Reputation: 181
Context, I have a CDK app with two stacks using the following setup:
Stack_A:
StateMachine_A
Lambda_A
S3Bucket_A
IAMRole_A
Stack_B:
StateMachine_B
SageMakerTrainJob_B
IAMRole_B
StateMachine_A runs Lambda_A using execution role IAMRole_A. A separate step in StateMachine_A writes data to S3Bucket_A. StateMachine_B runs SageMakerTrainJob_B using execution role IAMRole_B. Lambda_A's purpose is to start execution of StateMachine_B, whose SageMakerTrainJob_B needs to read from S3Bucket_A. Therefore, we have to configure the following permissions:
We tried to model this in CDK by creating a direct dependency in Stack_B on Stack_A, using references to IAMRole_A and S3Bucket_A within Stack_B's definition to grant the needed permissions in code. However, this generated the following error:
Error: 'Stack_B' depends on 'Stack_A' (dependency added using stack.addDependency()). Adding this dependency (Stack_A -> Stack_B/IAMRole_B/Resource.Arn) would create a cyclic reference.
Likewise, trying to model the dependency in the other direction gave the same error:
Error: 'Stack_A' depends on 'Stack_B' (dependency added using stack.addDependency()). Adding this dependency (Stack_B -> Stack_A/S3Bucket_A/Resource.Arn) would create a cyclic reference.
Is there any way around this using code dependencies? Are there any recommended best practices for situations like this? Some options we've considered include:
Also , I see there were similar-sounding issues during CDK development with CodeCommit/CodePipeline and APIGateway/Lambda. Is this a related bug, or are we just trying to do something that's not supported?
Upvotes: 18
Views: 32132
Reputation: 2498
got that effect allowing a service_role in a codebuild stack to use a kms_key to create a (cutom) encrypted codecommit-repo.
role_name: str = 'codebuild-create_repo-run'
service_role = aws_iam.Role(self, 'CodebuildCreateRepoServiceRole',
assumed_by=aws_iam.ServicePrincipal('codebuild.amazonaws.com'),
role_name=role_name)
from that i tried to add that role to my kms_key using kms_key.add_to_resource_policy
but that failed with circular dependency, if I directly use the role:
kms_key.add_to_resource_policy(
aws_iam.PolicyStatement(effect=aws_iam.Effect.ALLOW,
principals=[service_role],
actions=['kms:Encrypt',
'kms:GenerateDataKey'],
resources=['*']))`
in the end i was forced to rebuild the principal-arn in that way:
role_principal = aws_iam.ArnPrincipal(f'arn:aws:iam::{os.environ.get('CDK_DEFAULT_ACCOUNT')}:role/{role_name}')
kms_key_config.kms_key_business.add_to_resource_policy(
aws_iam.PolicyStatement(effect=aws_iam.Effect.ALLOW,
principals=[role_principal],
actions=['kms:Encrypt',
'kms:GenerateDataKey'],
resources=['*']))
Upvotes: 0
Reputation: 8887
Circular references are always tricky. This isn't a problem that is unique to the CDK. As you explain the problem logically you see where things start to break down. CloudFormation must create any resources that another resource depends on before it can create the dependent resource. There isn't a one solution fits all approach to this, but I'll give some ideas that work.
Upvotes: 19
Reputation: 23
In addition to the guidelines by Jason, I'd like to mention a fourth option:
You can also try to decouple the two stacks by moving more towards an event driven architecture. While you can't resolve the dependency of IAMRole_B needs read permissions on S3Bucket_A
in this example, you can resolve the dependency IAMRole_A needs startExecution permissions on StateMachine_B
. Stack A could introduce an EventBridge where StateMachine_A raises an event as soon as it is finished. StateMachine_B can subscribe to this event and start as soon as it has been risen. The stacks would look like the following:
Stack_A:
StateMachine_A
Event_A
S3Bucket_A
IAMRole_A
Stack_B:
StateMachine_B
SageMakerTrainJob_B
IAMRole_B
You would still have two dependencies:
Upvotes: 1