func receive_from_queue(svc *sqs.SQS, queue_url *string) (*string, *string, *string, error) { // get sqs message params := &sqs.ReceiveMessageInput{ QueueUrl: queue_url, MaxNumberOfMessages: aws.Int64(1), VisibilityTimeout: aws.Int64(1), } resp, err := svc.ReceiveMessage(params) if err != nil { return nil, nil, nil, err } // error on empty queue if len(resp.Messages) == 0 { return nil, nil, nil, errors.New("queue is empty") } receipt_handle := resp.Messages[0].ReceiptHandle body := resp.Messages[0].Body // unmarshal sqs message body data := &SqsBody{} err = json.Unmarshal([]byte(*body), &data) if err != nil { return nil, nil, nil, err } bucket := &data.Records[0].S3.Bucket.Name key := &data.Records[0].S3.Object.Key return receipt_handle, bucket, key, nil }
func ExampleStorageGateway_UpdateMaintenanceStartTime() { sess, err := session.NewSession() if err != nil { fmt.Println("failed to create session,", err) return } svc := storagegateway.New(sess) params := &storagegateway.UpdateMaintenanceStartTimeInput{ DayOfWeek: aws.Int64(1), // Required GatewayARN: aws.String("GatewayARN"), // Required HourOfDay: aws.Int64(1), // Required MinuteOfHour: aws.Int64(1), // Required } resp, err := svc.UpdateMaintenanceStartTime(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleECR_UploadLayerPart() { sess, err := session.NewSession() if err != nil { fmt.Println("failed to create session,", err) return } svc := ecr.New(sess) params := &ecr.UploadLayerPartInput{ LayerPartBlob: []byte("PAYLOAD"), // Required PartFirstByte: aws.Int64(1), // Required PartLastByte: aws.Int64(1), // Required RepositoryName: aws.String("RepositoryName"), // Required UploadId: aws.String("UploadId"), // Required RegistryId: aws.String("RegistryId"), } resp, err := svc.UploadLayerPart(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleLambda_CreateFunction() { svc := lambda.New(nil) params := &lambda.CreateFunctionInput{ Code: &lambda.FunctionCode{ // Required S3Bucket: aws.String("S3Bucket"), S3Key: aws.String("S3Key"), S3ObjectVersion: aws.String("S3ObjectVersion"), ZipFile: []byte("PAYLOAD"), }, FunctionName: aws.String("FunctionName"), // Required Handler: aws.String("Handler"), // Required Role: aws.String("RoleArn"), // Required Runtime: aws.String("Runtime"), // Required Description: aws.String("Description"), MemorySize: aws.Int64(1), Timeout: aws.Int64(1), } resp, err := svc.CreateFunction(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleELB_ConfigureHealthCheck() { svc := elb.New(nil) params := &elb.ConfigureHealthCheckInput{ HealthCheck: &elb.HealthCheck{ // Required HealthyThreshold: aws.Int64(1), // Required Interval: aws.Int64(1), // Required Target: aws.String("HealthCheckTarget"), // Required Timeout: aws.Int64(1), // Required UnhealthyThreshold: aws.Int64(1), // Required }, LoadBalancerName: aws.String("AccessPointName"), // Required } resp, err := svc.ConfigureHealthCheck(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleECS_SubmitContainerStateChange() { svc := ecs.New(session.New()) params := &ecs.SubmitContainerStateChangeInput{ Cluster: aws.String("String"), ContainerName: aws.String("String"), ExitCode: aws.Int64(1), NetworkBindings: []*ecs.NetworkBinding{ { // Required BindIP: aws.String("String"), ContainerPort: aws.Int64(1), HostPort: aws.Int64(1), Protocol: aws.String("TransportProtocol"), }, // More values... }, Reason: aws.String("String"), Status: aws.String("String"), Task: aws.String("String"), } resp, err := svc.SubmitContainerStateChange(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func resourceAwsEcsServiceUpdate(d *schema.ResourceData, meta interface{}) error { conn := meta.(*AWSClient).ecsconn log.Printf("[DEBUG] Updating ECS service %s", d.Id()) input := ecs.UpdateServiceInput{ Service: aws.String(d.Id()), Cluster: aws.String(d.Get("cluster").(string)), } if d.HasChange("desired_count") { _, n := d.GetChange("desired_count") input.DesiredCount = aws.Int64(int64(n.(int))) } if d.HasChange("task_definition") { _, n := d.GetChange("task_definition") input.TaskDefinition = aws.String(n.(string)) } if d.HasChange("deployment_maximum_percent") || d.HasChange("deployment_minimum_healthy_percent") { input.DeploymentConfiguration = &ecs.DeploymentConfiguration{ MaximumPercent: aws.Int64(int64(d.Get("deployment_maximum_percent").(int))), MinimumHealthyPercent: aws.Int64(int64(d.Get("deployment_minimum_healthy_percent").(int))), } } out, err := conn.UpdateService(&input) if err != nil { return err } service := out.Service log.Printf("[DEBUG] Updated ECS service %s", service) return resourceAwsEcsServiceRead(d, meta) }
func testAccCheckAWSSecurityGroupAttributes(group *ec2.SecurityGroup) resource.TestCheckFunc { return func(s *terraform.State) error { p := &ec2.IpPermission{ FromPort: aws.Int64(80), ToPort: aws.Int64(8000), IpProtocol: aws.String("tcp"), IpRanges: []*ec2.IpRange{&ec2.IpRange{CidrIp: aws.String("10.0.0.0/8")}}, } if *group.GroupName != "terraform_acceptance_test_example" { return fmt.Errorf("Bad name: %s", *group.GroupName) } if *group.Description != "Used in the terraform acceptance tests" { return fmt.Errorf("Bad description: %s", *group.Description) } if len(group.IpPermissions) == 0 { return fmt.Errorf("No IPPerms") } // Compare our ingress if !reflect.DeepEqual(group.IpPermissions[0], p) { return fmt.Errorf( "Got:\n\n%#v\n\nExpected:\n\n%#v\n", group.IpPermissions[0], p) } return nil } }
func ExampleRoute53_UpdateHealthCheck() { svc := route53.New(session.New()) params := &route53.UpdateHealthCheckInput{ HealthCheckId: aws.String("HealthCheckId"), // Required ChildHealthChecks: []*string{ aws.String("HealthCheckId"), // Required // More values... }, FailureThreshold: aws.Int64(1), FullyQualifiedDomainName: aws.String("FullyQualifiedDomainName"), HealthCheckVersion: aws.Int64(1), HealthThreshold: aws.Int64(1), IPAddress: aws.String("IPAddress"), Inverted: aws.Bool(true), Port: aws.Int64(1), ResourcePath: aws.String("ResourcePath"), SearchString: aws.String("SearchString"), } resp, err := svc.UpdateHealthCheck(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleSQS_ReceiveMessage() { svc := sqs.New(session.New()) params := &sqs.ReceiveMessageInput{ QueueUrl: aws.String("String"), // Required AttributeNames: []*string{ aws.String("QueueAttributeName"), // Required // More values... }, MaxNumberOfMessages: aws.Int64(1), MessageAttributeNames: []*string{ aws.String("MessageAttributeName"), // Required // More values... }, VisibilityTimeout: aws.Int64(1), WaitTimeSeconds: aws.Int64(1), } resp, err := svc.ReceiveMessage(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func testAccCheckAWSELBAttributesHealthCheck(conf *elb.LoadBalancerDescription) resource.TestCheckFunc { return func(s *terraform.State) error { zones := []string{"us-west-2a", "us-west-2b", "us-west-2c"} azs := make([]string, 0, len(conf.AvailabilityZones)) for _, x := range conf.AvailabilityZones { azs = append(azs, *x) } sort.StringSlice(azs).Sort() if !reflect.DeepEqual(azs, zones) { return fmt.Errorf("bad availability_zones") } check := &elb.HealthCheck{ Timeout: aws.Int64(int64(30)), UnhealthyThreshold: aws.Int64(int64(5)), HealthyThreshold: aws.Int64(int64(5)), Interval: aws.Int64(int64(60)), Target: aws.String("HTTP:8000/"), } if !reflect.DeepEqual(conf.HealthCheck, check) { return fmt.Errorf( "Got:\n\n%#v\n\nExpected:\n\n%#v\n", conf.HealthCheck, check) } if *conf.DNSName == "" { return fmt.Errorf("empty dns_name") } return nil } }
func testAccCheckAWSELBAttributes(conf *elb.LoadBalancerDescription) resource.TestCheckFunc { return func(s *terraform.State) error { zones := []string{"us-west-2a", "us-west-2b", "us-west-2c"} azs := make([]string, 0, len(conf.AvailabilityZones)) for _, x := range conf.AvailabilityZones { azs = append(azs, *x) } sort.StringSlice(azs).Sort() if !reflect.DeepEqual(azs, zones) { return fmt.Errorf("bad availability_zones") } l := elb.Listener{ InstancePort: aws.Int64(int64(8000)), InstanceProtocol: aws.String("HTTP"), LoadBalancerPort: aws.Int64(int64(80)), Protocol: aws.String("HTTP"), } if !reflect.DeepEqual(conf.ListenerDescriptions[0].Listener, &l) { return fmt.Errorf( "Got:\n\n%#v\n\nExpected:\n\n%#v\n", conf.ListenerDescriptions[0].Listener, l) } if *conf.DNSName == "" { return fmt.Errorf("empty dns_name") } return nil } }
func ExampleStorageGateway_CreateTapes() { sess, err := session.NewSession() if err != nil { fmt.Println("failed to create session,", err) return } svc := storagegateway.New(sess) params := &storagegateway.CreateTapesInput{ ClientToken: aws.String("ClientToken"), // Required GatewayARN: aws.String("GatewayARN"), // Required NumTapesToCreate: aws.Int64(1), // Required TapeBarcodePrefix: aws.String("TapeBarcodePrefix"), // Required TapeSizeInBytes: aws.Int64(1), // Required } resp, err := svc.CreateTapes(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleStorageGateway_UpdateSnapshotSchedule() { sess, err := session.NewSession() if err != nil { fmt.Println("failed to create session,", err) return } svc := storagegateway.New(sess) params := &storagegateway.UpdateSnapshotScheduleInput{ RecurrenceInHours: aws.Int64(1), // Required StartAt: aws.Int64(1), // Required VolumeARN: aws.String("VolumeARN"), // Required Description: aws.String("Description"), } resp, err := svc.UpdateSnapshotSchedule(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func TestFlattenHealthCheck(t *testing.T) { cases := []struct { Input *elb.HealthCheck Output []map[string]interface{} }{ { Input: &elb.HealthCheck{ UnhealthyThreshold: aws.Int64(int64(10)), HealthyThreshold: aws.Int64(int64(10)), Target: aws.String("HTTP:80/"), Timeout: aws.Int64(int64(30)), Interval: aws.Int64(int64(30)), }, Output: []map[string]interface{}{ map[string]interface{}{ "unhealthy_threshold": int64(10), "healthy_threshold": int64(10), "target": "HTTP:80/", "timeout": int64(30), "interval": int64(30), }, }, }, } for _, tc := range cases { output := flattenHealthCheck(tc.Input) if !reflect.DeepEqual(output, tc.Output) { t.Fatalf("Got:\n\n%#v\n\nExpected:\n\n%#v", output, tc.Output) } } }
func expandCacheBehavior(m map[string]interface{}) *cloudfront.CacheBehavior { cb := &cloudfront.CacheBehavior{ Compress: aws.Bool(m["compress"].(bool)), ViewerProtocolPolicy: aws.String(m["viewer_protocol_policy"].(string)), TargetOriginId: aws.String(m["target_origin_id"].(string)), ForwardedValues: expandForwardedValues(m["forwarded_values"].(*schema.Set).List()[0].(map[string]interface{})), MinTTL: aws.Int64(int64(m["min_ttl"].(int))), MaxTTL: aws.Int64(int64(m["max_ttl"].(int))), DefaultTTL: aws.Int64(int64(m["default_ttl"].(int))), } if v, ok := m["trusted_signers"]; ok { cb.TrustedSigners = expandTrustedSigners(v.([]interface{})) } else { cb.TrustedSigners = expandTrustedSigners([]interface{}{}) } if v, ok := m["smooth_streaming"]; ok { cb.SmoothStreaming = aws.Bool(v.(bool)) } if v, ok := m["allowed_methods"]; ok { cb.AllowedMethods = expandAllowedMethods(v.([]interface{})) } if v, ok := m["cached_methods"]; ok { cb.AllowedMethods.CachedMethods = expandCachedMethods(v.([]interface{})) } if v, ok := m["path_pattern"]; ok { cb.PathPattern = aws.String(v.(string)) } return cb }
