Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
aws-cfm-utils
Advanced tools
npm install -g aws-cfm-utils
Usage: aws-cfm-utils [options]
Help: aws-cfm-utils --help
Version: aws-cfm-utils --version
Options:
--stack-name [string] [required]
--template-body CFM template file name [string]
--stack-policy-body Stack policy file name [string]
--accesskeyid AWS access key [string]
--secretkey AWS secret key [string]
-h, --help Show help [boolean]
--parameters CFM Parameters [array]
--tags CFM Tags [array]
--region [string] [default: "eu-west-1"]
--capabilities [array] [choices: "CAPABILITY_NAMED_IAM", "CAPABILITY_IAM"]
--profile [string]
--role-arn [string]
--resource-types [array]
--disable-rollback [boolean]
--template-url [string]
--stack-policy-url [string]
--notification-arns [array]
--timeout-in-minutes [number]
--on-failure [string] [choices: "DO_NOTHING", "ROLLBACK", "DELETE"]
--use-previous-template [boolean]
--stack-policy-during-update-body [string]
--stack-policy-during-update-url [string]
--enable-termination-protection [boolean]
--stack-events [boolean]
-v, --version Show version number [boolean]
1. aws-cfm-utils --stack-name stackname --template-body cfmtemplate --stack-policy-body stackpolicy --region eu-west-1 --enable-termination-protection true
2. aws-cfm-utils --stack-name mynewstack --template-body test/fixtures/template.json --stack-policy-body test/fixtures/stackpolicy.json --enable-termination-protection true --region eu-west-1 --parameters test/fixtures/parameters.json --tags Key=TestTag,Value=TestTagValue Key=TestTag2,Value=TestTagValue2 Key=TestTag3,Value=TestTagValue4
3. aws-cfm-utils --stack-name mynewstack --template-body test/fixtures/template.json --stack-policy-body test/fixtures/stackpolicy.json --enable-termination-protection true --region eu-west-1 --parameters test/fixtures/parameters.json --tags test/fixtures/tags.json
4. aws-cfm-utils --stack-name mynewstack --template-body test/fixtures/template.json --stack-policy-body test/fixtures/stackpolicy.json --enable-termination-protection --region eu-west-1 --parameters ParameterKey=TestName,ParameterValue=TestKey ParameterKey=TestName2,ParameterValue=TestKey2
// More complicated ParameterValues in the following two examples, ensure to escape double quotes
5. aws-cfm-utils --stack-name mynewstack --template-body test/fixtures/template.json --stack-policy-body test/fixtures/stackpolicy.json --enable-termination-protection --parameters ParameterKey=TestName,ParameterValue=\"subnet1,subnet2,subnet3\" ParameterKey=TestName2,ParameterValue=TestKey2
6. aws-cfm-utils --stack-name mynewstack --template-body test/fixtures/template.json --stack-policy-body test/fixtures/stackpolicy.json --no-enable-termination-protection --parameters ParameterKey=vpc,ParameterValue=\"vpcid=12345,vpceid=12345\" ParameterKey=TestName2,ParameterValue=TestKey2
// More complicated TagValue in the following two examples, ensure to escape double quotes
7. aws-cfm-utils --stack-name mynewstack --template-body test/fixtures/template.json --stack-policy-body test/fixtures/stackpolicy.json --enable-termination-protection --parameters ParameterKey=TestName,ParameterValue=\"subnet1,subnet2,subnet3\" ParameterKey=TestName2,ParameterValue=TestKey2 --tags Key=TestTag,Value=TestTagValue Key=s3buckets,Value=\"s3://bucket_name1/....,s3://bucket_name2/....\"
8. aws-cfm-utils --stack-name mynewstack --template-body test/fixtures/template.json --stack-policy-body test/fixtures/stackpolicy.json --no-enable-termination-protection --parameters ParameterKey=vpc,ParameterValue=\"vpcid=12345,vpceid=12345\" ParameterKey=TestName2,ParameterValue=TestKey2 --tags Key=s3bucket,Value=\"S3link=s3://bucket_name/....,S3name=bucket_name\"
// Using AccessKeyID and SecretKey credentials
9. aws-cfm-utils --stack-name mynewstack --template-body test/fixtures/template.json --stack-policy-body test/fixtures/stackpolicy.json --no-enable-termination-protection --parameters test/fixtures/parameters.json --tags test/fixtures/tags.json --accesskeyid A12389sasfas123A --secretkey /+-sadasd213123,123asdPOhrP9+4xW8z7v3h --stack-events
// Using profile from your aws config
10. aws-cfm-utils --stack-name mynewstack --template-body test/fixtures/template.json --stack-policy-body test/fixtures/stackpolicy.json --no-enable-termination-protection --parameters test/fixtures/parameters.json --tags test/fixtures/tags.json --profile yourprofilname --stack-events
In general, please use /"your_values/"
for --parameters
or --tags
to ensure your values include all the special characters.
--accesskeyid
--secretkey
--profile
--region // defaults to Ireland region eu-west-1
Note: you can either specify profile
value or accesskeyid
&& secretkey
. Otherwise error is returned. More about credential in Credential settings
section.
--enable-termination-protection | --no-enable-termination-protection
--disable-rollback | --no-disable-rollback
--timeout-in-minutes
--on-failure
--use-previous-template | --no-use-previous-template
--stack-policy-during-update-body
--stack-policy-during-update-url
In order to see all the CloudFormation Stack Events
happening during update/create process. Use the following option;
--stack-events // if not specified only stack status is shown
Example log output when --stack-events
is specified. It is very similar to what we see in the AWS Console:
Stack Events for stack: mynewstack
-----------------------------------------------------------------------------------------------------------------------------
TimeStamp ResourceStatus Type LogicalID Reason
--------------------------------------- ------------------ -------------------------- -------------------- --------------
Sun May 13 2018 03:51:17 GMT+0100 (BST) UPDATE_COMPLETE AWS::EC2::NetworkAcl PrivateNetworkAcl
Sun May 13 2018 03:51:17 GMT+0100 (BST) UPDATE_IN_PROGRESS AWS::EC2::NetworkAcl PrivateNetworkAcl
Sun May 13 2018 03:51:16 GMT+0100 (BST) UPDATE_COMPLETE AWS::EC2::Subnet PublicSubnet1
Sun May 13 2018 03:51:16 GMT+0100 (BST) UPDATE_COMPLETE AWS::EC2::Subnet PublicSubnet2
Sun May 13 2018 03:51:16 GMT+0100 (BST) UPDATE_COMPLETE AWS::EC2::Subnet PrivateSubnet2
Sun May 13 2018 03:51:15 GMT+0100 (BST) UPDATE_COMPLETE AWS::EC2::RouteTable PrivateRouteTable1
Sun May 13 2018 03:51:15 GMT+0100 (BST) UPDATE_COMPLETE AWS::EC2::Subnet PrivateSubnet1
Sun May 13 2018 03:51:15 GMT+0100 (BST) UPDATE_COMPLETE AWS::EC2::RouteTable PublicRouteTable
Sun May 13 2018 03:51:15 GMT+0100 (BST) UPDATE_COMPLETE AWS::EC2::RouteTable PrivateRouteTable2
...
The AWS CLI looks for credentials and configuration settings in the following order:
npm run test
npm run lint
npm run coverage
If you have any questions, drop me an email marcincuber@hotmail.com or open an issue and leave stars! :)
FAQs
AWS utils to deploy cloudformation stack/templates
The npm package aws-cfm-utils receives a total of 6 weekly downloads. As such, aws-cfm-utils popularity was classified as not popular.
We found that aws-cfm-utils demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.