packer-cn/builder/openstack/step_key_pair.go

192 lines
5.2 KiB
Go
Raw Normal View History

package openstack
import (
"context"
"fmt"
"io/ioutil"
"log"
2013-12-26 19:20:13 -05:00
"os"
"os/exec"
2013-12-26 19:20:13 -05:00
"runtime"
2016-11-27 19:59:26 -05:00
"github.com/gophercloud/gophercloud/openstack/compute/v2/extensions/keypairs"
"github.com/hashicorp/packer/helper/multistep"
2017-04-04 16:39:01 -04:00
"github.com/hashicorp/packer/packer"
"golang.org/x/crypto/ssh"
)
type StepKeyPair struct {
Debug bool
SSHAgentAuth bool
DebugKeyPath string
TemporaryKeyPairName string
KeyPairName string
PrivateKeyFile string
doCleanup bool
}
func (s *StepKeyPair) Run(_ context.Context, state multistep.StateBag) multistep.StepAction {
ui := state.Get("ui").(packer.Ui)
2018-08-27 09:58:00 -04:00
config := state.Get("config").(Config)
if s.PrivateKeyFile != "" {
privateKeyBytes, err := ioutil.ReadFile(s.PrivateKeyFile)
if err != nil {
state.Put("error", fmt.Errorf(
"Error loading configured private key file: %s", err))
return multistep.ActionHalt
}
2018-08-27 09:58:00 -04:00
config.Comm.SSHPrivateKey = privateKeyBytes
config.Comm.SSHKeyPair = s.KeyPairName
return multistep.ActionContinue
}
if s.SSHAgentAuth && s.KeyPairName == "" {
ui.Say("Using SSH Agent with key pair in Source image")
return multistep.ActionContinue
}
if s.SSHAgentAuth && s.KeyPairName != "" {
ui.Say(fmt.Sprintf("Using SSH Agent for existing key pair %s", s.KeyPairName))
2018-08-27 09:58:00 -04:00
config.Comm.SSHKeyPair = ""
return multistep.ActionContinue
}
if s.TemporaryKeyPairName == "" {
ui.Say("Not using temporary keypair")
2018-08-27 09:58:00 -04:00
config.Comm.SSHKeyPair = ""
return multistep.ActionContinue
}
2015-06-12 00:16:43 -04:00
// We need the v2 compute client
computeClient, err := config.computeV2Client()
if err != nil {
err = fmt.Errorf("Error initializing compute client: %s", err)
state.Put("error", err)
return multistep.ActionHalt
}
ui.Say(fmt.Sprintf("Creating temporary keypair: %s ...", s.TemporaryKeyPairName))
2015-06-12 00:16:43 -04:00
keypair, err := keypairs.Create(computeClient, keypairs.CreateOpts{
Name: s.TemporaryKeyPairName,
2015-06-12 00:16:43 -04:00
}).Extract()
if err != nil {
2013-08-31 15:37:07 -04:00
state.Put("error", fmt.Errorf("Error creating temporary keypair: %s", err))
return multistep.ActionHalt
}
2015-06-12 00:16:43 -04:00
2018-08-27 09:58:00 -04:00
if len(keypair.PrivateKey) == 0 {
state.Put("error", fmt.Errorf("The temporary keypair returned was blank"))
return multistep.ActionHalt
}
ui.Say(fmt.Sprintf("Created temporary keypair: %s", s.TemporaryKeyPairName))
2018-08-27 09:58:00 -04:00
keypair.PrivateKey = string(berToDer([]byte(keypair.PrivateKey), ui))
// If we're in debug mode, output the private key to the working
// directory.
if s.Debug {
ui.Message(fmt.Sprintf("Saving key for debug purposes: %s", s.DebugKeyPath))
f, err := os.Create(s.DebugKeyPath)
if err != nil {
state.Put("error", fmt.Errorf("Error saving debug key: %s", err))
return multistep.ActionHalt
}
defer f.Close()
// Write the key out
2015-06-12 00:16:43 -04:00
if _, err := f.Write([]byte(keypair.PrivateKey)); err != nil {
state.Put("error", fmt.Errorf("Error saving debug key: %s", err))
return multistep.ActionHalt
}
// Chmod it so that it is SSH ready
if runtime.GOOS != "windows" {
if err := f.Chmod(0600); err != nil {
state.Put("error", fmt.Errorf("Error setting permissions of debug key: %s", err))
return multistep.ActionHalt
}
}
}
2017-05-01 13:17:21 -04:00
// we created a temporary key, so remember to clean it up
s.doCleanup = true
// Set some state data for use in future steps
2018-08-27 09:58:00 -04:00
config.Comm.SSHKeyPair = s.TemporaryKeyPairName
config.Comm.SSHPrivateKey = []byte(keypair.PrivateKey)
return multistep.ActionContinue
}
2017-04-04 16:39:01 -04:00
// Work around for https://github.com/hashicorp/packer/issues/2526
2018-08-27 09:58:00 -04:00
func berToDer(ber []byte, ui packer.Ui) []byte {
// Check if x/crypto/ssh can parse the key
2018-08-27 09:58:00 -04:00
_, err := ssh.ParsePrivateKey(ber)
if err == nil {
return ber
}
// Can't parse the key, maybe it's BER encoded. Try to convert it with OpenSSL.
log.Println("Couldn't parse SSH key, trying work around for [GH-2526].")
openSslPath, err := exec.LookPath("openssl")
if err != nil {
log.Println("Couldn't find OpenSSL, aborting work around.")
return ber
}
berKey, err := ioutil.TempFile("", "packer-ber-privatekey-")
defer os.Remove(berKey.Name())
if err != nil {
return ber
}
2018-08-27 09:58:00 -04:00
ioutil.WriteFile(berKey.Name(), ber, os.ModeAppend)
derKey, err := ioutil.TempFile("", "packer-der-privatekey-")
defer os.Remove(derKey.Name())
if err != nil {
return ber
}
args := []string{"rsa", "-in", berKey.Name(), "-out", derKey.Name()}
log.Printf("Executing: %s %v", openSslPath, args)
if err := exec.Command(openSslPath, args...).Run(); err != nil {
log.Printf("OpenSSL failed with error: %s", err)
return ber
}
der, err := ioutil.ReadFile(derKey.Name())
if err != nil {
return ber
}
ui.Say("Successfully converted BER encoded SSH key to DER encoding.")
2018-08-27 09:58:00 -04:00
return der
}
2013-08-31 15:37:07 -04:00
func (s *StepKeyPair) Cleanup(state multistep.StateBag) {
if !s.doCleanup {
return
}
2015-06-12 00:16:43 -04:00
config := state.Get("config").(Config)
2013-08-31 15:37:07 -04:00
ui := state.Get("ui").(packer.Ui)
2015-06-12 00:16:43 -04:00
// We need the v2 compute client
computeClient, err := config.computeV2Client()
if err != nil {
ui.Error(fmt.Sprintf(
"Error cleaning up keypair. Please delete the key manually: %s", s.TemporaryKeyPairName))
2015-06-12 00:16:43 -04:00
return
}
ui.Say(fmt.Sprintf("Deleting temporary keypair: %s ...", s.TemporaryKeyPairName))
2017-05-01 13:17:21 -04:00
err = keypairs.Delete(computeClient, s.TemporaryKeyPairName).ExtractErr()
if err != nil {
ui.Error(fmt.Sprintf(
"Error cleaning up keypair. Please delete the key manually: %s", s.TemporaryKeyPairName))
}
}