Documentation ¶
Overview ¶
Package handler provides ways to accept tus 1.0 calls using HTTP.
tus is a protocol based on HTTP for resumable file uploads. Resumable means that an upload can be interrupted at any moment and can be resumed without re-uploading the previous data again. An interruption may happen willingly, if the user wants to pause, or by accident in case of an network issue or server outage (http://tus.io).
The basics of tusd ¶
tusd was designed in way which allows an flexible and customizable usage. We wanted to avoid binding this package to a specific storage system – particularly a proprietary third-party software. Therefore tusd is an abstract layer whose only job is to accept incoming HTTP requests, validate them according to the specification and finally passes them to the data store.
The data store is another important component in tusd's architecture whose purpose is to do the actual file handling. It has to write the incoming upload to a persistent storage system and retrieve information about an upload's current state. Therefore it is the only part of the system which communicates directly with the underlying storage system, whether it be the local disk, a remote FTP server or cloud providers such as AWS S3.
Using a store composer ¶
The only hard requirements for a data store can be found in the DataStore interface. It contains methods for creating uploads (NewUpload), writing to them (WriteChunk) and retrieving their status (GetInfo). However, there are many more features which are not mandatory but may still be used. These are contained in their own interfaces which all share the *DataStore suffix. For example, GetReaderDataStore which enables downloading uploads or TerminaterDataStore which allows uploads to be terminated.
The store composer offers a way to combine the basic data store - the core - implementation and these additional extensions:
composer := tusd.NewStoreComposer() composer.UseCore(dataStore) // Implements DataStore composer.UseTerminater(terminater) // Implements TerminaterDataStore composer.UseLocker(locker) // Implements LockerDataStore
The corresponding methods for adding an extension to the composer are prefixed with Use* followed by the name of the corresponding interface. However, most data store provide multiple extensions and adding all of them manually can be tedious and error-prone. Therefore, all data store distributed with tusd provide an UseIn() method which does this job automatically. For example, this is the S3 store in action (see S3Store.UseIn):
store := s3store.New(…) locker := memorylocker.New() composer := tusd.NewStoreComposer() store.UseIn(composer) locker.UseIn(composer)
Finally, once you are done with composing your data store, you can pass it inside the Config struct in order to create create a new tusd HTTP handler:
config := tusd.Config{ StoreComposer: composer, BasePath: "/files/", } handler, err := tusd.NewHandler(config)
This handler can then be mounted to a specific path, e.g. /files:
http.Handle("/files/", http.StripPrefix("/files/", handler))
Index ¶
- Constants
- Variables
- func LogEvent(logger *log.Logger, eventName string, details ...string)
- func ParseMetadataHeader(header string) map[string]string
- func SerializeMetadataHeader(meta map[string]string) string
- type ConcatableUpload
- type ConcaterDataStore
- type Config
- type CorsConfig
- type DataStore
- type ErrorsTotalMap
- type FileInfo
- type HTTPError
- type HTTPRequest
- type Handler
- type HookEvent
- type LengthDeclarableUpload
- type LengthDeferrerDataStore
- type Lock
- type Locker
- type MetaData
- type Metrics
- type StoreComposer
- func (store *StoreComposer) Capabilities() string
- func (store *StoreComposer) UseConcater(ext ConcaterDataStore)
- func (store *StoreComposer) UseCore(core DataStore)
- func (store *StoreComposer) UseLengthDeferrer(ext LengthDeferrerDataStore)
- func (store *StoreComposer) UseLocker(ext Locker)
- func (store *StoreComposer) UseTerminater(ext TerminaterDataStore)
- type TerminatableUpload
- type TerminaterDataStore
- type UnroutedHandler
- func (handler *UnroutedHandler) DelFile(w http.ResponseWriter, r *http.Request)
- func (handler *UnroutedHandler) GetFile(w http.ResponseWriter, r *http.Request)
- func (handler *UnroutedHandler) HeadFile(w http.ResponseWriter, r *http.Request)
- func (handler *UnroutedHandler) Middleware(h http.Handler) http.Handler
- func (handler *UnroutedHandler) PatchFile(w http.ResponseWriter, r *http.Request)
- func (handler *UnroutedHandler) PostFile(w http.ResponseWriter, r *http.Request)
- func (handler *UnroutedHandler) PostFileV2(w http.ResponseWriter, r *http.Request)
- func (handler *UnroutedHandler) SupportedExtensions() string
- type Upload
Examples ¶
Constants ¶
const UploadLengthDeferred = "1"
Variables ¶
var ( ErrUnsupportedVersion = NewHTTPError(errors.New("unsupported version"), http.StatusPreconditionFailed) ErrMaxSizeExceeded = NewHTTPError(errors.New("maximum size exceeded"), http.StatusRequestEntityTooLarge) ErrInvalidContentType = NewHTTPError(errors.New("missing or invalid Content-Type header"), http.StatusBadRequest) ErrInvalidUploadLength = NewHTTPError(errors.New("missing or invalid Upload-Length header"), http.StatusBadRequest) ErrInvalidOffset = NewHTTPError(errors.New("missing or invalid Upload-Offset header"), http.StatusBadRequest) ErrNotFound = NewHTTPError(errors.New("upload not found"), http.StatusNotFound) ErrFileLocked = NewHTTPError(errors.New("file currently locked"), 423) // Locked (WebDAV) (RFC 4918) ErrMismatchOffset = NewHTTPError(errors.New("mismatched offset"), http.StatusConflict) ErrSizeExceeded = NewHTTPError(errors.New("resource's size exceeded"), http.StatusRequestEntityTooLarge) ErrNotImplemented = NewHTTPError(errors.New("feature not implemented"), http.StatusNotImplemented) ErrUploadNotFinished = NewHTTPError(errors.New("one of the partial uploads is not finished"), http.StatusBadRequest) ErrInvalidConcat = NewHTTPError(errors.New("invalid Upload-Concat header"), http.StatusBadRequest) ErrModifyFinal = NewHTTPError(errors.New("modifying a final upload is not allowed"), http.StatusForbidden) ErrUploadLengthAndUploadDeferLength = NewHTTPError(errors.New("provided both Upload-Length and Upload-Defer-Length"), http.StatusBadRequest) ErrInvalidUploadDeferLength = NewHTTPError(errors.New("invalid Upload-Defer-Length header"), http.StatusBadRequest) ErrUploadStoppedByServer = NewHTTPError(errors.New("upload has been stopped by server"), http.StatusBadRequest) ErrOriginNotAllowed = NewHTTPError(errors.New("request origin is not allowed"), http.StatusForbidden) )
var DefaultCorsConfig = CorsConfig{ Disable: false, AllowOrigin: regexp.MustCompile(".*"), AllowCredentials: false, AllowMethods: "POST, HEAD, PATCH, OPTIONS, GET, DELETE", AllowHeaders: "Authorization, Origin, X-Requested-With, X-Request-ID, X-HTTP-Method-Override, Content-Type, Upload-Length, Upload-Offset, Tus-Resumable, Upload-Metadata, Upload-Defer-Length, Upload-Concat, Upload-Incomplete, Upload-Draft-Interop-Version", MaxAge: "86400", ExposeHeaders: "Upload-Offset, Location, Upload-Length, Tus-Version, Tus-Resumable, Tus-Max-Size, Tus-Extension, Upload-Metadata, Upload-Defer-Length, Upload-Concat, Upload-Incomplete, Upload-Draft-Interop-Version", }
DefaultCorsConfig is the configuration that will be used in none is provided.
Functions ¶
func ParseMetadataHeader ¶
ParseMetadataHeader parses the Upload-Metadata header as defined in the File Creation extension. e.g. Upload-Metadata: name bHVucmpzLnBuZw==,type aW1hZ2UvcG5n
func SerializeMetadataHeader ¶
SerializeMetadataHeader serializes a map of strings into the Upload-Metadata header format used in the response for HEAD requests. e.g. Upload-Metadata: name bHVucmpzLnBuZw==,type aW1hZ2UvcG5n
Types ¶
type ConcatableUpload ¶
type ConcatableUpload interface { // ConcatUploads concatenates the content from the provided partial uploads // and writes the result in the destination upload. // The caller (usually the handler) must and will ensure that this // destination upload has been created before with enough space to hold all // partial uploads. The order, in which the partial uploads are supplied, // must be respected during concatenation. ConcatUploads(ctx context.Context, partialUploads []Upload) error }
type ConcaterDataStore ¶
type ConcaterDataStore interface {
AsConcatableUpload(upload Upload) ConcatableUpload
}
ConcaterDataStore is the interface required to be implemented if the Concatenation extension should be enabled. Only in this case, the handler will parse and respect the Upload-Concat header.
type Config ¶
type Config struct { // StoreComposer points to the store composer from which the core data store // and optional dependencies should be taken. May only be nil if DataStore is // set. // TODO: Remove pointer? StoreComposer *StoreComposer // MaxSize defines how many bytes may be stored in one single upload. If its // value is is 0 or smaller no limit will be enforced. MaxSize int64 // BasePath defines the URL path used for handling uploads, e.g. "/files/". // If no trailing slash is presented it will be added. You may specify an // absolute URL containing a scheme, e.g. "http://tus.io" BasePath string // EnableExperimentalProtocol controls whether the new resumable upload protocol draft // from the IETF's HTTP working group is accepted next to the current tus v1 protocol. // See https://datatracker.ietf.org/doc/draft-ietf-httpbis-resumable-upload/ EnableExperimentalProtocol bool // DisableDownload indicates whether the server will refuse downloads of the // uploaded file, by not mounting the GET handler. DisableDownload bool // DisableTermination indicates whether the server will refuse termination // requests of the uploaded file, by not mounting the DELETE handler. DisableTermination bool // Disable cors headers. If set to true, tusd will not send any CORS related header. // This is useful if you have a proxy sitting in front of tusd that handles CORS. // // Deprecated: All CORS-related settings are available in via the Cors field. Use // Cors.Disable instead of DisableCors. DisableCors bool // Cors can be used to customize the handling of Cross-Origin Resource Sharing (CORS). // See the CorsConfig struct for more details. // Defaults to DefaultCorsConfig. Cors *CorsConfig // NotifyCompleteUploads indicates whether sending notifications about // completed uploads using the CompleteUploads channel should be enabled. NotifyCompleteUploads bool // NotifyTerminatedUploads indicates whether sending notifications about // terminated uploads using the TerminatedUploads channel should be enabled. NotifyTerminatedUploads bool // NotifyUploadProgress indicates whether sending notifications about // the upload progress using the UploadProgress channel should be enabled. NotifyUploadProgress bool // NotifyCreatedUploads indicates whether sending notifications about // the upload having been created using the CreatedUploads channel should be enabled. NotifyCreatedUploads bool // Logger is the logger to use internally, mostly for printing requests. Logger *log.Logger // Respect the X-Forwarded-Host, X-Forwarded-Proto and Forwarded headers // potentially set by proxies when generating an absolute URL in the // response to POST requests. RespectForwardedHeaders bool // PreUploadCreateCallback will be invoked before a new upload is created, if the // property is supplied. If the callback returns nil, the upload will be created. // Otherwise the HTTP request will be aborted. This can be used to implement // validation of upload metadata etc. PreUploadCreateCallback func(hook HookEvent) error // PreFinishResponseCallback will be invoked after an upload is completed but before // a response is returned to the client. Error responses from the callback will be passed // back to the client. This can be used to implement post-processing validation. PreFinishResponseCallback func(hook HookEvent) error // contains filtered or unexported fields }
Config provides a way to configure the Handler depending on your needs.
type CorsConfig ¶ added in v1.13.0
type CorsConfig struct { // Disable instructs the handler to ignore all CORS-related headers and never set a // CORS-related header in a response. This is useful if CORS is already handled by a proxy. Disable bool // AllowOrigin is a regular expression used to check if a request is allowed to participate in the // CORS protocol. If the request's Origin header matches the regular expression, CORS is allowed. // If not, a 403 Forbidden response is sent, rejecting the CORS request. AllowOrigin *regexp.Regexp // AllowCredentials defines whether the `Access-Control-Allow-Credentials: true` header should be // included in CORS responses. This allows clients to share credentials using the Cookie and // Authorization header AllowCredentials bool // AllowMethods defines the value for the `Access-Control-Allow-Methods` header in the response to // preflight requests. You can add custom methods here, but make sure that all tus-specific methods // from DefaultConfig.AllowMethods are included as well. AllowMethods string // AllowHeaders defines the value for the `Access-Control-Allow-Headers` header in the response to // preflight requests. You can add custom headers here, but make sure that all tus-specific header // from DefaultConfig.AllowHeaders are included as well. AllowHeaders string // MaxAge defines the value for the `Access-Control-Max-Age` header in the response to preflight // requests. MaxAge string // ExposeHeaders defines the value for the `Access-Control-Expose-Headers` header in the response to // actual requests. You can add custom headers here, but make sure that all tus-specific header // from DefaultConfig.ExposeHeaders are included as well. ExposeHeaders string }
CorsConfig provides a way to customize the the handling of Cross-Origin Resource Sharing (CORS). More details about CORS are available at https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS.
