2022-06-25 07:14:03 +00:00
|
|
|
package utils
|
|
|
|
|
|
|
|
import (
|
2023-04-01 06:54:29 +00:00
|
|
|
"bytes"
|
2022-06-25 07:14:03 +00:00
|
|
|
"context"
|
2023-08-27 13:14:23 +00:00
|
|
|
"errors"
|
feat: Crypt driver, improve http/webdav handling (#4884)
this PR has several enhancements, fixes, and features:
- [x] Crypt: a transparent encryption driver. Anyone can easily, and safely store encrypted data on the remote storage provider. Consider your data is safely stored in the safe, and the storage provider can only see the safe, but not your data.
- [x] Optional: compatible with [Rclone Crypt](https://rclone.org/crypt/). More ways to manipulate the encrypted data.
- [x] directory and filename encryption
- [x] server-side encryption mode (server encrypts & decrypts all data, all data flows thru the server)
- [x] obfuscate sensitive information internally
- [x] introduced a server memory-cached multi-thread downloader.
- [x] Driver: **Quark** enabled this feature, faster load in any single thread scenario. e.g. media player directly playing from the link, now it's faster.
- [x] general improvement on HTTP/WebDAV stream processing & header handling & response handling
- [x] Driver: **Mega** driver support ranged http header
- [x] Driver: **Quark** fix bug of not closing HTTP request to Quark server while user end has closed connection to alist
## Crypt, a transparent Encrypt/Decrypt Driver. (Rclone Crypt compatible)
e.g.
Crypt mount path -> /vault
Crypt remote path -> /ali/encrypted
Aliyun mount paht -> /ali
when the user uploads a.jpg to /vault, the data will be encrypted and saved to /ali/encrypted/xxxxx. And when the user wants to access a.jpg, it's automatically decrypted, and the user can do anything with it.
Since it's Rclone Crypt compatible, users can download /ali/encrypted/xxxxx and decrypt it with rclone crypt tool. Or the user can mount this folder using rclone, then mount the decrypted folder in Linux...
NB. Some breaking changes is made to make it follow global standard, e.g. processing the HTTP header properly.
close #4679
close #4827
Co-authored-by: Sean He <866155+seanhe26@users.noreply.github.com>
Co-authored-by: Andy Hsu <i@nn.ci>
2023-08-02 06:40:36 +00:00
|
|
|
"fmt"
|
2022-06-25 07:14:03 +00:00
|
|
|
"io"
|
2024-04-25 12:11:15 +00:00
|
|
|
"sync"
|
feat: Crypt driver, improve http/webdav handling (#4884)
this PR has several enhancements, fixes, and features:
- [x] Crypt: a transparent encryption driver. Anyone can easily, and safely store encrypted data on the remote storage provider. Consider your data is safely stored in the safe, and the storage provider can only see the safe, but not your data.
- [x] Optional: compatible with [Rclone Crypt](https://rclone.org/crypt/). More ways to manipulate the encrypted data.
- [x] directory and filename encryption
- [x] server-side encryption mode (server encrypts & decrypts all data, all data flows thru the server)
- [x] obfuscate sensitive information internally
- [x] introduced a server memory-cached multi-thread downloader.
- [x] Driver: **Quark** enabled this feature, faster load in any single thread scenario. e.g. media player directly playing from the link, now it's faster.
- [x] general improvement on HTTP/WebDAV stream processing & header handling & response handling
- [x] Driver: **Mega** driver support ranged http header
- [x] Driver: **Quark** fix bug of not closing HTTP request to Quark server while user end has closed connection to alist
## Crypt, a transparent Encrypt/Decrypt Driver. (Rclone Crypt compatible)
e.g.
Crypt mount path -> /vault
Crypt remote path -> /ali/encrypted
Aliyun mount paht -> /ali
when the user uploads a.jpg to /vault, the data will be encrypted and saved to /ali/encrypted/xxxxx. And when the user wants to access a.jpg, it's automatically decrypted, and the user can do anything with it.
Since it's Rclone Crypt compatible, users can download /ali/encrypted/xxxxx and decrypt it with rclone crypt tool. Or the user can mount this folder using rclone, then mount the decrypted folder in Linux...
NB. Some breaking changes is made to make it follow global standard, e.g. processing the HTTP header properly.
close #4679
close #4827
Co-authored-by: Sean He <866155+seanhe26@users.noreply.github.com>
Co-authored-by: Andy Hsu <i@nn.ci>
2023-08-02 06:40:36 +00:00
|
|
|
"time"
|
2023-08-09 08:13:09 +00:00
|
|
|
|
2023-11-06 08:56:55 +00:00
|
|
|
"golang.org/x/exp/constraints"
|
|
|
|
|
2023-08-09 08:13:09 +00:00
|
|
|
log "github.com/sirupsen/logrus"
|
2022-06-25 07:14:03 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// here is some syntaxic sugar inspired by the Tomas Senart's video,
|
|
|
|
// it allows me to inline the Reader interface
|
|
|
|
type readerFunc func(p []byte) (n int, err error)
|
|
|
|
|
|
|
|
func (rf readerFunc) Read(p []byte) (n int, err error) { return rf(p) }
|
|
|
|
|
|
|
|
// CopyWithCtx slightly modified function signature:
|
2023-08-27 13:14:23 +00:00
|
|
|
// - context has been added in order to propagate cancellation
|
2022-06-25 07:14:03 +00:00
|
|
|
// - I do not return the number of bytes written, has it is not useful in my use case
|
2023-11-06 08:56:55 +00:00
|
|
|
func CopyWithCtx(ctx context.Context, out io.Writer, in io.Reader, size int64, progress func(percentage float64)) error {
|
2022-06-25 07:14:03 +00:00
|
|
|
// Copy will call the Reader and Writer interface multiple time, in order
|
|
|
|
// to copy by chunk (avoiding loading the whole file in memory).
|
|
|
|
// I insert the ability to cancel before read time as it is the earliest
|
|
|
|
// possible in the call process.
|
2022-08-31 14:41:27 +00:00
|
|
|
var finish int64 = 0
|
|
|
|
s := size / 100
|
2024-04-25 12:11:15 +00:00
|
|
|
_, err := CopyWithBuffer(out, readerFunc(func(p []byte) (int, error) {
|
2022-06-25 07:14:03 +00:00
|
|
|
// golang non-blocking channel: https://gobyexample.com/non-blocking-channel-operations
|
|
|
|
select {
|
|
|
|
// if context has been canceled
|
|
|
|
case <-ctx.Done():
|
|
|
|
// stop process and propagate "context canceled" error
|
|
|
|
return 0, ctx.Err()
|
|
|
|
default:
|
|
|
|
// otherwise just run default io.Reader implementation
|
2022-08-31 14:41:27 +00:00
|
|
|
n, err := in.Read(p)
|
2022-09-03 11:32:44 +00:00
|
|
|
if s > 0 && (err == nil || err == io.EOF) {
|
2022-08-31 14:41:27 +00:00
|
|
|
finish += int64(n)
|
2023-11-06 08:56:55 +00:00
|
|
|
progress(float64(finish) / float64(s))
|
2022-08-31 14:41:27 +00:00
|
|
|
}
|
|
|
|
return n, err
|
2022-06-25 07:14:03 +00:00
|
|
|
}
|
|
|
|
}))
|
|
|
|
return err
|
|
|
|
}
|
2022-09-12 09:10:02 +00:00
|
|
|
|
|
|
|
type limitWriter struct {
|
|
|
|
w io.Writer
|
|
|
|
limit int64
|
|
|
|
}
|
|
|
|
|
2023-08-09 08:13:09 +00:00
|
|
|
func (l *limitWriter) Write(p []byte) (n int, err error) {
|
2023-08-11 06:23:30 +00:00
|
|
|
lp := len(p)
|
2023-08-09 08:13:09 +00:00
|
|
|
if l.limit > 0 {
|
2023-08-11 06:23:30 +00:00
|
|
|
if int64(lp) > l.limit {
|
2023-08-09 08:13:09 +00:00
|
|
|
p = p[:l.limit]
|
2022-09-12 09:10:02 +00:00
|
|
|
}
|
2023-08-09 08:13:09 +00:00
|
|
|
l.limit -= int64(len(p))
|
|
|
|
_, err = l.w.Write(p)
|
2022-09-12 09:10:02 +00:00
|
|
|
}
|
2023-08-11 06:23:30 +00:00
|
|
|
return lp, err
|
2022-09-12 09:10:02 +00:00
|
|
|
}
|
|
|
|
|
2023-08-09 08:13:09 +00:00
|
|
|
func LimitWriter(w io.Writer, limit int64) io.Writer {
|
|
|
|
return &limitWriter{w: w, limit: limit}
|
2022-09-12 09:10:02 +00:00
|
|
|
}
|
2023-02-20 08:46:38 +00:00
|
|
|
|
|
|
|
type ReadCloser struct {
|
|
|
|
io.Reader
|
|
|
|
io.Closer
|
|
|
|
}
|
|
|
|
|
|
|
|
type CloseFunc func() error
|
|
|
|
|
|
|
|
func (c CloseFunc) Close() error {
|
|
|
|
return c()
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewReadCloser(reader io.Reader, close CloseFunc) io.ReadCloser {
|
|
|
|
return ReadCloser{
|
|
|
|
Reader: reader,
|
|
|
|
Closer: close,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewLimitReadCloser(reader io.Reader, close CloseFunc, limit int64) io.ReadCloser {
|
|
|
|
return NewReadCloser(io.LimitReader(reader, limit), close)
|
|
|
|
}
|
2023-04-01 06:54:29 +00:00
|
|
|
|
|
|
|
type MultiReadable struct {
|
|
|
|
originReader io.Reader
|
|
|
|
reader io.Reader
|
|
|
|
cache *bytes.Buffer
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewMultiReadable(reader io.Reader) *MultiReadable {
|
|
|
|
return &MultiReadable{
|
|
|
|
originReader: reader,
|
|
|
|
reader: reader,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mr *MultiReadable) Read(p []byte) (int, error) {
|
|
|
|
n, err := mr.reader.Read(p)
|
|
|
|
if _, ok := mr.reader.(io.Seeker); !ok && n > 0 {
|
|
|
|
if mr.cache == nil {
|
|
|
|
mr.cache = &bytes.Buffer{}
|
|
|
|
}
|
|
|
|
mr.cache.Write(p[:n])
|
|
|
|
}
|
|
|
|
return n, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mr *MultiReadable) Reset() error {
|
|
|
|
if seeker, ok := mr.reader.(io.Seeker); ok {
|
|
|
|
_, err := seeker.Seek(0, io.SeekStart)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if mr.cache != nil && mr.cache.Len() > 0 {
|
|
|
|
mr.reader = io.MultiReader(mr.cache, mr.reader)
|
|
|
|
mr.cache = nil
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mr *MultiReadable) Close() error {
|
|
|
|
if closer, ok := mr.originReader.(io.Closer); ok {
|
|
|
|
return closer.Close()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
feat: Crypt driver, improve http/webdav handling (#4884)
this PR has several enhancements, fixes, and features:
- [x] Crypt: a transparent encryption driver. Anyone can easily, and safely store encrypted data on the remote storage provider. Consider your data is safely stored in the safe, and the storage provider can only see the safe, but not your data.
- [x] Optional: compatible with [Rclone Crypt](https://rclone.org/crypt/). More ways to manipulate the encrypted data.
- [x] directory and filename encryption
- [x] server-side encryption mode (server encrypts & decrypts all data, all data flows thru the server)
- [x] obfuscate sensitive information internally
- [x] introduced a server memory-cached multi-thread downloader.
- [x] Driver: **Quark** enabled this feature, faster load in any single thread scenario. e.g. media player directly playing from the link, now it's faster.
- [x] general improvement on HTTP/WebDAV stream processing & header handling & response handling
- [x] Driver: **Mega** driver support ranged http header
- [x] Driver: **Quark** fix bug of not closing HTTP request to Quark server while user end has closed connection to alist
## Crypt, a transparent Encrypt/Decrypt Driver. (Rclone Crypt compatible)
e.g.
Crypt mount path -> /vault
Crypt remote path -> /ali/encrypted
Aliyun mount paht -> /ali
when the user uploads a.jpg to /vault, the data will be encrypted and saved to /ali/encrypted/xxxxx. And when the user wants to access a.jpg, it's automatically decrypted, and the user can do anything with it.
Since it's Rclone Crypt compatible, users can download /ali/encrypted/xxxxx and decrypt it with rclone crypt tool. Or the user can mount this folder using rclone, then mount the decrypted folder in Linux...
NB. Some breaking changes is made to make it follow global standard, e.g. processing the HTTP header properly.
close #4679
close #4827
Co-authored-by: Sean He <866155+seanhe26@users.noreply.github.com>
Co-authored-by: Andy Hsu <i@nn.ci>
2023-08-02 06:40:36 +00:00
|
|
|
|
|
|
|
func Retry(attempts int, sleep time.Duration, f func() error) (err error) {
|
|
|
|
for i := 0; i < attempts; i++ {
|
2024-07-07 05:20:34 +00:00
|
|
|
//fmt.Println("This is attempt number", i)
|
feat: Crypt driver, improve http/webdav handling (#4884)
this PR has several enhancements, fixes, and features:
- [x] Crypt: a transparent encryption driver. Anyone can easily, and safely store encrypted data on the remote storage provider. Consider your data is safely stored in the safe, and the storage provider can only see the safe, but not your data.
- [x] Optional: compatible with [Rclone Crypt](https://rclone.org/crypt/). More ways to manipulate the encrypted data.
- [x] directory and filename encryption
- [x] server-side encryption mode (server encrypts & decrypts all data, all data flows thru the server)
- [x] obfuscate sensitive information internally
- [x] introduced a server memory-cached multi-thread downloader.
- [x] Driver: **Quark** enabled this feature, faster load in any single thread scenario. e.g. media player directly playing from the link, now it's faster.
- [x] general improvement on HTTP/WebDAV stream processing & header handling & response handling
- [x] Driver: **Mega** driver support ranged http header
- [x] Driver: **Quark** fix bug of not closing HTTP request to Quark server while user end has closed connection to alist
## Crypt, a transparent Encrypt/Decrypt Driver. (Rclone Crypt compatible)
e.g.
Crypt mount path -> /vault
Crypt remote path -> /ali/encrypted
Aliyun mount paht -> /ali
when the user uploads a.jpg to /vault, the data will be encrypted and saved to /ali/encrypted/xxxxx. And when the user wants to access a.jpg, it's automatically decrypted, and the user can do anything with it.
Since it's Rclone Crypt compatible, users can download /ali/encrypted/xxxxx and decrypt it with rclone crypt tool. Or the user can mount this folder using rclone, then mount the decrypted folder in Linux...
NB. Some breaking changes is made to make it follow global standard, e.g. processing the HTTP header properly.
close #4679
close #4827
Co-authored-by: Sean He <866155+seanhe26@users.noreply.github.com>
Co-authored-by: Andy Hsu <i@nn.ci>
2023-08-02 06:40:36 +00:00
|
|
|
if i > 0 {
|
|
|
|
log.Println("retrying after error:", err)
|
|
|
|
time.Sleep(sleep)
|
|
|
|
sleep *= 2
|
|
|
|
}
|
|
|
|
err = f()
|
|
|
|
if err == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return fmt.Errorf("after %d attempts, last error: %s", attempts, err)
|
|
|
|
}
|
2023-08-04 07:29:54 +00:00
|
|
|
|
2023-08-27 13:14:23 +00:00
|
|
|
type ClosersIF interface {
|
|
|
|
io.Closer
|
|
|
|
Add(closer io.Closer)
|
|
|
|
AddClosers(closers Closers)
|
|
|
|
GetClosers() Closers
|
|
|
|
}
|
|
|
|
|
2023-08-04 07:29:54 +00:00
|
|
|
type Closers struct {
|
2023-08-27 13:14:23 +00:00
|
|
|
closers []io.Closer
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Closers) GetClosers() Closers {
|
|
|
|
return *c
|
2023-08-04 07:29:54 +00:00
|
|
|
}
|
|
|
|
|
2023-08-27 13:14:23 +00:00
|
|
|
var _ ClosersIF = (*Closers)(nil)
|
|
|
|
|
|
|
|
func (c *Closers) Close() error {
|
|
|
|
var errs []error
|
2023-08-04 07:29:54 +00:00
|
|
|
for _, closer := range c.closers {
|
|
|
|
if closer != nil {
|
2023-08-27 13:14:23 +00:00
|
|
|
errs = append(errs, closer.Close())
|
2023-08-04 07:29:54 +00:00
|
|
|
}
|
|
|
|
}
|
2023-08-27 13:14:23 +00:00
|
|
|
return errors.Join(errs...)
|
2023-08-04 07:29:54 +00:00
|
|
|
}
|
|
|
|
func (c *Closers) Add(closer io.Closer) {
|
2023-08-27 13:14:23 +00:00
|
|
|
c.closers = append(c.closers, closer)
|
|
|
|
|
|
|
|
}
|
|
|
|
func (c *Closers) AddClosers(closers Closers) {
|
|
|
|
c.closers = append(c.closers, closers.closers...)
|
|
|
|
}
|
|
|
|
|
|
|
|
func EmptyClosers() Closers {
|
|
|
|
return Closers{[]io.Closer{}}
|
|
|
|
}
|
|
|
|
func NewClosers(c ...io.Closer) Closers {
|
|
|
|
return Closers{c}
|
|
|
|
}
|
|
|
|
|
|
|
|
func Min[T constraints.Ordered](a, b T) T {
|
|
|
|
if a < b {
|
|
|
|
return a
|
2023-08-04 07:29:54 +00:00
|
|
|
}
|
2023-08-27 13:14:23 +00:00
|
|
|
return b
|
2023-08-04 07:29:54 +00:00
|
|
|
}
|
2023-08-27 13:14:23 +00:00
|
|
|
func Max[T constraints.Ordered](a, b T) T {
|
|
|
|
if a < b {
|
|
|
|
return b
|
|
|
|
}
|
|
|
|
return a
|
2023-08-04 07:29:54 +00:00
|
|
|
}
|
2024-04-25 12:11:15 +00:00
|
|
|
|
|
|
|
var IoBuffPool = &sync.Pool{
|
|
|
|
New: func() interface{} {
|
|
|
|
return make([]byte, 32*1024*2) // Two times of size in io package
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
func CopyWithBuffer(dst io.Writer, src io.Reader) (written int64, err error) {
|
|
|
|
buff := IoBuffPool.Get().([]byte)
|
|
|
|
defer IoBuffPool.Put(buff)
|
|
|
|
written, err = io.CopyBuffer(dst, src, buff)
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return written, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func CopyWithBufferN(dst io.Writer, src io.Reader, n int64) (written int64, err error) {
|
|
|
|
written, err = CopyWithBuffer(dst, io.LimitReader(src, n))
|
|
|
|
if written == n {
|
|
|
|
return n, nil
|
|
|
|
}
|
|
|
|
if written < n && err == nil {
|
|
|
|
// src stopped early; must have been EOF.
|
|
|
|
err = io.EOF
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|