This sample produces as build output a Docker image and then pushes the Docker image to an Amazon Elastic Container Registry (Amazon ECR) image repository. You can adapt this sample to push the Docker image to Docker Hub. For more information, see Adapt the 'Publish Docker image to Amazon ECR' sample to push to Docker Hub.
To learn how to build a Docker image by using a custom Docker build image (docker:dind
in Docker Hub), see our Docker in custom image sample.
This sample was tested referencing golang:1.12
.
This sample uses the new multi-stage Docker builds feature, which produces a Docker image as build output. It then pushes the Docker image to an Amazon ECR image repository. Multi-stage Docker image builds help to reduce the size of the final Docker image. For more information, see Use multi-stage builds with Docker.
Run the 'Publish Docker image to Amazon ECR' sampleUse the following procedure to run the sample that publishes a Docker image to Amazon ECR. For more infomration about this sample, see 'Publish Docker image to an Amazon ECR image repository' sample for CodeBuild.
To run this sampleIf you already have an image repository in Amazon ECR you want to use, skip to step 3. Otherwise, if you are using an user instead of an AWS root account or an administrator user to work with Amazon ECR, add this statement (between ### BEGIN ADDING STATEMENT HERE ###
and ### END ADDING STATEMENT HERE ###
) to the user (or IAM group the user is associated with). Using an AWS root account is not recommended.This statement allows the creation of Amazon ECR repositories for storing Docker images. Ellipses (...
) are used for brevity and to help you locate where to add the statement. Do not remove any statements, and do not type these ellipses into the policy. For more information, see Working with inline policies using the AWS Management Console in the user Guide.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ecr:CreateRepository"
],
"Resource": "*"
}
]
}
The IAM entity that modifies this policy must have permission in IAM to modify policies.
Create an image repository in Amazon ECR. Be sure to create the repository in the same AWS Region where you create your build environment and run your build. For more information, see Creating a repository in the Amazon ECR User Guide. This repository's name must match the repository name you specify later in this procedure, represented by the IMAGE_REPO_NAME
environment variable. Ensure that the Amazon ECR repository policy grants image push access for your CodeBuild service IAM role.
Add this statement (between ### BEGIN ADDING STATEMENT HERE ###
and ### END ADDING STATEMENT HERE ###
) to the policy you attached to your AWS CodeBuild service role. This statement allows CodeBuild to upload Docker images to Amazon ECR repositories. Ellipses (...
) are used for brevity and to help you locate where to add the statement. Do not remove any statements, and do not type these ellipses into the policy.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ecr:BatchCheckLayerAvailability",
"ecr:CompleteLayerUpload",
"ecr:GetAuthorizationToken",
"ecr:InitiateLayerUpload",
"ecr:PutImage",
"ecr:UploadLayerPart"
],
"Resource": "*"
}
]
}
The IAM entity that modifies this policy must have permission in IAM to modify policies.
Create the files as described in the Directory structure and Files sections of this topic, and then upload them to an S3 input bucket or an AWS CodeCommit, GitHub, or Bitbucket repository. For more information, see Image definitions file reference in the AWS CodePipeline User Guide.
ImportantDo not upload
, just the files inside of (root directory name)
.(root directory name)
If you are using an S3 input bucket, be sure to create a ZIP file that contains the files, and then upload it to the input bucket. Do not add
to the ZIP file, just the files inside of (root directory name)
.(root directory name)
Create a build project, run the build, and view build information.
If you use the console to create your project:
For Operating system, choose Ubuntu.
For Runtime, choose Standard.
For Image, choose aws/codebuild/standard:5.0.
Add the following environment variables:
AWS_DEFAULT_REGION with a value of region-ID
AWS_ACCOUNT_ID with a value of account-ID
IMAGE_TAG with a value of Latest
IMAGE_REPO_NAME with a value of Amazon-ECR-repo-name
If you use the AWS CLI to create the build project, the JSON-formatted input to the create-project
command might look similar to this. (Replace the placeholders with your own values.)
{
"name": "sample-docker-project",
"source": {
"type": "S3",
"location": "codebuild-region-ID
-account-ID
-input-bucket/DockerSample
.zip"
},
"artifacts": {
"type": "NO_ARTIFACTS"
},
"environment": {
"type": "LINUX_CONTAINER",
"image": "aws/codebuild/standard:5.0",
"computeType": "BUILD_GENERAL1_SMALL",
"environmentVariables": [
{
"name": "AWS_DEFAULT_REGION",
"value": "region-ID
"
},
{
"name": "AWS_ACCOUNT_ID",
"value": "account-ID
"
},
{
"name": "IMAGE_REPO_NAME",
"value": "Amazon-ECR-repo-name
"
},
{
"name": "IMAGE_TAG",
"value": "latest"
}
],
},
"serviceRole": "arn:aws:iam::account-ID
:role/role-name
",
"encryptionKey": "arn:aws:kms:region-ID
:account-ID
:key/key-ID
"
}
Confirm that CodeBuild successfully pushed the Docker image to the repository:
This sample assumes this directory structure.
(root directory name)
âââ buildspec.yml
âââ Dockerfile
Files
This sample uses these files.
buildspec.yml
(in
)(root directory name)
version: 0.2
phases:
pre_build:
commands:
- echo Logging in to Amazon ECR...
- aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $AWS_ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com
build:
commands:
- echo Build started on `date`
- echo Building the Docker image...
- docker build -t $IMAGE_REPO_NAME:$IMAGE_TAG .
- docker tag $IMAGE_REPO_NAME:$IMAGE_TAG $AWS_ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com/$IMAGE_REPO_NAME:$IMAGE_TAG
post_build:
commands:
- echo Build completed on `date`
- echo Pushing the Docker image...
- docker push $AWS_ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com/$IMAGE_REPO_NAME:$IMAGE_TAG
Dockerfile
(in
)(root directory name)
FROM golang:1.12-alpine AS build
#Install git
RUN apk add --no-cache git
#Get the hello world package from a GitHub repository
RUN go get github.com/golang/example/hello
WORKDIR /go/src/github.com/golang/example/hello
# Build the project and send the output to /bin/HelloWorld
RUN go build -o /bin/HelloWorld
FROM golang:1.12-alpine
#Copy the build's output binary from the previous build container
COPY --from=build /bin/HelloWorld /bin/HelloWorld
ENTRYPOINT ["/bin/HelloWorld"]
Note
CodeBuild overrides the ENTRYPOINT
for custom Docker images.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4