github.com/Hashicorp/terraform@v0.11.12-beta1/builtin/provisioners/salt-masterless/resource_provisioner.go (about)

     1  // This package implements a provisioner for Terraform that executes a
     2  // saltstack state within the remote machine
     3  //
     4  // Adapted from gitub.com/hashicorp/packer/provisioner/salt-masterless
     5  
     6  package saltmasterless
     7  
     8  import (
     9  	"bytes"
    10  	"context"
    11  	"errors"
    12  	"fmt"
    13  	"io"
    14  	"os"
    15  	"path/filepath"
    16  
    17  	"github.com/hashicorp/terraform/communicator"
    18  	"github.com/hashicorp/terraform/communicator/remote"
    19  	"github.com/hashicorp/terraform/helper/schema"
    20  	"github.com/hashicorp/terraform/terraform"
    21  	linereader "github.com/mitchellh/go-linereader"
    22  )
    23  
    24  type provisionFn func(terraform.UIOutput, communicator.Communicator) error
    25  
    26  type provisioner struct {
    27  	SkipBootstrap     bool
    28  	BootstrapArgs     string
    29  	LocalStateTree    string
    30  	DisableSudo       bool
    31  	CustomState       string
    32  	MinionConfig      string
    33  	LocalPillarRoots  string
    34  	RemoteStateTree   string
    35  	RemotePillarRoots string
    36  	TempConfigDir     string
    37  	NoExitOnFailure   bool
    38  	LogLevel          string
    39  	SaltCallArgs      string
    40  	CmdArgs           string
    41  }
    42  
    43  const DefaultStateTreeDir = "/srv/salt"
    44  const DefaultPillarRootDir = "/srv/pillar"
    45  
    46  // Provisioner returns a salt-masterless provisioner
    47  func Provisioner() terraform.ResourceProvisioner {
    48  	return &schema.Provisioner{
    49  		Schema: map[string]*schema.Schema{
    50  			"local_state_tree": &schema.Schema{
    51  				Type:     schema.TypeString,
    52  				Required: true,
    53  			},
    54  			"local_pillar_roots": &schema.Schema{
    55  				Type:     schema.TypeString,
    56  				Optional: true,
    57  			},
    58  			"remote_state_tree": &schema.Schema{
    59  				Type:     schema.TypeString,
    60  				Optional: true,
    61  			},
    62  			"remote_pillar_roots": &schema.Schema{
    63  				Type:     schema.TypeString,
    64  				Optional: true,
    65  			},
    66  			"temp_config_dir": &schema.Schema{
    67  				Type:     schema.TypeString,
    68  				Optional: true,
    69  				Default:  "/tmp/salt",
    70  			},
    71  			"skip_bootstrap": &schema.Schema{
    72  				Type:     schema.TypeBool,
    73  				Optional: true,
    74  			},
    75  			"no_exit_on_failure": &schema.Schema{
    76  				Type:     schema.TypeBool,
    77  				Optional: true,
    78  			},
    79  			"bootstrap_args": &schema.Schema{
    80  				Type:     schema.TypeString,
    81  				Optional: true,
    82  			},
    83  			"disable_sudo": &schema.Schema{
    84  				Type:     schema.TypeBool,
    85  				Optional: true,
    86  			},
    87  			"custom_state": &schema.Schema{
    88  				Type:     schema.TypeString,
    89  				Optional: true,
    90  			},
    91  			"minion_config_file": &schema.Schema{
    92  				Type:     schema.TypeString,
    93  				Optional: true,
    94  			},
    95  			"cmd_args": &schema.Schema{
    96  				Type:     schema.TypeString,
    97  				Optional: true,
    98  			},
    99  			"salt_call_args": &schema.Schema{
   100  				Type:     schema.TypeString,
   101  				Optional: true,
   102  			},
   103  			"log_level": &schema.Schema{
   104  				Type:     schema.TypeString,
   105  				Optional: true,
   106  			},
   107  		},
   108  
   109  		ApplyFunc:    applyFn,
   110  		ValidateFunc: validateFn,
   111  	}
   112  }
   113  
   114  // Apply executes the file provisioner
   115  func applyFn(ctx context.Context) error {
   116  	// Decode the raw config for this provisioner
   117  	o := ctx.Value(schema.ProvOutputKey).(terraform.UIOutput)
   118  	d := ctx.Value(schema.ProvConfigDataKey).(*schema.ResourceData)
   119  	connState := ctx.Value(schema.ProvRawStateKey).(*terraform.InstanceState)
   120  
   121  	p, err := decodeConfig(d)
   122  	if err != nil {
   123  		return err
   124  	}
   125  
   126  	// Get a new communicator
   127  	comm, err := communicator.New(connState)
   128  	if err != nil {
   129  		return err
   130  	}
   131  
   132  	retryCtx, cancel := context.WithTimeout(ctx, comm.Timeout())
   133  	defer cancel()
   134  
   135  	// Wait and retry until we establish the connection
   136  	err = communicator.Retry(retryCtx, func() error {
   137  		return comm.Connect(o)
   138  	})
   139  
   140  	if err != nil {
   141  		return err
   142  	}
   143  
   144  	// Wait for the context to end and then disconnect
   145  	go func() {
   146  		<-ctx.Done()
   147  		comm.Disconnect()
   148  	}()
   149  
   150  	var src, dst string
   151  
   152  	o.Output("Provisioning with Salt...")
   153  	if !p.SkipBootstrap {
   154  		cmd := &remote.Cmd{
   155  			// Fallback on wget if curl failed for any reason (such as not being installed)
   156  			Command: fmt.Sprintf("curl -L https://bootstrap.saltstack.com -o /tmp/install_salt.sh || wget -O /tmp/install_salt.sh https://bootstrap.saltstack.com"),
   157  		}
   158  		o.Output(fmt.Sprintf("Downloading saltstack bootstrap to /tmp/install_salt.sh"))
   159  		if err = comm.Start(cmd); err != nil {
   160  			err = fmt.Errorf("Unable to download Salt: %s", err)
   161  		}
   162  
   163  		if err := cmd.Wait(); err != nil {
   164  			return err
   165  		}
   166  
   167  		outR, outW := io.Pipe()
   168  		errR, errW := io.Pipe()
   169  		go copyOutput(o, outR)
   170  		go copyOutput(o, errR)
   171  		defer outW.Close()
   172  		defer errW.Close()
   173  
   174  		cmd = &remote.Cmd{
   175  			Command: fmt.Sprintf("%s /tmp/install_salt.sh %s", p.sudo("sh"), p.BootstrapArgs),
   176  			Stdout:  outW,
   177  			Stderr:  errW,
   178  		}
   179  
   180  		o.Output(fmt.Sprintf("Installing Salt with command %s", cmd.Command))
   181  		if err := comm.Start(cmd); err != nil {
   182  			return fmt.Errorf("Unable to install Salt: %s", err)
   183  		}
   184  
   185  		if err := cmd.Wait(); err != nil {
   186  			return err
   187  		}
   188  	}
   189  
   190  	o.Output(fmt.Sprintf("Creating remote temporary directory: %s", p.TempConfigDir))
   191  	if err := p.createDir(o, comm, p.TempConfigDir); err != nil {
   192  		return fmt.Errorf("Error creating remote temporary directory: %s", err)
   193  	}
   194  
   195  	if p.MinionConfig != "" {
   196  		o.Output(fmt.Sprintf("Uploading minion config: %s", p.MinionConfig))
   197  		src = p.MinionConfig
   198  		dst = filepath.ToSlash(filepath.Join(p.TempConfigDir, "minion"))
   199  		if err = p.uploadFile(o, comm, dst, src); err != nil {
   200  			return fmt.Errorf("Error uploading local minion config file to remote: %s", err)
   201  		}
   202  
   203  		// move minion config into /etc/salt
   204  		o.Output(fmt.Sprintf("Make sure directory %s exists", "/etc/salt"))
   205  		if err := p.createDir(o, comm, "/etc/salt"); err != nil {
   206  			return fmt.Errorf("Error creating remote salt configuration directory: %s", err)
   207  		}
   208  		src = filepath.ToSlash(filepath.Join(p.TempConfigDir, "minion"))
   209  		dst = "/etc/salt/minion"
   210  		if err = p.moveFile(o, comm, dst, src); err != nil {
   211  			return fmt.Errorf("Unable to move %s/minion to /etc/salt/minion: %s", p.TempConfigDir, err)
   212  		}
   213  	}
   214  
   215  	o.Output(fmt.Sprintf("Uploading local state tree: %s", p.LocalStateTree))
   216  	src = p.LocalStateTree
   217  	dst = filepath.ToSlash(filepath.Join(p.TempConfigDir, "states"))
   218  	if err = p.uploadDir(o, comm, dst, src, []string{".git"}); err != nil {
   219  		return fmt.Errorf("Error uploading local state tree to remote: %s", err)
   220  	}
   221  
   222  	// move state tree from temporary directory
   223  	src = filepath.ToSlash(filepath.Join(p.TempConfigDir, "states"))
   224  	dst = p.RemoteStateTree
   225  	if err = p.removeDir(o, comm, dst); err != nil {
   226  		return fmt.Errorf("Unable to clear salt tree: %s", err)
   227  	}
   228  	if err = p.moveFile(o, comm, dst, src); err != nil {
   229  		return fmt.Errorf("Unable to move %s/states to %s: %s", p.TempConfigDir, dst, err)
   230  	}
   231  
   232  	if p.LocalPillarRoots != "" {
   233  		o.Output(fmt.Sprintf("Uploading local pillar roots: %s", p.LocalPillarRoots))
   234  		src = p.LocalPillarRoots
   235  		dst = filepath.ToSlash(filepath.Join(p.TempConfigDir, "pillar"))
   236  		if err = p.uploadDir(o, comm, dst, src, []string{".git"}); err != nil {
   237  			return fmt.Errorf("Error uploading local pillar roots to remote: %s", err)
   238  		}
   239  
   240  		// move pillar root from temporary directory
   241  		src = filepath.ToSlash(filepath.Join(p.TempConfigDir, "pillar"))
   242  		dst = p.RemotePillarRoots
   243  
   244  		if err = p.removeDir(o, comm, dst); err != nil {
   245  			return fmt.Errorf("Unable to clear pillar root: %s", err)
   246  		}
   247  		if err = p.moveFile(o, comm, dst, src); err != nil {
   248  			return fmt.Errorf("Unable to move %s/pillar to %s: %s", p.TempConfigDir, dst, err)
   249  		}
   250  	}
   251  
   252  	outR, outW := io.Pipe()
   253  	errR, errW := io.Pipe()
   254  	go copyOutput(o, outR)
   255  	go copyOutput(o, errR)
   256  	defer outW.Close()
   257  	defer errW.Close()
   258  
   259  	o.Output(fmt.Sprintf("Running: salt-call --local %s", p.CmdArgs))
   260  	cmd := &remote.Cmd{
   261  		Command: p.sudo(fmt.Sprintf("salt-call --local %s", p.CmdArgs)),
   262  		Stdout:  outW,
   263  		Stderr:  errW,
   264  	}
   265  	if err = comm.Start(cmd); err != nil {
   266  		err = fmt.Errorf("Error executing salt-call: %s", err)
   267  	}
   268  
   269  	if err := cmd.Wait(); err != nil {
   270  		return err
   271  	}
   272  	return nil
   273  }
   274  
   275  // Prepends sudo to supplied command if config says to
   276  func (p *provisioner) sudo(cmd string) string {
   277  	if p.DisableSudo {
   278  		return cmd
   279  	}
   280  
   281  	return "sudo " + cmd
   282  }
   283  
   284  func validateDirConfig(path string, name string, required bool) error {
   285  	if required == true && path == "" {
   286  		return fmt.Errorf("%s cannot be empty", name)
   287  	} else if required == false && path == "" {
   288  		return nil
   289  	}
   290  	info, err := os.Stat(path)
   291  	if err != nil {
   292  		return fmt.Errorf("%s: path '%s' is invalid: %s", name, path, err)
   293  	} else if !info.IsDir() {
   294  		return fmt.Errorf("%s: path '%s' must point to a directory", name, path)
   295  	}
   296  	return nil
   297  }
   298  
   299  func validateFileConfig(path string, name string, required bool) error {
   300  	if required == true && path == "" {
   301  		return fmt.Errorf("%s cannot be empty", name)
   302  	} else if required == false && path == "" {
   303  		return nil
   304  	}
   305  	info, err := os.Stat(path)
   306  	if err != nil {
   307  		return fmt.Errorf("%s: path '%s' is invalid: %s", name, path, err)
   308  	} else if info.IsDir() {
   309  		return fmt.Errorf("%s: path '%s' must point to a file", name, path)
   310  	}
   311  	return nil
   312  }
   313  
   314  func (p *provisioner) uploadFile(o terraform.UIOutput, comm communicator.Communicator, dst, src string) error {
   315  	f, err := os.Open(src)
   316  	if err != nil {
   317  		return fmt.Errorf("Error opening: %s", err)
   318  	}
   319  	defer f.Close()
   320  
   321  	if err = comm.Upload(dst, f); err != nil {
   322  		return fmt.Errorf("Error uploading %s: %s", src, err)
   323  	}
   324  	return nil
   325  }
   326  
   327  func (p *provisioner) moveFile(o terraform.UIOutput, comm communicator.Communicator, dst, src string) error {
   328  	o.Output(fmt.Sprintf("Moving %s to %s", src, dst))
   329  	cmd := &remote.Cmd{Command: fmt.Sprintf(p.sudo("mv %s %s"), src, dst)}
   330  	if err := comm.Start(cmd); err != nil {
   331  		return fmt.Errorf("Unable to move %s to %s: %s", src, dst, err)
   332  	}
   333  	if err := cmd.Wait(); err != nil {
   334  		return err
   335  	}
   336  	return nil
   337  }
   338  
   339  func (p *provisioner) createDir(o terraform.UIOutput, comm communicator.Communicator, dir string) error {
   340  	o.Output(fmt.Sprintf("Creating directory: %s", dir))
   341  	cmd := &remote.Cmd{
   342  		Command: fmt.Sprintf("mkdir -p '%s'", dir),
   343  	}
   344  	if err := comm.Start(cmd); err != nil {
   345  		return err
   346  	}
   347  
   348  	if err := cmd.Wait(); err != nil {
   349  		return err
   350  	}
   351  	return nil
   352  }
   353  
   354  func (p *provisioner) removeDir(o terraform.UIOutput, comm communicator.Communicator, dir string) error {
   355  	o.Output(fmt.Sprintf("Removing directory: %s", dir))
   356  	cmd := &remote.Cmd{
   357  		Command: fmt.Sprintf("rm -rf '%s'", dir),
   358  	}
   359  	if err := comm.Start(cmd); err != nil {
   360  		return err
   361  	}
   362  	if err := cmd.Wait(); err != nil {
   363  		return err
   364  	}
   365  	return nil
   366  }
   367  
   368  func (p *provisioner) uploadDir(o terraform.UIOutput, comm communicator.Communicator, dst, src string, ignore []string) error {
   369  	if err := p.createDir(o, comm, dst); err != nil {
   370  		return err
   371  	}
   372  
   373  	// Make sure there is a trailing "/" so that the directory isn't
   374  	// created on the other side.
   375  	if src[len(src)-1] != '/' {
   376  		src = src + "/"
   377  	}
   378  	return comm.UploadDir(dst, src)
   379  }
   380  
   381  // Validate checks if the required arguments are configured
   382  func validateFn(c *terraform.ResourceConfig) (ws []string, es []error) {
   383  	// require a salt state tree
   384  	localStateTreeTmp, ok := c.Get("local_state_tree")
   385  	var localStateTree string
   386  	if !ok {
   387  		es = append(es,
   388  			errors.New("Required local_state_tree is not set"))
   389  	} else {
   390  		localStateTree = localStateTreeTmp.(string)
   391  	}
   392  	err := validateDirConfig(localStateTree, "local_state_tree", true)
   393  	if err != nil {
   394  		es = append(es, err)
   395  	}
   396  
   397  	var localPillarRoots string
   398  	localPillarRootsTmp, ok := c.Get("local_pillar_roots")
   399  	if !ok {
   400  		localPillarRoots = ""
   401  	} else {
   402  		localPillarRoots = localPillarRootsTmp.(string)
   403  	}
   404  
   405  	err = validateDirConfig(localPillarRoots, "local_pillar_roots", false)
   406  	if err != nil {
   407  		es = append(es, err)
   408  	}
   409  
   410  	var minionConfig string
   411  	minionConfigTmp, ok := c.Get("minion_config_file")
   412  	if !ok {
   413  		minionConfig = ""
   414  	} else {
   415  		minionConfig = minionConfigTmp.(string)
   416  	}
   417  	err = validateFileConfig(minionConfig, "minion_config_file", false)
   418  	if err != nil {
   419  		es = append(es, err)
   420  	}
   421  
   422  	var remoteStateTree string
   423  	remoteStateTreeTmp, ok := c.Get("remote_state_tree")
   424  	if !ok {
