2016-11-13 00:36:08 +01:00
// Package sftp provides a filesystem interface using github.com/pkg/sftp
2017-01-31 21:34:11 +01:00
2019-04-15 21:03:33 +02:00
// +build !plan9
2017-01-31 21:34:11 +01:00
2016-11-13 00:36:08 +01:00
package sftp
import (
2018-04-19 10:45:46 +02:00
"bytes"
2018-04-06 20:13:27 +02:00
"context"
2018-03-15 00:17:09 +01:00
"fmt"
2016-11-13 00:36:08 +01:00
"io"
2017-06-23 17:25:35 +02:00
"io/ioutil"
2016-11-13 00:36:08 +01:00
"os"
2018-01-07 13:57:46 +01:00
"os/user"
2016-11-13 00:36:08 +01:00
"path"
2017-08-07 15:50:31 +02:00
"regexp"
2019-04-25 11:51:15 +02:00
"strconv"
2017-08-07 15:50:31 +02:00
"strings"
2017-08-07 18:19:37 +02:00
"sync"
2016-11-13 00:36:08 +01:00
"time"
2017-01-31 21:34:11 +01:00
"github.com/pkg/errors"
2016-11-13 00:36:08 +01:00
"github.com/pkg/sftp"
2019-07-28 19:47:38 +02:00
"github.com/rclone/rclone/fs"
"github.com/rclone/rclone/fs/config"
"github.com/rclone/rclone/fs/config/configmap"
"github.com/rclone/rclone/fs/config/configstruct"
"github.com/rclone/rclone/fs/config/obscure"
"github.com/rclone/rclone/fs/fshttp"
"github.com/rclone/rclone/fs/hash"
"github.com/rclone/rclone/lib/env"
2019-11-07 14:57:42 +01:00
"github.com/rclone/rclone/lib/pacer"
2019-07-28 19:47:38 +02:00
"github.com/rclone/rclone/lib/readers"
2018-12-04 11:11:57 +01:00
sshagent "github.com/xanzy/ssh-agent"
2017-05-24 16:39:17 +02:00
"golang.org/x/crypto/ssh"
2017-08-07 19:01:31 +02:00
)
const (
2019-06-26 17:50:31 +02:00
hashCommandNotSupported = "none"
2019-11-07 14:57:42 +01:00
minSleep = 100 * time . Millisecond
maxSleep = 2 * time . Second
decayConstant = 2 // bigger for slower decay, exponential
2016-11-13 00:36:08 +01:00
)
2018-01-07 13:57:46 +01:00
var (
currentUser = readCurrentUser ( )
)
2016-11-13 00:36:08 +01:00
func init ( ) {
fsi := & fs . RegInfo {
Name : "sftp" ,
Description : "SSH/SFTP Connection" ,
NewFs : NewFs ,
Options : [ ] fs . Option { {
Name : "host" ,
Help : "SSH host to connect to" ,
2018-05-14 19:06:57 +02:00
Required : true ,
2016-11-13 00:36:08 +01:00
Examples : [ ] fs . OptionExample { {
Value : "example.com" ,
Help : "Connect to example.com" ,
} } ,
} , {
2018-05-14 19:06:57 +02:00
Name : "user" ,
Help : "SSH username, leave blank for current username, " + currentUser ,
2016-11-13 00:36:08 +01:00
} , {
2018-05-14 19:06:57 +02:00
Name : "port" ,
Help : "SSH port, leave blank to use default (22)" ,
2016-11-13 00:36:08 +01:00
} , {
Name : "pass" ,
2017-06-23 17:25:35 +02:00
Help : "SSH password, leave blank to use ssh-agent." ,
2016-11-13 00:36:08 +01:00
IsPassword : true ,
2020-05-19 12:55:38 +02:00
} , {
Name : "key_pem" ,
Help : "Raw PEM-encoded private key, If specified, will override key_file parameter." ,
2017-06-23 17:25:35 +02:00
} , {
2018-05-14 19:06:57 +02:00
Name : "key_file" ,
2020-06-02 12:54:52 +02:00
Help : "Path to PEM-encoded private key file, leave blank or set key-use-agent to use ssh-agent." + env . ShellExpandHelp ,
2019-01-03 12:24:31 +01:00
} , {
Name : "key_file_pass" ,
Help : ` The passphrase to decrypt the PEM - encoded private key file .
Only PEM encrypted key files ( old OpenSSH format ) are supported . Encrypted keys
in the new OpenSSH format can ' t be used . ` ,
IsPassword : true ,
2019-01-03 12:25:13 +01:00
} , {
Name : "key_use_agent" ,
Help : ` When set forces the usage of the ssh - agent .
When key - file is also set , the ".pub" file of the specified key - file is read and only the associated key is
requested from the ssh - agent . This allows to avoid ` + " ` Too many authentication failures for * username * ` " + ` errors
when the ssh - agent contains many keys . ` ,
Default : false ,
2017-12-08 13:22:09 +01:00
} , {
2019-10-16 23:22:45 +02:00
Name : "use_insecure_cipher" ,
Help : ` Enable the use of insecure ciphers and key exchange methods .
2020-05-25 08:05:53 +02:00
This enables the use of the following insecure ciphers and key exchange methods :
2019-10-16 23:22:45 +02:00
- aes128 - cbc
- aes192 - cbc
- aes256 - cbc
- 3 des - cbc
- diffie - hellman - group - exchange - sha256
- diffie - hellman - group - exchange - sha1
Those algorithms are insecure and may allow plaintext data to be recovered by an attacker . ` ,
2018-05-14 19:06:57 +02:00
Default : false ,
2017-12-08 13:22:09 +01:00
Examples : [ ] fs . OptionExample {
{
Value : "false" ,
Help : "Use default Cipher list." ,
} , {
Value : "true" ,
2019-07-10 14:23:02 +02:00
Help : "Enables the use of the aes128-cbc cipher and diffie-hellman-group-exchange-sha256, diffie-hellman-group-exchange-sha1 key exchange." ,
2017-12-08 13:22:09 +01:00
} ,
} ,
2018-01-05 10:01:35 +01:00
} , {
2018-05-14 19:06:57 +02:00
Name : "disable_hashcheck" ,
Default : false ,
Help : "Disable the execution of SSH commands to determine if remote file hashing is available.\nLeave blank or set to false to enable hashing (recommended), set to true to disable hashing." ,
} , {
2019-09-15 19:23:19 +02:00
Name : "ask_password" ,
Default : false ,
Help : ` Allow asking for SFTP password when needed .
If this is set and no password is supplied then rclone will :
- ask for a password
- not contact the ssh agent
` ,
2018-05-14 19:06:57 +02:00
Advanced : true ,
} , {
2018-10-01 19:36:15 +02:00
Name : "path_override" ,
Default : "" ,
Help : ` Override path used by SSH connection .
This allows checksum calculation when SFTP and SSH paths are
different . This issue affects among others Synology NAS boxes .
Shared folders can be found in directories representing volumes
rclone sync / home / local / directory remote : / directory -- ssh - path - override / volume2 / directory
Home directory can be found in a shared folder called "home"
rclone sync / home / local / directory remote : / home / directory -- ssh - path - override / volume1 / homes / USER / directory ` ,
2018-05-14 19:06:57 +02:00
Advanced : true ,
} , {
Name : "set_modtime" ,
Default : true ,
Help : "Set the modified time on the remote if set." ,
Advanced : true ,
2019-06-26 17:50:31 +02:00
} , {
Name : "md5sum_command" ,
Default : "" ,
Help : "The command used to read md5 hashes. Leave blank for autodetect." ,
Advanced : true ,
} , {
Name : "sha1sum_command" ,
Default : "" ,
Help : "The command used to read sha1 hashes. Leave blank for autodetect." ,
Advanced : true ,
2019-11-14 23:00:30 +01:00
} , {
Name : "skip_links" ,
Default : false ,
Help : "Set to skip any symlinks and any other non regular files." ,
Advanced : true ,
2020-08-13 19:23:54 +02:00
} , {
Name : "subsystem" ,
Default : "sftp" ,
Help : "Specifies the SSH2 subsystem on the remote host." ,
Advanced : true ,
} , {
Name : "server_command" ,
Default : "" ,
Help : ` Specifies the path or command to run a sftp server on the remote host .
The subsystem option is ignored when server_command is defined . ` ,
Advanced : true ,
2016-11-13 00:36:08 +01:00
} } ,
}
fs . Register ( fsi )
}
2018-05-14 19:06:57 +02:00
// Options defines the configuration for this backend
type Options struct {
Host string ` config:"host" `
User string ` config:"user" `
Port string ` config:"port" `
Pass string ` config:"pass" `
2020-05-19 12:55:38 +02:00
KeyPem string ` config:"key_pem" `
2018-05-14 19:06:57 +02:00
KeyFile string ` config:"key_file" `
2019-01-03 12:24:31 +01:00
KeyFilePass string ` config:"key_file_pass" `
2019-01-03 12:25:13 +01:00
KeyUseAgent bool ` config:"key_use_agent" `
2018-05-14 19:06:57 +02:00
UseInsecureCipher bool ` config:"use_insecure_cipher" `
DisableHashCheck bool ` config:"disable_hashcheck" `
AskPassword bool ` config:"ask_password" `
PathOverride string ` config:"path_override" `
SetModTime bool ` config:"set_modtime" `
2019-06-26 17:50:31 +02:00
Md5sumCommand string ` config:"md5sum_command" `
Sha1sumCommand string ` config:"sha1sum_command" `
2019-11-14 23:00:30 +01:00
SkipLinks bool ` config:"skip_links" `
2020-08-13 19:23:54 +02:00
Subsystem string ` config:"subsystem" `
ServerCommand string ` config:"server_command" `
2018-05-14 19:06:57 +02:00
}
2016-11-13 00:36:08 +01:00
// Fs stores the interface to the remote SFTP files
type Fs struct {
2018-05-14 19:06:57 +02:00
name string
root string
2020-06-29 16:49:19 +02:00
absRoot string
2019-06-26 17:50:31 +02:00
opt Options // parsed options
m configmap . Mapper // config
features * fs . Features // optional features
2018-05-14 19:06:57 +02:00
config * ssh . ClientConfig
url string
mkdirLock * stringLock
cachedHashes * hash . Set
poolMu sync . Mutex
pool [ ] * conn
2019-11-07 14:57:42 +01:00
pacer * fs . Pacer // pacer for operations
2016-11-13 00:36:08 +01:00
}
// Object is a remote SFTP file that has been stat'd (so it exists, but is not necessarily open for reading)
type Object struct {
2017-06-30 11:24:06 +02:00
fs * Fs
remote string
size int64 // size of the object
modTime time . Time // modification time of the object
mode os . FileMode // mode bits from the file
2017-08-06 12:49:52 +02:00
md5sum * string // Cached MD5 checksum
sha1sum * string // Cached SHA1 checksum
2016-11-13 00:36:08 +01:00
}
2018-01-07 13:57:46 +01:00
// readCurrentUser finds the current user name or "" if not found
func readCurrentUser ( ) ( userName string ) {
usr , err := user . Current ( )
if err == nil {
return usr . Username
}
2018-01-08 22:39:16 +01:00
// Fall back to reading $USER then $LOGNAME
userName = os . Getenv ( "USER" )
2018-01-07 13:57:46 +01:00
if userName != "" {
return userName
}
return os . Getenv ( "LOGNAME" )
}
2019-05-10 08:51:01 +02:00
// dial starts a client connection to the given SSH server. It is a
2017-07-23 17:10:23 +02:00
// convenience function that connects to the given network address,
// initiates the SSH handshake, and then sets up a Client.
2019-05-10 08:51:01 +02:00
func ( f * Fs ) dial ( network , addr string , sshConfig * ssh . ClientConfig ) ( * ssh . Client , error ) {
2018-01-12 17:30:54 +01:00
dialer := fshttp . NewDialer ( fs . Config )
2017-07-23 17:10:23 +02:00
conn , err := dialer . Dial ( network , addr )
if err != nil {
return nil , err
}
2018-01-12 17:30:54 +01:00
c , chans , reqs , err := ssh . NewClientConn ( conn , addr , sshConfig )
2017-07-23 17:10:23 +02:00
if err != nil {
return nil , err
}
2019-05-10 08:51:01 +02:00
fs . Debugf ( f , "New connection %s->%s to %q" , c . LocalAddr ( ) , c . RemoteAddr ( ) , c . ServerVersion ( ) )
2017-07-23 17:10:23 +02:00
return ssh . NewClient ( c , chans , reqs ) , nil
}
2017-08-07 18:19:37 +02:00
// conn encapsulates an ssh client and corresponding sftp client
type conn struct {
sshClient * ssh . Client
sftpClient * sftp . Client
err chan error
}
// Wait for connection to close
func ( c * conn ) wait ( ) {
c . err <- c . sshClient . Conn . Wait ( )
}
// Closes the connection
func ( c * conn ) close ( ) error {
sftpErr := c . sftpClient . Close ( )
sshErr := c . sshClient . Close ( )
if sftpErr != nil {
return sftpErr
}
return sshErr
}
// Returns an error if closed
func ( c * conn ) closed ( ) error {
select {
case err := <- c . err :
return err
default :
}
return nil
}
// Open a new connection to the SFTP server.
func ( f * Fs ) sftpConnection ( ) ( c * conn , err error ) {
2017-08-07 19:01:31 +02:00
// Rate limit rate of new connections
2017-08-07 18:19:37 +02:00
c = & conn {
err : make ( chan error , 1 ) ,
}
2019-05-10 08:51:01 +02:00
c . sshClient , err = f . dial ( "tcp" , f . opt . Host + ":" + f . opt . Port , f . config )
2017-08-07 18:19:37 +02:00
if err != nil {
return nil , errors . Wrap ( err , "couldn't connect SSH" )
}
2020-08-13 19:23:54 +02:00
c . sftpClient , err = f . newSftpClient ( c . sshClient )
2017-08-07 18:19:37 +02:00
if err != nil {
_ = c . sshClient . Close ( )
return nil , errors . Wrap ( err , "couldn't initialise SFTP" )
}
go c . wait ( )
return c , nil
}
2020-08-13 19:23:54 +02:00
// Creates a new SFTP client on conn, using the specified subsystem
// or sftp server, and zero or more option functions
func ( f * Fs ) newSftpClient ( conn * ssh . Client , opts ... sftp . ClientOption ) ( * sftp . Client , error ) {
s , err := conn . NewSession ( )
if err != nil {
return nil , err
}
pw , err := s . StdinPipe ( )
if err != nil {
return nil , err
}
pr , err := s . StdoutPipe ( )
if err != nil {
return nil , err
}
if f . opt . ServerCommand != "" {
if err := s . Start ( f . opt . ServerCommand ) ; err != nil {
return nil , err
}
} else {
if err := s . RequestSubsystem ( f . opt . Subsystem ) ; err != nil {
return nil , err
}
}
return sftp . NewClientPipe ( pr , pw , opts ... )
}
2017-08-07 18:19:37 +02:00
// Get an SFTP connection from the pool, or open a new one
func ( f * Fs ) getSftpConnection ( ) ( c * conn , err error ) {
f . poolMu . Lock ( )
for len ( f . pool ) > 0 {
c = f . pool [ 0 ]
f . pool = f . pool [ 1 : ]
err := c . closed ( )
if err == nil {
break
}
fs . Errorf ( f , "Discarding closed SSH connection: %v" , err )
c = nil
}
f . poolMu . Unlock ( )
if c != nil {
return c , nil
}
2019-11-07 14:57:42 +01:00
err = f . pacer . Call ( func ( ) ( bool , error ) {
c , err = f . sftpConnection ( )
if err != nil {
return true , err
}
return false , nil
} )
return c , err
2017-08-07 18:19:37 +02:00
}
// Return an SFTP connection to the pool
//
// It nils the pointed to connection out so it can't be reused
//
// if err is not nil then it checks the connection is alive using a
// Getwd request
func ( f * Fs ) putSftpConnection ( pc * * conn , err error ) {
c := * pc
* pc = nil
if err != nil {
// work out if this is an expected error
underlyingErr := errors . Cause ( err )
isRegularError := false
switch underlyingErr {
case os . ErrNotExist :
isRegularError = true
default :
switch underlyingErr . ( type ) {
case * sftp . StatusError , * os . PathError :
isRegularError = true
}
}
// If not a regular SFTP error code then check the connection
if ! isRegularError {
_ , nopErr := c . sftpClient . Getwd ( )
if nopErr != nil {
fs . Debugf ( f , "Connection failed, closing: %v" , nopErr )
_ = c . close ( )
return
}
fs . Debugf ( f , "Connection OK after error: %v" , err )
}
}
f . poolMu . Lock ( )
f . pool = append ( f . pool , c )
f . poolMu . Unlock ( )
}
2016-11-13 00:36:08 +01:00
// NewFs creates a new Fs object from the name and root. It connects to
// the host specified in the config file.
2018-05-14 19:06:57 +02:00
func NewFs ( name , root string , m configmap . Mapper ) ( fs . Fs , error ) {
2019-06-17 10:34:30 +02:00
ctx := context . Background ( )
2018-05-14 19:06:57 +02:00
// Parse config into Options struct
opt := new ( Options )
err := configstruct . Set ( m , opt )
if err != nil {
return nil , err
}
if opt . User == "" {
opt . User = currentUser
}
if opt . Port == "" {
opt . Port = "22"
2016-11-13 00:36:08 +01:00
}
2018-01-12 17:30:54 +01:00
sshConfig := & ssh . ClientConfig {
2018-05-14 19:06:57 +02:00
User : opt . User ,
2017-05-15 15:00:07 +02:00
Auth : [ ] ssh . AuthMethod { } ,
HostKeyCallback : ssh . InsecureIgnoreHostKey ( ) ,
Timeout : fs . Config . ConnectTimeout ,
2019-05-10 08:51:01 +02:00
ClientVersion : "SSH-2.0-" + fs . Config . UserAgent ,
2016-11-13 00:36:08 +01:00
}
2017-06-23 17:25:35 +02:00
2018-05-14 19:06:57 +02:00
if opt . UseInsecureCipher {
2018-01-12 17:30:54 +01:00
sshConfig . Config . SetDefaults ( )
2019-10-16 23:22:45 +02:00
sshConfig . Config . Ciphers = append ( sshConfig . Config . Ciphers , "aes128-cbc" , "aes192-cbc" , "aes256-cbc" , "3des-cbc" )
2019-07-10 14:23:02 +02:00
sshConfig . Config . KeyExchanges = append ( sshConfig . Config . KeyExchanges , "diffie-hellman-group-exchange-sha1" , "diffie-hellman-group-exchange-sha256" )
2017-12-08 13:22:09 +01:00
}
2019-05-10 23:07:36 +02:00
keyFile := env . ShellExpand ( opt . KeyFile )
2020-05-19 12:55:38 +02:00
//keyPem := env.ShellExpand(opt.KeyPem)
2020-06-11 13:05:30 +02:00
// Add ssh agent-auth if no password or file or key PEM specified
if ( opt . Pass == "" && keyFile == "" && ! opt . AskPassword && opt . KeyPem == "" ) || opt . KeyUseAgent {
2017-04-10 15:50:06 +02:00
sshAgentClient , _ , err := sshagent . New ( )
2017-01-31 21:34:11 +01:00
if err != nil {
return nil , errors . Wrap ( err , "couldn't connect to ssh-agent" )
}
signers , err := sshAgentClient . Signers ( )
if err != nil {
return nil , errors . Wrap ( err , "couldn't read ssh agent signers" )
}
2019-01-03 13:42:13 +01:00
if keyFile != "" {
pubBytes , err := ioutil . ReadFile ( keyFile + ".pub" )
2019-01-03 12:25:13 +01:00
if err != nil {
return nil , errors . Wrap ( err , "failed to read public key file" )
}
pub , _ , _ , _ , err := ssh . ParseAuthorizedKey ( pubBytes )
if err != nil {
return nil , errors . Wrap ( err , "failed to parse public key file" )
}
pubM := pub . Marshal ( )
found := false
for _ , s := range signers {
if bytes . Equal ( pubM , s . PublicKey ( ) . Marshal ( ) ) {
sshConfig . Auth = append ( sshConfig . Auth , ssh . PublicKeys ( s ) )
found = true
break
}
}
if ! found {
return nil , errors . New ( "private key not found in the ssh-agent" )
}
} else {
sshConfig . Auth = append ( sshConfig . Auth , ssh . PublicKeys ( signers ... ) )
}
2017-06-23 17:25:35 +02:00
}
// Load key file if specified
2020-05-19 12:55:38 +02:00
if keyFile != "" || opt . KeyPem != "" {
var key [ ] byte
if opt . KeyPem == "" {
key , err = ioutil . ReadFile ( keyFile )
if err != nil {
return nil , errors . Wrap ( err , "failed to read private key file" )
}
} else {
// wrap in quotes because the config is a coming as a literal without them.
opt . KeyPem , err = strconv . Unquote ( "\"" + opt . KeyPem + "\"" )
if err != nil {
return nil , errors . Wrap ( err , "pem key not formatted properly" )
}
key = [ ] byte ( opt . KeyPem )
2017-06-23 17:25:35 +02:00
}
2019-01-03 12:24:31 +01:00
clearpass := ""
if opt . KeyFilePass != "" {
clearpass , err = obscure . Reveal ( opt . KeyFilePass )
if err != nil {
return nil , err
}
}
2020-01-13 12:05:16 +01:00
var signer ssh . Signer
if clearpass == "" {
signer , err = ssh . ParsePrivateKey ( key )
} else {
signer , err = ssh . ParsePrivateKeyWithPassphrase ( key , [ ] byte ( clearpass ) )
}
2017-06-23 17:25:35 +02:00
if err != nil {
return nil , errors . Wrap ( err , "failed to parse private key file" )
}
2018-01-12 17:30:54 +01:00
sshConfig . Auth = append ( sshConfig . Auth , ssh . PublicKeys ( signer ) )
2017-06-23 17:25:35 +02:00
}
// Auth from password if specified
2018-05-14 19:06:57 +02:00
if opt . Pass != "" {
clearpass , err := obscure . Reveal ( opt . Pass )
2016-11-13 00:36:08 +01:00
if err != nil {
return nil , err
}
2018-01-12 17:30:54 +01:00
sshConfig . Auth = append ( sshConfig . Auth , ssh . Password ( clearpass ) )
2016-11-13 00:36:08 +01:00
}
2017-06-23 17:25:35 +02:00
2018-03-15 00:17:09 +01:00
// Ask for password if none was defined and we're allowed to
2018-05-14 19:06:57 +02:00
if opt . Pass == "" && opt . AskPassword {
2018-05-22 10:41:13 +02:00
_ , _ = fmt . Fprint ( os . Stderr , "Enter SFTP password: " )
2018-03-15 00:17:09 +01:00
clearpass := config . ReadPassword ( )
sshConfig . Auth = append ( sshConfig . Auth , ssh . Password ( clearpass ) )
}
2019-06-26 17:50:31 +02:00
return NewFsWithConnection ( ctx , name , root , m , opt , sshConfig )
2019-02-19 17:40:15 +01:00
}
2020-05-20 12:39:20 +02:00
// NewFsWithConnection creates a new Fs object from the name and root and an ssh.ClientConfig. It connects to
2019-02-19 17:40:15 +01:00
// the host specified in the ssh.ClientConfig
2019-06-26 17:50:31 +02:00
func NewFsWithConnection ( ctx context . Context , name string , root string , m configmap . Mapper , opt * Options , sshConfig * ssh . ClientConfig ) ( fs . Fs , error ) {
2017-01-31 21:34:11 +01:00
f := & Fs {
2018-05-14 19:06:57 +02:00
name : name ,
root : root ,
2020-06-29 16:49:19 +02:00
absRoot : root ,
2018-05-14 19:06:57 +02:00
opt : * opt ,
2019-06-26 17:50:31 +02:00
m : m ,
2018-05-14 19:06:57 +02:00
config : sshConfig ,
url : "sftp://" + opt . User + "@" + opt . Host + ":" + opt . Port + "/" + root ,
mkdirLock : newStringLock ( ) ,
2019-11-07 14:57:42 +01:00
pacer : fs . NewPacer ( pacer . NewDefault ( pacer . MinSleep ( minSleep ) , pacer . MaxSleep ( maxSleep ) , pacer . DecayConstant ( decayConstant ) ) ) ,
2017-01-31 21:34:11 +01:00
}
2017-08-09 16:27:43 +02:00
f . features = ( & fs . Features {
CanHaveEmptyDirectories : true ,
2020-06-19 11:28:34 +02:00
SlowHash : true ,
2017-08-09 16:27:43 +02:00
} ) . Fill ( f )
2017-08-07 18:19:37 +02:00
// Make a connection and pool it to return errors early
c , err := f . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "NewFs" )
}
2020-06-29 16:49:19 +02:00
cwd , err := c . sftpClient . Getwd ( )
2017-08-07 18:19:37 +02:00
f . putSftpConnection ( & c , nil )
2020-06-29 16:49:19 +02:00
if err != nil {
fs . Debugf ( f , "Failed to read current directory - using relative paths: %v" , err )
} else if ! path . IsAbs ( f . root ) {
f . absRoot = path . Join ( cwd , f . root )
fs . Debugf ( f , "Using absolute root directory %q" , f . absRoot )
}
2017-01-31 21:34:11 +01:00
if root != "" {
// Check to see if the root actually an existing file
2020-06-29 16:49:19 +02:00
oldAbsRoot := f . absRoot
2017-01-31 21:34:11 +01:00
remote := path . Base ( root )
f . root = path . Dir ( root )
2020-06-29 16:49:19 +02:00
f . absRoot = path . Dir ( f . absRoot )
2017-01-31 21:34:11 +01:00
if f . root == "." {
f . root = ""
}
2019-06-17 10:34:30 +02:00
_ , err := f . NewObject ( ctx , remote )
2017-01-31 21:34:11 +01:00
if err != nil {
2017-02-25 15:31:27 +01:00
if err == fs . ErrorObjectNotFound || errors . Cause ( err ) == fs . ErrorNotAFile {
2017-01-31 21:34:11 +01:00
// File doesn't exist so return old f
f . root = root
2020-06-29 16:49:19 +02:00
f . absRoot = oldAbsRoot
2017-01-31 21:34:11 +01:00
return f , nil
}
return nil , err
2016-11-13 00:36:08 +01:00
}
2017-01-31 21:34:11 +01:00
// return an error with an fs which points to the parent
return f , fs . ErrorIsFile
2016-11-13 00:36:08 +01:00
}
2017-01-31 21:34:11 +01:00
return f , nil
2016-11-13 00:36:08 +01:00
}
// Name returns the configured name of the file system
func ( f * Fs ) Name ( ) string {
return f . name
}
// Root returns the root for the filesystem
func ( f * Fs ) Root ( ) string {
return f . root
}
// String returns the URL for the filesystem
func ( f * Fs ) String ( ) string {
return f . url
}
// Features returns the optional features of this Fs
func ( f * Fs ) Features ( ) * fs . Features {
return f . features
}
// Precision is the remote sftp file system's modtime precision, which we have no way of knowing. We estimate at 1s
func ( f * Fs ) Precision ( ) time . Duration {
return time . Second
}
// NewObject creates a new remote sftp file object
2019-06-17 10:34:30 +02:00
func ( f * Fs ) NewObject ( ctx context . Context , remote string ) ( fs . Object , error ) {
2017-01-31 21:34:11 +01:00
o := & Object {
2016-11-13 00:36:08 +01:00
fs : f ,
remote : remote ,
}
2017-01-31 21:34:11 +01:00
err := o . stat ( )
if err != nil {
return nil , err
}
return o , nil
2016-11-13 00:36:08 +01:00
}
2017-01-31 21:34:11 +01:00
// dirExists returns true,nil if the directory exists, false, nil if
// it doesn't or false, err
func ( f * Fs ) dirExists ( dir string ) ( bool , error ) {
if dir == "" {
dir = "."
}
2017-08-07 18:19:37 +02:00
c , err := f . getSftpConnection ( )
if err != nil {
return false , errors . Wrap ( err , "dirExists" )
}
info , err := c . sftpClient . Stat ( dir )
f . putSftpConnection ( & c , err )
2017-01-31 21:34:11 +01:00
if err != nil {
if os . IsNotExist ( err ) {
return false , nil
}
return false , errors . Wrap ( err , "dirExists stat failed" )
}
if ! info . IsDir ( ) {
return false , fs . ErrorIsFile
}
return true , nil
}
2017-06-11 23:43:31 +02:00
// List the objects and directories in dir into entries. The
// entries can be returned in any order but should be for a
// complete directory.
//
// dir should be "" to list the root, and should not have
// trailing slashes.
//
// This should return ErrDirNotFound if the directory isn't
// found.
2019-06-17 10:34:30 +02:00
func ( f * Fs ) List ( ctx context . Context , dir string ) ( entries fs . DirEntries , err error ) {
2020-06-29 16:49:19 +02:00
root := path . Join ( f . absRoot , dir )
2017-06-11 23:43:31 +02:00
ok , err := f . dirExists ( root )
if err != nil {
return nil , errors . Wrap ( err , "List failed" )
}
if ! ok {
return nil , fs . ErrorDirNotFound
}
sftpDir := root
2017-01-31 21:34:11 +01:00
if sftpDir == "" {
sftpDir = "."
}
2017-08-07 18:19:37 +02:00
c , err := f . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "List" )
}
infos , err := c . sftpClient . ReadDir ( sftpDir )
f . putSftpConnection ( & c , err )
2017-01-31 21:34:11 +01:00
if err != nil {
2017-06-11 23:43:31 +02:00
return nil , errors . Wrapf ( err , "error listing %q" , dir )
2017-01-31 21:34:11 +01:00
}
for _ , info := range infos {
remote := path . Join ( dir , info . Name ( ) )
2018-03-16 16:36:47 +01:00
// If file is a symlink (not a regular file is the best cross platform test we can do), do a stat to
// pick up the size and type of the destination, instead of the size and type of the symlink.
2019-11-14 23:00:30 +01:00
if ! info . Mode ( ) . IsRegular ( ) && ! info . IsDir ( ) {
if f . opt . SkipLinks {
// skip non regular file if SkipLinks is set
continue
}
2019-01-28 18:10:00 +01:00
oldInfo := info
2018-03-16 16:36:47 +01:00
info , err = f . stat ( remote )
if err != nil {
2019-01-28 18:10:00 +01:00
if ! os . IsNotExist ( err ) {
2019-11-14 23:00:30 +01:00
fs . Errorf ( remote , "stat of non-regular file failed: %v" , err )
2019-01-28 18:10:00 +01:00
}
info = oldInfo
2018-03-16 16:36:47 +01:00
}
}
2017-01-31 21:34:11 +01:00
if info . IsDir ( ) {
2017-06-30 14:37:29 +02:00
d := fs . NewDir ( remote , info . ModTime ( ) )
2017-06-11 23:43:31 +02:00
entries = append ( entries , d )
2017-01-31 21:34:11 +01:00
} else {
2017-06-11 23:43:31 +02:00
o := & Object {
2017-01-31 21:34:11 +01:00
fs : f ,
remote : remote ,
}
2017-06-30 11:24:06 +02:00
o . setMetadata ( info )
2017-06-11 23:43:31 +02:00
entries = append ( entries , o )
2016-11-13 00:36:08 +01:00
}
}
2017-06-11 23:43:31 +02:00
return entries , nil
2016-11-13 00:36:08 +01:00
}
2019-06-17 10:34:30 +02:00
// Put data from <in> into a new remote sftp file object described by <src.Remote()> and <src.ModTime(ctx)>
func ( f * Fs ) Put ( ctx context . Context , in io . Reader , src fs . ObjectInfo , options ... fs . OpenOption ) ( fs . Object , error ) {
2017-01-31 21:34:11 +01:00
err := f . mkParentDir ( src . Remote ( ) )
2016-11-13 00:36:08 +01:00
if err != nil {
2017-01-31 21:34:11 +01:00
return nil , errors . Wrap ( err , "Put mkParentDir failed" )
2016-11-13 00:36:08 +01:00
}
2017-01-31 21:34:11 +01:00
// Temporary object under construction
o := & Object {
fs : f ,
remote : src . Remote ( ) ,
2016-11-13 00:36:08 +01:00
}
2019-06-17 10:34:30 +02:00
err = o . Update ( ctx , in , src , options ... )
2016-11-13 00:36:08 +01:00
if err != nil {
return nil , err
}
return o , nil
}
2017-08-03 21:42:35 +02:00
// PutStream uploads to the remote path with the modTime given of indeterminate size
2019-06-17 10:34:30 +02:00
func ( f * Fs ) PutStream ( ctx context . Context , in io . Reader , src fs . ObjectInfo , options ... fs . OpenOption ) ( fs . Object , error ) {
return f . Put ( ctx , in , src , options ... )
2017-08-03 21:42:35 +02:00
}
2017-01-31 21:34:11 +01:00
// mkParentDir makes the parent of remote if necessary and any
// directories above that
func ( f * Fs ) mkParentDir ( remote string ) error {
parent := path . Dir ( remote )
2020-06-29 16:49:19 +02:00
return f . mkdir ( path . Join ( f . absRoot , parent ) )
2017-01-31 21:34:11 +01:00
}
// mkdir makes the directory and parents using native paths
2017-05-24 16:39:17 +02:00
func ( f * Fs ) mkdir ( dirPath string ) error {
f . mkdirLock . Lock ( dirPath )
defer f . mkdirLock . Unlock ( dirPath )
if dirPath == "." || dirPath == "/" {
2017-01-31 21:34:11 +01:00
return nil
}
2017-05-24 16:39:17 +02:00
ok , err := f . dirExists ( dirPath )
2017-01-31 21:34:11 +01:00
if err != nil {
return errors . Wrap ( err , "mkdir dirExists failed" )
}
if ok {
return nil
}
2017-05-24 16:39:17 +02:00
parent := path . Dir ( dirPath )
2017-01-31 21:34:11 +01:00
err = f . mkdir ( parent )
if err != nil {
return err
}
2017-08-07 18:19:37 +02:00
c , err := f . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "mkdir" )
}
err = c . sftpClient . Mkdir ( dirPath )
f . putSftpConnection ( & c , err )
2017-01-31 21:34:11 +01:00
if err != nil {
2017-05-24 16:39:17 +02:00
return errors . Wrapf ( err , "mkdir %q failed" , dirPath )
2016-11-13 00:36:08 +01:00
}
2017-01-31 21:34:11 +01:00
return nil
2016-11-13 00:36:08 +01:00
}
// Mkdir makes the root directory of the Fs object
2019-06-17 10:34:30 +02:00
func ( f * Fs ) Mkdir ( ctx context . Context , dir string ) error {
2020-06-29 16:49:19 +02:00
root := path . Join ( f . absRoot , dir )
2017-01-31 21:34:11 +01:00
return f . mkdir ( root )
2016-11-13 00:36:08 +01:00
}
// Rmdir removes the root directory of the Fs object
2019-06-17 10:34:30 +02:00
func ( f * Fs ) Rmdir ( ctx context . Context , dir string ) error {
2018-11-30 18:37:55 +01:00
// Check to see if directory is empty as some servers will
// delete recursively with RemoveDirectory
2019-06-17 10:34:30 +02:00
entries , err := f . List ( ctx , dir )
2018-11-30 18:37:55 +01:00
if err != nil {
return errors . Wrap ( err , "Rmdir" )
}
if len ( entries ) != 0 {
return fs . ErrorDirectoryNotEmpty
}
// Remove the directory
2020-06-29 16:49:19 +02:00
root := path . Join ( f . absRoot , dir )
2017-08-07 18:19:37 +02:00
c , err := f . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "Rmdir" )
}
2018-11-29 22:34:37 +01:00
err = c . sftpClient . RemoveDirectory ( root )
2017-08-07 18:19:37 +02:00
f . putSftpConnection ( & c , err )
return err
2016-11-13 00:36:08 +01:00
}
// Move renames a remote sftp file object
2019-06-17 10:34:30 +02:00
func ( f * Fs ) Move ( ctx context . Context , src fs . Object , remote string ) ( fs . Object , error ) {
2017-01-31 21:34:11 +01:00
srcObj , ok := src . ( * Object )
if ! ok {
2017-02-09 12:01:20 +01:00
fs . Debugf ( src , "Can't move - not same remote type" )
2017-01-31 21:34:11 +01:00
return nil , fs . ErrorCantMove
}
err := f . mkParentDir ( remote )
2016-11-13 00:36:08 +01:00
if err != nil {
2017-01-31 21:34:11 +01:00
return nil , errors . Wrap ( err , "Move mkParentDir failed" )
}
2017-08-07 18:19:37 +02:00
c , err := f . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "Move" )
}
err = c . sftpClient . Rename (
2017-01-31 21:34:11 +01:00
srcObj . path ( ) ,
2020-06-29 16:49:19 +02:00
path . Join ( f . absRoot , remote ) ,
2017-01-31 21:34:11 +01:00
)
2017-08-07 18:19:37 +02:00
f . putSftpConnection ( & c , err )
2017-01-31 21:34:11 +01:00
if err != nil {
return nil , errors . Wrap ( err , "Move Rename failed" )
2016-11-13 00:36:08 +01:00
}
2019-06-17 10:34:30 +02:00
dstObj , err := f . NewObject ( ctx , remote )
2017-01-31 21:34:11 +01:00
if err != nil {
return nil , errors . Wrap ( err , "Move NewObject failed" )
}
return dstObj , nil
}
2017-02-05 22:20:56 +01:00
// DirMove moves src, srcRemote to this remote at dstRemote
// using server side move operations.
2017-01-31 21:34:11 +01:00
//
// Will only be called if src.Fs().Name() == f.Name()
//
// If it isn't possible then return fs.ErrorCantDirMove
//
// If destination exists then return fs.ErrorDirExists
2019-06-17 10:34:30 +02:00
func ( f * Fs ) DirMove ( ctx context . Context , src fs . Fs , srcRemote , dstRemote string ) error {
2017-01-31 21:34:11 +01:00
srcFs , ok := src . ( * Fs )
if ! ok {
2017-02-09 12:01:20 +01:00
fs . Debugf ( srcFs , "Can't move directory - not same remote type" )
2017-01-31 21:34:11 +01:00
return fs . ErrorCantDirMove
}
2020-06-29 16:49:19 +02:00
srcPath := path . Join ( srcFs . absRoot , srcRemote )
dstPath := path . Join ( f . absRoot , dstRemote )
2017-01-31 21:34:11 +01:00
// Check if destination exists
2017-02-05 22:20:56 +01:00
ok , err := f . dirExists ( dstPath )
2017-01-31 21:34:11 +01:00
if err != nil {
return errors . Wrap ( err , "DirMove dirExists dst failed" )
}
if ok {
return fs . ErrorDirExists
}
// Make sure the parent directory exists
2017-02-05 22:20:56 +01:00
err = f . mkdir ( path . Dir ( dstPath ) )
2017-01-31 21:34:11 +01:00
if err != nil {
2017-02-05 22:20:56 +01:00
return errors . Wrap ( err , "DirMove mkParentDir dst failed" )
2017-01-31 21:34:11 +01:00
}
// Do the move
2017-08-07 18:19:37 +02:00
c , err := f . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "DirMove" )
}
err = c . sftpClient . Rename (
2017-02-05 22:20:56 +01:00
srcPath ,
dstPath ,
2017-01-31 21:34:11 +01:00
)
2017-08-07 18:19:37 +02:00
f . putSftpConnection ( & c , err )
2017-01-31 21:34:11 +01:00
if err != nil {
2017-02-05 22:20:56 +01:00
return errors . Wrapf ( err , "DirMove Rename(%q,%q) failed" , srcPath , dstPath )
2017-01-31 21:34:11 +01:00
}
return nil
2016-11-13 00:36:08 +01:00
}
2019-06-26 17:50:31 +02:00
// run runds cmd on the remote end returning standard output
func ( f * Fs ) run ( cmd string ) ( [ ] byte , error ) {
c , err := f . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "run: get SFTP connection" )
2017-08-06 12:49:52 +02:00
}
2019-06-26 17:50:31 +02:00
defer f . putSftpConnection ( & c , err )
2017-08-06 12:49:52 +02:00
2019-06-26 17:50:31 +02:00
session , err := c . sshClient . NewSession ( )
if err != nil {
return nil , errors . Wrap ( err , "run: get SFTP sessiion" )
2018-01-05 10:01:35 +01:00
}
2019-06-26 17:50:31 +02:00
defer func ( ) {
_ = session . Close ( )
} ( )
2018-01-05 10:01:35 +01:00
2019-06-26 17:50:31 +02:00
var stdout , stderr bytes . Buffer
session . Stdout = & stdout
session . Stderr = & stderr
err = session . Run ( cmd )
2017-08-07 18:19:37 +02:00
if err != nil {
2019-06-26 17:50:31 +02:00
return nil , errors . Wrapf ( err , "failed to run %q: %s" , cmd , stderr . Bytes ( ) )
}
return stdout . Bytes ( ) , nil
}
// Hashes returns the supported hash types of the filesystem
func ( f * Fs ) Hashes ( ) hash . Set {
if f . opt . DisableHashCheck {
2018-01-18 21:27:52 +01:00
return hash . Set ( hash . None )
2017-08-07 18:19:37 +02:00
}
2019-06-26 17:50:31 +02:00
if f . cachedHashes != nil {
return * f . cachedHashes
}
2017-08-06 12:49:52 +02:00
2019-06-26 14:33:36 +02:00
// look for a hash command which works
2019-06-26 17:50:31 +02:00
checkHash := func ( commands [ ] string , expected string , hashCommand * string , changed * bool ) bool {
if * hashCommand == hashCommandNotSupported {
return false
}
if * hashCommand != "" {
return true
}
* changed = true
2019-06-26 14:33:36 +02:00
for _ , command := range commands {
2019-06-26 17:50:31 +02:00
output , err := f . run ( command )
2019-06-26 14:33:36 +02:00
if err != nil {
continue
}
output = bytes . TrimSpace ( output )
fs . Debugf ( f , "checking %q command: %q" , command , output )
2019-06-26 17:50:31 +02:00
if parseHash ( output ) == expected {
2019-06-26 14:33:36 +02:00
* hashCommand = command
return true
}
}
2019-06-26 17:50:31 +02:00
* hashCommand = hashCommandNotSupported
2019-06-26 14:33:36 +02:00
return false
2017-08-06 12:49:52 +02:00
}
2019-06-26 17:50:31 +02:00
changed := false
md5Works := checkHash ( [ ] string { "md5sum" , "md5 -r" } , "d41d8cd98f00b204e9800998ecf8427e" , & f . opt . Md5sumCommand , & changed )
sha1Works := checkHash ( [ ] string { "sha1sum" , "sha1 -r" } , "da39a3ee5e6b4b0d3255bfef95601890afd80709" , & f . opt . Sha1sumCommand , & changed )
if changed {
f . m . Set ( "md5sum_command" , f . opt . Md5sumCommand )
f . m . Set ( "sha1sum_command" , f . opt . Sha1sumCommand )
}
2017-08-06 12:49:52 +02:00
2018-01-12 17:30:54 +01:00
set := hash . NewHashSet ( )
2017-08-06 12:49:52 +02:00
if sha1Works {
2018-01-18 21:27:52 +01:00
set . Add ( hash . SHA1 )
2017-08-06 12:49:52 +02:00
}
if md5Works {
2018-01-18 21:27:52 +01:00
set . Add ( hash . MD5 )
2017-08-06 12:49:52 +02:00
}
f . cachedHashes = & set
return set
2016-11-13 00:36:08 +01:00
}
2019-04-25 11:51:15 +02:00
// About gets usage stats
2019-06-26 12:24:48 +02:00
func ( f * Fs ) About ( ctx context . Context ) ( * fs . Usage , error ) {
2019-04-25 11:51:15 +02:00
escapedPath := shellEscape ( f . root )
if f . opt . PathOverride != "" {
escapedPath = shellEscape ( path . Join ( f . opt . PathOverride , f . root ) )
}
if len ( escapedPath ) == 0 {
escapedPath = "/"
}
2019-06-26 17:50:31 +02:00
stdout , err := f . run ( "df -k " + escapedPath )
2019-04-25 11:51:15 +02:00
if err != nil {
2019-06-26 17:50:31 +02:00
return nil , errors . Wrap ( err , "your remote may not support About" )
2019-04-25 11:51:15 +02:00
}
2019-06-26 17:50:31 +02:00
usageTotal , usageUsed , usageAvail := parseUsage ( stdout )
2019-05-09 15:29:52 +02:00
usage := & fs . Usage { }
if usageTotal >= 0 {
usage . Total = fs . NewUsageValue ( usageTotal )
2019-04-25 11:51:15 +02:00
}
2019-05-09 15:29:52 +02:00
if usageUsed >= 0 {
usage . Used = fs . NewUsageValue ( usageUsed )
}
if usageAvail >= 0 {
usage . Free = fs . NewUsageValue ( usageAvail )
2019-04-25 11:51:15 +02:00
}
return usage , nil
}
2016-11-13 00:36:08 +01:00
// Fs is the filesystem this remote sftp file object is located within
func ( o * Object ) Fs ( ) fs . Info {
return o . fs
}
// String returns the URL to the remote SFTP file
func ( o * Object ) String ( ) string {
if o == nil {
return "<nil>"
}
2017-01-31 21:34:11 +01:00
return o . remote
2016-11-13 00:36:08 +01:00
}
// Remote the name of the remote SFTP file, relative to the fs root
func ( o * Object ) Remote ( ) string {
return o . remote
}
2017-08-07 15:50:31 +02:00
// Hash returns the selected checksum of the file
// If no checksum is available it returns ""
2019-06-17 10:34:30 +02:00
func ( o * Object ) Hash ( ctx context . Context , r hash . Type ) ( string , error ) {
2019-06-26 14:33:36 +02:00
if o . fs . opt . DisableHashCheck {
return "" , nil
}
2019-06-26 17:50:31 +02:00
_ = o . fs . Hashes ( )
2019-06-26 14:33:36 +02:00
2018-04-19 10:45:46 +02:00
var hashCmd string
if r == hash . MD5 {
if o . md5sum != nil {
return * o . md5sum , nil
}
2019-06-26 17:50:31 +02:00
hashCmd = o . fs . opt . Md5sumCommand
2018-04-19 10:45:46 +02:00
} else if r == hash . SHA1 {
if o . sha1sum != nil {
return * o . sha1sum , nil
}
2019-06-26 17:50:31 +02:00
hashCmd = o . fs . opt . Sha1sumCommand
2018-04-19 10:45:46 +02:00
} else {
return "" , hash . ErrUnsupported
2017-08-06 12:49:52 +02:00
}
2019-06-26 17:50:31 +02:00
if hashCmd == "" || hashCmd == hashCommandNotSupported {
2019-06-26 14:33:36 +02:00
return "" , hash . ErrUnsupported
2018-10-22 12:01:41 +02:00
}
2017-08-07 18:19:37 +02:00
c , err := o . fs . getSftpConnection ( )
if err != nil {
