2016-04-14 20:29:27 -04:00
|
|
|
package triton
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
|
2016-12-29 07:24:56 -05:00
|
|
|
"io/ioutil"
|
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
"os"
|
2017-05-18 15:01:44 -04:00
|
|
|
|
|
|
|
packerssh "github.com/hashicorp/packer/communicator/ssh"
|
|
|
|
"github.com/mitchellh/multistep"
|
|
|
|
"golang.org/x/crypto/ssh"
|
|
|
|
"golang.org/x/crypto/ssh/agent"
|
2016-04-14 20:29:27 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
func commHost(state multistep.StateBag) (string, error) {
|
|
|
|
driver := state.Get("driver").(Driver)
|
|
|
|
machineID := state.Get("machine").(string)
|
|
|
|
|
2017-04-26 15:07:45 -04:00
|
|
|
machine, err := driver.GetMachineIP(machineID)
|
2016-04-14 20:29:27 -04:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return machine, nil
|
|
|
|
}
|
|
|
|
|
2016-12-29 07:24:56 -05:00
|
|
|
// SSHConfig returns a function that can be used for the SSH communicator
|
|
|
|
// config for connecting to the instance created over SSH using the private key
|
|
|
|
// or password.
|
|
|
|
func sshConfig(useAgent bool, username, privateKeyPath, password string) func(multistep.StateBag) (*ssh.ClientConfig, error) {
|
|
|
|
return func(state multistep.StateBag) (*ssh.ClientConfig, error) {
|
2016-04-14 20:29:27 -04:00
|
|
|
|
2016-12-29 07:24:56 -05:00
|
|
|
if useAgent {
|
|
|
|
log.Println("Configuring SSH agent.")
|
2016-04-14 20:29:27 -04:00
|
|
|
|
2016-12-29 07:24:56 -05:00
|
|
|
authSock := os.Getenv("SSH_AUTH_SOCK")
|
|
|
|
if authSock == "" {
|
|
|
|
return nil, fmt.Errorf("SSH_AUTH_SOCK is not set")
|
|
|
|
}
|
|
|
|
|
|
|
|
sshAgent, err := net.Dial("unix", authSock)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Cannot connect to SSH Agent socket %q: %s", authSock, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &ssh.ClientConfig{
|
|
|
|
User: username,
|
|
|
|
Auth: []ssh.AuthMethod{
|
|
|
|
ssh.PublicKeysCallback(agent.NewClient(sshAgent).Signers),
|
|
|
|
},
|
2017-05-18 15:01:44 -04:00
|
|
|
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
|
2016-12-29 07:24:56 -05:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
hasKey := privateKeyPath != ""
|
|
|
|
|
|
|
|
if hasKey {
|
|
|
|
log.Printf("Configuring SSH private key '%s'.", privateKeyPath)
|
|
|
|
|
|
|
|
privateKeyBytes, err := ioutil.ReadFile(privateKeyPath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Unable to read SSH private key: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
signer, err := ssh.ParsePrivateKey(privateKeyBytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error setting up SSH config: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &ssh.ClientConfig{
|
|
|
|
User: username,
|
|
|
|
Auth: []ssh.AuthMethod{
|
|
|
|
ssh.PublicKeys(signer),
|
|
|
|
},
|
2017-05-18 15:01:44 -04:00
|
|
|
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
|
2016-12-29 07:24:56 -05:00
|
|
|
}, nil
|
|
|
|
} else {
|
|
|
|
log.Println("Configuring SSH keyboard interactive.")
|
|
|
|
|
|
|
|
return &ssh.ClientConfig{
|
2017-05-18 15:01:44 -04:00
|
|
|
User: username,
|
|
|
|
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
|
2016-12-29 07:24:56 -05:00
|
|
|
Auth: []ssh.AuthMethod{
|
|
|
|
ssh.Password(password),
|
|
|
|
ssh.KeyboardInteractive(
|
|
|
|
packerssh.PasswordKeyboardInteractive(password)),
|
|
|
|
}}, nil
|
|
|
|
}
|
|
|
|
}
|
2016-12-29 12:58:56 -05:00
|
|
|
}
|