diff options
| author | Chris Lu <chris.lu@gmail.com> | 2019-11-18 19:24:34 -0800 |
|---|---|---|
| committer | Chris Lu <chris.lu@gmail.com> | 2019-11-18 19:24:37 -0800 |
| commit | 9711a6ffaabdac8516317a5539316e9a2bb83faf (patch) | |
| tree | 153c006cb1316cf4092383085ceffcab0c215ee3 /weed/storage | |
| parent | ba73c053c3cf61ff83e1700c639dcb1538f42b41 (diff) | |
| download | seaweedfs-9711a6ffaabdac8516317a5539316e9a2bb83faf.tar.xz seaweedfs-9711a6ffaabdac8516317a5539316e9a2bb83faf.zip | |
WIP
Diffstat (limited to 'weed/storage')
| -rw-r--r-- | weed/storage/backend/backend.go | 4 | ||||
| -rw-r--r-- | weed/storage/backend/s3_backend/s3_backend.go | 120 | ||||
| -rw-r--r-- | weed/storage/backend/s3_backend/s3_sessions.go | 54 |
3 files changed, 178 insertions, 0 deletions
diff --git a/weed/storage/backend/backend.go b/weed/storage/backend/backend.go index ae0f84216..3c297f20b 100644 --- a/weed/storage/backend/backend.go +++ b/weed/storage/backend/backend.go @@ -13,3 +13,7 @@ type DataStorageBackend interface { GetStat() (datSize int64, modTime time.Time, err error) String() string } + +var ( + StorageBackends []DataStorageBackend +) diff --git a/weed/storage/backend/s3_backend/s3_backend.go b/weed/storage/backend/s3_backend/s3_backend.go new file mode 100644 index 000000000..0ff7eca21 --- /dev/null +++ b/weed/storage/backend/s3_backend/s3_backend.go @@ -0,0 +1,120 @@ +package s3_backend + +import ( + "fmt" + "strings" + "time" + + "github.com/aws/aws-sdk-go/service/s3" + "github.com/aws/aws-sdk-go/service/s3/s3iface" + "github.com/chrislusf/seaweedfs/weed/glog" + "github.com/chrislusf/seaweedfs/weed/storage/backend" + "github.com/chrislusf/seaweedfs/weed/storage/needle" + "github.com/chrislusf/seaweedfs/weed/util" +) + +var ( + _ backend.DataStorageBackend = &S3Backend{} +) + +func init() { + backend.StorageBackends = append(backend.StorageBackends, &S3Backend{}) +} + +type S3Backend struct { + conn s3iface.S3API + region string + bucket string + dir string + vid needle.VolumeId + key string +} + +func (s3backend S3Backend) ReadAt(p []byte, off int64) (n int, err error) { + bytesRange := fmt.Sprintf("bytes=%d-%d", off, off+int64(len(p))-1) + getObjectOutput, getObjectErr := s3backend.conn.GetObject(&s3.GetObjectInput{ + Bucket: &s3backend.bucket, + Key: &s3backend.key, + Range: &bytesRange, + }) + + if getObjectErr != nil { + return 0, fmt.Errorf("bucket %s GetObject %s: %v", s3backend.bucket, s3backend.key, getObjectErr) + } + defer getObjectOutput.Body.Close() + + return getObjectOutput.Body.Read(p) + +} + +func (s3backend S3Backend) WriteAt(p []byte, off int64) (n int, err error) { + panic("implement me") +} + +func (s3backend S3Backend) Truncate(off int64) error { + panic("implement me") +} + +func (s3backend S3Backend) Close() error { + return nil +} + +func (s3backend S3Backend) GetStat() (datSize int64, modTime time.Time, err error) { + + headObjectOutput, headObjectErr := s3backend.conn.HeadObject(&s3.HeadObjectInput{ + Bucket: &s3backend.bucket, + Key: &s3backend.key, + }) + + if headObjectErr != nil { + return 0, time.Now(), fmt.Errorf("bucket %s HeadObject %s: %v", s3backend.bucket, s3backend.key, headObjectErr) + } + + datSize = int64(*headObjectOutput.ContentLength) + modTime = *headObjectOutput.LastModified + + return +} + +func (s3backend S3Backend) String() string { + return fmt.Sprintf("%s/%s", s3backend.bucket, s3backend.key) +} + +func (s3backend *S3Backend) GetName() string { + return "s3" +} + +func (s3backend *S3Backend) GetSinkToDirectory() string { + return s3backend.dir +} + +func (s3backend *S3Backend) Initialize(configuration util.Configuration, vid needle.VolumeId) error { + glog.V(0).Infof("storage.backend.s3.region: %v", configuration.GetString("region")) + glog.V(0).Infof("storage.backend.s3.bucket: %v", configuration.GetString("bucket")) + glog.V(0).Infof("storage.backend.s3.directory: %v", configuration.GetString("directory")) + + return s3backend.initialize( + configuration.GetString("aws_access_key_id"), + configuration.GetString("aws_secret_access_key"), + configuration.GetString("region"), + configuration.GetString("bucket"), + configuration.GetString("directory"), + vid, + ) +} + +func (s3backend *S3Backend) initialize(awsAccessKeyId, awsSecretAccessKey, region, bucket, dir string, + vid needle.VolumeId) (err error) { + s3backend.region = region + s3backend.bucket = bucket + s3backend.dir = dir + s3backend.conn, err = createSession(awsAccessKeyId, awsSecretAccessKey, region) + + s3backend.vid = vid + s3backend.key = fmt.Sprintf("%s/%d.dat", dir, vid) + if strings.HasPrefix(s3backend.key, "/") { + s3backend.key = s3backend.key[1:] + } + + return err +} diff --git a/weed/storage/backend/s3_backend/s3_sessions.go b/weed/storage/backend/s3_backend/s3_sessions.go new file mode 100644 index 000000000..ef4f8c137 --- /dev/null +++ b/weed/storage/backend/s3_backend/s3_sessions.go @@ -0,0 +1,54 @@ +package s3_backend + +import ( + "fmt" + "sync" + + "github.com/aws/aws-sdk-go/aws" + "github.com/aws/aws-sdk-go/aws/credentials" + "github.com/aws/aws-sdk-go/aws/session" + "github.com/aws/aws-sdk-go/service/s3" + "github.com/aws/aws-sdk-go/service/s3/s3iface" +) + +var ( + s3Sessions = make(map[string]s3iface.S3API) + sessionsLock sync.RWMutex +) + +func getSession(region string) (s3iface.S3API, bool) { + sessionsLock.RLock() + defer sessionsLock.RUnlock() + + sess, found := s3Sessions[region] + return sess, found +} + +func createSession(awsAccessKeyId, awsSecretAccessKey, region string) (s3iface.S3API, error) { + + sessionsLock.Lock() + defer sessionsLock.Unlock() + + if t, found := s3Sessions[region]; found { + return t, nil + } + + config := &aws.Config{ + Region: aws.String(region), + } + if awsAccessKeyId != "" && awsSecretAccessKey != "" { + config.Credentials = credentials.NewStaticCredentials(awsAccessKeyId, awsSecretAccessKey, "") + } + + sess, err := session.NewSession(config) + if err != nil { + return nil, fmt.Errorf("create aws session in region %s: %v", region, err) + } + + t:= s3.New(sess) + + s3Sessions[region] = t + + return t, nil + +}
\ No newline at end of file |
