Go to file
Mitchell Hashimoto b4ae3fbdb3 update CHANGELOG 2015-05-28 09:37:21 -07:00
builder Merge pull request #1930 from bhourigan/issue1929 2015-05-28 09:36:58 -07:00
command packer: remove Ui/Cache from CoreConfig 2015-05-27 20:09:52 -07:00
common code.google.com/p/go.crypto/ssh -> golang.org/x/crypto/ssh 2015-05-28 08:17:49 -07:00
communicator/ssh code.google.com/p/go.crypto/ssh -> golang.org/x/crypto/ssh 2015-05-28 08:17:49 -07:00
contrib/zsh-completion zsh completion 2015-04-04 13:51:59 +03:00
fix command: move all remaining commands 2014-10-27 20:34:49 -07:00
helper helper/config: support outputting metadata 2015-05-27 12:55:41 -07:00
packer Merge pull request #2025 from ceh/skip-color-test 2015-05-27 20:21:17 -07:00
plugin post-processor/atlas: make it 2014-12-09 16:14:04 -08:00
post-processor post-processor/docker-tag: remove decodeconfig usage 2015-05-27 14:57:57 -07:00
provisioner provisioner/*: interpolation 2015-05-27 14:50:20 -07:00
scripts scripts: ignore errors on gox for now 2014-09-11 11:51:44 -07:00
template vmware/iso: new interpolation 2015-05-27 14:16:28 -07:00
test fixed packer --version 2014-12-13 19:40:39 +01:00
website Merge pull request #1930 from bhourigan/issue1929 2015-05-28 09:36:58 -07:00
.gitignore Update middleman-hashicorp 2015-05-15 16:19:35 -04:00
.travis.yml Also deprecate go version 1.3 2015-05-26 14:12:04 -07:00
CHANGELOG.md update CHANGELOG 2015-05-28 09:37:21 -07:00
CONTRIBUTING.md Add gox installation instructions to Contributing 2014-06-26 13:55:47 +02:00
LICENSE LICENSE: MPL2 2013-06-24 14:29:15 -07:00
Makefile Add testacc to Makefile 2015-05-26 13:26:22 -07:00
README.md update README for acceptance tests 2015-05-26 13:50:45 -07:00
Vagrantfile Remove Vagrant constants [GH-1566] 2014-10-14 15:41:04 -07:00
checkpoint.go fixing version numbers: RCs should be labeled x.x.x-rcx 2015-02-08 07:44:05 +01:00
commands.go packer: remove Ui/Cache from CoreConfig 2015-05-27 20:09:52 -07:00
config.go packer: remove Ui/Cache from CoreConfig 2015-05-27 20:09:52 -07:00
config_unix.go website: update website to point to proper directory 2014-09-08 13:44:58 -07:00
config_windows.go website: update website to point to proper directory 2014-09-08 13:44:58 -07:00
log.go command: move more to this package, remove old packages 2014-10-27 20:31:02 -07:00
main.go packer: remove Ui/Cache from CoreConfig 2015-05-27 20:09:52 -07:00
main_test.go Rename some files, style 2014-10-27 20:42:41 -07:00
panic.go Rename some files, style 2014-10-27 20:42:41 -07:00
signal.go packer: remove Environment 2015-05-25 17:29:10 -07:00
stdin.go ctrl-c closes stdin for plugins so that they are unblocked 2013-07-25 23:27:13 -07:00
version.go Update CHANGELOG 2014-12-09 18:57:03 -08:00

README.md

Packer

Build Status

Packer is a tool for building identical machine images for multiple platforms from a single source configuration.

Packer is lightweight, runs on every major operating system, and is highly performant, creating machine images for multiple platforms in parallel. Packer comes out of the box with support for the following platforms:

  • Amazon EC2 (AMI). Both EBS-backed and instance-store AMIs
  • DigitalOcean
  • Docker
  • Google Compute Engine
  • OpenStack
  • Parallels
  • QEMU. Both KVM and Xen images.
  • VirtualBox
  • VMware

Support for other platforms can be added via plugins.

The images that Packer creates can easily be turned into Vagrant boxes.

Quick Start

Note: There is a great introduction and getting started guide for those with a bit more patience. Otherwise, the quick start below will get you up and running quickly, at the sacrifice of not explaining some key points.

First, download a pre-built Packer binary for your operating system or compile Packer yourself.

After Packer is installed, create your first template, which tells Packer what platforms to build images for and how you want to build them. In our case, we'll create a simple AMI that has Redis pre-installed. Save this file as quick-start.json. Be sure to replace any credentials with your own.

{
  "builders": [{
    "type": "amazon-ebs",
    "access_key": "YOUR KEY HERE",
    "secret_key": "YOUR SECRET KEY HERE",
    "region": "us-east-1",
    "source_ami": "ami-de0d9eb7",
    "instance_type": "t1.micro",
    "ssh_username": "ubuntu",
    "ami_name": "packer-example {{timestamp}}"
  }]
}

Next, tell Packer to build the image:

$ packer build quick-start.json
...

Packer will build an AMI according to the "quick-start" template. The AMI will be available in your AWS account. To delete the AMI, you must manually delete it using the AWS console. Packer builds your images, it does not manage their lifecycle. Where they go, how they're run, etc. is up to you.

Documentation

Full, comprehensive documentation is viewable on the Packer website:

http://www.packer.io/docs

Developing Packer

If you wish to work on Packer itself or any of its built-in providers, you'll first need Go installed (version 1.2+ is required). Make sure Go is properly installed, including setting up a GOPATH.

Next, install the following software packages, which are needed for some dependencies:

Then, install Gox, which is used as a compilation tool on top of Go:

$ go get -u github.com/mitchellh/gox

Next, clone this repository into $GOPATH/src/github.com/mitchellh/packer. Install the necessary dependencies by running make updatedeps and then just type make. This will compile some more dependencies and then run the tests. If this exits with exit status 0, then everything is working!

$ make updatedeps
...
$ make
...

To compile a development version of Packer and the built-in plugins, run make dev. This will put Packer binaries in the bin folder:

$ make dev
...
$ bin/packer
...

If you're developing a specific package, you can run tests for just that package by specifying the TEST variable. For example below, only packer package tests will be run.

$ make test TEST=./packer
...

Acceptance Tests

Packer has comprehensive acceptance tests covering the builders of Packer.

If you're working on a feature of a builder or a new builder and want verify it is functioning (and also hasn't broken anything else), we recommend running the acceptance tests.

Warning: The acceptance tests create/destroy/modify real resources, which may incur real costs in some cases. In the presence of a bug, it is technically possible that broken backends could leave dangling data behind. Therefore, please run the acceptance tests at your own risk. At the very least, we recommend running them in their own private account for whatever builder you're testing.

To run the acceptance tests, invoke make testacc:

$ make testacc TEST=./builder/amazon/ebs
...

The TEST variable is required, and you should specify the folder where the backend is. The TESTARGS variable is recommended to filter down to a specific resource to test, since testing all of them at once can sometimes take a very long time.

Acceptance tests typically require other environment variables to be set for things such as access keys. The test itself should error early and tell you what to set, so it is not documented here.