2019-05-31 08:27:41 -04:00
|
|
|
//go:generate struct-markdown
|
|
|
|
|
2013-07-29 19:42:35 -04:00
|
|
|
// The chroot package is able to create an Amazon AMI without requiring
|
|
|
|
// the launch of a new instance for every build. It does this by attaching
|
|
|
|
// and mounting the root volume of another AMI and chrooting into that
|
|
|
|
// directory. It then creates an AMI from that attached drive.
|
|
|
|
package chroot
|
|
|
|
|
|
|
|
import (
|
2019-03-22 09:53:28 -04:00
|
|
|
"context"
|
2013-07-30 00:59:34 -04:00
|
|
|
"errors"
|
2014-06-04 17:58:11 -04:00
|
|
|
"runtime"
|
|
|
|
|
2015-06-03 17:13:52 -04:00
|
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
2017-04-04 16:39:01 -04:00
|
|
|
awscommon "github.com/hashicorp/packer/builder/amazon/common"
|
|
|
|
"github.com/hashicorp/packer/common"
|
|
|
|
"github.com/hashicorp/packer/helper/config"
|
2018-01-19 19:18:44 -05:00
|
|
|
"github.com/hashicorp/packer/helper/multistep"
|
2017-04-04 16:39:01 -04:00
|
|
|
"github.com/hashicorp/packer/packer"
|
|
|
|
"github.com/hashicorp/packer/template/interpolate"
|
2013-07-29 19:42:35 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// The unique ID for this builder
|
|
|
|
const BuilderId = "mitchellh.amazon.chroot"
|
|
|
|
|
|
|
|
// Config is the configuration that is chained through the steps and
|
|
|
|
// settable from the template.
|
|
|
|
type Config struct {
|
2019-06-18 06:37:47 -04:00
|
|
|
common.PackerConfig `mapstructure:",squash"`
|
|
|
|
AMIMappings awscommon.BlockDevices `mapstructure:"ami_block_device_mappings" required:"false"`
|
|
|
|
LaunchMappings awscommon.BlockDevices `mapstructure:"launch_block_device_mappings" required:"false"`
|
|
|
|
awscommon.AMIConfig `mapstructure:",squash"`
|
|
|
|
awscommon.AccessConfig `mapstructure:",squash"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// This is a list of devices to
|
2019-06-03 11:55:09 -04:00
|
|
|
// mount into the chroot environment. This configuration parameter requires
|
|
|
|
// some additional documentation which is in the Chroot
|
|
|
|
// Mounts section. Please read that section for more
|
|
|
|
// information on how to use this.
|
|
|
|
ChrootMounts [][]string `mapstructure:"chroot_mounts" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// How to run shell commands. This defaults to
|
2019-06-03 11:55:09 -04:00
|
|
|
// {{.Command}}. This may be useful to set if you want to set environmental
|
|
|
|
// variables or perhaps run it with sudo or so on. This is a configuration
|
|
|
|
// template where the .Command variable is replaced with the command to be
|
|
|
|
// run. Defaults to {{.Command}}.
|
|
|
|
CommandWrapper string `mapstructure:"command_wrapper" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// Paths to files on the running EC2
|
2019-06-03 11:55:09 -04:00
|
|
|
// instance that will be copied into the chroot environment prior to
|
|
|
|
// provisioning. Defaults to /etc/resolv.conf so that DNS lookups work. Pass
|
|
|
|
// an empty list to skip copying /etc/resolv.conf. You may need to do this
|
|
|
|
// if you're building an image that uses systemd.
|
|
|
|
CopyFiles []string `mapstructure:"copy_files" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// The path to the device where the root volume of
|
2019-06-03 11:55:09 -04:00
|
|
|
// the source AMI will be attached. This defaults to "" (empty string), which
|
|
|
|
// forces Packer to find an open device automatically.
|
|
|
|
DevicePath string `mapstructure:"device_path" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// When we call the mount command (by default
|
2019-06-03 11:55:09 -04:00
|
|
|
// mount -o device dir), the string provided in nvme_mount_path will
|
|
|
|
// replace device in that command. When this option is not set, device in
|
|
|
|
// that command will be something like /dev/sdf1, mirroring the attached
|
|
|
|
// device name. This assumption works for most instances but will fail with c5
|
|
|
|
// and m5 instances. In order to use the chroot builder with c5 and m5
|
|
|
|
// instances, you must manually set nvme_device_path and device_path.
|
|
|
|
NVMEDevicePath string `mapstructure:"nvme_device_path" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// Build a new volume instead of starting from an
|
2019-06-03 11:55:09 -04:00
|
|
|
// existing AMI root volume snapshot. Default false. If true, source_ami
|
|
|
|
// is no longer used and the following options become required:
|
|
|
|
// ami_virtualization_type, pre_mount_commands and root_volume_size. The
|
|
|
|
// below options are also required in this mode only:
|
|
|
|
FromScratch bool `mapstructure:"from_scratch" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// Options to supply the mount command
|
2019-06-03 11:55:09 -04:00
|
|
|
// when mounting devices. Each option will be prefixed with -o and supplied
|
|
|
|
// to the mount command ran by Packer. Because this command is ran in a
|
|
|
|
// shell, user discretion is advised. See this manual page for the mount
|
|
|
|
// command for valid file
|
|
|
|
// system specific options.
|
|
|
|
MountOptions []string `mapstructure:"mount_options" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// The partition number containing the /
|
2019-06-03 11:55:09 -04:00
|
|
|
// partition. By default this is the first partition of the volume, (for
|
|
|
|
// example, xvda1) but you can designate the entire block device by setting
|
|
|
|
// "mount_partition": "0" in your config, which will mount xvda instead.
|
|
|
|
MountPartition string `mapstructure:"mount_partition" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// The path where the volume will be mounted. This is
|
2019-06-03 11:55:09 -04:00
|
|
|
// where the chroot environment will be. This defaults to
|
|
|
|
// /mnt/packer-amazon-chroot-volumes/{{.Device}}. This is a configuration
|
|
|
|
// template where the .Device variable is replaced with the name of the
|
|
|
|
// device where the volume is attached.
|
|
|
|
MountPath string `mapstructure:"mount_path" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// As pre_mount_commands, but the
|
2019-06-03 11:55:09 -04:00
|
|
|
// commands are executed after mounting the root device and before the extra
|
|
|
|
// mount and copy steps. The device and mount path are provided by
|
|
|
|
// {{.Device}} and {{.MountPath}}.
|
|
|
|
PostMountCommands []string `mapstructure:"post_mount_commands" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// A series of commands to execute
|
2019-06-03 11:55:09 -04:00
|
|
|
// after attaching the root volume and before mounting the chroot. This is not
|
|
|
|
// required unless using from_scratch. If so, this should include any
|
|
|
|
// partitioning and filesystem creation commands. The path to the device is
|
|
|
|
// provided by {{.Device}}.
|
|
|
|
PreMountCommands []string `mapstructure:"pre_mount_commands" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// The root device name. For example, xvda.
|
2019-06-03 11:55:09 -04:00
|
|
|
RootDeviceName string `mapstructure:"root_device_name" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// The size of the root volume in GB for the
|
2019-06-03 11:55:09 -04:00
|
|
|
// chroot environment and the resulting AMI. Default size is the snapshot size
|
|
|
|
// of the source_ami unless from_scratch is true, in which case this
|
|
|
|
// field must be defined.
|
|
|
|
RootVolumeSize int64 `mapstructure:"root_volume_size" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// The type of EBS volume for the chroot
|
2019-06-03 11:55:09 -04:00
|
|
|
// environment and resulting AMI. The default value is the type of the
|
|
|
|
// source_ami, unless from_scratch is true, in which case the default
|
|
|
|
// value is gp2. You can only specify io1 if building based on top of a
|
|
|
|
// source_ami which is also io1.
|
|
|
|
RootVolumeType string `mapstructure:"root_volume_type" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// The source AMI whose root volume will be copied and
|
2019-06-03 11:55:09 -04:00
|
|
|
// provisioned on the currently running instance. This must be an EBS-backed
|
|
|
|
// AMI with a root volume snapshot that you have access to. Note: this is not
|
|
|
|
// used when from_scratch is set to true.
|
|
|
|
SourceAmi string `mapstructure:"source_ami" required:"true"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// Filters used to populate the source_ami
|
2019-06-03 11:55:09 -04:00
|
|
|
// field. Example:
|
|
|
|
//
|
|
|
|
//
|
|
|
|
// ``` json
|
|
|
|
// {
|
|
|
|
// "source_ami_filter": {
|
|
|
|
// "filters": {
|
|
|
|
// "virtualization-type": "hvm",
|
|
|
|
// "name": "ubuntu/images/*ubuntu-xenial-16.04-amd64-server-*",
|
|
|
|
// "root-device-type": "ebs"
|
|
|
|
// },
|
|
|
|
// "owners": ["099720109477"],
|
|
|
|
// "most_recent": true
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
// ```
|
|
|
|
//
|
|
|
|
// This selects the most recent Ubuntu 16.04 HVM EBS AMI from Canonical. NOTE:
|
|
|
|
// This will fail unless *exactly* one AMI is returned. In the above example,
|
|
|
|
// `most_recent` will cause this to succeed by selecting the newest image.
|
|
|
|
//
|
|
|
|
// - `filters` (map of strings) - filters used to select a `source_ami`.
|
|
|
|
// NOTE: This will fail unless *exactly* one AMI is returned. Any filter
|
|
|
|
// described in the docs for
|
|
|
|
// [DescribeImages](http://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeImages.html)
|
|
|
|
// is valid.
|
|
|
|
//
|
|
|
|
// - `owners` (array of strings) - Filters the images by their owner. You
|
|
|
|
// may specify one or more AWS account IDs, "self" (which will use the
|
|
|
|
// account whose credentials you are using to run Packer), or an AWS owner
|
|
|
|
// alias: for example, "amazon", "aws-marketplace", or "microsoft". This
|
|
|
|
// option is required for security reasons.
|
|
|
|
//
|
|
|
|
// - `most_recent` (boolean) - Selects the newest created image when true.
|
|
|
|
// This is most useful for selecting a daily distro build.
|
|
|
|
//
|
|
|
|
// You may set this in place of `source_ami` or in conjunction with it. If you
|
|
|
|
// set this in conjunction with `source_ami`, the `source_ami` will be added
|
|
|
|
// to the filter. The provided `source_ami` must meet all of the filtering
|
|
|
|
// criteria provided in `source_ami_filter`; this pins the AMI returned by the
|
|
|
|
// filter, but will cause Packer to fail if the `source_ami` does not exist.
|
|
|
|
SourceAmiFilter awscommon.AmiFilterOptions `mapstructure:"source_ami_filter" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// Tags to apply to the
|
2019-06-03 11:55:09 -04:00
|
|
|
// volumes that are *launched*. This is a [template
|
|
|
|
// engine](/docs/templates/engine.html), see [Build template
|
|
|
|
// data](#build-template-data) for more information.
|
|
|
|
RootVolumeTags awscommon.TagMap `mapstructure:"root_volume_tags" required:"false"`
|
2019-05-28 11:50:58 -04:00
|
|
|
// what architecture to use when registering the
|
2019-06-03 11:55:09 -04:00
|
|
|
// final AMI; valid options are "x86_64" or "arm64". Defaults to "x86_64".
|
|
|
|
Architecture string `mapstructure:"ami_architecture" required:"false"`
|
2013-08-08 17:54:37 -04:00
|
|
|
|
2015-06-22 12:22:42 -04:00
|
|
|
ctx interpolate.Context
|
2013-07-29 19:42:35 -04:00
|
|
|
}
|
|
|
|
|
2013-09-27 18:08:15 -04:00
|
|
|
type wrappedCommandTemplate struct {
|
|
|
|
Command string
|
|
|
|
}
|
|
|
|
|
2013-07-29 19:42:35 -04:00
|
|
|
type Builder struct {
|
|
|
|
config Config
|
|
|
|
runner multistep.Runner
|
|
|
|
}
|
|
|
|
|
2013-11-02 23:56:54 -04:00
|
|
|
func (b *Builder) Prepare(raws ...interface{}) ([]string, error) {
|
2015-06-22 12:22:42 -04:00
|
|
|
b.config.ctx.Funcs = awscommon.TemplateFuncs
|
2015-05-27 14:47:45 -04:00
|
|
|
err := config.Decode(&b.config, &config.DecodeOpts{
|
|
|
|
Interpolate: true,
|
2015-06-22 12:22:42 -04:00
|
|
|
InterpolateContext: &b.config.ctx,
|
2015-05-27 14:47:45 -04:00
|
|
|
InterpolateFilter: &interpolate.RenderFilter{
|
|
|
|
Exclude: []string{
|
2017-01-10 05:41:28 -05:00
|
|
|
"ami_description",
|
|
|
|
"snapshot_tags",
|
|
|
|
"tags",
|
2018-07-18 06:01:15 -04:00
|
|
|
"root_volume_tags",
|
2015-05-27 14:47:45 -04:00
|
|
|
"command_wrapper",
|
2016-09-01 15:30:48 -04:00
|
|
|
"post_mount_commands",
|
2016-08-10 20:24:30 -04:00
|
|
|
"pre_mount_commands",
|
2015-05-27 14:47:45 -04:00
|
|
|
"mount_path",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}, raws...)
|
2013-08-08 17:54:37 -04:00
|
|
|
if err != nil {
|
2013-11-02 23:56:54 -04:00
|
|
|
return nil, err
|
2013-08-08 17:54:37 -04:00
|
|
|
}
|
|
|
|
|
2019-05-07 19:38:55 -04:00
|
|
|
if b.config.Architecture == "" {
|
2019-05-07 19:44:29 -04:00
|
|
|
b.config.Architecture = "x86_64"
|
2019-05-07 19:38:55 -04:00
|
|
|
}
|
|
|
|
|
2017-03-09 17:24:49 -05:00
|
|
|
if b.config.PackerConfig.PackerForce {
|
|
|
|
b.config.AMIForceDeregister = true
|
|
|
|
}
|
|
|
|
|
2013-07-29 19:42:35 -04:00
|
|
|
// Defaults
|
2013-07-30 14:27:55 -04:00
|
|
|
if b.config.ChrootMounts == nil {
|
2013-07-30 15:08:16 -04:00
|
|
|
b.config.ChrootMounts = make([][]string, 0)
|
2013-07-30 14:27:55 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if len(b.config.ChrootMounts) == 0 {
|
2013-07-30 15:08:16 -04:00
|
|
|
b.config.ChrootMounts = [][]string{
|
2016-11-01 17:08:04 -04:00
|
|
|
{"proc", "proc", "/proc"},
|
|
|
|
{"sysfs", "sysfs", "/sys"},
|
|
|
|
{"bind", "/dev", "/dev"},
|
|
|
|
{"devpts", "devpts", "/dev/pts"},
|
|
|
|
{"binfmt_misc", "binfmt_misc", "/proc/sys/fs/binfmt_misc"},
|
2013-07-30 14:27:55 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-24 15:41:29 -04:00
|
|
|
// set default copy file if we're not giving our own
|
|
|
|
if b.config.CopyFiles == nil {
|
|
|
|
if !b.config.FromScratch {
|
|
|
|
b.config.CopyFiles = []string{"/etc/resolv.conf"}
|
|
|
|
}
|
2013-07-30 18:30:53 -04:00
|
|
|
}
|
|
|
|
|
2013-09-27 06:54:53 -04:00
|
|
|
if b.config.CommandWrapper == "" {
|
|
|
|
b.config.CommandWrapper = "{{.Command}}"
|
2013-09-26 03:58:25 -04:00
|
|
|
}
|
|
|
|
|
2013-07-30 12:55:17 -04:00
|
|
|
if b.config.MountPath == "" {
|
2013-12-21 12:16:09 -05:00
|
|
|
b.config.MountPath = "/mnt/packer-amazon-chroot-volumes/{{.Device}}"
|
2013-07-30 12:55:17 -04:00
|
|
|
}
|
2013-07-29 19:42:35 -04:00
|
|
|
|
2018-04-25 13:47:52 -04:00
|
|
|
if b.config.MountPartition == "" {
|
|
|
|
b.config.MountPartition = "1"
|
2016-01-06 14:35:01 -05:00
|
|
|
}
|
|
|
|
|
2016-09-02 15:39:37 -04:00
|
|
|
// Accumulate any errors or warnings
|
2015-05-27 14:47:45 -04:00
|
|
|
var errs *packer.MultiError
|
2016-09-02 15:39:37 -04:00
|
|
|
var warns []string
|
|
|
|
|
2015-06-22 12:22:42 -04:00
|
|
|
errs = packer.MultiErrorAppend(errs, b.config.AccessConfig.Prepare(&b.config.ctx)...)
