Author Bundles

Use the porter create command to scaffold a new bundle in the current directory. The bundle is defined by its manifest, a porter.yaml file. The manifest supports variable substitution through templates. You can customize the Dockerfile used to build the bundle installer.

The manifest is made up of multiple components:

We have full examples of Porter manifests in the Porter repository.

Bundle Metadata

A lot of the metadata is defined by the CNAB Spec although Porter does have extra fields that are specific to making Porter bundles.

name: azure-wordpress
description: Install Wordpress on Azure
version: 0.1.0
registry: getporter
reference: getporter/azure-wordpress
dockerfile: dockerfile.tmpl
maintainers:
- name: "John Doe"
  email: "john.doe@example.com"
  url: "https://example.com"
  • name: The name of the bundle

  • description: A description of the bundle

  • version: The version of the bundle, uses semver. A leading v prefix may optionally be used.

  • registry: The registry to use for publishing the bundle. The format is REGISTRY_HOST/ORG. Both the final bundle reference and invocation image name will be based on this value. For example, if the bundle name is porter-hello, registry is getporter and the version is 0.1.0, the bundle reference will be getporter/porter-hello:v0.1.0 and the invocation image name will be getporter/porter-hello-installer:v0.1.0

  • reference: OPTIONAL. The bundle reference, taking precedence over any values set for the registry, name fields. The format is REGISTRY_HOST/ORG/NAME. The recommended pattern is to let the Docker tag be auto-derived from the version field. However, a full reference with a Docker tag included may also be specified. The invocation image name will also be based on this value when set. For example, if the reference is getporter/porter-hello, then the final invocation image name will be getporter/porter-hello-installer:v0.1.0.

    When the version is used to default the tag, and it contains a plus sign (+), the plus sign is replaced with an underscore because while + is a valid semver delimiter for the build metadata, it is not an allowed character in a tag.

  • dockerfile: OPTIONAL. The relative path to a Dockerfile to use as a template during porter build. See Custom Dockerfile for details on how to use a custom Dockerfile.

  • custom: OPTIONAL. A map of custom bundle metadata.

  • maintainers: OPTIONAL. A map of bundle maintainers. Per maintainer, name, email, and url can be specified. Every field is optional.

Mixins

Mixins are adapters between the Porter and an existing tool or system. They know how to talk to Porter to include everything they need to run, such as a CLI or config files, and how to execute their steps in the Porter manifest.

There are many mixins created by the Porter community. Only the exec mixin is installed by default.

Declare the mixins that your bundle uses with the mixins section of the manifest:

mixins:
- exec

Some mixins allow you to specify configuration data that is provided to the mixin during porter build. Each mixin has its own format for the configuration. For example, the az mixin allows you to specify extensions to install and the helm mixin takes repositories to configure:

mixins:
- az:
    extensions:
    - azure-cli-iot-ext
- helm3:
    repositories:
      bitnami:
        url: "https://charts.bitnami.com/bitnami"

See Using Mixins to learn more about how mixins work.

Parameters

Parameters are part of the CNAB Spec and allow you to pass in configuration values when you execute the bundle.

Parameter Types

  • string
  • integer
  • number
  • boolean
  • file

Learn more about how parameters work in Porter.

