2013-07-16 00:08:19 -04:00
|
|
|
package common
|
|
|
|
|
|
|
|
import (
|
2017-10-27 09:32:23 -04:00
|
|
|
"crypto/tls"
|
2013-07-29 19:42:35 -04:00
|
|
|
"fmt"
|
2017-06-09 14:24:30 -04:00
|
|
|
"log"
|
2017-10-27 09:32:23 -04:00
|
|
|
"net/http"
|
2018-02-02 23:16:23 -05:00
|
|
|
"strings"
|
2015-05-27 14:35:56 -04:00
|
|
|
|
2015-06-03 17:13:52 -04:00
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
2018-01-04 18:04:07 -05:00
|
|
|
"github.com/aws/aws-sdk-go/aws/awserr"
|
2015-06-03 17:13:52 -04:00
|
|
|
"github.com/aws/aws-sdk-go/aws/credentials"
|
2016-02-19 20:10:05 -05:00
|
|
|
"github.com/aws/aws-sdk-go/aws/session"
|
2018-10-23 12:58:27 -04:00
|
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
2018-10-24 05:26:53 -04:00
|
|
|
"github.com/aws/aws-sdk-go/service/ec2/ec2iface"
|
2019-01-25 06:59:43 -05:00
|
|
|
cleanhttp "github.com/hashicorp/go-cleanhttp"
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/template/interpolate"
|
2019-02-04 18:54:14 -05:00
|
|
|
vaultapi "github.com/hashicorp/vault/api"
|
2013-07-16 00:08:19 -04:00
|
|
|
)
|
|
|
|
|
2019-02-04 18:29:45 -05:00
|
|
|
type VaultAWSEngineOptions struct {
|
2019-02-04 18:54:14 -05:00
|
|
|
Name string `mapstructure:"name"`
|
|
|
|
RoleARN string `mapstructure:"role_arn"`
|
|
|
|
TTL string `mapstructure:"ttl"`
|
|
|
|
EngineName string `mapstructure:"engine_name"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *VaultAWSEngineOptions) Empty() bool {
|
|
|
|
return len(v.Name) == 0 && len(v.RoleARN) == 0 &&
|
|
|
|
len(v.EngineName) == 0 && len(v.TTL) == 0
|
2019-02-04 18:29:45 -05:00
|
|
|
}
|
|
|
|
|
2013-07-16 00:08:19 -04:00
|
|
|
// AccessConfig is for common configuration related to AWS access
|
|
|
|
type AccessConfig struct {
|
2017-10-27 09:32:23 -04:00
|
|
|
AccessKey string `mapstructure:"access_key"`
|
|
|
|
CustomEndpointEc2 string `mapstructure:"custom_endpoint_ec2"`
|
|
|
|
DecodeAuthZMessages bool `mapstructure:"decode_authorization_messages"`
|
|
|
|
InsecureSkipTLSVerify bool `mapstructure:"insecure_skip_tls_verify"`
|
|
|
|
MFACode string `mapstructure:"mfa_code"`
|
|
|
|
ProfileName string `mapstructure:"profile"`
|
|
|
|
RawRegion string `mapstructure:"region"`
|
|
|
|
SecretKey string `mapstructure:"secret_key"`
|
|
|
|
SkipValidation bool `mapstructure:"skip_region_validation"`
|
|
|
|
SkipMetadataApiCheck bool `mapstructure:"skip_metadata_api_check"`
|
|
|
|
Token string `mapstructure:"token"`
|
|
|
|
session *session.Session
|
2019-02-04 18:29:45 -05:00
|
|
|
VaultAWSEngine VaultAWSEngineOptions `mapstructure:"vault_aws_engine"`
|
2018-10-24 05:26:53 -04:00
|
|
|
|
|
|
|
getEC2Connection func() ec2iface.EC2API
|
2013-07-16 00:08:19 -04:00
|
|
|
}
|
|
|
|
|
2015-04-05 17:58:48 -04:00
|
|
|
// Config returns a valid aws.Config object for access to AWS services, or
|
|
|
|
// an error if the authentication and region couldn't be resolved
|
2017-03-01 19:43:09 -05:00
|
|
|
func (c *AccessConfig) Session() (*session.Session, error) {
|
|
|
|
if c.session != nil {
|
|
|
|
return c.session, nil
|
|
|
|
}
|
2016-02-01 19:55:59 -05:00
|
|
|
|
2018-03-15 12:49:34 -04:00
|
|
|
config := aws.NewConfig().WithCredentialsChainVerboseErrors(true)
