2013-05-09 14:16:39 -07:00
|
|
|
// The amazonebs package contains a packer.Builder implementation that
|
|
|
|
// builds AMIs for Amazon EC2.
|
|
|
|
//
|
|
|
|
// In general, there are two types of AMIs that can be created: ebs-backed or
|
|
|
|
// instance-store. This builder _only_ builds ebs-backed images.
|
2013-07-15 15:02:18 +09:00
|
|
|
package ebs
|
2013-05-08 22:34:20 -07:00
|
|
|
|
|
|
|
import (
|
2013-08-30 14:48:50 -07:00
|
|
|
"fmt"
|
2014-06-04 14:58:11 -07:00
|
|
|
"log"
|
|
|
|
|
2015-06-03 17:13:52 -04:00
|
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
2017-04-04 13:39:01 -07:00
|
|
|
awscommon "github.com/hashicorp/packer/builder/amazon/common"
|
|
|
|
"github.com/hashicorp/packer/common"
|
|
|
|
"github.com/hashicorp/packer/helper/communicator"
|
|
|
|
"github.com/hashicorp/packer/helper/config"
|
2018-01-19 16:18:44 -08:00
|
|
|
"github.com/hashicorp/packer/helper/multistep"
|
2017-04-04 13:39:01 -07:00
|
|
|
"github.com/hashicorp/packer/packer"
|
|
|
|
"github.com/hashicorp/packer/template/interpolate"
|
2013-05-08 22:34:20 -07:00
|
|
|
)
|
|
|
|
|
2013-05-21 22:28:41 -07:00
|
|
|
// The unique ID for this builder
|
|
|
|
const BuilderId = "mitchellh.amazonebs"
|
|
|
|
|
2015-05-27 11:35:56 -07:00
|
|
|
type Config struct {
|
2013-07-16 13:28:49 +09:00
|
|
|
common.PackerConfig `mapstructure:",squash"`
|
2013-07-16 13:08:19 +09:00
|
|
|
awscommon.AccessConfig `mapstructure:",squash"`
|
2013-08-08 22:50:23 -07:00
|
|
|
awscommon.AMIConfig `mapstructure:",squash"`
|
2013-08-15 14:05:08 -07:00
|
|
|
awscommon.BlockDevices `mapstructure:",squash"`
|
2013-07-16 13:23:40 +09:00
|
|
|
awscommon.RunConfig `mapstructure:",squash"`
|
2018-02-02 20:16:23 -08:00
|
|
|
VolumeRunTags awscommon.TagMap `mapstructure:"run_volume_tags"`
|
2013-05-20 16:50:35 -07:00
|
|
|
|
2015-06-22 09:22:42 -07:00
|
|
|
ctx interpolate.Context
|
2013-05-08 22:34:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
type Builder struct {
|
2017-12-08 14:56:19 -08:00
|
|
|
config Config
|
|
|
|
runner multistep.Runner
|
2013-05-08 22:34:20 -07:00
|
|
|
}
|
|
|
|
|
2013-11-02 22:56:54 -05:00
|
|
|
func (b *Builder) Prepare(raws ...interface{}) ([]string, error) {
|
2015-06-22 09:22:42 -07:00
|
|
|
b.config.ctx.Funcs = awscommon.TemplateFuncs
|
2015-05-27 11:35:56 -07:00
|
|
|
err := config.Decode(&b.config, &config.DecodeOpts{
|
|
|
|
Interpolate: true,
|
2015-06-22 09:22:42 -07:00
|
|
|
InterpolateContext: &b.config.ctx,
|
2017-01-10 11:41:28 +01:00
|
|
|
InterpolateFilter: &interpolate.RenderFilter{
|
|
|
|
Exclude: []string{
|
|
|
|
"ami_description",
|
|
|
|
"run_tags",
|
|
|
|
"run_volume_tags",
|
2017-10-12 23:33:01 +02:00
|
|
|
"spot_tags",
|
2017-01-10 11:41:28 +01:00
|
|
|
"snapshot_tags",
|
|
|
|
"tags",
|
|
|
|
},
|
|
|
|
},
|
2015-05-27 11:35:56 -07:00
|
|
|
}, raws...)
|
2013-07-14 09:28:56 +09:00
|
|
|
if err != nil {
|
2013-11-02 22:56:54 -05:00
|
|
|
return nil, err
|
2013-07-14 09:28:56 +09:00
|
|
|
}
|
2013-06-14 12:29:48 -07:00
|
|
|
|
2017-03-09 14:24:49 -08:00
|
|
|
if b.config.PackerConfig.PackerForce {
|
|
|
|
b.config.AMIForceDeregister = true
|
|
|
|
}
|
|
|
|
|
2013-07-14 09:28:56 +09:00
|
|
|
// Accumulate any errors
|
2015-05-27 11:35:56 -07:00
|
|
|
var errs *packer.MultiError
|
2015-06-22 09:22:42 -07:00
|
|
|
errs = packer.MultiErrorAppend(errs, b.config.AccessConfig.Prepare(&b.config.ctx)...)
|
2017-10-30 14:17:19 -07:00
|
|
|
errs = packer.MultiErrorAppend(errs,
|
|
|
|
b.config.AMIConfig.Prepare(&b.config.AccessConfig, &b.config.ctx)...)
|
2015-06-22 09:22:42 -07:00
|
|
|
errs = packer.MultiErrorAppend(errs, b.config.BlockDevices.Prepare(&b.config.ctx)...)
|
|
|
|
errs = packer.MultiErrorAppend(errs, b.config.RunConfig.Prepare(&b.config.ctx)...)
|
2013-07-14 09:28:56 +09:00
|
|
|
|
2018-10-19 12:21:00 +01:00
|
|
|
if b.config.IsSpotInstance() && ((b.config.AMIENASupport != nil && *b.config.AMIENASupport) || b.config.AMISriovNetSupport) {
|
2017-12-08 14:56:19 -08:00
|
|
|
errs = packer.MultiErrorAppend(errs,
|
|
|
|
fmt.Errorf("Spot instances do not support modification, which is required "+
|
|
|
|
"when either `ena_support` or `sriov_support` are set. Please ensure "+
|
|
|
|
"you use an AMI that already has either SR-IOV or ENA enabled."))
|
2017-12-07 15:27:40 -08:00
|
|
|
}
|
|
|
|
|
2013-07-19 19:08:25 -04:00
|
|
|
if errs != nil && len(errs.Errors) > 0 {
|
2013-11-02 22:56:54 -05:00
|
|
|
return nil, errs
|
2013-06-08 17:41:56 -07:00
|
|
|
}
|
2013-05-10 13:01:54 -07:00
|
|
|
|
2018-08-10 14:25:14 -07:00
|
|
|
packer.LogSecretFilter.Set(b.config.AccessKey, b.config.SecretKey, b.config.Token)
|
2013-11-02 22:56:54 -05:00
|
|
|
return nil, nil
|
2013-05-09 10:54:42 -07:00
|
|
|
}
|
2013-05-08 22:34:20 -07:00
|
|
|
|
Use the hashicorp/go-getter to download files
* removed packer.Cache and references since packer.Cache is never used except in the download step. The download step now uses the new func packer.CachePath(targetPath) for this, the behavior is the same.
* removed download code from packer that was reimplemented into the go-getter library: progress bar, http download restart, checksuming from file, skip already downloaded files, symlinking, make a download cancellable by context.
* on windows if packer is running without symlinking rights and we are getting a local file, the file will be copied instead to avoid errors.
* added unit tests for step_download that are now CI tested on windows, mac & linux.
* files are now downloaded under cache dir `sha1(filename + "?checksum=" + checksum) + file_extension`
* since the output dir is based on the source url and the checksum, when the checksum fails, the file is auto deleted.
* a download file is protected and locked by a file lock,
* updated docs
* updated go modules and vendors
2019-03-13 12:11:58 +01:00
|
|
|
func (b *Builder) Run(ui packer.Ui, hook packer.Hook) (packer.Artifact, error) {
|
|
|
|
|
2017-03-01 16:43:09 -08:00
|
|
|
session, err := b.config.Session()
|
2016-11-01 15:53:04 -07:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-02-05 14:07:04 -08:00
|
|
|
|
2019-03-04 16:19:39 -08:00
|
|
|
ec2conn := ec2.New(session)
|
2013-05-10 15:21:11 -07:00
|
|
|
|
2013-05-21 00:55:32 -07:00
|
|
|
// Setup the state bag and initial state for the steps
|
2013-08-31 13:00:43 -07:00
|
|
|
state := new(multistep.BasicStateBag)
|
2018-09-18 15:50:37 +02:00
|
|
|
state.Put("config", &b.config)
|
2019-02-05 14:07:04 -08:00
|
|
|
state.Put("access_config", &b.config.AccessConfig)
|
|
|
|
state.Put("ami_config", &b.config.AMIConfig)
|
2013-08-31 13:00:43 -07:00
|
|
|
state.Put("ec2", ec2conn)
|
2017-12-19 11:04:17 -08:00
|
|
|
state.Put("awsSession", session)
|
2013-08-31 13:00:43 -07:00
|
|
|
state.Put("hook", hook)
|
|
|
|
state.Put("ui", ui)
|
2013-05-10 15:21:11 -07:00
|
|
|
|
2017-10-04 11:29:38 +02:00
|
|
|
var instanceStep multistep.Step
|
|
|
|
|
2017-12-08 14:56:19 -08:00
|
|
|
if b.config.IsSpotInstance() {
|
2017-10-23 12:16:12 -07:00
|
|
|
instanceStep = &awscommon.StepRunSpotInstance{
|
2017-12-08 14:56:19 -08:00
|
|
|
AssociatePublicIpAddress: b.config.AssociatePublicIpAddress,
|
|
|
|
BlockDevices: b.config.BlockDevices,
|
2018-09-03 14:33:58 +08:00
|
|
|
BlockDurationMinutes: b.config.BlockDurationMinutes,
|
2017-12-08 14:56:19 -08:00
|
|
|
Ctx: b.config.ctx,
|
2018-09-11 18:20:14 -07:00
|
|
|
Comm: &b.config.RunConfig.Comm,
|
2017-12-08 14:56:19 -08:00
|
|
|
Debug: b.config.PackerDebug,
|
|
|
|
EbsOptimized: b.config.EbsOptimized,
|
|
|
|
ExpectedRootDevice: "ebs",
|
|
|
|
IamInstanceProfile: b.config.IamInstanceProfile,
|
2017-10-04 11:29:38 +02:00
|
|
|
InstanceInitiatedShutdownBehavior: b.config.InstanceInitiatedShutdownBehavior,
|
2017-12-08 14:56:19 -08:00
|
|
|
InstanceType: b.config.InstanceType,
|
|
|
|
SourceAMI: b.config.SourceAmi,
|
|
|
|
SpotPrice: b.config.SpotPrice,
|
|
|
|
SpotPriceProduct: b.config.SpotPriceAutoProduct,
|
2017-10-12 23:33:01 +02:00
|
|
|
SpotTags: b.config.SpotTags,
|
2017-12-08 14:56:19 -08:00
|
|
|
Tags: b.config.RunTags,
|
|
|
|
UserData: b.config.UserData,
|
|
|
|
UserDataFile: b.config.UserDataFile,
|
|
|
|
VolumeTags: b.config.VolumeRunTags,
|
2017-10-04 11:29:38 +02:00
|
|
|
}
|
|
|
|
} else {
|
2017-10-23 12:16:12 -07:00
|
|
|
instanceStep = &awscommon.StepRunSourceInstance{
|
2017-12-08 14:56:19 -08:00
|
|
|
AssociatePublicIpAddress: b.config.AssociatePublicIpAddress,
|
|
|
|
BlockDevices: b.config.BlockDevices,
|
2018-08-30 12:50:29 +02:00
|
|
|
Comm: &b.config.RunConfig.Comm,
|
2017-12-08 14:56:19 -08:00
|
|
|
Ctx: b.config.ctx,
|
|
|
|
Debug: b.config.PackerDebug,
|
|
|
|
EbsOptimized: b.config.EbsOptimized,
|
2018-05-13 17:16:10 +01:00
|
|
|
