cloudformation-tool 1.2.2 → 1.4.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 15f7ca4dd9a56c71678b984eee089dea7b320bf9e0e7b3d02f72f6d52c3b0182
4
- data.tar.gz: 519a9758535c8323f472b512128a96f676eaa611147a0202a09542eb5bee8418
3
+ metadata.gz: 818f632bb0756f9be2ba922936b2a68e93a12d3af1a10b069e48941dd0615cfd
4
+ data.tar.gz: 612c5e90b2a95f54435e1ddcbd65a4f833863097c61709a7d9d6895dd041c91e
5
5
  SHA512:
6
- metadata.gz: f3b0164a2992ee13b4a0278f17fd396f7e4e49718b2c5b7a524894fc1a6002ea070295d3127d646d782b4f3b6d0de85641791ad91932d63b099a1e23b30d79b9
7
- data.tar.gz: 41bc98433f5ec0eae331b6733c1f6b26dbdaf25e320b0c57c1763148efd3b62798808f1db612f84c8817210db0555e8caf7c6c709a3960849462a2052fd1baf6
6
+ metadata.gz: ed6cb8daf2f5990b0a0df87149f9537e29153aacaa65c81a73fee2f2dc05e7d882a99463c22e1fafb00f46757961418df392e730cca805783922ad62db6114ba
7
+ data.tar.gz: 9d584621509bf30401687ca5c946d9dd45d38a9ad6454b929283099db0ed2ae2aa4ddf93eecf2e123936c4c0a98c605bbe9bfb38c44609c94d4b06e09f626cb1
data/README.md CHANGED
@@ -103,27 +103,30 @@ multiple sub-templates, this is an error that would cause the tool to abort.
103
103
 
104
104
  ### Loading user data files
105
105
 
106
- When specifying a user-data block for a `LaunchConfiguration` resource or an `Instance`
107
- resource, the user-data can be loaded from an external YAML file (only YAML formatted user-data
108
- is currently supported, sorry) by specifying the `UserData` element as a map with the single
109
- field `File` that is set with the relative path to the user-data file. The user-data file is
110
- expected to be a cloud-init configuration file with the default extension `.init`.
111
-
112
- Alternatively, the field `FileTemplate` can be used under `UserData` to load an external cloud-init configuration file that includes variable place holders for the
113
- (CloudFormation intrinsic function Sub)[http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-sub.html]. The `FileTemplate` mode supports all
114
- the features described above as well as it performs the parsing detailed below, except
115
- compression and S3 offloading - as doing so prevents CloudFormation from performing the
116
- substitution operation. As a result, if the resulting cloud-init file is larger than 16KB
117
- you should expect that the template will fail to create the server.
106
+ When specifying a user-data block for a `LaunchConfiguration` resource, `Instance`
107
+ resource, or a `LaunchTemplate` resource, the user-data can be loaded from an external
108
+ YAML file (only YAML formatted user-data is currently supported, sorry) by specifying the
109
+ `UserData` element as a map with the single field `File` that is set with the relative
110
+ path to the user-data file. The user-data file is expected to be a cloud-init configuration
111
+ file with the default extension `.init` (but there really aren't any filename requirements).
112
+
113
+ Alternatively, the field `FileTemplate` can be used under `UserData` to load an external
114
+ cloud-init configuration file that includes variable place holders for the
115
+ (CloudFormation intrinsic function Sub)[http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/intrinsic-function-reference-sub.html].
116
+ The `FileTemplate` mode supports all the features described above as well as it performs
117
+ the parsing detailed below, except compression and S3 offloading - as doing so prevents
118
+ CloudFormation from performing the substitution operation. As a result, if the resulting
119
+ cloud-init file is larger than 16KB you should expect that the template will fail to create
120
+ the stack.
118
121
 
119
122
  #### User data file parsing
120
123
 
121
124
  The reference file will be loaded and parsed as a ("Cloud Config data" file)[http://cloudinit.readthedocs.io/en/latest/topics/format.html#cloud-config-data]
122
- with the special `write_files` and `write_directories` enhancement (see below). The result is then checked that it
123
- does not exceed the user-data size limitation. If the file is bigger than can fit in the AWS
124
- user-data block, it will first be compressed using gzip and if it is still too large, it will
125
- be uploaded to S3 and the user-data block will be set with a cloud-init download reference to
126
- the S3 object.
125
+ with the special `write_files` and `write_directories` enhancement (see below).
126
+ The result is then checked that it does not exceed the user-data size limitation.
127
+ If the file is bigger than can fit in the AWS user-data block, it will first be compressed
128
+ using gzip and if it is still too large, it will be uploaded to S3 and the user-data block
129
+ will be set with a cloud-init download reference to the S3 object.
127
130
 
128
131
  ##### Enhanced `write_files`
129
132
 
@@ -216,6 +219,102 @@ specifying the S3 bucket and object key, either of the following fields may be u
216
219
  Role: !GetAtt [ LambdaExecutionRole, Arn ]
217
220
  ```
218
221
 
222
+ ### Nested Stacks Modules
223
+
224
+ The CloudFormation pre-compiler supports loading local templates as "nested stacks" using the
225
+ CloudFormation `AWS::CloudFormation::Stack` resource type.
226
+
227
+ Instead of first pre-deploying a template to S3 to be used for a nested stack, use the
228
+ `Template` property (instead of the `TemplateURL` property) to point to a local
229
+ sub-template. The sub-template will be compiled separately and deployed automatically to
230
+ an S3 bucket before deploying the compiled template to CloudFormation.
231
+
232
+ The `monitor` tool (also used during `create` operation) supports nested stacks by
233
+ automatically detecting nested stack updates in the main stack's event stream and will
234
+ start streaming the nested stack events - this allows the user to more easily locate problems
235
+ with nested stacks.
236
+
237
+ Currently there's no automatic resolution of references between nested and parent stacks, so
238
+ make sure to set up nested stack parameters for all resources that should be referenced from
239
+ the parent stack.
240
+
241
+ #### Example
242
+
243
+ `cloud-formation.yaml`:
244
+
245
+ ```
246
+ AWSTemplateFormatVersion: "2010-09-09"
247
+ Description: "CloudFormation template with nested stacks"
248
+ Parameters:
249
+ DomainName:
250
+ Description: "The DNS domain name for the system"
251
+ Type: String
252
+ Default: example.com
253
+ AMI:
254
+ Description: "The AMI ID for the image to deploy"
255
+ Type: String
256
+ Default: ami-af4333cf
257
+
258
+ Resources:
259
+ VPC:
260
+ Type: AWS::EC2::VPC
261
+ Properties:
262
+ CidrBlock: 172.20.0.0/16
263
+ EnableDnsSupport: true
264
+ EnableDnsHostnames: true
265
+ SecurityGroupExample:
266
+ Type: AWS::EC2::SecurityGroup
267
+ Properties:
268
+ VpcId: !Ref VPC
269
+ GroupDescription: example security group
270
+ SecurityGroupIngress:
271
+ - { IpProtocol: icmp, CidrIp: 0.0.0.0/0, FromPort: -1, ToPort: -1 }
272
+ - { IpProtocol: tcp, CidrIp: 0.0.0.0/0, FromPort: 22, ToPort: 22 }
273
+ ServiceStack:
274
+ Type: AWS::CloudFormation::Stack
275
+ Properties:
276
+ Template: service.yaml
277
+ Parameters:
278
+ DomainName: !Ref DomainName
279
+ AMI: !Ref AMI
280
+ VPC: !Ref VPC
281
+ ```
282
+
283
+ `service.yaml`:
284
+
285
+ ```
286
+ AWSTemplateFormatVersion: "2010-09-09"
287
+ Description: "Service nested stack"
288
+ Parameters:
289
+ DomainName:
290
+ Description: "The DNS domain name for the system"
291
+ Type: String
292
+ AMI:
293
+ Description: "The AMI ID for the image to deploy"
294
+ Type: String
295
+ VPC:
296
+ Description: "The VPC into which to deploy the service"
297
+ Type: String
298
+
299
+ Resources:
300
+ Subnet:
301
+ Type: AWS::EC2::Subnet
302
+ Properties:
303
+ AvailabilityZone: !Select [ 0, !GetAZs { Ref: "AWS::Region" } ]
304
+ CidrBlock: 172.20.0.0/24
305
+ MapPublicIpOnLaunch: true
306
+ VpcId: !Ref VPC
307
+ Ec2Instance:
308
+ Type: AWS::EC2::Instance
309
+ Properties:
310
+ ImageId: !Ref AMI
311
+ KeyName: "secret"
312
+ NetworkInterfaces:
313
+ - AssociatePublicIpAddress: "true"
314
+ DeviceIndex: "0"
315
+ SubnetId: !Ref Subnet
316
+ ```
317
+
219
318
  ## Caching
220
319
 
221
320
  Some resource compilation may require uploading to S3, such as Lambda code or cloud-init setup
@@ -248,7 +347,12 @@ The following commands are supported:
248
347
  - `status` - Check if the names stack exists or not
249
348
  - `delete` - Delete the specified stack. After issuing the delete command, the tool will
250
349
  immediately start `monitor` mode until the operation has completed.
251
- - `servers` - List EC2 instances created and managed by this stack.
350
+ - `servers` - List EC2 instances created and managed by this stack, per autoscaling group, including servers in nested stacks.
351
+ - `groups` - list autoscaling groups managed by the stack, including groups in nested stacks.
352
+ - `recycle` - recycle servers in an autoscaling group in a stack by scaling the group up and down.
353
+ - `scale` - set the scale of an autoscaling group managed by a stack to a specific desired value.
354
+ - `invalidate` - send an invalidation request to a CloudFront distribution managed by a stack.
355
+ - `output` - retrieve output values from a stack.
252
356
 
253
357
  Please see the specific help for each command by running `cftool <command> --help` for
254
358
  more details and specific options.
@@ -260,3 +364,100 @@ The AWS region to be used can be select by specifying top level option (i.e. bef
260
364
  ### Credentials Selection
261
365
 
262
366
  The tool will use the standard AWS credentials selection process, except when you want to use AWS CLI configured credential profiles, you may select to use a profile other than "default" by specifying the top level option (i.e. before the command name) `-p <profile>`, by providing the standard environment variable `AWS_DEFAULT_PROFILE` or by having a file called `.awsprofile` - whose content is the name of a valid AWS REGION - in a parent directory (at any level up to the root directory).
367
+
368
+ ## Library API
369
+
370
+ The cloudformatin tool can also be consumed as a library by other applications - for example an application that needs to perform high-level business-logic oriented
371
+ operations for a specific application deployed in a stack, using the cloudformation tool abstraction of CloudFormation templates and stacks.
372
+
373
+ ### Usage as a library
374
+
375
+ To use the cloudformatin tool as a library, require `cloud_formation_tool`.
376
+
377
+ ### CloudFormation templates
378
+
379
+ The cloudformation pre-compiler can be used to manipulate pre-compiled templates.
380
+
381
+ To access the pre-compiler, initialize a `CloudFormationTool::CloudFormation` with the path to the local template resource (either a file or a directory that can be
382
+ parsed by the pre-compiler).
383
+
384
+ The initial template resource will be loaded but will not be fully parsed - and included elements will not be read - until the `compile` method is called.
385
+
386
+ The following method calls are available on the `CloudFormation` instance:
387
+
388
+ #### `compile(parameters = nil)`
389
+
390
+ Pre-compiles the template, with the provided parameter `Hash`, if provided. Returns a `Hash` repsenting the compiled template.
391
+
392
+ #### `to_yaml`
393
+
394
+ Pre-compiles the template and returns a YAML rendering of the CloudFormation template, suitable for deploying to AWS CloudFormation.
395
+
396
+ #### `each`
397
+
398
+ Yields a tuple for each defined template parameter, that includes the parameter's name and its default value (if set, `nil` otherwise).
399
+
400
+ ### CloudFormation stacks
401
+
402
+ The cloudformation tool's abstraction of a CloudFormation stack can be used to manipulate stack resouces, such as autoscaling groups or instances in a stack context.
403
+
404
+ To access the stack API, initialize a `CloudFormationTool::CloudFormation::Stack` with the name of the stack. You can then access the following methods:
405
+
406
+ #### `exist?`
407
+
408
+ Check if a stack exists.
409
+
410
+ #### `create(template, params = {})`
411
+
412
+ Create or update a stack by deploying the specified template. The template can be any local file or directory resource that can be parsed by the cloudformation pre-compiler.
413
+
414
+ #### `delete`
415
+
416
+ Deletes the stack
417
+
418
+ #### `stack_id`
419
+
420
+ Return the AWS CloudFormation stack identifier for the stack, which is the ARN of the stack.
421
+
422
+ #### `output`
423
+
424
+ Returns the output values of the stack
425
+
426
+ #### `resources`
427
+
428
+ Return a list of resources in the stack and all of its nested stacks
429
+
430
+ #### `asgroups`
431
+
432
+ Return a list of autoscaling groups in the stack and all of its nested stacks. The returned values are AWS SDK CloudFormation resources, extended with a set of methods
433
+ to help manage autoscaling groups:
434
+
435
+ ##### `group`
436
+
437
+ Returns the AWS SDK `Aws::AutoScaling::AutoScalingGroup` object for the autoscaling group.
438
+
439
+ #### `cdns`
440
+
441
+ Return a list of CloudFront CDN distributions in the stack and all of its nested stacks. The returnd values are AWS SDK CloudFormation resources, extended with a set of
442
+ methods to help manage CloudFront distributions:
443
+
444
+ ##### `distribution`
445
+
446
+ Returns the AWS SDK `Aws::CloudFront::Types::Distribution` object for the CloudFront distribution.
447
+
448
+ ##### `domain_names`
449
+
450
+ Returns the comma delimited list of the distribution aliases domain names
451
+
452
+ ##### `invalidate(path)`
453
+
454
+ Creates a new invalidation in the CloudFront distribution with the specified path expression
455
+
456
+ #### `each`
457
+
458
+ Yields CloudFormation stack events, in the order they were created. Subsequent calls to `each` will not repeat events previously yielded and will only yield additional
459
+ events created since the last call to `each`.
460
+
461
+ #### `see_event`
462
+
463
+ Mark all events since the last call to `each` (or from stack creation, if `each` was not previously called) as "seen" so they will not be yielded in future calls to `each`.
@@ -31,7 +31,7 @@ module CloudFormationTool
31
31
 
32
32
  option [ "-d", "--debug" ], :flag, "Enable debug logging" do
33
33
  logger.level = Logger::Severity::DEBUG
34
- logger.formatter = logger.default_formatter
34
+ logger.formatter = nil
35
35
  end
36
36
 
37
37
  option [ "-q", "--quiet" ], :flag, "Enable debug logging" do
@@ -23,7 +23,7 @@ module CloudFormationTool
23
23
  begin
24
24
  text = File.read(@path)
25
25
  # remove comments because white space seen between comments can seriously psych Psych
26
- text.gsub!(/^#.*\n/s,'')
26
+ text.gsub!(/^#.*\n/,'')
27
27
  text = fixShorthand(text)
28
28
  @data = YAML.load(text).to_h
29
29
  rescue Psych::SyntaxError => e
@@ -167,7 +167,7 @@ module CloudFormationTool
167
167
  restype = data['Type'] if restype.nil? and data.key?('Type')
168
168
  data.inject({}) do |dict, (key, val)|
169
169
  dict[key] = case restype
170
- when 'AWS::AutoScaling::LaunchConfiguration'
170
+ when 'AWS::AutoScaling::LaunchConfiguration', 'AWS::EC2::LaunchTemplate'
171
171
  if (key == "UserData") and (val["File"])
172
172
  # Support LaunchConfiguration UserData from file
173
173
  CloudInit.new("#{@basedir}/#{val["File"]}").to_base64
@@ -183,6 +183,12 @@ module CloudFormationTool
183
183
  else
184
184
  load_files(val, restype)
185
185
  end
186
+ when 'AWS::CloudFormation::Stack'
187
+ if key == 'Properties' and val.key?('Template')
188
+ NestedStack.new(val, self).to_cloudformation
189
+ else
190
+ load_files(val, restype)
191
+ end
186
192
  else
187
193
  load_files(val, restype)
188
194
  end
@@ -0,0 +1,25 @@
1
+ module CloudFormationTool
2
+ class CloudFormation
3
+
4
+ class NestedStack
5
+ include Storable
6
+
7
+ def initialize(props, tpl)
8
+ @tpl = tpl
9
+ @data = props
10
+ if props.key?('Template')
11
