This sample uses a Docker image in an Amazon Elastic Container Registry (Amazon ECR) image repository to build a sample Go project.
Run the Amazon ECR sampleUse the following instructions to run the Amazon ECR sample for CodeBuild.
To run this sampleTo create and push the Docker image to your image repository in Amazon ECR, complete the steps in the Run the 'Publish Docker image to Amazon ECR' sample section of the 'Publish Docker image to Amazon ECR' sample.
Create a Go project:
Create the files as described in the Go project structure and Go project files sections of this topic, and then upload them to an S3 input bucket or an AWS CodeCommit, GitHub, or Bitbucket repository.
ImportantDo not upload
, just the files inside of (root directory name)
.(root directory name)
If you are using an S3 input bucket, be sure to create a ZIP file that contains the files, and then upload it to the input bucket. Do not add
to the ZIP file, just the files inside of (root directory name)
.(root directory name)
Create a build project, run the build, and view related build information.
If you use the AWS CLI to create the build project, the JSON-formatted input to the create-project
command might look similar to this. (Replace the placeholders with your own values.)
{
"name": "sample-go-project",
"source": {
"type": "S3",
"location": "codebuild-region-ID
-account-ID
-input-bucket/GoSample
.zip"
},
"artifacts": {
"type": "S3",
"location": "codebuild-region-ID
-account-ID
-output-bucket",
"packaging": "ZIP",
"name": "GoOutputArtifact
.zip"
},
"environment": {
"type": "LINUX_CONTAINER",
"image": "aws/codebuild/standard:5.0",
"computeType": "BUILD_GENERAL1_SMALL"
},
"serviceRole": "arn:aws:iam::account-ID
:role/role-name
",
"encryptionKey": "arn:aws:kms:region-ID
:account-ID
:key/key-ID
"
}
To get the build output artifact, open your S3 output bucket.
Download the
file to your local computer or instance, and then extract the contents of the file. In the extracted contents, get the GoOutputArtifact
.ziphello
file.
If one of the following is true, you must add permissions to your image repository in Amazon ECR so that AWS CodeBuild can pull its Docker image into the build environment.
Your project uses CodeBuild credentials to pull Amazon ECR images. This is denoted by a value of CODEBUILD
in the imagePullCredentialsType
attribute of your ProjectEnvironment
.
Your project uses a cross-account Amazon ECR image. In this case, your project must use its service role to pull Amazon ECR images. To enable this behavior, set the imagePullCredentialsType
attribute of your ProjectEnvironment
to SERVICE_ROLE
.
Open the Amazon ECR console at https://console.aws.amazon.com/ecr/.
In the list of repository names, choose the name of the repository you created or selected.
From the navigation pane, choose Permissions, choose Edit, and then choose Add statement.
For Statement name, enter an identifier (for example, CodeBuildAccess
).
For Effect, leave Allow selected. This indicates that you want to allow access to another AWS account.
For Principal, do one of the following:
If your project uses CodeBuild credentials to pull an Amazon ECR image, in Service principal, enter codebuild.amazonaws.com
.
If your project uses a cross-account Amazon ECR image, for AWS account IDs, enter IDs of the AWS accounts that you want to give access.
Skip the All IAM entities list.
For Action, select the pull-only actions: ecr:GetDownloadUrlForLayer, ecr:BatchGetImage, and ecr:BatchCheckLayerAvailability.
For Conditions, add the following:
{
"StringEquals":{
"aws:SourceAccount":"<AWS-account-ID>
",
"aws:SourceArn":"arn:aws:codebuild:<region>
:<AWS-account-ID>
:project/<project-name>
"
}
}
Choose Save.
This policy is displayed in Permissions. The principal is what you entered for Principal in step 3 of this procedure:
If your project uses CodeBuild credentials to pull an Amazon ECR image, "codebuild.amazonaws.com"
appears under Service principals.
If your project uses a cross-account Amazon ECR image, the ID of the AWS account that you want to give access appears under AWS Account IDs.
The following sample policy uses both CodeBuild credentials and a cross-account Amazon ECR image.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "CodeBuildAccessPrincipal",
"Effect": "Allow",
"Action": [
"ecr:GetDownloadUrlForLayer",
"ecr:BatchGetImage",
"ecr:BatchCheckLayerAvailability"
],
"Resource": "*",
"Condition": {
"StringEquals": {
"aws:SourceArn": "arn:aws:codebuild:us-east-1:111122223333
:project/MyProject",
"aws:SourceAccount": "111122223333
"
}
}
},
{
"Sid": "CodeBuildAccessCrossAccount",
"Effect": "Allow",
"Action": [
"ecr:GetDownloadUrlForLayer",
"ecr:BatchGetImage",
"ecr:BatchCheckLayerAvailability"
],
"Resource": "*"
}
]
}
If your projects use CodeBuild credentials and you would like your CodeBuild projects to have open access to the Amazon ECR repository, you can omit the Condition
keys and add the following sample policy.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "CodeBuildAccessPrincipal",
"Effect": "Allow",
"Resource": [
"arn:aws:codecommit:us-east-2:111122223333
:MySharedDemoRepo
"
],
"Action": [
"ecr:GetDownloadUrlForLayer",
"ecr:BatchGetImage",
"ecr:BatchCheckLayerAvailability"
]
},
{
"Sid": "CodeBuildAccessCrossAccount",
"Effect": "Allow",
"Resource": [
"arn:aws:codecommit:us-east-2:111122223333
:MySharedDemoRepo
"
],
"Action": [
"ecr:GetDownloadUrlForLayer",
"ecr:BatchGetImage",
"ecr:BatchCheckLayerAvailability"
]
}
]
}
Create a build project, run the build, and view build information.
If you use the AWS CLI to create the build project, the JSON-formatted input to the create-project
command might look similar to this. (Replace the placeholders with your own values.)
{
"name": "amazon-ecr-sample-project",
"source": {
"type": "S3",
"location": "codebuild-region-ID
-account-ID
-input-bucket/GoSample
.zip"
},
"artifacts": {
"type": "S3",
"location": "codebuild-region-ID
-account-ID
-output-bucket",
"packaging": "ZIP",
"name": "GoOutputArtifact
.zip"
},
"environment": {
"type": "LINUX_CONTAINER",
"image": "account-ID
.dkr.ecr.region-ID
.amazonaws.com/your-Amazon-ECR-repo-name
:tag
",
"computeType": "BUILD_GENERAL1_SMALL"
},
"serviceRole": "arn:aws:iam::account-ID
:role/role-name
",
"encryptionKey": "arn:aws:kms:region-ID
:account-ID
:key/key-ID
"
}
To get the build output artifact, open your S3 output bucket.
Download the
file to your local computer or instance, and then extract the contents of the GoOutputArtifact
.zip
file. In the extracted contents, get the GoOutputArtifact
.ziphello
file.
This sample assumes this directory structure.
(root directory name)
âââ buildspec.yml
âââ hello.go
Go project files
This sample uses these files.
buildspec.yml
(in
)(root directory name)
version: 0.2
phases:
install:
runtime-versions:
golang: 1.13
build:
commands:
- echo Build started on `date`
- echo Compiling the Go code
- go build hello.go
post_build:
commands:
- echo Build completed on `date`
artifacts:
files:
- hello
hello.go
(in
)(root directory name)
package main
import "fmt"
func main() {
fmt.Println("hello world")
fmt.Println("1+1 =", 1+1)
fmt.Println("7.0/3.0 =", 7.0/3.0)
fmt.Println(true && false)
fmt.Println(true || false)
fmt.Println(!true)
}
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4