2019-10-14 10:43:59 -04:00
|
|
|
//go:generate mapstructure-to-hcl2 -type Config
|
2020-08-10 07:15:27 -04:00
|
|
|
//go:generate struct-markdown
|
2019-10-14 10:43:59 -04:00
|
|
|
|
2013-07-02 22:11:30 -04:00
|
|
|
package file
|
|
|
|
|
|
|
|
import (
|
2019-03-19 13:11:19 -04:00
|
|
|
"context"
|
2013-07-02 22:11:30 -04:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2018-08-07 16:31:52 -04:00
|
|
|
"io"
|
2015-05-27 17:50:20 -04:00
|
|
|
"os"
|
2016-07-06 16:42:26 -04:00
|
|
|
"path/filepath"
|
2015-11-02 06:22:52 -05:00
|
|
|
"strings"
|
2015-05-27 17:50:20 -04:00
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
"github.com/hashicorp/hcl/v2/hcldec"
|
2020-12-17 16:29:25 -05:00
|
|
|
"github.com/hashicorp/packer-plugin-sdk/common"
|
|
|
|
packersdk "github.com/hashicorp/packer-plugin-sdk/packer"
|
|
|
|
"github.com/hashicorp/packer-plugin-sdk/template/config"
|
|
|
|
"github.com/hashicorp/packer-plugin-sdk/template/interpolate"
|
2013-07-02 22:11:30 -04:00
|
|
|
)
|
|
|
|
|
2015-05-27 17:50:20 -04:00
|
|
|
type Config struct {
|
2013-08-09 17:21:31 -04:00
|
|
|
common.PackerConfig `mapstructure:",squash"`
|
2020-08-10 07:15:27 -04:00
|
|
|
// The path to a local file or directory to upload to the
|
|
|
|
// machine. The path can be absolute or relative. If it is relative, it is
|
|
|
|
// relative to the working directory when Packer is executed. If this is a
|
|
|
|
// directory, the existence of a trailing slash is important. Read below on
|
|
|
|
// uploading directories. Mandatory unless `sources` is set.
|
|
|
|
Source string `mapstructure:"source" required:"true"`
|
|
|
|
// A list of sources to upload. This can be used in place of the `source`
|
|
|
|
// option if you have several files that you want to upload to the same
|
|
|
|
// place. Note that the destination must be a directory with a trailing
|
|
|
|
// slash, and that all files listed in `sources` will be uploaded to the
|
|
|
|
// same directory with their file names preserved.
|
|
|
|
Sources []string `mapstructure:"sources" required:"false"`
|
|
|
|
// The path where the file will be uploaded to in the machine. This value
|
|
|
|
// must be a writable location and any parent directories
|
|
|
|
// must already exist. If the provisioning user (generally not root) cannot
|
|
|
|
// write to this directory, you will receive a "Permission Denied" error.
|
|
|
|
// If the source is a file, it's a good idea to make the destination a file
|
|
|
|
// as well, but if you set your destination as a directory, at least make
|
|
|
|
// sure that the destination ends in a trailing slash so that Packer knows
|
|
|
|
// to use the source's basename in the final upload path. Failure to do so
|
|
|
|
// may cause Packer to fail on file uploads. If the destination file
|
|
|
|
// already exists, it will be overwritten.
|
|
|
|
Destination string `mapstructure:"destination" required:"true"`
|
|
|
|
// The direction of the file transfer. This defaults to "upload". If it is
|
|
|
|
// set to "download" then the file "source" in the machine will be
|
|
|
|
// downloaded locally to "destination"
|
|
|
|
Direction string `mapstructure:"direction" required:"false"`
|
|
|
|
// For advanced users only. If true, check the file existence only before
|
|
|
|
// uploading, rather than upon pre-build validation. This allows users to
|
|
|
|
// upload files created on-the-fly. This defaults to false. We
|
|
|
|
// don't recommend using this feature, since it can cause Packer to become
|
|
|
|
// dependent on system state. We would prefer you generate your files before
|
|
|
|
// the Packer run, but realize that there are situations where this may be
|
|
|
|
// unavoidable.
|
|
|
|
Generated bool `mapstructure:"generated" required:"false"`
|
2016-09-15 16:15:56 -04:00
|
|
|
|
2015-05-27 17:50:20 -04:00
|
|
|
ctx interpolate.Context
|
2013-07-02 22:11:30 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
type Provisioner struct {
|
2015-05-27 17:50:20 -04:00
|
|
|
config Config
|
2013-07-02 22:11:30 -04:00
|
|
|
}
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
func (p *Provisioner) ConfigSpec() hcldec.ObjectSpec { return p.config.FlatMapstructure().HCL2Spec() }
|
|
|
|
|
2013-07-02 22:11:30 -04:00
|
|
|
func (p *Provisioner) Prepare(raws ...interface{}) error {
|
2015-05-27 17:50:20 -04:00
|
|
|
err := config.Decode(&p.config, &config.DecodeOpts{
|
2020-10-09 20:01:55 -04:00
|
|
|
PluginType: "file",
|
2015-06-22 15:26:54 -04:00
|
|
|
Interpolate: true,
|
|
|
|
InterpolateContext: &p.config.ctx,
|
2015-05-27 17:50:20 -04:00
|
|
|
InterpolateFilter: &interpolate.RenderFilter{
|
|
|
|
Exclude: []string{},
|
|
|
|
},
|
|
|
|
}, raws...)
|
2013-08-08 19:31:34 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2015-02-08 20:25:27 -05:00
|
|
|
if p.config.Direction == "" {
|
|
|
|
p.config.Direction = "upload"
|
|
|
|
}
|
|
|
|
|
2020-11-19 15:07:02 -05:00
|
|
|
var errs *packersdk.MultiError
|
2013-07-02 22:11:30 -04:00
|
|
|
|
2015-02-08 20:25:27 -05:00
|
|
|
if p.config.Direction != "download" && p.config.Direction != "upload" {
|
2020-11-19 15:07:02 -05:00
|
|
|
errs = packersdk.MultiErrorAppend(errs,
|
2015-02-08 20:25:27 -05:00
|
|
|
errors.New("Direction must be one of: download, upload."))
|
|
|
|
}
|
2015-11-02 06:22:52 -05:00
|
|
|
if p.config.Source != "" {
|
|
|
|
p.config.Sources = append(p.config.Sources, p.config.Source)
|
|
|
|
}
|
2015-02-08 20:25:27 -05:00
|
|
|
|
|
|
|
if p.config.Direction == "upload" {
|
2015-11-02 06:22:52 -05:00
|
|
|
for _, src := range p.config.Sources {
|
2016-09-15 16:15:56 -04:00
|
|
|
if _, err := os.Stat(src); p.config.Generated == false && err != nil {
|
2020-11-19 15:07:02 -05:00
|
|
|
errs = packersdk.MultiErrorAppend(errs,
|
2015-11-02 06:22:52 -05:00
|
|
|
fmt.Errorf("Bad source '%s': %s", src, err))
|
|
|
|
}
|
2015-02-08 20:25:27 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-02 06:22:52 -05:00
|
|
|
if len(p.config.Sources) < 1 {
|
2020-11-19 15:07:02 -05:00
|
|
|
errs = packersdk.MultiErrorAppend(errs,
|
2015-11-02 06:22:52 -05:00
|
|
|
errors.New("Source must be specified."))
|
|
|
|
}
|
|
|
|
|
2013-07-04 15:50:00 -04:00
|
|
|
if p.config.Destination == "" {
|
2020-11-19 15:07:02 -05:00
|
|
|
errs = packersdk.MultiErrorAppend(errs,
|
2013-08-06 18:30:49 -04:00
|
|
|
errors.New("Destination must be specified."))
|
2013-07-02 22:11:30 -04:00
|
|
|
}
|
|
|
|
|
2013-08-06 18:30:49 -04:00
|
|
|
if errs != nil && len(errs.Errors) > 0 {
|
|
|
|
return errs
|
2013-07-02 22:11:30 -04:00
|
|
|
}
|
2013-07-04 15:50:00 -04:00
|
|
|
|
2013-07-02 22:11:30 -04:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-19 18:10:00 -05:00
|
|
|
func (p *Provisioner) Provision(ctx context.Context, ui packersdk.Ui, comm packersdk.Communicator, generatedData map[string]interface{}) error {
|
2020-03-13 11:17:40 -04:00
|
|
|
if generatedData == nil {
|
|
|
|
generatedData = make(map[string]interface{})
|
|
|
|
}
|
|
|
|
p.config.ctx.Data = generatedData
|
|
|
|
|
2015-02-08 20:25:27 -05:00
|
|
|
if p.config.Direction == "download" {
|
|
|
|
return p.ProvisionDownload(ui, comm)
|
|
|
|
} else {
|
|
|
|
return p.ProvisionUpload(ui, comm)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-19 18:10:00 -05:00
|
|
|
func (p *Provisioner) ProvisionDownload(ui packersdk.Ui, comm packersdk.Communicator) error {
|
2020-08-02 14:09:47 -04:00
|
|
|
dst, err := interpolate.Render(p.config.Destination, &p.config.ctx)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error interpolating destination: %s", err)
|
|
|
|
}
|
2015-11-02 06:22:52 -05:00
|
|
|
for _, src := range p.config.Sources {
|
2020-03-13 11:17:40 -04:00
|
|
|
src, err := interpolate.Render(src, &p.config.ctx)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error interpolating source: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-11-26 17:39:29 -05:00
|
|
|
ui.Say(fmt.Sprintf("Downloading %s => %s", src, dst))
|
2016-07-06 16:42:26 -04:00
|
|
|
// ensure destination dir exists. p.config.Destination may either be a file or a dir.
|
2016-11-26 17:39:29 -05:00
|
|
|
dir := dst
|
2016-07-06 16:42:26 -04:00
|
|
|
// if it doesn't end with a /, set dir as the parent dir
|
2016-11-26 17:39:29 -05:00
|
|
|
if !strings.HasSuffix(dst, "/") {
|
2016-07-06 16:42:26 -04:00
|
|
|
dir = filepath.Dir(dir)
|
2016-11-26 17:39:29 -05:00
|
|
|
} else if !strings.HasSuffix(src, "/") && !strings.HasSuffix(src, "*") {
|
|
|
|
dst = filepath.Join(dst, filepath.Base(src))
|
2016-07-06 16:42:26 -04:00
|
|
|
}
|
|
|
|
if dir != "" {
|
|
|
|
err := os.MkdirAll(dir, os.FileMode(0755))
|
2015-11-02 06:22:52 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-07-06 16:42:26 -04:00
|
|
|
}
|
2016-11-26 17:39:29 -05:00
|
|
|
// if the src was a dir, download the dir
|
2017-03-28 21:29:55 -04:00
|
|
|
if strings.HasSuffix(src, "/") || strings.ContainsAny(src, "*?[") {
|
2016-11-26 17:39:29 -05:00
|
|
|
return comm.DownloadDir(src, dst, nil)
|
2015-11-02 06:22:52 -05:00
|
|
|
}
|
2015-02-08 20:25:27 -05:00
|
|
|
|
2016-11-26 17:39:29 -05:00
|
|
|
f, err := os.OpenFile(dst, os.O_CREATE|os.O_WRONLY|os.O_TRUNC, 0644)
|
2015-11-02 06:22:52 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
2015-02-08 20:25:27 -05:00
|
|
|
|
2018-08-07 16:31:52 -04:00
|
|
|
// Create MultiWriter for the current progress
|
2018-09-04 11:57:21 -04:00
|
|
|
pf := io.MultiWriter(f)
|
2018-08-07 16:31:52 -04:00
|
|
|
|
|
|
|
// Download the file
|
|
|
|
if err = comm.Download(src, pf); err != nil {
|
2015-11-02 06:22:52 -05:00
|
|
|
ui.Error(fmt.Sprintf("Download failed: %s", err))
|
|
|
|
return err
|
|
|
|
}
|
2015-02-08 20:25:27 -05:00
|
|
|
}
|
2015-11-02 06:22:52 -05:00
|
|
|
return nil
|
2015-02-08 20:25:27 -05:00
|
|
|
}
|
|
|
|
|
2020-11-19 18:10:00 -05:00
|
|
|
func (p *Provisioner) ProvisionUpload(ui packersdk.Ui, comm packersdk.Communicator) error {
|
2020-08-02 14:09:47 -04:00
|
|
|
dst, err := interpolate.Render(p.config.Destination, &p.config.ctx)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error interpolating destination: %s", err)
|
|
|
|
}
|
2015-11-02 06:22:52 -05:00
|
|
|
for _, src := range p.config.Sources {
|
2020-03-13 11:17:40 -04:00
|
|
|
src, err := interpolate.Render(src, &p.config.ctx)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error interpolating source: %s", err)
|
|
|
|
}
|
|
|
|
|
2016-11-26 17:39:29 -05:00
|
|
|
ui.Say(fmt.Sprintf("Uploading %s => %s", src, dst))
|
2013-09-09 16:58:23 -04:00
|
|
|
|
2015-11-02 06:22:52 -05:00
|
|
|
info, err := os.Stat(src)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2013-09-09 16:58:23 -04:00
|
|
|
|
2015-11-02 06:22:52 -05:00
|
|
|
// If we're uploading a directory, short circuit and do that
|
|
|
|
if info.IsDir() {
|
2020-08-06 14:04:00 -04:00
|
|
|
if err = comm.UploadDir(dst, src, nil); err != nil {
|
|
|
|
ui.Error(fmt.Sprintf("Upload failed: %s", err))
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
continue
|
2015-11-02 06:22:52 -05:00
|
|
|
}
|
2013-07-04 15:50:00 -04:00
|
|
|
|
2015-11-02 06:22:52 -05:00
|
|
|
// We're uploading a file...
|
|
|
|
f, err := os.Open(src)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
2014-05-10 00:03:35 -04:00
|
|
|
|
2015-11-02 06:22:52 -05:00
|
|
|
fi, err := f.Stat()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-08-07 02:38:30 -04:00
|
|
|
filedst := dst
|
2016-11-26 17:39:29 -05:00
|
|
|
if strings.HasSuffix(dst, "/") {
|
2020-08-07 02:38:30 -04:00
|
|
|
filedst = dst + filepath.Base(src)
|
2016-11-26 17:39:29 -05:00
|
|
|
}
|
|
|
|
|
Use the hashicorp/go-getter to download files
* removed packer.Cache and references since packer.Cache is never used except in the download step. The download step now uses the new func packer.CachePath(targetPath) for this, the behavior is the same.
* removed download code from packer that was reimplemented into the go-getter library: progress bar, http download restart, checksuming from file, skip already downloaded files, symlinking, make a download cancellable by context.
* on windows if packer is running without symlinking rights and we are getting a local file, the file will be copied instead to avoid errors.
* added unit tests for step_download that are now CI tested on windows, mac & linux.
* files are now downloaded under cache dir `sha1(filename + "?checksum=" + checksum) + file_extension`
* since the output dir is based on the source url and the checksum, when the checksum fails, the file is auto deleted.
* a download file is protected and locked by a file lock,
* updated docs
* updated go modules and vendors
2019-03-13 07:11:58 -04:00
|
|
|
pf := ui.TrackProgress(filepath.Base(src), 0, info.Size(), f)
|
|
|
|
defer pf.Close()
|
2018-08-07 16:31:52 -04:00
|
|
|
|
|
|
|
// Upload the file
|
2020-08-07 02:38:30 -04:00
|
|
|
if err = comm.Upload(filedst, pf, &fi); err != nil {
|
2018-09-21 17:19:35 -04:00
|
|
|
if strings.Contains(err.Error(), "Error restoring file") {
|
|
|
|
ui.Error(fmt.Sprintf("Upload failed: %s; this can occur when "+
|
|
|
|
"your file destination is a folder without a trailing "+
|
|
|
|
"slash.", err))
|
|
|
|
}
|
2015-11-02 06:22:52 -05:00
|
|
|
ui.Error(fmt.Sprintf("Upload failed: %s", err))
|
|
|
|
return err
|
|
|
|
}
|
2013-07-17 21:17:46 -04:00
|
|
|
}
|
2015-11-02 06:22:52 -05:00
|
|
|
return nil
|
2013-07-02 22:11:30 -04:00
|
|
|
}
|