Version: v3.3 
Prerequisites
Before setting up Amorphic CICD, ensure the following prerequisites are in place.
Repository Configuration
Amorphic CICD currently supports remote Git repositories hosted on GitLab, GitHub, and Bitbucket.
- Ensure the repository exists in one of these providers.
- Create appropriate branches (e.g.,
dev,test,prod) to map to corresponding Amorphic environments. - Apply access controls or branch protection rules to prevent accidental deployments or modifications.
Amorphic Deployment
- Amorphic environments (
dev,test,prod) must already be deployed in AWS accounts. - Each environment is linked to a specific repository branch during CICD deployment.
Service User
A service user is required in each Amorphic environment to manage resource deployments via CICD. This user is dedicated to CICD operations and should not be used for regular user activity.
-
Create a role with permissions to create, update, and delete resources.
- We recommend assigning the Administrator role or an equivalent role with full permissions.
- Assign this role to the service user.
-
Collect the following details from each Amorphic environment:
- Personal Access Token (PAT) → Used by CICD for authentication. Ensure it has sufficient validity.
- UserId → The identifier of the service user.
- API Gateway URL → The base URL of the Amorphic API (different from the Amorphic UI URL). This can be obtained by inspecting API requests in the Amorphic UI.
- RoleId → The ID of the role assigned to the service user.
Alerting Configuration
When deploying the Amorphic CICD framework, administrators must provide a list of email addresses.
- These emails will receive alerts if the pipeline fails to deploy resources.
- Each alert email contains a link to the Code Validation and Deployment Logs for troubleshooting.
CICD Deployment
- The Amorphic CICD framework is deployed in a separate AWS account after fulfilling the above prerequisites.
- Ensure all developers subscribe to AWS SNS email notifications to stay informed about CICD events.
CICD Account Access
All users should have at least read-only access to AWS CodeBuild and AWS CodePipeline.
This enables developers to:
- View build and deployment logs.
- Diagnose issues when deployments fail.
- Redeploy resources if required.