Skip to content

Commit 333bb22

Browse files
authored
CDK test infra - Minor - Add missing SSM parameter (#740)
1 parent 520a557 commit 333bb22

File tree

4 files changed

+25
-14
lines changed

4 files changed

+25
-14
lines changed

test_infra/requirements.txt

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,5 @@ aws-cdk.aws_logs>=1.106.1
77
aws-cdk.aws_s3>=1.106.1
88
aws-cdk.aws_redshift>=1.106.1
99
aws-cdk.aws_rds>=1.106.1
10-
aws_cdk.aws_secretsmanager>=1.106.1
10+
aws_cdk.aws_secretsmanager>=1.106.1
11+
aws_cdk.aws_ssm>=1.106.1

test_infra/stacks/base_stack.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ def __init__(self, scope: cdk.Construct, construct_id: str, **kwargs: str) -> No
1818
enable_dns_hostnames=True,
1919
enable_dns_support=True,
2020
)
21+
cdk.Tags.of(self.vpc).add("Name", "aws-data-wrangler")
2122
self.key = kms.Key(
2223
self,
2324
id="aws-data-wrangler-key",

test_infra/stacks/databases_stack.py

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@
77
from aws_cdk import aws_rds as rds
88
from aws_cdk import aws_redshift as redshift
99
from aws_cdk import aws_s3 as s3
10-
from aws_cdk import aws_secretsmanager as ssm
10+
from aws_cdk import aws_secretsmanager as secrets
11+
from aws_cdk import aws_ssm as ssm
1112
from aws_cdk import core as cdk
1213

1314

@@ -41,11 +42,11 @@ def __init__(
4142
def _set_db_infra(self) -> None:
4243
self.db_username = "test"
4344
# fmt: off
44-
self.db_password_secret = ssm.Secret(
45+
self.db_password_secret = secrets.Secret(
4546
self,
4647
"db-password-secret",
4748
secret_name="aws-data-wrangler/db_password",
48-
generate_secret_string=ssm.SecretStringGenerator(exclude_characters="/@\"\' \\"),
49+
generate_secret_string=secrets.SecretStringGenerator(exclude_characters="/@\"\' \\"),
4950
).secret_value
5051
# fmt: on
5152
self.db_password = self.db_password_secret.to_string()
@@ -56,6 +57,12 @@ def _set_db_infra(self) -> None:
5657
description="AWS Data Wrangler Test Arena - Database security group",
5758
)
5859
self.db_security_group.add_ingress_rule(ec2.Peer.any_ipv4(), ec2.Port.all_traffic())
60+
ssm.StringParameter(
61+
self,
62+
"db-secruity-group-parameter",
63+
parameter_name="/Wrangler/EC2/DatabaseSecurityGroupId",
64+
string_value=self.db_security_group.security_group_id,
65+
)
5966
self.rds_subnet_group = rds.SubnetGroup(
6067
self,
6168
"aws-data-wrangler-rds-subnet-group",
@@ -225,12 +232,12 @@ def _setup_redshift(self) -> None:
225232
subnet=self.vpc.private_subnets[0],
226233
security_groups=[self.db_security_group],
227234
)
228-
ssm.Secret(
235+
secrets.Secret(
229236
self,
230237
"aws-data-wrangler-redshift-secret",
231238
secret_name="aws-data-wrangler/redshift",
232239
description="Redshift credentials",
233-
generate_secret_string=ssm.SecretStringGenerator(
240+
generate_secret_string=secrets.SecretStringGenerator(
234241
generate_string_key="dummy",
235242
secret_string_template=json.dumps(
236243
{
@@ -308,12 +315,12 @@ def _setup_postgresql(self) -> None:
308315
subnet=self.vpc.private_subnets[0],
309316
security_groups=[self.db_security_group],
310317
)
311-
ssm.Secret(
318+
secrets.Secret(
312319
self,
313320
"aws-data-wrangler-postgresql-secret",
314321
secret_name="aws-data-wrangler/postgresql",
315322
description="Postgresql credentials",
316-
generate_secret_string=ssm.SecretStringGenerator(
323+
generate_secret_string=secrets.SecretStringGenerator(
317324
generate_string_key="dummy",
318325
secret_string_template=json.dumps(
319326
{
@@ -392,12 +399,12 @@ def _setup_mysql(self) -> None:
392399
subnet=self.vpc.private_subnets[0],
393400
security_groups=[self.db_security_group],
394401
)
395-
ssm.Secret(
402+
secrets.Secret(
396403
self,
397404
"aws-data-wrangler-mysql-secret",
398405
secret_name="aws-data-wrangler/mysql",
399406
description="MySQL credentials",
400-
generate_secret_string=ssm.SecretStringGenerator(
407+
generate_secret_string=secrets.SecretStringGenerator(
401408
generate_string_key="dummy",
402409
secret_string_template=json.dumps(
403410
{
@@ -453,12 +460,12 @@ def _setup_sqlserver(self) -> None:
453460
subnet=self.vpc.private_subnets[0],
454461
security_groups=[self.db_security_group],
455462
)
456-
ssm.Secret(
463+
secrets.Secret(
457464
self,
458465
"aws-data-wrangler-sqlserver-secret",
459466
secret_name="aws-data-wrangler/sqlserver",
460467
description="SQL Server credentials",
461-
generate_secret_string=ssm.SecretStringGenerator(
468+
generate_secret_string=secrets.SecretStringGenerator(
462469
generate_string_key="dummy",
463470
secret_string_template=json.dumps(
464471
{

tests/test_moto.py

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,8 +42,10 @@ def moto_subnet():
4242
@pytest.fixture(scope="function")
4343
def moto_s3():
4444
with moto.mock_s3():
45-
s3 = boto3.resource("s3")
46-
s3.create_bucket(Bucket="bucket")
45+
s3 = boto3.resource("s3", region_name="us-east-1")
46+
s3.create_bucket(
47+
Bucket="bucket",
48+
)
4749
yield s3
4850

4951

0 commit comments

Comments
 (0)