Hi All I've been working on an Ansible module that allows you to run a command on a Windows host remotely without the need for WinRM and in the end I've created a module called psexec to do this. If any Windows admins (or others who wish to try it out) are interested you can find the PR here https://github.com/ansible/ansible/pull/36723 and try it out. Some of the things you can do with this module are;
* Run an adhoc command on a remote Windows host without WinRM being setup and enabled * Use it to do bootstrapping tasks that would be otherwise hard to run in some environments, e.g. setting up the WinRM listeners or upgrading PowerShell to the 3.0 requirement * Runs on Python/linux so no requirement for another Windows host like win_psexec and is easily runnable on the Ansible controller * Fine control over the process and how it is executed, e.g. become like options to run as a different user or the System account It is no substitution for the winrm connection plugin as it does not use a proper protocol but rather takes advantage of some internal Windows mechanisms to run a process. Some more links if you are interested in trying it out or just want to know more are https://github.com/jborean93/pypsexec and https://www.bloggingforlogging.com/2018/03/12/introducing-psexec-for-python/. Any feedback is most welcome. Thanks Jordan -- You received this message because you are subscribed to the Google Groups "Ansible Project" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/ansible-project/6521cb99-6065-4148-a60d-2fd37fea1bc3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
