AngularJS interface and simple Node.js REST api for testing Powershell command execution; built on top of powershell-command-executor and stateful-process-command-proxy
JavaScript HTML
Latest commit cda537d Feb 23, 2015 @bitsofinfo Update README.md
Permalink
Failed to load latest commit information.
bin initial version Jan 26, 2015
public initial version Jan 26, 2015
routes Update index.js Jan 30, 2015
README.md Update README.md Feb 23, 2015
app.js initial version Jan 26, 2015
diagram1.png initial version Jan 26, 2015
diagram2.png update Feb 12, 2015
package.json Update package.json Jan 29, 2015

README.md

powershell-command-executor-ui

AngularJS interface and simple Node.js REST api for testing Powershell command execution; built on top of powershell-command-executor and stateful-process-command-proxy

Alt text

Alt text

Setup

  1. Clone this repo

  2. Clone https://github.com/bitsofinfo/powershell-command-executor somewhere on the same machine (this module is not available via npm yet...)

  3. npm install .

  4. Follow these instructions next. Specifically you need to setup your stored encrypted credentials.

  5. Open routes/index.js and edit the require paths (specifically the path to where powershell-command-executor was cloned) and special path variables at the top, as appropriate for your local setup (i.e. paths to the encrypted credentials, secret key and decrypt routines described in item 3 above)

  6. Run node bin\www

  7. In a browser go to http://localhost:3000

  8. You can tweak the commandRegistry provided by o365Utils.js as you wish to add additional command configurations, or modify routes/index.js to augment this structure manually as PSCommandService is constructed.

  9. DON'T expose this outside of localhost! Read the security section below.

Related Tools

Have a look at these related projects which support this module and are required to use it

Security

There is no security for this app! It should not be run as-is on a production host nor be accessible anywhere other than localhost without modification to secure it. Why? Read more here! https://github.com/bitsofinfo/stateful-process-command-proxy#security