mirror of
https://github.com/Raphire/Win11Debloat.git
synced 2026-05-18 19:56:25 +00:00
Compare commits
24 Commits
2026.05.10
...
develop
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
85ae8487d6 | ||
|
|
7d209e1d23 | ||
|
|
e6e355341c | ||
|
|
3b0ea16832 | ||
|
|
d60e52bdff | ||
|
|
b0b4615718 | ||
|
|
9a375fdbc4 | ||
|
|
c3a313c084 | ||
|
|
dd6c65ddb0 | ||
|
|
05bd5f4c56 | ||
|
|
c945789d58 | ||
|
|
ff90caa338 | ||
|
|
3363962d64 | ||
|
|
cf78eeabce | ||
|
|
54830cc928 | ||
|
|
4f17727a3b | ||
|
|
1776e8dae7 | ||
|
|
bef463df4d | ||
|
|
c7cf793c9e | ||
|
|
56997dd023 | ||
|
|
959f79bc35 | ||
|
|
51aa288dfd | ||
|
|
24a6f1bcf8 | ||
|
|
8ac664e45f |
@@ -226,13 +226,20 @@ function Convert-RegistryValueToSnapshot {
|
|||||||
|
|
||||||
$valueKind = $RegistryKey.GetValueKind($ValueName)
|
$valueKind = $RegistryKey.GetValueKind($ValueName)
|
||||||
$value = $RegistryKey.GetValue($ValueName, $null, [Microsoft.Win32.RegistryValueOptions]::DoNotExpandEnvironmentNames)
|
$value = $RegistryKey.GetValue($ValueName, $null, [Microsoft.Win32.RegistryValueOptions]::DoNotExpandEnvironmentNames)
|
||||||
|
try {
|
||||||
$normalizedValue = switch ($valueKind) {
|
$normalizedValue = switch ($valueKind) {
|
||||||
([Microsoft.Win32.RegistryValueKind]::Binary) { @($value | ForEach-Object { [int]$_ }) }
|
([Microsoft.Win32.RegistryValueKind]::Binary) { @($value | ForEach-Object { [int]$_ }) }
|
||||||
([Microsoft.Win32.RegistryValueKind]::MultiString) { @($value) }
|
([Microsoft.Win32.RegistryValueKind]::MultiString) { @($value) }
|
||||||
([Microsoft.Win32.RegistryValueKind]::DWord) { [uint32]$value }
|
([Microsoft.Win32.RegistryValueKind]::DWord) { [BitConverter]::ToUInt32([BitConverter]::GetBytes([int32]$value), 0) }
|
||||||
([Microsoft.Win32.RegistryValueKind]::QWord) { [uint64]$value }
|
([Microsoft.Win32.RegistryValueKind]::QWord) { [BitConverter]::ToUInt64([BitConverter]::GetBytes([int64]$value), 0) }
|
||||||
default { if ($null -ne $value) { [string]$value } else { $null } }
|
default { if ($null -ne $value) { [string]$value } else { $null } }
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$valueType = if ($null -ne $value) { $value.GetType().FullName } else { '<null>' }
|
||||||
|
$valueForLog = if ($null -eq $value) { '<null>' } elseif ($value -is [array]) { ($value -join ',') } else { [string]$value }
|
||||||
|
throw "Failed to normalize registry value for backup. Key='$($RegistryKey.Name)' Name='$ValueName' Kind='$valueKind' RawType='$valueType' RawValue='$valueForLog'. InnerError: $($_.Exception.Message)"
|
||||||
|
}
|
||||||
|
|
||||||
return @{
|
return @{
|
||||||
Name = $ValueName
|
Name = $ValueName
|
||||||
|
|||||||
@@ -170,8 +170,13 @@ function ExecuteAllChanges {
|
|||||||
}
|
}
|
||||||
|
|
||||||
Write-Host "> Creating registry backup..."
|
Write-Host "> Creating registry backup..."
|
||||||
|
try {
|
||||||
New-RegistrySettingsBackup -ActionableKeys $actionableKeys | Out-Null
|
New-RegistrySettingsBackup -ActionableKeys $actionableKeys | Out-Null
|
||||||
}
|
}
|
||||||
|
catch {
|
||||||
|
throw "Registry backup failed before applying changes. $($_.Exception.Message)"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
# Create restore point if requested (CLI only - GUI handles this separately)
|
# Create restore point if requested (CLI only - GUI handles this separately)
|
||||||
if ($script:Params.ContainsKey("CreateRestorePoint")) {
|
if ($script:Params.ContainsKey("CreateRestorePoint")) {
|
||||||
|
|||||||
@@ -8,12 +8,13 @@ function ImportRegistryFile {
|
|||||||
Write-Host $message
|
Write-Host $message
|
||||||
|
|
||||||
$usesOfflineHive = $script:Params.ContainsKey("Sysprep") -or $script:Params.ContainsKey("User")
|
$usesOfflineHive = $script:Params.ContainsKey("Sysprep") -or $script:Params.ContainsKey("User")
|
||||||
$regFilePath = if ($usesOfflineHive) {
|
$regFileDirectory = if ($usesOfflineHive) {
|
||||||
"$script:RegfilesPath\Sysprep\$path"
|
Join-Path $script:RegfilesPath "Sysprep"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"$script:RegfilesPath\$path"
|
$script:RegfilesPath
|
||||||
}
|
}
|
||||||
|
$regFilePath = Join-Path $regFileDirectory $path
|
||||||
|
|
||||||
if (-not (Test-Path $regFilePath)) {
|
if (-not (Test-Path $regFilePath)) {
|
||||||
$errorMessage = "Unable to find registry file: $path ($regFilePath)"
|
$errorMessage = "Unable to find registry file: $path ($regFilePath)"
|
||||||
@@ -22,19 +23,28 @@ function ImportRegistryFile {
|
|||||||
throw $errorMessage
|
throw $errorMessage
|
||||||
}
|
}
|
||||||
|
|
||||||
# Reset exit code before running reg.exe for reliable success detection
|
$regResult = $null
|
||||||
$global:LASTEXITCODE = 0
|
$offlineHiveLoaded = $false
|
||||||
|
|
||||||
|
try {
|
||||||
if ($usesOfflineHive) {
|
if ($usesOfflineHive) {
|
||||||
# Sysprep targets Default user, User targets the specified user
|
# Sysprep targets Default user, User targets the specified user
|
||||||
$hiveDatPath = if ($script:Params.ContainsKey("Sysprep")) {
|
$targetUserName = if ($script:Params.ContainsKey("Sysprep")) { "Default" } else { $script:Params.Item("User") }
|
||||||
GetUserDirectory -userName "Default" -fileName "NTUSER.DAT"
|
$hiveDatPath = GetUserDirectory -userName $targetUserName -fileName "NTUSER.DAT"
|
||||||
} else {
|
|
||||||
GetUserDirectory -userName $script:Params.Item("User") -fileName "NTUSER.DAT"
|
$global:LASTEXITCODE = 0
|
||||||
|
reg load "HKU\Default" $hiveDatPath | Out-Null
|
||||||
|
$loadExitCode = $LASTEXITCODE
|
||||||
|
|
||||||
|
if ($loadExitCode -ne 0) {
|
||||||
|
throw "Failed importing registry file '$path'. Offline hive load failed: Failed to load user hive at '$hiveDatPath' (exit code: $loadExitCode)"
|
||||||
|
}
|
||||||
|
|
||||||
|
$offlineHiveLoaded = $true
|
||||||
}
|
}
|
||||||
|
|
||||||
$regResult = Invoke-NonBlocking -ScriptBlock {
|
$regResult = Invoke-NonBlocking -ScriptBlock {
|
||||||
param($hivePath, $targetRegFilePath)
|
param($targetRegFilePath)
|
||||||
$result = @{
|
$result = @{
|
||||||
Output = @()
|
Output = @()
|
||||||
ExitCode = 0
|
ExitCode = 0
|
||||||
@@ -43,13 +53,6 @@ function ImportRegistryFile {
|
|||||||
|
|
||||||
try {
|
try {
|
||||||
$global:LASTEXITCODE = 0
