Skip to main content

Type annotations for boto3.NetworkFirewall 1.26.39 service generated with mypy-boto3-builder 7.12.2

Project description

mypy-boto3-network-firewall

PyPI - mypy-boto3-network-firewall PyPI - Python Version Docs PyPI - Downloads

boto3.typed

Type annotations for boto3.NetworkFirewall 1.26.39 service compatible with VSCode, PyCharm, Emacs, Sublime Text, mypy, pyright and other tools.

Generated by mypy-boto3-builder 7.12.2.

More information can be found on boto3-stubs page and in mypy-boto3-network-firewall docs.

See how it helps to find and fix potential bugs:

boto3-stubs demo

How to install

VSCode extension

Add AWS Boto3 extension to your VSCode and run AWS boto3: Quick Start command.

Click Modify and select boto3 common and NetworkFirewall.

From PyPI with pip

Install boto3-stubs for NetworkFirewall service.

# install with boto3 type annotations
python -m pip install 'boto3-stubs[network-firewall]'


# Lite version does not provide session.client/resource overloads
# it is more RAM-friendly, but requires explicit type annotations
python -m pip install 'boto3-stubs-lite[network-firewall]'


# standalone installation
python -m pip install mypy-boto3-network-firewall

How to uninstall

python -m pip uninstall -y mypy-boto3-network-firewall

Usage

VSCode

python -m pip install 'boto3-stubs[network-firewall]'

Both type checking and code completion should now work. No explicit type annotations required, write your boto3 code as usual.

PyCharm

Install boto3-stubs-lite[network-firewall] in your environment:

python -m pip install 'boto3-stubs-lite[network-firewall]'`

Both type checking and code completion should now work. Explicit type annotations are required.

Use boto3-stubs package instead for implicit type discovery.

Emacs

  • Install boto3-stubs with services you use in your environment:
python -m pip install 'boto3-stubs[network-firewall]'
(use-package lsp-pyright
  :ensure t
  :hook (python-mode . (lambda ()
                          (require 'lsp-pyright)
                          (lsp)))  ; or lsp-deferred
  :init (when (executable-find "python3")
          (setq lsp-pyright-python-executable-cmd "python3"))
  )
  • Make sure emacs uses the environment where you have installed boto3-stubs

Type checking should now work. No explicit type annotations required, write your boto3 code as usual.

Sublime Text

  • Install boto3-stubs[network-firewall] with services you use in your environment:
python -m pip install 'boto3-stubs[network-firewall]'

Type checking should now work. No explicit type annotations required, write your boto3 code as usual.

Other IDEs

Not tested, but as long as your IDE supports mypy or pyright, everything should work.

mypy

  • Install mypy: python -m pip install mypy
  • Install boto3-stubs[network-firewall] in your environment:
python -m pip install 'boto3-stubs[network-firewall]'`

Type checking should now work. No explicit type annotations required, write your boto3 code as usual.

pyright

  • Install pyright: npm i -g pyright
  • Install boto3-stubs[network-firewall] in your environment:
python -m pip install 'boto3-stubs[network-firewall]'

Optionally, you can install boto3-stubs to typings folder.

Type checking should now work. No explicit type annotations required, write your boto3 code as usual.

Explicit type annotations

Client annotations

NetworkFirewallClient provides annotations for boto3.client("network-firewall").

from boto3.session import Session

from mypy_boto3_network_firewall import NetworkFirewallClient

client: NetworkFirewallClient = Session().client("network-firewall")

# now client usage is checked by mypy and IDE should provide code completion

Paginators annotations

mypy_boto3_network_firewall.paginator module contains type annotations for all paginators.

from boto3.session import Session

from mypy_boto3_network_firewall import NetworkFirewallClient
from mypy_boto3_network_firewall.paginator import (
    ListFirewallPoliciesPaginator,
    ListFirewallsPaginator,
    ListRuleGroupsPaginator,
    ListTagsForResourcePaginator,
)

client: NetworkFirewallClient = Session().client("network-firewall")

# Explicit type annotations are optional here
# Types should be correctly discovered by mypy and IDEs
list_firewall_policies_paginator: ListFirewallPoliciesPaginator = client.get_paginator(
    "list_firewall_policies"
)
list_firewalls_paginator: ListFirewallsPaginator = client.get_paginator("list_firewalls")
list_rule_groups_paginator: ListRuleGroupsPaginator = client.get_paginator("list_rule_groups")
list_tags_for_resource_paginator: ListTagsForResourcePaginator = client.get_paginator(
    "list_tags_for_resource"
)

Literals

mypy_boto3_network_firewall.literals module contains literals extracted from shapes that can be used in user code for type checking.

from mypy_boto3_network_firewall.literals import (
    AttachmentStatusType,
    ConfigurationSyncStateType,
    EncryptionTypeType,
    FirewallStatusValueType,
    GeneratedRulesTypeType,
    ListFirewallPoliciesPaginatorName,
    ListFirewallsPaginatorName,
    ListRuleGroupsPaginatorName,
    ListTagsForResourcePaginatorName,
    LogDestinationTypeType,
    LogTypeType,
    OverrideActionType,
    PerObjectSyncStatusType,
    ResourceManagedStatusType,
    ResourceManagedTypeType,
    ResourceStatusType,
    RuleGroupTypeType,
    RuleOrderType,
    StatefulActionType,
    StatefulRuleDirectionType,
    StatefulRuleProtocolType,
    StreamExceptionPolicyType,
    TCPFlagType,
    TargetTypeType,
    NetworkFirewallServiceName,
    ServiceName,
    ResourceServiceName,
    PaginatorName,
    RegionName,
)


def check_value(value: AttachmentStatusType) -> bool:
    ...

Typed dictionaries

mypy_boto3_network_firewall.type_defs module contains structures and shapes assembled to typed dictionaries for additional type checking.

from mypy_boto3_network_firewall.type_defs import (
    AddressTypeDef,
    AssociateFirewallPolicyRequestRequestTypeDef,
    ResponseMetadataTypeDef,
    SubnetMappingTypeDef,
    AttachmentTypeDef,
    IPSetMetadataTypeDef,
    EncryptionConfigurationTypeDef,
    TagTypeDef,
    SourceMetadataTypeDef,
    DeleteFirewallPolicyRequestRequestTypeDef,
    DeleteFirewallRequestRequestTypeDef,
    DeleteResourcePolicyRequestRequestTypeDef,
    DeleteRuleGroupRequestRequestTypeDef,
    DescribeFirewallPolicyRequestRequestTypeDef,
    DescribeFirewallRequestRequestTypeDef,
    DescribeLoggingConfigurationRequestRequestTypeDef,
    DescribeResourcePolicyRequestRequestTypeDef,
    DescribeRuleGroupMetadataRequestRequestTypeDef,
    StatefulRuleOptionsTypeDef,
    DescribeRuleGroupRequestRequestTypeDef,
    DimensionTypeDef,
    DisassociateSubnetsRequestRequestTypeDef,
    FirewallMetadataTypeDef,
    FirewallPolicyMetadataTypeDef,
    StatefulEngineOptionsTypeDef,
    StatelessRuleGroupReferenceTypeDef,
    HeaderTypeDef,
    IPSetReferenceTypeDef,
    IPSetTypeDef,
    PaginatorConfigTypeDef,
    ListFirewallPoliciesRequestRequestTypeDef,
    ListFirewallsRequestRequestTypeDef,
    ListRuleGroupsRequestRequestTypeDef,
    RuleGroupMetadataTypeDef,
    ListTagsForResourceRequestRequestTypeDef,
    LogDestinationConfigTypeDef,
    PortRangeTypeDef,
    TCPFlagFieldTypeDef,
    PerObjectStatusTypeDef,
    PortSetTypeDef,
    PutResourcePolicyRequestRequestTypeDef,
    RuleOptionTypeDef,
    RulesSourceListTypeDef,
    StatefulRuleGroupOverrideTypeDef,
    UntagResourceRequestRequestTypeDef,
    UpdateFirewallDeleteProtectionRequestRequestTypeDef,
    UpdateFirewallDescriptionRequestRequestTypeDef,
    UpdateFirewallPolicyChangeProtectionRequestRequestTypeDef,
    UpdateSubnetChangeProtectionRequestRequestTypeDef,
    AssociateFirewallPolicyResponseTypeDef,
    DescribeResourcePolicyResponseTypeDef,
    UpdateFirewallDeleteProtectionResponseTypeDef,
    UpdateFirewallDescriptionResponseTypeDef,
    UpdateFirewallPolicyChangeProtectionResponseTypeDef,
    UpdateSubnetChangeProtectionResponseTypeDef,
    AssociateSubnetsRequestRequestTypeDef,
    AssociateSubnetsResponseTypeDef,
    DisassociateSubnetsResponseTypeDef,
    CIDRSummaryTypeDef,
    UpdateFirewallEncryptionConfigurationRequestRequestTypeDef,
    UpdateFirewallEncryptionConfigurationResponseTypeDef,
    CreateFirewallRequestRequestTypeDef,
    FirewallPolicyResponseTypeDef,
    FirewallTypeDef,
    ListTagsForResourceResponseTypeDef,
    TagResourceRequestRequestTypeDef,
    RuleGroupResponseTypeDef,
    DescribeRuleGroupMetadataResponseTypeDef,
    PublishMetricActionTypeDef,
    ListFirewallsResponseTypeDef,
    ListFirewallPoliciesResponseTypeDef,
    ReferenceSetsTypeDef,
    ListFirewallPoliciesRequestListFirewallPoliciesPaginateTypeDef,
    ListFirewallsRequestListFirewallsPaginateTypeDef,
    ListRuleGroupsRequestListRuleGroupsPaginateTypeDef,
    ListTagsForResourceRequestListTagsForResourcePaginateTypeDef,
    ListRuleGroupsResponseTypeDef,
    LoggingConfigurationTypeDef,
    MatchAttributesTypeDef,
    SyncStateTypeDef,
    RuleVariablesTypeDef,
    StatefulRuleTypeDef,
    StatefulRuleGroupReferenceTypeDef,
    CapacityUsageSummaryTypeDef,
    CreateFirewallPolicyResponseTypeDef,
    DeleteFirewallPolicyResponseTypeDef,
    UpdateFirewallPolicyResponseTypeDef,
    CreateRuleGroupResponseTypeDef,
    DeleteRuleGroupResponseTypeDef,
    UpdateRuleGroupResponseTypeDef,
    ActionDefinitionTypeDef,
    DescribeLoggingConfigurationResponseTypeDef,
    UpdateLoggingConfigurationRequestRequestTypeDef,
    UpdateLoggingConfigurationResponseTypeDef,
    RuleDefinitionTypeDef,
    FirewallStatusTypeDef,
    CustomActionTypeDef,
    StatelessRuleTypeDef,
    CreateFirewallResponseTypeDef,
    DeleteFirewallResponseTypeDef,
    DescribeFirewallResponseTypeDef,
    FirewallPolicyTypeDef,
    StatelessRulesAndCustomActionsTypeDef,
    CreateFirewallPolicyRequestRequestTypeDef,
    DescribeFirewallPolicyResponseTypeDef,
    UpdateFirewallPolicyRequestRequestTypeDef,
    RulesSourceTypeDef,
    RuleGroupTypeDef,
    CreateRuleGroupRequestRequestTypeDef,
    DescribeRuleGroupResponseTypeDef,
    UpdateRuleGroupRequestRequestTypeDef,
)


def get_structure() -> AddressTypeDef:
    return {...}

How it works

Fully automated mypy-boto3-builder carefully generates type annotations for each service, patiently waiting for boto3 updates. It delivers a drop-in type annotations for you and makes sure that:

  • All available boto3 services are covered.
  • Each public class and method of every boto3 service gets valid type annotations extracted from the documentation (blame botocore docs if types are incorrect).
  • Type annotations include up-to-date documentation.
  • Link to documentation is provided for every method.
  • Code is processed by black and isort for readability.

What's new

Implemented features

  • Fully type annotated boto3, botocore and aiobotocore libraries
  • mypy, pyright, VSCode, PyCharm, Sublime Text and Emacs compatibility
  • Client, ServiceResource, Resource, Waiter Paginator type annotations for each service
  • Generated TypeDefs for each service
  • Generated Literals for each service
  • Auto discovery of types for boto3.client and boto3.session calls
  • Auto discovery of types for session.client and session.session calls
  • Auto discovery of types for client.get_waiter and client.get_paginator calls
  • Auto discovery of types for ServiceResource and Resource collections
  • Auto discovery of types for aiobotocore.Session.create_client calls

Latest changes

Builder changelog can be found in Releases.

Versioning

mypy-boto3-network-firewall version is the same as related boto3 version and follows PEP 440 format.

Thank you

Documentation

All services type annotations can be found in boto3 docs

Support and contributing

This package is auto-generated. Please reports any bugs or request new features in mypy-boto3-builder repository.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mypy-boto3-network-firewall-1.26.39.tar.gz (27.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mypy_boto3_network_firewall-1.26.39-py3-none-any.whl (33.2 kB view details)

Uploaded Python 3

File details

Details for the file mypy-boto3-network-firewall-1.26.39.tar.gz.

File metadata

File hashes

Hashes for mypy-boto3-network-firewall-1.26.39.tar.gz
Algorithm Hash digest
SHA256 bc26fefe5a41739177a8e50b83b0899e370c639ded1c31459088a08be9ee82ae
MD5 a733144200628e8568bba24f43c9d2fc
BLAKE2b-256 05274866376933e27181448e6fdb187f3fbb58d397117bfd8cc59f769f5e08b6

See more details on using hashes here.

File details

Details for the file mypy_boto3_network_firewall-1.26.39-py3-none-any.whl.

File metadata

File hashes

Hashes for mypy_boto3_network_firewall-1.26.39-py3-none-any.whl
Algorithm Hash digest
SHA256 c2e9207f9ff3b71a94c22826c560bf9b1da8a2c798e9adc00964a61347b5e709
MD5 a4f9cf17428d51ae121b335abb674dcb
BLAKE2b-256 b86546dc07a67babf63e5cb5925e1b32a1a380924bf844e4b8d5634ff9fa12ac

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page