UTC: 2025-04-21 12:02
ryancbutler/Chocolatey-Packages
This file is automatically generated by the update_all.ps1 script using the AU module.
Ignored | History | Force Test | Releases
UTC: 2025-04-21 12:02
ryancbutler/Chocolatey-Packages
This file is automatically generated by the update_all.ps1 script using the AU module.
Ignored | History | Force Test | Releases
UTC: 2019-07-15 18:29
{github_user}/{repository}
This file is automatically generated by the update_all.ps1 script using the AU module.
Ignored | History | Force Test | Releases
UTC: 2019-07-15 19:17
ryancbutler/Chocolatey-Packages
This file is automatically generated by the update_all.ps1 script using the AU module.
UTC: 2019-07-15 19:28
ryancbutler/Chocolatey-Packages
This file is automatically generated by the update_all.ps1 script using the AU module.
<Objs Version="1.1.0.1" xmlns="http://schemas.microsoft.com/powershell/2004/04"> | |
<Obj RefId="0"> | |
<TN RefId="0"> | |
<T>System.Management.Automation.PSCustomObject</T> | |
<T>System.Object</T> | |
</TN> | |
<MS> | |
<S N="Path">HKLM:\SOFTWARE\Policies\Login Consultants\BISF</S> | |
<S N="Name">LIC_BISF_POL_CTXOE</S> | |
<I32 N="Value">1</I32> |
--- | |
# Source: calico/templates/calico-config.yaml | |
# This ConfigMap is used to configure a self-hosted Calico installation. | |
kind: ConfigMap | |
apiVersion: v1 | |
metadata: | |
name: calico-config | |
namespace: kube-system | |
data: | |
# Typha is disabled. |
$download = Invoke-WebRequest -UseBasicParsing -Uri ("https://www.citrix.com/downloads/workspace-app/windows/workspace-app-for-windows-latest.html") -SessionVariable websession | |
$href = $download.Links|Where-Object {$_.rel -like "*CitrixWorkspaceApp.exe*"} | |
$DLurl = "https:" + $href.rel | |
Invoke-WebRequest -Uri ($DLurl) -WebSession $websession -UseBasicParsing -OutFile "C:\temp\CitrixWorkspaceApp.exe" -Verbose | |
$version = $download.RawContent | Select-String '(?<=.*<p>Version: ).+?(?=<\/p>.*)' -AllMatches | ForEach-Object { $_.Matches.Value } | Select-Object -Unique |
#Requires -Version 3.0 | |
# Configure a Windows host for remote management with Ansible | |
# ----------------------------------------------------------- | |
# | |
# This script checks the current WinRM (PS Remoting) configuration and makes | |
# the necessary changes to allow Ansible to connect, authenticate and | |
# execute PowerShell commands. | |
# | |
# All events are logged to the Windows EventLog, useful for unattended runs. |
#!/usr/bin/bash | |
nscli -U 127.0.0.1:nsroot:nsroot enable ns feature responder | |
nscli -U 127.0.0.1:nsroot:nsroot add responder action respondwith403 respondwith '"\"HTTP/1.1 403 Forbidden\r\n\r\n\""' | |
nscli -U 127.0.0.1:nsroot:nsroot add responder policy ctx267027 '"HTTP.REQ.URL.DECODE_USING_TEXT_MODE.CONTAINS(\"/vpns/\") && (!CLIENT.SSLVPN.IS_SSLVPN || HTTP.REQ.URL.DECODE_USING_TEXT_MODE.CONTAINS(\"/../\"))"' respondwith403 | |
nscli -U 127.0.0.1:nsroot:nsroot bind responder global ctx267027 1 END -type REQ_OVERRIDE |
<?xml version="1.0" encoding="UTF-8"?> | |
<!-- | |
AWS Instance Types | |
This configuration file describes the AWS instance types. | |
AWS instance types are documented by Amazon, but they are not available through the API, so XenDesktop services | |
are unable to discover them dynamically at run time. This configuration file stores the descriptions in such a way | |
that they can be ammended manually. |