|
2017-10-30 17:17:19 -04:00
|
|
|
errs = packer.MultiErrorAppend(errs,
|
|
|
|
b.config.AMIConfig.Prepare(&b.config.AccessConfig, &b.config.ctx)...)
|
2013-07-31 01:33:41 -04:00
|
|
|
|
2015-05-27 14:47:45 -04:00
|
|
|
for _, mounts := range b.config.ChrootMounts {
|
2013-07-31 01:29:06 -04:00
|
|
|
if len(mounts) != 3 {
|
|
|
|
errs = packer.MultiErrorAppend(
|
|
|
|
errs, errors.New("Each chroot_mounts entry should be three elements."))
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-10 20:24:30 -04:00
|
|
|
if b.config.FromScratch {
|
2016-10-01 18:56:09 -04:00
|
|
|
if b.config.SourceAmi != "" || !b.config.SourceAmiFilter.Empty() {
|
|
|
|
warns = append(warns, "source_ami and source_ami_filter are unused when from_scratch is true")
|
2016-09-02 15:39:37 -04:00
|
|
|
}
|
2016-08-10 20:24:30 -04:00
|
|
|
if b.config.RootVolumeSize == 0 {
|
|
|
|
errs = packer.MultiErrorAppend(
|
|
|
|
errs, errors.New("root_volume_size is required with from_scratch."))
|
|
|
|
}
|
|
|
|
if len(b.config.PreMountCommands) == 0 {
|
|
|
|
errs = packer.MultiErrorAppend(
|
|
|
|
errs, errors.New("pre_mount_commands is required with from_scratch."))
|
|
|
|
}
|
|
|
|
if b.config.AMIVirtType == "" {
|
|
|
|
errs = packer.MultiErrorAppend(
|
|
|
|
errs, errors.New("ami_virtualization_type is required with from_scratch."))
|
|
|
|
}
|
|
|
|
if b.config.RootDeviceName == "" {
|
|
|
|
errs = packer.MultiErrorAppend(
|
|
|
|
errs, errors.New("root_device_name is required with from_scratch."))
|
|
|
|
}
|
|
|
|
if len(b.config.AMIMappings) == 0 {
|
|
|
|
errs = packer.MultiErrorAppend(
|
|
|
|
errs, errors.New("ami_block_device_mappings is required with from_scratch."))
|
|
|
|
}
|
|
|
|
} else {
|
2016-10-01 18:56:09 -04:00
|
|
|
if b.config.SourceAmi == "" && b.config.SourceAmiFilter.Empty() {
|
2016-08-10 20:24:30 -04:00
|
|
|
errs = packer.MultiErrorAppend(
|
2016-10-01 18:56:09 -04:00
|
|
|
errs, errors.New("source_ami or source_ami_filter is required."))
|
2016-08-10 20:24:30 -04:00
|
|
|
}
|
2019-02-25 13:55:10 -05:00
|
|
|
if len(b.config.AMIMappings) > 0 && b.config.RootDeviceName != "" {
|
|
|
|
if b.config.RootVolumeSize == 0 {
|
|
|
|
// Although, they can specify the device size in the block device mapping, it's easier to
|
|
|
|
// be specific here.
|
|
|
|
errs = packer.MultiErrorAppend(
|
|
|
|
errs, errors.New("root_volume_size is required if ami_block_device_mappings is specified"))
|
|
|
|
}
|
|
|
|
warns = append(warns, "ami_block_device_mappings from source image will be completely overwritten")
|
|
|
|
} else if len(b.config.AMIMappings) > 0 {
|
|
|
|
errs = packer.MultiErrorAppend(
|
|
|
|
errs, errors.New("If ami_block_device_mappings is specified, root_device_name must be specified"))
|
|
|
|
} else if b.config.RootDeviceName != "" {
|
|
|
|
errs = packer.MultiErrorAppend(
|
|
|
|
errs, errors.New("If root_device_name is specified, ami_block_device_mappings must be specified"))
|
2016-09-02 15:39:37 -04:00
|
|
|
}
|
2013-07-30 12:55:17 -04:00
|
|
|
}
|
2019-05-07 19:38:55 -04:00
|
|
|
valid := false
|
2019-05-07 19:44:29 -04:00
|
|
|
for _, validArch := range []string{"x86_64", "arm64"} {
|
2019-05-07 19:38:55 -04:00
|
|
|
if validArch == b.config.Architecture {
|
2019-05-07 19:44:29 -04:00
|
|
|
valid = true
|
2019-05-07 19:38:55 -04:00
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !valid {
|
|
|
|
errs = packer.MultiErrorAppend(errs, errors.New(`The only valid ami_architecture values are "x86_64" and "arm64"`))
|
|
|
|
}
|
2013-07-30 12:55:17 -04:00
|
|
|
|
2013-07-29 19:42:35 -04:00
|
|
|
if errs != nil && len(errs.Errors) > 0 {
|
2016-09-02 15:39:37 -04:00
|
|
|
return warns, errs
|
2013-07-29 19:42:35 -04:00
|
|
|
}
|
|
|
|
|
2018-08-10 17:25:14 -04:00
|
|
|
packer.LogSecretFilter.Set(b.config.AccessKey, b.config.SecretKey, b.config.Token)
|
2016-09-02 15:39:37 -04:00
|
|
|
return warns, nil
|
2013-07-29 19:42:35 -04:00
|
|
|
}
|
|
|
|
|
2019-03-22 09:53:28 -04:00
|
|
|
func (b *Builder) Run(ctx context.Context, ui packer.Ui, hook packer.Hook) (packer.Artifact, error) {
|
2013-07-30 00:59:34 -04:00
|
|
|
if runtime.GOOS != "linux" {
|
|
|
|
return nil, errors.New("The amazon-chroot builder only works on Linux environments.")
|
|
|
|
}
|
|
|
|
|
2017-03-01 19:43:09 -05:00
|
|
|
session, err := b.config.Session()
|
2016-11-01 18:53:04 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-03-04 19:22:52 -05:00
|
|
|
ec2conn := ec2.New(session)
|
2013-07-29 19:42:35 -04:00
|
|
|
|
2013-09-30 12:33:57 -04:00
|
|
|
wrappedCommand := func(command string) (string, error) {
|
2019-03-29 11:50:02 -04:00
|
|
|
ictx := b.config.ctx
|
|
|
|
ictx.Data = &wrappedCommandTemplate{Command: command}
|
|
|
|
return interpolate.Render(b.config.CommandWrapper, &ictx)
|
2013-09-27 16:47:44 -04:00
|
|
|
}
|
|
|
|
|
2013-07-29 19:42:35 -04:00
|
|
|
// Setup the state bag and initial state for the steps
|
2013-08-31 15:58:55 -04:00
|
|
|
state := new(multistep.BasicStateBag)
|
|
|
|
state.Put("config", &b.config)
|
2019-02-05 17:07:04 -05:00
|
|
|
state.Put("access_config", &b.config.AccessConfig)
|
|
|
|
