cfn-lint


Namecfn-lint JSON
Version 0.86.4 PyPI version JSON
download
home_pagehttps://github.com/aws-cloudformation/cfn-python-lint
SummaryChecks CloudFormation templates for practices and behaviour that could potentially be improved
upload_time2024-04-22 16:41:30
maintainerNone
docs_urlNone
authorkddejong
requires_python!=4.0,<=4.0,>=3.8
licenseMIT no attribution
keywords aws lint
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage
            # AWS CloudFormation Linter

<img alt="[cfn-lint logo]" src="https://github.com/aws-cloudformation/cfn-python-lint/blob/main/logo.png?raw=true" width="150" align="right">

[![Testing](https://github.com/aws-cloudformation/cfn-python-lint/actions/workflows/test.yaml/badge.svg?branch=main)](https://github.com/aws-cloudformation/cfn-python-lint/actions/workflows/test.yaml)
[![PyPI version](https://badge.fury.io/py/cfn-lint.svg)](https://badge.fury.io/py/cfn-lint)
[![PyPI downloads](https://pepy.tech/badge/cfn-lint/week)](https://pypistats.org/packages/cfn-lint)
[![PyPI downloads](https://pepy.tech/badge/cfn-lint/month)](https://pypistats.org/packages/cfn-lint)
[![codecov](https://codecov.io/gh/aws-cloudformation/cfn-lint/branch/main/graph/badge.svg)](https://codecov.io/gh/aws-cloudformation/cfn-python-lint)
[![Discord Shield](https://img.shields.io/discord/981586120448020580?logo=discord)](https://discord.gg/KENDm6DHCv)

Validate AWS CloudFormation yaml/json templates against the [AWS CloudFormation Resource Specification](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-resource-specification.html) and additional
checks.  Includes checking valid values for resource properties and best practices.

### Warning

This is an attempt to provide validation for AWS CloudFormation templates properties and
their values.  For values things can get pretty complicated (mappings, joins, splits,
conditions, and nesting those functions inside each other) so it's a best effort to
validate those values but the promise is to not fail if we can't understand or translate
all the things that could be going on.

## Contribute

We encourage you to contribute to `cfn-lint`! Please check out the [Contributing Guidelines](https://github.com/aws-cloudformation/cfn-lint/blob/main/CONTRIBUTING.md) for more information on how to proceed.

## Community

Join us on Discord! Connect & interact with CloudFormation developers &
experts, find channels to discuss and get help for cfn-lint, CloudFormation registry, StackSets,
Guard and more:

[![Join our Discord](https://discordapp.com/api/guilds/981586120448020580/widget.png?style=banner3)](https://discord.gg/9zpd7TTRwq)

#### Serverless Application Model

The Serverless Application Model (SAM) is supported by the linter. The template is
transformed using [AWS SAM](https://github.com/awslabs/serverless-application-model) before the linter processes the template.

_To get information about the [SAM Transformation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html), run the linter with `--info`_

## Install

Python 3.8+ is supported.

### Pip

`pip install cfn-lint`. If pip is not available, run
`python setup.py clean --all` then `python setup.py install`.

### Homebrew (macOS)

`brew install cfn-lint`

### Docker

In `cfn-python-lint` source tree:

```shell
docker build --tag cfn-python-lint:latest .
```

In repository to be linted:

```shell
docker run --rm -v `pwd`:/data cfn-python-lint:latest /data/template.yaml
```

### Editor Plugins

There are IDE plugins available to get direct linter feedback from you favorite editor:

* [Atom](https://atom.io/packages/atom-cfn-lint)
* [Emacs](https://www.emacswiki.org/emacs/CfnLint)
* NeoVim 0.2.0+/Vim 8
  * [ALE](https://github.com/w0rp/ale#supported-languages)
  * [Coc](https://github.com/joenye/coc-cfn-lint)
  * [Syntastic](https://github.com/speshak/vim-cfn)
* [Sublime](https://packagecontrol.io/packages/SublimeLinter-contrib-cloudformation)
* [Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=kddejong.vscode-cfn-lint)
* [IntelliJ IDEA](https://plugins.jetbrains.com/plugin/10973-cfn-lint)

### [GitHub Action](https://github.com/marketplace/actions/cfn-lint-action)

### [Online demo](https://github.com/PatMyron/cfn-lint-online)

## Basic Usage

- `cfn-lint template.yaml`
- `cfn-lint -t template.yaml`

Multiple files can be linted by either specifying multiple specific files:

- `cfn-lint template1.yaml template2.yaml`
- `cfn-lint -t template1.yaml template2.yaml`

or by using wildcards (globbing):

Lint all `yaml` files in `path`:

- `cfn-lint path/*.yaml`

Lint all `yaml` files in `path` and all subdirectories (recursive):

- `cfn-lint path/**/*.yaml`

*Note*: If using sh/bash/zsh, you must enable globbing.
(`shopt -s globstar` for sh/bash, `setopt extended_glob` for zsh).

##### Exit Codes
`cfn-lint` will return a non zero exit if there are any issues with your template. The value is dependent on the severity of the issues found.  For each level of discovered error `cfn-lint` will use bitwise OR to determine the final exit code.  This will result in these possibilities.

- 0 is no issue was found
- 2 is an error
- 4 is a warning
- 6 is an error and a warning
- 8 is an informational
- 10 is an error and informational
- 12 is an warning and informational
- 14 is an error and a warning and an informational

###### Configuring Exit Codes
`cfn-lint` allows you to configure exit codes. You can provide the parameter `--non-zero-exit-code` with a value of `informational`, `warning`, `error`, or `none`. `cfn-lint` will determine the exit code based on the match severity being the value of the parameter `--non-zero-exit-code` and higher. The exit codes will remain the same as above.

The order of severity is as follows:
1. `informational` *default*
1. `warning`
1. `error`
1. `none` *Exit code will always be 0 unless there is a syntax error*

##### Specifying the template as an input stream

The template to be linted can also be passed using standard input:

- `cat path/template.yaml | cfn-lint -`

##### Specifying the template with other parameters

- `cfn-lint -r us-east-1 ap-south-1 -- template.yaml`
- `cfn-lint -r us-east-1 ap-south-1 -t template.yaml`

## Configuration

### Command Line

From a command prompt run `cfn-lint <path to template>` to run standard linting of the template.

### Config File

It will look for a configuration file in the following locations (by order of preference):

- `.cfnlintrc`, `.cfnlintrc.yaml` or `.cfnlintrc.yml` in the current working directory
- `~/.cfnlintrc` for the home directory

In that file you can specify settings from the parameter section below.

Example:

```yaml
templates:
  - test/fixtures/templates/good/**/*.yaml
ignore_templates:
  - codebuild.yaml
include_checks:
  - I
custom_rules: custom_rules.txt
```

### Parameters

Optional parameters:

| Command Line  | Metadata | Options | Description |
| ------------- | ------------- | ------------- | ------------- |
| -h, --help  |   | | Get description of cfn-lint |
| -z, --custom-rules | | filename | Text file containing user-defined custom rules. See [here](#Custom-Rules) for more information |
| -t, --template  |   | filename | Alternative way to specify Template file path to the file that needs to be tested by cfn-lint |
| -f, --format    | format | quiet, parseable, json, junit, pretty, sarif | Output format |
| -l, --list-rules | | | List all the rules |
| -r, --regions | regions | [REGIONS [REGIONS ...]], ALL_REGIONS  | Test the template against many regions.  [Supported regions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-resource-specification.html) |
| -b, --ignore-bad-template | ignore_bad_template | | Ignores bad template errors |
| --ignore-templates | | IGNORE_TEMPLATES [IGNORE_TEMPLATES ...] | Ignore templates from being scanned
| -a, --append-rules | append_rules | [RULESPATH [RULESPATH ...]] | Specify one or more rules paths using one or more --append-rules arguments.  Each path can be either a directory containing python files, or an import path to a module. |
| -i, --ignore-checks | ignore_checks | [IGNORE_CHECKS [IGNORE_CHECKS ...]] | Only check rules whose ID do not match or prefix these values.  Examples: <br />- A value of `W` will disable all warnings<br />- `W2` disables all Warnings for Parameter rules.<br />- `W2001` will disable rule `W2001` |
| -e, --include-experimental | include_experimental | | Whether rules that still in an experimental state should be included in the checks |
| -c, --include-checks | | INCLUDE_CHECKS [INCLUDE_CHECKS ...] | Include rules whose id match these values
| -m, --mandatory-checks | | | Rules to check regardless of ignore configuration |
| --non-zero-exit-code | | informational (default), warning, error, none] | Exit code will be non zero from the specified rule class and higher |
| -x,  --configure-rule | | CONFIGURE_RULES [CONFIGURE_RULES ...] | Provide configuration for a rule. Format RuleId:key=value. Example: E3012:strict=true
| -D, --debug |  |  | Specify to enable debug logging. Debug logging outputs detailed information about rules processing, useful for debugging rules. |
| -I, --info |  |  | Specify to enable logging. Outputs additional information about the template processing. |
| -u, --update-specs | | | Update the [CloudFormation Resource Specifications](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-resource-specification.html).  You may need sudo to run this.  You will need internet access when running this command |
| -o, --override-spec | | filename | Spec-style file containing custom definitions. Can be used to override CloudFormation specifications. More info [here](#customize-specifications) |
| -g, --build-graph | |  | Creates a file in the same directory as the template that models the template's resources in [DOT format](https://en.wikipedia.org/wiki/DOT_(graph_description_language)) |
| -s, --registry-schemas | | | one or more directories of [CloudFormation Registry](https://aws.amazon.com/blogs/aws/cloudformation-update-cli-third-party-resource-support-registry/) [Resource Schemas](https://github.com/aws-cloudformation/aws-cloudformation-resource-schema/)
| -v, --version | | | Version of cfn-lint |

### Info Rules

To maintain backwards compatibility `info` rules are not included by default.  To include these rules you will need to include `-c I` or `--include-checks I`

### Metadata

#### Template Based Metadata
Inside the root level Metadata key you can configure cfn-lint using the supported parameters.

```yaml
Metadata:
  cfn-lint:
    config:
      regions:
        - us-east-1
        - us-east-2
      ignore_checks:
        - E2530
```

#### Resource Based Metadata
Inside a resources Metadata key you can configure cfn-lint to ignore checks.  This will filter out failures for the resource in which the Metadata belongs. Keep in mind that [`AWS::Serverless` resources may lose metadata during the Serverless transform](https://github.com/awslabs/serverless-application-model/issues/450#issuecomment-643420308)

```yaml
Resources:
  myInstance:
    Type: AWS::EC2::Instance
    Metadata:
      cfn-lint:
        config:
          ignore_checks:
            - E3030
    Properties:
      InstanceType: nt.x4superlarge
      ImageId: ami-abc1234
```

### Precedence

cfn-lint applies configurations from several sources. The rules at lower levels are overridden by those at higher levels.
1. cfnlintrc configurations
2. Template Metadata configurations
3. CLI parameters

### Configure Rules

Certain rules support configuration properties. You can configure these rules by using `configure_rules` parameter.

From the command line the format is `RuleId:key=value`, for example: `E3012:strict=true`.
From the cfnlintrc or Metadata section the format is

```yaml
Metadata:
  cfn-lint:
    config:
      configure_rules:
        RuleId:
          key: value
```

The configurable rules have a non-empty Config entry in the table [here](docs/rules.md#rules-1).

### Getting Started Guides

There are [getting started guides](/docs/getting_started) available in the documentation section to help with integrating `cfn-lint` or creating rules.

## Rules

This linter checks the AWS CloudFormation template by processing a collection of Rules, where every rule handles a specific function check or validation of the template.

This collection of rules can be extended with custom rules using the `--append-rules` argument.

More information describing how rules are set up and an overview of all the Rules that are applied by this linter are documented [here](docs/rules.md).

## Custom Rules

The linter supports the creation of custom one-line rules which compare any resource with a property using pre-defined operators. These custom rules take the following format:
```
<Resource Type> <Property[*]> <Operator> <Value> [Error Level] [Custom Error Message]
```

### Example
A separate custom rule text file must be created.

The example below validates `example_template.yml` does not use any EC2 instances of size `m4.16xlarge`

_custom_rule.txt_
```
AWS::EC2::Instance InstanceType NOT_EQUALS "m4.16xlarge" WARN "This is an expensive instance type, don't use it"
```

_example_template.yml_
```
AWSTemplateFormatVersion: "2010-09-09"
Resources:
        myInstance:
                Type: AWS::EC2::Instance
                Properties:
                        InstanceType: m4.16xlarge
                        ImageId: ami-asdfef
```

The custom rule can be added to the [configuration file](#Config-File) or ran as a [command line argument](#Parameters)

The linter will produce the following output, running `cfn-lint example_template.yml -z custom_rules.txt`:

```
W9001  This is an expensive instance type, don't use it
mqtemplate.yml:6:17
```


More information describing how custom rules are setup and an overview of all operators available is documented [here](docs/custom_rules.md).

## Customize specifications

The linter follows the [AWS CloudFormation Resource Specifications](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-resource-specification.html) by default. However, for your use case specific requirements might exist. For example, within your organisation it might be mandatory to use [Tagging](https://aws.amazon.com/answers/account-management/aws-tagging-strategies/).

The linter provides the possibility to implement these customized specifications using the `--override-spec` argument.

More information about how this feature works is documented [here](docs/customize_specifications.md)

## pre-commit

If you'd like cfn-lint to be run automatically when making changes to files in your Git repository, you can install [pre-commit](https://pre-commit.com/) and add the following text to your repositories' `.pre-commit-config.yaml`:

```yaml
repos:
- repo: https://github.com/aws-cloudformation/cfn-lint
  rev: v0.86.4  # The version of cfn-lint to use
  hooks:
    - id: cfn-lint
      files: path/to/cfn/dir/.*\.(json|yml|yaml)$
```

If you are using a `.cfnlintrc` and specifying the `templates` or `ignore_templates` we would recommend using the `.cfnlintrc` exlusively to determine which files should be scanned and then using:
```yaml
repos:
- repo: https://github.com/aws-cloudformation/cfn-lint
  rev: v0.86.4  # The version of cfn-lint to use
  hooks:
    - id: cfn-lint-rc
```
*Note: When mixing .cfnlintrc ignore_templates and files option in your .pre-commit-config.yaml cfn-lint may return a file not found error*

* If you exclude the `files:` line above, every json/yml/yaml file will be checked.
* You can see available cfn-lint versions on the [releases page](https://github.com/aws-cloudformation/cfn-python-lint/releases).

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/aws-cloudformation/cfn-python-lint",
    "name": "cfn-lint",
    "maintainer": null,
    "docs_url": null,
    "requires_python": "!=4.0,<=4.0,>=3.8",
    "maintainer_email": null,
    "keywords": "aws, lint",
    "author": "kddejong",
    "author_email": "kddejong@amazon.com",
    "download_url": "https://files.pythonhosted.org/packages/ef/04/6508a182109575290c26ff34fd404977e2514d19dfc154f0f8e42fe0d27e/cfn_lint-0.86.4.tar.gz",
    "platform": null,
    "description": "# AWS CloudFormation Linter\n\n<img alt=\"[cfn-lint logo]\" src=\"https://github.com/aws-cloudformation/cfn-python-lint/blob/main/logo.png?raw=true\" width=\"150\" align=\"right\">\n\n[![Testing](https://github.com/aws-cloudformation/cfn-python-lint/actions/workflows/test.yaml/badge.svg?branch=main)](https://github.com/aws-cloudformation/cfn-python-lint/actions/workflows/test.yaml)\n[![PyPI version](https://badge.fury.io/py/cfn-lint.svg)](https://badge.fury.io/py/cfn-lint)\n[![PyPI downloads](https://pepy.tech/badge/cfn-lint/week)](https://pypistats.org/packages/cfn-lint)\n[![PyPI downloads](https://pepy.tech/badge/cfn-lint/month)](https://pypistats.org/packages/cfn-lint)\n[![codecov](https://codecov.io/gh/aws-cloudformation/cfn-lint/branch/main/graph/badge.svg)](https://codecov.io/gh/aws-cloudformation/cfn-python-lint)\n[![Discord Shield](https://img.shields.io/discord/981586120448020580?logo=discord)](https://discord.gg/KENDm6DHCv)\n\nValidate AWS CloudFormation yaml/json templates against the [AWS CloudFormation Resource Specification](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-resource-specification.html) and additional\nchecks.  Includes checking valid values for resource properties and best practices.\n\n### Warning\n\nThis is an attempt to provide validation for AWS CloudFormation templates properties and\ntheir values.  For values things can get pretty complicated (mappings, joins, splits,\nconditions, and nesting those functions inside each other) so it's a best effort to\nvalidate those values but the promise is to not fail if we can't understand or translate\nall the things that could be going on.\n\n## Contribute\n\nWe encourage you to contribute to `cfn-lint`! Please check out the [Contributing Guidelines](https://github.com/aws-cloudformation/cfn-lint/blob/main/CONTRIBUTING.md) for more information on how to proceed.\n\n## Community\n\nJoin us on Discord! Connect & interact with CloudFormation developers &\nexperts, find channels to discuss and get help for cfn-lint, CloudFormation registry, StackSets,\nGuard and more:\n\n[![Join our Discord](https://discordapp.com/api/guilds/981586120448020580/widget.png?style=banner3)](https://discord.gg/9zpd7TTRwq)\n\n#### Serverless Application Model\n\nThe Serverless Application Model (SAM) is supported by the linter. The template is\ntransformed using [AWS SAM](https://github.com/awslabs/serverless-application-model) before the linter processes the template.\n\n_To get information about the [SAM Transformation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html), run the linter with `--info`_\n\n## Install\n\nPython 3.8+ is supported.\n\n### Pip\n\n`pip install cfn-lint`. If pip is not available, run\n`python setup.py clean --all` then `python setup.py install`.\n\n### Homebrew (macOS)\n\n`brew install cfn-lint`\n\n### Docker\n\nIn `cfn-python-lint` source tree:\n\n```shell\ndocker build --tag cfn-python-lint:latest .\n```\n\nIn repository to be linted:\n\n```shell\ndocker run --rm -v `pwd`:/data cfn-python-lint:latest /data/template.yaml\n```\n\n### Editor Plugins\n\nThere are IDE plugins available to get direct linter feedback from you favorite editor:\n\n* [Atom](https://atom.io/packages/atom-cfn-lint)\n* [Emacs](https://www.emacswiki.org/emacs/CfnLint)\n* NeoVim 0.2.0+/Vim 8\n  * [ALE](https://github.com/w0rp/ale#supported-languages)\n  * [Coc](https://github.com/joenye/coc-cfn-lint)\n  * [Syntastic](https://github.com/speshak/vim-cfn)\n* [Sublime](https://packagecontrol.io/packages/SublimeLinter-contrib-cloudformation)\n* [Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=kddejong.vscode-cfn-lint)\n* [IntelliJ IDEA](https://plugins.jetbrains.com/plugin/10973-cfn-lint)\n\n### [GitHub Action](https://github.com/marketplace/actions/cfn-lint-action)\n\n### [Online demo](https://github.com/PatMyron/cfn-lint-online)\n\n## Basic Usage\n\n- `cfn-lint template.yaml`\n- `cfn-lint -t template.yaml`\n\nMultiple files can be linted by either specifying multiple specific files:\n\n- `cfn-lint template1.yaml template2.yaml`\n- `cfn-lint -t template1.yaml template2.yaml`\n\nor by using wildcards (globbing):\n\nLint all `yaml` files in `path`:\n\n- `cfn-lint path/*.yaml`\n\nLint all `yaml` files in `path` and all subdirectories (recursive):\n\n- `cfn-lint path/**/*.yaml`\n\n*Note*: If using sh/bash/zsh, you must enable globbing.\n(`shopt -s globstar` for sh/bash, `setopt extended_glob` for zsh).\n\n##### Exit Codes\n`cfn-lint` will return a non zero exit if there are any issues with your template. The value is dependent on the severity of the issues found.  For each level of discovered error `cfn-lint` will use bitwise OR to determine the final exit code.  This will result in these possibilities.\n\n- 0 is no issue was found\n- 2 is an error\n- 4 is a warning\n- 6 is an error and a warning\n- 8 is an informational\n- 10 is an error and informational\n- 12 is an warning and informational\n- 14 is an error and a warning and an informational\n\n###### Configuring Exit Codes\n`cfn-lint` allows you to configure exit codes. You can provide the parameter `--non-zero-exit-code` with a value of `informational`, `warning`, `error`, or `none`. `cfn-lint` will determine the exit code based on the match severity being the value of the parameter `--non-zero-exit-code` and higher. The exit codes will remain the same as above.\n\nThe order of severity is as follows:\n1. `informational` *default*\n1. `warning`\n1. `error`\n1. `none` *Exit code will always be 0 unless there is a syntax error*\n\n##### Specifying the template as an input stream\n\nThe template to be linted can also be passed using standard input:\n\n- `cat path/template.yaml | cfn-lint -`\n\n##### Specifying the template with other parameters\n\n- `cfn-lint -r us-east-1 ap-south-1 -- template.yaml`\n- `cfn-lint -r us-east-1 ap-south-1 -t template.yaml`\n\n## Configuration\n\n### Command Line\n\nFrom a command prompt run `cfn-lint <path to template>` to run standard linting of the template.\n\n### Config File\n\nIt will look for a configuration file in the following locations (by order of preference):\n\n- `.cfnlintrc`, `.cfnlintrc.yaml` or `.cfnlintrc.yml` in the current working directory\n- `~/.cfnlintrc` for the home directory\n\nIn that file you can specify settings from the parameter section below.\n\nExample:\n\n```yaml\ntemplates:\n  - test/fixtures/templates/good/**/*.yaml\nignore_templates:\n  - codebuild.yaml\ninclude_checks:\n  - I\ncustom_rules: custom_rules.txt\n```\n\n### Parameters\n\nOptional parameters:\n\n| Command Line  | Metadata | Options | Description |\n| ------------- | ------------- | ------------- | ------------- |\n| -h, --help  |   | | Get description of cfn-lint |\n| -z, --custom-rules | | filename | Text file containing user-defined custom rules. See [here](#Custom-Rules) for more information |\n| -t, --template  |   | filename | Alternative way to specify Template file path to the file that needs to be tested by cfn-lint |\n| -f, --format    | format | quiet, parseable, json, junit, pretty, sarif | Output format |\n| -l, --list-rules | | | List all the rules |\n| -r, --regions | regions | [REGIONS [REGIONS ...]], ALL_REGIONS  | Test the template against many regions.  [Supported regions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-resource-specification.html) |\n| -b, --ignore-bad-template | ignore_bad_template | | Ignores bad template errors |\n| --ignore-templates | | IGNORE_TEMPLATES [IGNORE_TEMPLATES ...] | Ignore templates from being scanned\n| -a, --append-rules | append_rules | [RULESPATH [RULESPATH ...]] | Specify one or more rules paths using one or more --append-rules arguments.  Each path can be either a directory containing python files, or an import path to a module. |\n| -i, --ignore-checks | ignore_checks | [IGNORE_CHECKS [IGNORE_CHECKS ...]] | Only check rules whose ID do not match or prefix these values.  Examples: <br />- A value of `W` will disable all warnings<br />- `W2` disables all Warnings for Parameter rules.<br />- `W2001` will disable rule `W2001` |\n| -e, --include-experimental | include_experimental | | Whether rules that still in an experimental state should be included in the checks |\n| -c, --include-checks | | INCLUDE_CHECKS [INCLUDE_CHECKS ...] | Include rules whose id match these values\n| -m, --mandatory-checks | | | Rules to check regardless of ignore configuration |\n| --non-zero-exit-code | | informational (default), warning, error, none] | Exit code will be non zero from the specified rule class and higher |\n| -x,  --configure-rule | | CONFIGURE_RULES [CONFIGURE_RULES ...] | Provide configuration for a rule. Format RuleId:key=value. Example: E3012:strict=true\n| -D, --debug |  |  | Specify to enable debug logging. Debug logging outputs detailed information about rules processing, useful for debugging rules. |\n| -I, --info |  |  | Specify to enable logging. Outputs additional information about the template processing. |\n| -u, --update-specs | | | Update the [CloudFormation Resource Specifications](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-resource-specification.html).  You may need sudo to run this.  You will need internet access when running this command |\n| -o, --override-spec | | filename | Spec-style file containing custom definitions. Can be used to override CloudFormation specifications. More info [here](#customize-specifications) |\n| -g, --build-graph | |  | Creates a file in the same directory as the template that models the template's resources in [DOT format](https://en.wikipedia.org/wiki/DOT_(graph_description_language)) |\n| -s, --registry-schemas | | | one or more directories of [CloudFormation Registry](https://aws.amazon.com/blogs/aws/cloudformation-update-cli-third-party-resource-support-registry/) [Resource Schemas](https://github.com/aws-cloudformation/aws-cloudformation-resource-schema/)\n| -v, --version | | | Version of cfn-lint |\n\n### Info Rules\n\nTo maintain backwards compatibility `info` rules are not included by default.  To include these rules you will need to include `-c I` or `--include-checks I`\n\n### Metadata\n\n#### Template Based Metadata\nInside the root level Metadata key you can configure cfn-lint using the supported parameters.\n\n```yaml\nMetadata:\n  cfn-lint:\n    config:\n      regions:\n        - us-east-1\n        - us-east-2\n      ignore_checks:\n        - E2530\n```\n\n#### Resource Based Metadata\nInside a resources Metadata key you can configure cfn-lint to ignore checks.  This will filter out failures for the resource in which the Metadata belongs. Keep in mind that [`AWS::Serverless` resources may lose metadata during the Serverless transform](https://github.com/awslabs/serverless-application-model/issues/450#issuecomment-643420308)\n\n```yaml\nResources:\n  myInstance:\n    Type: AWS::EC2::Instance\n    Metadata:\n      cfn-lint:\n        config:\n          ignore_checks:\n            - E3030\n    Properties:\n      InstanceType: nt.x4superlarge\n      ImageId: ami-abc1234\n```\n\n### Precedence\n\ncfn-lint applies configurations from several sources. The rules at lower levels are overridden by those at higher levels.\n1. cfnlintrc configurations\n2. Template Metadata configurations\n3. CLI parameters\n\n### Configure Rules\n\nCertain rules support configuration properties. You can configure these rules by using `configure_rules` parameter.\n\nFrom the command line the format is `RuleId:key=value`, for example: `E3012:strict=true`.\nFrom the cfnlintrc or Metadata section the format is\n\n```yaml\nMetadata:\n  cfn-lint:\n    config:\n      configure_rules:\n        RuleId:\n          key: value\n```\n\nThe configurable rules have a non-empty Config entry in the table [here](docs/rules.md#rules-1).\n\n### Getting Started Guides\n\nThere are [getting started guides](/docs/getting_started) available in the documentation section to help with integrating `cfn-lint` or creating rules.\n\n## Rules\n\nThis linter checks the AWS CloudFormation template by processing a collection of Rules, where every rule handles a specific function check or validation of the template.\n\nThis collection of rules can be extended with custom rules using the `--append-rules` argument.\n\nMore information describing how rules are set up and an overview of all the Rules that are applied by this linter are documented [here](docs/rules.md).\n\n## Custom Rules\n\nThe linter supports the creation of custom one-line rules which compare any resource with a property using pre-defined operators. These custom rules take the following format:\n```\n<Resource Type> <Property[*]> <Operator> <Value> [Error Level] [Custom Error Message]\n```\n\n### Example\nA separate custom rule text file must be created.\n\nThe example below validates `example_template.yml` does not use any EC2 instances of size `m4.16xlarge`\n\n_custom_rule.txt_\n```\nAWS::EC2::Instance InstanceType NOT_EQUALS \"m4.16xlarge\" WARN \"This is an expensive instance type, don't use it\"\n```\n\n_example_template.yml_\n```\nAWSTemplateFormatVersion: \"2010-09-09\"\nResources:\n        myInstance:\n                Type: AWS::EC2::Instance\n                Properties:\n                        InstanceType: m4.16xlarge\n                        ImageId: ami-asdfef\n```\n\nThe custom rule can be added to the [configuration file](#Config-File) or ran as a [command line argument](#Parameters)\n\nThe linter will produce the following output, running `cfn-lint example_template.yml -z custom_rules.txt`:\n\n```\nW9001  This is an expensive instance type, don't use it\nmqtemplate.yml:6:17\n```\n\n\nMore information describing how custom rules are setup and an overview of all operators available is documented [here](docs/custom_rules.md).\n\n## Customize specifications\n\nThe linter follows the [AWS CloudFormation Resource Specifications](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-resource-specification.html) by default. However, for your use case specific requirements might exist. For example, within your organisation it might be mandatory to use [Tagging](https://aws.amazon.com/answers/account-management/aws-tagging-strategies/).\n\nThe linter provides the possibility to implement these customized specifications using the `--override-spec` argument.\n\nMore information about how this feature works is documented [here](docs/customize_specifications.md)\n\n## pre-commit\n\nIf you'd like cfn-lint to be run automatically when making changes to files in your Git repository, you can install [pre-commit](https://pre-commit.com/) and add the following text to your repositories' `.pre-commit-config.yaml`:\n\n```yaml\nrepos:\n- repo: https://github.com/aws-cloudformation/cfn-lint\n  rev: v0.86.4  # The version of cfn-lint to use\n  hooks:\n    - id: cfn-lint\n      files: path/to/cfn/dir/.*\\.(json|yml|yaml)$\n```\n\nIf you are using a `.cfnlintrc` and specifying the `templates` or `ignore_templates` we would recommend using the `.cfnlintrc` exlusively to determine which files should be scanned and then using:\n```yaml\nrepos:\n- repo: https://github.com/aws-cloudformation/cfn-lint\n  rev: v0.86.4  # The version of cfn-lint to use\n  hooks:\n    - id: cfn-lint-rc\n```\n*Note: When mixing .cfnlintrc ignore_templates and files option in your .pre-commit-config.yaml cfn-lint may return a file not found error*\n\n* If you exclude the `files:` line above, every json/yml/yaml file will be checked.\n* You can see available cfn-lint versions on the [releases page](https://github.com/aws-cloudformation/cfn-python-lint/releases).\n",
    "bugtrack_url": null,
    "license": "MIT no attribution",
    "summary": "Checks CloudFormation templates for practices and behaviour that could potentially be improved",
    "version": "0.86.4",
    "project_urls": {
        "Homepage": "https://github.com/aws-cloudformation/cfn-python-lint"
    },
    "split_keywords": [
        "aws",
        " lint"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "fed58388060c23e2df8a8fdb91245aadc3316192d9477a32c8aac34127ad5089",
                "md5": "ffc20a459235898c1f69e6c3ceb05632",
                "sha256": "2e779afba0acd9878a4e2dc07a93679411495512241a4da9b9d52aca5254334f"
            },
            "downloads": -1,
            "filename": "cfn_lint-0.86.4-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "ffc20a459235898c1f69e6c3ceb05632",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": "!=4.0,<=4.0,>=3.8",
            "size": 3762208,
            "upload_time": "2024-04-22T16:41:25",
            "upload_time_iso_8601": "2024-04-22T16:41:25.800550Z",
            "url": "https://files.pythonhosted.org/packages/fe/d5/8388060c23e2df8a8fdb91245aadc3316192d9477a32c8aac34127ad5089/cfn_lint-0.86.4-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "ef046508a182109575290c26ff34fd404977e2514d19dfc154f0f8e42fe0d27e",
                "md5": "402bd9820321f28d44b19cdea7135592",
                "sha256": "9ee31451a18457f2b27cd064f5d99adbf79afd1402aaf4b614514d13d8bc0174"
            },
            "downloads": -1,
            "filename": "cfn_lint-0.86.4.tar.gz",
            "has_sig": false,
            "md5_digest": "402bd9820321f28d44b19cdea7135592",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": "!=4.0,<=4.0,>=3.8",
            "size": 3911739,
            "upload_time": "2024-04-22T16:41:30",
            "upload_time_iso_8601": "2024-04-22T16:41:30.543565Z",
            "url": "https://files.pythonhosted.org/packages/ef/04/6508a182109575290c26ff34fd404977e2514d19dfc154f0f8e42fe0d27e/cfn_lint-0.86.4.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-04-22 16:41:30",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "aws-cloudformation",
    "github_project": "cfn-python-lint",
    "travis_ci": false,
    "coveralls": true,
    "github_actions": true,
    "tox": true,
    "lcname": "cfn-lint"
}
        
Elapsed time: 0.28769s