All files index.ts

100% Statements 27/27
100% Branches 28/28
100% Functions 1/1
100% Lines 27/27

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 1761x 1x 1x                                                                                                                                                                                                                         1x                       7x   7x                   7x 7x 7x 7x 7x 7x   7x 7x 7x 7x 7x 7x 7x 7x 7x 7x   7x         7x                   7x   7x 7x        
import { Construct, CfnOutput} from '@aws-cdk/core';
import { IRole, Role, ServicePrincipal, ManagedPolicy }  from '@aws-cdk/aws-iam';
import { Instance, InstanceType, MachineImage, UserData, BlockDeviceVolume, AmazonLinuxGeneration, SubnetType, Vpc, IVpc, IInstance } from '@aws-cdk/aws-ec2';
 
export interface GitlabContainerRunnerProps {
  /**
   * Gitlab token for the Register Runner .
   * 
   * @example
   * new GitlabContainerRunner(stack, 'runner', { gitlabtoken: 'GITLAB_TOKEN' });
   * 
   * @default - You must to give the token !!!
   * 
   */
  readonly gitlabtoken: string;
 
  /**
   * Runner default EC2 instance type.
   * 
   * @example
   * new GitlabContainerRunner(stack, 'runner', { gitlabtoken: 'GITLAB_TOKEN', ec2type: 't3.small' });
   * 
   * @default - t3.micro
   * 
   */
  readonly ec2type?: string;
 
  /**
   * VPC for the Gitlab Runner .
   * 
   * @example
   * const newvpc = new Vpc(stack, 'NEWVPC', {
   *   cidr: '10.1.0.0/16',
   *   maxAzs: 2,
   *   subnetConfiguration: [{
   *     cidrMask: 26,
   *     name: 'RunnerVPC',
   *     subnetType: SubnetType.PUBLIC,
   *   }],
   *   natGateways: 0,
   * });
   * 
   * new GitlabContainerRunner(stack, 'runner', { gitlabtoken: 'GITLAB_TOKEN', selfvpc: newvpc });
   * 
   * @default - new VPC will be created , 1 Vpc , 2 Public Subnet .
   * 
   */
  readonly selfvpc?: IVpc;
 
  /**
   * IAM role for the Gitlab Runner Instance .
   * 
   * @example
   * const role = new Role(stack, 'runner-role', {
   *   assumedBy: new ServicePrincipal('ec2.amazonaws.com'),
   *   description: 'For Gitlab EC2 Runner Test Role',
   *   roleName: 'Myself-Runner-Role',
   * });
   * 
   * new GitlabContainerRunner(stack, 'runner', { gitlabtoken: 'GITLAB_TOKEN', ec2iamrole: role });
   * 
   * @default - new Role for Gitlab Runner Instance , attach AmazonSSMManagedInstanceCore Policy . 
   * 
   */
  readonly ec2iamrole?: IRole;
 
  /**
   * Gitlab Runner register tag1  .
   * 
   * @example
   * new GitlabContainerRunner(stack, 'runner', { gitlabtoken: 'GITLAB_TOKEN', tag1: 'aa' });
   * 
   * @default - tag1: gitlab .
   * 
   */
  readonly tag1?: string;
 
  /**
   * Gitlab Runner register tag2  .
   * 
   * @example
   * new GitlabContainerRunner(stack, 'runner', { gitlabtoken: 'GITLAB_TOKEN', tag2: 'bb' });
   * 
   * @default - tag2: awscdk .
   * 
   */
  readonly tag2?: string;
  
  /**
   * Gitlab Runner register tag3  .
   * 
   * @example
   * new GitlabContainerRunner(stack, 'runner', { gitlabtoken: 'GITLAB_TOKEN', tag3: 'cc' });
   * 
   * @default - tag3: runner .
   * 
   */
  readonly tag3?: string;
 
  /**
   * Gitlab Runner register url .
   * 
   * @example
   * const runner = new GitlabContainerRunner(stack, 'runner', { gitlabtoken: 'GITLAB_TOKEN',gitlaburl: 'https://gitlab.com/'});
   * 
   * @default - gitlaburl='https://gitlab.com/'
   * 
   */
  readonly gitlaburl?: string;
}
 
export class GitlabContainerRunner extends Construct {
  
  /**
   * The IAM role assumed by the Runner instance .
   */
  public readonly runnerRole: IRole;
 
  /**
  * This represents a Runner EC2 instance .
  */
  public readonly runnerEc2: IInstance;
  constructor(scope: Construct, id: string, props: GitlabContainerRunnerProps) {
    super(scope, id);
 
    const vpc = props.selfvpc ?? new Vpc(this, 'VPC', {
      cidr: '10.0.0.0/16',
      maxAzs: 2,
      subnetConfiguration: [{
        cidrMask: 26,
        name: 'RunnerVPC',
        subnetType: SubnetType.PUBLIC,
      }],
      natGateways: 0,
    });
    const token = props.gitlabtoken;
    const tag1 = props.tag1 ?? 'gitlab'
    const tag2 = props.tag2 ?? 'awscdk'
    const tag3 = props.tag3 ?? 'runner'
    const gitlaburl = props.gitlaburl ?? 'https://gitlab.com/'
    const ec2type = props.ec2type ?? 't3.micro'
 
    const shell = UserData.forLinux()
    shell.addCommands('yum update -y')
    shell.addCommands('yum install docker -y')
    shell.addCommands('service docker start')
    shell.addCommands('usermod -aG docker ec2-user')
    shell.addCommands('chmod +x /var/run/docker.sock')
    shell.addCommands('service docker restart &&  chkconfig docker on')
    shell.addCommands('docker run -d -v /home/ec2-user/.gitlab-runner:/etc/gitlab-runner -v /var/run/docker.sock:/var/run/docker.sock --name gitlab-runner-register gitlab/gitlab-runner:alpine register --non-interactive --url ' + gitlaburl + ' --registration-token ' + token + ' --docker-pull-policy if-not-present --docker-volumes \"/var/run/docker.sock:/var/run/docker.sock\" --executor docker --docker-image \"alpine:latest\" --description \"Docker Runner\" --tag-list \"' + tag1 + ',' + tag2 + ',' + tag3 + '\" --docker-privileged')
    shell.addCommands('sleep 2 && docker run --restart always -d -v /home/ec2-user/.gitlab-runner:/etc/gitlab-runner -v /var/run/docker.sock:/var/run/docker.sock --name gitlab-runner gitlab/gitlab-runner:alpine')
    shell.addCommands('usermod -aG docker ssm-user')
 
    this.runnerRole = props.ec2iamrole ?? new Role(this, 'runner-role', {
      assumedBy: new ServicePrincipal('ec2.amazonaws.com'),
      description: 'For Gitlab EC2 Runner Role',
    });
 
    this.runnerEc2 = new Instance(this, 'GitlabRunner', {
      instanceType: new InstanceType(ec2type),
      instanceName: 'Gitlab-Runner',
      vpc,
      machineImage: MachineImage.latestAmazonLinux({ generation: AmazonLinuxGeneration.AMAZON_LINUX_2 }),
      role: this.runnerRole,
      userData: shell,
      blockDevices: [({ deviceName: '/dev/xvda', volume: BlockDeviceVolume.ebs(60) })],
    });
    
    this.runnerRole.addManagedPolicy(ManagedPolicy.fromAwsManagedPolicyName('AmazonSSMManagedInstanceCore'));
 
    new CfnOutput(this, 'Runner-Instance-ID', { value: this.runnerEc2.instanceId })
    new CfnOutput(this, 'Runner-Role-Arn', { value: this.runnerRole.roleArn })
 
  }
}