# AWS CodePipeline ## Requirements | Name | Version | |------|---------| | [terraform](#requirement\_terraform) | >= 1.0.0 | | [aws](#requirement\_aws) | >= 3.72.0 | ## Providers | Name | Version | |------|---------| | [aws](#provider\_aws) | >= 3.72.0 | ## Modules No modules. ## Resources | Name | Type | |------|------| | [aws_codepipeline.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/codepipeline) | resource | | [aws_codestarnotifications_notification_rule.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/codestarnotifications_notification_rule) | resource | | [aws_iam_policy.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource | | [aws_iam_role.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource | | [aws_iam_role_policy_attachment.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource | | [aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source | | [aws_iam_policy_document.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source | | [aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition) | data source | ## Inputs | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| | [code\_build\_projects](#input\_code\_build\_projects) | The Code Build projects to which grant IAM access | `list(string)` |
[| no | | [code\_deploy\_resources](#input\_code\_deploy\_resources) | The Code Deploy applications and deployment groups to which grant IAM access | `list(string)` |
"*"
]
[| no | | [create\_iam\_role](#input\_create\_iam\_role) | Set this variable to true if you want to create a role for AWS DevOps Tools | `bool` | `false` | no | | [iam\_role\_name](#input\_iam\_role\_name) | The name for the Role | `string` | n/a | yes | | [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix) | Determines whether the IAM role name (`iam_role_name`) is used as a prefix | `bool` | `true` | no | | [name](#input\_name) | The CodePipeline pipeline name | `string` | n/a | yes | | [s3\_bucket](#input\_s3\_bucket) | S3 bucket used for the artifact store |
"*"
]
object({| n/a | yes | | [service\_role](#input\_service\_role) | Amazon Resource Name (ARN) of the AWS Identity and Access Management (IAM) role that enables AWS CodeBuild to interact with dependent AWS services on behalf of the AWS account | `string` | n/a | yes | | [sns\_topic](#input\_sns\_topic) | The ARN of the SNS topic to use for pipline notifications | `string` | n/a | yes | | [stage](#input\_stage) | Codepipeline Stage Configuration | `any` | `{}` | no | | [tags](#input\_tags) | tags | `map(string)` | `{}` | no | ## Outputs | Name | Description | |------|-------------| | [codepipeline\_role\_arn](#output\_codepipeline\_role\_arn) | The ARN of the IAM role | | [codepipeline\_role\_name](#output\_codepipeline\_role\_name) | The name of the IAM role |
s3_bucket_id = string
s3_bucket_arn = string
})