You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If a Signing Key is given, then before deploying an existing stack, verify the stack's signature against the checksum using the signing key.
If the deployment does not have a Signature, continue with deployment
If deployment has a Signature, but it doesn't match the Checksum, the deployment is aborted
As part of deployment:
Generate a Checksum and persist it to the stack
If a Signing Key is given, generate a Signature and persist it to the stack
AWS CloudFormation
Perhaps use reserved Tags deploy:Checksum and deploy:Signature?
The text was updated successfully, but these errors were encountered:
the-avid-engineer
changed the title
Implement Deployment Signing to allow for protecting against collisions and prevent back-to-back deployments causing unnecessary waiting cycles.
Implement Checksums and Signatures to allow for protecting against collisions and prevent back-to-back deployments causing unnecessary waiting cycles.
Apr 11, 2023
the-avid-engineer
changed the title
Implement Checksums and Signatures to allow for protecting against collisions and prevent back-to-back deployments causing unnecessary waiting cycles.
Implement Checksums and Signatures to allow for protecting against collisions and prevent back-to-back deployments from unnecessarily extending waiting cycles.
Apr 11, 2023
the-avid-engineer
changed the title
Implement Checksums and Signatures to allow for protecting against collisions and prevent back-to-back deployments from unnecessarily extending waiting cycles.
Implement Checksums and Signatures to allow for protecting against collisions of resources
Apr 11, 2023
Solves #2
Deployment would store some kind of metadata that can be retrieved before deployment for existing stacks.
A
Checksum
can always be generated from the request to update the template.A
Signature
can be generated if the CLI is given a private key by cryptographically hashing the Checksum.If a Signing Key is given, then before deploying an existing stack, verify the stack's signature against the checksum using the signing key.
As part of deployment:
AWS CloudFormation
Perhaps use reserved Tags
deploy:Checksum
anddeploy:Signature
?The text was updated successfully, but these errors were encountered: