From 8a216671031c6991af24536be5d2fd215476e111 Mon Sep 17 00:00:00 2001 From: Michael Li Date: Mon, 27 Feb 2023 18:32:57 -0500 Subject: [PATCH] linter: Spacing --- .../e2e/tests/credential-store-static.spec.js | 6 ++--- .../e2e/tests/credential-store-vault.spec.js | 24 +++++++++---------- .../e2e/tests/dynamic-host-catalog.spec.js | 12 +++++----- 3 files changed, 21 insertions(+), 21 deletions(-) diff --git a/ui/admin/tests/e2e/tests/credential-store-static.spec.js b/ui/admin/tests/e2e/tests/credential-store-static.spec.js index 0ed5a1f672..cad195cc93 100644 --- a/ui/admin/tests/e2e/tests/credential-store-static.spec.js +++ b/ui/admin/tests/e2e/tests/credential-store-static.spec.js @@ -132,9 +132,9 @@ test('Static Credential Store (User & Key Pair)', async ({ page }) => { if (process.env.E2E_SSH_USER != retrievedUser) { throw new Error( 'Stored User does not match. EXPECTED: ' + - process.env.E2E_SSH_USER + - ', ACTUAL: ' + - retrievedUser + process.env.E2E_SSH_USER + + ', ACTUAL: ' + + retrievedUser ); } if (keyData != retrievedKey) { diff --git a/ui/admin/tests/e2e/tests/credential-store-vault.spec.js b/ui/admin/tests/e2e/tests/credential-store-vault.spec.js index 46eb428323..7dabf31778 100644 --- a/ui/admin/tests/e2e/tests/credential-store-vault.spec.js +++ b/ui/admin/tests/e2e/tests/credential-store-vault.spec.js @@ -54,8 +54,8 @@ test('Vault Credential Store (User & Key Pair)', async ({ page }) => { execSync(`vault secrets enable -path=${secretsPath} kv-v2`); execSync( `vault kv put -mount ${secretsPath} ${secretName} ` + - ` username=${process.env.E2E_SSH_USER}` + - ` private_key=@${process.env.E2E_SSH_KEY_PATH}` + ` username=${process.env.E2E_SSH_USER}` + + ` private_key=@${process.env.E2E_SSH_KEY_PATH}` ); execSync( `vault policy write ${secretPolicyName} ./tests/e2e/tests/fixtures/kv-policy.hcl` @@ -63,13 +63,13 @@ test('Vault Credential Store (User & Key Pair)', async ({ page }) => { const vaultToken = JSON.parse( execSync( `vault token create` + - ` -no-default-policy=true` + - ` -policy=${boundaryPolicyName}` + - ` -policy=${secretPolicyName}` + - ` -orphan=true` + - ` -period=20m` + - ` -renewable=true` + - ` -format=json` + ` -no-default-policy=true` + + ` -policy=${boundaryPolicyName}` + + ` -policy=${secretPolicyName}` + + ` -orphan=true` + + ` -period=20m` + + ` -renewable=true` + + ` -format=json` ) ); const clientToken = vaultToken.auth.client_token; @@ -170,9 +170,9 @@ test('Vault Credential Store (User & Key Pair)', async ({ page }) => { if (process.env.E2E_SSH_USER != retrievedUser) { throw new Error( 'Stored User does not match. EXPECTED: ' + - process.env.E2E_SSH_USER + - ', ACTUAL: ' + - retrievedUser + process.env.E2E_SSH_USER + + ', ACTUAL: ' + + retrievedUser ); } if (keyData != retrievedKey) { diff --git a/ui/admin/tests/e2e/tests/dynamic-host-catalog.spec.js b/ui/admin/tests/e2e/tests/dynamic-host-catalog.spec.js index c6151cae8e..13d5c778e9 100644 --- a/ui/admin/tests/e2e/tests/dynamic-host-catalog.spec.js +++ b/ui/admin/tests/e2e/tests/dynamic-host-catalog.spec.js @@ -123,9 +123,9 @@ test.describe('AWS', async () => { if (!hostsAreVisible) { throw new Error( 'Hosts are not visible. EXPECTED: ' + - expectedHosts.length + - ', ACTUAL: ' + - rowCount + expectedHosts.length + + ', ACTUAL: ' + + rowCount ); } @@ -211,9 +211,9 @@ test.describe('AWS', async () => { if (!hostsAreVisible) { throw new Error( 'Hosts are not visible. EXPECTED: ' + - expectedHosts.length + - ', ACTUAL: ' + - rowCount + expectedHosts.length + + ', ACTUAL: ' + + rowCount ); } });