Skip to content

Commit bdbfc2a

Browse files
committed
Fixed prettier formatting
1 parent 5216720 commit bdbfc2a

File tree

51 files changed

+144
-104
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+144
-104
lines changed

src/core/runtime/src/configuration/load-organizations-config.ts

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,14 @@ export const handler = async (input: LoadConfigurationInput): Promise<LoadOrgani
4444
console.log(`Loading Organization baseline configuration...`);
4545
console.log(JSON.stringify(input, null, 2));
4646

47-
const { configFilePath, configRepositoryName, configCommitId, acceleratorPrefix, parametersTableName, baseline } =
48-
input;
47+
const {
48+
configFilePath,
49+
configRepositoryName,
50+
configCommitId,
51+
acceleratorPrefix,
52+
parametersTableName,
53+
baseline,
54+
} = input;
4955

5056
// Retrieve Configuration from Code Commit with specific commitId
5157
const config = await loadAcceleratorConfig({

src/core/runtime/src/enable-directory-sharing-step.ts

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,14 @@ export const handler = async (input: ShareDirectoryInput) => {
3434
console.log(`Sharing MAD to another account ...`);
3535
console.log(JSON.stringify(input, null, 2));
3636

37-
const { parametersTableName, assumeRoleName, configRepositoryName, configFilePath, configCommitId, outputTableName } =
38-
input;
37+
const {
38+
parametersTableName,
39+
assumeRoleName,
40+
configRepositoryName,
41+
configFilePath,
42+
configCommitId,
43+
outputTableName,
44+
} = input;
3945

4046
const accounts = await loadAccounts(parametersTableName, dynamodb);
4147
// Retrieve Configuration from Code Commit with specific commitId

src/core/runtime/src/store-commit-id-step.ts

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -115,8 +115,13 @@ async function updateCidrs(params: {
115115
outputTableName: string;
116116
parametersTableName: string;
117117
}) {
118-
const { config, outputTableName, parametersTableName, subnetCidrPoolAssignedTable, vpcCidrPoolAssignedTable } =
119-
params;
118+
const {
119+
config,
120+
outputTableName,
121+
parametersTableName,
122+
subnetCidrPoolAssignedTable,
123+
vpcCidrPoolAssignedTable,
124+
} = params;
120125
const assignedVpcCidrPools = await loadAssignedVpcCidrPool(vpcCidrPoolAssignedTable);
121126
const assignedSubnetCidrPools = await loadAssignedSubnetCidrPool(subnetCidrPoolAssignedTable);
122127
const outputs = await loadOutputs(outputTableName, dynamodb);

src/deployments/cdk/src/common/nacl.ts

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,9 +82,8 @@ export class Nacl extends cdk.Construct {
8282
const ruleResolvedVpcConfig = vpcConfigs.find(
8383
x => x.vpcConfig.name === cidr.vpc && x.accountKey === vpcAccountKey,
8484
);
85-
const ruleVpcConfig = vpcConfigs.find(
86-
x => x.vpcConfig.name === cidr.vpc && x.accountKey === vpcAccountKey,
87-
)?.vpcConfig;
85+
const ruleVpcConfig = vpcConfigs.find(x => x.vpcConfig.name === cidr.vpc && x.accountKey === vpcAccountKey)
86+
?.vpcConfig;
8887
if (!ruleVpcConfig) {
8988
console.warn(`VPC Not Found in Config "${cidr.vpc}"`);
9089
continue;

src/deployments/cdk/src/deployments/alb/step-4.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ export async function step4(props: ElbStep4Props) {
8282
console.warn(`Didn't find vpc endpoint output for "${accountKey}/${vpcConfig.name}/${subnetDef.az}"`);
8383
continue;
8484
}
85-
const destinationCidrBlock = routeConfig.destination as unknown as string;
85+
const destinationCidrBlock = (routeConfig.destination as unknown) as string;
8686
new ec2.CfnRoute(
8787
accountStack,
8888
`Gwlb-route-${vpcConfig.name}-${subnetConfig.name}-${subnetDef.az}-${destinationCidrBlock}`,

src/deployments/cdk/src/deployments/config/create.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -451,6 +451,6 @@ async function downloadCustomRules(
451451
Bucket: bucketName,
452452
Key: `${rulePrefix}/${configRuleRuntime}`,
453453
});
454-
fs.writeFileSync(path.join(configRulesTempDir, configRuleRuntime), runtimeFile as unknown as Buffer);
454+
fs.writeFileSync(path.join(configRulesTempDir, configRuleRuntime), (runtimeFile as unknown) as Buffer);
455455
}
456456
}

src/deployments/cdk/src/deployments/defaults/outputs.ts

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,10 @@ export namespace LogBucketOutput {
192192
});
193193
}
194194

195-
export function getBucketDetails(props: { config: AcceleratorConfig; outputs: StackOutput[] }): {
195+
export function getBucketDetails(props: {
196+
config: AcceleratorConfig;
197+
outputs: StackOutput[];
198+
}): {
196199
arn: string;
197200
name: string;
198201
} {

src/lib/cdk-accelerator/src/core/secrets-container.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,8 @@ export class SecretsContainer extends cdk.Construct {
5858

5959
this.encryptionKey.addToResourcePolicy(
6060
new iam.PolicyStatement({
61-
sid: 'Allow access through AWS Secrets Manager for all principals in the account that are authorized to use AWS Secrets Manager',
61+
sid:
62+
'Allow access through AWS Secrets Manager for all principals in the account that are authorized to use AWS Secrets Manager',
6263
effect: iam.Effect.ALLOW,
6364
actions: [
6465
'kms:Encrypt',

src/lib/cdk-constructs/src/firewall/instance.ts

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -134,8 +134,15 @@ export class FirewallInstance extends cdk.Construct {
134134
vpnTunnelOptions?: FirewallVpnTunnelOptions;
135135
additionalReplacements?: { [key: string]: string };
136136
}): ec2.CfnNetworkInterface {
137-
const { name, securityGroup, subnet, privateStaticIp, eipAllocationId, vpnTunnelOptions, additionalReplacements } =
138-
props;
137+
const {
138+
name,
139+
securityGroup,
140+
subnet,
141+
privateStaticIp,
142+
eipAllocationId,
143+
vpnTunnelOptions,
144+
additionalReplacements,
145+
} = props;
139146
const index = this.networkInterfacesProps.length;
140147

141148
// Create network interface

src/lib/cdk-constructs/src/s3/bucket-replication.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ export class BucketReplication extends cdk.Construct {
4646
this.bucket = props.bucket;
4747
this.s3PutReplicationRole = props.s3PutReplicationRole;
4848
// Get the underlying resource
49-
this.resource = props.bucket as unknown as s3.CfnBucket;
49+
this.resource = (props.bucket as unknown) as s3.CfnBucket;
5050
}
5151

5252
replicateFrom(principals: iam.IPrincipal[], organizationId: string, prefix: string) {

0 commit comments

Comments
 (0)