133 lines
3.7 KiB
Go
133 lines
3.7 KiB
Go
|
package cvm
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
"fmt"
|
||
|
"io/ioutil"
|
||
|
"os"
|
||
|
"runtime"
|
||
|
"strings"
|
||
|
|
||
|
"github.com/hashicorp/packer/common"
|
||
|
"github.com/hashicorp/packer/helper/communicator"
|
||
|
"github.com/hashicorp/packer/helper/multistep"
|
||
|
"github.com/hashicorp/packer/packer"
|
||
|
cvm "github.com/tencentcloud/tencentcloud-sdk-go/tencentcloud/cvm/v20170312"
|
||
|
)
|
||
|
|
||
|
type stepConfigKeyPair struct {
|
||
|
Debug bool
|
||
|
Comm *communicator.Config
|
||
|
DebugKeyPath string
|
||
|
|
||
|
keyID string
|
||
|
}
|
||
|
|
||
|
func (s *stepConfigKeyPair) Run(_ context.Context, state multistep.StateBag) multistep.StepAction {
|
||
|
ui := state.Get("ui").(packer.Ui)
|
||
|
|
||
|
if s.Comm.SSHPrivateKeyFile != "" {
|
||
|
ui.Say("Using existing SSH private key")
|
||
|
privateKeyBytes, err := ioutil.ReadFile(s.Comm.SSHPrivateKeyFile)
|
||
|
if err != nil {
|
||
|
state.Put("error", fmt.Errorf(
|
||
|
"loading configured private key file failed: %s", err))
|
||
|
return multistep.ActionHalt
|
||
|
}
|
||
|
|
||
|
s.Comm.SSHPrivateKey = privateKeyBytes
|
||
|
|
||
|
return multistep.ActionContinue
|
||
|
}
|
||
|
|
||
|
if s.Comm.SSHAgentAuth && s.Comm.SSHKeyPairName == "" {
|
||
|
ui.Say("Using SSH Agent with key pair in source image")
|
||
|
return multistep.ActionContinue
|
||
|
}
|
||
|
|
||
|
if s.Comm.SSHAgentAuth && s.Comm.SSHKeyPairName != "" {
|
||
|
ui.Say(fmt.Sprintf("Using SSH Agent for existing key pair %s", s.Comm.SSHKeyPairName))
|
||
|
return multistep.ActionContinue
|
||
|
}
|
||
|
|
||
|
if s.Comm.SSHTemporaryKeyPairName == "" {
|
||
|
ui.Say("Not using temporary keypair")
|
||
|
s.Comm.SSHKeyPairName = ""
|
||
|
return multistep.ActionContinue
|
||
|
}
|
||
|
|
||
|
client := state.Get("cvm_client").(*cvm.Client)
|
||
|
ui.Say(fmt.Sprintf("Creating temporary keypair: %s", s.Comm.SSHTemporaryKeyPairName))
|
||
|
req := cvm.NewCreateKeyPairRequest()
|
||
|
req.KeyName = &s.Comm.SSHTemporaryKeyPairName
|
||
|
defaultProjectId := int64(0)
|
||
|
req.ProjectId = &defaultProjectId
|
||
|
resp, err := client.CreateKeyPair(req)
|
||
|
if err != nil {
|
||
|
state.Put("error", fmt.Errorf("creating temporary keypair failed: %s", err.Error()))
|
||
|
return multistep.ActionHalt
|
||
|
}
|
||
|
|
||
|
// set keyId to delete when Cleanup
|
||
|
s.keyID = *resp.Response.KeyPair.KeyId
|
||
|
|
||
|
s.Comm.SSHKeyPairName = *resp.Response.KeyPair.KeyId
|
||
|
s.Comm.SSHPrivateKey = []byte(*resp.Response.KeyPair.PrivateKey)
|
||
|
|
||
|
if s.Debug {
|
||
|
ui.Message(fmt.Sprintf("Saving key for debug purposes: %s", s.DebugKeyPath))
|
||
|
f, err := os.Create(s.DebugKeyPath)
|
||
|
if err != nil {
|
||
|
state.Put("error", fmt.Errorf("creating debug key file failed:%s", err.Error()))
|
||
|
return multistep.ActionHalt
|
||
|
}
|
||
|
defer f.Close()
|
||
|
|
||
|
if _, err := f.Write([]byte(*resp.Response.KeyPair.PrivateKey)); err != nil {
|
||
|
state.Put("error", fmt.Errorf("writing debug key file failed:%s", err.Error()))
|
||
|
return multistep.ActionHalt
|
||
|
}
|
||
|
|
||
|
if runtime.GOOS != "windows" {
|
||
|
if err := f.Chmod(0600); err != nil {
|
||
|
state.Put("error", fmt.Errorf("setting debug key file's permission failed:%s", err.Error()))
|
||
|
return multistep.ActionHalt
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
return multistep.ActionContinue
|
||
|
}
|
||
|
|
||
|
func (s *stepConfigKeyPair) Cleanup(state multistep.StateBag) {
|
||
|
if s.Comm.SSHPrivateKeyFile != "" || (s.Comm.SSHKeyPairName == "" && s.keyID == "") {
|
||
|
return
|
||
|
}
|
||
|
|
||
|
client := state.Get("cvm_client").(*cvm.Client)
|
||
|
ui := state.Get("ui").(packer.Ui)
|
||
|
|
||
|
ui.Say("Deleting temporary keypair...")
|
||
|
req := cvm.NewDeleteKeyPairsRequest()
|
||
|
req.KeyIds = []*string{&s.keyID}
|
||
|
err := common.Retry(5, 5, 60, func(u uint) (bool, error) {
|
||
|
_, err := client.DeleteKeyPairs(req)
|
||
|
if err == nil {
|
||
|
return true, nil
|
||
|
}
|
||
|
if strings.Index(err.Error(), "NotSupported") != -1 {
|
||
|
return false, nil
|
||
|
} else {
|
||
|
return false, err
|
||
|
}
|
||
|
})
|
||
|
if err != nil {
|
||
|
ui.Error(fmt.Sprintf(
|
||
|
"delete keypair failed, please delete it manually, keyId: %s, err: %s", s.keyID, err.Error()))
|
||
|
}
|
||
|
if s.Debug {
|
||
|
if err := os.Remove(s.DebugKeyPath); err != nil {
|
||
|
ui.Error(fmt.Sprintf("delete debug key file %s failed: %s", s.DebugKeyPath, err.Error()))
|
||
|
}
|
||
|
}
|
||
|
}
|