2017-03-03 03:56:17 -05:00
|
|
|
package ecs
|
|
|
|
|
|
|
|
import (
|
2018-01-22 18:32:33 -05:00
|
|
|
"context"
|
2017-03-03 03:56:17 -05:00
|
|
|
"fmt"
|
2017-06-01 20:14:51 -04:00
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"runtime"
|
|
|
|
|
2017-05-25 06:27:54 -04:00
|
|
|
"github.com/denverdino/aliyungo/common"
|
|
|
|
"github.com/denverdino/aliyungo/ecs"
|
2018-08-28 11:46:41 -04:00
|
|
|
"github.com/hashicorp/packer/helper/communicator"
|
2018-01-19 19:18:44 -05:00
|
|
|
"github.com/hashicorp/packer/helper/multistep"
|
2017-04-17 09:04:52 -04:00
|
|
|
"github.com/hashicorp/packer/packer"
|
2017-03-03 03:56:17 -05:00
|
|
|
)
|
|
|
|
|
2018-06-15 00:32:53 -04:00
|
|
|
type stepConfigAlicloudKeyPair struct {
|
2018-08-28 11:46:41 -04:00
|
|
|
Debug bool
|
|
|
|
Comm *communicator.Config
|
|
|
|
DebugKeyPath string
|
|
|
|
RegionId string
|
2017-03-03 03:56:17 -05:00
|
|
|
|
|
|
|
keyName string
|
|
|
|
}
|
|
|
|
|
2018-06-15 00:32:53 -04:00
|
|
|
func (s *stepConfigAlicloudKeyPair) Run(_ context.Context, state multistep.StateBag) multistep.StepAction {
|
2017-03-03 03:56:17 -05:00
|
|
|
ui := state.Get("ui").(packer.Ui)
|
2017-05-25 06:27:54 -04:00
|
|
|
|
2018-08-28 11:46:41 -04:00
|
|
|
if s.Comm.SSHPrivateKeyFile != "" {
|
2017-03-03 03:56:17 -05:00
|
|
|
ui.Say("Using existing SSH private key")
|
2018-08-28 11:46:41 -04:00
|
|
|
privateKeyBytes, err := ioutil.ReadFile(s.Comm.SSHPrivateKeyFile)
|
2017-03-03 03:56:17 -05:00
|
|
|
if err != nil {
|
|
|
|
state.Put("error", fmt.Errorf(
|
|
|
|
"Error loading configured private key file: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
2018-08-28 11:56:04 -04:00
|
|
|
s.Comm.SSHPrivateKey = privateKeyBytes
|
2017-05-25 06:27:54 -04:00
|
|
|
|
2017-03-03 03:56:17 -05:00
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2018-08-28 11:46:41 -04:00
|
|
|
if s.Comm.SSHAgentAuth && s.Comm.SSHKeyPairName == "" {
|
2017-06-01 22:33:12 -04:00
|
|
|
ui.Say("Using SSH Agent with key pair in source image")
|
2017-03-04 05:06:32 -05:00
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2018-08-28 11:46:41 -04:00
|
|
|
if s.Comm.SSHAgentAuth && s.Comm.SSHKeyPairName != "" {
|
|
|
|
ui.Say(fmt.Sprintf("Using SSH Agent for existing key pair %s", s.Comm.SSHKeyPairName))
|
2017-03-04 05:06:32 -05:00
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2018-08-28 11:46:41 -04:00
|
|
|
if s.Comm.SSHTemporaryKeyPairName == "" {
|
2017-03-03 03:56:17 -05:00
|
|
|
ui.Say("Not using temporary keypair")
|
2018-08-29 05:23:59 -04:00
|
|
|
s.Comm.SSHKeyPairName = ""
|
2017-03-03 03:56:17 -05:00
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2017-05-25 06:27:54 -04:00
|
|
|
client := state.Get("client").(*ecs.Client)
|
|
|
|
|
2018-08-28 11:46:41 -04:00
|
|
|
ui.Say(fmt.Sprintf("Creating temporary keypair: %s", s.Comm.SSHTemporaryKeyPairName))
|
2017-05-25 06:27:54 -04:00
|
|
|
keyResp, err := client.CreateKeyPair(&ecs.CreateKeyPairArgs{
|
2018-08-28 11:46:41 -04:00
|
|
|
KeyPairName: s.Comm.SSHTemporaryKeyPairName,
|
2017-05-25 06:27:54 -04:00
|
|
|
RegionId: common.Region(s.RegionId),
|
|
|
|
})
|
2017-03-03 03:56:17 -05:00
|
|
|
if err != nil {
|
2017-05-25 06:27:54 -04:00
|
|
|
state.Put("error", fmt.Errorf("Error creating temporary keypair: %s", err))
|
2017-03-03 03:56:17 -05:00
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
2017-05-25 06:27:54 -04:00
|
|
|
|
|
|
|
// Set the keyname so we know to delete it later
|
2018-08-28 11:46:41 -04:00
|
|
|
s.keyName = s.Comm.SSHTemporaryKeyPairName
|
2017-05-25 06:27:54 -04:00
|
|
|
|
|
|
|
// Set some state data for use in future steps
|
2018-08-28 11:56:04 -04:00
|
|
|
s.Comm.SSHKeyPairName = s.keyName
|
|
|
|
s.Comm.SSHPrivateKey = []byte(keyResp.PrivateKeyBody)
|
2017-05-25 06:27:54 -04:00
|
|
|
|
|
|
|
// If we're in debug mode, output the private key to the working
|
|
|
|
// directory.
|
|
|
|
if s.Debug {
|
|
|
|
ui.Message(fmt.Sprintf("Saving key for debug purposes: %s", s.DebugKeyPath))
|
|
|
|
f, err := os.Create(s.DebugKeyPath)
|
|
|
|
if err != nil {
|
|
|
|
state.Put("error", fmt.Errorf("Error saving debug key: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
// Write the key out
|
|
|
|
if _, err := f.Write([]byte(keyResp.PrivateKeyBody)); err != nil {
|
|
|
|
state.Put("error", fmt.Errorf("Error saving debug key: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
|
|
|
// Chmod it so that it is SSH ready
|
|
|
|
if runtime.GOOS != "windows" {
|
|
|
|
if err := f.Chmod(0600); err != nil {
|
|
|
|
state.Put("error", fmt.Errorf("Error setting permissions of debug key: %s", err))
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
}
|
2017-03-03 03:56:17 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2018-06-15 00:32:53 -04:00
|
|
|
func (s *stepConfigAlicloudKeyPair) Cleanup(state multistep.StateBag) {
|
2017-05-25 06:27:54 -04:00
|
|
|
// If no key name is set, then we never created it, so just return
|
|
|
|
// If we used an SSH private key file, do not go about deleting
|
|
|
|
// keypairs
|
2018-08-28 11:46:41 -04:00
|
|
|
if s.Comm.SSHPrivateKeyFile != "" || (s.Comm.SSHKeyPairName == "" && s.keyName == "") {
|
2017-05-25 06:27:54 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
client := state.Get("client").(*ecs.Client)
|
|
|
|
ui := state.Get("ui").(packer.Ui)
|
|
|
|
|
|
|
|
// Remove the keypair
|
|
|
|
ui.Say("Deleting temporary keypair...")
|
|
|
|
err := client.DeleteKeyPairs(&ecs.DeleteKeyPairsArgs{
|
|
|
|
RegionId: common.Region(s.RegionId),
|
|
|
|
KeyPairNames: "[\"" + s.keyName + "\"]",
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
ui.Error(fmt.Sprintf(
|
|
|
|
"Error cleaning up keypair. Please delete the key manually: %s", s.keyName))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Also remove the physical key if we're debugging.
|
|
|
|
if s.Debug {
|
|
|
|
if err := os.Remove(s.DebugKeyPath); err != nil {
|
|
|
|
ui.Error(fmt.Sprintf(
|
|
|
|
"Error removing debug key '%s': %s", s.DebugKeyPath, err))
|
|
|
|
}
|
|
|
|
}
|
2017-03-03 03:56:17 -05:00
|
|
|
}
|