You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jun 15, 2023. It is now read-only.
Copy file name to clipboardExpand all lines: doc_source/S3-artifact-encryption.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ For more information about AWS KMS, see the [AWS Key Management Service Develope
52
52
+[View your AWS managed key](#S3-view-default-keys)
53
53
+[Configure server\-side encryption for S3 buckets using AWS CloudFormation or the AWS CLI](#S3-rotate-customer-key)
54
54
55
-
###View your AWS managed key<aname="S3-view-default-keys"></a>
55
+
## View your AWS managed key<aname="S3-view-default-keys"></a>
56
56
57
57
When you use the **Create Pipeline** wizard to create your first pipeline, an S3 bucket is created for you in the same Region you created the pipeline\. The bucket is used to store pipeline artifacts\. When a pipeline runs, artifacts are put into and retrieved from the S3 bucket\. By default, CodePipeline uses server\-side encryption with AWS KMS using the AWS managed key for Amazon S3 \(the `aws/s3` key\)\. This AWS managed key is created and stored in your AWS account\. When artifacts are retrieved from the S3 bucket, CodePipeline uses the same SSE\-KMS process to decrypt the artifact\.
58
58
@@ -72,7 +72,7 @@ When you use the **Create Pipeline** wizard to create your first pipeline, an S3
72
72
73
73
74
74
75
-
###Configure server\-side encryption for S3 buckets using AWS CloudFormation or the AWS CLI<aname="S3-rotate-customer-key"></a>
75
+
## Configure server\-side encryption for S3 buckets using AWS CloudFormation or the AWS CLI<aname="S3-rotate-customer-key"></a>
76
76
77
77
When you use AWS CloudFormation or the AWS CLI to create a pipeline, you must configure server\-side encryption manually\. Use the sample bucket policy above, and then create your owncustomer managed key\. You can also use your own keys instead of the AWS managed key\. Some reasons to choose your own key include:
78
78
+ You want to rotate the key on a schedule to meet business or security requirements for your organization\.
Copy file name to clipboardExpand all lines: doc_source/action-reference-CloudFormation.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,8 @@
2
2
3
3
Executes an operation on an AWS CloudFormation stack\. A stack is a collection of AWS resources that you can manage as a single unit\. The resources in a stack are defined by the stack's AWS CloudFormation template\. A change set creates a comparison that can be viewed without altering the original stack\. For information about the types of AWS CloudFormation actions that can be performed on stacks and change sets, see the `ActionMode` parameter\.
+**Description:** As input, the AWS CloudFormation action optionally accepts artifacts for these purposes:
112
114
+ To provide the stack template file to execute\.\(See the `TemplatePath` parameter\.\)
113
115
+ To provide the template configuration file to use\.\(See the `TemplateConfiguration` parameter\.\) For more information about the template configuration file format, see [AWS CloudFormation Artifacts](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/continuous-delivery-codepipeline-cfn-artifacts.html)\.
114
116
+ To provide the artifact for a Lambda function to be deployed as part of the AWS CloudFormation stack\.
+**Description:** If the `OutputFileName` parameter is specified, there is an output artifact produced by this action that contains a JSON file with the specified name\. The JSON file contains the contents of the Outputs section from the AWS CloudFormation stack\.
119
121
120
122
For more information about the outputs section you can create for your AWS CloudFormation action, see [Outputs](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/outputs-section-structure.html)\.
+**Description:** CodeBuild looks for the build spec file and runs the build spec commands from the directory of the primary source artifact\. When more than one input source is specified for the CodeBuild action, this artifact must be set using the `PrimarySource` action configuration parameter in CodePipeline\.
59
59
60
60
Each input artifact is extracted to its own directory, the locations of which are stored in environment variables\. The directory for the primary source artifact is made available with `$CODEBUILD_SRC_DIR`\. The directories for all other input artifacts are made available with `$CODEBUILD_SRC_DIR_yourInputArtifactName`\.
61
61
**Note**
62
62
The artifact configured in your CodeBuild project becomes the input artifact used by the CodeBuild action in your pipeline\.
+**Description:** These can be used to make the artifacts that are defined in the CodeBuild build spec file available to subsequent actions in the pipeline\. When only one output artifact is defined, this artifact can be defined directly under the `artifacts` section of the build spec file\. When more than one output artifact is specified, all artifacts referenced must be defined as secondary artifacts in the build spec file\. The names of the output artifacts in CodePipeline must match the artifact identifiers in the build spec file\.
67
67
**Note**
68
68
The artifact configured in your CodeBuild project becomes the CodePipeline input artifact in your pipeline action\.
Copy file name to clipboardExpand all lines: doc_source/action-reference-CodeCommit.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,11 +54,11 @@ The `CODEBUILD_CLONE_REF` option can only be used by CodeBuild downstream action
54
54
If you choose this option, you need to add the `codecommit:GitPull` permission to your CodeBuild service role as shown in [Add CodeBuild GitClone permissions for CodeCommit source actions](troubleshooting.md#codebuild-role-codecommitclone)\. You also need to add the `codecommit:GetRepository` permission to your CodePipeline service role as shown in [Add permissions to the CodePipeline service role](security-iam.md#how-to-update-role-new-services)\. For a tutorial that shows you how to use the **Full clone** option, see [Tutorial: Use full clone with a CodeCommit pipeline source](tutorials-codecommit-gitclone.md)\.
+**Description:** The output artifact of this action is a ZIP file that contains the contents of the configured repository and branch at the commit specified as the source revision for the pipeline execution\. The artifacts generated from the repository are the output artifacts for the CodeCommit action\. The source code commit ID is displayed in CodePipeline as the source revision for the triggered pipeline execution\.
Copy file name to clipboardExpand all lines: doc_source/action-reference-CodeDeploy.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,23 +3,23 @@
3
3
You use an AWS CodeDeploy action to deploy application code to your deployment fleet\. Your deployment fleet can consist of Amazon EC2 instances, on\-premises instances, or both\.
4
4
5
5
**Note**
6
-
This reference topic describes the CodeDeploy deployment action for CodePipeline where the deployment platform is Amazon EC2\. For reference information about Amazon Elastic Container Service to CodeDeploy blue/green deployment actions in CodePipeline, see [Amazon Elastic Container Service and CodeDeploy Blue\-Green](action-reference-ECSbluegreen.md)\.
6
+
This reference topic describes the CodeDeploy deployment action for CodePipeline where the deployment platform is Amazon EC2\. For reference information about Amazon Elastic Container Service to CodeDeploy blue/green deployment actions in CodePipeline, see [Amazon Elastic Container Service and CodeDeploy blue\-green](action-reference-ECSbluegreen.md)\.
## See Also<aname="action-reference-CodeDeploy-links"></a>
106
+
## See also<aname="action-reference-CodeDeploy-links"></a>
107
107
108
108
The following related resources can help you as you work with this action\.
109
109
+[Tutorial: Create a simple pipeline \(S3 bucket\)](tutorials-simple-s3.md) – This tutorial walks you through the creation of a source bucket, EC2 instances, and CodeDeploy resources to deploy a sample application\. You then build your pipeline with a CodeDeploy deployment action that deploys code maintained in your S3 bucket to your Amazon EC2 instance\.
Copy file name to clipboardExpand all lines: doc_source/action-reference-CodestarConnectionSource.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
Triggers a pipeline when a new commit is made on a third\-party source code repository\. The source action retrieves code changes when a pipeline is manually run or when a webhook event is sent from the source provider\.
4
4
5
5
**Note**
6
-
This feature is not available in the Asia Pacific \(Hong Kong\)or Europe \(Milan\)Region\. To use other source actions available in that Region, see [Source action integrations](integrations-action-type.md#integrations-source)\.
6
+
This feature is not available in the Asia Pacific \(Hong Kong\)and Europe \(Milan\)Regions\. To reference other available actions, see [Product and service integrations with CodePipeline](integrations.md)\.
7
7
8
8
Connections can associate your AWS resources with the following third\-party repositories:
9
9
+ Bitbucket Cloud \(through the **Bitbucket** provider option in the CodePipeline console\)
@@ -72,11 +72,11 @@ Controls automatically starting your pipeline when a new commit is made on the c
72
72
+`false`: CodePipeline does not start your pipeline on new commits\.
+**Description:** The artifacts generated from the repository are the output artifacts for the `CodeStarSourceConnection` action\. The source code commit ID is displayed in CodePipeline as the source revision for the triggered pipeline execution\. You can configure the output artifact of this action in:
81
81
+ A ZIP file that contains the contents of the configured repository and branch at the commit specified as the source revision for the pipeline execution\.
82
82
+ A JSON file that contains a URL reference to the repository so that downstream actions can perform Git commands directly\.
Copy file name to clipboardExpand all lines: doc_source/action-reference-DeviceFarm.md
+16-14Lines changed: 16 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,21 +2,23 @@
2
2
3
3
In your pipeline, you can configure a test action that uses AWS Device Farm to run and test your application on devices\. Device Farm uses test pools of devices and testing frameworks to test applications on specific devices\. For information about the types of testing frameworks supported by the Device Farm action, see [Working with Test Types in AWS Device Farm](https://docs.aws.amazon.com/devicefarm/latest/developerguide/test-types.html)\.
+**Description:** The set of artifacts to be made available to the test action\. Device Farm looks for the built application and test definitions to use\.
## See Also<aname="action-reference-DeviceFarm-links"></a>
220
+
## See also<aname="action-reference-DeviceFarm-links"></a>
219
221
220
222
The following related resources can help you as you work with this action\.
221
223
+[Working with Test Types in Device Farm](https://docs.aws.amazon.com/devicefarm/latest/developerguide/test-types.html) – This reference chapter in the *Device Farm Developer Guide* provides more description about the Android, iOS, and Web Application testing frameworks supported by Device Farm\.
+**Description:** This action produces an artifact that contains an `imageDetail.json` file that contains the URI for the image that triggered the pipeline execution\. For information about the `imageDetail.json` file, see [imageDetail\.json file for Amazon ECS blue/green deployment actions](file-reference.md#file-reference-ecs-bluegreen)\.
0 commit comments