122 lines
3.1 KiB
Go
122 lines
3.1 KiB
Go
package common
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"time"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
|
"github.com/mitchellh/multistep"
|
|
"github.com/mitchellh/packer/common/uuid"
|
|
"github.com/mitchellh/packer/helper/communicator"
|
|
"github.com/mitchellh/packer/packer"
|
|
)
|
|
|
|
type StepSecurityGroup struct {
|
|
CommConfig *communicator.Config
|
|
SecurityGroupIds []string
|
|
VpcId string
|
|
|
|
createdGroupId string
|
|
}
|
|
|
|
func (s *StepSecurityGroup) Run(state multistep.StateBag) multistep.StepAction {
|
|
ec2conn := state.Get("ec2").(*ec2.EC2)
|
|
ui := state.Get("ui").(packer.Ui)
|
|
|
|
if len(s.SecurityGroupIds) > 0 {
|
|
log.Printf("Using specified security groups: %v", s.SecurityGroupIds)
|
|
state.Put("securityGroupIds", s.SecurityGroupIds)
|
|
return multistep.ActionContinue
|
|
}
|
|
|
|
port := s.CommConfig.Port()
|
|
if port == 0 {
|
|
panic("port must be set to a non-zero value.")
|
|
}
|
|
|
|
// Create the group
|
|
ui.Say("Creating temporary security group for this instance...")
|
|
groupName := fmt.Sprintf("packer %s", uuid.TimeOrderedUUID())
|
|
log.Printf("Temporary group name: %s", groupName)
|
|
group := &ec2.CreateSecurityGroupInput{
|
|
GroupName: &groupName,
|
|
Description: aws.String("Temporary group for Packer"),
|
|
VpcId: &s.VpcId,
|
|
}
|
|
groupResp, err := ec2conn.CreateSecurityGroup(group)
|
|
if err != nil {
|
|
ui.Error(err.Error())
|
|
state.Put("error", err)
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
// Set the group ID so we can delete it later
|
|
s.createdGroupId = *groupResp.GroupId
|
|
|
|
// Authorize the SSH access for the security group
|
|
req := &ec2.AuthorizeSecurityGroupIngressInput{
|
|
GroupId: groupResp.GroupId,
|
|
IpProtocol: aws.String("tcp"),
|
|
FromPort: aws.Int64(int64(port)),
|
|
ToPort: aws.Int64(int64(port)),
|
|
CidrIp: aws.String("0.0.0.0/0"),
|
|
}
|
|
|
|
// We loop and retry this a few times because sometimes the security
|
|
// group isn't available immediately because AWS resources are eventaully
|
|
// consistent.
|
|
ui.Say(fmt.Sprintf(
|
|
"Authorizing access to port %d the temporary security group...",
|
|
port))
|
|
for i := 0; i < 5; i++ {
|
|
_, err = ec2conn.AuthorizeSecurityGroupIngress(req)
|
|
if err == nil {
|
|
break
|
|
}
|
|
|
|
log.Printf("Error authorizing. Will sleep and retry. %s", err)
|
|
time.Sleep((time.Duration(i) * time.Second) + 1)
|
|
}
|
|
|
|
if err != nil {
|
|
err := fmt.Errorf("Error creating temporary security group: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
// Set some state data for use in future steps
|
|
state.Put("securityGroupIds", []string{s.createdGroupId})
|
|
|
|
return multistep.ActionContinue
|
|
}
|
|
|
|
func (s *StepSecurityGroup) Cleanup(state multistep.StateBag) {
|
|
if s.createdGroupId == "" {
|
|
return
|
|
}
|
|
|
|
ec2conn := state.Get("ec2").(*ec2.EC2)
|
|
ui := state.Get("ui").(packer.Ui)
|
|
|
|
ui.Say("Deleting temporary security group...")
|
|
|
|
var err error
|
|
for i := 0; i < 5; i++ {
|
|
_, err = ec2conn.DeleteSecurityGroup(&ec2.DeleteSecurityGroupInput{GroupId: &s.createdGroupId})
|
|
if err == nil {
|
|
break
|
|
}
|
|
|
|
log.Printf("Error deleting security group: %s", err)
|
|
time.Sleep(5 * time.Second)
|
|
}
|
|
|
|
if err != nil {
|
|
ui.Error(fmt.Sprintf(
|
|
"Error cleaning up security group. Please delete the group manually: %s", s.createdGroupId))
|
|
}
|
|
}
|