2016-01-11 06:22:41 -05:00
|
|
|
package cloudstack
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2017-07-14 15:25:20 -04:00
|
|
|
"net"
|
|
|
|
"os"
|
2016-01-11 06:22:41 -05:00
|
|
|
|
2017-04-04 16:39:01 -04:00
|
|
|
packerssh "github.com/hashicorp/packer/communicator/ssh"
|
2018-01-19 19:18:44 -05:00
|
|
|
"github.com/hashicorp/packer/helper/multistep"
|
2016-01-11 06:22:41 -05:00
|
|
|
"golang.org/x/crypto/ssh"
|
2017-07-14 15:25:20 -04:00
|
|
|
"golang.org/x/crypto/ssh/agent"
|
2016-01-11 06:22:41 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
func commHost(state multistep.StateBag) (string, error) {
|
2017-07-26 13:01:12 -04:00
|
|
|
ip, hasIP := state.Get("ipaddress").(string)
|
|
|
|
if !hasIP {
|
2017-07-17 03:05:12 -04:00
|
|
|
return "", fmt.Errorf("Failed to retrieve IP address")
|
|
|
|
}
|
|
|
|
|
|
|
|
return ip, nil
|
|
|
|
}
|
2016-01-11 06:22:41 -05:00
|
|
|
|
2017-07-17 03:05:12 -04:00
|
|
|
func commPort(state multistep.StateBag) (int, error) {
|
|
|
|
commPort, hasPort := state.Get("commPort").(int)
|
|
|
|
if !hasPort {
|
|
|
|
return 0, fmt.Errorf("Failed to retrieve communication port")
|
2016-01-11 06:22:41 -05:00
|
|
|
}
|
|
|
|
|
2017-07-17 03:05:12 -04:00
|
|
|
return commPort, nil
|
2016-01-11 06:22:41 -05:00
|
|
|
}
|
|
|
|
|
2017-07-17 03:05:12 -04:00
|
|
|
func sshConfig(useAgent bool, username, password string) func(state multistep.StateBag) (*ssh.ClientConfig, error) {
|
2017-07-14 15:25:20 -04:00
|
|
|
return func(state multistep.StateBag) (*ssh.ClientConfig, error) {
|
|
|
|
if useAgent {
|
|
|
|
authSock := os.Getenv("SSH_AUTH_SOCK")
|
|
|
|
if authSock == "" {
|
|
|
|
return nil, fmt.Errorf("SSH_AUTH_SOCK is not set")
|
|
|
|
}
|
2016-01-11 06:22:41 -05:00
|
|
|
|
2017-07-14 15:25:20 -04:00
|
|
|
sshAgent, err := net.Dial("unix", authSock)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Cannot connect to SSH Agent socket %q: %s", authSock, err)
|
|
|
|
}
|
2016-01-11 06:22:41 -05:00
|
|
|
|
2017-07-14 15:25:20 -04:00
|
|
|
return &ssh.ClientConfig{
|
|
|
|
User: username,
|
|
|
|
Auth: []ssh.AuthMethod{
|
|
|
|
ssh.PublicKeysCallback(agent.NewClient(sshAgent).Signers),
|
|
|
|
},
|
|
|
|
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
|
|
|
|
}, nil
|
2016-01-11 06:22:41 -05:00
|
|
|
}
|
|
|
|
|
2017-07-14 15:25:20 -04:00
|
|
|
privateKey, hasKey := state.GetOk("privateKey")
|
2016-01-11 06:22:41 -05:00
|
|
|
|
2017-07-14 15:25:20 -04:00
|
|
|
if hasKey {
|
|
|
|
signer, err := ssh.ParsePrivateKey([]byte(privateKey.(string)))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error setting up SSH config: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &ssh.ClientConfig{
|
|
|
|
User: username,
|
|
|
|
Auth: []ssh.AuthMethod{
|
|
|
|
ssh.PublicKeys(signer),
|
|
|
|
},
|
|
|
|
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
|
|
|
|
}, nil
|
|
|
|
|
|
|
|
} else {
|
2016-01-11 06:22:41 -05:00
|
|
|
|
2017-07-14 15:25:20 -04:00
|
|
|
return &ssh.ClientConfig{
|
|
|
|
User: username,
|
|
|
|
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
|
|
|
|
Auth: []ssh.AuthMethod{
|
|
|
|
ssh.Password(password),
|
|
|
|
ssh.KeyboardInteractive(
|
|
|
|
packerssh.PasswordKeyboardInteractive(password)),
|
|
|
|
}}, nil
|
|
|
|
}
|
|
|
|
}
|
2016-01-11 06:22:41 -05:00
|
|
|
}
|