Dynamodb

DynamoDB is a scalable AWS managed NoSQL database.It supports both key-value and document data models, that enables to have a flexible schema for your data.This extension provides functionality that allows the client to communicate with the service when running in Quarkus.You can find more information about DynamoDB at the Amazon DynamoDB website.

The DynamoDB extension is based on AWS Java SDK 2.x.It’s a major rewrite of the 1.x code base that offers two programming models (Blocking & Async).Keep in mind it’s actively developed and does not support yet all the features available in SDK 1.x such as Document APIs or Object Mappers

The Quarkus extension supports two programming models:

  • Blocking access using URL Connection HTTP client (by default) or the Apache HTTP Client

  • Asynchronous programming based on JDK’s CompletableFuture objects and the Netty HTTP client.

In this guide, we see how you can get your REST services to use the DynamoDB locally and on AWS.

Prerequisites

To complete this guide, you need:

  • JDK 1.8+ installed with JAVA_HOME configured appropriately

  • an IDE

  • Apache Maven 3.5.3+

  • An AWS Account to access the DynamoDB service

  • Optionally, Docker for your system to run DynamoDB locally for testing purposes

Setup DynamoDB locally

The easiest way to start working with DynamoDB is to run a local instance as a container.

  1. docker run --publish 8000:8000 amazon/dynamodb-local:1.11.477 -jar DynamoDBLocal.jar -inMemory -sharedDb

This starts a DynamoDB instance that is accessible on port 8000.You can check it’s running by accessing the web shell on http://localhost:8000/shell.

Have a look at the Setting Up DynamoDB Local guide for other options to run DynamoDB.

Open http://localhost:8000/shell in your browser.

Copy and paste the following code to the shell and run it:

  1. var params = {
  2. TableName: 'QuarkusFruits',
  3. KeySchema: [{ AttributeName: 'fruitName', KeyType: 'HASH' }],
  4. AttributeDefinitions: [{ AttributeName: 'fruitName', AttributeType: 'S', }],
  5. ProvisionedThroughput: { ReadCapacityUnits: 1, WriteCapacityUnits: 1, }
  6. };
  7. dynamodb.createTable(params, function(err, data) {
  8. if (err) ppJson(err);
  9. else ppJson(data);
  10. });

Set up Dynamodb on AWS

Before you can use the AWS SDKs with DynamoDB, you must get an AWS access key ID and secret access key.For more information, see Setting Up DynamoDB (Web Service).

We recommend to use the AWS CLI to provision the table:

  1. aws dynamodb create-table --table-name QuarkusFruits \
  2. --attribute-definitions AttributeName=fruitName,AttributeType=S \
  3. --key-schema AttributeName=fruitName,KeyType=HASH \
  4. --provisioned-throughput ReadCapacityUnits=1,WriteCapacityUnits=1

Solution

The application built here allows to manage elements (fruits) stored in Amazon DynamoDB.

We recommend that you follow the instructions in the next sections and create the application step by step.However, you can go right to the completed example.

Clone the Git repository: git clone https://github.com/quarkusio/quarkus-quickstarts.git, or download an archive.

The solution is located in the dynamodb-quickstart directory.

Creating the Maven project

First, we need a new project. Create a new project with the following command:

  1. mvn io.quarkus:quarkus-maven-plugin:1.0.0.CR1:create \
  2. -DprojectGroupId=org.acme \
  3. -DprojectArtifactId=dynamodb-quickstart \
  4. -DclassName="org.acme.dynamodb.FruitResource" \
  5. -Dpath="/fruits" \
  6. -Dextensions="resteasy-jsonb,dynamodb"
  7. cd dynamodb-quickstart

This command generates a Maven structure importing the RESTEasy/JAX-RS and DynamoDB Client extensions.After this, the amazon-dynamodb extension has been added to your pom.xml.

Creating JSON REST service

In this example, we will create an application to manage a list of fruits. The example application will demonstrate the two programming models supported by the extension.

First, let’s create the Fruit bean as follows:

  1. package org.acme.dynamodb;
  2. import java.util.Map;
  3. import java.util.Objects;
  4. import io.quarkus.runtime.annotations.RegisterForReflection;
  5. import software.amazon.awssdk.services.dynamodb.model.AttributeValue;
  6. @RegisterForReflection
  7. public class Fruit {
  8. private String name;
  9. private String description;
  10. public Fruit() {
  11. }
  12. public static Fruit from(Map<String, AttributeValue> item) {
  13. Fruit fruit = new Fruit();
  14. if (item != null && !item.isEmpty()) {
  15. fruit.setName(item.get(AbstractService.FRUIT_NAME_COL).s());
  16. fruit.setDescription(item.get(AbstractService.FRUIT_DESC_COL).s());
  17. }
  18. return fruit;
  19. }
  20. public String getName() {
  21. return name;
  22. }
  23. public void setName(String name) {
  24. this.name = name;
  25. }
  26. public String getDescription() {
  27. return description;
  28. }
  29. public void setDescription(String description) {
  30. this.description = description;
  31. }
  32. @Override
  33. public boolean equals(Object obj) {
  34. if (!(obj instanceof Fruit)) {
  35. return false;
  36. }
  37. Fruit other = (Fruit) obj;
  38. return Objects.equals(other.name, this.name);
  39. }
  40. @Override
  41. public int hashCode() {
  42. return Objects.hash(this.name);
  43. }
  44. }

Nothing fancy. One important thing to note is that having a default constructor is required by the JSON serialization layer. The static from method creates a bean based on the Mapobject provided by the DynamoDB client response.

Now create a org.acme.dynamodb.AbstractService that will consist of helper methods that prepare DynamoDB request objects for reading and adding items to the table.

  1. package org.acme.dynamodb;
  2. import java.util.HashMap;
  3. import java.util.Map;
  4. import software.amazon.awssdk.services.dynamodb.model.AttributeValue;
  5. import software.amazon.awssdk.services.dynamodb.model.GetItemRequest;
  6. import software.amazon.awssdk.services.dynamodb.model.PutItemRequest;
  7. import software.amazon.awssdk.services.dynamodb.model.ScanRequest;
  8. public abstract class AbstractService {
  9. public final static String FRUIT_NAME_COL = "fruitName";
  10. public final static String FRUIT_DESC_COL = "fruitDescription";
  11. public String getTableName() {
  12. return "QuarkusFruits";
  13. }
  14. protected ScanRequest scanRequest() {
  15. return ScanRequest.builder().tableName(getTableName())
  16. .attributesToGet(FRUIT_NAME_COL, FRUIT_DESC_COL).build();
  17. }
  18. protected PutItemRequest putRequest(Fruit fruit) {
  19. Map<String, AttributeValue> item = new HashMap<>();
  20. item.put(FRUIT_NAME_COL, AttributeValue.builder().s(fruit.getName()).build());
  21. item.put(FRUIT_DESC_COL, AttributeValue.builder().s(fruit.getDescription()).build());
  22. return PutItemRequest.builder()
  23. .tableName(getTableName())
  24. .item(item)
  25. .build();
  26. }
  27. protected GetItemRequest getRequest(String name) {
  28. Map<String, AttributeValue> key = new HashMap<>();
  29. key.put(FRUIT_NAME_COL, AttributeValue.builder().s(name).build());
  30. return GetItemRequest.builder()
  31. .tableName(getTableName())
  32. .key(key)
  33. .attributesToGet(FRUIT_NAME_COL, FRUIT_DESC_COL)
  34. .build();
  35. }
  36. }

Then, create a org.acme.dynamodb.FruitSyncService that will be the business layer of our application and stores/loads the fruits from DynamoDB using the synchronous client.

