Merge "Make packer debug faster"
diff --git a/common/ubuntu_base.sh b/common/ubuntu_base.sh
index 10f1ee9..336662b 100644
--- a/common/ubuntu_base.sh
+++ b/common/ubuntu_base.sh
@@ -36,13 +36,16 @@
 apt-get update
 
 # Useful tools
-apt-get -y install byobu curl ethtool htop iputils-ping lsof strace tcpdump tmux traceroute tree vim-nox wget
-# Install common prerequisites
-apt-get -y install apt-transport-https libmnl0 python-apt python-m2crypto python-psutil acpid
+EXTRA_PKGS="byobu curl ethtool iputils-ping lsof strace tcpdump traceroute wget iptables"
+# Pretty tools
+EXTRA_PKGS="${EXTRA_PKGS} byobu htop tmux tree vim-nox mc"
+# Common prerequisites
+EXTRA_PKGS="${EXTRA_PKGS} apt-transport-https libmnl0 python-apt python-m2crypto python-psutil acpid"
+apt-get -y install ${EXTRA_PKGS}
 
 # Cleanup old kernels, ensure latest is installed via virtual package
 if [ ! -f /tmp/no_install_kernel ]; then
-    apt-get purge -y linux-image-* linux-headers-*
+    apt-get purge -y linux-image-* linux-headers-* | grep -v 'is not installed, so not removed'
     apt-get install -y linux-image-virtual-lts-xenial linux-image-extra-virtual-lts-xenial
 
     # Update grub cmdline
diff --git a/common/ubuntu_salt_bootstrap.sh b/common/ubuntu_salt_bootstrap.sh
index b691d4d..0b45762 100644
--- a/common/ubuntu_salt_bootstrap.sh
+++ b/common/ubuntu_salt_bootstrap.sh
@@ -48,6 +48,7 @@
 export EXTRA_FORMULAS=${EXTRA_FORMULAS:-"ntp aptly nginx iptables docker git maas jenkins"}
 export APT_REPOSITORY=" deb [arch=amd64] ${APT_MIRANTIS_SALT_REPO} "
 export APT_REPOSITORY_GPG=${APT_MIRANTIS_GPG}
+export SALT_STOPSTART_WAIT=${SALT_STOPSTART_WAIT:-10}
 if [[ ! -z "${PACKER_OFFLINE_BUILD}" ]];then
   echo "INFO: build in offline detected!"
   export BOOTSTRAP_SALTSTACK_COM="file:///tmp/bootstrap.saltstack.com.sh"
diff --git a/day01-image/files/root/interfaces b/day01-image/files/root/interfaces
index 5487659..97aaea3 100644
--- a/day01-image/files/root/interfaces
+++ b/day01-image/files/root/interfaces
@@ -13,6 +13,7 @@
   address $SALT_MASTER_DEPLOY_IP
   netmask $DEPLOY_NETWORK_NETMASK
   gateway $DEPLOY_NETWORK_GW
+  mtu $DEPLOY_NETWORK_MTU
   dns-nameservers $DNS_SERVERS
 #auto ens4
 #iface ens4 inet static
diff --git a/day01-image/run.example.sh b/day01-image/run.example.sh
index aeee71e..25efd13 100755
--- a/day01-image/run.example.sh
+++ b/day01-image/run.example.sh
@@ -21,14 +21,17 @@
 export FORMULA_VERSION=proposed
 export BINARY_MCP_VERSION=proposed
 export UBUNTU_BASEURL="http://mirror.mirantis.com/proposed/ubuntu/"
-export SALTSTACK_REPO="http://mirror.mirantis.com/proposed/saltstack-2016.3/xenial xenial main"
+export SALTSTACK_REPO="http://mirror.mirantis.com/proposed/saltstack-2017.7/xenial xenial main"
 export APT_MIRANTIS_GPG="http://apt.mirantis.com/public.gpg"
-export SALTSTACK_GPG="https://repo.saltstack.com/apt/ubuntu/16.04/amd64/2016.3/SALTSTACK-GPG-KEY.pub"
+export SALTSTACK_GPG="https://repo.saltstack.com/apt/ubuntu/16.04/amd64/2017.7/SALTSTACK-GPG-KEY.pub"
 export APT_MIRANTIS_SALT_REPO="http://apt.mirantis.com/xenial/ proposed salt"
 export GIT_SALT_FORMULAS_SCRIPTS=https://github.com/salt-formulas/salt-formulas-scripts.git
 export APT_REPOSITORY="deb [arch=amd64] http://apt.mirantis.com/xenial/ proposed salt"
 export APT_REPOSITORY_GPG=http://apt.mirantis.com/public.gpg
 ###
+# Hard-coded folder in template
+export PACKER_IMAGES_CACHE="${HOME}/packer_images_cache/"
+mkdir -p "${PACKER_IMAGES_CACHE}"
 
 export PACKER_LOG=1
 # For qemu test-build:
diff --git a/day01-image/scripts/cleanup.sh b/day01-image/scripts/cleanup.sh
index 2b5ccbc..0f5adec 100644
--- a/day01-image/scripts/cleanup.sh
+++ b/day01-image/scripts/cleanup.sh
@@ -10,6 +10,10 @@
 echo > /etc/apt/sources.list  || true
 rm -vf /usr/sbin/policy-rc.d || true
 
+
+echo "removeing all previously accepted salt keys"
+salt-key -D -y || true
+
 echo "cleaning up reclass"
 rm -rf /srv/salt/reclass || true
 rm -rf /srv/salt/scripts || true
@@ -42,7 +46,7 @@
 
 # stop and disable services, for healthy zerodisk
 # They should be enabled after cfg01 init
-stop_services="postgresql.service salt-api salt-master salt-minion jenkins maas-rackd.service maas-regiond.service"
+stop_services="postgresql.service salt-api salt-master salt-minion jenkins maas-rackd.service maas-regiond.service bind9"
 for s in ${stop_services} ; do
   systemctl stop ${s} || true
   systemctl disable ${s} || true
diff --git a/day01-image/scripts/salt.sh b/day01-image/scripts/salt.sh
index 78cdd79..a49b274 100644
--- a/day01-image/scripts/salt.sh
+++ b/day01-image/scripts/salt.sh
@@ -17,6 +17,7 @@
 salt-call ${SALT_OPTS} state.sls linux.network
 salt-call ${SALT_OPTS} state.sls openssh
 salt-call ${SALT_OPTS} state.sls git.server
+sleep 99h || true
 salt-call ${SALT_OPTS} state.sls postgresql
 # install only MAAS packages, don't configure anything.
 # Configuration will be processed during cfg01 initialization.
diff --git a/day01-image/template.json b/day01-image/template.json
index 1406680..c4ff8de 100644
--- a/day01-image/template.json
+++ b/day01-image/template.json
@@ -2,6 +2,8 @@
   "variables": {
     "user": "root",
     "password": "r00tme",
+    "images_cache": "{{ env `PACKER_IMAGES_CACHE` }}",
+    "disk_size": "50000",
     "do_api_token": "{{ env `DO_API_TOKEN` }}",
     "image_name": "{{ env `IMAGE_NAME` }}",
     "cluster_model": "{{ env `CLUSTER_MODEL` }}",
@@ -17,8 +19,7 @@
     "apt_mirantis_salt_repo": "{{ env `APT_MIRANTIS_SALT_REPO` }}",
     "git_salt_formulas_scripts": "{{ env `GIT_SALT_FORMULAS_SCRIPTS` }}",
     "apt_repository": "{{ env `APT_REPOSITORY` }}",
-    "apt_repository_gpg": "{{ env `APT_REPOSITORY_GPG` }}",
-    "disk_size": "50000"
+    "apt_repository_gpg": "{{ env `APT_REPOSITORY_GPG` }}"
 
   },
   "provisioners": [
@@ -125,6 +126,7 @@
       "iso_checksum": "566efef1d6f12e7d3a994c2405bdb642",
       "iso_checksum_type": "md5",
       "iso_url": "http://cloud-images.ubuntu.com/releases/xenial/release-20180306/ubuntu-16.04-server-cloudimg-amd64-disk1.img",
+      "iso_target_path": "{{ user `images_cache`}}/release-20180306_xenial-server-cloudimg-amd64-disk1.img",
       "disk_image": true,
       "accelerator": "kvm",
       "disk_size": "{{ user `disk_size`}}",
diff --git a/day01-image/template.json.env b/day01-image/template.json.env
new file mode 100644
index 0000000..fb05cc3
--- /dev/null
+++ b/day01-image/template.json.env
@@ -0,0 +1 @@
+PACKER_IMAGES_CACHE="${HOME}/packer_images_cache/"
diff --git a/mirror-image/run.example.sh b/mirror-image/run.example.sh
index 3f7328c..f1161ac 100644
--- a/mirror-image/run.example.sh
+++ b/mirror-image/run.example.sh
@@ -12,6 +12,8 @@
 # http/bootstrap.saltstack.com.sh https://github.com/saltstack/salt-bootstrap
 #
 
+export PACKER_IMAGES_CACHE="${HOME}/packer_images_cache/"
+#
 export CLUSTER_MODEL="https://github.com/Mirantis/mcp-offline-model.git"
 export CLUSTER_MODEL_REF="master"
 export CLUSTER_NAME="mcp-offline"
@@ -32,20 +34,20 @@
 export APT_REPOSITORY_GPG=${APT_MIRANTIS_GPG}
 
 # Openstack-related variables
-export VM_FLAVOR="3c4fe514-3eb6-464d-a419-7be09d72cf1e"
-export VM_FLOATING_IP_POOL="095f43ed-65ba-48ce-8185-d4080e430a88"
-export IMAGE_NAME="mcp-offline-mirror-$(date '+%Y-%m-%d-%H-%M-%S')"
-export VM_IMAGE="9953a40d-1fa2-4f26-b146-0507dbc912dc" # ubuntu cloud img
+#export VM_FLAVOR="3c4fe514-3eb6-464d-a419-7be09d72cf1e"
+#export VM_FLOATING_IP_POOL="095f43ed-65ba-48ce-8185-d4080e430a88"
+#export IMAGE_NAME="mcp-offline-mirror-$(date '+%Y-%m-%d-%H-%M-%S')"
+#export VM_IMAGE="9953a40d-1fa2-4f26-b146-0507dbc912dc" # ubuntu cloud img
 # May be need, if cloud with keystone v3 used
 #export OS_TENANT_ID=$OS_PROJECT_ID
 #export OS_DOMAIN_NAME="xxxx"
 #export OS_TENANT_NAME="xxxxx"
 
+# Hard-coded folder in template
+mkdir -p "${PACKER_IMAGES_CACHE}"
+
 export PACKER_LOG=1
 # For qemu test-build:
-#cloud-localds  --hostname ubuntu --dsmode local config-drive/cloudata.iso  config-drive/user-data.yaml
-# packer build -only=qemu -parallel=false -on-error=ask template.json
+cloud-localds  --hostname ubuntu --dsmode local config-drive/cloudata.iso  config-drive/user-data.yaml
+packer build -only=qemu -parallel=false -on-error=ask template.json
 # rm -rf ~/.packer.d/
-
-# For openstack test-build
-packer build -only=openstack -parallel=false -on-error=ask template.json
diff --git a/mirror-image/template.json b/mirror-image/template.json
index 5abc542..48045c1 100644
--- a/mirror-image/template.json
+++ b/mirror-image/template.json
@@ -3,6 +3,7 @@
     "user": "root",
     "password": "r00tme",
     "disk_size": "100000",
+    "images_cache": "{{ env `PACKER_IMAGES_CACHE` }}",
     "do_api_token": "{{ env `DO_API_TOKEN` }}",
     "image_name": "{{ env `IMAGE_NAME` }}",
     "cluster_model": "{{ env `CLUSTER_MODEL` }}",
@@ -151,7 +152,7 @@
       "accelerator": "kvm",
       "disk_size": "{{ user `disk_size`}}",
       "iso_url": "http://cloud-images.ubuntu.com/releases/xenial/release-20180306/ubuntu-16.04-server-cloudimg-amd64-disk1.img",
-      "iso_target_path": "/root/isos/xenial-server-cloudimg-amd64-disk1.img",
+      "iso_target_path": "{{ user `images_cache`}}/release-20180306_xenial-server-cloudimg-amd64-disk1.img",
       "iso_checksum_type": "md5",
       "disk_image": true,
       "disk_compression": true,
diff --git a/packer-image-buid.groovy b/packer-image-buid.groovy
new file mode 100644
index 0000000..3f05f44
--- /dev/null
+++ b/packer-image-buid.groovy
@@ -0,0 +1,311 @@
+/**
+ *
+ * Build mirror/aptly/apt01 image pipeline
+ *
+ *  PACKER_URL       = 'https://releases.hashicorp.com/packer/1.2.4/packer_1.2.4_linux_amd64.zip'
+ *  PACKER_ZIP_MD5   = '997274e80ae41102eecf9df2e5b67860'
+ *  PACKER_ARGS      = '-debug'
+ *  BUILD_ONLY       = 'openstack|qemu'
+ *  CLEANUP_AFTER    = wipe workspace AFTER build
+ *  IMAGE_NAME       = Name of the result image.
+ *  TIMESTAMP_INAME  = True|false. If true - image will be uploaded to backend with IMAGE_NAME + timestamp
+ *
+ * OPENSTACK_OPENRC_YAML: aml of key:value variables required for openstack venv
+ * example:
+ *            ---
+ *             OS_TENANT_ID: 'xxxx'
+ *             OS_TENANT_NAME: "mcp-oscore-ci"
+ *
+ * EXTRA_VARIABLES_YAML - Yaml of key:value variables required for template.json
+ * example:
+ *            ---
+ *            IMAGE_NAME: 'ubuntu-16.04-proposed'
+ *
+ *  CREDENTIALS_ID  = Global jenkins cred. for clone DEFAULT_GIT_URL
+ *  DEFAULT_GIT_URL
+ *  DEFAULT_GIT_REF
+ *
+ *  OS_VERSION         = OpenStack version
+ *  OS_CREDENTIALS_ID  = ID of credentials for OpenStack API stored in Jenkins.
+ *  OS_URL             = Keystone auth endpoint of the OpenStack.
+ *  OS_PROJECT         =
+ *
+ *  PUBLISH_BACKEND = local|glance|http
+ *  UPLOAD_URL      = URL of an WebDAV used to upload the image after creating.(Only in case PUBLISH_BACKEND == http)
+ */
+
+// Load shared libs
+def common = new com.mirantis.mk.Common()
+def McpCommon = new com.mirantis.mcp.Common()
+def openstack = new com.mirantis.mk.Openstack()
+def date = new Date()
+def dateTime = date.format("ddMMyyyy-HHmmss")
+//
+def job_env = env.getEnvironment().findAll { k, v -> v }
+
+////
+// To be removed
+//job_env['BUILD_ONLY'] = 'qemu'
+job_env['TIMESTAMP_INAME'] = true
+//job_env['CLEANUP_AFTER'] = false
+//job_env['PACKER_ARGS'] = ' -debug'
+//job_env['BUILD_OS'] = 'ubuntu-16.04'
+//job_env['IMAGE_NAME'] = 'ubuntu-16-04-x64-test'
+//job_env['DEFAULT_GIT_REF'] = 'refs/changes/06/22106/5'
+//job_env['DEFAULT_GIT_URL'] = 'ssh://mcp-jenkins@gerrit.mcp.mirantis.net:29418/mk/packer-templates'
+//job_env['CREDENTIALS_ID'] = 'gerrit'
+//job_env['PUBLISH_BACKEND'] = 'http'
+//job_env['PACKER_URL'] = "https://releases.hashicorp.com/packer/1.2.4/packer_1.2.4_linux_amd64.zip"
+//job_env['PACKER_ZIP_MD5'] = '997274e80ae41102eecf9df2e5b67860'
+//job_env['EXTRA_VARIABLES_YAML'] = "\n" +
+//    "IMAGE_NAME : \"ubuntu-16-04-x64\"\n" +
+//    "UBUNTU_BASEURL: \"http://mirror.mirantis.com/proposed/ubuntu/\"\n" +
+//    "SALTSTACK_REPO: \"deb [arch=amd64] http://mirror.mirantis.com/proposed/saltstack-2017.7/xenial xenial main\"\n" +
+//    "SALTSTACK_GPG: \"https://repo.saltstack.com/apt/ubuntu/16.04/amd64/2017.7/SALTSTACK-GPG-KEY.pub\""
+/////
+extra_vars = readYaml text: job_env.get('EXTRA_VARIABLES_YAML','').trim()
+if (job_env.get('TIMESTAMP_INAME', false)) {
+  IMAGE_NAME = IMAGE_NAME + "-" + dateTime
+}
+// Overwrite IMAGE_NAME in template.json with expected
+extra_vars['IMAGE_NAME'] = IMAGE_NAME
+def gerrit = new com.mirantis.mk.Gerrit()
+defaultGitRef = job_env.get('DEFAULT_GIT_REF', 'HEAD')
+defaultGitUrl = job_env.get('DEFAULT_GIT_URL', null)
+
+// Self-check
+for (String req_v : ['BUILD_OS', 'BUILD_ONLY','IMAGE_NAME'] ) {
+  if (!job_env.get(req_v, false)) {
+    throw new Exception("${req_v} not set!")
+  }
+}
+
+def MapToList(input_map) {
+/**
+ * Convert dict in bash-like list
+ */
+
+  def data_list = []
+
+  for (i = 0; i < input_map.size(); i++) {
+    data = ''
+    data = input_map.keySet()[i] + "=" + input_map.values()[i]
+    data_list.add(data)
+  }
+
+  return data_list
+
+}
+
+timeout(time: 6, unit: 'HOURS') {
+  node("jsl15.mcp.mirantis.net") {
+    def checkouted = false
+    def creds = ''
+    creds = common.getPasswordCredentials(job_env.OS_CREDENTIALS_ID)
+    rcFile = openstack.createOpenstackEnv(workspace, job_env.OS_URL, job_env.OS_CREDENTIALS_ID, job_env.OS_PROJECT, "default", "", "default", "2", "")
+
+    try {
+      def workspace = common.getWorkspace()
+      def openstackEnv = "${workspace}/venv"
+      def _artifact_dir = "${workspace}/artifacts"
+      def ImagesCacheFolder = "${workspace}/../${env.JOB_NAME}_cache/"
+      stage("checkout") {
+        if (defaultGitRef && defaultGitUrl) {
+          checkouted = gerrit.gerritPatchsetCheckout(defaultGitUrl, defaultGitRef, "HEAD", job_env.CREDENTIALS_ID)
+        } else {
+          throw new Exception("Cannot checkout gerrit patchset: DEFAULT_GIT_URL is null")
+        }
+      }
+      stage("Prepare env") {
+        if (!fileExists("${workspace}/tmp")) {
+          sh "mkdir -p ${workspace}/tmp"
+        }
+        if (!fileExists(ImagesCacheFolder)) {
+          sh "mkdir -p ${ImagesCacheFolder}"
+        }
+        if (!fileExists(_artifact_dir)) {
+          sh "mkdir -p ${_artifact_dir}"
+        }
+        if (!fileExists("bin")) {
+          common.infoMsg("Downloading packer")
+          sh "mkdir -p bin"
+          dir("bin") {
+            def zipname = sh(script: "basename ${job_env.PACKER_URL}", returnStdout: true).trim()
+            sh(script: "wget --quiet ${job_env.PACKER_URL}", returnStdout: true)
+            sh "echo \"${job_env.PACKER_ZIP_MD5} ${zipname}\" >> md5sum"
+            sh(script: "md5sum -c --status md5sum", returnStdout: true)
+            sh "unzip ${zipname}"
+          }
+        }
+        if (!fileExists("${job_env.BUILD_OS}/images")) {
+          // clean images dir before building
+          sh(script: "rm -rf ${job_env.BUILD_OS}/images/*", returnStatus: true)
+        }
+      }
+
+      stage("Build Instance") {
+        def _packer_args = "${job_env.get(PACKER_ARGS, '')}"
+        def _packer_log = "${workspace}/packer.log"
+        def _artifact_list = []
+        // clean old log, for correct status grepping
+        if (fileExists(_packer_log)) {
+          sh "rm -v ${_packer_log}"
+        }
+
+        dir("${workspace}/${job_env.BUILD_OS}/") {
+          if (fileExists("config-drive/user-data.yaml")) {
+            common.infoMsg("Creating cloud-config drive")
+            if (fileExists("config-drive/cloudata.iso")) {
+              sh "rm -v config-drive/cloudata.iso"
+            }
+            sh "cloud-localds config-drive/cloudata.iso  config-drive/user-data.yaml"
+          }
+        }
+
+        if (job_env.BUILD_ONLY.toLowerCase() == "openstack") {
+
+          dir("${workspace}/${job_env.BUILD_OS}/") {
+            extra_vars_list = MapToList(extra_vars)
+            withEnv(["PATH=${env.PATH}:${workspace}/bin",
+                     "PACKER_LOG_PATH=${_packer_log}",
+                     "PACKER_LOG=1",
+                     "TMPDIR=${workspace}/tmp",
+                     "OS_USERNAME=${creds.username.toString()}",
+                     "OS_PASSWORD=${creds.password.toString()}"] + extra_vars_list) {
+
+              common.infoMsg("Run build with:")
+              sh(script: 'printenv|sort')
+              sh(script: "set -xe; packer build -only='openstack' ${_packer_args} -parallel=false template.json" )
+              _os_private = "${workspace}/${job_env.BUILD_OS}/os_${job_env.BUILD_OS}.pem"
+              if (fileExists(_os_private)) {
+                common.infoMsg("Packer private key:")
+                sh "cat ${_os_private}"
+              }
+              def packerStatus = sh(script: "grep \"Some builds didn't complete successfully and had errors\" ${_packer_log}", returnStatus: true)
+              // grep returns 0 if find something
+              if (packerStatus != 0) {
+                common.infoMsg("Openstack instance build complete")
+              } else {
+                throw new Exception("Openstack Packer build failed")
+              }
+
+              common.retry(3, 5) {
+                common.infoMsg("Attempt download openstack image..")
+                openstack.runOpenstackCommand("openstack image save --file ${_artifact_dir}/${job_env.IMAGE_NAME}.qcow2 ${IMAGE_NAME}", rcFile, openstackEnv)
+              }
+            }
+          }
+
+        } else if (job_env.BUILD_ONLY.toLowerCase() == 'qemu') {
+
+          dir("${workspace}/${job_env.BUILD_OS}/") {
+            extra_vars_list = MapToList(extra_vars)
+            withEnv(["PATH=${env.PATH}:${workspace}/bin",
+                     "PACKER_LOG_PATH=${_packer_log}",
+                     "PACKER_LOG=1",
+                     "TMPDIR=${workspace}/tmp",
+                     "PACKER_IMAGES_CACHE=${ImagesCacheFolder}"] + extra_vars_list) {
+              common.infoMsg("Run build with:")
+              sh(script: 'printenv|sort')
+              sh(script: "set -xe ; packer build -on-error=ask -only='qemu' ${_packer_args} -parallel=false template.json".toString())
+
+              def packerStatus = sh(script: "grep \"Some builds didn't complete successfully and had errors\" ${PACKER_LOG_PATH}", returnStatus: true)
+              // grep returns 0 if find something
+              if (packerStatus != 0) {
+                common.infoMsg("qemu instance build completed successfully")
+              } else {
+                throw new Exception("qemu instance build failed")
+              }
+              // collect artifacts
+              // TODO make it possible, process multiply artifacts by one run.
+              dir('images/') {
+                def _files = findFiles(glob: "**/${job_env.IMAGE_NAME}*")
+                if (_files.size() > 1) {
+                  common.warningMsg("Multiply artifacts detected!Only first one will be processed!")
+                } else if (_files.size() == 0) {
+                  common.warningMsg("No artifacts detected!")
+                }
+                for (String x : _files) {
+                  _file = sh(script: "set -x ; readlink -f ${x}", returnStdout: true)
+                  _artifact_list.add(_file.split('/').last())
+                  sh(script: "mv -v images/${x} ${_artifact_dir}/${job_env.IMAGE_NAME}.qcow2")
+                }
+              }
+            }
+          }
+
+        } else {
+          throw new Exception("Unexpected BUILD_ONLY=${env.BUILD_ONLY} target!")
+        }
+
+
+      }
+
+      stage("Publish artifacts") {
+        dir(_artifact_dir) {
+          common.infoMsg("Processing md5 for artifacts")
+          for (String x : _artifact_list) {
+            _md5 = sh(script: "md5sum ${x} > ${x}.md5", returnStdout: true).trim()
+            _size = sh(script: "ls -alh ${x}", returnStdout: true).trim()
+            common.infoMsg("Artifact file: ${_size}\n${_md5}")
+          }
+          if (job_env.PUBLISH_BACKEND.toLowerCase() == 'local') {
+            common.infoMsg("Uploading to: local")
+            common.infoMsg("For local publish target - nothing to do, all files in: ${_artifact_dir}")
+            if (job_env.get('CLEANUP_AFTER', false)) {
+              common.warningMsg("You are trying to use 'local' publish method, along with enabled CLEANUP_AFTER! ")
+              common.warningMsg("Disabling CLEANUP_AFTER option, to save you'r data ;) ")
+              job_env.CLEANUP_AFTER = false
+            }
+          } else if (job_env.PUBLISH_BACKEND.toLowerCase() == 'glance') {
+            common.infoMsg("Uploading to: openstack")
+            if (fileExists("${workspace}/venv")) {
+              common.infoMsg("cleaning virtualenv at:${workspace}/venv")
+              sh(script: "rm -rf ${workspace}/venv", returnStatus: true)
+            }
+            openstack.setupOpenstackVirtualenv(openstackEnv, job_env.OS_VERSION)
+            for (String x : findFiles(glob: "${_artifact_dir}/*")) {
+              if (x.endsWith('.md5')) {
+                common.warningMsg("Skipping:${x} from openstack upload!")
+                continue
+              }
+              openstack.runOpenstackCommand(String.format("glance image-create --name '%s' %s --file %s", imageShortName, glanceRunArgs, imageName), rcFile, openstackEnv)
+              // do upload
+            }
+
+
+          } else if (job_env.PUBLISH_BACKEND.toLowerCase() == 'http') {
+            for (String u_file : findFiles(glob: "${_artifact_dir}/*")) {
+              common.infoMsg("Uploading image ${IMAGE_NAME}")
+              def uploadImageStatus = ''
+              common.retry(3, 5) {
+                uploadImageStatus = sh(script: "echo curl -f -T ${u_file} ${job_env.UPLOAD_URL}", returnStatus: true)
+                if (uploadImageStatus != 0) {
+                  throw new Exception("Uploading file: ${u_file} failed!")
+                }
+              }
+
+            }
+            // Fixme for correct path ?
+            currentBuild.description = "<a href='http://ci.mcp.mirantis.net:8085/images/${IMAGE_NAME}.qcow2'>${IMAGE_NAME}.qcow2</a>"
+          } else {
+            throw new Exception("Unsupported publish backend:${job_env.PUBLISH_BACKEND}")
+          }
+
+        }
+      }
+    } catch (Throwable e) {
+      // If there was an error or exception thrown, the build failed
+      currentBuild.result = "FAILURE"
+      throw e
+    } finally {
+      if (job_env.get('CLEANUP_AFTER', false)) {
+        dir(workspace) {
+          sh "find . -mindepth 1 -delete"
+        }
+      } else {
+        common.infoMsg("Env has not been cleaned!")
+      }
+    }
+  }
+}
diff --git a/ubuntu-16.04/run.example.sh b/ubuntu-16.04/run.example.sh
new file mode 100644
index 0000000..df58f50
--- /dev/null
+++ b/ubuntu-16.04/run.example.sh
@@ -0,0 +1,28 @@
+#!/bin/bash
+
+# pre-requirments:
+# apt-get install cloud-localds
+# Cloudimg: wget https://cloud-images.ubuntu.com/xenial/XXXX/xenial-server-cloudimg-amd64-disk1.img
+# Packer: https://releases.hashicorp.com/packer/1.1.3/packer_1.1.3_linux_amd64.zip
+
+# Those script - only example for variables, which should be passed to packer and
+# overwrite variables under /scripts/ directory
+
+# External script sources:
+# http/bootstrap.saltstack.com.sh https://github.com/saltstack/salt-bootstrap
+#
+export IMAGE_NAME="ubuntu-16-04-x64"
+export UBUNTU_BASEURL="http://mirror.mirantis.com/proposed/ubuntu/"
+export SALTSTACK_REPO="deb [arch=amd64] http://mirror.mirantis.com/proposed/saltstack-2017.7/xenial xenial main"
+export SALTSTACK_GPG="https://repo.saltstack.com/apt/ubuntu/16.04/amd64/2017.7/SALTSTACK-GPG-KEY.pub"
+###
+# Hard-coded folder in template
+export PACKER_IMAGES_CACHE="${HOME}/packer_images_cache/"
+mkdir -p "${PACKER_IMAGES_CACHE}"
+
+export PACKER_LOG=1
+# For qemu test-build:
+cloud-localds  --hostname ubuntu --dsmode local config-drive/cloudata.iso  config-drive/user-data.yaml
+packer build -only=qemu -parallel=false -on-error=ask template.json
+#rm -rf ~/.packer.d/
+
diff --git a/ubuntu-16.04/template.json b/ubuntu-16.04/template.json
index 84e1a59..284237e 100644
--- a/ubuntu-16.04/template.json
+++ b/ubuntu-16.04/template.json
@@ -4,6 +4,7 @@
     "password": "ho5uo7Uome5d",
     "distro": "ubuntu-16-04-x64",
     "disk_size": "8000",
+    "images_cache": "{{ env `PACKER_IMAGES_CACHE` }}",
     "ubuntu_baseurl": "https://mirror.mirantis.com/proposed/ubuntu/",
     "saltstack_gpg": "{{ env `SALTSTACK_GPG` }}",
     "saltstack_repo": "{{ env `SALTSTACK_REPO` }}",
@@ -284,6 +285,7 @@
       "iso_checksum": "566efef1d6f12e7d3a994c2405bdb642",
       "iso_checksum_type": "md5",
       "iso_url": "http://cloud-images.ubuntu.com/releases/xenial/release-20180306/ubuntu-16.04-server-cloudimg-amd64-disk1.img",
+      "iso_target_path": "{{ user `images_cache`}}/release-20180306_xenial-server-cloudimg-amd64-disk1.img",
       "disk_image": true,
       "disk_compression": true,
       "accelerator": "kvm",
diff --git a/ubuntu-16.04/template.json.env b/ubuntu-16.04/template.json.env
index 12be33e..ed6351e 100644
--- a/ubuntu-16.04/template.json.env
+++ b/ubuntu-16.04/template.json.env
@@ -1,5 +1,7 @@
 # Env variables and description:
-DO_API_TOKEN
+#DO_API_TOKEN
+PACKER_IMAGES_CACHE="${HOME}/packer_images_cache/"
+
 
 # base.sh
 UBUNTU_BASEURL=http://mirror.mirantis.com/stable/ubuntu/