LocalStack has multi-account and multi-region support. This document contains some tips to make sure that your contributions are compatible with this functionality.
For cross-account inter-service access, specify a role with which permissions the source service makes a request to the target service to access another service's resource. This role should be in the source account. When writing an AWS validated test case, you need to properly configure IAM roles.
For example:
The test case test_apigateway_with_step_function_integration
specifies a role which has permissions to access the target step function account.
role_arn = create_iam_role_with_policy(
RoleName=f"sfn_role-{short_uid()}",
PolicyName=f"sfn-role-policy-{short_uid()}",
RoleDefinition=STEPFUNCTIONS_ASSUME_ROLE_POLICY,
PolicyDefinition=APIGATEWAY_LAMBDA_POLICY,
)
For cross-account inter-service access, you can create the client using connect_to.with_assumed_role(...)
.
For example:
connect_to.with_assumed_role(
role_arn="role-arn",
service_principal=ServicePrincial.service_name,
region_name=region_name,
).lambda_
When there is no role specified, you should use the source arn conceptually if cross-account is allowed.
This can be seen in a case where account_id
was added added to send events to the target service like SQS, SNS, Lambda, etc.
Always refer to the official AWS documentation and investigate how the the services communicate with each other. For example, here are the AWS Firehose docs explaining Firehose and S3 integration.
We regularly run the test suite in CircleCI to check the multi-account and multi-region feature compatibility. There is a scheduled CircleCI workflow which executes the tests with randomized account ID and region at 01:00 UTC daily.
If you have permissions, this workflow can be manually triggered on CircleCI as follows:
- Go to the LocalStack project on CircleCI.
- Select a branch for which you want to trigger the workflow from the filters section.
- For PRs coming from forks, you can select the branch by using the PR number like this:
pull/<pr-number>
- For PRs coming from forks, you can select the branch by using the PR number like this:
- Click on the Trigger Pipeline button on the right and use the following values:
- Set Parameter type to
boolean
- Set Name to
randomize-aws-credentials
- Set Value to
true
- Set Parameter type to
- Click the Trigger Pipeline button to commence the workflow.
To test changes locally for multi-account and multi-region compatibility, set the environment config values as follows:
TEST_AWS_ACCOUNT_ID
(Any value except000000000000
)TEST_AWS_ACCESS_KEY_ID
(Any value except000000000000
)TEST_AWS_REGION
(Any value exceptus-east-1
)
You may also opt to create a commit (for example: da3f8d5
) to test the pipeline for non-default credentials against your changes.
Note that within all tests you must use account_id
, secondary_account_id
, region_name
, secondary_region_name
fixtures.
Importing and using localstack.constants.TEST_
values is not advised.