mirror of
https://github.com/rclone/rclone.git
synced 2024-11-22 12:05:05 +08:00
983 lines
32 KiB
Go
983 lines
32 KiB
Go
package onedrive
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"net/http"
|
|
"slices"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/rclone/rclone/backend/onedrive/api"
|
|
"github.com/rclone/rclone/fs"
|
|
"github.com/rclone/rclone/fs/fserrors"
|
|
"github.com/rclone/rclone/lib/dircache"
|
|
"github.com/rclone/rclone/lib/errcount"
|
|
)
|
|
|
|
const (
|
|
dirMimeType = "inode/directory"
|
|
timeFormatIn = time.RFC3339
|
|
timeFormatOut = "2006-01-02T15:04:05.999Z" // mS for OneDrive Personal, otherwise only S
|
|
)
|
|
|
|
// system metadata keys which this backend owns
|
|
var systemMetadataInfo = map[string]fs.MetadataHelp{
|
|
"content-type": {
|
|
Help: "The MIME type of the file.",
|
|
Type: "string",
|
|
Example: "text/plain",
|
|
ReadOnly: true,
|
|
},
|
|
"mtime": {
|
|
Help: "Time of last modification with S accuracy (mS for OneDrive Personal).",
|
|
Type: "RFC 3339",
|
|
Example: "2006-01-02T15:04:05Z",
|
|
},
|
|
"btime": {
|
|
Help: "Time of file birth (creation) with S accuracy (mS for OneDrive Personal).",
|
|
Type: "RFC 3339",
|
|
Example: "2006-01-02T15:04:05Z",
|
|
},
|
|
"utime": {
|
|
Help: "Time of upload with S accuracy (mS for OneDrive Personal).",
|
|
Type: "RFC 3339",
|
|
Example: "2006-01-02T15:04:05Z",
|
|
ReadOnly: true,
|
|
},
|
|
"created-by-display-name": {
|
|
Help: "Display name of the user that created the item.",
|
|
Type: "string",
|
|
Example: "John Doe",
|
|
ReadOnly: true,
|
|
},
|
|
"created-by-id": {
|
|
Help: "ID of the user that created the item.",
|
|
Type: "string",
|
|
Example: "48d31887-5fad-4d73-a9f5-3c356e68a038",
|
|
ReadOnly: true,
|
|
},
|
|
"description": {
|
|
Help: "A short description of the file. Max 1024 characters. Only supported for OneDrive Personal.",
|
|
Type: "string",
|
|
Example: "Contract for signing",
|
|
},
|
|
"id": {
|
|
Help: "The unique identifier of the item within OneDrive.",
|
|
Type: "string",
|
|
Example: "01BYE5RZ6QN3ZWBTUFOFD3GSPGOHDJD36K",
|
|
ReadOnly: true,
|
|
},
|
|
"last-modified-by-display-name": {
|
|
Help: "Display name of the user that last modified the item.",
|
|
Type: "string",
|
|
Example: "John Doe",
|
|
ReadOnly: true,
|
|
},
|
|
"last-modified-by-id": {
|
|
Help: "ID of the user that last modified the item.",
|
|
Type: "string",
|
|
Example: "48d31887-5fad-4d73-a9f5-3c356e68a038",
|
|
ReadOnly: true,
|
|
},
|
|
"malware-detected": {
|
|
Help: "Whether OneDrive has detected that the item contains malware.",
|
|
Type: "boolean",
|
|
Example: "true",
|
|
ReadOnly: true,
|
|
},
|
|
"package-type": {
|
|
Help: "If present, indicates that this item is a package instead of a folder or file. Packages are treated like files in some contexts and folders in others.",
|
|
Type: "string",
|
|
Example: "oneNote",
|
|
ReadOnly: true,
|
|
},
|
|
"shared-owner-id": {
|
|
Help: "ID of the owner of the shared item (if shared).",
|
|
Type: "string",
|
|
Example: "48d31887-5fad-4d73-a9f5-3c356e68a038",
|
|
ReadOnly: true,
|
|
},
|
|
"shared-by-id": {
|
|
Help: "ID of the user that shared the item (if shared).",
|
|
Type: "string",
|
|
Example: "48d31887-5fad-4d73-a9f5-3c356e68a038",
|
|
ReadOnly: true,
|
|
},
|
|
"shared-scope": {
|
|
Help: "If shared, indicates the scope of how the item is shared: anonymous, organization, or users.",
|
|
Type: "string",
|
|
Example: "users",
|
|
ReadOnly: true,
|
|
},
|
|
"shared-time": {
|
|
Help: "Time when the item was shared, with S accuracy (mS for OneDrive Personal).",
|
|
Type: "RFC 3339",
|
|
Example: "2006-01-02T15:04:05Z",
|
|
ReadOnly: true,
|
|
},
|
|
"permissions": {
|
|
Help: "Permissions in a JSON dump of OneDrive format. Enable with --onedrive-metadata-permissions. Properties: id, grantedTo, grantedToIdentities, invitation, inheritedFrom, link, roles, shareId",
|
|
Type: "JSON",
|
|
Example: "{}",
|
|
},
|
|
}
|
|
|
|
// rwChoices type for fs.Bits
|
|
type rwChoices struct{}
|
|
|
|
func (rwChoices) Choices() []fs.BitsChoicesInfo {
|
|
return []fs.BitsChoicesInfo{
|
|
{Bit: uint64(rwOff), Name: "off"},
|
|
{Bit: uint64(rwRead), Name: "read"},
|
|
{Bit: uint64(rwWrite), Name: "write"},
|
|
{Bit: uint64(rwFailOK), Name: "failok"},
|
|
}
|
|
}
|
|
|
|
// rwChoice type alias
|
|
type rwChoice = fs.Bits[rwChoices]
|
|
|
|
const (
|
|
rwRead rwChoice = 1 << iota
|
|
rwWrite
|
|
rwFailOK
|
|
rwOff rwChoice = 0
|
|
)
|
|
|
|
// Examples for the options
|
|
var rwExamples = fs.OptionExamples{{
|
|
Value: rwOff.String(),
|
|
Help: "Do not read or write the value",
|
|
}, {
|
|
Value: rwRead.String(),
|
|
Help: "Read the value only",
|
|
}, {
|
|
Value: rwWrite.String(),
|
|
Help: "Write the value only",
|
|
}, {
|
|
Value: (rwRead | rwWrite).String(),
|
|
Help: "Read and Write the value.",
|
|
}, {
|
|
Value: rwFailOK.String(),
|
|
Help: "If writing fails log errors only, don't fail the transfer",
|
|
}}
|
|
|
|
// Metadata describes metadata properties shared by both Objects and Directories
|
|
type Metadata struct {
|
|
fs *Fs // what this object/dir is part of
|
|
remote string // remote, for convenience when obj/dir not in scope
|
|
mimeType string // Content-Type of object from server (may not be as uploaded)
|
|
description string // Provides a user-visible description of the item. Read-write. Only on OneDrive Personal
|
|
mtime time.Time // Time of last modification with S accuracy.
|
|
btime time.Time // Time of file birth (creation) with S accuracy.
|
|
utime time.Time // Time of upload with S accuracy.
|
|
createdBy api.IdentitySet // user that created the item
|
|
lastModifiedBy api.IdentitySet // user that last modified the item
|
|
malwareDetected bool // Whether OneDrive has detected that the item contains malware.
|
|
packageType string // If present, indicates that this item is a package instead of a folder or file.
|
|
shared *api.SharedType // information about the shared state of the item, if shared
|
|
normalizedID string // the normalized ID of the object or dir
|
|
permissions []*api.PermissionsType // The current set of permissions for the item. Note that to save API calls, this is not guaranteed to be cached on the object. Use m.Get() to refresh.
|
|
queuedPermissions []*api.PermissionsType // The set of permissions queued to be updated.
|
|
permsAddOnly bool // Whether to disable "update" and "remove" (for example, during server-side copy when the dst will have new IDs)
|
|
}
|
|
|
|
// Get retrieves the cached metadata and converts it to fs.Metadata.
|
|
// This is most typically used when OneDrive is the source (as opposed to the dest).
|
|
// If m.fs.opt.MetadataPermissions includes "read" then this will also include permissions, which requires an API call.
|
|
// Get does not use an API call otherwise.
|
|
func (m *Metadata) Get(ctx context.Context) (metadata fs.Metadata, err error) {
|
|
metadata = make(fs.Metadata, 17)
|
|
metadata["content-type"] = m.mimeType
|
|
metadata["mtime"] = m.mtime.Format(timeFormatOut)
|
|
metadata["btime"] = m.btime.Format(timeFormatOut)
|
|
metadata["utime"] = m.utime.Format(timeFormatOut)
|
|
metadata["created-by-display-name"] = m.createdBy.User.DisplayName
|
|
metadata["created-by-id"] = m.createdBy.User.ID
|
|
if m.description != "" {
|
|
metadata["description"] = m.description
|
|
}
|
|
metadata["id"] = m.normalizedID
|
|
metadata["last-modified-by-display-name"] = m.lastModifiedBy.User.DisplayName
|
|
metadata["last-modified-by-id"] = m.lastModifiedBy.User.ID
|
|
metadata["malware-detected"] = fmt.Sprint(m.malwareDetected)
|
|
if m.packageType != "" {
|
|
metadata["package-type"] = m.packageType
|
|
}
|
|
if m.shared != nil {
|
|
metadata["shared-owner-id"] = m.shared.Owner.User.ID
|
|
metadata["shared-by-id"] = m.shared.SharedBy.User.ID
|
|
metadata["shared-scope"] = m.shared.Scope
|
|
metadata["shared-time"] = time.Time(m.shared.SharedDateTime).Format(timeFormatOut)
|
|
}
|
|
if m.fs.opt.MetadataPermissions.IsSet(rwRead) {
|
|
p, _, err := m.fs.getPermissions(ctx, m.normalizedID)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get permissions: %w", err)
|
|
}
|
|
m.permissions = p
|
|
|
|
if len(p) > 0 {
|
|
fs.PrettyPrint(m.permissions, "perms", fs.LogLevelDebug)
|
|
buf, err := json.Marshal(m.permissions)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshal permissions: %w", err)
|
|
}
|
|
metadata["permissions"] = string(buf)
|
|
}
|
|
}
|
|
return metadata, nil
|
|
}
|
|
|
|
// Set takes fs.Metadata and parses/converts it to cached Metadata.
|
|
// This is most typically used when OneDrive is the destination (as opposed to the source).
