Skip to main content

Hook extension for the CloudFormation CLI

Project description

AWS CloudFormation CLI Hooks Extension

The CloudFormation CLI (cfn) allows you to author your own CFN extension providers that can be used by CloudFormation.

This extension library provides more commands for managing and configuring your Resource Hooks.

Documentation

Primary documentation for the CloudFormation CLI can be found at the AWS Documentation site.

Installation

If you are using this package to build hook providers for CloudFormation, install the CloudFormation CLI Hooks Extension - this will automatically install the the CloudFormation CLI! A Python virtual environment is recommended.

pip3 install cloudformation-cli-hooks-extension

Usage

All of these commands are meant to be run from inside your pre-initialized Hooks project directory. You can initialize a new project by using the cfn init command from the CloudFormation CLI. All of the commands use the cfn hook prefix, ex. cfn hook describe.

Command: describe

To get more details about hook versions registered in your account, use the describe command. This will return the following properties:

  • Description
  • Created at
  • Last updated at
  • Default version
  • Failure mode
  • Target stacks
  • Stack filters (if any)
  • Configured properties
  • Target types
  • Testing status

The details for the default version will be returned by default. Optionally, the --version-id can be passed to describe a specific version.

cfn hook describe

Sample output:

No version specified, using default version

Selected AWS::CloudFormation::SampleHook version 00000001

Description: Example hook
Version 00000001 Created at: 2023-09-28 04:44:14.402000+00:00
Version 00000001 Last updated at: 2023-09-28 04:44:14.402000+00:00

Current configuration (only applies to default version):
  Default version: 00000001
  Configured behavior:
    Failure mode: WARN
    Target stacks: ALL
    Stack Filters:
      Filtering Criteria: ANY
      StackNames:
        Include: ['stack-name-0', 'stack-name-1', 'stack-name-2']
        Exclude: ['stack-name-3', 'stack-name-4', 'stack-name-5']
      StackRoles:
        Exclude: ['arn:aws:iam::000000000000:role/stack-role-0', 'arn:aws:iam::000000000000:role/stack-role-1', 'arn:aws:iam::000000000000:role/stack-role-2']

  No configured properties.

This Hook is configured to target:
  preCreate:
    AWS::S3::Bucket

Testing status: NOT_TESTED
 Warning: This Type version hasn't been tested yet. Run TestType to test it.

Command: set-default-version

To set a specific version of your hooks as the default version, use the set-default-version command.

cfn hook set-default-version --version-id 1

This command return nothings, but you can then use cfn hook describe to check the default version set in your account.

Command: configure

To set the type configuration of your hook, use the configure command.

You will first need to save your type configuration as a json file and then specify the file path in the command.

cfn hook configure --configuration-path ./myHookTypeConfig.json

Sample output:

ConfigurationArn: arn:aws:cloudformation:us-east-1:000000000000:type-configuration/hook/AWS-CloudFormation-SampleHook/default

Experimental Commands

To enable experimental commands: you will need to set the environment variable CFN_CLI_HOOKS_EXPERIMENTAL to enabled. Example for the Bash shell: export CFN_CLI_HOOKS_EXPERIMENTAL=enabled.

Command: enable-lambda-function-invoker

To activate and set the type configuration of the AWSSamples::LambdaFunctionInvoker::Hookthird-party hook in your AWS account, use the enable-lambda-function-invoker command.

This hook will use the IAM role that you pass to --execution-role-arn to invoke the Lambda function that you pass to the --lambda-function-arn argument. Make sure the Lambda function is in the same region as the hook that you're activating; the Lambda function can also be in another account (but still, it needs to be in the same region as the hook). Ensure that the execution role IAM policy and the Lambda resource policy have been configured accordingly.

Optionally, --failure-mode, --alias, and --include-targets can all be specified with the following behavior:

  • --failure-mode changes the failure mode to either FAIL or WARN (Default is FAIL).
  • --alias changes the type name for this hook in your account. For example, this can be used to change AWSSamples::LambdaFunctionInvoker::Hook to MyCompany::MyOrganization::S3BucketCheckHook.
  • --include-targets filters the targets (resource types) for which this hook will be invoked. This can be passed as a comma-separated string (for example, --include-targets "AWS::S3::*,AWS::DynamoDB::Table") (Default is ALL resource types).

Note: Unlike the others, you do not need to run this command from inside an existing Hooks project directory.

See the following example of how to run the enable-lambda-function-invoker command; note that the --region argument needs to be passed here if the default region configured in your AWS CLI is not set to us-east-2 (the same region in which the Lambda function exists).

cfn hook enable-lambda-function-invoker \
--lambda-function-arn arn:aws:lambda:us-east-2:123456789012:function:my-function:1 \
--execution-role-arn arn:aws:iam::123456789012:role/ExampleRole

Sample output:

Success: AWSSamples::LambdaFunctionInvoker::Hook will now be invoked for CloudFormation deployments for ALL resources in FAIL mode.

Development

For developing, it's strongly suggested to install the development dependencies inside a virtual environment. (This isn't required if you just want to use this tool.)

python3 -m venv env
source env/bin/activate
pip3 install -e /path/to/cloudformation-cli-hooks-extension

Install pytest-cov, used when running unit tests for this plugin:

pip3 install pytest-cov

You may also want to check out the CloudFormation CLI if you wish to make edits to that. In this case, installing them in one operation works well:

pip3 install \
  -e /path/to/cloudformation-cli \
  -e /path/to/cloudformation-cli-hooks-extension

That ensures neither is accidentally installed from PyPI.

Security

See CONTRIBUTING for more information.

License

This project is licensed under the Apache-2.0 License.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Built Distribution

File details

Details for the file cloudformation-cli-hooks-extension-0.2.0.tar.gz.

File metadata

File hashes

Hashes for cloudformation-cli-hooks-extension-0.2.0.tar.gz
Algorithm Hash digest
SHA256 39e27ce3419a4ce3c9e78e865cf7cbf23214376bfbe682a170169c89b33cfe5f
MD5 a052dfd7f1fef42605121b2da89ebac7
BLAKE2b-256 f5ea0d78214212e9d140d19b3551f90c465f9dd6db43a50c3fcc73acc2adf549

See more details on using hashes here.

File details

Details for the file cloudformation_cli_hooks_extension-0.2.0-py3-none-any.whl.

File metadata

File hashes

Hashes for cloudformation_cli_hooks_extension-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 d3d5ae4fba972598383acbb0fbadbbac8977fabbce12d0f8d307f64bfd3acce8
MD5 d6f9748417f905506798c8da5a9c6eda
BLAKE2b-256 cc2b84f56a61bae8ba105f844e641203baca7f9634d82bf2eed147dab6d23439

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page