This plugin has been superseded by the packer-plugin-bolt repository for newer versions of HashiCorp Packer
HashiCorp Packer plugin that provisions machines using Puppet Bolt
The bolt Packer provisioner runs Puppet Bolt tasks. It runs an SSH server, executes bolt task run, and marshals Bolt tasks through the SSH server to the machine being provisioned by Packer.
Note:: Any remote_user defined in tasks will be ignored. Packer will always connect with the user given in the json config for this provisioner.
- bolt_task (string) - The bolt task to be run.
or
- bolt_plan (string) - The bolt plan to be run.
Name | Type | Description |
---|---|---|
bolt_module_path | string | The path that Bolt should look for modules |
bolt_params | json | The parameters to pass the Bolt Task or Plan. |
install_modules | boolean | Whether to install modules from a Bolt project using the Puppetfile |
inventory_file | string | The inventory file to use during provisioning. When unspecified, Packer will create a temporary inventory file and will use the host_alias. |
local_port | uint | The port on which to attempt to listen for SSH connections. This value is a starting point. The provisioner will attempt listen for SSH connections on the first available of ten ports, starting at local_port. A system-chosen port is used when local_port is missing or empty. |
log_level | string | The level of logging (debug, error, info, notice, warn, fatal, any) |
project_path | string | The path that Bolt should look for a Bolt project directory |
user | string | The bolt_user to use. Defaults to the user running packer. |
Name | Type | Description |
---|---|---|
ssh_host_key_file | string | The SSH key that will be used to run the SSH server on the host machine to forward commands to the target machine. Bolt connects to this server and will validate the identity of the server using the system known_hosts. The default behavior is to generate and use a onetime key. |
ssh_authorized_key_file | string | The SSH public key of the Bolt ssh_user. The default behavior is to generate and use a onetime key. If this key is generated, the corresponding private key is passed to bolt with the --private-key-file option. |
run_as | string | The user to run as for privilege escalation |
Name | Type | Description |
---|---|---|
password | string | The password used to authenticate to the Windows machine |
no_winrm_ssl_verify | boolean | Whether to verify that the target's certificate matches the cacert |
no_winrm_ssl | boolean | Whether to use secure https connections for WinRM |
Author: | Martez Reed (martez.reed@greenreedtech.com) |
Copyright: | Copyright (c) 2018-2019 Green Reed Technology |
License: | Apache License, Version 2.0 |
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.