 @@ -24,13 +24,13 @@ function Lock-User { [CmdletBinding(SupportsShouldProcess)] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # User Id - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("UserId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('UserId')] [int[]] $Id ) @@ -72,7 +72,7 @@ function Lock-User { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/New-User.ps1 b/src/functions/users/New-User.ps1 index 942ada4c..2c073491 100644 --- a/src/functions/users/New-User.ps1 +++ b/src/functions/users/New-User.ps1 @@ -31,17 +31,17 @@ function New-User { [OutputType('TssUser')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Username - [Parameter(Mandatory,ValueFromPipeline)] + [Parameter(Mandatory, ValueFromPipeline)] [string] $Username, # Display Name - [Parameter(Mandatory,ValueFromPipeline)] + [Parameter(Mandatory, ValueFromPipeline)] [string] $DisplayName, @@ -63,12 +63,12 @@ function New-User { $EmailAddress, # Active Directory Domain ID - [ValidateRange(-1,[int]::MaxValue)] + [ValidateRange(-1, [int]::MaxValue)] [int] $DomainId, # Active Directory GUID - [ValidateLength(36,50)] + [ValidateLength(36, 50)] [string] $AdGuid, @@ -96,35 +96,35 @@ function New-User { $newBody = [ordered]@{} switch ($tssNewParams.Keys) { - 'Username' { $newBody.Add('userName',$Username) } - 'DisplayName' { $newBody.Add('displayName',$DisplayName) } + 'Username' { $newBody.Add('userName', $Username) } + 'DisplayName' { $newBody.Add('displayName', $DisplayName) } 'Password' { $passwd = [Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($Password)) - $newBody.Add('password',$passwd) + $newBody.Add('password', $passwd) } - 'Active' { $newBody.Add('enabled',[boolean]$Active) } - 'IsApplicationAccount' { $newBody.Add('isApplicationAccount',[boolean]$IsApplicationAccount) } - 'EmailAddress' { $newBody.Add('emailAddress',$EmailAddress) } - 'DomainId' { $newBody.Add('domainId',$DomainId) } - 'AdGuid' { $newBody.Add('adGuid',$AdGuid) } + 'Active' { $newBody.Add('enabled', [boolean]$Active) } + 'IsApplicationAccount' { $newBody.Add('isApplicationAccount', [boolean]$IsApplicationAccount) } + 'EmailAddress' { $newBody.Add('emailAddress', $EmailAddress) } + 'DomainId' { $newBody.Add('domainId', $DomainId) } + 'AdGuid' { $newBody.Add('adGuid', $AdGuid) } 'TwoFactorType' { if ($TwoFactorType -eq 'RADIUS' -and -not $tssNewParams.ContainsKey('RadiusUsername')) { Write-Warning 'Radius Username is required to create a user with RADIUS 2FA' return } - $newBody.Add('radiusTwoFactor',$true) - $newBody.Add('radiusUserName',$RadiusUsername) + $newBody.Add('radiusTwoFactor', $true) + $newBody.Add('radiusUserName', $RadiusUsername) } } $invokeParams.Body = ($newBody | ConvertTo-Json) Write-Verbose "Performing the operation $($invokeParams.Method) $uri with:`n $newBody" - if (-not $PSCmdlet.ShouldProcess("", "$($invokeParams.Method) $uri with $($invokeParams.Body)")) { return } + if (-not $PSCmdlet.ShouldProcess('', "$($invokeParams.Method) $uri with $($invokeParams.Body)")) { return } try { $restResponse = . $InvokeApi @invokeParams } catch { - Write-Warning "Issue creating report [User]" + Write-Warning 'Issue creating report [User]' $err = $_ . $ErrorHandling $err } @@ -133,7 +133,7 @@ function New-User { [TssUser]$restResponse } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Reset-UserPassword.ps1 b/src/functions/users/Reset-UserPassword.ps1 index 54f0ce7c..df7943e2 100644 --- a/src/functions/users/Reset-UserPassword.ps1 +++ b/src/functions/users/Reset-UserPassword.ps1 @@ -24,13 +24,13 @@ function Reset-UserPassword { [cmdletbinding(SupportsShouldProcess, DefaultParameterSetName = 'all')] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # User ID - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("UserId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('UserId')] [int[]] $Id, @@ -78,7 +78,7 @@ function Reset-UserPassword { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Search-User.ps1 b/src/functions/users/Search-User.ps1 index 4a49ad0e..7bb52fdd 100644 --- a/src/functions/users/Search-User.ps1 +++ b/src/functions/users/Search-User.ps1 @@ -31,12 +31,12 @@ function Search-User { [OutputType('TssUserSummary')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Filter users by Active Directory Domain - [Alias("Domain")] + [Alias('Domain')] [int] $DomainId, @@ -94,19 +94,19 @@ function Search-User { try { $restResponse = . $InvokeApi @invokeParams } catch { - Write-Warning "Issue on search request" + Write-Warning 'Issue on search request' $err = $_ . $ErrorHandling $err } if ($restResponse.records.Count -le 0 -and $restResponse.records.Length -eq 0) { - Write-Warning "No Users found" + Write-Warning 'No Users found' } if ($restResponse.records) { [TssUserSummary[]]$restResponse.records } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Show-CurrentUser.ps1 b/src/functions/users/Show-CurrentUser.ps1 index 6a8909a2..3778fc18 100644 --- a/src/functions/users/Show-CurrentUser.ps1 +++ b/src/functions/users/Show-CurrentUser.ps1 @@ -32,7 +32,7 @@ function Show-CurrentUser { [OutputType('TssCurrentUser')] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession ) @@ -54,7 +54,7 @@ function Show-CurrentUser { try { $restResponse = . $InvokeApi @invokeParams } catch { - Write-Warning "Issue getting current user" + Write-Warning 'Issue getting current user' $err = $_ . $ErrorHandling $err } @@ -63,7 +63,7 @@ function Show-CurrentUser { [TssCurrentUser]$restResponse } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Unlock-User.ps1 b/src/functions/users/Unlock-User.ps1 index 98b2b046..1e719aca 100644 --- a/src/functions/users/Unlock-User.ps1 +++ b/src/functions/users/Unlock-User.ps1 @@ -24,13 +24,13 @@ function Unlock-User { [CmdletBinding(SupportsShouldProcess)] param ( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # User Id - [Parameter(Mandatory,ValueFromPipelineByPropertyName)] - [Alias("UserId")] + [Parameter(Mandatory, ValueFromPipelineByPropertyName)] + [Alias('UserId')] [int[]] $Id ) @@ -72,7 +72,7 @@ function Unlock-User { } } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file diff --git a/src/functions/users/Update-UserPassword.ps1 b/src/functions/users/Update-UserPassword.ps1 index e326b532..c33e1d41 100644 --- a/src/functions/users/Update-UserPassword.ps1 +++ b/src/functions/users/Update-UserPassword.ps1 @@ -24,16 +24,16 @@ function Update-UserPassword { [cmdletbinding(SupportsShouldProcess)] param( # TssSession object created by New-TssSession for auth - [Parameter(Mandatory,ValueFromPipeline,Position = 0)] + [Parameter(Mandatory, ValueFromPipeline, Position = 0)] [TssSession] $TssSession, # Current password - [Parameter(Mandatory,Position = 1)] + [Parameter(Mandatory, Position = 1)] [securestring] $Current, - [Parameter(Mandatory,Position = 2)] + [Parameter(Mandatory, Position = 2)] # New password to update [securestring] $New @@ -53,28 +53,28 @@ function Update-UserPassword { $changePwdBody = @{ currentPassword = [Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($Current)) - newPassword = [Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($New)) + newPassword = [Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($New)) } $invokeParams.Body = $changePwdBody | ConvertTo-Json - if ($PSCmdlet.ShouldProcess("Updating Password", "$($invokeParams.Method) $uri with:`n$($invokeParams.Body)`n")) { + if ($PSCmdlet.ShouldProcess('Updating Password', "$($invokeParams.Method) $uri with:`n$($invokeParams.Body)`n")) { Write-Verbose "Performing the operation $($invokeParams.Method) $uri with:`n$($invokeParams.Body)`n" try { $restResponse = . $InvokeApi @invokeParams } catch { - Write-Warning "Issue updating password for current user" + Write-Warning 'Issue updating password for current user' $err = $_ . $ErrorHandling $err } } if ($restResponse) { - Write-Verbose "Password updated successfully" + Write-Verbose 'Password updated successfully' $TssSession.SessionExpire() >$null } else { - Write-Warning "Password was not updated successfully, see previous errors" + Write-Warning 'Password was not updated successfully, see previous errors' } } else { - Write-Warning "No valid session found" + Write-Warning 'No valid session found' } } } \ No newline at end of file