-
Notifications
You must be signed in to change notification settings - Fork 9.8k
New action: aws_events_put_events
#44487
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Community GuidelinesThis comment is added to every new Pull Request to provide quick reference to how the Terraform AWS Provider is maintained. Please review the information below, and thank you for contributing to the community that keeps the provider thriving! 🚀 Voting for Prioritization
Pull Request Authors
|
aws_events_put_events
ewbankkit
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
|
Warning This Issue has been closed, meaning that any additional comments are much easier for the maintainers to miss. Please assume that the maintainers will not see them. Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed. |
|
This functionality has been released in v6.15.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
|
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Rollback Plan
If a change needs to be reverted, we will publish an updated version of the library.
Changes to Security Controls
Are there any changes to security controls (access controls, encryption, logging) in this pull request? If so, explain.
Description
Adds a new beta Terraform action
aws_events_put_eventsthat imperatively sends one or more custom EventBridge events during an apply lifecycle viaconfig { entry { ... } }blocks. It supports multiple event entries, optional custom event buses, RFC3339time,resourcesARNs. Acceptance tests were strengthened to verify real delivery by wiring an EventBridge rule and SQS target (with ordering enforced viadepends_on) instead of only asserting bus existence. Documentation includes a technical preview note (breaking changes still possible) and examples for basic, multi‑entry, custom bus, and deployment triggers. The action acceptance tests are gated to Terraform ≥ 1.14 and uses the RFC3339 custom time type to avoid type conversion warnings.Relations
aws_ec2_stop_instance#43700aws_cloudfront_create_invalidation#43955aws_lambda_invoke#43972aws_ses_send_email#44214aws_sns_publish#44232aws_codebuild_start_build#44444aws_transcribe_start_transcription_job#44445aws_sfn_start_execution#44464aws_events_put_events#44487References
Output from Acceptance Testing