We've updated our privacy policy. Click here to review the details. Tap here to review the details.
Activate your 30 day free trial to unlock unlimited reading.
Activate your 30 day free trial to continue reading.
Download to read offline
Slides from my talk at AWS ComSum 2022 in Manchester.
If you are writing code in Python which communicates with AWS APIs you are more than likely using the boto3 library.
boto3 isn't extended via inheritance or callbacks, instead it offers an event system which allows you to intercept and modify calls at different stages in their lifecycle.
This is a very powerful mechanism but it can be hard to write code for very rare events.
Using a tool like mitmproxy you can rewrite responses boto3 receives and simulate rarer events to aid writing code to handle them.
In this talk I'll show:
- How to write basic code to listen to events
- An example of some events you might see in typical S3 requests
- How to use mitmproxy to intercept, understand and ultimately rewrite HTTP requests between boto3 and AWS to simulate different scenarios
- An example of the events you'll see during request retries
- An example putting this together to insert monitoring into the boto3 retry mechanism to diagnose network issues
Full source here: https://github.com/micktwomey/exploring-boto3-events-with-mitmproxy
Slides from my talk at AWS ComSum 2022 in Manchester.
If you are writing code in Python which communicates with AWS APIs you are more than likely using the boto3 library.
boto3 isn't extended via inheritance or callbacks, instead it offers an event system which allows you to intercept and modify calls at different stages in their lifecycle.
This is a very powerful mechanism but it can be hard to write code for very rare events.
Using a tool like mitmproxy you can rewrite responses boto3 receives and simulate rarer events to aid writing code to handle them.
In this talk I'll show:
- How to write basic code to listen to events
- An example of some events you might see in typical S3 requests
- How to use mitmproxy to intercept, understand and ultimately rewrite HTTP requests between boto3 and AWS to simulate different scenarios
- An example of the events you'll see during request retries
- An example putting this together to insert monitoring into the boto3 retry mechanism to diagnose network issues
Full source here: https://github.com/micktwomey/exploring-boto3-events-with-mitmproxy
You just clipped your first slide!
Clipping is a handy way to collect important slides you want to go back to later. Now customize the name of a clipboard to store your clips.The SlideShare family just got bigger. Enjoy access to millions of ebooks, audiobooks, magazines, and more from Scribd.
Cancel anytime.Unlimited Reading
Learn faster and smarter from top experts
Unlimited Downloading
Download to take your learnings offline and on the go
You also get free access to Scribd!
Instant access to millions of ebooks, audiobooks, magazines, podcasts and more.
Read and listen offline with any device.
Free access to premium services like Tuneln, Mubi and more.
We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.
You can read the details below. By accepting, you agree to the updated privacy policy.
Thank you!