Skip to content

Instantly share code, notes, and snippets.

@kevinastone
Forked from markbirbeck/ec2_server_create.rb
Last active December 10, 2015 17:49
Show Gist options
  • Save kevinastone/4470636 to your computer and use it in GitHub Desktop.
Save kevinastone/4470636 to your computer and use it in GitHub Desktop.
#
# Author:: Adam Jacob (<[email protected]>)
# Author:: Seth Chisamore (<[email protected]>)
# Copyright:: Copyright (c) 2010-2011 Opscode, Inc.
# License:: Apache License, Version 2.0
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
require 'chef/knife/ec2_base'
class Chef
class Knife
class Ec2ServerCreate < Knife
include Knife::Ec2Base
deps do
require 'fog'
require 'readline'
require 'chef/json_compat'
require 'chef/knife/bootstrap'
Chef::Knife::Bootstrap.load_deps
end
banner "knife ec2 server create (options)"
attr_accessor :initial_sleep_delay
option :flavor,
:short => "-f FLAVOR",
:long => "--flavor FLAVOR",
:description => "The flavor of server (m1.small, m1.medium, etc)",
:proc => Proc.new { |f| Chef::Config[:knife][:flavor] = f },
:default => "m1.small"
option :image,
:short => "-I IMAGE",
:long => "--image IMAGE",
:description => "The AMI for the server",
:proc => Proc.new { |i| Chef::Config[:knife][:image] = i }
option :security_groups,
:short => "-G X,Y,Z",
:long => "--groups X,Y,Z",
:description => "The security groups for this server",
:default => ["default"],
:proc => Proc.new { |groups| groups.split(',') }
option :availability_zone,
:short => "-Z ZONE",
:long => "--availability-zone ZONE",
:description => "The Availability Zone",
:proc => Proc.new { |key| Chef::Config[:knife][:availability_zone] = key }
option :chef_node_name,
:short => "-N NAME",
:long => "--node-name NAME",
:description => "The Chef node name for your new node"
option :ssh_key_name,
:short => "-S KEY",
:long => "--ssh-key KEY",
:description => "The AWS SSH key id",
:proc => Proc.new { |key| Chef::Config[:knife][:aws_ssh_key_id] = key }
option :ssh_user,
:short => "-x USERNAME",
:long => "--ssh-user USERNAME",
:description => "The ssh username",
:default => "root"
option :ssh_password,
:short => "-P PASSWORD",
:long => "--ssh-password PASSWORD",
:description => "The ssh password"
option :identity_file,
:short => "-i IDENTITY_FILE",
:long => "--identity-file IDENTITY_FILE",
:description => "The SSH identity file used for authentication"
option :prerelease,
:long => "--prerelease",
:description => "Install the pre-release chef gems"
option :bootstrap_version,
:long => "--bootstrap-version VERSION",
:description => "The version of Chef to install",
:proc => Proc.new { |v| Chef::Config[:knife][:bootstrap_version] = v }
option :distro,
:short => "-d DISTRO",
:long => "--distro DISTRO",
:description => "Bootstrap a distro using a template",
:proc => Proc.new { |d| Chef::Config[:knife][:distro] = d }
option :template_file,
:long => "--template-file TEMPLATE",
:description => "Full path to location of template to use",
:proc => Proc.new { |t| Chef::Config[:knife][:template_file] = t },
:default => false
option :ebs_size,
:long => "--ebs-size SIZE",
:description => "The size of the EBS volume in GB, for EBS-backed instances"
option :ebs_no_delete_on_term,
:long => "--ebs-no-delete-on-term",
:description => "Do not delete EBS volumn on instance termination"
option :run_list,
:short => "-r RUN_LIST",
:long => "--run-list RUN_LIST",
:description => "Comma separated list of roles/recipes to apply",
:proc => lambda { |o| o.split(/[\s,]+/) },
:default => []
option :subnet_id,
:short => "-s SUBNET-ID",
:long => "--subnet SUBNET-ID",
:description => "create node in this Virtual Private Cloud Subnet ID (implies VPC mode)"
option :host_key_verify,
:long => "--[no-]host-key-verify",
:description => "Verify host key, enabled by default.",
:boolean => true,
:default => true
option :aws_user_data,
:long => "--user-data USER_DATA_FILE",
:short => "-u USER_DATA_FILE",
:description => "The EC2 User Data file to provision the instance with",
:proc => Proc.new { |m| Chef::Config[:knife][:aws_user_data] = m },
:default => nil
def tcp_test_ssh(hostname)
tcp_socket = TCPSocket.new(hostname, 22)
readable = IO.select([tcp_socket], nil, nil, 5)
if readable
Chef::Log.debug("sshd accepting connections on #{hostname}, banner is #{tcp_socket.gets}")
yield
true
else
false
end
rescue SocketError
sleep 2
false
rescue Errno::ETIMEDOUT
false
rescue Errno::EPERM
false
rescue Errno::ECONNREFUSED
sleep 2
false
# This happens on EC2 quite often
rescue Errno::EHOSTUNREACH
sleep 2
false
ensure
tcp_socket && tcp_socket.close
end
def run
$stdout.sync = true
validate!
server = connection.servers.create(create_server_def)
msg_pair("Instance ID", server.id)
msg_pair("Flavor", server.flavor_id)
msg_pair("Image", server.image_id)
msg_pair("Region", connection.instance_variable_get(:@region))
msg_pair("Availability Zone", server.availability_zone)
msg_pair("Security Groups", server.groups.join(", "))
msg_pair("SSH Key", server.key_name)
print "\n#{ui.color("Waiting for server", :magenta)}"
# wait for it to be ready to do stuff
server.wait_for { print "."; ready? }
puts("\n")
if vpc_mode?
msg_pair("Subnet ID", server.subnet_id)
else
msg_pair("Public DNS Name", server.dns_name)
msg_pair("Public IP Address", server.public_ip_address)
msg_pair("Private DNS Name", server.private_dns_name)
end
msg_pair("Private IP Address", server.private_ip_address)
print "\n#{ui.color("Waiting for sshd", :magenta)}"
fqdn = vpc_mode? ? server.private_ip_address : server.dns_name
print(".") until tcp_test_ssh(fqdn) {
sleep @initial_sleep_delay ||= (vpc_mode? ? 40 : 10)
puts("done")
}
if Chef::Config[:knife][:chef_mode] != "solo"
bootstrap_for_node(server,fqdn).run
end
puts "\n"
msg_pair("Instance ID", server.id)
msg_pair("Flavor", server.flavor_id)
msg_pair("Image", server.image_id)
msg_pair("Region", connection.instance_variable_get(:@region))
msg_pair("Availability Zone", server.availability_zone)
msg_pair("Security Groups", server.groups.join(", "))
msg_pair("SSH Key", server.key_name)
msg_pair("Root Device Type", server.root_device_type)
if server.root_device_type == "ebs"
device_map = server.block_device_mapping.first
msg_pair("Root Volume ID", device_map['volumeId'])
msg_pair("Root Device Name", device_map['deviceName'])
msg_pair("Root Device Delete on Terminate", device_map['deleteOnTermination'])
if config[:ebs_size]
if ami.block_device_mapping.first['volumeSize'].to_i < config[:ebs_size].to_i
volume_too_large_warning = "#{config[:ebs_size]}GB " +
"EBS volume size is larger than size set in AMI of " +
"#{ami.block_device_mapping.first['volumeSize']}GB.\n" +
"Use file system tools to make use of the increased volume size."
msg_pair("Warning", volume_too_large_warning, :yellow)
end
end
end
if vpc_mode?
msg_pair("Subnet ID", server.subnet_id)
else
msg_pair("Public DNS Name", server.dns_name)
msg_pair("Public IP Address", server.public_ip_address)
msg_pair("Private DNS Name", server.private_dns_name)
end
msg_pair("Private IP Address", server.private_ip_address)
msg_pair("Environment", config[:environment] || '_default')
msg_pair("Run List", config[:run_list].join(', '))
end
def bootstrap_for_node(server,fqdn)
bootstrap = Chef::Knife::Bootstrap.new
bootstrap.name_args = [fqdn]
bootstrap.config[:run_list] = config[:run_list]
bootstrap.config[:ssh_user] = config[:ssh_user]
bootstrap.config[:identity_file] = config[:identity_file]
bootstrap.config[:chef_node_name] = config[:chef_node_name] || server.id
bootstrap.config[:prerelease] = config[:prerelease]
bootstrap.config[:bootstrap_version] = locate_config_value(:bootstrap_version)
bootstrap.config[:distro] = locate_config_value(:distro)
bootstrap.config[:use_sudo] = true unless config[:ssh_user] == 'root'
bootstrap.config[:template_file] = locate_config_value(:template_file)
bootstrap.config[:environment] = config[:environment]
# may be needed for vpc_mode
bootstrap.config[:no_host_key_verify] = config[:no_host_key_verify]
bootstrap
end
def vpc_mode?
# Amazon Virtual Private Cloud requires a subnet_id. If
# present, do a few things differently
!!config[:subnet_id]
end
def ami
@ami ||= connection.images.get(locate_config_value(:image))
end
def validate!
super([:image, :aws_ssh_key_id, :aws_access_key_id, :aws_secret_access_key])
if ami.nil?
ui.error("You have not provided a valid image (AMI) value. Please note the short option for this value recently changed from '-i' to '-I'.")
exit 1
end
end
def create_server_def
server_def = {
:image_id => locate_config_value(:image),
:groups => config[:security_groups],
:flavor_id => locate_config_value(:flavor),
:key_name => Chef::Config[:knife][:aws_ssh_key_id],
:availability_zone => locate_config_value(:availability_zone)
}
server_def[:subnet_id] = config[:subnet_id] if config[:subnet_id]
if Chef::Config[:knife][:aws_user_data]
begin
server_def.merge!(:user_data => File.read(Chef::Config[:knife][:aws_user_data]))
rescue
ui.warn("Cannot read #{Chef::Config[:knife][:aws_user_data]}: #{$!.inspect}. Ignoring option.")
end
end
if ami.root_device_type == "ebs"
ami_map = ami.block_device_mapping.first
ebs_size = begin
if config[:ebs_size]
Integer(config[:ebs_size]).to_s
else
ami_map["volumeSize"].to_s
end
rescue ArgumentError
puts "--ebs-size must be an integer"
msg opt_parser
exit 1
end
delete_term = if config[:ebs_no_delete_on_term]
"false"
else
ami_map["deleteOnTermination"]
end
server_def[:block_device_mapping] =
[{
'DeviceName' => ami_map["deviceName"],
'Ebs.VolumeSize' => ebs_size,
'Ebs.DeleteOnTermination' => delete_term
}]
end
server_def
end
end
end
end
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment