πŸ–₯️
Dev Bible
  • Getting Started
    • πŸ‘‹Introduction
    • πŸ‘¨β€πŸ‘©β€πŸ‘§β€πŸ‘§Meet The Team
    • πŸŽ‰Setting Up Your Workspace
    • πŸ‘¨β€πŸŽ“Recommended Courses
    • πŸͺ΄Environments
    • 🎯Coding Best Practices
    • πŸ‘©β€πŸ’»Awesome AWS
    • 🐍Awesome Python
  • Security
    • πŸ§˜β€β™‚οΈZen of Security
    • πŸ’‘Man in the Middle (MITM) Attacks
    • 🧰Cryptographic Tools
      • πŸ•ΆοΈSSH KeyGen and Agent
      • πŸ₯·GNU Privacy Guard (gpg)
    • πŸ•΅οΈAuthentication
      • πŸ–₯️EC2
      • πŸ‘ΎGitHub
    • 🎟️Authorization
      • πŸ¦Έβ€β™‚οΈSingle Sign-On
      • πŸ†”Identity and Access Management
    • πŸ”Tamper Resistance
      • πŸ“Git Commits
    • πŸ“šReference Materials
  • Consulting
    • ✨Event-Driven Architecture
      • πŸŒ„Day 1
      • πŸŒ…Day 2
    • πŸ“šReference Materials
    • πŸ“₯/tmp
Powered by GitBook
On this page
  • Overview
  • Amazon Web Services (AWS) Account
  • EC2 Instances
  • GitHub
  • Security
  1. Getting Started

Introduction

Documentation for Gadget Engineering Development

NextMeet The Team

Last updated 11 months ago

Overview

Welcome to Gadget Engineering! If you are reading this, you are either a founding member of the Winternship 2022 or have joined the team and are ready to get started with Gadget.

Amazon Web Services (AWS) Account

We are primarily using AWS serverless application models. You'll need to get started with an AWS account (link below). Contact the systems administrator for access.

EC2 Instances

Developing in a local environment is prohibited due to the likelihood of hidden artifacts impacting the contributor's application's deployability.

You will work from EC2 instances created either in your own AWS account or from a shared sandbox account. If you do not have access to one, ask your Administrator and coordinate SSH key access.

Gadget Engineering has a bootstrap application installed on each instance. Release .

GitHub

Access to repositories is through SSH only. Unsigned commits will be rejected. Use ssh-agent and gpg to configure authorization and signature. More information is below.

Security

Gadget Engineering has in place. Please familiarize yourself with the key concepts and ensure you have configured all required protocols on your workstation before beginning your work.

πŸ‘¨β€πŸ‘©β€πŸ‘§β€πŸ‘§Meet The Team
πŸ¦Έβ€β™‚οΈSingle Sign-On
2.1.0 is found here
πŸ–₯️EC2
πŸ‘ΎGitHub
πŸ“Git Commits
strict security policies
πŸ§˜β€β™‚οΈZen of Security
🧰Cryptographic Tools
πŸ•΅οΈAuthentication
πŸ”Tamper Resistance
πŸ‘‹
Page cover image