Skip to content

Commit

Permalink
fix(efs): FileSystem deployment fails if vpcSubnets is changed (#26155)
Browse files Browse the repository at this point in the history
Changing Logical IDs for EfsMountTarget

While using the forEach, index will be added as a suffix to logical id of EfsMountTarget 
this is causing an error when the subnets array in the props has changed.

Closes #25099

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
  • Loading branch information
ahmetsoykan authored Aug 22, 2023
1 parent 26dcc1e commit d54b67d
Show file tree
Hide file tree
Showing 56 changed files with 11,661 additions and 378 deletions.
Original file line number Diff line number Diff line change
@@ -1,15 +1,15 @@
{
"version": "20.0.0",
"version": "32.0.0",
"files": {
"b1edd83a738f14bf7faf27a98a7ff437aa9b1a003f15e438e837a28247d7a45b": {
"05d98682f5d66455a18d98d3c7e029a00681556556eee8d8afa4dd1f954b184a": {
"source": {
"path": "aws-ecs-fargate-efs.template.json",
"packaging": "file"
},
"destinations": {
"current_account-current_region": {
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
"objectKey": "b1edd83a738f14bf7faf27a98a7ff437aa9b1a003f15e438e837a28247d7a45b.json",
"objectKey": "05d98682f5d66455a18d98d3c7e029a00681556556eee8d8afa4dd1f954b184a.json",
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -427,7 +427,7 @@
}
}
},
"etcdataEfsMountTarget1A2665990": {
"etcdataEfsMountTargetPrivateSubnet1DF9D9372": {
"Type": "AWS::EFS::MountTarget",
"Properties": {
"FileSystemId": {
Expand All @@ -446,7 +446,7 @@
}
}
},
"etcdataEfsMountTarget280CEA26C": {
"etcdataEfsMountTargetPrivateSubnet209100FF5": {
"Type": "AWS::EFS::MountTarget",
"Properties": {
"FileSystemId": {
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
{
"version": "32.0.0",
"files": {
"21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22": {
"source": {
"path": "awsecsfargatetestDefaultTestDeployAssert78ECD46B.template.json",
"packaging": "file"
},
"destinations": {
"current_account-current_region": {
"bucketName": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}",
"objectKey": "21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22.json",
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-file-publishing-role-${AWS::AccountId}-${AWS::Region}"
}
}
}
},
"dockerImages": {}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
{
"Parameters": {
"BootstrapVersion": {
"Type": "AWS::SSM::Parameter::Value<String>",
"Default": "/cdk-bootstrap/hnb659fds/version",
"Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
}
},
"Rules": {
"CheckBootstrapVersion": {
"Assertions": [
{
"Assert": {
"Fn::Not": [
{
"Fn::Contains": [
[
"1",
"2",
"3",
"4",
"5"
],
{
"Ref": "BootstrapVersion"
}
]
}
]
},
"AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
}
]
}
}
}
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"version":"20.0.0"}
{"version":"32.0.0"}
Original file line number Diff line number Diff line change
@@ -1,14 +1,12 @@
{
"version": "20.0.0",
"version": "32.0.0",
"testCases": {
"integ.fargate-with-efs": {
"aws-ecs-fargate-test/DefaultTest": {
"stacks": [
"aws-ecs-fargate-efs"
],
"diffAssets": false,
"stackUpdateWorkflow": true
"assertionStack": "aws-ecs-fargate-test/DefaultTest/DeployAssert",
"assertionStackName": "awsecsfargatetestDefaultTestDeployAssert78ECD46B"
}
},
"synthContext": {},
"enableLookups": false
}
}
Original file line number Diff line number Diff line change
@@ -1,12 +1,6 @@
{
"version": "20.0.0",
"version": "32.0.0",
"artifacts": {
"Tree": {
"type": "cdk:tree",
"properties": {
"file": "tree.json"
}
},
"aws-ecs-fargate-efs.assets": {
"type": "cdk:asset-manifest",
"properties": {
Expand All @@ -23,7 +17,7 @@
"validateOnSynth": false,
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/b1edd83a738f14bf7faf27a98a7ff437aa9b1a003f15e438e837a28247d7a45b.json",
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/05d98682f5d66455a18d98d3c7e029a00681556556eee8d8afa4dd1f954b184a.json",
"requiresBootstrapStackVersion": 6,
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
"additionalDependencies": [
Expand Down Expand Up @@ -189,16 +183,16 @@
"data": "etcdataEfsSecurityGroupB0A9B014"
}
],
"/aws-ecs-fargate-efs/etcdata/EfsMountTarget1": [
"/aws-ecs-fargate-efs/etcdata/EfsMountTarget-PrivateSubnet1": [
{
"type": "aws:cdk:logicalId",
"data": "etcdataEfsMountTarget1A2665990"
"data": "etcdataEfsMountTargetPrivateSubnet1DF9D9372"
}
],
"/aws-ecs-fargate-efs/etcdata/EfsMountTarget2": [
"/aws-ecs-fargate-efs/etcdata/EfsMountTarget-PrivateSubnet2": [
{
"type": "aws:cdk:logicalId",
"data": "etcdataEfsMountTarget280CEA26C"
"data": "etcdataEfsMountTargetPrivateSubnet209100FF5"
}
],
"/aws-ecs-fargate-efs/TaskDef/TaskRole/Resource": [
Expand Down Expand Up @@ -227,6 +221,59 @@
]
},
"displayName": "aws-ecs-fargate-efs"
},
"awsecsfargatetestDefaultTestDeployAssert78ECD46B.assets": {
"type": "cdk:asset-manifest",
"properties": {
"file": "awsecsfargatetestDefaultTestDeployAssert78ECD46B.assets.json",
"requiresBootstrapStackVersion": 6,
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
}
},
"awsecsfargatetestDefaultTestDeployAssert78ECD46B": {
"type": "aws:cloudformation:stack",
"environment": "aws://unknown-account/unknown-region",
"properties": {
"templateFile": "awsecsfargatetestDefaultTestDeployAssert78ECD46B.template.json",
"validateOnSynth": false,
"assumeRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-deploy-role-${AWS::AccountId}-${AWS::Region}",
"cloudFormationExecutionRoleArn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-cfn-exec-role-${AWS::AccountId}-${AWS::Region}",
"stackTemplateAssetObjectUrl": "s3://cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}/21fbb51d7b23f6a6c262b46a9caee79d744a3ac019fd45422d988b96d44b2a22.json",
"requiresBootstrapStackVersion": 6,
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version",
"additionalDependencies": [
"awsecsfargatetestDefaultTestDeployAssert78ECD46B.assets"
],
"lookupRole": {
"arn": "arn:${AWS::Partition}:iam::${AWS::AccountId}:role/cdk-hnb659fds-lookup-role-${AWS::AccountId}-${AWS::Region}",
"requiresBootstrapStackVersion": 8,
"bootstrapStackVersionSsmParameter": "/cdk-bootstrap/hnb659fds/version"
}
},
"dependencies": [
"awsecsfargatetestDefaultTestDeployAssert78ECD46B.assets"
],
"metadata": {
"/aws-ecs-fargate-test/DefaultTest/DeployAssert/BootstrapVersion": [
{
"type": "aws:cdk:logicalId",
"data": "BootstrapVersion"
}
],
"/aws-ecs-fargate-test/DefaultTest/DeployAssert/CheckBootstrapVersion": [
{
"type": "aws:cdk:logicalId",
"data": "CheckBootstrapVersion"
}
]
},
"displayName": "aws-ecs-fargate-test/DefaultTest/DeployAssert"
},
"Tree": {
"type": "cdk:tree",
"properties": {
"file": "tree.json"
}
}
}
}
Loading

0 comments on commit d54b67d

Please sign in to comment.