2019-06-06 10:44:48 -04:00
|
|
|
//go:generate struct-markdown
|
|
|
|
|
2015-06-13 17:42:38 -04:00
|
|
|
package communicator
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
2015-06-13 18:05:10 -04:00
|
|
|
"fmt"
|
2018-08-22 11:03:25 -04:00
|
|
|
"io/ioutil"
|
|
|
|
"net"
|
2015-06-13 18:05:10 -04:00
|
|
|
"os"
|
2015-06-13 17:42:38 -04:00
|
|
|
"time"
|
|
|
|
|
2018-08-22 11:03:25 -04:00
|
|
|
packerssh "github.com/hashicorp/packer/communicator/ssh"
|
|
|
|
"github.com/hashicorp/packer/helper/multistep"
|
2018-08-27 10:13:15 -04:00
|
|
|
helperssh "github.com/hashicorp/packer/helper/ssh"
|
2018-12-02 19:56:33 -05:00
|
|
|
"github.com/hashicorp/packer/packer"
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/template/interpolate"
|
2017-01-18 16:11:48 -05:00
|
|
|
"github.com/masterzen/winrm"
|
2018-08-22 11:03:25 -04:00
|
|
|
"golang.org/x/crypto/ssh"
|
|
|
|
"golang.org/x/crypto/ssh/agent"
|
2015-06-13 17:42:38 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// Config is the common configuration that communicators allow within
|
|
|
|
// a builder.
|
|
|
|
type Config struct {
|
2019-06-06 10:44:48 -04:00
|
|
|
// Packer currently supports three kinds of communicators:
|
|
|
|
//
|
|
|
|
// - `none` - No communicator will be used. If this is set, most
|
|
|
|
// provisioners also can't be used.
|
|
|
|
//
|
|
|
|
// - `ssh` - An SSH connection will be established to the machine. This
|
|
|
|
// is usually the default.
|
|
|
|
//
|
|
|
|
// - `winrm` - A WinRM connection will be established.
|
|
|
|
//
|
|
|
|
// In addition to the above, some builders have custom communicators they
|
|
|
|
// can use. For example, the Docker builder has a "docker" communicator
|
|
|
|
// that uses `docker exec` and `docker cp` to execute scripts and copy
|
|
|
|
// files.
|
2015-06-14 01:05:48 -04:00
|
|
|
Type string `mapstructure:"communicator"`
|
|
|
|
|
2019-06-06 10:44:48 -04:00
|
|
|
// We recommend that you enable SSH or WinRM as the very last step in your
|
|
|
|
// guest's bootstrap script, but sometimes you may have a race condition where
|
|
|
|
// you need Packer to wait before attempting to connect to your guest.
|
|
|
|
//
|
|
|
|
// If you end up in this situation, you can use the template option
|
|
|
|
// `pause_before_connecting`. By default, there is no pause. For example:
|
|
|
|
//
|
|
|
|
// ```json
|
|
|
|
// {
|
|
|
|
// "communicator": "ssh",
|
|
|
|
// "ssh_username": "myuser",
|
|
|
|
// "pause_before_connecting": "10m"
|
|
|
|
// }
|
|
|
|
// ```
|
|
|
|
//
|
|
|
|
// In this example, Packer will check whether it can connect, as normal. But once
|
|
|
|
// a connection attempt is successful, it will disconnect and then wait 10 minutes
|
|
|
|
// before connecting to the guest and beginning provisioning.
|
|
|
|
PauseBeforeConnect time.Duration `mapstructure:"pause_before_connecting"`
|
|
|
|
|
|
|
|
SSH `mapstructure:",squash"`
|
|
|
|
WinRM `mapstructure:",squash"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type SSH struct {
|
2015-06-14 01:05:48 -04:00
|
|
|
// SSH
|
2019-06-06 10:44:48 -04:00
|
|
|
|
|
|
|
// The address to SSH to. This usually is automatically configured by the
|
|
|
|
// builder.
|
|
|
|
SSHHost string `mapstructure:"ssh_host"`
|
|
|
|
// The port to connect to SSH. This defaults to `22`.
|
|
|
|
SSHPort int `mapstructure:"ssh_port"`
|
|
|
|
// The username to connect to SSH with. Required if using SSH.
|
|
|
|
SSHUsername string `mapstructure:"ssh_username"`
|
|
|
|
// A plaintext password to use to authenticate with SSH.
|
|
|
|
SSHPassword string `mapstructure:"ssh_password"`
|
|
|
|
// If specified, this is the key that will be used for SSH with the
|
|
|
|
// machine. The key must match a key pair name loaded up into Amazon EC2.
|
|
|
|
// By default, this is blank, and Packer will generate a temporary keypair
|
|
|
|
// unless [`ssh_password`](../templates/communicator.html#ssh_password) is
|
|
|
|
// used.
|
|
|
|
// [`ssh_private_key_file`](../templates/communicator.html#ssh_private_key_file)
|
|
|
|
// or `ssh_agent_auth` must be specified when `ssh_keypair_name` is
|
|
|
|
// utilized.
|
|
|
|
SSHKeyPairName string `mapstructure:"ssh_keypair_name"`
|
|
|
|
SSHTemporaryKeyPairName string `mapstructure:"temporary_key_pair_name"`
|
|
|
|
// If true, Packer will attempt to remove its temporary key from
|
|
|
|
// `~/.ssh/authorized_keys` and `/root/.ssh/authorized_keys`. This is a
|
|
|
|
// mostly cosmetic option, since Packer will delete the temporary private
|
|
|
|
// key from the host system regardless of whether this is set to true
|
|
|
|
// (unless the user has set the `-debug` flag). Defaults to "false";
|
|
|
|
// currently only works on guests with `sed` installed.
|
|
|
|
SSHClearAuthorizedKeys bool `mapstructure:"ssh_clear_authorized_keys"`
|
|
|
|
// Path to a PEM encoded private key file to use to authenticate with SSH.
|
|
|
|
// The `~` can be used in path and will be expanded to the home directory
|
|
|
|
// of current user.
|
|
|
|
SSHPrivateKeyFile string `mapstructure:"ssh_private_key_file"`
|
|
|
|
// One of `public_ip`, `private_ip`, `public_dns`, or `private_dns`. If
|
|
|
|
// set, either the public IP address, private IP address, public DNS name
|
|
|
|
// or private DNS name will used as the host for SSH. The default behaviour
|
|
|
|
// if inside a VPC is to use the public IP address if available, otherwise
|
|
|
|
// the private IP address will be used. If not in a VPC the public DNS name
|
|
|
|
// will be used. Also works for WinRM.
|
|
|
|
//
|
|
|
|
// Where Packer is configured for an outbound proxy but WinRM traffic
|
|
|
|
// should be direct, `ssh_interface` must be set to `private_dns` and
|
|
|
|
// `<region>.compute.internal` included in the `NO_PROXY` environment
|
|
|
|
// variable.
|
|
|
|
SSHInterface string `mapstructure:"ssh_interface"`
|
|
|
|
SSHIPVersion string `mapstructure:"ssh_ip_version"`
|
|
|
|
// If `true`, a PTY will be requested for the SSH connection. This defaults
|
|
|
|
// to `false`.
|
|
|
|
SSHPty bool `mapstructure:"ssh_pty"`
|
|
|
|
// The time to wait for SSH to become available. Packer uses this to
|
|
|
|
// determine when the machine has booted so this is usually quite long.
|
|
|
|
// Example value: `10m`.
|
|
|
|
SSHTimeout time.Duration `mapstructure:"ssh_timeout"`
|
|
|
|
// If true, the local SSH agent will be used to authenticate connections to
|
|
|
|
// the source instance. No temporary keypair will be created, and the
|
|
|
|
// values of `ssh_password` and `ssh_private_key_file` will be ignored. To
|
|
|
|
// use this option with a key pair already configured in the source AMI,
|
|
|
|
// leave the `ssh_keypair_name` blank. To associate an existing key pair in
|
|
|
|
// AWS with the source instance, set the `ssh_keypair_name` field to the
|
|
|
|
// name of the key pair.