   425  		remoteStateTree = ""
   426  	} else {
   427  		remoteStateTree = remoteStateTreeTmp.(string)
   428  	}
   429  
   430  	var remotePillarRoots string
   431  	remotePillarRootsTmp, ok := c.Get("remote_pillar_roots")
   432  	if !ok {
   433  		remotePillarRoots = ""
   434  	} else {
   435  		remotePillarRoots = remotePillarRootsTmp.(string)
   436  	}
   437  
   438  	if minionConfig != "" && (remoteStateTree != "" || remotePillarRoots != "") {
   439  		es = append(es,
   440  			errors.New("remote_state_tree and remote_pillar_roots only apply when minion_config_file is not used"))
   441  	}
   442  
   443  	if len(es) > 0 {
   444  		return ws, es
   445  	}
   446  
   447  	return ws, es
   448  }
   449  
   450  func decodeConfig(d *schema.ResourceData) (*provisioner, error) {
   451  	p := &provisioner{
   452  		LocalStateTree:    d.Get("local_state_tree").(string),
   453  		LogLevel:          d.Get("log_level").(string),
   454  		SaltCallArgs:      d.Get("salt_call_args").(string),
   455  		CmdArgs:           d.Get("cmd_args").(string),
   456  		MinionConfig:      d.Get("minion_config_file").(string),
   457  		CustomState:       d.Get("custom_state").(string),
   458  		DisableSudo:       d.Get("disable_sudo").(bool),
   459  		BootstrapArgs:     d.Get("bootstrap_args").(string),
   460  		NoExitOnFailure:   d.Get("no_exit_on_failure").(bool),
   461  		SkipBootstrap:     d.Get("skip_bootstrap").(bool),
   462  		TempConfigDir:     d.Get("temp_config_dir").(string),
   463  		RemotePillarRoots: d.Get("remote_pillar_roots").(string),
   464  		RemoteStateTree:   d.Get("remote_state_tree").(string),
   465  		LocalPillarRoots:  d.Get("local_pillar_roots").(string),
   466  	}
   467  
   468  	// build the command line args to pass onto salt
   469  	var cmdArgs bytes.Buffer
   470  
   471  	if p.CustomState == "" {
   472  		cmdArgs.WriteString(" state.highstate")
   473  	} else {
   474  		cmdArgs.WriteString(" state.sls ")
   475  		cmdArgs.WriteString(p.CustomState)
   476  	}
   477  
   478  	if p.MinionConfig == "" {
   479  		// pass --file-root and --pillar-root if no minion_config_file is supplied
   480  		if p.RemoteStateTree != "" {
   481  			cmdArgs.WriteString(" --file-root=")
   482  			cmdArgs.WriteString(p.RemoteStateTree)
   483  		} else {
   484  			cmdArgs.WriteString(" --file-root=")
   485  			cmdArgs.WriteString(DefaultStateTreeDir)
   486  		}
   487  		if p.RemotePillarRoots != "" {
   488  			cmdArgs.WriteString(" --pillar-root=")
   489  			cmdArgs.WriteString(p.RemotePillarRoots)
   490  		} else {
   491  			cmdArgs.WriteString(" --pillar-root=")
   492  			cmdArgs.WriteString(DefaultPillarRootDir)
   493  		}
   494  	}
   495  
   496  	if !p.NoExitOnFailure {
   497  		cmdArgs.WriteString(" --retcode-passthrough")
   498  	}
   499  
   500  	if p.LogLevel == "" {
   501  		cmdArgs.WriteString(" -l info")
   502  	} else {
   503  		cmdArgs.WriteString(" -l ")
   504  		cmdArgs.WriteString(p.LogLevel)
   505  	}
   506  
   507  	if p.SaltCallArgs != "" {
   508  		cmdArgs.WriteString(" ")
   509  		cmdArgs.WriteString(p.SaltCallArgs)
   510  	}
   511  
   512  	p.CmdArgs = cmdArgs.String()
   513  
   514  	return p, nil
   515  }
   516  
   517  func copyOutput(
   518  	o terraform.UIOutput, r io.Reader) {
   519  	lr := linereader.New(r)
   520  	for line := range lr.Ch {
   521  		o.Output(line)
   522  	}
   523  }