Skip to main content

Type annotations for boto3.NetworkFirewall 1.17.50 service, generated by mypy-boto3-buider 4.5.0

Project description

mypy-boto3-network-firewall

PyPI - mypy-boto3-network-firewall PyPI - Python Version Docs

boto3.typed

Type annotations for boto3.NetworkFirewall 1.17.50 service compatible with VSCode, PyCharm, Emacs, Sublime Text, mypy, pyright and other tools.

Generated by mypy-boto3-buider 4.5.0.

More information can be found on boto3-stubs page.

See how it helps to find and fix potential bugs:

boto3-stubs demo

How to install

Install boto3-stubs for NetworkFirewall service.

python -m pip install boto3-stubs[network-firewall]

Usage

VSCode

  • Install Python extension
  • Install Pylance extension
  • Set Pylance as your Python Language Server
  • Install boto-stubs[network-firewall] in your environment: python -m pip install 'boto3-stubs[network-firewall]'

Both type checking and auto-complete should work for NetworkFirewall service. No explicit type annotations required, write your boto3 code as usual.

PyCharm

  • Install boto-stubs[network-firewall] in your environment: python -m pip install 'boto3-stubs[network-firewall]'

Both type checking and auto-complete should work for NetworkFirewall service. No explicit type annotations required, write your boto3 code as usual. Auto-complete can be slow on big projects or if you have a lot of installed boto3-stubs submodules.

Other IDEs

Not tested, but as long as your IDE support mypy or pyright, everything should work.

mypy

  • Install mypy: python -m pip install mypy
  • Install boto-stubs[network-firewall] in your environment: python -m pip install 'boto3-stubs[network-firewall]'
  • Run mypy as usual

Type checking should work for NetworkFirewall service. No explicit type annotations required, write your boto3 code as usual.

pyright

  • Install pyright: yarn global add pyright
  • Install boto-stubs[network-firewall] in your environment: python -m pip install 'boto3-stubs[network-firewall]'
  • Optionally, you can install boto3-stubs to typings folder.

Type checking should work for NetworkFirewall service. No explicit type annotations required, write your boto3 code as usual.

Explicit type annotations

Client annotations

NetworkFirewallClient provides annotations for boto3.client("network-firewall").

import boto3

from mypy_boto3_network_firewall import NetworkFirewallClient

client: NetworkFirewallClient = boto3.client("network-firewall")

# now client usage is checked by mypy and IDE should provide code auto-complete

# works for session as well
session = boto3.session.Session(region="us-west-1")
session_client: NetworkFirewallClient = session.client("network-firewall")

Paginators annotations

mypy_boto3_network_firewall.paginator module contains type annotations for all paginators.

from mypy_boto3_network_firewall import NetworkFirewallClient
from mypy_boto3_network_firewall.paginator import (
    ListFirewallPoliciesPaginator,
    ListFirewallsPaginator,
    ListRuleGroupsPaginator,
    ListTagsForResourcePaginator,
)

client: NetworkFirewallClient = boto3.client("network-firewall")

# Explicit type annotations are optional here
# Type should be correctly discovered by mypy and IDEs
# VSCode requires explicit type annotations
list_firewall_policies_paginator: ListFirewallPoliciesPaginator = client.get_paginator("list_firewall_policies")
list_firewalls_paginator: ListFirewallsPaginator = client.get_paginator("list_firewalls")
list_rule_groups_paginator: ListRuleGroupsPaginator = client.get_paginator("list_rule_groups")
list_tags_for_resource_paginator: ListTagsForResourcePaginator = client.get_paginator("list_tags_for_resource")

Typed dictionations

mypy_boto3_network_firewall.type_defs module contains structures and shapes assembled to typed dictionaries for additional type checking.

from mypy_boto3_network_firewall.type_defs import (
    ActionDefinitionTypeDef,
    AddressTypeDef,
    AttachmentTypeDef,
    CustomActionTypeDef,
    DimensionTypeDef,
    FirewallMetadataTypeDef,
    FirewallPolicyMetadataTypeDef,
    FirewallPolicyResponseTypeDef,
    FirewallPolicyTypeDef,
    FirewallStatusTypeDef,
    FirewallTypeDef,
    HeaderTypeDef,
    IPSetTypeDef,
    LogDestinationConfigTypeDef,
    LoggingConfigurationTypeDef,
    MatchAttributesTypeDef,
    PerObjectStatusTypeDef,
    PortRangeTypeDef,
    PortSetTypeDef,
    PublishMetricActionTypeDef,
    RuleDefinitionTypeDef,
    RuleGroupMetadataTypeDef,
    RuleGroupResponseTypeDef,
    RuleGroupTypeDef,
    RuleOptionTypeDef,
    RuleVariablesTypeDef,
    RulesSourceListTypeDef,
    RulesSourceTypeDef,
    StatefulRuleGroupReferenceTypeDef,
    StatefulRuleTypeDef,
    StatelessRuleGroupReferenceTypeDef,
    StatelessRuleTypeDef,
    StatelessRulesAndCustomActionsTypeDef,
    SubnetMappingTypeDef,
    SyncStateTypeDef,
    TCPFlagFieldTypeDef,
    TagTypeDef,
    AssociateFirewallPolicyResponseTypeDef,
    AssociateSubnetsResponseTypeDef,
    CreateFirewallPolicyResponseTypeDef,
    CreateFirewallResponseTypeDef,
    CreateRuleGroupResponseTypeDef,
    DeleteFirewallPolicyResponseTypeDef,
    DeleteFirewallResponseTypeDef,
    DeleteRuleGroupResponseTypeDef,
    DescribeFirewallPolicyResponseTypeDef,
    DescribeFirewallResponseTypeDef,
    DescribeLoggingConfigurationResponseTypeDef,
    DescribeResourcePolicyResponseTypeDef,
    DescribeRuleGroupResponseTypeDef,
    DisassociateSubnetsResponseTypeDef,
    ListFirewallPoliciesResponseTypeDef,
    ListFirewallsResponseTypeDef,
    ListRuleGroupsResponseTypeDef,
    ListTagsForResourceResponseTypeDef,
    PaginatorConfigTypeDef,
    UpdateFirewallDeleteProtectionResponseTypeDef,
    UpdateFirewallDescriptionResponseTypeDef,
    UpdateFirewallPolicyChangeProtectionResponseTypeDef,
    UpdateFirewallPolicyResponseTypeDef,
    UpdateLoggingConfigurationResponseTypeDef,
    UpdateRuleGroupResponseTypeDef,
    UpdateSubnetChangeProtectionResponseTypeDef,
)

def get_structure() -> ActionDefinitionTypeDef:
    return {
      ...
    }

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mypy-boto3-network-firewall-1.17.50.1.tar.gz (12.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mypy_boto3_network_firewall-1.17.50.1-py3-none-any.whl (17.6 kB view details)

Uploaded Python 3

File details

Details for the file mypy-boto3-network-firewall-1.17.50.1.tar.gz.

File metadata

  • Download URL: mypy-boto3-network-firewall-1.17.50.1.tar.gz
  • Upload date:
  • Size: 12.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/3.10.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.8.8

File hashes

Hashes for mypy-boto3-network-firewall-1.17.50.1.tar.gz
Algorithm Hash digest
SHA256 4356bf7160a1f96be6b98898b04345f4ed14c38a197ccfde2058cedfe00fa030
MD5 9d4881da28dc27c6329d37a0e2b6d2ee
BLAKE2b-256 2703f7e69b39270af21c01072fe033a9e9c25561ef5b31aea1b1d402d823c9bb

See more details on using hashes here.

File details

Details for the file mypy_boto3_network_firewall-1.17.50.1-py3-none-any.whl.

File metadata

  • Download URL: mypy_boto3_network_firewall-1.17.50.1-py3-none-any.whl
  • Upload date:
  • Size: 17.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/3.10.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.8.8

File hashes

Hashes for mypy_boto3_network_firewall-1.17.50.1-py3-none-any.whl
Algorithm Hash digest
SHA256 a0a1c6908c669ce4dc8fd2fc7d26cd8b762da681310d5df34b532d9d587c800a
MD5 873672c161d1151ebaf12385cd548623
BLAKE2b-256 8da45739daeccd703534d1d34b0cfb71757492979d37f0331dc9db570a35503a

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page