|
|
|
|
SSHAgentAuth bool `mapstructure:"ssh_agent_auth"`
|
|
|
|
// If true, SSH agent forwarding will be disabled. Defaults to `false`.
|
|
|
|
SSHDisableAgentForwarding bool `mapstructure:"ssh_disable_agent_forwarding"`
|
|
|
|
// The number of handshakes to attempt with SSH once it can connect. This
|
|
|
|
// defaults to `10`.
|
|
|
|
SSHHandshakeAttempts int `mapstructure:"ssh_handshake_attempts"`
|
|
|
|
// A bastion host to use for the actual SSH connection.
|
|
|
|
SSHBastionHost string `mapstructure:"ssh_bastion_host"`
|
|
|
|
// The port of the bastion host. Defaults to `22`.
|
|
|
|
SSHBastionPort int `mapstructure:"ssh_bastion_port"`
|
|
|
|
// If `true`, the local SSH agent will be used to authenticate with the
|
|
|
|
// bastion host. Defaults to `false`.
|
|
|
|
SSHBastionAgentAuth bool `mapstructure:"ssh_bastion_agent_auth"`
|
|
|
|
// The username to connect to the bastion host.
|
|
|
|
SSHBastionUsername string `mapstructure:"ssh_bastion_username"`
|
|
|
|
// The password to use to authenticate with the bastion host.
|
|
|
|
SSHBastionPassword string `mapstructure:"ssh_bastion_password"`
|
|
|
|
// Path to a PEM encoded private key file to use to authenticate with the
|
|
|
|
// bastion host. The `~` can be used in path and will be expanded to the
|
|
|
|
// home directory of current user.
|
|
|
|
SSHBastionPrivateKeyFile string `mapstructure:"ssh_bastion_private_key_file"`
|
|
|
|
// `scp` or `sftp` - How to transfer files, Secure copy (default) or SSH
|
|
|
|
// File Transfer Protocol.
|
|
|
|
SSHFileTransferMethod string `mapstructure:"ssh_file_transfer_method"`
|
|
|
|
// A SOCKS proxy host to use for SSH connection
|
|
|
|
SSHProxyHost string `mapstructure:"ssh_proxy_host"`
|
|
|
|
// A port of the SOCKS proxy. Defaults to `1080`.
|
|
|
|
SSHProxyPort int `mapstructure:"ssh_proxy_port"`
|
|
|
|
// The optional username to authenticate with the proxy server.
|
|
|
|
SSHProxyUsername string `mapstructure:"ssh_proxy_username"`
|
|
|
|
// The optional password to use to authenticate with the proxy server.
|
|
|
|
SSHProxyPassword string `mapstructure:"ssh_proxy_password"`
|
|
|
|
// How often to send "keep alive" messages to the server. Set to a negative
|
|
|
|
// value (`-1s`) to disable. Example value: `10s`. Defaults to `5s`.
|
|
|
|
SSHKeepAliveInterval time.Duration `mapstructure:"ssh_keep_alive_interval"`
|
|
|
|
// The amount of time to wait for a remote command to end. This might be
|
|
|
|
// useful if, for example, packer hangs on a connection after a reboot.
|
|
|
|
// Example: `5m`. Disabled by default.
|
|
|
|
SSHReadWriteTimeout time.Duration `mapstructure:"ssh_read_write_timeout"`
|
|
|
|
|
2018-11-06 14:01:41 -05:00
|
|
|
// SSH Internals
|
|
|
|
SSHPublicKey []byte
|
|
|
|
SSHPrivateKey []byte
|
2019-06-06 10:44:48 -04:00
|
|
|
}
|
2015-06-14 01:05:48 -04:00
|
|
|
|
2019-06-06 10:44:48 -04:00
|
|
|
type WinRM struct {
|
|
|
|
// The username to use to connect to WinRM.
|
|
|
|
WinRMUser string `mapstructure:"winrm_username"`
|
|
|
|
// The password to use to connect to WinRM.
|
|
|
|
WinRMPassword string `mapstructure:"winrm_password"`
|
|
|
|
// The address for WinRM to connect to.
