From nobody Mon Mar 06 02:54:24 2023 X-Original-To: freebsd-cloud@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PVNTM2pKQz3wJ75 for ; Mon, 6 Mar 2023 02:54:31 +0000 (UTC) (envelope-from meta@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PVNTM2LX9z3G5Z; Mon, 6 Mar 2023 02:54:31 +0000 (UTC) (envelope-from meta@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1678071271; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=5aQ2bAfOugtNfqruYD551/BVB2mpqw/NhOC4KMwKpLY=; b=ME7pEY3Xz6cUpo5RzKptrrtR6k1HxkSK1r+cDpNfqSRmEwS4cQd2Xq9ulcfpni156nO4Ij 82UPoFC7C6ag1JZHo2x0JdAspIEqkhqnECaBDMPnRAkbZ+g6hgMryOeZl82PGTS09/jO+3 cejURPW8O44McrJ6bwyGKPAkDEL2ZK5Xf1+IB3U4d9cgutP+y6aVBz6QhdN4/5gYSYoWQT t0TK2OGdq2gBpAJ+vRLjE+tQORZ5cMryiAeaUXeTex0N16y+Sd7b3x0yC3dU0fM5M+CkQv ydh8AfygbVWbYdcQMgqIT/jN2kHOMJK8G22f6YLxQ7J6bIYf5YnnweF4/YxTDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1678071271; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=5aQ2bAfOugtNfqruYD551/BVB2mpqw/NhOC4KMwKpLY=; b=CQ/kXc7phn2uXssTxFlAT9eknJBna8ObPC9JaxCWVrkBS7izfiqbcA1Ns4WlAEZ5410Q28 iWWa22Xgsn2KP8kqp6cEDsUP5x/6aJ9O6NjB25/48Hm4pz+eCHqpKXUFChoEYg7kLvk6xN kusf9GV5a1V+PKdYk+hp8XYHTj1fgHD8zc8CwV8NtlCNXo7GMugcHLgXj6oidyVaqMtwko KbCIuYSoK0+xznHJqHKuEkZgnLttJdJojo8On6FNY4wEIFmXXwLt4C2cY6mQOaEQEjKeAO zVQcjpNAVZOxqJhpJ1xyeDFs+pz5IlFtXdzstjC74uvSC2EP/aLuWiTpiooM/Q== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1678071271; a=rsa-sha256; cv=none; b=haTnIIkLKSv986u4cRIPnpc3xdkelhnCjVTa3FDX/2gsw51KD0uoE5zohjXxCaAk/6EqXE v3ewGW+dFu5MNMv6D+TnwMu1VbtW+5tqE7S6hWt7vszJ4N4JDSPJyrfwBKxIOVh+9LV9UH rEzmJmkqYuXuXkcNl4WRJ7tlHPatOby37y4cxl19Uh9vzVk55ZX6HaPyFyWkv8XuW0z/Im plvSC1sbGoVFVt/yyLNNzUdcbWyZKkacWLUUGoeGecu4j1W5FsG7s2spGsJAUizNPgfou6 6C3mojaRei4V6nalBhvmL03dE4jdBClMvPq/OPwAY8bXWdFwmp1oA44d0H2qkQ== Received: from icepick.vmeta.jp (unknown [IPv6:2403:bd80:c100:411:911b:1dab:8985:dd4a]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: meta/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 4PVNTL1XxsztlB; Mon, 6 Mar 2023 02:54:30 +0000 (UTC) (envelope-from meta@FreeBSD.org) Date: Mon, 6 Mar 2023 11:54:24 +0900 From: Koichiro Iwao To: Pat Maddox Cc: freebsd-cloud@freebsd.org Subject: Re: How are official EC2 images built? Message-ID: <20230306025424.jx3rihykbswl4uk2@icepick.vmeta.jp> X-Operating-System: FreeBSD 13.2-STABLE amd64 References: <20230306021533.ght5ouvxg6zrihfr@icepick.vmeta.jp> List-Id: FreeBSD on cloud platforms (EC2, GCE, Azure, etc.) List-Archive: https://lists.freebsd.org/archives/freebsd-cloud List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-cloud@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-ThisMailContainsUnwantedMimeParts: N Thanks for the quick response! Both are definitely useful. On Sun, Mar 05, 2023 at 06:30:40PM -0800, Pat Maddox wrote: > https://cgit.freebsd.org/src/tree/release/Makefile.ec2 > > https://cgit.freebsd.org/src/tree/release/tools/ec2.conf > > I have opted to build images a bit differently, not using the stuff in src/release. I’ve done two approaches. > > The first is to attach a second disk to an EC2 instance, install FreeBSD onto it with customizations, and then image the disk (https://gist.github.com/patmaddox/9f20edcb50ff15fa9edd1d4e38d07e50). > > The way I’m doing it now is to use poudriere to make an img file, and then upload that image to S3, snapshot it (aws ec2 import-snapshot –disk-container Format=raw,Url=s3://mybucket/myimage.img) and finally make an AMI from that snapshot. > > The stuff in src/release is good for knowing what changes to make to config files, or packages to install. > > Pat > > On Sun, Mar 5, 2023, at 6:15 PM, Koichiro Iwao wrote: > > Hi, > > > > Does anyone how offical EC2 images [1] are built? > > I mean if the build script is public. I would like to create private > > custom images with some customization based on official image. > > > > [1] > > https://aws.amazon.com/marketplace/seller-profile?id=92bb514d-02bc-49fd-9727-c474863f63da&ref=dtl_prodview-ukzmy5dzc6nbq > > > > -- > > meta > -- meta