Skip to content

Commit 1e2c1ae

Browse files
authored
chore(eslint): enforce spacing at beginning of comments (#33077)
enforces spacing at beginning of comments. we are exempting situations that have `///` because they are special comments that jsii recognizes, and situations that have `////////` to delineate a split of some sport. ### Checklist - [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md) ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
1 parent 6a9cbc2 commit 1e2c1ae

File tree

90 files changed

+365
-360
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

90 files changed

+365
-360
lines changed

packages/@aws-cdk-testing/cli-integ/tests/cli-integ-tests/cli.integtest.ts

+3-2
Original file line numberDiff line numberDiff line change
@@ -361,7 +361,8 @@ integTest('doubly nested stack',
361361
await fixture.cdkDeploy('with-doubly-nested-stack', {
362362
captureStderr: false,
363363
});
364-
}));
364+
}),
365+
);
365366

366367
integTest(
367368
'nested stack with parameters',
@@ -404,7 +405,7 @@ integTest(
404405
);
405406
expect(response.Stacks?.[0].StackStatus).toEqual('REVIEW_IN_PROGRESS');
406407

407-
//verify a change set was created with the provided name
408+
// verify a change set was created with the provided name
408409
const changeSetResponse = await fixture.aws.cloudFormation.send(
409410
new ListChangeSetsCommand({
410411
StackName: stackArn,

packages/@aws-cdk-testing/framework-integ/test/aws-ec2/test/integ.bastion-host-disable-al2023-feature-flag.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ const app = new cdk.App();
1414
class TestStack extends cdk.Stack {
1515
constructor(scope: cdk.App, id: string, props?: cdk.StackProps) {
1616
super(scope, id, props);
17-
this.node.setContext(BASTION_HOST_USE_AMAZON_LINUX_2023_BY_DEFAULT, false); //disable feature flag
17+
this.node.setContext(BASTION_HOST_USE_AMAZON_LINUX_2023_BY_DEFAULT, false); // disable feature flag
1818

1919
const vpc = new ec2.Vpc(this, 'VPC');
2020

packages/@aws-cdk-testing/framework-integ/test/aws-logs/test/integ.loggroupclass.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ const describeInfrequentAccess = integTest.assertions.awsApiCall('CloudWatchLogs
5151
logGroupNamePrefix: logGroupInfrequentAccess.logGroupName,
5252
});
5353

54-
//valdiate
54+
// valdiate
5555
describeInfrequentAccess.expect(ExpectedResult.objectLike({
5656
logGroups: [
5757
{

packages/@aws-cdk-testing/framework-integ/test/aws-stepfunctions-tasks/test/bedrock/integ.invoke-model.ts

+2-2
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ const prompt3 = new BedrockInvokeModel(stack, 'Prompt3', {
7171
});
7272

7373
/** Test for Bedrock s3 URI Path */
74-
//State Machine Execution will fail for the following input as it expects a valid s3 URI from previous prompt
74+
// State Machine Execution will fail for the following input as it expects a valid s3 URI from previous prompt
7575
const prompt4 = new BedrockInvokeModel(stack, 'Prompt4', {
7676
model,
7777
input: { s3InputUri: '$.names' },
@@ -144,7 +144,7 @@ const llamaPrompt3 = new BedrockInvokeModel(stack, 'LlamaPrompt3', {
144144
});
145145

146146
/** Test for Bedrock s3 URI Path */
147-
//State Machine Execution will fail for the following input as it expects a valid s3 URI from previous prompt
147+
// State Machine Execution will fail for the following input as it expects a valid s3 URI from previous prompt
148148
const llamaModel4 = bedrock.FoundationModel.fromFoundationModelId(stack, 'LlamaModel4', bedrock.FoundationModelIdentifier.META_LLAMA_3_2_90B_INSTRUCT_V1);
149149
const llamaPrompt4 = new BedrockInvokeModel(stack, 'LlamaPrompt4', {
150150
model: llamaModel4,

packages/@aws-cdk-testing/framework-integ/test/aws-stepfunctions/test/integ.state-machine-and-activity-cmk.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ const testCase = new IntegTest(app, 'StateMachineAndActivityWithCMKEncryptionCon
4747
testCases: [stack],
4848
});
4949

