k8s-csi-s3/pkg/mounter/rclone.go

60 lines
1.3 KiB
Go
Raw Normal View History

package mounter
2019-03-07 19:27:02 +00:00
import (
"fmt"
"os"
"path"
"github.com/ctrox/csi-s3/pkg/s3"
2019-03-07 19:27:02 +00:00
)
// Implements Mounter
type rcloneMounter struct {
meta *s3.FSMeta
2019-03-07 19:27:02 +00:00
url string
region string
accessKeyID string
secretAccessKey string
}
const (
rcloneCmd = "rclone"
)
func newRcloneMounter(meta *s3.FSMeta, cfg *s3.Config) (Mounter, error) {
2019-03-07 19:27:02 +00:00
return &rcloneMounter{
meta: meta,
2019-03-07 19:27:02 +00:00
url: cfg.Endpoint,
region: cfg.Region,
accessKeyID: cfg.AccessKeyID,
secretAccessKey: cfg.SecretAccessKey,
}, nil
}
func (rclone *rcloneMounter) Stage(stageTarget string) error {
return nil
}
func (rclone *rcloneMounter) Unstage(stageTarget string) error {
return nil
}
func (rclone *rcloneMounter) Mount(source string, target string) error {
args := []string{
"mount",
fmt.Sprintf(":s3:%s", path.Join(rclone.meta.BucketName, rclone.meta.Prefix, rclone.meta.FSPath)),
2019-03-07 19:27:02 +00:00
fmt.Sprintf("%s", target),
"--daemon",
"--s3-provider=AWS",
"--s3-env-auth=true",
fmt.Sprintf("--s3-region=%s", rclone.region),
fmt.Sprintf("--s3-endpoint=%s", rclone.url),
"--allow-other",
// TODO: make this configurable
"--vfs-cache-mode=writes",
}
os.Setenv("AWS_ACCESS_KEY_ID", rclone.accessKeyID)
os.Setenv("AWS_SECRET_ACCESS_KEY", rclone.secretAccessKey)
return fuseMount(target, rcloneCmd, args)
}