-
-
Save bhenerey/387e6a8e27f84ec0cd1b to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# Author:: Adam Jacob (<[email protected]>) | |
# Author:: Seth Chisamore (<[email protected]>) | |
# Copyright:: Copyright (c) 2010-2011 Opscode, Inc. | |
# License:: Apache License, Version 2.0 | |
# | |
# Licensed under the Apache License, Version 2.0 (the "License"); | |
# you may not use this file except in compliance with the License. | |
# You may obtain a copy of the License at | |
# | |
# http://www.apache.org/licenses/LICENSE-2.0 | |
# | |
# Unless required by applicable law or agreed to in writing, software | |
# distributed under the License is distributed on an "AS IS" BASIS, | |
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
# See the License for the specific language governing permissions and | |
# limitations under the License. | |
# | |
require 'chef/knife/ec2_base' | |
class Chef | |
class Knife | |
class Ec2ServerCreate < Knife | |
include Knife::Ec2Base | |
deps do | |
require 'fog' | |
require 'readline' | |
require 'chef/json_compat' | |
require 'chef/knife/bootstrap' | |
Chef::Knife::Bootstrap.load_deps | |
end | |
banner "knife ec2 server create (options)" | |
attr_accessor :initial_sleep_delay | |
option :flavor, | |
:short => "-f FLAVOR", | |
:long => "--flavor FLAVOR", | |
:description => "The flavor of server (m1.small, m1.medium, etc)", | |
:proc => Proc.new { |f| Chef::Config[:knife][:flavor] = f }, | |
:default => "m1.small" | |
option :image, | |
:short => "-I IMAGE", | |
:long => "--image IMAGE", | |
:description => "The AMI for the server", | |
:proc => Proc.new { |i| Chef::Config[:knife][:image] = i } | |
option :security_groups, | |
:short => "-G X,Y,Z", | |
:long => "--groups X,Y,Z", | |
:description => "The security groups for this server", | |
:default => ["default"], | |
:proc => Proc.new { |groups| groups.split(',') } | |
option :availability_zone, | |
:short => "-Z ZONE", | |
:long => "--availability-zone ZONE", | |
:description => "The Availability Zone", | |
:default => "us-east-1b", | |
:proc => Proc.new { |key| Chef::Config[:knife][:availability_zone] = key } | |
option :chef_node_name, | |
:short => "-N NAME", | |
:long => "--node-name NAME", | |
:description => "The Chef node name for your new node" | |
option :ssh_key_name, | |
:short => "-S KEY", | |
:long => "--ssh-key KEY", | |
:description => "The AWS SSH key id", | |
:proc => Proc.new { |key| Chef::Config[:knife][:aws_ssh_key_id] = key } | |
option :ssh_user, | |
:short => "-x USERNAME", | |
:long => "--ssh-user USERNAME", | |
:description => "The ssh username", | |
:default => "root" | |
option :ssh_password, | |
:short => "-P PASSWORD", | |
:long => "--ssh-password PASSWORD", | |
:description => "The ssh password" | |
option :identity_file, | |
:short => "-i IDENTITY_FILE", | |
:long => "--identity-file IDENTITY_FILE", | |
:description => "The SSH identity file used for authentication" | |
option :prerelease, | |
:long => "--prerelease", | |
:description => "Install the pre-release chef gems" | |
option :bootstrap_version, | |
:long => "--bootstrap-version VERSION", | |
:description => "The version of Chef to install", | |
:proc => Proc.new { |v| Chef::Config[:knife][:bootstrap_version] = v } | |
option :distro, | |
:short => "-d DISTRO", | |
:long => "--distro DISTRO", | |
:description => "Bootstrap a distro using a template", | |
:proc => Proc.new { |d| Chef::Config[:knife][:distro] = d }, | |
:default => "ubuntu10.04-gems" | |
option :template_file, | |
:long => "--template-file TEMPLATE", | |
:description => "Full path to location of template to use", | |
:proc => Proc.new { |t| Chef::Config[:knife][:template_file] = t }, | |
:default => false | |
option :ebs_size, | |
:long => "--ebs-size SIZE", | |
:description => "The size of the EBS volume in GB, for EBS-backed instances" | |
option :ebs_no_delete_on_term, | |
:long => "--ebs-no-delete-on-term", | |
:description => "Do not delete EBS volumn on instance termination" | |
option :run_list, | |
:short => "-r RUN_LIST", | |
:long => "--run-list RUN_LIST", | |
:description => "Comma separated list of roles/recipes to apply", | |
:proc => lambda { |o| o.split(/[\s,]+/) }, | |
:default => [] | |
option :subnet_id, | |
:short => "-s SUBNET-ID", | |
:long => "--subnet SUBNET-ID", | |
:description => "create node in this Virtual Private Cloud Subnet ID (implies VPC mode)", | |
:default => false | |
option :no_host_key_verify, | |
:long => "--no-host-key-verify", | |
:description => "Disable host key verification", | |
:boolean => true, | |
:default => false | |
option :aws_user_data, | |
:long => "--user-data USER_DATA_FILE", | |
:short => "-u USER_DATA_FILE", | |
:description => "The EC2 User Data file to provision the instance with", | |
:proc => Proc.new { |m| Chef::Config[:knife][:aws_user_data] = m }, | |
:default => nil | |
def tcp_test_ssh(hostname) | |
tcp_socket = TCPSocket.new(hostname, 22) | |
readable = IO.select([tcp_socket], nil, nil, 5) | |
if readable | |
Chef::Log.debug("sshd accepting connections on #{hostname}, banner is #{tcp_socket.gets}") | |
yield | |
true | |
else | |
false | |
end | |
rescue SocketError | |
sleep 2 | |
false | |
rescue Errno::ETIMEDOUT | |
false | |
rescue Errno::EPERM | |
false | |
rescue Errno::ECONNREFUSED | |
sleep 2 | |
false | |
# This happens on EC2 quite often | |
rescue Errno::EHOSTUNREACH | |
sleep 2 | |
false | |
ensure | |
tcp_socket && tcp_socket.close | |
end | |
def run | |
$stdout.sync = true | |
validate! | |
server = connection.servers.create(create_server_def) | |
msg_pair("Instance ID", server.id) | |
msg_pair("Flavor", server.flavor_id) | |
msg_pair("Image", server.image_id) | |
msg_pair("Region", connection.instance_variable_get(:@region)) | |
msg_pair("Availability Zone", server.availability_zone) | |
msg_pair("Security Groups", server.groups.join(", ")) | |
msg_pair("SSH Key", server.key_name) | |
print "\n#{ui.color("Waiting for server", :magenta)}" | |
# wait for it to be ready to do stuff | |
server.wait_for { print "."; ready? } | |
puts("\n") | |
if vpc_mode? | |
msg_pair("Subnet ID", server.subnet_id) | |
else | |
msg_pair("Public DNS Name", server.dns_name) | |
msg_pair("Public IP Address", server.public_ip_address) | |
msg_pair("Private DNS Name", server.private_dns_name) | |
end | |
msg_pair("Private IP Address", server.private_ip_address) | |
print "\n#{ui.color("Waiting for sshd", :magenta)}" | |
fqdn = vpc_mode? ? server.private_ip_address : server.dns_name | |
print(".") until tcp_test_ssh(fqdn) { | |
sleep @initial_sleep_delay ||= (vpc_mode? ? 40 : 10) | |
puts("done") | |
} | |
if Chef::Config[:knife][:chef_mode] != "solo" | |
bootstrap_for_node(server,fqdn).run | |
end | |
puts "\n" | |
msg_pair("Instance ID", server.id) | |
msg_pair("Flavor", server.flavor_id) | |
msg_pair("Image", server.image_id) | |
msg_pair("Region", connection.instance_variable_get(:@region)) | |
msg_pair("Availability Zone", server.availability_zone) | |
msg_pair("Security Groups", server.groups.join(", ")) | |
msg_pair("SSH Key", server.key_name) | |
msg_pair("Root Device Type", server.root_device_type) | |
if server.root_device_type == "ebs" | |
device_map = server.block_device_mapping.first | |
msg_pair("Root Volume ID", device_map['volumeId']) | |
msg_pair("Root Device Name", device_map['deviceName']) | |
msg_pair("Root Device Delete on Terminate", device_map['deleteOnTermination']) | |
if config[:ebs_size] | |
if ami.block_device_mapping.first['volumeSize'].to_i < config[:ebs_size].to_i | |
volume_too_large_warning = "#{config[:ebs_size]}GB " + | |
"EBS volume size is larger than size set in AMI of " + | |
"#{ami.block_device_mapping.first['volumeSize']}GB.\n" + | |
"Use file system tools to make use of the increased volume size." | |
msg_pair("Warning", volume_too_large_warning, :yellow) | |
end | |
end | |
end | |
if vpc_mode? | |
msg_pair("Subnet ID", server.subnet_id) | |
else | |
msg_pair("Public DNS Name", server.dns_name) | |
msg_pair("Public IP Address", server.public_ip_address) | |
msg_pair("Private DNS Name", server.private_dns_name) | |
end | |
msg_pair("Private IP Address", server.private_ip_address) | |
msg_pair("Environment", config[:environment] || '_default') | |
msg_pair("Run List", config[:run_list].join(', ')) | |
end | |
def bootstrap_for_node(server,fqdn) | |
bootstrap = Chef::Knife::Bootstrap.new | |
bootstrap.name_args = [fqdn] | |
bootstrap.config[:run_list] = config[:run_list] | |
bootstrap.config[:ssh_user] = config[:ssh_user] | |
bootstrap.config[:identity_file] = config[:identity_file] | |
bootstrap.config[:chef_node_name] = config[:chef_node_name] || server.id | |
bootstrap.config[:prerelease] = config[:prerelease] | |
bootstrap.config[:bootstrap_version] = locate_config_value(:bootstrap_version) | |
bootstrap.config[:distro] = locate_config_value(:distro) | |
bootstrap.config[:use_sudo] = true unless config[:ssh_user] == 'root' | |
bootstrap.config[:template_file] = locate_config_value(:template_file) | |
bootstrap.config[:environment] = config[:environment] | |
# may be needed for vpc_mode | |
bootstrap.config[:no_host_key_verify] = config[:no_host_key_verify] | |
bootstrap | |
end | |
def vpc_mode? | |
# Amazon Virtual Private Cloud requires a subnet_id. If | |
# present, do a few things differently | |
!!config[:subnet_id] | |
end | |
def ami | |
@ami ||= connection.images.get(locate_config_value(:image)) | |
end | |
def validate! | |
super([:image, :aws_ssh_key_id, :aws_access_key_id, :aws_secret_access_key]) | |
if ami.nil? | |
ui.error("You have not provided a valid image (AMI) value. Please note the short option for this value recently changed from '-i' to '-I'.") | |
exit 1 | |
end | |
end | |
def create_server_def | |
server_def = { | |
:image_id => locate_config_value(:image), | |
:groups => config[:security_groups], | |
:flavor_id => locate_config_value(:flavor), | |
:key_name => Chef::Config[:knife][:aws_ssh_key_id], | |
:availability_zone => locate_config_value(:availability_zone) | |
} | |
server_def[:subnet_id] = config[:subnet_id] if config[:subnet_id] | |
if Chef::Config[:knife][:aws_user_data] | |
begin | |
server_def.merge!(:user_data => File.read(Chef::Config[:knife][:aws_user_data])) | |
rescue | |
ui.warn("Cannot read #{Chef::Config[:knife][:aws_user_data]}: #{$!.inspect}. Ignoring option.") | |
end | |
end | |
if ami.root_device_type == "ebs" | |
ami_map = ami.block_device_mapping.first | |
ebs_size = begin | |
if config[:ebs_size] | |
Integer(config[:ebs_size]).to_s | |
else | |
ami_map["volumeSize"].to_s | |
end | |
rescue ArgumentError | |
puts "--ebs-size must be an integer" | |
msg opt_parser | |
exit 1 | |
end | |
delete_term = if config[:ebs_no_delete_on_term] | |
"false" | |
else | |
ami_map["deleteOnTermination"] | |
end | |
server_def[:block_device_mapping] = | |
[{ | |
'DeviceName' => ami_map["deviceName"], | |
'Ebs.VolumeSize' => ebs_size, | |
'Ebs.DeleteOnTermination' => delete_term | |
}] | |
end | |
server_def | |
end | |
end | |
end | |
end |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment