You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Add file_system_locations
* Auto Format
* Add encryption_key
* Auto Format
* Add build_image_pull_credentials_type
* Auto Format
* Add s3_cache_bucket_name
* Auto Format
* Update main.tf
Co-authored-by: cloudpossebot <[email protected]>
| <aname="input_badge_enabled"></a> [badge\_enabled](#input\_badge\_enabled)| Generates a publicly-accessible URL for the projects build badge. Available as badge\_url attribute when enabled |`bool`|`false`| no |
213
217
| <aname="input_build_compute_type"></a> [build\_compute\_type](#input\_build\_compute\_type)| Instance type of the build instance |`string`|`"BUILD_GENERAL1_SMALL"`| no |
214
218
| <aname="input_build_image"></a> [build\_image](#input\_build\_image)| Docker image for build environment, e.g. 'aws/codebuild/standard:2.0' or 'aws/codebuild/eb-nodejs-6.10.0-amazonlinux-64:4.0.0'. For more info: http://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref.html|`string`|`"aws/codebuild/standard:2.0"`| no |
219
+
| <aname="input_build_image_pull_credentials_type"></a> [build\_image\_pull\_credentials\_type](#input\_build\_image\_pull\_credentials\_type)| Type of credentials AWS CodeBuild uses to pull images in your build.Valid values: CODEBUILD, SERVICE\_ROLE. When you use a cross-account or private registry image, you must use SERVICE\_ROLE credentials. |`string`|`"CODEBUILD"`| no |
215
220
| <aname="input_build_timeout"></a> [build\_timeout](#input\_build\_timeout)| How long in minutes, from 5 to 480 (8 hours), for AWS CodeBuild to wait until timing out any related build that does not get marked as completed |`number`|`60`| no |
216
221
| <aname="input_build_type"></a> [build\_type](#input\_build\_type)| The type of build environment, e.g. 'LINUX\_CONTAINER' or 'WINDOWS\_CONTAINER' |`string`|`"LINUX_CONTAINER"`| no |
217
222
| <aname="input_buildspec"></a> [buildspec](#input\_buildspec)| Optional buildspec declaration to use for building the project |`string`|`""`| no |
@@ -225,10 +230,12 @@ Available targets:
225
230
| <aname="input_descriptor_formats"></a> [descriptor\_formats](#input\_descriptor\_formats)| Describe additional descriptors to be output in the `descriptors` output map.<br>Map of maps. Keys are names of descriptors. Values are maps of the form<br>`{<br> format = string<br> labels = list(string)<br>}`<br>(Type is `any` so the map values can later be enhanced to provide additional options.)<br>`format` is a Terraform format string to be passed to the `format()` function.<br>`labels` is a list of labels, in order, to pass to `format()` function.<br>Label values will be normalized before being passed to `format()` so they will be<br>identical to how they appear in `id`.<br>Default is `{}` (`descriptors` output will be empty). |`any`|`{}`| no |
226
231
| <aname="input_enabled"></a> [enabled](#input\_enabled)| Set to false to prevent the module from creating any resources |`bool`|`null`| no |
227
232
| <aname="input_encryption_enabled"></a> [encryption\_enabled](#input\_encryption\_enabled)| When set to 'true' the resource will have AES256 encryption enabled by default |`bool`|`false`| no |
233
+
| <aname="input_encryption_key"></a> [encryption\_key](#input\_encryption\_key)| AWS Key Management Service (AWS KMS) customer master key (CMK) to be used for encrypting the build project's build output artifacts. |`string`|`null`| no |
228
234
| <aname="input_environment"></a> [environment](#input\_environment)| ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT' |`string`|`null`| no |
229
-
| <aname="input_environment_variables"></a> [environment\_variables](#input\_environment\_variables)| A list of maps, that contain the keys 'name', 'value', and 'type' to be used as additional environment variables for the build. Valid types are 'PLAINTEXT', 'PARAMETER\_STORE', or 'SECRETS\_MANAGER' | <pre>list(object(<br> {<br> name = string<br> value = string<br> type = string<br> }))</pre> | <pre>[<br> {<br> "name": "NO_ADDITIONAL_BUILD_VARS",<br> "type": "PLAINTEXT",<br> "value": "TRUE"<br> }<br>]</pre> | no |
235
+
| <aname="input_environment_variables"></a> [environment\_variables](#input\_environment\_variables)| A list of maps, that contain the keys 'name', 'value', and 'type' to be used as additional environment variables for the build. Valid types are 'PLAINTEXT', 'PARAMETER\_STORE', or 'SECRETS\_MANAGER' | <pre>list(object(<br> {<br> name = string<br> value = string<br> type = string<br> }<br> ))</pre> | <pre>[<br> {<br> "name": "NO_ADDITIONAL_BUILD_VARS",<br> "type": "PLAINTEXT",<br> "value": "TRUE"<br> }<br>]</pre> | no |
230
236
| <aname="input_extra_permissions"></a> [extra\_permissions](#input\_extra\_permissions)| List of action strings which will be added to IAM service account permissions. |`list(any)`|`[]`| no |
231
237
| <aname="input_fetch_git_submodules"></a> [fetch\_git\_submodules](#input\_fetch\_git\_submodules)| If set to true, fetches Git submodules for the AWS CodeBuild build project. |`bool`|`false`| no |
238
+
| <aname="input_file_system_locations"></a> [file\_system\_locations](#input\_file\_system\_locations)| A set of file system locations to to mount inside the build. File system locations are documented below. |`any`|`{}`| no |
232
239
| <aname="input_git_clone_depth"></a> [git\_clone\_depth](#input\_git\_clone\_depth)| Truncate git history to this many commits. |`number`|`null`| no |
| <aname="input_github_token_type"></a> [github\_token\_type](#input\_github\_token\_type)| Storage type of GITHUB\_TOKEN environment variable (`PARAMETER_STORE`, `PLAINTEXT`, `SECRETS_MANAGER`) |`string`|`"PARAMETER_STORE"`| no |
@@ -247,6 +254,7 @@ Available targets:
247
254
| <aname="input_privileged_mode"></a> [privileged\_mode](#input\_privileged\_mode)| (Optional) If set to true, enables running the Docker daemon inside a Docker container on the CodeBuild instance. Used when building Docker images |`bool`|`false`| no |
248
255
| <aname="input_regex_replace_chars"></a> [regex\_replace\_chars](#input\_regex\_replace\_chars)| Terraform regular expression (regex) string.<br>Characters matching the regex will be removed from the ID elements.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
249
256
| <aname="input_report_build_status"></a> [report\_build\_status](#input\_report\_build\_status)| Set to true to report the status of a build's start and finish to your source provider. This option is only valid when the source\_type is BITBUCKET or GITHUB |`bool`|`false`| no |
257
+
| <aname="input_s3_cache_bucket_name"></a> [s3\_cache\_bucket\_name](#input\_s3\_cache\_bucket\_name)| Use an existing s3 bucket name for cache. Relevant if `cache_type` is set to `S3`. |`string`|`null`| no |
250
258
| <aname="input_secondary_artifact_encryption_enabled"></a> [secondary\_artifact\_encryption\_enabled](#input\_secondary\_artifact\_encryption\_enabled)| Set to true to enable encryption on the secondary artifact bucket |`bool`|`false`| no |
251
259
| <aname="input_secondary_artifact_identifier"></a> [secondary\_artifact\_identifier](#input\_secondary\_artifact\_identifier)| Secondary artifact identifier. Must match the identifier in the build spec |`string`|`null`| no |
252
260
| <aname="input_secondary_artifact_location"></a> [secondary\_artifact\_location](#input\_secondary\_artifact\_location)| Location of secondary artifact. Must be an S3 reference |`string`|`null`| no |
0 commit comments