203 lines
6.2 KiB
Go
203 lines
6.2 KiB
Go
package proxmox
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"log"
|
|
"net/url"
|
|
"os"
|
|
"time"
|
|
|
|
"github.com/hashicorp/packer/common"
|
|
"github.com/hashicorp/packer/common/bootcommand"
|
|
"github.com/hashicorp/packer/common/uuid"
|
|
"github.com/hashicorp/packer/helper/communicator"
|
|
"github.com/hashicorp/packer/helper/config"
|
|
"github.com/hashicorp/packer/packer"
|
|
"github.com/hashicorp/packer/template/interpolate"
|
|
"github.com/mitchellh/mapstructure"
|
|
)
|
|
|
|
type Config struct {
|
|
common.PackerConfig `mapstructure:",squash"`
|
|
common.HTTPConfig `mapstructure:",squash"`
|
|
bootcommand.BootConfig `mapstructure:",squash"`
|
|
RawBootKeyInterval string `mapstructure:"boot_key_interval"`
|
|
BootKeyInterval time.Duration ``
|
|
Comm communicator.Config `mapstructure:",squash"`
|
|
|
|
ProxmoxURLRaw string `mapstructure:"proxmox_url"`
|
|
ProxmoxURL *url.URL
|
|
SkipCertValidation bool `mapstructure:"insecure_skip_tls_verify"`
|
|
Username string `mapstructure:"username"`
|
|
Password string `mapstructure:"password"`
|
|
Node string `mapstructure:"node"`
|
|
|
|
VMName string `mapstructure:"vm_name"`
|
|
VMID int `mapstructure:"vm_id"`
|
|
|
|
Memory int `mapstructure:"memory"`
|
|
Cores int `mapstructure:"cores"`
|
|
Sockets int `mapstructure:"sockets"`
|
|
OS string `mapstructure:"os"`
|
|
NICs []nicConfig `mapstructure:"network_adapters"`
|
|
Disks []diskConfig `mapstructure:"disks"`
|
|
ISOFile string `mapstructure:"iso_file"`
|
|
Agent string `mapstructure:"qemu_agent"`
|
|
|
|
TemplateName string `mapstructure:"template_name"`
|
|
TemplateDescription string `mapstructure:"template_description"`
|
|
UnmountISO bool `mapstructure:"unmount_iso"`
|
|
|
|
ctx interpolate.Context
|
|
}
|
|
|
|
type nicConfig struct {
|
|
Model string `mapstructure:"model"`
|
|
MACAddress string `mapstructure:"mac_address"`
|
|
Bridge string `mapstructure:"bridge"`
|
|
VLANTag string `mapstructure:"vlan_tag"`
|
|
}
|
|
type diskConfig struct {
|
|
Type string `mapstructure:"type"`
|
|
StoragePool string `mapstructure:"storage_pool"`
|
|
StoragePoolType string `mapstructure:"storage_pool_type"`
|
|
Size string `mapstructure:"disk_size"`
|
|
CacheMode string `mapstructure:"cache_mode"`
|
|
DiskFormat string `mapstructure:"format"`
|
|
}
|
|
|
|
func NewConfig(raws ...interface{}) (*Config, []string, error) {
|
|
c := new(Config)
|
|
|
|
var md mapstructure.Metadata
|
|
err := config.Decode(c, &config.DecodeOpts{
|
|
Metadata: &md,
|
|
Interpolate: true,
|
|
InterpolateContext: &c.ctx,
|
|
InterpolateFilter: &interpolate.RenderFilter{
|
|
Exclude: []string{
|
|
"boot_command",
|
|
},
|
|
},
|
|
}, raws...)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
var errs *packer.MultiError
|
|
|
|
// Defaults
|
|
if c.ProxmoxURLRaw == "" {
|
|
c.ProxmoxURLRaw = os.Getenv("PROXMOX_URL")
|
|
}
|
|
if c.Username == "" {
|
|
c.Username = os.Getenv("PROXMOX_USERNAME")
|
|
}
|
|
if c.Password == "" {
|
|
c.Password = os.Getenv("PROXMOX_PASSWORD")
|
|
}
|
|
if c.RawBootKeyInterval == "" {
|
|
c.RawBootKeyInterval = os.Getenv(common.PackerKeyEnv)
|
|
}
|
|
if c.RawBootKeyInterval == "" {
|
|
c.BootKeyInterval = common.PackerKeyDefault
|
|
} else {
|
|
if interval, err := time.ParseDuration(c.RawBootKeyInterval); err == nil {
|
|
c.BootKeyInterval = interval
|
|
} else {
|
|
errs = packer.MultiErrorAppend(errs, fmt.Errorf("Could not parse boot_key_interval: %v", err))
|
|
}
|
|
}
|
|
|
|
if c.VMName == "" {
|
|
// Default to packer-[time-ordered-uuid]
|
|
c.VMName = fmt.Sprintf("packer-%s", uuid.TimeOrderedUUID())
|
|
}
|
|
if c.Memory < 16 {
|
|
log.Printf("Memory %d is too small, using default: 512", c.Memory)
|
|
c.Memory = 512
|
|
}
|
|
if c.Cores < 1 {
|
|
log.Printf("Number of cores %d is too small, using default: 1", c.Cores)
|
|
c.Cores = 1
|
|
}
|
|
if c.Sockets < 1 {
|
|
log.Printf("Number of sockets %d is too small, using default: 1", c.Sockets)
|
|
c.Sockets = 1
|
|
}
|
|
if c.OS == "" {
|
|
log.Printf("OS not set, using default 'other'")
|
|
c.OS = "other"
|
|
}
|
|
for idx := range c.NICs {
|
|
if c.NICs[idx].Model == "" {
|
|
log.Printf("NIC %d model not set, using default 'e1000'", idx)
|
|
c.NICs[idx].Model = "e1000"
|
|
}
|
|
}
|
|
for idx := range c.Disks {
|
|
if c.Disks[idx].Type == "" {
|
|
log.Printf("Disk %d type not set, using default 'scsi'", idx)
|
|
c.Disks[idx].Type = "scsi"
|
|
}
|
|
if c.Disks[idx].Size == "" {
|
|
log.Printf("Disk %d size not set, using default '20G'", idx)
|
|
c.Disks[idx].Size = "20G"
|
|
}
|
|
if c.Disks[idx].CacheMode == "" {
|
|
log.Printf("Disk %d cache mode not set, using default 'none'", idx)
|
|
c.Disks[idx].CacheMode = "none"
|
|
}
|
|
}
|
|
// Valid values: 0 - no agent, 1 - with agent; default is 1
|
|
if c.Agent != "0" && c.Agent != "1" {
|
|
log.Printf("Agent '%s' is not valid, using default: 1", c.Agent)
|
|
c.Agent = "1"
|
|
}
|
|
|
|
errs = packer.MultiErrorAppend(errs, c.Comm.Prepare(&c.ctx)...)
|
|
errs = packer.MultiErrorAppend(errs, c.BootConfig.Prepare(&c.ctx)...)
|
|
errs = packer.MultiErrorAppend(errs, c.HTTPConfig.Prepare(&c.ctx)...)
|
|
|
|
// Required configurations that will display errors if not set
|
|
if c.Username == "" {
|
|
errs = packer.MultiErrorAppend(errs, errors.New("username must be specified"))
|
|
}
|
|
if c.Password == "" {
|
|
errs = packer.MultiErrorAppend(errs, errors.New("password must be specified"))
|
|
}
|
|
if c.ProxmoxURLRaw == "" {
|
|
errs = packer.MultiErrorAppend(errs, errors.New("proxmox_url must be specified"))
|
|
}
|
|
if c.ProxmoxURL, err = url.Parse(c.ProxmoxURLRaw); err != nil {
|
|
errs = packer.MultiErrorAppend(errs, errors.New(fmt.Sprintf("Could not parse proxmox_url: %s", err)))
|
|
}
|
|
if c.ISOFile == "" {
|
|
errs = packer.MultiErrorAppend(errs, errors.New("iso_file must be specified"))
|
|
}
|
|
if c.Node == "" {
|
|
errs = packer.MultiErrorAppend(errs, errors.New("node must be specified"))
|
|
}
|
|
for idx := range c.NICs {
|
|
if c.NICs[idx].Bridge == "" {
|
|
errs = packer.MultiErrorAppend(errs, errors.New(fmt.Sprintf("network_adapters[%d].bridge must be specified", idx)))
|
|
}
|
|
}
|
|
for idx := range c.Disks {
|
|
if c.Disks[idx].StoragePool == "" {
|
|
errs = packer.MultiErrorAppend(errs, errors.New(fmt.Sprintf("disks[%d].storage_pool must be specified", idx)))
|
|
}
|
|
if c.Disks[idx].StoragePoolType == "" {
|
|
errs = packer.MultiErrorAppend(errs, errors.New(fmt.Sprintf("disks[%d].storage_pool_type must be specified", idx)))
|
|
}
|
|
}
|
|
|
|
if errs != nil && len(errs.Errors) > 0 {
|
|
return nil, nil, errs
|
|
}
|
|
|
|
packer.LogSecretFilter.Set(c.Password)
|
|
return c, nil, nil
|
|
}
|