diff --git a/provider/indexer-aws/CloudFormation/Automated/ecs-indexer-queue.yml b/provider/indexer-aws/CloudFormation/Automated/ecs-indexer-queue.yml index 93560af86f5700d21da34b943b08072e63764a70..fc1775f8334d381ac1157b5c2c6717e8d60ed75a 100644 --- a/provider/indexer-aws/CloudFormation/Automated/ecs-indexer-queue.yml +++ b/provider/indexer-aws/CloudFormation/Automated/ecs-indexer-queue.yml @@ -199,85 +199,6 @@ Resources: - "ecr:UploadLayerPart" - "ecr:CompleteLayerUpload" - ApplicationECSCluster: - Type: AWS::ECS::Cluster - Properties: - ClusterName: !Sub ${Environment}-${ApplicationName}-cluster - Tags: - - Key: Environment - Value: !Ref Environment - - ECSSecurityGroup: - Type: AWS::EC2::SecurityGroup - Properties: - GroupDescription: Indexer Service ECS Security Group - VpcId: - Fn::ImportValue: - !Sub "${Environment}-OSDU-VPC" - - # Public access to port 80 - ECSSecurityGroupHTTPInbound: - Type: AWS::EC2::SecurityGroupIngress - Properties: - GroupId: !Ref 'ECSSecurityGroup' - IpProtocol: tcp - FromPort: '80' - ToPort: '80' - CidrIp: 0.0.0.0/0 - - # Public access to port 443 - ECSSecurityGroupHTTPSInbound: - Type: AWS::EC2::SecurityGroupIngress - Properties: - GroupId: !Ref 'ECSSecurityGroup' - IpProtocol: tcp - FromPort: '443' - ToPort: '443' - CidrIp: 0.0.0.0/0 - - # Public access to port 8080 - ECSSecurityGroupHTTPAltInbound: - Type: AWS::EC2::SecurityGroupIngress - Properties: - GroupId: !Ref 'ECSSecurityGroup' - IpProtocol: tcp - FromPort: '8080' - ToPort: '8080' - CidrIp: 0.0.0.0/0 - - # Public access to port 8443 - ECSSecurityGroupHTTPSAltInbound: - Type: AWS::EC2::SecurityGroupIngress - Properties: - GroupId: !Ref 'ECSSecurityGroup' - IpProtocol: tcp - FromPort: '8443' - ToPort: '8443' - CidrIp: 0.0.0.0/0 - - # SSH access for instances in our VPC's jump box subnet group (coming soon – will be part of the Util CFN) - # TODO: Make security group in Util and enable it - # ECSSecurityGroupSSHInbound: - # Type: AWS::EC2::SecurityGroupIngress - # Properties: - # GroupId: !Ref 'ECSSecurityGroup' - # IpProtocol: tcp - # FromPort: '443' - # ToPort: '443' - # SourceSecurityGroupId: - # Fn::ImportValue: - # !Sub "${Environment}-OSDU-JumpBoxSecurityGroup" - - # Open Application Load Balancer port range to itself - ECSSecurityGroupALBports: - Type: AWS::EC2::SecurityGroupIngress - Properties: - GroupId: !Ref 'ECSSecurityGroup' - IpProtocol: tcp - FromPort: '31000' - ToPort: '61000' - SourceSecurityGroupId: !Ref 'ECSSecurityGroup' - CloudWatchLogsGroup: Type: AWS::Logs::LogGroup Properties: @@ -305,86 +226,9 @@ Resources: SourceVolume: docker-volume PortMappings: - ContainerPort: 80 - # - Name: busybox - # Cpu: 10 - # Command: ['/bin/sh -c "while true; do echo ''<html> <head> <title>Amazon ECS - # Sample App</title> <style>body {margin-top: 40px; background-color: #333;} - # </style> </head><body> <div style=color:white;text-align:center> <h1>Amazon - # ECS Sample App</h1> <h2>Congratulations!</h2> <p>The application is now - # running on a container in Amazon ECS.</p>'' > top; /bin/date > date ; - # echo ''</div></body></html>'' > bottom; cat top date bottom > /usr/local/apache2/htdocs/index.html - # ; sleep 1; done"'] - # EntryPoint: [sh, -c] - # Essential: false - # Image: busybox - # Memory: 200 - # LogConfiguration: - # LogDriver: awslogs - # Options: - # awslogs-group: !Ref 'CloudWatchLogsGroup' - # awslogs-region: !Ref 'AWS::Region' - # awslogs-stream-prefix: !Ref 'ApplicationName' - # VolumesFrom: - # - SourceContainer: !Ref 'ApplicationName' Volumes: - Name: docker-volume - ECSALB: - Type: AWS::ElasticLoadBalancingV2::LoadBalancer - Properties: - Name: !Sub ECSALB-${ApplicationName} - Scheme: internet-facing - LoadBalancerAttributes: - - Key: idle_timeout.timeout_seconds - Value: '30' - Subnets: - - Fn::ImportValue: - !Sub "${Environment}-OSDU-PublicSubnet-AZ1" - - Fn::ImportValue: - !Sub "${Environment}-OSDU-PublicSubnet-AZ2" - SecurityGroups: [!Ref 'ECSSecurityGroup'] - - ALBListener: - Type: AWS::ElasticLoadBalancingV2::Listener - DependsOn: ECSServiceRole - Properties: - DefaultActions: - - Type: forward - TargetGroupArn: !Ref 'ECSTG' - LoadBalancerArn: !Ref 'ECSALB' - Port: '80' - Protocol: HTTP - - ECSALBListenerRule: - Type: AWS::ElasticLoadBalancingV2::ListenerRule - DependsOn: ALBListener - Properties: - Actions: - - Type: forward - TargetGroupArn: !Ref 'ECSTG' - Conditions: - - Field: path-pattern - Values: [/] - ListenerArn: !Ref 'ALBListener' - Priority: 1 - - ECSTG: - Type: AWS::ElasticLoadBalancingV2::TargetGroup - DependsOn: ECSALB - Properties: - HealthCheckIntervalSeconds: 10 - HealthCheckPath: / - HealthCheckProtocol: HTTP - HealthCheckTimeoutSeconds: 5 - HealthyThresholdCount: 2 - Name: ECSTG - Port: 80 - Protocol: HTTP - UnhealthyThresholdCount: 2 - VpcId: - Fn::ImportValue: - !Sub "${Environment}-OSDU-VPC" - ECSAutoScalingGroup: Type: AWS::AutoScaling::AutoScalingGroup Properties: @@ -408,7 +252,9 @@ Resources: Type: AWS::AutoScaling::LaunchConfiguration Properties: ImageId: !FindInMap [AWSRegionToAMI, !Ref 'AWS::Region', AMIID] - SecurityGroups: [!Ref 'ECSSecurityGroup'] + SecurityGroups: + - Fn::ImportValue: + !Sub "${Environment}-${ApplicationName}-EcsSecurityGroupId" InstanceType: !Ref 'InstanceType' IamInstanceProfile: !Ref 'EC2InstanceProfile' KeyName: !Ref 'KeyName' @@ -419,81 +265,6 @@ Resources: yum install -y aws-cfn-bootstrap /opt/aws/bin/cfn-signal -e $? --stack ${AWS::StackName} --resource ECSAutoScalingGroup --region ${AWS::Region} - Service: - Type: AWS::ECS::Service - DependsOn: ALBListener - Properties: - Cluster: !Ref 'ApplicationECSCluster' - DesiredCount: '1' - LoadBalancers: - - ContainerName: !Ref 'ApplicationName' - ContainerPort: '80' - TargetGroupArn: !Ref 'ECSTG' - Role: !Ref 'ECSServiceRole' - TaskDefinition: !Ref 'TaskDefinition' - - ECSServiceRole: - Type: AWS::IAM::Role - Properties: - AssumeRolePolicyDocument: - Statement: - - Effect: Allow - Principal: - Service: [ecs.amazonaws.com] - Action: ['sts:AssumeRole'] - Path: / - Policies: - - PolicyName: !Sub ${Environment}-${ApplicationName}-ecs-service - PolicyDocument: - Statement: - - Effect: Allow - Action: ['elasticloadbalancing:DeregisterInstancesFromLoadBalancer', 'elasticloadbalancing:DeregisterTargets', - 'elasticloadbalancing:Describe*', 'elasticloadbalancing:RegisterInstancesWithLoadBalancer', - 'elasticloadbalancing:RegisterTargets', 'ec2:Describe*', 'ec2:AuthorizeSecurityGroupIngress'] - Resource: '*' - - ServiceScalingTarget: - Type: AWS::ApplicationAutoScaling::ScalableTarget - DependsOn: Service - Properties: - MaxCapacity: 2 - MinCapacity: 1 - ResourceId: !Join ['', [service/, !Ref 'ApplicationECSCluster', /, !GetAtt [Service, Name]]] - RoleARN: !GetAtt [AutoscalingRole, Arn] - ScalableDimension: ecs:service:DesiredCount - ServiceNamespace: ecs - - ServiceScalingPolicy: - Type: AWS::ApplicationAutoScaling::ScalingPolicy - Properties: - PolicyName: AStepPolicy - PolicyType: StepScaling - ScalingTargetId: !Ref 'ServiceScalingTarget' - StepScalingPolicyConfiguration: - AdjustmentType: PercentChangeInCapacity - Cooldown: 60 - MetricAggregationType: Average - StepAdjustments: - - MetricIntervalLowerBound: 0 - ScalingAdjustment: 200 - - ALB500sAlarmScaleUp: - Type: AWS::CloudWatch::Alarm - Properties: - EvaluationPeriods: '1' - Statistic: Average - Threshold: '10' - AlarmDescription: Alarm triggering ECS to scale up if our ALB generates too many HTTP 500 errors. - Period: '60' - AlarmActions: [!Ref 'ServiceScalingPolicy'] - Namespace: AWS/ApplicationELB - Dimensions: - - Name: LoadBalancer - Value: !GetAtt - - ECSALB - - LoadBalancerFullName - ComparisonOperator: GreaterThanThreshold - MetricName: HTTPCode_ELB_5XX_Count EC2Role: Type: AWS::IAM::Role @@ -549,6 +320,10 @@ Resources: - Arn: !GetAtt ApplicationECSCluster.Arn Id: !Sub ${Environment}-${ApplicationName}-target + EcsParemeters: + TaskCount: 1 + TaskDefinitionArn: !Ref 'TaskDefinition' + Outputs: ApplicationECSClusterArn: Description: The ARN of the application's ECS cluster. diff --git a/provider/indexer-aws/CloudFormation/Automated/ecs.yml b/provider/indexer-aws/CloudFormation/Automated/ecs.yml index 077839d0b80edc446dfe72068a22859cdbef07e3..b56aaf157775eeca7681479ae3c9a16ff3f8a4d2 100644 --- a/provider/indexer-aws/CloudFormation/Automated/ecs.yml +++ b/provider/indexer-aws/CloudFormation/Automated/ecs.yml @@ -1,3 +1,17 @@ +# Copyright © Amazon Web Services +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + AWSTemplateFormatVersion: 2010-09-09 Description: >- CloudFormation template for creating the resources used for the ECS cluster the application will @@ -30,22 +44,33 @@ Parameters: ConstraintDescription: Must start with a letter. Only numbers, letters, -, and _ accepted. Max. length 64 characters. Default: os-indexer + QueueApplicationName: + Description: > + The name of the application, which will be used to generate the ECS cluster name. + It will be prefixed with the environment name. + Type: String + MinLength: '1' + MaxLength: '64' + AllowedPattern: "^[a-zA-Z]+[0-9a-zA-Z_-]*$" + ConstraintDescription: Must start with a letter. Only numbers, letters, -, and _ accepted. Max. length 64 characters. + Default: os-indexer-queue + KeyName: Description: > Name of an existing EC2 KeyPair to enable SSH access to the ECS instances. Note that key pairs cannot be created through CloudFormation, but instead must be uploaded through the AWS Console. Type: AWS::EC2::KeyPair::KeyName - Default: ecs_indexer_key + Default: indexer-ecs-keypair DesiredCapacity: Description: The default number of instances to launch in the ECS cluster. Type: Number - Default: '0' + Default: '1' MinSize: - Description: Maximum number of instances that can be launched in the ECS cluster. + Description: Minimum number of instances that can be launched in the ECS cluster. Type: Number - Default: '1' + Default: '0' MaxSize: Description: Maximum number of instances that can be launched in the ECS cluster. @@ -197,7 +222,7 @@ Resources: Type: AWS::EC2::SecurityGroup Properties: GroupName: !Sub "${Environment}-${ApplicationName}-sg" - GroupDescription: Storage Service ECS Security Group + GroupDescription: Indexer Service ECS Security Group VpcId: Fn::ImportValue: !Sub "${Environment}-OSDU-VPC" @@ -301,6 +326,51 @@ Resources: Volumes: - Name: docker-volume + QueueTaskDefinition: + Type: AWS::ECS::TaskDefinition + Properties: + Family: !Join ['', [!Ref 'AWS::StackName', -, !Ref 'QueueApplicationName']] + ContainerDefinitions: + - Name: !Ref 'QueueApplicationName' + Cpu: '10' + Essential: 'true' + Image: !Sub ${AWS::AccountId}.dkr.ecr.${AWS::Region}.amazonaws.com/${Environment}-${QueueApplicationName}-queue-repository:latest + Memory: '300' + LogConfiguration: + LogDriver: awslogs + Options: + awslogs-group: !Ref 'CloudWatchLogsGroup' + awslogs-region: !Ref 'AWS::Region' + awslogs-stream-prefix: !Ref 'QueueApplicationName' + MountPoints: + - ContainerPath: /root/.m2 + SourceVolume: docker-volume + PortMappings: + - ContainerPort: 80 + Environment: # TODO: secure the sources of these values + - Name: AWS_ACCESS_KEY_ID + Value: AKIA453FG2R3UKGYA252 + - Name: AWS_SECRET_KEY + Value: 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 + - Name: ENVIRONMENT + Value: dev + - Name: VSTS_FEED_TOKEN + Value: 4t46p4pkk2kinwhjet3ucjb5prhexcme5cbmt4txpuoqn4jns22q + Volumes: + - Name: docker-volume + + SchedulingRule: + Type: AWS::Events::Rule + Properties: + ScheduleExpression: rate(5 minutes) + State: ENABLED + Targets: + - Arn: !GetAtt ApplicationECSCluster.Arn + Id: !Sub ${Environment}-${QueueApplicationName}-target + EcsParemeters: + TaskCount: 1 + TaskDefinitionArn: !Ref 'QueueTaskDefinition' + ECSALB: Type: AWS::ElasticLoadBalancingV2::LoadBalancer Properties: @@ -345,7 +415,7 @@ Resources: DependsOn: ECSALB Properties: HealthCheckIntervalSeconds: 120 - HealthCheckPath: /api/storage/v2/ + HealthCheckPath: /api/indexer/v2/ HealthCheckProtocol: HTTP HealthCheckTimeoutSeconds: 5 HealthyThresholdCount: 2 @@ -526,25 +596,25 @@ Outputs: Name: !Sub ${Environment}-${ApplicationName}-EcsClusterName ECSServiceArn: - Description: The ARN of the Storage Service service in the ECS cluster. + Description: The ARN of the Indexer Service service in the ECS cluster. Value: !Ref 'Service' Export: Name: !Sub ${Environment}-${ApplicationName}-EcsServiceArn ECSALBUrl: - Description: The Storage Service ALB DNS URL. + Description: The Indexer Service ALB DNS URL. Value: !Join ['', [!GetAtt [ECSALB, DNSName]]] Export: Name: !Sub ${Environment}-${ApplicationName}-EcsAlbUrl TaskDefinitionArn: - Description: The ARN of the Storage Service ECS task definition. + Description: The ARN of the Indexer Service ECS task definition. Value: !Ref 'TaskDefinition' Export: Name: !Sub ${Environment}-${ApplicationName}-EcsTaskDefinitionArn ECSSecurityGroupId: - Description: The ID of the Storage Service ECS EC2 security group. + Description: The ID of the Indexer Service ECS EC2 security group. Value: !Ref 'ECSSecurityGroup' Export: - Name: !Sub ${Environment}-${ApplicationName}-EcsSecurityGroupId + Name: !Sub ${Environment}-${ApplicationName}-EcsSecurityGroupId \ No newline at end of file diff --git a/provider/indexer-aws/CloudFormation/Manual/01-CreateCodePipeline.yml b/provider/indexer-aws/CloudFormation/Manual/01-CreateCodePipeline.yml index 0f3848656eadb314fe869a2a1d91777f22e0548c..1de60881047c37f66d4413ea809dc6a1fbb3a818 100644 --- a/provider/indexer-aws/CloudFormation/Manual/01-CreateCodePipeline.yml +++ b/provider/indexer-aws/CloudFormation/Manual/01-CreateCodePipeline.yml @@ -331,6 +331,9 @@ Resources: - Name: IMAGE_REPO_NAME Type: PLAINTEXT Value: !Sub ${Environment}-${CodeCommitRepositoryName}-repository + - Name: QUEUE_IMAGE_REPO_NAME + Type: PLAINTEXT + Value: !Sub ${Environment}-${CodeCommitRepositoryName}-queue-repository PrivilegedMode: true Source: BuildSpec: ./provider/storage-aws/buildspec-post-deploy.yml diff --git a/provider/indexer-aws/CloudFormation/Master/os-indexer-master.yml b/provider/indexer-aws/CloudFormation/Master/os-indexer-master.yml index a31923786f8859dc5ecb043e15f33bfccdccefb7..2900901947659c5aa7bfae0eefd67707018e56e1 100644 --- a/provider/indexer-aws/CloudFormation/Master/os-indexer-master.yml +++ b/provider/indexer-aws/CloudFormation/Master/os-indexer-master.yml @@ -48,6 +48,17 @@ Parameters: ConstraintDescription: Must start with a letter. Only numbers, letters, -, and _ accepted. Max. length 64 characters. Default: os-indexer + QueueApplicationName: + Description: > + The name of the application, which will be used to generate the ECS cluster name. + It will be prefixed with the environment name. + Type: String + MinLength: '1' + MaxLength: '64' + AllowedPattern: "^[a-zA-Z]+[0-9a-zA-Z_-]*$" + ConstraintDescription: Must start with a letter. Only numbers, letters, -, and _ accepted. Max. length 64 characters. + Default: os-indexer-queue + KeyName: Description: > Name of an existing EC2 KeyPair to enable SSH access to the ECS instances. Note that key pairs cannot @@ -447,6 +458,7 @@ Resources: Environment: !Ref Environment Region: !Ref DeploymentRegion ApplicationName: !Ref ApplicationName + QueueApplicationName: !Ref QueueApplicationName KeyName: !Ref KeyName DesiredCapacity: !Ref DesiredCapacity MinSize: !Ref MinSize diff --git a/provider/indexer-aws/CloudFormation/Params/dev.template_configuration.json b/provider/indexer-aws/CloudFormation/Params/dev.template_configuration.json index e328cf8d380df765786c27a3eafc6bae77eeabb6..2625a8b409ca811ecddc326ab0733601610cc1b3 100644 --- a/provider/indexer-aws/CloudFormation/Params/dev.template_configuration.json +++ b/provider/indexer-aws/CloudFormation/Params/dev.template_configuration.json @@ -4,6 +4,7 @@ "DeploymentRegion" : "us-east-1", "ChildTemplateBasePath" : "https://s3.amazonaws.com/dev-os-indexer-cloudformation-scripts/Automated/", "ApplicationName" : "os-indexer", + "QueueApplicationName" : "os-indexer-queue", "KeyName": "indexer-ecs-keypair", "DesiredCapacity": "1", "MinSize": "0", diff --git a/provider/indexer-aws/CloudFormation/Params/prod.template_configuration.json b/provider/indexer-aws/CloudFormation/Params/prod.template_configuration.json index ba07ff41e64880df5dfcf652bef92d8c552d144a..09d4e6b7592f5f08d75d1ca61ada84913bbf6b24 100644 --- a/provider/indexer-aws/CloudFormation/Params/prod.template_configuration.json +++ b/provider/indexer-aws/CloudFormation/Params/prod.template_configuration.json @@ -4,6 +4,7 @@ "DeploymentRegion" : "us-east-1", "ChildTemplateBasePath" : "https://s3.amazonaws.com/prod-os-indexer-cloudformation-scripts/Automated/", "ApplicationName" : "os-indexer", + "QueueApplicationName" : "os-indexer-queue", "KeyName": "indexer-ecs-keypair", "DesiredCapacity": "1", "MinSize": "0", diff --git a/provider/indexer-aws/CloudFormation/Params/uat.template_configuration.json b/provider/indexer-aws/CloudFormation/Params/uat.template_configuration.json index 26fd295983725e67ff62da3cc148314aea497383..13a053f5dbd7eea06ad2d359cb1d8225ae2dc7a9 100644 --- a/provider/indexer-aws/CloudFormation/Params/uat.template_configuration.json +++ b/provider/indexer-aws/CloudFormation/Params/uat.template_configuration.json @@ -4,6 +4,7 @@ "DeploymentRegion" : "us-east-1", "ChildTemplateBasePath" : "https://s3.amazonaws.com/uat-os-indexer-cloudformation-scripts/Automated/", "ApplicationName" : "os-indexer", + "QueueApplicationName" : "os-indexer-queue", "KeyName": "indexer-ecs-keypair", "DesiredCapacity": "1", "MinSize": "0", diff --git a/provider/indexer-aws/buildspec-post-deploy.yml b/provider/indexer-aws/buildspec-post-deploy.yml index 53fdb3685493518f464dd6783c8354d1bd86e99f..de22144ec171565023bfe7067e8179d639bf66c7 100644 --- a/provider/indexer-aws/buildspec-post-deploy.yml +++ b/provider/indexer-aws/buildspec-post-deploy.yml @@ -47,8 +47,6 @@ phases: build: commands: - echo Indexer-core Java build started on `date`... - # - mvn clean test -pl Indexer-core - # - mvn clean deploy -pl Indexer-core - echo os-indexer Java build started on `date`... - java -version - export JAVA_HOME=/usr/lib/jvm/java-8-openjdk-amd64 @@ -65,6 +63,16 @@ phases: - echo ...os-indexer Docker image build completed on `date`. - echo Pushing the Docker image to ECR... - docker push $AWS_ACCOUNT_NUMBER.dkr.ecr.$DEPLOYMENT_REGION.amazonaws.com/$IMAGE_REPO_NAME:$IMAGE_TAG + - mvn clean test -U -f provider/indexer-aws/indexer-queue-aws/pom.xml -Ddeployment.environment=$ENVIRONMENT -Ddeployment.repositorybucket=$S3_MAVEN_REPOSITORY -Daws.accessKeyId=$AWS_ACCESS_KEY_ID_MAVEN -Daws.secretKey=$AWS_SECRET_ACCESS_KEY_MAVEN -Dazure.devops.token=$VSTS_FEED_TOKEN -DaltSnapshotDeploymentRepository=snapshot::default::file:../../local-snapshots-dir -DaltReleaseDeploymentRepository=release::default::file:../../local-release-dir -DaltDeploymentRepository=release::default::file:../../local-release-dir + - echo ...os-indexer Java build completed on `date`. + - echo os-indexer beginning packaging to jar... + - mvn clean deploy -f provider/indexer-aws/indexer-queue-aws/pom.xml -Ddeployment.environment=$ENVIRONMENT -Ddeployment.repositorybucket=$S3_MAVEN_REPOSITORY -Daws.accessKeyId=$AWS_ACCESS_KEY_ID_MAVEN -Daws.secretKey=$AWS_SECRET_ACCESS_KEY_MAVEN -Dazure.devops.token=$VSTS_FEED_TOKEN -DaltSnapshotDeploymentRepository=snapshot::default::file:../../local-snapshots-dir -DaltReleaseDeploymentRepository=release::default::file:../../local-release-dir -DaltDeploymentRepository=release::default::file:../../local-release-dir + - echo os-indexer Docker image build started on `date`... + - docker build -f provider/indexer-aws/indexer-queue-aws/Dockerfile -t $QUEUE_IMAGE_REPO_NAME:$IMAGE_TAG . + - docker tag $IMAGE_REPO_NAME:$IMAGE_TAG $AWS_ACCOUNT_NUMBER.dkr.ecr.$DEPLOYMENT_REGION.amazonaws.com/$QUEUE_IMAGE_REPO_NAME:$IMAGE_TAG + - echo ...os-indexer Docker image build completed on `date`. + - echo Pushing the Docker image to ECR... + - docker push $AWS_ACCOUNT_NUMBER.dkr.ecr.$DEPLOYMENT_REGION.amazonaws.com/$QUEUE_IMAGE_REPO_NAME:$IMAGE_TAG - echo Docker image pushed to ECR successfully! cache: diff --git a/provider/indexer-aws/indexer-queue-aws/Dockerfile b/provider/indexer-aws/indexer-queue-aws/Dockerfile index e69de29bb2d1d6434b8b29ae775ad8c2e48c5391..35f86e0b5e2885e8902ab61f32d82a6d32841f59 100644 --- a/provider/indexer-aws/indexer-queue-aws/Dockerfile +++ b/provider/indexer-aws/indexer-queue-aws/Dockerfile @@ -0,0 +1,7 @@ +FROM amazoncorretto:8 + +WORKDIR / +COPY provider/storage-aws/target/indexer-queue-aws-0.0.1-SNAPSHOT-spring-boot.jar indexer-queue-aws-0.0.1-SNAPSHOT-spring-boot.jar +EXPOSE 8080 + +CMD ["java","-jar", "indexer-aws-0.0.1-SNAPSHOT-spring-boot.jar"] \ No newline at end of file diff --git a/provider/indexer-aws/indexer-queue-aws/pom.xml b/provider/indexer-aws/indexer-queue-aws/pom.xml index 7661120291e4b289343575603a7ead9888e07b7a..352ed4286d55b2b48fb612cd4d03a7eb1b7565bc 100644 --- a/provider/indexer-aws/indexer-queue-aws/pom.xml +++ b/provider/indexer-aws/indexer-queue-aws/pom.xml @@ -35,9 +35,29 @@ <name>indexer-queue-aws</name> <packaging>jar</packaging> - + <!-- Internal packages --> <dependencies> - <dependency> + <dependency> + <groupId>org.opengroup.osdu.core.aws</groupId> + <artifactId>aws-osdu-util</artifactId> + <version>0.0.1</version> + </dependency> + + <!-- AWS managed packages --> + <dependency> + <groupId>com.amazonaws</groupId> + <artifactId>aws-java-sdk-core</artifactId> + <version>1.11.651</version> + </dependency> + + <dependency> + <groupId>com.amazonaws</groupId> + <artifactId>aws-java-sdk</artifactId> + <version>1.11.327</version> + </dependency> + + <!-- Third party Apache 2.0 license packages --> + <dependency> <groupId>org.apache.logging.log4j</groupId> <artifactId>log4j-api</artifactId> <version>2.12.1</version> @@ -47,22 +67,6 @@ <artifactId>log4j-core</artifactId> <version>2.12.1</version> </dependency> - <dependency> - <groupId>com.amazonaws</groupId> - <artifactId>aws-java-sdk-core</artifactId> - <version>1.11.651</version> - </dependency> - <dependency> - <groupId>org.opengroup.osdu.core.aws</groupId> - <artifactId>aws-osdu-util</artifactId> - <version>0.0.1</version> - </dependency> - <dependency> - <groupId>com.amazonaws</groupId> - <artifactId>aws-java-sdk</artifactId> - <version>1.11.327</version> - </dependency> - <dependency> <groupId>org.apache.lucene</groupId> <artifactId>lucene-core</artifactId> @@ -85,7 +89,9 @@ <artifactId>commons-collections4</artifactId> <version>4.1</version> </dependency> - <dependency> + + <!-- Testing packages --> + <dependency> <groupId>junit</groupId> <artifactId>junit</artifactId> <version>4.12</version> @@ -103,4 +109,29 @@ <version>2.0.2</version> </dependency> </dependencies> + + <repositories> + <repository> + <id>maven-s3-release-repo</id> + <name>S3 Maven Release Repository</name> + <url>s3://${deployment.repositorybucket}/release</url> + </repository> + + <repository> + <id>maven-s3-snapshot-repo</id> + <name>S3 Maven Snapshot Repository</name> + <url>s3://${deployment.repositorybucket}/snapshot</url> + </repository> + + <repository> + <id>local.release</id> + <url>file:../../local-release-dir</url> + <releases> + <enabled>true</enabled> + </releases> + <snapshots> + <enabled>true</enabled> + </snapshots> + </repository> + </repositories> </project>