packer-cn/builder/vmware/common/ssh.go

63 lines
1.8 KiB
Go
Raw Normal View History

2013-12-24 01:27:01 -05:00
package common
import (
"errors"
"fmt"
"log"
"net"
2013-12-24 01:27:01 -05:00
2020-12-17 16:29:25 -05:00
"github.com/hashicorp/packer-plugin-sdk/multistep"
2013-12-24 01:27:01 -05:00
)
func CommHost(config *SSHConfig) func(multistep.StateBag) (string, error) {
return func(state multistep.StateBag) (string, error) {
driver := state.Get("driver").(Driver)
comm := config.Comm
host := comm.Host()
if host != "" {
return host, nil
}
// Snag the port from the communicator config. This way we can use it
// to perform a 3-way handshake with all of the hosts we suspect in
// order to determine which one of the hosts is the correct one.
port := comm.Port()
// Get the list of potential addresses that the guest might use.
hosts, err := driver.PotentialGuestIP(state)
if err != nil {
log.Printf("IP lookup failed: %s", err)
return "", fmt.Errorf("IP lookup failed: %s", err)
}
if len(hosts) == 0 {
log.Println("IP is blank, no IP yet.")
return "", errors.New("IP is blank")
}
// Iterate through our list of addresses and dial up each one similar to
// a really inefficient port-scan. This way we can determine which of
// the leases that we've parsed was the correct one and actually has our
// target ssh/winrm service bound to a tcp port.
for index, host := range hosts {
conn, err := net.Dial("tcp", fmt.Sprintf("%s:%d", host, port))
// If we got a connection, then we should be good to go. Return the
// address to the caller and pray that things work out.
if err == nil {
conn.Close()
log.Printf("Detected IP: %s", host)
return host, nil
}
// Otherwise we need to iterate to the next entry and keep hoping.
log.Printf("Skipping lease entry #%d due to being unable to connect to the host (%s) with tcp port (%d).", 1+index, host, port)
}
return "", errors.New("Host is not up")
}
}