|
2019-02-04 18:29:45 -05:00
|
|
|
|
2018-03-15 12:49:34 -04:00
|
|
|
staticCreds := credentials.NewStaticCredentials(c.AccessKey, c.SecretKey, c.Token)
|
|
|
|
if _, err := staticCreds.Get(); err != credentials.ErrStaticCredentialsEmpty {
|
|
|
|
config.WithCredentials(staticCreds)
|
2018-01-04 18:04:07 -05:00
|
|
|
}
|
2017-11-07 17:03:52 -05:00
|
|
|
|
2019-01-25 07:02:42 -05:00
|
|
|
if c.RawRegion != "" {
|
|
|
|
config = config.WithRegion(c.RawRegion)
|
|
|
|
}
|
2017-03-01 19:43:09 -05:00
|
|
|
|
2017-03-06 11:10:39 -05:00
|
|
|
if c.CustomEndpointEc2 != "" {
|
2017-06-09 14:01:27 -04:00
|
|
|
config = config.WithEndpoint(c.CustomEndpointEc2)
|
2017-03-06 11:10:39 -05:00
|
|
|
}
|
2017-06-09 13:46:01 -04:00
|
|
|
|
2019-03-01 17:28:16 -05:00
|
|
|
config = config.WithHTTPClient(cleanhttp.DefaultClient())
|
|
|
|
transport := config.HTTPClient.Transport.(*http.Transport)
|
2017-10-27 09:32:23 -04:00
|
|
|
if c.InsecureSkipTLSVerify {
|
|
|
|
transport.TLSClientConfig = &tls.Config{
|
|
|
|
InsecureSkipVerify: true,
|
|
|
|
}
|
|
|
|
}
|
2019-03-01 17:28:16 -05:00
|
|
|
transport.Proxy = http.ProxyFromEnvironment
|
2017-10-27 09:32:23 -04:00
|
|
|
|
2017-03-01 19:43:09 -05:00
|
|
|
opts := session.Options{
|
|
|
|
SharedConfigState: session.SharedConfigEnable,
|
|
|
|
Config: *config,
|
2017-02-26 11:24:34 -05:00
|
|
|
}
|
2017-11-07 17:03:52 -05:00
|
|
|
|
2018-02-15 17:20:50 -05:00
|
|
|
if c.ProfileName != "" {
|
|
|
|
opts.Profile = c.ProfileName
|
|
|
|
}
|
|
|
|
|
2017-03-01 19:43:09 -05:00
|
|
|
if c.MFACode != "" {
|
|
|
|
opts.AssumeRoleTokenProvider = func() (string, error) {
|
|
|
|
return c.MFACode, nil
|
|
|
|
}
|
|
|
|
}
|
2017-11-07 17:03:52 -05:00
|
|
|
|
2019-01-25 07:00:21 -05:00
|
|
|
sess, err := session.NewSessionWithOptions(opts)
|
|
|
|
if err != nil {
|
2017-03-01 19:43:09 -05:00
|
|
|
return nil, err
|
2019-01-25 07:00:21 -05:00
|
|
|
}
|
|
|
|
log.Printf("Found region %s", *sess.Config.Region)
|
|
|
|
c.session = sess
|
|
|
|
|
|
|
|
cp, err := c.session.Config.Credentials.Get()
|
|
|
|
if err != nil {
|
|
|
|
if awsErr, ok := err.(awserr.Error); ok && awsErr.Code() == "NoCredentialProviders" {
|
|
|
|
return nil, fmt.Errorf("No valid credential sources found for AWS Builder. " +
|
|
|
|
"Please see https://www.packer.io/docs/builders/amazon.html#specifying-amazon-credentials " +
|
|
|
|
"for more information on providing credentials for the AWS Builder.")
|
|
|
|
} else {
|
|
|
|
return nil, fmt.Errorf("Error loading credentials for AWS Provider: %s", err)
|
2018-02-15 17:20:50 -05:00
|
|
|
}
|
|
|
|
}
|
2019-01-25 07:00:21 -05:00
|
|
|
log.Printf("[INFO] AWS Auth provider used: %q", cp.ProviderName)
|
2017-10-02 16:12:42 -04:00
|
|
|
|
|
|
|
if c.DecodeAuthZMessages {
|
|
|
|
DecodeAuthZMessages(c.session)
|
|
|
|
}
|
2018-12-06 16:30:20 -05:00
|
|
|
LogEnvOverrideWarnings()
|
2017-10-02 16:12:42 -04:00
|
|
|
|
2017-03-01 19:43:09 -05:00
|
|
|
return c.session, nil
|
2016-02-01 19:55:59 -05:00
|
|
|
}
|
|
|
|
|
2018-02-02 23:16:23 -05:00
|
|
|
func (c *AccessConfig) SessionRegion() string {
|
|
|
|
if c.session == nil {
|
|
|
|
panic("access config session should be set.")
