Commit Graph

16206 Commits

Author SHA1 Message Date
Adrien Delorme 0cf7af4247 add sshkey.Generate function 2020-10-12 18:04:02 +02:00
Megan Marsh 01ed398756
fix up alicloud docs to make it clearer that disk_size and other disk device options are not top level fields. (#10080) 2020-10-12 10:28:25 +02:00
Wilken Rivera d378a4477a
Merge pull request #10079 from hashicorp/vsphere_cluster_host_investigation
fix docs linking issue
2020-10-09 22:11:31 -04:00
Megan Marsh 709a173060 fix docs linking issue 2020-10-09 14:01:21 -07:00
Megan Marsh b460d687ea
Merge pull request #10068 from jmfury/jm.website-bump-hsm-menu
Bump HSM version and rm meganav styles
2020-10-09 10:15:23 -07:00
Megan Marsh 774a168957
Merge pull request #10064 from hashicorp/refactor_step_run
builder/qemu: (tech-debt) Major refactor of step_run.
2020-10-08 11:54:34 -07:00
Jimmy Merritello 7ed2c2920f
Bump HSM version and rm meganav styles 2020-10-08 13:53:36 -05:00
Megan Marsh 3e35630d8d remove slashes to prevent windows test fails 2020-10-08 11:36:36 -07:00
James Cradock 153d4111fa
Fix typo in build argument description (#10066) 2020-10-08 14:58:22 +02:00
Megan Marsh 62a401ef28
Fix 10060 (#10065)
* fix overeager validation
* fix validation of openstack source images
2020-10-08 10:54:41 +02:00
Megan Marsh d6aa172edc remove typo'd option from docs 2020-10-07 16:14:13 -07:00
Megan Marsh d7ba10c23e update changelog 2020-10-07 15:52:06 -07:00
Megan Marsh f076c97e5c
Merge pull request #10062 from jmfury/jm.add-hashi-stack-menu
[Website] Add new HashiStackMenu
2020-10-07 15:36:31 -07:00
Megan Marsh 8e632866b1 typo 2020-10-07 15:22:08 -07:00
Megan Marsh b54b778572 major refactor of the step_run. Splits step into two major parts:
- generating defaults
- overriding defaults with user args

The default generation has been shuffled around some, in order to
make sure that any changes to a specific arg happen in one place
to make it easier to reason about those args. Related args have
been moved close to one another.

The deviceArgs and driveArgs were overly complex after several
layers of copy/paste modifications. Careful pruning reduced the
layers of logic and repeated code, to help make it easier to reason
about.
2020-10-07 15:09:45 -07:00
Jimmy Merritello ea3b804af1
Bump version 2020-10-07 15:30:18 -05:00
Adrien Delorme 14e253f316
upgrade panicwrap to v1 (#10059)
* and go mod tidy this allows us to get rid of a dep
2020-10-07 11:22:32 -04:00
Jimmy Merritello 7f0a043a63
Add new HashiStackMenu 2020-10-07 09:57:47 -05:00
Patrik d4d78feed2
feat(scaleway): get image by label if not an UUID (#10061)
Signed-off-by: Patrik Cyvoct <patrik@ptrk.io>
2020-10-07 16:04:00 +02:00
abarbare a478bf6f37
fix: update scaleway website documentation (#10058) 2020-10-07 12:02:08 +02:00
Ricardo Rosales 809f38be3a
[azure-chroot] Updating parameter `exlude_from_latest` to `exclude_from_latest` (#10034) 2020-10-07 11:08:33 +02:00
Megan Marsh 61c6085651
final fix to make service account impersonation work with iap tunnels (#10054) 2020-10-06 15:34:06 -04:00
Megan Marsh d05eb3401b
Merge pull request #10030 from angdraug/no-panicwrap-in-plugins
no panicwrap in plugins
2020-10-06 12:21:15 -07:00
Megan Marsh 7ee9a4b638
Merge pull request #9968 from upodroid/google-impersonation
GCP: add service account impersonation
2020-10-06 11:32:03 -07:00
Romain Lecat 10e356abe6
Fix typo in Outscale name (#10051) 2020-10-06 16:43:49 +02:00
zhsj ef9713b348
Replace kardianos/osext.Executable with os.Executable (#10048)
os.Executable is available since go1.8
https://github.com/kardianos/osext/blob/master/osext_go18.go
2020-10-06 10:59:32 +02:00
Megan Marsh b34e61c961 update changelog 2020-10-05 15:11:18 -07:00
Megan Marsh deb08409f1
Merge pull request #10040 from OblateSpheroid/GH6844
Feat (oracle/oci): allow specifying image compartment
2020-10-05 15:02:23 -07:00
Megan Marsh aeb63f9bef
Merge pull request #10031 from hashicorp/hcl_sensitive
HCL: hide sensitive variables from output
2020-10-05 14:58:55 -07:00
Megan Marsh 721cbac645
Merge pull request #9996 from hashicorp/fix_9995
Make shell-local post-processor return copy of previous artifact
2020-10-05 13:00:51 -07:00
Adrien Delorme 4cb218749b remove unecessary check 2020-10-05 15:34:35 +02:00
Adrien Delorme fcaf766569 add docs for sensitive variables 2020-10-05 15:34:35 +02:00
Adrien Delorme 9f97173371 PostProcessorServer.PostProcess: don't close the artifact we are serving
Sometimes, the artifact returned by PostProcess is the artifact from client.Artifact() and in that case we don't want to close client; otherwise the outcome is sort of undetermined. See #9995 for a good test file.

fix #9995
2020-10-05 14:27:55 +02:00
js-g 2222d112bd docs: update OCI page to include image_compartment_id 2020-10-04 23:05:31 -04:00
js-g c892f0582b GH#6844: allow image compartment to be specified 2020-10-02 22:30:52 -04:00
Megan Marsh 157b5cdc28
Merge pull request #10017 from kostasns/oci_boot_volume
Allow to specify boot volume size in OCI builder
2020-10-02 11:04:05 -07:00
Megan Marsh 37b4533cba
Merge pull request #10022 from hashicorp/fix_10020
fix pathing in cd_files copy to make sure directories make it into th…
2020-10-02 09:43:57 -07:00
Megan Marsh b105e5e416
Update common/step_create_cdrom.go
Co-authored-by: Wilken Rivera <dev@wilkenrivera.com>
2020-10-02 09:17:29 -07:00
Adrien Delorme 8f9001b531 uncopy 2020-10-02 11:35:20 +02:00
Adrien Delorme 10b648b282 Update .gitattributes 2020-10-02 11:06:02 +02:00
Adrien Delorme ebb1cb406c ignore walk error 2020-10-02 10:53:17 +02:00
Adrien Delorme fcf16315a3 add tests 2020-10-02 10:49:21 +02:00
Adrien Delorme bb22cfcf34 HCL2: pass sensitive variables to packer.LogSecretFilter
Co-Authored-By: Megan Marsh <1008838+SwampDragons@users.noreply.github.com>
2020-10-02 10:17:07 +02:00
upodroid 1c4b8c3d31 fmt fix 2020-10-01 23:24:46 +01:00
upodroid b1c74f9df0 Merge branch 'master' of github.com:hashicorp/packer into google-impersonation 2020-10-01 23:19:15 +01:00
Megan Marsh c0be097afc
Merge pull request #10010 from OblateSpheroid/GH10008
Bug fix(10008): fix ansible-galaxy for v1 files
2020-10-01 14:25:22 -07:00
upodroid 2228b18fcb revendor the libraries 2020-10-01 22:06:15 +01:00
Dmitry Borodaenko d18b7839b9 no panicwrap in plugins
As of mitchellh/panicwrap#25, a call to panicwrap.Wrapped() unsets the
cookie in the env, that makes packer plugin child process inherit an env
without the panicwrap cookie and panicwrap itself.

This trips up CleanupClients() in Packer's plugin client: instead of the
real plugin server it now kills its panicwrap parent -- which doesn't
forward SIGKILL to its child because it's not a signal that can be
caught -- and ends up indefinitely waiting in client.Kill() for an EOF
that will never come.

This workaround is to not even try to panicwrap in a plugin server.
2020-10-01 13:32:00 -07:00
upodroid f13099edfb rebase the branch 2020-10-01 20:39:06 +01:00
Kostas 8c07e21be8 update hcl2spec 2020-10-01 09:06:22 +03:00