@@ -251,7 +251,11 @@ def _handle_bedrock_request(self) -> None:
251251 set_main_status (200 )
252252 bedrock_client .meta .events .register (
253253 "before-call.bedrock.GetGuardrail" ,
254- lambda ** kwargs : inject_200_success (guardrailId = "bt4o77i015cu" , guardrailArn = "arn:aws:bedrock:us-east-1:000000000000:guardrail/bt4o77i015cu" , ** kwargs ),
254+ lambda ** kwargs : inject_200_success (
255+ guardrailId = "bt4o77i015cu" ,
256+ guardrailArn = "arn:aws:bedrock:us-east-1:000000000000:guardrail/bt4o77i015cu" ,
257+ ** kwargs ,
258+ ),
255259 )
256260 bedrock_client .get_guardrail (
257261 guardrailIdentifier = "arn:aws:bedrock:us-east-1:000000000000:guardrail/bt4o77i015cu"
@@ -320,7 +324,9 @@ def _handle_secretsmanager_request(self) -> None:
320324 elif self .in_path (_FAULT ):
321325 set_main_status (500 )
322326 try :
323- fault_client = boto3 .client ("secretsmanager" , endpoint_url = _FAULT_ENDPOINT , region_name = _AWS_REGION , config = _NO_RETRY_CONFIG )
327+ fault_client = boto3 .client (
328+ "secretsmanager" , endpoint_url = _FAULT_ENDPOINT , region_name = _AWS_REGION , config = _NO_RETRY_CONFIG
329+ )
324330 fault_client .get_secret_value (
325331 SecretId = "arn:aws:secretsmanager:us-west-2:000000000000:secret:nonexistent-secret"
326332 )
@@ -338,7 +344,9 @@ def _handle_stepfunctions_request(self) -> None:
338344 set_main_status (400 )
339345 try :
340346 error_client = boto3 .client ("stepfunctions" , endpoint_url = _ERROR_ENDPOINT , region_name = _AWS_REGION )
341- error_client .describe_state_machine (stateMachineArn = "arn:aws:states:us-west-2:000000000000:stateMachine:unExistStateMachine" )
347+ error_client .describe_state_machine (
348+ stateMachineArn = "arn:aws:states:us-west-2:000000000000:stateMachine:unExistStateMachine"
349+ )
342350 except Exception as exception :
343351 print ("Expected exception occurred" , exception )
344352 elif self .in_path (_FAULT ):
@@ -356,7 +364,9 @@ def _handle_stepfunctions_request(self) -> None:
356364 print ("Expected exception occurred" , exception )
357365 elif self .in_path ("describestatemachine/my-state-machine" ):
358366 set_main_status (200 )
359- sfn_client .describe_state_machine (stateMachineArn = "arn:aws:states:us-west-2:000000000000:stateMachine:testStateMachine" )
367+ sfn_client .describe_state_machine (
368+ stateMachineArn = "arn:aws:states:us-west-2:000000000000:stateMachine:testStateMachine"
369+ )
360370 elif self .in_path ("describeactivity/my-activity" ):
361371 set_main_status (200 )
362372 sfn_client .describe_activity (activityArn = "arn:aws:states:us-west-2:000000000000:activity:testActivity" )
@@ -409,7 +419,9 @@ def prepare_aws_server() -> None:
409419 kinesis_client .create_stream (StreamName = "test_stream" , ShardCount = 1 )
410420
411421 # Set up Secrets Manager so tests can access a secret.
412- secretsmanager_client : BaseClient = boto3 .client ("secretsmanager" , endpoint_url = _AWS_SDK_ENDPOINT , region_name = _AWS_REGION )
422+ secretsmanager_client : BaseClient = boto3 .client (
423+ "secretsmanager" , endpoint_url = _AWS_SDK_ENDPOINT , region_name = _AWS_REGION
424+ )
413425 secretsmanager_response = secretsmanager_client .list_secrets ()
414426 secret = next ((s for s in secretsmanager_response ["SecretList" ] if s ["Name" ] == "testSecret" ), None )
415427 if not secret :
@@ -431,41 +443,26 @@ def prepare_aws_server() -> None:
431443 trust_policy = {
432444 "Version" : "2012-10-17" ,
433445 "Statement" : [
434- {
435- "Effect" : "Allow" ,
436- "Principal" : {
437- "Service" : "states.amazonaws.com"
438- },
439- "Action" : "sts:AssumeRole"
440- }
441- ]
446+ {"Effect" : "Allow" , "Principal" : {"Service" : "states.amazonaws.com" }, "Action" : "sts:AssumeRole" }
447+ ],
442448 }
443449 try :
444450 iam_response = iam_client .create_role (
445451 RoleName = iam_role_name , AssumeRolePolicyDocument = json .dumps (trust_policy )
446452 )
447453 iam_client .attach_role_policy (
448- RoleName = iam_role_name ,
449- PolicyArn = "arn:aws:iam::aws:policy/AWSStepFunctionsFullAccess"
454+ RoleName = iam_role_name , PolicyArn = "arn:aws:iam::aws:policy/AWSStepFunctionsFullAccess"
450455 )
451456 print (f"IAM Role '{ iam_role_name } ' create successfully." )
452457 iam_role_arn = iam_response ["Role" ]["Arn" ]
453458 sfn_defintion = {
454459 "Comment" : "A simple sequential workflow" ,
455460 "StartAt" : "FirstState" ,
456- "States" : {
457- "FirstState" : {
458- "Type" : "Pass" ,
459- "Result" : "Hello, World!" ,
460- "End" : True
461- }
462- }
461+ "States" : {"FirstState" : {"Type" : "Pass" , "Result" : "Hello, World!" , "End" : True }},
463462 }
464463 definition_string = json .dumps (sfn_defintion )
465464 sfn_client .create_state_machine (
466- name = state_machine_name ,
467- definition = definition_string ,
468- roleArn = iam_role_arn
465+ name = state_machine_name , definition = definition_string , roleArn = iam_role_arn
469466 )
470467 sfn_client .create_activity (name = activity_name )
471468 except Exception as exception :
0 commit comments