Sha256: 902203e0510d5804e31270ef63cfafe04a29a1d9ecd899df62d323316ff34e48

Contents?: true

Size: 1.9 KB

Versions: 31

Compression:

Stored size: 1.9 KB

Contents

Param(
    [string]$hostname,
    [string]$port,
    [string]$username,
    [string]$password
)
# If we are in this script, we know basic winrm is working
# If the user is not using a domain account and chances are
# they are not, PS Remoting will not work if the guest is not
# listed in the trusted hosts.

$encrypted_password = ConvertTo-SecureString $password -asplaintext -force
$creds = New-Object System.Management.Automation.PSCredential (
    "$hostname\\$username", $encrypted_password)

$result = @{
    Success = $false
    PreviousTrustedHosts = $null
}
try {
    invoke-command -computername $hostname `
                   -Credential $creds `
                   -Port $port `
                   -ScriptBlock {} `
                   -ErrorAction Stop
    $result.Success = $true
} catch{}

if(!$result.Success) { 
    $newHosts = @()
    $result.PreviousTrustedHosts=(
        Get-Item "wsman:\localhost\client\trustedhosts").Value
    $hostArray=$result.PreviousTrustedHosts.Split(",").Trim()
    if($hostArray -contains "*") {
        $result.PreviousTrustedHosts = $null
    }
    elseif(!($hostArray -contains $hostname)) {
        $strNewHosts = $hostname
        if($result.PreviousTrustedHosts.Length -gt 0){
            $strNewHosts = $result.PreviousTrustedHosts + "," + $strNewHosts
        }
        Set-Item -Path "wsman:\localhost\client\trustedhosts" `
          -Value $strNewHosts -Force

        try {
            invoke-command -computername $hostname `
                           -Credential $creds `
                           -Port $port `
                           -ScriptBlock {} `
                           -ErrorAction Stop
            $result.Success = $true
        } catch{
            Set-Item -Path "wsman:\localhost\client\trustedhosts" `
              -Value $result.PreviousTrustedHosts -Force
            $result.PreviousTrustedHosts = $null
        }
    }
}

Write-Output $(ConvertTo-Json $result)

Version data entries

31 entries across 27 versions & 4 rubygems

Version Path
vagrant-unbundled-2.3.6.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
tamtam-vagrant-reload-1.2.1 vendor/cache/vagrant-2092df529ae7/plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.3.3.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.3.2.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.19.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.18.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.16.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.14.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-aws-mkubenka-0.7.2.pre.24 vendor/bundle/ruby/2.7.0/bundler/gems/vagrant-22795b161bf6/plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.10.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.9.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.8.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.7.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.6.2 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.6.1 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.6.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.5.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.4.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.3.0 plugins/commands/powershell/scripts/enable_psremoting.ps1
vagrant-unbundled-2.2.2.0 plugins/commands/powershell/scripts/enable_psremoting.ps1