Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

[Mailer] AWS SES auth with SESSION_TOKEN support#40193

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Closed
chekalsky wants to merge2 commits intosymfony:5.xfromchekalsky:mailer-async-aws-ses-sessionToken-support
Closed

[Mailer] AWS SES auth with SESSION_TOKEN support#40193

chekalsky wants to merge2 commits intosymfony:5.xfromchekalsky:mailer-async-aws-ses-sessionToken-support

Conversation

@chekalsky
Copy link
Contributor

QA
Branch?5.x
Bug fix?no
New feature?yes
Deprecations?no
Tickets
LicenseMIT
Doc PRsymfony/symfony-docs#14983

When we use AWS Lambda, we need not onlyACCESS_KEY andACCESS_SECRET in order to make requests to AWS SES, but alsoSESSION TOKEN. This PR introduces support forSESSION_TOKEN. For using it include it in DSN as query parameter namedsessionToken e. g.ses+https://%env(AWS_ACCESS_KEY_ID)%:%env(urlencode:AWS_SECRET_ACCESS_KEY)%@default?region=us-east-1&sessionToken=%env(urlencode:AWS_SESSION_TOKEN)%.

Didn't add any tests as there wasn't any testing for this part of code.

@chekalskychekalsky changed the titlesessionToken back support[Mailer] AWS SES auth with SESSION_TOKEN supportFeb 14, 2021
Copy link
Member

@jderussejderusse left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

In fact, if I don't mistaken, async-aws already support natively theSESSION_TOKEN when authenticating via end variable. But as soon as you provide a user and password via DSN, you tell async-aws to not take the env variables into account.

I think the best way to support thisSESSION_TOKEN variable is to let async-aws authenticate via env variable: Instead of adding a new option that passthrough the env variable, remove credentials from DSN:ses://default?region=eu-east-1

---

* added the`mailer` monolog channel and set it on all transport definitions
* Add support for`SESSION_TOKEN` for Async AWS Mailer transport
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

this is not totally accurate. this PR does not add support for the end variableSESSION_TOKEN, but adds a new option in DSN.

@chekalsky
Copy link
ContributorAuthor

remove credentials from DSN

@jderusse thank you, it's working, didn't know about this possibility :-) and I agree, this option is much better. I think we could close this issue.

Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@jderussejderussejderusse left review comments

Assignees

No one assigned

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

4 participants

@chekalsky@jderusse@fabpot@carsonbot

[8]ページ先頭

©2009-2025 Movatter.jp