You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

275 lines
8.3KB

  1. /*
  2. * Copyright (c) 2013 Lukasz Marek <lukasz.m.luki@gmail.com>
  3. *
  4. * This file is part of FFmpeg.
  5. *
  6. * FFmpeg is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 2.1 of the License, or (at your option) any later version.
  10. *
  11. * FFmpeg is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with FFmpeg; if not, write to the Free Software
  18. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  19. */
  20. #include <fcntl.h>
  21. #include <libssh/sftp.h>
  22. #include "libavutil/avstring.h"
  23. #include "libavutil/opt.h"
  24. #include "libavutil/attributes.h"
  25. #include "avformat.h"
  26. #include "internal.h"
  27. #include "url.h"
  28. typedef struct {
  29. const AVClass *class;
  30. ssh_session session;
  31. sftp_session sftp;
  32. sftp_file file;
  33. int64_t filesize;
  34. int rw_timeout;
  35. int trunc;
  36. char *priv_key;
  37. } LIBSSHContext;
  38. static av_cold int libssh_authentication(LIBSSHContext *libssh, const char *user, const char *password)
  39. {
  40. int authorized = 0;
  41. int auth_methods;
  42. if (user)
  43. ssh_options_set(libssh->session, SSH_OPTIONS_USER, user);
  44. auth_methods = ssh_userauth_list(libssh->session, NULL);
  45. if (auth_methods & SSH_AUTH_METHOD_PUBLICKEY) {
  46. if (libssh->priv_key) {
  47. ssh_string pub_key;
  48. ssh_private_key priv_key;
  49. int type;
  50. if (!ssh_try_publickey_from_file(libssh->session, libssh->priv_key, &pub_key, &type)) {
  51. priv_key = privatekey_from_file(libssh->session, libssh->priv_key, type, password);
  52. if (ssh_userauth_pubkey(libssh->session, NULL, pub_key, priv_key) == SSH_AUTH_SUCCESS) {
  53. av_log(libssh, AV_LOG_DEBUG, "Authentication successful with selected private key.\n");
  54. authorized = 1;
  55. }
  56. } else {
  57. av_log(libssh, AV_LOG_DEBUG, "Invalid key is provided.\n");
  58. return AVERROR(EACCES);
  59. }
  60. } else if (ssh_userauth_autopubkey(libssh->session, password) == SSH_AUTH_SUCCESS) {
  61. av_log(libssh, AV_LOG_DEBUG, "Authentication successful with auto selected key.\n");
  62. authorized = 1;
  63. }
  64. }
  65. if (!authorized && (auth_methods & SSH_AUTH_METHOD_PASSWORD)) {
  66. if (ssh_userauth_password(libssh->session, NULL, password) == SSH_AUTH_SUCCESS) {
  67. av_log(libssh, AV_LOG_DEBUG, "Authentication successful with password.\n");
  68. authorized = 1;
  69. }
  70. }
  71. if (!authorized) {
  72. av_log(libssh, AV_LOG_ERROR, "Authentication failed.\n");
  73. return AVERROR(EACCES);
  74. }
  75. return 0;
  76. }
  77. static int libssh_close(URLContext *h)
  78. {
  79. LIBSSHContext *s = h->priv_data;
  80. if (s->file)
  81. sftp_close(s->file);
  82. if (s->sftp)
  83. sftp_free(s->sftp);
  84. if (s->session) {
  85. ssh_disconnect(s->session);
  86. ssh_free(s->session);
  87. }
  88. return 0;
  89. }
  90. static int libssh_open(URLContext *h, const char *url, int flags)
  91. {
  92. static const int verbosity = SSH_LOG_NOLOG;
  93. LIBSSHContext *s = h->priv_data;
  94. char proto[10], path[MAX_URL_SIZE], hostname[1024], credencials[1024];
  95. int port = 22, access, ret;
  96. long timeout = s->rw_timeout * 1000;
  97. const char *user = NULL, *pass = NULL;
  98. char *end = NULL;
  99. sftp_attributes stat;
  100. av_url_split(proto, sizeof(proto),
  101. credencials, sizeof(credencials),
  102. hostname, sizeof(hostname),
  103. &port,
  104. path, sizeof(path),
  105. url);
  106. if (port <= 0 || port > 65535)
  107. port = 22;
  108. if (!(s->session = ssh_new())) {
  109. ret = AVERROR(ENOMEM);
  110. goto fail;
  111. }
  112. user = av_strtok(credencials, ":", &end);
  113. pass = av_strtok(end, ":", &end);
  114. ssh_options_set(s->session, SSH_OPTIONS_HOST, hostname);
  115. ssh_options_set(s->session, SSH_OPTIONS_PORT, &port);
  116. ssh_options_set(s->session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity);
  117. if (timeout > 0)
  118. ssh_options_set(s->session, SSH_OPTIONS_TIMEOUT_USEC, &timeout);
  119. if (ssh_connect(s->session) != SSH_OK) {
  120. av_log(h, AV_LOG_ERROR, "Connection failed. %s\n", ssh_get_error(s->session));
  121. ret = AVERROR(EIO);
  122. goto fail;
  123. }
  124. if ((ret = libssh_authentication(s, user, pass)) < 0)
  125. goto fail;
  126. if (!(s->sftp = sftp_new(s->session))) {
  127. av_log(h, AV_LOG_ERROR, "SFTP session creation failed: %s\n", ssh_get_error(s->session));
  128. ret = AVERROR(ENOMEM);
  129. goto fail;
  130. }
  131. if (sftp_init(s->sftp) != SSH_OK) {
  132. av_log(h, AV_LOG_ERROR, "Error initializing sftp session: %s\n", ssh_get_error(s->session));
  133. ret = AVERROR(EIO);
  134. goto fail;
  135. }
  136. if ((flags & AVIO_FLAG_WRITE) && (flags & AVIO_FLAG_READ)) {
  137. access = O_CREAT | O_RDWR;
  138. if (s->trunc)
  139. access |= O_TRUNC;
  140. } else if (flags & AVIO_FLAG_WRITE) {
  141. access = O_CREAT | O_WRONLY;
  142. if (s->trunc)
  143. access |= O_TRUNC;
  144. } else {
  145. access = O_RDONLY;
  146. }
  147. /* 0666 = -rw-rw-rw- = read+write for everyone, minus umask */
  148. if (!(s->file = sftp_open(s->sftp, path, access, 0666))) {
  149. av_log(h, AV_LOG_ERROR, "Error opening sftp file: %s\n", ssh_get_error(s->session));
  150. ret = AVERROR(EIO);
  151. goto fail;
  152. }
  153. if (!(stat = sftp_fstat(s->file))) {
  154. av_log(h, AV_LOG_WARNING, "Cannot stat remote file %s.\n", path);
  155. s->filesize = -1;
  156. } else {
  157. s->filesize = stat->size;
  158. sftp_attributes_free(stat);
  159. }
  160. return 0;
  161. fail:
  162. libssh_close(h);
  163. return ret;
  164. }
  165. static int64_t libssh_seek(URLContext *h, int64_t pos, int whence)
  166. {
  167. LIBSSHContext *s = h->priv_data;
  168. int64_t newpos;
  169. if (s->filesize == -1 && (whence == AVSEEK_SIZE || whence == SEEK_END)) {
  170. av_log(h, AV_LOG_ERROR, "Error during seeking.\n");
  171. return AVERROR(EIO);
  172. }
  173. switch(whence) {
  174. case AVSEEK_SIZE:
  175. return s->filesize;
  176. case SEEK_SET:
  177. newpos = pos;
  178. break;
  179. case SEEK_CUR:
  180. newpos = sftp_tell64(s->file);
  181. break;
  182. case SEEK_END:
  183. newpos = s->filesize + pos;
  184. break;
  185. default:
  186. return AVERROR(EINVAL);
  187. }
  188. if (sftp_seek64(s->file, newpos)) {
  189. av_log(h, AV_LOG_ERROR, "Error during seeking.\n");
  190. return AVERROR(EIO);
  191. }
  192. return newpos;
  193. }
  194. static int libssh_read(URLContext *h, unsigned char *buf, int size)
  195. {
  196. LIBSSHContext *s = h->priv_data;
  197. int bytes_read;
  198. if ((bytes_read = sftp_read(s->file, buf, size)) < 0) {
  199. av_log(h, AV_LOG_ERROR, "Read error.\n");
  200. return AVERROR(EIO);
  201. }
  202. return bytes_read;
  203. }
  204. static int libssh_write(URLContext *h, const unsigned char *buf, int size)
  205. {
  206. LIBSSHContext *s = h->priv_data;
  207. int bytes_written;
  208. if ((bytes_written = sftp_write(s->file, buf, size)) < 0) {
  209. av_log(h, AV_LOG_ERROR, "Write error.\n");
  210. return AVERROR(EIO);
  211. }
  212. return bytes_written;
  213. }
  214. #define OFFSET(x) offsetof(LIBSSHContext, x)
  215. #define D AV_OPT_FLAG_DECODING_PARAM
  216. #define E AV_OPT_FLAG_ENCODING_PARAM
  217. static const AVOption options[] = {
  218. {"timeout", "set timeout of socket I/O operations", OFFSET(rw_timeout), AV_OPT_TYPE_INT, {.i64 = -1}, -1, INT_MAX, D|E },
  219. {"truncate", "Truncate existing files on write", OFFSET(trunc), AV_OPT_TYPE_INT, { .i64 = 1 }, 0, 1, E },
  220. {"private_key", "set path to private key", OFFSET(priv_key), AV_OPT_TYPE_STRING, { .str = NULL }, 0, 0, D|E },
  221. {NULL}
  222. };
  223. static const AVClass libssh_context_class = {
  224. .class_name = "libssh",
  225. .item_name = av_default_item_name,
  226. .option = options,
  227. .version = LIBAVUTIL_VERSION_INT,
  228. };
  229. URLProtocol ff_libssh_protocol = {
  230. .name = "sftp",
  231. .url_open = libssh_open,
  232. .url_read = libssh_read,
  233. .url_write = libssh_write,
  234. .url_seek = libssh_seek,
  235. .url_close = libssh_close,
  236. .priv_data_size = sizeof(LIBSSHContext),
  237. .priv_data_class = &libssh_context_class,
  238. .flags = URL_PROTOCOL_FLAG_NETWORK,
  239. };