1
0
Fork 0
mirror of https://github.com/fog/fog-aws.git synced 2022-11-09 13:50:52 -05:00
fog--fog-aws/lib/fog/aws/kinesis.rb
Samuel Williams c77b16c48d
Update kinesis.rb
Ensure all data access is protected by mutex, and that the mutex is not lazy initialized.
2020-03-27 12:24:56 +13:00

193 lines
6.8 KiB
Ruby

module Fog
module AWS
class Kinesis < Fog::Service
extend Fog::AWS::CredentialFetcher::ServiceMethods
class ExpiredIterator < Fog::Errors::Error; end
class LimitExceeded < Fog::Errors::Error; end
class ResourceInUse < Fog::Errors::Error; end
class ResourceNotFound < Fog::Errors::Error; end
class ExpiredIterator < Fog::Errors::Error; end
class InvalidArgument < Fog::Errors::Error; end
class ProvisionedThroughputExceeded < Fog::Errors::Error; end
requires :aws_access_key_id, :aws_secret_access_key
recognizes :region, :host, :path, :port, :scheme, :persistent, :use_iam_profile, :aws_session_token, :aws_credentials_expire_at, :instrumentor, :instrumentor_name
request_path 'fog/aws/requests/kinesis'
request :add_tags_to_stream
request :create_stream
request :delete_stream
request :describe_stream
request :get_records
request :get_shard_iterator
request :list_streams
request :list_tags_for_stream
request :merge_shards
request :put_record
request :put_records
request :remove_tags_from_stream
request :split_shard
class Real
include Fog::AWS::CredentialFetcher::ConnectionMethods
def initialize(options={})
@use_iam_profile = options[:use_iam_profile]
@connection_options = options[:connection_options] || {}
@instrumentor = options[:instrumentor]
@instrumentor_name = options[:instrumentor_name] || 'fog.aws.kinesis'
options[:region] ||= 'us-east-1'
@region = options[:region]
@host = options[:host] || "kinesis.#{options[:region]}.amazonaws.com"
@path = options[:path] || '/'
@persistent = options[:persistent] || true
@port = options[:port] || 443
@scheme = options[:scheme] || 'https'
@connection = Fog::XML::Connection.new("#{@scheme}://#{@host}:#{@port}#{@path}", @persistent, @connection_options)
@version = "20131202"
setup_credentials(options)
end
private
def setup_credentials(options)
@aws_access_key_id = options[:aws_access_key_id]
@aws_secret_access_key = options[:aws_secret_access_key]
@aws_session_token = options[:aws_session_token]
@aws_credentials_expire_at = options[:aws_credentials_expire_at]
@signer = Fog::AWS::SignatureV4.new( @aws_access_key_id, @aws_secret_access_key, @region, 'kinesis')
end
def request(params)
refresh_credentials_if_expired
idempotent = params.delete(:idempotent)
parser = params.delete(:parser)
date = Fog::Time.now
headers = {
'X-Amz-Target' => params['X-Amz-Target'],
'Content-Type' => 'application/x-amz-json-1.1',
'Host' => @host,
'x-amz-date' => date.to_iso8601_basic
}
headers['x-amz-security-token'] = @aws_session_token if @aws_session_token
body = MultiJson.dump(params[:body])
headers['Authorization'] = @signer.sign({:method => "POST", :headers => headers, :body => body, :query => {}, :path => @path}, date)
if @instrumentor
@instrumentor.instrument("#{@instrumentor_name}.request", params) do
_request(body, headers, idempotent, parser)
end
else
_request(body, headers, idempotent, parser)
end
end
def _request(body, headers, idempotent, parser)
@connection.request({
:body => body,
:expects => 200,
:headers => headers,
:idempotent => idempotent,
:method => 'POST',
:parser => parser
})
rescue Excon::Errors::HTTPStatusError => error
match = Fog::AWS::Errors.match_error(error)
raise if match.empty?
raise case match[:code]
when 'ExpiredIteratorException'
Fog::AWS::Kinesis::ExpiredIterator.slurp(error, match[:message])
when 'LimitExceededException'
Fog::AWS::Kinesis::LimitExceeded.slurp(error, match[:message])
when 'ResourceInUseException'
Fog::AWS::Kinesis::ResourceInUse.slurp(error, match[:message])
when 'ResourceNotFoundException'
Fog::AWS::Kinesis::ResourceNotFound.slurp(error, match[:message])
when 'ExpiredIteratorException'
Fog::AWS::Kinesis::ExpiredIterator.slurp(error, match[:message])
when 'InvalidArgumentException'
Fog::AWS::Kinesis::InvalidArgument.slurp(error, match[:message])
when 'ProvisionedThroughputExceededException'
Fog::AWS::Kinesis::ProvisionedThroughputExceeded.slurp(error, match[:message])
else
Fog::AWS::Kinesis::Error.slurp(error, "#{match[:code]} => #{match[:message]}")
end
end
end
class Mock
@mutex = Mutex.new
def self.data
@mutex.synchronize do
@data ||= Hash.new do |hash, region|
hash[region] = Hash.new do |region_hash, key|
region_hash[key] = {
:kinesis_streams => {}
}
end
end
yield @data if block_given?
end
end
def self.reset
@mutex.synchronize do
@data = nil
end
end
def initialize(options={})
@account_id = Fog::AWS::Mock.owner_id
@aws_access_key_id = options[:aws_access_key_id]
@region = options[:region] || 'us-east-1'
Fog::AWS.validate_region!(@region)
end
def data
self.class.data do |data|
data[@region][@aws_access_key_id]
end
end
def reset_data
self.class.data do |data|
data[@region].delete(@aws_access_key_id)
end
end
def self.next_sequence_number
@mutex.synchronize do
@sequence_number ||= -1
@sequence_number += 1
@sequence_number.to_s
end
end
def next_sequence_number; self.class.next_sequence_number; end
def self.next_shard_id
@mutex.synchronize do
@shard_id ||= -1
@shard_id += 1
"shardId-#{@shard_id.to_s.rjust(12, "0")}"
end
end
def next_shard_id; self.class.next_shard_id; end
end
end
end
end