+ path = props['Template']
12
+ path = if path.start_with? "/" then path else "#{@tpl.basedir}/#{path}" end
13
+ @content = CloudFormation.new(path).to_yaml
14
+ @data['TemplateURL'] = upload(make_filename('yaml'), @content, mime_type: 'text/yaml', gzip: false)
15
+ @data.delete('Template')
16
+ end
17
+ end
18
+
19
+ def to_cloudformation
20
+ @data
21
+ end
22
+
23
+ end
24
+ end
25
+ end
@@ -15,6 +15,7 @@ module CloudFormationTool
15
15
  @name = name
16
16
  @seenev = Set.new
17
17
  @watch_timeouts = 0
18
+ @nested_stacks = Hash[]
18
19
  end
19
20
 
20
21
  def delete
@@ -95,7 +96,14 @@ module CloudFormationTool
95
96
  def resources
96
97
  begin
97
98
  awscf.list_stack_resources(stack_name: @name).each do |resp|
98
- resp.stack_resource_summaries.each { |res| yield res }
99
+ resp.stack_resource_summaries.each do |res|
100
+ yield res
101
+ if res.resource_type == 'AWS::CloudFormation::Stack'
102
+ Stack.new(res.physical_resource_id).resources do |nested_res|
103
+ yield nested_res
104
+ end
105
+ end
106
+ end
99
107
  end
100
108
  rescue Aws::CloudFormation::Errors::ValidationError => e
101
109
  raise CloudFormationTool::Errors::AppError, "Failed to get resources: #{e.message}"
@@ -133,6 +141,7 @@ module CloudFormationTool
133
141
  end
134
142
 
135
143
  def monitor(start_time = nil)
144
+ @nested_stacks = Hash[]
136
145
  done = false
137
146
  begin
138
147
  until done
@@ -140,26 +149,65 @@ module CloudFormationTool
140
149
  next if @seenev.add?(ev.event_id).nil?
141
150
  text = "#{ev.timestamp.strftime "%Y-%m-%d %H:%M:%S"}| " + %w(
142
151
  resource_type:40
143
- logical_resource_id:38
152
+ logical_resource_id:42
144
153
  resource_status
145
154
  ).collect { |field|
146
155
  (name,size) = field.split(":")
147
156
  size ||= 1
148
- ev.send(name.to_sym).ljust(size.to_i, ' ')
157
+ (if name == 'logical_resource_id' and ev.stack_name != self.name
158
+ logical_nested_stack_name(ev.stack_name) + "|"
159
+ else
160
+ ''
161
+ end + ev.send(name.to_sym)).ljust(size.to_i, ' ')
149
162
  }.join(" ")
150
163
  text += " " + ev.resource_status_reason if ev.resource_status =~ /_FAILED/
151
164
  if start_time.nil? or start_time < ev.timestamp
152
165
  puts text
153
166
  end
154
- done = (ev.resource_type == "AWS::CloudFormation::Stack" and ev.resource_status =~ /(_COMPLETE|_FAILED)$/)
167
+ check_nested_stack(ev)
168
+ done = is_final_event(ev)
155
169
  end
170
+ sleep 1
156
171
  end
157
172
  rescue CloudFormationTool::Errors::StackDoesNotExistError => e
158
173
  puts "Stack #{name} does not exist"
159
174
  end
160
175
  end
161
176
 
177
+ def logical_nested_stack_name(phys_name)
178
+ @nested_stacks[phys_name] || 'unknown'
179
+ end
180
+
181
+ def nested_stack_name(ev)
182
+ ev.physical_resource_id.split('/')[1]
183
+ end
184
+
185
+ def check_nested_stack(ev)
186
+ return unless ev.resource_type == "AWS::CloudFormation::Stack" and
187
+ ev.logical_resource_id != self.name # not nested stack
188
+ return if @nested_stacks.has_key? ev.logical_resource_id # seeing the first or last nested stack event - ignoring
189
+ @nested_stacks[nested_stack_name(ev)] = ev.logical_resource_id
190
+ end
191
+
192
+ def is_final_event(ev)
193
+ ev.resource_type == "AWS::CloudFormation::Stack" and
194
+ ev.resource_status =~ /(_COMPLETE|_FAILED)$/ and
195
+ ev.logical_resource_id == self.name
196
+ end
197
+
198
+ def tracked_stacks
199
+ [ self.name ] + @nested_stacks.keys.compact
200
+ end
201
+
162
202
  def each
203
+ tracked_stacks.each do |name|
204
+ events_for(name) do |ev|
205
+ yield ev
206
+ end
207
+ end
208
+ end
209
+
210
+ def events_for(stack_name)
163
211
  token = nil
164
212
  sleep(if @_last_poll_time.nil?
