{"id":2122,"date":"2021-01-08T12:21:25","date_gmt":"2021-01-08T11:21:25","guid":{"rendered":"https:\/\/blog.besharp.it\/?p=2122"},"modified":"2023-02-22T17:19:02","modified_gmt":"2023-02-22T16:19:02","slug":"new-aws-ec2-mac-instances-a-ci-cd-test-bench","status":"publish","type":"post","link":"https:\/\/blog.besharp.it\/new-aws-ec2-mac-instances-a-ci-cd-test-bench\/","title":{"rendered":"New AWS EC2 Mac Instances: our test bench with CI\/CD"},"content":{"rendered":"\n
During the last AWS re:Invent, AWS made one of the most discussed announcement, that \u2014 on paper \u2014 opens a lot of new scenarios: AWS EC2 Mac Instances! At this point \u2014 assuming that you never heard about Amazon EC2 Mac Instances hardware specifications \u2014 you may wonder what are the supported sizes. Well, as far as now, you can forget the word “choice”: AWS allows you to run only one size of Mac Instances. mac1.metal instances’ hardware specifications tell us that they’re powered by an Intel Coffee Lake processor running at 3.2 GHz \u2014 that can burst up to 4.6 GHz \u2014 and 32 GiB of memory. As explained by Jeff Barr in the AWS News Blog, instances run in a VPC, include ENA networking, and are natively Optimized for communication with EBS volumes, supporting I\/O intensive workloads.<\/p>\n\n\n\n In my daily routine, my working partner is a macOS laptop that I had to update to the new macOS Big Sur operating system. So far it didn’t bring me tangible enhancements, but it’s quite a best-practice to keep your system up to date, at least on your workstation. AWS EC2 Mac Instances come with a limitation in that sense: only Mojave or Catalina macOS versions can be selected. Mojave and Catalina AMIs come with the AWS CLI, Command Line Tools for Xcode, Homebrew, and SSM Agent already installed. AWS is working to add support for Big Sur, and for Apple M1 Chip.<\/p>\n\n\n\n Now, let’s focus on what I like the most: practical use cases!<\/p>\n\n\n\n I started my career as a developer, and I guess every developer’s mind made \u2014 at least \u2014 an association between this announcement and the possibility to automate building, testing, and signing of macOS and iOS applications.<\/p>\n\n\n\n During the last year, my team has been developing an Open-Source Desktop Application that manages local credentials to access complex Cloud Environments. Our application is written in TypeScript, interpreted by Node.js. We used Angular as our development framework, which runs on top of an Electron engine for cross-platform compatibility.<\/p>\n\n\n\n Electron comes with a native application builder, called electron-builder, that we used to write custom build scripts in our package.json file, which contains dependencies specifications too. We wrote custom scripts to build Linux, Windows, and macOS binaries.<\/p>\n\n\n\n In order to build the macOS binary, the script needs to have access to the Signing Certificate and to the Apple Notarisation Password. They allow, respectively, to sign and notarize the macOS binary. We usually store these secrets in our macOS Keychain, run the build scripts on our local environments, and manually upload the artifacts on our GitHub repository as a new release. This is a common practice adopted by many developers when building macOS or iOS applications.<\/p>\n\n\n\n This process is slow, cumbersome, and may lead to human errors. But hey, there seems to be a new opportunity out there for us. What better Use Case for the new Amazon EC2 Mac Instances than building our application’s macOS binary?<\/p>\n\n\n\n It’s time to focus on how I set up the test bench. We will go through the following steps:<\/p>\n\n\n\n The first thing we’ve to do to get our pipeline set up consists of the creation of the Amazon EC2 Mac Instance on which we’re going to install and configure Jenkins.<\/p>\n\n\n\n Let’s jump into the AWS console!<\/p>\n\n\n\n As for any other EC2 instance, the launch wizard of a mac1.metal kicks off from EC2 console, in the “Instances” section. As many of you already know, here you can find the list of EC2 instances available and \u2014 among the others \u2014 the menu needed to launch a new instance.<\/p>\n\n\n\n Since the 30 November 2020, the AMI list is richer: indeed, it shows both Mojave and Catalina AMIs; for our purposes, I choose Catalina.<\/p>\n\n\n\n To allow the installation of the heavy-weight Xcode \u2014 which provides some critical build tools \u2014 attach an EBS root volume with an appropriate size to the instance; in my case, I choose to attach a 100GiB-sized EBS volume.<\/p>\n\n\n\n Before diving into Mac Instance access types, remember to setup Security Group rules that allow you to reach it through SSH and VNC. Moreover, I configured a rule to allow access through my browser to port 8080 of the instance, i.e. the one associated with the Jenkins service. Since I decided to run the instance in a public subnet, I restricted access to the instance only to my IP address.<\/p>\n\n\n\n DISCLAIMER: it works, but please note that the setup I used \u2014 in terms of networking \u2014 cannot be considered production-ready! To make it more secure, it is enough to move the Mac Instance inside a private subnet, and place an OpenVPN server in the public subnet; that way, the mac1.metal instance is no more exposed directly to the internet and we can access it by the means of the OpenVPN server.<\/p>\n\n\n\n In the last step of the instance creation wizard, we’ve to choose whether to select an existing .pem key or to create a new one to access the instance via SSH. That’s the first access type available, and it’s no different from SSH access to an Amazon Linux instance; indeed, the username for Mac Instances is ec2-user.<\/p>\n\n\n\n But wait \u2014 as AWS Technical Evangelist S\u00e9bastien Stormacq explains in this video<\/a> \u2014 there is something you’ve to configure on the instance before having the possibility to access it. In particular, you’ve to set a password for the ec2-user, and enable the VNC server. Here is the GitHub Gist I’ve followed, and that is very precious to me:<\/p>\n\n\n\n **NOTE:** 45-49 lines are critical in the sense that, without them, you’ll not be able to install Xcode; the initial APFS container size is not large enough to accommodate Xcode.<\/p>\n\n\n\n And that’s all for what concerns access types.<\/p>\n\n\n\n The build pipeline that we are going to configure comes with some prerequisites that we’ve to satisfy. So, what are these prerequisites?<\/p>\n\n\n\n Where possible, I relied on brew to install packages. In particular, I’ve used it to install Java and Jenkins; then, I’ve installed Xcode from the App Store, providing my Apple Credentials.<\/p>\n\n\n\n Install Xcode first, the process is straightforward: open the App Store, search for Xcode, and install it.<\/p>\n\n\n\n Now, let’s focus on Java. I choose Java AdoptOpenJDK 11 version, which can be installed using brew in this way:<\/p>\n\n\n\n To install Jenkins, I’ve used the following command:<\/p>\n\n\n\n Once installed, we’ve to make Jenkins accessible from outside by modifying the \/usr\/local\/opt\/jenkins-lts\/homebrew.mxcl.jenkins-lts.plist file. In particular, we’ve to change the –httpListenAddress option from 127.0.0.1 to 0.0.0.0. Then, simply start the service using the following command:<\/p>\n\n\n\n Jenkins’s initial configuration involves three steps:<\/p>\n\n\n\n Before focusing on the build job, let’s create all the credentials and secrets needed to pull the code from the repo, sign the binary, notarize it, and finally push the artifacts back to the GitHub repo as a new release draft.<\/p>\n\n\n\n So, what are the credentials and secrets needed by the build job?<\/p>\n\n\n\n I set them as global secrets from The GitHub personal access token 2<\/strong> secret is different from the first one, in the sense that it is used to push the artifacts back to the GitHub repo, while the first one is used to pull the code from the repo.<\/p>\n\n\n\n We can start the Build Job configuration wizard by clicking “New Item” from the sidebar on the left of the Dashboard. For what concerns this wizard, we’ll go into the details of Source Code Management, Build Triggers, Build Environment Bindings, and Build sections.<\/p>\n\n\n\n In the Source Code Management section, we’ve to specify the coordinates of our GitHub repository, providing access credentials, repo URL, and the branch from which Jenkins will pull the code from.<\/p>\n\n\n\n Apart from step 3 and step 4, you may wonder what add-osx-cert.sh and dist-mac-prod scripts consist of. Therefore, I want to provide you their implementation.<\/p>\n\n\n\n For the sake of this article, the important part of the dist-mac-prod script is<\/p>\n\n\n\n which triggers the build of the binary.<\/p>\n\n\n\n Inside the package.json file, there is another important part that we’ve to specify, and that is included in the “build” section; let’s show that down here.<\/p>\n\n\n\n As you can see, I’m requesting to push the artifact to the ericvilla\/leapp repo \u2014 which is a fork of https:\/\/github.com\/Noovolari\/leapp<\/a> \u2014 as a new DRAFT release.<\/p>\n\n\n\n Moreover, I specified to run the script\/notarize.js script after signing. This script is responsible for macOS application notarisation, and is implemented as follows:<\/p>\n\n\n\n It relies on electron-notarize package and looks for APPLE_NOTARISATION_PASSWORD environment variable; if it is not available, it assumes you’re running the build in your local environment. Therefore, it looks for appleIdPassword inside the System’s Keychain.<\/p>\n\n\n\n Last but not least, I had to install a Node.js version from inside Jenkins in order to build the solution correctly. To do that, move to the “Manage Jenkins” section, accessible from the left sidebar. Once inside it, click “Global Tool Configuration”; there you can install the Node.js version you need. In my case, I’ve installed Node.js 12.9.1 version.<\/p>\n\n\n\n If Jenkins service is running and the Build Job is set up, it checks for new pushes on the GitHub repo, and triggers the build process.<\/p>\n\n\n\n
Don’t worry, we will deepen one of these scenarios later on in this blog post, but let’s first introduce this new instance type.
Amazon EC2 Mac Instances come with an 80s name, which makes them more attractive to those of you who are a little bit older than me?
They’re called mac1.metal<\/strong> instances.
Talking about hardware, Amazon EC2 Mac Instances are backed by Mac mini hosts, that rely on AWS Nitro controllers to connect with AWS network infrastructure and services. The interesting point is that Mac Instances are connected to the Nitro System through the Thunderbolt 3 interface. I used the term “host” to highlight the fact that we’re not dealing with Virtual Machines, but with Dedicated Hosts; whenever I decide to run an Amazon EC2 Mac Instance, AWS provisions a concrete Mac mini host for my purposes.<\/p>\n\n\n\nmac1.metal \u2014 the specs<\/h3>\n\n\n\n
A practical Use Case<\/h3>\n\n\n\n
\n
Launch a mac1.metal instance<\/h3>\n\n\n\n
<\/figure>\n\n\n\n
When it comes to choosing the instance type, there is only one available, called mac1.metal. As we already know, it is characterized by 12 vCPUs running at 3.2GHz and 32GiB of memory. If you think of it as your workstation it does not sound that weird!<\/p>\n\n\n\n<\/figure>\n\n\n\n
In the rest of the wizard, we can treat our Mac Instance like any other instance type; the only thing that we should take particular attention to is the tenancy. We’re going to launch the instance on a Dedicated Host that we can request \u2014 on a separate tab \u2014 during the instance creation process. Even for the Dedicated Host, we’ve to specify mac1.metal as the type of instances that can be launched on it.<\/p>\n\n\n\n<\/figure>\n\n\n\n
For the sake of this proof of concept, I decided to run the instance in a public subnet, and enable Public IP auto-assignment.<\/p>\n\n\n\nWhat about access types?<\/h3>\n\n\n\n
<\/figure>\n\n\n\n
If you need graphical access to the instance \u2014 which will be needed while installing packages and tools \u2014 you can use VNC; if you’re a macOS user, you can rely on VNC Viewer software to setup the connection to your mac1.metal instance.<\/p>\n\n\n\n\n
1<\/td> # YouTube (english) : https:\/\/www.youtube.com\/watch?v=FtU2_bBfSgM<\/td><\/tr>\n 2<\/td> # YouTube (french) : https:\/\/www.youtube.com\/watch?v=VjnaVBnERDU<\/td><\/tr>\n 3<\/td> <\/td><\/tr>\n 4<\/td> #<\/td><\/tr>\n 5<\/td> # On your laptop, connect to the Mac instance with SSH (similar to Linux instances)<\/td><\/tr>\n 6<\/td> #<\/td><\/tr>\n 7<\/td> ssh -i 8<\/td> <\/td><\/tr>\n 9<\/td> #<\/td><\/tr>\n 10<\/td> # On the Mac<\/td><\/tr>\n 11<\/td> #<\/td><\/tr>\n 12<\/td> <\/td><\/tr>\n 13<\/td> # Set a password for ec2-user<\/td><\/tr>\n 14<\/td> <\/td><\/tr>\n 15<\/td> sudo passwd ec2-user <\/td> <\/tr>\n 16<\/td> <\/td><\/tr>\n 17<\/td> # Enable VNC Server (thanks arnib@amazon.com for the feedback and tests) <\/td> <\/tr>\n 18<\/td> <\/td><\/tr>\n 19<\/td> sudo \/System\/Library\/CoreServices\/RemoteManagement\/ARDAgent.app\/Contents\/Resources\/kickstart \\<\/td><\/tr>\n 20<\/td> -activate -configure -access -on \\<\/td><\/tr>\n 21<\/td> -configure -allowAccessFor -specifiedUsers \\<\/td><\/tr>\n 22<\/td> -configure -users ec2-user \\<\/td><\/tr>\n 23<\/td> -configure -restart -agent -privs -all<\/td><\/tr>\n 24<\/td> <\/td><\/tr>\n 25<\/td> sudo \/System\/Library\/CoreServices\/RemoteManagement\/ARDAgent.app\/Contents\/Resources\/kickstart \\<\/td><\/tr>\n 26<\/td> -configure -access -on -privs -all -users ec2-user<\/td><\/tr>\n 27<\/td> <\/td><\/tr>\n 28<\/td> exit<\/td><\/tr>\n 29<\/td> <\/td><\/tr>\n 30<\/td> #<\/td><\/tr>\n 31<\/td> # On your laptop<\/td><\/tr>\n 32<\/td> # Create a SSH tunnel to VNC and connect from a vnc client using user ec2-user and the password you defined.<\/td><\/tr>\n 33<\/td> #<\/td><\/tr>\n 34<\/td> <\/td><\/tr>\n 35<\/td> ssh -L 5900:localhost:5900 -C -N -i 36<\/td> <\/td><\/tr>\n 37<\/td> # open another terminal <\/td> <\/tr>\n 38<\/td> <\/td><\/tr>\n 39<\/td> open vnc:\/\/localhost <\/td> <\/tr>\n 40<\/td> <\/td><\/tr>\n 41<\/td> #<\/td><\/tr>\n 42<\/td> # On the mac, resize the APFS container to match EBS volume size<\/td><\/tr>\n 43<\/td> #<\/td><\/tr>\n 44<\/td> <\/td><\/tr>\n 45<\/td> PDISK=$(diskutil list physical external | head -n1 | cut -d” ” -f1)<\/td><\/tr>\n 46<\/td> APFSCONT=$(diskutil list physical external | grep “Apple_APFS” | tr -s ” ” | cut -d” ” -f8)<\/td><\/tr>\n 47<\/td> sudo diskutil repairDisk $PDISK<\/td><\/tr>\n 48<\/td> # Accept the prompt with “y”, then paste this command<\/td><\/tr>\n 49<\/td> sudo diskutil apfs resizeContainer $APFSCONT 0<\/td><\/tr>\n 50<\/td> <\/td><\/tr>\n 51<\/td> <\/td><\/tr>\n 52<\/td> <\/td><\/tr>\n 53<\/td> <\/td><\/tr>\n 54<\/td> <\/td><\/tr>\n 55<\/td> <\/td><\/tr>\n <\/table>\n <\/div>\n <\/div>\n\n\n\n Let’s install some packages and tools<\/h3>\n\n\n\n
\n
# Update brew first of all\nbrew update\n\n# Add adoptopenjdk\/openjdk repository\nbrew tap adoptopenjdk\/openjdk\n\n# Install Java AdoptOpenJDK 11\nbrew install --cask adoptopenjdk11\n<\/pre>\n\n\n\n
brew install jenkins-lts<\/pre>\n\n\n\n
brew services start jenkins-lts<\/pre>\n\n\n\n
Jenkins initial configuration<\/h3>\n\n\n\n
\n
Credentials & Secrets<\/h3>\n\n\n\n
\n
<\/figure>\n\n\n\n
Build Job configuration<\/h3>\n\n\n\n
<\/figure>\n\n\n\n
I’ve decided to make Jenkins check for newly available commits every 5 minutes, in a polling fashion; the alternative consists of setting up a Jenkins webhook invoked directly by GitHub, in a push fashion.<\/p>\n\n\n\n<\/figure>\n\n\n\n
Next step: Environment Variables, which I referred to as Build Environment Bindings<\/strong>. Here we have simply to assign the previously configured credentials and secrets to environment variables used in the Build Job’s steps.<\/p>\n\n\n\n<\/figure>\n\n\n\n
And finally, let’s add the build steps! I divided the build in five steps, i.e. five Execute shell commands, which I want to illustrate down here.<\/p>\n\n\n\n# Step 1\nchmod +x .\/scripts\/add-osx-cert.sh\n\n# Step 2\n.\/scripts\/add-osx-cert.sh\n\n# Step 3\nnpm install\n\n# Step 4\nnpm run rebuild-keytar\n\n# Step 5\nnpm run dist-mac-prod<\/pre>\n\n\n\n
\n
#!\/usr\/bin\/env sh\n\nKEY_CHAIN=build.keychain\nCERTIFICATE_P12=certificate.p12\n\necho \"Recreate the certificate from the secure environment variable\"\necho $CERTIFICATE_OSX_P12 | base64 --decode > $CERTIFICATE_P12\n\necho \"security create-keychain\"\nsecurity create-keychain -p jenkins $KEY_CHAIN\necho \"security list-keychains\"\nsecurity list-keychains -s login.keychain build.keychain\necho \"security default-keychain\"\nsecurity default-keychain -s $KEY_CHAIN\necho \"security unlock-keychain\"\nsecurity unlock-keychain -p jenkins $KEY_CHAIN\necho \"security import\"\nsecurity import $CERTIFICATE_P12 -k $KEY_CHAIN -P \"\" -T \/usr\/bin\/codesign;\necho \"security find-identity\"\nsecurity find-identity -v\necho \"security set-key-partition-list\"\nsecurity set-key-partition-list -S apple-tool:,apple:,codesign:, -s -k jenkins $KEY_CHAIN\n\n# Remove certs\nrm -fr *.p12<\/pre>\n\n\n\n
\n
\"dist-mac-prod\": \"rm -rf electron\/dist && rm -rf release && rm -rf dist && tsc --p electron && ng build --aot --configuration production --base-href .\/ && mkdir -p electron\/dist\/electron\/assets\/images && cp -a electron\/assets\/images\/* electron\/dist\/electron\/assets\/images\/ && electron-builder build --publish=onTag\",<\/pre>\n\n\n\n
electron-builder build --publish=onTag<\/pre>\n\n\n\n
# ...\n\"build\": {\n \"publish\": [\n {\n \"provider\": \"github\",\n \"owner\": \"ericvilla\",\n \"repo\": \"leapp\",\n \"releaseType\": \"draft\"\n }\n ],\n \"afterSign\": \"scripts\/notarize.js\",\n# ...<\/pre>\n\n\n\n
const { notarize } = require('electron-notarize');\n\nexports.default = async function notarizing(context) {\n const { electronPlatformName, appOutDir } = context;\n if (electronPlatformName !== 'darwin') {\n return;\n }\n\n const appName = context.packager.appInfo.productFilename;\n\n return await notarize({\n appBundleId: 'com.noovolari.leapp',\n appPath: `${appOutDir}\/${appName}.app`,\n appleId: \"mobile@besharp.it\",\n appleIdPassword: process.env.APPLE_NOTARISATION_PASSWORD ? process.env.APPLE_NOTARISATION_PASSWORD :\n \"@keychain:Leapp\",\n });\n};<\/pre>\n\n\n\n
<\/figure>\n\n\n\n
Here we are, at the end of the Build Job configuration!<\/p>\n\n\n\n