1380 lines
39 KiB
Go
1380 lines
39 KiB
Go
// Package pcloud provides an interface to the Pcloud
|
|
// object storage system.
|
|
package pcloud
|
|
|
|
// FIXME cleanup returns login required?
|
|
|
|
// FIXME mime type? Fix overview if implement.
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"path"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/rclone/rclone/backend/pcloud/api"
|
|
"github.com/rclone/rclone/fs"
|
|
"github.com/rclone/rclone/fs/config"
|
|
"github.com/rclone/rclone/fs/config/configmap"
|
|
"github.com/rclone/rclone/fs/config/configstruct"
|
|
"github.com/rclone/rclone/fs/config/obscure"
|
|
"github.com/rclone/rclone/fs/fserrors"
|
|
"github.com/rclone/rclone/fs/fshttp"
|
|
"github.com/rclone/rclone/fs/hash"
|
|
"github.com/rclone/rclone/fs/walk"
|
|
"github.com/rclone/rclone/lib/dircache"
|
|
"github.com/rclone/rclone/lib/encoder"
|
|
"github.com/rclone/rclone/lib/oauthutil"
|
|
"github.com/rclone/rclone/lib/pacer"
|
|
"github.com/rclone/rclone/lib/rest"
|
|
"golang.org/x/oauth2"
|
|
)
|
|
|
|
const (
|
|
rcloneClientID = "DnONSzyJXpm"
|
|
rcloneEncryptedClientSecret = "ej1OIF39VOQQ0PXaSdK9ztkLw3tdLNscW2157TKNQdQKkICR4uU7aFg4eFM"
|
|
minSleep = 10 * time.Millisecond
|
|
maxSleep = 2 * time.Second
|
|
decayConstant = 2 // bigger for slower decay, exponential
|
|
defaultHostname = "api.pcloud.com"
|
|
)
|
|
|
|
// Globals
|
|
var (
|
|
// Description of how to auth for this app
|
|
oauthConfig = &oauth2.Config{
|
|
Scopes: nil,
|
|
Endpoint: oauth2.Endpoint{
|
|
AuthURL: "https://my.pcloud.com/oauth2/authorize",
|
|
// TokenURL: "https://api.pcloud.com/oauth2_token", set by updateTokenURL
|
|
},
|
|
ClientID: rcloneClientID,
|
|
ClientSecret: obscure.MustReveal(rcloneEncryptedClientSecret),
|
|
RedirectURL: oauthutil.RedirectLocalhostURL,
|
|
}
|
|
)
|
|
|
|
// Update the TokenURL with the actual hostname
|
|
func updateTokenURL(oauthConfig *oauth2.Config, hostname string) {
|
|
oauthConfig.Endpoint.TokenURL = "https://" + hostname + "/oauth2_token"
|
|
}
|
|
|
|
// Register with Fs
|
|
func init() {
|
|
updateTokenURL(oauthConfig, defaultHostname)
|
|
fs.Register(&fs.RegInfo{
|
|
Name: "pcloud",
|
|
Description: "Pcloud",
|
|
NewFs: NewFs,
|
|
Config: func(ctx context.Context, name string, m configmap.Mapper, config fs.ConfigIn) (*fs.ConfigOut, error) {
|
|
optc := new(Options)
|
|
err := configstruct.Set(m, optc)
|
|
if err != nil {
|
|
fs.Errorf(nil, "Failed to read config: %v", err)
|
|
}
|
|
updateTokenURL(oauthConfig, optc.Hostname)
|
|
checkAuth := func(oauthConfig *oauth2.Config, auth *oauthutil.AuthResult) error {
|
|
if auth == nil || auth.Form == nil {
|
|
return errors.New("form not found in response")
|
|
}
|
|
hostname := auth.Form.Get("hostname")
|
|
if hostname == "" {
|
|
hostname = defaultHostname
|
|
}
|
|
// Save the hostname in the config
|
|
m.Set("hostname", hostname)
|
|
// Update the token URL
|
|
updateTokenURL(oauthConfig, hostname)
|
|
fs.Debugf(nil, "pcloud: got hostname %q", hostname)
|
|
return nil
|
|
}
|
|
return oauthutil.ConfigOut("", &oauthutil.Options{
|
|
OAuth2Config: oauthConfig,
|
|
CheckAuth: checkAuth,
|
|
StateBlankOK: true, // pCloud seems to drop the state parameter now - see #4210
|
|
})
|
|
},
|
|
Options: append(oauthutil.SharedOptions, []fs.Option{{
|
|
Name: config.ConfigEncoding,
|
|
Help: config.ConfigEncodingHelp,
|
|
Advanced: true,
|
|
// Encode invalid UTF-8 bytes as json doesn't handle them properly.
|
|
//
|
|
// TODO: Investigate Unicode simplification (\ gets converted to \ server-side)
|
|
Default: (encoder.Display |
|
|
encoder.EncodeBackSlash |
|
|
encoder.EncodeInvalidUtf8),
|
|
}, {
|
|
Name: "root_folder_id",
|
|
Help: "Fill in for rclone to use a non root folder as its starting point.",
|
|
Default: "d0",
|
|
Advanced: true,
|
|
Sensitive: true,
|
|
}, {
|
|
Name: "hostname",
|
|
Help: `Hostname to connect to.
|
|
|
|
This is normally set when rclone initially does the oauth connection,
|
|
however you will need to set it by hand if you are using remote config
|
|
with rclone authorize.
|
|
`,
|
|
Default: defaultHostname,
|
|
Advanced: true,
|
|
Examples: []fs.OptionExample{{
|
|
Value: defaultHostname,
|
|
Help: "Original/US region",
|
|
}, {
|
|
Value: "eapi.pcloud.com",
|
|
Help: "EU region",
|
|
}},
|
|
}, {
|
|
Name: "username",
|
|
Help: `Your pcloud username.
|
|
|
|
This is only required when you want to use the cleanup command. Due to a bug
|
|
in the pcloud API the required API does not support OAuth authentication so
|
|
we have to rely on user password authentication for it.`,
|
|
Advanced: true,
|
|
Sensitive: true,
|
|
}, {
|
|
Name: "password",
|
|
Help: "Your pcloud password.",
|
|
IsPassword: true,
|
|
Advanced: true,
|
|
},
|
|
}...),
|
|
})
|
|
}
|
|
|
|
// Options defines the configuration for this backend
|
|
type Options struct {
|
|
Enc encoder.MultiEncoder `config:"encoding"`
|
|
RootFolderID string `config:"root_folder_id"`
|
|
Hostname string `config:"hostname"`
|
|
Username string `config:"username"`
|
|
Password string `config:"password"`
|
|
}
|
|
|
|
// Fs represents a remote pcloud
|
|
type Fs struct {
|
|
name string // name of this remote
|
|
root string // the path we are working on
|
|
opt Options // parsed options
|
|
features *fs.Features // optional features
|
|
ts *oauthutil.TokenSource // the token source, used to create new clients
|
|
srv *rest.Client // the connection to the server
|
|
cleanupSrv *rest.Client // the connection used for the cleanup method
|
|
dirCache *dircache.DirCache // Map of directory path to directory id
|
|
pacer *fs.Pacer // pacer for API calls
|
|
tokenRenewer *oauthutil.Renew // renew the token on expiry
|
|
}
|
|
|
|
// Object describes a pcloud object
|
|
//
|
|
// Will definitely have info but maybe not meta
|
|
type Object struct {
|
|
fs *Fs // what this object is part of
|
|
remote string // The remote path
|
|
hasMetaData bool // whether info below has been set
|
|
size int64 // size of the object
|
|
modTime time.Time // modification time of the object
|
|
id string // ID of the object
|
|
md5 string // MD5 if known
|
|
sha1 string // SHA1 if known
|
|
sha256 string // SHA256 if known
|
|
link *api.GetFileLinkResult
|
|
}
|
|
|
|
// ------------------------------------------------------------
|
|
|
|
// Name of the remote (as passed into NewFs)
|
|
func (f *Fs) Name() string {
|
|
return f.name
|
|
}
|
|
|
|
// Root of the remote (as passed into NewFs)
|
|
func (f *Fs) Root() string {
|
|
return f.root
|
|
}
|
|
|
|
// String converts this Fs to a string
|
|
func (f *Fs) String() string {
|
|
return fmt.Sprintf("pcloud root '%s'", f.root)
|
|
}
|
|
|
|
// Features returns the optional features of this Fs
|
|
func (f *Fs) Features() *fs.Features {
|
|
return f.features
|
|
}
|
|
|
|
// parsePath parses a pcloud 'url'
|
|
func parsePath(path string) (root string) {
|
|
root = strings.Trim(path, "/")
|
|
return
|
|
}
|
|
|
|
// retryErrorCodes is a slice of error codes that we will retry
|
|
var retryErrorCodes = []int{
|
|
429, // Too Many Requests.
|
|
500, // Internal Server Error
|
|
502, // Bad Gateway
|
|
503, // Service Unavailable
|
|
504, // Gateway Timeout
|
|
509, // Bandwidth Limit Exceeded
|
|
}
|
|
|
|
// shouldRetry returns a boolean as to whether this resp and err
|
|
// deserve to be retried. It returns the err as a convenience
|
|
func shouldRetry(ctx context.Context, resp *http.Response, err error) (bool, error) {
|
|
if fserrors.ContextError(ctx, &err) {
|
|
return false, err
|
|
}
|
|
doRetry := false
|
|
|
|
// Check if it is an api.Error
|
|
if apiErr, ok := err.(*api.Error); ok {
|
|
// See https://docs.pcloud.com/errors/ for error treatment
|
|
// Errors are classified as 1xxx, 2xxx, etc.
|
|
switch apiErr.Result / 1000 {
|
|
case 4: // 4xxx: rate limiting
|
|
doRetry = true
|
|
case 5: // 5xxx: internal errors
|
|
doRetry = true
|
|
}
|
|
}
|
|
|
|
if resp != nil && resp.StatusCode == 401 && len(resp.Header["Www-Authenticate"]) == 1 && strings.Contains(resp.Header["Www-Authenticate"][0], "expired_token") {
|
|
doRetry = true
|
|
fs.Debugf(nil, "Should retry: %v", err)
|
|
}
|
|
return doRetry || fserrors.ShouldRetry(err) || fserrors.ShouldRetryHTTP(resp, retryErrorCodes), err
|
|
}
|
|
|
|
// readMetaDataForPath reads the metadata from the path
|
|
func (f *Fs) readMetaDataForPath(ctx context.Context, path string) (info *api.Item, err error) {
|
|
// defer fs.Trace(f, "path=%q", path)("info=%+v, err=%v", &info, &err)
|
|
leaf, directoryID, err := f.dirCache.FindPath(ctx, path, false)
|
|
if err != nil {
|
|
if err == fs.ErrorDirNotFound {
|
|
return nil, fs.ErrorObjectNotFound
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
found, err := f.listAll(ctx, directoryID, false, true, false, func(item *api.Item) bool {
|
|
if item.Name == leaf {
|
|
info = item
|
|
return true
|
|
}
|
|
return false
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if !found {
|
|
return nil, fs.ErrorObjectNotFound
|
|
}
|
|
return info, nil
|
|
}
|
|
|
|
// errorHandler parses a non 2xx error response into an error
|
|
func errorHandler(resp *http.Response) error {
|
|
// Decode error response
|
|
errResponse := new(api.Error)
|
|
err := rest.DecodeJSON(resp, &errResponse)
|
|
if err != nil {
|
|
fs.Debugf(nil, "Couldn't decode error response: %v", err)
|
|
}
|
|
if errResponse.ErrorString == "" {
|
|
errResponse.ErrorString = resp.Status
|
|
}
|
|
if errResponse.Result == 0 {
|
|
errResponse.Result = resp.StatusCode
|
|
}
|
|
return errResponse