165
213
  0
@@ -172,7 +220,7 @@ module CloudFormationTool
172
220
  end
173
221
  end)
174
222
  begin
175
- resp = awscf.describe_stack_events stack_name: name, next_token: token
223
+ resp = awscf.describe_stack_events stack_name: stack_name, next_token: token
176
224
  @watch_timeouts = 0
177
225
  resp.stack_events.each do |ev|
178
226
  yield ev
@@ -188,7 +236,11 @@ module CloudFormationTool
188
236
  end
189
237
  rescue Aws::CloudFormation::Errors::ValidationError => e
190
238
  if e.message =~ /does not exist/
191
- raise CloudFormationTool::Errors::StackDoesNotExistError, "Stack does not exist"
239
+ if stack_name == self.name
240
+ raise CloudFormationTool::Errors::StackDoesNotExistError, "Stack does not exist"
241
+ end
242
+ # ignore "does not exist" errors on nested stacks - we may try to poll them before
243
+ # they actually exist. We'll just try later
192
244
  else
193
245
  raise e
194
246
  end
@@ -45,7 +45,7 @@ module CloudFormationTool
45
45
  def encode(allow_gzip = true)
46
46
  yamlout = compile
47
47
  usegzip = false
48
- if allow_gzip and yamlout.size > 16384 # max AWS EC2 user data size - try compressing it
48
+ if allow_gzip and yamlout.size > 16000 # max AWS EC2 user data size - try compressing it
49
49
  yamlout = Zlib::Deflate.new(nil, 31).deflate(yamlout, Zlib::FINISH) # 31 is the magic word to have deflate create a gzip compatible header
50
50
  usegzip = true
51
51
  end
@@ -1,3 +1,3 @@
1
1
  module CloudFormationTool
2
- VERSION = '1.2.2'
2
+ VERSION = '1.4.0'
3
3
  end
metadata CHANGED
@@ -1,29 +1,29 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: cloudformation-tool
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.2.2
4
+ version: 1.4.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Oded Arbel
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-12-23 00:00:00.000000000 Z
11
+ date: 2021-01-17 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: rake
15
15
  requirement: !ruby/object:Gem::Requirement
16
16
  requirements:
17
- - - "~>"
17
+ - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: '12'
19
+ version: 12.3.3
20
20
  type: :runtime
21
21
  prerelease: false
22
22
  version_requirements: !ruby/object:Gem::Requirement
23
23
  requirements:
24
- - - "~>"
24
+ - - ">="
25
25
  - !ruby/object:Gem::Version
26
- version: '12'
26
+ version: 12.3.3
27
27
  - !ruby/object:Gem::Dependency
28
28
  name: clamp
29
29
  requirement: !ruby/object:Gem::Requirement
@@ -168,6 +168,7 @@ files:
168
168
  - lib/cloud_formation_tool/cloud_formation.rb
169
169
  - lib/cloud_formation_tool/cloud_formation/cloud_front_distribution.rb
170
170
  - lib/cloud_formation_tool/cloud_formation/lambda_code.rb
171
+ - lib/cloud_formation_tool/cloud_formation/nested_stack.rb
171
172
  - lib/cloud_formation_tool/cloud_formation/stack.rb
172
173
  - lib/cloud_formation_tool/cloud_init.rb
173
174
  - lib/cloud_formation_tool/errors.rb
@@ -192,7 +193,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
192
193
  - !ruby/object:Gem::Version
193
194
  version: '0'
194
195
  requirements: []
195
- rubygems_version: 3.0.1
196
+ rubygems_version: 3.1.2
196
197
  signing_key:
197
198
  specification_version: 4
198
199
  summary: A pre-compiler tool for CloudFormation YAML templates