library/xPSDesiredStateConfiguration/9.2.0/DSCResources/DSC_xServiceResource/DSC_xServiceResource.psm1
<#
Error codes and their meanings for Invoke-CimMethod on a Win32_Service can be found here: https://msdn.microsoft.com/en-us/library/aa384901(v=vs.85).aspx #> $errorActionPreference = 'Stop' Set-StrictMode -Version 'Latest' $modulePath = Join-Path -Path (Split-Path -Path (Split-Path -Path $PSScriptRoot -Parent) -Parent) -ChildPath 'Modules' # Import the shared modules Import-Module -Name (Join-Path -Path $modulePath ` -ChildPath (Join-Path -Path 'xPSDesiredStateConfiguration.Common' ` -ChildPath 'xPSDesiredStateConfiguration.Common.psm1')) Import-Module -Name (Join-Path -Path $modulePath -ChildPath 'DscResource.Common') # Import Localization Strings $script:localizedData = Get-LocalizedData -DefaultUICulture 'en-US' <# .SYNOPSIS Retrieves the current status of the service resource with the given name. .PARAMETER Name The name of the service to retrieve the status of. This may be different from the service's display name. To retrieve a list of all services with their names and current states, use the Get-Service cmdlet. .NOTES BuiltInAccount, Credential and GroupManagedServiceAccount parameters output the user used to run the service to the BuiltinAccount property, Evaluating if the account is a gMSA would mean doing a call to active directory to verify, as the property returned by the ciminstance is just a string. In a production scenario that would mean that every xService test will check with AD every 15 minutes if the account is a gMSA. That's not desireable, so we output Credential and GroupManagedServiceAccount without evaluating what kind of user is supplied. #> function Get-TargetResource { [OutputType([System.Collections.Hashtable])] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Name ) $service = Get-Service -Name $Name -ErrorAction 'SilentlyContinue' if ($null -ne $service) { Write-Verbose -Message ($script:localizedData.ServiceExists -f $Name) $serviceCimInstance = Get-ServiceCimInstance -ServiceName $Name $dependencies = @() foreach ($serviceDependedOn in $service.ServicesDependedOn) { if ($null -ne $serviceDependedOn -and $null -ne $serviceDependedOn.Name) { $dependencies += $serviceDependedOn.Name.ToString() } else { Write-Warning -Message ($script:localizedData.CorruptDependency -f $Name) } } $startupType = ConvertTo-StartupTypeString -StartMode $serviceCimInstance.StartMode $builtInAccount = switch ($serviceCimInstance.StartName) { 'NT Authority\NetworkService' { 'NetworkService'; break } 'NT Authority\LocalService' { 'LocalService'; break } default { $serviceCimInstance.StartName } } $serviceResource = @{ Name = $Name Ensure = 'Present' Path = $serviceCimInstance.PathName StartupType = $startupType BuiltInAccount = $builtInAccount State = $service.Status.ToString() DisplayName = $service.DisplayName Description = $serviceCimInstance.Description DesktopInteract = $serviceCimInstance.DesktopInteract Dependencies = $dependencies } } else { Write-Verbose -Message ($script:localizedData.ServiceDoesNotExist -f $Name) $serviceResource = @{ Name = $Name Ensure = 'Absent' } } return $serviceResource } <# .SYNOPSIS Creates, modifies, or deletes the service with the given name. .PARAMETER Name The name of the service to create, modify, or delete. This may be different from the service's display name. To retrieve a list of all services with their names and current states, use the Get-Service cmdlet. .PARAMETER Ensure Ensures that the service is present or absent. Defaults to Present. .PARAMETER Path The path to the executable the service should run. Required when creating a service. The user account specified by BuiltInAccount or Credential must have access to this path in order to start the service. .PARAMETER StartupType Indicates the startup type for the service. .PARAMETER BuiltInAccount The built-in account the service should start under. Cannot be specified at the same time as Credential or GroupManagedServiceAccount. The user account specified by this property must have access to the service executable path defined by Path in order to start the service. .PARAMETER GroupManagedServiceAccount The Group Managed Service Account the service should start under. The GMSA must be provided in DOMAIN\gMSA$ format or UPN format gMSA$@domain.fqdn. Cannot be specified at the same time as BuilInAccount or Credential. .PARAMETER DesktopInteract Indicates whether or not the service should be able to communicate with a window on the desktop. Must be false for services not running as LocalSystem. The default value is false. .PARAMETER State The state the service should be in. The default value is Running. To disregard the state that the service is in, specify this property as Ignore. .PARAMETER DisplayName The display name the service should have. .PARAMETER Description The description the service should have. .PARAMETER Dependencies An array of the names of the dependencies the service should have. .PARAMETER StartupTimeout The time to wait for the service to start in milliseconds. The default value is 30000 (30 seconds). .PARAMETER TerminateTimeout The time to wait for the service to stop in milliseconds. The default value is 30000 (30 seconds). .PARAMETER Credential The credential of the user account the service should start under. Cannot be specified at the same time as BuiltInAccount. The user specified by this credential will automatically be granted the Log on as a Service right. The user account specified by this property must have access to the service executable path defined by Path in order to start the service. .NOTES SupportsShouldProcess is enabled because Invoke-CimMethod calls ShouldProcess. Here are the paths through which Set-TargetResource calls Invoke-CimMethod: Set-TargetResource --> Set-ServicePath --> Invoke-CimMethod --> Set-ServiceProperty --> Set-ServiceDependency --> Invoke-CimMethod --> Set-ServiceAccountProperty --> Invoke-CimMethod --> Set-ServiceStartupType --> Invoke-CimMethod #> function Set-TargetResource { [CmdletBinding(SupportsShouldProcess = $true)] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Name, [Parameter()] [ValidateSet('Present', 'Absent')] [System.String] $Ensure = 'Present', [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $Path, [Parameter()] [ValidateSet('Automatic', 'Manual', 'Disabled')] [System.String] $StartupType, [Parameter()] [ValidateSet('LocalSystem', 'LocalService', 'NetworkService')] [System.String] $BuiltInAccount, [Parameter()] [System.String] $GroupManagedServiceAccount, [Parameter()] [ValidateSet('Running', 'Stopped', 'Ignore')] [System.String] $State = 'Running', [Parameter()] [System.Boolean] $DesktopInteract = $false, [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $DisplayName, [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $Description, [Parameter()] [System.String[]] [AllowEmptyCollection()] $Dependencies, [Parameter()] [System.UInt32] $StartupTimeout = 30000, [Parameter()] [System.UInt32] $TerminateTimeout = 30000, [Parameter()] [ValidateNotNull()] [System.Management.Automation.PSCredential] [System.Management.Automation.Credential()] $Credential ) if ($PSBoundParameters.ContainsKey('StartupType')) { Assert-NoStartupTypeStateConflict -ServiceName $Name -StartupType $StartupType -State $State } if (($PSBoundParameters.ContainsKey('BuiltInAccount') -and $PSBoundParameters.ContainsKey('Credential')) -or ($PSBoundParameters.ContainsKey('BuiltInAccount') -and $PSBoundParameters.ContainsKey('GroupManagedServiceAccount')) -or ($PSBoundParameters.ContainsKey('GroupManagedServiceAccount') -and $PSBoundParameters.ContainsKey('Credential')) ) { $errorMessage = $script:localizedData.CredentialParametersAreMutallyExclusive -f $Name New-InvalidArgumentException -ArgumentName 'BuiltInAccount / Credential / GroupManagedServiceAccount' -Message $errorMessage } $service = Get-Service -Name $Name -ErrorAction 'SilentlyContinue' if ($Ensure -eq 'Absent') { if ($null -eq $service) { Write-Verbose -Message $script:localizedData.ServiceAlreadyAbsent } else { Write-Verbose -Message ($script:localizedData.RemovingService -f $Name) Stop-ServiceWithTimeout -ServiceName $Name -TerminateTimeout $TerminateTimeout Remove-ServiceWithTimeout -Name $Name -TerminateTimeout $TerminateTimeout } } else { $serviceRestartNeeded = $false # Create new service or update the service path if needed if ($null -eq $service) { if ($PSBoundParameters.ContainsKey('Path')) { Write-Verbose -Message ($script:localizedData.CreatingService -f $Name, $Path) $null = New-Service -Name $Name -BinaryPathName $Path } else { $errorMessage = $script:localizedData.ServiceDoesNotExistPathMissingError -f $Name New-InvalidArgumentException -ArgumentName 'Path' -Message $errorMessage } } else { if ($PSBoundParameters.ContainsKey('Path')) { $serviceRestartNeeded = Set-ServicePath -ServiceName $Name -Path $Path } } # Update the properties of the service if needed $setServicePropertyParameters = @{} $servicePropertyParameterNames = @( 'StartupType', 'BuiltInAccount', 'Credential', 'GroupManagedServiceAccount', 'DesktopInteract', 'DisplayName', 'Description', 'Dependencies' ) foreach ($servicePropertyParameterName in $servicePropertyParameterNames) { if ($PSBoundParameters.ContainsKey($servicePropertyParameterName)) { $setServicePropertyParameters[$servicePropertyParameterName] = $PSBoundParameters[$servicePropertyParameterName] } } if ($setServicePropertyParameters.Count -gt 0) { Write-Verbose -Message ($script:localizedData.EditingServiceProperties -f $Name) Set-ServiceProperty -ServiceName $Name @setServicePropertyParameters } # Update service state if needed if ($State -eq 'Stopped') { Stop-ServiceWithTimeout -ServiceName $Name -TerminateTimeout $TerminateTimeout } elseif ($State -eq 'Running') { if ($serviceRestartNeeded) { Write-Verbose -Message ($script:localizedData.RestartingService -f $Name) Stop-ServiceWithTimeout -ServiceName $Name -TerminateTimeout $TerminateTimeout } Start-ServiceWithTimeout -ServiceName $Name -StartupTimeout $StartupTimeout } } } <# .SYNOPSIS Tests if the service with the given name has the specified property values. .PARAMETER Name The name of the service to test. This may be different from the service's display name. To retrieve a list of all services with their names and current states, use the Get-Service cmdlet. .PARAMETER Ensure Ensures that the service is present or absent. Defaults to Present. .PARAMETER Path The path to the executable the service should be running. .PARAMETER StartupType Indicates the startup type for the service. .PARAMETER BuiltInAccount The built-in account the service should start under. Cannot be specified at the same time as Credential or GroupManagedServiceAccount. .PARAMETER GroupManagedServiceAccount The Group Managed Service Account the service should start under. The GMSA must be provided in DOMAIN\gMSA$ format or UPN format gMSA$@domain.fqdn. Cannot be specified at the same time as BuilInAccount or Credential. .PARAMETER DesktopInteract Indicates whether or not the service should be able to communicate with a window on the desktop. Should be false for services not running as LocalSystem. The default value is false. .PARAMETER State The state the service should be in. The default value is Running. To disregard the state that the service is in, specify this property as Ignore. .PARAMETER DisplayName The display name the service should have. .PARAMETER Description The description the service should have. .PARAMETER Dependencies An array of the names of the dependencies the service should have. .PARAMETER StartupTimeout Not used in Test-TargetResource. .PARAMETER TerminateTimeout Not used in Test-TargetResource. .PARAMETER Credential The credential the service should be running under. Cannot be specified at the same time as BuiltInAccount. #> function Test-TargetResource { [OutputType([System.Boolean])] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Name, [Parameter()] [ValidateSet('Present', 'Absent')] [System.String] $Ensure = 'Present', [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $Path, [Parameter()] [ValidateSet('Automatic', 'Manual', 'Disabled')] [System.String] $StartupType, [Parameter()] [ValidateSet('LocalSystem', 'LocalService', 'NetworkService')] [System.String] $BuiltInAccount, [Parameter()] [System.String] $GroupManagedServiceAccount, [Parameter()] [System.Boolean] $DesktopInteract = $false, [Parameter()] [ValidateSet('Running', 'Stopped', 'Ignore')] [System.String] $State = 'Running', [Parameter()] [ValidateNotNull()] [System.String] $DisplayName, [Parameter()] [System.String] [AllowEmptyString()] $Description, [Parameter()] [System.String[]] [AllowEmptyCollection()] $Dependencies, [Parameter()] [System.UInt32] $StartupTimeout = 30000, [Parameter()] [System.UInt32] $TerminateTimeout = 30000, [Parameter()] [ValidateNotNull()] [System.Management.Automation.PSCredential] [System.Management.Automation.Credential()] $Credential ) if ($PSBoundParameters.ContainsKey('StartupType')) { Assert-NoStartupTypeStateConflict -ServiceName $Name -StartupType $StartupType -State $State } if (($PSBoundParameters.ContainsKey('BuiltInAccount') -and $PSBoundParameters.ContainsKey('Credential')) -or ($PSBoundParameters.ContainsKey('BuiltInAccount') -and $PSBoundParameters.ContainsKey('GroupManagedServiceAccount')) -or ($PSBoundParameters.ContainsKey('GroupManagedServiceAccount') -and $PSBoundParameters.ContainsKey('Credential')) ) { $errorMessage = $script:localizedData.CredentialParametersAreMutallyExclusive -f $Name New-InvalidArgumentException -ArgumentName 'BuiltInAccount / Credential / GroupManagedServiceAccount' -Message $errorMessage } $serviceResource = Get-TargetResource -Name $Name if ($serviceResource.Ensure -eq 'Absent') { Write-Verbose -Message ($script:localizedData.ServiceDoesNotExist -f $Name) if ($StartupType -eq 'Disabled') { return $true } return ($Ensure -eq 'Absent') } else { Write-Verbose -Message ($script:localizedData.ServiceExists -f $Name) if ($Ensure -eq 'Absent') { return $false } # Check the service path if ($PSBoundParameters.ContainsKey('Path')) { $pathsMatch = Test-PathsMatch -ExpectedPath $Path -ActualPath $serviceResource.Path if (-not $pathsMatch) { Write-Verbose -Message ($script:localizedData.ServicePathDoesNotMatch -f $Name, $Path, $serviceResource.Path) return $false } } # Check the service display name if ($PSBoundParameters.ContainsKey('DisplayName') -and $serviceResource.DisplayName -ine $DisplayName) { Write-Verbose -Message ($script:localizedData.ServicePropertyDoesNotMatch -f 'DisplayName', $Name, $DisplayName, $serviceResource.DisplayName) return $false } # Check the service description if ($PSBoundParameters.ContainsKey('Description') -and $serviceResource.Description -ine $Description) { Write-Verbose -Message ($script:localizedData.ServicePropertyDoesNotMatch -f 'Description', $Name, $Description, $serviceResource.Description) return $false } # Check the service dependencies if ($PSBoundParameters.ContainsKey('Dependencies')) { $serviceDependenciesDoNotMatch = $false if ($null -eq $serviceResource.Dependencies -xor $null -eq $Dependencies) { $serviceDependenciesDoNotMatch = $true } elseif ($null -ne $serviceResource.Dependencies -and $null -ne $Dependencies) { $mismatchedDependencies = Compare-Object -ReferenceObject $serviceResource.Dependencies -DifferenceObject $Dependencies $serviceDependenciesDoNotMatch = $null -ne $mismatchedDependencies } if ($serviceDependenciesDoNotMatch) { $expectedDependenciesString = $Dependencies -join ',' $actualDependenciesString = $serviceResource.Dependencies -join ',' Write-Verbose -Message ($script:localizedData.ServicePropertyDoesNotMatch -f 'Dependencies', $Name, $expectedDependenciesString, $actualDependenciesString) return $false } } # Check the service desktop interation setting if ($PSBoundParameters.ContainsKey('DesktopInteract') -and $serviceResource.DesktopInteract -ine $DesktopInteract) { Write-Verbose -Message ($script:localizedData.ServicePropertyDoesNotMatch -f 'DesktopInteract', $Name, $DesktopInteract, $serviceResource.DesktopInteract) return $false } # Check the service account properties if ($PSBoundParameters.ContainsKey('BuiltInAccount') -and $serviceResource.BuiltInAccount -ine $BuiltInAccount) { Write-Verbose -Message ($script:localizedData.ServicePropertyDoesNotMatch -f 'BuiltInAccount', $Name, $BuiltInAccount, $serviceResource.BuiltInAccount) return $false } elseif ($PSBoundParameters.ContainsKey('GroupManagedServiceAccount')) { $expectedStartName = ConvertTo-StartName -Username $GroupManagedServiceAccount if ($serviceResource.BuiltInAccount -ine $expectedStartName) { Write-Verbose -Message ($script:localizedData.GroupManagedServiceCredentialDoesNotMatch -f $Name, $GroupManagedServiceAccount, $serviceResource.BuiltInAccount) return $false } } elseif ($PSBoundParameters.ContainsKey('Credential')) { $expectedStartName = ConvertTo-StartName -Username $Credential.UserName if ($serviceResource.BuiltInAccount -ine $expectedStartName) { Write-Verbose -Message ($script:localizedData.ServiceCredentialDoesNotMatch -f $Name, $Credential.UserName, $serviceResource.BuiltInAccount) return $false } } # Check the service startup type if ($PSBoundParameters.ContainsKey('StartupType') -and $serviceResource.StartupType -ine $StartupType) { Write-Verbose -Message ($script:localizedData.ServicePropertyDoesNotMatch -f 'StartupType', $Name, $StartupType, $serviceResource.StartupType) return $false } # Check the service state if ($State -ne 'Ignore' -and $serviceResource.State -ine $State) { Write-Verbose -Message ($script:localizedData.ServicePropertyDoesNotMatch -f 'State', $Name, $State, $serviceResource.State) return $false } } return $true } <# .SYNOPSIS Retrieves the CIM instance of the service with the given name. .PARAMETER ServiceName The name of the service to get the CIM instance of. #> function Get-ServiceCimInstance { [OutputType([Microsoft.Management.Infrastructure.CimInstance])] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullorEmpty()] $ServiceName ) return Get-CimInstance -ClassName 'Win32_Service' -Filter "Name='$ServiceName'" } <# .SYNOPSIS Converts the StartMode value returned in a CIM instance of a service to the format expected by this resource. .PARAMETER StartMode The StartMode value to convert. #> function ConvertTo-StartupTypeString { [OutputType([System.String])] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateSet('Auto', 'Manual', 'Disabled')] [System.String] $StartMode ) if ($StartMode -eq 'Auto') { return 'Automatic' } return $StartMode } <# .SYNOPSIS Throws an invalid argument error if the given service startup type conflicts with the given service state. .PARAMETER ServiceName The name of the service for the error message. .PARAMETER StartupType The service startup type to check. .PARAMETER State The service state to check. #> function Assert-NoStartupTypeStateConflict { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ServiceName, [Parameter(Mandatory = $true)] [ValidateSet('Automatic', 'Manual', 'Disabled')] [System.String] $StartupType, [Parameter(Mandatory = $true)] [ValidateSet('Running', 'Stopped', 'Ignore')] [System.String] $State ) if ($State -eq 'Stopped') { if ($StartupType -eq 'Automatic') { # Cannot stop a service and set it to start automatically at the same time $errorMessage = $script:localizedData.StartupTypeStateConflict -f $ServiceName, $StartupType, $State New-InvalidArgumentException -ArgumentName 'StartupType and State' -Message $errorMessage } } elseif ($State -eq 'Running') { if ($StartupType -eq 'Disabled') { # Cannot start a service and disable it at the same time $errorMessage = $script:localizedData.StartupTypeStateConflict -f $ServiceName, $StartupType, $State New-InvalidArgumentException -ArgumentName 'StartupType and State' -Message $errorMessage } } } <# .SYNOPSIS Tests if the two given paths match. .PARAMETER ExpectedPath The expected path to test against. .PARAMETER ActualPath The actual path to test. #> function Test-PathsMatch { [OutputType([System.Boolean])] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ExpectedPath, [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ActualPath ) return (0 -eq [System.String]::Compare($ExpectedPath, $ActualPath, [System.Globalization.CultureInfo]::CurrentUICulture)) } <# .SYNOPSIS Converts the given username to the string version of it that would be expected in a service's StartName property. .PARAMETER Username The username to convert. #> function ConvertTo-StartName { [OutputType([System.String])] [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Username ) $startName = $Username if ($Username -ieq 'NetworkService' -or $Username -ieq 'LocalService') { $startName = "NT Authority\$Username" } elseif (-not $Username.Contains('\') -and -not $Username.Contains('@')) { $startName = ".\$Username" } elseif ($Username.StartsWith("$env:computerName\")) { $startName = $Username.Replace($env:computerName, '.') } return $startName } <# .SYNOPSIS Sets the executable path of the service with the given name. Returns a boolean specifying whether a restart is needed or not. .PARAMETER ServiceName The name of the service to set the path of. .PARAMETER Path The path to set for the service. .NOTES SupportsShouldProcess is enabled because Invoke-CimMethod calls ShouldProcess. This function calls Invoke-CimMethod directly. #> function Set-ServicePath { [OutputType([System.Boolean])] [CmdletBinding(SupportsShouldProcess = $true)] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ServiceName, [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Path ) $serviceCimInstance = Get-ServiceCimInstance -ServiceName $ServiceName $pathsMatch = Test-PathsMatch -ExpectedPath $Path -ActualPath $serviceCimInstance.PathName if ($pathsMatch) { Write-Verbose -Message ($script:localizedData.ServicePathMatches -f $ServiceName) return $false } else { Write-Verbose -Message ($script:localizedData.ServicePathDoesNotMatch -f $ServiceName) $changeServiceArguments = @{ PathName = $Path } $changeServiceResult = Invoke-CimMethod ` -InputObject $serviceCimInstance ` -MethodName 'Change' ` -Arguments $changeServiceArguments if ($changeServiceResult.ReturnValue -ne 0) { $serviceChangePropertyString = $changeServiceArguments.Keys -join ', ' $errorMessage = $script:localizedData.InvokeCimMethodFailed -f 'Change', $ServiceName, $serviceChangePropertyString, $changeServiceResult.ReturnValue New-InvalidArgumentException -ArgumentName 'Path' -Message $errorMessage } return $true } } <# .SYNOPSIS Sets the dependencies of the service with the given name. .PARAMETER ServiceName The name of the service to set the dependencies of. .PARAMETER Dependencies The names of the dependencies to set for the service. .NOTES SupportsShouldProcess is enabled because Invoke-CimMethod calls ShouldProcess. This function calls Invoke-CimMethod directly. #> function Set-ServiceDependency { [CmdletBinding(SupportsShouldProcess = $true)] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ServiceName, [Parameter(Mandatory = $true)] [System.String[]] [AllowEmptyCollection()] $Dependencies ) $service = Get-Service -Name $ServiceName -ErrorAction 'SilentlyContinue' $serviceDependenciesMatch = $true $noActualServiceDependencies = $null -eq $service.ServicesDependedOn -or 0 -eq $service.ServicesDependedOn.Count $noExpectedServiceDependencies = $null -eq $Dependencies -or 0 -eq $Dependencies.Count if ($noActualServiceDependencies -xor $noExpectedServiceDependencies) { $serviceDependenciesMatch = $false } elseif (-not $noActualServiceDependencies -and -not $noExpectedServiceDependencies) { $mismatchedDependencies = Compare-Object -ReferenceObject $service.ServicesDependedOn.Name -DifferenceObject $Dependencies $serviceDependenciesMatch = $null -eq $mismatchedDependencies } if ($serviceDependenciesMatch) { Write-Verbose -Message ($script:localizedData.ServiceDepdenciesMatch -f $ServiceName) } else { Write-Verbose -Message ($script:localizedData.ServiceDepdenciesDoNotMatch -f $ServiceName) $serviceCimInstance = Get-ServiceCimInstance -ServiceName $ServiceName $changeServiceArguments = @{ ServiceDependencies = $Dependencies } $changeServiceResult = Invoke-CimMethod ` -InputObject $serviceCimInstance ` -MethodName 'Change' ` -Arguments $changeServiceArguments if ($changeServiceResult.ReturnValue -ne 0) { $serviceChangePropertyString = $changeServiceArguments.Keys -join ', ' $errorMessage = $script:localizedData.InvokeCimMethodFailed -f 'Change', $ServiceName, $serviceChangePropertyString, $changeServiceResult.ReturnValue New-InvalidArgumentException -Message $errorMessage -ArgumentName 'Dependencies' } } } <# .SYNOPSIS Grants the 'Log on as a service' right to the user with the given username. .PARAMETER Username The username of the user to grant 'Log on as a service' right to #> function Grant-LogOnAsServiceRight { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Username ) $logOnAsServiceText = @" namespace LogOnAsServiceHelper { using Microsoft.Win32.SafeHandles; using System; using System.Runtime.ConstrainedExecution; using System.Runtime.InteropServices; using System.Security; public class NativeMethods { #region constants // from ntlsa.h private const int POLICY_LOOKUP_NAMES = 0x00000800; private const int POLICY_CREATE_ACCOUNT = 0x00000010; private const uint ACCOUNT_ADJUST_SYSTEM_ACCESS = 0x00000008; private const uint ACCOUNT_VIEW = 0x00000001; private const uint SECURITY_ACCESS_SERVICE_LOGON = 0x00000010; // from LsaUtils.h private const uint STATUS_OBJECT_NAME_NOT_FOUND = 0xC0000034; // from lmcons.h private const int UNLEN = 256; private const int DNLEN = 15; // Extra characteres for '\', '@' etc. private const int EXTRA_LENGTH = 3; #endregion constants #region interop structures /// <summary> /// Used to open a policy, but not containing anything meaqningful /// </summary> [StructLayout(LayoutKind.Sequential)] private struct LSA_OBJECT_ATTRIBUTES { public UInt32 Length; public IntPtr RootDirectory; public IntPtr ObjectName; public UInt32 Attributes; public IntPtr SecurityDescriptor; public IntPtr SecurityQualityOfService; public void Initialize() { this.Length = 0; this.RootDirectory = IntPtr.Zero; this.ObjectName = IntPtr.Zero; this.Attributes = 0; this.SecurityDescriptor = IntPtr.Zero; this.SecurityQualityOfService = IntPtr.Zero; } } /// <summary> /// LSA string /// </summary> [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] private struct LSA_UNICODE_STRING { internal ushort Length; internal ushort MaximumLength; [MarshalAs(UnmanagedType.LPWStr)] internal string Buffer; internal void Set(string src) { this.Buffer = src; this.Length = (ushort)(src.Length * sizeof(char)); this.MaximumLength = (ushort)(this.Length + sizeof(char)); } } /// <summary> /// Structure used as the last parameter for LSALookupNames /// </summary> [StructLayout(LayoutKind.Sequential)] private struct LSA_TRANSLATED_SID2 { public uint Use; public IntPtr SID; public int DomainIndex; public uint Flags; }; #endregion interop structures #region safe handles /// <summary> /// Handle for LSA objects including Policy and Account /// </summary> private class LsaSafeHandle : SafeHandleZeroOrMinusOneIsInvalid { [DllImport("advapi32.dll")] private static extern uint LsaClose(IntPtr ObjectHandle); /// <summary> /// Prevents a default instance of the LsaPolicySafeHAndle class from being created. /// </summary> private LsaSafeHandle(): base(true) { } /// <summary> /// Calls NativeMethods.CloseHandle(handle) /// </summary> /// <returns>the return of NativeMethods.CloseHandle(handle)</returns> [ReliabilityContract(Consistency.WillNotCorruptState, Cer.MayFail)] protected override bool ReleaseHandle() { long returnValue = LsaSafeHandle.LsaClose(this.handle); return returnValue != 0; } } /// <summary> /// Handle for IntPtrs returned from Lsa calls that have to be freed with /// LsaFreeMemory /// </summary> private class SafeLsaMemoryHandle : SafeHandleZeroOrMinusOneIsInvalid { [DllImport("advapi32")] internal static extern int LsaFreeMemory(IntPtr Buffer); private SafeLsaMemoryHandle() : base(true) { } private SafeLsaMemoryHandle(IntPtr handle) : base(true) { SetHandle(handle); } private static SafeLsaMemoryHandle InvalidHandle { get { return new SafeLsaMemoryHandle(IntPtr.Zero); } } override protected bool ReleaseHandle() { return SafeLsaMemoryHandle.LsaFreeMemory(handle) == 0; } internal IntPtr Memory { get { return this.handle; } } } #endregion safe handles #region interop function declarations /// <summary> /// Opens LSA Policy /// </summary> [DllImport("advapi32.dll", SetLastError = true, PreserveSig = true)] private static extern uint LsaOpenPolicy( IntPtr SystemName, ref LSA_OBJECT_ATTRIBUTES ObjectAttributes, uint DesiredAccess, out LsaSafeHandle PolicyHandle ); /// <summary> /// Convert the name into a SID which is used in remaining calls /// </summary> [DllImport("advapi32", CharSet = CharSet.Unicode, SetLastError = true), SuppressUnmanagedCodeSecurityAttribute] private static extern uint LsaLookupNames2( LsaSafeHandle PolicyHandle, uint Flags, uint Count, LSA_UNICODE_STRING[] Names, out SafeLsaMemoryHandle ReferencedDomains, out SafeLsaMemoryHandle Sids ); /// <summary> /// Opens the LSA account corresponding to the user's SID /// </summary> [DllImport("advapi32.dll", SetLastError = true, PreserveSig = true)] private static extern uint LsaOpenAccount( LsaSafeHandle PolicyHandle, IntPtr Sid, uint Access, out LsaSafeHandle AccountHandle); /// <summary> /// Creates an LSA account corresponding to the user's SID /// </summary> [DllImport("advapi32.dll", SetLastError = true, PreserveSig = true)] private static extern uint LsaCreateAccount( LsaSafeHandle PolicyHandle, IntPtr Sid, uint Access, out LsaSafeHandle AccountHandle); /// <summary> /// Gets the LSA Account access /// </summary> [DllImport("advapi32.dll", SetLastError = true, PreserveSig = true)] private static extern uint LsaGetSystemAccessAccount( LsaSafeHandle AccountHandle, out uint SystemAccess); /// <summary> /// Sets the LSA Account access /// </summary> [DllImport("advapi32.dll", SetLastError = true, PreserveSig = true)] private static extern uint LsaSetSystemAccessAccount( LsaSafeHandle AccountHandle, uint SystemAccess); #endregion interop function declarations /// <summary> /// Sets the Log On As A Service Policy for <paramref name="userName"/>, if not already set. /// </summary> /// <param name="userName">the user name we want to allow logging on as a service</param> /// <exception cref="ArgumentNullException">If the <paramref name="userName"/> is null or empty.</exception> /// <exception cref="InvalidOperationException">In the following cases: /// Failure opening the LSA Policy. /// The <paramref name="userName"/> is too large. /// Failure looking up the user name. /// Failure opening LSA account (other than account not found). /// Failure creating LSA account. /// Failure getting LSA account policy access. /// Failure setting LSA account policy access. /// </exception> public static void SetLogOnAsServicePolicy(string userName) { if (String.IsNullOrEmpty(userName)) { throw new ArgumentNullException("userName"); } LSA_OBJECT_ATTRIBUTES objectAttributes = new LSA_OBJECT_ATTRIBUTES(); objectAttributes.Initialize(); // All handles are delcared in advance so they can be closed on finally LsaSafeHandle policyHandle = null; SafeLsaMemoryHandle referencedDomains = null; SafeLsaMemoryHandle sids = null; LsaSafeHandle accountHandle = null; try { uint status = LsaOpenPolicy( IntPtr.Zero, ref objectAttributes, POLICY_LOOKUP_NAMES | POLICY_CREATE_ACCOUNT, out policyHandle); if (status != 0) { throw new InvalidOperationException("CannotOpenPolicyErrorMessage"); } // Unicode strings have a maximum length of 32KB. We don't want to create // LSA strings with more than that. User lengths are much smaller so this check // ensures userName's length is useful if (userName.Length > UNLEN + DNLEN + EXTRA_LENGTH) { throw new InvalidOperationException("UserNameTooLongErrorMessage"); } LSA_UNICODE_STRING lsaUserName = new LSA_UNICODE_STRING(); lsaUserName.Set(userName); LSA_UNICODE_STRING[] names = new LSA_UNICODE_STRING[1]; names[0].Set(userName); status = LsaLookupNames2( policyHandle, 0, 1, new LSA_UNICODE_STRING[] { lsaUserName }, out referencedDomains, out sids); if (status != 0) { throw new InvalidOperationException("CannotLookupNamesErrorMessage"); } LSA_TRANSLATED_SID2 sid = (LSA_TRANSLATED_SID2)Marshal.PtrToStructure(sids.Memory, typeof(LSA_TRANSLATED_SID2)); status = LsaOpenAccount(policyHandle, sid.SID, ACCOUNT_VIEW | ACCOUNT_ADJUST_SYSTEM_ACCESS, out accountHandle); uint currentAccess = 0; if (status == 0) { status = LsaGetSystemAccessAccount(accountHandle, out currentAccess); if (status != 0) { throw new InvalidOperationException("CannotGetAccountAccessErrorMessage"); } } else if (status == STATUS_OBJECT_NAME_NOT_FOUND) { status = LsaCreateAccount( policyHandle, sid.SID, ACCOUNT_ADJUST_SYSTEM_ACCESS, out accountHandle); if (status != 0) { throw new InvalidOperationException("CannotCreateAccountAccessErrorMessage"); } } else { throw new InvalidOperationException("CannotOpenAccountErrorMessage"); } if ((currentAccess & SECURITY_ACCESS_SERVICE_LOGON) == 0) { status = LsaSetSystemAccessAccount( accountHandle, currentAccess | SECURITY_ACCESS_SERVICE_LOGON); if (status != 0) { throw new InvalidOperationException("CannotSetAccountAccessErrorMessage"); } } } finally { if (policyHandle != null) { policyHandle.Close(); } if (referencedDomains != null) { referencedDomains.Close(); } if (sids != null) { sids.Close(); } if (accountHandle != null) { accountHandle.Close(); } } } } } "@ try { $null = [LogOnAsServiceHelper.NativeMethods] } catch { $logOnAsServiceText = $logOnAsServiceText.Replace('CannotOpenPolicyErrorMessage', ` $script:localizedData.CannotOpenPolicyErrorMessage) $logOnAsServiceText = $logOnAsServiceText.Replace('UserNameTooLongErrorMessage', ` $script:localizedData.UserNameTooLongErrorMessage) $logOnAsServiceText = $logOnAsServiceText.Replace('CannotLookupNamesErrorMessage', ` $script:localizedData.CannotLookupNamesErrorMessage) $logOnAsServiceText = $logOnAsServiceText.Replace('CannotOpenAccountErrorMessage', ` $script:localizedData.CannotOpenAccountErrorMessage) $logOnAsServiceText = $logOnAsServiceText.Replace('CannotCreateAccountAccessErrorMessage', ` $script:localizedData.CannotCreateAccountAccessErrorMessage) $logOnAsServiceText = $logOnAsServiceText.Replace('CannotGetAccountAccessErrorMessage', ` $script:localizedData.CannotGetAccountAccessErrorMessage) $logOnAsServiceText = $logOnAsServiceText.Replace('CannotSetAccountAccessErrorMessage', ` $script:localizedData.CannotSetAccountAccessErrorMessage) $null = Add-Type $logOnAsServiceText -PassThru } if ($Username.StartsWith('.\')) { $Username = $Username.Substring(2) } try { [LogOnAsServiceHelper.NativeMethods]::SetLogOnAsServicePolicy($Username) } catch { $errorMessage = $script:localizedData.ErrorSettingLogOnAsServiceRightsForUser -f $Username, $_.Exception.Message New-InvalidOperationException -Message $errorMessage } } <# .SYNOPSIS Sets the service properties involving the account the service is running under. (StartName, StartPassword, DesktopInteract) .PARAMETER ServiceName The name of the service to change the start name of. .PARAMETER BuiltInAccount The name of the built-in account to run the service under. This value will overwrite the Credential value if Credential is also declared. .PARAMETER Credential The user credential to run the service under. BuiltInAccount will overwrite this value if BuiltInAccount is also declared. .PARAMETER DesktopInteract Indicates whether or not the service should be able to communicate with a window on the desktop. Must be false for services not running as LocalSystem. .NOTES DesktopInteract is included here because it can only be enabled when the service startup account name is LocalSystem. In order not to run into a conflict where one property has been updated before the other, both are updated here at the same time. SupportsShouldProcess is enabled because Invoke-CimMethod calls ShouldProcess. This function calls Invoke-CimMethod directly. #> function Set-ServiceAccountProperty { [CmdletBinding(SupportsShouldProcess = $true)] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ServiceName, [Parameter()] [System.String] [ValidateSet('LocalSystem', 'LocalService', 'NetworkService')] $BuiltInAccount, [Parameter()] [System.String] $GroupManagedServiceAccount, [Parameter()] [System.Management.Automation.PSCredential] [System.Management.Automation.Credential()] $Credential, [Parameter()] [System.Boolean] $DesktopInteract ) $serviceCimInstance = Get-ServiceCimInstance -ServiceName $ServiceName $changeServiceArguments = @{} if ($PSBoundParameters.ContainsKey('BuiltInAccount')) { $startName = ConvertTo-StartName -Username $BuiltInAccount if ($serviceCimInstance.StartName -ine $startName) { $changeServiceArguments['StartName'] = $startName $changeServiceArguments['StartPassword'] = '' } } elseif ($PSBoundParameters.ContainsKey('GroupManagedServiceAccount')) { $startName = ConvertTo-StartName -Username $GroupManagedServiceAccount if ($serviceCimInstance.StartName -ine $startName) { Grant-LogOnAsServiceRight -Username $startName $changeServiceArguments['StartName'] = $startName } } elseif ($PSBoundParameters.ContainsKey('Credential')) { $startName = ConvertTo-StartName -Username $Credential.UserName if ($serviceCimInstance.StartName -ine $startName) { Grant-LogOnAsServiceRight -Username $startName $changeServiceArguments['StartName'] = $startName $changeServiceArguments['StartPassword'] = $Credential.GetNetworkCredential().Password } } if ($PSBoundParameters.ContainsKey('DesktopInteract')) { if ($serviceCimInstance.DesktopInteract -ne $DesktopInteract) { $changeServiceArguments['DesktopInteract'] = $DesktopInteract } } if ($changeServiceArguments.Count -gt 0) { $changeServiceResult = Invoke-CimMethod -InputObject $ServiceCimInstance -MethodName 'Change' -Arguments $changeServiceArguments if ($changeServiceResult.ReturnValue -ne 0) { $serviceChangePropertyString = $changeServiceArguments.Keys -join ', ' $errorMessage = $script:localizedData.InvokeCimMethodFailed -f 'Change', $ServiceName, $serviceChangePropertyString, $changeServiceResult.ReturnValue New-InvalidArgumentException -ArgumentName 'BuiltInAccount, Credential, or DesktopInteract' -Message $errorMessage } } } <# .SYNOPSIS Sets the startup type of the service with the given name. .PARAMETER ServiceName The name of the service to set the startup type of. .PARAMETER StartupType The startup type value to set for the service. .NOTES SupportsShouldProcess is enabled because Invoke-CimMethod calls ShouldProcess. This function calls Invoke-CimMethod directly. #> function Set-ServiceStartupType { [CmdletBinding(SupportsShouldProcess = $true)] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ServiceName, [Parameter(Mandatory = $true)] [ValidateSet('Automatic', 'Manual', 'Disabled')] [System.String] $StartupType ) $serviceCimInstance = Get-ServiceCimInstance -ServiceName $ServiceName $serviceStartupType = ConvertTo-StartupTypeString -StartMode $serviceCimInstance.StartMode if ($serviceStartupType -ieq $StartupType) { Write-Verbose -Message ($script:localizedData.ServiceStartupTypeMatches -f $ServiceName) } else { Write-Verbose -Message ($script:localizedData.ServiceStartupTypeDoesNotMatch -f $ServiceName) $changeServiceArguments = @{ StartMode = $StartupType } $changeResult = Invoke-CimMethod ` -InputObject $serviceCimInstance ` -MethodName 'Change' ` -Arguments $changeServiceArguments if ($changeResult.ReturnValue -ne 0) { $serviceChangePropertyString = $changeServiceArguments.Keys -join ', ' $errorMessage = $script:localizedData.InvokeCimMethodFailed -f 'Change', $ServiceName, $serviceChangePropertyString, $changeResult.ReturnValue New-InvalidArgumentException -ArgumentName 'StartupType' -Message $errorMessage } } } <# .SYNOPSIS Sets the service with the given name to have the specified properties. .PARAMETER Name The name of the service to set the properties of. .PARAMETER DisplayName The display name the service should have. .PARAMETER Description The description the service should have. .PARAMETER Dependencies The names of the dependencies the service should have. .PARAMETER BuiltInAccount The built-in account the service should start under. Cannot be specified at the same time as Credential or GroupManagedServiceAccount. .PARAMETER GroupManagedServiceAccount The Group Managed Service Account that is used to run the service. Cannot be specified at the same time as BuiltInAccount or Credential. .PARAMETER Credential The credential of the user account the service should start under. Cannot be specified at the same time as BuiltInAccount or GroupManagedServiceAccount. The user specified by this credential will automatically be granted the Log on as a Service right. .PARAMETER DesktopInteract Indicates whether or not the service should be able to communicate with a window on the desktop. .PARAMETER StartupType The startup type the service should have. .NOTES SupportsShouldProcess is enabled because Invoke-CimMethod calls ShouldProcess. Here are the paths through which Set-ServiceProperty calls Invoke-CimMethod: Set-ServiceProperty --> Set-ServiceDependency --> Invoke-CimMethod --> Set-ServieceAccountProperty --> Invoke-CimMethod --> Set-ServiceStartupType --> Invoke-CimMethod #> function Set-ServiceProperty { [CmdletBinding(SupportsShouldProcess = $true)] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ServiceName, [Parameter()] [ValidateSet('Automatic', 'Manual', 'Disabled')] [System.String] $StartupType, [Parameter()] [ValidateSet('LocalSystem', 'LocalService', 'NetworkService')] [System.String] $BuiltInAccount, [Parameter()] [System.String] $GroupManagedServiceAccount, [Parameter()] [System.Boolean] $DesktopInteract, [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $DisplayName, [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $Description, [Parameter()] [System.String[]] [AllowEmptyCollection()] $Dependencies, [Parameter()] [ValidateNotNull()] [System.Management.Automation.PSCredential] [System.Management.Automation.Credential()] $Credential ) # Update display name and/or description if needed $serviceCimInstance = Get-ServiceCimInstance -ServiceName $ServiceName $setServiceParameters = @{} if ($PSBoundParameters.ContainsKey('DisplayName') -and $serviceCimInstance.DisplayName -ine $DisplayName) { $setServiceParameters['DisplayName'] = $DisplayName } if ($PSBoundParameters.ContainsKey('Description') -and $serviceCimInstance.Description -ine $Description) { $setServiceParameters['Description'] = $Description } if ($setServiceParameters.Count -gt 0) { $null = Set-Service -Name $ServiceName @setServiceParameters } # Update service dependencies if needed if ($PSBoundParameters.ContainsKey('Dependencies')) { Set-ServiceDependency -ServiceName $ServiceName -Dependencies $Dependencies } # Update service account properties if needed $setServiceAccountPropertyParameters = @{} if ($PSBoundParameters.ContainsKey('BuiltInAccount')) { $setServiceAccountPropertyParameters['BuiltInAccount'] = $BuiltInAccount } elseif ($PSBoundParameters.ContainsKey('GroupManagedServiceAccount')) { $setServiceAccountPropertyParameters['GroupManagedServiceAccount'] = $GroupManagedServiceAccount } elseif ($PSBoundParameters.ContainsKey('Credential')) { $setServiceAccountPropertyParameters['Credential'] = $Credential } if ($PSBoundParameters.ContainsKey('DesktopInteract')) { $setServiceAccountPropertyParameters['DesktopInteract'] = $DesktopInteract } if ($setServiceAccountPropertyParameters.Count -gt 0) { Set-ServiceAccountProperty -ServiceName $ServiceName @setServiceAccountPropertyParameters } # Update startup type if ($PSBoundParameters.ContainsKey('StartupType')) { Set-ServiceStartupType -ServiceName $ServiceName -StartupType $StartupType } } <# .SYNOPSIS Deletes the service with the given name. This is a wrapper function for unit testing. .PARAMETER Name The name of the service to delete. #> function Remove-Service { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Name ) & 'sc.exe' 'delete' $Name } <# .SYNOPSIS Deletes the service with the given name and waits for the service to be deleted. .PARAMETER Name The name of the service to delete. .PARAMETER TerminateTimeout The time to wait for the service to be deleted in milliseconds. #> function Remove-ServiceWithTimeout { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Name, [Parameter(Mandatory = $true)] [System.UInt32] $TerminateTimeout ) Remove-Service -Name $Name $serviceDeleted = $false $start = [System.DateTime]::Now while (-not $serviceDeleted -and ([System.DateTime]::Now - $start).TotalMilliseconds -lt $TerminateTimeout) { $service = Get-Service -Name $Name -ErrorAction 'SilentlyContinue' if ($null -eq $service) { $serviceDeleted = $true } else { Write-Verbose -Message ($script:localizedData.WaitingForServiceDeletion -f $Name) Start-Sleep -Seconds 1 } } if ($serviceDeleted) { Write-Verbose -Message ($script:localizedData.ServiceDeletionSucceeded -f $Name) } else { New-InvalidOperationException -Message ($script:localizedData.ServiceDeletionFailed -f $Name) } } <# .SYNOPSIS Waits for the service with the given name to reach the given state within the given time span. This is a wrapper function for unit testing. .PARAMETER ServiceName The name of the service that should be in the given state. .PARAMETER State The state the service should be in. .PARAMETER WaitTimeSpan A time span of how long to wait for the service to reach the desired state. #> function Wait-ServiceStateWithTimeout { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ServiceName, [Parameter(Mandatory = $true)] [System.ServiceProcess.ServiceControllerStatus] $State, [Parameter(Mandatory = $true)] [System.TimeSpan] $WaitTimeSpan ) $service = Get-Service -Name $ServiceName -ErrorAction 'SilentlyContinue' $Service.WaitForStatus($State, $WaitTimeSpan) } <# .SYNOPSIS Starts the service with the given name, if it is not already running, and waits for the service to be running. .PARAMETER ServiceName The name of the service to start. .PARAMETER StartupTimeout The time to wait for the service to be running in milliseconds. #> function Start-ServiceWithTimeout { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ServiceName, [Parameter(Mandatory = $true)] [System.UInt32] $StartupTimeout ) Start-Service -Name $ServiceName $waitTimeSpan = New-Object -TypeName 'TimeSpan' -ArgumentList (0, 0, 0, 0, $StartupTimeout) Wait-ServiceStateWithTimeout -ServiceName $ServiceName -State 'Running' -WaitTimeSpan $waitTimeSpan } <# .SYNOPSIS Stops the service with the given name, if it is not already stopped, and waits for the service to be stopped. .PARAMETER ServiceName The name of the service to stop. .PARAMETER TerminateTimeout The time to wait for the service to be stopped in milliseconds. #> function Stop-ServiceWithTimeout { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ServiceName, [Parameter(Mandatory = $true)] [System.UInt32] $TerminateTimeout ) Stop-Service -Name $ServiceName $waitTimeSpan = New-Object -TypeName 'TimeSpan' -ArgumentList (0, 0, 0, 0, $TerminateTimeout) Wait-ServiceStateWithTimeout -ServiceName $ServiceName -State 'Stopped' -WaitTimeSpan $waitTimeSpan } # SIG # Begin signature block # MIIjYAYJKoZIhvcNAQcCoIIjUTCCI00CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDKJ/7h+I39K3AK # DsBspYoh+fkZ5lp5js4zI8J9A1nn1qCCHVkwggUaMIIEAqADAgECAhADBbuGIbCh # Y1+/3q4SBOdtMA0GCSqGSIb3DQEBCwUAMHIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xMTAvBgNV # BAMTKERpZ2lDZXJ0IFNIQTIgQXNzdXJlZCBJRCBDb2RlIFNpZ25pbmcgQ0EwHhcN # MjAwNTEyMDAwMDAwWhcNMjMwNjA4MTIwMDAwWjBXMQswCQYDVQQGEwJVUzERMA8G # A1UECBMIVmlyZ2luaWExDzANBgNVBAcTBlZpZW5uYTERMA8GA1UEChMIZGJhdG9v # bHMxETAPBgNVBAMTCGRiYXRvb2xzMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB # CgKCAQEAvL9je6vjv74IAbaY5rXqHxaNeNJO9yV0ObDg+kC844Io2vrHKGD8U5hU # iJp6rY32RVprnAFrA4jFVa6P+sho7F5iSVAO6A+QZTHQCn7oquOefGATo43NAadz # W2OWRro3QprMPZah0QFYpej9WaQL9w/08lVaugIw7CWPsa0S/YjHPGKQ+bYgI/kr # EUrk+asD7lvNwckR6pGieWAyf0fNmSoevQBTV6Cd8QiUfj+/qWvLW3UoEX9ucOGX # 2D8vSJxL7JyEVWTHg447hr6q9PzGq+91CO/c9DWFvNMjf+1c5a71fEZ54h1mNom/ # XoWZYoKeWhKnVdv1xVT1eEimibPEfQIDAQABo4IBxTCCAcEwHwYDVR0jBBgwFoAU # WsS5eyoKo6XqcQPAYPkt9mV1DlgwHQYDVR0OBBYEFPDAoPu2A4BDTvsJ193ferHL # 454iMA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzB3BgNVHR8E # cDBuMDWgM6Axhi9odHRwOi8vY3JsMy5kaWdpY2VydC5jb20vc2hhMi1hc3N1cmVk # LWNzLWcxLmNybDA1oDOgMYYvaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL3NoYTIt # YXNzdXJlZC1jcy1nMS5jcmwwTAYDVR0gBEUwQzA3BglghkgBhv1sAwEwKjAoBggr # BgEFBQcCARYcaHR0cHM6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAIBgZngQwBBAEw # gYQGCCsGAQUFBwEBBHgwdjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNl # cnQuY29tME4GCCsGAQUFBzAChkJodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20v # RGlnaUNlcnRTSEEyQXNzdXJlZElEQ29kZVNpZ25pbmdDQS5jcnQwDAYDVR0TAQH/ # BAIwADANBgkqhkiG9w0BAQsFAAOCAQEAj835cJUMH9Y2pBKspjznNJwcYmOxeBcH # Ji+yK0y4bm+j44OGWH4gu/QJM+WjZajvkydJKoJZH5zrHI3ykM8w8HGbYS1WZfN4 # oMwi51jKPGZPw9neGS2PXrBcKjzb7rlQ6x74Iex+gyf8z1ZuRDitLJY09FEOh0BM # LaLh+UvJ66ghmfIyjP/g3iZZvqwgBhn+01fObqrAJ+SagxJ/21xNQJchtUOWIlxR # kuUn9KkuDYrMO70a2ekHODcAbcuHAGI8wzw4saK1iPPhVTlFijHS+7VfIt/d/18p # MLHHArLQQqe1Z0mTfuL4M4xCUKpebkH8rI3Fva62/6osaXLD0ymERzCCBTAwggQY # oAMCAQICEAQJGBtf1btmdVNDtW+VUAgwDQYJKoZIhvcNAQELBQAwZTELMAkGA1UE # BhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2lj # ZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4X # DTEzMTAyMjEyMDAwMFoXDTI4MTAyMjEyMDAwMFowcjELMAkGA1UEBhMCVVMxFTAT # BgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEx # MC8GA1UEAxMoRGlnaUNlcnQgU0hBMiBBc3N1cmVkIElEIENvZGUgU2lnbmluZyBD # QTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPjTsxx/DhGvZ3cH0wsx # SRnP0PtFmbE620T1f+Wondsy13Hqdp0FLreP+pJDwKX5idQ3Gde2qvCchqXYJawO # eSg6funRZ9PG+yknx9N7I5TkkSOWkHeC+aGEI2YSVDNQdLEoJrskacLCUvIUZ4qJ # RdQtoaPpiCwgla4cSocI3wz14k1gGL6qxLKucDFmM3E+rHCiq85/6XzLkqHlOzEc # z+ryCuRXu0q16XTmK/5sy350OTYNkO/ktU6kqepqCquE86xnTrXE94zRICUj6whk # PlKWwfIPEvTFjg/BougsUfdzvL2FsWKDc0GCB+Q4i2pzINAPZHM8np+mM6n9Gd8l # k9ECAwEAAaOCAc0wggHJMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQD # AgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHkGCCsGAQUFBwEBBG0wazAkBggrBgEF # BQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRw # Oi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0Eu # Y3J0MIGBBgNVHR8EejB4MDqgOKA2hjRodHRwOi8vY3JsNC5kaWdpY2VydC5jb20v # RGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMDqgOKA2hjRodHRwOi8vY3JsMy5k # aWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsME8GA1UdIARI # MEYwOAYKYIZIAYb9bAACBDAqMCgGCCsGAQUFBwIBFhxodHRwczovL3d3dy5kaWdp # Y2VydC5jb20vQ1BTMAoGCGCGSAGG/WwDMB0GA1UdDgQWBBRaxLl7KgqjpepxA8Bg # +S32ZXUOWDAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzANBgkqhkiG # 9w0BAQsFAAOCAQEAPuwNWiSz8yLRFcgsfCUpdqgdXRwtOhrE7zBh134LYP3DPQ/E # r4v97yrfIFU3sOH20ZJ1D1G0bqWOWuJeJIFOEKTuP3GOYw4TS63XX0R58zYUBor3 # nEZOXP+QsRsHDpEV+7qvtVHCjSSuJMbHJyqhKSgaOnEoAjwukaPAJRHinBRHoXpo # aK+bp1wgXNlxsQyPu6j4xRJon89Ay0BEpRPw5mQMJQhCMrI2iiQC/i9yfhzXSUWW # 6Fkd6fp0ZGuy62ZD2rOwjNXpDd32ASDOmTFjPQgaGLOBm0/GkxAG/AeB+ova+YJJ # 92JuoVP6EpQYhS6SkepobEQysmah5xikmmRR7zCCBY0wggR1oAMCAQICEA6bGI75 # 0C3n79tQ4ghAGFowDQYJKoZIhvcNAQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNV # BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIG # A1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAw # MFoXDTMxMTEwOTIzNTk1OVowYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lD # ZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGln # aUNlcnQgVHJ1c3RlZCBSb290IEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAv+aQc2jeu+RdSjwwIjBpM+zCpyUuySE98orYWcLhKac9WKt2ms2uexuE # DcQwH/MbpDgW61bGl20dq7J58soR0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNw # wrK6dZlqczKU0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs0 # 6wXGXuxbGrzryc/NrDRAX7F6Zu53yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e # 5TXnMcvak17cjo+A2raRmECQecN4x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtV # gkEy19sEcypukQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85 # tRFYF/ckXEaPZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+S # kjqePdwA5EUlibaaRBkrfsCUtNJhbesz2cXfSwQAzH0clcOP9yGyshG3u3/y1Yxw # LEFgqrFjGESVGnZifvaAsPvoZKYz0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzl # DlJRR3S+Jqy2QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFr # b7GrhotPwtZFX50g/KEexcCPorF+CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATow # ggE2MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiu # HA9PMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQE # AwIBhjB5BggrBgEFBQcBAQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRp # Z2ljZXJ0LmNvbTBDBggrBgEFBQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQu # Y29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2 # hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290 # Q0EuY3JsMBEGA1UdIAQKMAgwBgYEVR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/ # Q1xV5zhfoKN0Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNK # ei8ttzjv9P+Aufih9/Jy3iS8UgPITtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHr # lnKhSLSZy51PpwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4 # oVaO7KTVPeix3P0c2PR3WlxUjG/voVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5A # Y8WYIsGyWfVVa88nq2x2zm8jLfR+cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNN # n3O3AamfV6peKOK5lDCCBq4wggSWoAMCAQICEAc2N7ckVHzYR6z9KGYqXlswDQYJ # KoZIhvcNAQELBQAwYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IElu # YzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQg # VHJ1c3RlZCBSb290IEc0MB4XDTIyMDMyMzAwMDAwMFoXDTM3MDMyMjIzNTk1OVow # YzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQD # EzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGlu # ZyBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMaGNQZJs8E9cklR # VcclA8TykTepl1Gh1tKD0Z5Mom2gsMyD+Vr2EaFEFUJfpIjzaPp985yJC3+dH54P # Mx9QEwsmc5Zt+FeoAn39Q7SE2hHxc7Gz7iuAhIoiGN/r2j3EF3+rGSs+QtxnjupR # PfDWVtTnKC3r07G1decfBmWNlCnT2exp39mQh0YAe9tEQYncfGpXevA3eZ9drMvo # hGS0UvJ2R/dhgxndX7RUCyFobjchu0CsX7LeSn3O9TkSZ+8OpWNs5KbFHc02DVzV # 5huowWR0QKfAcsW6Th+xtVhNef7Xj3OTrCw54qVI1vCwMROpVymWJy71h6aPTnYV # VSZwmCZ/oBpHIEPjQ2OAe3VuJyWQmDo4EbP29p7mO1vsgd4iFNmCKseSv6De4z6i # c/rnH1pslPJSlRErWHRAKKtzQ87fSqEcazjFKfPKqpZzQmiftkaznTqj1QPgv/Ci # PMpC3BhIfxQ0z9JMq++bPf4OuGQq+nUoJEHtQr8FnGZJUlD0UfM2SU2LINIsVzV5 # K6jzRWC8I41Y99xh3pP+OcD5sjClTNfpmEpYPtMDiP6zj9NeS3YSUZPJjAw7W4oi # qMEmCPkUEBIDfV8ju2TjY+Cm4T72wnSyPx4JduyrXUZ14mCjWAkBKAAOhFTuzuld # yF4wEr1GnrXTdrnSDmuZDNIztM2xAgMBAAGjggFdMIIBWTASBgNVHRMBAf8ECDAG # AQH/AgEAMB0GA1UdDgQWBBS6FtltTYUvcyl2mi91jGogj57IbzAfBgNVHSMEGDAW # gBTs1+OC0nFdZEzfLmc/57qYrhwPTzAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAww # CgYIKwYBBQUHAwgwdwYIKwYBBQUHAQEEazBpMCQGCCsGAQUFBzABhhhodHRwOi8v # b2NzcC5kaWdpY2VydC5jb20wQQYIKwYBBQUHMAKGNWh0dHA6Ly9jYWNlcnRzLmRp # Z2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRSb290RzQuY3J0MEMGA1UdHwQ8MDow # OKA2oDSGMmh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRS # b290RzQuY3JsMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATANBgkq # hkiG9w0BAQsFAAOCAgEAfVmOwJO2b5ipRCIBfmbW2CFC4bAYLhBNE88wU86/GPvH # UF3iSyn7cIoNqilp/GnBzx0H6T5gyNgL5Vxb122H+oQgJTQxZ822EpZvxFBMYh0M # CIKoFr2pVs8Vc40BIiXOlWk/R3f7cnQU1/+rT4osequFzUNf7WC2qk+RZp4snuCK # rOX9jLxkJodskr2dfNBwCnzvqLx1T7pa96kQsl3p/yhUifDVinF2ZdrM8HKjI/rA # J4JErpknG6skHibBt94q6/aesXmZgaNWhqsKRcnfxI2g55j7+6adcq/Ex8HBanHZ # xhOACcS2n82HhyS7T6NJuXdmkfFynOlLAlKnN36TU6w7HQhJD5TNOXrd/yVjmScs # PT9rp/Fmw0HNT7ZAmyEhQNC3EyTN3B14OuSereU0cZLXJmvkOHOrpgFPvT87eK1M # rfvElXvtCl8zOYdBeHo46Zzh3SP9HSjTx/no8Zhf+yvYfvJGnXUsHicsJttvFXse # GYs2uJPU5vIXmVnKcPA3v5gA3yAWTyf7YGcWoWa63VXAOimGsJigK+2VQbc61RWY # MbRiCQ8KvYHZE/6/pNHzV9m8BPqC3jLfBInwAM1dwvnQI38AC+R2AibZ8GV2QqYp # hwlHK+Z/GqSFD/yYlvZVVCsfgPrA8g4r5db7qS9EFUrnEw4d2zc4GqEr9u3WfPww # ggbAMIIEqKADAgECAhAMTWlyS5T6PCpKPSkHgD1aMA0GCSqGSIb3DQEBCwUAMGMx # CzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMy # RGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcg # Q0EwHhcNMjIwOTIxMDAwMDAwWhcNMzMxMTIxMjM1OTU5WjBGMQswCQYDVQQGEwJV # UzERMA8GA1UEChMIRGlnaUNlcnQxJDAiBgNVBAMTG0RpZ2lDZXJ0IFRpbWVzdGFt # cCAyMDIyIC0gMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAM/spSY6 # xqnya7uNwQ2a26HoFIV0MxomrNAcVR4eNm28klUMYfSdCXc9FZYIL2tkpP0GgxbX # kZI4HDEClvtysZc6Va8z7GGK6aYo25BjXL2JU+A6LYyHQq4mpOS7eHi5ehbhVsbA # umRTuyoW51BIu4hpDIjG8b7gL307scpTjUCDHufLckkoHkyAHoVW54Xt8mG8qjoH # ffarbuVm3eJc9S/tjdRNlYRo44DLannR0hCRRinrPibytIzNTLlmyLuqUDgN5YyU # XRlav/V7QG5vFqianJVHhoV5PgxeZowaCiS+nKrSnLb3T254xCg/oxwPUAY3ugjZ # Naa1Htp4WB056PhMkRCWfk3h3cKtpX74LRsf7CtGGKMZ9jn39cFPcS6JAxGiS7uY # v/pP5Hs27wZE5FX/NurlfDHn88JSxOYWe1p+pSVz28BqmSEtY+VZ9U0vkB8nt9Kr # FOU4ZodRCGv7U0M50GT6Vs/g9ArmFG1keLuY/ZTDcyHzL8IuINeBrNPxB9Thvdld # S24xlCmL5kGkZZTAWOXlLimQprdhZPrZIGwYUWC6poEPCSVT8b876asHDmoHOWIZ # ydaFfxPZjXnPYsXs4Xu5zGcTB5rBeO3GiMiwbjJ5xwtZg43G7vUsfHuOy2SJ8bHE # uOdTXl9V0n0ZKVkDTvpd6kVzHIR+187i1Dp3AgMBAAGjggGLMIIBhzAOBgNVHQ8B # Af8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAg # BgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwHwYDVR0jBBgwFoAUuhbZ # bU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFGKK3tBh/I8xFO2XC809KpQU31Kc # MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdp # Q2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcmwwgZAG # CCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2Vy # dC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9E # aWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcnQw # DQYJKoZIhvcNAQELBQADggIBAFWqKhrzRvN4Vzcw/HXjT9aFI/H8+ZU5myXm93KK # mMN31GT8Ffs2wklRLHiIY1UJRjkA/GnUypsp+6M/wMkAmxMdsJiJ3HjyzXyFzVOd # r2LiYWajFCpFh0qYQitQ/Bu1nggwCfrkLdcJiXn5CeaIzn0buGqim8FTYAnoo7id # 160fHLjsmEHw9g6A++T/350Qp+sAul9Kjxo6UrTqvwlJFTU2WZoPVNKyG39+Xgmt # dlSKdG3K0gVnK3br/5iyJpU4GYhEFOUKWaJr5yI+RCHSPxzAm+18SLLYkgyRTzxm # lK9dAlPrnuKe5NMfhgFknADC6Vp0dQ094XmIvxwBl8kZI4DXNlpflhaxYwzGRkA7 # zl011Fk+Q5oYrsPJy8P7mxNfarXH4PMFw1nfJ2Ir3kHJU7n/NBBn9iYymHv+XEKU # gZSCnawKi8ZLFUrTmJBFYDOA4CPe+AOk9kVH5c64A0JH6EE2cXet/aLol3ROLtoe # HYxayB6a1cLwxiKoT5u92ByaUcQvmvZfpyeXupYuhVfAYOd4Vn9q78KVmksRAsiC # nMkaBXy6cbVOepls9Oie1FqYyJ+/jbsYXEP10Cro4mLueATbvdH7WwqocH7wl4R4 # 4wgDXUcsY6glOJcB0j862uXl9uab3H4szP8XTE0AotjWAQ64i+7m4HJViSwnGWH2 # dwGMMYIFXTCCBVkCAQEwgYYwcjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lD # ZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTExMC8GA1UEAxMoRGln # aUNlcnQgU0hBMiBBc3N1cmVkIElEIENvZGUgU2lnbmluZyBDQQIQAwW7hiGwoWNf # v96uEgTnbTANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh # AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM # BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBGokUN8Jt3C9K+mm4nAesIPzW+ # UcO9WSVED4Ox9sZHvDANBgkqhkiG9w0BAQEFAASCAQB2/xRs8N+SHPDkH3Kjk+Tn # D5Zse/q8YMZcARkOT9mOVx8w5VdcIPBOFnR11rrJakIfDbM/qjy3W0GZ54WDeTxl # nrwSa/iC5IbZv2lBTfE6tZeQryT9oVCLzWpoA61yNDdQuDzapxB0JhEwBsyQkbqc # UeBrCY0LEdHkIoGMDYjY1I6dtVBV0ET2nvzcSRbetDwYRNhDGyF6Ywe0ll1/a7xr # j+iZBP8E/AscZjXogJl3n/PIEc3CDliVBlK+lK0I1Haxta9eSRz7zIfUr/4ph9jI # YYjnKeOmciOdHHKO8/oJBTCG/qJ+JlS7wX+/0J2qoK/UpVuctRGJkoGj0TgU4OiZ # oYIDIDCCAxwGCSqGSIb3DQEJBjGCAw0wggMJAgEBMHcwYzELMAkGA1UEBhMCVVMx # FzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdpQ2VydCBUcnVz # dGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQDE1pckuU+jwq # Sj0pB4A9WjANBglghkgBZQMEAgEFAKBpMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0B # BwEwHAYJKoZIhvcNAQkFMQ8XDTIyMTIxMzIxMTU1NVowLwYJKoZIhvcNAQkEMSIE # INGsMloKm6Z2fLJ+3HmtopePYdc23Yv96qOjfI+GSa1YMA0GCSqGSIb3DQEBAQUA # BIICAF5EXdxFeQCP8kQJIcD96JjlH2qX5hMcPaaVUq3lv5kcBWDYaJYaEhTY+l0I # RsXt26hCAIRfTppO/KmsyvKx7XUZySF43bUcgzDpYbGvV20ILSFL5Y/fJvr5wY10 # Hp3PQr5XB0UhejE5ZTYsSILQeaKAkmb/x3oFH3QnyjkhuZfkcUd2c3vp5G4UMVX8 # wL/rL4HjbZp2TkBrX+wW6NhFarJjYOHmdDyICfQWmuW1TygFWzXndbTIeQTQyZrY # lhAVHONPoKLdYqjy9BMHiB6wZdO7amPRXCDM3P/cKcyJWuPbL5dXrpnnqxvtH2Pd # d0MxOuAtaMBB7w28CowwZs/RFwtUU1ZBW7hOrDDv/lpYLfCanMTXrGkQvH4CdJob # ynij4OpbfO0J1It+X2cRgnoJJ/zn5FMCzBqCdJ0g1YP0UR7dy+vfZwTZhokxowOo # pzBjBbFI3pGnX9I73ReAC/tiYRKNC7LJ3Ed356M1SfqZg3hiw9ucFwXfUO+kyRMN # c9/G8nuQNqKA1lfTAxcoW734FXrLm35tGM9fXeSZjMyd3jO2qHEDJ6F++5nPpYWA # IOO80VKwp40Kby1Dz797aeCfaslLtL+lVmYwcLdSlJBKXrTinyBmz2Pe07cZosqJ # t8igAuO6CiFUJP5fRENJm45yBuim+hPWOsEEbcP6ojNe1rV6 # SIG # End signature block |