Skip to content

Commit a81b013

Browse files
committed
black formatter changes
1 parent 0e65503 commit a81b013

File tree

24 files changed

+63
-45
lines changed

24 files changed

+63
-45
lines changed

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_cloudwatch_endpoints/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_eval_job_bucket/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import ast
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_guardrail_encryption/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_guardrails/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import ast
1112
import json
1213
import logging

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_iam_user_access/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_invocation_log_cloudwatch/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_invocation_log_s3/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_kb_ingestion_encryption/app.py

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os
@@ -56,10 +57,7 @@ def check_data_sources(kb_id: str, kb_name: str) -> str | None: # type: ignore
5657

5758
# Get the detailed data source configuration
5859
try:
59-
source_details = bedrock_agent_client.get_data_source(
60-
knowledgeBaseId=kb_id,
61-
dataSourceId=source["dataSourceId"]
62-
)
60+
source_details = bedrock_agent_client.get_data_source(knowledgeBaseId=kb_id, dataSourceId=source["dataSourceId"])
6361
LOGGER.info(f"Source details: {source_details}")
6462

6563
# Check for KMS encryption configuration

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_kb_logging/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_kb_opensearch_encryption/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_kb_s3_bucket/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_kb_vector_store_secret/app.py

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os
@@ -65,7 +66,7 @@ def check_knowledge_base(kb_id: str, kb_name: str) -> tuple[bool, str]: # noqa:
6566
"PINECONE": "pineconeConfiguration",
6667
"MONGO_DB_ATLAS": "mongoDbAtlasConfiguration",
6768
"REDIS_ENTERPRISE_CLOUD": "redisEnterpriseCloudConfiguration",
68-
"RDS": "rdsConfiguration"
69+
"RDS": "rdsConfiguration",
6970
}
7071

7172
# If storage type is not supported, it's compliant (no credentials needed)
@@ -137,10 +138,7 @@ def evaluate_compliance(rule_parameters: dict) -> tuple[str, str]: # noqa: U100
137138
+ f"Compliant: {'; '.join(compliant_kbs)}\n"
138139
+ f"Non-compliant: {'; '.join(non_compliant_kbs)}"
139140
)
140-
return "COMPLIANT", (
141-
"Knowledge base vector store compliance check results:\n"
142-
+ f"Compliant: {'; '.join(compliant_kbs)}"
143-
)
141+
return "COMPLIANT", ("Knowledge base vector store compliance check results:\n" + f"Compliant: {'; '.join(compliant_kbs)}")
144142

145143
except Exception as e:
146144
LOGGER.error(f"Error evaluating Bedrock Knowledge Base vector store secrets: {str(e)}")

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_s3_endpoints/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/rules/sra_bedrock_check_vpc_endpoints/app.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/app.py

Lines changed: 37 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@
88
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
99
SPDX-License-Identifier: MIT-0
1010
"""
11+
1112
import copy
1213
import json
1314
import logging
@@ -1117,9 +1118,9 @@ def deploy_metric_filters_and_alarms(region: str, accounts: list, resource_prope
11171118
DRY_RUN_DATA[f"{filter_name}_CloudWatch_Alarm"] = "DRY_RUN: Deploy CloudWatch metric alarm"
11181119
else:
11191120
LOGGER.info(f"DRY_RUN: Filter deploy parameter is 'false'; Skip {filter_name} CloudWatch metric filter deployment")
1120-
DRY_RUN_DATA[
1121-
f"{filter_name}_CloudWatch"
1122-
] = "DRY_RUN: Filter deploy parameter is 'false'; Skip CloudWatch metric filter deployment"
1121+
DRY_RUN_DATA[f"{filter_name}_CloudWatch"] = (
1122+
"DRY_RUN: Filter deploy parameter is 'false'; Skip CloudWatch metric filter deployment"
1123+
)
11231124

11241125

11251126
def deploy_central_cloudwatch_observability(event: dict) -> None: # noqa: CCR001, CFQ001, C901
@@ -1215,9 +1216,9 @@ def deploy_central_cloudwatch_observability(event: dict) -> None: # noqa: CCR00
12151216
if DRY_RUN is False:
12161217
xacct_role = iam.create_role(cloudwatch.CROSS_ACCOUNT_ROLE_NAME, cloudwatch.CROSS_ACCOUNT_TRUST_POLICY, SOLUTION_NAME)
12171218
xacct_role_arn = xacct_role["Role"]["Arn"]
1218-
LIVE_RUN_DATA[
1219-
f"OAMCrossAccountRoleCreate_{bedrock_account}"
1220-
] = f"Created {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
1219+
LIVE_RUN_DATA[f"OAMCrossAccountRoleCreate_{bedrock_account}"] = (
1220+
f"Created {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
1221+
)
12211222
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
12221223
CFN_RESPONSE_DATA["deployment_info"]["resources_deployed"] += 1
12231224
LOGGER.info(f"Created {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role")
@@ -1233,9 +1234,9 @@ def deploy_central_cloudwatch_observability(event: dict) -> None: # noqa: CCR00
12331234
cloudwatch.CROSS_ACCOUNT_ROLE_NAME,
12341235
)
12351236
else:
1236-
DRY_RUN_DATA[
1237-
f"OAMCrossAccountRoleCreate_{bedrock_account}"
1238-
] = f"DRY_RUN: Create {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
1237+
DRY_RUN_DATA[f"OAMCrossAccountRoleCreate_{bedrock_account}"] = (
1238+
f"DRY_RUN: Create {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
1239+
)
12391240
else:
12401241
LOGGER.info(
12411242
f"CloudWatch observability access manager {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} cross-account role found in {bedrock_account}"
@@ -1266,17 +1267,17 @@ def deploy_central_cloudwatch_observability(event: dict) -> None: # noqa: CCR00
12661267
LOGGER.info(f"Attaching {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}...")
12671268
if DRY_RUN is False:
12681269
iam.attach_policy(cloudwatch.CROSS_ACCOUNT_ROLE_NAME, policy_arn)
1269-
LIVE_RUN_DATA[
1270-
f"OamXacctRolePolicyAttach_{policy_arn.split('/')[1]}_{bedrock_account}"
1271-
] = f"Attached {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
1270+
LIVE_RUN_DATA[f"OamXacctRolePolicyAttach_{policy_arn.split('/')[1]}_{bedrock_account}"] = (
1271+
f"Attached {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
1272+
)
12721273
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
12731274

12741275
CFN_RESPONSE_DATA["deployment_info"]["configuration_changes"] += 1
12751276
LOGGER.info(f"Attached {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}")
12761277
else:
1277-
DRY_RUN_DATA[
1278-
f"OAMCrossAccountRolePolicyAttach_{policy_arn.split('/')[1]}_{bedrock_account}"
1279-
] = f"DRY_RUN: Attach {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
1278+
DRY_RUN_DATA[f"OAMCrossAccountRolePolicyAttach_{policy_arn.split('/')[1]}_{bedrock_account}"] = (
1279+
f"DRY_RUN: Attach {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
1280+
)
12801281

12811282
# 5e) OAM link in bedrock account
12821283
cloudwatch.CWOAM_CLIENT = sts.assume_role(bedrock_account, sts.CONFIGURATION_ROLE, "oam", bedrock_region)
@@ -1285,9 +1286,9 @@ def deploy_central_cloudwatch_observability(event: dict) -> None: # noqa: CCR00
12851286
if DRY_RUN is False:
12861287
LOGGER.info("CloudWatch observability access manager link not found, creating...")
12871288
oam_link_arn = cloudwatch.create_oam_link(oam_sink_arn)
1288-
LIVE_RUN_DATA[
1289-
f"OAMLinkCreate_{bedrock_account}_{bedrock_region}"
1290-
] = f"Created CloudWatch observability access manager link in {bedrock_account} in {bedrock_region}"
1289+
LIVE_RUN_DATA[f"OAMLinkCreate_{bedrock_account}_{bedrock_region}"] = (
1290+
f"Created CloudWatch observability access manager link in {bedrock_account} in {bedrock_region}"
1291+
)
12911292
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
12921293

12931294
CFN_RESPONSE_DATA["deployment_info"]["resources_deployed"] += 1
@@ -1296,9 +1297,9 @@ def deploy_central_cloudwatch_observability(event: dict) -> None: # noqa: CCR00
12961297
add_state_table_record("oam", "implemented", "oam link", "link", oam_link_arn, bedrock_account, bedrock_region, "oam_link")
12971298
else:
12981299
LOGGER.info("DRY_RUN: CloudWatch observability access manager link not found, creating...")
1299-
DRY_RUN_DATA[
1300-
f"OAMLinkCreate_{bedrock_account}"
1301-
] = f"DRY_RUN: Create CloudWatch observability access manager link in {bedrock_account} in {bedrock_region}"
1300+
DRY_RUN_DATA[f"OAMLinkCreate_{bedrock_account}"] = (
1301+
f"DRY_RUN: Create CloudWatch observability access manager link in {bedrock_account} in {bedrock_region}"
1302+
)
13021303
# Set link arn to default value (for dry run)
13031304
oam_link_arn = f"arn:aws:cloudwatch::{bedrock_account}:link/arn"
13041305
else:
@@ -1560,15 +1561,15 @@ def delete_custom_config_iam_role(rule_name: str, acct: str) -> None: # noqa: C
15601561
if DRY_RUN is False:
15611562
LOGGER.info(f"Detaching {policy['PolicyName']} IAM policy from account {acct} in {region}")
15621563
iam.detach_policy(rule_name, policy["PolicyArn"])
1563-
LIVE_RUN_DATA[
1564-
f"{rule_name}_{acct}_{region}_PolicyDetach"
1565-
] = f"Detached {policy['PolicyName']} IAM policy from account {acct} in {region}"
1564+
LIVE_RUN_DATA[f"{rule_name}_{acct}_{region}_PolicyDetach"] = (
1565+
f"Detached {policy['PolicyName']} IAM policy from account {acct} in {region}"
1566+
)
15661567
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
15671568
else:
15681569
LOGGER.info(f"DRY_RUN: Detach {policy['PolicyName']} IAM policy from account {acct} in {region}")
1569-
DRY_RUN_DATA[
1570-
f"{rule_name}_{acct}_{region}_Delete"
1571-
] = f"DRY_RUN: Detach {policy['PolicyName']} IAM policy from account {acct} in {region}"
1570+
DRY_RUN_DATA[f"{rule_name}_{acct}_{region}_Delete"] = (
1571+
f"DRY_RUN: Detach {policy['PolicyName']} IAM policy from account {acct} in {region}"
1572+
)
15721573
else:
15731574
LOGGER.info(f"No IAM policies attached to {rule_name} for account {acct} in {region}")
15741575

@@ -1586,9 +1587,9 @@ def delete_custom_config_iam_role(rule_name: str, acct: str) -> None: # noqa: C
15861587
remove_state_table_record(policy_arn)
15871588
else:
15881589
LOGGER.info(f"DRY_RUN: Delete {rule_name}-lamdba-basic-execution IAM policy for account {acct} in {region}")
1589-
DRY_RUN_DATA[
1590-
f"{rule_name}_{acct}_{region}_PolicyDelete"
1591-
] = f"DRY_RUN: Delete {rule_name}-lamdba-basic-execution IAM policy for account {acct} in {region}"
1590+
DRY_RUN_DATA[f"{rule_name}_{acct}_{region}_PolicyDelete"] = (
1591+
f"DRY_RUN: Delete {rule_name}-lamdba-basic-execution IAM policy for account {acct} in {region}"
1592+
)
15921593
else:
15931594
LOGGER.info(f"{rule_name}-lamdba-basic-execution IAM policy for account {acct} in {region} does not exist.")
15941595

@@ -1806,18 +1807,18 @@ def delete_event(event: dict, context: Any) -> None: # noqa: CFQ001, CCR001, C9
18061807
for policy in cross_account_policies:
18071808
LOGGER.info(f"Detaching {policy['PolicyArn']} policy from {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role...")
18081809
iam.detach_policy(cloudwatch.CROSS_ACCOUNT_ROLE_NAME, policy["PolicyArn"])
1809-
LIVE_RUN_DATA[
1810-
"OAMCrossAccountRolePolicyDetach"
1811-
] = f"Detached {policy['PolicyArn']} policy from {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
1810+
LIVE_RUN_DATA["OAMCrossAccountRolePolicyDetach"] = (
1811+
f"Detached {policy['PolicyArn']} policy from {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
1812+
)
18121813
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
18131814
CFN_RESPONSE_DATA["deployment_info"]["configuration_changes"] += 1
18141815
LOGGER.info(f"Detached {policy['PolicyArn']} policy from {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role")
18151816
else:
18161817
for policy in cross_account_policies:
18171818
LOGGER.info(f"DRY_RUN: Detaching {policy['PolicyArn']} policy from {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role...")
1818-
DRY_RUN_DATA[
1819-
"OAMCrossAccountRolePolicyDetach"
1820-
] = f"DRY_RUN: Detach {policy['PolicyArn']} policy from {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
1819+
DRY_RUN_DATA["OAMCrossAccountRolePolicyDetach"] = (
1820+
f"DRY_RUN: Detach {policy['PolicyArn']} policy from {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
1821+
)
18211822
else:
18221823
LOGGER.info(f"No policies attached to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role")
18231824

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/cfnresponse.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
"""Amazon CFNResponse Module."""
2+
23
# mypy: ignore-errors
34
# Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
45
# SPDX-License-Identifier: MIT-0

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/sra_iam.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
from __future__ import annotations
1112

1213
import json

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/sra_kms.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
from __future__ import annotations
1112

1213
import logging

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/sra_lambda.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
from __future__ import annotations
1112

1213
import logging

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/sra_repo.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import logging
1112
import os
1213
import shutil

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/sra_s3.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import json
1112
import logging
1213
import os

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/sra_sns.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
from __future__ import annotations
1112

1213
import json

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/sra_ssm_params.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
from __future__ import annotations
1112

1213
import logging

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/sra_sts.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
88
SPDX-License-Identifier: MIT-0
99
"""
10+
1011
import logging
1112
import os
1213
from typing import Any

0 commit comments

Comments
 (0)