state.Put("ami_config", &b.config.AMIConfig)
|
2013-08-31 15:58:55 -04:00
|
|
|
state.Put("ec2", ec2conn)
|
2017-12-19 14:04:17 -05:00
|
|
|
state.Put("awsSession", session)
|
2013-08-31 15:58:55 -04:00
|
|
|
state.Put("hook", hook)
|
|
|
|
state.Put("ui", ui)
|
2013-09-30 12:33:57 -04:00
|
|
|
state.Put("wrappedCommand", CommandWrapper(wrappedCommand))
|
2013-07-29 19:42:35 -04:00
|
|
|
|
|
|
|
// Build the steps
|
2013-07-29 20:07:05 -04:00
|
|
|
steps := []multistep.Step{
|
2015-06-12 14:05:15 -04:00
|
|
|
&awscommon.StepPreValidate{
|
|
|
|
DestAmiName: b.config.AMIName,
|
|
|
|
ForceDeregister: b.config.AMIForceDeregister,
|
|
|
|
},
|
2013-07-29 21:13:22 -04:00
|
|
|
&StepInstanceInfo{},
|
2016-08-10 20:24:30 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if !b.config.FromScratch {
|
|
|
|
steps = append(steps,
|
|
|
|
&awscommon.StepSourceAMIInfo{
|
2017-08-28 12:18:23 -04:00
|
|
|
SourceAmi: b.config.SourceAmi,
|
|
|
|
EnableAMISriovNetSupport: b.config.AMISriovNetSupport,
|
|
|
|
EnableAMIENASupport: b.config.AMIENASupport,
|
|
|
|
AmiFilters: b.config.SourceAmiFilter,
|
2018-09-04 21:13:18 -04:00
|
|
|
AMIVirtType: b.config.AMIVirtType,
|
2016-08-10 20:24:30 -04:00
|
|
|
},
|
|
|
|
&StepCheckRootDevice{},
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
steps = append(steps,
|
2013-07-31 00:48:37 -04:00
|
|
|
&StepFlock{},
|
2013-07-31 00:19:57 -04:00
|
|
|
&StepPrepareDevice{},
|
2015-06-23 11:35:59 -04:00
|
|
|
&StepCreateVolume{
|
2018-09-04 19:56:17 -04:00
|
|
|
RootVolumeType: b.config.RootVolumeType,
|
2015-06-23 11:35:59 -04:00
|
|
|
RootVolumeSize: b.config.RootVolumeSize,
|
2018-07-18 06:01:15 -04:00
|
|
|
RootVolumeTags: b.config.RootVolumeTags,
|
|
|
|
Ctx: b.config.ctx,
|
2015-06-23 11:35:59 -04:00
|
|
|
},
|
2013-07-29 22:07:51 -04:00
|
|
|
&StepAttachVolume{},
|
2013-07-31 01:25:33 -04:00
|
|
|
&StepEarlyUnflock{},
|
2016-08-10 20:24:30 -04:00
|
|
|
&StepPreMountCommands{
|
|
|
|
Commands: b.config.PreMountCommands,
|
|
|
|
},
|
2015-06-23 12:26:13 -04:00
|
|
|
&StepMountDevice{
|
2016-01-06 14:35:01 -05:00
|
|
|
MountOptions: b.config.MountOptions,
|
|
|
|
MountPartition: b.config.MountPartition,
|
2015-06-23 12:26:13 -04:00
|
|
|
},
|
2016-09-01 15:30:48 -04:00
|
|
|
&StepPostMountCommands{
|
|
|
|
Commands: b.config.PostMountCommands,
|
|
|
|
},
|
2013-07-30 15:08:16 -04:00
|
|
|
&StepMountExtra{},
|
2013-07-30 18:30:53 -04:00
|
|
|
&StepCopyFiles{},
|
2013-07-30 17:56:40 -04:00
|
|
|
&StepChrootProvision{},
|
2013-07-30 19:41:29 -04:00
|
|
|
&StepEarlyCleanup{},
|
2013-07-30 19:58:58 -04:00
|
|
|
&StepSnapshot{},
|
2015-06-12 14:05:15 -04:00
|
|
|
&awscommon.StepDeregisterAMI{
|
2017-08-14 12:20:08 -04:00
|
|
|
AccessConfig: &b.config.AccessConfig,
|
2016-11-30 16:28:34 -05:00
|
|
|
ForceDeregister: b.config.AMIForceDeregister,
