stackup 1.2.1 → 1.3.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -5
- data/CHANGES.md +4 -0
- data/README.md +9 -0
- data/bin/stackup +8 -0
- data/lib/stackup/version.rb +1 -1
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
|
-
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 9b2b7a0536a72a652bc20f3e2afaa65db33bb97c03fbc761bae6bebd9c6cd664
|
4
|
+
data.tar.gz: c6dfbccf6f5428b37af5ba7b93ddd95f5e22f20ee65f3f92f26c1919384763f8
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 46c0107e466288546bc932eda695cf337b16b3e60755090eb16c6fc66654560fdc3126d0cd87d9ab57a8f24b3fe45161bd5874b182dfce5c1e9b2eafe20934d7
|
7
|
+
data.tar.gz: d461a8ebdc5ad7cf4771e9e86eff852a0af2b513e29bbc46bdf0df10b9536b57711aaf95057062ac1079049a8c74fabb8fd7ea8121a216048128d500cf6335b6
|
data/CHANGES.md
CHANGED
data/README.md
CHANGED
@@ -125,6 +125,15 @@ You can also use the `--with-role` option to temporarily assume a different IAM
|
|
125
125
|
$ stackup myapp-test up -t template.json \
|
126
126
|
--with-role arn:aws:iam::862905684840:role/deployment
|
127
127
|
|
128
|
+
You can use the `--sercvice-role-arn` option to pass a specific IAM service role for CloudFormation to use for stack
|
129
|
+
operations:
|
130
|
+
|
131
|
+
$ stackup myapp-test up -t template.json \
|
132
|
+
--service-role-arn arn:aws:iam::862905684840:role/cloudformation-role
|
133
|
+
|
134
|
+
|
135
|
+
(for more information on CloudFormation service roles, see [AWS' documentation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-servicerole.html)).
|
136
|
+
|
128
137
|
### Using URLs as inputs
|
129
138
|
|
130
139
|
You can use either local files, or HTTP URLs, to specify inputs; stack template, parameters, etc.
|
data/bin/stackup
CHANGED
@@ -192,6 +192,13 @@ Clamp do
|
|
192
192
|
:attribute_name => :policy_source,
|
193
193
|
&Stackup::Source.method(:new)
|
194
194
|
|
195
|
+
option "--service-role-arn", "SERVICE_ROLE_ARN", "cloudformation service role ARN" do |arg|
|
196
|
+
unless arg =~ %r{^arn:aws:iam::\d+:role/}
|
197
|
+
fail ArgumentError, "#{arg.inspect} doesn't look like a role ARN"
|
198
|
+
end
|
199
|
+
arg
|
200
|
+
end
|
201
|
+
|
195
202
|
option "--on-failure", "ACTION",
|
196
203
|
"when stack creation fails: DO_NOTHING, ROLLBACK, or DELETE",
|
197
204
|
:default => "ROLLBACK"
|
@@ -218,6 +225,7 @@ Clamp do
|
|
218
225
|
options[:stack_policy] = policy_source.data
|
219
226
|
end
|
220
227
|
end
|
228
|
+
options[:role_arn] = service_role_arn if service_role_arn
|
221
229
|
options[:use_previous_template] = use_previous_template?
|
222
230
|
report_change do
|
223
231
|
stack.create_or_update(options)
|
data/lib/stackup/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: stackup
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.3.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Mike Williams
|
@@ -9,7 +9,7 @@ authors:
|
|
9
9
|
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date:
|
12
|
+
date: 2018-05-22 00:00:00.000000000 Z
|
13
13
|
dependencies:
|
14
14
|
- !ruby/object:Gem::Dependency
|
15
15
|
name: aws-sdk-resources
|
@@ -134,7 +134,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
134
134
|
version: '0'
|
135
135
|
requirements: []
|
136
136
|
rubyforge_project:
|
137
|
-
rubygems_version: 2.6
|
137
|
+
rubygems_version: 2.7.6
|
138
138
|
signing_key:
|
139
139
|
specification_version: 4
|
140
140
|
summary: Manage CloudFormation stacks
|