2019-10-14 10:43:59 -04:00
|
|
|
//go:generate mapstructure-to-hcl2 -type Config
|
|
|
|
|
2015-06-14 14:14:47 -04:00
|
|
|
package restart
|
|
|
|
|
|
|
|
import (
|
2017-08-23 18:23:50 -04:00
|
|
|
"bytes"
|
2019-03-19 13:11:19 -04:00
|
|
|
"context"
|
2015-06-14 14:14:47 -04:00
|
|
|
"fmt"
|
2017-12-06 13:37:11 -05:00
|
|
|
"io"
|
2017-11-09 17:44:26 -05:00
|
|
|
|
2015-06-14 14:14:47 -04:00
|
|
|
"log"
|
2017-08-23 18:23:50 -04:00
|
|
|
"strings"
|
2015-06-17 12:22:27 -04:00
|
|
|
"sync"
|
2015-06-14 14:14:47 -04:00
|
|
|
"time"
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
"github.com/hashicorp/hcl/v2/hcldec"
|
2020-12-17 16:29:25 -05:00
|
|
|
"github.com/hashicorp/packer-plugin-sdk/common"
|
|
|
|
packersdk "github.com/hashicorp/packer-plugin-sdk/packer"
|
|
|
|
"github.com/hashicorp/packer-plugin-sdk/retry"
|
|
|
|
"github.com/hashicorp/packer-plugin-sdk/template/config"
|
|
|
|
"github.com/hashicorp/packer-plugin-sdk/template/interpolate"
|
2016-10-01 16:34:42 -04:00
|
|
|
"github.com/masterzen/winrm"
|
2015-06-14 14:14:47 -04:00
|
|
|
)
|
|
|
|
|
2018-08-20 17:12:57 -04:00
|
|
|
var DefaultRestartCommand = `shutdown /r /f /t 0 /c "packer restart"`
|
2020-06-02 13:45:02 -04:00
|
|
|
var DefaultRestartCheckCommand = winrm.Powershell(`echo ("{0} restarted." -f [System.Net.Dns]::GetHostName())`)
|
2015-06-14 14:14:47 -04:00
|
|
|
var retryableSleep = 5 * time.Second
|
2018-08-20 17:12:57 -04:00
|
|
|
var TryCheckReboot = `shutdown /r /f /t 60 /c "packer restart test"`
|
|
|
|
var AbortReboot = `shutdown /a`
|
2015-06-14 14:14:47 -04:00
|
|
|
|
2018-10-11 18:07:36 -04:00
|
|
|
var DefaultRegistryKeys = []string{
|
|
|
|
"HKLM:SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Component Based Servicing\\RebootPending",
|
|
|
|
"HKLM:SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Component Based Servicing\\PackagesPending",
|
|
|
|
"HKLM:Software\\Microsoft\\Windows\\CurrentVersion\\Component Based Servicing\\RebootInProgress",
|
|
|
|
}
|
|
|
|
|
2015-06-14 14:14:47 -04:00
|
|
|
type Config struct {
|
|
|
|
common.PackerConfig `mapstructure:",squash"`
|
|
|
|
|
|
|
|
// The command used to restart the guest machine
|
|
|
|
RestartCommand string `mapstructure:"restart_command"`
|
|
|
|
|
|
|
|
// The command used to check if the guest machine has restarted
|
|
|
|
// The output of this command will be displayed to the user
|
|
|
|
RestartCheckCommand string `mapstructure:"restart_check_command"`
|
|
|
|
|
|
|
|
// The timeout for waiting for the machine to restart
|
|
|
|
RestartTimeout time.Duration `mapstructure:"restart_timeout"`
|
|
|
|
|
2018-10-11 18:07:36 -04:00
|
|
|
// Whether to check the registry (see RegistryKeys) for pending reboots
|
|
|
|
CheckKey bool `mapstructure:"check_registry"`
|
|
|
|
|
|
|
|
// custom keys to check for
|
|
|
|
RegistryKeys []string `mapstructure:"registry_keys"`
|
|
|
|
|
2015-06-14 14:14:47 -04:00
|
|
|
ctx interpolate.Context
|
|
|
|
}
|
|
|
|
|
|
|
|
type Provisioner struct {
|
2015-06-17 12:22:27 -04:00
|
|
|
config Config
|
2020-11-19 18:10:00 -05:00
|
|
|
comm packersdk.Communicator
|
2020-11-19 14:54:31 -05:00
|
|
|
ui packersdk.Ui
|
2015-06-17 12:22:27 -04:00
|
|
|
cancel chan struct{}
|
|
|
|
cancelLock sync.Mutex
|
2015-06-14 14:14:47 -04:00
|
|
|
}
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
func (p *Provisioner) ConfigSpec() hcldec.ObjectSpec { return p.config.FlatMapstructure().HCL2Spec() }
|
|
|
|
|
2015-06-14 14:14:47 -04:00
|
|
|
func (p *Provisioner) Prepare(raws ...interface{}) error {
|
|
|
|
err := config.Decode(&p.config, &config.DecodeOpts{
|
2020-10-09 20:01:55 -04:00
|
|
|
PluginType: "windows-restart",
|
2015-06-22 15:26:54 -04:00
|
|
|
Interpolate: true,
|
|
|
|
InterpolateContext: &p.config.ctx,
|
2015-06-14 14:14:47 -04:00
|
|
|
InterpolateFilter: &interpolate.RenderFilter{
|
|
|
|
Exclude: []string{
|
|
|
|
"execute_command",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}, raws...)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.config.RestartCommand == "" {
|
|
|
|
p.config.RestartCommand = DefaultRestartCommand
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.config.RestartCheckCommand == "" {
|
|
|
|
p.config.RestartCheckCommand = DefaultRestartCheckCommand
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.config.RestartTimeout == 0 {
|
|
|
|
p.config.RestartTimeout = 5 * time.Minute
|
|
|
|
}
|
|
|
|
|
2018-10-11 18:07:36 -04:00
|
|
|
if len(p.config.RegistryKeys) == 0 {
|
|
|
|
p.config.RegistryKeys = DefaultRegistryKeys
|
|
|
|
}
|
|
|
|
|
2015-06-14 14:14:47 -04:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-19 18:10:00 -05:00
|
|
|
func (p *Provisioner) Provision(ctx context.Context, ui packersdk.Ui, comm packersdk.Communicator, _ map[string]interface{}) error {
|
2015-06-17 12:22:27 -04:00
|
|
|
p.cancelLock.Lock()
|
|
|
|
p.cancel = make(chan struct{})
|
|
|
|
p.cancelLock.Unlock()
|
|
|
|
|
2015-06-14 14:14:47 -04:00
|
|
|
ui.Say("Restarting Machine")
|
|
|
|
p.comm = comm
|
|
|
|
p.ui = ui
|
|
|
|
|
2020-11-19 18:10:00 -05:00
|
|
|
var cmd *packersdk.RemoteCmd
|
2015-06-14 14:14:47 -04:00
|
|
|
command := p.config.RestartCommand
|
2019-04-08 11:57:27 -04:00
|
|
|
err := retry.Config{StartTimeout: p.config.RestartTimeout}.Run(ctx, func(context.Context) error {
|
2020-11-19 18:10:00 -05:00
|
|
|
cmd = &packersdk.RemoteCmd{Command: command}
|
2019-04-03 11:14:55 -04:00
|
|
|
return cmd.RunWithUi(ctx, comm, ui)
|
2015-06-14 14:14:47 -04:00
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-04-03 11:14:55 -04:00
|
|
|
if cmd.ExitStatus() != 0 && cmd.ExitStatus() != 1115 && cmd.ExitStatus() != 1190 {
|
|
|
|
return fmt.Errorf("Restart script exited with non-zero exit status: %d", cmd.ExitStatus())
|
2015-06-14 14:14:47 -04:00
|
|
|
}
|
|
|
|
|
2019-03-19 13:11:19 -04:00
|
|
|
return waitForRestart(ctx, p, comm)
|
2015-06-14 14:14:47 -04:00
|
|
|
}
|
|
|
|
|
2020-11-19 18:10:00 -05:00
|
|
|
var waitForRestart = func(ctx context.Context, p *Provisioner, comm packersdk.Communicator) error {
|
2015-06-14 14:14:47 -04:00
|
|
|
ui := p.ui
|
|
|
|
ui.Say("Waiting for machine to restart...")
|
|
|
|
waitDone := make(chan bool, 1)
|
|
|
|
timeout := time.After(p.config.RestartTimeout)
|
|
|
|
var err error
|
|
|
|
|
2015-08-06 20:18:17 -04:00
|
|
|
p.comm = comm
|
2020-11-19 18:10:00 -05:00
|
|
|
var cmd *packersdk.RemoteCmd
|
2015-08-06 20:18:17 -04:00
|
|
|
trycommand := TryCheckReboot
|
|
|
|
abortcommand := AbortReboot
|
2018-02-07 14:34:18 -05:00
|
|
|
|
2015-08-06 20:18:17 -04:00
|
|
|
// Stolen from Vagrant reboot checker
|
|
|
|
for {
|
|
|
|
log.Printf("Check if machine is rebooting...")
|
2020-11-19 18:10:00 -05:00
|
|
|
cmd = &packersdk.RemoteCmd{Command: trycommand}
|
2019-04-03 11:14:55 -04:00
|
|
|
err = cmd.RunWithUi(ctx, comm, ui)
|
2018-08-23 14:05:44 -04:00
|
|
|
if err != nil {
|
2017-03-28 20:45:01 -04:00
|
|
|
// Couldn't execute, we assume machine is rebooting already
|
2015-08-06 20:18:17 -04:00
|
|
|
break
|
|
|
|
}
|
2019-04-03 11:14:55 -04:00
|
|
|
if cmd.ExitStatus() == 1 {
|
2018-08-20 17:12:57 -04:00
|
|
|
// SSH provisioner, and we're already rebooting. SSH can reconnect
|
|
|
|
// without our help; exit this wait loop.
|
|
|
|
break
|
|
|
|
}
|
2019-04-03 11:14:55 -04:00
|
|
|
if cmd.ExitStatus() == 1115 || cmd.ExitStatus() == 1190 || cmd.ExitStatus() == 1717 {
|
2015-08-06 20:18:17 -04:00
|
|
|
// Reboot already in progress but not completed
|
|
|
|
log.Printf("Reboot already in progress, waiting...")
|
|
|
|
time.Sleep(10 * time.Second)
|
|
|
|
}
|
2019-04-03 11:14:55 -04:00
|
|
|
if cmd.ExitStatus() == 0 {
|
2015-08-06 20:18:17 -04:00
|
|
|
// Cancel reboot we created to test if machine was already rebooting
|
2020-11-19 18:10:00 -05:00
|
|
|
cmd = &packersdk.RemoteCmd{Command: abortcommand}
|
2019-04-03 11:14:55 -04:00
|
|
|
cmd.RunWithUi(ctx, comm, ui)
|
2015-08-06 20:18:17 -04:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-14 14:14:47 -04:00
|
|
|
go func() {
|
|
|
|
log.Printf("Waiting for machine to become available...")
|
2019-03-19 13:11:19 -04:00
|
|
|
err = waitForCommunicator(ctx, p)
|
2015-06-14 14:14:47 -04:00
|
|
|
waitDone <- true
|
|
|
|
}()
|
|
|
|
|
|
|
|
log.Printf("Waiting for machine to reboot with timeout: %s", p.config.RestartTimeout)
|
|
|
|
|
|
|
|
WaitLoop:
|
|
|
|
for {
|
|
|
|
// Wait for either WinRM to become available, a timeout to occur,
|
|
|
|
// or an interrupt to come through.
|
|
|
|
select {
|
|
|
|
case <-waitDone:
|
|
|
|
if err != nil {
|
2017-06-21 13:51:23 -04:00
|
|
|
ui.Error(fmt.Sprintf("Error waiting for machine to restart: %s", err))
|
2015-06-14 14:14:47 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
ui.Say("Machine successfully restarted, moving on")
|
|
|
|
close(p.cancel)
|
|
|
|
break WaitLoop
|
|
|
|
case <-timeout:
|
2017-06-21 13:51:23 -04:00
|
|
|
err := fmt.Errorf("Timeout waiting for machine to restart.")
|
2015-06-14 14:14:47 -04:00
|
|
|
ui.Error(err.Error())
|
|
|
|
close(p.cancel)
|
|
|
|
return err
|
|
|
|
case <-p.cancel:
|
|
|
|
close(waitDone)
|
|
|
|
return fmt.Errorf("Interrupt detected, quitting waiting for machine to restart")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2019-03-19 13:11:19 -04:00
|
|
|
var waitForCommunicator = func(ctx context.Context, p *Provisioner) error {
|
2017-11-07 18:01:02 -05:00
|
|
|
runCustomRestartCheck := true
|
2017-11-09 14:49:12 -05:00
|
|
|
if p.config.RestartCheckCommand == DefaultRestartCheckCommand {
|
|
|
|
runCustomRestartCheck = false
|
|
|
|
}
|
2017-11-09 17:55:12 -05:00
|
|
|
// This command is configurable by the user to make sure that the
|
|
|
|
// vm has met their necessary criteria for having restarted. If the
|
|
|
|
// user doesn't set a special restart command, we just run the
|
|
|
|
// default as cmdModuleLoad below.
|
2020-11-19 18:10:00 -05:00
|
|
|
cmdRestartCheck := &packersdk.RemoteCmd{Command: p.config.RestartCheckCommand}
|
2017-11-09 14:49:12 -05:00
|
|
|
log.Printf("Checking that communicator is connected with: '%s'",
|
|
|
|
cmdRestartCheck.Command)
|
2015-06-14 14:14:47 -04:00
|
|
|
for {
|
|
|
|
select {
|
2019-03-19 13:11:19 -04:00
|
|
|
case <-ctx.Done():
|
2017-03-28 20:45:01 -04:00
|
|
|
log.Println("Communicator wait canceled, exiting loop")
|
|
|
|
return fmt.Errorf("Communicator wait canceled")
|
2015-06-14 14:14:47 -04:00
|
|
|
case <-time.After(retryableSleep):
|
|
|
|
}
|
2017-11-09 18:04:25 -05:00
|
|
|
if runCustomRestartCheck {
|
2017-11-07 18:01:02 -05:00
|
|
|
// run user-configured restart check
|
2019-04-03 11:14:55 -04:00
|
|
|
err := cmdRestartCheck.RunWithUi(ctx, p.comm, p.ui)
|
2017-11-07 18:01:02 -05:00
|
|
|
if err != nil {
|
|
|
|
log.Printf("Communication connection err: %s", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
log.Printf("Connected to machine")
|
|
|
|
runCustomRestartCheck = false
|
2015-06-14 14:14:47 -04:00
|
|
|
}
|
2017-11-09 17:55:12 -05:00
|
|
|
// This is the non-user-configurable check that powershell
|
|
|
|
// modules have loaded.
|
|
|
|
|
|
|
|
// If we catch the restart in just the right place, we will be able
|
|
|
|
// to run the restart check but the output will be an error message
|
|
|
|
// about how it needs powershell modules to load, and we will start
|
|
|
|
// provisioning before powershell is actually ready.
|
|
|
|
// In this next check, we parse stdout to make sure that the command is
|
|
|
|
// actually running as expected.
|
2020-11-19 18:10:00 -05:00
|
|
|
cmdModuleLoad := &packersdk.RemoteCmd{Command: DefaultRestartCheckCommand}
|
2017-12-06 13:37:11 -05:00
|
|
|
var buf, buf2 bytes.Buffer
|
|
|
|
cmdModuleLoad.Stdout = &buf
|
|
|
|
cmdModuleLoad.Stdout = io.MultiWriter(cmdModuleLoad.Stdout, &buf2)
|
|
|
|
|
2019-04-03 11:14:55 -04:00
|
|
|
cmdModuleLoad.RunWithUi(ctx, p.comm, p.ui)
|
2017-12-06 13:37:11 -05:00
|
|
|
stdoutToRead := buf2.String()
|
|
|
|
|
2017-08-23 18:23:50 -04:00
|
|
|
if !strings.Contains(stdoutToRead, "restarted.") {
|
|
|
|
log.Printf("echo didn't succeed; retrying...")
|
|
|
|
continue
|
|
|
|
}
|
2018-10-11 18:07:36 -04:00
|
|
|
|
|
|
|
if p.config.CheckKey {
|
|
|
|
log.Printf("Connected to machine")
|
|
|
|
shouldContinue := false
|
|
|
|
for _, RegKey := range p.config.RegistryKeys {
|
|
|
|
KeyTestCommand := winrm.Powershell(fmt.Sprintf(`Test-Path "%s"`, RegKey))
|
2020-11-19 18:10:00 -05:00
|
|
|
cmdKeyCheck := &packersdk.RemoteCmd{Command: KeyTestCommand}
|
2018-10-11 18:07:36 -04:00
|
|
|
log.Printf("Checking registry for pending reboots")
|
|
|
|
var buf, buf2 bytes.Buffer
|
|
|
|
cmdKeyCheck.Stdout = &buf
|
|
|
|
cmdKeyCheck.Stdout = io.MultiWriter(cmdKeyCheck.Stdout, &buf2)
|
|
|
|
|
2019-08-13 13:27:14 -04:00
|
|
|
err := cmdKeyCheck.RunWithUi(ctx, p.comm, p.ui)
|
2018-10-11 18:07:36 -04:00
|
|
|
if err != nil {
|
|
|
|
log.Printf("Communication connection err: %s", err)
|
|
|
|
shouldContinue = true
|
|
|
|
}
|
|
|
|
|
|
|
|
stdoutToRead := buf2.String()
|
|
|
|
if strings.Contains(stdoutToRead, "True") {
|
|
|
|
log.Printf("RegistryKey %s exists; waiting...", KeyTestCommand)
|
|
|
|
shouldContinue = true
|
|
|
|
} else {
|
|
|
|
log.Printf("No Registry keys found; exiting wait loop")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if shouldContinue {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
2015-06-14 14:14:47 -04:00
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|