You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* tst ci
* Add in warning message to command line
* Update message in template
* Add stubs for new docs
* [issue-64] Start splitting up the readme file
* Update to advanced_use.md file
* Update readme doc
* Add links to readme
* Update readme file layout
* Add link to webhooks
* Update advanced use docs
* Added CoC and contribute docs
* Fox duplicate title
Once the `capsule.json` file is generated, you are now ready to deploy your project to
228
+
your AWS account.
229
+
230
+
To do this, simply type:
231
+
232
+
`capsule.js deploy`
233
+
234
+
If you wish to learn more about the templates that are implemented by the
235
+
deploy command, please refer to the [templates read me](docs/templates.md) file.
236
+
239
237
### Authorizing your certificate
240
238
241
239
In order to authorize your certificate you will need to log into the AWS console.
242
240
243
-
Depending on whether you are using DNS or Email authroitzation you will need to follow the relevant steps below.
241
+
Depending on whether you are using DNS or Email authorization you will need to follow the relevant steps below.
242
+
243
+
244
+
#### Domain configuration
245
+
246
+
As part of the process of creating your static site, you will need to point an existing domain or subdomain to your S3 bucket.
247
+
When executing the `web` command from the cli the process will halt once it reaches the certificate manager portion.
248
+
249
+
At this point you should log into your AWS console and select the ` Certificate Manager` service. On this screen the domain
250
+
you passed to the cli should be visible e.g. `example.com`.
251
+
252
+
Open up the drop-down arrow for the domain and follow the insturctions provived bu Amazon to validate control of the domain. Note that Amazon will send an email to your account at:
253
+
254
+
*webmaster@example.com
255
+
*admin@example.com
256
+
*postmaster@example.com
257
+
*administrator@example.com
258
+
*hostmaster@example.com
259
+
260
+
Where `example.com` is the domain you passed to the cli tool.
244
261
245
262
246
263
### CloudFront waiting time
@@ -287,192 +304,28 @@ Triggers:
287
304
Webhook: yes
288
305
```
289
306
290
-
In this case, the user will need Admin permissions.
291
-
292
-
You will need to create a webhook in GitHub.
293
-
294
-
### How to use it?
295
-
296
-
The `ci` tool can be executed from the command line in order to setup the
297
-
CodeBuild process. Located in this repository are two CodeBUild files:
298
-
299
-
1.`codebuild_capsule.cf` - this contains the CodeBuild CF templates for this project
300
-
2.`codebuild_project.cf` - which provides a template for the Capsule user to use for their own project
301
-
302
-
In addition to the `ci` tool the CodeBuild cf templates can also be executed from the aws cli.
-*EnvironmentImage*: Image to use for running a container where the build will execute. Needs to respect the format `<repository>/<image>:<tag>`. Default: `aws/codebuild/ubuntu-base:14.04`
-*BuildSpecLocation*: Path of the file `buildspec.yml` to use (Defaults to `<repo-root>/buildspec.yml`
333
-
334
-
335
-
### Using the capsule cli:
336
-
337
-
The capsule cli is a NodeJS cli app with the intention to simplify the generation of the hosting infrastructure and ci infrastructure. For nested stacks, it requires to generate a base s3 bucket. This can be generated in the following way:
As part of the process of creating your static site, you will need to point an existing domain or subdomain to your S3 bucket.
380
-
When executing the `web`command from the cli the process will halt once it reaches the certificate manager portion.
381
-
382
-
At this point you should log into your AWS console and selectthe` Certificate Manager` service. On this screen the domain
383
-
you passed to the cli should be visible e.g. `example.com`.
384
-
385
-
Open up the drop-down arrow for the domain and follow the insturctions provived bu Amazon to validate control of the domain. Note that Amazon will send an email to your account at:
386
-
387
-
* webmaster@example.com
388
-
* admin@example.com
389
-
* postmaster@example.com
390
-
* administrator@example.com
391
-
* hostmaster@example.com
392
-
393
-
Wjere `example.com` is the domain you passed to the cli tool.
394
-
395
-
### Future steps:
396
-
397
-
- The CI for the hosted project will still be using codebuild
398
-
- The CI infrastructure for Capsule will be evolving soon to use codepipeline to execute several integration tests the cloudformation templates and the cli with different node versions.
399
-
- Add in CloudTrail support for debugging
400
-
401
-
402
-
## Templates
403
-
404
-
Capsule is made up of multiple YAML based Cloud Formation templates.
405
-
406
-
You can read more about AWS CloudFormation on the AWS official page:
407
-
408
-
https://aws.amazon.com/cloudformation/
409
-
410
-
A brief description of each is provided as follows.
411
-
412
-
### Certificates - template.certificate.yaml
413
-
414
-
This file handles the certificate manager portion
415
-
of the CloudFormation configuration.
416
-
417
-
You can read more about AWS Certificate Manager here:
418
-
419
-
https://aws.amazon.com/certificate-manager/
420
-
421
-
422
-
### CloudFront - template.cloudfront.yaml
423
-
424
-
This file contains the list of parameters required by our
425
-
CloudFormation Stack including Error codes, HTTP versions and SSL supported method.
426
-
CloudFront acts as a CDN. More documentation can be found at the AWS page here:
0 commit comments