ses
cloudposse/ses/aws
Terraform module to provision Simple Email Service on AWS
Terraform module to provision Simple Email Service on AWS. > [!TIP] > #### 👽 Use Atmos with Terraform > Cloud Posse uses atmos to easily orchestrate multiple environments using Terraform. > Works with Github Actions, Atlantis, or Spacelift. > > > Watch demo of using Atmos with Terraform > > Example of running atmos to manage infrastructure from our Quick Start tutorial. > Usage This module creates a SES domain with IAM user that is able to send emails with it. If module is provided with Route53 Zone ID it can also create verification DNS records for domain and DKIM. For a complete example, see examples/complete. For automated tests of the complete example using bats and Terratest (which tests and deploys the example on AWS), see test. What's worth to note is that every AWS SES starts in Sa
| Name | Type | Description | Default |
|---|---|---|---|
| domain | string | The domain to create the SES identity for. | required |
| zone_id | string | Route53 parent zone ID. If provided (not empty), the module will create Route53 | "" |
| create_spf_record | bool | If provided the module will create an SPF record for `domain`. | false |
| ses_user_enabled | bool | Creates user with permission to send emails from SES domain | true |
| labels_as_tags | set(string) | Set of labels (ID elements) to include as tags in the `tags` output. Default is | [
"default"
] |
| label_order | list(string) | The order in which the labels (ID elements) appear in the `id`. Defaults to ["na | null |
| id_length_limit | number | Limit `id` to this many characters (minimum 6). Set to `0` for unlimited length. | null |
| label_key_case | string | Controls the letter case of the `tags` keys (label names) for tags generated by | null |
| enabled | bool | Set to false to prevent the module from creating any resources | null |
| attributes | list(string) | ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`, | [] |
| custom_from_subdomain | list(string) | If provided the module will create a custom subdomain for the `From` address. | [] |
| iam_permissions | list(string) | Specifies permissions for the IAM user. | [
"ses:SendRawEmail"
] |
| verify_dkim | bool | If provided the module will create Route53 DNS records used for DKIM verificatio | false |
| ses_group_enabled | bool | Creates a group with permission to send emails from SES domain | true |
| context | any | Single object for setting entire context at once. See description of individual | {
"additional_tag_map": {},
"attribu |
| delimiter | string | Delimiter to be used between ID elements. Defaults to `-` (hyphen). Set to `""` | null |
| tags | map(string) | Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`). Neither the tag keys nor the t | {} |
| verify_domain | bool | If provided the module will create Route53 DNS records used for domain verificat | false |
| name | string | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'. Thi | null |
| custom_from_behavior_on_mx_failure | string | The behaviour of the custom_from_subdomain when the MX record is not found. Defa | "UseDefaultValue" |
| ses_group_name | string | The name of the IAM group to create. If empty the module will calculate name fro | "" |
ses_domain_identity_arn — The ARN of the SES domain identityses_domain_identity_verification_token — A code which when added to the domain as a TXT record will signal to SES that the owner of the domaises_dkim_tokens — A list of DKIM Tokens which, when added to the DNS Domain as CNAME records, allows for receivers to spf_record — The SPF record for the domain. This is a TXT record that should be added to the domain's DNS settingcustom_from_domain — The custom mail FROM domainuser_name — Normalized IAM user name.ses_group_name — The IAM group nameses_smtp_password — The SMTP password. This will be written to the state file in plain text.access_key_id — The SMTP user which is access key ID.user_arn — The ARN assigned by AWS for this user.user_unique_id — The unique ID assigned by AWS.secret_access_key — The IAM secret for usage with SES API. This will be written to the state file in plain text.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,