This page is automatically translated.
TeraCLOUD is cloud storage using an open protocol "WebDAV". It has a data area for each user, and adopts HTTPS for transmission and reception.
If the application supports WebDAV, basically it can easily obtain compatibility with TeraCLOUD, so it is possible to call TeraCLOUD compatible application with it.
The TeraCLOUD icon can be obtained freely from the download page, so application developers can declare correspondence using icons and names after conducting the operation test at TeraCLOUD by each company and their own judgment.
However, since TeraCLOUD has a different WebDAV connection destination URL (actually, each accommodation server) for each user, in order to connect to TeraCLOUD from your application, the user sets his own connection destination URL from "My Page" It is necessary to acquire and setup connection destination with ID and password.
As a developer, if you think that this is inconvenient to the user and this will not promote the use of the application, you can get the user's connected URL with json simply by calling the user REST-API once, so the user Just entering the ID and password will complete the setup. (At this time, it is also technically possible to give TeraCLOUD bonus capacity of the application name to users using the application, and to further promote the use, but this is to talk with the business development team I will skip this document, but since the development team knows that there is a track record of distributing 100 GB free of charge to application users, I think that it should be communicated to the application key when applying for API key acquisition.
In this way, TeraCLOUD has resources that can not be covered with the WebDAV protocol, and it is necessary to use the dedicated REST API of TeraCLOUD in order to access it.
This resource is as follows.
- Authentication information
- Data set (file system and snapshot)
- Get file meta information
By using these APIs, the application can not only take file transfers but also take snapshots, divide areas, create areas that users can not see in the usual way, do a variety of applications You can do.
This document explains these in this document.