func TestCoreBuild_templatePath(t *testing.T) { config := TestCoreConfig(t) testCoreTemplate(t, config, fixtureDir("build-template-path.json")) b := TestBuilder(t, config, "test") core := TestCore(t, config) expected, _ := filepath.Abs("./test-fixtures") build, err := core.Build("test") if err != nil { t.Fatalf("err: %s", err) } if _, err := build.Prepare(); err != nil { t.Fatalf("err: %s", err) } // Interpolate the config var result map[string]interface{} err = configHelper.Decode(&result, nil, b.PrepareConfig...) if err != nil { t.Fatalf("err: %s", err) } if result["value"] != expected { t.Fatalf("bad: %#v", result) } }
func (p *PostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } // Accumulate any errors errs := new(packer.MultiError) if p.config.Template == "" { errs = packer.MultiErrorAppend(errs, fmt.Errorf("Template must be set")) } if p.config.Output == "" { errs = packer.MultiErrorAppend(errs, fmt.Errorf("Output must be set")) } log.Printf("Configure(): template:%s output:%s", p.config.Template, p.config.Output) if len(errs.Errors) > 0 { return errs } return nil }
func (p *Provisioner) Prepare(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{ "execute_command", }, }, }, raws...) if err != nil { return err } if p.config.RestartCommand == "" { p.config.RestartCommand = DefaultRestartCommand } if p.config.RestartCheckCommand == "" { p.config.RestartCheckCommand = DefaultRestartCheckCommand } if p.config.RestartTimeout == 0 { p.config.RestartTimeout = 5 * time.Minute } return nil }
func TestCoreBuild_buildTypeVar(t *testing.T) { config := TestCoreConfig(t) testCoreTemplate(t, config, fixtureDir("build-var-build-type.json")) b := TestBuilder(t, config, "test") core := TestCore(t, config) b.ArtifactId = "hello" build, err := core.Build("test") if err != nil { t.Fatalf("err: %s", err) } if _, err := build.Prepare(); err != nil { t.Fatalf("err: %s", err) } // Interpolate the config var result map[string]interface{} err = configHelper.Decode(&result, nil, b.PrepareConfig...) if err != nil { t.Fatalf("err: %s", err) } if result["value"] != "test" { t.Fatalf("bad: %#v", result) } }
func (p *PostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, }, raws...) if err != nil { return err } errs := &packer.MultiError{} // required configuration templates := map[string]*string{ "path": &p.config.Path, "manifest": &p.config.ManifestPath, "box_name": &p.config.BoxName, "box_dir": &p.config.BoxDir, "version": &p.config.Version, } for key, ptr := range templates { if *ptr == "" { errs = packer.MultiErrorAppend(errs, fmt.Errorf("vagrant-path %s must be set", key)) } } if len(errs.Errors) > 0 { return errs } return nil }
func (p *PostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } // Defaults if p.config.RemoveEthernet == "" { p.config.RemoveEthernet = "false" } if p.config.RemoveFloppy == "" { p.config.RemoveFloppy = "false" } if p.config.RemoveOpticalDrive == "" { p.config.RemoveOpticalDrive = "false" } if p.config.VirtualHardwareVer == "" { p.config.VirtualHardwareVer = "10" } // Accumulate any errors errs := new(packer.MultiError) if _, err := exec.LookPath("ovftool"); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("ovftool not found: %s", err)) } // First define all our templatable parameters that are _required_ templates := map[string]*string{ "datacenter": &p.config.Datacenter, "host": &p.config.Host, "password": &p.config.Password, "username": &p.config.Username, "datastore": &p.config.Datastore, "vm_folder": &p.config.VMFolder, } for key, ptr := range templates { if *ptr == "" { errs = packer.MultiErrorAppend( errs, fmt.Errorf("%s must be set", key)) } } if len(errs.Errors) > 0 { return errs } return nil }
func (p *PostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } if p.config.ChecksumTypes == nil { p.config.ChecksumTypes = []string{"md5"} } if p.config.OutputPath == "" { p.config.OutputPath = "packer_{{.BuildName}}_{{.BuilderType}}" + ".checksum" } errs := new(packer.MultiError) if err = interpolate.Validate(p.config.OutputPath, &p.config.ctx); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Error parsing target template: %s", err)) } if len(errs.Errors) > 0 { return errs } return nil }
func (p *Provisioner) Prepare(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } if p.config.Direction == "" { p.config.Direction = "upload" } var errs *packer.MultiError if p.config.Direction != "download" && p.config.Direction != "upload" { errs = packer.MultiErrorAppend(errs, errors.New("Direction must be one of: download, upload.")) } if p.config.Destination == "" { errs = packer.MultiErrorAppend(errs, errors.New("Destination must be specified.")) } if errs != nil && len(errs.Errors) > 0 { return errs } return nil }
func NewConfig(raws ...interface{}) (*Config, []string, error) { c := new(Config) warnings := []string{} err := config.Decode(c, &config.DecodeOpts{ Interpolate: true, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return nil, warnings, err } var errs *packer.MultiError if c.Target == "" { errs = packer.MultiErrorAppend(errs, ErrTargetRequired) } if c.Content == "" && c.Source == "" { warnings = append(warnings, "Both source file and contents are blank; target will have no content") } if c.Content != "" && c.Source != "" { errs = packer.MultiErrorAppend(errs, ErrContentSourceConflict) } if errs != nil && len(errs.Errors) > 0 { return nil, warnings, errs } return c, warnings, nil }
func (p *Provisioner) Prepare(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } var errs *packer.MultiError if _, err := os.Stat(p.config.Source); err != nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("Bad source '%s': %s", p.config.Source, err)) } if p.config.Destination == "" { errs = packer.MultiErrorAppend(errs, errors.New("Destination must be specified.")) } if errs != nil && len(errs.Errors) > 0 { return errs } return nil }
func (p *PostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } errs := &packer.MultiError{} errs = packer.MultiErrorAppend(errs, p.config.AccessConfig.Prepare(&p.config.ctx)...) // required configuration templates := map[string]*string{ "region": &p.config.Region, "bucket": &p.config.Bucket, "manifest": &p.config.ManifestPath, "box_name": &p.config.BoxName, "box_dir": &p.config.BoxDir, "version": &p.config.Version, } // Template process for key, ptr := range templates { if *ptr == "" { errs = packer.MultiErrorAppend( errs, fmt.Errorf("%s must be set", key)) } *ptr, err = interpolate.Render(*ptr, &p.config.ctx) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Error processing %s: %s", key, err)) } } // setup the s3 bucket auth, err := aws.GetAuth(p.config.AccessConfig.AccessKey, p.config.AccessConfig.SecretKey) if err != nil { errs = packer.MultiErrorAppend(errs, err) } // determine region region, valid := aws.Regions[p.config.Region] if valid { p.s3 = s3.New(auth, region).Bucket(p.config.Bucket) } else { errs = packer.MultiErrorAppend(errs, fmt.Errorf("Invalid region specified: %s", p.config.Region)) } if len(errs.Errors) > 0 { return errs } return nil }
func (p *PostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{"output"}, }, }, raws...) if err != nil { return err } errs := new(packer.MultiError) // required configuration templates := map[string]*string{ "region": &p.config.Region, "bucket": &p.config.Bucket, "manifest": &p.config.ManifestPath, "box_name": &p.config.BoxName, "box_dir": &p.config.BoxDir, "version": &p.config.Version, } for key, ptr := range templates { if *ptr == "" { errs = packer.MultiErrorAppend(errs, fmt.Errorf("vagrant-s3 %s must be set", key)) } } // Template process for key, ptr := range templates { if err = interpolate.Validate(*ptr, &p.config.ctx); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Error parsing %s template: %s", key, err)) } } auth, err := aws.GetAuth(p.config.AccessKey, p.config.SecretKey) if err != nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("Unable to create Aws Authentication. Try providing keys 'access_key_id' and 'secret_key'")) } // determine region region, valid := aws.Regions[p.config.Region] if valid { p.s3 = s3.New(auth, region).Bucket(p.config.Bucket) } else { errs = packer.MultiErrorAppend(errs, fmt.Errorf("Invalid region specified: %s", p.config.Region)) } if p.config.ACL == "" { p.config.ACL = "public-read" } if len(errs.Errors) > 0 { return errs } return nil }
