CN116614323A - Cloud storage enterprise network management method and system based on Rclone - Google Patents

Cloud storage enterprise network management method and system based on Rclone Download PDF

Info

Publication number
CN116614323A
CN116614323A CN202310898796.6A CN202310898796A CN116614323A CN 116614323 A CN116614323 A CN 116614323A CN 202310898796 A CN202310898796 A CN 202310898796A CN 116614323 A CN116614323 A CN 116614323A
Authority
CN
China
Prior art keywords
user
cloud storage
storage space
web server
rclone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310898796.6A
Other languages
Chinese (zh)
Other versions
CN116614323B (en
Inventor
罗文卓
汪黎
钟生平
舒畅
汪封盛
张帅
余琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Galaxy Qilin Software Changsha Co ltd
Original Assignee
Galaxy Qilin Software Changsha Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Galaxy Qilin Software Changsha Co ltd filed Critical Galaxy Qilin Software Changsha Co ltd
Priority to CN202310898796.6A priority Critical patent/CN116614323B/en
Publication of CN116614323A publication Critical patent/CN116614323A/en
Application granted granted Critical
Publication of CN116614323B publication Critical patent/CN116614323B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a cloud storage enterprise network disk management method and system based on Rclone, wherein the method comprises the steps of utilizing a network disk management program and an Rclone client to cooperatively manage a cloud storage network disk, detecting operation executed by a user through the network disk management program, and if the user executes login operation, calling a web server to verify so as to acquire cloud storage enterprise network disk information; a request is initiated to a web server to apply for a temporary token to a cloud storage server, if the temporary token returned by the web server is received, the Rclone client is called to mount the cloud storage enterprise network disk as a local disk based on the temporary token; and if the user executes the exit operation, calling the Rclone client to unload the local disk corresponding to the cloud storage enterprise network disk through the network disk management program. The application aims to simplify the operation of the Rclone client of the command line, and the network disk operation is safer by introducing a temporary token mechanism of cloud storage.

