Skip to content

Commit e65022f

Browse files
committed
chore: apply formatters and linters
1 parent c303bf3 commit e65022f

File tree

2 files changed

+41
-31
lines changed

2 files changed

+41
-31
lines changed

contract-tests/images/applications/botocore/botocore_server.py

Lines changed: 23 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -251,7 +251,11 @@ def _handle_bedrock_request(self) -> None:
251251
set_main_status(200)
252252
bedrock_client.meta.events.register(
253253
"before-call.bedrock.GetGuardrail",
254-
lambda **kwargs: inject_200_success(guardrailId="bt4o77i015cu", guardrailArn="arn:aws:bedrock:us-east-1:000000000000:guardrail/bt4o77i015cu", **kwargs),
254+
lambda **kwargs: inject_200_success(
255+
guardrailId="bt4o77i015cu",
256+
guardrailArn="arn:aws:bedrock:us-east-1:000000000000:guardrail/bt4o77i015cu",
257+
**kwargs,
258+
),
255259
)
256260
bedrock_client.get_guardrail(
257261
guardrailIdentifier="arn:aws:bedrock:us-east-1:000000000000:guardrail/bt4o77i015cu"
@@ -320,7 +324,9 @@ def _handle_secretsmanager_request(self) -> None:
320324
elif self.in_path(_FAULT):
321325
set_main_status(500)
322326
try:
323-
fault_client = boto3.client("secretsmanager", endpoint_url=_FAULT_ENDPOINT, region_name=_AWS_REGION, config=_NO_RETRY_CONFIG)
327+
fault_client = boto3.client(
328+
"secretsmanager", endpoint_url=_FAULT_ENDPOINT, region_name=_AWS_REGION, config=_NO_RETRY_CONFIG
329+
)
324330
fault_client.get_secret_value(
325331
SecretId="arn:aws:secretsmanager:us-west-2:000000000000:secret:nonexistent-secret"
326332
)
@@ -338,7 +344,9 @@ def _handle_stepfunctions_request(self) -> None:
338344
set_main_status(400)
339345
try:
340346
error_client = boto3.client("stepfunctions", endpoint_url=_ERROR_ENDPOINT, region_name=_AWS_REGION)
341-
error_client.describe_state_machine(stateMachineArn="arn:aws:states:us-west-2:000000000000:stateMachine:unExistStateMachine")
347+
error_client.describe_state_machine(
348+
stateMachineArn="arn:aws:states:us-west-2:000000000000:stateMachine:unExistStateMachine"
349+
)
342350
except Exception as exception:
343351
print("Expected exception occurred", exception)
344352
elif self.in_path(_FAULT):
@@ -356,7 +364,9 @@ def _handle_stepfunctions_request(self) -> None:
356364
print("Expected exception occurred", exception)
357365
elif self.in_path("describestatemachine/my-state-machine"):
358366
set_main_status(200)
359-
sfn_client.describe_state_machine(stateMachineArn="arn:aws:states:us-west-2:000000000000:stateMachine:testStateMachine")
367+
sfn_client.describe_state_machine(
368+
stateMachineArn="arn:aws:states:us-west-2:000000000000:stateMachine:testStateMachine"
369+
)
360370
elif self.in_path("describeactivity/my-activity"):
361371
set_main_status(200)
362372
sfn_client.describe_activity(activityArn="arn:aws:states:us-west-2:000000000000:activity:testActivity")
@@ -372,6 +382,7 @@ def set_main_status(status: int) -> None:
372382
RequestHandler.main_status = status
373383

374384

385+
# pylint: disable=too-many-locals
375386
def prepare_aws_server() -> None:
376387
requests.Request(method="POST", url="http://localhost:4566/_localstack/state/reset")
377388
try:
@@ -409,7 +420,9 @@ def prepare_aws_server() -> None:
409420
kinesis_client.create_stream(StreamName="test_stream", ShardCount=1)
410421

411422
# Set up Secrets Manager so tests can access a secret.
412-
secretsmanager_client: BaseClient = boto3.client("secretsmanager", endpoint_url=_AWS_SDK_ENDPOINT, region_name=_AWS_REGION)
423+
secretsmanager_client: BaseClient = boto3.client(
424+
"secretsmanager", endpoint_url=_AWS_SDK_ENDPOINT, region_name=_AWS_REGION
425+
)
413426
secretsmanager_response = secretsmanager_client.list_secrets()
414427
secret = next((s for s in secretsmanager_response["SecretList"] if s["Name"] == "testSecret"), None)
415428
if not secret:
@@ -431,41 +444,26 @@ def prepare_aws_server() -> None:
431444
trust_policy = {
432445
"Version": "2012-10-17",
433446
"Statement": [
434-
{
435-
"Effect": "Allow",
436-
"Principal": {
437-
"Service": "states.amazonaws.com"
438-
},
439-
"Action": "sts:AssumeRole"
440-
}
441-
]
447+
{"Effect": "Allow", "Principal": {"Service": "states.amazonaws.com"}, "Action": "sts:AssumeRole"}
448+
],
442449
}
443450
try:
444451
iam_response = iam_client.create_role(
445452
RoleName=iam_role_name, AssumeRolePolicyDocument=json.dumps(trust_policy)
446453
)
447454
iam_client.attach_role_policy(
448-
RoleName=iam_role_name,
449-
PolicyArn="arn:aws:iam::aws:policy/AWSStepFunctionsFullAccess"
455+
RoleName=iam_role_name, PolicyArn="arn:aws:iam::aws:policy/AWSStepFunctionsFullAccess"
450456
)
451457
print(f"IAM Role '{iam_role_name}' create successfully.")
452458
iam_role_arn = iam_response["Role"]["Arn"]
453459
sfn_defintion = {
454460
"Comment": "A simple sequential workflow",
455461
"StartAt": "FirstState",
456-
"States": {
457-
"FirstState": {
458-
"Type": "Pass",
459-
"Result": "Hello, World!",
460-
"End": True
461-
}
462-
}
462+
"States": {"FirstState": {"Type": "Pass", "Result": "Hello, World!", "End": True}},
463463
}
464464
definition_string = json.dumps(sfn_defintion)
465465
sfn_client.create_state_machine(
466-
name=state_machine_name,
467-
definition=definition_string,
468-
roleArn=iam_role_arn
466+
name=state_machine_name, definition=definition_string, roleArn=iam_role_arn
469467
)
470468
sfn_client.create_activity(name=activity_name)
471469
except Exception as exception:

contract-tests/tests/test/amazon/botocore/botocore_test.py

Lines changed: 18 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,9 @@ def test_sqs_create_queue(self):
265265
remote_operation="CreateQueue",
266266
remote_resource_type="AWS::SQS::Queue",
267267
remote_resource_identifier="test_queue",
268-
cloudformation_primary_identifier="http://sqs.us-west-2.localhost.localstack.cloud:4566/000000000000/test_queue",
268+
cloudformation_primary_identifier=(
269+
"http://sqs.us-west-2.localhost.localstack.cloud:4566/000000000000/test_queue"
270+
),
269271
request_specific_attributes={
270272
_AWS_SQS_QUEUE_NAME: "test_queue",
271273
},
@@ -547,7 +549,9 @@ def test_secretsmanager_describe_secret(self):
547549
remote_operation="DescribeSecret",
548550
remote_resource_type="AWS::SecretsManager::Secret",
549551
remote_resource_identifier=r"testSecret-[a-zA-Z0-9]{6}$",
550-
cloudformation_primary_identifier=r"arn:aws:secretsmanager:us-west-2:000000000000:secret:testSecret-[a-zA-Z0-9]{6}$",
552+
cloudformation_primary_identifier=(
553+
r"arn:aws:secretsmanager:us-west-2:000000000000:secret:testSecret-[a-zA-Z0-9]{6}$"
554+
),
551555
response_specific_attributes={
552556
_AWS_SECRET_ARN: r"arn:aws:secretsmanager:us-west-2:000000000000:secret:testSecret-[a-zA-Z0-9]{6}$",
553557
},
@@ -661,7 +665,9 @@ def test_stepfunctions_fault(self):
661665
remote_operation="ListStateMachineVersions",
662666
remote_resource_type="AWS::StepFunctions::StateMachine",
663667
remote_resource_identifier="invalid-state-machine",
664-
cloudformation_primary_identifier="arn:aws:states:us-west-2:000000000000:stateMachine:invalid-state-machine",
668+
cloudformation_primary_identifier=(
669+
"arn:aws:states:us-west-2:000000000000:stateMachine:invalid-state-machine"
670+
),
665671
request_specific_attributes={
666672
_AWS_STATE_MACHINE_ARN: "arn:aws:states:us-west-2:000000000000:stateMachine:invalid-state-machine",
667673
},
@@ -708,14 +714,20 @@ def _assert_aws_attributes(
708714
self._assert_str_attribute(attributes_dict, AWS_REMOTE_RESOURCE_TYPE, remote_resource_type)
709715
if remote_resource_identifier != "None":
710716
if self._is_valid_regex(remote_resource_identifier):
711-
self._assert_match_attribute(attributes_dict, AWS_REMOTE_RESOURCE_IDENTIFIER, remote_resource_identifier)
717+
self._assert_match_attribute(
718+
attributes_dict, AWS_REMOTE_RESOURCE_IDENTIFIER, remote_resource_identifier
719+
)
712720
else:
713721
self._assert_str_attribute(attributes_dict, AWS_REMOTE_RESOURCE_IDENTIFIER, remote_resource_identifier)
714722
if cloudformation_primary_identifier != "None":
715723
if self._is_valid_regex(remote_resource_identifier):
716-
self._assert_match_attribute(attributes_dict, AWS_CLOUDFORMATION_PRIMARY_IDENTIFIER, cloudformation_primary_identifier)
724+
self._assert_match_attribute(
725+
attributes_dict, AWS_CLOUDFORMATION_PRIMARY_IDENTIFIER, cloudformation_primary_identifier
726+
)
717727
else:
718-
self._assert_str_attribute(attributes_dict, AWS_CLOUDFORMATION_PRIMARY_IDENTIFIER, cloudformation_primary_identifier)
728+
self._assert_str_attribute(
729+
attributes_dict, AWS_CLOUDFORMATION_PRIMARY_IDENTIFIER, cloudformation_primary_identifier
730+
)
719731
# See comment above AWS_LOCAL_OPERATION
720732
self._assert_str_attribute(attributes_dict, AWS_SPAN_KIND, span_kind)
721733

0 commit comments

Comments
 (0)