in core/src/services/oss/backend.rs [322:511]
fn build(self) -> Result<impl Access> {
debug!("backend build started: {:?}", &self);
let root = normalize_root(&self.config.root.clone().unwrap_or_default());
debug!("backend use root {}", &root);
// Handle endpoint, region and bucket name.
let bucket = match self.config.bucket.is_empty() {
false => Ok(&self.config.bucket),
true => Err(
Error::new(ErrorKind::ConfigInvalid, "The bucket is misconfigured")
.with_context("service", Scheme::Oss),
),
}?;
// Retrieve endpoint and host by parsing the endpoint option and bucket. If presign_endpoint is not
// set, take endpoint as default presign_endpoint.
let (endpoint, host) = self.parse_endpoint(&self.config.endpoint, bucket)?;
debug!("backend use bucket {}, endpoint: {}", &bucket, &endpoint);
let presign_endpoint = if self.config.presign_endpoint.is_some() {
self.parse_endpoint(&self.config.presign_endpoint, bucket)?
.0
} else {
endpoint.clone()
};
debug!("backend use presign_endpoint: {}", &presign_endpoint);
let server_side_encryption = match &self.config.server_side_encryption {
None => None,
Some(v) => Some(
build_header_value(v)
.map_err(|err| err.with_context("key", "server_side_encryption"))?,
),
};
let server_side_encryption_key_id = match &self.config.server_side_encryption_key_id {
None => None,
Some(v) => Some(
build_header_value(v)
.map_err(|err| err.with_context("key", "server_side_encryption_key_id"))?,
),
};
let mut cfg = AliyunConfig::default();
// Load cfg from env first.
cfg = cfg.from_env();
if let Some(v) = self.config.access_key_id {
cfg.access_key_id = Some(v);
}
if let Some(v) = self.config.access_key_secret {
cfg.access_key_secret = Some(v);
}
if let Some(v) = self.config.role_arn {
cfg.role_arn = Some(v);
}
// override default role_session_name if set
if let Some(v) = self.config.role_session_name {
cfg.role_session_name = v;
}
if let Some(v) = self.config.oidc_provider_arn {
cfg.oidc_provider_arn = Some(v);
}
if let Some(v) = self.config.oidc_token_file {
cfg.oidc_token_file = Some(v);
}
if let Some(v) = self.config.sts_endpoint {
cfg.sts_endpoint = Some(v);
}
let loader = AliyunLoader::new(GLOBAL_REQWEST_CLIENT.clone(), cfg);
let signer = AliyunOssSigner::new(bucket);
let delete_max_size = self
.config
.delete_max_size
.unwrap_or(DEFAULT_BATCH_MAX_OPERATIONS);
Ok(OssBackend {
core: Arc::new(OssCore {
info: {
let am = AccessorInfo::default();
am.set_scheme(Scheme::Oss)
.set_root(&root)
.set_name(bucket)
.set_native_capability(Capability {
stat: true,
stat_with_if_match: true,
stat_with_if_none_match: true,
stat_has_cache_control: true,
stat_has_content_length: true,
stat_has_content_type: true,
stat_has_content_encoding: true,
stat_has_content_range: true,
stat_with_version: self.config.enable_versioning,
stat_has_etag: true,
stat_has_content_md5: true,
stat_has_last_modified: true,
stat_has_content_disposition: true,
stat_has_user_metadata: true,
stat_has_version: true,
read: true,
read_with_if_match: true,
read_with_if_none_match: true,
read_with_version: self.config.enable_versioning,
read_with_if_modified_since: true,
read_with_if_unmodified_since: true,
write: true,
write_can_empty: true,
write_can_append: true,
write_can_multi: true,
write_with_cache_control: true,
write_with_content_type: true,
write_with_content_disposition: true,
// TODO: set this to false while version has been enabled.
write_with_if_not_exists: !self.config.enable_versioning,
// The min multipart size of OSS is 100 KiB.
//
// ref: <https://www.alibabacloud.com/help/en/oss/user-guide/multipart-upload-12>
write_multi_min_size: Some(100 * 1024),
// The max multipart size of OSS is 5 GiB.
//
// ref: <https://www.alibabacloud.com/help/en/oss/user-guide/multipart-upload-12>
write_multi_max_size: if cfg!(target_pointer_width = "64") {
Some(5 * 1024 * 1024 * 1024)
} else {
Some(usize::MAX)
},
write_with_user_metadata: true,
delete: true,
delete_with_version: self.config.enable_versioning,
delete_max_size: Some(delete_max_size),
copy: true,
list: true,
list_with_limit: true,
list_with_start_after: true,
list_with_recursive: true,
list_has_etag: true,
list_has_content_md5: true,
list_with_versions: self.config.enable_versioning,
list_with_deleted: self.config.enable_versioning,
list_has_content_length: true,
list_has_last_modified: true,
presign: true,
presign_stat: true,
presign_read: true,
presign_write: true,
shared: true,
..Default::default()
});
// allow deprecated api here for compatibility
#[allow(deprecated)]
if let Some(client) = self.http_client {
am.update_http_client(|_| client);
}
am.into()
},
root,
bucket: bucket.to_owned(),
endpoint,
host,
presign_endpoint,
allow_anonymous: self.config.allow_anonymous,
signer,
loader,
server_side_encryption,
server_side_encryption_key_id,
}),
})
}