2013-07-15 02:02:18 -04:00
|
|
|
package ebs
|
2013-05-21 03:55:32 -04:00
|
|
|
|
|
|
|
import (
|
2018-01-22 18:32:33 -05:00
|
|
|
"context"
|
2013-05-27 18:15:42 -04:00
|
|
|
"fmt"
|
2018-05-03 15:27:09 -04:00
|
|
|
"log"
|
2020-07-14 19:47:00 -04:00
|
|
|
"time"
|
2015-04-05 17:58:48 -04:00
|
|
|
|
2019-04-17 15:55:30 -04:00
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
2020-07-14 19:47:00 -04:00
|
|
|
"github.com/aws/aws-sdk-go/aws/awserr"
|
2015-06-03 17:13:52 -04:00
|
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
2017-04-04 16:39:01 -04:00
|
|
|
awscommon "github.com/hashicorp/packer/builder/amazon/common"
|
2018-09-03 09:01:14 -04:00
|
|
|
"github.com/hashicorp/packer/common/random"
|
2020-07-14 19:47:00 -04:00
|
|
|
"github.com/hashicorp/packer/common/retry"
|
2018-01-19 19:18:44 -05:00
|
|
|
"github.com/hashicorp/packer/helper/multistep"
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/packer"
|
2013-05-21 03:55:32 -04:00
|
|
|
)
|
|
|
|
|
2014-05-19 12:40:39 -04:00
|
|
|
type stepCreateAMI struct {
|
2019-06-17 17:39:11 -04:00
|
|
|
image *ec2.Image
|
|
|
|
AMISkipBuildRegion bool
|
2014-05-19 12:40:39 -04:00
|
|
|
}
|
2013-05-21 03:55:32 -04:00
|
|
|
|
2018-06-01 19:17:30 -04:00
|
|
|
func (s *stepCreateAMI) Run(ctx context.Context, state multistep.StateBag) multistep.StepAction {
|
2018-09-18 09:50:37 -04:00
|
|
|
config := state.Get("config").(*Config)
|
2013-08-31 16:00:43 -04:00
|
|
|
ec2conn := state.Get("ec2").(*ec2.EC2)
|
|
|
|
instance := state.Get("instance").(*ec2.Instance)
|
|
|
|
ui := state.Get("ui").(packer.Ui)
|
2013-05-21 03:55:32 -04:00
|
|
|
|
|
|
|
// Create the image
|
2018-09-03 09:01:14 -04:00
|
|
|
amiName := config.AMIName
|
2019-07-12 17:59:11 -04:00
|
|
|
state.Put("intermediary_image", false)
|
2019-08-22 17:04:26 -04:00
|
|
|
if config.AMIEncryptBootVolume.True() || s.AMISkipBuildRegion {
|
2019-07-12 17:59:11 -04:00
|
|
|
state.Put("intermediary_image", true)
|
|
|
|
|
|
|
|
// From AWS SDK docs: You can encrypt a copy of an unencrypted snapshot,
|
|
|
|
// but you cannot use it to create an unencrypted copy of an encrypted
|
|
|
|
// snapshot. Your default CMK for EBS is used unless you specify a
|
|
|
|
// non-default key using KmsKeyId.
|
|
|
|
|
|
|
|
// If encrypt_boot is nil or true, we need to create a temporary image
|
|
|
|
// so that in step_region_copy, we can copy it with the correct
|
|
|
|
// encryption
|
2018-09-03 09:01:14 -04:00
|
|
|
amiName = random.AlphaNum(7)
|
|
|
|
}
|
|
|
|
|
2018-11-26 05:33:44 -05:00
|
|
|
ui.Say(fmt.Sprintf("Creating AMI %s from instance %s", amiName, *instance.InstanceId))
|
2015-04-05 17:58:48 -04:00
|
|
|
createOpts := &ec2.CreateImageInput{
|
2015-08-17 20:44:01 -04:00
|
|
|
InstanceId: instance.InstanceId,
|
2018-09-03 09:01:14 -04:00
|
|
|
Name: &amiName,
|
2019-06-18 06:44:24 -04:00
|
|
|
BlockDeviceMappings: config.AMIMappings.BuildEC2BlockDeviceMappings(),
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|
|
|
|
|
2020-07-14 19:47:00 -04:00
|
|
|
var createResp *ec2.CreateImageOutput
|
|
|
|
var err error
|
|
|
|
|
|
|
|
err = retry.Config{
|
|
|
|
Tries: 11,
|
|
|
|
ShouldRetry: func(err error) bool {
|
|
|
|
if err, ok := err.(awserr.Error); ok {
|
|
|
|
return err.Code() == "InvalidParameterValue"
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
},
|
|
|
|
RetryDelay: (&retry.Backoff{InitialBackoff: 200 * time.Millisecond, MaxBackoff: 30 * time.Second, Multiplier: 2}).Linear,
|
|
|
|
}.Run(ctx, func(ctx context.Context) error {
|
|
|
|
createResp, err = ec2conn.CreateImage(createOpts)
|
|
|
|
return err
|
|
|
|
})
|
2013-05-21 03:55:32 -04:00
|
|
|
if err != nil {
|
2013-06-19 23:54:02 -04:00
|
|
|
err := fmt.Errorf("Error creating AMI: %s", err)
|
2013-08-31 16:00:43 -04:00
|
|
|
state.Put("error", err)
|
2013-05-21 03:55:32 -04:00
|
|
|
ui.Error(err.Error())
|
2013-06-04 13:00:06 -04:00
|
|
|
return multistep.ActionHalt
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|
|
|
|
|
2014-05-19 23:16:50 -04:00
|
|
|
// Set the AMI ID in the state
|
2015-08-17 20:44:01 -04:00
|
|
|
ui.Message(fmt.Sprintf("AMI: %s", *createResp.ImageId))
|
2013-05-22 01:28:41 -04:00
|
|
|
amis := make(map[string]string)
|
2015-08-17 20:44:01 -04:00
|
|
|
amis[*ec2conn.Config.Region] = *createResp.ImageId
|
2013-08-31 16:00:43 -04:00
|
|
|
state.Put("amis", amis)
|
2013-05-21 03:55:32 -04:00
|
|
|
|
|
|
|
// Wait for the image to become ready
|
|
|
|
ui.Say("Waiting for AMI to become ready...")
|
2018-06-01 19:17:30 -04:00
|
|
|
if err := awscommon.WaitUntilAMIAvailable(ctx, ec2conn, *createResp.ImageId); err != nil {
|
2018-05-03 15:27:09 -04:00
|
|
|
log.Printf("Error waiting for AMI: %s", err)
|
2019-11-15 18:34:02 -05:00
|
|
|
imResp, imerr := ec2conn.DescribeImages(&ec2.DescribeImagesInput{ImageIds: []*string{createResp.ImageId}})
|
2019-11-14 19:12:39 -05:00
|
|
|
if imerr != nil {
|
2018-05-03 15:27:09 -04:00
|
|
|
log.Printf("Unable to determine reason waiting for AMI failed: %s", err)
|
2019-11-14 19:12:39 -05:00
|
|
|
err = fmt.Errorf("Unknown error waiting for AMI; %s", err)
|
2019-11-15 18:34:02 -05:00
|
|
|
}
|
|
|
|
if imResp != nil && len(imResp.Images) > 0 {
|
|
|
|
image := imResp.Images[0]
|
|
|
|
if image != nil {
|
|
|
|
stateReason := image.StateReason
|
|
|
|
err = fmt.Errorf("Error waiting for AMI. Reason: %s", stateReason)
|
2019-11-14 19:12:39 -05:00
|
|
|
}
|
2018-04-30 15:59:13 -04:00
|
|
|
}
|
2013-08-31 16:00:43 -04:00
|
|
|
state.Put("error", err)
|
2013-07-25 01:56:37 -04:00
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|
|
|
|
|
2015-08-17 20:44:01 -04:00
|
|
|
imagesResp, err := ec2conn.DescribeImages(&ec2.DescribeImagesInput{ImageIds: []*string{createResp.ImageId}})
|
2014-07-22 11:40:38 -04:00
|
|
|
if err != nil {
|
|
|
|
err := fmt.Errorf("Error searching for AMI: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
2015-04-05 17:58:48 -04:00
|
|
|
s.image = imagesResp.Images[0]
|
2014-07-22 11:40:38 -04:00
|
|
|
|
2016-09-11 08:37:24 -04:00
|
|
|
snapshots := make(map[string][]string)
|
|
|
|
for _, blockDeviceMapping := range imagesResp.Images[0].BlockDeviceMappings {
|
2016-12-21 09:37:08 -05:00
|
|
|
if blockDeviceMapping.Ebs != nil && blockDeviceMapping.Ebs.SnapshotId != nil {
|
|
|
|
|
2016-09-11 08:37:24 -04:00
|
|
|
snapshots[*ec2conn.Config.Region] = append(snapshots[*ec2conn.Config.Region], *blockDeviceMapping.Ebs.SnapshotId)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
state.Put("snapshots", snapshots)
|
|
|
|
|
2013-06-04 13:00:06 -04:00
|
|
|
return multistep.ActionContinue
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|
|
|
|
|
2014-05-19 12:40:39 -04:00
|
|
|
func (s *stepCreateAMI) Cleanup(state multistep.StateBag) {
|
2014-09-08 12:52:49 -04:00
|
|
|
if s.image == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2014-09-06 13:12:33 -04:00
|
|
|
_, cancelled := state.GetOk(multistep.StateCancelled)
|
|
|
|
_, halted := state.GetOk(multistep.StateHalted)
|
2019-05-02 17:38:56 -04:00
|
|
|
if !cancelled && !halted {
|
2014-05-19 12:40:39 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ec2conn := state.Get("ec2").(*ec2.EC2)
|
|
|
|
ui := state.Get("ui").(packer.Ui)
|
|
|
|
|
2019-04-17 15:55:30 -04:00
|
|
|
ui.Say("Deregistering the AMI and deleting associated snapshots because " +
|
2019-05-02 17:38:56 -04:00
|
|
|
"of cancellation, or error...")
|
2019-04-17 15:55:30 -04:00
|
|
|
|
|
|
|
resp, err := ec2conn.DescribeImages(&ec2.DescribeImagesInput{
|
|
|
|
ImageIds: []*string{s.image.ImageId},
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
err := fmt.Errorf("Error describing AMI: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
2014-05-19 12:40:39 -04:00
|
|
|
return
|
|
|
|
}
|
2019-04-17 15:55:30 -04:00
|
|
|
|
|
|
|
// Deregister image by name.
|
|
|
|
for _, i := range resp.Images {
|
|
|
|
_, err := ec2conn.DeregisterImage(&ec2.DeregisterImageInput{
|
|
|
|
ImageId: i.ImageId,
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
err := fmt.Errorf("Error deregistering existing AMI: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ui.Say(fmt.Sprintf("Deregistered AMI id: %s", *i.ImageId))
|
|
|
|
|
|
|
|
// Delete snapshot(s) by image
|
|
|
|
for _, b := range i.BlockDeviceMappings {
|
|
|
|
if b.Ebs != nil && aws.StringValue(b.Ebs.SnapshotId) != "" {
|
|
|
|
_, err := ec2conn.DeleteSnapshot(&ec2.DeleteSnapshotInput{
|
|
|
|
SnapshotId: b.Ebs.SnapshotId,
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
err := fmt.Errorf("Error deleting existing snapshot: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ui.Say(fmt.Sprintf("Deleted snapshot: %s", *b.Ebs.SnapshotId))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|