package openstack import ( "fmt" "io/ioutil" "log" "os" "os/exec" "runtime" "github.com/mitchellh/multistep" "github.com/mitchellh/packer/common/uuid" "github.com/mitchellh/packer/packer" "github.com/rackspace/gophercloud/openstack/compute/v2/extensions/keypairs" "golang.org/x/crypto/ssh" ) type StepKeyPair struct { Debug bool DebugKeyPath string KeyPairName string PrivateKeyFile string keyName string } func (s *StepKeyPair) Run(state multistep.StateBag) multistep.StepAction { if s.PrivateKeyFile != "" { privateKeyBytes, err := ioutil.ReadFile(s.PrivateKeyFile) if err != nil { state.Put("error", fmt.Errorf( "Error loading configured private key file: %s", err)) return multistep.ActionHalt } state.Put("keyPair", s.KeyPairName) state.Put("privateKey", string(privateKeyBytes)) return multistep.ActionContinue } config := state.Get("config").(Config) ui := state.Get("ui").(packer.Ui) if config.Comm.Type == "ssh" && config.Comm.SSHPassword != "" { ui.Say("Not creating temporary keypair when using password.") return multistep.ActionContinue } // We need the v2 compute client computeClient, err := config.computeV2Client() if err != nil { err = fmt.Errorf("Error initializing compute client: %s", err) state.Put("error", err) return multistep.ActionHalt } keyName := fmt.Sprintf("packer %s", uuid.TimeOrderedUUID()) ui.Say(fmt.Sprintf("Creating temporary keypair: %s ...", keyName)) keypair, err := keypairs.Create(computeClient, keypairs.CreateOpts{ Name: keyName, }).Extract() if err != nil { state.Put("error", fmt.Errorf("Error creating temporary keypair: %s", err)) return multistep.ActionHalt } if keypair.PrivateKey == "" { state.Put("error", fmt.Errorf("The temporary keypair returned was blank")) return multistep.ActionHalt } ui.Say(fmt.Sprintf("Created temporary keypair: %s", keyName)) keypair.PrivateKey = berToDer(keypair.PrivateKey, ui) // If we're in debug mode, output the private key to the working // directory. if s.Debug { ui.Message(fmt.Sprintf("Saving key for debug purposes: %s", s.DebugKeyPath)) f, err := os.Create(s.DebugKeyPath) if err != nil { state.Put("error", fmt.Errorf("Error saving debug key: %s", err)) return multistep.ActionHalt } defer f.Close() // Write the key out if _, err := f.Write([]byte(keypair.PrivateKey)); err != nil { state.Put("error", fmt.Errorf("Error saving debug key: %s", err)) return multistep.ActionHalt } // Chmod it so that it is SSH ready if runtime.GOOS != "windows" { if err := f.Chmod(0600); err != nil { state.Put("error", fmt.Errorf("Error setting permissions of debug key: %s", err)) return multistep.ActionHalt } } } // Set the keyname so we know to delete it later s.keyName = keyName // Set some state data for use in future steps state.Put("keyPair", keyName) state.Put("privateKey", keypair.PrivateKey) return multistep.ActionContinue } // Work around for https://github.com/mitchellh/packer/issues/2526 func berToDer(ber string, ui packer.Ui) string { // Check if x/crypto/ssh can parse the key _, err := ssh.ParsePrivateKey([]byte(ber)) if err == nil { return ber } // Can't parse the key, maybe it's BER encoded. Try to convert it with OpenSSL. log.Println("Couldn't parse SSH key, trying work around for [GH-2526].") openSslPath, err := exec.LookPath("openssl") if err != nil { log.Println("Couldn't find OpenSSL, aborting work around.") return ber } berKey, err := ioutil.TempFile("", "packer-ber-privatekey-") defer os.Remove(berKey.Name()) if err != nil { return ber } ioutil.WriteFile(berKey.Name(), []byte(ber), os.ModeAppend) derKey, err := ioutil.TempFile("", "packer-der-privatekey-") defer os.Remove(derKey.Name()) if err != nil { return ber } args := []string{"rsa", "-in", berKey.Name(), "-out", derKey.Name()} log.Printf("Executing: %s %v", openSslPath, args) if err := exec.Command(openSslPath, args...).Run(); err != nil { log.Printf("OpenSSL failed with error: %s", err) return ber } der, err := ioutil.ReadFile(derKey.Name()) if err != nil { return ber } ui.Say("Successfully converted BER encoded SSH key to DER encoding.") return string(der) } func (s *StepKeyPair) Cleanup(state multistep.StateBag) { // If we used an SSH private key file, do not go about deleting // keypairs if s.PrivateKeyFile != "" { return } // If no key name is set, then we never created it, so just return if s.keyName == "" { return } config := state.Get("config").(Config) ui := state.Get("ui").(packer.Ui) // We need the v2 compute client computeClient, err := config.computeV2Client() if err != nil { ui.Error(fmt.Sprintf( "Error cleaning up keypair. Please delete the key manually: %s", s.keyName)) return } ui.Say(fmt.Sprintf("Deleting temporary keypair: %s ...", s.keyName)) err = keypairs.Delete(computeClient, s.keyName).ExtractErr() if err != nil { ui.Error(fmt.Sprintf( "Error cleaning up keypair. Please delete the key manually: %s", s.keyName)) } }