DatabaseSecret
- class aws_cdk.aws_rds.DatabaseSecret(scope, id, *, username, dbname=None, encryption_key=None, exclude_characters=None, master_secret=None, replace_on_password_criteria_changes=None, replica_regions=None, secret_name=None)
Bases:
Secret
A database secret.
- Resource:
AWS::SecretsManager::Secret
- ExampleMetadata:
infused
Example:
# Build a data source for AppSync to access the database. # api: appsync.GraphqlApi # Create username and password secret for DB Cluster secret = rds.DatabaseSecret(self, "AuroraSecret", username="clusteradmin" ) # The VPC to place the cluster in vpc = ec2.Vpc(self, "AuroraVpc") # Create the serverless cluster, provide all values needed to customise the database. cluster = rds.ServerlessCluster(self, "AuroraCluster", engine=rds.DatabaseClusterEngine.AURORA_MYSQL, vpc=vpc, credentials={"username": "clusteradmin"}, cluster_identifier="db-endpoint-test", default_database_name="demos" ) rds_dS = api.add_rds_data_source("rds", cluster, secret, "demos") # Set up a resolver for an RDS query. rds_dS.create_resolver("QueryGetDemosRdsResolver", type_name="Query", field_name="getDemosRds", request_mapping_template=appsync.MappingTemplate.from_string(""" { "version": "2018-05-29", "statements": [ "SELECT * FROM demos" ] } """), response_mapping_template=appsync.MappingTemplate.from_string(""" $utils.toJson($utils.rds.toJsonObject($ctx.result)[0]) """) ) # Set up a resolver for an RDS mutation. rds_dS.create_resolver("MutationAddDemoRdsResolver", type_name="Mutation", field_name="addDemoRds", request_mapping_template=appsync.MappingTemplate.from_string(""" { "version": "2018-05-29", "statements": [ "INSERT INTO demos VALUES (:id, :version)", "SELECT * WHERE id = :id" ], "variableMap": { ":id": $util.toJson($util.autoId()), ":version": $util.toJson($ctx.args.version) } } """), response_mapping_template=appsync.MappingTemplate.from_string(""" $utils.toJson($utils.rds.toJsonObject($ctx.result)[1][0]) """) )
- Parameters:
scope (
Construct
) –id (
str
) –username (
str
) – The username.dbname (
Optional
[str
]) – The database name, if not using the default one. Default: - whatever the secret generates after the attach method is runencryption_key (
Optional
[IKey
]) – The KMS key to use to encrypt the secret. Default: default master keyexclude_characters (
Optional
[str
]) – Characters to not include in the generated password. Default: “ %+~`#$&*()|[]{}:;<>?!’/@”"master_secret (
Optional
[ISecret
]) – The master secret which will be used to rotate this secret. Default: - no master secret information will be includedreplace_on_password_criteria_changes (
Optional
[bool
]) – Whether to replace this secret when the criteria for the password change. This is achieved by overriding the logical id of the AWS::SecretsManager::Secret with a hash of the options that influence the password generation. This way a new secret will be created when the password is regenerated and the cluster or instance consuming this secret will have its credentials updated. Default: falsereplica_regions (
Optional
[Sequence
[Union
[ReplicaRegion
,Dict
[str
,Any
]]]]) – A list of regions where to replicate this secret. Default: - Secret is not replicatedsecret_name (
Optional
[str
]) – A name for the secret. Default: - A name is generated by CloudFormation.
Methods
- add_replica_region(region, encryption_key=None)
Adds a replica region for the secret.
- Parameters:
region (
str
) – The name of the region.encryption_key (
Optional
[IKey
]) – The customer-managed encryption key to use for encrypting the secret value.
- Return type:
None
- add_rotation_schedule(id, *, automatically_after=None, hosted_rotation=None, rotate_immediately_on_update=None, rotation_lambda=None)
Adds a rotation schedule to the secret.
- Parameters:
id (
str
) –automatically_after (
Optional
[Duration
]) – Specifies the number of days after the previous rotation before Secrets Manager triggers the next automatic rotation. The minimum value is 4 hours. The maximum value is 1000 days. A value of zero (Duration.days(0)
) will not create RotationRules. Default: Duration.days(30)hosted_rotation (
Optional
[HostedRotation
]) – Hosted rotation. Default: - eitherrotationLambda
orhostedRotation
must be specifiedrotate_immediately_on_update (
Optional
[bool
]) – Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. Default: truerotation_lambda (
Optional
[IFunction
]) – A Lambda function that can rotate the secret. Default: - eitherrotationLambda
orhostedRotation
must be specified
- Return type:
- add_to_resource_policy(statement)
Adds a statement to the IAM resource policy associated with this secret.
If this secret was created in this stack, a resource policy will be automatically created upon the first call to
addToResourcePolicy
. If the secret is imported, then this is a no-op.- Parameters:
statement (
PolicyStatement
) –- Return type:
- apply_removal_policy(policy)
Apply the given removal policy to this resource.
The Removal Policy controls what happens to this resource when it stops being managed by CloudFormation, either because you’ve removed it from the CDK application or because you’ve made a change that requires the resource to be replaced.
The resource can be deleted (
RemovalPolicy.DESTROY
), or left in your AWS account for data recovery and cleanup later (RemovalPolicy.RETAIN
).- Parameters:
policy (
RemovalPolicy
) –- Return type:
None
- attach(target)
Attach a target to this secret.
- Parameters:
target (
ISecretAttachmentTarget
) – The target to attach.- Return type:
- Returns:
An attached secret
- deny_account_root_delete()
Denies the
DeleteSecret
action to all principals within the current account.- Return type:
None
- grant_read(grantee, version_stages=None)
Grants reading the secret value to some role.
- Parameters:
grantee (
IGrantable
) –version_stages (
Optional
[Sequence
[str
]]) –
- Return type:
- grant_write(grantee)
Grants writing and updating the secret value to some role.
- Parameters:
grantee (
IGrantable
) –- Return type:
- secret_value_from_json(json_field)
Interpret the secret as a JSON object and return a field’s value from it as a
SecretValue
.- Parameters:
json_field (
str
) –- Return type:
- to_string()
Returns a string representation of this construct.
- Return type:
str
Attributes
- encryption_key
The customer-managed encryption key that is used to encrypt this secret, if any.
When not specified, the default KMS key for the account and region is being used.
- env
The environment this resource belongs to.
For resources that are created and managed by the CDK (generally, those created by creating new class instances like Role, Bucket, etc.), this is always the same as the environment of the stack they belong to; however, for imported resources (those obtained from static methods like fromRoleArn, fromBucketName, etc.), that might be different than the stack they were imported into.
- exclude_characters
The string of the characters that are excluded in this secret when it is generated.
- node
The tree node.
- secret_arn
The ARN of the secret in AWS Secrets Manager.
Will return the full ARN if available, otherwise a partial arn. For secrets imported by the deprecated
fromSecretName
, it will return thesecretName
.
- secret_full_arn
The full ARN of the secret in AWS Secrets Manager, which is the ARN including the Secrets Manager-supplied 6-character suffix.
This is equal to
secretArn
in most cases, but is undefined when a full ARN is not available (e.g., secrets imported by name).
- secret_name
The name of the secret.
For “owned” secrets, this will be the full resource name (secret name + suffix), unless the ‘@aws-cdk/aws-secretsmanager:parseOwnedSecretName’ feature flag is set.
- secret_value
Retrieve the value of the stored secret as a
SecretValue
.
- stack
The stack in which this resource is defined.
Static Methods
- classmethod from_secret_attributes(scope, id, *, encryption_key=None, secret_complete_arn=None, secret_partial_arn=None)
Import an existing secret into the Stack.
- Parameters:
scope (
Construct
) – the scope of the import.id (
str
) – the ID of the imported Secret in the construct tree.encryption_key (
Optional
[IKey
]) – The encryption key that is used to encrypt the secret, unless the default SecretsManager key is used.secret_complete_arn (
Optional
[str
]) – The complete ARN of the secret in SecretsManager. This is the ARN including the Secrets Manager 6-character suffix. Cannot be used withsecretArn
orsecretPartialArn
.secret_partial_arn (
Optional
[str
]) – The partial ARN of the secret in SecretsManager. This is the ARN without the Secrets Manager 6-character suffix. Cannot be used withsecretArn
orsecretCompleteArn
.
- Return type:
- classmethod from_secret_complete_arn(scope, id, secret_complete_arn)
Imports a secret by complete ARN.
The complete ARN is the ARN with the Secrets Manager-supplied suffix.
- classmethod from_secret_name_v2(scope, id, secret_name)
Imports a secret by secret name.
A secret with this name must exist in the same account & region. Replaces the deprecated
fromSecretName
. Please note this method returns ISecret that only contains partial ARN and could lead to AccessDeniedException when you pass the partial ARN to CLI or SDK to get the secret value. If your secret name ends with a hyphen and 6 characters, you should always use fromSecretCompleteArn() to avoid potential AccessDeniedException.- Parameters:
scope (
Construct
) –id (
str
) –secret_name (
str
) –
- See:
- Return type:
- classmethod from_secret_partial_arn(scope, id, secret_partial_arn)
Imports a secret by partial ARN.
The partial ARN is the ARN without the Secrets Manager-supplied suffix.
- classmethod is_construct(x)
Checks if
x
is a construct.Use this method instead of
instanceof
to properly detectConstruct
instances, even when the construct library is symlinked.Explanation: in JavaScript, multiple copies of the
constructs
library on disk are seen as independent, completely different libraries. As a consequence, the classConstruct
in each copy of theconstructs
library is seen as a different class, and an instance of one class will not test asinstanceof
the other class.npm install
will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of theconstructs
library can be accidentally installed, andinstanceof
will behave unpredictably. It is safest to avoid usinginstanceof
, and using this type-testing method instead.- Parameters:
x (
Any
) – Any object.- Return type:
bool
- Returns:
true if
x
is an object created from a class which extendsConstruct
.
- classmethod is_owned_resource(construct)
Returns true if the construct was created by CDK, and false otherwise.
- Parameters:
construct (
IConstruct
) –- Return type:
bool
- classmethod is_resource(construct)
Check whether the given construct is a Resource.
- Parameters:
construct (
IConstruct
) –- Return type:
bool
- classmethod is_secret(x)
Return whether the given object is a Secret.
- Parameters:
x (
Any
) –- Return type:
bool