2021-10-15 00:01:46 +02:00
|
|
|
// Package netstorage provides an interface to Akamai NetStorage API
|
|
|
|
package netstorage
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/hmac"
|
|
|
|
"crypto/sha256"
|
|
|
|
"encoding/base64"
|
|
|
|
"encoding/hex"
|
|
|
|
"encoding/xml"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
gohash "hash"
|
|
|
|
"io"
|
|
|
|
"math/rand"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2024-03-07 13:35:26 +01:00
|
|
|
"path"
|
2021-10-15 00:01:46 +02:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/rclone/rclone/fs"
|
|
|
|
"github.com/rclone/rclone/fs/config/configmap"
|
|
|
|
"github.com/rclone/rclone/fs/config/configstruct"
|
|
|
|
"github.com/rclone/rclone/fs/config/obscure"
|
|
|
|
"github.com/rclone/rclone/fs/fserrors"
|
|
|
|
"github.com/rclone/rclone/fs/fshttp"
|
|
|
|
"github.com/rclone/rclone/fs/hash"
|
|
|
|
"github.com/rclone/rclone/fs/walk"
|
|
|
|
"github.com/rclone/rclone/lib/pacer"
|
|
|
|
"github.com/rclone/rclone/lib/rest"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Constants
|
|
|
|
const (
|
|
|
|
minSleep = 10 * time.Millisecond
|
|
|
|
maxSleep = 2 * time.Second
|
|
|
|
decayConstant = 2 // bigger for slower decay, exponential
|
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
fsi := &fs.RegInfo{
|
|
|
|
Name: "netstorage",
|
|
|
|
Description: "Akamai NetStorage",
|
|
|
|
NewFs: NewFs,
|
|
|
|
CommandHelp: commandHelp,
|
|
|
|
Options: []fs.Option{{
|
|
|
|
Name: "protocol",
|
|
|
|
Help: `Select between HTTP or HTTPS protocol.
|
|
|
|
|
|
|
|
Most users should choose HTTPS, which is the default.
|
|
|
|
HTTP is provided primarily for debugging purposes.`,
|
|
|
|
Examples: []fs.OptionExample{{
|
|
|
|
Value: "http",
|
|
|
|
Help: "HTTP protocol",
|
|
|
|
}, {
|
|
|
|
Value: "https",
|
|
|
|
Help: "HTTPS protocol",
|
|
|
|
}},
|
|
|
|
Default: "https",
|
|
|
|
Advanced: true,
|
|
|
|
}, {
|
|
|
|
Name: "host",
|
|
|
|
Help: `Domain+path of NetStorage host to connect to.
|
|
|
|
|
2022-03-18 15:40:12 +01:00
|
|
|
Format should be ` + "`<domain>/<internal folders>`",
|
2023-07-06 18:55:53 +02:00
|
|
|
Required: true,
|
|
|
|
Sensitive: true,
|
2021-10-15 00:01:46 +02:00
|
|
|
}, {
|
2023-07-06 18:55:53 +02:00
|
|
|
Name: "account",
|
|
|
|
Help: "Set the NetStorage account name",
|
|
|
|
Required: true,
|
|
|
|
Sensitive: true,
|
2021-10-15 00:01:46 +02:00
|
|
|
}, {
|
|
|
|
Name: "secret",
|
|
|
|
Help: `Set the NetStorage account secret/G2O key for authentication.
|
|
|
|
|
|
|
|
Please choose the 'y' option to set your own password then enter your secret.`,
|
|
|
|
IsPassword: true,
|
|
|
|
Required: true,
|
|
|
|
}},
|
|
|
|
}
|
|
|
|
fs.Register(fsi)
|
|
|
|
}
|
|
|
|
|
|
|
|
var commandHelp = []fs.CommandHelp{{
|
|
|
|
Name: "du",
|
|
|
|
Short: "Return disk usage information for a specified directory",
|
|
|
|
Long: `The usage information returned, includes the targeted directory as well as all
|
|
|
|
files stored in any sub-directories that may exist.`,
|
|
|
|
}, {
|
|
|
|
Name: "symlink",
|
|
|
|
Short: "You can create a symbolic link in ObjectStore with the symlink action.",
|
|
|
|
Long: `The desired path location (including applicable sub-directories) ending in
|
|
|
|
the object that will be the target of the symlink (for example, /links/mylink).
|
|
|
|
Include the file extension for the object, if applicable.
|
2022-03-18 15:40:12 +01:00
|
|
|
` + "`rclone backend symlink <src> <path>`",
|
2021-10-15 00:01:46 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Options defines the configuration for this backend
|
|
|
|
type Options struct {
|
|
|
|
Endpoint string `config:"host"`
|
|
|
|
Account string `config:"account"`
|
|
|
|
Secret string `config:"secret"`
|
|
|
|
Protocol string `config:"protocol"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fs stores the interface to the remote HTTP files
|
|
|
|
type Fs struct {
|
|
|
|
name string
|
|
|
|
root string
|
|
|
|
features *fs.Features // optional features
|
|
|
|
opt Options // options for this backend
|
|
|
|
endpointURL string // endpoint as a string
|
|
|
|
srv *rest.Client // the connection to the Netstorage server
|
|
|
|
pacer *fs.Pacer // to pace the API calls
|
|
|
|
filetype string // dir, file or symlink
|
|
|
|
dirscreated map[string]bool // if implicit dir has been created already
|
|
|
|
dirscreatedMutex sync.Mutex // mutex to protect dirscreated
|
2022-08-14 04:56:32 +02:00
|
|
|
statcache map[string][]File // cache successful stat requests
|
2021-10-15 00:01:46 +02:00
|
|
|
statcacheMutex sync.RWMutex // RWMutex to protect statcache
|
|
|
|
}
|
|
|
|
|
|
|
|
// Object is a remote object that has been stat'd (so it exists, but is not necessarily open for reading)
|
|
|
|
type Object struct {
|
|
|
|
fs *Fs
|
|
|
|
filetype string // dir, file or symlink
|
|
|
|
remote string // remote path
|
|
|
|
size int64 // size of the object in bytes
|
|
|
|
modTime int64 // modification time of the object
|
|
|
|
md5sum string // md5sum of the object
|
|
|
|
fullURL string // full path URL
|
|
|
|
target string // symlink target when filetype is symlink
|
|
|
|
}
|
|
|
|
|
|
|
|
//------------------------------------------------------------------------------
|
|
|
|
|
|
|
|
// Stat is an object which holds the information of the stat element of the response xml
|
|
|
|
type Stat struct {
|
|
|
|
XMLName xml.Name `xml:"stat"`
|
|
|
|
Files []File `xml:"file"`
|
|
|
|
Directory string `xml:"directory,attr"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// File is an object which holds the information of the file element of the response xml
|
|
|
|
type File struct {
|
|
|
|
XMLName xml.Name `xml:"file"`
|
|
|
|
Type string `xml:"type,attr"`
|
|
|
|
Name string `xml:"name,attr"`
|
|
|
|
NameBase64 string `xml:"name_base64,attr"`
|
|
|
|
Size int64 `xml:"size,attr"`
|
|
|
|
Md5 string `xml:"md5,attr"`
|
|
|
|
Mtime int64 `xml:"mtime,attr"`
|
|
|
|
Bytes int64 `xml:"bytes,attr"`
|
|
|
|
Files int64 `xml:"files,attr"`
|
|
|
|
Target string `xml:"target,attr"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// List is an object which holds the information of the list element of the response xml
|
|
|
|
type List struct {
|
|
|
|
XMLName xml.Name `xml:"list"`
|
|
|
|
Files []File `xml:"file"`
|
|
|
|
Resume ListResume `xml:"resume"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListResume represents the resume xml element of the list
|
|
|
|
type ListResume struct {
|
|
|
|
XMLName xml.Name `xml:"resume"`
|
|
|
|
Start string `xml:"start,attr"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Du represents the du xml element of the response
|
|
|
|
type Du struct {
|
|
|
|
XMLName xml.Name `xml:"du"`
|
|
|
|
Directory string `xml:"directory,attr"`
|
|
|
|
Duinfo DuInfo `xml:"du-info"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// DuInfo represents the du-info xml element of the response
|
|
|
|
type DuInfo struct {
|
|
|
|
XMLName xml.Name `xml:"du-info"`
|
|
|
|
Files int64 `xml:"files,attr"`
|
|
|
|
Bytes int64 `xml:"bytes,attr"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetName returns a normalized name of the Stat item
|
|
|
|
func (s Stat) GetName() xml.Name {
|
|
|
|
return s.XMLName
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetName returns a normalized name of the List item
|
|
|
|
func (l List) GetName() xml.Name {
|
|
|
|
return l.XMLName
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetName returns a normalized name of the Du item
|
|
|
|
func (d Du) GetName() xml.Name {
|
|
|
|
return d.XMLName
|
|
|
|
}
|
|
|
|
|
|
|
|
//------------------------------------------------------------------------------
|
|
|
|
|
|
|
|
// NewFs creates a new Fs object from the name and root. It connects to
|
|
|
|
// the host specified in the config file.
