handle multiple winrm listeners (#4142)
* handle multiple winrm listeners * use the sorterd array
This commit is contained in:
parent
f10413b919
commit
4943d329a4
1 changed files with 24 additions and 19 deletions
|
@ -178,37 +178,42 @@ Set-Attr $result.ansible_facts "ansible_env" $env_vars
|
||||||
$psversion = $PSVersionTable.PSVersion.Major
|
$psversion = $PSVersionTable.PSVersion.Major
|
||||||
Set-Attr $result.ansible_facts "ansible_powershell_version" $psversion
|
Set-Attr $result.ansible_facts "ansible_powershell_version" $psversion
|
||||||
|
|
||||||
$winrm_https_listener_parent_path = Get-ChildItem -Path WSMan:\localhost\Listener -Recurse | Where-Object {$_.PSChildName -eq "Transport" -and $_.Value -eq "HTTPS"} | select PSParentPath
|
$winrm_https_listener_parent_paths = Get-ChildItem -Path WSMan:\localhost\Listener -Recurse | Where-Object {$_.PSChildName -eq "Transport" -and $_.Value -eq "HTTPS"} | select PSParentPath
|
||||||
$winrm_https_listener_path = $null
|
if ($winrm_https_listener_parent_paths -isnot [array]) {
|
||||||
$https_listener = $null
|
$winrm_https_listener_parent_paths = @($winrm_https_listener_parent_paths)
|
||||||
$winrm_cert_thumbprint = $null
|
|
||||||
$uppercase_cert_thumbprint = $null
|
|
||||||
|
|
||||||
if ($winrm_https_listener_parent_path ) {
|
|
||||||
$winrm_https_listener_path = $winrm_https_listener_parent_path.PSParentPath.Substring($winrm_https_listener_parent_path.PSParentPath.LastIndexOf("\"))
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($winrm_https_listener_path)
|
$winrm_https_listener_paths = @()
|
||||||
|
$https_listeners = @()
|
||||||
|
$winrm_cert_thumbprints = @()
|
||||||
|
$winrm_cert_expiry = @()
|
||||||
|
|
||||||
|
foreach ($winrm_https_listener_parent_path in $winrm_https_listener_parent_paths) {
|
||||||
|
$winrm_https_listener_paths += $winrm_https_listener_parent_path.PSParentPath.Substring($winrm_https_listener_parent_path.PSParentPath.LastIndexOf("\"))
|
||||||
|
}
|
||||||
|
|
||||||
|
foreach ($winrm_https_listener_path in $winrm_https_listener_paths)
|
||||||
{
|
{
|
||||||
$https_listener = Get-ChildItem -Path "WSMan:\localhost\Listener$winrm_https_listener_path"
|
$https_listeners += Get-ChildItem -Path "WSMan:\localhost\Listener$winrm_https_listener_path"
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($https_listener)
|
foreach ($https_listener in $https_listeners)
|
||||||
{
|
{
|
||||||
$winrm_cert_thumbprint = $https_listener | where {$_.Name -EQ "CertificateThumbprint" } | select Value
|
$winrm_cert_thumbprints += $https_listener | where {$_.Name -EQ "CertificateThumbprint" } | select Value
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($winrm_cert_thumbprint)
|
foreach ($winrm_cert_thumbprint in $winrm_cert_thumbprints) {
|
||||||
{
|
Try {
|
||||||
$uppercase_cert_thumbprint = $winrm_cert_thumbprint.Value.ToString().ToUpper()
|
$winrm_cert_expiry += Get-ChildItem -Path Cert:\LocalMachine\My | where Thumbprint -EQ $winrm_cert_thumbprint.Value.ToString().ToUpper() | select NotAfter
|
||||||
|
}
|
||||||
|
Catch {}
|
||||||
}
|
}
|
||||||
|
|
||||||
$winrm_cert_expiry = Get-ChildItem -Path Cert:\LocalMachine\My | where Thumbprint -EQ $uppercase_cert_thumbprint | select NotAfter
|
$winrm_cert_expirations = $winrm_cert_expiry | Sort-Object NotAfter
|
||||||
|
if ($winrm_cert_expirations)
|
||||||
if ($winrm_cert_expiry)
|
|
||||||
{
|
{
|
||||||
# this fact was renamed from ansible_winrm_certificate_expires due to collision with ansible_winrm_X connection var pattern
|
# this fact was renamed from ansible_winrm_certificate_expires due to collision with ansible_winrm_X connection var pattern
|
||||||
Set-Attr $result.ansible_facts "ansible_win_rm_certificate_expires" $winrm_cert_expiry.NotAfter.ToString("yyyy-MM-dd HH:mm:ss")
|
Set-Attr $result.ansible_facts "ansible_win_rm_certificate_expires" $winrm_cert_expirations[0].NotAfter.ToString("yyyy-MM-dd HH:mm:ss")
|
||||||
}
|
}
|
||||||
|
|
||||||
$PendingReboot = Get-PendingRebootStatus
|
$PendingReboot = Get-PendingRebootStatus
|
||||||
|
|
Loading…
Reference in a new issue