diff --git a/.github/workflows/test-python.yml b/.github/workflows/test-python.yml index 7b765b4db..dab00833e 100644 --- a/.github/workflows/test-python.yml +++ b/.github/workflows/test-python.yml @@ -3,8 +3,9 @@ name: Python Tests on: push: pull_request: - paths: - - bindings/python/* + paths: + - bindings/python/* + - bindings/python/**/*.py concurrency: group: python-test-${{ github.ref }} diff --git a/bindings/python/test/performance/perf_test.py b/bindings/python/test/performance/perf_test.py index f37fbc8cb..211b2f5f6 100644 --- a/bindings/python/test/performance/perf_test.py +++ b/bindings/python/test/performance/perf_test.py @@ -79,7 +79,9 @@ def tearDownModule(): class TestBulkDecryption(unittest.TestCase): def setUp(self): - opts = MongoCryptOptions({"local": {"key": LOCAL_MASTER_KEY}}, enable_range_v2=True) + opts = MongoCryptOptions( + {"local": {"key": LOCAL_MASTER_KEY}}, enable_range_v2=True + ) callback = MockCallback(key_docs=[bson_data("keyDocument.json")]) self.mongocrypt = MongoCrypt(opts, callback) self.encrypter = ExplicitEncrypter(callback, opts) diff --git a/bindings/python/test/test_mongocrypt.py b/bindings/python/test/test_mongocrypt.py index 7d8d97fdb..eb6a52f27 100644 --- a/bindings/python/test/test_mongocrypt.py +++ b/bindings/python/test/test_mongocrypt.py @@ -381,7 +381,9 @@ def test_encrypt_encrypted_fields_map(self): encrypted_fields_map = bson_data( "compact/success/encrypted-field-config-map.json" ) - mc = self.create_mongocrypt(encrypted_fields_map=encrypted_fields_map, enable_range_v2=True) + mc = self.create_mongocrypt( + encrypted_fields_map=encrypted_fields_map, enable_range_v2=True + ) self.addCleanup(mc.close) with mc.encryption_context("db", bson_data("compact/success/cmd.json")) as ctx: self.assertEqual(ctx.state, lib.MONGOCRYPT_CTX_NEED_MONGO_KEYS) @@ -1002,7 +1004,9 @@ async def test_range_query_int32(self): is_expression=True, ) encrypted_val = bson.decode(encrypted, OPTS) - self.assertEqual(encrypted_val, adjust_range_counter(encrypted_val, expected)) + self.assertEqual( + encrypted_val, adjust_range_counter(encrypted_val, expected) + ) class TestNeedKMSAzureCredentials(unittest.TestCase): @@ -1179,13 +1183,18 @@ def adjust_range_counter(encrypted_val, expected): _decoded2 = bson.decode(_payload2[1:]) for _ in range(10): _decoded1["payloadId"] += 1 - expected["v"]["$and"][0]["age"]["$gte"] = Binary(_payload1[0:1]+bson.encode(_decoded1), 6) + expected["v"]["$and"][0]["age"]["$gte"] = Binary( + _payload1[0:1] + bson.encode(_decoded1), 6 + ) _decoded2["payloadId"] += 1 - expected["v"]["$and"][1]["age"]["$lte"] = Binary(_payload2[0:1]+bson.encode(_decoded2), 6) + expected["v"]["$and"][1]["age"]["$lte"] = Binary( + _payload2[0:1] + bson.encode(_decoded2), 6 + ) if encrypted_val == expected: break return expected + class AsyncKeyVaultCallback(MockAsyncCallback): def __init__(self, kms_reply=None): super().__init__(kms_reply=kms_reply)