forked from OCram85/PSCredentialStore
Compare commits
8 Commits
v1.1.0-dev
...
22631f2836
Author | SHA1 | Date | |
---|---|---|---|
22631f2836 | |||
a5b430e4ae | |||
c272b30cb4 | |||
b7ad5663dc | |||
9de752691b | |||
f27f1faad7 | |||
56727afa3e | |||
79a1a214c2 |
@ -120,7 +120,7 @@ steps:
|
|||||||
Install-Module -Name 'DroneHelper' -Repository 'PSGallery' -ErrorAction 'Stop' -AllowPrerelease -Force;
|
Install-Module -Name 'DroneHelper' -Repository 'PSGallery' -ErrorAction 'Stop' -AllowPrerelease -Force;
|
||||||
Import-Module -Name 'DroneHelper' -ErrorAction 'Stop';
|
Import-Module -Name 'DroneHelper' -ErrorAction 'Stop';
|
||||||
Install-ModuleDependency;
|
Install-ModuleDependency;
|
||||||
New-BuildPackage -Verbose -AdditionalPath @('./src/Vendor', './src/openssl.conf')
|
New-BuildPackage -Verbose
|
||||||
}"
|
}"
|
||||||
|
|
||||||
- name: GiteaRelease
|
- name: GiteaRelease
|
||||||
|
1
.gitattributes
vendored
1
.gitattributes
vendored
@ -21,5 +21,4 @@
|
|||||||
|
|
||||||
# Vendor resources config
|
# Vendor resources config
|
||||||
src/Vendor/libressl255/* filter=lfs diff=lfs merge=lfs -text
|
src/Vendor/libressl255/* filter=lfs diff=lfs merge=lfs -text
|
||||||
src/Vendor/libressl/* filter=lfs diff=lfs merge=lfs -text
|
|
||||||
*.pfx filter=lfs diff=lfs merge=lfs -text
|
*.pfx filter=lfs diff=lfs merge=lfs -text
|
||||||
|
@ -66,7 +66,7 @@ function New-CSCertificate {
|
|||||||
($PSVersionTable.PSEdition -eq 'Desktop' -and $PSVersionTable.PSVersion.Major -lt 6) -or
|
($PSVersionTable.PSEdition -eq 'Desktop' -and $PSVersionTable.PSVersion.Major -lt 6) -or
|
||||||
($IsWindows -eq $true)
|
($IsWindows -eq $true)
|
||||||
) {
|
) {
|
||||||
$openssl = Join-Path -Path $ModuleBase -ChildPath '/Vendor/libressl/openssl.exe'
|
$openssl = Join-Path -Path $ModuleBase -ChildPath '/Vendor/libressl255/openssl.exe'
|
||||||
}
|
}
|
||||||
|
|
||||||
$Env:OPENSSL_CONF = Join-Path $ModuleBase -ChildPath '/openssl.conf'
|
$Env:OPENSSL_CONF = Join-Path $ModuleBase -ChildPath '/openssl.conf'
|
||||||
|
@ -10,7 +10,7 @@ function Connect-To {
|
|||||||
Specify the host, for which you would like to change the credentials.
|
Specify the host, for which you would like to change the credentials.
|
||||||
|
|
||||||
.PARAMETER Identifier
|
.PARAMETER Identifier
|
||||||
Defaults to "". Specify a string, which separates two CredentialStoreItems for the
|
Defaults to ''. Specify a string, which separates two CredentialStoreItems for the
|
||||||
same hostname.
|
same hostname.
|
||||||
|
|
||||||
.PARAMETER Type
|
.PARAMETER Type
|
||||||
@ -18,13 +18,13 @@ function Connect-To {
|
|||||||
|
|
||||||
- CiscoUcs
|
- CiscoUcs
|
||||||
- CiscoUcsCentral
|
- CiscoUcsCentral
|
||||||
- CisServer
|
|
||||||
- ExchangeHTTP
|
- ExchangeHTTP
|
||||||
- ExchangeHTTPS
|
- ExchangeHTTPS
|
||||||
- FTP
|
- FTP
|
||||||
- NetAppFAS
|
- NetAppFAS
|
||||||
- SCP
|
- SCP
|
||||||
- VMware
|
- VMware
|
||||||
|
- VMwareCisServer
|
||||||
|
|
||||||
.PARAMETER Credentials
|
.PARAMETER Credentials
|
||||||
Use this parameter to bypass the stored credentials. Without this parameter Connect-To tries to read the
|
Use this parameter to bypass the stored credentials. Without this parameter Connect-To tries to read the
|
||||||
@ -48,36 +48,38 @@ function Connect-To {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "ucs.myside.local" -Type CiscoUcs
|
Connect-To -RemoteHost 'ucs.myside.local' -Type CiscoUcs
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "ucscentral.myside.local" -Type 'CiscoUcsCentral'
|
Connect-To -RemoteHost 'ucscentral.myside.local' -Type 'CiscoUcsCentral'
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "ftp.myside.local" -Type FTP
|
Connect-To -RemoteHost 'ftp.myside.local' -Type FTP
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "fas.myside.local" -Type NetAppFAS
|
Connect-To -RemoteHost 'fas.myside.local' -Type NetAppFAS
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "esx01.myside.local" -Type VMware
|
Connect-To -RemoteHost 'esx01.myside.local' -Type VMware
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "vCenter.myside.local" -Type CisServer
|
Connect-To -RemoteHost 'vCenter.myside.local' -Type CisServer
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTP
|
Connect-To -RemoteHost 'exchange01.myside.local' -Type ExchangeHTTP
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
Connect-To -RemoteHost 'exchange01.myside.local' -Type ExchangeHTTPS
|
||||||
#>
|
#>
|
||||||
|
|
||||||
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
||||||
|
|
||||||
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
||||||
'PSAvoidGlobalVars',
|
'PSAvoidGlobalVars',
|
||||||
'',
|
'',
|
||||||
Justification = 'Wrapping existing var from WinSCP module.'
|
Justification = 'Wrapping existing var from WinSCP module.'
|
||||||
)]
|
)]
|
||||||
|
|
||||||
param (
|
param (
|
||||||
[Parameter(Mandatory = $true, ParameterSetName = 'Shared')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'Shared')]
|
||||||
[Parameter(Mandatory = $true, ParameterSetName = 'Private')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'Private')]
|
||||||
@ -92,13 +94,13 @@ function Connect-To {
|
|||||||
[ValidateSet(
|
[ValidateSet(
|
||||||
'CiscoUcs',
|
'CiscoUcs',
|
||||||
'CiscoUcsCentral',
|
'CiscoUcsCentral',
|
||||||
'FTP',
|
|
||||||
'NetAppFAS',
|
|
||||||
'VMware',
|
|
||||||
'CisServer',
|
|
||||||
'ExchangeHTTP',
|
'ExchangeHTTP',
|
||||||
'ExchangeHTTPS',
|
'ExchangeHTTPS',
|
||||||
'SCP'
|
'FTP',
|
||||||
|
'NetAppFAS',
|
||||||
|
'SCP',
|
||||||
|
'VMware',
|
||||||
|
'VMwareCisServer'
|
||||||
)]
|
)]
|
||||||
[string] $Type,
|
[string] $Type,
|
||||||
|
|
||||||
@ -120,7 +122,7 @@ function Connect-To {
|
|||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Set the CredentialStore for private, shared or custom mode.
|
# Set the CredentialStore for private, shared or custom mode.
|
||||||
Write-Debug ("ParameterSetName: {0}" -f $PSCmdlet.ParameterSetName)
|
Write-Debug ('ParameterSetName: {0}' -f $PSCmdlet.ParameterSetName)
|
||||||
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
||||||
$Path = Get-DefaultCredentialStorePath
|
$Path = Get-DefaultCredentialStorePath
|
||||||
}
|
}
|
||||||
@ -131,7 +133,7 @@ function Connect-To {
|
|||||||
}
|
}
|
||||||
|
|
||||||
switch ($Type) {
|
switch ($Type) {
|
||||||
"VMware" {
|
'VMware' {
|
||||||
# Disable the yellow certificate warning, since we haven't replaced the SSL certs for vCenter/ESXi
|
# Disable the yellow certificate warning, since we haven't replaced the SSL certs for vCenter/ESXi
|
||||||
$null = Set-PowerCLIConfiguration -Scope Session -InvalidCertificateAction Ignore -Confirm:$false
|
$null = Set-PowerCLIConfiguration -Scope Session -InvalidCertificateAction Ignore -Confirm:$false
|
||||||
|
|
||||||
@ -139,6 +141,11 @@ function Connect-To {
|
|||||||
$null = Set-PowerCLIConfiguration -Scope Session -ProxyPolicy NoProxy -Confirm:$false
|
$null = Set-PowerCLIConfiguration -Scope Session -ProxyPolicy NoProxy -Confirm:$false
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Set sane defaults for Progress, ErrorAction and InformationPreference
|
||||||
|
$ProgressPreference = 'SilentlyContinue'
|
||||||
|
$ErrorActionPreference = 'Stop'
|
||||||
|
$InformationPreference = 'Continue'
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
@ -149,8 +156,8 @@ function Connect-To {
|
|||||||
# Check if $Identifier has been defined, in which case we need to use different name for
|
# Check if $Identifier has been defined, in which case we need to use different name for
|
||||||
# the lookup of the CredentialStoreItem.
|
# the lookup of the CredentialStoreItem.
|
||||||
try {
|
try {
|
||||||
if ($Identifier -ne "") {
|
if ($Identifier -ne '') {
|
||||||
$RemoteHostIdentifier = "{0}/{1}" -f $Identifier, $RemoteHost
|
$RemoteHostIdentifier = '{0}/{1}' -f $Identifier, $RemoteHost
|
||||||
$creds = Get-CredentialStoreItem -Shared -RemoteHost $RemoteHostIdentifier -Path $Path
|
$creds = Get-CredentialStoreItem -Shared -RemoteHost $RemoteHostIdentifier -Path $Path
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
@ -161,8 +168,8 @@ function Connect-To {
|
|||||||
catch {
|
catch {
|
||||||
$MessageParams = @{
|
$MessageParams = @{
|
||||||
Message = (
|
Message = (
|
||||||
"Unable to look up credential store item for RemoteHost " +
|
'Unable to look up credential store item for RemoteHost ' +
|
||||||
("{0}/Identifier {1}!" -f $RemoteHost, $Identifier)
|
('{0}/Identifier {1}!' -f $RemoteHost, $Identifier)
|
||||||
)
|
)
|
||||||
ErrorAction = 'Stop'
|
ErrorAction = 'Stop'
|
||||||
}
|
}
|
||||||
@ -173,44 +180,66 @@ function Connect-To {
|
|||||||
$creds = $Credentials
|
$creds = $Credentials
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($creds.UserName -eq "" -or $creds.Password.GetType().Name -ne 'SecureString') {
|
if ($creds.UserName -eq '' -or $creds.Password.GetType().Name -ne 'SecureString') {
|
||||||
$MessageParams = @{
|
$MessageParams = @{
|
||||||
Message = "Please provide valid credentials for RemoteHost {0}!" -f $RemoteHost
|
Message = 'Please provide valid credentials for RemoteHost {0}!' -f $RemoteHost
|
||||||
ErrorAction = 'Stop'
|
ErrorAction = 'Stop'
|
||||||
}
|
}
|
||||||
Write-Error @MessageParams
|
Write-Error @MessageParams
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
switch ($Type) {
|
switch ($Type) {
|
||||||
"CiscoUcs" {
|
'CiscoUcs' {
|
||||||
try {
|
try {
|
||||||
$handle = Connect-Ucs -Name $RemoteHost -Credential $creds -ErrorAction 'Stop' -NotDefault
|
$handle = Connect-Ucs -Name $RemoteHost -Credential $creds -NotDefault
|
||||||
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcs', $handle)
|
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcs', $handle)
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
catch {
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
"CiscoUcsCentral" {
|
'CiscoUcsCentral' {
|
||||||
try {
|
try {
|
||||||
$handle = Connect-UcsCentral -Name $RemoteHost -Credential $creds -NotDefault
|
$handle = Connect-UcsCentral -Name $RemoteHost -Credential $creds -NotDefault
|
||||||
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcsCentral', $handle)
|
$ExecutionContext.SessionState.PSVariable.Set('DefaultUcsCentral', $handle)
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
catch {
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using {1}' -f $RemoteHost, $Type)
|
||||||
Message = ('Unable to connect to {0} using {1}' -f $RemoteHost, $Type)
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
"FTP" {
|
'ExchangeHTTP' {
|
||||||
|
try {
|
||||||
|
$ConnectionParams = @{
|
||||||
|
ConnectionURI = 'http://{0}/powershell' -f $RemoteHost
|
||||||
|
ConfigurationName = 'Microsoft.Exchange'