  1. package org.acme.dynamodb;
  2. import java.util.List;
  3. import java.util.stream.Collectors;
  4. import javax.enterprise.context.ApplicationScoped;
  5. import javax.inject.Inject;
  6. import software.amazon.awssdk.services.dynamodb.DynamoDbClient;
  7. @ApplicationScoped
  8. public class FruitSyncService extends AbstractService {
  9. @Inject
  10. DynamoDbClient dynamoDB;
  11. public List<Fruit> findAll() {
  12. return dynamoDB.scanPaginator(scanRequest()).items().stream()
  13. .map(Fruit::from)
  14. .collect(Collectors.toList());
  15. }
  16. public List<Fruit> add(Fruit fruit) {
  17. dynamoDB.putItem(putRequest(fruit));
  18. return findAll();
  19. }
  20. public Fruit get(String name) {
  21. return Fruit.from(dynamoDB.getItem(getRequest(name)).item());
  22. }
  23. }

Now, edit the org.acme.dynamodb.FruitResource class as follows:

  1. package org.acme.dynamodb;
  2. import java.util.List;
  3. import javax.inject.Inject;
  4. import javax.ws.rs.Consumes;
  5. import javax.ws.rs.GET;
  6. import javax.ws.rs.POST;
  7. import javax.ws.rs.Path;
  8. import javax.ws.rs.PathParam;
  9. import javax.ws.rs.Produces;
  10. import javax.ws.rs.core.MediaType;
  11. @Path("/fruits")
  12. @Produces(MediaType.APPLICATION_JSON)
  13. @Consumes(MediaType.APPLICATION_JSON)
  14. public class FruitResource {
  15. @Inject
  16. FruitSyncService service;
  17. @GET
  18. public List<Fruit> getAll() {
  19. return service.findAll();
  20. }
  21. @GET
  22. @Path("{name}")
  23. public Fruit getSingle(@PathParam("name") String name) {
  24. return service.get(name);
  25. }
  26. @POST
  27. public List<Fruit> add(Fruit fruit) {
  28. service.add(fruit);
  29. return getAll();
  30. }
  31. }

The implementation is pretty straightforward and you just need to define your endpoints using the JAX-RS annotations and use the FruitSyncService to list/add new fruits.

Configuring DynamoDB clients

Both DynamoDB clients (sync and async) are configurable via the application.properties file that can be provided in the src/main/resources directory.Additionally, you need to added to the classpath a proper implementation of the sync client. By default the extension uses URL connection HTTP client, soyou need to add a URL connection client dependency to the pom.xml file:

  1. <dependency>
  2. <groupId>software.amazon.awssdk</groupId>
  3. <artifactId>url-connection-client</artifactId>
  4. </dependency>

If you want to use Apache HTTP client instead, configure it as follows:

  1. quarkus.dynamodb.sync-client.type=apache

And add following dependency to the application pom.xml:

  1. <dependency>
  2. <groupId>software.amazon.awssdk</groupId>
  3. <artifactId>apache-client</artifactId>
  4. <exclusions>
  5. <exclusion>
  6. <groupId>commons-logging</groupId>
  7. <artifactId>commons-logging</artifactId>
  8. </exclusion>
  9. </exclusions>
  10. </dependency>
It’s important to exclude commons-logging from the client dependency to force Apache HTTP client to use Quarkus logger.

If you’re going to use a local DynamoDB instance, configure it as follows:

  1. quarkus.dynamodb.endpoint-override=http://localhost:8000
  2. quarkus.dynamodb.aws.region=eu-central-1
  3. quarkus.dynamodb.aws.credentials.type=static
  4. quarkus.dynamodb.aws.credentials.static-provider.access-key-id=test-key
  5. quarkus.dynamodb.aws.credentials.static-provider.secret-access-key=test-secret
  • quarkus.dynamodb.aws.region - It’s required by the client, but since you’re using a local DynamoDB instance you can pick any valid AWS region.

  • quarkus.dynamodb.aws.credentials.type - Set static credentials provider with any values for access-key-id and secret-access-key

  • quarkus.dynamodb.endpoint-override - Override the DynamoDB client to use a local instance instead of an AWS service

If you want to work with an AWS account, you’d need to set it with:

  1. quarkus.dynamodb.aws.region=<YOUR_REGION>
  2. quarkus.dynamodb.aws.credentials.type=default
  • quarkus.dynamodb.aws.region you should set it to the region where you provisioned the DynamoDB table,

  • quarkus.dynamodb.aws.credentials.type - use the default credentials provider chain that looks for credentials in this order:

  • Java System Properties - aws.accessKeyId and aws.secretKey

  • Environment Variables - AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY

  • Credential profiles file at the default location (~/.aws/credentials) shared by all AWS SDKs and the AWS CLI

  • Credentials delivered through the Amazon EC2 container service if the AWS_CONTAINER_CREDENTIALS_RELATIVE_URI environment variable is set and the security manager has permission to access the variable,

  • Instance profile credentials delivered through the Amazon EC2 metadata service

Next steps

Packaging

Packaging your application is as simple as ./mvnw clean package.It can be run with java -jar target/dynamodb-quickstart-1.0-SNAPSHOT-runner.jar.

With GraalVM installed, you can also create a native executable binary: ./mvnw clean package -Dnative.Depending on your system, that will take some time.

Going asynchronous

Thanks to the AWS SDK v2.x used by the Quarkus extension, you can use the asynchronous programming model out of the box.

Create a org.acme.dynamodb.FruitAsyncService that will be similar to our FruitSyncService but using an asynchronous programming model.

  1. package org.acme.dynamodb;
  2. import java.util.List;
  3. import java.util.concurrent.CompletableFuture;
  4. import java.util.stream.Collectors;
  5. import javax.enterprise.context.ApplicationScoped;
  6. import javax.inject.Inject;
  7. import software.amazon.awssdk.services.dynamodb.DynamoDbAsyncClient;
  8. @ApplicationScoped
  9. public class FruitAsyncService extends AbstractService {
  10. @Inject
  11. DynamoDbAsyncClient dynamoDB;
  12. public CompletableFuture<List<Fruit>> findAll() {
  13. return dynamoDB.scan(scanRequest())
  14. .thenApply(res -> res.items().stream().map(Fruit::from).collect(Collectors.toList()));
  15. }
  16. public CompletableFuture<List<Fruit>> add(Fruit fruit) {
  17. return dynamoDB.putItem(putRequest(fruit)).thenCompose(ret -> findAll());
  18. }
  19. public CompletableFuture<Fruit> get(String name) {
  20. return dynamoDB.getItem(getRequest(name)).thenApply(resp -> Fruit.from(resp.item()));
  21. }
  22. }

Create an asynchronous REST resource:

  1. package org.acme.dynamodb;
  2. import java.util.List;
  3. import java.util.concurrent.CompletionStage;
  4. import javax.inject.Inject;
  5. import javax.ws.rs.Consumes;
  6. import javax.ws.rs.GET;
  7. import javax.ws.rs.POST;
  8. import javax.ws.rs.Path;
  9. import javax.ws.rs.PathParam;
  10. import javax.ws.rs.Produces;
  11. import javax.ws.rs.core.MediaType;
  12. @Path("/async-fruits")
  13. @Produces(MediaType.APPLICATION_JSON)
  14. @Consumes(MediaType.APPLICATION_JSON)
  15. public class FruitAsyncResource {
  16. @Inject
  17. FruitAsyncService service;
  18. @GET
  19. public CompletionStage<List<Fruit>> getAll() {
  20. return service.findAll();
  21. }
  22. @GET
  23. @Path("{name}")
  24. public CompletionStage<Fruit> getSingle(@PathParam("name") String name) {
  25. return service.get(name);
  26. }
  27. @POST
  28. public CompletionStage<List<Fruit>> add(Fruit fruit) {
  29. service.add(fruit);
  30. return getAll();
  31. }
  32. }

And add Netty HTTP client dependency to the pom.xml:

  1. <dependency>
  2. <groupId>software.amazon.awssdk</groupId>
  3. <artifactId>netty-nio-client</artifactId>
  4. </dependency>

Configuration Reference

Configuration property fixed at build time - ️ Configuration property overridable at runtime

Configuration propertyTypeDefault
quarkus.dynamodb.enable-endpoint-discoveryEnable DynamoDB service endpoint discovery.booleanfalse
quarkus.dynamodb.endpoint-overrideThe endpoint URI with which the SDK should communicate. If not specified, an appropriate endpoint to be used for DynamoDB service and region.URI
quarkus.dynamodb.api-call-timeoutThe amount of time to allow the client to complete the execution of an API call. This timeout covers the entire client execution except for marshalling. This includes request handler execution, all HTTP requests including retries, unmarshalling, etc. This value should always be positive, if present.Duration
quarkus.dynamodb.api-call-attempt-timeoutThe amount of time to wait for the HTTP request to complete before giving up and timing out. This value should always be positive, if present.Duration
quarkus.dynamodb.interceptorsList of execution interceptors that will have access to read and modify the request and response objects as they are processed by the AWS SDK. The list should consists of class names which implements software.amazon.awssdk.core.interceptor.ExecutionInterceptor interface.list of class namerequired
quarkus.dynamodb.aws.regionAn Amazon Web Services region that hosts DynamoDB.It overrides region provider chain with static value ofregion with which the DynamoDB client should communicate.If not set, region is retrieved via the default providers chain in the following order:-aws.region system property-region property from the profile file-Instance profile fileSee software.amazon.awssdk.regions.Region for available regions.Region
quarkus.dynamodb.aws.credentials.typeConfigure the credentials provider that should be used to authenticate with AWS.Available values:-default - the provider will attempt to identify the credentials automatically using the following checks: -Java System Properties - aws.accessKeyId and aws.secretKey -Environment Variables - AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY -Credential profiles file at the default location (~/.aws/credentials) shared by all AWS SDKs and the AWS CLI -Credentials delivered through the Amazon EC2 container service if AWS_CONTAINER_CREDENTIALS_RELATIVE_URI environment variable is set and security manager has permission to access the variable. -Instance profile credentials delivered through the Amazon EC2 metadata service-static - the provider that uses the access key and secret access key specified in the tatic-provider section of the config.-system-property - it loads credentials from the aws.accessKeyId, aws.secretAccessKey and aws.sessionToken system properties.-env-variable - it loads credentials from the AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY and AWS_SESSION_TOKEN environment variables.-profile - credentials are based on AWS configuration profiles. This loads credentials froma profile file,allowing you to share multiple sets of AWS security credentials between different tools like the AWS SDK for Java and the AWS CLI.-container - It loads credentials from a local metadata service. Containers currently supported by the AWS SDK areAmazon Elastic Container Service (ECS) and AWS Greengrass-instance-profile - It loads credentials from the Amazon EC2 Instance Metadata Service.-process - Credentials are loaded from an external process. This is used to support the credential_process setting in the profilecredentials file. See Sourcing Credentials From External Processesfor more information.-anonymous - It always returns anonymous AWS credentials. Anonymous AWS credentials result in un-authenticated requests and willfail unless the resource or API’s policy has been configured to specifically allow anonymous access.default, static, system-property, env-variable, profile, container, instance-profile, process, anonymousdefault
quarkus.dynamodb.aws.credentials.default-provider.async-credential-update-enabledWhether this provider should fetch credentials asynchronously in the background. If this is true, threads are less likely to block, but additional resources are used to maintain the provider.booleanfalse
quarkus.dynamodb.aws.credentials.default-provider.reuse-last-provider-enabledWhether the provider should reuse the last successful credentials provider in the chain. Reusing the last successful credentials provider will typically return credentials faster than searching through the chain.booleantrue
quarkus.dynamodb.aws.credentials.static-provider.access-key-idAWS Access key idstringrequired
quarkus.dynamodb.aws.credentials.static-provider.secret-access-keyAWS Secret access keystringrequired
quarkus.dynamodb.aws.credentials.profile-provider.profile-nameThe name of the profile that should be used by this credentials provider. If not specified, the value in AWS_PROFILE environment variable or aws.profile system property is used and defaults to default name.string
quarkus.dynamodb.aws.credentials.process-provider.async-credential-update-enabledWhether the provider should fetch credentials asynchronously in the background. If this is true, threads are less likely to block when credentials are loaded, but additional resources are used to maintain the provider.booleanfalse
quarkus.dynamodb.aws.credentials.process-provider.credential-refresh-thresholdThe amount of time between when the credentials expire and when the credentials should start to be refreshed. This allows the credentials to be refreshed before they are reported to expire.Duration15S
quarkus.dynamodb.aws.credentials.process-provider.process-output-limitThe maximum size of the output that can be returned by the external process before an exception is raised.MemorySize 1024
quarkus.dynamodb.aws.credentials.process-provider.commandThe command that should be executed to retrieve credentials.stringrequired
quarkus.dynamodb.sync-client.typeType of the sync HTTP client implementationurl, apacheurl
quarkus.dynamodb.sync-client.connection-timeoutThe maximum amount of time to establish a connection before timing out.Duration2S
quarkus.dynamodb.sync-client.socket-timeoutThe amount of time to wait for data to be transferred over an established, open connection before the connection is timed out.Duration30S
quarkus.dynamodb.sync-client.apache.connection-acquisition-timeoutThe amount of time to wait when acquiring a connection from the pool before giving up and timing out.Duration10S
quarkus.dynamodb.sync-client.apache.connection-max-idle-timeThe maximum amount of time that a connection should be allowed to remain open while idle.Duration60S
quarkus.dynamodb.sync-client.apache.connection-time-to-liveThe maximum amount of time that a connection should be allowed to remain open, regardless of usage frequency.Duration
quarkus.dynamodb.sync-client.apache.max-connectionsThe maximum number of connections allowed in the connection pool. Each built HTTP client has its own private connection pool.int50
quarkus.dynamodb.sync-client.apache.expect-continue-enabledWhether the client should send an HTTP expect-continue handshake before each request.booleantrue
quarkus.dynamodb.sync-client.apache.use-idle-connection-reaperWhether the idle connections in the connection pool should be closed asynchronously. When enabled, connections left idling for longer than quarkus.dynamodb.sync-client.connection-max-idle-time will be closed. This will not close connections currently in use.booleantrue
quarkus.dynamodb.sync-client.apache.proxy.enabledEnable HTTP proxybooleanfalse
quarkus.dynamodb.sync-client.apache.proxy.endpointThe endpoint of the proxy server that the SDK should connect through. Currently, the endpoint is limited to a host and port. Any other URI components will result in an exception being raised.URIrequired
quarkus.dynamodb.sync-client.apache.proxy.usernameThe username to use when connecting through a proxy.string
quarkus.dynamodb.sync-client.apache.proxy.passwordThe password to use when connecting through a proxy.string
quarkus.dynamodb.sync-client.apache.proxy.ntlm-domainFor NTLM proxies - the Windows domain name to use when authenticating with the proxy.string
quarkus.dynamodb.sync-client.apache.proxy.ntlm-workstationFor NTLM proxies - the Windows workstation name to use when authenticating with the proxy.string
quarkus.dynamodb.sync-client.apache.proxy.preemptive-basic-authentication-enabledWhether to attempt to authenticate preemptively against the proxy server using basic authentication.boolean
quarkus.dynamodb.sync-client.apache.proxy.non-proxy-hostsThe hosts that the client is allowed to access without going through the proxy.list of stringrequired
quarkus.dynamodb.sync-client.apache.tls-managers-provider.typeTLS managers provider type.Available providers:-none - Use this provider if you don’t want the client to present any certificates to the remote TLS host.-system-property - Provider checks the standard javax.net.ssl.keyStore, javax.net.ssl.keyStorePassword, andjavax.net.ssl.keyStoreType properties defined by the JSSE.-file-store - Provider that loads a the key store from a file.none, system-property, file-storesystem-property
quarkus.dynamodb.sync-client.apache.tls-managers-provider.file-store.pathPath to the key store.pathrequired
quarkus.dynamodb.sync-client.apache.tls-managers-provider.file-store.typeKey store type. See the KeyStore section in the Java Cryptography Architecture Standard Algorithm Name Documentation for information about standard keystore types.stringrequired
quarkus.dynamodb.sync-client.apache.tls-managers-provider.file-store.passwordKey store passwordstringrequired
quarkus.dynamodb.async-client.max-concurrencyThe maximum number of allowed concurrent requests. For HTTP/1.1 this is the same as max connections. For HTTP/2 the number of connections that will be used depends on the max streams allowed per connection.int50
quarkus.dynamodb.async-client.max-pending-connection-acquiresThe maximum number of pending acquires allowed. Once this exceeds, acquire tries will be failed.int10000
quarkus.dynamodb.async-client.read-timeoutThe amount of time to wait for a read on a socket before an exception is thrown. Specify 0 to disable.Duration30S
quarkus.dynamodb.async-client.write-timeoutThe amount of time to wait for a write on a socket before an exception is thrown. Specify 0 to disable.Duration30S
quarkus.dynamodb.async-client.connection-timeoutThe amount of time to wait when initially establishing a connection before giving up and timing out.Duration10S
quarkus.dynamodb.async-client.connection-acquisition-timeoutThe amount of time to wait when acquiring a connection from the pool before giving up and timing out.Duration2S
quarkus.dynamodb.async-client.connection-time-to-liveThe maximum amount of time that a connection should be allowed to remain open, regardless of usage frequency.Duration
quarkus.dynamodb.async-client.connection-max-idle-timeThe maximum amount of time that a connection should be allowed to remain open while idle. Currently has no effect if quarkus.dynamodb.async-client.use-idle-connection-reaper is false.Duration60S
quarkus.dynamodb.async-client.use-idle-connection-reaperWhether the idle connections in the connection pool should be closed. When enabled, connections left idling for longer than quarkus.dynamodb.async-client.connection-max-idle-time will be closed. This will not close connections currently in use.booleantrue
quarkus.dynamodb.async-client.protocolThe HTTP protocol to use.http1-1, http2http1-1
quarkus.dynamodb.async-client.max-http2-streamsThe maximum number of concurrent streams for an HTTP/2 connection. This setting is only respected when the HTTP/2 protocol is used. 0 means unlimited.int0
quarkus.dynamodb.async-client.ssl-providerThe SSL Provider to be used in the Netty client. Default is OPENSSL if available, JDK otherwise.jdk, openssl, openssl-refcnt
quarkus.dynamodb.async-client.proxy.enabledEnable HTTP proxy.booleanfalse
quarkus.dynamodb.async-client.proxy.endpointThe endpoint of the proxy server that the SDK should connect through. Currently, the endpoint is limited to a host and port. Any other URI components will result in an exception being raised.URIrequired
quarkus.dynamodb.async-client.proxy.non-proxy-hostsThe hosts that the client is allowed to access without going through the proxy.list of stringrequired
quarkus.dynamodb.async-client.tls-managers-provider.typeTLS managers provider type.Available providers:-none - Use this provider if you don’t want the client to present any certificates to the remote TLS host.-system-property - Provider checks the standard javax.net.ssl.keyStore, javax.net.ssl.keyStorePassword, andjavax.net.ssl.keyStoreType properties defined by the JSSE.-file-store - Provider that loads a the key store from a file.none, system-property, file-storesystem-property
quarkus.dynamodb.async-client.tls-managers-provider.file-store.pathPath to the key store.pathrequired
quarkus.dynamodb.async-client.tls-managers-provider.file-store.typeKey store type. See the KeyStore section in the Java Cryptography Architecture Standard Algorithm Name Documentation for information about standard keystore types.stringrequired
quarkus.dynamodb.async-client.tls-managers-provider.file-store.passwordKey store passwordstringrequired
quarkus.dynamodb.async-client.event-loop.overrideEnable the custom configuration of the Netty event loop group.booleanfalse
quarkus.dynamodb.async-client.event-loop.number-of-threadsNumber of threads to use for the event loop group. If not set, the default Netty thread count is used (which is double the number of available processors unless the io.netty.eventLoopThreads system property is set.int
quarkus.dynamodb.async-client.event-loop.thread-name-prefixThe thread name prefix for threads created by this thread factory used by event loop group. The prefix will be appended with a number unique to the thread factory and a number unique to the thread. If not specified it defaults to aws-java-sdk-NettyEventLoopstring
About the Duration formatThe format for durations uses the standard java.time.Duration format.You can learn more about it in the Duration#parse() javadoc.You can also provide duration values starting with a number.In this case, if the value consists only of a number, the converter treats the value as seconds.Otherwise, PT is implicitly prepended to the value to obtain a standard java.time.Duration format.
About the MemorySize formatA size configuration option recognises string in this format (shown as a regular expression): [0-9]+[KkMmGgTtPpEeZzYy]?.If no suffix is given, assume bytes.