Can the windows shell provisioner access the WinRMPassword variable like in
the below example?
{
"type": "windows-shell",
"environment_vars": ["WINRMPASS={{.WinRMPassword}}"],
"inline": [
"reg add \"HKLM\\Software\\Microsoft\\Windows
NT\\CurrentVersion\\Winlogon\" /v AutoAdminLogon /t REG_SZ /d 1",
"reg add \"HKLM\\Software\\Microsoft\\Windows
NT\\CurrentVersion\\Winlogon\" /v DefaultUserName /t REG_SZ /d packer",
"reg add \"HKLM\\Software\\Microsoft\\Windows
NT\\CurrentVersion\\Winlogon\" /v DefaultPassword /t REG_SZ /d %WINRMPASS%"
]
}
Each time i've tried i've only gotten this.
C:\Users\packer>reg add "HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d *<no value>*
--
This mailing list is governed under the HashiCorp Community Guidelines -
https://www.hashicorp.com/community-guidelines.html. Behavior in violation of
those guidelines may result in your removal from this mailing list.
GitHub Issues: https://github.com/mitchellh/packer/issues
IRC: #packer-tool on Freenode
---
You received this message because you are subscribed to the Google Groups
"Packer" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/packer-tool/8b670dd7-a849-4fe6-be02-7d81abed8c35%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.