PsModuleBase.psm1

#!/usr/bin/env pwsh
using namespace System.IO
using namespace System.Text
using namespace system.reflection
using namespace System.ComponentModel
using namespace System.Collections.Generic
using namespace System.Security.Cryptography
using namespace System.Management.Automation
using namespace Microsoft.PowerShell.Commands
using namespace System.Runtime.InteropServices
using namespace System.Collections.ObjectModel
using namespace System.Security.Cryptography.X509Certificates

#region Classes
enum ModuleSource {
  LocalMachine
  PsGallery
}
enum InstallScope {
  LocalMachine # i.e: AllUsers
  CurrentUser
}

enum ModuleItemType {
  File
  Directory
}

class SearchParams {
  [bool] $SkipDefaults = $true
  [string[]] $PropstoExclude
  [string[]] $PropstoInclude
  [SearchOption] $searchOption
  hidden [string[]]$Values
  [int]$MaxDepth = 10
}

class ModuleItem {
  [ValidateNotNullOrWhiteSpace()][string]$Name
  [string[]]$Attributes = @()
  [FileSystemInfo]$value
  static [ReadOnlyCollection[string]]$DefaultNames = [ModuleItem]::GetDefaultNames()

  ModuleItem([string]$name, $value) {
    $this.Name = $name; $this.value = $value
    $this.PsObject.properties.add([PsScriptProperty]::new('Exists', { return Test-Path -Path $this.value.FullName -ea Ignore }, { throw [SetValueException]::new('Exists is read-only') }))
    if ($name -in [ModuleItem]::DefaultNames) {
      $this.Attributes += "ManifestKey"
    }
  }
  static [ReadOnlyCollection[string]] GetDefaultNames() {
    # https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/new-modulemanifest#example-5-getting-module-information
    return New-ReadOnlyCollection -list ((Get-Module PsModuleBase -Verbose:$false).PsObject.Properties.Name + 'ModuleVersion')
  }
  [void] hidden _init_([ModuleItemType]$type) {
    if ($type -eq "File") { $this.Attributes += "FileContent" }
    $this.PsObject.properties.add([PsScriptProperty]::new('Type', [scriptblock]::Create("return [ModuleItemType]::$Type"), [scriptblock]::Create("throw [SetValueException]::new('$Type is read-only')") ))
  }
  [string] ToString() { return $this.Name }
}
class ModuleFile : ModuleItem {
  ModuleFile([string]$Name, [string]$value) : base($Name, [FileInfo]::new($value)) { $this._init_("File") }
  ModuleFile([string]$Name, [FileInfo]$value) : base($name, $value) { $this._init_("File") }
}

class ModuleFolder: ModuleItem {
  ModuleFolder([string]$Name, [string]$value): base ($name, [DirectoryInfo]::new($value)) { $this._init_("Directory") }
  ModuleFolder([string]$Name, [DirectoryInfo]$value) : base($name, $value) { $this._init_("Directory") }
}

class PSGalleryItem {
  [string] $Name
  [version] $Version
  [string] $Path
  [string] $Repository
  PSGalleryItem() {}
  PSGalleryItem([hashtable]$map) {
    $map.Keys.ForEach({
        $this.$_ = $map[$_]
      }
    )
  }
}

class PSRepoItem {
  [string] $AdditionalMetadata
  [string] $Author
  [string] $CompanyName
  [string] $Copyright
  [Object[]] $Dependencies
  [string] $Description
  [string] $IconUri
  [hashtable] $Includes
  [object] $InstalledDate
  [uri] $LicenseUri
  [string] $Name
  [string] $PackageManagementProvider
  [version] $PowerShellGetFormatVersion
  [uri] $ProjectUri
  [object] $PublishedDate
  [string] $ReleaseNotes
  [string] $Repository
  [string] $RepositorySourceLocation
  [string[]] $Tags
  [string] $Type
  [object] $UpdatedDate
  [version] $Version
  PSRepoItem() {}
  PSRepoItem([Object]$Object) {
    if ($null -ne $Object) {
      $Object.PsObject.Properties.Name.ForEach({
          $this.$_ = $Object.$_
        }
      )
    }
  }
  [string] ToString() {
    return $this.Name
  }
}

class LocalPsModule : System.Management.Automation.IValidateSetValuesGenerator {
  [ValidateNotNullOrEmpty()][FileInfo]$Psd1
  [ValidateNotNullOrEmpty()][version]$version
  [ValidateNotNullOrWhiteSpace()][string]$Name
  [ValidateNotNullOrEmpty()][IO.DirectoryInfo]$Path
  [bool]$HasVersiondirs = $false
  static hidden [int]$ret = 0
  [bool]$IsReadOnly = $false
  [PsObject]$Info = $null
  [bool]$Exists = $false
  [InstallScope]$Scope

  LocalPsModule() {}
  LocalPsModule([string]$Name) {
    [void][LocalPsModule]::From($Name, $null, $null, [ref]$this)
  }
  LocalPsModule([string]$Name, [string]$scope) {
    [void][LocalPsModule]::From($Name, $scope, $null, [ref]$this)
  }
  LocalPsModule([string]$Name, [version]$version) {
    [void][LocalPsModule]::From($Name, $null, $version, [ref]$this)
  }
  LocalPsModule([string]$Name, [string]$scope, [version]$version) {
    [void][LocalPsModule]::From($Name, $scope, $version, [ref]$this)
  }
  static [LocalPsModule] Create() { return [LocalPsModule]::new() }
  static [LocalPsModule] Create([string]$Name) {
    $o = [LocalPsModule]::new(); return [LocalPsModule]::From($Name, $null, $null, [ref]$o)
  }
  static [LocalPsModule] Create([string]$Name, [string]$scope) {
    $o = [LocalPsModule]::new(); return [LocalPsModule]::From($Name, $scope, $null, [ref]$o)
  }
  static [LocalPsModule] Create([string]$Name, [version]$version) {
    $o = [LocalPsModule]::new(); return [LocalPsModule]::From($Name, $null, $version, [ref]$o)
  }
  static [LocalPsModule] Create([string]$Name, [string]$scope, [version]$version) {
    $o = [LocalPsModule]::new(); return [LocalPsModule]::From($Name, $scope, $version, [ref]$o)
  }
  static hidden [LocalPsModule] From([string]$Name, [string]$scope, [version]$version, [ref]$o) {
    if ($null -eq $o) { throw "reference is null" };
    $m = [LocalPsModule]::Find($Name, $scope, $version);
    if ($null -eq $m) { $m = [LocalPsModule]::new() }
    $o.value.GetType().GetProperties().ForEach({
        $v = $m.$($_.Name)
        if ($null -ne $v) {
          $o.value.$($_.Name) = $v
        }
      }
    )
    return $o.Value
  }
  static [void] Install([string]$Name, [string]$Version) {
    # There are issues with pester 5.4.1 syntax, so I'll keep using -SkipPublisherCheck.
    # https://stackoverflow.com/questions/51508982/pester-sample-script-gets-be-is-not-a-valid-should-operator-on-windows-10-wo
    if ($Version -eq 'latest') {
      Install-Module -Name $Name -SkipPublisherCheck:$($Name -eq 'Pester')
    } else {
      Install-Module -Name $Name -RequiredVersion $Version -SkipPublisherCheck:$($Name -eq 'Pester')
    }
  }
  static [void] Update([string]$Name, [string]$Version) {
    try {
      if ($Version -eq 'latest') {
        Update-Module -Name $Name
      } else {
        Update-Module -Name $Name -RequiredVersion $Version
      }
    } catch {
      if ([LocalPsModule]::ret -lt 1 -and $_.ErrorRecord.Exception.Message -eq "Module '$Name' was not installed by using Install-Module, so it cannot be updated.") {
        Get-Module $Name | Remove-Module -Force -ErrorAction Ignore; [LocalPsModule]::ret++
        [LocalPsModule]::Update($Name, $Version)
      }
    }
  }
  static [LocalPsModule] Find([string]$Name) {
    [ValidateNotNullOrEmpty()][string]$Name = $Name
    if ($Name.Contains([string][Path]::DirectorySeparatorChar)) {
      $rName = [PsModuleBase]::GetResolvedPath($Name)
      $bName = [Path]::GetDirectoryName($rName)
      if ([IO.Directory]::Exists($rName)) {
        return [LocalPsModule]::Find($bName, [IO.Directory]::GetParent($rName))
      }
    }
    return [LocalPsModule]::Find($Name, "", $null)
  }
  static [LocalPsModule] Find([string]$Name, [string]$scope) {
    return [LocalPsModule]::Find($Name, $scope, $null)
  }
  static [LocalPsModule] Find([string]$Name, [version]$version) {
    return [LocalPsModule]::Find($Name, "", $version)
  }
  static [LocalPsModule] Find([string]$Name, [IO.DirectoryInfo]$ModuleBase) {
    [ValidateNotNullOrWhiteSpace()][string]$Name = $Name
    [ValidateNotNullOrEmpty()][IO.DirectoryInfo]$ModuleBase = $ModuleBase
    $result = [LocalPsModule]::new(); $result.Scope = 'LocalMachine'
    $ModulePsd1 = ($ModuleBase.GetFiles().Where({ $_.Name -like "$Name*" -and $_.Extension -eq '.psd1' }))[0]
    if ($null -eq $ModulePsd1) { return $result }
    $result.Info = Read-ModuleData -File $ModulePsd1.FullName
    $result.Name = $ModulePsd1.BaseName
    $result.Psd1 = $ModulePsd1
    $result.Path = if ($result.Psd1.Directory.Name -as [version] -is [version]) { $result.Psd1.Directory.Parent } else { $result.Psd1.Directory }
    $result.Exists = $ModulePsd1.Exists
    $result.Version = $result.Info.ModuleVersion -as [version]
    $result.IsReadOnly = $ModulePsd1.IsReadOnly
    return $result
  }
  static [LocalPsModule] Find([string]$Name, [string]$scope, [version]$version) {
    $Module = $null; [ValidateNotNullOrWhiteSpace()][string]$Name = $Name
    $PsModule_Paths = $([LocalPsModule]::GetModulePaths($(if ([string]::IsNullOrWhiteSpace($scope)) { "LocalMachine" }else { $scope })).ForEach({ [IO.DirectoryInfo]::New("$_") }).Where({ $_.Exists })).GetDirectories().Where({ $_.Name -eq $Name });
    if ($PsModule_Paths.count -gt 0) {
      $Get_versionDir = [scriptblock]::Create('param([IO.DirectoryInfo[]]$direcrory) return ($direcrory | ForEach-Object { $_.GetDirectories() | Where-Object { $_.Name -as [version] -is [version] } })')
      $has_versionDir = $Get_versionDir.Invoke($PsModule_Paths).count -gt 0
      $ModulePsdFiles = $PsModule_Paths.ForEach({
          if ($has_versionDir) {
            [string]$MaxVersion = ($Get_versionDir.Invoke([IO.DirectoryInfo]::New("$_")) | Select-Object @{l = 'version'; e = { $_.BaseName -as [version] } } | Measure-Object -Property version -Maximum).Maximum
            [IO.FileInfo]::New([IO.Path]::Combine("$_", $MaxVersion, $_.BaseName + '.psd1'))
          } else {
            [IO.FileInfo]::New([IO.Path]::Combine("$_", $_.BaseName + '.psd1'))
          }
        }
      ).Where({ $_.Exists })
      $Req_ModulePsd1 = $(if ($null -eq $version) {
          $ModulePsdFiles | Sort-Object -Property version -Descending | Select-Object -First 1
        } else {
          $ModulePsdFiles | Where-Object { $(Read-ModuleData -File $_.FullName -Property ModuleVersion) -eq $version }
        }
      )
      $Module = [LocalPsModule]::Find($Req_ModulePsd1.Name, $Req_ModulePsd1.Directory)
    }
    return $Module
  }
  static [string[]] GetModulePaths() {
    return [LocalPsModule]::GetModulePaths($null)
  }
  static [string[]] GetModulePaths([string]$iscope) {
    [string[]]$_Module_Paths = [Environment]::GetEnvironmentVariable('PSModulePath').Split([IO.Path]::PathSeparator)
    if ([string]::IsNullOrWhiteSpace($iscope)) { return $_Module_Paths }; [InstallScope]$iscope = $iscope
    if (!(Get-Variable -Name IsWindows -ErrorAction Ignore) -or $(Get-Variable IsWindows -ValueOnly)) {
      $psv = Get-Variable PSVersionTable -ValueOnly
      $allUsers_path = Join-Path -Path $env:ProgramFiles -ChildPath $(if ($psv.ContainsKey('PSEdition') -and $psv.PSEdition -eq 'Core') { 'PowerShell' } else { 'WindowsPowerShell' })
      if ("$iScope" -eq 'CurrentUser') { $_Module_Paths = $_Module_Paths.Where({ $_ -notlike "*$($allUsers_path | Split-Path)*" -and $_ -notlike "*$env:SystemRoot*" }) }
    } else {
      $allUsers_path = Split-Path -Path ([Platform]::SelectProductNameForDirectory('SHARED_MODULES')) -Parent
      if ("$iScope" -eq 'CurrentUser') { $_Module_Paths = $_Module_Paths.Where({ $_ -notlike "*$($allUsers_path | Split-Path)*" -and $_ -notlike "*/var/lib/*" }) }
    }
    return $_Module_Paths
  }
  static [string] GetInstallPath([string]$Name, [string]$ReqVersion) {
    $p = [IO.DirectoryInfo][IO.Path]::Combine(
      $(if (!(Get-Variable -Name IsWindows -ErrorAction Ignore) -or $(Get-Variable IsWindows -ValueOnly)) {
          $_versionTable = Get-Variable PSVersionTable -ValueOnly
          $module_folder = if ($_versionTable.ContainsKey('PSEdition') -and $_versionTable.PSEdition -eq 'Core') { 'PowerShell' } else { 'WindowsPowerShell' }
          Join-Path -Path $([System.Environment]::GetFolderPath('MyDocuments')) -ChildPath $module_folder
        } else {
          Split-Path -Path ([System.Management.Automation.Platform]::SelectProductNameForDirectory('USER_MODULES')) -Parent
        }
      ), 'Modules'
    )
    if (![string]::IsNullOrWhiteSpace($ReqVersion)) {
      return [IO.Path]::Combine($p.FullName, $Name, $ReqVersion)
    } else {
      return [IO.Path]::Combine($p.FullName, $Name)
    }
  }
  [string[]] GetValidValues() {
    return ([string[]][LocalPsModule]::GetModulePaths() | Select-Object @{l = 'paths'; e = { [IO.Directory]::EnumerateDirectories($_) } }).paths | Split-Path -Leaf -ea Ignore
  }
  [void] Delete() {
    Remove-Item $this.Path -Recurse -Force -ErrorAction Ignore
  }
}

class PsModuleBase {
  #region Properties & Configuration Management
  static [string] $ConfigFolder
  static [string] $certFolder
  static [hashtable] $config = @{
    CertThumbprint   = ''
    CertFriendlyName = 'PsModuleBase Certificate'
    CertSubject      = ''
  }

  PsModuleBase() {
    # Determine OS-appropriate application data folder
    $appDataPath = [System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::ApplicationData)
    if ((Get-Variable IsLinux).Value -or (Get-Variable IsMacOS).Value) {
      # Use a .config style path on Linux/macOS if preferred, or stick to ApplicationData mapping
      # Example: $appDataPath = [System.IO.Path]::Combine([System.Environment]::GetFolderPath('UserProfile'), '.config')
      # For simplicity, we'll use the .NET mapping provided by ApplicationData for now.
    }

    [PsModuleBase]::ConfigFolder = [System.IO.Path]::Combine($appDataPath, "PowerShell", "PsModuleBase")
    [PsModuleBase]::certFolder = [System.IO.Path]::Combine([PsModuleBase]::ConfigFolder, 'certs')

    # Ensure directories exist
    if (!([System.IO.Directory]::Exists([PsModuleBase]::ConfigFolder))) {
      $null = [System.IO.Directory]::CreateDirectory([PsModuleBase]::ConfigFolder)
    }
    if (!([System.IO.Directory]::Exists([PsModuleBase]::certFolder))) {
      $null = [System.IO.Directory]::CreateDirectory([PsModuleBase]::certFolder)
    }

