

AWS CloudFormation Time Bomb Detector
source link: https://mechanicalrock.github.io/2021/03/24/botocore-deprecation.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

AWS CloudFormation Time Bomb Detector
Mar 24, 2021 • Tim Myerscough
Tags: aws cloudformation botocoreDo you use Python CustomResources in your CloudFormation stacks?
If so, you need to act before 01 April 2021.
What is the Issue?
You may have already received correspondence directly from AWS but here’s your final reminder that if you use Python for CloudFormation Lambda backed CustomResources, then you may need to act before 01 April 2021.
Starting on 01 April 2021, AWS Lambda will no longer support the botocore.vendored.requests
library in Python runtimes.
Any AWS CloudFormation stacks that use the Python runtime for Lambda-backed Custom Resources must be updated to ensure you can continue to maintain your cloud infrastructure. If you do not act now, after 01 April 2021 you will no longer be able to create, update or delete those custom resources.
Why is this happening?
For more information on the background to the change, please see the referenced blog post
Am I affected?
Any CloudFormation stacks containing Python-based custom resources must be updated before 01 April 2021.
Using CloudFormation across your AWS estate means this is not a trivial issue.
We have developed a command line tool to help you identify any impacted resources across your estate.
How do I fix it?
We have worked examples in the tool readme
What you must do depends on how you have packaged your custom resources:
- If you reference
cfn-response
implicitly using inline code using ZipFile: then you need to perform a change to trigger an update (see this link for an example) - If you package your Lambda using S3 and manage the cfn-response module yourself, e.g. using AWS SAM, then you must update the cfn-response module to the latest available code
Help!
If you need assistance, please get in touch!
Recommend
-
12
Quantum Bomb Detector Detectors 11 Feb 2017 The Elitzur-Vaidman bomb tester is one of the funnest quantum devices to teach peopl...
-
14
15 Hours with AWS CloudFormationCoding a serverless NAT puncher in AWS CloudFormation — a narrated description of a real-world serverless configuration
-
10
Getting Started with AWS CloudFormationContinuous deployment is an important part in today’s software development loop. We want to ship the latest version of our software in no time to provide our users with the newest features or bugfixes. T...
-
25
Scan for AWS CloudFormation misconfigurations with Snyk IaC
-
8
AWS CloudFormation example for S3 bucket Typical Cloudformation for an S3 bucket with block all public access enabled: Resources: S3BucketExample: Type: AWS::S3::Bucket Properties: BucketName: s3-...
-
11
Deploying more than just a handful of services on AWS and setting each one up manually can get quite tedious. Having to configure each AWS resource by hand also leaves you at a much higher risk of making errors or introducing inconsistencies....
-
6
Do not use AWS CloudFormation. Several years ago I actually cared…Several years ago I actually cared about the differences between AWS CloudFormation and Terraform. Namely, that Terraform did not provide
-
19
In the previous post, you learnt how to deploy a basic Dockerized Spring Boot application to AWS Fargate. Wouldn’t it be great if this manual configuration could be provisioned from a plain text file which can be part of your version control...
-
4
🐳 MEAN-Stack CloudFormation (2 Part Series) In this short article I will show how to deploy a Mean-Stack app by AWS-CLI and CloudFormation using a v1 load-...
-
13
AWS CloudFormation - when to use !Ref vs !GetAtt? When using AWS CloudFormation and the intrinsic function!GetAtt, the behaviour you expect might not always work. A comm...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK