2019-04-11 12:52:21 -04:00
|
|
|
package proxmox
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
2019-09-04 17:03:25 -04:00
|
|
|
"errors"
|
2019-04-11 12:52:21 -04:00
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/Telmate/proxmox-api-go/proxmox"
|
2019-12-17 05:25:56 -05:00
|
|
|
"github.com/hashicorp/hcl/v2/hcldec"
|
2019-04-11 12:52:21 -04:00
|
|
|
"github.com/hashicorp/packer/common"
|
|
|
|
"github.com/hashicorp/packer/helper/communicator"
|
|
|
|
"github.com/hashicorp/packer/helper/multistep"
|
|
|
|
"github.com/hashicorp/packer/packer"
|
|
|
|
)
|
|
|
|
|
|
|
|
// The unique id for the builder
|
|
|
|
const BuilderId = "proxmox.builder"
|
|
|
|
|
|
|
|
type Builder struct {
|
|
|
|
config Config
|
|
|
|
runner multistep.Runner
|
|
|
|
proxmoxClient *proxmox.Client
|
|
|
|
}
|
|
|
|
|
|
|
|
// Builder implements packer.Builder
|
|
|
|
var _ packer.Builder = &Builder{}
|
|
|
|
|
|
|
|
var pluginVersion = "1.0.0"
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
func (b *Builder) ConfigSpec() hcldec.ObjectSpec { return b.config.FlatMapstructure().HCL2Spec() }
|
|
|
|
|
2019-12-17 00:23:05 -05:00
|
|
|
func (b *Builder) Prepare(raws ...interface{}) ([]string, []string, error) {
|
2019-12-17 05:25:56 -05:00
|
|
|
warnings, errs := b.config.Prepare(raws...)
|
2019-04-11 12:52:21 -04:00
|
|
|
if errs != nil {
|
2019-12-17 00:23:05 -05:00
|
|
|
return nil, warnings, errs
|
2019-04-11 12:52:21 -04:00
|
|
|
}
|
2019-12-17 00:23:05 -05:00
|
|
|
return nil, nil, nil
|
2019-04-11 12:52:21 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Builder) Run(ctx context.Context, ui packer.Ui, hook packer.Hook) (packer.Artifact, error) {
|
|
|
|
var err error
|
|
|
|
tlsConfig := &tls.Config{
|
|
|
|
InsecureSkipVerify: b.config.SkipCertValidation,
|
|
|
|
}
|
2019-10-14 10:10:35 -04:00
|
|
|
b.proxmoxClient, err = proxmox.NewClient(b.config.proxmoxURL.String(), nil, tlsConfig)
|
2019-04-11 12:52:21 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-09-07 15:07:09 -04:00
|
|
|
err = b.proxmoxClient.Login(b.config.Username, b.config.Password, "")
|
2019-04-11 12:52:21 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set up the state
|
|
|
|
state := new(multistep.BasicStateBag)
|
|
|
|
state.Put("config", &b.config)
|
|
|
|
state.Put("proxmoxClient", b.proxmoxClient)
|
|
|
|
state.Put("hook", hook)
|
|
|
|
state.Put("ui", ui)
|
|
|
|
|
|
|
|
// Build the steps
|
|
|
|
steps := []multistep.Step{
|
|
|
|
&stepStartVM{},
|
|
|
|
&common.StepHTTPServer{
|
|
|
|
HTTPDir: b.config.HTTPDir,
|
|
|
|
HTTPPortMin: b.config.HTTPPortMin,
|
|
|
|
HTTPPortMax: b.config.HTTPPortMax,
|
|
|
|
},
|
|
|
|
&stepTypeBootCommand{
|
|
|
|
BootConfig: b.config.BootConfig,
|
|
|
|
Ctx: b.config.ctx,
|
|
|
|
},
|
|
|
|
&communicator.StepConnect{
|
|
|
|
Config: &b.config.Comm,
|
2019-04-30 16:26:40 -04:00
|
|
|
Host: commHost(b.config.Comm.Host()),
|
2019-04-11 12:52:21 -04:00
|
|
|
SSHConfig: b.config.Comm.SSHConfigFunc(),
|
|
|
|
},
|
|
|
|
&common.StepProvision{},
|
|
|
|
&common.StepCleanupTempKeys{
|
|
|
|
Comm: &b.config.Comm,
|
|
|
|
},
|
|
|
|
&stepConvertToTemplate{},
|
|
|
|
&stepFinalizeTemplateConfig{},
|
|
|
|
&stepSuccess{},
|
|
|
|
}
|
|
|
|
// Run the steps
|
|
|
|
b.runner = common.NewRunner(steps, b.config.PackerConfig, ui)
|
|
|
|
b.runner.Run(ctx, state)
|
|
|
|
// If there was an error, return that
|
|
|
|
if rawErr, ok := state.GetOk("error"); ok {
|
|
|
|
return nil, rawErr.(error)
|
|
|
|
}
|
2019-09-04 17:03:25 -04:00
|
|
|
// If we were interrupted or cancelled, then just exit.
|
|
|
|
if _, ok := state.GetOk(multistep.StateCancelled); ok {
|
|
|
|
return nil, errors.New("build was cancelled")
|
|
|
|
}
|
2019-04-11 12:52:21 -04:00
|
|
|
|
2019-09-04 17:03:25 -04:00
|
|
|
// Verify that the template_id was set properly, otherwise we didn't progress through the last step
|
2019-09-04 08:21:52 -04:00
|
|
|
tplID, ok := state.Get("template_id").(int)
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("template ID could not be determined")
|
|
|
|
}
|
|
|
|
|
2019-04-11 12:52:21 -04:00
|
|
|
artifact := &Artifact{
|
2019-09-04 08:21:52 -04:00
|
|
|
templateID: tplID,
|
2019-04-11 12:52:21 -04:00
|
|
|
proxmoxClient: b.proxmoxClient,
|
|
|
|
}
|
|
|
|
|
|
|
|
return artifact, nil
|
|
|
|
}
|
|
|
|
|
2019-04-30 16:26:40 -04:00
|
|
|
// Returns ssh_host or winrm_host (see communicator.Config.Host) config
|
|
|
|
// parameter when set, otherwise gets the host IP from running VM
|
|
|
|
func commHost(host string) func(state multistep.StateBag) (string, error) {
|
|
|
|
if host != "" {
|
2019-04-25 05:43:12 -04:00
|
|
|
return func(state multistep.StateBag) (string, error) {
|
2019-04-30 16:26:40 -04:00
|
|
|
return host, nil
|
2019-04-25 05:43:12 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return getVMIP
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reads the first non-loopback interface's IP address from the VM.
|
|
|
|
// qemu-guest-agent package must be installed on the VM
|
2019-04-11 12:52:21 -04:00
|
|
|
func getVMIP(state multistep.StateBag) (string, error) {
|
|
|
|
c := state.Get("proxmoxClient").(*proxmox.Client)
|
|
|
|
vmRef := state.Get("vmRef").(*proxmox.VmRef)
|
|
|
|
|
|
|
|
ifs, err := c.GetVmAgentNetworkInterfaces(vmRef)
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: Do something smarter here? Allow specifying interface? Or address family?
|
|
|
|
// For now, just go for first non-loopback
|
|
|
|
for _, iface := range ifs {
|
|
|
|
for _, addr := range iface.IPAddresses {
|
|
|
|
if addr.IsLoopback() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
return addr.String(), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return "", fmt.Errorf("Found no IP addresses on VM")
|
|
|
|
}
|