195 lines
6.1 KiB
Go
195 lines
6.1 KiB
Go
package ebs
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"log"
|
|
"time"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
|
"github.com/hashicorp/packer-plugin-sdk/multistep"
|
|
packersdk "github.com/hashicorp/packer-plugin-sdk/packer"
|
|
"github.com/hashicorp/packer-plugin-sdk/random"
|
|
"github.com/hashicorp/packer-plugin-sdk/retry"
|
|
awscommon "github.com/hashicorp/packer/builder/amazon/common"
|
|
"github.com/hashicorp/packer/builder/amazon/common/awserrors"
|
|
)
|
|
|
|
type stepCreateAMI struct {
|
|
PollingConfig *awscommon.AWSPollingConfig
|
|
image *ec2.Image
|
|
AMISkipBuildRegion bool
|
|
}
|
|
|
|
func (s *stepCreateAMI) Run(ctx context.Context, state multistep.StateBag) multistep.StepAction {
|
|
config := state.Get("config").(*Config)
|
|
ec2conn := state.Get("ec2").(*ec2.EC2)
|
|
instance := state.Get("instance").(*ec2.Instance)
|
|
ui := state.Get("ui").(packersdk.Ui)
|
|
|
|
// Create the image
|
|
amiName := config.AMIName
|
|
state.Put("intermediary_image", false)
|
|
if config.AMIEncryptBootVolume.True() || s.AMISkipBuildRegion {
|
|
state.Put("intermediary_image", true)
|
|
|
|
// From AWS SDK docs: You can encrypt a copy of an unencrypted snapshot,
|
|
// but you cannot use it to create an unencrypted copy of an encrypted
|
|
// snapshot. Your default CMK for EBS is used unless you specify a
|
|
// non-default key using KmsKeyId.
|
|
|
|
// If encrypt_boot is nil or true, we need to create a temporary image
|
|
// so that in step_region_copy, we can copy it with the correct
|
|
// encryption
|
|
amiName = random.AlphaNum(7)
|
|
}
|
|
|
|
ui.Say(fmt.Sprintf("Creating AMI %s from instance %s", amiName, *instance.InstanceId))
|
|
createOpts := &ec2.CreateImageInput{
|
|
InstanceId: instance.InstanceId,
|
|
Name: &amiName,
|
|
BlockDeviceMappings: config.AMIMappings.BuildEC2BlockDeviceMappings(),
|
|
}
|
|
|
|
var createResp *ec2.CreateImageOutput
|
|
var err error
|
|
|
|
// Create a timeout for the CreateImage call.
|
|
timeoutCtx, cancel := context.WithTimeout(ctx, time.Minute*15)
|
|
defer cancel()
|
|
|
|
err = retry.Config{
|
|
Tries: 0,
|
|
ShouldRetry: func(err error) bool {
|
|
if awserrors.Matches(err, "InvalidParameterValue", "Instance is not in state") {
|
|
return true
|
|
}
|
|
return false
|
|
},
|
|
RetryDelay: (&retry.Backoff{InitialBackoff: 200 * time.Millisecond, MaxBackoff: 30 * time.Second, Multiplier: 2}).Linear,
|
|
}.Run(timeoutCtx, func(ctx context.Context) error {
|
|
createResp, err = ec2conn.CreateImage(createOpts)
|
|
return err
|
|
})
|
|
if err != nil {
|
|
err := fmt.Errorf("Error creating AMI: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
// Set the AMI ID in the state
|
|
ui.Message(fmt.Sprintf("AMI: %s", *createResp.ImageId))
|
|
amis := make(map[string]string)
|
|
amis[*ec2conn.Config.Region] = *createResp.ImageId
|
|
state.Put("amis", amis)
|
|
|
|
// Wait for the image to become ready
|
|
ui.Say("Waiting for AMI to become ready...")
|
|
if waitErr := s.PollingConfig.WaitUntilAMIAvailable(ctx, ec2conn, *createResp.ImageId); waitErr != nil {
|
|
// waitErr should get bubbled up if the issue is a wait timeout
|
|
err := fmt.Errorf("Error waiting for AMI: %s", waitErr)
|
|
imResp, imerr := ec2conn.DescribeImages(&ec2.DescribeImagesInput{ImageIds: []*string{createResp.ImageId}})
|
|
if imerr != nil {
|
|
// If there's a failure describing images, bubble that error up too, but don't erase the waitErr.
