Skip to content

Fix/vmware windows#488

Open
A3-N wants to merge 2 commits intoOrange-Cyberdefense:mainfrom
A3-N:fix/vmware-windows
Open

Fix/vmware windows#488
A3-N wants to merge 2 commits intoOrange-Cyberdefense:mainfrom
A3-N:fix/vmware-windows

Conversation

@A3-N
Copy link
Copy Markdown

@A3-N A3-N commented Mar 23, 2026

Fixes

WindowsCommand.is_in_path() signature mismatch

Base class accepts show_log param, but the Windows override didn't. Crashes on Windows when on_ludus() calls self.is_in_path('ludus', False).

WinRM SSL verification failure (VMware)

Windows VMs use self-signed certs. Added config.winrm.ssl_peer_verification = false to vmware and vmware_esxi Vagrantfiles.

Broken forwarded_port iteration (all providers)

# Before (silently does nothing):
box[:forwarded_port] do |forwarded_port|
# After:
box[:forwarded_port].each do |forwarded_port|

Port forwarding (e.g. provisioning VM SSH 22 -> 2210) was never configured. Fixed in vmware, vmware_esxi, and virtualbox Vagrantfiles.

VMware troubleshooting docs

Added section to troobleshoot.md for port conflicts and VMnet adapter setup on Windows.

TL;DR: it works for me, unsure if this is generic Windows vmware issues or just me. Had the same issue across 2 different builds on Windows vmware.

A3-N added 2 commits March 23, 2026 19:31
- Add show_log parameter to is_in_path() to fix method signature mismatch
- Disable WinRM SSL peer verification for VMware and VMware ESXi Vagrantfiles
- Add VMware troubleshooting documentation for port conflicts and network setup
…templates

box[:forwarded_port] do |fp| is not valid Ruby iteration — the block is silently ignored.
Changed to box[:forwarded_port].each do |fp| so port forwarding (e.g. provisioning VM SSH 22->2210) actually gets configured.
Affects vmware, vmware_esxi, and virtualbox providers.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant