forked from aws-solutions-library-samples/guidance-for-game-server-hosting-using-agones-and-open-match-on-amazon-eks
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathbuildspec.yml
More file actions
206 lines (183 loc) · 9.72 KB
/
buildspec.yml
File metadata and controls
206 lines (183 loc) · 9.72 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
version: 0.2
env:
variables:
REGION: $AWS_REGION
MAX_RETRIES: 5
RETRY_DELAY: 5
phases:
install:
commands:
- echo Installing dependencies...
- sudo yum install -y yum-utils shadow-utils
- sudo yum-config-manager --add-repo https://rpm.releases.hashicorp.com/AmazonLinux/hashicorp.repo
- sudo yum -y install terraform
- terraform --version
- echo "Installing Helm..."
- curl -fsSL -o get_helm.sh https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3
- chmod 700 get_helm.sh
- ./get_helm.sh
- helm version
- echo "Installing jq..."
- sudo yum install -y jq
- echo Installing GetText...
- sudo yum install -y gettext
- gettext --version
- echo Installing Go...
- sudo yum install -y golang
- go version
- echo "Installing kubectl..."
- curl -O https://s3.us-west-2.amazonaws.com/amazon-eks/1.32.0/2024-12-20/bin/linux/amd64/kubectl
- chmod +x ./kubectl
- mkdir -p $HOME/bin && cp ./kubectl $HOME/bin/kubectl && export PATH=$PATH:$HOME/bin
- echo 'export PATH=$PATH:$HOME/bin' >> ~/.bashrc
- kubectl version --client --output=yaml
- echo "Checking Docker version..."
- docker version
- echo "Checking OpenSSL version..."
- openssl version
pre_build:
commands:
- echo Checking out repositories...
- echo "Listing contents of CODEBUILD_SRC_DIR"
- ls -la $CODEBUILD_SRC_DIR
build:
commands:
- echo "Initializing Terraform for cluster creation..."
- |
terraform -chdir=terraform/cluster init \
-backend-config="bucket=${TERRAFORM_STATE_BUCKET}" \
-backend-config="key=${TF_STATE_KEY}" \
-backend-config="region=${AWS_REGION}" \
-backend-config="dynamodb_table=${TERRAFORM_DYNAMO_TABLE}" \
-backend-config="encrypt=true"
- echo "Creating both clusters..."
- |
terraform -chdir=terraform/cluster apply -auto-approve \
-var="cluster_1_name=${CLUSTER1}" \
-var="cluster_1_region=${REGION1}" \
-var="cluster_1_cidr=${CIDR1}" \
-var="cluster_2_name=${CLUSTER2}" \
-var="cluster_2_region=${REGION2}" \
-var="cluster_2_cidr=${CIDR2}" \
-var="cluster_version=${VERSION}" \
-var="admin_role_arn_from_cloudformation=${ADMIN_ROLE_ARN}" \
-var="codebuild_role_arn_from_cloudformation=${CB_SERVICE_ROLE}"
- echo "Step 2 - Terraform Intra-Cluster"
- echo "Initializing Terraform for intra-cluster configuration..."
- |
terraform -chdir=terraform/intra-cluster init \
-backend-config="bucket=${TERRAFORM_STATE_BUCKET}" \
-backend-config="key=intra-cluster-${TF_STATE_KEY}" \
-backend-config="region=${AWS_REGION}" \
-backend-config="dynamodb_table=${TERRAFORM_DYNAMO_TABLE}" \
-backend-config="encrypt=true"
- echo "Deploying to the first cluster (${CLUSTER1})..."
- |
terraform -chdir=terraform/intra-cluster workspace select -or-create=true ${REGION1} &&
terraform -chdir=terraform/intra-cluster apply -auto-approve \
-var="cluster_name=${CLUSTER1}" \
-var="cluster_region=${REGION1}" \
-var="cluster_endpoint=$(terraform -chdir=terraform/cluster output -raw cluster_1_endpoint)" \
-var="cluster_certificate_authority_data=$(terraform -chdir=terraform/cluster output -raw cluster_1_certificate_authority_data)" \
-var="cluster_token=$(terraform -chdir=terraform/cluster output -raw cluster_1_token)" \
-var="cluster_version=${VERSION}" \
-var="oidc_provider_arn=$(terraform -chdir=terraform/cluster output -raw oidc_provider_1_arn)" \
-var="namespaces=[\"agones-openmatch\", \"agones-system\", \"gameservers\", \"open-match\"]" \
-var="configure_agones=true" \
-var="configure_open_match=true"
- echo "Deploying to the second cluster (${CLUSTER2})..."
- |
terraform -chdir=terraform/intra-cluster workspace select -or-create=true ${REGION2} &&
terraform -chdir=terraform/intra-cluster apply -auto-approve \
-var="cluster_name=${CLUSTER2}" \
-var="cluster_region=${REGION2}" \
-var="cluster_endpoint=$(terraform -chdir=terraform/cluster output -raw cluster_2_endpoint)" \
-var="cluster_certificate_authority_data=$(terraform -chdir=terraform/cluster output -raw cluster_2_certificate_authority_data)" \
-var="cluster_token=$(terraform -chdir=terraform/cluster output -raw cluster_2_token)" \
-var="cluster_version=${VERSION}" \
-var="oidc_provider_arn=$(terraform -chdir=terraform/cluster output -raw oidc_provider_2_arn)" \
-var="namespaces=[\"agones-system\", \"gameservers\"]" \
-var="configure_agones=true" \
-var="configure_open_match=false"
- echo "Fetching the load balancer ARN..."
- echo "Updating kubeconfig for Cluster 1..."
- aws eks --region ${REGION1} update-kubeconfig --name ${CLUSTER1}
- kubectl config use-context arn:aws:eks:${REGION1}:$(aws sts get-caller-identity --query Account --output text):cluster/${CLUSTER1}
- echo "Verifying current context..."
- kubectl config current-context
- echo "Setting the Open Match service name"
- export OPEN_MATCH_SVC_NAME=$CLUSTER1-om-fe
- echo "OPEN_MATCH_SVC_NAME=$OPEN_MATCH_SVC_NAME"
- echo "Setting the name of the Load balancer"
- |
export FLB_NAME=$(kubectl get services -n open-match -o json | jq -r --arg OPEN_MATCH_SVC_NAME "$OPEN_MATCH_SVC_NAME" '.items[] | select(.metadata.name==$OPEN_MATCH_SVC_NAME) | .status.loadBalancer.ingress[0].hostname')
- echo "FLB_NAME=$FLB_NAME"
- echo "Retrieving the ARN of the load balancer"
- |
export FLB_ARN=$(aws elbv2 describe-load-balancers --region ${REGION1} | jq -r ".LoadBalancers[] | select(.DNSName==\"$FLB_NAME\") | .LoadBalancerArn")
- echo "FLB_ARN=$FLB_ARN"
- echo "Initializing Terraform for extra-cluster configuration"
- |
terraform -chdir=terraform/extra-cluster init \
-backend-config="bucket=${TERRAFORM_STATE_BUCKET}" \
-backend-config="key=extra-cluster-${TF_STATE_KEY}" \
-backend-config="region=${AWS_REGION}" \
-backend-config="dynamodb_table=${TERRAFORM_DYNAMO_TABLE}" \
-backend-config="encrypt=true"
- echo "Getting values needed by Terraform"
- export VPC1=$(terraform -chdir=terraform/cluster output -raw vpc_1_id)
- export SUBNETS1=$(terraform -chdir=terraform/cluster output gameservers_1_subnets)
- export ROUTE1=$(terraform -chdir=terraform/cluster output -raw private_route_table_1_id)
- export ENDPOINT1=$(terraform -chdir=terraform/cluster output -raw cluster_2_endpoint)
- export AUTH1=$(terraform -chdir=terraform/cluster output -raw cluster_1_certificate_authority_data)
- export TOKEN1=$(terraform -chdir=terraform/cluster output -raw cluster_1_token)
- export VPC2=$(terraform -chdir=terraform/cluster output -raw vpc_2_id)
- export SUBNETS2=$(terraform -chdir=terraform/cluster output gameservers_2_subnets)
- export ROUTE2=$(terraform -chdir=terraform/cluster output -raw private_route_table_2_id)
- export ENDPOINT2=$(terraform -chdir=terraform/cluster output -raw cluster_2_endpoint)
- export AUTH2=$(terraform -chdir=terraform/cluster output -raw cluster_2_certificate_authority_data)
- export TOKEN2=$(terraform -chdir=terraform/cluster output -raw cluster_2_token)
- echo "Creating extra-cluster resources"
- |
terraform -chdir=terraform/extra-cluster apply -auto-approve \
-var="cluster_1_name=${CLUSTER1}" \
-var="requester_cidr=${CIDR1}" \
-var="requester_vpc_id=${VPC1}" \
-var="requester_route=${ROUTE1}" \
-var="cluster_1_gameservers_subnets=${SUBNETS1}" \
-var="cluster_1_endpoint=${ENDPOINT1}" \
-var="cluster_1_certificate_authority_data=${AUTH1}" \
-var="cluster_1_token=${TOKEN1}" \
-var="cluster_2_name=${CLUSTER2}" \
-var="accepter_cidr=${CIDR2}" \
-var="accepter_vpc_id=${VPC2}" \
-var="accepter_route=${ROUTE2}" \
-var="cluster_2_gameservers_subnets=${SUBNETS2}" \
-var="cluster_2_endpoint=${ENDPOINT2}" \
-var="cluster_2_certificate_authority_data=${AUTH2}" \
-var="cluster_2_token=${TOKEN2}" \
-var="cluster_1_region=${REGION1}" \
-var="ecr_region=${REGION1}" \
-var="cluster_2_region=${REGION2}" \
-var="aws_lb_arn=${FLB_ARN}"
- echo "Capturing Terraform output"
- terraform -chdir=terraform/extra-cluster output > terraform_output.txt
- echo "Building and deploying game server fleets..."
- |
chmod +x scripts/deploy-ncat-fleets.sh
sh scripts/deploy-ncat-fleets.sh ${CLUSTER1} ${REGION1} ${CLUSTER2} ${REGION2}
- echo "Integrating Open Match with Agones..."
- |
cd $CODEBUILD_SRC_DIR
kubectl config use-context $(kubectl config get-contexts -o=name | grep "/${CLUSTER1}$")
sh scripts/deploy-matchfunction.sh ${CLUSTER1} ${REGION1}
sh scripts/deploy-director.sh ${CLUSTER1} ${REGION1} ${REGION2}
kubectl get pods -n agones-openmatch
- echo "Open Match integration with Agones completed."
post_build:
commands:
- echo "Build completed on $(date)"
- echo "Terraform Output:"
- cat terraform_output.txt || echo "No terraform_output.txt file found"
- echo "Global Accelerator Address:"
- grep "global_accelerator_address" terraform_output.txt | cut -d '=' -f2 | tr -d ' "' || echo "Global Accelerator address not found in output"