2017-03-02 01:49:15 +00:00
#!powershell
2018-07-17 21:29:05 +00:00
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
# Requires -Module Ansible.ModuleUtils.Legacy
2017-03-02 01:49:15 +00:00
Set-StrictMode -Version 2
$ErrorActionPreference = " Stop "
2018-10-19 03:18:52 +00:00
# FUTURE: Consider action wrapper to manage reboots and credential changes
2017-03-02 01:49:15 +00:00
Function Ensure-Prereqs {
$gwf = Get-WindowsFeature AD-Domain -Services
2018-10-19 03:18:52 +00:00
if ( $gwf . InstallState -ne " Installed " ) {
2017-03-02 01:49:15 +00:00
$result . changed = $true
2018-10-19 03:18:52 +00:00
# NOTE: AD-Domain-Services includes: RSAT-AD-AdminCenter, RSAT-AD-Powershell and RSAT-ADDS-Tools
$awf = Add-WindowsFeature AD-Domain -Services -WhatIf: $check_mode
# FUTURE: Check if reboot necessary
return $true
2017-03-02 01:49:15 +00:00
}
2018-10-19 03:18:52 +00:00
return $false
2017-03-02 01:49:15 +00:00
}
2018-07-17 21:29:05 +00:00
$params = Parse-Args $args -supports_check_mode $true
$check_mode = Get-AnsibleParam -obj $params -name " _ansible_check_mode " -default $false
$dns_domain_name = Get-AnsibleParam -obj $params -name " dns_domain_name " -failifempty $true
$domain_netbios_name = Get-AnsibleParam -obj $params -name " domain_netbios_name "
$safe_mode_admin_password = Get-AnsibleParam -obj $params -name " safe_mode_password " -failifempty $true
$database_path = Get-AnsibleParam -obj $params -name " database_path " -type " path "
$sysvol_path = Get-AnsibleParam -obj $params -name " sysvol_path " -type " path "
2018-10-19 03:18:52 +00:00
$create_dns_delegation = Get-AnsibleParam -obj $params -name " create_dns_delegation " -type " bool "
$domain_mode = Get-AnsibleParam -obj $params -name " domain_mode " -type " str "
$forest_mode = Get-AnsibleParam -obj $params -name " forest_mode " -type " str "
2017-03-02 01:49:15 +00:00
2018-10-19 03:18:52 +00:00
# FUTURE: Support down to Server 2012?
if ( [ System.Environment ] :: OSVersion . Version -lt [ Version ] " 6.3.9600.0 " ) {
2017-03-02 01:49:15 +00:00
Fail-Json -message " win_domain requires Windows Server 2012R2 or higher "
}
2018-10-19 03:18:52 +00:00
# Check that domain_netbios_name is less than 15 characters
if ( $domain_netbios_name -and $domain_netbios_name . length -gt 15 ) {
Fail-Json -message " The parameter 'domain_netbios_name' should not exceed 15 characters in length "
}
$result = @ {
changed = $false ;
reboot_required = $false ;
}
2017-03-02 01:49:15 +00:00
2018-10-19 03:18:52 +00:00
# FUTURE: Any sane way to do the detection under check-mode *without* installing the feature?
$installed = Ensure-Prereqs
2017-03-02 01:49:15 +00:00
2018-10-19 03:18:52 +00:00
# when in check mode and the prereq was "installed" we need to exit early as
# the AD cmdlets weren't really installed
if ( $check_mode -and $installed ) {
Exit-Json -obj $result
}
2017-03-02 01:49:15 +00:00
2018-10-19 03:18:52 +00:00
# Check that we got a valid domain_mode
$valid_domain_modes = [ Enum ] :: GetNames ( ( Get-Command -Name Install-ADDSForest ) . Parameters . DomainMode . ParameterType )
if ( ( $domain_mode -ne $null ) -and -not ( $domain_mode -in $valid_domain_modes ) ) {
Fail-Json -obj $result -message " The parameter 'domain_mode' does not accept ' $domain_mode ', please use one of: $valid_domain_modes "
2017-03-02 01:49:15 +00:00
}
2018-10-19 03:18:52 +00:00
# Check that we got a valid forest_mode
$valid_forest_modes = [ Enum ] :: GetNames ( ( Get-Command -Name Install-ADDSForest ) . Parameters . ForestMode . ParameterType )
if ( ( $forest_mode -ne $null ) -and -not ( $forest_mode -in $valid_forest_modes ) ) {
Fail-Json -obj $result -message " The parameter 'forest_mode' does not accept ' $forest_mode ', please use one of: $valid_forest_modes "
}
$forest = $null
try {
$forest = Get-ADForest $dns_domain_name -ErrorAction SilentlyContinue
} catch { }
if ( -not $forest ) {
2017-03-02 01:49:15 +00:00
$result . changed = $true
2018-10-19 03:18:52 +00:00
$sm_cred = ConvertTo-SecureString $safe_mode_admin_password -AsPlainText -Force
2017-03-02 01:49:15 +00:00
2018-10-19 03:18:52 +00:00
$install_params = @ {
DomainName = $dns_domain_name ;
SafeModeAdministratorPassword = $sm_cred ;
Confirm = $false ;
SkipPreChecks = $true ;
InstallDns = $true ;
NoRebootOnCompletion = $true ;
WhatIf = $check_mode ;
}
if ( $database_path ) {
$install_params . DatabasePath = $database_path
}
if ( $sysvol_path ) {
$install_params . SysvolPath = $sysvol_path
}
if ( $domain_netbios_name ) {
$install_params . DomainNetBiosName = $domain_netbios_name
}
if ( $create_dns_delegation -ne $null ) {
$install_params . CreateDnsDelegation = $create_dns_delegation
}
if ( $domain_mode ) {
$install_params . DomainMode = $domain_mode
}
if ( $forest_mode ) {
$install_params . ForestMode = $forest_mode
}
$iaf = Install-ADDSForest @install_params
2017-03-02 01:49:15 +00:00
2018-10-19 03:18:52 +00:00
if ( $check_mode ) {
# the return value after -WhatIf does not have RebootRequired populated
# manually set to True as the domain would have been installed
$result . reboot_required = $true
} else {
2017-03-02 01:49:15 +00:00
$result . reboot_required = $iaf . RebootRequired
2018-08-10 06:17:45 +00:00
# The Netlogon service is set to auto start but is not started. This is
# required for Ansible to connect back to the host and reboot in a
# later task. Even if this fails Ansible can still connect but only
# with ansible_winrm_transport=basic so we just display a warning if
# this fails.
try {
Start-Service -Name Netlogon
} catch {
Add-Warning -obj $result -message " Failed to start the Netlogon service after promoting the host, Ansible may be unable to connect until the host is manually rebooting: $( $_ . Exception . Message ) "
}
2017-03-02 01:49:15 +00:00
}
}
Exit-Json $result