Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RFC 1: Faster Development Iterations (aka "CDK Watch") #335

Merged
merged 9 commits into from
Jul 15, 2021
Merged
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
285 changes: 285 additions & 0 deletions text/0001-cdk-update.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,285 @@
---
rfc pr: [#335](https://github.com/aws/aws-cdk-rfcs/pull/335)
tracking issue: https://github.com/aws/aws-cdk-rfcs/issues/1
---

# CDK Accelerate

Shorten the development iteration speed -- the "edit-compile-test" loop -- for
CDK applications.

## Working Backwards

### CHANGELOG

- feat(cli): implement `cdk deploy --accelerated` and
offbyone marked this conversation as resolved.
Show resolved Hide resolved
`cdk deploy --accelerated --watch`
offbyone marked this conversation as resolved.
Show resolved Hide resolved

### README
offbyone marked this conversation as resolved.
Show resolved Hide resolved

The `cdk deploy --accelerated` ("CDK accelerate") command accelerates the
edit-compile-test loop for your CDK application during development by inspecting
the assets and stack resources in your application, identifying those that can
be updated in-place without a full CloudFormation stack udpate, and doing so
offbyone marked this conversation as resolved.
Show resolved Hide resolved
using AWS service APIs directly. It can either do this as an interactive command
or by running continuously and monitoring the input files.

For supported construct types (see list, below) the update command will identify
assets whose content has changed since the last time the CDK application was
offbyone marked this conversation as resolved.
Show resolved Hide resolved
deployed, and then publish them to their asset storage medium. It will then use
AWS SDK commands to directly modify the CDK resources to use the new asset
paths. The update command acts on one or more stacks in the application, and
will only perform the shortcut if all changes are updateable.

A stack is "updateable" if the stack is explicitly marked as updateable, and it
offbyone marked this conversation as resolved.
Show resolved Hide resolved
contains resources supported by the update process. At this time, only Lambda
Functions and ECS Services are supported, however more resource types will be
added to this list in the future.

At a high level, `accelerate` operates by reading the current state of the
offbyone marked this conversation as resolved.
Show resolved Hide resolved
stack, performing a stack diff on it, and if the stack is different only in
resources supported by update plugins, running those in lieu of a full
deployment.

#### Running Update
offbyone marked this conversation as resolved.
Show resolved Hide resolved

To run a one-shot update, you can invoke the `cdk deploy --accelerated` command
offbyone marked this conversation as resolved.
Show resolved Hide resolved
on some or all of your stacks:

```
$ cdk deploy --accelerated ApplicationStack
Checking stack ApplicationStack for possible accelerated update
* LambdaFunction[AppFunction]: File asset changed
ApplicationStack can be updated
1/1 stacks can be updated:
Updating LambdaFunction in ApplicationStack
...
Update complete!
```

If the update is to an attribute of the stack that cannot be updated, the
offbyone marked this conversation as resolved.
Show resolved Hide resolved
command will offer to perform a full deployment:

```
$ cdk deploy --accelerated ApplicationStack
Checking stack ApplicationStack for possible accelerated update
* LambdaFunction[Appfunction]: Function data changed
ApplicationStack has changes that can not be rapidly updated.
Perform a full deployment of ApplicationStack? [Y/n]: Y
offbyone marked this conversation as resolved.
Show resolved Hide resolved
Deploying ApplicationStack
...
Done!
```

When multiple stacks are provided, update only occurs if all pending changes are
suitable for update. Otherwise, a full deployment is done:

```
$ cdk deploy --accelerated ApplicationStack DataStack
Checking stack ApplicationStack for possible accelerated update
* LambdaFunction[Appfunction]: Function data changed
ApplicationStack has changes that can not be rapidly updated.
Checking stack DataStack for possible accelerated update
* LambdaFunction[StreamFunction]: File asset changed
DataStack can be updated
1/2 stacks can be updated: Perform a full deployment? [Y/n]? Y
Deploying ApplicationStack
...
Deploying DataStack
...
Done!
```

In addition to running in a one shot mode, the `cdk deploy --accelerated`
offbyone marked this conversation as resolved.
Show resolved Hide resolved
command also has a `--watch` command line option that enable it to monitor the
assets on disk and perform an update when they change.

```
$ cdk deploy --accelerated --watch ApplicationStack DataStack
Checking stack ApplicationStack for possible accelerated update
* LambdaFunction[Appfunction]: No Changes
ApplicationStack can *not* be updated
Checking stack DataStack for possible accelerated update
* LambdaFunction[StreamFunction]: No Changes

Watching stack inputs for changes:
* LambdaFunction[Appfunction]: <spinner>
* LambdaFunction[StreamFunction]: <spinner>

```

The watcher can only watch for file changes. For Lambda code, that means that
offbyone marked this conversation as resolved.
Show resolved Hide resolved
directories will be watched for changes and zipped if they change. If the file
asset is a zip file, then the update will fire whenever that changes. The
existing docker asset builder will be used to watch for changes in local docker
images.

#### Resource Support
offbyone marked this conversation as resolved.
Show resolved Hide resolved

- AWS Lambda `Function`
offbyone marked this conversation as resolved.
Show resolved Hide resolved
- file and directory assets
- AWS Fargate
- image assets
- ECS
- image assets

#### Future Support Plans

- StepFunctions
offbyone marked this conversation as resolved.
Show resolved Hide resolved
- API Gateway models

### PRESS RELEASE
offbyone marked this conversation as resolved.
Show resolved Hide resolved

DATE - AWS announces the `cdk deploy --accelerated` command for the AWS CDK
toolkit. The `accelerate` command allows CDK application developers to rapidly
update code within their CDK application when no other AWS resources are
changing, bypassing the more correct, but time consuming, stack update
procedure.

The CDK toolkit uses CloudFormation under the hood to manage changes to AWS
resources, which safely updates resources. This update process is slow, however,
and during development it performs safety checks that add overhead to developer
workflows. Those delays are interposed between every change a developer makes,
and over the course of a product may add hours to the total development time.

The `cdk deploy --accelerated` command provides a way to bypass those checks
when working in development, directly updating the code in Lambda functions and
ECS services without a full CDK deployment. When the `accelerate` command can
identify that all changes in the stack have shortcut support, it will directly
publish the assets to AWS and then modify the underlying CDK resources directly.

> Using CDK accelerate dramatically improves our development iteration speed for
> Lambda functions. It cuts down the change-deploy-test cycle to seconds, where
> it was minutes before with a full cdk deploy each time. Unlike some other
> solutions, it actually updates our function running on AWS, which means there
> are no problems with the Lambda behaving differently during testing, and then
> in production - Adam Ruka, developer

Any CDK users who are deploying code to Lambda functions or containers on ECS or
Fargate can take advantage of this tool today, by configuring their stacks for
interactive update, and then using `cdk deploy --accelerated` instead of
`cdk deploy`.

## FAQ

### What are we launching today?

The `cdk deploy --accelerated` and `cdk deploy --accelerated --watch` commands,
with support for rapid update of Lambda function code and Fargate images.
offbyone marked this conversation as resolved.
Show resolved Hide resolved

### Why should I use this feature?

If you are developing a CDK application and want to publish your code changes
without waiting for CloudFormation to perform a full, safe stack update, you
should use this feature.

### Does it work when my Lambda is in Go or Java?

To an extent, yes, but there are caveats. In order to update the lambda code you
offbyone marked this conversation as resolved.
Show resolved Hide resolved
will need to run your build process to create the jar or executable that you are
uploading as lambda code.

### What about "other resource type"?

Based on customer response, we will consider expanding the set of AWS resources
and asset types implemented in the CDK directly. The plugin mechanism for
resource refreshing will allow other resource types to be supported by either
community or vendor addition.

## Internal FAQ

### Why are we doing this?

The overhead of developing a Lambda application using the CDK is significant,
since each code change currently requires a CloudFormation stack update to apply
new code, _or_ manually introducing drift to the application by inspecting the
stack and manipulating the resources directly.

The CDK accelerate tool will allow the CDK to handle the resource changes rather
than this manual process, introducing some implicit safety and reducing the
manual labor of the update.

### Why should we _not_ do this?

This solution has a risk of introducing a deployment tool that users might use
to shortcircuit the safe CloudFormation deployment process. If a user runs CDK
update on their production stack, it can perform updates without adequate stack
update safety checks. Releasing a public tool with instant update capability
into the CDK may not be the right way to make this functionality public. To
mitigate this, `accelerate` only runs on stacks that have explicitly opted in to
offbyone marked this conversation as resolved.
Show resolved Hide resolved
the capability.

### What changes are required to enable this change?

1. An implementation of the `cdk deploy --accelerated` command in the CDK
toolkit that can examine the Application stacks for updates that can be
applied and apply them.
2. An expansion of the CDK asset model to include optional construction process
metadata and construction input metadata. This is required to allow CDK to
identify input changes to the asset, reconstruct it from the defined
processes, and then publish it to the necessary AWS service.

### Is this a breaking change?

No, it is not.

### What are the drawbacks of this solution?
offbyone marked this conversation as resolved.
Show resolved Hide resolved

- Updating like this still entails a fair amount of preprocesing time, since for
complex projects (Golang and Java lambdas, for example) there remains a
compilation step.
- The update model requires the AWS account used to publish the stack to also
offbyone marked this conversation as resolved.
Show resolved Hide resolved
have sufficient permissions to update the underlying resources, rather than
simply requiring the account to have CloudFormation access.
- Runtimes that require compilation or assembly -- Go or Java lambdas, docker
images -- do not benefit from the `--watch` support as naturally, and require
some manual steps.
- updating Lambda functions that are using aliases and provisioned concurrency
can take several minutes to switch over between the two versions.

### What alternative solutions did you consider?

We considered SAM accelerate for a similar purpose, but SAM covers a relatively
small set of possible application structures in AWS, while CDK is intended to
address the whole set of them.

We also considered introspecting the CDK model ourselves, but concluded that
there was little value in reinventing the wheel, so to speak, when CDK already
had all of the information we'd need to deliver this.

For identifying stacks that are subject to accelerated deployment, we are
considering defining a full "Personal Development Stack" model, possibly based
off of information in the CDK `App` context.

### What is the high level implementation plan?

We will start from the prototype CDK update command that identifies the Lambda
resources and then publishes them using the CDK toolkit. We will expand it to
generalize it to use a simple plugin model to define the update mechanism, which
will allow for ECS support in addition to Lambda support.

Additionally, a `--watch` flag and a file watcher will be added to support
monitoring the inputs of assets for changes.

### Are there any open issues that need to be addressed later?

- This RFC requires changes that may affect
offbyone marked this conversation as resolved.
Show resolved Hide resolved
[rfc-0092 - cdk assets](https://github.com/aws/aws-cdk-rfcs/blob/master/text/0092-asset-publishing.md),
as it entails changes to the asset model to support asset transformation and
sources.
- This RFC can be extended to add support for further pluggable asset and update
offbyone marked this conversation as resolved.
Show resolved Hide resolved
targets.
- This RFC will be enhanced significantly when the CDK asset model is enriched
to support asset construction directly.
- Direct support for monitoring container repositories for changes (possibly via
polling) instead of only supporting local rebuild.

# How do we keep production from being affected by CDK accelerate?

CDK accelerate uses the AWS IAM access controls already in place in your account
to maintain the safety of your production deployments. The interface to CDK
accelerate requires the developer to specify the stacks that they will be
deploying explicitly, so by default it is affecting only the developer's stacks,
and when a production stack is defined it is up to the AWS account administrator
to ensure that the interactive developer's roles do not have modification access
to the accelerated resources.