From f5c519f1f9e3b080a6725a98bb96fb961a91538f Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 11:54:44 +0100 Subject: [PATCH 01/13] get sdk changes --- go.mod | 2 +- go.sum | 2 ++ 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/go.mod b/go.mod index dd5c42d349c..ac9a8c4aea7 100644 --- a/go.mod +++ b/go.mod @@ -24,7 +24,7 @@ require ( github.com/hashicorp/hcl/v2 v2.11.1 github.com/hashicorp/hcp-sdk-go v0.15.1-0.20220112153249-f565607d7cc4 github.com/hashicorp/packer-plugin-amazon v1.0.6 - github.com/hashicorp/packer-plugin-sdk v0.2.11 + github.com/hashicorp/packer-plugin-sdk v0.2.12-0.20220215104433-24404dc7a52e github.com/jehiah/go-strftime v0.0.0-20171201141054-1d33003b3869 github.com/klauspost/compress v1.13.5 // indirect github.com/klauspost/pgzip v1.2.5 diff --git a/go.sum b/go.sum index a251796fec4..e6cf06c5f5c 100644 --- a/go.sum +++ b/go.sum @@ -768,6 +768,8 @@ github.com/hashicorp/packer-plugin-sdk v0.2.7/go.mod h1:ii9ub5UNAp30RGod3i3W8qj7 github.com/hashicorp/packer-plugin-sdk v0.2.9/go.mod h1:ii9ub5UNAp30RGod3i3W8qj7wA+H7kpURnD+Jt7oDkQ= github.com/hashicorp/packer-plugin-sdk v0.2.11 h1:FsL2oOfLJmXC9F6W9eMFe0eUi3+ggFuqkLGX41fyPE0= github.com/hashicorp/packer-plugin-sdk v0.2.11/go.mod h1:DI8REf9TEIcVkYPErI/nedo6zS2h81ze7sKuc/mIlTE= +github.com/hashicorp/packer-plugin-sdk v0.2.12-0.20220215104433-24404dc7a52e h1:bWsX98L1C0rFA1q3YVYNqUltygRxy7y7QKZ6upg2bO4= +github.com/hashicorp/packer-plugin-sdk v0.2.12-0.20220215104433-24404dc7a52e/go.mod h1:DI8REf9TEIcVkYPErI/nedo6zS2h81ze7sKuc/mIlTE= github.com/hashicorp/packer-plugin-tencentcloud v1.0.3 h1:8U2vMFyIE+pizoMDsSLyMBsbNdB1HzRAIaTJNIELyi4= github.com/hashicorp/packer-plugin-tencentcloud v1.0.3/go.mod h1:TCSlq9lCFU8H8eMMWNtwdnCeyHmaQ1A13PR11EJoJh0= github.com/hashicorp/packer-plugin-triton v1.0.0 h1:Uvh8fjEKqlii61BzIt1VEgSyJXL+UYfuMHCj44aVpU8= From 68b88a969b07b1e003067f8d047fb22525f1e5c7 Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 12:01:43 +0100 Subject: [PATCH 02/13] codegen --- provisioner/powershell/provisioner.hcl2spec.go | 2 ++ provisioner/shell/provisioner.hcl2spec.go | 2 ++ provisioner/windows-shell/provisioner.hcl2spec.go | 2 ++ 3 files changed, 6 insertions(+) diff --git a/provisioner/powershell/provisioner.hcl2spec.go b/provisioner/powershell/provisioner.hcl2spec.go index ce4a84c3354..cbeb427ce74 100644 --- a/provisioner/powershell/provisioner.hcl2spec.go +++ b/provisioner/powershell/provisioner.hcl2spec.go @@ -23,6 +23,7 @@ type FlatConfig struct { Scripts []string `cty:"scripts" hcl:"scripts"` ValidExitCodes []int `mapstructure:"valid_exit_codes" cty:"valid_exit_codes" hcl:"valid_exit_codes"` Vars []string `mapstructure:"environment_vars" cty:"environment_vars" hcl:"environment_vars"` + Env map[string]string `mapstructure:"env" cty:"env" hcl:"env"` EnvVarFormat *string `mapstructure:"env_var_format" cty:"env_var_format" hcl:"env_var_format"` Binary *bool `cty:"binary" hcl:"binary"` RemotePath *string `mapstructure:"remote_path" cty:"remote_path" hcl:"remote_path"` @@ -63,6 +64,7 @@ func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec { "scripts": &hcldec.AttrSpec{Name: "scripts", Type: cty.List(cty.String), Required: false}, "valid_exit_codes": &hcldec.AttrSpec{Name: "valid_exit_codes", Type: cty.List(cty.Number), Required: false}, "environment_vars": &hcldec.AttrSpec{Name: "environment_vars", Type: cty.List(cty.String), Required: false}, + "env": &hcldec.AttrSpec{Name: "env", Type: cty.Map(cty.String), Required: false}, "env_var_format": &hcldec.AttrSpec{Name: "env_var_format", Type: cty.String, Required: false}, "binary": &hcldec.AttrSpec{Name: "binary", Type: cty.Bool, Required: false}, "remote_path": &hcldec.AttrSpec{Name: "remote_path", Type: cty.String, Required: false}, diff --git a/provisioner/shell/provisioner.hcl2spec.go b/provisioner/shell/provisioner.hcl2spec.go index d287215b44c..4ea77be55fa 100644 --- a/provisioner/shell/provisioner.hcl2spec.go +++ b/provisioner/shell/provisioner.hcl2spec.go @@ -23,6 +23,7 @@ type FlatConfig struct { Scripts []string `cty:"scripts" hcl:"scripts"` ValidExitCodes []int `mapstructure:"valid_exit_codes" cty:"valid_exit_codes" hcl:"valid_exit_codes"` Vars []string `mapstructure:"environment_vars" cty:"environment_vars" hcl:"environment_vars"` + Env map[string]string `mapstructure:"env" cty:"env" hcl:"env"` EnvVarFormat *string `mapstructure:"env_var_format" cty:"env_var_format" hcl:"env_var_format"` Binary *bool `cty:"binary" hcl:"binary"` RemotePath *string `mapstructure:"remote_path" cty:"remote_path" hcl:"remote_path"` @@ -62,6 +63,7 @@ func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec { "scripts": &hcldec.AttrSpec{Name: "scripts", Type: cty.List(cty.String), Required: false}, "valid_exit_codes": &hcldec.AttrSpec{Name: "valid_exit_codes", Type: cty.List(cty.Number), Required: false}, "environment_vars": &hcldec.AttrSpec{Name: "environment_vars", Type: cty.List(cty.String), Required: false}, + "env": &hcldec.AttrSpec{Name: "env", Type: cty.Map(cty.String), Required: false}, "env_var_format": &hcldec.AttrSpec{Name: "env_var_format", Type: cty.String, Required: false}, "binary": &hcldec.AttrSpec{Name: "binary", Type: cty.Bool, Required: false}, "remote_path": &hcldec.AttrSpec{Name: "remote_path", Type: cty.String, Required: false}, diff --git a/provisioner/windows-shell/provisioner.hcl2spec.go b/provisioner/windows-shell/provisioner.hcl2spec.go index abcbcee217f..34e7e1921b5 100644 --- a/provisioner/windows-shell/provisioner.hcl2spec.go +++ b/provisioner/windows-shell/provisioner.hcl2spec.go @@ -23,6 +23,7 @@ type FlatConfig struct { Scripts []string `cty:"scripts" hcl:"scripts"` ValidExitCodes []int `mapstructure:"valid_exit_codes" cty:"valid_exit_codes" hcl:"valid_exit_codes"` Vars []string `mapstructure:"environment_vars" cty:"environment_vars" hcl:"environment_vars"` + Env map[string]string `mapstructure:"env" cty:"env" hcl:"env"` EnvVarFormat *string `mapstructure:"env_var_format" cty:"env_var_format" hcl:"env_var_format"` Binary *bool `cty:"binary" hcl:"binary"` RemotePath *string `mapstructure:"remote_path" cty:"remote_path" hcl:"remote_path"` @@ -55,6 +56,7 @@ func (*FlatConfig) HCL2Spec() map[string]hcldec.Spec { "scripts": &hcldec.AttrSpec{Name: "scripts", Type: cty.List(cty.String), Required: false}, "valid_exit_codes": &hcldec.AttrSpec{Name: "valid_exit_codes", Type: cty.List(cty.Number), Required: false}, "environment_vars": &hcldec.AttrSpec{Name: "environment_vars", Type: cty.List(cty.String), Required: false}, + "env": &hcldec.AttrSpec{Name: "env", Type: cty.Map(cty.String), Required: false}, "env_var_format": &hcldec.AttrSpec{Name: "env_var_format", Type: cty.String, Required: false}, "binary": &hcldec.AttrSpec{Name: "binary", Type: cty.Bool, Required: false}, "remote_path": &hcldec.AttrSpec{Name: "remote_path", Type: cty.String, Required: false}, From e32c34a8ba7573098e71fdd90523ba2587e46a98 Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 13:37:02 +0100 Subject: [PATCH 03/13] update docs --- website/content/docs/provisioners/shell.mdx | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/website/content/docs/provisioners/shell.mdx b/website/content/docs/provisioners/shell.mdx index c94eda2cad7..d00081f0057 100644 --- a/website/content/docs/provisioners/shell.mdx +++ b/website/content/docs/provisioners/shell.mdx @@ -52,6 +52,11 @@ provisioner "shell" { @include 'provisioners/shell-config.mdx' +- `env` (map of