2018-04-19 10:45:46 +02:00
return "" , errors . Wrap ( err , "Hash get SFTP connection" )
2017-08-07 18:19:37 +02:00
}
session , err := c . sshClient . NewSession ( )
o . fs . putSftpConnection ( & c , err )
2017-08-06 12:49:52 +02:00
if err != nil {
2018-04-19 10:45:46 +02:00
return "" , errors . Wrap ( err , "Hash put SFTP connection" )
2017-08-06 12:49:52 +02:00
}
2018-04-19 10:45:46 +02:00
var stdout , stderr bytes . Buffer
session . Stdout = & stdout
session . Stderr = & stderr
2017-08-06 12:49:52 +02:00
escapedPath := shellEscape ( o . path ( ) )
2018-05-14 19:06:57 +02:00
if o . fs . opt . PathOverride != "" {
escapedPath = shellEscape ( path . Join ( o . fs . opt . PathOverride , o . remote ) )
2018-04-30 18:05:10 +02:00
}
2018-04-19 10:45:46 +02:00
err = session . Run ( hashCmd + " " + escapedPath )
2019-07-26 13:19:47 +02:00
fs . Debugf ( nil , "sftp cmd = %s" , escapedPath )
2017-08-06 12:49:52 +02:00
if err != nil {
_ = session . Close ( )
2018-04-19 10:45:46 +02:00
fs . Debugf ( o , "Failed to calculate %v hash: %v (%s)" , r , err , bytes . TrimSpace ( stderr . Bytes ( ) ) )
return "" , nil
2017-08-06 12:49:52 +02:00
}
_ = session . Close ( )
2019-07-26 13:19:47 +02:00
b := stdout . Bytes ( )
fs . Debugf ( nil , "sftp output = %q" , b )
str := parseHash ( b )
fs . Debugf ( nil , "sftp hash = %q" , str )
2018-01-18 21:27:52 +01:00
if r == hash . MD5 {
2017-08-06 12:49:52 +02:00
o . md5sum = & str
2018-01-18 21:27:52 +01:00
} else if r == hash . SHA1 {
2017-08-06 12:49:52 +02:00
o . sha1sum = & str
}
return str , nil
}
2019-07-26 13:19:47 +02:00
var shellEscapeRegex = regexp . MustCompile ( "[^A-Za-z0-9_.,:/\\@\u0080-\uFFFFFFFF\n-]" )
2017-08-06 12:49:52 +02:00
// Escape a string s.t. it cannot cause unintended behavior
// when sending it to a shell.
func shellEscape ( str string ) string {
safe := shellEscapeRegex . ReplaceAllString ( str , ` \$0 ` )
return strings . Replace ( safe , "\n" , "'\n'" , - 1 )
}
// Converts a byte array from the SSH session returned by
// an invocation of md5sum/sha1sum to a hash string
// as expected by the rest of this application
func parseHash ( bytes [ ] byte ) string {
2019-07-26 13:19:47 +02:00
// For strings with backslash *sum writes a leading \
// https://unix.stackexchange.com/q/313733/94054
return strings . Split ( strings . TrimLeft ( string ( bytes ) , "\\" ) , " " ) [ 0 ] // Split at hash / filename separator
2016-11-13 00:36:08 +01:00
}
2019-04-25 11:51:15 +02:00
// Parses the byte array output from the SSH session
// returned by an invocation of df into
2020-05-20 12:39:20 +02:00
// the disk size, used space, and available space on the disk, in that order.
2019-04-25 11:51:15 +02:00
// Only works when `df` has output info on only one disk
2019-05-09 15:29:52 +02:00
func parseUsage ( bytes [ ] byte ) ( spaceTotal int64 , spaceUsed int64 , spaceAvail int64 ) {
spaceTotal , spaceUsed , spaceAvail = - 1 , - 1 , - 1
2019-04-25 11:51:15 +02:00
lines := strings . Split ( string ( bytes ) , "\n" )
if len ( lines ) < 2 {
2019-05-09 15:29:52 +02:00
return
2019-04-25 11:51:15 +02:00
}
split := strings . Fields ( lines [ 1 ] )
if len ( split ) < 6 {
2019-05-09 15:29:52 +02:00
return
2019-04-25 11:51:15 +02:00
}
spaceTotal , err := strconv . ParseInt ( split [ 1 ] , 10 , 64 )
if err != nil {
2019-05-09 15:29:52 +02:00
spaceTotal = - 1
2019-04-25 11:51:15 +02:00
}
2019-05-09 15:29:52 +02:00
spaceUsed , err = strconv . ParseInt ( split [ 2 ] , 10 , 64 )
2019-04-25 11:51:15 +02:00
if err != nil {
2019-05-09 15:29:52 +02:00
spaceUsed = - 1
2019-04-25 11:51:15 +02:00
}
2019-05-09 15:29:52 +02:00
spaceAvail , err = strconv . ParseInt ( split [ 3 ] , 10 , 64 )
2019-04-25 11:51:15 +02:00
if err != nil {
2019-05-09 15:29:52 +02:00
spaceAvail = - 1
2019-04-25 11:51:15 +02:00
}
return spaceTotal * 1024 , spaceUsed * 1024 , spaceAvail * 1024
}
2016-11-13 00:36:08 +01:00
// Size returns the size in bytes of the remote sftp file
func ( o * Object ) Size ( ) int64 {
2017-06-30 11:24:06 +02:00
return o . size
2016-11-13 00:36:08 +01:00
}
// ModTime returns the modification time of the remote sftp file
2019-06-17 10:34:30 +02:00
func ( o * Object ) ModTime ( ctx context . Context ) time . Time {
2017-06-30 11:24:06 +02:00
return o . modTime
2016-11-13 00:36:08 +01:00
}
2017-01-31 21:34:11 +01:00
// path returns the native path of the object
func ( o * Object ) path ( ) string {
2020-06-29 16:49:19 +02:00
return path . Join ( o . fs . absRoot , o . remote )
2017-01-31 21:34:11 +01:00
}
2017-06-30 11:24:06 +02:00
// setMetadata updates the info in the object from the stat result passed in
func ( o * Object ) setMetadata ( info os . FileInfo ) {
o . modTime = info . ModTime ( )
o . size = info . Size ( )
o . mode = info . Mode ( )
}
2018-03-16 16:36:47 +01:00
// statRemote stats the file or directory at the remote given
func ( f * Fs ) stat ( remote string ) ( info os . FileInfo , err error ) {
c , err := f . getSftpConnection ( )
2017-08-07 18:19:37 +02:00
if err != nil {
2018-03-16 16:36:47 +01:00
return nil , errors . Wrap ( err , "stat" )
2017-08-07 18:19:37 +02:00
}
2020-06-29 16:49:19 +02:00
absPath := path . Join ( f . absRoot , remote )
2018-03-16 16:36:47 +01:00
info , err = c . sftpClient . Stat ( absPath )
f . putSftpConnection ( & c , err )
return info , err
}
// stat updates the info in the Object
func ( o * Object ) stat ( ) error {
info , err := o . fs . stat ( o . remote )
2017-01-31 21:34:11 +01:00
if err != nil {
if os . IsNotExist ( err ) {
return fs . ErrorObjectNotFound
}
return errors . Wrap ( err , "stat failed" )
}
if info . IsDir ( ) {
2017-02-25 12:09:57 +01:00
return errors . Wrapf ( fs . ErrorNotAFile , "%q" , o . remote )
2017-01-31 21:34:11 +01:00
}
2017-06-30 11:24:06 +02:00
o . setMetadata ( info )
2017-01-31 21:34:11 +01:00
return nil
}
2016-11-13 00:36:08 +01:00
// SetModTime sets the modification and access time to the specified time
2017-01-31 21:34:11 +01:00
//
// it also updates the info field
2019-06-17 10:34:30 +02:00
func ( o * Object ) SetModTime ( ctx context . Context , modTime time . Time ) error {
2020-05-13 22:53:04 +02:00
if o . fs . opt . SetModTime {
c , err := o . fs . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "SetModTime" )
}
err = c . sftpClient . Chtimes ( o . path ( ) , modTime , modTime )
o . fs . putSftpConnection ( & c , err )
if err != nil {
return errors . Wrap ( err , "SetModTime failed" )
}
2016-11-13 00:36:08 +01:00
}
2020-05-13 22:53:04 +02:00
err := o . stat ( )
2017-01-31 21:34:11 +01:00
if err != nil {
2018-01-04 15:52:47 +01:00
return errors . Wrap ( err , "SetModTime stat failed" )
2017-01-31 21:34:11 +01:00
}
return nil
2016-11-13 00:36:08 +01:00
}
// Storable returns whether the remote sftp file is a regular file (not a directory, symbolic link, block device, character device, named pipe, etc)
func ( o * Object ) Storable ( ) bool {
2017-06-30 11:24:06 +02:00
return o . mode . IsRegular ( )
2016-11-13 00:36:08 +01:00
}
2018-05-24 16:03:57 +02:00
// objectReader represents a file open for reading on the SFTP server
type objectReader struct {
sftpFile * sftp . File
pipeReader * io . PipeReader
done chan struct { }
}
func newObjectReader ( sftpFile * sftp . File ) * objectReader {
pipeReader , pipeWriter := io . Pipe ( )
file := & objectReader {
sftpFile : sftpFile ,
pipeReader : pipeReader ,
done : make ( chan struct { } ) ,
}
go func ( ) {
// Use sftpFile.WriteTo to pump data so that it gets a
// chance to build the window up.
_ , err := sftpFile . WriteTo ( pipeWriter )
// Close the pipeWriter so the pipeReader fails with
// the same error or EOF if err == nil
_ = pipeWriter . CloseWithError ( err )
// signal that we've finished
close ( file . done )
} ( )
return file
}
2016-11-13 00:36:08 +01:00
// Read from a remote sftp file object reader
2018-05-24 16:03:57 +02:00
func ( file * objectReader ) Read ( p [ ] byte ) ( n int , err error ) {
n , err = file . pipeReader . Read ( p )
2016-11-13 00:36:08 +01:00
return n , err
}
// Close a reader of a remote sftp file
2018-05-24 16:03:57 +02:00
func ( file * objectReader ) Close ( ) ( err error ) {
// Close the sftpFile - this will likely cause the WriteTo to error
2016-11-13 00:36:08 +01:00
err = file . sftpFile . Close ( )
2018-05-24 16:03:57 +02:00
// Close the pipeReader so writes to the pipeWriter fail
_ = file . pipeReader . Close ( )
// Wait for the background process to finish
<- file . done
2016-11-13 00:36:08 +01:00
return err
}
// Open a remote sftp file object for reading. Seek is supported
2019-06-17 10:34:30 +02:00
func ( o * Object ) Open ( ctx context . Context , options ... fs . OpenOption ) ( in io . ReadCloser , err error ) {
2018-01-27 11:07:17 +01:00
var offset , limit int64 = 0 , - 1
2016-11-13 00:36:08 +01:00
for _ , option := range options {
switch x := option . ( type ) {
case * fs . SeekOption :
2018-01-27 11:07:17 +01:00
offset = x . Offset
2018-01-23 21:21:19 +01:00
case * fs . RangeOption :
offset , limit = x . Decode ( o . Size ( ) )
2016-11-13 00:36:08 +01:00
default :
if option . Mandatory ( ) {
2017-02-09 12:01:20 +01:00
fs . Logf ( o , "Unsupported mandatory option: %v" , option )
2016-11-13 00:36:08 +01:00
}
}
}
2017-08-07 18:19:37 +02:00
c , err := o . fs . getSftpConnection ( )
if err != nil {
return nil , errors . Wrap ( err , "Open" )
}
sftpFile , err := c . sftpClient . Open ( o . path ( ) )
o . fs . putSftpConnection ( & c , err )
2016-11-13 00:36:08 +01:00
if err != nil {
2017-01-31 21:34:11 +01:00
return nil , errors . Wrap ( err , "Open failed" )
2016-11-13 00:36:08 +01:00
}
if offset > 0 {
2018-04-06 20:53:06 +02:00
off , err := sftpFile . Seek ( offset , io . SeekStart )
2016-11-13 00:36:08 +01:00
if err != nil || off != offset {
2017-01-31 21:34:11 +01:00
return nil , errors . Wrap ( err , "Open Seek failed" )
2016-11-13 00:36:08 +01:00
}
}
2018-05-24 16:03:57 +02:00
in = readers . NewLimitedReadCloser ( newObjectReader ( sftpFile ) , limit )
2016-11-13 00:36:08 +01:00
return in , nil
}
// Update a remote sftp file using the data <in> and ModTime from <src>
2019-06-17 10:34:30 +02:00
func ( o * Object ) Update ( ctx context . Context , in io . Reader , src fs . ObjectInfo , options ... fs . OpenOption ) error {
2017-08-07 18:36:59 +02:00
// Clear the hash cache since we are about to update the object
o . md5sum = nil
o . sha1sum = nil
2017-08-07 18:19:37 +02:00
c , err := o . fs . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "Update" )
}
2019-12-02 18:28:50 +01:00
file , err := c . sftpClient . OpenFile ( o . path ( ) , os . O_WRONLY | os . O_CREATE | os . O_TRUNC )
2017-08-07 18:19:37 +02:00
o . fs . putSftpConnection ( & c , err )
2017-01-31 21:34:11 +01:00
if err != nil {
return errors . Wrap ( err , "Update Create failed" )
}
// remove the file if upload failed
remove := func ( ) {
2017-08-07 18:19:37 +02:00
c , removeErr := o . fs . getSftpConnection ( )
if removeErr != nil {
fs . Debugf ( src , "Failed to open new SSH connection for delete: %v" , removeErr )
return
}
removeErr = c . sftpClient . Remove ( o . path ( ) )
o . fs . putSftpConnection ( & c , removeErr )
2017-01-31 21:34:11 +01:00
if removeErr != nil {
2017-02-09 12:01:20 +01:00
fs . Debugf ( src , "Failed to remove: %v" , removeErr )
2017-01-31 21:34:11 +01:00
} else {
2017-02-09 12:01:20 +01:00
fs . Debugf ( src , "Removed after failed upload: %v" , err )
2016-11-13 00:36:08 +01:00
}
}
2017-01-31 21:34:11 +01:00
_ , err = file . ReadFrom ( in )
if err != nil {
remove ( )
return errors . Wrap ( err , "Update ReadFrom failed" )
}
err = file . Close ( )
if err != nil {
remove ( )
return errors . Wrap ( err , "Update Close failed" )
}
2019-06-17 10:34:30 +02:00
err = o . SetModTime ( ctx , src . ModTime ( ctx ) )
2017-01-31 21:34:11 +01:00
if err != nil {
return errors . Wrap ( err , "Update SetModTime failed" )
}
return nil
2016-11-13 00:36:08 +01:00
}
// Remove a remote sftp file object
2019-06-17 10:34:30 +02:00
func ( o * Object ) Remove ( ctx context . Context ) error {
2017-08-07 18:19:37 +02:00
c , err := o . fs . getSftpConnection ( )
if err != nil {
return errors . Wrap ( err , "Remove" )
}
err = c . sftpClient . Remove ( o . path ( ) )
o . fs . putSftpConnection ( & c , err )
return err
2016-11-13 00:36:08 +01:00
}
// Check the interfaces are satisfied
var (
2017-08-03 21:42:35 +02:00
_ fs . Fs = & Fs { }
_ fs . PutStreamer = & Fs { }
_ fs . Mover = & Fs { }
_ fs . DirMover = & Fs { }
2019-06-26 12:24:48 +02:00
_ fs . Abouter = & Fs { }
2017-08-03 21:42:35 +02:00
_ fs . Object = & Object { }
2016-11-13 00:36:08 +01:00
)