Skip to main content

Module: ses-lambda-forwarder

This is a terraform module that creates an email forwarder using a combination of AWS SES and Lambda running the aws-lambda-ses-forwarder NPM module.

Introduction

This module provisions a NodeJS script as a AWS Lambda function that uses the inbound/outbound capabilities of AWS Simple Email Service (SES) to run a "serverless" email forwarding service.

Use this module instead of setting up an email server on a dedicated EC2 instance to handle email redirects. It uses AWS SES to receive email and then trigger a Lambda function to process it and forward it on to the chosen destination. This script will allow forwarding emails from any sender to verified destination emails (e.g. opt-in).

Limitations

The SES service only allows sending email from verified addresses or domains. As such, it's mostly suitable for transactional emails (e.g. alerts or notifications). The incoming messages are modified to allow forwarding through SES and reflect the original sender. This script adds a Reply-To header with the original sender's email address, but the From header is changed to display the SES email address.

For example, an email sent by John Doe <[email protected]> to [email protected] will be transformed to:

To override this behavior, set a verified fromEmail address (e.g., [email protected]) in the config object and the header will look like this.

From: John Doe <[email protected]>
Reply-To: [email protected]

NOTE: SES only allows receiving email sent to addresses within verified domains. For more information, see: http://docs.aws.amazon.com/ses/latest/DeveloperGuide/verify-domains.html


Initially SES users are in a sandbox environment that has a number of limitations. See:
http://docs.aws.amazon.com/ses/latest/DeveloperGuide/limits.html



## Usage


For a complete example, see [examples/complete](https://github.com/cloudposse/terraform-aws-ses-lambda-forwarder/tree/main/examples/complete).

For automated tests of the complete example using [bats](https://github.com/bats-core/bats-core) and [Terratest](https://github.com/gruntwork-io/terratest) (which tests and deploys the example on AWS), see [test](https://github.com/cloudposse/terraform-aws-ses-lambda-forwarder/tree/main/test).

```hcl
variable "relay_email" {
default = "[email protected]"
description = "Email that used to relay from"
}

variable "forward_emails" {
type = map(list(string))

default = {
"[email protected]" = ["[email protected]"]
"[email protected]" = ["[email protected]"]
}

description = "Emails forward map"
}

module "ses_lambda_forwarder" {
source = "cloudposse/ses-lambda-forwarder/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"

namespace = var.namespace
stage = var.stage
name = var.name
delimiter = var.delimiter
attributes = var.attributes
tags = var.tags

region = var.region
domain = var.domain

relay_email = var.relay_email
forward_emails = var.forward_emails
}

Requirements

NameVersion
terraform>= 0.13.0
aws>= 2.0
external>= 1.2
local>= 1.3
template>= 2.2

Providers

NameVersion
aws>= 2.0

Modules

NameSourceVersion
artifactcloudposse/module-artifact/external0.7.1
thiscloudposse/label/null0.25.0

Resources

NameType
aws_iam_policy.lambdaresource
aws_iam_role.lambdaresource
aws_iam_role_policy_attachment.lambdaresource
aws_lambda_alias.defaultresource
aws_lambda_function.defaultresource
aws_lambda_permission.sesresource
aws_route53_record.defaultresource
aws_route53_record.mxresource
aws_route53_record.txtresource
aws_s3_bucket.defaultresource
aws_s3_bucket_policy.defaultresource
aws_ses_active_receipt_rule_set.defaultresource
aws_ses_domain_identity.defaultresource
aws_ses_domain_identity_verification.defaultresource
aws_ses_receipt_rule.defaultresource
aws_ses_receipt_rule_set.defaultresource
aws_caller_identity.currentdata source
aws_iam_policy_document.assumedata source
aws_iam_policy_document.lambdadata source
aws_iam_policy_document.s3data source
aws_route53_zone.defaultdata source

Inputs

NameDescriptionTypeDefaultRequired
access_log_bucket_nameName of the S3 bucket where s3 access log will be sent tostring""no
additional_tag_mapAdditional key-value pairs to add to each map in tags_as_list_of_maps. Not added to tags or id.
This is for some rare cases where resources want additional configuration of tags
and therefore take a list of maps with tag key, value, and additional configuration.
map(string){}no
artifact_filenameArtifact filenamestring"lambda.zip"no
artifact_urlURL template for the remote artifactstring"https://artifacts.cloudposse.com/$${module_name}/$${git_ref}/$${filename}"no
attributesID element. Additional attributes (e.g. workers or cluster) to add to id,
in the order they appear in the list. New attributes are appended to the
end of the list. The elements of the list are joined by the delimiter
and treated as a single ID element.
list(string)[]no
contextSingle object for setting entire context at once.
See description of individual variables for details.
Leave string and numeric variables as null to use default value.
Individual variable settings (non-null) override settings in context object,
except for attributes, tags, and additional_tag_map, which are merged.
any
{
"additional_tag_map": {},
"attributes": [],
"delimiter": null,
"descriptor_formats": {},
"enabled": true,
"environment": null,
"id_length_limit": null,
"label_key_case": null,
"label_order": [],
"label_value_case": null,
"labels_as_tags": [
"unset"
],
"name": null,
"namespace": null,
"regex_replace_chars": null,
"stage": null,
"tags": {},
"tenant": null
}
no
delimiterDelimiter to be used between ID elements.
Defaults to - (hyphen). Set to "" to use no delimiter at all.
stringnullno
descriptor_formatsDescribe additional descriptors to be output in the descriptors output map.
Map of maps. Keys are names of descriptors. Values are maps of the form
{<br/> format = string<br/> labels = list(string)<br/>}
(Type is any so the map values can later be enhanced to provide additional options.)
format is a Terraform format string to be passed to the format() function.
labels is a list of labels, in order, to pass to format() function.
Label values will be normalized before being passed to format() so they will be
identical to how they appear in id.
Default is {} (descriptors output will be empty).
any{}no
domainRoot domain namestringn/ayes
enabledSet to false to prevent the module from creating any resourcesboolnullno
environmentID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT'stringnullno
forward_emailsMap of forward emailsmap(list(string))
{
"[email protected]": [
"[email protected]"
]
}
no
id_length_limitLimit id to this many characters (minimum 6).
Set to 0 for unlimited length.
Set to null for keep the existing setting, which defaults to 0.
Does not affect id_full.
numbernullno
label_key_caseControls the letter case of the tags keys (label names) for tags generated by this module.
Does not affect keys of tags passed in via the tags input.
Possible values: lower, title, upper.
Default value: title.
stringnullno
label_orderThe order in which the labels (ID elements) appear in the id.
Defaults to ["namespace", "environment", "stage", "name", "attributes"].
You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present.
list(string)nullno
label_value_caseControls the letter case of ID elements (labels) as included in id,
set as tag values, and output by this module individually.
Does not affect values of tags passed in via the tags input.
Possible values: lower, title, upper and none (no transformation).
Set this to title and set delimiter to "" to yield Pascal Case IDs.
Default value: lower.
stringnullno
labels_as_tagsSet of labels (ID elements) to include as tags in the tags output.
Default is to include all labels.
Tags with empty values will not be included in the tags output.
Set to [] to suppress all generated tags.
Notes:
The value of the name tag, if included, will be the id, not the name.
Unlike other null-label inputs, the initial setting of labels_as_tags cannot be
changed in later chained modules. Attempts to change it will be silently ignored.
set(string)
[
"default"
]
no
lambda_runtimeLambda runtimestring"nodejs12.x"no
nameID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as a tag.
The "name" tag is set to the full id string. There is no tag with the value of the name input.
stringnullno
namespaceID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally uniquestringnullno
regex_replace_charsTerraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set, "/[^a-zA-Z0-9-]/" is used to remove all characters other than hyphens, letters and digits.
stringnullno
regionAWS Region the SES should reside instringn/ayes
relay_emailEmail that used to relay fromstringn/ayes
s3_bucket_encryption_enabledWhen set to 'true' the 'aws_s3_bucket' resource will have AES256 encryption enabled by defaultbooltrueno
spfDNS SPF record valuestring"v=spf1 include:amazonses.com -all"no
stageID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release'stringnullno
tagsAdditional tags (e.g. {'BusinessUnit': 'XYZ'}).
Neither the tag keys nor the tag values will be modified by this module.
map(string){}no
tenantID element _(Rarely used, not included by default)_. A customer identifier, indicating who this instance of a resource is forstringnullno
tracing_config_modeCan be either PassThrough or Active. If PassThrough, Lambda will only trace the request from an upstream service if it contains a tracing header with 'sampled=1'. If Active, Lambda will respect any tracing header it receives from an upstream service.string"PassThrough"no
versioning_enabledA state of versioning. Versioning is a means of keeping multiple variants of an object in the same bucketbooltrueno

Outputs

NameDescription
artifact_base64sha256Base64 encoded SHA256 hash of the artifact file
artifact_fileFull path to the locally downloaded artifact
artifact_git_refGit commit hash corresponding to the artifact
artifact_urlURL corresponding to the artifact
lambda_function_arnLamnda Function ARN
lambda_function_source_code_sizeThe size in bytes of the Lambda Function .zip file
lambda_function_versionLatest published version of the Lambda Function
lambda_iam_policy_arnLamnda IAM Policy ARN
lambda_iam_policy_idLamnda IAM Policy ID
lambda_iam_policy_nameLamnda IAM Policy name
s3_bucket_arnLamnda IAM Policy ARN
s3_bucket_domain_nameLamnda IAM Policy ARN
s3_bucket_idLamnda IAM Policy name
ses_domain_identity_arnThe ARN of the domain identity
ses_domain_identity_verification_arnThe ARN of the domain identity
ses_receipt_rule_nameThe name of the SES receipt rule
ses_receipt_rule_set_nameThe name of the SES receipt rule set