forked from OCram85/PSCredentialStore
Compare commits
30 Commits
0c87e6b9c0
...
ConnectTo-
Author | SHA1 | Date | |
---|---|---|---|
ffab53f0d7 | |||
789be844d0 | |||
fd6dc42099 | |||
76a4dd6e99 | |||
db0fa1cf4a | |||
471a372bf9 | |||
e3349cc4dd | |||
2399f227c9 | |||
1747bb24a8 | |||
c125ad0acd | |||
2a51e76b07 | |||
13351d7e2e | |||
3105a3230a | |||
9ed86fd126 | |||
4c9c03d7da | |||
22631f2836 | |||
a5b430e4ae | |||
c272b30cb4 | |||
b7ad5663dc | |||
9de752691b | |||
f27f1faad7 | |||
56727afa3e | |||
79a1a214c2 | |||
f2b7910b15 | |||
0b5c9823e0 | |||
42fdb0a373 | |||
2bd250971b | |||
ac6a9d8202 | |||
3d4f53ddc7 | |||
6fce8d6a8c |
32
.changelog.yml
Normal file
32
.changelog.yml
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
# The full repository name
|
||||||
|
repo: OCram85/PSCredentialStore
|
||||||
|
|
||||||
|
# Service type (gitea or github)
|
||||||
|
service: gitea
|
||||||
|
|
||||||
|
# Base URL for Gitea instance if using gitea service type (optional)
|
||||||
|
# Default: https://gitea.com
|
||||||
|
base-url: https://gitea.ocram85.com
|
||||||
|
|
||||||
|
# Changelog groups and which labeled PRs to add to each group
|
||||||
|
groups:
|
||||||
|
- name: ✨ FEATURES
|
||||||
|
labels:
|
||||||
|
- feature
|
||||||
|
- name: 📦 META
|
||||||
|
labels:
|
||||||
|
- meta
|
||||||
|
- name: 🐛 BUGFIXES
|
||||||
|
labels:
|
||||||
|
- bug
|
||||||
|
- name: 🛠️ ENHANCEMENTS
|
||||||
|
labels:
|
||||||
|
- enhancement
|
||||||
|
- name: 📚 DOCS
|
||||||
|
labels:
|
||||||
|
- docs
|
||||||
|
- name: 🔖 MISC
|
||||||
|
default: true
|
||||||
|
|
||||||
|
# regex indicating which labels to skip for the changelog
|
||||||
|
skip-labels: skip-changelog|backport\/.+
|
@ -120,7 +120,7 @@ steps:
|
|||||||
Install-Module -Name 'DroneHelper' -Repository 'PSGallery' -ErrorAction 'Stop' -AllowPrerelease -Force;
|
Install-Module -Name 'DroneHelper' -Repository 'PSGallery' -ErrorAction 'Stop' -AllowPrerelease -Force;
|
||||||
Import-Module -Name 'DroneHelper' -ErrorAction 'Stop';
|
Import-Module -Name 'DroneHelper' -ErrorAction 'Stop';
|
||||||
Install-ModuleDependency;
|
Install-ModuleDependency;
|
||||||
New-BuildPackage -Verbose
|
New-BuildPackage -Verbose -AdditionalPath @('./src/Vendor', './src/openssl.conf')
|
||||||
}"
|
}"
|
||||||
|
|
||||||
- name: GiteaRelease
|
- name: GiteaRelease
|
||||||
|
1
.gitattributes
vendored
1
.gitattributes
vendored
@ -21,4 +21,5 @@
|
|||||||
|
|
||||||
# Vendor resources config
|
# Vendor resources config
|
||||||
src/Vendor/libressl255/* filter=lfs diff=lfs merge=lfs -text
|
src/Vendor/libressl255/* filter=lfs diff=lfs merge=lfs -text
|
||||||
|
src/Vendor/libressl/* filter=lfs diff=lfs merge=lfs -text
|
||||||
*.pfx filter=lfs diff=lfs merge=lfs -text
|
*.pfx filter=lfs diff=lfs merge=lfs -text
|
||||||
|
19
CHANGELOG.md
19
CHANGELOG.md
@ -1,9 +1,25 @@
|
|||||||
# Changelog
|
# Changelog
|
||||||
|
|
||||||
<!-- insertMark -->
|
<!-- insertMark -->
|
||||||
|
## [v1.1.1](https://gitea.ocram85.com/OCram85/PSCredentialStore/releases/tag/v1.1.1) - 2022-10-10
|
||||||
|
|
||||||
|
* 📦 META
|
||||||
|
* Adds changelog config for gitea changelog cli tool (#77)
|
||||||
|
* 🐛 BUGFIXES
|
||||||
|
* Fix Set-CredentialStoreItem (#76)
|
||||||
|
* Fix optional module dependencies (#75)
|
||||||
|
|
||||||
|
### Contributors
|
||||||
|
|
||||||
|
|
||||||
|
* [@OCram85](https://gitea.ocram85.com/OCram85)
|
||||||
|
* [@pinguinfuss](https://gitea.ocram85.com/pinguinfuss)
|
||||||
|
|
||||||
## `v1.1.0`
|
## `v1.1.0`
|
||||||
|
|
||||||
- (acb09ba) update Changelog
|
- (3d4f53d) adds pinguinfuss contributed fix (#73)
|
||||||
|
- (6fce8d6) Updates libressl files (#71)
|
||||||
|
- (ddb85d9) addChangelog (#70)
|
||||||
- (5bdb383) updates Readme (#69)
|
- (5bdb383) updates Readme (#69)
|
||||||
- (a95ba31) remove optional depenency helper (#68)
|
- (a95ba31) remove optional depenency helper (#68)
|
||||||
- (1e7dd78) adds CiscoUCSCentral connection type (#67)
|
- (1e7dd78) adds CiscoUCSCentral connection type (#67)
|
||||||
@ -20,7 +36,6 @@
|
|||||||
- (4abfec5) adds PR template (#55)
|
- (4abfec5) adds PR template (#55)
|
||||||
- (7708df9) Update pwsh style to latest community standards (#52)
|
- (7708df9) Update pwsh style to latest community standards (#52)
|
||||||
|
|
||||||
|
|
||||||
## `v1.0.542`
|
## `v1.0.542`
|
||||||
|
|
||||||
- 🧙 pre migrated Gitea version
|
- 🧙 pre migrated Gitea version
|
||||||
|
@ -66,7 +66,7 @@ function New-CSCertificate {
|
|||||||
($PSVersionTable.PSEdition -eq 'Desktop' -and $PSVersionTable.PSVersion.Major -lt 6) -or
|
($PSVersionTable.PSEdition -eq 'Desktop' -and $PSVersionTable.PSVersion.Major -lt 6) -or
|
||||||
($IsWindows -eq $true)
|
($IsWindows -eq $true)
|
||||||
) {
|
) {
|
||||||
$openssl = Join-Path -Path $ModuleBase -ChildPath '/Vendor/libressl255/openssl.exe'
|
$openssl = Join-Path -Path $ModuleBase -ChildPath '/Vendor/libressl/openssl.exe'
|
||||||
}
|
}
|
||||||
|
|
||||||
$Env:OPENSSL_CONF = Join-Path $ModuleBase -ChildPath '/openssl.conf'
|
$Env:OPENSSL_CONF = Join-Path $ModuleBase -ChildPath '/openssl.conf'
|
||||||
|
@ -10,7 +10,7 @@ function Connect-To {
|
|||||||
Specify the host, for which you would like to change the credentials.
|
Specify the host, for which you would like to change the credentials.
|
||||||
|
|
||||||
.PARAMETER Identifier
|
.PARAMETER Identifier
|
||||||
Defaults to "". Specify a string, which separates two CredentialStoreItems for the
|
Defaults to ''. Specify a string, which separates two CredentialStoreItems for the
|
||||||
same hostname.
|
same hostname.
|
||||||
|
|
||||||
.PARAMETER Type
|
.PARAMETER Type
|
||||||
@ -18,13 +18,14 @@ function Connect-To {
|
|||||||
|
|
||||||
- CiscoUcs
|
- CiscoUcs
|
||||||
- CiscoUcsCentral
|
- CiscoUcsCentral
|
||||||
- CisServer
|
|
||||||
- ExchangeHTTP
|
- ExchangeHTTP
|
||||||
- ExchangeHTTPS
|
- ExchangeHTTPS
|
||||||
- FTP
|
- FTP
|
||||||
- NetAppFAS
|
- NetAppFAS
|
||||||
|
- NetAppStorageGRID
|
||||||
- SCP
|
- SCP
|
||||||
- VMware
|
- VMware
|
||||||
|
- VMwareCisServer
|
||||||
|
|
||||||
.PARAMETER Credentials
|
.PARAMETER Credentials
|
||||||
Use this parameter to bypass the stored credentials. Without this parameter Connect-To tries to read the
|
Use this parameter to bypass the stored credentials. Without this parameter Connect-To tries to read the
|
||||||
@ -48,36 +49,42 @@ function Connect-To {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "ucs.myside.local" -Type CiscoUcs
|
Connect-To -RemoteHost 'vc.domain.local' -Type CisServer
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "ucscentral.myside.local" -Type 'CiscoUcsCentral'
|
Connect-To -RemoteHost 'ucs.domain.local' -Type CiscoUcs
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "ftp.myside.local" -Type FTP
|
Connect-To -RemoteHost 'ucs-central.domain.local' -Type 'CiscoUcsCentral'
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "fas.myside.local" -Type NetAppFAS
|
Connect-To -RemoteHost 'exchange01.domain.local' -Type ExchangeHTTP
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "esx01.myside.local" -Type VMware
|
Connect-To -RemoteHost 'exchange01.domain.local' -Type ExchangeHTTPS
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "vCenter.myside.local" -Type CisServer
|
Connect-To -RemoteHost 'ftp.domain.local' -Type FTP
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTP
|
Connect-To -RemoteHost 'fas.domain.local' -Type NetAppFAS
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
Connect-To -RemoteHost 'grid.domain.local' -Type NetAppStorageGRID
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
Connect-To -RemoteHost 'esx01.domain.local' -Type VMware
|
||||||
|
|
||||||
#>
|
#>
|
||||||
|
|
||||||
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
||||||
|
|
||||||
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
||||||
'PSAvoidGlobalVars',
|
'PSAvoidGlobalVars',
|
||||||
'',
|
'',
|
||||||
Justification = 'Wrapping existing var from WinSCP module.'
|
Justification = 'Wrapping existing var from WinSCP module.'
|
||||||
)]
|
)]
|
||||||
|
|
||||||
param (
|
param (
|
||||||
[Parameter(Mandatory = $true, ParameterSetName = 'Shared')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'Shared')]
|
||||||
[Parameter(Mandatory = $true, ParameterSetName = 'Private')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'Private')]
|
||||||
@ -92,13 +99,14 @@ function Connect-To {
|
|||||||
[ValidateSet(
|
[ValidateSet(
|
||||||
'CiscoUcs',
|
'CiscoUcs',
|
||||||
'CiscoUcsCentral',
|
'CiscoUcsCentral',
|
||||||
'FTP',
|
|
||||||
'NetAppFAS',
|
|
||||||
'VMware',
|
|
||||||
'CisServer',
|
|
||||||
'ExchangeHTTP',
|
'ExchangeHTTP',
|
||||||
'ExchangeHTTPS',
|
'ExchangeHTTPS',
|
||||||
'SCP'
|
'FTP',
|
||||||
|
'NetAppFAS',
|
||||||
|
'NetAppStorageGRID',
|
||||||
|
'SCP',
|
||||||
|
'VMware',
|
||||||
|
'VMwareCisServer'
|
||||||
)]
|
)]
|
||||||
[string] $Type,
|
[string] $Type,
|
||||||
|
|
||||||
@ -120,7 +128,7 @@ function Connect-To {
|
|||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Set the CredentialStore for private, shared or custom mode.
|
# Set the CredentialStore for private, shared or custom mode.
|
||||||
Write-Debug ("ParameterSetName: {0}" -f $PSCmdlet.ParameterSetName)
|
Write-Debug ('ParameterSetName: {0}' -f $PSCmdlet.ParameterSetName)
|
||||||
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
||||||
$Path = Get-DefaultCredentialStorePath
|
$Path = Get-DefaultCredentialStorePath
|
||||||
}
|
}
|
||||||
@ -131,7 +139,7 @@ function Connect-To {
|
|||||||
}
|
}
|
||||||
|
|
||||||
switch ($Type) {
|
switch ($Type) {
|
||||||
"VMware" {
|
'VMware' {
|
||||||
# Disable the yellow certificate warning, since we haven't replaced the SSL certs for vCenter/ESXi
|
# Disable the yellow certificate warning, since we haven't replaced the SSL certs for vCenter/ESXi
|
||||||
$null = Set-PowerCLIConfiguration -Scope Session -InvalidCertificateAction Ignore -Confirm:$false
|
$null = Set-PowerCLIConfiguration -Scope Session -InvalidCertificateAction Ignore -Confirm:$false
|
||||||
|
|
||||||
@ -139,6 +147,11 @@ function Connect-To {
|
|||||||
$null = Set-PowerCLIConfiguration -Scope Session -ProxyPolicy NoProxy -Confirm:$false
|
$null = Set-PowerCLIConfiguration -Scope Session -ProxyPolicy NoProxy -Confirm:$false
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Set sane defaults for Progress, ErrorAction and InformationPreference
|
||||||
|
$ProgressPreference = 'SilentlyContinue'
|
||||||
|
$ErrorActionPreference = 'Stop'
|
||||||
|
$InformationPreference = 'Continue'
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
@ -149,8 +162,8 @@ function Connect-To {
|
|||||||
# Check if $Identifier has been defined, in which case we need to use different name for
|
# Check if $Identifier has been defined, in which case we need to use different name for
|
||||||
# the lookup of the CredentialStoreItem.
|
# the lookup of the CredentialStoreItem.
|
||||||
try {
|
try {
|
||||||
if ($Identifier -ne "") {
|
if ($Identifier -ne '') {
|
||||||
$RemoteHostIdentifier = "{0}/{1}" -f $Identifier, $RemoteHost
|
$RemoteHostIdentifier = '{0}/{1}' -f $Identifier, $RemoteHost
|
||||||
$creds = Get-CredentialStoreItem -Shared -RemoteHost $RemoteHostIdentifier -Path $Path
|
$creds = Get-CredentialStoreItem -Shared -RemoteHost $RemoteHostIdentifier -Path $Path
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
@ -161,8 +174,8 @@ function Connect-To {
|
|||||||
catch {
|
catch {
|
||||||
$MessageParams = @{
|
$MessageParams = @{
|
||||||
Message = (
|
Message = (
|
||||||
"Unable to look up credential store item for RemoteHost " +
|
'Unable to look up credential store item for RemoteHost ' +
|
||||||
("{0}/Identifier {1}!" -f $RemoteHost, $Identifier)
|
('{0}/Identifier {1}!' -f $RemoteHost, $Identifier)
|
||||||
)
|
)
|
||||||
ErrorAction = 'Stop'
|
ErrorAction = 'Stop'
|
||||||
}
|
}
|
||||||
@ -173,44 +186,70 @@ function Connect-To {
|
|||||||
$creds = $Credentials
|
$creds = $Credentials
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($creds.UserName -eq "" -or $creds.Password.GetType().Name -ne 'SecureString') {
|
if ($creds.UserName -eq '' -or $creds.Password.GetType().Name -ne 'SecureString') {
|
||||||
$MessageParams = @{
|
$MessageParams = @{
|
||||||
Message = "Please provide valid credentials for RemoteHost {0}!" -f $RemoteHost
|
Message = 'Please provide valid credentials for RemoteHost {0}!' -f $RemoteHost
|
||||||
ErrorAction = 'Stop'
|
ErrorAction = 'Stop'
|
||||||
}
|
}
|
||||||
Write-Error @MessageParams
|
Write-Error @MessageParams
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
switch ($Type) {
|
switch ($Type) {
|
||||||
"CiscoUcs" {
|
'CiscoUcs' {
|
||||||
try {
|
try {
|
||||||
$handle = Connect-Ucs -Name $RemoteHost -Credential $creds -ErrorAction 'Stop' -NotDefault
|
$handle = Connect-Ucs -Name $RemoteHost -Credential $creds -NotDefault
|
||||||
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcs', $handle)
|
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcs', $handle)
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
catch {
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
"CiscoUcsCentral" {
|
|
||||||
|
'CiscoUcsCentral' {
|
||||||
try {
|
try {
|
||||||
$handle = Connect-UcsCentral -Name $RemoteHost -Credential $creds -NotDefault
|
$handle = Connect-UcsCentral -Name $RemoteHost -Credential $creds -NotDefault
|
||||||
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcsCentral', $handle)
|
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcsCentral', $handle)
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
catch {
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using {1}' -f $RemoteHost, $Type)
|
||||||
Message = ('Unable to connect to {0} using {1}' -f $RemoteHost, $Type)
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
"FTP" {
|
|
||||||
|
'ExchangeHTTP' {
|
||||||
|
try {
|
||||||
|
$ConnectionParams = @{
|
||||||
|
ConnectionURI = 'http://{0}/powershell' -f $RemoteHost
|
||||||
|
ConfigurationName = 'Microsoft.Exchange'
|
||||||
|
Credential = $creds
|
||||||
|
}
|
||||||
|
$global:PSExchangeRemote = New-PSSession @ConnectionParams
|
||||||
|
# ScriptAnalyzer issue (unused var) workaround.
|
||||||
|
$null = $global:PSExchangeRemote
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
'ExchangeHTTPS' {
|
||||||
|
try {
|
||||||
|
$ConnectionParams = @{
|
||||||
|
ConnectionURI = 'https://{0}/powershell' -f $RemoteHost
|
||||||
|
ConfigurationName = 'Microsoft.Exchange'
|
||||||
|
Credential = $creds
|
||||||
|
}
|
||||||
|
$global:PSExchangeRemote = New-PSSession @ConnectionParams
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
'FTP' {
|
||||||
# First establish the FTP session
|
# First establish the FTP session
|
||||||
$WinSCPConParams = @{
|
$WinSCPConParams = @{
|
||||||
Credential = $creds
|
Credential = $creds
|
||||||
@ -218,115 +257,81 @@ function Connect-To {
|
|||||||
Protocol = 'Ftp'
|
Protocol = 'Ftp'
|
||||||
FtpMode = 'Passive'
|
FtpMode = 'Passive'
|
||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
$FTPSessionOption = New-WinSCPSessionOption @WinSCPConParams
|
$FTPSessionOption = New-WinSCPSessionOption @WinSCPConParams
|
||||||
$Global:WinSCPSession = New-WinSCPSession -SessionOption $FTPSessionOption
|
$global:WinSCPSession = New-WinSCPSession -SessionOption $FTPSessionOption
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
throw "Could not connect to {0} using {1} protocol!" -f $RemoteHost, $Type
|
Write-Error -Message ('Could not connect to {0} using {1} protocol!' -f $RemoteHost, $Type)
|
||||||
}
|
}
|
||||||
|
|
||||||
# Check the Connection State
|
# Check the Connection State
|
||||||
if (!($WinSCPSession.Opened)) {
|
if (-not $WinSCPSession.Opened) {
|
||||||
# Check the connection state and find out if the session is still open.
|
# Check the connection state and find out if the session is still open.
|
||||||
$MessageParams = @{
|
$m = 'Connection to {0} using Type {1} was established. ' -f $RemoteHost, $Type
|
||||||
Message = (
|
$m += 'But now it seems to be lost!'
|
||||||
("Connection to {0} using Type {1} " -f $RemoteHost, $Type) +
|
Write-Error -Message $m
|
||||||
"was established. But now it seems to be lost!"
|
|
||||||
)
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
}
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"NetAppFAS" {
|
|
||||||
try {
|
|
||||||
$null = Connect-NcController -Name $RemoteHost -Credential $creds -ErrorAction Stop -HTTPS
|
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
'NetAppFAS' {
|
||||||
# Write a error message to the log.
|
# Construct the splatting for Connect-NcController
|
||||||
$MessageParams = @{
|
$params = @{
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
Name = $RemoteHost
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"VMware" {
|
|
||||||
try {
|
|
||||||
Connect-VIServer -Server $RemoteHost -Credential $creds -ErrorAction Stop | Out-Null
|
|
||||||
}
|
|
||||||
|
|
||||||
catch {
|
|
||||||
# Write a error message to the log.
|
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"CisServer" {
|
|
||||||
try {
|
|
||||||
if ($PassThru.IsPresent) {
|
|
||||||
Connect-CisServer -Server $RemoteHost -Credential $creds -ErrorAction Stop
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
Connect-CisServer -Server $RemoteHost -Credential $creds -ErrorAction Stop | Out-Null
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
catch {
|
|
||||||
# Write a error message to the log.
|
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"ExchangeHTTP" {
|
|
||||||
try {
|
|
||||||
$ConnectionParams = @{
|
|
||||||
ConnectionURI = "http://{0}/powershell" -f $RemoteHost
|
|
||||||
ConfigurationName = 'Microsoft.Exchange'
|
|
||||||
Credential = $creds
|
Credential = $creds
|
||||||
ErrorAction = 'Stop'
|
HTTPS = $true
|
||||||
}
|
}
|
||||||
$Global:PSExchangeRemote = New-PSSession @ConnectionParams
|
|
||||||
# ScriptAnalyzer issue (unused var) workaround.
|
# Check if -PassThru was passed. If so, a) do not set the default variable and b) return the
|
||||||
$null = $Global:PSExchangeRemote
|
# session object to the caller.
|
||||||
|
if ($PSBoundParameters.ContainsKey('PassThru')) {
|
||||||
|
$params.Add('Transient', $true)
|
||||||
}
|
}
|
||||||
catch {
|
|
||||||
# Write a error message to the log.
|
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"ExchangeHTTPS" {
|
|
||||||
try {
|
try {
|
||||||
$ConnectionParams = @{
|
$handle = Connect-NcController @params
|
||||||
ConnectionURI = "https://{0}/powershell" -f $RemoteHost
|
|
||||||
ConfigurationName = 'Microsoft.Exchange'
|
|
||||||
Credential = $creds
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
$Global:PSExchangeRemote = New-PSSession @ConnectionParams
|
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
catch {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
}
|
||||||
Write-Error @MessageParams
|
|
||||||
|
if ($PSBoundParameters.ContainsKey('PassThru')) {
|
||||||
|
return $handle
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
"SCP" {
|
|
||||||
|
'NetAppStorageGRID' {
|
||||||
|
# Construct the splatting for Connect-SgwServer
|
||||||
|
$params = @{
|
||||||
|
Name = $RemoteHost
|
||||||
|
Credential = $creds
|
||||||
|
SkipCertificateCheck = $true
|
||||||
|
}
|
||||||
|
|
||||||
|
# Check if -PassThru was passed. If so, a) do not set the default variable and b) return the
|
||||||
|
# session object to the caller.
|
||||||
|
if ($PSBoundParameters.ContainsKey('PassThru')) {
|
||||||
|
$params.Add('Transient', $true)
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
$SgwSession = Connect-SgwServer @params
|
||||||
|
}
|
||||||
|
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($PSBoundParameters.ContainsKey('PassThru')) {
|
||||||
|
return $SgwSession
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
'SCP' {
|
||||||
$WinSCPSessionParams = @{
|
$WinSCPSessionParams = @{
|
||||||
Credential = $creds
|
Credential = $creds
|
||||||
Hostname = $RemoteHost
|
Hostname = $RemoteHost
|
||||||
@ -335,39 +340,49 @@ function Connect-To {
|
|||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
$SessionOption = New-WinSCPSessionOption @WinSCPSessionParams
|
$SessionOption = New-WinSCPSessionOption @WinSCPSessionParams
|
||||||
$Global:WinSCPSession = New-WinSCPSession -SessionOption $SessionOption
|
$global:WinSCPSession = New-WinSCPSession -SessionOption $SessionOption
|
||||||
Write-Verbose -Message (
|
Write-Verbose -Message (
|
||||||
"SCP Connection established with {0}" -f $Global:WinSCPSession.Hostname
|
'SCP Connection established with {0}' -f $global:WinSCPSession.Hostname
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
# Check the Connection State
|
# Check the Connection State
|
||||||
if (!($WinSCPSession.Opened)) {
|
if (!($WinSCPSession.Opened)) {
|
||||||
# Check the connection state and find out if the session is still open.
|
# Check the connection state and find out if the session is still open.
|
||||||
$MessageParams = @{
|
$m = 'Connection to {0} using Type {1} was established. ' -f $RemoteHost, $Type
|
||||||
Message = (
|
$m += 'But now it seems to be lost!'
|
||||||
("Connection to {0} using Type {1} was established. " -f $RemoteHost, $Type) +
|
Write-Error -Message $m
|
||||||
"But now it seems to be lost!"
|
|
||||||
)
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
default {
|
|
||||||
|
'VMware' {
|
||||||
|
try {
|
||||||
|
Connect-VIServer -Server $RemoteHost -Credential $creds -ErrorAction Stop | Out-Null
|
||||||
|
}
|
||||||
|
|
||||||
|
catch {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
}
|
||||||
ErrorAction = 'Stop'
|
}
|
||||||
|
|
||||||
|
'VMwareCisServer' {
|
||||||
|
try {
|
||||||
|
if ($PassThru.IsPresent) {
|
||||||
|
Connect-CisServer -Server $RemoteHost -Credential $creds
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$null = Connect-CisServer -Server $RemoteHost -Credential $creds
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
}
|
}
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,30 +1,26 @@
|
|||||||
function Disconnect-From {
|
function Disconnect-From {
|
||||||
<#
|
<#
|
||||||
.SYNOPSIS
|
.SYNOPSIS
|
||||||
Terminates a session established with Connect-To using a CredentialStoreItem.
|
Terminates a session established with Connect-To.
|
||||||
|
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
Terminates a session established with Connect-To using a CredentialStoreItem.
|
Terminates a session established with Connect-To.
|
||||||
|
|
||||||
.PARAMETER RemoteHost
|
.PARAMETER RemoteHost
|
||||||
Specify the remote endpoint, whose session you would like to terminate.
|
Specify the remote endpoint, whose session you would like to terminate.
|
||||||
|
|
||||||
.PARAMETER Identifier
|
|
||||||
Defaults to "". Specify a string, which separates two CredentialStoreItems for the
|
|
||||||
same hostname.
|
|
||||||
|
|
||||||
.PARAMETER Type
|
.PARAMETER Type
|
||||||
Specify the host type of the target. Currently implemented targets are:
|
Specify the host type of the target. Currently implemented targets are:
|
||||||
|
|
||||||
- CiscoUcs
|
- CiscoUcs
|
||||||
- CiscoUcsCentral
|
- CiscoUcsCentral
|
||||||
- FTP
|
|
||||||
- NetAppFAS
|
|
||||||
- VMware
|
|
||||||
- CisServer
|
|
||||||
- ExchangeHTTP
|
- ExchangeHTTP
|
||||||
- ExchangeHTTPS
|
- ExchangeHTTPS
|
||||||
|
- FTP
|
||||||
|
- NetAppFAS
|
||||||
|
- NetAppStorageGRID
|
||||||
- SCP
|
- SCP
|
||||||
|
- VMware
|
||||||
|
- VMwareCisServer
|
||||||
|
|
||||||
.PARAMETER Force
|
.PARAMETER Force
|
||||||
Force the disconnect, even if the disconnect would fail.
|
Force the disconnect, even if the disconnect would fail.
|
||||||
@ -36,36 +32,45 @@ function Disconnect-From {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Disconnect-From -RemoteHost "ucs.myside.local" -Type CiscoUcs
|
Disconnect-From -RemoteHost 'vc.domain.local' -Type CisServer
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Disconnect-From -RemoteHost "ftp.myside.local" -Type FTP
|
Disconnect-From -RemoteHost 'ucs.domain.local' -Type CiscoUcs
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Disconnect-From -RemoteHost "fas.myside.local" -Type NetAppFAS
|
Disconnect-From -RemoteHost 'ucs-central.domain.local' -Type 'CiscoUcsCentral'
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Disconnect-From -RemoteHost "esx01.myside.local" -Type VMware
|
Disconnect-From -RemoteHost 'exchange01.domain.local' -Type ExchangeHTTP
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Disconnect-From -RemoteHost "esx01.myside.local" -Type VMware -Force:$True
|
Disconnect-From -RemoteHost 'exchange01.domain.local' -Type ExchangeHTTPS
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Disconnect-From -RemoteHost "vcenter.myside.local" -Type CisServer
|
Disconnect-From -RemoteHost 'ftp.domain.local' -Type FTP
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Disconnect-From -RemoteHost "exchange01.myside.local" -Type ExchangeHTTP
|
Disconnect-From -RemoteHost 'fas.domain.local' -Type NetAppFAS
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Disconnect-From -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
Disconnect-From -RemoteHost 'grid.domain.local' -Type NetAppStorageGRID
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
Disconnect-From -RemoteHost 'esx01.domain.local' -Type VMware
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
Disconnect-From -RemoteHost 'esx01.domain.local' -Type VMware -Force:$True
|
||||||
|
|
||||||
#>
|
#>
|
||||||
|
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
|
||||||
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
||||||
'PSAvoidGlobalVars',
|
'PSAvoidGlobalVars',
|
||||||
'',
|
'',
|
||||||
Justification = 'Wrapping existing global vars from external modules'
|
Justification = 'Wrapping existing global vars from external modules'
|
||||||
)]
|
)]
|
||||||
|
|
||||||
param (
|
param (
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $true)]
|
||||||
[string] $RemoteHost,
|
[string] $RemoteHost,
|
||||||
@ -74,13 +79,14 @@ function Disconnect-From {
|
|||||||
[ValidateSet(
|
[ValidateSet(
|
||||||
'CiscoUcs',
|
'CiscoUcs',
|
||||||
'CiscoUcsCentral',
|
'CiscoUcsCentral',
|
||||||
'FTP',
|
|
||||||
'NetAppFAS',
|
|
||||||
'VMware',
|
|
||||||
'CisServer',
|
|
||||||
'ExchangeHTTP',
|
'ExchangeHTTP',
|
||||||
'ExchangeHTTPS',
|
'ExchangeHTTPS',
|
||||||
'SCP'
|
'FTP',
|
||||||
|
'NetAppFAS',
|
||||||
|
'NetAppStorageGRID',
|
||||||
|
'SCP',
|
||||||
|
'VMware',
|
||||||
|
'VMwareCisServer'
|
||||||
)]
|
)]
|
||||||
[string] $Type,
|
[string] $Type,
|
||||||
|
|
||||||
@ -88,145 +94,132 @@ function Disconnect-From {
|
|||||||
[switch] $Force
|
[switch] $Force
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {}
|
begin {
|
||||||
|
# Set sane defaults for Progress, ErrorAction and InformationPreference
|
||||||
|
$ProgressPreference = 'SilentlyContinue'
|
||||||
|
$ErrorActionPreference = 'Stop'
|
||||||
|
$InformationPreference = 'Continue'
|
||||||
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
switch -Regex ($Type) {
|
switch -Regex ($Type) {
|
||||||
"VMware" {
|
'CiscoUcs' {
|
||||||
try {
|
try {
|
||||||
if ($Force) {
|
$null = Disconnect-Ucs -Ucs $RemoteHost
|
||||||
Disconnect-VIServer -Server $RemoteHost -Confirm:$false -ErrorAction 'Stop' -Force:$true
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
Disconnect-VIServer -Server $RemoteHost -Confirm:$false -ErrorAction 'Stop'
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
catch {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to disconnect from {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to disconnect from {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"CisServer" {
|
|
||||||
try {
|
|
||||||
if ($Force) {
|
|
||||||
Disconnect-CisServer -Server $RemoteHost -Confirm:$false -ErrorAction 'Stop' -Force:$true
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
Disconnect-CisServer -Server $RemoteHost -Confirm:$false -ErrorAction 'Stop'
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
'CiscoUCSCentral' {
|
||||||
|
try {
|
||||||
|
$null = Disconnect-UcsCentral -Name $RemoteHost
|
||||||
|
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcsCentral', $null)
|
||||||
|
}
|
||||||
catch {
|
catch {
|
||||||
# Write a error message to the log.
|
Write-Error -Message ('Unable to disconnect from {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to disconnect from {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
'ExchangeHTTP*' {
|
||||||
|
try {
|
||||||
|
Get-Variable -Name 'PSExchangeRemote' -Scope 'Global'
|
||||||
|
Remove-PSSession -Session $global:PSExchangeRemote
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
Write-Error -Message ('Unable to disconnect from {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
# Check for an existing WinSCP Session var
|
# Check for an existing WinSCP Session var
|
||||||
"FTP" {
|
'FTP' {
|
||||||
if ($Global:WinSCPSession.Opened) {
|
if ($global:WinSCPSession.Opened) {
|
||||||
Remove-WinSCPSession -WinSCPSession $Global:WinSCPSession
|
Remove-WinSCPSession -WinSCPSession $global:WinSCPSession
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$MessageParams = @{
|
Write-Error -Message 'There is no open WinSCP Session'
|
||||||
Message = 'There is no open WinSCP Session'
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# DataONTAP doesn't have a CmdLet `Disconnect-NcController`.
|
# DataONTAP doesn't have a CmdLet `Disconnect-NcController`.
|
||||||
# So we go ahead and clear the CurrentNcController variable.
|
# So we go ahead and clear the CurrentNcController variable.
|
||||||
"NetAppFAS" {
|
'NetAppFAS' {
|
||||||
try {
|
try {
|
||||||
$MessageParams = @{
|
$m = 'Setting {0} to $null, which will disconnect NetAppFAS' -f $global:CurrentNcController
|
||||||
Message = (
|
Write-Verbose -Message $m
|
||||||
"Setting {0} to `$null, which will disconnect NetAppFAS" -f $Global:CurrentNcController
|
$global:CurrentNcController = $null
|
||||||
)
|
|
||||||
ErrorAction = 'Continue'
|
|
||||||
}
|
|
||||||
Write-Verbose @MessageParams
|
|
||||||
$Global:CurrentNcController = $null
|
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
catch {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to disconnect from {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to disconnect from {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
}
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
'NetAppSGWS' {
|
||||||
"CiscoUcs" {
|
|
||||||
try {
|
try {
|
||||||
Disconnect-Ucs -Ucs $RemoteHost
|
$null = Disconnect-SgwServer -Server $RemoteHost
|
||||||
|
$null = Remove-Variable -Name CurrentSgwServer -Scope Global -ErrorAction 'SilentlyContinue'
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
catch {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to disconnect from {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to disconnect from {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"CiscoUCSCentral" {
|
|
||||||
try {
|
|
||||||
$handle = Connect-UcsCentral -Name $RemoteHost -Credential $creds -NotDefault
|
|
||||||
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcsCentral', $handle)
|
|
||||||
}
|
|
||||||
catch {
|
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to disconnect from {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
"ExchangeHTTP*" {
|
'SCP' {
|
||||||
try {
|
if ($global:WinSCPSession.Opened) {
|
||||||
Get-Variable -Name 'PSExchangeRemote' -Scope 'Global' -ErrorAction 'Stop'
|
Remove-WinSCPSession -WinSCPSession $global:WinSCPSession
|
||||||
Remove-PSSession -Session $Global:PSExchangeRemote -ErrorAction 'Stop'
|
|
||||||
}
|
|
||||||
catch {
|
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to disconnect from {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"SCP" {
|
|
||||||
if ($Global:WinSCPSession.Opened) {
|
|
||||||
Remove-WinSCPSession -WinSCPSession $Global:WinSCPSession
|
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$MessageParams = @{
|
Write-Error -Message 'There is no open WinSCP Session'
|
||||||
Message = 'There is no open WinSCP Session'
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
'VMware' {
|
||||||
|
# Construct the splatting for Disconnect-VIServer
|
||||||
|
$params = @{
|
||||||
|
Server = $RemoteHost
|
||||||
|
Confirm = $false
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($PSBoundParameters.ContainsKey('Force')) {
|
||||||
|
$params.Add('Force', $true)
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
$null = Disconnect-VIServer @params
|
||||||
|
}
|
||||||
|
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to disconnect from {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
'VMwareCisServer' {
|
||||||
|
try {
|
||||||
|
if ($Force) {
|
||||||
|
$null = Disconnect-CisServer -Server $RemoteHost -Confirm:$false -Force:$true
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$null = Disconnect-CisServer -Server $RemoteHost -Confirm:$false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to disconnect from {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
default {
|
default {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to disconnect from {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to disconnect from {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -102,7 +102,7 @@ Describe "New-CredentialStoreItem" {
|
|||||||
It "Missing CredentialStore should throw" {
|
It "Missing CredentialStore should throw" {
|
||||||
{
|
{
|
||||||
New-CredentialStoreItem -Shared -Path '/tmp/missingStore.json' -RemoteHost 'notrelevant'
|
New-CredentialStoreItem -Shared -Path '/tmp/missingStore.json' -RemoteHost 'notrelevant'
|
||||||
} | Should -Throw "Could not add anything into the given CredentialStore."
|
} | Should -Throw "The given credential store (/tmp/missingStore.json) does not exist!"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Context "Testing pipeline paramter" {
|
Context "Testing pipeline paramter" {
|
||||||
|
@ -32,7 +32,7 @@ function New-CredentialStoreItem {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
New-CredentialStoreItem -Path 'C:\TMP\mystore.json' -RemoteHost 'esx01.myside.local'
|
New-CredentialStoreItem -Path 'C:\TMP\mystore.json' -RemoteHost esx01.myside.local'
|
||||||
#>
|
#>
|
||||||
|
|
||||||
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
||||||
|
130
src/Item/Set-CredentialStoreItem.Tests.ps1
Normal file
130
src/Item/Set-CredentialStoreItem.Tests.ps1
Normal file
@ -0,0 +1,130 @@
|
|||||||
|
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
||||||
|
'PSAvoidUsingConvertToSecureStringWithPlainText',
|
||||||
|
'',
|
||||||
|
Justification = 'just used in pester tests.'
|
||||||
|
)]
|
||||||
|
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
||||||
|
'PSProvideCommentHelp',
|
||||||
|
'',
|
||||||
|
Justification = 'no need in internal pester helpers.'
|
||||||
|
)]
|
||||||
|
param ()
|
||||||
|
|
||||||
|
BeforeAll {
|
||||||
|
$ManifestFile = (Get-Item -Path './src/*.psd1').FullName
|
||||||
|
Import-Module $ManifestFile -Force
|
||||||
|
|
||||||
|
$PrivateFunctions = (Get-ChildItem -Path './src/Private/*.ps1' | Where-Object {
|
||||||
|
$_.BaseName -notmatch '.Tests'
|
||||||
|
}
|
||||||
|
).FullName
|
||||||
|
foreach ( $func in $PrivateFunctions) {
|
||||||
|
. $func
|
||||||
|
}
|
||||||
|
|
||||||
|
# Backup existing credential stores
|
||||||
|
$VerbosePreference = 'Continue'
|
||||||
|
Write-Verbose -Message 'Backup private Credential Store...'
|
||||||
|
$CSPath = Get-DefaultCredentialStorePath
|
||||||
|
$BackupFile = '{0}.back' -f $CSPath
|
||||||
|
if (Test-Path -Path $CSPath) {
|
||||||
|
Move-Item -Path $CSPath -Destination $BackupFile
|
||||||
|
}
|
||||||
|
Write-Verbose -Message 'Backup shared CredentialStore...'
|
||||||
|
$CSShared = Get-DefaultCredentialStorePath -Shared
|
||||||
|
$BackupSharedFile = '{0}.back' -f $CSShared
|
||||||
|
if (Test-Path -Path $CSShared) {
|
||||||
|
Move-Item -Path $CSShared -Destination $BackupSharedFile
|
||||||
|
}
|
||||||
|
Write-Verbose -Message 'Remove old CredentialStore in Temp dir'
|
||||||
|
$CSTemp = Join-Path -Path (Get-TempDir) -ChildPath '/CredentialStore.json'
|
||||||
|
if (Test-Path -Path $CSTemp) {
|
||||||
|
Remove-Item -Path $CSTemp
|
||||||
|
}
|
||||||
|
$VerbosePreference = 'SilentlyContinue'
|
||||||
|
}
|
||||||
|
|
||||||
|
Describe 'New-CredentialStoreItem' {
|
||||||
|
Context 'Private Credential Store tests' {
|
||||||
|
It 'Add entry to a private store.' {
|
||||||
|
# Create a fresh CredentialStore first
|
||||||
|
New-CredentialStore -Force
|
||||||
|
|
||||||
|
# Define the content of the CredentialStoreItem.
|
||||||
|
$RemoteHost = 'barfoo'
|
||||||
|
$UserName = 'MyUser'
|
||||||
|
$Password = 'fooobarysdfsfs' | ConvertTo-SecureString -AsPlainText -Force
|
||||||
|
|
||||||
|
# Form the CredentialObject.
|
||||||
|
$creds = [PSCredential]::new($UserName, $Password)
|
||||||
|
|
||||||
|
# Create the CredentialStoreItem.
|
||||||
|
New-CredentialStoreItem -RemoteHost $RemoteHost -Credential $creds
|
||||||
|
|
||||||
|
# Formulate an update to the CredentialStoreItem.
|
||||||
|
$ClearPassword = 'fooobaryadfafa'
|
||||||
|
$Password = $ClearPassword | ConvertTo-SecureString -AsPlainText -Force
|
||||||
|
$creds = [PSCredential]::new($UserName, $Password)
|
||||||
|
{
|
||||||
|
Set-CredentialStoreItem -RemoteHost $RemoteHost -Credential $creds
|
||||||
|
} | Should -Not -Throw
|
||||||
|
|
||||||
|
# Control the content of the CredentialStore.
|
||||||
|
$content = Get-CredentialStoreItem -RemoteHost $RemoteHost
|
||||||
|
$content.GetNetworkCredential().Password | Should -Be $ClearPassword
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Context 'Shared Credential Store tests' {
|
||||||
|
It 'Add entry to a shared store.' {
|
||||||
|
# Create a fresh CredentialStore first
|
||||||
|
$tmpCS = Join-Path -Path (Get-TempDir) -ChildPath '/CredentialStore.json'
|
||||||
|
New-CredentialStore -Path $tmpCS -Force -Shared
|
||||||
|
|
||||||
|
# Define the content of the CredentialStoreItem.
|
||||||
|
$RemoteHost = 'barfoo'
|
||||||
|
$UserName = 'MyUser'
|
||||||
|
$Password = 'fooobarysdfsfs' | ConvertTo-SecureString -AsPlainText -Force
|
||||||
|
|
||||||
|
# Form the CredentialObject.
|
||||||
|
$creds = [PSCredential]::new($UserName, $Password)
|
||||||
|
|
||||||
|
# Create the CredentialStoreItem.
|
||||||
|
New-CredentialStoreItem -RemoteHost $RemoteHost -Credential $creds -Path $tmpCS -Shared
|
||||||
|
|
||||||
|
# Formulate an update to the CredentialStoreItem.
|
||||||
|
$ClearPassword = 'fooobaryadfafa'
|
||||||
|
$Password = $ClearPassword | ConvertTo-SecureString -AsPlainText -Force
|
||||||
|
$creds = [PSCredential]::new($UserName, $Password)
|
||||||
|
|
||||||
|
{
|
||||||
|
Set-CredentialStoreItem -RemoteHost $RemoteHost -Credential $creds -Path $tmpCS -Shared
|
||||||
|
} | Should -Not -Throw
|
||||||
|
|
||||||
|
# Control the content of the CredentialStore.
|
||||||
|
$content = Get-CredentialStoreItem -RemoteHost $RemoteHost -Path $tmpCS -Shared
|
||||||
|
$content.GetNetworkCredential().Password | Should -Be $ClearPassword
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
AfterAll {
|
||||||
|
# Cleanup test stores and restore existing ones.
|
||||||
|
$VerbosePreference = 'Continue'
|
||||||
|
Write-Verbose -Message 'Restoring private CredentialStore'
|
||||||
|
If (Test-Path -Path $BackupFile) {
|
||||||
|
If (Test-Path -Path $CSPath) {
|
||||||
|
Remove-Item -Path $CSPath
|
||||||
|
Move-Item -Path $BackupFile -Destination $CSPath
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Write-Verbose -Message 'Restoring shared CredentialStore'
|
||||||
|
If (Test-Path -Path $BackupSharedFile) {
|
||||||
|
If (Test-Path -Path $CSShared) {
|
||||||
|
Remove-Item -Path $CSShared
|
||||||
|
Move-Item -Path $BackupSharedFile -Destination $CSShared
|
||||||
|
}
|
||||||
|
}
|
||||||
|
$VerbosePreference = 'SilentlyContinue'
|
||||||
|
|
||||||
|
}
|
@ -13,7 +13,7 @@ function Set-CredentialStoreItem {
|
|||||||
Specify the host you for which you would like to change the credentials.
|
Specify the host you for which you would like to change the credentials.
|
||||||
|
|
||||||
.PARAMETER Identifier
|
.PARAMETER Identifier
|
||||||
Defaults to "". Specify a string, which separates two CredentialStoreItems for the
|
Defaults to ''. Specify a string, which separates two CredentialStoreItems for the
|
||||||
same hostname.
|
same hostname.
|
||||||
|
|
||||||
.PARAMETER Shared
|
.PARAMETER Shared
|
||||||
@ -30,10 +30,10 @@ function Set-CredentialStoreItem {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
Set-CredentialStoreItem -Path 'C:\TMP\mystore.json' -RemoteHost 'esx01.myside.local'
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local" -Identifier svc
|
Set-CredentialStoreItem -Path 'C:\TMP\mystore.json' -RemoteHost 'esx01.myside.local' -Identifier svc
|
||||||
#>
|
#>
|
||||||
|
|
||||||
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
||||||
@ -65,7 +65,7 @@ function Set-CredentialStoreItem {
|
|||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Set the CredentialStore for private, shared or custom mode.
|
# Set the CredentialStore for private, shared or custom mode.
|
||||||
Write-Debug ("ParameterSetName: {0}" -f $PSCmdlet.ParameterSetName)
|
Write-Debug ('ParameterSetName: {0}' -f $PSCmdlet.ParameterSetName)
|
||||||
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
||||||
$Path = Get-DefaultCredentialStorePath
|
$Path = Get-DefaultCredentialStorePath
|
||||||
}
|
}
|
||||||
@ -77,32 +77,52 @@ function Set-CredentialStoreItem {
|
|||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# Lets do a quick test on the given CredentialStore.
|
# Define the default splatting.
|
||||||
if (-not(Test-CredentialStore -Shared -Path $Path)) {
|
$DefaultSplatting = @{
|
||||||
|
Path = $Path
|
||||||
|
}
|
||||||
|
|
||||||
|
# Check if the user passed -Shared. If he added -Shared, we'll pass it into the splatting
|
||||||
|
if ($PSBoundParameters.ContainsKey('Shared')) {
|
||||||
|
$DefaultSplatting.Add('Shared', $true)
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$DefaultSplatting.Add('Shared', $false)
|
||||||
|
}
|
||||||
|
|
||||||
|
# Now lets check the given CredentialStore.
|
||||||
|
if (-not(Test-CredentialStore @DefaultSplatting)) {
|
||||||
$MessageParams = @{
|
$MessageParams = @{
|
||||||
Message = 'Could not add anything into the given CredentailStore.'
|
Message = ('The given CredentialStore ({0}) does no exist.' -f $Path)
|
||||||
ErrorAction = 'Stop'
|
ErrorAction = 'Stop'
|
||||||
}
|
}
|
||||||
Write-Error @MessageParams
|
Write-Error @MessageParams
|
||||||
}
|
}
|
||||||
|
|
||||||
# Read the file content based on the given ParameterSetName
|
# Read the file content based on the given ParameterSetName
|
||||||
$CSContent = Get-CredentialStore -Shared -Path $Path
|
$CSContent = Get-CredentialStore @DefaultSplatting
|
||||||
|
|
||||||
|
# Get a formatted current date for the last update time of the Item.
|
||||||
$CurrentDate = Get-Date -Format 'u'
|
$CurrentDate = Get-Date -Format 'u'
|
||||||
|
|
||||||
if ($Identifier -ne "") {
|
# Check if the user supplied an identifier. If so, we need to mangle the CredentialName, as that's where
|
||||||
$CredentialName = $RemoteHost = "{0}/{1}" -f $Identifier, $RemoteHost
|
# the identifier is actually added.
|
||||||
|
if ($Identifier -ne '') {
|
||||||
|
$CredentialName = $RemoteHost = '{0}/{1}' -f $Identifier, $RemoteHost
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$CredentialName = $RemoteHost
|
$CredentialName = $RemoteHost
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# If the user didn't supply a CredentialObject, we need to prompt for it.
|
||||||
if (-not($Credential)) {
|
if (-not($Credential)) {
|
||||||
$Credential = Get-Credential -Message $CredentialName
|
$Credential = Get-Credential -Message $CredentialName
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($Credential.UserName) {
|
# If the username isn't empty, we ca go ahead and update the entry.
|
||||||
|
if ($null -ne $Credential.UserName -and -not [string]::IsNullOrWhiteSpace($Credential.UserName)) {
|
||||||
|
# Check if the path to the PfxCertificate is stored in the CredentialStore. If so load the certificate.
|
||||||
|
# If not, load try loading the certificate from the Filepath of the CredentialStore.
|
||||||
if ($null -eq $CSContent.PfxCertificate) {
|
if ($null -eq $CSContent.PfxCertificate) {
|
||||||
$Cert = Get-CSCertificate -Type $CSContent.Type -Thumbprint $CSContent.Thumbprint
|
$Cert = Get-CSCertificate -Type $CSContent.Type -Thumbprint $CSContent.Thumbprint
|
||||||
}
|
}
|
||||||
@ -110,13 +130,17 @@ function Set-CredentialStoreItem {
|
|||||||
$Cert = Get-PfxCertificate -FilePath $CSContent.PfxCertificate -ErrorAction Stop
|
$Cert = Get-PfxCertificate -FilePath $CSContent.PfxCertificate -ErrorAction Stop
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Now locate the Item.
|
||||||
if (Get-Member -InputObject $CSContent -Name $CredentialName -MemberType Properties) {
|
if (Get-Member -InputObject $CSContent -Name $CredentialName -MemberType Properties) {
|
||||||
|
# Get a random AES key for the entry.
|
||||||
$RSAKey = Get-RandomAESKey
|
$RSAKey = Get-RandomAESKey
|
||||||
$CSContent.$CredentialName.User = $Credential.UserName
|
$CSContent.$CredentialName.User = $Credential.UserName
|
||||||
$ConvertParams = @{
|
$ConvertParams = @{
|
||||||
SecureString = $Credential.Password
|
SecureString = $Credential.Password
|
||||||
Key = $RSAKey
|
Key = $RSAKey
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Now create a updated item containing the updated credentials.
|
||||||
$CSContent.$CredentialName.Password = ConvertFrom-SecureString @ConvertParams
|
$CSContent.$CredentialName.Password = ConvertFrom-SecureString @ConvertParams
|
||||||
$CSContent.$CredentialName.LastChange = $CurrentDate
|
$CSContent.$CredentialName.LastChange = $CurrentDate
|
||||||
$CSContent.$CredentialName.EncryptedKey = [Convert]::ToBase64String(
|
$CSContent.$CredentialName.EncryptedKey = [Convert]::ToBase64String(
|
||||||
@ -125,10 +149,15 @@ function Set-CredentialStoreItem {
|
|||||||
[System.Security.Cryptography.RSAEncryptionPadding]::Pkcs1
|
[System.Security.Cryptography.RSAEncryptionPadding]::Pkcs1
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
|
|
||||||
|
# Convert the CredentialStore back into JSON and save it to the file.
|
||||||
ConvertTo-Json -InputObject $CSContent -Depth 5 | Out-File -FilePath $Path -Encoding utf8
|
ConvertTo-Json -InputObject $CSContent -Depth 5 | Out-File -FilePath $Path -Encoding utf8
|
||||||
}
|
}
|
||||||
|
else {
|
||||||
|
Write-Warning -Message ('Unable to locate CredentialStoreItem for {0}' -f $CredentialName)
|
||||||
}
|
}
|
||||||
Else {
|
}
|
||||||
|
else {
|
||||||
$MessageParams = @{
|
$MessageParams = @{
|
||||||
Message = 'Please Provide at least a valid user!'
|
Message = 'Please Provide at least a valid user!'
|
||||||
ErrorAction = 'Stop'
|
ErrorAction = 'Stop'
|
||||||
|
@ -33,11 +33,11 @@ function Test-CredentialStoreItem {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
if (Test-CredentialStoreItem -RemoteHost "Default") {
|
if (Test-CredentialStoreItem -RemoteHost 'Default') {
|
||||||
Get-CredentialStoreItem -RemoteHost "Default"
|
Get-CredentialStoreItem -RemoteHost 'Default'
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
Write-Warning ("The given Remote Host {0} does not exist in the credential Store!" -f $RemoteHost)
|
Write-Warning ('The given Remote Host {0} does not exist in the credential Store!' -f $RemoteHost)
|
||||||
}
|
}
|
||||||
#>
|
#>
|
||||||
|
|
||||||
@ -45,7 +45,7 @@ function Test-CredentialStoreItem {
|
|||||||
[OutputType([bool])]
|
[OutputType([bool])]
|
||||||
param (
|
param (
|
||||||
[Parameter(Mandatory = $false, ParameterSetName = 'Shared')]
|
[Parameter(Mandatory = $false, ParameterSetName = 'Shared')]
|
||||||
[string]$Path = "{0}\PSCredentialStore\CredentialStore.json" -f $env:ProgramData,
|
[string]$Path = '{0}\PSCredentialStore\CredentialStore.json' -f $env:ProgramData,
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $true)]
|
||||||
[ValidateNotNullOrEmpty()]
|
[ValidateNotNullOrEmpty()]
|
||||||
@ -61,7 +61,7 @@ function Test-CredentialStoreItem {
|
|||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Set the CredentialStore for private, shared or custom mode.
|
# Set the CredentialStore for private, shared or custom mode.
|
||||||
Write-Debug ("ParameterSetName: {0}" -f $PSCmdlet.ParameterSetName)
|
Write-Debug ('ParameterSetName: {0}' -f $PSCmdlet.ParameterSetName)
|
||||||
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
||||||
$Path = Get-DefaultCredentialStorePath
|
$Path = Get-DefaultCredentialStorePath
|
||||||
}
|
}
|
||||||
@ -73,8 +73,8 @@ function Test-CredentialStoreItem {
|
|||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
if ($Identifier -ne "") {
|
if ($Identifier -ne '') {
|
||||||
$CredentialName = $RemoteHost = "{0}/{1}" -f $Identifier, $RemoteHost
|
$CredentialName = $RemoteHost = '{0}/{1}' -f $Identifier, $RemoteHost
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$CredentialName = $RemoteHost
|
$CredentialName = $RemoteHost
|
||||||
@ -92,7 +92,7 @@ function Test-CredentialStoreItem {
|
|||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$MsgParams = @{
|
$MsgParams = @{
|
||||||
Message = "The given credential store ({0}) does not exist!" -f $Path
|
Message = 'The given credential store ({0}) does not exist!' -f $Path
|
||||||
}
|
}
|
||||||
Write-Warning @MsgParams
|
Write-Warning @MsgParams
|
||||||
return $false
|
return $false
|
||||||
|
@ -165,8 +165,16 @@
|
|||||||
ModuleVersion = '5.17.8.1'
|
ModuleVersion = '5.17.8.1'
|
||||||
},
|
},
|
||||||
@{
|
@{
|
||||||
ModuleName = 'DataONTAP'
|
ModuleName = 'NetApp.ONTAP'
|
||||||
ModuleVersion = '9.7.1.1'
|
ModuleVersion = '9.10.1.2111'
|
||||||
|
},
|
||||||
|
@{
|
||||||
|
ModuleName = 'StorageGRID-WebScale'
|
||||||
|
ModuleVersion = '7.2.1'
|
||||||
|
},
|
||||||
|
@{
|
||||||
|
ModuleName = 'StorageGRID-WebScale'
|
||||||
|
ModuleVersion = '7.2.1'
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
BIN
src/Vendor/libressl/openssl.exe
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl/openssl.exe
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libcrypto-41.dll
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libcrypto-41.dll
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libcrypto-41.exp
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libcrypto-41.exp
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libcrypto-41.lib
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libcrypto-41.lib
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libcrypto-41.pdb
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libcrypto-41.pdb
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libssl-43.dll
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libssl-43.dll
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libssl-43.exp
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libssl-43.exp
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libssl-43.lib
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libssl-43.lib
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libssl-43.pdb
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libssl-43.pdb
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libtls-15.dll
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libtls-15.dll
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libtls-15.exp
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libtls-15.exp
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libtls-15.lib
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libtls-15.lib
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libtls-15.pdb
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/libtls-15.pdb
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/ocspcheck.exe
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/ocspcheck.exe
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/openssl.exe
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl255/openssl.exe
(Stored with Git LFS)
vendored
Binary file not shown.
Reference in New Issue
Block a user