How to deploy a React application to Amazon S3 using GitLab CI/CD

原文英文,约1900词,阅读约需7分钟。发表于:

Amazon S3 has a Static Website Hosting feature which allows you to host a static website directly from an S3 bucket. When you host your website on S3, your website content is stored in the S3 bucket and served directly to your users, without the need for additional resources. Combine this with Amazon CloudFront and you will have a cost-effective and scalable solution for hosting static websites – making it a popular choice for single-page applications. In this post, I will walk you through setting up your Amazon S3 bucket, setting up OpenID Connect (OIDC) in AWS, and deploying your application to your Amazon S3 bucket using a GitLab CI/CD pipeline. By the end of this post, you will have a CI/CD pipeline built in GitLab that automatically deploys to your Amazon S3 bucket. Let's dive in. Prerequisites For this guide you will need the following: Node.js >= 14.0.0 and npm >= 5.6 installed on your system Git installed on your system A GitLab account An AWS account A previous tutorial demonstrated how to create a new React application, run unit tests as part of the CI process in GitLab, and output the test results and code coverage into the pipeline. This post continues where that project left off, so to follow along you can fork this project or complete the guide in the linked post. Configure your Amazon S3 bucket You'll need to configure your Amazon S3 bucket so let's do that first. Create your bucket After you log in to your AWS account, search for S3 using the search bar and select the S3 service. This will open the S3 service home page. Right away, you should see the option to create a bucket. The bucket is where you are going to store your built React application. Click the Create bucket button to continue. Give your bucket a name, select your region, leave the rest of the settings as default (we’ll come back to these later), and continue by clicking the Create bucket button. When naming your bucket, it’s important to remember that your bucket name must be unique and follow the bucket naming rules. I named mine jw-gl-react. After creating your bucket, you should be taken to a list of your buckets as shown below. Configure static website hosting The next step is to configure static website hosting. Open your S3 bucket by clicking into the bucket name. Select the Properties tab and scroll to the bottom to find the static website hosting option. Click Edit and then enable static website hosting. For the Index and Error document, enter index.html and then click Save changes. Set up permissions Now that you have enabled static website hosting, you need to update your permissions so the public can visit your website. Return to your bucket and select the Permissions tab. Under Block public access (bucket settings), click Edit and uncheck Block all public access and continue to Save changes. Your page should now look this this: Now, you need to edit the Bucket Policy. Click the Edit button in the Bucket Policy section. Paste the following code into your new policy: { "Version": "2012-10-17", "Statement": [ { "Sid": "PublicReadGetObject", "Effect": "Allow", "Principal": "*", "Action": "s3:GetObject", "Resource": "arn:aws:s3:::jw-gl-react/*" } ] } Replace jw-gl-react on the resource property with the name of your bucket and Save changes. Your bucket should now look like this: Manually upload your React application Now, let’s build your React application and manually publish it to your S3 bucket. To build the application, make sure your project is cloned to your local machine and run the following command in your terminal inside of your repository directory: npm run build This will create a build folder inside of your repository directory. Inside of your bucket, click the Upload button. Drag the contents of your newly created build folder (not the folder itself) into the upload area. This will upload the contents of your application into your S3 bucket. Make sure to click Upload at the bottom of the page to start the upload. Now return to your bucket Properties tab and scroll to the bottom to find the URL of your static website. Click the link and you should see your built React application open in your browser. Set up OpenID Connect in AWS To deploy to your S3 Bucket from GitLab, we’re going to use a GitLab CI/CD job to receive temporary credentials from AWS without needing to store secrets. To do this, we’re going to configure OIDC for ID federation between GitLab and AWS. We’ll be following the related GitLab documentation. Add the identity provider The first step is going to be adding GitLab as an identity and access management (IAM) OIDC provider in AWS. AWS has instructions located here, but I will walk through it step by step. Open the IAM console inside of AWS. On the left navigation pane, under Access management choose Identity providers and then choose Add provider. For provider type, select OpenID Connect. For Provider URL, enter the address of your GitLab instance, such as https://gitlab.com or https://gitlab.example.com. For Audience, enter something that is generic and specific to your application. In my case, I'm going to enter react_s3_gl. To prevent confused deputy attacks, it's best to make this something that is not easy to guess. Take a note of this value, you will use it to set the ID_TOKEN in your .gitlab-ci.yml file. After entering the Provider URL, click Get thumbprint to verify the server certificate of your IdP. After this, go ahead and choose Add provider to finish up. Create the permissions policy After you create the identity provider, you need to create a permissions policy. From the IAM dashboard, under Access management select Policies and then Create policy. Select the JSON tab and paste the following policy replacing jw-gl-react on the resource line with your bucket name. { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": ["s3:ListBucket"], "Resource": ["arn:aws:s3:::jw-gl-react"] }, { "Effect": "Allow", "Action": [ "s3:PutObject", "s3:GetObject", "s3:DeleteObject" ], "Resource": ["arn:aws:s3:::jw-gl-react/*"] } ] } Select the Next: Tags button, add any tags you want, and then select the Next: Review button. Enter a name for your policy and finish up by creating the policy. Configure the role Now it’s time to add the role. From the IAM dashboard, under Access management select Roles and then select Create role. Select Web identity. In the Web identity section, select the identity provider you created earlier. For the Audience, select the audience you created earlier. Select the Next button to continue. If you wanted to limit authorization to a specific group, project, branch, or tag, you could create a Custom trust policy instead of a Web identity. Since I will be deleting these resources after the tutorial, I'm going to keep it simple. For a full list of supported filterting types, see the GitLab documentation. During the Add permissions step, select the policy you created and select Next to continue. Give your role a name and click Create role. Open the Role you just created. In the summary section, find the Amazon Resource Name (ARN) and save it somewhere secure. You will use this in your pipeline. Deploy to your Amazon S3 bucket using a GitLab CI/CD pipeline Inside of your project, create two CI/CD variables. The first variable should be named ROLE_ARN. For the value, paste the ARN of the role you just created. The second variable should be named S3_BUCKET. For the value, paste the name of the S3 bucket you created earlier in this post. I have chosen to mask my variables for an extra layer of security. Retrieve your temporary credentials Inside of your .gitlab-ci.yml file, paste the following code: .assume_role: &assume_role - > STS=($(aws sts assume-role-with-web-identity --role-arn ${ROLE_ARN} --role-session-name "GitLabRunner-${CI_PROJECT_ID}-${CI_PIPELINE_ID}" --web-identity-token $ID_TOKEN --duration-seconds 3600 --query 'Credentials.[AccessKeyId,SecretAccessKey,SessionToken]' --output text)) - export AWS_ACCESS_KEY_ID="${STS[0]}" - export AWS_SECRET_ACCESS_KEY="${STS[1]}" - export AWS_SESSION_TOKEN="${STS[2]}" This is going to use the the AWS Security Token Service to generate temporary (3,600 seconds) credentials utilizing the OIDC role you created earlier. Create the deploy job Now, let's add a build and deploy job to build your application and deploy it to your S3 bucket. First, update the stages in your .gitlab-ci.yml file to include a build and deploy stage as shown below: stages: - build - test - deploy Next, let's add a job to build your application. Paste the following code in your .gitlab-ci.yml file: build artifact: stage: build image: node:latest before_script: - npm install script: - npm run build artifacts: paths: - build/ when: always rules: - if: '$CI_COMMIT_REF_NAME == "main"' when: always This is going to run npm run build if the change occurs on the main branch and upload the build directory as an artifact to be used during the next step. Next, let's add a job to actually deploy to your S3 bucket. Paste the following code in your .gitlab-ci.yml file: deploy s3: stage: deploy image: name: amazon/aws-cli:latest entrypoint: - '/usr/bin/env' id_tokens: ID_TOKEN: aud: react_s3_gl script: - *assume_role - aws s3 sync build/ s3://$S3_BUCKET rules: - if: '$CI_COMMIT_REF_NAME == "main"' when: always This uses YAML anchors to run the assume_role script, and then uses the aws cli to upload your build artifact to the bucket you defined as a variable. This job also only runs if the change occurs on the main branch. Make sure the aud value matches the value you entered for your audience when you setup the identity provider. In my case, I entered react-s3_gl. Your complete .gitlab-ci.yml file should look like this: stages: - build - test - deploy .assume_role: &assume_role - > STS=($(aws sts assume-role-with-web-identity --role-arn ${ROLE_ARN} --role-session-name "GitLabRunner-${CI_PROJECT_ID}-${CI_PIPELINE_ID}" --web-identity-token $ID_TOKEN --duration-seconds 3600 --query 'Credentials.[AccessKeyId,SecretAccessKey,SessionToken]' --output text)) - export AWS_ACCESS_KEY_ID="${STS[0]}" - export AWS_SECRET_ACCESS_KEY="${STS[1]}" - export AWS_SESSION_TOKEN="${STS[2]}" unit test: image: node:latest stage: test before_script: - npm install script: - npm run test:ci coverage: /All files[^|]*\|[^|]*\s+([\d\.]+)/ artifacts: paths: - coverage/ when: always reports: junit: - junit.xml build artifact: stage: build image: node:latest before_script: - npm install script: - npm run build artifacts: paths: - build/ when: always rules: - if: '$CI_COMMIT_REF_NAME == "main"' when: always deploy s3: stage: deploy image: name: amazon/aws-cli:latest entrypoint: - '/usr/bin/env' id_tokens: ID_TOKEN: aud: react_s3_gl script: - *assume_role - aws s3 sync build/ s3://$S3_BUCKET rules: - if: '$CI_COMMIT_REF_NAME == "main"' when: always Make a change and test your pipeline To test your pipeline, inside of App.js, change this line Edit <code>src/App.js</code> and save to reload. to This was deployed from GitLab! and commit your changes to the main branch. The pipeline should kick off and when it finishes successfully you should see your updated application at the URL of your static website. You now have a CI/CD pipeline built in GitLab that receives temporary credentials from AWS using OIDC and automatically deploys to your Amazon S3 bucket. To take it a step further, you can secure your application with GitLab's built-in security tools. All code for this project can be found here. Cover image by Lucas van Oor on Unsplash Related posts and documentation How to automate testing for a React application with GitLab How to deploy AWS with GitLab Deploy to AWS from GitLab CI/CD Configure OpenID Connect in AWS to retrieve temporary credentials Secure GitLab CI/CD workflows using OIDC JWT on a DevSecOps platform

本文将指导您如何使用GitLab中的OIDC连接AWS,并使用GitLab CI/CD流水线将应用程序部署到Amazon S3存储桶,从而构建一个成本效益和可扩展的静态网站托管解决方案。

How to deploy a React application to Amazon S3 using GitLab CI/CD
相关推荐 去reddit讨论