diff --git a/command/vendored_plugins.go b/command/vendored_plugins.go index cf77c8fda..7d8d42901 100644 --- a/command/vendored_plugins.go +++ b/command/vendored_plugins.go @@ -19,6 +19,8 @@ import ( anazibimportpostprocessor "github.com/hashicorp/packer-plugin-amazon/post-processor/import" ansibleprovisioner "github.com/hashicorp/packer-plugin-ansible/provisioner/ansible" ansiblelocalprovisioner "github.com/hashicorp/packer-plugin-ansible/provisioner/ansible-local" + chefclientprovisioner "github.com/hashicorp/packer-plugin-chef/provisioner/chef-client" + chefsoloprovisioner "github.com/hashicorp/packer-plugin-chef/provisioner/chef-solo" dockerbuilder "github.com/hashicorp/packer-plugin-docker/builder/docker" dockerimportpostprocessor "github.com/hashicorp/packer-plugin-docker/post-processor/docker-import" dockerpushpostprocessor "github.com/hashicorp/packer-plugin-docker/post-processor/docker-push" @@ -95,6 +97,8 @@ var VendoredBuilders = map[string]packersdk.Builder{ var VendoredProvisioners = map[string]packersdk.Provisioner{ "ansible": new(ansibleprovisioner.Provisioner), "ansible-local": new(ansiblelocalprovisioner.Provisioner), + "chef-client": new(chefclientprovisioner.Provisioner), + "chef-solo": new(chefsoloprovisioner.Provisioner), } // VendoredPostProcessors are post-processor components that were once bundled with the diff --git a/go.mod b/go.mod index a661b7f3b..0a17ded97 100644 --- a/go.mod +++ b/go.mod @@ -40,6 +40,7 @@ require ( github.com/hashicorp/packer-plugin-alicloud v0.0.2 github.com/hashicorp/packer-plugin-amazon v0.0.1 github.com/hashicorp/packer-plugin-ansible v0.0.2 + github.com/hashicorp/packer-plugin-chef v0.0.1 github.com/hashicorp/packer-plugin-docker v0.0.7 github.com/hashicorp/packer-plugin-googlecompute v0.0.1 github.com/hashicorp/packer-plugin-ncloud v0.0.2 diff --git a/go.sum b/go.sum index 8357d13ec..5c320b4d6 100644 --- a/go.sum +++ b/go.sum @@ -468,6 +468,8 @@ github.com/hashicorp/packer-plugin-amazon v0.0.1 h1:EuyjNK9bL7WhQeIJzhBJxOx8nyc6 github.com/hashicorp/packer-plugin-amazon v0.0.1/go.mod h1:12c9msibyHdId+Mk/pCbdRb1KaLIhaNyxeJ6n8bZt30= github.com/hashicorp/packer-plugin-ansible v0.0.2 h1:nvBtCedXhUI5T6Up5+bmhlY7rmk8FjWuFv9A2joK7TU= github.com/hashicorp/packer-plugin-ansible v0.0.2/go.mod h1:ocXB4KTU+I+DBRGfMP4XE7dPlURaUnb7NJvyddZ6bh0= +github.com/hashicorp/packer-plugin-chef v0.0.1 h1:1zQwnnvftwg9PJyWjMfHfDyzfWDdb0eo9IX8fX6kd+Y= +github.com/hashicorp/packer-plugin-chef v0.0.1/go.mod h1:4iSyWfvrb4QwUDZqJ3iCb+kIsnDwOTL1yTEDXBtk3Ew= github.com/hashicorp/packer-plugin-docker v0.0.7 h1:hMTrH7vrkFIjphtbbtpuzffTzSjMNgxayo2DPLz9y+c= github.com/hashicorp/packer-plugin-docker v0.0.7/go.mod h1:IpeKlwOSy2kdgQcysqd3gCsoqjME9jtmpFoKxn7RRNI= github.com/hashicorp/packer-plugin-googlecompute v0.0.1 h1:Shjio88MraB+ocj0VI5+M65r4UBKbYI4eCqLNyPXKEo= diff --git a/vendor/github.com/hashicorp/packer-plugin-chef/LICENSE b/vendor/github.com/hashicorp/packer-plugin-chef/LICENSE new file mode 100644 index 000000000..a612ad981 --- /dev/null +++ b/vendor/github.com/hashicorp/packer-plugin-chef/LICENSE @@ -0,0 +1,373 @@ +Mozilla Public License Version 2.0 +================================== + +1. Definitions +-------------- + +1.1. "Contributor" + means each individual or legal entity that creates, contributes to + the creation of, or owns Covered Software. + +1.2. "Contributor Version" + means the combination of the Contributions of others (if any) used + by a Contributor and that particular Contributor's Contribution. + +1.3. "Contribution" + means Covered Software of a particular Contributor. + +1.4. "Covered Software" + means Source Code Form to which the initial Contributor has attached + the notice in Exhibit A, the Executable Form of such Source Code + Form, and Modifications of such Source Code Form, in each case + including portions thereof. + +1.5. "Incompatible With Secondary Licenses" + means + + (a) that the initial Contributor has attached the notice described + in Exhibit B to the Covered Software; or + + (b) that the Covered Software was made available under the terms of + version 1.1 or earlier of the License, but not also under the + terms of a Secondary License. + +1.6. "Executable Form" + means any form of the work other than Source Code Form. + +1.7. "Larger Work" + means a work that combines Covered Software with other material, in + a separate file or files, that is not Covered Software. + +1.8. "License" + means this document. + +1.9. "Licensable" + means having the right to grant, to the maximum extent possible, + whether at the time of the initial grant or subsequently, any and + all of the rights conveyed by this License. + +1.10. "Modifications" + means any of the following: + + (a) any file in Source Code Form that results from an addition to, + deletion from, or modification of the contents of Covered + Software; or + + (b) any new file in Source Code Form that contains any Covered + Software. + +1.11. "Patent Claims" of a Contributor + means any patent claim(s), including without limitation, method, + process, and apparatus claims, in any patent Licensable by such + Contributor that would be infringed, but for the grant of the + License, by the making, using, selling, offering for sale, having + made, import, or transfer of either its Contributions or its + Contributor Version. + +1.12. "Secondary License" + means either the GNU General Public License, Version 2.0, the GNU + Lesser General Public License, Version 2.1, the GNU Affero General + Public License, Version 3.0, or any later versions of those + licenses. + +1.13. "Source Code Form" + means the form of the work preferred for making modifications. + +1.14. "You" (or "Your") + means an individual or a legal entity exercising rights under this + License. For legal entities, "You" includes any entity that + controls, is controlled by, or is under common control with You. For + purposes of this definition, "control" means (a) the power, direct + or indirect, to cause the direction or management of such entity, + whether by contract or otherwise, or (b) ownership of more than + fifty percent (50%) of the outstanding shares or beneficial + ownership of such entity. + +2. License Grants and Conditions +-------------------------------- + +2.1. Grants + +Each Contributor hereby grants You a world-wide, royalty-free, +non-exclusive license: + +(a) under intellectual property rights (other than patent or trademark) + Licensable by such Contributor to use, reproduce, make available, + modify, display, perform, distribute, and otherwise exploit its + Contributions, either on an unmodified basis, with Modifications, or + as part of a Larger Work; and + +(b) under Patent Claims of such Contributor to make, use, sell, offer + for sale, have made, import, and otherwise transfer either its + Contributions or its Contributor Version. + +2.2. Effective Date + +The licenses granted in Section 2.1 with respect to any Contribution +become effective for each Contribution on the date the Contributor first +distributes such Contribution. + +2.3. Limitations on Grant Scope + +The licenses granted in this Section 2 are the only rights granted under +this License. No additional rights or licenses will be implied from the +distribution or licensing of Covered Software under this License. +Notwithstanding Section 2.1(b) above, no patent license is granted by a +Contributor: + +(a) for any code that a Contributor has removed from Covered Software; + or + +(b) for infringements caused by: (i) Your and any other third party's + modifications of Covered Software, or (ii) the combination of its + Contributions with other software (except as part of its Contributor + Version); or + +(c) under Patent Claims infringed by Covered Software in the absence of + its Contributions. + +This License does not grant any rights in the trademarks, service marks, +or logos of any Contributor (except as may be necessary to comply with +the notice requirements in Section 3.4). + +2.4. Subsequent Licenses + +No Contributor makes additional grants as a result of Your choice to +distribute the Covered Software under a subsequent version of this +License (see Section 10.2) or under the terms of a Secondary License (if +permitted under the terms of Section 3.3). + +2.5. Representation + +Each Contributor represents that the Contributor believes its +Contributions are its original creation(s) or it has sufficient rights +to grant the rights to its Contributions conveyed by this License. + +2.6. Fair Use + +This License is not intended to limit any rights You have under +applicable copyright doctrines of fair use, fair dealing, or other +equivalents. + +2.7. Conditions + +Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted +in Section 2.1. + +3. Responsibilities +------------------- + +3.1. Distribution of Source Form + +All distribution of Covered Software in Source Code Form, including any +Modifications that You create or to which You contribute, must be under +the terms of this License. You must inform recipients that the Source +Code Form of the Covered Software is governed by the terms of this +License, and how they can obtain a copy of this License. You may not +attempt to alter or restrict the recipients' rights in the Source Code +Form. + +3.2. Distribution of Executable Form + +If You distribute Covered Software in Executable Form then: + +(a) such Covered Software must also be made available in Source Code + Form, as described in Section 3.1, and You must inform recipients of + the Executable Form how they can obtain a copy of such Source Code + Form by reasonable means in a timely manner, at a charge no more + than the cost of distribution to the recipient; and + +(b) You may distribute such Executable Form under the terms of this + License, or sublicense it under different terms, provided that the + license for the Executable Form does not attempt to limit or alter + the recipients' rights in the Source Code Form under this License. + +3.3. Distribution of a Larger Work + +You may create and distribute a Larger Work under terms of Your choice, +provided that You also comply with the requirements of this License for +the Covered Software. If the Larger Work is a combination of Covered +Software with a work governed by one or more Secondary Licenses, and the +Covered Software is not Incompatible With Secondary Licenses, this +License permits You to additionally distribute such Covered Software +under the terms of such Secondary License(s), so that the recipient of +the Larger Work may, at their option, further distribute the Covered +Software under the terms of either this License or such Secondary +License(s). + +3.4. Notices + +You may not remove or alter the substance of any license notices +(including copyright notices, patent notices, disclaimers of warranty, +or limitations of liability) contained within the Source Code Form of +the Covered Software, except that You may alter any license notices to +the extent required to remedy known factual inaccuracies. + +3.5. Application of Additional Terms + +You may choose to offer, and to charge a fee for, warranty, support, +indemnity or liability obligations to one or more recipients of Covered +Software. However, You may do so only on Your own behalf, and not on +behalf of any Contributor. You must make it absolutely clear that any +such warranty, support, indemnity, or liability obligation is offered by +You alone, and You hereby agree to indemnify every Contributor for any +liability incurred by such Contributor as a result of warranty, support, +indemnity or liability terms You offer. You may include additional +disclaimers of warranty and limitations of liability specific to any +jurisdiction. + +4. Inability to Comply Due to Statute or Regulation +--------------------------------------------------- + +If it is impossible for You to comply with any of the terms of this +License with respect to some or all of the Covered Software due to +statute, judicial order, or regulation then You must: (a) comply with +the terms of this License to the maximum extent possible; and (b) +describe the limitations and the code they affect. Such description must +be placed in a text file included with all distributions of the Covered +Software under this License. Except to the extent prohibited by statute +or regulation, such description must be sufficiently detailed for a +recipient of ordinary skill to be able to understand it. + +5. Termination +-------------- + +5.1. The rights granted under this License will terminate automatically +if You fail to comply with any of its terms. However, if You become +compliant, then the rights granted under this License from a particular +Contributor are reinstated (a) provisionally, unless and until such +Contributor explicitly and finally terminates Your grants, and (b) on an +ongoing basis, if such Contributor fails to notify You of the +non-compliance by some reasonable means prior to 60 days after You have +come back into compliance. Moreover, Your grants from a particular +Contributor are reinstated on an ongoing basis if such Contributor +notifies You of the non-compliance by some reasonable means, this is the +first time You have received notice of non-compliance with this License +from such Contributor, and You become compliant prior to 30 days after +Your receipt of the notice. + +5.2. If You initiate litigation against any entity by asserting a patent +infringement claim (excluding declaratory judgment actions, +counter-claims, and cross-claims) alleging that a Contributor Version +directly or indirectly infringes any patent, then the rights granted to +You by any and all Contributors for the Covered Software under Section +2.1 of this License shall terminate. + +5.3. In the event of termination under Sections 5.1 or 5.2 above, all +end user license agreements (excluding distributors and resellers) which +have been validly granted by You or Your distributors under this License +prior to termination shall survive termination. + +************************************************************************ +* * +* 6. Disclaimer of Warranty * +* ------------------------- * +* * +* Covered Software is provided under this License on an "as is" * +* basis, without warranty of any kind, either expressed, implied, or * +* statutory, including, without limitation, warranties that the * +* Covered Software is free of defects, merchantable, fit for a * +* particular purpose or non-infringing. The entire risk as to the * +* quality and performance of the Covered Software is with You. * +* Should any Covered Software prove defective in any respect, You * +* (not any Contributor) assume the cost of any necessary servicing, * +* repair, or correction. This disclaimer of warranty constitutes an * +* essential part of this License. No use of any Covered Software is * +* authorized under this License except under this disclaimer. * +* * +************************************************************************ + +************************************************************************ +* * +* 7. Limitation of Liability * +* -------------------------- * +* * +* Under no circumstances and under no legal theory, whether tort * +* (including negligence), contract, or otherwise, shall any * +* Contributor, or anyone who distributes Covered Software as * +* permitted above, be liable to You for any direct, indirect, * +* special, incidental, or consequential damages of any character * +* including, without limitation, damages for lost profits, loss of * +* goodwill, work stoppage, computer failure or malfunction, or any * +* and all other commercial damages or losses, even if such party * +* shall have been informed of the possibility of such damages. This * +* limitation of liability shall not apply to liability for death or * +* personal injury resulting from such party's negligence to the * +* extent applicable law prohibits such limitation. Some * +* jurisdictions do not allow the exclusion or limitation of * +* incidental or consequential damages, so this exclusion and * +* limitation may not apply to You. * +* * +************************************************************************ + +8. Litigation +------------- + +Any litigation relating to this License may be brought only in the +courts of a jurisdiction where the defendant maintains its principal +place of business and such litigation shall be governed by laws of that +jurisdiction, without reference to its conflict-of-law provisions. +Nothing in this Section shall prevent a party's ability to bring +cross-claims or counter-claims. + +9. Miscellaneous +---------------- + +This License represents the complete agreement concerning the subject +matter hereof. If any provision of this License is held to be +unenforceable, such provision shall be reformed only to the extent +necessary to make it enforceable. Any law or regulation which provides +that the language of a contract shall be construed against the drafter +shall not be used to construe this License against a Contributor. + +10. Versions of the License +--------------------------- + +10.1. New Versions + +Mozilla Foundation is the license steward. Except as provided in Section +10.3, no one other than the license steward has the right to modify or +publish new versions of this License. Each version will be given a +distinguishing version number. + +10.2. Effect of New Versions + +You may distribute the Covered Software under the terms of the version +of the License under which You originally received the Covered Software, +or under the terms of any subsequent version published by the license +steward. + +10.3. Modified Versions + +If you create software not governed by this License, and you want to +create a new license for such software, you may create and use a +modified version of this License if you rename the license and remove +any references to the name of the license steward (except to note that +such modified license differs from this License). + +10.4. Distributing Source Code Form that is Incompatible With Secondary +Licenses + +If You choose to distribute Source Code Form that is Incompatible With +Secondary Licenses under the terms of this version of the License, the +notice described in Exhibit B of this License must be attached. + +Exhibit A - Source Code Form License Notice +------------------------------------------- + + This Source Code Form is subject to the terms of the Mozilla Public + License, v. 2.0. If a copy of the MPL was not distributed with this + file, You can obtain one at http://mozilla.org/MPL/2.0/. + +If it is not possible or desirable to put the notice in a particular +file, then You may include the notice in a location (such as a LICENSE +file in a relevant directory) where a recipient would be likely to look +for such a notice. + +You may add additional accurate notices of copyright ownership. + +Exhibit B - "Incompatible With Secondary Licenses" Notice +--------------------------------------------------------- + + This Source Code Form is "Incompatible With Secondary Licenses", as + defined by the Mozilla Public License, v. 2.0. diff --git a/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-client/provisioner.go b/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-client/provisioner.go new file mode 100644 index 000000000..e3c9c685f --- /dev/null +++ b/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-client/provisioner.go @@ -0,0 +1,782 @@ +//go:generate packer-sdc mapstructure-to-hcl2 -type Config + +// This package implements a provisioner for Packer that uses +// Chef to provision the remote machine, specifically with chef-client (that is, +// with a Chef server). +package chefclient + +import ( + "bytes" + "context" + "encoding/json" + "fmt" + "io/ioutil" + "os" + "path/filepath" + "strings" + + "github.com/hashicorp/hcl/v2/hcldec" + "github.com/hashicorp/packer-plugin-sdk/common" + "github.com/hashicorp/packer-plugin-sdk/guestexec" + packersdk "github.com/hashicorp/packer-plugin-sdk/packer" + "github.com/hashicorp/packer-plugin-sdk/pathing" + "github.com/hashicorp/packer-plugin-sdk/template/config" + "github.com/hashicorp/packer-plugin-sdk/template/interpolate" + "github.com/hashicorp/packer-plugin-sdk/uuid" +) + +type guestOSTypeConfig struct { + executeCommand string + installCommand string + knifeCommand string + stagingDir string +} + +var guestOSTypeConfigs = map[string]guestOSTypeConfig{ + guestexec.UnixOSType: { + executeCommand: "{{if .Sudo}}sudo {{end}}chef-client --no-color -c {{.ConfigPath}} -j {{.JsonPath}}", + installCommand: "curl -L https://omnitruck.chef.io/install.sh | {{if .Sudo}}sudo {{end}}bash -s --{{if .Version}} -v {{.Version}}{{end}}", + knifeCommand: "{{if .Sudo}}sudo {{end}}knife {{.Args}} {{.Flags}}", + stagingDir: "/tmp/packer-chef-client", + }, + guestexec.WindowsOSType: { + executeCommand: "c:/opscode/chef/bin/chef-client.bat --no-color -c {{.ConfigPath}} -j {{.JsonPath}}", + installCommand: "powershell.exe -Command \". { iwr -useb https://omnitruck.chef.io/install.ps1 } | iex; Install-Project{{if .Version}} -version {{.Version}}{{end}}\"", + knifeCommand: "c:/opscode/chef/bin/knife.bat {{.Args}} {{.Flags}}", + stagingDir: "C:/Windows/Temp/packer-chef-client", + }, +} + +type Config struct { + common.PackerConfig `mapstructure:",squash"` + + Json map[string]interface{} + + ChefEnvironment string `mapstructure:"chef_environment"` + ChefLicense string `mapstructure:"chef_license"` + ClientKey string `mapstructure:"client_key"` + ConfigTemplate string `mapstructure:"config_template"` + ElevatedUser string `mapstructure:"elevated_user"` + ElevatedPassword string `mapstructure:"elevated_password"` + EncryptedDataBagSecretPath string `mapstructure:"encrypted_data_bag_secret_path"` + ExecuteCommand string `mapstructure:"execute_command"` + GuestOSType string `mapstructure:"guest_os_type"` + InstallCommand string `mapstructure:"install_command"` + KnifeCommand string `mapstructure:"knife_command"` + NodeName string `mapstructure:"node_name"` + PolicyGroup string `mapstructure:"policy_group"` + PolicyName string `mapstructure:"policy_name"` + PreventSudo bool `mapstructure:"prevent_sudo"` + RunList []string `mapstructure:"run_list"` + ServerUrl string `mapstructure:"server_url"` + SkipCleanClient bool `mapstructure:"skip_clean_client"` + SkipCleanNode bool `mapstructure:"skip_clean_node"` + SkipCleanStagingDirectory bool `mapstructure:"skip_clean_staging_directory"` + SkipInstall bool `mapstructure:"skip_install"` + SslVerifyMode string `mapstructure:"ssl_verify_mode"` + TrustedCertsDir string `mapstructure:"trusted_certs_dir"` + StagingDir string `mapstructure:"staging_directory"` + ValidationClientName string `mapstructure:"validation_client_name"` + ValidationKeyPath string `mapstructure:"validation_key_path"` + Version string `mapstructure:"version"` + + ctx interpolate.Context +} + +type Provisioner struct { + config Config + communicator packersdk.Communicator + guestOSTypeConfig guestOSTypeConfig + guestCommands *guestexec.GuestCommands + generatedData map[string]interface{} +} + +type ConfigTemplate struct { + ChefEnvironment string + ChefLicense string + ClientKey string + EncryptedDataBagSecretPath string + NodeName string + PolicyGroup string + PolicyName string + ServerUrl string + SslVerifyMode string + TrustedCertsDir string + ValidationClientName string + ValidationKeyPath string +} + +type ExecuteTemplate struct { + ConfigPath string + JsonPath string + Sudo bool +} + +type InstallChefTemplate struct { + Sudo bool + Version string +} + +type KnifeTemplate struct { + Sudo bool + Flags string + Args string +} + +func (p *Provisioner) ConfigSpec() hcldec.ObjectSpec { return p.config.FlatMapstructure().HCL2Spec() } + +func (p *Provisioner) Prepare(raws ...interface{}) error { + err := config.Decode(&p.config, &config.DecodeOpts{ + PluginType: "chef-client", + Interpolate: true, + InterpolateContext: &p.config.ctx, + InterpolateFilter: &interpolate.RenderFilter{ + Exclude: []string{ + "execute_command", + "install_command", + "knife_command", + }, + }, + }, raws...) + if err != nil { + return err + } + + if p.config.GuestOSType == "" { + p.config.GuestOSType = guestexec.DefaultOSType + } + p.config.GuestOSType = strings.ToLower(p.config.GuestOSType) + + var ok bool + p.guestOSTypeConfig, ok = guestOSTypeConfigs[p.config.GuestOSType] + if !ok { + return fmt.Errorf("Invalid guest_os_type: \"%s\"", p.config.GuestOSType) + } + + p.guestCommands, err = guestexec.NewGuestCommands(p.config.GuestOSType, !p.config.PreventSudo) + if err != nil { + return fmt.Errorf("Invalid guest_os_type: \"%s\"", p.config.GuestOSType) + } + + if p.config.ExecuteCommand == "" { + p.config.ExecuteCommand = p.guestOSTypeConfig.executeCommand + } + + if p.config.InstallCommand == "" { + p.config.InstallCommand = p.guestOSTypeConfig.installCommand + } + + if p.config.RunList == nil { + p.config.RunList = make([]string, 0) + } + + if p.config.StagingDir == "" { + p.config.StagingDir = p.guestOSTypeConfig.stagingDir + } + + if p.config.KnifeCommand == "" { + p.config.KnifeCommand = p.guestOSTypeConfig.knifeCommand + } + + var errs *packersdk.MultiError + if p.config.ConfigTemplate != "" { + fi, err := os.Stat(p.config.ConfigTemplate) + if err != nil { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Bad config template path: %s", err)) + } else if fi.IsDir() { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Config template path must be a file: %s", err)) + } + } + + if p.config.ServerUrl == "" { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("server_url must be set")) + } + + if !p.config.SkipInstall && p.config.InstallCommand == p.guestOSTypeConfig.installCommand { + if p.config.ChefLicense == "" { + p.config.ChefLicense = "accept-silent" + } + } + + if p.config.EncryptedDataBagSecretPath != "" { + pFileInfo, err := os.Stat(p.config.EncryptedDataBagSecretPath) + + if err != nil || pFileInfo.IsDir() { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Bad encrypted data bag secret '%s': %s", p.config.EncryptedDataBagSecretPath, err)) + } + } + + if (p.config.PolicyName != "") != (p.config.PolicyGroup != "") { + errs = packersdk.MultiErrorAppend(errs, fmt.Errorf("If either policy_name or policy_group are set, they must both be set.")) + } + + jsonValid := true + for k, v := range p.config.Json { + p.config.Json[k], err = p.deepJsonFix(k, v) + if err != nil { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Error processing JSON: %s", err)) + jsonValid = false + } + } + + if jsonValid { + // Process the user variables within the JSON and set the JSON. + // Do this early so that we can validate and show errors. + p.config.Json, err = p.processJsonUserVars() + if err != nil { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Error processing user variables in JSON: %s", err)) + } + } + + if errs != nil && len(errs.Errors) > 0 { + return errs + } + + return nil +} + +func (p *Provisioner) Provision(ctx context.Context, ui packersdk.Ui, comm packersdk.Communicator, generatedData map[string]interface{}) error { + p.generatedData = generatedData + p.communicator = comm + + nodeName := p.config.NodeName + if nodeName == "" { + nodeName = fmt.Sprintf("packer-%s", uuid.TimeOrderedUUID()) + } + remoteValidationKeyPath := "" + serverUrl := p.config.ServerUrl + + if !p.config.SkipInstall { + if err := p.installChef(ui, comm, p.config.Version); err != nil { + return fmt.Errorf("Error installing Chef: %s", err) + } + } + + if err := p.createDir(ui, comm, p.config.StagingDir); err != nil { + return fmt.Errorf("Error creating staging directory: %s", err) + } + + if p.config.ClientKey == "" { + p.config.ClientKey = fmt.Sprintf("%s/client.pem", p.config.StagingDir) + } + + encryptedDataBagSecretPath := "" + if p.config.EncryptedDataBagSecretPath != "" { + encryptedDataBagSecretPath = fmt.Sprintf("%s/encrypted_data_bag_secret", p.config.StagingDir) + if err := p.uploadFile(ui, + comm, + encryptedDataBagSecretPath, + p.config.EncryptedDataBagSecretPath); err != nil { + return fmt.Errorf("Error uploading encrypted data bag secret: %s", err) + } + } + + if p.config.ValidationKeyPath != "" { + path, err := pathing.ExpandUser(p.config.ValidationKeyPath) + if err != nil { + return fmt.Errorf("Error while expanding a tilde in the validation key: %s", err) + } + remoteValidationKeyPath = fmt.Sprintf("%s/validation.pem", p.config.StagingDir) + if err := p.uploadFile(ui, comm, remoteValidationKeyPath, path); err != nil { + return fmt.Errorf("Error copying validation key: %s", err) + } + } + + configPath, err := p.createConfig( + ui, + comm, + nodeName, + serverUrl, + p.config.ClientKey, + p.config.ChefLicense, + encryptedDataBagSecretPath, + remoteValidationKeyPath, + p.config.ValidationClientName, + p.config.ChefEnvironment, + p.config.PolicyGroup, + p.config.PolicyName, + p.config.SslVerifyMode, + p.config.TrustedCertsDir) + if err != nil { + return fmt.Errorf("Error creating Chef config file: %s", err) + } + + jsonPath, err := p.createJson(ui, comm) + if err != nil { + return fmt.Errorf("Error creating JSON attributes: %s", err) + } + + err = p.executeChef(ui, comm, configPath, jsonPath) + + if !