/* * Copyright (c) 2013 Lukasz Marek * * This file is part of FFmpeg. * * FFmpeg is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * FFmpeg is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with FFmpeg; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ #include #include #include "libavutil/avstring.h" #include "libavutil/opt.h" #include "libavutil/attributes.h" #include "avformat.h" #include "internal.h" #include "url.h" typedef struct { const AVClass *class; ssh_session session; sftp_session sftp; sftp_file file; int64_t filesize; int rw_timeout; int trunc; char *priv_key; } LIBSSHContext; static av_cold int libssh_create_ssh_session(LIBSSHContext *libssh, const char* hostname, unsigned int port) { static const int verbosity = SSH_LOG_NOLOG; if (!(libssh->session = ssh_new())) { av_log(libssh, AV_LOG_ERROR, "SSH session creation failed: %s\n", ssh_get_error(libssh->session)); return AVERROR(ENOMEM); } ssh_options_set(libssh->session, SSH_OPTIONS_HOST, hostname); ssh_options_set(libssh->session, SSH_OPTIONS_PORT, &port); ssh_options_set(libssh->session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity); if (libssh->rw_timeout > 0) { long timeout = libssh->rw_timeout * 1000; ssh_options_set(libssh->session, SSH_OPTIONS_TIMEOUT_USEC, &timeout); } if (ssh_connect(libssh->session) != SSH_OK) { av_log(libssh, AV_LOG_ERROR, "Connection failed: %s\n", ssh_get_error(libssh->session)); return AVERROR(EIO); } return 0; } static av_cold int libssh_authentication(LIBSSHContext *libssh, const char *user, const char *password) { int authorized = 0; int auth_methods; if (user) ssh_options_set(libssh->session, SSH_OPTIONS_USER, user); auth_methods = ssh_userauth_list(libssh->session, NULL); if (auth_methods & SSH_AUTH_METHOD_PUBLICKEY) { if (libssh->priv_key) { ssh_string pub_key; ssh_private_key priv_key; int type; if (!ssh_try_publickey_from_file(libssh->session, libssh->priv_key, &pub_key, &type)) { priv_key = privatekey_from_file(libssh->session, libssh->priv_key, type, password); if (ssh_userauth_pubkey(libssh->session, NULL, pub_key, priv_key) == SSH_AUTH_SUCCESS) { av_log(libssh, AV_LOG_DEBUG, "Authentication successful with selected private key.\n"); authorized = 1; } } else { av_log(libssh, AV_LOG_DEBUG, "Invalid key is provided.\n"); return AVERROR(EACCES); } } else if (ssh_userauth_autopubkey(libssh->session, password) == SSH_AUTH_SUCCESS) { av_log(libssh, AV_LOG_DEBUG, "Authentication successful with auto selected key.\n"); authorized = 1; } } if (!authorized && (auth_methods & SSH_AUTH_METHOD_PASSWORD)) { if (ssh_userauth_password(libssh->session, NULL, password) == SSH_AUTH_SUCCESS) { av_log(libssh, AV_LOG_DEBUG, "Authentication successful with password.\n"); authorized = 1; } } if (!authorized) { av_log(libssh, AV_LOG_ERROR, "Authentication failed.\n"); return AVERROR(EACCES); } return 0; } static av_cold int libssh_create_sftp_session(LIBSSHContext *libssh) { if (!(libssh->sftp = sftp_new(libssh->session))) { av_log(libssh, AV_LOG_ERROR, "SFTP session creation failed: %s\n", ssh_get_error(libssh->session)); return AVERROR(ENOMEM); } if (sftp_init(libssh->sftp) != SSH_OK) { av_log(libssh, AV_LOG_ERROR, "Error initializing sftp session: %s\n", ssh_get_error(libssh->session)); return AVERROR(EIO); } return 0; } static av_cold int libssh_open_file(LIBSSHContext *libssh, int flags, const char *file) { int access; if ((flags & AVIO_FLAG_WRITE) && (flags & AVIO_FLAG_READ)) { access = O_CREAT | O_RDWR; if (libssh->trunc) access |= O_TRUNC; } else if (flags & AVIO_FLAG_WRITE) { access = O_CREAT | O_WRONLY; if (libssh->trunc) access |= O_TRUNC; } else access = O_RDONLY; /* 0666 = -rw-rw-rw- = read+write for everyone, minus umask */ if (!(libssh->file = sftp_open(libssh->sftp, file, access, 0666))) { av_log(libssh, AV_LOG_ERROR, "Error opening sftp file: %s\n", ssh_get_error(libssh->session)); return AVERROR(EIO); } return 0; } static av_cold void libssh_stat_file(LIBSSHContext *libssh) { sftp_attributes stat; if (!(stat = sftp_fstat(libssh->file))) { av_log(libssh, AV_LOG_WARNING, "Cannot stat remote file.\n"); libssh->filesize = -1; } else { libssh->filesize = stat->size; sftp_attributes_free(stat); } } static int libssh_close(URLContext *h) { LIBSSHContext *s = h->priv_data; if (s->file) sftp_close(s->file); if (s->sftp) sftp_free(s->sftp); if (s->session) { ssh_disconnect(s->session); ssh_free(s->session); } return 0; } static int libssh_open(URLContext *h, const char *url, int flags) { LIBSSHContext *s = h->priv_data; char proto[10], path[MAX_URL_SIZE], hostname[1024], credencials[1024]; int port = 22, ret; const char *user = NULL, *pass = NULL; char *end = NULL; av_url_split(proto, sizeof(proto), credencials, sizeof(credencials), hostname, sizeof(hostname), &port, path, sizeof(path), url); if (port <= 0 || port > 65535) port = 22; if ((ret = libssh_create_ssh_session(s, hostname, port)) < 0) goto fail; user = av_strtok(credencials, ":", &end); pass = av_strtok(end, ":", &end); if ((ret = libssh_authentication(s, user, pass)) < 0) goto fail; if ((ret = libssh_create_sftp_session(s)) < 0) goto fail; if ((ret = libssh_open_file(s, flags, path)) < 0) goto fail; libssh_stat_file(s); return 0; fail: libssh_close(h); return ret; } static int64_t libssh_seek(URLContext *h, int64_t pos, int whence) { LIBSSHContext *s = h->priv_data; int64_t newpos; if (s->filesize == -1 && (whence == AVSEEK_SIZE || whence == SEEK_END)) { av_log(h, AV_LOG_ERROR, "Error during seeking.\n"); return AVERROR(EIO); } switch(whence) { case AVSEEK_SIZE: return s->filesize; case SEEK_SET: newpos = pos; break; case SEEK_CUR: newpos = sftp_tell64(s->file); break; case SEEK_END: newpos = s->filesize + pos; break; default: return AVERROR(EINVAL); } if (sftp_seek64(s->file, newpos)) { av_log(h, AV_LOG_ERROR, "Error during seeking.\n"); return AVERROR(EIO); } return newpos; } static int libssh_read(URLContext *h, unsigned char *buf, int size) { LIBSSHContext *s = h->priv_data; int bytes_read; if ((bytes_read = sftp_read(s->file, buf, size)) < 0) { av_log(h, AV_LOG_ERROR, "Read error.\n"); return AVERROR(EIO); } return bytes_read; } static int libssh_write(URLContext *h, const unsigned char *buf, int size) { LIBSSHContext *s = h->priv_data; int bytes_written; if ((bytes_written = sftp_write(s->file, buf, size)) < 0) { av_log(h, AV_LOG_ERROR, "Write error.\n"); return AVERROR(EIO); } return bytes_written; } #define OFFSET(x) offsetof(LIBSSHContext, x) #define D AV_OPT_FLAG_DECODING_PARAM #define E AV_OPT_FLAG_ENCODING_PARAM static const AVOption options[] = { {"timeout", "set timeout of socket I/O operations", OFFSET(rw_timeout), AV_OPT_TYPE_INT, {.i64 = -1}, -1, INT_MAX, D|E }, {"truncate", "Truncate existing files on write", OFFSET(trunc), AV_OPT_TYPE_INT, { .i64 = 1 }, 0, 1, E }, {"private_key", "set path to private key", OFFSET(priv_key), AV_OPT_TYPE_STRING, { .str = NULL }, 0, 0, D|E }, {NULL} }; static const AVClass libssh_context_class = { .class_name = "libssh", .item_name = av_default_item_name, .option = options, .version = LIBAVUTIL_VERSION_INT, }; URLProtocol ff_libssh_protocol = { .name = "sftp", .url_open = libssh_open, .url_read = libssh_read, .url_write = libssh_write, .url_seek = libssh_seek, .url_close = libssh_close, .priv_data_size = sizeof(LIBSSHContext), .priv_data_class = &libssh_context_class, .flags = URL_PROTOCOL_FLAG_NETWORK, };