use SafeExec to capture history keys in powershell command

This commit is contained in:
Matt Wrock 2015-12-27 13:06:45 -08:00
parent 984bc4ab77
commit 714e79d792
1 changed files with 2 additions and 2 deletions

View File

@ -1,7 +1,7 @@
require "pathname"
require "tmpdir"
require "vagrant/util/subprocess"
require "vagrant/util/safe_exec"
module VagrantPlugins
module HostWindows
@ -34,7 +34,7 @@ module VagrantPlugins
end
# Launch it
Vagrant::Util::Subprocess.execute("powershell", *args)
Vagrant::Util::SafeExec.exec("powershell", *args)
end
end
end