Description

Cloud storage enterprise network management method and system based on Rclone
Technical Field
The application relates to the field of cloud storage, in particular to a cloud storage enterprise network management method and system based on Rclone.
Background
Rclone is a computer program with an open-source, multi-threaded, command line interface that can be used to manage cloud storage. The functions of the method comprise file synchronization, file transmission, encryption, caching and mounting. Rclone supports fifty total cloud storage services including AmazonS3 and alicloud os. The cloud storage is managed by using the Rclone, so that the network disk of the cloud storage end can be mounted to the local and mapped to the local disk; users can upload their files into the Rclone managed folder, automatically upload to the cloud through the Rclone, and view those files through the local file manager. The cloud file can be edited and watched directly. Because the Rclone is used as a general cloud storage management platform, cloud storage managed by the Rclone needs to be in butt joint with account systems of different service manufacturers, and usually, a special configuration file is needed for cloud storage accounts of the Rclone. This approach is highly demanding for the user; in the use process, the security problems such as privacy disclosure and the like are easily caused by disclosure of the configuration file. Because Rclone is in use, cloud storage needs to be mounted locally in a mode of specifying a configuration file by a command line; after the use is completed, the disk is required to be unloaded in a command line mode; this approach requires manual operations, and also requires learning how to mount and dismount the disk, how to set parameters, etc. Because the Rclone is in the synchronous uploading file, a user needs to clearly sense whether the uploading of the file is completed or not, and the Rclone has no function; due to the increase of the user quantity, the resource space used by the Rclone in cloud storage is also increased, and therefore, the account needs to be limited in the use process; and the cloud storage service provider does not provide the service; meanwhile, cloud storage manufacturers do not provide a function of real-time account management. Meanwhile, because the Rclone network disk is more focused, the personal user can operate files stored in the cloud more conveniently on the local file system; the cost of the cloud storage product is not effectively managed, so that huge waste of resources is caused; the cost-reducing schemes such as reserved space and storage type of cloud storage cannot be fully utilized, and the use cost is effectively controlled.
Disclosure of Invention
The application aims to solve the technical problems: aiming at the problems in the prior art, the application provides a cloud storage enterprise network management method and a cloud storage enterprise network management system based on Rclone, which aim to simplify the operation of an Rclone client of a command line.
In order to solve the technical problems, the application adopts the following technical scheme:
the cloud storage enterprise network disk management method based on the Rclone comprises the steps of utilizing a graphical network disk management program and an Rclone client of a command line to cooperatively manage a cloud storage network disk, and comprising the following steps:
s101, after a network disk management program is started, detecting operation executed by a user through the network disk management program, and if the user executes login operation, jumping to the step S102; if the user executes the exit operation, step S104 is skipped;
s102, calling a designated web server to verify login information of a user through a network disk management program, and ending and exiting if the network disk management program receives that the verification result returned by the web server is that the verification is not passed; otherwise, acquiring cloud storage enterprise network disk information returned by the web server from the verification result through the network disk management program;
s103, initiating a temporary token acquisition request to a designated web server through a network disk management program according to a user to apply for a temporary token to a cloud storage server, if the network disk management program receives the temporary token returned by the web server, calling an Rclone client to mount the cloud storage enterprise network disk as a local disk based on the temporary token, and jumping to the step S101;
s104, calling the Rclone client to unload the local disk corresponding to the cloud storage enterprise network disk through the network disk management program.
Optionally, in step S102, the cloud storage enterprise network disk information refers to a storage space socket configured for a user and a user root path, where the user root path is a directory under the storage space socket, and is at least one of the storage space socket and the user root path in the cloud storage enterprise network disk information of different users, so that multiple users use storage space sockets stored by different clouds, or multiple users share the same storage space socket stored by the cloud.
Optionally, when the cloud storage specified in the cloud storage enterprise network disk information is mounted as a local disk in step S103, the method further includes that the network disk management program registers the Rclone client as a websocket client to a specified web server; the step S101 also comprises a step S104 of the network management program for monitoring a forced exit message sent by the web server to the websocket client aiming at the logged-in user, and if the forced exit message sent by the web server to the websocket client is received, skipping to the step S104 and outputting a reason message of the forced exit; and in step S104, when the local disk corresponding to the cloud storage enterprise network disk is unloaded, the websocket client is logged off from the designated web server.
Optionally, when the specified web server is called by the network disk management program to verify the login information of the user, the verification of the login information of the user by the specified web server includes: carrying out login verification on login information of a user; if the verification is not passed, returning a verification result as login failure; and otherwise, inquiring an account binding relation table according to login information of the user, and returning the obtained cloud storage enterprise network disk information of the user to a network disk management program as a verification result, wherein entries of the account binding relation table comprise the user and the cloud storage enterprise network disk information of the user.
Optionally, before the specified web server is called by the web disk management program to verify the login information of the user, initializing an account binding relation table of the web server by the web client: the web server side obtains storage space socket lists of all cloud storage service providers and a user list needing to use cloud storage, if the number of users in the user list is less than or equal to the number of storage space sockets in the storage space socket list, one storage space socket is allocated for each user, and a user root path is established for the user under the allocated storage space sockets; otherwise, dividing the number of users in the user list by the number of storage space pockets in the storage space pocket list and rounding to obtain the number of users allocated under each storage space pocket, then allocating users for each storage space pocket according to the number of users, and establishing a user root path for the users under the allocated storage space pockets; and respectively writing the user, the storage space pocket and the user root path which are used for the user and the allocated storage space pocket as one table entry of the account binding relationship table into the account binding relationship table, thereby completing the initialization of the account binding relationship table.
Optionally, after the authentication of the login information of the user by calling the designated web server through the network disk management program, the method further includes adjusting an account binding relation table of the web server to realize load balancing between storage space pockets: the method comprises the steps that storage space pockets are ordered according to the resource use condition of the storage space pockets for a period of time, users needing to be migrated to the storage space pockets with less resource use are selected from the storage space pockets with more resource use according to the ordering result of the storage space pockets, and for the selected users, user root paths of the users are migrated from the original storage space pockets to new storage space pockets, and an account binding relation table is updated.
Optionally, after receiving the temporary token returned by the web server, the network disk management program in step S103 further includes detecting whether the temporary token is expired at regular time, and if the temporary token is expired and the local disk is not yet unloaded, initiating a request for acquiring the temporary token to the designated web server by the network disk management program again according to the user so as to apply for a new temporary token to the cloud storage server.
In addition, the application also provides an RCC cloud storage enterprise network management system, which comprises a microprocessor and a memory which are connected with each other, wherein the microprocessor is programmed or configured to execute the RCC cloud storage enterprise network management method.
Furthermore, the present application provides a computer readable storage medium having a computer program stored therein, the computer program being configured or programmed by a microprocessor to perform the Rclone-based cloud storage enterprise network management method.
Compared with the prior art, the application has the following advantages:
1. according to the application, before the Rclone is mounted, an account login flow is inserted, the account configuration information is pulled, and the network management program which is also graphical in operation is exited, so that the use and learning cost of a client is greatly reduced, the operation of the Rclone client of a command line can be effectively simplified, the management and resource configuration of the Rclone client are realized by utilizing the combination of the network management program and the web server, the cloud service resource control is performed, and the user side can complete the operation only by logging on the graphical interface of the network management program. And the management and resource allocation of the Rclone client are realized by combining the network management program and the web server, so that the cloud service resource control is performed, the configuration file of the Rclone client is not required to be configured by a user, the leakage of the configuration file can be prevented, and the security is better.
2. The method comprises the steps that a network disk management program initiates a temporary token obtaining request to a designated web server according to a user to apply for a temporary token to a cloud storage server, if the network disk management program receives the temporary token returned by the web server, an Rclone client is called to mount a cloud storage enterprise network disk as a local disk based on the temporary token, and a cloud storage temporary token mechanism is introduced to enable the network disk operation to be safer by removing the mode of directly using a cloud storage server account before.
Drawings
FIG. 1 is a schematic diagram of a basic flow of a method according to an embodiment of the present application.
Fig. 2 is a schematic diagram of an interaction flow of modifying a file and updating a temporary token by a user in an embodiment of the present application.
Fig. 3 is a schematic diagram of an interaction flow for account abnormal exit in an embodiment of the present application.
Fig. 4 is a schematic diagram of an initialization flow for implementing a cloud storage network disk in a modularized manner in an embodiment of the present application.
Fig. 5 is a schematic diagram of a file operation flow of implementing a cloud storage network disk in a modularized manner in an embodiment of the present application.
Fig. 6 is a schematic drawing of an exit flow of a cloud storage network disk implemented by modeling in an embodiment of the present application.
Detailed Description
As shown in fig. 1, the method for managing a cloud storage enterprise network disk based on Rclone of the present embodiment includes cooperatively managing a cloud storage network disk by using a patterned network disk management program and an Rclone client of a command line, including:
s101, after a network disk management program is started, detecting operation executed by a user through the network disk management program, and if the user executes login operation, jumping to the step S102; if the user executes the exit operation, step S104 is skipped;
s102, calling a designated web server to verify login information of a user through a network disk management program, and ending and exiting if the network disk management program receives that the verification result returned by the web server is that the verification is not passed; otherwise, acquiring cloud storage enterprise network disk information returned by the web server from the verification result through the network disk management program;
s103, initiating a temporary Token obtaining request to a designated web server by a network disk management program according to a user to apply for a temporary Token (sts Token) to a cloud storage server, if the network disk management program receives the temporary Token returned by the web server, calling an Rclone client to mount the cloud storage enterprise network disk as a local disk based on the temporary Token (so that the user can perform various file operations such as adding, deleting, changing and checking files, compressing and decompressing compressed files and the like through a local file manager), and jumping to the step S101;
s104, calling the Rclone client to unload the local disk corresponding to the cloud storage enterprise network disk through the network disk management program.
As shown in fig. 2, after the cloud storage enterprise network disk is mounted as a local disk, if a user modifies a file in the local disk, an Rclone client is triggered, the Rclone client uploads the modified file and a temporary token together to a corresponding cloud storage, and after the file is completed, a message of completion of file uploading is output to the user through a network disk management program. The network management program in this embodiment includes a message notification function, so that the user can perceive that the uploading of the file is completed.
As shown in fig. 2, after receiving the temporary token returned by the web server in step S103, the network disk management program in this embodiment further includes detecting whether the temporary token is expired at regular time, and if the temporary token is expired and the local disk is not yet unloaded, then a request for obtaining the temporary token is initiated to the designated web server by the network disk management program again according to the user so as to apply for a new temporary token to the cloud storage server.
In this embodiment, the cloud storage enterprise network disk information in step S102 refers to a storage space socket and a user root path configured for a user, where the user root path is a directory under the storage space socket, and is at least one of the storage space socket and the user root path in cloud storage enterprise network disk information of different users, so that multiple users use different cloud storage space sockets, or multiple users share the same cloud storage space socket, by using the above manner, granularity between the users and the cloud disk based on the storage space socket is implemented as granularity based on the user root path, a cloud disk account and a file resource path are bound and used as virtual root paths, so that a service provider breaks through the limitation of the number of resources such as account numbers, for example, only 100 storage space sockets can be used by one account number, and only 100 users can be used by the conventional method, but the method of the embodiment has no such limitation, thereby breaking through the limitation that the size of a network disk map of an individual account for Rclone is enlarged; dynamically modifying the configuration of the Rclone client by using monitoring indexes and strategies and a network technology, so as to realize dynamic management of the cloud disk client; the application range and the adaptation scene of the Rclone are greatly improved, the limitation of each cloud storage manufacturer on account numbers and socket resources in the application process of the Rclone is solved, and the cloud disk account types can be classified and managed in a grading manner according to different requirements.
Referring to fig. 1, as an optional implementation manner, when the cloud storage specified in the cloud storage enterprise network disk information is mounted as a local disk in step S103 of this embodiment, the method further includes that the network disk management program registers the Rclone client as a websocket client to a specified web server; as shown in fig. 3, step S101 further includes the network management program monitoring, for the logged-in user, a forced logout message sent by the web server to the websocket client, if a forced logout message sent by the web server to the websocket client is received (the forced logout message is sent when the web server detects an account abnormality), jumping to step S104 and outputting a reason message for forced logout (logout reason display); and in step S104, when the local disk corresponding to the cloud storage enterprise network disk is unloaded, the websocket client is logged off from the designated web server. By registering the Rclone client as the websocket client to the appointed web server after logging in, the function that the web server can actively push to the client is realized, the problem that Rclone cannot be automatically managed in real time according to account information after logging in is solved, the use of the client can be emergently suspended by the web server under special conditions, and the manageability of a network disk is greatly improved.
In the embodiment, a graphical network management program is utilized to add a unified GUI login interface for the Rclone client of the command line, and the network management program and the web server are utilized to realize configuration management, so that the problem that a cloud storage account number needs a special configuration file in the use process of the Rclone is solved (the mode has higher requirements on a user, meanwhile, the leakage of a local configuration file is easy to cause privacy leakage, and the mounting operation is complex). The method of directly using the cloud storage service provider account before is eliminated, and a temporary token mechanism of cloud storage is introduced, so that network disk operation is safer.
In this embodiment, when the specified web server is called by the network disk management program to verify the login information of the user, the verification of the login information of the user by the specified web server includes: carrying out login verification on login information of a user; if the verification is not passed, returning a verification result as login failure; otherwise, inquiring an account binding relation table according to login information of the user, and returning the obtained cloud storage enterprise network disk information of the user to a network disk management program as a verification result, wherein entries of the account binding relation table comprise the user and the cloud storage enterprise network disk information of the user, and the cloud storage enterprise network disk information of the user can be conveniently managed by using the account binding relation table.
In this embodiment, before the specified web server is called by the network disk management program to verify the login information of the user, the method further includes initializing an account binding relation table of the web server through the web client: the web server side obtains storage space socket lists of all cloud storage service providers and a user list needing to use cloud storage, if the number of users in the user list is less than or equal to the number of storage space sockets in the storage space socket list, one storage space socket is allocated for each user, and a user root path is established for the user under the allocated storage space sockets; otherwise, dividing the number of users in the user list by the number of storage space pockets in the storage space pocket list and rounding to obtain the number of users allocated under each storage space pocket, then allocating users for each storage space pocket according to the number of users, and establishing a user root path for the users under the allocated storage space pockets; and respectively writing the user, the storage space pocket and the user root path which are used for the user and the allocated storage space pocket as one table entry of the account binding relationship table into the account binding relationship table, thereby completing the initialization of the account binding relationship table.
In this embodiment, after the login information of the user is verified by calling the designated web server through the network disk management program, the method further includes adjusting an account binding relationship table of the web server to realize load balancing between storage space sockets: the method comprises the steps that storage space pockets are ordered according to the resource use condition of the storage space pockets for a period of time, users needing to be migrated to the storage space pockets with less resource use are selected from the storage space pockets with more resource use according to the ordering result of the storage space pockets, and for the selected users, user root paths of the users are migrated from the original storage space pockets to new storage space pockets, and an account binding relation table is updated. By combining cloud storage resource monitoring information with load balancing among storage space pockets, file resources on cloud storage can be dynamically managed, the effective utilization rate of the pockets resources is further improved, and meanwhile dependence on specific cloud manufacturers is reduced to a certain extent.
The graphical web manager may be implemented in a desired manner as desired, for example, as an alternative embodiment, where the graphical web manager is implemented using an Electron framework (an open source framework that accomplishes cross-platform desktop GUI application development using a node. Js and chrome rendering engine). As an optional implementation manner, the network disk management program of this embodiment adopts a modular structure, and specifically includes the following modules:
logging module kydrive-logic: the method is used for popping up the network disk login page and is convenient for inputting a correct account password into the network disk login page; if no account exists, switching to an account registration page for registration; after inputting the account password, the user generates a login request and sends the login request to the web server; the web server receives a login request of a login module kdrive-login and verifies login information; prompting to re-log if the login fails; after successful login, the web server returns the information of the account on the cloud storage enterprise network disk.
Token module kydrive-token: for issuing a request for acquiring a temporary Token to apply for a temporary Token (sts Token) to a cloud storage server according to a user to a designated web server. After receiving a temporary token acquisition request sent by a token module kdrive-token, the web server applies for a temporary token to a cloud storage server according to a specific temporary token policy template (limiting the temporary token to only specific users); if the network disk fails, the network disk cannot be mounted (i.e., the enterprise network disk cannot be used), and the enterprise network disk exit process needs to be executed.
Uploading module kydrive-upload: the cloud storage method is used for calling the Rclone client to generate an uploading task for the operation of the local disk so as to execute the corresponding cloud operation and acquire the response result of the cloud storage. When the Rclone client executes an uploading task, a temporary token is obtained through a token module kdrive-token, a file is uploaded, and whether the temporary token is out of date is monitored in real time in the uploading process; if the token is out of date, the token module kdrive-token updates; if the file uploading task fails, the uploading module kdrive-upload again executes re-uploading until the uploading is completed.
And the notification module kydrive-notify is used for sending a notification to remind a user after the uploading module kydrive completes the task.
And the exit module kydrive-exit is used for calling the Rclone client to unload the local disk corresponding to the cloud storage enterprise network disk and logging off the websocket client from the appointed web server.
As shown in fig. 4, the network disk initialization process includes: step 201: clicking and operating an enterprise network disk in a desktop operating system, starting a login module kdrive-login, and popping up a network disk login page; step 202: so as to be convenient for inputting correct account passwords on the network disk login page; if no account exists, switching to an account registration page for registration; step 203: the web server receives a login request of a login module kdrive-login and verifies login information; prompting to re-log if the login fails; after successful login, the web server returns information of the account on cloud storage, such as a file storage path; step 204: storing the enterprise network disk information by utilizing the cloud in the step 203; step 205: after the login module kydrive-logic successfully acquires the temporary token, the cloud storage is mapped to a local disk; if the mounting fails, go to step 207; step 206: registering a websocket client in the Rclone to a web server, so that the control of the web server is conveniently accepted; step 207: in the case that the network disk cannot be mounted (i.e., the enterprise network disk cannot be used), the enterprise network disk exit procedure needs to be executed.
As shown in fig. 5, taking modifying a file in a network disk as an example, the network disk operation process includes: step 301: the system application program modifies the files in the network disk, and the modification is completed and stored; step 302: the present magnetic disk of the enterprise network disk is a file system which can be customized by a user; after each file is saved, the application program sends a closing request to the file system; step 303: generating a file uploading task by an uploading module kdrive-uploading; step 304: the Rclone starts uploading the file through a temporary token acquired from a token module kydrive-token, and monitors whether the temporary token is out of date in real time in the uploading process; if the token is out of date, the token module kdrive-token updates; if the file uploading task fails, the uploading module kdrive-upload re-executes step 303 until the uploading is completed; step 305: after the task is completed, the notification module kdrive-notify can remind the user that the file is uploaded to completion at the GUI end (network management program).
As shown in fig. 6, the network disk exit flow includes: step 401: the exit module kydrive-exit is responsible for receiving the exit request sent by the GUI end (network disc management program) and the web server; if the user actively clicks the "GUI exit button", the exit module kdrive-exit application exit processor executes step 402; if the event is not clicked by the user, the exiting module kdrive-exit starts to execute step 405; step 402: executing the exit by the exit module kydrive-exit, and monitoring the exit signal of the process; closing the user-defined file system before the completion of the exit; step 403: unloading local disks (mapped by enterprise network disks) using a system tool; step 404: logging out the websocket client from the web service; step 405: step 402 is performed first; after the completion, the notification module kdrive-notify displays the network disk exit reason to the user; after user confirmation, the GUI application (web manager) exits.
In summary, in the cloud storage enterprise network management method based on Rclone of this embodiment, before Rclone is mounted, an account login procedure is inserted, and an account configuration information is pulled, and the method of exiting is just to operate a graphical network management program, so that the use and learning cost of a client are greatly reduced, the operation of an Rclone client of a command line can be effectively simplified, management and resource configuration of the Rclone client are realized by utilizing the combination of the network management program and a web server, cloud service resource control is performed, and a user side only needs to log on a graphical interface of the network management program to complete the operation. And the management and resource allocation of the Rclone client are realized by combining the network management program and the web server, so that the cloud service resource control is performed, the configuration file of the Rclone client is not required to be configured by a user, the leakage of the configuration file can be prevented, and the security is better. The cloud storage enterprise network disc management method based on the Rclone comprises the steps that a network disc management program initiates a temporary token obtaining request to a designated web server according to a user to apply for a temporary token to a cloud storage server, if the network disc management program receives the temporary token returned by the web server, the Rclone client is called to mount the cloud storage enterprise network disc as a local disc based on the temporary token, and a mode of directly using an account of the cloud storage server before is removed, and a temporary token mechanism of cloud storage is introduced to enable operation of the network disc to be safer.
In addition, the embodiment also provides a cloud storage enterprise network management system based on the Rclone, which comprises a microprocessor and a memory which are connected with each other, wherein the microprocessor is programmed or configured to execute the cloud storage enterprise network management method based on the Rclone.
In addition, the embodiment also provides a computer readable storage medium, in which a computer program is stored, the computer program is used for being programmed or configured by a microprocessor to execute the Rclone-based cloud storage enterprise network management method.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present application, and the protection scope of the present application is not limited to the above examples, and all technical solutions belonging to the concept of the present application belong to the protection scope of the present application. It should be noted that modifications and adaptations to the present application may occur to one skilled in the art without departing from the principles of the present application and are intended to be within the scope of the present application.

Claims (9)

1. The cloud storage enterprise network management method based on the Rclone is characterized by comprising the steps of utilizing a graphical network management program and an Rclone client of a command line to cooperatively manage a cloud storage network disk, and comprising the following steps:
s101, after a network disk management program is started, detecting operation executed by a user through the network disk management program, and if the user executes login operation, jumping to the step S102; if the user executes the exit operation, step S104 is skipped;
s102, calling a designated web server to verify login information of a user through a network disk management program, and ending and exiting if the network disk management program receives that the verification result returned by the web server is that the verification is not passed; otherwise, acquiring cloud storage enterprise network disk information returned by the web server from the verification result through the network disk management program;
s103, initiating a temporary token acquisition request to a designated web server through a network disk management program according to a user to apply for a temporary token to a cloud storage server, if the network disk management program receives the temporary token returned by the web server, calling an Rclone client to mount the cloud storage enterprise network disk as a local disk based on the temporary token, and jumping to the step S101;
s104, calling the Rclone client to unload the local disk corresponding to the cloud storage enterprise network disk through the network disk management program.
2. The method of claim 1, wherein in step S102, the cloud storage enterprise network disk information refers to a storage space socket configured for a user and a user root path, the user root path is a directory under the storage space socket, and at least one of the storage space socket and the user root path in the cloud storage enterprise network disk information of different users is different, so that the multiple users use the storage space socket stored by different clouds, or the multiple users share the storage space socket stored by the same cloud.
3. The method for managing the cloud storage enterprise network based on Rclone according to claim 2, wherein when the cloud storage specified in the cloud storage enterprise network disk information is mounted as a local disk in step S103, the method further comprises the step that the network management program registers the Rclone client as a websocket client to the specified web server; the step S101 also comprises a step S104 of the network management program for monitoring a forced exit message sent by the web server to the websocket client aiming at the logged-in user, and if the forced exit message sent by the web server to the websocket client is received, skipping to the step S104 and outputting a reason message of the forced exit; and in step S104, when the local disk corresponding to the cloud storage enterprise network disk is unloaded, the websocket client is logged off from the designated web server.
4. The Rclone-based cloud storage enterprise network management method of claim 3, wherein when the specified web server is called by the network disk management program to verify the login information of the user, the verification of the login information of the user by the specified web server comprises: carrying out login verification on login information of a user; if the verification is not passed, returning a verification result as login failure; and otherwise, inquiring an account binding relation table according to login information of the user, and returning the obtained cloud storage enterprise network disk information of the user to a network disk management program as a verification result, wherein entries of the account binding relation table comprise the user and the cloud storage enterprise network disk information of the user.
5. The method for managing cloud storage enterprise network disks based on Rclone according to claim 4, wherein before the user login information is verified by invoking the designated web server through the network disk management program, initializing an account binding relationship table of the web server through the web client: the web server side obtains storage space socket lists of all cloud storage service providers and a user list needing to use cloud storage, if the number of users in the user list is less than or equal to the number of storage space sockets in the storage space socket list, one storage space socket is allocated for each user, and a user root path is established for the user under the allocated storage space sockets; otherwise, dividing the number of users in the user list by the number of storage space pockets in the storage space pocket list and rounding to obtain the number of users allocated under each storage space pocket, then allocating users for each storage space pocket according to the number of users, and establishing a user root path for the users under the allocated storage space pockets; and respectively writing the user, the storage space pocket and the user root path which are used for the user and the allocated storage space pocket as one table entry of the account binding relationship table into the account binding relationship table, thereby completing the initialization of the account binding relationship table.
6. The method for managing cloud storage enterprise network management based on Rclone of claim 5, wherein after the user login information is verified by invoking the designated web server through the network disk management program, further comprising adjusting an account binding relation table of the web server to realize load balancing between storage space sockets: the method comprises the steps that storage space pockets are ordered according to the resource use condition of the storage space pockets for a period of time, users needing to be migrated to the storage space pockets with less resource use are selected from the storage space pockets with more resource use according to the ordering result of the storage space pockets, and for the selected users, user root paths of the users are migrated from the original storage space pockets to new storage space pockets, and an account binding relation table is updated.
7. The method according to any one of claims 1 to 6, wherein after the network management program receives the temporary token returned by the web server in step S103, the method further comprises detecting whether the temporary token is expired at regular time, and if the temporary token is expired and the local disk is not yet unloaded, then initiating a request for acquiring the temporary token to the designated web server according to the user through the network management program again to apply for a new temporary token to the cloud storage server.
8. An Rclone-based cloud storage enterprise network management system comprising a microprocessor and a memory interconnected, wherein the microprocessor is programmed or configured to perform the Rclone-based cloud storage enterprise network management method of any one of claims 1 to 7.
9. A computer readable storage medium having a computer program stored therein, wherein the computer program is for programming or configuring by a microprocessor to perform the Rclone-based cloud storage enterprise network management method of any one of claims 1 to 7.
CN202310898796.6A 2023-07-21 2023-07-21 Cloud storage enterprise network management method and system based on Rclone Active CN116614323B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310898796.6A CN116614323B (en) 2023-07-21 2023-07-21 Cloud storage enterprise network management method and system based on Rclone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310898796.6A CN116614323B (en) 2023-07-21 2023-07-21 Cloud storage enterprise network management method and system based on Rclone

