i just noticed a corrupted crypt filename and not sure what corrupted it?
DEBUG : ~tmp2F_e8r7nf8ge88uspuaid7912ea796pktenj1ciut56shf7pcl04ns0: Skipping undecryptable file name: illegal base32 data at input byte 0
the strange thing is that, if i remove the leading ~tmp2F_, the remainder is a valid crypt filename e8r7nf8ge88uspuaid7912ea796pktenj1ciut56shf7pcl04ns0
and the leading text is not just some random text. ~tmp
+ 2F - which is a forward slash
so what caused this to happen?
issue with rclone
issue with onedrive
note: the python script that i use to run rclone, creates a debug log.
i searched thru the logs and found this first occurrence on 20210628.165244
i uploaded that log file C:\data\rclone\logs\keepass_files_onedrivevb_crypt\20210628.165244\rclone.log
to https://pastebin.com/raw/tcDCD6vA
What is your rclone version (output from rclone version)
at that time of the first occurnce, `v1.55.1` on windows
as for the manual commands run in the post, using
rclone v1.56.2
- os/version: ubuntu 20.04 (64 bit)
- os/kernel: 5.10.60.1-microsoft-standard-WSL2 (x86_64)
- os/type: linux
- os/arch: amd64
- go/version: go1.16.8
- go/linking: static
- go/tags: none
Which cloud storage system are you using? (eg Google Drive)
the original crypt remote was in onedrive.
for testing, i isolated the corrupt file, copied it to local and created a on-the-fly remote containing that single file.
The command you were trying to run (eg rclone copy /tmp remote:tmp)
hi,
i think you are missing the point of my post.
imho, this is not just a simple mix-up of crypted and non-crypted flies.
in that onedrive crypt there is single filename that is not correct.
and the corrupted filename is composed of two parts ~tmp2F_e8r7nf8ge88uspuaid7912ea796pktenj1ciut56shf7pcl04ns0
note that as seen in rclone lsl crypt: e8r7nf8ge88uspuaid7912ea796pktenj1ciut56shf7pcl04ns0 is a valid crypted filename which decrypts to KDBX_PasswordsOnly_TXT.xsl
NOTICE: KDBX_PasswordsOnly_TXT.xsl: Encrypts to "e8r7nf8ge88uspuaid7912ea796pktenj1ciut56shf7pcl04ns0"
i posted the debug log where it first occurred at pastebin.
did you take a look at it?
for testing, i copied that singe file from onedrive crypt to local, created an on-the-fly remote and ran the rclone lsl on that.
i am looking for what corrupted that filename, either rclone did it or onedrive did it.
if you think there is a third way, please let me know?
what makes you think that?
the crypt is created on the fly, using export RCLONE_CONFIG_CRYPT_TYPE=crypt
Agree, that is a worrying observation and you should try to find the root cause.
I just scanned my crypt on SFTP and found no issues, it is created by sync’s.
I see your issue affects an Excel file. Do you use Excel on top of a mount of a crypt on top of OneDrive? (Just to understand all the variables involved)
Yes, I think I did miss that it was set in the environment. I am not used to that even for on-the-fly. Sorry about that.
It is odd that it is adding the ~tmp2F_ part. It would still be a bug but does it do that for different passwords (obviously not useful but would be interesting to see). What about for the same passwords, etc but done in a config file?
thanks much, i did search the forum and missed that.
based on my debug log, i was thinking/hoping it was an issue with multipart uploads with onedrive.
tho i still want to confirm what was to blame, rclone, onedrive, nework glitch or what?
DEBUG : qkla6d84saeepjt9a8fphrvivk/e8r7nf8ge88uspuaid7912ea796pktenj1ciut56shf7pcl04ns0: Cancelling multipart upload: invalidRequest: Invalid request
NOTICE: qkla6d84saeepjt9a8fphrvivk/e8r7nf8ge88uspuaid7912ea796pktenj1ciut56shf7pcl04ns0: Failed to cancel multipart upload: itemNotFound: The upload session was not found
ERROR : XSL/KDBX_PasswordsOnly_TXT.xsl: Failed to copy: invalidRequest: Invalid request
before i posted, i did a scan of all the crypts i have in all different cloud providers and local crypts.
i only find that one instance i posted about.
in addition i have approx. 100,000 rclone debug log files spread over a bunch of windows machines, mostly as backup servers all running that same python script rcloner.exe.
i scanned all of them for various text such as
tmp - i filtered out any false positives.
undecryptable
in the end, i did not find a second instance.
so i think it is safe to state that this was a one-time freak glitch, that despite having a debug log of the first occurrence, i will never know exactly that happened.