I have decided to temporarily just fix all the print statements since it did not take long with some atom/regex fu
This commit is contained in:
@@ -20,22 +20,22 @@ def list_dynamodb_tables(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
||||
|
||||
response = client.list_tables()
|
||||
if response.get('TableNames') is None:
|
||||
print "{} likely does not have DynamoDB permissions\n" .format(AWS_ACCESS_KEY_ID)
|
||||
print("{} likely does not have DynamoDB permissions\n" .format(AWS_ACCESS_KEY_ID))
|
||||
elif len(response['TableNames']) <= 0:
|
||||
print "[-] ListTables allowed for {} but no results [-]" .format(region)
|
||||
print("[-] ListTables allowed for {} but no results [-]" .format(region))
|
||||
else:
|
||||
print"### {} DynamoDB Tables ###" .format(region)
|
||||
for tables in response['TableNames']:
|
||||
pp.pprint(tables)
|
||||
print("\n")
|
||||
|
||||
|
||||
except botocore.exceptions.ClientError as e:
|
||||
if e.response['Error']['Code'] == 'InvalidClientTokenId':
|
||||
sys.exit("{} : The AWS KEY IS INVALID. Exiting" .format(AWS_ACCESS_KEY_ID))
|
||||
elif e.response['Error']['Code'] == 'AccessDenied':
|
||||
print('{} : Does not have the required permissions' .format(AWS_ACCESS_KEY_ID))
|
||||
else:
|
||||
print "Unexpected error: {}" .format(e)
|
||||
print("Unexpected error: {}" .format(e))
|
||||
except KeyboardInterrupt:
|
||||
print("CTRL-C received, exiting...")
|
||||
|
||||
@@ -47,55 +47,54 @@ def list_dynamodb_tables_detailed(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY):
|
||||
|
||||
response = client.list_tables()
|
||||
if response.get('TableNames') is None:
|
||||
print "{} likely does not have DynamoDB permissions\n" .format(AWS_ACCESS_KEY_ID)
|
||||
print("{} likely does not have DynamoDB permissions\n" .format(AWS_ACCESS_KEY_ID))
|
||||
elif len(response['TableNames']) <= 0:
|
||||
print "[-] ListTables allowed for {} but no results [-]" .format(region)
|
||||
print("[-] ListTables allowed for {} but no results [-]" .format(region))
|
||||
else:
|
||||
print"### {} DynamoDB Tables ###" .format(region)
|
||||
for tables in response['TableNames']:
|
||||
#pp.pprint(tables)
|
||||
describe_table(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, tables, region)
|
||||
print("\n")
|
||||
|
||||
|
||||
except botocore.exceptions.ClientError as e:
|
||||
if e.response['Error']['Code'] == 'InvalidClientTokenId':
|
||||
sys.exit("{} : The AWS KEY IS INVALID. Exiting" .format(AWS_ACCESS_KEY_ID))
|
||||
elif e.response['Error']['Code'] == 'AccessDenied':
|
||||
print('{} : Does not have the required permissions' .format(AWS_ACCESS_KEY_ID))
|
||||
else:
|
||||
print "Unexpected error: {}" .format(e)
|
||||
print("Unexpected error: {}" .format(e))
|
||||
except KeyboardInterrupt:
|
||||
print("CTRL-C received, exiting...")
|
||||
|
||||
def describe_table(AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, table, region):
|
||||
print "### Describing DynamoDB Table: {} ###" .format(table)
|
||||
print("### Describing DynamoDB Table: {} ###" .format(table))
|
||||
try:
|
||||
client = boto3.client('dynamodb', aws_access_key_id=AWS_ACCESS_KEY_ID, aws_secret_access_key=AWS_SECRET_ACCESS_KEY, region_name=region)
|
||||
|
||||
response = client.describe_table(TableName=table)
|
||||
if response.get('Table') is None:
|
||||
print "{} likely does not have DynamoDB permissions\n" .format(AWS_ACCESS_KEY_ID)
|
||||
print("{} likely does not have DynamoDB permissions\n" .format(AWS_ACCESS_KEY_ID))
|
||||
elif len(response['Table']) <= 0:
|
||||
print "[-] DescribeTable allowed for {} but no results [-]" .format(region)
|
||||
print("[-] DescribeTable allowed for {} but no results [-]" .format(region))
|
||||
else:
|
||||
print "TableArn: {}" .format(response['Table']['TableArn'])
|
||||
print "AttributeDefinitions: {}" .format(response['Table']['AttributeDefinitions'])
|
||||
print "ProvisionedThroughput: {}" .format(response['Table']['ProvisionedThroughput'])
|
||||
print "TableSizeBytes: {}" .format(response['Table']['TableSizeBytes'])
|
||||
print "TableName: {}" .format(response['Table']['TableName'])
|
||||
print "TableStatus: {}" .format(response['Table']['TableStatus'])
|
||||
print "KeySchema: {}" .format(response['Table']['KeySchema'])
|
||||
print "ItemCount: {}" .format(response['Table']['ItemCount'])
|
||||
print "CreationDateTime: {}" .format(response['Table']['CreationDateTime'])
|
||||
print("TableArn: {}" .format(response['Table']['TableArn']))
|
||||
print("AttributeDefinitions: {}" .format(response['Table']['AttributeDefinitions']))
|
||||
print("ProvisionedThroughput: {}" .format(response['Table']['ProvisionedThroughput']))
|
||||
print("TableSizeBytes: {}" .format(response['Table']['TableSizeBytes']))
|
||||
print("TableName: {}" .format(response['Table']['TableName']))
|
||||
print("TableStatus: {}" .format(response['Table']['TableStatus']))
|
||||
print("KeySchema: {}" .format(response['Table']['KeySchema']))
|
||||
print("ItemCount: {}" .format(response['Table']['ItemCount']))
|
||||
print("CreationDateTime: {}" .format(response['Table']['CreationDateTime']))
|
||||
print("\n")
|
||||
|
||||
|
||||
except botocore.exceptions.ClientError as e:
|
||||
if e.response['Error']['Code'] == 'InvalidClientTokenId':
|
||||
sys.exit("{} : The AWS KEY IS INVALID. Exiting" .format(AWS_ACCESS_KEY_ID))
|
||||
elif e.response['Error']['Code'] == 'AccessDenied':
|
||||
print('{} : Does not have the required permissions' .format(AWS_ACCESS_KEY_ID))
|
||||
else:
|
||||
print "Unexpected error: {}" .format(e)
|
||||
print("Unexpected error: {}" .format(e))
|
||||
except KeyboardInterrupt:
|
||||
print("CTRL-C received, exiting...")
|
||||
|
||||
|
||||
Reference in New Issue
Block a user