|
|
log.Printf("DescribeImages call was unable to determine reason waiting for AMI failed: %s", imerr)
|
|
err = fmt.Errorf("Unknown error waiting for AMI; %s. DescribeImages returned an error: %s", waitErr, imerr)
|
|
}
|
|
if imResp != nil && len(imResp.Images) > 0 {
|
|
// Finally, if there's a stateReason, store that with the wait err
|
|
image := imResp.Images[0]
|
|
if image != nil {
|
|
stateReason := image.StateReason
|
|
if stateReason != nil {
|
|
err = fmt.Errorf("Error waiting for AMI: %s. DescribeImages returned the state reason: %s", waitErr, stateReason)
|
|
}
|
|
}
|
|
}
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
|
|
imagesResp, err := ec2conn.DescribeImages(&ec2.DescribeImagesInput{ImageIds: []*string{createResp.ImageId}})
|
|
if err != nil {
|
|
err := fmt.Errorf("Error searching for AMI: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return multistep.ActionHalt
|
|
}
|
|
s.image = imagesResp.Images[0]
|
|
|
|
snapshots := make(map[string][]string)
|
|
for _, blockDeviceMapping := range imagesResp.Images[0].BlockDeviceMappings {
|
|
if blockDeviceMapping.Ebs != nil && blockDeviceMapping.Ebs.SnapshotId != nil {
|
|
|
|
snapshots[*ec2conn.Config.Region] = append(snapshots[*ec2conn.Config.Region], *blockDeviceMapping.Ebs.SnapshotId)
|
|
}
|
|
}
|
|
state.Put("snapshots", snapshots)
|
|
|
|
return multistep.ActionContinue
|
|
}
|
|
|
|
func (s *stepCreateAMI) Cleanup(state multistep.StateBag) {
|
|
if s.image == nil {
|
|
return
|
|
}
|
|
|
|
_, cancelled := state.GetOk(multistep.StateCancelled)
|
|
_, halted := state.GetOk(multistep.StateHalted)
|
|
if !cancelled && !halted {
|
|
return
|
|
}
|
|
|
|
ec2conn := state.Get("ec2").(*ec2.EC2)
|
|
ui := state.Get("ui").(packersdk.Ui)
|
|
|
|
ui.Say("Deregistering the AMI and deleting associated snapshots because " +
|
|
"of cancellation, or error...")
|
|
|
|
resp, err := ec2conn.DescribeImages(&ec2.DescribeImagesInput{
|
|
ImageIds: []*string{s.image.ImageId},
|
|
})
|
|
|
|
if err != nil {
|
|
err := fmt.Errorf("Error describing AMI: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return
|
|
}
|
|
|
|
// Deregister image by name.
|
|
for _, i := range resp.Images {
|
|
_, err := ec2conn.DeregisterImage(&ec2.DeregisterImageInput{
|
|
ImageId: i.ImageId,
|
|
})
|
|
|
|
if err != nil {
|
|
err := fmt.Errorf("Error deregistering existing AMI: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return
|
|
}
|
|
ui.Say(fmt.Sprintf("Deregistered AMI id: %s", *i.ImageId))
|
|
|
|
// Delete snapshot(s) by image
|
|
for _, b := range i.BlockDeviceMappings {
|
|
if b.Ebs != nil && aws.StringValue(b.Ebs.SnapshotId) != "" {
|
|
_, err := ec2conn.DeleteSnapshot(&ec2.DeleteSnapshotInput{
|
|
SnapshotId: b.Ebs.SnapshotId,
|
|
})
|
|
|
|
if err != nil {
|
|
err := fmt.Errorf("Error deleting existing snapshot: %s", err)
|
|
state.Put("error", err)
|
|
ui.Error(err.Error())
|
|
return
|
|
}
|
|
ui.Say(fmt.Sprintf("Deleted snapshot: %s", *b.Ebs.SnapshotId))
|
|
}
|
|
}
|
|
}
|
|
}
|