AWS

AWS CodeBuild 를 통한 브랜치 자동화 업댓

Kyle79 2020. 2. 24. 11:09
version: 0.2

#env:
  #variables:
     # key: "value"
     # key: "value"
  #parameter-store:
     # key: "value"
     # key: "value"
  #secrets-manager:
     # key: secret-id:json-key:version-stage:version-id
     # key: secret-id:json-key:version-stage:version-id
  #exported-variables:
     # - variable
     # - variable
  #git-credential-helper: yes

phases:
  install:
    #Ubuntu 표준 이미지 2.0 이상을 사용하는 경우 런타임 버전을 지정해야 합니다.
    #런타임 버전을 지정하는 경우 Ubuntu 표준 이미지 2.0 이외의 이미지를 사용하면 빌드에 실패합니다.
    #runtime-versions:
      # name: version
      # name: version
    commands:
      - mkdir -p ~/.ssh
      - echo "$build_ssh_key" > ~/.ssh/id_rsa
      - chmod 600 ~/.ssh/id_rsa
      # - command
  #pre_build:
    #commands:
      # - command
      # - command
  build:
    commands:
      - git clone https://github.com/getredash/redash.git temp && mv temp/.git app/.git && rm -rf temp && cd app && git remote -v && git pull
      - cd ..
      - git config --global user.email "dhkdavid@deliveryhero.co.kr"
      - git remote set-url origin git@bitbucket.org:dhkdavid/redash.git
      - git add .
      - current=$(date '+%Y-%m-%d')
      - git commit -m "scheduled commit - $current" | true
      - git push origin HEAD:hotfix/code-patch | true
      # - command
  #post_build:
    #commands:
      # - command
      # - command
#reports:
  #report-name-or-arn:
    #files:
      # - location
      # - location
    #base-directory: location
    #discard-paths: yes
    #file-format: JunitXml | CucumberJson
#artifacts:
  #files:
    # - location
    # - location
  #name: $(date +%Y-%m-%d)
  #discard-paths: yes
  #base-directory: location
#cache:
  #paths:
    # - paths

 

 

 

 

https://adrianhesketh.com/2018/05/02/go-private-repositories-and-aws-codebuild/

 

Go, private repositories and AWS CodeBuild

I’ve gotten used to the luxury of CircleCI, but I thought I’d have a go at AWS CodeBuild to bring the build pipeline inside AWS to reduce the attack surface area. AWS Code Pipeline supports triggering builds from Github source code repositories, so I was a

adrianhesketh.com

 

 

 

'AWS' 카테고리의 다른 글

AWS EKS PDF  (0) 2020.03.13
EKS AutoScaling - HPA With Custom Metrics feat. Prometheus Adapter  (0) 2020.03.13
AWS 로드밸런서 HTTP → HTTPS 리다이렉션  (0) 2020.02.20
SageMaker Studio  (0) 2020.02.20
AWS CLI 설치  (0) 2020.02.04