-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathrds-db-instance.ts
65 lines (55 loc) · 2.37 KB
/
rds-db-instance.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
import { aws_rds as rds } from 'aws-cdk-lib';
import * as k from 'cdk8s';
import * as kplus from 'cdk8s-plus-28';
import * as base from './base';
import * as krdsdbinstances from '../imports/rdsdbinstances-rds.services.k8s.aws';
const PASSWORD_SECRET_KEY = 'password';
export class RdsDBInstanceMapper extends base.CloudFormationResourceMapper {
public readonly type: string = 'AWS::RDS::DBInstance';
public readonly exportMappings: base.CloudFormationMapperExportMapping[] = [
{
field: 'endpoint.address',
attribute: 'Endpoint.Address',
},
{
field: 'endpoint.port',
attribute: 'Endpoint.Port',
},
];
public readonly nameMapping: base.CloudFormationMapperNameMapping = {
cfnProperty: 'dbClusterIdentifier',
specPath: '/spec/dbInstanceIdentifier',
};
public map(logicalId: string, cfnProperties: any): k.ApiObject {
const properties = cfnProperties as rds.CfnDBInstanceProps;
const passwordSecret = properties.masterUserPassword ? this.createPasswordSecret(properties.masterUserPassword, logicalId) : undefined;
return new krdsdbinstances.DbInstance(this.chart, logicalId, {
metadata: { name: properties.dbName },
spec: {
dbName: properties.dbName,
dbClusterIdentifier: properties.dbInstanceIdentifier,
dbInstanceClass: properties.dbInstanceClass!,
allocatedStorage: properties.allocatedStorage ? parseInt(properties.allocatedStorage) : undefined,
copyTagsToSnapshot: properties.copyTagsToSnapshot as boolean,
dbSubnetGroupName: properties.dbSubnetGroupName,
engine: properties.engine!,
masterUsername: properties.masterUsername,
masterUserPassword: passwordSecret ? {
key: PASSWORD_SECRET_KEY,
name: passwordSecret.name,
namespace: passwordSecret.metadata.namespace,
} : undefined,
storageType: properties.storageType,
dbSecurityGroups: properties.dbSecurityGroups,
vpcSecurityGroupIDs: properties.vpcSecurityGroups,
dbInstanceIdentifier: properties.dbInstanceIdentifier!,
characterSetName: properties.characterSetName,
},
});
}
private createPasswordSecret(password: string, logicalId: string): kplus.Secret {
const secret = new kplus.Secret(this.chart, `${logicalId}Secret`);
secret.addStringData(PASSWORD_SECRET_KEY, password);
return secret;
}
}