Skip to content

Latest commit

 

History

History
300 lines (150 loc) · 35.3 KB

CommandListing.md

File metadata and controls

300 lines (150 loc) · 35.3 KB

IoTCoreImaging Module

Powershell Commands with Alias

Adds an Appx package directory to the workspace and generates the required wm.xml and customizations.xml files

Generates the Bitlocker package (Security.BitLocker) contents based on the workspace specifications.

Generates a BSP directory under Source-arch\BSP\ using a BSP directory template.

Chain CEPALFM.xml into the IoT Core packaging process for a specific product

Adds a common(generic) package directory to the workspace and generates the required wm.xml file.

Generates the device guard package (Security.DeviceGuard) contents based on the workspace specifications.

Adds the directory contents into a IoT file package definition.

Adds a driver package directory to the workspace and generates the required wm.xml file.

Adds a new architecture to the workspace

Adds a file package directory to the workspace and generates the required wm.xml file.

Generates a new product directory under Source-arch\Products.

Adds feature id to the specified product's oeminput xml file.

Adds a provisioning package directory to the workspace and generates the required wm.xml file, customizations.xml file and the icdproject file.

Adds a registry package directory to the workspace and generates the required wm.xml file.

Generates the secure boot package (Security.SecureBoot) contents based on the workspace specifications. If Test is specified, then it includes test certificates from the specification.

Creates the security packages based on the settings in workspace configuration.

Signs the files with the certificate selected via Set-IoTSignature

Adds the zip file contents into a IoT file package definition.

Converts the existing pkg.xml files to wm.xml files.

Copies a BSP folder to the destination workspace from a source workspace or a source bsp directory.

Copies an OEM package to the destination workspace from a source workspace.

Copies a product folder to the destination workspace from a source workspace.

Dismounts the mounted ffu image and saves it as a new ffu if an ffuname is specified.

Exports the DeviceModel XML file required to register the device in the Device Update Center portal.

Exports the update cab file required to upload on the Device Update Center

Extracts the mounted partitions as wim files

Returns a hashtable of the drive letters of the mounted partitions

Returns the list of supported feature IDs in the Windows 10 IoT Core OS release defined in the workspace.

Returns the list of supported feature IDs in the Windows 10 IoT Core OS release defined in the workspace.

Returns the list of BSP names in the workspace.

Returns the list of product names in the workspace.

Imports a BSP folder in to the current workspace from a source workspace or a source bsp directory or a source zip file.

Import a flat release directory and prepare for packaging into IoT Core

Imports an certificate and adds to the Workspace security specification.

Imports the Device Update Center Configuration files into the product directory

Imports an OEM package in to the current workspace from a source workspace.

Imports a product folder in to the current workspace from a source workspace.

Import Powershell Core Release into your workspace and update the wm xml files.

Import QC BSP into your workspace and update the bsp files as required by the latest tools.

Installs the OEM certs (pfx files) in the certs\private folder

Mounts the specifed FFU, parses the device layout and assigns drive letters for the partitions with file system defined.

Creates a Cab package file for the specified wm.xml file or the wm.xml files in the specified directory.

Factory method to create a new object of class IoTDeviceLayout

This function scans the mounted FFU Main OS partition and creates a CI policy.

Creates the IoT FFU image for the specified product / configuration. Returns boolean true for success and false for failure.

Creates Feature Identifier Packages (FIP packages) for the given feature manifest files and updates the feature manifest files with the generated FIP packages. Returns boolean true for success and false for failure.

Factory method to create a new object of class IoTFMXML

Creates a cab file for the given inf.

Generates the required OEM certificates.

Factory method to create a new object of class IoTOemInputXML

Factory method to create a new object of class IoTProduct

Factory method to create a new object of class IoTProductSettingsXML

Creates a .ppkg file from the customizations.xml input file. Returns a boolean indicating success or failure.

Factory method to create a new object of class IoTProvisioningXML

Creates recovery ffu from a regular ffu

Builds a WinPE image with relevant drivers and recovery files

Factory method, returing the IoTWMWriter class object used to write namespace.name.wm.xml file.

Factory method to create a new object of class IoTWMXML

Creates a new IoTWorkspace xml and the directory structure at the specified input directory.

Creates a new IoTWorkspaceXML object

Opens the IoTWorkspace xml at the specified input directory and sets up the environment with those settings.

Resigns the cab file and its contents / cat files with the certificate set in the environment.

Updates an old iot-adk-addonkit folder with required xml files to make it a proper workspace.

Removes feature id from the specified product's oeminput xml file.

Sets the version to be used in the Cab package creation.

Sets the environment variables as per requested architecture

Sets the signing certificate to the retail cert or test cert.

Sets the signing related env vars with the cert information provided.

Checks if the cab file and its contents are properly signed.

Checks if the certs in the workspace folder are all valid.

Validates if all features specified in the specified product/config oeminputxml are defined. This returns boolean true for success and false for failure.

Validates if all packages required for the specified product/config image creation are available and properly signed. This returns boolean true for success and false for failure.

Validates if the recovery wim files are proper in the recovery ffu

Checks if the file is properly signed.