seaweedfs/weed/storage/backend/s3_backend/s3_sessions.go

66 lines
1.5 KiB
Go
Raw Normal View History

2019-11-19 11:24:34 +08:00
package s3_backend
import (
"fmt"
"sync"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/credentials"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/s3"
"github.com/aws/aws-sdk-go/service/s3/s3iface"
)
var (
2019-11-23 06:51:09 +08:00
s3Sessions = make(map[string]s3iface.S3API)
2019-11-19 11:24:34 +08:00
sessionsLock sync.RWMutex
)
func getSession(region string) (s3iface.S3API, bool) {
sessionsLock.RLock()
defer sessionsLock.RUnlock()
sess, found := s3Sessions[region]
return sess, found
}
func createSession(awsAccessKeyId, awsSecretAccessKey, region, endpoint string) (s3iface.S3API, error) {
2019-11-19 11:24:34 +08:00
sessionsLock.Lock()
defer sessionsLock.Unlock()
if t, found := s3Sessions[region]; found {
return t, nil
}
config := &aws.Config{
2021-09-01 17:45:42 +08:00
Region: aws.String(region),
Endpoint: aws.String(endpoint),
S3ForcePathStyle: aws.Bool(true),
S3DisableContentMD5Validation: aws.Bool(true),
2019-11-19 11:24:34 +08:00
}
if awsAccessKeyId != "" && awsSecretAccessKey != "" {
config.Credentials = credentials.NewStaticCredentials(awsAccessKeyId, awsSecretAccessKey, "")
}
sess, err := session.NewSession(config)
if err != nil {
return nil, fmt.Errorf("create aws session in region %s: %v", region, err)
}
2019-11-23 06:51:09 +08:00
t := s3.New(sess)
2019-11-19 11:24:34 +08:00
s3Sessions[region] = t
return t, nil
2019-11-23 06:51:09 +08:00
}
func deleteFromS3(sess s3iface.S3API, sourceBucket string, sourceKey string) (err error) {
_, err = sess.DeleteObject(&s3.DeleteObjectInput{
Bucket: aws.String(sourceBucket),
Key: aws.String(sourceKey),
})
return err
2019-12-26 01:56:42 +08:00
}