You need to create a CodeConnection to GitLab in order to make CodePipelines work. This connection is a sort of token to the CodeSuite tools to connect to Gitlab.

Gitlab/Bluage VPCPrivate0 subnetseg-ec2-nlb-gitlab security group*.bluage.localgitlab for the passphraseA window summarizing your connection appears. Wait for the Setup status in the Host section to turn Pending. (It can take up 5 mins). While waiting for the Setup status to be updated. We are going to create a Gitlab API token for the next steps
aws ssm start-session --region <AWS_REGION> --target <EC2_INSTANCE_ID> --parameters host="gitlab.bluage.local",localPortNumber="443",portNumber="443" --document-name AWS-StartPortForwardingSessionToRemoteHost
Note: The
EC2_INSTANCE_IDvariable must be the EC2 instance ID ofec2-<AWS_REGION>-gitlab
C:\Windows\System32\drivers\etc\hosts file by adding the following line: 127.0.0.1 gitlab.bluage.localhttps://gitlab.bluage.localroot credentials of Gitlab are referenced in the /gitlab/root secret of the AWS Secret Manager. Retrieve the credentials by clicking on Retrieve secret value
AWSPending, click on the new button Update pending connection appearingroot credentials of Gitlab are referenced in the /gitlab/root secret of Secret Manager. Retrieve the credentials by clicking on Retrieve secret value. Connect to Gitlab with these credentials.

Copy the CodeConnection ARN and paste it in the env.yml file of the CDK
Note: Allowing Git commands over SSH will save you from having to enter your Gitlab credentials for each commit.
ssh-keygen -t ed25519id_ed25519.pub~/.ssh/id_ed25519.pubC:\Users\Administrator\.ssh\id_ed25519.pub
If you created your repository with an HTTPS git clone, you will have to reclone it with an SSH git clone
Note: The Blu Age certificate is automatically added to the Dev windows EC2s. This step is for Linux EC2s
*.bluage.localgitlab for the passphrase/etc/pki/ca-trust/source/anchors/gitlab.crt of your EC2.update-ca-trust