d72173ac1a
This reverts commit 334f399ee36e1ea1833298c1a72354af001d01aa, reversing changes made to 45a5d28bad92bef23832fdc88a4806c911c6fc52. When testing against Windows SSH the Powershell script fails to parse the newly added if statement.
547 lines
17 KiB
Go
547 lines
17 KiB
Go
//go:generate mapstructure-to-hcl2 -type Config
|
|
|
|
// This package implements a provisioner for Packer that executes powershell
|
|
// scripts within the remote machine.
|
|
package powershell
|
|
|
|
import (
|
|
"bufio"
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"log"
|
|
"os"
|
|
"path/filepath"
|
|
"sort"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/hashicorp/hcl/v2/hcldec"
|
|
"github.com/hashicorp/packer/common"
|
|
"github.com/hashicorp/packer/common/retry"
|
|
"github.com/hashicorp/packer/common/shell"
|
|
"github.com/hashicorp/packer/common/uuid"
|
|
"github.com/hashicorp/packer/helper/config"
|
|
"github.com/hashicorp/packer/packer"
|
|
"github.com/hashicorp/packer/packer/tmp"
|
|
"github.com/hashicorp/packer/provisioner"
|
|
"github.com/hashicorp/packer/template/interpolate"
|
|
)
|
|
|
|
var retryableSleep = 2 * time.Second
|
|
|
|
var psEscape = strings.NewReplacer(
|
|
"$", "`$",
|
|
"\"", "`\"",
|
|
"`", "``",
|
|
"'", "`'",
|
|
)
|
|
|
|
type Config struct {
|
|
shell.Provisioner `mapstructure:",squash"`
|
|
|
|
shell.ProvisionerRemoteSpecific `mapstructure:",squash"`
|
|
|
|
// The remote path where the file containing the environment variables
|
|
// will be uploaded to. This should be set to a writable file that is in a
|
|
// pre-existing directory.
|
|
RemoteEnvVarPath string `mapstructure:"remote_env_var_path"`
|
|
|
|
// The command used to execute the elevated script. The '{{ .Path }}'
|
|
// variable should be used to specify where the script goes, {{ .Vars }}
|
|
// can be used to inject the environment_vars into the environment.
|
|
ElevatedExecuteCommand string `mapstructure:"elevated_execute_command"`
|
|
|
|
// Whether to clean scripts up after executing the provisioner.
|
|
// Defaults to false. When true any script created by a non-elevated Powershell
|
|
// provisioner will be removed from the remote machine. Elevated scripts,
|
|
// along with the scheduled tasks, will always be removed regardless of the
|
|
// value set for `skip_clean`.
|
|
SkipClean bool `mapstructure:"skip_clean"`
|
|
|
|
// The timeout for retrying to start the process. Until this timeout is
|
|
// reached, if the provisioner can't start a process, it retries. This
|
|
// can be set high to allow for reboots.
|
|
StartRetryTimeout time.Duration `mapstructure:"start_retry_timeout"`
|
|
|
|
// This is used in the template generation to format environment variables
|
|
// inside the `ElevatedExecuteCommand` template.
|
|
ElevatedEnvVarFormat string `mapstructure:"elevated_env_var_format"`
|
|
|
|
// Instructs the communicator to run the remote script as a Windows
|
|
// scheduled task, effectively elevating the remote user by impersonating
|
|
// a logged-in user
|
|
ElevatedUser string `mapstructure:"elevated_user"`
|
|
ElevatedPassword string `mapstructure:"elevated_password"`
|
|
|
|
ExecutionPolicy ExecutionPolicy `mapstructure:"execution_policy"`
|
|
|
|
remoteCleanUpScriptPath string
|
|
|
|
// If set, sets PowerShell's [PSDebug mode](https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/set-psdebug?view=powershell-7)
|
|
// in order to make script debugging easier. For instance, setting the
|
|
// value to 1 results in adding this to the execute command:
|
|
//
|
|
// ``` powershell
|
|
// Set-PSDebug -Trace 1
|
|
// ```
|
|
DebugMode int `mapstructure:"debug_mode"`
|
|
|
|
ctx interpolate.Context
|
|
}
|
|
|
|
type Provisioner struct {
|
|
config Config
|
|
communicator packer.Communicator
|
|
generatedData map[string]interface{}
|
|
}
|
|
|
|
func (p *Provisioner) defaultExecuteCommand() string {
|
|
baseCmd := `& { if (Test-Path variable:global:ProgressPreference)` +
|
|
`{set-variable -name variable:global:ProgressPreference -value 'SilentlyContinue'};`
|
|
|
|
if p.config.DebugMode != 0 {
|
|
baseCmd += fmt.Sprintf(`Set-PsDebug -Trace %d;`, p.config.DebugMode)
|
|
}
|
|
|
|
baseCmd += `. {{.Vars}}; &'{{.Path}}'; exit $LastExitCode }`
|
|
|
|
if p.config.ExecutionPolicy == ExecutionPolicyNone {
|
|
return baseCmd
|
|
}
|
|
|
|
return fmt.Sprintf(`powershell -executionpolicy %s "%s"`, p.config.ExecutionPolicy, baseCmd)
|
|
}
|
|
|
|
func (p *Provisioner) ConfigSpec() hcldec.ObjectSpec { return p.config.FlatMapstructure().HCL2Spec() }
|
|
|
|
func (p *Provisioner) Prepare(raws ...interface{}) error {
|
|
err := config.Decode(&p.config, &config.DecodeOpts{
|
|
Interpolate: true,
|
|
InterpolateContext: &p.config.ctx,
|
|
InterpolateFilter: &interpolate.RenderFilter{
|
|
Exclude: []string{
|
|
"execute_command",
|
|
"elevated_execute_command",
|
|
},
|
|
},
|
|
DecodeHooks: append(config.DefaultDecodeHookFuncs, StringToExecutionPolicyHook),
|
|
}, raws...)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if p.config.EnvVarFormat == "" {
|
|
p.config.EnvVarFormat = `$env:%s="%s"; `
|
|
}
|
|
|
|
if p.config.ElevatedEnvVarFormat == "" {
|
|
p.config.ElevatedEnvVarFormat = `$env:%s="%s"; `
|
|
}
|
|
|
|
if p.config.ExecuteCommand == "" {
|
|
p.config.ExecuteCommand = p.defaultExecuteCommand()
|
|
}
|
|
|
|
if p.config.ElevatedExecuteCommand == "" {
|
|
p.config.ElevatedExecuteCommand = p.defaultExecuteCommand()
|
|
}
|
|
|
|
if p.config.Inline != nil && len(p.config.Inline) == 0 {
|
|
p.config.Inline = nil
|
|
}
|
|
|
|
if p.config.StartRetryTimeout == 0 {
|
|
p.config.StartRetryTimeout = 5 * time.Minute
|
|
}
|
|
|
|
if p.config.RemotePath == "" {
|
|
uuid := uuid.TimeOrderedUUID()
|
|
p.config.RemotePath = fmt.Sprintf(`c:/Windows/Temp/script-%s.ps1`, uuid)
|
|
}
|
|
|
|
if p.config.RemoteEnvVarPath == "" {
|
|
uuid := uuid.TimeOrderedUUID()
|
|
p.config.RemoteEnvVarPath = fmt.Sprintf(`c:/Windows/Temp/packer-ps-env-vars-%s.ps1`, uuid)
|
|
}
|
|
|
|
if p.config.Scripts == nil {
|
|
p.config.Scripts = make([]string, 0)
|
|
}
|
|
|
|
if p.config.Vars == nil {
|
|
p.config.Vars = make([]string, 0)
|
|
}
|
|
|
|
p.config.remoteCleanUpScriptPath = fmt.Sprintf(`c:/Windows/Temp/packer-cleanup-%s.ps1`, uuid.TimeOrderedUUID())
|
|
|
|
var errs error
|
|
if p.config.Script != "" && len(p.config.Scripts) > 0 {
|
|
errs = packer.MultiErrorAppend(errs,
|
|
errors.New("Only one of script or scripts can be specified."))
