2015-09-23 01:47:16 +08:00
|
|
|
// Package swift provides an interface to the Swift object storage system
|
2013-06-28 03:13:07 +08:00
|
|
|
package swift
|
2012-12-26 20:23:58 +08:00
|
|
|
|
|
|
|
import (
|
2017-09-14 13:42:16 +08:00
|
|
|
"bufio"
|
2015-09-23 14:57:48 +08:00
|
|
|
"bytes"
|
2012-12-26 20:23:58 +08:00
|
|
|
"fmt"
|
|
|
|
"io"
|
2014-05-06 02:52:52 +08:00
|
|
|
"path"
|
2012-12-29 19:35:41 +08:00
|
|
|
"regexp"
|
2015-10-03 22:38:35 +08:00
|
|
|
"strconv"
|
2012-12-26 20:23:58 +08:00
|
|
|
"strings"
|
2017-06-07 21:16:50 +08:00
|
|
|
"sync"
|
2012-12-26 20:23:58 +08:00
|
|
|
"time"
|
|
|
|
|
2014-03-16 00:06:11 +08:00
|
|
|
"github.com/ncw/rclone/fs"
|
2018-05-15 01:06:57 +08:00
|
|
|
"github.com/ncw/rclone/fs/config/configmap"
|
|
|
|
"github.com/ncw/rclone/fs/config/configstruct"
|
2018-01-13 00:30:54 +08:00
|
|
|
"github.com/ncw/rclone/fs/fserrors"
|
|
|
|
"github.com/ncw/rclone/fs/fshttp"
|
|
|
|
"github.com/ncw/rclone/fs/hash"
|
|
|
|
"github.com/ncw/rclone/fs/operations"
|
|
|
|
"github.com/ncw/rclone/fs/walk"
|
2018-11-23 06:15:52 +08:00
|
|
|
"github.com/ncw/rclone/lib/pacer"
|
2014-03-16 00:06:11 +08:00
|
|
|
"github.com/ncw/swift"
|
2016-06-12 22:06:02 +08:00
|
|
|
"github.com/pkg/errors"
|
2015-09-23 14:57:48 +08:00
|
|
|
)
|
|
|
|
|
2015-11-07 23:17:46 +08:00
|
|
|
// Constants
|
|
|
|
const (
|
|
|
|
directoryMarkerContentType = "application/directory" // content type of directory marker objects
|
2017-06-06 22:03:52 +08:00
|
|
|
listChunks = 1000 // chunk size to read directory listings
|
2018-09-07 19:02:27 +08:00
|
|
|
defaultChunkSize = 5 * fs.GibiByte
|
2018-11-23 06:15:52 +08:00
|
|
|
minSleep = 10 * time.Millisecond // In case of error, start at 10ms sleep.
|
2015-11-07 23:17:46 +08:00
|
|
|
)
|
|
|
|
|
2018-09-05 03:27:48 +08:00
|
|
|
// SharedOptions are shared between swift and hubic
|
|
|
|
var SharedOptions = []fs.Option{{
|
2018-10-02 01:36:15 +08:00
|
|
|
Name: "chunk_size",
|
|
|
|
Help: `Above this size files will be chunked into a _segments container.
|
|
|
|
|
|
|
|
Above this size files will be chunked into a _segments container. The
|
|
|
|
default for this is 5GB which is its maximum value.`,
|
2018-09-07 19:02:27 +08:00
|
|
|
Default: defaultChunkSize,
|
2018-09-05 03:27:48 +08:00
|
|
|
Advanced: true,
|
2018-11-28 23:51:18 +08:00
|
|
|
}, {
|
|
|
|
Name: "no_chunk",
|
|
|
|
Help: `Don't chunk files during streaming upload.
|
|
|
|
|
|
|
|
When doing streaming uploads (eg using rcat or mount) setting this
|
|
|
|
flag will cause the swift backend to not upload chunked files.
|
|
|
|
|
|
|
|
This will limit the maximum upload size to 5GB. However non chunked
|
|
|
|
files are easier to deal with and have an MD5SUM.
|
|
|
|
|
|
|
|
Rclone will still chunk files bigger than chunk_size when doing normal
|
|
|
|
copy operations.`,
|
|
|
|
Default: false,
|
|
|
|
Advanced: true,
|
2018-09-05 03:27:48 +08:00
|
|
|
}}
|
|
|
|
|
2013-06-28 03:13:07 +08:00
|
|
|
// Register with Fs
|
|
|
|
func init() {
|
2016-02-18 19:35:25 +08:00
|
|
|
fs.Register(&fs.RegInfo{
|
2016-02-16 02:11:53 +08:00
|
|
|
Name: "swift",
|
|
|
|
Description: "Openstack Swift (Rackspace Cloud Files, Memset Memstore, OVH)",
|
|
|
|
NewFs: NewFs,
|
2018-09-05 03:27:48 +08:00
|
|
|
Options: append([]fs.Option{{
|
2018-05-15 01:06:57 +08:00
|
|
|
Name: "env_auth",
|
|
|
|
Help: "Get swift credentials from environment variables in standard OpenStack form.",
|
|
|
|
Default: false,
|
2017-08-11 04:38:45 +08:00
|
|
|
Examples: []fs.OptionExample{
|
|
|
|
{
|
|
|
|
Value: "false",
|
|
|
|
Help: "Enter swift credentials in the next step",
|
|
|
|
}, {
|
|
|
|
Value: "true",
|
|
|
|
Help: "Get swift credentials from environment vars. Leave other fields blank if using this.",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}, {
|
2014-03-16 00:06:11 +08:00
|
|
|
Name: "user",
|
2017-11-02 05:26:04 +08:00
|
|
|
Help: "User name to log in (OS_USERNAME).",
|
2014-03-16 00:06:11 +08:00
|
|
|
}, {
|
|
|
|
Name: "key",
|
2017-11-02 05:26:04 +08:00
|
|
|
Help: "API key or password (OS_PASSWORD).",
|
2014-03-16 00:06:11 +08:00
|
|
|
}, {
|
|
|
|
Name: "auth",
|
2017-11-02 05:26:04 +08:00
|
|
|
Help: "Authentication URL for server (OS_AUTH_URL).",
|
2014-03-16 00:06:11 +08:00
|
|
|
Examples: []fs.OptionExample{{
|
|
|
|
Help: "Rackspace US",
|
|
|
|
Value: "https://auth.api.rackspacecloud.com/v1.0",
|
|
|
|
}, {
|
|
|
|
Help: "Rackspace UK",
|
|
|
|
Value: "https://lon.auth.api.rackspacecloud.com/v1.0",
|
|
|
|
}, {
|
|
|
|
Help: "Rackspace v2",
|
|
|
|
Value: "https://identity.api.rackspacecloud.com/v2.0",
|
|
|
|
}, {
|
|
|
|
Help: "Memset Memstore UK",
|
|
|
|
Value: "https://auth.storage.memset.com/v1.0",
|
|
|
|
}, {
|
|
|
|
Help: "Memset Memstore UK v2",
|
|
|
|
Value: "https://auth.storage.memset.com/v2.0",
|
2016-01-07 21:15:10 +08:00
|
|
|
}, {
|
|
|
|
Help: "OVH",
|
|
|
|
Value: "https://auth.cloud.ovh.net/v2.0",
|
2014-03-16 00:06:11 +08:00
|
|
|
}},
|
2017-11-02 05:26:04 +08:00
|
|
|
}, {
|
|
|
|
Name: "user_id",
|
|
|
|
Help: "User ID to log in - optional - most swift systems use user and leave this blank (v3 auth) (OS_USER_ID).",
|
2016-04-21 07:00:49 +08:00
|
|
|
}, {
|
|
|
|
Name: "domain",
|
2017-11-02 05:26:04 +08:00
|
|
|
Help: "User domain - optional (v3 auth) (OS_USER_DOMAIN_NAME)",
|
2014-11-24 20:05:10 +08:00
|
|
|
}, {
|
|
|
|
Name: "tenant",
|
2017-11-02 22:49:07 +08:00
|
|
|
Help: "Tenant name - optional for v1 auth, this or tenant_id required otherwise (OS_TENANT_NAME or OS_PROJECT_NAME)",
|
|
|
|
}, {
|
|
|
|
Name: "tenant_id",
|
|
|
|
Help: "Tenant ID - optional for v1 auth, this or tenant required otherwise (OS_TENANT_ID)",
|
2016-07-06 00:34:22 +08:00
|
|
|
}, {
|
|
|
|
Name: "tenant_domain",
|
2017-11-02 05:26:04 +08:00
|
|
|
Help: "Tenant domain - optional (v3 auth) (OS_PROJECT_DOMAIN_NAME)",
|
2015-03-05 01:09:53 +08:00
|
|
|
}, {
|
|
|
|
Name: "region",
|
2017-11-02 05:26:04 +08:00
|
|
|
Help: "Region name - optional (OS_REGION_NAME)",
|
2016-02-03 03:45:05 +08:00
|
|
|
}, {
|
|
|
|
Name: "storage_url",
|
2017-11-02 05:26:04 +08:00
|
|
|
Help: "Storage URL - optional (OS_STORAGE_URL)",
|
2017-12-08 05:30:58 +08:00
|
|
|
}, {
|
|
|
|
Name: "auth_token",
|
|
|
|
Help: "Auth Token from alternate authentication - optional (OS_AUTH_TOKEN)",