|
|
|
|
//
|
|
|
|
// If root refers to an existing object, then it should return an Fs which
|
|
|
|
// points to the parent of that object and ErrorIsFile.
|
|
|
|
func NewFs(ctx context.Context, name, root string, m configmap.Mapper) (fs.Fs, error) {
|
|
|
|
// Parse config into Options struct
|
|
|
|
opt := new(Options)
|
|
|
|
err := configstruct.Set(m, opt)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// The base URL (endPoint is protocol + :// + domain/internal folder
|
|
|
|
opt.Endpoint = opt.Protocol + "://" + opt.Endpoint
|
|
|
|
fs.Debugf(nil, "NetStorage NewFS endpoint %q", opt.Endpoint)
|
|
|
|
if !strings.HasSuffix(opt.Endpoint, "/") {
|
|
|
|
opt.Endpoint += "/"
|
|
|
|
}
|
|
|
|
|
|
|
|
// Decrypt credentials, even though it is hard to eyedrop the hex string, it adds an extra piece of mind
|
|
|
|
opt.Secret = obscure.MustReveal(opt.Secret)
|
|
|
|
|
|
|
|
// Parse the endpoint and stick the root onto it
|
|
|
|
base, err := url.Parse(opt.Endpoint)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("couldn't parse URL %q: %w", opt.Endpoint, err)
|
|
|
|
}
|
|
|
|
u, err := rest.URLJoin(base, rest.URLPathEscape(root))
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("couldn't join URL %q and %q: %w", base.String(), root, err)
|
|
|
|
}
|
|
|
|
client := fshttp.NewClient(ctx)
|
|
|
|
|
|
|
|
f := &Fs{
|
|
|
|
name: name,
|
|
|
|
root: root,
|
|
|
|
opt: *opt,
|
|
|
|
endpointURL: u.String(),
|
|
|
|
pacer: fs.NewPacer(ctx, pacer.NewDefault(pacer.MinSleep(minSleep), pacer.MaxSleep(maxSleep), pacer.DecayConstant(decayConstant))),
|
|
|
|
dirscreated: make(map[string]bool),
|
|
|
|
statcache: make(map[string][]File),
|
|
|
|
}
|
|
|
|
f.srv = rest.NewClient(client)
|
|
|
|
f.srv.SetSigner(f.getAuth)
|
|
|
|
|
|
|
|
f.features = (&fs.Features{
|
|
|
|
CanHaveEmptyDirectories: true,
|
|
|
|
}).Fill(ctx, f)
|
|
|
|
|
|
|
|
err = f.initFs(ctx, "")
|
|
|
|
switch err {
|
|
|
|
case nil:
|
|
|
|
// Object is the directory
|
|
|
|
return f, nil
|
|
|
|
case fs.ErrorObjectNotFound:
|
|
|
|
return f, nil
|
|
|
|
case fs.ErrorIsFile:
|
2024-03-07 13:35:26 +01:00
|
|
|
// Correct root if definitely pointing to a file
|
|
|
|
f.root = path.Dir(f.root)
|
|
|
|
if f.root == "." || f.root == "/" {
|
|
|
|
f.root = ""
|
|
|
|
}
|
2021-10-15 00:01:46 +02:00
|
|
|
// Fs points to the parent directory
|
|
|
|
return f, err
|
|
|
|
default:
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Command the backend to run a named commands: du and symlink
|
|
|
|
func (f *Fs) Command(ctx context.Context, name string, arg []string, opt map[string]string) (out interface{}, err error) {
|
|
|
|
switch name {
|
|
|
|
case "du":
|
|
|
|
// No arg parsing needed, the path is passed in the fs
|
|
|
|
return f.netStorageDuRequest(ctx)
|
|
|
|
case "symlink":
|
|
|
|
dst := ""
|
|
|
|
if len(arg) > 0 {
|
|
|
|
dst = arg[0]
|
|
|
|
} else {
|
|
|
|
return nil, errors.New("NetStorage symlink command: need argument for target")
|
|
|
|
}
|
|
|
|
// Strip off the leading slash added by NewFs on object not found
|
|
|
|
URL := strings.TrimSuffix(f.url(""), "/")
|
|
|
|
return f.netStorageSymlinkRequest(ctx, URL, dst, nil)
|
|
|
|
default:
|
|
|
|
return nil, fs.ErrorCommandNotFound
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Name returns the configured name of the file system
|
|
|
|
func (f *Fs) Name() string {
|
|
|
|
return f.name
|
|
|
|
}
|
|
|
|
|
|
|
|
// Root returns the root for the filesystem
|
|
|
|
func (f *Fs) Root() string {
|
|
|
|
return f.root
|
|
|
|
}
|
|
|
|
|
|
|
|
// String returns the URL for the filesystem
|
|
|
|
func (f *Fs) String() string {
|
|
|
|
return f.endpointURL
|
|
|
|
}
|
|
|
|
|
|
|
|
// Features returns the optional features of this Fs
|
|
|
|
func (f *Fs) Features() *fs.Features {
|
|
|
|
return f.features
|
|
|
|
}
|
|
|
|
|
|
|
|
// Precision return the precision of this Fs
|
|
|
|
func (f *Fs) Precision() time.Duration {
|
|
|
|
return time.Second
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewObject creates a new remote http file object
|
|
|
|
// NewObject finds the Object at remote
|
|
|
|
// If it can't be found returns fs.ErrorObjectNotFound
|
|
|
|
// If it isn't a file, then it returns fs.ErrorIsDir
|
|
|
|
func (f *Fs) NewObject(ctx context.Context, remote string) (fs.Object, error) {
|
|
|
|
URL := f.url(remote)
|
|
|
|
files, err := f.netStorageStatRequest(ctx, URL, false)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if files == nil {
|
|
|
|
fs.Errorf(nil, "Stat for %q has empty files", URL)
|
|
|
|
return nil, fs.ErrorObjectNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
file := files[0]
|
|
|
|
switch file.Type {
|
|
|
|
case
|
|
|
|
"file",
|
|
|
|
"symlink":
|
|
|
|
return f.newObjectWithInfo(remote, &file)
|
|
|
|
case "dir":
|
|
|
|
return nil, fs.ErrorIsDir
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("object of an unsupported type %s for %q: %w", file.Type, URL, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// initFs initializes Fs based on the stat reply
|
|
|
|
func (f *Fs) initFs(ctx context.Context, dir string) error {
|
|
|
|
// Path must end with the slash, so the join later will work correctly
|
|
|
|
defer func() {
|
|
|
|
if !strings.HasSuffix(f.endpointURL, "/") {
|
|
|
|
f.endpointURL += "/"
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
URL := f.url(dir)
|
|
|
|
files, err := f.netStorageStatRequest(ctx, URL, true)
|
|
|
|
if err == fs.ErrorObjectNotFound || files == nil {
|
|
|
|
return fs.ErrorObjectNotFound
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
f.filetype = files[0].Type
|
|
|
|
switch f.filetype {
|
|
|
|
case "dir":
|
|
|
|
// This directory is known to exist, adding to explicit directories
|
|
|
|
f.setDirscreated(URL)
|
|
|
|
return nil
|
|
|
|
case
|
|
|
|
"file",
|
|
|
|
"symlink":
|
|
|
|
// Fs should point to the parent of that object and return ErrorIsFile
|
|
|
|
lastindex := strings.LastIndex(f.endpointURL, "/")
|
|
|
|
if lastindex != -1 {
|
|
|
|
f.endpointURL = f.endpointURL[0 : lastindex+1]
|
|
|
|
} else {
|
|
|
|
fs.Errorf(nil, "Remote URL %q unexpectedly does not include the slash", f.endpointURL)
|
|
|
|
}
|
|
|
|
return fs.ErrorIsFile
|
|
|
|
default:
|
|
|
|
err = fmt.Errorf("unsupported object type %s for %q: %w", f.filetype, URL, err)
|
|
|
|
f.filetype = ""
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// url joins the remote onto the endpoint URL
|
|
|
|
func (f *Fs) url(remote string) string {
|
|
|
|
if remote == "" {
|
|
|
|
return f.endpointURL
|
|
|
|
}
|
|
|
|
|
|
|
|
pathescapeURL := rest.URLPathEscape(remote)
|
|
|
|
// Strip off initial "./" from the path, which can be added by path escape function following the RFC 3986 4.2
|
|
|
|
// (a segment must be preceded by a dot-segment (e.g., "./this:that") to make a relative-path reference).
|
|
|
|
pathescapeURL = strings.TrimPrefix(pathescapeURL, "./")
|
|
|
|
// Cannot use rest.URLJoin() here because NetStorage is an object storage and allows to have a "."
|
|
|
|
// directory name, which will be eliminated by the join function.
|
|
|
|
return f.endpointURL + pathescapeURL
|
|
|
|
}
|
|
|
|
|
|
|
|
// getFileName returns the file name if present, otherwise decoded name_base64
|
|
|
|
// if present, otherwise an empty string
|
|
|
|
func (f *Fs) getFileName(file *File) string {
|
|
|
|
if file.Name != "" {
|
|
|
|
return file.Name
|
|
|
|
}
|
|
|
|
if file.NameBase64 != "" {
|
|
|
|
decoded, err := base64.StdEncoding.DecodeString(file.NameBase64)
|
|
|
|
if err == nil {
|
|
|
|
return string(decoded)
|
|
|
|
}
|
|
|
|
fs.Errorf(nil, "Failed to base64 decode object %s: %v", file.NameBase64, err)
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// List the objects and directories in dir into entries. The
|
|
|
|
// entries can be returned in any order but should be for a
|
|
|
|
// complete directory.
|
|
|
|
//
|
|
|
|
// dir should be "" to list the root, and should not have
|
|
|
|
// trailing slashes.
|
|
|
|
//
|
|
|
|
// This should return ErrDirNotFound if the directory isn't
|
|
|
|
// found.
|
|
|
|
func (f *Fs) List(ctx context.Context, dir string) (entries fs.DirEntries, err error) {
|
|
|
|
if f.filetype == "" {
|
|
|
|
// This happens in two scenarios.
|
2022-08-14 04:56:32 +02:00
|
|
|
// 1. NewFs is done on a nonexistent object, then later rclone attempts to List/ListR this NewFs.
|
2021-10-15 00:01:46 +02:00
|
|
|
// 2. List/ListR is called from the context of test_all and not the regular rclone binary.
|
|
|
|
err := f.initFs(ctx, dir)
|
|
|
|
if err != nil {
|
|
|
|
if err == fs.ErrorObjectNotFound {
|
|
|
|
return nil, fs.ErrorDirNotFound
|
|
|
|
}
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
URL := f.url(dir)
|
2024-04-17 16:40:07 +02:00
|
|
|
files, err := f.netStorageDirRequest(ctx, URL)
|
2021-10-15 00:01:46 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if dir != "" && !strings.HasSuffix(dir, "/") {
|
|
|
|
dir += "/"
|
|
|
|
}
|
|
|
|
for _, item := range files {
|
|
|
|
name := dir + f.getFileName(&item)
|
|
|
|
switch item.Type {
|
|
|
|
case "dir":
|
|
|
|
when := time.Unix(item.Mtime, 0)
|
|
|
|
entry := fs.NewDir(name, when).SetSize(item.Bytes).SetItems(item.Files)
|
|
|
|
entries = append(entries, entry)
|
|
|
|
case "file":
|
|
|
|
if entry, _ := f.newObjectWithInfo(name, &item); entry != nil {
|
|
|
|
entries = append(entries, entry)
|
|
|
|
}
|
|
|
|
case "symlink":
|
|
|
|
var entry fs.Object
|
|
|
|
// Add .rclonelink suffix to allow local backend code to convert to a symlink.
|
|
|
|
// In case both .rclonelink file AND symlink file exists, the first will be used.
|
|
|
|
if entry, _ = f.newObjectWithInfo(name+".rclonelink", &item); entry != nil {
|
|
|
|
fs.Infof(nil, "Converting a symlink to the rclonelink %s target %s", entry.Remote(), item.Target)
|
|
|
|
entries = append(entries, entry)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
fs.Logf(nil, "Ignoring unsupported object type %s for %q path", item.Type, name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return entries, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListR lists the objects and directories of the Fs starting
|
|
|
|
// from dir recursively into out.
|
|
|
|
//
|
|
|
|
// dir should be "" to start from the root, and should not
|
|
|
|
// have trailing slashes.
|
|
|
|
//
|
|
|
|
// This should return ErrDirNotFound if the directory isn't
|
|
|
|
// found.
|
|
|
|
//
|
|
|
|
// It should call callback for each tranche of entries read.
|
|
|
|
// These need not be returned in any particular order. If
|
|
|
|
// callback returns an error then the listing will stop
|
|
|
|
// immediately.
|
|
|
|
//
|
|
|
|
// Don't implement this unless you have a more efficient way
|
|
|
|
// of listing recursively that doing a directory traversal.
