From 956287d48c9fcaea6839fe36945e97b808405bd8 Mon Sep 17 00:00:00 2001 From: Carlos Matos Date: Wed, 24 Jul 2024 10:07:51 -0400 Subject: [PATCH] chore: bump v1.5.3 (#339) --- .../falcon-container-sensor-pull/README.md | 2 +- .../falcon-container-sensor-pull.sh | 2 +- bash/install/README.md | 12 ++++++------ bash/install/falcon-linux-install.sh | 2 +- bash/install/falcon-linux-uninstall.sh | 2 +- powershell/install/README.md | 4 ++-- powershell/install/falcon_windows_install.ps1 | 2 +- powershell/install/falcon_windows_uninstall.ps1 | 2 +- powershell/migrate/README.md | 2 +- powershell/migrate/falcon_windows_migrate.ps1 | 2 +- 10 files changed, 16 insertions(+), 16 deletions(-) diff --git a/bash/containers/falcon-container-sensor-pull/README.md b/bash/containers/falcon-container-sensor-pull/README.md index 31bc5a5..6133de5 100644 --- a/bash/containers/falcon-container-sensor-pull/README.md +++ b/bash/containers/falcon-container-sensor-pull/README.md @@ -71,7 +71,7 @@ The script supports auto-discovery of the Falcon cloud region. If the cloud regi ```terminal Usage: falcon-container-sensor-pull.sh [options] -Version: 1.5.2 +Version: 1.5.3 Required Flags: -u, --client-id Falcon API OAUTH Client ID diff --git a/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh b/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh index 4dde4e9..f585176 100755 --- a/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh +++ b/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh @@ -6,7 +6,7 @@ Description: Bash script to copy Falcon DaemonSet Sensor, Container Sensor, Kube set -e -VERSION="1.5.2" +VERSION="1.5.3" usage() { echo "Usage: $0 [options] diff --git a/bash/install/README.md b/bash/install/README.md index cc49517..bf7b0a3 100644 --- a/bash/install/README.md +++ b/bash/install/README.md @@ -75,7 +75,7 @@ The installer is AWS SSM aware, if `FALCON_CLIENT_ID` and `FALCON_CLIENT_SECRET` ```terminal Installs and configures the CrowdStrike Falcon Sensor for Linux. -Version: 1.5.2 +Version: 1.5.3 The script recognizes the following environmental variables: @@ -160,7 +160,7 @@ Other Options To download and run the script: ```bash -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.2/bash/install/falcon-linux-install.sh | bash +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.3/bash/install/falcon-linux-install.sh | bash ``` Alternatively, you can run the script by cloning the repo: @@ -185,7 +185,7 @@ bash falcon-linux-install.sh ```terminal Uninstalls the CrowdStrike Falcon Sensor from Linux operating systems. -Version: 1.5.2 +Version: 1.5.3 The script recognizes the following environmental variables: @@ -228,7 +228,7 @@ Other Options: To download and run the script: ```bash -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.2/bash/install/falcon-linux-uninstall.sh | bash +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.3/bash/install/falcon-linux-uninstall.sh | bash ``` Uninstall and remove the host from the Falcon console: @@ -237,7 +237,7 @@ Uninstall and remove the host from the Falcon console: export FALCON_CLIENT_ID="XXXXXXX" export FALCON_CLIENT_SECRET="YYYYYYYYY" export FALCON_REMOVE_HOST="true" -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.2/bash/install/falcon-linux-uninstall.sh | bash +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.3/bash/install/falcon-linux-uninstall.sh | bash ``` ## Troubleshooting @@ -251,5 +251,5 @@ bash -x falcon-linux-install.sh or ```bash -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.2/bash/install/falcon-linux-install.sh | bash -x +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.3/bash/install/falcon-linux-install.sh | bash -x ``` diff --git a/bash/install/falcon-linux-install.sh b/bash/install/falcon-linux-install.sh index 39b1fc0..388c945 100755 --- a/bash/install/falcon-linux-install.sh +++ b/bash/install/falcon-linux-install.sh @@ -85,7 +85,7 @@ Other Options EOF } -VERSION="1.5.2" +VERSION="1.5.3" main() { if [ -n "$1" ]; then diff --git a/bash/install/falcon-linux-uninstall.sh b/bash/install/falcon-linux-uninstall.sh index c97c91f..6c7a34c 100755 --- a/bash/install/falcon-linux-uninstall.sh +++ b/bash/install/falcon-linux-uninstall.sh @@ -43,7 +43,7 @@ Other Options: EOF } -VERSION="1.5.2" +VERSION="1.5.3" main() { if [ -n "$1" ]; then diff --git a/powershell/install/README.md b/powershell/install/README.md index 2501e21..fb77d50 100644 --- a/powershell/install/README.md +++ b/powershell/install/README.md @@ -113,7 +113,7 @@ Enable verbose logging To download the script: ```pwsh -Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.2/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1 +Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.3/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1 ``` Basic example that will install the sensor with the provided provisioning token @@ -175,7 +175,7 @@ Enable verbose logging To download the script: ```pwsh -Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.2/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1 +Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.3/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1 ``` Basic example that will uninstall the sensor with the provided maintenance token diff --git a/powershell/install/falcon_windows_install.ps1 b/powershell/install/falcon_windows_install.ps1 index b8c8835..8c717b1 100755 --- a/powershell/install/falcon_windows_install.ps1 +++ b/powershell/install/falcon_windows_install.ps1 @@ -192,7 +192,7 @@ begin { function Invoke-FalconAuth([hashtable] $WebRequestParams, [string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.5.2') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.5.3') if ($FalconAccessToken){ $Headers.Add('Authorization', "bearer $($FalconAccessToken)") } diff --git a/powershell/install/falcon_windows_uninstall.ps1 b/powershell/install/falcon_windows_uninstall.ps1 index 27d2d76..ff11125 100755 --- a/powershell/install/falcon_windows_uninstall.ps1 +++ b/powershell/install/falcon_windows_uninstall.ps1 @@ -177,7 +177,7 @@ begin { function Invoke-FalconAuth([hashtable] $WebRequestParams, [string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.5.2') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.5.3') if ($FalconAccessToken){ $Headers.Add('Authorization', "bearer $($FalconAccessToken)") } diff --git a/powershell/migrate/README.md b/powershell/migrate/README.md index 8ea1359..a61aacb 100644 --- a/powershell/migrate/README.md +++ b/powershell/migrate/README.md @@ -101,7 +101,7 @@ Enable verbose logging To download the script, run the following command: ```pwsh -Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.2/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1" +Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.5.3/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1" ``` ### Example 1 diff --git a/powershell/migrate/falcon_windows_migrate.ps1 b/powershell/migrate/falcon_windows_migrate.ps1 index 428afde..b1464f2 100644 --- a/powershell/migrate/falcon_windows_migrate.ps1 +++ b/powershell/migrate/falcon_windows_migrate.ps1 @@ -985,7 +985,7 @@ function Get-FalconCloud ([string] $xCsRegion) { function Invoke-FalconAuth([hashtable] $WebRequestParams, [string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.5.2') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.5.3') try { $response = Invoke-WebRequest @WebRequestParams -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content