You mentioned you were using ansible 2.1.0 and that you'd switched to 
group_vars- that version has an inventory bug where any ansible_winrm_X 
connection vars are ignored if they live in group_vars. Either upgrade to 
at least 2.1.1, or move them back. Also, try doing a raw: klist on the 
Windows host with delegation enabled- you should see a TGT listed.

On Friday, October 28, 2016 at 10:10:45 AM UTC-7, Surred wrote:
>
> Apologies for the delayed response... I've been looking for ways to work 
> around this issue, but I hit a roadblock so I really need to figure this 
> out. Below are the logs from the server hosting the network share. 
> Apparently the login was successful, but it was as an anonymous user using 
> NTLM. I'm still receiving the same Access Denied message in ansible. Any 
> further assistance would be greatly appreciated. Thanks.
>
> Log Name:      Security
> Source:        Microsoft-Windows-Security-Auditing
> Date:          10/28/2016 11:50:35 AM
> Event ID:      4624
> Task Category: Logon
> Level:         Information
> Keywords:      Audit Success
> User:          N/A
> Computer:      SCCM01.domain.com
> Description:
> An account was successfully logged on.
>
> Subject:
> Security ID: NULL SID
> Account Name: -
> Account Domain: -
> Logon ID: 0x0
>
> Logon Type: 3
>
> Impersonation Level: Impersonation
>
> New Logon:
> Security ID: ANONYMOUS LOGON
> Account Name: ANONYMOUS LOGON
> Account Domain: NT AUTHORITY
> Logon ID: 0x614767F6
> Logon GUID: {00000000-0000-0000-0000-000000000000}
>
> Process Information:
> Process ID: 0x0
> Process Name: -
>
> Network Information:
> Workstation Name: DC1.domain.com
> Source Network Address: x.x.x.x
> Source Port: 59019
>
> Detailed Authentication Information:
> Logon Process: NtLmSsp 
> Authentication Package: NTLM
> Transited Services: -
> Package Name (NTLM only): NTLM V1
> Key Length: 128
>
> This event is generated when a logon session is created. It is generated 
> on the computer that was accessed.
>
> The subject fields indicate the account on the local system which 
> requested the logon. This is most commonly a service such as the Server 
> service, or a local process such as Winlogon.exe or Services.exe.
>
> The logon type field indicates the kind of logon that occurred. The most 
> common types are 2 (interactive) and 3 (network).
>
> The New Logon fields indicate the account for whom the new logon was 
> created, i.e. the account that was logged on.
>
> The network fields indicate where a remote logon request originated. 
> Workstation name is not always available and may be left blank in some 
> cases.
>
> The impersonation level field indicates the extent to which a process in 
> the logon session can impersonate.
>
> The authentication information fields provide detailed information about 
> this specific logon request.
> - Logon GUID is a unique identifier that can be used to correlate this 
> event with a KDC event.
> - Transited services indicate which intermediate services have 
> participated in this logon request.
> - Package name indicates which sub-protocol was used among the NTLM 
> protocols.
> - Key length indicates the length of the generated session key. This will 
> be 0 if no session key was requested.
> Event Xml:
> <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event";>
>   <System>
>     <Provider Name="Microsoft-Windows-Security-Auditing" 
> Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
>     <EventID>4624</EventID>
>     <Version>1</Version>
>     <Level>0</Level>
>     <Task>12544</Task>
>     <Opcode>0</Opcode>
>     <Keywords>0x8020000000000000</Keywords>
>     <TimeCreated SystemTime="2016-10-28T16:50:35.912189700Z" />
>     <EventRecordID>2087408</EventRecordID>
>     <Correlation />
>     <Execution ProcessID="492" ThreadID="7628" />
>     <Channel>Security</Channel>
>     <Computer>SCCM01.domain.com</Computer>
>     <Security />
>   </System>
>   <EventData>
>     <Data Name="SubjectUserSid">S-1-0-0</Data>
>     <Data Name="SubjectUserName">-</Data>
>     <Data Name="SubjectDomainName">-</Data>
>     <Data Name="SubjectLogonId">0x0</Data>
>     <Data Name="TargetUserSid">S-1-5-7</Data>
>     <Data Name="TargetUserName">ANONYMOUS LOGON</Data>
>     <Data Name="TargetDomainName">NT AUTHORITY</Data>
>     <Data Name="TargetLogonId">0x614767f6</Data>
>     <Data Name="LogonType">3</Data>
>     <Data Name="LogonProcessName">NtLmSsp </Data>
>     <Data Name="AuthenticationPackageName">NTLM</Data>
>     <Data Name="WorkstationName">DC1.domain.com</Data>
>     <Data Name="LogonGuid">{00000000-0000-0000-0000-000000000000}</Data>
>     <Data Name="TransmittedServices">-</Data>
>     <Data Name="LmPackageName">NTLM V1</Data>
>     <Data Name="KeyLength">128</Data>
>     <Data Name="ProcessId">0x0</Data>
>     <Data Name="ProcessName">-</Data>
>     <Data Name="IpAddress">x.x.x.x</Data>
>     <Data Name="IpPort">59019</Data>
>     <Data Name="ImpersonationLevel">%%1833</Data>
>   </EventData>
> </Event>
>
>
>
>
> Log Name:      Security
> Source:        Microsoft-Windows-Security-Auditing
> Date:          10/28/2016 11:50:35 AM
> Event ID:      5140
> Task Category: File Share
> Level:         Information
> Keywords:      Audit Success
> User:          N/A
> Computer:      SCCM01.domain.com
> Description:
> A network share object was accessed.
> Subject:
> Security ID: ANONYMOUS LOGON
> Account Name: ANONYMOUS LOGON
> Account Domain: NT AUTHORITY
> Logon ID: 0x614767F6
>
> Network Information: 
> Object Type: File
> Source Address: x.x.x.x
> Source Port: 59019
> Share Information:
> Share Name: \\*\IPC$
> Share Path: 
>
> Access Request Information:
> Access Mask: 0x1
> Accesses: ReadData (or ListDirectory)
>
> Event Xml:
> <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event";>
>   <System>
>     <Provider Name="Microsoft-Windows-Security-Auditing" 
> Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
>     <EventID>5140</EventID>
>     <Version>1</Version>
>     <Level>0</Level>
>     <Task>12808</Task>
>     <Opcode>0</Opcode>
>     <Keywords>0x8020000000000000</Keywords>
>     <TimeCreated SystemTime="2016-10-28T16:50:35.912189700Z" />
>     <EventRecordID>2087409</EventRecordID>
>     <Correlation />
>     <Execution ProcessID="4" ThreadID="9240" />
>     <Channel>Security</Channel>
>     <Computer>SCCM01.domain.com</Computer>
>     <Security />
>   </System>
>   <EventData>
>     <Data Name="SubjectUserSid">S-1-5-7</Data>
>     <Data Name="SubjectUserName">ANONYMOUS LOGON</Data>
>     <Data Name="SubjectDomainName">NT AUTHORITY</Data>
>     <Data Name="SubjectLogonId">0x614767f6</Data>
>     <Data Name="ObjectType">File</Data>
>     <Data Name="IpAddress">x.x.x.x</Data>
>     <Data Name="IpPort">59019</Data>
>     <Data Name="ShareName">\\*\IPC$</Data>
>     <Data Name="ShareLocalPath">
>     </Data>
>     <Data Name="AccessMask">0x1</Data>
>     <Data Name="AccessList">%%4416
> </Data>
>   </EventData>
> </Event>
>
>
>
> On Thursday, September 22, 2016 at 2:15:09 AM UTC-5, J Hawkesworth wrote:
>>
>> Have a look in the event logs.  I suspect all you will see is 'Access is 
>> denied'.  Worth looking on the network share machine (if it is an actual 
>> windows box).  If it isn't a windows box I guess there will be some kind of 
>> samba share logging that you could examine too.
>>
>> Make sure that you are using the same user when logged in via remote 
>> desktop as the user that ansible is using.
>>
>> You could check for logon events in the event viewer and see what 
>> privileges are assigned to your ansible.... user and see how these differ 
>> when you login via RDP.
>>
>> My understanding is that the auth delegation changes the kerberos ticket 
>> in some some way so you could try examining the kerberos ticket using klist 
>> - unfortunately I can't try this myself at the moment.
>>
>> I wonder if it is possible for the domain controller to disallow granting 
>> the necessary kerberos ticket for auth delegation.  Perhaps ask Active 
>> Directory administrators if they can do anything like this and whether it 
>> it is in place.
>>
>> I still think that you are 'almost there' with solving this problem.
>>
>> Hope the above helps,
>>
>> Jon
>>
>>
>> On Tuesday, September 20, 2016 at 3:35:27 PM UTC+1, Surred wrote:
>>>
>>> JH,
>>>
>>> Do you know of any other tests/logging I could try/review to determine 
>>> why the kerberos delegation is not working in my environment?
>>>
>>> On Friday, September 16, 2016 at 2:22:05 AM UTC-5, J Hawkesworth wrote:
>>>>
>>>> Sorry, I should have been clearer.  2.0.0.2 and 2.1.1 are ansible 
>>>> versions.
>>>>
>>>>
>>>>
>>>> On Thursday, September 15, 2016 at 4:11:02 PM UTC+1, Surred wrote:
>>>>>
>>>>> Thanks for the response JH. I've moved the winrm connection details to 
>>>>> group_vars as you suggested, but am still not able to list the files of a 
>>>>> network share. You said you are using "2.0.0.2  / 2.1.1" Can you please 
>>>>> clarify those version numbers and what they are associated with?
>>>>>
>>>>> host file:
>>>>> user@ansible:~/ansible> cat inventories/domain
>>>>> [test]
>>>>> dc1.domain.com
>>>>>
>>>>>
>>>>> group_vars:
>>>>> user@ansible:~/ansible> cat inventories/group_vars/test.yml
>>>>> ---
>>>>>
>>>>> ansible_ssh_port: 5986
>>>>> ansible_connection: winrm
>>>>> ansible_winrm_transport: kerberos
>>>>> ansible_winrm_kerberos_delegation: yes
>>>>> ansible_ssh_user: [email protected]
>>>>> ansible_winrm_server_cert_validation: ignore
>>>>>
>>>>>
>>>>> output of playbook (i've added a debug task to dump the variables):
>>>>> user@ansible:~/ansible> ansible-playbook test.yml -i 
>>>>> inventories/domain -vvvvv
>>>>> Using /home/user/ansible/ansible.cfg as config file
>>>>> Loaded callback default of type stdout, v2.0
>>>>>
>>>>> PLAYBOOK: test.yml 
>>>>> *************************************************************
>>>>> 1 plays in test.yml
>>>>>
>>>>> PLAY [list unc] 
>>>>> ****************************************************************
>>>>>
>>>>> TASK [display variables] 
>>>>> *******************************************************
>>>>> task path: /home/user/ansible/test.yml:6
>>>>> ok: [dc1.domain.com] => {
>>>>>     "hostvars[inventory_hostname]": {
>>>>>         "ansible_check_mode": false,
>>>>>         "ansible_connection": "winrm",
>>>>>         "ansible_ssh_port": 5986,
>>>>>         "ansible_ssh_user": "[email protected]",
>>>>>         "ansible_version": {
>>>>>             "full": "2.1.0.0",
>>>>>             "major": 2,
>>>>>             "minor": 1,
>>>>>             "revision": 0,
>>>>>             "string": "2.1.0.0"
>>>>>         },
>>>>>         "ansible_winrm_kerberos_delegation": true,
>>>>>         "ansible_winrm_server_cert_validation": "ignore",
>>>>>         "ansible_winrm_transport": "kerberos",
>>>>>         "group_names": [
>>>>>             "test"
>>>>>         ],
>>>>>         "groups": {
>>>>>             "all": [
>>>>>                 "dc1.domain.com"
>>>>>             ],
>>>>>             "test": [
>>>>>                 "dc1.domain.com"
>>>>>             ],
>>>>>             "ungrouped": []
>>>>>         },
>>>>>         "inventory_dir": "/home/user/ansible/inventories",
>>>>>         "inventory_file": "inventories/domain",
>>>>>         "inventory_hostname": "dc1.domain.com",
>>>>>         "inventory_hostname_short": "dc1",
>>>>>         "omit": 
>>>>> "__omit_place_holder__aefe246ae370864260078b474e205946a8274802",
>>>>>         "playbook_dir": "/home/user/ansible"
>>>>>     }
>>>>> }
>>>>>
>>>>> TASK [list unc] 
>>>>> ****************************************************************
>>>>> task path: /home/user/ansible/test.yml:9
>>>>> <dc1.domain.com> ESTABLISH WINRM CONNECTION FOR USER: 
>>>>> [email protected] on PORT 5986 TO dc1.domain.com
>>>>> <dc1.domain.com> WINRM CONNECT: transport=kerberos endpoint=
>>>>> https://dc1.domain.com:5986/wsman
>>>>> <dc1.domain.com> WINRM OPEN SHELL: 
>>>>> 33ADC923-1FA6-4D0D-B5AF-7A474202BD2E
>>>>> <dc1.domain.com> EXEC Set-StrictMode -Version Latest
>>>>> (New-Item -Type Directory -Path $env:temp -Name 
>>>>> "ansible-tmp-1473950183.23-4669660185733").FullName | Write-Host 
>>>>> -Separator 
>>>>> '';
>>>>> <dc1.domain.com> WINRM EXEC u'PowerShell' [u'-NoProfile', 
>>>>> u'-NonInteractive', u'-ExecutionPolicy', u'Unrestricted', 
>>>>> u'-EncodedCommand', 
>>>>> u'UwBlAHQALQBTAHQAcgBpAGMAdABNAG8AZABlACAALQBWAGUAcgBzAGkAbwBuACAATABhAHQAZQBzAHQACgAoAE4AZQB3AC0ASQB0AGUAbQAgAC0AVAB5AHAAZQAgAEQAaQByAGUAYwB0AG8AcgB5ACAALQBQAGEAdABoACAAJABlAG4AdgA6AHQAZQBtAHAAIAAtAE4AYQBtAGUAIAAiAGEAbgBzAGkAYgBsAGUALQB0AG0AcAAtADEANAA3ADMAOQA1ADAAMQA4ADMALgAyADMALQA0ADYANgA5ADYANgAwADEAOAA1ADcAMwAzACIAKQAuAEYAdQBsAGwATgBhAG0AZQAgAHwAIABXAHIAaQB0AGUALQBIAG8AcwB0ACAALQBTAGUAcABhAHIAYQB0AG8AcgAgACcAJwA7AA==']
>>>>> <dc1.domain.com> WINRM RESULT u'<Response code 0, out 
>>>>> "C:\\Users\\ansible_svc", err "">'
>>>>> <dc1.domain.com> PUT "/home/user/ansible/test.ps1" TO 
>>>>> "C:\Users\ansible_svc\AppData\Local\Temp\ansible-tmp-1473950183.23-4669660185733\test.ps1"
>>>>> <dc1.domain.com> WINRM PUT "/home/user/ansible/test.ps1" to 
>>>>> "C:\Users\ansible_svc\AppData\Local\Temp\ansible-tmp-1473950183.23-4669660185733\test.ps1"
>>>>>  
>>>>> (offset=46 size=46)
>>>>> <dc1.domain.com> EXEC & 
>>>>>  
>>>>> 'C:\Users\ansible_svc\AppData\Local\Temp\ansible-tmp-1473950183.23-4669660185733\test.ps1'
>>>>> <dc1.domain.com> WINRM EXEC 'PowerShell' ['-NoProfile', 
>>>>> '-NonInteractive', '-ExecutionPolicy', 'Unrestricted', '-EncodedCommand', 
>>>>> 'JgAgACAAJwBDADoAXABVAHMAZQByAHMAXABhAG4AcwBpAGIAbABlAF8AcwB2AGMAXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcAGEAbgBzAGkAYgBsAGUALQB0AG0AcAAtADEANAA3ADMAOQA1ADAAMQA4ADMALgAyADMALQA0ADYANgA5ADYANgAwADEAOAA1ADcAMwAzAFwAdABlAHMAdAAuAHAAcwAxACcA']
>>>>> <dc1.domain.com> WINRM RESULT u'<Response code 0, out "", err "#< 
>>>>> CLIXML\r\n<Objs Ver">'
>>>>> <dc1.domain.com> EXEC Set-StrictMode -Version Latest
>>>>> Remove-Item 
>>>>> "C:\Users\ansible_svc\AppData\Local\Temp\ansible-tmp-1473950183.23-4669660185733"
>>>>>  
>>>>> -Force -Recurse;
>>>>> <dc1.domain.com> WINRM EXEC u'PowerShell' [u'-NoProfile', 
>>>>> u'-NonInteractive', u'-ExecutionPolicy', u'Unrestricted', 
>>>>> u'-EncodedCommand', 
>>>>> u'UwBlAHQALQBTAHQAcgBpAGMAdABNAG8AZABlACAALQBWAGUAcgBzAGkAbwBuACAATABhAHQAZQBzAHQACgBSAGUAbQBvAHYAZQAtAEkAdABlAG0AIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGEAbgBzAGkAYgBsAGUAXwBzAHYAYwBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAYQBuAHMAaQBiAGwAZQAtAHQAbQBwAC0AMQA0ADcAMwA5ADUAMAAxADgAMwAuADIAMwAtADQANgA2ADkANgA2ADAAMQA4ADUANwAzADMAIgAgAC0ARgBvAHIAYwBlACAALQBSAGUAYwB1AHIAcwBlADsA']
>>>>> <dc1.domain.com> WINRM RESULT u'<Response code 0, out "", err "">'
>>>>> <dc1.domain.com> WINRM CLOSE SHELL: 
>>>>> 33ADC923-1FA6-4D0D-B5AF-7A474202BD2E
>>>>> changed: [dc1.domain.com] => {"changed": true, "invocation": 
>>>>> {"module_args": {"_raw_params": "/home/user/ansible/test.ps1"}, 
>>>>> "module_name": "script"}, "rc": 0, "stderr": "Get-ChildItem : Access is 
>>>>> denied\r\nAt 
>>>>> C:\\Users\\ansible_svc\\AppData\\Local\\Temp\\ansible-tmp-1473950183.23-4669660185\r\n733\\test.ps1:1
>>>>>  
>>>>> char:1\r\n+ Get-ChildItem \"\\\\sccm01\\SMS_ABC\\Client\"\r\n+ 
>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\r\n+ CategoryInfo          
>>>>> : 
>>>>> PermissionDenied: (\\\\sccm01\\SMS_ABC\\Client \r\n:String) 
>>>>> [Get-ChildItem], UnauthorizedAccessException\r\n+ FullyQualifiedErrorId : 
>>>>> ItemExistsUnauthorizedAccessError,Microsoft.Powe 
>>>>> \r\nrShell.Commands.GetChildItemCommand\r\n\r\nGet-ChildItem : Cannot 
>>>>> find 
>>>>> path '\\\\sccm01\\SMS_ABC\\Client' because it \r\ndoes not exist.\r\nAt 
>>>>> C:\\Users\\ansible_svc\\AppData\\Local\\Temp\\ansible-tmp-1473950183.23-4669660185\r\n733\\test.ps1:1
>>>>>  
>>>>> char:1\r\n+ Get-ChildItem \"\\\\sccm01\\SMS_ABC\\Client\"\r\n+ 
>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\r\n+ CategoryInfo          
>>>>> : 
>>>>> ObjectNotFound: (\\\\sccm01\\SMS_ABC\\Client:S \r\ntring) 
>>>>> [Get-ChildItem], 
>>>>> ItemNotFoundException\r\n+ FullyQualifiedErrorId : 
>>>>> PathNotFound,Microsoft.PowerShell.Commands.GetCh \r\nildItemCommand\r\n", 
>>>>> "stdout": "", "stdout_lines": []}
>>>>>
>>>>> PLAY RECAP 
>>>>> *********************************************************************
>>>>> dc1.domain.com : ok=2    changed=1    unreachable=0    failed=0
>>>>>
>>>>> user@ansible:~/ansible>
>>>>>
>>>>>
>>>>>
>>>>> On Wednesday, September 14, 2016 at 12:52:13 PM UTC-5, Surred wrote:
>>>>>>
>>>>>> Hello,
>>>>>>
>>>>>> I'm having issues getting the double hop scenario working. To test 
>>>>>> kerberos delegation I have a simple PowerShell script that does a 
>>>>>> Get-ChildItem on a UNC path. When running the command manually on the 
>>>>>> host 
>>>>>> it works, but when executing as playbook with Ansible I get "Access 
>>>>>> Denied." Below is my configuration and the verbose output I receive. Any 
>>>>>> help or suggestions would be greatly appreciated.
>>>>>>
>>>>>>
>>>>>> Environment:
>>>>>> user@ansible:~/ansible> pip list 2>/dev/null | grep -i pywinrm
>>>>>> pywinrm (0.2.0)
>>>>>>
>>>>>> user@ansible:~/ansible> ansible --version
>>>>>> ansible 2.1.0.0
>>>>>>   config file = /home/user/ansible/ansible.cfg
>>>>>>   configured module search path = Default w/o overrides
>>>>>>
>>>>>> user@ansible:~/ansible> cat /etc/*-release
>>>>>> NAME="SLES"
>>>>>> VERSION="11.4"
>>>>>> VERSION_ID="11.4"
>>>>>> PRETTY_NAME="SUSE Linux Enterprise Server 11 SP4"
>>>>>> ID="sles"
>>>>>> ANSI_COLOR="0;32"
>>>>>> CPE_NAME="cpe:/o:suse:sles:11:4"
>>>>>> SUSE Linux Enterprise Server 11 (x86_64)
>>>>>> VERSION = 11
>>>>>> PATCHLEVEL = 4
>>>>>>
>>>>>>
>>>>>> Inventory excerpt:
>>>>>> [all:vars]
>>>>>> ansible_ssh_port=5986
>>>>>> ansible_connection=winrm
>>>>>> ansible_winrm_transport=kerberos
>>>>>> ansible_winrm_kerberos_delegation=yes
>>>>>> [email protected]
>>>>>> ansible_winrm_server_cert_validation=ignore
>>>>>>
>>>>>> Playbook output:
>>>>>> user@ansible:~/ansible> ansible-playbook test.yml -i 
>>>>>> inventories/domain -vvvvv
>>>>>> Using /home/user/ansible/ansible.cfg as config file
>>>>>> Loaded callback default of type stdout, v2.0
>>>>>>
>>>>>> PLAYBOOK: test.yml 
>>>>>> *************************************************************
>>>>>> 1 plays in test.yml
>>>>>>
>>>>>> PLAY [list unc] 
>>>>>> ****************************************************************
>>>>>>
>>>>>> TASK [list unc] 
>>>>>> ****************************************************************
>>>>>> task path: /home/user/ansible/test.yml:6
>>>>>> <dc1.domain.com> ESTABLISH WINRM CONNECTION FOR USER: 
>>>>>> [email protected] on PORT 5986 TO dc1.domain.com
>>>>>> <dc1.domain.com> WINRM CONNECT: transport=kerberos endpoint=
>>>>>> https://dc1.domain.com:5986/wsman
>>>>>> <dc1.domain.com> WINRM OPEN SHELL: 
>>>>>> 33CC652E-0DED-4C66-B898-2860580A29A8
>>>>>> <dc1.domain.com> EXEC Set-StrictMode -Version Latest
>>>>>> (New-Item -Type Directory -Path $env:temp -Name 
>>>>>> "ansible-tmp-1473809521.62-137672088908702").FullName | Write-Host 
>>>>>> -Separator '';
>>>>>> <dc1.domain.com> WINRM EXEC u'PowerShell' [u'-NoProfile', 
>>>>>> u'-NonInteractive', u'-ExecutionPolicy', u'Unrestricted', 
>>>>>> u'-EncodedCommand', 
>>>>>> u'UwBlAHQALQBTAHQAcgBpAGMAdABNAG8AZABlACAALQBWAGUAcgBzAGkAbwBuACAATABhAHQAZQBzAHQACgAoAE4AZQB3AC0ASQB0AGUAbQAgAC0AVAB5AHAAZQAgAEQAaQByAGUAYwB0AG8AcgB5ACAALQBQAGEAdABoACAAJABlAG4AdgA6AHQAZQBtAHAAIAAtAE4AYQBtAGUAIAAiAGEAbgBzAGkAYgBsAGUALQB0AG0AcAAtADEANAA3ADMAOAAwADkANQAyADEALgA2ADIALQAxADMANwA2ADcAMgAwADgAOAA5ADAAOAA3ADAAMgAiACkALgBGAHUAbABsAE4AYQBtAGUAIAB8ACAAVwByAGkAdABlAC0ASABvAHMAdAAgAC0AUwBlAHAAYQByAGEAdABvAHIAIAAnACcAOwA=']
>>>>>> <dc1.domain.com> WINRM RESULT u'<Response code 0, out 
>>>>>> "C:\\Users\\ansible_svc", err "">'
>>>>>> <dc1.domain.com> PUT "/home/user/ansible/test.ps1" TO 
>>>>>> "C:\Users\ansible_svc\AppData\Local\Temp\ansible-tmp-1473809521.62-137672088908702\test.ps1"
>>>>>> <dc1.domain.com> WINRM PUT "/home/user/ansible/test.ps1" to 
>>>>>> "C:\Users\ansible_svc\AppData\Local\Temp\ansible-tmp-1473809521.62-137672088908702\test.ps1"
>>>>>>  
>>>>>> (offset=46 size=46)
>>>>>> <dc1.domain.com> EXEC & 
>>>>>>  
>>>>>> 'C:\Users\ansible_svc\AppData\Local\Temp\ansible-tmp-1473809521.62-137672088908702\test.ps1'
>>>>>> <dc1.domain.com> WINRM EXEC 'PowerShell' ['-NoProfile', 
>>>>>> '-NonInteractive', '-ExecutionPolicy', 'Unrestricted', 
>>>>>> '-EncodedCommand', 
>>>>>> 'JgAgACAAJwBDADoAXABVAHMAZQByAHMAXABhAG4AcwBpAGIAbABlAF8AcwB2AGMAXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcAGEAbgBzAGkAYgBsAGUALQB0AG0AcAAtADEANAA3ADMAOAAwADkANQAyADEALgA2ADIALQAxADMANwA2ADcAMgAwADgAOAA5ADAAOAA3ADAAMgBcAHQAZQBzAHQALgBwAHMAMQAnAA==']
>>>>>> <dc1.domain.com> WINRM RESULT u'<Response code 0, out "", err "#< 
>>>>>> CLIXML\r\n<Objs Ver">'
>>>>>> <dc1.domain.com> EXEC Set-StrictMode -Version Latest
>>>>>> Remove-Item 
>>>>>> "C:\Users\ansible_svc\AppData\Local\Temp\ansible-tmp-1473809521.62-137672088908702"
>>>>>>  
>>>>>> -Force -Recurse;
>>>>>> <dc1.domain.com> WINRM EXEC u'PowerShell' [u'-NoProfile', 
>>>>>> u'-NonInteractive', u'-ExecutionPolicy', u'Unrestricted', 
>>>>>> u'-EncodedCommand', 
>>>>>> u'UwBlAHQALQBTAHQAcgBpAGMAdABNAG8AZABlACAALQBWAGUAcgBzAGkAbwBuACAATABhAHQAZQBzAHQACgBSAGUAbQBvAHYAZQAtAEkAdABlAG0AIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGEAbgBzAGkAYgBsAGUAXwBzAHYAYwBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAYQBuAHMAaQBiAGwAZQAtAHQAbQBwAC0AMQA0ADcAMwA4ADAAOQA1ADIAMQAuADYAMgAtADEAMwA3ADYANwAyADAAOAA4ADkAMAA4ADcAMAAyACIAIAAtAEYAbwByAGMAZQAgAC0AUgBlAGMAdQByAHMAZQA7AA==']
>>>>>> <dc1.domain.com> WINRM RESULT u'<Response code 0, out "", err "">'
>>>>>> <dc1.domain.com> WINRM CLOSE SHELL: 
>>>>>> 33CC652E-0DED-4C66-B898-2860580A29A8
>>>>>> changed: [dc1.domain.com] => {"changed": true, "invocation": 
>>>>>> {"module_args": {"_raw_params": "/home/user/ansible/test.ps1"}, 
>>>>>> "module_name": "script"}, "rc": 0, "stderr": "Get-ChildItem : Access is 
>>>>>> denied\r\nAt 
>>>>>> C:\\Users\\ansible_svc\\AppData\\Local\\Temp\\ansible-tmp-1473809521.62-1376720889\r\n08702\\test.ps1:1
>>>>>>  
>>>>>> char:1\r\n+ Get-ChildItem \"\\\\sccm01\\SMS_ABC\\Client\"\r\n+ 
>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\r\n+ CategoryInfo          
>>>>>> : 
>>>>>> PermissionDenied: (\\\\sccm01\\SMS_ABC\\Client \r\n:String) 
>>>>>> [Get-ChildItem], UnauthorizedAccessException\r\n+ FullyQualifiedErrorId 
>>>>>> : 
>>>>>> ItemExistsUnauthorizedAccessError,Microsoft.Powe 
>>>>>> \r\nrShell.Commands.GetChildItemCommand\r\n\r\nGet-ChildItem : Cannot 
>>>>>> find 
>>>>>> path '\\\\sccm01\\SMS_ABC\\Client' because it \r\ndoes not exist.\r\nAt 
>>>>>> C:\\Users\\ansible_svc\\AppData\\Local\\Temp\\ansible-tmp-1473809521.62-1376720889\r\n08702\\test.ps1:1
>>>>>>  
>>>>>> char:1\r\n+ Get-ChildItem \"\\\\sccm01\\SMS_ABC\\Client\"\r\n+ 
>>>>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\r\n+ CategoryInfo          
>>>>>> : 
>>>>>> ObjectNotFound: (\\\\sccm01\\SMS_ABC\\Client:S \r\ntring) 
>>>>>> [Get-ChildItem], 
>>>>>> ItemNotFoundException\r\n+ FullyQualifiedErrorId : 
>>>>>> PathNotFound,Microsoft.PowerShell.Commands.GetCh 
>>>>>> \r\nildItemCommand\r\n", 
>>>>>> "stdout": "", "stdout_lines": []}
>>>>>>
>>>>>> PLAY RECAP 
>>>>>> *********************************************************************
>>>>>> dc1.domain.com : ok=1    changed=1    unreachable=0    failed=0
>>>>>>
>>>>>> user@ansible:~/ansible>
>>>>>>
>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/cc7062d8-d213-443d-b354-3f59cb0c6059%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to