2022-08-28 13:21:57 +02:00
// Package seafile provides an interface to the Seafile storage system.
2020-04-25 19:55:18 +02:00
package seafile
import (
"context"
2021-11-04 11:12:57 +01:00
"errors"
2020-04-25 19:55:18 +02:00
"fmt"
"io"
"net/http"
"net/url"
"path"
"strconv"
"strings"
"sync"
"time"
"github.com/coreos/go-semver/semver"
"github.com/rclone/rclone/backend/seafile/api"
"github.com/rclone/rclone/fs"
"github.com/rclone/rclone/fs/config"
"github.com/rclone/rclone/fs/config/configmap"
"github.com/rclone/rclone/fs/config/configstruct"
"github.com/rclone/rclone/fs/config/obscure"
"github.com/rclone/rclone/fs/fserrors"
"github.com/rclone/rclone/fs/fshttp"
"github.com/rclone/rclone/fs/hash"
"github.com/rclone/rclone/lib/bucket"
"github.com/rclone/rclone/lib/cache"
"github.com/rclone/rclone/lib/encoder"
"github.com/rclone/rclone/lib/pacer"
"github.com/rclone/rclone/lib/random"
"github.com/rclone/rclone/lib/rest"
)
const (
2020-05-18 23:56:54 +02:00
librariesCacheKey = "all"
retryAfterHeader = "Retry-After"
configURL = "url"
configUser = "user"
configPassword = "pass"
config2FA = "2fa"
configLibrary = "library"
configLibraryKey = "library_key"
configCreateLibrary = "create_library"
configAuthToken = "auth_token"
2020-04-25 19:55:18 +02:00
)
// This is global to all instances of fs
// (copying from a seafile remote to another remote would create 2 fs)
var (
rangeDownloadNotice sync . Once // Display the notice only once
createLibraryMutex sync . Mutex // Mutex to protect library creation
)
// Register with Fs
func init ( ) {
fs . Register ( & fs . RegInfo {
Name : "seafile" ,
Description : "seafile" ,
NewFs : NewFs ,
2020-05-18 23:56:54 +02:00
Config : Config ,
2020-04-25 19:55:18 +02:00
Options : [ ] fs . Option { {
2020-05-18 23:56:54 +02:00
Name : configURL ,
2021-08-16 11:30:01 +02:00
Help : "URL of seafile host to connect to." ,
2020-04-25 19:55:18 +02:00
Required : true ,
Examples : [ ] fs . OptionExample { {
Value : "https://cloud.seafile.com/" ,
2021-08-16 11:30:01 +02:00
Help : "Connect to cloud.seafile.com." ,
2020-04-25 19:55:18 +02:00
} } ,
2023-07-06 18:55:53 +02:00
Sensitive : true ,
2020-04-25 19:55:18 +02:00
} , {
2023-07-06 18:55:53 +02:00
Name : configUser ,
Help : "User name (usually email address)." ,
Required : true ,
Sensitive : true ,
2020-04-25 19:55:18 +02:00
} , {
2020-05-18 23:56:54 +02:00
// Password is not required, it will be left blank for 2FA
Name : configPassword ,
2021-08-16 11:30:01 +02:00
Help : "Password." ,
2020-04-25 19:55:18 +02:00
IsPassword : true ,
2023-07-06 18:55:53 +02:00
Sensitive : true ,
2020-04-25 19:55:18 +02:00
} , {
2020-05-18 23:56:54 +02:00
Name : config2FA ,
2021-08-16 11:30:01 +02:00
Help : "Two-factor authentication ('true' if the account has 2FA enabled)." ,
2020-05-18 23:56:54 +02:00
Default : false ,
} , {
Name : configLibrary ,
2021-08-16 11:30:01 +02:00
Help : "Name of the library.\n\nLeave blank to access all non-encrypted libraries." ,
2020-04-25 19:55:18 +02:00
} , {
2020-05-18 23:56:54 +02:00
Name : configLibraryKey ,
2021-08-16 11:30:01 +02:00
Help : "Library password (for encrypted libraries only).\n\nLeave blank if you pass it through the command line." ,
2020-04-25 19:55:18 +02:00
IsPassword : true ,
2023-07-06 18:55:53 +02:00
Sensitive : true ,
2020-04-25 19:55:18 +02:00
} , {
2020-05-18 23:56:54 +02:00
Name : configCreateLibrary ,
2021-08-16 11:30:01 +02:00
Help : "Should rclone create a library if it doesn't exist." ,
2020-04-25 19:55:18 +02:00
Advanced : true ,
Default : false ,
2020-05-18 23:56:54 +02:00
} , {
// Keep the authentication token after entering the 2FA code
2023-07-06 18:55:53 +02:00
Name : configAuthToken ,
Help : "Authentication token." ,
Hide : fs . OptionHideBoth ,
Sensitive : true ,
2020-04-25 19:55:18 +02:00
} , {
Name : config . ConfigEncoding ,
Help : config . ConfigEncodingHelp ,
Advanced : true ,
Default : ( encoder . EncodeZero |
encoder . EncodeCtl |
encoder . EncodeSlash |
encoder . EncodeBackSlash |
encoder . EncodeDoubleQuote |
encoder . EncodeInvalidUtf8 ) ,
} } ,
} )
}
// Options defines the configuration for this backend
type Options struct {
URL string ` config:"url" `
User string ` config:"user" `
Password string ` config:"pass" `
2020-05-18 23:56:54 +02:00
Is2FA bool ` config:"2fa" `
AuthToken string ` config:"auth_token" `
2020-04-25 19:55:18 +02:00
LibraryName string ` config:"library" `
LibraryKey string ` config:"library_key" `
CreateLibrary bool ` config:"create_library" `
Enc encoder . MultiEncoder ` config:"encoding" `
}
// Fs represents a remote seafile
type Fs struct {
name string // name of this remote
root string // the path we are working on
libraryName string // current library
encrypted bool // Is this an encrypted library
rootDirectory string // directory part of root (if any)
opt Options // parsed options
libraries * cache . Cache // Keep a cache of libraries
librariesMutex sync . Mutex // Mutex to protect getLibraryID
features * fs . Features // optional features
endpoint * url . URL // URL of the host
endpointURL string // endpoint as a string
2022-08-30 10:23:29 +02:00
srv * rest . Client // the connection to the server
2020-04-25 19:55:18 +02:00
pacer * fs . Pacer // pacer for API calls
authMu sync . Mutex // Mutex to protect library decryption
createDirMutex sync . Mutex // Protect creation of directories
useOldDirectoryAPI bool // Use the old API v2 if seafile < 7
moveDirNotAvailable bool // Version < 7.0 don't have an API to move a directory
2023-01-11 21:25:44 +01:00
renew * Renew // Renew an encrypted library token
2020-04-25 19:55:18 +02:00
}
// ------------------------------------------------------------
// NewFs constructs an Fs from the path, container:path
2020-11-05 16:18:51 +01:00
func NewFs ( ctx context . Context , name , root string , m configmap . Mapper ) ( fs . Fs , error ) {
2020-04-25 19:55:18 +02:00
// Parse config into Options struct
opt := new ( Options )
err := configstruct . Set ( m , opt )
if err != nil {
return nil , err
}
root = strings . Trim ( root , "/" )
isLibraryRooted := opt . LibraryName != ""
var libraryName , rootDirectory string
if isLibraryRooted {
libraryName = opt . LibraryName
rootDirectory = root
} else {
libraryName , rootDirectory = bucket . Split ( root )
}
if ! strings . HasSuffix ( opt . URL , "/" ) {
opt . URL += "/"
}
if opt . Password != "" {
var err error
opt . Password , err = obscure . Reveal ( opt . Password )
if err != nil {
2021-11-04 11:12:57 +01:00
return nil , fmt . Errorf ( "couldn't decrypt user password: %w" , err )
2020-04-25 19:55:18 +02:00
}
}
if opt . LibraryKey != "" {
var err error
opt . LibraryKey , err = obscure . Reveal ( opt . LibraryKey )
if err != nil {
2021-11-04 11:12:57 +01:00
return nil , fmt . Errorf ( "couldn't decrypt library password: %w" , err )
2020-04-25 19:55:18 +02:00
}
}
// Parse the endpoint
u , err := url . Parse ( opt . URL )
if err != nil {
return nil , err
}
f := & Fs {
name : name ,
root : root ,
libraryName : libraryName ,
rootDirectory : rootDirectory ,
libraries : cache . New ( ) ,
opt : * opt ,
endpoint : u ,
endpointURL : u . String ( ) ,
2020-11-13 16:24:43 +01:00
srv : rest . NewClient ( fshttp . NewClient ( ctx ) ) . SetRoot ( u . String ( ) ) ,
2020-11-05 12:33:32 +01:00
pacer : getPacer ( ctx , opt . URL ) ,
2020-04-25 19:55:18 +02:00
}
f . features = ( & fs . Features {
CanHaveEmptyDirectories : true ,
BucketBased : opt . LibraryName == "" ,
2020-11-05 17:00:40 +01:00
} ) . Fill ( ctx , f )
2020-04-25 19:55:18 +02:00
serverInfo , err := f . getServerInfo ( ctx )
if err != nil {
return nil , err
}
fs . Debugf ( nil , "Seafile server version %s" , serverInfo . Version )
2020-05-20 12:39:20 +02:00
// We don't support lower than seafile v6.0 (version 6.0 is already more than 3 years old)
2020-04-25 19:55:18 +02:00
serverVersion := semver . New ( serverInfo . Version )
if serverVersion . Major < 6 {
return nil , errors . New ( "unsupported Seafile server (version < 6.0)" )
}
if serverVersion . Major < 7 {
// Seafile 6 does not support recursive listing
f . useOldDirectoryAPI = true
f . features . ListR = nil
// It also does no support moving directories
f . moveDirNotAvailable = true
}
2020-05-18 23:56:54 +02:00
// Take the authentication token from the configuration first
token := f . opt . AuthToken
if token == "" {
// If not available, send the user/password instead
token , err = f . authorizeAccount ( ctx )
if err != nil {
return nil , err
}
2020-04-25 19:55:18 +02:00
}
2020-05-18 23:56:54 +02:00
f . setAuthorizationToken ( token )
2020-04-25 19:55:18 +02:00
if f . libraryName != "" {
// Check if the library exists
exists , err := f . libraryExists ( ctx , f . libraryName )
if err != nil {
return f , err
}
if ! exists {
if f . opt . CreateLibrary {
err := f . mkLibrary ( ctx , f . libraryName , "" )
if err != nil {
return f , err
}
} else {
return f , fmt . Errorf ( "library '%s' was not found, and the option to create it is not activated (advanced option)" , f . libraryName )
}
}
libraryID , err := f . getLibraryID ( ctx , f . libraryName )
if err != nil {
return f , err
}
f . encrypted , err = f . isEncrypted ( ctx , libraryID )
if err != nil {
return f , err
}
if f . encrypted {
// If we're inside an encrypted library, let's decrypt it now
err = f . authorizeLibrary ( ctx , libraryID )
if err != nil {
return f , err
}
// And remove the public link feature
f . features . PublicLink = nil
2023-01-11 21:25:44 +01:00
// renew the library password every 45 minutes
f . renew = NewRenew ( 45 * time . Minute , func ( ) error {
return f . authorizeLibrary ( context . Background ( ) , libraryID )
} )
2020-04-25 19:55:18 +02:00
}
} else {
// Deactivate the cleaner feature since there's no library selected
f . features . CleanUp = nil
}
if f . rootDirectory != "" {
// Check to see if the root is an existing file
remote := path . Base ( rootDirectory )
f . rootDirectory = path . Dir ( rootDirectory )
if f . rootDirectory == "." {
f . rootDirectory = ""
}
_ , err := f . NewObject ( ctx , remote )
if err != nil {
2021-11-04 11:12:57 +01:00
if errors . Is ( err , fs . ErrorObjectNotFound ) || errors . Is ( err , fs . ErrorNotAFile ) {
2020-04-25 19:55:18 +02:00
// File doesn't exist so return the original f
f . rootDirectory = rootDirectory
return f , nil
}
return f , err
}
2024-03-07 13:35:26 +01:00
// Correct root if definitely pointing to a file
f . root = path . Dir ( f . root )
if f . root == "." || f . root == "/" {
f . root = ""
}
2020-04-25 19:55:18 +02:00
// return an error with an fs which points to the parent
return f , fs . ErrorIsFile
}
return f , nil
}
2020-05-18 23:56:54 +02:00
// Config callback for 2FA
2021-04-29 10:28:18 +02:00
func Config ( ctx context . Context , name string , m configmap . Mapper , config fs . ConfigIn ) ( * fs . ConfigOut , error ) {
2020-05-18 23:56:54 +02:00
serverURL , ok := m . Get ( configURL )
if ! ok || serverURL == "" {
// If there's no server URL, it means we're trying an operation at the backend level, like a "rclone authorize seafile"
2021-04-29 10:28:18 +02:00
return nil , errors . New ( "operation not supported on this remote. If you need a 2FA code on your account, use the command: rclone config reconnect <remote name>: " )
2020-05-18 23:56:54 +02:00
}
u , err := url . Parse ( serverURL )
if err != nil {
2021-11-04 11:12:57 +01:00
return nil , fmt . Errorf ( "invalid server URL %s" , serverURL )
2020-05-18 23:56:54 +02:00
}
is2faEnabled , _ := m . Get ( config2FA )
if is2faEnabled != "true" {
2021-10-19 21:53:35 +02:00
// no need to do anything here
return nil , nil
2020-05-18 23:56:54 +02:00
}
username , _ := m . Get ( configUser )
if username == "" {
2021-04-29 10:28:18 +02:00
return nil , errors . New ( "a username is required" )
2020-05-18 23:56:54 +02:00
}
password , _ := m . Get ( configPassword )
if password != "" {
password , _ = obscure . Reveal ( password )
}
2021-04-29 10:28:18 +02:00
switch config . State {
case "" :
2021-09-17 23:48:19 +02:00
// Empty state means it's the first call to the Config function
2021-04-29 10:28:18 +02:00
if password == "" {
2021-09-17 23:48:19 +02:00
return fs . ConfigPassword ( "password" , "config_password" , "Two-factor authentication: please enter your password (it won't be saved in the configuration)" )
2021-04-29 10:28:18 +02:00
}
2021-09-17 23:48:19 +02:00
// password was successfully loaded from the config
return fs . ConfigGoto ( "2fa" )
2021-04-29 10:28:18 +02:00
case "password" :
2021-09-17 23:48:19 +02:00
// password should be coming from the previous state (entered by the user)
2021-04-29 10:28:18 +02:00
password = config . Result
if password == "" {
2021-09-17 23:48:19 +02:00
return fs . ConfigError ( "" , "Password can't be blank" )
2021-04-29 10:28:18 +02:00
}
2021-09-17 23:48:19 +02:00
// save it into the configuration file and keep going
m . Set ( configPassword , obscure . MustObscure ( password ) )
2021-04-29 10:28:18 +02:00
return fs . ConfigGoto ( "2fa" )
case "2fa" :
2021-05-04 13:27:50 +02:00
return fs . ConfigInput ( "2fa_do" , "config_2fa" , "Two-factor authentication: please enter your 2FA code" )
2021-04-29 10:28:18 +02:00
case "2fa_do" :
code := config . Result
if code == "" {
return fs . ConfigError ( "2fa" , "2FA codes can't be blank" )
}
2020-05-18 23:56:54 +02:00
2021-04-29 10:28:18 +02:00
// Create rest client for getAuthorizationToken
url := u . String ( )
if ! strings . HasPrefix ( url , "/" ) {
url += "/"
2020-05-18 23:56:54 +02:00
}
2021-04-29 10:28:18 +02:00
srv := rest . NewClient ( fshttp . NewClient ( ctx ) ) . SetRoot ( url )
2020-05-18 23:56:54 +02:00
2021-04-29 10:28:18 +02:00
// We loop asking for a 2FA code
2020-05-18 23:56:54 +02:00
ctx , cancel := context . WithTimeout ( context . Background ( ) , 10 * time . Second )
defer cancel ( )
token , err := getAuthorizationToken ( ctx , srv , username , password , code )
if err != nil {
2021-05-04 13:27:50 +02:00
return fs . ConfigConfirm ( "2fa_error" , true , "config_retry" , fmt . Sprintf ( "Authentication failed: %v\n\nTry Again?" , err ) )
2021-04-29 10:28:18 +02:00
}
if token == "" {
2021-05-04 13:27:50 +02:00
return fs . ConfigConfirm ( "2fa_error" , true , "config_retry" , "Authentication failed - no token returned.\n\nTry Again?" )
2020-05-18 23:56:54 +02:00
}
2021-04-29 10:28:18 +02:00
// Let's save the token into the configuration
m . Set ( configAuthToken , token )
// And delete any previous entry for password
m . Set ( configPassword , "" )
// And we're done here
return nil , nil
case "2fa_error" :
if config . Result == "true" {
return fs . ConfigGoto ( "2fa" )
2020-05-18 23:56:54 +02:00
}
2021-04-29 10:28:18 +02:00
return nil , errors . New ( "2fa authentication failed" )
2020-05-18 23:56:54 +02:00
}
2021-04-29 10:28:18 +02:00
return nil , fmt . Errorf ( "unknown state %q" , config . State )
2020-05-18 23:56:54 +02:00
}
2023-01-11 21:25:44 +01:00
// Shutdown the Fs
func ( f * Fs ) Shutdown ( ctx context . Context ) error {
if f . renew == nil {
return nil
}
f . renew . Shutdown ( )
return nil
}
2020-04-25 19:55:18 +02:00
// sets the AuthorizationToken up
func ( f * Fs ) setAuthorizationToken ( token string ) {
f . srv . SetHeader ( "Authorization" , "Token " + token )
}
// authorizeAccount gets the auth token.
2020-05-18 23:56:54 +02:00
func ( f * Fs ) authorizeAccount ( ctx context . Context ) ( string , error ) {
2020-04-25 19:55:18 +02:00
f . authMu . Lock ( )
defer f . authMu . Unlock ( )
2020-05-18 23:56:54 +02:00
2020-04-25 19:55:18 +02:00
token , err := f . getAuthorizationToken ( ctx )
if err != nil {
2020-05-18 23:56:54 +02:00
return "" , err
2020-04-25 19:55:18 +02:00
}
2020-05-18 23:56:54 +02:00
return token , nil
2020-04-25 19:55:18 +02:00
}
// retryErrorCodes is a slice of error codes that we will retry
var retryErrorCodes = [ ] int {
408 , // Request Timeout
429 , // Rate exceeded.
500 , // Get occasional 500 Internal Server Error
503 , // Service Unavailable
504 , // Gateway Time-out
520 , // Operation failed (We get them sometimes when running tests in parallel)
}
2020-05-18 23:56:54 +02:00
// shouldRetry returns a boolean as to whether this resp and err
2020-04-25 19:55:18 +02:00
// deserve to be retried. It returns the err as a convenience
2021-03-11 15:44:01 +01:00
func ( f * Fs ) shouldRetry ( ctx context . Context , resp * http . Response , err error ) ( bool , error ) {
if fserrors . ContextError ( ctx , & err ) {
return false , err
}
2020-04-25 19:55:18 +02:00
// For 429 errors look at the Retry-After: header and
// set the retry appropriately, starting with a minimum of 1
// second if it isn't set.
if resp != nil && ( resp . StatusCode == 429 ) {
var retryAfter = 1
retryAfterString := resp . Header . Get ( retryAfterHeader )
if retryAfterString != "" {
var err error
retryAfter , err = strconv . Atoi ( retryAfterString )
if err != nil {
fs . Errorf ( f , "Malformed %s header %q: %v" , retryAfterHeader , retryAfterString , err )
}
}
return true , pacer . RetryAfterError ( err , time . Duration ( retryAfter ) * time . Second )
}
return fserrors . ShouldRetry ( err ) || fserrors . ShouldRetryHTTP ( resp , retryErrorCodes ) , err
}
func ( f * Fs ) shouldRetryUpload ( ctx context . Context , resp * http . Response , err error ) ( bool , error ) {
if err != nil || ( resp != nil && resp . StatusCode > 400 ) {
return true , err
}
return false , nil
}
// Name of the remote (as passed into NewFs)
func ( f * Fs ) Name ( ) string {
return f . name
}
// Root of the remote (as passed into NewFs)
func ( f * Fs ) Root ( ) string {
return f . root
}
// String converts this Fs to a string
func ( f * Fs ) String ( ) string {
if f . libraryName == "" {
2022-06-08 22:25:17 +02:00
return "seafile root"
2020-04-25 19:55:18 +02:00
}
library := "library"
if f . encrypted {
library = "encrypted " + library
}
if f . rootDirectory == "" {
return fmt . Sprintf ( "seafile %s '%s'" , library , f . libraryName )
}
return fmt . Sprintf ( "seafile %s '%s' path '%s'" , library , f . libraryName , f . rootDirectory )
}
// Precision of the ModTimes in this Fs
func ( f * Fs ) Precision ( ) time . Duration {
// The API doesn't support setting the modified time
return fs . ModTimeNotSupported
}
// Hashes returns the supported hash sets.
func ( f * Fs ) Hashes ( ) hash . Set {
return hash . Set ( hash . None )
}
// Features returns the optional features of this Fs
func ( f * Fs ) Features ( ) * fs . Features {
return f . features
}
// List the objects and directories in dir into entries. The
// entries can be returned in any order but should be for a
// complete directory.
//
// dir should be "" to list the root, and should not have
// trailing slashes.
//
// This should return fs.ErrorDirNotFound if the directory isn't
// found.
func ( f * Fs ) List ( ctx context . Context , dir string ) ( entries fs . DirEntries , err error ) {
if dir == "" && f . libraryName == "" {
return f . listLibraries ( ctx )
}
return f . listDir ( ctx , dir , false )
}
// NewObject finds the Object at remote. If it can't be found
// it returns the error fs.ErrorObjectNotFound.
func ( f * Fs ) NewObject ( ctx context . Context , remote string ) ( fs . Object , error ) {
libraryName , filePath := f . splitPath ( remote )
libraryID , err := f . getLibraryID ( ctx , libraryName )
if err != nil {
return nil , err
}
err = f . authorizeLibrary ( ctx , libraryID )
if err != nil {
return nil , err
}
fileDetails , err := f . getFileDetails ( ctx , libraryID , filePath )
if err != nil {
return nil , err
}
modTime , err := time . Parse ( time . RFC3339 , fileDetails . Modified )
if err != nil {
fs . LogPrintf ( fs . LogLevelWarning , fileDetails . Modified , "Cannot parse datetime" )
}
o := & Object {
fs : f ,
libraryID : libraryID ,
id : fileDetails . ID ,
remote : remote ,
pathInLibrary : filePath ,
modTime : modTime ,
size : fileDetails . Size ,
}
return o , nil
}
// Put in to the remote path with the modTime given of the given size
//
2020-05-25 08:05:53 +02:00
// When called from outside an Fs by rclone, src.Size() will always be >= 0.
2020-04-25 19:55:18 +02:00
// But for unknown-sized objects (indicated by src.Size() == -1), Put should either
// return an error or upload it properly (rather than e.g. calling panic).
//
// May create the object even if it returns an error - if so
// will return the object and the error, otherwise will return
// nil and the error
func ( f * Fs ) Put ( ctx context . Context , in io . Reader , src fs . ObjectInfo , options ... fs . OpenOption ) ( fs . Object , error ) {
object := f . newObject ( ctx , src . Remote ( ) , src . Size ( ) , src . ModTime ( ctx ) )
// Check if we need to create a new library at that point
if object . libraryID == "" {
library , _ := f . splitPath ( object . remote )
err := f . Mkdir ( ctx , library )
if err != nil {
return object , err
}
libraryID , err := f . getLibraryID ( ctx , library )
if err != nil {
return object , err
}
object . libraryID = libraryID
}
err := object . Update ( ctx , in , src , options ... )
if err != nil {
return object , err
}
return object , nil
}
// PutStream uploads to the remote path with the modTime given but of indeterminate size
func ( f * Fs ) PutStream ( ctx context . Context , in io . Reader , src fs . ObjectInfo , options ... fs . OpenOption ) ( fs . Object , error ) {
return f . Put ( ctx , in , src , options ... )
}
// Mkdir makes the directory or library
//
// Shouldn't return an error if it already exists
func ( f * Fs ) Mkdir ( ctx context . Context , dir string ) error {
libraryName , folder := f . splitPath ( dir )
if strings . HasPrefix ( dir , libraryName ) {
err := f . mkLibrary ( ctx , libraryName , "" )
if err != nil {
return err
}
if folder == "" {
// No directory to create after the library
return nil
}
}
err := f . mkDir ( ctx , dir )
if err != nil {
return err
}
return nil
}
2020-06-04 23:25:14 +02:00
// purgeCheck removes the root directory, if check is set then it
// refuses to do so if it has anything in
func ( f * Fs ) purgeCheck ( ctx context . Context , dir string , check bool ) error {
2020-04-25 19:55:18 +02:00
libraryName , dirPath := f . splitPath ( dir )
libraryID , err := f . getLibraryID ( ctx , libraryName )
if err != nil {
return err
}
2020-06-04 23:25:14 +02:00
if check {
directoryEntries , err := f . getDirectoryEntries ( ctx , libraryID , dirPath , false )
if err != nil {
return err
}
if len ( directoryEntries ) > 0 {
return fs . ErrorDirectoryNotEmpty
}
2020-04-25 19:55:18 +02:00
}
2020-06-04 23:25:14 +02:00
2020-04-25 19:55:18 +02:00
if dirPath == "" || dirPath == "/" {
return f . deleteLibrary ( ctx , libraryID )
}
return f . deleteDir ( ctx , libraryID , dirPath )
}
2020-06-04 23:25:14 +02:00
// Rmdir removes the directory or library if empty
//
// Return an error if it doesn't exist or isn't empty
func ( f * Fs ) Rmdir ( ctx context . Context , dir string ) error {
return f . purgeCheck ( ctx , dir , true )
}
2020-04-25 19:55:18 +02:00
// ==================== Optional Interface fs.ListRer ====================
// ListR lists the objects and directories of the Fs starting
// from dir recursively into out.
//
// dir should be "" to start from the root, and should not
// have trailing slashes.
//
// This should return ErrDirNotFound if the directory isn't
// found.
//
// It should call callback for each tranche of entries read.
// These need not be returned in any particular order. If
// callback returns an error then the listing will stop
// immediately.
func ( f * Fs ) ListR ( ctx context . Context , dir string , callback fs . ListRCallback ) error {
var err error
if dir == "" && f . libraryName == "" {
libraries , err := f . listLibraries ( ctx )
if err != nil {
return err
}
// Send the library list as folders
err = callback ( libraries )
if err != nil {
return err
}
// Then list each library
for _ , library := range libraries {
err = f . listDirCallback ( ctx , library . Remote ( ) , callback )
if err != nil {
return err
}
}
return nil
}
err = f . listDirCallback ( ctx , dir , callback )
if err != nil {
return err
}
return nil
}
// ==================== Optional Interface fs.Copier ====================
2020-10-13 23:43:40 +02:00
// Copy src to this remote using server-side copy operations.
2020-04-25 19:55:18 +02:00
//
2022-08-05 17:35:41 +02:00
// This is stored with the remote path given.
2020-04-25 19:55:18 +02:00
//
2022-08-05 17:35:41 +02:00
// It returns the destination Object and a possible error.
2020-04-25 19:55:18 +02:00
//
// If it isn't possible then return fs.ErrorCantCopy
func ( f * Fs ) Copy ( ctx context . Context , src fs . Object , remote string ) ( fs . Object , error ) {
srcObj , ok := src . ( * Object )
if ! ok {
return nil , fs . ErrorCantCopy
}
srcLibraryName , srcPath := srcObj . fs . splitPath ( src . Remote ( ) )
srcLibraryID , err := srcObj . fs . getLibraryID ( ctx , srcLibraryName )
if err != nil {
return nil , err
}
dstLibraryName , dstPath := f . splitPath ( remote )
dstLibraryID , err := f . getLibraryID ( ctx , dstLibraryName )
if err != nil {
return nil , err
}
// Seafile does not accept a file name as a destination, only a path.
// The destination filename will be the same as the original, or with (1) added in case it was already existing
dstDir , dstFilename := path . Split ( dstPath )
// We have to make sure the destination path exists on the server or it's going to bomb out with an obscure error message
err = f . mkMultiDir ( ctx , dstLibraryID , dstDir )
if err != nil {
return nil , err
}
op , err := f . copyFile ( ctx , srcLibraryID , srcPath , dstLibraryID , dstDir )
if err != nil {
return nil , err
}
if op . Name != dstFilename {
// Destination was existing, so we need to move the file back into place
err = f . adjustDestination ( ctx , dstLibraryID , op . Name , dstPath , dstDir , dstFilename )
if err != nil {
return nil , err
}
}
// Create a new object from the result
return f . NewObject ( ctx , remote )
}
// ==================== Optional Interface fs.Mover ====================
2020-10-13 23:43:40 +02:00
// Move src to this remote using server-side move operations.
2020-04-25 19:55:18 +02:00
//
2022-08-05 17:35:41 +02:00
// This is stored with the remote path given.
2020-04-25 19:55:18 +02:00
//
2022-08-05 17:35:41 +02:00
// It returns the destination Object and a possible error.
2020-04-25 19:55:18 +02:00
//
// If it isn't possible then return fs.ErrorCantMove
func ( f * Fs ) Move ( ctx context . Context , src fs . Object , remote string ) ( fs . Object , error ) {
srcObj , ok := src . ( * Object )
if ! ok {
return nil , fs . ErrorCantMove
}
srcLibraryName , srcPath := srcObj . fs . splitPath ( src . Remote ( ) )
srcLibraryID , err := srcObj . fs . getLibraryID ( ctx , srcLibraryName )
if err != nil {
return nil , err
}
dstLibraryName , dstPath := f . splitPath ( remote )
dstLibraryID , err := f . getLibraryID ( ctx , dstLibraryName )
if err != nil {
return nil , err
}
// anchor both source and destination paths from the root so we can compare them
srcPath = path . Join ( "/" , srcPath )
dstPath = path . Join ( "/" , dstPath )
srcDir := path . Dir ( srcPath )
dstDir , dstFilename := path . Split ( dstPath )
if srcLibraryID == dstLibraryID && srcDir == dstDir {
// It's only a simple case of renaming the file
_ , err := f . renameFile ( ctx , srcLibraryID , srcPath , dstFilename )
if err != nil {
return nil , err
}
return f . NewObject ( ctx , remote )
}
// We have to make sure the destination path exists on the server
err = f . mkMultiDir ( ctx , dstLibraryID , dstDir )
if err != nil {
return nil , err
}
// Seafile does not accept a file name as a destination, only a path.
// The destination filename will be the same as the original, or with (1) added in case it already exists
op , err := f . moveFile ( ctx , srcLibraryID , srcPath , dstLibraryID , dstDir )
if err != nil {
return nil , err
}
if op . Name != dstFilename {
// Destination was existing, so we need to move the file back into place
err = f . adjustDestination ( ctx , dstLibraryID , op . Name , dstPath , dstDir , dstFilename )
if err != nil {
return nil , err
}
}
// Create a new object from the result
return f . NewObject ( ctx , remote )
}
// adjustDestination rename the file
func ( f * Fs ) adjustDestination ( ctx context . Context , libraryID , srcFilename , dstPath , dstDir , dstFilename string ) error {
// Seafile seems to be acting strangely if the renamed file already exists (some cache issue maybe?)
// It's better to delete the destination if it already exists
fileDetail , err := f . getFileDetails ( ctx , libraryID , dstPath )
if err != nil && err != fs . ErrorObjectNotFound {
return err
}
if fileDetail != nil {
err = f . deleteFile ( ctx , libraryID , dstPath )
if err != nil {
return err
}
}
_ , err = f . renameFile ( ctx , libraryID , path . Join ( dstDir , srcFilename ) , dstFilename )
if err != nil {
return err
}
return nil
}
// ==================== Optional Interface fs.DirMover ====================
// DirMove moves src, srcRemote to this remote at dstRemote
2020-10-13 23:43:40 +02:00
// using server-side move operations.
2020-04-25 19:55:18 +02:00
//
// Will only be called if src.Fs().Name() == f.Name()
//
// If it isn't possible then return fs.ErrorCantDirMove
//
// If destination exists then return fs.ErrorDirExists
func ( f * Fs ) DirMove ( ctx context . Context , src fs . Fs , srcRemote , dstRemote string ) error {
// Cast into a seafile Fs
srcFs , ok := src . ( * Fs )
if ! ok {
return fs . ErrorCantDirMove
}
srcLibraryName , srcPath := srcFs . splitPath ( srcRemote )
srcLibraryID , err := srcFs . getLibraryID ( ctx , srcLibraryName )
if err != nil {
return err
}
dstLibraryName , dstPath := f . splitPath ( dstRemote )
dstLibraryID , err := f . getLibraryID ( ctx , dstLibraryName )
if err != nil {
return err
}
srcDir := path . Dir ( srcPath )
dstDir , dstName := path . Split ( dstPath )
// anchor both source and destination to the root so we can compare them
srcDir = path . Join ( "/" , srcDir )
dstDir = path . Join ( "/" , dstDir )
// The destination should not exist
entries , err := f . getDirectoryEntries ( ctx , dstLibraryID , dstDir , false )
if err != nil && err != fs . ErrorDirNotFound {
return err
}
if err == nil {
for _ , entry := range entries {
if entry . Name == dstName {
// Destination exists
return fs . ErrorDirExists
}
}
}
if srcLibraryID == dstLibraryID && srcDir == dstDir {
// It's only renaming
err = srcFs . renameDir ( ctx , dstLibraryID , srcPath , dstName )
if err != nil {
return err
}
return nil
}
// Seafile < 7 does not support moving directories
if f . moveDirNotAvailable {
return fs . ErrorCantDirMove
}
// Make sure the destination path exists
err = f . mkMultiDir ( ctx , dstLibraryID , dstDir )
if err != nil {
return err
}
// If the destination already exists, seafile will add a " (n)" to the name.
// Sadly this API call will not return the new given name like the move file version does
// So the trick is to rename the directory to something random before moving it
// After the move we rename the random name back to the expected one
// Hopefully there won't be anything with the same name existing at destination ;)
tempName := ".rclone-move-" + random . String ( 32 )
// 1- rename source
err = srcFs . renameDir ( ctx , srcLibraryID , srcPath , tempName )
if err != nil {
2022-06-08 22:54:39 +02:00
return fmt . Errorf ( "cannot rename source directory to a temporary name: %w" , err )
2020-04-25 19:55:18 +02:00
}
// 2- move source to destination
err = f . moveDir ( ctx , srcLibraryID , srcDir , tempName , dstLibraryID , dstDir )
if err != nil {
// Doh! Let's rename the source back to its original name
_ = srcFs . renameDir ( ctx , srcLibraryID , path . Join ( srcDir , tempName ) , path . Base ( srcPath ) )
return err
}
// 3- rename destination back to source name
err = f . renameDir ( ctx , dstLibraryID , path . Join ( dstDir , tempName ) , dstName )
if err != nil {
2022-06-08 22:54:39 +02:00
return fmt . Errorf ( "cannot rename temporary directory to destination name: %w" , err )
2020-04-25 19:55:18 +02:00
}
return nil
}
// ==================== Optional Interface fs.Purger ====================
2020-06-04 23:25:14 +02:00
// Purge all files in the directory
2020-04-25 19:55:18 +02:00
//
// Implement this if you have a way of deleting all the files
// quicker than just running Remove() on the result of List()
//
// Return an error if it doesn't exist
2020-06-04 23:25:14 +02:00
func ( f * Fs ) Purge ( ctx context . Context , dir string ) error {
return f . purgeCheck ( ctx , dir , false )
2020-04-25 19:55:18 +02:00
}
// ==================== Optional Interface fs.CleanUpper ====================
// CleanUp the trash in the Fs
func ( f * Fs ) CleanUp ( ctx context . Context ) error {
if f . libraryName == "" {
2022-06-08 22:54:39 +02:00
return errors . New ( "cannot clean up at the root of the seafile server, please select a library to clean up" )
2020-04-25 19:55:18 +02:00
}
libraryID , err := f . getLibraryID ( ctx , f . libraryName )
if err != nil {
return err
}
return f . emptyLibraryTrash ( ctx , libraryID )
}
// ==================== Optional Interface fs.Abouter ====================
// About gets quota information
func ( f * Fs ) About ( ctx context . Context ) ( usage * fs . Usage , err error ) {
accountInfo , err := f . getUserAccountInfo ( ctx )
if err != nil {
return nil , err
}
usage = & fs . Usage {
Used : fs . NewUsageValue ( accountInfo . Usage ) , // bytes in use
}
if accountInfo . Total > 0 {
usage . Total = fs . NewUsageValue ( accountInfo . Total ) // quota of bytes that can be used
usage . Free = fs . NewUsageValue ( accountInfo . Total - accountInfo . Usage ) // bytes which can be uploaded before reaching the quota
}
return usage , nil
}
// ==================== Optional Interface fs.UserInfoer ====================
// UserInfo returns info about the connected user
func ( f * Fs ) UserInfo ( ctx context . Context ) ( map [ string ] string , error ) {
accountInfo , err := f . getUserAccountInfo ( ctx )
if err != nil {
return nil , err
}
return map [ string ] string {
"Name" : accountInfo . Name ,
"Email" : accountInfo . Email ,
} , nil
}
// ==================== Optional Interface fs.PublicLinker ====================
// PublicLink generates a public link to the remote path (usually readable by anyone)
2020-05-31 23:18:01 +02:00
func ( f * Fs ) PublicLink ( ctx context . Context , remote string , expire fs . Duration , unlink bool ) ( string , error ) {
2020-04-25 19:55:18 +02:00
libraryName , filePath := f . splitPath ( remote )
if libraryName == "" {
// We cannot share the whole seafile server, we need at least a library
2022-06-08 22:54:39 +02:00
return "" , errors . New ( "cannot share the root of the seafile server, please select a library to share" )
2020-04-25 19:55:18 +02:00
}
libraryID , err := f . getLibraryID ( ctx , libraryName )
if err != nil {
return "" , err
}
// List existing links first
shareLinks , err := f . listShareLinks ( ctx , libraryID , filePath )
if err != nil {
return "" , err
}
2022-06-08 22:25:17 +02:00
if len ( shareLinks ) > 0 {
2020-04-25 19:55:18 +02:00
for _ , shareLink := range shareLinks {
2022-06-08 22:25:17 +02:00
if ! shareLink . IsExpired {
2020-04-25 19:55:18 +02:00
return shareLink . Link , nil
}
}
}
// No link was found
shareLink , err := f . createShareLink ( ctx , libraryID , filePath )
if err != nil {
return "" , err
}
if shareLink . IsExpired {
return "" , nil
}
return shareLink . Link , nil
}
func ( f * Fs ) listLibraries ( ctx context . Context ) ( entries fs . DirEntries , err error ) {
libraries , err := f . getCachedLibraries ( ctx )
if err != nil {
return nil , errors . New ( "cannot load libraries" )
}
for _ , library := range libraries {
d := fs . NewDir ( library . Name , time . Unix ( library . Modified , 0 ) )
2020-09-15 21:55:10 +02:00
d . SetSize ( library . Size )
2020-04-25 19:55:18 +02:00
entries = append ( entries , d )
}
return entries , nil
}
func ( f * Fs ) libraryExists ( ctx context . Context , libraryName string ) ( bool , error ) {
libraries , err := f . getCachedLibraries ( ctx )
if err != nil {
return false , err
}
for _ , library := range libraries {
if library . Name == libraryName {
return true , nil
}
}
return false , nil
}
func ( f * Fs ) getLibraryID ( ctx context . Context , name string ) ( string , error ) {
libraries , err := f . getCachedLibraries ( ctx )
if err != nil {
return "" , err
}
for _ , library := range libraries {
if library . Name == name {
return library . ID , nil
}
}
return "" , fmt . Errorf ( "cannot find library '%s'" , name )
}
func ( f * Fs ) isLibraryInCache ( libraryName string ) bool {
f . librariesMutex . Lock ( )
defer f . librariesMutex . Unlock ( )
if f . libraries == nil {
return false
}
value , found := f . libraries . GetMaybe ( librariesCacheKey )
2022-06-08 22:25:17 +02:00
if ! found {
2020-04-25 19:55:18 +02:00
return false
}
libraries := value . ( [ ] api . Library )
for _ , library := range libraries {
if library . Name == libraryName {
return true
}
}
return false
}
func ( f * Fs ) isEncrypted ( ctx context . Context , libraryID string ) ( bool , error ) {
libraries , err := f . getCachedLibraries ( ctx )
if err != nil {
return false , err
}
for _ , library := range libraries {
if library . ID == libraryID {
return library . Encrypted , nil
}
}
return false , fmt . Errorf ( "cannot find library ID %s" , libraryID )
}
func ( f * Fs ) authorizeLibrary ( ctx context . Context , libraryID string ) error {
if libraryID == "" {
return errors . New ( "a library ID is needed" )
}
if f . opt . LibraryKey == "" {
// We have no password to send
return nil
}
encrypted , err := f . isEncrypted ( ctx , libraryID )
if err != nil {
return err
}
if encrypted {
fs . Debugf ( nil , "Decrypting library %s" , libraryID )
f . authMu . Lock ( )
defer f . authMu . Unlock ( )
err := f . decryptLibrary ( ctx , libraryID , f . opt . LibraryKey )
if err != nil {
return err
}
}
return nil
}
func ( f * Fs ) mkLibrary ( ctx context . Context , libraryName , password string ) error {
// lock specific to library creation
// we cannot reuse the same lock as we will dead-lock ourself if the libraries are not in cache
createLibraryMutex . Lock ( )
defer createLibraryMutex . Unlock ( )
if libraryName == "" {
return errors . New ( "a library name is needed" )
}
// It's quite likely that multiple go routines are going to try creating the same library
// at the start of a sync/copy. After releasing the mutex the calls waiting would try to create
// the same library again. So we'd better check the library exists first
if f . isLibraryInCache ( libraryName ) {
return nil
}
fs . Debugf ( nil , "%s: Create library '%s'" , f . Name ( ) , libraryName )
f . librariesMutex . Lock ( )
defer f . librariesMutex . Unlock ( )
library , err := f . createLibrary ( ctx , libraryName , password )
if err != nil {
return err
}
// Stores the library details into the cache
value , found := f . libraries . GetMaybe ( librariesCacheKey )
2022-06-08 22:25:17 +02:00
if ! found {
2020-04-25 19:55:18 +02:00
// Don't update the cache at that point
return nil
}
libraries := value . ( [ ] api . Library )
libraries = append ( libraries , api . Library {
ID : library . ID ,
Name : library . Name ,
} )
f . libraries . Put ( librariesCacheKey , libraries )
return nil
}
// splitPath returns the library name and the full path inside the library
func ( f * Fs ) splitPath ( dir string ) ( library , folder string ) {
library = f . libraryName
folder = dir
if library == "" {
// The first part of the path is the library
library , folder = bucket . Split ( dir )
} else if f . rootDirectory != "" {
// Adds the root folder to the path to get a full path
folder = path . Join ( f . rootDirectory , folder )
}
return
}
func ( f * Fs ) listDir ( ctx context . Context , dir string , recursive bool ) ( entries fs . DirEntries , err error ) {
libraryName , dirPath := f . splitPath ( dir )
libraryID , err := f . getLibraryID ( ctx , libraryName )
if err != nil {
return nil , err
}
directoryEntries , err := f . getDirectoryEntries ( ctx , libraryID , dirPath , recursive )
if err != nil {
return nil , err
}
return f . buildDirEntries ( dir , libraryID , dirPath , directoryEntries , recursive ) , nil
}
// listDirCallback is calling listDir with the recursive option and is sending the result to the callback
func ( f * Fs ) listDirCallback ( ctx context . Context , dir string , callback fs . ListRCallback ) error {
entries , err := f . listDir ( ctx , dir , true )
if err != nil {
return err
}
err = callback ( entries )
if err != nil {
return err
}
return nil
}
func ( f * Fs ) buildDirEntries ( parentPath , libraryID , parentPathInLibrary string , directoryEntries [ ] api . DirEntry , recursive bool ) ( entries fs . DirEntries ) {
for _ , entry := range directoryEntries {
var filePath , filePathInLibrary string
if recursive {
// In recursive mode, paths are built from DirEntry (+ a starting point)
entryPath := strings . TrimPrefix ( entry . Path , "/" )
// If we're listing from some path inside the library (not the root)
// there's already a path in parameter, which will also be included in the entry path
entryPath = strings . TrimPrefix ( entryPath , parentPathInLibrary )
entryPath = strings . TrimPrefix ( entryPath , "/" )
filePath = path . Join ( parentPath , entryPath , entry . Name )
filePathInLibrary = path . Join ( parentPathInLibrary , entryPath , entry . Name )
} else {
// In non-recursive mode, paths are build from the parameters
filePath = path . Join ( parentPath , entry . Name )
filePathInLibrary = path . Join ( parentPathInLibrary , entry . Name )
}
if entry . Type == api . FileTypeDir {
d := fs .
NewDir ( filePath , time . Unix ( entry . Modified , 0 ) ) .
SetSize ( entry . Size ) .
SetID ( entry . ID )
entries = append ( entries , d )
} else if entry . Type == api . FileTypeFile {
object := & Object {
fs : f ,
id : entry . ID ,
remote : filePath ,
pathInLibrary : filePathInLibrary ,
size : entry . Size ,
modTime : time . Unix ( entry . Modified , 0 ) ,
libraryID : libraryID ,
}
entries = append ( entries , object )
}
}
return entries
}
func ( f * Fs ) mkDir ( ctx context . Context , dir string ) error {
library , fullPath := f . splitPath ( dir )
libraryID , err := f . getLibraryID ( ctx , library )
if err != nil {
return err
}
return f . mkMultiDir ( ctx , libraryID , fullPath )
}
func ( f * Fs ) mkMultiDir ( ctx context . Context , libraryID , dir string ) error {
// rebuild the path one by one
currentPath := ""
for _ , singleDir := range splitPath ( dir ) {
currentPath = path . Join ( currentPath , singleDir )
err := f . mkSingleDir ( ctx , libraryID , currentPath )
if err != nil {
return err
}
}
return nil
}
func ( f * Fs ) mkSingleDir ( ctx context . Context , libraryID , dir string ) error {
f . createDirMutex . Lock ( )
defer f . createDirMutex . Unlock ( )
dirDetails , err := f . getDirectoryDetails ( ctx , libraryID , dir )
if err == nil && dirDetails != nil {
// Don't fail if the directory exists
return nil
}
if err == fs . ErrorDirNotFound {
err = f . createDir ( ctx , libraryID , dir )
if err != nil {
return err
}
return nil
}
return err
}
func ( f * Fs ) getDirectoryEntries ( ctx context . Context , libraryID , folder string , recursive bool ) ( [ ] api . DirEntry , error ) {
if f . useOldDirectoryAPI {
return f . getDirectoryEntriesAPIv2 ( ctx , libraryID , folder )
}
return f . getDirectoryEntriesAPIv21 ( ctx , libraryID , folder , recursive )
}
// splitPath creates a slice of paths
func splitPath ( tree string ) ( paths [ ] string ) {
tree , leaf := path . Split ( path . Clean ( tree ) )
for leaf != "" && leaf != "." {
paths = append ( [ ] string { leaf } , paths ... )
tree , leaf = path . Split ( path . Clean ( tree ) )
}
return
}
func ( f * Fs ) getCachedLibraries ( ctx context . Context ) ( [ ] api . Library , error ) {
f . librariesMutex . Lock ( )
defer f . librariesMutex . Unlock ( )
libraries , err := f . libraries . Get ( librariesCacheKey , func ( key string ) ( value interface { } , ok bool , error error ) {
// Load the libraries if not present in the cache
libraries , err := f . getLibraries ( ctx )
if err != nil {
return nil , false , err
}
return libraries , true , nil
} )
if err != nil {
return nil , err
}
// Type assertion
return libraries . ( [ ] api . Library ) , nil
}
func ( f * Fs ) newObject ( ctx context . Context , remote string , size int64 , modTime time . Time ) * Object {
libraryName , remotePath := f . splitPath ( remote )
libraryID , _ := f . getLibraryID ( ctx , libraryName ) // If error it means the library does not exist (yet)
object := & Object {
fs : f ,
remote : remote ,
libraryID : libraryID ,
pathInLibrary : remotePath ,
size : size ,
modTime : modTime ,
}
return object
}
// Check the interfaces are satisfied
var (
_ fs . Fs = & Fs { }
_ fs . Abouter = & Fs { }
_ fs . CleanUpper = & Fs { }
_ fs . Copier = & Fs { }
_ fs . Mover = & Fs { }
_ fs . DirMover = & Fs { }
_ fs . ListRer = & Fs { }
_ fs . Purger = & Fs { }
_ fs . PutStreamer = & Fs { }
_ fs . PublicLinker = & Fs { }
_ fs . UserInfoer = & Fs { }
2023-01-11 21:25:44 +01:00
_ fs . Shutdowner = & Fs { }
2020-04-25 19:55:18 +02:00
_ fs . Object = & Object { }
_ fs . IDer = & Object { }
)