Go to file
Stephen Fox cd4ae03324 Create / use SSH key pairs in vbox builders.
This follows the business logic for creating / using SSH key pairs
in the cloud-type builders (e.g., Amazon EC2).
2019-02-03 12:20:52 -05:00
.circleci clean up config.yml and decrease number of parallel processes in build 2018-11-19 16:02:43 -08:00
.github update contributing guidelines and make sure that the PR template links to them. 2019-01-23 11:35:50 -08:00
builder Create / use SSH key pairs in vbox builders. 2019-02-03 12:20:52 -05:00
command break a chain of post-processors when one is skipped & make `-only` 2019-01-11 14:08:30 +01:00
common re-add missing import 2019-01-25 12:33:25 -08:00
communicator Add tmp package that offers Dir & File funcs 2018-12-12 16:35:57 +01:00
contrib Document --except & --only flags for post-processors 2019-01-11 13:00:10 +01:00
examples azure: sysprep after agent is ready 2019-01-08 10:17:33 -08:00
fix Revert "Rename attribute api_access_key to organization_id" 2018-11-08 16:34:23 -08:00
helper Added 'SSHPublicKeyUrlEncoded()' to comm.Config. 2019-02-03 12:14:06 -05:00
packer break a chain of post-processors when one is skipped & make `-only` 2019-01-11 14:08:30 +01:00
plugin/example delete unneeded plugin file 2017-09-28 10:52:54 -07:00
post-processor manually set proxyfromenvironment in default http client for ec2 sessions 2019-01-25 12:33:25 -08:00
provisioner Merge branch 'master' into pr/6950 2019-01-09 10:11:18 +01:00
scripts scripts: add gcc package for using gco on build 2018-10-31 16:58:07 +03:00
template allow to skip a post processor 2019-01-10 15:44:34 +01:00
test Miscellaneous doc improvements 2018-10-18 19:09:49 -04:00
vendor Revert "debug should retry" 2019-01-24 16:44:53 +01:00
version prepare for 1.3.5-dev 2019-01-30 16:45:38 +01:00
website prepare to release 1.3.4 2019-01-30 16:10:18 +01:00
.gitattributes too many files for shell during Make, convert .go and .sh to EOL=lf 2018-04-07 05:22:39 -04:00
.gitignore switch to netlify deployment 2018-09-19 12:17:28 -07:00
.travis.yml travis-ci: allow failures on windows 2018-10-17 13:44:27 +02:00
CHANGELOG.md Cut version 1.3.4 2019-01-30 16:33:57 +01:00
CODEOWNERS whitespace 2018-11-28 10:38:53 -08:00
Dockerfile dockerfile: add minimal image with provisioners support 2018-10-31 16:58:06 +03:00
LICENSE LICENSE: MPL2 2013-06-24 14:29:15 -07:00
Makefile Revert "enable verbose mode to see debug" 2019-01-24 16:44:51 +01:00
README.md Miscellaneous doc improvements 2018-10-18 19:09:49 -04:00
Vagrantfile vagrantfile: add support for docker provider 2018-10-31 16:58:06 +03:00
appveyor.yml appveyor.yml: timeout tests after 2m 2019-01-24 14:01:23 +01:00
checkpoint.go move packer to hashicorp 2017-04-04 13:39:01 -07:00
commands.go Complete Atlas deprecation. 2018-08-02 20:23:28 -07:00
config.go move packer to hashicorp 2017-04-04 13:39:01 -07:00
go.mod GO111MODULE=on go get github.com/aws/aws-sdk-go@v1.16.24 2019-01-24 13:07:34 +01:00
go.sum GO111MODULE=on go get github.com/aws/aws-sdk-go@v1.16.24 2019-01-24 13:07:34 +01:00
log.go Use Sprint() instead of Sprintf() in log dedupe 2018-10-09 22:43:54 -04:00
main.go Add tmp package that offers Dir & File funcs 2018-12-12 16:35:57 +01:00
main_test.go move packer to hashicorp 2017-04-04 13:39:01 -07:00
panic.go Add telemetry reporting through checkpoint 2017-06-15 13:21:11 -07:00
stdin.go Gracefully clean up on SIGTERM 2017-09-08 11:42:32 -07:00

README.md

Packer

Build Status Windows Build Status GoDoc GoReportCard

Packer is a tool for building identical machine images for multiple platforms from a single source configuration.

Packer is lightweight, runs on every major operating system, and is highly performant, creating machine images for multiple platforms in parallel. Packer comes out of the box with support for many platforms, the full list of which can be found at https://www.packer.io/docs/builders/index.html.

Support for other platforms can be added via plugins.

The images that Packer creates can easily be turned into Vagrant boxes.

Quick Start

Note: There is a great introduction and getting started guide for those with a bit more patience. Otherwise, the quick start below will get you up and running quickly, at the sacrifice of not explaining some key points.

First, download a pre-built Packer binary for your operating system or compile Packer yourself.

After Packer is installed, create your first template, which tells Packer what platforms to build images for and how you want to build them. In our case, we'll create a simple AMI that has Redis pre-installed. Save this file as quick-start.json. Export your AWS credentials as the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables.

{
  "variables": {
    "access_key": "{{env `AWS_ACCESS_KEY_ID`}}",
    "secret_key": "{{env `AWS_SECRET_ACCESS_KEY`}}"
  },
  "builders": [{
    "type": "amazon-ebs",
    "access_key": "{{user `access_key`}}",
    "secret_key": "{{user `secret_key`}}",
    "region": "us-east-1",
    "source_ami": "ami-af22d9b9",
    "instance_type": "t2.micro",
    "ssh_username": "ubuntu",
    "ami_name": "packer-example {{timestamp}}"
  }]
}

Next, tell Packer to build the image:

$ packer build quick-start.json
...

Packer will build an AMI according to the "quick-start" template. The AMI will be available in your AWS account. To delete the AMI, you must manually delete it using the AWS console. Packer builds your images, it does not manage their lifecycle. Where they go, how they're run, etc., is up to you.

Documentation

Comprehensive documentation is viewable on the Packer website:

https://www.packer.io/docs

Developing Packer

See CONTRIBUTING.md for best practices and instructions on setting up your development environment to work on Packer.