Best Python code snippet using localstack_python
Provision_SubnetNacl.py
Source:Provision_SubnetNacl.py  
...38    39    #network-aclname240    41    ######### Inbound Rules ##########42    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=1, protocol=6, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )43    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=2, protocol=17, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )44    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=10, protocol=6, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )45    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=11, protocol=17, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )46    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=20, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=49152, port_range_to=65535 )47    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=21, protocol=17, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=32768, port_range_to=61000 )48    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=30, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=80, port_range_to=80 )49    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=31, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=443, port_range_to=443 )50    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=40, protocol=1, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )51    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=41, protocol=1, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )52    53    ######### Outbound Rules ##########54    vpc.create_network_acl_entry(network_acl_id=nacl2, rule_number=1, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )55else:56    print "Network ACL " + network_aclname2 + " already exists"57if len(get_nacl(name=network_aclname4, region=region)) == 0:58    nacl4 = create_nacl(vpc_id=vpc_id, region=region, network_aclname=network_aclname4)59    60    ########################## Create Network Acls entries for Network ACL created above  ######################61    62    #network-aclname463    64     ######### Inbound Rules ##########65    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=1, protocol=6, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )66    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=2, protocol=17, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )67    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=10, protocol=6, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )68    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=11, protocol=17, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )69    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=20, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=49152, port_range_to=65535 )70    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=21, protocol=17, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=32768, port_range_to=61000 )71    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=30, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=80, port_range_to=80 )72    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=40, protocol=1, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )73    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=41, protocol=1, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )74    75    ######### Outbound Rules ##########76    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=1, protocol=6, rule_action='Allow', cidr_block='172.31.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )77    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=2, protocol=17, rule_action='Allow', cidr_block='172.31.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )78    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=10, protocol=6, rule_action='Allow', cidr_block='10.133.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )79    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=11, protocol=17, rule_action='Allow', cidr_block='10.133.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )80    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=20, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=1, port_range_from=80, port_range_to=80 )81    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=21, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=1, port_range_from=443, port_range_to=443 )82    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=30, protocol=1, rule_action='Allow', cidr_block='10.133.0.0/16', egress=1, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )83    vpc.create_network_acl_entry(network_acl_id=nacl4, rule_number=40, protocol=1, rule_action='Allow', cidr_block='172.31.0.0/16', egress=1, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )84else:85    print "Network ACL " + network_aclname4 + " already exists"86    87if len(get_nacl(name=network_aclname1, region=region)) == 0:88    nacl1 = create_nacl(vpc_id=vpc_id, region=region, network_aclname=network_aclname1)89    90    #network-aclname191    92     ######### Inbound Rules ##########93    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=1, protocol=6, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )94    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=2, protocol=17, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )95    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=10, protocol=6, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )96    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=11, protocol=17, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )97    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=20, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=49152, port_range_to=65535 )98    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=21, protocol=17, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=32768, port_range_to=61000 )99    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=30, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=80, port_range_to=80 )100    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=40, protocol=1, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )101    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=41, protocol=1, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )102    103    104    ######### Outbound Rules ##########105    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=1, protocol=6, rule_action='Allow', cidr_block='172.31.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )106    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=2, protocol=17, rule_action='Allow', cidr_block='172.31.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )107    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=10, protocol=6, rule_action='Allow', cidr_block='10.133.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )108    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=11, protocol=17, rule_action='Allow', cidr_block='10.133.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )109    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=20, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=1, port_range_from=80, port_range_to=80 )110    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=21, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=1, port_range_from=443, port_range_to=443 )111    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=30, protocol=1, rule_action='Allow', cidr_block='10.133.0.0/16', egress=1, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )112    vpc.create_network_acl_entry(network_acl_id=nacl1, rule_number=40, protocol=1, rule_action='Allow', cidr_block='172.31.0.0/16', egress=1, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )113else:114    print "Network ACL " + network_aclname1 + " already exists"115if len(get_nacl(name=network_aclname3, region=region)) == 0:116    nacl3 = create_nacl(vpc_id=vpc_id, region=region, network_aclname=network_aclname3)117    118    #network-aclname3119    120    ######### Inbound Rules ##########121    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=1, protocol=6, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )122    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=2, protocol=17, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )123    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=10, protocol=6, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )124    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=11, protocol=17, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=65535 )125    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=20, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=49152, port_range_to=65535 )126    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=21, protocol=17, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=32768, port_range_to=61000 )127    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=30, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=80, port_range_to=80 )128    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=31, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/0', egress=0, port_range_from=443, port_range_to=443 )129    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=40, protocol=1, rule_action='Allow', cidr_block='10.133.0.0/16', egress=0, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )130    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=41, protocol=1, rule_action='Allow', cidr_block='172.31.0.0/16', egress=0, port_range_from=0, port_range_to=0, icmp_code=-1, icmp_type=-1 )131    132    133    ######### Outbound Rules ##########134    vpc.create_network_acl_entry(network_acl_id=nacl3, rule_number=1, protocol=6, rule_action='Allow', cidr_block='0.0.0.0/16', egress=1, port_range_from=0, port_range_to=65535 )135    ###############################################################################################################136else:137    print "Network ACL " + network_aclname3 + " already exists"138#Create subnet139if len(get_subnet(name=subnet1_name, region=region)) == 0:140    subnet1 = create_subnet(vpc_id=vpc_id, cidr_block=cidr_block1, availability_zone=availability_zone1, subnet_name=subnet1_name, region=region)141    vpc.associate_network_acl(nacl1, subnet1)142else:143    print "Subnet " + subnet1_name + " already exists"144    145if len(get_subnet(name=subnet2_name, region=region)) == 0:146    subnet2 = create_subnet(vpc_id=vpc_id, cidr_block=cidr_block2, availability_zone=availability_zone2, subnet_name=subnet2_name, region=region)147    vpc.associate_network_acl(nacl2, subnet2)148else:...all_region_kill_switch.py
Source:all_region_kill_switch.py  
...14        if nacls:15            for nacl in nacls:16                print('{}'.format(nacl['NetworkAclId']))17                # Block all Inbound traffic18                client.create_network_acl_entry(19                    DryRun=True,20                    CidrBlock='0.0.0.0/0',21                    Egress=False,22                    Protocol='-1',23                    RuleAction='deny',24                    RuleNumber=1,25                    NetworkAclId=nacl['NetworkAclId'] 26                )27                client.create_network_acl_entry(28                    DryRun=True,29                    Ipv6CidrBlock='::0/0',30                    Egress=False,31                    Protocol='-1',32                    RuleAction='deny',33                    RuleNumber=2,34                    NetworkAclId=nacl['NetworkAclId'] 35                )36                # Block all Outbound traffic37                client.create_network_acl_entry(38                    DryRun=True,39                    CidrBlock='0.0.0.0/0',40                    Egress=True,41                    Protocol='-1',42                    RuleAction='deny',43                    RuleNumber=1,44                    NetworkAclId=nacl['NetworkAclId'] 45                )46                client.create_network_acl_entry(47                    DryRun=True,48                    Ipv6CidrBlock='::0/0',49                    Egress=True,50                    Protocol='-1',51                    RuleAction='deny',52                    RuleNumber=2,53                    NetworkAclId=nacl['NetworkAclId'] 54                )55#make them verify a random number because it will block traffic for all VPCs in all regions for that account.56rannum=randint(1000, 9999)57print("Please enter the following number to continue {}: ".format(rannum))58data = input()59if int(data) != rannum:60    print('Error: verification number does not match')...region_kill_switch.py
Source:region_kill_switch.py  
...14        if nacls:15            for nacl in nacls:16                print('{}'.format(nacl['NetworkAclId']))17                # Block all Inbound traffic18                client.create_network_acl_entry(19                    DryRun=True,20                    CidrBlock='0.0.0.0/0',21                    Egress=False,22                    Protocol='-1',23                    RuleAction='deny',24                    RuleNumber=1,25                    NetworkAclId=nacl['NetworkAclId'] 26                )27                client.create_network_acl_entry(28                    DryRun=True,29                    Ipv6CidrBlock='::0/0',30                    Egress=False,31                    Protocol='-1',32                    RuleAction='deny',33                    RuleNumber=2,34                    NetworkAclId=nacl['NetworkAclId'] 35                )36                # Block all Outbound traffic37                client.create_network_acl_entry(38                    DryRun=True,39                    CidrBlock='0.0.0.0/0',40                    Egress=True,41                    Protocol='-1',42                    RuleAction='deny',43                    RuleNumber=1,44                    NetworkAclId=nacl['NetworkAclId'] 45                )46                client.create_network_acl_entry(47                    DryRun=True,48                    Ipv6CidrBlock='::0/0',49                    Egress=True,50                    Protocol='-1',51                    RuleAction='deny',52                    RuleNumber=2,53                    NetworkAclId=nacl['NetworkAclId'] 54                )55#make them verify a random number because it will block traffic for all VPCs in that region.56rannum=randint(1000, 9999)57print("Please enter the following number to continue {}: ".format(rannum))58data = input()59if int(data) != rannum:60    print('Error: verification number does not match')...Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.
You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.
Get 100 minutes of automation test minutes FREE!!
