2013-08-27 00:57:23 -04:00
|
|
|
package openstack
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2015-07-27 18:05:51 -04:00
|
|
|
"io/ioutil"
|
2016-01-31 14:03:59 -05:00
|
|
|
"log"
|
2013-12-26 19:20:13 -05:00
|
|
|
"os"
|
2016-01-31 14:03:59 -05:00
|
|
|
"os/exec"
|
2013-12-26 19:20:13 -05:00
|
|
|
"runtime"
|
2014-10-27 19:40:49 -04:00
|
|
|
|
2015-06-12 00:16:43 -04:00
|
|
|
"github.com/mitchellh/multistep"
|
|
|
|
"github.com/mitchellh/packer/common/uuid"
|
|
|
|
"github.com/mitchellh/packer/packer"
|
|
|
|
"github.com/rackspace/gophercloud/openstack/compute/v2/extensions/keypairs"
|
2016-01-31 14:03:59 -05:00
|
|
|
"golang.org/x/crypto/ssh"
|
2013-08-27 00:57:23 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
type StepKeyPair struct {
|
2015-07-27 19:42:06 -04:00
|
|
|
Debug bool
|
|
|
|
DebugKeyPath string
|
|
|
|
KeyPairName string
|
|
|
|
PrivateKeyFile string
|
2015-07-27 18:05:51 -04:00
|
|
|
|
2015-07-27 19:42:06 -04:00
|
|
|
keyName string
|
2013-08-27 00:57:23 -04:00
|
|
|
}
|
|
|
|
|
2013-08-31 15:37:07 -04:00
|
|
|
func (s *StepKeyPair) Run(state multistep.StateBag) multistep.StepAction {
|
2015-07-27 18:05:51 -04:00
|
|
|
if s.PrivateKeyFile != "" {
|
|
|
|
privateKeyBytes, err := ioutil.ReadFile(s.PrivateKeyFile)
|
|
|
|
if err != nil {
|
|
|
|
state.Put("error", fmt.Errorf(
|
|
|
|
"Error loading configured private key file: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
|
|
|
state.Put("keyPair", s.KeyPairName)
|
|
|
|
state.Put("privateKey", string(privateKeyBytes))
|
|
|
|
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2015-06-12 00:16:43 -04:00
|
|
|
config := state.Get("config").(Config)
|
2013-08-31 15:37:07 -04:00
|
|
|
ui := state.Get("ui").(packer.Ui)
|
2013-08-27 00:57:23 -04:00
|
|
|
|
2015-06-12 00:16:43 -04:00
|
|
|
// We need the v2 compute client
|
|
|
|
computeClient, err := config.computeV2Client()
|
|
|
|
if err != nil {
|
|
|
|
err = fmt.Errorf("Error initializing compute client: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
2013-10-16 22:21:14 -04:00
|
|
|
keyName := fmt.Sprintf("packer %s", uuid.TimeOrderedUUID())
|
2015-12-17 14:12:52 -05:00
|
|
|
ui.Say(fmt.Sprintf("Creating temporary keypair: %s ...", keyName))
|
2015-06-12 00:16:43 -04:00
|
|
|
keypair, err := keypairs.Create(computeClient, keypairs.CreateOpts{
|
|
|
|
Name: keyName,
|
|
|
|
}).Extract()
|
2013-08-27 00:57:23 -04:00
|
|
|
if err != nil {
|
2013-08-31 15:37:07 -04:00
|
|
|
state.Put("error", fmt.Errorf("Error creating temporary keypair: %s", err))
|
2013-08-27 00:57:23 -04:00
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
2015-06-12 00:16:43 -04:00
|
|
|
|
|
|
|
if keypair.PrivateKey == "" {
|
2014-08-12 11:29:00 -04:00
|
|
|
state.Put("error", fmt.Errorf("The temporary keypair returned was blank"))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
2013-08-27 00:57:23 -04:00
|
|
|
|
2015-12-17 14:12:52 -05:00
|
|
|
ui.Say(fmt.Sprintf("Created temporary keypair: %s", keyName))
|
|
|
|
|
2016-01-31 14:03:59 -05:00
|
|
|
keypair.PrivateKey = berToDer(keypair.PrivateKey, ui)
|
|
|
|
|
2013-12-22 23:30:13 -05:00
|
|
|
// If we're in debug mode, output the private key to the working
|
|
|
|
// directory.
|
|
|
|
if s.Debug {
|
|
|
|
ui.Message(fmt.Sprintf("Saving key for debug purposes: %s", s.DebugKeyPath))
|
|
|
|
f, err := os.Create(s.DebugKeyPath)
|
|
|
|
if err != nil {
|
|
|
|
state.Put("error", fmt.Errorf("Error saving debug key: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
// Write the key out
|
2015-06-12 00:16:43 -04:00
|
|
|
if _, err := f.Write([]byte(keypair.PrivateKey)); err != nil {
|
2013-12-22 23:30:13 -05:00
|
|
|
state.Put("error", fmt.Errorf("Error saving debug key: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
|
|
|
// Chmod it so that it is SSH ready
|
|
|
|
if runtime.GOOS != "windows" {
|
|
|
|
if err := f.Chmod(0600); err != nil {
|
|
|
|
state.Put("error", fmt.Errorf("Error setting permissions of debug key: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-27 00:57:23 -04:00
|
|
|
// Set the keyname so we know to delete it later
|
|
|
|
s.keyName = keyName
|
|
|
|
|
|
|
|
// Set some state data for use in future steps
|
2013-08-31 15:37:07 -04:00
|
|
|
state.Put("keyPair", keyName)
|
2015-06-12 00:16:43 -04:00
|
|
|
state.Put("privateKey", keypair.PrivateKey)
|
2013-08-27 00:57:23 -04:00
|
|
|
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2016-01-31 14:03:59 -05:00
|
|
|
// Work around for https://github.com/mitchellh/packer/issues/2526
|
|
|
|
func berToDer(ber string, ui packer.Ui) string {
|
|
|
|
// Check if x/crypto/ssh can parse the key
|
|
|
|
_, err := ssh.ParsePrivateKey([]byte(ber))
|
|
|
|
if err == nil {
|
|
|
|
return ber
|
|
|
|
}
|
|
|
|
// Can't parse the key, maybe it's BER encoded. Try to convert it with OpenSSL.
|
|
|
|
log.Println("Couldn't parse SSH key, trying work around for [GH-2526].")
|
|
|
|
|
|
|
|
openSslPath, err := exec.LookPath("openssl")
|
|
|
|
if err != nil {
|
|
|
|
log.Println("Couldn't find OpenSSL, aborting work around.")
|
|
|
|
return ber
|
|
|
|
}
|
|
|
|
|
|
|
|
berKey, err := ioutil.TempFile("", "packer-ber-privatekey-")
|
|
|
|
defer os.Remove(berKey.Name())
|
|
|
|
if err != nil {
|
|
|
|
return ber
|
|
|
|
}
|
|
|
|
ioutil.WriteFile(berKey.Name(), []byte(ber), os.ModeAppend)
|
|
|
|
derKey, err := ioutil.TempFile("", "packer-der-privatekey-")
|
|
|
|
defer os.Remove(derKey.Name())
|
|
|
|
if err != nil {
|
|
|
|
return ber
|
|
|
|
}
|
|
|
|
|
|
|
|
args := []string{"rsa", "-in", berKey.Name(), "-out", derKey.Name()}
|
|
|
|
log.Printf("Executing: %s %v", openSslPath, args)
|
|
|
|
if err := exec.Command(openSslPath, args...).Run(); err != nil {
|
|
|
|
log.Printf("OpenSSL failed with error: %s", err)
|
|
|
|
return ber
|
|
|
|
}
|
|
|
|
|
|
|
|
der, err := ioutil.ReadFile(derKey.Name())
|
|
|
|
if err != nil {
|
|
|
|
return ber
|
|
|
|
}
|
|
|
|
ui.Say("Successfully converted BER encoded SSH key to DER encoding.")
|
|
|
|
return string(der)
|
|
|
|
}
|
|
|
|
|
2013-08-31 15:37:07 -04:00
|
|
|
func (s *StepKeyPair) Cleanup(state multistep.StateBag) {
|
2015-07-27 18:05:51 -04:00
|
|
|
// If we used an SSH private key file, do not go about deleting
|
|
|
|
// keypairs
|
|
|
|
if s.PrivateKeyFile != "" {
|
|
|
|
return
|
|
|
|
}
|
2013-08-27 00:57:23 -04:00
|
|
|
// If no key name is set, then we never created it, so just return
|
|
|
|
if s.keyName == "" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-06-12 00:16:43 -04:00
|
|
|
config := state.Get("config").(Config)
|
2013-08-31 15:37:07 -04:00
|
|
|
ui := state.Get("ui").(packer.Ui)
|
2013-08-27 00:57:23 -04:00
|
|
|
|
2015-06-12 00:16:43 -04:00
|
|
|
// We need the v2 compute client
|
|
|
|
computeClient, err := config.computeV2Client()
|
|
|
|
if err != nil {
|
|
|
|
ui.Error(fmt.Sprintf(
|
|
|
|
"Error cleaning up keypair. Please delete the key manually: %s", s.keyName))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-12-17 14:12:52 -05:00
|
|
|
ui.Say(fmt.Sprintf("Deleting temporary keypair: %s ...", s.keyName))
|
2015-06-12 00:16:43 -04:00
|
|
|
err = keypairs.Delete(computeClient, s.keyName).ExtractErr()
|
2013-08-27 00:57:23 -04:00
|
|
|
if err != nil {
|
|
|
|
ui.Error(fmt.Sprintf(
|
|
|
|
"Error cleaning up keypair. Please delete the key manually: %s", s.keyName))
|
|
|
|
}
|
|
|
|
}
|