Skip to content

Commit f972d4b

Browse files
committed
removing mount targets info
1 parent 2caba56 commit f972d4b

File tree

2 files changed

+2
-19
lines changed

2 files changed

+2
-19
lines changed

packages/@aws-cdk/aws-efs/lib/efs-file-system.ts

+1-15
Original file line numberDiff line numberDiff line change
@@ -219,22 +219,11 @@ export class EfsFileSystem extends EfsFileSystemBase {
219219
*/
220220
public readonly connections: ec2.Connections;
221221

222-
/**
223-
* Identifiers of the mount targets
224-
*/
225-
public readonly mountTargetIdentifiers: string[] = [];
226-
227-
/**
228-
* IP Addresses of the mount targets
229-
*/
230-
public readonly mountTargetIpAddress: string[] = [];
231-
232222
/**
233223
* @attribute
234224
*/
235225
public readonly fileSystemId: string;
236226

237-
private readonly mountTargets: CfnMountTarget[] = [];
238227
private readonly efsFileSystem: CfnFileSystem;
239228

240229
/**
@@ -281,16 +270,13 @@ export class EfsFileSystem extends EfsFileSystemBase {
281270
// We now have to create the mount target for each of the mentioned subnet
282271
let mountTargetCount = 0;
283272
subnets.subnetIds.forEach((subnetId: string) => {
284-
const efsMountTarget = new CfnMountTarget(this,
273+
new CfnMountTarget(this,
285274
"EfsMountTarget" + (++mountTargetCount),
286275
{
287276
fileSystemId: this.fileSystemId,
288277
securityGroups: Array.of(securityGroup.securityGroupId),
289278
subnetId
290279
});
291-
this.mountTargets.push(efsMountTarget);
292-
this.mountTargetIdentifiers.push(efsMountTarget.ref);
293-
this.mountTargetIpAddress.push(efsMountTarget.attrIpAddress);
294280
});
295281
}
296282
}

packages/@aws-cdk/aws-efs/test/efs-file-system.test.ts

+1-4
Original file line numberDiff line numberDiff line change
@@ -15,16 +15,13 @@ beforeEach( () => {
1515

1616
test('default file system is created correctly', () => {
1717
// WHEN
18-
const efs = new EfsFileSystem(stack, 'EfsFileSystem', {
18+
new EfsFileSystem(stack, 'EfsFileSystem', {
1919
vpc,
2020
});
2121
// THEN
2222
expectCDK(stack).to(haveResource('AWS::EFS::FileSystem'));
2323
expectCDK(stack).to(haveResource('AWS::EFS::MountTarget'));
2424
expectCDK(stack).to(haveResource('AWS::EC2::SecurityGroup'));
25-
26-
expect(efs.mountTargetIpAddress.length).toEqual(vpc.selectSubnets().subnetIds.length);
27-
expect(efs.mountTargetIdentifiers.length).toEqual(vpc.selectSubnets().subnetIds.length);
2825
});
2926

3027
test('unencrypted file system is created correctly with default KMS', () => {

0 commit comments

Comments
 (0)