milvus/internal/storage/aliyun/aliyun.go
zhenshan.cao 6c3f29d003
Identify service providers based on addresses (#27907)
Signed-off-by: zhenshan.cao <zhenshan.cao@zilliz.com>
2023-10-25 17:28:10 +08:00

101 lines
3.2 KiB
Go

package aliyun
import (
"github.com/aliyun/credentials-go/credentials" // >= v1.2.6
"github.com/cockroachdb/errors"
"github.com/minio/minio-go/v7"
minioCred "github.com/minio/minio-go/v7/pkg/credentials"
"github.com/milvus-io/milvus/pkg/log"
)
const (
OSSAddressFeatureString = "aliyuncs.com"
OSSDefaultAddress = "oss.aliyuncs.com"
)
// NewMinioClient returns a minio.Client which is compatible for aliyun OSS
func NewMinioClient(address string, opts *minio.Options) (*minio.Client, error) {
if opts == nil {
opts = &minio.Options{}
}
if opts.Creds == nil {
credProvider, err := NewCredentialProvider()
if err != nil {
return nil, errors.Wrap(err, "failed to create credential provider")
}
opts.Creds = minioCred.New(credProvider)
}
if address == "" {
address = OSSDefaultAddress
opts.Secure = true
}
return minio.New(address, opts)
}
// Credential is defined to mock aliyun credential.Credentials
//
//go:generate mockery --name=Credential --with-expecter
type Credential interface {
credentials.Credential
}
// CredentialProvider implements "github.com/minio/minio-go/v7/pkg/credentials".Provider
// also implements transport
type CredentialProvider struct {
// aliyunCreds doesn't provide a way to get the expire time, so we use the cache to check if it's expired
// when aliyunCreds.GetAccessKeyId is different from the cache, we know it's expired
akCache string
aliyunCreds Credential
}
func NewCredentialProvider() (minioCred.Provider, error) {
aliyunCreds, err := credentials.NewCredential(nil)
if err != nil {
return nil, errors.Wrap(err, "failed to create aliyun credential")
}
// backend, err := minio.DefaultTransport(true)
// if err != nil {
// return nil, errors.Wrap(err, "failed to create default transport")
// }
return &CredentialProvider{aliyunCreds: aliyunCreds}, nil
}
// Retrieve returns nil if it successfully retrieved the value.
// Error is returned if the value were not obtainable, or empty.
// according to the caller minioCred.Credentials.Get(),
// it already has a lock, so we don't need to worry about concurrency
func (c *CredentialProvider) Retrieve() (minioCred.Value, error) {
ret := minioCred.Value{}
ak, err := c.aliyunCreds.GetAccessKeyId()
if err != nil {
return ret, errors.Wrap(err, "failed to get access key id from aliyun credential")
}
ret.AccessKeyID = *ak
sk, err := c.aliyunCreds.GetAccessKeySecret()
if err != nil {
return minioCred.Value{}, errors.Wrap(err, "failed to get access key secret from aliyun credential")
}
securityToken, err := c.aliyunCreds.GetSecurityToken()
if err != nil {
return minioCred.Value{}, errors.Wrap(err, "failed to get security token from aliyun credential")
}
ret.SecretAccessKey = *sk
c.akCache = *ak
ret.SessionToken = *securityToken
return ret, nil
}
// IsExpired returns if the credentials are no longer valid, and need
// to be retrieved.
// according to the caller minioCred.Credentials.IsExpired(),
// it already has a lock, so we don't need to worry about concurrency
func (c CredentialProvider) IsExpired() bool {
ak, err := c.aliyunCreds.GetAccessKeyId()
if err != nil {
log.Warn("failed to get access key id from aliyun credential, assume it's expired")
return true
}
return *ak != c.akCache
}