2013-07-20 22:50:55 -04:00
|
|
|
package common
|
2013-06-11 17:37:10 -04:00
|
|
|
|
|
|
|
import (
|
|
|
|
"cgl.tideland.biz/identifier"
|
|
|
|
"encoding/hex"
|
|
|
|
"fmt"
|
|
|
|
"github.com/mitchellh/goamz/ec2"
|
|
|
|
"github.com/mitchellh/multistep"
|
|
|
|
"github.com/mitchellh/packer/packer"
|
|
|
|
"log"
|
|
|
|
)
|
|
|
|
|
2013-07-20 22:50:55 -04:00
|
|
|
type StepSecurityGroup struct {
|
|
|
|
SecurityGroupId string
|
2013-07-20 22:58:27 -04:00
|
|
|
SSHPort int
|
2013-07-20 22:50:55 -04:00
|
|
|
|
|
|
|
createdGroupId string
|
2013-06-11 17:37:10 -04:00
|
|
|
}
|
|
|
|
|
2013-07-20 22:50:55 -04:00
|
|
|
func (s *StepSecurityGroup) Run(state map[string]interface{}) multistep.StepAction {
|
2013-06-11 17:37:10 -04:00
|
|
|
ec2conn := state["ec2"].(*ec2.EC2)
|
|
|
|
ui := state["ui"].(packer.Ui)
|
|
|
|
|
2013-07-20 22:50:55 -04:00
|
|
|
if s.SecurityGroupId != "" {
|
|
|
|
log.Printf("Using specified security group: %s", s.SecurityGroupId)
|
|
|
|
state["securityGroupId"] = s.SecurityGroupId
|
2013-07-09 11:57:21 -04:00
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2013-07-20 22:51:25 -04:00
|
|
|
if s.SSHPort == 0 {
|
|
|
|
panic("SSHPort must be set to a non-zero value.")
|
|
|
|
}
|
|
|
|
|
2013-06-11 17:37:10 -04:00
|
|
|
// Create the group
|
|
|
|
ui.Say("Creating temporary security group for this instance...")
|
|
|
|
groupName := fmt.Sprintf("packer %s", hex.EncodeToString(identifier.NewUUID().Raw()))
|
|
|
|
log.Printf("Temporary group name: %s", groupName)
|
2013-07-21 03:44:14 -04:00
|
|
|
groupResp, err := ec2conn.CreateSecurityGroup(ec2.SecurityGroup{Name: groupName, Description: "Temporary group for Packer", VpcId: config.VpcId})
|
2013-06-11 17:37:10 -04:00
|
|
|
if err != nil {
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the group ID so we can delete it later
|
2013-07-20 22:50:55 -04:00
|
|
|
s.createdGroupId = groupResp.Id
|
2013-06-11 17:37:10 -04:00
|
|
|
|
|
|
|
// Authorize the SSH access
|
|
|
|
perms := []ec2.IPPerm{
|
|
|
|
ec2.IPPerm{
|
|
|
|
Protocol: "tcp",
|
2013-07-20 22:50:55 -04:00
|
|
|
FromPort: s.SSHPort,
|
|
|
|
ToPort: s.SSHPort,
|
2013-06-11 17:37:10 -04:00
|
|
|
SourceIPs: []string{"0.0.0.0/0"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
ui.Say("Authorizing SSH access on the temporary security group...")
|
|
|
|
if _, err := ec2conn.AuthorizeSecurityGroup(groupResp.SecurityGroup, perms); err != nil {
|
2013-06-19 23:54:02 -04:00
|
|
|
err := fmt.Errorf("Error creating temporary security group: %s", err)
|
|
|
|
state["error"] = err
|
2013-06-11 17:37:10 -04:00
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set some state data for use in future steps
|
2013-07-20 22:50:55 -04:00
|
|
|
state["securityGroupId"] = s.createdGroupId
|
2013-06-11 17:37:10 -04:00
|
|
|
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2013-07-20 22:50:55 -04:00
|
|
|
func (s *StepSecurityGroup) Cleanup(state map[string]interface{}) {
|
|
|
|
if s.createdGroupId == "" {
|
2013-06-11 17:37:10 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ec2conn := state["ec2"].(*ec2.EC2)
|
|
|
|
ui := state["ui"].(packer.Ui)
|
|
|
|
|
|
|
|
ui.Say("Deleting temporary security group...")
|
2013-07-20 22:50:55 -04:00
|
|
|
_, err := ec2conn.DeleteSecurityGroup(ec2.SecurityGroup{Id: s.createdGroupId})
|
2013-06-11 17:37:10 -04:00
|
|
|
if err != nil {
|
2013-06-27 21:42:07 -04:00
|
|
|
log.Printf("Error deleting security group: %s", err)
|
2013-06-11 17:37:10 -04:00
|
|
|
ui.Error(fmt.Sprintf(
|
2013-07-20 22:50:55 -04:00
|
|
|
"Error cleaning up security group. Please delete the group manually: %s", s.createdGroupId))
|
2013-06-11 17:37:10 -04:00
|
|
|
}
|
|
|
|
}
|