AWS CodeBuild Operations: Difference between revisions

From NovaOrdis Knowledge Base
Jump to navigation Jump to search
Line 13: Line 13:
====Build badge====
====Build badge====
For more details about the build badge, see Select [[AWS_CodeBuild_Concepts#Build_Badge|AWS CodeBuild Concepts - Build Badge]].
For more details about the build badge, see Select [[AWS_CodeBuild_Concepts#Build_Badge|AWS CodeBuild Concepts - Build Badge]].
====Tags====


==Source==
==Source==

Revision as of 19:31, 27 February 2019

Internal

Create a Build Project

Project configuration

Project name

Description

Build badge

For more details about the build badge, see Select AWS CodeBuild Concepts - Build Badge.

Tags

Source

Source provider: GitHub

Repository in my GitHub account.

Additional configuration

Git clone depth: 1

Primary source webhook events

Webhook - Rebuild every time a code change is pushed to this repository. Enable and experiment with that.

Environment

Environment image: Managed image

Operating system: Ubuntu

Runtime: Java

Runtime version: aws/codebuild/java:openjdk-8


The Java runtime may have an obsolete Gradle version. If that is the case, initialize your project with gradlew and configure the buildspec file to use ./gradlew to build the project.

Privileged: Enable this flag if you want to build Docker images or want your builds to get elevated privileges

Service role:

For the implications on the build process of correctly configuring the service role, see:

CodeBuild Service Role

Allow AWS CodeBuild to modify this service role so it can be used with this build project. If selected, the console configuration code updates the role so it contains the appropriate policies.

If you get:

The policy's default version was not created by enhanced zero click role creation or was not the most recent version created by enhanced zero click role creation.

unselect "Allow AWS CodeBuild to modify ..."

Environment variables:

For more details see:

CodeBuild Concepts - Environment Variables

No user environment variables can start with CODEBUILD_

Name: CODEBUILD_SOURCE_VERSION, Value: "unity" (for GitHub, this is the branch name to be uses)

For personal account:

  • Name: AWS_ACCESS_KEY Value: ...
  • Name: SK Value: TBD

For shared build account:

  • Name: AWS_ACCESS_KEY_ID
  • Name: AWS_SECRET_ACCESS_KEY

Additional Configuration

Timeout: 20 minutes.

Buildspec

Use a buildspec file.

Specify name of the file, if not buildspec.yml,

Artifacts

Logs

CloudWatch

Select CloudWatch logs.

Group Name: /playground

Stream Name: ops-unity-build

You must enable CloudWatch logging if you want any kind of build logs, including the "console" log.

Run a Build Project

Run Build

Source version: unity

Environment variables override:

SK:

Start Build

Build an AWS CodeBuild Docker Image

https://docs.aws.amazon.com/codebuild/latest/userguide/sample-docker-custom-image.html
https://docs.aws.amazon.com/codebuild/latest/APIReference/API_ProjectEnvironment.html

This procedure documents the process of creating a custom environment image.

git clone git@github.com:aws/aws-codebuild-docker-images.git
cd aws-codebuild-docker-images/ubuntu/java/openjdk-8 
docker build -t aws/codebuild/java:openjdk-8 .

docker images
REPOSITORY                                                                        TAG                 IMAGE ID            CREATED             SIZE
aws/codebuild/java                                                                openjdk-8           5490a2e1223f        2 minutes ago       1.6GB

If custom build images need to be able to interact with Docker - for creating Docker images, for example -, the Docker server must be started manually in the build specification, as shown below.

Amend the Build Specification to Explicitly Start the Docker Daemon

In case of custom environment images, even those based on an AWS CodeBuild image, built as shown above, the docker daemon must be started explicitly in the build specification. This has to be done even if the "privileged build" flag is enabled, the docker daemon must be started explicitly in build spec - it is not started automatically as in the case of AWS-provided environment images.

This sequence works for Ubuntu-based images:

version: 0.2
...
phases:
  install:
    commands:
      - nohup /usr/local/bin/dockerd --host=unix:///var/run/docker.sock --host=tcp://127.0.0.1:2375 --storage-driver=overlay2&
      - timeout 15 sh -c "until docker info; do echo .; sleep 1; done"
  build:
...

Troubleshooting

Generic troubleshooting advice:

https://docs.aws.amazon.com/codebuild/latest/userguide/troubleshooting.html

ECR AccessDeniedException

An error occurred (AccessDeniedException) when calling the GetAuthorizationToken operation: User: arn:aws:iam::673499572719:user/codebuild-p2 is not authorized to perform: ecr:GetAuthorizationToken on resource: *

Add ecr:GetAuthorizationToken for the user in question to the build role. These are extremely lax permissions, it could be further tightened up:

{
 ...
 "Sid": "VisualEditor1",
 "Effect": "Allow",
 "Action": "ecr:*",
 "Resource": "*"
}