|
||||||
|
Credential = $creds
|
||||||
|
}
|
||||||
|
$global:PSExchangeRemote = New-PSSession @ConnectionParams
|
||||||
|
# ScriptAnalyzer issue (unused var) workaround.
|
||||||
|
$null = $global:PSExchangeRemote
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'ExchangeHTTPS' {
|
||||||
|
try {
|
||||||
|
$ConnectionParams = @{
|
||||||
|
ConnectionURI = 'https://{0}/powershell' -f $RemoteHost
|
||||||
|
ConfigurationName = 'Microsoft.Exchange'
|
||||||
|
Credential = $creds
|
||||||
|
}
|
||||||
|
$global:PSExchangeRemote = New-PSSession @ConnectionParams
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'FTP' {
|
||||||
# First establish the FTP session
|
# First establish the FTP session
|
||||||
$WinSCPConParams = @{
|
$WinSCPConParams = @{
|
||||||
Credential = $creds
|
Credential = $creds
|
||||||
@ -220,113 +249,48 @@ function Connect-To {
|
|||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
$FTPSessionOption = New-WinSCPSessionOption @WinSCPConParams
|
$FTPSessionOption = New-WinSCPSessionOption @WinSCPConParams
|
||||||
$Global:WinSCPSession = New-WinSCPSession -SessionOption $FTPSessionOption
|
$global:WinSCPSession = New-WinSCPSession -SessionOption $FTPSessionOption
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
throw "Could not connect to {0} using {1} protocol!" -f $RemoteHost, $Type
|
Write-Error -Message ('Could not connect to {0} using {1} protocol!' -f $RemoteHost, $Type)
|
||||||
}
|
}
|
||||||
|
|
||||||
# Check the Connection State
|
# Check the Connection State
|
||||||
if (!($WinSCPSession.Opened)) {
|
if (-not $WinSCPSession.Opened) {
|
||||||
# Check the connection state and find out if the session is still open.
|
# Check the connection state and find out if the session is still open.
|
||||||
$MessageParams = @{
|
$m = 'Connection to {0} using Type {1} was established. ' -f $RemoteHost, $Type
|
||||||
Message = (
|
$m += 'But now it seems to be lost!'
|
||||||
("Connection to {0} using Type {1} " -f $RemoteHost, $Type) +
|
Write-Error -Message $m
|
||||||
"was established. But now it seems to be lost!"
|
|
||||||
)
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
"NetAppFAS" {
|
'NetAppFAS' {
|
||||||
try {
|
# Construct the splatting for Connect-NcController
|
||||||
$null = Connect-NcController -Name $RemoteHost -Credential $creds -ErrorAction Stop -HTTPS
|
$params = @{
|
||||||
}
|
Name = $RemoteHost
|
||||||
|
|
||||||
catch {
|
|
||||||
# Write a error message to the log.
|
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"VMware" {
|
|
||||||
try {
|
|
||||||
Connect-VIServer -Server $RemoteHost -Credential $creds -ErrorAction Stop | Out-Null
|
|
||||||
}
|
|
||||||
|
|
||||||
catch {
|
|
||||||
# Write a error message to the log.
|
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"CisServer" {
|
|
||||||
try {
|
|
||||||
if ($PassThru.IsPresent) {
|
|
||||||
Connect-CisServer -Server $RemoteHost -Credential $creds -ErrorAction Stop
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
Connect-CisServer -Server $RemoteHost -Credential $creds -ErrorAction Stop | Out-Null
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
catch {
|
|
||||||
# Write a error message to the log.
|
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"ExchangeHTTP" {
|
|
||||||
try {
|
|
||||||
$ConnectionParams = @{
|
|
||||||
ConnectionURI = "http://{0}/powershell" -f $RemoteHost
|
|
||||||
ConfigurationName = 'Microsoft.Exchange'
|
|
||||||
Credential = $creds
|
Credential = $creds
|
||||||
ErrorAction = 'Stop'
|
HTTPS = $true
|
||||||
}
|
}
|
||||||
$Global:PSExchangeRemote = New-PSSession @ConnectionParams
|
|
||||||
# ScriptAnalyzer issue (unused var) workaround.
|
# Check if -PassThru was passed. If so, a) do not set the default variable and b) return the
|
||||||
$null = $Global:PSExchangeRemote
|
# session object to the caller.
|
||||||
|
if ($PSBoundParameters.ContainsKey('PassThru')) {
|
||||||
|
$params.Add('Transient', $true)
|
||||||
}
|
}
|
||||||
catch {
|
|
||||||
# Write a error message to the log.
|
|
||||||
$MessageParams = @{
|
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"ExchangeHTTPS" {
|
|
||||||
try {
|
try {
|
||||||
$ConnectionParams = @{
|
$handle = Connect-NcController @params
|
||||||
ConnectionURI = "https://{0}/powershell" -f $RemoteHost
|
|
||||||
ConfigurationName = 'Microsoft.Exchange'
|
|
||||||
Credential = $creds
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
$Global:PSExchangeRemote = New-PSSession @ConnectionParams
|
|
||||||
}
|
}
|
||||||
|
|
||||||
catch {
|
catch {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
}
|
||||||
Write-Error @MessageParams
|
|
||||||
|
if ($PSBoundParameters.ContainsKey('PassThru')) {
|
||||||
|
return $handle
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
"SCP" {
|
'SCP' {
|
||||||
$WinSCPSessionParams = @{
|
$WinSCPSessionParams = @{
|
||||||
Credential = $creds
|
Credential = $creds
|
||||||
Hostname = $RemoteHost
|
Hostname = $RemoteHost
|
||||||
@ -335,39 +299,51 @@ function Connect-To {
|
|||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
$SessionOption = New-WinSCPSessionOption @WinSCPSessionParams
|
$SessionOption = New-WinSCPSessionOption @WinSCPSessionParams
|
||||||
$Global:WinSCPSession = New-WinSCPSession -SessionOption $SessionOption
|
$global:WinSCPSession = New-WinSCPSession -SessionOption $SessionOption
|
||||||
Write-Verbose -Message (
|
Write-Verbose -Message (
|
||||||
"SCP Connection established with {0}" -f $Global:WinSCPSession.Hostname
|
'SCP Connection established with {0}' -f $global:WinSCPSession.Hostname
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
# Check the Connection State
|
# Check the Connection State
|
||||||
if (!($WinSCPSession.Opened)) {
|
if (!($WinSCPSession.Opened)) {
|
||||||
# Check the connection state and find out if the session is still open.
|
# Check the connection state and find out if the session is still open.
|
||||||
$MessageParams = @{
|
$m = 'Connection to {0} using Type {1} was established. ' -f $RemoteHost, $Type
|
||||||
Message = (
|
$m += 'But now it seems to be lost!'
|
||||||
("Connection to {0} using Type {1} was established. " -f $RemoteHost, $Type) +
|
Write-Error -Message $m
|
||||||
"But now it seems to be lost!"
|
|
||||||
)
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
}
|
||||||
Write-Error @MessageParams
|
}
|
||||||
|
'VMware' {
|
||||||
|
try {
|
||||||
|
Connect-VIServer -Server $RemoteHost -Credential $creds -ErrorAction Stop | Out-Null
|
||||||
|
}
|
||||||
|
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'VMwareCisServer' {
|
||||||
|
try {
|
||||||
|
if ($PassThru.IsPresent) {
|
||||||
|
Connect-CisServer -Server $RemoteHost -Credential $creds
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$null = Connect-CisServer -Server $RemoteHost -Credential $creds
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
catch {
|
||||||
|
# Write a error message to the log.
|
||||||
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
default {
|
default {
|
||||||
# Write a error message to the log.
|
# Write a error message to the log.
|
||||||
$MessageParams = @{
|
Write-Error -Message ('Unable to connect to {0} using Type {1}.' -f $RemoteHost, $Type)
|
||||||
Message = "Unable to connect to {0} using Type {1}." -f $RemoteHost, $Type
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
}
|
|
||||||
Write-Error @MessageParams
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
BIN
src/Vendor/libressl/openssl.exe
(Stored with Git LFS)
vendored
BIN
src/Vendor/libressl/openssl.exe
(Stored with Git LFS)
vendored
Binary file not shown.
BIN
src/Vendor/libressl255/libcrypto-41.dll
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libcrypto-41.dll
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libcrypto-41.exp
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libcrypto-41.exp
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libcrypto-41.lib
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libcrypto-41.lib
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libcrypto-41.pdb
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libcrypto-41.pdb
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libssl-43.dll
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libssl-43.dll
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libssl-43.exp
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libssl-43.exp
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libssl-43.lib
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libssl-43.lib
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libssl-43.pdb
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libssl-43.pdb
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libtls-15.dll
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libtls-15.dll
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libtls-15.exp
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libtls-15.exp
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libtls-15.lib
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libtls-15.lib
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/libtls-15.pdb
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/libtls-15.pdb
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/ocspcheck.exe
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/ocspcheck.exe
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
BIN
src/Vendor/libressl255/openssl.exe
(Stored with Git LFS)
vendored
Normal file
BIN
src/Vendor/libressl255/openssl.exe
(Stored with Git LFS)
vendored
Normal file
Binary file not shown.
Reference in New Issue
Block a user