From a671778b545976c356710872ee1d6d9f4a9167f3 Mon Sep 17 00:00:00 2001 From: Artem Butusov Date: Fri, 30 Jul 2021 17:22:24 -0400 Subject: [PATCH] Fix eslint violations --- .../test/bucket-deployment.test.ts | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/packages/@aws-cdk/aws-s3-deployment/test/bucket-deployment.test.ts b/packages/@aws-cdk/aws-s3-deployment/test/bucket-deployment.test.ts index c03e3a1e641c7..2bbe5e34a41a6 100644 --- a/packages/@aws-cdk/aws-s3-deployment/test/bucket-deployment.test.ts +++ b/packages/@aws-cdk/aws-s3-deployment/test/bucket-deployment.test.ts @@ -349,14 +349,14 @@ test('system metadata is correctly transformed', () => { // type checking structure that forces to update it if BucketAccessControl changes // see `--acl` here: https://docs.aws.amazon.com/cli/latest/reference/s3/sync.html const accessControlMap: Record = { - [s3.BucketAccessControl.PRIVATE]: "private", - [s3.BucketAccessControl.PUBLIC_READ]: "public-read", - [s3.BucketAccessControl.PUBLIC_READ_WRITE]: "public-read-write", - [s3.BucketAccessControl.AUTHENTICATED_READ]: "authenticated-read", - [s3.BucketAccessControl.AWS_EXEC_READ]: "aws-exec-read", - [s3.BucketAccessControl.BUCKET_OWNER_READ]: "bucket-owner-read", - [s3.BucketAccessControl.BUCKET_OWNER_FULL_CONTROL]: "bucket-owner-full-control", - [s3.BucketAccessControl.LOG_DELIVERY_WRITE]: "log-delivery-write" + [s3.BucketAccessControl.PRIVATE]: 'private', + [s3.BucketAccessControl.PUBLIC_READ]: 'public-read', + [s3.BucketAccessControl.PUBLIC_READ_WRITE]: 'public-read-write', + [s3.BucketAccessControl.AUTHENTICATED_READ]: 'authenticated-read', + [s3.BucketAccessControl.AWS_EXEC_READ]: 'aws-exec-read', + [s3.BucketAccessControl.BUCKET_OWNER_READ]: 'bucket-owner-read', + [s3.BucketAccessControl.BUCKET_OWNER_FULL_CONTROL]: 'bucket-owner-full-control', + [s3.BucketAccessControl.LOG_DELIVERY_WRITE]: 'log-delivery-write', }; test.each(Object.entries(accessControlMap) as [s3.BucketAccessControl, string][])( @@ -376,10 +376,10 @@ test.each(Object.entries(accessControlMap) as [s3.BucketAccessControl, string][] // THEN expect(stack).toHaveResource('Custom::CDKBucketDeployment', { SystemMetadata: { - 'acl': systemMetadataKeyword, + acl: systemMetadataKeyword, }, }); - } + }, ); test('expires type has correct values', () => {