341 lines
9.2 KiB
Go
341 lines
9.2 KiB
Go
package common
|
|
|
|
import (
|
|
"context"
|
|
"encoding/base64"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"log"
|
|
"reflect"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/awserr"
|
|
"github.com/outscale/osc-go/oapi"
|
|
|
|
retry "github.com/hashicorp/packer/common"
|
|
"github.com/hashicorp/packer/helper/communicator"
|
|
"github.com/hashicorp/packer/helper/multistep"
|
|
"github.com/hashicorp/packer/packer"
|
|
"github.com/hashicorp/packer/template/interpolate"
|
|
)
|
|
|
|
const (
|
|
RunSourceVmBSUExpectedRootDevice = "ebs"
|
|
)
|
|
|
|
type StepRunSourceVm struct {
|
|
BlockDevices BlockDevices
|
|
Comm *communicator.Config
|
|
Ctx interpolate.Context
|
|
Debug bool
|
|
BsuOptimized bool
|
|
EnableT2Unlimited bool
|
|
ExpectedRootDevice string
|
|
IamVmProfile string
|
|
VmInitiatedShutdownBehavior string
|
|
VmType string
|
|
IsRestricted bool
|
|
SourceOMI string
|
|
Tags TagMap
|
|
UserData string
|
|
UserDataFile string
|
|
VolumeTags TagMap
|
|
|
|
vmId string
|
|
}
|
|
|
|
func (s *StepRunSourceVm) Run(ctx context.Context, state multistep.StateBag) multistep.StepAction {
|
|
oapiconn := state.Get("oapi").(*oapi.Client)
|
|
|
|
securityGroupIds := state.Get("securityGroupIds").([]string)
|
|
ui := state.Get("ui").(packer.Ui)
|
|
|
|
userData := s.UserData
|
|
if s.UserDataFile != "" {
|
|
contents, err := ioutil.ReadFile(s.UserDataFile)
|
|
if err != nil {
|
|
state.Put("error", fmt.Errorf("Problem reading user data file: %s", err))
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
userData = string(contents)
|
|
}
|
|
|
|
// Test if it is encoded already, and if not, encode it
|
|
if _, err := base64.StdEncoding.DecodeString(userData); err != nil {
|
|
log.Printf("[DEBUG] base64 encoding user data...")
|
|
userData = base64.StdEncoding.EncodeToString([]byte(userData))
|
|
}
|
|
|
|
ui.Say("Launching a source OUTSCALE vm...")
|
|
image, ok := state.Get("source_image").(oapi.Image)
|
|
if !ok {
|
|
state.Put("error", fmt.Errorf("source_image type assertion failed"))
|
|
return multistep.ActionHalt
|
|
}
|
|
s.SourceOMI = image.ImageId
|
|
|
|
if s.ExpectedRootDevice != "" && image.RootDeviceType != s.ExpectedRootDevice {
|
|
state.Put("error", fmt.Errorf(
|
|
"The provided source OMI has an invalid root device type.\n"+
|
|
"Expected '%s', got '%s'.",
|
|
s.ExpectedRootDevice, image.RootDeviceType))
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
var vmId string
|
|
|
|
ui.Say("Adding tags to source vm")
|
|
if _, exists := s.Tags["Name"]; !exists {
|
|
s.Tags["Name"] = "Packer Builder"
|
|
}
|
|
|
|
oapiTags, err := s.Tags.OAPITags(s.Ctx, oapiconn.GetConfig().Region, state)
|
|
if err != nil {
|
|
err := fmt.Errorf("Error tagging source vm: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
volTags, err := s.VolumeTags.OAPITags(s.Ctx, oapiconn.GetConfig().Region, state)
|
|
if err != nil {
|
|
err := fmt.Errorf("Error tagging volumes: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
subregion := state.Get("subregion_name").(string)
|
|
runOpts := oapi.CreateVmsRequest{
|
|
ImageId: s.SourceOMI,
|
|
VmType: s.VmType,
|
|
UserData: userData,
|
|
MaxVmsCount: 1,
|
|
MinVmsCount: 1,
|
|
Placement: oapi.Placement{SubregionName: subregion},
|
|
BsuOptimized: s.BsuOptimized,
|
|
BlockDeviceMappings: s.BlockDevices.BuildLaunchDevices(),
|
|
//IamVmProfile: oapi.IamVmProfileSpecification{Name: &s.IamVmProfile},
|
|
}
|
|
|
|
// if s.EnableT2Unlimited {
|
|
// creditOption := "unlimited"
|
|
// runOpts.CreditSpecification = &oapi.CreditSpecificationRequest{CpuCredits: &creditOption}
|
|
// }
|
|
|
|
// Collect tags for tagging on resource creation
|
|
// var tagSpecs []oapi.ResourceTag
|
|
|
|
// if len(oapiTags) > 0 {
|
|
// runTags := &oapi.ResourceTag{
|
|
// ResourceType: aws.String("vm"),
|
|
// Tags: oapiTags,
|
|
// }
|
|
|
|
// tagSpecs = append(tagSpecs, runTags)
|
|
// }
|
|
|
|
// if len(volTags) > 0 {
|
|
// runVolTags := &oapi.TagSpecification{
|
|
// ResourceType: aws.String("volume"),
|
|
// Tags: volTags,
|
|
// }
|
|
|
|
// tagSpecs = append(tagSpecs, runVolTags)
|
|
// }
|
|
|
|
// // If our region supports it, set tag specifications
|
|
// if len(tagSpecs) > 0 && !s.IsRestricted {
|
|
// runOpts.SetTagSpecifications(tagSpecs)
|
|
// oapiTags.Report(ui)
|
|
// volTags.Report(ui)
|
|
// }
|
|
|
|
if s.Comm.SSHKeyPairName != "" {
|
|
runOpts.KeypairName = s.Comm.SSHKeyPairName
|
|
}
|
|
|
|
subnetId := state.Get("subnet_id").(string)
|
|
|
|
runOpts.SubnetId = subnetId
|
|
runOpts.SecurityGroupIds = securityGroupIds
|
|
|
|
if s.ExpectedRootDevice == "bsu" {
|
|
runOpts.VmInitiatedShutdownBehavior = s.VmInitiatedShutdownBehavior
|
|
}
|
|
|
|
runResp, err := oapiconn.POST_CreateVms(runOpts)
|
|
if err != nil {
|
|
err := fmt.Errorf("Error launching source vm: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
vmId = runResp.OK.Vms[0].VmId
|
|
volumeId := runResp.OK.Vms[0].BlockDeviceMappings[0].Bsu.VolumeId
|
|
|
|
// Set the vm ID so that the cleanup works properly
|
|
s.vmId = vmId
|
|
|
|
ui.Message(fmt.Sprintf("Vm ID: %s", vmId))
|
|
ui.Say(fmt.Sprintf("Waiting for vm (%v) to become ready...", vmId))
|
|
|
|
request := oapi.ReadVmsRequest{
|
|
Filters: oapi.FiltersVm{
|
|
VmIds: []string{vmId},
|
|
},
|
|
}
|
|
if err := waitUntilForVmRunning(oapiconn, vmId); err != nil {
|
|
err := fmt.Errorf("Error waiting for vm (%s) to become ready: %s", vmId, err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
//Set Vm tags and vollume tags
|
|
if len(oapiTags) > 0 {
|
|
if err := CreateTags(oapiconn, s.vmId, ui, oapiTags); err != nil {
|
|
err := fmt.Errorf("Error creating tags for vm (%s): %s", s.vmId, err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
}
|
|
|
|
if len(volTags) > 0 {
|
|
if err := CreateTags(oapiconn, volumeId, ui, volTags); err != nil {
|
|
err := fmt.Errorf("Error creating tags for volume (%s): %s", volumeId, err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
}
|
|
|
|
if publicip_id, ok := state.Get("publicip_id").(string); ok {
|
|
ui.Say(fmt.Sprintf("Linking temporary PublicIp %s to instance %s", publicip_id, vmId))
|
|
_, err := oapiconn.POST_LinkPublicIp(oapi.LinkPublicIpRequest{PublicIpId: publicip_id, VmId: vmId})
|
|
if err != nil {
|
|
state.Put("error", fmt.Errorf("Error linking PublicIp to VM: %s", err))
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
}
|
|
|
|
resp, err := oapiconn.POST_ReadVms(request)
|
|
|
|
r := resp.OK
|
|
|
|
if err != nil || len(r.Vms) == 0 {
|
|
err := fmt.Errorf("Error finding source vm.")
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
vm := r.Vms[0]
|
|
|
|
if s.Debug {
|
|
if vm.PublicDnsName != "" {
|
|
ui.Message(fmt.Sprintf("Public DNS: %s", vm.PublicDnsName))
|
|
}
|
|
|
|
if vm.PublicIp != "" {
|
|
ui.Message(fmt.Sprintf("Public IP: %s", vm.PublicIp))
|
|
}
|
|
|
|
if vm.PrivateIp != "" {
|
|
ui.Message(fmt.Sprintf("Private IP: %s", vm.PrivateIp))
|
|
}
|
|
}
|
|
|
|
state.Put("vm", vm)
|
|
// instance_id is the generic term used so that users can have access to the
|
|
// instance id inside of the provisioners, used in step_provision.
|
|
state.Put("instance_id", vmId)
|
|
|
|
// If we're in a region that doesn't support tagging on vm creation,
|
|
// do that now.
|
|
|
|
if s.IsRestricted {
|
|
oapiTags.Report(ui)
|
|
// Retry creating tags for about 2.5 minutes
|
|
err = retry.Retry(0.2, 30, 11, func(_ uint) (bool, error) {
|
|
_, err := oapiconn.POST_CreateTags(oapi.CreateTagsRequest{
|
|
Tags: oapiTags,
|
|
ResourceIds: []string{vmId},
|
|
})
|
|
if err == nil {
|
|
return true, nil
|
|
}
|
|
//TODO: improve error
|
|
if awsErr, ok := err.(awserr.Error); ok {
|
|
if awsErr.Code() == "InvalidVmID.NotFound" {
|
|
return false, nil
|
|
}
|
|
}
|
|
return true, err
|
|
})
|
|
|
|
if err != nil {
|
|
err := fmt.Errorf("Error tagging source vm: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
// Now tag volumes
|
|
|
|
volumeIds := make([]string, 0)
|
|
for _, v := range vm.BlockDeviceMappings {
|
|
if bsu := v.Bsu; !reflect.DeepEqual(bsu, oapi.BsuCreated{}) {
|
|
volumeIds = append(volumeIds, bsu.VolumeId)
|
|
}
|
|
}
|
|
|
|
if len(volumeIds) > 0 && s.VolumeTags.IsSet() {
|
|
ui.Say("Adding tags to source BSU Volumes")
|
|
|
|
volumeTags, err := s.VolumeTags.OAPITags(s.Ctx, oapiconn.GetConfig().Region, state)
|
|
if err != nil {
|
|
err := fmt.Errorf("Error tagging source BSU Volumes on %s: %s", vm.VmId, err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
volumeTags.Report(ui)
|
|
|
|
_, err = oapiconn.POST_CreateTags(oapi.CreateTagsRequest{
|
|
ResourceIds: volumeIds,
|
|
Tags: volumeTags,
|
|
})
|
|
|
|
if err != nil {
|
|
err := fmt.Errorf("Error tagging source BSU Volumes on %s: %s", vm.VmId, err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
}
|
|
}
|
|
|
|
return multistep.ActionContinue
|
|
}
|
|
|
|
func (s *StepRunSourceVm) Cleanup(state multistep.StateBag) {
|
|
|
|
oapiconn := state.Get("oapi").(*oapi.Client)
|
|
ui := state.Get("ui").(packer.Ui)
|
|
|
|
// Terminate the source vm if it exists
|
|
if s.vmId != "" {
|
|
ui.Say("Terminating the source OUTSCALE vm...")
|
|
if _, err := oapiconn.POST_DeleteVms(oapi.DeleteVmsRequest{VmIds: []string{s.vmId}}); err != nil {
|
|
ui.Error(fmt.Sprintf("Error terminating vm, may still be around: %s", err))
|
|
return
|
|
}
|
|
|
|
if err := waitUntilVmDeleted(oapiconn, s.vmId); err != nil {
|
|
ui.Error(err.Error())
|
|
}
|
|
}
|
|
}
|