Skip to content

Commit a7feaaf

Browse files
committed
chore: verified flake8 and isort checks for aws_kms_keyring_example.py
1 parent 18328ad commit a7feaaf

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

examples/src/keyrings/aws_kms_keyring_example.py

+3-5
Original file line numberDiff line numberDiff line change
@@ -10,25 +10,24 @@
1010
2. Encryption context is correct in the decrypted message header
1111
3. Decrypted plaintext value matches EXAMPLE_DATA
1212
13-
AWS KMS keyrings can be used independently or in a multi-keyring with other keyrings
13+
AWS KMS keyrings can be used independently or in a multi-keyring with other keyrings
1414
of the same or a different type.
1515
1616
For more info on how to use KMS keyring, see
1717
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/use-kms-keyring.html
1818
"""
1919
import sys
20-
from typing import Dict
21-
import boto3
2220

21+
import boto3
2322
from aws_cryptographic_materialproviders.mpl import AwsCryptographicMaterialProviders
2423
from aws_cryptographic_materialproviders.mpl.config import MaterialProvidersConfig
2524
from aws_cryptographic_materialproviders.mpl.models import CreateAwsKmsKeyringInput
2625
from aws_cryptographic_materialproviders.mpl.references import IKeyring
26+
from typing import Dict
2727

2828
import aws_encryption_sdk
2929
from aws_encryption_sdk import CommitmentPolicy
3030

31-
3231
# TODO-MPL: Remove this as part of removing PYTHONPATH hacks.
3332
MODULE_ROOT_DIR = '/'.join(__file__.split("/")[:-1])
3433

@@ -50,7 +49,6 @@ def encrypt_and_decrypt_with_keyring(
5049
For more info on KMS Key identifiers, see
5150
https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id
5251
"""
53-
5452
# 1. Instantiate the encryption SDK client.
5553
# This builds the client with the REQUIRE_ENCRYPT_REQUIRE_DECRYPT commitment policy,
5654
# which enforces that this client only encrypts using committing algorithm suites and enforces

0 commit comments

Comments
 (0)