|
2019-01-29 00:55:17 +08:00
|
|
|
}, {
|
|
|
|
Name: "application_credential_id",
|
|
|
|
Help: "Application Credential ID (OS_APPLICATION_CREDENTIAL_ID)",
|
|
|
|
}, {
|
|
|
|
Name: "application_credential_name",
|
|
|
|
Help: "Application Credential Name (OS_APPLICATION_CREDENTIAL_NAME)",
|
|
|
|
}, {
|
|
|
|
Name: "application_credential_secret",
|
|
|
|
Help: "Application Credential Secret (OS_APPLICATION_CREDENTIAL_SECRET)",
|
2016-06-04 00:52:02 +08:00
|
|
|
}, {
|
2018-05-15 01:06:57 +08:00
|
|
|
Name: "auth_version",
|
|
|
|
Help: "AuthVersion - optional - set to (1,2,3) if your auth URL has no version (ST_AUTH_VERSION)",
|
|
|
|
Default: 0,
|
2017-08-11 04:38:45 +08:00
|
|
|
}, {
|
2018-05-15 01:06:57 +08:00
|
|
|
Name: "endpoint_type",
|
|
|
|
Help: "Endpoint type to choose from the service catalogue (OS_ENDPOINT_TYPE)",
|
|
|
|
Default: "public",
|
2017-08-11 04:38:45 +08:00
|
|
|
Examples: []fs.OptionExample{{
|
|
|
|
Help: "Public (default, choose this if not sure)",
|
|
|
|
Value: "public",
|
|
|
|
}, {
|
|
|
|
Help: "Internal (use internal service net)",
|
|
|
|
Value: "internal",
|
|
|
|
}, {
|
|
|
|
Help: "Admin",
|
|
|
|
Value: "admin",
|
|
|
|
}},
|
2018-08-05 04:09:17 +08:00
|
|
|
}, {
|
2018-10-02 01:36:15 +08:00
|
|
|
Name: "storage_policy",
|
|
|
|
Help: `The storage policy to use when creating a new container
|
|
|
|
|
|
|
|
This applies the specified storage policy when creating a new
|
|
|
|
container. The policy cannot be changed afterwards. The allowed
|
|
|
|
configuration values and their meaning depend on your Swift storage
|
|
|
|
provider.`,
|
2018-08-05 04:09:17 +08:00
|
|
|
Default: "",
|
|
|
|
Examples: []fs.OptionExample{{
|
|
|
|
Help: "Default",
|
|
|
|
Value: "",
|
|
|
|
}, {
|
|
|
|
Help: "OVH Public Cloud Storage",
|
|
|
|
Value: "pcs",
|
|
|
|
}, {
|
|
|
|
Help: "OVH Public Cloud Archive",
|
|
|
|
Value: "pca",
|
|
|
|
}},
|
2018-09-05 03:27:48 +08:00
|
|
|
}}, SharedOptions...),
|
2014-03-16 00:06:11 +08:00
|
|
|
})
|
2018-05-15 01:06:57 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Options defines the configuration for this backend
|
|
|
|
type Options struct {
|
2019-01-29 00:55:17 +08:00
|
|
|
EnvAuth bool `config:"env_auth"`
|
|
|
|
User string `config:"user"`
|
|
|
|
Key string `config:"key"`
|
|
|
|
Auth string `config:"auth"`
|
|
|
|
UserID string `config:"user_id"`
|
|
|
|
Domain string `config:"domain"`
|
|
|
|
Tenant string `config:"tenant"`
|
|
|
|
TenantID string `config:"tenant_id"`
|
|
|
|
TenantDomain string `config:"tenant_domain"`
|
|
|
|
Region string `config:"region"`
|
|
|
|
StorageURL string `config:"storage_url"`
|
|
|
|
AuthToken string `config:"auth_token"`
|
|
|
|
AuthVersion int `config:"auth_version"`
|
2019-01-12 00:57:05 +08:00
|
|
|
ApplicationCredentialID string `config:"application_credential_id"`
|
2019-01-29 00:55:17 +08:00
|
|
|
ApplicationCredentialName string `config:"application_credential_name"`
|
|
|
|
ApplicationCredentialSecret string `config:"application_credential_secret"`
|
|
|
|
StoragePolicy string `config:"storage_policy"`
|
|
|
|
EndpointType string `config:"endpoint_type"`
|
|
|
|
ChunkSize fs.SizeSuffix `config:"chunk_size"`
|
|
|
|
NoChunk bool `config:"no_chunk"`
|
2013-06-28 03:13:07 +08:00
|
|
|
}
|
|
|
|
|
2015-11-07 19:14:46 +08:00
|
|
|
// Fs represents a remote swift server
|
|
|
|
type Fs struct {
|
2016-03-23 22:15:38 +08:00
|
|
|
name string // name of this remote
|
2017-01-14 01:21:47 +08:00
|
|
|
root string // the path we are working on if any
|
|
|
|
features *fs.Features // optional features
|
2018-05-15 01:06:57 +08:00
|
|
|
opt Options // options for this backend
|
2016-03-23 22:15:38 +08:00
|
|
|
c *swift.Connection // the connection to the swift server
|
|
|
|
container string // the container we are working on
|
2017-06-07 21:16:50 +08:00
|
|
|
containerOKMu sync.Mutex // mutex to protect container OK
|
|
|
|
containerOK bool // true if we have created the container
|
2016-03-23 22:15:38 +08:00
|
|
|
segmentsContainer string // container to store the segments (if any) in
|
2017-08-30 22:54:49 +08:00
|
|
|
noCheckContainer bool // don't check the container before creating it
|
2019-02-10 04:52:15 +08:00
|
|
|
pacer *fs.Pacer // To pace the API calls
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2015-11-07 19:14:46 +08:00
|
|
|
// Object describes a swift object
|
2012-12-26 20:23:58 +08:00
|
|
|
//
|
|
|
|
// Will definitely have info but maybe not meta
|
2015-11-07 19:14:46 +08:00
|
|
|
type Object struct {
|
2018-12-02 18:23:55 +08:00
|
|
|
fs *Fs // what this object is part of
|
|
|
|
remote string // The remote path
|
|
|
|
size int64
|
|
|
|
lastModified time.Time
|
|
|
|
contentType string
|
|
|
|
md5 string
|
|
|
|
headers swift.Headers // The object headers if known
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// ------------------------------------------------------------
|
|
|
|
|
2015-09-23 01:47:16 +08:00
|
|
|
// Name of the remote (as passed into NewFs)
|
2015-11-07 19:14:46 +08:00
|
|
|
func (f *Fs) Name() string {
|
2015-08-22 23:53:11 +08:00
|
|
|
return f.name
|
|
|
|
}
|
|
|
|
|
2015-09-23 01:47:16 +08:00
|
|
|
// Root of the remote (as passed into NewFs)
|
2015-11-07 19:14:46 +08:00
|
|
|
func (f *Fs) Root() string {
|
2015-09-02 03:45:27 +08:00
|
|
|
if f.root == "" {
|
|
|
|
return f.container
|
|
|
|
}
|
|
|
|
return f.container + "/" + f.root
|
|
|
|
}
|
|
|
|
|
2015-11-07 19:14:46 +08:00
|
|
|
// String converts this Fs to a string
|
|
|
|
func (f *Fs) String() string {
|
2014-05-06 00:30:55 +08:00
|
|
|
if f.root == "" {
|
|
|
|
return fmt.Sprintf("Swift container %s", f.container)
|
|
|
|
}
|
|
|
|
return fmt.Sprintf("Swift container %s path %s", f.container, f.root)
|
2013-01-01 00:40:34 +08:00
|
|
|
}
|
|
|
|
|
2017-01-14 01:21:47 +08:00
|
|
|
// Features returns the optional features of this Fs
|
|
|
|
func (f *Fs) Features() *fs.Features {
|
|
|
|
return f.features
|
|
|
|
}
|
|
|
|
|
2018-11-23 06:15:52 +08:00
|
|
|
// retryErrorCodes is a slice of error codes that we will retry
|
|
|
|
var retryErrorCodes = []int{
|
|
|
|
401, // Unauthorized (eg "Token has expired")
|
|
|
|
408, // Request Timeout
|
|
|
|
409, // Conflict - various states that could be resolved on a retry
|
|
|
|
429, // Rate exceeded.
|
|
|
|
500, // Get occasional 500 Internal Server Error
|
|
|
|
503, // Service Unavailable/Slow Down - "Reduce your request rate"
|
|
|
|
504, // Gateway Time-out
|
|
|
|
}
|
|
|
|
|
|
|
|
// shouldRetry returns a boolean as to whether this err deserves to be
|
|
|
|
// retried. It returns the err as a convenience
|
|
|
|
func shouldRetry(err error) (bool, error) {
|
|
|
|
// If this is an swift.Error object extract the HTTP error code
|
|
|
|
if swiftError, ok := err.(*swift.Error); ok {
|
|
|
|
for _, e := range retryErrorCodes {
|
|
|
|
if swiftError.StatusCode == e {
|
|
|
|
return true, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Check for generic failure conditions
|
|
|
|
return fserrors.ShouldRetry(err), err
|
|
|
|
}
|
|
|
|
|
2019-03-17 19:38:25 +08:00
|
|
|
// shouldRetryHeaders returns a boolean as to whether this err
|
|
|
|
// deserves to be retried. It reads the headers passed in looking for
|
|
|
|
// `Retry-After`. It returns the err as a convenience
|
|
|
|
func shouldRetryHeaders(headers swift.Headers, err error) (bool, error) {
|
|
|
|
if swiftError, ok := err.(*swift.Error); ok && swiftError.StatusCode == 429 {
|
|
|
|
if value := headers["Retry-After"]; value != "" {
|
|
|
|
retryAfter, parseErr := strconv.Atoi(value)
|
|
|
|
if parseErr != nil {
|
|
|
|
fs.Errorf(nil, "Failed to parse Retry-After: %q: %v", value, parseErr)
|
|
|
|
} else {
|
|
|
|
duration := time.Second * time.Duration(retryAfter)
|
|
|
|
if duration <= 60*time.Second {
|
|
|
|
// Do a short sleep immediately
|
|
|
|
fs.Debugf(nil, "Sleeping for %v to obey Retry-After", duration)
|
|
|
|
time.Sleep(duration)
|
|
|
|
return true, err
|
|
|
|
}
|
|
|
|
// Delay a long sleep for a retry
|
|
|
|
return false, fserrors.NewErrorRetryAfter(duration)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return shouldRetry(err)
|
|
|
|
}
|
|
|
|
|
2014-03-16 00:06:11 +08:00
|
|
|
// Pattern to match a swift path
|
2018-08-27 06:19:28 +08:00
|
|
|
var matcher = regexp.MustCompile(`^/*([^/]*)(.*)$`)
|
2014-03-16 00:06:11 +08:00
|
|
|
|
2012-12-29 19:35:41 +08:00
|
|
|
// parseParse parses a swift 'url'
|
|
|
|
func parsePath(path string) (container, directory string, err error) {
|
2014-03-16 00:06:11 +08:00
|
|
|
parts := matcher.FindStringSubmatch(path)
|
|
|
|
if parts == nil {
|
2016-06-12 22:06:02 +08:00
|
|
|
err = errors.Errorf("couldn't find container in swift path %q", path)
|
2012-12-29 19:35:41 +08:00
|
|
|
} else {
|
2014-03-16 00:06:11 +08:00
|
|
|
container, directory = parts[1], parts[2]
|
2012-12-29 19:35:41 +08:00
|
|
|
directory = strings.Trim(directory, "/")
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// swiftConnection makes a connection to swift
|
2018-05-15 01:06:57 +08:00
|
|
|
func swiftConnection(opt *Options, name string) (*swift.Connection, error) {
|
2012-12-29 19:35:41 +08:00
|
|
|
c := &swift.Connection{
|
2017-11-02 05:26:04 +08:00
|
|
|
// Keep these in the same order as the Config for ease of checking
|
2019-01-29 00:55:17 +08:00
|
|
|
UserName: opt.User,
|
|
|
|
ApiKey: opt.Key,
|
|
|
|
AuthUrl: opt.Auth,
|
|
|
|
UserId: opt.UserID,
|
|
|
|
Domain: opt.Domain,
|
|
|
|
Tenant: opt.Tenant,
|
|
|
|
TenantId: opt.TenantID,
|
|
|
|
TenantDomain: opt.TenantDomain,
|
|
|
|
Region: opt.Region,
|
|
|
|
StorageUrl: opt.StorageURL,
|
|
|
|
AuthToken: opt.AuthToken,
|
|
|
|
AuthVersion: opt.AuthVersion,
|
2019-01-12 00:57:05 +08:00
|
|
|
ApplicationCredentialId: opt.ApplicationCredentialID,
|
2019-01-29 00:55:17 +08:00
|
|
|
ApplicationCredentialName: opt.ApplicationCredentialName,
|
|
|
|
ApplicationCredentialSecret: opt.ApplicationCredentialSecret,
|
|
|
|
EndpointType: swift.EndpointType(opt.EndpointType),
|
|
|
|
ConnectTimeout: 10 * fs.Config.ConnectTimeout, // Use the timeouts in the transport
|
|
|
|
Timeout: 10 * fs.Config.Timeout, // Use the timeouts in the transport
|
|
|
|
Transport: fshttp.NewTransport(fs.Config),
|
2012-12-29 19:35:41 +08:00
|
|
|
}
|
2018-05-15 01:06:57 +08:00
|
|
|
if opt.EnvAuth {
|
2017-08-11 04:38:45 +08:00
|
|
|
err := c.ApplyEnvironment()
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "failed to read environment variables")
|
|
|
|
}
|
|
|
|
}
|
2018-05-05 18:49:03 +08:00
|
|
|
StorageUrl, AuthToken := c.StorageUrl, c.AuthToken // nolint
|
2017-12-08 05:30:58 +08:00
|
|
|
if !c.Authenticated() {
|
2019-01-29 00:55:17 +08:00
|
|
|
if (c.ApplicationCredentialId != "" || c.ApplicationCredentialName != "") && c.ApplicationCredentialSecret == "" {
|
|
|
|
if c.UserName == "" && c.UserId == "" {
|
|
|
|
return nil, errors.New("user name or user id not found for authentication (and no storage_url+auth_token is provided)")
|
|
|
|
}
|
|
|
|
if c.ApiKey == "" {
|
|
|
|
return nil, errors.New("key not found")
|
|
|
|
}
|
2017-12-08 05:30:58 +08:00
|
|
|
}
|
|
|
|
if c.AuthUrl == "" {
|
|
|
|
return nil, errors.New("auth not found")
|
|
|
|
}
|
2018-02-16 03:18:11 +08:00
|
|
|
err := c.Authenticate() // fills in c.StorageUrl and c.AuthToken
|
2017-12-08 05:30:58 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2012-12-29 19:35:41 +08:00
|
|
|
}
|
2017-12-14 22:23:55 +08:00
|
|
|
// Make sure we re-auth with the AuthToken and StorageUrl
|
2018-02-16 03:18:11 +08:00
|
|
|
// provided by wrapping the existing auth, so we can just
|
|
|
|
// override one or the other or both.
|
|
|
|
if StorageUrl != "" || AuthToken != "" {
|
2018-08-21 23:12:42 +08:00
|
|
|
// Re-write StorageURL and AuthToken if they are being
|
|
|
|
// overridden as c.Authenticate above will have
|
|
|
|
// overwritten them.
|
|
|
|
if StorageUrl != "" {
|
|
|
|
c.StorageUrl = StorageUrl
|
|
|
|
}
|
|
|
|
if AuthToken != "" {
|
|
|
|
c.AuthToken = AuthToken
|
|
|
|
}
|
2018-02-16 03:18:11 +08:00
|
|
|
c.Auth = newAuth(c.Auth, StorageUrl, AuthToken)
|
2017-12-14 22:23:55 +08:00
|
|
|
}
|
2012-12-29 19:35:41 +08:00
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
|
2018-09-07 19:02:27 +08:00
|
|
|
func checkUploadChunkSize(cs fs.SizeSuffix) error {
|
|
|
|
const minChunkSize = fs.Byte
|
|
|
|
if cs < minChunkSize {
|
|
|
|
return errors.Errorf("%s is less than %s", cs, minChunkSize)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (f *Fs) setUploadChunkSize(cs fs.SizeSuffix) (old fs.SizeSuffix, err error) {
|
|
|
|
err = checkUploadChunkSize(cs)
|
|
|
|
if err == nil {
|
|
|
|
old, f.opt.ChunkSize = f.opt.ChunkSize, cs
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2018-09-05 03:27:48 +08:00
|
|
|
// NewFsWithConnection constructs an Fs from the path, container:path
|
2017-08-30 22:54:49 +08:00
|
|
|
// and authenticated connection.
|
|
|
|
//
|
|
|
|
// if noCheckContainer is set then the Fs won't check the container
|
|
|
|
// exists before creating it.
|
2018-05-15 01:06:57 +08:00
|
|
|
func NewFsWithConnection(opt *Options, name, root string, c *swift.Connection, noCheckContainer bool) (fs.Fs, error) {
|
2014-05-06 02:52:52 +08:00
|
|
|
container, directory, err := parsePath(root)
|
2012-12-29 19:35:41 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-11-07 19:14:46 +08:00
|
|
|
f := &Fs{
|
2015-09-26 19:51:05 +08:00
|
|
|
name: name,
|
2018-05-15 01:06:57 +08:00
|
|
|
opt: *opt,
|
2016-03-23 22:15:38 +08:00
|
|
|
c: c,
|
2015-09-26 19:51:05 +08:00
|
|
|
container: container,
|
|
|
|
segmentsContainer: container + "_segments",
|
|
|
|
root: directory,
|
2017-08-30 22:54:49 +08:00
|
|
|
noCheckContainer: noCheckContainer,
|
2019-02-10 04:52:15 +08:00
|
|
|
pacer: fs.NewPacer(pacer.NewS3(pacer.MinSleep(minSleep))),
|
2014-05-06 00:30:55 +08:00
|
|
|
}
|
2017-08-09 22:27:43 +08:00
|
|
|
f.features = (&fs.Features{
|
|
|
|
ReadMimeType: true,
|
|
|
|
WriteMimeType: true,
|
|
|
|
BucketBased: true,
|
|
|
|
}).Fill(f)
|
2014-05-06 02:52:52 +08:00
|
|
|
if f.root != "" {
|
|
|
|
f.root += "/"
|
2015-11-12 01:19:57 +08:00
|
|
|
// Check to see if the object exists - ignoring directory markers
|
2018-11-23 06:15:52 +08:00
|
|
|
var info swift.Object
|
|
|
|
err = f.pacer.Call(func() (bool, error) {
|
2019-03-17 19:38:25 +08:00
|
|
|
var rxHeaders swift.Headers
|
|
|
|
info, rxHeaders, err = f.c.Object(container, directory)
|
|
|
|
return shouldRetryHeaders(rxHeaders, err)
|
2018-11-23 06:15:52 +08:00
|
|
|
})
|
2015-11-12 01:19:57 +08:00
|
|
|
if err == nil && info.ContentType != directoryMarkerContentType {
|
2014-05-06 02:52:52 +08:00
|
|
|
f.root = path.Dir(directory)
|
|
|
|
if f.root == "." {
|
|
|
|
f.root = ""
|
|
|
|
} else {
|
|
|
|
f.root += "/"
|
|
|
|
}
|
2016-06-22 01:01:53 +08:00
|
|
|
// return an error with an fs which points to the parent
|
|
|
|
return f, fs.ErrorIsFile
|
2014-05-06 02:52:52 +08:00
|
|
|
}
|
|
|
|
}
|
2012-12-29 19:35:41 +08:00
|
|
|
return f, nil
|
|
|
|
}
|
|
|
|
|
2019-02-08 01:41:17 +08:00
|
|
|
// NewFs constructs an Fs from the path, container:path
|
2018-05-15 01:06:57 +08:00
|
|
|
func NewFs(name, root string, m configmap.Mapper) (fs.Fs, error) {
|
|
|
|
// Parse config into Options struct
|
|
|
|
opt := new(Options)
|
|
|
|
err := configstruct.Set(m, opt)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2018-09-07 19:02:27 +08:00
|
|
|
err = checkUploadChunkSize(opt.ChunkSize)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "swift: chunk size")
|
|
|
|
}
|
2018-05-15 01:06:57 +08:00
|
|
|
|
|
|
|
c, err := swiftConnection(opt, name)
|
2015-11-08 23:29:58 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2018-05-15 01:06:57 +08:00
|
|
|
return NewFsWithConnection(opt, name, root, c, false)
|
2015-11-08 23:29:58 +08:00
|
|
|
}
|
|
|
|
|
2016-06-26 04:58:34 +08:00
|
|
|
// Return an Object from a path
|
2012-12-26 20:23:58 +08:00
|
|
|
//
|
2016-06-26 04:23:20 +08:00
|
|
|
// If it can't be found it returns the error fs.ErrorObjectNotFound.
|
|
|
|
func (f *Fs) newObjectWithInfo(remote string, info *swift.Object) (fs.Object, error) {
|
2015-11-07 19:14:46 +08:00
|
|
|
o := &Object{
|
|
|
|
fs: f,
|
2012-12-26 20:23:58 +08:00
|
|
|
remote: remote,
|
|
|
|
}
|
2016-03-18 01:36:20 +08:00
|
|
|
// Note that due to a quirk of swift, dynamic large objects are
|
2015-12-03 05:23:56 +08:00
|
|
|
// returned as 0 bytes in the listing. Correct this here by
|
|
|
|
// making sure we read the full metadata for all 0 byte files.
|
2016-09-08 23:44:11 +08:00
|
|
|
// We don't read the metadata for directory marker objects.
|
|
|
|
if info != nil && info.Bytes == 0 && info.ContentType != "application/directory" {
|
2015-12-03 05:23:56 +08:00
|
|
|
info = nil
|
|
|
|
}
|
2012-12-26 20:23:58 +08:00
|
|
|
if info != nil {
|
2015-09-25 00:41:16 +08:00
|
|
|
// Set info but not headers
|
2018-12-02 18:23:55 +08:00
|
|
|
err := o.decodeMetaData(info)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2012-12-26 20:23:58 +08:00
|
|
|
} else {
|
2015-10-03 22:30:31 +08:00
|
|
|
err := o.readMetaData() // reads info and headers, returning an error
|
2012-12-26 20:23:58 +08:00
|
|
|
if err != nil {
|
2016-06-26 04:23:20 +08:00
|
|
|
return nil, err
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
}
|
2016-06-26 04:23:20 +08:00
|
|
|
return o, nil
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2016-06-26 04:23:20 +08:00
|
|
|
// NewObject finds the Object at remote. If it can't be found it
|
|
|
|
// returns the error fs.ErrorObjectNotFound.
|
|
|
|
func (f *Fs) NewObject(remote string) (fs.Object, error) {
|
2016-06-26 04:58:34 +08:00
|
|
|
return f.newObjectWithInfo(remote, nil)
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2016-04-22 03:06:21 +08:00
|
|
|
// listFn is called from list and listContainerRoot to handle an object.
|
|
|
|
type listFn func(remote string, object *swift.Object, isDirectory bool) error
|
2015-09-26 19:51:05 +08:00
|
|
|
|
|
|
|
// listContainerRoot lists the objects into the function supplied from
|
|
|
|
// the container and root supplied
|
2014-05-06 00:30:55 +08:00
|
|
|
//
|
2017-06-12 05:43:31 +08:00
|
|
|
// Set recurse to read sub directories
|
|
|
|
func (f *Fs) listContainerRoot(container, root string, dir string, recurse bool, fn listFn) error {
|
2016-04-24 04:46:52 +08:00
|
|
|
prefix := root
|
|
|
|
if dir != "" {
|
|
|
|
prefix += dir + "/"
|
|
|
|
}
|
2014-05-06 00:30:55 +08:00
|
|
|
// Options for ObjectsWalk
|
|
|
|
opts := swift.ObjectsOpts{
|
2016-04-24 04:46:52 +08:00
|
|
|
Prefix: prefix,
|
2017-06-06 22:03:52 +08:00
|
|
|
Limit: listChunks,
|
2014-05-06 00:30:55 +08:00
|
|
|
}
|
2017-06-12 05:43:31 +08:00
|
|
|
if !recurse {
|
2014-05-06 00:30:55 +08:00
|
|
|
opts.Delimiter = '/'
|
|
|
|
}
|
2015-09-26 19:51:05 +08:00
|
|
|
rootLength := len(root)
|
|
|
|
return f.c.ObjectsWalk(container, &opts, func(opts *swift.ObjectsOpts) (interface{}, error) {
|
2018-11-23 06:15:52 +08:00
|
|
|
var objects []swift.Object
|
|
|
|
var err error
|
|
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
|
|
objects, err = f.c.Objects(container, opts)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2014-05-06 00:30:55 +08:00
|
|
|
if err == nil {
|
|
|
|
for i := range objects {
|
|
|
|
object := &objects[i]
|
2016-04-22 03:06:21 +08:00
|
|
|
isDirectory := false
|
2017-06-12 05:43:31 +08:00
|
|
|
if !recurse {
|
2017-07-06 18:31:09 +08:00
|
|
|
isDirectory = strings.HasSuffix(object.Name, "/")
|
2014-05-06 00:30:55 +08:00
|
|
|
}
|
2017-07-19 06:38:48 +08:00
|
|
|
if !strings.HasPrefix(object.Name, prefix) {
|
2017-02-09 19:01:20 +08:00
|
|
|
fs.Logf(f, "Odd name received %q", object.Name)
|
2014-05-06 00:30:55 +08:00
|
|
|
continue
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
2017-07-19 06:38:48 +08:00
|
|
|
if object.Name == prefix {
|
|
|
|
// If we have zero length directory markers ending in / then swift
|
|
|
|
// will return them in the listing for the directory which causes
|
|
|
|
// duplicate directories. Ignore them here.
|
|
|
|
continue
|
|
|
|
}
|
2014-05-06 00:30:55 +08:00
|
|
|
remote := object.Name[rootLength:]
|
2016-04-22 03:06:21 +08:00
|
|
|
err = fn(remote, object, isDirectory)
|
2015-09-26 19:51:05 +08:00
|
|
|
if err != nil {
|
|
|
|
break
|
|
|
|
}
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
}
|
2014-05-06 00:30:55 +08:00
|
|
|
return objects, err
|
|
|
|
})
|
2015-09-26 19:51:05 +08:00
|
|
|
}
|
|
|
|
|
2017-06-30 17:54:14 +08:00
|
|
|
type addEntryFn func(fs.DirEntry) error
|
2014-05-06 00:30:55 +08:00
|
|
|
|
2017-06-12 05:43:31 +08:00
|
|
|
// list the objects into the function supplied
|
|
|
|
func (f *Fs) list(dir string, recurse bool, fn addEntryFn) error {
|
2017-09-15 01:00:00 +08:00
|
|
|
err := f.listContainerRoot(f.container, f.root, dir, recurse, func(remote string, object *swift.Object, isDirectory bool) (err error) {
|
2016-04-22 03:06:21 +08:00
|
|
|
if isDirectory {
|
2017-07-06 18:31:09 +08:00
|
|
|
remote = strings.TrimRight(remote, "/")
|
2017-06-30 20:37:29 +08:00
|
|
|
d := fs.NewDir(remote, time.Time{}).SetSize(object.Bytes)
|
2017-06-12 05:43:31 +08:00
|
|
|
err = fn(d)
|
2016-04-22 03:06:21 +08:00
|
|
|
} else {
|
2017-11-02 22:49:07 +08:00
|
|
|
// newObjectWithInfo does a full metadata read on 0 size objects which might be dynamic large objects
|
2018-05-04 22:19:50 +08:00
|
|
|
var o fs.Object
|
|
|
|
o, err = f.newObjectWithInfo(remote, object)
|
2016-06-26 04:23:20 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if o.Storable() {
|
2017-06-12 05:43:31 +08:00
|
|
|
err = fn(o)
|
2016-04-22 03:06:21 +08:00
|
|
|
}
|
|
|
|
}
|
2017-06-12 05:43:31 +08:00
|
|
|
return err
|
|
|
|
})
|
2017-09-15 01:00:00 +08:00
|
|
|
if err == swift.ContainerNotFound {
|
|
|
|
err = fs.ErrorDirNotFound
|
|
|
|
}
|
|
|
|
return err
|
2017-06-12 05:43:31 +08:00
|
|
|
}
|
|
|
|
|
2018-03-01 20:11:34 +08:00
|
|
|
// mark the container as being OK
|
|
|
|
func (f *Fs) markContainerOK() {
|
|
|
|
if f.container != "" {
|
|
|
|
f.containerOKMu.Lock()
|
|
|
|
f.containerOK = true
|
|
|
|
f.containerOKMu.Unlock()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-12 05:43:31 +08:00
|
|
|
// listDir lists a single directory
|
|
|
|
func (f *Fs) listDir(dir string) (entries fs.DirEntries, err error) {
|
|
|
|
if f.container == "" {
|
|
|
|
return nil, fs.ErrorListBucketRequired
|
|
|
|
}
|
|
|
|
// List the objects
|
2017-06-30 17:54:14 +08:00
|
|
|
err = f.list(dir, false, func(entry fs.DirEntry) error {
|
2017-06-12 05:43:31 +08:00
|
|
|
entries = append(entries, entry)
|
2016-04-22 03:06:21 +08:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
2017-06-12 05:43:31 +08:00
|
|
|
return nil, err
|
2014-05-06 00:30:55 +08:00
|
|
|
}
|
2018-03-01 20:11:34 +08:00
|
|
|
// container must be present if listing succeeded
|
|
|
|
f.markContainerOK()
|
2017-06-12 05:43:31 +08:00
|
|
|
return entries, nil
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2016-04-22 03:06:21 +08:00
|
|
|
// listContainers lists the containers
|
2017-06-12 05:43:31 +08:00
|
|
|
func (f *Fs) listContainers(dir string) (entries fs.DirEntries, err error) {
|
2016-04-24 04:46:52 +08:00
|
|
|
if dir != "" {
|
2017-06-12 05:43:31 +08:00
|
|
|
return nil, fs.ErrorListBucketRequired
|
2016-04-24 04:46:52 +08:00
|
|
|
}
|
2018-11-23 06:15:52 +08:00
|
|
|
var containers []swift.Container
|
|
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
|
|
containers, err = f.c.ContainersAll(nil)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2016-04-22 03:06:21 +08:00
|
|
|
if err != nil {
|
2017-06-12 05:43:31 +08:00
|
|
|
return nil, errors.Wrap(err, "container listing failed")
|
2016-04-22 03:06:21 +08:00
|
|
|
}
|
|
|
|
for _, container := range containers {
|
2017-06-30 20:37:29 +08:00
|
|
|
d := fs.NewDir(container.Name, time.Time{}).SetSize(container.Bytes).SetItems(container.Count)
|
2017-06-12 05:43:31 +08:00
|
|
|
entries = append(entries, d)
|
2016-04-22 03:06:21 +08:00
|
|
|
}
|
2017-06-12 05:43:31 +08:00
|
|
|
return entries, nil
|
2015-11-07 23:17:46 +08:00
|
|
|
}
|
|
|
|
|
2017-06-12 05:43:31 +08:00
|
|
|
// List the objects and directories in dir into entries. The
|
|
|
|
// entries can be returned in any order but should be for a
|
|
|
|
// complete directory.
|
|
|
|
//
|
|
|
|
// dir should be "" to list the root, and should not have
|
|
|
|
// trailing slashes.
|
|
|
|
//
|
|
|
|
// This should return ErrDirNotFound if the directory isn't
|
|
|
|
// found.
|
|
|
|
func (f *Fs) List(dir string) (entries fs.DirEntries, err error) {
|
2014-05-06 00:30:55 +08:00
|
|
|
if f.container == "" {
|
2017-06-12 05:43:31 +08:00
|
|
|
return f.listContainers(dir)
|
2014-05-06 00:30:55 +08:00
|
|
|
}
|
2017-06-12 05:43:31 +08:00
|
|
|
return f.listDir(dir)
|
2013-01-24 06:43:20 +08:00
|
|
|
}
|
|
|
|
|
2017-06-05 23:14:24 +08:00
|
|
|
// ListR lists the objects and directories of the Fs starting
|
|
|
|
// from dir recursively into out.
|
2017-06-12 05:43:31 +08:00
|
|
|
//
|
|
|
|
// dir should be "" to start from the root, and should not
|
|
|
|
// have trailing slashes.
|
|
|
|
//
|
|
|
|
// This should return ErrDirNotFound if the directory isn't
|
|
|
|
// found.
|
|
|
|
//
|
|
|
|
// It should call callback for each tranche of entries read.
|
|
|
|
// These need not be returned in any particular order. If
|
|
|
|
// callback returns an error then the listing will stop
|
|
|
|
// immediately.
|
|
|
|
//
|
|
|
|
// Don't implement this unless you have a more efficient way
|
|
|
|
// of listing recursively that doing a directory traversal.
|
|
|
|
func (f *Fs) ListR(dir string, callback fs.ListRCallback) (err error) {
|
|
|
|
if f.container == "" {
|
|
|
|
return errors.New("container needed for recursive list")
|
|
|
|
}
|
2018-01-13 00:30:54 +08:00
|
|
|
list := walk.NewListRHelper(callback)
|
2017-06-30 17:54:14 +08:00
|
|
|
err = f.list(dir, true, func(entry fs.DirEntry) error {
|
2017-06-12 05:43:31 +08:00
|
|
|
return list.Add(entry)
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-03-01 20:11:34 +08:00
|
|
|
// container must be present if listing succeeded
|
|
|
|
f.markContainerOK()
|
2017-06-12 05:43:31 +08:00
|
|
|
return list.Flush()
|
2017-06-05 23:14:24 +08:00
|
|
|
}
|
|
|
|
|
2018-04-17 05:19:25 +08:00
|
|
|
// About gets quota information
|
|
|
|
func (f *Fs) About() (*fs.Usage, error) {
|
2018-11-23 06:15:52 +08:00
|
|
|
var containers []swift.Container
|
|
|
|
var err error
|
|
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
|
|
containers, err = f.c.ContainersAll(nil)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2018-04-17 05:19:25 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "container listing failed")
|
|
|
|
}
|
|
|
|
var total, objects int64
|
|
|
|
for _, c := range containers {
|
|
|
|
total += c.Bytes
|
|
|
|
objects += c.Count
|
|
|
|
}
|
|
|
|
usage := &fs.Usage{
|
|
|
|
Used: fs.NewUsageValue(total), // bytes in use
|
|
|
|
Objects: fs.NewUsageValue(objects), // objects in use
|
|
|
|
}
|
|
|
|
return usage, nil
|
|
|
|
}
|
|
|
|
|
2014-04-19 00:04:21 +08:00
|
|
|
// Put the object into the container
|
2013-01-11 05:58:46 +08:00
|
|
|
//
|
|
|
|
// Copy the reader in to the new object which is returned
|
|
|
|
//
|
2014-04-19 00:04:21 +08:00
|
|
|
// The new object may have been created if an error is returned
|
2017-05-28 19:44:22 +08:00
|
|
|
func (f *Fs) Put(in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {
|
2015-11-07 19:14:46 +08:00
|
|
|
// Temporary Object under construction
|
|
|
|
fs := &Object{
|
2018-02-06 22:39:55 +08:00
|
|
|
fs: f,
|
|
|
|
remote: src.Remote(),
|
|
|
|
headers: swift.Headers{}, // Empty object headers to stop readMetaData being called
|
2015-11-07 19:14:46 +08:00
|
|
|
}
|
2017-05-28 19:44:22 +08:00
|
|
|
return fs, fs.Update(in, src, options...)
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2017-09-14 13:42:16 +08:00
|
|
|
// PutStream uploads to the remote path with the modTime given of indeterminate size
|
|
|
|
func (f *Fs) PutStream(in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {
|
|
|
|
return f.Put(in, src, options...)
|
|
|
|
}
|
|
|
|
|
2012-12-26 20:23:58 +08:00
|
|
|
// Mkdir creates the container if it doesn't exist
|
2016-11-26 05:52:43 +08:00
|
|
|
func (f *Fs) Mkdir(dir string) error {
|
2017-06-07 21:16:50 +08:00
|
|
|
f.containerOKMu.Lock()
|
|
|
|
defer f.containerOKMu.Unlock()
|
|
|
|
if f.containerOK {
|
2016-11-26 05:52:43 +08:00
|
|
|
return nil
|
|
|
|
}
|
2017-06-10 21:44:56 +08:00
|
|
|
// if we are at the root, then it is OK
|
|
|
|
if f.container == "" {
|
|
|
|
return nil
|
|
|
|
}
|
2016-01-24 04:32:53 +08:00
|
|
|
// Check to see if container exists first
|
2017-08-30 22:54:49 +08:00
|
|
|
var err error = swift.ContainerNotFound
|
|
|
|
if !f.noCheckContainer {
|
2018-11-23 06:15:52 +08:00
|
|
|
err = f.pacer.Call(func() (bool, error) {
|
2019-03-17 19:38:25 +08:00
|
|
|
var rxHeaders swift.Headers
|
|
|
|
_, rxHeaders, err = f.c.Container(f.container)
|
|
|
|
return shouldRetryHeaders(rxHeaders, err)
|
2018-11-23 06:15:52 +08:00
|
|
|
})
|
2017-08-30 22:54:49 +08:00
|
|
|
}
|
2016-01-24 04:32:53 +08:00
|
|
|
if err == swift.ContainerNotFound {
|
2018-08-05 04:09:17 +08:00
|
|
|
headers := swift.Headers{}
|
|
|
|
if f.opt.StoragePolicy != "" {
|
|
|
|
headers["X-Storage-Policy"] = f.opt.StoragePolicy
|
|
|
|
}
|
2018-11-23 06:15:52 +08:00
|
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
|
|
err = f.c.ContainerCreate(f.container, headers)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2017-06-07 21:16:50 +08:00
|
|
|
}
|
|
|
|
if err == nil {
|
|
|
|
f.containerOK = true
|
2016-01-24 04:32:53 +08:00
|
|
|
}
|
|
|
|
return err
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2015-11-07 23:31:04 +08:00
|
|
|
// Rmdir deletes the container if the fs is at the root
|
2012-12-26 20:23:58 +08:00
|
|
|
//
|
|
|
|
// Returns an error if it isn't empty
|
2016-11-26 05:52:43 +08:00
|
|
|
func (f *Fs) Rmdir(dir string) error {
|
2017-06-07 21:16:50 +08:00
|
|
|
f.containerOKMu.Lock()
|
|
|
|
defer f.containerOKMu.Unlock()
|
2016-11-26 05:52:43 +08:00
|
|
|
if f.root != "" || dir != "" {
|
2015-11-07 23:31:04 +08:00
|
|
|
return nil
|
|
|
|
}
|
2018-11-23 06:15:52 +08:00
|
|
|
var err error
|
|
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
|
|
err = f.c.ContainerDelete(f.container)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2017-06-07 21:16:50 +08:00
|
|
|
if err == nil {
|
|
|
|
f.containerOK = false
|
|
|
|
}
|
|
|
|
return err
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2015-09-23 01:47:16 +08:00
|
|
|
// Precision of the remote
|
2015-11-07 19:14:46 +08:00
|
|
|
func (f *Fs) Precision() time.Duration {
|
2013-01-19 07:21:02 +08:00
|
|
|
return time.Nanosecond
|
|
|
|
}
|
|
|
|
|
2015-11-07 23:17:46 +08:00
|
|
|
// Purge deletes all the files and directories
|
|
|
|
//
|
|
|
|
// Implemented here so we can make sure we delete directory markers
|
|
|
|
func (f *Fs) Purge() error {
|
2016-04-22 03:06:21 +08:00
|
|
|
// Delete all the files including the directory markers
|
|
|
|
toBeDeleted := make(chan fs.Object, fs.Config.Transfers)
|
2016-06-25 21:27:44 +08:00
|
|
|
delErr := make(chan error, 1)
|
2016-04-22 03:06:21 +08:00
|
|
|
go func() {
|
2018-01-13 00:30:54 +08:00
|
|
|
delErr <- operations.DeleteFiles(toBeDeleted)
|
2016-04-22 03:06:21 +08:00
|
|
|
}()
|
2017-06-30 17:54:14 +08:00
|
|
|
err := f.list("", true, func(entry fs.DirEntry) error {
|
2017-06-12 05:43:31 +08:00
|
|
|
if o, ok := entry.(*Object); ok {
|
2016-06-25 21:27:44 +08:00
|
|
|
toBeDeleted <- o
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
close(toBeDeleted)
|
|
|
|
delError := <-delErr
|
|
|
|
if err == nil {
|
|
|
|
err = delError
|
|
|
|
}
|
2016-04-22 03:06:21 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-11-26 05:52:43 +08:00
|
|
|
return f.Rmdir("")
|
2015-11-07 23:17:46 +08:00
|
|
|
}
|
|
|
|
|
2015-02-15 02:48:08 +08:00
|
|
|
// Copy src to this remote using server side copy operations.
|
|
|
|
//
|
|
|
|
// This is stored with the remote path given
|
|
|
|
//
|
|
|
|
// It returns the destination Object and a possible error
|
|
|
|
//
|
|
|
|
// Will only be called if src.Fs().Name() == f.Name()
|
|
|
|
//
|
|
|
|
// If it isn't possible then return fs.ErrorCantCopy
|
2015-11-07 19:14:46 +08:00
|
|
|
func (f *Fs) Copy(src fs.Object, remote string) (fs.Object, error) {
|
2017-06-29 04:14:53 +08:00
|
|
|
err := f.Mkdir("")
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-11-07 19:14:46 +08:00
|
|
|
srcObj, ok := src.(*Object)
|
2015-02-15 02:48:08 +08:00
|
|
|
if !ok {
|
2017-02-09 19:01:20 +08:00
|
|
|
fs.Debugf(src, "Can't copy - not same remote type")
|
2015-02-15 02:48:08 +08:00
|
|
|
return nil, fs.ErrorCantCopy
|
|
|
|
}
|
2015-11-07 19:14:46 +08:00
|
|
|
srcFs := srcObj.fs
|
2018-11-23 06:15:52 +08:00
|
|
|
err = f.pacer.Call(func() (bool, error) {
|
2019-03-17 19:38:25 +08:00
|
|
|
var rxHeaders swift.Headers
|
|
|
|
rxHeaders, err = f.c.ObjectCopy(srcFs.container, srcFs.root+srcObj.remote, f.container, f.root+remote, nil)
|
|
|
|
return shouldRetryHeaders(rxHeaders, err)
|
2018-11-23 06:15:52 +08:00
|
|
|
})
|
2015-02-15 02:48:08 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-06-26 04:23:20 +08:00
|
|
|
return f.NewObject(remote)
|
2015-02-15 02:48:08 +08:00
|
|
|
}
|
|
|
|
|
2016-01-11 20:39:33 +08:00
|
|
|
// Hashes returns the supported hash sets.
|
2018-01-13 00:30:54 +08:00
|
|
|
func (f *Fs) Hashes() hash.Set {
|
2018-01-19 04:27:52 +08:00
|
|
|
return hash.Set(hash.MD5)
|
2016-01-11 20:39:33 +08:00
|
|
|
}
|
|
|
|
|
2012-12-26 20:23:58 +08:00
|
|
|
// ------------------------------------------------------------
|
|
|
|
|
2015-09-23 01:47:16 +08:00
|
|
|
// Fs returns the parent Fs
|
2016-02-18 19:35:25 +08:00
|
|
|
func (o *Object) Fs() fs.Info {
|
2015-11-07 19:14:46 +08:00
|
|
|
return o.fs
|
2014-03-29 01:56:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Return a string version
|
2015-11-07 19:14:46 +08:00
|
|
|
func (o *Object) String() string {
|
2014-03-29 01:56:04 +08:00
|
|
|
if o == nil {
|
|
|
|
return "<nil>"
|
|
|
|
}
|
|
|
|
return o.remote
|
|
|
|
}
|
|
|
|
|
2015-09-23 01:47:16 +08:00
|
|
|
// Remote returns the remote path
|
2015-11-07 19:14:46 +08:00
|
|
|
func (o *Object) Remote() string {
|
2013-06-28 03:13:07 +08:00
|
|
|
return o.remote
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2016-01-11 20:39:33 +08:00
|
|
|
// Hash returns the Md5sum of an object returning a lowercase hex string
|
2018-01-13 00:30:54 +08:00
|
|
|
func (o *Object) Hash(t hash.Type) (string, error) {
|
2018-01-19 04:27:52 +08:00
|
|
|
if t != hash.MD5 {
|
|
|
|
return "", hash.ErrUnsupported
|
2016-01-11 20:39:33 +08:00
|
|
|
}
|
2016-03-18 01:36:20 +08:00
|
|
|
isDynamicLargeObject, err := o.isDynamicLargeObject()
|
2015-09-23 14:57:48 +08:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
2016-03-18 01:36:20 +08:00
|
|
|
isStaticLargeObject, err := o.isStaticLargeObject()
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
if isDynamicLargeObject || isStaticLargeObject {
|
2017-02-09 19:01:20 +08:00
|
|
|
fs.Debugf(o, "Returning empty Md5sum for swift large object")
|
2015-09-23 14:57:48 +08:00
|
|
|
return "", nil
|
|
|
|
}
|
2018-12-02 18:23:55 +08:00
|
|
|
return strings.ToLower(o.md5), nil
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2016-03-18 01:36:20 +08:00
|
|
|
// hasHeader checks for the header passed in returning false if the
|
|
|
|
// object isn't found.
|
|
|
|
func (o *Object) hasHeader(header string) (bool, error) {
|
2015-09-23 14:57:48 +08:00
|
|
|
err := o.readMetaData()
|
|
|
|
if err != nil {
|
2016-06-26 04:23:20 +08:00
|
|
|
if err == fs.ErrorObjectNotFound {
|
2015-09-26 19:51:05 +08:00
|
|
|
return false, nil
|
|
|
|
}
|
2015-09-23 14:57:48 +08:00
|
|
|
return false, err
|
|
|
|
}
|
2018-02-06 22:39:55 +08:00
|
|
|
_, isDynamicLargeObject := o.headers[header]
|
2016-03-18 01:36:20 +08:00
|
|
|
return isDynamicLargeObject, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// isDynamicLargeObject checks for X-Object-Manifest header
|
|
|
|
func (o *Object) isDynamicLargeObject() (bool, error) {
|
|
|
|
return o.hasHeader("X-Object-Manifest")
|
|
|
|
}
|
|
|
|
|
|
|
|
// isStaticLargeObjectFile checks for the X-Static-Large-Object header
|
|
|
|
func (o *Object) isStaticLargeObject() (bool, error) {
|
|
|
|
return o.hasHeader("X-Static-Large-Object")
|
2015-09-23 14:57:48 +08:00
|
|
|
}
|
|
|
|
|
2012-12-26 20:23:58 +08:00
|
|
|
// Size returns the size of an object in bytes
|
2015-11-07 19:14:46 +08:00
|
|
|
func (o *Object) Size() int64 {
|
2018-12-02 18:23:55 +08:00
|
|
|
return o.size
|
|
|
|
}
|
|
|
|
|
|
|
|
// decodeMetaData sets the metadata in the object from a swift.Object
|
|
|
|
//
|
|
|
|
// Sets
|
|
|
|
// o.lastModified
|
|
|
|
// o.size
|
|
|
|
// o.md5
|
|
|
|
// o.contentType
|
|
|
|
func (o *Object) decodeMetaData(info *swift.Object) (err error) {
|
|
|
|
o.lastModified = info.LastModified
|
|
|
|
o.size = info.Bytes
|
|
|
|
o.md5 = info.Hash
|
|
|
|
o.contentType = info.ContentType
|
|
|
|
return nil
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// readMetaData gets the metadata if it hasn't already been fetched
|
|
|
|
//
|
|
|
|
// it also sets the info
|
2016-06-26 04:23:20 +08:00
|
|
|
//
|
|
|
|
// it returns fs.ErrorObjectNotFound if the object isn't found
|
2015-11-07 19:14:46 +08:00
|
|
|
func (o *Object) readMetaData() (err error) {
|
2015-09-25 00:41:16 +08:00
|
|
|
if o.headers != nil {
|
2012-12-26 20:23:58 +08:00
|
|
|
return nil
|
|
|
|
}
|
2018-11-23 06:15:52 +08:00
|
|
|
var info swift.Object
|
|
|
|
var h swift.Headers
|
|
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
|
|
|
info, h, err = o.fs.c.Object(o.fs.container, o.fs.root+o.remote)
|
2019-03-17 19:38:25 +08:00
|
|
|
return shouldRetryHeaders(h, err)
|
2018-11-23 06:15:52 +08:00
|
|
|
})
|
2012-12-26 20:23:58 +08:00
|
|
|
if err != nil {
|
2016-06-26 04:23:20 +08:00
|
|
|
if err == swift.ObjectNotFound {
|
|
|
|
return fs.ErrorObjectNotFound
|
|
|
|
}
|
2012-12-26 20:23:58 +08:00
|
|
|
return err
|
|
|
|
}
|
2018-02-06 22:39:55 +08:00
|
|
|
o.headers = h
|
2018-12-02 18:23:55 +08:00
|
|
|
err = o.decodeMetaData(&info)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2012-12-26 20:23:58 +08:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ModTime returns the modification time of the object
|
2013-01-02 23:21:55 +08:00
|
|
|
//
|
|
|
|
//
|
|
|
|
// It attempts to read the objects mtime and if that isn't present the
|
|
|
|
// LastModified returned in the http headers
|
2015-11-07 19:14:46 +08:00
|
|
|
func (o *Object) ModTime() time.Time {
|
2018-04-13 20:32:17 +08:00
|
|
|
if fs.Config.UseServerModTime {
|
2018-12-02 18:23:55 +08:00
|
|
|
return o.lastModified
|
2018-04-13 20:32:17 +08:00
|
|
|
}
|
2013-06-28 03:13:07 +08:00
|
|
|
err := o.readMetaData()
|
2012-12-26 20:23:58 +08:00
|
|
|
if err != nil {
|
2017-02-09 19:01:20 +08:00
|
|
|
fs.Debugf(o, "Failed to read metadata: %s", err)
|
2018-12-02 18:23:55 +08:00
|
|
|
return o.lastModified
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
2015-09-25 00:41:16 +08:00
|
|
|
modTime, err := o.headers.ObjectMetadata().GetModTime()
|
2012-12-26 20:23:58 +08:00
|
|
|
if err != nil {
|
2017-02-09 19:01:20 +08:00
|
|
|
// fs.Logf(o, "Failed to read mtime from object: %v", err)
|
2018-12-02 18:23:55 +08:00
|
|
|
return o.lastModified
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
2013-01-02 23:21:55 +08:00
|
|
|
return modTime
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2015-09-23 01:47:16 +08:00
|
|
|
// SetModTime sets the modification time of the local fs object
|
2016-03-22 23:07:10 +08:00
|
|
|
func (o *Object) SetModTime(modTime time.Time) error {
|
2013-06-28 03:13:07 +08:00
|
|
|
err := o.readMetaData()
|
2012-12-26 20:23:58 +08:00
|
|
|
if err != nil {
|
2016-03-22 23:07:10 +08:00
|
|
|
return err
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
2015-09-25 00:41:16 +08:00
|
|
|
meta := o.headers.ObjectMetadata()
|
|
|
|
meta.SetModTime(modTime)
|
|
|
|
newHeaders := meta.ObjectHeaders()
|
|
|
|
for k, v := range newHeaders {
|
2018-02-06 22:39:55 +08:00
|
|
|
o.headers[k] = v
|
2015-09-25 00:41:16 +08:00
|
|
|
}
|
2015-11-09 04:45:42 +08:00
|
|
|
// Include any other metadata from request
|
2018-02-06 22:39:55 +08:00
|
|
|
for k, v := range o.headers {
|
2015-11-09 04:45:42 +08:00
|
|
|
if strings.HasPrefix(k, "X-Object-") {
|
|
|
|
newHeaders[k] = v
|
|
|
|
}
|
|
|
|
}
|
2018-11-23 06:15:52 +08:00
|
|
|
return o.fs.pacer.Call(func() (bool, error) {
|
|
|
|
err = o.fs.c.ObjectUpdate(o.fs.container, o.fs.root+o.remote, newHeaders)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2015-09-23 01:47:16 +08:00
|
|
|
// Storable returns if this object is storable
|
2015-11-07 23:17:46 +08:00
|
|
|
//
|
2015-12-03 05:23:56 +08:00
|
|
|
// It compares the Content-Type to directoryMarkerContentType - that
|
|
|
|
// makes it a directory marker which is not storable.
|
2015-11-07 19:14:46 +08:00
|
|
|
func (o *Object) Storable() bool {
|
2018-12-02 18:23:55 +08:00
|
|
|
return o.contentType != directoryMarkerContentType
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Open an object for read
|
2016-09-10 18:29:57 +08:00
|
|
|
func (o *Object) Open(options ...fs.OpenOption) (in io.ReadCloser, err error) {
|
|
|
|
headers := fs.OpenOptionHeaders(options)
|
|
|
|
_, isRanging := headers["Range"]
|
2018-11-23 06:15:52 +08:00
|
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
2019-03-17 19:38:25 +08:00
|
|
|
var rxHeaders swift.Headers
|
|
|
|
in, rxHeaders, err = o.fs.c.ObjectOpen(o.fs.container, o.fs.root+o.remote, !isRanging, headers)
|
|
|
|
return shouldRetryHeaders(rxHeaders, err)
|
2018-11-23 06:15:52 +08:00
|
|
|
})
|
2012-12-26 20:23:58 +08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-09-23 14:57:48 +08:00
|
|
|
// min returns the smallest of x, y
|
|
|
|
func min(x, y int64) int64 {
|
|
|
|
if x < y {
|
|
|
|
return x
|
|
|
|
}
|
|
|
|
return y
|
|
|
|
}
|
|
|
|
|
2015-09-26 19:51:05 +08:00
|
|
|
// removeSegments removes any old segments from o
|
|
|
|
//
|
|
|
|
// if except is passed in then segments with that prefix won't be deleted
|
2015-11-07 19:14:46 +08:00
|
|
|
func (o *Object) removeSegments(except string) error {
|
|
|
|
segmentsRoot := o.fs.root + o.remote + "/"
|
2017-06-12 05:43:31 +08:00
|
|
|
err := o.fs.listContainerRoot(o.fs.segmentsContainer, segmentsRoot, "", true, func(remote string, object *swift.Object, isDirectory bool) error {
|
2016-04-22 03:06:21 +08:00
|
|
|
if isDirectory {
|
|
|
|
return nil
|
|
|
|
}
|
2015-09-26 19:51:05 +08:00
|
|
|
if except != "" && strings.HasPrefix(remote, except) {
|
2017-02-09 19:01:20 +08:00
|
|
|
// fs.Debugf(o, "Ignoring current segment file %q in container %q", segmentsRoot+remote, o.fs.segmentsContainer)
|
2015-09-26 19:51:05 +08:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
segmentPath := segmentsRoot + remote
|
2017-02-09 19:01:20 +08:00
|
|
|
fs.Debugf(o, "Removing segment file %q in container %q", segmentPath, o.fs.segmentsContainer)
|
2018-11-23 06:15:52 +08:00
|
|
|
var err error
|
|
|
|
return o.fs.pacer.Call(func() (bool, error) {
|
|
|
|
err = o.fs.c.ObjectDelete(o.fs.segmentsContainer, segmentPath)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2015-09-26 19:51:05 +08:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// remove the segments container if empty, ignore errors
|
2018-11-23 06:15:52 +08:00
|
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
|
|
|
err = o.fs.c.ContainerDelete(o.fs.segmentsContainer)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2015-09-26 19:51:05 +08:00
|
|
|
if err == nil {
|
2017-02-09 19:01:20 +08:00
|
|
|
fs.Debugf(o, "Removed empty container %q", o.fs.segmentsContainer)
|
2015-09-26 19:51:05 +08:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-02-28 02:55:21 +08:00
|
|
|
// urlEncode encodes a string so that it is a valid URL
|
|
|
|
//
|
|
|
|
// We don't use any of Go's standard methods as we need `/` not
|
|
|
|
// encoded but we need '&' encoded.
|
|
|
|
func urlEncode(str string) string {
|
|
|
|
var buf bytes.Buffer
|
|
|
|
for i := 0; i < len(str); i++ {
|
|
|
|
c := str[i]
|
|
|
|
if (c >= '0' && c <= '9') || (c >= 'a' && c <= 'z') || (c >= 'A' && c <= 'Z') || c == '/' || c == '.' {
|
|
|
|
_ = buf.WriteByte(c)
|
|
|
|
} else {
|
|
|
|
_, _ = buf.WriteString(fmt.Sprintf("%%%02X", c))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return buf.String()
|
|
|
|
}
|
|
|
|
|
2015-09-26 19:51:05 +08:00
|
|
|
// updateChunks updates the existing object using chunks to a separate
|
|
|
|
// container. It returns a string which prefixes current segments.
|
2017-09-14 13:42:16 +08:00
|
|
|
func (o *Object) updateChunks(in0 io.Reader, headers swift.Headers, size int64, contentType string) (string, error) {
|
2015-09-26 19:51:05 +08:00
|
|
|
// Create the segmentsContainer if it doesn't exist
|
2018-05-04 22:19:50 +08:00
|
|
|
var err error
|
2018-11-23 06:15:52 +08:00
|
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
2019-03-17 19:38:25 +08:00
|
|
|
var rxHeaders swift.Headers
|
|
|
|
_, rxHeaders, err = o.fs.c.Container(o.fs.segmentsContainer)
|
|
|
|
return shouldRetryHeaders(rxHeaders, err)
|
2018-11-23 06:15:52 +08:00
|
|
|
})
|
2017-10-25 07:17:13 +08:00
|
|
|
if err == swift.ContainerNotFound {
|
2018-08-05 04:09:17 +08:00
|
|
|
headers := swift.Headers{}
|
|
|
|
if o.fs.opt.StoragePolicy != "" {
|
|
|
|
headers["X-Storage-Policy"] = o.fs.opt.StoragePolicy
|
|
|
|
}
|
2018-11-23 06:15:52 +08:00
|
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
|
|
|
err = o.fs.c.ContainerCreate(o.fs.segmentsContainer, headers)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2017-10-25 07:17:13 +08:00
|
|
|
}
|
2015-09-26 19:51:05 +08:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
2015-09-23 14:57:48 +08:00
|
|
|
}
|
2015-09-26 19:51:05 +08:00
|
|
|
// Upload the chunks
|
|
|
|
left := size
|
|
|
|
i := 0
|
|
|
|
uniquePrefix := fmt.Sprintf("%s/%d", swift.TimeToFloatString(time.Now()), size)
|
2015-11-07 19:14:46 +08:00
|
|
|
segmentsPath := fmt.Sprintf("%s%s/%s", o.fs.root, o.remote, uniquePrefix)
|
2017-09-14 13:42:16 +08:00
|
|
|
in := bufio.NewReader(in0)
|
|
|
|
for {
|
|
|
|
// can we read at least one byte?
|
|
|
|
if _, err := in.Peek(1); err != nil {
|
|
|
|
if left > 0 {
|
|
|
|
return "", err // read less than expected
|
|
|
|
}
|
|
|
|
fs.Debugf(o, "Uploading segments into %q seems done (%v)", o.fs.segmentsContainer, err)
|
|
|
|
break
|
|
|
|
}
|
2018-05-15 01:06:57 +08:00
|
|
|
n := int64(o.fs.opt.ChunkSize)
|
2017-09-14 13:42:16 +08:00
|
|
|
if size != -1 {
|
|
|
|
n = min(left, n)
|
|
|
|
headers["Content-Length"] = strconv.FormatInt(n, 10) // set Content-Length as we know it
|
|
|
|
left -= n
|
|
|
|
}
|
2015-09-26 19:51:05 +08:00
|
|
|
segmentReader := io.LimitReader(in, n)
|
|
|
|
segmentPath := fmt.Sprintf("%s/%08d", segmentsPath, i)
|
2017-02-09 19:01:20 +08:00
|
|
|
fs.Debugf(o, "Uploading segment file %q into %q", segmentPath, o.fs.segmentsContainer)
|
2018-11-23 06:15:52 +08:00
|
|
|
err = o.fs.pacer.CallNoRetry(func() (bool, error) {
|
2019-03-17 19:38:25 +08:00
|
|
|
var rxHeaders swift.Headers
|
|
|
|
rxHeaders, err = o.fs.c.ObjectPut(o.fs.segmentsContainer, segmentPath, segmentReader, true, "", "", headers)
|
|
|
|
return shouldRetryHeaders(rxHeaders, err)
|
2018-11-23 06:15:52 +08:00
|
|
|
})
|
2015-09-26 19:51:05 +08:00
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
i++
|
2015-09-23 14:57:48 +08:00
|
|
|
}
|
2015-09-26 19:51:05 +08:00
|
|
|
// Upload the manifest
|
2016-02-28 02:55:21 +08:00
|
|
|
headers["X-Object-Manifest"] = urlEncode(fmt.Sprintf("%s/%s", o.fs.segmentsContainer, segmentsPath))
|
2015-10-03 22:38:35 +08:00
|
|
|
headers["Content-Length"] = "0" // set Content-Length as we know it
|
2015-09-26 19:51:05 +08:00
|
|
|
emptyReader := bytes.NewReader(nil)
|
2015-11-07 19:14:46 +08:00
|
|
|
manifestName := o.fs.root + o.remote
|
2018-11-23 06:15:52 +08:00
|
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
2019-03-17 19:38:25 +08:00
|
|
|
var rxHeaders swift.Headers
|
|
|
|
rxHeaders, err = o.fs.c.ObjectPut(o.fs.container, manifestName, emptyReader, true, "", contentType, headers)
|
|
|
|
return shouldRetryHeaders(rxHeaders, err)
|
2018-11-23 06:15:52 +08:00
|
|
|
})
|
2015-09-26 19:51:05 +08:00
|
|
|
return uniquePrefix + "/", err
|
2015-09-23 14:57:48 +08:00
|
|
|
}
|
|
|
|
|
2014-04-19 00:04:21 +08:00
|
|
|
// Update the object with the contents of the io.Reader, modTime and size
|
|
|
|
//
|
|
|
|
// The new object may have been created if an error is returned
|
2017-05-28 19:44:22 +08:00
|
|
|
func (o *Object) Update(in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) error {
|
2017-06-10 21:44:56 +08:00
|
|
|
if o.fs.container == "" {
|
2018-01-13 00:30:54 +08:00
|
|
|
return fserrors.FatalError(errors.New("container name needed in remote"))
|
2017-06-10 21:44:56 +08:00
|
|
|
}
|
2017-06-07 21:16:50 +08:00
|
|
|
err := o.fs.Mkdir("")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-02-18 19:35:25 +08:00
|
|
|
size := src.Size()
|
|
|
|
modTime := src.ModTime()
|
|
|
|
|
2016-03-18 01:36:20 +08:00
|
|
|
// Note whether this is a dynamic large object before starting
|
|
|
|
isDynamicLargeObject, err := o.isDynamicLargeObject()
|
2015-09-26 19:51:05 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2014-04-19 00:04:21 +08:00
|
|
|
// Set the mtime
|
|
|
|
m := swift.Metadata{}
|
|
|
|
m.SetModTime(modTime)
|
2016-09-22 05:13:24 +08:00
|
|
|
contentType := fs.MimeType(src)
|
2015-09-26 19:51:05 +08:00
|
|
|
headers := m.ObjectHeaders()
|
|
|
|
uniquePrefix := ""
|
2018-11-28 23:51:18 +08:00
|
|
|
if size > int64(o.fs.opt.ChunkSize) || (size == -1 && !o.fs.opt.NoChunk) {
|
2016-09-22 05:13:24 +08:00
|
|
|
uniquePrefix, err = o.updateChunks(in, headers, size, contentType)
|
2015-09-23 14:57:48 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-12-02 18:23:55 +08:00
|
|
|
o.headers = nil // wipe old metadata
|
2015-09-23 14:57:48 +08:00
|
|
|
} else {
|
2018-11-28 23:51:18 +08:00
|
|
|
if size >= 0 {
|
|
|
|
headers["Content-Length"] = strconv.FormatInt(size, 10) // set Content-Length if we know it
|
|
|
|
}
|
2018-12-02 18:23:55 +08:00
|
|
|
var rxHeaders swift.Headers
|
2018-11-23 06:15:52 +08:00
|
|
|
err = o.fs.pacer.CallNoRetry(func() (bool, error) {
|
2018-12-02 18:23:55 +08:00
|
|
|
rxHeaders, err = o.fs.c.ObjectPut(o.fs.container, o.fs.root+o.remote, in, true, "", contentType, headers)
|
2019-03-17 19:38:25 +08:00
|
|
|
return shouldRetryHeaders(rxHeaders, err)
|
2018-11-23 06:15:52 +08:00
|
|
|
})
|
2015-09-23 14:57:48 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-12-02 18:23:55 +08:00
|
|
|
// set Metadata since ObjectPut checked the hash and length so we know the
|
|
|
|
// object has been safely uploaded
|
|
|
|
o.lastModified = modTime
|
|
|
|
o.size = size
|
|
|
|
o.md5 = rxHeaders["ETag"]
|
|
|
|
o.contentType = contentType
|
|
|
|
o.headers = headers
|
2014-07-19 19:36:56 +08:00
|
|
|
}
|
2015-09-26 19:51:05 +08:00
|
|
|
|
2016-03-18 01:36:20 +08:00
|
|
|
// If file was a dynamic large object then remove old/all segments
|
|
|
|
if isDynamicLargeObject {
|
2015-09-26 19:51:05 +08:00
|
|
|
err = o.removeSegments(uniquePrefix)
|
|
|
|
if err != nil {
|
2017-02-09 19:01:20 +08:00
|
|
|
fs.Logf(o, "Failed to remove old segments - carrying on with upload: %v", err)
|
2015-09-26 19:51:05 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-02 18:23:55 +08:00
|
|
|
// Read the metadata from the newly created object if necessary
|
2015-09-23 14:57:48 +08:00
|
|
|
return o.readMetaData()
|
2014-04-19 00:04:21 +08:00
|
|
|
}
|
|
|
|
|
2012-12-26 20:23:58 +08:00
|
|
|
// Remove an object
|
2015-11-07 19:14:46 +08:00
|
|
|
func (o *Object) Remove() error {
|
2016-03-18 01:36:20 +08:00
|
|
|
isDynamicLargeObject, err := o.isDynamicLargeObject()
|
2015-09-23 14:57:48 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-09-26 19:51:05 +08:00
|
|
|
// Remove file/manifest first
|
2018-11-23 06:15:52 +08:00
|
|
|
err = o.fs.pacer.Call(func() (bool, error) {
|
|
|
|
err = o.fs.c.ObjectDelete(o.fs.container, o.fs.root+o.remote)
|
|
|
|
return shouldRetry(err)
|
|
|
|
})
|
2015-09-26 19:51:05 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// ...then segments if required
|
2016-03-18 01:36:20 +08:00
|
|
|
if isDynamicLargeObject {
|
2015-09-26 19:51:05 +08:00
|
|
|
err = o.removeSegments("")
|
2015-09-23 14:57:48 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2015-09-26 19:51:05 +08:00
|
|
|
return nil
|
2012-12-26 20:23:58 +08:00
|
|
|
}
|
|
|
|
|
2016-09-22 05:13:24 +08:00
|
|
|
// MimeType of an Object if known, "" otherwise
|
|
|
|
func (o *Object) MimeType() string {
|
2018-12-02 18:23:55 +08:00
|
|
|
return o.contentType
|
2016-09-22 05:13:24 +08:00
|
|
|
}
|
|
|
|
|
2012-12-26 20:23:58 +08:00
|
|
|
// Check the interfaces are satisfied
|
2015-11-07 19:14:46 +08:00
|
|
|
var (
|
2017-09-14 13:42:16 +08:00
|
|
|
_ fs.Fs = &Fs{}
|
|
|
|
_ fs.Purger = &Fs{}
|
|
|
|
_ fs.PutStreamer = &Fs{}
|
|
|
|
_ fs.Copier = &Fs{}
|
|
|
|
_ fs.ListRer = &Fs{}
|
|
|
|
_ fs.Object = &Object{}
|
|
|
|
_ fs.MimeTyper = &Object{}
|
2015-11-07 19:14:46 +08:00
|
|
|
)
|