mirror of
https://gitee.com/milvus-io/milvus.git
synced 2024-12-04 04:49:08 +08:00
6c3f29d003
Signed-off-by: zhenshan.cao <zhenshan.cao@zilliz.com>
101 lines
3.2 KiB
Go
101 lines
3.2 KiB
Go
package aliyun
|
|
|
|
import (
|
|
"github.com/aliyun/credentials-go/credentials" // >= v1.2.6
|
|
"github.com/cockroachdb/errors"
|
|
"github.com/minio/minio-go/v7"
|
|
minioCred "github.com/minio/minio-go/v7/pkg/credentials"
|
|
|
|
"github.com/milvus-io/milvus/pkg/log"
|
|
)
|
|
|
|
const (
|
|
OSSAddressFeatureString = "aliyuncs.com"
|
|
OSSDefaultAddress = "oss.aliyuncs.com"
|
|
)
|
|
|
|
// NewMinioClient returns a minio.Client which is compatible for aliyun OSS
|
|
func NewMinioClient(address string, opts *minio.Options) (*minio.Client, error) {
|
|
if opts == nil {
|
|
opts = &minio.Options{}
|
|
}
|
|
if opts.Creds == nil {
|
|
credProvider, err := NewCredentialProvider()
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to create credential provider")
|
|
}
|
|
opts.Creds = minioCred.New(credProvider)
|
|
}
|
|
if address == "" {
|
|
address = OSSDefaultAddress
|
|
opts.Secure = true
|
|
}
|
|
return minio.New(address, opts)
|
|
}
|
|
|
|
// Credential is defined to mock aliyun credential.Credentials
|
|
//
|
|
//go:generate mockery --name=Credential --with-expecter
|
|
type Credential interface {
|
|
credentials.Credential
|
|
}
|
|
|
|
// CredentialProvider implements "github.com/minio/minio-go/v7/pkg/credentials".Provider
|
|
// also implements transport
|
|
type CredentialProvider struct {
|
|
// aliyunCreds doesn't provide a way to get the expire time, so we use the cache to check if it's expired
|
|
// when aliyunCreds.GetAccessKeyId is different from the cache, we know it's expired
|
|
akCache string
|
|
aliyunCreds Credential
|
|
}
|
|
|
|
func NewCredentialProvider() (minioCred.Provider, error) {
|
|
aliyunCreds, err := credentials.NewCredential(nil)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "failed to create aliyun credential")
|
|
}
|
|
// backend, err := minio.DefaultTransport(true)
|
|
// if err != nil {
|
|
// return nil, errors.Wrap(err, "failed to create default transport")
|
|
// }
|
|
return &CredentialProvider{aliyunCreds: aliyunCreds}, nil
|
|
}
|
|
|
|
// Retrieve returns nil if it successfully retrieved the value.
|
|
// Error is returned if the value were not obtainable, or empty.
|
|
// according to the caller minioCred.Credentials.Get(),
|
|
// it already has a lock, so we don't need to worry about concurrency
|
|
func (c *CredentialProvider) Retrieve() (minioCred.Value, error) {
|
|
ret := minioCred.Value{}
|
|
ak, err := c.aliyunCreds.GetAccessKeyId()
|
|
if err != nil {
|
|
return ret, errors.Wrap(err, "failed to get access key id from aliyun credential")
|
|
}
|
|
ret.AccessKeyID = *ak
|
|
sk, err := c.aliyunCreds.GetAccessKeySecret()
|
|
if err != nil {
|
|
return minioCred.Value{}, errors.Wrap(err, "failed to get access key secret from aliyun credential")
|
|
}
|
|
securityToken, err := c.aliyunCreds.GetSecurityToken()
|
|
if err != nil {
|
|
return minioCred.Value{}, errors.Wrap(err, "failed to get security token from aliyun credential")
|
|
}
|
|
ret.SecretAccessKey = *sk
|
|
c.akCache = *ak
|
|
ret.SessionToken = *securityToken
|
|
return ret, nil
|
|
}
|
|
|
|
// IsExpired returns if the credentials are no longer valid, and need
|
|
// to be retrieved.
|
|
// according to the caller minioCred.Credentials.IsExpired(),
|
|
// it already has a lock, so we don't need to worry about concurrency
|
|
func (c CredentialProvider) IsExpired() bool {
|
|
ak, err := c.aliyunCreds.GetAccessKeyId()
|
|
if err != nil {
|
|
log.Warn("failed to get access key id from aliyun credential, assume it's expired")
|
|
return true
|
|
}
|
|
return *ak != c.akCache
|
|
}
|