206 lines
5.7 KiB
Go
206 lines
5.7 KiB
Go
package googlecompute
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/mitchellh/packer/common"
|
|
"github.com/mitchellh/packer/common/uuid"
|
|
"github.com/mitchellh/packer/packer"
|
|
)
|
|
|
|
// Config is the configuration structure for the GCE builder. It stores
|
|
// both the publicly settable state as well as the privately generated
|
|
// state of the config object.
|
|
type Config struct {
|
|
common.PackerConfig `mapstructure:",squash"`
|
|
|
|
BucketName string `mapstructure:"bucket_name"`
|
|
ClientSecretsFile string `mapstructure:"client_secrets_file"`
|
|
DiskSizeGb int64 `mapstructure:"disk_size"`
|
|
ImageName string `mapstructure:"image_name"`
|
|
ImageDescription string `mapstructure:"image_description"`
|
|
InstanceName string `mapstructure:"instance_name"`
|
|
MachineType string `mapstructure:"machine_type"`
|
|
Metadata map[string]string `mapstructure:"metadata"`
|
|
Network string `mapstructure:"network"`
|
|
Passphrase string `mapstructure:"passphrase"`
|
|
PrivateKeyFile string `mapstructure:"private_key_file"`
|
|
ProjectId string `mapstructure:"project_id"`
|
|
SourceImage string `mapstructure:"source_image"`
|
|
SourceImageProjectId string `mapstructure:"source_image_project_id"`
|
|
SSHUsername string `mapstructure:"ssh_username"`
|
|
SSHPort uint `mapstructure:"ssh_port"`
|
|
RawSSHTimeout string `mapstructure:"ssh_timeout"`
|
|
RawStateTimeout string `mapstructure:"state_timeout"`
|
|
Tags []string `mapstructure:"tags"`
|
|
Zone string `mapstructure:"zone"`
|
|
|
|
clientSecrets *clientSecrets
|
|
instanceName string
|
|
privateKeyBytes []byte
|
|
sshTimeout time.Duration
|
|
stateTimeout time.Duration
|
|
tpl *packer.ConfigTemplate
|
|
}
|
|
|
|
func NewConfig(raws ...interface{}) (*Config, []string, error) {
|
|
c := new(Config)
|
|
md, err := common.DecodeConfig(c, raws...)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
c.tpl, err = packer.NewConfigTemplate()
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
c.tpl.UserVars = c.PackerUserVars
|
|
|
|
// Prepare the errors
|
|
errs := common.CheckUnusedConfig(md)
|
|
|
|
// Set defaults.
|
|
if c.Network == "" {
|
|
c.Network = "default"
|
|
}
|
|
|
|
if c.DiskSizeGb == 0 {
|
|
c.DiskSizeGb = 10
|
|
}
|
|
|
|
if c.ImageDescription == "" {
|
|
c.ImageDescription = "Created by Packer"
|
|
}
|
|
|
|
if c.ImageName == "" {
|
|
c.ImageName = "packer-{{timestamp}}"
|
|
}
|
|
|
|
if c.InstanceName == "" {
|
|
c.InstanceName = fmt.Sprintf("packer-%s", uuid.TimeOrderedUUID())
|
|
}
|
|
|
|
if c.MachineType == "" {
|
|
c.MachineType = "n1-standard-1"
|
|
}
|
|
|
|
if c.RawSSHTimeout == "" {
|
|
c.RawSSHTimeout = "5m"
|
|
}
|
|
|
|
if c.RawStateTimeout == "" {
|
|
c.RawStateTimeout = "5m"
|
|
}
|
|
|
|
if c.SSHUsername == "" {
|
|
c.SSHUsername = "root"
|
|
}
|
|
|
|
if c.SSHPort == 0 {
|
|
c.SSHPort = 22
|
|
}
|
|
|
|
// Process Templates
|
|
templates := map[string]*string{
|
|
"bucket_name": &c.BucketName,
|
|
"client_secrets_file": &c.ClientSecretsFile,
|
|
"image_name": &c.ImageName,
|
|
"image_description": &c.ImageDescription,
|
|
"instance_name": &c.InstanceName,
|
|
"machine_type": &c.MachineType,
|
|
"network": &c.Network,
|
|
"passphrase": &c.Passphrase,
|
|
"private_key_file": &c.PrivateKeyFile,
|
|
"project_id": &c.ProjectId,
|
|
"source_image": &c.SourceImage,
|
|
"source_image_project_id": &c.SourceImageProjectId,
|
|
"ssh_username": &c.SSHUsername,
|
|
"ssh_timeout": &c.RawSSHTimeout,
|
|
"state_timeout": &c.RawStateTimeout,
|
|
"zone": &c.Zone,
|
|
}
|
|
|
|
for n, ptr := range templates {
|
|
var err error
|
|
*ptr, err = c.tpl.Process(*ptr, nil)
|
|
if err != nil {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, fmt.Errorf("Error processing %s: %s", n, err))
|
|
}
|
|
}
|
|
|
|
// Process required parameters.
|
|
if c.BucketName == "" {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, errors.New("a bucket_name must be specified"))
|
|
}
|
|
|
|
if c.ClientSecretsFile == "" {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, errors.New("a client_secrets_file must be specified"))
|
|
}
|
|
|
|
if c.PrivateKeyFile == "" {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, errors.New("a private_key_file must be specified"))
|
|
}
|
|
|
|
if c.ProjectId == "" {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, errors.New("a project_id must be specified"))
|
|
}
|
|
|
|
if c.SourceImage == "" {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, errors.New("a source_image must be specified"))
|
|
}
|
|
|
|
if c.Zone == "" {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, errors.New("a zone must be specified"))
|
|
}
|
|
|
|
// Process timeout settings.
|
|
sshTimeout, err := time.ParseDuration(c.RawSSHTimeout)
|
|
if err != nil {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, fmt.Errorf("Failed parsing ssh_timeout: %s", err))
|
|
}
|
|
c.sshTimeout = sshTimeout
|
|
|
|
stateTimeout, err := time.ParseDuration(c.RawStateTimeout)
|
|
if err != nil {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, fmt.Errorf("Failed parsing state_timeout: %s", err))
|
|
}
|
|
c.stateTimeout = stateTimeout
|
|
|
|
if c.ClientSecretsFile != "" {
|
|
// Load the client secrets file.
|
|
cs, err := loadClientSecrets(c.ClientSecretsFile)
|
|
if err != nil {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, fmt.Errorf("Failed parsing client secrets file: %s", err))
|
|
}
|
|
c.clientSecrets = cs
|
|
}
|
|
|
|
if c.PrivateKeyFile != "" {
|
|
// Load the private key.
|
|
c.privateKeyBytes, err = processPrivateKeyFile(c.PrivateKeyFile, c.Passphrase)
|
|
if err != nil {
|
|
errs = packer.MultiErrorAppend(
|
|
errs, fmt.Errorf("Failed loading private key file: %s", err))
|
|
}
|
|
}
|
|
|
|
// Check for any errors.
|
|
if errs != nil && len(errs.Errors) > 0 {
|
|
return nil, nil, errs
|
|
}
|
|
|
|
return c, nil, nil
|
|
}
|