func ExampleCloudSearchDomain_Search() { svc := cloudsearchdomain.New(session.New()) params := &cloudsearchdomain.SearchInput{ Query: aws.String("Query"), // Required Cursor: aws.String("Cursor"), Expr: aws.String("Expr"), Facet: aws.String("Facet"), FilterQuery: aws.String("FilterQuery"), Highlight: aws.String("Highlight"), Partial: aws.Bool(true), QueryOptions: aws.String("QueryOptions"), QueryParser: aws.String("QueryParser"), Return: aws.String("Return"), Size: aws.Int64(1), Sort: aws.String("Sort"), Start: aws.Int64(1), } resp, err := svc.Search(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleStorageGateway_UpdateBandwidthRateLimit() { svc := storagegateway.New(nil) params := &storagegateway.UpdateBandwidthRateLimitInput{ GatewayARN: aws.String("GatewayARN"), // Required AverageDownloadRateLimitInBitsPerSec: aws.Int64(1), AverageUploadRateLimitInBitsPerSec: aws.Int64(1), } resp, err := svc.UpdateBandwidthRateLimit(params) if err != nil { if awsErr, ok := err.(awserr.Error); ok { // Generic AWS error with Code, Message, and original error (if any) fmt.Println(awsErr.Code(), awsErr.Message(), awsErr.OrigErr()) if reqErr, ok := err.(awserr.RequestFailure); ok { // A service error occurred fmt.Println(reqErr.Code(), reqErr.Message(), reqErr.StatusCode(), reqErr.RequestID()) } } else { // This case should never be hit, the SDK should always return an // error which satisfies the awserr.Error interface. fmt.Println(err.Error()) } } // Pretty-print the response data. fmt.Println(awsutil.Prettify(resp)) }
func dequeueMessage() ([]Message, error) { req := &sqs.ReceiveMessageInput{ MaxNumberOfMessages: aws.Int64(10), QueueUrl: aws.String(MessageQueueUrl), WaitTimeSeconds: aws.Int64(10), } res, err := SQS().ReceiveMessage(req) if err != nil { return nil, err } messages := make([]Message, len(res.Messages)) var message Message for i, m := range res.Messages { err = json.Unmarshal([]byte(*m.Body), &message) if err != nil { return nil, err } message.MessageID = m.MessageId message.ReceiptHandle = m.ReceiptHandle messages[i] = message } return messages, nil }
func ExampleStorageGateway_UpdateMaintenanceStartTime() { svc := storagegateway.New(nil) params := &storagegateway.UpdateMaintenanceStartTimeInput{ DayOfWeek: aws.Int64(1), // Required GatewayARN: aws.String("GatewayARN"), // Required HourOfDay: aws.Int64(1), // Required MinuteOfHour: aws.Int64(1), // Required } resp, err := svc.UpdateMaintenanceStartTime(params) if err != nil { if awsErr, ok := err.(awserr.Error); ok { // Generic AWS error with Code, Message, and original error (if any) fmt.Println(awsErr.Code(), awsErr.Message(), awsErr.OrigErr()) if reqErr, ok := err.(awserr.RequestFailure); ok { // A service error occurred fmt.Println(reqErr.Code(), reqErr.Message(), reqErr.StatusCode(), reqErr.RequestID()) } } else { // This case should never be hit, the SDK should always return an // error which satisfies the awserr.Error interface. fmt.Println(err.Error()) } } // Pretty-print the response data. fmt.Println(awsutil.Prettify(resp)) }
func ExampleECS_CreateService() { svc := ecs.New(session.New()) params := &ecs.CreateServiceInput{ DesiredCount: aws.Int64(1), // Required ServiceName: aws.String("String"), // Required TaskDefinition: aws.String("String"), // Required ClientToken: aws.String("String"), Cluster: aws.String("String"), LoadBalancers: []*ecs.LoadBalancer{ { // Required ContainerName: aws.String("String"), ContainerPort: aws.Int64(1), LoadBalancerName: aws.String("String"), }, // More values... }, Role: aws.String("String"), } resp, err := svc.CreateService(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleStorageGateway_UpdateSnapshotSchedule() { svc := storagegateway.New(nil) params := &storagegateway.UpdateSnapshotScheduleInput{ RecurrenceInHours: aws.Int64(1), // Required StartAt: aws.Int64(1), // Required VolumeARN: aws.String("VolumeARN"), // Required Description: aws.String("Description"), } resp, err := svc.UpdateSnapshotSchedule(params) if err != nil { if awsErr, ok := err.(awserr.Error); ok { // Generic AWS error with Code, Message, and original error (if any) fmt.Println(awsErr.Code(), awsErr.Message(), awsErr.OrigErr()) if reqErr, ok := err.(awserr.RequestFailure); ok { // A service error occurred fmt.Println(reqErr.Code(), reqErr.Message(), reqErr.StatusCode(), reqErr.RequestID()) } } else { // This case should never be hit, the SDK should always return an // error which satisfies the awserr.Error interface. fmt.Println(err.Error()) } } // Pretty-print the response data. fmt.Println(awsutil.Prettify(resp)) }
func ExampleELB_CreateLoadBalancerListeners() { svc := elb.New(nil) params := &elb.CreateLoadBalancerListenersInput{ Listeners: []*elb.Listener{ // Required { // Required InstancePort: aws.Int64(1), // Required LoadBalancerPort: aws.Int64(1), // Required Protocol: aws.String("Protocol"), // Required InstanceProtocol: aws.String("Protocol"), SSLCertificateId: aws.String("SSLCertificateId"), }, // More values... }, LoadBalancerName: aws.String("AccessPointName"), // Required } resp, err := svc.CreateLoadBalancerListeners(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleStorageGateway_CreateTapes() { svc := storagegateway.New(nil) params := &storagegateway.CreateTapesInput{ ClientToken: aws.String("ClientToken"), // Required GatewayARN: aws.String("GatewayARN"), // Required NumTapesToCreate: aws.Int64(1), // Required TapeBarcodePrefix: aws.String("TapeBarcodePrefix"), // Required TapeSizeInBytes: aws.Int64(1), // Required } resp, err := svc.CreateTapes(params) if err != nil { if awsErr, ok := err.(awserr.Error); ok { // Generic AWS error with Code, Message, and original error (if any) fmt.Println(awsErr.Code(), awsErr.Message(), awsErr.OrigErr()) if reqErr, ok := err.(awserr.RequestFailure); ok { // A service error occurred fmt.Println(reqErr.Code(), reqErr.Message(), reqErr.StatusCode(), reqErr.RequestID()) } } else { // This case should never be hit, the SDK should always return an // error which satisfies the awserr.Error interface. fmt.Println(err.Error()) } } // Pretty-print the response data. fmt.Println(awsutil.Prettify(resp)) }
func (lt *opsworksLayerType) VolumeConfigurations(d *schema.ResourceData) []*opsworks.VolumeConfiguration { configuredVolumes := d.Get("ebs_volume").(*schema.Set).List() result := make([]*opsworks.VolumeConfiguration, len(configuredVolumes)) for i := 0; i < len(configuredVolumes); i++ { volumeData := configuredVolumes[i].(map[string]interface{}) result[i] = &opsworks.VolumeConfiguration{ MountPoint: aws.String(volumeData["mount_point"].(string)), NumberOfDisks: aws.Int64(int64(volumeData["number_of_disks"].(int))), Size: aws.Int64(int64(volumeData["size"].(int))), VolumeType: aws.String(volumeData["type"].(string)), } iops := int64(volumeData["iops"].(int)) if iops != 0 { result[i].Iops = aws.Int64(iops) } raidLevelStr := volumeData["raid_level"].(string) if raidLevelStr != "" { raidLevel, err := strconv.Atoi(raidLevelStr) if err == nil { result[i].RaidLevel = aws.Int64(int64(raidLevel)) } } } return result }
func lookupTableInput() *dynamodb.CreateTableInput { return &dynamodb.CreateTableInput{ AttributeDefinitions: []*dynamodb.AttributeDefinition{ { AttributeName: aws.String("component_key"), AttributeType: aws.String("S"), }, { AttributeName: aws.String("batch_version"), AttributeType: aws.String("N"), }, }, KeySchema: []*dynamodb.KeySchemaElement{ { AttributeName: aws.String("component_key"), KeyType: aws.String("HASH"), }, { AttributeName: aws.String("batch_version"), KeyType: aws.String("RANGE"), }, }, ProvisionedThroughput: &dynamodb.ProvisionedThroughput{ ReadCapacityUnits: aws.Int64(10), WriteCapacityUnits: aws.Int64(10), }, TableName: aws.String("lookup"), } }
func expandESClusterConfig(m map[string]interface{}) *elasticsearch.ElasticsearchClusterConfig { config := elasticsearch.ElasticsearchClusterConfig{} if v, ok := m["dedicated_master_enabled"]; ok { isEnabled := v.(bool) config.DedicatedMasterEnabled = aws.Bool(isEnabled) if isEnabled { if v, ok := m["dedicated_master_count"]; ok && v.(int) > 0 { config.DedicatedMasterCount = aws.Int64(int64(v.(int))) } if v, ok := m["dedicated_master_type"]; ok && v.(string) != "" { config.DedicatedMasterType = aws.String(v.(string)) } } } if v, ok := m["instance_count"]; ok { config.InstanceCount = aws.Int64(int64(v.(int))) } if v, ok := m["instance_type"]; ok { config.InstanceType = aws.String(v.(string)) } if v, ok := m["zone_awareness_enabled"]; ok { config.ZoneAwarenessEnabled = aws.Bool(v.(bool)) } return &config }
func TestExpandListeners(t *testing.T) { expanded := []interface{}{ map[string]interface{}{ "instance_port": 8000, "lb_port": 80, "instance_protocol": "http", "lb_protocol": "http", }, map[string]interface{}{ "instance_port": 8000, "lb_port": 80, "instance_protocol": "https", "lb_protocol": "https", "ssl_certificate_id": "something", }, } listeners, err := expandListeners(expanded) if err != nil { t.Fatalf("bad: %#v", err) } expected := &elb.Listener{ InstancePort: aws.Int64(int64(8000)), LoadBalancerPort: aws.Int64(int64(80)), InstanceProtocol: aws.String("http"), Protocol: aws.String("http"), } if !reflect.DeepEqual(listeners[0], expected) { t.Fatalf( "Got:\n\n%#v\n\nExpected:\n\n%#v\n", listeners[0], expected) } }
func ExampleLambda_UpdateFunctionConfiguration() { svc := lambda.New(nil) params := &lambda.UpdateFunctionConfigurationInput{ FunctionName: aws.String("FunctionName"), // Required Description: aws.String("Description"), Handler: aws.String("Handler"), MemorySize: aws.Int64(1), Role: aws.String("RoleArn"), Timeout: aws.Int64(1), } resp, err := svc.UpdateFunctionConfiguration(params) if err != nil { if awsErr, ok := err.(awserr.Error); ok { // Generic AWS error with Code, Message, and original error (if any) fmt.Println(awsErr.Code(), awsErr.Message(), awsErr.OrigErr()) if reqErr, ok := err.(awserr.RequestFailure); ok { // A service error occurred fmt.Println(reqErr.Code(), reqErr.Message(), reqErr.StatusCode(), reqErr.RequestID()) } } else { // This case should never be hit, the SDK should always return an // error which satisfies the awserr.Error interface. fmt.Println(err.Error()) } } // Pretty-print the response data. fmt.Println(awsutil.Prettify(resp)) }
func ExampleStorageGateway_UpdateBandwidthRateLimit() { sess, err := session.NewSession() if err != nil { fmt.Println("failed to create session,", err) return } svc := storagegateway.New(sess) params := &storagegateway.UpdateBandwidthRateLimitInput{ GatewayARN: aws.String("GatewayARN"), // Required AverageDownloadRateLimitInBitsPerSec: aws.Int64(1), AverageUploadRateLimitInBitsPerSec: aws.Int64(1), } resp, err := svc.UpdateBandwidthRateLimit(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }