token-injectable-docker-builder 1.2.2 → 1.2.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +4 -4
- package/README.md +133 -86
- package/lib/index.js +1 -1
- package/package.json +2 -2
package/.jsii
CHANGED
|
@@ -3860,7 +3860,7 @@
|
|
|
3860
3860
|
"stability": "stable"
|
|
3861
3861
|
},
|
|
3862
3862
|
"homepage": "https://github.com/AlexTech314/TokenInjectableDockerBuilder.git",
|
|
3863
|
-
"jsiiVersion": "5.5.
|
|
3863
|
+
"jsiiVersion": "5.5.12 (build 8b85294)",
|
|
3864
3864
|
"keywords": [
|
|
3865
3865
|
"aws",
|
|
3866
3866
|
"aws-cdk",
|
|
@@ -3898,7 +3898,7 @@
|
|
|
3898
3898
|
},
|
|
3899
3899
|
"name": "token-injectable-docker-builder",
|
|
3900
3900
|
"readme": {
|
|
3901
|
-
"markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n---\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.\n\nFor example, a Next.js frontend Docker image may require an API Gateway URL as an argument to create a reference from the UI to the associated API in a given deployment. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image. As a result, your Next.js frontend can dynamically fetch data from the API Gateway without hardcoding the URL, or needing mutliple sepereate Stacks.\n\n---\n\n## Features\n\n- **Build and Push Docker Images**: Automatically builds and pushes Docker images to ECR.\n- **Token Support**: Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.\n- **Custom Install and Pre-Build Commands**: Allows specifying custom commands to run during the `install` and `pre_build` phases of the CodeBuild build process.\n- **VPC Configuration**: Supports deploying the CodeBuild project within a VPC, with customizable security groups and subnet selection.\n- **Docker Login**: Supports Docker login using credentials stored in AWS Secrets Manager.\n- **ECR Repository Management**: Creates an ECR repository with lifecycle rules and encryption.\n- **Integration with ECS and Lambda**: Provides outputs for use in AWS ECS and AWS Lambda.\n\n---\n\n## Installation\n\n### For NPM\n\nInstall the construct using NPM:\n\n```bash\nnpm install token-injectable-docker-builder\n```\n\n### For Python\n\nInstall the construct using pip:\n\n```bash\npip install token-injectable-docker-builder\n```\n\n---\n\n## Constructor\n\n### `TokenInjectableDockerBuilder`\n\n#### Parameters\n\n- **`scope`**: The construct's parent scope.\n- **`id`**: The construct ID.\n- **`props`**: Configuration properties.\n\n#### Properties in `TokenInjectableDockerBuilderProps`\n\n| Property | Type | Required | Description |\n|--------------------------|-----------------------------|----------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |\n| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. These are transformed into `--build-arg` flags. To use in Dockerfile, leverage the `ARG` keyword. For more details, please see the [official Docker docs](https://docs.docker.com/build/building/variables/). |\n| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |\n| `vpc` | `IVpc` | No | The VPC in which the CodeBuild project will be deployed. If provided, the CodeBuild project will be launched within the specified VPC. |\n| `securityGroups` | `ISecurityGroup[]` | No | The security groups to attach to the CodeBuild project. These should define the network access rules for the CodeBuild project. |\n| `subnetSelection` | `SubnetSelection` | No | The subnet selection to specify which subnets to use within the VPC. Allows the user to select private, public, or isolated subnets. |\n| `installCommands` | `string[]` | No | Custom commands to run during the `install` phase of the CodeBuild build process. Will be executed before Docker image is built. Useful for installing necessary dependencies for running pre-build scripts. |\n| `preBuildCommands` | `string[]` | No | Custom commands to run during the `pre_build` phase of the CodeBuild build process. Will be executed before Docker image is built. Useful for running pre-build scripts, such as to fetch configs. |\n\n---\n\n## Usage Examples\n\n### Simple Usage Example\n\nThis example demonstrates the most basic usage of the `TokenInjectableDockerBuilder`, where you specify the path to your Docker context and provide simple build arguments.\n\n#### TypeScript/NPM Example\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\n\nexport class SimpleStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'SimpleDockerBuilder', {\n path: './docker', // Path to your Dockerfile or Docker context\n buildArgs: {\n ENV: 'production', // Simple build argument\n },\n });\n\n // Use in ECS\n new ecs.ContainerDefinition(this, 'SimpleContainer', {\n image: dockerBuilder.containerImage,\n // ... other container properties ...\n });\n\n // Use in Lambda\n new lambda.Function(this, 'SimpleDockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n#### Python Example\n\n```python\nfrom aws_cdk import (\n aws_ecs as ecs,\n aws_lambda as lambda_,\n core as cdk,\n)\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\n\nclass SimpleStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n docker_builder = TokenInjectableDockerBuilder(self, \"SimpleDockerBuilder\",\n path=\"./docker\", # Path to your Dockerfile or Docker context\n build_args={\n \"ENV\": \"production\", # Simple build argument\n },\n )\n\n # Use in ECS\n ecs.ContainerDefinition(self, \"SimpleContainer\",\n image=docker_builder.container_image,\n # ... other container properties ...\n )\n\n # Use in Lambda\n lambda_.Function(self, \"SimpleDockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n### Advanced Usage Example\n\nThis example demonstrates more advanced usage, including using CDK tokens as build arguments, specifying custom install and pre-build commands, and configuring VPC settings.\n\n#### TypeScript/NPM Example\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as lambda from 'aws-cdk-lib/aws-lambda';\nimport * as ec2 from 'aws-cdk-lib/aws-ec2';\n\nexport class MyStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n // Example VPC and security group (optional)\n const vpc = new ec2.Vpc(this, 'MyVpc');\n const securityGroup = new ec2.SecurityGroup(this, 'MySecurityGroup', {\n vpc,\n });\n\n // Example of using CDK tokens as build arguments\n const myApiGateway = /* ... create or import your API Gateway ... */;\n\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n path: './docker',\n buildArgs: {\n API_URL: myApiGateway.url, // Using CDK token\n ENV: 'production',\n },\n dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',\n vpc,\n securityGroups: [securityGroup],\n subnetSelection: { subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS },\n installCommands: [\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing required packages...\"',\n 'apt-get install -y curl dnsutils',\n ],\n preBuildCommands: [\n 'echo \"Fetching configuration from private API...\"',\n 'curl -o config.json https://api.example.com/config',\n ],\n });\n\n // Use in ECS\n new ecs.ContainerDefinition(this, 'MyContainer', {\n image: dockerBuilder.containerImage,\n // ... other container properties ...\n });\n\n // Use in Lambda\n new lambda.Function(this, 'DockerLambdaFunction', {\n runtime: lambda.Runtime.FROM_IMAGE,\n code: dockerBuilder.dockerImageCode,\n handler: lambda.Handler.FROM_IMAGE,\n });\n }\n}\n```\n\n#### Python Example\n\n```python\nfrom aws_cdk import (\n aws_ec2 as ec2,\n aws_ecs as ecs,\n aws_lambda as lambda_,\n core as cdk,\n)\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\n\nclass MyStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n # Example VPC and security group (optional)\n vpc = ec2.Vpc(self, \"MyVpc\")\n security_group = ec2.SecurityGroup(self, \"MySecurityGroup\", vpc=vpc)\n\n # Example of using CDK tokens as build arguments\n my_api_gateway = # ... create or import your API Gateway ...\n\n docker_builder = TokenInjectableDockerBuilder(self, \"MyDockerBuilder\",\n path=\"./docker\",\n build_args={\n \"API_URL\": my_api_gateway.url, # Using CDK token\n \"ENV\": \"production\"\n },\n docker_login_secret_arn=\"arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret\",\n vpc=vpc,\n security_groups=[security_group],\n subnet_selection=ec2.SubnetSelection(subnet_type=ec2.SubnetType.PRIVATE_WITH_EGRESS),\n install_commands=[\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing required packages...\"',\n 'apt-get install -y curl dnsutils',\n ],\n pre_build_commands=[\n 'echo \"Fetching configuration from private API...\"',\n 'curl -o config.json https://api.example.com/config',\n ],\n )\n\n # Use in ECS\n ecs.ContainerDefinition(self, \"MyContainer\",\n image=docker_builder.container_image,\n # ... other container properties ...\n )\n\n # Use in Lambda\n lambda_.Function(self, \"DockerLambdaFunction\",\n runtime=lambda_.Runtime.FROM_IMAGE,\n code=docker_builder.docker_image_code,\n handler=lambda_.Handler.FROM_IMAGE\n )\n```\n\n---\n\n## How It Works\n\n1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.\n2. **CodeBuild Project**:\n - Uses the packaged asset and `buildArgs` to build the Docker image.\n - Executes any custom `installCommands` and `preBuildCommands` during the build process.\n - Pushes the image to an ECR repository.\n3. **Custom Resource**:\n - Triggers the build process using a Lambda function (`onEvent`).\n - Monitors the build status using another Lambda function (`isComplete`).\n4. **Outputs**:\n - `.containerImage`: Returns the Docker image for ECS.\n - `.dockerImageCode`: Returns the Docker image code for Lambda.\n\n---\n\n## IAM Permissions\n\nThe construct automatically grants permissions for:\n\n- **CodeBuild**:\n - Pull and push images to ECR.\n - Access to AWS Secrets Manager if `dockerLoginSecretArn` is provided.\n - Access to the KMS key for encryption.\n- **Lambda Functions**:\n - Start and monitor CodeBuild builds.\n - Access CloudWatch Logs.\n - Access to the KMS key for encryption.\n - Pull and push images to ECR.\n\n---\n\n## Notes\n\n- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags. CDK tokens can be used to inject dynamic values resolved at deployment time.\n- **Custom Commands**: Use `installCommands` and `preBuildCommands` to run custom shell commands during the build process. This can be useful for installing dependencies or fetching configuration files.\n- **VPC Configuration**: If your build process requires access to resources within a VPC, you can specify the VPC, security groups, and subnet selection.\n- **Docker Login**: If you need to log in to a private Docker registry before building the image, provide the ARN of a secret in AWS Secrets Manager containing the Docker credentials.\n- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules to manage image retention, encryption with a KMS key, and image scanning on push.\n\n---\n\n## Troubleshooting\n\n1. **Build Errors**: Check the CodeBuild logs in CloudWatch Logs for detailed error messages.\n2. **Lambda Errors**: Check the `onEvent` and `isComplete` Lambda function logs in CloudWatch Logs.\n3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, Secrets Manager, and KMS if applicable.\n4. **Network Access**: If the build requires network access (e.g., to download dependencies), ensure that the VPC configuration allows outbound internet access, or use a NAT gateway if in private subnets.\n\n---\n\n## Support\n\nFor issues or feature requests, please open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).\n\n---\n\n## Reference Links\n\n[](https://constructs.dev/packages/token-injectable-docker-builder)\n\n---\n\n# License\n\nThis project is licensed under the terms of the MIT license.\n\n---\n\n# Acknowledgements\n\n- Inspired by the need for more dynamic Docker asset management in AWS CDK.\n- Thanks to the AWS CDK community for their continuous support and contributions.\n\n---\n\nFeel free to reach out if you have any questions or need further assistance!\n"
|
|
3901
|
+
"markdown": "# TokenInjectableDockerBuilder\n\nThe `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.\n\n---\n\n## Why?\n\nAWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.\n\nFor example, a Next.js frontend Docker image may require an API Gateway URL as an argument to create a reference from the UI to the associated API in a given deployment. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image. As a result, your Next.js frontend can dynamically fetch data from the API Gateway without hardcoding the URL or needing multiple separate stacks.\n\n---\n\n## Features\n\n- **Build and Push Docker Images**: Automatically builds and pushes Docker images to ECR.\n- **Token Support**: Supports custom build arguments for Docker builds, including CDK tokens resolved at deployment time.\n- **Custom Install and Pre-Build Commands**: Allows specifying custom commands to run during the `install` and `pre_build` phases of the CodeBuild build process.\n- **VPC Configuration**: Supports deploying the CodeBuild project within a VPC, with customizable security groups and subnet selection.\n- **Docker Login**: Supports Docker login using credentials stored in AWS Secrets Manager.\n- **ECR Repository Management**: Creates an ECR repository with lifecycle rules and encryption.\n- **Integration with ECS and Lambda**: Provides outputs for use in AWS ECS and AWS Lambda.\n\n---\n\n## Installation\n\n### For NPM\n\nInstall the construct using NPM:\n\n```bash\nnpm install token-injectable-docker-builder\n```\n\n### For Python\n\nInstall the construct using pip:\n\n```bash\npip install token-injectable-docker-builder\n```\n\n---\n\n## Constructor\n\n### `TokenInjectableDockerBuilder`\n\n#### Parameters\n\n- **`scope`**: The construct's parent scope.\n- **`id`**: The construct ID.\n- **`props`**: Configuration properties.\n\n#### Properties in `TokenInjectableDockerBuilderProps`\n\n| Property | Type | Required | Description |\n|--------------------------|-----------------------------|----------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |\n| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. These are transformed into `--build-arg` flags. To use in Dockerfile, leverage the `ARG` keyword. For more details, please see the [official Docker docs](https://docs.docker.com/build/building/variables/). |\n| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |\n| `vpc` | `IVpc` | No | The VPC in which the CodeBuild project will be deployed. If provided, the CodeBuild project will be launched within the specified VPC. |\n| `securityGroups` | `ISecurityGroup[]` | No | The security groups to attach to the CodeBuild project. These should define the network access rules for the CodeBuild project. |\n| `subnetSelection` | `SubnetSelection` | No | The subnet selection to specify which subnets to use within the VPC. Allows the user to select private, public, or isolated subnets. |\n| `installCommands` | `string[]` | No | Custom commands to run during the `install` phase of the CodeBuild build process. Will be executed before the Docker image is built. Useful for installing necessary dependencies for running pre-build scripts. |\n| `preBuildCommands` | `string[]` | No | Custom commands to run during the `pre_build` phase of the CodeBuild build process. Will be executed before the Docker image is built. Useful for running pre-build scripts, such as fetching configs. |\n\n---\n\n## Usage Examples\n\n### Simple Usage Example\n\nThis example demonstrates the basic usage of the `TokenInjectableDockerBuilder`, where a Next.js frontend Docker image requires an API Gateway URL as a build argument to create a reference from the UI to the associated API in a given deployment.\n\n#### TypeScript/NPM Example\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as ec2 from 'aws-cdk-lib/aws-ec2';\nimport * as apigateway from 'aws-cdk-lib/aws-apigateway';\n\nexport class SimpleStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n // Create your API Gateway\n const api = new apigateway.RestApi(this, 'MyApiGateway', {\n restApiName: 'MyService',\n });\n\n // Create the Docker builder\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'SimpleDockerBuilder', {\n path: './nextjs-app', // Path to your Next.js app Docker context\n buildArgs: {\n API_URL: api.url, // Pass the API Gateway URL as a build argument\n },\n });\n\n // Use in ECS\n const cluster = new ecs.Cluster(this, 'EcsCluster', {\n vpc: new ec2.Vpc(this, 'Vpc'),\n });\n\n new ecs.FargateService(this, 'FargateService', {\n cluster,\n taskDefinition: new ecs.FargateTaskDefinition(this, 'TaskDef', {\n cpu: 512,\n memoryLimitMiB: 1024,\n }).addContainer('Container', {\n image: dockerBuilder.containerImage,\n logging: ecs.LogDriver.awsLogs({ streamPrefix: 'MyApp' }),\n }),\n });\n }\n}\n```\n\n#### Python Example\n\n```python\nfrom aws_cdk import (\n aws_ecs as ecs,\n aws_ec2 as ec2,\n aws_apigateway as apigateway,\n core as cdk,\n)\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\n\nclass SimpleStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n # Create your API Gateway\n api = apigateway.RestApi(self, \"MyApiGateway\",\n rest_api_name=\"MyService\",\n )\n\n # Create the Docker builder\n docker_builder = TokenInjectableDockerBuilder(self, \"SimpleDockerBuilder\",\n path=\"./nextjs-app\", # Path to your Next.js app Docker context\n build_args={\n \"API_URL\": api.url, # Pass the API Gateway URL as a build argument\n },\n )\n\n # Use in ECS\n vpc = ec2.Vpc(self, \"Vpc\")\n cluster = ecs.Cluster(self, \"EcsCluster\", vpc=vpc)\n\n task_definition = ecs.FargateTaskDefinition(self, \"TaskDef\",\n cpu=512,\n memory_limit_mib=1024,\n )\n\n task_definition.add_container(\"Container\",\n image=docker_builder.container_image,\n logging=ecs.LogDriver.aws_logs(stream_prefix=\"MyApp\"),\n )\n\n ecs.FargateService(self, \"FargateService\",\n cluster=cluster,\n task_definition=task_definition,\n )\n```\n\n---\n\n### Advanced Usage Example\n\nBuilding on the previous example, this advanced usage demonstrates how to include additional configurations, such as fetching private API endpoints and configuration files during the build process.