Skip to content

Commit ad7b0f8

Browse files
committed
fixed linting errors
1 parent 63f7214 commit ad7b0f8

File tree

6 files changed

+17
-11
lines changed

6 files changed

+17
-11
lines changed

.prettierignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
reference-artifacts/Custom-Scripts/Pre-migration*

src/core/runtime/src/create-config-recorder/create.ts

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,12 @@ export const handler = async (input: ConfigServiceInput): Promise<string[]> => {
259259
`Config Aggregrator '${aggregatorName}' found in '${accountKey}' and config-aggr is false. Deleting...'`,
260260
);
261261
if (!migrationEnabled) {
262-
const disableAggregator = await deleteAggregator(configService, accountId, centralSecurityRegion, aggregatorName);
262+
const disableAggregator = await deleteAggregator(
263+
configService,
264+
accountId,
265+
centralSecurityRegion,
266+
aggregatorName,
267+
);
263268
errors.push(...disableAggregator);
264269
}
265270
}

src/lib/cdk-accelerator/src/core/secrets-container.ts

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -91,12 +91,12 @@ export class SecretsContainer extends Construct {
9191
// The secret needs a physical name to enable cross account sharing
9292
encryptionKey: this.encryptionKey,
9393
});
94-
secret.addToResourcePolicy(
95-
new iam.PolicyStatement({
96-
actions: props.actions ?? ['secretsmanager:GetSecretValue'],
97-
resources: ['*'],
98-
principals: props.principals,
99-
}),
94+
secret.addToResourcePolicy(
95+
new iam.PolicyStatement({
96+
actions: props.actions ?? ['secretsmanager:GetSecretValue'],
97+
resources: ['*'],
98+
principals: props.principals,
99+
}),
100100
);
101101
// Keep track of the principals that need access so we can add them later to the key policy
102102
this.principals.push(...props.principals);

src/lib/custom-resources/cdk-cur-report-definition/runtime/src/index.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ import { errorHandler } from '@aws-accelerator/custom-resource-runtime-cfn-respo
1818
import { throttlingBackOff } from '@aws-accelerator/custom-resource-cfn-utils';
1919

2020
export type HandlerProperties = {
21-
ReportDefinition: AWS.CUR.ReportDefinition,
22-
}
21+
ReportDefinition: AWS.CUR.ReportDefinition;
22+
};
2323

2424
export const handler = errorHandler(onEvent);
2525
const migrationEnabled = JSON.parse((process.env.MIGRATION_ENABLED ?? 'false').toLowerCase());

src/lib/custom-resources/cdk-ec2-modify-transit-gateway-attachment/runtime/src/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ async function onCreateOrUpdate(event: CloudFormationCustomResourceEvent) {
8282
async function onDelete(event: CloudFormationCustomResourceDeleteEvent) {
8383
console.log(`Deleting Log Group Metric filter...`);
8484
if (migrationEnabled) {
85-
console.log ('Skipping deletion. Migration enabled.');
85+
console.log('Skipping deletion. Migration enabled.');
8686
return;
8787
}
8888
console.log(JSON.stringify(event, null, 2));

src/lib/custom-resources/cdk-iam-create-role/runtime/src/index.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ async function onUpdate(event: CloudFormationCustomResourceEvent) {
9191

9292
async function onDelete(event: CloudFormationCustomResourceDeleteEvent) {
9393
if (migrationEnabled) {
94-
console.log('Skipping delete. Migration enabled.')
94+
console.log('Skipping delete. Migration enabled.');
9595
return;
9696
}
9797
console.log(`Deleting role`);

0 commit comments

Comments
 (0)