2013-05-20 18:47:41 -04:00
|
|
|
package ssh
|
|
|
|
|
|
|
|
import (
|
2013-07-17 21:15:42 -04:00
|
|
|
"bufio"
|
2013-05-20 18:47:41 -04:00
|
|
|
"bytes"
|
2019-04-03 11:14:55 -04:00
|
|
|
"context"
|
2013-07-07 15:23:32 -04:00
|
|
|
"errors"
|
2013-05-24 11:23:48 -04:00
|
|
|
"fmt"
|
2013-05-20 18:52:34 -04:00
|
|
|
"io"
|
2013-11-02 04:07:45 -04:00
|
|
|
"io/ioutil"
|
2013-05-20 18:47:41 -04:00
|
|
|
"log"
|
|
|
|
"net"
|
2013-08-24 20:14:15 -04:00
|
|
|
"os"
|
2013-05-24 11:23:48 -04:00
|
|
|
"path/filepath"
|
2015-02-08 20:24:31 -05:00
|
|
|
"strconv"
|
2015-11-02 06:22:52 -05:00
|
|
|
"strings"
|
2015-07-02 06:40:47 -04:00
|
|
|
"time"
|
|
|
|
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/packer"
|
2018-12-12 09:45:00 -05:00
|
|
|
"github.com/hashicorp/packer/packer/tmp"
|
2015-07-26 19:39:56 -04:00
|
|
|
"github.com/pkg/sftp"
|
2015-07-02 06:40:47 -04:00
|
|
|
"golang.org/x/crypto/ssh"
|
|
|
|
"golang.org/x/crypto/ssh/agent"
|
2013-05-20 18:47:41 -04:00
|
|
|
)
|
|
|
|
|
2015-07-02 14:58:51 -04:00
|
|
|
// ErrHandshakeTimeout is returned from New() whenever we're unable to establish
|
|
|
|
// an ssh connection within a certain timeframe. By default the handshake time-
|
|
|
|
// out period is 1 minute. You can change it with Config.HandshakeTimeout.
|
2015-07-02 06:40:47 -04:00
|
|
|
var ErrHandshakeTimeout = fmt.Errorf("Timeout during SSH handshake")
|
|
|
|
|
2013-05-20 18:47:41 -04:00
|
|
|
type comm struct {
|
2014-04-10 04:48:55 -04:00
|
|
|
client *ssh.Client
|
|
|
|
config *Config
|
|
|
|
conn net.Conn
|
|
|
|
address string
|
2013-07-14 07:22:41 -04:00
|
|
|
}
|
|
|
|
|
2019-07-26 17:11:52 -04:00
|
|
|
// TunnelDirection is the supported tunnel directions
|
|
|
|
type TunnelDirection int
|
|
|
|
|
|
|
|
const (
|
|
|
|
UnsetTunnel TunnelDirection = iota
|
|
|
|
RemoteTunnel
|
|
|
|
LocalTunnel
|
|
|
|
)
|
|
|
|
|
|
|
|
// TunnelSpec represents a request to map a port on one side of the SSH connection to the other
|
|
|
|
type TunnelSpec struct {
|
|
|
|
Direction TunnelDirection
|
|
|
|
ListenType string
|
|
|
|
ListenAddr string
|
|
|
|
ForwardType string
|
|
|
|
ForwardAddr string
|
|
|
|
}
|
|
|
|
|
2013-07-14 07:22:41 -04:00
|
|
|
// Config is the structure used to configure the SSH communicator.
|
|
|
|
type Config struct {
|
|
|
|
// The configuration of the Go SSH connection
|
|
|
|
SSHConfig *ssh.ClientConfig
|
|
|
|
|
|
|
|
// Connection returns a new connection. The current connection
|
|
|
|
// in use will be closed as part of the Close method, or in the
|
|
|
|
// case an error occurs.
|
|
|
|
Connection func() (net.Conn, error)
|
2013-08-27 19:51:05 -04:00
|
|
|
|
2015-02-12 23:18:54 -05:00
|
|
|
// Pty, if true, will request a pty from the remote end.
|
|
|
|
Pty bool
|
2015-06-23 17:52:37 -04:00
|
|
|
|
2017-06-19 10:21:33 -04:00
|
|
|
// DisableAgentForwarding, if true, will not forward the SSH agent.
|
|
|
|
DisableAgentForwarding bool
|
2015-07-02 06:40:47 -04:00
|
|
|
|
|
|
|
// HandshakeTimeout limits the amount of time we'll wait to handshake before
|
|
|
|
// saying the connection failed.
|
|
|
|
HandshakeTimeout time.Duration
|
2015-07-26 19:39:56 -04:00
|
|
|
|
|
|
|
// UseSftp, if true, sftp will be used instead of scp for file transfers
|
|
|
|
UseSftp bool
|
2018-01-31 01:00:37 -05:00
|
|
|
|
|
|
|
// KeepAliveInterval sets how often we send a channel request to the
|
|
|
|
// server. A value < 0 disables.
|
|
|
|
KeepAliveInterval time.Duration
|
2018-01-31 02:09:12 -05:00
|
|
|
|
|
|
|
// Timeout is how long to wait for a read or write to succeed.
|
|
|
|
Timeout time.Duration
|
2019-07-26 17:11:52 -04:00
|
|
|
|
|
|
|
Tunnels []TunnelSpec
|
2013-05-20 18:47:41 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Creates a new packer.Communicator implementation over SSH. This takes
|
|
|
|
// an already existing TCP connection and SSH configuration.