    # Load configuration if it exists
    $configPath = [System.IO.Path]::Combine([PsModuleBase]::ConfigFolder, 'config.clixml')
    if ([System.IO.File]::Exists($configPath)) {
      $prev_verbose = Get-Variable VerbosePreference -ValueOnly
      $prev_debug = Get-Variable DebugPreference -ValueOnly
      try {
        $VerbosePreference = 'SilentlyContinue'
        $DebugPreference = 'SilentlyContinue'
        [PsModuleBase]::config = Import-Clixml -Path $configPath
      } catch {
        Write-Warning "Failed to load PsModuleBase configuration from '$configPath': $($_.Exception.Message)"
      } finally {
        $VerbosePreference = $prev_verbose
        $DebugPreference = $prev_debug
      }
    }
  }
  static [bool] SaveModuledata([string]$stringsKey, [Object]$value) {
    return $null
  }
  static [bool] ValidadePsd1File([IO.FileInFo]$File) {
    return [PsModuleBase]::ValidadePsd1File($File, $false)
  }
  static [bool] ValidadePsd1File([IO.DirectoryInfo]$Parent) {
    $File = [IO.Path]::Combine($Parent, (Get-Culture).Name, "$([IO.DirectoryInfo]::New($Parent).BaseName).strings.psd1");
    return [PsModuleBase]::ValidadePsd1File($File)
  }
  static [bool] ValidadePsd1File([IO.FileInFo]$File, [bool]$throwOnFailure) {
    $e = [IO.File]::Exists($File.FullName)
    if (!$e -and $throwOnFailure) { throw [IO.FileNotFoundException]::new("File $($File.FullName) was not found. Make sure the module is Installed and try again") }
    $v = $e -and ($File.Extension -eq ".psd1")
    if (!$v -and $throwOnFailure) {
      throw [System.ArgumentException]::new("File '$File' is not valid. Please provide a valid path/to/<modulename>.Strings.psd1", 'Path')
    }
    return $v
  }
  #region IO
  static [Object] ReadModuledata([string]$ModuleName) {
    return [PsModuleBase]::ReadModuledata($ModuleName, '')
  }
  static [Object] ReadModuledata([string]$ModuleName, [string]$key) {
    [ValidateNotNullOrWhiteSpace()][string]$ModuleName = $ModuleName
    $m = (Get-Module $ModuleName -ListAvailable -Verbose:$false).ModuleBase
    $f = [IO.FileInfo]::new([IO.Path]::Combine($m, "en-US", "$ModuleName.strings.psd1"))
    [void][PsModuleBase]::ValidadePsd1File($f, $true)
    $c = [IO.File]::ReadAllText($f.FullName)
    if ([string]::IsNullOrWhiteSpace($c)) { throw [IO.InvalidDataException]::new("File $f") }
    $r = [ScriptBlock]::Create("$c").Invoke()
    if ($null -eq $r) { return $null }
    return (![string]::IsNullOrWhiteSpace($key) ? $r.$key : $r)
  }
  static [string] GetRelativePath([string]$RelativeTo, [string]$Path) {
    # $RelativeTo : The source path the result should be relative to. This path is always considered to be a directory.
    # $Path : The destination path.
    $result = [string]::Empty
    $Drive = $Path -replace "^([^\\/]+:[\\/])?.*", '$1'
    if ($Drive -ne ($RelativeTo -replace "^([^\\/]+:[\\/])?.*", '$1')) {
      Write-Verbose "Paths on different drives"
      return $Path # no commonality, different drive letters on windows
    }
    $RelativeTo = $RelativeTo -replace "^[^\\/]+:[\\/]", [IO.Path]::DirectorySeparatorChar
    $Path = $Path -replace "^[^\\/]+:[\\/]", [IO.Path]::DirectorySeparatorChar
    $RelativeTo = [IO.Path]::GetFullPath($RelativeTo).TrimEnd('\/') -replace "^[^\\/]+:[\\/]", [IO.Path]::DirectorySeparatorChar
    $Path = [IO.Path]::GetFullPath($Path) -replace "^[^\\/]+:[\\/]", [IO.Path]::DirectorySeparatorChar

    $commonLength = 0
    while ($Path[$commonLength] -eq $RelativeTo[$commonLength]) {
      $commonLength++
    }
    if ($commonLength -eq $RelativeTo.Length -and $RelativeTo.Length -eq $Path.Length) {
      Write-Verbose "Equal Paths"
      return "." # The same paths
    }
    if ($commonLength -eq 0) {
      Write-Verbose "Paths on different drives?"
      return $Drive + $Path # no commonality, different drive letters on windows
    }

    Write-Verbose "Common base: $commonLength $($RelativeTo.Substring(0,$commonLength))"
    # In case we matched PART of a name, like C:/Users/Joel and C:/Users/Joe
    while ($commonLength -gt $RelativeTo.Length -and ($RelativeTo[$commonLength] -ne [IO.Path]::DirectorySeparatorChar)) {
      $commonLength--
    }

    Write-Verbose "Common base: $commonLength $($RelativeTo.Substring(0,$commonLength))"
    # create '..' segments for segments past the common on the "$RelativeTo" path
    if ($commonLength -lt $RelativeTo.Length) {
      $result = @('..') * @($RelativeTo.Substring($commonLength).Split([IO.Path]::DirectorySeparatorChar).Where{ $_ }).Length -join ([IO.Path]::DirectorySeparatorChar)
    }
    return (@($result, $Path.Substring($commonLength).TrimStart([IO.Path]::DirectorySeparatorChar)).Where{ $_ } -join ([IO.Path]::DirectorySeparatorChar))
  }
  static [string] GetResolvedPath([string]$Path) {
    return [PsModuleBase]::GetResolvedPath($((Get-Variable ExecutionContext).Value.SessionState), $Path)
  }
  static [string] GetResolvedPath([System.Management.Automation.SessionState]$session, [string]$Path) {
    $paths = $session.Path.GetResolvedPSPathFromPSPath($Path);
    if ($paths.Count -gt 1) {
      throw [IOException]::new([string]::Format([cultureinfo]::InvariantCulture, "Path {0} is ambiguous", $Path))
    } elseif ($paths.Count -lt 1) {
      throw [IOException]::new([string]::Format([cultureinfo]::InvariantCulture, "Path {0} not Found", $Path))
    }
    return $paths[0].Path
  }
  static [string] GetUnResolvedPath([string]$Path) {
    return [PsModuleBase]::GetunResolvedPath($((Get-Variable ExecutionContext).Value.SessionState), $Path)
  }
  static [string] GetUnResolvedPath([SessionState]$session, [string]$Path) {
    return $session.Path.GetUnresolvedProviderPathFromPSPath($Path)
  }
  static [IO.DirectoryInfo] GetDataPath([string]$appName, [string]$SubdirName) {
    $_Host_OS = [PsModuleBase]::GetHostOs()
    $dataPath = if ($_Host_OS -eq 'Windows') {
      [DirectoryInfo]::new([IO.Path]::Combine($Env:HOME, "AppData", "Roaming", $appName, $SubdirName))
    } elseif ($_Host_OS -in ('Linux', 'MacOSX')) {
      [DirectoryInfo]::new([IO.Path]::Combine((($env:PSModulePath -split [IO.Path]::PathSeparator)[0] | Split-Path | Split-Path), $appName, $SubdirName))
    } elseif ($_Host_OS -eq 'Unknown') {
      try {
        [DirectoryInfo]::new([IO.Path]::Combine((($env:PSModulePath -split [IO.Path]::PathSeparator)[0] | Split-Path | Split-Path), $appName, $SubdirName))
      } catch {
        Write-Warning "Could not resolve chat data path"
        Write-Warning "HostOS = '$_Host_OS'. Could not resolve data path."
        [Directory]::CreateTempSubdirectory(($SubdirName + 'Data-'))
      }
    } else {
      throw [InvalidOperationException]::new('Could not resolve data path. GetHostOs FAILED!')
    }
    if (!$dataPath.Exists) { [PsModuleBase]::CreateFolder($dataPath) }
    return $dataPath
  }
  static [DirectoryInfo] CreateFolder([string]$Path) {
    return [PsModuleBase]::CreateFolder([DirectoryInfo]::new($Path))
  }
  static [DirectoryInfo] CreateFolder([DirectoryInfo]$Path) {
    [ValidateNotNullOrEmpty()][DirectoryInfo]$Path = $Path
    $nF = @(); $p = $Path; while (!$p.Exists) { $nF += $p; $p = $p.Parent }
    [Array]::Reverse($nF); $nF | ForEach-Object { $_.Create() }
    return Get-Item $Path
  }
  #endregion IO

  #region CodeSec
  static [void] AddSignature([string]$File) {
    $cert = Get-ChildItem Cert:\CurrentUser\My -CodeSigningCert | Select-Object -First 1
    [PsModuleBase]::SetAuthenticodeSignature($File, $cert)
  }
  static [void] SetAuthenticodeSignature($FilePath, $Certificate) {
    $params = @{
      FilePath        = $FilePath
      Certificate     = $Certificate
      TimestampServer = "http://timestamp.digicert.com"
    }
    $result = Set-AuthenticodeSignature @params
    if ($result.Status -ne "Valid") {
      throw "Failed to sign $FilePath. Status: $($result.Status)"
    }
  }
  static [string] ExportCertificate([string]$CertPath, [string]$ExportPath, [SecureString]$Password) {
    # .SYNOPSIS
    # Export your signing key and certificate to a .pfx file
    # .DESCRIPTION
    # If you have a private key and certificate on your computer,
    # malicious programs might be able to sign scripts on your behalf, which authorizes PowerShell to run them.
    # To prevent automated signing on your behalf, use
    # [PsModuleBase]::ExportCertificate to export your signing key and certificate to a .pfx file.
    $cert = Get-ChildItem -Path $CertPath
    Export-PfxCertificate -Cert $cert -FilePath $ExportPath -Password $Password
    return $ExportPath
  }

  static [void] ImportCertificate([string]$PfxPath, [SecureString]$Password) {
    Import-PfxCertificate -FilePath $PfxPath -CertStoreLocation Cert:\CurrentUser\My -Password $Password
  }

  static [bool] VerifySignature([string]$FilePath) {
    $signature = Get-AuthenticodeSignature -FilePath $FilePath
    return $signature.Status -eq "Valid"
  }

  static [void] RemoveSignature([string]$FilePath) {
    $content = Get-Content -Path $FilePath -Raw
    $newContent = $content -replace '# SIG # Begin signature block[\s\S]*# SIG # End signature block', ''
    Set-Content -Path $FilePath -Value $newContent
  }

  static [void] SignDirectory([string]$DirectoryPath, [string]$CertPath, [string]$Filter = "*.ps1") {
    $cert = Get-ChildItem -Path $CertPath
    Get-ChildItem -Path $DirectoryPath -Filter $Filter -Recurse | ForEach-Object {
      [PsModuleBase]::SetAuthenticodeSignature($_.FullName, $cert)
    }
  }
  static [string] CreatedataUUID([Tuple[string, string, string, string]]$Info) {
    # Creates a custom guid based on 4 input string values
    $shash = [System.Text.StringBuilder]::new()
    $c_arr = [byte[]][SHA256CryptoServiceProvider]::HashData([Text.Encoding]::UTF8.GetBytes($Info.ToString().Replace(', ', ':')))
    $c_arr.ForEach({ [void]$shash.Append($_.ToString("x2")) })
    $s_256 = $shash.ToString().Substring(0, 32) -replace '(.{8})(.{4})(.{4})(.{4})(.{12})', '$1-$2-$3-$4-$5'
    return [System.Guid]::new($s_256)
  }
  static [X509Certificate2] GetCodeSigningCert() {
    return Get-ChildItem Cert:\CurrentUser\My -CodeSigningCert | Select-Object -First 1
  }
  hidden static [void] SaveConfiguration() {
    $configPath = [System.IO.Path]::Combine([PsModuleBase]::ConfigFolder, 'config.clixml')
    try {
      # Suppress verbose/debug output from Export-Clixml if not desired
      $prev_verbose = Get-Variable VerbosePreference -ValueOnly
      $prev_debug = Get-Variable DebugPreference -ValueOnly
      $VerbosePreference = 'SilentlyContinue'
      $DebugPreference = 'SilentlyContinue'
      [PsModuleBase]::config | Export-Clixml -Path $configPath -Force
    } catch {
      Write-Error "Failed to save PsModuleBase configuration to '$configPath': $($_.Exception.Message)"
      throw # Rethrow to indicate failure
    } finally {
      $VerbosePreference = $prev_verbose
      $DebugPreference = $prev_debug
    }
  }
  #endregion

  static [X509Certificate2[]] GetCertificate([bool]$CurrentOnly = $false) {
    # .SYNOPSIS
    # Retrieves PsModuleBase certificates from the current user's personal store.
    # .DESCRIPTION
    # Retrieves X509Certificate2 objects configured for use with PsModuleBase based on stored configuration (Thumbprint, Subject, or Friendly Name).
    # .PARAMETER CurrentOnly
    # Specifies to return only the most current (latest expiry) matching certificate.
    # .OUTPUTS
    # System.Security.Cryptography.X509Certificates.X509Certificate2[]
    $store = $null
    $certificates = [System.Collections.Generic.List[X509Certificate2]]::new()
    try {
      $store = [X509Store]::new([StoreName]::My, [StoreLocation]::CurrentUser)
      $store.Open([OpenFlags]::ReadOnly)

      # Define the filter criteria based on configuration
      $configThumbprint = [PsModuleBase]::config.CertThumbprint
      $configSubject = [PsModuleBase]::config.CertSubject
      $configFriendlyName = [PsModuleBase]::config.CertFriendlyName

      foreach ($cert in $store.Certificates) {
        $match = $false
        if ($configThumbprint -and $cert.Thumbprint -eq $configThumbprint) { $match = $true }
        elseif ($configSubject -and $cert.Subject -eq $configSubject) { $match = $true }
        elseif ($configFriendlyName -and $cert.FriendlyName -eq $configFriendlyName) { $match = $true }
        # Fallback if no specific config set, find any cert with the default friendly name
        elseif (!$configThumbprint -and !$configSubject -and !$configFriendlyName -and $cert.FriendlyName -eq 'PsModuleBase Certificate') { $match = $true }

        if ($match) {
          $certificates.Add($cert)
        }
      }
    } catch {
      Write-Error "Error accessing certificate store: $($_.Exception.Message)"
      # Return empty array on error
      return @()
    } finally {
      if ($null -ne $store) { $store.Close() }
    }

    $sortedCerts = $certificates | Sort-Object -Property NotAfter -Descending

    if ($CurrentOnly) {
      return @($sortedCerts | Select-Object -First 1)
    } else {
      return @($sortedCerts)
    }
  }

  static [X509Certificate2] CreateCertificate(
    # .SYNOPSIS
    # Generate a new self-signed certificate for PsModuleBase use.
    # .DESCRIPTION
    # Generates a new self-signed RSA certificate suitable for PsModuleBase (DigitalSignature, DataEncipherment)
    # and stores it in the current user's personal certificate store.
    # Relies on the New-SelfSignedCertificate cmdlet, which requires PowerShell 5.1+ on Windows or PowerShell Core 7+ cross-platform.
    # .PARAMETER Name
    # The subject name for the certificate (e.g., 'CN=user@domain.com, O=PsModuleBase'). This becomes the CN part.
    # .PARAMETER YearsValid
    # How many years the certificate should be valid for. Defaults to 20.
    # .PARAMETER FriendlyName
    # The friendly name to assign. Defaults to 'PsModuleBase Certificate'.
    # .OUTPUTS
    # System.Security.Cryptography.X509Certificates.X509Certificate2
    [string]$Name,
    [int]$YearsValid = 20,
    [string]$FriendlyName = 'PsModuleBase Certificate'
  ) {
    if (!$Name) {
      throw [System.ArgumentNullException]::new('Name', 'Certificate subject name cannot be empty.')
    }

    $subjectName = "CN=$Name, O=PsModuleBase" # Enforce OU for easier identification
    $notAfter = [datetime]::Now.AddYears($YearsValid)

    try {
      # Using the cmdlet here as it's the most straightforward way in PS cross-platform for self-signed.
      # For a pure .NET SDK, a library like BouncyCastle would be needed for generation.
      $cert = New-SelfSignedCertificate -KeyUsage DigitalSignature, DataEncipherment -Subject $subjectName -CertStoreLocation Cert:\CurrentUser\My -NotAfter $notAfter -FriendlyName $FriendlyName -KeyAlgorithm RSA -KeyLength 2048 -ErrorAction Stop
      return $cert
    } catch {
      Write-Error "Failed to create self-signed certificate: $($_.Exception.Message)"
      throw # Rethrow
    }
  }
  static [void] SetCurrentUserCertificate([string]$InputStr) {
    # .SYNOPSIS
    # Configures the primary certificate PsModuleBase should use for signing/identifying the user.
    # .DESCRIPTION
    # Updates the PsModuleBase configuration to identify the user's primary certificate by Thumbprint, FriendlyName, or Subject.
    # The certificate selected by FriendlyName or Subject will be the one with the latest expiration date if multiple match.
    $newConfig = @{
      CertThumbprint   = ''
      CertFriendlyName = ''
      CertSubject      = ''
    }
    # Basic validation: Ensure at least one identifier is provided
    switch ($true) {
      ([PsModuleBase]::IsThumbprint($InputStr)) {
        $newConfig.CertThumbprint = $InputStr.ToUpperInvariant()
        break
      }
      ([PsModuleBase]::IsFriendlyName($InputStr)) {
        $newConfig.CertFriendlyName = $InputStr
        break
      }
      ([PsModuleBase]::IsSubject($InputStr)) {
        $newConfig.CertSubject = $InputStr
        break
      }
      Default {
        throw [System.ArgumentException]::new("Must specify one of Thumbprint, FriendlyName, or Subject.")
      }
    }
    [PsModuleBase]::config = $newConfig
    [PsModuleBase]::SaveConfiguration()
    Write-Verbose "PsModuleBase configuration updated."
  }
  static [bool] IsThumbprint([string]$InputStr) {
    return [Regex]::IsMatch($InputStr, '^[0-9A-Fa-f]{40}$')
  }
  static [bool] IsSubject([string]$InputStr) {
    # Checks for common DN attribute types followed by '='. This is an approximation.
    # Adjust the list (CN|O|OU|...) as needed for common attributes you expect.
    # Using \b ensures these are whole words (prevents matching 'ACNP=')
    # Matches if *any* part looks like a DN component.
    return $InputStr -match '\b(CN|O|OU|L|S|C|E|SN|G|I|DC|STREET)\s*='
    # Alternative simpler (but potentially less accurate) check: just look for an equals sign
    # return $InputStr -match '='
  }
  static [bool] IsFriendlyName([string]$InputStr) {
    # A friendly name is assumed if it's not empty, not a thumbprint, and not a subject.
    return (![string]::IsNullOrWhiteSpace($InputStr)) -and (![PsModuleBase]::IsThumbprint($InputStr)) -and (![PsModuleBase]::IsSubject($InputStr))
  }

  static [string] ExportCertificatePublicKey() {
    # .SYNOPSIS
    # Exports the public key information of the current user's certificate.
    # .DESCRIPTION
    # Retrieves the current user's active PsModuleBase certificate, extracts its public key information (raw certificate data),
    # and formats it as a JSON string suitable for sharing with contacts.
    # .OUTPUTS
    # String (JSON formatted contact data)

    # Get the single, most current certificate configured for the user
    $cert = @([PsModuleBase]::GetCertificate($true))[0]
    if (!$cert) {
      throw "No active PsModuleBase certificate found for the current user. Use New-PsCertificate or Set-PsCertificate first."
    }

    $certBytes = $cert.Export([X509ContentType]::Cert) # Use Export for raw data

    $data = @{
      # Extract CN cleanly, assuming format "CN=Name, O=PsModuleBase"
      Name = $cert.SubjectName.Name -replace '^CN=|, O=PsModuleBase$'
      Cert = [System.Convert]::ToBase64String($certBytes)
    }

    # ConvertTo-Json depth might need adjustment if complex objects were used, but simple hashtable is fine.
    return $data | ConvertTo-Json -Depth 3
  }

  static [PSCustomObject[]] GetContact([string]$Name = '*') {
    # .SYNOPSIS
    # Get a list of saved PsModuleBase contacts.
    # .DESCRIPTION
    # Retrieves contact information (including their public certificate) stored locally. Contacts are needed to encrypt data for recipients.
    # .PARAMETER Name
    # The name or thumbprint of the contact to filter by (supports wildcards for name). Defaults to '*'.
    # .OUTPUTS
    # PSCustomObject[] (PsModuleBase.Contact objects)
    $contacts = [System.Collections.Generic.List[PSCustomObject]]::new()
    try {
      # Iterate through files in the certs folder
      # Use EnumerateFiles for potentially better performance on large directories
      foreach ($filePath in [System.IO.Directory]::EnumerateFiles([PsModuleBase]::certFolder, '*.clixml')) {
        $prev_verbose = Get-Variable VerbosePreference -ValueOnly
        $prev_debug = Get-Variable DebugPreference -ValueOnly
        try {
          $VerbosePreference = 'SilentlyContinue'
          $DebugPreference = 'SilentlyContinue'

          $contact = Import-Clixml -Path $filePath

          # Add type name if missing (robustness)
          if ($contact.PSObject.TypeNames -notcontains 'PsModuleBase.Contact') {
            $contact.PSObject.TypeNames.Insert(0, 'PsModuleBase.Contact')
          }

          # Filter based on Name (wildcard) or Thumbprint (exact)
          if (($contact.Name -like $Name) -or ($contact.Thumbprint -like $Name)) {
            # Perform a quick sanity check on the deserialized object
            if ($contact.Name -and $contact.Thumbprint -and $contact.Certificate -is [X509Certificate2]) {
              $contacts.Add($contact)
            } else {
              Write-Warning "Skipping invalid contact file: $filePath"
            }
          }
        } catch {
          Write-Warning "Failed to import contact file '$filePath': $($_.Exception.Message)"
        } finally {
          $VerbosePreference = $prev_verbose
          $DebugPreference = $prev_debug
        }
      }
    } catch {
      Write-Error "Error reading contacts directory '$([PsModuleBase]::certFolder)': $($_.Exception.Message)"
    }

    # Return unique contacts (in case both name.clixml and thumbprint.clixml exist)
    # Sort by name for consistent output
    return @($contacts | Sort-Object -Property Name, Thumbprint -Unique)
  }

  static [PSCustomObject] ImportContactData(
    # .SYNOPSIS
    # Imports contact information from a JSON string or file.
    # .DESCRIPTION
    # Parses JSON data containing a contact's name and public certificate (Base64 encoded),
    # validates the certificate (optionally checking trust), and saves it locally for later use in encryption.
    # Saves the contact information twice: once as '<Name>.clixml' and once as '<Thumbprint>.clixml' for easy lookup.
    # .PARAMETER JsonData
    # The JSON string containing the contact information (usually from Export-PsCertificate).
    # .PARAMETER TrustedOnly
    # If $true, verifies that the contact's certificate chains to a trusted root authority. Defaults to $false (allowing self-signed).
    # .OUTPUTS
    # PSCustomObject (The imported PsModuleBase.Contact object)
    [string]$JsonData,
    [bool]$TrustedOnly = $false
  ) {
    if (!$JsonData) {
      throw [System.ArgumentNullException]::new('JsonData', 'Input JSON data cannot be empty.')
    }

    $jsonContent = $null
    try {
      $jsonContent = $JsonData | ConvertFrom-Json -ErrorAction Stop
    } catch {
      throw [System.ArgumentException]::new("Invalid JSON data provided: $($_.Exception.Message)", $_.Exception)
    }

    if (!$jsonContent.Name -or !$jsonContent.Cert) {
      throw [System.ArgumentException]::new('Invalid JSON structure - ensure the data has "Name" and "Cert" properties (generated via Export-PsCertificate).')
    }

    $certificate = $null
    try {
      $bytes = [System.Convert]::FromBase64String($jsonContent.Cert)
      # Use constructor that doesn't require private key password
      $certificate = [X509Certificate2]::new($bytes)
    } catch {
      throw [System.ArgumentException]::new("Invalid certificate data for contact '$($jsonContent.Name)': $($_.Exception.Message)", $_.Exception)
    }

    # Verify trust if requested
    if ($TrustedOnly) {
      $chain = [X509Chain]::new()
      # Basic chain validation (adjust policy checks as needed)
      $chain.ChainPolicy.RevocationMode = [X509RevocationMode]::Online
      $chain.ChainPolicy.VerificationFlags = [X509VerificationFlags]::NoFlag # Adjust as needed
      if (!$chain.Build($certificate)) {
        $statusInfo = ($chain.ChainStatus | ForEach-Object StatusInformation) -join '; '
        throw [System.Security.SecurityException]::new("Certificate for '$($jsonContent.Name)' (Subject: $($certificate.Subject), Thumbprint: $($certificate.Thumbprint)) is not trusted. Chain status: $statusInfo")
      }
      Write-Verbose "Certificate for $($jsonContent.Name) passed trust validation."
    }

    $certData = [PSCustomObject]@{
      PSTypeName  = 'PsModuleBase.Contact'
      Name        = $jsonContent.Name
      Thumbprint  = $certificate.Thumbprint.ToUpperInvariant() # Consistent casing
      NotAfter    = $certificate.NotAfter
      Certificate = $certificate # Store the full cert object
    }

    # Sanitize name for file system
    $invalidChars = [System.IO.Path]::GetInvalidFileNameChars() -join ''
    $safeName = $certData.Name -replace "[$invalidChars]", '_'

    # Define export paths
    $exportPathByName = [System.IO.Path]::Combine([PsModuleBase]::certFolder, "$safeName.clixml")
    $exportPathByThumb = [System.IO.Path]::Combine([PsModuleBase]::certFolder, "$($certData.Thumbprint).clixml")

    try {
      # Suppress Export-Clixml output streams
      $prev_verbose = Get-Variable VerbosePreference -ValueOnly
      $prev_debug = Get-Variable DebugPreference -ValueOnly
      $VerbosePreference = 'SilentlyContinue'
      $DebugPreference = 'SilentlyContinue'

      # Use -Force to overwrite existing contacts with the same name/thumbprint
      $certData | Export-Clixml -Path $exportPathByName -Force
      $certData | Export-Clixml -Path $exportPathByThumb -Force

      Write-Verbose "Contact '$($certData.Name)' ($($certData.Thumbprint)) saved successfully."
      return $certData
    } catch {
      Write-Error "Failed to save contact '$($certData.Name)' to '$([PsModuleBase]::certFolder)': $($_.Exception.Message)"
      throw # Rethrow
    } finally {
      $VerbosePreference = $prev_verbose
      $DebugPreference = $prev_debug
    }
  }

  static [void] RemoveContact([string[]]$Identity) {
    # .SYNOPSIS
    # Remove a contact (or contacts) from the local store.
    # .DESCRIPTION
    # Finds contacts matching the provided name(s) or thumbprint(s) and deletes their associated .clixml files from the configuration directory.
    # .PARAMETER Identity
    # An array of contact names or thumbprints to remove. Wildcards are NOT supported here; use Get-PsContact first if needed.
    if (!$Identity) { return } # Nothing to do

    foreach ($id in $Identity) {
      $contactsToRemove = @([PsModuleBase]::GetContact($id)) # Find contacts matching the exact name or thumbprint

      if (!$contactsToRemove) {
        Write-Warning "Contact '$id' not found, skipping removal."
        continue
      }

      foreach ($contact in $contactsToRemove) {
        # Sanitize name for file system matching
        $invalidChars = [System.IO.Path]::GetInvalidFileNameChars() -join ''
        $safeName = $contact.Name -replace "[$invalidChars]", '_'

        $pathByName = Join-Path -Path [PsModuleBase]::certFolder -ChildPath "$safeName.clixml"
        $pathByThumb = Join-Path -Path [PsModuleBase]::certFolder -ChildPath "$($contact.Thumbprint).clixml"

        $removed = $false
        try {
          if ([System.IO.File]::Exists($pathByName)) {
            [System.IO.File]::Delete($pathByName)
            Write-Verbose "Removed contact file: $pathByName"
            $removed = $true
          }
          if ([System.IO.File]::Exists($pathByThumb)) {
            [System.IO.File]::Delete($pathByThumb)
            Write-Verbose "Removed contact file: $pathByThumb"
            $removed = $true
          }
          if ($removed) {
            Write-Verbose "Successfully removed contact '$($contact.Name)' ($($contact.Thumbprint))."
          } else {
            Write-Warning "Could not find files for contact '$($contact.Name)' ($($contact.Thumbprint)) to remove."
          }
        } catch {
          Write-Error "Error removing files for contact '$($contact.Name)': $($_.Exception.Message)"
          # Continue to next contact even if one fails
        }
      }
    }
  }

  #region Encryption/Decryption Methods (Originals with minor .NET adjustments)

  # Helper to get RSA keys safely
  hidden static [RSA] GetRsaPublicKey([X509Certificate2]$Certificate) {
    $rsa = $Certificate.GetRSAPublicKey()
    if ($null -eq $rsa) { throw "Certificate (Thumbprint: $($Certificate.Thumbprint)) does not contain an RSA public key." }
    return $rsa
  }
  hidden static [RSA] GetRsaPrivateKey([X509Certificate2]$Certificate) {
    if (!$Certificate.HasPrivateKey) { throw "Certificate (Thumbprint: $($Certificate.Thumbprint)) does not have an associated private key accessible." }
    $rsa = $Certificate.GetRSAPrivateKey()
    if ($null -eq $rsa) { throw "Failed to retrieve RSA private key for certificate (Thumbprint: $($Certificate.Thumbprint)). Check key permissions." }
    return $rsa
  }

  <# Internal Use / Called by Protect-Document #>
  static [string] ProtectFile(
    [string]$Path,
    [X509Certificate2]$OwnCertificate,
    # Contact object expected from Get-PsContact
    [PSCustomObject]$Contact,
    [string]$OutPath, # Optional: Directory to write output file
    [switch]$PassThru # If true, return JSON string instead of writing file
  ) {
    if (!([System.IO.File]::Exists($Path))) { throw [System.IO.FileNotFoundException]::new("Input file not found.", $Path) }
    if ($OutPath -and !([System.IO.Directory]::Exists($OutPath))) { throw [System.IO.DirectoryNotFoundException]::new("Output directory not found.", $OutPath) }

    $bytes = [System.IO.File]::ReadAllBytes($Path)
    $publicKey = [PsModuleBase]::GetRsaPublicKey($Contact.Certificate)
    $privateKey = [PsModuleBase]::GetRsaPrivateKey($OwnCertificate) # Signing key

    $bytesEncrypted = $publicKey.Encrypt($bytes, [RSAEncryptionPadding]::Pkcs1)
    $bytesSignature = $privateKey.SignData($bytesEncrypted, [HashAlgorithmName]::SHA512, [RSASignaturePadding]::Pkcs1)

    $fileName = [System.IO.Path]::GetFileName($Path)
    $data = [ordered]@{ # Use ordered hashtable for consistent JSON output
      Name            = $fileName
      Recipient       = $Contact.Name
      Type            = 'File'
      SignThumbprint  = $OwnCertificate.Thumbprint.ToUpperInvariant()
      CryptThumbprint = $Contact.Certificate.Thumbprint.ToUpperInvariant()
      Data            = [System.Convert]::ToBase64String($bytesEncrypted)
      Signature       = [System.Convert]::ToBase64String($bytesSignature)
    }

    $jsonData = $data | ConvertTo-Json -Depth 3

    if ($PassThru) {
      return $jsonData
    }

    $outputFileName = "$fileName.json"
    $finalOutputPath = if ($OutPath) {
      [System.IO.Path]::Combine($OutPath, $outputFileName)
    } else {
      [System.IO.Path]::ChangeExtension($Path, '.json') # Place next to original
    }

    try {
      [System.IO.File]::WriteAllText($finalOutputPath, $jsonData, [System.Text.Encoding]::UTF8)
      # Use Write-Host for user feedback consistent with original functions
      Write-Host "Protected file created at: $finalOutputPath"
      return $jsonData # Return the JSON data even when writing file
    } catch {
      Write-Error "Failed to write protected file to '$finalOutputPath': $($_.Exception.Message)"
      throw
    }
  }

  <# Internal Use / Called by Protect-Document #>
  static [string] ProtectContent(
    [string]$Content,
    [string]$Name,
    [X509Certificate2]$OwnCertificate,
    # Contact object expected from Get-PsContact
    [PSCustomObject]$Contact
  ) {
    $bytes = [System.Text.Encoding]::UTF8.GetBytes($Content)
    $publicKey = [PsModuleBase]::GetRsaPublicKey($Contact.Certificate)
    $privateKey = [PsModuleBase]::GetRsaPrivateKey($OwnCertificate) # Signing key

    $bytesEncrypted = $publicKey.Encrypt($bytes, [RSAEncryptionPadding]::Pkcs1)
    $bytesSignature = $privateKey.SignData($bytesEncrypted, [HashAlgorithmName]::SHA512, [RSASignaturePadding]::Pkcs1)

    $data = [ordered]@{ # Use ordered hashtable for consistent JSON output
      Name            = $Name
      Recipient       = $Contact.Name
      Type            = 'Content'
      SignThumbprint  = $OwnCertificate.Thumbprint.ToUpperInvariant()
      CryptThumbprint = $Contact.Certificate.Thumbprint.ToUpperInvariant()
      Data            = [System.Convert]::ToBase64String($bytesEncrypted)
      Signature       = [System.Convert]::ToBase64String($bytesSignature)
    }
    return $data | ConvertTo-Json -Depth 3
  }

  <# Internal Use / Called by Unprotect-Document #>
  static [string] UnprotectDataset(
    [string]$JsonContent,
    [string]$OutDirectory, # Directory to write output file, mandatory for Type=File
    $Cmdlet # Pass calling cmdlet for WriteError context
  ) {
    $c = $null
    try {
      $c = $JsonContent | ConvertFrom-Json -ErrorAction Stop
    } catch {
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId InvalidJson -Category InvalidData -Message "Failed to parse input JSON: $($_.Exception.Message)" -TargetObject $JsonContent -Exception $_.Exception) )
      return $null # Return null/empty on failure
    }

    # Validate basic structure
    if (!($c.Name -and $c.Type -and $c.SignThumbprint -and $c.CryptThumbprint -and $c.Data -and $c.Signature)) {
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId MissingJsonProperties -Category InvalidData -Message "Input JSON is missing required properties (Name, Type, SignThumbprint, CryptThumbprint, Data, Signature)." -TargetObject $c) )
      return $null
    }

    # --- Certificate Retrieval using .NET Store ---
    $recipientCert = $null
    $senderCert = $null # This comes from saved Contacts
    $store = $null
    try {
      # Find Recipient Cert (current user's private key needed)
      $store = [X509Store]::new([StoreName]::My, [StoreLocation]::CurrentUser)
      $store.Open([OpenFlags]::ReadOnly)
      $results = $store.Certificates.Find([X509FindType]::FindByThumbprint, $c.CryptThumbprint, $false) # false = only valid certs? check documentation. Usually true. Let's try false for broader match first.
      if ($results.Count -gt 0) {
        # Ensure it has a private key we can access
        $recipientCert = $results | Where-Object { $_.HasPrivateKey } | Sort-Object -Property NotAfter -Descending | Select-Object -First 1
      }
    } catch {
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId StoreAccessError -Category ResourceUnavailable -Message "Error accessing certificate store: $($_.Exception.Message)" -TargetObject $c.CryptThumbprint -Exception $_.Exception) )
      return $null
    } finally {
      if ($null -ne $store) { $store.Close() }
    }

    if (!$recipientCert) {
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId DecryptionCertNotFound -Category ObjectNotFound -Message "Cannot find usable certificate with private key matching thumbprint '$($c.CryptThumbprint)' in the CurrentUser\My store to decrypt data: $($c.Name)" -TargetObject $c) )
      return $null
    }
    Write-Verbose "Using certificate '$($recipientCert.Subject)' for decryption."

    # Find Sender Cert (from saved contacts)
    $senderContact = @([PsModuleBase]::GetContact($c.SignThumbprint) | Sort-Object NotAfter -Descending | Select-Object -First 1)[0]
    if (!$senderContact) {
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId VerificationCertNotFound -Category ObjectNotFound -Message "Cannot find contact certificate matching signing thumbprint '$($c.SignThumbprint)' to verify the sender: $($c.Name). Import the sender's contact information first." -TargetObject $c) )
      return $null
    }
    $senderCert = $senderContact.Certificate
    Write-Verbose "Using contact certificate '$($senderCert.Subject)' for signature verification."

    # --- Decryption and Verification ---
    $bytesData = $null
    $bytesSignature = $null
    try {
      $bytesData = [System.Convert]::FromBase64String($c.Data)
      $bytesSignature = [System.Convert]::FromBase64String($c.Signature)
    } catch {
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId InvalidBase64 -Category InvalidData -Message "Invalid Base64 format for data or signature: $($c.Name)" -TargetObject $c -Exception $_.Exception) )
      return $null
    }

    # Verify Signature First
    $senderPK = [PsModuleBase]::GetRsaPublicKey($senderCert)
    $isFromSender = $false
    try {
      $isFromSender = $senderPK.VerifyData($bytesData, $bytesSignature, [HashAlgorithmName]::SHA512, [RSASignaturePadding]::Pkcs1)
    } catch {
      # Catch potential crypto exceptions during verification
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId VerificationCryptoError -Category InvalidData -Message "Cryptographic error during signature verification for '$($c.Name)': $($_.Exception.Message)" -TargetObject $c -Exception $_.Exception) )
      return $null
    }
    if (!$isFromSender) {
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId InvalidSignature -Category SecurityError -Message "Invalid signature! Data '$($c.Name)' could not be verified to originate from sender with certificate '$($senderCert.Subject)' (Thumbprint: $($senderCert.Thumbprint))!" -TargetObject $c) )
      return $null
    }
    Write-Verbose "Signature verified successfully for '$($c.Name)'."

    # Decrypt Data
    $recipientSK = [PsModuleBase]::GetRsaPrivateKey($recipientCert) # Private key
    $decryptedBytes = $null
    try {
      $decryptedBytes = $recipientSK.Decrypt($bytesData, [RSAEncryptionPadding]::Pkcs1)
    } catch {
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId DecryptionFailed -Category InvalidData -Message "Error decrypting data! '$($c.Name)' could not be decrypted with certificate '$($recipientCert.Subject)' (Thumbprint: $($recipientCert.Thumbprint)): $($_.Exception.Message)" -TargetObject $c -Exception $_.Exception) )
      return $null
    }
    Write-Verbose "Data decrypted successfully for '$($c.Name)'."

    # --- Output Handling ---
    if ($c.Type -eq 'Content') {
      $content = [System.Text.Encoding]::UTF8.GetString($decryptedBytes)
      if ($OutDirectory) {
        # Write to file if OutDirectory is specified for content
        if (!([System.IO.Directory]::Exists($OutDirectory))) {
          $Cmdlet.WriteError( (New-ErrorRecord -ErrorId OutDirNotFoundContent -Category InvalidArgument -Message "Output directory '$OutDirectory' not found for writing decrypted content '$($c.Name)'." -TargetObject $c) )
          return $null # Stop processing this item
        }
        $exportPath = [System.IO.Path]::Combine($OutDirectory, $c.Name)
        try {
          [System.IO.File]::WriteAllText($exportPath, $content, [System.Text.Encoding]::UTF8)
          Write-Host "Unprotected content written to file: $exportPath"
        } catch {
          $Cmdlet.WriteError( (New-ErrorRecord -ErrorId WriteContentFileError -Category WriteError -Message "Error writing unprotected content file '$exportPath': $($_.Exception.Message)" -TargetObject $exportPath -Exception $_.Exception) )
          # Return the content anyway? Or null? Let's return null as the file write failed.
          return $null
        }
      }
      return $content # Return string content
    } elseif ($c.Type -eq 'File') {
      if (!$OutDirectory) {
        # This check should ideally happen in the calling function, but double-check here.
        $Cmdlet.WriteError( (New-ErrorRecord -ErrorId OutDirMissingFile -Category InvalidArgument -Message "Invalid state: Encrypted data indicates Type 'File' but no OutDirectory was provided to UnprotectDataset for '$($c.Name)'." -TargetObject $c) )
        return $null
      }
      if (!([System.IO.Directory]::Exists($OutDirectory))) {
        $Cmdlet.WriteError( (New-ErrorRecord -ErrorId OutDirNotFoundFile -Category InvalidArgument -Message "Output directory '$OutDirectory' not found for writing decrypted file '$($c.Name)'." -TargetObject $c) )
        return $null
      }

      $exportPath = [System.IO.Path]::Combine($OutDirectory, $c.Name)
      try {
        [System.IO.File]::WriteAllBytes($exportPath, $decryptedBytes)
        Write-Host "Unprotected file written to: $exportPath"
        return $exportPath # Return the path to the created file
      } catch {
        $Cmdlet.WriteError( (New-ErrorRecord -ErrorId WriteFileError -Category WriteError -Message "Error writing unprotected file '$exportPath': $($_.Exception.Message)" -TargetObject $exportPath -Exception $_.Exception) )
        return $null # Return null on file write failure
      }
    } else {
      $Cmdlet.WriteError( (New-ErrorRecord -ErrorId UnknownDataType -Category InvalidData -Message "Unknown data Type '$($c.Type)' encountered in protected data '$($c.Name)'." -TargetObject $c) )
      return $null
    }
  }
  #endregion CodeSec

  #region ObjectUtils
  static [string[]] ListProperties([System.Object]$Obj) {
    return [PsModuleBase]::ListProperties($Obj, '')
  }
  static [string[]] ListProperties([System.Object]$Obj, [string]$Prefix = '') {
    $Properties = @()
    $Obj.PSObject.Properties | ForEach-Object {
      $PropertyName = $_.Name
      $FullPropertyName = if ([string]::IsNullOrEmpty($Prefix)) {
        $PropertyName
      } else {
        "$Prefix,$PropertyName"
      }
      $PropertyValue = $_.Value
      $propertyType = $_.TypeNameOfValue
      # $BaseType = $($propertyType -as 'type').BaseType.FullName
      if ($propertyType -is [System.ValueType]) {
        Write-Verbose "vt <= $propertyType"
        $Properties += $FullPropertyName
      } elseif ($propertyType -is [System.Object]) {
        Write-Verbose "ob <= $propertyType"
        $Properties += [PsModuleBase]::ListProperties($PropertyValue, $FullPropertyName)
      }
    }
    return $Properties
  }
  static [Object[]] ExcludeProperties($Object) {
    return [PsModuleBase]::ExcludeProperties($Object, [searchParams]::new())
  }
  static [Object[]] ExcludeProperties($Object, [string[]]$PropstoExclude) {
    $sp = [searchParams]::new(); $sp.PropstoExclude + $PropstoExclude
    return [PsModuleBase]::ExcludeProperties($Object, $sp)
  }
  static [Object[]] ExcludeProperties($Object, [searchParams]$SearchOptions) {
    $DefaultTypeProps = @()
    if ($SearchOptions.SkipDefaults) {
      try {
        $DefaultTypeProps = @( $Object.GetType().GetProperties() | Select-Object -ExpandProperty Name -ErrorAction Stop )
      } Catch {
        $null
      }
    }
    $allPropstoExclude = @( $SearchOptions.PropstoExclude + $DefaultTypeProps ) | Select-Object -Unique
    return $Object.psobject.properties | Where-Object { $allPropstoExclude -notcontains $_.Name }
  }
  static [PSObject] RecurseObject($Object, [PSObject]$Output) {
    return [PsModuleBase]::RecurseObject($Object, '$Object', $Output, 0)
  }
  static [PSObject] RecurseObject($Object, [string[]]$Path, [PSObject]$Output, [int]$Depth) {
    $Depth++
    #Get the children we care about, and their names
    $Children = [PsModuleBase]::ExcludeProperties($Object);
    #Loop through the children properties.
    foreach ($Child in $Children) {
      $ChildName = $Child.Name
      $ChildValue = $Child.Value
      # Handle special characters...
      $FriendlyChildName = $(if ($ChildName -match '[^a-zA-Z0-9_]') {
          "'$ChildName'"
        } else {
          $ChildName
        }
      )
      $IsInInclude = ![PsModuleBase]::SearchOptions.PropstoInclude -or @([PsModuleBase]::SearchOptions.PropstoInclude).Where({ $ChildName -like $_ })
      $IsInValue = ![PsModuleBase]::SearchOptions.Value -or (@([PsModuleBase]::SearchOptions.Value).Where({ $ChildValue -like $_ }).Count -gt 0)
      if ($IsInInclude -and $IsInValue -and $Depth -le [PsModuleBase]::SearchOptions.MaxDepth) {
        $ThisPath = @( $Path + $FriendlyChildName ) -join "."
        $Output | Add-Member -MemberType NoteProperty -Name $ThisPath -Value $ChildValue
      }
      if ($null -eq $ChildValue) {
        continue
      }
      if (($ChildValue.GetType() -eq $Object.GetType() -and $ChildValue -is [datetime]) -or ($ChildName -eq "SyncRoot" -and !$ChildValue)) {
        Write-Debug "Skipping $ChildName with type $($ChildValue.GetType().FullName)"
        continue
      }
      # Check for arrays by checking object type (this is a fix for arrays with 1 object) otherwise check the count of objects
      $IsArray = $(if (($ChildValue.GetType()).basetype.Name -eq "Array") {
          $true
        } else {
          @($ChildValue).count -gt 1
        }
      )
      $count = 0
      #Set up the path to this node and the data...
      $CurrentPath = @( $Path + $FriendlyChildName ) -join "."

      #Get the children's children we care about, and their names. Also look for signs of a hashtable like type
      $ChildrensChildren = [PsModuleBase]::ExcludeProperties($ChildValue)
      $HashKeys = if ($ChildValue.Keys -and $ChildValue.Values) {
        $ChildValue.Keys
      } else {
        $null
      }
      if ($(@($ChildrensChildren).count -ne 0 -or $HashKeys) -and $Depth -lt [PsModuleBase]::SearchOptions.MaxDepth) {
        #This handles hashtables. But it won't recurse...
        if ($HashKeys) {
          foreach ($key in $HashKeys) {
            $Output | Add-Member -MemberType NoteProperty -Name "$CurrentPath['$key']" -Value $ChildValue["$key"]
            $Output = [PsModuleBase]::RecurseObject($ChildValue["$key"], "$CurrentPath['$key']", $Output, $depth)
          }
        } else {
          if ($IsArray) {
            foreach ($item in @($ChildValue)) {
              $Output = [PsModuleBase]::RecurseObject($item, "$CurrentPath[$count]", $Output, $depth)
              $Count++
            }
          } else {
            $Output = [PsModuleBase]::RecurseObject($ChildValue, $CurrentPath, $Output, $depth)
          }
        }
      }
    }
    return $Output
  }
  static [hashtable[]] FindHashKeyValue($PropertyName, $Ast) {
    return [PsModuleBase]::FindHashKeyValue($PropertyName, $Ast, @())
  }
  static [hashtable[]] FindHashKeyValue($PropertyName, $Ast, [string[]]$CurrentPath) {
    if ($PropertyName -eq ($CurrentPath -Join '.') -or $PropertyName -eq $CurrentPath[ - 1]) {
      return $Ast | Add-Member NoteProperty HashKeyPath ($CurrentPath -join '.') -PassThru -Force | Add-Member NoteProperty HashKeyName ($CurrentPath[ - 1]) -PassThru -Force
    }; $r = @()
    if ($Ast.PipelineElements.Expression -is [System.Management.Automation.Language.HashtableAst]) {
      $KeyValue = $Ast.PipelineElements.Expression
      ForEach ($KV in $KeyValue.KeyValuePairs) {
        $result = [PsModuleBase]::FindHashKeyValue($PropertyName, $KV.Item2, @($CurrentPath + $KV.Item1.Value))
        if ($null -ne $result) {
          $r += $result
        }
      }
    }
    return $r
  }
  static [string] EscapeSpecialCharacters([string]$str) {
    if ([string]::IsNullOrWhiteSpace($str)) {
      return $str
    } else {
      [string]$ParsedText = $str
      if ($ParsedText.ToCharArray() -icontains "'") {
        $ParsedText = $ParsedText -replace "'", "''"
      }
      return $ParsedText
    }
  }
  static [Hashtable] RegexMatch([regex]$Regex, [RegularExpressions.Match]$Match) {
    if (!$Match.Groups[0].Success) {
      throw New-Object System.ArgumentException('Match does not contain any captures.', 'Match')
    }
    $h = @{}
    foreach ($name in $Regex.GetGroupNames()) {
      if ($name -eq 0) {
        continue
      }
      $h.$name = $Match.Groups[$name].Value
    }
    return $h
  }
  static [string] RegexEscape([string]$LiteralText) {
    if ([string]::IsNullOrEmpty($LiteralText)) { $LiteralText = [string]::Empty }
    return [regex]::Escape($LiteralText);
  }
  static [bool] IsValidHex([string]$Text) {
    return [regex]::IsMatch($Text, '^#?([a-f0-9]{6}|[a-f0-9]{3})$')
  }
  static [bool] IsValidHex([byte[]]$bytes) {
    # .Example
    # $bytes = [byte[]](0x00, 0x1F, 0x2A, 0xFF)
    foreach ($byte in $bytes) {
      if ($byte -lt 0x00 -or $byte -gt 0xFF) {
        return $false
      }
    } return $true
  }
  static [bool] IsValidBase64([string]$string) {
    return $(
      [regex]::IsMatch([string]$string, '^(?:[A-Za-z0-9+/]{4})*(?:[A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?$') -and
      ![string]::IsNullOrWhiteSpace([string]$string) -and !$string.Length % 4 -eq 0 -and !$string.Contains(" ") -and
      !$string.Contains(" ") -and !$string.Contains("`t") -and !$string.Contains("`n")
    )
  }
  static [void] ValidatePolybius([string]$Text, [string]$Key, [string]$Action) {
    if ($Text -notmatch "^[a-z ]*$" -and ($Action -ne 'Decrypt')) {
      throw('Text must only have alphabetical characters');
    }
    if ($Key.Length -ne 25) {
      throw('Key must be 25 characters in length');
    }
    if ($Key -notmatch "^[a-z]*$") {
      throw('Key must only have alphabetical characters');
    }
    for ($i = 0; $i -lt 25; $i++) {
      for ($j = 0; $j -lt 25; $j++) {
        if (($Key[$i] -eq $Key[$j]) -and ($i -ne $j)) {
          throw('Key must have no repeating letters');
        }
      }
    }
  }
  static [void] ValidatePath([string]$path) {
    $InvalidPathChars = [IO.Path]::GetInvalidPathChars()
    $InvalidCharsRegex = "[{0}]" -f [regex]::Escape($InvalidPathChars)
    if ($Path -match $InvalidCharsRegex) {
      throw [InvalidEnumArgumentException]::new("The path string contains invalid characters.")
    }
  }
  #endregion ObjectUtils

  #region RuntimeInfo
  static [bool] IsAdmin() {
    $HostOs = [PsModuleBase]::GetHostOs()
    $isAdmn = switch ($HostOs) {
      "Windows" { (New-Object Security.Principal.WindowsPrincipal $([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator); break }
      "Linux" { (& id -u) -eq 0; break }
      "MacOSX" { Write-Warning "MacOSX !! idk how to solve this one!"; $false; break }
      Default {
        Write-Warning "[ModuleManager]::IsAdmin? : OSPlatform $((Get-Variable 'PSVersionTable' -ValueOnly).Platform) | $HostOs is not yet supported"
        throw "UNSUPPORTED_OS"
      }
    }
    return $isAdmn
  }
  static [string] GetRuntimeUUID() {
    return [PsModuleBase]::CreatedataUUID([Tuple[string, string, string, string]]::new(
        [Environment]::MachineName,
        [RuntimeInformation]::OSDescription,
        [RuntimeInformation]::OSArchitecture,
        [Environment]::ProcessorCount
      )
    )
  }
  static [PSCustomObject] GetIpInfo() {
    $info = $null; $gist = "https://api.github.com/gists/d1985ebe22fe07cc191c9458b3a2bdbc"
    try {
      $info = [scriptblock]::Create($(
        (Invoke-RestMethod -Verbose:$false -ea Ignore -SkipHttpErrorCheck -Method Get $gist).files.'IpInfo.ps1'.content
        ) + ';[Ipinfo]::getInfo()'
      ).Invoke()
    } catch {
      $info = [PSCustomObject]@{
        country_name = "US"
        location     = [PSCustomObject]@{
          geoname_id = "Ohio"
        }
        city         = "Florida"
      }
    }
    return $info
  }
  static [string] GetHostOs() {
    #TODO: refactor so that it returns one of these: [Enum]::GetNames([System.PlatformID])
    return $(switch ($true) {
        $([RuntimeInformation]::IsOSPlatform([OSPlatform]::Windows)) { "Windows"; break }
        $([RuntimeInformation]::IsOSPlatform([OSPlatform]::FreeBSD)) { "FreeBSD"; break }
        $([RuntimeInformation]::IsOSPlatform([OSPlatform]::Linux)) { "Linux"; break }
        $([RuntimeInformation]::IsOSPlatform([OSPlatform]::OSX)) { "MacOSX"; break }
        Default {
          "UNKNOWN"
        }
      }
    )
  }
  #endregion RuntimeInfo
}
#endregion Classes

# Types that will be available to users when they import the module.
$typestoExport = @(
  [PsModuleBase], [LocalPsModule], [InstallScope], [ModuleSource], [PSRepoItem], [PSGalleryItem],
  [ModuleItem], [ModuleFile], [ModuleItemType], [SearchParams], [ModuleFolder]
)
$TypeAcceleratorsClass = [PsObject].Assembly.GetType('System.Management.Automation.TypeAccelerators')
foreach ($Type in $typestoExport) {
  if ($Type.FullName -in $TypeAcceleratorsClass::Get.Keys) {
    $Message = @(
      "Unable to register type accelerator '$($Type.FullName)'"
      'Accelerator already exists.'
    ) -join ' - '
    "TypeAcceleratorAlreadyExists $Message" | Write-Debug
  }
}
# Add type accelerators for every exportable type.
foreach ($Type in $typestoExport) {
  $TypeAcceleratorsClass::Add($Type.FullName, $Type)
}
# Remove type accelerators when the module is removed.
$MyInvocation.MyCommand.ScriptBlock.Module.OnRemove = {
  foreach ($Type in $typestoExport) {
    $TypeAcceleratorsClass::Remove($Type.FullName)
  }
}.GetNewClosure();

$scripts = @();
$Public = Get-ChildItem "$PSScriptRoot/Public" -Filter "*.ps1" -Recurse -ErrorAction SilentlyContinue
$scripts += Get-ChildItem "$PSScriptRoot/Private" -Filter "*.ps1" -Recurse -ErrorAction SilentlyContinue
$scripts += $Public

foreach ($file in $scripts) {
  Try {
    if ([string]::IsNullOrWhiteSpace($file.fullname)) { continue }
    . "$($file.fullname)"
  } Catch {
    Write-Warning "Failed to import function $($file.BaseName): $_"
    $host.UI.WriteErrorLine($_)
  }
}

$Param = @{
  Function = $Public.BaseName
  Cmdlet   = '*'
  Alias    = '*'
  Verbose  = $false
}
Export-ModuleMember @Param