func newConfig(raws ...interface{}) (*Config, []string, error) { var c Config err := config.Decode(&c, &config.DecodeOpts{ Interpolate: true, InterpolateContext: c.ctx, }, raws...) if err != nil { return nil, nil, err } provideDefaultValues(&c) setRuntimeValues(&c) err = setSshValues(&c) if err != nil { return nil, nil, err } var errs *packer.MultiError errs = packer.MultiErrorAppend(errs, c.Comm.Prepare(c.ctx)...) assertRequiredParametersSet(&c, errs) if errs != nil && len(errs.Errors) > 0 { return nil, nil, errs } return &c, nil, nil }
func (b *Builder) Prepare(raws ...interface{}) ([]string, error) { errs := &multierror.Error{} err := config.Decode(&b.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &b.config.ctx, }, raws...) if err != nil { errs = multierror.Append(errs, err) } if b.config.Comm.SSHUsername == "" { b.config.Comm.SSHUsername = "******" } errs = multierror.Append(errs, b.config.AccessConfig.Prepare(&b.config.ctx)...) errs = multierror.Append(errs, b.config.SourceMachineConfig.Prepare(&b.config.ctx)...) errs = multierror.Append(errs, b.config.Comm.Prepare(&b.config.ctx)...) errs = multierror.Append(errs, b.config.TargetImageConfig.Prepare(&b.config.ctx)...) if b.config.Comm.SSHPrivateKey == "" { b.config.Comm.SSHPrivateKey = b.config.KeyMaterial } return nil, errs.ErrorOrNil() }
func (p *PostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) errs := new(packer.MultiError) // If there is no explicit number of Go threads to use, then set it if os.Getenv("GOMAXPROCS") == "" { runtime.GOMAXPROCS(runtime.NumCPU()) } if p.config.OutputPath == "" { p.config.OutputPath = "packer_{{.BuildName}}_{{.Provider}}" } if err = interpolate.Validate(p.config.OutputPath, &p.config.ctx); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Error parsing target template: %s", err)) } templates := map[string]*string{ "output": &p.config.OutputPath, } if p.config.CompressionLevel > pgzip.BestCompression { p.config.CompressionLevel = pgzip.BestCompression } // Technically 0 means "don't compress" but I don't know how to // differentiate between "user entered zero" and "user entered nothing". // Also, why bother creating a compressed file with zero compression? if p.config.CompressionLevel == -1 || p.config.CompressionLevel == 0 { p.config.CompressionLevel = pgzip.DefaultCompression } for key, ptr := range templates { if *ptr == "" { errs = packer.MultiErrorAppend( errs, fmt.Errorf("%s must be set", key)) } *ptr, err = interpolate.Render(p.config.OutputPath, &p.config.ctx) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Error processing %s: %s", key, err)) } } p.config.detectFromFilename() if len(errs.Errors) > 0 { return errs } return nil }
func NewConfig(raws ...interface{}) (*Config, []string, error) { c := new(Config) err := config.Decode(c, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &c.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{ "boot_command", "prlctl", "prlctl_post", "parallels_tools_guest_path", }, }, }, raws...) if err != nil { return nil, nil, err } if c.VMName == "" { c.VMName = fmt.Sprintf("packer-%s-{{timestamp}}", c.PackerBuildName) } // Prepare the errors var errs *packer.MultiError errs = packer.MultiErrorAppend(errs, c.FloppyConfig.Prepare(&c.ctx)...) errs = packer.MultiErrorAppend(errs, c.OutputConfig.Prepare(&c.ctx, &c.PackerConfig)...) errs = packer.MultiErrorAppend(errs, c.PrlctlConfig.Prepare(&c.ctx)...) errs = packer.MultiErrorAppend(errs, c.PrlctlPostConfig.Prepare(&c.ctx)...) errs = packer.MultiErrorAppend(errs, c.PrlctlVersionConfig.Prepare(&c.ctx)...) errs = packer.MultiErrorAppend(errs, c.RunConfig.Prepare(&c.ctx)...) errs = packer.MultiErrorAppend(errs, c.ShutdownConfig.Prepare(&c.ctx)...) errs = packer.MultiErrorAppend(errs, c.SSHConfig.Prepare(&c.ctx)...) errs = packer.MultiErrorAppend(errs, c.ToolsConfig.Prepare(&c.ctx)...) if c.SourcePath == "" { errs = packer.MultiErrorAppend(errs, fmt.Errorf("source_path is required")) } else { if _, err := os.Stat(c.SourcePath); err != nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("source_path is invalid: %s", err)) } } // Warnings var warnings []string if c.ShutdownCommand == "" { warnings = append(warnings, "A shutdown_command was not specified. Without a shutdown command, Packer\n"+ "will forcibly halt the virtual machine, which may result in data loss.") } // Check for any errors. if errs != nil && len(errs.Errors) > 0 { return nil, warnings, errs } return c, warnings, nil }
