鉴于以上,公司要求将bucket设置为私有,只有授权的用户才能访问
开通OSS后账户,创建RAM账户,使用STS临时访问凭证访问OSS,具体参考阿里云文档
提示:在步骤四创建角色要将RAM角色赋予 AliyunOSSFullAccess 权限 ,
因为此处没设置oss最高权限,我找了一天问题,大家谨记,写这篇博客也是记录一下我的填坑之路
在对象存储中,Bucket列表创建私有Bucket
然后在此Bucket授权刚才创建OSS账号id,授权操作为完全控制
const ( AccessKeyId = "**"//oss账户AK AccessKeySecret = "**"//oss账户ST stsEndpoint = "**"//sts.阿里云对象存储地址 RoleArn = "**"//创建角色用到的 RoleSessionName = "**"//创建角色用到的 BucketName = "**" //填写Bucket名称,例如examplebucket Endpoint = "**"//阿里云对象存储地址 UploadOssUrl = "**" //返回给前端oss上传地址 ) type StsTokenInfo struct { StatusCode int `json:"StatusCode"` AccessKeyId string `json:"AccessKeyId"` AccessKeySecret string `json:"AccessKeySecret"` SecurityToken string `json:"SecurityToken"` Expiration string `json:"Expiration"` } type StsErrorInfo struct { StatusCode int `json:"StatusCode"` ErrorCode string `json:"ErrorCode"` ErrorMessage string `json:"ErrorMessage"` }
package aliyun import ( "fmt" openapi "github.com/alibabacloud-go/darabonba-openapi/client" sts "github.com/alibabacloud-go/sts-20150401/client" "github.com/alibabacloud-go/tea/tea" log "github.com/sirupsen/logrus" ) // // GetAliyunStsInfo // @Description: 获取STS临时用户信息 // @param isReturnAll // @return *sts.AssumeRoleResponseBody // func GetAliyunStsInfo() *sts.AssumeRoleResponseBody { return generateStsInfo() } /** * 生成STS临时用户信息 */ func generateStsInfo() *sts.AssumeRoleResponseBody { client, _err := createClient(tea.String(AccessKeyId), tea.String(AccessKeySecret)) if _err != nil { fmt.Print(_err.Error()) } assumeRoleRequest := &sts.AssumeRoleRequest{ RoleArn: tea.String(RoleArn), RoleSessionName: tea.String(RoleSessionName), } resp, err := client.AssumeRole(assumeRoleRequest) if err != nil { fmt.Print(err.Error()) } fmt.Printf("获取STS临时用户信息:%v", resp) log.Info("获取STS临时用户信息:", resp) return (*resp).Body } /** * 使用AK&SK初始化账号Client * @param accessKeyId * @param accessKeySecret * @return Client * @throws Exception */ func createClient(accessKeyId *string, accessKeySecret *string) (_result *sts.Client, _err error) { config := &openapi.Config{ AccessKeyId: accessKeyId, AccessKeySecret: accessKeySecret, } // 访问的域名 config.Endpoint = tea.String(stsEndpoint) _result = &sts.Client{} _result, _err = sts.NewClient(config) return _result, _err }
/** 接口:获取sts用户 前端需要加载oss插件 不需要则去调用policy文件中AppAliyunPolicy */ func AppAliyunSts(c *gin.Context) { response := GetAliyunStsInfo() c.JSON(http.StatusOK, gin.H{ "code": 1, "data": response, }) return }
package aliyun import ( "crypto/hmac" "crypto/sha1" "encoding/base64" "encoding/json" "fmt" "github.com/gin-gonic/gin" log "github.com/sirupsen/logrus" "hash" "io" "net/http" "time" ) /** 签名直传服务 用于小程序上传图片不用加载库 */ // 用户上传文件时指定的前缀。 //var upload_dir string = "user-dir/" //过期时间3000秒 var expire_time int64 = 3000 type ConfigStruct struct { Expiration string `json:"expiration"` Conditions [][]string `json:"conditions"` } type PolicyToken struct { StsTokenInfo Expire int64 `json:"expire"` Signature string `json:"signature"` Policy string `json:"policy"` Directory string `json:"dir"` UploadOssUrl string `json:"uploadOssUrl"` } func AppAliyunPolicy(c *gin.Context) { uploadDir := c.DefaultQuery("dir", "user-dir/") //获取token2中的accessKeyId,accessKeySecret resp := GetAliyunStsInfo() log.Info(resp) now := time.Now().Unix() expire_end := now + expire_time var tokenExpire = getGmtIso8601(expire_end) //create post policy json var config ConfigStruct config.Expiration = tokenExpire var condition []string condition = append(condition, "starts-with") condition = append(condition, "$key") condition = append(condition, uploadDir) config.Conditions = append(config.Conditions, condition) //calucate signature result, err := json.Marshal(config) debyte := base64.StdEncoding.EncodeToString(result) h := hmac.New(func() hash.Hash { return sha1.New() }, []byte(*resp.Credentials.AccessKeySecret)) io.WriteString(h, debyte) signedStr := base64.StdEncoding.EncodeToString(h.Sum(nil)) policyToken := &PolicyToken{} policyToken.AccessKeyId = *resp.Credentials.AccessKeyId policyToken.AccessKeySecret = *resp.Credentials.AccessKeySecret policyToken.SecurityToken = *resp.Credentials.SecurityToken policyToken.Expiration = *resp.Credentials.Expiration policyToken.Expire = expire_end policyToken.Signature = string(signedStr) policyToken.Directory = uploadDir policyToken.Policy = string(debyte) policyToken.UploadOssUrl = UploadOssUrl if err != nil { fmt.Println("json err:", err) } c.JSON(http.StatusOK, gin.H{ "code": 1, "data": policyToken, }) return } func getGmtIso8601(expireEnd int64) string { var tokenExpire = time.Unix(expireEnd, 0).UTC().Format("2006-01-02T15:04:05Z") return tokenExpire }
package aliyun import ( "fmt" "github.com/aliyun/aliyun-oss-go-sdk/oss" "github.com/gin-gonic/gin" "net/http" ) /** 图片授权访问 返回签名后的URL */ func GetSignURL(c *gin.Context) { accessKeyId := c.DefaultQuery("accessKeyId", "") accessKeySecret := c.DefaultQuery("accessKeySecret", "") securityToken := c.DefaultQuery("securityToken", "") fullImgPath := c.DefaultQuery("fullImgPath", "") //图片全路径 //如果为空则去请求sts临时用户信息 if accessKeyId == "" || accessKeySecret == "" || securityToken == "" { stsTokenInfo := GetAliyunStsInfo() accessKeyId = *stsTokenInfo.Credentials.AccessKeyId accessKeySecret = *stsTokenInfo.Credentials.AccessKeySecret securityToken = *stsTokenInfo.Credentials.SecurityToken } // 获取STS临时凭证后,您可以通过其中的安全令牌(SecurityToken)和临时访问密钥(AccessKeyId和AccessKeySecret)生成OSSClient。 client, err := oss.New(Endpoint, accessKeyId, accessKeySecret, oss.SecurityToken(securityToken)) if err != nil { fmt.Print(err.Error()) } // 填写文件完整路径,例如exampledir/exampleobject.txt。文件完整路径中不能包含Bucket名称。 objectName := fullImgPath // 获取存储空间。 bucket, err := client.Bucket(BucketName) if err != nil { fmt.Print(err.Error()) } // 签名直传。 signedURL, err := bucket.SignURL(objectName, oss.HTTPGet, 6000) if err != nil { fmt.Print(err.Error()) } c.JSON(http.StatusOK, gin.H{ "code": 1, "data": signedURL, }) }
我碰到这个问题是因为没有给RAM角色设置OSS最高权限,谨记
<Error> <Code>AccessDenied</Code> <Message>Request has expired.</Message> <RequestId>***</RequestId> <HostId>****</HostId> <Expires>2022-04-02T08:42:47.000Z</Expires> <ServerTime>2022-04-03T03:56:52.000Z</ServerTime> </Error>
好了,以上接口经本人测试调通,耗时一天半,代码没什么,问题全出在配置权限上了,用来记录我的填坑之路
下一个:有回收狗的地方吗(狗回收中心)