2014-03-28 18:56:04 +01:00
|
|
|
// Read, write and edit the config file
|
|
|
|
|
2014-03-15 17:06:11 +01:00
|
|
|
package fs
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
2016-02-16 16:25:27 +01:00
|
|
|
"bytes"
|
2016-08-14 13:04:43 +02:00
|
|
|
"crypto/aes"
|
|
|
|
"crypto/cipher"
|
2016-02-16 16:25:27 +01:00
|
|
|
"crypto/rand"
|
|
|
|
"crypto/sha256"
|
2015-09-01 23:33:34 +02:00
|
|
|
"encoding/base64"
|
2014-03-15 17:06:11 +01:00
|
|
|
"fmt"
|
2016-02-16 16:25:27 +01:00
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
2014-03-15 17:06:11 +01:00
|
|
|
"log"
|
2015-03-14 18:53:53 +01:00
|
|
|
"math"
|
2014-03-15 17:06:11 +01:00
|
|
|
"os"
|
|
|
|
"os/user"
|
|
|
|
"path"
|
|
|
|
"sort"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
2016-02-16 16:25:27 +01:00
|
|
|
"unicode/utf8"
|
2014-03-15 17:06:11 +01:00
|
|
|
|
2016-02-17 11:45:05 +01:00
|
|
|
"github.com/Unknwon/goconfig"
|
2016-06-12 16:06:02 +02:00
|
|
|
"github.com/pkg/errors"
|
2015-08-29 19:14:24 +02:00
|
|
|
"github.com/spf13/pflag"
|
2016-02-16 16:25:27 +01:00
|
|
|
"golang.org/x/crypto/nacl/secretbox"
|
|
|
|
"golang.org/x/text/unicode/norm"
|
2014-03-15 17:06:11 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
configFileName = ".rclone.conf"
|
2016-01-07 16:20:32 +01:00
|
|
|
|
|
|
|
// ConfigToken is the key used to store the token under
|
|
|
|
ConfigToken = "token"
|
|
|
|
|
|
|
|
// ConfigClientID is the config key used to store the client id
|
|
|
|
ConfigClientID = "client_id"
|
|
|
|
|
|
|
|
// ConfigClientSecret is the config key used to store the client secret
|
|
|
|
ConfigClientSecret = "client_secret"
|
|
|
|
|
|
|
|
// ConfigAutomatic indicates that we want non-interactive configuration
|
|
|
|
ConfigAutomatic = "config_automatic"
|
2014-03-15 17:06:11 +01:00
|
|
|
)
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// SizeSuffix is parsed by flag with k/M/G suffixes
|
2015-02-19 20:26:00 +01:00
|
|
|
type SizeSuffix int64
|
|
|
|
|
2017-01-03 03:52:41 +01:00
|
|
|
// BwTimeSlot represents a bandwidth configuration at a point in time.
|
|
|
|
type BwTimeSlot struct {
|
|
|
|
hhmm int
|
|
|
|
bandwidth SizeSuffix
|
|
|
|
}
|
|
|
|
|
|
|
|
// BwTimetable contains all configured time slots.
|
|
|
|
type BwTimetable []BwTimeSlot
|
|
|
|
|
2014-03-15 17:06:11 +01:00
|
|
|
// Global
|
|
|
|
var (
|
2015-09-22 19:47:16 +02:00
|
|
|
// ConfigFile is the config file data structure
|
2014-03-15 17:06:11 +01:00
|
|
|
ConfigFile *goconfig.ConfigFile
|
2015-09-22 19:47:16 +02:00
|
|
|
// HomeDir is the home directory of the user
|
2014-03-15 18:01:13 +01:00
|
|
|
HomeDir = configHome()
|
2015-09-22 19:47:16 +02:00
|
|
|
// ConfigPath points to the config file
|
2014-03-15 18:01:13 +01:00
|
|
|
ConfigPath = path.Join(HomeDir, configFileName)
|
2015-09-22 19:47:16 +02:00
|
|
|
// Config is the global config
|
2014-03-15 17:06:11 +01:00
|
|
|
Config = &ConfigInfo{}
|
|
|
|
// Flags
|
2016-01-12 18:38:28 +01:00
|
|
|
verbose = pflag.BoolP("verbose", "v", false, "Print lots more stuff")
|
|
|
|
quiet = pflag.BoolP("quiet", "q", false, "Print as little stuff as possible")
|
|
|
|
modifyWindow = pflag.DurationP("modify-window", "", time.Nanosecond, "Max time diff to be considered the same")
|
|
|
|
checkers = pflag.IntP("checkers", "", 8, "Number of checkers to run in parallel.")
|
|
|
|
transfers = pflag.IntP("transfers", "", 4, "Number of file transfers to run in parallel.")
|
|
|
|
configFile = pflag.StringP("config", "", ConfigPath, "Config file.")
|
|
|
|
checkSum = pflag.BoolP("checksum", "c", false, "Skip based on checksum & size, not mod-time & size")
|
|
|
|
sizeOnly = pflag.BoolP("size-only", "", false, "Skip based on size only, not mod-time or checksum")
|
2016-03-22 18:02:27 +01:00
|
|
|
ignoreTimes = pflag.BoolP("ignore-times", "I", false, "Don't skip files that match size and time - transfer all files")
|
2016-01-12 18:38:28 +01:00
|
|
|
ignoreExisting = pflag.BoolP("ignore-existing", "", false, "Skip all files that exist on destination")
|
|
|
|
dryRun = pflag.BoolP("dry-run", "n", false, "Do a trial run with no permanent changes")
|
|
|
|
connectTimeout = pflag.DurationP("contimeout", "", 60*time.Second, "Connect timeout")
|
|
|
|
timeout = pflag.DurationP("timeout", "", 5*60*time.Second, "IO idle timeout")
|
|
|
|
dumpHeaders = pflag.BoolP("dump-headers", "", false, "Dump HTTP headers - may contain sensitive info")
|
|
|
|
dumpBodies = pflag.BoolP("dump-bodies", "", false, "Dump HTTP headers and bodies - may contain sensitive info")
|
2016-11-02 16:53:43 +01:00
|
|
|
dumpAuth = pflag.BoolP("dump-auth", "", false, "Dump HTTP headers with auth info")
|
2016-01-12 18:38:28 +01:00
|
|
|
skipVerify = pflag.BoolP("no-check-certificate", "", false, "Do not verify the server SSL certificate. Insecure.")
|
|
|
|
AskPassword = pflag.BoolP("ask-password", "", true, "Allow prompt for password for encrypted configuration.")
|
|
|
|
deleteBefore = pflag.BoolP("delete-before", "", false, "When synchronizing, delete files on destination before transfering")
|
|
|
|
deleteDuring = pflag.BoolP("delete-during", "", false, "When synchronizing, delete files during transfer (default)")
|
|
|
|
deleteAfter = pflag.BoolP("delete-after", "", false, "When synchronizing, delete files on destination after transfering")
|
2016-12-18 11:03:56 +01:00
|
|
|
trackRenames = pflag.BoolP("track-renames", "", false, "When synchronizing, track file renames and do a server side move if possible")
|
2016-01-12 18:38:28 +01:00
|
|
|
lowLevelRetries = pflag.IntP("low-level-retries", "", 10, "Number of low level retries to do.")
|
2016-02-29 18:46:40 +01:00
|
|
|
updateOlder = pflag.BoolP("update", "u", false, "Skip files that are newer on the destination.")
|
2016-02-14 19:14:41 +01:00
|
|
|
noGzip = pflag.BoolP("no-gzip-encoding", "", false, "Don't set Accept-Encoding: gzip.")
|
2016-06-02 22:02:44 +02:00
|
|
|
maxDepth = pflag.IntP("max-depth", "", -1, "If set limits the recursion depth to this.")
|
2016-06-17 18:20:08 +02:00
|
|
|
ignoreSize = pflag.BoolP("ignore-size", "", false, "Ignore size when skipping use mod-time or checksum.")
|
2016-06-25 15:28:26 +02:00
|
|
|
noTraverse = pflag.BoolP("no-traverse", "", false, "Don't traverse destination file system on copy.")
|
2016-07-12 11:46:45 +02:00
|
|
|
noUpdateModTime = pflag.BoolP("no-update-modtime", "", false, "Don't update destination mod-time if files identical.")
|
2017-01-03 03:52:41 +01:00
|
|
|
bwLimit BwTimetable
|
2016-02-16 16:25:27 +01:00
|
|
|
|
|
|
|
// Key to use for password en/decryption.
|
|
|
|
// When nil, no encryption will be used for saving.
|
|
|
|
configKey []byte
|
2014-03-15 17:06:11 +01:00
|
|
|
)
|
|
|
|
|
2015-02-19 20:26:00 +01:00
|
|
|
func init() {
|
2017-01-03 03:52:41 +01:00
|
|
|
pflag.VarP(&bwLimit, "bwlimit", "", "Bandwidth limit in kBytes/s, or use suffix b|k|M|G or a full timetable.")
|
2015-02-19 20:26:00 +01:00
|
|
|
}
|
|
|
|
|
2016-07-11 14:04:30 +02:00
|
|
|
// Turn SizeSuffix into a string and a suffix
|
|
|
|
func (x SizeSuffix) string() (string, string) {
|
2015-03-14 18:53:53 +01:00
|
|
|
scaled := float64(0)
|
|
|
|
suffix := ""
|
2015-02-19 20:26:00 +01:00
|
|
|
switch {
|
2016-06-03 22:51:39 +02:00
|
|
|
case x < 0:
|
2016-07-11 14:04:30 +02:00
|
|
|
return "off", ""
|
2015-03-14 18:53:53 +01:00
|
|
|
case x == 0:
|
2016-07-11 14:04:30 +02:00
|
|
|
return "0", ""
|
2016-06-03 22:16:48 +02:00
|
|
|
case x < 1024:
|
|
|
|
scaled = float64(x)
|
2016-06-03 23:49:14 +02:00
|
|
|
suffix = ""
|
2015-03-14 18:53:53 +01:00
|
|
|
case x < 1024*1024:
|
|
|
|
scaled = float64(x) / 1024
|
|
|
|
suffix = "k"
|
|
|
|
case x < 1024*1024*1024:
|
|
|
|
scaled = float64(x) / 1024 / 1024
|
|
|
|
suffix = "M"
|
2015-02-19 20:26:00 +01:00
|
|
|
default:
|
2015-03-14 18:53:53 +01:00
|
|
|
scaled = float64(x) / 1024 / 1024 / 1024
|
|
|
|
suffix = "G"
|
2015-02-19 20:26:00 +01:00
|
|
|
}
|
2015-03-14 18:53:53 +01:00
|
|
|
if math.Floor(scaled) == scaled {
|
2016-07-11 14:04:30 +02:00
|
|
|
return fmt.Sprintf("%.0f", scaled), suffix
|
|
|
|
}
|
|
|
|
return fmt.Sprintf("%.3f", scaled), suffix
|
|
|
|
}
|
|
|
|
|
|
|
|
// String turns SizeSuffix into a string
|
|
|
|
func (x SizeSuffix) String() string {
|
|
|
|
val, suffix := x.string()
|
|
|
|
return val + suffix
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unit turns SizeSuffix into a string with a unit
|
|
|
|
func (x SizeSuffix) Unit(unit string) string {
|
|
|
|
val, suffix := x.string()
|
|
|
|
if val == "off" {
|
|
|
|
return val
|
2015-03-14 18:53:53 +01:00
|
|
|
}
|
2016-07-11 14:04:30 +02:00
|
|
|
return val + " " + suffix + unit
|
2015-02-19 20:26:00 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Set a SizeSuffix
|
|
|
|
func (x *SizeSuffix) Set(s string) error {
|
|
|
|
if len(s) == 0 {
|
2016-06-12 16:06:02 +02:00
|
|
|
return errors.New("empty string")
|
2015-02-19 20:26:00 +01:00
|
|
|
}
|
2016-06-03 22:51:39 +02:00
|
|
|
if strings.ToLower(s) == "off" {
|
|
|
|
*x = -1
|
|
|
|
return nil
|
|
|
|
}
|
2015-02-19 20:26:00 +01:00
|
|
|
suffix := s[len(s)-1]
|
|
|
|
suffixLen := 1
|
|
|
|
var multiplier float64
|
|
|
|
switch suffix {
|
|
|
|
case '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '.':
|
|
|
|
suffixLen = 0
|
|
|
|
multiplier = 1 << 10
|
2016-06-03 22:16:48 +02:00
|
|
|
case 'b', 'B':
|
|
|
|
multiplier = 1
|
2015-02-19 20:26:00 +01:00
|
|
|
case 'k', 'K':
|
|
|
|
multiplier = 1 << 10
|
|
|
|
case 'm', 'M':
|
|
|
|
multiplier = 1 << 20
|
|
|
|
case 'g', 'G':
|
|
|
|
multiplier = 1 << 30
|
|
|
|
default:
|
2016-06-12 16:06:02 +02:00
|
|
|
return errors.Errorf("bad suffix %q", suffix)
|
2015-02-19 20:26:00 +01:00
|
|
|
}
|
|
|
|
s = s[:len(s)-suffixLen]
|
|
|
|
value, err := strconv.ParseFloat(s, 64)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-03-14 18:53:53 +01:00
|
|
|
if value < 0 {
|
2016-06-12 16:06:02 +02:00
|
|
|
return errors.Errorf("size can't be negative %q", s)
|
2015-03-14 18:53:53 +01:00
|
|
|
}
|
2015-02-19 20:26:00 +01:00
|
|
|
value *= multiplier
|
|
|
|
*x = SizeSuffix(value)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-08-29 19:14:24 +02:00
|
|
|
// Type of the value
|
|
|
|
func (x *SizeSuffix) Type() string {
|
|
|
|
return "int64"
|
|
|
|
}
|
|
|
|
|
2015-02-19 20:26:00 +01:00
|
|
|
// Check it satisfies the interface
|
|
|
|
var _ pflag.Value = (*SizeSuffix)(nil)
|
|
|
|
|
2017-01-03 03:52:41 +01:00
|
|
|
// String returns a printable representation of BwTimetable.
|
|
|
|
func (x BwTimetable) String() string {
|
|
|
|
ret := []string{}
|
|
|
|
for _, ts := range x {
|
|
|
|
ret = append(ret, fmt.Sprintf("%04.4d,%s", ts.hhmm, ts.bandwidth.String()))
|
|
|
|
}
|
|
|
|
return strings.Join(ret, " ")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the bandwidth timetable.
|
|
|
|
func (x *BwTimetable) Set(s string) error {
|
|
|
|
// The timetable is formatted as:
|
|
|
|
// "hh:mm,bandwidth hh:mm,banwidth..." ex: "10:00,10G 11:30,1G 18:00,off"
|
|
|
|
// If only a single bandwidth identifier is provided, we assume constant bandwidth.
|
|
|
|
|
|
|
|
if len(s) == 0 {
|
|
|
|
return errors.New("empty string")
|
|
|
|
}
|
|
|
|
// Single value without time specification.
|
|
|
|
if !strings.Contains(s, " ") && !strings.Contains(s, ",") {
|
|
|
|
ts := BwTimeSlot{}
|
|
|
|
if err := ts.bandwidth.Set(s); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
ts.hhmm = 0
|
|
|
|
*x = BwTimetable{ts}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tok := range strings.Split(s, " ") {
|
|
|
|
tv := strings.Split(tok, ",")
|
|
|
|
|
|
|
|
// Format must be HH:MM,BW
|
|
|
|
if len(tv) != 2 {
|
|
|
|
return errors.Errorf("invalid time/bandwidth specification: %q", tok)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Basic timespec sanity checking
|
|
|
|
hhmm := tv[0]
|
|
|
|
if len(hhmm) != 5 {
|
|
|
|
return errors.Errorf("invalid time specification (hh:mm): %q", hhmm)
|
|
|
|
}
|
|
|
|
hh, err := strconv.Atoi(hhmm[0:2])
|
|
|
|
if err != nil {
|
|
|
|
return errors.Errorf("invalid hour in time specification %q: %v", hhmm, err)
|
|
|
|
}
|
|
|
|
if hh < 0 || hh > 23 {
|
|
|
|
return errors.Errorf("invalid hour (must be between 00 and 23): %q", hh)
|
|
|
|
}
|
|
|
|
mm, err := strconv.Atoi(hhmm[3:])
|
|
|
|
if err != nil {
|
|
|
|
return errors.Errorf("invalid minute in time specification: %q: %v", hhmm, err)
|
|
|
|
}
|
|
|
|
if mm < 0 || mm > 59 {
|
|
|
|
return errors.Errorf("invalid minute (must be between 00 and 59): %q", hh)
|
|
|
|
}
|
|
|
|
|
|
|
|
ts := BwTimeSlot{
|
|
|
|
hhmm: (hh * 100) + mm,
|
|
|
|
}
|
|
|
|
// Bandwidth limit for this time slot.
|
|
|
|
if err := ts.bandwidth.Set(tv[1]); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
*x = append(*x, ts)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// LimitAt returns a BwTimeSlot for the time requested.
|
|
|
|
func (x BwTimetable) LimitAt(tt time.Time) BwTimeSlot {
|
|
|
|
// If the timetable is empty, we return an unlimited BwTimeSlot starting at midnight.
|
|
|
|
if len(x) == 0 {
|
|
|
|
return BwTimeSlot{hhmm: 0, bandwidth: -1}
|
|
|
|
}
|
|
|
|
|
|
|
|
hhmm := tt.Hour()*100 + tt.Minute()
|
|
|
|
|
|
|
|
// By default, we return the last element in the timetable. This
|
|
|
|
// satisfies two conditions: 1) If there's only one element it
|
|
|
|
// will always be selected, and 2) The last element of the table
|
|
|
|
// will "wrap around" until overriden by an earlier time slot.
|
|
|
|
// there's only one time slot in the timetable.
|
|
|
|
ret := x[len(x)-1]
|
|
|
|
|
|
|
|
mindif := 0
|
|
|
|
first := true
|
|
|
|
|
|
|
|
// Look for most recent time slot.
|
|
|
|
for _, ts := range x {
|
|
|
|
// Ignore the past
|
|
|
|
if hhmm < ts.hhmm {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
dif := ((hhmm / 100 * 60) + (hhmm % 100)) - ((ts.hhmm / 100 * 60) + (ts.hhmm % 100))
|
|
|
|
if first {
|
|
|
|
mindif = dif
|
|
|
|
first = false
|
|
|
|
}
|
|
|
|
if dif <= mindif {
|
|
|
|
mindif = dif
|
|
|
|
ret = ts
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
|
|
|
|
// Type of the value
|
|
|
|
func (x BwTimetable) Type() string {
|
|
|
|
return "BwTimetable"
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check it satisfies the interface
|
|
|
|
var _ pflag.Value = (*BwTimetable)(nil)
|
|
|
|
|
2016-08-14 13:04:43 +02:00
|
|
|
// crypt internals
|
|
|
|
var (
|
|
|
|
cryptKey = []byte{
|
|
|
|
0x9c, 0x93, 0x5b, 0x48, 0x73, 0x0a, 0x55, 0x4d,
|
|
|
|
0x6b, 0xfd, 0x7c, 0x63, 0xc8, 0x86, 0xa9, 0x2b,
|
|
|
|
0xd3, 0x90, 0x19, 0x8e, 0xb8, 0x12, 0x8a, 0xfb,
|
|
|
|
0xf4, 0xde, 0x16, 0x2b, 0x8b, 0x95, 0xf6, 0x38,
|
|
|
|
}
|
|
|
|
cryptBlock cipher.Block
|
|
|
|
cryptRand = rand.Reader
|
|
|
|
)
|
|
|
|
|
|
|
|
// crypt transforms in to out using iv under AES-CTR.
|
|
|
|
//
|
|
|
|
// in and out may be the same buffer.
|
|
|
|
//
|
|
|
|
// Note encryption and decryption are the same operation
|
|
|
|
func crypt(out, in, iv []byte) error {
|
|
|
|
if cryptBlock == nil {
|
|
|
|
var err error
|
|
|
|
cryptBlock, err = aes.NewCipher(cryptKey)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
stream := cipher.NewCTR(cryptBlock, iv)
|
|
|
|
stream.XORKeyStream(out, in)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Obscure a value
|
|
|
|
//
|
|
|
|
// This is done by encrypting with AES-CTR
|
|
|
|
func Obscure(x string) (string, error) {
|
|
|
|
plaintext := []byte(x)
|
|
|
|
ciphertext := make([]byte, aes.BlockSize+len(plaintext))
|
|
|
|
iv := ciphertext[:aes.BlockSize]
|
|
|
|
if _, err := io.ReadFull(cryptRand, iv); err != nil {
|
|
|
|
return "", errors.Wrap(err, "failed to read iv")
|
|
|
|
}
|
|
|
|
if err := crypt(ciphertext[aes.BlockSize:], plaintext, iv); err != nil {
|
|
|
|
return "", errors.Wrap(err, "encrypt failed")
|
2015-09-01 23:33:34 +02:00
|
|
|
}
|
2016-08-14 13:04:43 +02:00
|
|
|
return base64.RawURLEncoding.EncodeToString(ciphertext), nil
|
2015-09-01 23:33:34 +02:00
|
|
|
}
|
|
|
|
|
2016-08-14 13:04:43 +02:00
|
|
|
// MustObscure obscures a value, exiting with a fatal error if it failed
|
|
|
|
func MustObscure(x string) string {
|
|
|
|
out, err := Obscure(x)
|
2015-09-01 23:33:34 +02:00
|
|
|
if err != nil {
|
2016-08-14 13:04:43 +02:00
|
|
|
log.Fatalf("Obscure failed: %v", err)
|
2015-09-01 23:33:34 +02:00
|
|
|
}
|
2016-08-14 13:04:43 +02:00
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reveal an obscured value
|
|
|
|
func Reveal(x string) (string, error) {
|
|
|
|
ciphertext, err := base64.RawURLEncoding.DecodeString(x)
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.Wrap(err, "base64 decode failed")
|
|
|
|
}
|
|
|
|
if len(ciphertext) < aes.BlockSize {
|
|
|
|
return "", errors.New("input too short")
|
|
|
|
}
|
|
|
|
buf := ciphertext[aes.BlockSize:]
|
|
|
|
iv := ciphertext[:aes.BlockSize]
|
|
|
|
if err := crypt(buf, buf, iv); err != nil {
|
|
|
|
return "", errors.Wrap(err, "decrypt failed")
|
|
|
|
}
|
|
|
|
return string(buf), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MustReveal reveals an obscured value, exiting with a fatal error if it failed
|
|
|
|
func MustReveal(x string) string {
|
|
|
|
out, err := Reveal(x)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Reveal failed: %v", err)
|
2015-09-01 23:33:34 +02:00
|
|
|
}
|
2016-08-14 13:04:43 +02:00
|
|
|
return out
|
2015-09-01 23:33:34 +02:00
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// ConfigInfo is filesystem config options
|
2014-03-15 17:06:11 +01:00
|
|
|
type ConfigInfo struct {
|
2015-10-29 16:42:25 +01:00
|
|
|
Verbose bool
|
|
|
|
Quiet bool
|
|
|
|
DryRun bool
|
|
|
|
CheckSum bool
|
|
|
|
SizeOnly bool
|
2016-03-22 18:02:27 +01:00
|
|
|
IgnoreTimes bool
|
2016-01-05 11:35:36 +01:00
|
|
|
IgnoreExisting bool
|
2015-10-29 16:42:25 +01:00
|
|
|
ModifyWindow time.Duration
|
|
|
|
Checkers int
|
|
|
|
Transfers int
|
|
|
|
ConnectTimeout time.Duration // Connect timeout
|
|
|
|
Timeout time.Duration // Data channel timeout
|
|
|
|
DumpHeaders bool
|
|
|
|
DumpBodies bool
|
2016-11-02 16:53:43 +01:00
|
|
|
DumpAuth bool
|
2015-10-29 16:42:25 +01:00
|
|
|
Filter *Filter
|
|
|
|
InsecureSkipVerify bool // Skip server certificate verification
|
2016-01-12 14:33:03 +01:00
|
|
|
DeleteBefore bool // Delete before checking
|
|
|
|
DeleteDuring bool // Delete during checking/transfer
|
|
|
|
DeleteAfter bool // Delete after successful transfer.
|
2016-12-18 11:03:56 +01:00
|
|
|
TrackRenames bool // Track file renames.
|
2016-01-12 18:38:28 +01:00
|
|
|
LowLevelRetries int
|
2016-02-29 18:46:40 +01:00
|
|
|
UpdateOlder bool // Skip files that are newer on the destination
|
2016-02-14 19:14:41 +01:00
|
|
|
NoGzip bool // Disable compression
|
2016-06-02 22:02:44 +02:00
|
|
|
MaxDepth int
|
2016-06-17 18:20:08 +02:00
|
|
|
IgnoreSize bool
|
2016-06-25 15:28:26 +02:00
|
|
|
NoTraverse bool
|
2016-07-12 11:46:45 +02:00
|
|
|
NoUpdateModTime bool
|
2016-11-22 05:04:05 +01:00
|
|
|
DataRateUnit string
|
2015-05-10 12:25:54 +02:00
|
|
|
}
|
|
|
|
|
2014-03-15 18:01:13 +01:00
|
|
|
// Find the config directory
|
|
|
|
func configHome() string {
|
|
|
|
// Find users home directory
|
|
|
|
usr, err := user.Current()
|
2014-12-12 20:18:23 +01:00
|
|
|
if err == nil {
|
|
|
|
return usr.HomeDir
|
2014-03-15 18:01:13 +01:00
|
|
|
}
|
2014-12-12 20:18:23 +01:00
|
|
|
// Fall back to reading $HOME - work around user.Current() not
|
|
|
|
// working for cross compiled binaries on OSX.
|
|
|
|
// https://github.com/golang/go/issues/6376
|
|
|
|
home := os.Getenv("HOME")
|
|
|
|
if home != "" {
|
|
|
|
return home
|
|
|
|
}
|
2016-06-06 22:23:54 +02:00
|
|
|
ErrorLog(nil, "Couldn't find home directory or read HOME environment variable.")
|
|
|
|
ErrorLog(nil, "Defaulting to storing config in current directory.")
|
|
|
|
ErrorLog(nil, "Use -config flag to workaround.")
|
|
|
|
ErrorLog(nil, "Error was: %v", err)
|
2014-12-12 20:18:23 +01:00
|
|
|
return ""
|
2014-03-15 18:01:13 +01:00
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// LoadConfig loads the config file
|
2014-03-15 17:06:11 +01:00
|
|
|
func LoadConfig() {
|
|
|
|
// Read some flags if set
|
|
|
|
//
|
|
|
|
// FIXME read these from the config file too
|
|
|
|
Config.Verbose = *verbose
|
|
|
|
Config.Quiet = *quiet
|
|
|
|
Config.ModifyWindow = *modifyWindow
|
|
|
|
Config.Checkers = *checkers
|
|
|
|
Config.Transfers = *transfers
|
2014-06-26 16:33:06 +02:00
|
|
|
Config.DryRun = *dryRun
|
2015-05-10 12:25:54 +02:00
|
|
|
Config.Timeout = *timeout
|
|
|
|
Config.ConnectTimeout = *connectTimeout
|
2015-06-03 16:08:27 +02:00
|
|
|
Config.CheckSum = *checkSum
|
2015-06-06 09:38:45 +02:00
|
|
|
Config.SizeOnly = *sizeOnly
|
2016-03-22 18:02:27 +01:00
|
|
|
Config.IgnoreTimes = *ignoreTimes
|
2016-01-05 11:35:36 +01:00
|
|
|
Config.IgnoreExisting = *ignoreExisting
|
2015-09-08 22:01:26 +02:00
|
|
|
Config.DumpHeaders = *dumpHeaders
|
|
|
|
Config.DumpBodies = *dumpBodies
|
2016-11-02 16:53:43 +01:00
|
|
|
Config.DumpAuth = *dumpAuth
|
2015-10-29 16:42:25 +01:00
|
|
|
Config.InsecureSkipVerify = *skipVerify
|
2016-01-12 18:38:28 +01:00
|
|
|
Config.LowLevelRetries = *lowLevelRetries
|
2016-02-29 18:46:40 +01:00
|
|
|
Config.UpdateOlder = *updateOlder
|
2016-02-14 19:14:41 +01:00
|
|
|
Config.NoGzip = *noGzip
|
2016-06-02 22:02:44 +02:00
|
|
|
Config.MaxDepth = *maxDepth
|
2016-06-17 18:20:08 +02:00
|
|
|
Config.IgnoreSize = *ignoreSize
|
2016-06-25 15:28:26 +02:00
|
|
|
Config.NoTraverse = *noTraverse
|
2016-07-12 11:46:45 +02:00
|
|
|
Config.NoUpdateModTime = *noUpdateModTime
|
2014-03-15 17:06:11 +01:00
|
|
|
|
2014-03-15 18:01:13 +01:00
|
|
|
ConfigPath = *configFile
|
2014-03-15 17:06:11 +01:00
|
|
|
|
2016-01-12 14:33:03 +01:00
|
|
|
Config.DeleteBefore = *deleteBefore
|
|
|
|
Config.DeleteDuring = *deleteDuring
|
|
|
|
Config.DeleteAfter = *deleteAfter
|
|
|
|
|
2016-12-18 11:03:56 +01:00
|
|
|
Config.TrackRenames = *trackRenames
|
|
|
|
|
2016-01-12 14:33:03 +01:00
|
|
|
switch {
|
|
|
|
case *deleteBefore && (*deleteDuring || *deleteAfter),
|
|
|
|
*deleteDuring && *deleteAfter:
|
|
|
|
log.Fatalf(`Only one of --delete-before, --delete-during or --delete-after can be used.`)
|
|
|
|
|
|
|
|
// If none are specified, use "during".
|
|
|
|
case !*deleteBefore && !*deleteDuring && !*deleteAfter:
|
|
|
|
Config.DeleteDuring = true
|
|
|
|
}
|
|
|
|
|
2016-06-17 18:20:08 +02:00
|
|
|
if Config.IgnoreSize && Config.SizeOnly {
|
|
|
|
log.Fatalf(`Can't use --size-only and --ignore-size together.`)
|
|
|
|
}
|
|
|
|
|
2014-03-15 17:06:11 +01:00
|
|
|
// Load configuration file.
|
2014-03-15 18:01:13 +01:00
|
|
|
var err error
|
2016-02-16 16:25:27 +01:00
|
|
|
ConfigFile, err = loadConfigFile()
|
2016-12-19 16:04:07 +01:00
|
|
|
if err == errorConfigFileNotFound {
|
|
|
|
Log(nil, "Config file %q not found - using defaults", ConfigPath)
|
|
|
|
ConfigFile, _ = goconfig.LoadFromReader(&bytes.Buffer{})
|
|
|
|
} else if err != nil {
|
|
|
|
log.Fatalf("Failed to load config file %q: %v", ConfigPath, err)
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
2015-02-19 20:26:00 +01:00
|
|
|
|
2015-09-27 17:13:20 +02:00
|
|
|
// Load filters
|
|
|
|
Config.Filter, err = NewFilter()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to load filters: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-02-19 20:26:00 +01:00
|
|
|
// Start the token bucket limiter
|
|
|
|
startTokenBucket()
|
2017-01-03 03:52:41 +01:00
|
|
|
|
|
|
|
// Start the bandwidth update ticker
|
|
|
|
startTokenTicker()
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
|
|
|
|
2016-12-19 16:04:07 +01:00
|
|
|
var errorConfigFileNotFound = errors.New("config file not found")
|
|
|
|
|
2016-02-16 16:25:27 +01:00
|
|
|
// loadConfigFile will load a config file, and
|
|
|
|
// automatically decrypt it.
|
|
|
|
func loadConfigFile() (*goconfig.ConfigFile, error) {
|
|
|
|
b, err := ioutil.ReadFile(ConfigPath)
|
|
|
|
if err != nil {
|
2016-12-19 16:04:07 +01:00
|
|
|
if os.IsNotExist(err) {
|
|
|
|
return nil, errorConfigFileNotFound
|
|
|
|
}
|
|
|
|
return nil, err
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Find first non-empty line
|
|
|
|
r := bufio.NewReader(bytes.NewBuffer(b))
|
|
|
|
for {
|
|
|
|
line, _, err := r.ReadLine()
|
|
|
|
if err != nil {
|
|
|
|
if err == io.EOF {
|
2016-02-17 11:45:05 +01:00
|
|
|
return goconfig.LoadFromReader(bytes.NewBuffer(b))
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
l := strings.TrimSpace(string(line))
|
|
|
|
if len(l) == 0 || strings.HasPrefix(l, ";") || strings.HasPrefix(l, "#") {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// First non-empty or non-comment must be ENCRYPT_V0
|
|
|
|
if l == "RCLONE_ENCRYPT_V0:" {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
if strings.HasPrefix(l, "RCLONE_ENCRYPT_V") {
|
2016-06-12 16:06:02 +02:00
|
|
|
return nil, errors.New("unsupported configuration encryption - update rclone for support")
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
2016-02-17 11:45:05 +01:00
|
|
|
return goconfig.LoadFromReader(bytes.NewBuffer(b))
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Encrypted content is base64 encoded.
|
|
|
|
dec := base64.NewDecoder(base64.StdEncoding, r)
|
|
|
|
box, err := ioutil.ReadAll(dec)
|
|
|
|
if err != nil {
|
2016-06-12 16:06:02 +02:00
|
|
|
return nil, errors.Wrap(err, "failed to load base64 encoded data")
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
if len(box) < 24+secretbox.Overhead {
|
2016-06-12 16:06:02 +02:00
|
|
|
return nil, errors.New("Configuration data too short")
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
envpw := os.Getenv("RCLONE_CONFIG_PASS")
|
|
|
|
|
|
|
|
var out []byte
|
|
|
|
for {
|
|
|
|
if len(configKey) == 0 && envpw != "" {
|
2016-08-14 18:16:06 +02:00
|
|
|
err := setConfigPassword(envpw)
|
2016-02-16 16:25:27 +01:00
|
|
|
if err != nil {
|
|
|
|
fmt.Println("Using RCLONE_CONFIG_PASS returned:", err)
|
|
|
|
envpw = ""
|
|
|
|
} else {
|
|
|
|
Debug(nil, "Using RCLONE_CONFIG_PASS password.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(configKey) == 0 {
|
|
|
|
if !*AskPassword {
|
2016-06-12 16:06:02 +02:00
|
|
|
return nil, errors.New("unable to decrypt configuration and not allowed to ask for password - set RCLONE_CONFIG_PASS to your configuration password")
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
2016-08-14 18:16:06 +02:00
|
|
|
getConfigPassword("Enter configuration password:")
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Nonce is first 24 bytes of the ciphertext
|
|
|
|
var nonce [24]byte
|
|
|
|
copy(nonce[:], box[:24])
|
|
|
|
var key [32]byte
|
|
|
|
copy(key[:], configKey[:32])
|
|
|
|
|
|
|
|
// Attempt to decrypt
|
|
|
|
var ok bool
|
|
|
|
out, ok = secretbox.Open(nil, box[24:], &nonce, &key)
|
|
|
|
if ok {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
// Retry
|
2016-06-06 22:23:54 +02:00
|
|
|
ErrorLog(nil, "Couldn't decrypt configuration, most likely wrong password.")
|
2016-02-16 16:25:27 +01:00
|
|
|
configKey = nil
|
|
|
|
envpw = ""
|
|
|
|
}
|
2016-02-17 11:45:05 +01:00
|
|
|
return goconfig.LoadFromReader(bytes.NewBuffer(out))
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
|
2016-08-14 18:16:06 +02:00
|
|
|
// checkPassword normalises and validates the password
|
|
|
|
func checkPassword(password string) (string, error) {
|
|
|
|
if !utf8.ValidString(password) {
|
|
|
|
return "", errors.New("password contains invalid utf8 characters")
|
|
|
|
}
|
|
|
|
// Remove leading+trailing whitespace
|
|
|
|
password = strings.TrimSpace(password)
|
|
|
|
// Normalize to reduce weird variations.
|
|
|
|
password = norm.NFKC.String(password)
|
|
|
|
if len(password) == 0 {
|
|
|
|
return "", errors.New("no characters in password")
|
|
|
|
}
|
|
|
|
return password, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetPassword asks the user for a password with the prompt given.
|
|
|
|
func GetPassword(prompt string) string {
|
|
|
|
fmt.Println(prompt)
|
|
|
|
for {
|
|
|
|
fmt.Print("password:")
|
|
|
|
password := ReadPassword()
|
|
|
|
password, err := checkPassword(password)
|
|
|
|
if err == nil {
|
|
|
|
return password
|
|
|
|
}
|
2016-08-19 21:00:05 +02:00
|
|
|
fmt.Printf("Bad password: %v\n", err)
|
2016-08-14 18:16:06 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ChangePassword will query the user twice for the named password. If
|
|
|
|
// the same password is entered it is returned.
|
|
|
|
func ChangePassword(name string) string {
|
|
|
|
for {
|
|
|
|
a := GetPassword(fmt.Sprintf("Enter %s password:", name))
|
|
|
|
b := GetPassword(fmt.Sprintf("Confirm %s password:", name))
|
|
|
|
if a == b {
|
|
|
|
return a
|
|
|
|
}
|
|
|
|
fmt.Println("Passwords do not match!")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// getConfigPassword will query the user for a password the
|
2016-02-16 16:25:27 +01:00
|
|
|
// first time it is required.
|
2016-08-14 18:16:06 +02:00
|
|
|
func getConfigPassword(q string) {
|
2016-02-16 16:25:27 +01:00
|
|
|
if len(configKey) != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for {
|
2016-08-14 18:16:06 +02:00
|
|
|
password := GetPassword(q)
|
|
|
|
err := setConfigPassword(password)
|
2016-02-16 16:25:27 +01:00
|
|
|
if err == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
fmt.Println("Error:", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-14 18:16:06 +02:00
|
|
|
// setConfigPassword will set the configKey to the hash of
|
2016-02-16 16:25:27 +01:00
|
|
|
// the password. If the length of the password is
|
|
|
|
// zero after trimming+normalization, an error is returned.
|
2016-08-14 18:16:06 +02:00
|
|
|
func setConfigPassword(password string) error {
|
|
|
|
password, err := checkPassword(password)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
// Create SHA256 has of the password
|
|
|
|
sha := sha256.New()
|
2016-08-14 18:16:06 +02:00
|
|
|
_, err = sha.Write([]byte("[" + password + "][rclone-config]"))
|
2016-02-16 16:25:27 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
configKey = sha.Sum(nil)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-08-14 18:16:06 +02:00
|
|
|
// changeConfigPassword will query the user twice
|
|
|
|
// for a password. If the same password is entered
|
|
|
|
// twice the key is updated.
|
|
|
|
func changeConfigPassword() {
|
|
|
|
err := setConfigPassword(ChangePassword("NEW configuration"))
|
|
|
|
if err != nil {
|
|
|
|
fmt.Printf("Failed to set config password: %v\n", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// SaveConfig saves configuration file.
|
2016-02-16 16:25:27 +01:00
|
|
|
// if configKey has been set, the file will be encrypted.
|
2014-03-15 17:06:11 +01:00
|
|
|
func SaveConfig() {
|
2016-02-16 16:25:27 +01:00
|
|
|
if len(configKey) == 0 {
|
|
|
|
err := goconfig.SaveConfigFile(ConfigFile, ConfigPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to save config file: %v", err)
|
|
|
|
}
|
|
|
|
err = os.Chmod(ConfigPath, 0600)
|
|
|
|
if err != nil {
|
2016-06-06 22:23:54 +02:00
|
|
|
ErrorLog(nil, "Failed to set permissions on config file: %v", err)
|
2016-02-16 16:25:27 +01:00
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
var buf bytes.Buffer
|
|
|
|
err := goconfig.SaveConfigData(ConfigFile, &buf)
|
2014-03-15 17:06:11 +01:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to save config file: %v", err)
|
|
|
|
}
|
2016-02-16 16:25:27 +01:00
|
|
|
|
|
|
|
f, err := os.Create(ConfigPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to save config file: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Fprintln(f, "# Encrypted rclone configuration File")
|
|
|
|
fmt.Fprintln(f, "")
|
|
|
|
fmt.Fprintln(f, "RCLONE_ENCRYPT_V0:")
|
|
|
|
|
|
|
|
// Generate new nonce and write it to the start of the ciphertext
|
|
|
|
var nonce [24]byte
|
|
|
|
n, _ := rand.Read(nonce[:])
|
|
|
|
if n != 24 {
|
|
|
|
log.Fatalf("nonce short read: %d", n)
|
|
|
|
}
|
|
|
|
enc := base64.NewEncoder(base64.StdEncoding, f)
|
|
|
|
_, err = enc.Write(nonce[:])
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to write config file: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var key [32]byte
|
|
|
|
copy(key[:], configKey[:32])
|
|
|
|
|
|
|
|
b := secretbox.Seal(nil, buf.Bytes(), &nonce, &key)
|
|
|
|
_, err = enc.Write(b)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to write config file: %v", err)
|
|
|
|
}
|
|
|
|
_ = enc.Close()
|
|
|
|
err = f.Close()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to close config file: %v", err)
|
|
|
|
}
|
|
|
|
|
2014-03-16 14:53:51 +01:00
|
|
|
err = os.Chmod(ConfigPath, 0600)
|
|
|
|
if err != nil {
|
2016-06-06 22:23:54 +02:00
|
|
|
ErrorLog(nil, "Failed to set permissions on config file: %v", err)
|
2014-03-16 14:53:51 +01:00
|
|
|
}
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
|
|
|
|
2016-12-19 16:04:07 +01:00
|
|
|
// ConfigSetValueAndSave sets the key to the value and saves just that
|
|
|
|
// value in the config file. It loads the old config file in from
|
|
|
|
// disk first and overwrites the given value only.
|
|
|
|
func ConfigSetValueAndSave(name, key, value string) (err error) {
|
|
|
|
// Set the value in config in case we fail to reload it
|
|
|
|
ConfigFile.SetValue(name, key, value)
|
|
|
|
// Reload the config file
|
|
|
|
reloadedConfigFile, err := loadConfigFile()
|
|
|
|
if err == errorConfigFileNotFound {
|
|
|
|
// Config file not written yet so ignore reload
|
|
|
|
return nil
|
|
|
|
} else if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
_, err = reloadedConfigFile.GetSection(name)
|
|
|
|
if err != nil {
|
|
|
|
// Section doesn't exist yet so ignore reload
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// Update the config file with the reloaded version
|
|
|
|
ConfigFile = reloadedConfigFile
|
|
|
|
// Set the value in the reloaded version
|
|
|
|
reloadedConfigFile.SetValue(name, key, value)
|
|
|
|
// Save it again
|
|
|
|
SaveConfig()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// ShowRemotes shows an overview of the config file
|
2014-03-15 17:52:51 +01:00
|
|
|
func ShowRemotes() {
|
2014-03-15 17:06:11 +01:00
|
|
|
remotes := ConfigFile.GetSectionList()
|
2014-03-15 17:52:51 +01:00
|
|
|
if len(remotes) == 0 {
|
|
|
|
return
|
|
|
|
}
|
2014-03-15 17:06:11 +01:00
|
|
|
sort.Strings(remotes)
|
|
|
|
fmt.Printf("%-20s %s\n", "Name", "Type")
|
|
|
|
fmt.Printf("%-20s %s\n", "====", "====")
|
|
|
|
for _, remote := range remotes {
|
|
|
|
fmt.Printf("%-20s %s\n", remote, ConfigFile.MustValue(remote, "type"))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ChooseRemote chooses a remote name
|
|
|
|
func ChooseRemote() string {
|
|
|
|
remotes := ConfigFile.GetSectionList()
|
|
|
|
sort.Strings(remotes)
|
|
|
|
return Choose("remote", remotes, nil, false)
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// ReadLine reads some input
|
2014-03-15 17:06:11 +01:00
|
|
|
func ReadLine() string {
|
|
|
|
buf := bufio.NewReader(os.Stdin)
|
|
|
|
line, err := buf.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to read line: %v", err)
|
|
|
|
}
|
|
|
|
return strings.TrimSpace(line)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Command - choose one
|
2014-03-15 17:52:51 +01:00
|
|
|
func Command(commands []string) byte {
|
2014-03-15 17:06:11 +01:00
|
|
|
opts := []string{}
|
|
|
|
for _, text := range commands {
|
|
|
|
fmt.Printf("%c) %s\n", text[0], text[1:])
|
|
|
|
opts = append(opts, text[:1])
|
|
|
|
}
|
|
|
|
optString := strings.Join(opts, "")
|
|
|
|
optHelp := strings.Join(opts, "/")
|
|
|
|
for {
|
|
|
|
fmt.Printf("%s> ", optHelp)
|
|
|
|
result := strings.ToLower(ReadLine())
|
|
|
|
if len(result) != 1 {
|
|
|
|
continue
|
|
|
|
}
|
2014-06-26 16:18:48 +02:00
|
|
|
i := strings.Index(optString, string(result[0]))
|
2014-03-15 17:06:11 +01:00
|
|
|
if i >= 0 {
|
2014-03-15 17:52:51 +01:00
|
|
|
return result[0]
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// Confirm asks the user for Yes or No and returns true or false
|
2014-03-16 14:54:43 +01:00
|
|
|
func Confirm() bool {
|
|
|
|
return Command([]string{"yYes", "nNo"}) == 'y'
|
|
|
|
}
|
|
|
|
|
2014-03-15 17:06:11 +01:00
|
|
|
// Choose one of the defaults or type a new string if newOk is set
|
|
|
|
func Choose(what string, defaults, help []string, newOk bool) string {
|
|
|
|
fmt.Printf("Choose a number from below")
|
|
|
|
if newOk {
|
|
|
|
fmt.Printf(", or type in your own value")
|
|
|
|
}
|
|
|
|
fmt.Println()
|
|
|
|
for i, text := range defaults {
|
2016-02-21 13:25:37 +01:00
|
|
|
var lines []string
|
2014-03-15 17:06:11 +01:00
|
|
|
if help != nil {
|
|
|
|
parts := strings.Split(help[i], "\n")
|
2016-02-21 13:25:37 +01:00
|
|
|
lines = append(lines, parts...)
|
|
|
|
}
|
|
|
|
lines = append(lines, fmt.Sprintf("%q", text))
|
|
|
|
pos := i + 1
|
|
|
|
if len(lines) == 1 {
|
|
|
|
fmt.Printf("%2d > %s\n", pos, text)
|
|
|
|
} else {
|
|
|
|
mid := (len(lines) - 1) / 2
|
|
|
|
for i, line := range lines {
|
|
|
|
var sep rune
|
|
|
|
switch i {
|
|
|
|
case 0:
|
|
|
|
sep = '/'
|
|
|
|
case len(lines) - 1:
|
|
|
|
sep = '\\'
|
|
|
|
default:
|
|
|
|
sep = '|'
|
|
|
|
}
|
|
|
|
number := " "
|
|
|
|
if i == mid {
|
|
|
|
number = fmt.Sprintf("%2d", pos)
|
|
|
|
}
|
|
|
|
fmt.Printf("%s %c %s\n", number, sep, line)
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for {
|
|
|
|
fmt.Printf("%s> ", what)
|
|
|
|
result := ReadLine()
|
|
|
|
i, err := strconv.Atoi(result)
|
|
|
|
if err != nil {
|
|
|
|
if newOk {
|
|
|
|
return result
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if i >= 1 && i <= len(defaults) {
|
|
|
|
return defaults[i-1]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-31 13:58:41 +01:00
|
|
|
// ChooseNumber asks the user to enter a number between min and max
|
|
|
|
// inclusive prompting them with what.
|
|
|
|
func ChooseNumber(what string, min, max int) int {
|
|
|
|
for {
|
|
|
|
fmt.Printf("%s> ", what)
|
|
|
|
result := ReadLine()
|
|
|
|
i, err := strconv.Atoi(result)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Printf("Bad number: %v\n", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if i < min || i > max {
|
|
|
|
fmt.Printf("Out of range - %d to %d inclusive\n", min, max)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
return i
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// ShowRemote shows the contents of the remote
|
2014-03-15 17:06:11 +01:00
|
|
|
func ShowRemote(name string) {
|
|
|
|
fmt.Printf("--------------------\n")
|
|
|
|
fmt.Printf("[%s]\n", name)
|
2016-10-08 12:26:14 +02:00
|
|
|
fs := MustFindByName(name)
|
2014-03-15 17:06:11 +01:00
|
|
|
for _, key := range ConfigFile.GetKeyList(name) {
|
2016-10-08 12:26:14 +02:00
|
|
|
isPassword := false
|
|
|
|
for _, option := range fs.Options {
|
|
|
|
if option.Name == key && option.IsPassword {
|
|
|
|
isPassword = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
value := ConfigFile.MustValue(name, key)
|
|
|
|
if isPassword && value != "" {
|
|
|
|
fmt.Printf("%s = *** ENCRYPTED ***\n", key)
|
|
|
|
} else {
|
|
|
|
fmt.Printf("%s = %s\n", key, value)
|
|
|
|
}
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
|
|
|
fmt.Printf("--------------------\n")
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// OkRemote prints the contents of the remote and ask if it is OK
|
2014-03-15 17:06:11 +01:00
|
|
|
func OkRemote(name string) bool {
|
|
|
|
ShowRemote(name)
|
|
|
|
switch i := Command([]string{"yYes this is OK", "eEdit this remote", "dDelete this remote"}); i {
|
2014-03-15 17:52:51 +01:00
|
|
|
case 'y':
|
2014-03-15 17:06:11 +01:00
|
|
|
return true
|
2014-03-15 17:52:51 +01:00
|
|
|
case 'e':
|
2014-03-15 17:06:11 +01:00
|
|
|
return false
|
2014-03-15 17:52:51 +01:00
|
|
|
case 'd':
|
2014-03-15 17:06:11 +01:00
|
|
|
ConfigFile.DeleteSection(name)
|
|
|
|
return true
|
|
|
|
default:
|
2016-08-19 21:00:05 +02:00
|
|
|
ErrorLog(nil, "Bad choice %c", i)
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2016-10-08 12:26:14 +02:00
|
|
|
// MustFindByName finds the RegInfo for the remote name passed in or
|
|
|
|
// exits with a fatal error.
|
|
|
|
func MustFindByName(name string) *RegInfo {
|
|
|
|
fsType := ConfigFile.MustValue(name, "type")
|
|
|
|
if fsType == "" {
|
|
|
|
log.Fatalf("Couldn't find type of fs for %q", name)
|
|
|
|
}
|
|
|
|
return MustFind(fsType)
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// RemoteConfig runs the config helper for the remote if needed
|
2014-03-16 14:54:43 +01:00
|
|
|
func RemoteConfig(name string) {
|
|
|
|
fmt.Printf("Remote config\n")
|
2016-10-08 12:26:14 +02:00
|
|
|
f := MustFindByName(name)
|
2014-03-16 14:54:43 +01:00
|
|
|
if f.Config != nil {
|
|
|
|
f.Config(name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// ChooseOption asks the user to choose an option
|
2014-03-28 18:56:04 +01:00
|
|
|
func ChooseOption(o *Option) string {
|
|
|
|
fmt.Println(o.Help)
|
2016-08-14 18:16:06 +02:00
|
|
|
if o.IsPassword {
|
2016-08-19 21:00:05 +02:00
|
|
|
actions := []string{"yYes type in my own password", "gGenerate random password"}
|
|
|
|
if o.Optional {
|
|
|
|
actions = append(actions, "nNo leave this optional password blank")
|
|
|
|
}
|
|
|
|
var password string
|
|
|
|
switch i := Command(actions); i {
|
|
|
|
case 'y':
|
|
|
|
password = ChangePassword("the")
|
|
|
|
case 'g':
|
|
|
|
for {
|
|
|
|
fmt.Printf("Password strength in bits.\n64 is just about memorable\n128 is secure\n1024 is the maximum\n")
|
|
|
|
bits := ChooseNumber("Bits", 64, 1024)
|
|
|
|
bytes := bits / 8
|
|
|
|
if bits%8 != 0 {
|
|
|
|
bytes++
|
|
|
|
}
|
|
|
|
var pw = make([]byte, bytes)
|
|
|
|
n, _ := rand.Read(pw)
|
|
|
|
if n != bytes {
|
|
|
|
log.Fatalf("password short read: %d", n)
|
|
|
|
}
|
|
|
|
password = base64.RawURLEncoding.EncodeToString(pw)
|
|
|
|
fmt.Printf("Your password is: %s\n", password)
|
|
|
|
fmt.Printf("Use this password?\n")
|
|
|
|
if Confirm() {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
case 'n':
|
|
|
|
return ""
|
|
|
|
default:
|
|
|
|
ErrorLog(nil, "Bad choice %c", i)
|
|
|
|
}
|
|
|
|
return MustObscure(password)
|
2016-08-14 18:16:06 +02:00
|
|
|
}
|
2014-03-28 18:56:04 +01:00
|
|
|
if len(o.Examples) > 0 {
|
|
|
|
var values []string
|
|
|
|
var help []string
|
|
|
|
for _, example := range o.Examples {
|
|
|
|
values = append(values, example.Value)
|
|
|
|
help = append(help, example.Help)
|
|
|
|
}
|
|
|
|
return Choose(o.Name, values, help, true)
|
|
|
|
}
|
|
|
|
fmt.Printf("%s> ", o.Name)
|
|
|
|
return ReadLine()
|
|
|
|
}
|
|
|
|
|
2016-02-15 19:11:53 +01:00
|
|
|
// fsOption returns an Option describing the possible remotes
|
|
|
|
func fsOption() *Option {
|
|
|
|
o := &Option{
|
|
|
|
Name: "Storage",
|
|
|
|
Help: "Type of storage to configure.",
|
|
|
|
}
|
2014-03-15 17:06:11 +01:00
|
|
|
for _, item := range fsRegistry {
|
2016-02-15 19:11:53 +01:00
|
|
|
example := OptionExample{
|
|
|
|
Value: item.Name,
|
|
|
|
Help: item.Description,
|
|
|
|
}
|
|
|
|
o.Examples = append(o.Examples, example)
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
2016-02-15 19:11:53 +01:00
|
|
|
o.Examples.Sort()
|
|
|
|
return o
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewRemote make a new remote from its name
|
|
|
|
func NewRemote(name string) {
|
|
|
|
newType := ChooseOption(fsOption())
|
2014-03-15 17:06:11 +01:00
|
|
|
ConfigFile.SetValue(name, "type", newType)
|
2016-10-08 12:26:14 +02:00
|
|
|
fs := MustFind(newType)
|
2014-03-15 17:06:11 +01:00
|
|
|
for _, option := range fs.Options {
|
2014-03-28 18:56:04 +01:00
|
|
|
ConfigFile.SetValue(name, option.Name, ChooseOption(&option))
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
2014-03-16 14:54:43 +01:00
|
|
|
RemoteConfig(name)
|
2014-03-15 17:06:11 +01:00
|
|
|
if OkRemote(name) {
|
|
|
|
SaveConfig()
|
|
|
|
return
|
|
|
|
}
|
2016-08-14 18:16:06 +02:00
|
|
|
EditRemote(fs, name)
|
2014-03-15 17:06:11 +01:00
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// EditRemote gets the user to edit a remote
|
2016-08-14 18:16:06 +02:00
|
|
|
func EditRemote(fs *RegInfo, name string) {
|
2014-03-15 17:06:11 +01:00
|
|
|
ShowRemote(name)
|
|
|
|
fmt.Printf("Edit remote\n")
|
|
|
|
for {
|
2016-08-14 18:16:06 +02:00
|
|
|
for _, option := range fs.Options {
|
|
|
|
key := option.Name
|
2014-03-15 17:06:11 +01:00
|
|
|
value := ConfigFile.MustValue(name, key)
|
2016-08-14 18:16:06 +02:00
|
|
|
fmt.Printf("Value %q = %q\n", key, value)
|
|
|
|
fmt.Printf("Edit? (y/n)>\n")
|
|
|
|
if Confirm() {
|
|
|
|
newValue := ChooseOption(&option)
|
2014-03-15 17:06:11 +01:00
|
|
|
ConfigFile.SetValue(name, key, newValue)
|
|
|
|
}
|
|
|
|
}
|
2014-03-16 14:54:43 +01:00
|
|
|
RemoteConfig(name)
|
2014-03-15 17:06:11 +01:00
|
|
|
if OkRemote(name) {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
SaveConfig()
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// DeleteRemote gets the user to delete a remote
|
2014-03-15 17:52:51 +01:00
|
|
|
func DeleteRemote(name string) {
|
|
|
|
ConfigFile.DeleteSection(name)
|
|
|
|
SaveConfig()
|
|
|
|
}
|
|
|
|
|
2015-09-22 19:47:16 +02:00
|
|
|
// EditConfig edits the config file interactively
|
2014-03-15 17:06:11 +01:00
|
|
|
func EditConfig() {
|
|
|
|
for {
|
2014-03-15 17:52:51 +01:00
|
|
|
haveRemotes := len(ConfigFile.GetSectionList()) != 0
|
2016-02-16 16:25:27 +01:00
|
|
|
what := []string{"eEdit existing remote", "nNew remote", "dDelete remote", "sSet configuration password", "qQuit config"}
|
2014-03-15 17:52:51 +01:00
|
|
|
if haveRemotes {
|
|
|
|
fmt.Printf("Current remotes:\n\n")
|
|
|
|
ShowRemotes()
|
|
|
|
fmt.Printf("\n")
|
|
|
|
} else {
|
|
|
|
fmt.Printf("No remotes found - make a new one\n")
|
2016-03-23 10:11:57 +01:00
|
|
|
what = append(what[1:2], what[3:]...)
|
2014-03-15 17:52:51 +01:00
|
|
|
}
|
|
|
|
switch i := Command(what); i {
|
|
|
|
case 'e':
|
2014-03-15 17:06:11 +01:00
|
|
|
name := ChooseRemote()
|
2016-10-08 12:26:14 +02:00
|
|
|
fs := MustFindByName(name)
|
2016-08-14 18:16:06 +02:00
|
|
|
EditRemote(fs, name)
|
2014-03-15 17:52:51 +01:00
|
|
|
case 'n':
|
2015-02-10 17:48:04 +01:00
|
|
|
nameLoop:
|
2015-02-07 16:49:09 +01:00
|
|
|
for {
|
|
|
|
fmt.Printf("name> ")
|
|
|
|
name := ReadLine()
|
2015-10-12 18:54:09 +02:00
|
|
|
parts := matcher.FindStringSubmatch(name + ":")
|
2015-02-07 16:49:09 +01:00
|
|
|
switch {
|
|
|
|
case name == "":
|
|
|
|
fmt.Printf("Can't use empty name\n")
|
|
|
|
case isDriveLetter(name):
|
|
|
|
fmt.Printf("Can't use %q as it can be confused a drive letter\n", name)
|
2015-10-12 18:54:09 +02:00
|
|
|
case len(parts) != 3 || parts[2] != "":
|
|
|
|
fmt.Printf("Can't use %q as it has invalid characters in it %v\n", name, parts)
|
2015-02-07 16:49:09 +01:00
|
|
|
default:
|
|
|
|
NewRemote(name)
|
2015-02-10 17:48:04 +01:00
|
|
|
break nameLoop
|
2015-02-07 16:49:09 +01:00
|
|
|
}
|
|
|
|
}
|
2014-03-15 17:52:51 +01:00
|
|
|
case 'd':
|
2014-03-15 17:06:11 +01:00
|
|
|
name := ChooseRemote()
|
2014-03-15 17:52:51 +01:00
|
|
|
DeleteRemote(name)
|
2016-02-16 16:25:27 +01:00
|
|
|
case 's':
|
|
|
|
SetPassword()
|
2014-03-15 17:52:51 +01:00
|
|
|
case 'q':
|
2014-03-15 17:06:11 +01:00
|
|
|
return
|
2016-02-16 16:25:27 +01:00
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetPassword will allow the user to modify the current
|
|
|
|
// configuration encryption settings.
|
|
|
|
func SetPassword() {
|
|
|
|
for {
|
|
|
|
if len(configKey) > 0 {
|
|
|
|
fmt.Println("Your configuration is encrypted.")
|
|
|
|
what := []string{"cChange Password", "uUnencrypt configuration", "qQuit to main menu"}
|
|
|
|
switch i := Command(what); i {
|
|
|
|
case 'c':
|
2016-08-14 18:16:06 +02:00
|
|
|
changeConfigPassword()
|
2016-02-16 16:25:27 +01:00
|
|
|
SaveConfig()
|
|
|
|
fmt.Println("Password changed")
|
|
|
|
continue
|
|
|
|
case 'u':
|
|
|
|
configKey = nil
|
|
|
|
SaveConfig()
|
|
|
|
continue
|
|
|
|
case 'q':
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
fmt.Println("Your configuration is not encrypted.")
|
|
|
|
fmt.Println("If you add a password, you will protect your login information to cloud services.")
|
|
|
|
what := []string{"aAdd Password", "qQuit to main menu"}
|
|
|
|
switch i := Command(what); i {
|
|
|
|
case 'a':
|
2016-08-14 18:16:06 +02:00
|
|
|
changeConfigPassword()
|
2016-02-16 16:25:27 +01:00
|
|
|
SaveConfig()
|
|
|
|
fmt.Println("Password set")
|
|
|
|
continue
|
|
|
|
case 'q':
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-04 16:13:36 +01:00
|
|
|
// Authorize is for remote authorization of headless machines.
|
2016-01-07 16:20:32 +01:00
|
|
|
//
|
|
|
|
// It expects 1 or 3 arguments
|
|
|
|
//
|
|
|
|
// rclone authorize "fs name"
|
|
|
|
// rclone authorize "fs name" "client id" "client secret"
|
|
|
|
func Authorize(args []string) {
|
2016-01-04 16:13:36 +01:00
|
|
|
switch len(args) {
|
|
|
|
case 1, 3:
|
|
|
|
default:
|
|
|
|
log.Fatalf("Invalid number of arguments: %d", len(args))
|
|
|
|
}
|
|
|
|
newType := args[0]
|
2016-10-08 12:26:14 +02:00
|
|
|
fs := MustFind(newType)
|
2016-01-04 16:13:36 +01:00
|
|
|
if fs.Config == nil {
|
2016-01-07 16:20:32 +01:00
|
|
|
log.Fatalf("Can't authorize fs %q", newType)
|
2016-01-04 16:13:36 +01:00
|
|
|
}
|
|
|
|
// Name used for temporary fs
|
|
|
|
name := "**temp-fs**"
|
|
|
|
|
|
|
|
// Make sure we delete it
|
|
|
|
defer DeleteRemote(name)
|
|
|
|
|
|
|
|
// Indicate that we want fully automatic configuration.
|
|
|
|
ConfigFile.SetValue(name, ConfigAutomatic, "yes")
|
|
|
|
if len(args) == 3 {
|
|
|
|
ConfigFile.SetValue(name, ConfigClientID, args[1])
|
|
|
|
ConfigFile.SetValue(name, ConfigClientSecret, args[2])
|
|
|
|
}
|
|
|
|
fs.Config(name)
|
|
|
|
}
|