2016-04-14 20:29:27 -04:00
|
|
|
package triton
|
|
|
|
|
|
|
|
import (
|
2017-04-26 15:07:45 -04:00
|
|
|
"errors"
|
2016-04-14 20:29:27 -04:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
|
2017-10-31 11:02:15 -04:00
|
|
|
"github.com/hashicorp/errwrap"
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/helper/communicator"
|
|
|
|
"github.com/hashicorp/packer/template/interpolate"
|
2017-10-31 11:02:15 -04:00
|
|
|
tgo "github.com/joyent/triton-go"
|
2017-04-26 15:07:45 -04:00
|
|
|
"github.com/joyent/triton-go/authentication"
|
2017-10-31 11:02:15 -04:00
|
|
|
"github.com/joyent/triton-go/compute"
|
|
|
|
"github.com/joyent/triton-go/network"
|
2016-04-14 20:29:27 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// AccessConfig is for common configuration related to Triton access
|
|
|
|
type AccessConfig struct {
|
|
|
|
Endpoint string `mapstructure:"triton_url"`
|
|
|
|
Account string `mapstructure:"triton_account"`
|
|
|
|
KeyID string `mapstructure:"triton_key_id"`
|
|
|
|
KeyMaterial string `mapstructure:"triton_key_material"`
|
2017-04-26 15:07:45 -04:00
|
|
|
|
|
|
|
signer authentication.Signer
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
2017-04-26 15:07:45 -04:00
|
|
|
// Prepare performs basic validation on the AccessConfig and ensures we can sign
|
|
|
|
// a request.
|
2016-04-14 20:29:27 -04:00
|
|
|
func (c *AccessConfig) Prepare(ctx *interpolate.Context) []error {
|
|
|
|
var errs []error
|
|
|
|
|
|
|
|
if c.Endpoint == "" {
|
2017-04-26 15:07:45 -04:00
|
|
|
// Use Joyent public cloud as the default endpoint if none is specified
|
2017-04-26 18:20:44 -04:00
|
|
|
c.Endpoint = "https://us-sw-1.api.joyent.com"
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if c.Account == "" {
|
2017-04-26 15:07:45 -04:00
|
|
|
errs = append(errs, errors.New("triton_account is required to use the triton builder"))
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if c.KeyID == "" {
|
2017-04-26 15:07:45 -04:00
|
|
|
errs = append(errs, errors.New("triton_key_id is required to use the triton builder"))
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
2017-04-26 15:07:45 -04:00
|
|
|
if c.KeyMaterial == "" {
|
|
|
|
signer, err := c.createSSHAgentSigner()
|
|
|
|
if err != nil {
|
|
|
|
errs = append(errs, err)
|
|
|
|
}
|
|
|
|
c.signer = signer
|
|
|
|
} else {
|
|
|
|
signer, err := c.createPrivateKeySigner()
|
|
|
|
if err != nil {
|
|
|
|
errs = append(errs, err)
|
|
|
|
}
|
|
|
|
c.signer = signer
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(errs) > 0 {
|
|
|
|
return errs
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-04-26 15:07:45 -04:00
|
|
|
func (c *AccessConfig) createSSHAgentSigner() (authentication.Signer, error) {
|
|
|
|
signer, err := authentication.NewSSHAgentSigner(c.KeyID, c.Account)
|
2016-04-14 20:29:27 -04:00
|
|
|
if err != nil {
|
2017-04-26 15:07:45 -04:00
|
|
|
return nil, fmt.Errorf("Error creating Triton request signer: %s", err)
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
2017-04-26 15:07:45 -04:00
|
|
|
// Ensure we can sign a request
|
|
|
|
_, err = signer.Sign("Wed, 26 Apr 2017 16:01:11 UTC")
|
2016-04-14 20:29:27 -04:00
|
|
|
if err != nil {
|
2017-04-26 15:07:45 -04:00
|
|
|
return nil, fmt.Errorf("Error signing test request: %s", err)
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
2017-04-26 15:07:45 -04:00
|
|
|
return signer, nil
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
2017-04-26 15:07:45 -04:00
|
|
|
func (c *AccessConfig) createPrivateKeySigner() (authentication.Signer, error) {
|
|
|
|
var privateKeyMaterial []byte
|
|
|
|
var err error
|
2016-04-14 20:29:27 -04:00
|
|
|
|
|
|
|
// Check for keyMaterial being a file path
|
2017-04-26 15:07:45 -04:00
|
|
|
if _, err = os.Stat(c.KeyMaterial); err != nil {
|
|
|
|
privateKeyMaterial = []byte(c.KeyMaterial)
|
|
|
|
} else {
|
|
|
|
privateKeyMaterial, err = ioutil.ReadFile(c.KeyMaterial)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error reading key material from path '%s': %s",
|
|
|
|
c.KeyMaterial, err)
|
|
|
|
}
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
2017-04-26 15:07:45 -04:00
|
|
|
// Create signer
|
|
|
|
signer, err := authentication.NewPrivateKeySigner(c.KeyID, privateKeyMaterial, c.Account)
|
2016-04-14 20:29:27 -04:00
|
|
|
if err != nil {
|
2017-04-26 15:07:45 -04:00
|
|
|
return nil, fmt.Errorf("Error creating Triton request signer: %s", err)
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|
|
|
|
|
2017-04-26 15:07:45 -04:00
|
|
|
// Ensure we can sign a request
|
|
|
|
_, err = signer.Sign("Wed, 26 Apr 2017 16:01:11 UTC")
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error signing test request: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return signer, nil
|
|
|
|
}
|
|
|
|
|
2017-10-31 11:02:15 -04:00
|
|
|
func (c *AccessConfig) CreateTritonClient() (*Client, error) {
|
|
|
|
|
|
|
|
config := &tgo.ClientConfig{
|
|
|
|
AccountName: c.Account,
|
|
|
|
TritonURL: c.Endpoint,
|
|
|
|
Signers: []authentication.Signer{c.signer},
|
|
|
|
}
|
|
|
|
|
|
|
|
return &Client{
|
|
|
|
config: config,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type Client struct {
|
|
|
|
config *tgo.ClientConfig
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Client) Compute() (*compute.ComputeClient, error) {
|
|
|
|
computeClient, err := compute.NewClient(c.config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errwrap.Wrapf("Error Creating Triton Compute Client: {{err}}", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return computeClient, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Client) Network() (*network.NetworkClient, error) {
|
|
|
|
networkClient, err := network.NewClient(c.config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errwrap.Wrapf("Error Creating Triton Network Client: {{err}}", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return networkClient, nil
|
2017-04-26 15:07:45 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *AccessConfig) Comm() communicator.Config {
|
|
|
|
return communicator.Config{}
|
2016-04-14 20:29:27 -04:00
|
|
|
}
|