You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

311 lines
9.4KB

  1. /*
  2. * Copyright (c) 2013 Lukasz Marek <lukasz.m.luki@gmail.com>
  3. *
  4. * This file is part of FFmpeg.
  5. *
  6. * FFmpeg is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 2.1 of the License, or (at your option) any later version.
  10. *
  11. * FFmpeg is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with FFmpeg; if not, write to the Free Software
  18. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  19. */
  20. #include <fcntl.h>
  21. #define LIBSSH_STATIC
  22. #include <libssh/sftp.h>
  23. #include "libavutil/avstring.h"
  24. #include "libavutil/opt.h"
  25. #include "libavutil/attributes.h"
  26. #include "avformat.h"
  27. #include "internal.h"
  28. #include "url.h"
  29. typedef struct {
  30. const AVClass *class;
  31. ssh_session session;
  32. sftp_session sftp;
  33. sftp_file file;
  34. int64_t filesize;
  35. int rw_timeout;
  36. int trunc;
  37. char *priv_key;
  38. } LIBSSHContext;
  39. static av_cold int libssh_create_ssh_session(LIBSSHContext *libssh, const char* hostname, unsigned int port)
  40. {
  41. static const int verbosity = SSH_LOG_NOLOG;
  42. if (!(libssh->session = ssh_new())) {
  43. av_log(libssh, AV_LOG_ERROR, "SSH session creation failed: %s\n", ssh_get_error(libssh->session));
  44. return AVERROR(ENOMEM);
  45. }
  46. ssh_options_set(libssh->session, SSH_OPTIONS_HOST, hostname);
  47. ssh_options_set(libssh->session, SSH_OPTIONS_PORT, &port);
  48. ssh_options_set(libssh->session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity);
  49. if (libssh->rw_timeout > 0) {
  50. long timeout = libssh->rw_timeout * 1000;
  51. ssh_options_set(libssh->session, SSH_OPTIONS_TIMEOUT_USEC, &timeout);
  52. }
  53. if (ssh_connect(libssh->session) != SSH_OK) {
  54. av_log(libssh, AV_LOG_ERROR, "Connection failed: %s\n", ssh_get_error(libssh->session));
  55. return AVERROR(EIO);
  56. }
  57. return 0;
  58. }
  59. static av_cold int libssh_authentication(LIBSSHContext *libssh, const char *user, const char *password)
  60. {
  61. int authorized = 0;
  62. int auth_methods;
  63. if (user)
  64. ssh_options_set(libssh->session, SSH_OPTIONS_USER, user);
  65. auth_methods = ssh_userauth_list(libssh->session, NULL);
  66. if (auth_methods & SSH_AUTH_METHOD_PUBLICKEY) {
  67. if (libssh->priv_key) {
  68. ssh_string pub_key;
  69. ssh_private_key priv_key;
  70. int type;
  71. if (!ssh_try_publickey_from_file(libssh->session, libssh->priv_key, &pub_key, &type)) {
  72. priv_key = privatekey_from_file(libssh->session, libssh->priv_key, type, password);
  73. if (ssh_userauth_pubkey(libssh->session, NULL, pub_key, priv_key) == SSH_AUTH_SUCCESS) {
  74. av_log(libssh, AV_LOG_DEBUG, "Authentication successful with selected private key.\n");
  75. authorized = 1;
  76. }
  77. } else {
  78. av_log(libssh, AV_LOG_DEBUG, "Invalid key is provided.\n");
  79. return AVERROR(EACCES);
  80. }
  81. } else if (ssh_userauth_autopubkey(libssh->session, password) == SSH_AUTH_SUCCESS) {
  82. av_log(libssh, AV_LOG_DEBUG, "Authentication successful with auto selected key.\n");
  83. authorized = 1;
  84. }
  85. }
  86. if (!authorized && (auth_methods & SSH_AUTH_METHOD_PASSWORD)) {
  87. if (ssh_userauth_password(libssh->session, NULL, password) == SSH_AUTH_SUCCESS) {
  88. av_log(libssh, AV_LOG_DEBUG, "Authentication successful with password.\n");
  89. authorized = 1;
  90. }
  91. }
  92. if (!authorized) {
  93. av_log(libssh, AV_LOG_ERROR, "Authentication failed.\n");
  94. return AVERROR(EACCES);
  95. }
  96. return 0;
  97. }
  98. static av_cold int libssh_create_sftp_session(LIBSSHContext *libssh)
  99. {
  100. if (!(libssh->sftp = sftp_new(libssh->session))) {
  101. av_log(libssh, AV_LOG_ERROR, "SFTP session creation failed: %s\n", ssh_get_error(libssh->session));
  102. return AVERROR(ENOMEM);
  103. }
  104. if (sftp_init(libssh->sftp) != SSH_OK) {
  105. av_log(libssh, AV_LOG_ERROR, "Error initializing sftp session: %s\n", ssh_get_error(libssh->session));
  106. return AVERROR(EIO);
  107. }
  108. return 0;
  109. }
  110. static av_cold int libssh_open_file(LIBSSHContext *libssh, int flags, const char *file)
  111. {
  112. int access;
  113. if ((flags & AVIO_FLAG_WRITE) && (flags & AVIO_FLAG_READ)) {
  114. access = O_CREAT | O_RDWR;
  115. if (libssh->trunc)
  116. access |= O_TRUNC;
  117. } else if (flags & AVIO_FLAG_WRITE) {
  118. access = O_CREAT | O_WRONLY;
  119. if (libssh->trunc)
  120. access |= O_TRUNC;
  121. } else
  122. access = O_RDONLY;
  123. /* 0666 = -rw-rw-rw- = read+write for everyone, minus umask */
  124. if (!(libssh->file = sftp_open(libssh->sftp, file, access, 0666))) {
  125. av_log(libssh, AV_LOG_ERROR, "Error opening sftp file: %s\n", ssh_get_error(libssh->session));
  126. return AVERROR(EIO);
  127. }
  128. return 0;
  129. }
  130. static av_cold void libssh_stat_file(LIBSSHContext *libssh)
  131. {
  132. sftp_attributes stat;
  133. if (!(stat = sftp_fstat(libssh->file))) {
  134. av_log(libssh, AV_LOG_WARNING, "Cannot stat remote file.\n");
  135. libssh->filesize = -1;
  136. } else {
  137. libssh->filesize = stat->size;
  138. sftp_attributes_free(stat);
  139. }
  140. }
  141. static av_cold int libssh_close(URLContext *h)
  142. {
  143. LIBSSHContext *libssh = h->priv_data;
  144. if (libssh->file)
  145. sftp_close(libssh->file);
  146. if (libssh->sftp)
  147. sftp_free(libssh->sftp);
  148. if (libssh->session) {
  149. ssh_disconnect(libssh->session);
  150. ssh_free(libssh->session);
  151. }
  152. return 0;
  153. }
  154. static av_cold int libssh_open(URLContext *h, const char *url, int flags)
  155. {
  156. LIBSSHContext *libssh = h->priv_data;
  157. char proto[10], path[MAX_URL_SIZE], hostname[1024], credencials[1024];
  158. int port = 22, ret;
  159. const char *user = NULL, *pass = NULL;
  160. char *end = NULL;
  161. av_url_split(proto, sizeof(proto),
  162. credencials, sizeof(credencials),
  163. hostname, sizeof(hostname),
  164. &port,
  165. path, sizeof(path),
  166. url);
  167. if (port <= 0 || port > 65535)
  168. port = 22;
  169. if ((ret = libssh_create_ssh_session(libssh, hostname, port)) < 0)
  170. goto fail;
  171. user = av_strtok(credencials, ":", &end);
  172. pass = av_strtok(end, ":", &end);
  173. if ((ret = libssh_authentication(libssh, user, pass)) < 0)
  174. goto fail;
  175. if ((ret = libssh_create_sftp_session(libssh)) < 0)
  176. goto fail;
  177. if ((ret = libssh_open_file(libssh, flags, path)) < 0)
  178. goto fail;
  179. libssh_stat_file(libssh);
  180. return 0;
  181. fail:
  182. libssh_close(h);
  183. return ret;
  184. }
  185. static int64_t libssh_seek(URLContext *h, int64_t pos, int whence)
  186. {
  187. LIBSSHContext *libssh = h->priv_data;
  188. int64_t newpos;
  189. if (libssh->filesize == -1 && (whence == AVSEEK_SIZE || whence == SEEK_END)) {
  190. av_log(h, AV_LOG_ERROR, "Error during seeking.\n");
  191. return AVERROR(EIO);
  192. }
  193. switch(whence) {
  194. case AVSEEK_SIZE:
  195. return libssh->filesize;
  196. case SEEK_SET:
  197. newpos = pos;
  198. break;
  199. case SEEK_CUR:
  200. newpos = sftp_tell64(libssh->file) + pos;
  201. break;
  202. case SEEK_END:
  203. newpos = libssh->filesize + pos;
  204. break;
  205. default:
  206. return AVERROR(EINVAL);
  207. }
  208. if (newpos < 0) {
  209. av_log(h, AV_LOG_ERROR, "Seeking to nagative position.\n");
  210. return AVERROR(EINVAL);
  211. }
  212. if (sftp_seek64(libssh->file, newpos)) {
  213. av_log(h, AV_LOG_ERROR, "Error during seeking.\n");
  214. return AVERROR(EIO);
  215. }
  216. return newpos;
  217. }
  218. static int libssh_read(URLContext *h, unsigned char *buf, int size)
  219. {
  220. LIBSSHContext *libssh = h->priv_data;
  221. int bytes_read;
  222. if ((bytes_read = sftp_read(libssh->file, buf, size)) < 0) {
  223. av_log(libssh, AV_LOG_ERROR, "Read error.\n");
  224. return AVERROR(EIO);
  225. }
  226. return bytes_read;
  227. }
  228. static int libssh_write(URLContext *h, const unsigned char *buf, int size)
  229. {
  230. LIBSSHContext *libssh = h->priv_data;
  231. int bytes_written;
  232. if ((bytes_written = sftp_write(libssh->file, buf, size)) < 0) {
  233. av_log(libssh, AV_LOG_ERROR, "Write error.\n");
  234. return AVERROR(EIO);
  235. }
  236. return bytes_written;
  237. }
  238. #define OFFSET(x) offsetof(LIBSSHContext, x)
  239. #define D AV_OPT_FLAG_DECODING_PARAM
  240. #define E AV_OPT_FLAG_ENCODING_PARAM
  241. static const AVOption options[] = {
  242. {"timeout", "set timeout of socket I/O operations", OFFSET(rw_timeout), AV_OPT_TYPE_INT, {.i64 = -1}, -1, INT_MAX, D|E },
  243. {"truncate", "Truncate existing files on write", OFFSET(trunc), AV_OPT_TYPE_INT, { .i64 = 1 }, 0, 1, E },
  244. {"private_key", "set path to private key", OFFSET(priv_key), AV_OPT_TYPE_STRING, { .str = NULL }, 0, 0, D|E },
  245. {NULL}
  246. };
  247. static const AVClass libssh_context_class = {
  248. .class_name = "libssh",
  249. .item_name = av_default_item_name,
  250. .option = options,
  251. .version = LIBAVUTIL_VERSION_INT,
  252. };
  253. URLProtocol ff_libssh_protocol = {
  254. .name = "sftp",
  255. .url_open = libssh_open,
  256. .url_read = libssh_read,
  257. .url_write = libssh_write,
  258. .url_seek = libssh_seek,
  259. .url_close = libssh_close,
  260. .priv_data_size = sizeof(LIBSSHContext),
  261. .priv_data_class = &libssh_context_class,
  262. .flags = URL_PROTOCOL_FLAG_NETWORK,
  263. };