Skip to main content

aws_cloudformation_stacks Resource

[edit on GitHub]

Use the aws_cloudformation_stacks InSpec audit resource to test properties of an AWS CloudFormation stack in bulk.

Installation

This resource is available in the Chef InSpec AWS resource pack.

See the Chef InSpec documentation on cloud platforms for information on configuring your AWS environment for InSpec and creating an InSpec profile that uses the InSpec AWS resource pack.

Syntax

Ensure that aws_cloudformation_stacks exists

describe aws_cloudformation_stacks do
  it { should exist }
end

See the AWS documentation on CloudFormation for additional information.

Parameters

This resource does not require any parameters.

Properties

stack_name
The name associated with the stack.
stack_id
Unique identifier of the stack.
creation_time
The time at which the stack was created.
notification_arns
SNS topic ARNs to which stack related events are published.
role_arn
The Amazon Resource Name (ARN) of an AWS Identity and Access Management (IAM) role that is associated with the stack.
parent_id
For nested stacks–stacks created as resources for another stack–the stack ID of the direct parent of this stack.
root_id
For nested stacks–stacks created as resources for another stack–the stack ID of the top-level stack to which the nested stack ultimately belongs.

Examples

Request the names of all CloudFormation stacks, then test in-depth using the aws_cloudformation_stack resource.

aws_cloudformation_stacks.names.each do |stack|
  describe aws_cloudformation_stack(stack_name: stack) do
    it                   { should exist }
    its ('notification_arns')   { should_not be_empty}
    its ('stack_status') { should eq 'CREATE_COMPLETE' }
  end
end

Request the names of all CloudFormation stacks created at a certain time, then test in-depth using the aws_cloudformation_stack resource.

aws_cloudformation_stacks.where(creation_time: 'creation time') do |stack|
  describe aws_cloudformation_stack(stack) do
    it  { should exist }
  end
end

Matchers

This InSpec audit resource has no special matchers.

This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our Universal Matchers page.

exist

The control will pass if the describe returns at least one result.

describe aws_cloudformation_stacks do
  it { should exist }
end

Use should_not to test that an entity should not exist.

describe aws_cloudformation_stacks do
  it { should_not exist }
end

AWS Permissions

Your Principal will need the CloudFormation:Client:DescribeStacksOutput action with Effect set to Allow.

You can find detailed documentation at Authentication and Access Control for CloudFormation

Was this page helpful?

×









Search Results