Best Python code snippet using localstack_python
test_s3control_accesspoint_policy.py
Source:test_s3control_accesspoint_policy.py
1import boto32import pytest3import sure # noqa # pylint: disable=unused-import4from botocore.client import ClientError5from moto import mock_s3control6@mock_s3control7def test_get_access_point_policy():8 client = boto3.client("s3control", region_name="us-west-2")9 client.create_access_point(10 AccountId="111111111111", Name="ap_name", Bucket="mybucket"11 )12 policy = """{13 "Version": "2012-10-17",14 "Statement": [15 {16 "Sid": "",17 "Effect": "Allow",18 "Action": "s3:GetObjectTagging",19 "Resource": "arn:aws:s3:us-east-1:123456789012:accesspoint/mybucket/object/*",20 "Principal": {21 "AWS": "*"22 }23 }24 ]25}"""26 client.put_access_point_policy(27 AccountId="111111111111", Name="ap_name", Policy=policy28 )29 resp = client.get_access_point_policy(AccountId="111111111111", Name="ap_name")30 resp.should.have.key("Policy").equals(policy)31@mock_s3control32def test_get_unknown_access_point_policy():33 client = boto3.client("s3control", region_name="ap-southeast-1")34 client.create_access_point(35 AccountId="111111111111", Name="ap_name", Bucket="mybucket"36 )37 with pytest.raises(ClientError) as exc:38 client.get_access_point_policy(AccountId="111111111111", Name="ap_name")39 err = exc.value.response["Error"]40 err["Code"].should.equal("NoSuchAccessPointPolicy")41 err["Message"].should.equal("The specified accesspoint policy does not exist")42 err["AccessPointName"].should.equal("ap_name")43@mock_s3control44def test_get_access_point_policy_status():45 client = boto3.client("s3control", region_name="us-west-2")46 client.create_access_point(47 AccountId="111111111111", Name="ap_name", Bucket="mybucket"48 )49 policy = """{50 "Version": "2012-10-17",51 "Statement": [52 {53 "Sid": "",54 "Effect": "Allow",55 "Action": "s3:GetObjectTagging",56 "Resource": "arn:aws:s3:us-east-1:123456789012:accesspoint/mybucket/object/*",57 "Principal": {58 "AWS": "*"59 }60 }61 ]62}"""63 client.put_access_point_policy(64 AccountId="111111111111", Name="ap_name", Policy=policy65 )66 resp = client.get_access_point_policy_status(67 AccountId="111111111111", Name="ap_name"68 )69 resp.should.have.key("PolicyStatus").equals({"IsPublic": True})70@mock_s3control71def test_delete_access_point_policy():72 client = boto3.client("s3control", region_name="us-west-2")73 client.create_access_point(74 AccountId="111111111111", Name="ap_name", Bucket="mybucket"75 )76 policy = """some json policy"""77 client.put_access_point_policy(78 AccountId="111111111111", Name="ap_name", Policy=policy79 )80 client.delete_access_point_policy(AccountId="111111111111", Name="ap_name")81 with pytest.raises(ClientError) as exc:82 client.get_access_point_policy(AccountId="111111111111", Name="ap_name")83 err = exc.value.response["Error"]84 err["Code"].should.equal("NoSuchAccessPointPolicy")85@mock_s3control86def test_get_unknown_access_point_policy_status():87 client = boto3.client("s3control", region_name="ap-southeast-1")88 client.create_access_point(89 AccountId="111111111111", Name="ap_name", Bucket="mybucket"90 )91 with pytest.raises(ClientError) as exc:92 client.get_access_point_policy_status(AccountId="111111111111", Name="ap_name")93 err = exc.value.response["Error"]94 err["Code"].should.equal("NoSuchAccessPointPolicy")95 err["Message"].should.equal("The specified accesspoint policy does not exist")...
test_s3control.py
Source:test_s3control.py
1import pytest2from botocore.exceptions import ClientError3from localstack.config import EDGE_PORT4from localstack.constants import LOCALHOST_HOSTNAME, TEST_AWS_ACCOUNT_ID5from localstack.utils.aws.aws_stack import create_external_boto_client6remote_endpoint = "https://%s:%s" % (LOCALHOST_HOSTNAME, EDGE_PORT)7s3control_client = create_external_boto_client("s3control", endpoint_url=remote_endpoint)8def test_lifecycle_public_access_block():9 with pytest.raises(ClientError) as ce:10 s3control_client.get_public_access_block(AccountId=TEST_AWS_ACCOUNT_ID)11 assert ce.value.response["Error"]["Code"] == "NoSuchPublicAccessBlockConfiguration"12 access_block_config = {13 "BlockPublicAcls": True,14 "IgnorePublicAcls": True,15 "BlockPublicPolicy": True,16 "RestrictPublicBuckets": True,17 }18 put_response = s3control_client.put_public_access_block(19 AccountId=TEST_AWS_ACCOUNT_ID, PublicAccessBlockConfiguration=access_block_config20 )21 assert put_response["ResponseMetadata"]["HTTPStatusCode"] == 20122 get_response = s3control_client.get_public_access_block(AccountId=TEST_AWS_ACCOUNT_ID)23 assert access_block_config == get_response["PublicAccessBlockConfiguration"]24 s3control_client.delete_public_access_block(AccountId=TEST_AWS_ACCOUNT_ID)25def test_public_access_block_validations():26 with pytest.raises(ClientError) as error:27 s3control_client.get_public_access_block(AccountId="111111111111")28 assert error.value.response["Error"]["Code"] == "AccessDenied"29 with pytest.raises(ClientError) as error:30 s3control_client.put_public_access_block(31 AccountId="111111111111",32 PublicAccessBlockConfiguration={"BlockPublicAcls": True},33 )34 assert error.value.response["Error"]["Code"] == "AccessDenied"35 with pytest.raises(ClientError) as error:36 s3control_client.put_public_access_block(37 AccountId=TEST_AWS_ACCOUNT_ID, PublicAccessBlockConfiguration={}38 )...
Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.
You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.
Get 100 minutes of automation test minutes FREE!!