2019-10-14 10:43:59 -04:00
|
|
|
//go:generate mapstructure-to-hcl2 -type Config
|
2020-06-17 04:09:03 -04:00
|
|
|
//go:generate struct-markdown
|
2019-10-14 10:43:59 -04:00
|
|
|
|
2015-03-10 00:11:57 -04:00
|
|
|
package ansible
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"bytes"
|
2019-03-19 13:11:19 -04:00
|
|
|
"context"
|
2016-02-04 21:40:17 -05:00
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/pem"
|
2015-03-10 00:11:57 -04:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"log"
|
|
|
|
"net"
|
|
|
|
"os"
|
|
|
|
"os/exec"
|
2018-01-03 02:33:32 -05:00
|
|
|
"os/user"
|
2015-03-10 00:11:57 -04:00
|
|
|
"path/filepath"
|
2016-03-01 13:35:48 -05:00
|
|
|
"regexp"
|
2015-03-10 00:11:57 -04:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
2016-02-27 01:20:54 -05:00
|
|
|
"unicode"
|
2015-03-10 00:11:57 -04:00
|
|
|
|
|
|
|
"golang.org/x/crypto/ssh"
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
"github.com/hashicorp/hcl/v2/hcldec"
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/common"
|
2019-02-12 02:10:57 -05:00
|
|
|
"github.com/hashicorp/packer/common/adapter"
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/helper/config"
|
|
|
|
"github.com/hashicorp/packer/packer"
|
2018-12-12 09:45:00 -05:00
|
|
|
"github.com/hashicorp/packer/packer/tmp"
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/template/interpolate"
|
2015-03-10 00:11:57 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
type Config struct {
|
|
|
|
common.PackerConfig `mapstructure:",squash"`
|
|
|
|
ctx interpolate.Context
|
2020-06-17 04:09:03 -04:00
|
|
|
// The command to invoke ansible. Defaults to
|
|
|
|
// `ansible-playbook`. If you would like to provide a more complex command,
|
|
|
|
// for example, something that sets up a virtual environment before calling
|
|
|
|
// ansible, take a look at the ansible wrapper guide below for inspiration.
|
2015-03-10 00:11:57 -04:00
|
|
|
Command string
|
2020-06-17 04:09:03 -04:00
|
|
|
// Extra arguments to pass to Ansible.
|
|
|
|
// These arguments _will not_ be passed through a shell and arguments should
|
|
|
|
// not be quoted. Usage example:
|
|
|
|
//
|
|
|
|
// ```json
|
|
|
|
// "extra_arguments": [ "--extra-vars", "Region={{user `Region`}} Stage={{user `Stage`}}" ]
|
|
|
|
// ```
|
|
|
|
//
|
|
|
|
// If you are running a Windows build on AWS, Azure, Google Compute, or OpenStack
|
|
|
|
// and would like to access the auto-generated password that Packer uses to
|
|
|
|
// connect to a Windows instance via WinRM, you can use the template variable
|
|
|
|
// `{{.WinRMPassword}}` in this option. For example:
|
|
|
|
//
|
|
|
|
// ```json
|
|
|
|
// "extra_arguments": [
|
|
|
|
// "--extra-vars", "winrm_password={{ .WinRMPassword }}"
|
|
|
|
// ]
|
|
|
|
// ```
|
2015-03-10 00:11:57 -04:00
|
|
|
ExtraArguments []string `mapstructure:"extra_arguments"`
|
2020-06-17 04:09:03 -04:00
|
|
|
// Environment variables to set before
|
|
|
|
// running Ansible. Usage example:
|
|
|
|
//
|
|
|
|
// ```json
|
|
|
|
// "ansible_env_vars": [ "ANSIBLE_HOST_KEY_CHECKING=False", "ANSIBLE_SSH_ARGS='-o ForwardAgent=yes -o ControlMaster=auto -o ControlPersist=60s'", "ANSIBLE_NOCOLOR=True" ]
|
|
|
|
// ```
|
|
|
|
//
|
|
|
|
// This is a [template engine](/docs/templates/engine). Therefore, you
|
|
|
|
// may use user variables and template functions in this field.
|
|
|
|
//
|
|
|
|
// For example, if you are running a Windows build on AWS, Azure,
|
|
|
|
// Google Compute, or OpenStack and would like to access the auto-generated
|
|
|
|
// password that Packer uses to connect to a Windows instance via WinRM, you
|
|
|
|
// can use the template variable `{{.WinRMPassword}}` in this option. Example:
|
|
|
|
//
|
|
|
|
// ```json
|
|
|
|
// "ansible_env_vars": [ "WINRM_PASSWORD={{.WinRMPassword}}" ],
|
|
|
|
// ```
|
2016-02-14 19:07:02 -05:00
|
|
|
AnsibleEnvVars []string `mapstructure:"ansible_env_vars"`
|
2020-06-17 04:09:03 -04:00
|
|
|
// The playbook to be run by Ansible.
|
|
|
|
PlaybookFile string `mapstructure:"playbook_file" required:"true"`
|
|
|
|
// The groups into which the Ansible host should
|
|
|
|
// be placed. When unspecified, the host is not associated with any groups.
|
|
|
|
Groups []string `mapstructure:"groups"`
|
|
|
|
// The groups which should be present in
|
|
|
|
// inventory file but remain empty.
|
|
|
|
EmptyGroups []string `mapstructure:"empty_groups"`
|
|
|
|
// The alias by which the Ansible host should be
|
|
|
|
// known. Defaults to `default`. This setting is ignored when using a custom
|
|
|
|
// inventory file.
|
|
|
|
HostAlias string `mapstructure:"host_alias"`
|
|
|
|
// The `ansible_user` to use. Defaults to the user running
|
|
|
|
// packer, NOT the user set for your communicator. If you want to use the same
|
|
|
|
// user as the communicator, you will need to manually set it again in this
|
|
|
|
// field.
|
|
|
|
User string `mapstructure:"user"`
|
|
|
|
// The port on which to attempt to listen for SSH
|
|
|
|
// connections. This value is a starting point. The provisioner will attempt
|
|
|
|
// listen for SSH connections on the first available of ten ports, starting at
|
|
|
|
// `local_port`. A system-chosen port is used when `local_port` is missing or
|
|
|
|
// empty.
|
|
|
|
LocalPort int `mapstructure:"local_port"`
|
|
|
|
// The SSH key that will be used to run the SSH
|
|
|
|
// server on the host machine to forward commands to the target machine.
