This solution is free for anyone to use and learn from. If youβd like to see more projects like this one, consider using some of our products from the AWS Marketplace or share them with someone you might think would be interested in using them.
This stack was created out of frustration due to the fact that to this day there's no easy way to have a full email server without the overhead of installing and configuring all servers needed to handle incoming and outgoing messages. We wanted something simple, with no interface and no server management, so we came up with S3-Email. This included AWS SES as our email server (receive and send) and S3 as our database and interface. Then we tied everything together with a bit of code via AWS Lambda.
The result is an unmanaged email server with unlimited email addresses that also offers the benefit of easily organizing messages by adding the +
character to the email names. The +
is converted to a /
, which correlates to an object path in S3.
Once you add and confirm your domain with SES, you can put any string you want in front of the @
, as long as it conforms to the email address standard. This means that you'll have endless email addresses at your disposal, and you'll be able to organize your life in a way never possible before. For example, you can give each service you sign up for its own special email:
With that said, you can organize your emails with the +
character in this way:
- accounts+social+facebook@example.com
- accounts+social+instagram@example.com
- accounts+social+linkedin@example.com
- accounts+travel+car+hertz@example.com
- accounts+travel+air+jetblue@example.com
- accounts+money+paypal@example.com
- etc.
When dealing with clients we came up with this folder structure:
- clients+company_name+aws+account_name@example.com
- clients+company_name+stripe@example.com
- clients+company_name+sentry@example.com
- clients+company_name+heroku@example.com
- etc.
For all sorts of alerts we like to group them like this
-
etc.
This groups all emails in the corresponding folder by replacing the +
with a /
character which creates a folder structure in S3. The possibilities are endless.
Basically, receive and send email with some skills.
This stack is available to anyone at no cost, but on an as-is basis. 0x4447 LLC is not responsible for damages or costs of any kind that may occur when you use the stack. You take full responsibility when you use it.
All you need to do to deploy this stack is click the button to the left and follow the instructions that CloudFormation provides in your AWS Dashboard. Alternatively you can download the CF file from here.
The stack takes advantage of AWS S3, AWS SES, AWS Lambda, and the AWS Trigger system to tie everything together. You'll get:
- 1x SES Rule Sets
- 2x S3 Bucket
- 1x for CodePipeline to store artifacts
- 1x for the emails
- 3x CodePipelines
- 3x CodeBuilds
- 3x Lambdas
- 1x IAM Group
All project resources can be found here.
The stack is set up in a such a way that any time new code is pushed to a selected branch, the CodePipeline picks up the change and updates the Lambda for you. These are the available branches:
- master: the latest stable code
- development: unstable code that we test in our test environment - we don't recommend that you use this branch
Keep in mind that when you deploy, everything may not work right out of the box.
You have to add your domain and confirm that you own it. Follow these steps to do so:
- Go to the SES Dashboard.
- Click
Domains
on the left side menu. - Click the blue
Verify a New Domain
button. - Type your domain in the modal and select
Generate DKIM Settings
. - The next window displays all information needed to configure your domain.
- Once finisheds, you'll wait some time for the domain to switch from a
pending verification
status to averified
status.
Deployment creates SES rule sets
. This should be enabled by default on fresh AWS accounts, but on accounts where you already had some rules, this won't work. This behavior is a known bug by AWS in CloudFormation. Taking the following steps will enable the rule:
- Go to the SES Dashboard.
- Click
Email receiving
on the left side menu. - Check
0x4447_S3_Email
on theAll rule sets
tab. - Click
Set as active
to activate the rule.
After the stack is deployed you'll get a IAM Group with a policy attached that will give a user using it the bare minimum to access to the S3-Bucket to read and create emails.
There are two major limitations with SES:
- For security reasons, AWS defaults to 200 emails sent per 24 hour period at a rate of 1 email/second. If you need to send more than that, you'll need to ask AWS to increase your limit.
- By default, you can't send emails to unverified addresses. If you'd like to be able to send (as opposed to just receiving), you'll need to reach out to AWS to remove this limitation from your account.
Receiving email:
- An email comes to SES and and it gets stored in
TMP
S3 folder. - S3 will trigger the Inbound Lambda Function which will organize the email based on the
to
,from
anddate
fields. In addition to that, the Lambda will read the domain(s) added to SES, and will use that data to determine if the email should land in theInbox
orSent
folder. If theto
fields contains the domain from SES, it goes to theInbox
, if not, it is assumed the email was sent out. - The
Inbox
orSent
folder triggers another Lambda function that loads the raw email, converts it to a.html
and.txt
file, and stores it alongside the original message, while storing any attachments in theattachments
.
In addition to this flow, when a new email comes in, a copy of it will be saved in the Today
folder to show you which emails are new. The S3 bucket has a Life Cycle Policy and will delete any email older than one day from the Today
folder. This way you always know what's new.
Sending email:
- Create a properly formatted JSON file (see the following section).
- Save the file to the path
TMP/email_out/json
. The file name and extension are irrelevant as long as the content is text and JSON formatted. - This action triggers a Lambda that generates a raw email, sends it out using SES, and saves the raw message to the
Sent
folder. - The
Sent
folder triggers another Lambda function that loads the raw email, converts it to a.html
and.txt
file, and stores it alongside the original message.
This flow was designed to take advantage of the S3 trigger system and break each action into a small Lambda.
Create a custom JSON file, then upload it to the TMP/email_out/json
folder (if you don't have the folder structure yet, set it up). The JSON structure should look like this:
{
"from": "name@example.com",
"to": "name@example.com",
"subject": "From SES",
"html": "Write a nice message to whoever you are sending this message to.",
"text": "Write a nice message to whoever you are sending this message to."
}
Remember that the from
field must contain the domain you added to SES. You won't be able to send emails from unverified domains.
A bonus feature of this stack is the possibility to process manually uploaded emails. This is possible thanks to the event driven nature of the stack. Just upload the raw email in the TMP/email_in
folder, and your emails will be processed automatically.
The only prerequisite is that the email file needs to be the raw representation of the email itself. For example: files ending in .eml
are nothing more than a txt file with the raw content of the email.
Which means you can just upload those files straight up to the S3 bucket.
All resources deployed via this stack will potentially cost you money. But you'd have to do the following for this to happen:
- Invoke Lambdas over 1,000,000 times a month
- Send and receive over 1000 emails a month
- Perform over 10,000 Get and Put operations and over 2000 Delete operations in your S3 Bucket
- Exceed 100 build minutes on CodeBuild
- $1 per active CodePipeline (must run at least once a month to be considered active)
The only payment you'll encounter from Day One is an S3 storage fee for emails and CodePipeline artifacts.
When you want to deploy the stack, the only file you should be interested in is the CloudFormation.json
file. If you'd like to modify the stack, we recommend that you use the Grapes framework, which was designed to make it easier to work with the CloudFormation file. If you'd like to keep your sanity, never edit the main CF file π€ͺ.
If you enjoyed this project, please consider giving it a π. And check out our 0x4447 GitHub account, where you'll find additional resources you might find useful or interesting.
This project is brought to you by 0x4447 LLC, a software company specializing in building custom solutions on top of AWS. Follow this link to learn more: https://0x4447.com. Alternatively, send an email to hello@0x4447.email.