|
$global:LASTEXITCODE = 0
|
||||||
reg load "HKU\Default" $hivePath | Out-Null
|
|
||||||
$loadExitCode = $LASTEXITCODE
|
|
||||||
|
|
||||||
if ($loadExitCode -ne 0) {
|
|
||||||
throw "Failed to load user hive at '$hivePath' (exit code: $loadExitCode)"
|
|
||||||
}
|
|
||||||
|
|
||||||
$output = reg import $targetRegFilePath 2>&1
|
$output = reg import $targetRegFilePath 2>&1
|
||||||
$importExitCode = $LASTEXITCODE
|
$importExitCode = $LASTEXITCODE
|
||||||
|
|
||||||
@@ -66,27 +69,9 @@ function ImportRegistryFile {
|
|||||||
$result.Error = $_.Exception.Message
|
$result.Error = $_.Exception.Message
|
||||||
$result.ExitCode = if ($LASTEXITCODE -ne 0) { $LASTEXITCODE } else { 1 }
|
$result.ExitCode = if ($LASTEXITCODE -ne 0) { $LASTEXITCODE } else { 1 }
|
||||||
}
|
}
|
||||||
finally {
|
|
||||||
$global:LASTEXITCODE = 0
|
|
||||||
reg unload "HKU\Default" | Out-Null
|
|
||||||
$unloadExitCode = $LASTEXITCODE
|
|
||||||
if ($unloadExitCode -ne 0 -and -not $result.Error) {
|
|
||||||
$result.Error = "Failed to unload registry hive HKU\Default (exit code: $unloadExitCode)"
|
|
||||||
$result.ExitCode = $unloadExitCode
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $result
|
return $result
|
||||||
} -ArgumentList @($hiveDatPath, $regFilePath)
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
$regResult = Invoke-NonBlocking -ScriptBlock {
|
|
||||||
param($targetRegFilePath)
|
|
||||||
$global:LASTEXITCODE = 0
|
|
||||||
$output = reg import $targetRegFilePath 2>&1
|
|
||||||
return @{ Output = @($output); ExitCode = $LASTEXITCODE; Error = $null }
|
|
||||||
} -ArgumentList $regFilePath
|
} -ArgumentList $regFilePath
|
||||||
}
|
|
||||||
|
|
||||||
$regOutput = @($regResult.Output)
|
$regOutput = @($regResult.Output)
|
||||||
$hasSuccess = ($regResult.ExitCode -eq 0) -and -not $regResult.Error
|
$hasSuccess = ($regResult.ExitCode -eq 0) -and -not $regResult.Error
|
||||||
@@ -107,11 +92,27 @@ function ImportRegistryFile {
|
|||||||
|
|
||||||
if (-not $hasSuccess) {
|
if (-not $hasSuccess) {
|
||||||
$details = if ($regResult.Error) { $regResult.Error } else { "Exit code: $($regResult.ExitCode)" }
|
$details = if ($regResult.Error) { $regResult.Error } else { "Exit code: $($regResult.ExitCode)" }
|
||||||
$errorMessage = "Failed importing registry file '$path'. $details"
|
Write-Warning "reg import failed for '$path'. Falling back to PowerShell registry writer. Details: $details"
|
||||||
Write-Host $errorMessage -ForegroundColor Red
|
Invoke-RegistryOperationsFromRegFile -RegFilePath $regFilePath
|
||||||
Write-Host ""
|
Write-Host "Fallback import succeeded for '$path'." -ForegroundColor Yellow
|
||||||
throw $errorMessage
|
|
||||||
}
|
}
|
||||||
|
|
||||||
Write-Host ""
|
Write-Host ""
|
||||||
}
|
}
|
||||||
|
catch {
|
||||||
|
Write-Host $_.Exception.Message -ForegroundColor Red
|
||||||
|
Write-Host ""
|
||||||
|
throw
|
||||||
|
}
|
||||||
|
finally {
|
||||||
|
if ($offlineHiveLoaded) {
|
||||||
|
$global:LASTEXITCODE = 0
|
||||||
|
reg unload "HKU\Default" | Out-Null
|
||||||
|
$unloadExitCode = $LASTEXITCODE
|
||||||
|
|
||||||
|
if ($unloadExitCode -ne 0) {
|
||||||
|
throw "Failed to unload registry hive HKU\Default after importing '$path' (exit code: $unloadExitCode)"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -157,8 +157,14 @@ function Convert-RegistryValueDataFromBackup {
|
|||||||
)
|
)
|
||||||
|
|
||||||
switch ($Kind) {
|
switch ($Kind) {
|
||||||
([Microsoft.Win32.RegistryValueKind]::DWord) { return [uint32]$Data }
|
([Microsoft.Win32.RegistryValueKind]::DWord) {
|
||||||
([Microsoft.Win32.RegistryValueKind]::QWord) { return [uint64]$Data }
|
$unsigned = [uint32]$Data
|
||||||
|
return [BitConverter]::ToInt32([BitConverter]::GetBytes($unsigned), 0)
|
||||||
|
}
|
||||||
|
([Microsoft.Win32.RegistryValueKind]::QWord) {
|
||||||
|
$unsigned = [uint64]$Data
|
||||||
|
return [BitConverter]::ToInt64([BitConverter]::GetBytes($unsigned), 0)
|
||||||
|
}
|
||||||
([Microsoft.Win32.RegistryValueKind]::MultiString) { return @($Data | ForEach-Object { [string]$_ }) }
|
([Microsoft.Win32.RegistryValueKind]::MultiString) { return @($Data | ForEach-Object { [string]$_ }) }
|
||||||
([Microsoft.Win32.RegistryValueKind]::Binary) {
|
([Microsoft.Win32.RegistryValueKind]::Binary) {
|
||||||
$bytes = Convert-BackupDataToByteArray -Data $Data
|
$bytes = Convert-BackupDataToByteArray -Data $Data
|
||||||
|
|||||||
@@ -24,7 +24,7 @@ function Show-RestoreBackupWindow {
|
|||||||
|
|
||||||
Write-Host "User confirmed registry restore for $($backup.Target)."
|
Write-Host "User confirmed registry restore for $($backup.Target)."
|
||||||
Restore-RegistryBackupState -Backup $backup
|
Restore-RegistryBackupState -Backup $backup
|
||||||
$successMessage = 'Registry backup restored successfully.'
|
$successMessage = 'Registry backup restored successfully. Please restart your computer for all changes to take effect.'
|
||||||
}
|
}
|
||||||
elseif ($dialogResult.Result -eq 'RestoreStartMenu') {
|
elseif ($dialogResult.Result -eq 'RestoreStartMenu') {
|
||||||
$scope = $dialogResult.StartMenuScope
|
$scope = $dialogResult.StartMenuScope
|
||||||
|
|||||||
223
Scripts/Helpers/ApplyRegistryRegFile.ps1
Normal file
223
Scripts/Helpers/ApplyRegistryRegFile.ps1
Normal file
@@ -0,0 +1,223 @@
|
|||||||
|
function Get-NormalizedRegistryValueName {
|
||||||
|
param(
|
||||||
|
[AllowNull()]
|
||||||
|
$ValueName
|
||||||
|
)
|
||||||
|
|
||||||
|
if ([string]::IsNullOrEmpty([string]$ValueName)) {
|
||||||
|
return ''
|
||||||
|
}
|
||||||
|
|
||||||
|
return [string]$ValueName
|
||||||
|
}
|
||||||
|
|
||||||
|
function Convert-RegOperationToValueKind {
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
$Operation
|
||||||
|
)
|
||||||
|
|
||||||
|
$valueName = if ([string]::IsNullOrEmpty([string]$Operation.ValueName)) { '' } else { [string]$Operation.ValueName }
|
||||||
|
$valueType = [string]$Operation.ValueType
|
||||||
|
$operationKeyPath = [string]$Operation.KeyPath
|
||||||
|
|
||||||
|
switch ($valueType) {
|
||||||
|
'DWord' {
|
||||||
|
$unsigned = [uint32]$Operation.ValueData
|
||||||
|
$value = [BitConverter]::ToInt32([BitConverter]::GetBytes($unsigned), 0)
|
||||||
|
return @{ Name = $valueName; Kind = [Microsoft.Win32.RegistryValueKind]::DWord; Value = $value }
|
||||||
|
}
|
||||||
|
'String' {
|
||||||
|
return @{ Name = $valueName; Kind = [Microsoft.Win32.RegistryValueKind]::String; Value = [string]$Operation.ValueData }
|
||||||
|
}
|
||||||
|
'Binary' {
|
||||||
|
return @{ Name = $valueName; Kind = [Microsoft.Win32.RegistryValueKind]::Binary; Value = [byte[]]$Operation.ValueData }
|
||||||
|
}
|
||||||
|
default {
|
||||||
|
throw "Unsupported value type '$valueType' while applying reg operation for '$operationKeyPath'"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function Remove-RegistrySubKeyTreeIfExists {
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
[Microsoft.Win32.RegistryKey]$RootKey,
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
[string]$SubKeyPath
|
||||||
|
)
|
||||||
|
|
||||||
|
try {
|
||||||
|
$RootKey.DeleteSubKeyTree($SubKeyPath, $false)
|
||||||
|
}
|
||||||
|
catch [System.UnauthorizedAccessException], [System.Security.SecurityException] {
|
||||||
|
throw
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
# Best-effort cleanup only; missing keys are fine.
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function Get-RegistryKeyForOperation {
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
[string]$RegistryPath,
|
||||||
|
[switch]$CreateIfMissing,
|
||||||
|
[bool]$OpenKey = $true
|
||||||
|
)
|
||||||
|
|
||||||
|
$parts = Split-RegistryPath -path $RegistryPath
|
||||||
|
if (-not $parts) {
|
||||||
|
throw "Unsupported registry path: $RegistryPath"
|
||||||
|
}
|
||||||
|
|
||||||
|
$rootKey = Get-RegistryRootKey -hiveName $parts.Hive
|
||||||
|
if (-not $rootKey) {
|
||||||
|
throw "Unsupported registry hive '$($parts.Hive)' in path '$RegistryPath'"
|
||||||
|
}
|
||||||
|
|
||||||
|
$subKeyPath = $parts.SubKey
|
||||||
|
if ([string]::IsNullOrWhiteSpace($subKeyPath)) {
|
||||||
|
return [PSCustomObject]@{ RootKey = $rootKey; SubKeyPath = $null; Key = $rootKey }
|
||||||
|
}
|
||||||
|
|
||||||
|
if (-not $OpenKey) {
|
||||||
|
return [PSCustomObject]@{ RootKey = $rootKey; SubKeyPath = $subKeyPath; Key = $null }
|
||||||
|
}
|
||||||
|
|
||||||
|
$key = if ($CreateIfMissing) {
|
||||||
|
$rootKey.CreateSubKey($subKeyPath)
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$rootKey.OpenSubKey($subKeyPath, $true)
|
||||||
|
}
|
||||||
|
|
||||||
|
return [PSCustomObject]@{ RootKey = $rootKey; SubKeyPath = $subKeyPath; Key = $key }
|
||||||
|
}
|
||||||
|
|
||||||
|
function Invoke-RegistryDeleteValueOperation {
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
$Operation,
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
$KeyInfo
|
||||||
|
)
|
||||||
|
|
||||||
|
if ($null -eq $KeyInfo.Key) {
|
||||||
|
$valueName = Get-NormalizedRegistryValueName -ValueName $Operation.ValueName
|
||||||
|
$displayValueName = if ([string]::IsNullOrEmpty($valueName)) { '(Default)' } else { $valueName }
|
||||||
|
Write-Verbose "Unable to find or open key '$($Operation.KeyPath)' and value '$displayValueName'"
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
$valueName = Get-NormalizedRegistryValueName -ValueName $Operation.ValueName
|
||||||
|
$KeyInfo.Key.DeleteValue($valueName, $false)
|
||||||
|
}
|
||||||
|
finally {
|
||||||
|
$KeyInfo.Key.Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function Invoke-RegistrySetValueOperation {
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
$Operation,
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
$KeyInfo
|
||||||
|
)
|
||||||
|
|
||||||
|
if ($null -eq $KeyInfo.Key) {
|
||||||
|
throw [System.UnauthorizedAccessException]::new("Unable to open or create registry key '$($Operation.KeyPath)'")
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
$setArgs = Convert-RegOperationToValueKind -Operation $Operation
|
||||||
|
$KeyInfo.Key.SetValue($setArgs.Name, $setArgs.Value, $setArgs.Kind)
|
||||||
|
}
|
||||||
|
finally {
|
||||||
|
$KeyInfo.Key.Close()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function Write-RegistryOperationAccessDeniedWarning {
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
$Operation,
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
[string]$ExceptionMessage
|
||||||
|
)
|
||||||
|
|
||||||
|
$keyPath = [string]$Operation.KeyPath
|
||||||
|
$operationType = [string]$Operation.OperationType
|
||||||
|
|
||||||
|
if ($operationType -eq 'SetValue' -or $operationType -eq 'DeleteValue') {
|
||||||
|
$valueName = Get-NormalizedRegistryValueName -ValueName $Operation.ValueName
|
||||||
|
$displayValueName = if ([string]::IsNullOrEmpty($valueName)) { '(Default)' } else { $valueName }
|
||||||
|
Write-Warning "Skipping operation '$operationType' on key '$keyPath' value '$displayValueName' due to access restrictions: $ExceptionMessage"
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
Write-Warning "Skipping operation '$operationType' on key '$keyPath' due to access restrictions: $ExceptionMessage"
|
||||||
|
}
|
||||||
|
|
||||||
|
function Invoke-RegistryOperation {
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
$Operation,
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
[string]$RegFilePath
|
||||||
|
)
|
||||||
|
|
||||||
|
$operationType = [string]$Operation.OperationType
|
||||||
|
$isSetValueOperation = $operationType -eq 'SetValue'
|
||||||
|
$isDeleteKeyOperation = $operationType -eq 'DeleteKey'
|
||||||
|
|
||||||
|
$keyInfo = Get-RegistryKeyForOperation -RegistryPath $Operation.KeyPath -CreateIfMissing:$isSetValueOperation -OpenKey:(-not $isDeleteKeyOperation)
|
||||||
|
|
||||||
|
switch ($operationType) {
|
||||||
|
'DeleteKey' {
|
||||||
|
if ($null -ne $keyInfo.SubKeyPath) {
|
||||||
|
Remove-RegistrySubKeyTreeIfExists -RootKey $keyInfo.RootKey -SubKeyPath $keyInfo.SubKeyPath
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'DeleteValue' {
|
||||||
|
Invoke-RegistryDeleteValueOperation -Operation $Operation -KeyInfo $keyInfo
|
||||||
|
}
|
||||||
|
'SetValue' {
|
||||||
|
Invoke-RegistrySetValueOperation -Operation $Operation -KeyInfo $keyInfo
|
||||||
|
}
|
||||||
|
default {
|
||||||
|
throw "Unsupported reg operation type '$($Operation.OperationType)' in '$RegFilePath'"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function Invoke-RegistryOperationsFromRegFile {
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
[string]$RegFilePath
|
||||||
|
)
|
||||||
|
|
||||||
|
$accessDeniedCount = 0
|
||||||
|
$operations = @(Get-RegFileOperations -regFilePath $RegFilePath)
|
||||||
|
$totalOperations = $operations.Count
|
||||||
|
|
||||||
|
foreach ($operation in $operations) {
|
||||||
|
try {
|
||||||
|
Invoke-RegistryOperation -Operation $operation -RegFilePath $RegFilePath
|
||||||
|
}
|
||||||
|
catch [System.UnauthorizedAccessException], [System.Security.SecurityException] {
|
||||||
|
$accessDeniedCount++
|
||||||
|
Write-RegistryOperationAccessDeniedWarning -Operation $operation -ExceptionMessage $_.Exception.Message
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($totalOperations -gt 0 -and $accessDeniedCount -eq $totalOperations) {
|
||||||
|
throw "Registry fallback import could not apply any operations in '$RegFilePath' because all $accessDeniedCount operation(s) were blocked by access restrictions."
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($accessDeniedCount -gt 0) {
|
||||||
|
Write-Warning "Registry fallback import completed with $accessDeniedCount access-restricted operation(s) skipped in '$RegFilePath'."
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -141,7 +141,7 @@ if (-not $isAdmin) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
# Define script-level variables & paths
|
# Define script-level variables & paths
|
||||||
$script:Version = "2026.05.10"
|
$script:Version = "2026.05.11"
|
||||||
$configPath = Join-Path $PSScriptRoot 'Config'
|
$configPath = Join-Path $PSScriptRoot 'Config'
|
||||||
$logsPath = Join-Path $PSScriptRoot 'Logs'
|
$logsPath = Join-Path $PSScriptRoot 'Logs'
|
||||||
$schemasPath = Join-Path $PSScriptRoot 'Schemas'
|
$schemasPath = Join-Path $PSScriptRoot 'Schemas'
|
||||||
@@ -349,6 +349,7 @@ if (-not $script:WingetInstalled -and -not $Silent) {
|
|||||||
. "$PSScriptRoot/Scripts/Helpers/GetUserDirectory.ps1"
|
. "$PSScriptRoot/Scripts/Helpers/GetUserDirectory.ps1"
|
||||||
. "$PSScriptRoot/Scripts/Helpers/GetUserName.ps1"
|
. "$PSScriptRoot/Scripts/Helpers/GetUserName.ps1"
|
||||||
. "$PSScriptRoot/Scripts/Helpers/RegistryPathHelpers.ps1"
|
. "$PSScriptRoot/Scripts/Helpers/RegistryPathHelpers.ps1"
|
||||||
|
. "$PSScriptRoot/Scripts/Helpers/ApplyRegistryRegFile.ps1"
|
||||||
. "$PSScriptRoot/Scripts/Helpers/TestIfUserIsLoggedIn.ps1"
|
. "$PSScriptRoot/Scripts/Helpers/TestIfUserIsLoggedIn.ps1"
|
||||||
|
|
||||||
# Threading functions
|
# Threading functions
|
||||||
@@ -401,7 +402,7 @@ else {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if ($script:Params.ContainsKey("Sysprep")) {
|
if ($script:Params.ContainsKey("Sysprep")) {
|
||||||
$defaultUserPath = GetUserDirectory -userName "Default"
|
GetUserDirectory -userName "Default" | Out-Null
|
||||||
|
|
||||||
# Exit script if run in Sysprep mode on Windows 10
|
# Exit script if run in Sysprep mode on Windows 10
|
||||||
if ($WinVersion -lt 22000) {
|
if ($WinVersion -lt 22000) {
|
||||||
@@ -412,10 +413,10 @@ if ($script:Params.ContainsKey("Sysprep")) {
|
|||||||
|
|
||||||
# Ensure that target user exists, if User or AppRemovalTarget parameter was provided
|
# Ensure that target user exists, if User or AppRemovalTarget parameter was provided
|
||||||
if ($script:Params.ContainsKey("User")) {
|
if ($script:Params.ContainsKey("User")) {
|
||||||
$userPath = GetUserDirectory -userName $script:Params.Item("User")
|
GetUserDirectory -userName $script:Params.Item("User") | Out-Null
|
||||||
}
|
}
|
||||||
if ($script:Params.ContainsKey("AppRemovalTarget")) {
|
if ($script:Params.ContainsKey("AppRemovalTarget")) {
|
||||||
$userPath = GetUserDirectory -userName $script:Params.Item("AppRemovalTarget")
|
GetUserDirectory -userName $script:Params.Item("AppRemovalTarget") | Out-Null
|
||||||
}
|
}
|
||||||
|
|
||||||
# Remove LastUsedSettings.json file if it exists and is empty
|
# Remove LastUsedSettings.json file if it exists and is empty
|
||||||
|
|||||||
Reference in New Issue
Block a user