Deployment Issues with Cross Stack Dependencies and the CDK

This content is more than 4 years old and the cloud moves fast so some information may be slightly out of date.

Introduction

Today I’m going to share with you a problem I encountered when working with the CDK and cross-stack-references. Just sharing problems wouldn’t be particularly useful though, so I’m going to show you how to solve the problem as well.

Setup

We start with a fairly simple setup with two stacks. Stack 1 is called Exporting Stack and creates two IAM-Roles:

class ExportingStack(core.Stack):

    exported_role_a: iam.Role
    exported_role_b: iam.Role

    def __init__(self, scope: core.Construct, id: str, **kwargs) -> None:
        super().__init__(scope, id, **kwargs)

        self.exported_role_a = iam.Role(
            self,
            "exporting-role-a",
            assumed_by=iam.ServicePrincipal("ec2.amazonaws.com")
        )

        self.exported_role_b = iam.Role(
            self,
            "exporting-role-b",
            assumed_by=iam.ServicePrincipal("ec2.amazonaws.com")
        )

The second stack is the importing stack, which creates an S3 bucket with a bucket policy that references these roles.

class ImportingStack(core.Stack):

    def __init__(
        self,
        scope: core.Construct,
        id: str,
        role_a: iam.Role,
        role_b: iam.Role,
        **kwargs
    ) -> None:
        super().__init__(scope, id, **kwargs)

        test_bucket = s3.Bucket(
            self,
            "some-bucket",
            removal_policy=core.RemovalPolicy.DESTROY
        )

        test_bucket.add_to_resource_policy(
            iam.PolicyStatement(
                actions=["s3:GetObject"],
                principals=[
                    role_a,
                    role_b
                ],
                resources=[
                    test_bucket.arn_for_objects("*"),
                    test_bucket.bucket_arn
                ]
            )
        )

Both stacks are initialized like this:

app = core.App()
export = ExportingStack(app, "export")

ImportingStack(
    app,
    "import",
    role_a=export.exported_role_a,
    role_b=export.exported_role_b
)

The initial deployment of these stacks works exactly as you’d expect. CDK recognizes, that there is a dependency between the two stacks and creates the exporting stack first. The exporting stack exports the ARNs of the two roles it creates. Afterwards the CDK deploys the importing stack, which makes use of the exports from the first stack using the Fn::ImportValue intrinsic function in CloudFormation to create the bucket with the bucket policy that references those two ARNs. This creates a hard dependency between the two stacks - the exporting stack may not change the value of the export, i.e. the ARN as long as other stacks import that value.

Initial Deployment

The architecture we have deployed with the CDK looks like this.

Architecture

Problem

Now that we’ve set up the basic infrastructure, we’re going to create problems for ourselves. Suppose Role B no longer needs to access the S3-Bucket and because of that we remove it from the policy. The new policy statement in the importing stack looks like this with role_b commented out:

test_bucket.add_to_resource_policy(
    iam.PolicyStatement(
        actions=["s3:GetObject"],
        principals=[
            role_a,
            # role_b
        ],
        resources=[
            test_bucket.arn_for_objects("*"),
            test_bucket.bucket_arn
        ]
    )
)

In theory this is great and a cdk synth won’t show any errors. The problem arises, when we try to deploy the change:

Update Deployment

As you can see, we’re getting this error message:

Export export:ExportsOutputFnGetAttexportingroleb66286D65ArnE09A9A52 cannot be deleted as it is in use by import

Now that’s strange. We’ve just removed that dependency, so why are we getting an error here? Well, if we take a look at the deployment process again, we can see, that the CDK still recognizes a dependency between both stacks and deploys the exporting stack first and the importing stack last. This is correct as we still have a second dependency with role_a here.

The problem is, that the CDK noticed, that the importing stack no longer needs the import value for the role arn of role_b. As a result of which, the CDK has removed the export from the exporting stack. So the template that the CDK generates for the exporting stack no longer contains the export.

Since the CDK deploys the exporting stack first, CloudFormation tries to remove the export before the importing stack has removed the Fn::ImportValue call and that’s not permitted.

Solution

To solve this problem, we can create the output with the export for the exporting stack manually. We just need to make sure that our ids and values match those of the existing stack and we can see and extract those from the CloudFormation console.

Initial Deployment

Adding a new Output to the exporting stack is easy as well. Note, that I used the override_logical_id function to explicitly set the logical id of the output to the one CDK has generated for us.

compat_output = core.CfnOutput(
    self,
    id="will-be-overwritten",
    value=f"arn:aws:iam::{core.Aws.ACCOUNT_ID}:role/export-exportingroleb66286D65-CZGEAEVHHA32",
    export_name="export:ExportsOutputFnGetAttexportingroleb66286D65ArnE09A9A52"
)
compat_output.override_logical_id("ExportsOutputFnGetAttexportingroleb66286D65ArnE09A9A52")

If we now deploy our changes after the explicit export has been added, we can see that the deployment succeeds.

Workaround Deployment

Now we’re in a position, where the importing stack no longer references the export from the exporting stack, but the exporting stack still contains the export because we explicitly defined it. Since we no longer need it, we can remove the explicit export from the code and deploy again. Afterwards we should be in a state where there is exactly one export and one import value.

Fix Deployment

Conclusion

In this post I’ve shown you one of the chicken and egg problems with cross-stack-depedencies in CloudFormation. The CDK makes cross-stack-dependencies a lot easier and I really like that it aims to abstract away dealing with outputs/exports and import value statements. It mostly does a great job at that, but it’s a leaky abstraction (just like almost any abstraction we build). Now you know how to work around those leaks.

You can find the code and everything I referenced here on Github

Thank you for investing so much of your valuable time in reading this till the end - if you have feedback, questions or suggestions feel free to reach out to me on Twitter or any of the other social media channels mentioned in my bio below.

Similar Posts You Might Enjoy

Building a static website with Hugo and the CDK

Building a static website with Hugo and the CDK If you ever wanted to host your personal website or blog on AWS this article is right for you. We’re going to build a static website with Hugo, CodeBuild and CodePipeline and host it using CloudFront and S3. We will set up everything you need to build and deploy new versions of the Website. - by Maurice Borgmeier

Building a Fargate-based container app with Cognito Authentication

In this post I’m going to show you how to use Cognito User Authentication in combination with a Docker app running in Fargate behind an Application Load Balancer and we’re going to build all this with the Cloud Development Kit (CDK). Why would you want to use this? You’re running your web application inside a docker container and don’t want to deal with user authentication. - by Maurice Borgmeier

Using CloudFormation Modules for Serverless Standard Architecture

Serverless - a Use Case for CloudFormation Modules? Let´s agree to “infrastructure as code” is a good thing. The next question is: What framework do you use? To compare the frameworks, we have the tRick-benchmark repository, where we model infrastructure with different frameworks. Here is a walk through how to use CloudFormation Modules. This should help you to compare the different frameworks. - by Gernot Glawe