I think this was the intention

This commit is contained in:
Matthew Hooker 2017-03-01 16:43:09 -08:00
parent 94854a26d9
commit 56c513088b
No known key found for this signature in database
GPG Key ID: 7B5F933D9CE8C6A1
10 changed files with 75 additions and 81 deletions

View File

@ -9,7 +9,6 @@ import (
"log" "log"
"runtime" "runtime"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/ec2" "github.com/aws/aws-sdk-go/service/ec2"
awscommon "github.com/hashicorp/packer/builder/amazon/common" awscommon "github.com/hashicorp/packer/builder/amazon/common"
"github.com/hashicorp/packer/common" "github.com/hashicorp/packer/common"
@ -182,12 +181,7 @@ func (b *Builder) Run(ui packer.Ui, hook packer.Hook, cache packer.Cache) (packe
return nil, errors.New("The amazon-chroot builder only works on Linux environments.") return nil, errors.New("The amazon-chroot builder only works on Linux environments.")
} }
config, err := b.config.Config() session, err := b.config.Session()
if err != nil {
return nil, err
}
session, err := session.NewSession(config)
if err != nil { if err != nil {
return nil, err return nil, err
} }

View File

@ -2,7 +2,8 @@ package common
import ( import (
"fmt" "fmt"
"time" "log"
"os"
"github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/credentials" "github.com/aws/aws-sdk-go/aws/credentials"
@ -19,19 +20,30 @@ type AccessConfig struct {
AssumeRoleArn string `mapstructure:"assume_role_arn"` AssumeRoleArn string `mapstructure:"assume_role_arn"`
CustomEndpointEc2 string `mapstructure:"custom_endpoint_ec2"` CustomEndpointEc2 string `mapstructure:"custom_endpoint_ec2"`
ExternalID string `mapstructure:"external_id"` ExternalID string `mapstructure:"external_id"`
ExternalID string `mapstructure:"external_id"`
MFACode string `mapstructure:"mfa_code"`
MFACode string `mapstructure:"mfa_code"` MFACode string `mapstructure:"mfa_code"`
MFASerial string `mapstructure:"mfa_serial"` MFASerial string `mapstructure:"mfa_serial"`
MFASerial string `mapstructure:"mfa_serial"`
ProfileName string `mapstructure:"profile"`
ProfileName string `mapstructure:"profile"` ProfileName string `mapstructure:"profile"`
RawRegion string `mapstructure:"region"` RawRegion string `mapstructure:"region"`
RawRegion string `mapstructure:"region"`
SecretKey string `mapstructure:"secret_key"`
SecretKey string `mapstructure:"secret_key"` SecretKey string `mapstructure:"secret_key"`
SkipValidation bool `mapstructure:"skip_region_validation"` SkipValidation bool `mapstructure:"skip_region_validation"`
SkipValidation bool `mapstructure:"skip_region_validation"`
Token string `mapstructure:"token"` Token string `mapstructure:"token"`
Token string `mapstructure:"token"`
session *session.Session
} }
// Config returns a valid aws.Config object for access to AWS services, or // Config returns a valid aws.Config object for access to AWS services, or
// an error if the authentication and region couldn't be resolved // an error if the authentication and region couldn't be resolved
func (c *AccessConfig) Config() (*aws.Config, error) { func (c *AccessConfig) Session() (*session.Session, error) {
var creds *credentials.Credentials if c.session != nil {
return c.session, nil
}
region, err := c.Region() region, err := c.Region()
if err != nil { if err != nil {
@ -59,26 +71,55 @@ func (c *AccessConfig) Config() (*aws.Config, error) {
}) })
if c.AssumeRoleArn != "" { if c.AssumeRoleArn != "" {
var mfa func(*stscreds.AssumeRoleProvider) var options []func(*stscreds.AssumeRoleProvider)
if c.MFACode != "" { if c.MFACode != "" {
mfa = func(p *stscreds.AssumeRoleProvider) { options = append(options, func(p *stscreds.AssumeRoleProvider) {
p.SerialNumber = aws.String(c.MFASerial) p.SerialNumber = aws.String(c.MFASerial)
p.TokenProvider = func() (string, error) { p.TokenProvider = func() (string, error) {
return c.MFACode, nil return c.MFACode, nil
} }
}
}
sess := session.Must(session.NewSession(config.WithCredentials(creds)))
creds = stscreds.NewCredentials(sess, c.AssumeRoleArn, mfa, func(p *stscreds.AssumeRoleProvider) {
p.Duration = time.Duration(60) * time.Minute
if len(c.ExternalID) > 0 {
p.ExternalID = aws.String(c.ExternalID)
}
}) })
} }
return config.WithCredentials(creds), nil }
if c.ProfileName != "" {
err := os.Setenv("AWS_PROFILE", c.ProfileName)
if err != nil {
log.Printf("Set env error: %s", err)
}
}
config := aws.NewConfig().WithRegion(region).WithMaxRetries(11).WithCredentialsChainVerboseErrors(true)
if c.AccessKey != "" {
creds := credentials.NewChainCredentials(
[]credentials.Provider{
&credentials.StaticProvider{
Value: credentials.Value{
AccessKeyID: c.AccessKey,
SecretAccessKey: c.SecretKey,
SessionToken: c.Token,
},
},
})
config = config.WithCredentials(creds)
}
opts := session.Options{
SharedConfigState: session.SharedConfigEnable,
Config: *config,
}
if c.MFACode != "" {
opts.AssumeRoleTokenProvider = func() (string, error) {
return c.MFACode, nil
}
}
c.session, err = session.NewSessionWithOptions(opts)
if err != nil {
return nil, err
}
return c.session, nil
} }
// Region returns the aws.Region object for access to AWS services, requesting // Region returns the aws.Region object for access to AWS services, requesting
@ -113,7 +154,8 @@ func (c *AccessConfig) Prepare(ctx *interpolate.Context) []error {
hasAssumeRoleArn := len(c.AssumeRoleArn) > 0 hasAssumeRoleArn := len(c.AssumeRoleArn) > 0
hasMFASerial := len(c.MFASerial) > 0 hasMFASerial := len(c.MFASerial) > 0
hasMFACode := len(c.MFACode) > 0 hasMFACode := len(c.MFACode) > 0
if hasAssumeRoleArn && (!hasMFACode || !hasMFASerial) { if hasAssumeRoleArn && (hasMFACode != hasMFASerial) {
// either both mfa code and serial must be set, or neither.
errs = append(errs, fmt.Errorf("Both mfa_serial and mfa_code must be specified.")) errs = append(errs, fmt.Errorf("Both mfa_serial and mfa_code must be specified."))
} }

View File

@ -5,7 +5,6 @@ import (
"sync" "sync"
"github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/ec2" "github.com/aws/aws-sdk-go/service/ec2"
"github.com/hashicorp/packer/packer" "github.com/hashicorp/packer/packer"
@ -91,21 +90,18 @@ func amiRegionCopy(state multistep.StateBag, config *AccessConfig, name string,
isEncrypted := false isEncrypted := false
// Connect to the region where the AMI will be copied to // Connect to the region where the AMI will be copied to
awsConfig, err := config.Config() session, err := config.Session()
if err != nil { if err != nil {
return "", snapshotIds, err return "", snapshotIds, err
} }
awsConfig.Region = aws.String(target)
session, err := session.NewSession(awsConfig)
if err != nil {
return "", snapshotIds, err
}
regionconn := ec2.New(session)
// if we've provided a map of key ids to regions, use those keys. // if we've provided a map of key ids to regions, use those keys.
if len(keyID) > 0 { if len(keyID) > 0 {
isEncrypted = true isEncrypted = true
} }
regionconn := ec2.New(session.Copy(&aws.Config{
Region: aws.String(target)},
))
resp, err := regionconn.CopyImage(&ec2.CopyImageInput{ resp, err := regionconn.CopyImage(&ec2.CopyImageInput{
SourceRegion: &source, SourceRegion: &source,
SourceImageId: &imageId, SourceImageId: &imageId,

View File

@ -9,7 +9,6 @@ import (
"fmt" "fmt"
"log" "log"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/ec2" "github.com/aws/aws-sdk-go/service/ec2"
awscommon "github.com/hashicorp/packer/builder/amazon/common" awscommon "github.com/hashicorp/packer/builder/amazon/common"
"github.com/hashicorp/packer/common" "github.com/hashicorp/packer/common"
@ -78,12 +77,8 @@ func (b *Builder) Prepare(raws ...interface{}) ([]string, error) {
} }
func (b *Builder) Run(ui packer.Ui, hook packer.Hook, cache packer.Cache) (packer.Artifact, error) { func (b *Builder) Run(ui packer.Ui, hook packer.Hook, cache packer.Cache) (packer.Artifact, error) {
config, err := b.config.Config()
if err != nil {
return nil, err
}
session, err := session.NewSession(config) session, err := b.config.Session()
if err != nil { if err != nil {
return nil, err return nil, err
} }

View File

@ -6,7 +6,6 @@ import (
"testing" "testing"
"github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/ec2" "github.com/aws/aws-sdk-go/service/ec2"
"github.com/hashicorp/packer/builder/amazon/common" "github.com/hashicorp/packer/builder/amazon/common"
builderT "github.com/hashicorp/packer/helper/builder/testing" builderT "github.com/hashicorp/packer/helper/builder/testing"
@ -255,15 +254,11 @@ func testAccPreCheck(t *testing.T) {
func testEC2Conn() (*ec2.EC2, error) { func testEC2Conn() (*ec2.EC2, error) {
access := &common.AccessConfig{RawRegion: "us-east-1"} access := &common.AccessConfig{RawRegion: "us-east-1"}
config, err := access.Config() session, err := access.Session()
if err != nil { if err != nil {
return nil, err return nil, err
} }
session, err := session.NewSession(config)
if err != nil {
return nil, err
}
return ec2.New(session), nil return ec2.New(session), nil
} }

View File

@ -7,9 +7,7 @@ import (
"fmt" "fmt"
"log" "log"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/ec2" "github.com/aws/aws-sdk-go/service/ec2"
"github.com/hashicorp/errwrap"
awscommon "github.com/hashicorp/packer/builder/amazon/common" awscommon "github.com/hashicorp/packer/builder/amazon/common"
"github.com/hashicorp/packer/common" "github.com/hashicorp/packer/common"
"github.com/hashicorp/packer/helper/communicator" "github.com/hashicorp/packer/helper/communicator"
@ -94,17 +92,11 @@ func (b *Builder) Prepare(raws ...interface{}) ([]string, error) {
} }
func (b *Builder) Run(ui packer.Ui, hook packer.Hook, cache packer.Cache) (packer.Artifact, error) { func (b *Builder) Run(ui packer.Ui, hook packer.Hook, cache packer.Cache) (packer.Artifact, error) {
awsConfig, err := b.config.Config() session, err := b.config.Session()
if err != nil { if err != nil {
return nil, err return nil, err
} }
ec2conn := ec2.New(session)
awsSession, err := session.NewSession(awsConfig)
if err != nil {
return nil, errwrap.Wrapf("Error creating AWS Session: {{err}}", err)
}
ec2conn := ec2.New(awsSession)
// If the subnet is specified but not the VpcId or AZ, try to determine them automatically // If the subnet is specified but not the VpcId or AZ, try to determine them automatically
if b.config.SubnetId != "" && (b.config.AvailabilityZone == "" || b.config.VpcId == "") { if b.config.SubnetId != "" && (b.config.AvailabilityZone == "" || b.config.VpcId == "") {

View File

@ -6,9 +6,7 @@ import (
"fmt" "fmt"
"log" "log"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/ec2" "github.com/aws/aws-sdk-go/service/ec2"
"github.com/hashicorp/errwrap"
awscommon "github.com/hashicorp/packer/builder/amazon/common" awscommon "github.com/hashicorp/packer/builder/amazon/common"
"github.com/hashicorp/packer/common" "github.com/hashicorp/packer/common"
"github.com/hashicorp/packer/helper/communicator" "github.com/hashicorp/packer/helper/communicator"
@ -72,16 +70,10 @@ func (b *Builder) Prepare(raws ...interface{}) ([]string, error) {
} }
func (b *Builder) Run(ui packer.Ui, hook packer.Hook, cache packer.Cache) (packer.Artifact, error) { func (b *Builder) Run(ui packer.Ui, hook packer.Hook, cache packer.Cache) (packer.Artifact, error) {
config, err := b.config.Config() session, err := b.config.Session()
if err != nil { if err != nil {
return nil, err return nil, err
} }
session, err := session.NewSession(config)
if err != nil {
return nil, errwrap.Wrapf("Error creating AWS Session: {{err}}", err)
}
ec2conn := ec2.New(session) ec2conn := ec2.New(session)
// If the subnet is specified but not the VpcId or AZ, try to determine them automatically // If the subnet is specified but not the VpcId or AZ, try to determine them automatically

View File

@ -9,7 +9,6 @@ import (
"os" "os"
"strings" "strings"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/ec2" "github.com/aws/aws-sdk-go/service/ec2"
awscommon "github.com/hashicorp/packer/builder/amazon/common" awscommon "github.com/hashicorp/packer/builder/amazon/common"
"github.com/hashicorp/packer/common" "github.com/hashicorp/packer/common"
@ -164,12 +163,7 @@ func (b *Builder) Prepare(raws ...interface{}) ([]string, error) {
} }
func (b *Builder) Run(ui packer.Ui, hook packer.Hook, cache packer.Cache) (packer.Artifact, error) { func (b *Builder) Run(ui packer.Ui, hook packer.Hook, cache packer.Cache) (packer.Artifact, error) {
config, err := b.config.Config() session, err := b.config.Session()
if err != nil {
return nil, err
}
session, err := session.NewSession(config)
if err != nil { if err != nil {
return nil, err return nil, err
} }

View File

@ -38,7 +38,8 @@ func (s *StepUploadBundle) Run(state multistep.StateBag) multistep.StepAction {
accessKey := config.AccessKey accessKey := config.AccessKey
secretKey := config.SecretKey secretKey := config.SecretKey
accessConfig, err := config.AccessConfig.Config() session, err := config.AccessConfig.Session()
accessConfig := session.Config
if err == nil && accessKey == "" && secretKey == "" { if err == nil && accessKey == "" && secretKey == "" {
credentials, err := accessConfig.Credentials.Get() credentials, err := accessConfig.Credentials.Get()
if err == nil { if err == nil {

View File

@ -7,7 +7,6 @@ import (
"strings" "strings"
"github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/ec2" "github.com/aws/aws-sdk-go/service/ec2"
"github.com/aws/aws-sdk-go/service/s3" "github.com/aws/aws-sdk-go/service/s3"
"github.com/aws/aws-sdk-go/service/s3/s3manager" "github.com/aws/aws-sdk-go/service/s3/s3manager"
@ -99,10 +98,11 @@ func (p *PostProcessor) Configure(raws ...interface{}) error {
func (p *PostProcessor) PostProcess(ui packer.Ui, artifact packer.Artifact) (packer.Artifact, bool, error) { func (p *PostProcessor) PostProcess(ui packer.Ui, artifact packer.Artifact) (packer.Artifact, bool, error) {
var err error var err error
config, err := p.config.Config() session, err := p.config.Session()
if err != nil { if err != nil {
return nil, false, err return nil, false, err
} }
config := session.Config
// Render this key since we didn't in the configure phase // Render this key since we didn't in the configure phase
p.config.S3Key, err = interpolate.Render(p.config.S3Key, &p.config.ctx) p.config.S3Key, err = interpolate.Render(p.config.S3Key, &p.config.ctx)
@ -126,13 +126,6 @@ func (p *PostProcessor) PostProcess(ui packer.Ui, artifact packer.Artifact) (pac
return nil, false, fmt.Errorf("No OVA file found in artifact from builder") return nil, false, fmt.Errorf("No OVA file found in artifact from builder")
} }
// Set up the AWS session
log.Println("Creating AWS session")
session, err := session.NewSession(config)
if err != nil {
return nil, false, err
}
// open the source file // open the source file
log.Printf("Opening file %s to upload", source) log.Printf("Opening file %s to upload", source)
file, err := os.Open(source) file, err := os.Open(source)