AWScala enables Scala developers to easily work with Amazon Web Services in the Scala way.
Though AWScala objects basically extend AWS SDK for Java APIs, you can use them with less stress on Scala REPL or sbt console
.
http://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/
- AWS Identity and Access Management (IAM)
- AWS Security Token Service (STS)
- Amazon Elastic Compute Cloud (Amazon EC2)
- Amazon Simple Storage Service (Amazon S3)
- Amazon Simple Queue Service(Amazon SQS)
- Amazon Redshift
- Amazon DynamoDB
- Amazon SimpleDB
libraryDependencies += "com.github.seratch" %% "awscala" % "0.2.+"
import awscala._, iam._
implicit val iam = IAM()
val group = iam.createGroup("Developers")
import awscala.auth.policy._
group.putPolicy("policy-name",
Policy(Seq(Statement(Effect.Allow, Seq(Action("s3:*")), Seq(Resource("*"))))))
val user: User = iam.createUser("Alice")
user.setLoginPassword("password")
group.add(user)
group.policyNames.foreach(name => group.policy(name).destroy())
group.destroy()
https://github.com/seratch/awscala/blob/master/src/main/scala/awscala/iam/IAM.scala
https://github.com/seratch/awscala/blob/master/src/test/scala/awscala/IAMSpec.scala
import awscala._, sts._
implicit val sts = STS()
val federation: FederationToken = sts.federationToken(
name = "anonymous-user",
policy = Policy(Seq(Statement(Effect.Allow, Seq(Action("s3:*")), Seq(Resource("*"))))),
durationSeconds = 1200)
val signinToken: String = sts.signinToken(federation.credentials)
val loginUrl: String = sts.loginUrl(
credentials = federation.credentials,
consoleUrl = "https://console.aws.amazon.com/iam",
issuerUrl = "http://example.com/internal/auth")
https://github.com/seratch/awscala/blob/master/src/main/scala/awscala/sts/STS.scala
https://github.com/seratch/awscala/blob/master/src/test/scala/awscala/STSSpec.scala
import awscala._, ec2._
implicit val ec2 = EC2.at(Region.Tokyo)
val existings: Seq[Instance] = ec2.instances
import scala.concurrent._
import scala.concurrent.ExecutionContext.Implicits.global
// simply create a t1.micro instance
val f = Future(ec2.runAndAwait("ami-2819aa29", ec2.keyPairs.head))
for {
instances <- f
instance <- instances
} {
instance.withKeyPair(new java.io.File("key_pair_file")) { i =>
// optional: scala-ssh (https://github.com/sirthias/scala-ssh)
i.ssh { ssh =>
ssh.exec("ls -la").right.map { result =>
println(s"------\n${inst.instanceId} Result:\n" + result.stdOutAsString())
}
}
}
instance.terminate()
}
https://github.com/seratch/awscala/blob/master/src/main/scala/awscala/ec2/EC2.scala
https://github.com/seratch/awscala/blob/master/src/test/scala/awscala/EC2Spec.scala
import awscala._, s3._
implicit val s3 = S3()
val buckets: Seq[Bucket] = s3.buckets
val bucket: Bucket = s3.createBucket("unique-name-xxx")
val summaries: Seq[S3ObjectSummary] = bucket.objectSummaries
bucket.put("sample.txt", new java.io.File("sample.txt"))
val s3obj: Option[S3Object] = bucket.getObject("sample.txt")
s3obj.foreach { obj =>
obj.publicUrl // http://unique-name-xxx.s3.amazonaws.com/sample.txt
obj.generatePresignedUrl(DateTime.now.plusMinutes(10)) // ?Expires=....
bucket.delete(obj) // or obj.destroy()
}
https://github.com/seratch/awscala/blob/master/src/main/scala/awscala/s3/S3.scala
https://github.com/seratch/awscala/blob/master/src/test/scala/awscala/S3Spec.scala
import awscala._, sqs._
implicit val sqs = SQS.at(Region.Tokyo)
val queue: Queue = sqs.createQueue("sample-queue")
queue.add("message body")
qeueu.add("first", "second", "third")
val messages: Seq[Message] = queue.messages
queue.removeAll(messages)
queue.destroy()
https://github.com/seratch/awscala/blob/master/src/main/scala/awscala/sqs/SQS.scala
https://github.com/seratch/awscala/blob/master/src/test/scala/awscala/SQSSpec.scala
import awscala._, redshift._
implicit val redshift = Redshift.at(Region.Tokyo)
val cluster: Cluster = redshift.createCluster(NewCluster(
"sample-cluster", "mydb", "username", "password"))
val snapshot: Snapshot = redshift.createSnapshot(cluster, "snapshot-name")
redshift.delete(cluster, "final-snapshot-name")
https://github.com/seratch/awscala/blob/master/src/main/scala/awscala/redshift/Redshift.scala
import awscala._, dynamodbv2._
implicit val dynamoDB = DynamoDB.at(Region.Tokyo)
val tableMeta: TableMeta = dynamoDB.createTable(
name = "Members",
hashPK = "Id" -> AttributeType.Number,
rangePK = "Country" -> AttributeType.String,
otherAttributes = Seq("Company" -> AttributeType.String),
indexes = Seq(LocalSecondaryIndex(
name = "CompanyIndex",
keySchema = Seq(KeySchema("Id", KeyType.Hash), KeySchema("Company", KeyType.Range)),
projection = Projection(ProjectionType.Include, Seq("Company"))
))
)
val table: Table = dynamoDB.table("Members").get
table.put(1, "Japan", "Name" -> "Alice", "Age" -> 23, "Company" -> "Google")
table.put(2, "U.S.", "Name" -> "Bob", "Age" -> 36, "Company" -> "Google")
table.put(3, "Japan", "Name" -> "Chris", "Age" -> 29, "Company" -> "Amazon")
val googlers: Seq[Item] = table.scan(Seq("Company" -> Condition.gt("Google")))
table.destroy()
https://github.com/seratch/awscala/blob/master/src/main/scala/awscala/dynamodbv2/DynamoDB.scala
https://github.com/seratch/awscala/blob/master/src/test/scala/awscala/DynamoDBV2Spec.scala
import awscala._, simpledb._
implicit val simpleDB = SimpleDB.at(Region.Tokyo)
val domain: Domain = simpleDB.createDomain("users")
domain.put("00001", "name" -> "Alice", "age" -> "23", "country" -> "America")
domain.put("00002", "name" -> "Bob", "age" -> "34", "country" -> "America")
domain.put("00003", "name" -> "Chris", "age" -> "27", "country" -> "Japan")
val items: Seq[Item] = domain.select(s"select * from users where country = 'America'")
simpleDB.domains.foreach(_.destroy())
https://github.com/seratch/awscala/blob/master/src/main/scala/awscala/simpledb/SimpleDB.scala
https://github.com/seratch/awscala/blob/master/src/test/scala/awscala/SimpleDBSpec.scala
Created by @CruncherBigData. If you have any feedback or questions, please contact @CruncherBigData.
https://github.com/seratch/awscala/blob/master/src/main/scala/awscala/emr/EMR.scala
https://github.com/seratch/awscala/blob/master/src/test/scala/awscala/EMRSpec.scala
If you're interested in contributing this project, please send pull requests!
Tests requires aws credentials with Administrator permissions:
export AWS_ACCESS_KEY_ID=xxx
export AWS_SECRET_KEY=yyy
The DynamoDB tests also require a locally running instance of DynamoDB.
An install script is provided as bin/installDynamoDbLocal
.
A launch script is provided as bin/runDynamoDbLocal
.
See http://docs.aws.amazon.com/amazondynamodb/latest/developerguide/Tools.DynamoDBLocal.html for more info.
To run the tests, just type sbt test
.
Apache License, Version 2.0