2016-11-12 23:36:08 +00:00
// Package sftp provides a filesystem interface using github.com/pkg/sftp
2017-01-31 20:34:11 +00:00
2019-04-15 19:03:33 +00:00
// +build !plan9
2017-01-31 20:34:11 +00:00
2016-11-12 23:36:08 +00:00
package sftp
import (
2018-04-19 08:45:46 +00:00
"bytes"
2018-04-06 18:13:27 +00:00
"context"
2018-03-14 23:17:09 +00:00
"fmt"
2016-11-12 23:36:08 +00:00
"io"
2017-06-23 15:25:35 +00:00
"io/ioutil"
2016-11-12 23:36:08 +00:00
"os"
"path"
2017-08-07 13:50:31 +00:00
"regexp"
2019-04-25 09:51:15 +00:00
"strconv"
2017-08-07 13:50:31 +00:00
"strings"
2017-08-07 16:19:37 +00:00
"sync"
2016-11-12 23:36:08 +00:00
"time"
2017-01-31 20:34:11 +00:00
"github.com/pkg/errors"
2016-11-12 23:36:08 +00:00
"github.com/pkg/sftp"
2019-07-28 17:47:38 +00:00
"github.com/rclone/rclone/fs"
"github.com/rclone/rclone/fs/config"
"github.com/rclone/rclone/fs/config/configmap"
"github.com/rclone/rclone/fs/config/configstruct"
"github.com/rclone/rclone/fs/config/obscure"
"github.com/rclone/rclone/fs/fshttp"
"github.com/rclone/rclone/fs/hash"
"github.com/rclone/rclone/lib/env"
2019-11-07 13:57:42 +00:00
"github.com/rclone/rclone/lib/pacer"
2019-07-28 17:47:38 +00:00
"github.com/rclone/rclone/lib/readers"
2018-12-04 10:11:57 +00:00
sshagent "github.com/xanzy/ssh-agent"
2017-05-24 14:39:17 +00:00
"golang.org/x/crypto/ssh"
2020-10-04 01:03:19 +00:00
"golang.org/x/crypto/ssh/knownhosts"
2017-08-07 17:01:31 +00:00
)
const (
2019-06-26 15:50:31 +00:00
hashCommandNotSupported = "none"
2019-11-07 13:57:42 +00:00
minSleep = 100 * time . Millisecond
maxSleep = 2 * time . Second
decayConstant = 2 // bigger for slower decay, exponential
2016-11-12 23:36:08 +00:00
)
2018-01-07 12:57:46 +00:00
var (
2020-09-27 10:40:58 +00:00
currentUser = env . CurrentUser ( )
2018-01-07 12:57:46 +00:00
)
2016-11-12 23:36:08 +00:00
func init ( ) {
fsi := & fs . RegInfo {
Name : "sftp" ,
Description : "SSH/SFTP Connection" ,
NewFs : NewFs ,
Options : [ ] fs . Option { {
Name : "host" ,
Help : "SSH host to connect to" ,
2018-05-14 17:06:57 +00:00
Required : true ,
2016-11-12 23:36:08 +00:00
Examples : [ ] fs . OptionExample { {
Value : "example.com" ,
Help : "Connect to example.com" ,
} } ,
} , {
2018-05-14 17:06:57 +00:00
Name : "user" ,
Help : "SSH username, leave blank for current username, " + currentUser ,
2016-11-12 23:36:08 +00:00
} , {
2018-05-14 17:06:57 +00:00
Name : "port" ,
Help : "SSH port, leave blank to use default (22)" ,
2016-11-12 23:36:08 +00:00
} , {
Name : "pass" ,
2017-06-23 15:25:35 +00:00
Help : "SSH password, leave blank to use ssh-agent." ,
2016-11-12 23:36:08 +00:00
IsPassword : true ,
2020-05-19 10:55:38 +00:00
} , {
Name : "key_pem" ,
Help : "Raw PEM-encoded private key, If specified, will override key_file parameter." ,
2017-06-23 15:25:35 +00:00
} , {
2018-05-14 17:06:57 +00:00
Name : "key_file" ,
2020-06-02 10:54:52 +00:00
Help : "Path to PEM-encoded private key file, leave blank or set key-use-agent to use ssh-agent." + env . ShellExpandHelp ,
2019-01-03 11:24:31 +00:00
} , {
Name : "key_file_pass" ,
Help : ` The passphrase to decrypt the PEM - encoded private key file .
Only PEM encrypted key files ( old OpenSSH format ) are supported . Encrypted keys
in the new OpenSSH format can ' t be used . ` ,
IsPassword : true ,
2020-09-24 18:51:35 +00:00
} , {
Name : "pubkey_file" ,
Help : ` Optional path to public key file .
Set this if you have a signed certificate you want to use for authentication . ` + env . ShellExpandHelp ,
2020-10-04 01:03:19 +00:00
} , {
Name : "known_hosts_file" ,
Help : ` Optional path to known_hosts file .
Set this value to enable server host key validation . ` + env . ShellExpandHelp ,
Advanced : true ,
Examples : [ ] fs . OptionExample { {
Value : "~/.ssh/known_hosts" ,
Help : "Use OpenSSH's known_hosts file" ,
} } ,
2019-01-03 11:25:13 +00:00
} , {
Name : "key_use_agent" ,
Help : ` When set forces the usage of the ssh - agent .
When key - file is also set , the ".pub" file of the specified key - file is read and only the associated key is
requested from the ssh - agent . This allows to avoid ` + " ` Too many authentication failures for * username * ` " + ` errors
when the ssh - agent contains many keys . ` ,
Default : false ,
2017-12-08 12:22:09 +00:00
} , {
2019-10-16 21:22:45 +00:00
Name : "use_insecure_cipher" ,
Help : ` Enable the use of insecure ciphers and key exchange methods .
2020-05-25 06:05:53 +00:00
This enables the use of the following insecure ciphers and key exchange methods :
2019-10-16 21:22:45 +00:00
- aes128 - cbc
- aes192 - cbc
- aes256 - cbc
- 3 des - cbc
- diffie - hellman - group - exchange - sha256
- diffie - hellman - group - exchange - sha1
Those algorithms are insecure and may allow plaintext data to be recovered by an attacker . ` ,
2018-05-14 17:06:57 +00:00
Default : false ,
2017-12-08 12:22:09 +00:00
Examples : [ ] fs . OptionExample {
{
Value : "false" ,
Help : "Use default Cipher list." ,
} , {
Value : "true" ,
2019-07-10 12:23:02 +00:00
Help : "Enables the use of the aes128-cbc cipher and diffie-hellman-group-exchange-sha256, diffie-hellman-group-exchange-sha1 key exchange." ,
2017-12-08 12:22:09 +00:00
} ,
} ,
2018-01-05 09:01:35 +00:00
} , {
2018-05-14 17:06:57 +00:00
Name : "disable_hashcheck" ,
Default : false ,
Help : "Disable the execution of SSH commands to determine if remote file hashing is available.\nLeave blank or set to false to enable hashing (recommended), set to true to disable hashing." ,
} , {
2019-09-15 17:23:19 +00:00
Name : "ask_password" ,
Default : false ,
Help : ` Allow asking for SFTP password when needed .
If this is set and no password is supplied then rclone will :
- ask for a password
- not contact the ssh agent
` ,
2018-05-14 17:06:57 +00:00
Advanced : true ,
} , {
2018-10-01 17:36:15 +00:00
Name : "path_override" ,
Default : "" ,
Help : ` Override path used by SSH connection .
This allows checksum calculation when SFTP and SSH paths are
different . This issue affects among others Synology NAS boxes .
Shared folders can be found in directories representing volumes
rclone sync / home / local / directory remote : / directory -- ssh - path - override / volume2 / directory
Home directory can be found in a shared folder called "home"
rclone sync / home / local / directory remote : / home / directory -- ssh - path - override / volume1 / homes / USER / directory ` ,
2018-05-14 17:06:57 +00:00
Advanced : true ,
} , {
Name : "set_modtime" ,
Default : true ,
Help : "Set the modified time on the remote if set." ,
Advanced : true ,
2019-06-26 15:50:31 +00:00
} , {
Name : "md5sum_command" ,
Default : "" ,
Help : "The command used to read md5 hashes. Leave blank for autodetect." ,
Advanced : true ,
} , {
Name : "sha1sum_command" ,
Default : "" ,
Help : "The command used to read sha1 hashes. Leave blank for autodetect." ,
Advanced : true ,
2019-11-14 22:00:30 +00:00
} , {
Name : "skip_links" ,
Default : false ,
Help : "Set to skip any symlinks and any other non regular files." ,
Advanced : true ,
2020-08-13 17:23:54 +00:00
} , {
Name : "subsystem" ,
Default : "sftp" ,
Help : "Specifies the SSH2 subsystem on the remote host." ,
Advanced : true ,
} , {
Name : "server_command" ,
Default : "" ,
Help : ` Specifies the path or command to run a sftp server on the remote host .
The subsystem option is ignored when server_command is defined . ` ,
Advanced : true ,
2016-11-12 23:36:08 +00:00
} } ,
}
fs . Register ( fsi )
}
2018-05-14 17:06:57 +00:00
// Options defines the configuration for this backend
type Options struct {
Host string ` config:"host" `
User string ` config:"user" `
Port string ` config:"port" `
Pass string ` config:"pass" `
2020-05-19 10:55:38 +00:00
KeyPem string ` config:"key_pem" `
2018-05-14 17:06:57 +00:00
KeyFile string ` config:"key_file" `
2019-01-03 11:24:31 +00:00
KeyFilePass string ` config:"key_file_pass" `
2020-09-24 18:51:35 +00:00
PubKeyFile string ` config:"pubkey_file" `
2020-10-04 01:03:19 +00:00
KnownHostsFile string ` config:"known_hosts_file" `
2019-01-03 11:25:13 +00:00
KeyUseAgent bool ` config:"key_use_agent" `
2018-05-14 17:06:57 +00:00
UseInsecureCipher bool ` config:"use_insecure_cipher" `
DisableHashCheck bool ` config:"disable_hashcheck" `
AskPassword bool ` config:"ask_password" `
PathOverride string ` config:"path_override" `
SetModTime bool ` config:"set_modtime" `
2019-06-26 15:50:31 +00:00
Md5sumCommand string ` config:"md5sum_command" `
Sha1sumCommand string ` config:"sha1sum_command" `
2019-11-14 22:00:30 +00:00
SkipLinks bool ` config:"skip_links" `
2020-08-13 17:23:54 +00:00
Subsystem string ` config:"subsystem" `
ServerCommand string ` config:"server_command" `
2018-05-14 17:06:57 +00:00
}
2016-11-12 23:36:08 +00:00
// Fs stores the interface to the remote SFTP files
type Fs struct {
2018-05-14 17:06:57 +00:00
name string
root string
2020-06-29 14:49:19 +00:00
absRoot string
2019-06-26 15:50:31 +00:00
opt Options // parsed options
m configmap . Mapper // config
features * fs . Features // optional features
2018-05-14 17:06:57 +00:00
config * ssh . ClientConfig
url string
mkdirLock * stringLock
cachedHashes * hash . Set
poolMu sync . Mutex
pool [ ] * conn
2019-11-07 13:57:42 +00:00
pacer * fs . Pacer // pacer for operations
2020-10-08 12:27:39 +00:00
savedpswd string
2016-11-12 23:36:08 +00:00
}
// Object is a remote SFTP file that has been stat'd (so it exists, but is not necessarily open for reading)
type Object struct {
2017-06-30 09:24:06 +00:00
fs * Fs
remote string
size int64 // size of the object
modTime time . Time // modification time of the object
mode os . FileMode // mode bits from the file
2017-08-06 10:49:52 +00:00
md5sum * string // Cached MD5 checksum
sha1sum * string // Cached SHA1 checksum
2016-11-12 23:36:08 +00:00
}
2019-05-10 06:51:01 +00:00
// dial starts a client connection to the given SSH server. It is a
2017-07-23 15:10:23 +00:00
// convenience function that connects to the given network address,
// initiates the SSH handshake, and then sets up a Client.
2019-05-10 06:51:01 +00:00
func ( f * Fs ) dial ( network , addr string , sshConfig * ssh . ClientConfig ) ( * ssh . Client , error ) {
2018-01-12 16:30:54 +00:00
dialer := fshttp . NewDialer ( fs . Config )
2017-07-23 15:10:23 +00:00
conn , err := dialer . Dial ( network , addr )
if err != nil {
return nil , err
}
2018-01-12 16:30:54 +00:00
c , chans , reqs , err := ssh . NewClientConn ( conn , addr , sshConfig )
2017-07-23 15:10:23 +00:00
if err != nil {
return nil , err
}
2019-05-10 06:51:01 +00:00
fs . Debugf ( f , "New connection %s->%s to %q" , c . LocalAddr ( ) , c . RemoteAddr ( ) , c . ServerVersion ( ) )
2017-07-23 15:10:23 +00:00
return ssh . NewClient ( c , chans , reqs ) , nil
}
2017-08-07 16:19:37 +00:00
// conn encapsulates an ssh client and corresponding sftp client
type conn struct {
sshClient * ssh . Client
sftpClient * sftp . Client
err chan error
}
// Wait for connection to close
func ( c * conn ) wait ( ) {
c . err <- c . sshClient . Conn . Wait ( )
}
// Closes the connection
func ( c * conn ) close ( ) error {
sftpErr := c . sftpClient . Close ( )
sshErr := c . sshClient . Close ( )
if sftpErr != nil {
return sftpErr
}
return sshErr
}
// Returns an error if closed
func ( c * conn ) closed ( ) error {
select {
case err := <- c . err :
return err
default :
}
return nil
}
// Open a new connection to the SFTP server.
func ( f * Fs ) sftpConnection ( ) ( c * conn , err error ) {
2017-08-07 17:01:31 +00:00
// Rate limit rate of new connections
2017-08-07 16:19:37 +00:00
c = & conn {
err : make ( chan error , 1 ) ,
}
2019-05-10 06:51:01 +00:00
c . sshClient , err = f . dial ( "tcp" , f . opt . Host + ":" + f . opt . Port , f . config )
2017-08-07 16:19:37 +00:00
if err != nil {
return nil , errors . Wrap ( err , "couldn't connect SSH" )
}
2020-08-13 17:23:54 +00:00
c . sftpClient , err = f . newSftpClient ( c . sshClient )
2017-08-07 16:19:37 +00:00
if err != nil {
_ = c . sshClient . Close ( )
return nil , errors . Wrap ( err , "couldn't initialise SFTP" )
}
go c . wait ( )
return c , nil
}
2020-08-13 17:23:54 +00:00
// Creates a new SFTP client on conn, using the specified subsystem
// or sftp server, and zero or more option functions
func ( f * Fs ) newSftpClient ( conn * ssh . Client , opts ... sftp . ClientOption ) ( * sftp . Client , error ) {
s , err := conn . NewSession ( )
if err != nil {
return nil , err
}
pw , err := s . StdinPipe ( )
if err != nil {
return nil , err
}
pr , err := s . StdoutPipe ( )
if err != nil {
return nil , err
}
if f . opt . ServerCommand != "" {
if err := s . Start ( f . opt . ServerCommand ) ; err != nil {
return nil , err
}
} else {
if err := s . RequestSubsystem ( f . opt . Subsystem ) ; err != nil {
return nil , err
}
}
return sftp . NewClientPipe ( pr , pw , opts ... )
}
2017-08-07 16:19:37 +00:00
// Get an SFTP connection from the pool, or open a new one
func ( f * Fs ) getSftpConnection ( ) ( c * conn , err error ) {
f . poolMu . Lock ( )
for len ( f . pool ) > 0 {
c = f . pool [ 0 ]
f . pool = f . pool [ 1 : ]
err := c . closed ( )
if err == nil {
break
}
fs . Errorf ( f , "Discarding closed SSH connection: %v" , err )
c = nil
}
f . poolMu . Unlock ( )
if c != nil {
return c , nil
}
2019-11-07 13:57:42 +00:00
err = f . pacer . Call ( func ( ) ( bool , error ) {
c , err = f . sftpConnection ( )
if err != nil {
return true , err
}
return false , nil
} )
return c , err
2017-08-07 16:19:37 +00:00
}
// Return an SFTP connection to the pool
//
// It nils the pointed to connection out so it can't be reused
//
// if err is not nil then it checks the connection is alive using a
// Getwd request
func ( f * Fs ) putSftpConnection ( pc * * conn , err error ) {
c := * pc
* pc = nil
if err != nil {
// work out if this is an expected error
underlyingErr := errors . Cause ( err )
isRegularError := false
switch underlyingErr {
case os . ErrNotExist :
isRegularError = true
default :
switch underlyingErr . ( type ) {
case * sftp . StatusError , * os . PathError :
isRegularError = true
}
}
// If not a regular SFTP error code then check the connection
if ! isRegularError {
_ , nopErr := c . sftpClient . Getwd ( )
if nopErr != nil {
fs . Debugf ( f , "Connection failed, closing: %v" , nopErr )
_ = c . close ( )
return
}
fs . Debugf ( f , "Connection OK after error: %v" , err )
}
}
f . poolMu . Lock ( )
f . pool = append ( f . pool , c )
f . poolMu . Unlock ( )
}
2016-11-12 23:36:08 +00:00
// NewFs creates a new Fs object from the name and root. It connects to
// the host specified in the config file.
2020-11-05 15:18:51 +00:00
func NewFs ( ctx context . Context , name , root string , m configmap . Mapper ) ( fs . Fs , error ) {
2020-10-08 12:27:39 +00:00
// This will hold the Fs object. We need to create it here
// so we can refer to it in the SSH callback, but it's populated
// in NewFsWithConnection
f := & Fs { }
2018-05-14 17:06:57 +00:00
// Parse config into Options struct
opt := new ( Options )
err := configstruct . Set ( m , opt )
if err != nil {
return nil , err
}
if opt . User == "" {
opt . User = currentUser
}
if opt . Port == "" {
opt . Port = "22"
2016-11-12 23:36:08 +00:00
}
2020-10-04 01:03:19 +00:00
2018-01-12 16:30:54 +00:00
sshConfig := & ssh . ClientConfig {
2018-05-14 17:06:57 +00:00
User : opt . User ,
2017-05-15 13:00:07 +00:00
Auth : [ ] ssh . AuthMethod { } ,
HostKeyCallback : ssh . InsecureIgnoreHostKey ( ) ,
Timeout : fs . Config . ConnectTimeout ,
2019-05-10 06:51:01 +00:00
ClientVersion : "SSH-2.0-" + fs . Config . UserAgent ,
2016-11-12 23:36:08 +00:00
}
2017-06-23 15:25:35 +00:00
2020-10-04 01:03:19 +00:00
if opt . KnownHostsFile != "" {
hostcallback , err := knownhosts . New ( opt . KnownHostsFile )
if err != nil {
return nil , errors . Wrap ( err , "couldn't parse known_hosts_file" )
}
sshConfig . HostKeyCallback = hostcallback
}
2018-05-14 17:06:57 +00:00
if opt . UseInsecureCipher {
2018-01-12 16:30:54 +00:00
sshConfig . Config . SetDefaults ( )
2019-10-16 21:22:45 +00:00
sshConfig . Config . Ciphers = append ( sshConfig . Config . Ciphers , "aes128-cbc" , "aes192-cbc" , "aes256-cbc" , "3des-cbc" )
2019-07-10 12:23:02 +00:00
sshConfig . Config . KeyExchanges = append ( sshConfig . Config . KeyExchanges , "diffie-hellman-group-exchange-sha1" , "diffie-hellman-group-exchange-sha256" )
2017-12-08 12:22:09 +00:00
}
2019-05-10 21:07:36 +00:00
keyFile := env . ShellExpand ( opt . KeyFile )
2020-09-24 18:51:35 +00:00
pubkeyFile := env . ShellExpand ( opt . PubKeyFile )
2020-05-19 10:55:38 +00:00
//keyPem := env.ShellExpand(opt.KeyPem)
2020-06-11 11:05:30 +00:00
// Add ssh agent-auth if no password or file or key PEM specified
if ( opt . Pass == "" && keyFile == "" && ! opt . AskPassword && opt . KeyPem == "" ) || opt . KeyUseAgent {
2017-04-10 13:50:06 +00:00
sshAgentClient , _ , err := sshagent . New ( )
2017-01-31 20:34:11 +00:00
if err != nil {
return nil , errors . Wrap ( err , "couldn't connect to ssh-agent" )
}
signers , err := sshAgentClient . Signers ( )
if err != nil {
return nil , errors . Wrap ( err , "couldn't read ssh agent signers" )
}
2019-01-03 12:42:13 +00:00
if keyFile != "" {
pubBytes , err := ioutil . ReadFile ( keyFile + ".pub" )
2019-01-03 11:25:13 +00:00
if err != nil {
return nil , errors . Wrap ( err , "failed to read public key file" )
}
pub , _ , _ , _ , err := ssh . ParseAuthorizedKey ( pubBytes )
if err != nil {
return nil , errors . Wrap ( err , "failed to parse public key file" )
}
pubM := pub . Marshal ( )
found := false
for _ , s := range signers {
if bytes . Equal ( pubM , s . PublicKey ( ) . Marshal ( ) ) {
sshConfig . Auth = append ( sshConfig . Auth , ssh . PublicKeys ( s ) )
found = true
break
}
}
if ! found {
return nil , errors . New ( "private key not found in the ssh-agent" )
}
} else {
sshConfig . Auth = append ( sshConfig . Auth , ssh . PublicKeys ( signers ... ) )
}
2017-06-23 15:25:35 +00:00
}
// Load key file if specified
2020-05-19 10:55:38 +00:00
if keyFile != "" || opt . KeyPem != "" {
var key [ ] byte
if opt . KeyPem == "" {
key , err = ioutil . ReadFile ( keyFile )
if err != nil {
return nil , errors . Wrap ( err , "failed to read private key file" )
}
} else {
// wrap in quotes because the config is a coming as a literal without them.
opt . KeyPem , err = strconv . Unquote ( "\"" + opt . KeyPem + "\"" )
if err != nil {
return nil , errors . Wrap ( err , "pem key not formatted properly" )
}
key = [ ] byte ( opt . KeyPem )
2017-06-23 15:25:35 +00:00
}
2019-01-03 11:24:31 +00:00
clearpass := ""
if opt . KeyFilePass != "" {
clearpass , err = obscure . Reveal ( opt . KeyFilePass )
if err != nil {
return nil , err
}
}
2020-01-13 11:05:16 +00:00
var signer ssh . Signer
if clearpass == "" {
signer , err = ssh . ParsePrivateKey ( key )
} else {
signer , err = ssh . ParsePrivateKeyWithPassphrase ( key , [ ] byte ( clearpass ) )
}
2017-06-23 15:25:35 +00:00
if err != nil {
return nil , errors . Wrap ( err , "failed to parse private key file" )
}
2020-09-24 18:51:35 +00:00
// If a public key has been specified then use that
if pubkeyFile != "" {
certfile , err := ioutil . ReadFile ( pubkeyFile )
if err != nil {
return nil , errors . Wrap ( err , "unable to read cert file" )
}
pk , _ , _ , _ , err := ssh . ParseAuthorizedKey ( certfile )
if err != nil {
return nil , errors . Wrap ( err , "unable to parse cert file" )
}
// And the signer for this, which includes the private key signer
// This is what we'll pass to the ssh client.
// Normally the ssh client will use the public key built
// into the private key, but we need to tell it to use the user
// specified public key cert. This signer is specific to the
// cert and will include the private key signer. Now ssh
// knows everything it needs.
cert , ok := pk . ( * ssh . Certificate )
if ! ok {
return nil , errors . New ( "public key file is not a certificate file: " + pubkeyFile )
}
pubsigner , err := ssh . NewCertSigner ( cert , signer )
if err != nil {
return nil , errors . Wrap ( err , "error generating cert signer" )
}
sshConfig . Auth = append ( sshConfig . Auth , ssh . PublicKeys ( pubsigner ) )
} else {
sshConfig . Auth = append ( sshConfig . Auth , ssh . PublicKeys ( signer ) )
}
2017-06-23 15:25:35 +00:00
}
// Auth from password if specified
2018-05-14 17:06:57 +00:00
if opt . Pass != "" {
clearpass , err := obscure . Reveal ( opt . Pass )
2016-11-12 23:36:08 +00:00
if err != nil {
return nil , err
}
2018-01-12 16:30:54 +00:00
sshConfig . Auth = append ( sshConfig . Auth , ssh . Password ( clearpass ) )
2016-11-12 23:36:08 +00:00
}
2017-06-23 15:25:35 +00:00
2020-10-06 22:56:28 +00:00
// Config for password if none was defined and we're allowed to
// We don't ask now; we ask if the ssh connection succeeds
2018-05-14 17:06:57 +00:00
if opt . Pass == "" && opt . AskPassword {
2020-10-08 12:27:39 +00:00
sshConfig . Auth = append ( sshConfig . Auth , ssh . PasswordCallback ( f . getPass ) )
2018-03-14 23:17:09 +00:00
}
2020-10-08 12:27:39 +00:00
return NewFsWithConnection ( ctx , f , name , root , m , opt , sshConfig )
2019-02-19 16:40:15 +00:00
}
2020-10-06 22:56:28 +00:00
// If we're in password mode and ssh connection succeeds then this
2020-10-08 12:27:39 +00:00
// callback is called. First time around we ask the user, and then
// save it so on reconnection we give back the previous string.
// This removes the ability to let the user correct a mistaken entry,
// but means that reconnects are transparent.
// We'll re-use config.Pass for this, 'cos we know it's not been
// specified.
func ( f * Fs ) getPass ( ) ( string , error ) {
for f . savedpswd == "" {
_ , _ = fmt . Fprint ( os . Stderr , "Enter SFTP password: " )
f . savedpswd = config . ReadPassword ( )
}
return f . savedpswd , nil
2020-10-06 22:56:28 +00:00
}
2020-05-20 10:39:20 +00:00
// NewFsWithConnection creates a new Fs object from the name and root and an ssh.ClientConfig. It connects to
2019-02-19 16:40:15 +00:00
// the host specified in the ssh.ClientConfig
2020-10-08 12:27:39 +00:00
func NewFsWithConnection ( ctx context . Context , f * Fs , name string , root string , m configmap . Mapper , opt * Options , sshConfig * ssh . ClientConfig ) ( fs . Fs , error ) {
// Populate the Filesystem Object
f . name = name
f . root = root
f . absRoot = root
f . opt = * opt
f . m = m
f . config = sshConfig
f . url = "sftp://" + opt . User + "@" + opt . Host + ":" + opt . Port + "/" + root
f . mkdirLock = newStringLock ( )
f . pacer = fs . NewPacer ( pacer . NewDefault ( pacer . MinSleep ( minSleep ) , pacer . MaxSleep ( maxSleep ) , pacer . DecayConstant ( decayConstant ) ) )
f . savedpswd = ""
2017-08-09 14:27:43 +00:00
f . features = ( & fs . Features {
CanHaveEmptyDirectories : true ,
2020-06-19 09:28:34 +00:00
SlowHash : true ,
2020-11-05 16:00:40 +00:00
} ) . Fill ( ctx , f )
2017-08-07 16:19:37 +00:00
// Make a connection and pool it to return errors early
c , err := f . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "NewFs" )
}
2020-06-29 14:49:19 +00:00
cwd , err := c . sftpClient . Getwd ( )
2017-08-07 16:19:37 +00:00
f . putSftpConnection ( & c , nil )
2020-06-29 14:49:19 +00:00
if err != nil {
fs . Debugf ( f , "Failed to read current directory - using relative paths: %v" , err )
} else if ! path . IsAbs ( f . root ) {
f . absRoot = path . Join ( cwd , f . root )
fs . Debugf ( f , "Using absolute root directory %q" , f . absRoot )
}
2017-01-31 20:34:11 +00:00
if root != "" {
// Check to see if the root actually an existing file
2020-06-29 14:49:19 +00:00
oldAbsRoot := f . absRoot
2017-01-31 20:34:11 +00:00
remote := path . Base ( root )
f . root = path . Dir ( root )
2020-06-29 14:49:19 +00:00
f . absRoot = path . Dir ( f . absRoot )
2017-01-31 20:34:11 +00:00
if f . root == "." {
f . root = ""
}
2019-06-17 08:34:30 +00:00
_ , err := f . NewObject ( ctx , remote )
2017-01-31 20:34:11 +00:00
if err != nil {
2017-02-25 14:31:27 +00:00
if err == fs . ErrorObjectNotFound || errors . Cause ( err ) == fs . ErrorNotAFile {
2017-01-31 20:34:11 +00:00
// File doesn't exist so return old f
f . root = root
2020-06-29 14:49:19 +00:00
f . absRoot = oldAbsRoot
2017-01-31 20:34:11 +00:00
return f , nil
}
return nil , err
2016-11-12 23:36:08 +00:00
}
2017-01-31 20:34:11 +00:00
// return an error with an fs which points to the parent
return f , fs . ErrorIsFile
2016-11-12 23:36:08 +00:00
}
2017-01-31 20:34:11 +00:00
return f , nil
2016-11-12 23:36:08 +00:00
}
// Name returns the configured name of the file system
func ( f * Fs ) Name ( ) string {
return f . name
}
// Root returns the root for the filesystem
func ( f * Fs ) Root ( ) string {
return f . root
}
// String returns the URL for the filesystem
func ( f * Fs ) String ( ) string {
return f . url
}
// Features returns the optional features of this Fs
func ( f * Fs ) Features ( ) * fs . Features {
return f . features
}
// Precision is the remote sftp file system's modtime precision, which we have no way of knowing. We estimate at 1s
func ( f * Fs ) Precision ( ) time . Duration {
return time . Second
}
// NewObject creates a new remote sftp file object
2019-06-17 08:34:30 +00:00
func ( f * Fs ) NewObject ( ctx context . Context , remote string ) ( fs . Object , error ) {
2017-01-31 20:34:11 +00:00
o := & Object {
2016-11-12 23:36:08 +00:00
fs : f ,
remote : remote ,
}
2017-01-31 20:34:11 +00:00
err := o . stat ( )
if err != nil {
return nil , err
}
return o , nil
2016-11-12 23:36:08 +00:00
}
2017-01-31 20:34:11 +00:00
// dirExists returns true,nil if the directory exists, false, nil if
// it doesn't or false, err
func ( f * Fs ) dirExists ( dir string ) ( bool , error ) {
if dir == "" {
dir = "."
}
2017-08-07 16:19:37 +00:00
c , err := f . getSftpConnection ( )
if err != nil {
return false , errors . Wrap ( err , "dirExists" )
}
info , err := c . sftpClient . Stat ( dir )
f . putSftpConnection ( & c , err )
2017-01-31 20:34:11 +00:00
if err != nil {
if os . IsNotExist ( err ) {
return false , nil
}
return false , errors . Wrap ( err , "dirExists stat failed" )
}
if ! info . IsDir ( ) {
return false , fs . ErrorIsFile
}
return true , nil
}
2017-06-11 21:43:31 +00:00
// List the objects and directories in dir into entries. The
// entries can be returned in any order but should be for a
// complete directory.
//
// dir should be "" to list the root, and should not have
// trailing slashes.
//
// This should return ErrDirNotFound if the directory isn't
// found.
2019-06-17 08:34:30 +00:00
func ( f * Fs ) List ( ctx context . Context , dir string ) ( entries fs . DirEntries , err error ) {
2020-06-29 14:49:19 +00:00
root := path . Join ( f . absRoot , dir )
2017-06-11 21:43:31 +00:00
ok , err := f . dirExists ( root )
if err != nil {
return nil , errors . Wrap ( err , "List failed" )
}
if ! ok {
return nil , fs . ErrorDirNotFound
}
sftpDir := root
2017-01-31 20:34:11 +00:00
if sftpDir == "" {
sftpDir = "."
}
2017-08-07 16:19:37 +00:00
c , err := f . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "List" )
}
infos , err := c . sftpClient . ReadDir ( sftpDir )
f . putSftpConnection ( & c , err )
2017-01-31 20:34:11 +00:00
if err != nil {
2017-06-11 21:43:31 +00:00
return nil , errors . Wrapf ( err , "error listing %q" , dir )
2017-01-31 20:34:11 +00:00
}
for _ , info := range infos {
remote := path . Join ( dir , info . Name ( ) )
2018-03-16 15:36:47 +00:00
// If file is a symlink (not a regular file is the best cross platform test we can do), do a stat to
// pick up the size and type of the destination, instead of the size and type of the symlink.
2019-11-14 22:00:30 +00:00
if ! info . Mode ( ) . IsRegular ( ) && ! info . IsDir ( ) {
if f . opt . SkipLinks {
// skip non regular file if SkipLinks is set
continue
}
2019-01-28 17:10:00 +00:00
oldInfo := info
2018-03-16 15:36:47 +00:00
info , err = f . stat ( remote )
if err != nil {
2019-01-28 17:10:00 +00:00
if ! os . IsNotExist ( err ) {
2019-11-14 22:00:30 +00:00
fs . Errorf ( remote , "stat of non-regular file failed: %v" , err )
2019-01-28 17:10:00 +00:00
}
info = oldInfo
2018-03-16 15:36:47 +00:00
}
}
2017-01-31 20:34:11 +00:00
if info . IsDir ( ) {
2017-06-30 12:37:29 +00:00
d := fs . NewDir ( remote , info . ModTime ( ) )
2017-06-11 21:43:31 +00:00
entries = append ( entries , d )
2017-01-31 20:34:11 +00:00
} else {
2017-06-11 21:43:31 +00:00
o := & Object {
2017-01-31 20:34:11 +00:00
fs : f ,
remote : remote ,
}
2017-06-30 09:24:06 +00:00
o . setMetadata ( info )
2017-06-11 21:43:31 +00:00
entries = append ( entries , o )
2016-11-12 23:36:08 +00:00
}
}
2017-06-11 21:43:31 +00:00
return entries , nil
2016-11-12 23:36:08 +00:00
}
2019-06-17 08:34:30 +00:00
// Put data from <in> into a new remote sftp file object described by <src.Remote()> and <src.ModTime(ctx)>
func ( f * Fs ) Put ( ctx context . Context , in io . Reader , src fs . ObjectInfo , options ... fs . OpenOption ) ( fs . Object , error ) {
2017-01-31 20:34:11 +00:00
err := f . mkParentDir ( src . Remote ( ) )
2016-11-12 23:36:08 +00:00
if err != nil {
2017-01-31 20:34:11 +00:00
return nil , errors . Wrap ( err , "Put mkParentDir failed" )
2016-11-12 23:36:08 +00:00
}
2017-01-31 20:34:11 +00:00
// Temporary object under construction
o := & Object {
fs : f ,
remote : src . Remote ( ) ,
2016-11-12 23:36:08 +00:00
}
2019-06-17 08:34:30 +00:00
err = o . Update ( ctx , in , src , options ... )
2016-11-12 23:36:08 +00:00
if err != nil {
return nil , err
}
return o , nil
}
2017-08-03 19:42:35 +00:00
// PutStream uploads to the remote path with the modTime given of indeterminate size
2019-06-17 08:34:30 +00:00
func ( f * Fs ) PutStream ( ctx context . Context , in io . Reader , src fs . ObjectInfo , options ... fs . OpenOption ) ( fs . Object , error ) {
return f . Put ( ctx , in , src , options ... )
2017-08-03 19:42:35 +00:00
}
2017-01-31 20:34:11 +00:00
// mkParentDir makes the parent of remote if necessary and any
// directories above that
func ( f * Fs ) mkParentDir ( remote string ) error {
parent := path . Dir ( remote )
2020-06-29 14:49:19 +00:00
return f . mkdir ( path . Join ( f . absRoot , parent ) )
2017-01-31 20:34:11 +00:00
}
// mkdir makes the directory and parents using native paths
2017-05-24 14:39:17 +00:00
func ( f * Fs ) mkdir ( dirPath string ) error {
f . mkdirLock . Lock ( dirPath )
defer f . mkdirLock . Unlock ( dirPath )
if dirPath == "." || dirPath == "/" {
2017-01-31 20:34:11 +00:00
return nil
}
2017-05-24 14:39:17 +00:00
ok , err := f . dirExists ( dirPath )
2017-01-31 20:34:11 +00:00
if err != nil {
return errors . Wrap ( err , "mkdir dirExists failed" )
}
if ok {
return nil
}
2017-05-24 14:39:17 +00:00
parent := path . Dir ( dirPath )
2017-01-31 20:34:11 +00:00
err = f . mkdir ( parent )
if err != nil {
return err
}
2017-08-07 16:19:37 +00:00
c , err := f . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "mkdir" )
}
err = c . sftpClient . Mkdir ( dirPath )
f . putSftpConnection ( & c , err )
2017-01-31 20:34:11 +00:00
if err != nil {
2017-05-24 14:39:17 +00:00
return errors . Wrapf ( err , "mkdir %q failed" , dirPath )
2016-11-12 23:36:08 +00:00
}
2017-01-31 20:34:11 +00:00
return nil
2016-11-12 23:36:08 +00:00
}
// Mkdir makes the root directory of the Fs object
2019-06-17 08:34:30 +00:00
func ( f * Fs ) Mkdir ( ctx context . Context , dir string ) error {
2020-06-29 14:49:19 +00:00
root := path . Join ( f . absRoot , dir )
2017-01-31 20:34:11 +00:00
return f . mkdir ( root )
2016-11-12 23:36:08 +00:00
}
// Rmdir removes the root directory of the Fs object
2019-06-17 08:34:30 +00:00
func ( f * Fs ) Rmdir ( ctx context . Context , dir string ) error {
2018-11-30 17:37:55 +00:00
// Check to see if directory is empty as some servers will
// delete recursively with RemoveDirectory
2019-06-17 08:34:30 +00:00
entries , err := f . List ( ctx , dir )
2018-11-30 17:37:55 +00:00
if err != nil {
return errors . Wrap ( err , "Rmdir" )
}
if len ( entries ) != 0 {
return fs . ErrorDirectoryNotEmpty
}
// Remove the directory
2020-06-29 14:49:19 +00:00
root := path . Join ( f . absRoot , dir )
2017-08-07 16:19:37 +00:00
c , err := f . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "Rmdir" )
}
2018-11-29 21:34:37 +00:00
err = c . sftpClient . RemoveDirectory ( root )
2017-08-07 16:19:37 +00:00
f . putSftpConnection ( & c , err )
return err
2016-11-12 23:36:08 +00:00
}
// Move renames a remote sftp file object
2019-06-17 08:34:30 +00:00
func ( f * Fs ) Move ( ctx context . Context , src fs . Object , remote string ) ( fs . Object , error ) {
2017-01-31 20:34:11 +00:00
srcObj , ok := src . ( * Object )
if ! ok {
2017-02-09 11:01:20 +00:00
fs . Debugf ( src , "Can't move - not same remote type" )
2017-01-31 20:34:11 +00:00
return nil , fs . ErrorCantMove
}
err := f . mkParentDir ( remote )
2016-11-12 23:36:08 +00:00
if err != nil {
2017-01-31 20:34:11 +00:00
return nil , errors . Wrap ( err , "Move mkParentDir failed" )
}
2017-08-07 16:19:37 +00:00
c , err := f . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "Move" )
}
err = c . sftpClient . Rename (
2017-01-31 20:34:11 +00:00
srcObj . path ( ) ,
2020-06-29 14:49:19 +00:00
path . Join ( f . absRoot , remote ) ,
2017-01-31 20:34:11 +00:00
)
2017-08-07 16:19:37 +00:00
f . putSftpConnection ( & c , err )
2017-01-31 20:34:11 +00:00
if err != nil {
return nil , errors . Wrap ( err , "Move Rename failed" )
2016-11-12 23:36:08 +00:00
}
2019-06-17 08:34:30 +00:00
dstObj , err := f . NewObject ( ctx , remote )
2017-01-31 20:34:11 +00:00
if err != nil {
return nil , errors . Wrap ( err , "Move NewObject failed" )
}
return dstObj , nil
}
2017-02-05 21:20:56 +00:00
// DirMove moves src, srcRemote to this remote at dstRemote
2020-10-13 21:43:40 +00:00
// using server-side move operations.
2017-01-31 20:34:11 +00:00
//
// Will only be called if src.Fs().Name() == f.Name()
//
// If it isn't possible then return fs.ErrorCantDirMove
//
// If destination exists then return fs.ErrorDirExists
2019-06-17 08:34:30 +00:00
func ( f * Fs ) DirMove ( ctx context . Context , src fs . Fs , srcRemote , dstRemote string ) error {
2017-01-31 20:34:11 +00:00
srcFs , ok := src . ( * Fs )
if ! ok {
2017-02-09 11:01:20 +00:00
fs . Debugf ( srcFs , "Can't move directory - not same remote type" )
2017-01-31 20:34:11 +00:00
return fs . ErrorCantDirMove
}
2020-06-29 14:49:19 +00:00
srcPath := path . Join ( srcFs . absRoot , srcRemote )
dstPath := path . Join ( f . absRoot , dstRemote )
2017-01-31 20:34:11 +00:00
// Check if destination exists
2017-02-05 21:20:56 +00:00
ok , err := f . dirExists ( dstPath )
2017-01-31 20:34:11 +00:00
if err != nil {
return errors . Wrap ( err , "DirMove dirExists dst failed" )
}
if ok {
return fs . ErrorDirExists
}
// Make sure the parent directory exists
2017-02-05 21:20:56 +00:00
err = f . mkdir ( path . Dir ( dstPath ) )
2017-01-31 20:34:11 +00:00
if err != nil {
2017-02-05 21:20:56 +00:00
return errors . Wrap ( err , "DirMove mkParentDir dst failed" )
2017-01-31 20:34:11 +00:00
}
// Do the move
2017-08-07 16:19:37 +00:00
c , err := f . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "DirMove" )
}
err = c . sftpClient . Rename (
2017-02-05 21:20:56 +00:00
srcPath ,
dstPath ,
2017-01-31 20:34:11 +00:00
)
2017-08-07 16:19:37 +00:00
f . putSftpConnection ( & c , err )
2017-01-31 20:34:11 +00:00
if err != nil {
2017-02-05 21:20:56 +00:00
return errors . Wrapf ( err , "DirMove Rename(%q,%q) failed" , srcPath , dstPath )
2017-01-31 20:34:11 +00:00
}
return nil
2016-11-12 23:36:08 +00:00
}
2019-06-26 15:50:31 +00:00
// run runds cmd on the remote end returning standard output
func ( f * Fs ) run ( cmd string ) ( [ ] byte , error ) {
c , err := f . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "run: get SFTP connection" )
2017-08-06 10:49:52 +00:00
}
2019-06-26 15:50:31 +00:00
defer f . putSftpConnection ( & c , err )
2017-08-06 10:49:52 +00:00
2019-06-26 15:50:31 +00:00
session , err := c . sshClient . NewSession ( )
if err != nil {
Spelling fixes
Fix spelling of: above, already, anonymous, associated,
authentication, bandwidth, because, between, blocks, calculate,
candidates, cautious, changelog, cleaner, clipboard, command,
completely, concurrently, considered, constructs, corrupt, current,
daemon, dependencies, deprecated, directory, dispatcher, download,
eligible, ellipsis, encrypter, endpoint, entrieslist, essentially,
existing writers, existing, expires, filesystem, flushing, frequently,
hierarchy, however, implementation, implements, inaccurate,
individually, insensitive, longer, maximum, metadata, modified,
multipart, namedirfirst, nextcloud, obscured, opened, optional,
owncloud, pacific, passphrase, password, permanently, persimmon,
positive, potato, protocol, quota, receiving, recommends, referring,
requires, revisited, satisfied, satisfies, satisfy, semver,
serialized, session, storage, strategies, stringlist, successful,
supported, surprise, temporarily, temporary, transactions, unneeded,
update, uploads, wrapped
Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2020-10-09 00:17:24 +00:00
return nil , errors . Wrap ( err , "run: get SFTP session" )
2018-01-05 09:01:35 +00:00
}
2019-06-26 15:50:31 +00:00
defer func ( ) {
_ = session . Close ( )
} ( )
2018-01-05 09:01:35 +00:00
2019-06-26 15:50:31 +00:00
var stdout , stderr bytes . Buffer
session . Stdout = & stdout
session . Stderr = & stderr
err = session . Run ( cmd )
2017-08-07 16:19:37 +00:00
if err != nil {
2019-06-26 15:50:31 +00:00
return nil , errors . Wrapf ( err , "failed to run %q: %s" , cmd , stderr . Bytes ( ) )
}
return stdout . Bytes ( ) , nil
}
// Hashes returns the supported hash types of the filesystem
func ( f * Fs ) Hashes ( ) hash . Set {
if f . opt . DisableHashCheck {
2018-01-18 20:27:52 +00:00
return hash . Set ( hash . None )
2017-08-07 16:19:37 +00:00
}
2019-06-26 15:50:31 +00:00
if f . cachedHashes != nil {
return * f . cachedHashes
}
2017-08-06 10:49:52 +00:00
2019-06-26 12:33:36 +00:00
// look for a hash command which works
2019-06-26 15:50:31 +00:00
checkHash := func ( commands [ ] string , expected string , hashCommand * string , changed * bool ) bool {
if * hashCommand == hashCommandNotSupported {
return false
}
if * hashCommand != "" {
return true
}
* changed = true
2019-06-26 12:33:36 +00:00
for _ , command := range commands {
2019-06-26 15:50:31 +00:00
output , err := f . run ( command )
2019-06-26 12:33:36 +00:00
if err != nil {
continue
}
output = bytes . TrimSpace ( output )
fs . Debugf ( f , "checking %q command: %q" , command , output )
2019-06-26 15:50:31 +00:00
if parseHash ( output ) == expected {
2019-06-26 12:33:36 +00:00
* hashCommand = command
return true
}
}
2019-06-26 15:50:31 +00:00
* hashCommand = hashCommandNotSupported
2019-06-26 12:33:36 +00:00
return false
2017-08-06 10:49:52 +00:00
}
2019-06-26 15:50:31 +00:00
changed := false
md5Works := checkHash ( [ ] string { "md5sum" , "md5 -r" } , "d41d8cd98f00b204e9800998ecf8427e" , & f . opt . Md5sumCommand , & changed )
sha1Works := checkHash ( [ ] string { "sha1sum" , "sha1 -r" } , "da39a3ee5e6b4b0d3255bfef95601890afd80709" , & f . opt . Sha1sumCommand , & changed )
if changed {
f . m . Set ( "md5sum_command" , f . opt . Md5sumCommand )
f . m . Set ( "sha1sum_command" , f . opt . Sha1sumCommand )
}
2017-08-06 10:49:52 +00:00
2018-01-12 16:30:54 +00:00
set := hash . NewHashSet ( )
2017-08-06 10:49:52 +00:00
if sha1Works {
2018-01-18 20:27:52 +00:00
set . Add ( hash . SHA1 )
2017-08-06 10:49:52 +00:00
}
if md5Works {
2018-01-18 20:27:52 +00:00
set . Add ( hash . MD5 )
2017-08-06 10:49:52 +00:00
}
f . cachedHashes = & set
return set
2016-11-12 23:36:08 +00:00
}
2019-04-25 09:51:15 +00:00
// About gets usage stats
2019-06-26 10:24:48 +00:00
func ( f * Fs ) About ( ctx context . Context ) ( * fs . Usage , error ) {
2019-04-25 09:51:15 +00:00
escapedPath := shellEscape ( f . root )
if f . opt . PathOverride != "" {
escapedPath = shellEscape ( path . Join ( f . opt . PathOverride , f . root ) )
}
if len ( escapedPath ) == 0 {
escapedPath = "/"
}
2019-06-26 15:50:31 +00:00
stdout , err := f . run ( "df -k " + escapedPath )
2019-04-25 09:51:15 +00:00
if err != nil {
2019-06-26 15:50:31 +00:00
return nil , errors . Wrap ( err , "your remote may not support About" )
2019-04-25 09:51:15 +00:00
}
2019-06-26 15:50:31 +00:00
usageTotal , usageUsed , usageAvail := parseUsage ( stdout )
2019-05-09 13:29:52 +00:00
usage := & fs . Usage { }
if usageTotal >= 0 {
usage . Total = fs . NewUsageValue ( usageTotal )
2019-04-25 09:51:15 +00:00
}
2019-05-09 13:29:52 +00:00
if usageUsed >= 0 {
usage . Used = fs . NewUsageValue ( usageUsed )
}
if usageAvail >= 0 {
usage . Free = fs . NewUsageValue ( usageAvail )
2019-04-25 09:51:15 +00:00
}
return usage , nil
}
2016-11-12 23:36:08 +00:00
// Fs is the filesystem this remote sftp file object is located within
func ( o * Object ) Fs ( ) fs . Info {
return o . fs
}
// String returns the URL to the remote SFTP file
func ( o * Object ) String ( ) string {
if o == nil {
return "<nil>"
}
2017-01-31 20:34:11 +00:00
return o . remote
2016-11-12 23:36:08 +00:00
}
// Remote the name of the remote SFTP file, relative to the fs root
func ( o * Object ) Remote ( ) string {
return o . remote
}
2017-08-07 13:50:31 +00:00
// Hash returns the selected checksum of the file
// If no checksum is available it returns ""
2019-06-17 08:34:30 +00:00
func ( o * Object ) Hash ( ctx context . Context , r hash . Type ) ( string , error ) {
2019-06-26 12:33:36 +00:00
if o . fs . opt . DisableHashCheck {
return "" , nil
}
2019-06-26 15:50:31 +00:00
_ = o . fs . Hashes ( )
2019-06-26 12:33:36 +00:00
2018-04-19 08:45:46 +00:00
var hashCmd string
if r == hash . MD5 {
if o . md5sum != nil {
return * o . md5sum , nil
}
2019-06-26 15:50:31 +00:00
hashCmd = o . fs . opt . Md5sumCommand
2018-04-19 08:45:46 +00:00
} else if r == hash . SHA1 {
if o . sha1sum != nil {
return * o . sha1sum , nil
}
2019-06-26 15:50:31 +00:00
hashCmd = o . fs . opt . Sha1sumCommand
2018-04-19 08:45:46 +00:00
} else {
return "" , hash . ErrUnsupported
2017-08-06 10:49:52 +00:00
}
2019-06-26 15:50:31 +00:00
if hashCmd == "" || hashCmd == hashCommandNotSupported {
2019-06-26 12:33:36 +00:00
return "" , hash . ErrUnsupported
2018-10-22 10:01:41 +00:00
}
2017-08-07 16:19:37 +00:00
c , err := o . fs . getSftpConnection ( )
if err != nil {
2018-04-19 08:45:46 +00:00
return "" , errors . Wrap ( err , "Hash get SFTP connection" )
2017-08-07 16:19:37 +00:00
}
session , err := c . sshClient . NewSession ( )
o . fs . putSftpConnection ( & c , err )
2017-08-06 10:49:52 +00:00
if err != nil {
2018-04-19 08:45:46 +00:00
return "" , errors . Wrap ( err , "Hash put SFTP connection" )
2017-08-06 10:49:52 +00:00
}
2018-04-19 08:45:46 +00:00
var stdout , stderr bytes . Buffer
session . Stdout = & stdout
session . Stderr = & stderr
2017-08-06 10:49:52 +00:00
escapedPath := shellEscape ( o . path ( ) )
2018-05-14 17:06:57 +00:00
if o . fs . opt . PathOverride != "" {
escapedPath = shellEscape ( path . Join ( o . fs . opt . PathOverride , o . remote ) )
2018-04-30 16:05:10 +00:00
}
2018-04-19 08:45:46 +00:00
err = session . Run ( hashCmd + " " + escapedPath )
2019-07-26 11:19:47 +00:00
fs . Debugf ( nil , "sftp cmd = %s" , escapedPath )
2017-08-06 10:49:52 +00:00
if err != nil {
_ = session . Close ( )
2018-04-19 08:45:46 +00:00
fs . Debugf ( o , "Failed to calculate %v hash: %v (%s)" , r , err , bytes . TrimSpace ( stderr . Bytes ( ) ) )
return "" , nil
2017-08-06 10:49:52 +00:00
}
_ = session . Close ( )
2019-07-26 11:19:47 +00:00
b := stdout . Bytes ( )
fs . Debugf ( nil , "sftp output = %q" , b )
str := parseHash ( b )
fs . Debugf ( nil , "sftp hash = %q" , str )
2018-01-18 20:27:52 +00:00
if r == hash . MD5 {
2017-08-06 10:49:52 +00:00
o . md5sum = & str
2018-01-18 20:27:52 +00:00
} else if r == hash . SHA1 {
2017-08-06 10:49:52 +00:00
o . sha1sum = & str
}
return str , nil
}
2019-07-26 11:19:47 +00:00
var shellEscapeRegex = regexp . MustCompile ( "[^A-Za-z0-9_.,:/\\@\u0080-\uFFFFFFFF\n-]" )
2017-08-06 10:49:52 +00:00
// Escape a string s.t. it cannot cause unintended behavior
// when sending it to a shell.
func shellEscape ( str string ) string {
safe := shellEscapeRegex . ReplaceAllString ( str , ` \$0 ` )
return strings . Replace ( safe , "\n" , "'\n'" , - 1 )
}
// Converts a byte array from the SSH session returned by
// an invocation of md5sum/sha1sum to a hash string
// as expected by the rest of this application
func parseHash ( bytes [ ] byte ) string {
2019-07-26 11:19:47 +00:00
// For strings with backslash *sum writes a leading \
// https://unix.stackexchange.com/q/313733/94054
2020-09-22 01:15:09 +00:00
return strings . ToLower ( strings . Split ( strings . TrimLeft ( string ( bytes ) , "\\" ) , " " ) [ 0 ] ) // Split at hash / filename separator / all convert to lowercase
2016-11-12 23:36:08 +00:00
}
2019-04-25 09:51:15 +00:00
// Parses the byte array output from the SSH session
// returned by an invocation of df into
2020-05-20 10:39:20 +00:00
// the disk size, used space, and available space on the disk, in that order.
2019-04-25 09:51:15 +00:00
// Only works when `df` has output info on only one disk
2019-05-09 13:29:52 +00:00
func parseUsage ( bytes [ ] byte ) ( spaceTotal int64 , spaceUsed int64 , spaceAvail int64 ) {
spaceTotal , spaceUsed , spaceAvail = - 1 , - 1 , - 1
2019-04-25 09:51:15 +00:00
lines := strings . Split ( string ( bytes ) , "\n" )
if len ( lines ) < 2 {
2019-05-09 13:29:52 +00:00
return
2019-04-25 09:51:15 +00:00
}
split := strings . Fields ( lines [ 1 ] )
if len ( split ) < 6 {
2019-05-09 13:29:52 +00:00
return
2019-04-25 09:51:15 +00:00
}
spaceTotal , err := strconv . ParseInt ( split [ 1 ] , 10 , 64 )
if err != nil {
2019-05-09 13:29:52 +00:00
spaceTotal = - 1
2019-04-25 09:51:15 +00:00
}
2019-05-09 13:29:52 +00:00
spaceUsed , err = strconv . ParseInt ( split [ 2 ] , 10 , 64 )
2019-04-25 09:51:15 +00:00
if err != nil {
2019-05-09 13:29:52 +00:00
spaceUsed = - 1
2019-04-25 09:51:15 +00:00
}
2019-05-09 13:29:52 +00:00
spaceAvail , err = strconv . ParseInt ( split [ 3 ] , 10 , 64 )
2019-04-25 09:51:15 +00:00
if err != nil {
2019-05-09 13:29:52 +00:00
spaceAvail = - 1
2019-04-25 09:51:15 +00:00
}
return spaceTotal * 1024 , spaceUsed * 1024 , spaceAvail * 1024
}
2016-11-12 23:36:08 +00:00
// Size returns the size in bytes of the remote sftp file
func ( o * Object ) Size ( ) int64 {
2017-06-30 09:24:06 +00:00
return o . size
2016-11-12 23:36:08 +00:00
}
// ModTime returns the modification time of the remote sftp file
2019-06-17 08:34:30 +00:00
func ( o * Object ) ModTime ( ctx context . Context ) time . Time {
2017-06-30 09:24:06 +00:00
return o . modTime
2016-11-12 23:36:08 +00:00
}
2017-01-31 20:34:11 +00:00
// path returns the native path of the object
func ( o * Object ) path ( ) string {
2020-06-29 14:49:19 +00:00
return path . Join ( o . fs . absRoot , o . remote )
2017-01-31 20:34:11 +00:00
}
2017-06-30 09:24:06 +00:00
// setMetadata updates the info in the object from the stat result passed in
func ( o * Object ) setMetadata ( info os . FileInfo ) {
o . modTime = info . ModTime ( )
o . size = info . Size ( )
o . mode = info . Mode ( )
}
2018-03-16 15:36:47 +00:00
// statRemote stats the file or directory at the remote given
func ( f * Fs ) stat ( remote string ) ( info os . FileInfo , err error ) {
c , err := f . getSftpConnection ( )
2017-08-07 16:19:37 +00:00
if err != nil {
2018-03-16 15:36:47 +00:00
return nil , errors . Wrap ( err , "stat" )
2017-08-07 16:19:37 +00:00
}
2020-06-29 14:49:19 +00:00
absPath := path . Join ( f . absRoot , remote )
2018-03-16 15:36:47 +00:00
info , err = c . sftpClient . Stat ( absPath )
f . putSftpConnection ( & c , err )
return info , err
}
// stat updates the info in the Object
func ( o * Object ) stat ( ) error {
info , err := o . fs . stat ( o . remote )
2017-01-31 20:34:11 +00:00
if err != nil {
if os . IsNotExist ( err ) {
return fs . ErrorObjectNotFound
}
return errors . Wrap ( err , "stat failed" )
}
if info . IsDir ( ) {
2017-02-25 11:09:57 +00:00
return errors . Wrapf ( fs . ErrorNotAFile , "%q" , o . remote )
2017-01-31 20:34:11 +00:00
}
2017-06-30 09:24:06 +00:00
o . setMetadata ( info )
2017-01-31 20:34:11 +00:00
return nil
}
2016-11-12 23:36:08 +00:00
// SetModTime sets the modification and access time to the specified time
2017-01-31 20:34:11 +00:00
//
// it also updates the info field
2019-06-17 08:34:30 +00:00
func ( o * Object ) SetModTime ( ctx context . Context , modTime time . Time ) error {
2020-05-13 20:53:04 +00:00
if o . fs . opt . SetModTime {
c , err := o . fs . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "SetModTime" )
}
err = c . sftpClient . Chtimes ( o . path ( ) , modTime , modTime )
o . fs . putSftpConnection ( & c , err )
if err != nil {
return errors . Wrap ( err , "SetModTime failed" )
}
2016-11-12 23:36:08 +00:00
}
2020-05-13 20:53:04 +00:00
err := o . stat ( )
2017-01-31 20:34:11 +00:00
if err != nil {
2018-01-04 14:52:47 +00:00
return errors . Wrap ( err , "SetModTime stat failed" )
2017-01-31 20:34:11 +00:00
}
return nil
2016-11-12 23:36:08 +00:00
}
2020-10-13 22:07:12 +00:00
// Storable returns whether the remote sftp file is a regular file (not a directory, symbolic link, block device, character device, named pipe, etc.)
2016-11-12 23:36:08 +00:00
func ( o * Object ) Storable ( ) bool {
2017-06-30 09:24:06 +00:00
return o . mode . IsRegular ( )
2016-11-12 23:36:08 +00:00
}
2018-05-24 14:03:57 +00:00
// objectReader represents a file open for reading on the SFTP server
type objectReader struct {
sftpFile * sftp . File
pipeReader * io . PipeReader
done chan struct { }
}
func newObjectReader ( sftpFile * sftp . File ) * objectReader {
pipeReader , pipeWriter := io . Pipe ( )
file := & objectReader {
sftpFile : sftpFile ,
pipeReader : pipeReader ,
done : make ( chan struct { } ) ,
}
go func ( ) {
// Use sftpFile.WriteTo to pump data so that it gets a
// chance to build the window up.
_ , err := sftpFile . WriteTo ( pipeWriter )
// Close the pipeWriter so the pipeReader fails with
// the same error or EOF if err == nil
_ = pipeWriter . CloseWithError ( err )
// signal that we've finished
close ( file . done )
} ( )
return file
}
2016-11-12 23:36:08 +00:00
// Read from a remote sftp file object reader
2018-05-24 14:03:57 +00:00
func ( file * objectReader ) Read ( p [ ] byte ) ( n int , err error ) {
n , err = file . pipeReader . Read ( p )
2016-11-12 23:36:08 +00:00
return n , err
}
// Close a reader of a remote sftp file
2018-05-24 14:03:57 +00:00
func ( file * objectReader ) Close ( ) ( err error ) {
// Close the sftpFile - this will likely cause the WriteTo to error
2016-11-12 23:36:08 +00:00
err = file . sftpFile . Close ( )
2018-05-24 14:03:57 +00:00
// Close the pipeReader so writes to the pipeWriter fail
_ = file . pipeReader . Close ( )
// Wait for the background process to finish
<- file . done
2016-11-12 23:36:08 +00:00
return err
}
// Open a remote sftp file object for reading. Seek is supported
2019-06-17 08:34:30 +00:00
func ( o * Object ) Open ( ctx context . Context , options ... fs . OpenOption ) ( in io . ReadCloser , err error ) {
2018-01-27 10:07:17 +00:00
var offset , limit int64 = 0 , - 1
2016-11-12 23:36:08 +00:00
for _ , option := range options {
switch x := option . ( type ) {
case * fs . SeekOption :
2018-01-27 10:07:17 +00:00
offset = x . Offset
2018-01-23 20:21:19 +00:00
case * fs . RangeOption :
offset , limit = x . Decode ( o . Size ( ) )
2016-11-12 23:36:08 +00:00
default :
if option . Mandatory ( ) {
2017-02-09 11:01:20 +00:00
fs . Logf ( o , "Unsupported mandatory option: %v" , option )
2016-11-12 23:36:08 +00:00
}
}
}
2017-08-07 16:19:37 +00:00
c , err := o . fs . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "Open" )
}
sftpFile , err := c . sftpClient . Open ( o . path ( ) )
o . fs . putSftpConnection ( & c , err )
2016-11-12 23:36:08 +00:00
if err != nil {
2017-01-31 20:34:11 +00:00
return nil , errors . Wrap ( err , "Open failed" )
2016-11-12 23:36:08 +00:00
}
if offset > 0 {
2018-04-06 18:53:06 +00:00
off , err := sftpFile . Seek ( offset , io . SeekStart )
2016-11-12 23:36:08 +00:00
if err != nil || off != offset {
2017-01-31 20:34:11 +00:00
return nil , errors . Wrap ( err , "Open Seek failed" )
2016-11-12 23:36:08 +00:00
}
}
2018-05-24 14:03:57 +00:00
in = readers . NewLimitedReadCloser ( newObjectReader ( sftpFile ) , limit )
2016-11-12 23:36:08 +00:00
return in , nil
}
// Update a remote sftp file using the data <in> and ModTime from <src>
2019-06-17 08:34:30 +00:00
func ( o * Object ) Update ( ctx context . Context , in io . Reader , src fs . ObjectInfo , options ... fs . OpenOption ) error {
2017-08-07 16:36:59 +00:00
// Clear the hash cache since we are about to update the object
o . md5sum = nil
o . sha1sum = nil
2017-08-07 16:19:37 +00:00
c , err := o . fs . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "Update" )
}
2019-12-02 17:28:50 +00:00
file , err := c . sftpClient . OpenFile ( o . path ( ) , os . O_WRONLY | os . O_CREATE | os . O_TRUNC )
2017-08-07 16:19:37 +00:00
o . fs . putSftpConnection ( & c , err )
2017-01-31 20:34:11 +00:00
if err != nil {
return errors . Wrap ( err , "Update Create failed" )
}
// remove the file if upload failed
remove := func ( ) {
2017-08-07 16:19:37 +00:00
c , removeErr := o . fs . getSftpConnection ( )
if removeErr != nil {
fs . Debugf ( src , "Failed to open new SSH connection for delete: %v" , removeErr )
return
}
removeErr = c . sftpClient . Remove ( o . path ( ) )
o . fs . putSftpConnection ( & c , removeErr )
2017-01-31 20:34:11 +00:00
if removeErr != nil {
2017-02-09 11:01:20 +00:00
fs . Debugf ( src , "Failed to remove: %v" , removeErr )
2017-01-31 20:34:11 +00:00
} else {
2017-02-09 11:01:20 +00:00
fs . Debugf ( src , "Removed after failed upload: %v" , err )
2016-11-12 23:36:08 +00:00
}
}
2017-01-31 20:34:11 +00:00
_ , err = file . ReadFrom ( in )
if err != nil {
remove ( )
return errors . Wrap ( err , "Update ReadFrom failed" )
}
err = file . Close ( )
if err != nil {
remove ( )
return errors . Wrap ( err , "Update Close failed" )
}
2019-06-17 08:34:30 +00:00
err = o . SetModTime ( ctx , src . ModTime ( ctx ) )
2017-01-31 20:34:11 +00:00
if err != nil {
return errors . Wrap ( err , "Update SetModTime failed" )
}
return nil
2016-11-12 23:36:08 +00:00
}
// Remove a remote sftp file object
2019-06-17 08:34:30 +00:00
func ( o * Object ) Remove ( ctx context . Context ) error {
2017-08-07 16:19:37 +00:00
c , err := o . fs . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "Remove" )
}
err = c . sftpClient . Remove ( o . path ( ) )
o . fs . putSftpConnection ( & c , err )
return err
2016-11-12 23:36:08 +00:00
}
// Check the interfaces are satisfied
var (
2017-08-03 19:42:35 +00:00
_ fs . Fs = & Fs { }
_ fs . PutStreamer = & Fs { }
_ fs . Mover = & Fs { }
_ fs . DirMover = & Fs { }
2019-06-26 10:24:48 +00:00
_ fs . Abouter = & Fs { }
2017-08-03 19:42:35 +00:00
_ fs . Object = & Object { }
2016-11-12 23:36:08 +00:00
)