Documentation Index
Fetch the complete documentation index at: https://docs.iru.com/llms.txt
Use this file to discover all available pages before exploring further.
About AWS CodeCommit
CodeCommit is Regional, so Iru walks enabled Regions. AttachAWSCodeCommitReadOnly, which includes codecommit:GitPull, BatchGet*, Describe*, Get*, List*, and pull-request approval evaluation. If repositories use a customer-managed KMS key, add kms:Decrypt for that key’s ARN.
How it works
| Detail | Value |
|---|---|
| Category | Developer tools |
| Authentication | Cross-account IAM role |
Prerequisites
- IAM rights to create roles.
- At least one CodeCommit repository where you expect evidence.
Connect AWS CodeCommit to Iru
Copy the trust policy from Iru
Turn on AWS CodeCommit
Find AWS CodeCommit (use Category or Search by name or description). On that card, turn on the toggle. Leave the wizard tab open.
Create the IAM role in AWS
Configure trusted entity
Choose AWS account → Another AWS account. Enter
753695775620 (or the ID Iru shows). Enable Require external ID and paste the external ID from Iru.Optional - KMS decrypt for CMK-encrypted repos
If repositories use a customer-managed KMS key, add an inline policy (replace REGION, ACCOUNT, CMK-ID):
Submit the role ARN in Iru
Troubleshooting
Nothing opens when you turn the source on
Nothing opens when you turn the source on
Check pop-up blocker settings for the Iru site and try again.
AccessDenied on a repo
AccessDenied on a repo
Add
kms:Decrypt for that repository’s CMK.No repositories
No repositories
Confirm the Region you use in AWS matches where repos exist.
AssumeRole denied
AssumeRole denied
External ID mismatch.
Considerations
CodeCommit was announced for end of new customer…
CodeCommit was announced for end of new customer access in July 2024 - plan migrations and retire this source when repos move.
See also
- See Sources Management for the full connector list.
