vagrant/plugins/guests/windows/cap/mount_shared_folder.rb

58 lines
2.5 KiB
Ruby
Raw Normal View History

require "vagrant/util/template_renderer"
require "base64"
module VagrantPlugins
module GuestWindows
module Cap
class MountSharedFolder
def self.mount_virtualbox_shared_folder(machine, name, guestpath, options)
2016-12-08 21:23:17 +00:00
mount_shared_folder(machine, name, guestpath, "\\\\vboxsvr\\")
end
def self.mount_vmware_shared_folder(machine, name, guestpath, options)
mount_shared_folder(machine, name, guestpath, "\\\\vmware-host\\Shared Folders\\")
end
def self.mount_parallels_shared_folder(machine, name, guestpath, options)
mount_shared_folder(machine, name, guestpath, "\\\\psf\\")
end
def self.mount_smb_shared_folder(machine, name, guestpath, options)
if !options[:smb_password].to_s.empty?
# Ensure password is scrubbed
Vagrant::Util::CredentialScrubber.sensitive(options[:smb_password])
end
machine.communicate.execute("cmdkey /add:#{options[:smb_host]} /user:#{options[:smb_username]} /pass:\"#{options[:smb_password]}\"", {shell: :powershell, elevated: true})
mount_shared_folder(machine, name, guestpath, "\\\\#{options[:smb_host]}\\")
end
protected
def self.mount_shared_folder(machine, name, guestpath, vm_provider_unc_base)
name = name.gsub(/[\/\/]/,'_').sub(/^_/, '')
2014-03-14 18:05:00 +00:00
path = File.expand_path("../../scripts/mount_volume.ps1", __FILE__)
script = Vagrant::Util::TemplateRenderer.render(path, options: {
mount_point: guestpath,
share_name: name,
vm_provider_unc_path: vm_provider_unc_base + name,
})
if machine.config.vm.communicator == :winrm || machine.config.vm.communicator == :winssh
machine.communicate.execute(script, shell: :powershell)
else
# Convert script to double byte unicode string then base64 encode
# just like PowerShell -EncodedCommand expects.
# Suppress the progress stream from leaking to stderr.
wrapped_encoded_command = Base64.strict_encode64(
"$ProgressPreference='SilentlyContinue'; #{script}; exit $LASTEXITCODE".encode('UTF-16LE', 'UTF-8'))
# Execute encoded PowerShell script via OpenSSH shell
machine.communicate.execute("powershell.exe -noprofile -executionpolicy bypass " +
"-encodedcommand '#{wrapped_encoded_command}'", shell: "sh")
end
end
end
end
end
end