Updates from November, 2021 Toggle Comment Threads | Keyboard Shortcuts

  • ThomasPowell 7:34 am on November 30, 2021 Permalink | Reply  

    Commodore Maze Generator on AWS Lambda via API Gateway 

    The Commodore Maze Generator Program

    I needed something “useful” to output from my Commodore VICE Lambda Custom Runtime that also didn’t require much input (if any) from the requester. Otherwise, I’d have to sanitize the input that is being passed to a shell script and potentially validate it if I didn’t want unpredictable behavior. I settled on a Commodore 128 version of the Commodore Maze Generator (the fast and slow will be unnecessary once we launch from the Lambda with the -warp option on VICE, but I never changed the program so it’s left in here. The fast and slow and everything before line 50 is Commodore 128 BASIC 7.0-specific, but the Commodore 64 version just requires substitution of POKE commands instead. (See vice-lambda repo on GitHub for latest version)

    5 fast
    10 scnclr
    20 color 0,2
    30 color 4,2
    40 color 5,1
    50 for y=1 to 25
    60 for x=1 to 40
    70 print chr$(205.5+rnd(1));
    80 next x
    90 next y
    95 slow
    100 goto 100

    Making sure that the Lambda returns an image for Lambda

    I want to be able to use Lambda Proxy Integration when setting up the API Gateway, so I need to return a format that maps the information properly. The response JSON needs to have:

    • isBase64Encoded set to true (necessary for the translation of the PNG back from base64)
    • headers with "Content-type" and "content-disposition" set (image/png and inline for this example)
    • statusCode of 200 (right now, if we have an error it’s either not caught or happens at the Lambda invocation level)
    • body containing the base64 data. Note the -w 0 argument to turn off line breaks when wrapping… Lambda Proxy Integration doesn’t handle that well.
    function handler() {
      cd vice
      SEED=$((0 - `od -An -N2 -i /dev/random`))
      ./x128 -silent -sound -keybuf "
      3 i=rnd($SEED)
      `cat ../maze.bas`
      " -warp -limitcycles 20000000 -exitscreenshotvicii /tmp/$1.png 2>&1 >/dev/null
      cd ..
      RESPONSE="{\"isBase64Encoded\": true, \"headers\": {\"Content-type\": \"image/png\", \"content-disposition\":\"inline\"}, \"statusCode\":200, \"body\":\"`base64 -w 0 /tmp/$1.png`\"}"
      echo $RESPONSE

    Also note that we’re passing in a SEED value because, otherwise, the Commodore 128 will generate the same maze every time.

    Repackage the Lambda and upload as in the Commodore VICE Lambda Custom Runtime blog post.

    Setting up the API Gateway

    Go to API Gateway in the AWS Console and select [Create API]

    APIs Create API

    Choose [Build] under “REST API” (we won’t be using OIDC/OAuth2/CORS…)

    REST API -> Build

    Choose REST, New API, and name your API:

    REST, New API, API Name

    Create a GET Method and check the checkmark

    Create Method
    API Method verb selection -> GET
    Check the checkmark to commit
    • Choose “Lambda Function” for your Integration Type
    • Check “Use Lambda Proxy Integration”
    • Type the name of the Lambda that you’ve calling and select it and [Save] and confirm that you want to add role/permission for the Lambda.
    GET API configuration

    Deploy the API

    Back on your API view, select the [Actions] dropdown and [Deploy API]

    API Actions "Deploy API"

    Just create a new dev stage… we’re not going to “production” with this experiment

    Create new dev stage

    and [Deploy]

    It’s broken

    If you click the Invoke URL presented, you will get a broken image

    Invoke URL
    Broken image from the API

    Since we’re only sending back PNG files, we can just tell the API that */* is a Binary Media Type by going to Settings on the left sidebar for the API and [(+) Add Binary Media Type]

    Add Binary Media Type

    Be sure to save the settings, redeploy the API and be sure to use the Invoke URL for the correct API! (I had two identical and was “fixing” the wrong one… hence the different API URL snapshots)

    Commodore Maze Generator PNG 1

    If you refresh, you should get a new maze from the Commodore maze generator program:

    Commodore Maze Generator run 2

    Some Troubleshooting

    • Be sure to save your settings
    • Test your API call to Lambda in the Method Execution view (Resources -> GET -> Test [lightning bolt])
    • Be sure to redeploy your API after settings change.
  • ThomasPowell 9:24 pm on November 18, 2021 Permalink | Reply
    Tags: amazon linux, , , ,   

    Commodore 128 (VICE) Custom Runtime on AWS Lambda 

    Why a Commodore 128 Custom Runtime??

    The first reason is wanted to do a Commodore 128 Custom Runtime on AWS Lambda is because it’s an absolutely ridiculous thing to do. The Commodore 128 runs at 1 MHz (2 MHz in “fast” mode) natively on the 8502 processor vs. multi-GHz scale.

    Another reason is because I’ve had challenges with the slight differences with Amazon Linux vs. Ubuntu for EC2 instance. This seemed like a good way to exercise working through those differences.

    The last reason is that I wanted a platform that would require me to dig a little deeper into how things are managed for a custom Lambda. The only directory that’s writable is /tmp. There are specific conventions used to honor the function.handler format. The responses (if you don’t have a supported runtime) are handled through callback URLs.

    Compiling VICE

    It’s a bit of an adventure getting VICE running on Amazon Linux. Ubuntu provides a package for VICE (of course, you’re on your own for the ROMs themselves.) With Amazon Linux, you’ll need to download the tarball and compile. Here’s my video recreating that process through to getting the Lambda running:

    Compile VICE and Building the Custom Runtime

    The steps… fire up an Amazon Linux EC2 instance and:

    • sudo yum update
    • sudo yum install links -y
    • links https://vice-emu.sourceforge.io and download the vice-3.5.tar.gz
    • tar zxvf vice-3.5.tar.gz from the home directory
    • sudo yum install -y gcc gcc-c++ flex bison dos2unix libpng-devel.x86_64
    • links https://www.floodgap.com/retrotech/xa/ and download xa-2.3.11.tar.gz or whatever version is available
    • tar zxvf xa-2.3.11.tar.gz
    • cd xa-2.3.11 and make
    • Add xa to the path with PATH=~/xa-2.3.11:$PATH
    • cd ~
    • cd vice-3.5 and ./configure --disable-pdf-docs --enable-headlessui --without-pulse --without-alsa and make

    You should be able to cd ~/vice-3.5/data/C128 and run:

    ../src/x128 -silent -sound -ntsc -keybuf "10 graphic 1
    20 scnclr
    30 circle 1,100,100,20
    " -warp -limitcycles 8000000 -exitscreenshotvicii image.png

    and be able to scp the image.png and open it and see a screenshot something like (bump cycles to 10,000,000 if necessary): (Edit: use -warp not +warp to enable warp mode)

    Testing x128 for Custom Runtime
    C128 Circle

    Packaging the Necessary Pieces

    Make a vice-package directory or similar and grab the contents of vice-3.5/data/C128 (some files can be excluded, such as build files if you want to trim the package down) and the vice-3.5/src/x128 file and tar the vice-package directory (tar cvf vice-package.tar vice-package/*) and scp it down to your local computer.

    Get the Sample Lambda for Custom Runtime

    Go to Lambda -> Functions -> Create Function -> Author from Scratch and select the “Provide your own bootstrap on Amazon Linux 2” option:

    Custom Runtime provide your own bootstrap
    Custom Runtime template

    Copy the bootstrap.sample to the root of the lambda package you are going to create and name it bootstrap and the hello.sh.sample as function or whatever the first part of your function.handler name is (see the Runtime settings below the code window):

    Runtime settings where your function.handler is named.

