1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
|
#!powershell
# -*- coding: utf-8 -*-
# (c) 2022, John McCall (@lowlydba)
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
#AnsibleRequires -CSharpUtil Ansible.Basic
#AnsibleRequires -PowerShell ansible_collections.lowlydba.sqlserver.plugins.module_utils._SqlServerUtils
#Requires -Modules @{ ModuleName="dbatools"; ModuleVersion="2.0.0" }
$ErrorActionPreference = "Stop"
$spec = @{
supports_check_mode = $true
options = @{
identity = @{type = 'str'; required = $true }
name = @{type = 'str'; required = $false }
password = @{type = 'str'; required = $false; no_log = $true }
mapped_class_type = @{type = 'str'; required = $false; choices = @('CryptographicProvider', 'None') }
provider_name = @{type = 'str'; required = $false }
force = @{type = 'bool'; required = $false; default = $false }
state = @{type = 'str'; required = $false; default = 'present'; choices = @('present', 'absent') }
}
}
$module = [Ansible.Basic.AnsibleModule]::Create($args, $spec, @(Get-LowlyDbaSqlServerAuthSpec))
$sqlInstance, $sqlCredential = Get-SqlCredential -Module $module
$identity = $module.Params.identity
$name = $module.Params.name
if ($null -ne $module.Params.password) {
$secure_password = ConvertTo-SecureString -String $module.Params.password -AsPlainText -Force
}
$mapped_class_type = $module.Params.mapped_class_type
$provider_name = $module.Params.provider_name
$state = $module.Params.state
$force = $module.Params.force
$checkMode = $module.CheckMode
$module.Result.changed = $false
try {
$getCredendtialSplat = @{
SqlInstance = $sqlInstance
SqlCredential = $sqlCredential
Identity = $identity
EnableException = $true
}
$existingCredential = Get-DbaCredential @getCredendtialSplat
if ($state -eq "absent") {
# Remove credential if it exists
if ($null -ne $existingCredential) {
try {
$removeCredentialSplat = @{
EnableException = $true
WhatIf = $checkMode
Confirm = $false
}
$output = $existingCredential | Remove-DbaCredential @removeCredentialSplat
$module.Result.changed = $true
}
catch {
$module.FailJson("Removing credential failed: $($_.Exception.Message)", $_)
}
}
}
elseif ($state -eq "present") {
# Create credential
if (($null -ne $existingCredential -and $force -eq $true) -or $null -eq $existingCredential) {
try {
$newCredentialSplat = @{
SqlInstance = $sqlInstance
SqlCredential = $sqlCredential
Identity = $identity
EnableException = $true
WhatIf = $checkMode
Force = $force
Confirm = $false
}
if ($null -ne $name) {
$newCredentialSplat.Add("Name", $name)
}
if ($null -ne $secure_password) {
$newCredentialSplat.Add("SecurePassword", $secure_password)
}
if ($null -ne $mapped_class_type) {
$newCredentialSplat.Add("MappedClassType", $mapped_class_type)
}
if ($null -ne $provider_name) {
$newCredentialSplat.Add("ProviderName", $provider_name)
}
$output = New-DbaCredential @newCredentialSplat
$module.result.changed = $true
}
catch {
$module.FailJson("Creating credential failed: $($_.Exception.Message)", $_)
}
}
# Return existing credential if nothing is changed
elseif ($null -ne $existingCredential) {
$output = $existingCredential
}
}
try {
if ($null -ne $output) {
$resultData = ConvertTo-SerializableObject -InputObject $output
$module.Result.data = $resultData
}
$module.ExitJson()
}
catch {
$module.FailJson("Failure: $($_.Exception.Message)", $_)
}
}
catch {
$module.FailJson("Configuring credential failed: $($_.Exception.Message) ; $getCredendtialSplat", $_)
}
|