* fix OPTIONS requests on non-existing API GW integrations * add cloudformation models for API Gateway deployments * bump version * add backdoor to return CloudWatch metrics * Updating implementation coverage * Updating implementation coverage * add cloudformation models for API Gateway deployments * Updating implementation coverage * Updating implementation coverage * Implemented get-caller-identity returning real data depending on the access key used. * bump version * minor fixes * fix Number data_type for SQS message attribute * fix handling of encoding errors * bump version * make CF stack queryable before starting to initialize its resources * bump version * fix integration_method for API GW method integrations * fix undefined status in CF FakeStack * Fix apigateway issues with terraform v0.12.21 * resource_methods -> add handle for "DELETE" method * integrations -> fix issue that "httpMethod" wasn't included in body request (this value was set as the value from refer method resource) * bump version * Fix setting http method for API gateway integrations (#6) * bump version * remove duplicate methods * add storage class to S3 Key when completing multipart upload (#7) * fix SQS performance issues; bump version * add pagination to SecretsManager list-secrets (#9) * fix default parameter groups in RDS * fix adding S3 metadata headers with names containing dots (#13) * Updating implementation coverage * Updating implementation coverage * add cloudformation models for API Gateway deployments * Updating implementation coverage * Updating implementation coverage * Implemented get-caller-identity returning real data depending on the access key used. * make CF stack queryable before starting to initialize its resources * bump version * remove duplicate methods * fix adding S3 metadata headers with names containing dots (#13) * Update amis.json to support EKS AMI mocks (#15) * fix PascalCase for boolean value in ListMultipartUploads response (#17); fix _get_multi_param to parse nested list/dict query params * determine non-zero container exit code in Batch API * support filtering by dimensions in CW get_metric_statistics * fix storing attributes for ELBv2 Route entities; API GW refactorings for TF tests * add missing fields for API GW resources * fix error messages for Route53 (TF-compat) * various fixes for IAM resources (tf-compat) * minor fixes for API GW models (tf-compat) * minor fixes for API GW responses (tf-compat) * add s3 exception for bucket notification filter rule validation * change the way RESTErrors generate the response body and content-type header * fix lint errors and disable "black" syntax enforcement * remove return type hint in RESTError.get_body * add RESTError XML template for IAM exceptions * add support for API GW minimumCompressionSize * fix casing getting PrivateDnsEnabled API GW attribute * minor fixes for error responses * fix escaping special chars for IAM role descriptions (tf-compat) * minor fixes and tagging support for API GW and ELB v2 (tf-compat) * Merge branch 'master' into localstack * add "AlarmRule" attribute to enable support for composite CloudWatch metrics * fix recursive parsing of complex/nested query params * bump version * add API to delete S3 website configurations (#18) * use dict copy to allow parallelism and avoid concurrent modification exceptions in S3 * fix precondition check for etags in S3 (#19) * minor fix for user filtering in Cognito * fix API Gateway error response; avoid returning empty response templates (tf-compat) * support tags and tracingEnabled attribute for API GW stages * fix boolean value in S3 encryption response (#20) * fix connection arn structure * fix api destination arn structure * black format * release 2.0.3.37 * fix s3 exception tests see botocore/parsers.py:1002 where RequestId is removed from parsed * remove python 2 from build action * add test failure annotations in build action * fix events test arn comparisons * fix s3 encryption response test * return default value "0" if EC2 availableIpAddressCount is empty * fix extracting SecurityGroupIds for EC2 VPC endpoints * support deleting/updating API Gateway DomainNames * fix(events): Return empty string instead of null when no pattern is specified in EventPattern (tf-compat) (#22) * fix logic and revert CF changes to get tests running again (#21) * add support for EC2 customer gateway API (#25) * add support for EC2 Transit Gateway APIs (#24) * feat(logs): add `kmsKeyId` into `LogGroup` entity (#23) * minor change in ELBv2 logic to fix tests * feat(events): add APIs to describe and delete CloudWatch Events connections (#26) * add support for EC2 transit gateway route tables (#27) * pass transit gateway route table ID in Describe API, minor refactoring (#29) * add support for EC2 Transit Gateway Routes (#28) * fix region on ACM certificate import (#31) * add support for EC2 transit gateway attachments (#30) * add support for EC2 Transit Gateway VPN attachments (#32) * fix account ID for logs API * add support for DeleteOrganization API * feat(events): store raw filter representation for CloudWatch events patterns (tf-compat) (#36) * feat(events): add support to describe/update/delete CloudWatch API destinations (#35) * add Cognito UpdateIdentityPool, CW Logs PutResourcePolicy * feat(events): add support for tags in EventBus API (#38) * fix parameter validation for Batch compute environments (tf-compat) * revert merge conflicts in IMPLEMENTATION_COVERAGE.md * format code using black * restore original README; re-enable and fix CloudFormation tests * restore tests and old logic for CF stack parameters from SSM * parameterize RequestId/RequestID in response messages and revert related test changes * undo LocalStack-specific adaptations * minor fix * Update CodeCov config to reflect removal of Py2 * undo change related to CW metric filtering; add additional test for CW metric statistics with dimensions * Terraform - Extend whitelist of running tests Co-authored-by: acsbendi <acsbendi28@gmail.com> Co-authored-by: Phan Duong <duongpv@outlook.com> Co-authored-by: Thomas Rausch <thomas@thrau.at> Co-authored-by: Macwan Nevil <macnev2013@gmail.com> Co-authored-by: Dominik Schubert <dominik.schubert91@gmail.com> Co-authored-by: Gonzalo Saad <saad.gonzalo.ale@gmail.com> Co-authored-by: Mohit Alonja <monty16597@users.noreply.github.com> Co-authored-by: Miguel Gagliardo <migag9@gmail.com> Co-authored-by: Bert Blommers <info@bertblommers.nl>
241 lines
8.3 KiB
Python
241 lines
8.3 KiB
Python
from moto.core.responses import BaseResponse
|
|
from .models import logs_backends
|
|
import json
|
|
from .exceptions import InvalidParameterException
|
|
|
|
|
|
# See http://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/Welcome.html
|
|
|
|
|
|
class LogsResponse(BaseResponse):
|
|
@property
|
|
def logs_backend(self):
|
|
return logs_backends[self.region]
|
|
|
|
@property
|
|
def request_params(self):
|
|
try:
|
|
return json.loads(self.body)
|
|
except ValueError:
|
|
return {}
|
|
|
|
def _get_param(self, param, if_none=None):
|
|
return self.request_params.get(param, if_none)
|
|
|
|
def create_log_group(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
tags = self._get_param("tags")
|
|
kms_key_id = self._get_param("kmsKeyId")
|
|
assert 1 <= len(log_group_name) <= 512 # TODO: assert pattern
|
|
|
|
self.logs_backend.create_log_group(log_group_name, tags, kmsKeyId=kms_key_id)
|
|
return ""
|
|
|
|
def delete_log_group(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
self.logs_backend.delete_log_group(log_group_name)
|
|
return ""
|
|
|
|
def describe_log_groups(self):
|
|
log_group_name_prefix = self._get_param("logGroupNamePrefix")
|
|
next_token = self._get_param("nextToken")
|
|
limit = self._get_param("limit", 50)
|
|
assert limit <= 50
|
|
groups, next_token = self.logs_backend.describe_log_groups(
|
|
limit, log_group_name_prefix, next_token
|
|
)
|
|
result = {"logGroups": groups}
|
|
if next_token:
|
|
result["nextToken"] = next_token
|
|
return json.dumps(result)
|
|
|
|
def create_log_stream(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
log_stream_name = self._get_param("logStreamName")
|
|
self.logs_backend.create_log_stream(log_group_name, log_stream_name)
|
|
return ""
|
|
|
|
def delete_log_stream(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
log_stream_name = self._get_param("logStreamName")
|
|
self.logs_backend.delete_log_stream(log_group_name, log_stream_name)
|
|
return ""
|
|
|
|
def describe_log_streams(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
log_stream_name_prefix = self._get_param("logStreamNamePrefix", "")
|
|
descending = self._get_param("descending", False)
|
|
limit = self._get_param("limit", 50)
|
|
assert limit <= 50
|
|
next_token = self._get_param("nextToken")
|
|
order_by = self._get_param("orderBy", "LogStreamName")
|
|
assert order_by in {"LogStreamName", "LastEventTime"}
|
|
|
|
if order_by == "LastEventTime":
|
|
assert not log_stream_name_prefix
|
|
|
|
streams, next_token = self.logs_backend.describe_log_streams(
|
|
descending,
|
|
limit,
|
|
log_group_name,
|
|
log_stream_name_prefix,
|
|
next_token,
|
|
order_by,
|
|
)
|
|
return json.dumps({"logStreams": streams, "nextToken": next_token})
|
|
|
|
def put_log_events(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
log_stream_name = self._get_param("logStreamName")
|
|
log_events = self._get_param("logEvents")
|
|
sequence_token = self._get_param("sequenceToken")
|
|
|
|
next_sequence_token = self.logs_backend.put_log_events(
|
|
log_group_name, log_stream_name, log_events, sequence_token
|
|
)
|
|
return json.dumps({"nextSequenceToken": next_sequence_token})
|
|
|
|
def get_log_events(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
log_stream_name = self._get_param("logStreamName")
|
|
start_time = self._get_param("startTime")
|
|
end_time = self._get_param("endTime")
|
|
limit = self._get_param("limit", 10000)
|
|
assert limit <= 10000
|
|
next_token = self._get_param("nextToken")
|
|
start_from_head = self._get_param("startFromHead", False)
|
|
|
|
(
|
|
events,
|
|
next_backward_token,
|
|
next_forward_token,
|
|
) = self.logs_backend.get_log_events(
|
|
log_group_name,
|
|
log_stream_name,
|
|
start_time,
|
|
end_time,
|
|
limit,
|
|
next_token,
|
|
start_from_head,
|
|
)
|
|
return json.dumps(
|
|
{
|
|
"events": events,
|
|
"nextBackwardToken": next_backward_token,
|
|
"nextForwardToken": next_forward_token,
|
|
}
|
|
)
|
|
|
|
def filter_log_events(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
log_stream_names = self._get_param("logStreamNames", [])
|
|
start_time = self._get_param("startTime")
|
|
# impl, see: http://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/FilterAndPatternSyntax.html
|
|
filter_pattern = self._get_param("filterPattern")
|
|
interleaved = self._get_param("interleaved", False)
|
|
end_time = self._get_param("endTime")
|
|
limit = self._get_param("limit", 10000)
|
|
assert limit <= 10000
|
|
next_token = self._get_param("nextToken")
|
|
|
|
events, next_token, searched_streams = self.logs_backend.filter_log_events(
|
|
log_group_name,
|
|
log_stream_names,
|
|
start_time,
|
|
end_time,
|
|
limit,
|
|
next_token,
|
|
filter_pattern,
|
|
interleaved,
|
|
)
|
|
return json.dumps(
|
|
{
|
|
"events": events,
|
|
"nextToken": next_token,
|
|
"searchedLogStreams": searched_streams,
|
|
}
|
|
)
|
|
|
|
def put_retention_policy(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
retention_in_days = self._get_param("retentionInDays")
|
|
self.logs_backend.put_retention_policy(log_group_name, retention_in_days)
|
|
return ""
|
|
|
|
def delete_retention_policy(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
self.logs_backend.delete_retention_policy(log_group_name)
|
|
return ""
|
|
|
|
def put_resource_policy(self):
|
|
policy_name = self._get_param("policyName")
|
|
policy_doc = self._get_param("policyDocument")
|
|
self.logs_backend.put_resource_policy(policy_name, policy_doc)
|
|
return ""
|
|
|
|
def list_tags_log_group(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
tags = self.logs_backend.list_tags_log_group(log_group_name)
|
|
return json.dumps({"tags": tags})
|
|
|
|
def tag_log_group(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
tags = self._get_param("tags")
|
|
self.logs_backend.tag_log_group(log_group_name, tags)
|
|
return ""
|
|
|
|
def untag_log_group(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
tags = self._get_param("tags")
|
|
self.logs_backend.untag_log_group(log_group_name, tags)
|
|
return ""
|
|
|
|
def describe_subscription_filters(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
|
|
subscription_filters = self.logs_backend.describe_subscription_filters(
|
|
log_group_name
|
|
)
|
|
|
|
return json.dumps({"subscriptionFilters": subscription_filters})
|
|
|
|
def put_subscription_filter(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
filter_name = self._get_param("filterName")
|
|
filter_pattern = self._get_param("filterPattern")
|
|
destination_arn = self._get_param("destinationArn")
|
|
role_arn = self._get_param("roleArn")
|
|
|
|
self.logs_backend.put_subscription_filter(
|
|
log_group_name, filter_name, filter_pattern, destination_arn, role_arn
|
|
)
|
|
|
|
return ""
|
|
|
|
def delete_subscription_filter(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
filter_name = self._get_param("filterName")
|
|
|
|
self.logs_backend.delete_subscription_filter(log_group_name, filter_name)
|
|
|
|
return ""
|
|
|
|
def start_query(self):
|
|
log_group_name = self._get_param("logGroupName")
|
|
log_group_names = self._get_param("logGroupNames")
|
|
start_time = self._get_param("startTime")
|
|
end_time = self._get_param("endTime")
|
|
query_string = self._get_param("queryString")
|
|
|
|
if log_group_name and log_group_names:
|
|
raise InvalidParameterException()
|
|
|
|
if log_group_name:
|
|
log_group_names = [log_group_name]
|
|
|
|
query_id = self.logs_backend.start_query(
|
|
log_group_names, start_time, end_time, query_string
|
|
)
|
|
|
|
return json.dumps({"queryId": "{0}".format(query_id)})
|