* feat(spot): first version to test http endpoints * fix(helm): changed nginx path prefix * fix(spots): added missing BUCKET_NAME env var * fix(spots): added services init check * feat(spots): removed geo module * feat(spots): removed uaparser * feat(spots): added more detailed authorization error log * feat(spots): changed the authorization middleware * feat(spots): extended http body size limit to 128kb * feat(spots): added s3 error log * feat(spots): added new handler for uploaded event * feat(backend): small api changes in spot service * feat(backend): rewrote request parameters grabber for getSpot handler * feat(backend): added tenantID to auth struct * feat(backend): added pre-signed download urls for preview, mob et video files * feat(backend): added user's email to spots table, and getSpot responses * feat(backend): returning spotID as a string * feat(spot): added transcoder pipeline * fix(spot): return spotID as a string * feat(spot): added volume mount to spot service * feat(spot): fixed volume mounting * feat(spot): helm fix * feat(spot): helm another fix * fix(spot): correct video.webm path * fix(spot): correct pre-signed url for download original video * feat(spot): added PATCH and DELETE methods to CORS * feat(spot): use string format for spotIDs in delete method * feat(spot): added public key implemented * fix(spot): correct public-key parser * fix(spot): fixed query params issue + user's tenantID * fix(spot): use 1 as a default tenant * feat(spot): added correct total spots calculation * fix(spot): fixed offset calculation * feat(spot): added extra check in auth method * fix(spot): removed / from video file name * fix(spot): devided codec flag into 2 parts * feat(spot): use fixed tenantID = 1 for oss users * feat(spot): return 404 for public key not found issue * feat(spots): added spots folder to minio path rule * feat(spot): added spot video streaming support * fix(spot): fixed an sql request for spot streams * feat(spot): return playlist file in getSpot responce * feat(spot): try to use aac audio codec * feat(spot): added permissions support (oss/ee) * feat(spot): added authorizer method * feat(spot): added license check * feat(spot): added spot preview for get response * fix(spot): fixed a problem with permissions * feat(spot): added crop feature * feat(spot): upload cropped video back to s3 * feat(spot): manage expired modified playlist file * feat(backend): hack with video formats * feat(backend): removed space * feat(spot): req tracing * feat(spot): manual method's name mapping * feat(spot): added a second method to public key auth support * feat(spot): metrics * feat(spot): added rate limiter per user * feat(spot): added ping endpoint for spot jwt token check * feat(spot): getStatus endpoint * feat(spot): added missing import * feat(spot): transcoding issue fix * feat(spot): temp remove tasks * feat(spot): better error log message * feat(spot): set default jwt_secret value * feat(spot): debug auth * feat(spot): 2 diff jwt tokens support * feat(spot): pg tasks with process status * feat(spot): more logs * feat(spot): improved defer for GetTask method * feat(spot): keep only failed tasks * feat(spot): removing temp dir with spot files * feat(spot): added several workers for transcoding module * feat(spot): fixed spot path for temp video files * feat(spot): use custom statusWriter to track response code in middleware * feat(spot): added body and parameter parser for auditrail feature * feat(spot): fixed IsAuth method signature * feat(spot): fixed ee service builder * feat(spot): added import * feat(spot): fix data type for payload and parameters jsonb fields * feat(spot): typo fix * feat(spot): moved out consts * feat(spot): new table's name * feat(spot): added missing imports in go.mod * feat(spot): added a check for the number of comments (20 by default)
220 lines
5.1 KiB
Go
220 lines
5.1 KiB
Go
package s3
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"fmt"
|
|
"io"
|
|
"log"
|
|
"net/http"
|
|
"os"
|
|
"sort"
|
|
"strconv"
|
|
"time"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/aws/credentials"
|
|
_session "github.com/aws/aws-sdk-go/aws/session"
|
|
"github.com/aws/aws-sdk-go/service/s3"
|
|
"github.com/aws/aws-sdk-go/service/s3/s3manager"
|
|
|
|
objConfig "openreplay/backend/internal/config/objectstorage"
|
|
"openreplay/backend/pkg/objectstorage"
|
|
)
|
|
|
|
const MAX_RETURNING_COUNT = 40
|
|
|
|
type storageImpl struct {
|
|
uploader *s3manager.Uploader
|
|
svc *s3.S3
|
|
bucket *string
|
|
fileTag *string
|
|
}
|
|
|
|
func NewS3(cfg *objConfig.ObjectsConfig) (objectstorage.ObjectStorage, error) {
|
|
if cfg == nil {
|
|
return nil, fmt.Errorf("s3 config is nil")
|
|
}
|
|
creds := credentials.NewStaticCredentials(cfg.AWSAccessKeyID, cfg.AWSSecretAccessKey, "")
|
|
if cfg.AWSAccessKeyID == "" || cfg.AWSSecretAccessKey == "" {
|
|
creds = nil
|
|
}
|
|
config := &aws.Config{
|
|
Region: aws.String(cfg.AWSRegion),
|
|
Credentials: creds,
|
|
}
|
|
if cfg.AWSEndpoint != "" {
|
|
config.Endpoint = aws.String(cfg.AWSEndpoint)
|
|
config.DisableSSL = aws.Bool(true)
|
|
config.S3ForcePathStyle = aws.Bool(true)
|
|
|
|
if cfg.AWSSkipSSLValidation {
|
|
tr := &http.Transport{
|
|
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
|
|
}
|
|
client := &http.Client{Transport: tr}
|
|
config.HTTPClient = client
|
|
}
|
|
}
|
|
sess, err := _session.NewSession(config)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("AWS session error: %v", err)
|
|
}
|
|
return &storageImpl{
|
|
uploader: s3manager.NewUploader(sess),
|
|
svc: s3.New(sess), // AWS Docs: "These clients are safe to use concurrently."
