2015-06-13 17:42:38 -04:00
|
|
|
package communicator
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
2015-06-13 18:05:10 -04:00
|
|
|
"fmt"
|
|
|
|
"os"
|
2015-06-13 17:42:38 -04:00
|
|
|
"time"
|
|
|
|
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/template/interpolate"
|
2017-01-18 16:11:48 -05:00
|
|
|
"github.com/masterzen/winrm"
|
2015-06-13 17:42:38 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// Config is the common configuration that communicators allow within
|
|
|
|
// a builder.
|
|
|
|
type Config struct {
|
2015-06-14 01:05:48 -04:00
|
|
|
Type string `mapstructure:"communicator"`
|
|
|
|
|
|
|
|
// SSH
|
2017-06-19 10:21:33 -04:00
|
|
|
SSHHost string `mapstructure:"ssh_host"`
|
|
|
|
SSHPort int `mapstructure:"ssh_port"`
|
|
|
|
SSHUsername string `mapstructure:"ssh_username"`
|
|
|
|
SSHPassword string `mapstructure:"ssh_password"`
|
|
|
|
SSHPrivateKey string `mapstructure:"ssh_private_key_file"`
|
|
|
|
SSHPty bool `mapstructure:"ssh_pty"`
|
|
|
|
SSHTimeout time.Duration `mapstructure:"ssh_timeout"`
|
|
|
|
SSHAgentAuth bool `mapstructure:"ssh_agent_auth"`
|
|
|
|
SSHDisableAgentForwarding bool `mapstructure:"ssh_disable_agent_forwarding"`
|
|
|
|
SSHHandshakeAttempts int `mapstructure:"ssh_handshake_attempts"`
|
|
|
|
SSHBastionHost string `mapstructure:"ssh_bastion_host"`
|
|
|
|
SSHBastionPort int `mapstructure:"ssh_bastion_port"`
|
|
|
|
SSHBastionAgentAuth bool `mapstructure:"ssh_bastion_agent_auth"`
|
|
|
|
SSHBastionUsername string `mapstructure:"ssh_bastion_username"`
|
|
|
|
SSHBastionPassword string `mapstructure:"ssh_bastion_password"`
|
|
|
|
SSHBastionPrivateKey string `mapstructure:"ssh_bastion_private_key_file"`
|
|
|
|
SSHFileTransferMethod string `mapstructure:"ssh_file_transfer_method"`
|
2015-06-14 01:05:48 -04:00
|
|
|
|
|
|
|
// WinRM
|
2016-03-10 13:47:30 -05:00
|
|
|
WinRMUser string `mapstructure:"winrm_username"`
|
|
|
|
WinRMPassword string `mapstructure:"winrm_password"`
|
|
|
|
WinRMHost string `mapstructure:"winrm_host"`
|
|
|
|
WinRMPort int `mapstructure:"winrm_port"`
|
|
|
|
WinRMTimeout time.Duration `mapstructure:"winrm_timeout"`
|
|
|
|
WinRMUseSSL bool `mapstructure:"winrm_use_ssl"`
|
|
|
|
WinRMInsecure bool `mapstructure:"winrm_insecure"`
|
2017-06-07 07:08:12 -04:00
|
|
|
WinRMUseNTLM bool `mapstructure:"winrm_use_ntlm"`
|
2017-01-18 16:11:48 -05:00
|
|
|
WinRMTransportDecorator func() winrm.Transporter
|
2015-06-13 17:42:38 -04:00
|
|
|
}
|
|
|
|
|
2015-06-14 02:12:59 -04:00
|
|
|
// Port returns the port that will be used for access based on config.
|
|
|
|
func (c *Config) Port() int {
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
return c.SSHPort
|
|
|
|
case "winrm":
|
|
|
|
return c.WinRMPort
|
|
|
|
default:
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-18 20:22:53 -04:00
|
|
|
// Host returns the port that will be used for access based on config.
|
|
|
|
func (c *Config) Host() string {
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
return c.SSHHost
|
|
|
|
case "winrm":
|
|
|
|
return c.WinRMHost
|
|
|
|
default:
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// User returns the port that will be used for access based on config.
|
|
|
|
func (c *Config) User() string {
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
return c.SSHUsername
|
|
|
|
case "winrm":
|
|
|
|
return c.WinRMUser
|
|
|
|
default:
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Password returns the port that will be used for access based on config.
|
|
|
|
func (c *Config) Password() string {
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
return c.SSHPassword
|
|
|
|
case "winrm":
|
|
|
|
return c.WinRMPassword
|
|
|
|
default:
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-13 17:42:38 -04:00
|
|
|
func (c *Config) Prepare(ctx *interpolate.Context) []error {
|
2015-06-13 17:50:45 -04:00
|
|
|
if c.Type == "" {
|
|
|
|
c.Type = "ssh"
|
|
|
|
}
|
|
|
|
|
2015-06-14 01:05:48 -04:00
|
|
|
var errs []error
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
if es := c.prepareSSH(ctx); len(es) > 0 {
|
|
|
|
errs = append(errs, es...)
|
|
|
|
}
|
|
|
|
case "winrm":
|
|
|
|
if es := c.prepareWinRM(ctx); len(es) > 0 {
|
|
|
|
errs = append(errs, es...)
|
|
|
|
}
|
2015-10-11 14:48:16 -04:00
|
|
|
case "docker", "none":
|
2015-10-11 14:20:50 -04:00
|
|
|
break
|
|
|
|
default:
|
|
|
|
return []error{fmt.Errorf("Communicator type %s is invalid", c.Type)}
|
2015-06-14 01:05:48 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return errs
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) prepareSSH(ctx *interpolate.Context) []error {
|
2015-06-13 17:42:38 -04:00
|
|
|
if c.SSHPort == 0 {
|
|
|
|
c.SSHPort = 22
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.SSHTimeout == 0 {
|
|
|
|
c.SSHTimeout = 5 * time.Minute
|
|
|
|
}
|
|
|
|
|
2015-06-13 19:39:42 -04:00
|
|
|
if c.SSHHandshakeAttempts == 0 {
|
|
|
|
c.SSHHandshakeAttempts = 10
|
|
|
|
}
|
|
|
|
|
2015-06-17 16:10:42 -04:00
|
|
|
if c.SSHBastionHost != "" {
|
|
|
|
if c.SSHBastionPort == 0 {
|
|
|
|
c.SSHBastionPort = 22
|
|
|
|
}
|
2015-06-17 16:33:59 -04:00
|
|
|
|
|
|
|
if c.SSHBastionPrivateKey == "" && c.SSHPrivateKey != "" {
|
|
|
|
c.SSHBastionPrivateKey = c.SSHPrivateKey
|
|
|
|
}
|
2015-06-17 16:10:42 -04:00
|
|
|
}
|
|
|
|
|
2015-07-26 19:39:56 -04:00
|
|
|
if c.SSHFileTransferMethod == "" {
|
|
|
|
c.SSHFileTransferMethod = "scp"
|
|
|
|
}
|
|
|
|
|
2015-06-13 17:42:38 -04:00
|
|
|
// Validation
|
|
|
|
var errs []error
|
2015-06-14 01:05:48 -04:00
|
|
|
if c.SSHUsername == "" {
|
2016-11-15 16:06:15 -05:00
|
|
|
errs = append(errs, errors.New("An ssh_username must be specified\n Note: some builders used to default ssh_username to \"root\"."))
|
2015-06-14 01:05:48 -04:00
|
|
|
}
|
2015-06-13 18:05:10 -04:00
|
|
|
|
2015-06-14 01:05:48 -04:00
|
|
|
if c.SSHPrivateKey != "" {
|
|
|
|
if _, err := os.Stat(c.SSHPrivateKey); err != nil {
|
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_private_key_file is invalid: %s", err))
|
|
|
|
} else if _, err := SSHFileSigner(c.SSHPrivateKey); err != nil {
|
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_private_key_file is invalid: %s", err))
|
2015-06-13 18:05:10 -04:00
|
|
|
}
|
2015-06-13 17:42:38 -04:00
|
|
|
}
|
|
|
|
|
2017-05-28 08:05:03 -04:00
|
|
|
if c.SSHBastionHost != "" && !c.SSHBastionAgentAuth {
|
2015-06-17 16:10:42 -04:00
|
|
|
if c.SSHBastionPassword == "" && c.SSHBastionPrivateKey == "" {
|
|
|
|
errs = append(errs, errors.New(
|
|
|
|
"ssh_bastion_password or ssh_bastion_private_key_file must be specified"))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-26 19:39:56 -04:00
|
|
|
if c.SSHFileTransferMethod != "scp" && c.SSHFileTransferMethod != "sftp" {
|
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_file_transfer_method ('%s') is invalid, valid methods: sftp, scp",
|
|
|
|
c.SSHFileTransferMethod))
|
|
|
|
}
|
|
|
|
|
2015-06-13 17:42:38 -04:00
|
|
|
return errs
|
|
|
|
}
|
2015-06-14 01:05:48 -04:00
|
|
|
|
|
|
|
func (c *Config) prepareWinRM(ctx *interpolate.Context) []error {
|
2016-02-29 09:26:28 -05:00
|
|
|
if c.WinRMPort == 0 && c.WinRMUseSSL {
|
|
|
|
c.WinRMPort = 5986
|
|
|
|
} else if c.WinRMPort == 0 {
|
2015-06-14 01:05:48 -04:00
|
|
|
c.WinRMPort = 5985
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.WinRMTimeout == 0 {
|
|
|
|
c.WinRMTimeout = 30 * time.Minute
|
|
|
|
}
|
|
|
|
|
2017-06-07 07:08:12 -04:00
|
|
|
if c.WinRMUseNTLM == true {
|
|
|
|
c.WinRMTransportDecorator = func() winrm.Transporter { return &winrm.ClientNTLM{} }
|
|
|
|
}
|
|
|
|
|
2015-06-14 01:05:48 -04:00
|
|
|
var errs []error
|
|
|
|
if c.WinRMUser == "" {
|
|
|
|
errs = append(errs, errors.New("winrm_username must be specified."))
|
|
|
|
}
|
|
|
|
|
|
|
|
return errs
|
|
|
|
}
|