type DataStore ¶
type DataStore interface { // Create a new upload using the size as the file's length. The method must // return an unique id which is used to identify the upload. If no backend // (e.g. Riak) specifes the id you may want to use the uid package to // generate one. The properties Size and MetaData will be filled. NewUpload(ctx context.Context, info FileInfo) (upload Upload, err error) GetUpload(ctx context.Context, id string) (upload Upload, err error) }
type ErrorsTotalMap ¶
type ErrorsTotalMap struct {
// contains filtered or unexported fields
}
ErrorsTotalMap stores the counters for the different HTTP errors.
func (*ErrorsTotalMap) Load ¶
func (e *ErrorsTotalMap) Load() map[HTTPError]*uint64
Load retrieves the map of the counter pointers atomically
type FileInfo ¶
type FileInfo struct { ID string // Total file size in bytes specified in the NewUpload call Size int64 // Indicates whether the total file size is deferred until later SizeIsDeferred bool // Offset in bytes (zero-based) Offset int64 MetaData MetaData // Indicates that this is a partial upload which will later be used to form // a final upload by concatenation. Partial uploads should not be processed // when they are finished since they are only incomplete chunks of files. IsPartial bool // Indicates that this is a final upload IsFinal bool // If the upload is a final one (see IsFinal) this will be a non-empty // ordered slice containing the ids of the uploads of which the final upload // will consist after concatenation. PartialUploads []string // Storage contains information about where the data storage saves the upload, // for example a file path. The available values vary depending on what data // store is used. This map may also be nil. Storage map[string]string // contains filtered or unexported fields }
func (FileInfo) StopUpload ¶
func (f FileInfo) StopUpload()
StopUpload interrupts an running upload from the server-side. This means that the current request body is closed, so that the data store does not get any more data. Furthermore, a response is sent to notify the client of the interrupting and the upload is terminated (if supported by the data store), so the upload cannot be resumed anymore.
type HTTPError ¶
HTTPError represents an error with an additional status code attached which may be used when this error is sent in a HTTP response. See the net/http package for standardized status codes.
func NewHTTPError ¶
NewHTTPError adds the given status code to the provided error and returns the new error instance. The status code may be used in corresponding HTTP responses. See the net/http package for standardized status codes.
type HTTPRequest ¶
type HTTPRequest struct { // Method is the HTTP method, e.g. POST or PATCH Method string // URI is the full HTTP request URI, e.g. /files/fooo URI string // RemoteAddr contains the network address that sent the request RemoteAddr string // Header contains all HTTP headers as present in the HTTP request. Header http.Header }
HTTPRequest contains basic details of an incoming HTTP request.
type Handler ¶
type Handler struct { *UnroutedHandler http.Handler }
Handler is a ready to use handler with routing (using pat)
func NewHandler ¶
NewHandler creates a routed tus protocol handler. This is the simplest way to use tusd but may not be as configurable as you require. If you are integrating this into an existing app you may like to use tusd.NewUnroutedHandler instead. Using tusd.NewUnroutedHandler allows the tus handlers to be combined into your existing router (aka mux) directly. It also allows the GET and DELETE endpoints to be customized. These are not part of the protocol so can be changed depending on your needs.
type HookEvent ¶
type HookEvent struct { // Upload contains information about the upload that caused this hook // to be fired. Upload FileInfo // HTTPRequest contains details about the HTTP request that reached // tusd. HTTPRequest HTTPRequest }
HookEvent represents an event from tusd which can be handled by the application.
type LengthDeclarableUpload ¶
type LengthDeferrerDataStore ¶
type LengthDeferrerDataStore interface {
AsLengthDeclarableUpload(upload Upload) LengthDeclarableUpload
}
LengthDeferrerDataStore is the interface that must be implemented if the creation-defer-length extension should be enabled. The extension enables a client to upload files when their total size is not yet known. Instead, the client must send the total size as soon as it becomes known.
type Lock ¶
type Lock interface { // Lock attempts to obtain an exclusive lock for the upload specified // by its id. // If this operation fails because the resource is already locked, the // tusd.ErrFileLocked must be returned. If no error is returned, the attempt // is consider to be successful and the upload to be locked until UnlockUpload // is invoked for the same upload. Lock() error // Unlock releases an existing lock for the given upload. Unlock() error }
Lock is the interface for a lock as returned from a Locker.
type Locker ¶
type Locker interface { // NewLock creates a new unlocked lock object for the given upload ID. NewLock(id string) (Lock, error) }
Locker is the interface required for custom lock persisting mechanisms. Common ways to store this information is in memory, on disk or using an external service, such as Redis. When multiple processes are attempting to access an upload, whether it be by reading or writing, a synchronization mechanism is required to prevent data corruption, especially to ensure correct offset values and the proper order of chunks inside a single upload.
type Metrics ¶
type Metrics struct { // RequestTotal counts the number of incoming requests per method RequestsTotal map[string]*uint64 // ErrorsTotal counts the number of returned errors by their message ErrorsTotal *ErrorsTotalMap BytesReceived *uint64 UploadsFinished *uint64 UploadsCreated *uint64 UploadsTerminated *uint64 }
Metrics provides numbers about the usage of the tusd handler. Since these may be accessed from multiple goroutines, it is necessary to read and modify them atomically using the functions exposed in the sync/atomic package, such as atomic.LoadUint64. In addition the maps must not be modified to prevent data races.
type StoreComposer ¶
type StoreComposer struct { Core DataStore UsesTerminater bool Terminater TerminaterDataStore UsesLocker bool Locker Locker UsesConcater bool Concater ConcaterDataStore UsesLengthDeferrer bool LengthDeferrer LengthDeferrerDataStore }
StoreComposer represents a composable data store. It consists of the core data store and optional extensions. Please consult the package's overview for a more detailed introduction in how to use this structure.
func NewStoreComposer ¶
func NewStoreComposer() *StoreComposer
NewStoreComposer creates a new and empty store composer.
Example ¶
package main import ( "github.com/tus/tusd/pkg/filestore" "github.com/tus/tusd/pkg/handler" "github.com/tus/tusd/pkg/memorylocker" ) func main() { composer := handler.NewStoreComposer() fs := filestore.New("./data") fs.UseIn(composer) ml := memorylocker.New() ml.UseIn(composer) config := handler.Config{ StoreComposer: composer, } _, _ = handler.NewHandler(config) }
Output:
func (*StoreComposer) Capabilities ¶
func (store *StoreComposer) Capabilities() string
Capabilities returns a string representing the provided extensions in a human-readable format meant for debugging.
func (*StoreComposer) UseConcater ¶
func (store *StoreComposer) UseConcater(ext ConcaterDataStore)
func (*StoreComposer) UseCore ¶
func (store *StoreComposer) UseCore(core DataStore)
UseCore will set the used core data store. If the argument is nil, the property will be unset.
func (*StoreComposer) UseLengthDeferrer ¶
func (store *StoreComposer) UseLengthDeferrer(ext LengthDeferrerDataStore)
func (*StoreComposer) UseLocker ¶
func (store *StoreComposer) UseLocker(ext Locker)
func (*StoreComposer) UseTerminater ¶
func (store *StoreComposer) UseTerminater(ext TerminaterDataStore)
type TerminatableUpload ¶
type TerminaterDataStore ¶
type TerminaterDataStore interface {
AsTerminatableUpload(upload Upload) TerminatableUpload
}
TerminaterDataStore is the interface which must be implemented by DataStores if they want to receive DELETE requests using the Handler. If this interface is not implemented, no request handler for this method is attached.
type UnroutedHandler ¶
type UnroutedHandler struct { // CompleteUploads is used to send notifications whenever an upload is // completed by a user. The HookEvent will contain information about this // upload after it is completed. Sending to this channel will only // happen if the NotifyCompleteUploads field is set to true in the Config // structure. Notifications will also be sent for completions using the // Concatenation extension. CompleteUploads chan HookEvent // TerminatedUploads is used to send notifications whenever an upload is // terminated by a user. The HookEvent will contain information about this // upload gathered before the termination. Sending to this channel will only // happen if the NotifyTerminatedUploads field is set to true in the Config // structure. TerminatedUploads chan HookEvent // UploadProgress is used to send notifications about the progress of the // currently running uploads. For each open PATCH request, every second // a HookEvent instance will be send over this channel with the Offset field // being set to the number of bytes which have been transfered to the server. // Please be aware that this number may be higher than the number of bytes // which have been stored by the data store! Sending to this channel will only // happen if the NotifyUploadProgress field is set to true in the Config // structure. UploadProgress chan HookEvent // CreatedUploads is used to send notifications about the uploads having been // created. It triggers post creation and therefore has all the HookEvent incl. // the ID available already. It facilitates the post-create hook. Sending to // this channel will only happen if the NotifyCreatedUploads field is set to // true in the Config structure. CreatedUploads chan HookEvent // Metrics provides numbers of the usage for this handler. Metrics Metrics // contains filtered or unexported fields }
UnroutedHandler exposes methods to handle requests as part of the tus protocol, such as PostFile, HeadFile, PatchFile and DelFile. In addition the GetFile method is provided which is, however, not part of the specification.
func NewUnroutedHandler ¶
func NewUnroutedHandler(config Config) (*UnroutedHandler, error)
NewUnroutedHandler creates a new handler without routing using the given configuration. It exposes the http handlers which need to be combined with a router (aka mux) of your choice. If you are looking for preconfigured handler see NewHandler.
func (*UnroutedHandler) DelFile ¶
func (handler *UnroutedHandler) DelFile(w http.ResponseWriter, r *http.Request)
DelFile terminates an upload permanently.
func (*UnroutedHandler) GetFile ¶
func (handler *UnroutedHandler) GetFile(w http.ResponseWriter, r *http.Request)
GetFile handles requests to download a file using a GET request. This is not part of the specification.
func (*UnroutedHandler) HeadFile ¶
func (handler *UnroutedHandler) HeadFile(w http.ResponseWriter, r *http.Request)
HeadFile returns the length and offset for the HEAD request
func (*UnroutedHandler) Middleware ¶
func (handler *UnroutedHandler) Middleware(h http.Handler) http.Handler
Middleware checks various aspects of the request and ensures that it conforms with the spec. Also handles method overriding for clients which cannot make PATCH AND DELETE requests. If you are using the tusd handlers directly you will need to wrap at least the POST and PATCH endpoints in this middleware.
func (*UnroutedHandler) PatchFile ¶
func (handler *UnroutedHandler) PatchFile(w http.ResponseWriter, r *http.Request)
PatchFile adds a chunk to an upload. This operation is only allowed if enough space in the upload is left.
func (*UnroutedHandler) PostFile ¶
func (handler *UnroutedHandler) PostFile(w http.ResponseWriter, r *http.Request)
PostFile creates a new file upload using the datastore after validating the length and parsing the metadata.
func (*UnroutedHandler) PostFileV2 ¶ added in v1.12.0
func (handler *UnroutedHandler) PostFileV2(w http.ResponseWriter, r *http.Request)
PostFile creates a new file upload using the datastore after validating the length and parsing the metadata.
func (*UnroutedHandler) SupportedExtensions ¶
func (handler *UnroutedHandler) SupportedExtensions() string
SupportedExtensions returns a comma-separated list of the supported tus extensions. The availability of an extension usually depends on whether the provided data store implements some additional interfaces.
type Upload ¶
type Upload interface { // Write the chunk read from src into the file specified by the id at the // given offset. The handler will take care of validating the offset and // limiting the size of the src to not overflow the file's size. It may // return an os.ErrNotExist which will be interpreted as a 404 Not Found. // It will also lock resources while they are written to ensure only one // write happens per time. // The function call must return the number of bytes written. WriteChunk(ctx context.Context, offset int64, src io.Reader) (int64, error) // Read the fileinformation used to validate the offset and respond to HEAD // requests. It may return an os.ErrNotExist which will be interpreted as a // 404 Not Found. GetInfo(ctx context.Context) (FileInfo, error) // GetReader returns a reader which allows iterating of the content of an // upload specified by its ID. It should attempt to provide a reader even if // the upload has not been finished yet but it's not required. // If the returned reader also implements the io.Closer interface, the // Close() method will be invoked once everything has been read. // If the given upload could not be found, the error tusd.ErrNotFound should // be returned. GetReader(ctx context.Context) (io.Reader, error) // FinisherDataStore is the interface which can be implemented by DataStores // which need to do additional operations once an entire upload has been // completed. These tasks may include but are not limited to freeing unused // resources or notifying other services. For example, S3Store uses this // interface for removing a temporary object. // FinishUpload executes additional operations for the finished upload which // is specified by its ID. FinishUpload(ctx context.Context) error }