792 lines
25 KiB
Go
792 lines
25 KiB
Go
package command
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"os"
|
|
"path/filepath"
|
|
"reflect"
|
|
"sort"
|
|
"strings"
|
|
texttemplate "text/template"
|
|
|
|
"github.com/hashicorp/hcl/v2/hclwrite"
|
|
hcl2shim "github.com/hashicorp/packer-plugin-sdk/hcl2helper"
|
|
"github.com/hashicorp/packer-plugin-sdk/template"
|
|
"github.com/mitchellh/mapstructure"
|
|
"github.com/posener/complete"
|
|
"github.com/zclconf/go-cty/cty"
|
|
)
|
|
|
|
type HCL2UpgradeCommand struct {
|
|
Meta
|
|
}
|
|
|
|
func (c *HCL2UpgradeCommand) Run(args []string) int {
|
|
ctx, cleanup := handleTermInterrupt(c.Ui)
|
|
defer cleanup()
|
|
|
|
cfg, ret := c.ParseArgs(args)
|
|
if ret != 0 {
|
|
return ret
|
|
}
|
|
|
|
return c.RunContext(ctx, cfg)
|
|
}
|
|
|
|
func (c *HCL2UpgradeCommand) ParseArgs(args []string) (*HCL2UpgradeArgs, int) {
|
|
var cfg HCL2UpgradeArgs
|
|
flags := c.Meta.FlagSet("hcl2_upgrade", FlagSetNone)
|
|
flags.Usage = func() { c.Ui.Say(c.Help()) }
|
|
cfg.AddFlagSets(flags)
|
|
if err := flags.Parse(args); err != nil {
|
|
return &cfg, 1
|
|
}
|
|
args = flags.Args()
|
|
if len(args) != 1 {
|
|
flags.Usage()
|
|
return &cfg, 1
|
|
}
|
|
cfg.Path = args[0]
|
|
if cfg.OutputFile == "" {
|
|
cfg.OutputFile = cfg.Path + ".pkr.hcl"
|
|
}
|
|
return &cfg, 0
|
|
}
|
|
|
|
const (
|
|
hcl2UpgradeFileHeader = `# This file was autogenerated by the 'packer hcl2_upgrade' command. We
|
|
# recommend double checking that everything is correct before going forward. We
|
|
# also recommend treating this file as disposable. The HCL2 blocks in this
|
|
# file can be moved to other files. For example, the variable blocks could be
|
|
# moved to their own 'variables.pkr.hcl' file, etc. Those files need to be
|
|
# suffixed with '.pkr.hcl' to be visible to Packer. To use multiple files at
|
|
# once they also need to be in the same folder. 'packer inspect folder/'
|
|
# will describe to you what is in that folder.
|
|
|
|
# Avoid mixing go templating calls ( for example ` + "```{{ upper(`string`) }}```" + ` )
|
|
# and HCL2 calls (for example '${ var.string_value_example }' ). They won't be
|
|
# executed together and the outcome will be unknown.
|
|
`
|
|
inputVarHeader = `
|
|
# All generated input variables will be of 'string' type as this is how Packer JSON
|
|
# views them; you can change their type later on. Read the variables type
|
|
# constraints documentation
|
|
# https://www.packer.io/docs/templates/hcl_templates/variables#type-constraints for more info.`
|
|
localsVarHeader = `
|
|
# All locals variables are generated from variables that uses expressions
|
|
# that are not allowed in HCL2 variables.
|
|
# Read the documentation for locals blocks here:
|
|
# https://www.packer.io/docs/templates/hcl_templates/blocks/locals`
|
|
packerBlockHeader = `
|
|
# See https://www.packer.io/docs/templates/hcl_templates/blocks/packer for more info
|
|
`
|
|
|
|
sourcesHeader = `
|
|
# source blocks are generated from your builders; a source can be referenced in
|
|
# build blocks. A build block runs provisioner and post-processors on a
|
|
# source. Read the documentation for source blocks here:
|
|
# https://www.packer.io/docs/templates/hcl_templates/blocks/source`
|
|
|
|
buildHeader = `
|
|
# a build block invokes sources and runs provisioning steps on them. The
|
|
# documentation for build blocks can be found here:
|
|
# https://www.packer.io/docs/templates/hcl_templates/blocks/build
|
|
build {
|
|
`
|
|
|
|
amazonAmiDataHeader = `
|
|
# The amazon-ami data block is generated from your amazon builder source_ami_filter; a data
|
|
# from this block can be referenced in source and locals blocks.
|
|
# Read the documentation for data blocks here:
|
|
# https://www.packer.io/docs/templates/hcl_templates/blocks/data
|
|
# Read the documentation for the Amazon AMI Data Source here:
|
|
# https://www.packer.io/docs/datasources/amazon/ami`
|
|
|
|
amazonSecretsManagerDataHeader = `
|
|
# The amazon-secretsmanager data block is generated from your aws_secretsmanager template function; a data
|
|
# from this block can be referenced in source and locals blocks.
|
|
# Read the documentation for data blocks here:
|
|
# https://www.packer.io/docs/templates/hcl_templates/blocks/data
|
|
# Read the documentation for the Amazon Secrets Manager Data Source here:
|
|
# https://www.packer.io/docs/datasources/amazon/secretsmanager`
|
|
)
|
|
|
|
var (
|
|
amazonSecretsManagerMap = map[string]map[string]interface{}{}
|
|
localsVariableMap = map[string]string{}
|
|
timestamp = false
|
|
)
|
|
|
|
func (c *HCL2UpgradeCommand) RunContext(_ context.Context, cla *HCL2UpgradeArgs) int {
|
|
var output io.Writer
|
|
if err := os.MkdirAll(filepath.Dir(cla.OutputFile), 0); err != nil {
|
|
c.Ui.Error(fmt.Sprintf("Failed to create output directory: %v", err))
|
|
return 1
|
|
}
|
|
if f, err := os.Create(cla.OutputFile); err == nil {
|
|
output = f
|
|
defer f.Close()
|
|
} else {
|
|
c.Ui.Error(fmt.Sprintf("Failed to create output file: %v", err))
|
|
return 1
|
|
}
|
|
|
|
if _, err := output.Write([]byte(hcl2UpgradeFileHeader)); err != nil {
|
|
c.Ui.Error(fmt.Sprintf("Failed to write to file: %v", err))
|
|
return 1
|
|
}
|
|
|
|
hdl, ret := c.GetConfigFromJSON(&cla.MetaArgs)
|
|
if ret != 0 {
|
|
return ret
|
|
}
|
|
|
|
core := hdl.(*CoreWrapper).Core
|
|
if err := core.Initialize(); err != nil {
|
|
c.Ui.Error(fmt.Sprintf("Ignoring following initialization error: %v", err))
|
|
}
|
|
tpl := core.Template
|
|
|
|
// OutPut Locals and Local blocks
|
|
localsContent := hclwrite.NewEmptyFile()
|
|
localsBody := localsContent.Body()
|
|
localsBody.AppendNewline()
|
|
localBody := localsBody.AppendNewBlock("locals", nil).Body()
|
|
|
|
localsOut := []byte{}
|
|
|
|
// Output variables section
|
|
variablesOut := []byte{}
|
|
variables := []*template.Variable{}
|
|
{
|
|
// sort variables to avoid map's randomness
|
|
for _, variable := range tpl.Variables {
|
|
variables = append(variables, variable)
|
|
}
|
|
sort.Slice(variables, func(i, j int) bool {
|
|
return variables[i].Key < variables[j].Key
|
|
})
|
|
}
|
|
|
|
hasLocals := false
|
|
for _, variable := range variables {
|
|
variablesContent := hclwrite.NewEmptyFile()
|
|
variablesBody := variablesContent.Body()
|
|
variablesBody.AppendNewline()
|
|
variableBody := variablesBody.AppendNewBlock("variable", []string{variable.Key}).Body()
|
|
variableBody.SetAttributeRaw("type", hclwrite.Tokens{&hclwrite.Token{Bytes: []byte("string")}})
|
|
|
|
if variable.Default != "" || !variable.Required {
|
|
variableBody.SetAttributeValue("default", hcl2shim.HCL2ValueFromConfigValue(variable.Default))
|
|
}
|
|
sensitive := false
|
|
if isSensitiveVariable(variable.Key, tpl.SensitiveVariables) {
|
|
sensitive = true
|
|
variableBody.SetAttributeValue("sensitive", cty.BoolVal(true))
|
|
}
|
|
isLocal, out := variableTransposeTemplatingCalls(variablesContent.Bytes())
|
|
if isLocal {
|
|
if sensitive {
|
|
// Create Local block because this is sensitive
|
|
localContent := hclwrite.NewEmptyFile()
|
|
body := localContent.Body()
|
|
body.AppendNewline()
|
|
localBody := body.AppendNewBlock("local", []string{variable.Key}).Body()
|
|
localBody.SetAttributeValue("sensitive", cty.BoolVal(true))
|
|
localBody.SetAttributeValue("expression", hcl2shim.HCL2ValueFromConfigValue(variable.Default))
|
|
localsOut = append(localsOut, transposeTemplatingCalls(localContent.Bytes())...)
