Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.
Thanks to Raja Mani, AWS Solutions Architect, for this great blog that describes how federated users can access AWS CodeCommit. — You can access repositories in AWS CodeCommit using the identities used in your business. This is useful because you can reuse your existing organizational identities and authentication methods. In this blog post, we’ll focus. Blog Post: DevOps just got a whole lot easier with Opsgenie and AWS CloudFormation Registry and CLI. Opsgenie is a proud launch partner of the AWS CloudFormation Registry and CLI, an extension of CloudFormation. Users can now leverage Opsgenie’s support to better their IaC capabilities in their AWS. Use SourceTree with AWS Codecommit Atlassian SourceTreeis a visual tool for Mac and Windows to manage source code repositories. This can be used with Codecommit as a remote repository but need to add an extra configuration option to the local repository in SourceTree to be able to connect with codecommit. First, setup Codecommit for local git. Use Sourcetree to clone your repository to your local system without using the command line.
When adding an AWS CodeCommit Git repository from a Multi-Factor-Authentication (MFA) protected AWS account as a remote to a local Git repository we can add
Sourcetree Aws Codecommit Pull Request
to the Git config file.
However, on execution the aws codecommit credential-helper will prompt for entry of an MFA code periodically (when the previous MFA code has expired). Currently, there is no method to handle this situation through the SourceTree GUI. Instead, one has to call
from a shell to authenticate when cached credentials have expired. Only then interaction of SourceTree with AWS CodeCommit is possible (again).
Please provide a way to deal with the MFA code prompt as a user in the SourceTree GUI. For example, show a popup dialog for entering the MFA code when required and feed it back to the credential helper.
Votes:
0Vote for this issue
Watchers:
3Start watching this issue
Hosting your code in AWS CodeCommit has several advantages, the main one being seamless integration with AWS CodeDeploy and AWS CodePipeline.
I use SourceTree as my repo tool of choice, with Git/Bitbucket as the back end.
If you have a team of many developers and want to slowly migrate your code to AWS CodeCommit Git repo, you can setup your SourceTree config to push to both repo’s.
1. You will need a SSH-2-RSA 2048 Public/Private keys, this is what AWS supports. So once you have generated/imported the keys to AWS, you can then import the same key to your gihub or bitbucket account. Then just add them to your pageant. Read Setting Up AWS CodeCommit
2. In AWS, when you import your SSH keys for a IAM User, it will give you a SSH Key ID. Write down this SSH Key ID and the password for it will be the private key password you generated with PuttyGen. Always use a password for your private key file.
3. In SourceTree, go to Tools/Options and set the private key to your AWS SSH Key. Remember we added this to Bitbucket and Git, so we can now use the AWS SSH Key/Pairs for both repositories.
SourceTree Private Key
The last part, is to configure your local repo to post to both repositories, until you happy with the migration.
4. In SourceTree, select your repository, and go to Repository/Repository Settings. Then add a new origin. It will be in this format: ssh://git-codecommit.us-east-1.amazonaws.com/v1/repos/MyCoolApp
Sourcetree Aws Command Not Found
5. When it prompts for a username and password, enter your SSH Key ID and SSH private key password
Sourcetree Aws Ssh
Once you happy with the migration, you can then set AWS CodeCommit as the default remote, by ticking the checkbox. You may need to first rename the original remote “origin” to “old” then set AWS as the default ? Melyna task chair.
My only gripe with CodeCommit is no built in hooks to deploy directly to S3. This would be great for static assets.