From adb6bd79d2c126e11e8e418aeb24c1403dedd651 Mon Sep 17 00:00:00 2001 From: Carlos Matos Date: Thu, 27 Jul 2023 14:02:58 -0400 Subject: [PATCH] bump v1.1.4 (#189) --- .../falcon-container-sensor-pull.sh | 2 +- bash/install/README.md | 4 ++-- bash/install/falcon-linux-install.sh | 2 +- powershell/install/README.md | 4 ++-- powershell/install/falcon_windows_install.ps1 | 2 +- powershell/install/falcon_windows_uninstall.ps1 | 2 +- powershell/migrate/README.md | 2 +- powershell/migrate/falcon_windows_migrate.ps1 | 2 +- 8 files changed, 10 insertions(+), 10 deletions(-) diff --git a/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh b/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh index 4306101..42c78cd 100755 --- a/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh +++ b/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh @@ -249,7 +249,7 @@ cs_falcon_oauth_token=$( token_result=$(echo "client_id=$FALCON_CLIENT_ID&client_secret=$FALCON_CLIENT_SECRET" | \ curl -X POST -s -L "https://$(cs_cloud)/oauth2/token" \ -H 'Content-Type: application/x-www-form-urlencoded; charset=utf-8' \ - -H 'User-Agent: crowdstrike-falcon-scripts/1.1.3' \ + -H 'User-Agent: crowdstrike-falcon-scripts/1.1.4' \ --dump-header "$response_headers" \ --data @-) token=$(echo "$token_result" | json_value "access_token" | sed 's/ *$//g' | sed 's/^ *//g') diff --git a/bash/install/README.md b/bash/install/README.md index be919fc..b33829a 100644 --- a/bash/install/README.md +++ b/bash/install/README.md @@ -56,7 +56,7 @@ ALLOW_LEGACY_CURL (default: false) **Run the script**: ```bash -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/bash/install/falcon-linux-install.sh | bash +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/bash/install/falcon-linux-install.sh | bash ``` Alternatively, you can run the script by cloning the repo: @@ -88,5 +88,5 @@ bash -x falcon-linux-install.sh or ```bash -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/bash/install/falcon-linux-install.sh | bash -x +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/bash/install/falcon-linux-install.sh | bash -x ``` diff --git a/bash/install/falcon-linux-install.sh b/bash/install/falcon-linux-install.sh index f1fca4e..20a9680 100755 --- a/bash/install/falcon-linux-install.sh +++ b/bash/install/falcon-linux-install.sh @@ -601,7 +601,7 @@ cs_falcon_oauth_token=$( token_result=$(echo "client_id=$cs_falcon_client_id&client_secret=$cs_falcon_client_secret" | \ curl -X POST -s -L "https://$(cs_cloud)/oauth2/token" \ -H 'Content-Type: application/x-www-form-urlencoded; charset=utf-8' \ - -H 'User-Agent: crowdstrike-falcon-scripts/1.1.3' \ + -H 'User-Agent: crowdstrike-falcon-scripts/1.1.4' \ --dump-header "${response_headers}" \ --data @-) token=$(echo "$token_result" | json_value "access_token" | sed 's/ *$//g' | sed 's/^ *//g') diff --git a/powershell/install/README.md b/powershell/install/README.md index 399e168..c5a3fb6 100644 --- a/powershell/install/README.md +++ b/powershell/install/README.md @@ -66,7 +66,7 @@ Enable verbose logging To download the script: ```pwsh -Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1 +Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1 ``` Basic example that will install the sensor with the provided provisioning token @@ -118,7 +118,7 @@ Enable verbose logging To download the script: ```pwsh -Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1 +Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1 ``` Basic example that will uninstall the sensor with the provided maintenance token diff --git a/powershell/install/falcon_windows_install.ps1 b/powershell/install/falcon_windows_install.ps1 index 1d9ba04..cd501cd 100755 --- a/powershell/install/falcon_windows_install.ps1 +++ b/powershell/install/falcon_windows_install.ps1 @@ -163,7 +163,7 @@ begin { function Invoke-FalconAuth([string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.3') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.4') try { $response = Invoke-WebRequest -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content diff --git a/powershell/install/falcon_windows_uninstall.ps1 b/powershell/install/falcon_windows_uninstall.ps1 index e16f3b7..5dd4d7e 100755 --- a/powershell/install/falcon_windows_uninstall.ps1 +++ b/powershell/install/falcon_windows_uninstall.ps1 @@ -147,7 +147,7 @@ begin { function Invoke-FalconAuth([string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.3') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.4') try { $response = Invoke-WebRequest -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content diff --git a/powershell/migrate/README.md b/powershell/migrate/README.md index 3d5ae9c..817d6aa 100644 --- a/powershell/migrate/README.md +++ b/powershell/migrate/README.md @@ -94,7 +94,7 @@ Enable verbose logging To download the script, run the following command: ```pwsh -Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.3/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1" +Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.4/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1" ``` ### Example 1 diff --git a/powershell/migrate/falcon_windows_migrate.ps1 b/powershell/migrate/falcon_windows_migrate.ps1 index e751b6e..78a168c 100644 --- a/powershell/migrate/falcon_windows_migrate.ps1 +++ b/powershell/migrate/falcon_windows_migrate.ps1 @@ -963,7 +963,7 @@ function Get-FalconCloud ([string] $xCsRegion) { function Invoke-FalconAuth([string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.3') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.4') try { $response = Invoke-WebRequest -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content