Skip to content

Commit

Permalink
bump v1.1.4 (#189)
Browse files Browse the repository at this point in the history
  • Loading branch information
carlosmmatos authored Jul 27, 2023
1 parent a073875 commit adb6bd7
Show file tree
Hide file tree
Showing 8 changed files with 10 additions and 10 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -249,7 +249,7 @@ cs_falcon_oauth_token=$(
token_result=$(echo "client_id=$FALCON_CLIENT_ID&client_secret=$FALCON_CLIENT_SECRET" | \
curl -X POST -s -L "https://$(cs_cloud)/oauth2/token" \
-H 'Content-Type: application/x-www-form-urlencoded; charset=utf-8' \
-H 'User-Agent: crowdstrike-falcon-scripts/1.1.3' \
-H 'User-Agent: crowdstrike-falcon-scripts/1.1.4' \
--dump-header "$response_headers" \
--data @-)
token=$(echo "$token_result" | json_value "access_token" | sed 's/ *$//g' | sed 's/^ *//g')
Expand Down
4 changes: 2 additions & 2 deletions bash/install/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ ALLOW_LEGACY_CURL (default: false)
**Run the script**:

```bash
curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/bash/install/falcon-linux-install.sh | bash
curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/bash/install/falcon-linux-install.sh | bash
```

Alternatively, you can run the script by cloning the repo:
Expand Down Expand Up @@ -88,5 +88,5 @@ bash -x falcon-linux-install.sh
or

```bash
curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/bash/install/falcon-linux-install.sh | bash -x
curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/bash/install/falcon-linux-install.sh | bash -x
```
2 changes: 1 addition & 1 deletion bash/install/falcon-linux-install.sh
Original file line number Diff line number Diff line change
Expand Up @@ -601,7 +601,7 @@ cs_falcon_oauth_token=$(
token_result=$(echo "client_id=$cs_falcon_client_id&client_secret=$cs_falcon_client_secret" | \
curl -X POST -s -L "https://$(cs_cloud)/oauth2/token" \
-H 'Content-Type: application/x-www-form-urlencoded; charset=utf-8' \
-H 'User-Agent: crowdstrike-falcon-scripts/1.1.3' \
-H 'User-Agent: crowdstrike-falcon-scripts/1.1.4' \
--dump-header "${response_headers}" \
--data @-)
token=$(echo "$token_result" | json_value "access_token" | sed 's/ *$//g' | sed 's/^ *//g')
Expand Down
4 changes: 2 additions & 2 deletions powershell/install/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ Enable verbose logging
To download the script:

```pwsh
Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1
Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1
```

Basic example that will install the sensor with the provided provisioning token
Expand Down Expand Up @@ -118,7 +118,7 @@ Enable verbose logging
To download the script:

```pwsh
Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1
Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1
```

Basic example that will uninstall the sensor with the provided maintenance token
Expand Down
2 changes: 1 addition & 1 deletion powershell/install/falcon_windows_install.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -163,7 +163,7 @@ begin {

function Invoke-FalconAuth([string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) {
$Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' }
$Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.3')
$Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.4')
try {
$response = Invoke-WebRequest -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body
$content = ConvertFrom-Json -InputObject $response.Content
Expand Down
2 changes: 1 addition & 1 deletion powershell/install/falcon_windows_uninstall.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ begin {

function Invoke-FalconAuth([string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) {
$Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' }
$Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.3')
$Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.4')
try {
$response = Invoke-WebRequest -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body
$content = ConvertFrom-Json -InputObject $response.Content
Expand Down
2 changes: 1 addition & 1 deletion powershell/migrate/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ Enable verbose logging
To download the script, run the following command:

```pwsh
Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1"
Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1"
```

### Example 1
Expand Down
2 changes: 1 addition & 1 deletion powershell/migrate/falcon_windows_migrate.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -963,7 +963,7 @@ function Get-FalconCloud ([string] $xCsRegion) {

function Invoke-FalconAuth([string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) {
$Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' }
$Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.3')
$Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.4')
try {
$response = Invoke-WebRequest -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body
$content = ConvertFrom-Json -InputObject $response.Content
Expand Down

0 comments on commit adb6bd7

Please sign in to comment.