Best Python code snippet using localstack_python
test_vpc_nat_scenario.py
Source:test_vpc_nat_scenario.py
...215 sg = self.ctx.web_security_group216 status = self.vpc_client.revoke_security_group_egress(217 sg.id, "-1", cidr_ip="0.0.0.0/0")218 self.assertTrue(status)219 status = self.vpc_client.authorize_security_group_egress(220 sg.id, "tcp", 1433, 1433,221 src_group_id=self.ctx.db_security_group.id)222 self.assertTrue(status)223 status = self.vpc_client.authorize_security_group_egress(224 sg.id, "tcp", 3306, 3306,225 src_group_id=self.ctx.db_security_group.id)226 self.assertTrue(status)227 # NOTE(ft): especially for connectivity test228 status = self.vpc_client.authorize_security_group_egress(229 sg.id, "tcp", 80, 80, cidr_ip="0.0.0.0/0")230 self.assertTrue(status)231 # NOTE(ft): especially for connectivity test232 status = self.vpc_client.authorize_security_group_egress(233 sg.id, "tcp", 22, 22,234 src_group_id=self.ctx.db_security_group.id)235 self.assertTrue(status)236 status = self.vpc_client.authorize_security_group(237 group_id=sg.id, ip_protocol="tcp", from_port=80, to_port=80,238 cidr_ip="0.0.0.0/0")239 self.assertTrue(status)240 status = self.vpc_client.authorize_security_group(241 group_id=sg.id, ip_protocol="tcp", from_port=443, to_port=443,242 cidr_ip="0.0.0.0/0")243 self.assertTrue(status)244 status = self.vpc_client.authorize_security_group(245 group_id=sg.id, ip_protocol="tcp", from_port=22, to_port=22,246 cidr_ip=str(self.test_client_cidr))247 self.assertTrue(status)248 status = self.vpc_client.authorize_security_group(249 group_id=sg.id, ip_protocol="tcp", from_port=3389,250 to_port=3389, cidr_ip=str(self.test_client_cidr))251 self.assertTrue(status)252 sg = self.ctx.nat_security_group253 status = self.vpc_client.revoke_security_group_egress(254 sg.id, "-1", cidr_ip="0.0.0.0/0")255 self.assertTrue(status)256 status = self.vpc_client.authorize_security_group_egress(257 sg.id, "tcp", 80, 80, cidr_ip="0.0.0.0/0")258 self.assertTrue(status)259 status = self.vpc_client.authorize_security_group_egress(260 sg.id, "tcp", 443, 443, cidr_ip="0.0.0.0/0")261 self.assertTrue(status)262 status = self.vpc_client.authorize_security_group_egress(263 sg.id, "tcp", 53, 53, cidr_ip="0.0.0.0/0")264 self.assertTrue(status)265 status = self.vpc_client.authorize_security_group_egress(266 sg.id, "udp", 53, 53, cidr_ip="0.0.0.0/0")267 self.assertTrue(status)268 status = self.vpc_client.authorize_security_group(269 group_id=sg.id, ip_protocol="tcp", from_port=53,270 to_port=53, cidr_ip="0.0.0.0/0")271 self.assertTrue(status)272 status = self.vpc_client.authorize_security_group(273 group_id=sg.id, ip_protocol="udp", from_port=53,274 to_port=53, cidr_ip="0.0.0.0/0")275 self.assertTrue(status)276 status = self.vpc_client.authorize_security_group(277 group_id=sg.id, ip_protocol="tcp", from_port=80, to_port=80,278 cidr_ip=str(self.db_subnet))279 self.assertTrue(status)280 status = self.vpc_client.authorize_security_group(281 group_id=sg.id, ip_protocol="tcp", from_port=443, to_port=443,282 cidr_ip=str(self.db_subnet))283 self.assertTrue(status)284 status = self.vpc_client.authorize_security_group(285 group_id=sg.id, ip_protocol="tcp", from_port=22, to_port=22,286 cidr_ip=str(self.test_client_cidr))287 self.assertTrue(status)288 sg = self.ctx.db_security_group289 status = self.vpc_client.revoke_security_group_egress(290 sg.id, "-1", cidr_ip="0.0.0.0/0")291 self.assertTrue(status)292 status = self.vpc_client.authorize_security_group_egress(293 sg.id, "tcp", 80, 80, cidr_ip="0.0.0.0/0")294 self.assertTrue(status)295 status = self.vpc_client.authorize_security_group_egress(296 sg.id, "tcp", 443, 443, cidr_ip="0.0.0.0/0")297 self.assertTrue(status)298 status = self.vpc_client.authorize_security_group_egress(299 sg.id, "tcp", 53, 53, cidr_ip="0.0.0.0/0")300 self.assertTrue(status)301 status = self.vpc_client.authorize_security_group_egress(302 sg.id, "udp", 53, 53, cidr_ip="0.0.0.0/0")303 self.assertTrue(status)304 status = self.vpc_client.authorize_security_group(305 group_id=sg.id, ip_protocol="tcp",306 from_port=1433,307 to_port=1433,308 src_security_group_group_id=self.ctx.web_security_group.id)309 self.assertTrue(status)310 status = self.vpc_client.authorize_security_group(311 group_id=sg.id, ip_protocol="tcp",312 from_port=3306,313 to_port=3306,314 src_security_group_group_id=self.ctx.web_security_group.id)315 self.assertTrue(status)...
ec2.py
Source:ec2.py
...23 GroupName=group.name,24 Description=group.description25 )['GroupId']26 # by default if we have a vpc sg we will allow all out bound27 client.authorize_security_group_egress(28 GroupId=group_id,29 IpProtocol='tcp',30 FromPort=0,31 ToPort=65535,32 CidrIp='0.0.0.0/0'33 )34 return group_id35@sts_conn('ec2')36@rate_limited()37def delete_group(group, account_number=None, region=None, assume_role=None, client=None):38 client.delete_security_group(39 GroupId=group.aws_group_id40 )41@sts_conn('ec2')42@rate_limited()43def authorize_rule(rule, group, account_number=None, region=None, assume_role=None, client=None):44 if rule.direction == 'egress':45 # response = client.authorize_security_group_egress()46 raise BotorException("Modifying egress rules is not yet supported by Grouper")47 else:48 if rule.cidr:49 client.authorize_security_group_ingress(50 GroupId=group.aws_group_id,51 IpProtocol=rule.protocol,52 FromPort=rule.from_port,53 ToPort=rule.to_port,54 CidrIp=rule.cidr55 )56 else:57 client.authorize_security_group_ingress(58 GroupId=group.aws_group_id,59 IpProtocol=rule.protocol,60 FromPort=rule.from_port,61 ToPort=rule.to_port,62 SourceSecurityGroupName=rule.source_security_group.name,63 # SourceSecurityGroupOwnerId=rule.source_security_group.account.aws_account_id64 )65@sts_conn('ec2')66@rate_limited()67def revoke_rule(rule, group, account_number=None, region=None, assume_role=None, client=None):68 if rule.direction == 'egress':69 # response = client.authorize_security_group_egress()70 raise BotorException("Modifying egress rules is not yet supported by Grouper")71 else:72 client.revoke_security_group_ingress(73 GroupId=group.aws_group_id,74 IpProtocol=rule.protocol,75 FromPort=rule.from_port,76 ToPort=rule.to_port,77 CidrIp=rule.cidr,78 )79@sts_conn('ec2')80@rate_limited()81def add_groups_to_instance(instance_id, groups, account_number=None, region=None, assume_role=None, client=None):82 client.modify_instance_attribute(InstanceId=instance_id, Groups=groups)83@sts_conn('ec2')84@rate_limited()85def describe_instances(**kwargs):86 return kwargs.pop('client').get_paginator('describe_instances').paginate()87@sts_conn('ec2')88@rate_limited()89def describe_security_groups(**kwargs):90 return kwargs.pop('client').describe_security_groups(**kwargs)91@sts_conn('ec2')92@rate_limited()93def create_security_group(**kwargs):94 return kwargs.pop('client').create_security_group(**kwargs)95@sts_conn('ec2')96@rate_limited()97def authorize_security_group_ingress(**kwargs):98 return kwargs.pop('client').authorize_security_group_ingress(**kwargs)99@sts_conn('ec2')100@rate_limited()101def authorize_security_group_egress(**kwargs):...
Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.
You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.
Get 100 minutes of automation test minutes FREE!!