in core/src/services/gcs/backend.rs [240:401]
fn build(self) -> Result<impl Access> {
debug!("backend build started: {:?}", self);
let root = normalize_root(&self.config.root.unwrap_or_default());
debug!("backend use root {}", root);
// Handle endpoint and bucket name
let bucket = match self.config.bucket.is_empty() {
false => Ok(&self.config.bucket),
true => Err(
Error::new(ErrorKind::ConfigInvalid, "The bucket is misconfigured")
.with_operation("Builder::build")
.with_context("service", Scheme::Gcs),
),
}?;
// TODO: server side encryption
let endpoint = self
.config
.endpoint
.clone()
.unwrap_or_else(|| DEFAULT_GCS_ENDPOINT.to_string());
debug!("backend use endpoint: {endpoint}");
let mut cred_loader = GoogleCredentialLoader::default();
if let Some(cred) = &self.config.credential {
cred_loader = cred_loader.with_content(cred);
}
if let Some(cred) = &self.config.credential_path {
cred_loader = cred_loader.with_path(cred);
}
#[cfg(target_arch = "wasm32")]
{
cred_loader = cred_loader.with_disable_env();
cred_loader = cred_loader.with_disable_well_known_location();
}
if self.config.disable_config_load {
cred_loader = cred_loader
.with_disable_env()
.with_disable_well_known_location();
}
let scope = if let Some(scope) = &self.config.scope {
scope
} else {
DEFAULT_GCS_SCOPE
};
let mut token_loader = GoogleTokenLoader::new(scope, GLOBAL_REQWEST_CLIENT.clone());
if let Some(account) = &self.config.service_account {
token_loader = token_loader.with_service_account(account);
}
if let Ok(Some(cred)) = cred_loader.load() {
token_loader = token_loader.with_credentials(cred)
}
if let Some(loader) = self.customized_token_loader {
token_loader = token_loader.with_customized_token_loader(loader)
}
if self.config.disable_vm_metadata {
token_loader = token_loader.with_disable_vm_metadata(true);
}
let signer = GoogleSigner::new("storage");
let backend = GcsBackend {
core: Arc::new(GcsCore {
info: {
let am = AccessorInfo::default();
am.set_scheme(Scheme::Gcs)
.set_root(&root)
.set_name(bucket)
.set_native_capability(Capability {
stat: true,
stat_with_if_match: true,
stat_with_if_none_match: true,
stat_has_etag: true,
stat_has_content_md5: true,
stat_has_content_length: true,
stat_has_content_type: true,
stat_has_content_encoding: true,
stat_has_last_modified: true,
stat_has_user_metadata: true,
stat_has_cache_control: true,
read: true,
read_with_if_match: true,
read_with_if_none_match: true,
write: true,
write_can_empty: true,
write_can_multi: true,
write_with_cache_control: true,
write_with_content_type: true,
write_with_content_encoding: true,
write_with_user_metadata: true,
write_with_if_not_exists: true,
// The min multipart size of Gcs is 5 MiB.
//
// ref: <https://cloud.google.com/storage/docs/xml-api/put-object-multipart>
write_multi_min_size: Some(5 * 1024 * 1024),
// The max multipart size of Gcs is 5 GiB.
//
// ref: <https://cloud.google.com/storage/docs/xml-api/put-object-multipart>
write_multi_max_size: if cfg!(target_pointer_width = "64") {
Some(5 * 1024 * 1024 * 1024)
} else {
Some(usize::MAX)
},
delete: true,
delete_max_size: Some(100),
copy: true,
list: true,
list_with_limit: true,
list_with_start_after: true,
list_with_recursive: true,
list_has_etag: true,
list_has_content_md5: true,
list_has_content_length: true,
list_has_content_type: true,
list_has_last_modified: true,
presign: true,
presign_stat: true,
presign_read: true,
presign_write: true,
shared: true,
..Default::default()
});
// allow deprecated api here for compatibility
#[allow(deprecated)]
if let Some(client) = self.http_client {
am.update_http_client(|_| client);
}
am.into()
},
endpoint,
bucket: bucket.to_string(),
root,
signer,
token_loader,
token: self.config.token,
scope: scope.to_string(),
credential_loader: cred_loader,
predefined_acl: self.config.predefined_acl.clone(),
default_storage_class: self.config.default_storage_class.clone(),
allow_anonymous: self.config.allow_anonymous,
}),
};
Ok(backend)
}