(p.config.SkipCleanNode && p.config.SkipCleanClient) { + + knifeConfigPath, knifeErr := p.createKnifeConfig( + ui, comm, nodeName, serverUrl, p.config.ClientKey, p.config.SslVerifyMode, p.config.TrustedCertsDir) + + if knifeErr != nil { + return fmt.Errorf("Error creating knife config on node: %s", knifeErr) + } + + if !p.config.SkipCleanNode { + if err := p.cleanNode(ui, comm, nodeName, knifeConfigPath); err != nil { + return fmt.Errorf("Error cleaning up chef node: %s", err) + } + } + + if !p.config.SkipCleanClient { + if err := p.cleanClient(ui, comm, nodeName, knifeConfigPath); err != nil { + return fmt.Errorf("Error cleaning up chef client: %s", err) + } + } + } + + if err != nil { + return fmt.Errorf("Error executing Chef: %s", err) + } + + if !p.config.SkipCleanStagingDirectory { + if err := p.removeDir(ui, comm, p.config.StagingDir); err != nil { + return fmt.Errorf("Error removing %s: %s", p.config.StagingDir, err) + } + } + + return nil +} + +func (p *Provisioner) uploadFile(ui packersdk.Ui, comm packersdk.Communicator, remotePath string, localPath string) error { + ui.Message(fmt.Sprintf("Uploading %s...", localPath)) + + f, err := os.Open(localPath) + if err != nil { + return err + } + defer f.Close() + + return comm.Upload(remotePath, f, nil) +} + +func (p *Provisioner) createConfig( + ui packersdk.Ui, + comm packersdk.Communicator, + nodeName string, + serverUrl string, + clientKey string, + chefLicense string, + encryptedDataBagSecretPath, + remoteKeyPath string, + validationClientName string, + chefEnvironment string, + policyGroup string, + policyName string, + sslVerifyMode string, + trustedCertsDir string) (string, error) { + + ui.Message("Creating configuration file 'client.rb'") + + // Read the template + tpl := DefaultConfigTemplate + if p.config.ConfigTemplate != "" { + f, err := os.Open(p.config.ConfigTemplate) + if err != nil { + return "", err + } + defer f.Close() + + tplBytes, err := ioutil.ReadAll(f) + if err != nil { + return "", err + } + + tpl = string(tplBytes) + } + + ictx := p.config.ctx + ictx.Data = &ConfigTemplate{ + NodeName: nodeName, + ServerUrl: serverUrl, + ClientKey: clientKey, + ChefLicense: chefLicense, + ValidationKeyPath: remoteKeyPath, + ValidationClientName: validationClientName, + ChefEnvironment: chefEnvironment, + PolicyGroup: policyGroup, + PolicyName: policyName, + SslVerifyMode: sslVerifyMode, + TrustedCertsDir: trustedCertsDir, + EncryptedDataBagSecretPath: encryptedDataBagSecretPath, + } + configString, err := interpolate.Render(tpl, &ictx) + if err != nil { + return "", err + } + + remotePath := filepath.ToSlash(filepath.Join(p.config.StagingDir, "client.rb")) + if err := comm.Upload(remotePath, bytes.NewReader([]byte(configString)), nil); err != nil { + return "", err + } + + return remotePath, nil +} + +func (p *Provisioner) createKnifeConfig(ui packersdk.Ui, comm packersdk.Communicator, nodeName string, serverUrl string, clientKey string, sslVerifyMode string, trustedCertsDir string) (string, error) { + ui.Message("Creating configuration file 'knife.rb'") + + // Read the template + tpl := DefaultKnifeTemplate + + ictx := p.config.ctx + ictx.Data = &ConfigTemplate{ + NodeName: nodeName, + ServerUrl: serverUrl, + ClientKey: clientKey, + SslVerifyMode: sslVerifyMode, + TrustedCertsDir: trustedCertsDir, + } + configString, err := interpolate.Render(tpl, &ictx) + if err != nil { + return "", err + } + + remotePath := filepath.ToSlash(filepath.Join(p.config.StagingDir, "knife.rb")) + if err := comm.Upload(remotePath, bytes.NewReader([]byte(configString)), nil); err != nil { + return "", err + } + + return remotePath, nil +} + +func (p *Provisioner) createJson(ui packersdk.Ui, comm packersdk.Communicator) (string, error) { + ui.Message("Creating JSON attribute file") + + jsonData := make(map[string]interface{}) + + // Copy the configured JSON + for k, v := range p.config.Json { + jsonData[k] = v + } + + // Set the run list if it was specified + if len(p.config.RunList) > 0 { + jsonData["run_list"] = p.config.RunList + } + + jsonBytes, err := json.MarshalIndent(jsonData, "", " ") + if err != nil { + return "", err + } + + // Upload the bytes + remotePath := filepath.ToSlash(filepath.Join(p.config.StagingDir, "first-boot.json")) + if err := comm.Upload(remotePath, bytes.NewReader(jsonBytes), nil); err != nil { + return "", err + } + + return remotePath, nil +} + +func (p *Provisioner) createDir(ui packersdk.Ui, comm packersdk.Communicator, dir string) error { + ctx := context.TODO() + ui.Message(fmt.Sprintf("Creating directory: %s", dir)) + + cmd := &packersdk.RemoteCmd{Command: p.guestCommands.CreateDir(dir)} + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + if cmd.ExitStatus() != 0 { + return fmt.Errorf("Non-zero exit status. See output above for more info.") + } + + // Chmod the directory to 0777 just so that we can access it as our user + cmd = &packersdk.RemoteCmd{Command: p.guestCommands.Chmod(dir, "0777")} + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + if cmd.ExitStatus() != 0 { + return fmt.Errorf("Non-zero exit status. See output above for more info.") + } + + return nil +} + +func (p *Provisioner) cleanNode(ui packersdk.Ui, comm packersdk.Communicator, node string, knifeConfigPath string) error { + ui.Say("Cleaning up chef node...") + args := []string{"node", "delete", node} + if err := p.knifeExec(ui, comm, node, knifeConfigPath, args); err != nil { + return fmt.Errorf("Failed to cleanup node: %s", err) + } + + return nil +} + +func (p *Provisioner) cleanClient(ui packersdk.Ui, comm packersdk.Communicator, node string, knifeConfigPath string) error { + ui.Say("Cleaning up chef client...") + args := []string{"client", "delete", node} + if err := p.knifeExec(ui, comm, node, knifeConfigPath, args); err != nil { + return fmt.Errorf("Failed to cleanup client: %s", err) + } + + return nil +} + +func (p *Provisioner) knifeExec(ui packersdk.Ui, comm packersdk.Communicator, node string, knifeConfigPath string, args []string) error { + flags := []string{ + "-y", + "-c", knifeConfigPath, + } + ctx := context.TODO() + + p.config.ctx.Data = &KnifeTemplate{ + Sudo: !p.config.PreventSudo, + Flags: strings.Join(flags, " "), + Args: strings.Join(args, " "), + } + + command, err := interpolate.Render(p.config.KnifeCommand, &p.config.ctx) + if err != nil { + return err + } + + cmd := &packersdk.RemoteCmd{Command: command} + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + if cmd.ExitStatus() != 0 { + return fmt.Errorf( + "Non-zero exit status. See output above for more info.\n\n"+ + "Command: %s", + command) + } + + return nil +} + +func (p *Provisioner) removeDir(ui packersdk.Ui, comm packersdk.Communicator, dir string) error { + ui.Message(fmt.Sprintf("Removing directory: %s", dir)) + ctx := context.TODO() + + cmd := &packersdk.RemoteCmd{Command: p.guestCommands.RemoveDir(dir)} + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + + return nil +} + +func (p *Provisioner) executeChef(ui packersdk.Ui, comm packersdk.Communicator, config string, json string) error { + p.config.ctx.Data = &ExecuteTemplate{ + ConfigPath: config, + JsonPath: json, + Sudo: !p.config.PreventSudo, + } + ctx := context.TODO() + + command, err := interpolate.Render(p.config.ExecuteCommand, &p.config.ctx) + if err != nil { + return err + } + + if p.config.ElevatedUser != "" { + command, err = guestexec.GenerateElevatedRunner(command, p) + if err != nil { + return err + } + } + + ui.Message(fmt.Sprintf("Executing Chef: %s", command)) + + cmd := &packersdk.RemoteCmd{ + Command: command, + } + + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + + if cmd.ExitStatus() != 0 { + return fmt.Errorf("Non-zero exit status: %d", cmd.ExitStatus()) + } + + return nil +} + +func (p *Provisioner) installChef(ui packersdk.Ui, comm packersdk.Communicator, version string) error { + ui.Message("Installing Chef...") + ctx := context.TODO() + + p.config.ctx.Data = &InstallChefTemplate{ + Sudo: !p.config.PreventSudo, + Version: version, + } + command, err := interpolate.Render(p.config.InstallCommand, &p.config.ctx) + if err != nil { + return err + } + + ui.Message(command) + + cmd := &packersdk.RemoteCmd{Command: command} + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + + if cmd.ExitStatus() != 0 { + return fmt.Errorf( + "Install script exited with non-zero exit status %d", cmd.ExitStatus()) + } + + return nil +} + +func (p *Provisioner) deepJsonFix(key string, current interface{}) (interface{}, error) { + if current == nil { + return nil, nil + } + + switch c := current.(type) { + case []interface{}: + val := make([]interface{}, len(c)) + for i, v := range c { + var err error + val[i], err = p.deepJsonFix(fmt.Sprintf("%s[%d]", key, i), v) + if err != nil { + return nil, err + } + } + + return val, nil + case []uint8: + return string(c), nil + case map[interface{}]interface{}: + val := make(map[string]interface{}) + for k, v := range c { + ks, ok := k.(string) + if !ok { + return nil, fmt.Errorf("%s: key is not string", key) + } + + var err error + val[ks], err = p.deepJsonFix( + fmt.Sprintf("%s.%s", key, ks), v) + if err != nil { + return nil, err + } + } + + return val, nil + default: + return current, nil + } +} + +func (p *Provisioner) processJsonUserVars() (map[string]interface{}, error) { + jsonBytes, err := json.Marshal(p.config.Json) + if err != nil { + // This really shouldn't happen since we literally just unmarshalled + panic(err) + } + + // Copy the user variables so that we can restore them later, and + // make sure we make the quotes JSON-friendly in the user variables. + originalUserVars := make(map[string]string) + for k, v := range p.config.ctx.UserVariables { + originalUserVars[k] = v + } + + // Make sure we reset them no matter what + defer func() { + p.config.ctx.UserVariables = originalUserVars + }() + + // Make the current user variables JSON string safe. + for k, v := range p.config.ctx.UserVariables { + v = strings.Replace(v, `\`, `\\`, -1) + v = strings.Replace(v, `"`, `\"`, -1) + p.config.ctx.UserVariables[k] = v + } + + // Process the bytes with the template processor + p.config.ctx.Data = nil + jsonBytesProcessed, err := interpolate.Render(string(jsonBytes), &p.config.ctx) + if err != nil { + return nil, err + } + + var result map[string]interface{} + if err := json.Unmarshal([]byte(jsonBytesProcessed), &result); err != nil { + return nil, err + } + + return result, nil +} + +func (p *Provisioner) Communicator() packersdk.Communicator { + return p.communicator +} + +func (p *Provisioner) ElevatedUser() string { + return p.config.ElevatedUser +} + +func (p *Provisioner) ElevatedPassword() string { + // Replace ElevatedPassword for winrm users who used this feature + p.config.ctx.Data = p.generatedData + + elevatedPassword, _ := interpolate.Render(p.config.ElevatedPassword, &p.config.ctx) + + return elevatedPassword +} + +var DefaultConfigTemplate = ` +log_level :info +log_location STDOUT +chef_server_url "{{.ServerUrl}}" +client_key "{{.ClientKey}}" +chef_license "{{.ChefLicense}}" +{{if ne .EncryptedDataBagSecretPath ""}} +encrypted_data_bag_secret "{{.EncryptedDataBagSecretPath}}" +{{end}} +{{if ne .ValidationClientName ""}} +validation_client_name "{{.ValidationClientName}}" +{{else}} +validation_client_name "chef-validator" +{{end}} +{{if ne .ValidationKeyPath ""}} +validation_key "{{.ValidationKeyPath}}" +{{end}} +node_name "{{.NodeName}}" +{{if ne .ChefEnvironment ""}} +environment "{{.ChefEnvironment}}" +{{end}} +{{if ne .PolicyGroup ""}} +policy_group "{{.PolicyGroup}}" +{{end}} +{{if ne .PolicyName ""}} +policy_name "{{.PolicyName}}" +{{end}} +{{if ne .SslVerifyMode ""}} +ssl_verify_mode :{{.SslVerifyMode}} +{{end}} +{{if ne .TrustedCertsDir ""}} +trusted_certs_dir "{{.TrustedCertsDir}}" +{{end}} +` + +var DefaultKnifeTemplate = ` +log_level :info +log_location STDOUT +chef_server_url "{{.ServerUrl}}" +client_key "{{.ClientKey}}" +node_name "{{.NodeName}}" +{{if ne .SslVerifyMode ""}} +ssl_verify_mode :{{.SslVerifyMode}} +{{end}} +{{if ne .TrustedCertsDir ""}} +trusted_certs_dir "{{.TrustedCertsDir}}" +{{end}} +` diff --git a/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-client/provisioner.hcl2spec.go b/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-client/provisioner.hcl2spec.go new file mode 100644 index 000000000..96d3eae6e --- /dev/null +++ b/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-client/provisioner.hcl2spec.go @@ -0,0 +1,101 @@ +// Code generated by "packer-sdc mapstructure-to-hcl2"; DO NOT EDIT. + +package chefclient + +import ( + "github.com/hashicorp/hcl/v2/hcldec" + "github.com/zclconf/go-cty/cty" +) + +// FlatConfig is an auto-generated flat version of Config. +// Where the contents of a field with a `mapstructure:,squash` tag are bubbled up. +type FlatConfig struct { + PackerBuildName *string `mapstructure:"packer_build_name" cty:"packer_build_name" hcl:"packer_build_name"` + PackerBuilderType *string `mapstructure:"packer_builder_type" cty:"packer_builder_type" hcl:"packer_builder_type"` + PackerCoreVersion *string `mapstructure:"packer_core_version" cty:"packer_core_version" hcl:"packer_core_version"` + PackerDebug *bool `mapstructure:"packer_debug" cty:"packer_debug" hcl:"packer_debug"` + PackerForce *bool `mapstructure:"packer_force" cty:"packer_force" hcl:"packer_force"` + PackerOnError *string `mapstructure:"packer_on_error" cty:"packer_on_error" hcl:"packer_on_error"` + PackerUserVars map[string]string `mapstructure:"packer_user_variables" cty:"packer_user_variables" hcl:"packer_user_variables"` + PackerSensitiveVars []string `mapstructure:"packer_sensitive_variables" cty:"packer_sensitive_variables" hcl:"packer_sensitive_variables"` + Json map[string]interface{} `cty:"json" hcl:"json"` + ChefEnvironment *string `mapstructure:"chef_environment" cty:"chef_environment" hcl:"chef_environment"` + ChefLicense *string `mapstructure:"chef_license" cty:"chef_license" hcl:"chef_license"` + ClientKey *string `mapstructure:"client_key" cty:"client_key" hcl:"client_key"` + ConfigTemplate *string `mapstructure:"config_template" cty:"config_template" hcl:"config_template"` + ElevatedUser *string `mapstructure:"elevated_user" cty:"elevated_user" hcl:"elevated_user"` + ElevatedPassword *string `mapstructure:"elevated_password" cty:"elevated_password" hcl:"elevated_password"` + EncryptedDataBagSecretPath *string `mapstructure:"encrypted_data_bag_secret_path" cty:"encrypted_data_bag_secret_path" hcl:"encrypted_data_bag_secret_path"` + ExecuteCommand *string `mapstructure:"execute_command" cty:"execute_command" hcl:"execute_command"` + GuestOSType *string `mapstructure:"guest_os_type" cty:"guest_os_type" hcl:"guest_os_type"` + InstallCommand *string `mapstructure:"install_command" cty:"install_command" hcl:"install_command"` + KnifeCommand *string `mapstructure:"knife_command" cty:"knife_command" hcl:"knife_command"` + NodeName *string `mapstructure:"node_name" cty:"node_name" hcl:"node_name"` + PolicyGroup *string `mapstructure:"policy_group" cty:"policy_group" hcl:"policy_group"` + PolicyName *string `mapstructure:"policy_name" cty:"policy_name" hcl:"policy_name"` + PreventSudo *bool `mapstructure:"prevent_sudo" cty:"prevent_sudo" hcl:"prevent_sudo"` + RunList []string `mapstructure:"run_list" cty:"run_list" hcl:"run_list"` + ServerUrl *string `mapstructure:"server_url" cty:"server_url" hcl:"server_url"` + SkipCleanClient *bool `mapstructure:"skip_clean_client" cty:"skip_clean_client" hcl:"skip_clean_client"` + SkipCleanNode *bool `mapstructure:"skip_clean_node" cty:"skip_clean_node" hcl:"skip_clean_node"` + SkipCleanStagingDirectory *bool `mapstructure:"skip_clean_staging_directory" cty:"skip_clean_staging_directory" hcl:"skip_clean_staging_directory"` + SkipInstall *bool `mapstructure:"skip_install" cty:"skip_install" hcl:"skip_install"` + SslVerifyMode *string `mapstructure:"ssl_verify_mode" cty:"ssl_verify_mode" hcl:"ssl_verify_mode"` + TrustedCertsDir *string `mapstructure:"trusted_certs_dir" cty:"trusted_certs_dir" hcl:"trusted_certs_dir"` + StagingDir *string `mapstructure:"staging_directory" cty:"staging_directory" hcl:"staging_directory"` + ValidationClientName *string `mapstructure:"validation_client_name" cty:"validation_client_name" hcl:"validation_client_name"` + ValidationKeyPath *string `mapstructure:"validation_key_path" cty:"validation_key_path" hcl:"validation_key_path"` + Version *string `mapstructure:"version" cty:"version" hcl:"version"` +} + +// FlatMapstructure returns a new FlatConfig. +// FlatConfig is an auto-generated flat version of Config. +// Where the contents a fields with a `mapstructure:,squash` tag are bubbled up. +func (*Config) FlatMapstructure() interface{ HCL2Spec() map[string]hcldec.Spec } { + return new(FlatConfig) +} + +// HCL2Spec returns the hcl spec of a Config. +// This spec is used by HCL to read the fields of Config. +// The decoded values from this spec will then be applied to a FlatConfig. +func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec { + s := map[string]hcldec.Spec{ + "packer_build_name": &hcldec.AttrSpec{Name: "packer_build_name", Type: cty.String, Required: false}, + "packer_builder_type": &hcldec.AttrSpec{Name: "packer_builder_type", Type: cty.String, Required: false}, + "packer_core_version": &hcldec.AttrSpec{Name: "packer_core_version", Type: cty.String, Required: false}, + "packer_debug": &hcldec.AttrSpec{Name: "packer_debug", Type: cty.Bool, Required: false}, + "packer_force": &hcldec.AttrSpec{Name: "packer_force", Type: cty.Bool, Required: false}, + "packer_on_error": &hcldec.AttrSpec{Name: "packer_on_error", Type: cty.String, Required: false}, + "packer_user_variables": &hcldec.AttrSpec{Name: "packer_user_variables", Type: cty.Map(cty.String), Required: false}, + "packer_sensitive_variables": &hcldec.AttrSpec{Name: "packer_sensitive_variables", Type: cty.List(cty.String), Required: false}, + "json": &hcldec.AttrSpec{Name: "json", Type: cty.Map(cty.String), Required: false}, + "chef_environment": &hcldec.AttrSpec{Name: "chef_environment", Type: cty.String, Required: false}, + "chef_license": &hcldec.AttrSpec{Name: "chef_license", Type: cty.String, Required: false}, + "client_key": &hcldec.AttrSpec{Name: "client_key", Type: cty.String, Required: false}, + "config_template": &hcldec.AttrSpec{Name: "config_template", Type: cty.String, Required: false}, + "elevated_user": &hcldec.AttrSpec{Name: "elevated_user", Type: cty.String, Required: false}, + "elevated_password": &hcldec.AttrSpec{Name: "elevated_password", Type: cty.String, Required: false}, + "encrypted_data_bag_secret_path": &hcldec.AttrSpec{Name: "encrypted_data_bag_secret_path", Type: cty.String, Required: false}, + "execute_command": &hcldec.AttrSpec{Name: "execute_command", Type: cty.String, Required: false}, + "guest_os_type": &hcldec.AttrSpec{Name: "guest_os_type", Type: cty.String, Required: false}, + "install_command": &hcldec.AttrSpec{Name: "install_command", Type: cty.String, Required: false}, + "knife_command": &hcldec.AttrSpec{Name: "knife_command", Type: cty.String, Required: false}, + "node_name": &hcldec.AttrSpec{Name: "node_name", Type: cty.String, Required: false}, + "policy_group": &hcldec.AttrSpec{Name: "policy_group", Type: cty.String, Required: false}, + "policy_name": &hcldec.AttrSpec{Name: "policy_name", Type: cty.String, Required: false}, + "prevent_sudo": &hcldec.AttrSpec{Name: "prevent_sudo", Type: cty.Bool, Required: false}, + "run_list": &hcldec.AttrSpec{Name: "run_list", Type: cty.List(cty.String), Required: false}, + "server_url": &hcldec.AttrSpec{Name: "server_url", Type: cty.String, Required: false}, + "skip_clean_client": &hcldec.AttrSpec{Name: "skip_clean_client", Type: cty.Bool, Required: false}, + "skip_clean_node": &hcldec.AttrSpec{Name: "skip_clean_node", Type: cty.Bool, Required: false}, + "skip_clean_staging_directory": &hcldec.AttrSpec{Name: "skip_clean_staging_directory", Type: cty.Bool, Required: false}, + "skip_install": &hcldec.AttrSpec{Name: "skip_install", Type: cty.Bool, Required: false}, + "ssl_verify_mode": &hcldec.AttrSpec{Name: "ssl_verify_mode", Type: cty.String, Required: false}, + "trusted_certs_dir": &hcldec.AttrSpec{Name: "trusted_certs_dir", Type: cty.String, Required: false}, + "staging_directory": &hcldec.AttrSpec{Name: "staging_directory", Type: cty.String, Required: false}, + "validation_client_name": &hcldec.AttrSpec{Name: "validation_client_name", Type: cty.String, Required: false}, + "validation_key_path": &hcldec.AttrSpec{Name: "validation_key_path", Type: cty.String, Required: false}, + "version": &hcldec.AttrSpec{Name: "version", Type: cty.String, Required: false}, + } + return s +} diff --git a/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-solo/provisioner.go b/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-solo/provisioner.go new file mode 100644 index 000000000..f77122700 --- /dev/null +++ b/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-solo/provisioner.go @@ -0,0 +1,611 @@ +//go:generate packer-sdc mapstructure-to-hcl2 -type Config + +// This package implements a provisioner for Packer that uses +// Chef to provision the remote machine, specifically with chef-solo (that is, +// without a Chef server). +package chefsolo + +import ( + "bytes" + "context" + "encoding/json" + "fmt" + "io/ioutil" + "os" + "path/filepath" + "strings" + + "github.com/hashicorp/hcl/v2/hcldec" + "github.com/hashicorp/packer-plugin-sdk/common" + "github.com/hashicorp/packer-plugin-sdk/guestexec" + packersdk "github.com/hashicorp/packer-plugin-sdk/packer" + "github.com/hashicorp/packer-plugin-sdk/template/config" + "github.com/hashicorp/packer-plugin-sdk/template/interpolate" +) + +type guestOSTypeConfig struct { + executeCommand string + installCommand string + stagingDir string +} + +var guestOSTypeConfigs = map[string]guestOSTypeConfig{ + guestexec.UnixOSType: { + executeCommand: "{{if .Sudo}}sudo {{end}}chef-solo --no-color -c {{.ConfigPath}} -j {{.JsonPath}}", + installCommand: "curl -L https://omnitruck.chef.io/install.sh | {{if .Sudo}}sudo {{end}}bash -s --{{if .Version}} -v {{.Version}}{{end}}", + stagingDir: "/tmp/packer-chef-solo", + }, + guestexec.WindowsOSType: { + executeCommand: "c:/opscode/chef/bin/chef-solo.bat --no-color -c {{.ConfigPath}} -j {{.JsonPath}}", + installCommand: "powershell.exe -Command \". { iwr -useb https://omnitruck.chef.io/install.ps1 } | iex; Install-Project{{if .Version}} -version {{.Version}}{{end}}\"", + stagingDir: "C:/Windows/Temp/packer-chef-solo", + }, +} + +type Config struct { + common.PackerConfig `mapstructure:",squash"` + + ChefEnvironment string `mapstructure:"chef_environment"` + ChefLicense string `mapstructure:"chef_license"` + ConfigTemplate string `mapstructure:"config_template"` + CookbookPaths []string `mapstructure:"cookbook_paths"` + RolesPath string `mapstructure:"roles_path"` + DataBagsPath string `mapstructure:"data_bags_path"` + EncryptedDataBagSecretPath string `mapstructure:"encrypted_data_bag_secret_path"` + EnvironmentsPath string `mapstructure:"environments_path"` + ExecuteCommand string `mapstructure:"execute_command"` + InstallCommand string `mapstructure:"install_command"` + RemoteCookbookPaths []string `mapstructure:"remote_cookbook_paths"` + // HCL cannot be decoded into an interface so for HCL templates you must use the JsonString option, + // To be used with https://www.packer.io/docs/templates/hcl_templates/functions/encoding/jsonencode + // ref: https://github.com/hashicorp/hcl/issues/291#issuecomment-496347585 + JsonString string `mapstructure:"json_string"` + // For JSON templates we keep the map[string]interface{} + Json map[string]interface{} `mapstructure:"json" mapstructure-to-hcl2:",skip"` + PreventSudo bool `mapstructure:"prevent_sudo"` + RunList []string `mapstructure:"run_list"` + SkipInstall bool `mapstructure:"skip_install"` + StagingDir string `mapstructure:"staging_directory"` + GuestOSType string `mapstructure:"guest_os_type"` + Version string `mapstructure:"version"` + + ctx interpolate.Context +} + +type Provisioner struct { + config Config + guestOSTypeConfig guestOSTypeConfig + guestCommands *guestexec.GuestCommands +} + +type ConfigTemplate struct { + CookbookPaths string + DataBagsPath string + EncryptedDataBagSecretPath string + RolesPath string + EnvironmentsPath string + ChefEnvironment string + ChefLicense string + + // Templates don't support boolean statements until Go 1.2. In the + // mean time, we do this. + // TODO(mitchellh): Remove when Go 1.2 is released + HasDataBagsPath bool + HasEncryptedDataBagSecretPath bool + HasRolesPath bool + HasEnvironmentsPath bool +} + +type ExecuteTemplate struct { + ConfigPath string + JsonPath string + Sudo bool +} + +type InstallChefTemplate struct { + Sudo bool + Version string +} + +func (p *Provisioner) ConfigSpec() hcldec.ObjectSpec { return p.config.FlatMapstructure().HCL2Spec() } + +func (p *Provisioner) Prepare(raws ...interface{}) error { + err := config.Decode(&p.config, &config.DecodeOpts{ + PluginType: "chef-solo", + Interpolate: true, + InterpolateContext: &p.config.ctx, + InterpolateFilter: &interpolate.RenderFilter{ + Exclude: []string{ + "execute_command", + "install_command", + }, + }, + }, raws...) + if err != nil { + return err + } + + if p.config.JsonString != "" { + if err := json.Unmarshal([]byte(p.config.JsonString), &p.config.Json); err != nil { + return fmt.Errorf("Failed to unmarshal 'json_string': %s", err.Error()) + } + } + + if p.config.GuestOSType == "" { + p.config.GuestOSType = guestexec.DefaultOSType + } + p.config.GuestOSType = strings.ToLower(p.config.GuestOSType) + + var ok bool + p.guestOSTypeConfig, ok = guestOSTypeConfigs[p.config.GuestOSType] + if !ok { + return fmt.Errorf("Invalid guest_os_type: \"%s\"", p.config.GuestOSType) + } + + p.guestCommands, err = guestexec.NewGuestCommands(p.config.GuestOSType, !p.config.PreventSudo) + if err != nil { + return fmt.Errorf("Invalid guest_os_type: \"%s\"", p.config.GuestOSType) + } + + if p.config.ExecuteCommand == "" { + p.config.ExecuteCommand = p.guestOSTypeConfig.executeCommand + } + + if p.config.InstallCommand == "" { + p.config.InstallCommand = p.guestOSTypeConfig.installCommand + } + + if p.config.RunList == nil { + p.config.RunList = make([]string, 0) + } + + if p.config.StagingDir == "" { + p.config.StagingDir = p.guestOSTypeConfig.stagingDir + } + + if !p.config.SkipInstall && p.config.InstallCommand == p.guestOSTypeConfig.installCommand { + if p.config.ChefLicense == "" { + p.config.ChefLicense = "accept-silent" + } + } + + var errs *packersdk.MultiError + if p.config.ConfigTemplate != "" { + fi, err := os.Stat(p.config.ConfigTemplate) + if err != nil { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Bad config template path: %s", err)) + } else if fi.IsDir() { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Config template path must be a file: %s", err)) + } + } + + for _, path := range p.config.CookbookPaths { + pFileInfo, err := os.Stat(path) + + if err != nil || !pFileInfo.IsDir() { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Bad cookbook path '%s': %s", path, err)) + } + } + + if p.config.RolesPath != "" { + pFileInfo, err := os.Stat(p.config.RolesPath) + + if err != nil || !pFileInfo.IsDir() { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Bad roles path '%s': %s", p.config.RolesPath, err)) + } + } + + if p.config.DataBagsPath != "" { + pFileInfo, err := os.Stat(p.config.DataBagsPath) + + if err != nil || !pFileInfo.IsDir() { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Bad data bags path '%s': %s", p.config.DataBagsPath, err)) + } + } + + if p.config.EncryptedDataBagSecretPath != "" { + pFileInfo, err := os.Stat(p.config.EncryptedDataBagSecretPath) + + if err != nil || pFileInfo.IsDir() { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Bad encrypted data bag secret '%s': %s", p.config.EncryptedDataBagSecretPath, err)) + } + } + + if p.config.EnvironmentsPath != "" { + pFileInfo, err := os.Stat(p.config.EnvironmentsPath) + + if err != nil || !pFileInfo.IsDir() { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Bad environments path '%s': %s", p.config.EnvironmentsPath, err)) + } + } + + jsonValid := true + for k, v := range p.config.Json { + p.config.Json[k], err = p.deepJsonFix(k, v) + if err != nil { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Error processing JSON: %s", err)) + jsonValid = false + } + } + + if jsonValid { + // Process the user variables within the JSON and set the JSON. + // Do this early so that we can validate and show errors. + p.config.Json, err = p.processJsonUserVars() + if err != nil { + errs = packersdk.MultiErrorAppend( + errs, fmt.Errorf("Error processing user variables in JSON: %s", err)) + } + } + + if errs != nil && len(errs.Errors) > 0 { + return errs + } + + return nil +} + +func (p *Provisioner) Provision(ctx context.Context, ui packersdk.Ui, comm packersdk.Communicator, _ map[string]interface{}) error { + ui.Say("Provisioning with chef-solo") + + if !p.config.SkipInstall { + if err := p.installChef(ui, comm, p.config.Version); err != nil { + return fmt.Errorf("Error installing Chef: %s", err) + } + } + + if err := p.createDir(ui, comm, p.config.StagingDir); err != nil { + return fmt.Errorf("Error creating staging directory: %s", err) + } + + cookbookPaths := make([]string, 0, len(p.config.CookbookPaths)) + for i, path := range p.config.CookbookPaths { + targetPath := fmt.Sprintf("%s/cookbooks-%d", p.config.StagingDir, i) + if err := p.uploadDirectory(ui, comm, targetPath, path); err != nil { + return fmt.Errorf("Error uploading cookbooks: %s", err) + } + + cookbookPaths = append(cookbookPaths, targetPath) + } + + rolesPath := "" + if p.config.RolesPath != "" { + rolesPath = fmt.Sprintf("%s/roles", p.config.StagingDir) + if err := p.uploadDirectory(ui, comm, rolesPath, p.config.RolesPath); err != nil { + return fmt.Errorf("Error uploading roles: %s", err) + } + } + + dataBagsPath := "" + if p.config.DataBagsPath != "" { + dataBagsPath = fmt.Sprintf("%s/data_bags", p.config.StagingDir) + if err := p.uploadDirectory(ui, comm, dataBagsPath, p.config.DataBagsPath); err != nil { + return fmt.Errorf("Error uploading data bags: %s", err) + } + } + + encryptedDataBagSecretPath := "" + if p.config.EncryptedDataBagSecretPath != "" { + encryptedDataBagSecretPath = fmt.Sprintf("%s/encrypted_data_bag_secret", p.config.StagingDir) + if err := p.uploadFile(ui, comm, encryptedDataBagSecretPath, p.config.EncryptedDataBagSecretPath); err != nil { + return fmt.Errorf("Error uploading encrypted data bag secret: %s", err) + } + } + + environmentsPath := "" + if p.config.EnvironmentsPath != "" { + environmentsPath = fmt.Sprintf("%s/environments", p.config.StagingDir) + if err := p.uploadDirectory(ui, comm, environmentsPath, p.config.EnvironmentsPath); err != nil { + return fmt.Errorf("Error uploading environments: %s", err) + } + } + + configPath, err := p.createConfig(ui, comm, cookbookPaths, rolesPath, dataBagsPath, encryptedDataBagSecretPath, environmentsPath, p.config.ChefEnvironment, p.config.ChefLicense) + if err != nil { + return fmt.Errorf("Error creating Chef config file: %s", err) + } + + jsonPath, err := p.createJson(ui, comm) + if err != nil { + return fmt.Errorf("Error creating JSON attributes: %s", err) + } + + if err := p.executeChef(ui, comm, configPath, jsonPath); err != nil { + return fmt.Errorf("Error executing Chef: %s", err) + } + + return nil +} + +func (p *Provisioner) uploadDirectory(ui packersdk.Ui, comm packersdk.Communicator, dst string, src string) error { + if err := p.createDir(ui, comm, dst); err != nil { + return err + } + + // Make sure there is a trailing "/" so that the directory isn't + // created on the other side. + if src[len(src)-1] != '/' { + src = src + "/" + } + + return comm.UploadDir(dst, src, nil) +} + +func (p *Provisioner) uploadFile(ui packersdk.Ui, comm packersdk.Communicator, dst string, src string) error { + f, err := os.Open(src) + if err != nil { + return err + } + defer f.Close() + + return comm.Upload(dst, f, nil) +} + +func (p *Provisioner) createConfig(ui packersdk.Ui, comm packersdk.Communicator, localCookbooks []string, rolesPath string, dataBagsPath string, encryptedDataBagSecretPath string, environmentsPath string, chefEnvironment string, chefLicense string) (string, error) { + ui.Message("Creating configuration file 'solo.rb'") + + cookbook_paths := make([]string, len(p.config.RemoteCookbookPaths)+len(localCookbooks)) + for i, path := range p.config.RemoteCookbookPaths { + cookbook_paths[i] = fmt.Sprintf(`"%s"`, path) + } + + for i, path := range localCookbooks { + i = len(p.config.RemoteCookbookPaths) + i + cookbook_paths[i] = fmt.Sprintf(`"%s"`, path) + } + + // Read the template + tpl := DefaultConfigTemplate + if p.config.ConfigTemplate != "" { + f, err := os.Open(p.config.ConfigTemplate) + if err != nil { + return "", err + } + defer f.Close() + + tplBytes, err := ioutil.ReadAll(f) + if err != nil { + return "", err + } + + tpl = string(tplBytes) + } + + p.config.ctx.Data = &ConfigTemplate{ + CookbookPaths: strings.Join(cookbook_paths, ","), + RolesPath: rolesPath, + DataBagsPath: dataBagsPath, + EncryptedDataBagSecretPath: encryptedDataBagSecretPath, + EnvironmentsPath: environmentsPath, + HasRolesPath: rolesPath != "", + HasDataBagsPath: dataBagsPath != "", + HasEncryptedDataBagSecretPath: encryptedDataBagSecretPath != "", + HasEnvironmentsPath: environmentsPath != "", + ChefEnvironment: chefEnvironment, + ChefLicense: chefLicense, + } + configString, err := interpolate.Render(tpl, &p.config.ctx) + if err != nil { + return "", err + } + + remotePath := filepath.ToSlash(filepath.Join(p.config.StagingDir, "solo.rb")) + if err := comm.Upload(remotePath, bytes.NewReader([]byte(configString)), nil); err != nil { + return "", err + } + + return remotePath, nil +} + +func (p *Provisioner) createJson(ui packersdk.Ui, comm packersdk.Communicator) (string, error) { + ui.Message("Creating JSON attribute file") + + jsonData := make(map[string]interface{}) + // Copy the configured JSON + for k, v := range p.config.Json { + jsonData[k] = v + } + // Set the run list if it was specified + if len(p.config.RunList) > 0 { + jsonData["run_list"] = p.config.RunList + } + + jsonBytes, err := json.MarshalIndent(jsonData, "", " ") + if err != nil { + return "", err + } + + // Upload the bytes + remotePath := filepath.ToSlash(filepath.Join(p.config.StagingDir, "node.json")) + if err := comm.Upload(remotePath, bytes.NewReader(jsonBytes), nil); err != nil { + return "", err + } + + return remotePath, nil +} + +func (p *Provisioner) createDir(ui packersdk.Ui, comm packersdk.Communicator, dir string) error { + ui.Message(fmt.Sprintf("Creating directory: %s", dir)) + ctx := context.TODO() + + cmd := &packersdk.RemoteCmd{Command: p.guestCommands.CreateDir(dir)} + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + if cmd.ExitStatus() != 0 { + return fmt.Errorf("Non-zero exit status. See output above for more info.") + } + + // Chmod the directory to 0777 just so that we can access it as our user + cmd = &packersdk.RemoteCmd{Command: p.guestCommands.Chmod(dir, "0777")} + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + if cmd.ExitStatus() != 0 { + return fmt.Errorf("Non-zero exit status. See output above for more info.") + } + + return nil +} + +func (p *Provisioner) executeChef(ui packersdk.Ui, comm packersdk.Communicator, config string, json string) error { + p.config.ctx.Data = &ExecuteTemplate{ + ConfigPath: config, + JsonPath: json, + Sudo: !p.config.PreventSudo, + } + command, err := interpolate.Render(p.config.ExecuteCommand, &p.config.ctx) + if err != nil { + return err + } + + ui.Message(fmt.Sprintf("Executing Chef: %s", command)) + + cmd := &packersdk.RemoteCmd{ + Command: command, + } + ctx := context.TODO() + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + + if cmd.ExitStatus() != 0 { + return fmt.Errorf("Non-zero exit status: %d", cmd.ExitStatus()) + } + + return nil +} + +func (p *Provisioner) installChef(ui packersdk.Ui, comm packersdk.Communicator, version string) error { + ui.Message("Installing Chef...") + ctx := context.TODO() + + p.config.ctx.Data = &InstallChefTemplate{ + Sudo: !p.config.PreventSudo, + Version: version, + } + command, err := interpolate.Render(p.config.InstallCommand, &p.config.ctx) + if err != nil { + return err + } + + cmd := &packersdk.RemoteCmd{Command: command} + if err := cmd.RunWithUi(ctx, comm, ui); err != nil { + return err + } + + if cmd.ExitStatus() != 0 { + return fmt.Errorf( + "Install script exited with non-zero exit status %d", cmd.ExitStatus()) + } + + return nil +} + +func (p *Provisioner) deepJsonFix(key string, current interface{}) (interface{}, error) { + if current == nil { + return nil, nil + } + + switch c := current.(type) { + case []interface{}: + val := make([]interface{}, len(c)) + for i, v := range c { + var err error + val[i], err = p.deepJsonFix(fmt.Sprintf("%s[%d]", key, i), v) + if err != nil { + return nil, err + } + } + + return val, nil + case []uint8: + return string(c), nil + case map[interface{}]interface{}: + val := make(map[string]interface{}) + for k, v := range c { + ks, ok := k.(string) + if !ok { + return nil, fmt.Errorf("%s: key is not string", key) + } + + var err error + val[ks], err = p.deepJsonFix( + fmt.Sprintf("%s.%s", key, ks), v) + if err != nil { + return nil, err + } + } + + return val, nil + default: + return current, nil + } +} + +func (p *Provisioner) processJsonUserVars() (map[string]interface{}, error) { + jsonBytes, err := json.Marshal(p.config.Json) + if err != nil { + // This really shouldn't happen since we literally just unmarshalled + panic(err) + } + + // Copy the user variables so that we can restore them later, and + // make sure we make the quotes JSON-friendly in the user variables. + originalUserVars := make(map[string]string) + for k, v := range p.config.ctx.UserVariables { + originalUserVars[k] = v + } + + // Make sure we reset them no matter what + defer func() { + p.config.ctx.UserVariables = originalUserVars + }() + + // Make the current user variables JSON string safe. + for k, v := range p.config.ctx.UserVariables { + v = strings.Replace(v, `\`, `\\`, -1) + v = strings.Replace(v, `"`, `\"`, -1) + p.config.ctx.UserVariables[k] = v + } + + // Process the bytes with the template processor + p.config.ctx.Data = nil + jsonBytesProcessed, err := interpolate.Render(string(jsonBytes), &p.config.ctx) + if err != nil { + return nil, err + } + + var result map[string]interface{} + if err := json.Unmarshal([]byte(jsonBytesProcessed), &result); err != nil { + return nil, err + } + + return result, nil +} + +var DefaultConfigTemplate = ` +chef_license "{{.ChefLicense}}" +cookbook_path [{{.CookbookPaths}}] +{{if .HasRolesPath}} +role_path "{{.RolesPath}}" +{{end}} +{{if .HasDataBagsPath}} +data_bag_path "{{.DataBagsPath}}" +{{end}} +{{if .HasEncryptedDataBagSecretPath}} +encrypted_data_bag_secret "{{.EncryptedDataBagSecretPath}}" +{{end}} +{{if .HasEnvironmentsPath}} +environment_path "{{.EnvironmentsPath}}" +environment "{{.ChefEnvironment}}" +{{end}} +` diff --git a/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-solo/provisioner.hcl2spec.go b/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-solo/provisioner.hcl2spec.go new file mode 100644 index 000000000..bf8dd12cf --- /dev/null +++ b/vendor/github.com/hashicorp/packer-plugin-chef/provisioner/chef-solo/provisioner.hcl2spec.go @@ -0,0 +1,81 @@ +// Code generated by "packer-sdc mapstructure-to-hcl2"; DO NOT EDIT. + +package chefsolo + +import ( + "github.com/hashicorp/hcl/v2/hcldec" + "github.com/zclconf/go-cty/cty" +) + +// FlatConfig is an auto-generated flat version of Config. +// Where the contents of a field with a `mapstructure:,squash` tag are bubbled up. +type FlatConfig struct { + PackerBuildName *string `mapstructure:"packer_build_name" cty:"packer_build_name" hcl:"packer_build_name"` + PackerBuilderType *string `mapstructure:"packer_builder_type" cty:"packer_builder_type" hcl:"packer_builder_type"` + PackerCoreVersion *string `mapstructure:"packer_core_version" cty:"packer_core_version" hcl:"packer_core_version"` + PackerDebug *bool `mapstructure:"packer_debug" cty:"packer_debug" hcl:"packer_debug"` + PackerForce *bool `mapstructure:"packer_force" cty:"packer_force" hcl:"packer_force"` + PackerOnError *string `mapstructure:"packer_on_error" cty:"packer_on_error" hcl:"packer_on_error"` + PackerUserVars map[string]string `mapstructure:"packer_user_variables" cty:"packer_user_variables" hcl:"packer_user_variables"` + PackerSensitiveVars []string `mapstructure:"packer_sensitive_variables" cty:"packer_sensitive_variables" hcl:"packer_sensitive_variables"` + ChefEnvironment *string `mapstructure:"chef_environment" cty:"chef_environment" hcl:"chef_environment"` + ChefLicense *string `mapstructure:"chef_license" cty:"chef_license" hcl:"chef_license"` + ConfigTemplate *string `mapstructure:"config_template" cty:"config_template" hcl:"config_template"` + CookbookPaths []string `mapstructure:"cookbook_paths" cty:"cookbook_paths" hcl:"cookbook_paths"` + RolesPath *string `mapstructure:"roles_path" cty:"roles_path" hcl:"roles_path"` + DataBagsPath *string `mapstructure:"data_bags_path" cty:"data_bags_path" hcl:"data_bags_path"` + EncryptedDataBagSecretPath *string `mapstructure:"encrypted_data_bag_secret_path" cty:"encrypted_data_bag_secret_path" hcl:"encrypted_data_bag_secret_path"` + EnvironmentsPath *string `mapstructure:"environments_path" cty:"environments_path" hcl:"environments_path"` + ExecuteCommand *string `mapstructure:"execute_command" cty:"execute_command" hcl:"execute_command"` + InstallCommand *string `mapstructure:"install_command" cty:"install_command" hcl:"install_command"` + RemoteCookbookPaths []string `mapstructure:"remote_cookbook_paths" cty:"remote_cookbook_paths" hcl:"remote_cookbook_paths"` + JsonString *string `mapstructure:"json_string" cty:"json_string" hcl:"json_string"` + PreventSudo *bool `mapstructure:"prevent_sudo" cty:"prevent_sudo" hcl:"prevent_sudo"` + RunList []string `mapstructure:"run_list" cty:"run_list" hcl:"run_list"` + SkipInstall *bool `mapstructure:"skip_install" cty:"skip_install" hcl:"skip_install"` + StagingDir *string `mapstructure:"staging_directory" cty:"staging_directory" hcl:"staging_directory"` + GuestOSType *string `mapstructure:"guest_os_type" cty:"guest_os_type" hcl:"guest_os_type"` + Version *string `mapstructure:"version" cty:"version" hcl:"version"` +} + +// FlatMapstructure returns a new FlatConfig. +// FlatConfig is an auto-generated flat version of Config. +// Where the contents a fields with a `mapstructure:,squash` tag are bubbled up. +func (*Config) FlatMapstructure() interface{ HCL2Spec() map[string]hcldec.Spec } { + return new(FlatConfig) +} + +// HCL2Spec returns the hcl spec of a Config. +// This spec is used by HCL to read the fields of Config. +// The decoded values from this spec will then be applied to a FlatConfig. +func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec { + s := map[string]hcldec.Spec{ + "packer_build_name": &hcldec.AttrSpec{Name: "packer_build_name", Type: cty.String, Required: false}, + "packer_builder_type": &hcldec.AttrSpec{Name: "packer_builder_type", Type: cty.String, Required: false}, + "packer_core_version": &hcldec.AttrSpec{Name: "packer_core_version", Type: cty.String, Required: false}, + "packer_debug": &hcldec.AttrSpec{Name: "packer_debug", Type: cty.Bool, Required: false}, + "packer_force": &hcldec.AttrSpec{Name: "packer_force", Type: cty.Bool, Required: false}, + "packer_on_error": &hcldec.AttrSpec{Name: "packer_on_error", Type: cty.String, Required: false}, + "packer_user_variables": &hcldec.AttrSpec{Name: "packer_user_variables", Type: cty.Map(cty.String), Required: false}, + "packer_sensitive_variables": &hcldec.AttrSpec{Name: "packer_sensitive_variables", Type: cty.List(cty.String), Required: false}, + "chef_environment": &hcldec.AttrSpec{Name: "chef_environment", Type: cty.String, Required: false}, + "chef_license": &hcldec.AttrSpec{Name: "chef_license", Type: cty.String, Required: false}, + "config_template": &hcldec.AttrSpec{Name: "config_template", Type: cty.String, Required: false}, + "cookbook_paths": &hcldec.AttrSpec{Name: "cookbook_paths", Type: cty.List(cty.String), Required: false}, + "roles_path": &hcldec.AttrSpec{Name: "roles_path", Type: cty.String, Required: false}, + "data_bags_path": &hcldec.AttrSpec{Name: "data_bags_path", Type: cty.String, Required: false}, + "encrypted_data_bag_secret_path": &hcldec.AttrSpec{Name: "encrypted_data_bag_secret_path", Type: cty.String, Required: false}, + "environments_path": &hcldec.AttrSpec{Name: "environments_path", Type: cty.String, Required: false}, + "execute_command": &hcldec.AttrSpec{Name: "execute_command", Type: cty.String, Required: false}, + "install_command": &hcldec.AttrSpec{Name: "install_command", Type: cty.String, Required: false}, + "remote_cookbook_paths": &hcldec.AttrSpec{Name: "remote_cookbook_paths", Type: cty.List(cty.String), Required: false}, + "json_string": &hcldec.AttrSpec{Name: "json_string", Type: cty.String, Required: false}, + "prevent_sudo": &hcldec.AttrSpec{Name: "prevent_sudo", Type: cty.Bool, Required: false}, + "run_list": &hcldec.AttrSpec{Name: "run_list", Type: cty.List(cty.String), Required: false}, + "skip_install": &hcldec.AttrSpec{Name: "skip_install", Type: cty.Bool, Required: false}, + "staging_directory": &hcldec.AttrSpec{Name: "staging_directory", Type: cty.String, Required: false}, + "guest_os_type": &hcldec.AttrSpec{Name: "guest_os_type", Type: cty.String, Required: false}, + "version": &hcldec.AttrSpec{Name: "version", Type: cty.String, Required: false}, + } + return s +} diff --git a/vendor/modules.txt b/vendor/modules.txt index ff032bd2a..1827fb962 100644 --- a/vendor/modules.txt +++ b/vendor/modules.txt @@ -507,6 +507,10 @@ github.com/hashicorp/packer-plugin-amazon/post-processor/import ## explicit github.com/hashicorp/packer-plugin-ansible/provisioner/ansible github.com/hashicorp/packer-plugin-ansible/provisioner/ansible-local +# github.com/hashicorp/packer-plugin-chef v0.0.1 +## explicit +github.com/hashicorp/packer-plugin-chef/provisioner/chef-client +github.com/hashicorp/packer-plugin-chef/provisioner/chef-solo # github.com/hashicorp/packer-plugin-docker v0.0.7 ## explicit github.com/hashicorp/packer-plugin-docker/builder/docker