This is an automated email from the ASF dual-hosted git repository.

jensdeppe pushed a commit to branch develop
in repository https://gitbox.apache.org/repos/asf/geode.git


The following commit(s) were added to refs/heads/develop by this push:
     new 30dfc93  GEODE-5709: Add firewall rule to allow docker container 
network access to Windows heavy lifters
30dfc93 is described below

commit 30dfc9390e41b7ad5c88688e8a74ab57fea1e856
Author: Jens Deppe <jde...@pivotal.io>
AuthorDate: Mon Sep 17 13:32:06 2018 -0700

    GEODE-5709: Add firewall rule to allow docker container network access to 
Windows heavy lifters
---
 ci/images/google-windows-geode-builder/windows-packer.json | 11 +++++++++--
 1 file changed, 9 insertions(+), 2 deletions(-)

diff --git a/ci/images/google-windows-geode-builder/windows-packer.json 
b/ci/images/google-windows-geode-builder/windows-packer.json
index 5cfce73..0880912 100644
--- a/ci/images/google-windows-geode-builder/windows-packer.json
+++ b/ci/images/google-windows-geode-builder/windows-packer.json
@@ -37,8 +37,15 @@
         "refreshenv",
 
         "winrm set winrm/config/service '@{AllowUnencrypted=\"true\"}'",
-        "New-NetfirewallRule -displayname sshd -direction inbound -action 
allow -protocol tcp -localport 22",        "New-Service -name sshd -description 
'OpenSSH sshd server' -binarypathname 'c:\\Program 
Files\\OpenSSH-Win64\\sshd.exe' -startuptype automatic",                        
        "$OldPath = (Get-ItemProperty -Path 
'Registry::HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session 
Manager\\Environment' -Name PATH).Path",        "$NewPath = $OldPath + ';' + 
'c:\\Progra [...]
-        "Install-Module -Name ProcessMitigations -Force",        
"Get-ChildItem -Path \"C:\\Program Files\\Git\\bin\" -Recurse -Include *exe | 
%{ Set-ProcessMitigation -Name $_.Name -Disable ForceRelocateASLR,ForceRelocate 
}",        "Get-ChildItem -Path \"C:\\ProgramData\\chocolatey\" -Recurse 
-Include *exe | %{ Set-ProcessMitigation -Name $_.Name -Disable 
ForceRelocateASLR,ForceRelocate }",
+        "New-NetFirewallRule -DisplayName sshd -Direction inbound -Action 
allow -Protocol tcp -LocalPort 22",
+        "New-NetFirewallRule -DisplayName \"Docker containers\" -LocalAddress 
172.0.0.0/8 -Action allow -Direction inbound",
+        "New-Service -name sshd -description 'OpenSSH sshd server' 
-binarypathname 'c:\\Program Files\\OpenSSH-Win64\\sshd.exe' -startuptype 
automatic",
+        "$OldPath = (Get-ItemProperty -Path 
'Registry::HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session 
Manager\\Environment' -Name PATH).Path",
+        "$NewPath = $OldPath + ';' + 'c:\\Program Files\\Git\\bin'",
+        "Set-ItemProperty -Path 
'Registry::HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session 
Manager\\Environment' -Name PATH -Value $NewPath",
+        "Install-Module -Name ProcessMitigations -Force",
+        "Get-ChildItem -Path \"C:\\Program Files\\Git\\bin\" -Recurse -Include 
*exe | %{ Set-ProcessMitigation -Name $_.Name -Disable 
ForceRelocateASLR,ForceRelocate }",
+        "Get-ChildItem -Path \"C:\\ProgramData\\chocolatey\" -Recurse -Include 
*exe | %{ Set-ProcessMitigation -Name $_.Name -Disable 
ForceRelocateASLR,ForceRelocate }",
 
         "write-output 'Adding openjdk docker image'",
         "docker pull openjdk:8u181-jdk-windowsservercore-1709",

Reply via email to