Update a GitHub commit status via CodePipeline events
- TL;DR
- Installation
- Deployment & Hosting
- Documentation
- Examples & Tests
- Code Standards
- Maintainers
- Contributing
- License
AWS CodePipeline lacks an easy way to update GitHub commit statuses (at this time). Launch this serverless application and immediately start updating commits as pipeline events occur. All you need is a GitHub personal access token and some AWS credentials.
- An AWS account
- Running functions locally requires permission to: CodePipeline and KMS
- Deploying requires permission to: KMS, SSM, Secrets Manager and Cloud Formation
- AWS CLI (
brew install awscli
) - Golang (
brew install go
) - SAM CLI (
brew tap aws/tap && brew install aws-sam-cli
)- Running functions locally requires: Docker
Clone or go get the files locally
go get github.com/mrz1836/codepipeline-to-github
cd $GOPATH/src/github.com/mrz1836/codepipeline-to-github
Setup to run locally
1) Modify the event json to a recent pipeline execution and pipeline name
"detail": {
"pipeline": "your-pipeline-name",
"execution-id": "some-execution-id"
}
2) Modify the local-env.json file with your GitHub Personal Access Token
"StatusFunction": {
"GITHUB_ACCESS_TOKEN": "your-token-goes-here"
}
3) Finally, run the handler which should produce null
and the commit status should be updated
make run event="started"
This repository has CI integration using AWS CodePipeline.
Deploying to the master
branch will automatically start the process of shipping the code to AWS Lambda.
Any changes to the environment via the AWS CloudFormation template will be applied. The actual build process can be found in the buildspec.yml file.
The application relies on AWS Secrets Manager and AWS SSM to store environment variables. Sensitive environment variables are encrypted using AWS KMS and then decrypted at runtime.
Deploy different environments by changing the <stage>
to production
or staging
as an example.
The default stage is production
if not specified.
Create Environment Encryption Key(s) (AWS)
Create a KMS Key
per <stage>
for your application(s) to encrypt environment variables
make create-env-key stage="<stage>"
This will also store the kms_key_id
in SSM located at: /<application>/<stage>/kms_key_id
Manage Environment Secrets (AWS)
github_token
is a personal token with access to make a webhookkms_key_id
is from the previous step (Create Environment Encryption Keys)
Add or update your GitHub personal access token
make save-secrets \
github_token="YOUR_GITHUB_TOKEN" \
kms_key_id="YOUR_KMS_KEY_ID" \
stage="<stage>";
Create New CI & Hosting Environment (AWS)
This will create a new AWS CloudFormation stack with:
- (1) Lambda Function (Golang Runtime)
- (1) CloudWatch Event Rule to subscribe to Pipeline events
- (1) CloudWatch LogGroup for the Lambda function output
- (1) CodePipeline with multiple stages to deploy the application from GitHub
- (1) CodePipeline Webhook to receive GitHub notifications from a specific
branch:name
- (1) CodeBuild Project to test, build and deploy the app
- (2) Service Roles for working with CodeBuild and CodePipeline
NOTE: Requires an existing S3 bucket for artifacts and sam-cli deployments (located in the Makefile)
One command will build, test, package and deploy the application to AWS using the default production
stage and using default tags.
After initial deployment, updating the function is as simple as committing to GitHub.
make deploy
(Example) Customized deployment for another stage
make deploy stage="development" branch="development"
(Example) Customized deployment for a feature branch
make deploy stage="development" branch="some-feature" feature="some-feature"
(Example) Customized S3 bucket location
make deploy bucket="some-S3-bucket-location"
(Example) Customized tags for the deployment
make deploy tags="MyTag=some-value AnotherTag=some-value"
Tear Down CI & Hosting Environment (AWS)
Remove the stack (using default stage: production
)
make teardown
(Example) Teardown another stack via stage
make teardown stage="development"
(Example) Teardown a feature/branch stack
make teardown stage="development" feature="some-feature"
Lambda Logging
View all the logs in AWS CloudWatch via Log Groups
/aws/lambda/<app_name>-<stage_name>
The status
handler does the following:
- Processes incoming CloudWatch events from CodePipeline
- Decrypts environment variables (GitHub Token)
- Gets the latest information from CodePipeline via an ExecutionID
- Determines the GitHub status based on the Execution status
- Initiates a http/post request to GitHub to update the commit status
Run the status function with different pipeline events
make run event="failed"
Release Deployment
goreleaser for easy binary or library deployment to GitHub and can be installed via: brew install goreleaser
.
The .goreleaser.yml file is used to configure goreleaser.
Use make release-snap
to create a snapshot version of the release, and finally make release
to ship to production.
Makefile Commands
View all makefile
commands
make help
List of all current commands:
aws-param-certificate Returns the ssm location for the domain ssl certificate id
aws-param-dockerhub Returns the ssm location for the DockerHub ARN
aws-param-vpc-id Returns the ssm location for the vpc id
aws-param-vpc-private Returns the ssm location for the vpc private subnets
aws-param-vpc-public Returns the ssm location for the vpc public subnets
aws-param-zone Returns the ssm location for the host zone id
build Build the lambda function as a compiled application
clean Remove previous builds, test cache, and packaged releases
clean-mods Remove all the Go mod cache
coverage Shows the test coverage
create-env-key Creates a new key in KMS for a new stage
create-secret Creates an secret into AWS SecretsManager
decrypt Decrypts data using a KMY Key ID (awscli v2)
decrypt-deprecated Decrypts data using a KMY Key ID (awscli v1)
deploy Build, prepare and deploy
diff Show the git diff
encrypt Encrypts data using a KMY Key ID (awscli v2)
env-key-location Returns the environment encryption key location
generate Runs the go generate command in the base of the repo
godocs Sync the latest tag with GoDocs
help Show this help message
install Install the application
install-go Install the application (Using Native Go)
install-releaser Install the GoReleaser application
invalidate-cache Invalidates a cloudfront cache based on path
lambda Build a compiled version to deploy to Lambda
lint Run the golangci-lint application (install if not found)
package Process the CF template and prepare for deployment
release Full production release (creates release in GitHub)
release Runs common.release and then runs godocs
release-snap Test the full release (build binaries)
release-test Full production test release (everything except deploy)
replace-version Replaces the version in HTML/JS (pre-deploy)
run Fires the lambda function (run event=started)
save-domain-info Saves the zone id and the ssl id for use by CloudFormation
save-host-info Saves the host information for a given domain
save-param Saves a plain-text string parameter in SSM
save-param-encrypted Saves an encrypted string value as a parameter in SSM
save-param-list Saves a list of strings (entry1,entry2,entry3) as a parameter in SSM
save-secrets Helper for saving GitHub token(s) to Secrets Manager (extendable for more secrets)
save-vpc-info Saves the VPC id and the subnet IDs for use by CloudFormation
tag Generate a new tag and push (tag version=0.0.0)
tag-remove Remove a tag if found (tag-remove version=0.0.0)
tag-update Update an existing tag to current commit (tag-update version=0.0.0)
teardown Deletes the entire stack
test Runs lint and ALL tests
test-ci Runs all tests via CI (exports coverage)
test-ci-no-race Runs all tests via CI (no race) (exports coverage)
test-ci-short Runs unit tests via CI (exports coverage)
test-no-lint Runs just tests
test-short Runs vet, lint and tests (excludes integration tests)
test-unit Runs tests and outputs coverage
uninstall Uninstall the application (and remove files)
update-linter Update the golangci-lint package (macOS only)
update-secret Updates an existing secret in AWS SecretsManager
upload-files Upload/puts files into S3 bucket
vet Run the Go vet application
All unit tests run via GitHub Actions and uses Go version 1.19.x. View the configuration file.
Run all tests (including integration tests)
make test
Read more about this Go project's code standards.
MrZ |
View the contributing guidelines and please follow the code of conduct.
All kinds of contributions are welcome π! The most basic way to show your support is to star π the project, or to raise issues π¬. You can also support this project by becoming a sponsor on GitHub π or by making a bitcoin donation to ensure this journey continues indefinitely! π
This application would not be possible without the work provided in these repositories:
- CPLiakas's SAM Golang Example
- InfoPark's GitHub Status
- Jenseickmeyer's Commit Status Bot
- Rowanu's SAM Golang Starter