|
2014-04-10 04:48:55 -04:00
|
|
|
func New(address string, config *Config) (result *comm, err error) {
|
2013-07-14 07:22:41 -04:00
|
|
|
// Establish an initial connection and connect
|
|
|
|
result = &comm{
|
2014-04-10 04:48:55 -04:00
|
|
|
config: config,
|
|
|
|
address: address,
|
2013-07-14 07:22:41 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if err = result.reconnect(); err != nil {
|
|
|
|
result = nil
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2013-05-20 18:47:41 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-04-03 11:14:55 -04:00
|
|
|
func (c *comm) Start(ctx context.Context, cmd *packer.RemoteCmd) (err error) {
|
2013-07-14 07:55:02 -04:00
|
|
|
session, err := c.newSession()
|
2013-05-20 18:47:41 -04:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Setup our session
|
2013-06-03 02:27:01 -04:00
|
|
|
session.Stdin = cmd.Stdin
|
|
|
|
session.Stdout = cmd.Stdout
|
|
|
|
session.Stderr = cmd.Stderr
|
2013-05-20 18:47:41 -04:00
|
|
|
|
2015-02-12 23:18:54 -05:00
|
|
|
if c.config.Pty {
|
2013-08-27 19:51:05 -04:00
|
|
|
// Request a PTY
|
|
|
|
termModes := ssh.TerminalModes{
|
|
|
|
ssh.ECHO: 0, // do not echo
|
|
|
|
ssh.TTY_OP_ISPEED: 14400, // input speed = 14.4kbaud
|
|
|
|
ssh.TTY_OP_OSPEED: 14400, // output speed = 14.4kbaud
|
|
|
|
}
|
2013-06-23 20:36:45 -04:00
|
|
|
|
2016-04-06 15:40:19 -04:00
|
|
|
if err = session.RequestPty("xterm", 40, 80, termModes); err != nil {
|
2013-08-27 19:51:05 -04:00
|
|
|
return
|
|
|
|
}
|
2013-06-23 20:36:45 -04:00
|
|
|
}
|
|
|
|
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] starting remote command: %s", cmd.Command)
|
2013-06-03 02:27:01 -04:00
|
|
|
err = session.Start(cmd.Command + "\n")
|
2013-05-20 18:47:41 -04:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-01-31 01:00:37 -05:00
|
|
|
go func() {
|
2018-02-12 13:45:53 -05:00
|
|
|
if c.config.KeepAliveInterval <= 0 {
|
2018-01-31 01:00:37 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
c := time.NewTicker(c.config.KeepAliveInterval)
|
|
|
|
defer c.Stop()
|
|
|
|
for range c.C {
|
|
|
|
_, err := session.SendRequest("keepalive@packer.io", true, nil)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2013-05-20 18:47:41 -04:00
|
|
|
// Start a goroutine to wait for the session to end and set the
|
|
|
|
// exit boolean and status.
|
|
|
|
go func() {
|
|
|
|
defer session.Close()
|
2013-08-28 01:12:21 -04:00
|
|
|
|
2013-05-20 18:47:41 -04:00
|
|
|
err := session.Wait()
|
2013-07-29 15:12:42 -04:00
|
|
|
exitStatus := 0
|
2013-05-20 18:47:41 -04:00
|
|
|
if err != nil {
|
2016-10-05 21:05:01 -04:00
|
|
|
switch err.(type) {
|
|
|
|
case *ssh.ExitError:
|
|
|
|
exitStatus = err.(*ssh.ExitError).ExitStatus()
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[ERROR] Remote command exited with '%d': %s", exitStatus, cmd.Command)
|
2016-10-05 21:05:01 -04:00
|
|
|
case *ssh.ExitMissingError:
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[ERROR] Remote command exited without exit status or exit signal.")
|
2016-10-19 21:30:19 -04:00
|
|
|
exitStatus = packer.CmdDisconnect
|
2016-10-05 21:05:01 -04:00
|
|
|
default:
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[ERROR] Error occurred waiting for ssh session: %s", err.Error())
|
2013-05-20 18:47:41 -04:00
|
|
|
}
|
|
|
|
}
|
2013-07-29 15:12:42 -04:00
|
|
|
cmd.SetExited(exitStatus)
|
2013-08-28 01:12:21 -04:00
|
|
|
}()
|
2013-05-20 18:47:41 -04:00
|
|
|
return
|
|
|
|
}
|
2013-05-20 18:52:34 -04:00
|
|
|
|
2014-05-10 00:03:35 -04:00
|
|
|
func (c *comm) Upload(path string, input io.Reader, fi *os.FileInfo) error {
|
2015-07-26 19:39:56 -04:00
|
|
|
if c.config.UseSftp {
|
|
|
|
return c.sftpUploadSession(path, input, fi)
|
|
|
|
} else {
|
|
|
|
return c.scpUploadSession(path, input, fi)
|
2013-05-24 12:06:13 -04:00
|
|
|
}
|
2013-05-20 18:52:34 -04:00
|
|
|
}
|
|
|
|
|
2013-08-23 22:31:33 -04:00
|
|
|
func (c *comm) UploadDir(dst string, src string, excl []string) error {
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] Upload dir '%s' to '%s'", src, dst)
|
2015-07-26 19:39:56 -04:00
|
|
|
if c.config.UseSftp {
|
|
|
|
return c.sftpUploadDirSession(dst, src, excl)
|
|
|
|
} else {
|
|
|
|
return c.scpUploadDirSession(dst, src, excl)
|
2013-08-24 20:14:15 -04:00
|
|
|
}
|
2013-08-23 22:31:33 -04:00
|
|
|
}
|
|
|
|
|
2015-11-02 06:22:52 -05:00
|
|
|
func (c *comm) DownloadDir(src string, dst string, excl []string) error {
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] Download dir '%s' to '%s'", src, dst)
|
2015-11-02 06:22:52 -05:00
|
|
|
scpFunc := func(w io.Writer, stdoutR *bufio.Reader) error {
|
2016-09-18 08:46:37 -04:00
|
|
|
dirStack := []string{dst}
|
2015-11-02 06:22:52 -05:00
|
|
|
for {
|
|
|
|
fmt.Fprint(w, "\x00")
|
|
|
|
|
|
|
|
// read file info
|
|
|
|
fi, err := stdoutR.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(fi) < 0 {
|
|
|
|
return fmt.Errorf("empty response from server")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch fi[0] {
|
|
|
|
case '\x01', '\x02':
|
2016-11-01 17:08:04 -04:00
|
|
|
return fmt.Errorf("%s", fi[1:])
|
2015-11-02 06:22:52 -05:00
|
|
|
case 'C', 'D':
|
|
|
|
break
|
2016-09-18 08:46:37 -04:00
|
|
|
case 'E':
|
|
|
|
dirStack = dirStack[:len(dirStack)-1]
|
2016-11-26 17:39:29 -05:00
|
|
|
if len(dirStack) == 0 {
|
2016-09-18 08:46:37 -04:00
|
|
|
fmt.Fprint(w, "\x00")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
continue
|
2015-11-02 06:22:52 -05:00
|
|
|
default:
|
|
|
|
return fmt.Errorf("unexpected server response (%x)", fi[0])
|
|
|
|
}
|
|
|
|
|
2016-11-26 17:39:29 -05:00
|
|
|
var mode int64
|
2015-11-02 06:22:52 -05:00
|
|
|
var size int64
|
|
|
|
var name string
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] Download dir str:%s", fi)
|
2016-11-26 17:39:29 -05:00
|
|
|
n, err := fmt.Sscanf(fi[1:], "%o %d %s", &mode, &size, &name)
|
2015-11-02 06:22:52 -05:00
|
|
|
if err != nil || n != 3 {
|
|
|
|
return fmt.Errorf("can't parse server response (%s)", fi)
|
|
|
|
}
|
|
|
|
if size < 0 {
|
|
|
|
return fmt.Errorf("negative file size")
|
|
|
|
}
|
|
|
|
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] Download dir mode:%0o size:%d name:%s", mode, size, name)
|
2016-09-18 08:46:37 -04:00
|
|
|
|
|
|
|
dst = filepath.Join(dirStack...)
|
2015-11-02 06:22:52 -05:00
|
|
|
switch fi[0] {
|
|
|
|
case 'D':
|
2016-11-26 17:39:29 -05:00
|
|
|
err = os.MkdirAll(filepath.Join(dst, name), os.FileMode(mode))
|
2015-11-02 06:22:52 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-09-18 08:46:37 -04:00
|
|
|
dirStack = append(dirStack, name)
|
|
|
|
continue
|
2015-11-02 06:22:52 -05:00
|
|
|
case 'C':
|
|
|
|
fmt.Fprint(w, "\x00")
|
2016-11-26 17:39:29 -05:00
|
|
|
err = scpDownloadFile(filepath.Join(dst, name), stdoutR, size, os.FileMode(mode))
|
2015-11-02 06:22:52 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := checkSCPStatus(stdoutR); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return c.scpSession("scp -vrf "+src, scpFunc)
|
|
|
|
}
|
|
|
|
|
2015-02-08 20:24:31 -05:00
|
|
|
func (c *comm) Download(path string, output io.Writer) error {
|
2015-07-26 19:39:56 -04:00
|
|
|
if c.config.UseSftp {
|
|
|
|
return c.sftpDownloadSession(path, output)
|
2015-02-08 20:24:31 -05:00
|
|
|
}
|
2015-11-02 06:22:52 -05:00
|
|
|
return c.scpDownloadSession(path, output)
|
2013-05-20 18:52:34 -04:00
|
|
|
}
|
2013-07-14 07:22:41 -04:00
|
|
|
|
2013-08-12 18:22:31 -04:00
|
|
|
func (c *comm) newSession() (session *ssh.Session, err error) {
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Println("[DEBUG] Opening new ssh session")
|
2013-08-12 18:22:31 -04:00
|
|
|
if c.client == nil {
|
|
|
|
err = errors.New("client not available")
|
|
|
|
} else {
|
|
|
|
session, err = c.client.NewSession()
|
|
|
|
}
|
|
|
|
|
2013-07-14 07:55:02 -04:00
|
|
|
if err != nil {
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[ERROR] ssh session open error: '%s', attempting reconnect", err)
|
2013-07-14 07:55:02 -04:00
|
|
|
if err := c.reconnect(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-10-14 14:23:35 -04:00
|
|
|
if c.client == nil {
|
2017-03-20 17:30:53 -04:00
|
|
|
return nil, errors.New("client not available")
|
2016-10-14 14:23:35 -04:00
|
|
|
} else {
|
2017-03-20 17:30:53 -04:00
|
|
|
return c.client.NewSession()
|
2016-10-14 14:23:35 -04:00
|
|
|
}
|
2013-07-14 07:55:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return session, nil
|
|
|
|
}
|
|
|
|
|
2013-07-14 07:22:41 -04:00
|
|
|
func (c *comm) reconnect() (err error) {
|
|
|
|
if c.conn != nil {
|
2017-03-30 05:14:49 -04:00
|
|
|
// Ignore errors here because we don't care if it fails
|
|
|
|
c.conn.Close()
|
2013-07-14 07:22:41 -04:00
|
|
|
}
|
|
|
|
|
2013-08-12 18:22:31 -04:00
|
|
|
// Set the conn and client to nil since we'll recreate it
|
|
|
|
c.conn = nil
|
|
|
|
c.client = nil
|
|
|
|
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] reconnecting to TCP connection for SSH")
|
2013-07-14 07:22:41 -04:00
|
|
|
c.conn, err = c.config.Connection()
|
|
|
|
if err != nil {
|
2013-10-14 04:21:52 -04:00
|
|
|
// Explicitly set this to the REAL nil. Connection() can return
|
|
|
|
// a nil implementation of net.Conn which will make the
|
|
|
|
// "if c.conn == nil" check fail above. Read here for more information
|
|
|
|
// on this psychotic language feature:
|
|
|
|
//
|
|
|
|
// http://golang.org/doc/faq#nil_error
|
|
|
|
c.conn = nil
|
|
|
|
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[ERROR] reconnection error: %s", err)
|
2013-07-14 07:22:41 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-01-31 02:09:12 -05:00
|
|
|
if c.config.Timeout > 0 {
|
|
|
|
c.conn = &timeoutConn{c.conn, c.config.Timeout, c.config.Timeout}
|
|
|
|
}
|
|
|
|
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] handshaking with SSH")
|
2015-07-02 06:40:47 -04:00
|
|
|
|
|
|
|
// Default timeout to 1 minute if it wasn't specified (zero value). For
|
|
|
|
// when you need to handshake from low orbit.