|
|
localsVariableMap[variable.Key] = "local"
|
|
continue
|
|
}
|
|
localBody.SetAttributeValue(variable.Key, hcl2shim.HCL2ValueFromConfigValue(variable.Default))
|
|
localsVariableMap[variable.Key] = "locals"
|
|
hasLocals = true
|
|
continue
|
|
}
|
|
variablesOut = append(variablesOut, out...)
|
|
}
|
|
|
|
if hasLocals {
|
|
localsOut = append(localsOut, transposeTemplatingCalls(localsContent.Bytes())...)
|
|
}
|
|
|
|
builders := []*template.Builder{}
|
|
{
|
|
// sort builders to avoid map's randomnes
|
|
for _, builder := range tpl.Builders {
|
|
builders = append(builders, builder)
|
|
}
|
|
}
|
|
|
|
// Output amazon-ami data source section
|
|
amazonAmiOut, err := c.writeAmazonAmiDatasource(builders)
|
|
if err != nil {
|
|
return 1
|
|
}
|
|
|
|
sort.Slice(builders, func(i, j int) bool {
|
|
return builders[i].Type+builders[i].Name < builders[j].Type+builders[j].Name
|
|
})
|
|
|
|
// Output sources section
|
|
sourcesOut := []byte{}
|
|
for i, builderCfg := range builders {
|
|
sourcesContent := hclwrite.NewEmptyFile()
|
|
body := sourcesContent.Body()
|
|
|
|
body.AppendNewline()
|
|
if !c.Meta.CoreConfig.Components.PluginConfig.Builders.Has(builderCfg.Type) {
|
|
c.Ui.Error(fmt.Sprintf("unknown builder type: %q\n", builderCfg.Type))
|
|
return 1
|
|
}
|
|
if builderCfg.Name == "" || builderCfg.Name == builderCfg.Type {
|
|
builderCfg.Name = fmt.Sprintf("autogenerated_%d", i+1)
|
|
}
|
|
builderCfg.Name = strings.ReplaceAll(strings.TrimSpace(builderCfg.Name), " ", "_")
|
|
|
|
sourceBody := body.AppendNewBlock("source", []string{builderCfg.Type, builderCfg.Name}).Body()
|
|
|
|
jsonBodyToHCL2Body(sourceBody, builderCfg.Config)
|
|
|
|
sourcesOut = append(sourcesOut, transposeTemplatingCalls(sourcesContent.Bytes())...)
|
|
}
|
|
|
|
// Output build section
|
|
buildContent := hclwrite.NewEmptyFile()
|
|
buildBody := buildContent.Body()
|
|
if tpl.Description != "" {
|
|
buildBody.SetAttributeValue("description", cty.StringVal(tpl.Description))
|
|
buildBody.AppendNewline()
|
|
}
|
|
|
|
sourceNames := []string{}
|
|
for _, builder := range builders {
|
|
sourceNames = append(sourceNames, fmt.Sprintf("source.%s.%s", builder.Type, builder.Name))
|
|
}
|
|
buildBody.SetAttributeValue("sources", hcl2shim.HCL2ValueFromConfigValue(sourceNames))
|
|
buildBody.AppendNewline()
|
|
buildOut := buildContent.Bytes()
|
|
|
|
// Output provisioners section
|
|
provisionersOut := []byte{}
|
|
for _, provisioner := range tpl.Provisioners {
|
|
buildBody.AppendNewline()
|
|
contentBytes := c.writeProvisioner("provisioner", provisioner)
|
|
provisionersOut = append(provisionersOut, transposeTemplatingCalls(contentBytes)...)
|
|
}
|
|
|
|
if tpl.CleanupProvisioner != nil {
|
|
buildBody.AppendNewline()
|
|
contentBytes := c.writeProvisioner("error-cleanup-provisioner", tpl.CleanupProvisioner)
|
|
provisionersOut = append(provisionersOut, transposeTemplatingCalls(contentBytes)...)