Publications (2)

Publication Number Publication Date
CN116614323A true CN116614323A (en) 2023-08-18
CN116614323B CN116614323B (en) 2023-11-14

Family

ID=87682279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310898796.6A Active CN116614323B (en) 2023-07-21 2023-07-21 Cloud storage enterprise network management method and system based on Rclone

Country Status (1)

Country Link
CN (1) CN116614323B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743001B1 (en) * 2005-06-21 2010-06-22 Amazon Technologies, Inc. Method and system for dynamic pricing of web services utilization
US20120016915A1 (en) * 2010-07-15 2012-01-19 Seoung Il Choi System and method for file copy of cloud method and disk cloning over wide area network
WO2013097621A1 (en) * 2011-12-31 2013-07-04 华为技术有限公司 Data-tiered storage processing method and device and storage device
CN104462998A (en) * 2014-12-09 2015-03-25 天津光电安辰信息技术有限公司 Domestic commercial cryptography algorithm based cloud storage encryption system and implementation method thereof
EP2881854A1 (en) * 2012-08-03 2015-06-10 ZTE Corporation Storage method and apparatus for distributed file system
CN108228085A (en) * 2016-12-21 2018-06-29 伊姆西Ip控股有限责任公司 For managing the method and apparatus of storage system
CN112235371A (en) * 2020-09-30 2021-01-15 北京联众国际通信有限公司 System and method for mounting network disk on cloud desktop based on distributed storage
CN112417405A (en) * 2020-11-30 2021-02-26 北京小熊博望科技有限公司 Multi-cloud disk aggregation method
CN115314844A (en) * 2022-10-10 2022-11-08 天津七一二移动通信有限公司 Railway intelligent accurate addressing system based on 5G network communication and implementation method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743001B1 (en) * 2005-06-21 2010-06-22 Amazon Technologies, Inc. Method and system for dynamic pricing of web services utilization
US20120016915A1 (en) * 2010-07-15 2012-01-19 Seoung Il Choi System and method for file copy of cloud method and disk cloning over wide area network
WO2013097621A1 (en) * 2011-12-31 2013-07-04 华为技术有限公司 Data-tiered storage processing method and device and storage device
EP2881854A1 (en) * 2012-08-03 2015-06-10 ZTE Corporation Storage method and apparatus for distributed file system
US20150169621A1 (en) * 2012-08-03 2015-06-18 Zte Corporation Storage method and apparatus for distributed file system
CN104462998A (en) * 2014-12-09 2015-03-25 天津光电安辰信息技术有限公司 Domestic commercial cryptography algorithm based cloud storage encryption system and implementation method thereof
CN108228085A (en) * 2016-12-21 2018-06-29 伊姆西Ip控股有限责任公司 For managing the method and apparatus of storage system
CN112235371A (en) * 2020-09-30 2021-01-15 北京联众国际通信有限公司 System and method for mounting network disk on cloud desktop based on distributed storage
CN112417405A (en) * 2020-11-30 2021-02-26 北京小熊博望科技有限公司 Multi-cloud disk aggregation method
CN115314844A (en) * 2022-10-10 2022-11-08 天津七一二移动通信有限公司 Railway intelligent accurate addressing system based on 5G network communication and implementation method

Also Published As

Publication number Publication date
CN116614323B (en) 2023-11-14

Similar Documents

Publication Publication Date Title
CA2986230C (en) Custom communication channels for application deployment
CN105224351B (en) Rapid configuration implementation method and rapid configuration server
CN102369713B (en) Automatic removing method and device of system configuration items
CN109992354B (en) Container processing method, device, main body server, system and storage medium
US20070250365A1 (en) Grid computing systems and methods thereof
US11080041B1 (en) Operating system management for virtual workspaces
US8099588B2 (en) Method, system and computer program for configuring firewalls
CN105099739A (en) Plug-in type software deployment method and apparatus, and application server
US20140237373A1 (en) Method of provisioning a cloud-based render farm
CN108289074B (en) User account login method and device
CN106406980B (en) A kind of dispositions method and device of virtual machine
CN113821168A (en) Shared storage migration system and method, electronic equipment and storage medium
CN104104701A (en) Online service configuration updating method and system
CN112506579A (en) Multi-service multi-environment management method and system
CN116614323B (en) Cloud storage enterprise network management method and system based on Rclone
CN112134950B (en) Method and device for maintaining Linux cluster, maintenance server and medium
US11436377B2 (en) Secure workload image distribution and management
US11055079B2 (en) Systems and methods for just-in-time application implementation
KR101087145B1 (en) Provision management system and method for bulk setting provision profile in the system
US11979287B1 (en) Data center monitoring and management operation including a microservice autoscaling operation
MVP et al. Microsoft System Center 2012 R2 Operations Manager Cookbook
CN115454580B (en) Node host resource management method and device and computing equipment
US11924045B2 (en) Connectivity management system client inventory and configuration operation for interconnected connectivity management clients
US20240171464A1 (en) Data Center Monitoring and Management Operation Including Microservice Centrality Calculation Operation
US20240179058A1 (en) Data Center Monitoring and Management Operation Including a Microservice Autoscaling Operation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant