@@ -59,7 +59,7 @@ def test_client_encrypt(mocker):
59
59
commitment_policy = CommitmentPolicy .FORBID_ENCRYPT_ALLOW_DECRYPT , max_encrypted_data_keys = 3
60
60
)
61
61
62
- kwargs = dict ()
62
+ kwargs = {}
63
63
kwargs ["source" ] = b"plaintext"
64
64
kwargs ["materials_manager" ] = cmm
65
65
client .encrypt (** kwargs )
@@ -77,7 +77,7 @@ def test_client_decrypt(mocker):
77
77
commitment_policy = CommitmentPolicy .FORBID_ENCRYPT_ALLOW_DECRYPT , max_encrypted_data_keys = 3
78
78
)
79
79
80
- kwargs = dict ()
80
+ kwargs = {}
81
81
kwargs ["source" ] = b"ciphertext"
82
82
kwargs ["materials_manager" ] = cmm
83
83
client .decrypt (** kwargs )
@@ -94,7 +94,7 @@ def test_client_stream_encrypt(mocker, mode_string):
94
94
cmm = MagicMock (__class__ = CryptoMaterialsManager )
95
95
client = aws_encryption_sdk .EncryptionSDKClient (commitment_policy = CommitmentPolicy .FORBID_ENCRYPT_ALLOW_DECRYPT )
96
96
97
- kwargs = dict ()
97
+ kwargs = {}
98
98
kwargs ["mode" ] = mode_string
99
99
kwargs ["source" ] = b"plaintext"
100
100
kwargs ["materials_manager" ] = cmm
@@ -113,7 +113,7 @@ def test_client_stream_decrypt(mocker, mode_string):
113
113
cmm = MagicMock (__class__ = CryptoMaterialsManager )
114
114
client = aws_encryption_sdk .EncryptionSDKClient (commitment_policy = CommitmentPolicy .FORBID_ENCRYPT_ALLOW_DECRYPT )
115
115
116
- kwargs = dict ()
116
+ kwargs = {}
117
117
kwargs ["mode" ] = mode_string
118
118
kwargs ["source" ] = b"ciphertext"
119
119
kwargs ["materials_manager" ] = cmm
@@ -132,7 +132,7 @@ def test_client_bad_kwargs(mocker, method, key):
132
132
mocker .patch .object (aws_encryption_sdk , "StreamEncryptor" )
133
133
134
134
cmm = MagicMock (__class__ = CryptoMaterialsManager )
135
- kwargs = dict ()
135
+ kwargs = {}
136
136
kwargs [key ] = "foobar"
137
137
kwargs ["source" ] = b"ciphertext"
138
138
kwargs ["materials_manager" ] = cmm
0 commit comments