How to use describe_vpc_endpoint_connections method in localstack

Best Python code snippet using localstack_python

ec2.py

Source:ec2.py Github

copy

Full Screen

...23 print('VPC endpoints deleted')24 # VPC endpoints connections25 print('Deleting VPC endpoint connections')26 service_ids = []27 for connection in ec2.describe_vpc_endpoint_connections()['VpcEndpointConnections']:28 service_id = connection['ServiceId']29 state = connection['VpcEndpointState']30 if state in ['PendingAcceptance', 'Pending', 'Available', 'Rejected', 'Failed', 'Expired']:31 print('Deleting VPC Endpoint Service - {}'.format(service_id))32 service_ids.append(service_id)33 ec2.reject_vpc_endpoint_connections(34 ServiceId=service_id,35 VpcEndpointIds=[36 connection['VpcEndpointId'],37 ]38 )39 if service_ids:40 ec2.delete_vpc_endpoint_service_configurations(41 ServiceIds=service_ids42 )43 print('Waiting for VPC endpoint services to be destroyed')44 while ec2.describe_vpc_endpoint_connections()['VpcEndpointConnections']:45 time.sleep(5)46 print('VPC endpoint connections deleted')47#48# NAT gateways49#50def delete_nat_gateways():51 """Delete all the NAT gateways52 :return: None53 """54 print('Deleting NAT gateways')55 ec2 = boto3.client('ec2')56 for page in ec2.get_paginator('describe_nat_gateways').paginate():57 for nat_gateway in page['NatGateways']:58 nat_gateway_id = nat_gateway['NatGatewayId']...

Full Screen

Full Screen

commands.py

Source:commands.py Github

copy

Full Screen

1xcommands = [2["iam","get_account_authorization_details",['UserDetailList','GroupDetailList','RoleDetailList','Policies','IsTruncated',3 'Marker','ResponseMetadata']],4["iam","list_account_aliases",['AccountAliases','IsTruncated','ResponseMetadata']],5["route53","list_hosted_zones",['ResponseMetadata','HostedZones','IsTruncated','MaxItems']],6["ec2","describe_vpcs",['Vpcs','ResponseMetadata']],7["ec2","describe_subnets",['Subnets','ResponseMetadata']],8["ec2","describe_instances",['Reservations','ResponseMetadata']],9["ec2","describe_volumes",['Volumes','ResponseMetadata']],10["rds","describe_db_instances",['DBInstances','ResponseMetadata']],11["rds","describe_db_snapshots",['DBSnapshots','ResponseMetadata']],12["elb","describe_load_balancers",['LoadBalancerDescriptions','ResponseMetadata']],13["elbv2","describe_load_balancers",['LoadBalancers','ResponseMetadata']],14["redshift","describe_clusters",['Clusters','ResponseMetadata']],15["redshift","describe_cluster_subnet_groups",['ClusterSubnetGroups','ResponseMetadata']],16["sqs","list_queues",['ResponseMetadata']],17["sns","list_topics",['Topics','ResponseMetadata']],18["ec2","describe_security_groups",['SecurityGroups','ResponseMetadata']],19["ec2","describe_network_interfaces",['NetworkInterfaces','ResponseMetadata']],20["ec2","describe_vpc_peering_connections",['VpcPeeringConnections','ResponseMetadata']],21["autoscaling","describe_policies",['ScalingPolicies','ResponseMetadata']],22["autoscaling","describe_auto_scaling_groups",['AutoScalingGroups','ResponseMetadata']],23["cloudformation","describe_stacks",['Stacks','ResponseMetadata']],24["cloudfront","list_distributions",['ResponseMetadata','DistributionList']],25["cloudwatch","describe_alarms",['CompositeAlarms','MetricAlarms','ResponseMetadata']],26["config","describe_config_rules",['ConfigRules','ResponseMetadata']],27["ec2","describe_network_acls",['NetworkAcls','ResponseMetadata']],28["ec2","describe_route_tables",['RouteTables','ResponseMetadata']],29["ec2","describe_flow_logs",['FlowLogs','ResponseMetadata']],30["ec2","describe_vpc_endpoint_connections",['VpcEndpointConnections','ResponseMetadata']],31["ec2","describe_vpc_endpoints",['VpcEndpoints','ResponseMetadata']],32["ecr","describe_repositories",['repositories','ResponseMetadata']],33["elasticache","describe_cache_clusters",['CacheClusters','ResponseMetadata']],34["efs","describe_file_systems",['ResponseMetadata','FileSystems']],35["events","list_rules",['Rules','ResponseMetadata']],36["kms","list_keys",['Keys','Truncated','ResponseMetadata']],37["lambda","list_functions",['ResponseMetadata','Functions']],38["ecs","list_clusters",['clusterArns','ResponseMetadata']],39["logs","describe_destinations",['destinations','ResponseMetadata']],40["logs","describe_log_groups",['logGroups','ResponseMetadata']],41["logs","describe_resource_policies",['resourcePolicies','ResponseMetadata']],42["apigateway","get_rest_apis",['ResponseMetadata','items']],43["accessanalyzer","list_analyzers",['ResponseMetadata','analyzers']]44]45xcommands = [46 # nothing: ["iam", "get_account_password_policy",{}],47 # bucket policy got48 # nothing: ["ecr", "get_repository_policy",{"repositoryName":"ecr_describe_repositories.json|.[] | .repositories[] | .repositoryName"}],49 # nothing in glacier50 # kms empty51]52#policy_53xcommands = [54# ["sns","list_topics",{}],55# ["sns","list_tags_for_resource",{"ResourceArn":"sns_list_topics.json|.[] |.Topics[]?|.TopicArn"}],56]57commands = [58# ["iam","get_account_authorization_details",{}],59# ["iam","list_account_aliases",{}],60# cert additions61["acm", "list_certificates",{}],62["acm", "list_tags_for_certificate",{"CertificateArn":"acm_list_certificates.json|.[] | .CertificateSummaryList | .[] | .CertificateArn"}],63# sns additions64["sns","list_topics",{}],65["sns","get_topic_attributes",{"TopicArn":"sns_list_topics.json|.[] |.Topics[]?|.TopicArn"}],66["sns", "list_subscriptions",{}],67["sns", "get_subscription_attributes",{"SubscriptionArn":"sns_list_subscriptions.json|.[] | .Subscriptions[] | .SubscriptionArn"}], # ok!68# ["sns", "list_platform_applications",{}], # useless, returns nothing69["secretsmanager","list_secrets",{}],70["secretsmanager","get_resource_policy",{"SecretId":"secretsmanager_list_secrets.json|.[]|.SecretList[]|.ARN"}], # not very useful... https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/secretsmanager.html#SecretsManager.Client.get_resource_policy71# goes off name...72["s3","list_buckets",{}],73["s3","get_bucket_acl",{"Bucket":"s3_list_buckets.json|.[] | .Buckets[]?|.Name"}], # bucket id not in response :(74["s3", "get_bucket_policy", {"Bucket":"s3_list_buckets.json|.[]|.Buckets[]?|.Name"}], # no bucket id75["s3", "get_bucket_logging", {"Bucket":"s3_list_buckets.json|.[]|.Buckets[]?|.Name"}], # empty76["s3", "get_bucket_location", {"Bucket": "s3_list_buckets.json|.[]|.Buckets[]?|.Name"}], # no bucket id77["s3", "get_bucket_encryption", {"Bucket": "s3_list_buckets.json|.[]|.Buckets[]?|.Name"}], # empty78["s3","get_bucket_tagging",{"Bucket":"s3_list_buckets.json|.[] | .Buckets[] | .Name"}],79# new cool stuff!80["ecr", "describe_repositories",{}],81["lambda", "get_policy", {"FunctionName":"lambda_list_functions.json|.[] | .Functions[]? | .FunctionName"}],82# cool policy stuff!83["iam", "list_groups",{}],84["iam", "list_attached_group_policies",{"GroupName":"iam_list_groups.json|.[] | .Groups[] | .GroupName"}],85["iam", "list_users",{}],86["iam", "list_attached_user_policies",{"UserName":"iam_list_users.json|.[] | .Users[] | .UserName"}],87["iam", "list_roles",{}],88["iam", "list_attached_role_policies",{"RoleName":"iam_list_roles.json|.[] | .Roles[] | .RoleName"}],89["resourcegroupstaggingapi","get_resources",{}],90["route53","list_hosted_zones",{}],91["ec2","describe_vpcs",{}],92["ec2","describe_subnets",{}],93["ec2","describe_instances",{}],94["ec2","describe_volumes",{}],95["rds","describe_db_instances",{}],96["rds","describe_db_snapshots",{}],97["elb","describe_load_balancers",{}],98["elbv2","describe_load_balancers",{}],99["redshift","describe_clusters",{}],100["redshift","describe_cluster_subnet_groups",{}],101["sqs","list_queues",{}],102["ec2","describe_security_groups",{}],103["ec2","describe_network_interfaces",{}],104["ec2","describe_vpc_peering_connections",{}],105["autoscaling","describe_policies",{}],106["autoscaling","describe_auto_scaling_groups",{}],107["cloudformation","describe_stacks",{}],108["cloudfront","list_distributions",{}],109# ["cloudwatch","describe_alarms",['CompositeAlarms','MetricAlarms','ResponseMetadata']],110# ["config","describe_config_rules",['ConfigRules','ResponseMetadata']],111["ec2","describe_network_acls",{}],112["ec2","describe_route_tables",{}],113["ec2","describe_flow_logs",{}],114["ec2","describe_vpc_endpoint_connections",{}],115["ec2","describe_vpc_endpoints",{}],116["ecr","describe_repositories",{}],117["elasticache","describe_cache_clusters",{}],118["efs","describe_file_systems",{}],119# ["events","list_rules",['Rules','ResponseMetadata']],120# ["kms","list_keys",['Keys','Truncated','ResponseMetadata']],121["lambda","list_functions",{}],122["ecs","list_clusters",{}],123# ["logs","describe_destinations",['destinations','ResponseMetadata']],124# ["logs","describe_log_groups",['logGroups','ResponseMetadata']],125# ["logs","describe_resource_policies",['resourcePolicies','ResponseMetadata']],126# ["apigateway","get_rest_apis",['ResponseMetadata','items']],127# ["accessanalyzer","list_analyzers",['ResponseMetadata','analyzers']]...

Full Screen

Full Screen

api.py

Source:api.py Github

copy

Full Screen

...113 l_info(msg)114 def accept_vpc_endpoint(self, account_id):115 msg = f"Accepting the VPC Endpoint for '{account_id}'"116 l_info(msg)117 vpc_endpoints_data = self.__ec2_api.describe_vpc_endpoint_connections(118 Filters = [119 {120 "Name": "vpc-endpoint-state",121 "Values": [122 "pendingAcceptance"123 ]124 },125 {126 "Name": "vpc-endpoint-owner",127 "Values": [128 account_id129 ]130 }131 ]...

Full Screen

Full Screen

Automation Testing Tutorials

Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.

LambdaTest Learning Hubs:

YouTube

You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.

Run localstack automation tests on LambdaTest cloud grid

Perform automation testing on 3000+ real desktop and mobile devices online.

Try LambdaTest Now !!

Get 100 minutes of automation test minutes FREE!!

Next-Gen App & Browser Testing Cloud

Was this article helpful?

Helpful

NotHelpful