|
|
|
|
//
|
|
|
|
// NOTE: If using an Amazon EBS builder, you can specify the interface
|
|
|
|
// WinRM connects to via
|
|
|
|
// [`ssh_interface`](https://www.packer.io/docs/builders/amazon-ebs.html#ssh_interface)
|
|
|
|
WinRMHost string `mapstructure:"winrm_host"`
|
|
|
|
// The WinRM port to connect to. This defaults to `5985` for plain
|
|
|
|
// unencrypted connection and `5986` for SSL when `winrm_use_ssl` is set to
|
|
|
|
// true.
|
|
|
|
WinRMPort int `mapstructure:"winrm_port"`
|
|
|
|
// The amount of time to wait for WinRM to become available. This defaults
|
|
|
|
// to `30m` since setting up a Windows machine generally takes a long time.
|
|
|
|
WinRMTimeout time.Duration `mapstructure:"winrm_timeout"`
|
|
|
|
// If `true`, use HTTPS for WinRM.
|
|
|
|
WinRMUseSSL bool `mapstructure:"winrm_use_ssl"`
|
|
|
|
// If `true`, do not check server certificate chain and host name.
|
|
|
|
WinRMInsecure bool `mapstructure:"winrm_insecure"`
|
|
|
|
// If `true`, NTLMv2 authentication (with session security) will be used
|
|
|
|
// for WinRM, rather than default (basic authentication), removing the
|
|
|
|
// requirement for basic authentication to be enabled within the target
|
|
|
|
// guest. Further reading for remote connection authentication can be found
|
|
|
|
// [here](https://msdn.microsoft.com/en-us/library/aa384295(v=vs.85).aspx).
|
|
|
|
WinRMUseNTLM bool `mapstructure:"winrm_use_ntlm"`
|
2017-01-18 16:11:48 -05:00
|
|
|
WinRMTransportDecorator func() winrm.Transporter
|
2015-06-13 17:42:38 -04:00
|
|
|
}
|
|
|
|
|
2018-11-06 13:59:40 -05:00
|
|
|
// ReadSSHPrivateKeyFile returns the SSH private key bytes
|
|
|
|
func (c *Config) ReadSSHPrivateKeyFile() ([]byte, error) {
|
|
|
|
var privateKey []byte
|
|
|
|
|
|
|
|
if c.SSHPrivateKeyFile != "" {
|
2018-12-02 19:56:33 -05:00
|
|
|
keyPath, err := packer.ExpandUser(c.SSHPrivateKeyFile)
|
2018-11-06 13:59:40 -05:00
|
|
|
if err != nil {
|
2018-12-02 19:32:20 -05:00
|
|
|
return []byte{}, fmt.Errorf("Error expanding path for SSH private key: %s", err)
|
2018-12-02 19:06:14 -05:00
|
|
|
}
|
|
|
|
|
2018-11-06 13:59:40 -05:00
|
|
|
privateKey, err = ioutil.ReadFile(keyPath)
|
|
|
|
if err != nil {
|
|
|
|
return privateKey, fmt.Errorf("Error on reading SSH private key: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return privateKey, nil
|
|
|
|
}
|
|
|
|
|
2018-08-22 11:03:25 -04:00
|
|
|
// SSHConfigFunc returns a function that can be used for the SSH communicator
|
|
|
|
// config for connecting to the instance created over SSH using the private key
|
|
|
|
// or password.
