2018-02-17 23:25:59 +00:00
|
|
|
// Package restic serves a remote suitable for use with restic
|
|
|
|
package restic
|
|
|
|
|
|
|
|
import (
|
2020-11-09 16:13:08 +00:00
|
|
|
"context"
|
2018-02-17 23:25:59 +00:00
|
|
|
"encoding/json"
|
2018-03-06 22:22:29 +00:00
|
|
|
"errors"
|
2018-02-17 23:25:59 +00:00
|
|
|
"net/http"
|
2018-03-06 22:22:29 +00:00
|
|
|
"os"
|
2018-02-17 23:25:59 +00:00
|
|
|
"path"
|
|
|
|
"regexp"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2019-07-28 17:47:38 +00:00
|
|
|
"github.com/rclone/rclone/cmd"
|
|
|
|
"github.com/rclone/rclone/cmd/serve/httplib"
|
|
|
|
"github.com/rclone/rclone/cmd/serve/httplib/httpflags"
|
|
|
|
"github.com/rclone/rclone/fs"
|
|
|
|
"github.com/rclone/rclone/fs/accounting"
|
2020-06-10 16:33:55 +00:00
|
|
|
"github.com/rclone/rclone/fs/config/flags"
|
2019-07-28 17:47:38 +00:00
|
|
|
"github.com/rclone/rclone/fs/operations"
|
|
|
|
"github.com/rclone/rclone/fs/walk"
|
2021-04-20 04:50:08 +00:00
|
|
|
"github.com/rclone/rclone/lib/http/serve"
|
2020-07-31 18:57:48 +00:00
|
|
|
"github.com/rclone/rclone/lib/terminal"
|
2018-02-17 23:25:59 +00:00
|
|
|
"github.com/spf13/cobra"
|
2018-03-06 22:22:29 +00:00
|
|
|
"golang.org/x/net/http2"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2019-06-07 17:47:46 +00:00
|
|
|
stdio bool
|
|
|
|
appendOnly bool
|
|
|
|
privateRepos bool
|
2020-11-09 16:13:08 +00:00
|
|
|
cacheObjects bool
|
2018-02-17 23:25:59 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
httpflags.AddFlags(Command.Flags())
|
2020-06-10 16:33:55 +00:00
|
|
|
flagSet := Command.Flags()
|
2021-08-16 09:30:01 +00:00
|
|
|
flags.BoolVarP(flagSet, &stdio, "stdio", "", false, "Run an HTTP2 server on stdin/stdout")
|
|
|
|
flags.BoolVarP(flagSet, &appendOnly, "append-only", "", false, "Disallow deletion of repository data")
|
|
|
|
flags.BoolVarP(flagSet, &privateRepos, "private-repos", "", false, "Users can only access their private repo")
|
|
|
|
flags.BoolVarP(flagSet, &cacheObjects, "cache-objects", "", true, "Cache listed objects")
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Command definition for cobra
|
|
|
|
var Command = &cobra.Command{
|
|
|
|
Use: "restic remote:path",
|
|
|
|
Short: `Serve the remote for restic's REST API.`,
|
2022-12-06 12:14:25 +00:00
|
|
|
Long: `Run a basic web server to serve a remote over restic's REST backend
|
2022-06-19 17:18:14 +00:00
|
|
|
API over HTTP. This allows restic to use rclone as a data storage
|
2018-02-17 23:25:59 +00:00
|
|
|
mechanism for cloud providers that restic does not support directly.
|
|
|
|
|
2021-11-04 11:50:43 +00:00
|
|
|
[Restic](https://restic.net/) is a command-line program for doing
|
2018-02-17 23:25:59 +00:00
|
|
|
backups.
|
|
|
|
|
|
|
|
The server will log errors. Use -v to see access logs.
|
|
|
|
|
2022-06-19 17:55:37 +00:00
|
|
|
` + "`--bwlimit`" + ` will be respected for file transfers.
|
|
|
|
Use ` + "`--stats`" + ` to control the stats printing.
|
2018-02-17 23:25:59 +00:00
|
|
|
|
|
|
|
### Setting up rclone for use by restic ###
|
|
|
|
|
|
|
|
First [set up a remote for your chosen cloud provider](/docs/#configure).
|
|
|
|
|
|
|
|
Once you have set up the remote, check it is working with, for example
|
|
|
|
"rclone lsd remote:". You may have called the remote something other
|
|
|
|
than "remote:" - just substitute whatever you called it in the
|
|
|
|
following instructions.
|
|
|
|
|
|
|
|
Now start the rclone restic server
|
|
|
|
|
|
|
|
rclone serve restic -v remote:backup
|
|
|
|
|
|
|
|
Where you can replace "backup" in the above by whatever path in the
|
|
|
|
remote you wish to use.
|
|
|
|
|
|
|
|
By default this will serve on "localhost:8080" you can change this
|
2022-06-19 17:55:37 +00:00
|
|
|
with use of the ` + "`--addr`" + ` flag.
|
2018-02-17 23:25:59 +00:00
|
|
|
|
|
|
|
You might wish to start this server on boot.
|
|
|
|
|
2022-06-19 17:55:37 +00:00
|
|
|
Adding ` + "`--cache-objects=false`" + ` will cause rclone to stop caching objects
|
2020-11-09 16:13:08 +00:00
|
|
|
returned from the List call. Caching is normally desirable as it speeds
|
|
|
|
up downloading objects, saves transactions and uses very little memory.
|
|
|
|
|
2018-02-17 23:25:59 +00:00
|
|
|
### Setting up restic to use rclone ###
|
|
|
|
|
|
|
|
Now you can [follow the restic
|
|
|
|
instructions](http://restic.readthedocs.io/en/latest/030_preparing_a_new_repo.html#rest-server)
|
|
|
|
on setting up restic.
|
|
|
|
|
|
|
|
Note that you will need restic 0.8.2 or later to interoperate with
|
|
|
|
rclone.
|
|
|
|
|
|
|
|
For the example above you will want to use "http://localhost:8080/" as
|
|
|
|
the URL for the REST server.
|
|
|
|
|
|
|
|
For example:
|
|
|
|
|
|
|
|
$ export RESTIC_REPOSITORY=rest:http://localhost:8080/
|
|
|
|
$ export RESTIC_PASSWORD=yourpassword
|
|
|
|
$ restic init
|
|
|
|
created restic backend 8b1a4b56ae at rest:http://localhost:8080/
|
2019-06-07 17:47:46 +00:00
|
|
|
|
2018-02-17 23:25:59 +00:00
|
|
|
Please note that knowledge of your password is required to access
|
|
|
|
the repository. Losing your password means that your data is
|
|
|
|
irrecoverably lost.
|
|
|
|
$ restic backup /path/to/files/to/backup
|
|
|
|
scan [/path/to/files/to/backup]
|
|
|
|
scanned 189 directories, 312 files in 0:00
|
2019-06-07 17:47:46 +00:00
|
|
|
[0:00] 100.00% 38.128 MiB / 38.128 MiB 501 / 501 items 0 errors ETA 0:00
|
2018-02-17 23:25:59 +00:00
|
|
|
duration: 0:00
|
|
|
|
snapshot 45c8fdd8 saved
|
|
|
|
|
|
|
|
#### Multiple repositories ####
|
|
|
|
|
|
|
|
Note that you can use the endpoint to host multiple repositories. Do
|
|
|
|
this by adding a directory name or path after the URL. Note that
|
|
|
|
these **must** end with /. Eg
|
|
|
|
|
|
|
|
$ export RESTIC_REPOSITORY=rest:http://localhost:8080/user1repo/
|
|
|
|
# backup user1 stuff
|
|
|
|
$ export RESTIC_REPOSITORY=rest:http://localhost:8080/user2repo/
|
|
|
|
# backup user2 stuff
|
|
|
|
|
2019-06-07 17:47:46 +00:00
|
|
|
#### Private repositories ####
|
|
|
|
|
2022-06-19 17:55:37 +00:00
|
|
|
The` + "`--private-repos`" + ` flag can be used to limit users to repositories starting
|
2020-05-22 11:22:52 +00:00
|
|
|
with a path of ` + "`/<username>/`" + `.
|
2018-02-17 23:25:59 +00:00
|
|
|
` + httplib.Help,
|
2022-11-26 22:40:49 +00:00
|
|
|
Annotations: map[string]string{
|
|
|
|
"versionIntroduced": "v1.40",
|
|
|
|
},
|
2018-02-17 23:25:59 +00:00
|
|
|
Run: func(command *cobra.Command, args []string) {
|
|
|
|
cmd.CheckArgs(1, 1, command, args)
|
|
|
|
f := cmd.NewFsSrc(args)
|
|
|
|
cmd.Run(false, true, command, func() error {
|
2020-07-26 11:06:47 +00:00
|
|
|
s := NewServer(f, &httpflags.Opt)
|
2018-03-06 22:22:29 +00:00
|
|
|
if stdio {
|
|
|
|
if terminal.IsTerminal(int(os.Stdout.Fd())) {
|
2022-06-08 20:54:39 +00:00
|
|
|
return errors.New("refusing to run HTTP2 server directly on a terminal, please let restic start rclone")
|
2018-03-06 22:22:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
conn := &StdioConn{
|
|
|
|
stdin: os.Stdin,
|
|
|
|
stdout: os.Stdout,
|
|
|
|
}
|
|
|
|
|
|
|
|
httpSrv := &http2.Server{}
|
|
|
|
opts := &http2.ServeConnOpts{
|
2020-07-26 11:06:47 +00:00
|
|
|
Handler: s,
|
2018-03-06 22:22:29 +00:00
|
|
|
}
|
|
|
|
httpSrv.ServeConn(conn, opts)
|
|
|
|
return nil
|
|
|
|
}
|
2018-11-01 17:16:31 +00:00
|
|
|
err := s.Serve()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
s.Wait()
|
2018-02-17 23:25:59 +00:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2018-03-08 10:09:56 +00:00
|
|
|
const (
|
|
|
|
resticAPIV2 = "application/vnd.x.restic.rest.v2"
|
|
|
|
)
|
|
|
|
|
2020-07-26 11:06:47 +00:00
|
|
|
// Server contains everything to run the Server
|
|
|
|
type Server struct {
|
2018-11-01 17:16:31 +00:00
|
|
|
*httplib.Server
|
2020-11-09 16:13:08 +00:00
|
|
|
f fs.Fs
|
|
|
|
cache *cache
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
2020-07-26 11:06:47 +00:00
|
|
|
// NewServer returns an HTTP server that speaks the rest protocol
|
|
|
|
func NewServer(f fs.Fs, opt *httplib.Options) *Server {
|
2018-02-17 23:25:59 +00:00
|
|
|
mux := http.NewServeMux()
|
2020-07-26 11:06:47 +00:00
|
|
|
s := &Server{
|
2018-11-01 17:16:31 +00:00
|
|
|
Server: httplib.NewServer(mux, opt),
|
|
|
|
f: f,
|
2020-11-09 16:13:08 +00:00
|
|
|
cache: newCache(),
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
2020-07-26 11:06:47 +00:00
|
|
|
mux.HandleFunc(s.Opt.BaseURL+"/", s.ServeHTTP)
|
2018-02-17 23:25:59 +00:00
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
2018-11-01 17:16:31 +00:00
|
|
|
// Serve runs the http server in the background.
|
|
|
|
//
|
|
|
|
// Use s.Close() and s.Wait() to shutdown server
|
2020-07-26 11:06:47 +00:00
|
|
|
func (s *Server) Serve() error {
|
2018-11-01 17:16:31 +00:00
|
|
|
err := s.Server.Serve()
|
2018-04-04 13:56:26 +00:00
|
|
|
if err != nil {
|
2018-11-01 17:16:31 +00:00
|
|
|
return err
|
2018-04-04 13:56:26 +00:00
|
|
|
}
|
2018-11-01 17:16:31 +00:00
|
|
|
fs.Logf(s.f, "Serving restic REST API on %s", s.URL())
|
|
|
|
return nil
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var matchData = regexp.MustCompile("(?:^|/)data/([^/]{2,})$")
|
|
|
|
|
|
|
|
// Makes a remote from a URL path. This implements the backend layout
|
|
|
|
// required by restic.
|
|
|
|
func makeRemote(path string) string {
|
|
|
|
path = strings.Trim(path, "/")
|
|
|
|
parts := matchData.FindStringSubmatch(path)
|
|
|
|
// if no data directory, layout is flat
|
|
|
|
if parts == nil {
|
|
|
|
return path
|
|
|
|
}
|
|
|
|
// otherwise map
|
|
|
|
// data/2159dd48 to
|
|
|
|
// data/21/2159dd48
|
|
|
|
fileName := parts[1]
|
|
|
|
prefix := path[:len(path)-len(fileName)]
|
|
|
|
return prefix + fileName[:2] + "/" + fileName
|
|
|
|
}
|
|
|
|
|
2020-07-26 11:06:47 +00:00
|
|
|
// ServeHTTP reads incoming requests and dispatches them
|
|
|
|
func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
2018-02-17 23:25:59 +00:00
|
|
|
w.Header().Set("Accept-Ranges", "bytes")
|
|
|
|
w.Header().Set("Server", "rclone/"+fs.Version)
|
|
|
|
|
2019-08-04 09:56:38 +00:00
|
|
|
path, ok := s.Path(w, r)
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
2018-02-17 23:25:59 +00:00
|
|
|
remote := makeRemote(path)
|
|
|
|
fs.Debugf(s.f, "%s %s", r.Method, path)
|
|
|
|
|
2019-06-07 17:47:46 +00:00
|
|
|
v := r.Context().Value(httplib.ContextUserKey)
|
|
|
|
if privateRepos && (v == nil || !strings.HasPrefix(path, "/"+v.(string)+"/")) {
|
|
|
|
http.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-02-17 23:25:59 +00:00
|
|
|
// Dispatch on path then method
|
|
|
|
if strings.HasSuffix(path, "/") {
|
|
|
|
switch r.Method {
|
|
|
|
case "GET":
|
|
|
|
s.listObjects(w, r, remote)
|
|
|
|
case "POST":
|
|
|
|
s.createRepo(w, r, remote)
|
|
|
|
default:
|
|
|
|
http.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
switch r.Method {
|
2018-10-27 16:44:07 +00:00
|
|
|
case "GET", "HEAD":
|
|
|
|
s.serveObject(w, r, remote)
|
2018-02-17 23:25:59 +00:00
|
|
|
case "POST":
|
|
|
|
s.postObject(w, r, remote)
|
|
|
|
case "DELETE":
|
|
|
|
s.deleteObject(w, r, remote)
|
|
|
|
default:
|
|
|
|
http.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-09 16:13:08 +00:00
|
|
|
// newObject returns an object with the remote given either from the
|
|
|
|
// cache or directly
|
|
|
|
func (s *Server) newObject(ctx context.Context, remote string) (fs.Object, error) {
|
|
|
|
o := s.cache.find(remote)
|
|
|
|
if o != nil {
|
|
|
|
return o, nil
|
|
|
|
}
|
|
|
|
o, err := s.f.NewObject(ctx, remote)
|
|
|
|
if err != nil {
|
|
|
|
return o, err
|
|
|
|
}
|
|
|
|
s.cache.add(remote, o)
|
|
|
|
return o, nil
|
|
|
|
}
|
|
|
|
|
2018-02-17 23:25:59 +00:00
|
|
|
// get the remote
|
2020-07-26 11:06:47 +00:00
|
|
|
func (s *Server) serveObject(w http.ResponseWriter, r *http.Request, remote string) {
|
2020-11-09 16:13:08 +00:00
|
|
|
o, err := s.newObject(r.Context(), remote)
|
2018-02-17 23:25:59 +00:00
|
|
|
if err != nil {
|
2018-10-27 16:44:07 +00:00
|
|
|
fs.Debugf(remote, "%s request error: %v", r.Method, err)
|
2018-02-17 23:25:59 +00:00
|
|
|
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
2018-10-27 16:44:07 +00:00
|
|
|
serve.Object(w, r, o)
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// postObject posts an object to the repository
|
2020-07-26 11:06:47 +00:00
|
|
|
func (s *Server) postObject(w http.ResponseWriter, r *http.Request, remote string) {
|
2018-04-04 13:49:13 +00:00
|
|
|
if appendOnly {
|
|
|
|
// make sure the file does not exist yet
|
2020-11-09 16:13:08 +00:00
|
|
|
_, err := s.newObject(r.Context(), remote)
|
2018-04-04 13:49:13 +00:00
|
|
|
if err == nil {
|
|
|
|
fs.Errorf(remote, "Post request: file already exists, refusing to overwrite in append-only mode")
|
|
|
|
http.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)
|
2018-08-30 15:45:41 +00:00
|
|
|
|
2018-04-04 13:49:13 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-08 17:42:18 +00:00
|
|
|
o, err := operations.RcatSize(r.Context(), s.f, remote, r.Body, r.ContentLength, time.Now(), nil)
|
2018-08-30 15:45:41 +00:00
|
|
|
if err != nil {
|
2019-11-18 14:13:02 +00:00
|
|
|
err = accounting.Stats(r.Context()).Error(err)
|
2018-08-30 15:45:41 +00:00
|
|
|
fs.Errorf(remote, "Post request rcat error: %v", err)
|
|
|
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
|
|
|
|
|
|
return
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
2020-11-09 16:13:08 +00:00
|
|
|
|
|
|
|
// if successfully uploaded add to cache
|
|
|
|
s.cache.add(remote, o)
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// delete the remote
|
2020-07-26 11:06:47 +00:00
|
|
|
func (s *Server) deleteObject(w http.ResponseWriter, r *http.Request, remote string) {
|
2018-03-29 18:24:41 +00:00
|
|
|
if appendOnly {
|
|
|
|
parts := strings.Split(r.URL.Path, "/")
|
|
|
|
|
|
|
|
// if path doesn't end in "/locks/:name", disallow the operation
|
|
|
|
if len(parts) < 2 || parts[len(parts)-2] != "locks" {
|
|
|
|
http.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-09 16:13:08 +00:00
|
|
|
o, err := s.newObject(r.Context(), remote)
|
2018-02-17 23:25:59 +00:00
|
|
|
if err != nil {
|
|
|
|
fs.Debugf(remote, "Delete request error: %v", err)
|
|
|
|
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-06-17 08:34:30 +00:00
|
|
|
if err := o.Remove(r.Context()); err != nil {
|
2018-02-17 23:25:59 +00:00
|
|
|
fs.Errorf(remote, "Delete request remove error: %v", err)
|
|
|
|
if err == fs.ErrorObjectNotFound {
|
|
|
|
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
|
|
|
|
} else {
|
|
|
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2020-11-09 16:13:08 +00:00
|
|
|
|
|
|
|
// remove object from cache
|
|
|
|
s.cache.remove(remote)
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// listItem is an element returned for the restic v2 list response
|
|
|
|
type listItem struct {
|
|
|
|
Name string `json:"name"`
|
|
|
|
Size int64 `json:"size"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// return type for list
|
|
|
|
type listItems []listItem
|
|
|
|
|
2020-11-09 16:13:08 +00:00
|
|
|
// add an fs.Object to the listItems
|
|
|
|
func (ls *listItems) add(o fs.Object) {
|
|
|
|
*ls = append(*ls, listItem{
|
|
|
|
Name: path.Base(o.Remote()),
|
|
|
|
Size: o.Size(),
|
|
|
|
})
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// listObjects lists all Objects of a given type in an arbitrary order.
|
2020-07-26 11:06:47 +00:00
|
|
|
func (s *Server) listObjects(w http.ResponseWriter, r *http.Request, remote string) {
|
2018-02-17 23:25:59 +00:00
|
|
|
fs.Debugf(remote, "list request")
|
|
|
|
|
2018-03-08 10:09:56 +00:00
|
|
|
if r.Header.Get("Accept") != resticAPIV2 {
|
|
|
|
fs.Errorf(remote, "Restic v2 API required")
|
|
|
|
http.Error(w, "Restic v2 API required", http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-03-07 20:59:53 +00:00
|
|
|
// make sure an empty list is returned, and not a 'nil' value
|
|
|
|
ls := listItems{}
|
|
|
|
|
2020-11-09 16:13:08 +00:00
|
|
|
// Remove all existing values from the cache
|
|
|
|
s.cache.removePrefix(remote)
|
|
|
|
|
2018-03-18 14:26:10 +00:00
|
|
|
// if remote supports ListR use that directly, otherwise use recursive Walk
|
2019-06-17 08:34:30 +00:00
|
|
|
err := walk.ListR(r.Context(), s.f, remote, true, -1, walk.ListObjects, func(entries fs.DirEntries) error {
|
2019-01-21 16:58:27 +00:00
|
|
|
for _, entry := range entries {
|
2020-11-09 16:13:08 +00:00
|
|
|
if o, ok := entry.(fs.Object); ok {
|
|
|
|
ls.add(o)
|
|
|
|
s.cache.add(o.Remote(), o)
|
|
|
|
}
|
2019-01-21 16:58:27 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
2018-02-17 23:25:59 +00:00
|
|
|
if err != nil {
|
2021-11-04 10:12:57 +00:00
|
|
|
if !errors.Is(err, fs.ErrorDirNotFound) {
|
2018-03-06 22:22:43 +00:00
|
|
|
fs.Errorf(remote, "list failed: %#v %T", err, err)
|
|
|
|
http.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)
|
|
|
|
return
|
|
|
|
}
|
2018-02-17 23:25:59 +00:00
|
|
|
}
|
|
|
|
|
2018-03-18 16:26:58 +00:00
|
|
|
w.Header().Set("Content-Type", "application/vnd.x.restic.rest.v2")
|
|
|
|
enc := json.NewEncoder(w)
|
|
|
|
err = enc.Encode(ls)
|
2018-02-17 23:25:59 +00:00
|
|
|
if err != nil {
|
2018-03-18 16:26:58 +00:00
|
|
|
fs.Errorf(remote, "failed to write list: %v", err)
|
2018-02-17 23:25:59 +00:00
|
|
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// createRepo creates repository directories.
|
|
|
|
//
|
|
|
|
// We don't bother creating the data dirs as rclone will create them on the fly
|
2020-07-26 11:06:47 +00:00
|
|
|
func (s *Server) createRepo(w http.ResponseWriter, r *http.Request, remote string) {
|
2018-02-17 23:25:59 +00:00
|
|
|
fs.Infof(remote, "Creating repository")
|
|
|
|
|
|
|
|
if r.URL.Query().Get("create") != "true" {
|
|
|
|
http.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-06-17 08:34:30 +00:00
|
|
|
err := s.f.Mkdir(r.Context(), remote)
|
2018-02-17 23:25:59 +00:00
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(remote, "Create repo failed to Mkdir: %v", err)
|
|
|
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, name := range []string{"data", "index", "keys", "locks", "snapshots"} {
|
|
|
|
dirRemote := path.Join(remote, name)
|
2019-06-17 08:34:30 +00:00
|
|
|
err := s.f.Mkdir(r.Context(), dirRemote)
|
2018-02-17 23:25:59 +00:00
|
|
|
if err != nil {
|
|
|
|
fs.Errorf(dirRemote, "Create repo failed to Mkdir: %v", err)
|
|
|
|
http.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|