2017-07-16 02:26:48 -04:00
|
|
|
package cloudstack
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"runtime"
|
|
|
|
|
2018-01-19 19:18:44 -05:00
|
|
|
"github.com/hashicorp/packer/helper/multistep"
|
2017-07-16 02:26:48 -04:00
|
|
|
"github.com/hashicorp/packer/packer"
|
|
|
|
"github.com/xanzy/go-cloudstack/cloudstack"
|
|
|
|
)
|
|
|
|
|
|
|
|
type stepKeypair struct {
|
2017-07-26 15:34:11 -04:00
|
|
|
Debug bool
|
|
|
|
DebugKeyPath string
|
|
|
|
KeyPair string
|
|
|
|
PrivateKeyFile string
|
|
|
|
SSHAgentAuth bool
|
|
|
|
TemporaryKeyPairName string
|
2017-07-16 02:26:48 -04:00
|
|
|
}
|
|
|
|
|
2018-01-22 18:31:41 -05:00
|
|
|
func (s *stepKeypair) Run(_ context.Context, state multistep.StateBag) multistep.StepAction {
|
2017-07-16 02:26:48 -04:00
|
|
|
ui := state.Get("ui").(packer.Ui)
|
|
|
|
|
|
|
|
if s.PrivateKeyFile != "" {
|
|
|
|
privateKeyBytes, err := ioutil.ReadFile(s.PrivateKeyFile)
|
|
|
|
if err != nil {
|
|
|
|
state.Put("error", fmt.Errorf(
|
|
|
|
"Error loading configured private key file: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
|
|
|
state.Put("keypair", s.KeyPair)
|
|
|
|
state.Put("privateKey", string(privateKeyBytes))
|
|
|
|
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
|
|
|
if s.SSHAgentAuth && s.KeyPair == "" {
|
|
|
|
ui.Say("Using SSH Agent with keypair in Source image")
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
|
|
|
if s.SSHAgentAuth && s.KeyPair != "" {
|
|
|
|
ui.Say(fmt.Sprintf("Using SSH Agent for existing keypair %s", s.KeyPair))
|
|
|
|
state.Put("keypair", s.KeyPair)
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2017-07-26 15:34:11 -04:00
|
|
|
if s.TemporaryKeyPairName == "" {
|
|
|
|
ui.Say("Not using a keypair")
|
2017-07-16 02:26:48 -04:00
|
|
|
state.Put("keypair", "")
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
|
|
|
client := state.Get("client").(*cloudstack.CloudStackClient)
|
|
|
|
|
2017-07-26 15:34:11 -04:00
|
|
|
ui.Say(fmt.Sprintf("Creating temporary keypair: %s ...", s.TemporaryKeyPairName))
|
2017-07-16 02:26:48 -04:00
|
|
|
|
2017-07-26 15:34:11 -04:00
|
|
|
p := client.SSH.NewCreateSSHKeyPairParams(s.TemporaryKeyPairName)
|
2017-07-16 02:26:48 -04:00
|
|
|
keypair, err := client.SSH.CreateSSHKeyPair(p)
|
|
|
|
if err != nil {
|
|
|
|
err := fmt.Errorf("Error creating temporary keypair: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
|
|
|
if keypair.Privatekey == "" {
|
|
|
|
err := fmt.Errorf("The temporary keypair returned was blank")
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
2017-07-26 15:34:11 -04:00
|
|
|
ui.Say(fmt.Sprintf("Created temporary keypair: %s", s.TemporaryKeyPairName))
|
2017-07-16 02:26:48 -04:00
|
|
|
|
2017-07-26 15:34:11 -04:00
|
|
|
// If we're in debug mode, output the private key to the working directory.
|
2017-07-16 02:26:48 -04:00
|
|
|
if s.Debug {
|
|
|
|
ui.Message(fmt.Sprintf("Saving key for debug purposes: %s", s.DebugKeyPath))
|
|
|
|
f, err := os.Create(s.DebugKeyPath)
|
|
|
|
if err != nil {
|
|
|
|
state.Put("error", fmt.Errorf("Error saving debug key: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
// Write the key out
|
|
|
|
if _, err := f.Write([]byte(keypair.Privatekey)); err != nil {
|
|
|
|
err := fmt.Errorf("Error saving debug key: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
|
|
|
// Chmod it so that it is SSH ready
|
|
|
|
if runtime.GOOS != "windows" {
|
|
|
|
if err := f.Chmod(0600); err != nil {
|
|
|
|
err := fmt.Errorf("Error setting permissions of debug key: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set some state data for use in future steps
|
2017-07-26 15:34:11 -04:00
|
|
|
state.Put("keypair", s.TemporaryKeyPairName)
|
2017-07-16 02:26:48 -04:00
|
|
|
state.Put("privateKey", keypair.Privatekey)
|
|
|
|
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *stepKeypair) Cleanup(state multistep.StateBag) {
|
2017-07-26 15:34:11 -04:00
|
|
|
if s.TemporaryKeyPairName == "" {
|
2017-07-16 02:26:48 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ui := state.Get("ui").(packer.Ui)
|
|
|
|
client := state.Get("client").(*cloudstack.CloudStackClient)
|
|
|
|
|
2017-07-26 15:34:11 -04:00
|
|
|
ui.Say(fmt.Sprintf("Deleting temporary keypair: %s ...", s.TemporaryKeyPairName))
|
2017-07-16 02:26:48 -04:00
|
|
|
|
|
|
|
_, err := client.SSH.DeleteSSHKeyPair(client.SSH.NewDeleteSSHKeyPairParams(
|
2017-07-26 15:34:11 -04:00
|
|
|
s.TemporaryKeyPairName,
|
2017-07-16 02:26:48 -04:00
|
|
|
))
|
|
|
|
if err != nil {
|
|
|
|
ui.Error(err.Error())
|
|
|
|
ui.Error(fmt.Sprintf(
|
2017-07-26 15:34:11 -04:00
|
|
|
"Error cleaning up keypair. Please delete the key manually: %s", s.TemporaryKeyPairName))
|
2017-07-16 02:26:48 -04:00
|
|
|
}
|
|
|
|
}
|