AWS CodeCommit is no longer available to new customers. Existing customers of
AWS CodeCommit can continue to use the service as normal.
Learn more"
Cross-account repository access: Actions for the repository user in AccountB
To access the repository in AccountA, users in the AccountB group must configure their local computers for repository access. The following sections provide steps and examples.
Topics
Step 1: Configure the AWS CLI and Git for an AccountB user to access the repository in AccountA
You cannot use SSH keys or Git credentials to access repositories in another Amazon Web Services account. AccountB users must configure their computers to use either git-remote-codecommit (recommended) or the credential helper to access the shared CodeCommit repository in AccountA. However, you can continue to use SSH keys or Git credentials when accessing repositories in AccountB.
Follow these steps to configure access using
git-remote-codecommit. If you have not already installed
git-remote-codecommit, download it from git-remote-codecommit
To configure the AWS CLI and Git for cross-account access
-
Install the AWS CLI on the local computer. See instructions for your operating system in Installing the AWS CLI.
-
Install Git on the local computer. To install Git, we recommend websites such as Git Downloads
or Git for Windows . Note
CodeCommit supports Git versions 1.7.9 and later. Git version 2.28 supports configuring the branch name for initial commits. We recommend using a recent version of Git. Git is an evolving, regularly updated platform. Occasionally, a feature change might affect the way it works with CodeCommit. If you encounter issues with a specific version of Git and CodeCommit, review the information in Troubleshooting.
-
From the terminal or command line, at the directory location where you want to clone the repository, run the git config --local user.name and git config --local user.email commands to set the user name and email for the commits you will make to the repository. For example:
git config --local user.name "Saanvi Sarkar" git config --local user.email saanvi_sarkar@example.com
These commands return nothing, but the email and user name you specify is associated with the commits you make to the repository in AccountA.
-
Run the aws configure --profile command to configure a default profile to use when connecting to resources in AccountB. When prompted, provide the access key and secret key for your IAM user.
Note
If you have already installed the AWS CLI and configured a profile, you can skip this step.
For example, run the following command to create a default AWS CLI profile that you use to access AWS resources in AccountB in US East (Ohio) (us-east-2):
aws configure
When prompted, provide the following information:
AWS Access Key ID [None]:
Your-IAM-User-Access-Key
AWS Secret Access Key ID [None]:Your-IAM-User-Secret-Access-Key
Default region name ID [None]:us-east-2
Default output format [None]: json -
Run the aws configure --profile command again to configure a named profile to use when connecting to the repository in AccountA. When prompted, provide the access key and secret key for your IAM user. For example, run the following command to create an AWS CLI profile named
MyCrossAccountAccessProfile
that you use to access a repository in AccountA in US East (Ohio) (us-east-2):aws configure --profile
MyCrossAccountAccessProfile
When prompted, provide the following information:
AWS Access Key ID [None]:
Your-IAM-User-Access-Key
AWS Secret Access Key ID [None]:Your-IAM-User-Secret-Access-Key
Default region name ID [None]:us-east-2
Default output format [None]: json -
In a plain-text editor, open the
config
file, also known as the AWS CLI configuration file. Depending on your operating system, this file might be located at~/.aws/config
on Linux, macOS, or Unix, or atdrive
:\Users\USERNAME
\.aws\config on Windows. -
In the file, find the entry that corresponds to the default profile you configured for access to repositories in AccountB. It should look similar to the following:
[default] region = us-east-2 output = json
Add
account
to the profile configuration. Provide the AWS account ID of AccountB. For example:[default] account =
888888888888
region = us-east-2 output = json -
In the file, find the entry that corresponds to the
MyCrossAccountAccessProfile
profile you just created. It should look similar to the following:[profile
MyCrossAccountAccessProfile
] region = us-east-2 output = jsonAdd
account
,role_arn
andsource_profile
to the profile configuration. Provide the Amazon Web Services account ID of AccountA, the ARN of the role in AccountA that you assume to access the repository in the other account, and the name of your default AWS CLI profile in AccountB. For example:[profile
MyCrossAccountAccessProfile
] region = us-east-2 account =111122223333
role_arn = arn:aws:iam::111122223333
:role/MyCrossAccountRepositoryContributorRole
source_profile =default
output = jsonSave your changes, and close the plain-text editor.
Step 2: Clone and access the CodeCommit repository in AccountA
Run git clone, git push, and git pull to clone, push to, and pull from, the cross-account CodeCommit repository. You can also sign in to the AWS Management Console, switch roles, and use the CodeCommit console to interact with the repository in the other account.
Note
Depending on how the IAM role was configured, you might be able to view repositories on the default page for CodeCommit. If you cannot view the repositories, ask the repository administrator to email you a URL link to the Code page for the shared repository in the CodeCommit console. The URL is similar to the following:
https://console.aws.amazon.com/codecommit/home?region=
us-east-2
#/repository/MySharedDemoRepo
/browse/HEAD/--/
To clone the cross-account repository to your local computer
-
At the command line or terminal, in the directory where you want to clone the repository, run the git clone command with the HTTPS (GRC) clone URL. For example:
git clone codecommit://
MyCrossAccountAccessProfile
@MySharedDemoRepo
Unless you specify otherwise, the repository is cloned into a subdirectory with the same name as the repository.
-
Change directories to the cloned repository, and either add or make a change to a file. For example, you can add a file named
NewFile.txt
. -
Add the file to the tracked changes for the local repo, commit the change, and push the file to the CodeCommit repository. For example:
git add
NewFile.txt
git commit -m "Added a file to test cross-account access to this repository" git pushFor more information, see Getting started with Git and AWS CodeCommit.
Now that you've added a file, go to the CodeCommit console to view your commit, review other users' changes to the repo, participate in pull requests, and more.
To access the cross-account repository in the CodeCommit console
-
Sign in to the AWS Management Console in AccountB (
888888888888
) as the IAM user who has been granted cross-account access to the repository in AccountA. -
Choose your user name on the navigation bar, and in the drop-down list, choose Switch Role.
Note
If this is the first time you have selected this option, review the information on the page, and then choose Switch Role again.
-
On the Switch Role page, do the following:
-
In Account, enter the account ID for AccountA ( for example,
111122223333
). -
In Role, enter the name of the role you want to assume for access to the repository in AccountA (for example,
MyCrossAccountRepositoryContributorRole
). -
In Display Name, enter a friendly name for this role. This name appears in the console when you are assuming this role. It also appears in the list of assumed roles the next time you want to switch roles in the console.
-
(Optional) In Color, choose a color label for the display name.
-
Choose Switch Role.
For more information, see Switching to a Role (AWS Management Console).
-
Open the CodeCommit console at https://console.aws.amazon.com/codesuite/codecommit/home
. If the assumed role has permission to view the names of repositories in AccountA, you see a list of repositories and an error message that informs you that you do not have permissions to view their status. This is expected behavior. Choose the name of the shared repository from the list.
If the assumed role does not have permission to view the names of repositories in AccountA, you see an error message and a blank list with no repositories. Paste the URL link to the repository or modify the console link and change
/list
to the name of the shared repository (for example,/
).MySharedDemoRepo
-
In Code, find the name of the file you added from your local computer. Choose it to browse the code in the file, and then browse the rest of the repository and start using its features.
For more information, see Getting started with AWS CodeCommit.