]> andersk Git - openssh.git/blame - sftp.c
- (dtucker) [configure.ac] Move openpty/ctty test outside of case statement
[openssh.git] / sftp.c
CommitLineData
61e96248 1/*
a96fd7c2 2 * Copyright (c) 2001,2002 Damien Miller. All rights reserved.
61e96248 3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 *
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23 */
24
25#include "includes.h"
26
659912db 27RCSID("$OpenBSD: sftp.c,v 1.37 2003/07/10 20:05:55 markus Exp $");
61e96248 28
29#include "buffer.h"
30#include "xmalloc.h"
31#include "log.h"
32#include "pathnames.h"
1fcde3fe 33#include "misc.h"
61e96248 34
35#include "sftp.h"
36#include "sftp-common.h"
37#include "sftp-client.h"
38#include "sftp-int.h"
39
5152d46f 40#ifdef HAVE___PROGNAME
41extern char *__progname;
42#else
43char *__progname;
44#endif
45
a5ec8a3d 46FILE* infile;
375f867e 47size_t copy_buffer_len = 32768;
c25d3df7 48size_t num_requests = 16;
1b558925 49static pid_t sshpid = -1;
0426a3b4 50
b65c3807 51extern int showprogress;
52
396c147e 53static void
1b558925 54killchild(int signo)
55{
56 if (sshpid > 1)
57 kill(sshpid, signo);
58
59 _exit(1);
60}
61
62static void
63connect_to_server(char *path, char **args, int *in, int *out)
61e96248 64{
65 int c_in, c_out;
9906a836 66
61e96248 67#ifdef USE_PIPES
68 int pin[2], pout[2];
9906a836 69
61e96248 70 if ((pipe(pin) == -1) || (pipe(pout) == -1))
71 fatal("pipe: %s", strerror(errno));
72 *in = pin[0];
73 *out = pout[1];
74 c_in = pout[0];
75 c_out = pin[1];
76#else /* USE_PIPES */
77 int inout[2];
9906a836 78
61e96248 79 if (socketpair(AF_UNIX, SOCK_STREAM, 0, inout) == -1)
80 fatal("socketpair: %s", strerror(errno));
81 *in = *out = inout[0];
82 c_in = c_out = inout[1];
83#endif /* USE_PIPES */
84
1b558925 85 if ((sshpid = fork()) == -1)
61e96248 86 fatal("fork: %s", strerror(errno));
1b558925 87 else if (sshpid == 0) {
61e96248 88 if ((dup2(c_in, STDIN_FILENO) == -1) ||
89 (dup2(c_out, STDOUT_FILENO) == -1)) {
90 fprintf(stderr, "dup2: %s\n", strerror(errno));
91 exit(1);
92 }
93 close(*in);
94 close(*out);
95 close(c_in);
96 close(c_out);
a96fd7c2 97 execv(path, args);
98 fprintf(stderr, "exec: %s: %s\n", path, strerror(errno));
61e96248 99 exit(1);
100 }
101
1b558925 102 signal(SIGTERM, killchild);
103 signal(SIGINT, killchild);
104 signal(SIGHUP, killchild);
61e96248 105 close(c_in);
106 close(c_out);
107}
108
396c147e 109static void
61e96248 110usage(void)
111{
22be05a5 112 extern char *__progname;
762715ce 113
f1278af7 114 fprintf(stderr,
659912db 115 "usage: %s [-vC1] [-b batchfile] [-o ssh_option] [-s subsystem | sftp_server]\n"
116 " [-B buffer_size] [-F ssh_config] [-P sftp_server path]\n"
117 " [-R num_requests] [-S program]\n"
22be05a5 118 " [user@]host[:file [file]]\n", __progname);
61e96248 119 exit(1);
120}
121
2b87da3b 122int
61e96248 123main(int argc, char **argv)
124{
9a36208d 125 int in, out, ch, err;
edeeab1e 126 char *host, *userhost, *cp, *file2;
8a624ebf 127 int debug_level = 0, sshver = 2;
128 char *file1 = NULL, *sftp_server = NULL;
a96fd7c2 129 char *ssh_program = _PATH_SSH_PROGRAM, *sftp_direct = NULL;
8a624ebf 130 LogLevel ll = SYSLOG_LEVEL_INFO;
131 arglist args;
0426a3b4 132 extern int optind;
133 extern char *optarg;
61e96248 134
5152d46f 135 __progname = get_progname(argv[0]);
8a624ebf 136 args.list = NULL;
184eed6a 137 addargs(&args, "ssh"); /* overwritten with ssh_program */
8a624ebf 138 addargs(&args, "-oForwardX11 no");
139 addargs(&args, "-oForwardAgent no");
e1c5bfaf 140 addargs(&args, "-oClearAllForwardings yes");
8a624ebf 141 ll = SYSLOG_LEVEL_INFO;
142 infile = stdin; /* Read from STDIN unless changed by -b */
0426a3b4 143
c25d3df7 144 while ((ch = getopt(argc, argv, "1hvCo:s:S:b:B:F:P:R:")) != -1) {
0426a3b4 145 switch (ch) {
146 case 'C':
8a624ebf 147 addargs(&args, "-C");
0426a3b4 148 break;
149 case 'v':
8a624ebf 150 if (debug_level < 3) {
151 addargs(&args, "-v");
152 ll = SYSLOG_LEVEL_DEBUG1 + debug_level;
153 }
154 debug_level++;
0426a3b4 155 break;
f1278af7 156 case 'F':
0426a3b4 157 case 'o':
f1278af7 158 addargs(&args, "-%c%s", ch, optarg);
0426a3b4 159 break;
160 case '1':
8a624ebf 161 sshver = 1;
0426a3b4 162 if (sftp_server == NULL)
163 sftp_server = _PATH_SFTP_SERVER;
164 break;
165 case 's':
166 sftp_server = optarg;
167 break;
168 case 'S':
169 ssh_program = optarg;
170 break;
a5ec8a3d 171 case 'b':
172 if (infile == stdin) {
173 infile = fopen(optarg, "r");
cd332296 174 if (infile == NULL)
a5ec8a3d 175 fatal("%s (%s).", strerror(errno), optarg);
cd332296 176 } else
a5ec8a3d 177 fatal("Filename already specified.");
b65c3807 178 showprogress = 0;
a5ec8a3d 179 break;
a96fd7c2 180 case 'P':
181 sftp_direct = optarg;
182 break;
375f867e 183 case 'B':
184 copy_buffer_len = strtol(optarg, &cp, 10);
185 if (copy_buffer_len == 0 || *cp != '\0')
186 fatal("Invalid buffer size \"%s\"", optarg);
187 break;
c25d3df7 188 case 'R':
189 num_requests = strtol(optarg, &cp, 10);
190 if (num_requests == 0 || *cp != '\0')
762715ce 191 fatal("Invalid number of requests \"%s\"",
c25d3df7 192 optarg);
193 break;
0426a3b4 194 case 'h':
195 default:
61e96248 196 usage();
197 }
198 }
199
b69145c2 200 log_init(argv[0], ll, SYSLOG_FACILITY_USER, 1);
201
a96fd7c2 202 if (sftp_direct == NULL) {
203 if (optind == argc || argc > (optind + 2))
204 usage();
61e96248 205
a96fd7c2 206 userhost = xstrdup(argv[optind]);
207 file2 = argv[optind+1];
edeeab1e 208
a96fd7c2 209 if ((cp = colon(userhost)) != NULL) {
210 *cp++ = '\0';
211 file1 = cp;
212 }
0426a3b4 213
15748b4d 214 if ((host = strrchr(userhost, '@')) == NULL)
a96fd7c2 215 host = userhost;
216 else {
217 *host++ = '\0';
218 if (!userhost[0]) {
219 fprintf(stderr, "Missing username\n");
220 usage();
221 }
222 addargs(&args, "-l%s",userhost);
61e96248 223 }
61e96248 224
a96fd7c2 225 host = cleanhostname(host);
226 if (!*host) {
227 fprintf(stderr, "Missing hostname\n");
228 usage();
229 }
61e96248 230
a96fd7c2 231 addargs(&args, "-oProtocol %d", sshver);
8a624ebf 232
a96fd7c2 233 /* no subsystem if the server-spec contains a '/' */
234 if (sftp_server == NULL || strchr(sftp_server, '/') == NULL)
235 addargs(&args, "-s");
61e96248 236
a96fd7c2 237 addargs(&args, "%s", host);
762715ce 238 addargs(&args, "%s", (sftp_server != NULL ?
a96fd7c2 239 sftp_server : "sftp"));
240 args.list[0] = ssh_program;
61e96248 241
a96fd7c2 242 fprintf(stderr, "Connecting to %s...\n", host);
1b558925 243 connect_to_server(ssh_program, args.list, &in, &out);
a96fd7c2 244 } else {
245 args.list = NULL;
246 addargs(&args, "sftp-server");
61e96248 247
a96fd7c2 248 fprintf(stderr, "Attaching to %s...\n", sftp_direct);
1b558925 249 connect_to_server(sftp_direct, args.list, &in, &out);
a96fd7c2 250 }
61e96248 251
9a36208d 252 err = interactive_loop(in, out, file1, file2);
61e96248 253
51fb577a 254#if !defined(USE_PIPES)
875ec275 255 shutdown(in, SHUT_RDWR);
256 shutdown(out, SHUT_RDWR);
51fb577a 257#endif
258
61e96248 259 close(in);
260 close(out);
a5ec8a3d 261 if (infile != stdin)
262 fclose(infile);
61e96248 263
8c38e88b 264 while (waitpid(sshpid, NULL, 0) == -1)
265 if (errno != EINTR)
266 fatal("Couldn't wait for ssh process: %s",
267 strerror(errno));
61e96248 268
9a36208d 269 exit(err == 0 ? 0 : 1);
61e96248 270}
This page took 0.317183 seconds and 5 git commands to generate.