From 59783af6fb18a63ea8ddd524b7cb9d82056764c5 Mon Sep 17 00:00:00 2001 From: Gabe Alford Date: Fri, 29 Sep 2023 12:20:16 -0600 Subject: [PATCH] relase: bump version to 1.1.7 (#206) --- .../falcon-container-sensor-pull.sh | 2 +- bash/install/README.md | 4 ++-- bash/install/falcon-linux-install.sh | 2 +- powershell/install/README.md | 4 ++-- powershell/install/falcon_windows_install.ps1 | 2 +- powershell/install/falcon_windows_uninstall.ps1 | 2 +- powershell/migrate/README.md | 2 +- powershell/migrate/falcon_windows_migrate.ps1 | 2 +- 8 files changed, 10 insertions(+), 10 deletions(-) diff --git a/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh b/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh index 9d07d44..0378c60 100755 --- a/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh +++ b/bash/containers/falcon-container-sensor-pull/falcon-container-sensor-pull.sh @@ -276,7 +276,7 @@ cs_falcon_oauth_token=$( token_result=$(echo "client_id=$FALCON_CLIENT_ID&client_secret=$FALCON_CLIENT_SECRET" | \ curl -X POST -s -L "https://$(cs_cloud)/oauth2/token" \ -H 'Content-Type: application/x-www-form-urlencoded; charset=utf-8' \ - -H 'User-Agent: crowdstrike-falcon-scripts/1.1.6' \ + -H 'User-Agent: crowdstrike-falcon-scripts/1.1.7' \ --dump-header "$response_headers" \ --data @-) token=$(echo "$token_result" | json_value "access_token" | sed 's/ *$//g' | sed 's/^ *//g') diff --git a/bash/install/README.md b/bash/install/README.md index c174934..3cd3d2d 100644 --- a/bash/install/README.md +++ b/bash/install/README.md @@ -56,7 +56,7 @@ ALLOW_LEGACY_CURL (default: false) **Run the script**: ```bash -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.6/bash/install/falcon-linux-install.sh | bash +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.7/bash/install/falcon-linux-install.sh | bash ``` Alternatively, you can run the script by cloning the repo: @@ -88,5 +88,5 @@ bash -x falcon-linux-install.sh or ```bash -curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.6/bash/install/falcon-linux-install.sh | bash -x +curl -L https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.7/bash/install/falcon-linux-install.sh | bash -x ``` diff --git a/bash/install/falcon-linux-install.sh b/bash/install/falcon-linux-install.sh index bedf8b3..d14f4b1 100755 --- a/bash/install/falcon-linux-install.sh +++ b/bash/install/falcon-linux-install.sh @@ -601,7 +601,7 @@ cs_falcon_oauth_token=$( token_result=$(echo "client_id=$cs_falcon_client_id&client_secret=$cs_falcon_client_secret" | \ curl -X POST -s -L "https://$(cs_cloud)/oauth2/token" \ -H 'Content-Type: application/x-www-form-urlencoded; charset=utf-8' \ - -H 'User-Agent: crowdstrike-falcon-scripts/1.1.6' \ + -H 'User-Agent: crowdstrike-falcon-scripts/1.1.7' \ --dump-header "${response_headers}" \ --data @-) token=$(echo "$token_result" | json_value "access_token" | sed 's/ *$//g' | sed 's/^ *//g') diff --git a/powershell/install/README.md b/powershell/install/README.md index d2f3886..ac4b6f9 100644 --- a/powershell/install/README.md +++ b/powershell/install/README.md @@ -66,7 +66,7 @@ Enable verbose logging To download the script: ```pwsh -Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.6/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1 +Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.7/powershell/install/falcon_windows_install.ps1 -OutFile falcon_windows_install.ps1 ``` Basic example that will install the sensor with the provided provisioning token @@ -118,7 +118,7 @@ Enable verbose logging To download the script: ```pwsh -Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.6/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1 +Invoke-WebRequest -Uri https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.7/powershell/install/falcon_windows_uninstall.ps1 -OutFile falcon_windows_uninstall.ps1 ``` Basic example that will uninstall the sensor with the provided maintenance token diff --git a/powershell/install/falcon_windows_install.ps1 b/powershell/install/falcon_windows_install.ps1 index b1d6ff3..62d97c5 100755 --- a/powershell/install/falcon_windows_install.ps1 +++ b/powershell/install/falcon_windows_install.ps1 @@ -163,7 +163,7 @@ begin { function Invoke-FalconAuth([string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.6') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.7') try { $response = Invoke-WebRequest -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content diff --git a/powershell/install/falcon_windows_uninstall.ps1 b/powershell/install/falcon_windows_uninstall.ps1 index c26fbd4..f64eedc 100755 --- a/powershell/install/falcon_windows_uninstall.ps1 +++ b/powershell/install/falcon_windows_uninstall.ps1 @@ -147,7 +147,7 @@ begin { function Invoke-FalconAuth([string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.6') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.7') try { $response = Invoke-WebRequest -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content diff --git a/powershell/migrate/README.md b/powershell/migrate/README.md index 3273bb1..7d56450 100644 --- a/powershell/migrate/README.md +++ b/powershell/migrate/README.md @@ -94,7 +94,7 @@ Enable verbose logging To download the script, run the following command: ```pwsh -Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.6/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1" +Invoke-WebRequest -Uri "https://raw.githubusercontent.com/crowdstrike/falcon-scripts/v1.1.7/powershell/migrate/falcon_windows_migrate.ps1" -OutFile "falcon_windows_migrate.ps1" ``` ### Example 1 diff --git a/powershell/migrate/falcon_windows_migrate.ps1 b/powershell/migrate/falcon_windows_migrate.ps1 index 8ec40c7..bd163bd 100644 --- a/powershell/migrate/falcon_windows_migrate.ps1 +++ b/powershell/migrate/falcon_windows_migrate.ps1 @@ -946,7 +946,7 @@ function Get-FalconCloud ([string] $xCsRegion) { function Invoke-FalconAuth([string] $BaseUrl, [hashtable] $Body, [string] $FalconCloud) { $Headers = @{'Accept' = 'application/json'; 'Content-Type' = 'application/x-www-form-urlencoded'; 'charset' = 'utf-8' } - $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.6') + $Headers.Add('User-Agent', 'crowdstrike-falcon-scripts/1.1.7') try { $response = Invoke-WebRequest -Uri "$($BaseUrl)/oauth2/token" -UseBasicParsing -Method 'POST' -Headers $Headers -Body $Body $content = ConvertFrom-Json -InputObject $response.Content