|
|
|
|
func (c *Config) SSHConfigFunc() func(multistep.StateBag) (*ssh.ClientConfig, error) {
|
|
|
|
return func(state multistep.StateBag) (*ssh.ClientConfig, error) {
|
|
|
|
sshConfig := &ssh.ClientConfig{
|
2018-08-22 11:08:46 -04:00
|
|
|
User: c.SSHUsername,
|
2018-08-22 11:03:25 -04:00
|
|
|
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
|
|
|
|
}
|
|
|
|
|
2018-08-22 11:08:46 -04:00
|
|
|
if c.SSHAgentAuth {
|
2018-08-22 11:03:25 -04:00
|
|
|
authSock := os.Getenv("SSH_AUTH_SOCK")
|
|
|
|
if authSock == "" {
|
|
|
|
return nil, fmt.Errorf("SSH_AUTH_SOCK is not set")
|
|
|
|
}
|
|
|
|
|
|
|
|
sshAgent, err := net.Dial("unix", authSock)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Cannot connect to SSH Agent socket %q: %s", authSock, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
sshConfig.Auth = append(sshConfig.Auth, ssh.PublicKeysCallback(agent.NewClient(sshAgent).Signers))
|
|
|
|
}
|
|
|
|
|
|
|
|
var privateKeys [][]byte
|
2018-08-23 10:35:07 -04:00
|
|
|
if c.SSHPrivateKeyFile != "" {
|
2018-10-31 17:47:50 -04:00
|
|
|
privateKey, err := c.ReadSSHPrivateKeyFile()
|
2018-08-22 11:03:25 -04:00
|
|
|
if err != nil {
|
2018-10-31 17:47:50 -04:00
|
|
|
return nil, err
|
2018-08-22 11:03:25 -04:00
|
|
|
}
|
2018-10-31 17:47:50 -04:00
|
|
|
privateKeys = append(privateKeys, privateKey)
|
2018-08-22 11:03:25 -04:00
|
|
|
}
|
2018-08-22 12:16:25 -04:00
|
|
|
|
|
|
|
// aws,alicloud,cloudstack,digitalOcean,oneAndOne,openstack,oracle & profitbricks key
|
2018-08-22 11:03:25 -04:00
|
|
|
if iKey, hasKey := state.GetOk("privateKey"); hasKey {
|
|
|
|
privateKeys = append(privateKeys, []byte(iKey.(string)))
|
|
|
|
}
|
|
|
|
|
2018-08-23 11:27:31 -04:00
|
|
|
if len(c.SSHPrivateKey) != 0 {
|
|
|
|
privateKeys = append(privateKeys, c.SSHPrivateKey)
|
2018-08-22 11:03:25 -04:00
|
|
|
}
|
2018-08-22 12:16:25 -04:00
|
|
|
|
2018-08-22 11:03:25 -04:00
|
|
|
for _, key := range privateKeys {
|
|
|
|
signer, err := ssh.ParsePrivateKey(key)
|
|
|
|
if err != nil {
|
2018-11-06 14:02:51 -05:00
|
|
|
return nil, fmt.Errorf("Error on parsing SSH private key: %s", err)
|
2018-08-22 11:03:25 -04:00
|
|
|
}
|
|
|
|
sshConfig.Auth = append(sshConfig.Auth, ssh.PublicKeys(signer))
|
|
|
|
}
|
|
|
|
|
2018-08-22 11:08:46 -04:00
|
|
|
if c.SSHPassword != "" {
|
2018-08-22 11:03:25 -04:00
|
|
|
sshConfig.Auth = append(sshConfig.Auth,
|
2018-08-22 11:08:46 -04:00
|
|
|
ssh.Password(c.SSHPassword),
|
|
|
|
ssh.KeyboardInteractive(packerssh.PasswordKeyboardInteractive(c.SSHPassword)),
|
2018-08-22 11:03:25 -04:00
|
|
|
)
|
|
|
|
}
|
|
|
|
return sshConfig, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-14 02:12:59 -04:00
|
|
|
// Port returns the port that will be used for access based on config.
|
|
|
|
func (c *Config) Port() int {
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
return c.SSHPort
|
|
|
|
case "winrm":
|
|
|
|
return c.WinRMPort
|
|
|
|
default:
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-18 20:22:53 -04:00
|
|
|
// Host returns the port that will be used for access based on config.
|
|
|
|
func (c *Config) Host() string {
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
return c.SSHHost
|
|
|
|
case "winrm":
|
|
|
|
return c.WinRMHost
|
|
|
|
default:
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// User returns the port that will be used for access based on config.
|
|
|
|
func (c *Config) User() string {
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
return c.SSHUsername
|
|
|
|
case "winrm":
|
|
|
|
return c.WinRMUser
|
|
|
|
default:
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Password returns the port that will be used for access based on config.
|
|
|
|
func (c *Config) Password() string {
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
return c.SSHPassword
|
|
|
|
case "winrm":
|
|
|
|
return c.WinRMPassword
|
|
|
|
default:
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-13 17:42:38 -04:00
|
|
|
func (c *Config) Prepare(ctx *interpolate.Context) []error {
|
2015-06-13 17:50:45 -04:00
|
|
|
if c.Type == "" {
|
|
|
|
c.Type = "ssh"
|
|
|
|
}
|
|
|
|
|
2015-06-14 01:05:48 -04:00
|
|
|
var errs []error
|
|
|
|
switch c.Type {
|
|
|
|
case "ssh":
|
|
|
|
if es := c.prepareSSH(ctx); len(es) > 0 {
|
|
|
|
errs = append(errs, es...)
|
|
|
|
}
|
|
|
|
case "winrm":
|
|
|
|
if es := c.prepareWinRM(ctx); len(es) > 0 {
|
|
|
|
errs = append(errs, es...)
|
|
|
|
}
|
2019-03-27 15:09:08 -04:00
|
|
|
case "docker", "dockerWindowsContainer", "none":
|
2015-10-11 14:20:50 -04:00
|
|
|
break
|
|
|
|
default:
|
|
|
|
return []error{fmt.Errorf("Communicator type %s is invalid", c.Type)}
|
2015-06-14 01:05:48 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return errs
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) prepareSSH(ctx *interpolate.Context) []error {
|
2015-06-13 17:42:38 -04:00
|
|
|
if c.SSHPort == 0 {
|
|
|
|
c.SSHPort = 22
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.SSHTimeout == 0 {
|
|
|
|
c.SSHTimeout = 5 * time.Minute
|
|
|
|
}
|
|
|
|
|
2018-01-31 01:00:37 -05:00
|
|
|
if c.SSHKeepAliveInterval == 0 {
|
|
|
|
c.SSHKeepAliveInterval = 5 * time.Second
|
|
|
|
}
|
|
|
|
|
2015-06-13 19:39:42 -04:00
|
|
|
if c.SSHHandshakeAttempts == 0 {
|
|
|
|
c.SSHHandshakeAttempts = 10
|
|
|
|
}
|
|
|
|
|
2015-06-17 16:10:42 -04:00
|
|
|
if c.SSHBastionHost != "" {
|
|
|
|
if c.SSHBastionPort == 0 {
|
|
|
|
c.SSHBastionPort = 22
|
|
|
|
}
|
2015-06-17 16:33:59 -04:00
|
|
|
|
2018-08-27 10:33:30 -04:00
|
|
|
if c.SSHBastionPrivateKeyFile == "" && c.SSHPrivateKeyFile != "" {
|
|
|
|
c.SSHBastionPrivateKeyFile = c.SSHPrivateKeyFile
|
2015-06-17 16:33:59 -04:00
|
|
|
}
|
2015-06-17 16:10:42 -04:00
|
|
|
}
|
|
|
|
|
2017-10-10 10:04:15 -04:00
|
|
|
if c.SSHProxyHost != "" {
|
|
|
|
if c.SSHProxyPort == 0 {
|
|
|
|
c.SSHProxyPort = 1080
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-26 19:39:56 -04:00
|
|
|
if c.SSHFileTransferMethod == "" {
|
|
|
|
c.SSHFileTransferMethod = "scp"
|
|
|
|
}
|
|
|
|
|
2015-06-13 17:42:38 -04:00
|
|
|
// Validation
|
|
|
|
var errs []error
|
2015-06-14 01:05:48 -04:00
|
|
|
if c.SSHUsername == "" {
|
2016-11-15 16:06:15 -05:00
|
|
|
errs = append(errs, errors.New("An ssh_username must be specified\n Note: some builders used to default ssh_username to \"root\"."))
|
2015-06-14 01:05:48 -04:00
|
|
|
}
|
2015-06-13 18:05:10 -04:00
|
|
|
|
2018-08-23 10:35:07 -04:00
|
|
|
if c.SSHPrivateKeyFile != "" {
|
2018-12-02 19:56:33 -05:00
|
|
|
path, err := packer.ExpandUser(c.SSHPrivateKeyFile)
|
2018-10-31 17:47:50 -04:00
|
|
|
if err != nil {
|
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_private_key_file is invalid: %s", err))
|
|
|
|
} else if _, err := os.Stat(path); err != nil {
|
2015-06-14 01:05:48 -04:00
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_private_key_file is invalid: %s", err))
|
2018-10-31 17:47:50 -04:00
|
|
|
} else if _, err := helperssh.FileSigner(path); err != nil {
|
2015-06-14 01:05:48 -04:00
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_private_key_file is invalid: %s", err))
|
2015-06-13 18:05:10 -04:00
|
|
|
}
|
2015-06-13 17:42:38 -04:00
|
|
|
}
|
|
|
|
|
2017-05-28 08:05:03 -04:00
|
|
|
if c.SSHBastionHost != "" && !c.SSHBastionAgentAuth {
|
2018-08-27 10:33:30 -04:00
|
|
|
if c.SSHBastionPassword == "" && c.SSHBastionPrivateKeyFile == "" {
|
2015-06-17 16:10:42 -04:00
|
|
|
errs = append(errs, errors.New(
|
|
|
|
"ssh_bastion_password or ssh_bastion_private_key_file must be specified"))
|
2018-10-31 18:26:18 -04:00
|
|
|
} else if c.SSHBastionPrivateKeyFile != "" {
|
2018-12-02 19:56:33 -05:00
|
|
|
path, err := packer.ExpandUser(c.SSHBastionPrivateKeyFile)
|
2018-10-31 18:26:18 -04:00
|
|
|
if err != nil {
|
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_bastion_private_key_file is invalid: %s", err))
|
|
|
|
} else if _, err := os.Stat(path); err != nil {
|
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_bastion_private_key_file is invalid: %s", err))
|
|
|
|
} else if _, err := helperssh.FileSigner(path); err != nil {
|
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_bastion_private_key_file is invalid: %s", err))
|
|
|
|
}
|
2015-06-17 16:10:42 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-26 19:39:56 -04:00
|
|
|
if c.SSHFileTransferMethod != "scp" && c.SSHFileTransferMethod != "sftp" {
|
|
|
|
errs = append(errs, fmt.Errorf(
|
|
|
|
"ssh_file_transfer_method ('%s') is invalid, valid methods: sftp, scp",
|
|
|
|
c.SSHFileTransferMethod))
|
|
|
|
}
|
|
|
|
|
2017-10-14 16:38:44 -04:00
|
|
|
if c.SSHBastionHost != "" && c.SSHProxyHost != "" {
|
|
|
|
errs = append(errs, errors.New("please specify either ssh_bastion_host or ssh_proxy_host, not both"))
|
|
|
|
}
|
|
|
|
|
2015-06-13 17:42:38 -04:00
|
|
|
return errs
|
|
|
|
}
|
2015-06-14 01:05:48 -04:00
|
|
|
|
|
|
|
func (c *Config) prepareWinRM(ctx *interpolate.Context) []error {
|
2016-02-29 09:26:28 -05:00
|
|
|
if c.WinRMPort == 0 && c.WinRMUseSSL {
|
|
|
|
c.WinRMPort = 5986
|
|
|
|
} else if c.WinRMPort == 0 {
|
2015-06-14 01:05:48 -04:00
|
|
|
c.WinRMPort = 5985
|
|
|
|
}
|
|
|
|
|
|
|
|
if c.WinRMTimeout == 0 {
|
|
|
|
c.WinRMTimeout = 30 * time.Minute
|
|
|
|
}
|
|
|
|
|
2017-06-07 07:08:12 -04:00
|
|
|
if c.WinRMUseNTLM == true {
|
|
|
|
c.WinRMTransportDecorator = func() winrm.Transporter { return &winrm.ClientNTLM{} }
|
|
|
|
}
|
|
|
|
|
2015-06-14 01:05:48 -04:00
|
|
|
var errs []error
|
|
|
|
if c.WinRMUser == "" {
|
|
|
|
errs = append(errs, errors.New("winrm_username must be specified."))
|
|
|
|
}
|
|
|
|
|
|
|
|
return errs
|
|
|
|
}
|