Touchdown

Latest version: v0.15.16

Safety actively analyzes 628924 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 11 of 13

0.0.19

-------------------

- Add AWS password policy management. This lets you enforce password complexity
for your IAM users.

- Add a 'touchdown get-signin-url' command.

- Better 'touchdown dot' output.

- Fix ``Y/n`` confirmation so that ``Y`` really is the default.

- 43 - Fix documentation and validation around Subnet ``cidr_block`` -
``192.168.0.1/24`` isn't a valid cidr.

- A resource acquired with ``Foo.get_bar`` will not be considered for deletion
by ``touchdown destroy``.

0.0.18

-------------------

- Fix a conflict between IAM policies and Resource policies. Resource policies
are now specified using ``ensure``::

aws.add_role(
name="myrole",
ensure=["never-destroy"],
assume_role_policy={...},
policies={
"mypolicy": {
"Statement": [{
"Effect": "Allow",
"Action": "*",
"Resource": "*",
}],
},
},
)

- Fix a conflict between ``Plan.validate`` and ``Rollback.validate`` which
caused a regression in the ``rollback`` command.

0.0.17

-------------------

- Fix an edge case where using mfa, cross account roles and image_copy.

0.0.16

-------------------

- Can now do use MFA and cross-account roles to do deployments in other
accounts. If you set up your Touchdownfile with::

aws = workspace.add_aws(
access_key_id="...",
secret_access_key="...",
mfa_serial="...",
)

Then touchdown will prompt you for an MFA code before starting the
deployment. Under the hood this uses the ``GetSessionToken`` API to
generate temporary AWS credentials. A bit like sudo, these are cached
so each action doesn't require a new MFA token.

- Add a ``pre_restore`` and ``post_restore`` hook to database rollbacks. This
allows customizations to be run after initial validation but before the
restore starts. This is great for adding application specific policy like
emptying an ASG before the rollback.

- Add ASCII table output for price estimation.

0.0.15

-------------------

- asg: If an ASG is connected to an ELB, consider the ELB health when
scaling/descaling during a deployment.

- Add slack notification support.

- Add basic price estimation.

0.0.14

-------------------

- Add support for AWS CloudWatch Logs. In this initial release you can
pre-create your log groups and manage the log retention period::

aws.add_log_group(
name="application.log",
retention=3,
)

- Add a new tail command. This can grab events from any touchdown managed
CloudWatch log group. For the example above you could get the last 15m of
logs with::

touchdown tail application.log -s 15m

And stream all new logs to that group with::

touchdown tail application.log -f

- Add a new rollback command. This can restore a snapshot or restore to a point
in time for any RDS database. For example to rewind your database ``foo`` to
an hour ago you could::

touchdown rollback foo 1h

- Both of these commands are written to be pluggable. For example in future you
might be able to use the same ``tail`` command against a heroku app.

- Touchdown no longer depends on click.

Page 11 of 13

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.