2019-11-19 03:24:34 +00:00
|
|
|
package s3_backend
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"sync"
|
|
|
|
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/credentials"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/session"
|
|
|
|
"github.com/aws/aws-sdk-go/service/s3"
|
|
|
|
"github.com/aws/aws-sdk-go/service/s3/s3iface"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2019-11-22 22:51:09 +00:00
|
|
|
s3Sessions = make(map[string]s3iface.S3API)
|
2019-11-19 03:24:34 +00:00
|
|
|
sessionsLock sync.RWMutex
|
|
|
|
)
|
|
|
|
|
|
|
|
func getSession(region string) (s3iface.S3API, bool) {
|
|
|
|
sessionsLock.RLock()
|
|
|
|
defer sessionsLock.RUnlock()
|
|
|
|
|
|
|
|
sess, found := s3Sessions[region]
|
|
|
|
return sess, found
|
|
|
|
}
|
|
|
|
|
|
|
|
func createSession(awsAccessKeyId, awsSecretAccessKey, region string) (s3iface.S3API, error) {
|
|
|
|
|
|
|
|
sessionsLock.Lock()
|
|
|
|
defer sessionsLock.Unlock()
|
|
|
|
|
|
|
|
if t, found := s3Sessions[region]; found {
|
|
|
|
return t, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
config := &aws.Config{
|
|
|
|
Region: aws.String(region),
|
|
|
|
}
|
|
|
|
if awsAccessKeyId != "" && awsSecretAccessKey != "" {
|
|
|
|
config.Credentials = credentials.NewStaticCredentials(awsAccessKeyId, awsSecretAccessKey, "")
|
|
|
|
}
|
|
|
|
|
|
|
|
sess, err := session.NewSession(config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("create aws session in region %s: %v", region, err)
|
|
|
|
}
|
|
|
|
|
2019-11-22 22:51:09 +00:00
|
|
|
t := s3.New(sess)
|
2019-11-19 03:24:34 +00:00
|
|
|
|
|
|
|
s3Sessions[region] = t
|
|
|
|
|
|
|
|
return t, nil
|
|
|
|
|
2019-11-22 22:51:09 +00:00
|
|
|
}
|