3c282de6c3
This change adds a new set of maps for builders, provisioners, and post-processors that store reference to components that were once part of Packer and are now vendored. This file acts as a single place for defining this vendored components, which are then merged into the main components maps to be used in Packer. Quick test to ensure the exoscale-import post-processor is still loaded ``` // Validate that exoscale-import is in the know post-procoessors list ~> packer.test build docker_centos_shell_provisioner.pkr.hcl Error: Unknown post-processor type "badlynamed-import" on docker_centos_shell_provisioner.pkr.hcl line 18: (source code not available) known post-processors: [ucloud-import digitalocean-import docker-push googlecompute-export manifest vsphere-template docker-tag vsphere checksum docker-import exoscale-import yandex-export compress googlecompute-import yandex-import vagrant-cloud alicloud-import amazon-import artifice shell-local docker-save vagrant] // Validate that exoscale-import get loaded ~> packer.test build docker_centos_shell_provisioner.pkr.hcl Error: Failed preparing post-processor-block "exoscale-import" "" on docker_centos_shell_provisioner.pkr.hcl line 18: (source code not available) 4 error(s) occurred: * api_key must be set * api_secret must be set * image_bucket must be set * template_zone must be set ==> Wait completed after 2 microseconds ==> Builds finished but no artifacts were created. ``` |
||
---|---|---|
.circleci | ||
.github | ||
builder | ||
cmd | ||
command | ||
contrib | ||
datasource | ||
examples | ||
fix | ||
hcl2template | ||
helper | ||
packer | ||
post-processor | ||
provisioner | ||
scripts | ||
test | ||
vendor | ||
version | ||
website | ||
.codecov.yml | ||
.gitattributes | ||
.gitignore | ||
.golangci.yml | ||
.hashibot.hcl | ||
CHANGELOG.md | ||
CODEOWNERS | ||
Dockerfile | ||
LICENSE | ||
Makefile | ||
README.md | ||
Vagrantfile | ||
background_check.go | ||
background_check_openbsd.go | ||
checkpoint.go | ||
commands.go | ||
config.go | ||
config_test.go | ||
formatted.pkr.hcl | ||
go.mod | ||
go.sum | ||
log.go | ||
main.go | ||
main_test.go | ||
mlc_config.json | ||
panic.go | ||
tty.go | ||
tty_solaris.go |
README.md
Packer
Packer is a tool for building identical machine images for multiple platforms from a single source configuration.
Packer is lightweight, runs on every major operating system, and is highly performant, creating machine images for multiple platforms in parallel. Packer comes out of the box with support for many platforms, the full list of which can be found at https://www.packer.io/docs/builders.
Support for other platforms can be added via plugins.
The images that Packer creates can easily be turned into Vagrant boxes.
Quick Start
Note: There is a great introduction and getting started guide for those with a bit more patience. Otherwise, the quick start below will get you up and running quickly, at the sacrifice of not explaining some key points.
First, download a pre-built Packer binary for your operating system or compile Packer yourself.
After Packer is installed, create your first template, which tells Packer what platforms to build images for and how you want to build them. In our case, we'll create a simple AMI that has Redis pre-installed.
Save this file as quick-start.pkr.hcl
. Export your AWS credentials as the
AWS_ACCESS_KEY_ID
and AWS_SECRET_ACCESS_KEY
environment variables.
variable "access_key" {
type = string
default = "${env("AWS_ACCESS_KEY_ID")}"
}
variable "secret_key" {
type = string
default = "${env("AWS_SECRET_ACCESS_KEY")}"
}
locals { timestamp = regex_replace(timestamp(), "[- TZ:]", "") }
source "amazon-ebs" "quick-start" {
access_key = "${var.access_key}"
ami_name = "packer-example ${local.timestamp}"
instance_type = "t2.micro"
region = "us-east-1"
secret_key = "${var.secret_key}"
source_ami = "ami-af22d9b9"
ssh_username = "ubuntu"
}
build {
sources = ["source.amazon-ebs.quick-start"]
}
Next, tell Packer to build the image:
$ packer build quick-start.pkr.hcl
...
Packer will build an AMI according to the "quick-start" template. The AMI will be available in your AWS account. To delete the AMI, you must manually delete it using the AWS console. Packer builds your images, it does not manage their lifecycle. Where they go, how they're run, etc., is up to you.
Documentation
Comprehensive documentation is viewable on the Packer website at https://www.packer.io/docs.
Contributing to Packer
See CONTRIBUTING.md for best practices and instructions on setting up your development environment to work on Packer.
Unmaintained Plugins
As contributors' circumstances change, development on a community maintained plugin can slow. When this happens, the Packer team may mark a plugin as unmaintained, to clearly signal the plugin's status to users.
What does unmaintained mean?
- The code repository and all commit history will still be available.
- Documentation will remain on the Packer website.
- Issues and pull requests are monitored as a best effort.
- No active development will be performed by the Packer team.
If anyone form them community is interested in maintaining a community supported plugin, please feel free to submit contributions via a pull- request for review; reviews are generally prioritized over feature work when possible. For a list of open plugin issues and pending feature requests see the Packer Issue Tracker.