-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathbuild_template.yml
165 lines (158 loc) · 5 KB
/
build_template.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
---
Description: >-
Pipeline to release Lambda layers publicly when new release is created
Metadata:
Author: https://github.com/johnpreston
Parameters:
BlogDistributionId:
Type: String
BlogBucketName:
Type: String
TmpBlogBucketName:
Type: String
CVSProviderUrl:
Type: String
Description: Name of VCS repo for the Docker composeX file
Default: https://github.com/
BranchName:
Type: String
Default: main
RepositoryName:
Type: String
BuildLogsRetentionDays:
Type: Number
AllowedValues: [1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, 3653]
Default: 14
Resources:
BuildLogsGroup:
Type: AWS::Logs::LogGroup
Properties:
LogGroupName: !Sub 'codebuild/blog/${RepositoryName}'
RetentionInDays: !Ref BuildLogsRetentionDays
CodeBuildRole:
Type: AWS::IAM::Role
Properties:
ManagedPolicyArns:
- arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- !Sub 'codebuild.${AWS::URLSuffix}'
Policies:
- PolicyName: ContentAccess
PolicyDocument:
Version: '2012-10-17'
Statement:
- Sid: S3ObjectsAccess
Action:
- s3:PutObject*
- s3:GetObject*
Effect: Allow
Resource:
- !Sub 'arn:${AWS::Partition}:s3:::${TmpBlogBucketName}/*'
- !Sub 'arn:${AWS::Partition}:s3:::${BlogBucketName}/*'
- Sid: S3BucketAccess
Action:
- s3:ListBucket
Effect: Allow
Resource:
- !Sub 'arn:${AWS::Partition}:s3:::${BlogBucketName}'
- !Sub 'arn:${AWS::Partition}:s3:::${TmpBlogBucketName}'
- Sid: CloudFrontAccess
Action:
cloudfront:CreateInvalidation
Effect: Allow
Resource:
!Sub 'arn:${AWS::Partition}:cloudfront::${AWS::AccountId}:distribution/${BlogDistributionId}'
- Sid: CloudWatchLogs
Effect: Allow
Action:
- logs:CreateLogStream
- logs:PutLogEvents
Resource:
- !Sub '${BuildLogsGroup.Arn}'
TmpBuildProject:
Type: AWS::CodeBuild::Project
Properties:
ServiceRole: !GetAtt 'CodeBuildRole.Arn'
Description: !Sub 'Publishes blog on updates'
LogsConfig:
CloudWatchLogs:
GroupName: !Ref BuildLogsGroup
Status: ENABLED
StreamName: prerelease
BadgeEnabled: True
Artifacts:
Type: NO_ARTIFACTS
Environment:
ComputeType: BUILD_GENERAL1_SMALL
Image: aws/codebuild/standard:3.0
Type: LINUX_CONTAINER
EnvironmentVariables:
- Name: BLOG_BUCKET_NAME
Type: PLAINTEXT
Value: !Ref TmpBlogBucketName
- Name: CLOUDFRONT_ID
Type: PLAINTEXT
Value: !Ref BlogDistributionId
Source:
Type: GITHUB
ReportBuildStatus: True
Location: !Sub "${CVSProviderUrl}${RepositoryName}"
InsecureSsl: False
BuildSpec: buildspec_pr.yml
Triggers:
Webhook: True
FilterGroups:
- - Type: EVENT
Pattern: "PULL_REQUEST_CREATED, PULL_REQUEST_UPDATED, PULL_REQUEST_REOPENED"
ExcludeMatchedPattern: False
- Type: HEAD_REF
Pattern: '^refs/heads/.*$'
ExcludeMatchedPattern: False
- Type: BASE_REF
Pattern: !Sub '^refs/heads/${BranchName}$'
ExcludeMatchedPattern: False
PublishProject:
Type: AWS::CodeBuild::Project
Properties:
ServiceRole: !GetAtt 'CodeBuildRole.Arn'
Description: !Sub 'Publishes blog on updates'
BadgeEnabled: True
LogsConfig:
CloudWatchLogs:
GroupName: !Ref BuildLogsGroup
Status: ENABLED
StreamName: release
Artifacts:
Type: NO_ARTIFACTS
Environment:
ComputeType: BUILD_GENERAL1_SMALL
Image: aws/codebuild/standard:3.0
Type: LINUX_CONTAINER
EnvironmentVariables:
- Name: BLOG_BUCKET_NAME
Type: PLAINTEXT
Value: !Ref BlogBucketName
- Name: CLOUDFRONT_ID
Type: PLAINTEXT
Value: !Ref BlogDistributionId
Source:
Type: GITHUB
ReportBuildStatus: True
Location: !Sub "${CVSProviderUrl}${RepositoryName}"
InsecureSsl: False
Triggers:
Webhook: True
FilterGroups:
- - Type: EVENT
Pattern: PUSH
ExcludeMatchedPattern: False
- Type: HEAD_REF
Pattern: !Sub '^refs/heads/${BranchName}$'
ExcludeMatchedPattern: False