730 lines
20 KiB
Go
730 lines
20 KiB
Go
package googlecompute
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rand"
|
|
"crypto/rsa"
|
|
"crypto/sha1"
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"log"
|
|
"strings"
|
|
"time"
|
|
|
|
compute "google.golang.org/api/compute/v1"
|
|
"google.golang.org/api/option"
|
|
oslogin "google.golang.org/api/oslogin/v1"
|
|
|
|
"github.com/hashicorp/packer/builder/googlecompute/version"
|
|
"github.com/hashicorp/packer/packer"
|
|
"github.com/hashicorp/packer/packer-plugin-sdk/retry"
|
|
"github.com/hashicorp/packer/packer-plugin-sdk/useragent"
|
|
vaultapi "github.com/hashicorp/vault/api"
|
|
|
|
"golang.org/x/oauth2"
|
|
"golang.org/x/oauth2/google"
|
|
)
|
|
|
|
// driverGCE is a Driver implementation that actually talks to GCE.
|
|
// Create an instance using NewDriverGCE.
|
|
type driverGCE struct {
|
|
projectId string
|
|
service *compute.Service
|
|
osLoginService *oslogin.Service
|
|
ui packer.Ui
|
|
}
|
|
|
|
type GCEDriverConfig struct {
|
|
Ui packer.Ui
|
|
ProjectId string
|
|
Account *ServiceAccount
|
|
ImpersonateServiceAccountName string
|
|
VaultOauthEngineName string
|
|
}
|
|
|
|
var DriverScopes = []string{"https://www.googleapis.com/auth/compute", "https://www.googleapis.com/auth/devstorage.full_control"}
|
|
|
|
// Define a TokenSource that gets tokens from Vault
|
|
type OauthTokenSource struct {
|
|
Path string
|
|
}
|
|
|
|
func (ots OauthTokenSource) Token() (*oauth2.Token, error) {
|
|
log.Printf("Retrieving Oauth token from Vault...")
|
|
vaultConfig := vaultapi.DefaultConfig()
|
|
cli, err := vaultapi.NewClient(vaultConfig)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("%s\n", err)
|
|
}
|
|
resp, err := cli.Logical().Read(ots.Path)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error reading vault resp: %s", err)
|
|
}
|
|
if resp == nil {
|
|
return nil, fmt.Errorf("Vault Oauth Engine does not exist at the given path.")
|
|
}
|
|
token, ok := resp.Data["token"]
|
|
if !ok {
|
|
return nil, fmt.Errorf("ERROR, token was not present in response body")
|
|
}
|
|
at := token.(string)
|
|
|
|
log.Printf("Retrieved Oauth token from Vault")
|
|
return &oauth2.Token{
|
|
AccessToken: at,
|
|
Expiry: time.Now().Add(time.Minute * time.Duration(60)),
|
|
}, nil
|
|
|
|
}
|
|
|
|
func NewClientOptionGoogle(account *ServiceAccount, vaultOauth string, impersonatesa string) (option.ClientOption, error) {
|
|
var err error
|
|
|
|
var opts option.ClientOption
|
|
|
|
if vaultOauth != "" {
|
|
// Auth with Vault Oauth
|
|
log.Printf("Using Vault to generate Oauth token.")
|
|
ts := OauthTokenSource{vaultOauth}
|
|
opts = option.WithTokenSource(ts)
|
|
|
|
} else if impersonatesa != "" {
|
|
opts = option.ImpersonateCredentials(impersonatesa)
|
|
} else if account != nil && account.jwt != nil && len(account.jwt.PrivateKey) > 0 {
|
|
// Auth with AccountFile if provided
|
|
log.Printf("[INFO] Requesting Google token via account_file...")
|
|
log.Printf("[INFO] -- Email: %s", account.jwt.Email)
|
|
log.Printf("[INFO] -- Scopes: %s", DriverScopes)
|
|
log.Printf("[INFO] -- Private Key Length: %d", len(account.jwt.PrivateKey))
|
|
|
|
opts = option.WithCredentialsJSON(account.jsonKey)
|
|
} else {
|
|
log.Printf("[INFO] Requesting Google token via GCE API Default Client Token Source...")
|
|
ts, err := google.DefaultTokenSource(context.TODO(), "https://www.googleapis.com/auth/cloud-platform")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
opts = option.WithTokenSource(ts)
|
|
// The DefaultClient uses the DefaultTokenSource of the google lib.
