2014-02-02 20:38:24 +00:00
|
|
|
module VagrantPlugins
|
|
|
|
module GuestNetBSD
|
|
|
|
module Cap
|
|
|
|
class ShellExpandGuestPath
|
|
|
|
def self.shell_expand_guest_path(machine, path)
|
|
|
|
real_path = nil
|
2017-08-25 16:54:26 +00:00
|
|
|
path = path.gsub(/ /, '\ ')
|
|
|
|
machine.communicate.execute("printf #{path}") do |type, data|
|
2014-02-02 20:38:24 +00:00
|
|
|
if type == :stdout
|
|
|
|
real_path ||= ""
|
|
|
|
real_path += data
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
if !real_path
|
|
|
|
# If no real guest path was detected, this is really strange
|
|
|
|
# and we raise an exception because this is a bug.
|
2017-08-15 16:33:29 +00:00
|
|
|
raise Vagrant::Errors::ShellExpandFailed
|
2014-02-02 20:38:24 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Chomp the string so that any trailing newlines are killed
|
|
|
|
return real_path.chomp
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|