npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

cfn-resolver-cli

v1.1.7

Published

CLI to resolve AWS Cloudformation templates

Downloads

11

Readme

cfn-resolver-cli

Build Status codecov depend bot npm version

NodeJS CLI that resolves and evaluates values in AWS CloudFormation templates based on the provided stack parameters and produces the resolved templates in YAML and JSON.

Did you ever had to debug what's wrong with your AWS CloudFormation template and why your stack deployment fails? Your YAML/JSON could contain some logic with all kinds of nested intrinsic functions and CFN pseudo parameters and sometimes this can get even more complex when you use a tool (e.g. AWS CDK) that generates the file for you.

If you have more than couple of these in your templates it is quite time consuming to figure out which exactly caused the deployment to fail. This simple tool (cfn-resolver-lib and cfn-resolver-cli) tries to mitigate the issue by evaluating these logic and provide the final exact values that will be used in deployment time.

Example

Input

Your CloudFormation template:

Mappings:
  FooSrvS3ReaderUserIdMap:
    "us-east-1":
      UserName: "s3_reader_new"
    "us-west-2":
      UserName: "s3_reader"
Resources:
  HelloBucket:
    Properties:
      BucketName: "hello-cfn-resolver" # has to be globally unique, calculation is removed for clearity
    Type: "AWS::S3::Bucket"
  FooSrvBucketPolicy":
    Type: "AWS::S3::BucketPolicy"
    Properties:
      Bucket:
        Ref: HelloBucket
      PolicyDocument:
        Statement:
        - Action": "s3:GetObject*"
          Effect": Allow
          Principal:
            AWS:
              "Fn::Join":
              - ""
              - - "arn:"
              - "Ref": "AWS::Partition"
              - ":iam::"
              - "AWS::AccountId"
              - ":user/"
              - - "Fn::FindInMap":
                  - "FooSrvS3ReaderUserIdMap"
                  - "Ref": "AWS::Region"
                  - "UserName"
          Resource:
            "Fn::Join":
            - ""
            - - "Fn::GetAtt":
                - HelloBucket
                - Arn
              - "/*"

Define stack parameters: (e.g. prod-us-west-2-params.json)

{
    "RefResolvers":
    {
        "AWS::Region": "us-west-2",
        "AWS::Partition": "aws",
        "AWS::AccountId": "000000111111",
        "Stage": "prod",
        "AWS::StackId": "MyEvaluatedStackUsWest2"
    }
}

Output

Resolved CloudFormation template

  Principal:
    AWS: "arn:aws:iam::000000111111:user/s3_reader"
    Resource: "arn:aws:s3:::hello-cfn-resolver/*"

cfn-resolver can help you

  • understand your CFN template better
  • troubleshoot CloudFormation deployment issues faster
  • secure your IaC with unit tests that assert on exact values before actually deploying anything
    • e.g. your unit test now can assert that the s3_reader IAM user has access to hello-cfn-resolver S3 bucket in us-west-2 region in your prod stack.

Installation

npm i -g cfn-resolver-cli

How to use?

cfn-resolver -i "./template.yml" -p "./params/**" -o "./resolved"
Options:
  --input, -i    provide a path to input template file (YAML or JSON)
  --params, -p   provide the stack parameters (can be a glob with * or **)
  --output, -o   output directory (if not provided it will be the same as the input file)
  
  --verbose, -v  Run with verbose logging                              [boolean]
  --help         Show help                                             [boolean]
  --version      Show version number                                   [boolean]

Extensibility & Customization

You can pass additional resolver maps in the parameters file, just like RefResolvers to customize or override the built-in behaviour.

Fn::GetAtt resolution

By default the tool tries to resolve the attributes of resources that are defined within the template itself, but you have the opportunity to override the behaviour for specific cases. Just define the Fn::GetAtt resolver map for custom attribute resolution:

{
    "Fn::GetAttResolvers": {
      "MyResourceLogicalId1": {
        "AttribeteKey1": "TheOverridenAttributeValue"
      }
  }
}

ARN resolution

With Fn::GetAtt you can refer to ARN of an other resource defined in the template. The tool supports ARN resolution for some of the most common AWS CloudFormation resource types (Lambda function, SQS queue, SNS topic, S3 bucket, DyanmoDB Table, etc), but user can provide additional ARN shemas in the parameters file:

{ 
  "ArnSchemas": {
    "AWS::DynamoDB::Table": "arn:${Partition}:dynamodb:${Region}:${Account}:table/${TableName}"
  }
}

The ${Partition}, ${Region} and ${Region} placeholders will be resolved by using the stack parameters. The last placeholder of the arn schema (in the above example ${TableName}) will be resolved from the attribute from the resource (if both the resource and its attribute can be found in the template).

Fn::ImportValue resolvers

Define your Fn::ImportValue resolvers in the parameters file as the following:

{ 
  "Fn::ImportValueResolvers": {
    "OtherStacksExportedKey1": "MyFakeImportedValue1"
  }
}

Supported Features

Unsported Features

Roadmap

  • Enchance Fn::Sub to work with template parameter names, resource logical IDs, resource attributes
  • Support Fn::Base64
  • Support Fn::Cidr
  • Add linter/debugging features by identified valudation errors and warnings found during template evaluation (e.g. like cfn-lint)

Contribution

Feel free to implement any missing features or fix bugs. In any case don't forget to add unit tests.