77from aws_cdk import aws_rds as rds
88from aws_cdk import aws_redshift as redshift
99from aws_cdk import aws_s3 as s3
10- from aws_cdk import aws_secretsmanager as ssm
10+ from aws_cdk import aws_secretsmanager as secrets
11+ from aws_cdk import aws_ssm as ssm
1112from aws_cdk import core as cdk
1213
1314
@@ -41,11 +42,11 @@ def __init__(
4142 def _set_db_infra (self ) -> None :
4243 self .db_username = "test"
4344 # fmt: off
44- self .db_password_secret = ssm .Secret (
45+ self .db_password_secret = secrets .Secret (
4546 self ,
4647 "db-password-secret" ,
4748 secret_name = "aws-data-wrangler/db_password" ,
48- generate_secret_string = ssm .SecretStringGenerator (exclude_characters = "/@\" \' \\ " ),
49+ generate_secret_string = secrets .SecretStringGenerator (exclude_characters = "/@\" \' \\ " ),
4950 ).secret_value
5051 # fmt: on
5152 self .db_password = self .db_password_secret .to_string ()
@@ -56,6 +57,12 @@ def _set_db_infra(self) -> None:
5657 description = "AWS Data Wrangler Test Arena - Database security group" ,
5758 )
5859 self .db_security_group .add_ingress_rule (ec2 .Peer .any_ipv4 (), ec2 .Port .all_traffic ())
60+ ssm .StringParameter (
61+ self ,
62+ "db-secruity-group-parameter" ,
63+ parameter_name = "/Wrangler/EC2/DatabaseSecurityGroupId" ,
64+ string_value = self .db_security_group .security_group_id ,
65+ )
5966 self .rds_subnet_group = rds .SubnetGroup (
6067 self ,
6168 "aws-data-wrangler-rds-subnet-group" ,
@@ -225,12 +232,12 @@ def _setup_redshift(self) -> None:
225232 subnet = self .vpc .private_subnets [0 ],
226233 security_groups = [self .db_security_group ],
227234 )
228- ssm .Secret (
235+ secrets .Secret (
229236 self ,
230237 "aws-data-wrangler-redshift-secret" ,
231238 secret_name = "aws-data-wrangler/redshift" ,
232239 description = "Redshift credentials" ,
233- generate_secret_string = ssm .SecretStringGenerator (
240+ generate_secret_string = secrets .SecretStringGenerator (
234241 generate_string_key = "dummy" ,
235242 secret_string_template = json .dumps (
236243 {
@@ -308,12 +315,12 @@ def _setup_postgresql(self) -> None:
308315 subnet = self .vpc .private_subnets [0 ],
309316 security_groups = [self .db_security_group ],
310317 )
311- ssm .Secret (
318+ secrets .Secret (
312319 self ,
313320 "aws-data-wrangler-postgresql-secret" ,
314321 secret_name = "aws-data-wrangler/postgresql" ,
315322 description = "Postgresql credentials" ,
316- generate_secret_string = ssm .SecretStringGenerator (
323+ generate_secret_string = secrets .SecretStringGenerator (
317324 generate_string_key = "dummy" ,
318325 secret_string_template = json .dumps (
319326 {
@@ -392,12 +399,12 @@ def _setup_mysql(self) -> None:
392399 subnet = self .vpc .private_subnets [0 ],
393400 security_groups = [self .db_security_group ],
394401 )
395- ssm .Secret (
402+ secrets .Secret (
396403 self ,
397404 "aws-data-wrangler-mysql-secret" ,
398405 secret_name = "aws-data-wrangler/mysql" ,
399406 description = "MySQL credentials" ,
400- generate_secret_string = ssm .SecretStringGenerator (
407+ generate_secret_string = secrets .SecretStringGenerator (
401408 generate_string_key = "dummy" ,
402409 secret_string_template = json .dumps (
403410 {
@@ -453,12 +460,12 @@ def _setup_sqlserver(self) -> None:
453460 subnet = self .vpc .private_subnets [0 ],
454461 security_groups = [self .db_security_group ],
455462 )
456- ssm .Secret (
463+ secrets .Secret (
457464 self ,
458465 "aws-data-wrangler-sqlserver-secret" ,
459466 secret_name = "aws-data-wrangler/sqlserver" ,
460467 description = "SQL Server credentials" ,
461- generate_secret_string = ssm .SecretStringGenerator (
468+ generate_secret_string = secrets .SecretStringGenerator (
462469 generate_string_key = "dummy" ,
463470 secret_string_template = json .dumps (
464471 {
0 commit comments