-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update string filters in the criteria block of aws_securityhub_automation_rule
to allow different Max Item sizes
#39616
Update string filters in the criteria block of aws_securityhub_automation_rule
to allow different Max Item sizes
#39616
Conversation
Community NoteVoting for Prioritization
For Submitters
|
aws_securityhub_automation_rule
to allow different max item Sizesaws_securityhub_automation_rule
to allow different Max Item sizes
aws_securityhub_automation_rule
to allow different Max Item sizesaws_securityhub_automation_rule
to allow different Max Item sizes
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @Surajpedd 👋
It looks like this is your first Pull Request submission to the Terraform AWS Provider! If you haven’t already done so please make sure you have checked out our CONTRIBUTOR guide and FAQ to make sure your contribution is adhering to best practice and has all the necessary elements in place for a successful approval.
Also take a look at our FAQ which details how we prioritize Pull Requests for inclusion.
Thanks again, and welcome to the community! 😃
Thank you for your contribution! 🚀 Please note that typically Go dependency changes are handled in this repository by dependabot or the maintainers. This is to prevent pull request merge conflicts and further delay reviews of contributions. Remove any changes to the Additional details:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
% make testacc TESTARGS='-run=TestAccSecurityHub_serial/^AutomationRule$$' PKG=securityhub
make: Verifying source code with gofmt...
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go1.23.2 test ./internal/service/securityhub/... -v -count 1 -parallel 20 -run=TestAccSecurityHub_serial/^AutomationRule$ -timeout 360m
=== RUN TestAccSecurityHub_serial
=== PAUSE TestAccSecurityHub_serial
=== CONT TestAccSecurityHub_serial
=== RUN TestAccSecurityHub_serial/AutomationRule
=== RUN TestAccSecurityHub_serial/AutomationRule/full
=== RUN TestAccSecurityHub_serial/AutomationRule/disappears
=== RUN TestAccSecurityHub_serial/AutomationRule/stringFilters
=== RUN TestAccSecurityHub_serial/AutomationRule/numberFilters
=== RUN TestAccSecurityHub_serial/AutomationRule/dateFilters
=== RUN TestAccSecurityHub_serial/AutomationRule/mapFilters
=== RUN TestAccSecurityHub_serial/AutomationRule/tags
=== RUN TestAccSecurityHub_serial/AutomationRule/basic
--- PASS: TestAccSecurityHub_serial (181.75s)
--- PASS: TestAccSecurityHub_serial/AutomationRule (181.75s)
--- PASS: TestAccSecurityHub_serial/AutomationRule/full (25.87s)
--- PASS: TestAccSecurityHub_serial/AutomationRule/disappears (12.76s)
--- PASS: TestAccSecurityHub_serial/AutomationRule/stringFilters (23.53s)
--- PASS: TestAccSecurityHub_serial/AutomationRule/numberFilters (23.09s)
--- PASS: TestAccSecurityHub_serial/AutomationRule/dateFilters (23.57s)
--- PASS: TestAccSecurityHub_serial/AutomationRule/mapFilters (23.98s)
--- PASS: TestAccSecurityHub_serial/AutomationRule/tags (32.98s)
--- PASS: TestAccSecurityHub_serial/AutomationRule/basic (15.96s)
PASS
ok github.com/hashicorp/terraform-provider-aws/internal/service/securityhub 187.231s
@Surajpedd Thanks for the contribution 🎉 👏. |
This functionality has been released in v5.72.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
The
aws_securityhub_automation_rule
resource hascriteria
configuration block. Here, the following stringFilter attributesare Array Members with a max size of 100 items according to documentation but the code only allows a max of 20 items.
Relations
Closes #39161
References
AWS CLI Documentation : https://docs.aws.amazon.com/cli/latest/reference/securityhub/create-automation-rule.html
Output from Acceptance Testing
Would require help running the Acceptance Tests.