If an object is within a folder the object downloaded now only has the object's name. Also, it now supports object version downloading.
614 lines
20 KiB
Go
614 lines
20 KiB
Go
// This file is part of MinIO Console Server
|
|
// Copyright (c) 2020 MinIO, Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package restapi
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"log"
|
|
"net/http"
|
|
"path/filepath"
|
|
"regexp"
|
|
"strings"
|
|
"time"
|
|
|
|
"errors"
|
|
|
|
"github.com/go-openapi/runtime"
|
|
"github.com/go-openapi/runtime/middleware"
|
|
"github.com/minio/console/models"
|
|
"github.com/minio/console/restapi/operations"
|
|
"github.com/minio/console/restapi/operations/user_api"
|
|
mc "github.com/minio/mc/cmd"
|
|
"github.com/minio/mc/pkg/probe"
|
|
"github.com/minio/minio-go/v7"
|
|
"github.com/minio/minio-go/v7/pkg/tags"
|
|
)
|
|
|
|
// enum types
|
|
const (
|
|
objectStorage = iota // MinIO and S3 compatible cloud storage
|
|
fileSystem // POSIX compatible file systems
|
|
)
|
|
|
|
func registerObjectsHandlers(api *operations.ConsoleAPI) {
|
|
// list objects
|
|
api.UserAPIListObjectsHandler = user_api.ListObjectsHandlerFunc(func(params user_api.ListObjectsParams, session *models.Principal) middleware.Responder {
|
|
resp, err := getListObjectsResponse(session, params)
|
|
if err != nil {
|
|
return user_api.NewListObjectsDefault(int(err.Code)).WithPayload(err)
|
|
}
|
|
return user_api.NewListObjectsOK().WithPayload(resp)
|
|
})
|
|
// delete object
|
|
api.UserAPIDeleteObjectHandler = user_api.DeleteObjectHandlerFunc(func(params user_api.DeleteObjectParams, session *models.Principal) middleware.Responder {
|
|
if err := getDeleteObjectResponse(session, params); err != nil {
|
|
return user_api.NewDeleteObjectDefault(int(err.Code)).WithPayload(err)
|
|
}
|
|
return user_api.NewDeleteObjectOK()
|
|
})
|
|
// download object
|
|
api.UserAPIDownloadObjectHandler = user_api.DownloadObjectHandlerFunc(func(params user_api.DownloadObjectParams, session *models.Principal) middleware.Responder {
|
|
resp, err := getDownloadObjectResponse(session, params)
|
|
if err != nil {
|
|
return user_api.NewDownloadObjectDefault(int(err.Code)).WithPayload(err)
|
|
}
|
|
return middleware.ResponderFunc(func(rw http.ResponseWriter, _ runtime.Producer) {
|
|
if _, err := io.Copy(rw, resp); err != nil {
|
|
log.Println(err)
|
|
} else {
|
|
if err := resp.Close(); err != nil {
|
|
log.Println(err)
|
|
}
|
|
}
|
|
})
|
|
})
|
|
// upload object
|
|
api.UserAPIPostBucketsBucketNameObjectsUploadHandler = user_api.PostBucketsBucketNameObjectsUploadHandlerFunc(func(params user_api.PostBucketsBucketNameObjectsUploadParams, session *models.Principal) middleware.Responder {
|
|
if err := getUploadObjectResponse(session, params); err != nil {
|
|
return user_api.NewPostBucketsBucketNameObjectsUploadDefault(int(err.Code)).WithPayload(err)
|
|
}
|
|
return user_api.NewPostBucketsBucketNameObjectsUploadOK()
|
|
})
|
|
// get share object url
|
|
api.UserAPIShareObjectHandler = user_api.ShareObjectHandlerFunc(func(params user_api.ShareObjectParams, session *models.Principal) middleware.Responder {
|
|
resp, err := getShareObjectResponse(session, params)
|
|
if err != nil {
|
|
return user_api.NewShareObjectDefault(int(err.Code)).WithPayload(err)
|
|
}
|
|
return user_api.NewShareObjectOK().WithPayload(*resp)
|
|
})
|
|
// set object legalhold status
|
|
api.UserAPIPutObjectLegalHoldHandler = user_api.PutObjectLegalHoldHandlerFunc(func(params user_api.PutObjectLegalHoldParams, session *models.Principal) middleware.Responder {
|
|
if err := getSetObjectLegalHoldResponse(session, params); err != nil {
|
|
return user_api.NewPutObjectLegalHoldDefault(int(err.Code)).WithPayload(err)
|
|
}
|
|
return user_api.NewPutObjectLegalHoldOK()
|
|
})
|
|
// set object retention
|
|
api.UserAPIPutObjectRetentionHandler = user_api.PutObjectRetentionHandlerFunc(func(params user_api.PutObjectRetentionParams, session *models.Principal) middleware.Responder {
|
|
if err := getSetObjectRetentionResponse(session, params); err != nil {
|
|
return user_api.NewPutObjectRetentionDefault(int(err.Code)).WithPayload(err)
|
|
}
|
|
return user_api.NewPutObjectRetentionOK()
|
|
})
|
|
api.UserAPIPutObjectTagsHandler = user_api.PutObjectTagsHandlerFunc(func(params user_api.PutObjectTagsParams, session *models.Principal) middleware.Responder {
|
|
if err := getPutObjectTagsResponse(session, params); err != nil {
|
|
return user_api.NewPutObjectTagsDefault(int(err.Code)).WithPayload(err)
|
|
}
|
|
return user_api.NewPutObjectTagsOK()
|
|
})
|
|
}
|
|
|
|
// getListObjectsResponse returns a list of objects
|
|
func getListObjectsResponse(session *models.Principal, params user_api.ListObjectsParams) (*models.ListObjectsResponse, *models.Error) {
|
|
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
|
|
defer cancel()
|
|
var prefix string
|
|
var recursive bool
|
|
var withVersions bool
|
|
if params.Prefix != nil {
|
|
prefix = *params.Prefix
|
|
}
|
|
if params.Recursive != nil {
|
|
recursive = *params.Recursive
|
|
}
|
|
if params.WithVersions != nil {
|
|
withVersions = *params.WithVersions
|
|
}
|
|
// bucket request needed to proceed
|
|
if params.BucketName == "" {
|
|
return nil, prepareError(errBucketNameNotInRequest)
|
|
}
|
|
mClient, err := newMinioClient(session)
|
|
if err != nil {
|
|
return nil, prepareError(err)
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
minioClient := minioClient{client: mClient}
|
|
|
|
objs, err := listBucketObjects(ctx, minioClient, params.BucketName, prefix, recursive, withVersions)
|
|
if err != nil {
|
|
return nil, prepareError(err)
|
|
}
|
|
|
|
resp := &models.ListObjectsResponse{
|
|
Objects: objs,
|
|
Total: int64(len(objs)),
|
|
}
|
|
return resp, nil
|
|
}
|
|
|
|
// listBucketObjects gets an array of objects in a bucket
|
|
func listBucketObjects(ctx context.Context, client MinioClient, bucketName string, prefix string, recursive, withVersions bool) ([]*models.BucketObject, error) {
|
|
var objects []*models.BucketObject
|
|
for lsObj := range client.listObjects(ctx, bucketName, minio.ListObjectsOptions{Prefix: prefix, Recursive: recursive, WithVersions: withVersions}) {
|
|
if lsObj.Err != nil {
|
|
return nil, lsObj.Err
|
|
}
|
|
obj := &models.BucketObject{
|
|
Name: lsObj.Key,
|
|
Size: lsObj.Size,
|
|
LastModified: lsObj.LastModified.String(),
|
|
ContentType: lsObj.ContentType,
|
|
VersionID: lsObj.VersionID,
|
|
IsLatest: lsObj.IsLatest,
|
|
IsDeleteMarker: lsObj.IsDeleteMarker,
|
|
UserTags: lsObj.UserTags,
|
|
}
|
|
// only if single object with or without versions; get legalhold, retention and tags
|
|
if !lsObj.IsDeleteMarker && prefix != "" && !strings.HasSuffix(prefix, "/") {
|
|
// Add Legal Hold Status if available
|
|
legalHoldStatus, err := client.getObjectLegalHold(ctx, bucketName, lsObj.Key, minio.GetObjectLegalHoldOptions{VersionID: lsObj.VersionID})
|
|
if err != nil {
|
|
errResp := minio.ToErrorResponse(probe.NewError(err).ToGoError())
|
|
if errResp.Code != "InvalidRequest" && errResp.Code != "NoSuchObjectLockConfiguration" {
|
|
log.Printf("error getting legal hold status for %s : %s", lsObj.VersionID, err)
|
|
}
|
|
} else {
|
|
if legalHoldStatus != nil {
|
|
obj.LegalHoldStatus = string(*legalHoldStatus)
|
|
}
|
|
}
|
|
// Add Retention Status if available
|
|
retention, retUntilDate, err := client.getObjectRetention(ctx, bucketName, lsObj.Key, lsObj.VersionID)
|
|
if err != nil {
|
|
errResp := minio.ToErrorResponse(probe.NewError(err).ToGoError())
|
|
if errResp.Code != "NoSuchObjectLockConfiguration" {
|
|
log.Printf("error getting retention status for %s : %s", lsObj.VersionID, err)
|
|
}
|
|
} else {
|
|
if retention != nil && retUntilDate != nil {
|
|
date := *retUntilDate
|
|
obj.RetentionMode = string(*retention)
|
|
obj.RetentionUntilDate = date.String()
|
|
}
|
|
}
|
|
tags, err := client.getObjectTagging(ctx, bucketName, lsObj.Key, minio.GetObjectTaggingOptions{VersionID: lsObj.VersionID})
|
|
if err != nil {
|
|
log.Printf("error getting object tags for %s : %s", lsObj.VersionID, err)
|
|
} else {
|
|
obj.Tags = tags.ToMap()
|
|
}
|
|
}
|
|
objects = append(objects, obj)
|
|
}
|
|
return objects, nil
|
|
}
|
|
|
|
func getDownloadObjectResponse(session *models.Principal, params user_api.DownloadObjectParams) (io.ReadCloser, *models.Error) {
|
|
ctx := context.Background()
|
|
s3Client, err := newS3BucketClient(session, params.BucketName, params.Prefix)
|
|
if err != nil {
|
|
return nil, prepareError(err)
|
|
}
|
|
// create a mc S3Client interface implementation
|
|
// defining the client to be used
|
|
mcClient := mcClient{client: s3Client}
|
|
object, err := downloadObject(ctx, mcClient, params.VersionID)
|
|
if err != nil {
|
|
return nil, prepareError(err)
|
|
}
|
|
return object, nil
|
|
}
|
|
|
|
func downloadObject(ctx context.Context, client MCClient, versionID *string) (io.ReadCloser, error) {
|
|
// TODO: handle encripted files
|
|
var reader io.ReadCloser
|
|
var version string
|
|
if versionID != nil {
|
|
version = *versionID
|
|
}
|
|
reader, pErr := client.get(ctx, mc.GetOptions{VersionID: version})
|
|
if pErr != nil {
|
|
return nil, pErr.Cause
|
|
}
|
|
return reader, nil
|
|
}
|
|
|
|
// getDeleteObjectResponse returns whether there was an error on deletion of object
|
|
func getDeleteObjectResponse(session *models.Principal, params user_api.DeleteObjectParams) *models.Error {
|
|
ctx := context.Background()
|
|
s3Client, err := newS3BucketClient(session, params.BucketName, params.Path)
|
|
if err != nil {
|
|
return prepareError(err)
|
|
}
|
|
// create a mc S3Client interface implementation
|
|
// defining the client to be used
|
|
mcClient := mcClient{client: s3Client}
|
|
var rec bool
|
|
var version string
|
|
if params.Recursive != nil {
|
|
rec = *params.Recursive
|
|
}
|
|
if params.VersionID != nil {
|
|
version = *params.VersionID
|
|
}
|
|
err = deleteObjects(ctx, mcClient, params.BucketName, params.Path, version, rec)
|
|
if err != nil {
|
|
return prepareError(err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// deleteObjects deletes either a single object or multiple objects based on recursive flag
|
|
func deleteObjects(ctx context.Context, client MCClient, bucket, path string, versionID string, recursive bool) error {
|
|
if recursive {
|
|
if err := deleteMultipleObjects(ctx, client, recursive); err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
if err := deleteSingleObject(ctx, client, bucket, path, versionID); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// deleteMultipleObjects uses listing before removal, it can list recursively or not,
|
|
// Use cases:
|
|
// * Remove objects recursively
|
|
func deleteMultipleObjects(ctx context.Context, client MCClient, recursive bool) error {
|
|
isRemoveBucket := false
|
|
isIncomplete := false
|
|
isBypass := false
|
|
listOpts := mc.ListOptions{Recursive: recursive, Incomplete: isIncomplete, ShowDir: mc.DirNone}
|
|
// TODO: support older Versions
|
|
contentCh := make(chan *mc.ClientContent, 1)
|
|
|
|
errorCh := client.remove(ctx, isIncomplete, isRemoveBucket, isBypass, contentCh)
|
|
OUTER_LOOP:
|
|
for content := range client.list(ctx, listOpts) {
|
|
if content.Err != nil {
|
|
switch content.Err.ToGoError().(type) {
|
|
// ignore same as mc
|
|
case mc.PathInsufficientPermission:
|
|
// Ignore Permission error.
|
|
continue
|
|
}
|
|
close(contentCh)
|
|
return content.Err.Cause
|
|
}
|
|
sent := false
|
|
for !sent {
|
|
select {
|
|
case contentCh <- content:
|
|
sent = true
|
|
case pErr := <-errorCh:
|
|
if pErr != nil {
|
|
switch pErr.ToGoError().(type) {
|
|
// ignore same as mc
|
|
case mc.PathInsufficientPermission:
|
|
// Ignore Permission error.
|
|
continue
|
|
}
|
|
close(contentCh)
|
|
return pErr.Cause
|
|
}
|
|
break OUTER_LOOP
|
|
}
|
|
}
|
|
}
|
|
close(contentCh)
|
|
for pErr := range errorCh {
|
|
if pErr != nil {
|
|
switch pErr.ToGoError().(type) {
|
|
// ignore same as mc
|
|
case mc.PathInsufficientPermission:
|
|
// Ignore Permission error.
|
|
continue
|
|
}
|
|
return pErr.Cause
|
|
}
|
|
}
|
|
return nil
|
|
|
|
}
|
|
|
|
func deleteSingleObject(ctx context.Context, client MCClient, bucket, object string, versionID string) error {
|
|
targetURL := fmt.Sprintf("%s/%s", bucket, object)
|
|
contentCh := make(chan *mc.ClientContent, 1)
|
|
contentCh <- &mc.ClientContent{URL: *newClientURL(targetURL), VersionID: versionID}
|
|
close(contentCh)
|
|
|
|
isRemoveBucket := false
|
|
isIncomplete := false
|
|
isBypass := false
|
|
|
|
errorCh := client.remove(ctx, isIncomplete, isRemoveBucket, isBypass, contentCh)
|
|
for pErr := range errorCh {
|
|
if pErr != nil {
|
|
switch pErr.ToGoError().(type) {
|
|
// ignore same as mc
|
|
case mc.PathInsufficientPermission:
|
|
// Ignore Permission error.
|
|
continue
|
|
}
|
|
return pErr.Cause
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func getUploadObjectResponse(session *models.Principal, params user_api.PostBucketsBucketNameObjectsUploadParams) *models.Error {
|
|
ctx := context.Background()
|
|
mClient, err := newMinioClient(session)
|
|
if err != nil {
|
|
return prepareError(err)
|
|
}
|
|
// get size from request form
|
|
var objectSize int64
|
|
if params.HTTPRequest.MultipartForm == nil {
|
|
return prepareError(errors.New("request MultipartForm is nil"))
|
|
}
|
|
if file, ok := params.HTTPRequest.MultipartForm.File["upfile"]; ok {
|
|
if len(file) > 0 {
|
|
objectSize = file[0].Size
|
|
} else {
|
|
return prepareError(errors.New("file not present in request"))
|
|
}
|
|
} else {
|
|
return prepareError(errors.New("`upfile` should be on MultipartForm.File map"))
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
minioClient := minioClient{client: mClient}
|
|
if err := uploadObject(ctx, minioClient, params.BucketName, params.Prefix, objectSize, params.Upfile); err != nil {
|
|
return prepareError(err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func uploadObject(ctx context.Context, client MinioClient, bucketName, prefix string, objectSize int64, object io.ReadCloser) error {
|
|
_, err := client.putObject(ctx, bucketName, prefix, object, objectSize, minio.PutObjectOptions{ContentType: "application/octet-stream"})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// getShareObjectResponse returns a share object url
|
|
func getShareObjectResponse(session *models.Principal, params user_api.ShareObjectParams) (*string, *models.Error) {
|
|
ctx := context.Background()
|
|
s3Client, err := newS3BucketClient(session, params.BucketName, params.Prefix)
|
|
if err != nil {
|
|
return nil, prepareError(err)
|
|
}
|
|
// create a mc S3Client interface implementation
|
|
// defining the client to be used
|
|
mcClient := mcClient{client: s3Client}
|
|
var expireDuration string
|
|
if params.Expires != nil {
|
|
expireDuration = *params.Expires
|
|
}
|
|
url, err := getShareObjectURL(ctx, mcClient, params.VersionID, expireDuration)
|
|
if err != nil {
|
|
return nil, prepareError(err)
|
|
}
|
|
return url, nil
|
|
}
|
|
|
|
func getShareObjectURL(ctx context.Context, client MCClient, versionID string, duration string) (url *string, err error) {
|
|
// default duration 7d if not defined
|
|
if strings.TrimSpace(duration) == "" {
|
|
duration = "168h"
|
|
}
|
|
|
|
expiresDuration, err := time.ParseDuration(duration)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
objURL, pErr := client.shareDownload(ctx, versionID, expiresDuration)
|
|
if pErr != nil {
|
|
return nil, pErr.Cause
|
|
}
|
|
return &objURL, nil
|
|
}
|
|
|
|
func getSetObjectLegalHoldResponse(session *models.Principal, params user_api.PutObjectLegalHoldParams) *models.Error {
|
|
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
|
|
defer cancel()
|
|
mClient, err := newMinioClient(session)
|
|
if err != nil {
|
|
return prepareError(err)
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
minioClient := minioClient{client: mClient}
|
|
err = setObjectLegalHold(ctx, minioClient, params.BucketName, params.Prefix, params.VersionID, params.Body.Status)
|
|
if err != nil {
|
|
return prepareError(err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func setObjectLegalHold(ctx context.Context, client MinioClient, bucketName, prefix, versionID string, status models.ObjectLegalHoldStatus) error {
|
|
var lstatus minio.LegalHoldStatus
|
|
if status == models.ObjectLegalHoldStatusEnabled {
|
|
lstatus = minio.LegalHoldEnabled
|
|
} else {
|
|
lstatus = minio.LegalHoldDisabled
|
|
}
|
|
return client.putObjectLegalHold(ctx, bucketName, prefix, minio.PutObjectLegalHoldOptions{VersionID: versionID, Status: &lstatus})
|
|
}
|
|
|
|
func getSetObjectRetentionResponse(session *models.Principal, params user_api.PutObjectRetentionParams) *models.Error {
|
|
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
|
|
defer cancel()
|
|
mClient, err := newMinioClient(session)
|
|
if err != nil {
|
|
return prepareError(err)
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
minioClient := minioClient{client: mClient}
|
|
err = setObjectRetention(ctx, minioClient, params.BucketName, params.Prefix, params.VersionID, params.Body)
|
|
if err != nil {
|
|
return prepareError(err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func setObjectRetention(ctx context.Context, client MinioClient, bucketName, prefix, versionID string, retentionOps *models.PutObjectRetentionRequest) error {
|
|
if retentionOps == nil {
|
|
return errors.New("object retention options can't be nil")
|
|
}
|
|
if retentionOps.Expires == nil {
|
|
return errors.New("object retention expires can't be nil")
|
|
}
|
|
var mode minio.RetentionMode
|
|
if retentionOps.Mode == models.ObjectRetentionModeGovernance {
|
|
mode = minio.Governance
|
|
} else {
|
|
mode = minio.Compliance
|
|
}
|
|
retentionUntilDate, err := time.Parse(time.RFC3339, *retentionOps.Expires)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
opts := minio.PutObjectRetentionOptions{
|
|
GovernanceBypass: retentionOps.GovernanceBypass,
|
|
RetainUntilDate: &retentionUntilDate,
|
|
Mode: &mode,
|
|
VersionID: versionID,
|
|
}
|
|
return client.putObjectRetention(ctx, bucketName, prefix, opts)
|
|
}
|
|
|
|
func getPutObjectTagsResponse(session *models.Principal, params user_api.PutObjectTagsParams) *models.Error {
|
|
ctx, cancel := context.WithTimeout(context.Background(), time.Second*20)
|
|
defer cancel()
|
|
mClient, err := newMinioClient(session)
|
|
if err != nil {
|
|
return prepareError(err)
|
|
}
|
|
// create a minioClient interface implementation
|
|
// defining the client to be used
|
|
minioClient := minioClient{client: mClient}
|
|
err = putObjectTags(ctx, minioClient, params.BucketName, params.Prefix, params.VersionID, params.Body.Tags)
|
|
if err != nil {
|
|
return prepareError(err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func putObjectTags(ctx context.Context, client MinioClient, bucketName, prefix, versionID string, tagMap map[string]string) error {
|
|
opt := minio.PutObjectTaggingOptions{
|
|
VersionID: versionID,
|
|
}
|
|
otags, err := tags.MapToObjectTags(tagMap)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return client.putObjectTagging(ctx, bucketName, prefix, otags, opt)
|
|
}
|
|
|
|
// newClientURL returns an abstracted URL for filesystems and object storage.
|
|
func newClientURL(urlStr string) *mc.ClientURL {
|
|
scheme, rest := getScheme(urlStr)
|
|
if strings.HasPrefix(rest, "//") {
|
|
// if rest has '//' prefix, skip them
|
|
var authority string
|
|
authority, rest = splitSpecial(rest[2:], "/", false)
|
|
if rest == "" {
|
|
rest = "/"
|
|
}
|
|
host := getHost(authority)
|
|
if host != "" && (scheme == "http" || scheme == "https") {
|
|
return &mc.ClientURL{
|
|
Scheme: scheme,
|
|
Type: objectStorage,
|
|
Host: host,
|
|
Path: rest,
|
|
SchemeSeparator: "://",
|
|
Separator: '/',
|
|
}
|
|
}
|
|
}
|
|
return &mc.ClientURL{
|
|
Type: fileSystem,
|
|
Path: rest,
|
|
Separator: filepath.Separator,
|
|
}
|
|
}
|
|
|
|
// Maybe rawurl is of the form scheme:path. (Scheme must be [a-zA-Z][a-zA-Z0-9+-.]*)
|
|
// If so, return scheme, path; else return "", rawurl.
|
|
func getScheme(rawurl string) (scheme, path string) {
|
|
urlSplits := strings.Split(rawurl, "://")
|
|
if len(urlSplits) == 2 {
|
|
scheme, uri := urlSplits[0], "//"+urlSplits[1]
|
|
// ignore numbers in scheme
|
|
validScheme := regexp.MustCompile("^[a-zA-Z]+$")
|
|
if uri != "" {
|
|
if validScheme.MatchString(scheme) {
|
|
return scheme, uri
|
|
}
|
|
}
|
|
}
|
|
return "", rawurl
|
|
}
|
|
|
|
// Assuming s is of the form [s delimiter s].
|
|
// If so, return s, [delimiter]s or return s, s if cutdelimiter == true
|
|
// If no delimiter found return s, "".
|
|
func splitSpecial(s string, delimiter string, cutdelimiter bool) (string, string) {
|
|
i := strings.Index(s, delimiter)
|
|
if i < 0 {
|
|
// if delimiter not found return as is.
|
|
return s, ""
|
|
}
|
|
// if delimiter should be removed, remove it.
|
|
if cutdelimiter {
|
|
return s[0:i], s[i+len(delimiter):]
|
|
}
|
|
// return split strings with delimiter
|
|
return s[0:i], s[i:]
|
|
}
|
|
|
|
// getHost - extract host from authority string, we do not support ftp style username@ yet.
|
|
func getHost(authority string) (host string) {
|
|
i := strings.LastIndex(authority, "@")
|
|
if i >= 0 {
|
|
// TODO support, username@password style userinfo, useful for ftp support.
|
|
return
|
|
}
|
|
return authority
|
|
}
|