Commands action reference - AWS CodePipeline (original) (raw)

The Commands action allows you to run shell commands in a virtual compute instance. When you run the action, commands specified in the action configuration are run in a separate container. All artifacts that are specified as input artifacts to a CodeBuild action are available inside of the container running the commands. This action allows you to specify commands without first creating a CodeBuild project. For more information, see ActionDeclaration and OutputArtifact in the AWS CodePipeline API Reference.

Important

This action uses CodePipeline managed CodeBuild compute to run commands in a build environment. Running the commands action will incur separate charges in AWS CodeBuild.

Note

The Commands action is only available for V2 type pipelines.

Topics

Considerations for the Commands action

The following considerations apply for the Commands action.

Note

Running the commands action will incur separate charges in AWS CodeBuild.

Note

Because the isolated build environment is used at the account level, an instance might be reused for another pipeline execution.

Service role policy permissions

When CodePipeline runs the action, CodePipeline creates a log group using the name of the pipeline as follows. This enables you to scope down permissions to log resources using the pipeline name.

/aws/codepipeline/MyPipelineName

If you are using an existing service role, to use the Commands action, you will need to add the following permissions for the service role.

In the service role policy statement, scope down the permissions to the pipeline level as shown in the following example.

{
    "Effect": "Allow",
    "Action": [
        "logs:CreateLogGroup",
        "logs:CreateLogStream",
        "logs:PutLogEvents"
    ],
    "Resource": [
        "arn:aws:logs:*:YOUR_AWS_ACCOUNT_ID:log-group:/aws/codepipeline/YOUR_PIPELINE_NAME",
        "arn:aws:logs:*:YOUR_AWS_ACCOUNT_ID:log-group:/aws/codepipeline/YOUR_PIPELINE_NAME:*"
   ]
}

To view logs in the console using the action details dialog page, the permission to view logs must be added to the console role. For more information, see the console permissions policy example in Permissions required to view compute logs in the CodePipeline console.

Action type

Configuration parameters

Commands

Required: Yes

You can provide shell commands for the Commands action to run. In the console, commands are entered on separate lines. In the CLI, commands are entered as separate strings.

Note

Multi-line formats are not supported and will result in an error message. Single-line format must be used for entering commands in theCommands field.

Important

The EnvironmentType and ComputeType values match those in CodeBuild. We support a subset of the available types. For more information, seeBuild Environment Compute Types.

EnvironmentType

Required: No

The OS image for the build environment that supports the Commands action. The following are valid values for build environments:

The selection for EnvironmentType will then allow the compute type for that OS in the ComputeType field. For more information about the CodeBuild compute types available for this action, see the Build environment compute modes and types reference in the CodeBuild User Guide.

Note

If not specified, the compute defaults to the following for the build environment:

ComputeType

Required: No

Based on the selection for EnvironmentType, the compute type can be provided. The following are available values for compute; however, note that the options available can vary by OS.

Important

Some compute types are not compatible with certain environment types. For example, WINDOWS_SERVER_2022_CONTAINER is not compatible with BUILD_GENERAL1_SMALL. Using incompatible combinations causes the action to fail and generates a runtime error.

outputVariables

Required: No

Specify the names of the variables in your environment that you want to export. For a reference of CodeBuild environment variables, see Environment variables in build environments in the CodeBuild User Guide.

Files

Required: No

You can provide files that you want to export as output artifacts for the action.

The supported format for files is the same as for CodeBuild file patterns. For example, enter **/ for all files. For more information, seeBuild specification reference for CodeBuild in the CodeBuild User Guide.

The Edit action page for a new pipeline with the Commands action

VpcId

Required: No

The VPC ID for your resources.

Subnets

Required: No

The subnets for the VPC. This field is needed when your commands need to connect to resources in a VPC.

SecurityGroupIds

Required: No

The security groups for the VPC. This field is needed when your commands need to connect to resources in a VPC.

The following is a JSON example of the action with configuration fields shown for environment and compute type, along with example environment variable.

 {
            "name": "Commands1",
            "actionTypeId": {
              "category": "Compute",
              "owner": "AWS",
              "provider": "Commands",
              "version": "1"
            },
            "inputArtifacts": [
              {
                "name": "SourceArtifact"
              }
            ],
            "commands": [
              "ls",
              "echo hello",
              "echo $BEDROCK_TOKEN",
            ],
            "configuration": {
              "EnvironmentType": "LINUX_CONTAINER",
              "ComputeType": "BUILD_GENERAL1_MEDIUM"
            },
            "environmentVariables": [
              {
                "name": "BEDROCK_TOKEN",
                "value": "apiTokens:bedrockToken",
                "type": "SECRETS_MANAGER"
              }
            ],
            "runOrder": 1
          }

Input artifacts

Output artifacts

Environment variables

Key

The key in a key-value environment variable pair, such asBEDROCK_TOKEN.

Value

The value for the key-value pair, such asapiTokens:bedrockToken. The value can be parameterized with output variables from pipeline actions or pipeline variables.

When using the SECRETS_MANAGER type, this value must be the name of a secret you have already stored in AWS Secrets Manager.

Type

Specifies the type of use for the environment variable value. The value can be either PLAINTEXT or SECRETS_MANAGER. If the value is SECRETS_MANAGER, provide the Secrets reference in theEnvironmentVariable value. When not specified, this defaults to PLAINTEXT.

Note

We strongly discourage the use of plaintext environment variables to store sensitive values, especially AWS credentials. When you use the CodeBuild console or AWS CLI, plaintext environment variables are displayed in plain text. For sensitive values, we recommend that you use the SECRETS_MANAGER type instead.

Note

When you enter the name, value, and type for your environment variables configuration, especially if the environment variable contains CodePipeline output variable syntax, do not exceed the 1000-character limit for the configuration’s value field. A validation error is returned when this limit is exceeded.

For an example action declaration showing an environment variable, see Configuration parameters.

Note
{  
            "Effect": "Allow",  
            "Action": [  
                "secretsmanager:GetSecretValue"  
            ],  
            "Resource": [  
                "SECRET_ARN"  
            ]  
        }  

Service role permissions: Commands action

For Commands support, add the following to your policy statement:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "logs:CreateLogGroup",
                "logs:CreateLogStream",
                "logs:PutLogEvents"
            ],
            "Resource": [
                "arn:aws:logs:{{region}}:{{customerAccountId}}:log-group:/aws/codepipeline/{{pipelineName}}",
                "arn:aws:logs:{{region}}:{{customerAccountId}}:log-group:/aws/codepipeline/{{pipelineName}}:log-stream:*"
            ]
        }
    ]
}

Action declaration (example)

YAML

name: Commands_action
actionTypeId:
  category: Compute
  owner: AWS
  provider: Commands
  version: '1'
runOrder: 1
configuration: {}
commands:
- ls
- echo hello
- 'echo pipeline Execution Id is #{codepipeline.PipelineExecutionId}'
outputArtifacts:
- name: BuildArtifact
  files:
  - **/
inputArtifacts:
- name: SourceArtifact
outputVariables:
- AWS_DEFAULT_REGION
region: us-east-1
namespace: compute

JSON

{
    "name": "Commands_action",
    "actionTypeId": {
        "category": "Compute",
        "owner": "AWS",
        "provider": "Commands",
        "version": "1"
    },
    "runOrder": 1,
    "configuration": {},
    "commands": [
        "ls",
        "echo hello",
        "echo pipeline Execution Id is #{codepipeline.PipelineExecutionId}"
    ],
    "outputArtifacts": [
        {
            "name": "BuildArtifact",
            "files": [
                "**/"
            ]
        }
    ],
    "inputArtifacts": [
        {
            "name": "SourceArtifact"
        }
    ],
    "outputVariables": [
        "AWS_DEFAULT_REGION"
    ],
    "region": "us-east-1",
    "namespace": "compute"
}

See also

The following related resources can help you as you work with this action.