|
|
|
|
}
|
|
|
|
return aws.StringValue(c.session.Config.Region)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *AccessConfig) IsGovCloud() bool {
|
|
|
|
return strings.HasPrefix(c.SessionRegion(), "us-gov-")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *AccessConfig) IsChinaCloud() bool {
|
|
|
|
return strings.HasPrefix(c.SessionRegion(), "cn-")
|
|
|
|
}
|
|
|
|
|
2019-02-04 18:54:14 -05:00
|
|
|
func (c *AccessConfig) GetCredsFromVault() error {
|
|
|
|
// const EnvVaultAddress = "VAULT_ADDR"
|
|
|
|
// const EnvVaultToken = "VAULT_TOKEN"
|
|
|
|
vaultConfig := vaultapi.DefaultConfig()
|
|
|
|
cli, err := vaultapi.NewClient(vaultConfig)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error getting Vault client: %s", err)
|
|
|
|
}
|
2019-02-05 17:07:04 -05:00
|
|
|
if c.VaultAWSEngine.EngineName == "" {
|
|
|
|
c.VaultAWSEngine.EngineName = "aws"
|
|
|
|
}
|
2019-02-04 18:54:14 -05:00
|
|
|
path := fmt.Sprintf("/%s/creds/%s", c.VaultAWSEngine.EngineName,
|
|
|
|
c.VaultAWSEngine.Name)
|
|
|
|
secret, err := cli.Logical().Read(path)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error reading vault secret: %s", err)
|
|
|
|
}
|
|
|
|
if secret == nil {
|
|
|
|
return fmt.Errorf("Vault Secret does not exist at the given path.")
|
|
|
|
}
|
|
|
|
|
2019-02-05 17:07:04 -05:00
|
|
|
c.AccessKey = secret.Data["access_key"].(string)
|
|
|
|
c.SecretKey = secret.Data["secret_key"].(string)
|
|
|
|
token := secret.Data["security_token"]
|
|
|
|
if token != nil {
|
|
|
|
c.Token = token.(string)
|
|
|
|
} else {
|
|
|
|
c.Token = ""
|
|
|
|
}
|
2019-02-04 18:54:14 -05:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-27 14:35:56 -04:00
|
|
|
func (c *AccessConfig) Prepare(ctx *interpolate.Context) []error {
|
|
|
|
var errs []error
|
2018-01-04 14:50:27 -05:00
|
|
|
|
2018-03-15 12:49:34 -04:00
|
|
|
if c.SkipMetadataApiCheck {
|
|
|
|
log.Println("(WARN) skip_metadata_api_check ignored.")
|
|
|
|
}
|
2019-02-04 18:54:14 -05:00
|
|
|
|
|
|
|
// Make sure it's obvious from the config how we're getting credentials:
|
|
|
|
// Vault, Packer config, or environemnt.
|
|
|
|
if !c.VaultAWSEngine.Empty() {
|
2019-02-04 18:29:45 -05:00
|
|
|
if len(c.AccessKey) > 0 {
|
|
|
|
errs = append(errs,
|
|
|
|
fmt.Errorf("If you have set vault_aws_engine, you must not set"+
|
|
|
|
" the access_key or secret_key."))
|
|
|
|
}
|
2019-02-04 18:54:14 -05:00
|
|
|
// Go ahead and grab those credentials from Vault now, so we can set
|
|
|
|
// the keys and token now.
|
|
|
|
err := c.GetCredsFromVault()
|
|
|
|
if err != nil {
|
|
|
|
errs = append(errs, err)
|
|
|
|
}
|
2019-02-04 18:29:45 -05:00
|
|
|
}
|
2019-02-04 18:54:14 -05:00
|
|
|
|
2018-01-04 14:50:27 -05:00
|
|
|
if (len(c.AccessKey) > 0) != (len(c.SecretKey) > 0) {
|
|
|
|
errs = append(errs,
|
|
|
|
fmt.Errorf("`access_key` and `secret_key` must both be either set or not set."))
|
|
|
|
}
|
|
|
|
|
2017-11-07 17:03:52 -05:00
|
|
|
return errs
|
2013-07-16 00:08:19 -04:00
|
|
|
}
|
2018-10-24 05:26:53 -04:00
|
|
|
|
|
|
|
func (c *AccessConfig) NewEC2Connection() (ec2iface.EC2API, error) {
|
|
|
|
if c.getEC2Connection != nil {
|
|
|
|
return c.getEC2Connection(), nil
|
|
|
|
}
|
|
|
|
sess, err := c.Session()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-01-23 19:58:48 -05:00
|
|
|
|
2019-03-01 17:28:16 -05:00
|
|
|
ec2conn := ec2.New(sess)
|
2019-01-23 19:58:48 -05:00
|
|
|
|
|
|
|
return ec2conn, nil
|
2018-10-24 05:26:53 -04:00
|
|
|
}
|