Hi All

I've been working on an Ansible module that allows you to run a command on 
a Windows host remotely without the need for WinRM and in the end I've 
created a module called psexec to do this. If any Windows admins (or others 
who wish to try it out) are interested you can find the PR here 
https://github.com/ansible/ansible/pull/36723 and try it out. Some of the 
things you can do with this module are;

* Run an adhoc command on a remote Windows host without WinRM being setup 
and enabled
* Use it to do bootstrapping tasks that would be otherwise hard to run in 
some environments, e.g. setting up the WinRM listeners or upgrading 
PowerShell to the 3.0 requirement
* Runs on Python/linux so no requirement for another Windows host like 
win_psexec and is easily runnable on the Ansible controller
* Fine control over the process and how it is executed, e.g. become like 
options to run as a different user or the System account

It is no substitution for the winrm connection plugin as it does not use a 
proper protocol but rather takes advantage of some internal Windows 
mechanisms to run a process.

Some more links if you are interested in trying it out or just want to know 
more are https://github.com/jborean93/pypsexec and 
https://www.bloggingforlogging.com/2018/03/12/introducing-psexec-for-python/.

Any feedback is most welcome.

Thanks

Jordan

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/6521cb99-6065-4148-a60d-2fd37fea1bc3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to