2019-12-17 05:25:56 -05:00
|
|
|
//go:generate mapstructure-to-hcl2 -type Config
|
|
|
|
|
2018-01-12 17:12:15 -05:00
|
|
|
package classic
|
|
|
|
|
|
|
|
import (
|
2019-03-22 09:53:28 -04:00
|
|
|
"context"
|
2018-01-12 17:12:15 -05:00
|
|
|
"fmt"
|
2018-01-25 19:12:03 -05:00
|
|
|
"os"
|
2018-01-12 17:12:15 -05:00
|
|
|
|
2018-01-12 18:44:40 -05:00
|
|
|
"github.com/hashicorp/go-cleanhttp"
|
|
|
|
"github.com/hashicorp/go-oracle-terraform/compute"
|
|
|
|
"github.com/hashicorp/go-oracle-terraform/opc"
|
2019-12-17 05:25:56 -05:00
|
|
|
"github.com/hashicorp/hcl/v2/hcldec"
|
2020-12-17 16:29:25 -05:00
|
|
|
"github.com/hashicorp/packer-plugin-sdk/communicator"
|
|
|
|
"github.com/hashicorp/packer-plugin-sdk/multistep"
|
|
|
|
"github.com/hashicorp/packer-plugin-sdk/multistep/commonsteps"
|
|
|
|
packersdk "github.com/hashicorp/packer-plugin-sdk/packer"
|
2018-01-17 16:07:41 -05:00
|
|
|
ocommon "github.com/hashicorp/packer/builder/oracle/common"
|
2018-01-12 17:12:15 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
// BuilderId uniquely identifies the builder
|
|
|
|
const BuilderId = "packer.oracle.classic"
|
|
|
|
|
|
|
|
// Builder is a builder implementation that creates Oracle OCI custom images.
|
|
|
|
type Builder struct {
|
2019-12-17 05:25:56 -05:00
|
|
|
config Config
|
2018-01-12 17:12:15 -05:00
|
|
|
runner multistep.Runner
|
|
|
|
}
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
func (b *Builder) ConfigSpec() hcldec.ObjectSpec { return b.config.FlatMapstructure().HCL2Spec() }
|
|
|
|
|
2019-12-17 05:57:09 -05:00
|
|
|
func (b *Builder) Prepare(raws ...interface{}) ([]string, []string, error) {
|
2019-12-17 05:25:56 -05:00
|
|
|
err := b.config.Prepare(raws...)
|
2018-01-12 17:12:15 -05:00
|
|
|
if err != nil {
|
2019-12-17 00:23:05 -05:00
|
|
|
return nil, nil, err
|
2018-01-12 17:12:15 -05:00
|
|
|
}
|
|
|
|
|
2020-11-19 15:07:02 -05:00
|
|
|
var errs *packersdk.MultiError
|
2018-09-06 01:44:31 -04:00
|
|
|
|
2020-11-19 15:07:02 -05:00
|
|
|
errs = packersdk.MultiErrorAppend(errs, b.config.PVConfig.Prepare(&b.config.ctx))
|
2018-09-06 01:44:31 -04:00
|
|
|
|
|
|
|
if errs != nil && len(errs.Errors) > 0 {
|
2019-12-17 00:23:05 -05:00
|
|
|
return nil, nil, errs
|
2018-09-06 01:44:31 -04:00
|
|
|
}
|
2019-12-17 00:23:05 -05:00
|
|
|
return nil, nil, nil
|
2018-01-12 17:12:15 -05:00
|
|
|
}
|
|
|
|
|
2020-11-19 18:10:00 -05:00
|
|
|
func (b *Builder) Run(ctx context.Context, ui packersdk.Ui, hook packersdk.Hook) (packersdk.Artifact, error) {
|
2018-01-26 11:43:51 -05:00
|
|
|
loggingEnabled := os.Getenv("PACKER_OCI_CLASSIC_LOGGING") != ""
|
2018-01-12 18:44:40 -05:00
|
|
|
httpClient := cleanhttp.DefaultClient()
|
|
|
|
config := &opc.Config{
|
|
|
|
Username: opc.String(b.config.Username),
|
|
|
|
Password: opc.String(b.config.Password),
|
|
|
|
IdentityDomain: opc.String(b.config.IdentityDomain),
|
|
|
|
APIEndpoint: b.config.apiEndpointURL,
|
|
|
|
LogLevel: opc.LogDebug,
|
2018-01-25 19:12:03 -05:00
|
|
|
Logger: &Logger{loggingEnabled},
|
2018-01-12 18:44:40 -05:00
|
|
|
// Logger: # Leave blank to use the default logger, or provide your own
|
|
|
|
HTTPClient: httpClient,
|
|
|
|
}
|
|
|
|
// Create the Compute Client
|
|
|
|
client, err := compute.NewComputeClient(config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error creating OPC Compute Client: %s", err)
|
|
|
|
}
|
|
|
|
|
2018-10-26 02:56:18 -04:00
|
|
|
runID := fmt.Sprintf("%s_%s", b.config.ImageName, os.Getenv("PACKER_RUN_UUID"))
|
2018-01-12 17:12:15 -05:00
|
|
|
// Populate the state bag
|
|
|
|
state := new(multistep.BasicStateBag)
|
2019-12-19 11:01:55 -05:00
|
|
|
state.Put("config", &b.config)
|
2018-01-12 17:12:15 -05:00
|
|
|
state.Put("hook", hook)
|
|
|
|
state.Put("ui", ui)
|
2018-01-12 18:44:40 -05:00
|
|
|
state.Put("client", client)
|
2018-10-19 18:51:17 -04:00
|
|
|
state.Put("run_id", runID)
|
2018-01-12 17:12:15 -05:00
|
|
|
|
2018-09-05 18:01:14 -04:00
|
|
|
var steps []multistep.Step
|
2018-09-12 20:12:35 -04:00
|
|
|
if b.config.IsPV() {
|
2018-09-05 18:01:14 -04:00
|
|
|
steps = []multistep.Step{
|
2018-09-06 01:44:31 -04:00
|
|
|
&ocommon.StepKeyPair{
|
|
|
|
Debug: b.config.PackerDebug,
|
|
|
|
Comm: &b.config.Comm,
|
|
|
|
DebugKeyPath: fmt.Sprintf("oci_classic_%s.pem", b.config.PackerBuildName),
|
|
|
|
},
|
|
|
|
&stepCreateIPReservation{},
|
2018-10-26 18:47:49 -04:00
|
|
|
&stepAddKeysToAPI{
|
|
|
|
KeyName: fmt.Sprintf("packer-generated-key_%s", runID),
|
|
|
|
},
|
2018-10-26 02:56:18 -04:00
|
|
|
&stepSecurity{
|
2018-10-26 16:00:45 -04:00
|
|
|
CommType: b.config.Comm.Type,
|
2018-10-26 02:56:18 -04:00
|
|
|
SecurityListKey: "security_list_master",
|
|
|
|
},
|
|
|
|
&stepCreatePersistentVolume{
|
|
|
|
VolumeSize: fmt.Sprintf("%d", b.config.PersistentVolumeSize),
|
|
|
|
VolumeName: fmt.Sprintf("master-storage_%s", runID),
|
|
|
|
ImageList: b.config.SourceImageList,
|
|
|
|
ImageListEntry: b.config.SourceImageListEntry,
|
|
|
|
Bootable: true,
|
|
|
|
},
|
2018-09-06 01:44:31 -04:00
|
|
|
&stepCreatePVMaster{
|
2018-10-26 02:56:18 -04:00
|
|
|
Name: fmt.Sprintf("master-instance_%s", runID),
|
|
|
|
VolumeName: fmt.Sprintf("master-storage_%s", runID),
|
|
|
|
SecurityListKey: "security_list_master",
|
2018-09-06 01:44:31 -04:00
|
|
|
},
|
|
|
|
&communicator.StepConnect{
|
|
|
|
Config: &b.config.Comm,
|
2020-01-30 18:22:22 -05:00
|
|
|
Host: communicator.CommHost(b.config.Comm.Host(), "instance_ip"),
|
2018-09-06 01:44:31 -04:00
|
|
|
SSHConfig: b.config.Comm.SSHConfigFunc(),
|
|
|
|
},
|
2020-11-11 18:04:28 -05:00
|
|
|
&commonsteps.StepProvision{},
|
2018-09-06 01:44:31 -04:00
|
|
|
&stepTerminatePVMaster{},
|
2018-10-26 02:56:18 -04:00
|
|
|
&stepSecurity{
|
|
|
|
SecurityListKey: "security_list_builder",
|
2018-10-26 16:00:45 -04:00
|
|
|
CommType: "ssh",
|
2018-10-26 02:56:18 -04:00
|
|
|
},
|
|
|
|
&stepCreatePersistentVolume{
|
|
|
|
// We double the master volume size because we need room to
|
|
|
|
// tarball the disk image. We also need to chunk the tar ball,
|
|
|
|
// but we can remove the original disk image first.
|
|
|
|
VolumeSize: fmt.Sprintf("%d", b.config.PersistentVolumeSize*2),
|
|
|
|
VolumeName: fmt.Sprintf("builder-storage_%s", runID),
|
|
|
|
},
|
2018-09-06 01:44:31 -04:00
|
|
|
&stepCreatePVBuilder{
|
2018-10-22 19:39:04 -04:00
|
|
|
Name: fmt.Sprintf("builder-instance_%s", runID),
|
|
|
|
BuilderVolumeName: fmt.Sprintf("builder-storage_%s", runID),
|
2018-10-26 02:56:18 -04:00
|
|
|
SecurityListKey: "security_list_builder",
|
2018-09-06 01:44:31 -04:00
|
|
|
},
|
2018-09-07 19:18:47 -04:00
|
|
|
&stepAttachVolume{
|
2018-10-22 19:39:04 -04:00
|
|
|
VolumeName: fmt.Sprintf("master-storage_%s", runID),
|
|
|
|
Index: 2,
|
|
|
|
InstanceInfoKey: "builder_instance_info",
|
2018-09-07 19:18:47 -04:00
|
|
|
},
|
2018-10-26 18:47:49 -04:00
|
|
|
&stepConnectBuilder{
|
|
|
|
KeyName: fmt.Sprintf("packer-generated-key_%s", runID),
|
|
|
|
StepConnectSSH: &communicator.StepConnectSSH{
|
|
|
|
Config: &b.config.BuilderComm,
|
2020-01-30 18:22:22 -05:00
|
|
|
Host: communicator.CommHost(b.config.Comm.Host(), "instance_ip"),
|
2018-10-26 18:47:49 -04:00
|
|
|
SSHConfig: b.config.BuilderComm.SSHConfigFunc(),
|
|
|
|
},
|
2018-09-05 18:01:14 -04:00
|
|
|
},
|
2018-10-20 17:11:11 -04:00
|
|
|
&stepUploadImage{
|
2018-10-22 19:39:04 -04:00
|
|
|
UploadImageCommand: b.config.BuilderUploadImageCommand,
|
2018-09-12 20:12:35 -04:00
|
|
|
},
|
2018-10-20 17:11:11 -04:00
|
|
|
&stepCreateImage{},
|
2018-10-20 01:51:58 -04:00
|
|
|
&stepListImages{},
|
2020-11-11 18:04:28 -05:00
|
|
|
&commonsteps.StepCleanupTempKeys{
|
2018-09-27 02:12:13 -04:00
|
|
|
Comm: &b.config.Comm,
|
|
|
|
},
|
2018-09-05 18:01:14 -04:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Build the steps
|
|
|
|
steps = []multistep.Step{
|
|
|
|
&ocommon.StepKeyPair{
|
|
|
|
Debug: b.config.PackerDebug,
|
|
|
|
Comm: &b.config.Comm,
|
|
|
|
DebugKeyPath: fmt.Sprintf("oci_classic_%s.pem", b.config.PackerBuildName),
|
|
|
|
},
|
|
|
|
&stepCreateIPReservation{},
|
2018-10-26 16:00:45 -04:00
|
|
|
&stepAddKeysToAPI{
|
2018-10-26 18:47:49 -04:00
|
|
|
Skip: b.config.Comm.Type != "ssh",
|
|
|
|
KeyName: fmt.Sprintf("packer-generated-key_%s", runID),
|
2018-10-26 16:00:45 -04:00
|
|
|
},
|
2018-10-26 02:56:18 -04:00
|
|
|
&stepSecurity{
|
|
|
|
SecurityListKey: "security_list",
|
2018-10-26 16:00:45 -04:00
|
|
|
CommType: b.config.Comm.Type,
|
2018-10-26 02:56:18 -04:00
|
|
|
},
|
2018-09-05 18:01:14 -04:00
|
|
|
&stepCreateInstance{},
|
|
|
|
&communicator.StepConnect{
|
|
|
|
Config: &b.config.Comm,
|
2020-01-30 18:22:22 -05:00
|
|
|
Host: communicator.CommHost(b.config.Comm.Host(), "instance_ip"),
|
2018-09-05 18:01:14 -04:00
|
|
|
SSHConfig: b.config.Comm.SSHConfigFunc(),
|
|
|
|
},
|
2020-11-11 18:04:28 -05:00
|
|
|
&commonsteps.StepProvision{},
|
|
|
|
&commonsteps.StepCleanupTempKeys{
|
2018-09-05 18:01:14 -04:00
|
|
|
Comm: &b.config.Comm,
|
|
|
|
},
|
|
|
|
&stepSnapshot{},
|
|
|
|
&stepListImages{},
|
|
|
|
}
|
2018-01-12 17:12:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Run the steps
|
2020-11-11 18:04:28 -05:00
|
|
|
b.runner = commonsteps.NewRunner(steps, b.config.PackerConfig, ui)
|
2019-03-22 09:53:28 -04:00
|
|
|
b.runner.Run(ctx, state)
|
2018-01-12 17:12:15 -05:00
|
|
|
|
|
|
|
// If there was an error, return that
|
|
|
|
if rawErr, ok := state.GetOk("error"); ok {
|
|
|
|
return nil, rawErr.(error)
|
|
|
|
}
|
|
|
|
|
2018-01-25 19:29:24 -05:00
|
|
|
// If there is no snapshot, then just return
|
2018-10-26 02:56:18 -04:00
|
|
|
if _, ok := state.GetOk("machine_image_name"); !ok {
|
2018-01-25 19:29:24 -05:00
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2018-01-23 21:13:51 -05:00
|
|
|
// Build the artifact and return it
|
|
|
|
artifact := &Artifact{
|
2018-01-31 13:47:19 -05:00
|
|
|
ImageListVersion: state.Get("image_list_version").(int),
|
|
|
|
MachineImageName: state.Get("machine_image_name").(string),
|
|
|
|
MachineImageFile: state.Get("machine_image_file").(string),
|
2020-01-30 05:27:58 -05:00
|
|
|
StateData: map[string]interface{}{"generated_data": state.Get("generated_data")},
|
2018-01-23 21:13:51 -05:00
|
|
|
}
|
2018-01-12 17:12:15 -05:00
|
|
|
|
2018-01-23 21:13:51 -05:00
|
|
|
return artifact, nil
|
2018-01-12 17:12:15 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Cancel terminates a running build.
|