|
|
|
|
ForceDeleteSnapshot: b.config.AMIForceDeleteSnapshot,
|
|
|
|
AMIName: b.config.AMIName,
|
2017-08-14 12:20:08 -04:00
|
|
|
Regions: b.config.AMIRegions,
|
2015-06-12 14:05:15 -04:00
|
|
|
},
|
2015-06-23 11:35:59 -04:00
|
|
|
&StepRegisterAMI{
|
2017-08-29 12:36:06 -04:00
|
|
|
RootVolumeSize: b.config.RootVolumeSize,
|
|
|
|
EnableAMISriovNetSupport: b.config.AMISriovNetSupport,
|
|
|
|
EnableAMIENASupport: b.config.AMIENASupport,
|
2015-06-23 11:35:59 -04:00
|
|
|
},
|
2013-09-04 19:06:06 -04:00
|
|
|
&awscommon.StepAMIRegionCopy{
|
2017-06-01 12:28:17 -04:00
|
|
|
AccessConfig: &b.config.AccessConfig,
|
|
|
|
Regions: b.config.AMIRegions,
|
2019-04-15 19:44:56 -04:00
|
|
|
AMIKmsKeyId: b.config.AMIKmsKeyId,
|
2017-06-01 12:28:17 -04:00
|
|
|
RegionKeyIds: b.config.AMIRegionKMSKeyIDs,
|
|
|
|
EncryptBootVolume: b.config.AMIEncryptBootVolume,
|
|
|
|
Name: b.config.AMIName,
|
2019-05-03 17:47:09 -04:00
|
|
|
OriginalRegion: *ec2conn.Config.Region,
|
2013-09-04 19:06:06 -04:00
|
|
|
},
|
2013-08-22 18:35:47 -04:00
|
|
|
&awscommon.StepModifyAMIAttributes{
|
2016-12-02 03:49:21 -05:00
|
|
|
Description: b.config.AMIDescription,
|
|
|
|
Users: b.config.AMIUsers,
|
|
|
|
Groups: b.config.AMIGroups,
|
|
|
|
ProductCodes: b.config.AMIProductCodes,
|
|
|
|
SnapshotUsers: b.config.SnapshotUsers,
|
|
|
|
SnapshotGroups: b.config.SnapshotGroups,
|
2017-01-10 05:41:28 -05:00
|
|
|
Ctx: b.config.ctx,
|
2013-08-22 18:35:47 -04:00
|
|
|
},
|
2013-08-22 18:11:54 -04:00
|
|
|
&awscommon.StepCreateTags{
|
2016-10-16 22:19:55 -04:00
|
|
|
Tags: b.config.AMITags,
|
|
|
|
SnapshotTags: b.config.SnapshotTags,
|
2017-01-10 05:41:28 -05:00
|
|
|
Ctx: b.config.ctx,
|
2013-08-22 18:11:54 -04:00
|
|
|
},
|
2016-08-10 20:24:30 -04:00
|
|
|
)
|
2013-07-29 19:42:35 -04:00
|
|
|
|
|
|
|
// Run!
|
2016-09-13 20:04:18 -04:00
|
|
|
b.runner = common.NewRunner(steps, b.config.PackerConfig, ui)
|
2019-03-22 09:53:28 -04:00
|
|
|
b.runner.Run(ctx, state)
|
2013-07-29 19:42:35 -04:00
|
|
|
|
|
|
|
// If there was an error, return that
|
2013-08-31 15:58:55 -04:00
|
|
|
if rawErr, ok := state.GetOk("error"); ok {
|
2013-07-29 19:42:35 -04:00
|
|
|
return nil, rawErr.(error)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If there are no AMIs, then just return
|
2013-08-31 15:58:55 -04:00
|
|
|
if _, ok := state.GetOk("amis"); !ok {
|
2013-07-29 19:42:35 -04:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build the artifact and return it
|
|
|
|
artifact := &awscommon.Artifact{
|
2013-08-31 15:58:55 -04:00
|
|
|
Amis: state.Get("amis").(map[string]string),
|
2013-07-29 19:42:35 -04:00
|
|
|
BuilderIdValue: BuilderId,
|
2017-12-19 14:04:17 -05:00
|
|
|
Session: session,
|
2013-07-29 19:42:35 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return artifact, nil
|
|
|
|
}
|