Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added initial structure for deploying sign and verify service #19

Merged
merged 6 commits into from
Oct 22, 2020

Conversation

blarghmatey
Copy link
Member

@blarghmatey blarghmatey commented Oct 19, 2020

The sign and verify service will be deployed on AWS Fargate along with a proxy that will validate an HMAC signature for
POST requests. This adds the resources for:

  • defining a secrets manager secret containing the unlocked DID document
  • creating a Fargate cluster
  • defining the task for the fargate cluster
  • defining a service using the fargate task
  • generating the role policy to allow access to the secrets manager secret
  • creates and configures a load balancer and ACM certificate
  • registers the service with DNS

The sign and verify service will be deployed on AWS Fargate along with a proxy that will validate an HMAC signature for
POST requests. This adds the resources for:
- defining a secrets manager secret containing the unlocked DID document
- creating a Fargate cluster
- defining the task for the fargate cluster
- defining a service using the fargate task
- generating the role policy to allow access to the secrets manager secret

Still to do:
- finish the container definitions for the task definition
- register the service with DNS
- (optional) create and configure a load balancer and ACM certificate
@blarghmatey blarghmatey marked this pull request as draft October 19, 2020 21:23
@blarghmatey blarghmatey self-assigned this Oct 19, 2020
Copy link
Contributor

@rhysyngsun rhysyngsun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Generally looks good

unlocked_did_secret_value = secretsmanager.SecretVersion(
f'sign-and-verify-unlocked-did-value-{env_suffix}',
secret_id=unlocked_did_secret.id,
secret_string=sign_and_verify_config.require_secret('unlocked_did'), # Base64 encoded JSON object of unlocked DID
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this be unlocked_did_secret?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shaidar
Copy link
Contributor

shaidar commented Oct 22, 2020

👍

@blarghmatey blarghmatey merged commit b6bc1b3 into main Oct 22, 2020
@blarghmatey blarghmatey deleted the digitalcreds branch October 22, 2020 19:21
blarghmatey added a commit that referenced this pull request Apr 26, 2021
Adding concrete deployment for Concourse servers
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants