Skip to content
This repository has been archived by the owner on Oct 9, 2023. It is now read-only.

Commit

Permalink
Support signed URL's from minio. (#17)
Browse files Browse the repository at this point in the history
* Sign on minio

* missing
  • Loading branch information
Ketan Umare committed Oct 18, 2019
1 parent 89fb13e commit e0e88ef
Show file tree
Hide file tree
Showing 5 changed files with 60 additions and 13 deletions.
34 changes: 23 additions & 11 deletions Gopkg.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 3 additions & 0 deletions Gopkg.toml
Original file line number Diff line number Diff line change
Expand Up @@ -116,3 +116,6 @@
go-tests = true
unused-packages = true

[[constraint]]
name = "github.com/graymeta/stow"
revision = "903027f87de7054953efcdb8ba70d5dc02df38c7"
2 changes: 1 addition & 1 deletion flyteadmin_config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ notifications:
http://example.com/projects/{{ project }}/domains/{{ domain }}/executions/{{ name }}</a>. {{ error }}
Logger:
show-source: true
level: 5
level: 6
storage:
type: minio
connection:
Expand Down
33 changes: 32 additions & 1 deletion pkg/data/factory.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,9 @@ import (
"context"
"time"

"github.com/aws/aws-sdk-go/aws/credentials"
"github.com/graymeta/stow"
"github.com/graymeta/stow/s3"
"github.com/lyft/flytestdlib/logger"

"github.com/lyft/flytestdlib/storage"
Expand Down Expand Up @@ -43,7 +46,35 @@ func GetRemoteDataHandler(cfg RemoteDataHandlerConfig) RemoteDataHandler {
remoteURL: implementations.NewAWSRemoteURL(awsConfig, presignedURLDuration),
}
case common.Local:
fallthrough
logger.Infof(context.TODO(), "setting up local signer ----- ")
// Since minio = aws s3, we are creating the same client but using the config primitives from aws
storageCfg := storage.GetConfig()
accessKeyID := ""
secret := ""
endpoint := ""
if storageCfg.Stow != nil {
stowCfg := stow.ConfigMap(storageCfg.Stow.Config)
accessKeyID, _ = stowCfg.Config(s3.ConfigAccessKeyID)
secret, _ = stowCfg.Config(s3.ConfigSecretKey)
endpoint, _ = stowCfg.Config(s3.ConfigEndpoint)
} else {
accessKeyID = storageCfg.Connection.AccessKey
secret = storageCfg.Connection.SecretKey
endpoint = storageCfg.Connection.Endpoint.String()
}
logger.Infof(context.TODO(), "setting up local signer - %s, %s, %s", accessKeyID, secret, endpoint)
creds := credentials.NewStaticCredentials(accessKeyID, secret, "")
awsConfig := aws.NewConfig().
WithRegion(cfg.Region).
WithMaxRetries(cfg.Retries).
WithCredentials(creds).
WithEndpoint(endpoint).
WithDisableSSL(true).
WithS3ForcePathStyle(true)
presignedURLDuration := time.Minute * time.Duration(cfg.SignedURLDurationMinutes)
return &remoteDataHandler{
remoteURL: implementations.NewAWSRemoteURL(awsConfig, presignedURLDuration),
}
default:
logger.Infof(context.Background(),
"Using default noop remote url implementation for cloud provider type [%s]", cfg.CloudProvider)
Expand Down
1 change: 1 addition & 0 deletions pkg/data/implementations/aws_remote_url.go
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,7 @@ func (a *AWSRemoteURL) splitURI(ctx context.Context, uri string) (AWSS3Object, e
}

func (a *AWSRemoteURL) Get(ctx context.Context, uri string) (admin.UrlBlob, error) {
logger.Debugf(ctx, "Getting signed url for - %s", uri)
s3URI, err := a.splitURI(ctx, uri)
if err != nil {
logger.Debugf(ctx, "failed to extract s3 bucket and key from uri: %s", uri)
Expand Down

0 comments on commit e0e88ef

Please sign in to comment.