Skip to content

Commit fd10090

Browse files
committed
chore: apply black formatting
1 parent c303bf3 commit fd10090

File tree

2 files changed

+31
-28
lines changed

2 files changed

+31
-28
lines changed

contract-tests/images/applications/botocore/botocore_server.py

Lines changed: 22 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -251,7 +251,11 @@ def _handle_bedrock_request(self) -> None:
251251
set_main_status(200)
252252
bedrock_client.meta.events.register(
253253
"before-call.bedrock.GetGuardrail",
254-
lambda **kwargs: inject_200_success(guardrailId="bt4o77i015cu", guardrailArn="arn:aws:bedrock:us-east-1:000000000000:guardrail/bt4o77i015cu", **kwargs),
254+
lambda **kwargs: inject_200_success(
255+
guardrailId="bt4o77i015cu",
256+
guardrailArn="arn:aws:bedrock:us-east-1:000000000000:guardrail/bt4o77i015cu",
257+
**kwargs,
258+
),
255259
)
256260
bedrock_client.get_guardrail(
257261
guardrailIdentifier="arn:aws:bedrock:us-east-1:000000000000:guardrail/bt4o77i015cu"
@@ -320,7 +324,9 @@ def _handle_secretsmanager_request(self) -> None:
320324
elif self.in_path(_FAULT):
321325
set_main_status(500)
322326
try:
323-
fault_client = boto3.client("secretsmanager", endpoint_url=_FAULT_ENDPOINT, region_name=_AWS_REGION, config=_NO_RETRY_CONFIG)
327+
fault_client = boto3.client(
328+
"secretsmanager", endpoint_url=_FAULT_ENDPOINT, region_name=_AWS_REGION, config=_NO_RETRY_CONFIG
329+
)
324330
fault_client.get_secret_value(
325331
SecretId="arn:aws:secretsmanager:us-west-2:000000000000:secret:nonexistent-secret"
326332
)
@@ -338,7 +344,9 @@ def _handle_stepfunctions_request(self) -> None:
338344
set_main_status(400)
339345
try:
340346
error_client = boto3.client("stepfunctions", endpoint_url=_ERROR_ENDPOINT, region_name=_AWS_REGION)
341-
error_client.describe_state_machine(stateMachineArn="arn:aws:states:us-west-2:000000000000:stateMachine:unExistStateMachine")
347+
error_client.describe_state_machine(
348+
stateMachineArn="arn:aws:states:us-west-2:000000000000:stateMachine:unExistStateMachine"
349+
)
342350
except Exception as exception:
343351
print("Expected exception occurred", exception)
344352
elif self.in_path(_FAULT):
@@ -356,7 +364,9 @@ def _handle_stepfunctions_request(self) -> None:
356364
print("Expected exception occurred", exception)
357365
elif self.in_path("describestatemachine/my-state-machine"):
358366
set_main_status(200)
359-
sfn_client.describe_state_machine(stateMachineArn="arn:aws:states:us-west-2:000000000000:stateMachine:testStateMachine")
367+
sfn_client.describe_state_machine(
368+
stateMachineArn="arn:aws:states:us-west-2:000000000000:stateMachine:testStateMachine"
369+
)
360370
elif self.in_path("describeactivity/my-activity"):
361371
set_main_status(200)
362372
sfn_client.describe_activity(activityArn="arn:aws:states:us-west-2:000000000000:activity:testActivity")
@@ -409,7 +419,9 @@ def prepare_aws_server() -> None:
409419
kinesis_client.create_stream(StreamName="test_stream", ShardCount=1)
410420

411421
# Set up Secrets Manager so tests can access a secret.
412-
secretsmanager_client: BaseClient = boto3.client("secretsmanager", endpoint_url=_AWS_SDK_ENDPOINT, region_name=_AWS_REGION)
422+
secretsmanager_client: BaseClient = boto3.client(
423+
"secretsmanager", endpoint_url=_AWS_SDK_ENDPOINT, region_name=_AWS_REGION
424+
)
413425
secretsmanager_response = secretsmanager_client.list_secrets()
414426
secret = next((s for s in secretsmanager_response["SecretList"] if s["Name"] == "testSecret"), None)
415427
if not secret:
@@ -431,41 +443,26 @@ def prepare_aws_server() -> None:
431443
trust_policy = {
432444
"Version": "2012-10-17",
433445
"Statement": [
434-
{
435-
"Effect": "Allow",
436-
"Principal": {
437-
"Service": "states.amazonaws.com"
438-
},
439-
"Action": "sts:AssumeRole"
440-
}
441-
]
446+
{"Effect": "Allow", "Principal": {"Service": "states.amazonaws.com"}, "Action": "sts:AssumeRole"}
447+
],
442448
}
443449
try:
444450
iam_response = iam_client.create_role(
445451
RoleName=iam_role_name, AssumeRolePolicyDocument=json.dumps(trust_policy)
446452
)
447453
iam_client.attach_role_policy(
448-
RoleName=iam_role_name,
449-
PolicyArn="arn:aws:iam::aws:policy/AWSStepFunctionsFullAccess"
454+
RoleName=iam_role_name, PolicyArn="arn:aws:iam::aws:policy/AWSStepFunctionsFullAccess"
450455
)
451456
print(f"IAM Role '{iam_role_name}' create successfully.")
452457
iam_role_arn = iam_response["Role"]["Arn"]
453458
sfn_defintion = {
454459
"Comment": "A simple sequential workflow",
455460
"StartAt": "FirstState",
456-
"States": {
457-
"FirstState": {
458-
"Type": "Pass",
459-
"Result": "Hello, World!",
460-
"End": True
461-
}
462-
}
461+
"States": {"FirstState": {"Type": "Pass", "Result": "Hello, World!", "End": True}},
463462
}
464463
definition_string = json.dumps(sfn_defintion)
465464
sfn_client.create_state_machine(
466-
name=state_machine_name,
467-
definition=definition_string,
468-
roleArn=iam_role_arn
465+
name=state_machine_name, definition=definition_string, roleArn=iam_role_arn
469466
)
470467
sfn_client.create_activity(name=activity_name)
471468
except Exception as exception:

contract-tests/tests/test/amazon/botocore/botocore_test.py

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -708,14 +708,20 @@ def _assert_aws_attributes(
708708
self._assert_str_attribute(attributes_dict, AWS_REMOTE_RESOURCE_TYPE, remote_resource_type)
709709
if remote_resource_identifier != "None":
710710
if self._is_valid_regex(remote_resource_identifier):
711-
self._assert_match_attribute(attributes_dict, AWS_REMOTE_RESOURCE_IDENTIFIER, remote_resource_identifier)
711+
self._assert_match_attribute(
712+
attributes_dict, AWS_REMOTE_RESOURCE_IDENTIFIER, remote_resource_identifier
713+
)
712714
else:
713715
self._assert_str_attribute(attributes_dict, AWS_REMOTE_RESOURCE_IDENTIFIER, remote_resource_identifier)
714716
if cloudformation_primary_identifier != "None":
715717
if self._is_valid_regex(remote_resource_identifier):
716-
self._assert_match_attribute(attributes_dict, AWS_CLOUDFORMATION_PRIMARY_IDENTIFIER, cloudformation_primary_identifier)
718+
self._assert_match_attribute(
719+
attributes_dict, AWS_CLOUDFORMATION_PRIMARY_IDENTIFIER, cloudformation_primary_identifier
720+
)
717721
else:
718-
self._assert_str_attribute(attributes_dict, AWS_CLOUDFORMATION_PRIMARY_IDENTIFIER, cloudformation_primary_identifier)
722+
self._assert_str_attribute(
723+
attributes_dict, AWS_CLOUDFORMATION_PRIMARY_IDENTIFIER, cloudformation_primary_identifier
724+
)
719725
# See comment above AWS_LOCAL_OPERATION
720726
self._assert_str_attribute(attributes_dict, AWS_SPAN_KIND, span_kind)
721727

0 commit comments

Comments
 (0)