1- import { ABSENT , expect as expectCDK , haveResource , ResourcePart } from '@aws-cdk/assert' ;
1+ import '@aws-cdk/assert/jest' ;
2+ import { ABSENT , ResourcePart } from '@aws-cdk/assert' ;
23import * as ec2 from '@aws-cdk/aws-ec2' ;
34import * as iam from '@aws-cdk/aws-iam' ;
45import * as kms from '@aws-cdk/aws-kms' ;
@@ -20,28 +21,28 @@ describe('DatabaseCluster', () => {
2021 } ) ;
2122
2223 // THEN
23- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
24+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
2425 Properties : {
2526 DBSubnetGroupName : { Ref : 'DatabaseSubnets3C9252C9' } ,
2627 VpcSecurityGroupIds : [ { 'Fn::GetAtt' : [ 'DatabaseSecurityGroup5C91FDCB' , 'GroupId' ] } ] ,
2728 StorageEncrypted : true ,
2829 } ,
2930 DeletionPolicy : 'Retain' ,
3031 UpdateReplacePolicy : 'Retain' ,
31- } , ResourcePart . CompleteDefinition ) ) ;
32+ } , ResourcePart . CompleteDefinition ) ;
3233
33- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBInstance' , {
34+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBInstance' , {
3435 DeletionPolicy : 'Retain' ,
3536 UpdateReplacePolicy : 'Retain' ,
36- } , ResourcePart . CompleteDefinition ) ) ;
37+ } , ResourcePart . CompleteDefinition ) ;
3738
38- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBSubnetGroup' , {
39+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBSubnetGroup' , {
3940 SubnetIds : [
4041 { Ref : 'VPCPrivateSubnet1Subnet8BCA10E0' } ,
4142 { Ref : 'VPCPrivateSubnet2SubnetCFCDAA7A' } ,
4243 { Ref : 'VPCPrivateSubnet3Subnet3EDCD457' } ,
4344 ] ,
44- } ) ) ;
45+ } ) ;
4546 } ) ;
4647
4748 test ( 'can create a cluster with a single instance' , ( ) => {
@@ -57,10 +58,10 @@ describe('DatabaseCluster', () => {
5758 } ) ;
5859
5960 // THEN
60- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
61+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
6162 DBSubnetGroupName : { Ref : 'DatabaseSubnets3C9252C9' } ,
6263 VpcSecurityGroupIds : [ { 'Fn::GetAtt' : [ 'DatabaseSecurityGroup5C91FDCB' , 'GroupId' ] } ] ,
63- } ) ) ;
64+ } ) ;
6465 } ) ;
6566
6667 test ( 'errors when less than one instance is specified' , ( ) => {
@@ -111,11 +112,11 @@ describe('DatabaseCluster', () => {
111112 } ) ;
112113
113114 // THEN
114- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
115+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
115116 EngineVersion : '1.0.4.1' ,
116117 DBSubnetGroupName : { Ref : 'DatabaseSubnets3C9252C9' } ,
117118 VpcSecurityGroupIds : [ { 'Fn::GetAtt' : [ 'DatabaseSecurityGroup5C91FDCB' , 'GroupId' ] } ] ,
118- } ) ) ;
119+ } ) ;
119120 } ) ;
120121
121122 test ( 'can create a cluster with imported vpc and security group' , ( ) => {
@@ -135,10 +136,10 @@ describe('DatabaseCluster', () => {
135136 } ) ;
136137
137138 // THEN
138- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
139+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
139140 DBSubnetGroupName : { Ref : 'DatabaseSubnets3C9252C9' } ,
140141 VpcSecurityGroupIds : [ 'SecurityGroupId12345' ] ,
141- } ) ) ;
142+ } ) ;
142143 } ) ;
143144
144145 test ( 'cluster with parameter group' , ( ) => {
@@ -160,9 +161,9 @@ describe('DatabaseCluster', () => {
160161 } ) ;
161162
162163 // THEN
163- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
164+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
164165 DBClusterParameterGroupName : { Ref : 'ParamsA8366201' } ,
165- } ) ) ;
166+ } ) ;
166167 } ) ;
167168
168169 test ( 'cluster with associated role' , ( ) => {
@@ -183,7 +184,7 @@ describe('DatabaseCluster', () => {
183184 } ) ;
184185
185186 // THEN
186- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
187+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
187188 AssociatedRoles : [
188189 {
189190 RoleArn : {
@@ -194,7 +195,7 @@ describe('DatabaseCluster', () => {
194195 } ,
195196 } ,
196197 ] ,
197- } ) ) ;
198+ } ) ;
198199 } ) ;
199200
200201 test ( 'cluster with imported parameter group' , ( ) => {
@@ -212,9 +213,9 @@ describe('DatabaseCluster', () => {
212213 } ) ;
213214
214215 // THEN
215- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
216+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
216217 DBClusterParameterGroupName : 'ParamGroupName' ,
217- } ) ) ;
218+ } ) ;
218219 } ) ;
219220
220221 test ( 'create an encrypted cluster with custom KMS key' , ( ) => {
@@ -230,15 +231,15 @@ describe('DatabaseCluster', () => {
230231 } ) ;
231232
232233 // THEN
233- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
234+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
234235 KmsKeyId : {
235236 'Fn::GetAtt' : [
236237 'Key961B73FD' ,
237238 'Arn' ,
238239 ] ,
239240 } ,
240241 StorageEncrypted : true ,
241- } ) ) ;
242+ } ) ;
242243 } ) ;
243244
244245 test ( 'creating a cluster defaults to using encryption' , ( ) => {
@@ -253,9 +254,9 @@ describe('DatabaseCluster', () => {
253254 } ) ;
254255
255256 // THEN
256- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
257+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
257258 StorageEncrypted : true ,
258- } ) ) ;
259+ } ) ;
259260 } ) ;
260261
261262 test ( 'supplying a KMS key with storageEncryption false throws an error' , ( ) => {
@@ -306,9 +307,9 @@ describe('DatabaseCluster', () => {
306307 } ) ;
307308
308309 // THEN
309- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBInstance' , {
310+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBInstance' , {
310311 DBInstanceIdentifier : `${ instanceIdentifierBase } 1` ,
311- } ) ) ;
312+ } ) ;
312313 } ) ;
313314
314315 test ( 'cluster identifier used' , ( ) => {
@@ -325,9 +326,9 @@ describe('DatabaseCluster', () => {
325326 } ) ;
326327
327328 // THEN
328- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBInstance' , {
329+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBInstance' , {
329330 DBInstanceIdentifier : `${ clusterIdentifier } instance1` ,
330- } ) ) ;
331+ } ) ;
331332 } ) ;
332333
333334 test ( 'imported cluster has supplied attributes' , ( ) => {
@@ -372,9 +373,9 @@ describe('DatabaseCluster', () => {
372373 cluster . connections . allowToAnyIpv4 ( ec2 . Port . tcp ( 443 ) ) ;
373374
374375 // THEN
375- expectCDK ( stack ) . to ( haveResource ( 'AWS::EC2::SecurityGroupEgress' , {
376+ expect ( stack ) . toHaveResource ( 'AWS::EC2::SecurityGroupEgress' , {
376377 GroupId : 'sg-123456789' ,
377- } ) ) ;
378+ } ) ;
378379 } ) ;
379380
380381 test ( 'backup retention period respected' , ( ) => {
@@ -390,9 +391,9 @@ describe('DatabaseCluster', () => {
390391 } ) ;
391392
392393 // THEN
393- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
394+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
394395 BackupRetentionPeriod : 20 ,
395- } ) ) ;
396+ } ) ;
396397 } ) ;
397398
398399 test ( 'backup maintenance window respected' , ( ) => {
@@ -409,10 +410,10 @@ describe('DatabaseCluster', () => {
409410 } ) ;
410411
411412 // THEN
412- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
413+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
413414 BackupRetentionPeriod : 20 ,
414415 PreferredBackupWindow : '07:34-08:04' ,
415- } ) ) ;
416+ } ) ;
416417 } ) ;
417418
418419 test ( 'regular maintenance window respected' , ( ) => {
@@ -428,9 +429,9 @@ describe('DatabaseCluster', () => {
428429 } ) ;
429430
430431 // THEN
431- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
432+ expect ( stack ) . toHaveResource ( 'AWS::Neptune::DBCluster' , {
432433 PreferredMaintenanceWindow : '07:34-08:04' ,
433- } ) ) ;
434+ } ) ;
434435 } ) ;
435436
436437 test ( 'iam authentication - off by default' , ( ) => {
@@ -445,9 +446,9 @@ describe('DatabaseCluster', () => {
445446 } ) ;
446447
447448 // THEN
448- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
449+ expect ( stack ) . toHaveResourceLike ( 'AWS::Neptune::DBCluster' , {
449450 IamAuthEnabled : ABSENT ,
450- } ) ) ;
451+ } ) ;
451452 } ) ;
452453
453454 test ( 'createGrant - creates IAM policy and enables IAM auth' , ( ) => {
@@ -466,10 +467,10 @@ describe('DatabaseCluster', () => {
466467 cluster . grantConnect ( role ) ;
467468
468469 // THEN
469- expectCDK ( stack ) . to ( haveResource ( 'AWS::Neptune::DBCluster' , {
470+ expect ( stack ) . toHaveResourceLike ( 'AWS::Neptune::DBCluster' , {
470471 IamAuthEnabled : true ,
471- } ) ) ;
472- expectCDK ( stack ) . to ( haveResource ( 'AWS::IAM::Policy' , {
472+ } ) ;
473+ expect ( stack ) . toHaveResource ( 'AWS::IAM::Policy' , {
473474 PolicyDocument : {
474475 Statement : [ {
475476 Effect : 'Allow' ,
@@ -502,7 +503,7 @@ describe('DatabaseCluster', () => {
502503 } ] ,
503504 Version : '2012-10-17' ,
504505 } ,
505- } ) ) ;
506+ } ) ;
506507 } ) ;
507508
508509 test ( 'createGrant - throws if IAM auth disabled' , ( ) => {
0 commit comments