strings) - A map of key/value pairs to inject prior to the + execute_command. Packer injects some environmental variables by default into + the environment, as well, which are covered in the section below. Duplciate + `env` settings override `environment_vars` settings. + - `environment_vars` (array of strings) - An array of key/value pairs to inject prior to the execute_command. The format should be `key=value`. Packer injects some environmental variables by default into the From aa4b6592d5304530a46fbe1a1c239d094eb4f6cd Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 13:37:55 +0100 Subject: [PATCH 04/13] test using unknown datasource as a value in shell-local.env --- .../hcl/data-source-validation.pkr.hcl | 25 +++++++++++++++++++ command/test_utils.go | 2 ++ command/validate_test.go | 3 +++ 3 files changed, 30 insertions(+) create mode 100644 command/test-fixtures/hcl/data-source-validation.pkr.hcl diff --git a/command/test-fixtures/hcl/data-source-validation.pkr.hcl b/command/test-fixtures/hcl/data-source-validation.pkr.hcl new file mode 100644 index 00000000000..a47f970fd7b --- /dev/null +++ b/command/test-fixtures/hcl/data-source-validation.pkr.hcl @@ -0,0 +1,25 @@ + +data "null" "secret" { + input = "s3cr3t" +} + +locals { + secret = data.null.secret.output +} + +source "file" "foo" { + content = "foo" + target = "foo.txt" +} + +build { + sources = ["file.foo"] + provisioner "shell-local" { + # original bug in : + # environment_vars = ["MY_SECRET=${local.secret}"] + env = { + "MY_SECRET":"${local.secret}", + } + inline = ["echo yo, my secret is $MY_SECRET"] + } +} diff --git a/command/test_utils.go b/command/test_utils.go index 1ad3cc8f34d..ab901bef971 100644 --- a/command/test_utils.go +++ b/command/test_utils.go @@ -9,6 +9,7 @@ import ( "github.com/hashicorp/packer/builder/null" hcppackerimagedatasource "github.com/hashicorp/packer/datasource/hcp-packer-image" hcppackeriterationdatasource "github.com/hashicorp/packer/datasource/hcp-packer-iteration" + nulldatasource "github.com/hashicorp/packer/datasource/null" "github.com/hashicorp/packer/packer" "github.com/hashicorp/packer/post-processor/manifest" shell_local_pp "github.com/hashicorp/packer/post-processor/shell-local" @@ -51,6 +52,7 @@ func testCoreConfigBuilder(t *testing.T) *packer.CoreConfig { }, DataSources: packer.MapOfDatasource{ "mock": func() (packersdk.Datasource, error) { return &packersdk.MockDatasource{}, nil }, + "null": func() (packersdk.Datasource, error) { return &nulldatasource.Datasource{}, nil }, "hcp-packer-image": func() (packersdk.Datasource, error) { return &hcppackerimagedatasource.Datasource{}, nil }, "hcp-packer-iteration": func() (packersdk.Datasource, error) { return &hcppackeriterationdatasource.Datasource{}, nil }, }, diff --git a/command/validate_test.go b/command/validate_test.go index 52e4ef5ea93..051b9c3eecb 100644 --- a/command/validate_test.go +++ b/command/validate_test.go @@ -36,6 +36,9 @@ func TestValidateCommand(t *testing.T) { // Should return multiple errors, {path: filepath.Join(testFixture("validate", "circular_error.pkr.hcl")), exitCode: 1}, + + // datasource could be unknown at that moment + {path: filepath.Join(testFixture("hcl", "data-source-validation.pkr.hcl")), exitCode: 0}, } for _, tc := range tt { From afd740bc694cd64bcfdef5d52d88d8d142ecb960 Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 13:48:13 +0100 Subject: [PATCH 05/13] add a build test --- command/build_test.go | 14 ++++++++++++++ .../hcl/data-source-validation.pkr.hcl | 5 ++++- 2 files changed, 18 insertions(+), 1 deletion(-) diff --git a/command/build_test.go b/command/build_test.go index ef751003085..954003733e6 100644 --- a/command/build_test.go +++ b/command/build_test.go @@ -465,6 +465,20 @@ func TestBuild(t *testing.T) { }, }, }, + { + name: "hcl - unknown ", + args: []string{ + testFixture("hcl", "data-source-validation.pkr.hcl"), + }, + fileCheck: fileCheck{ + expectedContent: map[string]string{ + "foo.txt": "foo", + }, + expected: []string{ + "s3cr3t.txt", + }, + }, + }, } for _, tt := range tc { diff --git a/command/test-fixtures/hcl/data-source-validation.pkr.hcl b/command/test-fixtures/hcl/data-source-validation.pkr.hcl index a47f970fd7b..1edf5cdb9f6 100644 --- a/command/test-fixtures/hcl/data-source-validation.pkr.hcl +++ b/command/test-fixtures/hcl/data-source-validation.pkr.hcl @@ -20,6 +20,9 @@ build { env = { "MY_SECRET":"${local.secret}", } - inline = ["echo yo, my secret is $MY_SECRET"] + inline = [ + "echo yo, my secret is $MY_SECRET", + "echo '' > $MY_SECRET.txt", + ] } } From 227b25bf6055c4e74202644acab8416cf548fe32 Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 13:57:25 +0100 Subject: [PATCH 06/13] Update powershell.mdx --- website/content/docs/provisioners/powershell.mdx | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/website/content/docs/provisioners/powershell.mdx b/website/content/docs/provisioners/powershell.mdx index df2423ce8a6..d86708d0ce9 100644 --- a/website/content/docs/provisioners/powershell.mdx +++ b/website/content/docs/provisioners/powershell.mdx @@ -75,6 +75,12 @@ provisioner "powershell" { - `Vars`: The location of a temp file containing the list of `environment_vars`, if configured. +- `env` (map of strings) - A map of key/value pairs to inject prior to the + execute_command. Packer injects some environmental variables by default into + the environment, as well, which are covered in the section below. Duplciate + `env` settings override `environment_vars` settings. This is not a JSON + template engine enabled function. HCL interpolation works as usual. + - `environment_vars` (array of strings) - An array of key/value pairs to inject prior to the execute_command. The format should be `key=value`. Packer injects some environmental variables by default into the From a8ca39712235ea45c47c395b6814e29522d47a34 Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 13:57:43 +0100 Subject: [PATCH 07/13] Update windows-shell.mdx --- website/content/docs/provisioners/windows-shell.mdx | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/website/content/docs/provisioners/windows-shell.mdx b/website/content/docs/provisioners/windows-shell.mdx index e38c47e3428..f2b5d3adb3a 100644 --- a/website/content/docs/provisioners/windows-shell.mdx +++ b/website/content/docs/provisioners/windows-shell.mdx @@ -46,6 +46,11 @@ provisioner "windows-shell" { @include 'provisioners/shell-config.mdx' +- `env` (map of strings) - A map of key/value pairs to inject prior to the + execute_command. Packer injects some environmental variables by default into + the environment, as well, which are covered in the section below. Duplciate + `env` settings override `environment_vars` settings. + - `environment_vars` (array of strings) - An array of key/value pairs to inject prior to the execute_command. The format should be `key=value`. Packer injects some environmental variables by default into the From f7f4ad1d17cf4884f1d73e1823b046449a0a620b Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 13:58:26 +0100 Subject: [PATCH 08/13] Update shell-local.mdx --- website/content/docs/provisioners/shell-local.mdx | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/website/content/docs/provisioners/shell-local.mdx b/website/content/docs/provisioners/shell-local.mdx index 088351e5244..7aa172de311 100644 --- a/website/content/docs/provisioners/shell-local.mdx +++ b/website/content/docs/provisioners/shell-local.mdx @@ -103,6 +103,11 @@ Exactly _one_ of the following is required: Optional parameters: +- `env` (map of strings) - A map of key/value pairs to inject prior to the + execute_command. Packer injects some environmental variables by default into + the environment, as well, which are covered in the section below. Duplciate + `env` settings override `environment_vars` settings. + - `environment_vars` (array of strings) - An array of key/value pairs to inject prior to the `execute_command`. The format should be `key=value`. Packer injects some environmental variables by default into the From 62e4adef5940eca6e4e167ce5816025e5bc2501b Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 14:03:05 +0100 Subject: [PATCH 09/13] Update shell-local.mdx --- website/content/docs/post-processors/shell-local.mdx | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/website/content/docs/post-processors/shell-local.mdx b/website/content/docs/post-processors/shell-local.mdx index f2fe6fbb78f..0d4d77d31b2 100644 --- a/website/content/docs/post-processors/shell-local.mdx +++ b/website/content/docs/post-processors/shell-local.mdx @@ -94,6 +94,11 @@ Exactly _one_ of the following is required: Optional parameters: +- `env` (map of strings) - A map of key/value pairs to inject prior to the + execute_command. Packer injects some environmental variables by default into + the environment, as well, which are covered in the section below. Duplciate + `env` settings override `environment_vars` settings. + - `environment_vars` (array of strings) - An array of key/value pairs to inject prior to the `execute_command`. The format should be `key=value`. Packer injects some environmental variables by default into the From 61e55f1836fe59ecde5a442a5c5ef724e6cf9d5f Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 14:10:22 +0100 Subject: [PATCH 10/13] try to use only_on for windows --- .../test-fixtures/hcl/data-source-validation.pkr.hcl | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/command/test-fixtures/hcl/data-source-validation.pkr.hcl b/command/test-fixtures/hcl/data-source-validation.pkr.hcl index 1edf5cdb9f6..facfc18f30c 100644 --- a/command/test-fixtures/hcl/data-source-validation.pkr.hcl +++ b/command/test-fixtures/hcl/data-source-validation.pkr.hcl @@ -15,6 +15,7 @@ source "file" "foo" { build { sources = ["file.foo"] provisioner "shell-local" { + only_on = ["darwin", "freebsd", "linux", "openbsd", "solaris"] # original bug in : # environment_vars = ["MY_SECRET=${local.secret}"] env = { @@ -25,4 +26,14 @@ build { "echo '' > $MY_SECRET.txt", ] } + provisioner "shell-local" { + only_on = ["windows"] + env = { + "MY_SECRET":"${local.secret}", + } + inline = [ + "echo yo, my secret is %MY_SECRET%", + "echo '' > %MY_SECRET%.txt", + ] + } } From 74a1d3b382074025747a27fea3194f98ea1241e5 Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 14:26:11 +0100 Subject: [PATCH 11/13] up test ? --- command/build_test.go | 2 +- command/test-fixtures/hcl/data-source-validation.pkr.hcl | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/command/build_test.go b/command/build_test.go index 954003733e6..25683868b8c 100644 --- a/command/build_test.go +++ b/command/build_test.go @@ -475,7 +475,7 @@ func TestBuild(t *testing.T) { "foo.txt": "foo", }, expected: []string{ - "s3cr3t.txt", + "s3cr3t", }, }, }, diff --git a/command/test-fixtures/hcl/data-source-validation.pkr.hcl b/command/test-fixtures/hcl/data-source-validation.pkr.hcl index facfc18f30c..3a0d5a7a1f1 100644 --- a/command/test-fixtures/hcl/data-source-validation.pkr.hcl +++ b/command/test-fixtures/hcl/data-source-validation.pkr.hcl @@ -23,7 +23,7 @@ build { } inline = [ "echo yo, my secret is $MY_SECRET", - "echo '' > $MY_SECRET.txt", + "echo '' > $MY_SECRET", ] } provisioner "shell-local" { @@ -33,7 +33,7 @@ build { } inline = [ "echo yo, my secret is %MY_SECRET%", - "echo '' > %MY_SECRET%.txt", + "echo '' > %MY_SECRET%", ] } } From 95716cbd11e886651a5d018a47e3a46be7e15785 Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Tue, 15 Feb 2022 14:43:15 +0100 Subject: [PATCH 12/13] fix broken docs link ? --- website/content/docs/provisioners/powershell.mdx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/website/content/docs/provisioners/powershell.mdx b/website/content/docs/provisioners/powershell.mdx index d86708d0ce9..f0402121b9b 100644 --- a/website/content/docs/provisioners/powershell.mdx +++ b/website/content/docs/provisioners/powershell.mdx @@ -17,8 +17,8 @@ The PowerShell Packer provisioner runs PowerShell scripts on Windows machines. It assumes that the communicator in use is WinRM. However, the provisioner can work equally well (with a few caveats) when combined with the SSH communicator. See the [section -below](/docs/provisioners/powershell#combining-the-powershell-provisioner-with-the-ssh-communicator) -for details. +below](#combining-the-powershell-provisioner-with-the-ssh-communicator) for +details. `@include 'path/separator-note.mdx'` From 1f4af4b77916f41257b0e8203ef0851f0abb5d0d Mon Sep 17 00:00:00 2001 From: Adrien Delorme Date: Wed, 16 Feb 2022 11:44:12 +0100 Subject: [PATCH 13/13] go get github.com/hashicorp/packer-plugin-sdk@f7d4bf877a45a9d253c548e902d6d1bd7d907d2 + tidy --- go.mod | 2 +- go.sum | 5 ++--- 2 files changed, 3 insertions(+), 4 deletions(-) diff --git a/go.mod b/go.mod index ac9a8c4aea7..26cb44a6ef6 100644 --- a/go.mod +++ b/go.mod @@ -24,7 +24,7 @@ require ( github.com/hashicorp/hcl/v2 v2.11.1 github.com/hashicorp/hcp-sdk-go v0.15.1-0.20220112153249-f565607d7cc4 github.com/hashicorp/packer-plugin-amazon v1.0.6 - github.com/hashicorp/packer-plugin-sdk v0.2.12-0.20220215104433-24404dc7a52e + github.com/hashicorp/packer-plugin-sdk v0.2.12-0.20220216103740-f7d4bf877a45 github.com/jehiah/go-strftime v0.0.0-20171201141054-1d33003b3869 github.com/klauspost/compress v1.13.5 // indirect github.com/klauspost/pgzip v1.2.5 diff --git a/go.sum b/go.sum index e6cf06c5f5c..f2fd2dabff5 100644 --- a/go.sum +++ b/go.sum @@ -766,10 +766,9 @@ github.com/hashicorp/packer-plugin-sdk v0.2.3/go.mod h1:MAOhxLneNh27t6N6SMyRcIR5 github.com/hashicorp/packer-plugin-sdk v0.2.5/go.mod h1:ii9ub5UNAp30RGod3i3W8qj7wA+H7kpURnD+Jt7oDkQ= github.com/hashicorp/packer-plugin-sdk v0.2.7/go.mod h1:ii9ub5UNAp30RGod3i3W8qj7wA+H7kpURnD+Jt7oDkQ= github.com/hashicorp/packer-plugin-sdk v0.2.9/go.mod h1:ii9ub5UNAp30RGod3i3W8qj7wA+H7kpURnD+Jt7oDkQ= -github.com/hashicorp/packer-plugin-sdk v0.2.11 h1:FsL2oOfLJmXC9F6W9eMFe0eUi3+ggFuqkLGX41fyPE0= github.com/hashicorp/packer-plugin-sdk v0.2.11/go.mod h1:DI8REf9TEIcVkYPErI/nedo6zS2h81ze7sKuc/mIlTE= -github.com/hashicorp/packer-plugin-sdk v0.2.12-0.20220215104433-24404dc7a52e h1:bWsX98L1C0rFA1q3YVYNqUltygRxy7y7QKZ6upg2bO4= -github.com/hashicorp/packer-plugin-sdk v0.2.12-0.20220215104433-24404dc7a52e/go.mod h1:DI8REf9TEIcVkYPErI/nedo6zS2h81ze7sKuc/mIlTE= +github.com/hashicorp/packer-plugin-sdk v0.2.12-0.20220216103740-f7d4bf877a45 h1:NOEkBi0iohcGGVFjM8QBlZS69AbrXCuv5Vx+41CG34A= +github.com/hashicorp/packer-plugin-sdk v0.2.12-0.20220216103740-f7d4bf877a45/go.mod h1:DI8REf9TEIcVkYPErI/nedo6zS2h81ze7sKuc/mIlTE= github.com/hashicorp/packer-plugin-tencentcloud v1.0.3 h1:8U2vMFyIE+pizoMDsSLyMBsbNdB1HzRAIaTJNIELyi4= github.com/hashicorp/packer-plugin-tencentcloud v1.0.3/go.mod h1:TCSlq9lCFU8H8eMMWNtwdnCeyHmaQ1A13PR11EJoJh0= github.com/hashicorp/packer-plugin-triton v1.0.0 h1:Uvh8fjEKqlii61BzIt1VEgSyJXL+UYfuMHCj44aVpU8=