|
|
// It does not actually update the remote (use Write for that.)
|
|
// It sets only the writeable metadata properties (i.e. read-only properties are skipped.)
|
|
// Permissions are included if m.fs.opt.MetadataPermissions includes "write".
|
|
// It returns errors if writeable properties can't be parsed.
|
|
// It does not return errors for unsupported properties that may be passed in.
|
|
// It returns the number of writeable properties set (if it is 0, we can skip the Write API call.)
|
|
func (m *Metadata) Set(ctx context.Context, metadata fs.Metadata) (numSet int, err error) {
|
|
numSet = 0
|
|
for k, v := range metadata {
|
|
k, v := k, v
|
|
switch k {
|
|
case "mtime":
|
|
t, err := time.Parse(timeFormatIn, v)
|
|
if err != nil {
|
|
return numSet, fmt.Errorf("failed to parse metadata %q = %q: %w", k, v, err)
|
|
}
|
|
m.mtime = t
|
|
numSet++
|
|
case "btime":
|
|
t, err := time.Parse(timeFormatIn, v)
|
|
if err != nil {
|
|
return numSet, fmt.Errorf("failed to parse metadata %q = %q: %w", k, v, err)
|
|
}
|
|
m.btime = t
|
|
numSet++
|
|
case "description":
|
|
if m.fs.driveType != driveTypePersonal {
|
|
fs.Debugf(m.remote, "metadata description is only supported for OneDrive Personal -- skipping: %s", v)
|
|
continue
|
|
}
|
|
m.description = v
|
|
numSet++
|
|
case "permissions":
|
|
if !m.fs.opt.MetadataPermissions.IsSet(rwWrite) {
|
|
continue
|
|
}
|
|
var perms []*api.PermissionsType
|
|
err := json.Unmarshal([]byte(v), &perms)
|
|
if err != nil {
|
|
return numSet, fmt.Errorf("failed to unmarshal permissions: %w", err)
|
|
}
|
|
m.queuedPermissions = perms
|
|
numSet++
|
|
default:
|
|
fs.Debugf(m.remote, "skipping unsupported metadata item: %s: %s", k, v)
|
|
}
|
|
}
|
|
if numSet == 0 {
|
|
fs.Infof(m.remote, "no writeable metadata found: %v", metadata)
|
|
}
|
|
return numSet, nil
|
|
}
|
|
|
|
// toAPIMetadata converts object/dir Metadata to api.Metadata for API calls.
|
|
// If btime is missing but mtime is present, mtime is also used as the btime, as otherwise it would get overwritten.
|
|
func (m *Metadata) toAPIMetadata() api.Metadata {
|
|
update := api.Metadata{
|
|
FileSystemInfo: &api.FileSystemInfoFacet{},
|
|
}
|
|
if m.description != "" && m.fs.driveType == driveTypePersonal {
|
|
update.Description = m.description
|
|
}
|
|
if !m.mtime.IsZero() {
|
|
update.FileSystemInfo.LastModifiedDateTime = api.Timestamp(m.mtime)
|
|
}
|
|
if !m.btime.IsZero() {
|
|
update.FileSystemInfo.CreatedDateTime = api.Timestamp(m.btime)
|
|
}
|
|
|
|
if m.btime.IsZero() && !m.mtime.IsZero() { // use mtime as btime if missing
|
|
m.btime = m.mtime
|
|
update.FileSystemInfo.CreatedDateTime = api.Timestamp(m.btime)
|
|
}
|
|
return update
|
|
}
|
|
|
|
// Write takes the cached Metadata and sets it on the remote, using API calls.
|
|
// If m.fs.opt.MetadataPermissions includes "write" and updatePermissions == true, permissions are also set.
|
|
// Calling Write without any writeable metadata will result in an error.
|
|
func (m *Metadata) Write(ctx context.Context, updatePermissions bool) (*api.Item, error) {
|
|
update := m.toAPIMetadata()
|
|
if update.IsEmpty() {
|
|
return nil, fmt.Errorf("%v: no writeable metadata found: %v", m.remote, m)
|
|
}
|
|
opts := m.fs.newOptsCallWithPath(ctx, m.remote, "PATCH", "")
|
|
var info *api.Item
|
|
err := m.fs.pacer.Call(func() (bool, error) {
|
|
resp, err := m.fs.srv.CallJSON(ctx, &opts, &update, &info)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
fs.Debugf(m.remote, "errored metadata: %v", m)
|
|
return nil, fmt.Errorf("%v: error updating metadata: %v", m.remote, err)
|
|
}
|
|
|
|
if m.fs.opt.MetadataPermissions.IsSet(rwWrite) && updatePermissions {
|
|
m.normalizedID = info.GetID()
|
|
err = m.WritePermissions(ctx)
|
|
if err != nil {
|
|
fs.Errorf(m.remote, "error writing permissions: %v", err)
|
|
return info, err
|
|
}
|
|
}
|
|
|
|
// update the struct since we have fresh info
|
|
m.fs.setSystemMetadata(info, m, m.remote, m.mimeType)
|
|
|
|
return info, err
|
|
}
|
|
|
|
// RefreshPermissions fetches the current permissions from the remote and caches them as Metadata
|
|
func (m *Metadata) RefreshPermissions(ctx context.Context) (err error) {
|
|
if m.normalizedID == "" {
|
|
return errors.New("internal error: normalizedID is missing")
|
|
}
|
|
p, _, err := m.fs.getPermissions(ctx, m.normalizedID)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to refresh permissions: %w", err)
|
|
}
|
|
m.permissions = p
|
|
return nil
|
|
}
|
|
|
|
// WritePermissions sets the permissions (and no other metadata) on the remote.
|
|
// m.permissions (the existing perms) and m.queuedPermissions (the new perms to be set) must be set correctly before calling this.
|
|
// m.permissions == nil will not error, as it is valid to add permissions when there were previously none.
|
|
// If successful, m.permissions will be set with the new current permissions and m.queuedPermissions will be nil.
|
|
func (m *Metadata) WritePermissions(ctx context.Context) (err error) {
|
|
if !m.fs.opt.MetadataPermissions.IsSet(rwWrite) {
|
|
return errors.New("can't write permissions without --onedrive-metadata-permissions write")
|
|
}
|
|
if m.normalizedID == "" {
|
|
return errors.New("internal error: normalizedID is missing")
|
|
}
|
|
if m.fs.opt.MetadataPermissions.IsSet(rwFailOK) {
|
|
// If failok is set, allow the permissions setting to fail and only log an ERROR
|
|
defer func() {
|
|
if err != nil {
|
|
fs.Errorf(m.fs, "Ignoring error as failok is set: %v", err)
|
|
err = nil
|
|
}
|
|
}()
|
|
}
|
|
|
|
// compare current to queued and sort into add/update/remove queues
|
|
add, update, remove := m.sortPermissions()
|
|
fs.Debugf(m.remote, "metadata permissions: to add: %d to update: %d to remove: %d", len(add), len(update), len(remove))
|
|
_, err = m.processPermissions(ctx, add, update, remove)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to process permissions: %w", err)
|
|
}
|
|
|
|
err = m.RefreshPermissions(ctx)
|
|
fs.Debugf(m.remote, "updated permissions (now has %d permissions)", len(m.permissions))
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get permissions: %w", err)
|
|
}
|
|
m.queuedPermissions = nil
|
|
|
|
return nil
|
|
}
|
|
|
|
// sortPermissions sorts the permissions (to be written) into add, update, and remove queues
|
|
func (m *Metadata) sortPermissions() (add, update, remove []*api.PermissionsType) {
|
|
new, old := m.queuedPermissions, m.permissions
|
|
if len(old) == 0 || m.permsAddOnly {
|
|
return new, nil, nil // they must all be "add"
|
|
}
|
|
|
|
for _, n := range new {
|
|
if n == nil {
|
|
continue
|
|
}
|
|
if n.ID != "" {
|
|
// sanity check: ensure there's a matching "old" id with a non-matching role
|
|
if !slices.ContainsFunc(old, func(o *api.PermissionsType) bool {
|
|
return o.ID == n.ID && slices.Compare(o.Roles, n.Roles) != 0 && len(o.Roles) > 0 && len(n.Roles) > 0 && !slices.Contains(o.Roles, api.OwnerRole)
|
|
}) {
|
|
fs.Debugf(m.remote, "skipping update for invalid roles: %v (perm ID: %v)", n.Roles, n.ID)
|
|
continue
|
|
}
|
|
if m.fs.driveType != driveTypePersonal && n.Link != nil && n.Link.WebURL != "" {
|
|
// special case to work around API limitation -- can't update a sharing link perm so need to remove + add instead
|
|
// https://learn.microsoft.com/en-us/answers/questions/986279/why-is-update-permission-graph-api-for-files-not-w
|
|
// https://github.com/microsoftgraph/msgraph-sdk-dotnet/issues/1135
|
|
fs.Debugf(m.remote, "sortPermissions: can't update due to API limitation, will remove + add instead: %v", n.Roles)
|
|
remove = append(remove, n)
|
|
add = append(add, n)
|
|
continue
|
|
}
|
|
fs.Debugf(m.remote, "sortPermissions: will update role to %v", n.Roles)
|
|
update = append(update, n)
|
|
} else {
|
|
fs.Debugf(m.remote, "sortPermissions: will add permission: %v %v", n, n.Roles)
|
|
add = append(add, n)
|
|
}
|
|
}
|
|
for _, o := range old {
|
|
if slices.Contains(o.Roles, api.OwnerRole) {
|
|
fs.Debugf(m.remote, "skipping remove permission -- can't remove 'owner' role")
|
|
continue
|
|
}
|
|
newHasOld := slices.ContainsFunc(new, func(n *api.PermissionsType) bool {
|
|
if n == nil || n.ID == "" {
|
|
return false // can't remove perms without an ID
|
|
}
|
|
return n.ID == o.ID
|
|
})
|
|
if !newHasOld && o.ID != "" && !slices.Contains(add, o) && !slices.Contains(update, o) {
|
|
fs.Debugf(m.remote, "sortPermissions: will remove permission: %v %v (perm ID: %v)", o, o.Roles, o.ID)
|
|
remove = append(remove, o)
|
|
}
|
|
}
|
|
return add, update, remove
|
|
}
|
|
|
|
// processPermissions executes the add, update, and remove queues for writing permissions
|
|
func (m *Metadata) processPermissions(ctx context.Context, add, update, remove []*api.PermissionsType) (newPermissions []*api.PermissionsType, err error) {
|
|
errs := errcount.New()
|
|
for _, p := range remove { // remove (need to do these first because of remove + add workaround)
|
|
_, err := m.removePermission(ctx, p)
|
|
if err != nil {
|
|
fs.Errorf(m.remote, "Failed to remove permission: %v", err)
|
|
errs.Add(err)
|
|
}
|
|
}
|
|
|
|
for _, p := range add { // add
|
|
newPs, _, err := m.addPermission(ctx, p)
|
|
if err != nil {
|
|
fs.Errorf(m.remote, "Failed to add permission: %v", err)
|
|
errs.Add(err)
|
|
continue
|
|
}
|
|
newPermissions = append(newPermissions, newPs...)
|
|
}
|
|
|
|
for _, p := range update { // update
|
|
newP, _, err := m.updatePermission(ctx, p)
|
|
if err != nil {
|
|
fs.Errorf(m.remote, "Failed to update permission: %v", err)
|
|
errs.Add(err)
|
|
continue
|
|
}
|
|
newPermissions = append(newPermissions, newP)
|
|
}
|
|
|
|
err = errs.Err("failed to set permissions")
|
|
if err != nil {
|
|
err = fserrors.NoRetryError(err)
|
|
}
|
|
return newPermissions, err
|
|
}
|
|
|
|
// fillRecipients looks for recipients to add from the permission passed in.
|
|
// It looks for an email address in identity.User.Email, ID, and DisplayName, otherwise it uses the identity.User.ID as r.ObjectID.
|
|
// It considers both "GrantedTo" and "GrantedToIdentities".
|
|
func fillRecipients(p *api.PermissionsType, driveType string) (recipients []api.DriveRecipient) {
|
|
if p == nil {
|
|
return recipients
|
|
}
|
|
ids := make(map[string]struct{}, len(p.GetGrantedToIdentities(driveType))+1)
|
|
isUnique := func(s string) bool {
|
|
_, ok := ids[s]
|
|
return !ok && s != ""
|
|
}
|
|
|
|
addRecipient := func(identity *api.IdentitySet) {
|
|
r := api.DriveRecipient{}
|
|
|
|
id := ""
|
|
if strings.ContainsRune(identity.User.Email, '@') {
|
|
id = identity.User.Email
|
|
r.Email = id
|
|
} else if strings.ContainsRune(identity.User.ID, '@') {
|
|
id = identity.User.ID
|
|
r.Email = id
|
|
} else if strings.ContainsRune(identity.User.DisplayName, '@') {
|
|
id = identity.User.DisplayName
|
|
r.Email = id
|
|
} else {
|
|
id = identity.User.ID
|
|
r.ObjectID = id
|
|
}
|
|
if !isUnique(id) {
|
|
return
|
|
}
|
|
ids[id] = struct{}{}
|
|
recipients = append(recipients, r)
|
|
}
|
|
|
|
forIdentitySet := func(iSet *api.IdentitySet) {
|
|
if iSet == nil {
|
|
return
|
|
}
|
|
iS := *iSet
|
|
forIdentity := func(i api.Identity) {
|
|
if i != (api.Identity{}) {
|
|
iS.User = i
|
|
addRecipient(&iS)
|
|
}
|
|
}
|
|
forIdentity(iS.User)
|
|
forIdentity(iS.SiteUser)
|
|
forIdentity(iS.Group)
|
|
forIdentity(iS.SiteGroup)
|
|
forIdentity(iS.Application)
|
|
forIdentity(iS.Device)
|
|
}
|
|
|
|
for _, identitySet := range p.GetGrantedToIdentities(driveType) {
|
|
forIdentitySet(identitySet)
|
|
}
|
|
forIdentitySet(p.GetGrantedTo(driveType))
|
|
|
|
return recipients
|
|
}
|
|
|
|
// addPermission adds new permissions to an object or dir.
|
|
// if p.Link.Scope == "anonymous" then it will also create a Public Link.
|
|
func (m *Metadata) addPermission(ctx context.Context, p *api.PermissionsType) (newPs []*api.PermissionsType, resp *http.Response, err error) {
|
|
opts := m.fs.newOptsCall(m.normalizedID, "POST", "/invite")
|
|
|
|
req := &api.AddPermissionsRequest{
|
|
Recipients: fillRecipients(p, m.fs.driveType),
|
|
RequireSignIn: m.fs.driveType != driveTypePersonal, // personal and business have conflicting requirements
|
|
Roles: p.Roles,
|
|
}
|
|
if m.fs.driveType != driveTypePersonal {
|
|
req.RetainInheritedPermissions = false // not supported for personal
|
|
}
|
|
|
|
if p.Link != nil && p.Link.Scope == api.AnonymousScope {
|
|
link, err := m.fs.PublicLink(ctx, m.remote, fs.DurationOff, false)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
p.Link.WebURL = link
|
|
newPs = append(newPs, p)
|
|
if len(req.Recipients) == 0 {
|
|
return newPs, nil, nil
|
|
}
|
|
}
|
|
|
|
if len(req.Recipients) == 0 {
|
|
fs.Debugf(m.remote, "skipping add permission -- at least one valid recipient is required")
|
|
return nil, nil, nil
|
|
}
|
|
if len(req.Roles) == 0 {
|
|
return nil, nil, errors.New("at least one role is required to add a permission (choices: read, write, owner, member)")
|
|
}
|
|
if slices.Contains(req.Roles, api.OwnerRole) {
|
|
fs.Debugf(m.remote, "skipping add permission -- can't invite a user with 'owner' role")
|
|
return nil, nil, nil
|
|
}
|
|
|
|
newP := &api.PermissionsResponse{}
|
|
err = m.fs.pacer.Call(func() (bool, error) {
|
|
resp, err = m.fs.srv.CallJSON(ctx, &opts, &req, &newP)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
|
|
return newP.Value, resp, err
|
|
}
|
|
|
|
// updatePermission updates an existing permission on an object or dir.
|
|
// This requires the permission ID and a role to update (which will error if it is the same as the existing role.)
|
|
// Role is the only property that can be updated.
|
|
func (m *Metadata) updatePermission(ctx context.Context, p *api.PermissionsType) (newP *api.PermissionsType, resp *http.Response, err error) {
|
|
opts := m.fs.newOptsCall(m.normalizedID, "PATCH", "/permissions/"+p.ID)
|
|
req := api.UpdatePermissionsRequest{Roles: p.Roles} // roles is the only property that can be updated
|
|
|
|
if len(req.Roles) == 0 {
|
|
return nil, nil, errors.New("at least one role is required to update a permission (choices: read, write, owner, member)")
|
|
}
|
|
|
|
newP = &api.PermissionsType{}
|
|
err = m.fs.pacer.Call(func() (bool, error) {
|
|
resp, err = m.fs.srv.CallJSON(ctx, &opts, &req, &newP)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
|
|
return newP, resp, err
|
|
}
|
|
|
|
// removePermission removes an existing permission on an object or dir.
|
|
// This requires the permission ID.
|
|
func (m *Metadata) removePermission(ctx context.Context, p *api.PermissionsType) (resp *http.Response, err error) {
|
|
opts := m.fs.newOptsCall(m.normalizedID, "DELETE", "/permissions/"+p.ID)
|
|
opts.NoResponse = true
|
|
|
|
err = m.fs.pacer.Call(func() (bool, error) {
|
|
resp, err = m.fs.srv.CallJSON(ctx, &opts, nil, nil)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
return resp, err
|
|
}
|
|
|
|
// getPermissions gets the current permissions for an object or dir, from the API.
|
|
func (f *Fs) getPermissions(ctx context.Context, normalizedID string) (p []*api.PermissionsType, resp *http.Response, err error) {
|
|
opts := f.newOptsCall(normalizedID, "GET", "/permissions")
|
|
|
|
permResp := &api.PermissionsResponse{}
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.srv.CallJSON(ctx, &opts, nil, &permResp)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
|
|
return permResp.Value, resp, err
|
|
}
|
|
|
|
func (f *Fs) newMetadata(remote string) *Metadata {
|
|
return &Metadata{fs: f, remote: remote}
|
|
}
|
|
|
|
// returns true if metadata includes a "permissions" key and f.opt.MetadataPermissions includes "write".
|
|
func (f *Fs) needsUpdatePermissions(metadata fs.Metadata) bool {
|
|
_, ok := metadata["permissions"]
|
|
return ok && f.opt.MetadataPermissions.IsSet(rwWrite)
|
|
}
|
|
|
|
// returns a non-zero btime if we have one
|
|
// otherwise falls back to mtime
|
|
func (o *Object) tryGetBtime(modTime time.Time) time.Time {
|
|
if o.meta != nil && !o.meta.btime.IsZero() {
|
|
return o.meta.btime
|
|
}
|
|
return modTime
|
|
}
|
|
|
|
// adds metadata (except permissions) if --metadata is in use
|
|
func (o *Object) fetchMetadataForCreate(ctx context.Context, src fs.ObjectInfo, options []fs.OpenOption, modTime time.Time) (createRequest api.CreateUploadRequest, metadata fs.Metadata, err error) {
|
|
createRequest = api.CreateUploadRequest{ // we set mtime no matter what
|
|
Item: api.Metadata{
|
|
FileSystemInfo: &api.FileSystemInfoFacet{
|
|
CreatedDateTime: api.Timestamp(o.tryGetBtime(modTime)),
|
|
LastModifiedDateTime: api.Timestamp(modTime),
|
|
},
|
|
},
|
|
}
|
|
|
|
meta, err := fs.GetMetadataOptions(ctx, o.fs, src, options)
|
|
if err != nil {
|
|
return createRequest, nil, fmt.Errorf("failed to read metadata from source object: %w", err)
|
|
}
|
|
if meta == nil {
|
|
return createRequest, nil, nil // no metadata or --metadata not in use, so just return mtime
|
|
}
|
|
if o.meta == nil {
|
|
o.meta = o.fs.newMetadata(o.Remote())
|
|
}
|
|
o.meta.mtime = modTime
|
|
numSet, err := o.meta.Set(ctx, meta)
|
|
if err != nil {
|
|
return createRequest, meta, err
|
|
}
|
|
if numSet == 0 {
|
|
return createRequest, meta, nil
|
|
}
|
|
createRequest.Item = o.meta.toAPIMetadata()
|
|
return createRequest, meta, nil
|
|
}
|
|
|
|
// Fetch metadata and update updateInfo if --metadata is in use
|
|
// modtime will still be set when there is no metadata to set
|
|
func (f *Fs) fetchAndUpdateMetadata(ctx context.Context, src fs.ObjectInfo, options []fs.OpenOption, updateInfo *Object) (info *api.Item, err error) {
|
|
meta, err := fs.GetMetadataOptions(ctx, f, src, options)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to read metadata from source object: %w", err)
|
|
}
|
|
if meta == nil {
|
|
return updateInfo.setModTime(ctx, src.ModTime(ctx)) // no metadata or --metadata not in use, so just set modtime
|
|
}
|
|
if updateInfo.meta == nil {
|
|
updateInfo.meta = f.newMetadata(updateInfo.Remote())
|
|
}
|
|
newInfo, err := updateInfo.updateMetadata(ctx, meta)
|
|
if newInfo == nil {
|
|
return info, err
|
|
}
|
|
return newInfo, err
|
|
}
|
|
|
|
// updateMetadata calls Get, Set, and Write
|
|
func (o *Object) updateMetadata(ctx context.Context, meta fs.Metadata) (info *api.Item, err error) {
|
|
_, err = o.meta.Get(ctx) // refresh permissions
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
numSet, err := o.meta.Set(ctx, meta)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if numSet == 0 {
|
|
return nil, nil
|
|
}
|
|
info, err = o.meta.Write(ctx, o.fs.needsUpdatePermissions(meta))
|
|
if err != nil {
|
|
return info, err
|
|
}
|
|
err = o.setMetaData(info)
|
|
if err != nil {
|
|
return info, err
|
|
}
|
|
|
|
// Remove versions if required
|
|
if o.fs.opt.NoVersions {
|
|
err := o.deleteVersions(ctx)
|
|
if err != nil {
|
|
return info, fmt.Errorf("%v: Failed to remove versions: %v", o, err)
|
|
}
|
|
}
|
|
return info, nil
|
|
}
|
|
|
|
// MkdirMetadata makes the directory passed in as dir.
|
|
//
|
|
// It shouldn't return an error if it already exists.
|
|
//
|
|
// If the metadata is not nil it is set.
|
|
//
|
|
// It returns the directory that was created.
|
|
func (f *Fs) MkdirMetadata(ctx context.Context, dir string, metadata fs.Metadata) (fs.Directory, error) {
|
|
var info *api.Item
|
|
var meta *Metadata
|
|
dirID, err := f.dirCache.FindDir(ctx, dir, false)
|
|
if err == fs.ErrorDirNotFound {
|
|
// Directory does not exist so create it
|
|
var leaf, parentID string
|
|
leaf, parentID, err = f.dirCache.FindPath(ctx, dir, true)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
info, meta, err = f.createDir(ctx, parentID, dir, leaf, metadata)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if f.driveType != driveTypePersonal {
|
|
// for some reason, OneDrive Business needs this extra step to set modtime, while Personal does not. Seems like a bug...
|
|
fs.Debugf(dir, "setting time %v", meta.mtime)
|
|
info, err = meta.Write(ctx, false)
|
|
}
|
|
} else if err == nil {
|
|
// Directory exists and needs updating
|
|
info, meta, err = f.updateDir(ctx, dirID, dir, metadata)
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Convert the info into a directory entry
|
|
parent, _ := dircache.SplitPath(dir)
|
|
entry, err := f.itemToDirEntry(ctx, parent, info)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
directory, ok := entry.(*Directory)
|
|
if !ok {
|
|
return nil, fmt.Errorf("internal error: expecting %T to be a *Directory", entry)
|
|
}
|
|
directory.meta = meta
|
|
f.setSystemMetadata(info, directory.meta, entry.Remote(), dirMimeType)
|
|
|
|
dirEntry, ok := entry.(fs.Directory)
|
|
if !ok {
|
|
return nil, fmt.Errorf("internal error: expecting %T to be an fs.Directory", entry)
|
|
}
|
|
|
|
return dirEntry, nil
|
|
}
|
|
|
|
// createDir makes a directory with pathID as parent and name leaf with optional metadata
|
|
func (f *Fs) createDir(ctx context.Context, pathID, dirWithLeaf, leaf string, metadata fs.Metadata) (info *api.Item, meta *Metadata, err error) {
|
|
// fs.Debugf(f, "CreateDir(%q, %q)\n", dirID, leaf)
|
|
var resp *http.Response
|
|
opts := f.newOptsCall(pathID, "POST", "/children")
|
|
|
|
mkdir := api.CreateItemWithMetadataRequest{
|
|
CreateItemRequest: api.CreateItemRequest{
|
|
Name: f.opt.Enc.FromStandardName(leaf),
|
|
ConflictBehavior: "fail",
|
|
},
|
|
}
|
|
m := f.newMetadata(dirWithLeaf)
|
|
m.mimeType = dirMimeType
|
|
numSet := 0
|
|
if len(metadata) > 0 {
|
|
|
|
numSet, err = m.Set(ctx, metadata)
|
|
if err != nil {
|
|
return nil, m, err
|
|
}
|
|
if numSet > 0 {
|
|
mkdir.Metadata = m.toAPIMetadata()
|
|
}
|
|
}
|
|
|
|
err = f.pacer.Call(func() (bool, error) {
|
|
resp, err = f.srv.CallJSON(ctx, &opts, &mkdir, &info)
|
|
return shouldRetry(ctx, resp, err)
|
|
})
|
|
if err != nil {
|
|
return nil, m, err
|
|
}
|
|
|
|
if f.needsUpdatePermissions(metadata) && numSet > 0 { // permissions must be done as a separate step
|
|
m.normalizedID = info.GetID()
|
|
err = m.RefreshPermissions(ctx)
|
|
if err != nil {
|
|
return info, m, err
|
|
}
|
|
|
|
err = m.WritePermissions(ctx)
|
|
if err != nil {
|
|
fs.Errorf(m.remote, "error writing permissions: %v", err)
|
|
return info, m, err
|
|
}
|
|
}
|
|
return info, m, nil
|
|
}
|
|
|
|
// updateDir updates an existing a directory with the metadata passed in
|
|
func (f *Fs) updateDir(ctx context.Context, dirID, remote string, metadata fs.Metadata) (info *api.Item, meta *Metadata, err error) {
|
|
d := f.newDir(dirID, remote)
|
|
_, err = d.meta.Set(ctx, metadata)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
info, err = d.meta.Write(ctx, f.needsUpdatePermissions(metadata))
|
|
return info, d.meta, err
|
|
}
|
|
|
|
func (f *Fs) newDir(dirID, remote string) (d *Directory) {
|
|
d = &Directory{
|
|
fs: f,
|
|
remote: remote,
|
|
size: -1,
|
|
items: -1,
|
|
id: dirID,
|
|
meta: f.newMetadata(remote),
|
|
}
|
|
d.meta.normalizedID = dirID
|
|
return d
|
|
}
|
|
|
|
// Metadata returns metadata for a DirEntry
|
|
//
|
|
// It should return nil if there is no Metadata
|
|
func (o *Object) Metadata(ctx context.Context) (metadata fs.Metadata, err error) {
|
|
err = o.readMetaData(ctx)
|
|
if err != nil {
|
|
fs.Logf(o, "Failed to read metadata: %v", err)
|
|
return nil, err
|
|
}
|
|
return o.meta.Get(ctx)
|
|
}
|
|
|
|
// DirSetModTime sets the directory modtime for dir
|
|
func (f *Fs) DirSetModTime(ctx context.Context, dir string, modTime time.Time) error {
|
|
dirID, err := f.dirCache.FindDir(ctx, dir, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
d := f.newDir(dirID, dir)
|
|
return d.SetModTime(ctx, modTime)
|
|
}
|
|
|
|
// SetModTime sets the metadata on the DirEntry to set the modification date
|
|
//
|
|
// If there is any other metadata it does not overwrite it.
|
|
func (d *Directory) SetModTime(ctx context.Context, t time.Time) error {
|
|
btime := t
|
|
if d.meta != nil && !d.meta.btime.IsZero() {
|
|
btime = d.meta.btime // if we already have a non-zero btime, preserve it
|
|
}
|
|
d.meta = d.fs.newMetadata(d.remote) // set only the mtime and btime
|
|
d.meta.mtime = t
|
|
d.meta.btime = btime
|
|
_, err := d.meta.Write(ctx, false)
|
|
return err
|
|
}
|
|
|
|
// Metadata returns metadata for a DirEntry
|
|
//
|
|
// It should return nil if there is no Metadata
|
|
func (d *Directory) Metadata(ctx context.Context) (metadata fs.Metadata, err error) {
|
|
return d.meta.Get(ctx)
|
|
}
|
|
|
|
// SetMetadata sets metadata for a Directory
|
|
//
|
|
// It should return fs.ErrorNotImplemented if it can't set metadata
|
|
func (d *Directory) SetMetadata(ctx context.Context, metadata fs.Metadata) error {
|
|
_, meta, err := d.fs.updateDir(ctx, d.id, d.remote, metadata)
|
|
d.meta = meta
|
|
return err
|
|
}
|
|
|
|
// Fs returns read only access to the Fs that this object is part of
|
|
func (d *Directory) Fs() fs.Info {
|
|
return d.fs
|
|
}
|
|
|
|
// String returns the name
|
|
func (d *Directory) String() string {
|
|
return d.remote
|
|
}
|
|
|
|
// Remote returns the remote path
|
|
func (d *Directory) Remote() string {
|
|
return d.remote
|
|
}
|
|
|
|
// ModTime returns the modification date of the file
|
|
//
|
|
// If one isn't available it returns the configured --default-dir-time
|
|
func (d *Directory) ModTime(ctx context.Context) time.Time {
|
|
if !d.meta.mtime.IsZero() {
|
|
return d.meta.mtime
|
|
}
|
|
ci := fs.GetConfig(ctx)
|
|
return time.Time(ci.DefaultTime)
|
|
}
|
|
|
|
// Size returns the size of the file
|
|
func (d *Directory) Size() int64 {
|
|
return d.size
|
|
}
|
|
|
|
// Items returns the count of items in this directory or this
|
|
// directory and subdirectories if known, -1 for unknown
|
|
func (d *Directory) Items() int64 {
|
|
return d.items
|
|
}
|
|
|
|
// ID gets the optional ID
|
|
func (d *Directory) ID() string {
|
|
return d.id
|
|
}
|
|
|
|
// MimeType returns the content type of the Object if
|
|
// known, or "" if not
|
|
func (d *Directory) MimeType(ctx context.Context) string {
|
|
return dirMimeType
|
|
}
|