alist/pkg/utils
Sean 3c21a9a520
feat: Crypt driver, improve http/webdav handling (#4884)
this PR has several enhancements, fixes, and features:
- [x] Crypt: a transparent encryption driver. Anyone can easily, and safely store encrypted data on the remote storage provider.  Consider your data is safely stored in the safe, and the storage provider can only see the safe, but not your data.
  - [x] Optional: compatible with [Rclone Crypt](https://rclone.org/crypt/). More ways to manipulate the encrypted data.
  - [x] directory and filename encryption
  - [x] server-side encryption mode (server encrypts & decrypts all data, all data flows thru the server)
- [x] obfuscate sensitive information internally
- [x] introduced a server memory-cached multi-thread downloader.
  - [x] Driver: **Quark** enabled this feature, faster load in any single thread scenario. e.g. media player directly playing from the link, now it's faster.
- [x] general improvement on HTTP/WebDAV stream processing & header handling & response handling
  - [x] Driver: **Mega** driver support ranged http header
  - [x] Driver: **Quark** fix bug of not closing HTTP request to Quark server while user end has closed connection to alist

## Crypt, a transparent Encrypt/Decrypt Driver. (Rclone Crypt compatible)

e.g.  
Crypt mount path ->  /vault 
Crypt remote path -> /ali/encrypted
Aliyun mount paht -> /ali

when the user uploads a.jpg to /vault, the data will be encrypted and saved to /ali/encrypted/xxxxx. And when the user wants to access a.jpg,  it's automatically decrypted, and the user can do anything with it.
Since it's Rclone Crypt compatible, users can download /ali/encrypted/xxxxx  and decrypt it with rclone crypt tool. Or the user can mount this folder using rclone, then mount the decrypted folder in Linux...

NB.  Some breaking changes is made to make it follow global standard, e.g. processing the HTTP header properly.

close #4679 
close #4827 

Co-authored-by: Sean He <866155+seanhe26@users.noreply.github.com>
Co-authored-by: Andy Hsu <i@nn.ci>
2023-08-02 14:40:36 +08:00
..
random fix: use `utils.Log` in some places 2022-08-30 16:13:01 +08:00
balance.go fix(search): empty parent where update (close #2810) 2023-01-16 17:33:24 +08:00
bool.go feat: optimize file operation interface (#2757) 2022-12-20 15:02:40 +08:00
ctx.go feat: cancel copy for upload 2022-06-25 15:14:03 +08:00
email.go feat(123): support mail login (close #2218 pr #2276) 2022-11-10 09:34:48 +08:00
file.go fix(fs): copy file if symlink failed (#3368) 2023-02-13 14:41:35 +08:00
hash.go refactor: change hash function 2023-07-15 16:29:44 +08:00
io.go feat: Crypt driver, improve http/webdav handling (#4884) 2023-08-02 14:40:36 +08:00
ip.go fix(123): pass ip when getting download link 2022-09-10 13:54:10 +08:00
json.go fix(ci): sort lang json file 2022-12-05 14:40:46 +08:00
log.go feat: use `lumberjack` for log rotate 2022-08-30 15:22:54 +08:00
map.go feat: add `139yun` driver 2022-09-05 13:35:01 +08:00
path.go fix: judge can proxy with ext (close #4688) 2023-07-03 20:41:37 +08:00
path_test.go refactor: obj name mapping and internal path processing (#2733) 2022-12-17 19:49:05 +08:00
slice.go feat: add Dropbox driver (#4639 close #4590) 2023-06-23 17:36:40 +08:00
str.go fix: mapping filename in `GetName` 2022-11-30 20:46:54 +08:00
time.go perf(lanzou): optimize the use of list cache (#2956) 2023-01-08 21:31:35 +08:00
url.go fix: different url encoding (close #3423) 2023-02-15 16:20:30 +08:00