0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-07-01 19:12:59 +00:00
terraform-provider-proxmox/proxmoxtf/provider/provider.go
zoop 9fa92423b5
feat: SSH-Agent Support (#306)
* chore: add agent configuration bool

* feat: add ssh-agent authentication mechanism for linux

* chore: make sure ssh-agent auth is only executed on linux

* chore: add ssh user override

* chore: add ssh configuration block, check ssh config during VirtualEnvironmentClient creation

* fix: handle case of empty ssh config block

* chore: add ssh password auth fallback logic

* fix: remove not needed runtime

* fix linter errors & re-format

* allow ssh agent on all POSIX systems

* add `agent_socket` parameter

* update docs and examples

---------

Co-authored-by: zoop <zoop@zoop.li>
Co-authored-by: Pavel Boldyrev <627562+bpg@users.noreply.github.com>
2023-05-22 13:34:24 -04:00

99 lines
3.1 KiB
Go

/*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/.
*/
package provider
import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/bpg/terraform-provider-proxmox/proxmox"
"github.com/bpg/terraform-provider-proxmox/proxmoxtf"
)
const (
dvProviderOTP = ""
mkProviderVirtualEnvironment = "virtual_environment"
mkProviderEndpoint = "endpoint"
mkProviderInsecure = "insecure"
mkProviderOTP = "otp"
mkProviderPassword = "password"
mkProviderUsername = "username"
mkProviderSSH = "ssh"
mkProviderSSHUsername = "username"
mkProviderSSHPassword = "password"
mkProviderSSHAgent = "agent"
mkProviderSSHAgentSocket = "agent_socket"
)
// ProxmoxVirtualEnvironment returns the object for this provider.
func ProxmoxVirtualEnvironment() *schema.Provider {
return &schema.Provider{
ConfigureContextFunc: providerConfigure,
DataSourcesMap: createDatasourceMap(),
ResourcesMap: createResourceMap(),
Schema: createSchema(),
}
}
func providerConfigure(_ context.Context, d *schema.ResourceData) (interface{}, diag.Diagnostics) {
var err error
var veClient *proxmox.VirtualEnvironmentClient
// Legacy configuration, wrapped in the deprecated `virtual_environment` block
veConfigBlock := d.Get(mkProviderVirtualEnvironment).([]interface{})
if len(veConfigBlock) > 0 {
veConfig := veConfigBlock[0].(map[string]interface{})
veSSHConfig := veConfig[mkProviderSSH].(map[string]interface{})
veClient, err = proxmox.NewVirtualEnvironmentClient(
veConfig[mkProviderEndpoint].(string),
veConfig[mkProviderUsername].(string),
veConfig[mkProviderSSH].(map[string]interface{})[mkProviderSSHUsername].(string),
veConfig[mkProviderPassword].(string),
veConfig[mkProviderInsecure].(bool),
veSSHConfig[mkProviderSSHUsername].(string),
veSSHConfig[mkProviderSSHPassword].(string),
veSSHConfig[mkProviderSSHAgent].(bool),
veSSHConfig[mkProviderSSHAgentSocket].(string),
)
} else {
sshconf := map[string]interface{}{
mkProviderSSHUsername: "",
mkProviderSSHPassword: "",
mkProviderSSHAgent: false,
mkProviderSSHAgentSocket: "",
}
sshBlock, sshSet := d.GetOk(mkProviderSSH)
if sshSet {
sshconf = sshBlock.(*schema.Set).List()[0].(map[string]interface{})
}
veClient, err = proxmox.NewVirtualEnvironmentClient(
d.Get(mkProviderEndpoint).(string),
d.Get(mkProviderUsername).(string),
d.Get(mkProviderPassword).(string),
d.Get(mkProviderOTP).(string),
d.Get(mkProviderInsecure).(bool),
sshconf[mkProviderSSHUsername].(string),
sshconf[mkProviderSSHPassword].(string),
sshconf[mkProviderSSHAgent].(bool),
sshconf[mkProviderSSHAgentSocket].(string),
)
}
if err != nil {
return nil, diag.FromErr(err)
}
config := proxmoxtf.NewProviderConfiguration(veClient)
return config, nil
}