@@ -14,7 +14,7 @@ let stack: cdk.Stack;
14
14
beforeEach ( ( ) => {
15
15
app = new TestApp ( ) ;
16
16
stack = new cdk . Stack ( app , 'Stack' , {
17
- env : { account : '0123456789012 ' , region : 'eu-west-1' } ,
17
+ env : { account : '123456789012 ' , region : 'eu-west-1' } ,
18
18
} ) ;
19
19
} ) ;
20
20
@@ -44,7 +44,7 @@ describe('ExternalDockerCredential', () => {
44
44
} ) ;
45
45
46
46
test ( 'maximum example includes all expected properties' , ( ) => {
47
- const roleArn = 'arn:aws:iam::0123456789012 :role/MyRole' ;
47
+ const roleArn = 'arn:aws:iam::123456789012 :role/MyRole' ;
48
48
const creds = cdkp . DockerCredential . customRegistry ( 'example.com' , secret , {
49
49
secretUsernameField : 'login' ,
50
50
secretPasswordField : 'pass' ,
@@ -86,7 +86,7 @@ describe('ExternalDockerCredential', () => {
86
86
} ) ;
87
87
88
88
test ( 'grants read access to the secret to the assumeRole if provided' , ( ) => {
89
- const assumeRole = iam . Role . fromRoleArn ( stack , 'Role' , 'arn:aws:iam::0123456789012 :role/MyRole' ) ;
89
+ const assumeRole = iam . Role . fromRoleArn ( stack , 'Role' , 'arn:aws:iam::123456789012 :role/MyRole' ) ;
90
90
const creds = cdkp . DockerCredential . customRegistry ( 'example.com' , secret , { assumeRole } ) ;
91
91
92
92
const user = new iam . User ( stack , 'User' ) ;
@@ -108,7 +108,7 @@ describe('ExternalDockerCredential', () => {
108
108
Statement : [ {
109
109
Action : 'sts:AssumeRole' ,
110
110
Effect : 'Allow' ,
111
- Resource : 'arn:aws:iam::0123456789012 :role/MyRole' ,
111
+ Resource : 'arn:aws:iam::123456789012 :role/MyRole' ,
112
112
} ] ,
113
113
Version : '2012-10-17' ,
114
114
} ,
@@ -117,7 +117,7 @@ describe('ExternalDockerCredential', () => {
117
117
} ) ;
118
118
119
119
test ( 'does not grant any access if the usage does not match' , ( ) => {
120
- const assumeRole = iam . Role . fromRoleArn ( stack , 'Role' , 'arn:aws:iam::0123456789012 :role/MyRole' ) ;
120
+ const assumeRole = iam . Role . fromRoleArn ( stack , 'Role' , 'arn:aws:iam::123456789012 :role/MyRole' ) ;
121
121
const creds = cdkp . DockerCredential . customRegistry ( 'example.com' , secret , {
122
122
assumeRole,
123
123
usages : [ cdkp . DockerCredentialUsage . ASSET_PUBLISHING ] ,
@@ -138,7 +138,7 @@ describe('EcrDockerCredential', () => {
138
138
let repo : ecr . IRepository ;
139
139
140
140
beforeEach ( ( ) => {
141
- repo = ecr . Repository . fromRepositoryArn ( stack , 'Repo' , 'arn:aws:ecr:eu-west-1:0123456789012 :repository/Repo' ) ;
141
+ repo = ecr . Repository . fromRepositoryArn ( stack , 'Repo' , 'arn:aws:ecr:eu-west-1:123456789012 :repository/Repo' ) ;
142
142
} ) ;
143
143
144
144
test ( 'minimal example only renders ecrRepository' , ( ) => {
@@ -150,7 +150,7 @@ describe('EcrDockerCredential', () => {
150
150
'Fn::Select' : [
151
151
0 , {
152
152
'Fn::Split' : [ '/' , {
153
- 'Fn::Join' : [ '' , [ '0123456789012 .dkr.ecr.eu-west-1.' , { Ref : 'AWS::URLSuffix' } , '/Repo' ] ] ,
153
+ 'Fn::Join' : [ '' , [ '123456789012 .dkr.ecr.eu-west-1.' , { Ref : 'AWS::URLSuffix' } , '/Repo' ] ] ,
154
154
} ] ,
155
155
} ,
156
156
] ,
@@ -161,7 +161,7 @@ describe('EcrDockerCredential', () => {
161
161
} ) ;
162
162
163
163
test ( 'maximum example renders all fields' , ( ) => {
164
- const roleArn = 'arn:aws:iam::0123456789012 :role/MyRole' ;
164
+ const roleArn = 'arn:aws:iam::123456789012 :role/MyRole' ;
165
165
const creds = cdkp . DockerCredential . ecr ( [ repo ] , {
166
166
assumeRole : iam . Role . fromRoleArn ( stack , 'Role' , roleArn ) ,
167
167
usages : [ cdkp . DockerCredentialUsage . SYNTH ] ,
@@ -173,7 +173,7 @@ describe('EcrDockerCredential', () => {
173
173
'Fn::Select' : [
174
174
0 , {
175
175
'Fn::Split' : [ '/' , {
176
- 'Fn::Join' : [ '' , [ '0123456789012 .dkr.ecr.eu-west-1.' , { Ref : 'AWS::URLSuffix' } , '/Repo' ] ] ,
176
+ 'Fn::Join' : [ '' , [ '123456789012 .dkr.ecr.eu-west-1.' , { Ref : 'AWS::URLSuffix' } , '/Repo' ] ] ,
177
177
} ] ,
178
178
} ,
179
179
] ,
@@ -201,7 +201,7 @@ describe('EcrDockerCredential', () => {
201
201
'ecr:BatchGetImage' ,
202
202
] ,
203
203
Effect : 'Allow' ,
204
- Resource : 'arn:aws:ecr:eu-west-1:0123456789012 :repository/Repo' ,
204
+ Resource : 'arn:aws:ecr:eu-west-1:123456789012 :repository/Repo' ,
205
205
} ,
206
206
{
207
207
Action : 'ecr:GetAuthorizationToken' ,
@@ -215,7 +215,7 @@ describe('EcrDockerCredential', () => {
215
215
} ) ;
216
216
217
217
test ( 'grants pull access to the assumed role' , ( ) => {
218
- const assumeRole = iam . Role . fromRoleArn ( stack , 'Role' , 'arn:aws:iam::0123456789012 :role/MyRole' ) ;
218
+ const assumeRole = iam . Role . fromRoleArn ( stack , 'Role' , 'arn:aws:iam::123456789012 :role/MyRole' ) ;
219
219
const creds = cdkp . DockerCredential . ecr ( [ repo ] , { assumeRole } ) ;
220
220
221
221
const user = new iam . User ( stack , 'User' ) ;
@@ -230,7 +230,7 @@ describe('EcrDockerCredential', () => {
230
230
'ecr:BatchGetImage' ,
231
231
] ,
232
232
Effect : 'Allow' ,
233
- Resource : 'arn:aws:ecr:eu-west-1:0123456789012 :repository/Repo' ,
233
+ Resource : 'arn:aws:ecr:eu-west-1:123456789012 :repository/Repo' ,
234
234
} ,
235
235
{
236
236
Action : 'ecr:GetAuthorizationToken' ,
@@ -246,7 +246,7 @@ describe('EcrDockerCredential', () => {
246
246
Statement : [ {
247
247
Action : 'sts:AssumeRole' ,
248
248
Effect : 'Allow' ,
249
- Resource : 'arn:aws:iam::0123456789012 :role/MyRole' ,
249
+ Resource : 'arn:aws:iam::123456789012 :role/MyRole' ,
250
250
} ] ,
251
251
Version : '2012-10-17' ,
252
252
} ,
@@ -255,7 +255,7 @@ describe('EcrDockerCredential', () => {
255
255
} ) ;
256
256
257
257
test ( 'grants pull access to multiple repos if provided' , ( ) => {
258
- const repo2 = ecr . Repository . fromRepositoryArn ( stack , 'Repo2' , 'arn:aws:ecr:eu-west-1:0123456789012 :repository/Repo2' ) ;
258
+ const repo2 = ecr . Repository . fromRepositoryArn ( stack , 'Repo2' , 'arn:aws:ecr:eu-west-1:123456789012 :repository/Repo2' ) ;
259
259
const creds = cdkp . DockerCredential . ecr ( [ repo , repo2 ] ) ;
260
260
261
261
const user = new iam . User ( stack , 'User' ) ;
@@ -270,7 +270,7 @@ describe('EcrDockerCredential', () => {
270
270
'ecr:BatchGetImage' ,
271
271
] ,
272
272
Effect : 'Allow' ,
273
- Resource : 'arn:aws:ecr:eu-west-1:0123456789012 :repository/Repo' ,
273
+ Resource : 'arn:aws:ecr:eu-west-1:123456789012 :repository/Repo' ,
274
274
} ,
275
275
{
276
276
Action : 'ecr:GetAuthorizationToken' ,
@@ -284,7 +284,7 @@ describe('EcrDockerCredential', () => {
284
284
'ecr:BatchGetImage' ,
285
285
] ,
286
286
Effect : 'Allow' ,
287
- Resource : 'arn:aws:ecr:eu-west-1:0123456789012 :repository/Repo2' ,
287
+ Resource : 'arn:aws:ecr:eu-west-1:123456789012 :repository/Repo2' ,
288
288
} ] ) ,
289
289
Version : '2012-10-17' ,
290
290
} ,
@@ -324,7 +324,7 @@ describe('EcrDockerCredential', () => {
324
324
} ) ;
325
325
326
326
describe ( 'dockerCredentialsInstallCommands' , ( ) => {
327
- const secretArn = 'arn:aws:secretsmanager:eu-west-1:0123456789012 :secret:mySecret-012345' ;
327
+ const secretArn = 'arn:aws:secretsmanager:eu-west-1:123456789012 :secret:mySecret-012345' ;
328
328
let secret : secretsmanager . ISecret ;
329
329
330
330
beforeEach ( ( ) => {
0 commit comments