mirror of
https://github.com/duplicati/duplicati.git
synced 2025-11-28 03:20:25 +08:00
This PR adds a dynamic property so a backend can signal if it supports streaming, based on the settings. This is currently used for the File backend, so that toggling `--use-move-for-put` will disable streaming on the backend instead of relying on the `--disable-streaming-transfers` flag.
652 lines
No EOL
29 KiB
C#
652 lines
No EOL
29 KiB
C#
// Copyright (C) 2025, The Duplicati Team
|
|
// https://duplicati.com, hello@duplicati.com
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
|
// copy of this software and associated documentation files (the "Software"),
|
|
// to deal in the Software without restriction, including without limitation
|
|
// the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
// and/or sell copies of the Software, and to permit persons to whom the
|
|
// Software is furnished to do so, subject to the following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be included in
|
|
// all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
// FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
|
// DEALINGS IN THE SOFTWARE.
|
|
|
|
|
|
using Duplicati.Library.Common.IO;
|
|
using Duplicati.Library.Interface;
|
|
using Duplicati.Library.Logging;
|
|
using Duplicati.Library.SourceProvider;
|
|
using Duplicati.Library.Utility;
|
|
using Duplicati.Library.Utility.Options;
|
|
using Renci.SshNet;
|
|
using Renci.SshNet.Common;
|
|
using SshNet.Agent;
|
|
using System.Diagnostics;
|
|
using System.Globalization;
|
|
using System.Runtime.CompilerServices;
|
|
using System.Runtime.Versioning;
|
|
|
|
namespace Duplicati.Library.Backend
|
|
{
|
|
public class SSHv2 : IStreamingBackend, IRenameEnabledBackend, IFolderEnabledBackend
|
|
{
|
|
private static readonly string LOGTAG = Log.LogTagFromType<SSHv2>();
|
|
private const string SSH_KEYFILE_OPTION = "ssh-keyfile";
|
|
private const string SSH_KEYFILE_INLINE = "ssh-key";
|
|
private const string SSH_FINGERPRINT_OPTION = "ssh-fingerprint";
|
|
private const string SSH_RELATIVE_PATH_OPTION = "ssh-relative-path";
|
|
private const string SSH_FINGERPRINT_ACCEPT_ANY_OPTION = "ssh-accept-any-fingerprints";
|
|
public const string KEYFILE_URI = "sshkey://";
|
|
private const string SSH_TIMEOUT_OPTION = "ssh-operation-timeout";
|
|
private const string SSH_KEEPALIVE_OPTION = "ssh-keepalive";
|
|
private const string SSH_DISABLE_AGENT_OPTION = "ssh-disable-agent";
|
|
|
|
readonly Dictionary<string, string?> m_options;
|
|
|
|
private readonly string m_server;
|
|
private readonly string m_path;
|
|
private readonly string m_username;
|
|
private readonly string? m_password;
|
|
private readonly string? m_fingerprint;
|
|
private readonly bool m_fingerprintallowall;
|
|
private readonly TimeSpan m_operationtimeout;
|
|
private readonly TimeSpan m_keepaliveinterval;
|
|
|
|
private readonly int m_port = 22;
|
|
private readonly bool m_useRelativePath;
|
|
private readonly bool m_useAgent;
|
|
private readonly TimeoutOptionsHelper.Timeouts m_timeouts;
|
|
private string? m_initialDirectory;
|
|
|
|
private SftpClient? m_con;
|
|
|
|
public SSHv2()
|
|
{
|
|
m_server = null!;
|
|
m_path = null!;
|
|
m_username = null!;
|
|
m_options = null!;
|
|
m_timeouts = null!;
|
|
m_con = null!;
|
|
m_useAgent = true;
|
|
}
|
|
|
|
public SSHv2(string url, Dictionary<string, string?> options)
|
|
{
|
|
m_options = options;
|
|
var uri = new Utility.Uri(url);
|
|
uri.RequireHost();
|
|
|
|
var auth = AuthOptionsHelper.Parse(options, uri);
|
|
if (!auth.HasUsername)
|
|
throw new UserInformationException(Strings.SSHv2Backend.UsernameRequired, "UsernameNotSpecified");
|
|
|
|
m_username = auth.Username!;
|
|
m_password = auth.Password;
|
|
m_fingerprint = options.GetValueOrDefault(SSH_FINGERPRINT_OPTION);
|
|
m_fingerprintallowall = Utility.Utility.ParseBoolOption(options, SSH_FINGERPRINT_ACCEPT_ANY_OPTION);
|
|
m_useRelativePath = Utility.Utility.ParseBoolOption(options, SSH_RELATIVE_PATH_OPTION);
|
|
m_useAgent = !Utility.Utility.ParseBoolOption(options, SSH_DISABLE_AGENT_OPTION);
|
|
m_timeouts = TimeoutOptionsHelper.Parse(options);
|
|
|
|
m_path = uri.Path;
|
|
|
|
if (!string.IsNullOrWhiteSpace(m_path))
|
|
m_path = Util.AppendDirSeparator(m_path, "/");
|
|
|
|
if (m_useRelativePath)
|
|
{
|
|
m_path = m_path.TrimStart('/');
|
|
}
|
|
else
|
|
{
|
|
if (!m_path.StartsWith("/", StringComparison.Ordinal))
|
|
m_path = "/" + m_path;
|
|
}
|
|
|
|
m_server = uri.Host ?? "";
|
|
|
|
if (uri.Port > 0)
|
|
m_port = uri.Port;
|
|
|
|
m_keepaliveinterval = Utility.Utility.ParseTimespanOption(options, SSH_KEEPALIVE_OPTION, "0s");
|
|
m_operationtimeout = Utility.Utility.ParseTimespanOption(options, SSH_TIMEOUT_OPTION, "0s");
|
|
}
|
|
|
|
#region IBackend Members
|
|
|
|
public Task TestAsync(CancellationToken cancelToken)
|
|
=> this.TestReadWritePermissionsAsync(cancelToken);
|
|
|
|
public async Task CreateFolderAsync(CancellationToken cancelToken)
|
|
{
|
|
var con = await CreateConnection(cancelToken).ConfigureAwait(false);
|
|
|
|
// Since the SftpClient.CreateDirectory method does not create all the parent directories
|
|
// as needed, this has to be done manually.
|
|
var partialPath = string.Empty;
|
|
foreach (string part in m_path.Split('/').Where(x => !String.IsNullOrEmpty(x)))
|
|
{
|
|
partialPath += $"/{part}";
|
|
if (await Utility.Utility.WithTimeout(m_timeouts.ShortTimeout, cancelToken, ct => con.ExistsAsync(partialPath, ct)).ConfigureAwait(false))
|
|
{
|
|
if (!await Utility.Utility.WithTimeout(m_timeouts.ShortTimeout, cancelToken, ct => con.GetAttributes(partialPath).IsDirectory).ConfigureAwait(false))
|
|
{
|
|
throw new ArgumentException($"The path {partialPath} already exists and is not a directory.");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
await Utility.Utility.WithTimeout(m_timeouts.ShortTimeout, cancelToken, ct => con.CreateDirectoryAsync(partialPath, ct)).ConfigureAwait(false);
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
public string DisplayName => Strings.SSHv2Backend.DisplayName;
|
|
|
|
public string ProtocolKey => "ssh";
|
|
|
|
public async Task PutAsync(string remotename, string filename, CancellationToken cancelToken)
|
|
{
|
|
using (var fs = File.Open(filename, FileMode.Open,
|
|
FileAccess.Read, FileShare.Read))
|
|
await PutAsync(remotename, fs, cancelToken).ConfigureAwait(false);
|
|
}
|
|
|
|
public async Task GetAsync(string remotename, string filename, CancellationToken cancelToken)
|
|
{
|
|
using (var fs = File.Open(filename, FileMode.Create,
|
|
FileAccess.Write, FileShare.None))
|
|
await GetAsync(remotename, fs, cancelToken).ConfigureAwait(false);
|
|
}
|
|
|
|
public async Task DeleteAsync(string remotename, CancellationToken cancelToken)
|
|
{
|
|
try
|
|
{
|
|
var con = await CreateConnection(cancelToken).ConfigureAwait(false);
|
|
await SetWorkingDirectory(con, cancelToken).ConfigureAwait(false);
|
|
await Utility.Utility.WithTimeout(m_timeouts.ShortTimeout, cancelToken, ct => con.DeleteFileAsync(remotename, ct)).ConfigureAwait(false);
|
|
}
|
|
catch (SftpPathNotFoundException ex)
|
|
{
|
|
throw new FileMissingException(ex);
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public IList<ICommandLineArgument> SupportedCommands => [
|
|
.. AuthOptionsHelper.GetOptions(),
|
|
new CommandLineArgument(SSH_FINGERPRINT_OPTION, CommandLineArgument.ArgumentType.String,
|
|
Strings.SSHv2Backend.DescriptionFingerprintShort,
|
|
Strings.SSHv2Backend.DescriptionFingerprintLong),
|
|
new CommandLineArgument(SSH_FINGERPRINT_ACCEPT_ANY_OPTION, CommandLineArgument.ArgumentType.Boolean,
|
|
Strings.SSHv2Backend.DescriptionAnyFingerprintShort,
|
|
Strings.SSHv2Backend.DescriptionAnyFingerprintLong),
|
|
new CommandLineArgument(SSH_KEYFILE_OPTION, CommandLineArgument.ArgumentType.Path,
|
|
Strings.SSHv2Backend.DescriptionSshkeyfileShort,
|
|
Strings.SSHv2Backend.DescriptionSshkeyfileLong),
|
|
new CommandLineArgument(SSH_KEYFILE_INLINE, CommandLineArgument.ArgumentType.Password,
|
|
Strings.SSHv2Backend.DescriptionSshkeyShort,
|
|
Strings.SSHv2Backend.DescriptionSshkeyLong),
|
|
new CommandLineArgument(SSH_TIMEOUT_OPTION, CommandLineArgument.ArgumentType.Timespan,
|
|
Strings.SSHv2Backend.DescriptionSshtimeoutShort, Strings.SSHv2Backend.DescriptionSshtimeoutLong,
|
|
"0", null,null, Strings.SSHv2Backend.TimeoutDeprecated(SSH_TIMEOUT_OPTION, TimeoutOptionsHelper.ShortTimeoutOption, TimeoutOptionsHelper.ListTimeoutOption, TimeoutOptionsHelper.ReadWriteTimeoutOption)),
|
|
new CommandLineArgument(SSH_KEEPALIVE_OPTION, CommandLineArgument.ArgumentType.Timespan,
|
|
Strings.SSHv2Backend.DescriptionSshkeepaliveShort,
|
|
Strings.SSHv2Backend.DescriptionSshkeepaliveLong, "0"),
|
|
new CommandLineArgument(SSH_DISABLE_AGENT_OPTION, CommandLineArgument.ArgumentType.Boolean,
|
|
Strings.SSHv2Backend.DescriptionDisableAgentShort,
|
|
Strings.SSHv2Backend.DescriptionDisableAgentLong),
|
|
new CommandLineArgument(SSH_RELATIVE_PATH_OPTION, CommandLineArgument.ArgumentType.Boolean,
|
|
Strings.SSHv2Backend.DescriptionRelativePathShort,
|
|
Strings.SSHv2Backend.DescriptionRelativePathLong),
|
|
.. TimeoutOptionsHelper.GetOptions(),
|
|
];
|
|
|
|
/// <inheritdoc/>
|
|
public string Description => Strings.SSHv2Backend.Description;
|
|
|
|
/// <inheritdoc/>
|
|
public bool SupportsStreaming => true;
|
|
|
|
#endregion
|
|
|
|
#region IDisposable Members
|
|
|
|
/// <inheritdoc/>
|
|
public void Dispose()
|
|
{
|
|
if (m_con != null)
|
|
{
|
|
try
|
|
{
|
|
m_con.Dispose();
|
|
}
|
|
catch (System.Net.Sockets.SocketException)
|
|
{
|
|
