Can the windows shell provisioner access the WinRMPassword variable like in 
the below example?

        {
            "type": "windows-shell",
            "environment_vars": ["WINRMPASS={{.WinRMPassword}}"],
            "inline": [
                "reg add \"HKLM\\Software\\Microsoft\\Windows 
NT\\CurrentVersion\\Winlogon\" /v AutoAdminLogon /t REG_SZ /d 1",
                "reg add \"HKLM\\Software\\Microsoft\\Windows 
NT\\CurrentVersion\\Winlogon\" /v DefaultUserName /t REG_SZ /d packer",
                "reg add \"HKLM\\Software\\Microsoft\\Windows 
NT\\CurrentVersion\\Winlogon\" /v DefaultPassword /t REG_SZ /d %WINRMPASS%"
            ]
        }

Each time i've tried i've only gotten this.

C:\Users\packer>reg add "HKLM\Software\Microsoft\Windows 
NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d *<no value>*

-- 
This mailing list is governed under the HashiCorp Community Guidelines - 
https://www.hashicorp.com/community-guidelines.html. Behavior in violation of 
those guidelines may result in your removal from this mailing list.

GitHub Issues: https://github.com/mitchellh/packer/issues
IRC: #packer-tool on Freenode
--- 
You received this message because you are subscribed to the Google Groups 
"Packer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/packer-tool/8b670dd7-a849-4fe6-be02-7d81abed8c35%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to