parameters:
- name: mysql_user
  default: azureuser
- name: mysql_password
  type: string
  sensitive: true
  applyTo:
    - install
    - upgrade
- name: database_name
  type: string
  default: "wordpress"
  env: MYSQL_DATABASE
- name: tfstate
  type: file
  path: /cnab/app/tfstate
  source:
    output: tfstate
- name: connection-string
  type: string
  source:
    dependency: mysql
    output: connstr
  • name: The name of the parameter.
  • type: The data type of the parameter: string, integer, number, boolean, array, object, or file. When omitted, Porter will attempt to detect the type and default it to either file or string.
  • default: (Optional) The default value for the parameter, which will be used if not supplied elsewhere.
  • env: (Optional) The name for the destination environment variable in the bundle. Defaults to the name of the parameter in upper case, if path is not specified.
  • path: (Optional) The destination file path in the bundle.
  • sensitive: (Optional) Designate this parameter’s value as sensitive, for masking in console output.
  • applyTo: (Optional) Designate to which actions this parameter applies. When not supplied, it is assumed the parameter applies to all actions.
  • source: (Optional) Define from where the parameter’s value should be resolved. See parameter sources for an example.
    • dependency: (Optional) The name of the dependency that generated the output. If not set, the output must be generated by the current bundle.
    • output: An output name. The parameter’s value is set to output’s last value. If the output doesn’t exist, then the parameter’s default value is used when defined, otherwise the user is required to provide a value.

Object Parameters

Parameters can be JSON objects and validated using JSON Schema

In the example below, the config parameter is defined as an object, with a default value. At runtime, the value of the parameter is saved to a file located at /cnab/app/config.json.

parameters:
  - name: config
    type: object
    path: /cnab/app/config.json
    default:
      logLevel: 11
      debug: true

A user can pass a different value to the bundle using the –param flag which accepts either a file path or a string value:

porter install --param '{"logLevel":2}'
porter install --param ./config.json

File Parameters

Porter supports passing a file as a parameter to a bundle.

For instance, a bundle might declare a parameter mytar of type file, located at /root/mytar when the bundle is run:

- name: mytar
  type: file
  path: /root/mytar

install:
  - exec:
      description: "Install"
      command: bash
      flags:
        c: tar zxvf /root/mytar

The syntax to pass a parameter to porter is the same for both regular and file parameters:

$ porter install --param mytar=./my.tar.gz

Parameter Sources

Parameters can also use the value from an output from the current bundle or one of its dependencies as its default value using the source field when defining the parameter.

Source an output from the current bundle

parameters:
- name: tfstate
  type: file
  path: /cnab/app/tfstate
  source:
    output: tfstate

Source an output from a dependency

parameters:
- name: connection-string
  type: string
  source:
    dependency: mysql
    source: connstr

Outputs

Outputs are part of the CNAB Spec to allow access to outputs generated during the course of executing a bundle. These are global/bundle-wide outputs, as opposed to step outputs described in Parameters, Credentials and Outputs.

outputs:
- name: mysql_user
  description: "MySQL user name"
- name: mysql_password
  type: string
  applyTo:
    - install
    - upgrade
- name: kubeconfig
  type: file
  path: /root/.kube/config
  • name: The name of the output.
  • type: The data type of the output: string, integer, number, boolean. When omitted, Porter will attempt to detect the type and default it to either file or string.
  • applyTo: (Optional) Restrict this output to a given list of actions. If empty or missing, applies to all actions.
  • description: (Optional) A brief description of the given output.
  • sensitive: (Optional) Designate an output as sensitive. Defaults to false.
  • path: (Optional) Path where the output file should be retrieved.

Outputs must either have the same name as an output from a step, meaning that the output is generated by a step, or it must define a path where the output file can be located on the filesystem.

Parameter and Output Schema

The CNAB Spec for definitions applies to both parameters and outputs. Parameters and outputs can use json schema 7 properties to describe acceptable values. Porter uses a slightly modified schema because CNAB disallows non-integer values.

Below are a few examples of common json schema properties and how they are used by Porter:

  • default: The default value for the parameter. When a default is not provided, the parameter is required.
  • enum: A list of allowed values.
  • Numeric Range using minimum, maximum, exclusiveMinimum and exclusiveMaximum.
  • String length using minLength and maxLength.
parameters:
- name: color
  type: string
  default: blue
  enum:
  - red
  - green
  - blue
- name: size
  type: integer
  minimum: 1
  maximum: 11
- name: label
  type: string
  minLength: 3

Credentials

Credentials are part of the CNAB Spec and allow you to pass in sensitive data when you execute the bundle, such as passwords or configuration files.

Learn more about how credentials work in Porter.

By default, all credential values are considered sensitive and will be masked in console output.

credentials:
- name: password
  env: ROOT_PASSWORD
- name: username
  description: User to create on the cluster, defaults to root
  env: USERNAME
  required: false
- name: kubeconfig
  path: /root/.kube/config
  applyTo:
    - upgrade
    - uninstall
  • name: The name of the credential on the local system.
  • description: (OPTIONAL) A description of what the credential is and how it is used.
  • env: The name of the environment variable to create with the value from the credential.
  • path: The file path to create with the file from the credential.
  • required: (OPTIONAL) Specifies if the credential must be provided for applicable actions. Defaults to true.
  • applyTo: (Optional) Designate to which actions this credential applies. When not supplied, it is assumed the credential applies to all actions.

See Also

State

Porter provides a state bag that allows you to persist state associated with the bundle. If the specified file is present when the bundle completes, Porter saves the file and then injects that file back into the bundle when it is run again.

For example, when the terraform mixin is run by default it saves its state to two files: terraform/terraform.tfstate and terraform/terraform.tfvars.json. While you may configure a remote Terraform backend, you can also take advantage of Porter’s state bag to persist these files. This simplifies the setup and infrastructure required of the end-user when they run your bundle.

state:
  - name: tfstate
    path: terraform/terraform.tfstate
  - name: tfvars
    path: terraform/terraform.tfvars.json
Field Usage Description
name Required The name of the state variable.
path Required The path of the file containing the state value. Relative paths are assumed to be relative to the bundle directory (/cnab/app).
description Optional A description of the variable and how it is used in the bundle.
mixin Optional
Reserved for future use
The name of the mixin that manages this state variable.

Bundle Actions

Porter and its mixins supports the three CNAB actions: install, upgrade, and uninstall. Within each action, you define an ordered list of steps to execute. Each step has a mixin, a description, and optionally outputs.

install:
- helm3:
    description: "Install MySQL"
    name: mydb
    chart: bitnami/mysql
    version: 6.14.2
    set:
      db.name: "{{ bundle.parameters.database-name }}"
      db.user: "{{ bundle.parameters.mysql-user }}"
  outputs:
  - name: mysql-root-password
    secret: mydb-creds
    key: mysql-root-password
  - name: mysql-password
    secret: mydb-creds
    key: mysql-password
  • MIXIN: The name of the mixin that will handle this step. In the example above, helm is the mixin.
  • description: A description of the step, used for logging.
  • outputs: Any outputs provided by the steps. The name is required but the rest of the the schema for the output is specific to the mixin. In the example above, the mixin will make the Kubernetes secret data available as outputs. By default, all output values are considered sensitive and will be masked in console output.

Custom Actions

You can also define custom actions, such as status or dry-run, and define steps for them just as you would for the main actions (install/upgrade/uninstall). Most of the mixins support custom actions but not all do.

You have the option of declaring your custom action, though it is not required. Custom actions are defaulted to stateless: false and modifies: true. Well-known actions defined in the CNAB specification are automatically defaulted, such as dry-run, help, log, and status. You do not need to declare custom actions unless you want to change the defaults.

You may want to declare your custom action when the action does not make any changes, and its execution should not be recorded (stateless: true and modifies: false). The help action is supported out-of-the-box by Porter and is automatically defaulted to this definition so you do not need to declare it. If you have an action that is similar to help, but has a different name, you should declare it in the customActions section.

customActions:
  myhelp:
    description: "Print a special help message"
    stateless: true
    modifies: false
  • description: Description of the action.
  • stateless: Indicates that the action is purely informational, that credentials are not required, and that Porter should not keep track of when this action was last executed.
  • modifies: Indicates whether this action modifies resources managed by the bundle.

Dependencies

Dependencies are an extension of the CNAB Spec. See dependencies for more details on how Porter handles dependencies.

dependencies:
  requires:
    - name: mysql
        reference: getporter/mysql:v0.1.0
        parameters:
        database_name: wordpress
        mysql_user: wordpress
  • name: A short name for the dependent bundle that is used to reference the dependent bundle elsewhere in the bundle.
  • reference: The reference where the bundle can be found in an OCI registry. The format should be REGISTRY/NAME:TAG where TAG is the semantic version of the bundle.
  • parameters: Optionally set default values for parameters in the bundle.

Images

The images section of the Porter manifest corresponds to the Image Map section of the CNAB Spec. These are images used in the bundle and declaring them enables Porter to manage the following for you:

Here is an example:

images:
  websvc:
      description: "A simple web service"
      imageType: "docker"
      repository: "jeremyrickard/devops-days-msp"
      digest: "sha256:85b1a9b4b60a4cf73a23517dad677e64edf467107fa7d58fce9c50e6a3e4c914"

This information is used to generate the corresponding section of the bundle.json and can be used in template expressions, much like parameters, credentials and outputs, allowing you to build image references using the repository and digest attributes. For example:

image: "{{bundle.images.websvc.repository}}@{{bundle.images.websvc.digest}}"

At runtime, these will be updated appropriately if a bundle has been copied. Note that while tag is available, you should prefer the use of digest.

Here is a breakdown of all the supported fields on an image in this section of the manifest:

  • description: A description of the image.
  • imageType: The type of image. Defaults to “docker”. Allowed values: “oci”, “docker”.
  • repository: The name of the image, of the form REGISTRY/ORG/IMAGE.
  • digest: The repository digest of the image (not to be confused with the image id).
  • size: The image size in bytes.
  • mediaType: The media type of the image.
  • labels: Key/value pairs used to specify identifying attributes of the image.
  • tag: The tag of the image (only recommended when/if digest isn’t known/available).

A last note on digest. Taking the example of the library nginx Docker image, we can get the repository digest like so:

 $ docker inspect nginx | jq -r '.[].RepoDigests'
[
  "nginx@sha256:a93c8a0b0974c967aebe868a186e5c205f4d3bcb5423a56559f2f9599074bbcd"
]

Custom

The Custom section of a Porter manifest is intended for bundle authors to capture custom data used by the bundle. It is a map of string keys to values of any structure. Porter passes all custom data through to the resulting bundle.json as-is, without attempting to parse or otherwise understand the data.

custom:
  some-custom-config:
    item: "value"
  more-custom-config:
    enabled: true
    succeed: "please!"

You can access custom data at runtime using the bundle.custom.KEY.SUBKEY templating. For example, {{ bundle.custom.more-custom-config.enabled}} allows you to access nested values from the custom section.

See the Custom Extensions section of the CNAB Specification for more details.

Required

The required section of a Porter manifest is intended for bundle authors to declare which Required Extensions known and supported by Porter are needed to run the bundle. Hence, all extension configuration data in this section is processed by Porter at runtime; if unsupported extension configuration exists, Porter will error out accordingly.

Currently, Porter supports the following required extensions and configuration:

Docker

Access to the host Docker daemon is necessary to run this bundle.

When the bundle is executed, this elevated privilege must be explicitly granted to the bundle using the Allow Docker Host Access configuration setting.

Name:

docker

Configuration:

  • privileged: BOOLEAN - OPTIONAL. Whether or not the --privileged flag should be set when the bundle’s invocation image runs. Defaults to false.

Example:

required:
  - docker:
      privileged: true

Generated Files

In addition to the porter manifest, Porter generates a few files for you to create a compliant CNAB Spec bundle.

  • .cnab/: This directory structure is created during porter init. You can add files to this directory and they will be copied into the final bundle so that you can access them at runtime. The path to this directory at runtime is /cnab.
  • .cnab/app/run: This file is created during porter init and should not be modified.
  • Dockerfile: This file is generated during porter build and cannot be modified.

See Also