You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 4, 2024. It is now read-only.
Copy file name to clipboardExpand all lines: docs/partner_editable/additional_info.adoc
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,14 +18,14 @@ The instructions for setting up webhooks and deployment keys vary by Git service
18
18
19
19
After deploying the Quick Start, configure the AWS services in your workload to use the Git repository S3 bucket as a source.
20
20
21
-
As shown in <<outputs_tab>>, the *Outputs* tab in the AWS CloudFormation console includes *OutputBucketName*. This output is an S3 key that forms the base of the path to the .zip file of your repository code. The S3 key is in the following format:
21
+
As shown in <<outputs_tab>>, the *Outputs* tab in the AWS CloudFormation console includes *OutputBucketName*. This output is an Amazon S3 key that forms the base of the path to the .zip file of your repository code. The S3 key has the following format:
Here, `git-user` is the owner or path prefix of the repository. In some Git services, this may be an organization name. However, some Git services do not return a Git user or organization for a repository. In these cases, you can omit the `git-user` parts of the path.
27
27
28
-
The instructions for linking an AWS service to an S3 object vary. For links to AWS service documentation, see link:#_aws_services[AWS services] later in this guide.
28
+
The instructions vary for linking an AWS service to an Amazon S3 object. For links to AWS service documentation, see link:#_aws_services[AWS services], later in this guide.
29
29
30
30
== Adding an API secret after deployment
31
31
@@ -38,7 +38,7 @@ To update the stack with an API secret, do the following:
38
38
. Choose *Use current template*.
39
39
. On the *Specify stack details* page, change the *API Secret* parameter setting, then choose *Next*.
40
40
. On the *Configure stack options* page, choose *Next*.
41
-
. Choose *I acknowledge that this template may create IAM resources*.
41
+
. Select *I acknowledge that this template may create IAM resources*.
42
42
. Choose *Update stack*. When the status is *UPDATE_COMPLETE*, the stack is updated with the API secret.
43
43
44
44
== Test the deployment
@@ -47,7 +47,7 @@ Before putting a webhook into production, test your deployment by doing the foll
47
47
48
48
. Modify a file in your repository.
49
49
. Commit and push the changes.
50
-
. Wait a few minutes, then check the Git repository S3 bucket this Quick Start deploys for a new (or updated) object with a key that matches your repository path.
50
+
. Wait a few minutes, and then check the Git repository S3 bucket for a new (or updated) object with a key that matches your repository path.
The architecture built by this Quick Start supports AWS best practices for security.
61
61
62
-
=== SSH Keys
62
+
=== SSH keys
63
63
64
-
This Quick Start deploys a private SSH key pair which is encrypted with an AWS KMS key and uploaded to Amazon S3. CodeBuild decrypts the private SSH key and uses it to authenticate your Git service before cloning the repository.
64
+
This Quick Start deploys a private SSH key pair that is encrypted with an AWS KMS key and uploaded to Amazon S3. AWS CodeBuild decrypts the private SSH key and uses it to authenticate your Git service before cloning the repository.
65
65
66
66
We don’t recommend sharing SSH keys among multiple services, or launching another instance of this Quick Start to clone and store another repository in Amazon S3. Each repository should use unique SSH keys.
67
67
68
68
=== Webhook security
69
69
70
-
Git services provide different ways to authenticate against an endpoint, such as webhook secrets, source IP address whitelisting, personal access tokens, and OAuth2. We recommend that you set up at least one of these security mechanisms to protect your webhook API endpoint.
70
+
Git services provide different ways to authenticate an endpoint, such as webhook secrets, source-IP-address allow listing, personal access tokens, and OAuth2. We recommend that you set up at least one of these security mechanisms to protect your webhook API endpoint.
71
71
72
-
For more information about how this Quick Start utilizes endpoint security mechanisms, see the link:#_parameter_reference[Parameter reference] section of this guide. For specific guidance on how to configure security mechanisms for your Git service, refer to your Git service documentation.
72
+
For more information about how this Quick Start uses endpoint security mechanisms, see the link:#_parameter_reference[Parameter reference] section of this guide. For specific guidance on how to configure security mechanisms for your Git service, refer to your Git service documentation.
Copy file name to clipboardExpand all lines: docs/partner_editable/architecture.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,13 +12,13 @@ As shown in <<architecture_diagram>>, this Quick Start sets up a serverless AWS
12
12
13
13
* Amazon API Gateway to receive Git webhook requests and forward them to AWS Lambda.
14
14
* An AWS Lambda function to process Git webhook requests from API Gateway and invoke an AWS CodeBuild project.
15
-
* A CodeBuild project to connect to your Git service, then retrieve, zip, and upload the latest version of your Git repository to Amazon S3.
16
-
* An AWS Key Management Service (AWS KMS) key to encrypt/decrypt the SSH (Secure Shell) keys used by CodeBuild to connect to your Git repository using SSH. The SSH key pair is generated by a Lambda-backed AWS CloudFormation custom resource when the stack is deployed.
15
+
* A AWS CodeBuild project to connect to your Git service, then retrieve, zip, and upload the latest version of your Git repository to Amazon S3.
16
+
* An AWS Key Management Service (AWS KMS) key to encrypt/decrypt the SSH (Secure Shell) keys used by AWS CodeBuild to connect to your Git repository using SSH. The SSH key pair is generated by a Lambda-backed AWS CloudFormation custom resource when the stack is deployed.
17
17
* Two Amazon S3 buckets: one for Git repository contents, and another for encrypted SSH keys. A Lambda-backed AWS CloudFormation custom resource deletes the contents of the S3 buckets when you delete the CloudFormation stack. If you need backups, ensure that you copy the S3 buckets before deleting the stack.
18
18
19
19
[NOTE]
20
20
========
21
21
* The Quick Start deploys AWS Identity and Access Management (IAM) roles required by Lambda and API Gateway. The inline permissions attached to the roles are scoped using the http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#grant-least-privilege[least privilege] model.
22
-
* The CodeBuild project must be able to communicate with your Git repository. For example, you can employ a SaaS-based Git service like GitHub to which CodeBuild can connect over the internet.
22
+
* The AWS CodeBuild project must be able to communicate with your Git repository. For example, you can employ a SaaS-based Git service like GitHub to which CodeBuild can connect over the internet.
23
23
* The Git repository S3 bucket this Quick Start deploys has versioning enabled, and all previous versions are retained indefinitely. To modify the retention period, see http://docs.aws.amazon.com/AmazonS3/latest/user-guide/create-lifecycle.html[How do I create a lifecycle rule for an S3 bucket?]
Copy file name to clipboardExpand all lines: docs/partner_editable/faq_troubleshooting.adoc
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,17 +8,17 @@
8
8
9
9
WARNING: When you set *Rollback on failure* to *Disabled*, you continue to incur AWS charges for this stack. Ensure that you delete the stack after troubleshooting.
10
10
11
-
For additional information, see https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/troubleshooting.html[Troubleshooting AWS CloudFormation^] on the AWS website.
11
+
For more information, see https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/troubleshooting.html[Troubleshooting AWS CloudFormation^].
12
12
13
13
== Troubleshooting
14
14
15
15
If commits to your repository do not show up in Amazon S3, do the following:
16
16
17
-
* Check the security parameters and endpoint in your Git webhook configuration. See link:#_configuring_git_services[Configuring Git services] earlier in this guide and consult your Git service documentation for help configuring webhooks.
18
-
* Check the Lambda logs for errors. These are stored in Amazon CloudWatch Logs. For help accessing them, see https://docs.aws.amazon.com/lambda/latest/dg/monitoring-cloudwatchlogs.html[Accessing Amazon CloudWatch logs for AWS Lambda].
17
+
* Check the security parameters and endpoint in your Git webhook configuration. See link:#_configuring_git_services[Configuring Git services] earlier in this guide and consult your Git service documentation for help with configuring webhooks.
18
+
* Check the AWS Lambda logs for errors. These are stored in Amazon CloudWatch Logs. For help with accessing them, see https://docs.aws.amazon.com/lambda/latest/dg/monitoring-cloudwatchlogs.html[Accessing Amazon CloudWatch logs for AWS Lambda].
19
19
* Check the AWS CodeBuild project logs for errors. To access them, do the following:
20
20
. Open the AWS CodeBuild console.
21
-
. On the *Build history* page, click the *Build run* link for the project.
21
+
. On the *Build history* page, choose the *Build run* link for the project.
22
22
. On the *Build status* page, see the *Build logs* tab.
23
23
24
24
== Additional resources
@@ -38,6 +38,6 @@ If commits to your repository do not show up in Amazon S3, do the following:
38
38
39
39
=== Webhooks
40
40
41
-
* https://developer.github.com/v3/repos/hooks/[Webhooks on GitHub Developer blog]
42
-
* https://confluence.atlassian.com/bitbucket/manage-webhooks-735643732.html[Manage webhooks on Atlassian Bitbucket Support]
43
-
* https://docs.gitlab.com/ce/user/project/integrations/webhooks.html[Webhooks on GitLab Docs]
After deploying this Quick Start and configuring a webhook in your Git service, when a Git user pushes changes to your repository, the Git servicesends an HTTPS POST request to the HTTPS endpoint. The HTTPS POST request contains JavaScript Object Notation (JSON) data about the push operation and repository. After the request is accepted by Amazon API Gateway, it is passed to an AWS Lambda function that triggers an AWS CodeBuild project. The CodeBuild project retrieves the latest version of your repository, zips it, and uploads it to an Amazon S3 bucket.
1
+
After deploying the Quick Start, you use the link:#_configuring_git_services[endpoint information] it provides to configure a webhook in your Git service. A webhook sends an HTTPS POST request to the endpoint in response to a push action. The HTTPS POST request contains JavaScript Object Notation (JSON) data about the push and repository. After the request is accepted by Amazon API Gateway, it is passed to an AWS Lambda function that triggers an AWS CodeBuild project. The AWS CodeBuild project uses the information in the HTTPS POST request to retrieve the latest version of your repository.
2
2
3
3
For more information about the components that this Quick Start deploys, see the link:#_architecture[Architecture] section later in this guide.
0 commit comments