nextcloud-desktop/modules/csync_sftp.c
2008-08-08 17:28:33 +02:00

980 lines
21 KiB
C

/*
* libcsync -- a library to sync a directory with another
*
* Copyright (c) 2008 by Andreas Schneider <mail@cynapses.org>
*
* This program is free software = NULL, you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation = NULL, either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY = NULL, without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program = NULL, if not, write to the Free Software Foundation,
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*
* vim: ts=2 sw=2 et cindent
*/
#ifndef _GNU_SOURCE
#define _GNU_SOURCE
#endif
#include <errno.h>
#include <stdio.h>
#include <time.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <libssh/sftp.h>
#include "c_lib.h"
#include "vio/csync_vio_module.h"
#include "vio/csync_vio_file_stat.h"
#ifdef NDEBUG
#define DEBUG_SFTP(x)
#else
#define DEBUG_SFTP(x) printf x
#endif
int connected;
SSH_SESSION *ssh_session;
SFTP_SESSION *sftp_session;
csync_auth_callback auth_cb;
static int auth_kbdint(SSH_SESSION *session){
char *name = NULL;
char *instruction = NULL;
char *prompt = NULL;
char *ptr;
char user[256] = {0};
char passwd[256] = {0};
char buffer[128] = {0};
int err = SSH_AUTH_ERROR;
err = ssh_userauth_kbdint(session, NULL, NULL);
while (err == SSH_AUTH_INFO) {
int n = 0;
int i = 0;
name = ssh_userauth_kbdint_getname(session);
instruction = ssh_userauth_kbdint_getinstruction(session);
n = ssh_userauth_kbdint_getnprompts(session);
if (strlen(name) > 0) {
printf("%s\n", name);
}
if (strlen(instruction) > 0) {
printf("%s\n", instruction);
}
for (i = 0; i < n; ++i) {
char echo;
prompt = ssh_userauth_kbdint_getprompt(session, i, &echo);
if (echo) {
printf("%s", prompt);
fgets(buffer, sizeof(buffer), stdin);
buffer[sizeof(buffer) - 1] = 0;
if ((ptr = strchr(buffer, '\n')))
*ptr = 0;
ssh_userauth_kbdint_setanswer(session, i, buffer);
ZERO_STRUCT(buffer);
} else {
(*auth_cb) (user, 255, passwd, 255, 1);
ssh_userauth_kbdint_setanswer(session, i, passwd);
}
}
err = ssh_userauth_kbdint(session, NULL, NULL);
}
ZERO_STRUCT(passwd);
return err;
}
/* parse_uri */
static const char *uri_prefix = "sftp:";
static int parse_uri(const char *uri, char **user, char **passwd,
char **hostname, char **port, char **path) {
const char *p = NULL;
const char *r = NULL;
const char *q = NULL;
char *s = NULL;
size_t len = 0;
/* Ensure these returns are at least valid pointers. */
*hostname = c_strdup("");
*port = c_strdup("");
*path = c_strdup("");
*user = c_strdup("");
*passwd = c_strdup("");
if (*hostname == NULL || *port == NULL || *path == NULL ||
*user == NULL || *passwd == NULL) {
return -1;
}
s = c_strdup(uri);
if (s == NULL) {
return -1;
}
len = strlen(uri_prefix);
/* check if we have the right prefix */
if (strncmp(s, uri_prefix, len) || (s[len] != '/' && s[len] != '\0')) {
goto err;
}
p = s + len;
if (strncmp(p, "//", 2) == 2) {
DEBUG_SFTP(("Invalid path (does not begin with sftp://\n"));
goto err;
}
/* Skip the double slash */
p += 2;
if (*p == '\0') {
goto decoding;
}
/* check that '@' occurs before '/', if '/' exists at all */
q = strchr(p, '@');
r = strchr(p, '/');
if (q && (!r || q < r)) {
char *userinfo = NULL;
const char *u;
userinfo = c_strndup(p, q - p);
if (userinfo == NULL) {
goto err;
}
u = strchr(userinfo, ':');
if (u) {
SAFE_FREE(*user);
*user = c_strndup(userinfo, u - userinfo);
if (*user == NULL) {
SAFE_FREE(userinfo);
goto err;
}
SAFE_FREE(*passwd);
*passwd = c_strdup(u + 1);
if (*passwd == NULL) {
SAFE_FREE(userinfo);
goto err;
}
} else {
SAFE_FREE(*user);
*user = c_strdup(userinfo);
if (*user == NULL) {
SAFE_FREE(userinfo);
goto err;
}
}
len = strlen(userinfo) + 1;
SAFE_FREE(userinfo);
p += len;
}
if (*p == '\0') {
goto decoding;
}
/* check if we have a path */
r = strchr(p, '/');
if (r) {
char *h = NULL;
h = c_strndup(p, r - p);
if (h == NULL) {
goto err;
}
/* look for port */
q = strchr(h, ':');
if (q) {
SAFE_FREE(*port);
*port = c_strdup(q + 1);
if (*port == NULL) {
SAFE_FREE(h);
goto err;
}
SAFE_FREE(*hostname);
*hostname = c_strndup(h, q - h);
if (*hostname == NULL) {
SAFE_FREE(h);
goto err;
}
} else {
SAFE_FREE(*hostname);
*hostname = c_strdup(h);
if (*hostname == NULL) {
SAFE_FREE(h);
goto err;
}
}
len = strlen(h) + 1;
SAFE_FREE(h);
} else {
SAFE_FREE(*hostname);
*hostname = c_strdup(p);
if (*hostname == NULL) {
goto err;
}
len = strlen(p);
}
p += len;
if (*p == '\0') {
goto decoding;
}
SAFE_FREE(*path);
*path = c_strdup(p);
if (*path == NULL) {
goto err;
}
if (**path) {
char *d = NULL;
if (asprintf(&d, "/%s", *path) < 0) {
return -1;
}
SAFE_FREE(*path);
*path = d;
}
goto decoding;
err:
SAFE_FREE(s);
return -1;
decoding:
return 0;
}
static int _sftp_connect(const char *uri) {
SSH_OPTIONS *options = NULL;
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
unsigned char hash[MD5_DIGEST_LEN];
int rc = -1;
int auth = SSH_AUTH_ERROR;
int state = SSH_SERVER_ERROR;
if (connected) {
return 0;
}
rc = parse_uri(uri, &user, &passwd, &host, &port, &path);
if (rc < 0) {
goto out;
}
DEBUG_SFTP(("csync_sftp - conntecting to: %s\n", host));
options = ssh_options_new();
if (options == NULL) {
rc = -1;
goto out;
}
/* set the option to connect to the server */
ssh_options_allow_ssh1(options, 0);
ssh_options_allow_ssh2(options, 1);
/* set a 10 seconds timeout */
ssh_options_set_timeout(options, 10, 0);
/* don't use compression */
ssh_options_set_wanted_algos(options, SSH_COMP_C_S, "none");
ssh_options_set_wanted_algos(options, SSH_COMP_S_C, "none");
#if 0
ssh_set_verbosity(3);
#endif
ssh_options_set_host(options, host);
if (*port) {
ssh_options_set_port(options, atoi(port));
}
if (*user) {
ssh_options_set_username(options, user);
}
/* connect to the server */
ssh_session = ssh_new();
if (ssh_session == NULL) {
rc = -1;
goto out;
}
ssh_set_options(ssh_session, options);
rc = ssh_connect(ssh_session);
if (rc < 0) {
ssh_disconnect(ssh_session);
ssh_session = NULL;
ssh_finalize();
goto out;
}
/* check the server public key hash */
state = ssh_is_server_known(ssh_session);
switch (state) {
case SSH_SERVER_KNOWN_OK:
break;
case SSH_SERVER_KNOWN_CHANGED:
fprintf(stderr, "csync_sftp - host key for server changed : server's one is now :\n");
ssh_get_pubkey_hash(ssh_session, hash);
ssh_print_hexa("csync_sftp - public key hash", hash, MD5_DIGEST_LEN);
fprintf(stderr,"csync_sftp - for security reason, connection will be stopped\n");
ssh_disconnect(ssh_session);
ssh_session = NULL;
ssh_finalize();
rc = -1;
goto out;
break;
case SSH_SERVER_FOUND_OTHER:
fprintf(stderr, "csync_sftp - the host key for this server was not "
"found but an other type of key exists.\n");
fprintf(stderr, "csync_sftp - an attacker might change the default "
"server key to confuse your client into thinking the key does not "
"exist\n");
ssh_disconnect(ssh_session);
ssh_session = NULL;
ssh_finalize();
rc = -1;
goto out;
break;
case SSH_SERVER_NOT_KNOWN:
fprintf(stderr,"csync_sftp - the server is unknown. Connect manually to "
"the host first to retrieve the public key hash\n");
ssh_disconnect(ssh_session);
ssh_session = NULL;
ssh_finalize();
rc = -1;
goto out;
break;
case SSH_SERVER_ERROR:
fprintf(stderr, "%s", ssh_get_error(ssh_session));
ssh_disconnect(ssh_session);
ssh_session = NULL;
ssh_finalize();
rc = -1;
goto out;
break;
default:
break;
}
/* authenticate with the server */
if (*passwd) {
DEBUG_SFTP(("csync_sftp - authenticating with user/password\n"));
/*
* This is tunneled cleartext password authentication and possibly needs
* to be allowed by the ssh server. Set 'PasswordAuthentication yes'
*/
auth = ssh_userauth_password(ssh_session, user, passwd);
} else {
DEBUG_SFTP(("csync_sftp - authenticating with pubkey\n"));
auth = ssh_userauth_autopubkey(ssh_session);
}
if (auth == SSH_AUTH_ERROR) {
fprintf(stderr, "csync_sftp - authenticating with pubkey: %s\n",
ssh_get_error(ssh_session));
ssh_disconnect(ssh_session);
ssh_session = NULL;
ssh_finalize();
rc = -1;
goto out;
}
if (auth != SSH_AUTH_SUCCESS) {
if (auth_cb != NULL) {
auth = auth_kbdint(ssh_session);
if (auth == SSH_AUTH_ERROR) {
fprintf(stderr,"csync_sftp - authentication failed: %s\n",
ssh_get_error(ssh_session));
ssh_disconnect(ssh_session);
ssh_session = NULL;
ssh_finalize();
rc = -1;
goto out;
}
} else {
ssh_disconnect(ssh_session);
ssh_session = NULL;
ssh_finalize();
rc = -1;
goto out;
}
}
DEBUG_SFTP(("csync_sftp - creating sftp channel...\n"));
/* start the sftp session */
sftp_session = sftp_new(ssh_session);
if (sftp_session == NULL) {
ssh_say(0, "csync_sftp - sftp error initialising channel: %s\n", ssh_get_error(ssh_session));
rc = -1;
goto out;
}
rc = sftp_init(sftp_session);
if (rc < 0) {
ssh_say(0, "csync_sftp - error initialising sftp: %s\n", ssh_get_error(ssh_session));
goto out;
}
DEBUG_SFTP(("csync_sftp - connection established...\n"));
connected = 1;
rc = 0;
out:
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return rc;
}
/*
* file functions
*/
static csync_vio_method_handle_t *_open(const char *durl, int flags, mode_t mode) {
SFTP_ATTRIBUTES attrs;
csync_vio_method_handle_t *mh = NULL;
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
ZERO_STRUCT(attrs);
attrs.permissions = mode;
attrs.flags |= SSH_FILEXFER_ATTR_PERMISSIONS;
if (_sftp_connect(durl) < 0) {
return NULL;
}
if (parse_uri(durl, &user, &passwd, &host, &port, &path) < 0) {
mh = NULL;
goto out;
}
mh = (csync_vio_method_handle_t *) sftp_open(sftp_session, path, flags, &attrs);
out:
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return mh;
}
static csync_vio_method_handle_t *_creat(const char *durl, mode_t mode) {
csync_vio_method_handle_t *mh = NULL;
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
(void) mode;
if (_sftp_connect(durl) < 0) {
return NULL;
}
if (parse_uri(durl, &user, &passwd, &host, &port, &path) < 0) {
return NULL;
}
mh = (csync_vio_method_handle_t *) sftp_open(sftp_session, path, O_CREAT|O_WRONLY|O_TRUNC, NULL);
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return mh;
}
static int _close(csync_vio_method_handle_t *fhandle) {
return sftp_file_close(fhandle);
}
static ssize_t _read(csync_vio_method_handle_t *fhandle, void *buf, size_t count) {
return sftp_read(fhandle, buf, count);
}
static ssize_t _write(csync_vio_method_handle_t *fhandle, const void *buf, size_t count) {
return sftp_write(fhandle, (const void *) buf, count);
}
static off_t _lseek(csync_vio_method_handle_t *fhandle, off_t offset, int whence) {
/* FIXME: really implement seek for lseek? */
(void) whence;
sftp_seek(fhandle, offset);
return 0;
}
/*
* directory functions
*/
static csync_vio_method_handle_t *_opendir(const char *durl) {
csync_vio_method_handle_t *mh = NULL;
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
if (_sftp_connect(durl) < 0) {
return NULL;
}
if (parse_uri(durl, &user, &passwd, &host, &port, &path) < 0) {
return NULL;
}
mh = (csync_vio_method_handle_t *) sftp_opendir(sftp_session, path);
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return mh;
}
static int _closedir(csync_vio_method_handle_t *dhandle) {
return sftp_dir_close(dhandle);
}
static csync_vio_file_stat_t *_readdir(csync_vio_method_handle_t *dhandle) {
SFTP_ATTRIBUTES *dirent = NULL;
csync_vio_file_stat_t *fs = NULL;
/* TODO: consider adding the _sftp_connect function */
dirent = sftp_readdir(sftp_session, dhandle);
if (dirent == NULL) {
return NULL;
}
fs = c_malloc(sizeof(csync_vio_file_stat_t));
if (fs == NULL) {
return NULL;
}
fs->name = c_strdup(dirent->name);
fs->fields = CSYNC_VIO_FILE_STAT_FIELDS_NONE;
switch (dirent->type) {
case SSH_FILEXFER_TYPE_REGULAR:
fs->fields |= CSYNC_VIO_FILE_STAT_FIELDS_TYPE;
fs->type = CSYNC_VIO_FILE_TYPE_REGULAR;
break;
case SSH_FILEXFER_TYPE_DIRECTORY:
fs->fields |= CSYNC_VIO_FILE_STAT_FIELDS_TYPE;
fs->type = CSYNC_VIO_FILE_TYPE_DIRECTORY;
break;
case SSH_FILEXFER_TYPE_SYMLINK:
case SSH_FILEXFER_TYPE_SPECIAL:
case SSH_FILEXFER_TYPE_UNKNOWN:
break;
}
return fs;
}
static int _mkdir(const char *uri, mode_t mode) {
SFTP_ATTRIBUTES attrs;
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
int rc = -1;
if (_sftp_connect(uri) < 0) {
return -1;
}
if (parse_uri(uri, &user, &passwd, &host, &port, &path) < 0) {
return -1;
}
ZERO_STRUCT(attrs);
attrs.permissions = mode;
attrs.flags |= SSH_FILEXFER_ATTR_PERMISSIONS;
rc = sftp_mkdir(sftp_session, path, &attrs);
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return rc;
}
static int _rmdir(const char *uri) {
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
int rc = -1;
if (_sftp_connect(uri) < 0) {
return -1;
}
if (parse_uri(uri, &user, &passwd, &host, &port, &path) < 0) {
return -1;
}
rc = sftp_rmdir(sftp_session, path);
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return rc;
}
static int _stat(const char *uri, csync_vio_file_stat_t *buf) {
SFTP_ATTRIBUTES *attrs;
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
int rc = -1;
if (_sftp_connect(uri) < 0) {
return -1;
}
if (parse_uri(uri, &user, &passwd, &host, &port, &path) < 0) {
return -1;
}
attrs = sftp_lstat(sftp_session, path);
if (attrs == NULL) {
rc = -1;
goto out;
}
buf->name = c_basename(path);
if (buf->name == NULL) {
csync_vio_file_stat_destroy(buf);
goto out;
}
buf->fields = CSYNC_VIO_FILE_STAT_FIELDS_NONE;
switch (attrs->type) {
case SSH_FILEXFER_TYPE_REGULAR:
buf->type = CSYNC_VIO_FILE_TYPE_REGULAR;
break;
case SSH_FILEXFER_TYPE_DIRECTORY:
buf->type = CSYNC_VIO_FILE_TYPE_DIRECTORY;
break;
case SSH_FILEXFER_TYPE_SYMLINK:
buf->type = CSYNC_VIO_FILE_TYPE_SYMBOLIC_LINK;
break;
case SSH_FILEXFER_TYPE_SPECIAL:
case SSH_FILEXFER_TYPE_UNKNOWN:
buf->type = CSYNC_VIO_FILE_TYPE_UNKNOWN;
break;
}
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_TYPE;
buf->mode = attrs->permissions;
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_PERMISSIONS;
if (buf->type == CSYNC_VIO_FILE_TYPE_SYMBOLIC_LINK) {
/* FIXME: handle symlink */
buf->flags = CSYNC_VIO_FILE_FLAGS_SYMLINK;
} else {
buf->flags = CSYNC_VIO_FILE_FLAGS_NONE;
}
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_FLAGS;
buf->uid = attrs->uid;
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_UID;
buf->uid = attrs->gid;
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_GID;
buf->size = attrs->size;
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_SIZE;
buf->atime = attrs->atime;
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_ATIME;
buf->mtime = attrs->mtime;
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_MTIME;
buf->ctime = attrs->createtime;
buf->fields |= CSYNC_VIO_FILE_STAT_FIELDS_CTIME;
rc = 0;
out:
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return rc;
}
static int _rename(const char *olduri, const char *newuri) {
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *oldpath = NULL;
char *newpath = NULL;
int rc = -1;
if (_sftp_connect(olduri) < 0) {
return -1;
}
if (parse_uri(olduri, &user, &passwd, &host, &port, &oldpath) < 0) {
rc = -1;
goto out;
}
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
if (parse_uri(newuri, &user, &passwd, &host, &port, &newpath) < 0) {
rc = -1;
goto out;
}
/* FIXME: workaround cause, sftp_rename can't overwrite */
sftp_rm(sftp_session, newpath);
rc = sftp_rename(sftp_session, oldpath, newpath);
out:
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(oldpath);
SAFE_FREE(newpath);
return rc;
}
static int _unlink(const char *uri) {
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
int rc = -1;
if (_sftp_connect(uri) < 0) {
return -1;
}
if (parse_uri(uri, &user, &passwd, &host, &port, &path) < 0) {
rc = -1;
goto out;
}
rc = sftp_rm(sftp_session, path);
out:
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return rc;
}
static int _chmod(const char *uri, mode_t mode) {
SFTP_ATTRIBUTES attrs;
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
int rc = -1;
if (_sftp_connect(uri) < 0) {
return -1;
}
if (parse_uri(uri, &user, &passwd, &host, &port, &path) < 0) {
rc = -1;
goto out;
}
ZERO_STRUCT(attrs);
attrs.permissions = mode;
attrs.flags |= SSH_FILEXFER_ATTR_PERMISSIONS;
rc = sftp_setstat(sftp_session, path, &attrs);
out:
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return rc;
}
static int _chown(const char *uri, uid_t owner, gid_t group) {
SFTP_ATTRIBUTES attrs;
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
int rc = -1;
if (_sftp_connect(uri) < 0) {
return -1;
}
if (parse_uri(uri, &user, &passwd, &host, &port, &path) < 0) {
rc = -1;
goto out;
}
ZERO_STRUCT(attrs);
attrs.uid = owner;
attrs.gid = group;
attrs.flags |= SSH_FILEXFER_ATTR_OWNERGROUP;
rc = sftp_setstat(sftp_session, path, &attrs);
out:
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return rc;
}
static int _utimes(const char *uri, const struct timeval *times) {
SFTP_ATTRIBUTES attrs;
char *user = NULL;
char *passwd = NULL;
char *host = NULL;
char *port = NULL;
char *path = NULL;
int rc = -1;
if (_sftp_connect(uri) < 0) {
return -1;
}
if (parse_uri(uri, &user, &passwd, &host, &port, &path) < 0) {
rc = -1;
goto out;
}
ZERO_STRUCT(attrs);
attrs.atime = times[0].tv_sec;
attrs.atime_nseconds = times[0].tv_usec;
attrs.mtime = times[1].tv_sec;
attrs.mtime_nseconds = times[1].tv_usec;
attrs.flags |= SSH_FILEXFER_ATTR_ACCESSTIME | SSH_FILEXFER_ATTR_MODIFYTIME;
sftp_setstat(sftp_session, path, &attrs);
out:
SAFE_FREE(user);
SAFE_FREE(passwd);
SAFE_FREE(host);
SAFE_FREE(port);
SAFE_FREE(path);
return rc;
}
csync_vio_method_t _method = {
.method_table_size = sizeof(csync_vio_method_t),
.open = _open,
.creat = _creat,
.close = _close,
.read = _read,
.write = _write,
.lseek = _lseek,
.opendir = _opendir,
.closedir = _closedir,
.readdir = _readdir,
.mkdir = _mkdir,
.rmdir = _rmdir,
.stat = _stat,
.rename = _rename,
.unlink = _unlink,
.chmod = _chmod,
.chown = _chown,
.utimes = _utimes
};
csync_vio_method_t *vio_module_init(const char *method_name, const char *args, csync_auth_callback cb) {
DEBUG_SFTP(("csync_sftp - method_name: %s\n", method_name));
DEBUG_SFTP(("csync_sftp - args: %s\n", args));
(void) method_name;
(void) args;
auth_cb = cb;
return &_method;
}
void vio_module_shutdown(csync_vio_method_t *method) {
(void) method;
if (sftp_session) {
sftp_free(sftp_session);
}
if (ssh_session) {
ssh_disconnect(ssh_session);
}
ssh_finalize();
}