|
|
bucket: &cfg.BucketName,
|
|
fileTag: tagging(cfg.UseS3Tags),
|
|
}, nil
|
|
}
|
|
|
|
func (s *storageImpl) Upload(reader io.Reader, key string, contentType string, compression objectstorage.CompressionType) error {
|
|
cacheControl := "max-age=2628000, immutable, private"
|
|
var contentEncoding *string
|
|
switch compression {
|
|
case objectstorage.Gzip:
|
|
encodeStr := "gzip"
|
|
contentEncoding = &encodeStr
|
|
case objectstorage.Brotli:
|
|
encodeStr := "br"
|
|
contentEncoding = &encodeStr
|
|
case objectstorage.Zstd:
|
|
// Have to ignore contentEncoding for Zstd (otherwise will be an error in browser)
|
|
}
|
|
|
|
_, err := s.uploader.Upload(&s3manager.UploadInput{
|
|
Body: reader,
|
|
Bucket: s.bucket,
|
|
Key: &key,
|
|
ContentType: &contentType,
|
|
CacheControl: &cacheControl,
|
|
ContentEncoding: contentEncoding,
|
|
Tagging: s.fileTag,
|
|
})
|
|
return err
|
|
}
|
|
|
|
func (s *storageImpl) Get(key string) (io.ReadCloser, error) {
|
|
out, err := s.svc.GetObject(&s3.GetObjectInput{
|
|
Bucket: s.bucket,
|
|
Key: &key,
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return out.Body, nil
|
|
}
|
|
|
|
func (s *storageImpl) GetAll(key string) ([]io.ReadCloser, error) {
|
|
out, err := s.svc.GetObject(&s3.GetObjectInput{
|
|
Bucket: s.bucket,
|
|
Key: &key,
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return []io.ReadCloser{out.Body}, nil
|
|
}
|
|
|
|
func downloadS3Files(bucket, prefix string) {
|
|
sess := _session.Must(_session.NewSession(&aws.Config{
|
|
Region: aws.String("us-west-1"), // Change this to your region
|
|
}))
|
|
svc := s3.New(sess)
|
|
|
|
resp, err := svc.ListObjects(&s3.ListObjectsInput{Bucket: &bucket, Prefix: &prefix})
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
|
|
for _, item := range resp.Contents {
|
|
file, err := os.Create(*item.Key)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
defer file.Close()
|
|
|
|
downloader := s3manager.NewDownloader(sess)
|
|
_, err = downloader.Download(file,
|
|
&s3.GetObjectInput{
|
|
Bucket: &bucket,
|
|
Key: item.Key,
|
|
})
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (s *storageImpl) Exists(key string) bool {
|
|
_, err := s.svc.HeadObject(&s3.HeadObjectInput{
|
|
Bucket: s.bucket,
|
|
Key: &key,
|
|
})
|
|
if err == nil {
|
|
return true
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (s *storageImpl) GetCreationTime(key string) *time.Time {
|
|
ans, err := s.svc.HeadObject(&s3.HeadObjectInput{
|
|
Bucket: s.bucket,
|
|
Key: &key,
|
|
})
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
return ans.LastModified
|
|
}
|
|
|
|
func (s *storageImpl) GetFrequentlyUsedKeys(projectID uint64) ([]string, error) {
|
|
prefix := strconv.FormatUint(projectID, 10) + "/"
|
|
output, err := s.svc.ListObjectsV2(&s3.ListObjectsV2Input{
|
|
Bucket: s.bucket,
|
|
Prefix: &prefix,
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
//pagination may be here
|
|
|
|
list := output.Contents
|
|
max := len(list)
|
|
if max > MAX_RETURNING_COUNT {
|
|
max = MAX_RETURNING_COUNT
|
|
sort.Slice(list, func(i, j int) bool {
|
|
return list[i].LastModified.After(*(list[j].LastModified))
|
|
})
|
|
}
|
|
|
|
var keyList []string
|
|
st := len(prefix)
|
|
for _, obj := range list[:max] {
|
|
keyList = append(keyList, (*obj.Key)[st:])
|
|
}
|
|
return keyList, nil
|
|
}
|
|
|
|
func (s *storageImpl) GetPreSignedUploadUrl(key string) (string, error) {
|
|
req, _ := s.svc.PutObjectRequest(&s3.PutObjectInput{
|
|
Bucket: aws.String(*s.bucket),
|
|
Key: aws.String(key),
|
|
})
|
|
urlStr, err := req.Presign(15 * time.Minute)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return urlStr, nil
|
|
}
|
|
|
|
func (s *storageImpl) GetPreSignedDownloadUrl(key string) (string, error) {
|
|
req, _ := s.svc.GetObjectRequest(&s3.GetObjectInput{
|
|
Bucket: aws.String(*s.bucket),
|
|
Key: aws.String(key),
|
|
})
|
|
urlStr, err := req.Presign(15 * time.Minute)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return urlStr, nil
|
|
}
|