|
3 anos atrás | |
---|---|---|
.. | ||
README.md | 3 anos atrás | |
cloudwatch.tf | 3 anos atrás | |
constants.tf | 3 anos atrás | |
ghe-key.tf | 3 anos atrás | |
globals.tf | 3 anos atrás | |
iam.tf | 3 anos atrás | |
kms.tf.skipped | 3 anos atrás | |
main.tf | 3 anos atrás | |
outputs.tf | 3 anos atrás | |
s3.tf | 3 anos atrás | |
vars.tf | 3 anos atrás |
Based heavily off codebuild_artifact and codebuild_splunk_apps, this module creates a CodeBuild job to deposit docs into the xdr-[environment]-portal-shared-artifacts
bucket.
It uses an ECR container from common services.
This module is where the CodeBuild artifacts are created. It uses the Terraform GitHub Provider and requires a Personal Access Token. This should be your Personal Access Token not mdr-aws-codebuild's token (see how-to below). The provider will look in the environmental variables for the token.
export GITHUB_TOKEN=<gihub_token>
This module should NOT create the github repo. That is a manual process. I am not comfortable with terraform adding/removing github repos. The github repo should have the same name as the name variable in the terrafgrunt.hcl file. The user associated with the Personal Access Token needs to have admin permissions on the github repo.
AWS CodeBuild needs a Github Personal Access Token to pull code after the code in a repository has been updated. This is the mdr-aws-codebuild
account. The secret github token is stored in the C2 account and automatically added.
Despite the Web Interface, there can be only one GHE token per account and region.
The mdr-aws-codebuild
user must have read access to the repositories you wish to build from.
1) In github, go to settings->Developer Settings->Personal Access Tokens
2) Click 'Generate Token'
3) Give it a name (e.g. terragrunt
)
4) Give it the following permission groups:
Record it someplace safe.