From 0b6b2053e6c5fad5361d100e349fa13b0501e62a Mon Sep 17 00:00:00 2001 From: Chris Kalafarski Date: Mon, 25 Sep 2023 10:53:23 -0400 Subject: [PATCH] Add Statuspage stack to DevOps pipeline --- devops/tooling-cd-pipeline.yml | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/devops/tooling-cd-pipeline.yml b/devops/tooling-cd-pipeline.yml index 7d1dcc38d..9e90ed578 100644 --- a/devops/tooling-cd-pipeline.yml +++ b/devops/tooling-cd-pipeline.yml @@ -11,7 +11,7 @@ # 4. Add the output file of the `sam package` command to the artifacts files # list of the CodeBuild project (which is the stack name). # 5. Add an action to the Deploy stage of the CodePipeline pipeline that -# deploys the template from the CodeBuils artifacts that you added in step 4. +# deploys the template from the CodeBuild artifacts that you added in step 4. AWSTemplateFormatVersion: "2010-09-09" Transform: AWS::Serverless-2016-10-31 @@ -38,6 +38,9 @@ Parameters: kSlackAppStackName: Type: String Default: prx-devops-slack-app + kStatuspageStackName: + Type: String + Default: prx-devops-statuspage ###### GitHubCodeStarConnectionArn: { Type: String } OrganizationId: @@ -216,6 +219,9 @@ Resources: - sam build --parallel --template-file ./devops/tooling/chat-ops/slack-app/template.yml - sam package --s3-bucket ${PipelineArtifactStore} --output-template-file ./${kSlackAppStackName} + + - sam build --parallel --template-file ./devops/tooling/statuspage/template.yml + - sam package --s3-bucket ${PipelineArtifactStore} --output-template-file ./${kStatuspageStackName} artifacts: files: - ${kCloudFormationMacroFunctionsStackName} @@ -223,6 +229,7 @@ Resources: - ${kCloudWatchAlarmsStackName} - ${kCloudWatchAlarmRemindersStackName} - ${kSlackAppStackName} + - ${kStatuspageStackName} name: SamBuildArtifact Type: CODEPIPELINE Tags: @@ -357,6 +364,7 @@ Resources: - !Sub arn:${AWS::Partition}:cloudformation:${AWS::Region}:${AWS::AccountId}:stack/${kCloudFormationMacroFunctionsStackName}/* - !Sub arn:${AWS::Partition}:cloudformation:${AWS::Region}:${AWS::AccountId}:stack/${kCloudFormationNotificationsStackName}/* - !Sub arn:${AWS::Partition}:cloudformation:${AWS::Region}:${AWS::AccountId}:stackset/${kCloudFormationNotificationTopicsStacksetName}:* + - !Sub arn:${AWS::Partition}:cloudformation:${AWS::Region}:${AWS::AccountId}:stackset/${kStatuspageStackName}:* Version: "2012-10-17" PolicyName: CloudFormationAccess # Allow PassRole to the CloudFormation role