2013-07-15 02:02:18 -04:00
|
|
|
package ebs
|
2013-05-21 03:55:32 -04:00
|
|
|
|
|
|
|
import (
|
2018-01-22 18:32:33 -05:00
|
|
|
"context"
|
2013-05-27 18:15:42 -04:00
|
|
|
"fmt"
|
2018-05-03 15:27:09 -04:00
|
|
|
"log"
|
2020-07-14 19:47:00 -04:00
|
|
|
"time"
|
2015-04-05 17:58:48 -04:00
|
|
|
|
2019-04-17 15:55:30 -04:00
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
2015-06-03 17:13:52 -04:00
|
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
2020-12-17 16:29:25 -05:00
|
|
|
"github.com/hashicorp/packer-plugin-sdk/multistep"
|
|
|
|
packersdk "github.com/hashicorp/packer-plugin-sdk/packer"
|
|
|
|
"github.com/hashicorp/packer-plugin-sdk/random"
|
|
|
|
"github.com/hashicorp/packer-plugin-sdk/retry"
|
2017-04-04 16:39:01 -04:00
|
|
|
awscommon "github.com/hashicorp/packer/builder/amazon/common"
|
2020-10-29 06:57:14 -04:00
|
|
|
"github.com/hashicorp/packer/builder/amazon/common/awserrors"
|
2013-05-21 03:55:32 -04:00
|
|
|
)
|
|
|
|
|
2014-05-19 12:40:39 -04:00
|
|
|
type stepCreateAMI struct {
|
2020-08-17 11:09:19 -04:00
|
|
|
PollingConfig *awscommon.AWSPollingConfig
|
2019-06-17 17:39:11 -04:00
|
|
|
image *ec2.Image
|
2021-01-27 09:00:42 -05:00
|
|
|
AMISkipCreateImage bool
|
2019-06-17 17:39:11 -04:00
|
|
|
AMISkipBuildRegion bool
|
2014-05-19 12:40:39 -04:00
|
|
|
}
|
2013-05-21 03:55:32 -04:00
|
|
|
|
2018-06-01 19:17:30 -04:00
|
|
|
func (s *stepCreateAMI) Run(ctx context.Context, state multistep.StateBag) multistep.StepAction {
|
2018-09-18 09:50:37 -04:00
|
|
|
config := state.Get("config").(*Config)
|
2013-08-31 16:00:43 -04:00
|
|
|
ec2conn := state.Get("ec2").(*ec2.EC2)
|
|
|
|
instance := state.Get("instance").(*ec2.Instance)
|
2020-11-19 14:54:31 -05:00
|
|
|
ui := state.Get("ui").(packersdk.Ui)
|
2013-05-21 03:55:32 -04:00
|
|
|
|
2021-01-27 09:00:42 -05:00
|
|
|
if s.AMISkipCreateImage {
|
|
|
|
ui.Say("Skipping AMI creation...")
|
|
|
|
return multistep.ActionContinue
|
|
|
|
}
|
|
|
|
|
2013-05-21 03:55:32 -04:00
|
|
|
// Create the image
|
2018-09-03 09:01:14 -04:00
|
|
|
amiName := config.AMIName
|
2019-07-12 17:59:11 -04:00
|
|
|
state.Put("intermediary_image", false)
|
2019-08-22 17:04:26 -04:00
|
|
|
if config.AMIEncryptBootVolume.True() || s.AMISkipBuildRegion {
|
2019-07-12 17:59:11 -04:00
|
|
|
state.Put("intermediary_image", true)
|
|
|
|
|
|
|
|
// From AWS SDK docs: You can encrypt a copy of an unencrypted snapshot,
|
|
|
|
// but you cannot use it to create an unencrypted copy of an encrypted
|
|
|
|
// snapshot. Your default CMK for EBS is used unless you specify a
|
|
|
|
// non-default key using KmsKeyId.
|
|
|
|
|
|
|
|
// If encrypt_boot is nil or true, we need to create a temporary image
|
|
|
|
// so that in step_region_copy, we can copy it with the correct
|
|
|
|
// encryption
|
2018-09-03 09:01:14 -04:00
|
|
|
amiName = random.AlphaNum(7)
|
|
|
|
}
|
|
|
|
|
2018-11-26 05:33:44 -05:00
|
|
|
ui.Say(fmt.Sprintf("Creating AMI %s from instance %s", amiName, *instance.InstanceId))
|
2015-04-05 17:58:48 -04:00
|
|
|
createOpts := &ec2.CreateImageInput{
|
2015-08-17 20:44:01 -04:00
|
|
|
InstanceId: instance.InstanceId,
|
2018-09-03 09:01:14 -04:00
|
|
|
Name: &amiName,
|
2019-06-18 06:44:24 -04:00
|
|
|
BlockDeviceMappings: config.AMIMappings.BuildEC2BlockDeviceMappings(),
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|
|
|
|
|
2020-07-14 19:47:00 -04:00
|
|
|
var createResp *ec2.CreateImageOutput
|
|
|
|
var err error
|
|
|
|
|
2020-07-21 18:55:39 -04:00
|
|
|
// Create a timeout for the CreateImage call.
|
|
|
|
timeoutCtx, cancel := context.WithTimeout(ctx, time.Minute*15)
|
|
|
|
defer cancel()
|
|
|
|
|
2020-07-14 19:47:00 -04:00
|
|
|
err = retry.Config{
|
2020-07-21 18:55:39 -04:00
|
|
|
Tries: 0,
|
2020-07-14 19:47:00 -04:00
|
|
|
ShouldRetry: func(err error) bool {
|
2020-10-29 06:57:14 -04:00
|
|
|
if awserrors.Matches(err, "InvalidParameterValue", "Instance is not in state") {
|
2020-07-15 12:47:07 -04:00
|
|
|
return true
|
2020-07-14 19:47:00 -04:00
|
|
|
}
|
|
|
|
return false
|
|
|
|
},
|
|
|
|
RetryDelay: (&retry.Backoff{InitialBackoff: 200 * time.Millisecond, MaxBackoff: 30 * time.Second, Multiplier: 2}).Linear,
|
2020-07-21 18:55:39 -04:00
|
|
|
}.Run(timeoutCtx, func(ctx context.Context) error {
|
2020-07-14 19:47:00 -04:00
|
|
|
createResp, err = ec2conn.CreateImage(createOpts)
|
|
|
|
return err
|
|
|
|
})
|
2013-05-21 03:55:32 -04:00
|
|
|
if err != nil {
|
2013-06-19 23:54:02 -04:00
|
|
|
err := fmt.Errorf("Error creating AMI: %s", err)
|
2013-08-31 16:00:43 -04:00
|
|
|
state.Put("error", err)
|
2013-05-21 03:55:32 -04:00
|
|
|
ui.Error(err.Error())
|
2013-06-04 13:00:06 -04:00
|
|
|
return multistep.ActionHalt
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|
|
|
|
|
2014-05-19 23:16:50 -04:00
|
|
|
// Set the AMI ID in the state
|
2015-08-17 20:44:01 -04:00
|
|
|
ui.Message(fmt.Sprintf("AMI: %s", *createResp.ImageId))
|
2013-05-22 01:28:41 -04:00
|
|
|
amis := make(map[string]string)
|
2015-08-17 20:44:01 -04:00
|
|
|
amis[*ec2conn.Config.Region] = *createResp.ImageId
|
2013-08-31 16:00:43 -04:00
|
|
|
state.Put("amis", amis)
|
2013-05-21 03:55:32 -04:00
|
|
|
|
|
|
|
// Wait for the image to become ready
|
|
|
|
ui.Say("Waiting for AMI to become ready...")
|
2020-08-17 11:09:19 -04:00
|
|
|
if waitErr := s.PollingConfig.WaitUntilAMIAvailable(ctx, ec2conn, *createResp.ImageId); waitErr != nil {
|
2020-08-06 17:58:05 -04:00
|
|
|
// waitErr should get bubbled up if the issue is a wait timeout
|
|
|
|
err := fmt.Errorf("Error waiting for AMI: %s", waitErr)
|
2019-11-15 18:34:02 -05:00
|
|
|
imResp, imerr := ec2conn.DescribeImages(&ec2.DescribeImagesInput{ImageIds: []*string{createResp.ImageId}})
|
2019-11-14 19:12:39 -05:00
|
|
|
if imerr != nil {
|
2020-08-06 17:58:05 -04:00
|
|
|
// If there's a failure describing images, bubble that error up too, but don't erase the waitErr.
|
|
|
|
log.Printf("DescribeImages call was unable to determine reason waiting for AMI failed: %s", imerr)
|
|
|
|
err = fmt.Errorf("Unknown error waiting for AMI; %s. DescribeImages returned an error: %s", waitErr, imerr)
|
2019-11-15 18:34:02 -05:00
|
|
|
}
|
|
|
|
if imResp != nil && len(imResp.Images) > 0 {
|
2020-08-06 17:58:05 -04:00
|
|
|
// Finally, if there's a stateReason, store that with the wait err
|
2019-11-15 18:34:02 -05:00
|
|
|
image := imResp.Images[0]
|
|
|
|
if image != nil {
|
|
|
|
stateReason := image.StateReason
|
2020-08-07 11:02:57 -04:00
|
|
|
if stateReason != nil {
|
2020-08-06 17:58:05 -04:00
|
|
|
err = fmt.Errorf("Error waiting for AMI: %s. DescribeImages returned the state reason: %s", waitErr, stateReason)
|
|
|
|
}
|
2019-11-14 19:12:39 -05:00
|
|
|
}
|
2018-04-30 15:59:13 -04:00
|
|
|
}
|
2013-08-31 16:00:43 -04:00
|
|
|
state.Put("error", err)
|
2013-07-25 01:56:37 -04:00
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|
|
|
|
|
2015-08-17 20:44:01 -04:00
|
|
|
imagesResp, err := ec2conn.DescribeImages(&ec2.DescribeImagesInput{ImageIds: []*string{createResp.ImageId}})
|
2014-07-22 11:40:38 -04:00
|
|
|
if err != nil {
|
|
|
|
err := fmt.Errorf("Error searching for AMI: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return multistep.ActionHalt
|
|
|
|
}
|
2015-04-05 17:58:48 -04:00
|
|
|
s.image = imagesResp.Images[0]
|
2014-07-22 11:40:38 -04:00
|
|
|
|
2016-09-11 08:37:24 -04:00
|
|
|
snapshots := make(map[string][]string)
|
|
|
|
for _, blockDeviceMapping := range imagesResp.Images[0].BlockDeviceMappings {
|
2016-12-21 09:37:08 -05:00
|
|
|
if blockDeviceMapping.Ebs != nil && blockDeviceMapping.Ebs.SnapshotId != nil {
|
|
|
|
|
2016-09-11 08:37:24 -04:00
|
|
|
snapshots[*ec2conn.Config.Region] = append(snapshots[*ec2conn.Config.Region], *blockDeviceMapping.Ebs.SnapshotId)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
state.Put("snapshots", snapshots)
|
|
|
|
|
2013-06-04 13:00:06 -04:00
|
|
|
return multistep.ActionContinue
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|
|
|
|
|
2014-05-19 12:40:39 -04:00
|
|
|
func (s *stepCreateAMI) Cleanup(state multistep.StateBag) {
|
2014-09-08 12:52:49 -04:00
|
|
|
if s.image == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2014-09-06 13:12:33 -04:00
|
|
|
_, cancelled := state.GetOk(multistep.StateCancelled)
|
|
|
|
_, halted := state.GetOk(multistep.StateHalted)
|
2019-05-02 17:38:56 -04:00
|
|
|
if !cancelled && !halted {
|
2014-05-19 12:40:39 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ec2conn := state.Get("ec2").(*ec2.EC2)
|
2020-11-19 14:54:31 -05:00
|
|
|
ui := state.Get("ui").(packersdk.Ui)
|
2014-05-19 12:40:39 -04:00
|
|
|
|
2019-04-17 15:55:30 -04:00
|
|
|
ui.Say("Deregistering the AMI and deleting associated snapshots because " +
|
2019-05-02 17:38:56 -04:00
|
|
|
"of cancellation, or error...")
|
2019-04-17 15:55:30 -04:00
|
|
|
|
|
|
|
resp, err := ec2conn.DescribeImages(&ec2.DescribeImagesInput{
|
|
|
|
ImageIds: []*string{s.image.ImageId},
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
err := fmt.Errorf("Error describing AMI: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
2014-05-19 12:40:39 -04:00
|
|
|
return
|
|
|
|
}
|
2019-04-17 15:55:30 -04:00
|
|
|
|
|
|
|
// Deregister image by name.
|
|
|
|
for _, i := range resp.Images {
|
|
|
|
_, err := ec2conn.DeregisterImage(&ec2.DeregisterImageInput{
|
|
|
|
ImageId: i.ImageId,
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
err := fmt.Errorf("Error deregistering existing AMI: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ui.Say(fmt.Sprintf("Deregistered AMI id: %s", *i.ImageId))
|
|
|
|
|
|
|
|
// Delete snapshot(s) by image
|
|
|
|
for _, b := range i.BlockDeviceMappings {
|
|
|
|
if b.Ebs != nil && aws.StringValue(b.Ebs.SnapshotId) != "" {
|
|
|
|
_, err := ec2conn.DeleteSnapshot(&ec2.DeleteSnapshotInput{
|
|
|
|
SnapshotId: b.Ebs.SnapshotId,
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
err := fmt.Errorf("Error deleting existing snapshot: %s", err)
|
|
|
|
state.Put("error", err)
|
|
|
|
ui.Error(err.Error())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ui.Say(fmt.Sprintf("Deleted snapshot: %s", *b.Ebs.SnapshotId))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-05-21 03:55:32 -04:00
|
|
|
}
|