193 lines
6.7 KiB
Go
193 lines
6.7 KiB
Go
package openstack
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
|
|
"github.com/gophercloud/gophercloud/openstack/imageservice/v2/images"
|
|
"github.com/hashicorp/packer/common/uuid"
|
|
"github.com/hashicorp/packer/helper/communicator"
|
|
"github.com/hashicorp/packer/template/interpolate"
|
|
)
|
|
|
|
// RunConfig contains configuration for running an instance from a source
|
|
// image and details on how to access that launched image.
|
|
type RunConfig struct {
|
|
Comm communicator.Config `mapstructure:",squash"`
|
|
SSHKeyPairName string `mapstructure:"ssh_keypair_name"`
|
|
TemporaryKeyPairName string `mapstructure:"temporary_key_pair_name"`
|
|
SSHInterface string `mapstructure:"ssh_interface"`
|
|
SSHIPVersion string `mapstructure:"ssh_ip_version"`
|
|
|
|
SourceImage string `mapstructure:"source_image"`
|
|
SourceImageName string `mapstructure:"source_image_name"`
|
|
SourceImageFilters ImageFilter `mapstructure:"source_image_filter"`
|
|
Flavor string `mapstructure:"flavor"`
|
|
AvailabilityZone string `mapstructure:"availability_zone"`
|
|
RackconnectWait bool `mapstructure:"rackconnect_wait"`
|
|
FloatingIPNetwork string `mapstructure:"floating_ip_network"`
|
|
FloatingIP string `mapstructure:"floating_ip"`
|
|
ReuseIPs bool `mapstructure:"reuse_ips"`
|
|
SecurityGroups []string `mapstructure:"security_groups"`
|
|
Networks []string `mapstructure:"networks"`
|
|
Ports []string `mapstructure:"ports"`
|
|
UserData string `mapstructure:"user_data"`
|
|
UserDataFile string `mapstructure:"user_data_file"`
|
|
InstanceName string `mapstructure:"instance_name"`
|
|
InstanceMetadata map[string]string `mapstructure:"instance_metadata"`
|
|
|
|
ConfigDrive bool `mapstructure:"config_drive"`
|
|
|
|
// Used for BC, value will be passed to the "floating_ip_network"
|
|
FloatingIPPool string `mapstructure:"floating_ip_pool"`
|
|
|
|
UseBlockStorageVolume bool `mapstructure:"use_blockstorage_volume"`
|
|
VolumeName string `mapstructure:"volume_name"`
|
|
VolumeType string `mapstructure:"volume_type"`
|
|
VolumeAvailabilityZone string `mapstructure:"volume_availability_zone"`
|
|
|
|
// Not really used, but here for BC
|
|
OpenstackProvider string `mapstructure:"openstack_provider"`
|
|
UseFloatingIp bool `mapstructure:"use_floating_ip"`
|
|
|
|
sourceImageOpts images.ListOpts
|
|
}
|
|
|
|
type ImageFilter struct {
|
|
Filters ImageFilterOptions `mapstructure:"filters"`
|
|
MostRecent bool `mapstructure:"most_recent"`
|
|
}
|
|
|
|
type ImageFilterOptions struct {
|
|
Name string `mapstructure:"name"`
|
|
Owner string `mapstructure:"owner"`
|
|
Tags []string `mapstructure:"tags"`
|
|
Visibility string `mapstructure:"visibility"`
|
|
}
|
|
|
|
func (f *ImageFilterOptions) Empty() bool {
|
|
return f.Name == "" && f.Owner == "" && len(f.Tags) == 0 && f.Visibility == ""
|
|
}
|
|
|
|
func (f *ImageFilterOptions) Build() (*images.ListOpts, error) {
|
|
opts := images.ListOpts{}
|
|
// Set defaults for status, member_status, and sort
|
|
opts.Status = images.ImageStatusActive
|
|
opts.MemberStatus = images.ImageMemberStatusAccepted
|
|
opts.Sort = "created_at:desc"
|
|
|
|
var err error
|
|
|
|
if f.Name != "" {
|
|
opts.Name = f.Name
|
|
}
|
|
if f.Owner != "" {
|
|
opts.Owner = f.Owner
|
|
}
|
|
if len(f.Tags) > 0 {
|
|
opts.Tags = f.Tags
|
|
}
|
|
if f.Visibility != "" {
|
|
v, err := getImageVisibility(f.Visibility)
|
|
if err == nil {
|
|
opts.Visibility = *v
|
|
}
|
|
}
|
|
|
|
return &opts, err
|
|
}
|
|
|
|
func (c *RunConfig) Prepare(ctx *interpolate.Context) []error {
|
|
// If we are not given an explicit ssh_keypair_name or
|
|
// ssh_private_key_file, then create a temporary one, but only if the
|
|
// temporary_key_pair_name has not been provided and we are not using
|
|
// ssh_password.
|
|
if c.SSHKeyPairName == "" && c.TemporaryKeyPairName == "" &&
|
|
c.Comm.SSHPrivateKeyFile == "" && c.Comm.SSHPassword == "" {
|
|
|
|
c.TemporaryKeyPairName = fmt.Sprintf("packer_%s", uuid.TimeOrderedUUID())
|
|
}
|
|
|
|
if c.FloatingIPPool != "" && c.FloatingIPNetwork == "" {
|
|
c.FloatingIPNetwork = c.FloatingIPPool
|
|
}
|
|
|
|
// Validation
|
|
errs := c.Comm.Prepare(ctx)
|
|
|
|
if c.SSHKeyPairName != "" {
|
|
if c.Comm.Type == "winrm" && c.Comm.WinRMPassword == "" && c.Comm.SSHPrivateKeyFile == "" {
|
|
errs = append(errs, errors.New("A ssh_private_key_file must be provided to retrieve the winrm password when using ssh_keypair_name."))
|
|
} else if c.Comm.SSHPrivateKeyFile == "" && !c.Comm.SSHAgentAuth {
|
|
errs = append(errs, errors.New("A ssh_private_key_file must be provided or ssh_agent_auth enabled when ssh_keypair_name is specified."))
|
|
}
|
|
}
|
|
|
|
if c.SourceImage == "" && c.SourceImageName == "" && c.SourceImageFilters.Filters.Empty() {
|
|
errs = append(errs, errors.New("Either a source_image, a source_image_name, or source_image_filter must be specified"))
|
|
} else if len(c.SourceImage) > 0 && len(c.SourceImageName) > 0 {
|
|
errs = append(errs, errors.New("Only a source_image or a source_image_name can be specified, not both."))
|
|
}
|
|
|
|
if c.Flavor == "" {
|
|
errs = append(errs, errors.New("A flavor must be specified"))
|
|
}
|
|
|
|
if c.SSHIPVersion != "" && c.SSHIPVersion != "4" && c.SSHIPVersion != "6" {
|
|
errs = append(errs, errors.New("SSH IP version must be either 4 or 6"))
|
|
}
|
|
|
|
for key, value := range c.InstanceMetadata {
|
|
if len(key) > 255 {
|
|
errs = append(errs, fmt.Errorf("Instance metadata key too long (max 255 bytes): %s", key))
|
|
}
|
|
if len(value) > 255 {
|
|
errs = append(errs, fmt.Errorf("Instance metadata value too long (max 255 bytes): %s", value))
|
|
}
|
|
}
|
|
|
|
if c.UseBlockStorageVolume {
|
|
// Use Compute instance availability zone for the Block Storage volume if
|
|
// it's not provided.
|
|
if c.VolumeAvailabilityZone == "" {
|
|
c.VolumeAvailabilityZone = c.AvailabilityZone
|
|
}
|
|
|
|
// Use random name for the Block Storage volume if it's not provided.
|
|
if c.VolumeName == "" {
|
|
c.VolumeName = fmt.Sprintf("packer_%s", uuid.TimeOrderedUUID())
|
|
}
|
|
}
|
|
|
|
// if neither ID or image name is provided outside the filter, build the filter
|
|
if len(c.SourceImage) == 0 && len(c.SourceImageName) == 0 {
|
|
|
|
listOpts, filterErr := c.SourceImageFilters.Filters.Build()
|
|
|
|
if filterErr != nil {
|
|
errs = append(errs, filterErr)
|
|
}
|
|
c.sourceImageOpts = *listOpts
|
|
}
|
|
|
|
return errs
|
|
}
|
|
|
|
// Retrieve the specific ImageVisibility using the exported const from images
|
|
func getImageVisibility(visibility string) (*images.ImageVisibility, error) {
|
|
visibilities := [...]images.ImageVisibility{
|
|
images.ImageVisibilityPublic,
|
|
images.ImageVisibilityPrivate,
|
|
images.ImageVisibilityCommunity,
|
|
images.ImageVisibilityShared,
|
|
}
|
|
|
|
for _, v := range visibilities {
|
|
if string(v) == visibility {
|
|
return &v, nil
|
|
}
|
|
}
|
|
|
|
return nil, fmt.Errorf("Not a valid visibility: %s", visibility)
|
|
}
|