| // Copyright (c) HashiCorp, Inc. |
| // SPDX-License-Identifier: MPL-2.0 |
| |
| //go:generate packer-sdc mapstructure-to-hcl2 -type Config |
| |
| // This package implements a provisioner for Packer that executes powershell |
| // scripts within the remote machine. |
| package powershell |
| |
| import ( |
| "bufio" |
| "context" |
| "errors" |
| "fmt" |
| "log" |
| "os" |
| "path/filepath" |
| "sort" |
| "strings" |
| "time" |
| |
| "github.com/hashicorp/hcl/v2/hcldec" |
| "github.com/hashicorp/packer-plugin-sdk/guestexec" |
| "github.com/hashicorp/packer-plugin-sdk/multistep/commonsteps" |
| packersdk "github.com/hashicorp/packer-plugin-sdk/packer" |
| "github.com/hashicorp/packer-plugin-sdk/retry" |
| "github.com/hashicorp/packer-plugin-sdk/shell" |
| "github.com/hashicorp/packer-plugin-sdk/template/config" |
| "github.com/hashicorp/packer-plugin-sdk/template/interpolate" |
| "github.com/hashicorp/packer-plugin-sdk/tmp" |
| "github.com/hashicorp/packer-plugin-sdk/uuid" |
| ) |
| |
| var psEscape = strings.NewReplacer( |
| "$", "`$", |
| "\"", "`\"", |
| "`", "``", |
| "'", "`'", |
| ) |
| |
| type Config struct { |
| shell.Provisioner `mapstructure:",squash"` |
| |
| shell.ProvisionerRemoteSpecific `mapstructure:",squash"` |
| |
| // The remote path where the file containing the environment variables |
| // will be uploaded to. This should be set to a writable file that is in a |
| // pre-existing directory. |
| RemoteEnvVarPath string `mapstructure:"remote_env_var_path"` |
| |
| // The command used to execute the elevated script. The '{{ .Path }}' |
| // variable should be used to specify where the script goes, {{ .Vars }} |
| // can be used to inject the environment_vars into the environment. |
| ElevatedExecuteCommand string `mapstructure:"elevated_execute_command"` |
| |
| // Whether to clean scripts up after executing the provisioner. |
| // Defaults to false. When true any script created by a non-elevated Powershell |
| // provisioner will be removed from the remote machine. Elevated scripts, |
| // along with the scheduled tasks, will always be removed regardless of the |
| // value set for `skip_clean`. |
| SkipClean bool `mapstructure:"skip_clean"` |
| |
| // The timeout for retrying to start the process. Until this timeout is |
| // reached, if the provisioner can't start a process, it retries. This |
| // can be set high to allow for reboots. |
| StartRetryTimeout time.Duration `mapstructure:"start_retry_timeout"` |
| |
| // This is used in the template generation to format environment variables |
| // inside the `ElevatedExecuteCommand` template. |
| ElevatedEnvVarFormat string `mapstructure:"elevated_env_var_format"` |
| |
| // Instructs the communicator to run the remote script as a Windows |
| // scheduled task, effectively elevating the remote user by impersonating |
| // a logged-in user |
| ElevatedUser string `mapstructure:"elevated_user"` |
| ElevatedPassword string `mapstructure:"elevated_password"` |
| |
| ExecutionPolicy ExecutionPolicy `mapstructure:"execution_policy"` |
| |
| remoteCleanUpScriptPath string |
| |
| // If set, sets PowerShell's [PSDebug mode |
| // on](https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/set-psdebug?view=powershell-7) |
| // in order to make script debugging easier. For instance, setting the value |
| // to 1 results in adding this to the execute command: |
| // |
| // ``` powershell |
| // Set-PSDebug -Trace 1 |
| // ``` |
| DebugMode int `mapstructure:"debug_mode"` |
| |
| // A duration of how long to pause after the provisioner |
| PauseAfter time.Duration `mapstructure:"pause_after"` |
| |
| // Run pwsh.exe instead of powershell.exe - latest version of powershell. |
| UsePwsh bool `mapstructure:"use_pwsh"` |
| |
| ctx interpolate.Context |
| } |
| |
| type Provisioner struct { |
| config Config |
| communicator packersdk.Communicator |
| generatedData map[string]interface{} |
| } |
| |
| func (p *Provisioner) defaultExecuteCommand() string { |
| baseCmd := `& { if (Test-Path variable:global:ProgressPreference)` + |
| `{set-variable -name variable:global:ProgressPreference -value 'SilentlyContinue'};` |
| |
| if p.config.DebugMode != 0 { |
| baseCmd += fmt.Sprintf(`Set-PsDebug -Trace %d;`, p.config.DebugMode) |
| } |
| |
| baseCmd += `. {{.Vars}}; &'{{.Path}}'; exit $LastExitCode }` |
| |
| if p.config.ExecutionPolicy == ExecutionPolicyNone { |
| return baseCmd |
| } |
| |
| if p.config.UsePwsh { |
| return fmt.Sprintf(`pwsh -executionpolicy %s -command "%s"`, p.config.ExecutionPolicy, baseCmd) |
| } else { |
| return fmt.Sprintf(`powershell -executionpolicy %s "%s"`, p.config.ExecutionPolicy, baseCmd) |
| } |
| |
| } |
| |
| func (p *Provisioner) ConfigSpec() hcldec.ObjectSpec { return p.config.FlatMapstructure().HCL2Spec() } |
| |
| func (p *Provisioner) Prepare(raws ...interface{}) error { |
| err := config.Decode(&p.config, &config.DecodeOpts{ |
| PluginType: "powershell", |
| Interpolate: true, |
| InterpolateContext: &p.config.ctx, |
| InterpolateFilter: &interpolate.RenderFilter{ |
| Exclude: []string{ |
| "execute_command", |
| "elevated_execute_command", |
| }, |
| }, |
| DecodeHooks: append(config.DefaultDecodeHookFuncs, StringToExecutionPolicyHook), |
| }, raws...) |
| |
| if err != nil { |
| return err |
| } |
| |
| if p.config.EnvVarFormat == "" { |
| p.config.EnvVarFormat = `$env:%s="%s"; ` |
| } |
| |
| if p.config.ElevatedEnvVarFormat == "" { |
| p.config.ElevatedEnvVarFormat = `$env:%s="%s"; ` |
| } |
| |
| if p.config.ExecuteCommand == "" { |
| p.config.ExecuteCommand = p.defaultExecuteCommand() |
| } |
| |
| if p.config.ElevatedExecuteCommand == "" { |
| p.config.ElevatedExecuteCommand = p.defaultExecuteCommand() |
| } |
| |
| if p.config.Inline != nil && len(p.config.Inline) == 0 { |
| p.config.Inline = nil |
| } |
| |
| if p.config.StartRetryTimeout == 0 { |
| p.config.StartRetryTimeout = 5 * time.Minute |
| } |
| |
| if p.config.RemotePath == "" { |
| uuid := uuid.TimeOrderedUUID() |
| p.config.RemotePath = fmt.Sprintf(`c:/Windows/Temp/script-%s.ps1`, uuid) |
| } |
| |
| if p.config.RemoteEnvVarPath == "" { |
| uuid := uuid.TimeOrderedUUID() |
| p.config.RemoteEnvVarPath = fmt.Sprintf(`c:/Windows/Temp/packer-ps-env-vars-%s.ps1`, uuid) |
| } |
| |
| if p.config.Scripts == nil { |
| p.config.Scripts = make([]string, 0) |
| } |
| |
| if p.config.Vars == nil { |
| p.config.Vars = make([]string, 0) |
| } |
| |
| p.config.remoteCleanUpScriptPath = fmt.Sprintf(`c:/Windows/Temp/packer-cleanup-%s.ps1`, uuid.TimeOrderedUUID()) |
| |
| var errs error |
| if p.config.Script != "" && len(p.config.Scripts) > 0 { |
| errs = packersdk.MultiErrorAppend(errs, |
| errors.New("Only one of script or scripts can be specified.")) |
| } |
| |
| if p.config.ElevatedUser == "" && p.config.ElevatedPassword != "" { |
| errs = packersdk.MultiErrorAppend(errs, |
| errors.New("Must supply an 'elevated_user' if 'elevated_password' provided")) |
| } |
| |
| if p.config.Script != "" { |
| p.config.Scripts = []string{p.config.Script} |
| } |
| |
| if len(p.config.Scripts) == 0 && p.config.Inline == nil { |
| errs = packersdk.MultiErrorAppend(errs, |
| errors.New("Either a script file or inline script must be specified.")) |
| } else if len(p.config.Scripts) > 0 && p.config.Inline != nil { |
| errs = packersdk.MultiErrorAppend(errs, |
| errors.New("Only a script file or an inline script can be specified, not both.")) |
| } |
| |
| for _, path := range p.config.Scripts { |
| if _, err := os.Stat(path); err != nil { |
| errs = packersdk.MultiErrorAppend(errs, |
| fmt.Errorf("Bad script '%s': %s", path, err)) |
| } |
| } |
| |
| // Do a check for bad environment variables, such as '=foo', 'foobar' |
| for _, kv := range p.config.Vars { |
| vs := strings.SplitN(kv, "=", 2) |
| if len(vs) != 2 || vs[0] == "" { |
| errs = packersdk.MultiErrorAppend(errs, |
| fmt.Errorf("Environment variable not in format 'key=value': %s", kv)) |
| } |
| } |
| |
| if p.config.ExecutionPolicy > 7 { |
| errs = packersdk.MultiErrorAppend(errs, fmt.Errorf(`Invalid execution `+ |
| `policy provided. Please supply one of: "bypass", "allsigned",`+ |
| ` "default", "remotesigned", "restricted", "undefined", `+ |
| `"unrestricted", "none".`)) |
| } |
| |
| if !(p.config.DebugMode >= 0 && p.config.DebugMode <= 2) { |
| errs = packersdk.MultiErrorAppend(errs, fmt.Errorf("%d is an invalid Trace level for `debug_mode`; valid values are 0, 1, and 2", p.config.DebugMode)) |
| } |
| |
| if errs != nil { |
| return errs |
| } |
| |
| return nil |
| } |
| |
| // Takes the inline scripts, concatenates them into a temporary file and |
| // returns a string containing the location of said file. |
| func extractScript(p *Provisioner) (string, error) { |
| temp, err := tmp.File("powershell-provisioner") |
| if err != nil { |
| return "", err |
| } |
| defer temp.Close() |
| writer := bufio.NewWriter(temp) |
| for _, command := range p.config.Inline { |
| log.Printf("Found command: %s", command) |
| if _, err := writer.WriteString(command + "\n"); err != nil { |
| return "", fmt.Errorf("Error preparing powershell script: %s", err) |
| } |
| } |
| |
| if err := writer.Flush(); err != nil { |
| return "", fmt.Errorf("Error preparing powershell script: %s", err) |
| } |
| |
| return temp.Name(), nil |
| } |
| |
| func (p *Provisioner) Provision(ctx context.Context, ui packersdk.Ui, comm packersdk.Communicator, generatedData map[string]interface{}) error { |
| ui.Say("Provisioning with Powershell...") |
| p.communicator = comm |
| p.generatedData = generatedData |
| |
| scripts := make([]string, len(p.config.Scripts)) |
| copy(scripts, p.config.Scripts) |
| |
| if p.config.Inline != nil { |
| temp, err := extractScript(p) |
| if err != nil { |
| ui.Error(fmt.Sprintf("Unable to extract inline scripts into a file: %s", err)) |
| } |
| scripts = append(scripts, temp) |
| // Remove temp script containing the inline commands when done |
| defer os.Remove(temp) |
| } |
| |
| // every provisioner run will only have one env var script file so lets add it first |
| uploadedScripts := []string{p.config.RemoteEnvVarPath} |
| for _, path := range scripts { |
| ui.Say(fmt.Sprintf("Provisioning with powershell script: %s", path)) |
| |
| log.Printf("Opening %s for reading", path) |
| fi, err := os.Stat(path) |
| if err != nil { |
| return fmt.Errorf("Error stating powershell script: %s", err) |
| } |
| if os.IsPathSeparator(p.config.RemotePath[len(p.config.RemotePath)-1]) { |
| // path is a directory |
| p.config.RemotePath += filepath.Base(fi.Name()) |
| } |
| f, err := os.Open(path) |
| if err != nil { |
| return fmt.Errorf("Error opening powershell script: %s", err) |
| } |
| defer f.Close() |
| |
| command, err := p.createCommandText() |
| if err != nil { |
| return fmt.Errorf("Error processing command: %s", err) |
| } |
| |
| // Upload the file and run the command. Do this in the context of a |
| // single retryable function so that we don't end up with the case |
| // that the upload succeeded, a restart is initiated, and then the |
| // command is executed but the file doesn't exist any longer. |
| var cmd *packersdk.RemoteCmd |
| err = retry.Config{StartTimeout: p.config.StartRetryTimeout}.Run(ctx, func(ctx context.Context) error { |
| if _, err := f.Seek(0, 0); err != nil { |
| return err |
| } |
| if err := comm.Upload(p.config.RemotePath, f, &fi); err != nil { |
| return fmt.Errorf("Error uploading script: %s", err) |
| } |
| |
| cmd = &packersdk.RemoteCmd{Command: command} |
| return cmd.RunWithUi(ctx, comm, ui) |
| }) |
| if err != nil { |
| return err |
| } |
| |
| // Close the original file since we copied it |
| f.Close() |
| |
| // Record every other uploaded script file so we can clean it up later |
| uploadedScripts = append(uploadedScripts, p.config.RemotePath) |
| |
| log.Printf("%s returned with exit code %d", p.config.RemotePath, cmd.ExitStatus()) |
| if err := p.config.ValidExitCode(cmd.ExitStatus()); err != nil { |
| return err |
| } |
| } |
| |
| if p.config.SkipClean { |
| return nil |
| } |
| |
| err := retry.Config{StartTimeout: time.Minute, RetryDelay: func() time.Duration { return 10 * time.Second }}.Run(ctx, func(ctx context.Context) error { |
| command, err := p.createRemoteCleanUpCommand(uploadedScripts) |
| if err != nil { |
| log.Printf("failed to upload the remote cleanup script: %q", err) |
| return err |
| } |
| |
| cmd := &packersdk.RemoteCmd{Command: command} |
| return cmd.RunWithUi(ctx, comm, ui) |
| }) |
| if err != nil { |
| log.Printf("remote cleanup script failed to upload; skipping the removal of temporary files: %s; ", strings.Join(uploadedScripts, ",")) |
| } |
| |
| if p.config.PauseAfter != 0 { |
| ui.Say(fmt.Sprintf("Pausing %s after this provisioner...", p.config.PauseAfter)) |
| time.Sleep(p.config.PauseAfter) |
| } |
| |
| return nil |
| } |
| |
| // createRemoteCleanUpCommand will generated a powershell script that will remove remote files; |
| // returning a command that can be executed remotely to do the cleanup. |
| func (p *Provisioner) createRemoteCleanUpCommand(remoteFiles []string) (string, error) { |
| if len(remoteFiles) == 0 { |
| return "", fmt.Errorf("no remoteFiles provided for cleanup") |
| } |
| |
| var b strings.Builder |
| // This script should self destruct. |
| remotePath := p.config.remoteCleanUpScriptPath |
| remoteFiles = append(remoteFiles, remotePath) |
| for _, filename := range remoteFiles { |
| fmt.Fprintf(&b, "if (Test-Path %[1]s) {Remove-Item %[1]s}\n", filename) |
| } |
| |
| if err := p.communicator.Upload(remotePath, strings.NewReader(b.String()), nil); err != nil { |
| return "", fmt.Errorf("clean up script %q failed to upload: %s", remotePath, err) |
| } |
| |
| data := p.generatedData |
| data["Path"] = remotePath |
| data["Vars"] = p.config.RemoteEnvVarPath |
| p.config.ctx.Data = data |
| |
| p.config.ctx.Data = data |
| return interpolate.Render(p.config.ExecuteCommand, &p.config.ctx) |
| } |
| |
| // Environment variables required within the remote environment are uploaded |
| // within a PS script and then enabled by 'dot sourcing' the script |
| // immediately prior to execution of the main command |
| func (p *Provisioner) prepareEnvVars(elevated bool) (err error) { |
| // Collate all required env vars into a plain string with required |
| // formatting applied |
| flattenedEnvVars := p.createFlattenedEnvVars(elevated) |
| // Create a powershell script on the target build fs containing the |
| // flattened env vars |
| err = p.uploadEnvVars(flattenedEnvVars) |
| if err != nil { |
| return err |
| } |
| return |
| } |
| |
| func (p *Provisioner) createFlattenedEnvVars(elevated bool) (flattened string) { |
| flattened = "" |
| envVars := make(map[string]string) |
| |
| // Always available Packer provided env vars |
| envVars["PACKER_BUILD_NAME"] = p.config.PackerBuildName |
| envVars["PACKER_BUILDER_TYPE"] = p.config.PackerBuilderType |
| |
| // expose ip address variables |
| httpAddr := p.generatedData["PackerHTTPAddr"] |
| if httpAddr != nil && httpAddr != commonsteps.HttpAddrNotImplemented { |
| envVars["PACKER_HTTP_ADDR"] = httpAddr.(string) |
| } |
| httpIP := p.generatedData["PackerHTTPIP"] |
| if httpIP != nil && httpIP != commonsteps.HttpIPNotImplemented { |
| envVars["PACKER_HTTP_IP"] = httpIP.(string) |
| } |
| httpPort := p.generatedData["PackerHTTPPort"] |
| if httpPort != nil && httpPort != commonsteps.HttpPortNotImplemented { |
| envVars["PACKER_HTTP_PORT"] = httpPort.(string) |
| } |
| |
| // interpolate environment variables |
| p.config.ctx.Data = p.generatedData |
| |
| // Split vars into key/value components |
| for _, envVar := range p.config.Vars { |
| envVar, err := interpolate.Render(envVar, &p.config.ctx) |
| if err != nil { |
| return |
| } |
| keyValue := strings.SplitN(envVar, "=", 2) |
| // Escape chars special to PS in each env var value |
| escapedEnvVarValue := psEscape.Replace(keyValue[1]) |
| if escapedEnvVarValue != keyValue[1] { |
| log.Printf("Env var %s converted to %s after escaping chars special to PS", keyValue[1], |
| escapedEnvVarValue) |
| } |
| envVars[keyValue[0]] = escapedEnvVarValue |
| } |
| |
| for k, v := range p.config.Env { |
| envVarName, err := interpolate.Render(k, &p.config.ctx) |
| if err != nil { |
| return |
| } |
| envVarValue, err := interpolate.Render(v, &p.config.ctx) |
| if err != nil { |
| return |
| } |
| envVars[envVarName] = psEscape.Replace(envVarValue) |
| } |
| |
| // Create a list of env var keys in sorted order |
| var keys []string |
| for k := range envVars { |
| keys = append(keys, k) |
| } |
| sort.Strings(keys) |
| format := p.config.EnvVarFormat |
| if elevated { |
| format = p.config.ElevatedEnvVarFormat |
| } |
| |
| // Re-assemble vars using OS specific format pattern and flatten |
| for _, key := range keys { |
| flattened += fmt.Sprintf(format, key, envVars[key]) |
| } |
| return |
| } |
| |
| func (p *Provisioner) uploadEnvVars(flattenedEnvVars string) (err error) { |
| ctx := context.TODO() |
| // Upload all env vars to a powershell script on the target build file |
| // system. Do this in the context of a single retryable function so that |
| // we gracefully handle any errors created by transient conditions such as |
| // a system restart |
| envVarReader := strings.NewReader(flattenedEnvVars) |
| log.Printf("Uploading env vars to %s", p.config.RemoteEnvVarPath) |
| err = retry.Config{StartTimeout: p.config.StartRetryTimeout}.Run(ctx, func(context.Context) error { |
| if err := p.communicator.Upload(p.config.RemoteEnvVarPath, envVarReader, nil); err != nil { |
| return fmt.Errorf("Error uploading ps script containing env vars: %s", err) |
| } |
| return err |
| }) |
| return |
| } |
| |
| func (p *Provisioner) createCommandText() (command string, err error) { |
| // Return the interpolated command |
| if p.config.ElevatedUser == "" { |
| return p.createCommandTextNonPrivileged() |
| } else { |
| return p.createCommandTextPrivileged() |
| } |
| } |
| |
| func (p *Provisioner) createCommandTextNonPrivileged() (command string, err error) { |
| // Prepare everything needed to enable the required env vars within the |
| // remote environment |
| err = p.prepareEnvVars(false) |
| if err != nil { |
| return "", err |
| } |
| |
| ctxData := p.generatedData |
| ctxData["Path"] = p.config.RemotePath |
| ctxData["Vars"] = p.config.RemoteEnvVarPath |
| p.config.ctx.Data = ctxData |
| |
| command, err = interpolate.Render(p.config.ExecuteCommand, &p.config.ctx) |
| |
| if err != nil { |
| return "", fmt.Errorf("Error processing command: %s", err) |
| } |
| |
| // Return the interpolated command |
| return command, nil |
| } |
| |
| func (p *Provisioner) createCommandTextPrivileged() (command string, err error) { |
| // Prepare everything needed to enable the required env vars within the |
| // remote environment |
| err = p.prepareEnvVars(true) |
| if err != nil { |
| return "", err |
| } |
| ctxData := p.generatedData |
| ctxData["Path"] = p.config.RemotePath |
| ctxData["Vars"] = p.config.RemoteEnvVarPath |
| p.config.ctx.Data = ctxData |
| |
| command, err = interpolate.Render(p.config.ElevatedExecuteCommand, &p.config.ctx) |
| if err != nil { |
| return "", fmt.Errorf("Error processing command: %s", err) |
| } |
| |
| command, err = guestexec.GenerateElevatedRunner(command, p) |
| if err != nil { |
| return "", fmt.Errorf("Error generating elevated runner: %s", err) |
| } |
| |
| return command, err |
| } |
| |
| func (p *Provisioner) Communicator() packersdk.Communicator { |
| return p.communicator |
| } |
| |
| func (p *Provisioner) ElevatedUser() string { |
| return p.config.ElevatedUser |
| } |
| |
| func (p *Provisioner) ElevatedPassword() string { |
| // Replace ElevatedPassword for winrm users who used this feature |
| p.config.ctx.Data = p.generatedData |
| elevatedPassword, _ := interpolate.Render(p.config.ElevatedPassword, &p.config.ctx) |
| |
| return elevatedPassword |
| } |