50-
//Start execution
50+
// Start execution
5151
const start = testCase.assertions.awsApiCall('StepFunctions', 'startExecution', {
5252
stateMachineArn: stack.stateMachine.stateMachineArn,
5353
});

packages/@aws-cdk-testing/framework-integ/test/core/test/integ.cfn-mappings-find-in-map.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ import { IntegTest } from '@aws-cdk/integ-tests-alpha';
44

55
const app = new cdk.App();
66

7-
const stack = new cdk.Stack(app, 'core-cfn-mapping-1'/*,{ env }*/);
7+
const stack = new cdk.Stack(app, 'core-cfn-mapping-1'/* ,{ env }*/);
88

99
const backing = {
1010
TopLevelKey1: {

packages/@aws-cdk/aws-ec2-alpha/lib/ipam.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -344,7 +344,7 @@ class IpamPool extends Resource implements IIpamPool {
344344
throw new Error('awsService is required when addressFamily is set to ipv6');
345345
}
346346

347-
//Add tags to the IPAM Pool if name is provided
347+
// Add tags to the IPAM Pool if name is provided
348348
if (props.ipamPoolName) {
349349
Tags.of(this).add(NAME_TAG, props.ipamPoolName);
350350
}

packages/@aws-cdk/aws-ec2-alpha/lib/route.ts

+2-2
Original file line numberDiff line numberDiff line change
@@ -720,7 +720,7 @@ export class Route extends Resource implements IRouteV2 {
720720
this.destination = props.destination;
721721
const isDestinationIpv4 = NetworkUtils.validIp(props.destination);
722722
if (!isDestinationIpv4) {
723-
//TODO Validate for IPv6 CIDR range
723+
// TODO Validate for IPv6 CIDR range
724724
this.destinationIpv6Cidr = props.destination;
725725
} else {
726726
this.destinationIpv4Cidr = props.destination;
@@ -742,7 +742,7 @@ export class Route extends Resource implements IRouteV2 {
742742
}
743743
this.node.defaultChild = this.resource;
744744

745-
//Create a route only after target gateway or endpoint is created
745+
// Create a route only after target gateway or endpoint is created
746746
if (this.target.gateway) {
747747
this.node.addDependency(this.target.gateway);
748748
}

packages/@aws-cdk/aws-ec2-alpha/lib/subnet-v2.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ export class SubnetV2 extends Resource implements ISubnetV2 {
259259

260260
overlap = validateOverlappingCidrRanges(props.vpc, props.ipv4CidrBlock.cidr);
261261

262-
//check whether VPC supports ipv6
262+
// check whether VPC supports ipv6
263263
if (props.ipv6CidrBlock?.cidr) {
264264
validateSupportIpv6(props.vpc);
265265
overlapIpv6 = validateOverlappingCidrRangesipv6(props.vpc, props.ipv6CidrBlock?.cidr);

packages/@aws-cdk/aws-ec2-alpha/lib/util.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/*eslint no-bitwise: ["error", { "allow": ["~", "|", "<<", "&"] }] */
1+
/* eslint no-bitwise: ["error", { "allow": ["~", "|", "<<", "&"] }] */
22

33
import { ISubnet } from 'aws-cdk-lib/aws-ec2';
44

packages/@aws-cdk/aws-ec2-alpha/lib/vpc-v2-base.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -501,7 +501,7 @@ export abstract class VpcV2Base extends Resource implements IVpcV2 {
501501
routeName: 'CDKDefaultIPv6Route',
502502
});
503503
}
504-
//Add default route to IGW for IPv4
504+
// Add default route to IGW for IPv4
505505
new Route(this, `${subnet.node.id}-DefaultRoute`, {
506506
routeTable: subnet.routeTable,
507507
destination: options?.ipv4Destination ?? '0.0.0.0/0',

packages/@aws-cdk/aws-ec2-alpha/lib/vpc-v2.ts

+9-9
Original file line numberDiff line numberDiff line change
@@ -504,7 +504,7 @@ export class VpcV2 extends VpcV2Base {
504504
this.dnsSupportEnabled = props.enableDnsSupport == null ? true : props.enableDnsSupport;
505505
const instanceTenancy = props.defaultInstanceTenancy || 'default';
506506
this.resource = new CfnVPC(this, 'Resource', {
507-
cidrBlock: vpcOptions.ipv4CidrBlock, //for Ipv4 addresses CIDR block
507+
cidrBlock: vpcOptions.ipv4CidrBlock, // for Ipv4 addresses CIDR block
508508
enableDnsHostnames: this.dnsHostnamesEnabled,
509509
enableDnsSupport: this.dnsSupportEnabled,
510510
ipv4IpamPoolId: vpcOptions.ipv4IpamPool?.ipamPoolId, // for Ipv4 ipam option
@@ -526,7 +526,7 @@ export class VpcV2 extends VpcV2Base {
526526
}, this.stack);
527527
this.region = this.stack.region;
528528
this.ownerAccountId = this.stack.account;
529-
//Add tag to the VPC with the name provided in properties
529+
// Add tag to the VPC with the name provided in properties
530530
Tags.of(this).add(NAME_TAG, props.vpcName || this.node.path);
531531
if (props.secondaryAddressBlocks) {
532532
const secondaryAddressBlocks: IIpAddresses[] = props.secondaryAddressBlocks;
@@ -541,7 +541,7 @@ export class VpcV2 extends VpcV2Base {
541541
if (secondaryVpcOptions.amazonProvided || secondaryVpcOptions.ipv6IpamPool || secondaryVpcOptions.ipv6PoolId) {
542542
this.useIpv6 = true;
543543
}
544-
//validate CIDR ranges per RFC 1918
544+
// validate CIDR ranges per RFC 1918
545545
if (secondaryVpcOptions.ipv4CidrBlock!) {
546546
const ret = validateIpv4address(secondaryVpcOptions.ipv4CidrBlock, this.resource.cidrBlock);
547547
if (ret === false) {
@@ -559,17 +559,17 @@ export class VpcV2 extends VpcV2Base {
559559
ipv6NetmaskLength: secondaryVpcOptions.ipv6NetmaskLength,
560560
ipv6IpamPoolId: secondaryVpcOptions.ipv6IpamPool?.ipamPoolId,
561561
amazonProvidedIpv6CidrBlock: secondaryVpcOptions.amazonProvided,
562-
//BYOIP IPv6 Address
562+
// BYOIP IPv6 Address
563563
ipv6CidrBlock: secondaryVpcOptions?.ipv6CidrBlock,
564-
//BYOIP Pool for IPv6 address
564+
// BYOIP Pool for IPv6 address
565565
ipv6Pool: secondaryVpcOptions?.ipv6PoolId,
566566
});
567567
if (secondaryVpcOptions.dependencies) {
568568
for (const dep of secondaryVpcOptions.dependencies) {
569569
vpcCidrBlock.node.addDependency(dep);
570570
}
571571
}
572-
//Create secondary blocks for Ipv4 and Ipv6
572+
// Create secondary blocks for Ipv4 and Ipv6
573573
this.secondaryCidrBlock?.push(vpcCidrBlock);
574574
}
575575
}
@@ -826,7 +826,7 @@ class VPCCidrBlock extends Resource implements IVPCCidrBlock {
826826
public readonly amazonProvidedIpv6CidrBlock ?: boolean = props.amazonProvidedIpv6CidrBlock;
827827
public readonly ipv6IpamPoolId ?: string = props.ipv6IpamPoolId;
828828
public readonly ipv4IpamPoolId ?: string = props.ipv4IpamPoolId;
829-
//BYOIP Pool Attributes
829+
// BYOIP Pool Attributes
830830
public readonly ipv6Pool?: string = props.ipv6Pool;
831831
public readonly ipv6CidrBlock?: string = props.ipv6CidrBlock;
832832
}
@@ -855,13 +855,13 @@ class VPCCidrBlock extends Resource implements IVPCCidrBlock {
855855
this.ipv6IpamPoolId = props.ipv6IpamPoolId;
856856
this.ipv4IpamPoolId = props.ipv4IpamPoolId;
857857
this.amazonProvidedIpv6CidrBlock = props.amazonProvidedIpv6CidrBlock;
858-
//BYOIP Pool and CIDR Block
858+
// BYOIP Pool and CIDR Block
859859
this.ipv6CidrBlock = props.ipv6CidrBlock;
860860
this.ipv6Pool = props.ipv6Pool;
861861
}
862862
}
863863

864-
//@internal First two Octet to verify RFC 1918
864+
// @internal First two Octet to verify RFC 1918
865865
interface IPaddressConfig {
866866
octet1: number;
867867
octet2: number;

packages/@aws-cdk/aws-ec2-alpha/test/integ.byoip-ipv6.ts

+4-4
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ const myVpc = new vpc_v2.VpcV2(stack, 'VPC-integ-test-1', {
2121
primaryAddressBlock: vpc_v2.IpAddresses.ipv4('10.1.0.0/16'),
2222
secondaryAddressBlocks: [
2323
vpc_v2.IpAddresses.ipv6ByoipPool({
24-
ipv6PoolId: 'ipv6pool-ec2-0a95217e154b65493', //To Be Replaced
24+
ipv6PoolId: 'ipv6pool-ec2-0a95217e154b65493', // To Be Replaced
2525
cidrBlockName: 'MyByoipIpv6Block',
26-
ipv6CidrBlock: '2600:f0f0:8::/56', //To Be Replaced
26+
ipv6CidrBlock: '2600:f0f0:8::/56', // To Be Replaced
2727
}),
2828
],
2929
enableDnsHostnames: true,
@@ -33,7 +33,7 @@ const myVpc = new vpc_v2.VpcV2(stack, 'VPC-integ-test-1', {
3333
new SubnetV2(stack, 'Subnet-integ-test-1', {
3434
vpc: myVpc,
3535
ipv4CidrBlock: new IpCidr('10.1.1.0/24'),
36-
ipv6CidrBlock: new IpCidr('2600:f0f0:8:1::/64'), //To Be Replaced
36+
ipv6CidrBlock: new IpCidr('2600:f0f0:8:1::/64'), // To Be Replaced
3737
availabilityZone: 'us-west-2a',
3838
subnetType: SubnetType.PRIVATE_ISOLATED,
3939
});
@@ -44,7 +44,7 @@ new SubnetV2(stack, 'Subnet-integ-test-1', {
4444
new SubnetV2(stack, 'Subnet-integ-test-2', {
4545
vpc: myVpc,
4646
ipv4CidrBlock: new IpCidr('10.1.0.0/24'),
47-
ipv6CidrBlock: new IpCidr('2600:f0f0:8:0::/64'), //To Be Replaced
47+
ipv6CidrBlock: new IpCidr('2600:f0f0:8:0::/64'), // To Be Replaced
4848
availabilityZone: 'us-west-2a',
4949
subnetType: SubnetType.PRIVATE_ISOLATED,
5050
});

packages/@aws-cdk/aws-ec2-alpha/test/integ.ipam.ts

+3-3
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ const ipam = new Ipam(stack, 'IpamTest', {
2626
operatingRegion: ['us-west-2'],
2727
});
2828

29-
/**Test Ipam Pool Ipv4 */
29+
/** Test Ipam Pool Ipv4 */
3030

3131
const pool1 = ipam.privateScope.addPool('PrivatePool0', {
3232
addressFamily: AddressFamily.IP_V4,
@@ -70,8 +70,8 @@ new SubnetV2(stack, 'testsbubnet', {
7070
vpc,
7171
availabilityZone: 'us-west-2a',
7272
ipv4CidrBlock: new IpCidr('10.0.0.0/24'),
73-
//defined on the basis of allocation done in IPAM console
74-
//ipv6CidrBlock: new Ipv6Cidr('2a05:d02c:25:4000::/60'),
73+
// defined on the basis of allocation done in IPAM console
74+
// ipv6CidrBlock: new Ipv6Cidr('2a05:d02c:25:4000::/60'),
7575
subnetType: SubnetType.PRIVATE_ISOLATED,
7676
});
7777

packages/@aws-cdk/aws-ec2-alpha/test/integ.peering-cross-account.ts

+4-4
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ class AcceptorStack extends cdk.Stack {
5151
primaryAddressBlock: vpc_v2.IpAddresses.ipv4('10.0.0.0/16'),
5252
});
5353

54-
//Same account VPC peering
54+
// Same account VPC peering
5555
const requestorVpc = new vpc_v2.VpcV2(this, 'requestorVpcSameAccount', {
5656
primaryAddressBlock: vpc_v2.IpAddresses.ipv4('10.1.0.0/16'),
5757
});
@@ -60,7 +60,7 @@ class AcceptorStack extends cdk.Stack {
6060
acceptorVpc: acceptorVpc,
6161
});
6262

63-
//For cross-account peering connection
63+
// For cross-account peering connection
6464
acceptorVpc.createAcceptorVpcRole(account);
6565
}
6666
}
@@ -69,9 +69,9 @@ class RequestorStack extends cdk.Stack {
6969
constructor(scope: Construct, id: string, props?: cdk.StackProps) {
7070
super(scope, id, props);
7171

72-
//Import acceptorVpc into the requestor stack, change vpcId after vpc is created using acceptorStack definition
72+
// Import acceptorVpc into the requestor stack, change vpcId after vpc is created using acceptorStack definition
7373
const acceptorVpc = vpc_v2.VpcV2.fromVpcV2Attributes(this, 'acceptorVpc', {
74-
//Replace VPC Id before running integ test again
74+
// Replace VPC Id before running integ test again
7575
vpcId: 'vpc-09b9235d8a3195ba3',
7676
vpcCidrBlock: '10.0.0.0/16',
7777
region: 'us-east-1',

packages/@aws-cdk/aws-ec2-alpha/test/integ.subnet-v2.ts

+3-3
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,12 @@ new SubnetV2(stack, 'testSubnet1', {
3737
vpc,
3838
availabilityZone: 'us-west-2a',
3939
ipv4CidrBlock: new IpCidr('10.1.0.0/20'),
40-
//defined on the basis of allocation done in IPAM console
41-
//ipv6CidrBlock: new Ipv6Cidr('2a05:d02c:25:4000::/60'),
40+
// defined on the basis of allocation done in IPAM console
41+
// ipv6CidrBlock: new Ipv6Cidr('2a05:d02c:25:4000::/60'),
4242
subnetType: SubnetType.PRIVATE_ISOLATED,
4343
});
4444

45-
/**Test compatibility with existing construct */
45+
/** Test compatibility with existing construct */
4646
new ec2.Instance(stack, 'Instance', {
4747
vpc,
4848
instanceType: ec2.InstanceType.of(ec2.InstanceClass.T3, ec2.InstanceSize.MICRO),

packages/@aws-cdk/aws-ec2-alpha/test/integ.test-import.ts

+13-13
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ const stack = new cdk.Stack(app, 'vpcv2-import-integ-test', {
2020
* according to the one alloted on creation
2121
*/
2222
const imported_new_vpc = VpcV2.VpcV2.fromVpcV2Attributes(stack, 'ImportedNewVPC', {
23-
vpcId: 'vpc-08193db3ccc4f909f', //VPC id
23+
vpcId: 'vpc-08193db3ccc4f909f', // VPC id
2424
vpcCidrBlock: '10.1.0.0/16',
2525
secondaryCidrBlocks: [{
2626
cidrBlock: '10.2.0.0/16',
@@ -34,11 +34,11 @@ const imported_new_vpc = VpcV2.VpcV2.fromVpcV2Attributes(stack, 'ImportedNewVPC'
3434
}],
3535
subnets: [{
3636
subnetName: 'IsolatedSubnet2',
37-
subnetId: 'subnet-03cd773c0fe08ed26', //Subnet Id
37+
subnetId: 'subnet-03cd773c0fe08ed26', // Subnet Id
3838
subnetType: SubnetType.PRIVATE_ISOLATED,
3939
availabilityZone: 'us-west-2a',
4040
ipv4CidrBlock: '10.2.0.0/24',
41-
routeTableId: 'rtb-0871c310f98da2cbb', //RouteTable id
41+
routeTableId: 'rtb-0871c310f98da2cbb', // RouteTable id
4242
}, {
4343
subnetId: 'subnet-0fa477e01db27d820',
4444
subnetType: SubnetType.PUBLIC,
@@ -48,22 +48,22 @@ const imported_new_vpc = VpcV2.VpcV2.fromVpcV2Attributes(stack, 'ImportedNewVPC'
4848
}],
4949
});
5050

51-
//Test to add new subnet to imported VPC against secondary range
51+
// Test to add new subnet to imported VPC against secondary range
5252
new SubnetV2(stack, 'AddnewImportedSubnet', {
5353
availabilityZone: 'us-west-2a',
5454
ipv4CidrBlock: new IpCidr('10.2.2.0/24'),
55-
//can be uncommented and modified after allocation is done using Amazon Provided Ipv6
56-
//ipv6CidrBlock: new IpCidr('2600:1f14:b1d:6500::/64'),
55+
// can be uncommented and modified after allocation is done using Amazon Provided Ipv6
56+
// ipv6CidrBlock: new IpCidr('2600:1f14:b1d:6500::/64'),
5757
vpc: imported_new_vpc,
5858
subnetType: SubnetType.PUBLIC,
5959
});
6060

61-
//Test to add new subnet to imported VPC against secondary range
61+
// Test to add new subnet to imported VPC against secondary range
6262
new SubnetV2(stack, 'AddnewImportedSubnet2', {
6363
availabilityZone: 'us-west-2a',
6464
ipv4CidrBlock: new IpCidr('10.3.2.0/24'),
65-
//can be uncommented and modified after allocation is done using Amazon Provided Ipv6
66-
//ipv6CidrBlock: new IpCidr('2600:1f14:b1d:6500::/64'),
65+
// can be uncommented and modified after allocation is done using Amazon Provided Ipv6
66+
// ipv6CidrBlock: new IpCidr('2600:1f14:b1d:6500::/64'),
6767
vpc: imported_new_vpc,
6868
subnetType: SubnetType.PUBLIC,
6969
});
@@ -76,7 +76,7 @@ const ImportedSubnet = SubnetV2.fromSubnetV2Attributes(stack, 'IsolatedSubnet1',
7676
routeTableId: 'rtb-0f02fab3ed3fb4ba9',
7777
});
7878

79-
//Test to add different types of gateways
79+
// Test to add different types of gateways
8080
imported_new_vpc.addInternetGateway();
8181

8282
imported_new_vpc.addNatGateway({
@@ -101,14 +101,14 @@ const ipamvpc = VpcV2.VpcV2.fromVpcV2Attributes(stack, 'ImportedIPAMVPC', {
101101
}],
102102
});
103103

104-
//Test to add different types of gateways
104+
// Test to add different types of gateways
105105
ipamvpc.addEgressOnlyInternetGateway();
106106

107-
//Test to add new subnet to imported VPC against IPAM range
107+
// Test to add new subnet to imported VPC against IPAM range
108108
new SubnetV2(stack, 'AddnewSubnettoImportedIpam', {
109109
availabilityZone: 'us-west-2a',
110110
ipv4CidrBlock: new IpCidr('10.2.1.0/28'),
111-
//can be uncommented and modified after allocation is done using IPAM - Amazon Provided Ipv6
111+
// can be uncommented and modified after allocation is done using IPAM - Amazon Provided Ipv6
112112
ipv6CidrBlock: new IpCidr('2600:1f24:6c:4000::/64'),
113113
vpc: ipamvpc,
114114
subnetType: SubnetType.PUBLIC,

0 commit comments

Comments
 (0)