Skip to main content

Type annotations for boto3.AccessAnalyzer 1.20.46 service generated by mypy-boto3-builder 6.4.1

Project description

mypy-boto3-accessanalyzer

PyPI - mypy-boto3-accessanalyzer PyPI - Python Version Docs PyPI - Downloads

boto3.typed

Type annotations for boto3.AccessAnalyzer 1.20.46 service compatible with VSCode, PyCharm, Emacs, Sublime Text, mypy, pyright and other tools.

Generated by mypy-boto3-builder 6.4.1.

More information can be found on boto3-stubs page and in mypy-boto3-accessanalyzer docs

See how it helps to find and fix potential bugs:

boto3-stubs demo

How to install

VSCode extension

Add AWS Boto3 extension to your VSCode and run AWS boto3: Quick Start command.

Click Modify and select boto3 common and AccessAnalyzer.

From PyPI with pip

Install boto3-stubs for AccessAnalyzer service.

python -m pip install boto3-stubs[accessanalyzer]

Usage

VSCode

  • Install Python extension
  • Install Pylance extension
  • Set Pylance as your Python Language Server
  • Install boto3-stubs[accessanalyzer] in your environment: python -m pip install 'boto3-stubs[accessanalyzer]'

Both type checking and auto-complete should work for AccessAnalyzer service. No explicit type annotations required, write your boto3 code as usual.

PyCharm

  • Install boto3-stubs[accessanalyzer] in your environment: python -m pip install 'boto3-stubs[accessanalyzer]'

Both type checking and auto-complete should work for AccessAnalyzer service. No explicit type annotations required, write your boto3 code as usual. Auto-complete can be slow on big projects or if you have a lot of installed boto3-stubs submodules.

Other IDEs

Not tested, but as long as your IDE supports mypy or pyright, everything should work.

mypy

  • Install mypy: python -m pip install mypy
  • Install boto3-stubs[accessanalyzer] in your environment: python -m pip install 'boto3-stubs[accessanalyzer]'
  • Run mypy as usual

Type checking should work for AccessAnalyzer service. No explicit type annotations required, write your boto3 code as usual.

pyright

  • Install pyright: yarn global add pyright
  • Install boto3-stubs[accessanalyzer] in your environment: python -m pip install 'boto3-stubs[accessanalyzer]'
  • Optionally, you can install boto3-stubs to typings folder.

Type checking should work for AccessAnalyzer service. No explicit type annotations required, write your boto3 code as usual.

Explicit type annotations

Client annotations

AccessAnalyzerClient provides annotations for boto3.client("accessanalyzer").

import boto3

from mypy_boto3_accessanalyzer import AccessAnalyzerClient

client: AccessAnalyzerClient = boto3.client("accessanalyzer")

# now client usage is checked by mypy and IDE should provide code auto-complete

# works for session as well
session = boto3.session.Session(region="us-west-1")
session_client: AccessAnalyzerClient = session.client("accessanalyzer")

Paginators annotations

mypy_boto3_accessanalyzer.paginator module contains type annotations for all paginators.

from mypy_boto3_accessanalyzer import AccessAnalyzerClient
from mypy_boto3_accessanalyzer.paginator import (
    ListAccessPreviewFindingsPaginator,
    ListAccessPreviewsPaginator,
    ListAnalyzedResourcesPaginator,
    ListAnalyzersPaginator,
    ListArchiveRulesPaginator,
    ListFindingsPaginator,
    ListPolicyGenerationsPaginator,
    ValidatePolicyPaginator,
)

client: AccessAnalyzerClient = boto3.client("accessanalyzer")

# Explicit type annotations are optional here
# Type should be correctly discovered by mypy and IDEs
# VSCode requires explicit type annotations
list_access_preview_findings_paginator: ListAccessPreviewFindingsPaginator = client.get_paginator("list_access_preview_findings")
list_access_previews_paginator: ListAccessPreviewsPaginator = client.get_paginator("list_access_previews")
list_analyzed_resources_paginator: ListAnalyzedResourcesPaginator = client.get_paginator("list_analyzed_resources")
list_analyzers_paginator: ListAnalyzersPaginator = client.get_paginator("list_analyzers")
list_archive_rules_paginator: ListArchiveRulesPaginator = client.get_paginator("list_archive_rules")
list_findings_paginator: ListFindingsPaginator = client.get_paginator("list_findings")
list_policy_generations_paginator: ListPolicyGenerationsPaginator = client.get_paginator("list_policy_generations")
validate_policy_paginator: ValidatePolicyPaginator = client.get_paginator("validate_policy")

Literals

mypy_boto3_accessanalyzer.literals module contains literals extracted from shapes that can be used in user code for type checking.

from mypy_boto3_accessanalyzer.literals import (
    AccessPreviewStatusReasonCodeType,
    AccessPreviewStatusType,
    AclPermissionType,
    AnalyzerStatusType,
    FindingChangeTypeType,
    FindingSourceTypeType,
    FindingStatusType,
    FindingStatusUpdateType,
    JobErrorCodeType,
    JobStatusType,
    KmsGrantOperationType,
    ListAccessPreviewFindingsPaginatorName,
    ListAccessPreviewsPaginatorName,
    ListAnalyzedResourcesPaginatorName,
    ListAnalyzersPaginatorName,
    ListArchiveRulesPaginatorName,
    ListFindingsPaginatorName,
    ListPolicyGenerationsPaginatorName,
    LocaleType,
    OrderByType,
    PolicyTypeType,
    ReasonCodeType,
    ResourceTypeType,
    TypeType,
    ValidatePolicyFindingTypeType,
    ValidatePolicyPaginatorName,
    ValidatePolicyResourceTypeType,
    ServiceName,
    PaginatorName,
)

def check_value(value: AccessPreviewStatusReasonCodeType) -> bool:
    ...

Typed dictionaries

mypy_boto3_accessanalyzer.type_defs module contains structures and shapes assembled to typed dictionaries for additional type checking.

from mypy_boto3_accessanalyzer.type_defs import (
    AccessPreviewFindingTypeDef,
    AccessPreviewStatusReasonTypeDef,
    AccessPreviewSummaryTypeDef,
    AccessPreviewTypeDef,
    AclGranteeTypeDef,
    AnalyzedResourceSummaryTypeDef,
    AnalyzedResourceTypeDef,
    AnalyzerSummaryTypeDef,
    ApplyArchiveRuleRequestRequestTypeDef,
    ArchiveRuleSummaryTypeDef,
    CancelPolicyGenerationRequestRequestTypeDef,
    CloudTrailDetailsTypeDef,
    CloudTrailPropertiesTypeDef,
    ConfigurationTypeDef,
    CreateAccessPreviewRequestRequestTypeDef,
    CreateAccessPreviewResponseTypeDef,
    CreateAnalyzerRequestRequestTypeDef,
    CreateAnalyzerResponseTypeDef,
    CreateArchiveRuleRequestRequestTypeDef,
    CriterionTypeDef,
    DeleteAnalyzerRequestRequestTypeDef,
    DeleteArchiveRuleRequestRequestTypeDef,
    FindingSourceDetailTypeDef,
    FindingSourceTypeDef,
    FindingSummaryTypeDef,
    FindingTypeDef,
    GeneratedPolicyPropertiesTypeDef,
    GeneratedPolicyResultTypeDef,
    GeneratedPolicyTypeDef,
    GetAccessPreviewRequestRequestTypeDef,
    GetAccessPreviewResponseTypeDef,
    GetAnalyzedResourceRequestRequestTypeDef,
    GetAnalyzedResourceResponseTypeDef,
    GetAnalyzerRequestRequestTypeDef,
    GetAnalyzerResponseTypeDef,
    GetArchiveRuleRequestRequestTypeDef,
    GetArchiveRuleResponseTypeDef,
    GetFindingRequestRequestTypeDef,
    GetFindingResponseTypeDef,
    GetGeneratedPolicyRequestRequestTypeDef,
    GetGeneratedPolicyResponseTypeDef,
    IamRoleConfigurationTypeDef,
    InlineArchiveRuleTypeDef,
    JobDetailsTypeDef,
    JobErrorTypeDef,
    KmsGrantConfigurationTypeDef,
    KmsGrantConstraintsTypeDef,
    KmsKeyConfigurationTypeDef,
    ListAccessPreviewFindingsRequestRequestTypeDef,
    ListAccessPreviewFindingsResponseTypeDef,
    ListAccessPreviewsRequestRequestTypeDef,
    ListAccessPreviewsResponseTypeDef,
    ListAnalyzedResourcesRequestRequestTypeDef,
    ListAnalyzedResourcesResponseTypeDef,
    ListAnalyzersRequestRequestTypeDef,
    ListAnalyzersResponseTypeDef,
    ListArchiveRulesRequestRequestTypeDef,
    ListArchiveRulesResponseTypeDef,
    ListFindingsRequestRequestTypeDef,
    ListFindingsResponseTypeDef,
    ListPolicyGenerationsRequestRequestTypeDef,
    ListPolicyGenerationsResponseTypeDef,
    ListTagsForResourceRequestRequestTypeDef,
    ListTagsForResourceResponseTypeDef,
    LocationTypeDef,
    NetworkOriginConfigurationTypeDef,
    PaginatorConfigTypeDef,
    PathElementTypeDef,
    PolicyGenerationDetailsTypeDef,
    PolicyGenerationTypeDef,
    PositionTypeDef,
    ResponseMetadataTypeDef,
    S3AccessPointConfigurationTypeDef,
    S3BucketAclGrantConfigurationTypeDef,
    S3BucketConfigurationTypeDef,
    S3PublicAccessBlockConfigurationTypeDef,
    SecretsManagerSecretConfigurationTypeDef,
    SortCriteriaTypeDef,
    SpanTypeDef,
    SqsQueueConfigurationTypeDef,
    StartPolicyGenerationRequestRequestTypeDef,
    StartPolicyGenerationResponseTypeDef,
    StartResourceScanRequestRequestTypeDef,
    StatusReasonTypeDef,
    SubstringTypeDef,
    TagResourceRequestRequestTypeDef,
    TrailPropertiesTypeDef,
    TrailTypeDef,
    UntagResourceRequestRequestTypeDef,
    UpdateArchiveRuleRequestRequestTypeDef,
    UpdateFindingsRequestRequestTypeDef,
    ValidatePolicyFindingTypeDef,
    ValidatePolicyRequestRequestTypeDef,
    ValidatePolicyResponseTypeDef,
    VpcConfigurationTypeDef,
)

def get_structure() -> AccessPreviewFindingTypeDef:
    return {
      ...
    }

Versioning

mypy-boto3-accessanalyzer version is the same as related boto3 version and follows PEP 440 format.

Documentation

All type annotations can be found in mypy-boto3-accessanalyzer docs

Support and contributing

This package is auto-generated. Please reports any bugs or request new features in mypy-boto3-builder repository.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mypy-boto3-accessanalyzer-1.20.46.post1.tar.gz (23.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file mypy-boto3-accessanalyzer-1.20.46.post1.tar.gz.

File metadata

  • Download URL: mypy-boto3-accessanalyzer-1.20.46.post1.tar.gz
  • Upload date:
  • Size: 23.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.10.1 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.10.2

File hashes

Hashes for mypy-boto3-accessanalyzer-1.20.46.post1.tar.gz
Algorithm Hash digest
SHA256 03acf83283c100799fa5699b7127ea0aa54f5d9e5b9f0409ba49b1eed7d0e9ee
MD5 a2922b2594de4a8bcc2e581bdfc2b3bf
BLAKE2b-256 97fa9f951b9a701b61b78c536e9f12ea9642ddb1b6f9c0830872684db303d133

See more details on using hashes here.

File details

Details for the file mypy_boto3_accessanalyzer-1.20.46.post1-py3-none-any.whl.

File metadata

  • Download URL: mypy_boto3_accessanalyzer-1.20.46.post1-py3-none-any.whl
  • Upload date:
  • Size: 30.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.10.1 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.10.2

File hashes

Hashes for mypy_boto3_accessanalyzer-1.20.46.post1-py3-none-any.whl
Algorithm Hash digest
SHA256 b258c90f495e2281dd4dd3ee9caf628041949b9df114cb0baff781c2c62489eb
MD5 fe26e478d5ee2a2fa2bcf7584c7a2754
BLAKE2b-256 328d343195e4cecc4f07b5762ec524b2c0d14e0b6cb8c814cf7f1091536ea854

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page