-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Enhancement]: for aws_ses_receipt_rule adding argument s3_action.iam_role_arn #39332
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
Warning This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them. Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed. |
Wow ! this was a quick resolution of our requested enhancement. |
This functionality has been released in v5.68.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
When SES needs to write e-mails in a S3 bucket where encryption is required with a KMS Customer Managed Key a role must be assigned to the S3 action. The option is available in the AWS Console and in the SDK. Below is the AWS documentation about the S3 Action configuration.
https://docs.aws.amazon.com/ses/latest/APIReference/API_S3Action.html
The parameters for the s3_action for aws_ses_receipt_rule is only missing support for the parameter: IamRoleArn.
Following the convention it would be named : iam_role_arn
Affected Resource(s) and/or Data Source(s)
aws_ses_receipt_rule
Potential Terraform Configuration
References
https://docs.aws.amazon.com/ses/latest/APIReference/API_S3Action.html
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ses_receipt_rule#bucket_name
Would you like to implement a fix?
None
The text was updated successfully, but these errors were encountered: