mirror of
https://github.com/hashicorp/vagrant.git
synced 2026-02-23 01:46:51 -05:00
Remove customized require behaviors and modify the bin executable to check for missing tools that Vagrant expects to exist when running outside of an installer.
60 lines
2.5 KiB
Ruby
60 lines
2.5 KiB
Ruby
# Copyright (c) HashiCorp, Inc.
|
|
# SPDX-License-Identifier: BUSL-1.1
|
|
|
|
require "vagrant/util/template_renderer"
|
|
require "base64"
|
|
|
|
module VagrantPlugins
|
|
module GuestWindows
|
|
module Cap
|
|
class MountSharedFolder
|
|
def self.mount_virtualbox_shared_folder(machine, name, guestpath, options)
|
|
mount_shared_folder(machine, name, guestpath, "\\\\vboxsvr\\")
|
|
end
|
|
|
|
def self.mount_vmware_shared_folder(machine, name, guestpath, options)
|
|
mount_shared_folder(machine, name, guestpath, "\\\\vmware-host\\Shared Folders\\")
|
|
end
|
|
|
|
def self.mount_parallels_shared_folder(machine, name, guestpath, options)
|
|
mount_shared_folder(machine, name, guestpath, "\\\\psf\\")
|
|
end
|
|
|
|
def self.mount_smb_shared_folder(machine, name, guestpath, options)
|
|
if !options[:smb_password].to_s.empty?
|
|
# Ensure password is scrubbed
|
|
Vagrant::Util::CredentialScrubber.sensitive(options[:smb_password])
|
|
end
|
|
machine.communicate.execute("cmdkey /add:#{options[:smb_host]} /user:#{options[:smb_username]} /pass:\"#{options[:smb_password]}\"", {shell: :powershell, elevated: true})
|
|
mount_shared_folder(machine, name, guestpath, "\\\\#{options[:smb_host]}\\")
|
|
end
|
|
|
|
protected
|
|
|
|
def self.mount_shared_folder(machine, name, guestpath, vm_provider_unc_base)
|
|
name = name.gsub(/[\/\/]/,'_').sub(/^_/, '')
|
|
|
|
path = File.expand_path("../../scripts/mount_volume.ps1", __FILE__)
|
|
script = Vagrant::Util::TemplateRenderer.render(path, options: {
|
|
mount_point: guestpath,
|
|
share_name: name,
|
|
vm_provider_unc_path: vm_provider_unc_base + name,
|
|
})
|
|
|
|
if machine.config.vm.communicator == :winrm || machine.config.vm.communicator == :winssh
|
|
machine.communicate.execute(script, shell: :powershell)
|
|
else
|
|
# Convert script to double byte unicode string then base64 encode
|
|
# just like PowerShell -EncodedCommand expects.
|
|
# Suppress the progress stream from leaking to stderr.
|
|
wrapped_encoded_command = Base64.strict_encode64(
|
|
"$ProgressPreference='SilentlyContinue'; #{script}; exit $LASTEXITCODE".encode('UTF-16LE', 'UTF-8'))
|
|
# Execute encoded PowerShell script via OpenSSH shell
|
|
machine.communicate.execute("powershell.exe -noprofile -executionpolicy bypass " +
|
|
"-encodedcommand '#{wrapped_encoded_command}'", shell: "sh")
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|