//If the operating system sometimes close socket before disposal of connection following exception is thrown
|
|
//System.Net.Sockets.SocketException (0x80004005): An existing connection was forcibly closed by the remote host
|
|
}
|
|
finally
|
|
{
|
|
m_con = null;
|
|
}
|
|
}
|
|
}
|
|
|
|
#endregion
|
|
|
|
#region IStreamingBackend Implementation
|
|
|
|
public async Task PutAsync(string remotename, Stream stream, CancellationToken cancelToken)
|
|
{
|
|
var con = await CreateConnection(cancelToken).ConfigureAwait(false);
|
|
await SetWorkingDirectory(con, cancelToken).ConfigureAwait(false);
|
|
try
|
|
{
|
|
using var ts = stream.ObserveReadTimeout(m_timeouts.ReadWriteTimeout, false);
|
|
await Task.Factory.FromAsync(
|
|
(cb, state) => con.BeginUploadFile(ts, remotename, cb, state, _ => cancelToken.ThrowIfCancellationRequested()),
|
|
con.EndUploadFile,
|
|
null);
|
|
}
|
|
catch (SftpPathNotFoundException ex)
|
|
{
|
|
throw new FolderMissingException(ex);
|
|
}
|
|
}
|
|
|
|
public async Task GetAsync(string remotename, Stream stream, CancellationToken cancelToken)
|
|
{
|
|
var con = await CreateConnection(cancelToken).ConfigureAwait(false);
|
|
await SetWorkingDirectory(con, cancelToken).ConfigureAwait(false);
|
|
|
|
try
|
|
{
|
|
using var ts = stream.ObserveWriteTimeout(m_timeouts.ReadWriteTimeout, false);
|
|
await Task.Factory.FromAsync(
|
|
(cb, state) => con.BeginDownloadFile(remotename, ts, cb, state, _ => cancelToken.ThrowIfCancellationRequested()),
|
|
con.EndDownloadFile,
|
|
null).ConfigureAwait(false);
|
|
}
|
|
catch (SftpPathNotFoundException ex)
|
|
{
|
|
throw new FileMissingException(ex);
|
|
}
|
|
}
|
|
|
|
#endregion
|
|
|
|
#region IRenameEnabledBackend Implementation
|
|
|
|
public async Task RenameAsync(string source, string target, CancellationToken cancelToken)
|
|
{
|
|
var con = await CreateConnection(cancelToken).ConfigureAwait(false);
|
|
await SetWorkingDirectory(con, cancelToken).ConfigureAwait(false);
|
|
await Utility.Utility.WithTimeout(m_timeouts.ShortTimeout, cancelToken, ct => con.RenameFileAsync(source, target, ct).ConfigureAwait(false));
|
|
}
|
|
|
|
#endregion
|
|
|
|
#region Implementation
|
|
|
|
internal async Task<SftpClient> CreateConnection(CancellationToken cancelToken)
|
|
{
|
|
if (m_con != null && m_con.IsConnected)
|
|
return m_con;
|
|
|
|
if (m_con != null && !m_con.IsConnected)
|
|
{
|
|
await Utility.Utility.WithTimeout(m_timeouts.ShortTimeout, cancelToken, ct => m_con.ConnectAsync(ct)).ConfigureAwait(false);
|
|
return m_con;
|
|
}
|
|
|
|
SftpClient con;
|
|
|
|
m_options.TryGetValue(SSH_KEYFILE_OPTION, out var keyFile);
|
|
m_options.TryGetValue(SSH_KEYFILE_INLINE, out var keyInline);
|
|
|
|
if (!string.IsNullOrWhiteSpace(keyFile) || !string.IsNullOrWhiteSpace(keyInline))
|
|
{
|
|
con = new SftpClient(m_server, m_port, m_username, ValidateKeyFile(keyFile, keyInline, m_password));
|
|
}
|
|
else if (!string.IsNullOrWhiteSpace(m_password))
|
|
{
|
|
con = new SftpClient(m_server, m_port, m_username, m_password);
|
|
}
|
|
else if (m_useAgent)
|
|
{
|
|
var agentKeys = await GetPrivateKeySources(cancelToken);
|
|
var connectionInfo = new ConnectionInfo(m_server, m_port, m_username,
|
|
[
|
|
new PrivateKeyAuthenticationMethod(m_username, agentKeys),
|
|
]);
|
|
con = new SftpClient(connectionInfo);
|
|
}
|
|
else
|
|
{
|
|
con = new SftpClient(m_server, m_port, m_username, string.Empty);
|
|
}
|
|
|
|
con.HostKeyReceived += (sender, e) =>
|
|
{
|
|
e.CanTrust = false;
|
|
|
|
if (m_fingerprintallowall)
|
|
{
|
|
e.CanTrust = true;
|
|
return;
|
|
}
|
|
|
|
var hostFingerprint =
|
|
$"{e.HostKeyName} {e.KeyLength} {BitConverter.ToString(e.FingerPrint).Replace('-', ':')}";
|
|
|
|
if (string.IsNullOrEmpty(m_fingerprint))
|
|
throw new HostKeyException(
|
|
Strings.SSHv2Backend.FingerprintNotSpecifiedManagedError(
|
|
hostFingerprint.ToLower(CultureInfo.InvariantCulture), SSH_FINGERPRINT_OPTION,
|
|
SSH_FINGERPRINT_ACCEPT_ANY_OPTION),
|
|
hostFingerprint, m_fingerprint);
|
|
|
|
if (!string.Equals(hostFingerprint, m_fingerprint, StringComparison.OrdinalIgnoreCase))
|
|
throw new HostKeyException(
|
|
Strings.SSHv2Backend.FingerprintNotMatchManagedError(
|
|
hostFingerprint.ToLower(CultureInfo.InvariantCulture)),
|
|
hostFingerprint, m_fingerprint);
|
|
|
|
e.CanTrust = true;
|
|
};
|
|
|
|
if (m_operationtimeout.TotalSeconds > 0)
|
|
con.OperationTimeout = m_operationtimeout;
|
|
if (m_keepaliveinterval.TotalSeconds > 0)
|
|
con.KeepAliveInterval = m_keepaliveinterval;
|
|
|
|
await Utility.Utility.WithTimeout(m_timeouts.ShortTimeout, cancelToken, ct => con.ConnectAsync(ct)).ConfigureAwait(false);
|
|
if (m_useRelativePath && (string.IsNullOrWhiteSpace(con.WorkingDirectory) || !con.WorkingDirectory.StartsWith("/")))
|
|
throw new UserInformationException("Server does not report absolute initial directory, please switch to absolute paths", "RelativePathNotSupported");
|
|
m_initialDirectory = con.WorkingDirectory;
|
|
|
|
return m_con = con;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Attempts to read private keys from SSH Agents
|
|
/// </summary>
|
|
/// <param name="cancelToken">The cancellation token</param>
|
|
/// <returns>The private keys that could be loaded</returns>
|
|
private static async Task<IPrivateKeySource[]> GetPrivateKeySources(CancellationToken cancelToken)
|
|
{
|
|
var agentKeys = new List<IPrivateKeySource>();
|
|
if (OperatingSystem.IsMacOS())
|
|
{
|
|
try
|
|
{
|
|
// On macOS, we can use ssh-add to add keys to the agent from the KeyChain
|
|
// The keys are only visible to the current process
|
|
var keyPaths = FindPrivateKeyPaths();
|
|
if (keyPaths.Count > 0)
|
|
await AddKeysToAgent(keyPaths, true, cancelToken);
|
|
}
|
|
catch (Exception ex)
|
|
{
|
|
Log.WriteVerboseMessage(LOGTAG, "MacOsKeyLoadFailed", ex, "Failed to load macOS keys");
|
|
}
|
|
}
|
|
|
|
try
|
|
{
|
|
agentKeys.AddRange(new SshAgent().RequestIdentities());
|
|
}
|
|
catch (Exception ex)
|
|
{
|
|
Log.WriteVerboseMessage(LOGTAG, "SshAgentKeyLoadFailed", ex, "Failed to load ssh agent keys");
|
|
}
|
|
|
|
try
|
|
{
|
|
if (OperatingSystem.IsWindows())
|
|
agentKeys.AddRange(new Pageant().RequestIdentities());
|
|
}
|
|
catch (Exception ex)
|
|
{
|
|
Log.WriteVerboseMessage(LOGTAG, "PageantNotFound", ex, "Failed to access Pageant");
|
|
}
|
|
|
|
return agentKeys.ToArray();
|
|
}
|
|
|
|
/// <summary>
|
|
/// Returns a list of common SSH private key file paths.
|
|
/// </summary>
|
|
/// <returns>A list of file paths to private keys, or an empty list if none are found.</returns>
|
|
private static List<string> FindPrivateKeyPaths()
|
|
{
|
|
var possibleKeyNames = new[]
|
|
{
|
|
"id_rsa",
|
|
"id_ecdsa",
|
|
"id_ed25519",
|
|
"id_dsa"
|
|
};
|
|
|
|
var sshDir = Path.Combine(Environment.GetFolderPath(Environment.SpecialFolder.UserProfile), ".ssh");
|
|
var foundKeys = new List<string>();
|
|
|
|
if (!Directory.Exists(sshDir))
|
|
return foundKeys;
|
|
|
|
// Get the common SSH key names
|
|
foundKeys.AddRange(
|
|
possibleKeyNames.Select(keyName => Path.Combine(sshDir, keyName))
|
|
.Where(File.Exists));
|
|
|
|
// Also include any non-extension files in ~/.ssh that have a matching .pub file
|
|
foreach (var file in Directory.GetFiles(sshDir))
|
|
{
|
|
if (!Path.GetExtension(file).Equals(string.Empty)) continue;
|
|
if (File.Exists(Path.ChangeExtension(file, ".pub")) && !foundKeys.Contains(file))
|
|
foundKeys.Add(file);
|
|
}
|
|
|
|
return foundKeys;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Loads the given SSH private keys into the SSH agent, optionally storing the passphrases in the macOS Keychain.
|
|
/// </summary>
|
|
/// <param name="keyPaths">List of private key file paths to load</param>
|
|
/// <param name="useAppleKeychain">Whether to use --apple-use-keychain (macOS only)</param>
|
|
/// <param name="cancellationToken">Cancellation token to cancel the operation</param>
|
|
/// <returns>Task representing the asynchronous operation</returns>
|
|
[SupportedOSPlatform("macos")]
|
|
private static async Task AddKeysToAgent(IEnumerable<string> keyPaths, bool useAppleKeychain, CancellationToken cancellationToken)
|
|
{
|
|
foreach (var keyPath in keyPaths)
|
|
{
|
|
if (!File.Exists(keyPath))
|
|
{
|
|
Log.WriteVerboseMessage(LOGTAG, "KeyFileNotFound", "SSH key file not found: {0}", keyPath);
|
|
continue;
|
|
}
|
|
|
|
using var ct = CancellationTokenSource.CreateLinkedTokenSource(cancellationToken);
|
|
ct.CancelAfter(TimeSpan.FromSeconds(5));
|
|
|
|
var arguments = new List<string>();
|
|
|
|
// On macOS, we can use the --apple-use-keychain option to store the passphrase in the Keychain
|
|
if (useAppleKeychain && OperatingSystem.IsMacOS())
|
|
arguments.Add("--apple-use-keychain");
|
|
|
|
arguments.Add(keyPath);
|
|
|
|
var psi = new ProcessStartInfo("ssh-add", arguments)
|
|
{
|
|
RedirectStandardOutput = true,
|
|
RedirectStandardError = true,
|
|
UseShellExecute = false
|
|
};
|
|
|
|
try
|
|
{
|
|
using var process = Process.Start(psi)
|
|
?? throw new InvalidOperationException("Failed to start ssh-add process");
|
|
var output = process.StandardOutput.ReadToEndAsync(ct.Token);
|
|
var error = process.StandardError.ReadToEndAsync(ct.Token);
|
|
await process.WaitForExitAsync(ct.Token).ConfigureAwait(false);
|
|
|
|
if (process.ExitCode == 0)
|
|
Log.WriteVerboseMessage(LOGTAG, "SSHKeyAdded", "Successfully added key: {0}", keyPath);
|
|
else
|
|
Log.WriteVerboseMessage(LOGTAG, "SSHKeyAddFailed", "Failed to add key: {0}\nOutput: {1}\nError: {2}", keyPath, (await output).Trim(), (await error).Trim());
|
|
}
|
|
catch (Exception ex)
|
|
{
|
|
Log.WriteVerboseMessage(LOGTAG, "SSHKeyAddException", ex, "Exception adding key {0}", keyPath);
|
|
}
|
|
}
|
|
}
|
|
|
|
private async Task SetWorkingDirectory(SftpClient connection, CancellationToken cancelToken)
|
|
{
|
|
if (string.IsNullOrEmpty(m_path))
|
|
return;
|
|
|
|
var targetPath = m_useRelativePath
|
|
? Util.AppendDirSeparator(m_initialDirectory ?? "", "/") + m_path
|
|
: m_path;
|
|
|
|
var workingDir = Util.AppendDirSeparator(connection.WorkingDirectory, "/");
|
|
if (workingDir == targetPath)
|
|
return;
|
|
|
|
try
|
|
{
|
|
await Utility.Utility.WithTimeout(m_timeouts.ShortTimeout, cancelToken, ct => connection.ChangeDirectoryAsync(targetPath, ct)).ConfigureAwait(false);
|
|
}
|
|
catch (Exception ex)
|
|
{
|
|
throw new FolderMissingException(
|
|
Strings.SSHv2Backend.FolderNotFoundManagedError(m_path, ex.Message), ex);
|
|
}
|
|
}
|
|
|
|
/// <inheritdoc />
|
|
public async IAsyncEnumerable<IFileEntry> ListAsync([EnumeratorCancellation] CancellationToken cancelToken)
|
|
{
|
|
var path = ".";
|
|
|
|
var con = await CreateConnection(cancelToken).ConfigureAwait(false);
|
|
await SetWorkingDirectory(con, cancelToken).ConfigureAwait(false);
|
|
|
|
await foreach (var ls in await Utility.Utility.WithTimeout(m_timeouts.ListTimeout, cancelToken, ct => con.ListDirectoryAsync(path, ct)).ConfigureAwait(false))
|
|
{
|
|
if (ls.Name.ToString() == "." || ls.Name.ToString() == "..") continue;
|
|
yield return new FileEntry(ls.Name, ls.Length,
|
|
ls.LastAccessTime, ls.LastWriteTime)
|
|
{ IsFolder = ls.Attributes.IsDirectory };
|
|
}
|
|
}
|
|
|
|
private static PrivateKeyFile ValidateKeyFile(string? filename, string? inline, string? password)
|
|
{
|
|
try
|
|
{
|
|
if (!string.IsNullOrWhiteSpace(filename) && !filename.StartsWith(KEYFILE_URI, StringComparison.OrdinalIgnoreCase))
|
|
{
|
|
return string.IsNullOrEmpty(password)
|
|
? new PrivateKeyFile(filename)
|
|
: new PrivateKeyFile(filename, password);
|
|
}
|
|
|
|
// Legacy inline file was using a URI scheme, which meant double url-encoding.
|
|
var legacyInline = false;
|
|
if (inline != null && inline.StartsWith(KEYFILE_URI, StringComparison.OrdinalIgnoreCase))
|
|
{
|
|
legacyInline = true;
|
|
inline = inline.Substring(KEYFILE_URI.Length);
|
|
}
|
|
if (string.IsNullOrWhiteSpace(inline) && filename != null && filename.StartsWith(KEYFILE_URI, StringComparison.OrdinalIgnoreCase))
|
|
{
|
|
legacyInline = true;
|
|
inline = filename.Substring(KEYFILE_URI.Length);
|
|
}
|
|
|
|
if (string.IsNullOrWhiteSpace(inline))
|
|
throw new UserInformationException("Expected a keyfile or inline key, but none was found", "SSHKeyFileNotFound");
|
|
|
|
// We now also support inline keys that are not URL encoded
|
|
if (!legacyInline)
|
|
{
|
|
using var ms = new MemoryStream(System.Text.Encoding.UTF8.GetBytes(inline));
|
|
return string.IsNullOrEmpty(password) ? new PrivateKeyFile(ms) : new PrivateKeyFile(ms, password);
|
|
}
|
|
|
|
using (var ms = new MemoryStream())
|
|
using (var sr = new StreamWriter(ms))
|
|
{
|
|
sr.Write(Utility.Uri.UrlDecode(inline));
|
|
sr.Flush();
|
|
|
|
ms.Position = 0;
|
|
|
|
return string.IsNullOrEmpty(password) ? new PrivateKeyFile(ms) : new PrivateKeyFile(ms, password);
|
|
}
|
|
}
|
|
catch (Exception ex)
|
|
{
|
|
throw new UserInformationException(
|
|
"Failed to parse the keyfile, check the key format and passphrase. " +
|
|
$"Error message was {ex.Message}",
|
|
"SSHFailedToParseKeyFile", ex);
|
|
}
|
|
}
|
|
|
|
#endregion
|
|
|
|
public Task<string[]> GetDNSNamesAsync(CancellationToken cancelToken) => Task.FromResult(new[] { m_server });
|
|
|
|
/// <inheritdoc/>
|
|
public async IAsyncEnumerable<IFileEntry> ListAsync(string? path, [EnumeratorCancellation] CancellationToken cancellationToken)
|
|
{
|
|
var con = await CreateConnection(cancellationToken).ConfigureAwait(false);
|
|
await SetWorkingDirectory(con, cancellationToken).ConfigureAwait(false);
|
|
|
|
var prefixPath = m_useRelativePath ? "" : m_path;
|
|
if (!string.IsNullOrWhiteSpace(prefixPath))
|
|
prefixPath = Util.AppendDirSeparator(prefixPath, "/");
|
|
|
|
var filterPath = prefixPath + BackendSourceFileEntry.NormalizePathTo(path, '/');
|
|
if (!string.IsNullOrWhiteSpace(filterPath))
|
|
filterPath = Util.AppendDirSeparator(filterPath, "/");
|
|
|
|
if (string.IsNullOrWhiteSpace(filterPath))
|
|
filterPath = ".";
|
|
|
|
await foreach (var x in await Utility.Utility.WithTimeout(m_timeouts.ListTimeout, cancellationToken, ct => con.ListDirectoryAsync(filterPath, ct)).ConfigureAwait(false))
|
|
yield return new FileEntry(
|
|
x.Name,
|
|
x.Attributes.Size,
|
|
x.Attributes.LastAccessTimeUtc,
|
|
x.Attributes.LastWriteTimeUtc)
|
|
{
|
|
IsFolder = x.Attributes.IsDirectory
|
|
};
|
|
}
|
|
|
|
/// <inheritdoc/>
|
|
public Task<IFileEntry?> GetEntryAsync(string path, CancellationToken cancellationToken)
|
|
=> Task.FromResult<IFileEntry?>(null);
|
|
}
|
|
} |