2016-01-17 14:30:19 +00:00
|
|
|
// Package s3store provides a storage backend using AWS S3 or compatible servers.
|
|
|
|
//
|
|
|
|
// Configuration
|
|
|
|
//
|
|
|
|
// In order to allow this backend to function properly, the user accessing the
|
|
|
|
// bucket must have at least following AWS IAM policy permissions for the
|
|
|
|
// bucket and all of its subresources:
|
|
|
|
// s3:AbortMultipartUpload
|
|
|
|
// s3:DeleteObject
|
|
|
|
// s3:GetObject
|
|
|
|
// s3:ListMultipartUploadParts
|
|
|
|
// s3:PutObject
|
|
|
|
//
|
|
|
|
// While this package uses the official AWS SDK for Go, S3Store is able
|
|
|
|
// to work with any S3-compatible service such as Riak CS. In order to change
|
|
|
|
// the HTTP endpoint used for sending requests to, consult the AWS Go SDK
|
|
|
|
// (http://docs.aws.amazon.com/sdk-for-go/api/aws/Config.html#WithEndpoint-instance_method).
|
|
|
|
//
|
|
|
|
// Implementation
|
|
|
|
//
|
|
|
|
// Once a new tus upload is initiated, multiple objects in S3 are created:
|
|
|
|
//
|
|
|
|
// First of all, a new info object is stored which contains a JSON-encoded blob
|
|
|
|
// of general information about the upload including its size and meta data.
|
|
|
|
// This kind of objects have the suffix ".info" in their key.
|
|
|
|
//
|
|
|
|
// In addition a new multipart upload
|
|
|
|
// (http://docs.aws.amazon.com/AmazonS3/latest/dev/uploadobjusingmpu.html) is
|
|
|
|
// created. Whenever a new chunk is uploaded to tusd using a PATCH request, a
|
|
|
|
// new part is pushed to the multipart upload on S3.
|
|
|
|
//
|
2016-01-19 20:39:24 +00:00
|
|
|
// If meta data is associated with the upload during creation, it will be added
|
|
|
|
// to the multipart upload and after finishing it, the meta data will be passed
|
|
|
|
// to the final object.
|
|
|
|
//
|
2016-01-17 14:30:19 +00:00
|
|
|
// Once the upload is finish, the multipart upload is completed, resulting in
|
|
|
|
// the entire file being stored in the bucket. The info object, containing
|
|
|
|
// meta data is not deleted. It is recommended to copy the finished upload to
|
|
|
|
// another bucket to avoid it being deleted by the Termination extension.
|
|
|
|
//
|
|
|
|
// If an upload is about to being terminated, the multipart upload is aborted
|
|
|
|
// which removes all of the uploaded parts from the bucket. In addition, the
|
|
|
|
// info object is also deleted. If the upload has been finished already, the
|
|
|
|
// finished object containing the entire upload is also removed.
|
|
|
|
//
|
|
|
|
// Considerations
|
|
|
|
//
|
|
|
|
// In order to support tus' principle of resumable upload, S3's Multipart-Uploads
|
|
|
|
// are internally used.
|
|
|
|
// For each incoming PATCH request (a call to WriteChunk), a new part is uploaded
|
|
|
|
// to S3. However, each part of a multipart upload, except the last one, must
|
|
|
|
// be 5MB or bigger. This introduces a problem, since in tus' perspective
|
|
|
|
// it's totally fine to upload just a few kilobytes in a single request.
|
|
|
|
//
|
|
|
|
// Therefore, a few special condition have been implemented:
|
|
|
|
//
|
|
|
|
// Each PATCH request must contain a body of, at least, 5MB. If the size
|
|
|
|
// is smaller than this limit, the entire request will be dropped and not
|
|
|
|
// even passed to the storage server. If your server supports a different
|
|
|
|
// limit, you can adjust this value using S3Store.MinPartSize.
|
|
|
|
//
|
|
|
|
// When receiving a PATCH request, its body will be temporarily stored on disk.
|
|
|
|
// This requirement has been made to ensure the minimum size of a single part
|
|
|
|
// and to allow the calculating of a checksum. Once the part has been uploaded
|
|
|
|
// to S3, the temporary file will be removed immediately. Therefore, please
|
|
|
|
// ensure that the server running this storage backend has enough disk space
|
|
|
|
// available to hold these caches.
|
|
|
|
//
|
2016-02-03 20:18:21 +00:00
|
|
|
// In addition, it must be mentioned that AWS S3 only offers eventual
|
2016-02-11 11:23:46 +00:00
|
|
|
// consistency (https://docs.aws.amazon.com/AmazonS3/latest/dev/Introduction.html#ConsistencyModel).
|
2016-01-17 14:30:19 +00:00
|
|
|
// Therefore, it is required to build additional measurements in order to
|
|
|
|
// prevent concurrent access to the same upload resources which may result in
|
|
|
|
// data corruption. See tusd.LockerDataStore for more information.
|
2015-12-08 21:26:37 +00:00
|
|
|
package s3store
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
2016-01-16 15:12:37 +00:00
|
|
|
"fmt"
|
2015-12-08 21:26:37 +00:00
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"strings"
|
2016-01-16 15:12:37 +00:00
|
|
|
"sync"
|
2015-12-08 21:26:37 +00:00
|
|
|
|
|
|
|
"github.com/tus/tusd"
|
|
|
|
"github.com/tus/tusd/uid"
|
|
|
|
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/awserr"
|
|
|
|
"github.com/aws/aws-sdk-go/service/s3"
|
2016-01-05 17:21:53 +00:00
|
|
|
"github.com/aws/aws-sdk-go/service/s3/s3iface"
|
2015-12-08 21:26:37 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// See the tusd.DataStore interface for documentation about the different
|
|
|
|
// methods.
|
|
|
|
type S3Store struct {
|
2016-01-17 14:30:19 +00:00
|
|
|
// Bucket used to store the data in, e.g. "tusdstore.example.com"
|
|
|
|
Bucket string
|
|
|
|
// Service specifies an interface used to communicate with the S3 backend.
|
|
|
|
// Usually, this is an instance of github.com/aws/aws-sdk-go/service/s3.S3
|
|
|
|
// (http://docs.aws.amazon.com/sdk-for-go/api/service/s3/S3.html).
|
|
|
|
Service s3iface.S3API
|
|
|
|
// MaxPartSize specifies the maximum size of a single part uploaded to S3
|
|
|
|
// in bytes. This value must be bigger than MinPartSize! In order to
|
|
|
|
// choose the correct number, two things have to be kept in mind:
|
|
|
|
//
|
|
|
|
// If this value is too big and uploading the part to S3 is interrupted
|
|
|
|
// expectedly, the entire part is discarded and the end user is required
|
|
|
|
// to resume the upload and re-upload the entire big part. In addition, the
|
|
|
|
// entire part must be written to disk before submitting to S3.
|
|
|
|
//
|
|
|
|
// If this value is too low, a lot of requests to S3 may be made, depending
|
|
|
|
// on how fast data is coming in. This may result in an eventual overhead.
|
2015-12-08 21:26:37 +00:00
|
|
|
MaxPartSize int64
|
2016-01-17 14:30:19 +00:00
|
|
|
// MinPartSize specifies the minimum size of a single part uploaded to S3
|
|
|
|
// in bytes. This number needs to match with the underlying S3 backend or else
|
|
|
|
// uploaded parts will be reject. AWS S3, for example, uses 5MB for this value.
|
2016-01-05 17:21:53 +00:00
|
|
|
MinPartSize int64
|
2015-12-08 21:26:37 +00:00
|
|
|
}
|
|
|
|
|
2016-01-17 14:30:19 +00:00
|
|
|
// New constructs a new storage using the supplied bucket and service object.
|
|
|
|
// The MaxPartSize and MinPartSize properties are set to 6 and 5MB.
|
|
|
|
func New(bucket string, service s3iface.S3API) S3Store {
|
|
|
|
return S3Store{
|
2015-12-08 21:26:37 +00:00
|
|
|
Bucket: bucket,
|
|
|
|
Service: service,
|
|
|
|
MaxPartSize: 6 * 1024 * 1024,
|
2016-01-05 17:21:53 +00:00
|
|
|
MinPartSize: 5 * 1024 * 1024,
|
2015-12-08 21:26:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-11 19:17:43 +00:00
|
|
|
// UseIn sets this store as the core data store in the passed composer and adds
|
|
|
|
// all possible extension to it.
|
2016-02-21 22:25:35 +00:00
|
|
|
func (store S3Store) UseIn(composer *tusd.StoreComposer) {
|
|
|
|
composer.UseCore(store)
|
|
|
|
composer.UseTerminater(store)
|
|
|
|
composer.UseFinisher(store)
|
|
|
|
composer.UseGetReader(store)
|
|
|
|
composer.UseConcater(store)
|
|
|
|
}
|
|
|
|
|
2015-12-08 21:26:37 +00:00
|
|
|
func (store S3Store) NewUpload(info tusd.FileInfo) (id string, err error) {
|
2016-01-05 17:21:53 +00:00
|
|
|
var uploadId string
|
|
|
|
if info.ID == "" {
|
|
|
|
uploadId = uid.Uid()
|
|
|
|
} else {
|
|
|
|
uploadId = info.ID
|
|
|
|
}
|
2015-12-08 21:26:37 +00:00
|
|
|
|
|
|
|
infoJson, err := json.Marshal(info)
|
|
|
|
if err != nil {
|
2016-01-05 17:21:53 +00:00
|
|
|
return "", err
|
2015-12-08 21:26:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create object on S3 containing information about the file
|
|
|
|
_, err = store.Service.PutObject(&s3.PutObjectInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId + ".info"),
|
|
|
|
Body: bytes.NewReader(infoJson),
|
|
|
|
ContentLength: aws.Int64(int64(len(infoJson))),
|
|
|
|
})
|
|
|
|
if err != nil {
|
2016-01-05 17:21:53 +00:00
|
|
|
return "", err
|
2015-12-08 21:26:37 +00:00
|
|
|
}
|
|
|
|
|
2016-01-19 20:39:24 +00:00
|
|
|
// Convert meta data into a map of pointers for AWS Go SDK, sigh.
|
|
|
|
metadata := make(map[string]*string, len(info.MetaData))
|
|
|
|
for key, value := range info.MetaData {
|
|
|
|
// Copying the value is required in order to prevent it from being
|
|
|
|
// overwritten by the next iteration.
|
|
|
|
v := value
|
|
|
|
metadata[key] = &v
|
|
|
|
}
|
|
|
|
|
2015-12-08 21:26:37 +00:00
|
|
|
// Create the actual multipart upload
|
|
|
|
res, err := store.Service.CreateMultipartUpload(&s3.CreateMultipartUploadInput{
|
2016-01-19 20:39:24 +00:00
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
Metadata: metadata,
|
2015-12-08 21:26:37 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
2016-01-05 17:21:53 +00:00
|
|
|
return "", err
|
2015-12-08 21:26:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
id = uploadId + "+" + *res.UploadId
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (store S3Store) WriteChunk(id string, offset int64, src io.Reader) (int64, error) {
|
|
|
|
uploadId, multipartId := splitIds(id)
|
|
|
|
|
|
|
|
// Get the total size of the current upload
|
|
|
|
info, err := store.GetInfo(id)
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
size := info.Size
|
|
|
|
bytesUploaded := int64(0)
|
|
|
|
|
|
|
|
// Get number of parts to generate next number
|
|
|
|
listPtr, err := store.Service.ListParts(&s3.ListPartsInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
UploadId: aws.String(multipartId),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
list := *listPtr
|
|
|
|
numParts := len(list.Parts)
|
|
|
|
nextPartNum := int64(numParts + 1)
|
|
|
|
|
|
|
|
for {
|
|
|
|
// Create a temporary file to store the part in it
|
|
|
|
file, err := ioutil.TempFile("", "tusd-s3-tmp-")
|
|
|
|
if err != nil {
|
|
|
|
return bytesUploaded, err
|
|
|
|
}
|
|
|
|
defer os.Remove(file.Name())
|
|
|
|
defer file.Close()
|
|
|
|
|
|
|
|
limitedReader := io.LimitReader(src, store.MaxPartSize)
|
|
|
|
n, err := io.Copy(file, limitedReader)
|
|
|
|
if err != nil && err != io.EOF {
|
|
|
|
return bytesUploaded, err
|
|
|
|
}
|
|
|
|
|
2016-01-05 17:21:53 +00:00
|
|
|
if (size - offset) <= store.MinPartSize {
|
2015-12-08 21:26:37 +00:00
|
|
|
if (size - offset) != n {
|
|
|
|
return bytesUploaded, nil
|
|
|
|
}
|
2016-01-05 17:21:53 +00:00
|
|
|
} else if n < store.MinPartSize {
|
2015-12-08 21:26:37 +00:00
|
|
|
return bytesUploaded, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Seek to the beginning of the file
|
|
|
|
file.Seek(0, 0)
|
|
|
|
|
|
|
|
_, err = store.Service.UploadPart(&s3.UploadPartInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
UploadId: aws.String(multipartId),
|
|
|
|
PartNumber: aws.Int64(nextPartNum),
|
|
|
|
Body: file,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return bytesUploaded, err
|
|
|
|
}
|
|
|
|
|
|
|
|
offset += bytesUploaded
|
|
|
|
bytesUploaded += n
|
|
|
|
nextPartNum += 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (store S3Store) GetInfo(id string) (info tusd.FileInfo, err error) {
|
|
|
|
uploadId, multipartId := splitIds(id)
|
|
|
|
|
|
|
|
// Get file info stored in seperate object
|
|
|
|
res, err := store.Service.GetObject(&s3.GetObjectInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId + ".info"),
|
|
|
|
})
|
|
|
|
if err != nil {
|
2016-01-12 21:21:05 +00:00
|
|
|
if isAwsError(err, "NoSuchKey") {
|
2015-12-08 21:26:37 +00:00
|
|
|
return info, tusd.ErrNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
return info, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := json.NewDecoder(res.Body).Decode(&info); err != nil {
|
|
|
|
return info, err
|
|
|
|
}
|
|
|
|
|
2016-03-26 17:23:37 +00:00
|
|
|
// The JSON object stored on S3 does not contain the proper upload ID because
|
|
|
|
// the ID has constructed after the storing happened. Therefore we set it
|
|
|
|
// manually.
|
|
|
|
info.ID = id
|
|
|
|
|
2015-12-08 21:26:37 +00:00
|
|
|
// Get uploaded parts and their offset
|
|
|
|
listPtr, err := store.Service.ListParts(&s3.ListPartsInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
UploadId: aws.String(multipartId),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
// Check if the error is caused by the upload not being found. This happens
|
|
|
|
// when the multipart upload has already been completed or aborted. Since
|
|
|
|
// we already found the info object, we know that the upload has been
|
|
|
|
// completed and therefore can ensure the the offset is the size.
|
2016-01-12 21:21:05 +00:00
|
|
|
if isAwsError(err, "NoSuchUpload") {
|
2015-12-08 21:26:37 +00:00
|
|
|
info.Offset = info.Size
|
|
|
|
return info, nil
|
|
|
|
} else {
|
|
|
|
return info, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
list := *listPtr
|
|
|
|
|
|
|
|
offset := int64(0)
|
|
|
|
|
|
|
|
for _, part := range list.Parts {
|
|
|
|
offset += *part.Size
|
|
|
|
}
|
|
|
|
|
|
|
|
info.Offset = offset
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (store S3Store) GetReader(id string) (io.Reader, error) {
|
|
|
|
uploadId, multipartId := splitIds(id)
|
|
|
|
|
2016-01-12 21:21:05 +00:00
|
|
|
// Attempt to get upload content
|
2015-12-08 21:26:37 +00:00
|
|
|
res, err := store.Service.GetObject(&s3.GetObjectInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
})
|
|
|
|
if err == nil {
|
|
|
|
// No error occured, and we are able to stream the object
|
|
|
|
return res.Body, nil
|
|
|
|
}
|
|
|
|
|
2016-01-12 21:21:05 +00:00
|
|
|
// If the file cannot be found, we ignore this error and continue since the
|
|
|
|
// upload may not have been finished yet. In this case we do not want to
|
|
|
|
// return a ErrNotFound but a more meaning-full message.
|
|
|
|
if !isAwsError(err, "NoSuchKey") {
|
2015-12-08 21:26:37 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test whether the multipart upload exists to find out if the upload
|
|
|
|
// never existsted or just has not been finished yet
|
2016-01-05 17:21:53 +00:00
|
|
|
_, err = store.Service.ListParts(&s3.ListPartsInput{
|
2015-12-08 21:26:37 +00:00
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
UploadId: aws.String(multipartId),
|
|
|
|
MaxParts: aws.Int64(0),
|
|
|
|
})
|
|
|
|
if err == nil {
|
|
|
|
// The multipart upload still exists, which means we cannot download it yet
|
|
|
|
return nil, errors.New("cannot stream non-finished upload")
|
|
|
|
}
|
|
|
|
|
2016-01-12 21:21:05 +00:00
|
|
|
if isAwsError(err, "NoSuchUpload") {
|
2015-12-08 21:26:37 +00:00
|
|
|
// Neither the object nor the multipart upload exists, so we return a 404
|
|
|
|
return nil, tusd.ErrNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (store S3Store) Terminate(id string) error {
|
|
|
|
uploadId, multipartId := splitIds(id)
|
2016-01-16 15:12:37 +00:00
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(2)
|
|
|
|
errs := make([]error, 0, 3)
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
// Abort the multipart upload
|
|
|
|
_, err := store.Service.AbortMultipartUpload(&s3.AbortMultipartUploadInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
UploadId: aws.String(multipartId),
|
|
|
|
})
|
|
|
|
if err != nil && !isAwsError(err, "NoSuchUpload") {
|
|
|
|
errs = append(errs, err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
// Delete the info and content file
|
|
|
|
res, err := store.Service.DeleteObjects(&s3.DeleteObjectsInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Delete: &s3.Delete{
|
|
|
|
Objects: []*s3.ObjectIdentifier{
|
|
|
|
{
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Key: aws.String(uploadId + ".info"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Quiet: aws.Bool(true),
|
|
|
|
},
|
|
|
|
})
|
2015-12-08 21:26:37 +00:00
|
|
|
|
2016-01-16 15:12:37 +00:00
|
|
|
if err != nil {
|
|
|
|
errs = append(errs, err)
|
|
|
|
return
|
2015-12-08 21:26:37 +00:00
|
|
|
}
|
|
|
|
|
2016-01-16 15:12:37 +00:00
|
|
|
for _, s3Err := range res.Errors {
|
|
|
|
if *s3Err.Code != "NoSuchKey" {
|
|
|
|
errs = append(errs, fmt.Errorf("AWS S3 Error (%s) for object %s: %s", *s3Err.Code, *s3Err.Key, *s3Err.Message))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
wg.Wait()
|
2015-12-08 21:26:37 +00:00
|
|
|
|
2016-01-16 15:12:37 +00:00
|
|
|
if len(errs) > 0 {
|
2016-02-03 20:18:21 +00:00
|
|
|
return newMultiError(errs)
|
2016-01-16 15:12:37 +00:00
|
|
|
}
|
2015-12-08 21:26:37 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (store S3Store) FinishUpload(id string) error {
|
|
|
|
uploadId, multipartId := splitIds(id)
|
|
|
|
|
|
|
|
// Get uploaded parts
|
|
|
|
listPtr, err := store.Service.ListParts(&s3.ListPartsInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
UploadId: aws.String(multipartId),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Transform the []*s3.Part slice to a []*s3.CompletedPart slice for the next
|
|
|
|
// request.
|
|
|
|
list := *listPtr
|
|
|
|
parts := make([]*s3.CompletedPart, len(list.Parts))
|
|
|
|
|
|
|
|
for index, part := range list.Parts {
|
|
|
|
parts[index] = &s3.CompletedPart{
|
|
|
|
ETag: part.ETag,
|
|
|
|
PartNumber: part.PartNumber,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = store.Service.CompleteMultipartUpload(&s3.CompleteMultipartUploadInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
UploadId: aws.String(multipartId),
|
|
|
|
MultipartUpload: &s3.CompletedMultipartUpload{
|
|
|
|
Parts: parts,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-02-03 20:18:21 +00:00
|
|
|
func (store S3Store) ConcatUploads(dest string, partialUploads []string) error {
|
|
|
|
uploadId, multipartId := splitIds(dest)
|
|
|
|
|
|
|
|
numPartialUploads := len(partialUploads)
|
|
|
|
errs := make([]error, 0, numPartialUploads)
|
|
|
|
|
|
|
|
// Copy partial uploads concurrently
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(numPartialUploads)
|
|
|
|
for i, partialId := range partialUploads {
|
|
|
|
go func(i int, partialId string) {
|
|
|
|
defer wg.Done()
|
|
|
|
|
|
|
|
partialUploadId, _ := splitIds(partialId)
|
|
|
|
|
|
|
|
_, err := store.Service.UploadPartCopy(&s3.UploadPartCopyInput{
|
|
|
|
Bucket: aws.String(store.Bucket),
|
|
|
|
Key: aws.String(uploadId),
|
|
|
|
UploadId: aws.String(multipartId),
|
|
|
|
// Part numbers must be in the range of 1 to 10000, inclusive. Since
|
|
|
|
// slice indexes start at 0, we add 1 to ensure that i >= 1.
|
|
|
|
PartNumber: aws.Int64(int64(i + 1)),
|
|
|
|
CopySource: aws.String(store.Bucket + "/" + partialUploadId),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
errs = append(errs, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}(i, partialId)
|
|
|
|
}
|
|
|
|
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
if len(errs) > 0 {
|
|
|
|
return newMultiError(errs)
|
|
|
|
}
|
|
|
|
|
|
|
|
return store.FinishUpload(dest)
|
|
|
|
}
|
|
|
|
|
2015-12-08 21:26:37 +00:00
|
|
|
func splitIds(id string) (uploadId, multipartId string) {
|
|
|
|
index := strings.Index(id, "+")
|
|
|
|
if index == -1 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
uploadId = id[:index]
|
|
|
|
multipartId = id[index+1:]
|
|
|
|
return
|
|
|
|
}
|
2016-01-12 21:21:05 +00:00
|
|
|
|
|
|
|
// isAwsError tests whether an error object is an instance of the AWS error
|
|
|
|
// specified by its code.
|
|
|
|
func isAwsError(err error, code string) bool {
|
|
|
|
if err, ok := err.(awserr.Error); ok && err.Code() == code {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|