You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: packages/@aws-cdk/aws-msk-alpha/test/__snapshots__/cluster.test.ts.snap
+87-1Lines changed: 87 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -493,7 +493,7 @@ exports[`MSK Cluster Snapshot test with all values set 1`] = `
493
493
}
494
494
`;
495
495
496
-
exports[`MSK Cluster created with authentication enabled with sasl/iam auth and tls Snapshot test with all values set (iam/sasl) 1`] =`
496
+
exports[`MSK Cluster created with authentication enabled with combinations of sasl/scram, iam, and tls Snapshot test with all values set (iam/scram/tls) 1`] =`
497
497
{
498
498
"Resources": {
499
499
"Vpc8378EB38": {
@@ -915,6 +915,9 @@ exports[`MSK Cluster created with authentication enabled with sasl/iam auth and
915
915
"Iam": {
916
916
"Enabled": true,
917
917
},
918
+
"Scram": {
919
+
"Enabled": true,
920
+
},
918
921
},
919
922
"Tls": {
920
923
"CertificateAuthorityArnList": [
@@ -965,6 +968,89 @@ exports[`MSK Cluster created with authentication enabled with sasl/iam auth and
965
968
"Type": "AWS::MSK::Cluster",
966
969
"UpdateReplacePolicy": "Retain",
967
970
},
971
+
"kafkaSASLKey69FC3AFA": {
972
+
"DeletionPolicy": "Retain",
973
+
"Properties": {
974
+
"Description": "Used for encrypting MSK secrets for SASL/SCRAM authentication.",
975
+
"KeyPolicy": {
976
+
"Statement": [
977
+
{
978
+
"Action": "kms:*",
979
+
"Effect": "Allow",
980
+
"Principal": {
981
+
"AWS": {
982
+
"Fn::Join": [
983
+
"",
984
+
[
985
+
"arn:",
986
+
{
987
+
"Ref": "AWS::Partition",
988
+
},
989
+
":iam::",
990
+
{
991
+
"Ref": "AWS::AccountId",
992
+
},
993
+
":root",
994
+
],
995
+
],
996
+
},
997
+
},
998
+
"Resource": "*",
999
+
},
1000
+
{
1001
+
"Action": [
1002
+
"kms:Encrypt",
1003
+
"kms:Decrypt",
1004
+
"kms:ReEncrypt*",
1005
+
"kms:GenerateDataKey*",
1006
+
"kms:CreateGrant",
1007
+
"kms:DescribeKey",
1008
+
],
1009
+
"Condition": {
1010
+
"StringEquals": {
1011
+
"kms:CallerAccount": {
1012
+
"Ref": "AWS::AccountId",
1013
+
},
1014
+
"kms:ViaService": {
1015
+
"Fn::Join": [
1016
+
"",
1017
+
[
1018
+
"secretsmanager.",
1019
+
{
1020
+
"Ref": "AWS::Region",
1021
+
},
1022
+
".amazonaws.com",
1023
+
],
1024
+
],
1025
+
},
1026
+
},
1027
+
},
1028
+
"Effect": "Allow",
1029
+
"Principal": {
1030
+
"AWS": "*",
1031
+
},
1032
+
"Resource": "*",
1033
+
"Sid": "Allow access through AWS Secrets Manager for all principals in the account that are authorized to use AWS Secrets Manager",
0 commit comments