|
|
// The DefaultTokenSource uses the "Application Default Credentials"
|
|
// It looks for credentials in the following places, preferring the first location found:
|
|
// 1. A JSON file whose path is specified by the
|
|
// GOOGLE_APPLICATION_CREDENTIALS environment variable.
|
|
// 2. A JSON file in a location known to the gcloud command-line tool.
|
|
// On Windows, this is %APPDATA%/gcloud/application_default_credentials.json.
|
|
// On other systems, $HOME/.config/gcloud/application_default_credentials.json.
|
|
// 3. On Google App Engine it uses the appengine.AccessToken function.
|
|
// 4. On Google Compute Engine and Google App Engine Managed VMs, it fetches
|
|
// credentials from the metadata server.
|
|
// (In this final case any provided scopes are ignored.)
|
|
}
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return opts, nil
|
|
}
|
|
|
|
func NewDriverGCE(config GCEDriverConfig) (Driver, error) {
|
|
opts, err := NewClientOptionGoogle(config.Account, config.VaultOauthEngineName, config.ImpersonateServiceAccountName)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
log.Printf("[INFO] Instantiating GCE client...")
|
|
service, err := compute.NewService(context.TODO(), opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
log.Printf("[INFO] Instantiating OS Login client...")
|
|
osLoginService, err := oslogin.NewService(context.TODO(), opts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Set UserAgent
|
|
service.UserAgent = useragent.String(version.GCEPluginVersion.FormattedVersion())
|
|
|
|
return &driverGCE{
|
|
projectId: config.ProjectId,
|
|
service: service,
|
|
osLoginService: osLoginService,
|
|
ui: config.Ui,
|
|
}, nil
|
|
}
|
|
|
|
func (d *driverGCE) CreateImage(name, description, family, zone, disk string, image_labels map[string]string, image_licenses []string, image_encryption_key *compute.CustomerEncryptionKey, imageStorageLocations []string) (<-chan *Image, <-chan error) {
|
|
gce_image := &compute.Image{
|
|
Description: description,
|
|
Name: name,
|
|
Family: family,
|
|
Labels: image_labels,
|
|
Licenses: image_licenses,
|
|
ImageEncryptionKey: image_encryption_key,
|
|
SourceDisk: fmt.Sprintf("%s%s/zones/%s/disks/%s", d.service.BasePath, d.projectId, zone, disk),
|
|
SourceType: "RAW",
|
|
StorageLocations: imageStorageLocations,
|
|
}
|
|
|
|
imageCh := make(chan *Image, 1)
|
|
errCh := make(chan error, 1)
|
|
op, err := d.service.Images.Insert(d.projectId, gce_image).Do()
|
|
if err != nil {
|
|
errCh <- err
|
|
} else {
|
|
go func() {
|
|
err = waitForState(errCh, "DONE", d.refreshGlobalOp(op))
|
|
if err != nil {
|
|
close(imageCh)
|
|
errCh <- err
|
|
return
|
|
}
|
|
var image *Image
|
|
image, err = d.GetImageFromProject(d.projectId, name, false)
|
|
if err != nil {
|
|
close(imageCh)
|
|
errCh <- err
|
|
return
|
|
}
|
|
imageCh <- image
|
|
close(imageCh)
|
|
}()
|
|
}
|
|
|
|
return imageCh, errCh
|
|
}
|
|
|
|
func (d *driverGCE) DeleteImage(name string) <-chan error {
|
|
errCh := make(chan error, 1)
|
|
op, err := d.service.Images.Delete(d.projectId, name).Do()
|
|
if err != nil {
|
|
errCh <- err
|
|
} else {
|
|
go waitForState(errCh, "DONE", d.refreshGlobalOp(op))
|
|
}
|
|
|
|
return errCh
|
|
}
|
|
|
|
func (d *driverGCE) DeleteInstance(zone, name string) (<-chan error, error) {
|
|
op, err := d.service.Instances.Delete(d.projectId, zone, name).Do()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
errCh := make(chan error, 1)
|
|
go waitForState(errCh, "DONE", d.refreshZoneOp(zone, op))
|
|
return errCh, nil
|
|
}
|
|
|
|
func (d *driverGCE) DeleteDisk(zone, name string) (<-chan error, error) {
|
|
op, err := d.service.Disks.Delete(d.projectId, zone, name).Do()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
errCh := make(chan error, 1)
|
|
go waitForState(errCh, "DONE", d.refreshZoneOp(zone, op))
|
|
return errCh, nil
|
|
}
|
|
func (d *driverGCE) GetImage(name string, fromFamily bool) (*Image, error) {
|
|
|
|
projects := []string{
|
|
d.projectId,
|
|
// Public projects, drawn from
|
|
// https://cloud.google.com/compute/docs/images
|
|
"centos-cloud",
|
|
"cos-cloud",
|
|
"coreos-cloud",
|
|
"debian-cloud",
|
|
"rhel-cloud",
|
|
"rhel-sap-cloud",
|
|
"suse-cloud",
|
|
"suse-sap-cloud",
|
|
"suse-byos-cloud",
|
|
"ubuntu-os-cloud",
|
|
"windows-cloud",
|
|
"windows-sql-cloud",
|
|
"gce-uefi-images",
|
|
"gce-nvme",
|
|
// misc
|
|
"google-containers",
|
|
"opensuse-cloud",
|
|
}
|
|
return d.GetImageFromProjects(projects, name, fromFamily)
|
|
}
|
|
func (d *driverGCE) GetImageFromProjects(projects []string, name string, fromFamily bool) (*Image, error) {
|
|
var errs error
|
|
for _, project := range projects {
|
|
image, err := d.GetImageFromProject(project, name, fromFamily)
|
|
if err != nil {
|
|
errs = packer.MultiErrorAppend(errs, err)
|
|
}
|
|
if image != nil {
|
|
return image, nil
|
|
}
|
|
}
|
|
|
|
return nil, fmt.Errorf(
|
|
"Could not find image, %s, in projects, %s: %s", name,
|
|
projects, errs)
|
|
}
|
|
|
|
func (d *driverGCE) GetImageFromProject(project, name string, fromFamily bool) (*Image, error) {
|
|
var (
|
|
image *compute.Image
|
|
err error
|
|
)
|
|
|
|
if fromFamily {
|
|
image, err = d.service.Images.GetFromFamily(project, name).Do()
|
|
} else {
|
|
image, err = d.service.Images.Get(project, name).Do()
|
|
}
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
} else if image == nil || image.SelfLink == "" {
|
|
return nil, fmt.Errorf("Image, %s, could not be found in project: %s", name, project)
|
|
} else {
|
|
return &Image{
|
|
GuestOsFeatures: image.GuestOsFeatures,
|
|
Licenses: image.Licenses,
|
|
Name: image.Name,
|
|
ProjectId: project,
|
|
SelfLink: image.SelfLink,
|
|
SizeGb: image.DiskSizeGb,
|
|
}, nil
|
|
}
|
|
}
|
|
|
|
func (d *driverGCE) GetInstanceMetadata(zone, name, key string) (string, error) {
|
|
instance, err := d.service.Instances.Get(d.projectId, zone, name).Do()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
for _, item := range instance.Metadata.Items {
|
|
if item.Key == key {
|
|
return *item.Value, nil
|
|
}
|
|
}
|
|
|
|
return "", fmt.Errorf("Instance metadata key, %s, not found.", key)
|
|
}
|
|
|
|
func (d *driverGCE) GetNatIP(zone, name string) (string, error) {
|
|
instance, err := d.service.Instances.Get(d.projectId, zone, name).Do()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
for _, ni := range instance.NetworkInterfaces {
|
|
if ni.AccessConfigs == nil {
|
|
continue
|
|
}
|
|
for _, ac := range ni.AccessConfigs {
|
|
if ac.NatIP != "" {
|
|
return ac.NatIP, nil
|
|
}
|
|
}
|
|
}
|
|
|
|
return "", nil
|
|
}
|
|
|
|
func (d *driverGCE) GetInternalIP(zone, name string) (string, error) {
|
|
instance, err := d.service.Instances.Get(d.projectId, zone, name).Do()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
for _, ni := range instance.NetworkInterfaces {
|
|
if ni.NetworkIP == "" {
|
|
continue
|
|
}
|
|
return ni.NetworkIP, nil
|
|
}
|
|
|
|
return "", nil
|
|
}
|
|
|
|
func (d *driverGCE) GetSerialPortOutput(zone, name string) (string, error) {
|
|
output, err := d.service.Instances.GetSerialPortOutput(d.projectId, zone, name).Do()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return output.Contents, nil
|
|
}
|
|
|
|
func (d *driverGCE) ImageExists(name string) bool {
|
|
_, err := d.GetImageFromProject(d.projectId, name, false)
|
|
// The API may return an error for reasons other than the image not
|
|
// existing, but this heuristic is sufficient for now.
|
|
return err == nil
|
|
}
|
|
|
|
func (d *driverGCE) RunInstance(c *InstanceConfig) (<-chan error, error) {
|
|
// Get the zone
|
|
d.ui.Message(fmt.Sprintf("Loading zone: %s", c.Zone))
|
|
zone, err := d.service.Zones.Get(d.projectId, c.Zone).Do()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Get the machine type
|
|
d.ui.Message(fmt.Sprintf("Loading machine type: %s", c.MachineType))
|
|
machineType, err := d.service.MachineTypes.Get(
|
|
d.projectId, zone.Name, c.MachineType).Do()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// TODO(mitchellh): deprecation warnings
|
|
|
|
networkId, subnetworkId, err := getNetworking(c)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var accessconfig *compute.AccessConfig
|
|
// Use external IP if OmitExternalIP isn't set
|
|
if !c.OmitExternalIP {
|
|
accessconfig = &compute.AccessConfig{
|
|
Name: "AccessConfig created by Packer",
|
|
Type: "ONE_TO_ONE_NAT",
|
|
}
|
|
|
|
// If given a static IP, use it
|
|
if c.Address != "" {
|
|
region_url := strings.Split(zone.Region, "/")
|
|
region := region_url[len(region_url)-1]
|
|
address, err := d.service.Addresses.Get(d.projectId, region, c.Address).Do()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
accessconfig.NatIP = address.Address
|
|
}
|
|
}
|
|
|
|
// Build up the metadata
|
|
metadata := make([]*compute.MetadataItems, len(c.Metadata))
|
|
for k, v := range c.Metadata {
|
|
vCopy := v
|
|
metadata = append(metadata, &compute.MetadataItems{
|
|
Key: k,
|
|
Value: &vCopy,
|
|
})
|
|
}
|
|
|
|
var guestAccelerators []*compute.AcceleratorConfig
|
|
if c.AcceleratorCount > 0 {
|
|
ac := &compute.AcceleratorConfig{
|
|
AcceleratorCount: c.AcceleratorCount,
|
|
AcceleratorType: c.AcceleratorType,
|
|
}
|
|
guestAccelerators = append(guestAccelerators, ac)
|
|
}
|
|
|
|
// Configure the instance's service account. If the user has set
|
|
// disable_default_service_account, then the default service account
|
|
// will not be used. If they also do not set service_account_email, then
|
|
// the instance will be created with no service account or scopes.
|
|
serviceAccount := &compute.ServiceAccount{}
|
|
if !c.DisableDefaultServiceAccount {
|
|
serviceAccount.Email = "default"
|
|
serviceAccount.Scopes = c.Scopes
|
|
}
|
|
if c.ServiceAccountEmail != "" {
|
|
serviceAccount.Email = c.ServiceAccountEmail
|
|
serviceAccount.Scopes = c.Scopes
|
|
}
|
|
|
|
// Create the instance information
|
|
instance := compute.Instance{
|
|
Description: c.Description,
|
|
Disks: []*compute.AttachedDisk{
|
|
{
|
|
Type: "PERSISTENT",
|
|
Mode: "READ_WRITE",
|
|
Kind: "compute#attachedDisk",
|
|
Boot: true,
|
|
AutoDelete: false,
|
|
InitializeParams: &compute.AttachedDiskInitializeParams{
|
|
SourceImage: c.Image.SelfLink,
|
|
DiskSizeGb: c.DiskSizeGb,
|
|
DiskType: fmt.Sprintf("zones/%s/diskTypes/%s", zone.Name, c.DiskType),
|
|
},
|
|
},
|
|
},
|
|
GuestAccelerators: guestAccelerators,
|
|
Labels: c.Labels,
|
|
MachineType: machineType.SelfLink,
|
|
Metadata: &compute.Metadata{
|
|
Items: metadata,
|
|
},
|
|
MinCpuPlatform: c.MinCpuPlatform,
|
|
Name: c.Name,
|
|
NetworkInterfaces: []*compute.NetworkInterface{
|
|
{
|
|
AccessConfigs: []*compute.AccessConfig{accessconfig},
|
|
Network: networkId,
|
|
Subnetwork: subnetworkId,
|
|
},
|
|
},
|
|
Scheduling: &compute.Scheduling{
|
|
OnHostMaintenance: c.OnHostMaintenance,
|
|
Preemptible: c.Preemptible,
|
|
},
|
|
ServiceAccounts: []*compute.ServiceAccount{
|
|
serviceAccount,
|
|
},
|
|
Tags: &compute.Tags{
|
|
Items: c.Tags,
|
|
},
|
|
}
|
|
|
|
// Shielded VMs configuration. If the user has set at least one of the
|
|
// options, the shielded VM configuration will reflect that. If they
|
|
// don't set any of the options the settings will default to the ones
|
|
// of the source compute image which is used for creating the virtual
|
|
// machine.
|
|
shieldedInstanceConfig := &compute.ShieldedInstanceConfig{
|
|
EnableSecureBoot: c.EnableSecureBoot,
|
|
EnableVtpm: c.EnableVtpm,
|
|
EnableIntegrityMonitoring: c.EnableIntegrityMonitoring,
|
|
}
|
|
shieldedUiMessage := ""
|
|
if c.EnableSecureBoot || c.EnableVtpm || c.EnableIntegrityMonitoring {
|
|
instance.ShieldedInstanceConfig = shieldedInstanceConfig
|
|
shieldedUiMessage = " Shielded VM"
|
|
}
|
|
|
|
d.ui.Message(fmt.Sprintf("Requesting%s instance creation...", shieldedUiMessage))
|
|
op, err := d.service.Instances.Insert(d.projectId, zone.Name, &instance).Do()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
errCh := make(chan error, 1)
|
|
go waitForState(errCh, "DONE", d.refreshZoneOp(zone.Name, op))
|
|
return errCh, nil
|
|
}
|
|
|
|
func (d *driverGCE) CreateOrResetWindowsPassword(instance, zone string, c *WindowsPasswordConfig) (<-chan error, error) {
|
|
|
|
errCh := make(chan error, 1)
|
|
go d.createWindowsPassword(errCh, instance, zone, c)
|
|
|
|
return errCh, nil
|
|
}
|
|
|
|
func (d *driverGCE) createWindowsPassword(errCh chan<- error, name, zone string, c *WindowsPasswordConfig) {
|
|
|
|
data, err := json.Marshal(c)
|
|
|
|
if err != nil {
|
|
errCh <- err
|
|
return
|
|
}
|
|
dCopy := string(data)
|
|
|
|
instance, err := d.service.Instances.Get(d.projectId, zone, name).Do()
|
|
if err != nil {
|
|
errCh <- err
|
|
return
|
|
}
|
|
instance.Metadata.Items = append(instance.Metadata.Items, &compute.MetadataItems{Key: "windows-keys", Value: &dCopy})
|
|
|
|
op, err := d.service.Instances.SetMetadata(d.projectId, zone, name, &compute.Metadata{
|
|
Fingerprint: instance.Metadata.Fingerprint,
|
|
Items: instance.Metadata.Items,
|
|
}).Do()
|
|
|
|
if err != nil {
|
|
errCh <- err
|
|
return
|
|
}
|
|
|
|
newErrCh := make(chan error, 1)
|
|
go waitForState(newErrCh, "DONE", d.refreshZoneOp(zone, op))
|
|
|
|
select {
|
|
case err = <-newErrCh:
|
|
case <-time.After(time.Second * 30):
|
|
err = errors.New("time out while waiting for instance to create")
|
|
}
|
|
|
|
if err != nil {
|
|
errCh <- err
|
|
return
|
|
}
|
|
|
|
timeout := time.Now().Add(time.Minute * 3)
|
|
hash := sha1.New()
|
|
random := rand.Reader
|
|
|
|
for time.Now().Before(timeout) {
|
|
if passwordResponses, err := d.getPasswordResponses(zone, name); err == nil {
|
|
for _, response := range passwordResponses {
|
|
if response.Modulus == c.Modulus {
|
|
|
|
decodedPassword, err := base64.StdEncoding.DecodeString(response.EncryptedPassword)
|
|
|
|
if err != nil {
|
|
errCh <- err
|
|
return
|
|
}
|
|
password, err := rsa.DecryptOAEP(hash, random, c.key, decodedPassword, nil)
|
|
|
|
if err != nil {
|
|
errCh <- err
|
|
return
|
|
}
|
|
|
|
c.password = string(password)
|
|
errCh <- nil
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
time.Sleep(2 * time.Second)
|
|
}
|
|
err = errors.New("Could not retrieve password. Timed out.")
|
|
|
|
errCh <- err
|
|
return
|
|
|
|
}
|
|
|
|
func (d *driverGCE) getPasswordResponses(zone, instance string) ([]windowsPasswordResponse, error) {
|
|
output, err := d.service.Instances.GetSerialPortOutput(d.projectId, zone, instance).Port(4).Do()
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
responses := strings.Split(output.Contents, "\n")
|
|
|
|
passwordResponses := make([]windowsPasswordResponse, 0, len(responses))
|
|
|
|
for _, response := range responses {
|
|
var passwordResponse windowsPasswordResponse
|
|
if err := json.Unmarshal([]byte(response), &passwordResponse); err != nil {
|
|
continue
|
|
}
|
|
|
|
passwordResponses = append(passwordResponses, passwordResponse)
|
|
}
|
|
|
|
return passwordResponses, nil
|
|
}
|
|
|
|
func (d *driverGCE) ImportOSLoginSSHKey(user, sshPublicKey string) (*oslogin.LoginProfile, error) {
|
|
parent := fmt.Sprintf("users/%s", user)
|
|
resp, err := d.osLoginService.Users.ImportSshPublicKey(parent, &oslogin.SshPublicKey{
|
|
Key: sshPublicKey,
|
|
}).Do()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return resp.LoginProfile, nil
|
|
}
|
|
|
|
func (d *driverGCE) DeleteOSLoginSSHKey(user, fingerprint string) error {
|
|
name := fmt.Sprintf("users/%s/sshPublicKeys/%s", user, fingerprint)
|
|
_, err := d.osLoginService.Users.SshPublicKeys.Delete(name).Do()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (d *driverGCE) WaitForInstance(state, zone, name string) <-chan error {
|
|
errCh := make(chan error, 1)
|
|
go waitForState(errCh, state, d.refreshInstanceState(zone, name))
|
|
return errCh
|
|
}
|
|
|
|
func (d *driverGCE) refreshInstanceState(zone, name string) stateRefreshFunc {
|
|
return func() (string, error) {
|
|
instance, err := d.service.Instances.Get(d.projectId, zone, name).Do()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return instance.Status, nil
|
|
}
|
|
}
|
|
|
|
func (d *driverGCE) refreshGlobalOp(op *compute.Operation) stateRefreshFunc {
|
|
return func() (string, error) {
|
|
newOp, err := d.service.GlobalOperations.Get(d.projectId, op.Name).Do()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// If the op is done, check for errors
|
|
err = nil
|
|
if newOp.Status == "DONE" {
|
|
if newOp.Error != nil {
|
|
for _, e := range newOp.Error.Errors {
|
|
err = packer.MultiErrorAppend(err, fmt.Errorf(e.Message))
|
|
}
|
|
}
|
|
}
|
|
|
|
return newOp.Status, err
|
|
}
|
|
}
|
|
|
|
func (d *driverGCE) refreshZoneOp(zone string, op *compute.Operation) stateRefreshFunc {
|
|
return func() (string, error) {
|
|
newOp, err := d.service.ZoneOperations.Get(d.projectId, zone, op.Name).Do()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// If the op is done, check for errors
|
|
err = nil
|
|
if newOp.Status == "DONE" {
|
|
if newOp.Error != nil {
|
|
for _, e := range newOp.Error.Errors {
|
|
err = packer.MultiErrorAppend(err, fmt.Errorf(e.Message))
|
|
}
|
|
}
|
|
}
|
|
|
|
return newOp.Status, err
|
|
}
|
|
}
|
|
|
|
// used in conjunction with waitForState.
|
|
type stateRefreshFunc func() (string, error)
|
|
|
|
// waitForState will spin in a loop forever waiting for state to
|
|
// reach a certain target.
|
|
func waitForState(errCh chan<- error, target string, refresh stateRefreshFunc) error {
|
|
ctx := context.TODO()
|
|
err := retry.Config{
|
|
RetryDelay: (&retry.Backoff{InitialBackoff: 2 * time.Second, MaxBackoff: 2 * time.Second, Multiplier: 2}).Linear,
|
|
}.Run(ctx, func(ctx context.Context) error {
|
|
state, err := refresh()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if state == target {
|
|
return nil
|
|
}
|
|
return fmt.Errorf("retrying for state %s, got %s", target, state)
|
|
})
|
|
errCh <- err
|
|
return err
|
|
}
|