|
|
|
|
var duration time.Duration
|
|
|
|
if c.config.HandshakeTimeout == 0 {
|
|
|
|
duration = 1 * time.Minute
|
|
|
|
} else {
|
|
|
|
duration = c.config.HandshakeTimeout
|
|
|
|
}
|
|
|
|
|
2015-07-02 14:58:51 -04:00
|
|
|
connectionEstablished := make(chan struct{}, 1)
|
2015-07-02 06:40:47 -04:00
|
|
|
|
|
|
|
var sshConn ssh.Conn
|
|
|
|
var sshChan <-chan ssh.NewChannel
|
|
|
|
var req <-chan *ssh.Request
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
sshConn, sshChan, req, err = ssh.NewClientConn(c.conn, c.address, c.config.SSHConfig)
|
2015-07-02 14:58:51 -04:00
|
|
|
close(connectionEstablished)
|
2015-07-02 06:40:47 -04:00
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-connectionEstablished:
|
|
|
|
// We don't need to do anything here. We just want select to block until
|
|
|
|
// we connect or timeout.
|
2015-07-02 14:58:51 -04:00
|
|
|
case <-time.After(duration):
|
2015-07-02 06:55:18 -04:00
|
|
|
if c.conn != nil {
|
|
|
|
c.conn.Close()
|
|
|
|
}
|
|
|
|
if sshConn != nil {
|
|
|
|
sshConn.Close()
|
|
|
|
}
|
2015-07-02 06:40:47 -04:00
|
|
|
return ErrHandshakeTimeout
|
|
|
|
}
|
|
|
|
|
2013-07-14 07:55:02 -04:00
|
|
|
if err != nil {
|
2015-07-02 06:40:47 -04:00
|
|
|
return
|
2013-07-14 07:55:02 -04:00
|
|
|
}
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] handshake complete!")
|
2014-04-10 04:48:55 -04:00
|
|
|
if sshConn != nil {
|
|
|
|
c.client = ssh.NewClient(sshConn, sshChan, req)
|
|
|
|
}
|
2015-06-13 20:15:49 -04:00
|
|
|
c.connectToAgent()
|
2019-08-20 14:46:43 -04:00
|
|
|
err = c.connectTunnels(sshConn)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
2013-07-14 07:55:02 -04:00
|
|
|
|
2013-07-14 07:22:41 -04:00
|
|
|
return
|
|
|
|
}
|
2013-07-17 21:15:42 -04:00
|
|
|
|
2019-08-20 14:46:43 -04:00
|
|
|
func (c *comm) connectTunnels(sshConn ssh.Conn) (err error) {
|
2019-07-26 17:11:52 -04:00
|
|
|
if c.client == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-08-20 14:46:43 -04:00
|
|
|
if len(c.config.Tunnels) == 0 {
|
|
|
|
// No Tunnels to configure
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-07-26 17:11:52 -04:00
|
|
|
// Start remote forwards of ports to ourselves.
|
2019-08-20 14:46:43 -04:00
|
|
|
log.Printf("[DEBUG] Tunnel configuration: %v", c.config.Tunnels)
|
2019-07-26 17:11:52 -04:00
|
|
|
for _, v := range c.config.Tunnels {
|
|
|
|
done := make(chan struct{})
|
2019-08-20 14:46:43 -04:00
|
|
|
var listener net.Listener
|
2019-07-26 17:11:52 -04:00
|
|
|
switch v.Direction {
|
|
|
|
case RemoteTunnel:
|
|
|
|
// This requests the sshd Host to bind a port and send traffic back to us
|
2019-08-20 14:46:43 -04:00
|
|
|
listener, err = c.client.Listen(v.ListenType, v.ListenAddr)
|
2019-07-26 17:11:52 -04:00
|
|
|
if err != nil {
|
2019-08-20 14:46:43 -04:00
|
|
|
err = fmt.Errorf("Tunnel: Failed to bind remote ('%v'): %s", v, err)
|
2019-07-26 17:11:52 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Printf("[INFO] Tunnel: Remote bound on %s forwarding to %s", v.ListenAddr, v.ForwardAddr)
|
|
|
|
connectFunc := ConnectFunc(v.ForwardType, v.ForwardAddr)
|
|
|
|
go ProxyServe(listener, done, connectFunc)
|
|
|
|
// Wait for our sshConn to be shutdown
|
|
|
|
// FIXME: Is there a better "on-shutdown" we can wait on?
|
|
|
|
go shutdownProxyTunnel(sshConn, done, listener)
|
|
|
|
case LocalTunnel:
|
|
|
|
// This binds locally and sends traffic back to the sshd host
|
2019-08-20 14:46:43 -04:00
|
|
|
listener, err = net.Listen(v.ListenType, v.ListenAddr)
|
2019-07-26 17:11:52 -04:00
|
|
|
if err != nil {
|
2019-08-20 14:46:43 -04:00
|
|
|
err = fmt.Errorf("Tunnel: Failed to bind local ('%v'): %s", v, err)
|
2019-07-26 17:11:52 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Printf("[INFO] Tunnel: Local bound on %s forwarding to %s", v.ListenAddr, v.ForwardAddr)
|
|
|
|
connectFunc := func() (net.Conn, error) {
|
|
|
|
// This Dial occurs on the SSH server's side
|
|
|
|
return c.client.Dial(v.ForwardType, v.ForwardAddr)
|
|
|
|
}
|
|
|
|
go ProxyServe(listener, done, connectFunc)
|
|
|
|
// FIXME: Is there a better "on-shutdown" we can wait on?
|
|
|
|
go shutdownProxyTunnel(sshConn, done, listener)
|
|
|
|
default:
|
2019-08-20 14:46:43 -04:00
|
|
|
err = fmt.Errorf("Tunnel: Unknown tunnel direction ('%v'): %v", v, v.Direction)
|
|
|
|
return
|
2019-07-26 17:11:52 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// shutdownProxyTunnel waits for our sshConn to be shutdown and closes the listeners
|
|
|
|
func shutdownProxyTunnel(sshConn ssh.Conn, done chan struct{}, listener net.Listener) {
|
|
|
|
sshConn.Wait()
|
|
|
|
log.Printf("[INFO] Tunnel: Shutting down listener %v", listener)
|
|
|
|
done <- struct{}{}
|
|
|
|
close(done)
|
|
|
|
listener.Close()
|
|
|
|
}
|
|
|
|
|
2015-06-13 20:15:49 -04:00
|
|
|
func (c *comm) connectToAgent() {
|
|
|
|
if c.client == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-06-19 10:21:33 -04:00
|
|
|
if c.config.DisableAgentForwarding {
|
2015-06-26 13:52:21 -04:00
|
|
|
log.Printf("[INFO] SSH agent forwarding is disabled.")
|
2015-06-23 17:52:37 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-06-13 20:15:49 -04:00
|
|
|
// open connection to the local agent
|
|
|
|
socketLocation := os.Getenv("SSH_AUTH_SOCK")
|
|
|
|
if socketLocation == "" {
|
2015-06-13 22:00:28 -04:00
|
|
|
log.Printf("[INFO] no local agent socket, will not connect agent")
|
2015-06-13 20:15:49 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
agentConn, err := net.Dial("unix", socketLocation)
|
|
|
|
if err != nil {
|
2015-06-13 22:00:28 -04:00
|
|
|
log.Printf("[ERROR] could not connect to local agent socket: %s", socketLocation)
|
2015-06-13 20:15:49 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// create agent and add in auth
|
|
|
|
forwardingAgent := agent.NewClient(agentConn)
|
|
|
|
if forwardingAgent == nil {
|
2015-06-13 22:00:28 -04:00
|
|
|
log.Printf("[ERROR] Could not create agent client")
|
2015-06-13 20:15:49 -04:00
|
|
|
agentConn.Close()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// add callback for forwarding agent to SSH config
|
|
|
|
// XXX - might want to handle reconnects appending multiple callbacks
|
|
|
|
auth := ssh.PublicKeysCallback(forwardingAgent.Signers)
|
|
|
|
c.config.SSHConfig.Auth = append(c.config.SSHConfig.Auth, auth)
|
|
|
|
agent.ForwardToAgent(c.client, forwardingAgent)
|
|
|
|
|
|
|
|
// Setup a session to request agent forwarding
|
|
|
|
session, err := c.newSession()
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer session.Close()
|
|
|
|
|
|
|
|
err = agent.RequestAgentForwarding(session)
|
|
|
|
if err != nil {
|
2015-06-13 22:00:28 -04:00
|
|
|
log.Printf("[ERROR] RequestAgentForwarding: %#v", err)
|
2015-06-13 20:15:49 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-06-13 22:00:28 -04:00
|
|
|
log.Printf("[INFO] agent forwarding enabled")
|
2015-06-13 20:15:49 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-07-26 19:39:56 -04:00
|
|
|
func (c *comm) sftpUploadSession(path string, input io.Reader, fi *os.FileInfo) error {
|
|
|
|
sftpFunc := func(client *sftp.Client) error {
|
2017-10-05 13:44:18 -04:00
|
|
|
return c.sftpUploadFile(path, input, client, fi)
|
2015-07-26 19:39:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return c.sftpSession(sftpFunc)
|
|
|
|
}
|
|
|
|
|
2017-10-05 13:44:18 -04:00
|
|
|
func (c *comm) sftpUploadFile(path string, input io.Reader, client *sftp.Client, fi *os.FileInfo) error {
|
2015-07-26 19:39:56 -04:00
|
|
|
log.Printf("[DEBUG] sftp: uploading %s", path)
|
|
|
|
f, err := client.Create(path)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
if _, err = io.Copy(f, input); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if fi != nil && (*fi).Mode().IsRegular() {
|
|
|
|
mode := (*fi).Mode().Perm()
|
|
|
|
err = client.Chmod(path, mode)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *comm) sftpUploadDirSession(dst string, src string, excl []string) error {
|
|
|
|
sftpFunc := func(client *sftp.Client) error {
|
|
|
|
rootDst := dst
|
|
|
|
if src[len(src)-1] != '/' {
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] No trailing slash, creating the source directory name")
|
2015-07-26 19:39:56 -04:00
|
|
|
rootDst = filepath.Join(dst, filepath.Base(src))
|
|
|
|
}
|
|
|
|
walkFunc := func(path string, info os.FileInfo, err error) error {
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Calculate the final destination using the
|
|
|
|
// base source and root destination
|
|
|
|
relSrc, err := filepath.Rel(src, path)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
finalDst := filepath.Join(rootDst, relSrc)
|
|
|
|
|
|
|
|
// In Windows, Join uses backslashes which we don't want to get
|
|
|
|
// to the sftp server
|
|
|
|
finalDst = filepath.ToSlash(finalDst)
|
|
|
|
|
|
|
|
// Skip the creation of the target destination directory since
|
|
|
|
// it should exist and we might not even own it
|
|
|
|
if finalDst == dst {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-10-05 13:44:18 -04:00
|
|
|
return c.sftpVisitFile(finalDst, path, info, client)
|
2015-07-26 19:39:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return filepath.Walk(src, walkFunc)
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.sftpSession(sftpFunc)
|
|
|
|
}
|
|
|
|
|
2017-10-05 13:44:18 -04:00
|
|
|
func (c *comm) sftpMkdir(path string, client *sftp.Client, fi os.FileInfo) error {
|
2015-07-26 19:39:56 -04:00
|
|
|
log.Printf("[DEBUG] sftp: creating dir %s", path)
|
|
|
|
|
|
|
|
if err := client.Mkdir(path); err != nil {
|
|
|
|
// Do not consider it an error if the directory existed
|
|
|
|
remoteFi, fiErr := client.Lstat(path)
|
|
|
|
if fiErr != nil || !remoteFi.IsDir() {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mode := fi.Mode().Perm()
|
|
|
|
if err := client.Chmod(path, mode); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-10-05 13:44:18 -04:00
|
|
|
func (c *comm) sftpVisitFile(dst string, src string, fi os.FileInfo, client *sftp.Client) error {
|
2015-07-26 19:39:56 -04:00
|
|
|
if !fi.IsDir() {
|
|
|
|
f, err := os.Open(src)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
2017-10-05 13:44:18 -04:00
|
|
|
return c.sftpUploadFile(dst, f, client, &fi)
|
2015-07-26 19:39:56 -04:00
|
|
|
} else {
|
2017-10-05 13:44:18 -04:00
|
|
|
err := c.sftpMkdir(dst, client, fi)
|
2015-07-26 19:39:56 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *comm) sftpDownloadSession(path string, output io.Writer) error {
|
|
|
|
sftpFunc := func(client *sftp.Client) error {
|
|
|
|
f, err := client.Open(path)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
if _, err = io.Copy(output, f); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.sftpSession(sftpFunc)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *comm) sftpSession(f func(*sftp.Client) error) error {
|
|
|
|
client, err := c.newSftpClient()
|
|
|
|
if err != nil {
|
2018-03-20 19:29:09 -04:00
|
|
|
return fmt.Errorf("sftpSession error: %s", err.Error())
|
2015-07-26 19:39:56 -04:00
|
|
|
}
|
|
|
|
defer client.Close()
|
|
|
|
|
|
|
|
return f(client)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *comm) newSftpClient() (*sftp.Client, error) {
|
|
|
|
session, err := c.newSession()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := session.RequestSubsystem("sftp"); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
pw, err := session.StdinPipe()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
pr, err := session.StdoutPipe()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-03-20 19:29:09 -04:00
|
|
|
// Capture stdout so we can return errors to the user
|
|
|
|
var stdout bytes.Buffer
|
|
|
|
tee := io.TeeReader(pr, &stdout)
|
|
|
|
client, err := sftp.NewClientPipe(tee, pw)
|
|
|
|
if err != nil && stdout.Len() > 0 {
|
|
|
|
log.Printf("[ERROR] Upload failed: %s", stdout.Bytes())
|
|
|
|
}
|
|
|
|
|
|
|
|
return client, err
|
2015-07-26 19:39:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *comm) scpUploadSession(path string, input io.Reader, fi *os.FileInfo) error {
|
|
|
|
|
|
|
|
// The target directory and file for talking the SCP protocol
|
|
|
|
target_dir := filepath.Dir(path)
|
|
|
|
target_file := filepath.Base(path)
|
|
|
|
|
2018-03-13 23:21:38 -04:00
|
|
|
// On windows, filepath.Dir uses backslash separators (ie. "\tmp").
|
2015-07-26 19:39:56 -04:00
|
|
|
// This does not work when the target host is unix. Switch to forward slash
|
|
|
|
// which works for unix and windows
|
|
|
|
target_dir = filepath.ToSlash(target_dir)
|
|
|
|
|
2018-10-19 17:24:56 -04:00
|
|
|
// Escape spaces in remote directory
|
|
|
|
target_dir = strings.Replace(target_dir, " ", "\\ ", -1)
|
|
|
|
|
2015-07-26 19:39:56 -04:00
|
|
|
scpFunc := func(w io.Writer, stdoutR *bufio.Reader) error {
|
|
|
|
return scpUploadFile(target_file, input, w, stdoutR, fi)
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.scpSession("scp -vt "+target_dir, scpFunc)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *comm) scpUploadDirSession(dst string, src string, excl []string) error {
|
|
|
|
scpFunc := func(w io.Writer, r *bufio.Reader) error {
|
|
|
|
uploadEntries := func() error {
|
|
|
|
f, err := os.Open(src)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
entries, err := f.Readdir(-1)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return scpUploadDir(src, entries, w, r)
|
|
|
|
}
|
|
|
|
|
|
|
|
if src[len(src)-1] != '/' {
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] No trailing slash, creating the source directory name")
|
2015-07-26 19:39:56 -04:00
|
|
|
fi, err := os.Stat(src)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return scpUploadDirProtocol(filepath.Base(src), w, r, uploadEntries, fi)
|
|
|
|
} else {
|
|
|
|
// Trailing slash, so only upload the contents
|
|
|
|
return uploadEntries()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return c.scpSession("scp -rvt "+dst, scpFunc)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *comm) scpDownloadSession(path string, output io.Writer) error {
|
|
|
|
scpFunc := func(w io.Writer, stdoutR *bufio.Reader) error {
|
|
|
|
fmt.Fprint(w, "\x00")
|
|
|
|
|
|
|
|
// read file info
|
|
|
|
fi, err := stdoutR.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(fi) < 0 {
|
|
|
|
return fmt.Errorf("empty response from server")
|
|
|
|
}
|
|
|
|
|
|
|
|
switch fi[0] {
|
|
|
|
case '\x01', '\x02':
|
2016-11-01 17:08:04 -04:00
|
|
|
return fmt.Errorf("%s", fi[1:])
|
2015-07-26 19:39:56 -04:00
|
|
|
case 'C':
|
|
|
|
case 'D':
|
|
|
|
return fmt.Errorf("remote file is directory")
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("unexpected server response (%x)", fi[0])
|
|
|
|
}
|
|
|
|
|
|
|
|
var mode string
|
|
|
|
var size int64
|
|
|
|
|
|
|
|
n, err := fmt.Sscanf(fi, "%6s %d ", &mode, &size)
|
|
|
|
if err != nil || n != 2 {
|
|
|
|
return fmt.Errorf("can't parse server response (%s)", fi)
|
|
|
|
}
|
|
|
|
if size < 0 {
|
|
|
|
return fmt.Errorf("negative file size")
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Fprint(w, "\x00")
|
|
|
|
|
|
|
|
if _, err := io.CopyN(output, stdoutR, size); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Fprint(w, "\x00")
|
|
|
|
|
2017-03-28 21:29:55 -04:00
|
|
|
return checkSCPStatus(stdoutR)
|
2015-07-26 19:39:56 -04:00
|
|
|
}
|
|
|
|
|
2017-03-28 21:29:55 -04:00
|
|
|
if !strings.Contains(path, " ") {
|
2015-11-02 06:22:52 -05:00
|
|
|
return c.scpSession("scp -vf "+path, scpFunc)
|
|
|
|
}
|
2015-07-26 19:39:56 -04:00
|
|
|
return c.scpSession("scp -vf "+strconv.Quote(path), scpFunc)
|
|
|
|
}
|
|
|
|
|
2013-08-23 22:52:02 -04:00
|
|
|
func (c *comm) scpSession(scpCommand string, f func(io.Writer, *bufio.Reader) error) error {
|
|
|
|
session, err := c.newSession()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer session.Close()
|
|
|
|
|
|
|
|
// Get a pipe to stdin so that we can send data down
|
|
|
|
stdinW, err := session.StdinPipe()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// We only want to close once, so we nil w after we close it,
|
|
|
|
// and only close in the defer if it hasn't been closed already.
|
|
|
|
defer func() {
|
|
|
|
if stdinW != nil {
|
|
|
|
stdinW.Close()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Get a pipe to stdout so that we can get responses back
|
|
|
|
stdoutPipe, err := session.StdoutPipe()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
stdoutR := bufio.NewReader(stdoutPipe)
|
|
|
|
|
|
|
|
// Set stderr to a bytes buffer
|
|
|
|
stderr := new(bytes.Buffer)
|
|
|
|
session.Stderr = stderr
|
|
|
|
|
|
|
|
// Start the sink mode on the other side
|
|
|
|
// TODO(mitchellh): There are probably issues with shell escaping the path
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Println("[DEBUG] Starting remote scp process: ", scpCommand)
|
2013-08-23 22:52:02 -04:00
|
|
|
if err := session.Start(scpCommand); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2013-09-05 22:55:09 -04:00
|
|
|
// Call our callback that executes in the context of SCP. We ignore
|
|
|
|
// EOF errors if they occur because it usually means that SCP prematurely
|
|
|
|
// ended on the other side.
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Println("[DEBUG] Started SCP session, beginning transfers...")
|
2013-09-05 22:55:09 -04:00
|
|
|
if err := f(stdinW, stdoutR); err != nil && err != io.EOF {
|
2013-08-23 22:52:02 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close the stdin, which sends an EOF, and then set w to nil so that
|
|
|
|
// our defer func doesn't close it again since that is unsafe with
|
|
|
|
// the Go SSH package.
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Println("[DEBUG] SCP session complete, closing stdin pipe.")
|
2013-08-23 22:52:02 -04:00
|
|
|
stdinW.Close()
|
|
|
|
stdinW = nil
|
|
|
|
|
|
|
|
// Wait for the SCP connection to close, meaning it has consumed all
|
|
|
|
// our data and has completed. Or has errored.
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Println("[DEBUG] Waiting for SSH session to complete.")
|
2013-08-23 22:52:02 -04:00
|
|
|
err = session.Wait()
|
2020-05-13 09:57:05 -04:00
|
|
|
log.Printf("[DEBUG] scp stderr (length %d): %s", stderr.Len(), stderr.String())
|
2013-08-23 22:52:02 -04:00
|
|
|
if err != nil {
|
|
|
|
if exitErr, ok := err.(*ssh.ExitError); ok {
|
2020-05-13 09:57:05 -04:00
|
|
|
// Otherwise, we have an ExitError, meaning we can just read the
|
|
|
|
// exit status
|
|
|
|
log.Printf("[DEBUG] non-zero exit status: %d, %v", exitErr.ExitStatus(), err)
|
2017-08-10 14:46:38 -04:00
|
|
|
stdoutB, err := ioutil.ReadAll(stdoutR)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] scp output: %s", stdoutB)
|
2013-08-23 22:52:02 -04:00
|
|
|
|
|
|
|
// If we exited with status 127, it means SCP isn't available.
|
|
|
|
// Return a more descriptive error for that.
|
|
|
|
if exitErr.ExitStatus() == 127 {
|
|
|
|
return errors.New(
|
|
|
|
"SCP failed to start. This usually means that SCP is not\n" +
|
|
|
|
"properly installed on the remote system.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2013-07-19 14:16:39 -04:00
|
|
|
// checkSCPStatus checks that a prior command sent to SCP completed
|
|
|
|
// successfully. If it did not complete successfully, an error will
|
|
|
|
// be returned.
|
|
|
|
func checkSCPStatus(r *bufio.Reader) error {
|
|
|
|
code, err := r.ReadByte()
|
2013-07-17 21:15:42 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2013-07-19 14:16:39 -04:00
|
|
|
|
|
|
|
if code != 0 {
|
2013-07-17 21:15:42 -04:00
|
|
|
// Treat any non-zero (really 1 and 2) as fatal errors
|
2013-07-19 14:16:39 -04:00
|
|
|
message, _, err := r.ReadLine()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error reading error message: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return errors.New(string(message))
|
2013-07-17 21:15:42 -04:00
|
|
|
}
|
2013-07-19 14:16:39 -04:00
|
|
|
|
2013-07-17 21:15:42 -04:00
|
|
|
return nil
|
|
|
|
}
|
2013-08-24 20:14:15 -04:00
|
|
|
|
2015-11-02 06:22:52 -05:00
|
|
|
func scpDownloadFile(dst string, src io.Reader, size int64, mode os.FileMode) error {
|
|
|
|
f, err := os.OpenFile(dst, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, mode)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
if _, err := io.CopyN(f, src, size); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-05-10 00:03:35 -04:00
|
|
|
func scpUploadFile(dst string, src io.Reader, w io.Writer, r *bufio.Reader, fi *os.FileInfo) error {
|
|
|
|
var mode os.FileMode
|
|
|
|
var size int64
|
2013-08-24 20:14:15 -04:00
|
|
|
|
2014-12-15 22:11:28 -05:00
|
|
|
if fi != nil && (*fi).Mode().IsRegular() {
|
2014-05-10 00:03:35 -04:00
|
|
|
mode = (*fi).Mode().Perm()
|
|
|
|
size = (*fi).Size()
|
|
|
|
} else {
|
2014-09-10 17:16:24 -04:00
|
|
|
// Create a temporary file where we can copy the contents of the src
|
|
|
|
// so that we can determine the length, since SCP is length-prefixed.
|
2018-12-12 09:45:00 -05:00
|
|
|
tf, err := tmp.File("packer-upload")
|
2014-09-10 17:16:24 -04:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error creating temporary file for upload: %s", err)
|
|
|
|
}
|
|
|
|
defer os.Remove(tf.Name())
|
|
|
|
defer tf.Close()
|
|
|
|
|
2014-05-10 00:03:35 -04:00
|
|
|
mode = 0644
|
2013-11-02 04:07:45 -04:00
|
|
|
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Println("[DEBUG] Copying input data into temporary file so we can read the length")
|
2014-05-10 00:03:35 -04:00
|
|
|
if _, err := io.Copy(tf, src); err != nil {
|
2018-11-08 18:21:40 -05:00
|
|
|
return fmt.Errorf("Error copying input data into local temporary "+
|
|
|
|
"file. Check that TEMPDIR has enough space. Please see "+
|
2020-04-01 18:54:21 -04:00
|
|
|
"https://www.packer.io/docs/other/environment-variables#tmpdir"+
|
2018-11-08 18:21:40 -05:00
|
|
|
"for more info. Error: %s", err)
|
2014-05-10 00:03:35 -04:00
|
|
|
}
|
2013-11-02 04:07:45 -04:00
|
|
|
|
2014-05-10 00:03:35 -04:00
|
|
|
// Sync the file so that the contents are definitely on disk, then
|
|
|
|
// read the length of it.
|
|
|
|
if err := tf.Sync(); err != nil {
|
|
|
|
return fmt.Errorf("Error creating temporary file for upload: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Seek the file to the beginning so we can re-read all of it
|
|
|
|
if _, err := tf.Seek(0, 0); err != nil {
|
|
|
|
return fmt.Errorf("Error creating temporary file for upload: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
tfi, err := tf.Stat()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error creating temporary file for upload: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
size = tfi.Size()
|
2014-09-10 17:16:24 -04:00
|
|
|
src = tf
|
2013-11-02 04:07:45 -04:00
|
|
|
}
|
|
|
|
|
2013-08-24 20:14:15 -04:00
|
|
|
// Start the protocol
|
2014-05-10 00:03:35 -04:00
|
|
|
perms := fmt.Sprintf("C%04o", mode)
|
2015-07-26 19:39:56 -04:00
|
|
|
log.Printf("[DEBUG] scp: Uploading %s: perms=%s size=%d", dst, perms, size)
|
2014-05-10 00:03:35 -04:00
|
|
|
|
|
|
|
fmt.Fprintln(w, perms, size, dst)
|
2013-11-02 04:07:45 -04:00
|
|
|
if err := checkSCPStatus(r); err != nil {
|
2013-08-24 20:14:15 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2014-09-10 17:16:24 -04:00
|
|
|
if _, err := io.CopyN(w, src, size); err != nil {
|
2013-08-24 20:14:15 -04:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Fprint(w, "\x00")
|
2017-03-28 21:29:55 -04:00
|
|
|
return checkSCPStatus(r)
|
2013-08-24 20:14:15 -04:00
|
|
|
}
|
|
|
|
|
2014-05-10 00:03:35 -04:00
|
|
|
func scpUploadDirProtocol(name string, w io.Writer, r *bufio.Reader, f func() error, fi os.FileInfo) error {
|
2018-03-20 19:28:23 -04:00
|
|
|
log.Printf("[DEBUG] SCP: starting directory upload: %s", name)
|
2014-05-10 00:03:35 -04:00
|
|
|
|
|
|
|
mode := fi.Mode().Perm()
|
|
|
|
|
|
|
|
perms := fmt.Sprintf("D%04o 0", mode)
|
|
|
|
|
|
|
|
fmt.Fprintln(w, perms, name)
|
2013-08-25 23:47:10 -04:00
|
|
|
err := checkSCPStatus(r)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := f(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Fprintln(w, "E")
|
2017-03-28 21:29:55 -04:00
|
|
|
return err
|
2013-08-25 23:47:10 -04:00
|
|
|
}
|
|
|
|
|
2013-08-24 20:14:15 -04:00
|
|
|
func scpUploadDir(root string, fs []os.FileInfo, w io.Writer, r *bufio.Reader) error {
|
|
|
|
for _, fi := range fs {
|
2013-08-25 23:29:50 -04:00
|
|
|
realPath := filepath.Join(root, fi.Name())
|
|
|
|
|
2013-09-25 04:42:49 -04:00
|
|
|
// Track if this is actually a symlink to a directory. If it is
|
|
|
|
// a symlink to a file we don't do any special behavior because uploading
|
|
|
|
// a file just works. If it is a directory, we need to know so we
|
|
|
|
// treat it as such.
|
|
|
|
isSymlinkToDir := false
|
2013-09-30 14:39:52 -04:00
|
|
|
if fi.Mode()&os.ModeSymlink == os.ModeSymlink {
|
2013-09-25 04:42:49 -04:00
|
|
|
symPath, err := filepath.EvalSymlinks(realPath)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
symFi, err := os.Lstat(symPath)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
isSymlinkToDir = symFi.IsDir()
|
|
|
|
}
|
|
|
|
|
|
|
|
if !fi.IsDir() && !isSymlinkToDir {
|
|
|
|
// It is a regular file (or symlink to a file), just upload it
|
2013-08-25 23:29:50 -04:00
|
|
|
f, err := os.Open(realPath)
|
2013-08-24 20:14:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = func() error {
|
|
|
|
defer f.Close()
|
2014-05-10 00:03:35 -04:00
|
|
|
return scpUploadFile(fi.Name(), f, w, r, &fi)
|
2013-08-24 20:14:15 -04:00
|
|
|
}()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2013-08-25 23:29:50 -04:00
|
|
|
continue
|
|
|
|
}
|
2013-08-24 20:14:15 -04:00
|
|
|
|
2013-08-25 23:29:50 -04:00
|
|
|
// It is a directory, recursively upload
|
2013-08-25 23:47:10 -04:00
|
|
|
err := scpUploadDirProtocol(fi.Name(), w, r, func() error {
|
|
|
|
f, err := os.Open(realPath)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2013-08-25 23:29:50 -04:00
|
|
|
defer f.Close()
|
2013-08-24 20:14:15 -04:00
|
|
|
|
2013-08-25 23:29:50 -04:00
|
|
|
entries, err := f.Readdir(-1)
|
2013-08-24 20:14:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2013-08-25 23:29:50 -04:00
|
|
|
return scpUploadDir(realPath, entries, w, r)
|
2014-05-10 00:03:35 -04:00
|
|
|
}, fi)
|
2013-08-24 20:14:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2013-08-25 23:29:50 -04:00
|
|
|
|
|
|
|
return nil
|
2013-08-24 20:14:15 -04:00
|
|
|
}
|