This library adds the support for creating Docker machines hosted on the Hetzner Cloud.
You need to create a project-specific access token under Access
> API Tokens
in the project control panel
and pass that to docker-machine create
with the --hetzner-api-token
option.
You can find sources and pre-compiled binaries here.
# Download the binary (this example downloads the binary for linux amd64)
$ wget https://github.com/JonasProgrammer/docker-machine-driver-hetzner/releases/download/3.11.0/docker-machine-driver-hetzner_3.11.0_linux_amd64.tar.gz
$ tar -xvf docker-machine-driver-hetzner_3.11.0_linux_amd64.tar.gz
# Make it executable and copy the binary in a directory accessible with your $PATH
$ chmod +x docker-machine-driver-hetzner
$ cp docker-machine-driver-hetzner /usr/local/bin/
$ docker-machine create \
--driver hetzner \
--hetzner-api-token=QJhoRT38JfAUO037PWJ5Zt9iAABIxdxdh4gPqNkUGKIrUMd6I3cPIsfKozI513sy \
some-machine
$ HETZNER_API_TOKEN=QJhoRT38JfAUO037PWJ5Zt9iAABIxdxdh4gPqNkUGKIrUMd6I3cPIsfKozI513sy \
&& HETZNER_IMAGE=centos-7 \
&& docker-machine create \
--driver hetzner \
some-machine
If you use an image without aufs, like the one currently supplied with the debian-9 image, you can try specifying another storage driver, such as overlay2. Like so:
$ docker-machine create \
--engine-storage-driver overlay2 \
--driver hetzner \
--hetzner-image debian-9 \
--hetzner-api-token=QJhoRT38JfAUO037PWJ5Zt9iAABIxdxdh4gPqNkUGKIrUMd6I3cPIsfKozI513sy \
some-machine
$ CLOUD_INIT_USER_DATA=`cat <<EOF
#cloud-config
write_files:
- path: /test.txt
content: |
Here is a line.
Another line is here.
EOF
`
$ docker-machine create \
--driver hetzner \
--hetzner-api-token=QJhoRT38JfAUO037PWJ5Zt9iAABIxdxdh4gPqNkUGKIrUMd6I3cPIsfKozI513sy \
--hetzner-user-data="${CLOUD_INIT_USER_DATA}" \
some-machine
Assuming your snapshot ID is 424242
:
$ docker-machine create \
--driver hetzner \
--hetzner-api-token=QJhoRT38JfAUO037PWJ5Zt9iAABIxdxdh4gPqNkUGKIrUMd6I3cPIsfKozI513sy \
--hetzner-image-id=424242 \
some-machine
--hetzner-api-token
: required. Your project-specific access token for the Hetzner Cloud API.--hetzner-image
: The name of the Hetzner Cloud image to use, see Images API for how to get a list (defaults toubuntu-18.04
).--hetzner-image-id
: The id of the Hetzner cloud image (or snapshot) to use, see Images API for how to get a list (mutually excludes--hetzner-image
).--hetzner-server-type
: The type of the Hetzner Cloud server, see Server Types API for how to get a list (defaults tocx11
).--hetzner-server-location
: The location to create the server in, see Locations API for how to get a list.--hetzner-existing-key-path
: Use an existing (local) SSH key instead of generating a new keypair. If a remote key with a matching fingerprint exists, it will be used as if specified using--hetzner-existing-key-id
, rather than uploading a new key.--hetzner-existing-key-id
: requires--hetzner-existing-key-path
. Use an existing (remote) SSH key instead of uploading the imported key pair, see SSH Keys API for how to get a list--hetzner-additional-key
: Upload an additional public key associated with the server, or associate an existing one with the same fingerprint. Can be specified multiple times.--hetzner-user-data
: Cloud-init based User data--hetzner-user-data-from-file
: Use Cloud-init based User data as file,--hetzner-user-data
as file name--hetzner-volumes
: Volume IDs or names which should be attached to the server--hetzner-networks
: Network IDs or names which should be attached to the server private network interface--hetzner-use-private-network
: Use private network--hetzner-firewalls
: Firewall IDs or names which should be applied on the server--hetzner-server-label
:key=value
pairs of additional metadata to assign to the server.--hetzner-key-label
:key=value
pairs of additional metadata to assign to SSH key (only applies if newly creadted).--hetzner-placement-group
: Add to a placement group by name or ID; a spread-group will be created on demand if it does not exist--hetzner-auto-spread
: Add to adocker-machine
providedspread
group (mutually exclusive with--hetzner-placement-group
)--hetzner-ssh-user
: Change the default SSH-User--hetzner-ssh-port
: Change the default SSH-Port--hetzner-primary-ipv4/6
: Sets an existing primary IP (v4 or v6 respectively) for the server, as documented in Networking--wait-on-error
: Amount of seconds to wait on server creation failure (0/no wait by default)
When you specify the --hetzner-existing-key-path
option, the driver will attempt to copy (specified file name)
and (specified file name).pub
to the machine's store path. They public key file's permissions will be set according
to your current umask
and the private key file will have 600
permissions.
When you additionally specify the --hetzner-existing-key-id
option, the driver will not create an SSH key using the API
but rather try to use the existing public key corresponding to the given id. Please note that during machine creation,
the driver will attempt to get the key and compare it's
fingerprint to the local public key's fingerprtint. Keep in mind that the both the local and the remote key must be
accessible and have matching fingerprints, otherwise the machine will fail it's pre-creation checks.
