2017-03-29 21:58:25 +00:00
|
|
|
package swift
|
|
|
|
|
|
|
|
import (
|
2017-06-03 15:39:57 +00:00
|
|
|
"context"
|
2020-12-19 11:49:58 +00:00
|
|
|
"crypto/md5"
|
|
|
|
"encoding/hex"
|
2017-05-01 08:13:03 +00:00
|
|
|
"fmt"
|
2020-12-19 11:39:48 +00:00
|
|
|
"hash"
|
2017-03-29 21:58:25 +00:00
|
|
|
"io"
|
2017-05-01 08:13:03 +00:00
|
|
|
"net/http"
|
2017-03-29 21:58:25 +00:00
|
|
|
"path"
|
2020-12-18 22:38:09 +00:00
|
|
|
"strconv"
|
2017-03-29 21:58:25 +00:00
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2023-10-01 09:40:12 +00:00
|
|
|
"github.com/restic/restic/internal/backend"
|
2022-10-15 14:23:39 +00:00
|
|
|
"github.com/restic/restic/internal/backend/layout"
|
2023-06-08 11:04:34 +00:00
|
|
|
"github.com/restic/restic/internal/backend/location"
|
2023-10-01 08:24:33 +00:00
|
|
|
"github.com/restic/restic/internal/backend/util"
|
2017-07-23 12:21:03 +00:00
|
|
|
"github.com/restic/restic/internal/debug"
|
|
|
|
"github.com/restic/restic/internal/errors"
|
2024-05-12 09:55:34 +00:00
|
|
|
"github.com/restic/restic/internal/feature"
|
2017-07-23 12:21:03 +00:00
|
|
|
|
2021-04-09 09:24:28 +00:00
|
|
|
"github.com/ncw/swift/v2"
|
2017-03-29 21:58:25 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// beSwift is a backend which stores the data on a swift endpoint.
|
|
|
|
type beSwift struct {
|
2021-08-07 20:20:49 +00:00
|
|
|
conn *swift.Connection
|
|
|
|
connections uint
|
|
|
|
container string // Container name
|
|
|
|
prefix string // Prefix of object names in the container
|
2022-10-15 14:23:39 +00:00
|
|
|
layout.Layout
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
2023-10-01 09:40:12 +00:00
|
|
|
// ensure statically that *beSwift implements backend.Backend.
|
|
|
|
var _ backend.Backend = &beSwift{}
|
2017-06-03 15:39:57 +00:00
|
|
|
|
2023-06-08 11:04:34 +00:00
|
|
|
func NewFactory() location.Factory {
|
2023-06-08 15:32:43 +00:00
|
|
|
return location.NewHTTPBackendFactory("swift", ParseConfig, location.NoPassword, Open, Open)
|
2023-06-08 11:04:34 +00:00
|
|
|
}
|
|
|
|
|
2017-03-29 21:58:25 +00:00
|
|
|
// Open opens the swift backend at a container in region. The container is
|
|
|
|
// created if it does not exist yet.
|
2023-10-01 09:40:12 +00:00
|
|
|
func Open(ctx context.Context, cfg Config, rt http.RoundTripper) (backend.Backend, error) {
|
2017-05-01 08:13:03 +00:00
|
|
|
debug.Log("config %#v", cfg)
|
2017-03-29 21:58:25 +00:00
|
|
|
|
|
|
|
be := &beSwift{
|
|
|
|
conn: &swift.Connection{
|
2019-01-29 16:06:20 +00:00
|
|
|
UserName: cfg.UserName,
|
2020-12-11 18:09:32 +00:00
|
|
|
UserId: cfg.UserID,
|
2019-01-29 16:06:20 +00:00
|
|
|
Domain: cfg.Domain,
|
2020-12-11 18:09:32 +00:00
|
|
|
DomainId: cfg.DomainID,
|
2019-01-29 16:06:20 +00:00
|
|
|
ApiKey: cfg.APIKey,
|
|
|
|
AuthUrl: cfg.AuthURL,
|
|
|
|
Region: cfg.Region,
|
|
|
|
Tenant: cfg.Tenant,
|
|
|
|
TenantId: cfg.TenantID,
|
|
|
|
TenantDomain: cfg.TenantDomain,
|
2020-12-11 18:09:32 +00:00
|
|
|
TenantDomainId: cfg.TenantDomainID,
|
2019-01-29 16:06:20 +00:00
|
|
|
TrustId: cfg.TrustID,
|
|
|
|
StorageUrl: cfg.StorageURL,
|
2021-08-04 20:56:18 +00:00
|
|
|
AuthToken: cfg.AuthToken.Unwrap(),
|
2019-01-29 16:06:20 +00:00
|
|
|
ApplicationCredentialId: cfg.ApplicationCredentialID,
|
|
|
|
ApplicationCredentialName: cfg.ApplicationCredentialName,
|
2021-08-04 20:56:18 +00:00
|
|
|
ApplicationCredentialSecret: cfg.ApplicationCredentialSecret.Unwrap(),
|
2019-01-29 16:06:20 +00:00
|
|
|
ConnectTimeout: time.Minute,
|
|
|
|
Timeout: time.Minute,
|
2017-05-01 08:13:03 +00:00
|
|
|
|
2017-09-24 18:04:23 +00:00
|
|
|
Transport: rt,
|
2017-03-29 21:58:25 +00:00
|
|
|
},
|
2021-08-07 20:20:49 +00:00
|
|
|
connections: cfg.Connections,
|
|
|
|
container: cfg.Container,
|
|
|
|
prefix: cfg.Prefix,
|
2022-10-15 14:23:39 +00:00
|
|
|
Layout: &layout.DefaultLayout{
|
2017-05-01 08:13:03 +00:00
|
|
|
Path: cfg.Prefix,
|
|
|
|
Join: path.Join,
|
|
|
|
},
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Authenticate if needed
|
|
|
|
if !be.conn.Authenticated() {
|
2021-04-09 09:24:28 +00:00
|
|
|
if err := be.conn.Authenticate(ctx); err != nil {
|
2017-03-29 21:58:25 +00:00
|
|
|
return nil, errors.Wrap(err, "conn.Authenticate")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure container exists
|
2021-04-09 09:24:28 +00:00
|
|
|
switch _, _, err := be.conn.Container(ctx, be.container); err {
|
2017-03-29 21:58:25 +00:00
|
|
|
case nil:
|
|
|
|
// Container exists
|
|
|
|
|
|
|
|
case swift.ContainerNotFound:
|
2021-04-09 09:24:28 +00:00
|
|
|
err = be.createContainer(ctx, cfg.DefaultContainerPolicy)
|
2017-03-29 21:58:25 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "beSwift.createContainer")
|
|
|
|
}
|
|
|
|
|
|
|
|
default:
|
|
|
|
return nil, errors.Wrap(err, "conn.Container")
|
|
|
|
}
|
|
|
|
|
2017-05-01 08:13:03 +00:00
|
|
|
return be, nil
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
2021-04-09 09:24:28 +00:00
|
|
|
func (be *beSwift) createContainer(ctx context.Context, policy string) error {
|
2017-03-29 21:58:25 +00:00
|
|
|
var h swift.Headers
|
|
|
|
if policy != "" {
|
|
|
|
h = swift.Headers{
|
|
|
|
"X-Storage-Policy": policy,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-09 09:24:28 +00:00
|
|
|
return be.conn.ContainerCreate(ctx, be.container, h)
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
2021-08-07 20:20:49 +00:00
|
|
|
func (be *beSwift) Connections() uint {
|
|
|
|
return be.connections
|
|
|
|
}
|
|
|
|
|
2020-12-19 11:39:48 +00:00
|
|
|
// Hasher may return a hash function for calculating a content hash for the backend
|
|
|
|
func (be *beSwift) Hasher() hash.Hash {
|
2020-12-19 11:49:58 +00:00
|
|
|
return md5.New()
|
2020-12-19 11:39:48 +00:00
|
|
|
}
|
|
|
|
|
2022-05-01 18:07:29 +00:00
|
|
|
// HasAtomicReplace returns whether Save() can atomically replace files
|
|
|
|
func (be *beSwift) HasAtomicReplace() bool {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2018-01-17 04:59:16 +00:00
|
|
|
// Load runs fn with a reader that yields the contents of the file at h at the
|
|
|
|
// given offset.
|
2023-10-01 09:40:12 +00:00
|
|
|
func (be *beSwift) Load(ctx context.Context, h backend.Handle, length int, offset int64, fn func(rd io.Reader) error) error {
|
2023-10-01 08:24:33 +00:00
|
|
|
return util.DefaultLoad(ctx, h, length, offset, be.openReader, fn)
|
2018-01-17 04:59:16 +00:00
|
|
|
}
|
|
|
|
|
2023-10-01 09:40:12 +00:00
|
|
|
func (be *beSwift) openReader(ctx context.Context, h backend.Handle, length int, offset int64) (io.ReadCloser, error) {
|
2017-03-29 21:58:25 +00:00
|
|
|
|
2017-05-01 08:13:03 +00:00
|
|
|
objName := be.Filename(h)
|
2017-03-29 21:58:25 +00:00
|
|
|
|
2017-05-01 08:13:03 +00:00
|
|
|
headers := swift.Headers{}
|
|
|
|
if offset > 0 {
|
|
|
|
headers["Range"] = fmt.Sprintf("bytes=%d-", offset)
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
2017-05-01 08:13:03 +00:00
|
|
|
if length > 0 {
|
|
|
|
headers["Range"] = fmt.Sprintf("bytes=%d-%d", offset, offset+int64(length)-1)
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
2021-04-09 09:24:28 +00:00
|
|
|
obj, _, err := be.conn.ObjectOpen(ctx, be.container, objName, false, headers)
|
2017-03-29 21:58:25 +00:00
|
|
|
if err != nil {
|
2024-05-10 22:11:23 +00:00
|
|
|
return nil, fmt.Errorf("conn.ObjectOpen: %w", err)
|
|
|
|
}
|
|
|
|
|
2024-05-12 09:55:34 +00:00
|
|
|
if feature.Flag.Enabled(feature.BackendErrorRedesign) && length > 0 {
|
2024-05-10 22:11:23 +00:00
|
|
|
// get response length, but don't cause backend calls
|
|
|
|
cctx, cancel := context.WithCancel(context.Background())
|
|
|
|
cancel()
|
|
|
|
objLength, e := obj.Length(cctx)
|
|
|
|
if e == nil && objLength != int64(length) {
|
|
|
|
_ = obj.Close()
|
|
|
|
return nil, &swift.Error{StatusCode: http.StatusRequestedRangeNotSatisfiable, Text: "restic-file-too-short"}
|
|
|
|
}
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
2023-04-07 21:02:35 +00:00
|
|
|
return obj, nil
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Save stores data in the backend at the handle.
|
2023-10-01 09:40:12 +00:00
|
|
|
func (be *beSwift) Save(ctx context.Context, h backend.Handle, rd backend.RewindReader) error {
|
2017-05-01 08:13:03 +00:00
|
|
|
objName := be.Filename(h)
|
2017-03-29 21:58:25 +00:00
|
|
|
encoding := "binary/octet-stream"
|
|
|
|
|
2020-12-18 22:38:09 +00:00
|
|
|
hdr := swift.Headers{"Content-Length": strconv.FormatInt(rd.Length(), 10)}
|
2021-04-09 09:24:28 +00:00
|
|
|
_, err := be.conn.ObjectPut(ctx,
|
|
|
|
be.container, objName, rd, true, hex.EncodeToString(rd.Hash()),
|
|
|
|
encoding, hdr)
|
2020-12-18 22:38:09 +00:00
|
|
|
// swift does not return the upload length
|
2017-03-29 21:58:25 +00:00
|
|
|
|
|
|
|
return errors.Wrap(err, "client.PutObject")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stat returns information about a blob.
|
2023-10-01 09:40:12 +00:00
|
|
|
func (be *beSwift) Stat(ctx context.Context, h backend.Handle) (bi backend.FileInfo, err error) {
|
2017-05-01 08:13:03 +00:00
|
|
|
objName := be.Filename(h)
|
2017-03-29 21:58:25 +00:00
|
|
|
|
2021-04-09 09:24:28 +00:00
|
|
|
obj, _, err := be.conn.Object(ctx, be.container, objName)
|
2017-03-29 21:58:25 +00:00
|
|
|
if err != nil {
|
2023-10-01 09:40:12 +00:00
|
|
|
return backend.FileInfo{}, errors.Wrap(err, "conn.Object")
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
2023-10-01 09:40:12 +00:00
|
|
|
return backend.FileInfo{Size: obj.Bytes, Name: h.Name}, nil
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Remove removes the blob with the given name and type.
|
2023-10-01 09:40:12 +00:00
|
|
|
func (be *beSwift) Remove(ctx context.Context, h backend.Handle) error {
|
2017-05-01 08:13:03 +00:00
|
|
|
objName := be.Filename(h)
|
2017-11-02 22:29:32 +00:00
|
|
|
|
2021-04-09 09:24:28 +00:00
|
|
|
err := be.conn.ObjectDelete(ctx, be.container, objName)
|
2017-03-29 21:58:25 +00:00
|
|
|
return errors.Wrap(err, "conn.ObjectDelete")
|
|
|
|
}
|
|
|
|
|
2018-01-20 18:34:38 +00:00
|
|
|
// List runs fn for each file in the backend which has the type t. When an
|
|
|
|
// error occurs (or fn returns an error), List stops and returns it.
|
2023-10-01 09:40:12 +00:00
|
|
|
func (be *beSwift) List(ctx context.Context, t backend.FileType, fn func(backend.FileInfo) error) error {
|
2017-12-14 18:13:01 +00:00
|
|
|
prefix, _ := be.Basedir(t)
|
|
|
|
prefix += "/"
|
2017-03-29 21:58:25 +00:00
|
|
|
|
2021-04-09 09:24:28 +00:00
|
|
|
err := be.conn.ObjectsWalk(ctx, be.container, &swift.ObjectsOpts{Prefix: prefix},
|
|
|
|
func(ctx context.Context, opts *swift.ObjectsOpts) (interface{}, error) {
|
|
|
|
newObjects, err := be.conn.Objects(ctx, be.container, opts)
|
2018-01-20 18:34:38 +00:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "conn.ObjectNames")
|
|
|
|
}
|
|
|
|
for _, obj := range newObjects {
|
|
|
|
m := path.Base(strings.TrimPrefix(obj.Name, prefix))
|
|
|
|
if m == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-10-01 09:40:12 +00:00
|
|
|
fi := backend.FileInfo{
|
2018-01-20 18:34:38 +00:00
|
|
|
Name: m,
|
|
|
|
Size: obj.Bytes,
|
|
|
|
}
|
2017-03-29 21:58:25 +00:00
|
|
|
|
2018-01-20 18:34:38 +00:00
|
|
|
err := fn(fi)
|
2017-03-29 21:58:25 +00:00
|
|
|
if err != nil {
|
2018-01-20 18:34:38 +00:00
|
|
|
return nil, err
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
2021-09-24 19:19:46 +00:00
|
|
|
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
return nil, ctx.Err()
|
|
|
|
}
|
2018-01-20 18:34:38 +00:00
|
|
|
}
|
|
|
|
return newObjects, nil
|
|
|
|
})
|
2017-05-01 08:13:03 +00:00
|
|
|
|
2018-01-20 18:34:38 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-03-29 21:58:25 +00:00
|
|
|
|
2018-01-20 18:34:38 +00:00
|
|
|
return ctx.Err()
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
2017-05-01 08:13:03 +00:00
|
|
|
// IsNotExist returns true if the error is caused by a not existing file.
|
|
|
|
func (be *beSwift) IsNotExist(err error) bool {
|
2022-06-13 18:35:37 +00:00
|
|
|
var e *swift.Error
|
|
|
|
return errors.As(err, &e) && e.StatusCode == http.StatusNotFound
|
2017-05-01 08:13:03 +00:00
|
|
|
}
|
|
|
|
|
2024-05-10 22:11:23 +00:00
|
|
|
func (be *beSwift) IsPermanentError(err error) bool {
|
|
|
|
if be.IsNotExist(err) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
var serr *swift.Error
|
|
|
|
if errors.As(err, &serr) {
|
|
|
|
if serr.StatusCode == http.StatusRequestedRangeNotSatisfiable || serr.StatusCode == http.StatusUnauthorized || serr.StatusCode == http.StatusForbidden {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2017-03-29 21:58:25 +00:00
|
|
|
// Delete removes all restic objects in the container.
|
|
|
|
// It will not remove the container itself.
|
2017-06-03 15:39:57 +00:00
|
|
|
func (be *beSwift) Delete(ctx context.Context) error {
|
2023-10-01 08:24:33 +00:00
|
|
|
return util.DefaultDelete(ctx, be)
|
2017-03-29 21:58:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Close does nothing
|
|
|
|
func (be *beSwift) Close() error { return nil }
|