|
|
}
|
|
|
|
// Output post-processors section
|
|
postProcessorsOut := []byte{}
|
|
for _, pps := range tpl.PostProcessors {
|
|
postProcessorContent := hclwrite.NewEmptyFile()
|
|
body := postProcessorContent.Body()
|
|
|
|
switch len(pps) {
|
|
case 0:
|
|
continue
|
|
case 1:
|
|
default:
|
|
body = body.AppendNewBlock("post-processors", nil).Body()
|
|
}
|
|
for _, pp := range pps {
|
|
ppBody := body.AppendNewBlock("post-processor", []string{pp.Type}).Body()
|
|
if pp.KeepInputArtifact != nil {
|
|
ppBody.SetAttributeValue("keep_input_artifact", cty.BoolVal(*pp.KeepInputArtifact))
|
|
}
|
|
cfg := pp.Config
|
|
if len(pp.Except) > 0 {
|
|
cfg["except"] = pp.Except
|
|
}
|
|
if len(pp.Only) > 0 {
|
|
cfg["only"] = pp.Only
|
|
}
|
|
if pp.Name != "" && pp.Name != pp.Type {
|
|
cfg["name"] = pp.Name
|
|
}
|
|
jsonBodyToHCL2Body(ppBody, cfg)
|
|
}
|
|
|
|
postProcessorsOut = append(postProcessorsOut, transposeTemplatingCalls(postProcessorContent.Bytes())...)
|
|
}
|
|
|
|
// Output amazon-secretsmanager data source section
|
|
keys := make([]string, 0, len(amazonSecretsManagerMap))
|
|
for k := range amazonSecretsManagerMap {
|
|
keys = append(keys, k)
|
|
}
|
|
sort.Strings(keys)
|
|
|
|
amazonSecretsDataOut := []byte{}
|
|
for _, dataSourceName := range keys {
|
|
datasourceContent := hclwrite.NewEmptyFile()
|
|
body := datasourceContent.Body()
|
|
body.AppendNewline()
|
|
datasourceBody := body.AppendNewBlock("data", []string{"amazon-secretsmanager", dataSourceName}).Body()
|
|
jsonBodyToHCL2Body(datasourceBody, amazonSecretsManagerMap[dataSourceName])
|
|
amazonSecretsDataOut = append(amazonSecretsDataOut, datasourceContent.Bytes()...)
|
|
}
|
|
|
|
// Write file
|
|
out := &bytes.Buffer{}
|
|
|
|
// Packer section
|
|
if tpl.MinVersion != "" {
|
|
out.Write([]byte(packerBlockHeader))
|
|
fileContent := hclwrite.NewEmptyFile()
|
|
body := fileContent.Body()
|
|
packerBody := body.AppendNewBlock("packer", nil).Body()
|
|
packerBody.SetAttributeValue("required_version", cty.StringVal(fmt.Sprintf(">= %s", tpl.MinVersion)))
|
|
out.Write(fileContent.Bytes())
|
|
}
|
|
|
|
if len(variablesOut) > 0 {
|
|
out.Write([]byte(inputVarHeader))
|
|
out.Write(variablesOut)
|
|
}
|
|
|
|
if len(amazonSecretsManagerMap) > 0 {
|
|
out.Write([]byte(amazonSecretsManagerDataHeader))
|
|
out.Write(amazonSecretsDataOut)
|
|
}
|
|
|
|
if len(amazonAmiOut) > 0 {
|
|
out.Write([]byte(amazonAmiDataHeader))
|
|
out.Write(amazonAmiOut)
|
|
}
|
|
|
|
if timestamp {
|
|
_, _ = out.Write([]byte("\n"))
|
|
fmt.Fprintln(out, `# "timestamp" template function replacement`)
|
|
fmt.Fprintln(out, `locals { timestamp = regex_replace(timestamp(), "[- TZ:]", "") }`)
|
|
}
|
|
|
|
if len(localsOut) > 0 {
|
|
out.Write([]byte(localsVarHeader))
|
|
out.Write(localsOut)
|
|
}
|
|
|
|
out.Write([]byte(sourcesHeader))
|
|
out.Write(sourcesOut)
|
|
|
|
out.Write([]byte(buildHeader))
|
|
out.Write(buildOut)
|
|
out.Write(provisionersOut)
|
|
out.Write(postProcessorsOut)
|
|
|
|
_, _ = out.Write([]byte("}\n"))
|
|
|
|
_, _ = output.Write(hclwrite.Format(out.Bytes()))
|
|
|
|
c.Ui.Say(fmt.Sprintf("Successfully created %s ", cla.OutputFile))
|
|
|
|
return 0
|
|
}
|
|
|
|
func (c *HCL2UpgradeCommand) writeProvisioner(typeName string, provisioner *template.Provisioner) []byte {
|
|
provisionerContent := hclwrite.NewEmptyFile()
|
|
body := provisionerContent.Body()
|
|
block := body.AppendNewBlock(typeName, []string{provisioner.Type})
|
|
cfg := provisioner.Config
|
|
if len(provisioner.Except) > 0 {
|
|
cfg["except"] = provisioner.Except
|
|
}
|
|
if len(provisioner.Only) > 0 {
|
|
cfg["only"] = provisioner.Only
|
|
}
|
|
if provisioner.MaxRetries != "" {
|
|
cfg["max_retries"] = provisioner.MaxRetries
|
|
}
|
|
if provisioner.Timeout > 0 {
|
|
cfg["timeout"] = provisioner.Timeout.String()
|
|
}
|
|
jsonBodyToHCL2Body(block.Body(), cfg)
|
|
return provisionerContent.Bytes()
|
|
}
|
|
|
|
func (c *HCL2UpgradeCommand) writeAmazonAmiDatasource(builders []*template.Builder) ([]byte, error) {
|
|
amazonAmiOut := []byte{}
|
|
amazonAmiFilters := []map[string]interface{}{}
|
|
i := 1
|
|
for _, builder := range builders {
|
|
if strings.HasPrefix(builder.Type, "amazon-") {
|
|
if sourceAmiFilter, ok := builder.Config["source_ami_filter"]; ok {
|
|
sourceAmiFilterCfg := map[string]interface{}{}
|
|
if err := mapstructure.Decode(sourceAmiFilter, &sourceAmiFilterCfg); err != nil {
|
|
c.Ui.Error(fmt.Sprintf("Failed to write amazon-ami data source: %v", err))
|
|
return nil, err
|
|
}
|
|
|
|
duplicate := false
|
|
dataSourceName := fmt.Sprintf("autogenerated_%d", i)
|
|
for j, filter := range amazonAmiFilters {
|
|
if reflect.DeepEqual(filter, sourceAmiFilter) {
|
|
duplicate = true
|
|
dataSourceName = fmt.Sprintf("autogenerated_%d", j+1)
|
|
continue
|
|
}
|
|
}
|
|
|
|
// This is a hack...
|
|
// Use templating so that it could be correctly transformed later into a data resource
|
|
sourceAmiDataRef := fmt.Sprintf("{{ data `amazon-ami.%s.id` }}", dataSourceName)
|
|
|
|
if duplicate {
|
|
delete(builder.Config, "source_ami_filter")
|
|
builder.Config["source_ami"] = sourceAmiDataRef
|
|
continue
|
|
}
|
|
|
|
amazonAmiFilters = append(amazonAmiFilters, sourceAmiFilterCfg)
|
|
delete(builder.Config, "source_ami_filter")
|
|
builder.Config["source_ami"] = sourceAmiDataRef
|
|
i++
|
|
|
|
datasourceContent := hclwrite.NewEmptyFile()
|
|
body := datasourceContent.Body()
|
|
body.AppendNewline()
|
|
sourceBody := body.AppendNewBlock("data", []string{"amazon-ami", dataSourceName}).Body()
|
|
jsonBodyToHCL2Body(sourceBody, sourceAmiFilterCfg)
|
|
amazonAmiOut = append(amazonAmiOut, transposeTemplatingCalls(datasourceContent.Bytes())...)
|
|
}
|
|
}
|
|
}
|
|
|
|
return amazonAmiOut, nil
|
|
}
|
|
|
|
type UnhandleableArgumentError struct {
|
|
Call string
|
|
Correspondance string
|
|
Docs string
|
|
}
|
|
|
|
func (uc UnhandleableArgumentError) Error() string {
|
|
return fmt.Sprintf(`unhandled %q call:
|
|
# there is no way to automatically upgrade the %[1]q call.
|
|
# Please manually upgrade to %s
|
|
# Visit %s for more infos.`, uc.Call, uc.Correspondance, uc.Docs)
|
|
}
|
|
|
|
// transposeTemplatingCalls executes parts of blocks as go template files and replaces
|
|
// their result with their hcl2 variant. If something goes wrong the template
|
|
// containing the go template string is returned.
|
|
func transposeTemplatingCalls(s []byte) []byte {
|
|
fallbackReturn := func(err error) []byte {
|
|
if strings.Contains(err.Error(), "unhandled") {
|
|
return append([]byte(fmt.Sprintf("\n# %s\n", err)), s...)
|
|
}
|
|
|
|
return append([]byte(fmt.Sprintf("\n# could not parse template for following block: %q\n", err)), s...)
|
|
}
|
|
funcMap := templateCommonFunctionMap()
|
|
|
|
tpl, err := texttemplate.New("hcl2_upgrade").
|
|
Funcs(funcMap).
|
|
Parse(string(s))
|
|
|
|
if err != nil {
|
|
return fallbackReturn(err)
|
|
}
|
|
|
|
str := &bytes.Buffer{}
|
|
v := struct {
|
|
HTTPIP string
|
|
HTTPPort string
|
|
}{
|
|
HTTPIP: "{{ .HTTPIP }}",
|
|
HTTPPort: "{{ .HTTPPort }}",
|
|
}
|
|
if err := tpl.Execute(str, v); err != nil {
|
|
return fallbackReturn(err)
|
|
}
|
|
|
|
return str.Bytes()
|
|
}
|
|
|
|
func templateCommonFunctionMap() texttemplate.FuncMap {
|
|
return texttemplate.FuncMap{
|
|
"aws_secretsmanager": func(a ...string) string {
|
|
if len(a) == 2 {
|
|
for key, config := range amazonSecretsManagerMap {
|
|
nameOk := config["name"] == a[0]
|
|
keyOk := config["key"] == a[1]
|
|
if nameOk && keyOk {
|
|
return fmt.Sprintf("${data.amazon-secretsmanager.%s.value}", key)
|
|
}
|
|
}
|
|
id := fmt.Sprintf("autogenerated_%d", len(amazonSecretsManagerMap)+1)
|
|
amazonSecretsManagerMap[id] = map[string]interface{}{
|
|
"name": a[0],
|
|
"key": a[1],
|
|
}
|
|
return fmt.Sprintf("${data.amazon-secretsmanager.%s.value}", id)
|
|
}
|
|
for key, config := range amazonSecretsManagerMap {
|
|
nameOk := config["name"] == a[0]
|
|
if nameOk {
|
|
return fmt.Sprintf("${data.amazon-secretsmanager.%s.value}", key)
|
|
}
|
|
}
|
|
id := fmt.Sprintf("autogenerated_%d", len(amazonSecretsManagerMap)+1)
|
|
amazonSecretsManagerMap[id] = map[string]interface{}{
|
|
"name": a[0],
|
|
}
|
|
return fmt.Sprintf("${data.amazon-secretsmanager.%s.value}", id)
|
|
}, "timestamp": func() string {
|
|
timestamp = true
|
|
return "${local.timestamp}"
|
|
},
|
|
"isotime": func() string {
|
|
timestamp = true
|
|
return "${local.timestamp}"
|
|
},
|
|
"user": func(in string) string {
|
|
if _, ok := localsVariableMap[in]; ok {
|
|
// variable is now a local
|
|
return fmt.Sprintf("${local.%s}", in)
|
|
}
|
|
return fmt.Sprintf("${var.%s}", in)
|
|
},
|
|
"env": func(in string) string {
|
|
return fmt.Sprintf("${env(%q)}", in)
|
|
},
|
|
"build": func(a string) string {
|
|
return fmt.Sprintf("${build.%s}", a)
|
|
},
|
|
"data": func(a string) string {
|
|
return fmt.Sprintf("${data.%s}", a)
|
|
},
|
|
"template_dir": func() string {
|
|
return fmt.Sprintf("${path.root}")
|
|
},
|
|
"pwd": func() string {
|
|
return fmt.Sprintf("${path.cwd}")
|
|
},
|
|
"packer_version": func() string {
|
|
return fmt.Sprintf("${packer.version}")
|
|
},
|
|
"uuid": func() string {
|
|
return fmt.Sprintf("${uuidv4()}")
|
|
},
|
|
"lower": func(_ string) (string, error) {
|
|
return "", UnhandleableArgumentError{
|
|
"lower",
|
|
"`lower(var.example)`",
|
|
"https://www.packer.io/docs/templates/hcl_templates/functions/string/lower",
|
|
}
|
|
},
|
|
"upper": func(_ string) (string, error) {
|
|
return "", UnhandleableArgumentError{
|
|
"upper",
|
|
"`upper(var.example)`",
|
|
"https://www.packer.io/docs/templates/hcl_templates/functions/string/upper",
|
|
}
|
|
},
|
|
"split": func(_, _ string, _ int) (string, error) {
|
|
return "", UnhandleableArgumentError{
|
|
"split",
|
|
"`split(separator, string)`",
|
|
"https://www.packer.io/docs/templates/hcl_templates/functions/string/split",
|
|
}
|
|
},
|
|
"replace": func(_, _, _ string, _ int) (string, error) {
|
|
return "", UnhandleableArgumentError{
|
|
"replace",
|
|
"`replace(string, substring, replacement)` or `regex_replace(string, substring, replacement)`",
|
|
"https://www.packer.io/docs/templates/hcl_templates/functions/string/replace or https://www.packer.io/docs/templates/hcl_templates/functions/string/regex_replace",
|
|
}
|
|
},
|
|
"replace_all": func(_, _, _ string) (string, error) {
|
|
return "", UnhandleableArgumentError{
|
|
"replace_all",
|
|
"`replace(string, substring, replacement)` or `regex_replace(string, substring, replacement)`",
|
|
"https://www.packer.io/docs/templates/hcl_templates/functions/string/replace or https://www.packer.io/docs/templates/hcl_templates/functions/string/regex_replace",
|
|
}
|
|
},
|
|
"clean_resource_name": func(_ string) (string, error) {
|
|
return "", UnhandleableArgumentError{
|
|
"clean_resource_name",
|
|
"use custom validation rules, `replace(string, substring, replacement)` or `regex_replace(string, substring, replacement)`",
|
|
"https://packer.io/docs/templates/hcl_templates/variables#custom-validation-rules" +
|
|
" , https://www.packer.io/docs/templates/hcl_templates/functions/string/replace" +
|
|
" or https://www.packer.io/docs/templates/hcl_templates/functions/string/regex_replace",
|
|
}
|
|
},
|
|
"build_name": func() string {
|
|
return fmt.Sprintf("${build.name}")
|
|
},
|
|
"build_type": func() string {
|
|
return fmt.Sprintf("${build.type}")
|
|
},
|
|
}
|
|
}
|
|
|
|
// variableTransposeTemplatingCalls executes parts of blocks as go template files and replaces
|
|
// their result with their hcl2 variant for variables block only. If something goes wrong the template
|
|
// containing the go template string is returned.
|
|
// In variableTransposeTemplatingCalls the definition of aws_secretsmanager function will create a data source
|
|
// with the same name as the variable.
|
|
func variableTransposeTemplatingCalls(s []byte) (isLocal bool, body []byte) {
|
|
fallbackReturn := func(err error) []byte {
|
|
if strings.Contains(err.Error(), "unhandled") {
|
|
return append([]byte(fmt.Sprintf("\n# %s\n", err)), s...)
|
|
}
|
|
|
|
return append([]byte(fmt.Sprintf("\n# could not parse template for following block: %q\n", err)), s...)
|
|
}
|
|
|
|
funcMap := templateCommonFunctionMap()
|
|
funcMap["aws_secretsmanager"] = func(a ...string) string {
|
|
isLocal = true
|
|
return ""
|
|
}
|
|
|
|
tpl, err := texttemplate.New("hcl2_upgrade").
|
|
Funcs(funcMap).
|
|
Parse(string(s))
|
|
|
|
if err != nil {
|
|
return isLocal, fallbackReturn(err)
|
|
}
|
|
|
|
str := &bytes.Buffer{}
|
|
v := struct {
|
|
HTTPIP string
|
|
HTTPPort string
|
|
}{
|
|
HTTPIP: "{{ .HTTPIP }}",
|
|
HTTPPort: "{{ .HTTPPort }}",
|
|
}
|
|
if err := tpl.Execute(str, v); err != nil {
|
|
return isLocal, fallbackReturn(err)
|
|
}
|
|
|
|
return isLocal, str.Bytes()
|
|
}
|
|
|
|
func jsonBodyToHCL2Body(out *hclwrite.Body, kvs map[string]interface{}) {
|
|
ks := []string{}
|
|
for k := range kvs {
|
|
ks = append(ks, k)
|
|
}
|
|
sort.Strings(ks)
|
|
|
|
for _, k := range ks {
|
|
value := kvs[k]
|
|
|
|
switch value := value.(type) {
|
|
case map[string]interface{}:
|
|
var mostComplexElem interface{}
|
|
for _, randomElem := range value {
|
|
// HACK: we take the most complex element of that map because
|
|
// in HCL2, map of objects can be bodies, for example:
|
|
// map containing object: source_ami_filter {} ( body )
|
|
// simple string/string map: tags = {} ) ( attribute )
|
|
//
|
|
// if we could not find an object in this map then it's most
|
|
// likely a plain map and so we guess it should be and
|
|
// attribute. Though now if value refers to something that is
|
|
// an object but only contains a string or a bool; we could
|
|
// generate a faulty object. For example a (somewhat invalid)
|
|
// source_ami_filter where only `most_recent` is set.
|
|
switch randomElem.(type) {
|
|
case string, int, float64, bool:
|
|
if mostComplexElem != nil {
|
|
continue
|
|
}
|
|
mostComplexElem = randomElem
|
|
default:
|
|
mostComplexElem = randomElem
|
|
}
|
|
}
|
|
|
|
switch mostComplexElem.(type) {
|
|
case string, int, float64, bool:
|
|
out.SetAttributeValue(k, hcl2shim.HCL2ValueFromConfigValue(value))
|
|
default:
|
|
nestedBlockBody := out.AppendNewBlock(k, nil).Body()
|
|
jsonBodyToHCL2Body(nestedBlockBody, value)
|
|
}
|
|
case map[string]string, map[string]int, map[string]float64:
|
|
out.SetAttributeValue(k, hcl2shim.HCL2ValueFromConfigValue(value))
|
|
case []interface{}:
|
|
if len(value) == 0 {
|
|
continue
|
|
}
|
|
|
|
var mostComplexElem interface{}
|
|
for _, randomElem := range value {
|
|
// HACK: we take the most complex element of that slice because
|
|
// in hcl2 slices of plain types can be arrays, for example:
|
|
// simple string type: owners = ["0000000000"]
|
|
// object: launch_block_device_mappings {}
|
|
switch randomElem.(type) {
|
|
case string, int, float64, bool:
|
|
if mostComplexElem != nil {
|
|
continue
|
|
}
|
|
mostComplexElem = randomElem
|
|
default:
|
|
mostComplexElem = randomElem
|
|
}
|
|
}
|
|
switch mostComplexElem.(type) {
|
|
case map[string]interface{}:
|
|
// this is an object in a slice; so we unwrap it. We
|
|
// could try to remove any 's' suffix in the key, but
|
|
// this might not work everywhere.
|
|
for i := range value {
|
|
value := value[i].(map[string]interface{})
|
|
nestedBlockBody := out.AppendNewBlock(k, nil).Body()
|
|
jsonBodyToHCL2Body(nestedBlockBody, value)
|
|
}
|
|
continue
|
|
default:
|
|
out.SetAttributeValue(k, hcl2shim.HCL2ValueFromConfigValue(value))
|
|
}
|
|
default:
|
|
out.SetAttributeValue(k, hcl2shim.HCL2ValueFromConfigValue(value))
|
|
}
|
|
}
|
|
}
|
|
|
|
func isSensitiveVariable(key string, vars []*template.Variable) bool {
|
|
for _, v := range vars {
|
|
if v.Key == key {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (*HCL2UpgradeCommand) Help() string {
|
|
helpText := `
|
|
Usage: packer hcl2_upgrade -output-file=JSON_TEMPLATE.pkr.hcl JSON_TEMPLATE...
|
|
|
|
Will transform your JSON template into an HCL2 configuration.
|
|
`
|
|
|
|
return strings.TrimSpace(helpText)
|
|
}
|
|
|
|
func (*HCL2UpgradeCommand) Synopsis() string {
|
|
return "transform a JSON template into an HCL2 configuration"
|
|
}
|
|
|
|
func (*HCL2UpgradeCommand) AutocompleteArgs() complete.Predictor {
|
|
return complete.PredictNothing
|
|
}
|
|
|
|
func (*HCL2UpgradeCommand) AutocompleteFlags() complete.Flags {
|
|
return complete.Flags{}
|
|
}
|