Multi-account and Multi-region Testing

Make sure contributions are multi-account and multi-region compatible.

LocalStack has multi-account and multi-region support (see Multi-Account Setups and Cross-Account and Cross-Region Access). This document contains some tips to make sure that your contributions are compatible with this functionality.

Overview

For cross-account inter-service access, specify a role with which permissions the source service makes a request to the target service to access another service’s resource. This role should be in the source account. When writing an AWS validated test case, you need to properly configure IAM roles.

For example: The test case test_apigateway_with_step_function_integration specifies a role which has permissions to access the target step function account.

role_arn = create_iam_role_with_policy(
    RoleName=f"sfn_role-{short_uid()}",
    PolicyName=f"sfn-role-policy-{short_uid()}",
    RoleDefinition=STEPFUNCTIONS_ASSUME_ROLE_POLICY,
    PolicyDefinition=APIGATEWAY_LAMBDA_POLICY,
)

For cross-account inter-service access, you can create the client using connect_to.with_assumed_role(...). For example:

connect_to.with_assumed_role(
    role_arn="role-arn",
    service_principal=ServicePrincial.service_name,
    region_name=region_name,
).lambda_

When there is no role specified, you should use the source arn conceptually if cross-account is allowed. This can be seen in a case where account_id was added added to send events to the target service like SQS, SNS, Lambda, etc.

Always refer to the official AWS documentation and investigate how the the services communicate with each other. For example, here are the AWS Firehose docs explaining Firehose and S3 integration.

Test changes in CI with random credentials

We regularly run the test suite in CircleCI to check the multi-account and multi-region feature compatibility. There is a scheduled CircleCI workflow which executes the tests with randomized account ID and region at 01:00 UTC daily.

If you have permissions, this workflow can be manually triggered on CircleCI as follows:

  1. Go to the LocalStack project on CircleCI.
  2. Select a branch for which you want to trigger the workflow from the filters section.
    • For PRs coming from forks, you can select the branch by using the PR number like this: pull/<pr-number>
  3. Click on the Trigger Pipeline button on the right and use the following values:
    1. Set Parameter type to boolean
    2. Set Name to randomize-aws-credentials
    3. Set Value to true
  4. Click the Trigger Pipeline button to commence the workflow.

CircleCI Trigger Pipeline

Test changes locally with random credentials

To test changes locally for multi-account and multi-region compatibility, set the environment config values as follows:

  • TEST_AWS_ACCOUNT_ID (Any value except 000000000000)
  • TEST_AWS_ACCESS_KEY_ID (Any value except 000000000000)
  • TEST_AWS_REGION (Any value except us-east-1)

You may also opt to create a commit (for example: da3f8d5) to test the pipeline for non-default credentials against your changes. Note that within all tests you must use account_id, secondary_account_id, region_name, secondary_region_name fixtures. Importing and using localstack.constants.TEST_ values is not advised.