Windows 10 and 11 with firefox and chrome, remote Spanish eDNI, card readers and Spanish signer to to be able to carry out procedures with the Spanish electronic DNI from your linux or Windows box.
If you need to use the e-DNI from linux or windows, you can use this vagrant image.
The following software is installed on these images:
- Install virtualbox guest additions
- Enable RDP
- Enable WinRM
- Enable powershell RemoteSigned
- Enable auto login for vagrant user
- Enable that the network which connects will be identified as private to enable access via powershell
- Enable QuickEdit mode in the console
- Enable Run command in the start menu
- Show hidden files in the file explorer
- Show extensions of the files in the file explorer
- Show administrative tools in the start menu
- Disable hibernation mode
- Disable password expiration for vagrant user
- Disable network configuration wizard
- Disable screen saver
- Updates. The images with the
-wu
suffix install the windows updates available at the time of construction.
To create these images locally
- Install VirtualBox. Current image has been created with Virtualbox 7.0 on ubuntu
- Install Packer. Current image has been created with packer 1.8.3 on ubuntu
- Check that both binaries are accessible in your
PATH
. - Install dependencies by running
packer init windows.pkr.hcl
.
You can use the images generated in Vagrant Cloud with the following command:
vagrant init pserranoa/eDNI-windows-10_64
vagrant init pserranoa/eDNI-windows-11_64
Customize the Vagrantfile
file to suit your needs. Remember that to use the Remote eDNI it is necessary that the network is in Bridge mode.
The configuration for the correct use of the remote mode of the DNI, both the mobile device and the PC, must be on the same network. For this it is necessary to configure the network in Bridge mode, and that it can be connected to the same network as the mobile device.
config.vm.network "public_network"
# -*- mode: ruby -*-
# vi: set ft=ruby :
Vagrant.configure "2" do |config|
config.vm.box = "pserranoa/eDNI-windows-10_64"
config.vm.guest = :windows
config.winrm.username = "vagrant"
config.winrm.password = "vagrant"
config.vm.network "public_network"
config.vm.network :forwarded_port, guest: 3389, host: 3389, id: "rdp", auto_correct: true
config.vm.network :forwarded_port, guest: 5985, host: 5985, id: "winrm", auto_correct: true
config.vm.provider "virtualbox" do |vb|
vb.gui = true
vb.memory = "4096"
vb.cpus = "2"
end
end
Two files are necessary for the construction of the image:
- The template file that describes the target image.
- The variables that define current construction
Both images are built based on a single template (windows.pkr.hcl
) and its set of variables.
- windows-10_64
- windows-10-wu_64 (with windows updates)
- windows-11_64
- windows-11-wu_64 (with windows updates)
./packer.sh build -var-file templates/<template_name>/vars.pkrvars.hcl windows.pkr.hcl
Basic commands for creating a 64-bit windows 10/11 image with the software needed to use the eDNI from Linux.
# windows 10
./packer.sh build -var-file templates/windows-10_64/vars.pkrvars.hcl windows.pkr.hcl
# windows 11
./packer.sh build -var-file templates/windows-11_64/vars.pkrvars.hcl windows.pkr.hcl
.\packer.ps1 build -var-file .\templates\<template_name>\vars.pkrvars.hcl .\windows.pkr.hcl
Basic commands for creating a 64-bit windows 10/11 image with the software needed to use the eDNI from Windows.
# windows 10
./packer.ps1 build -var-file .\templates\windows-10_64\vars.pkrvars.hcl .\windows.pkr.hcl
# windows 11
./packer.ps1 build -var-file .\templates\windows-11_64\vars.pkrvars.hcl .\windows.pkr.hcl
Ver | Arch | URL | md5sum |
---|---|---|---|
10 | x64 | https://software-static.download.prss.microsoft.com/dbazure/988969d5-f34g-4e03-ac9d-1f9786c66750/19045.2006.220908-0225.22h2_release_svc_refresh_CLIENTENTERPRISEEVAL_OEMRET_x64FRE_es-es.iso | 04e5cd52bce1d59e94b9db0415d4fc8a |
11 | x64 | https://software-static.download.prss.microsoft.com/dbazure/988969d5-f34g-4e03-ac9d-1f9786c66751/22621.525.220925-0207.ni_release_svc_refresh_CLIENTENTERPRISEEVAL_OEMRET_x64FRE_es-es.iso | b64842e951f64a5b67b4845989dd3ab6 |
Once we generate the image within the executions under the builds folder, we can add it to vagrant for use. If when building it, you have used the default configuration, you will have built it with record = "on"
, so you will have the recording of the construction of the image available.
To add the image to vagrant, you must execute the following command, in the case of having built the windows-10_64 image locally, and having used the default configuration, access the builds/windows-10_64 folder and execute the following commands: (remember to parameterize your Vagrantfile file, to suit your needs. You have an example in the section Vagrantfile example)
vagrant box add pserranoa/eDNI-windows-10_64 eDNI-windows-10_64_0.0.1.box
vagrant init pserranoa/eDNI-windows-10_64
vagrant up
vagrant box add pserranoa/eDNI-windows-11_64 eDNI-windows-11_64_0.0.1.box
vagrant init pserranoa/eDNI-windows-11_64
vagrant up
Imagen | Version | Size | sha512sum | Date |
---|---|---|---|---|
pserranoa/eDNI-windows-10_64 | 0.0.2 | 6.3 GB | f22d2beae8cc2fc458d7f935156b27aeebf74dae0c61abe9b551cc29b4274195c1b39903626b6189e72d10d23d34ba69f33c4b62def9e622fa258603363714dc | 02/10/2023 |
pserranoa/eDNI-windows-11_64 | 0.0.2 | 6.5 GB | a3a6687fcd81bca365cc4e97c1f56854db9606fc6ca94f5c81de60df7e8e5135ee7791bf77cf9c1dd22b5d47f752da979e992aa6013460cce1e1dc9a2fe17e49 | 02/10/2023 |
pserranoa/eDNI-windows-10-wu_64 | 0.0.2 | 12 GB | bf1d64dab7a1f678a3288ea959b1efc8d6e908ac445e40ddb941a87a8b8634d2aee9596be61db579e0b84f09da1604b83f807e4a5e37b30fe788c1def36f1e88 | 02/10/2023 |
pserranoa/eDNI-windows-11-wu_64 | 0.0.2 | 12 GB | 0a3c97e3b565c35f4a629a4d0c30b720906056f49b4d41801cd1488ea4edc2ee15f512b1eee9c386bde42dc6d7f2f86851ee08257d758a86c650c10106c50b97 | 02/10/2023 |
This repository is based on LukeCarrier