ISSUE #423: Support using EC2-generated password as the WinRM password#433
ISSUE #423: Support using EC2-generated password as the WinRM password#433rafd123 wants to merge 1 commit intomitchellh:masterfrom
Conversation
280f5fa to
9097855
Compare
|
@rafd123 I have no means of verifying that this works; are there any tests you could write or incorporate for this? |
|
The easiest way to verify that this works is to specify a Windows AMI and enable WinRM via UserData. You then use the Vagrant WinRM communicator as advertised...the exception being that you specify To create a test for this means creating an integration test that actually spins up an instance. I didn't see any of these in the code base. If you could point me to an integration test suite that the core team uses to validate vagrant-aws, I'd be more than happy to write a test. Alternatively, I can create an example box that can be used for smoke testing. LMK |
…M password Adds a winrm_info provider capability to support using the EC2 GetPasswordData API as a means of getting the WinRM password. If the winrm.password is set to :aws, go fetch the AWS password data for the machine, decrypt the user-specified private key, and set it as the winrm.password
|
FWIW I've updated the README in the PR to include a more complete example on how to get this to work. Here's the Vagrantfile I used to test this: After everything is said and done, no only will Vagrant use the EC2-generated administrator password to verify the machine is up using winrm, you can issue a |
Adds a winrm_info provider capability to support using the EC2 GetPasswordData API as a means of getting the WinRM password.
If the winrm.password is set to :aws, go fetch the AWS password data for the machine, decrypt the user-specified private key, and set it as the winrm.password