    Constructing the bootstrap

    There are a couple of environment variables (XDG_CACHE_HOME and XDG_CONFIG_HOME) that have to be set to /tmp so that VICE can write to them. Be sure the handler in Runtime settings matches <script_name>.<bash_function_name> or else Lambda won’t be able to find it to invoke (actually the bootstrap below won’t… you can skip using $_HANDLER and hard code, but then the AWS console won’t help you for function configuration.) I disabled the -e option because we’re actually going to exit VICE ungracefully on purpose for simplicity. Be aware that this is the ON ERROR RESUME NEXT or “try with empty catch block” in that your code will ignore all the other potential failures along the way.

    # set -euo pipefail
    # we're going to exit VICE on clock cycles so -e option would fail in this case
    set -uo pipefail
    # otherwise vice tries to write to the 'home' directory that isn't a [writeable] thing in Lambda
    export XDG_CACHE_HOME=/tmp
    export XDG_CONFIG_HOME=/tmp
    # Handler format: <script_name>.<bash_function_name>
    # The script file <script_name>.sh  must be located at the root of your
    # function's deployment package, alongside this bootstrap executable.
    source $(dirname "$0")/"$(echo $_HANDLER | cut -d. -f1).sh"
    while true
        # Request the next event from the Lambda runtime
        EVENT_DATA=$(curl -v -sS -LD "$HEADERS" -X GET "http://${AWS_LAMBDA_RUNTIME_API}/2018-06-01/runtime/invocation/next")
        INVOCATION_ID=$(grep -Fi Lambda-Runtime-Aws-Request-Id "$HEADERS" | tr -d '[:space:]' | cut -d: -f2)
        # Execute the handler function from the script
        RESPONSE=$($(echo "$_HANDLER" | cut -d. -f2) $INVOCATION_ID "$EVENT_DATA")
        # Send the response to Lambda runtime
        curl -v -sS -X POST "http://${AWS_LAMBDA_RUNTIME_API}/2018-06-01/runtime/invocation/$INVOCATION_ID/response" -d "$RESPONSE"

    Constructing the handler

    The handler for this setup needs to only output what is intended as a response. I’m redirecting stderr and stdout to /dev/null because there are some messages that pop-up in the current state of the emulator. I am also using the -silent option to suppress all the errors about missing disk drive and other device ROMs that I don’t care about for this case.

    function handler () {
      cd vice-package
      ./x128 -silent -sound -ntsc -keybuf "10 graphic 1
        20 scnclr
        30 circle 1,100,100,20
      " +warp -limitcycles 8000000 -exitscreenshotvicii /tmp/$1.png 2>&1 >/dev/null
      cd ..
      RESPONSE="{\"isBase64Encoded\": true, \"headers\": {\"Content-type\": \"image/png\", \"content-disposition\":\"attachment; filename=$1.png\"}, \"statusCode\":200, \"body\":\"`base64 /tmp/$1.png`\"}"
      echo $RESPONSE

    The response

    The above response is intended to output JSON in preparation for API Gateway Lambda integration. statusCode is required, and to convert the image back to an image isBase64Encoded and the headers Content-type is needed. The content-disposition is to tell it to download. All this gets POSTed back by the bootstrap script to the invocation response callback. The body is the base64 encoded png file, but in the current invocation in Amazon Linux, I’m getting newlines in the output, so that’s a problem to debug before attaching to API Gateway.

    One more missing piece

    We also need to pull libpng from our EC2 instance and place in the root of the lambda function at the same level as the bootstrap file. Just scp ec2-user@ec2IPaddress:/usr/lib64/libpng\* . for that.

    Structure of the zip file and Deploy

    zip up the following pieces into your lambda.zip (zip file name doesn’t really matter, just the organization of the contents):

    • bootstrap
    • function.sh
    • libpng*
    • vice-package/*

    Once uploaded, you should be able to [Test] the function and check the logs. Add a set -x to your bootstrap if things aren’t behaving. You may need to chmod +x your bootstrap if you haven’t tried to run it locally for testing.

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc
%d bloggers like this: