paco-cloud


Namepaco-cloud JSON
Version 9.3.45 PyPI version JSON
download
home_pagehttps://github.com/waterbear-cloud/paco
SummaryPaco: Prescribed automation for cloud orchestration
upload_time2024-04-08 19:35:56
maintainerNone
docs_urlNone
authorWaterbear Cloud
requires_pythonNone
licenseNone
keywords aws waterbear cloud infrastructure as code cloudformation
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # Paco: Prescribed automation for cloud orchestration

 [![PyPi version](https://img.shields.io/pypi/v/paco-cloud.svg)](https://pypi.python.org/pypi/paco-cloud/) [![](https://img.shields.io/badge/python-3.6+-blue.svg)](https://www.python.org/downloads/) ![t](https://img.shields.io/badge/status-stable-green.svg) [![](https://img.shields.io/github/license/waterbear-cloud/paco.svg)](https://github.com/waterbear-cloud/paco/blob/master/LICENSE.md)


Paco is a cloud orchestration tool for AWS. It enables you to automate the creation and management of your cloud resources
with declarative YAML. For more see the [paco-cloud.io web site](https://www.paco-cloud.io).

## Use Paco

Paco can be pip installed from the [paco-cloud](https://pypi.org/project/paco-cloud) package on PyPI.

    pip install paco-cloud

For more information see the [Paco install](https://www.paco-cloud.io/en/latest/install.html) instructions.
Then see [Getting Started with Paco](https://www.paco-cloud.io/en/latest/started.html) to learn how to
create a Paco project and connect it to your AWS account.


## Get Involved

 - Give us a Git Star and share on social media with #PacoCloud. Community discussion happens on
   [/r/paco_cloud](https://www.reddit.com/r/paco_cloud/).

- Chat with us on [Gitter at paco-cloud](https://gitter.im/paco-cloud/community).

 - Submit [feature request and bug reports](https://github.com/waterbear-cloud/paco/issues) on GitHub.

 - To develop Paco, git clone this project as well as [paco.models](https://github.com/waterbear-cloud/paco.models).

## Authors

Paco is created by Kevin Lindsay and Kevin Teague for [Waterbear Cloud](https://waterbear.cloud).


Changelog for Paco
==================

9.3.45 (2024-04-08)
------------------

### Added

- Added 'Encrypted' flag and set to 'true' by default on EBS volumes

- Added LBResourceIsEnabled condition to ALB SSL certificates to avoid being created when in CostDisabled mode

- Added Static IP support to Network Loadbalancers.

### Fixed

- Fixed ALB Target Group name generation

- Fixed IAM User Account delegates IAM policy for updating IAM user access keys

- Fixed IAM user password generation algo

- Fixed backup vault selection syntax after AWS changes


9.3.44 (2023-12-21)
------------------

### Added

- Added try catch to ECS Service list services API call when deleting ECS services to prevent failure.

### Fixed

- Fixed an exception which occured when ECS Service target tracking is disabled.

### Changed

- Modified the Desired, Min, and Max Tasks count CloudFormation template parameter from String to Number to resolve recent CloudFormation validation errors.


9.3.43 (2023-09-26)
------------------

### Added

- Added ECRReplicationConfiguration resource

- Added external_resource to GuardDutyDetectorRegion

- Added legacy flag for old ECS tracking Policy names

- Added me-central-1 to Loadbalancer hosted zones

- Added region name to DeploymentPipeline IAM roles to prevent conflicts

- Added release.version to ec2lm PutObject bucket policy.

- Added secrets_manager_default_2023_03_09 legacy flag for default secrets value

- Adding support for non-default regions

- Began adding ECR Repository Replications

- Began adding support for LaunchTemplates

- Disable Notification Rules if monitoring is disabled on a DeploymentPipeline

### Fixed

- Fixed ECS Task  VPC network configuration

### Changed

- Implemented Live Amazon Linux 2023 OS and Kernel patching and version preservation.

- Ported Amazon Live patching command to use release version.


9.3.42 (2023-07-19)
------------------

### Added

- Added Task role to ECS services

- Added new GitHub OIDC thumbprint


9.3.41 (2023-06-27)
------------------

### Added

- Added <environment> support to IAM Role names.

- Added CloudWatch Logs resource

- Added Conditions support to IAM user delegate custom policy permissions

- Added EC2LM function to purge codedeploy.

- Added EC2LM function to run commands for preparing an EC2 for the Create AMI command.

- Added EventBridge Resource

- Added NACL configuration support to Segments

- Added RuleOverrideAction to WAFWebACL Rules

- Added SSM function to call the EC2LM function to prepare for Create AMI .

- Added Sid field to the policy Statement() model object

- Added WebACL support to ALB Listeners

- Added cross zone configuration to Loadbalancers

- Added cross zone configuration to Loadbalancers

- Added disable_account_delegates to IAMUser to allow users to be created in any account

- Added event_bus field to IEventsRule

- Added get_arn() function to CloudWatchLogGroup model object

- Added managed_policy_arns filed to the IAM User Custom Policy model object

- Added manged_polcies support to IAM users to attach policies directly to the user.

- Added override_action to WAF Rule

- Added support for Amazon Linux 2023

- Added support for IDP Roles to the IAMRole application resource

- Added support for IMDSV2 EC2 metadata authentication

- Added support for Partner integrat ions to EventsRule

- Added support for me-central-1 (UAE) region

- Added support for me-central-1 (UAE) region

- Added Aurora Global Cluster support to RDS

### Fixed

- Fixed PacoReference str_ok when used in Lists

- Fixed VPC Peering table names to make them more unique

- Fixed VPC Peering to work in multi-region configurations

- Fixed VPC stack deletion cleanup hook which failed if the VPC private hosted zone does not exist.

- Fixed permisions in ECR Deploy instances

### Changed

- Improved Create AMI command

- Made policy names unique when generated by iam_user_account_delegates

- Made policy names unique when generated by iam_user_account_delegates

- Modified ECR Deploy Scritp Manager to generate separate scripts per ecr_deploy_name

- Modified SecurityGroupRule cidr_ip type to PacoReference from TextLine

- Changed Deploymet pipelines to use default account for the S3 artifacts bucket if the S3 configuration does not have an account explicitly set.

- Changed LoadBalancer ListenerRule 'host' field to a list.

- Disabled automatic population of asg_metrics in ASG monitoring

9.3.40 ((2023-02-28))
------------------

### Added

- Added --alarms-only/-a option to paco arguments.

- Added --ssm argument to provision paco command to allow running SSM commands on instances

- Added <account> and <region> replacements for IAM Role resources.

- Added AMI command to automate creating EC2 AMIs.

- Added ARM support for Amazon linux instance type for t4g instancs

- Added AccessKeys IAM User permissions

- Added AppConfig resource

- Added CacheClusterId and PrimaryNodeId to Elasticache redis cftemplate outputs.

- Added CloudWatch Resource for Consolidated Monitoring Account configuration

- Added Conditions to AssumeRolePolicy

- Added DomainName and RegionalDomainName to S3 Bucket outputs

- Added EC2 Flow Logs for VPC

- Added EC2 controller pre-loading to allow for EIP global references

- Added ECSCluster Delete stack hook to remove services when DBClusters are deleted

- Added EIP configuration to EC2 global resource

- Added GuardDuty Resource

- Added GuardDuty to EventsRule state

- Added IAMPolicy Resource

- Added Idenity Provider role to ECR Repositories

- Added Image Scanning supprot to ECRRepository

- Added ImageTag Parameter to ECS Services.

- Added Inspector Resource

- Added Inspector to EventRule source types

- Added Lifecycle Rules support to S3Buckets

- Added Listener Rule TargetGroup ARN Parameter to LB CFTemplate.

- Added ListernRuleArn CloudFormation Output to LoadBalancers

- Added Logging to Cloudfront Distributions

- Added Paco-Resource-Type Tag to ECS Servies

- Added PacoService Resource

- Added ReadOnly mode to EFS mounts

- Added ResponseHeaderPolicy to CloudFront resources.

- Added Retain deletion policy to EIP template

- Added Roles to resource.iam

- Added SSM document for updating instace packages

- Added Ubuntu 22.04 support to paco.ref ami function

- Added UpdateFunctionConfiguration to Lamdba IDP Role permissions

- Added VPCEIP to network.vpc configuration.

- Added VPN Client Endpoint to VPC

- Added ability for ECS services to override the LogGroup name, and added a boolean to disbale LogGroup creation.

- Added ability to manage Services from CFN parameters

- Added ability to publish versions, layers, and update function code to Lambda IDPRoles

- Added account field to ILambda

- Added and ec2lm_update_packages() function to EC2LM

- Added assume_role_policies to BaseRole to allow for multi-statement AssumeRole policies.

- Added availability zone field to VPN client endpoint.

- Added check to not attach cluster capacity providers if we already have one attached.

- Added codedeploy_stack_name_2022_07_07 as a legacy flag

- Added condition to Listner Outputs parameter

- Added config_scope arg to the loader

- Added external_repository_arn to ECSRepository resources

- Added federated to Principal schema

- Added file locking to allow for parallel paco calls

- Added hash_long_names to LoadBalancer get_aws_name() model object function

- Added ignore changes field to Loadbalancer ListenerRule target group

- Added ignore fields to ECSContainer Definitions and individual servics

- Added lambda_version to CloudFront lambda function associations

- Added list_split() utils method.

- Added monitoring to GuardDuty

- Added paco scope filters to resource.route53

- Added paco scope filters to resource.route53

- Added policy_actions, the ability to control Access to IDPRoles

- Added response_headers_policy_id to CloudFront Default cache behavior

- Added ssm:PutComplianceItems to SSM policies

- Added support for ARNs to ssl certifcates in Loadbalancers

- Added support for EventsRule monitoring

- Added support for Inspector to EventBridge notifications.

- Added support for gloabl EIPs to self-managed EC2 nat gateways

- Added support for global resources to BotoStacks

- Added support to automatically set UsePreviousValue to False on CFN stacks that return error on usePreviousValue not in the previous template.

- Added support to remove Attached policies from Roles in the IAM delete stack hook

- Added support to set the NAT instance AMI

- Added tags field to IEBS

- Added try/except catch around VPC Cleanup Hook

- Added try/except catch around VPC Cleanup Hook

- Adding loggroup consolidation to ECS Clusters

- Allowed ARNs in LBApplication listener ssl_certificates lists

- Changed IAM User delegate user resource arns to use ${aws:username} in the CF template.

- Changed IAM user policy to use ${aws:username} rather than explicit names

- Changed RDS KMS keys DeletionPolicy to Retain to allow snapshots from deleted RDS clusters to remain viable.

- Changed RDS KMS keys DeletionPolicy to Retain to allow snapshots from deleted RDS clusters to remain viable.

- Changed ResponseHeaderPolicy resource name to include netenv and environment names.

- Changed StackTemplate to be initializable with out a paco_ctx or stack.

- Changed ecr repository .repository_name with .full_repository_name

- Changed paco_ssm loggroup expiry to 365 days

- Changed resource.iam.roles account string to accounts list.

- Changed, ALBs will not update DNS when cost_disabled is True

- Created OIDCIdentityProvider CFTemplate

- Disabled Cloudformation signal sleep

- Disabled DHCP Options for private hosted zones. Network failed to load.

- Disabled the network env controller's stack output save now that the Stack() class is managing this.

- ECR Repositories are now emptied before they are deleted.

### Fixed

- Fixed ASG ECS Cluster Capacity Provider attachments

- Fixed Account name in SystemsManager IAM user delegate permissions

- Fixed CodeDeploy stack name to include the action name when codedeploy_stack_name_2022_07_07 feature flag is enabled.

- Fixed CodePipelineRetryStagesPolicy quota size by breaking it into chunks.

- Fixed EC2LM EBS Volume attachment Launch Bundle

- Fixed ECR IDP Role Condition

- Fixed EIP CF logical id for non global Resource resources.

- Fixed IAM Role delete hook to cleanup attached policies

- Fixed Log Exports list in RDS CF Template.

- Fixed SSMSession IAM permissions

- Fixed VPC Peering automation

- Fixed VPC Peering to use IAM Role name when configured.

- Fixed VPC private_hosted_zone. It now associates itself with the VPC and sets the DomainName for the DHCP options.

- Fixed a bug in the new ami command for generating EC2 images

- Fixed default SecretsString to {}

- Fixed externally_managed flag on IAM user access key credentials from managing keys

- Fixed model_obj on resource.route53 paths

- Fixed permissions on SSM Port forward and CodeDeploy tools delegate

- Fixed the hook which deleted ECS services from a cluster

### Changed

- Implemented VPC VPN Client Endpoint

- Improved error message when reference does not resolve to a stack for.

- Made ECSASGConfiguration Deployable

- Made Route53 HostedZone's honour their is_enabled() flag.

- Made VPC Peering vpcid lookup resolve to stack outputs.

- Modified Dashboard names to include NetEnv and Environment name

- Modified ResourceEngine() to interface with global Resources and not just within an ApplicationEngine()

- Modified alarms to create empty stacks when monitoring is disabled.

- Modified swapon to use fallocate instead of dd when available

- Ported ASG to troposphere 4.x

- Porting to troposphere 4.x

- Prefix cp- to ECS Capacity provider names if they start with aws, ecs, or fargate

- Release Phase script will now delete tags from task definition

- Started adding DisableScaleIn hook on ASG Delete

- Updated gitignore

- VPC Private Hosted Zones are now emptied before being deleted.


9.3.39 ((2022-07-08))
------------------

### Added

- Added ALB Listener Default Actions

- Added Paco-Resource-Sub-Type Tag to Alarm stacks with value 'Alarms'.

- Added S3 Registry Hooks

- Added a feature_flag option to project.yaml

- Added alarms_only flag to Paco context. (Still need to add CLI argument)

- Added exception handling when cleaning up IAM policies if the Role has already been deleted

- Added has_kvp() to StackTags()

- Added prefix_environment_name and new logic to ECR Repository name generation and config

- Added s3_buckets to ILambda for explicit Lambda Permission to InvokeFunction

- Allowed Network to be enabled but VPC disabled.

- Changed Alarms CF Stacks Paco-Resource-Type by appending "-Alarms" to the name.

- Disabled PlacementStrategies with ECS launch type is Fargate

### Fixed

- Fixed IAM delegate permission for SSM Session access

### Changed

- Moved ASG user data processing into the EC2LM.

- Modified CODEPIPELINE_CODEDEPLOY_INIT_STAGE_HOOK behaviour.


9.3.38 ((2022-06-02))
------------------

### Added

- Added build artifacts to .gitignore

### Fixed

- Fixed the IAM Role Cleanup stack hook that deletes policies from roles


9.3.37 ((2022-05-27))
------------------

### Added

- Added stack hook to clean up IAM role policies before deleting the role

### Fixed

- Fixed dpkg purge syntax in CodeDeploy EC2LM launch bundle

- Fixed nosync flag and aws s3 EC2LM download in user data script

9.3.36 ((2022-05-25))
------------------

### Added

- Added CodeDeploy support to DeploymentPipeliens IAM delegate policies

- Added support for S3 events in EventsRule

- Added temporary service hook code for CodeDeploy AMI Builder


9.3.35 (2022-05-06)
------------------

### Added

- Added LoadBalancer and TargetGroup automated support to Alarms

- Added TargetGroup name tag to TG resources

- Added enable/disbale to target groups

- Adding WIndows Powershell support to EC2LM

- Adding custom pypi upload script

- Adding new folders to .gitignore

### Fixed

- Fixed Windows SSM CodeDeploy install

- Fixed duplicate alarm in CW Alarms

- Fixed typos in ec2lm port

### Changed

- Moving EC2LM scripts into their own module.

- Removed debug breakpoints()

9.3.34 (2022-05-01)
------------------

### Changed

- Testing new PyPi build and upload scripts

9.3.33 (2022-05-01)
------------------

### Changed

- Testing new PyPi build and upload scripts


9.3.32 (2022-05-01)
------------------

### Changed

- Testing new PyPi build and upload scripts


9.3.31 (2022-05-01)
------------------

### Changed

- Testing new PyPi build and upload scripts

9.3.30 (2022-05-01)
-------------------

### Fixed

- Made a fix to the Release phase script

- Fixed LogGroup default expiry

- Fixed Cost Disabled stack outputs

- Fixed debugging condition on ALB

### Added

- Implemented a default_password field for IAM users to work around password resctriptions.

- Adding ALBs to the Idle service

- Added Environment name to notification rules config.

- Added a check to avoid updating tags on KMS stacks.

- Added Environment name to notification rules config.

- Added a check to avoid updating tags on KMS stacks.

- Added Paco-Resource-Type and Paco-Reference tags to stacks

- Added support for CostDisabled ALBS

- Added ec2lm_get_secret_from_json() function

- Added project Environment Variables support to CodeBuild.

- Added DetectChanges to DeploymentPipelines

- Added GitHub CodeStar connection support

- Added DetectChanges to DeploymentPipelines

- Implemented new PacoServiceHook

- Added more CodeDeploy Service hooks to implement Blue/Green deployments

- Adding CodeDeploy Service support

### Changed

- Starting to look at AWS Lambda Layers

- Removed RoleArn from EventsRule when target is lambda

- Move EC2LM lock file

9.3.29 (2022-03-25)
-------------------

### Added

- Added LifeCycle Policies to ECRRepository resources.

- Added DNS LaunchBundle

- Added ARN to HostedZone CF Outputs

- Added load_content to utils.

- Added EventsRule resource state generateion and upload.

- Added project name to EventsRule Codebuild projects.

- Added fix for missing EC2LM cache file.

- Adding support for EventsRule notifications.

- Added obj_to_dict() function to utils

- Added event bridge notification access to SNS topcis

- Added Event Pattern support to EventsRules

- Added notifications to EventsRules

- Added CodeStar connection ARN field to CodePipeline source configuration for BitBucket.

### Changed

- ASG disabled target groups automatically when the ALB is disabled

- Made DELETE confirmation more robust

### Fixed

- Properly fixed Delete Stack confirmation logic.

9.3.28 (2022-03-04)
-------------------

### Changed

- Updated paco.models dependency

9.3.27 (2022-03-04)
-------------------

### Fixed

- Fixed EventsRule Targets after troposphere upgrade.
- Fixed a corner case where home is missing from paco command arguments
### Added

- Added deployment branch to GitHUb webhook filters.
- Codebuild now supports NO_SOURCE
- Added DNS to ElastiCache
- Added  SSM command  to install CodeDeploy on Windows servers
- Added IAM Role Name and Arn to stack outputs
- Added Environment Type to CodeBuild DeploymentPipelie configuration
- Added basic support for CodePipeline and EventPattern eventrules

### Changed

- Updated CodeDeploy EC2LM wait for deployment logic

9.3.26 (2022-02-09)
-------------------

### Added

- Added Build Batch configuration to CodeBuild

9.3.25 (2022-02-08)
-------------------

### Added

- Added github access source configuration to CodeBuild

- Added enable_automatic_backups to IEFS

### Changed

- Made ec2lm_signal_asg_resource wait for deployments before waiting for the healthcheck timeout.

- Updated ubuntu package update command with noninteractive arguments.

- ec2lm_signal_asg_resource will now wait for CodeDeploy deployments before signaling CloudFormation.

- Enabled encryption at rest on EFS by default

9.3.24 (2022-01-31)
-------------------

### Added

- Added CodeBuild Artifacts configuration

9.3.23 (2022-01-27)
-------------------

### Added

- Added deployment_branch_name to CodeBuild GitHub source configuration

- Added source_security_group_owner to SecurityGroup for cross account access

- Added IAM Policy conditions on CodeBuild VPCConfig Service Role

- Added CodeBuild support to EventsRules

- Added SubnetId ARNs to segment's CFN outputs

- Added CodeBuild support to EventsRule

- Automated VPC Peering between netenvs

- Added -l --cfn-lint argument to perform extra CloudFormation error detection

- Added VpcConfig to codebuild configuration

- Added availability_zone config to VPC endpoints

### Fixed

- Fixed elasticache security group CFN Parameter logical name

### Changed

- Removed CodeDeployConfiguration Name to allow CF to replace resource when HOST_COUNT is changed.

- Removed string value from Port numbers

- Removed duplicate NACLAZ3 entries in segments CF templates

- Removed unneeded dimensions from windows cloudwatch config.

- Implemend enable/disable for VPC endpoints.

- SSM wait command now skips instances that are not running

- Improved EC2LM bundle caching and updates.

9.3.22 (2021-12-17)
-------------------

### Added

- Implemented IAM Role resources

- lambda deploy command can now upload pre-made .zip files if the path ends in .zip.

- Added TokenExpired retry support to paco_buckets.is_bucket_created()

- Added TokenExpired retry support to paco_buckets.is_bucket_created()

### Changed

- DeploymentPipeline will now default to environments account when one is not specified.

9.3.21 (2021-11-24)
-------------------

### Added

- Implemented 'disable_codepipeline' to IDeploymentPipelineConfiguration to allow stage resource to be build independently.

- Implemented CodeBuild GitHub source configuration

9.3.20 (2021-11-23)
-------------------

### Fixed

- EC2LM: EFS utils will only be installed if it does not already exist

- EC2LMS: EFS: Moved tmp dir to root folder for CIS hardened ubuntu images.

- EC2LMS: EFS: Mounting of EFS drives made idempotent

- Fixed Ubuntu EFS launch bundle install

- Fixed CodeDeploy agent install on CIS hardened imges.

- Fixed external resource support to Route53 HostedZones

### Added

- Added ec2lm_set_dns_cname() function to EC2LM for more specific DNS modifications

- Added ec2lm_set_dns() function to EC2LM

- Added EC2LM support for ubuntu_18_cis ami type

- Added region support to Lambda functions.

- Implemented SystemsManagerSession IAM policy

### Changed

- Improved Release Phase deployment script reliability.

- Automated ManualApproval resource.IAM DeploymentPipeline permissions

- Automated namespace for AlarmSets for ASG

- Fixed manual approval IAM DeploymentPipeline policy.

- Fixed manual approval IAM DeploymentPipeline policy.

- Fixed EBS EC2 Launch Bundle to work with Ubuntu nvme drives

9.3.19 (2021-10-04)
-------------------

### Added

- Added RDS Aurora MySQL serverless support

- Added non paco.ref support for EBS volume mounts

- provision on CodeCommit will now display repository ssh clone URLs.

### Fixed

- Fixed AWS principle when account ids start with zero

- Fixed DeploymentPipeline IAM Permissions

9.3.18 (2021-09-10)
-------------------

### Added

- Added service hook for Security Groups in cftemplate.lb

- Added TargetGroup enable/disable

- Added HealthCheckPort to TargetGroups

- Added WebACL paco.ref support to cloudfrom webacl_id field.

- Added WAFv2 Resource

### Fixed

- Fixed storage_encrypted implementation in RDS cftemplate

9.3.17 (2021-08-26)
-------------------

### Changed

- LogGroups are now exempt from change_protected flags in RDS, ASG, and S3Buckets

- Enabled s3 Bucket encryption by default

### Added

- Implemented S3 Bucket replication for cross-account buckets

- Implemented bucket_owner_preferred for S3 Bucket resources

- Added a backup_restore_bucket RDS Option field to RDSSQLServerExpress resource.

- Added ECR Repository field to IASG for automated permissions.

- added ec2lm_replace_secret_in_file_from_json() function to EC2LM

- Added support for Ubuntu 18

- Added BitBucket support to DeploymentPipeline sources

- Added IASGPatchManager for automated Windows patching

### Fixed

- Prevent record set from being created if hosted_zone is undefined in cloudfront.

- Fixed IAM Policy name generation to support 127 characters, was only 64 before.

- Fixed codedeploy launch bundle.

- Fixed RDS parameter group to allow empty parameters.

9.3.16 (2021-06-25)
-------------------

### Fixed

- Fixed ECSService alarms when more than one service is used.

### Added

- Added -h/--hooks-only flag for updaing EC2 configuration without affecting the stack.

9.3.15 (2021-06-08)
-------------------

### Added

- Implemented SQLServerExpress RDS
- Implemented SSM Agent Update using SSM Document for Windows
- Added redirect_path to IListenerRules
- Implemented VPC Endpoints in network.vpc for ssm, ssmmessages, and ec2messages.
- Automated ALB access logs bucket policies
- Added VPCEndpoints CFTemplate

### Changed

- IAM controll now prints SwitchRole URLs for users on resource.iam operations

9.3.14 (2021-05-11)
-------------------

### Changed

- Made ASG instance key pair optional

### Added

- Added a default PlacementStrategy to ECS servies of binpack.memory

- Added sub environment caching to the Network Environment Controller.

- Added Arn Ourput to S3 cloudformation templates.

### Fixed

- Fixed paco init cookiecutter AlarmSets missing classification field

9.3.13 (2021-05-04)
-------------------

### Added

- Added paco.models 7.8.10 dependency

9.3.12 (2021-05-04)
-------------------

### Added

- Added region field to DeploymentPipeline configuration

9.3.11 (2021-04-23)
-------------------

### Added

- Added support to disable ECS services

- Added resource group name to ACM botostack names.

### Fixed

- Fixed ECS docker_exec script

- Fixed CodeStart NotifciationRule Name filter for resource name generation

- Fixed unique listener SSL certificate name in ALB

- Fixed DeploymentPipeline notification rules if a rule does not have any event ids.

9.3.10 (2021-04-19)
-------------------

### Added

- Added restart-services functionality to ecs script.

9.3.9 (2021-04-19)
------------------

### Added

- Added logging to SSM instance EC2LM update run commands.
- Added docker-exec command to ECS ScriptManager script.

### Changed

- Improved ECR Deploy Script to tag the destination image with the same tags as the source.

9.3.8 (2021-04-09)
------------------

### Fixed

- Fixed release phase script name in the ECR deploy script.

- Fixed codedeploy EC2 Launch Bundle on ubuntu.

- Fixed unique key to CodeBuild IAM permissions policies

- Fixed SNS topic policy duplicates by adding a cache

### Added

- Added IAM policy statement for cloudwatch service to SNS topics listening for CloudWatch Alarms notifications.

- Added paco registry override for Alarm Descriptions.

- Made notification rules for DeploymentPipeline inherit application notification configurations if the resource config is missing.

### Changed

- Improved error handling when processing alarm actions

- Reformatted the resource state s3 bucket key

9.3.7 (2021-04-06)
------------------

### Added

- Added support for resource state in the paco worker bucket.

### Fixed

- Fixed SNS Topics cross account + cross region policy


9.3.6 (2021-04-02)
------------------

### Added

- Added support for cross account + cross region SNS Lambda Subscriptions

- Added Notification Rules to DeploymentPipelines.

- Added an ECS utility to the script manager for ASGs


### Fixed

- Fixed CF handling of LBv2 Certifictes.

- Removed cloudfront forcing us-east-1 on certificates. Raise exception instead.

- iotpolicy.get_outputs() will now obtain the policy arn if it does not exist when called.

- Fixed EC2LM credential missing race condition code.


9.3.5 (2021-03-15)
------------------

### Fixed

- Added paco.models dependency for 7.8.4.


9.3.4 (2021-03-15)
------------------

### Added

- import_from functionality for environments and resource groups.

- LogGroup stacks will delete groups using stack hook on stack deletion.

### Fixed

- Capacity Provider state manager now handles ASG creation

9.3.3 (2021-03-11)
------------------

### Added

- Route 53 has A Alias support.

### Fixed

- ECS Capacity Provider provisioning to ensure the cluster attaches to the correct providers.

- CloudFront viewer_certificate handles correctly when the factory is None.

- EC2 Launch Bundles: fix a race condition where the instance tries to use it's IAM Role before it's attached.


9.3.2 (2021-02-24)
------------------

### Added

- CloudFront supports `OriginRequestPolicyId` and `CachePolicyId` which can be set in the CloudFront resource
  with new `cache_policy_id` and `origin_request_policy_id` fields for the CloudFront `cache_behaviors` field.


9.3.1 (2021-02-05)
------------------

### Added

- New EC2LM convienence functions for running commands asynchronously: `ec2lm_async_run` and `ec2lm_async_run_wait`.

### Changed

 - ECS Release Phase commands run asynchronously.


9.3.0 (2021-02-04)
------------------

### Changed

- Deprecated `resource.snstopics` has been removed. CloudWatch Alarms now alert to `resource.sns`.


9.2.5 (2021-02-03)
------------------

- Added logging for external CW Log Groups.


9.2.4 (2021-01-29)
------------------

- Add `script_manager` to `ASG` for ECR Deployments.


9.2.3 (2021-01-13)
------------------

### Fixed

- Update to depend upon `paco.models` 7.7.4.


9.2.2 (2021-01-13)
------------------

### Changed

- ASG launch options field `codedeploy_agent` now defaults to False.

### Fixed

- `paco.sub` will now lookup the Stack Output for refs that refer to Stacks.

- Fixed DynamoDB reference strings.

- Added `DescribeImages` permission to CodeBuild release phase.

9.2.1 (2021-01-05)
------------------

### Added

- Allow Managed Instance Protection to be set to ENABLED/DISABLED for an ECS ASG Capacity Provider.


9.2.0 (2021-01-05)
------------------

### Added

- ECS Service can specify it's Capacity Provider.

- ECS Cluster can specify a default Capacity Provider for the whole cluster.

- Release phase command for ECS. Launchs a Task via SSM and executes it via CodeBuild,
  waits for success and then continues to the next CodePipeline Stage.

### Changed

 - ECS CodePipeline Deploy delegate Role permissions are more restrictive/secure.

### Fixed

 - resource/iam.yaml: Permissions for CodeBuild in the DeploymentPipeline resolve correctly.

9.1.0 (2020-12-23)
------------------

### Added

- Initial support for LBNetwork type: Network Load Balancers.

- New `DynamoDB` resource for provisioning DynamoDB Tables.

- New `S3BucketPolicy` StackTemplate.

- Support for `copy_actions` for BackupPlanRules in AWS Backup to allow cross-account backups.

- IAM Policies and S3 Bucket Policies now support all allowable AWS Conditions.

### Changed

 - EC2LM cfn-init bundle now uses the Python 3 cfn-init 2.0 package rather than installing Python 2
   and the legacy cfn-init 1.4 package.

9.0.2 (2020-11-12)
------------------

### Fixed

- Require `paco.models` 7.6.1 with `codedeploy_agent` field.


9.0.1 (2020-11-12)
------------------

### Added

- Invoke a Lambda from the CLI with `paco lambda invoke <paco-ref-parts>`.

### Fixed

- Initialize more than one netenv, in-case another netenv is initialized already by a Service.

9.0.0 (2020-11-07)
------------------

### Migration

- Resources of `ECSServices` will need to be updated to add a DesiredTasks Stack Parameter. This
  must be done before attempting to add an scaling configuration to that `ECSServices`.

### Added

- Lambda Triggers support for `CognitoUserPool` resource

- Paco refs for secrets can have an additional part at the end to resolve to the JSON field inside the value of the secret.

- `ECSServices` has new `setting_groups` field which allows sharing the same set of Secrets and Environments
  between container definitions.

- Handy `enable_cors` for `ApiGatewayRestApi` template.

- Nested Resources for `ApiGatewayRestApi`.

- Describe Command has a `--output spa` option with minimal containing HTML. Contents suitable to use in a SPA.

- ApiGatewayRestApi supports all fields needed to enable OPTIONS for CORS.

- ApiGatewayRestApi can do cross-account Lambda integration. Lambda will add a Lambda Permission
  to allow the API Gateway from the other account to invoke it.

- Outputs for ApiGatewayRestApi

- `paco provision` has a new `-a, --auto-publish-code` option which will compare the md5 hash of a
  local or directory or file for Lambad resources that use a `zipfile:` with a local path. If the loal
  code is changed, a new artifact will be zipped and uploaded to an S3 Bucket.

- CloudFront Outputs for `id` and `domain_name`.

- Support for LambdaFunctionAssociations for CloudFront.

- Support for Lambda@Edge

- Support for Cognito.

- Support for ECS Fargate.

- ALB TargetGroup can now use the `target_type` field.

- Support for ECS TargetTracking Service Scaling.

- The `CodeBuild.Build` action for DeploymentPipeline now supports a list of `ecr_repositories`
  that can declare `Push`, `Pull` or `PushAndPull` permissions.

- Added a `upload_fileobj` method to PacoBuckets.

- StackHooks that have been added to Resource model objects are added to a Stack after it's
  created.

### Changed

- New `BotoStack` with `ACM` and `IoTPolicy` Resources types.

- `set_parameter` for `paso.stack.Stack` will now replace a Parameter with the same name. This allows
  Parameters to be changed by hooks.

### Fixed

- CodeCommit users Arn output looks it up from the proper Stack.

- CloudFront handles CustomOriginConfig with no fields specified for `ssl_protocols` and `https_port`.

8.0.0 (2020-09-17)
------------------

### Migration

 - Paco Service add-on APIs have been changed and renamed. The new ``paco.extends`` package
   was added that gives a single set of APIs for Services to extend Paco. Documentation for
   extending Paco has also been created.

### Added

- New IAMUser StackTemplate for the application-level IAMUser type.

- New PinpointApplication resource type. Minimal implementation to support using the
  service for transactional messages only.

### Changed

 - Using Troposphere 2.6.2 with a ``monkey-patch troposphere.elasticloadbalancingv2.LoadBalancer``
   so that ``LBApplication`` can pass `SecurityGroups` and `Subnets` as a single Security Group List Parameter.

### Fixed

- If there is no ``resource/snstopics.yaml`` then the SNSTopic Controller should not load.

- Provision for ``resource.s3`` was using incorrect resource_ref

- ALB created Route53 RecordSets now use the Route53 account instead of defaulting to the current account.

- CloudFront domain_aliases now use the hosted_zone of the account for paco refs.

- PyLance detected fixes and clean-up: https://github.com/microsoft/pylance-release
  * Remove unused reseng_lbclassic
  * Dashboard: Added missing import for error handling
  * RDS Aurora: fixed default DB Paramter group variable
  * AWS Config: controller fixes
  * IAM Controller: removed unused get_role function
  * S3 Controller: empty bucket error message uses correct variable name

7.2.0 (2020-07-14)
------------------

### Added

- DeploymentPipeline that uses ``S3.Source`` will get more permissive access to the artifacts S3 Bucket to allow
  this action to work.

- DeploymentPipeline now supports ``ECR.Source`` and can be used directly with ``ECS.Deploy``.

- Aurora support: RDSAurora and DBClusterParamaterGroup StackTemplates.

- ASG has new `ssh_access` field to allow managing users and groups of SSH public key pairs on the instance.

- GitHub.Source action with WebHook for sourcebuilddeploy-style CodePipeline

- Initial ECS Capacity Provider support `asg.ecs.capacity_provider` (experimental)

### Changed

- ECR Repository has an `account` field instead of hard-coding to tools. If left blank
  it assumes the same account as the environment.

- Secrets can now be deployed to specific accounts using an `account` field.

### Fixed

- EC2LM configuration loading for ECS was causing the ecs agent to hang on freshly launched instances.


7.1.1 (2020-06-23)
------------------

### Fixed

- EC2 instances without ECS config failed trying to make launch script.


7.1.0 (2020-06-22)
------------------

### Added

- CodeCommit Users have a permission to grant either ReadWrite or ReadOnly to a repo.

- Initial ECS Cluster support and ASG EC2LM for ECS.

- New `resource.sns` controller and template. This allows provisioning of new "location"-style
  SNS Topics and Subscriptions. Subscriptions have been split into their own resources, so that
  they have access to the full set of Subscription properties.

- CloudTrail logs in an S3 Bucket can now be CMK encrypted by KMS. Paco will create a single
  key in the same account and region as the central S3 Bucket. The ``kms_users`` field for
  CloudTrail can be used to grant IAM Users access to decrypt the log files.

- Start of test suite for paco.cftemplates in paco.cftemplates.test package.

### Changed

- Service plug-ins are passed the model_obj of the config scope when they are initialized.

- Lambda Paco Log Groups are supplied as a comma-seperated String to it's Environment Variable.

- The PacoContext home attribute is now a pathlib.Path object.

### Fixed

- Starter Projects updated to use newer ASG rolling update syntax.


7.0.0 (2020-05-09)
------------------

### Migration

- AutoScalingGroups that use EC2 Launch Manager (EC2LM) features no longer store their cache id in the
  UserData. Instead configuration changes to existing ASGs are updated using SSM Run Command. This
  change will allow configuration changes to be made without cycling new instances in an ASG - for example,
  a new metric can be added to a CloudWatch Agent and SSM Run Command will execute the ``ec2lm_launch_bundles``
  on all of the instances.

### Added

- Paco Buckets: Paco can create it's own S3 Buckets for internal usage - one bucket for each account/region
  combination. These can be used to hold CloudFormation templates and Lambda code artifacts.

- New Paco command: ``paco lambda deploy <scope-to-lambda>`` that can update the code artifact for a
  Lambda directly.

- CIDR IPv6 support for SecurityGroups

- SSM Agent is installed on all AutoScalingGroups unless ``launch_options.ssm_agent`` is explicitly set
  to false

- GitHub WebHook to CodePipeline if ``poll_for_source_changes`` is false for a GitHub.Source action.

- Supoprt for RDS PostgreSQL

- Support for SSM Documents with `resource/ssm.yaml`

- EC2LM: Ubuntu 16 for EFS

- Monitoring support for ElasticSearchDomain resources

### Changed

- Lambda resources can now use ``code.zipefile`` as a path to a local directory. Paco will zip that directory
  contents and upload an artifact to a Paco Bucket and use that S3 location for the Lambda when it is initially
  created. Any updates to the Lambda code artifact must then be applied using the ``paco lambda`` command.

- AutoScalingGroup Stack now has a Parameter for ``MinInstancesInService``.

- Troposphere dependency updated to 2.6.1 release which includes support for IoT Analytics Pipelines.

6.2.0 (2020-04-04)
------------------

### Migration

- ASG rolling_udpate_policy behaviour has been changed. The fields ``update_policy_max_batch_size`` and ``update_policy_min_instances_in_service``
  have been removed and these settings are only controlled with the ``rolling_udpate_policy`` field.

### Added

- IoT support! IoT Core has new types for IoTPolicy and IoTTopicRule, IoT Analytics has an IoTAnalyticsPipeline.

### Changed

- All Paco warnings are now prefixed with a standard "WARNING:" and will only
  be displayed if the -w, --warn flag is passed.

- DeepDiff version required is 4.3.2. This version fixes the need to fiddle with deprecation
  warning suppression.


6.1.1 (2020-03-14)
------------------

### Added

- Expanded the Stages/Actions for DeploymentPipeline to include S3.Deploy

### Fixed

- SLRoles template was not fully ported to StackTemplate API.

- CodePipeline resource can be created in Service applications.


6.1.0 (2020-03-09)
------------------

### Added

- New Private PyPI Starter Project.


6.0.1 (2020-03-08)
------------------

### Fixed

- Removed ``{{['.gitignore']|join}}`` cookiecutter file that crept back in that breaks install on
  filesystems that do not allow the | character.

- ALB rule.target group fix was merged into wrong place in the code.

- Restored StackOrders which wasn't being respected after refactor.

6.0.0 (2020-03-06)
------------------

### Breaking

- Consolidated the Paco work directories into a single ``.paco-work`` directory.
  Documented them on a new Paco Internals doc page. To migrate an existing Paco project
  to this new structure:

      cd <my-paco-project>
      git mv aimdata .paco-work
      git mv Outputs .paco-work/outputs
      git mv build .paco-work/build

  Those commands assume you are using git to manage a Paco project. If you are, also update your ``.gitignore``
  file to ignore .paco-work/build.

- The IAM Roles for BackupVault had inconsistently named CloudFormation stacks ("BackupVaults--Backup").
  A new IAM Role will be created in a new stack. The old stack will remain but it can be safely deleted.

  There will be a stack UPDATE to the BackupVaults. Each AWS::Backup::BackupSelection resource will
  have "Selection: " prefixed on the SelectionName, this will replace the old BackupSelection resources
  with new ones using the new Role. The AWS CloudFormation documentation states that a BackupSelection's
  SelectionName is a display name only, but this is incorrect.

- Removed the ``Resource/NotificationGroups.yaml`` filename alias. This file is now only loaded using
  the filename ``resoruce/snstopics.yaml``.

- EventsRule type target field changed from a list of Targets to a list of IEventTarget objects. This allows
  the ability to specify other information with the target such as the input_json field. Old was:

    type: EventsRule
    targets:
      - paco.ref some.ref

  The new format is:

    type: EventsRule
    targets:
      - target: paco.ref some.ref
        input_json: '{"cat":"dog"}'

### Added

- DeploymentPipeline can now use GitHub.Source as a source.

- Integrated the Parliment library to lint/validate the IAM Policies used for all Roles.
  https://github.com/duo-labs/parliament


5.1.1 (2020-02-19)
------------------

### Fixed

- Fixed security_group field for ElasticsearchDomain.


5.1.0 (2020-02-19)
------------------

### Added

- Ability to enforce that you need to be on a specific git branch to change a specific environment.
  Documentation for this was added to a new Paco Workflows page.

## Fixed

- Added proper names to Elasticsearch output refs.

5.0.1 (2020-02-17)
------------------

### Added

- ASG has new field desirec_capacity_ignore_changes that can be set.

### Fixed

- If ignore_changes was set for a CloudFormation Parameter it was breaking the Confirm Changes CLI.


5.0.0 (2020-02-17)
------------------

### Breaking

- Breaking: Lamdba now creates it's Log Group in the CloudFormation. It also allows for additional
  app-specific Log Groups. Lambda's execution role now restricts Log Group permissions to just the
  Log Groups it needs.

  If you have existing Lambdas, you will need to delete the Log Group and then re-provision the
  Lambda (and ensrue the Lambda isn't invoked after the Log Group is deleted or it will re-create it).
  This will allow the Lambda Log Groups to be under CloudFormation state.

### Added

- ServiceLinkedRoles for IAM. New IAM controller method ``add_service_linked_role`` which can be
  used to add a SerivceLinkedRole.

- ElasticsearchDomain resource.

- Ability for a template Parameter to ignore_changes. If this is True then the Parameter will not
  be changed during stack updates.

- ASG has a new instance_ami_ignore_changes field which will mark the InstanceAMI Parameter with
  ignore_changes.

- EventRules can be in the State=ENABLED or State=DISABLED set by the ``enabled_state`` boolean field.

### Changed

- EventsRules are named with a random suffix instead of a prefix. This makes it easier to
  use the --name-prefix option for list-rules in the AWS CLI and API.

- New CFTemplate.create_output created that makes creating and registering outputs easier.

4.0.0 (2020-02-05)
------------------

### Breaking

- Breaking: This will change the secrets for any secret that was created by ``generate_secret_string``.
  Completed full implementation of ``secrets.generate_secret_string``, every property in the CloudFormation
  resource is represented so that expressing defaults won't trigger new secret created.

### Added

- New ``warn_template_changes`` method for CFTemplate. This is a hook that allows
  templates to print a warning about potential unintended side-effects of the change.
  The SecretsManager template is the first to implement this warning hook.

### Docs

- Improved Getting Started documentation and "paco init project" CLI messages.

3.5.5 (2020-01-29)
------------------

### Fixed

- EFS resource can be in a disabled state.

- EIP resource will be removed when disabled.

- ALB resource properly removes ALB when disabled.

- ASG resource is properly disabled.


3.5.4 (2020-01-21)
------------------

### Added

- CloudFrontCacheBehaviours have min_ttl and max_ttl field support.

### Fixed

- CodeCommit repositories policy refactor to work around maximum 10 policy per IAM User limit.


3.5.3 (2020-01-16)
------------------

### Added

- Warn if generated CloudFormation template reaches 80% or greater of the maximum stack size of 51,200 bytes.

### Fixed

- AWS Backup was missing group name in templates. Now creates a stack for every BackupVault.

3.5.2 (2020-01-08)
------------------

### Fixed

- `paco init project` creates the `.gitignore` after cookiecutter runs. This avoids having a | character
  in the filename, which certain filsystems do not like.

- Fixed bug where resource/s3.yaml buckets were being run twice on validate and provision.

3.5.1 (2020-01-06)
------------------

### Fixed

- Fix starter projects: check for aws_second_region in ``paco init project``.

### Changed

- Starter Projects paco-project-version brought up to 6.3.

3.5.0 (2020-01-03)
------------------

### Added

 - Route 53 Health Checks support ip_address field.

 - Duplicate key errors in the YAML have a proper error message.

 - Docs have multi-account set-up page.

### Changed

- NetworkEnvironment networks can now be (almost) empty. This can be used for serverless environments
  that do not need a network. The ``network:`` configuration still needs to exist, but only has to contain
  the ``aws_account`` and ``enabled`` fields.

- Removed Parameter.ending format for cfn-init parameters and Dashboard variables.
  Instead simply including the ending in the paco.ref

- cfn-init launch bundle sends cfn-signal after cfn-init finishes.

- `paco provision account` provisions the accounts.

### Fixed

- If entire VPC is disabled for an ASG, the disabled ASG is removed.

- DeploymentPipeline can be enabled/disabled without throwing errors.

- Throw error if an account is missing an account_id.

- Throw error if .credentials file is missing before asking for MFA.

- cfn-init uses proper base path for Amazon Linux which has cfn-init pre-installed in /opt/aws.

- log group expire_events_after_days can be left blank for log_set and log_group without throwing error.

- Route 53 Record Set stack for an ALB is provisioned in the same account that Route53 is in.

- DeploymentPipeline no longer hard-codes to a 'data' account for CodeCommit principle,
  and instead uses the actual account(s) that CodeCommit repo's use.

- Alarm notifications that do not come from plug-in work again.

- Clean-up for wordpress-single-tier starting template.

- Create ~/.aws/cli/cache directory if it doesn't already exist.

- LogAlarms were incorrectly getting a Resource Dimension added to them.


3.4.1 (2019-12-04)
------------------

### Fixed

- Include paco.cookiecutters data files in paco-cloud distribution.


3.4.0 (2019-12-03)
------------------

### Added

- New CloudWatch Dashboard resource.

- Route53 Health Check supports domain_name or load_balancer fields.

### Fixed

- include paco.stack_grps package!

- Route53 Health Check alarm gets Namespace again.

### Changed

- Final AIM --> Paco rename: Log metric namespace changed from `AIM/` to `Paco/`

3.3.1 (2019-11-29)
------------------

### Fixed

- Placeholder in the wordpress-single-tier template for AMI Id.

- Assorted fixes created by the AIM to paco rename.

- ALB AWS::ElasticLoadBalancingV2::ListenerCertificate are restored.

- Fixed Zone reference lookups in Route53 stack group.

### Docs

- Overview page works on mobile.

3.3.0 (2019-11-28)
------------------

### Changed

- Changed dependency from `aim.models` to `paco.models`

- Renamed all things `aim` to `paco`.


3.2.0 (2019-11-27)
------------------

- AIM has been renamed to Paco: Prescribed automation for cloud orchestration.
  The CLI is now `paco` with a PACO_HOME environment variables. The
  PyPI package is at `paco-cloud`.

- AWS Backup service is supported by paco. Create BackupVaults with BackupPlans and BackupSelections.


3.1.0 (2019-11-06)
------------------

### Added

- DBParameterGroups template.

- LogGroups template adds MetricFilters if present.

- Respect the `global_role_names` field for the IAM Role RoleName.

- Alarms can be provisioned at the Application level without being specific to a Resoure context.

- Route53HealthChecks can be provisioned. These are global resources with the application region
  suffixed to the health check name. The CloudFormation template and CLoudWatch Alarm are provisioned
  in us-east-1, as that is where the metrics are hard-coded to by AWS.

- Lambda template will grant Lambda permissions to an Events Rule in the same application that
  references it as a Target.

- New Events Rule template.

- Added change_protected support to Cloudfront, IAM Managed Policies, and IAM Role templates.

- Added a CodeBuild IAM Permission for IAM Users

- Added the EIP Application Resource and a support 'eip' field to the ASG resource for associating an EIP with a single instance ASG.

- Added `cftemplate_iam_user_delegates_2019_10_02` legacy flag to make user delegate role stack names consistent with others.

- Added support to allow ASG to launch into a single subnet.

- Added ResourceGroupid to the ElastiCache Application Resource

- Added caching to instance AMI ID function.ref lookups.

- Added swap, wget installer, and get tag value helper functions to the EC2 Launch manager and moved all of its scripts to a separate file that is copied from S3 and executed.

- Added VPC Associations to the VPC private hosted zone.

- Added VpcConfig to the Lambda function cftemplate.

- Added `secrets_manager` to Network Environments.

- Added support for !Ref and !Sub to yaml.py

- Added a 'Nested StackGroup' feature to StackGroups. This allows us to nest a StackGroup in the place of a Stack within a StackGroup. This was needed to allow Route53 RecordSets to be created in order, but to allow a different Stack name from the current StackGroup being populated.

- Added the Route53RecordSet CFTemplate and ctl_route53.add_record_set() method.

- Added the EBS Application Resources.
  Added `ebs_volume_mounts` to IASG to mount volumes to single instance groups.
  Added the EBS Launch Bundle to implement `ebs_volume_mounts`

### Changed

- Fixed bug where if a AssumeRolePolicyDocument has both `service` and `aws` fields for the Principal,
  the `aws` field was ignored.

- Improvements to the CLI. Verbose flag is now respected.
  Yes/no questions are consistent and can be answered with 'y', 'n', 'yes' or 'no'.
  Clean-up to formatting. Only prompt for provision changes when running the provision
  sub-command.

- ALB Alarms now provision with an `LBApplication` suffix and match the Resoruce.type field.

- Made IAM Users default password more complex to satisfy password contraints.

- Updated some of the cookiecutter templates for `aim init project`.

- Ported the Route53 CFTemplate to troposphere and separated zones into their own stacks.
  Added the legacy flag `route53_hosted_zone_2019_10_12` for this change.

- Cleaned up expired token handling in Stack() by consolidating duplicate code into a single method.

- Refactor of EC2 Launch Manager user data script management. Common functions are now stored in S3 to reduce user data size.

- Modifed LogGroup names to include the Network Environment name.

- Refactored how Route53 RecordSets are being created. The previous design created RecordSets right in the resource's template. The new design uses the Route53 Controller to create RecordSets in their own stack using an account global name . The reason is that CloudFormation does not allow you to modify RecordSets unless you are modifying the stack that created it. This made it impossible to move DNS between resources without first deleting the record and recreating it. With a global controller, we can simple rewrite the RecordSets to new values.
  Added `route53_record_set_2019_10_16` legacy flag to deal with pre-existing RecordSets

- Moved app_engine.get_stack_from_ref to StackGroup

### Fixed

- Fixed a couple of AWS token expiry retries from failing.

- AWS session caching was not properly caching.

- NotificationGroups controller was not setting up refs correctly, nor resolving them correctly.

3.0.0 (2019-09-27)
------------------

### Added

- New directory `aimdata` is created within an AIM Project by paco. This is used to record state
  of AIM provisioning. CloudFormation templates used to create stacks in AWS are cached as well
  as the last copy of the AIM Project YAML files. These files are used to speed up subsequent
  runs and more importantly can show you what is changed between AIM runs to make it easier to
  review new changes before they are actaully made to AWS.

- CLI: Display a diff of changes from last AIM run and new run in the AIM Project YAML configuration.
  The `-d`, `--disable-validation` flag can be used to

- CLI: Display changes and ask for verification before updating CF templates. This can be disabled
  with the `-y` flag.

- CLI: Offer to delete a stack in a CREATE FAILED state so that a new stack can be provisioned in it's place.

- AWS credentials can now be set to live for up to 12 hours. You can set the .credentials field to
 `mfa_session_expiry_secs: 43200 # 12 hours` to enable this. The default is still one hour.

- Resources with the `change_protected` flag set to true will not have their CloudFormation stacks
  updated.

- API Gateway REST API can now have models, methods and stages. It supports Lambda integration
  with either 'AWS_PROXY' via an assumed Role or 'AWS' via a Lambda Permission.

- S3Bucket has NotificationConfiguration for Lambdas. Lambda will detect if an S3Bucket within the
  same application notifies the lambda and will automatically add a Lambda permission to allow S3 to
  invoke the lambda.

- Lambda AWS::SNS::Subscription resources now have a Region property.

- CloudWatchAlarms template has a `notification_region` class attribute that can be set if
  notificationgroup subscriptions need to go to a single region.

- CloudFront has Origin ID support.

- EFS Resource support.

### Changed

- Breaking! CF Template names have been refactored so that they are more user friendly when listed in the
  AWS Console. This requires deletion and reprovisioning of AWS resources. Templates now have new
  consistent ways to create their names, so this should be the last time this change happens.

- CLI: References to NetworkEnvironments now use consistent `paco.ref` syntax, e.g.
  `aim provision netenv <ne>.<env>.<region>`

- All stacks are created with Termination Protection set.

- CF template base class `paco.cftemplates.cftemplates.CFTemplate` has new methods for creating consistent
  AWS names: `create_resource_name()`, `create_resoruce_name_join()`, `create_cfn_logical_id()`,
  and `create_cfn_logical_id_join()`.

- Console messages reworked to show relevant information in columns.

- CF template base class method `gen_parameter` renamed to `create_cfn_parameter`.

- S3 controller now relies on the bucket name to come from the S3Bucket model object.

- Lambda code.s3_bucket field can now be an paco.ref or a plain bucket name.

- You can provision without specifying the region and it will include all regions in an env.

- NotificationGroups are loaded from project['resource']['notificationgroups']

### Fixed

- CloudTrail generates it's own CloudWatch LogGroup if needed. Outputs for CloudTrail and CloudWatch LogGroup.

- APIGateway, SNSTopics and Lambda now respect the `enabled` field.

2.0.0 (2019-08-26)
------------------

### Fixed

- snstopic output ref and lambda alarm ref fixes.

- Added IAM Users feature for creating IAM Users and configuring console access
  assigning permissions, and access keys.

### Added

- Moved aim reference generation into the Model. Model objects now have .paco_ref and
  .paco_ref_parts properties which contain their paco.ref reference.

- Added StackOutputsManger(). This now creates and maintains $AIM_HOME/ResourceMap.yaml
  which will include a complete list of all stack outputs that are referenced using the
  yaml dictionary path of the resource.

- ALB Outputs includes TargetGroup Fullname.

- Minimal APIGatewayRestApi template.

- Added external_resource support to the ACM

- Added ReadOnly support to the Administrator IAMUserPermission

### Changed

- Automated CloudFront Parameter lists for things like security group and target arn lists.

- Consolidated CFTemplates and Stack's and other Stack cleanups.

- CloudWatch Alarms multi-Dimension Alarms now expect an paco.ref. CloudWatch Alarms are now Troposphere.


1.4.0 (2019-08-21)
------------------

### Added

- CloudTrail resource adds basic CloudTrail provisioning.

- LogGroups are created for all groups that the CloudWatch Agent will require.
  Uses the new Logging schema in paco.models.

- Added CloudFront application Resource

- Added VPC Peering application resource.

- Automated the glue of passing outputs from a stack to the parameter of another stack.

1.3.1 (2019-08-07)
------------------

### Fixed

- Python packaging, also include version.txt.


1.3.0 (2019-08-07)
------------------

### Changed

- CloudWatchAlarms now check for namespace and dimesions fields, that
  can be used to override the default of one primary dimension and the resource_name.

### Fixed

- Python dist did not include README.md and CHANGELOG.md

1.2.0 (2019-08-06)
------------------

### Added

- Deleting resources can leave dangling CloudFormation templates in your
  account. Controllers for NetworkEnvironments now keep track of templates
  they've provisioned and warn you about unused templates.

- NotificationGroups can be provisioned as SNS Topics and subscriptions.
  Use ``aim provision notificationgroups``.

- CloudWatch Alarm descriptions are JSON with metadata about the environment,
  region, application, resource group and resource that the alarm is for.

- CloudWatch Alarms will not notify the SNS Topics that they are subscribed to.

- Rewrote commands with consistent way of passing arguments to controllers.
  Controllers args can now be all lower case.

- Added Account initialization to 'aim init project'.

### Changed

 - AIM references have a new format! It's simpler and more consistent.
   Every ref now starts with ``paco.ref ``.

 - Created ``paco.utils`` to clean up PacoContext object.

1.1.0 (2019-07-24)
------------------

### Added

- Logging functionality added to monitoring. Logs will be ingested by a configured
  CloudWatch Agent and sent to a CloudWatch Log Group.

- Added --nocache to cli to force updates to stacks.

- CLI reports human readable validation errors from AIM project configuration files

- "aim ftest" command added to run functional tests on the "aim init project"
  templates. This command will be expanded in the future so you can test your
  own aim projects.

- Resources/S3.yaml is now functional: eg. aim validate S3

- Added Region to cftemplates so we can do inline replace of <account> and <region>.

- Added LambdaPermission and CWEventRule cftemplates.

- Added CloudWatchController and LambdaController.

### Fixed

 - cookiecutter generated .credentials file was not in git repo as, the cookiecutter
   .gitignore file was causing it to be ignored.


1.0.0 (2019-07-06)
------------------

### Added

- Initial documentation with AIM project site at https://paco.waterbear.cloud/en/latest/

- Added init command with ability to create starting templates for AIM projects
  with the cookiecutter project under the hood.

- Added redirect to Listner rules in the ALB

### Changed

- Document and refactor AIM CLI.

- Moved yaml.py to paco.core

- Refactored S3 Controller

- Ported Route53 config to the model

- Ported CodeCommit config to the model

- Refactored S3 to use Application StackGroup

- CPBD artifacts s3 bucket now uses S3 Resource in NetEnv yaml instead

- Converted the ALB's listener and listener rules to dicts from lists

### Removed

- Removed deprecated configuration


0.6.0 (2019-06-21)
-----------------------

- Document and clean-up AIM CLI

- Validate and Provision functioning after cleanup


0.5.0 (2019-06-21)
------------------

- First open source release



            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/waterbear-cloud/paco",
    "name": "paco-cloud",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": null,
    "keywords": "AWS, Waterbear, Cloud, Infrastructure as Code, CloudFormation",
    "author": "Waterbear Cloud",
    "author_email": "hello@waterbear.cloud",
    "download_url": null,
    "platform": null,
    "description": "# Paco: Prescribed automation for cloud orchestration\n\n [![PyPi version](https://img.shields.io/pypi/v/paco-cloud.svg)](https://pypi.python.org/pypi/paco-cloud/) [![](https://img.shields.io/badge/python-3.6+-blue.svg)](https://www.python.org/downloads/) ![t](https://img.shields.io/badge/status-stable-green.svg) [![](https://img.shields.io/github/license/waterbear-cloud/paco.svg)](https://github.com/waterbear-cloud/paco/blob/master/LICENSE.md)\n\n\nPaco is a cloud orchestration tool for AWS. It enables you to automate the creation and management of your cloud resources\nwith declarative YAML. For more see the [paco-cloud.io web site](https://www.paco-cloud.io).\n\n## Use Paco\n\nPaco can be pip installed from the [paco-cloud](https://pypi.org/project/paco-cloud) package on PyPI.\n\n    pip install paco-cloud\n\nFor more information see the [Paco install](https://www.paco-cloud.io/en/latest/install.html) instructions.\nThen see [Getting Started with Paco](https://www.paco-cloud.io/en/latest/started.html) to learn how to\ncreate a Paco project and connect it to your AWS account.\n\n\n## Get Involved\n\n - Give us a Git Star and share on social media with #PacoCloud. Community discussion happens on\n   [/r/paco_cloud](https://www.reddit.com/r/paco_cloud/).\n\n- Chat with us on [Gitter at paco-cloud](https://gitter.im/paco-cloud/community).\n\n - Submit [feature request and bug reports](https://github.com/waterbear-cloud/paco/issues) on GitHub.\n\n - To develop Paco, git clone this project as well as [paco.models](https://github.com/waterbear-cloud/paco.models).\n\n## Authors\n\nPaco is created by Kevin Lindsay and Kevin Teague for [Waterbear Cloud](https://waterbear.cloud).\n\n\nChangelog for Paco\n==================\n\n9.3.45 (2024-04-08)\n------------------\n\n### Added\n\n- Added 'Encrypted' flag and set to 'true' by default on EBS volumes\n\n- Added LBResourceIsEnabled condition to ALB SSL certificates to avoid being created when in CostDisabled mode\n\n- Added Static IP support to Network Loadbalancers.\n\n### Fixed\n\n- Fixed ALB Target Group name generation\n\n- Fixed IAM User Account delegates IAM policy for updating IAM user access keys\n\n- Fixed IAM user password generation algo\n\n- Fixed backup vault selection syntax after AWS changes\n\n\n9.3.44 (2023-12-21)\n------------------\n\n### Added\n\n- Added try catch to ECS Service list services API call when deleting ECS services to prevent failure.\n\n### Fixed\n\n- Fixed an exception which occured when ECS Service target tracking is disabled.\n\n### Changed\n\n- Modified the Desired, Min, and Max Tasks count CloudFormation template parameter from String to Number to resolve recent CloudFormation validation errors.\n\n\n9.3.43 (2023-09-26)\n------------------\n\n### Added\n\n- Added ECRReplicationConfiguration resource\n\n- Added external_resource to GuardDutyDetectorRegion\n\n- Added legacy flag for old ECS tracking Policy names\n\n- Added me-central-1 to Loadbalancer hosted zones\n\n- Added region name to DeploymentPipeline IAM roles to prevent conflicts\n\n- Added release.version to ec2lm PutObject bucket policy.\n\n- Added secrets_manager_default_2023_03_09 legacy flag for default secrets value\n\n- Adding support for non-default regions\n\n- Began adding ECR Repository Replications\n\n- Began adding support for LaunchTemplates\n\n- Disable Notification Rules if monitoring is disabled on a DeploymentPipeline\n\n### Fixed\n\n- Fixed ECS Task  VPC network configuration\n\n### Changed\n\n- Implemented Live Amazon Linux 2023 OS and Kernel patching and version preservation.\n\n- Ported Amazon Live patching command to use release version.\n\n\n9.3.42 (2023-07-19)\n------------------\n\n### Added\n\n- Added Task role to ECS services\n\n- Added new GitHub OIDC thumbprint\n\n\n9.3.41 (2023-06-27)\n------------------\n\n### Added\n\n- Added <environment> support to IAM Role names.\n\n- Added CloudWatch Logs resource\n\n- Added Conditions support to IAM user delegate custom policy permissions\n\n- Added EC2LM function to purge codedeploy.\n\n- Added EC2LM function to run commands for preparing an EC2 for the Create AMI command.\n\n- Added EventBridge Resource\n\n- Added NACL configuration support to Segments\n\n- Added RuleOverrideAction to WAFWebACL Rules\n\n- Added SSM function to call the EC2LM function to prepare for Create AMI .\n\n- Added Sid field to the policy Statement() model object\n\n- Added WebACL support to ALB Listeners\n\n- Added cross zone configuration to Loadbalancers\n\n- Added cross zone configuration to Loadbalancers\n\n- Added disable_account_delegates to IAMUser to allow users to be created in any account\n\n- Added event_bus field to IEventsRule\n\n- Added get_arn() function to CloudWatchLogGroup model object\n\n- Added managed_policy_arns filed to the IAM User Custom Policy model object\n\n- Added manged_polcies support to IAM users to attach policies directly to the user.\n\n- Added override_action to WAF Rule\n\n- Added support for Amazon Linux 2023\n\n- Added support for IDP Roles to the IAMRole application resource\n\n- Added support for IMDSV2 EC2 metadata authentication\n\n- Added support for Partner integrat ions to EventsRule\n\n- Added support for me-central-1 (UAE) region\n\n- Added support for me-central-1 (UAE) region\n\n- Added Aurora Global Cluster support to RDS\n\n### Fixed\n\n- Fixed PacoReference str_ok when used in Lists\n\n- Fixed VPC Peering table names to make them more unique\n\n- Fixed VPC Peering to work in multi-region configurations\n\n- Fixed VPC stack deletion cleanup hook which failed if the VPC private hosted zone does not exist.\n\n- Fixed permisions in ECR Deploy instances\n\n### Changed\n\n- Improved Create AMI command\n\n- Made policy names unique when generated by iam_user_account_delegates\n\n- Made policy names unique when generated by iam_user_account_delegates\n\n- Modified ECR Deploy Scritp Manager to generate separate scripts per ecr_deploy_name\n\n- Modified SecurityGroupRule cidr_ip type to PacoReference from TextLine\n\n- Changed Deploymet pipelines to use default account for the S3 artifacts bucket if the S3 configuration does not have an account explicitly set.\n\n- Changed LoadBalancer ListenerRule 'host' field to a list.\n\n- Disabled automatic population of asg_metrics in ASG monitoring\n\n9.3.40 ((2023-02-28))\n------------------\n\n### Added\n\n- Added --alarms-only/-a option to paco arguments.\n\n- Added --ssm argument to provision paco command to allow running SSM commands on instances\n\n- Added <account> and <region> replacements for IAM Role resources.\n\n- Added AMI command to automate creating EC2 AMIs.\n\n- Added ARM support for Amazon linux instance type for t4g instancs\n\n- Added AccessKeys IAM User permissions\n\n- Added AppConfig resource\n\n- Added CacheClusterId and PrimaryNodeId to Elasticache redis cftemplate outputs.\n\n- Added CloudWatch Resource for Consolidated Monitoring Account configuration\n\n- Added Conditions to AssumeRolePolicy\n\n- Added DomainName and RegionalDomainName to S3 Bucket outputs\n\n- Added EC2 Flow Logs for VPC\n\n- Added EC2 controller pre-loading to allow for EIP global references\n\n- Added ECSCluster Delete stack hook to remove services when DBClusters are deleted\n\n- Added EIP configuration to EC2 global resource\n\n- Added GuardDuty Resource\n\n- Added GuardDuty to EventsRule state\n\n- Added IAMPolicy Resource\n\n- Added Idenity Provider role to ECR Repositories\n\n- Added Image Scanning supprot to ECRRepository\n\n- Added ImageTag Parameter to ECS Services.\n\n- Added Inspector Resource\n\n- Added Inspector to EventRule source types\n\n- Added Lifecycle Rules support to S3Buckets\n\n- Added Listener Rule TargetGroup ARN Parameter to LB CFTemplate.\n\n- Added ListernRuleArn CloudFormation Output to LoadBalancers\n\n- Added Logging to Cloudfront Distributions\n\n- Added Paco-Resource-Type Tag to ECS Servies\n\n- Added PacoService Resource\n\n- Added ReadOnly mode to EFS mounts\n\n- Added ResponseHeaderPolicy to CloudFront resources.\n\n- Added Retain deletion policy to EIP template\n\n- Added Roles to resource.iam\n\n- Added SSM document for updating instace packages\n\n- Added Ubuntu 22.04 support to paco.ref ami function\n\n- Added UpdateFunctionConfiguration to Lamdba IDP Role permissions\n\n- Added VPCEIP to network.vpc configuration.\n\n- Added VPN Client Endpoint to VPC\n\n- Added ability for ECS services to override the LogGroup name, and added a boolean to disbale LogGroup creation.\n\n- Added ability to manage Services from CFN parameters\n\n- Added ability to publish versions, layers, and update function code to Lambda IDPRoles\n\n- Added account field to ILambda\n\n- Added and ec2lm_update_packages() function to EC2LM\n\n- Added assume_role_policies to BaseRole to allow for multi-statement AssumeRole policies.\n\n- Added availability zone field to VPN client endpoint.\n\n- Added check to not attach cluster capacity providers if we already have one attached.\n\n- Added codedeploy_stack_name_2022_07_07 as a legacy flag\n\n- Added condition to Listner Outputs parameter\n\n- Added config_scope arg to the loader\n\n- Added external_repository_arn to ECSRepository resources\n\n- Added federated to Principal schema\n\n- Added file locking to allow for parallel paco calls\n\n- Added hash_long_names to LoadBalancer get_aws_name() model object function\n\n- Added ignore changes field to Loadbalancer ListenerRule target group\n\n- Added ignore fields to ECSContainer Definitions and individual servics\n\n- Added lambda_version to CloudFront lambda function associations\n\n- Added list_split() utils method.\n\n- Added monitoring to GuardDuty\n\n- Added paco scope filters to resource.route53\n\n- Added paco scope filters to resource.route53\n\n- Added policy_actions, the ability to control Access to IDPRoles\n\n- Added response_headers_policy_id to CloudFront Default cache behavior\n\n- Added ssm:PutComplianceItems to SSM policies\n\n- Added support for ARNs to ssl certifcates in Loadbalancers\n\n- Added support for EventsRule monitoring\n\n- Added support for Inspector to EventBridge notifications.\n\n- Added support for gloabl EIPs to self-managed EC2 nat gateways\n\n- Added support for global resources to BotoStacks\n\n- Added support to automatically set UsePreviousValue to False on CFN stacks that return error on usePreviousValue not in the previous template.\n\n- Added support to remove Attached policies from Roles in the IAM delete stack hook\n\n- Added support to set the NAT instance AMI\n\n- Added tags field to IEBS\n\n- Added try/except catch around VPC Cleanup Hook\n\n- Added try/except catch around VPC Cleanup Hook\n\n- Adding loggroup consolidation to ECS Clusters\n\n- Allowed ARNs in LBApplication listener ssl_certificates lists\n\n- Changed IAM User delegate user resource arns to use ${aws:username} in the CF template.\n\n- Changed IAM user policy to use ${aws:username} rather than explicit names\n\n- Changed RDS KMS keys DeletionPolicy to Retain to allow snapshots from deleted RDS clusters to remain viable.\n\n- Changed RDS KMS keys DeletionPolicy to Retain to allow snapshots from deleted RDS clusters to remain viable.\n\n- Changed ResponseHeaderPolicy resource name to include netenv and environment names.\n\n- Changed StackTemplate to be initializable with out a paco_ctx or stack.\n\n- Changed ecr repository .repository_name with .full_repository_name\n\n- Changed paco_ssm loggroup expiry to 365 days\n\n- Changed resource.iam.roles account string to accounts list.\n\n- Changed, ALBs will not update DNS when cost_disabled is True\n\n- Created OIDCIdentityProvider CFTemplate\n\n- Disabled Cloudformation signal sleep\n\n- Disabled DHCP Options for private hosted zones. Network failed to load.\n\n- Disabled the network env controller's stack output save now that the Stack() class is managing this.\n\n- ECR Repositories are now emptied before they are deleted.\n\n### Fixed\n\n- Fixed ASG ECS Cluster Capacity Provider attachments\n\n- Fixed Account name in SystemsManager IAM user delegate permissions\n\n- Fixed CodeDeploy stack name to include the action name when codedeploy_stack_name_2022_07_07 feature flag is enabled.\n\n- Fixed CodePipelineRetryStagesPolicy quota size by breaking it into chunks.\n\n- Fixed EC2LM EBS Volume attachment Launch Bundle\n\n- Fixed ECR IDP Role Condition\n\n- Fixed EIP CF logical id for non global Resource resources.\n\n- Fixed IAM Role delete hook to cleanup attached policies\n\n- Fixed Log Exports list in RDS CF Template.\n\n- Fixed SSMSession IAM permissions\n\n- Fixed VPC Peering automation\n\n- Fixed VPC Peering to use IAM Role name when configured.\n\n- Fixed VPC private_hosted_zone. It now associates itself with the VPC and sets the DomainName for the DHCP options.\n\n- Fixed a bug in the new ami command for generating EC2 images\n\n- Fixed default SecretsString to {}\n\n- Fixed externally_managed flag on IAM user access key credentials from managing keys\n\n- Fixed model_obj on resource.route53 paths\n\n- Fixed permissions on SSM Port forward and CodeDeploy tools delegate\n\n- Fixed the hook which deleted ECS services from a cluster\n\n### Changed\n\n- Implemented VPC VPN Client Endpoint\n\n- Improved error message when reference does not resolve to a stack for.\n\n- Made ECSASGConfiguration Deployable\n\n- Made Route53 HostedZone's honour their is_enabled() flag.\n\n- Made VPC Peering vpcid lookup resolve to stack outputs.\n\n- Modified Dashboard names to include NetEnv and Environment name\n\n- Modified ResourceEngine() to interface with global Resources and not just within an ApplicationEngine()\n\n- Modified alarms to create empty stacks when monitoring is disabled.\n\n- Modified swapon to use fallocate instead of dd when available\n\n- Ported ASG to troposphere 4.x\n\n- Porting to troposphere 4.x\n\n- Prefix cp- to ECS Capacity provider names if they start with aws, ecs, or fargate\n\n- Release Phase script will now delete tags from task definition\n\n- Started adding DisableScaleIn hook on ASG Delete\n\n- Updated gitignore\n\n- VPC Private Hosted Zones are now emptied before being deleted.\n\n\n9.3.39 ((2022-07-08))\n------------------\n\n### Added\n\n- Added ALB Listener Default Actions\n\n- Added Paco-Resource-Sub-Type Tag to Alarm stacks with value 'Alarms'.\n\n- Added S3 Registry Hooks\n\n- Added a feature_flag option to project.yaml\n\n- Added alarms_only flag to Paco context. (Still need to add CLI argument)\n\n- Added exception handling when cleaning up IAM policies if the Role has already been deleted\n\n- Added has_kvp() to StackTags()\n\n- Added prefix_environment_name and new logic to ECR Repository name generation and config\n\n- Added s3_buckets to ILambda for explicit Lambda Permission to InvokeFunction\n\n- Allowed Network to be enabled but VPC disabled.\n\n- Changed Alarms CF Stacks Paco-Resource-Type by appending \"-Alarms\" to the name.\n\n- Disabled PlacementStrategies with ECS launch type is Fargate\n\n### Fixed\n\n- Fixed IAM delegate permission for SSM Session access\n\n### Changed\n\n- Moved ASG user data processing into the EC2LM.\n\n- Modified CODEPIPELINE_CODEDEPLOY_INIT_STAGE_HOOK behaviour.\n\n\n9.3.38 ((2022-06-02))\n------------------\n\n### Added\n\n- Added build artifacts to .gitignore\n\n### Fixed\n\n- Fixed the IAM Role Cleanup stack hook that deletes policies from roles\n\n\n9.3.37 ((2022-05-27))\n------------------\n\n### Added\n\n- Added stack hook to clean up IAM role policies before deleting the role\n\n### Fixed\n\n- Fixed dpkg purge syntax in CodeDeploy EC2LM launch bundle\n\n- Fixed nosync flag and aws s3 EC2LM download in user data script\n\n9.3.36 ((2022-05-25))\n------------------\n\n### Added\n\n- Added CodeDeploy support to DeploymentPipeliens IAM delegate policies\n\n- Added support for S3 events in EventsRule\n\n- Added temporary service hook code for CodeDeploy AMI Builder\n\n\n9.3.35 (2022-05-06)\n------------------\n\n### Added\n\n- Added LoadBalancer and TargetGroup automated support to Alarms\n\n- Added TargetGroup name tag to TG resources\n\n- Added enable/disbale to target groups\n\n- Adding WIndows Powershell support to EC2LM\n\n- Adding custom pypi upload script\n\n- Adding new folders to .gitignore\n\n### Fixed\n\n- Fixed Windows SSM CodeDeploy install\n\n- Fixed duplicate alarm in CW Alarms\n\n- Fixed typos in ec2lm port\n\n### Changed\n\n- Moving EC2LM scripts into their own module.\n\n- Removed debug breakpoints()\n\n9.3.34 (2022-05-01)\n------------------\n\n### Changed\n\n- Testing new PyPi build and upload scripts\n\n9.3.33 (2022-05-01)\n------------------\n\n### Changed\n\n- Testing new PyPi build and upload scripts\n\n\n9.3.32 (2022-05-01)\n------------------\n\n### Changed\n\n- Testing new PyPi build and upload scripts\n\n\n9.3.31 (2022-05-01)\n------------------\n\n### Changed\n\n- Testing new PyPi build and upload scripts\n\n9.3.30 (2022-05-01)\n-------------------\n\n### Fixed\n\n- Made a fix to the Release phase script\n\n- Fixed LogGroup default expiry\n\n- Fixed Cost Disabled stack outputs\n\n- Fixed debugging condition on ALB\n\n### Added\n\n- Implemented a default_password field for IAM users to work around password resctriptions.\n\n- Adding ALBs to the Idle service\n\n- Added Environment name to notification rules config.\n\n- Added a check to avoid updating tags on KMS stacks.\n\n- Added Environment name to notification rules config.\n\n- Added a check to avoid updating tags on KMS stacks.\n\n- Added Paco-Resource-Type and Paco-Reference tags to stacks\n\n- Added support for CostDisabled ALBS\n\n- Added ec2lm_get_secret_from_json() function\n\n- Added project Environment Variables support to CodeBuild.\n\n- Added DetectChanges to DeploymentPipelines\n\n- Added GitHub CodeStar connection support\n\n- Added DetectChanges to DeploymentPipelines\n\n- Implemented new PacoServiceHook\n\n- Added more CodeDeploy Service hooks to implement Blue/Green deployments\n\n- Adding CodeDeploy Service support\n\n### Changed\n\n- Starting to look at AWS Lambda Layers\n\n- Removed RoleArn from EventsRule when target is lambda\n\n- Move EC2LM lock file\n\n9.3.29 (2022-03-25)\n-------------------\n\n### Added\n\n- Added LifeCycle Policies to ECRRepository resources.\n\n- Added DNS LaunchBundle\n\n- Added ARN to HostedZone CF Outputs\n\n- Added load_content to utils.\n\n- Added EventsRule resource state generateion and upload.\n\n- Added project name to EventsRule Codebuild projects.\n\n- Added fix for missing EC2LM cache file.\n\n- Adding support for EventsRule notifications.\n\n- Added obj_to_dict() function to utils\n\n- Added event bridge notification access to SNS topcis\n\n- Added Event Pattern support to EventsRules\n\n- Added notifications to EventsRules\n\n- Added CodeStar connection ARN field to CodePipeline source configuration for BitBucket.\n\n### Changed\n\n- ASG disabled target groups automatically when the ALB is disabled\n\n- Made DELETE confirmation more robust\n\n### Fixed\n\n- Properly fixed Delete Stack confirmation logic.\n\n9.3.28 (2022-03-04)\n-------------------\n\n### Changed\n\n- Updated paco.models dependency\n\n9.3.27 (2022-03-04)\n-------------------\n\n### Fixed\n\n- Fixed EventsRule Targets after troposphere upgrade.\n- Fixed a corner case where home is missing from paco command arguments\n### Added\n\n- Added deployment branch to GitHUb webhook filters.\n- Codebuild now supports NO_SOURCE\n- Added DNS to ElastiCache\n- Added  SSM command  to install CodeDeploy on Windows servers\n- Added IAM Role Name and Arn to stack outputs\n- Added Environment Type to CodeBuild DeploymentPipelie configuration\n- Added basic support for CodePipeline and EventPattern eventrules\n\n### Changed\n\n- Updated CodeDeploy EC2LM wait for deployment logic\n\n9.3.26 (2022-02-09)\n-------------------\n\n### Added\n\n- Added Build Batch configuration to CodeBuild\n\n9.3.25 (2022-02-08)\n-------------------\n\n### Added\n\n- Added github access source configuration to CodeBuild\n\n- Added enable_automatic_backups to IEFS\n\n### Changed\n\n- Made ec2lm_signal_asg_resource wait for deployments before waiting for the healthcheck timeout.\n\n- Updated ubuntu package update command with noninteractive arguments.\n\n- ec2lm_signal_asg_resource will now wait for CodeDeploy deployments before signaling CloudFormation.\n\n- Enabled encryption at rest on EFS by default\n\n9.3.24 (2022-01-31)\n-------------------\n\n### Added\n\n- Added CodeBuild Artifacts configuration\n\n9.3.23 (2022-01-27)\n-------------------\n\n### Added\n\n- Added deployment_branch_name to CodeBuild GitHub source configuration\n\n- Added source_security_group_owner to SecurityGroup for cross account access\n\n- Added IAM Policy conditions on CodeBuild VPCConfig Service Role\n\n- Added CodeBuild support to EventsRules\n\n- Added SubnetId ARNs to segment's CFN outputs\n\n- Added CodeBuild support to EventsRule\n\n- Automated VPC Peering between netenvs\n\n- Added -l --cfn-lint argument to perform extra CloudFormation error detection\n\n- Added VpcConfig to codebuild configuration\n\n- Added availability_zone config to VPC endpoints\n\n### Fixed\n\n- Fixed elasticache security group CFN Parameter logical name\n\n### Changed\n\n- Removed CodeDeployConfiguration Name to allow CF to replace resource when HOST_COUNT is changed.\n\n- Removed string value from Port numbers\n\n- Removed duplicate NACLAZ3 entries in segments CF templates\n\n- Removed unneeded dimensions from windows cloudwatch config.\n\n- Implemend enable/disable for VPC endpoints.\n\n- SSM wait command now skips instances that are not running\n\n- Improved EC2LM bundle caching and updates.\n\n9.3.22 (2021-12-17)\n-------------------\n\n### Added\n\n- Implemented IAM Role resources\n\n- lambda deploy command can now upload pre-made .zip files if the path ends in .zip.\n\n- Added TokenExpired retry support to paco_buckets.is_bucket_created()\n\n- Added TokenExpired retry support to paco_buckets.is_bucket_created()\n\n### Changed\n\n- DeploymentPipeline will now default to environments account when one is not specified.\n\n9.3.21 (2021-11-24)\n-------------------\n\n### Added\n\n- Implemented 'disable_codepipeline' to IDeploymentPipelineConfiguration to allow stage resource to be build independently.\n\n- Implemented CodeBuild GitHub source configuration\n\n9.3.20 (2021-11-23)\n-------------------\n\n### Fixed\n\n- EC2LM: EFS utils will only be installed if it does not already exist\n\n- EC2LMS: EFS: Moved tmp dir to root folder for CIS hardened ubuntu images.\n\n- EC2LMS: EFS: Mounting of EFS drives made idempotent\n\n- Fixed Ubuntu EFS launch bundle install\n\n- Fixed CodeDeploy agent install on CIS hardened imges.\n\n- Fixed external resource support to Route53 HostedZones\n\n### Added\n\n- Added ec2lm_set_dns_cname() function to EC2LM for more specific DNS modifications\n\n- Added ec2lm_set_dns() function to EC2LM\n\n- Added EC2LM support for ubuntu_18_cis ami type\n\n- Added region support to Lambda functions.\n\n- Implemented SystemsManagerSession IAM policy\n\n### Changed\n\n- Improved Release Phase deployment script reliability.\n\n- Automated ManualApproval resource.IAM DeploymentPipeline permissions\n\n- Automated namespace for AlarmSets for ASG\n\n- Fixed manual approval IAM DeploymentPipeline policy.\n\n- Fixed manual approval IAM DeploymentPipeline policy.\n\n- Fixed EBS EC2 Launch Bundle to work with Ubuntu nvme drives\n\n9.3.19 (2021-10-04)\n-------------------\n\n### Added\n\n- Added RDS Aurora MySQL serverless support\n\n- Added non paco.ref support for EBS volume mounts\n\n- provision on CodeCommit will now display repository ssh clone URLs.\n\n### Fixed\n\n- Fixed AWS principle when account ids start with zero\n\n- Fixed DeploymentPipeline IAM Permissions\n\n9.3.18 (2021-09-10)\n-------------------\n\n### Added\n\n- Added service hook for Security Groups in cftemplate.lb\n\n- Added TargetGroup enable/disable\n\n- Added HealthCheckPort to TargetGroups\n\n- Added WebACL paco.ref support to cloudfrom webacl_id field.\n\n- Added WAFv2 Resource\n\n### Fixed\n\n- Fixed storage_encrypted implementation in RDS cftemplate\n\n9.3.17 (2021-08-26)\n-------------------\n\n### Changed\n\n- LogGroups are now exempt from change_protected flags in RDS, ASG, and S3Buckets\n\n- Enabled s3 Bucket encryption by default\n\n### Added\n\n- Implemented S3 Bucket replication for cross-account buckets\n\n- Implemented bucket_owner_preferred for S3 Bucket resources\n\n- Added a backup_restore_bucket RDS Option field to RDSSQLServerExpress resource.\n\n- Added ECR Repository field to IASG for automated permissions.\n\n- added ec2lm_replace_secret_in_file_from_json() function to EC2LM\n\n- Added support for Ubuntu 18\n\n- Added BitBucket support to DeploymentPipeline sources\n\n- Added IASGPatchManager for automated Windows patching\n\n### Fixed\n\n- Prevent record set from being created if hosted_zone is undefined in cloudfront.\n\n- Fixed IAM Policy name generation to support 127 characters, was only 64 before.\n\n- Fixed codedeploy launch bundle.\n\n- Fixed RDS parameter group to allow empty parameters.\n\n9.3.16 (2021-06-25)\n-------------------\n\n### Fixed\n\n- Fixed ECSService alarms when more than one service is used.\n\n### Added\n\n- Added -h/--hooks-only flag for updaing EC2 configuration without affecting the stack.\n\n9.3.15 (2021-06-08)\n-------------------\n\n### Added\n\n- Implemented SQLServerExpress RDS\n- Implemented SSM Agent Update using SSM Document for Windows\n- Added redirect_path to IListenerRules\n- Implemented VPC Endpoints in network.vpc for ssm, ssmmessages, and ec2messages.\n- Automated ALB access logs bucket policies\n- Added VPCEndpoints CFTemplate\n\n### Changed\n\n- IAM controll now prints SwitchRole URLs for users on resource.iam operations\n\n9.3.14 (2021-05-11)\n-------------------\n\n### Changed\n\n- Made ASG instance key pair optional\n\n### Added\n\n- Added a default PlacementStrategy to ECS servies of binpack.memory\n\n- Added sub environment caching to the Network Environment Controller.\n\n- Added Arn Ourput to S3 cloudformation templates.\n\n### Fixed\n\n- Fixed paco init cookiecutter AlarmSets missing classification field\n\n9.3.13 (2021-05-04)\n-------------------\n\n### Added\n\n- Added paco.models 7.8.10 dependency\n\n9.3.12 (2021-05-04)\n-------------------\n\n### Added\n\n- Added region field to DeploymentPipeline configuration\n\n9.3.11 (2021-04-23)\n-------------------\n\n### Added\n\n- Added support to disable ECS services\n\n- Added resource group name to ACM botostack names.\n\n### Fixed\n\n- Fixed ECS docker_exec script\n\n- Fixed CodeStart NotifciationRule Name filter for resource name generation\n\n- Fixed unique listener SSL certificate name in ALB\n\n- Fixed DeploymentPipeline notification rules if a rule does not have any event ids.\n\n9.3.10 (2021-04-19)\n-------------------\n\n### Added\n\n- Added restart-services functionality to ecs script.\n\n9.3.9 (2021-04-19)\n------------------\n\n### Added\n\n- Added logging to SSM instance EC2LM update run commands.\n- Added docker-exec command to ECS ScriptManager script.\n\n### Changed\n\n- Improved ECR Deploy Script to tag the destination image with the same tags as the source.\n\n9.3.8 (2021-04-09)\n------------------\n\n### Fixed\n\n- Fixed release phase script name in the ECR deploy script.\n\n- Fixed codedeploy EC2 Launch Bundle on ubuntu.\n\n- Fixed unique key to CodeBuild IAM permissions policies\n\n- Fixed SNS topic policy duplicates by adding a cache\n\n### Added\n\n- Added IAM policy statement for cloudwatch service to SNS topics listening for CloudWatch Alarms notifications.\n\n- Added paco registry override for Alarm Descriptions.\n\n- Made notification rules for DeploymentPipeline inherit application notification configurations if the resource config is missing.\n\n### Changed\n\n- Improved error handling when processing alarm actions\n\n- Reformatted the resource state s3 bucket key\n\n9.3.7 (2021-04-06)\n------------------\n\n### Added\n\n- Added support for resource state in the paco worker bucket.\n\n### Fixed\n\n- Fixed SNS Topics cross account + cross region policy\n\n\n9.3.6 (2021-04-02)\n------------------\n\n### Added\n\n- Added support for cross account + cross region SNS Lambda Subscriptions\n\n- Added Notification Rules to DeploymentPipelines.\n\n- Added an ECS utility to the script manager for ASGs\n\n\n### Fixed\n\n- Fixed CF handling of LBv2 Certifictes.\n\n- Removed cloudfront forcing us-east-1 on certificates. Raise exception instead.\n\n- iotpolicy.get_outputs() will now obtain the policy arn if it does not exist when called.\n\n- Fixed EC2LM credential missing race condition code.\n\n\n9.3.5 (2021-03-15)\n------------------\n\n### Fixed\n\n- Added paco.models dependency for 7.8.4.\n\n\n9.3.4 (2021-03-15)\n------------------\n\n### Added\n\n- import_from functionality for environments and resource groups.\n\n- LogGroup stacks will delete groups using stack hook on stack deletion.\n\n### Fixed\n\n- Capacity Provider state manager now handles ASG creation\n\n9.3.3 (2021-03-11)\n------------------\n\n### Added\n\n- Route 53 has A Alias support.\n\n### Fixed\n\n- ECS Capacity Provider provisioning to ensure the cluster attaches to the correct providers.\n\n- CloudFront viewer_certificate handles correctly when the factory is None.\n\n- EC2 Launch Bundles: fix a race condition where the instance tries to use it's IAM Role before it's attached.\n\n\n9.3.2 (2021-02-24)\n------------------\n\n### Added\n\n- CloudFront supports `OriginRequestPolicyId` and `CachePolicyId` which can be set in the CloudFront resource\n  with new `cache_policy_id` and `origin_request_policy_id` fields for the CloudFront `cache_behaviors` field.\n\n\n9.3.1 (2021-02-05)\n------------------\n\n### Added\n\n- New EC2LM convienence functions for running commands asynchronously: `ec2lm_async_run` and `ec2lm_async_run_wait`.\n\n### Changed\n\n - ECS Release Phase commands run asynchronously.\n\n\n9.3.0 (2021-02-04)\n------------------\n\n### Changed\n\n- Deprecated `resource.snstopics` has been removed. CloudWatch Alarms now alert to `resource.sns`.\n\n\n9.2.5 (2021-02-03)\n------------------\n\n- Added logging for external CW Log Groups.\n\n\n9.2.4 (2021-01-29)\n------------------\n\n- Add `script_manager` to `ASG` for ECR Deployments.\n\n\n9.2.3 (2021-01-13)\n------------------\n\n### Fixed\n\n- Update to depend upon `paco.models` 7.7.4.\n\n\n9.2.2 (2021-01-13)\n------------------\n\n### Changed\n\n- ASG launch options field `codedeploy_agent` now defaults to False.\n\n### Fixed\n\n- `paco.sub` will now lookup the Stack Output for refs that refer to Stacks.\n\n- Fixed DynamoDB reference strings.\n\n- Added `DescribeImages` permission to CodeBuild release phase.\n\n9.2.1 (2021-01-05)\n------------------\n\n### Added\n\n- Allow Managed Instance Protection to be set to ENABLED/DISABLED for an ECS ASG Capacity Provider.\n\n\n9.2.0 (2021-01-05)\n------------------\n\n### Added\n\n- ECS Service can specify it's Capacity Provider.\n\n- ECS Cluster can specify a default Capacity Provider for the whole cluster.\n\n- Release phase command for ECS. Launchs a Task via SSM and executes it via CodeBuild,\n  waits for success and then continues to the next CodePipeline Stage.\n\n### Changed\n\n - ECS CodePipeline Deploy delegate Role permissions are more restrictive/secure.\n\n### Fixed\n\n - resource/iam.yaml: Permissions for CodeBuild in the DeploymentPipeline resolve correctly.\n\n9.1.0 (2020-12-23)\n------------------\n\n### Added\n\n- Initial support for LBNetwork type: Network Load Balancers.\n\n- New `DynamoDB` resource for provisioning DynamoDB Tables.\n\n- New `S3BucketPolicy` StackTemplate.\n\n- Support for `copy_actions` for BackupPlanRules in AWS Backup to allow cross-account backups.\n\n- IAM Policies and S3 Bucket Policies now support all allowable AWS Conditions.\n\n### Changed\n\n - EC2LM cfn-init bundle now uses the Python 3 cfn-init 2.0 package rather than installing Python 2\n   and the legacy cfn-init 1.4 package.\n\n9.0.2 (2020-11-12)\n------------------\n\n### Fixed\n\n- Require `paco.models` 7.6.1 with `codedeploy_agent` field.\n\n\n9.0.1 (2020-11-12)\n------------------\n\n### Added\n\n- Invoke a Lambda from the CLI with `paco lambda invoke <paco-ref-parts>`.\n\n### Fixed\n\n- Initialize more than one netenv, in-case another netenv is initialized already by a Service.\n\n9.0.0 (2020-11-07)\n------------------\n\n### Migration\n\n- Resources of `ECSServices` will need to be updated to add a DesiredTasks Stack Parameter. This\n  must be done before attempting to add an scaling configuration to that `ECSServices`.\n\n### Added\n\n- Lambda Triggers support for `CognitoUserPool` resource\n\n- Paco refs for secrets can have an additional part at the end to resolve to the JSON field inside the value of the secret.\n\n- `ECSServices` has new `setting_groups` field which allows sharing the same set of Secrets and Environments\n  between container definitions.\n\n- Handy `enable_cors` for `ApiGatewayRestApi` template.\n\n- Nested Resources for `ApiGatewayRestApi`.\n\n- Describe Command has a `--output spa` option with minimal containing HTML. Contents suitable to use in a SPA.\n\n- ApiGatewayRestApi supports all fields needed to enable OPTIONS for CORS.\n\n- ApiGatewayRestApi can do cross-account Lambda integration. Lambda will add a Lambda Permission\n  to allow the API Gateway from the other account to invoke it.\n\n- Outputs for ApiGatewayRestApi\n\n- `paco provision` has a new `-a, --auto-publish-code` option which will compare the md5 hash of a\n  local or directory or file for Lambad resources that use a `zipfile:` with a local path. If the loal\n  code is changed, a new artifact will be zipped and uploaded to an S3 Bucket.\n\n- CloudFront Outputs for `id` and `domain_name`.\n\n- Support for LambdaFunctionAssociations for CloudFront.\n\n- Support for Lambda@Edge\n\n- Support for Cognito.\n\n- Support for ECS Fargate.\n\n- ALB TargetGroup can now use the `target_type` field.\n\n- Support for ECS TargetTracking Service Scaling.\n\n- The `CodeBuild.Build` action for DeploymentPipeline now supports a list of `ecr_repositories`\n  that can declare `Push`, `Pull` or `PushAndPull` permissions.\n\n- Added a `upload_fileobj` method to PacoBuckets.\n\n- StackHooks that have been added to Resource model objects are added to a Stack after it's\n  created.\n\n### Changed\n\n- New `BotoStack` with `ACM` and `IoTPolicy` Resources types.\n\n- `set_parameter` for `paso.stack.Stack` will now replace a Parameter with the same name. This allows\n  Parameters to be changed by hooks.\n\n### Fixed\n\n- CodeCommit users Arn output looks it up from the proper Stack.\n\n- CloudFront handles CustomOriginConfig with no fields specified for `ssl_protocols` and `https_port`.\n\n8.0.0 (2020-09-17)\n------------------\n\n### Migration\n\n - Paco Service add-on APIs have been changed and renamed. The new ``paco.extends`` package\n   was added that gives a single set of APIs for Services to extend Paco. Documentation for\n   extending Paco has also been created.\n\n### Added\n\n- New IAMUser StackTemplate for the application-level IAMUser type.\n\n- New PinpointApplication resource type. Minimal implementation to support using the\n  service for transactional messages only.\n\n### Changed\n\n - Using Troposphere 2.6.2 with a ``monkey-patch troposphere.elasticloadbalancingv2.LoadBalancer``\n   so that ``LBApplication`` can pass `SecurityGroups` and `Subnets` as a single Security Group List Parameter.\n\n### Fixed\n\n- If there is no ``resource/snstopics.yaml`` then the SNSTopic Controller should not load.\n\n- Provision for ``resource.s3`` was using incorrect resource_ref\n\n- ALB created Route53 RecordSets now use the Route53 account instead of defaulting to the current account.\n\n- CloudFront domain_aliases now use the hosted_zone of the account for paco refs.\n\n- PyLance detected fixes and clean-up: https://github.com/microsoft/pylance-release\n  * Remove unused reseng_lbclassic\n  * Dashboard: Added missing import for error handling\n  * RDS Aurora: fixed default DB Paramter group variable\n  * AWS Config: controller fixes\n  * IAM Controller: removed unused get_role function\n  * S3 Controller: empty bucket error message uses correct variable name\n\n7.2.0 (2020-07-14)\n------------------\n\n### Added\n\n- DeploymentPipeline that uses ``S3.Source`` will get more permissive access to the artifacts S3 Bucket to allow\n  this action to work.\n\n- DeploymentPipeline now supports ``ECR.Source`` and can be used directly with ``ECS.Deploy``.\n\n- Aurora support: RDSAurora and DBClusterParamaterGroup StackTemplates.\n\n- ASG has new `ssh_access` field to allow managing users and groups of SSH public key pairs on the instance.\n\n- GitHub.Source action with WebHook for sourcebuilddeploy-style CodePipeline\n\n- Initial ECS Capacity Provider support `asg.ecs.capacity_provider` (experimental)\n\n### Changed\n\n- ECR Repository has an `account` field instead of hard-coding to tools. If left blank\n  it assumes the same account as the environment.\n\n- Secrets can now be deployed to specific accounts using an `account` field.\n\n### Fixed\n\n- EC2LM configuration loading for ECS was causing the ecs agent to hang on freshly launched instances.\n\n\n7.1.1 (2020-06-23)\n------------------\n\n### Fixed\n\n- EC2 instances without ECS config failed trying to make launch script.\n\n\n7.1.0 (2020-06-22)\n------------------\n\n### Added\n\n- CodeCommit Users have a permission to grant either ReadWrite or ReadOnly to a repo.\n\n- Initial ECS Cluster support and ASG EC2LM for ECS.\n\n- New `resource.sns` controller and template. This allows provisioning of new \"location\"-style\n  SNS Topics and Subscriptions. Subscriptions have been split into their own resources, so that\n  they have access to the full set of Subscription properties.\n\n- CloudTrail logs in an S3 Bucket can now be CMK encrypted by KMS. Paco will create a single\n  key in the same account and region as the central S3 Bucket. The ``kms_users`` field for\n  CloudTrail can be used to grant IAM Users access to decrypt the log files.\n\n- Start of test suite for paco.cftemplates in paco.cftemplates.test package.\n\n### Changed\n\n- Service plug-ins are passed the model_obj of the config scope when they are initialized.\n\n- Lambda Paco Log Groups are supplied as a comma-seperated String to it's Environment Variable.\n\n- The PacoContext home attribute is now a pathlib.Path object.\n\n### Fixed\n\n- Starter Projects updated to use newer ASG rolling update syntax.\n\n\n7.0.0 (2020-05-09)\n------------------\n\n### Migration\n\n- AutoScalingGroups that use EC2 Launch Manager (EC2LM) features no longer store their cache id in the\n  UserData. Instead configuration changes to existing ASGs are updated using SSM Run Command. This\n  change will allow configuration changes to be made without cycling new instances in an ASG - for example,\n  a new metric can be added to a CloudWatch Agent and SSM Run Command will execute the ``ec2lm_launch_bundles``\n  on all of the instances.\n\n### Added\n\n- Paco Buckets: Paco can create it's own S3 Buckets for internal usage - one bucket for each account/region\n  combination. These can be used to hold CloudFormation templates and Lambda code artifacts.\n\n- New Paco command: ``paco lambda deploy <scope-to-lambda>`` that can update the code artifact for a\n  Lambda directly.\n\n- CIDR IPv6 support for SecurityGroups\n\n- SSM Agent is installed on all AutoScalingGroups unless ``launch_options.ssm_agent`` is explicitly set\n  to false\n\n- GitHub WebHook to CodePipeline if ``poll_for_source_changes`` is false for a GitHub.Source action.\n\n- Supoprt for RDS PostgreSQL\n\n- Support for SSM Documents with `resource/ssm.yaml`\n\n- EC2LM: Ubuntu 16 for EFS\n\n- Monitoring support for ElasticSearchDomain resources\n\n### Changed\n\n- Lambda resources can now use ``code.zipefile`` as a path to a local directory. Paco will zip that directory\n  contents and upload an artifact to a Paco Bucket and use that S3 location for the Lambda when it is initially\n  created. Any updates to the Lambda code artifact must then be applied using the ``paco lambda`` command.\n\n- AutoScalingGroup Stack now has a Parameter for ``MinInstancesInService``.\n\n- Troposphere dependency updated to 2.6.1 release which includes support for IoT Analytics Pipelines.\n\n6.2.0 (2020-04-04)\n------------------\n\n### Migration\n\n- ASG rolling_udpate_policy behaviour has been changed. The fields ``update_policy_max_batch_size`` and ``update_policy_min_instances_in_service``\n  have been removed and these settings are only controlled with the ``rolling_udpate_policy`` field.\n\n### Added\n\n- IoT support! IoT Core has new types for IoTPolicy and IoTTopicRule, IoT Analytics has an IoTAnalyticsPipeline.\n\n### Changed\n\n- All Paco warnings are now prefixed with a standard \"WARNING:\" and will only\n  be displayed if the -w, --warn flag is passed.\n\n- DeepDiff version required is 4.3.2. This version fixes the need to fiddle with deprecation\n  warning suppression.\n\n\n6.1.1 (2020-03-14)\n------------------\n\n### Added\n\n- Expanded the Stages/Actions for DeploymentPipeline to include S3.Deploy\n\n### Fixed\n\n- SLRoles template was not fully ported to StackTemplate API.\n\n- CodePipeline resource can be created in Service applications.\n\n\n6.1.0 (2020-03-09)\n------------------\n\n### Added\n\n- New Private PyPI Starter Project.\n\n\n6.0.1 (2020-03-08)\n------------------\n\n### Fixed\n\n- Removed ``{{['.gitignore']|join}}`` cookiecutter file that crept back in that breaks install on\n  filesystems that do not allow the | character.\n\n- ALB rule.target group fix was merged into wrong place in the code.\n\n- Restored StackOrders which wasn't being respected after refactor.\n\n6.0.0 (2020-03-06)\n------------------\n\n### Breaking\n\n- Consolidated the Paco work directories into a single ``.paco-work`` directory.\n  Documented them on a new Paco Internals doc page. To migrate an existing Paco project\n  to this new structure:\n\n      cd <my-paco-project>\n      git mv aimdata .paco-work\n      git mv Outputs .paco-work/outputs\n      git mv build .paco-work/build\n\n  Those commands assume you are using git to manage a Paco project. If you are, also update your ``.gitignore``\n  file to ignore .paco-work/build.\n\n- The IAM Roles for BackupVault had inconsistently named CloudFormation stacks (\"BackupVaults--Backup\").\n  A new IAM Role will be created in a new stack. The old stack will remain but it can be safely deleted.\n\n  There will be a stack UPDATE to the BackupVaults. Each AWS::Backup::BackupSelection resource will\n  have \"Selection: \" prefixed on the SelectionName, this will replace the old BackupSelection resources\n  with new ones using the new Role. The AWS CloudFormation documentation states that a BackupSelection's\n  SelectionName is a display name only, but this is incorrect.\n\n- Removed the ``Resource/NotificationGroups.yaml`` filename alias. This file is now only loaded using\n  the filename ``resoruce/snstopics.yaml``.\n\n- EventsRule type target field changed from a list of Targets to a list of IEventTarget objects. This allows\n  the ability to specify other information with the target such as the input_json field. Old was:\n\n    type: EventsRule\n    targets:\n      - paco.ref some.ref\n\n  The new format is:\n\n    type: EventsRule\n    targets:\n      - target: paco.ref some.ref\n        input_json: '{\"cat\":\"dog\"}'\n\n### Added\n\n- DeploymentPipeline can now use GitHub.Source as a source.\n\n- Integrated the Parliment library to lint/validate the IAM Policies used for all Roles.\n  https://github.com/duo-labs/parliament\n\n\n5.1.1 (2020-02-19)\n------------------\n\n### Fixed\n\n- Fixed security_group field for ElasticsearchDomain.\n\n\n5.1.0 (2020-02-19)\n------------------\n\n### Added\n\n- Ability to enforce that you need to be on a specific git branch to change a specific environment.\n  Documentation for this was added to a new Paco Workflows page.\n\n## Fixed\n\n- Added proper names to Elasticsearch output refs.\n\n5.0.1 (2020-02-17)\n------------------\n\n### Added\n\n- ASG has new field desirec_capacity_ignore_changes that can be set.\n\n### Fixed\n\n- If ignore_changes was set for a CloudFormation Parameter it was breaking the Confirm Changes CLI.\n\n\n5.0.0 (2020-02-17)\n------------------\n\n### Breaking\n\n- Breaking: Lamdba now creates it's Log Group in the CloudFormation. It also allows for additional\n  app-specific Log Groups. Lambda's execution role now restricts Log Group permissions to just the\n  Log Groups it needs.\n\n  If you have existing Lambdas, you will need to delete the Log Group and then re-provision the\n  Lambda (and ensrue the Lambda isn't invoked after the Log Group is deleted or it will re-create it).\n  This will allow the Lambda Log Groups to be under CloudFormation state.\n\n### Added\n\n- ServiceLinkedRoles for IAM. New IAM controller method ``add_service_linked_role`` which can be\n  used to add a SerivceLinkedRole.\n\n- ElasticsearchDomain resource.\n\n- Ability for a template Parameter to ignore_changes. If this is True then the Parameter will not\n  be changed during stack updates.\n\n- ASG has a new instance_ami_ignore_changes field which will mark the InstanceAMI Parameter with\n  ignore_changes.\n\n- EventRules can be in the State=ENABLED or State=DISABLED set by the ``enabled_state`` boolean field.\n\n### Changed\n\n- EventsRules are named with a random suffix instead of a prefix. This makes it easier to\n  use the --name-prefix option for list-rules in the AWS CLI and API.\n\n- New CFTemplate.create_output created that makes creating and registering outputs easier.\n\n4.0.0 (2020-02-05)\n------------------\n\n### Breaking\n\n- Breaking: This will change the secrets for any secret that was created by ``generate_secret_string``.\n\u00a0 Completed full implementation of ``secrets.generate_secret_string``, every property in the CloudFormation\n  resource is represented so that expressing defaults won't trigger new secret created.\n\n### Added\n\n- New ``warn_template_changes`` method for CFTemplate. This is a hook that allows\n  templates to print a warning about potential unintended side-effects of the change.\n  The SecretsManager template is the first to implement this warning hook.\n\n### Docs\n\n- Improved Getting Started documentation and \"paco init project\" CLI messages.\n\n3.5.5 (2020-01-29)\n------------------\n\n### Fixed\n\n- EFS resource can be in a disabled state.\n\n- EIP resource will be removed when disabled.\n\n- ALB resource properly removes ALB when disabled.\n\n- ASG resource is properly disabled.\n\n\n3.5.4 (2020-01-21)\n------------------\n\n### Added\n\n- CloudFrontCacheBehaviours have min_ttl and max_ttl field support.\n\n### Fixed\n\n- CodeCommit repositories policy refactor to work around maximum 10 policy per IAM User limit.\n\n\n3.5.3 (2020-01-16)\n------------------\n\n### Added\n\n- Warn if generated CloudFormation template reaches 80% or greater of the maximum stack size of 51,200 bytes.\n\n### Fixed\n\n- AWS Backup was missing group name in templates. Now creates a stack for every BackupVault.\n\n3.5.2 (2020-01-08)\n------------------\n\n### Fixed\n\n- `paco init project` creates the `.gitignore` after cookiecutter runs. This avoids having a | character\n  in the filename, which certain filsystems do not like.\n\n- Fixed bug where resource/s3.yaml buckets were being run twice on validate and provision.\n\n3.5.1 (2020-01-06)\n------------------\n\n### Fixed\n\n- Fix starter projects: check for aws_second_region in ``paco init project``.\n\n### Changed\n\n- Starter Projects paco-project-version brought up to 6.3.\n\n3.5.0 (2020-01-03)\n------------------\n\n### Added\n\n - Route 53 Health Checks support ip_address field.\n\n - Duplicate key errors in the YAML have a proper error message.\n\n - Docs have multi-account set-up page.\n\n### Changed\n\n- NetworkEnvironment networks can now be (almost) empty. This can be used for serverless environments\n  that do not need a network. The ``network:`` configuration still needs to exist, but only has to contain\n  the ``aws_account`` and ``enabled`` fields.\n\n- Removed Parameter.ending format for cfn-init parameters and Dashboard variables.\n  Instead simply including the ending in the paco.ref\n\n- cfn-init launch bundle sends cfn-signal after cfn-init finishes.\n\n- `paco provision account` provisions the accounts.\n\n### Fixed\n\n- If entire VPC is disabled for an ASG, the disabled ASG is removed.\n\n- DeploymentPipeline can be enabled/disabled without throwing errors.\n\n- Throw error if an account is missing an account_id.\n\n- Throw error if .credentials file is missing before asking for MFA.\n\n- cfn-init uses proper base path for Amazon Linux which has cfn-init pre-installed in /opt/aws.\n\n- log group expire_events_after_days can be left blank for log_set and log_group without throwing error.\n\n- Route 53 Record Set stack for an ALB is provisioned in the same account that Route53 is in.\n\n- DeploymentPipeline no longer hard-codes to a 'data' account for CodeCommit principle,\n  and instead uses the actual account(s) that CodeCommit repo's use.\n\n- Alarm notifications that do not come from plug-in work again.\n\n- Clean-up for wordpress-single-tier starting template.\n\n- Create ~/.aws/cli/cache directory if it doesn't already exist.\n\n- LogAlarms were incorrectly getting a Resource Dimension added to them.\n\n\n3.4.1 (2019-12-04)\n------------------\n\n### Fixed\n\n- Include paco.cookiecutters data files in paco-cloud distribution.\n\n\n3.4.0 (2019-12-03)\n------------------\n\n### Added\n\n- New CloudWatch Dashboard resource.\n\n- Route53 Health Check supports domain_name or load_balancer fields.\n\n### Fixed\n\n- include paco.stack_grps package!\n\n- Route53 Health Check alarm gets Namespace again.\n\n### Changed\n\n- Final AIM --> Paco rename: Log metric namespace changed from `AIM/` to `Paco/`\n\n3.3.1 (2019-11-29)\n------------------\n\n### Fixed\n\n- Placeholder in the wordpress-single-tier template for AMI Id.\n\n- Assorted fixes created by the AIM to paco rename.\n\n- ALB AWS::ElasticLoadBalancingV2::ListenerCertificate are restored.\n\n- Fixed Zone reference lookups in Route53 stack group.\n\n### Docs\n\n- Overview page works on mobile.\n\n3.3.0 (2019-11-28)\n------------------\n\n### Changed\n\n- Changed dependency from `aim.models` to `paco.models`\n\n- Renamed all things `aim` to `paco`.\n\n\n3.2.0 (2019-11-27)\n------------------\n\n- AIM has been renamed to Paco: Prescribed automation for cloud orchestration.\n  The CLI is now `paco` with a PACO_HOME environment variables. The\n  PyPI package is at `paco-cloud`.\n\n- AWS Backup service is supported by paco. Create BackupVaults with BackupPlans and BackupSelections.\n\n\n3.1.0 (2019-11-06)\n------------------\n\n### Added\n\n- DBParameterGroups template.\n\n- LogGroups template adds MetricFilters if present.\n\n- Respect the `global_role_names` field for the IAM Role RoleName.\n\n- Alarms can be provisioned at the Application level without being specific to a Resoure context.\n\n- Route53HealthChecks can be provisioned. These are global resources with the application region\n  suffixed to the health check name. The CloudFormation template and CLoudWatch Alarm are provisioned\n  in us-east-1, as that is where the metrics are hard-coded to by AWS.\n\n- Lambda template will grant Lambda permissions to an Events Rule in the same application that\n  references it as a Target.\n\n- New Events Rule template.\n\n- Added change_protected support to Cloudfront, IAM Managed Policies, and IAM Role templates.\n\n- Added a CodeBuild IAM Permission for IAM Users\n\n- Added the EIP Application Resource and a support 'eip' field to the ASG resource for associating an EIP with a single instance ASG.\n\n- Added `cftemplate_iam_user_delegates_2019_10_02` legacy flag to make user delegate role stack names consistent with others.\n\n- Added support to allow ASG to launch into a single subnet.\n\n- Added ResourceGroupid to the ElastiCache Application Resource\n\n- Added caching to instance AMI ID function.ref lookups.\n\n- Added swap, wget installer, and get tag value helper functions to the EC2 Launch manager and moved all of its scripts to a separate file that is copied from S3 and executed.\n\n- Added VPC Associations to the VPC private hosted zone.\n\n- Added VpcConfig to the Lambda function cftemplate.\n\n- Added `secrets_manager` to Network Environments.\n\n- Added support for !Ref and !Sub to yaml.py\n\n- Added a 'Nested StackGroup' feature to StackGroups. This allows us to nest a StackGroup in the place of a Stack within a StackGroup. This was needed to allow Route53 RecordSets to be created in order, but to allow a different Stack name from the current StackGroup being populated.\n\n- Added the Route53RecordSet CFTemplate and ctl_route53.add_record_set() method.\n\n- Added the EBS Application Resources.\n  Added `ebs_volume_mounts` to IASG to mount volumes to single instance groups.\n  Added the EBS Launch Bundle to implement `ebs_volume_mounts`\n\n### Changed\n\n- Fixed bug where if a AssumeRolePolicyDocument has both `service` and `aws` fields for the Principal,\n  the `aws` field was ignored.\n\n- Improvements to the CLI. Verbose flag is now respected.\n  Yes/no questions are consistent and can be answered with 'y', 'n', 'yes' or 'no'.\n  Clean-up to formatting. Only prompt for provision changes when running the provision\n  sub-command.\n\n- ALB Alarms now provision with an `LBApplication` suffix and match the Resoruce.type field.\n\n- Made IAM Users default password more complex to satisfy password contraints.\n\n- Updated some of the cookiecutter templates for `aim init project`.\n\n- Ported the Route53 CFTemplate to troposphere and separated zones into their own stacks.\n  Added the legacy flag `route53_hosted_zone_2019_10_12` for this change.\n\n- Cleaned up expired token handling in Stack() by consolidating duplicate code into a single method.\n\n- Refactor of EC2 Launch Manager user data script management. Common functions are now stored in S3 to reduce user data size.\n\n- Modifed LogGroup names to include the Network Environment name.\n\n- Refactored how Route53 RecordSets are being created. The previous design created RecordSets right in the resource's template. The new design uses the Route53 Controller to create RecordSets in their own stack using an account global name . The reason is that CloudFormation does not allow you to modify RecordSets unless you are modifying the stack that created it. This made it impossible to move DNS between resources without first deleting the record and recreating it. With a global controller, we can simple rewrite the RecordSets to new values.\n  Added `route53_record_set_2019_10_16` legacy flag to deal with pre-existing RecordSets\n\n- Moved app_engine.get_stack_from_ref to StackGroup\n\n### Fixed\n\n- Fixed a couple of AWS token expiry retries from failing.\n\n- AWS session caching was not properly caching.\n\n- NotificationGroups controller was not setting up refs correctly, nor resolving them correctly.\n\n3.0.0 (2019-09-27)\n------------------\n\n### Added\n\n- New directory `aimdata` is created within an AIM Project by paco. This is used to record state\n  of AIM provisioning. CloudFormation templates used to create stacks in AWS are cached as well\n  as the last copy of the AIM Project YAML files. These files are used to speed up subsequent\n  runs and more importantly can show you what is changed between AIM runs to make it easier to\n  review new changes before they are actaully made to AWS.\n\n- CLI: Display a diff of changes from last AIM run and new run in the AIM Project YAML configuration.\n  The `-d`, `--disable-validation` flag can be used to\n\n- CLI: Display changes and ask for verification before updating CF templates. This can be disabled\n  with the `-y` flag.\n\n- CLI: Offer to delete a stack in a CREATE FAILED state so that a new stack can be provisioned in it's place.\n\n- AWS credentials can now be set to live for up to 12 hours. You can set the .credentials field to\n `mfa_session_expiry_secs: 43200 # 12 hours` to enable this. The default is still one hour.\n\n- Resources with the `change_protected` flag set to true will not have their CloudFormation stacks\n  updated.\n\n- API Gateway REST API can now have models, methods and stages. It supports Lambda integration\n  with either 'AWS_PROXY' via an assumed Role or 'AWS' via a Lambda Permission.\n\n- S3Bucket has NotificationConfiguration for Lambdas. Lambda will detect if an S3Bucket within the\n  same application notifies the lambda and will automatically add a Lambda permission to allow S3 to\n  invoke the lambda.\n\n- Lambda AWS::SNS::Subscription resources now have a Region property.\n\n- CloudWatchAlarms template has a `notification_region` class attribute that can be set if\n  notificationgroup subscriptions need to go to a single region.\n\n- CloudFront has Origin ID support.\n\n- EFS Resource support.\n\n### Changed\n\n- Breaking! CF Template names have been\u00a0refactored so that they are more user friendly when listed in the\n  AWS Console. This requires deletion and reprovisioning of AWS resources. Templates now have new\n  consistent ways to create their names, so this should be the last time this change happens.\n\n- CLI: References to NetworkEnvironments now use consistent `paco.ref` syntax, e.g.\n  `aim provision netenv <ne>.<env>.<region>`\n\n- All stacks are created with Termination Protection set.\n\n- CF template base class `paco.cftemplates.cftemplates.CFTemplate` has new methods for creating consistent\n  AWS names: `create_resource_name()`, `create_resoruce_name_join()`, `create_cfn_logical_id()`,\n  and `create_cfn_logical_id_join()`.\n\n- Console messages reworked to show relevant information in columns.\n\n- CF template base class method `gen_parameter` renamed to `create_cfn_parameter`.\n\n- S3 controller now relies on the bucket name to come from the S3Bucket model object.\n\n- Lambda code.s3_bucket field can now be an paco.ref or a plain bucket name.\n\n- You can provision without specifying the region and it will include all regions in an env.\n\n- NotificationGroups are loaded from project['resource']['notificationgroups']\n\n### Fixed\n\n- CloudTrail generates it's own CloudWatch LogGroup if needed. Outputs for CloudTrail and CloudWatch LogGroup.\n\n- APIGateway, SNSTopics and Lambda now respect the `enabled` field.\n\n2.0.0 (2019-08-26)\n------------------\n\n### Fixed\n\n- snstopic output ref and lambda alarm ref fixes.\n\n- Added IAM Users feature for creating IAM Users and configuring console access\n  assigning permissions, and access keys.\n\n### Added\n\n- Moved aim reference generation into the Model. Model objects now have .paco_ref and\n  .paco_ref_parts properties which contain their paco.ref reference.\n\n- Added StackOutputsManger(). This now creates and maintains $AIM_HOME/ResourceMap.yaml\n  which will include a complete list of all stack outputs that are referenced using the\n  yaml dictionary path of the resource.\n\n- ALB Outputs includes TargetGroup Fullname.\n\n- Minimal APIGatewayRestApi template.\n\n- Added external_resource support to the ACM\n\n- Added ReadOnly support to the Administrator IAMUserPermission\n\n### Changed\n\n- Automated CloudFront Parameter lists for things like security group and target arn lists.\n\n- Consolidated CFTemplates and Stack's and other Stack cleanups.\n\n- CloudWatch Alarms multi-Dimension Alarms now expect an paco.ref. CloudWatch Alarms are now Troposphere.\n\n\n1.4.0 (2019-08-21)\n------------------\n\n### Added\n\n- CloudTrail resource adds basic CloudTrail provisioning.\n\n- LogGroups are created for all groups that the CloudWatch Agent will require.\n  Uses the new Logging schema in paco.models.\n\n- Added CloudFront application Resource\n\n- Added VPC Peering application resource.\n\n- Automated the glue of passing outputs from a stack to the parameter of another stack.\n\n1.3.1 (2019-08-07)\n------------------\n\n### Fixed\n\n- Python packaging, also include version.txt.\n\n\n1.3.0 (2019-08-07)\n------------------\n\n### Changed\n\n- CloudWatchAlarms now check for namespace and dimesions fields, that\n  can be used to override the default of one primary dimension and the resource_name.\n\n### Fixed\n\n- Python dist did not include README.md and CHANGELOG.md\n\n1.2.0 (2019-08-06)\n------------------\n\n### Added\n\n- Deleting resources can leave dangling CloudFormation templates in your\n  account. Controllers for NetworkEnvironments now keep track of templates\n  they've provisioned and warn you about unused templates.\n\n- NotificationGroups can be provisioned as SNS Topics and subscriptions.\n  Use ``aim provision notificationgroups``.\n\n- CloudWatch Alarm descriptions are JSON with metadata about the environment,\n  region, application, resource group and resource that the alarm is for.\n\n- CloudWatch Alarms will not notify the SNS Topics that they are subscribed to.\n\n- Rewrote commands with consistent way of passing arguments to controllers.\n  Controllers args can now be all lower case.\n\n- Added Account initialization to 'aim init project'.\n\n### Changed\n\n - AIM references have a new format! It's simpler and more consistent.\n   Every ref now starts with ``paco.ref ``.\n\n - Created ``paco.utils`` to clean up PacoContext object.\n\n1.1.0 (2019-07-24)\n------------------\n\n### Added\n\n- Logging functionality added to monitoring. Logs will be ingested by a configured\n  CloudWatch Agent and sent to a CloudWatch Log Group.\n\n- Added --nocache to cli to force updates to stacks.\n\n- CLI reports human readable validation errors from AIM project configuration files\n\n- \"aim ftest\" command added to run functional tests on the \"aim init project\"\n  templates. This command will be expanded in the future so you can test your\n  own aim projects.\n\n- Resources/S3.yaml is now functional: eg. aim validate S3\n\n- Added Region to cftemplates so we can do inline replace of <account> and <region>.\n\n- Added LambdaPermission and CWEventRule cftemplates.\n\n- Added CloudWatchController and LambdaController.\n\n### Fixed\n\n - cookiecutter generated .credentials file was not in git repo as, the cookiecutter\n   .gitignore file was causing it to be ignored.\n\n\n1.0.0 (2019-07-06)\n------------------\n\n### Added\n\n- Initial documentation with AIM project site at https://paco.waterbear.cloud/en/latest/\n\n- Added init command with ability to create starting templates for AIM projects\n  with the cookiecutter project under the hood.\n\n- Added redirect to Listner rules in the ALB\n\n### Changed\n\n- Document and refactor AIM CLI.\n\n- Moved yaml.py to paco.core\n\n- Refactored S3 Controller\n\n- Ported Route53 config to the model\n\n- Ported CodeCommit config to the model\n\n- Refactored S3 to use Application StackGroup\n\n- CPBD artifacts s3 bucket now uses S3 Resource in NetEnv yaml instead\n\n- Converted the ALB's listener and listener rules to dicts from lists\n\n### Removed\n\n- Removed deprecated configuration\n\n\n0.6.0 (2019-06-21)\n-----------------------\n\n- Document and clean-up AIM CLI\n\n- Validate and Provision functioning after cleanup\n\n\n0.5.0 (2019-06-21)\n------------------\n\n- First open source release\n\n\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Paco: Prescribed automation for cloud orchestration",
    "version": "9.3.45",
    "project_urls": {
        "Homepage": "https://github.com/waterbear-cloud/paco"
    },
    "split_keywords": [
        "aws",
        " waterbear",
        " cloud",
        " infrastructure as code",
        " cloudformation"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "5dc76409c6196d04b4dd059b3cab4c778fd166113c0b7c9d20e1a72d7b4408aa",
                "md5": "a95a537d5206b3d88f4039b228f39be5",
                "sha256": "021a738e8b082b40ce79149cd242eac4218feefb9a741d979bdc59e811e0b08d"
            },
            "downloads": -1,
            "filename": "paco_cloud-9.3.45-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "a95a537d5206b3d88f4039b228f39be5",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": null,
            "size": 487815,
            "upload_time": "2024-04-08T19:35:56",
            "upload_time_iso_8601": "2024-04-08T19:35:56.986984Z",
            "url": "https://files.pythonhosted.org/packages/5d/c7/6409c6196d04b4dd059b3cab4c778fd166113c0b7c9d20e1a72d7b4408aa/paco_cloud-9.3.45-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-04-08 19:35:56",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "waterbear-cloud",
    "github_project": "paco",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "paco-cloud"
}
        
Elapsed time: 0.69082s