-
Notifications
You must be signed in to change notification settings - Fork 275
/
codepipeline.yaml
145 lines (129 loc) · 3.96 KB
/
codepipeline.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
AWSTemplateFormatVersion: '2010-09-09'
Description: github-codepipeline
Parameters:
GitHubOwner:
Type: String
Default: shrestha-ajay #replace with your github username
AllowedPattern: "[A-Za-z0-9-]+"
RepositoryName:
Type: String
Default: cloud-basics4 #replace with your github repository name
AllowedPattern: "[A-Za-z0-9-]+"
BranchName:
Type: String
Default: main
AllowedPattern: "[A-Za-z0-9-]+"
ApplicationStackName:
Type: String
Default: codepipeline-github-application1
AllowedPattern: "[A-Za-z0-9-]+"
Resources:
PipelineArtifactsBucket:
Type: AWS::S3::Bucket
Properties:
VersioningConfiguration:
Status: Enabled
AppPipeline:
Type: AWS::CodePipeline::Pipeline
Properties:
Name: github-wordpress-pipeline
ArtifactStore:
Type: S3
Location: !Ref PipelineArtifactsBucket
RoleArn:
!GetAtt CodePipelineRole.Arn
Stages:
- Name: Source
Actions:
- Name: SourceAction
ActionTypeId:
Category: Source
Owner: ThirdParty
Version: 1
Provider: GitHub
OutputArtifacts:
- Name: AppSourceCode
Configuration:
Owner: !Ref GitHubOwner
Repo: !Ref RepositoryName
Branch: !Ref BranchName
OAuthToken: '{{resolve:secretsmanager:github-oauth-token:SecretString}}'
PollForSourceChanges: false
RunOrder: 1
- Name: Deploy
Actions:
- Name: CloudFormationDeploy
ActionTypeId:
Category: Deploy
Owner: AWS
Provider: CloudFormation
Version: '1'
InputArtifacts:
- Name: AppSourceCode
Configuration:
ActionMode: CREATE_UPDATE
Capabilities: CAPABILITY_IAM
RoleArn: !GetAtt CloudformationRole.Arn
StackName: !Ref ApplicationStackName
TemplatePath: !Sub "AppSourceCode::wordpress-app.yaml"
RunOrder: 1
AppPipelineWebhook:
Type: 'AWS::CodePipeline::Webhook'
Properties:
Authentication: GITHUB_HMAC
AuthenticationConfiguration:
SecretToken: '{{resolve:secretsmanager:github-oauth-token:SecretString}}'
Filters:
-
JsonPath: "$.ref"
MatchEquals: refs/heads/{Branch}
TargetPipeline: !Ref AppPipeline
TargetAction: SourceAction
Name: AppPipelineWebhook
TargetPipelineVersion: !GetAtt AppPipeline.Version
RegisterWithThirdParty: true
CodePipelineRole:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: "2012-10-17"
Statement:
Effect: Allow
Principal:
Service: codepipeline.amazonaws.com
Action: sts:AssumeRole
CodePipelineServiceRolePolicy:
Type: AWS::IAM::Policy
Properties:
PolicyDocument:
Version: '2012-10-17'
Statement:
- Action:
- iam:PassRole
Resource: "*"
Effect: Allow
Condition:
StringEqualsIfExists:
iam:PassedToService:
- cloudformation.amazonaws.com
- ec2.amazonaws.com
- s3.amazonaws.com
- secretsmanager.amazonaws.com
- Action: "*"
Resource: "*"
Effect: Allow
PolicyName: CodePipelineServiceRolePolicy
Roles:
- !Ref CodePipelineRole
CloudformationRole:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: "2012-10-17"
Statement:
Effect: Allow
Principal:
Service: cloudformation.amazonaws.com
Action: sts:AssumeRole
ManagedPolicyArns:
- arn:aws:iam::aws:policy/AdministratorAccess