SSM AppConfig Storage Helper
Project description
ssmash
ssmash, the SSM AppConfig Storage Helper, is an easy-to-use application configuration management tool for AWS deployments. You specify hierarchical configuration values in a simple YAML file, and ssmash will turn that into an AWS CloudFormation file that stores your configuration values in the SSM Parameter Store.
ssmash is mainly intended for application developers who are at least partly involved in the deployment and operations of their applications. If you want to externalise (some of) the runtime configuration of your application, this is a simple and cheap solution. If you also want to be able to automatically restart your application when it’s configuration changes, then this is the tool for you
Installation
Install ssmash using pip, the standard python package installer:
$ pip install ssmash
You will probably use ssmash with the AWS command line tools, so install and configure that too, if you haven’t already:
$ pip install awscli
$ aws configure
Example
Suppose you have an input file like this:
acme:
shipping-labels-service:
enable-fast-delivery: true
explosive-purchase-limit: 1000
greeting: hello world
whitelist-users:
- coyote
- roadrunner
Then run ssmash:
$ ssmash -i acme_prod_config.yaml -o cloud_formation_template.yaml
$ aws cloudformation deploy \
--stack-name "acme-prod-config" --template-file cloud_formation_template.yaml \
--no-fail-on-empty-changeset
You will now have the following parameters in AWS Systems Manager, that can be loaded as a string inside your application:
/acme/shipping-labels-service/enable-fast-delivery = “true”
/acme/shipping-labels-service/explosive-purchase-limit = “1000”
/acme/shipping-labels-service/greeting = “hello world”
/acme/shipping-labels-service/whitelist-users = “coyote,roadrunner”
Automated Application Restarts
Most of the time, your application loads its configuration at startup. Depending on your application, the safest and easiest way to reload its configuration is to simply restart it.
ssmash has built-in support to restart some types of application as part of the deployment process. We do this by telling it to “invalidate” the configuration used by the application.
Docker with AWS ECS
ssmash can generate CloudFormation that will safely restart the Tasks in an ECS Service once your configuration has changed, and make the successful deployment of your new application configuration depend upon the successful restart of that Service. Just specify the target ECS service using extra command line parameters, like so:
$ ssmash -i acme_prod_config.yaml -o cloud_formation_template.yaml \
invalidate-ecs \
--cluster-name acme-prod-cluster \
--service-name shipping-labels-service \
--role-name arn:aws:iam::123456789012:role/acme-ecs-admin
$ aws cloudformation deploy \
--stack-name "acme-prod-config" --template-file cloud_formation_template.yaml \
--no-fail-on-empty-changeset
You can also refer to the name of a CloudFormation Export instead of using the name directly (eg. if your service has a non-obvious generated name), using the interchangeable command line parameters for --cluster-import and --service-import and --role-import.
Serverless with AWS Lambda
ssmash can generate CloudFormation that will safely cause your serverless functions to discard their virtual machine (aka “Execution Context”), meaning they effectively reload their configuration. To access this secret sauce, just add a couple more command line parameters:
$ ssmash -i acme_prod_config.yaml -o cloud_formation_template.yaml \
invalidate-lambda \
--function-name shipping-label-printer-function \
--role-name arn:aws:iam::123456789012:role/acme-serverless-admin
$ aws cloudformation deploy \
--stack-name "acme-prod-config" --template-file cloud_formation_template.yaml \
--no-fail-on-empty-changeset
You can also refer to the name of a CloudFormation Export instead of using the name directly, using the interchangeable command line parameters for --function-import and --role-import.
Advanced: Automated Restarts For Only Some Parameters
Automated application restarts are great, but they don’t scale when you have a single configuration file that is used by multiple applications - you don’t want to restartevery application every time one of the config values changes. Happily, ssmash can handle that too - you just need to invoke the magic (madness!) of YAML tags, which allow us to add metadata to any part of the configuration hierarchy (either leaf configuration values, or tree nodes).
First, let’s extend the above example to include configuration for another application:
acme:
common:
enable-slapstick: true
region: us-west-2
shipping-labels-service:
enable-fast-delivery: true
explosive-purchase-limit: 1000
greeting: hello world
whitelist-users:
- coyote
- roadrunner
warehouse-service:
item-substitutes:
birdseed: "iron pellets"
parachute: "backpack"
Now we add a special .ssmash-config key to tell ssmash how to restart our applications. Then we annotate the configuration hierarchy using custom YAML tags to tell ssmash which applications are invalidated by which parts of the configuration hierarchy:
---
.ssmash-config:
invalidations:
# The dictionary key here ("shipping-labels") is used in the
# configuration hierarchy to refer to this application
shipping-labels: !ecs-invalidation
# The `!ecs-invalidation` tag tells ssmash that this application
# uses ECS, and the configuration fields correspond to those used
# on the command line
cluster_name: acme-prod-cluster
service_name: shipping-label-service
role_name: arn:aws:iam::123456789012:role/acme-ecs-admin
warehousing: !ecs-invalidation
cluster_name: acme-prod-cluster
service_name: warehouse-service
role_name: arn:aws:iam::123456789012:role/acme-ecs-admin
acme:
common:
# This is a single leaf configuration value called "enable-slapstick",
# which will cause both applications to restart when it is changed
? !item { invalidates: [ shipping-labels, warehousing ], key: enable-slapstick }
: true
region: us-west-2
# This is a tree node called "shipping-labels-service", which will cause
# the "shipping-labels" application defined above to restart when any of
# it's configuration values are changed
? !item { invalidates: [ shipping-labels ], key: shipping-labels-service }
:
enable-fast-delivery: true
explosive-purchase-limit: 1000
greeting: hello world
whitelist-users:
- coyote
- roadrunner
# This is a tree node called "warehouse-service", which will cause
# the "warehousing" application defined above to restart when any of
# it's configuration values are changed
? !item { invalidates: [ warehousing ], key: warehouse-service }
:
item-substitutes:
birdseed: "iron pellets"
parachute: "backpack"
Then run ssmash normally:
$ ssmash -i acme_prod_config.yaml -o cloud_formation_template.yaml
$ aws cloudformation deploy \
--stack-name "acme-prod-config" --template-file cloud_formation_template.yaml \
--no-fail-on-empty-changeset
Changelog
All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
v2.2.0 (2020-11-12)
Added:
#43 : Be able to invalidate subsections of a configuration file.
v2.1.2 (2019-12-30)
Fixed:
#39 : Fix PyYAML version inconsistency that prevents installation with pip. Thanks to @NeolithEra for the bug report.
v2.1.1 (2019-11-29)
Fixed:
Update versions for dependencies
v2.1.0 (2019-11-28)
Added:
Be able to invalidate a single Lambda Function
Fixed:
Update versions for dependencies to be “compatible”
v2.0.1 (2019-06-28)
Fixed:
Couldn’t run script
v2.0.0 (2019-06-28)
Changed:
#22 : Change command line API so that the input and output files are options, rather than arguments.
#22 : Change command line API so that invalidating an ECS Service is done through a chained sub-command, rather than additional options.
Added:
#8 : Support lists of plain values, which are stored as a SSM StringList parameter
Removed:
You can’t specify input and output files as positional arguments any more. Use –input-file FILENAME and –output-file FILENAME instead.
The –invalidate-ecs-service and –invalidation-role options have been replaced with the invalidate-ecs command.
v1.1.0 (2019-06-05)
Added:
Be able to automatically invalidate an existing ECS Service as part of the parameter deployment, so that it picks up the new configuration.
v1.0.0 (2019-05-30)
v1.0.0-rc1 (2019-05-24)
Added:
ssmash script to create String SSM Parameters from a simple config file stored in YAML
Basic documentation in README
v0.1.0 (2019-05-14)
Added:
First release on PyPI.
Cookiecutter skeleton only, no functionality
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file ssmash-2.2.0.tar.gz
.
File metadata
- Download URL: ssmash-2.2.0.tar.gz
- Upload date:
- Size: 41.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.22.0 setuptools/42.0.1 requests-toolbelt/0.9.1 tqdm/4.39.0 CPython/3.7.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9bfa3784cdc5406035ac004908ddb926498019b4729aca36f9e6a2ebbee6933f |
|
MD5 | 04aa9f06bad04522f07b488373d26f0f |
|
BLAKE2b-256 | 041b222896a1fe00ae4f33fa600ec7f8284f536a8d9050c926a212da17a208e2 |
File details
Details for the file ssmash-2.2.0-py2.py3-none-any.whl
.
File metadata
- Download URL: ssmash-2.2.0-py2.py3-none-any.whl
- Upload date:
- Size: 29.1 kB
- Tags: Python 2, Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.22.0 setuptools/42.0.1 requests-toolbelt/0.9.1 tqdm/4.39.0 CPython/3.7.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 4a131e601f09624101f72e72e856cb12b57237a121ce012b3cf91403db6348a4 |
|
MD5 | fccd512f374378a225cd7126109c11e0 |
|
BLAKE2b-256 | b315445762db133e38c1c7cf83f4c4af3d36ef99138623da1483ba53e1fc4241 |