summaryrefslogtreecommitdiff
path: root/community_modules/winremote/winremote_exec.sh
diff options
context:
space:
mode:
authorluisgulo <luisgulo@gmail.com>2025-10-24 18:01:10 +0200
committerluisgulo <luisgulo@gmail.com>2025-10-24 18:01:10 +0200
commit533e79ba959143f0459431a486bfb85c56c72ddc (patch)
tree91974de1bbbdc4c51c76ed591fc5c6e02a3342b6 /community_modules/winremote/winremote_exec.sh
parent45019c81cfd0fc1d18dce18cdfd5f127c6d61073 (diff)
Releasing code version 1.8.0
Diffstat (limited to 'community_modules/winremote/winremote_exec.sh')
-rw-r--r--community_modules/winremote/winremote_exec.sh60
1 files changed, 60 insertions, 0 deletions
diff --git a/community_modules/winremote/winremote_exec.sh b/community_modules/winremote/winremote_exec.sh
new file mode 100644
index 0000000..79bf413
--- /dev/null
+++ b/community_modules/winremote/winremote_exec.sh
@@ -0,0 +1,60 @@
+#!/bin/bash
+# Module: winremote_exec
+# Description: Ejecuta comandos PowerShell en un host Windows remoto vía SSH
+# License: GPLv3
+# Author: Luis GuLo
+# Version: 1.2.0
+# Dependencies: sshpass, ssh
+
+winremote_exec_task() {
+ local host="$1"; shift
+ declare -A args
+ for arg in "$@"; do key="${arg%%=*}"; value="${arg#*=}"; args["$key"]="$value"; done
+
+ local winuser="${args[winuser]}"
+ local winpassword="${args[winpassword]}"
+ local port="${args[port]:-22}"
+ local command="${args[command]}"
+
+ # 🌐 Cargar traducciones
+ local lang="${shflow_vars[language]:-es}"
+ local trfile="$(dirname "${BASH_SOURCE[0]}")/winremote_exec.tr.${lang}"
+ declare -A tr
+ if [[ -f "$trfile" ]]; then while IFS='=' read -r k v; do tr["$k"]="$v"; done < "$trfile"; fi
+
+ if [[ -z "$host" || -z "$winuser" || -z "$winpassword" || -z "$command" ]]; then
+ echo "${tr[missing_args]:-❌ [winremote_exec] Parámetros incompletos. Se requiere host, winuser, winpassword y command.}"
+ return 1
+ fi
+
+ [[ "$host" == *@* ]] && host=$(echo "$host" | awk -F '@' '{print $2}')
+ local safe_command=$(printf "%q" "$command")
+
+ echo "$(render_msg "${tr[start]}" "host=$host" "port=$port" "user=$winuser")"
+
+ sshpass -p "$winpassword" ssh -o PreferredAuthentications=password -o StrictHostKeyChecking=no -p "$port" "$winuser@$host" \
+ "powershell -Command \"$safe_command\""
+
+ local exit_code=$?
+ if [[ $exit_code -eq 0 ]]; then
+ echo "${tr[success]:-✅ [winremote_exec] Comando ejecutado correctamente.}"
+ return 0
+ else
+ echo "$(render_msg "${tr[fail]}" "code=$exit_code")"
+ return $exit_code
+ fi
+}
+
+check_dependencies_winremote_exec() {
+ local lang="${shflow_vars[language]:-es}"
+ local trfile="$(dirname "${BASH_SOURCE[0]}")/winremote_exec.tr.${lang}"
+ declare -A tr
+ if [[ -f "$trfile" ]]; then while IFS='=' read -r k v; do tr["$k"]="$v"; done < "$trfile"; fi
+
+ if ! command -v sshpass &> /dev/null || ! command -v ssh &> /dev/null; then
+ echo "${tr[missing_deps]:-❌ [winremote_exec] sshpass o ssh no están disponibles.}"
+ return 1
+ fi
+ echo "${tr[deps_ok]:-✅ [winremote_exec] sshpass y ssh disponibles.}"
+ return 0
+}