|
|
|
|
// Ansible connects to this server and will validate the identity of the
|
|
|
|
// server using the system known_hosts. The default behavior is to generate
|
|
|
|
// and use a onetime key. Host key checking is disabled via the
|
|
|
|
// `ANSIBLE_HOST_KEY_CHECKING` environment variable if the key is generated.
|
|
|
|
SSHHostKeyFile string `mapstructure:"ssh_host_key_file"`
|
|
|
|
// The SSH public key of the Ansible
|
|
|
|
// `ssh_user`. The default behavior is to generate and use a onetime key. If
|
|
|
|
// this key is generated, the corresponding private key is passed to
|
|
|
|
// `ansible-playbook` with the `-e ansible_ssh_private_key_file` option.
|
|
|
|
SSHAuthorizedKeyFile string `mapstructure:"ssh_authorized_key_file"`
|
|
|
|
// The command to run on the machine being
|
|
|
|
// provisioned by Packer to handle the SFTP protocol that Ansible will use to
|
|
|
|
// transfer files. The command should read and write on stdin and stdout,
|
|
|
|
// respectively. Defaults to `/usr/lib/sftp-server -e`.
|
|
|
|
SFTPCmd string `mapstructure:"sftp_command"`
|
|
|
|
// Check if ansible is installed prior to
|
|
|
|
// running. Set this to `true`, for example, if you're going to install
|
|
|
|
// ansible during the packer run.
|
|
|
|
SkipVersionCheck bool `mapstructure:"skip_version_check"`
|
|
|
|
UseSFTP bool `mapstructure:"use_sftp"`
|
|
|
|
// The directory in which to place the
|
|
|
|
// temporary generated Ansible inventory file. By default, this is the
|
|
|
|
// system-specific temporary file location. The fully-qualified name of this
|
|
|
|
// temporary file will be passed to the `-i` argument of the `ansible` command
|
|
|
|
// when this provisioner runs ansible. Specify this if you have an existing
|
|
|
|
// inventory directory with `host_vars` `group_vars` that you would like to
|
|
|
|
// use in the playbook that this provisioner will run.
|
|
|
|
InventoryDirectory string `mapstructure:"inventory_directory"`
|
2020-06-17 05:05:48 -04:00
|
|
|
// This template represents the format for the lines added to the temporary
|
|
|
|
// inventory file that Packer will create to run Ansible against your image.
|
|
|
|
// The default for recent versions of Ansible is:
|
|
|
|
// "{{ .HostAlias }} ansible_host={{ .Host }} ansible_user={{ .User }} ansible_port={{ .Port }}\n"
|
|
|
|
// Available template engines are: This option is a template engine;
|
|
|
|
// variables available to you include the examples in the default (Host,
|
|
|
|
// HostAlias, User, Port) as well as any variables available to you via the
|
|
|
|
// "build" template engine.
|
|
|
|
InventoryFileTemplate string `mapstructure:"inventory_file_template"`
|
2020-06-17 04:09:03 -04:00
|
|
|
// The inventory file to use during provisioning.
|
|
|
|
// When unspecified, Packer will create a temporary inventory file and will
|
|
|
|
// use the `host_alias`.
|
|
|
|
InventoryFile string `mapstructure:"inventory_file"`
|
|
|
|
// If `true`, the Ansible provisioner will
|
|
|
|
// not delete the temporary inventory file it creates in order to connect to
|
|
|
|
// the instance. This is useful if you are trying to debug your ansible run
|
|
|
|
// and using "--on-error=ask" in order to leave your instance running while you
|
|
|
|
// test your playbook. this option is not used if you set an `inventory_file`.
|
|
|
|
KeepInventoryFile bool `mapstructure:"keep_inventory_file"`
|
|
|
|
// A requirements file which provides a way to
|
|
|
|
// install roles with the [ansible-galaxy
|
|
|
|
// cli](http://docs.ansible.com/ansible/galaxy.html#the-ansible-galaxy-command-line-tool)
|
|
|
|
// on the local machine before executing `ansible-playbook`. By default, this is empty.
|
|
|
|
GalaxyFile string `mapstructure:"galaxy_file"`
|
|
|
|
// The command to invoke ansible-galaxy. By default, this is
|
|
|
|
// `ansible-galaxy`.
|
|
|
|
GalaxyCommand string `mapstructure:"galaxy_command"`
|
|
|
|
// Force overwriting an existing role.
|
|
|
|
// Adds `--force` option to `ansible-galaxy` command. By default, this is
|
|
|
|
// `false`.
|
|
|
|
GalaxyForceInstall bool `mapstructure:"galaxy_force_install"`
|
|
|
|
// The path to the directory on your local system to
|
|
|
|
// install the roles in. Adds `--roles-path /path/to/your/roles` to
|
|
|
|
// `ansible-galaxy` command. By default, this is empty, and thus `--roles-path`
|
|
|
|
// option is not added to the command.
|
|
|
|
RolesPath string `mapstructure:"roles_path"`
|
|
|
|
// When `true`, set up a localhost proxy adapter
|
|
|
|
// so that Ansible has an IP address to connect to, even if your guest does not
|
|
|
|
// have an IP address. For example, the adapter is necessary for Docker builds
|
|
|
|
// to use the Ansible provisioner. If you set this option to `false`, but
|
|
|
|
// Packer cannot find an IP address to connect Ansible to, it will
|
|
|
|
// automatically set up the adapter anyway.
|
|
|
|
//
|
|
|
|
// In order for Ansible to connect properly even when use_proxy is false, you
|
|
|
|
// need to make sure that you are either providing a valid username and ssh key
|
|
|
|
// to the ansible provisioner directly, or that the username and ssh key
|
|
|
|
// being used by the ssh communicator will work for your needs. If you do not
|
|
|
|
// provide a user to ansible, it will use the user associated with your
|
|
|
|
// builder, not the user running Packer.
|
|
|
|
// use_proxy=false is currently only supported for SSH and WinRM.
|
|
|
|
//
|
|
|
|
// Currently, this defaults to `true` for all connection types. In the future,
|
|
|
|
// this option will be changed to default to `false` for SSH and WinRM
|
|
|
|
// connections where the provisioner has access to a host IP.
|
2020-02-04 13:42:55 -05:00
|
|
|
UseProxy config.Trilean `mapstructure:"use_proxy"`
|
|
|
|
userWasEmpty bool
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
type Provisioner struct {
|
2016-03-01 13:35:48 -05:00
|
|
|
config Config
|
2019-02-12 02:10:57 -05:00
|
|
|
adapter *adapter.Adapter
|
2016-03-01 13:35:48 -05:00
|
|
|
done chan struct{}
|
|
|
|
ansibleVersion string
|
|
|
|
ansibleMajVersion uint
|
2019-12-12 19:42:53 -05:00
|
|
|
generatedData map[string]interface{}
|
2020-02-04 13:42:55 -05:00
|
|
|
|
|
|
|
setupAdapterFunc func(ui packer.Ui, comm packer.Communicator) (string, error)
|
|
|
|
executeAnsibleFunc func(ui packer.Ui, comm packer.Communicator, privKeyFile string) error
|
2018-07-17 15:52:32 -04:00
|
|
|
}
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
func (p *Provisioner) ConfigSpec() hcldec.ObjectSpec { return p.config.FlatMapstructure().HCL2Spec() }
|
|
|
|
|
2015-03-10 00:11:57 -04:00
|
|
|
func (p *Provisioner) Prepare(raws ...interface{}) error {
|
|
|
|
p.done = make(chan struct{})
|
|
|
|
|
|
|
|
err := config.Decode(&p.config, &config.DecodeOpts{
|
|
|
|
Interpolate: true,
|
|
|
|
InterpolateContext: &p.config.ctx,
|
|
|
|
InterpolateFilter: &interpolate.RenderFilter{
|
2020-06-17 05:05:48 -04:00
|
|
|
Exclude: []string{
|
|
|
|
"inventory_file_template",
|
|
|
|
},
|
2015-03-10 00:11:57 -04:00
|
|
|
},
|
|
|
|
}, raws...)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Defaults
|
|
|
|
if p.config.Command == "" {
|
|
|
|
p.config.Command = "ansible-playbook"
|
|
|
|
}
|
|
|
|
|
2019-07-26 12:44:40 -04:00
|
|
|
if p.config.GalaxyCommand == "" {
|
|
|
|
p.config.GalaxyCommand = "ansible-galaxy"
|
|
|
|
}
|
|
|
|
|
2016-02-11 01:24:12 -05:00
|
|
|
if p.config.HostAlias == "" {
|
|
|
|
p.config.HostAlias = "default"
|
|
|
|
}
|
|
|
|
|
2015-03-10 00:11:57 -04:00
|
|
|
var errs *packer.MultiError
|
|
|
|
err = validateFileConfig(p.config.PlaybookFile, "playbook_file", true)
|
|
|
|
if err != nil {
|
|
|
|
errs = packer.MultiErrorAppend(errs, err)
|
|
|
|
}
|
|
|
|
|
2019-07-26 12:44:40 -04:00
|
|
|
// Check that the galaxy file exists, if configured
|
|
|
|
if len(p.config.GalaxyFile) > 0 {
|
|
|
|
err = validateFileConfig(p.config.GalaxyFile, "galaxy_file", true)
|
|
|
|
if err != nil {
|
|
|
|
errs = packer.MultiErrorAppend(errs, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-06 21:09:15 -05:00
|
|
|
// Check that the authorized key file exists
|
2016-02-04 21:40:17 -05:00
|
|
|
if len(p.config.SSHAuthorizedKeyFile) > 0 {
|
|
|
|
err = validateFileConfig(p.config.SSHAuthorizedKeyFile, "ssh_authorized_key_file", true)
|
|
|
|
if err != nil {
|
|
|
|
log.Println(p.config.SSHAuthorizedKeyFile, "does not exist")
|
|
|
|
errs = packer.MultiErrorAppend(errs, err)
|
|
|
|
}
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
if len(p.config.SSHHostKeyFile) > 0 {
|
|
|
|
err = validateFileConfig(p.config.SSHHostKeyFile, "ssh_host_key_file", true)
|
|
|
|
if err != nil {
|
|
|
|
log.Println(p.config.SSHHostKeyFile, "does not exist")
|
|
|
|
errs = packer.MultiErrorAppend(errs, err)
|
|
|
|
}
|
2016-09-12 02:29:24 -04:00
|
|
|
} else {
|
|
|
|
p.config.AnsibleEnvVars = append(p.config.AnsibleEnvVars, "ANSIBLE_HOST_KEY_CHECKING=False")
|
|
|
|
}
|
|
|
|
|
|
|
|
if !p.config.UseSFTP {
|
|
|
|
p.config.AnsibleEnvVars = append(p.config.AnsibleEnvVars, "ANSIBLE_SCP_IF_SSH=True")
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
|
2019-02-04 12:47:42 -05:00
|
|
|
if p.config.LocalPort > 65535 {
|
|
|
|
errs = packer.MultiErrorAppend(errs, fmt.Errorf("local_port: %d must be a valid port", p.config.LocalPort))
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
|
2017-04-04 23:49:24 -04:00
|
|
|
if len(p.config.InventoryDirectory) > 0 {
|
2017-04-06 15:50:02 -04:00
|
|
|
err = validateInventoryDirectoryConfig(p.config.InventoryDirectory)
|
2017-04-04 23:49:24 -04:00
|
|
|
if err != nil {
|
|
|
|
log.Println(p.config.InventoryDirectory, "does not exist")
|
|
|
|
errs = packer.MultiErrorAppend(errs, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-07 14:12:07 -04:00
|
|
|
if !p.config.SkipVersionCheck {
|
|
|
|
err = p.getVersion()
|
|
|
|
if err != nil {
|
|
|
|
errs = packer.MultiErrorAppend(errs, err)
|
|
|
|
}
|
2016-03-01 13:35:48 -05:00
|
|
|
}
|
|
|
|
|
2016-02-26 15:50:50 -05:00
|
|
|
if p.config.User == "" {
|
2020-02-04 13:42:55 -05:00
|
|
|
p.config.userWasEmpty = true
|
2018-01-03 02:33:32 -05:00
|
|
|
usr, err := user.Current()
|
|
|
|
if err != nil {
|
|
|
|
errs = packer.MultiErrorAppend(errs, err)
|
|
|
|
} else {
|
|
|
|
p.config.User = usr.Username
|
|
|
|
}
|
2016-02-26 16:16:22 -05:00
|
|
|
}
|
|
|
|
if p.config.User == "" {
|
|
|
|
errs = packer.MultiErrorAppend(errs, fmt.Errorf("user: could not determine current user from environment."))
|
2016-02-26 15:50:50 -05:00
|
|
|
}
|
|
|
|
|
2020-02-04 13:42:55 -05:00
|
|
|
// These fields exist so that we can replace the functions for testing
|
|
|
|
// logic inside of the Provision func; in actual use, these don't ever
|
|
|
|
// need to get set.
|
|
|
|
if p.setupAdapterFunc == nil {
|
|
|
|
p.setupAdapterFunc = p.setupAdapter
|
|
|
|
}
|
|
|
|
if p.executeAnsibleFunc == nil {
|
|
|
|
p.executeAnsibleFunc = p.executeAnsible
|
|
|
|
}
|
|
|
|
|
2015-03-10 00:11:57 -04:00
|
|
|
if errs != nil && len(errs.Errors) > 0 {
|
|
|
|
return errs
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-03-01 13:35:48 -05:00
|
|
|
func (p *Provisioner) getVersion() error {
|
|
|
|
out, err := exec.Command(p.config.Command, "--version").Output()
|
|
|
|
if err != nil {
|
2017-03-21 23:26:41 -04:00
|
|
|
return fmt.Errorf(
|
|
|
|
"Error running \"%s --version\": %s", p.config.Command, err.Error())
|
2016-03-01 13:35:48 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
versionRe := regexp.MustCompile(`\w (\d+\.\d+[.\d+]*)`)
|
|
|
|
matches := versionRe.FindStringSubmatch(string(out))
|
|
|
|
if matches == nil {
|
|
|
|
return fmt.Errorf(
|
|
|
|
"Could not find %s version in output:\n%s", p.config.Command, string(out))
|
|
|
|
}
|
|
|
|
|
|
|
|
version := matches[1]
|
|
|
|
log.Printf("%s version: %s", p.config.Command, version)
|
|
|
|
p.ansibleVersion = version
|
|
|
|
|
|
|
|
majVer, err := strconv.ParseUint(strings.Split(version, ".")[0], 10, 0)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Could not parse major version from \"%s\".", version)
|
|
|
|
}
|
|
|
|
p.ansibleMajVersion = uint(majVer)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-02-04 13:42:55 -05:00
|
|
|
func (p *Provisioner) setupAdapter(ui packer.Ui, comm packer.Communicator) (string, error) {
|
|
|
|
ui.Message("Setting up proxy adapter for Ansible....")
|
2018-07-02 20:42:21 -04:00
|
|
|
|
2016-02-06 21:09:15 -05:00
|
|
|
k, err := newUserKey(p.config.SSHAuthorizedKeyFile)
|
2015-03-10 00:11:57 -04:00
|
|
|
if err != nil {
|
2020-02-04 13:42:55 -05:00
|
|
|
return "", err
|
2016-02-04 21:40:17 -05:00
|
|
|
}
|
|
|
|
|
2016-02-06 21:09:15 -05:00
|
|
|
hostSigner, err := newSigner(p.config.SSHHostKeyFile)
|
2019-08-27 19:52:52 -04:00
|
|
|
if err != nil {
|
2020-02-04 13:42:55 -05:00
|
|
|
return "", fmt.Errorf("error creating host signer: %s", err)
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
keyChecker := ssh.CertChecker{
|
|
|
|
UserKeyFallback: func(conn ssh.ConnMetadata, pubKey ssh.PublicKey) (*ssh.Permissions, error) {
|
2016-02-26 15:50:50 -05:00
|
|
|
if user := conn.User(); user != p.config.User {
|
2016-11-05 09:25:45 -04:00
|
|
|
return nil, errors.New(fmt.Sprintf("authentication failed: %s is not a valid user", user))
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
|
2016-02-06 21:09:15 -05:00
|
|
|
if !bytes.Equal(k.Marshal(), pubKey.Marshal()) {
|
2016-11-05 09:25:45 -04:00
|
|
|
return nil, errors.New("authentication failed: unauthorized key")
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
},
|
2019-06-11 16:22:03 -04:00
|
|
|
IsUserAuthority: func(k ssh.PublicKey) bool { return true },
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
2016-02-08 20:34:06 -05:00
|
|
|
|
2015-03-10 00:11:57 -04:00
|
|
|
config := &ssh.ServerConfig{
|
|
|
|
AuthLogCallback: func(conn ssh.ConnMetadata, method string, err error) {
|
2016-11-05 09:25:45 -04:00
|
|
|
log.Printf("authentication attempt from %s to %s as %s using %s", conn.RemoteAddr(), conn.LocalAddr(), conn.User(), method)
|
2015-03-10 00:11:57 -04:00
|
|
|
},
|
|
|
|
PublicKeyCallback: keyChecker.Authenticate,
|
|
|
|
//NoClientAuth: true,
|
|
|
|
}
|
|
|
|
|
2016-02-06 21:09:15 -05:00
|
|
|
config.AddHostKey(hostSigner)
|
2015-03-10 00:11:57 -04:00
|
|
|
|
|
|
|
localListener, err := func() (net.Listener, error) {
|
2016-01-29 01:22:12 -05:00
|
|
|
|
2019-02-04 12:47:42 -05:00
|
|
|
port := p.config.LocalPort
|
2016-01-29 01:22:12 -05:00
|
|
|
tries := 1
|
|
|
|
if port != 0 {
|
|
|
|
tries = 10
|
|
|
|
}
|
|
|
|
for i := 0; i < tries; i++ {
|
2015-03-10 00:11:57 -04:00
|
|
|
l, err := net.Listen("tcp", fmt.Sprintf("127.0.0.1:%d", port))
|
2016-01-29 01:22:12 -05:00
|
|
|
port++
|
|
|
|
if err != nil {
|
|
|
|
ui.Say(err.Error())
|
|
|
|
continue
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
2019-02-04 12:47:42 -05:00
|
|
|
_, portStr, err := net.SplitHostPort(l.Addr().String())
|
|
|
|
if err != nil {
|
|
|
|
ui.Say(err.Error())
|
|
|
|
continue
|
|
|
|
}
|
2019-03-19 09:47:21 -04:00
|
|
|
p.config.LocalPort, err = strconv.Atoi(portStr)
|
2016-01-29 01:22:12 -05:00
|
|
|
if err != nil {
|
|
|
|
ui.Say(err.Error())
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
return l, nil
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
return nil, errors.New("Error setting up SSH proxy connection")
|
|
|
|
}()
|
|
|
|
|
|
|
|
if err != nil {
|
2020-02-04 13:42:55 -05:00
|
|
|
return "", err
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
|
2019-02-13 16:01:50 -05:00
|
|
|
ui = &packer.SafeUi{
|
|
|
|
Sem: make(chan int, 1),
|
|
|
|
Ui: ui,
|
|
|
|
}
|
2019-02-12 02:10:57 -05:00
|
|
|
p.adapter = adapter.NewAdapter(p.done, localListener, config, p.config.SFTPCmd, ui, comm)
|
2015-03-10 00:11:57 -04:00
|
|
|
|
2020-02-04 13:42:55 -05:00
|
|
|
return k.privKeyFile, nil
|
|
|
|
}
|
|
|
|
|
2020-03-27 19:44:41 -04:00
|
|
|
const DefaultSSHInventoryFilev2 = "{{ .HostAlias }} ansible_host={{ .Host }} ansible_user={{ .User }} ansible_port={{ .Port }}\n"
|
|
|
|
const DefaultSSHInventoryFilev1 = "{{ .HostAlias }} ansible_ssh_host={{ .Host }} ansible_ssh_user={{ .User }} ansible_ssh_port={{ .Port }}\n"
|
2020-03-31 15:54:20 -04:00
|
|
|
const DefaultWinRMInventoryFilev2 = "{{ .HostAlias}} ansible_host={{ .Host }} ansible_connection=winrm ansible_winrm_transport=basic ansible_shell_type=powershell ansible_user={{ .User}} ansible_port={{ .Port }}\n"
|
2020-03-27 18:59:14 -04:00
|
|
|
|
|
|
|
func (p *Provisioner) createInventoryFile() error {
|
2020-02-04 13:42:55 -05:00
|
|
|
log.Printf("Creating inventory file for Ansible run...")
|
|
|
|
tf, err := ioutil.TempFile(p.config.InventoryDirectory, "packer-provisioner-ansible")
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error preparing inventory file: %s", err)
|
|
|
|
}
|
2020-03-27 18:59:14 -04:00
|
|
|
|
2020-06-17 05:05:48 -04:00
|
|
|
// If user has defiend their own inventory template, use it.
|
|
|
|
hostTemplate := p.config.InventoryFileTemplate
|
|
|
|
if hostTemplate == "" {
|
|
|
|
// figure out which inventory line template to use
|
|
|
|
hostTemplate = DefaultSSHInventoryFilev2
|
|
|
|
if p.ansibleMajVersion < 2 {
|
|
|
|
hostTemplate = DefaultSSHInventoryFilev1
|
|
|
|
}
|
|
|
|
if p.config.UseProxy.False() && p.generatedData["ConnType"] == "winrm" {
|
|
|
|
hostTemplate = DefaultWinRMInventoryFilev2
|
|
|
|
}
|
2020-03-27 18:59:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// interpolate template to generate host with necessary vars.
|
|
|
|
ctxData := p.generatedData
|
|
|
|
ctxData["HostAlias"] = p.config.HostAlias
|
|
|
|
ctxData["User"] = p.config.User
|
|
|
|
if !p.config.UseProxy.False() {
|
|
|
|
ctxData["Host"] = "127.0.0.1"
|
|
|
|
ctxData["Port"] = p.config.LocalPort
|
|
|
|
}
|
|
|
|
p.config.ctx.Data = ctxData
|
|
|
|
|
|
|
|
host, err := interpolate.Render(hostTemplate, &p.config.ctx)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error generating inventory file from template: %s", err)
|
2020-02-04 13:42:55 -05:00
|
|
|
}
|
2015-03-10 00:11:57 -04:00
|
|
|
|
2020-02-04 13:42:55 -05:00
|
|
|
w := bufio.NewWriter(tf)
|
|
|
|
w.WriteString(host)
|
2015-03-10 00:11:57 -04:00
|
|
|
|
2020-02-04 13:42:55 -05:00
|
|
|
for _, group := range p.config.Groups {
|
|
|
|
fmt.Fprintf(w, "[%s]\n%s", group, host)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, group := range p.config.EmptyGroups {
|
|
|
|
fmt.Fprintf(w, "[%s]\n", group)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := w.Flush(); err != nil {
|
|
|
|
tf.Close()
|
|
|
|
os.Remove(tf.Name())
|
|
|
|
return fmt.Errorf("Error preparing inventory file: %s", err)
|
|
|
|
}
|
|
|
|
tf.Close()
|
|
|
|
p.config.InventoryFile = tf.Name()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *Provisioner) Provision(ctx context.Context, ui packer.Ui, comm packer.Communicator, generatedData map[string]interface{}) error {
|
|
|
|
ui.Say("Provisioning with Ansible...")
|
|
|
|
// Interpolate env vars to check for generated values like password and port
|
|
|
|
p.generatedData = generatedData
|
|
|
|
p.config.ctx.Data = generatedData
|
|
|
|
for i, envVar := range p.config.AnsibleEnvVars {
|
|
|
|
envVar, err := interpolate.Render(envVar, &p.config.ctx)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Could not interpolate ansible env vars: %s", err)
|
|
|
|
}
|
|
|
|
p.config.AnsibleEnvVars[i] = envVar
|
|
|
|
}
|
|
|
|
// Interpolate extra vars to check for generated values like password and port
|
|
|
|
for i, arg := range p.config.ExtraArguments {
|
|
|
|
arg, err := interpolate.Render(arg, &p.config.ctx)
|
2015-03-10 00:11:57 -04:00
|
|
|
if err != nil {
|
2020-02-04 13:42:55 -05:00
|
|
|
return fmt.Errorf("Could not interpolate ansible env vars: %s", err)
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
2020-02-04 13:42:55 -05:00
|
|
|
p.config.ExtraArguments[i] = arg
|
|
|
|
}
|
|
|
|
|
2020-03-27 18:59:14 -04:00
|
|
|
// Set up proxy if host IP is missing or communicator type is wrong.
|
|
|
|
if p.config.UseProxy.False() {
|
|
|
|
hostIP := generatedData["Host"].(string)
|
|
|
|
if hostIP == "" {
|
|
|
|
ui.Error("Warning: use_proxy is false, but instance does" +
|
|
|
|
" not have an IP address to give to Ansible. Falling back" +
|
|
|
|
" to use localhost proxy.")
|
|
|
|
p.config.UseProxy = config.TriTrue
|
|
|
|
}
|
|
|
|
connType := generatedData["ConnType"]
|
|
|
|
if connType != "ssh" && connType != "winrm" {
|
|
|
|
ui.Error("Warning: use_proxy is false, but communicator is " +
|
|
|
|
"neither ssh nor winrm, so without the proxy ansible will not" +
|
|
|
|
" function. Falling back to localhost proxy.")
|
|
|
|
p.config.UseProxy = config.TriTrue
|
|
|
|
}
|
2020-02-04 13:42:55 -05:00
|
|
|
}
|
2016-02-11 01:24:12 -05:00
|
|
|
|
2020-02-04 13:42:55 -05:00
|
|
|
privKeyFile := ""
|
|
|
|
if !p.config.UseProxy.False() {
|
|
|
|
// We set up the proxy if useProxy is either true or unset.
|
|
|
|
pkf, err := p.setupAdapterFunc(ui, comm)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2016-03-01 13:35:48 -05:00
|
|
|
}
|
2020-02-04 13:42:55 -05:00
|
|
|
// This is necessary to avoid accidentally redeclaring
|
|
|
|
// privKeyFile in the scope of this if statement.
|
|
|
|
privKeyFile = pkf
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
log.Print("shutting down the SSH proxy")
|
|
|
|
close(p.done)
|
|
|
|
p.adapter.Shutdown()
|
|
|
|
}()
|
|
|
|
|
|
|
|
go p.adapter.Serve()
|
2016-02-11 01:24:12 -05:00
|
|
|
|
2020-02-04 13:42:55 -05:00
|
|
|
// Remove the private key file
|
|
|
|
if len(privKeyFile) > 0 {
|
|
|
|
defer os.Remove(privKeyFile)
|
2016-02-11 01:24:12 -05:00
|
|
|
}
|
2020-02-04 13:42:55 -05:00
|
|
|
} else {
|
2020-03-27 18:59:14 -04:00
|
|
|
connType := generatedData["ConnType"].(string)
|
|
|
|
switch connType {
|
|
|
|
case "ssh":
|
|
|
|
ui.Message("Not using Proxy adapter for Ansible run:\n" +
|
|
|
|
"\tUsing ssh keys from Packer communicator...")
|
|
|
|
// In this situation, we need to make sure we have the
|
|
|
|
// private key we actually use to access the instance.
|
|
|
|
SSHPrivateKeyFile := generatedData["SSHPrivateKeyFile"].(string)
|
2020-07-23 09:03:01 -04:00
|
|
|
SSHAgentAuth := generatedData["SSHAgentAuth"].(bool)
|
|
|
|
if SSHPrivateKeyFile != "" || SSHAgentAuth {
|
2020-03-27 18:59:14 -04:00
|
|
|
privKeyFile = SSHPrivateKeyFile
|
|
|
|
} else {
|
|
|
|
// See if we can get a private key and write that to a tmpfile
|
2020-03-27 19:44:41 -04:00
|
|
|
SSHPrivateKey := generatedData["SSHPrivateKey"].(string)
|
2020-03-27 18:59:14 -04:00
|
|
|
tmpSSHPrivateKey, err := tmp.File("ansible-key")
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error writing private key to temp file for"+
|
|
|
|
"ansible connection: %v", err)
|
|
|
|
}
|
2020-03-27 19:44:41 -04:00
|
|
|
_, err = tmpSSHPrivateKey.WriteString(SSHPrivateKey)
|
2020-03-27 18:59:14 -04:00
|
|
|
if err != nil {
|
|
|
|
return errors.New("failed to write private key to temp file")
|
|
|
|
}
|
|
|
|
err = tmpSSHPrivateKey.Close()
|
|
|
|
if err != nil {
|
|
|
|
return errors.New("failed to close private key temp file")
|
|
|
|
}
|
|
|
|
privKeyFile = tmpSSHPrivateKey.Name()
|
2020-02-04 13:42:55 -05:00
|
|
|
}
|
|
|
|
|
2020-03-27 18:59:14 -04:00
|
|
|
// Also make sure that the username matches the SSH keys given.
|
|
|
|
if p.config.userWasEmpty {
|
|
|
|
p.config.User = generatedData["User"].(string)
|
|
|
|
}
|
|
|
|
case "winrm":
|
|
|
|
ui.Message("Not using Proxy adapter for Ansible run:\n" +
|
|
|
|
"\tUsing WinRM Password from Packer communicator...")
|
2020-02-04 13:42:55 -05:00
|
|
|
}
|
|
|
|
}
|
2016-02-11 01:24:12 -05:00
|
|
|
|
2020-02-04 13:42:55 -05:00
|
|
|
if len(p.config.InventoryFile) == 0 {
|
|
|
|
// Create the inventory file
|
2020-03-27 18:59:14 -04:00
|
|
|
err := p.createInventoryFile()
|
2020-02-04 13:42:55 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
2020-03-31 15:54:20 -04:00
|
|
|
if !p.config.KeepInventoryFile {
|
|
|
|
// Delete the generated inventory file
|
|
|
|
defer func() {
|
|
|
|
os.Remove(p.config.InventoryFile)
|
|
|
|
p.config.InventoryFile = ""
|
|
|
|
}()
|
|
|
|
}
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
|
2020-02-04 13:42:55 -05:00
|
|
|
if err := p.executeAnsibleFunc(ui, comm, privKeyFile); err != nil {
|
2015-03-10 00:11:57 -04:00
|
|
|
return fmt.Errorf("Error executing Ansible: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-07-26 12:44:40 -04:00
|
|
|
func (p *Provisioner) executeGalaxy(ui packer.Ui, comm packer.Communicator) error {
|
|
|
|
galaxyFile := filepath.ToSlash(p.config.GalaxyFile)
|
|
|
|
|
2019-07-27 07:56:14 -04:00
|
|
|
// ansible-galaxy install -r requirements.yml
|
|
|
|
args := []string{"install", "-r", galaxyFile}
|
2019-07-26 12:44:40 -04:00
|
|
|
// Add force to arguments
|
|
|
|
if p.config.GalaxyForceInstall {
|
|
|
|
args = append(args, "-f")
|
|
|
|
}
|
2019-07-27 07:56:14 -04:00
|
|
|
// Add roles_path argument if specified
|
|
|
|
if p.config.RolesPath != "" {
|
|
|
|
args = append(args, "-p", filepath.ToSlash(p.config.RolesPath))
|
|
|
|
}
|
2019-07-26 12:44:40 -04:00
|
|
|
|
|
|
|
ui.Message(fmt.Sprintf("Executing Ansible Galaxy"))
|
|
|
|
cmd := exec.Command(p.config.GalaxyCommand, args...)
|
|
|
|
|
|
|
|
stdout, err := cmd.StdoutPipe()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
stderr, err := cmd.StderrPipe()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
wg := sync.WaitGroup{}
|
|
|
|
repeat := func(r io.ReadCloser) {
|
|
|
|
reader := bufio.NewReader(r)
|
|
|
|
for {
|
|
|
|
line, err := reader.ReadString('\n')
|
|
|
|
if line != "" {
|
|
|
|
line = strings.TrimRightFunc(line, unicode.IsSpace)
|
|
|
|
ui.Message(line)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if err == io.EOF {
|
|
|
|
break
|
|
|
|
} else {
|
|
|
|
ui.Error(err.Error())
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
wg.Done()
|
|
|
|
}
|
|
|
|
wg.Add(2)
|
|
|
|
go repeat(stdout)
|
|
|
|
go repeat(stderr)
|
|
|
|
|
|
|
|
if err := cmd.Start(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
wg.Wait()
|
|
|
|
err = cmd.Wait()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Non-zero exit status: %s", err)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-04-01 19:07:14 -04:00
|
|
|
func (p *Provisioner) createCmdArgs(httpAddr, inventory, playbook, privKeyFile string) (args []string, envVars []string) {
|
|
|
|
args = []string{}
|
2015-03-10 00:11:57 -04:00
|
|
|
|
2020-06-02 18:30:03 -04:00
|
|
|
//Setting up AnsibleEnvVars at begining so additional checks can take them into account
|
|
|
|
if len(p.config.AnsibleEnvVars) > 0 {
|
|
|
|
envVars = append(envVars, p.config.AnsibleEnvVars...)
|
|
|
|
}
|
|
|
|
|
2020-04-01 19:07:14 -04:00
|
|
|
if p.config.PackerBuildName != "" {
|
|
|
|
// HCL configs don't currently have the PakcerBuildName. Don't
|
|
|
|
// cause weirdness with a half-set variable
|
2020-07-16 05:20:06 -04:00
|
|
|
args = append(args, "-e", fmt.Sprintf("packer_build_name=%q", p.config.PackerBuildName))
|
2019-07-26 12:44:40 -04:00
|
|
|
}
|
2020-03-31 15:54:20 -04:00
|
|
|
|
2020-04-01 19:07:14 -04:00
|
|
|
args = append(args, "-e", fmt.Sprintf("packer_builder_type=%s", p.config.PackerBuilderType))
|
2018-07-17 10:03:05 -04:00
|
|
|
|
|
|
|
// expose packer_http_addr extra variable
|
2020-06-29 10:17:21 -04:00
|
|
|
if httpAddr != common.HttpAddrNotImplemented {
|
2020-04-01 19:07:14 -04:00
|
|
|
args = append(args, "-e", fmt.Sprintf("packer_http_addr=%s", httpAddr))
|
2018-07-17 10:03:05 -04:00
|
|
|
}
|
|
|
|
|
2020-07-23 09:03:01 -04:00
|
|
|
if p.generatedData["ConnType"] == "ssh" && len(privKeyFile) > 0 {
|
2020-03-31 16:13:01 -04:00
|
|
|
// Add ssh extra args to set IdentitiesOnly
|
2020-06-02 18:30:03 -04:00
|
|
|
args = append(args, "--ssh-extra-args", "'-o IdentitiesOnly=yes'")
|
2020-03-31 16:13:01 -04:00
|
|
|
}
|
|
|
|
|
2015-03-10 00:11:57 -04:00
|
|
|
args = append(args, p.config.ExtraArguments...)
|
2020-05-21 22:15:13 -04:00
|
|
|
|
2020-06-02 18:30:03 -04:00
|
|
|
// Add password to ansible call.
|
|
|
|
if !checkArg("ansible_password", args) && p.config.UseProxy.False() && p.generatedData["ConnType"] == "winrm" {
|
|
|
|
args = append(args, "-e", fmt.Sprintf("ansible_password=%s", p.generatedData["Password"]))
|
2016-02-14 19:07:02 -05:00
|
|
|
}
|
2016-02-08 20:34:06 -05:00
|
|
|
|
2020-06-02 18:30:03 -04:00
|
|
|
if !checkArg("ansible_password", args) && len(privKeyFile) > 0 {
|
|
|
|
// "-e ansible_ssh_private_key_file" is preferable to "--private-key"
|
|
|
|
// because it is a higher priority variable and therefore won't get
|
|
|
|
// overridden by dynamic variables. See #5852 for more details.
|
|
|
|
args = append(args, "-e", fmt.Sprintf("ansible_ssh_private_key_file=%s", privKeyFile))
|
|
|
|
}
|
|
|
|
|
|
|
|
if checkArg("ansible_password", args) && p.generatedData["ConnType"] == "ssh" {
|
|
|
|
if !checkArg("ansible_host_key_checking", args) && !checkArg("ANSIBLE_HOST_KEY_CHECKING", envVars) {
|
|
|
|
args = append(args, "-e", "ansible_host_key_checking=False")
|
|
|
|
}
|
|
|
|
}
|
2020-05-21 22:15:13 -04:00
|
|
|
// This must be the last arg appended to args
|
|
|
|
args = append(args, "-i", inventory, playbook)
|
2020-04-01 19:07:14 -04:00
|
|
|
return args, envVars
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *Provisioner) executeAnsible(ui packer.Ui, comm packer.Communicator, privKeyFile string) error {
|
|
|
|
playbook, _ := filepath.Abs(p.config.PlaybookFile)
|
|
|
|
inventory := p.config.InventoryFile
|
2020-05-19 05:49:48 -04:00
|
|
|
httpAddr := p.generatedData["PackerHTTPAddr"].(string)
|
2020-04-01 19:07:14 -04:00
|
|
|
|
|
|
|
// Fetch external dependencies
|
|
|
|
if len(p.config.GalaxyFile) > 0 {
|
|
|
|
if err := p.executeGalaxy(ui, comm); err != nil {
|
|
|
|
return fmt.Errorf("Error executing Ansible Galaxy: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
args, envvars := p.createCmdArgs(httpAddr, inventory, playbook, privKeyFile)
|
|
|
|
|
2015-03-10 00:11:57 -04:00
|
|
|
cmd := exec.Command(p.config.Command, args...)
|
|
|
|
|
2016-02-26 14:49:37 -05:00
|
|
|
cmd.Env = os.Environ()
|
2016-02-14 19:07:02 -05:00
|
|
|
if len(envvars) > 0 {
|
|
|
|
cmd.Env = append(cmd.Env, envvars...)
|
2016-05-24 18:34:51 -04:00
|
|
|
}
|
|
|
|
|
2015-03-10 00:11:57 -04:00
|
|
|
stdout, err := cmd.StdoutPipe()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
stderr, err := cmd.StderrPipe()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
wg := sync.WaitGroup{}
|
|
|
|
repeat := func(r io.ReadCloser) {
|
2016-02-27 01:20:54 -05:00
|
|
|
reader := bufio.NewReader(r)
|
|
|
|
for {
|
|
|
|
line, err := reader.ReadString('\n')
|
|
|
|
if line != "" {
|
|
|
|
line = strings.TrimRightFunc(line, unicode.IsSpace)
|
|
|
|
ui.Message(line)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if err == io.EOF {
|
|
|
|
break
|
|
|
|
} else {
|
|
|
|
ui.Error(err.Error())
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2015-03-10 00:11:57 -04:00
|
|
|
}
|
|
|
|
wg.Done()
|
|
|
|
}
|
|
|
|
wg.Add(2)
|
|
|
|
go repeat(stdout)
|
|
|
|
go repeat(stderr)
|
|
|
|
|
2018-07-17 15:52:32 -04:00
|
|
|
// remove winrm password from command, if it's been added
|
|
|
|
flattenedCmd := strings.Join(cmd.Args, " ")
|
2018-09-10 19:48:42 -04:00
|
|
|
sanitized := flattenedCmd
|
2020-03-31 19:55:32 -04:00
|
|
|
winRMPass, ok := p.generatedData["WinRMPassword"]
|
|
|
|
if ok && winRMPass != "" {
|
|
|
|
sanitized = strings.Replace(sanitized,
|
|
|
|
winRMPass.(string), "*****", -1)
|
|
|
|
}
|
2020-06-02 18:30:03 -04:00
|
|
|
if checkArg("ansible_password", args) {
|
|
|
|
usePass, ok := p.generatedData["Password"]
|
|
|
|
if ok && usePass != "" {
|
|
|
|
sanitized = strings.Replace(sanitized, usePass.(string), "*****", -1)
|
|
|
|
}
|
|
|
|
}
|
2018-09-10 19:48:42 -04:00
|
|
|
ui.Say(fmt.Sprintf("Executing Ansible: %s", sanitized))
|
2018-07-17 15:52:32 -04:00
|
|
|
|
2017-03-29 16:38:31 -04:00
|
|
|
if err := cmd.Start(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-03-10 00:11:57 -04:00
|
|
|
wg.Wait()
|
|
|
|
err = cmd.Wait()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Non-zero exit status: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func validateFileConfig(name string, config string, req bool) error {
|
|
|
|
if req {
|
|
|
|
if name == "" {
|
|
|
|
return fmt.Errorf("%s must be specified.", config)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
info, err := os.Stat(name)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("%s: %s is invalid: %s", config, name, err)
|
|
|
|
} else if info.IsDir() {
|
|
|
|
return fmt.Errorf("%s: %s must point to a file", config, name)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
2015-12-19 16:05:59 -05:00
|
|
|
|
2017-04-06 15:50:02 -04:00
|
|
|
func validateInventoryDirectoryConfig(name string) error {
|
2017-04-04 23:49:24 -04:00
|
|
|
info, err := os.Stat(name)
|
|
|
|
if err != nil {
|
2017-04-06 15:50:02 -04:00
|
|
|
return fmt.Errorf("inventory_directory: %s is invalid: %s", name, err)
|
2017-04-04 23:49:24 -04:00
|
|
|
} else if !info.IsDir() {
|
2017-04-06 15:50:02 -04:00
|
|
|
return fmt.Errorf("inventory_directory: %s must point to a directory", name)
|
2017-04-04 23:49:24 -04:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-02-06 21:09:15 -05:00
|
|
|
type userKey struct {
|
|
|
|
ssh.PublicKey
|
|
|
|
privKeyFile string
|
|
|
|
}
|
|
|
|
|
|
|
|
func newUserKey(pubKeyFile string) (*userKey, error) {
|
|
|
|
userKey := new(userKey)
|
|
|
|
if len(pubKeyFile) > 0 {
|
|
|
|
pubKeyBytes, err := ioutil.ReadFile(pubKeyFile)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("Failed to read public key")
|
|
|
|
}
|
|
|
|
userKey.PublicKey, _, _, _, err = ssh.ParseAuthorizedKey(pubKeyBytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("Failed to parse authorized key")
|
|
|
|
}
|
|
|
|
|
|
|
|
return userKey, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("Failed to generate key pair")
|
|
|
|
}
|
|
|
|
userKey.PublicKey, err = ssh.NewPublicKey(key.Public())
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("Failed to extract public key from generated key pair")
|
|
|
|
}
|
|
|
|
|
|
|
|
// To support Ansible calling back to us we need to write
|
|
|
|
// this file down
|
|
|
|
privateKeyDer := x509.MarshalPKCS1PrivateKey(key)
|
|
|
|
privateKeyBlock := pem.Block{
|
|
|
|
Type: "RSA PRIVATE KEY",
|
|
|
|
Headers: nil,
|
|
|
|
Bytes: privateKeyDer,
|
|
|
|
}
|
2018-12-12 09:45:00 -05:00
|
|
|
tf, err := tmp.File("ansible-key")
|
2016-02-06 21:09:15 -05:00
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("failed to create temp file for generated key")
|
|
|
|
}
|
|
|
|
_, err = tf.Write(pem.EncodeToMemory(&privateKeyBlock))
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("failed to write private key to temp file")
|
|
|
|
}
|
|
|
|
|
|
|
|
err = tf.Close()
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("failed to close private key temp file")
|
|
|
|
}
|
|
|
|
userKey.privKeyFile = tf.Name()
|
|
|
|
|
|
|
|
return userKey, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type signer struct {
|
|
|
|
ssh.Signer
|
|
|
|
}
|
|
|
|
|
|
|
|
func newSigner(privKeyFile string) (*signer, error) {
|
|
|
|
signer := new(signer)
|
|
|
|
|
|
|
|
if len(privKeyFile) > 0 {
|
|
|
|
privateBytes, err := ioutil.ReadFile(privKeyFile)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("Failed to load private host key")
|
|
|
|
}
|
|
|
|
|
|
|
|
signer.Signer, err = ssh.ParsePrivateKey(privateBytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("Failed to parse private host key")
|
|
|
|
}
|
|
|
|
|
|
|
|
return signer, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("Failed to generate server key pair")
|
|
|
|
}
|
|
|
|
|
|
|
|
signer.Signer, err = ssh.NewSignerFromKey(key)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.New("Failed to extract private key from generated key pair")
|
|
|
|
}
|
|
|
|
|
|
|
|
return signer, nil
|
|
|
|
}
|
2020-06-02 18:30:03 -04:00
|
|
|
|
|
|
|
//checkArg Evaluates if argname is in args
|
|
|
|
func checkArg(argname string, args []string) bool {
|
|
|
|
for _, arg := range args {
|
|
|
|
for _, ansibleArg := range strings.Split(arg, "=") {
|
|
|
|
if ansibleArg == argname {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|