aws-codepipeline

Setting up CodePipeline template to deploy CloudFormation stack from CodeCommit

£可爱£侵袭症+ 提交于 2019-12-01 12:50:44
From a CloudFormation template, you can deploy CodeCommit and CodePipeline . From this announcement , You can now choose AWS CloudFormation as a deployment action in your release workflows built using AWS CodePipeline. I've worked out most of the Cloudformation Template, but I can't figure out the stages. Resources: PipelineRepo: Type: AWS::CodeCommit::Repository Properties: RepositoryName: pipeline RepositoryDescription: Pipeline setup repo PipelineArtifacts: Type: AWS::S3::Bucket PipelineRole: Type: AWS::IAM::Role Pipeline: Type: AWS::CodePipeline::Pipeline Properties: Name: pipeline

When do I need to have CAPABILITY_NAMED_IAM

試著忘記壹切 提交于 2019-11-30 20:04:52
I was editing my CloudFormation templates and suddenly AWS tells me I need CAPABILITY_NAMED_IAM . I am curious as to which change triggers this? What is a named IAM resource? Before I already "name" my resources like RoleName: !Sub '${PipelineName}-codebuild' I am not asked to add this capability, I think until I add Parameters: AppName: Type: String Description: Prefix for resources Resources: LambdaRole: Type: AWS::IAM::Role Properties: RoleName: !Ref AppName To my SAM application template. But arent they the "same" except one uses !Ref ? Or maybe some other change triggered this? For

Terraform, “ignore_changes” and sub-blocks

…衆ロ難τιáo~ 提交于 2019-11-30 13:37:16
I have a AWS CodePipeline configured in a terraform file, like this: resource { name = "Cool Pipeline" ... stage { name = "Source" ... action { name = "Source" ... configuration { Owner = "Me" Repo = "<git-repo-uri>" Branch = develop OAuthToken = "b3287d649a28374e9283c749cc283ad74" } } } lifecycle { ignore_changes = "OAuthToken" } } The reason for ignoring the token, is that the AWS API doesn't show that token to terraform, instead AWS API outputs this with aws codepipeline get-pipeline <name> : "pipeline": { "stages": { "name": "Source", "actions": { "configuration": { "OAuthToken": "****" }

AWS Codepipeline with a Codecommit targetsource repository from another account

两盒软妹~` 提交于 2019-11-30 04:57:51
问题 Is it possible to create a codepipeline that has a target source of a CodeCommit Repository in another account? 回答1: I just had to do this, I'll explain the process. Account C is the account with your CodeCommit repository. Account P is the account with your CodePipeline... pipelines. In Account P: Create an AWS KMS Encryption Key and add Account C with having access (guide here in pre-requisite step). You will also need to add the CodePipeline role, and if you have a CodeBuild and CodeDeploy

When do I need to have CAPABILITY_NAMED_IAM

守給你的承諾、 提交于 2019-11-30 03:58:37
问题 I was editing my CloudFormation templates and suddenly AWS tells me I need CAPABILITY_NAMED_IAM . I am curious as to which change triggers this? What is a named IAM resource? Before I already "name" my resources like RoleName: !Sub '${PipelineName}-codebuild' I am not asked to add this capability, I think until I add Parameters: AppName: Type: String Description: Prefix for resources Resources: LambdaRole: Type: AWS::IAM::Role Properties: RoleName: !Ref AppName To my SAM application template.

Terraform, “ignore_changes” and sub-blocks

谁说我不能喝 提交于 2019-11-29 17:48:06
问题 I have a AWS CodePipeline configured in a terraform file, like this: resource { name = "Cool Pipeline" ... stage { name = "Source" ... action { name = "Source" ... configuration { Owner = "Me" Repo = "<git-repo-uri>" Branch = develop OAuthToken = "b3287d649a28374e9283c749cc283ad74" } } } lifecycle { ignore_changes = "OAuthToken" } } The reason for ignoring the token, is that the AWS API doesn't show that token to terraform, instead AWS API outputs this with aws codepipeline get-pipeline <name

AWS Cloud Formation Stuck in Review_In_Progress

蓝咒 提交于 2019-11-29 14:07:27
I was trying to set up AWS Code Pipeline with AWS SAM for Lambda using Java-8 as mentioned in the documentations http://docs.aws.amazon.com/lambda/latest/dg/automating-deployment.html (example is in node.js though). However, my Staging is stuck at CloudFormation Stack is stuck in REVIEW_IN_PROGRESS for a long time. Is there any way to debug this issue? I don't see any further events coming in console. Is there any specific things to check for? The template is as follow $ aws codepipeline get-pipeline --region us-east-1 --name aws-lexbot-facebook-pipeline { "pipeline": { "roleArn": "arn:aws:iam

AWS Cloud Formation Stuck in Review_In_Progress

守給你的承諾、 提交于 2019-11-28 07:47:42
问题 I was trying to set up AWS Code Pipeline with AWS SAM for Lambda using Java-8 as mentioned in the documentations http://docs.aws.amazon.com/lambda/latest/dg/automating-deployment.html (example is in node.js though). However, my Staging is stuck at CloudFormation Stack is stuck in REVIEW_IN_PROGRESS for a long time. Is there any way to debug this issue? I don't see any further events coming in console. Is there any specific things to check for? The template is as follow $ aws codepipeline get