Awesome
cfn-resolver-cli
NodeJS CLI that resolves and evaluates values in AWS CloudFormation templates based on the provided stack parameters and produces the resolved templates in YAML and JSON.
Did you ever had to debug what's wrong with your AWS CloudFormation template and why your stack deployment fails? Your YAML/JSON could contain some logic with all kinds of nested intrinsic functions and CFN pseudo parameters and sometimes this can get even more complex when you use a tool (e.g. AWS CDK) that generates the file for you.
If you have more than couple of these in your templates it is quite time consuming to figure out which exactly caused the deployment to fail. This simple tool (cfn-resolver-lib and cfn-resolver-cli) tries to mitigate the issue by evaluating these logic and provide the final exact values that will be used in deployment time.
Example
Input
Your CloudFormation template:
Mappings:
FooSrvS3ReaderUserIdMap:
"us-east-1":
UserName: "s3_reader_new"
"us-west-2":
UserName: "s3_reader"
Resources:
HelloBucket:
Properties:
BucketName: "hello-cfn-resolver" # has to be globally unique, calculation is removed for clearity
Type: "AWS::S3::Bucket"
FooSrvBucketPolicy":
Type: "AWS::S3::BucketPolicy"
Properties:
Bucket:
Ref: HelloBucket
PolicyDocument:
Statement:
- Action": "s3:GetObject*"
Effect": Allow
Principal:
AWS:
"Fn::Join":
- ""
- - "arn:"
- "Ref": "AWS::Partition"
- ":iam::"
- "AWS::AccountId"
- ":user/"
- - "Fn::FindInMap":
- "FooSrvS3ReaderUserIdMap"
- "Ref": "AWS::Region"
- "UserName"
Resource:
"Fn::Join":
- ""
- - "Fn::GetAtt":
- HelloBucket
- Arn
- "/*"
Define stack parameters: (e.g. prod-us-west-2-params.json
)
{
"RefResolvers":
{
"AWS::Region": "us-west-2",
"AWS::Partition": "aws",
"AWS::AccountId": "000000111111",
"Stage": "prod",
"AWS::StackId": "MyEvaluatedStackUsWest2"
}
}
Output
Resolved CloudFormation template
Principal:
AWS: "arn:aws:iam::000000111111:user/s3_reader"
Resource: "arn:aws:s3:::hello-cfn-resolver/*"
cfn-resolver can help you
- understand your CFN template better
- troubleshoot CloudFormation deployment issues faster
- secure your IaC with unit tests that assert on exact values before actually deploying anything
- e.g. your unit test now can assert that the
s3_reader
IAM user has access tohello-cfn-resolver
S3 bucket inus-west-2
region in yourprod
stack.
- e.g. your unit test now can assert that the
Installation
npm i -g cfn-resolver-cli
How to use?
cfn-resolver -i "./template.yml" -p "./params/**" -o "./resolved"
Options:
--input, -i provide a path to input template file (YAML or JSON)
--params, -p provide the stack parameters (can be a glob with * or **)
--output, -o output directory (if not provided it will be the same as the input file)
--verbose, -v Run with verbose logging [boolean]
--help Show help [boolean]
--version Show version number [boolean]
Extensibility & Customization
You can pass additional resolver maps in the parameters file, just like RefResolvers
to customize or override the built-in behaviour.
Fn::GetAtt resolution
By default the tool tries to resolve the attributes of resources that are defined within the template itself, but you have the opportunity to override the behaviour for specific cases. Just define the Fn::GetAtt resolver map for custom attribute resolution:
{
"Fn::GetAttResolvers": {
"MyResourceLogicalId1": {
"AttribeteKey1": "TheOverridenAttributeValue"
}
}
}
ARN resolution
With Fn::GetAtt
you can refer to ARN of an other resource defined in the template.
The tool supports ARN resolution for some of the most common AWS CloudFormation resource types (Lambda function, SQS queue, SNS topic, S3 bucket, DyanmoDB Table, etc), but user can provide additional ARN shemas in the parameters file:
{
"ArnSchemas": {
"AWS::DynamoDB::Table": "arn:${Partition}:dynamodb:${Region}:${Account}:table/${TableName}"
}
}
The ${Partition}
, ${Region}
and ${Region}
placeholders will be resolved by using the stack parameters. The last placeholder of the arn schema (in the above example ${TableName}
) will be resolved from the attribute from the resource (if both the resource and its attribute can be found in the template).
Fn::ImportValue resolvers
Define your Fn::ImportValue resolvers in the parameters file as the following:
{
"Fn::ImportValueResolvers": {
"OtherStacksExportedKey1": "MyFakeImportedValue1"
}
}
Supported Features
- Condition Functions
- Fn::FindInMap
- Fn::GetAtt
- Fn::GetAZs
- Fn::Join
- Fn::Select
- Fn::Split
- Fn::Sub (at the moment only key-value map subtitution is supported)
- Fn::ImportValue
- Ref
Unsported Features
Roadmap
- Enchance Fn::Sub to work with template parameter names, resource logical IDs, resource attributes
- Support Fn::Base64
- Support Fn::Cidr
- Add linter/debugging features by identified valudation errors and warnings found during template evaluation (e.g. like cfn-lint)
Contribution
Feel free to implement any missing features or fix bugs. In any case don't forget to add unit tests.