func (b *Builder) Prepare(raws ...interface{}) error { md, err := common.DecodeConfig(&b.config, raws...) if err != nil { return err } // Accumulate any errors errs := common.CheckUnusedConfig(md) errs = packer.MultiErrorAppend(errs, b.config.AccessConfig.Prepare()...) errs = packer.MultiErrorAppend(errs, b.config.RunConfig.Prepare()...) // Accumulate any errors if b.config.AMIName == "" { errs = packer.MultiErrorAppend( errs, errors.New("ami_name must be specified")) } else { _, err = template.New("ami").Parse(b.config.AMIName) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing ami_name: %s", err)) } } if errs != nil && len(errs.Errors) > 0 { return errs } log.Printf("Config: %+v", b.config) return nil }
func (b *Builder) Prepare(raws ...interface{}) error { md, err := common.DecodeConfig(&b.config, raws...) if err != nil { return err } // Accumulate any errors errs := common.CheckUnusedConfig(md) // Optional configuration with defaults if b.config.APIKey == "" { // Default to environment variable for api_key, if it exists b.config.APIKey = os.Getenv("DIGITALOCEAN_API_KEY") } if b.config.ClientID == "" { // Default to environment variable for client_id, if it exists b.config.ClientID = os.Getenv("DIGITALOCEAN_CLIENT_ID") } if b.config.RegionID == 0 { // Default to Region "New York" b.config.RegionID = 1 } if b.config.SizeID == 0 { // Default to 512mb, the smallest droplet size b.config.SizeID = 66 } if b.config.ImageID == 0 { // Default to base image "Ubuntu 12.04 x64 Server (id: 284203)" b.config.ImageID = 284203 } if b.config.SSHUsername == "" { // Default to "root". You can override this if your // SourceImage has a different user account then the DO default b.config.SSHUsername = "******" } if b.config.SSHPort == 0 { // Default to port 22 per DO default b.config.SSHPort = 22 } if b.config.RawSnapshotName == "" { // Default to packer-{{ unix timestamp (utc) }} b.config.RawSnapshotName = "packer-{{.CreateTime}}" } if b.config.RawSSHTimeout == "" { // Default to 1 minute timeouts b.config.RawSSHTimeout = "1m" } if b.config.RawEventDelay == "" { // Default to 5 second delays after creating events // to allow DO to process b.config.RawEventDelay = "5s" } if b.config.RawStateTimeout == "" { // Default to 6 minute timeouts waiting for // desired state. i.e waiting for droplet to become active b.config.RawStateTimeout = "6m" } // Required configurations that will display errors if not set if b.config.ClientID == "" { errs = packer.MultiErrorAppend( errs, errors.New("a client_id must be specified")) } if b.config.APIKey == "" { errs = packer.MultiErrorAppend( errs, errors.New("an api_key must be specified")) } sshTimeout, err := time.ParseDuration(b.config.RawSSHTimeout) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing ssh_timeout: %s", err)) } b.config.sshTimeout = sshTimeout eventDelay, err := time.ParseDuration(b.config.RawEventDelay) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing event_delay: %s", err)) } b.config.eventDelay = eventDelay stateTimeout, err := time.ParseDuration(b.config.RawStateTimeout) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing state_timeout: %s", err)) } b.config.stateTimeout = stateTimeout // Parse the name of the snapshot snapNameBuf := new(bytes.Buffer) tData := snapshotNameData{ strconv.FormatInt(time.Now().UTC().Unix(), 10), } t, err := template.New("snapshot").Parse(b.config.RawSnapshotName) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing snapshot_name: %s", err)) } else { t.Execute(snapNameBuf, tData) b.config.SnapshotName = snapNameBuf.String() } if errs != nil && len(errs.Errors) > 0 { return errs } log.Printf("Config: %+v", b.config) return nil }
func (b *Builder) Prepare(raws ...interface{}) error { md, err := common.DecodeConfig(&b.config, raws...) if err != nil { return err } // Accumulate any errors errs := common.CheckUnusedConfig(md) if b.config.SSHPort == 0 { b.config.SSHPort = 22 } if b.config.RawSSHTimeout == "" { b.config.RawSSHTimeout = "1m" } // Accumulate any errors if b.config.SourceAmi == "" { errs = packer.MultiErrorAppend( errs, errors.New("A source_ami must be specified")) } if b.config.InstanceType == "" { errs = packer.MultiErrorAppend( errs, errors.New("An instance_type must be specified")) } if b.config.Region == "" { errs = packer.MultiErrorAppend( errs, errors.New("A region must be specified")) } else if _, ok := aws.Regions[b.config.Region]; !ok { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Unknown region: %s", b.config.Region)) } if b.config.SSHUsername == "" { errs = packer.MultiErrorAppend( errs, errors.New("An ssh_username must be specified")) } b.config.sshTimeout, err = time.ParseDuration(b.config.RawSSHTimeout) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing ssh_timeout: %s", err)) } if b.config.AMIName == "" { errs = packer.MultiErrorAppend( errs, errors.New("ami_name must be specified")) } else { _, err = template.New("ami").Parse(b.config.AMIName) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing ami_name: %s", err)) } } if errs != nil && len(errs.Errors) > 0 { return errs } log.Printf("Config: %+v", b.config) return nil }
func (b *Builder) Prepare(raws ...interface{}) error { md, err := common.DecodeConfig(&b.config, raws...) if err != nil { return err } if b.config.BundleDestination == "" { b.config.BundleDestination = "/tmp" } if b.config.BundlePrefix == "" { b.config.BundlePrefix = "image-{{.CreateTime}}" } if b.config.BundleUploadCommand == "" { b.config.BundleUploadCommand = "sudo -n ec2-upload-bundle " + "-b {{.BucketName}} " + "-m {{.ManifestPath}} " + "-a {{.AccessKey}} " + "-s {{.SecretKey}} " + "-d {{.BundleDirectory}} " + "--batch " + "--retry" } if b.config.BundleVolCommand == "" { b.config.BundleVolCommand = "sudo -n ec2-bundle-vol " + "-k {{.KeyPath}} " + "-u {{.AccountId}} " + "-c {{.CertPath}} " + "-r {{.Architecture}} " + "-e {{.PrivatePath}} " + "-d {{.Destination}} " + "-p {{.Prefix}} " + "--batch" } if b.config.X509UploadPath == "" { b.config.X509UploadPath = "/tmp" } // Accumulate any errors errs := common.CheckUnusedConfig(md) errs = packer.MultiErrorAppend(errs, b.config.AccessConfig.Prepare()...) errs = packer.MultiErrorAppend(errs, b.config.RunConfig.Prepare()...) if b.config.AccountId == "" { errs = packer.MultiErrorAppend(errs, errors.New("account_id is required")) } else { b.config.AccountId = strings.Replace(b.config.AccountId, "-", "", -1) } if b.config.AMIName == "" { errs = packer.MultiErrorAppend( errs, errors.New("ami_name must be specified")) } else { _, err = template.New("ami").Parse(b.config.AMIName) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing ami_name: %s", err)) } } if b.config.S3Bucket == "" { errs = packer.MultiErrorAppend(errs, errors.New("s3_bucket is required")) } if b.config.X509CertPath == "" { errs = packer.MultiErrorAppend(errs, errors.New("x509_cert_path is required")) } else if _, err := os.Stat(b.config.X509CertPath); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("x509_cert_path points to bad file: %s", err)) } if b.config.X509KeyPath == "" { errs = packer.MultiErrorAppend(errs, errors.New("x509_key_path is required")) } else if _, err := os.Stat(b.config.X509KeyPath); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("x509_key_path points to bad file: %s", err)) } if errs != nil && len(errs.Errors) > 0 { return errs } log.Printf("Config: %+v", b.config) return nil }
func (b *Builder) Prepare(raws ...interface{}) error { md, err := common.DecodeConfig(&b.config, raws...) if err != nil { return err } // Accumulate any errors errs := common.CheckUnusedConfig(md) if b.config.DiskName == "" { b.config.DiskName = "disk" } if b.config.DiskSize == 0 { b.config.DiskSize = 40000 } if b.config.FloppyFiles == nil { b.config.FloppyFiles = make([]string, 0) } if b.config.GuestOSType == "" { b.config.GuestOSType = "other" } if b.config.VMName == "" { b.config.VMName = fmt.Sprintf("packer-%s", b.config.PackerBuildName) } if b.config.HTTPPortMin == 0 { b.config.HTTPPortMin = 8000 } if b.config.HTTPPortMax == 0 { b.config.HTTPPortMax = 9000 } if b.config.RawBootWait == "" { b.config.RawBootWait = "10s" } if b.config.VNCPortMin == 0 { b.config.VNCPortMin = 5900 } if b.config.VNCPortMax == 0 { b.config.VNCPortMax = 6000 } if b.config.OutputDir == "" { b.config.OutputDir = fmt.Sprintf("output-%s", b.config.PackerBuildName) } if b.config.SSHPort == 0 { b.config.SSHPort = 22 } if b.config.ToolsUploadPath == "" { b.config.ToolsUploadPath = "{{ .Flavor }}.iso" } if b.config.HTTPPortMin > b.config.HTTPPortMax { errs = packer.MultiErrorAppend( errs, errors.New("http_port_min must be less than http_port_max")) } if b.config.ISOChecksum == "" { errs = packer.MultiErrorAppend( errs, errors.New("Due to large file sizes, an iso_checksum is required")) } else { b.config.ISOChecksum = strings.ToLower(b.config.ISOChecksum) } if b.config.ISOChecksumType == "" { errs = packer.MultiErrorAppend( errs, errors.New("The iso_checksum_type must be specified.")) } else { b.config.ISOChecksumType = strings.ToLower(b.config.ISOChecksumType) if h := common.HashForType(b.config.ISOChecksumType); h == nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Unsupported checksum type: %s", b.config.ISOChecksumType)) } } if b.config.ISOUrl == "" { errs = packer.MultiErrorAppend( errs, errors.New("An iso_url must be specified.")) } else { url, err := url.Parse(b.config.ISOUrl) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("iso_url is not a valid URL: %s", err)) } else { if url.Scheme == "" { url.Scheme = "file" } if url.Scheme == "file" { if _, err := os.Stat(url.Path); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("iso_url points to bad file: %s", err)) } } else { supportedSchemes := []string{"file", "http", "https"} scheme := strings.ToLower(url.Scheme) found := false for _, supported := range supportedSchemes { if scheme == supported { found = true break } } if !found { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Unsupported URL scheme in iso_url: %s", scheme)) } } } if errs == nil || len(errs.Errors) == 0 { // Put the URL back together since we may have modified it b.config.ISOUrl = url.String() } } if !b.config.PackerForce { if _, err := os.Stat(b.config.OutputDir); err == nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Output directory '%s' already exists. It must not exist.", b.config.OutputDir)) } } if b.config.SSHUser == "" { errs = packer.MultiErrorAppend( errs, errors.New("An ssh_username must be specified.")) } if b.config.RawBootWait != "" { b.config.bootWait, err = time.ParseDuration(b.config.RawBootWait) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing boot_wait: %s", err)) } } if b.config.RawShutdownTimeout == "" { b.config.RawShutdownTimeout = "5m" } b.config.shutdownTimeout, err = time.ParseDuration(b.config.RawShutdownTimeout) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing shutdown_timeout: %s", err)) } if b.config.RawSSHWaitTimeout == "" { b.config.RawSSHWaitTimeout = "20m" } b.config.sshWaitTimeout, err = time.ParseDuration(b.config.RawSSHWaitTimeout) if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed parsing ssh_wait_timeout: %s", err)) } if _, err := template.New("path").Parse(b.config.ToolsUploadPath); err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("tools_upload_path invalid: %s", err)) } if b.config.VNCPortMin > b.config.VNCPortMax { errs = packer.MultiErrorAppend( errs, fmt.Errorf("vnc_port_min must be less than vnc_port_max")) } b.driver, err = NewDriver() if err != nil { errs = packer.MultiErrorAppend( errs, fmt.Errorf("Failed creating VMware driver: %s", err)) } if errs != nil && len(errs.Errors) > 0 { return errs } return nil }