rm

rm #

Usage #

./uplink.exe rm sj://BUCKET/KEY [flags]
uplink rm sj://BUCKET/KEY [flags]
uplink rm sj://BUCKET/KEY [flags]

Flags #

FlagDescription
--access stringthe serialized access, or name of the access to use
--encryptedif true, treat paths as base64-encoded encrypted paths
--help, -hhelp for rm
--parallelism, -p intControls how many removes to perform in parallel (default 1)
--pendingRemove pending object uploads instead
--recursive, -rRemove recursively
--help, -hhelp for rm

Examples #

Delete an object #

./uplink.exe rm sj://cakes/cheesecake.jpg
uplink rm sj://cakes/cheesecake.jpg
uplink rm sj://cakes/cheesecake.jpg

Delete an encrypted object #

If an object has been created with another encryption key, you won’t be able to read it, but you can delete it. In order to delete an encrypted object, you have to know its encrypted path. To retrieve it, you can use the list command ls with the encrypted file. For instance, to list the encrypted path of the objects in a bucket sj://cakes you could use:

./uplink.exe ls sj://cakes --encrypted
uplink ls sj://cakes --encrypted
uplink ls sj://cakes --encrypted

You can then use this path to delete the encrypted object:

./uplink.exe rm --encrypted sj://cakes/Ao8rmi2hw5v8_SS2GRokJwqkzQ2j9wXRH2Ll-1owEGPwIWMyu8tj5YCCig==
uplink rm --encrypted sj://cakes/Ao8rmi2hw5v8_SS2GRokJwqkzQ2j9wXRH2Ll-1owEGPwIWMyu8tj5YCCig==
uplink rm --encrypted sj://cakes/Ao8rmi2hw5v8_SS2GRokJwqkzQ2j9wXRH2Ll-1owEGPwIWMyu8tj5YCCig==