|
|
}
|
|
|
|
if p.config.ElevatedUser == "" && p.config.ElevatedPassword != "" {
|
|
errs = packer.MultiErrorAppend(errs,
|
|
errors.New("Must supply an 'elevated_user' if 'elevated_password' provided"))
|
|
}
|
|
|
|
if p.config.Script != "" {
|
|
p.config.Scripts = []string{p.config.Script}
|
|
}
|
|
|
|
if len(p.config.Scripts) == 0 && p.config.Inline == nil {
|
|
errs = packer.MultiErrorAppend(errs,
|
|
errors.New("Either a script file or inline script must be specified."))
|
|
} else if len(p.config.Scripts) > 0 && p.config.Inline != nil {
|
|
errs = packer.MultiErrorAppend(errs,
|
|
errors.New("Only a script file or an inline script can be specified, not both."))
|
|
}
|
|
|
|
for _, path := range p.config.Scripts {
|
|
if _, err := os.Stat(path); err != nil {
|
|
errs = packer.MultiErrorAppend(errs,
|
|
fmt.Errorf("Bad script '%s': %s", path, err))
|
|
}
|
|
}
|
|
|
|
// Do a check for bad environment variables, such as '=foo', 'foobar'
|
|
for _, kv := range p.config.Vars {
|
|
vs := strings.SplitN(kv, "=", 2)
|
|
if len(vs) != 2 || vs[0] == "" {
|
|
errs = packer.MultiErrorAppend(errs,
|
|
fmt.Errorf("Environment variable not in format 'key=value': %s", kv))
|
|
}
|
|
}
|
|
|
|
if p.config.ExecutionPolicy > 7 {
|
|
errs = packer.MultiErrorAppend(errs, fmt.Errorf(`Invalid execution `+
|
|
`policy provided. Please supply one of: "bypass", "allsigned",`+
|
|
` "default", "remotesigned", "restricted", "undefined", `+
|
|
`"unrestricted", "none".`))
|
|
}
|
|
|
|
if !(p.config.DebugMode >= 0 && p.config.DebugMode <= 2) {
|
|
errs = packer.MultiErrorAppend(errs, fmt.Errorf("%d is an invalid Trace level for `debug_mode`; valid values are 0, 1, and 2", p.config.DebugMode))
|
|
}
|
|
|
|
if errs != nil {
|
|
return errs
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Takes the inline scripts, concatenates them into a temporary file and
|
|
// returns a string containing the location of said file.
|
|
func extractScript(p *Provisioner) (string, error) {
|
|
temp, err := tmp.File("powershell-provisioner")
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
defer temp.Close()
|
|
writer := bufio.NewWriter(temp)
|
|
for _, command := range p.config.Inline {
|
|
log.Printf("Found command: %s", command)
|
|
if _, err := writer.WriteString(command + "\n"); err != nil {
|
|
return "", fmt.Errorf("Error preparing powershell script: %s", err)
|
|
}
|
|
}
|
|
|
|
if err := writer.Flush(); err != nil {
|
|
return "", fmt.Errorf("Error preparing powershell script: %s", err)
|
|
}
|
|
|
|
return temp.Name(), nil
|
|
}
|
|
|
|
func (p *Provisioner) Provision(ctx context.Context, ui packer.Ui, comm packer.Communicator, generatedData map[string]interface{}) error {
|
|
ui.Say(fmt.Sprintf("Provisioning with Powershell..."))
|
|
p.communicator = comm
|
|
p.generatedData = generatedData
|
|
|
|
scripts := make([]string, len(p.config.Scripts))
|
|
copy(scripts, p.config.Scripts)
|
|
|
|
if p.config.Inline != nil {
|
|
temp, err := extractScript(p)
|
|
if err != nil {
|
|
ui.Error(fmt.Sprintf("Unable to extract inline scripts into a file: %s", err))
|
|
}
|
|
scripts = append(scripts, temp)
|
|
// Remove temp script containing the inline commands when done
|
|
defer os.Remove(temp)
|
|
}
|
|
|
|
// every provisioner run will only have one env var script file so lets add it first
|
|
uploadedScripts := []string{p.config.RemoteEnvVarPath}
|
|
for _, path := range scripts {
|
|
ui.Say(fmt.Sprintf("Provisioning with powershell script: %s", path))
|
|
|
|
log.Printf("Opening %s for reading", path)
|
|
fi, err := os.Stat(path)
|
|
if err != nil {
|
|
return fmt.Errorf("Error stating powershell script: %s", err)
|
|
}
|
|
if strings.HasSuffix(p.config.RemotePath, `\`) {
|
|
// path is a directory
|
|
p.config.RemotePath += filepath.Base((fi).Name())
|
|
}
|
|
f, err := os.Open(path)
|
|
if err != nil {
|
|
return fmt.Errorf("Error opening powershell script: %s", err)
|
|
}
|
|
defer f.Close()
|
|
|
|
command, err := p.createCommandText()
|
|
if err != nil {
|
|
return fmt.Errorf("Error processing command: %s", err)
|
|
}
|
|
|
|
// Upload the file and run the command. Do this in the context of a
|
|
// single retryable function so that we don't end up with the case
|
|
// that the upload succeeded, a restart is initiated, and then the
|
|
// command is executed but the file doesn't exist any longer.
|
|
var cmd *packer.RemoteCmd
|
|
err = retry.Config{StartTimeout: p.config.StartRetryTimeout}.Run(ctx, func(ctx context.Context) error {
|
|
if _, err := f.Seek(0, 0); err != nil {
|
|
return err
|
|
}
|
|
if err := comm.Upload(p.config.RemotePath, f, &fi); err != nil {
|
|
return fmt.Errorf("Error uploading script: %s", err)
|
|
}
|
|
|
|
cmd = &packer.RemoteCmd{Command: command}
|
|
return cmd.RunWithUi(ctx, comm, ui)
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Close the original file since we copied it
|
|
f.Close()
|
|
|
|
// Record every other uploaded script file so we can clean it up later
|
|
uploadedScripts = append(uploadedScripts, p.config.RemotePath)
|
|
|
|
log.Printf("%s returned with exit code %d", p.config.RemotePath, cmd.ExitStatus())
|
|
if err := p.config.ValidExitCode(cmd.ExitStatus()); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if p.config.SkipClean {
|
|
return nil
|
|
}
|
|
|
|
err := retry.Config{StartTimeout: time.Minute, RetryDelay: func() time.Duration { return 10 * time.Second }}.Run(ctx, func(ctx context.Context) error {
|
|
command, err := p.createRemoteCleanUpCommand(uploadedScripts)
|
|
if err != nil {
|
|
log.Printf("failed to upload the remote cleanup script: %q", err)
|
|
return err
|
|
}
|
|
|
|
cmd := &packer.RemoteCmd{Command: command}
|
|
return cmd.RunWithUi(ctx, comm, ui)
|
|
})
|
|
if err != nil {
|
|
log.Printf("remote cleanup script failed to upload; skipping the removal of temporary files: %s; ", strings.Join(uploadedScripts, ","))
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// createRemoteCleanUpCommand will generated a powershell script that will remove remote files;
|
|
// returning a command that can be executed remotely to do the cleanup.
|
|
func (p *Provisioner) createRemoteCleanUpCommand(remoteFiles []string) (string, error) {
|
|
if len(remoteFiles) == 0 {
|
|
return "", fmt.Errorf("no remoteFiles provided for cleanup")
|
|
}
|
|
|
|
var b strings.Builder
|
|
// This script should self destruct.
|
|
remotePath := p.config.remoteCleanUpScriptPath
|
|
remoteFiles = append(remoteFiles, remotePath)
|
|
for _, filename := range remoteFiles {
|
|
fmt.Fprintf(&b, "if (Test-Path %[1]s) {Remove-Item %[1]s}\n", filename)
|
|
}
|
|
|
|
if err := p.communicator.Upload(remotePath, strings.NewReader(b.String()), nil); err != nil {
|
|
return "", fmt.Errorf("clean up script %q failed to upload: %s", remotePath, err)
|
|
}
|
|
|
|
data := p.generatedData
|
|
data["Path"] = remotePath
|
|
data["Vars"] = p.config.RemoteEnvVarPath
|
|
p.config.ctx.Data = data
|
|
|
|
p.config.ctx.Data = data
|
|
return interpolate.Render(p.config.ExecuteCommand, &p.config.ctx)
|
|
}
|
|
|
|
// Environment variables required within the remote environment are uploaded
|
|
// within a PS script and then enabled by 'dot sourcing' the script
|
|
// immediately prior to execution of the main command
|
|
func (p *Provisioner) prepareEnvVars(elevated bool) (err error) {
|
|
// Collate all required env vars into a plain string with required
|
|
// formatting applied
|
|
flattenedEnvVars := p.createFlattenedEnvVars(elevated)
|
|
// Create a powershell script on the target build fs containing the
|
|
// flattened env vars
|
|
err = p.uploadEnvVars(flattenedEnvVars)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return
|
|
}
|
|
|
|
func (p *Provisioner) createFlattenedEnvVars(elevated bool) (flattened string) {
|
|
flattened = ""
|
|
envVars := make(map[string]string)
|
|
|
|
// Always available Packer provided env vars
|
|
envVars["PACKER_BUILD_NAME"] = p.config.PackerBuildName
|
|
envVars["PACKER_BUILDER_TYPE"] = p.config.PackerBuilderType
|
|
|
|
// expose ip address variables
|
|
httpAddr := p.generatedData["PackerHTTPAddr"]
|
|
if httpAddr != nil && httpAddr != common.HttpAddrNotImplemented {
|
|
envVars["PACKER_HTTP_ADDR"] = httpAddr.(string)
|
|
}
|
|
httpIP := p.generatedData["PackerHTTPIP"]
|
|
if httpIP != nil && httpIP != common.HttpIPNotImplemented {
|
|
envVars["PACKER_HTTP_IP"] = httpIP.(string)
|
|
}
|
|
httpPort := p.generatedData["PackerHTTPPort"]
|
|
if httpPort != nil && httpPort != common.HttpPortNotImplemented {
|
|
envVars["PACKER_HTTP_PORT"] = httpPort.(string)
|
|
}
|
|
|
|
// interpolate environment variables
|
|
p.config.ctx.Data = p.generatedData
|
|
|
|
// Split vars into key/value components
|
|
for _, envVar := range p.config.Vars {
|
|
envVar, err := interpolate.Render(envVar, &p.config.ctx)
|
|
if err != nil {
|
|
return
|
|
}
|
|
keyValue := strings.SplitN(envVar, "=", 2)
|
|
// Escape chars special to PS in each env var value
|
|
escapedEnvVarValue := psEscape.Replace(keyValue[1])
|
|
if escapedEnvVarValue != keyValue[1] {
|
|
log.Printf("Env var %s converted to %s after escaping chars special to PS", keyValue[1],
|
|
escapedEnvVarValue)
|
|
}
|
|
envVars[keyValue[0]] = escapedEnvVarValue
|
|
}
|
|
|
|
// Create a list of env var keys in sorted order
|
|
var keys []string
|
|
for k := range envVars {
|
|
keys = append(keys, k)
|
|
}
|
|
sort.Strings(keys)
|
|
format := p.config.EnvVarFormat
|
|
if elevated {
|
|
format = p.config.ElevatedEnvVarFormat
|
|
}
|
|
|
|
// Re-assemble vars using OS specific format pattern and flatten
|
|
for _, key := range keys {
|
|
flattened += fmt.Sprintf(format, key, envVars[key])
|
|
}
|
|
return
|
|
}
|
|
|
|
func (p *Provisioner) uploadEnvVars(flattenedEnvVars string) (err error) {
|
|
ctx := context.TODO()
|
|
// Upload all env vars to a powershell script on the target build file
|
|
// system. Do this in the context of a single retryable function so that
|
|
// we gracefully handle any errors created by transient conditions such as
|
|
// a system restart
|
|
envVarReader := strings.NewReader(flattenedEnvVars)
|
|
log.Printf("Uploading env vars to %s", p.config.RemoteEnvVarPath)
|
|
err = retry.Config{StartTimeout: p.config.StartRetryTimeout}.Run(ctx, func(context.Context) error {
|
|
if err := p.communicator.Upload(p.config.RemoteEnvVarPath, envVarReader, nil); err != nil {
|
|
return fmt.Errorf("Error uploading ps script containing env vars: %s", err)
|
|
}
|
|
return err
|
|
})
|
|
return
|
|
}
|
|
|
|
func (p *Provisioner) createCommandText() (command string, err error) {
|
|
// Return the interpolated command
|
|
if p.config.ElevatedUser == "" {
|
|
return p.createCommandTextNonPrivileged()
|
|
} else {
|
|
return p.createCommandTextPrivileged()
|
|
}
|
|
}
|
|
|
|
func (p *Provisioner) createCommandTextNonPrivileged() (command string, err error) {
|
|
// Prepare everything needed to enable the required env vars within the
|
|
// remote environment
|
|
err = p.prepareEnvVars(false)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
|
|
ctxData := p.generatedData
|
|
ctxData["Path"] = p.config.RemotePath
|
|
ctxData["Vars"] = p.config.RemoteEnvVarPath
|
|
p.config.ctx.Data = ctxData
|
|
|
|
command, err = interpolate.Render(p.config.ExecuteCommand, &p.config.ctx)
|
|
|
|
if err != nil {
|
|
return "", fmt.Errorf("Error processing command: %s", err)
|
|
}
|
|
|
|
// Return the interpolated command
|
|
return command, nil
|
|
}
|
|
|
|
func (p *Provisioner) createCommandTextPrivileged() (command string, err error) {
|
|
// Prepare everything needed to enable the required env vars within the
|
|
// remote environment
|
|
err = p.prepareEnvVars(true)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
ctxData := p.generatedData
|
|
ctxData["Path"] = p.config.RemotePath
|
|
ctxData["Vars"] = p.config.RemoteEnvVarPath
|
|
p.config.ctx.Data = ctxData
|
|
|
|
command, err = interpolate.Render(p.config.ElevatedExecuteCommand, &p.config.ctx)
|
|
if err != nil {
|
|
return "", fmt.Errorf("Error processing command: %s", err)
|
|
}
|
|
|
|
command, err = provisioner.GenerateElevatedRunner(command, p)
|
|
if err != nil {
|
|
return "", fmt.Errorf("Error generating elevated runner: %s", err)
|
|
}
|
|
|
|
return command, err
|
|
}
|
|
|
|
func (p *Provisioner) Communicator() packer.Communicator {
|
|
return p.communicator
|
|
}
|
|
|
|
func (p *Provisioner) ElevatedUser() string {
|
|
return p.config.ElevatedUser
|
|
}
|
|
|
|
func (p *Provisioner) ElevatedPassword() string {
|
|
// Replace ElevatedPassword for winrm users who used this feature
|
|
p.config.ctx.Data = p.generatedData
|
|
elevatedPassword, _ := interpolate.Render(p.config.ElevatedPassword, &p.config.ctx)
|
|
|
|
return elevatedPassword
|
|
}
|