-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SigV4 for SES SMTP passwords #11144
Conversation
I am not really satisfied with the structure of Any ideas? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this, @n3ph ! I'm looking forward for this to be merged.
Even in current implementation it is useful and fixes the issue with non-working AWS SES creds.
As a future improvement, I guess you might consider to generate just a single SMTP password for current region (or explicitly specified one) and define a user could obtain only one password per access key. That could make HCL code more clear, but it's just my own view on a problem.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @n3ph 👋 Thank you for submitting this. Please see the below feedback items and let us know if you have any questions or do not have time to implement them. 👍
* move deprecation warning to attribute `ses_smtp_password` * rename new attribute to `ses_smtp_password_v4` * rewrite attribute to simple string * use current provider region for SigV4 * update docs accordingly
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Look good, thanks for those updates, @n3ph 🚀
Output from acceptance testing:
--- PASS: TestSesSmtpPasswordFromSecretKeySigV4 (0.00s)
--- PASS: TestSesSmtpPasswordFromSecretKeySigV2 (0.00s)
--- PASS: TestAccAWSAccessKey_basic (11.20s)
--- PASS: TestAccAWSAccessKey_encrypted (11.31s)
--- PASS: TestAccAWSAccessKey_inactive (18.44s)
This has been released in version 2.50.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Closes #10903
Closes #11143
Closes #11930
Release note for CHANGELOG:
ses_smtp_password_v4
for SigV4 support (#11143)Output from acceptance testing: