Install-FromManifest: add Hash detection for content-versioned files

Needed for eMxInfo.txt (site-specific eDNC config). The file has no
DisplayVersion in the registry and no canonical MSI; we ship it as a
standalone secret on the SFLD share and key drift correction off its
SHA256. When the yearly replacement drops, bump the hash in
machineapps-manifest.json and every Standard-Machine PC catches up on
next logon.

Patched Install-FromManifest in all three copies (CMM, common, Standard)
for consistency. Also adds the eMxInfo.txt entry to the Standard
machineapps-manifest template and an Install-eMxInfo.cmd template that
copies the file into both 32/64-bit eDNC Program Files paths.
This commit is contained in:
cproudlock
2026-04-15 12:37:35 -04:00
parent 3ef981f19e
commit cc9aad0ea1
5 changed files with 72 additions and 12 deletions

View File

@@ -123,6 +123,20 @@ function Test-AppInstalled {
"File" { "File" {
return Test-Path $App.DetectionPath return Test-Path $App.DetectionPath
} }
"Hash" {
# Compare SHA256 of the on-disk file against the manifest's
# expected value. Used for content-versioned files that do not
# expose a DisplayVersion (secrets like eMxInfo.txt). Bumping
# DetectionValue in the manifest and replacing the file on the
# share is the entire update workflow.
if (-not (Test-Path $App.DetectionPath)) { return $false }
if (-not $App.DetectionValue) {
Write-InstallLog " Hash detection requires DetectionValue - treating as not installed" "WARN"
return $false
}
$actual = (Get-FileHash -Path $App.DetectionPath -Algorithm SHA256 -ErrorAction Stop).Hash
return ($actual -ieq $App.DetectionValue)
}
default { default {
Write-InstallLog " Unknown detection method: $($App.DetectionMethod)" "WARN" Write-InstallLog " Unknown detection method: $($App.DetectionMethod)" "WARN"
return $false return $false

View File

@@ -0,0 +1,19 @@
@echo off
REM Install-eMxInfo.cmd - copy the site-specific eMxInfo.txt into both
REM Program Files eDNC paths. Run by Install-FromManifest.ps1 (Type=CMD)
REM when Hash detection on C:\Program Files\eDNC\eMxInfo.txt fails.
set "SRC=%~dp0eMxInfo.txt"
if not exist "%SRC%" (
echo Install-eMxInfo: source file not found at %SRC%
exit /b 1
)
if not exist "C:\Program Files\eDNC\" mkdir "C:\Program Files\eDNC\" 2>/dev/null
if not exist "C:\Program Files (x86)\eDNC\" mkdir "C:\Program Files (x86)\eDNC\" 2>/dev/null
copy /Y "%SRC%" "C:\Program Files\eDNC\eMxInfo.txt" >/dev/null || exit /b 2
copy /Y "%SRC%" "C:\Program Files (x86)\eDNC\eMxInfo.txt" >/dev/null || exit /b 3
echo Install-eMxInfo: deployed eMxInfo.txt to both eDNC paths
exit /b 0

View File

@@ -111,6 +111,20 @@ function Test-AppInstalled {
"File" { "File" {
return Test-Path $App.DetectionPath return Test-Path $App.DetectionPath
} }
"Hash" {
# Compare SHA256 of the on-disk file against the manifest's
# expected value. Used for content-versioned files that do not
# expose a DisplayVersion (secrets like eMxInfo.txt). Bumping
# DetectionValue in the manifest and replacing the file on the
# share is the entire update workflow.
if (-not (Test-Path $App.DetectionPath)) { return $false }
if (-not $App.DetectionValue) {
Write-InstallLog " Hash detection requires DetectionValue - treating as not installed" "WARN"
return $false
}
$actual = (Get-FileHash -Path $App.DetectionPath -Algorithm SHA256 -ErrorAction Stop).Hash
return ($actual -ieq $App.DetectionValue)
}
default { default {
Write-InstallLog " Unknown detection method: $($App.DetectionMethod)" "WARN" Write-InstallLog " Unknown detection method: $($App.DetectionMethod)" "WARN"
return $false return $false