\n\n#### TypeScript/NPM Example\n\n```typescript\nimport * as cdk from 'aws-cdk-lib';\nimport { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';\nimport * as ecs from 'aws-cdk-lib/aws-ecs';\nimport * as ec2 from 'aws-cdk-lib/aws-ec2';\nimport * as apigateway from 'aws-cdk-lib/aws-apigateway';\n\nexport class AdvancedStack extends cdk.Stack {\n constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {\n super(scope, id, props);\n\n // Create your API Gateway\n const api = new apigateway.RestApi(this, 'MyApiGateway', {\n restApiName: 'MyService',\n });\n\n // VPC and Security Group for CodeBuild\n const vpc = new ec2.Vpc(this, 'MyVpc');\n const securityGroup = new ec2.SecurityGroup(this, 'MySecurityGroup', {\n vpc,\n });\n\n // Create the Docker builder with additional pre-build commands\n const dockerBuilder = new TokenInjectableDockerBuilder(this, 'AdvancedDockerBuilder', {\n path: './nextjs-app',\n buildArgs: {\n API_URL: api.url,\n },\n vpc,\n securityGroups: [securityGroup],\n subnetSelection: { subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS },\n installCommands: [\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing necessary packages...\"',\n 'apt-get install -y curl',\n ],\n preBuildCommands: [\n 'echo \"Fetching private API configuration...\"',\n // Replace with your actual command to fetch configs\n 'curl -o config.json https://internal-api.example.com/config',\n ],\n });\n\n // Ensure the CodeBuild project has access to the internal API endpoint\n // You may need to adjust your VPC and security group settings accordingly\n\n // Use in ECS\n const cluster = new ecs.Cluster(this, 'EcsCluster', { vpc });\n\n new ecs.FargateService(this, 'FargateService', {\n cluster,\n taskDefinition: new ecs.FargateTaskDefinition(this, 'TaskDef', {\n cpu: 512,\n memoryLimitMiB: 1024,\n }).addContainer('Container', {\n image: dockerBuilder.containerImage,\n logging: ecs.LogDriver.awsLogs({ streamPrefix: 'MyApp' }),\n }),\n });\n }\n}\n```\n\n#### Python Example\n\n```python\nfrom aws_cdk import (\n aws_ecs as ecs,\n aws_ec2 as ec2,\n aws_apigateway as apigateway,\n core as cdk,\n)\nfrom token_injectable_docker_builder import TokenInjectableDockerBuilder\n\nclass AdvancedStack(cdk.Stack):\n\n def __init__(self, scope: cdk.App, id: str, **kwargs):\n super().__init__(scope, id, **kwargs)\n\n # Create your API Gateway\n api = apigateway.RestApi(self, \"MyApiGateway\",\n rest_api_name=\"MyService\",\n )\n\n # VPC and Security Group for CodeBuild\n vpc = ec2.Vpc(self, \"MyVpc\")\n security_group = ec2.SecurityGroup(self, \"MySecurityGroup\", vpc=vpc)\n\n # Create the Docker builder with additional pre-build commands\n docker_builder = TokenInjectableDockerBuilder(self, \"AdvancedDockerBuilder\",\n path=\"./nextjs-app\",\n build_args={\n \"API_URL\": api.url,\n },\n vpc=vpc,\n security_groups=[security_group],\n subnet_selection=ec2.SubnetSelection(subnet_type=ec2.SubnetType.PRIVATE_WITH_EGRESS),\n install_commands=[\n 'echo \"Updating package lists...\"',\n 'apt-get update -y',\n 'echo \"Installing necessary packages...\"',\n 'apt-get install -y curl',\n ],\n pre_build_commands=[\n 'echo \"Fetching private API configuration...\"',\n # Replace with your actual command to fetch configs\n 'curl -o config.json https://internal-api.example.com/config',\n ],\n )\n\n # Ensure the CodeBuild project has access to the internal API endpoint\n # You may need to adjust your VPC and security group settings accordingly\n\n # Use in ECS\n cluster = ecs.Cluster(self, \"EcsCluster\", vpc=vpc)\n\n task_definition = ecs.FargateTaskDefinition(self, \"TaskDef\",\n cpu=512,\n memory_limit_mib=1024,\n )\n\n task_definition.add_container(\"Container\",\n image=docker_builder.container_image,\n logging=ecs.LogDriver.aws_logs(stream_prefix=\"MyApp\"),\n )\n\n ecs.FargateService(self, \"FargateService\",\n cluster=cluster,\n task_definition=task_definition,\n )\n```\n\nIn this advanced example:\n\n- **VPC Configuration**: The CodeBuild project is configured to run inside a VPC with specified security groups and subnet selection, allowing it to access internal resources such as a private API endpoint.\n- **Custom Install and Pre-Build Commands**: The `installCommands` and `preBuildCommands` properties are used to install necessary packages and fetch configuration files from a private API before building the Docker image.\n- **Access to Internal APIs**: By running inside a VPC and configuring the security groups appropriately, the CodeBuild project can access private endpoints not accessible over the public internet.\n\n---\n\n## How It Works\n\n1. **Docker Source**: Packages the source code or Dockerfile specified in the `path` property as an S3 asset.\n2. **CodeBuild Project**:\n - Uses the packaged asset and `buildArgs` to build the Docker image.\n - Executes any custom `installCommands` and `preBuildCommands` during the build process.\n - Pushes the image to an ECR repository.\n3. **Custom Resource**:\n - Triggers the build process using a Lambda function (`onEvent`).\n - Monitors the build status using another Lambda function (`isComplete`).\n4. **Outputs**:\n - `.containerImage`: Returns the Docker image for ECS.\n - `.dockerImageCode`: Returns the Docker image code for Lambda.\n\n---\n\n## IAM Permissions\n\nThe construct automatically grants permissions for:\n\n- **CodeBuild**:\n - Pull and push images to ECR.\n - Access to AWS Secrets Manager if `dockerLoginSecretArn` is provided.\n - Access to the KMS key for encryption.\n- **Lambda Functions**:\n - Start and monitor CodeBuild builds.\n - Access CloudWatch Logs.\n - Access to the KMS key for encryption.\n - Pull and push images to ECR.\n\n---\n\n## Notes\n\n- **Build Arguments**: Pass custom arguments via `buildArgs` as `--build-arg` flags. CDK tokens can be used to inject dynamic values resolved at deployment time.\n- **Custom Commands**: Use `installCommands` and `preBuildCommands` to run custom shell commands during the build process. This can be useful for installing dependencies or fetching configuration files.\n- **VPC Configuration**: If your build process requires access to resources within a VPC, you can specify the VPC, security groups, and subnet selection.\n- **Docker Login**: If you need to log in to a private Docker registry before building the image, provide the ARN of a secret in AWS Secrets Manager containing the Docker credentials.\n- **ECR Repository**: Automatically creates an ECR repository with lifecycle rules to manage image retention, encryption with a KMS key, and image scanning on push.\n\n---\n\n## Troubleshooting\n\n1. **Build Errors**: Check the CodeBuild logs in CloudWatch Logs for detailed error messages.\n2. **Lambda Errors**: Check the `onEvent` and `isComplete` Lambda function logs in CloudWatch Logs.\n3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, Secrets Manager, and KMS if applicable.\n4. **Network Access**: If the build requires network access (e.g., to download dependencies or access internal APIs), ensure that the VPC configuration allows necessary network connectivity, and adjust security group rules accordingly.\n\n---\n\n## Support\n\nFor issues or feature requests, please open an issue on [GitHub](https://github.com/AlexTech314/TokenInjectableDockerBuilder).\n\n---\n\n## Reference Links\n\n[](https://constructs.dev/packages/token-injectable-docker-builder)\n\n---\n\n## License\n\nThis project is licensed under the terms of the MIT license.\n\n---\n\n## Acknowledgements\n\n- Inspired by the need for more dynamic Docker asset management in AWS CDK.\n- Thanks to the AWS CDK community for their continuous support and contributions.\n\n---\n\nFeel free to reach out if you have any questions or need further assistance!\n\n---"
|
|
3902
3902
|
},
|
|
3903
3903
|
"repository": {
|
|
3904
3904
|
"type": "git",
|
|
@@ -4178,6 +4178,6 @@
|
|
|
4178
4178
|
"symbolId": "src/index:TokenInjectableDockerBuilderProps"
|
|
4179
4179
|
}
|
|
4180
4180
|
},
|
|
4181
|
-
"version": "1.2.
|
|
4182
|
-
"fingerprint": "
|
|
4181
|
+
"version": "1.2.4",
|
|
4182
|
+
"fingerprint": "+FGIzrM5+F+435a0RrTZ9TZ3lsLuC+Y7lhdioQRksCU="
|
|
4183
4183
|
}
|
package/README.md
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
# TokenInjectableDockerBuilder
|
|
2
2
|
|
|
3
|
-
The `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.
|
|
3
|
+
The `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables the usage of AWS CDK tokens in the building, pushing, and deployment of Docker images to Amazon Elastic Container Registry (ECR). It leverages AWS CodeBuild and Lambda custom resources.
|
|
4
4
|
|
|
5
5
|
---
|
|
6
6
|
|
|
@@ -8,7 +8,7 @@ The `TokenInjectableDockerBuilder` is a flexible AWS CDK construct that enables
|
|
|
8
8
|
|
|
9
9
|
AWS CDK already provides mechanisms for creating deployable assets using Docker, such as [DockerImageAsset](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_ecr_assets.DockerImageAsset.html) and [DockerImageCode](https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_lambda.DockerImageCode.html), but these constructs are limited because they cannot accept CDK tokens as build-args. The `TokenInjectableDockerBuilder` allows injecting CDK tokens as build-time arguments into Docker-based assets, enabling more dynamic dependency relationships.
|
|
10
10
|
|
|
11
|
-
For example, a Next.js frontend Docker image may require an API Gateway URL as an argument to create a reference from the UI to the associated API in a given deployment. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image. As a result, your Next.js frontend can dynamically fetch data from the API Gateway without hardcoding the URL
|
|
11
|
+
For example, a Next.js frontend Docker image may require an API Gateway URL as an argument to create a reference from the UI to the associated API in a given deployment. With this construct, you can deploy the API Gateway first, then pass its URL as a build-time argument to the Next.js Docker image. As a result, your Next.js frontend can dynamically fetch data from the API Gateway without hardcoding the URL or needing multiple separate stacks.
|
|
12
12
|
|
|
13
13
|
---
|
|
14
14
|
|
|
@@ -56,16 +56,16 @@ pip install token-injectable-docker-builder
|
|
|
56
56
|
|
|
57
57
|
#### Properties in `TokenInjectableDockerBuilderProps`
|
|
58
58
|
|
|
59
|
-
| Property | Type | Required | Description
|
|
60
|
-
|
|
61
|
-
| `path` | `string` | Yes | The file path to the Dockerfile or source code directory.
|
|
62
|
-
| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. These are transformed into `--build-arg` flags. To use in Dockerfile, leverage the `ARG` keyword. For more details, please see the [official Docker docs](https://docs.docker.com/build/building/variables/).
|
|
63
|
-
| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided.
|
|
64
|
-
| `vpc` | `IVpc` | No | The VPC in which the CodeBuild project will be deployed. If provided, the CodeBuild project will be launched within the specified VPC.
|
|
65
|
-
| `securityGroups` | `ISecurityGroup[]` | No | The security groups to attach to the CodeBuild project. These should define the network access rules for the CodeBuild project.
|
|
66
|
-
| `subnetSelection` | `SubnetSelection` | No | The subnet selection to specify which subnets to use within the VPC. Allows the user to select private, public, or isolated subnets.
|
|
67
|
-
| `installCommands` | `string[]` | No | Custom commands to run during the `install` phase of the CodeBuild build process. Will be executed before Docker image is built. Useful for installing necessary dependencies for running pre-build scripts.
|
|
68
|
-
| `preBuildCommands` | `string[]` | No | Custom commands to run during the `pre_build` phase of the CodeBuild build process. Will be executed before Docker image is built. Useful for running pre-build scripts, such as
|
|
59
|
+
| Property | Type | Required | Description |
|
|
60
|
+
|--------------------------|-----------------------------|----------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
|
61
|
+
| `path` | `string` | Yes | The file path to the Dockerfile or source code directory. |
|
|
62
|
+
| `buildArgs` | `{ [key: string]: string }` | No | Build arguments to pass to the Docker build process. These are transformed into `--build-arg` flags. To use in Dockerfile, leverage the `ARG` keyword. For more details, please see the [official Docker docs](https://docs.docker.com/build/building/variables/). |
|
|
63
|
+
| `dockerLoginSecretArn` | `string` | No | ARN of an AWS Secrets Manager secret for Docker credentials. Skips login if not provided. |
|
|
64
|
+
| `vpc` | `IVpc` | No | The VPC in which the CodeBuild project will be deployed. If provided, the CodeBuild project will be launched within the specified VPC. |
|
|
65
|
+
| `securityGroups` | `ISecurityGroup[]` | No | The security groups to attach to the CodeBuild project. These should define the network access rules for the CodeBuild project. |
|
|
66
|
+
| `subnetSelection` | `SubnetSelection` | No | The subnet selection to specify which subnets to use within the VPC. Allows the user to select private, public, or isolated subnets. |
|
|
67
|
+
| `installCommands` | `string[]` | No | Custom commands to run during the `install` phase of the CodeBuild build process. Will be executed before the Docker image is built. Useful for installing necessary dependencies for running pre-build scripts. |
|
|
68
|
+
| `preBuildCommands` | `string[]` | No | Custom commands to run during the `pre_build` phase of the CodeBuild build process. Will be executed before the Docker image is built. Useful for running pre-build scripts, such as fetching configs. |
|
|
69
69
|
|
|
70
70
|
---
|
|
71
71
|
|
|
@@ -73,7 +73,7 @@ pip install token-injectable-docker-builder
|
|
|
73
73
|
|
|
74
74
|
### Simple Usage Example
|
|
75
75
|
|
|
76
|
-
This example demonstrates the
|
|
76
|
+
This example demonstrates the basic usage of the `TokenInjectableDockerBuilder`, where a Next.js frontend Docker image requires an API Gateway URL as a build argument to create a reference from the UI to the associated API in a given deployment.
|
|
77
77
|
|
|
78
78
|
#### TypeScript/NPM Example
|
|
79
79
|
|
|
@@ -81,30 +81,40 @@ This example demonstrates the most basic usage of the `TokenInjectableDockerBuil
|
|
|
81
81
|
import * as cdk from 'aws-cdk-lib';
|
|
82
82
|
import { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';
|
|
83
83
|
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
84
|
-
import * as
|
|
84
|
+
import * as ec2 from 'aws-cdk-lib/aws-ec2';
|
|
85
|
+
import * as apigateway from 'aws-cdk-lib/aws-apigateway';
|
|
85
86
|
|
|
86
87
|
export class SimpleStack extends cdk.Stack {
|
|
87
88
|
constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
|
|
88
89
|
super(scope, id, props);
|
|
89
90
|
|
|
91
|
+
// Create your API Gateway
|
|
92
|
+
const api = new apigateway.RestApi(this, 'MyApiGateway', {
|
|
93
|
+
restApiName: 'MyService',
|
|
94
|
+
});
|
|
95
|
+
|
|
96
|
+
// Create the Docker builder
|
|
90
97
|
const dockerBuilder = new TokenInjectableDockerBuilder(this, 'SimpleDockerBuilder', {
|
|
91
|
-
path: './
|
|
98
|
+
path: './nextjs-app', // Path to your Next.js app Docker context
|
|
92
99
|
buildArgs: {
|
|
93
|
-
|
|
100
|
+
API_URL: api.url, // Pass the API Gateway URL as a build argument
|
|
94
101
|
},
|
|
95
102
|
});
|
|
96
103
|
|
|
97
104
|
// Use in ECS
|
|
98
|
-
new ecs.
|
|
99
|
-
|
|
100
|
-
// ... other container properties ...
|
|
105
|
+
const cluster = new ecs.Cluster(this, 'EcsCluster', {
|
|
106
|
+
vpc: new ec2.Vpc(this, 'Vpc'),
|
|
101
107
|
});
|
|
102
108
|
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
109
|
+
new ecs.FargateService(this, 'FargateService', {
|
|
110
|
+
cluster,
|
|
111
|
+
taskDefinition: new ecs.FargateTaskDefinition(this, 'TaskDef', {
|
|
112
|
+
cpu: 512,
|
|
113
|
+
memoryLimitMiB: 1024,
|
|
114
|
+
}).addContainer('Container', {
|
|
115
|
+
image: dockerBuilder.containerImage,
|
|
116
|
+
logging: ecs.LogDriver.awsLogs({ streamPrefix: 'MyApp' }),
|
|
117
|
+
}),
|
|
108
118
|
});
|
|
109
119
|
}
|
|
110
120
|
}
|
|
@@ -115,7 +125,8 @@ export class SimpleStack extends cdk.Stack {
|
|
|
115
125
|
```python
|
|
116
126
|
from aws_cdk import (
|
|
117
127
|
aws_ecs as ecs,
|
|
118
|
-
|
|
128
|
+
aws_ec2 as ec2,
|
|
129
|
+
aws_apigateway as apigateway,
|
|
119
130
|
core as cdk,
|
|
120
131
|
)
|
|
121
132
|
from token_injectable_docker_builder import TokenInjectableDockerBuilder
|
|
@@ -125,24 +136,36 @@ class SimpleStack(cdk.Stack):
|
|
|
125
136
|
def __init__(self, scope: cdk.App, id: str, **kwargs):
|
|
126
137
|
super().__init__(scope, id, **kwargs)
|
|
127
138
|
|
|
139
|
+
# Create your API Gateway
|
|
140
|
+
api = apigateway.RestApi(self, "MyApiGateway",
|
|
141
|
+
rest_api_name="MyService",
|
|
142
|
+
)
|
|
143
|
+
|
|
144
|
+
# Create the Docker builder
|
|
128
145
|
docker_builder = TokenInjectableDockerBuilder(self, "SimpleDockerBuilder",
|
|
129
|
-
path="./
|
|
146
|
+
path="./nextjs-app", # Path to your Next.js app Docker context
|
|
130
147
|
build_args={
|
|
131
|
-
"
|
|
148
|
+
"API_URL": api.url, # Pass the API Gateway URL as a build argument
|
|
132
149
|
},
|
|
133
150
|
)
|
|
134
151
|
|
|
135
152
|
# Use in ECS
|
|
136
|
-
|
|
153
|
+
vpc = ec2.Vpc(self, "Vpc")
|
|
154
|
+
cluster = ecs.Cluster(self, "EcsCluster", vpc=vpc)
|
|
155
|
+
|
|
156
|
+
task_definition = ecs.FargateTaskDefinition(self, "TaskDef",
|
|
157
|
+
cpu=512,
|
|
158
|
+
memory_limit_mib=1024,
|
|
159
|
+
)
|
|
160
|
+
|
|
161
|
+
task_definition.add_container("Container",
|
|
137
162
|
image=docker_builder.container_image,
|
|
138
|
-
|
|
163
|
+
logging=ecs.LogDriver.aws_logs(stream_prefix="MyApp"),
|
|
139
164
|
)
|
|
140
165
|
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
code=docker_builder.docker_image_code,
|
|
145
|
-
handler=lambda_.Handler.FROM_IMAGE
|
|
166
|
+
ecs.FargateService(self, "FargateService",
|
|
167
|
+
cluster=cluster,
|
|
168
|
+
task_definition=task_definition,
|
|
146
169
|
)
|
|
147
170
|
```
|
|
148
171
|
|
|
@@ -150,7 +173,7 @@ class SimpleStack(cdk.Stack):
|
|
|
150
173
|
|
|
151
174
|
### Advanced Usage Example
|
|
152
175
|
|
|
153
|
-
|
|
176
|
+
Building on the previous example, this advanced usage demonstrates how to include additional configurations, such as fetching private API endpoints and configuration files during the build process.
|
|
154
177
|
|
|
155
178
|
#### TypeScript/NPM Example
|
|
156
179
|
|
|
@@ -158,55 +181,61 @@ This example demonstrates more advanced usage, including using CDK tokens as bui
|
|
|
158
181
|
import * as cdk from 'aws-cdk-lib';
|
|
159
182
|
import { TokenInjectableDockerBuilder } from 'token-injectable-docker-builder';
|
|
160
183
|
import * as ecs from 'aws-cdk-lib/aws-ecs';
|
|
161
|
-
import * as lambda from 'aws-cdk-lib/aws-lambda';
|
|
162
184
|
import * as ec2 from 'aws-cdk-lib/aws-ec2';
|
|
185
|
+
import * as apigateway from 'aws-cdk-lib/aws-apigateway';
|
|
163
186
|
|
|
164
|
-
export class
|
|
187
|
+
export class AdvancedStack extends cdk.Stack {
|
|
165
188
|
constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
|
|
166
189
|
super(scope, id, props);
|
|
167
190
|
|
|
168
|
-
//
|
|
191
|
+
// Create your API Gateway
|
|
192
|
+
const api = new apigateway.RestApi(this, 'MyApiGateway', {
|
|
193
|
+
restApiName: 'MyService',
|
|
194
|
+
});
|
|
195
|
+
|
|
196
|
+
// VPC and Security Group for CodeBuild
|
|
169
197
|
const vpc = new ec2.Vpc(this, 'MyVpc');
|
|
170
198
|
const securityGroup = new ec2.SecurityGroup(this, 'MySecurityGroup', {
|
|
171
199
|
vpc,
|
|
172
200
|
});
|
|
173
201
|
|
|
174
|
-
//
|
|
175
|
-
const
|
|
176
|
-
|
|
177
|
-
const dockerBuilder = new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {
|
|
178
|
-
path: './docker',
|
|
202
|
+
// Create the Docker builder with additional pre-build commands
|
|
203
|
+
const dockerBuilder = new TokenInjectableDockerBuilder(this, 'AdvancedDockerBuilder', {
|
|
204
|
+
path: './nextjs-app',
|
|
179
205
|
buildArgs: {
|
|
180
|
-
API_URL:
|
|
181
|
-
ENV: 'production',
|
|
206
|
+
API_URL: api.url,
|
|
182
207
|
},
|
|
183
|
-
dockerLoginSecretArn: 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret',
|
|
184
208
|
vpc,
|
|
185
209
|
securityGroups: [securityGroup],
|
|
186
210
|
subnetSelection: { subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS },
|
|
187
211
|
installCommands: [
|
|
188
212
|
'echo "Updating package lists..."',
|
|
189
213
|
'apt-get update -y',
|
|
190
|
-
'echo "Installing
|
|
191
|
-
'apt-get install -y curl
|
|
214
|
+
'echo "Installing necessary packages..."',
|
|
215
|
+
'apt-get install -y curl',
|
|
192
216
|
],
|
|
193
217
|
preBuildCommands: [
|
|
194
|
-
'echo "Fetching
|
|
195
|
-
|
|
218
|
+
'echo "Fetching private API configuration..."',
|
|
219
|
+
// Replace with your actual command to fetch configs
|
|
220
|
+
'curl -o config.json https://internal-api.example.com/config',
|
|
196
221
|
],
|
|
197
222
|
});
|
|
198
223
|
|
|
199
|
-
//
|
|
200
|
-
|
|
201
|
-
image: dockerBuilder.containerImage,
|
|
202
|
-
// ... other container properties ...
|
|
203
|
-
});
|
|
224
|
+
// Ensure the CodeBuild project has access to the internal API endpoint
|
|
225
|
+
// You may need to adjust your VPC and security group settings accordingly
|
|
204
226
|
|
|
205
|
-
// Use in
|
|
206
|
-
new
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
|
|
227
|
+
// Use in ECS
|
|
228
|
+
const cluster = new ecs.Cluster(this, 'EcsCluster', { vpc });
|
|
229
|
+
|
|
230
|
+
new ecs.FargateService(this, 'FargateService', {
|
|
231
|
+
cluster,
|
|
232
|
+
taskDefinition: new ecs.FargateTaskDefinition(this, 'TaskDef', {
|
|
233
|
+
cpu: 512,
|
|
234
|
+
memoryLimitMiB: 1024,
|
|
235
|
+
}).addContainer('Container', {
|
|
236
|
+
image: dockerBuilder.containerImage,
|
|
237
|
+
logging: ecs.LogDriver.awsLogs({ streamPrefix: 'MyApp' }),
|
|
238
|
+
}),
|
|
210
239
|
});
|
|
211
240
|
}
|
|
212
241
|
}
|
|
@@ -216,61 +245,77 @@ export class MyStack extends cdk.Stack {
|
|
|
216
245
|
|
|
217
246
|
```python
|
|
218
247
|
from aws_cdk import (
|
|
219
|
-
aws_ec2 as ec2,
|
|
220
248
|
aws_ecs as ecs,
|
|
221
|
-
|
|
249
|
+
aws_ec2 as ec2,
|
|
250
|
+
aws_apigateway as apigateway,
|
|
222
251
|
core as cdk,
|
|
223
252
|
)
|
|
224
253
|
from token_injectable_docker_builder import TokenInjectableDockerBuilder
|
|
225
254
|
|
|
226
|
-
class
|
|
255
|
+
class AdvancedStack(cdk.Stack):
|
|
227
256
|
|
|
228
257
|
def __init__(self, scope: cdk.App, id: str, **kwargs):
|
|
229
258
|
super().__init__(scope, id, **kwargs)
|
|
230
259
|
|
|
231
|
-
#
|
|
260
|
+
# Create your API Gateway
|
|
261
|
+
api = apigateway.RestApi(self, "MyApiGateway",
|
|
262
|
+
rest_api_name="MyService",
|
|
263
|
+
)
|
|
264
|
+
|
|
265
|
+
# VPC and Security Group for CodeBuild
|
|
232
266
|
vpc = ec2.Vpc(self, "MyVpc")
|
|
233
267
|
security_group = ec2.SecurityGroup(self, "MySecurityGroup", vpc=vpc)
|
|
234
268
|
|
|
235
|
-
#
|
|
236
|
-
|
|
237
|
-
|
|
238
|
-
docker_builder = TokenInjectableDockerBuilder(self, "MyDockerBuilder",
|
|
239
|
-
path="./docker",
|
|
269
|
+
# Create the Docker builder with additional pre-build commands
|
|
270
|
+
docker_builder = TokenInjectableDockerBuilder(self, "AdvancedDockerBuilder",
|
|
271
|
+
path="./nextjs-app",
|
|
240
272
|
build_args={
|
|
241
|
-
"API_URL":
|
|
242
|
-
"ENV": "production"
|
|
273
|
+
"API_URL": api.url,
|
|
243
274
|
},
|
|
244
|
-
docker_login_secret_arn="arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret",
|
|
245
275
|
vpc=vpc,
|
|
246
276
|
security_groups=[security_group],
|
|
247
277
|
subnet_selection=ec2.SubnetSelection(subnet_type=ec2.SubnetType.PRIVATE_WITH_EGRESS),
|
|
248
278
|
install_commands=[
|
|
249
279
|
'echo "Updating package lists..."',
|
|
250
280
|
'apt-get update -y',
|
|
251
|
-
'echo "Installing
|
|
252
|
-
'apt-get install -y curl
|
|
281
|
+
'echo "Installing necessary packages..."',
|
|
282
|
+
'apt-get install -y curl',
|
|
253
283
|
],
|
|
254
284
|
pre_build_commands=[
|
|
255
|
-
'echo "Fetching
|
|
256
|
-
|
|
285
|
+
'echo "Fetching private API configuration..."',
|
|
286
|
+
# Replace with your actual command to fetch configs
|
|
287
|
+
'curl -o config.json https://internal-api.example.com/config',
|
|
257
288
|
],
|
|
258
289
|
)
|
|
259
290
|
|
|
291
|
+
# Ensure the CodeBuild project has access to the internal API endpoint
|
|
292
|
+
# You may need to adjust your VPC and security group settings accordingly
|
|
293
|
+
|
|
260
294
|
# Use in ECS
|
|
261
|
-
ecs.
|
|
295
|
+
cluster = ecs.Cluster(self, "EcsCluster", vpc=vpc)
|
|
296
|
+
|
|
297
|
+
task_definition = ecs.FargateTaskDefinition(self, "TaskDef",
|
|
298
|
+
cpu=512,
|
|
299
|
+
memory_limit_mib=1024,
|
|
300
|
+
)
|
|
301
|
+
|
|
302
|
+
task_definition.add_container("Container",
|
|
262
303
|
image=docker_builder.container_image,
|
|
263
|
-
|
|
304
|
+
logging=ecs.LogDriver.aws_logs(stream_prefix="MyApp"),
|
|
264
305
|
)
|
|
265
306
|
|
|
266
|
-
|
|
267
|
-
|
|
268
|
-
|
|
269
|
-
code=docker_builder.docker_image_code,
|
|
270
|
-
handler=lambda_.Handler.FROM_IMAGE
|
|
307
|
+
ecs.FargateService(self, "FargateService",
|
|
308
|
+
cluster=cluster,
|
|
309
|
+
task_definition=task_definition,
|
|
271
310
|
)
|
|
272
311
|
```
|
|
273
312
|
|
|
313
|
+
In this advanced example:
|
|
314
|
+
|
|
315
|
+
- **VPC Configuration**: The CodeBuild project is configured to run inside a VPC with specified security groups and subnet selection, allowing it to access internal resources such as a private API endpoint.
|
|
316
|
+
- **Custom Install and Pre-Build Commands**: The `installCommands` and `preBuildCommands` properties are used to install necessary packages and fetch configuration files from a private API before building the Docker image.
|
|
317
|
+
- **Access to Internal APIs**: By running inside a VPC and configuring the security groups appropriately, the CodeBuild project can access private endpoints not accessible over the public internet.
|
|
318
|
+
|
|
274
319
|
---
|
|
275
320
|
|
|
276
321
|
## How It Works
|
|
@@ -320,7 +365,7 @@ The construct automatically grants permissions for:
|
|
|
320
365
|
1. **Build Errors**: Check the CodeBuild logs in CloudWatch Logs for detailed error messages.
|
|
321
366
|
2. **Lambda Errors**: Check the `onEvent` and `isComplete` Lambda function logs in CloudWatch Logs.
|
|
322
367
|
3. **Permissions**: Ensure IAM roles have the required permissions for CodeBuild, ECR, Secrets Manager, and KMS if applicable.
|
|
323
|
-
4. **Network Access**: If the build requires network access (e.g., to download dependencies), ensure that the VPC configuration allows
|
|
368
|
+
4. **Network Access**: If the build requires network access (e.g., to download dependencies or access internal APIs), ensure that the VPC configuration allows necessary network connectivity, and adjust security group rules accordingly.
|
|
324
369
|
|
|
325
370
|
---
|
|
326
371
|
|
|
@@ -336,13 +381,13 @@ For issues or feature requests, please open an issue on [GitHub](https://github.
|
|
|
336
381
|
|
|
337
382
|
---
|
|
338
383
|
|
|
339
|
-
|
|
384
|
+
## License
|
|
340
385
|
|
|
341
386
|
This project is licensed under the terms of the MIT license.
|
|
342
387
|
|
|
343
388
|
---
|
|
344
389
|
|
|
345
|
-
|
|
390
|
+
## Acknowledgements
|
|
346
391
|
|
|
347
392
|
- Inspired by the need for more dynamic Docker asset management in AWS CDK.
|
|
348
393
|
- Thanks to the AWS CDK community for their continuous support and contributions.
|
|
@@ -350,3 +395,5 @@ This project is licensed under the terms of the MIT license.
|
|
|
350
395
|
---
|
|
351
396
|
|
|
352
397
|
Feel free to reach out if you have any questions or need further assistance!
|
|
398
|
+
|
|
399
|
+
---
|
package/lib/index.js
CHANGED
|
@@ -185,5 +185,5 @@ class TokenInjectableDockerBuilder extends constructs_1.Construct {
|
|
|
185
185
|
}
|
|
186
186
|
exports.TokenInjectableDockerBuilder = TokenInjectableDockerBuilder;
|
|
187
187
|
_a = JSII_RTTI_SYMBOL_1;
|
|
188
|
-
TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.2.
|
|
188
|
+
TokenInjectableDockerBuilder[_a] = { fqn: "token-injectable-docker-builder.TokenInjectableDockerBuilder", version: "1.2.4" };
|
|
189
189
|
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,iCAAiC;AACjC,6BAA6B;AAC7B,6CAAuD;AACvD,6DAAwF;AAExF,iDAAkF;AAClF,iDAAqD;AACrD,iDAAsD;AACtD,iDAA0C;AAC1C,uDAAkF;AAClF,6DAAkD;AAClD,mEAAwD;AACxD,2CAAuC;AAsGvC;;GAEG;AACH,MAAa,4BAA6B,SAAQ,sBAAS;IAKzD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwC;QAChF,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,MAAM,EACJ,IAAI,EAAE,UAAU,EAChB,SAAS,EACT,oBAAoB,EACpB,GAAG,EACH,cAAc,EACd,eAAe,EACf,eAAe,EACf,gBAAgB,GACjB,GAAG,KAAK,CAAC;QAEV,sCAAsC;QACtC,MAAM,aAAa,GAAG,IAAI,aAAG,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACtD,iBAAiB,EAAE,IAAI;SACxB,CAAC,CAAC;QAEH,wFAAwF;QACxF,IAAI,CAAC,aAAa,GAAG,IAAI,oBAAU,CAAC,IAAI,EAAE,eAAe,EAAE;YACzD,cAAc,EAAE;gBACd;oBACE,YAAY,EAAE,CAAC;oBACf,WAAW,EAAE,oCAAoC;oBACjD,SAAS,EAAE,mBAAS,CAAC,QAAQ;oBAC7B,WAAW,EAAE,sBAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;iBAC9B;aACF;YACD,UAAU,EAAE,8BAAoB,CAAC,GAAG;YACpC,aAAa,EAAE,aAAa;YAC5B,eAAe,EAAE,IAAI;SACtB,CAAC,CAAC;QAEH,sCAAsC;QACtC,MAAM,WAAW,GAAG,IAAI,qBAAK,CAAC,IAAI,EAAE,aAAa,EAAE;YACjD,IAAI,EAAE,UAAU;SACjB,CAAC,CAAC;QAEH,6DAA6D;QAC7D,MAAM,eAAe,GAAG,SAAS;YAC/B,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC;iBACxB,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,eAAe,GAAG,IAAI,KAAK,EAAE,CAAC;iBACpD,IAAI,CAAC,GAAG,CAAC;YACZ,CAAC,CAAC,EAAE,CAAC;QAEP,uCAAuC;QACvC,MAAM,mBAAmB,GAAG,oBAAoB;YAC9C,CAAC,CAAC;gBACA,8DAA8D;gBAC9D,qEAAqE,oBAAoB,wDAAwD;gBACjJ,qEAAqE,oBAAoB,wDAAwD;gBACjJ,gCAAgC;gBAChC,mFAAmF;aACpF;YACD,CAAC,CAAC,CAAC,6DAA6D,CAAC,CAAC;QAEpE,6BAA6B;QAC7B,MAAM,gBAAgB,GAAG,IAAI,uBAAO,CAAC,IAAI,EAAE,oBAAoB,EAAE;YAC/D,MAAM,EAAE,sBAAM,CAAC,EAAE,CAAC;gBAChB,MAAM,EAAE,WAAW,CAAC,MAAM;gBAC1B,IAAI,EAAE,WAAW,CAAC,WAAW;aAC9B,CAAC;YACF,WAAW,EAAE;gBACX,UAAU,EAAE,+BAAe,CAAC,YAAY;gBACxC,UAAU,EAAE,IAAI;aACjB;YACD,oBAAoB,EAAE;gBACpB,YAAY,EAAE,EAAE,KAAK,EAAE,IAAI,CAAC,aAAa,CAAC,aAAa,EAAE;gBACzD,UAAU,EAAE,EAAE,KAAK,EAAE,eAAe,EAAE;gBACtC,6DAA6D;gBAC7D,GAAG,CAAC,SAAS;oBACX,MAAM,CAAC,WAAW,CAChB,MAAM,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC,GAAG,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC,CAClE,CAAC;aACL;YACD,GAAG;YACH,cAAc;YACd,eAAe;YACf,SAAS,EAAE,yBAAS,CAAC,UAAU,CAAC;gBAC9B,OAAO,EAAE,KAAK;gBACd,MAAM,EAAE;oBACN,OAAO,EAAE;wBACP,QAAQ,EAAE;4BACR,mCAAmC;4BACnC,GAAG,CAAC,eAAe,IAAI,EAAE,CAAC;yBAC3B;qBACF;oBACD,SAAS,EAAE;wBACT,QAAQ,EAAE;4BACR,GAAG,CAAC,gBAAgB,IAAI,EAAE,CAAC;4BAC3B,GAAG,mBAAmB;4BACtB,qCAAqC;4BACrC,gFAAgF;4BAChF,oCAAoC;4BACpC,8JAA8J;yBAC/J;qBACF;oBACD,KAAK,EAAE;wBACL,QAAQ,EAAE;4BACR,gDAAgD;4BAChD,qEAAqE;yBACtE;qBACF;oBACD,UAAU,EAAE;wBACV,QAAQ,EAAE;4BACR,oDAAoD;4BACpD,kCAAkC;yBACnC;qBACF;iBACF;aACF,CAAC;SACH,CAAC,CAAC;QAEH,iCAAiC;QACjC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAEnD,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,4BAA4B;gBAC5B,iCAAiC;aAClC;YACD,SAAS,EAAE,CAAC,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC;SAC9C,CAAC,CACH,CAAC;QAEF,IAAI,oBAAoB,EAAE,CAAC;YACzB,gBAAgB,CAAC,IAAK,CAAC,oBAAoB,CACzC,IAAI,yBAAe,CAAC;gBAClB,OAAO,EAAE,CAAC,+BAA+B,CAAC;gBAC1C,SAAS,EAAE,CAAC,oBAAoB,CAAC;aAClC,CAAC,CACH,CAAC;QACJ,CAAC;QAED,wCAAwC;QACxC,aAAa,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,IAAK,CAAC,CAAC;QAE1D,8DAA8D;QAC9D,MAAM,sBAAsB