[A recent breaking change upstream in Golang's crypto
library](e4e2799dd7
)
has broken SSH connectivity for a few builders:
```
==> qemu: Waiting for SSH to become available...
2017/05/20 16:23:58 ui: ==> qemu: Waiting for SSH to become available...
2017/05/20 16:23:58 packer: 2017/05/20 16:23:58 [INFO] Attempting SSH connection...
2017/05/20 16:23:58 packer: 2017/05/20 16:23:58 reconnecting to TCP connection for SSH
2017/05/20 16:23:58 packer: 2017/05/20 16:23:58 handshaking with SSH
2017/05/20 16:23:58 packer: 2017/05/20 16:23:58 handshake error: ssh: must specify HostKeyCallback
2017/05/20 16:23:58 packer: 2017/05/20 16:23:58 [DEBUG] SSH handshake err: ssh: must specify HostKeyCallback
2017/05/20 16:24:05 packer: 2017/05/20 16:24:05 [INFO] Attempting SSH connection...
2017/05/20 16:24:05 packer: 2017/05/20 16:24:05 reconnecting to TCP connection for SSH
2017/05/20 16:24:05 packer: 2017/05/20 16:24:05 handshaking with SSH
2017/05/20 16:24:05 packer: 2017/05/20 16:24:05 handshake error: ssh: must specify HostKeyCallback
2017/05/20 16:24:05 packer: 2017/05/20 16:24:05 [DEBUG] SSH handshake err: ssh: must specify HostKeyCallback
```
Specifying HostKeyCallback as insecure should make things work again
and would make sense for packer's use case.
43 lines
1.0 KiB
Go
43 lines
1.0 KiB
Go
package qemu
|
|
|
|
import (
|
|
commonssh "github.com/hashicorp/packer/common/ssh"
|
|
"github.com/hashicorp/packer/communicator/ssh"
|
|
"github.com/mitchellh/multistep"
|
|
gossh "golang.org/x/crypto/ssh"
|
|
)
|
|
|
|
func commHost(state multistep.StateBag) (string, error) {
|
|
return "127.0.0.1", nil
|
|
}
|
|
|
|
func commPort(state multistep.StateBag) (int, error) {
|
|
sshHostPort := state.Get("sshHostPort").(uint)
|
|
return int(sshHostPort), nil
|
|
}
|
|
|
|
func sshConfig(state multistep.StateBag) (*gossh.ClientConfig, error) {
|
|
config := state.Get("config").(*Config)
|
|
|
|
auth := []gossh.AuthMethod{
|
|
gossh.Password(config.Comm.SSHPassword),
|
|
gossh.KeyboardInteractive(
|
|
ssh.PasswordKeyboardInteractive(config.Comm.SSHPassword)),
|
|
}
|
|
|
|
if config.Comm.SSHPrivateKey != "" {
|
|
signer, err := commonssh.FileSigner(config.Comm.SSHPrivateKey)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
auth = append(auth, gossh.PublicKeys(signer))
|
|
}
|
|
|
|
return &gossh.ClientConfig{
|
|
User: config.Comm.SSHUsername,
|
|
Auth: auth,
|
|
HostKeyCallback: gossh.InsecureIgnoreHostKey(),
|
|
}, nil
|
|
}
|