View File

@@ -14,23 +14,22 @@
"DetectionValue": "REPLACE_WITH_PINNED_UDC_VERSION" "DetectionValue": "REPLACE_WITH_PINNED_UDC_VERSION"
}, },
{ {
"_comment": "eDNC 6.4.3. SITESELECTED is the property that encodes the site (was a recurring bug in early shopfloor-setup scripts that omitted it). Adjust to your site's value if not West Jefferson.", "_comment": "eDNC 6.4.3. Ships with NTLARS bundled (NTLARS.exe lands at C:\\Program Files (x86)\\Dnc\\Common\\ as part of the same install), so no separate NTLARS entry is needed. SITESELECTED encodes the site (was a recurring bug in early shopfloor-setup scripts that omitted it). Adjust to your site's value if not West Jefferson. Detection uses File on the NTLARS binary: catches the case where eDNC is installed but the sub-components we actually care about are missing. DisplayVersion detection via Registry would be tighter but the x86 uninstall key path for eDNC varies across 6.x releases.",
"Name": "eDNC", "Name": "eDNC (bundles NTLARS)",
"Installer": "eDNC-6.4.3.msi", "Installer": "eDNC-6.4.3.msi",
"Type": "MSI", "Type": "MSI",
"InstallArgs": "/qn /norestart ALLUSERS=1 REBOOT=ReallySuppress SITESELECTED=\"West Jefferson\"", "InstallArgs": "/qn /norestart ALLUSERS=1 REBOOT=ReallySuppress SITESELECTED=\"West Jefferson\"",
"DetectionMethod": "Registry",
"DetectionPath": "HKLM:\\SOFTWARE\\WOW6432Node\\GE Aircraft Engines\\DNC\\General",
"DetectionName": "MachineNo"
},
{
"_comment": "NTLARS. Replace installer filename + args once we know what the vendor ships. Registry detection path guessed from the Defect_Tracker pattern; verify with a real install before relying on it.",
"Name": "NTLARS",
"Installer": "NTLARS_Setup.exe",
"Type": "EXE",
"InstallArgs": "/S",
"DetectionMethod": "File", "DetectionMethod": "File",
"DetectionPath": "C:\\Program Files (x86)\\Dnc\\Common\\NTLARS.exe" "DetectionPath": "C:\\Program Files (x86)\\Dnc\\Common\\NTLARS.exe"
},
{
"_comment": "Custom eMxInfo.txt (site-specific eDNC config). No vendor installer - the secret file lives on the SFLD share alongside the eDNC MSI. Install-eMxInfo.cmd copies it to both 32-bit and 64-bit eDNC Program Files paths. Hash detection catches both 'file missing' and 'file is a stale version'. Yearly rotation procedure: drop the new eMxInfo.txt on the share, recompute its SHA256 (PowerShell: (Get-FileHash .\\eMxInfo.txt -Algorithm SHA256).Hash), paste the new hash into DetectionValue here, save. Every Machine PC catches up on the next user logon. Content-sensitive: eMxInfo.txt must NEVER be committed to git (already in .gitignore).",
"Name": "eMxInfo.txt",
"Installer": "Install-eMxInfo.cmd",
"Type": "CMD",
"DetectionMethod": "Hash",
"DetectionPath": "C:\\Program Files\\eDNC\\eMxInfo.txt",
"DetectionValue": "87733201CB11E7343BD432F1E303FBF41DB58EBAAEFF37BD4C3C9B267B145A20"
} }
] ]
} }

View File

@@ -111,6 +111,20 @@ function Test-AppInstalled {
"File" { "File" {
return Test-Path $App.DetectionPath return Test-Path $App.DetectionPath
} }
"Hash" {
# Compare SHA256 of the on-disk file against the manifest's
# expected value. Used for content-versioned files that do not
# expose a DisplayVersion (secrets like eMxInfo.txt). Bumping
# DetectionValue in the manifest and replacing the file on the
# share is the entire update workflow.
if (-not (Test-Path $App.DetectionPath)) { return $false }
if (-not $App.DetectionValue) {
Write-InstallLog " Hash detection requires DetectionValue - treating as not installed" "WARN"
return $false
}
$actual = (Get-FileHash -Path $App.DetectionPath -Algorithm SHA256 -ErrorAction Stop).Hash
return ($actual -ieq $App.DetectionValue)
}
default { default {
Write-InstallLog " Unknown detection method: $($App.DetectionMethod)" "WARN" Write-InstallLog " Unknown detection method: $($App.DetectionMethod)" "WARN"
return $false return $false