Skip to content

Commit aa98560

Browse files
AirhisAirhis
Airhis
authored and
Airhis
committed
updated README.md files, local.tf, main.tf, output.tf, variable.tf, and post deploy test file
1 parent a367792 commit aa98560

File tree

8 files changed

+3
-49
lines changed

8 files changed

+3
-49
lines changed

README.md

Lines changed: 1 addition & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -146,25 +146,13 @@ No modules.
146146

147147
| Name | Type |
148148
|------|------|
149-
| [aws_cloudwatch_event_rule.pipeline_event](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule) | resource |
150-
| [aws_cloudwatch_event_target.code_pipeline](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource |
151149
| [aws_codepipeline.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/codepipeline) | resource |
152-
| [aws_iam_policy.pipeline_event_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
153150
| [aws_iam_role.codepipeline_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
154-
| [aws_iam_role.pipeline_event_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
155151
| [aws_iam_role_policy.codepipeline_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy) | resource |
156-
| [aws_iam_role_policy_attachment.pipeline_event_role_attach_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
157-
| [aws_s3_bucket.codepipeline_bucket](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket) | resource |
158-
| [aws_s3_bucket.source](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket) | resource |
159-
| [aws_s3_bucket_logging.codepipeline_bucket_logging](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_logging) | resource |
160-
| [aws_s3_bucket_logging.source_bucket_logging](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_logging) | resource |
161-
| [aws_s3_bucket_server_side_encryption_configuration.sse](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_server_side_encryption_configuration) | resource |
162-
| [aws_s3_bucket_versioning.versioning](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_versioning) | resource |
163152
| [random_string.random](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/string) | resource |
164153
| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |
165154
| [aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
166155
| [aws_iam_policy_document.codepipeline_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
167-
| [aws_iam_policy_document.event_bridge_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
168156
| [aws_iam_policy_document.pipeline_event_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
169157

170158
## Inputs
@@ -174,11 +162,7 @@ No modules.
174162
| <a name="input_name"></a> [name](#input\_name) | The name of the pipeline | `string` | n/a | yes |
175163
| <a name="input_artifact_stores"></a> [artifact\_stores](#input\_artifact\_stores) | One or more artifact\_store blocks. | `list(map(string))` | <pre>[<br> {<br> "use_kms": false<br> }<br>]</pre> | no |
176164
| <a name="input_stages"></a> [stages](#input\_stages) | One or more stage blocks. | `any` | n/a | yes |
177-
| <a name="input_create_s3_source"></a> [create\_s3\_source](#input\_create\_s3\_source) | Create S3 source bucket for CodePipeline. | `string` | `false` | no |
178-
| <a name="input_source_s3_bucket"></a> [source\_s3\_bucket](#input\_source\_s3\_bucket) | Name of the S3 source bucket. | `string` | `null` | no |
179-
| <a name="input_s3_trigger_file"></a> [s3\_trigger\_file](#input\_s3\_trigger\_file) | S3 file that the event rule is looking for to trigger the pipeline. | `string` | `"trigger_pipeline.zip"` | no |
180-
| <a name="input_log_target_bucket"></a> [log\_target\_bucket](#input\_log\_target\_bucket) | Target bucket for S3 Access Logs. If left blank, access logging is disabled. | `string` | `""` | no |
181-
| <a name="input_log_target_prefix"></a> [log\_target\_prefix](#input\_log\_target\_prefix) | Prefix for S3 Access logs. Defaults to AWSLogs/<AWS Account ID>/s3audit if not otherwise provided. | `string` | `""` | no |
165+
| <a name="input_source_s3_bucket"></a> [artifact\_bucket\_name](#input\_source\_s3\_bucket) | Name of the S3 source bucket. | `string` | `null` | no |
182166
| <a name="input_codepipeline_iam"></a> [codepipeline\_iam](#input\_codepipeline\_iam) | Additional IAM actions to add to CodePipeline IAM role. | `map(list(string))` | `null` | no |
183167
| <a name="input_pipeline_type"></a> [pipeline\_type](#input\_pipeline\_type) | The CodePipeline pipeline\_type. Valid options are V1, V2 | `string` | `"V1"` | no |
184168
| <a name="input_execution_mode"></a> [execution\_mode](#input\_execution\_mode) | The CodePipeline execution\_mode. Valid options are `PARALLEL`, `QUEUED`, `SUPERSEDED` (default) | `string` | `"SUPERSEDED"` | no |
@@ -190,5 +174,4 @@ No modules.
190174
|------|-------------|
191175
| <a name="output_id"></a> [id](#output\_id) | The codepipeline ID |
192176
| <a name="output_arn"></a> [arn](#output\_arn) | The codepipeline ARN |
193-
| <a name="output_source_s3_bucket_arn"></a> [source\_s3\_bucket\_arn](#output\_source\_s3\_bucket\_arn) | The codepipeline source s3 bucket ARN |
194177
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->

examples/complete/locals.tf

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,3 @@
1010
// See the License for the specific language governing permissions and
1111
// limitations under the License.
1212

13-
# locals {
14-
# source_bucket_name = "${var.source_s3_bucket_prefix}-${random_string.random.result}"
15-
# }

examples/complete/main.tf

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,7 @@ module "codepipeline" {
2020
source = "../.."
2121

2222
name = var.name
23-
24-
#create_s3_source = var.create_s3_source
25-
#source_s3_bucket = var.a
23+
2624
artifact_bucket_name = var.artifact_bucket_name
2725
stages = var.stages
2826
pipeline_type = var.pipeline_type

examples/complete/outputs.tf

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,3 @@ output "arn" {
2020
value = module.codepipeline.arn
2121
}
2222

23-
# output "source_s3_bucket_arn" {
24-
# description = "The codepipeline source s3 bucket ARN"
25-
# value = module.codepipeline.source_s3_bucket_arn
26-
# }

examples/complete/variables.tf

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -15,18 +15,6 @@ variable "name" {
1515
type = string
1616
}
1717

18-
# variable "create_s3_source" {
19-
# description = "Create S3 source bucket for CodePipeline."
20-
# type = string
21-
# default = false
22-
# }
23-
24-
# variable "source_s3_bucket_prefix" {
25-
# description = "Prefix of the S3 source bucket. Random characters will be added to the end to ensure uniqueness."
26-
# type = string
27-
# default = null
28-
# }
29-
3018
variable "stages" {
3119
description = "One or more stage blocks."
3220
type = any

locals.tf

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,7 @@ locals {
1515
provisioner = "Terraform"
1616
}
1717
account_id = data.aws_caller_identity.current.account_id
18-
#bucket_prefix = length(var.log_target_prefix) == 0 ? "AWSLogs/${local.account_id}/s3audit" : var.log_target_prefix
19-
18+
2019
tags = merge(local.default_tags, var.tags)
2120
}
2221

tests/post_deploy_functional/module_codepipeline_test.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,6 @@ type Stage struct {
4444

4545
type TestTfvars struct {
4646
Name string `json:"name"`
47-
CreateS3Source bool `json:"create_s3_source"`
48-
SourceS3Bucket string `json:"source_s3_bucket"`
4947
Stages []Stage `json:"stages"`
5048
}
5149

variables.tf

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,6 @@ variable "stages" {
2929
description = "One or more stage blocks."
3030
type = any
3131
}
32-
# variable "codepipeline_iam" {
33-
# description = "Additional IAM actions to add to CodePipeline IAM role."
34-
# type = map(list(string))
35-
# default = null
36-
# }
3732

3833
variable "pipeline_type" {
3934
description = "The CodePipeline pipeline_type. Valid options are V1, V2"

0 commit comments

Comments
 (0)