|
|
|
|
func (f *Fs) ListR(ctx context.Context, dir string, callback fs.ListRCallback) (err error) {
|
|
|
|
if f.filetype == "" {
|
|
|
|
// This happens in two scenarios.
|
2022-08-14 04:56:32 +02:00
|
|
|
// 1. NewFs is done on a nonexistent object, then later rclone attempts to List/ListR this NewFs.
|
2021-10-15 00:01:46 +02:00
|
|
|
// 2. List/ListR is called from the context of test_all and not the regular rclone binary.
|
|
|
|
err := f.initFs(ctx, dir)
|
|
|
|
if err != nil {
|
|
|
|
if err == fs.ErrorObjectNotFound {
|
|
|
|
return fs.ErrorDirNotFound
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !strings.HasSuffix(dir, "/") && dir != "" {
|
|
|
|
dir += "/"
|
|
|
|
}
|
|
|
|
URL := f.url(dir)
|
|
|
|
u, err := url.Parse(URL)
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(nil, "Unable to parse URL %q: %v", URL, err)
|
|
|
|
return fs.ErrorDirNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
list := walk.NewListRHelper(callback)
|
|
|
|
for resumeStart := u.Path; resumeStart != ""; {
|
|
|
|
var files []File
|
|
|
|
files, resumeStart, err = f.netStorageListRequest(ctx, URL, u.Path)
|
|
|
|
if err != nil {
|
|
|
|
if err == fs.ErrorObjectNotFound {
|
|
|
|
return fs.ErrorDirNotFound
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
for _, item := range files {
|
|
|
|
name := f.getFileName(&item)
|
|
|
|
// List output includes full paths starting from [CP Code]/
|
|
|
|
path := strings.TrimPrefix("/"+name, u.Path)
|
|
|
|
if path == "" {
|
|
|
|
// Skip the starting directory itself
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
switch item.Type {
|
|
|
|
case "dir":
|
|
|
|
when := time.Unix(item.Mtime, 0)
|
|
|
|
entry := fs.NewDir(dir+strings.TrimSuffix(path, "/"), when)
|
|
|
|
if err := list.Add(entry); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
case "file":
|
|
|
|
if entry, _ := f.newObjectWithInfo(dir+path, &item); entry != nil {
|
|
|
|
if err := list.Add(entry); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
case "symlink":
|
|
|
|
// Add .rclonelink suffix to allow local backend code to convert to a symlink.
|
|
|
|
// In case both .rclonelink file AND symlink file exists, the first will be used.
|
|
|
|
if entry, _ := f.newObjectWithInfo(dir+path+".rclonelink", &item); entry != nil {
|
|
|
|
fs.Infof(nil, "Converting a symlink to the rclonelink %s for target %s", entry.Remote(), item.Target)
|
|
|
|
if err := list.Add(entry); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
fs.Logf(nil, "Ignoring unsupported object type %s for %s path", item.Type, name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if resumeStart != "" {
|
|
|
|
// Perform subsequent list action call, construct the
|
|
|
|
// URL where the previous request finished
|
|
|
|
u, err := url.Parse(f.endpointURL)
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(nil, "Unable to parse URL %q: %v", f.endpointURL, err)
|
|
|
|
return fs.ErrorDirNotFound
|
|
|
|
}
|
|
|
|
resumeURL, err := rest.URLJoin(u, rest.URLPathEscape(resumeStart))
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(nil, "Unable to join URL %q for resumeStart %s: %v", f.endpointURL, resumeStart, err)
|
|
|
|
return fs.ErrorDirNotFound
|
|
|
|
}
|
|
|
|
URL = resumeURL.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
return list.Flush()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Put in to the remote path with the modTime given of the given size
|
|
|
|
//
|
|
|
|
// May create the object even if it returns an error - if so
|
|
|
|
// will return the object and the error, otherwise will return
|
|
|
|
// nil and the error
|
|
|
|
func (f *Fs) Put(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {
|
|
|
|
err := f.implicitCheck(ctx, src.Remote(), true)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
// Barebones object will get filled in Update
|
|
|
|
o := &Object{
|
|
|
|
fs: f,
|
|
|
|
remote: src.Remote(),
|
|
|
|
fullURL: f.url(src.Remote()),
|
|
|
|
}
|
|
|
|
// We pass through the Update's error
|
|
|
|
err = o.Update(ctx, in, src, options...)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return o, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// implicitCheck prevents implicit dir creation by doing mkdir from base up to current dir,
|
|
|
|
// does NOT check if these dirs created conflict with existing dirs/files so can result in dupe
|
|
|
|
func (f *Fs) implicitCheck(ctx context.Context, remote string, isfile bool) error {
|
|
|
|
// Find base (URL including the CPCODE path) and root (what follows after that)
|
|
|
|
URL := f.url(remote)
|
|
|
|
u, err := url.Parse(URL)
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(nil, "Unable to parse URL %q while implicit checking directory: %v", URL, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
startPos := 0
|
|
|
|
if strings.HasPrefix(u.Path, "/") {
|
|
|
|
startPos = 1
|
|
|
|
}
|
|
|
|
pos := strings.Index(u.Path[startPos:], "/")
|
|
|
|
if pos == -1 {
|
|
|
|
fs.Errorf(nil, "URL %q unexpectedly does not include the slash in the CPCODE path", URL)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
root := rest.URLPathEscape(u.Path[startPos+pos+1:])
|
|
|
|
u.Path = u.Path[:startPos+pos]
|
|
|
|
base := u.String()
|
|
|
|
if !strings.HasSuffix(base, "/") {
|
|
|
|
base += "/"
|
|
|
|
}
|
|
|
|
|
|
|
|
if isfile {
|
|
|
|
// Get the base name of root
|
|
|
|
lastindex := strings.LastIndex(root, "/")
|
|
|
|
if lastindex == -1 {
|
|
|
|
// We are at the level of CPCODE path
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
root = root[0 : lastindex+1]
|
|
|
|
}
|
|
|
|
|
|
|
|
// We make sure root always has "/" at the end
|
|
|
|
if !strings.HasSuffix(root, "/") {
|
|
|
|
root += "/"
|
|
|
|
}
|
|
|
|
|
|
|
|
for root != "" {
|
|
|
|
frontindex := strings.Index(root, "/")
|
|
|
|
if frontindex == -1 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
frontdir := root[0 : frontindex+1]
|
|
|
|
root = root[frontindex+1:]
|
|
|
|
base += frontdir
|
|
|
|
if !f.testAndSetDirscreated(base) {
|
|
|
|
fs.Infof(nil, "Implicitly create directory %s", base)
|
|
|
|
err := f.netStorageMkdirRequest(ctx, base)
|
|
|
|
if err != nil {
|
|
|
|
fs.Errorf("Mkdir request in implicit check failed for base %s: %v", base, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Purge all files in the directory specified.
|
|
|
|
// NetStorage quick-delete is disabled by default AND not instantaneous.
|
|
|
|
// Returns fs.ErrorCantPurge when quick-delete fails.
|
|
|
|
func (f *Fs) Purge(ctx context.Context, dir string) error {
|
|
|
|
URL := f.url(dir)
|
|
|
|
const actionHeader = "version=1&action=quick-delete&quick-delete=imreallyreallysure"
|
|
|
|
if _, err := f.callBackend(ctx, URL, "POST", actionHeader, true, nil, nil); err != nil {
|
|
|
|
fs.Logf(nil, "Purge using quick-delete failed, fallback on recursive delete: %v", err)
|
|
|
|
return fs.ErrorCantPurge
|
|
|
|
}
|
|
|
|
fs.Logf(nil, "Purge using quick-delete has been queued, you may not see immediate changes")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// PutStream uploads to the remote path with the modTime given of indeterminate size
|
|
|
|
func (f *Fs) PutStream(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {
|
|
|
|
// Pass through error from Put
|
|
|
|
return f.Put(ctx, in, src, options...)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fs is the filesystem this remote http file object is located within
|
|
|
|
func (o *Object) Fs() fs.Info {
|
|
|
|
return o.fs
|
|
|
|
}
|
|
|
|
|
|
|
|
// String returns the URL to the remote HTTP file
|
|
|
|
func (o *Object) String() string {
|
|
|
|
if o == nil {
|
|
|
|
return "<nil>"
|
|
|
|
}
|
|
|
|
return o.remote
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remote the name of the remote HTTP file, relative to the fs root
|
|
|
|
func (o *Object) Remote() string {
|
|
|
|
return o.remote
|
|
|
|
}
|
|
|
|
|
|
|
|
// Hash returns the Md5sum of an object returning a lowercase hex string
|
|
|
|
func (o *Object) Hash(ctx context.Context, t hash.Type) (string, error) {
|
|
|
|
if t != hash.MD5 {
|
|
|
|
return "", hash.ErrUnsupported
|
|
|
|
}
|
|
|
|
return o.md5sum, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Size returns the size in bytes of the remote http file
|
|
|
|
func (o *Object) Size() int64 {
|
|
|
|
return o.size
|
|
|
|
}
|
|
|
|
|
|
|
|
// Md5Sum returns the md5 of the object
|
|
|
|
func (o *Object) Md5Sum() string {
|
|
|
|
return o.md5sum
|
|
|
|
}
|
|
|
|
|
|
|
|
// ModTime returns the modification time of the object
|
|
|
|
//
|
|
|
|
// It attempts to read the objects mtime and if that isn't present the
|
|
|
|
// LastModified returned in the http headers
|
|
|
|
func (o *Object) ModTime(ctx context.Context) time.Time {
|
|
|
|
return time.Unix(o.modTime, 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetModTime sets the modification and access time to the specified time
|
|
|
|
func (o *Object) SetModTime(ctx context.Context, modTime time.Time) error {
|
|
|
|
URL := o.fullURL
|
|
|
|
when := strconv.FormatInt(modTime.Unix(), 10)
|
|
|
|
actionHeader := "version=1&action=mtime&mtime=" + when
|
|
|
|
if _, err := o.fs.callBackend(ctx, URL, "POST", actionHeader, true, nil, nil); err != nil {
|
|
|
|
fs.Debugf(nil, "NetStorage action mtime failed for %q: %v", URL, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
o.fs.deleteStatCache(URL)
|
|
|
|
o.modTime = modTime.Unix()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Storable returns whether this object is storable
|
|
|
|
func (o *Object) Storable() bool {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Open an object for read
|
|
|
|
func (o *Object) Open(ctx context.Context, options ...fs.OpenOption) (in io.ReadCloser, err error) {
|
|
|
|
return o.netStorageDownloadRequest(ctx, options)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Hashes returns the supported hash sets.
|
|
|
|
func (f *Fs) Hashes() hash.Set {
|
|
|
|
return hash.Set(hash.MD5)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mkdir makes the root directory of the Fs object
|
|
|
|
// Shouldn't return an error if it already exists
|
|
|
|
func (f *Fs) Mkdir(ctx context.Context, dir string) error {
|
|
|
|
// ImplicitCheck will mkdir from base up to dir, if not already in dirscreated
|
|
|
|
return f.implicitCheck(ctx, dir, false)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove an object
|
|
|
|
func (o *Object) Remove(ctx context.Context) error {
|
|
|
|
return o.netStorageDeleteRequest(ctx)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Rmdir removes the root directory of the Fs object
|
|
|
|
// Return an error if it doesn't exist or isn't empty
|
|
|
|
func (f *Fs) Rmdir(ctx context.Context, dir string) error {
|
|
|
|
return f.netStorageRmdirRequest(ctx, dir)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update netstorage with the object
|
|
|
|
func (o *Object) Update(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) error {
|
|
|
|
o.size = src.Size()
|
|
|
|
o.modTime = src.ModTime(ctx).Unix()
|
|
|
|
// Don't do md5 check because that's done by server
|
|
|
|
o.md5sum = ""
|
|
|
|
err := o.netStorageUploadRequest(ctx, in, src)
|
|
|
|
// We return an object updated with source stats,
|
|
|
|
// we don't refetch the obj after upload
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// newObjectWithInfo creates an fs.Object for any netstorage.File or symlink.
|
|
|
|
// If it can't be found it returns the error fs.ErrorObjectNotFound.
|
|
|
|
// It returns fs.ErrorIsDir error for directory objects, but still fills the
|
|
|
|
// fs.Object structure (for directory operations).
|
|
|
|
func (f *Fs) newObjectWithInfo(remote string, info *File) (fs.Object, error) {
|
|
|
|
if info == nil {
|
|
|
|
return nil, fs.ErrorObjectNotFound
|
|
|
|
}
|
|
|
|
URL := f.url(remote)
|
|
|
|
size := info.Size
|
|
|
|
if info.Type == "symlink" {
|
|
|
|
// File size for symlinks is absent but for .rclonelink to work
|
|
|
|
// the size should be the length of the target name
|
|
|
|
size = int64(len(info.Target))
|
|
|
|
}
|
|
|
|
o := &Object{
|
|
|
|
fs: f,
|
|
|
|
filetype: info.Type,
|
|
|
|
remote: remote,
|
|
|
|
size: size,
|
|
|
|
modTime: info.Mtime,
|
|
|
|
md5sum: info.Md5,
|
|
|
|
fullURL: URL,
|
|
|
|
target: info.Target,
|
|
|
|
}
|
|
|
|
if info.Type == "dir" {
|
|
|
|
return o, fs.ErrorIsDir
|
|
|
|
}
|
|
|
|
return o, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getAuth is the signing hook to get the NetStorage auth
|
|
|
|
func (f *Fs) getAuth(req *http.Request) error {
|
|
|
|
// Set Authorization header
|
|
|
|
dataHeader := generateDataHeader(f)
|
|
|
|
path := req.URL.RequestURI()
|
2022-08-21 16:42:17 +02:00
|
|
|
//lint:ignore SA1008 false positive when running staticcheck, the header name is according to docs even if not canonical
|
|
|
|
//nolint:staticcheck // Don't include staticcheck when running golangci-lint to avoid SA1008
|
2021-10-15 00:01:46 +02:00
|
|
|
actionHeader := req.Header["X-Akamai-ACS-Action"][0]
|
|
|
|
fs.Debugf(nil, "NetStorage API %s call %s for path %q", req.Method, actionHeader, path)
|
|
|
|
req.Header.Set("X-Akamai-ACS-Auth-Data", dataHeader)
|
|
|
|
req.Header.Set("X-Akamai-ACS-Auth-Sign", generateSignHeader(f, dataHeader, path, actionHeader))
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// retryErrorCodes is a slice of error codes that we will retry
|
|
|
|
var retryErrorCodes = []int{
|
|
|
|
423, // Locked
|
|
|
|
429, // Too Many Requests
|
|
|
|
500, // Internal Server Error
|
|
|
|
502, // Bad Gateway
|
|
|
|
503, // Service Unavailable
|
|
|
|
504, // Gateway Timeout
|
|
|
|
509, // Bandwidth Limit Exceeded
|
|
|
|
}
|
|
|
|
|
|
|
|
// shouldRetry returns a boolean as to whether this resp and err
|
|
|
|
// deserve to be retried. It returns the err as a convenience
|
|
|
|
func shouldRetry(ctx context.Context, resp *http.Response, err error) (bool, error) {
|
|
|
|
if fserrors.ContextError(ctx, &err) {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
return fserrors.ShouldRetry(err) || fserrors.ShouldRetryHTTP(resp, retryErrorCodes), err
|
|
|
|
}
|
|
|
|
|
|
|
|
// callBackend calls NetStorage API using either rest.Call or rest.CallXML function,
|
|
|
|
// depending on whether the response is required
|
|
|
|
func (f *Fs) callBackend(ctx context.Context, URL, method, actionHeader string, noResponse bool, response interface{}, options []fs.OpenOption) (io.ReadCloser, error) {
|
|
|
|
opts := rest.Opts{
|
|
|
|
Method: method,
|
|
|
|
RootURL: URL,
|
|
|
|
NoResponse: noResponse,
|
|
|
|
ExtraHeaders: map[string]string{
|
|
|
|
"*X-Akamai-ACS-Action": actionHeader,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if options != nil {
|
|
|
|
opts.Options = options
|
|
|
|
}
|
|
|
|
|
|
|
|
var resp *http.Response
|
|
|
|
err := f.pacer.Call(func() (bool, error) {
|
|
|
|
var err error
|
|
|
|
if response != nil {
|
|
|
|
resp, err = f.srv.CallXML(ctx, &opts, nil, response)
|
|
|
|
} else {
|
|
|
|
resp, err = f.srv.Call(ctx, &opts)
|
|
|
|
}
|
|
|
|
return shouldRetry(ctx, resp, err)
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
if resp != nil && resp.StatusCode == http.StatusNotFound {
|
|
|
|
// 404 HTTP code translates into Object not found
|
|
|
|
return nil, fs.ErrorObjectNotFound
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("failed to call NetStorage API: %w", err)
|
|
|
|
}
|
|
|
|
if noResponse {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
return resp.Body, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageStatRequest performs a NetStorage stat request
|
|
|
|
func (f *Fs) netStorageStatRequest(ctx context.Context, URL string, directory bool) ([]File, error) {
|
|
|
|
if strings.HasSuffix(URL, ".rclonelink") {
|
|
|
|
fs.Infof(nil, "Converting rclonelink to a symlink on the stat request %q", URL)
|
|
|
|
URL = strings.TrimSuffix(URL, ".rclonelink")
|
|
|
|
}
|
|
|
|
URL = strings.TrimSuffix(URL, "/")
|
|
|
|
files := f.getStatCache(URL)
|
|
|
|
if files == nil {
|
|
|
|
const actionHeader = "version=1&action=stat&implicit=yes&format=xml&encoding=utf-8&slash=both"
|
|
|
|
statResp := &Stat{}
|
|
|
|
if _, err := f.callBackend(ctx, URL, "GET", actionHeader, false, statResp, nil); err != nil {
|
|
|
|
fs.Debugf(nil, "NetStorage action stat failed for %q: %v", URL, err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
files = statResp.Files
|
|
|
|
f.setStatCache(URL, files)
|
|
|
|
}
|
2022-06-08 22:25:17 +02:00
|
|
|
// Multiple objects can be returned with the "slash=both" option,
|
|
|
|
// when file/symlink/directory has the same name
|
|
|
|
for i := range files {
|
|
|
|
if files[i].Type == "symlink" {
|
|
|
|
// Add .rclonelink suffix to allow local backend code to convert to a symlink.
|
|
|
|
files[i].Name += ".rclonelink"
|
|
|
|
fs.Infof(nil, "Converting a symlink to the rclonelink on the stat request %s", files[i].Name)
|
|
|
|
}
|
|
|
|
entrywanted := (directory && files[i].Type == "dir") ||
|
|
|
|
(!directory && files[i].Type != "dir")
|
|
|
|
if entrywanted {
|
2024-05-31 15:10:29 +02:00
|
|
|
files[0], files[i] = files[i], files[0]
|
2021-10-15 00:01:46 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return files, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageDirRequest performs a NetStorage dir request
|
2024-04-17 16:40:07 +02:00
|
|
|
func (f *Fs) netStorageDirRequest(ctx context.Context, URL string) ([]File, error) {
|
2021-10-15 00:01:46 +02:00
|
|
|
const actionHeader = "version=1&action=dir&format=xml&encoding=utf-8"
|
|
|
|
statResp := &Stat{}
|
|
|
|
if _, err := f.callBackend(ctx, URL, "GET", actionHeader, false, statResp, nil); err != nil {
|
|
|
|
if err == fs.ErrorObjectNotFound {
|
|
|
|
return nil, fs.ErrorDirNotFound
|
|
|
|
}
|
|
|
|
fs.Debugf(nil, "NetStorage action dir failed for %q: %v", URL, err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return statResp.Files, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageListRequest performs a NetStorage list request
|
|
|
|
// Second returning parameter is resumeStart string, if not empty the function should be restarted with the adjusted URL to continue the listing.
|
|
|
|
func (f *Fs) netStorageListRequest(ctx context.Context, URL, endPath string) ([]File, string, error) {
|
|
|
|
actionHeader := "version=1&action=list&mtime_all=yes&format=xml&encoding=utf-8"
|
|
|
|
if !pathIsOneLevelDeep(endPath) {
|
|
|
|
// Add end= to limit the depth to endPath
|
|
|
|
escapeEndPath := url.QueryEscape(strings.TrimSuffix(endPath, "/"))
|
|
|
|
// The "0" character exists in place of the trailing slash to
|
|
|
|
// accommodate ObjectStore directory logic
|
|
|
|
end := "&end=" + strings.TrimSuffix(escapeEndPath, "/") + "0"
|
|
|
|
actionHeader += end
|
|
|
|
}
|
|
|
|
listResp := &List{}
|
|
|
|
if _, err := f.callBackend(ctx, URL, "GET", actionHeader, false, listResp, nil); err != nil {
|
|
|
|
if err == fs.ErrorObjectNotFound {
|
|
|
|
// List action is known to return 404 for a valid [CP Code] path with no objects inside.
|
|
|
|
// Call stat to find out whether it is an empty directory or path does not exist.
|
|
|
|
fs.Debugf(nil, "NetStorage action list returned 404, call stat for %q", URL)
|
|
|
|
files, err := f.netStorageStatRequest(ctx, URL, true)
|
|
|
|
if err == nil && len(files) > 0 && files[0].Type == "dir" {
|
|
|
|
return []File{}, "", nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fs.Debugf(nil, "NetStorage action list failed for %q: %v", URL, err)
|
|
|
|
return nil, "", err
|
|
|
|
}
|
|
|
|
return listResp.Files, listResp.Resume.Start, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageUploadRequest performs a NetStorage upload request
|
|
|
|
func (o *Object) netStorageUploadRequest(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) error {
|
|
|
|
URL := o.fullURL
|
|
|
|
if URL == "" {
|
|
|
|
URL = o.fs.url(src.Remote())
|
|
|
|
}
|
|
|
|
if strings.HasSuffix(URL, ".rclonelink") {
|
2022-08-20 16:38:02 +02:00
|
|
|
bits, err := io.ReadAll(in)
|
2021-10-15 00:01:46 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
targ := string(bits)
|
|
|
|
symlinkloc := strings.TrimSuffix(URL, ".rclonelink")
|
|
|
|
fs.Infof(nil, "Converting rclonelink to a symlink on upload %s target %s", symlinkloc, targ)
|
|
|
|
_, err = o.fs.netStorageSymlinkRequest(ctx, symlinkloc, targ, &o.modTime)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
u, err := url.Parse(URL)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to parse URL %q while uploading: %w", URL, err)
|
|
|
|
}
|
|
|
|
path := u.RequestURI()
|
|
|
|
|
|
|
|
const actionHeader = "version=1&action=upload&sha256=atend&mtime=atend"
|
|
|
|
trailers := &http.Header{}
|
|
|
|
hr := newHashReader(in, sha256.New())
|
|
|
|
reader := customReader(
|
|
|
|
func(p []byte) (n int, err error) {
|
|
|
|
if n, err = hr.Read(p); err != nil && err == io.EOF {
|
|
|
|
// Send the "chunked trailer" after upload of the object
|
|
|
|
digest := hex.EncodeToString(hr.Sum(nil))
|
|
|
|
actionHeader := "version=1&action=upload&sha256=" + digest +
|
|
|
|
"&mtime=" + strconv.FormatInt(src.ModTime(ctx).Unix(), 10)
|
|
|
|
trailers.Add("X-Akamai-ACS-Action", actionHeader)
|
|
|
|
dataHeader := generateDataHeader(o.fs)
|
|
|
|
trailers.Add("X-Akamai-ACS-Auth-Data", dataHeader)
|
|
|
|
signHeader := generateSignHeader(o.fs, dataHeader, path, actionHeader)
|
|
|
|
trailers.Add("X-Akamai-ACS-Auth-Sign", signHeader)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
var resp *http.Response
|
|
|
|
opts := rest.Opts{
|
|
|
|
Method: "PUT",
|
|
|
|
RootURL: URL,
|
|
|
|
NoResponse: true,
|
|
|
|
Options: options,
|
|
|
|
Body: reader,
|
|
|
|
Trailer: trailers,
|
|
|
|
ExtraHeaders: map[string]string{
|
|
|
|
"*X-Akamai-ACS-Action": actionHeader,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
err = o.fs.pacer.CallNoRetry(func() (bool, error) {
|
|
|
|
resp, err = o.fs.srv.Call(ctx, &opts)
|
|
|
|
return shouldRetry(ctx, resp, err)
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
if resp != nil && resp.StatusCode == http.StatusNotFound {
|
|
|
|
// 404 HTTP code translates into Object not found
|
|
|
|
return fs.ErrorObjectNotFound
|
|
|
|
}
|
|
|
|
fs.Debugf(nil, "NetStorage action upload failed for %q: %v", URL, err)
|
|
|
|
// Remove failed upload
|
|
|
|
_ = o.Remove(ctx)
|
|
|
|
return fmt.Errorf("failed to call NetStorage API upload: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Invalidate stat cache
|
|
|
|
o.fs.deleteStatCache(URL)
|
|
|
|
if o.size == -1 {
|
|
|
|
files, err := o.fs.netStorageStatRequest(ctx, URL, false)
|
|
|
|
if err != nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if files != nil {
|
|
|
|
o.size = files[0].Size
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageDownloadRequest performs a NetStorage download request
|
|
|
|
func (o *Object) netStorageDownloadRequest(ctx context.Context, options []fs.OpenOption) (in io.ReadCloser, err error) {
|
|
|
|
URL := o.fullURL
|
|
|
|
// If requested file ends with .rclonelink and target has value
|
|
|
|
// then serve the content of target (the symlink target)
|
|
|
|
if strings.HasSuffix(URL, ".rclonelink") && o.target != "" {
|
|
|
|
fs.Infof(nil, "Converting a symlink to the rclonelink file on download %q", URL)
|
|
|
|
reader := strings.NewReader(o.target)
|
2022-08-20 16:38:02 +02:00
|
|
|
readcloser := io.NopCloser(reader)
|
2021-10-15 00:01:46 +02:00
|
|
|
return readcloser, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
const actionHeader = "version=1&action=download"
|
|
|
|
fs.FixRangeOption(options, o.size)
|
|
|
|
body, err := o.fs.callBackend(ctx, URL, "GET", actionHeader, false, nil, options)
|
|
|
|
if err != nil {
|
|
|
|
fs.Debugf(nil, "NetStorage action download failed for %q: %v", URL, err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return body, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageDuRequest performs a NetStorage du request
|
|
|
|
func (f *Fs) netStorageDuRequest(ctx context.Context) (interface{}, error) {
|
|
|
|
URL := f.url("")
|
|
|
|
const actionHeader = "version=1&action=du&format=xml&encoding=utf-8"
|
|
|
|
duResp := &Du{}
|
|
|
|
if _, err := f.callBackend(ctx, URL, "GET", actionHeader, false, duResp, nil); err != nil {
|
|
|
|
if err == fs.ErrorObjectNotFound {
|
|
|
|
return nil, errors.New("NetStorage du command: target is not a directory or does not exist")
|
|
|
|
}
|
|
|
|
fs.Debugf(nil, "NetStorage action du failed for %q: %v", URL, err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
//passing the output format expected from return of Command to be displayed by rclone code
|
|
|
|
out := map[string]int64{
|
|
|
|
"Number of files": duResp.Duinfo.Files,
|
|
|
|
"Total bytes": duResp.Duinfo.Bytes,
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageDuRequest performs a NetStorage symlink request
|
|
|
|
func (f *Fs) netStorageSymlinkRequest(ctx context.Context, URL string, dst string, modTime *int64) (interface{}, error) {
|
|
|
|
target := url.QueryEscape(strings.TrimSuffix(dst, "/"))
|
|
|
|
actionHeader := "version=1&action=symlink&target=" + target
|
|
|
|
if modTime != nil {
|
|
|
|
when := strconv.FormatInt(*modTime, 10)
|
|
|
|
actionHeader += "&mtime=" + when
|
|
|
|
}
|
|
|
|
if _, err := f.callBackend(ctx, URL, "POST", actionHeader, true, nil, nil); err != nil {
|
|
|
|
fs.Debugf(nil, "NetStorage action symlink failed for %q: %v", URL, err)
|
|
|
|
return nil, fmt.Errorf("symlink creation failed: %w", err)
|
|
|
|
}
|
|
|
|
f.deleteStatCache(URL)
|
|
|
|
out := map[string]string{
|
|
|
|
"Symlink successfully created": dst,
|
|
|
|
}
|
|
|
|
return out, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageMkdirRequest performs a NetStorage mkdir request
|
|
|
|
func (f *Fs) netStorageMkdirRequest(ctx context.Context, URL string) error {
|
|
|
|
const actionHeader = "version=1&action=mkdir"
|
|
|
|
if _, err := f.callBackend(ctx, URL, "POST", actionHeader, true, nil, nil); err != nil {
|
|
|
|
fs.Debugf(nil, "NetStorage action mkdir failed for %q: %v", URL, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
f.deleteStatCache(URL)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageDeleteRequest performs a NetStorage delete request
|
|
|
|
func (o *Object) netStorageDeleteRequest(ctx context.Context) error {
|
|
|
|
URL := o.fullURL
|
|
|
|
// We shouldn't be creating .rclonelink files on remote
|
|
|
|
// but delete corresponding symlink if it exists
|
|
|
|
if strings.HasSuffix(URL, ".rclonelink") {
|
|
|
|
fs.Infof(nil, "Converting rclonelink to a symlink on delete %q", URL)
|
|
|
|
URL = strings.TrimSuffix(URL, ".rclonelink")
|
|
|
|
}
|
|
|
|
|
|
|
|
const actionHeader = "version=1&action=delete"
|
|
|
|
if _, err := o.fs.callBackend(ctx, URL, "POST", actionHeader, true, nil, nil); err != nil {
|
|
|
|
fs.Debugf(nil, "NetStorage action delete failed for %q: %v", URL, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
o.fs.deleteStatCache(URL)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// netStorageRmdirRequest performs a NetStorage rmdir request
|
|
|
|
func (f *Fs) netStorageRmdirRequest(ctx context.Context, dir string) error {
|
|
|
|
URL := f.url(dir)
|
|
|
|
const actionHeader = "version=1&action=rmdir"
|
|
|
|
if _, err := f.callBackend(ctx, URL, "POST", actionHeader, true, nil, nil); err != nil {
|
|
|
|
if err == fs.ErrorObjectNotFound {
|
|
|
|
return fs.ErrorDirNotFound
|
|
|
|
}
|
|
|
|
fs.Debugf(nil, "NetStorage action rmdir failed for %q: %v", URL, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
f.deleteStatCache(URL)
|
|
|
|
f.deleteDirscreated(URL)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// deleteDirscreated deletes URL from dirscreated map thread-safely
|
|
|
|
func (f *Fs) deleteDirscreated(URL string) {
|
|
|
|
URL = strings.TrimSuffix(URL, "/")
|
|
|
|
f.dirscreatedMutex.Lock()
|
|
|
|
delete(f.dirscreated, URL)
|
|
|
|
f.dirscreatedMutex.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// setDirscreated sets to true URL in dirscreated map thread-safely
|
|
|
|
func (f *Fs) setDirscreated(URL string) {
|
|
|
|
URL = strings.TrimSuffix(URL, "/")
|
|
|
|
f.dirscreatedMutex.Lock()
|
|
|
|
f.dirscreated[URL] = true
|
|
|
|
f.dirscreatedMutex.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// testAndSetDirscreated atomic test-and-set to true URL in dirscreated map,
|
|
|
|
// returns the previous value
|
|
|
|
func (f *Fs) testAndSetDirscreated(URL string) bool {
|
|
|
|
URL = strings.TrimSuffix(URL, "/")
|
|
|
|
f.dirscreatedMutex.Lock()
|
|
|
|
oldValue := f.dirscreated[URL]
|
|
|
|
f.dirscreated[URL] = true
|
|
|
|
f.dirscreatedMutex.Unlock()
|
|
|
|
return oldValue
|
|
|
|
}
|
|
|
|
|
|
|
|
// deleteStatCache deletes URL from stat cache thread-safely
|
|
|
|
func (f *Fs) deleteStatCache(URL string) {
|
|
|
|
URL = strings.TrimSuffix(URL, "/")
|
|
|
|
f.statcacheMutex.Lock()
|
|
|
|
delete(f.statcache, URL)
|
|
|
|
f.statcacheMutex.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// getStatCache gets value from statcache map thread-safely
|
|
|
|
func (f *Fs) getStatCache(URL string) (files []File) {
|
|
|
|
URL = strings.TrimSuffix(URL, "/")
|
|
|
|
f.statcacheMutex.RLock()
|
|
|
|
files = f.statcache[URL]
|
|
|
|
f.statcacheMutex.RUnlock()
|
|
|
|
if files != nil {
|
|
|
|
fs.Debugf(nil, "NetStorage stat cache hit for %q", URL)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// setStatCache sets value to statcache map thread-safely
|
|
|
|
func (f *Fs) setStatCache(URL string, files []File) {
|
|
|
|
URL = strings.TrimSuffix(URL, "/")
|
|
|
|
f.statcacheMutex.Lock()
|
|
|
|
f.statcache[URL] = files
|
|
|
|
f.statcacheMutex.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
type hashReader struct {
|
|
|
|
io.Reader
|
|
|
|
gohash.Hash
|
|
|
|
}
|
|
|
|
|
|
|
|
func newHashReader(r io.Reader, h gohash.Hash) hashReader {
|
|
|
|
return hashReader{io.TeeReader(r, h), h}
|
|
|
|
}
|
|
|
|
|
|
|
|
type customReader func([]byte) (int, error)
|
|
|
|
|
|
|
|
func (c customReader) Read(p []byte) (n int, err error) {
|
|
|
|
return c(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
// generateRequestID generates the unique requestID
|
|
|
|
func generateRequestID() int64 {
|
|
|
|
s1 := rand.NewSource(time.Now().UnixNano())
|
|
|
|
r1 := rand.New(s1)
|
|
|
|
return r1.Int63()
|
|
|
|
}
|
|
|
|
|
|
|
|
// computeHmac256 calculates the hash for the sign header
|
|
|
|
func computeHmac256(message string, secret string) string {
|
|
|
|
key := []byte(secret)
|
|
|
|
h := hmac.New(sha256.New, key)
|
|
|
|
h.Write([]byte(message))
|
|
|
|
return base64.StdEncoding.EncodeToString(h.Sum(nil))
|
|
|
|
}
|
|
|
|
|
|
|
|
// getEpochTimeInSeconds returns current epoch time in seconds
|
|
|
|
func getEpochTimeInSeconds() int64 {
|
|
|
|
now := time.Now()
|
|
|
|
secs := now.Unix()
|
|
|
|
return secs
|
|
|
|
}
|
|
|
|
|
|
|
|
// generateDataHeader generates data header needed for making the request
|
|
|
|
func generateDataHeader(f *Fs) string {
|
|
|
|
return "5, 0.0.0.0, 0.0.0.0, " + strconv.FormatInt(getEpochTimeInSeconds(), 10) + ", " + strconv.FormatInt(generateRequestID(), 10) + "," + f.opt.Account
|
|
|
|
}
|
|
|
|
|
|
|
|
// generateSignHeader generates sign header needed for making the request
|
|
|
|
func generateSignHeader(f *Fs, dataHeader string, path string, actionHeader string) string {
|
|
|
|
var message = dataHeader + path + "\nx-akamai-acs-action:" + actionHeader + "\n"
|
|
|
|
return computeHmac256(message, f.opt.Secret)
|
|
|
|
}
|
|
|
|
|
|
|
|
// pathIsOneLevelDeep returns true if a given path does not go deeper than one level
|
|
|
|
func pathIsOneLevelDeep(path string) bool {
|
|
|
|
return !strings.Contains(strings.TrimSuffix(strings.TrimPrefix(path, "/"), "/"), "/")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the interfaces are satisfied
|
|
|
|
var (
|
|
|
|
_ fs.Fs = &Fs{}
|
|
|
|
_ fs.Purger = &Fs{}
|
|
|
|
_ fs.PutStreamer = &Fs{}
|
|
|
|
_ fs.ListRer = &Fs{}
|
|
|
|
_ fs.Object = &Object{}
|
|
|
|
)
|