Skip to main content

Type annotations for boto3.NetworkFirewall 1.18.13 service, generated by mypy-boto3-builder 5.1.0

Project description

mypy-boto3-network-firewall

PyPI - mypy-boto3-network-firewall PyPI - Python Version Docs PyPI - Downloads

boto3.typed

Type annotations for boto3.NetworkFirewall 1.18.13 service compatible with VSCode, PyCharm, Emacs, Sublime Text, mypy, pyright and other tools.

Generated by mypy-boto3-builder 5.1.0.

More information can be found on boto3-stubs page and in mypy-boto3-network-firewall docs

See how it helps to find and fix potential bugs:

boto3-stubs demo

How to install

Install boto3-stubs for NetworkFirewall service.

python -m pip install boto3-stubs[network-firewall]

Usage

VSCode

  • Install Python extension
  • Install Pylance extension
  • Set Pylance as your Python Language Server
  • Install boto-stubs[network-firewall] in your environment: python -m pip install 'boto3-stubs[network-firewall]'

Both type checking and auto-complete should work for NetworkFirewall service. No explicit type annotations required, write your boto3 code as usual.

PyCharm

  • Install boto-stubs[network-firewall] in your environment: python -m pip install 'boto3-stubs[network-firewall]'

Both type checking and auto-complete should work for NetworkFirewall service. No explicit type annotations required, write your boto3 code as usual. Auto-complete can be slow on big projects or if you have a lot of installed boto3-stubs submodules.

Other IDEs

Not tested, but as long as your IDE support mypy or pyright, everything should work.

mypy

  • Install mypy: python -m pip install mypy
  • Install boto-stubs[network-firewall] in your environment: python -m pip install 'boto3-stubs[network-firewall]'
  • Run mypy as usual

Type checking should work for NetworkFirewall service. No explicit type annotations required, write your boto3 code as usual.

pyright

  • Install pyright: yarn global add pyright
  • Install boto-stubs[network-firewall] in your environment: python -m pip install 'boto3-stubs[network-firewall]'
  • Optionally, you can install boto3-stubs to typings folder.

Type checking should work for NetworkFirewall service. No explicit type annotations required, write your boto3 code as usual.

Explicit type annotations

Client annotations

NetworkFirewallClient provides annotations for boto3.client("network-firewall").

import boto3

from mypy_boto3_network_firewall import NetworkFirewallClient

client: NetworkFirewallClient = boto3.client("network-firewall")

# now client usage is checked by mypy and IDE should provide code auto-complete

# works for session as well
session = boto3.session.Session(region="us-west-1")
session_client: NetworkFirewallClient = session.client("network-firewall")

Paginators annotations

mypy_boto3_network_firewall.paginator module contains type annotations for all paginators.

from mypy_boto3_network_firewall import NetworkFirewallClient
from mypy_boto3_network_firewall.paginator import (
    ListFirewallPoliciesPaginator,
    ListFirewallsPaginator,
    ListRuleGroupsPaginator,
    ListTagsForResourcePaginator,
)

client: NetworkFirewallClient = boto3.client("network-firewall")

# Explicit type annotations are optional here
# Type should be correctly discovered by mypy and IDEs
# VSCode requires explicit type annotations
list_firewall_policies_paginator: ListFirewallPoliciesPaginator = client.get_paginator("list_firewall_policies")
list_firewalls_paginator: ListFirewallsPaginator = client.get_paginator("list_firewalls")
list_rule_groups_paginator: ListRuleGroupsPaginator = client.get_paginator("list_rule_groups")
list_tags_for_resource_paginator: ListTagsForResourcePaginator = client.get_paginator("list_tags_for_resource")

Literals

mypy_boto3_network_firewall.literals module contains literals extracted from shapes that can be used in user code for type checking.

from mypy_boto3_network_firewall.literals import (
    AttachmentStatusType,
    ConfigurationSyncStateType,
    FirewallStatusValueType,
    GeneratedRulesTypeType,
    ListFirewallPoliciesPaginatorName,
    ListFirewallsPaginatorName,
    ListRuleGroupsPaginatorName,
    ListTagsForResourcePaginatorName,
    LogDestinationTypeType,
    LogTypeType,
    PerObjectSyncStatusType,
    ResourceStatusType,
    RuleGroupTypeType,
    StatefulActionType,
    StatefulRuleDirectionType,
    StatefulRuleProtocolType,
    TCPFlagType,
    TargetTypeType,
)

def check_value(value: AttachmentStatusType) -> bool:
    ...

Typed dictionaries

mypy_boto3_network_firewall.type_defs module contains structures and shapes assembled to typed dictionaries for additional type checking.

from mypy_boto3_network_firewall.type_defs import (
    ActionDefinitionTypeDef,
    AddressTypeDef,
    AssociateFirewallPolicyRequestRequestTypeDef,
    AssociateFirewallPolicyResponseTypeDef,
    AssociateSubnetsRequestRequestTypeDef,
    AssociateSubnetsResponseTypeDef,
    AttachmentTypeDef,
    CreateFirewallPolicyRequestRequestTypeDef,
    CreateFirewallPolicyResponseTypeDef,
    CreateFirewallRequestRequestTypeDef,
    CreateFirewallResponseTypeDef,
    CreateRuleGroupRequestRequestTypeDef,
    CreateRuleGroupResponseTypeDef,
    CustomActionTypeDef,
    DeleteFirewallPolicyRequestRequestTypeDef,
    DeleteFirewallPolicyResponseTypeDef,
    DeleteFirewallRequestRequestTypeDef,
    DeleteFirewallResponseTypeDef,
    DeleteResourcePolicyRequestRequestTypeDef,
    DeleteRuleGroupRequestRequestTypeDef,
    DeleteRuleGroupResponseTypeDef,
    DescribeFirewallPolicyRequestRequestTypeDef,
    DescribeFirewallPolicyResponseTypeDef,
    DescribeFirewallRequestRequestTypeDef,
    DescribeFirewallResponseTypeDef,
    DescribeLoggingConfigurationRequestRequestTypeDef,
    DescribeLoggingConfigurationResponseTypeDef,
    DescribeResourcePolicyRequestRequestTypeDef,
    DescribeResourcePolicyResponseTypeDef,
    DescribeRuleGroupRequestRequestTypeDef,
    DescribeRuleGroupResponseTypeDef,
    DimensionTypeDef,
    DisassociateSubnetsRequestRequestTypeDef,
    DisassociateSubnetsResponseTypeDef,
    FirewallMetadataTypeDef,
    FirewallPolicyMetadataTypeDef,
    FirewallPolicyResponseTypeDef,
    FirewallPolicyTypeDef,
    FirewallStatusTypeDef,
    FirewallTypeDef,
    HeaderTypeDef,
    IPSetTypeDef,
    ListFirewallPoliciesRequestRequestTypeDef,
    ListFirewallPoliciesResponseTypeDef,
    ListFirewallsRequestRequestTypeDef,
    ListFirewallsResponseTypeDef,
    ListRuleGroupsRequestRequestTypeDef,
    ListRuleGroupsResponseTypeDef,
    ListTagsForResourceRequestRequestTypeDef,
    ListTagsForResourceResponseTypeDef,
    LogDestinationConfigTypeDef,
    LoggingConfigurationTypeDef,
    MatchAttributesTypeDef,
    PaginatorConfigTypeDef,
    PerObjectStatusTypeDef,
    PortRangeTypeDef,
    PortSetTypeDef,
    PublishMetricActionTypeDef,
    PutResourcePolicyRequestRequestTypeDef,
    ResponseMetadataTypeDef,
    RuleDefinitionTypeDef,
    RuleGroupMetadataTypeDef,
    RuleGroupResponseTypeDef,
    RuleGroupTypeDef,
    RuleOptionTypeDef,
    RuleVariablesTypeDef,
    RulesSourceListTypeDef,
    RulesSourceTypeDef,
    StatefulRuleGroupReferenceTypeDef,
    StatefulRuleTypeDef,
    StatelessRuleGroupReferenceTypeDef,
    StatelessRuleTypeDef,
    StatelessRulesAndCustomActionsTypeDef,
    SubnetMappingTypeDef,
    SyncStateTypeDef,
    TCPFlagFieldTypeDef,
    TagResourceRequestRequestTypeDef,
    TagTypeDef,
    UntagResourceRequestRequestTypeDef,
    UpdateFirewallDeleteProtectionRequestRequestTypeDef,
    UpdateFirewallDeleteProtectionResponseTypeDef,
    UpdateFirewallDescriptionRequestRequestTypeDef,
    UpdateFirewallDescriptionResponseTypeDef,
    UpdateFirewallPolicyChangeProtectionRequestRequestTypeDef,
    UpdateFirewallPolicyChangeProtectionResponseTypeDef,
    UpdateFirewallPolicyRequestRequestTypeDef,
    UpdateFirewallPolicyResponseTypeDef,
    UpdateLoggingConfigurationRequestRequestTypeDef,
    UpdateLoggingConfigurationResponseTypeDef,
    UpdateRuleGroupRequestRequestTypeDef,
    UpdateRuleGroupResponseTypeDef,
    UpdateSubnetChangeProtectionRequestRequestTypeDef,
    UpdateSubnetChangeProtectionResponseTypeDef,
)

def get_structure() -> ActionDefinitionTypeDef:
    return {
      ...
    }

Versioning

mypy-boto3-network-firewall version is the same as related boto3 version and follows PEP 440 format.

Documentation

All type annotations can be found in mypy-boto3-network-firewall docs

Support and contributing

This package is auto-generated. Please reports any bugs or request new features in mypy-boto3-builder repository.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mypy-boto3-network-firewall-1.18.13.tar.gz (19.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mypy_boto3_network_firewall-1.18.13-py3-none-any.whl (23.7 kB view details)

Uploaded Python 3

File details

Details for the file mypy-boto3-network-firewall-1.18.13.tar.gz.

File metadata

  • Download URL: mypy-boto3-network-firewall-1.18.13.tar.gz
  • Upload date:
  • Size: 19.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.6.3 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.6

File hashes

Hashes for mypy-boto3-network-firewall-1.18.13.tar.gz
Algorithm Hash digest
SHA256 c3a2fb2195f4d3ae04033279e3138e05120e848ccab110eba4ce8f1ef25cd42f
MD5 45ac3079da1801a89ed4b325da01308c
BLAKE2b-256 b6ad7cf6abae373b632ffd6c9e58c3e1cb9809a730ed1a1da4dcd530cc14c03a

See more details on using hashes here.

File details

Details for the file mypy_boto3_network_firewall-1.18.13-py3-none-any.whl.

File metadata

  • Download URL: mypy_boto3_network_firewall-1.18.13-py3-none-any.whl
  • Upload date:
  • Size: 23.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.6.3 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.0 CPython/3.9.6

File hashes

Hashes for mypy_boto3_network_firewall-1.18.13-py3-none-any.whl
Algorithm Hash digest
SHA256 59933b3078903190f1c77e517b0d8703cad6c56981f8055425f9d85539d2e5a9
MD5 391dca89c3575e7aba454261e42a97a3
BLAKE2b-256 a6b7dda0b8f19a52d9cef9a1b72c621f01e07ccd4ff27bf3962f195a0a689d34

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page