Skip to main content
Glama

aws_cloudformation

Deploy, update, or delete AWS CloudFormation stacks through MCP SysOperator by specifying actions, regions, templates, and parameters for efficient infrastructure management.

Instructions

Manage AWS CloudFormation stacks

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
actionYes
capabilitiesNo
parametersNo
regionYes
stackNameNo
tagsNo
templateBodyNo
templateUrlNo

Implementation Reference

  • Main handler function for the 'aws_cloudformation' tool. Dynamically generates an Ansible playbook for CloudFormation operations (list, create, update, delete) based on input parameters and executes it.
    export async function cloudFormationOperations(args: CloudFormationOptions): Promise<string> { await verifyAwsCredentials(); const { action, region, stackName, templateBody, templateUrl, parameters, capabilities, tags } = args; const tempFiles: { filename: string, content: string }[] = []; let templateParam = ''; if (templateBody) { // Prepare template body to be written to a temp file tempFiles.push({ filename: 'template.cfn', content: templateBody }); templateParam = 'template: "template.cfn"'; // Reference the temp file name } else if (templateUrl) { templateParam = `template_url: "${templateUrl}"`; } else if (action === 'create' || action === 'update') { // Template is required for create/update throw new AnsibleError('Either templateBody or templateUrl must be provided for CloudFormation create/update actions.'); } let playbookContent = `--- - name: AWS CloudFormation ${action} operation hosts: localhost connection: local gather_facts: no tasks:`; switch (action) { case 'list': playbookContent += ` - name: List CloudFormation stacks amazon.aws.cloudformation_info: region: "${region}" register: cfn_info - name: Display stacks debug: var: cfn_info.stacks`; break; case 'create': case 'update': playbookContent += ` - name: ${action === 'create' ? 'Create' : 'Update'} CloudFormation stack amazon.aws.cloudformation: region: "${region}" stack_name: "${stackName}" state: present ${templateParam} # Use the determined template parameter ${formatYamlParams({ template_parameters: parameters, capabilities, tags })} register: cfn_result - name: Display stack outputs/result debug: var: cfn_result`; break; case 'delete': playbookContent += ` - name: Delete CloudFormation stack amazon.aws.cloudformation: region: "${region}" stack_name: "${stackName}" state: absent register: cfn_delete - name: Display deletion result debug: var: cfn_delete`; break; default: throw new AnsibleError(`Unsupported CloudFormation action: ${action}`); } // Execute the generated playbook, passing template body if needed return executeAwsPlaybook(`cloudformation-${action}`, playbookContent, '', tempFiles); }
  • Zod schema definition for 'aws_cloudformation' tool inputs, including CloudFormationActionEnum and CloudFormationSchema used for validation.
    export const CloudFormationActionEnum = z.enum(['list', 'create', 'update', 'delete']); export type CloudFormationAction = z.infer<typeof CloudFormationActionEnum>; export const IAMActionEnum = z.enum(['list_roles', 'list_policies', 'create_role', 'create_policy', 'delete_role', 'delete_policy']); export type IAMAction = z.infer<typeof IAMActionEnum>; export const RDSActionEnum = z.enum(['list', 'create', 'delete', 'start', 'stop']); export type RDSAction = z.infer<typeof RDSActionEnum>; export const Route53ActionEnum = z.enum(['list_zones', 'list_records', 'create_zone', 'create_record', 'delete_record', 'delete_zone']); export type Route53Action = z.infer<typeof Route53ActionEnum>; export const ELBActionEnum = z.enum(['list', 'create', 'delete']); export type ELBAction = z.infer<typeof ELBActionEnum>; export const LambdaActionEnum = z.enum(['list', 'create', 'update', 'delete', 'invoke']); export type LambdaAction = z.infer<typeof LambdaActionEnum>; // AWS EC2 Schema export const EC2InstanceSchema = z.object({ action: EC2InstanceActionEnum, region: z.string().min(1, 'AWS region is required'), instanceIds: z.array(z.string()).optional(), filters: z.record(z.any()).optional(), instanceType: z.string().optional(), imageId: z.string().optional(), keyName: z.string().optional(), securityGroups: z.array(z.string()).optional(), userData: z.string().optional(), count: z.number().optional(), tags: z.record(z.string()).optional(), waitForCompletion: z.boolean().optional().default(true), terminationProtection: z.boolean().optional() }); export type EC2InstanceOptions = z.infer<typeof EC2InstanceSchema>; // AWS S3 Schema export const S3Schema = z.object({ action: S3ActionEnum, region: z.string().min(1, 'AWS region is required'), bucket: z.string().optional(), objectKey: z.string().optional(), localPath: z.string().optional(), acl: z.string().optional(), tags: z.record(z.string()).optional(), metadata: z.record(z.string()).optional(), contentType: z.string().optional() }); export type S3Options = z.infer<typeof S3Schema>; // AWS VPC Schema export const VPCSchema = z.object({ action: VPCActionEnum, region: z.string().min(1, 'AWS region is required'), vpcId: z.string().optional(), cidrBlock: z.string().optional(), name: z.string().optional(), dnsSupport: z.boolean().optional(), dnsHostnames: z.boolean().optional(), tags: z.record(z.string()).optional(), subnets: z.array(z.object({ cidr: z.string(), az: z.string().optional(), tags: z.record(z.string()).optional() })).optional() }); export type VPCOptions = z.infer<typeof VPCSchema>; // AWS CloudFormation Schema export const CloudFormationSchema = z.object({ action: CloudFormationActionEnum, region: z.string().min(1, 'AWS region is required'), stackName: z.string().optional(), templateBody: z.string().optional(), templateUrl: z.string().optional(), parameters: z.record(z.any()).optional(), capabilities: z.array(z.string()).optional(), tags: z.record(z.string()).optional() }); export type CloudFormationOptions = z.infer<typeof CloudFormationSchema>;
  • Tool registration in the toolDefinitions map, linking name 'aws_cloudformation' to its description, schema, and handler.
    aws_cloudformation: { description: 'Manage AWS CloudFormation stacks', schema: aws.CloudFormationSchema, handler: aws.cloudFormationOperations, },
  • Shared helper function executeAwsPlaybook used by aws_cloudformation (and other AWS tools) to execute the dynamically generated Ansible playbook in a temporary directory, handling temp file creation, execution, and cleanup.
    async function executeAwsPlaybook( operationName: string, playbookContent: string, extraParams: string = '', tempFiles: { filename: string, content: string }[] = [] // For additional files like templates, policies ): Promise<string> { let tempDir: string | undefined; try { // Create a unique temporary directory tempDir = await createTempDirectory(`ansible-aws-${operationName}`); // Write the main playbook file const playbookPath = await writeTempFile(tempDir, 'playbook.yml', playbookContent); // Write any additional temporary files for (const file of tempFiles) { await writeTempFile(tempDir, file.filename, file.content); } // Build the command const command = `ansible-playbook ${playbookPath} ${extraParams}`; console.error(`Executing: ${command}`); // Execute the playbook asynchronously const { stdout, stderr } = await execAsync(command); // Return stdout, or a success message if stdout is empty return stdout || `${operationName} completed successfully (no output).`; } catch (error: any) { // Handle execution errors const errorMessage = error.stderr || error.message || 'Unknown error'; throw new AnsibleExecutionError(`Ansible execution failed for ${operationName}: ${errorMessage}`, error.stderr); } finally { // Ensure cleanup happens even if errors occur if (tempDir) { await cleanupTempDirectory(tempDir); } } }

Other Tools

Related Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/tarnover/mcp-sysoperator'

If you have feedback or need assistance with the MCP directory API, please join our Discord server