python-sqs-listener icon indicating copy to clipboard operation
python-sqs-listener copied to clipboard

A simple wrapper for boto3 for listening, and sending, to an AWS SQS queue

Results 14 python-sqs-listener issues
Sort by recently updated
recently updated
newest added
trafficstars

In EKS environments, each container on a single host can have its own credentials. Authentication is supported via a mechanism of 'serviceAccounts' (a kubernetes term). `boto3.Session().get_credentials().method` returns `assume-role-with-web-identity` which is...

When creating queues via CloudFormation you can allow the queue names to be generated automatically. For example a template with these resources: ``` MailDeadLetterQueue: Type: AWS::SQS::Queue MailQueue: Type: AWS::SQS::Queue Properties:...

References #39. Also adds syntax highlight for readme.

Hi, It would be nice to have a native implementation on how to provide a heartbeat feature to extend the visibility timeout if the processing of an SQS message is...

Hello, This merge request includes the following changes: # Serialization * Add the possibility to pass a "deserialization" function to the listener. The default behavior has not been altered. By...

https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/sqs.html#service-resource The resource objects are lazily loaded. No need for an extra API call.

enhancement

When starting the Daemon for the first time, the pidfile is auto-created with empty content, however, the exception handling does not capture casting an empty string to int. Currently, the...

Example to override this method to start SO signals ``` class SignalHandler: def __init__(self): self.received_signal = False signal(SIGINT, self._signal_handler) signal(SIGTERM, self._signal_handler) def _signal_handler(self, signal, frame): logger.info("Handling signal %s, exiting gracefully",...

HI, why shared-credentials-file is not valid method? ` if ( not os.environ.get('AWS_ACCOUNT_ID', None) and not (boto3.Session().get_credentials().method in ['iam-role', 'assume-role', 'assume-role-with-web-identity']) ): raise EnvironmentError('Environment variable `AWS_ACCOUNT_ID` not set and no role...