<powershell>
# Set administrator password
net user Administrator SOMETHINGGOOD
wmic useraccount where "name='Administrator'" set PasswordExpires=FALSE

# First, make sure WinRM can't be connected to
netsh advfirewall firewall set rule name="Windows Remote Management 
(HTTP-In)" new enable=yes action=block

# Delete any existing WinRM listeners
winrm delete winrm/config/listener?Address=*+Transport=HTTP  2>$Null
winrm delete winrm/config/listener?Address=*+Transport=HTTPS 2>$Null

# Create a new WinRM listener and configure
winrm create winrm/config/listener?Address=*+Transport=HTTP
winrm set winrm/config/winrs '@{MaxMemoryPerShellMB="0"}'
winrm set winrm/config '@{MaxTimeoutms="7200000"}'
winrm set winrm/config/service '@{AllowUnencrypted="true"}'
winrm set winrm/config/service '@{MaxConcurrentOperationsPerUser="12000"}'
winrm set winrm/config/service/auth '@{Basic="true"}'
winrm set winrm/config/service/auth '@{Certificate="true"}'
winrm set winrm/config/client/auth '@{Basic="true"}'
winrm set winrm/config/client/auth '@{Certificate="true"}'

# Configure UAC to allow privilege elevation in remote shells
$Key = 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System'
$Setting = 'LocalAccountTokenFilterPolicy'
Set-ItemProperty -Path $Key -Name $Setting -Value 1 -Force

# Configure and restart the WinRM Service; Enable the required firewall 
exception
Stop-Service -Name WinRM
Set-Service -Name WinRM -StartupType Automatic
netsh advfirewall firewall set rule name="Windows Remote Management 
(HTTP-In)" new action=allow localip=any remoteip=any
Start-Service -Name WinRM
</powershell>

Here is my user_data.txt file from the line  
"user_data_file": "scripts/user_data.txt.  

As you can see, I want to be able to use a predetermined password.  


==> amazon-ebs: Force Deregister flag found, skipping prevalidating AMI Name
171
amazon-ebs: Found Image ID: ami-0eb7fbcc77e5e6ec6
172
==> amazon-ebs: Creating temporary keypair: 
packer_5f720690-c3aa-4a5b-103b-b244e5cfaf67
173
==> amazon-ebs: Creating temporary security group for this instance: 
packer_5f720692-6518-386c-fcfb-64088f3bdde8
174
==> amazon-ebs: Authorizing access to port 5986 from [0.0.0.0/0] in the 
temporary security groups...
175
==> amazon-ebs: Launching a source AWS instance...
176
==> amazon-ebs: Adding tags to source instance
177
amazon-ebs: Adding tag: "Name": "Packer Builder"
178
amazon-ebs: Instance ID: i-076f324e8ca7a0f28
179
==> amazon-ebs: Waiting for instance (i-076f324e8ca7a0f28) to become 
ready...
180
==> amazon-ebs: Waiting for auto-generated password for instance...
181
amazon-ebs: It is normal for this process to take up to 15 minutes,
182
amazon-ebs: but it usually takes around 5. Please wait.
183
==> amazon-ebs: Error waiting for password: retry count exhausted. Last 
err: Error retrieving auto-generated instance password: 
UnauthorizedOperation: You are not authorized to perform this operation. 
Encoded authorization failure message:  




On Monday, September 28, 2020 at 11:57:24 AM UTC-4 i255d wrote:
{
  "variables": {
    "region": "{{env `region`}}",
    "environment": "{{env `env`}}",
    "lob": "{{env `lob`}}",
    "vpc_id": "{{env `vpc_id`}}",
    "subnet_id": "{{env `subnet_id`}}",
    "account": "{{env `account`}}",
    "role": "{{env `iam_instance_profile`}}",
    "kms_key": "{{env `kms_key_id`}}"
  },
  "builders": [
    {
      "type": "amazon-ebs",
      "region": "{{user `region`}}",
      "vpc_id": "{{user `vpc_id`}}",
      "subnet_id": "{{user `subnet_id`}}",
      "instance_type": "t2.medium",
      "source_ami_filter": {
        "filters": {
          "virtualization-type": "hvm",
          "name": "Windows_Server-2019-English-Full-Base-*",
          "root-device-type": "ebs"
        },
        "most_recent": true,
        "owners": "amazon"
      },
      "ami_name": "test-ansible-packer",
      "user_data_file": "scripts/user_data.txt",
      "communicator": "winrm",
      "force_deregister": true,
      "winrm_insecure": true,
      "winrm_username": "Administrator",
      "winrm_use_ssl": true,
      "iam_instance_profile": "{{user `role`}}",
      "skip_profile_validation" : true
    }
  ],
  "provisioners": [
    {
      "type": "ansible",
      "playbook_file": "./playbook.yml",
      "user": "Administrator",
      "use_proxy": false,
      "extra_arguments": ["-e", "ansible_winrm_server_cert_validation=ignore"]
    }
  ]
}
Here is my win2019.json file.


On Monday, September 28, 2020 at 11:57:24 AM UTC-4 i255d wrote:

> {
>   "variables": {
>     "region": "{{env `region`}}",
>     "environment": "{{env `env`}}",
>     "lob": "{{env `lob`}}",
>     "vpc_id": "{{env `vpc_id`}}",
>     "subnet_id": "{{env `subnet_id`}}",
>     "account": "{{env `account`}}",
>     "role": "{{env `iam_instance_profile`}}",
>     "kms_key": "{{env `kms_key_id`}}"
>   },
>   "builders": [
>     {
>       "type": "amazon-ebs",
>       "region": "{{user `region`}}",
>       "vpc_id": "{{user `vpc_id`}}",
>       "subnet_id": "{{user `subnet_id`}}",
>       "instance_type": "t2.medium",
>       "source_ami_filter": {
>         "filters": {
>           "virtualization-type": "hvm",
>           "name": "Windows_Server-2019-English-Full-Base-*",
>           "root-device-type": "ebs"
>         },
>         "most_recent": true,
>         "owners": "amazon"
>       },
>       "ami_name": "test-ansible-packer",
>       "user_data_file": "scripts/user_data.txt",
>       "communicator": "winrm",
>       "force_deregister": true,
>       "winrm_insecure": true,
>       "winrm_username": "Administrator",
>       "winrm_use_ssl": true,
>       "iam_instance_profile": "{{user `role`}}",
>       "skip_profile_validation" : true
>     }
>   ],
>   "provisioners": [
>     {
>       "type": "ansible",
>       "playbook_file": "./playbook.yml",
>       "user": "Administrator",
>       "use_proxy": false,
>
>       "extra_arguments": ["-e", "ansible_winrm_server_cert_validation=ignore"]
>     }
>   ]
> }
> Here is my win2019.json file.
>
>

-- 
This mailing list is governed under the HashiCorp Community Guidelines - 
https://www.hashicorp.com/community-guidelines.html. Behavior in violation of 
those guidelines may result in your removal from this mailing list.

GitHub Issues: https://github.com/hashicorp/packer/issues
IRC: #packer-tool on Freenode
--- 
You received this message because you are subscribed to the Google Groups 
"Packer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/packer-tool/7675fe9a-a1a0-46fa-9ae4-22125bfb5df3n%40googlegroups.com.

Reply via email to