rclone/backend/pcloud/pcloud.go

1381 lines
39 KiB
Go
Raw Normal View History

2017-09-19 17:09:43 +02:00
// Package pcloud provides an interface to the Pcloud
// object storage system.
package pcloud
// FIXME cleanup returns login required?
// FIXME mime type? Fix overview if implement.
import (
"context"
"errors"
2017-09-19 17:09:43 +02:00
"fmt"
"io"
"net/http"
"net/url"
"path"
"strconv"
2017-09-19 17:09:43 +02:00
"strings"
"time"
"github.com/rclone/rclone/backend/pcloud/api"
"github.com/rclone/rclone/fs"
"github.com/rclone/rclone/fs/config"
"github.com/rclone/rclone/fs/config/configmap"
"github.com/rclone/rclone/fs/config/configstruct"
"github.com/rclone/rclone/fs/config/obscure"
"github.com/rclone/rclone/fs/fserrors"
2022-06-14 14:34:37 +02:00
"github.com/rclone/rclone/fs/fshttp"
"github.com/rclone/rclone/fs/hash"
2021-11-26 20:55:50 +01:00
"github.com/rclone/rclone/fs/walk"
"github.com/rclone/rclone/lib/dircache"
"github.com/rclone/rclone/lib/encoder"
"github.com/rclone/rclone/lib/oauthutil"
"github.com/rclone/rclone/lib/pacer"
"github.com/rclone/rclone/lib/rest"
2017-09-19 17:09:43 +02:00
"golang.org/x/oauth2"
)
const (
rcloneClientID = "DnONSzyJXpm"
rcloneEncryptedClientSecret = "ej1OIF39VOQQ0PXaSdK9ztkLw3tdLNscW2157TKNQdQKkICR4uU7aFg4eFM"
minSleep = 10 * time.Millisecond
maxSleep = 2 * time.Second
decayConstant = 2 // bigger for slower decay, exponential
defaultHostname = "api.pcloud.com"
2017-09-19 17:09:43 +02:00
)
// Globals
var (
// Description of how to auth for this app
oauthConfig = &oauth2.Config{
Scopes: nil,
Endpoint: oauth2.Endpoint{
AuthURL: "https://my.pcloud.com/oauth2/authorize",
// TokenURL: "https://api.pcloud.com/oauth2_token", set by updateTokenURL
2017-09-19 17:09:43 +02:00
},
ClientID: rcloneClientID,
ClientSecret: obscure.MustReveal(rcloneEncryptedClientSecret),
2017-09-19 17:09:43 +02:00
RedirectURL: oauthutil.RedirectLocalhostURL,
}
)
// Update the TokenURL with the actual hostname
func updateTokenURL(oauthConfig *oauth2.Config, hostname string) {
oauthConfig.Endpoint.TokenURL = "https://" + hostname + "/oauth2_token"
}
2017-09-19 17:09:43 +02:00
// Register with Fs
func init() {
updateTokenURL(oauthConfig, defaultHostname)
2017-09-19 17:09:43 +02:00
fs.Register(&fs.RegInfo{
Name: "pcloud",
Description: "Pcloud",
NewFs: NewFs,
Config: func(ctx context.Context, name string, m configmap.Mapper, config fs.ConfigIn) (*fs.ConfigOut, error) {
optc := new(Options)
err := configstruct.Set(m, optc)
if err != nil {
fs.Errorf(nil, "Failed to read config: %v", err)
}
updateTokenURL(oauthConfig, optc.Hostname)
checkAuth := func(oauthConfig *oauth2.Config, auth *oauthutil.AuthResult) error {
if auth == nil || auth.Form == nil {
return errors.New("form not found in response")
}
hostname := auth.Form.Get("hostname")
if hostname == "" {
hostname = defaultHostname
}
// Save the hostname in the config
m.Set("hostname", hostname)
// Update the token URL
updateTokenURL(oauthConfig, hostname)
fs.Debugf(nil, "pcloud: got hostname %q", hostname)
return nil
}
return oauthutil.ConfigOut("", &oauthutil.Options{
OAuth2Config: oauthConfig,
CheckAuth: checkAuth,
StateBlankOK: true, // pCloud seems to drop the state parameter now - see #4210
})
2017-09-19 17:09:43 +02:00
},
Options: append(oauthutil.SharedOptions, []fs.Option{{
Name: config.ConfigEncoding,
Help: config.ConfigEncodingHelp,
Advanced: true,
// Encode invalid UTF-8 bytes as json doesn't handle them properly.
//
// TODO: Investigate Unicode simplification ( gets converted to \ server-side)
Default: (encoder.Display |
encoder.EncodeBackSlash |
encoder.EncodeInvalidUtf8),
}, {
Name: "root_folder_id",
Help: "Fill in for rclone to use a non root folder as its starting point.",
Default: "d0",
Advanced: true,
Sensitive: true,
}, {
Name: "hostname",
Help: `Hostname to connect to.
This is normally set when rclone initially does the oauth connection,
however you will need to set it by hand if you are using remote config
with rclone authorize.
`,
Default: defaultHostname,
Advanced: true,
Examples: []fs.OptionExample{{
Value: defaultHostname,
Help: "Original/US region",
}, {
Value: "eapi.pcloud.com",
Help: "EU region",
}},
2022-06-14 14:34:37 +02:00
}, {
Name: "username",
Help: `Your pcloud username.
This is only required when you want to use the cleanup command. Due to a bug
in the pcloud API the required API does not support OAuth authentication so
we have to rely on user password authentication for it.`,
Advanced: true,
Sensitive: true,
2022-06-14 14:34:37 +02:00
}, {
Name: "password",
Help: "Your pcloud password.",
IsPassword: true,
Advanced: true,
},
}...),
2017-09-19 17:09:43 +02:00
})
}
// Options defines the configuration for this backend
type Options struct {
Enc encoder.MultiEncoder `config:"encoding"`
RootFolderID string `config:"root_folder_id"`
Hostname string `config:"hostname"`
2022-06-14 14:34:37 +02:00
Username string `config:"username"`
Password string `config:"password"`
}
2017-09-19 17:09:43 +02:00
// Fs represents a remote pcloud
type Fs struct {
name string // name of this remote
root string // the path we are working on
opt Options // parsed options
features *fs.Features // optional features
ts *oauthutil.TokenSource // the token source, used to create new clients
srv *rest.Client // the connection to the server
cleanupSrv *rest.Client // the connection used for the cleanup method
dirCache *dircache.DirCache // Map of directory path to directory id
pacer *fs.Pacer // pacer for API calls
tokenRenewer *oauthutil.Renew // renew the token on expiry
2017-09-19 17:09:43 +02:00
}
// Object describes a pcloud object
//
// Will definitely have info but maybe not meta
type Object struct {
fs *Fs // what this object is part of
remote string // The remote path
hasMetaData bool // whether info below has been set
size int64 // size of the object
modTime time.Time // modification time of the object
id string // ID of the object
md5 string // MD5 if known
sha1 string // SHA1 if known
sha256 string // SHA256 if known
2017-09-19 17:09:43 +02:00
link *api.GetFileLinkResult
}
// ------------------------------------------------------------
// Name of the remote (as passed into NewFs)
func (f *Fs) Name() string {
return f.name
}
// Root of the remote (as passed into NewFs)
func (f *Fs) Root() string {
return f.root
}
// String converts this Fs to a string
func (f *Fs) String() string {
return fmt.Sprintf("pcloud root '%s'", f.root)
}
// Features returns the optional features of this Fs
func (f *Fs) Features() *fs.Features {
return f.features
}
// parsePath parses a pcloud 'url'
2017-09-19 17:09:43 +02:00
func parsePath(path string) (root string) {
root = strings.Trim(path, "/")
return
}
// retryErrorCodes is a slice of error codes that we will retry
var retryErrorCodes = []int{
429, // Too Many Requests.
500, // Internal Server Error
502, // Bad Gateway
503, // Service Unavailable
504, // Gateway Timeout
509, // Bandwidth Limit Exceeded
}
// shouldRetry returns a boolean as to whether this resp and err
// deserve to be retried. It returns the err as a convenience
func shouldRetry(ctx context.Context, resp *http.Response, err error) (bool, error) {
if fserrors.ContextError(ctx, &err) {
return false, err
}
2017-09-19 17:09:43 +02:00
doRetry := false
// Check if it is an api.Error
if apiErr, ok := err.(*api.Error); ok {
// See https://docs.pcloud.com/errors/ for error treatment
// Errors are classified as 1xxx, 2xxx, etc.
2017-09-19 17:09:43 +02:00
switch apiErr.Result / 1000 {
case 4: // 4xxx: rate limiting
doRetry = true
case 5: // 5xxx: internal errors
doRetry = true
}
}
if resp != nil && resp.StatusCode == 401 && len(resp.Header["Www-Authenticate"]) == 1 && strings.Contains(resp.Header["Www-Authenticate"][0], "expired_token") {
2017-09-19 17:09:43 +02:00
doRetry = true
fs.Debugf(nil, "Should retry: %v", err)
}
return doRetry || fserrors.ShouldRetry(err) || fserrors.ShouldRetryHTTP(resp, retryErrorCodes), err
2017-09-19 17:09:43 +02:00
}
// readMetaDataForPath reads the metadata from the path
func (f *Fs) readMetaDataForPath(ctx context.Context, path string) (info *api.Item, err error) {
2017-09-19 17:09:43 +02:00
// defer fs.Trace(f, "path=%q", path)("info=%+v, err=%v", &info, &err)
leaf, directoryID, err := f.dirCache.FindPath(ctx, path, false)
2017-09-19 17:09:43 +02:00
if err != nil {
if err == fs.ErrorDirNotFound {
return nil, fs.ErrorObjectNotFound
}
return nil, err
}
2021-11-26 20:55:50 +01:00
found, err := f.listAll(ctx, directoryID, false, true, false, func(item *api.Item) bool {
2017-09-19 17:09:43 +02:00
if item.Name == leaf {
info = item
return true
}
return false
})
if err != nil {
return nil, err
}
if !found {
return nil, fs.ErrorObjectNotFound
}
return info, nil
}
// errorHandler parses a non 2xx error response into an error
func errorHandler(resp *http.Response) error {
// Decode error response
errResponse := new(api.Error)
err := rest.DecodeJSON(resp, &errResponse)
if err != nil {
fs.Debugf(nil, "Couldn't decode error response: %v", err)
}
if errResponse.ErrorString == "" {
errResponse.ErrorString = resp.Status
}
if errResponse.Result == 0 {
errResponse.Result = resp.StatusCode
}
return errResponse
}
// NewFs constructs an Fs from the path, container:path
func NewFs(ctx context.Context, name, root string, m configmap.Mapper) (fs.Fs, error) {
// Parse config into Options struct
opt := new(Options)
err := configstruct.Set(m, opt)
if err != nil {
return nil, err
}
2017-09-19 17:09:43 +02:00
root = parsePath(root)
oAuthClient, ts, err := oauthutil.NewClient(ctx, name, m, oauthConfig)
2017-09-19 17:09:43 +02:00
if err != nil {
return nil, fmt.Errorf("failed to configure Pcloud: %w", err)
2017-09-19 17:09:43 +02:00
}
updateTokenURL(oauthConfig, opt.Hostname)
2017-09-19 17:09:43 +02:00
2022-06-14 14:34:37 +02:00
canCleanup := opt.Username != "" && opt.Password != ""
2017-09-19 17:09:43 +02:00
f := &Fs{
name: name,
root: root,
opt: *opt,
ts: ts,
srv: rest.NewClient(oAuthClient).SetRoot("https://" + opt.Hostname),
pacer: fs.NewPacer(ctx, pacer.NewDefault(pacer.MinSleep(minSleep), pacer.MaxSleep(maxSleep), pacer.DecayConstant(decayConstant))),
2017-09-19 17:09:43 +02:00
}
2022-06-14 14:34:37 +02:00
if canCleanup {
f.cleanupSrv = rest.NewClient(fshttp.NewClient(ctx)).SetRoot("https://" + opt.Hostname)
}
2017-09-19 17:09:43 +02:00
f.features = (&fs.Features{
CaseInsensitive: false,
CanHaveEmptyDirectories: true,
PartialUploads: true,
}).Fill(ctx, f)
2022-06-14 14:34:37 +02:00
if !canCleanup {
f.features.CleanUp = nil
}
2017-09-19 17:09:43 +02:00
f.srv.SetErrorHandler(errorHandler)
// Renew the token in the background
f.tokenRenewer = oauthutil.NewRenew(f.String(), f.ts, func() error {
_, err := f.readMetaDataForPath(ctx, "")
2017-09-19 17:09:43 +02:00
return err
})
// Get rootFolderID
rootID := f.opt.RootFolderID
2017-09-19 17:09:43 +02:00
f.dirCache = dircache.New(root, rootID, f)
// Find the current root
err = f.dirCache.FindRoot(ctx, false)
2017-09-19 17:09:43 +02:00
if err != nil {
// Assume it is a file
newRoot, remote := dircache.SplitPath(root)
tempF := *f
tempF.dirCache = dircache.New(newRoot, rootID, &tempF)
tempF.root = newRoot
2017-09-19 17:09:43 +02:00
// Make new Fs which is the parent
err = tempF.dirCache.FindRoot(ctx, false)
2017-09-19 17:09:43 +02:00
if err != nil {
// No root so return old f
return f, nil
}
_, err := tempF.newObjectWithInfo(ctx, remote, nil)
2017-09-19 17:09:43 +02:00
if err != nil {
if err == fs.ErrorObjectNotFound {
// File doesn't exist so return old f
return f, nil
}
return nil, err
}
// XXX: update the old f here instead of returning tempF, since
// `features` were already filled with functions having *f as a receiver.
// See https://github.com/rclone/rclone/issues/2182
f.dirCache = tempF.dirCache
f.root = tempF.root
2017-09-19 17:09:43 +02:00
// return an error with an fs which points to the parent
return f, fs.ErrorIsFile
2017-09-19 17:09:43 +02:00
}
return f, nil
}
// OpenWriterAt opens with a handle for random access writes
//
// Pass in the remote desired and the size if known.
//
// It truncates any existing object
func (f *Fs) OpenWriterAt(ctx context.Context, remote string, size int64) (fs.WriterAtCloser, error) {
client, err := f.newSingleConnClient(ctx)
if err != nil {
return nil, fmt.Errorf("create client: %w", err)
}
// init an empty file
leaf, directoryID, err := f.dirCache.FindPath(ctx, remote, true)
if err != nil {
return nil, fmt.Errorf("resolve src: %w", err)
}
openResult, err := fileOpenNew(ctx, client, f, directoryID, leaf)
if err != nil {
return nil, fmt.Errorf("open file: %w", err)
}
writer := &writerAt{
ctx: ctx,
client: client,
fs: f,
size: size,
remote: remote,
fd: openResult.FileDescriptor,
fileID: openResult.Fileid,
}
return writer, nil
}
// Create a new http client, accepting keep-alive headers, limited to single connection.
// Necessary for pcloud fileops API, as it binds the session to the underlying TCP connection.
// File descriptors are only valid within the same connection and auto-closed when the connection is closed,
// hence we need a separate client (with single connection) for each fd to avoid all sorts of errors and race conditions.
func (f *Fs) newSingleConnClient(ctx context.Context) (*rest.Client, error) {
baseClient := fshttp.NewClient(ctx)
baseClient.Transport = fshttp.NewTransportCustom(ctx, func(t *http.Transport) {
t.MaxConnsPerHost = 1
t.DisableKeepAlives = false
})
// Set our own http client in the context
ctx = oauthutil.Context(ctx, baseClient)
// create a new oauth client, re-use the token source
oAuthClient := oauth2.NewClient(ctx, f.ts)
return rest.NewClient(oAuthClient).SetRoot("https://" + f.opt.Hostname), nil
}
2017-09-19 17:09:43 +02:00
// Return an Object from a path
//
// If it can't be found it returns the error fs.ErrorObjectNotFound.
func (f *Fs) newObjectWithInfo(ctx context.Context, remote string, info *api.Item) (fs.Object, error) {
2017-09-19 17:09:43 +02:00
o := &Object{
fs: f,
remote: remote,
}
var err error
if info != nil {
// Set info
err = o.setMetaData(info)
} else {
err = o.readMetaData(ctx) // reads info and meta, returning an error
2017-09-19 17:09:43 +02:00
}
if err != nil {
return nil, err
}
return o, nil
}
// NewObject finds the Object at remote. If it can't be found
// it returns the error fs.ErrorObjectNotFound.
func (f *Fs) NewObject(ctx context.Context, remote string) (fs.Object, error) {
return f.newObjectWithInfo(ctx, remote, nil)
2017-09-19 17:09:43 +02:00
}
// FindLeaf finds a directory of name leaf in the folder with ID pathID
func (f *Fs) FindLeaf(ctx context.Context, pathID, leaf string) (pathIDOut string, found bool, err error) {
2017-09-19 17:09:43 +02:00
// Find the leaf in pathID
2021-11-26 20:55:50 +01:00
found, err = f.listAll(ctx, pathID, true, false, false, func(item *api.Item) bool {
2017-09-19 17:09:43 +02:00
if item.Name == leaf {
pathIDOut = item.ID
return true
}
return false
})
return pathIDOut, found, err
}
// CreateDir makes a directory with pathID as parent and name leaf
func (f *Fs) CreateDir(ctx context.Context, pathID, leaf string) (newID string, err error) {
2017-09-19 17:09:43 +02:00
// fs.Debugf(f, "CreateDir(%q, %q)\n", pathID, leaf)
var resp *http.Response
var result api.ItemResult
opts := rest.Opts{
Method: "POST",
Path: "/createfolder",
Parameters: url.Values{},
}
opts.Parameters.Set("name", f.opt.Enc.FromStandardName(leaf))
2017-09-19 17:09:43 +02:00
opts.Parameters.Set("folderid", dirIDtoNumber(pathID))
err = f.pacer.Call(func() (bool, error) {
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
//fmt.Printf("...Error %v\n", err)
return "", err
}
// fmt.Printf("...Id %q\n", *info.Id)
return result.Metadata.ID, nil
}
// Converts a dirID which is usually 'd' followed by digits into just
// the digits
func dirIDtoNumber(dirID string) string {
if len(dirID) > 0 && dirID[0] == 'd' {
return dirID[1:]
}
fs.Debugf(nil, "Invalid directory id %q", dirID)
return dirID
}
// Converts a fileID which is usually 'f' followed by digits into just
// the digits
func fileIDtoNumber(fileID string) string {
if len(fileID) > 0 && fileID[0] == 'f' {
return fileID[1:]
}
2019-02-07 18:41:17 +01:00
fs.Debugf(nil, "Invalid file id %q", fileID)
2017-09-19 17:09:43 +02:00
return fileID
}
// list the objects into the function supplied
//
// If directories is set it only sends directories
// User function to process a File item from listAll
//
// Should return true to finish processing
type listAllFn func(*api.Item) bool
// Lists the directory required calling the user function on each item found
//
// If the user fn ever returns true then it early exits with found = true
2021-11-26 20:55:50 +01:00
func (f *Fs) listAll(ctx context.Context, dirID string, directoriesOnly bool, filesOnly bool, recursive bool, fn listAllFn) (found bool, err error) {
2017-09-19 17:09:43 +02:00
opts := rest.Opts{
Method: "GET",
Path: "/listfolder",
Parameters: url.Values{},
}
2021-11-26 20:55:50 +01:00
if recursive {
opts.Parameters.Set("recursive", "1")
}
2017-09-19 17:09:43 +02:00
opts.Parameters.Set("folderid", dirIDtoNumber(dirID))
var result api.ItemResult
var resp *http.Response
err = f.pacer.Call(func() (bool, error) {
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
return found, fmt.Errorf("couldn't list files: %w", err)
2017-09-19 17:09:43 +02:00
}
2021-11-26 20:55:50 +01:00
var recursiveContents func(is []api.Item, path string)
recursiveContents = func(is []api.Item, path string) {
for i := range is {
item := &is[i]
if item.IsFolder {
if filesOnly {
continue
}
} else {
if directoriesOnly {
continue
}
2017-09-19 17:09:43 +02:00
}
2021-11-26 20:55:50 +01:00
item.Name = path + f.opt.Enc.ToStandardName(item.Name)
if fn(item) {
found = true
break
}
if recursive {
recursiveContents(item.Contents, item.Name+"/")
2017-09-19 17:09:43 +02:00
}
}
}
2021-11-26 20:55:50 +01:00
recursiveContents(result.Metadata.Contents, "")
2017-09-19 17:09:43 +02:00
return
}
2021-11-26 20:55:50 +01:00
// listHelper iterates over all items from the directory
// and calls the callback for each element.
func (f *Fs) listHelper(ctx context.Context, dir string, recursive bool, callback func(entries fs.DirEntry) error) (err error) {
directoryID, err := f.dirCache.FindDir(ctx, dir, false)
2017-09-19 17:09:43 +02:00
if err != nil {
2021-11-26 20:55:50 +01:00
return err
2017-09-19 17:09:43 +02:00
}
var iErr error
2021-11-26 20:55:50 +01:00
_, err = f.listAll(ctx, directoryID, false, false, recursive, func(info *api.Item) bool {
2017-09-19 17:09:43 +02:00
remote := path.Join(dir, info.Name)
if info.IsFolder {
// cache the directory ID for later lookups
f.dirCache.Put(remote, info.ID)
d := fs.NewDir(remote, info.ModTime()).SetID(info.ID)
// FIXME more info from dir?
2021-11-26 20:55:50 +01:00
iErr = callback(d)
2017-09-19 17:09:43 +02:00
} else {
o, err := f.newObjectWithInfo(ctx, remote, info)
2017-09-19 17:09:43 +02:00
if err != nil {
iErr = err
return true
}
2021-11-26 20:55:50 +01:00
iErr = callback(o)
}
if iErr != nil {
return true
2017-09-19 17:09:43 +02:00
}
return false
})
if err != nil {
2021-11-26 20:55:50 +01:00
return err
2017-09-19 17:09:43 +02:00
}
if iErr != nil {
2021-11-26 20:55:50 +01:00
return iErr
}
return nil
}
// List the objects and directories in dir into entries. The
// entries can be returned in any order but should be for a
// complete directory.
//
// dir should be "" to list the root, and should not have
// trailing slashes.
//
// This should return ErrDirNotFound if the directory isn't
// found.
func (f *Fs) List(ctx context.Context, dir string) (entries fs.DirEntries, err error) {
err = f.listHelper(ctx, dir, false, func(o fs.DirEntry) error {
entries = append(entries, o)
return nil
})
return entries, err
}
// ListR lists the objects and directories of the Fs starting
// from dir recursively into out.
func (f *Fs) ListR(ctx context.Context, dir string, callback fs.ListRCallback) (err error) {
list := walk.NewListRHelper(callback)
err = f.listHelper(ctx, dir, true, func(o fs.DirEntry) error {
return list.Add(o)
})
if err != nil {
return err
2017-09-19 17:09:43 +02:00
}
2021-11-26 20:55:50 +01:00
return list.Flush()
2017-09-19 17:09:43 +02:00
}
// Creates from the parameters passed in a half finished Object which
// must have setMetaData called on it
//
// Returns the object, leaf, directoryID and error.
2017-09-19 17:09:43 +02:00
//
// Used to create new objects
func (f *Fs) createObject(ctx context.Context, remote string, modTime time.Time, size int64) (o *Object, leaf string, directoryID string, err error) {
2017-09-19 17:09:43 +02:00
// Create the directory for the object if it doesn't exist
leaf, directoryID, err = f.dirCache.FindPath(ctx, remote, true)
2017-09-19 17:09:43 +02:00
if err != nil {
return
}
// Temporary Object under construction
o = &Object{
fs: f,
remote: remote,
}
return o, leaf, directoryID, nil
}
// Put the object into the container
//
// Copy the reader in to the new object which is returned.
2017-09-19 17:09:43 +02:00
//
// The new object may have been created if an error is returned
func (f *Fs) Put(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {
2017-09-19 17:09:43 +02:00
remote := src.Remote()
size := src.Size()
modTime := src.ModTime(ctx)
2017-09-19 17:09:43 +02:00
o, _, _, err := f.createObject(ctx, remote, modTime, size)
2017-09-19 17:09:43 +02:00
if err != nil {
return nil, err
}
return o, o.Update(ctx, in, src, options...)
2017-09-19 17:09:43 +02:00
}
// Mkdir creates the container if it doesn't exist
func (f *Fs) Mkdir(ctx context.Context, dir string) error {
_, err := f.dirCache.FindDir(ctx, dir, true)
2017-09-19 17:09:43 +02:00
return err
}
// purgeCheck removes the root directory, if check is set then it
// refuses to do so if it has anything in
func (f *Fs) purgeCheck(ctx context.Context, dir string, check bool) error {
2017-09-19 17:09:43 +02:00
root := path.Join(f.root, dir)
if root == "" {
return errors.New("can't purge root directory")
}
dc := f.dirCache
rootID, err := dc.FindDir(ctx, dir, false)
2017-09-19 17:09:43 +02:00
if err != nil {
return err
}
opts := rest.Opts{
Method: "POST",
Path: "/deletefolder",
Parameters: url.Values{},
}
opts.Parameters.Set("folderid", dirIDtoNumber(rootID))
if !check {
opts.Path = "/deletefolderrecursive"
}
var resp *http.Response
var result api.ItemResult
err = f.pacer.Call(func() (bool, error) {
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
return fmt.Errorf("rmdir failed: %w", err)
2017-09-19 17:09:43 +02:00
}
f.dirCache.FlushDir(dir)
if err != nil {
return err
}
return nil
}
// Rmdir deletes the root folder
//
// Returns an error if it isn't empty
func (f *Fs) Rmdir(ctx context.Context, dir string) error {
return f.purgeCheck(ctx, dir, true)
2017-09-19 17:09:43 +02:00
}
// Precision return the precision of this Fs
func (f *Fs) Precision() time.Duration {
return time.Second
}
// Copy src to this remote using server-side copy operations.
2017-09-19 17:09:43 +02:00
//
// This is stored with the remote path given.
2017-09-19 17:09:43 +02:00
//
// It returns the destination Object and a possible error.
2017-09-19 17:09:43 +02:00
//
// Will only be called if src.Fs().Name() == f.Name()
//
// If it isn't possible then return fs.ErrorCantCopy
func (f *Fs) Copy(ctx context.Context, src fs.Object, remote string) (fs.Object, error) {
2017-09-19 17:09:43 +02:00
srcObj, ok := src.(*Object)
if !ok {
fs.Debugf(src, "Can't copy - not same remote type")
return nil, fs.ErrorCantCopy
}
err := srcObj.readMetaData(ctx)
2017-09-19 17:09:43 +02:00
if err != nil {
return nil, err
}
// Create temporary object
dstObj, leaf, directoryID, err := f.createObject(ctx, remote, srcObj.modTime, srcObj.size)
2017-09-19 17:09:43 +02:00
if err != nil {
return nil, err
}
// Copy the object
opts := rest.Opts{
Method: "POST",
Path: "/copyfile",
Parameters: url.Values{},
}
opts.Parameters.Set("fileid", fileIDtoNumber(srcObj.id))
opts.Parameters.Set("toname", f.opt.Enc.FromStandardName(leaf))
2017-09-19 17:09:43 +02:00
opts.Parameters.Set("tofolderid", dirIDtoNumber(directoryID))
opts.Parameters.Set("mtime", fmt.Sprintf("%d", uint64(srcObj.modTime.Unix())))
2017-09-19 17:09:43 +02:00
var resp *http.Response
var result api.ItemResult
err = f.pacer.Call(func() (bool, error) {
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
return nil, err
}
err = dstObj.setMetaData(&result.Metadata)
if err != nil {
return nil, err
}
return dstObj, nil
}
// Purge deletes all the files in the directory
2017-09-19 17:09:43 +02:00
//
// Optional interface: Only implement this if you have a way of
// deleting all the files quicker than just running Remove() on the
// result of List()
func (f *Fs) Purge(ctx context.Context, dir string) error {
return f.purgeCheck(ctx, dir, false)
2017-09-19 17:09:43 +02:00
}
// CleanUp empties the trash
func (f *Fs) CleanUp(ctx context.Context) error {
rootID, err := f.dirCache.RootID(ctx, false)
2017-09-19 17:09:43 +02:00
if err != nil {
return err
}
opts := rest.Opts{
Method: "POST",
Path: "/trash_clear",
Parameters: url.Values{},
}
opts.Parameters.Set("folderid", dirIDtoNumber(rootID))
2022-06-14 14:34:37 +02:00
opts.Parameters.Set("username", f.opt.Username)
opts.Parameters.Set("password", obscure.MustReveal(f.opt.Password))
2017-09-19 17:09:43 +02:00
var resp *http.Response
var result api.Error
return f.pacer.Call(func() (bool, error) {
2022-06-14 14:34:37 +02:00
resp, err = f.cleanupSrv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
}
// Move src to this remote using server-side move operations.
2017-09-19 17:09:43 +02:00
//
// This is stored with the remote path given.
2017-09-19 17:09:43 +02:00
//
// It returns the destination Object and a possible error.
2017-09-19 17:09:43 +02:00
//
// Will only be called if src.Fs().Name() == f.Name()
//
// If it isn't possible then return fs.ErrorCantMove
func (f *Fs) Move(ctx context.Context, src fs.Object, remote string) (fs.Object, error) {
2017-09-19 17:09:43 +02:00
srcObj, ok := src.(*Object)
if !ok {
fs.Debugf(src, "Can't move - not same remote type")
return nil, fs.ErrorCantMove
}
// Create temporary object
dstObj, leaf, directoryID, err := f.createObject(ctx, remote, srcObj.modTime, srcObj.size)
2017-09-19 17:09:43 +02:00
if err != nil {
return nil, err
}
// Do the move
opts := rest.Opts{
Method: "POST",
Path: "/renamefile",
Parameters: url.Values{},
}
opts.Parameters.Set("fileid", fileIDtoNumber(srcObj.id))
opts.Parameters.Set("toname", f.opt.Enc.FromStandardName(leaf))
2017-09-19 17:09:43 +02:00
opts.Parameters.Set("tofolderid", dirIDtoNumber(directoryID))
var resp *http.Response
var result api.ItemResult
err = f.pacer.Call(func() (bool, error) {
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
return nil, err
}
err = dstObj.setMetaData(&result.Metadata)
if err != nil {
return nil, err
}
return dstObj, nil
}
// DirMove moves src, srcRemote to this remote at dstRemote
// using server-side move operations.
2017-09-19 17:09:43 +02:00
//
// Will only be called if src.Fs().Name() == f.Name()
//
// If it isn't possible then return fs.ErrorCantDirMove
//
// If destination exists then return fs.ErrorDirExists
func (f *Fs) DirMove(ctx context.Context, src fs.Fs, srcRemote, dstRemote string) error {
2017-09-19 17:09:43 +02:00
srcFs, ok := src.(*Fs)
if !ok {
fs.Debugf(srcFs, "Can't move directory - not same remote type")
return fs.ErrorCantDirMove
}
srcID, _, _, dstDirectoryID, dstLeaf, err := f.dirCache.DirMove(ctx, srcFs.dirCache, srcFs.root, srcRemote, f.root, dstRemote)
2017-09-19 17:09:43 +02:00
if err != nil {
return err
}
// Do the move
opts := rest.Opts{
Method: "POST",
Path: "/renamefolder",
Parameters: url.Values{},
}
opts.Parameters.Set("folderid", dirIDtoNumber(srcID))
opts.Parameters.Set("toname", f.opt.Enc.FromStandardName(dstLeaf))
opts.Parameters.Set("tofolderid", dirIDtoNumber(dstDirectoryID))
2017-09-19 17:09:43 +02:00
var resp *http.Response
var result api.ItemResult
err = f.pacer.Call(func() (bool, error) {
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
return err
}
srcFs.dirCache.FlushDir(srcRemote)
return nil
}
// DirCacheFlush resets the directory cache - used in testing as an
// optional interface
func (f *Fs) DirCacheFlush() {
f.dirCache.ResetRoot()
}
2020-06-19 18:09:48 +02:00
func (f *Fs) linkDir(ctx context.Context, dirID string, expire fs.Duration) (string, error) {
opts := rest.Opts{
Method: "POST",
Path: "/getfolderpublink",
Parameters: url.Values{},
}
var result api.PubLinkResult
opts.Parameters.Set("folderid", dirIDtoNumber(dirID))
err := f.pacer.Call(func() (bool, error) {
resp, err := f.srv.CallJSON(ctx, &opts, nil, &result)
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2020-06-19 18:09:48 +02:00
})
if err != nil {
return "", err
}
return result.Link, err
}
func (f *Fs) linkFile(ctx context.Context, path string, expire fs.Duration) (string, error) {
obj, err := f.NewObject(ctx, path)
if err != nil {
return "", err
}
o := obj.(*Object)
2020-06-19 18:09:48 +02:00
opts := rest.Opts{
Method: "POST",
Path: "/getfilepublink",
Parameters: url.Values{},
}
var result api.PubLinkResult
opts.Parameters.Set("fileid", fileIDtoNumber(o.id))
err = f.pacer.Call(func() (bool, error) {
2020-06-19 18:09:48 +02:00
resp, err := f.srv.CallJSON(ctx, &opts, nil, &result)
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2020-06-19 18:09:48 +02:00
})
if err != nil {
return "", err
}
return result.Link, nil
}
// PublicLink adds a "readable by anyone with link" permission on the given file or folder.
func (f *Fs) PublicLink(ctx context.Context, remote string, expire fs.Duration, unlink bool) (string, error) {
dirID, err := f.dirCache.FindDir(ctx, remote, false)
if err == fs.ErrorDirNotFound {
return f.linkFile(ctx, remote, expire)
}
if err != nil {
return "", err
}
return f.linkDir(ctx, dirID, expire)
}
// About gets quota information
func (f *Fs) About(ctx context.Context) (usage *fs.Usage, err error) {
opts := rest.Opts{
Method: "POST",
Path: "/userinfo",
}
var resp *http.Response
var q api.UserInfo
err = f.pacer.Call(func() (bool, error) {
resp, err = f.srv.CallJSON(ctx, &opts, nil, &q)
err = q.Error.Update(err)
return shouldRetry(ctx, resp, err)
})
if err != nil {
2022-01-14 22:18:32 +01:00
return nil, err
}
free := q.Quota - q.UsedQuota
if free < 0 {
free = 0
}
usage = &fs.Usage{
Total: fs.NewUsageValue(q.Quota), // quota of bytes that can be used
Used: fs.NewUsageValue(q.UsedQuota), // bytes in use
Free: fs.NewUsageValue(free), // bytes which can be uploaded before reaching the quota
}
return usage, nil
}
// Shutdown shutdown the fs
func (f *Fs) Shutdown(ctx context.Context) error {
f.tokenRenewer.Shutdown()
return nil
}
2017-09-19 17:09:43 +02:00
// Hashes returns the supported hash sets.
func (f *Fs) Hashes() hash.Set {
// EU region supports SHA1 and SHA256 (but rclone doesn't
// support SHA256 yet).
//
// https://forum.rclone.org/t/pcloud-to-local-no-hashes-in-common/19440
if f.opt.Hostname == "eapi.pcloud.com" {
return hash.Set(hash.SHA1 | hash.SHA256)
}
return hash.Set(hash.MD5 | hash.SHA1)
2017-09-19 17:09:43 +02:00
}
// ------------------------------------------------------------
// Fs returns the parent Fs
func (o *Object) Fs() fs.Info {
return o.fs
}
// Return a string version
func (o *Object) String() string {
if o == nil {
return "<nil>"
}
return o.remote
}
// Remote returns the remote path
func (o *Object) Remote() string {
return o.remote
}
// getHashes fetches the hashes into the object
func (o *Object) getHashes(ctx context.Context) (err error) {
2017-09-19 17:09:43 +02:00
var resp *http.Response
var result api.ChecksumFileResult
opts := rest.Opts{
Method: "GET",
Path: "/checksumfile",
Parameters: url.Values{},
}
opts.Parameters.Set("fileid", fileIDtoNumber(o.id))
err = o.fs.pacer.Call(func() (bool, error) {
resp, err = o.fs.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
return err
}
o.setHashes(&result.Hashes)
return o.setMetaData(&result.Metadata)
}
// Hash returns the SHA-1 of an object returning a lowercase hex string
func (o *Object) Hash(ctx context.Context, t hash.Type) (string, error) {
var pHash *string
switch t {
case hash.MD5:
pHash = &o.md5
case hash.SHA1:
pHash = &o.sha1
case hash.SHA256:
pHash = &o.sha256
default:
return "", hash.ErrUnsupported
2017-09-19 17:09:43 +02:00
}
if o.md5 == "" && o.sha1 == "" && o.sha256 == "" {
err := o.getHashes(ctx)
2017-09-19 17:09:43 +02:00
if err != nil {
return "", fmt.Errorf("failed to get hash: %w", err)
2017-09-19 17:09:43 +02:00
}
}
return *pHash, nil
2017-09-19 17:09:43 +02:00
}
// Size returns the size of an object in bytes
func (o *Object) Size() int64 {
err := o.readMetaData(context.TODO())
2017-09-19 17:09:43 +02:00
if err != nil {
fs.Logf(o, "Failed to read metadata: %v", err)
return 0
}
return o.size
}
// setMetaData sets the metadata from info
func (o *Object) setMetaData(info *api.Item) (err error) {
if info.IsFolder {
return fmt.Errorf("%q is a folder: %w", o.remote, fs.ErrorNotAFile)
2017-09-19 17:09:43 +02:00
}
o.hasMetaData = true
o.size = info.Size
o.modTime = info.ModTime()
o.id = info.ID
return nil
}
// setHashes sets the hashes from that passed in
func (o *Object) setHashes(hashes *api.Hashes) {
o.sha1 = hashes.SHA1
o.md5 = hashes.MD5
o.sha256 = hashes.SHA256
2017-09-19 17:09:43 +02:00
}
// readMetaData gets the metadata if it hasn't already been fetched
//
// it also sets the info
func (o *Object) readMetaData(ctx context.Context) (err error) {
2017-09-19 17:09:43 +02:00
if o.hasMetaData {
return nil
}
info, err := o.fs.readMetaDataForPath(ctx, o.remote)
2017-09-19 17:09:43 +02:00
if err != nil {
//if apiErr, ok := err.(*api.Error); ok {
// FIXME
// if apiErr.Code == "not_found" || apiErr.Code == "trashed" {
// return fs.ErrorObjectNotFound
// }
//}
return err
}
return o.setMetaData(info)
}
// ModTime returns the modification time of the object
//
// It attempts to read the objects mtime and if that isn't present the
// LastModified returned in the http headers
func (o *Object) ModTime(ctx context.Context) time.Time {
err := o.readMetaData(ctx)
2017-09-19 17:09:43 +02:00
if err != nil {
fs.Logf(o, "Failed to read metadata: %v", err)
return time.Now()
}
return o.modTime
}
// SetModTime sets the modification time of the local fs object
func (o *Object) SetModTime(ctx context.Context, modTime time.Time) error {
filename, directoryID, err := o.fs.dirCache.FindPath(ctx, o.Remote(), true)
if err != nil {
return err
}
fileID := fileIDtoNumber(o.id)
filename = o.fs.opt.Enc.FromStandardName(filename)
opts := rest.Opts{
Method: "PUT",
Path: "/copyfile",
Parameters: url.Values{},
TransferEncoding: []string{"identity"}, // pcloud doesn't like chunked encoding
ExtraHeaders: map[string]string{
"Connection": "keep-alive",
},
}
opts.Parameters.Set("fileid", fileID)
opts.Parameters.Set("folderid", dirIDtoNumber(directoryID))
opts.Parameters.Set("toname", filename)
opts.Parameters.Set("tofolderid", dirIDtoNumber(directoryID))
opts.Parameters.Set("ctime", strconv.FormatInt(modTime.Unix(), 10))
opts.Parameters.Set("mtime", strconv.FormatInt(modTime.Unix(), 10))
result := &api.ItemResult{}
err = o.fs.pacer.CallNoRetry(func() (bool, error) {
resp, err := o.fs.srv.CallJSON(ctx, &opts, nil, result)
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
})
if err != nil {
return fmt.Errorf("update mtime: copyfile: %w", err)
}
if err := o.setMetaData(&result.Metadata); err != nil {
return err
}
return nil
2017-09-19 17:09:43 +02:00
}
// Storable returns a boolean showing whether this object storable
func (o *Object) Storable() bool {
return true
}
// downloadURL fetches the download link
func (o *Object) downloadURL(ctx context.Context) (URL string, err error) {
2017-09-19 17:09:43 +02:00
if o.id == "" {
return "", errors.New("can't download - no id")
}
if o.link.IsValid() {
return o.link.URL(), nil
}
var resp *http.Response
var result api.GetFileLinkResult
opts := rest.Opts{
Method: "GET",
Path: "/getfilelink",
Parameters: url.Values{},
}
opts.Parameters.Set("fileid", fileIDtoNumber(o.id))
err = o.fs.pacer.Call(func() (bool, error) {
resp, err = o.fs.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
return "", err
}
if !result.IsValid() {
return "", fmt.Errorf("fetched invalid link %+v", result)
2017-09-19 17:09:43 +02:00
}
o.link = &result
return o.link.URL(), nil
}
// Open an object for read
func (o *Object) Open(ctx context.Context, options ...fs.OpenOption) (in io.ReadCloser, err error) {
url, err := o.downloadURL(ctx)
2017-09-19 17:09:43 +02:00
if err != nil {
return nil, err
}
var resp *http.Response
opts := rest.Opts{
Method: "GET",
RootURL: url,
Options: options,
}
err = o.fs.pacer.Call(func() (bool, error) {
resp, err = o.fs.srv.Call(ctx, &opts)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
return nil, err
}
return resp.Body, err
}
// Update the object with the contents of the io.Reader, modTime and size
//
// If existing is set then it updates the object rather than creating a new one.
2017-09-19 17:09:43 +02:00
//
// The new object may have been created if an error is returned
func (o *Object) Update(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (err error) {
2017-09-19 17:09:43 +02:00
o.fs.tokenRenewer.Start()
defer o.fs.tokenRenewer.Stop()
size := src.Size() // NB can upload without size
modTime := src.ModTime(ctx)
2017-09-19 17:09:43 +02:00
remote := o.Remote()
if size < 0 {
return errors.New("can't upload unknown sizes objects")
}
2017-09-19 17:09:43 +02:00
// Create the directory for the object if it doesn't exist
leaf, directoryID, err := o.fs.dirCache.FindPath(ctx, remote, true)
2017-09-19 17:09:43 +02:00
if err != nil {
return err
}
// Experiments with pcloud indicate that it doesn't like any
// form of request which doesn't have a Content-Length.
// According to the docs if you close the connection at the
// end then it should work without Content-Length, but I
// couldn't get this to work using opts.Close (which sets
// http.Request.Close).
//
// This means that chunked transfer encoding needs to be
// disabled and a Content-Length needs to be supplied. This
// also rules out streaming.
//
// Docs: https://docs.pcloud.com/methods/file/uploadfile.html
var resp *http.Response
var result api.UploadFileResponse
opts := rest.Opts{
Method: "PUT",
Path: "/uploadfile",
Body: in,
ContentType: fs.MimeType(ctx, src),
2017-09-19 17:09:43 +02:00
ContentLength: &size,
Parameters: url.Values{},
TransferEncoding: []string{"identity"}, // pcloud doesn't like chunked encoding
Options: options,
2017-09-19 17:09:43 +02:00
}
leaf = o.fs.opt.Enc.FromStandardName(leaf)
2017-09-19 17:09:43 +02:00
opts.Parameters.Set("filename", leaf)
opts.Parameters.Set("folderid", dirIDtoNumber(directoryID))
opts.Parameters.Set("nopartial", "1")
opts.Parameters.Set("mtime", fmt.Sprintf("%d", uint64(modTime.Unix())))
2017-09-19 17:09:43 +02:00
// Special treatment for a 0 length upload. This doesn't work
// with PUT even with Content-Length set (by setting
// opts.Body=0), so upload it as a multipart form POST with
2017-09-19 17:09:43 +02:00
// Content-Length set.
if size == 0 {
formReader, contentType, overhead, err := rest.MultipartUpload(ctx, in, opts.Parameters, "content", leaf)
2017-09-19 17:09:43 +02:00
if err != nil {
return fmt.Errorf("failed to make multipart upload for 0 length file: %w", err)
2017-09-19 17:09:43 +02:00
}
contentLength := overhead + size
2017-09-19 17:09:43 +02:00
opts.ContentType = contentType
opts.Body = formReader
2017-09-19 17:09:43 +02:00
opts.Method = "POST"
opts.Parameters = nil
opts.ContentLength = &contentLength
2017-09-19 17:09:43 +02:00
}
err = o.fs.pacer.CallNoRetry(func() (bool, error) {
resp, err = o.fs.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
if err != nil {
// sometimes pcloud leaves a half complete file on
// error, so delete it if it exists, trying a few times
for i := 0; i < 5; i++ {
delObj, delErr := o.fs.NewObject(ctx, o.remote)
if delErr == nil && delObj != nil {
_ = delObj.Remove(ctx)
break
}
time.Sleep(time.Second)
}
2017-09-19 17:09:43 +02:00
return err
}
if len(result.Items) != 1 {
return fmt.Errorf("failed to upload %v - not sure why", o)
2017-09-19 17:09:43 +02:00
}
o.setHashes(&result.Checksums[0])
return o.setMetaData(&result.Items[0])
}
// Remove an object
func (o *Object) Remove(ctx context.Context) error {
2017-09-19 17:09:43 +02:00
opts := rest.Opts{
Method: "POST",
Path: "/deletefile",
Parameters: url.Values{},
}
var result api.ItemResult
opts.Parameters.Set("fileid", fileIDtoNumber(o.id))
return o.fs.pacer.Call(func() (bool, error) {
resp, err := o.fs.srv.CallJSON(ctx, &opts, nil, &result)
2017-09-19 17:09:43 +02:00
err = result.Error.Update(err)
return shouldRetry(ctx, resp, err)
2017-09-19 17:09:43 +02:00
})
}
// ID returns the ID of the Object if known, or "" if not
func (o *Object) ID() string {
return o.id
}
2017-09-19 17:09:43 +02:00
// Check the interfaces are satisfied
var (
_ fs.Fs = (*Fs)(nil)
_ fs.Purger = (*Fs)(nil)
_ fs.CleanUpper = (*Fs)(nil)
_ fs.Copier = (*Fs)(nil)
_ fs.Mover = (*Fs)(nil)
_ fs.DirMover = (*Fs)(nil)
_ fs.DirCacheFlusher = (*Fs)(nil)
2020-06-19 18:09:48 +02:00
_ fs.PublicLinker = (*Fs)(nil)
_ fs.Abouter = (*Fs)(nil)
_ fs.Shutdowner = (*Fs)(nil)
2017-09-19 17:09:43 +02:00
_ fs.Object = (*Object)(nil)
_ fs.IDer = (*Object)(nil)
2017-09-19 17:09:43 +02:00
)