Skip to content

Commit b72a68e

Browse files
author
github-actions
committed
chore: self mutation
Signed-off-by: github-actions <[email protected]>
1 parent 4c6313b commit b72a68e

File tree

9 files changed

+27
-27
lines changed

9 files changed

+27
-27
lines changed

src/constructs/dlz-control-tower-control/control-tower-control.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ export class DlzControlTowerEnabledControl implements IReportResource {
3030

3131
constructor(scope: Construct, id: string, props: DlzControlTowerEnabledControlProps) {
3232

33-
let parameters: {key: string; value: any}[] | undefined = undefined;
33+
let parameters: { key: string; value: any }[] | undefined = undefined;
3434
if (props.control.parameters) {
3535
parameters = Object.entries(props.control.parameters).map(([key, value]) => {
3636
return {

src/constructs/dlz-control-tower-control/controls/index.ts

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -54,25 +54,25 @@ export interface IDlzControlTowerControl {
5454
* Controls that do not take parameters
5555
*/
5656
export enum DlzControlTowerStandardControls {
57-
'AWS_GR_MFA_ENABLED_FOR_IAM_CONSOLE_ACCESS' = 'AWS-GR_MFA_ENABLED_FOR_IAM_CONSOLE_ACCESS',
58-
'AWS_GR_ENCRYPTED_VOLUMES' = 'AWS-GR_ENCRYPTED_VOLUMES',
59-
'AWS_GR_RDS_INSTANCE_PUBLIC_ACCESS_CHECK' = 'AWS-GR_RDS_INSTANCE_PUBLIC_ACCESS_CHECK',
60-
'AWS_GR_RDS_SNAPSHOTS_PUBLIC_PROHIBITED' = 'AWS-GR_RDS_SNAPSHOTS_PUBLIC_PROHIBITED',
61-
'AWS_GR_RDS_STORAGE_ENCRYPTED' = 'AWS-GR_RDS_STORAGE_ENCRYPTED',
62-
'AWS_GR_RESTRICTED_SSH' = 'AWS-GR_RESTRICTED_SSH',
63-
'AWS_GR_RESTRICT_ROOT_USER' = 'AWS-GR_RESTRICT_ROOT_USER',
64-
'AWS_GR_RESTRICT_ROOT_USER_ACCESS_KEYS' = 'AWS-GR_RESTRICT_ROOT_USER_ACCESS_KEYS',
65-
'AWS_GR_ROOT_ACCOUNT_MFA_ENABLED' = 'AWS-GR_ROOT_ACCOUNT_MFA_ENABLED',
66-
'AWS_GR_S3_BUCKET_PUBLIC_READ_PROHIBITED' = 'AWS-GR_S3_BUCKET_PUBLIC_READ_PROHIBITED',
67-
'AWS_GR_S3_BUCKET_PUBLIC_WRITE_PROHIBITED' = 'AWS-GR_S3_BUCKET_PUBLIC_WRITE_PROHIBITED',
68-
'SH_SECRETS_MANAGER_3' = 'SH.SecretsManager.3',
57+
AWS_GR_MFA_ENABLED_FOR_IAM_CONSOLE_ACCESS = 'AWS-GR_MFA_ENABLED_FOR_IAM_CONSOLE_ACCESS',
58+
AWS_GR_ENCRYPTED_VOLUMES = 'AWS-GR_ENCRYPTED_VOLUMES',
59+
AWS_GR_RDS_INSTANCE_PUBLIC_ACCESS_CHECK = 'AWS-GR_RDS_INSTANCE_PUBLIC_ACCESS_CHECK',
60+
AWS_GR_RDS_SNAPSHOTS_PUBLIC_PROHIBITED = 'AWS-GR_RDS_SNAPSHOTS_PUBLIC_PROHIBITED',
61+
AWS_GR_RDS_STORAGE_ENCRYPTED = 'AWS-GR_RDS_STORAGE_ENCRYPTED',
62+
AWS_GR_RESTRICTED_SSH = 'AWS-GR_RESTRICTED_SSH',
63+
AWS_GR_RESTRICT_ROOT_USER = 'AWS-GR_RESTRICT_ROOT_USER',
64+
AWS_GR_RESTRICT_ROOT_USER_ACCESS_KEYS = 'AWS-GR_RESTRICT_ROOT_USER_ACCESS_KEYS',
65+
AWS_GR_ROOT_ACCOUNT_MFA_ENABLED = 'AWS-GR_ROOT_ACCOUNT_MFA_ENABLED',
66+
AWS_GR_S3_BUCKET_PUBLIC_READ_PROHIBITED = 'AWS-GR_S3_BUCKET_PUBLIC_READ_PROHIBITED',
67+
AWS_GR_S3_BUCKET_PUBLIC_WRITE_PROHIBITED = 'AWS-GR_S3_BUCKET_PUBLIC_WRITE_PROHIBITED',
68+
SH_SECRETS_MANAGER_3 = 'SH.SecretsManager.3',
6969
}
7070

7171
/**
7272
* Controls that take parameters
7373
*/
7474
export enum DlzControlTowerSpecializedControls {
75-
'CT_MULTISERVICE_PV_1' = 'CT.MULTISERVICE.PV.1',
75+
CT_MULTISERVICE_PV_1 = 'CT.MULTISERVICE.PV.1',
7676
}
7777

7878

src/constructs/dlz-lake-formation/actions.ts

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ export enum DatabaseAction {
22
DESCRIBE = 'DESCRIBE',
33
ALTER = 'ALTER',
44
DROP = 'DROP',
5-
CREATE_TABLE = 'CREATE_TABLE'
5+
CREATE_TABLE = 'CREATE_TABLE',
66
}
77

88
export enum TableAction {
@@ -11,14 +11,14 @@ export enum TableAction {
1111
DELETE = 'DELETE',
1212
INSERT = 'INSERT',
1313
DROP = 'DROP',
14-
ALTER = 'ALTER'
14+
ALTER = 'ALTER',
1515
}
1616

1717
export enum TagAction {
1818
DESCRIBE = 'DESCRIBE',
1919
ASSOCIATE = 'ASSOCIATE',
2020
ALTER = 'ALTER',
21-
DROP = 'DROP'
21+
DROP = 'DROP',
2222
}
2323

24-
export type TagActionExternal = Exclude<TagAction, 'ALTER' | 'DROP'>
24+
export type TagActionExternal = Exclude<TagAction, 'ALTER' | 'DROP'>;

src/data-landing-zone-types.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ export function DlzAllRegions(regions: DlzRegions): Region[] {
201201
export enum DlzAccountType {
202202
// SANDBOX = 'sandbox',
203203
DEVELOP = 'development',
204-
PRODUCTION = 'production'
204+
PRODUCTION = 'production',
205205
}
206206

207207
export interface DLzManagementAccount {

src/defaults.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ import { DataLandingZoneProps, ForceNoPythonArgumentLifting, Region } from './da
99
export enum IamIdentityAccounts {
1010
ROOT = 'dlz:root',
1111
SECURITY_LOG = 'dlz:security:log',
12-
SECURITY_AUDIT = 'dlz:security:audit'
12+
SECURITY_AUDIT = 'dlz:security:audit',
1313
}
1414

1515
export enum IamIdentityPermissionSets {

src/lib/ts-utils.ts

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ export function kebabToCamelCase(input: string): string {
88
}).join('');
99
}
1010

11-
export function groupByField<T>(items: T[], field: keyof T): {[key: string]: T[]} {
12-
return items.reduce<{[key: string]: T[]}>((acc, item) => {
11+
export function groupByField<T>(items: T[], field: keyof T): { [key: string]: T[] } {
12+
return items.reduce<{ [key: string]: T[] }>((acc, item) => {
1313
const key = String(item[field]);
1414
if (!acc[key]) {
1515
acc[key] = [];
@@ -18,8 +18,8 @@ export function groupByField<T>(items: T[], field: keyof T): {[key: string]: T[]
1818
return acc;
1919
}, {});
2020
}
21-
export function groupByFieldByFunction<T>(items: T[], keyFunction: (item : T) => string): {[key: string]: T[]} {
22-
return items.reduce<{[key: string]: T[]}>((acc, item) => {
21+
export function groupByFieldByFunction<T>(items: T[], keyFunction: (item : T) => string): { [key: string]: T[] } {
22+
return items.reduce<{ [key: string]: T[] }>((acc, item) => {
2323
const key = keyFunction(item);
2424
if (!acc[key]) {
2525
acc[key] = [];

src/stacks/organization/workloads/network-connections-phase-3-stack/shared.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ type SourcePeeringConnectionProps = {
99
sourceRegion: string;
1010
sourceVpc: NetworkEntityVpc;
1111
destinationVpc: NetworkEntityVpc;
12-
}
12+
};
1313

1414
export class Shared {
1515

test/helpers.test.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ export function findDlzSsmReaderLogicalId(template: Template, accountId: string,
102102
}
103103

104104
export function getResourceLogicalIdFromProperties(template: Template, resource: string,
105-
properties: {[key: string]: any}) {
105+
properties: { [key: string]: any }) {
106106
const foundResources = Object.entries(template.findResources(resource))
107107
.map(([key, value]) => {
108108
return { logicalId: key, ...value };

test/vpc-peering.test.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ type RoutesPeeringConnectionProps = {
197197
region: 'global' | 'regional';
198198
fromVpcAddress: string;
199199
toVpcAddress: string;
200-
}
200+
};
201201
function ncp3CheckRoutes(dlzResources: DlzResources,
202202
routesAccount: 'prod' | 'dev', routesRegion: 'global' | 'regional',
203203
routeTablePartialAddress: string,

0 commit comments

Comments
 (0)