EnableT2Unlimited: b.config.EnableT2Unlimited,
|
2017-12-08 14:56:19 -08:00
|
|
|
ExpectedRootDevice: "ebs",
|
|
|
|
IamInstanceProfile: b.config.IamInstanceProfile,
|
2017-10-04 11:29:38 +02:00
|
|
|
InstanceInitiatedShutdownBehavior: b.config.InstanceInitiatedShutdownBehavior,
|
2017-12-08 14:56:19 -08:00
|
|
|
InstanceType: b.config.InstanceType,
|
2018-02-02 20:16:23 -08:00
|
|
|
IsRestricted: b.config.IsChinaCloud() || b.config.IsGovCloud(),
|
2017-12-08 14:56:19 -08:00
|
|
|
SourceAMI: b.config.SourceAmi,
|
|
|
|
Tags: b.config.RunTags,
|
|
|
|
UserData: b.config.UserData,
|
|
|
|
UserDataFile: b.config.UserDataFile,
|
|
|
|
VolumeTags: b.config.VolumeRunTags,
|
2017-10-04 11:29:38 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-21 00:55:32 -07:00
|
|
|
// Build the steps
|
2013-06-04 10:00:06 -07:00
|
|
|
steps := []multistep.Step{
|
2015-06-08 17:08:39 -05:00
|
|
|
&awscommon.StepPreValidate{
|
2015-06-12 13:05:15 -05:00
|
|
|
DestAmiName: b.config.AMIName,
|
|
|
|
ForceDeregister: b.config.AMIForceDeregister,
|
2015-06-08 17:08:39 -05:00
|
|
|
},
|
2014-06-04 14:58:11 -07:00
|
|
|
&awscommon.StepSourceAMIInfo{
|
2017-08-28 09:18:23 -07:00
|
|
|
SourceAmi: b.config.SourceAmi,
|
|
|
|
EnableAMISriovNetSupport: b.config.AMISriovNetSupport,
|
|
|
|
EnableAMIENASupport: b.config.AMIENASupport,
|
|
|
|
AmiFilters: b.config.SourceAmiFilter,
|
2018-09-04 18:13:18 -07:00
|
|
|
AMIVirtType: b.config.AMIVirtType,
|
2014-06-04 14:58:11 -07:00
|
|
|
},
|
2018-06-12 12:05:16 +02:00
|
|
|
&awscommon.StepNetworkInfo{
|
2018-08-14 12:04:13 +02:00
|
|
|
VpcId: b.config.VpcId,
|
|
|
|
VpcFilter: b.config.VpcFilter,
|
|
|
|
SecurityGroupIds: b.config.SecurityGroupIds,
|
|
|
|
SecurityGroupFilter: b.config.SecurityGroupFilter,
|
|
|
|
SubnetId: b.config.SubnetId,
|
|
|
|
SubnetFilter: b.config.SubnetFilter,
|
|
|
|
AvailabilityZone: b.config.AvailabilityZone,
|
2018-06-12 12:05:16 +02:00
|
|
|
},
|
2013-08-30 14:48:50 -07:00
|
|
|
&awscommon.StepKeyPair{
|
2018-08-28 17:47:02 +02:00
|
|
|
Debug: b.config.PackerDebug,
|
|
|
|
Comm: &b.config.RunConfig.Comm,
|
|
|
|
DebugKeyPath: fmt.Sprintf("ec2_%s.pem", b.config.PackerBuildName),
|
2013-08-30 14:48:50 -07:00
|
|
|
},
|
2013-07-20 19:50:55 -07:00
|
|
|
&awscommon.StepSecurityGroup{
|
2019-03-30 15:47:03 -07:00
|
|
|
SecurityGroupFilter: b.config.SecurityGroupFilter,
|
|
|
|
SecurityGroupIds: b.config.SecurityGroupIds,
|
|
|
|
CommConfig: &b.config.RunConfig.Comm,
|
|
|
|
TemporarySGSourceCidrs: b.config.TemporarySGSourceCidrs,
|
2013-07-20 19:58:27 -07:00
|
|
|
},
|
2018-07-26 09:30:51 +03:00
|
|
|
&awscommon.StepCleanupVolumes{
|
2015-06-18 13:23:48 -05:00
|
|
|
BlockDevices: b.config.BlockDevices,
|
|
|
|
},
|
2017-10-04 11:29:38 +02:00
|
|
|
instanceStep,
|
2015-06-13 22:35:45 -07:00
|
|
|
&awscommon.StepGetPassword{
|
2018-04-16 11:51:04 -07:00
|
|
|
Debug: b.config.PackerDebug,
|
|
|
|
Comm: &b.config.RunConfig.Comm,
|
|
|
|
Timeout: b.config.WindowsPasswordTimeout,
|
|
|
|
BuildName: b.config.PackerBuildName,
|
2015-06-13 22:35:45 -07:00
|
|
|
},
|
2015-06-13 18:16:12 -04:00
|
|
|
&communicator.StepConnect{
|
|
|
|
Config: &b.config.RunConfig.Comm,
|
2015-06-13 19:23:33 -04:00
|
|
|
Host: awscommon.SSHHost(
|
2015-06-13 18:16:12 -04:00
|
|
|
ec2conn,
|
2018-08-29 14:28:09 +02:00
|
|
|
b.config.Comm.SSHInterface),
|
2018-08-22 17:02:23 +02:00
|
|
|
SSHConfig: b.config.RunConfig.Comm.SSHConfigFunc(),
|
2013-07-15 14:06:41 +09:00
|
|
|
},
|
2013-07-16 15:44:41 +09:00
|
|
|
&common.StepProvision{},
|
2018-09-14 11:03:23 -07:00
|
|
|
&common.StepCleanupTempKeys{
|
|
|
|
Comm: &b.config.RunConfig.Comm,
|
|
|
|
},
|
builder/amazon: Add `ebs-volume` builder
This commit adds a builder that works like EBS builders, except does not
create an AMI, and instead is intended to create EBS volumes in an
initialized state. For example, the following template can be used to
create and export a set of 3 EBS Volumes in a ZFS zpool named `data` for
importing by instances running production systems:
```
{
"variables": {
"aws_access_key_id": "{{ env `AWS_ACCESS_KEY_ID` }}",
"aws_secret_access_key": "{{ env `AWS_SECRET_ACCESS_KEY` }}",
"region": "{{ env `AWS_REGION` }}",
"source_ami": "{{ env `PACKER_SOURCE_AMI` }}",
"vpc_id": "{{ env `PACKER_VPC_ID` }}",
"subnet_id": "{{ env `PACKER_SUBNET_ID` }}"
},
"builders": [{
"type": "amazon-ebs-volume",
"access_key": "{{ user `aws_access_key_id` }}",
"secret_key": "{{ user `aws_secret_access_key` }}",
"region": "{{user `region`}}",
"spot_price_auto_product": "Linux/UNIX (Amazon VPC)",
"ssh_pty": true,
"instance_type": "t2.medium",
"vpc_id": "{{user `vpc_id` }}",
"subnet_id": "{{user `subnet_id` }}",
"associate_public_ip_address": true,
"source_ami": "{{user `source_ami` }}",
"ssh_username": "ubuntu",
"ssh_timeout": "5m",
"ebs_volumes": [
{
"device_name": "/dev/xvdf",
"delete_on_termination": false,
"volume_size": 10,
"volume_type": "gp2",
"tags": {
"Name": "TeamCity-Data1",
"zpool": "data",
"Component": "TeamCity"
}
},
{
"device_name": "/dev/xvdg",
"delete_on_termination": false,
"volume_size": 10,
"volume_type": "gp2",
"tags": {
"Name": "TeamCity-Data2",
"zpool": "data",
"Component": "TeamCity"
}
},
{
"device_name": "/dev/xvdh",
"delete_on_termination": false,
"volume_size": 10,
"volume_type": "gp2",
"tags": {
"Name": "TeamCity-Data3",
"zpool": "data",
"Component": "TeamCity"
}
}
]
}],
"provisioners": [
{
"type": "shell",
"start_retry_timeout": "10m",
"inline": [
"DEBIAN_FRONTEND=noninteractive sudo apt-get update",
"DEBIAN_FRONTEND=noninteractive sudo apt-get install -y zfs",
"lsblk",
"sudo parted /dev/xvdf --script mklabel GPT",
"sudo parted /dev/xvdg --script mklabel GPT",
"sudo parted /dev/xvdh --script mklabel GPT",
"sudo zpool create -m none data raidz xvdf xvdg xvdh",
"sudo zpool status",
"sudo zpool export data",
"sudo zpool status"
]
}
]
}
```
StepModifyInstance and StepStopInstance are now shared between EBS and
EBS-Volume builders - move them into the AWS common directory and rename
them to indicate that they only apply to EBS-backed builders.
2016-10-31 16:44:41 -05:00
|
|
|
&awscommon.StepStopEBSBackedInstance{
|
2017-12-08 14:56:19 -08:00
|
|
|
Skip: b.config.IsSpotInstance(),
|
2016-03-14 13:49:42 -04:00
|
|
|
DisableStopInstance: b.config.DisableStopInstance,
|
|
|
|
},
|
builder/amazon: Add `ebs-volume` builder
This commit adds a builder that works like EBS builders, except does not
create an AMI, and instead is intended to create EBS volumes in an
initialized state. For example, the following template can be used to
create and export a set of 3 EBS Volumes in a ZFS zpool named `data` for
importing by instances running production systems:
```
{
"variables": {
"aws_access_key_id": "{{ env `AWS_ACCESS_KEY_ID` }}",
"aws_secret_access_key": "{{ env `AWS_SECRET_ACCESS_KEY` }}",
"region": "{{ env `AWS_REGION` }}",
"source_ami": "{{ env `PACKER_SOURCE_AMI` }}",
"vpc_id": "{{ env `PACKER_VPC_ID` }}",
"subnet_id": "{{ env `PACKER_SUBNET_ID` }}"
},
"builders": [{
"type": "amazon-ebs-volume",
"access_key": "{{ user `aws_access_key_id` }}",
"secret_key": "{{ user `aws_secret_access_key` }}",
"region": "{{user `region`}}",
"spot_price_auto_product": "Linux/UNIX (Amazon VPC)",
"ssh_pty": true,
"instance_type": "t2.medium",
"vpc_id": "{{user `vpc_id` }}",
"subnet_id": "{{user `subnet_id` }}",
"associate_public_ip_address": true,
"source_ami": "{{user `source_ami` }}",
"ssh_username": "ubuntu",
"ssh_timeout": "5m",
"ebs_volumes": [
{
"device_name": "/dev/xvdf",
"delete_on_termination": false,
"volume_size": 10,
"volume_type": "gp2",
"tags": {
"Name": "TeamCity-Data1",
"zpool": "data",
"Component": "TeamCity"
}
},
{
"device_name": "/dev/xvdg",
"delete_on_termination": false,
"volume_size": 10,
"volume_type": "gp2",
"tags": {
"Name": "TeamCity-Data2",
"zpool": "data",
"Component": "TeamCity"
}
},
{
"device_name": "/dev/xvdh",
"delete_on_termination": false,
"volume_size": 10,
"volume_type": "gp2",
"tags": {
"Name": "TeamCity-Data3",
"zpool": "data",
"Component": "TeamCity"
}
}
]
}],
"provisioners": [
{
"type": "shell",
"start_retry_timeout": "10m",
"inline": [
"DEBIAN_FRONTEND=noninteractive sudo apt-get update",
"DEBIAN_FRONTEND=noninteractive sudo apt-get install -y zfs",
"lsblk",
"sudo parted /dev/xvdf --script mklabel GPT",
"sudo parted /dev/xvdg --script mklabel GPT",
"sudo parted /dev/xvdh --script mklabel GPT",
"sudo zpool create -m none data raidz xvdf xvdg xvdh",
"sudo zpool status",
"sudo zpool export data",
"sudo zpool status"
]
}
]
}
```
StepModifyInstance and StepStopInstance are now shared between EBS and
EBS-Volume builders - move them into the AWS common directory and rename
them to indicate that they only apply to EBS-backed builders.
2016-10-31 16:44:41 -05:00
|
|
|
&awscommon.StepModifyEBSBackedInstance{
|
2017-08-28 09:18:23 -07:00
|
|
|
EnableAMISriovNetSupport: b.config.AMISriovNetSupport,
|
|
|
|
EnableAMIENASupport: b.config.AMIENASupport,
|
builder/amazon: Add `ebs-volume` builder
This commit adds a builder that works like EBS builders, except does not
create an AMI, and instead is intended to create EBS volumes in an
initialized state. For example, the following template can be used to
create and export a set of 3 EBS Volumes in a ZFS zpool named `data` for
importing by instances running production systems:
```
{
"variables": {
"aws_access_key_id": "{{ env `AWS_ACCESS_KEY_ID` }}",
"aws_secret_access_key": "{{ env `AWS_SECRET_ACCESS_KEY` }}",
"region": "{{ env `AWS_REGION` }}",
"source_ami": "{{ env `PACKER_SOURCE_AMI` }}",
"vpc_id": "{{ env `PACKER_VPC_ID` }}",
"subnet_id": "{{ env `PACKER_SUBNET_ID` }}"
},
"builders": [{
"type": "amazon-ebs-volume",
"access_key": "{{ user `aws_access_key_id` }}",
"secret_key": "{{ user `aws_secret_access_key` }}",
"region": "{{user `region`}}",
"spot_price_auto_product": "Linux/UNIX (Amazon VPC)",
"ssh_pty": true,
"instance_type": "t2.medium",
"vpc_id": "{{user `vpc_id` }}",
"subnet_id": "{{user `subnet_id` }}",
"associate_public_ip_address": true,
"source_ami": "{{user `source_ami` }}",
"ssh_username": "ubuntu",
"ssh_timeout": "5m",
"ebs_volumes": [
{
"device_name": "/dev/xvdf",
"delete_on_termination": false,
"volume_size": 10,
"volume_type": "gp2",
"tags": {
"Name": "TeamCity-Data1",
"zpool": "data",
"Component": "TeamCity"
}
},
{
"device_name": "/dev/xvdg",
"delete_on_termination": false,
"volume_size": 10,
"volume_type": "gp2",
"tags": {
"Name": "TeamCity-Data2",
"zpool": "data",
"Component": "TeamCity"
}
},
{
"device_name": "/dev/xvdh",
"delete_on_termination": false,
"volume_size": 10,
"volume_type": "gp2",
"tags": {
"Name": "TeamCity-Data3",
"zpool": "data",
"Component": "TeamCity"
}
}
]
}],
"provisioners": [
{
"type": "shell",
"start_retry_timeout": "10m",
"inline": [
"DEBIAN_FRONTEND=noninteractive sudo apt-get update",
"DEBIAN_FRONTEND=noninteractive sudo apt-get install -y zfs",
"lsblk",
"sudo parted /dev/xvdf --script mklabel GPT",
"sudo parted /dev/xvdg --script mklabel GPT",
"sudo parted /dev/xvdh --script mklabel GPT",
"sudo zpool create -m none data raidz xvdf xvdg xvdh",
"sudo zpool status",
"sudo zpool export data",
"sudo zpool status"
]
}
]
}
```
StepModifyInstance and StepStopInstance are now shared between EBS and
EBS-Volume builders - move them into the AWS common directory and rename
them to indicate that they only apply to EBS-backed builders.
2016-10-31 16:44:41 -05:00
|
|
|
},
|
2015-06-12 13:05:15 -05:00
|
|
|
&awscommon.StepDeregisterAMI{
|
2017-08-14 09:20:08 -07:00
|
|
|
AccessConfig: &b.config.AccessConfig,
|
2016-11-30 13:28:34 -08:00
|
|
|
ForceDeregister: b.config.AMIForceDeregister,
|
|
|
|
ForceDeleteSnapshot: b.config.AMIForceDeleteSnapshot,
|
|
|
|
AMIName: b.config.AMIName,
|
2017-08-14 09:20:08 -07:00
|
|
|
Regions: b.config.AMIRegions,
|
2015-06-12 13:05:15 -05:00
|
|
|
},
|
2013-08-06 14:54:14 -07:00
|
|
|
&stepCreateAMI{},
|
2013-09-04 16:06:06 -07:00
|
|
|
&awscommon.StepAMIRegionCopy{
|
2017-05-26 12:21:07 -07:00
|
|
|
AccessConfig: &b.config.AccessConfig,
|
|
|
|
Regions: b.config.AMIRegions,
|
2017-05-31 13:41:32 -07:00
|
|
|
RegionKeyIds: b.config.AMIRegionKMSKeyIDs,
|
2017-05-26 12:21:07 -07:00
|
|
|
EncryptBootVolume: b.config.AMIEncryptBootVolume,
|
|
|
|
Name: b.config.AMIName,
|
2013-09-04 16:06:06 -07:00
|
|
|
},
|
2013-08-22 15:35:47 -07:00
|
|
|
&awscommon.StepModifyAMIAttributes{
|
2016-12-02 09:49:21 +01:00
|
|
|
Description: b.config.AMIDescription,
|
|
|
|
Users: b.config.AMIUsers,
|
|
|
|
Groups: b.config.AMIGroups,
|
|
|
|
ProductCodes: b.config.AMIProductCodes,
|
|
|
|
SnapshotUsers: b.config.SnapshotUsers,
|
|
|
|
SnapshotGroups: b.config.SnapshotGroups,
|
2017-01-10 11:41:28 +01:00
|
|
|
Ctx: b.config.ctx,
|
2013-08-22 15:35:47 -07:00
|
|
|
},
|
2013-08-22 15:09:21 -07:00
|
|
|
&awscommon.StepCreateTags{
|
2016-10-16 22:19:55 -04:00
|
|
|
Tags: b.config.AMITags,
|
|
|
|
SnapshotTags: b.config.SnapshotTags,
|
2017-01-10 11:41:28 +01:00
|
|
|
Ctx: b.config.ctx,
|
2013-08-22 15:03:30 -07:00
|
|
|
},
|
2013-05-20 23:18:44 -07:00
|
|
|
}
|
|
|
|
|
2013-05-21 00:55:32 -07:00
|
|
|
// Run!
|
2016-09-14 00:04:18 +00:00
|
|
|
b.runner = common.NewRunner(steps, b.config.PackerConfig, ui)
|
2013-06-04 10:53:35 -07:00
|
|
|
b.runner.Run(state)
|
2013-06-19 20:54:02 -07:00
|
|
|
// If there was an error, return that
|
2013-08-31 13:00:43 -07:00
|
|
|
if rawErr, ok := state.GetOk("error"); ok {
|
2013-06-19 20:54:02 -07:00
|
|
|
return nil, rawErr.(error)
|
|
|
|
}
|
|
|
|
|
2013-06-18 21:54:33 -07:00
|
|
|
// If there are no AMIs, then just return
|
2013-08-31 13:00:43 -07:00
|
|
|
if _, ok := state.GetOk("amis"); !ok {
|
2013-06-12 16:06:56 -07:00
|
|
|
return nil, nil
|
2013-06-04 10:59:12 -07:00
|
|
|
}
|
|
|
|
|
2013-05-21 22:28:41 -07:00
|
|
|
// Build the artifact and return it
|
2013-07-20 20:08:41 -07:00
|
|
|
artifact := &awscommon.Artifact{
|
2013-08-31 13:00:43 -07:00
|
|
|
Amis: state.Get("amis").(map[string]string),
|
2013-07-20 20:08:41 -07:00
|
|
|
BuilderIdValue: BuilderId,
|
2017-12-19 11:04:17 -08:00
|
|
|
Session: session,
|
2013-06-18 16:24:35 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return artifact, nil
|
2013-05-10 13:01:54 -07:00
|
|
|
}
|
2013-06-03 14:44:34 -07:00
|
|
|
|
|
|
|
func (b *Builder) Cancel() {
|
2013-06-04 10:53:35 -07:00
|
|
|
if b.runner != nil {
|
|
|
|
log.Println("Cancelling the step runner...")
|
|
|
|
b.runner.Cancel()
|
|
|
|
}
|
2013-06-03 14:44:34 -07:00
|
|
|
}
|