packer-plugin-xenserver/builder/xenserver/common/ssh.go

221 lines
5.1 KiB
Go
Raw Normal View History

package common
import (
2014-12-08 09:34:48 -06:00
"bytes"
2021-01-03 16:08:24 -06:00
"encoding/pem"
2014-12-08 09:34:48 -06:00
"fmt"
"io"
2021-01-03 16:08:24 -06:00
"io/ioutil"
2014-12-08 09:34:48 -06:00
"log"
"net"
2021-01-03 16:08:24 -06:00
"os"
2014-12-08 09:34:48 -06:00
"strings"
2021-01-03 16:08:24 -06:00
"github.com/hashicorp/packer/communicator/ssh"
"github.com/hashicorp/packer/helper/multistep"
gossh "golang.org/x/crypto/ssh"
)
func SSHAddress(state multistep.StateBag) (string, error) {
2014-12-08 09:34:48 -06:00
sshIP := state.Get("ssh_address").(string)
sshHostPort := 22
return fmt.Sprintf("%s:%d", sshIP, sshHostPort), nil
}
func SSHLocalAddress(state multistep.StateBag) (string, error) {
sshLocalPort, ok := state.Get("local_ssh_port").(uint)
if !ok {
return "", fmt.Errorf("SSH port forwarding hasn't been set up yet")
}
2014-12-08 09:34:48 -06:00
conn_str := fmt.Sprintf("%s:%d", "127.0.0.1", sshLocalPort)
return conn_str, nil
}
func SSHPort(state multistep.StateBag) (int, error) {
sshHostPort := state.Get("local_ssh_port").(uint)
return int(sshHostPort), nil
}
func CommHost(state multistep.StateBag) (string, error) {
return "127.0.0.1", nil
}
func SSHConfigFunc(config SSHConfig) func(multistep.StateBag) (*gossh.ClientConfig, error) {
return func(state multistep.StateBag) (*gossh.ClientConfig, error) {
config := state.Get("commonconfig").(CommonConfig)
auth := []gossh.AuthMethod{
gossh.Password(config.SSHPassword),
gossh.KeyboardInteractive(
ssh.PasswordKeyboardInteractive(config.SSHPassword)),
}
if config.SSHKeyPath != "" {
2021-01-03 16:08:24 -06:00
signer, err := FileSigner(config.SSHKeyPath)
if err != nil {
return nil, err
}
auth = append(auth, gossh.PublicKeys(signer))
}
return &gossh.ClientConfig{
User: config.SSHUser,
Auth: auth,
HostKeyCallback: gossh.InsecureIgnoreHostKey(),
}, nil
}
}
func doExecuteSSHCmd(cmd, target string, config *gossh.ClientConfig) (stdout string, err error) {
client, err := gossh.Dial("tcp", target, config)
2014-12-08 09:34:48 -06:00
if err != nil {
return "", err
}
2014-12-08 09:34:48 -06:00
//Create session
session, err := client.NewSession()
if err != nil {
return "", err
}
2014-12-08 09:34:48 -06:00
defer session.Close()
2014-12-08 09:34:48 -06:00
var b bytes.Buffer
session.Stdout = &b
if err := session.Run(cmd); err != nil {
return "", err
}
2014-12-08 09:34:48 -06:00
return strings.Trim(b.String(), "\n"), nil
}
func ExecuteHostSSHCmd(state multistep.StateBag, cmd string) (stdout string, err error) {
config := state.Get("commonconfig").(CommonConfig)
sshAddress, _ := SSHAddress(state)
// Setup connection config
sshConfig := &gossh.ClientConfig{
User: config.Username,
Auth: []gossh.AuthMethod{
gossh.Password(config.Password),
},
HostKeyCallback: gossh.InsecureIgnoreHostKey(),
}
return doExecuteSSHCmd(cmd, sshAddress, sshConfig)
}
func ExecuteGuestSSHCmd(state multistep.StateBag, cmd string) (stdout string, err error) {
config := state.Get("commonconfig").(CommonConfig)
localAddress, err := SSHLocalAddress(state)
if err != nil {
return
}
sshConfig, err := SSHConfigFunc(config.SSHConfig)(state)
if err != nil {
return
}
return doExecuteSSHCmd(cmd, localAddress, sshConfig)
}
2014-12-08 09:41:28 -06:00
func forward(local_conn net.Conn, config *gossh.ClientConfig, server, remote_dest string, remote_port uint) error {
defer local_conn.Close()
2014-12-08 09:34:48 -06:00
ssh_client_conn, err := gossh.Dial("tcp", server+":22", config)
if err != nil {
2014-12-08 09:41:28 -06:00
log.Printf("local ssh.Dial error: %s", err)
return err
2014-12-08 09:34:48 -06:00
}
defer ssh_client_conn.Close()
2014-12-08 09:34:48 -06:00
remote_loc := fmt.Sprintf("%s:%d", remote_dest, remote_port)
ssh_conn, err := ssh_client_conn.Dial("tcp", remote_loc)
if err != nil {
2014-12-08 09:41:28 -06:00
log.Printf("ssh.Dial error: %s", err)
return err
2014-12-08 09:34:48 -06:00
}
defer ssh_conn.Close()
txDone := make(chan struct{})
rxDone := make(chan struct{})
2014-12-08 09:34:48 -06:00
go func() {
_, err = io.Copy(ssh_conn, local_conn)
if err != nil {
2014-12-08 09:41:28 -06:00
log.Printf("io.copy failed: %v", err)
2014-12-08 09:34:48 -06:00
}
close(txDone)
2014-12-08 09:34:48 -06:00
}()
2014-12-08 09:34:48 -06:00
go func() {
_, err = io.Copy(local_conn, ssh_conn)
if err != nil {
2014-12-08 09:41:28 -06:00
log.Printf("io.copy failed: %v", err)
2014-12-08 09:34:48 -06:00
}
close(rxDone)
}()
<-txDone
<-rxDone
2014-12-08 09:41:28 -06:00
return nil
2014-12-08 09:34:48 -06:00
}
func ssh_port_forward(local_listener net.Listener, remote_port int, remote_dest, host, username, password string) error {
2014-12-08 09:34:48 -06:00
config := &gossh.ClientConfig{
User: username,
Auth: []gossh.AuthMethod{
gossh.Password(password),
},
HostKeyCallback: gossh.InsecureIgnoreHostKey(),
2014-12-08 09:34:48 -06:00
}
2014-12-08 09:34:48 -06:00
for {
local_connection, err := local_listener.Accept()
2014-12-08 09:34:48 -06:00
if err != nil {
2014-12-08 09:41:28 -06:00
log.Printf("Local accept failed: %s", err)
2014-12-08 09:34:48 -06:00
return err
}
2014-12-08 09:34:48 -06:00
// Forward to a remote port
go forward(local_connection, config, host, remote_dest, uint(remote_port))
2014-12-08 09:34:48 -06:00
}
2014-12-08 09:34:48 -06:00
return nil
}
2021-01-03 16:08:24 -06:00
// FileSigner returns an gossh.Signer for a key file.
func FileSigner(path string) (gossh.Signer, error) {
f, err := os.Open(path)
if err != nil {
return nil, err
}
defer f.Close()
keyBytes, err := ioutil.ReadAll(f)
if err != nil {
return nil, err
}
// We parse the private key on our own first so that we can
// show a nicer error if the private key has a password.
block, _ := pem.Decode(keyBytes)
if block == nil {
return nil, fmt.Errorf(
"Failed to read key '%s': no key found", path)
}
if block.Headers["Proc-Type"] == "4,ENCRYPTED" {
return nil, fmt.Errorf(
"Failed to read key '%s': password protected keys are\n"+
"not supported. Please decrypt the key prior to use.", path)
}
signer, err := gossh.ParsePrivateKey(keyBytes)
if err != nil {
return nil, fmt.Errorf("Error setting up SSH config: %s", err)
}
return signer, nil
}