Packer is a tool for creating identical machine images for multiple platforms from a single source configuration.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Tyler Tidman 09f0e9ece1
Use the newer go pre-built binary in vagrant as well, just like travis
10 years ago
builder Merge pull request #3040 from kimor79/3011 10 years ago
command There's no Warn, only Say 10 years ago
common Prevalidate Hardware Specs on Linux 10 years ago
communicator Merge pull request #2848 from epowell/master 10 years ago
contrib/zsh-completion
fix Enable headless mode by default on Parallels Desktop 11 11 years ago
helper Merge pull request #2848 from epowell/master 10 years ago
packer Use alternate temp directories for docker 10 years ago
plugin Added an artifice post-processor which allows you to override artifacts in a post-processor chain 11 years ago
post-processor Added support for spaces in vSphere resource pools 10 years ago
provisioner Merge pull request #2653 from evertrue/evertrue/eherot/add_data_bag_secret_to_chef_client 10 years ago
scripts Remove old scripts 10 years ago
template Fix #2742: Include template line numbers on error 10 years ago
test
website Merge pull request #3113 from tylert/md-ext-rename 10 years ago
.gitignore Ignore logs from packer tests 11 years ago
.travis.yml Bump go 1.5 to 1.5.3 10 years ago
CHANGELOG.md Added iso_skip_cache and pre-build resource validation to changelog 10 years ago
CONTRIBUTING.md Fix go version in docs 11 years ago
LICENSE
Makefile Added gosigar to the makefile so x-compile works 10 years ago
README.md README.md quick-start builder example made more secure 10 years ago
Vagrantfile Use the newer go pre-built binary in vagrant as well, just like travis 10 years ago
appveyor.yml Added go vet and git rev-parse head to appveyor so we can see what we're actually building / testing 11 years ago
checkpoint.go Move ConfigFile() and ConfigDir() from package main to packer 10 years ago
commands.go Implemented internal plugins 10 years ago
config.go Switch osext package from mitchellh -> kardianos #2842 10 years ago
log.go
main.go Merge pull request #2846 from markpeek/packer-tmp 10 years ago
main_test.go Fatal -> Fatalf since we have a format string 10 years ago
panic.go
signal.go
stdin.go
version.go up version for dev 11 years ago

README.md

Packer

Build Status Windows Build Status

Packer is a tool for building identical machine images for multiple platforms from a single source configuration.

Packer is lightweight, runs on every major operating system, and is highly performant, creating machine images for multiple platforms in parallel. Packer comes out of the box with support for the following platforms:

  • Amazon EC2 (AMI). Both EBS-backed and instance-store AMIs
  • DigitalOcean
  • Docker
  • Google Compute Engine
  • OpenStack
  • Parallels
  • QEMU. Both KVM and Xen images.
  • VirtualBox
  • VMware

Support for other platforms can be added via plugins.

The images that Packer creates can easily be turned into Vagrant boxes.

Quick Start

Note: There is a great introduction and getting started guide for those with a bit more patience. Otherwise, the quick start below will get you up and running quickly, at the sacrifice of not explaining some key points.

First, download a pre-built Packer binary for your operating system or compile Packer yourself.

After Packer is installed, create your first template, which tells Packer what platforms to build images for and how you want to build them. In our case, we'll create a simple AMI that has Redis pre-installed. Save this file as quick-start.json. Export your AWS credentials as the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables.

{
  "variables": {
    "access_key": "{{env `AWS_ACCESS_KEY_ID`}}",
    "secret_key": "{{env `AWS_SECRET_ACCESS_KEY`}}"
  },
  "builders": [{
    "type": "amazon-ebs",
    "access_key": "{{user `access_key`}}",
    "secret_key": "{{user `access_key`}}",
    "region": "us-east-1",
    "source_ami": "ami-de0d9eb7",
    "instance_type": "t1.micro",
    "ssh_username": "ubuntu",
    "ami_name": "packer-example {{timestamp}}"
  }]
}

Next, tell Packer to build the image:

$ packer build quick-start.json
...

Packer will build an AMI according to the "quick-start" template. The AMI will be available in your AWS account. To delete the AMI, you must manually delete it using the AWS console. Packer builds your images, it does not manage their lifecycle. Where they go, how they're run, etc. is up to you.

Documentation

Full, comprehensive documentation is viewable on the Packer website:

http://www.packer.io/docs

Developing Packer

If you wish to work on Packer itself or any of its built-in providers, you'll first need Go installed (version 1.4+ is required). Make sure Go is properly installed, including setting up a GOPATH.

Next, install the following software packages, which are needed for some dependencies:

Then, install Gox, which is used as a compilation tool on top of Go:

$ go get -u github.com/mitchellh/gox

Next, clone this repository into $GOPATH/src/github.com/mitchellh/packer. Install the necessary dependencies by running make updatedeps and then just type make. This will compile some more dependencies and then run the tests. If this exits with exit status 0, then everything is working!

$ make updatedeps
...
$ make
...

To compile a development version of Packer and the built-in plugins, run make dev. This will put Packer binaries in the bin folder:

$ make dev
...
$ bin/packer
...

If you're developing a specific package, you can run tests for just that package by specifying the TEST variable. For example below, only packer package tests will be run.

$ make test TEST=./packer
...

Acceptance Tests

Packer has comprehensive acceptance tests covering the builders of Packer.

If you're working on a feature of a builder or a new builder and want verify it is functioning (and also hasn't broken anything else), we recommend running the acceptance tests.

Warning: The acceptance tests create/destroy/modify real resources, which may incur real costs in some cases. In the presence of a bug, it is technically possible that broken backends could leave dangling data behind. Therefore, please run the acceptance tests at your own risk. At the very least, we recommend running them in their own private account for whatever builder you're testing.

To run the acceptance tests, invoke make testacc:

$ make testacc TEST=./builder/amazon/ebs
...

The TEST variable is required, and you should specify the folder where the backend is. The TESTARGS variable is recommended to filter down to a specific resource to test, since testing all of them at once can sometimes take a very long time.

Acceptance tests typically require other environment variables to be set for things such as access keys. The test itself should error early and tell you what to set, so it is not documented here.