mirror of https://github.com/FFmpeg/FFmpeg.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
305 lines
9.3 KiB
305 lines
9.3 KiB
/* |
|
* Copyright (c) 2013 Lukasz Marek <lukasz.m.luki@gmail.com> |
|
* |
|
* This file is part of FFmpeg. |
|
* |
|
* FFmpeg is free software; you can redistribute it and/or |
|
* modify it under the terms of the GNU Lesser General Public |
|
* License as published by the Free Software Foundation; either |
|
* version 2.1 of the License, or (at your option) any later version. |
|
* |
|
* FFmpeg is distributed in the hope that it will be useful, |
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
|
* Lesser General Public License for more details. |
|
* |
|
* You should have received a copy of the GNU Lesser General Public |
|
* License along with FFmpeg; if not, write to the Free Software |
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
|
*/ |
|
|
|
#include <fcntl.h> |
|
#define LIBSSH_STATIC |
|
#include <libssh/sftp.h> |
|
#include "libavutil/avstring.h" |
|
#include "libavutil/opt.h" |
|
#include "libavutil/attributes.h" |
|
#include "avformat.h" |
|
#include "internal.h" |
|
#include "url.h" |
|
|
|
typedef struct { |
|
const AVClass *class; |
|
ssh_session session; |
|
sftp_session sftp; |
|
sftp_file file; |
|
int64_t filesize; |
|
int rw_timeout; |
|
int trunc; |
|
char *priv_key; |
|
} LIBSSHContext; |
|
|
|
static av_cold int libssh_create_ssh_session(LIBSSHContext *libssh, const char* hostname, unsigned int port) |
|
{ |
|
static const int verbosity = SSH_LOG_NOLOG; |
|
|
|
if (!(libssh->session = ssh_new())) { |
|
av_log(libssh, AV_LOG_ERROR, "SSH session creation failed: %s\n", ssh_get_error(libssh->session)); |
|
return AVERROR(ENOMEM); |
|
} |
|
ssh_options_set(libssh->session, SSH_OPTIONS_HOST, hostname); |
|
ssh_options_set(libssh->session, SSH_OPTIONS_PORT, &port); |
|
ssh_options_set(libssh->session, SSH_OPTIONS_LOG_VERBOSITY, &verbosity); |
|
if (libssh->rw_timeout > 0) { |
|
long timeout = libssh->rw_timeout * 1000; |
|
ssh_options_set(libssh->session, SSH_OPTIONS_TIMEOUT_USEC, &timeout); |
|
} |
|
|
|
if (ssh_connect(libssh->session) != SSH_OK) { |
|
av_log(libssh, AV_LOG_ERROR, "Connection failed: %s\n", ssh_get_error(libssh->session)); |
|
return AVERROR(EIO); |
|
} |
|
|
|
return 0; |
|
} |
|
|
|
static av_cold int libssh_authentication(LIBSSHContext *libssh, const char *user, const char *password) |
|
{ |
|
int authorized = 0; |
|
int auth_methods; |
|
|
|
if (user) |
|
ssh_options_set(libssh->session, SSH_OPTIONS_USER, user); |
|
|
|
auth_methods = ssh_userauth_list(libssh->session, NULL); |
|
|
|
if (auth_methods & SSH_AUTH_METHOD_PUBLICKEY) { |
|
if (libssh->priv_key) { |
|
ssh_string pub_key; |
|
ssh_private_key priv_key; |
|
int type; |
|
if (!ssh_try_publickey_from_file(libssh->session, libssh->priv_key, &pub_key, &type)) { |
|
priv_key = privatekey_from_file(libssh->session, libssh->priv_key, type, password); |
|
if (ssh_userauth_pubkey(libssh->session, NULL, pub_key, priv_key) == SSH_AUTH_SUCCESS) { |
|
av_log(libssh, AV_LOG_DEBUG, "Authentication successful with selected private key.\n"); |
|
authorized = 1; |
|
} |
|
} else { |
|
av_log(libssh, AV_LOG_DEBUG, "Invalid key is provided.\n"); |
|
return AVERROR(EACCES); |
|
} |
|
} else if (ssh_userauth_autopubkey(libssh->session, password) == SSH_AUTH_SUCCESS) { |
|
av_log(libssh, AV_LOG_DEBUG, "Authentication successful with auto selected key.\n"); |
|
authorized = 1; |
|
} |
|
} |
|
|
|
if (!authorized && (auth_methods & SSH_AUTH_METHOD_PASSWORD)) { |
|
if (ssh_userauth_password(libssh->session, NULL, password) == SSH_AUTH_SUCCESS) { |
|
av_log(libssh, AV_LOG_DEBUG, "Authentication successful with password.\n"); |
|
authorized = 1; |
|
} |
|
} |
|
|
|
if (!authorized) { |
|
av_log(libssh, AV_LOG_ERROR, "Authentication failed.\n"); |
|
return AVERROR(EACCES); |
|
} |
|
|
|
return 0; |
|
} |
|
|
|
static av_cold int libssh_create_sftp_session(LIBSSHContext *libssh) |
|
{ |
|
if (!(libssh->sftp = sftp_new(libssh->session))) { |
|
av_log(libssh, AV_LOG_ERROR, "SFTP session creation failed: %s\n", ssh_get_error(libssh->session)); |
|
return AVERROR(ENOMEM); |
|
} |
|
|
|
if (sftp_init(libssh->sftp) != SSH_OK) { |
|
av_log(libssh, AV_LOG_ERROR, "Error initializing sftp session: %s\n", ssh_get_error(libssh->session)); |
|
return AVERROR(EIO); |
|
} |
|
|
|
return 0; |
|
} |
|
|
|
static av_cold int libssh_open_file(LIBSSHContext *libssh, int flags, const char *file) |
|
{ |
|
int access; |
|
|
|
if ((flags & AVIO_FLAG_WRITE) && (flags & AVIO_FLAG_READ)) { |
|
access = O_CREAT | O_RDWR; |
|
if (libssh->trunc) |
|
access |= O_TRUNC; |
|
} else if (flags & AVIO_FLAG_WRITE) { |
|
access = O_CREAT | O_WRONLY; |
|
if (libssh->trunc) |
|
access |= O_TRUNC; |
|
} else |
|
access = O_RDONLY; |
|
|
|
/* 0666 = -rw-rw-rw- = read+write for everyone, minus umask */ |
|
if (!(libssh->file = sftp_open(libssh->sftp, file, access, 0666))) { |
|
av_log(libssh, AV_LOG_ERROR, "Error opening sftp file: %s\n", ssh_get_error(libssh->session)); |
|
return AVERROR(EIO); |
|
} |
|
|
|
return 0; |
|
} |
|
|
|
static av_cold void libssh_stat_file(LIBSSHContext *libssh) |
|
{ |
|
sftp_attributes stat; |
|
|
|
if (!(stat = sftp_fstat(libssh->file))) { |
|
av_log(libssh, AV_LOG_WARNING, "Cannot stat remote file.\n"); |
|
libssh->filesize = -1; |
|
} else { |
|
libssh->filesize = stat->size; |
|
sftp_attributes_free(stat); |
|
} |
|
} |
|
|
|
static av_cold int libssh_close(URLContext *h) |
|
{ |
|
LIBSSHContext *libssh = h->priv_data; |
|
if (libssh->file) |
|
sftp_close(libssh->file); |
|
if (libssh->sftp) |
|
sftp_free(libssh->sftp); |
|
if (libssh->session) { |
|
ssh_disconnect(libssh->session); |
|
ssh_free(libssh->session); |
|
} |
|
return 0; |
|
} |
|
|
|
static av_cold int libssh_open(URLContext *h, const char *url, int flags) |
|
{ |
|
LIBSSHContext *libssh = h->priv_data; |
|
char proto[10], path[MAX_URL_SIZE], hostname[1024], credencials[1024]; |
|
int port = 22, ret; |
|
const char *user = NULL, *pass = NULL; |
|
char *end = NULL; |
|
|
|
av_url_split(proto, sizeof(proto), |
|
credencials, sizeof(credencials), |
|
hostname, sizeof(hostname), |
|
&port, |
|
path, sizeof(path), |
|
url); |
|
|
|
if (port <= 0 || port > 65535) |
|
port = 22; |
|
|
|
if ((ret = libssh_create_ssh_session(libssh, hostname, port)) < 0) |
|
goto fail; |
|
|
|
user = av_strtok(credencials, ":", &end); |
|
pass = av_strtok(end, ":", &end); |
|
|
|
if ((ret = libssh_authentication(libssh, user, pass)) < 0) |
|
goto fail; |
|
|
|
if ((ret = libssh_create_sftp_session(libssh)) < 0) |
|
goto fail; |
|
|
|
if ((ret = libssh_open_file(libssh, flags, path)) < 0) |
|
goto fail; |
|
|
|
libssh_stat_file(libssh); |
|
|
|
return 0; |
|
|
|
fail: |
|
libssh_close(h); |
|
return ret; |
|
} |
|
|
|
static int64_t libssh_seek(URLContext *h, int64_t pos, int whence) |
|
{ |
|
LIBSSHContext *libssh = h->priv_data; |
|
int64_t newpos; |
|
|
|
if (libssh->filesize == -1 && (whence == AVSEEK_SIZE || whence == SEEK_END)) { |
|
av_log(h, AV_LOG_ERROR, "Error during seeking.\n"); |
|
return AVERROR(EIO); |
|
} |
|
|
|
switch(whence) { |
|
case AVSEEK_SIZE: |
|
return libssh->filesize; |
|
case SEEK_SET: |
|
newpos = pos; |
|
break; |
|
case SEEK_CUR: |
|
newpos = sftp_tell64(libssh->file) + pos; |
|
break; |
|
case SEEK_END: |
|
newpos = libssh->filesize + pos; |
|
break; |
|
default: |
|
return AVERROR(EINVAL); |
|
} |
|
|
|
if (sftp_seek64(libssh->file, newpos)) { |
|
av_log(h, AV_LOG_ERROR, "Error during seeking.\n"); |
|
return AVERROR(EIO); |
|
} |
|
|
|
return newpos; |
|
} |
|
|
|
static int libssh_read(URLContext *h, unsigned char *buf, int size) |
|
{ |
|
LIBSSHContext *libssh = h->priv_data; |
|
int bytes_read; |
|
|
|
if ((bytes_read = sftp_read(libssh->file, buf, size)) < 0) { |
|
av_log(libssh, AV_LOG_ERROR, "Read error.\n"); |
|
return AVERROR(EIO); |
|
} |
|
return bytes_read; |
|
} |
|
|
|
static int libssh_write(URLContext *h, const unsigned char *buf, int size) |
|
{ |
|
LIBSSHContext *libssh = h->priv_data; |
|
int bytes_written; |
|
|
|
if ((bytes_written = sftp_write(libssh->file, buf, size)) < 0) { |
|
av_log(libssh, AV_LOG_ERROR, "Write error.\n"); |
|
return AVERROR(EIO); |
|
} |
|
return bytes_written; |
|
} |
|
|
|
#define OFFSET(x) offsetof(LIBSSHContext, x) |
|
#define D AV_OPT_FLAG_DECODING_PARAM |
|
#define E AV_OPT_FLAG_ENCODING_PARAM |
|
static const AVOption options[] = { |
|
{"timeout", "set timeout of socket I/O operations", OFFSET(rw_timeout), AV_OPT_TYPE_INT, {.i64 = -1}, -1, INT_MAX, D|E }, |
|
{"truncate", "Truncate existing files on write", OFFSET(trunc), AV_OPT_TYPE_INT, { .i64 = 1 }, 0, 1, E }, |
|
{"private_key", "set path to private key", OFFSET(priv_key), AV_OPT_TYPE_STRING, { .str = NULL }, 0, 0, D|E }, |
|
{NULL} |
|
}; |
|
|
|
static const AVClass libssh_context_class = { |
|
.class_name = "libssh", |
|
.item_name = av_default_item_name, |
|
.option = options, |
|
.version = LIBAVUTIL_VERSION_INT, |
|
}; |
|
|
|
URLProtocol ff_libssh_protocol = { |
|
.name = "sftp", |
|
.url_open = libssh_open, |
|
.url_read = libssh_read, |
|
.url_write = libssh_write, |
|
.url_seek = libssh_seek, |
|
.url_close = libssh_close, |
|
.priv_data_size = sizeof(LIBSSHContext), |
|
.priv_data_class = &libssh_context_class, |
|
.flags = URL_PROTOCOL_FLAG_NETWORK, |
|
};
|
|
|