Customize Go Builds on AWS SAM with Dockerfiles and Makefiles
This post continues the series Building APPS with AWS SAM and Go, building upon the first installment. The previous chapter highlighted AWS's limited guidance on structuring scalable Go projects without redundant code.
This article demonstrates techniques for managing build processes using Dockerfiles and Makefiles.
The accompanying code is available here: https://www.php.cn/link/5655cf23be4dda7082c8bb3a8d8f8016. Explore the different Git branches for various use cases.
Let's begin!
The Challenge
After developing a new project structure, I chose Nix for dependency management (languages, tools, libraries). Nix operates by creating a temporary shell with the specified dependencies.
I encountered an error when executing binaries built within a Nix shell:
<code>libc.so.6 not found in /nix/23fj39chsggb09s.libc</code>
This halted Lambda execution. Debugging revealed the root cause: Go sometimes dynamically links C libraries to executables, specifying system paths. The libraries linked to Nix-built executables were:
<code>$ ldd bootstrap linux-vdso.so.1 (0x00007ffff7fc4000) libresolv.so.2 => /nix/store/65h17wjrrlsj2rj540igylrx7fqcd6vq-glibc-2.40-36/lib/libresolv.so.2 (0x00007ffff7fac000) libpthread.so.0 => /nix/store/65h17wjrrlsj2rj540igylrx7fqcd6vq-glibc-2.40-36/lib/libpthread.so.0 (0x00007ffff7fa7000) libc.so.6 => /nix/store/65h17wjrrlsj2rj540igylrx7fqcd6vq-glibc-2.40-36/lib/libc.so.6 (0x00007ffff7c00000) /nix/store/65h17wjrrlsj2rj540igylrx7fqcd6vq-glibc-2.40-36/lib/ld-linux-x86-64.so.2 => /nix/store/65h17wjrrlsj2rj540igylrx7fqcd6vq-glibc-2.40-36/lib64/ld-linux-x86-64.so.2 (0x00007ffff7fc6000)</code>
Nix's non-standard dependency storage, combined with Lambda's isolated Docker containers, prevented the Lambda from locating these libraries, as they only existed in my local Nix installation. A solution was needed to instruct AWS SAM on how to compile the code and manage library linking.
Deploying Go Projects to AWS
Two deployment methods exist:
Zip Files ?
Compile locally and send the executable to AWS in a .zip file. AWS copies the executable to the Docker container. This offers the fastest cold starts.
Docker Images ?
Provide AWS with instructions to compile within the execution Docker container. This ensures compatibility but results in slower cold starts.
Solutions
I opted for Dockerfiles to continue using Nix, but both methods are presented below.
Zip Files ?
For Zip files, use this project structure (note the Makefile):
<code>. ├── cmd/ │ ├── function1/ │ │ └── function1.go # contains main() │ └── function2/ │ └── function2.go # contains main() ├── internal/ │ └── SHAREDFUNC.go ├── Makefile ├── go.mod ├── go.sum ├── samconfig.toml └── template.yaml</code>
The Makefile defines build commands for each function using the build-<function_name>
pattern (required by AWS SAM):
<code>.PHONY: build build: sam build build-HelloWorldFunction: GOARCH=amd64 GOOS=linux go build -tags lambda.norpc -o bootstrap ./cmd/function1/main.go cp ./bootstrap $(ARTIFACTS_DIR) build-ByeWorldFunction: GOARCH=amd64 GOOS=linux go build -tags lambda.norpc -o bootstrap ./cmd/function2/main.go cp ./bootstrap $(ARTIFACTS_DIR)</code>
Inform SAM of this process:
<code> HelloWorldFunction: Type: AWS::Serverless::Function Metadata: BuildMethod: makefile Properties: CodeUri: ./ Handler: bootstrap Runtime: provided.al2023 Architectures: - x86_64 Events: CatchAll: Type: Api Properties: Path: /hello Method: GET</code>
BuildMethod: makefile
tells SAM to use the Makefile, located where CodeUri
specifies.
Docker Images ?
Create a Dockerfile
and .dockerignore
in the root directory:
<code>. ├── cmd/ │ ├── function1/ │ │ └── function1.go # contains main() │ └── function2/ │ └── function2.go # contains main() ├── internal/ │ └── SHAREDFUNC.go ├── Dockerfile ├── .dockerignore ├── go.mod ├── go.sum ├── samconfig.toml └── template.yaml</code>
The Dockerfile
specifies build steps. ARG ENTRY_POINT
specifies the lambda entry point at build time:
<code>FROM public.ecr.aws/docker/library/golang:1.19 as build-image ARG ENTRY_POINT # !IMPORTANT WORKDIR /src COPY go.mod go.sum ./ RUN go mod download COPY . . RUN go build -tags lambda.norpc -o lambda-handler ${ENTRY_POINT} FROM public.ecr.aws/lambda/provided:al2023 COPY --from=build-image /src/lambda-handler . ENTRYPOINT ./lambda-handler</code>
Modify template.yaml
:
<code>libc.so.6 not found in /nix/23fj39chsggb09s.libc</code>
Note Metadata
and PackageType: Image
. DockerBuildArgs
passes ENTRY_POINT
from the Dockerfile
, allowing a single Dockerfile
for all lambdas.
Conclusion
This detailed explanation provides a comprehensive approach to managing Go builds within AWS SAM using both Zip files and Docker images. The choice depends on the priorities of build speed versus deployment consistency.
The above is the detailed content of Customize Go Builds on AWS SAM with Dockerfiles and Makefiles. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

OpenSSL, as an open source library widely used in secure communications, provides encryption algorithms, keys and certificate management functions. However, there are some known security vulnerabilities in its historical version, some of which are extremely harmful. This article will focus on common vulnerabilities and response measures for OpenSSL in Debian systems. DebianOpenSSL known vulnerabilities: OpenSSL has experienced several serious vulnerabilities, such as: Heart Bleeding Vulnerability (CVE-2014-0160): This vulnerability affects OpenSSL 1.0.1 to 1.0.1f and 1.0.2 to 1.0.2 beta versions. An attacker can use this vulnerability to unauthorized read sensitive information on the server, including encryption keys, etc.

Backend learning path: The exploration journey from front-end to back-end As a back-end beginner who transforms from front-end development, you already have the foundation of nodejs,...

Under the BeegoORM framework, how to specify the database associated with the model? Many Beego projects require multiple databases to be operated simultaneously. When using Beego...

The library used for floating-point number operation in Go language introduces how to ensure the accuracy is...

Queue threading problem in Go crawler Colly explores the problem of using the Colly crawler library in Go language, developers often encounter problems with threads and request queues. �...

The problem of using RedisStream to implement message queues in Go language is using Go language and Redis...

The difference between string printing in Go language: The difference in the effect of using Println and string() functions is in Go...

What should I do if the custom structure labels in GoLand are not displayed? When using GoLand for Go language development, many developers will encounter custom structure tags...