Also note that the driver will attempt to delete the linked key during machine removal, unless --hetzner-existing-key-id
was used during creation.
CLI option | Environment variable | Default |
---|---|---|
--hetzner-api-token |
HETZNER_API_TOKEN |
|
--hetzner-image |
HETZNER_IMAGE |
ubuntu-18.04 |
--hetzner-image-id |
HETZNER_IMAGE_ID |
|
--hetzner-server-type |
HETZNER_TYPE |
cx11 |
--hetzner-server-location |
HETZNER_LOCATION |
(let Hetzner choose) |
--hetzner-existing-key-path |
HETZNER_EXISTING_KEY_PATH |
(generate new keypair) |
--hetzner-existing-key-id |
HETZNER_EXISTING_KEY_ID |
0 (upload new key) |
--hetzner-additional-key |
HETZNER_ADDITIONAL_KEYS |
|
--hetzner-user-data |
HETZNER_USER_DATA |
|
--hetzner-networks |
HETZNER_NETWORKS |
|
--hetzner-firewalls |
HETZNER_FIREWALLS |
|
--hetzner-volumes |
HETZNER_VOLUMES |
|
--hetzner-use-private-network |
HETZNER_USE_PRIVATE_NETWORK |
false |
--hetzner-disable-public-4 |
HETZNER_DISABLE_PUBLIC_4 |
false |
--hetzner-disable-public-6 |
HETZNER_DISABLE_PUBLIC_6 |
false |
--hetzner-disable-public |
HETZNER_DISABLE_PUBLIC |
false |
--hetzner-server-label |
(inoperative) | [] |
--hetzner-key-label |
(inoperative) | [] |
--hetzner-placement-group |
HETZNER_PLACEMENT_GROUP |
|
--hetzner-auto-spread |
HETZNER_AUTO_SPREAD |
false |
--hetzner-ssh-user |
HETZNER_SSH_USER |
root |
--hetzner-ssh-port |
HETZNER_SSH_PORT |
22 |
--hetzner-primary-ipv4 |
HETZNER_PRIMARY_IPV4 |
|
--hetzner-primary-ipv6 |
HETZNER_PRIMARY_IPV6 |
|
--wait-on-error |
WAIT_ON_ERROR |
0 |
Given --hetzner-primary-ipv4
or --hetzner-primary-ipv6
, the driver
attempts to set up machine creation with an existing primary IP
as follows: If the passed argument parses to a valid IP address, the primary IP is resolved via address.
Otherwise, it is resolved in the default Hetzner Cloud API way (i.e. via ID and name as a fallback).
No address family validation is performed, so when specifying an IP address it is the user's responsibility to pass the appropriate type. This also applies to any given preconditions regarding the state of the address being attached.
If no existing primary IPs are specified and public address creation is not disabled for a given address family, a new primary IP will be auto-generated by default. Primary IPs created in that fashion will exhibit whatever default behavior Hetzner assigns them at the given time, so users should take care what retention flags etc. are being set.
When disabling all public IPs, --hetzner-use-private-network
must be given.
--hetzner-disable-public
will take care of that, and behaves as if
--hetzner-disable-public-4 --hetzner-disable-public-6 --hetzner-use-private-network
were given.
Using --hetzner-use-private-network
implicitly or explicitly requires at least one --hetzner-network
to be given.
Use an up-to-date version of Go to use Go Modules.
To use the driver, you can download the sources and build it locally:
# Enable Go Modules if you are not outside of your $GOPATH
$ export GO111MODULE=on
# Get sources and build the binary at ~/go/bin/docker-machine-driver-hetzner
$ go get github.com/jonasprogrammer/docker-machine-driver-hetzner
# Make the binary accessible to docker-machine
$ export GOPATH=$(go env GOPATH)
$ export GOBIN=$GOPATH/bin
$ export PATH="$PATH:$GOBIN"
$ cd $GOPATH/src/jonasprogrammer/docker-machine-driver-hetzner
$ go build -o docker-machine-driver-hetzner
$ cp docker-machine-driver-hetzner /usr/local/bin/docker-machine-driver-hetzner
Fork this repository, yielding github.com/<yourAccount>/docker-machine-driver-hetzner
.
# Get the sources of your fork and build it locally
$ go get github.com/<yourAccount>/docker-machine-driver-hetzner
# * This integrates your fork into the $GOPATH (typically pointing at ~/go)
# * Your sources are at $GOPATH/src/github.com/<yourAccount>/docker-machine-driver-hetzner
# * That folder is a local Git repository. You can pull, commit and push from there.
# * The binary will typically be at $GOPATH/bin/docker-machine-driver-hetzner
# * In the source directory $GOPATH/src/github.com/<yourAccount>/docker-machine-driver-hetzner
# you may use go get to re-build the binary.
# * Note: when you build the driver from different repositories, e.g. from your fork
# as well as github.com/jonasprogrammer/docker-machine-driver-hetzner,
# the binary files generated by these builds are all called the same
# and will hence override each other.
# Make the binary accessible to docker-machine
$ export GOPATH=$(go env GOPATH)
$ export GOBIN=$GOPATH/bin
$ export PATH="$PATH:$GOBIN"
# Make docker-machine output help including hetzner-specific options
$ docker-machine create --driver hetzner