-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Codepipeline Bitbucket Integration #11389
Comments
I believe this may also relate to the new CodeStar Connections service added in AWS Go SDK v1.26.6. If so, see also #11375 and https://github.com/terraform-providers/terraform-provider-aws/blob/master/.github/CONTRIBUTING.md#new-service |
You are probably right. Here is the json response for Codepipeline set with CodeStarSourceConnection. The pipeline was created by hand on the console.
|
Is bitbucket provider supported already in resource "aws_codepipeline"? |
I've managed to get bitbucket working using something like the following:
I had to previously do the oauth thing to connect aws with bitbucket and manually copy the arn of the codestar connection (the aws provider doesn't support code star resources yet afaik) |
That is right. I can confirm this works
}` |
@vibhuyadav I tried configuring the Bitbucket source like you defined but am getting error message Could you please share the role / policy you used to create the Bitbucket connection ? Thank you. |
@mavencode01 Make sure you have allow on codestar-connections:UseConnection on the policy |
Dear vibhuyadav, what policy do you refer to? |
I saw all IAM's roles (CodeDeploy, CloudFormation, ToolChain and PermissionBoundary), but I couldn't find the correct to put a codestar-connections:UseConnection statement. |
@marcoslopesbritto I just created a new customer-managed policy. Here is what all I have in the policy and I attached it to the role behind the pipeline.
|
Yep that's the default policy AWS put.
To add KMS support, simply add the following block to the previous policy:
Here is the one I have been using, which gives you usage of :
Could be simplified / secured even further, especially with targeting the exact resources that CodePipeline need access to. |
This has been released in version 3.22.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Description
Codepipeline now supports integration with Bitbucket. Please refer this announcement
https://aws.amazon.com/about-aws/whats-new/2019/12/aws-codepipeline-now-supports-atlassian-bitbucket-cloud/
New or Affected Resource(s)
Potential Terraform Configuration
The text was updated successfully, but these errors were encountered: