Skip to content

Commit ea4609f

Browse files
committed
extra integ test
1 parent 9ad6215 commit ea4609f

File tree

2 files changed

+133
-0
lines changed

2 files changed

+133
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
{
2+
"Resources": {
3+
"SecretA720EF05": {
4+
"Type": "AWS::SecretsManager::Secret",
5+
"Properties": {
6+
"GenerateSecretString": {
7+
"GenerateStringKey": "password",
8+
"SecretStringTemplate": "{\"username\":\"user\"}"
9+
}
10+
}
11+
},
12+
"TaskDefTaskRole1EDB4A67": {
13+
"Type": "AWS::IAM::Role",
14+
"Properties": {
15+
"AssumeRolePolicyDocument": {
16+
"Statement": [
17+
{
18+
"Action": "sts:AssumeRole",
19+
"Effect": "Allow",
20+
"Principal": {
21+
"Service": "ecs-tasks.amazonaws.com"
22+
}
23+
}
24+
],
25+
"Version": "2012-10-17"
26+
}
27+
}
28+
},
29+
"TaskDef54694570": {
30+
"Type": "AWS::ECS::TaskDefinition",
31+
"Properties": {
32+
"ContainerDefinitions": [
33+
{
34+
"Essential": true,
35+
"Image": "amazon/amazon-ecs-sample",
36+
"Name": "web",
37+
"Secrets": [
38+
{
39+
"Name": "SECRET",
40+
"ValueFrom": {
41+
"Ref": "SecretA720EF05"
42+
}
43+
}
44+
]
45+
}
46+
],
47+
"Cpu": "256",
48+
"ExecutionRoleArn": {
49+
"Fn::GetAtt": [
50+
"TaskDefExecutionRoleB4775C97",
51+
"Arn"
52+
]
53+
},
54+
"Family": "awsecsintegsecretTaskDef58AA207D",
55+
"Memory": "512",
56+
"NetworkMode": "awsvpc",
57+
"RequiresCompatibilities": [
58+
"FARGATE"
59+
],
60+
"TaskRoleArn": {
61+
"Fn::GetAtt": [
62+
"TaskDefTaskRole1EDB4A67",
63+
"Arn"
64+
]
65+
}
66+
}
67+
},
68+
"TaskDefExecutionRoleB4775C97": {
69+
"Type": "AWS::IAM::Role",
70+
"Properties": {
71+
"AssumeRolePolicyDocument": {
72+
"Statement": [
73+
{
74+
"Action": "sts:AssumeRole",
75+
"Effect": "Allow",
76+
"Principal": {
77+
"Service": "ecs-tasks.amazonaws.com"
78+
}
79+
}
80+
],
81+
"Version": "2012-10-17"
82+
}
83+
}
84+
},
85+
"TaskDefExecutionRoleDefaultPolicy0DBB737A": {
86+
"Type": "AWS::IAM::Policy",
87+
"Properties": {
88+
"PolicyDocument": {
89+
"Statement": [
90+
{
91+
"Action": "secretsmanager:GetSecretValue",
92+
"Effect": "Allow",
93+
"Resource": {
94+
"Ref": "SecretA720EF05"
95+
}
96+
}
97+
],
98+
"Version": "2012-10-17"
99+
},
100+
"PolicyName": "TaskDefExecutionRoleDefaultPolicy0DBB737A",
101+
"Roles": [
102+
{
103+
"Ref": "TaskDefExecutionRoleB4775C97"
104+
}
105+
]
106+
}
107+
}
108+
}
109+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
import * as secretsmanager from '@aws-cdk/aws-secretsmanager';
2+
import * as cdk from '@aws-cdk/core';
3+
import * as ecs from '../../lib';
4+
5+
const app = new cdk.App();
6+
const stack = new cdk.Stack(app, 'aws-ecs-integ-secret');
7+
8+
const secret = new secretsmanager.Secret(stack, 'Secret', {
9+
generateSecretString: {
10+
generateStringKey: 'password',
11+
secretStringTemplate: JSON.stringify({ username: 'user' })
12+
}
13+
});
14+
15+
const taskDefinition = new ecs.FargateTaskDefinition(stack, 'TaskDef');
16+
17+
taskDefinition.addContainer('web', {
18+
image: ecs.ContainerImage.fromRegistry('amazon/amazon-ecs-sample'),
19+
secrets: {
20+
SECRET: ecs.Secret.fromSecretsManager(secret)
21+
}
22+
});
23+
24+
app.synth();

0 commit comments

Comments
 (0)