Touchdown

Latest version: v0.15.16

Safety actively analyzes 628918 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 7 of 13

0.6.1

------------------

- Automatically cast strings to integers when assigning to an
`argument.Integer`.

0.6.0

------------------

- SSL certificate chains are now validated. This is not yet complete
verification, but should stop accidentally using entirely the wrong chain for
your cert.

- CloudFront now supports updates. If you upload a new certificate, your
CloudFront distribution will be updated accordingly.

- There is now much better diffing when generating plans - you can now diff
inside JSON blobs specified for autoscaling user data.

0.5.3

------------------

- Allow setting `ssl_policy` on custom origins.

- Allow setting `compress` True/False on a behaviour.

0.5.2

------------------

- Fix network acl entry port validation and allow 'port' to be set to '*'.

- Fix issue updating an Assume Role Policy.

- Fix some issues diffing dicts.

0.5.1

------------------

- Touchdown now reports resource changes better, especially when attributes
transition from unset to set states.

- Various diffing bug fixes.

0.5.0

------------------

- Add support for AWS NAT Gateway.

- Add support for read and write operations against local files::

folder = workspace.add_local_folder(name=os.getcwd())
local_file = folder.add_file(name='production.cfg')

- The contents of any file can be assigned to any string argument. For
example::

aws.add_keypair(
name='my-keypair',
public_key=folder.add_file(name='production.pub'),
)

- Add support for GPG encryption. This layers upon the local file system
abstraction::

gpg = workspace.add_gpg()
local_file = gpg.add_cipher(file=local_file)

- Add integration between Amazon KMS and the local file system abstraction::

kms = aws.add_key(name='my-deployment-key')
local_file = kms.add_cipher(file=local_file)

- Add support for Amazon KMS Grants.

- Add a ``touchdown edit`` command that can transparently decrypt, fire up
``$EDITOR`` and then re-encrypt a file wrapped in GPG or KMS encryption.

- Add a mechanism for ConfParser backed configuration that is mapped to
touchdowns resource system::

conf = local_file.add_config()
asg_min = conf.add_string(
name='scaling.web.min',
default=1,
min=0,
max=1,
)

web_asg = aws.add_auto_scaling_group(
name='web',
min=asg_min,
)

- You can use S3 files anywhere you would use local files::

bucket = aws.add_bucket(name='mybucket')
conf = aws.add_config(file=bucket.add_file(name='test.cfg'))

- Add new commands for managing tunable configuration values:

* ``touchdown get`` - see the current state of a variable
* ``touchdown set`` - set a new value for a variable
* ``touchdown refresh`` - reset a variable to its default (can be used to rotate a secret key)

- EC2 KeyPair's can be created from a `private_key` or a `public_key` (in the
case where a private key is provided touchdown will generate a new public key
and use that directly). This is to make it easier for the key to be generated
and rotated by touchdown.

Page 7 of 13

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.