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC1E,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;YAC3D,OAAO,EAAE,iBAAiB;YAC1B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,sBAAsB,CAAC,eAAe,CACpC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE,CAAC,sBAAsB,CAAC;YACjC,SAAS,EAAE,CAAC,gBAAgB,CAAC,UAAU,CAAC,EAAE,+BAA+B;SAC1E,CAAC,CACH,CAAC;QAEF,MAAM,yBAAyB,GAAG,IAAI,qBAAQ,CAAC,IAAI,EAAE,2BAA2B,EAAE;YAChF,OAAO,EAAE,oBAAO,CAAC,WAAW;YAC5B,IAAI,EAAE,iBAAI,CAAC,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC9D,OAAO,EAAE,oBAAoB;YAC7B,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SAC9B,CAAC,CAAC;QAEH,yBAAyB,CAAC,eAAe,CACvC,IAAI,yBAAe,CAAC;YAClB,OAAO,EAAE;gBACP,0BAA0B;gBAC1B,gCAAgC;gBAChC,mBAAmB;gBACnB,yBAAyB;gBACzB,wBAAwB;aACzB;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,mDAAmD;QACnD,aAAa,CAAC,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;QAC1D,aAAa,CAAC,mBAAmB,CAAC,yBAAyB,CAAC,CAAC;QAC7D,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,sBAAsB,CAAC,CAAC;QACzD,IAAI,CAAC,aAAa,CAAC,aAAa,CAAC,yBAAyB,CAAC,CAAC;QAE5D,oCAAoC;QACpC,MAAM,QAAQ,GAAG,IAAI,2BAAQ,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC5D,cAAc,EAAE,sBAAsB;YACtC,iBAAiB,EAAE,yBAAyB;YAC5C,aAAa,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;SACpC,CAAC,CAAC;QAEH,6BAA6B;QAC7B,MAAM,oBAAoB,GAAG,IAAI,4BAAc,CAAC,IAAI,EAAE,sBAAsB,EAAE;YAC5E,YAAY,EAAE,QAAQ,CAAC,YAAY;YACnC,UAAU,EAAE;gBACV,WAAW,EAAE,gBAAgB,CAAC,WAAW;gBACzC,OAAO,EAAE,MAAM,CAAC,UAAU,EAAE;aAC7B;SACF,CAAC,CAAC;QAEH,oBAAoB,CAAC,IAAI,CAAC,aAAa,CAAC,gBAAgB,CAAC,CAAC;QAC1D,IAAI,CAAC,cAAc,GAAG,wBAAc,CAAC,iBAAiB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC3E,IAAI,CAAC,eAAe,GAAG,4BAAe,CAAC,OAAO,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;IACrE,CAAC;;AA7MH,oEA8MC","sourcesContent":["import * as crypto from 'crypto';\nimport * as path from 'path';\nimport { CustomResource, Duration } from 'aws-cdk-lib';\nimport { Project, Source, LinuxBuildImage, BuildSpec } from 'aws-cdk-lib/aws-codebuild';\nimport { IVpc, ISecurityGroup, SubnetSelection } from 'aws-cdk-lib/aws-ec2';\nimport { Repository, RepositoryEncryption, TagStatus } from 'aws-cdk-lib/aws-ecr';\nimport { ContainerImage } from 'aws-cdk-lib/aws-ecs';\nimport { PolicyStatement } from 'aws-cdk-lib/aws-iam';\nimport { Key } from 'aws-cdk-lib/aws-kms';\nimport { Runtime, Code, DockerImageCode, Function } from 'aws-cdk-lib/aws-lambda';\nimport { Asset } from 'aws-cdk-lib/aws-s3-assets';\nimport { Provider } from 'aws-cdk-lib/custom-resources';\nimport { Construct } from 'constructs';\n\n/**\n * Properties for the `TokenInjectableDockerBuilder` construct.\n */\nexport interface TokenInjectableDockerBuilderProps {\n  /**\n   * The path to the directory containing the Dockerfile or source code.\n   */\n  readonly path: string;\n\n  /**\n   * Build arguments to pass to the Docker build process.\n   * These are transformed into `--build-arg` flags.\n   * @example\n   * {\n   *   TOKEN: 'my-secret-token',\n   *   ENV: 'production'\n   * }\n   */\n  readonly buildArgs?: { [key: string]: string };\n\n  /**\n   * The ARN of the AWS Secrets Manager secret containing Docker login credentials.\n   * This secret should store a JSON object with the following structure:\n   * ```json\n   * {\n   *   \"username\": \"my-docker-username\",\n   *   \"password\": \"my-docker-password\"\n   * }\n   * ```\n   * If not provided, the construct will skip Docker login during the build process.\n   *\n   * @example 'arn:aws:secretsmanager:us-east-1:123456789012:secret:DockerLoginSecret'\n   */\n  readonly dockerLoginSecretArn?: string;\n\n  /**\n   * The VPC in which the CodeBuild project will be deployed.\n   * If provided, the CodeBuild project will be launched within the specified VPC.\n   * @default No VPC is attached, and the CodeBuild project will use public internet.\n   */\n  readonly vpc?: IVpc;\n\n  /**\n   * The security groups to attach to the CodeBuild project.\n   * These should define the network access rules for the CodeBuild project.\n   * @default No security groups are attached.\n   */\n  readonly securityGroups?: ISecurityGroup[];\n\n  /**\n   * The subnet selection to specify which subnets to use within the VPC.\n   * Allows the user to select private, public, or isolated subnets.\n   * @default All subnets in the VPC are used.\n   */\n  readonly subnetSelection?: SubnetSelection;\n\n  /**\n   * Custom commands to run during the install phase.\n   *\n   * **Example Usage:**\n   * ```typescript\n   * new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n   *   path: path.resolve(__dirname, '../app'),\n   *   installCommands: [\n   *     'echo \"Updating package lists...\"',\n   *     'apt-get update -y',\n   *     'echo \"Installing required packages...\"',\n   *     'apt-get install -y curl dnsutils',\n   *   ],\n   *   // ... other properties ...\n   * });\n   * ```\n   * *This example demonstrates how to install the `curl` and `dnsutils` packages during the install phase using `apt-get`, the package manager for Ubuntu-based CodeBuild environments.*\n   *\n   * @default - No additional install commands.\n   */\n  readonly installCommands?: string[];\n\n\n  /**\n   * Custom commands to run during the pre_build phase.\n   *\n   * **Example Usage:**\n   * ```typescript\n   * new TokenInjectableDockerBuilder(this, 'MyDockerBuilder', {\n   *   path: path.resolve(__dirname, '../app'),\n   *   preBuildCommands: [\n   *     'echo \"Fetching configuration from private API...\"',\n   *     'curl -o config.json https://api.example.com/config',\n   *   ],\n   *   // ... other properties ...\n   * });\n   * ```\n   * *In this example, the builder fetches a configuration file from a private API before starting the Docker build. This config file will be available in the same directory as your Dockerfile during CDK deployment.*\n   *\n   * @default - No additional pre-build commands.\n   */\n  readonly preBuildCommands?: string[];\n}\n\n/**\n * A CDK construct to build and push Docker images to an ECR repository using CodeBuild and Lambda custom resources.\n */\nexport class TokenInjectableDockerBuilder extends Construct {\n  private readonly ecrRepository: Repository;\n  public readonly containerImage: ContainerImage;\n  public readonly dockerImageCode: DockerImageCode;\n\n  constructor(scope: Construct, id: string, props: TokenInjectableDockerBuilderProps) {\n    super(scope, id);\n\n    const {\n      path: sourcePath,\n      buildArgs,\n      dockerLoginSecretArn,\n      vpc,\n      securityGroups,\n      subnetSelection,\n      installCommands,\n      preBuildCommands,\n    } = props;\n\n    // Define a KMS key for ECR encryption\n    const encryptionKey = new Key(this, 'EcrEncryptionKey', {\n      enableKeyRotation: true,\n    });\n\n    // Create an ECR repository with lifecycle rules, encryption, and image scanning enabled\n    this.ecrRepository = new Repository(this, 'ECRRepository', {\n      lifecycleRules: [\n        {\n          rulePriority: 1,\n          description: 'Remove untagged images after 1 day',\n          tagStatus: TagStatus.UNTAGGED,\n          maxImageAge: Duration.days(1),\n        },\n      ],\n      encryption: RepositoryEncryption.KMS,\n      encryptionKey: encryptionKey,\n      imageScanOnPush: true,\n    });\n\n    // Package the source code as an asset\n    const sourceAsset = new Asset(this, 'SourceAsset', {\n      path: sourcePath,\n    });\n\n    // Transform buildArgs into a string of --build-arg KEY=VALUE\n    const buildArgsString = buildArgs\n      ? Object.entries(buildArgs)\n        .map(([key, value]) => `--build-arg ${key}=${value}`)\n        .join(' ')\n      : '';\n\n    // Conditional Dockerhub login commands\n    const dockerLoginCommands = dockerLoginSecretArn\n      ? [\n        'echo \"Retrieving Docker credentials from Secrets Manager...\"',\n        `DOCKER_USERNAME=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .username)`,\n        `DOCKER_PASSWORD=$(aws secretsmanager get-secret-value --secret-id ${dockerLoginSecretArn} --query SecretString --output text | jq -r .password)`,\n        'echo \"Logging in to Docker...\"',\n        'echo $DOCKER_PASSWORD | docker login --username $DOCKER_USERNAME --password-stdin',\n      ]\n      : ['echo \"No Docker credentials provided. Skipping login step.\"'];\n\n    // Create a CodeBuild project\n    const codeBuildProject = new Project(this, 'UICodeBuildProject', {\n      source: Source.s3({\n        bucket: sourceAsset.bucket,\n        path: sourceAsset.s3ObjectKey,\n      }),\n      environment: {\n        buildImage: LinuxBuildImage.STANDARD_7_0,\n        privileged: true,\n      },\n      environmentVariables: {\n        ECR_REPO_URI: { value: this.ecrRepository.repositoryUri },\n        BUILD_ARGS: { value: buildArgsString },\n        // Include build arguments as environment variables if needed\n        ...(buildArgs &&\n          Object.fromEntries(\n            Object.entries(buildArgs).map(([key, value]) => [key, { value }]),\n          )),\n      },\n      vpc,\n      securityGroups,\n      subnetSelection,\n      buildSpec: BuildSpec.fromObject({\n        version: '0.2',\n        phases: {\n          install: {\n            commands: [\n              'echo \"Beginning install phase...\"',\n              ...(installCommands || []),\n            ],\n          },\n          pre_build: {\n            commands: [\n              ...(preBuildCommands || []),\n              ...dockerLoginCommands,\n              'echo \"Retrieving AWS Account ID...\"',\n              'export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)',\n              'echo \"Logging in to Amazon ECR...\"',\n              'aws ecr get-login-password --region $AWS_DEFAULT_REGION | docker login --username AWS --password-stdin $ACCOUNT_ID.dkr.ecr.$AWS_DEFAULT_REGION.amazonaws.com',\n            ],\n          },\n          build: {\n            commands: [\n              'echo Build phase: Building the Docker image...',\n              'docker build $BUILD_ARGS -t $ECR_REPO_URI:latest $CODEBUILD_SRC_DIR',\n            ],\n          },\n          post_build: {\n            commands: [\n              'echo Post-build phase: Pushing the Docker image...',\n              'docker push $ECR_REPO_URI:latest',\n            ],\n          },\n        },\n      }),\n    });\n\n    // Grant permissions to CodeBuild\n    this.ecrRepository.grantPullPush(codeBuildProject);\n\n    codeBuildProject.role!.addToPrincipalPolicy(\n      new PolicyStatement({\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:BatchCheckLayerAvailability',\n        ],\n        resources: [this.ecrRepository.repositoryArn],\n      }),\n    );\n\n    if (dockerLoginSecretArn) {\n      codeBuildProject.role!.addToPrincipalPolicy(\n        new PolicyStatement({\n          actions: ['secretsmanager:GetSecretValue'],\n          resources: [dockerLoginSecretArn],\n        }),\n      );\n    }\n\n    // Grant CodeBuild access to the KMS key\n    encryptionKey.grantEncryptDecrypt(codeBuildProject.role!);\n\n    // Create Lambda functions for onEvent and isComplete handlers\n    const onEventHandlerFunction = new Function(this, 'OnEventHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../onEvent')),\n      handler: 'onEvent.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    onEventHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: ['codebuild:StartBuild'],\n        resources: [codeBuildProject.projectArn], // Restrict to specific project\n      }),\n    );\n\n    const isCompleteHandlerFunction = new Function(this, 'IsCompleteHandlerFunction', {\n      runtime: Runtime.NODEJS_18_X,\n      code: Code.fromAsset(path.resolve(__dirname, '../isComplete')),\n      handler: 'isComplete.handler',\n      timeout: Duration.minutes(15),\n    });\n\n    isCompleteHandlerFunction.addToRolePolicy(\n      new PolicyStatement({\n        actions: [\n          'codebuild:BatchGetBuilds',\n          'codebuild:ListBuildsForProject',\n          'logs:GetLogEvents',\n          'logs:DescribeLogStreams',\n          'logs:DescribeLogGroups',\n        ],\n        resources: ['*'],\n      }),\n    );\n\n    // Grant Lambda functions access to KMS key and ECR\n    encryptionKey.grantEncryptDecrypt(onEventHandlerFunction);\n    encryptionKey.grantEncryptDecrypt(isCompleteHandlerFunction);\n    this.ecrRepository.grantPullPush(onEventHandlerFunction);\n    this.ecrRepository.grantPullPush(isCompleteHandlerFunction);\n\n    // Create a custom resource provider\n    const provider = new Provider(this, 'CustomResourceProvider', {\n      onEventHandler: onEventHandlerFunction,\n      isCompleteHandler: isCompleteHandlerFunction,\n      queryInterval: Duration.seconds(30),\n    });\n\n    // Define the custom resource\n    const buildTriggerResource = new CustomResource(this, 'BuildTriggerResource', {\n      serviceToken: provider.serviceToken,\n      properties: {\n        ProjectName: codeBuildProject.projectName,\n        Trigger: crypto.randomUUID(),\n      },\n    });\n\n    buildTriggerResource.node.addDependency(codeBuildProject);\n    this.containerImage = ContainerImage.fromEcrRepository(this.ecrRepository);\n    this.dockerImageCode = DockerImageCode.fromEcr(this.ecrRepository);\n  }\n}\n"]}
|
package/package.json
CHANGED
|
@@ -56,7 +56,7 @@
|
|
|
56
56
|
"jsii-docgen": "^10.5.0",
|
|
57
57
|
"jsii-pacmak": "^1.105.0",
|
|
58
58
|
"jsii-rosetta": "~5.5.0",
|
|
59
|
-
"projen": "^0.90.
|
|
59
|
+
"projen": "^0.90.6",
|
|
60
60
|
"ts-jest": "^29.2.5",
|
|
61
61
|
"ts-node": "^10.9.2",
|
|
62
62
|
"typescript": "^5.7.2"
|
|
@@ -96,7 +96,7 @@
|
|
|
96
96
|
"publishConfig": {
|
|
97
97
|
"access": "public"
|
|
98
98
|
},
|
|
99
|
-
"version": "1.2.
|
|
99
|
+
"version": "1.2.4",
|
|
100
100
|
"jest": {
|
|
101
101
|
"coverageProvider": "v8",
|
|
102
102
|
"testMatch": [
|