func (p *Provisioner) Prepare(raws ...interface{}) error { p.done = make(chan struct{}) err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } // Defaults if p.config.Command == "" { p.config.Command = "ansible-playbook" } if p.config.HostAlias == "" { p.config.HostAlias = "default" } var errs *packer.MultiError err = validateFileConfig(p.config.PlaybookFile, "playbook_file", true) if err != nil { errs = packer.MultiErrorAppend(errs, err) } // Check that the authorized key file exists if len(p.config.SSHAuthorizedKeyFile) > 0 { err = validateFileConfig(p.config.SSHAuthorizedKeyFile, "ssh_authorized_key_file", true) if err != nil { log.Println(p.config.SSHAuthorizedKeyFile, "does not exist") errs = packer.MultiErrorAppend(errs, err) } } if len(p.config.SSHHostKeyFile) > 0 { err = validateFileConfig(p.config.SSHHostKeyFile, "ssh_host_key_file", true) if err != nil { log.Println(p.config.SSHHostKeyFile, "does not exist") errs = packer.MultiErrorAppend(errs, err) } } if len(p.config.LocalPort) > 0 { if _, err := strconv.ParseUint(p.config.LocalPort, 10, 16); err != nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("local_port: %s must be a valid port", p.config.LocalPort)) } } else { p.config.LocalPort = "0" } if errs != nil && len(errs.Errors) > 0 { return errs } return nil }
func (p *Provisioner) Prepare(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } if p.config.TempConfigDir == "" { p.config.TempConfigDir = DefaultTempConfigDir } if p.config.RemoteStateTree == "" { p.config.RemoteStateTree = DefaultStateTreeDir } if p.config.RemotePillarRoots == "" { p.config.RemotePillarRoots = DefaultPillarRootDir } var errs *packer.MultiError // require a salt state tree if p.config.LocalStateTree == "" { errs = packer.MultiErrorAppend(errs, errors.New("local_state_tree must be supplied")) } else { if _, err := os.Stat(p.config.LocalStateTree); err != nil { errs = packer.MultiErrorAppend(errs, errors.New("local_state_tree must exist and be accessible")) } } if p.config.LocalPillarRoots != "" { if _, err := os.Stat(p.config.LocalPillarRoots); err != nil { errs = packer.MultiErrorAppend(errs, errors.New("local_pillar_roots must exist and be accessible")) } } if p.config.MinionConfig != "" { if _, err := os.Stat(p.config.MinionConfig); err != nil { errs = packer.MultiErrorAppend(errs, errors.New("minion_config must exist and be accessible")) } } if errs != nil && len(errs.Errors) > 0 { return errs } return nil }
func (p *HostCommandProvisioner) Prepare(raw ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{ "execute_command", }, }, }, raw...) if err != nil { return err } var errs *packer.MultiError if p.config.ExecuteCommand == "" { p.config.ExecuteCommand = "{{ .Command }}" } if p.config.Commands == nil { p.config.Commands = make([]string, 0) } if p.config.Vars == nil { p.config.Vars = make([]string, 0) } if p.config.Command != "" && len(p.config.Commands) > 0 { errs = packer.MultiErrorAppend(errs, errors.New("You cannot specify both command and commands")) } if p.config.Command != "" { p.config.Commands = []string{p.config.Command} } // Sanity check if len(p.config.Commands) == 0 { errs = packer.MultiErrorAppend(errs, errors.New("You must specify a command")) } // Check for bad env vars (i.e. '=foo' and 'foobar') for _, keyValStr := range p.config.Vars { keyValPair := strings.SplitN(keyValStr, "=", 2) if len(keyValPair) != 2 || keyValPair[0] == "" { errs = packer.MultiErrorAppend(errs, fmt.Errorf("Environment variable not in 'key=value' format: %s", keyValStr)) } } if errs != nil && len(errs.Errors) > 0 { return errs } return nil }
func (p *Provisioner) Prepare(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{ "execute_command", }, }, }, raws...) if err != nil { return err } if p.config.ExecuteCommand == "" { p.config.ExecuteCommand = p.commandTemplate() } if p.config.StagingDir == "" { p.config.StagingDir = "/tmp/packer-puppet-server" } if p.config.Facter == nil { p.config.Facter = make(map[string]string) } p.config.Facter["packer_build_name"] = p.config.PackerBuildName p.config.Facter["packer_builder_type"] = p.config.PackerBuilderType var errs *packer.MultiError if p.config.ClientCertPath != "" { info, err := os.Stat(p.config.ClientCertPath) if err != nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("client_cert_dir is invalid: %s", err)) } else if !info.IsDir() { errs = packer.MultiErrorAppend(errs, fmt.Errorf("client_cert_dir must point to a directory")) } } if p.config.ClientPrivateKeyPath != "" { info, err := os.Stat(p.config.ClientPrivateKeyPath) if err != nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("client_private_key_dir is invalid: %s", err)) } else if !info.IsDir() { errs = packer.MultiErrorAppend(errs, fmt.Errorf("client_private_key_dir must point to a directory")) } } if errs != nil && len(errs.Errors) > 0 { return errs } return nil }
func (p *PostProcessor) Configure(raws ...interface{}) error { if err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, }, raws...); err != nil { return err } return nil }
func newConfig(raws ...interface{}) (*Config, []string, error) { var c Config err := config.Decode(&c, &config.DecodeOpts{ Interpolate: true, InterpolateContext: c.ctx, }, raws...) if err != nil { return nil, nil, err } provideDefaultValues(&c) setRuntimeValues(&c) setUserNamePassword(&c) err = setCloudEnvironment(&c) if err != nil { return nil, nil, err } err = setCustomData(&c) if err != nil { return nil, nil, err } // NOTE: if the user did not specify a communicator, then default to both // SSH and WinRM. This is for backwards compatibility because the code did // not specifically force the user to set a communicator. if c.Comm.Type == "" || strings.EqualFold(c.Comm.Type, "ssh") { err = setSshValues(&c) if err != nil { return nil, nil, err } } if c.Comm.Type == "" || strings.EqualFold(c.Comm.Type, "winrm") { err = setWinRMCertificate(&c) if err != nil { return nil, nil, err } } var errs *packer.MultiError errs = packer.MultiErrorAppend(errs, c.Comm.Prepare(c.ctx)...) assertRequiredParametersSet(&c, errs) assertTagProperties(&c, errs) if errs != nil && len(errs.Errors) > 0 { return nil, nil, errs } return &c, nil, nil }
func (p *OVFPostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.cfg, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.cfg.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } if p.cfg.TargetType == "" { p.cfg.TargetType = "ovf" } if p.cfg.TargetPath == "" { p.cfg.TargetPath = "packer_{{ .BuildName }}_{{.Provider}}" if p.cfg.TargetType == "ova" { p.cfg.TargetPath += ".ova" } } errs := new(packer.MultiError) _, err = exec.LookPath(executable) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Error: Could not find ovftool executable: %s", err)) } if err = interpolate.Validate(p.cfg.TargetPath, &p.cfg.ctx); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Error parsing target template: %s", err)) } if !(p.cfg.TargetType == "ovf" || p.cfg.TargetType == "ova") { errs = packer.MultiErrorAppend( errs, errors.New("Invalid target type. Only 'ovf' or 'ova' are allowed.")) } if !(p.cfg.Compression >= 0 && p.cfg.Compression <= 9) { errs = packer.MultiErrorAppend( errs, errors.New("Invalid compression level. Must be between 1 and 9, or 0 for no compression.")) } if len(errs.Errors) > 0 { return errs } return nil }
func (p *PostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } return nil }
func (p *PostProcessor) Configure(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } if p.config.UploadTimer == 0 { p.config.UploadTimer = 1200 } // Accumulate any errors errs := new(packer.MultiError) // First define all our templatable parameters that are _required_ templates := map[string]*string{ "apiurl": &p.config.ApiUrl, "apikey": &p.config.ApiKey, "secret": &p.config.Secret, "display_text": &p.config.DisplayText, "template_name": &p.config.TemplateName, "os_type": &p.config.OsType, "download_url": &p.config.DownloadUrl, "zone": &p.config.Zone, } for key, ptr := range templates { if *ptr == "" { errs = packer.MultiErrorAppend( errs, fmt.Errorf("%s must be set", key)) } } // Then define the ones that are optional if p.config.Account != "" && p.config.Domain == "" { errs = packer.MultiErrorAppend( errs, errors.New("If the account is specified, the domain must also be specified.")) } if len(errs.Errors) > 0 { return errs } return nil }
func (p *Provisioner) Prepare(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } if p.config.Direction == "" { p.config.Direction = "upload" } var errs *packer.MultiError if p.config.Direction != "download" && p.config.Direction != "upload" { errs = packer.MultiErrorAppend(errs, errors.New("Direction must be one of: download, upload.")) } if p.config.Source != "" { p.config.Sources = append(p.config.Sources, p.config.Source) } if p.config.Direction == "upload" { for _, src := range p.config.Sources { if _, err := os.Stat(src); err != nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("Bad source '%s': %s", src, err)) } } } if len(p.config.Sources) < 1 { errs = packer.MultiErrorAppend(errs, errors.New("Source must be specified.")) } if p.config.Destination == "" { errs = packer.MultiErrorAppend(errs, errors.New("Destination must be specified.")) } if errs != nil && len(errs.Errors) > 0 { return errs } return nil }
// Entry point for configuration parisng when we've defined func (p *PostProcessor) Configure(raws ...interface{}) error { p.config.ctx.Funcs = awscommon.TemplateFuncs err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{ "s3_key_name", }, }, }, raws...) if err != nil { return err } // Set defaults if p.config.S3Key == "" { p.config.S3Key = "packer-import-{{timestamp}}.ova" } errs := new(packer.MultiError) // Check and render s3_key_name if err = interpolate.Validate(p.config.S3Key, &p.config.ctx); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Error parsing s3_key_name template: %s", err)) } // Check we have AWS access variables defined somewhere errs = packer.MultiErrorAppend(errs, p.config.AccessConfig.Prepare(&p.config.ctx)...) // define all our required paramaters templates := map[string]*string{ "s3_bucket_name": &p.config.S3Bucket, } // Check out required params are defined for key, ptr := range templates { if *ptr == "" { errs = packer.MultiErrorAppend( errs, fmt.Errorf("%s must be set", key)) } } // Anything which flagged return back up the stack if len(errs.Errors) > 0 { return errs } log.Println(common.ScrubConfig(p.config, p.config.AccessKey, p.config.SecretKey)) return nil }
func (p *Provisioner) Prepare(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, }, raws...) if err != nil { return err } // Defaults if p.config.Inline != nil && len(p.config.Inline) == 0 { p.config.Inline = nil } if p.config.DistrDstPath == "" { p.config.DistrDstPath = DistrDstPathDefault } // Accumulate any errors var errs *packer.MultiError log.Println(fmt.Sprintf("%s: %v", "inline", p.config.Inline)) log.Println(fmt.Sprintf("%s: %v", "script_path", p.config.ScriptPath)) log.Println(fmt.Sprintf("%s: %v", "distr_src_path", p.config.DistrSrcPath)) log.Println(fmt.Sprintf("%s: %v", "distr_dst_dir_path", p.config.DistrDstPath)) if p.config.ScriptPath == "" && p.config.Inline == nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("one of script_path or inline must be specified")) } if p.config.ScriptPath != "" { if _, err := os.Stat(p.config.ScriptPath); err != nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("script_path is not a valid path: %v", err)) } } if p.config.DistrSrcPath != "" { if _, err := os.Stat(p.config.DistrSrcPath); err != nil { errs = packer.MultiErrorAppend(errs, fmt.Errorf("distr_src_path is not a valid path: %v", err)) } } if errs != nil && len(errs.Errors) > 0 { return errs } return nil }
func (self *Builder) Prepare(raws ...interface{}) (params []string, retErr error) { var errs *packer.MultiError err := hconfig.Decode(&self.config, &hconfig.DecodeOpts{ Interpolate: true, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{ "boot_command", }, }, }, raws...) if err != nil { packer.MultiErrorAppend(errs, err) } errs = packer.MultiErrorAppend( errs, self.config.CommonConfig.Prepare(&self.config.ctx, &self.config.PackerConfig)...) // Set default values if self.config.VMMemory == 0 { self.config.VMMemory = 1024 } if len(self.config.PlatformArgs) == 0 { pargs := make(map[string]string) pargs["viridian"] = "false" pargs["nx"] = "true" pargs["pae"] = "true" pargs["apic"] = "true" pargs["timeoffset"] = "0" pargs["acpi"] = "1" self.config.PlatformArgs = pargs } // Validation if self.config.SourcePath == "" { errs = packer.MultiErrorAppend(errs, fmt.Errorf("A source_path must be specified")) } if len(errs.Errors) > 0 { retErr = errors.New(errs.Error()) } return nil, retErr }
func (p *Provisioner) Prepare(raws ...interface{}) error { err := config.Decode(&p.config, &config.DecodeOpts{ Interpolate: true, InterpolateContext: &p.config.ctx, InterpolateFilter: &interpolate.RenderFilter{ Exclude: []string{}, }, }, raws...) if err != nil { return err } return nil }