2024-02-29 21:21:29 +00:00
|
|
|
{- git-annex URL backend -- keys whose content is available from urls.
|
2011-08-06 18:57:22 +00:00
|
|
|
-
|
2024-02-29 17:26:06 +00:00
|
|
|
- Copyright 2011-2024 Joey Hess <id@joeyh.name>
|
2011-08-06 18:57:22 +00:00
|
|
|
-
|
2019-03-13 19:48:14 +00:00
|
|
|
- Licensed under the GNU AGPL version 3 or higher.
|
2011-08-06 18:57:22 +00:00
|
|
|
-}
|
|
|
|
|
|
|
|
module Backend.URL (
|
|
|
|
backends,
|
|
|
|
fromUrl
|
|
|
|
) where
|
|
|
|
|
2016-01-20 20:36:33 +00:00
|
|
|
import Annex.Common
|
2017-02-24 19:16:56 +00:00
|
|
|
import Types.Key
|
2011-08-06 18:57:22 +00:00
|
|
|
import Types.Backend
|
Better sanitization of problem characters when generating URL and WORM keys.
FAT has a lot of characters it does not allow in filenames, like ? and *
It's probably the worst offender, but other filesystems also have
limitiations.
In 2011, I made keyFile escape : to handle FAT, but missed the other
characters. It also turns out that when I did that, I was also living
dangerously; any existing keys that contained a : had their object
location change. Oops.
So, adding new characters to escape to keyFile is out. Well, it would be
possible to make keyFile behave differently on a per-filesystem basis, but
this would be a real nightmare to get right. Consider that a rsync special
remote uses keyFile to determine the filenames to use, and we don't know
the underlying filesystem on the rsync server..
Instead, I have gone for a solution that is backwards compatable and
simple. Its only downside is that already generated URL and WORM keys
might not be able to be stored on FAT or some other filesystem that
dislikes a character used in the key. (In this case, the user can just
migrate the problem keys to a checksumming backend. If this became a big
problem, fsck could be made to detect these and suggest a migration.)
Going forward, new keys that are created will escape all characters that
are likely to cause problems. And if some filesystem comes along that's
even worse than FAT (seems unlikely, but here it is 2013, and people are
still using FAT!), additional characters can be added to the set that are
escaped without difficulty.
(Also, made WORM limit the part of the filename that is embedded in the key,
to deal with filesystem filename length limits. This could have already
been a problem, but is more likely now, since the escaping of the filename
can make it longer.)
This commit was sponsored by Ian Downes
2013-10-05 19:01:49 +00:00
|
|
|
import Backend.Utilities
|
2024-03-01 20:42:02 +00:00
|
|
|
import Backend.VURL.Utilities (migrateFromURLToVURL)
|
2011-08-06 18:57:22 +00:00
|
|
|
|
2011-12-31 08:11:39 +00:00
|
|
|
backends :: [Backend]
|
2024-02-29 21:21:29 +00:00
|
|
|
backends = [backendURL]
|
2011-08-06 18:57:22 +00:00
|
|
|
|
2024-02-29 17:26:06 +00:00
|
|
|
backendURL :: Backend
|
|
|
|
backendURL = Backend
|
2017-02-24 19:16:56 +00:00
|
|
|
{ backendVariety = URLKey
|
2020-07-20 18:06:05 +00:00
|
|
|
, genKey = Nothing
|
2015-10-01 17:28:49 +00:00
|
|
|
, verifyKeyContent = Nothing
|
2021-02-09 19:00:51 +00:00
|
|
|
, verifyKeyContentIncrementally = Nothing
|
2012-12-20 19:43:14 +00:00
|
|
|
, canUpgradeKey = Nothing
|
2024-03-01 20:42:02 +00:00
|
|
|
, fastMigrate = Just migrateFromURLToVURL
|
2014-07-27 16:33:46 +00:00
|
|
|
-- The content of an url can change at any time, so URL keys are
|
|
|
|
-- not stable.
|
|
|
|
, isStableKey = const False
|
2024-02-29 21:21:29 +00:00
|
|
|
, isCryptographicallySecure = False
|
|
|
|
, isCryptographicallySecureKey = const (pure False)
|
2024-02-29 17:26:06 +00:00
|
|
|
}
|
|
|
|
|
Better sanitization of problem characters when generating URL and WORM keys.
FAT has a lot of characters it does not allow in filenames, like ? and *
It's probably the worst offender, but other filesystems also have
limitiations.
In 2011, I made keyFile escape : to handle FAT, but missed the other
characters. It also turns out that when I did that, I was also living
dangerously; any existing keys that contained a : had their object
location change. Oops.
So, adding new characters to escape to keyFile is out. Well, it would be
possible to make keyFile behave differently on a per-filesystem basis, but
this would be a real nightmare to get right. Consider that a rsync special
remote uses keyFile to determine the filenames to use, and we don't know
the underlying filesystem on the rsync server..
Instead, I have gone for a solution that is backwards compatable and
simple. Its only downside is that already generated URL and WORM keys
might not be able to be stored on FAT or some other filesystem that
dislikes a character used in the key. (In this case, the user can just
migrate the problem keys to a checksumming backend. If this became a big
problem, fsck could be made to detect these and suggest a migration.)
Going forward, new keys that are created will escape all characters that
are likely to cause problems. And if some filesystem comes along that's
even worse than FAT (seems unlikely, but here it is 2013, and people are
still using FAT!), additional characters can be added to the set that are
escaped without difficulty.
(Also, made WORM limit the part of the filename that is embedded in the key,
to deal with filesystem filename length limits. This could have already
been a problem, but is more likely now, since the escaping of the filename
can make it longer.)
This commit was sponsored by Ian Downes
2013-10-05 19:01:49 +00:00
|
|
|
{- Every unique url has a corresponding key. -}
|
2024-02-29 17:26:06 +00:00
|
|
|
fromUrl :: String -> Maybe Integer -> Bool -> Key
|
|
|
|
fromUrl url size verifiable = mkKey $ \k -> k
|
2015-01-06 21:58:57 +00:00
|
|
|
{ keyName = genKeyName url
|
2024-02-29 17:26:06 +00:00
|
|
|
, keyVariety = if verifiable then VURLKey else URLKey
|
2015-01-06 21:58:57 +00:00
|
|
|
, keySize = size
|
|
|
|
}
|