2017-09-21 13:32:15 +02:00
|
|
|
function Connect-To {
|
|
|
|
<#
|
|
|
|
.SYNOPSIS
|
|
|
|
Connects to the given host using the stored CredentialStoreItem.
|
|
|
|
|
|
|
|
.DESCRIPTION
|
|
|
|
Establish a connection to the selected host using a stored CredentialStoreItem.
|
|
|
|
|
|
|
|
.PARAMETER RemoteHost
|
|
|
|
Specify the host, for which you would like to change the credentials.
|
|
|
|
|
|
|
|
.PARAMETER Identifier
|
|
|
|
Defaults to "". Specify a string, which separates two CredentialStoreItems for the
|
|
|
|
same hostname.
|
|
|
|
|
|
|
|
.PARAMETER Type
|
2018-03-09 14:02:51 +01:00
|
|
|
Specify the host type of the target. Currently implemented targets are: Possible connection values are:
|
2022-07-19 14:29:25 +02:00
|
|
|
|
|
|
|
- CiscoUcs
|
|
|
|
- CiscoUcsCentral
|
|
|
|
- CisServer
|
|
|
|
- ExchangeHTTP
|
|
|
|
- ExchangeHTTPS
|
|
|
|
- FTP
|
|
|
|
- NetAppFAS
|
|
|
|
- SCP
|
|
|
|
- VMware
|
2017-09-21 13:32:15 +02:00
|
|
|
|
|
|
|
.PARAMETER Credentials
|
|
|
|
Use this parameter to bypass the stored credentials. Without this parameter Connect-To tries to read the
|
|
|
|
needed credentials from the CredentialStore. If you provide this parameter you skip this lookup behavior.
|
|
|
|
So you can use it to enable credentials without preparing any user interaction.
|
|
|
|
|
|
|
|
.PARAMETER Path
|
|
|
|
Define a custom path to a shared CredentialStore.
|
|
|
|
|
|
|
|
.PARAMETER Shared
|
|
|
|
Switch to shared mode with this param. This enforces the command to work with a shared CredentialStore which
|
|
|
|
can be decrypted across systems.
|
|
|
|
|
2019-04-29 16:05:43 +02:00
|
|
|
.PARAMETER PassThru
|
|
|
|
Returns the value from the underlying connection type function.
|
|
|
|
|
2017-09-21 13:32:15 +02:00
|
|
|
.INPUTS
|
|
|
|
[None]
|
|
|
|
|
|
|
|
.OUTPUTS
|
|
|
|
[None]
|
|
|
|
|
|
|
|
.EXAMPLE
|
|
|
|
Connect-To -RemoteHost "ucs.myside.local" -Type CiscoUcs
|
2017-10-23 10:53:52 +02:00
|
|
|
|
2022-07-19 14:29:25 +02:00
|
|
|
.EXAMPLE
|
|
|
|
Connect-To -RemoteHost "ucscentral.myside.local" -Type 'CiscoUcsCentral'
|
|
|
|
|
2017-10-23 10:53:52 +02:00
|
|
|
.EXAMPLE
|
2017-09-21 13:32:15 +02:00
|
|
|
Connect-To -RemoteHost "ftp.myside.local" -Type FTP
|
2017-10-23 10:53:52 +02:00
|
|
|
|
|
|
|
.EXAMPLE
|
2017-09-21 13:32:15 +02:00
|
|
|
Connect-To -RemoteHost "fas.myside.local" -Type NetAppFAS
|
2017-10-23 10:53:52 +02:00
|
|
|
|
|
|
|
.EXAMPLE
|
2017-09-21 13:32:15 +02:00
|
|
|
Connect-To -RemoteHost "esx01.myside.local" -Type VMware
|
|
|
|
|
2017-10-23 10:53:52 +02:00
|
|
|
.EXAMPLE
|
|
|
|
Connect-To -RemoteHost "vCenter.myside.local" -Type CisServer
|
|
|
|
|
2017-12-22 08:10:37 +01:00
|
|
|
.EXAMPLE
|
|
|
|
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTP
|
|
|
|
|
|
|
|
.EXAMPLE
|
|
|
|
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
2017-09-21 13:32:15 +02:00
|
|
|
#>
|
2017-12-22 08:10:37 +01:00
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
2022-07-15 10:59:56 +02:00
|
|
|
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
|
|
|
'PSAvoidGlobalVars',
|
|
|
|
'',
|
|
|
|
Justification = 'Wrapping existing var from WinSCP module.'
|
|
|
|
)]
|
2022-06-28 08:56:33 +02:00
|
|
|
param (
|
|
|
|
[Parameter(Mandatory = $true, ParameterSetName = 'Shared')]
|
|
|
|
[Parameter(Mandatory = $true, ParameterSetName = 'Private')]
|
2017-12-22 08:10:37 +01:00
|
|
|
[string]$RemoteHost,
|
2017-09-21 13:32:15 +02:00
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[Parameter(Mandatory = $false, ParameterSetName = 'Shared')]
|
|
|
|
[Parameter(Mandatory = $false, ParameterSetName = 'Private')]
|
2017-12-22 08:10:37 +01:00
|
|
|
[string]$Identifier,
|
2017-09-21 13:32:15 +02:00
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[Parameter(Mandatory = $true, ParameterSetName = 'Shared')]
|
|
|
|
[Parameter(Mandatory = $true, ParameterSetName = 'Private')]
|
2018-03-09 14:02:51 +01:00
|
|
|
[ValidateSet(
|
|
|
|
'CiscoUcs',
|
2022-07-19 14:29:25 +02:00
|
|
|
'CiscoUcsCentral',
|
2018-03-09 14:02:51 +01:00
|
|
|
'FTP',
|
|
|
|
'NetAppFAS',
|
|
|
|
'VMware',
|
|
|
|
'CisServer',
|
|
|
|
'ExchangeHTTP',
|
|
|
|
'ExchangeHTTPS',
|
|
|
|
'SCP'
|
|
|
|
)]
|
2017-12-22 08:10:37 +01:00
|
|
|
[string]$Type,
|
2017-09-21 13:32:15 +02:00
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[Parameter(Mandatory = $False, ParameterSetName = 'Shared')]
|
|
|
|
[Parameter(Mandatory = $False, ParameterSetName = 'Private')]
|
2017-09-21 13:32:15 +02:00
|
|
|
[PSCredential]$Credentials,
|
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[Parameter(Mandatory = $true, ParameterSetNAme = 'Shared')]
|
2019-01-16 12:55:29 +01:00
|
|
|
[switch]$Shared,
|
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[Parameter(Mandatory = $False, ParameterSetName = 'Shared')]
|
2017-09-21 13:32:15 +02:00
|
|
|
[ValidateNotNullOrEmpty()]
|
2019-01-16 12:55:29 +01:00
|
|
|
[string]$Path,
|
2017-09-21 13:32:15 +02:00
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[Parameter(Mandatory = $False, ParameterSetName = 'Private')]
|
|
|
|
[Parameter(Mandatory = $False, ParameterSetName = 'Shared')]
|
2019-01-16 12:55:29 +01:00
|
|
|
[switch]$PassThru
|
2017-09-21 13:32:15 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
begin {
|
2019-01-16 12:55:29 +01:00
|
|
|
# Set the CredentialStore for private, shared or custom mode.
|
|
|
|
Write-Debug ("ParameterSetName: {0}" -f $PSCmdlet.ParameterSetName)
|
2022-06-28 08:56:33 +02:00
|
|
|
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
2019-01-16 12:55:29 +01:00
|
|
|
$Path = Get-DefaultCredentialStorePath
|
|
|
|
}
|
2022-06-28 08:56:33 +02:00
|
|
|
elseif ($PSCmdlet.ParameterSetName -eq 'Shared') {
|
2019-01-16 12:55:29 +01:00
|
|
|
if (!($PSBoundParameters.ContainsKey('Path'))) {
|
|
|
|
$Path = Get-DefaultCredentialStorePath -Shared
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-21 13:32:15 +02:00
|
|
|
switch ($Type) {
|
|
|
|
"VMware" {
|
|
|
|
# Disable the yellow certificate warning, since we haven't replaced the SSL certs for vCenter/ESXi
|
|
|
|
$null = Set-PowerCLIConfiguration -Scope Session -InvalidCertificateAction Ignore -Confirm:$false
|
|
|
|
|
|
|
|
# Disable connecting through proxy, since vCenter isn't somewhere we need a proxy for.
|
|
|
|
$null = Set-PowerCLIConfiguration -Scope Session -ProxyPolicy NoProxy -Confirm:$false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
process {
|
|
|
|
if (-not ($Credentials)) {
|
|
|
|
# Load the credential from the CredentialStore. If the credential doesn't exist, we need to
|
|
|
|
# return 1, so a calling if statement can handle the failure detection.
|
|
|
|
|
|
|
|
# Check if $Identifier has been defined, in which case we need to use different name for
|
|
|
|
# the lookup of the CredentialStoreItem.
|
|
|
|
try {
|
|
|
|
if ($Identifier -ne "") {
|
|
|
|
$RemoteHostIdentifier = "{0}/{1}" -f $Identifier, $RemoteHost
|
2019-01-16 12:55:29 +01:00
|
|
|
$creds = Get-CredentialStoreItem -Shared -RemoteHost $RemoteHostIdentifier -Path $Path
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
else {
|
2019-01-16 12:55:29 +01:00
|
|
|
$creds = Get-CredentialStoreItem -Shared -RemoteHost $RemoteHost -Path $Path
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
catch {
|
2018-03-02 13:43:06 +01:00
|
|
|
$MessageParams = @{
|
2022-07-15 10:59:56 +02:00
|
|
|
Message = (
|
|
|
|
"Unable to look up credential store item for RemoteHost " +
|
|
|
|
("{0}/Identifier {1}!" -f $RemoteHost, $Identifier)
|
|
|
|
)
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2018-03-02 13:43:06 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$creds = $Credentials
|
|
|
|
}
|
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
if ($creds.UserName -eq "" -or $creds.Password.GetType().Name -ne 'SecureString') {
|
2018-03-02 13:43:06 +01:00
|
|
|
$MessageParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Message = "Please provide valid credentials for RemoteHost {0}!" -f $RemoteHost
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2018-03-02 13:43:06 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
switch ($Type) {
|
|
|
|
"CiscoUcs" {
|
|
|
|
try {
|
2022-07-15 11:25:11 +02:00
|
|
|
$handle = Connect-Ucs -Name $RemoteHost -Credential $creds -ErrorAction 'Stop' -NotDefault
|
2022-06-28 08:56:33 +02:00
|
|
|
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcs', $handle)
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
catch {
|
2018-03-02 13:43:06 +01:00
|
|
|
$MessageParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2018-03-02 13:43:06 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
}
|
2022-07-19 14:29:25 +02:00
|
|
|
"CiscoUcsCentral" {
|
|
|
|
try {
|
|
|
|
$handle = Connect-UcsCentral -Name $RemoteHost -Credential $creds -NotDefault
|
|
|
|
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcsCentral', $handle)
|
|
|
|
}
|
|
|
|
|
|
|
|
catch {
|
|
|
|
$MessageParams = @{
|
|
|
|
Message = ('Unable to connect to {0} using {1}' -f $RemoteHost, $Type)
|
|
|
|
ErrorAction = 'Stop'
|
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
}
|
2017-09-21 13:32:15 +02:00
|
|
|
"FTP" {
|
|
|
|
# First establish the FTP session
|
|
|
|
$WinSCPConParams = @{
|
|
|
|
Credential = $creds
|
2019-01-16 12:55:29 +01:00
|
|
|
Hostname = $RemoteHost
|
|
|
|
Protocol = 'Ftp'
|
|
|
|
FtpMode = 'Passive'
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
try {
|
2018-03-26 13:01:34 +02:00
|
|
|
$FTPSessionOption = New-WinSCPSessionOption @WinSCPConParams
|
2019-04-29 16:05:43 +02:00
|
|
|
$Global:WinSCPSession = New-WinSCPSession -SessionOption $FTPSessionOption
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
catch {
|
|
|
|
throw "Could not connect to {0} using {1} protocol!" -f $RemoteHost, $Type
|
|
|
|
}
|
|
|
|
# Check the Connection State
|
|
|
|
if (!($WinSCPSession.Opened)) {
|
|
|
|
# Check the connection state and find out if the session is still open.
|
|
|
|
$MessageParams = @{
|
2022-07-15 10:59:56 +02:00
|
|
|
Message = (
|
|
|
|
("Connection to {0} using Type {1} " -f $RemoteHost, $Type) +
|
|
|
|
"was established. But now it seems to be lost!"
|
|
|
|
)
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
}
|
|
|
|
"NetAppFAS" {
|
|
|
|
try {
|
|
|
|
$null = Connect-NcController -Name $RemoteHost -Credential $creds -ErrorAction Stop -HTTPS
|
|
|
|
}
|
|
|
|
|
|
|
|
catch {
|
|
|
|
# Write a error message to the log.
|
|
|
|
$MessageParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
}
|
|
|
|
"VMware" {
|
|
|
|
try {
|
|
|
|
Connect-VIServer -Server $RemoteHost -Credential $creds -ErrorAction Stop | Out-Null
|
|
|
|
}
|
|
|
|
|
|
|
|
catch {
|
|
|
|
# Write a error message to the log.
|
|
|
|
$MessageParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
}
|
2017-10-23 10:53:52 +02:00
|
|
|
"CisServer" {
|
|
|
|
try {
|
2019-01-16 12:55:29 +01:00
|
|
|
if ($PassThru.IsPresent) {
|
|
|
|
Connect-CisServer -Server $RemoteHost -Credential $creds -ErrorAction Stop
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
Connect-CisServer -Server $RemoteHost -Credential $creds -ErrorAction Stop | Out-Null
|
|
|
|
}
|
|
|
|
|
2017-10-23 10:53:52 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
catch {
|
|
|
|
# Write a error message to the log.
|
|
|
|
$MessageParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2017-10-23 10:53:52 +02:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
}
|
2017-12-22 08:10:37 +01:00
|
|
|
"ExchangeHTTP" {
|
|
|
|
try {
|
|
|
|
$ConnectionParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
ConnectionURI = "http://{0}/powershell" -f $RemoteHost
|
2017-12-22 08:10:37 +01:00
|
|
|
ConfigurationName = 'Microsoft.Exchange'
|
2019-01-16 12:55:29 +01:00
|
|
|
Credential = $creds
|
|
|
|
ErrorAction = 'Stop'
|
2017-12-22 08:10:37 +01:00
|
|
|
}
|
|
|
|
$Global:PSExchangeRemote = New-PSSession @ConnectionParams
|
2022-07-15 10:59:56 +02:00
|
|
|
# ScriptAnalyzer issue (unused var) workaround.
|
|
|
|
$null = $Global:PSExchangeRemote
|
2017-12-22 08:10:37 +01:00
|
|
|
}
|
|
|
|
catch {
|
|
|
|
# Write a error message to the log.
|
|
|
|
$MessageParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2017-12-22 08:10:37 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
}
|
|
|
|
"ExchangeHTTPS" {
|
|
|
|
try {
|
|
|
|
$ConnectionParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
ConnectionURI = "https://{0}/powershell" -f $RemoteHost
|
2017-12-22 08:10:37 +01:00
|
|
|
ConfigurationName = 'Microsoft.Exchange'
|
2019-01-16 12:55:29 +01:00
|
|
|
Credential = $creds
|
|
|
|
ErrorAction = 'Stop'
|
2017-12-22 08:10:37 +01:00
|
|
|
}
|
|
|
|
$Global:PSExchangeRemote = New-PSSession @ConnectionParams
|
|
|
|
}
|
|
|
|
catch {
|
|
|
|
# Write a error message to the log.
|
|
|
|
$MessageParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2017-12-22 08:10:37 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
}
|
2018-03-09 14:02:51 +01:00
|
|
|
"SCP" {
|
|
|
|
$WinSCPSessionParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Credential = $creds
|
|
|
|
Hostname = $RemoteHost
|
|
|
|
Protocol = 'Scp'
|
2018-03-09 14:02:51 +01:00
|
|
|
GiveUpSecurityAndAcceptAnySshHostKey = $True
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
$SessionOption = New-WinSCPSessionOption @WinSCPSessionParams
|
|
|
|
$Global:WinSCPSession = New-WinSCPSession -SessionOption $SessionOption
|
2022-07-15 10:59:56 +02:00
|
|
|
Write-Verbose -Message (
|
|
|
|
"SCP Connection established with {0}" -f $Global:WinSCPSession.Hostname
|
|
|
|
)
|
2018-03-09 14:02:51 +01:00
|
|
|
}
|
|
|
|
catch {
|
|
|
|
# Write a error message to the log.
|
|
|
|
$MessageParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2018-03-09 14:02:51 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
# Check the Connection State
|
|
|
|
if (!($WinSCPSession.Opened)) {
|
|
|
|
# Check the connection state and find out if the session is still open.
|
|
|
|
$MessageParams = @{
|
2022-07-15 10:59:56 +02:00
|
|
|
Message = (
|
|
|
|
("Connection to {0} using Type {1} was established. " -f $RemoteHost, $Type) +
|
|
|
|
"But now it seems to be lost!"
|
|
|
|
)
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2018-03-09 14:02:51 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
}
|
2017-09-21 13:32:15 +02:00
|
|
|
default {
|
|
|
|
# Write a error message to the log.
|
|
|
|
$MessageParams = @{
|
2019-01-16 12:55:29 +01:00
|
|
|
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
2022-06-28 08:56:33 +02:00
|
|
|
ErrorAction = 'Stop'
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|