|
|
}
|
|
|
|
// NewFs constructs an Fs from the path, container:path
|
|
func NewFs(ctx context.Context, name, root string, m configmap.Mapper) (fs.Fs, error) {
|
|
// Parse config into Options struct
|
|
opt := new(Options)
|
|
err := configstruct.Set(m, opt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
root = parsePath(root)
|
|
oAuthClient, ts, err := oauthutil.NewClient(ctx, name, m, oauthConfig)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to configure Pcloud: %w", err)
|
|
}
|
|
updateTokenURL(oauthConfig, opt.Hostname)
|
|
|
|
canCleanup := opt.Username != "" && opt.Password != ""
|
|
f := &Fs{
|
|
name: name,
|
|
root: root,
|
|
opt: *opt,
|
|
ts: ts,
|
|
srv: rest.NewClient(oAuthClient).SetRoot("https://" + opt.Hostname),
|
|
pacer: fs.NewPacer(ctx, pacer.NewDefault(pacer.MinSleep(minSleep), pacer.MaxSleep(maxSleep), pacer.DecayConstant(decayConstant))),
|
|
}
|
|
if canCleanup {
|
|
f.cleanupSrv = rest.NewClient(fshttp.NewClient(ctx)).SetRoot("https://" + opt.Hostname)
|
|
}
|
|
f.features = (&fs.Features{
|
|
CaseInsensitive: false,
|
|
CanHaveEmptyDirectories: true,
|
|
PartialUploads: true,
|
|
}).Fill(ctx, f)
|
|
if !canCleanup {
|
|
f.features.CleanUp = nil
|
|
}
|
|
f.srv.SetErrorHandler(errorHandler)
|
|
|
|
// Renew the token in the background
|
|
f.tokenRenewer = oauthutil.NewRenew(f.String(), f.ts, func() error {
|
|
_, err := f.readMetaDataForPath(ctx, "")
|
|
return err
|
|
})
|
|
|
|
// Get rootFolderID
|
|
rootID := f.opt.RootFolderID
|
|
f.dirCache = dircache.New(root, rootID, f)
|
|
|
|
// Find the current root
|
|
err = f.dirCache.FindRoot(ctx, false)
|
|
if err != nil {
|
|
// Assume it is a file
|
|
newRoot, remote := dircache.SplitPath(root)
|
|
tempF := *f
|
|
tempF.dirCache = dircache.New(newRoot, rootID, &tempF)
|
|
tempF.root = newRoot
|
|
// Make new Fs which is the parent
|
|
err = tempF.dirCache.FindRoot(ctx, false)
|
|
if err != nil {
|
|
// No root so return old f
|
|
return f, nil
|
|
}
|
|
_, err := tempF.newObjectWithInfo(ctx, remote, nil)
|
|
if err != nil {
|
|
if err == fs.ErrorObjectNotFound {
|
|
// File doesn't exist so return old f
|
|
return f, nil
|
|
}
|
|
return nil, err
|
|
}
|
|
// XXX: update the old f here instead of returning tempF, since
|
|
// `features` were already filled with functions having *f as a receiver.
|
|
// See https://github.com/rclone/rclone/issues/2182
|
|
f.dirCache = tempF.dirCache
|
|
f.root = tempF.root
|
|
// return an error with an fs which points to the parent
|
|
return f, fs.ErrorIsFile
|
|
}
|
|
return f, nil
|
|
}
|
|
|
|
// OpenWriterAt opens with a handle for random access writes
|
|
//
|
|
// Pass in the remote desired and the size if known.
|
|
//
|
|
// It truncates any existing object
|
|
func (f *Fs) OpenWriterAt(ctx context.Context, remote string, size int64) (fs.WriterAtCloser, error) {
|
|
client, err := f.newSingleConnClient(ctx)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("create client: %w", err)
|
|
}
|
|
// init an empty file
|
|
leaf, directoryID, err := f.dirCache.FindPath(ctx, remote, true)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("resolve src: %w", err)
|
|
}
|
|
openResult, err := fileOpenNew(ctx, client, f, directoryID, leaf)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("open file: %w", err)
|
|
}
|
|
|
|
writer := &writerAt{
|
|
ctx: ctx,
|
|
client: client,
|
|
fs: f,
|
|
size: size,
|
|
remote: remote,
|
|
fd: openResult.FileDescriptor,
|
|
fileID: openResult.Fileid,
|
|
}
|
|
|
|
return writer, nil
|
|
}
|
|
|
|
// Create a new http client, accepting keep-alive headers, limited to single connection.
|
|
// Necessary for pcloud fileops API, as it binds the session to the underlying TCP connection.
|
|
// File descriptors are only valid within the same connection and auto-closed when the connection is closed,
|
|
// hence we need a separate client (with single connection) for each fd to avoid all sorts of errors and race conditions.
|
|
func (f *Fs) newSingleConnClient(ctx context.Context) (*rest.Client, error) {
|
|
baseClient := fshttp.NewClient(ctx)
|
|
baseClient.Transport = fshttp.NewTransportCustom(ctx, func(t *http.Transport) {
|
|
t.MaxConnsPerHost = 1
|
|
t.DisableKeepAlives = false
|
|
})
|
|
// Set our own http client in the context
|
|
ctx = oauthutil.Context(ctx, baseClient)
|
|
// create a new oauth client, re-use the token source
|
|
oAuthClient := oauth2.NewClient(ctx, f.ts)
|
|
return rest.NewClient(oAuthClient).SetRoot("https://" + f.opt.Hostname), nil
|
|
}
|
|
|
|
// Return an Object from a path
|
|
//
|
|
// If it can't be found it returns the error fs.ErrorObjectNotFound.
|
|
func (f *Fs) newObjectWithInfo(ctx context.Context, remote string, info *api.Item) (fs.Object, error) {
|
|
o := &Object{
|
|
fs: f,
|
|
remote: remote,
|
|
}
|
|
var err error
|
|
if info != nil {
|
|
// Set info
|
|
err = o.setMetaData(info)
|
|
} else {
|
|
err = o.readMetaData(ctx) // reads info and meta, returning an error
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return o, nil
|
|
}
|
|
|
|
// NewObject finds the Object at remote. If it can't be found
|
|
// it returns the error fs.ErrorObjectNotFound.
