@@ -10,7 +10,7 @@ import * as cxapi from '@aws-cdk/cx-api';
1010import { testFutureBehavior } from 'cdk-build-tools/lib/feature-flag' ;
1111import {
1212 AuroraEngineVersion , AuroraMysqlEngineVersion , AuroraPostgresEngineVersion , CfnDBCluster , Credentials , DatabaseCluster ,
13- DatabaseClusterEngine , DatabaseClusterFromSnapshot , ParameterGroup , PerformanceInsightRetention , SubnetGroup ,
13+ DatabaseClusterEngine , DatabaseClusterFromSnapshot , ParameterGroup , PerformanceInsightRetention , SubnetGroup , DatabaseSecret ,
1414} from '../lib' ;
1515
1616describe ( 'cluster' , ( ) => {
@@ -1763,6 +1763,52 @@ describe('cluster', () => {
17631763
17641764 } ) ;
17651765
1766+ test ( 'can set custom name to database secret by fromSecret' , ( ) => {
1767+ // GIVEN
1768+ const stack = testStack ( ) ;
1769+ const vpc = new ec2 . Vpc ( stack , 'VPC' ) ;
1770+ const secretName = 'custom-secret-name' ;
1771+ const secret = new DatabaseSecret ( stack , 'Secret' , {
1772+ username : 'admin' ,
1773+ secretName,
1774+ } ) ;
1775+
1776+ // WHEN
1777+ new DatabaseCluster ( stack , 'Database' , {
1778+ engine : DatabaseClusterEngine . aurora ( { version : AuroraEngineVersion . VER_1_22_2 } ) ,
1779+ credentials : Credentials . fromSecret ( secret ) ,
1780+ instanceProps : {
1781+ vpc,
1782+ } ,
1783+ } ) ;
1784+
1785+ // THEN
1786+ expect ( stack ) . toHaveResourceLike ( 'AWS::SecretsManager::Secret' , {
1787+ Name : secretName ,
1788+ } ) ;
1789+ } ) ;
1790+
1791+ test ( 'can set custom name to database secret by fromGeneratedSecret' , ( ) => {
1792+ // GIVEN
1793+ const stack = testStack ( ) ;
1794+ const vpc = new ec2 . Vpc ( stack , 'VPC' ) ;
1795+ const secretName = 'custom-secret-name' ;
1796+
1797+ // WHEN
1798+ new DatabaseCluster ( stack , 'Database' , {
1799+ engine : DatabaseClusterEngine . aurora ( { version : AuroraEngineVersion . VER_1_22_2 } ) ,
1800+ credentials : Credentials . fromGeneratedSecret ( 'admin' , { secretName } ) ,
1801+ instanceProps : {
1802+ vpc,
1803+ } ,
1804+ } ) ;
1805+
1806+ // THEN
1807+ expect ( stack ) . toHaveResourceLike ( 'AWS::SecretsManager::Secret' , {
1808+ Name : secretName ,
1809+ } ) ;
1810+ } ) ;
1811+
17661812 test ( 'can set public accessibility for database cluster with instances in private subnet' , ( ) => {
17671813 // GIVEN
17681814 const stack = testStack ( ) ;
0 commit comments