|
|
func (f *Fs) NewObject(ctx context.Context, remote string) (fs.Object, error) {
|
|
return f.newObjectWithInfo(ctx, remote, nil)
|
|
}
|
|
|
|
// FindLeaf finds a directory of name leaf in the folder with ID pathID
|
|
func (f *Fs) FindLeaf(ctx context.Context, pathID, leaf string) (pathIDOut string, found bool, err error) {
|
|
// Find the leaf in pathID
|
|
found, err = f.listAll(ctx, pathID, true, false, false, func(item *api.Item) bool {
|
|
if item.Name == leaf {
|
|
pathIDOut = item.ID
|
|
return true
|
|
}
|
|
return false
|
|
})
|
|
return pathIDOut, found, err
|
|
}
|
|
|
|
// CreateDir makes a directory with pathID as parent and name leaf
|
|
func (f *Fs) CreateDir(ctx context.Context, pathID, leaf string) (newID string, err error) {
|
|
// fs.Debugf(f, "CreateDir(%q, %q)\n", pathID, leaf)
|
|
var resp *http.Response
|
|
var result api.ItemResult
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/createfolder",
|
|
Parameters: url.Values{},
|
|
}
|
|
opts.Parameters.Set("name", f.opt.Enc.FromStandardName(leaf))
|
|
opts.Parameters.Set("folderid", dirIDtoNumber(pathID))
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
//fmt.Printf("...Error %v\n", err)
|
|
return "", err
|
|
}
|
|
// fmt.Printf("...Id %q\n", *info.Id)
|
|
return result.Metadata.ID, nil
|
|
}
|
|
|
|
// Converts a dirID which is usually 'd' followed by digits into just
|
|
// the digits
|
|
func dirIDtoNumber(dirID string) string {
|
|
if len(dirID) > 0 && dirID[0] == 'd' {
|
|
return dirID[1:]
|
|
}
|
|
fs.Debugf(nil, "Invalid directory id %q", dirID)
|
|
return dirID
|
|
}
|
|
|
|
// Converts a fileID which is usually 'f' followed by digits into just
|
|
// the digits
|
|
func fileIDtoNumber(fileID string) string {
|
|
if len(fileID) > 0 && fileID[0] == 'f' {
|
|
return fileID[1:]
|
|
}
|
|
fs.Debugf(nil, "Invalid file id %q", fileID)
|
|
return fileID
|
|
}
|
|
|
|
// list the objects into the function supplied
|
|
//
|
|
// If directories is set it only sends directories
|
|
// User function to process a File item from listAll
|
|
//
|
|
// Should return true to finish processing
|
|
type listAllFn func(*api.Item) bool
|
|
|
|
// Lists the directory required calling the user function on each item found
|
|
//
|
|
// If the user fn ever returns true then it early exits with found = true
|
|
func (f *Fs) listAll(ctx context.Context, dirID string, directoriesOnly bool, filesOnly bool, recursive bool, fn listAllFn) (found bool, err error) {
|
|
opts := rest.Opts{
|
|
Method: "GET",
|
|
Path: "/listfolder",
|
|
Parameters: url.Values{},
|
|
}
|
|
if recursive {
|
|
opts.Parameters.Set("recursive", "1")
|
|
}
|
|
opts.Parameters.Set("folderid", dirIDtoNumber(dirID))
|
|
|
|
var result api.ItemResult
|
|
var resp *http.Response
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return found, fmt.Errorf("couldn't list files: %w", err)
|
|
}
|
|
var recursiveContents func(is []api.Item, path string)
|
|
recursiveContents = func(is []api.Item, path string) {
|
|
for i := range is {
|
|
item := &is[i]
|
|
if item.IsFolder {
|
|
if filesOnly {
|
|
continue
|
|
}
|
|
} else {
|
|
if directoriesOnly {
|
|
continue
|
|
}
|
|
}
|
|
item.Name = path + f.opt.Enc.ToStandardName(item.Name)
|
|
if fn(item) {
|
|
found = true
|
|
break
|
|
}
|
|
if recursive {
|
|
recursiveContents(item.Contents, item.Name+"/")
|
|
}
|
|
}
|
|
}
|
|
recursiveContents(result.Metadata.Contents, "")
|
|
return
|
|
}
|
|
|
|
// listHelper iterates over all items from the directory
|
|
// and calls the callback for each element.
|
|
func (f *Fs) listHelper(ctx context.Context, dir string, recursive bool, callback func(entries fs.DirEntry) error) (err error) {
|
|
directoryID, err := f.dirCache.FindDir(ctx, dir, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var iErr error
|
|
_, err = f.listAll(ctx, directoryID, false, false, recursive, func(info *api.Item) bool {
|
|
remote := path.Join(dir, info.Name)
|
|
if info.IsFolder {
|
|
// cache the directory ID for later lookups
|
|
f.dirCache.Put(remote, info.ID)
|
|
d := fs.NewDir(remote, info.ModTime()).SetID(info.ID)
|
|
// FIXME more info from dir?
|
|
iErr = callback(d)
|
|
} else {
|
|
o, err := f.newObjectWithInfo(ctx, remote, info)
|
|
if err != nil {
|
|
iErr = err
|
|
return true
|
|
}
|
|
iErr = callback(o)
|
|
}
|
|
if iErr != nil {
|
|
return true
|
|
}
|
|
return false
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if iErr != nil {
|
|
return iErr
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// List the objects and directories in dir into entries. The
|
|
// entries can be returned in any order but should be for a
|
|
// complete directory.
|
|
//
|
|
// dir should be "" to list the root, and should not have
|
|
// trailing slashes.
|
|
//
|
|
// This should return ErrDirNotFound if the directory isn't
|
|
// found.
|
|
func (f *Fs) List(ctx context.Context, dir string) (entries fs.DirEntries, err error) {
|
|
err = f.listHelper(ctx, dir, false, func(o fs.DirEntry) error {
|
|
entries = append(entries, o)
|
|
return nil
|
|
})
|
|
return entries, err
|
|
}
|
|
|
|
// ListR lists the objects and directories of the Fs starting
|
|
// from dir recursively into out.
|
|
func (f *Fs) ListR(ctx context.Context, dir string, callback fs.ListRCallback) (err error) {
|
|
list := walk.NewListRHelper(callback)
|
|
err = f.listHelper(ctx, dir, true, func(o fs.DirEntry) error {
|
|
return list.Add(o)
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return list.Flush()
|
|
}
|
|
|
|
// Creates from the parameters passed in a half finished Object which
|
|
// must have setMetaData called on it
|
|
//
|
|
// Returns the object, leaf, directoryID and error.
|
|
//
|
|
// Used to create new objects
|
|
func (f *Fs) createObject(ctx context.Context, remote string, modTime time.Time, size int64) (o *Object, leaf string, directoryID string, err error) {
|
|
// Create the directory for the object if it doesn't exist
|
|
leaf, directoryID, err = f.dirCache.FindPath(ctx, remote, true)
|
|
if err != nil {
|
|
return
|
|
}
|
|
// Temporary Object under construction
|
|
o = &Object{
|
|
fs: f,
|
|
remote: remote,
|
|
}
|
|
return o, leaf, directoryID, nil
|
|
}
|
|
|
|
// Put the object into the container
|
|
//
|
|
// Copy the reader in to the new object which is returned.
|
|
//
|
|
// The new object may have been created if an error is returned
|
|
func (f *Fs) Put(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {
|
|
remote := src.Remote()
|
|
size := src.Size()
|
|
modTime := src.ModTime(ctx)
|
|
|
|
o, _, _, err := f.createObject(ctx, remote, modTime, size)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return o, o.Update(ctx, in, src, options...)
|
|
}
|
|
|
|
// Mkdir creates the container if it doesn't exist
|
|
func (f *Fs) Mkdir(ctx context.Context, dir string) error {
|
|
_, err := f.dirCache.FindDir(ctx, dir, true)
|
|
return err
|
|
}
|
|
|
|
// purgeCheck removes the root directory, if check is set then it
|
|
// refuses to do so if it has anything in
|
|
func (f *Fs) purgeCheck(ctx context.Context, dir string, check bool) error {
|
|
root := path.Join(f.root, dir)
|
|
if root == "" {
|
|
return errors.New("can't purge root directory")
|
|
}
|
|
dc := f.dirCache
|
|
rootID, err := dc.FindDir(ctx, dir, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/deletefolder",
|
|
Parameters: url.Values{},
|
|
}
|
|
opts.Parameters.Set("folderid", dirIDtoNumber(rootID))
|
|
if !check {
|
|
opts.Path = "/deletefolderrecursive"
|
|
}
|
|
var resp *http.Response
|
|
var result api.ItemResult
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("rmdir failed: %w", err)
|
|
}
|
|
f.dirCache.FlushDir(dir)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Rmdir deletes the root folder
|
|
//
|
|
// Returns an error if it isn't empty
|
|
func (f *Fs) Rmdir(ctx context.Context, dir string) error {
|
|
return f.purgeCheck(ctx, dir, true)
|
|
}
|
|
|
|
// Precision return the precision of this Fs
|
|
func (f *Fs) Precision() time.Duration {
|
|
return time.Second
|
|
}
|
|
|
|
// Copy src to this remote using server-side copy operations.
|
|
//
|
|
// This is stored with the remote path given.
|
|
//
|
|
// It returns the destination Object and a possible error.
|
|
//
|
|
// Will only be called if src.Fs().Name() == f.Name()
|
|
//
|
|
// If it isn't possible then return fs.ErrorCantCopy
|
|
func (f *Fs) Copy(ctx context.Context, src fs.Object, remote string) (fs.Object, error) {
|
|
srcObj, ok := src.(*Object)
|
|
if !ok {
|
|
fs.Debugf(src, "Can't copy - not same remote type")
|
|
return nil, fs.ErrorCantCopy
|
|
}
|
|
err := srcObj.readMetaData(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Create temporary object
|
|
dstObj, leaf, directoryID, err := f.createObject(ctx, remote, srcObj.modTime, srcObj.size)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Copy the object
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/copyfile",
|
|
Parameters: url.Values{},
|
|
}
|
|
opts.Parameters.Set("fileid", fileIDtoNumber(srcObj.id))
|
|
opts.Parameters.Set("toname", f.opt.Enc.FromStandardName(leaf))
|
|
opts.Parameters.Set("tofolderid", dirIDtoNumber(directoryID))
|
|
opts.Parameters.Set("mtime", fmt.Sprintf("%d", uint64(srcObj.modTime.Unix())))
|
|
var resp *http.Response
|
|
var result api.ItemResult
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
err = dstObj.setMetaData(&result.Metadata)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return dstObj, nil
|
|
}
|
|
|
|
// Purge deletes all the files in the directory
|
|
//
|
|
// Optional interface: Only implement this if you have a way of
|
|
// deleting all the files quicker than just running Remove() on the
|
|
// result of List()
|
|
func (f *Fs) Purge(ctx context.Context, dir string) error {
|
|
return f.purgeCheck(ctx, dir, false)
|
|
}
|
|
|
|
// CleanUp empties the trash
|
|
func (f *Fs) CleanUp(ctx context.Context) error {
|
|
rootID, err := f.dirCache.RootID(ctx, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/trash_clear",
|
|
Parameters: url.Values{},
|
|
}
|
|
opts.Parameters.Set("folderid", dirIDtoNumber(rootID))
|
|
opts.Parameters.Set("username", f.opt.Username)
|
|
opts.Parameters.Set("password", obscure.MustReveal(f.opt.Password))
|
|
var resp *http.Response
|
|
var result api.Error
|
|
return f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.cleanupSrv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
}
|
|
|
|
// Move src to this remote using server-side move operations.
|
|
//
|
|
// This is stored with the remote path given.
|
|
//
|
|
// It returns the destination Object and a possible error.
|
|
//
|
|
// Will only be called if src.Fs().Name() == f.Name()
|
|
//
|
|
// If it isn't possible then return fs.ErrorCantMove
|
|
func (f *Fs) Move(ctx context.Context, src fs.Object, remote string) (fs.Object, error) {
|
|
srcObj, ok := src.(*Object)
|
|
if !ok {
|
|
fs.Debugf(src, "Can't move - not same remote type")
|
|
return nil, fs.ErrorCantMove
|
|
}
|
|
|
|
// Create temporary object
|
|
dstObj, leaf, directoryID, err := f.createObject(ctx, remote, srcObj.modTime, srcObj.size)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Do the move
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/renamefile",
|
|
Parameters: url.Values{},
|
|
}
|
|
opts.Parameters.Set("fileid", fileIDtoNumber(srcObj.id))
|
|
opts.Parameters.Set("toname", f.opt.Enc.FromStandardName(leaf))
|
|
opts.Parameters.Set("tofolderid", dirIDtoNumber(directoryID))
|
|
var resp *http.Response
|
|
var result api.ItemResult
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
err = dstObj.setMetaData(&result.Metadata)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return dstObj, nil
|
|
}
|
|
|
|
// DirMove moves src, srcRemote to this remote at dstRemote
|
|
// using server-side move operations.
|
|
//
|
|
// Will only be called if src.Fs().Name() == f.Name()
|
|
//
|
|
// If it isn't possible then return fs.ErrorCantDirMove
|
|
//
|
|
// If destination exists then return fs.ErrorDirExists
|
|
func (f *Fs) DirMove(ctx context.Context, src fs.Fs, srcRemote, dstRemote string) error {
|
|
srcFs, ok := src.(*Fs)
|
|
if !ok {
|
|
fs.Debugf(srcFs, "Can't move directory - not same remote type")
|
|
return fs.ErrorCantDirMove
|
|
}
|
|
|
|
srcID, _, _, dstDirectoryID, dstLeaf, err := f.dirCache.DirMove(ctx, srcFs.dirCache, srcFs.root, srcRemote, f.root, dstRemote)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Do the move
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/renamefolder",
|
|
Parameters: url.Values{},
|
|
}
|
|
opts.Parameters.Set("folderid", dirIDtoNumber(srcID))
|
|
opts.Parameters.Set("toname", f.opt.Enc.FromStandardName(dstLeaf))
|
|
opts.Parameters.Set("tofolderid", dirIDtoNumber(dstDirectoryID))
|
|
var resp *http.Response
|
|
var result api.ItemResult
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
srcFs.dirCache.FlushDir(srcRemote)
|
|
return nil
|
|
}
|
|
|
|
// DirCacheFlush resets the directory cache - used in testing as an
|
|
// optional interface
|
|
func (f *Fs) DirCacheFlush() {
|
|
f.dirCache.ResetRoot()
|
|
}
|
|
|
|
func (f *Fs) linkDir(ctx context.Context, dirID string, expire fs.Duration) (string, error) {
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/getfolderpublink",
|
|
Parameters: url.Values{},
|
|
}
|
|
var result api.PubLinkResult
|
|
opts.Parameters.Set("folderid", dirIDtoNumber(dirID))
|
|
err := f.pacer.Call(func() (bool, error) {
|
|
resp, err := f.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return result.Link, err
|
|
}
|
|
|
|
func (f *Fs) linkFile(ctx context.Context, path string, expire fs.Duration) (string, error) {
|
|
obj, err := f.NewObject(ctx, path)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
o := obj.(*Object)
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/getfilepublink",
|
|
Parameters: url.Values{},
|
|
}
|
|
var result api.PubLinkResult
|
|
opts.Parameters.Set("fileid", fileIDtoNumber(o.id))
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err := f.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return result.Link, nil
|
|
}
|
|
|
|
// PublicLink adds a "readable by anyone with link" permission on the given file or folder.
|
|
func (f *Fs) PublicLink(ctx context.Context, remote string, expire fs.Duration, unlink bool) (string, error) {
|
|
dirID, err := f.dirCache.FindDir(ctx, remote, false)
|
|
if err == fs.ErrorDirNotFound {
|
|
return f.linkFile(ctx, remote, expire)
|
|
}
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return f.linkDir(ctx, dirID, expire)
|
|
}
|
|
|
|
// About gets quota information
|
|
func (f *Fs) About(ctx context.Context) (usage *fs.Usage, err error) {
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/userinfo",
|
|
}
|
|
var resp *http.Response
|
|
var q api.UserInfo
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.srv.CallJSON(ctx, &opts, nil, &q)
|
|
err = q.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
free := q.Quota - q.UsedQuota
|
|
if free < 0 {
|
|
free = 0
|
|
}
|
|
usage = &fs.Usage{
|
|
Total: fs.NewUsageValue(q.Quota), // quota of bytes that can be used
|
|
Used: fs.NewUsageValue(q.UsedQuota), // bytes in use
|
|
Free: fs.NewUsageValue(free), // bytes which can be uploaded before reaching the quota
|
|
}
|
|
return usage, nil
|
|
}
|
|
|
|
// Shutdown shutdown the fs
|
|
func (f *Fs) Shutdown(ctx context.Context) error {
|
|
f.tokenRenewer.Shutdown()
|
|
return nil
|
|
}
|
|
|
|
// Hashes returns the supported hash sets.
|
|
func (f *Fs) Hashes() hash.Set {
|
|
// EU region supports SHA1 and SHA256 (but rclone doesn't
|
|
// support SHA256 yet).
|
|
//
|
|
// https://forum.rclone.org/t/pcloud-to-local-no-hashes-in-common/19440
|
|
if f.opt.Hostname == "eapi.pcloud.com" {
|
|
return hash.Set(hash.SHA1 | hash.SHA256)
|
|
}
|
|
return hash.Set(hash.MD5 | hash.SHA1)
|
|
}
|
|
|
|
// ------------------------------------------------------------
|
|
|
|
// Fs returns the parent Fs
|
|
func (o *Object) Fs() fs.Info {
|
|
return o.fs
|
|
}
|
|
|
|
// Return a string version
|
|
func (o *Object) String() string {
|
|
if o == nil {
|
|
return "<nil>"
|
|
}
|
|
return o.remote
|
|
}
|
|
|
|
// Remote returns the remote path
|
|
func (o *Object) Remote() string {
|
|
return o.remote
|
|
}
|
|
|
|
// getHashes fetches the hashes into the object
|
|
func (o *Object) getHashes(ctx context.Context) (err error) {
|
|
var resp *http.Response
|
|
var result api.ChecksumFileResult
|
|
opts := rest.Opts{
|
|
Method: "GET",
|
|
Path: "/checksumfile",
|
|
Parameters: url.Values{},
|
|
}
|
|
opts.Parameters.Set("fileid", fileIDtoNumber(o.id))
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
|
resp, err = o.fs.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
o.setHashes(&result.Hashes)
|
|
return o.setMetaData(&result.Metadata)
|
|
}
|
|
|
|
// Hash returns the SHA-1 of an object returning a lowercase hex string
|
|
func (o *Object) Hash(ctx context.Context, t hash.Type) (string, error) {
|
|
var pHash *string
|
|
switch t {
|
|
case hash.MD5:
|
|
pHash = &o.md5
|
|
case hash.SHA1:
|
|
pHash = &o.sha1
|
|
case hash.SHA256:
|
|
pHash = &o.sha256
|
|
default:
|
|
return "", hash.ErrUnsupported
|
|
}
|
|
if o.md5 == "" && o.sha1 == "" && o.sha256 == "" {
|
|
err := o.getHashes(ctx)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to get hash: %w", err)
|
|
}
|
|
}
|
|
return *pHash, nil
|
|
}
|
|
|
|
// Size returns the size of an object in bytes
|
|
func (o *Object) Size() int64 {
|
|
err := o.readMetaData(context.TODO())
|
|
if err != nil {
|
|
fs.Logf(o, "Failed to read metadata: %v", err)
|
|
return 0
|
|
}
|
|
return o.size
|
|
}
|
|
|
|
// setMetaData sets the metadata from info
|
|
func (o *Object) setMetaData(info *api.Item) (err error) {
|
|
if info.IsFolder {
|
|
return fmt.Errorf("%q is a folder: %w", o.remote, fs.ErrorNotAFile)
|
|
}
|
|
o.hasMetaData = true
|
|
o.size = info.Size
|
|
o.modTime = info.ModTime()
|
|
o.id = info.ID
|
|
return nil
|
|
}
|
|
|
|
// setHashes sets the hashes from that passed in
|
|
func (o *Object) setHashes(hashes *api.Hashes) {
|
|
o.sha1 = hashes.SHA1
|
|
o.md5 = hashes.MD5
|
|
o.sha256 = hashes.SHA256
|
|
}
|
|
|
|
// readMetaData gets the metadata if it hasn't already been fetched
|
|
//
|
|
// it also sets the info
|
|
func (o *Object) readMetaData(ctx context.Context) (err error) {
|
|
if o.hasMetaData {
|
|
return nil
|
|
}
|
|
info, err := o.fs.readMetaDataForPath(ctx, o.remote)
|
|
if err != nil {
|
|
//if apiErr, ok := err.(*api.Error); ok {
|
|
// FIXME
|
|
// if apiErr.Code == "not_found" || apiErr.Code == "trashed" {
|
|
// return fs.ErrorObjectNotFound
|
|
// }
|
|
//}
|
|
return err
|
|
}
|
|
return o.setMetaData(info)
|
|
}
|
|
|
|
// ModTime returns the modification time of the object
|
|
//
|
|
// It attempts to read the objects mtime and if that isn't present the
|
|
// LastModified returned in the http headers
|
|
func (o *Object) ModTime(ctx context.Context) time.Time {
|
|
err := o.readMetaData(ctx)
|
|
if err != nil {
|
|
fs.Logf(o, "Failed to read metadata: %v", err)
|
|
return time.Now()
|
|
}
|
|
return o.modTime
|
|
}
|
|
|
|
// SetModTime sets the modification time of the local fs object
|
|
func (o *Object) SetModTime(ctx context.Context, modTime time.Time) error {
|
|
filename, directoryID, err := o.fs.dirCache.FindPath(ctx, o.Remote(), true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
fileID := fileIDtoNumber(o.id)
|
|
filename = o.fs.opt.Enc.FromStandardName(filename)
|
|
opts := rest.Opts{
|
|
Method: "PUT",
|
|
Path: "/copyfile",
|
|
Parameters: url.Values{},
|
|
TransferEncoding: []string{"identity"}, // pcloud doesn't like chunked encoding
|
|
ExtraHeaders: map[string]string{
|
|
"Connection": "keep-alive",
|
|
},
|
|
}
|
|
opts.Parameters.Set("fileid", fileID)
|
|
opts.Parameters.Set("folderid", dirIDtoNumber(directoryID))
|
|
opts.Parameters.Set("toname", filename)
|
|
opts.Parameters.Set("tofolderid", dirIDtoNumber(directoryID))
|
|
opts.Parameters.Set("ctime", strconv.FormatInt(modTime.Unix(), 10))
|
|
opts.Parameters.Set("mtime", strconv.FormatInt(modTime.Unix(), 10))
|
|
|
|
result := &api.ItemResult{}
|
|
err = o.fs.pacer.CallNoRetry(func() (bool, error) {
|
|
resp, err := o.fs.srv.CallJSON(ctx, &opts, nil, result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("update mtime: copyfile: %w", err)
|
|
}
|
|
if err := o.setMetaData(&result.Metadata); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Storable returns a boolean showing whether this object storable
|
|
func (o *Object) Storable() bool {
|
|
return true
|
|
}
|
|
|
|
// downloadURL fetches the download link
|
|
func (o *Object) downloadURL(ctx context.Context) (URL string, err error) {
|
|
if o.id == "" {
|
|
return "", errors.New("can't download - no id")
|
|
}
|
|
if o.link.IsValid() {
|
|
return o.link.URL(), nil
|
|
}
|
|
var resp *http.Response
|
|
var result api.GetFileLinkResult
|
|
opts := rest.Opts{
|
|
Method: "GET",
|
|
Path: "/getfilelink",
|
|
Parameters: url.Values{},
|
|
}
|
|
opts.Parameters.Set("fileid", fileIDtoNumber(o.id))
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
|
resp, err = o.fs.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
if !result.IsValid() {
|
|
return "", fmt.Errorf("fetched invalid link %+v", result)
|
|
}
|
|
o.link = &result
|
|
return o.link.URL(), nil
|
|
}
|
|
|
|
// Open an object for read
|
|
func (o *Object) Open(ctx context.Context, options ...fs.OpenOption) (in io.ReadCloser, err error) {
|
|
url, err := o.downloadURL(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
var resp *http.Response
|
|
opts := rest.Opts{
|
|
Method: "GET",
|
|
RootURL: url,
|
|
Options: options,
|
|
}
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
|
resp, err = o.fs.srv.Call(ctx, &opts)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return resp.Body, err
|
|
}
|
|
|
|
// Update the object with the contents of the io.Reader, modTime and size
|
|
//
|
|
// If existing is set then it updates the object rather than creating a new one.
|
|
//
|
|
// The new object may have been created if an error is returned
|
|
func (o *Object) Update(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (err error) {
|
|
o.fs.tokenRenewer.Start()
|
|
defer o.fs.tokenRenewer.Stop()
|
|
|
|
size := src.Size() // NB can upload without size
|
|
modTime := src.ModTime(ctx)
|
|
remote := o.Remote()
|
|
|
|
if size < 0 {
|
|
return errors.New("can't upload unknown sizes objects")
|
|
}
|
|
|
|
// Create the directory for the object if it doesn't exist
|
|
leaf, directoryID, err := o.fs.dirCache.FindPath(ctx, remote, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Experiments with pcloud indicate that it doesn't like any
|
|
// form of request which doesn't have a Content-Length.
|
|
// According to the docs if you close the connection at the
|
|
// end then it should work without Content-Length, but I
|
|
// couldn't get this to work using opts.Close (which sets
|
|
// http.Request.Close).
|
|
//
|
|
// This means that chunked transfer encoding needs to be
|
|
// disabled and a Content-Length needs to be supplied. This
|
|
// also rules out streaming.
|
|
//
|
|
// Docs: https://docs.pcloud.com/methods/file/uploadfile.html
|
|
var resp *http.Response
|
|
var result api.UploadFileResponse
|
|
opts := rest.Opts{
|
|
Method: "PUT",
|
|
Path: "/uploadfile",
|
|
Body: in,
|
|
ContentType: fs.MimeType(ctx, src),
|
|
ContentLength: &size,
|
|
Parameters: url.Values{},
|
|
TransferEncoding: []string{"identity"}, // pcloud doesn't like chunked encoding
|
|
Options: options,
|
|
}
|
|
leaf = o.fs.opt.Enc.FromStandardName(leaf)
|
|
opts.Parameters.Set("filename", leaf)
|
|
opts.Parameters.Set("folderid", dirIDtoNumber(directoryID))
|
|
opts.Parameters.Set("nopartial", "1")
|
|
opts.Parameters.Set("mtime", fmt.Sprintf("%d", uint64(modTime.Unix())))
|
|
|
|
// Special treatment for a 0 length upload. This doesn't work
|
|
// with PUT even with Content-Length set (by setting
|
|
// opts.Body=0), so upload it as a multipart form POST with
|
|
// Content-Length set.
|
|
if size == 0 {
|
|
formReader, contentType, overhead, err := rest.MultipartUpload(ctx, in, opts.Parameters, "content", leaf)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to make multipart upload for 0 length file: %w", err)
|
|
}
|
|
|
|
contentLength := overhead + size
|
|
|
|
opts.ContentType = contentType
|
|
opts.Body = formReader
|
|
opts.Method = "POST"
|
|
opts.Parameters = nil
|
|
opts.ContentLength = &contentLength
|
|
}
|
|
|
|
err = o.fs.pacer.CallNoRetry(func() (bool, error) {
|
|
resp, err = o.fs.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
// sometimes pcloud leaves a half complete file on
|
|
// error, so delete it if it exists, trying a few times
|
|
for i := 0; i < 5; i++ {
|
|
delObj, delErr := o.fs.NewObject(ctx, o.remote)
|
|
if delErr == nil && delObj != nil {
|
|
_ = delObj.Remove(ctx)
|
|
break
|
|
}
|
|
time.Sleep(time.Second)
|
|
}
|
|
return err
|
|
}
|
|
if len(result.Items) != 1 {
|
|
return fmt.Errorf("failed to upload %v - not sure why", o)
|
|
}
|
|
o.setHashes(&result.Checksums[0])
|
|
return o.setMetaData(&result.Items[0])
|
|
}
|
|
|
|
// Remove an object
|
|
func (o *Object) Remove(ctx context.Context) error {
|
|
opts := rest.Opts{
|
|
Method: "POST",
|
|
Path: "/deletefile",
|
|
Parameters: url.Values{},
|
|
}
|
|
var result api.ItemResult
|
|
opts.Parameters.Set("fileid", fileIDtoNumber(o.id))
|
|
return o.fs.pacer.Call(func() (bool, error) {
|
|
resp, err := o.fs.srv.CallJSON(ctx, &opts, nil, &result)
|
|
err = result.Error.Update(err)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
}
|
|
|
|
// ID returns the ID of the Object if known, or "" if not
|
|
func (o *Object) ID() string {
|
|
return o.id
|
|
}
|
|
|
|
// Check the interfaces are satisfied
|
|
var (
|
|
_ fs.Fs = (*Fs)(nil)
|
|
_ fs.Purger = (*Fs)(nil)
|
|
_ fs.CleanUpper = (*Fs)(nil)
|
|
_ fs.Copier = (*Fs)(nil)
|
|
_ fs.Mover = (*Fs)(nil)
|
|
_ fs.DirMover = (*Fs)(nil)
|
|
_ fs.DirCacheFlusher = (*Fs)(nil)
|
|
_ fs.PublicLinker = (*Fs)(nil)
|
|
_ fs.Abouter = (*Fs)(nil)
|
|
_ fs.Shutdowner = (*Fs)(nil)
|
|
_ fs.Object = (*Object)(nil)
|
|
_ fs.IDer = (*Object)(nil)
|
|
)
|