diff --git a/CMakeLists.txt b/CMakeLists.txt index e399cc6a..e6069be8 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -1,209 +1,209 @@ cmake_minimum_required(VERSION 3.0) # KDE Applications Version, managed by release script set (RELEASE_SERVICE_VERSION_MAJOR "20") set (RELEASE_SERVICE_VERSION_MINOR "03") set (RELEASE_SERVICE_VERSION_MICRO "70") set (RELEASE_SERVICE_VERSION "${RELEASE_SERVICE_VERSION_MAJOR}.${RELEASE_SERVICE_VERSION_MINOR}.${RELEASE_SERVICE_VERSION_MICRO}") project(kio-extras VERSION ${RELEASE_SERVICE_VERSION}) include(FeatureSummary) set(QT_MIN_VERSION "5.11.0") -set(KF5_MIN_VERSION "5.64.0") +set(KF5_MIN_VERSION "5.66.0") find_package(Qt5 ${QT_MIN_VERSION} CONFIG REQUIRED COMPONENTS DBus Network Widgets Svg) find_package(Qt5Test ${QT_MIN_VERSION} CONFIG QUIET) set_package_properties(Qt5Test PROPERTIES PURPOSE "Required for tests" TYPE OPTIONAL ) add_feature_info("Qt5Test" Qt5Test_FOUND "Required for building tests") if (NOT Qt5Test_FOUND) set(BUILD_TESTING OFF CACHE BOOL "Build the testing tree.") endif() find_package(ECM ${KF5_MIN_VERSION} REQUIRED NO_MODULE) set(CMAKE_MODULE_PATH ${ECM_MODULE_PATH} "${CMAKE_CURRENT_SOURCE_DIR}/cmake") find_package(KF5 ${KF5_MIN_VERSION} REQUIRED COMPONENTS Archive Config ConfigWidgets CoreAddons DBusAddons DocTools DNSSD IconThemes I18n KIO Solid Bookmarks GuiAddons SyntaxHighlighting ) # As this is the check used for linkage, only require it in the same location... if (UNIX) find_package(KF5Pty ${KF5_MIN_VERSION} REQUIRED) endif() include(CheckIncludeFile) include(CMakePackageConfigHelpers) include(KDEInstallDirs) include(KDECMakeSettings) include(KDECompilerSettings NO_POLICY_SCOPE) include(ECMMarkNonGuiExecutable) include(ECMMarkAsTest) include(ECMOptionalAddSubdirectory) include(ECMQtDeclareLoggingCategory) add_definitions(-DQT_NO_URL_CAST_FROM_STRING) find_package(KF5Activities QUIET) set_package_properties(KF5Activities PROPERTIES PURPOSE "Provides the activities:/ kioslave and fileitem plugin." TYPE OPTIONAL ) find_package(Qt5Sql QUIET) set_package_properties(Qt5Sql PROPERTIES PURPOSE "Provides the activities:/ kioslave and fileitem plugin." TYPE OPTIONAL ) find_package(KF5ActivitiesStats 5.62 QUIET) set_package_properties(KF5ActivitiesStats PROPERTIES PURPOSE "Provides the recentlyused:/ kioslave." TYPE OPTIONAL ) find_package(Phonon4Qt5 4.6.60 NO_MODULE) set_package_properties(Phonon4Qt5 PROPERTIES DESCRIPTION "Qt-based audio library" PURPOSE "Required for the audio preview plugin" TYPE OPTIONAL) include_directories(${CMAKE_CURRENT_BINARY_DIR}) if(NOT WIN32) # we need a version of samba which has already smbc_set_context(), Alex set(SAMBA_REQUIRE_SMBC_SET_CONTEXT TRUE) set(SAMBA_REQUIRE_SMBC_OPTION_SET TRUE) find_package(Samba) set_package_properties(Samba PROPERTIES DESCRIPTION "the SMB client library, a version with smbc_set_context() and smbc_option_set()" URL "https://www.samba.org/" TYPE OPTIONAL PURPOSE "Needed to build the SMB kioslave" ) endif() find_package(libssh 0.7.0 MODULE) set_package_properties(libssh PROPERTIES DESCRIPTION "the SSH library with SFTP support" URL "https://www.libssh.org/" TYPE OPTIONAL PURPOSE "Needed to build the SFTP kioslave" ) find_package(Mtp) set_package_properties(Mtp PROPERTIES DESCRIPTION "the MTP library" URL "http://libmtp.sourceforge.net/" TYPE OPTIONAL PURPOSE "Needed to build the MTP kioslave" ) check_include_file(utime.h HAVE_UTIME_H) # ECM's KDECompilerSettings.cmake should take care of enabling supporting on # 32bit architectures. # Thorw a fatal error if off_t isn't >=64bit to ensure that large files are working # as expected. # BUG: 165449 if(UNIX) check_cxx_source_compiles(" #include /* Check that off_t can represent 2**63 - 1 correctly. We can't simply define LARGE_OFF_T to be 9223372036854775807, since some C++ compilers masquerading as C compilers incorrectly reject 9223372036854775807. */ #define LARGE_OFF_T (((off_t) 1 << 62) - 1 + ((off_t) 1 << 62)) int off_t_is_large[(LARGE_OFF_T % 2147483629 == 721 && LARGE_OFF_T % 2147483647 == 1) ? 1 : -1]; int main() { return 0; } " OFFT_IS_64BIT) if(NOT OFFT_IS_64BIT) message(FATAL_ERROR "Large file support is not enabled.") endif() find_package(Gperf) set_package_properties(Gperf PROPERTIES TYPE OPTIONAL PURPOSE "Needed to build the man kioslave" ) else() # FIXME: on windows we ignore support until trash gets integrated endif() add_subdirectory( doc ) add_subdirectory( about ) if(TARGET KF5::Activities AND TARGET Qt5::Sql) add_subdirectory( activities ) endif() if(KF5ActivitiesStats_FOUND) add_subdirectory( recentlyused ) endif() add_subdirectory( bookmarks ) add_subdirectory( filter ) if(Phonon4Qt5_FOUND) add_subdirectory( kfileaudiopreview ) endif() add_subdirectory( info ) add_subdirectory( archive ) if(NOT WIN32) add_subdirectory( network ) endif() add_subdirectory( recentdocuments ) if (NOT WIN32) # does not compile: fish.cpp(41): fatal error C1083: Cannot open include file: 'sys/resource.h': No such file or directory # Used for getting the resource limit for closing all child process FDs. Could be completely replaced by fcloseall() if available for Unix or _fcloseall() for Windows, either conditionally on Q_OS_type or using a configure test. add_subdirectory( fish ) endif() add_subdirectory( thumbnail ) add_subdirectory( docfilter ) if (libssh_FOUND) add_subdirectory(sftp) endif () add_subdirectory(settings) add_subdirectory( filenamesearch ) if (MTP_FOUND) add_subdirectory(mtp) endif() if(NOT WIN32) if(Gperf_FOUND) add_subdirectory( man ) endif() check_include_files(rpc/rpc.h HAVE_RPC_RPC_H) add_feature_info("NFS kioslave" HAVE_RPC_RPC_H "The RPC library is needed to build the NFS kioslave") if(HAVE_RPC_RPC_H) add_subdirectory( nfs ) endif() endif() # KDNSSD before 5.54 suffers from a race condition in avahi's dbus API and # ideally should not be used in ways that can deadlock a slave. if(${KF5DNSSD_FOUND} AND ${KF5DNSSD_VERSION} VERSION_GREATER "5.53") set(HAVE_KDNSSD_WITH_SIGNAL_RACE_PROTECTION TRUE) endif() if(SAMBA_FOUND) add_subdirectory(smb) endif() configure_file (config-runtime.h.cmake ${CMAKE_CURRENT_BINARY_DIR}/config-runtime.h ) install(FILES kio-extras.categories DESTINATION ${KDE_INSTALL_LOGGINGCATEGORIESDIR}) feature_summary(WHAT ALL INCLUDE_QUIET_PACKAGES FATAL_ON_MISSING_REQUIRED_PACKAGES) diff --git a/sftp/kio_sftp.cpp b/sftp/kio_sftp.cpp index 595d38d4..b9608d88 100644 --- a/sftp/kio_sftp.cpp +++ b/sftp/kio_sftp.cpp @@ -1,2667 +1,2695 @@ /* * Copyright (c) 2001 Lucas Fisher * Copyright (c) 2009 Andreas Schneider * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Library General Public * License (LGPL) as published by the Free Software Foundation; * either version 2 of the License, or (at your option) any later * version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Library General Public License for more details. * * You should have received a copy of the GNU Library General Public License * along with this library; see the file COPYING.LIB. If not, write to * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, * Boston, MA 02110-1301, USA. */ #include "kio_sftp.h" #include #include "kio_sftp_debug.h" #include "kio_sftp_trace_debug.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef Q_OS_WIN #include // for permissions using namespace std::experimental::filesystem; #include #else #include #endif #define KIO_SFTP_SPECIAL_TIMEOUT 30 // How big should each data packet be? Definitely not bigger than 64kb or // you will overflow the 2 byte size variable in a sftp packet. #define MAX_XFER_BUF_SIZE (60 * 1024) #define KSFTP_ISDIR(sb) (sb->type == SSH_FILEXFER_TYPE_DIRECTORY) using namespace KIO; extern "C" { int Q_DECL_EXPORT kdemain( int argc, char **argv ) { QCoreApplication app(argc, argv); app.setApplicationName("kio_sftp"); qCDebug(KIO_SFTP_LOG) << "*** Starting kio_sftp "; if (argc != 4) { qCDebug(KIO_SFTP_LOG) << "Usage: kio_sftp protocol domain-socket1 domain-socket2"; exit(-1); } sftpProtocol slave(argv[2], argv[3]); slave.dispatchLoop(); qCDebug(KIO_SFTP_LOG) << "*** kio_sftp Done"; return 0; } } // Converts SSH error into KIO error. Only must be called for error handling // as this will always return an error state and never NoError. static int toKIOError (const int err) { switch (err) { case SSH_FX_NO_SUCH_FILE: case SSH_FX_NO_SUCH_PATH: return KIO::ERR_DOES_NOT_EXIST; case SSH_FX_PERMISSION_DENIED: return KIO::ERR_ACCESS_DENIED; case SSH_FX_FILE_ALREADY_EXISTS: return KIO::ERR_FILE_ALREADY_EXIST; case SSH_FX_INVALID_HANDLE: return KIO::ERR_MALFORMED_URL; case SSH_FX_OP_UNSUPPORTED: return KIO::ERR_UNSUPPORTED_ACTION; case SSH_FX_BAD_MESSAGE: return KIO::ERR_UNKNOWN; default: return KIO::ERR_INTERNAL; } // We should not get here. When this function gets called we've // encountered an error on the libssh side, this needs to be mapped to *any* // KIO error. Not mapping is not an option at this point, even if the ssh err // is wrong or 'ok'. Q_UNREACHABLE(); return KIO::ERR_UNKNOWN; } // Writes 'len' bytes from 'buf' to the file handle 'fd'. static int writeToFile(int fd, const char *buf, size_t len) { while (len > 0) { ssize_t written = write(fd, buf, len); if (written >= 0) { buf += written; len -= written; continue; } switch(errno) { case EINTR: case EAGAIN: continue; case EPIPE: return ERR_CONNECTION_BROKEN; case ENOSPC: return ERR_DISK_FULL; default: return ERR_CANNOT_WRITE; } } return 0; } static int seekPos(int fd, KIO::fileoffset_t pos, int mode) { KIO::fileoffset_t offset = -1; while ((offset = QT_LSEEK(fd, pos, mode)) == EAGAIN); return offset; } static bool wasUsernameChanged(const QString& username, const KIO::AuthInfo& info) { QString loginName (username); // If username is empty, assume the current logged in username. Why ? // Because libssh's SSH_OPTIONS_USER will default to that when it is not // set and it won't be set unless the user explicitly typed a user user // name as part of the request URL. if (loginName.isEmpty()) { KUser u; loginName = u.loginName(); } return (loginName != info.username); } // The callback function for libssh static int auth_callback(const char *prompt, char *buf, size_t len, int echo, int verify, void *userdata) { if (userdata == nullptr) { return -1; } sftpProtocol *slave = (sftpProtocol *) userdata; if (slave->auth_callback(prompt, buf, len, echo, verify, userdata) < 0) { return -1; } return 0; } static void log_callback(int priority, const char *function, const char *buffer, void *userdata) { if (userdata == nullptr) { return; } sftpProtocol *slave = (sftpProtocol *) userdata; slave->log_callback(priority, function, buffer, userdata); } int sftpProtocol::auth_callback(const char *prompt, char *buf, size_t len, int echo, int verify, void *userdata) { // unused variables (void) echo; (void) verify; (void) userdata; QString errMsg; if (!mPublicKeyAuthInfo) { mPublicKeyAuthInfo = new KIO::AuthInfo; } else { errMsg = i18n("Incorrect or invalid passphrase"); } mPublicKeyAuthInfo->url.setScheme(QLatin1String("sftp")); mPublicKeyAuthInfo->url.setHost(mHost); if (mPort > 0 && mPort != DEFAULT_SFTP_PORT) { mPublicKeyAuthInfo->url.setPort(mPort); } mPublicKeyAuthInfo->url.setUserName(mUsername); QUrl u (mPublicKeyAuthInfo->url); u.setPath(QString()); mPublicKeyAuthInfo->comment = u.url(); mPublicKeyAuthInfo->readOnly = true; mPublicKeyAuthInfo->prompt = QString::fromUtf8(prompt); mPublicKeyAuthInfo->keepPassword = false; // don't save passwords for public key, // that's the task of ssh-agent. mPublicKeyAuthInfo->setExtraField(QLatin1String("hide-username-line"), true); mPublicKeyAuthInfo->setModified(false); qCDebug(KIO_SFTP_LOG) << "Entering authentication callback, prompt=" << mPublicKeyAuthInfo->prompt; if (openPasswordDialogV2(*mPublicKeyAuthInfo, errMsg) != 0) { qCDebug(KIO_SFTP_LOG) << "User canceled public key passpharse dialog"; return -1; } strncpy(buf, mPublicKeyAuthInfo->password.toUtf8().constData(), len - 1); mPublicKeyAuthInfo->password.fill('x'); mPublicKeyAuthInfo->password.clear(); return 0; } void sftpProtocol::log_callback(int priority, const char *function, const char *buffer, void *userdata) { (void) userdata; qCDebug(KIO_SFTP_LOG) << "[" << function << "] (" << priority << ") " << buffer; } void sftpProtocol::virtual_hook(int id, void *data) { switch(id) { case SlaveBase::GetFileSystemFreeSpace: { QUrl *url = static_cast(data); fileSystemFreeSpace(*url); } break; + case SlaveBase::Truncate: { + auto length = static_cast(data); + truncate(*length); + } break; default: SlaveBase::virtual_hook(id, data); } } int sftpProtocol::authenticateKeyboardInteractive(AuthInfo &info) { int err = ssh_userauth_kbdint(mSession, nullptr, nullptr); while (err == SSH_AUTH_INFO) { const QString name = QString::fromUtf8(ssh_userauth_kbdint_getname(mSession)); const QString instruction = QString::fromUtf8(ssh_userauth_kbdint_getinstruction(mSession)); const int n = ssh_userauth_kbdint_getnprompts(mSession); qCDebug(KIO_SFTP_LOG) << "name=" << name << " instruction=" << instruction << " prompts=" << n; for (int i = 0; i < n; ++i) { char echo; const char *answer = ""; const QString prompt = QString::fromUtf8(ssh_userauth_kbdint_getprompt(mSession, i, &echo)); qCDebug(KIO_SFTP_LOG) << "prompt=" << prompt << " echo=" << QString::number(echo); if (echo) { // See RFC4256 Section 3.3 User Interface KIO::AuthInfo infoKbdInt; infoKbdInt.url.setScheme("sftp"); infoKbdInt.url.setHost(mHost); if (mPort > 0 && mPort != DEFAULT_SFTP_PORT) { infoKbdInt.url.setPort(mPort); } if (!name.isEmpty()) { infoKbdInt.caption = QString(i18n("SFTP Login") + " - " + name); } else { infoKbdInt.caption = i18n("SFTP Login"); } infoKbdInt.comment = "sftp://" + mUsername + "@" + mHost; QString newPrompt; if (!instruction.isEmpty()) { newPrompt = instruction + "

"; } newPrompt.append(prompt); infoKbdInt.prompt = newPrompt; infoKbdInt.readOnly = false; infoKbdInt.keepPassword = false; if (openPasswordDialogV2(infoKbdInt, i18n("Use the username input field to answer this question.")) == 0) { qCDebug(KIO_SFTP_LOG) << "Got the answer from the password dialog"; answer = info.username.toUtf8().constData(); } if (ssh_userauth_kbdint_setanswer(mSession, i, answer) < 0) { qCDebug(KIO_SFTP_LOG) << "An error occurred setting the answer: " << ssh_get_error(mSession); return SSH_AUTH_ERROR; } break; } else { if (prompt.startsWith(QLatin1String("password:"), Qt::CaseInsensitive)) { info.prompt = i18n("Please enter your password."); } else { info.prompt = prompt; } info.comment = info.url.url(); info.commentLabel = i18n("Site:"); info.setExtraField(QLatin1String("hide-username-line"), true); if (openPasswordDialogV2(info) == 0) { qCDebug(KIO_SFTP_LOG) << "Got the answer from the password dialog"; answer = info.password.toUtf8().constData(); } if (ssh_userauth_kbdint_setanswer(mSession, i, answer) < 0) { qCDebug(KIO_SFTP_LOG) << "An error occurred setting the answer: " << ssh_get_error(mSession); return SSH_AUTH_ERROR; } } } err = ssh_userauth_kbdint(mSession, nullptr, nullptr); } return err; } void sftpProtocol::reportError(const QUrl &url, const int err) { qCDebug(KIO_SFTP_LOG) << "url = " << url << " - err=" << err; const int kioError = toKIOError(err); Q_ASSERT(kioError != 0); error(kioError, url.toDisplayString()); } bool sftpProtocol::createUDSEntry(const QString &filename, const QByteArray &path, UDSEntry &entry, short int details) { mode_t access; char *link; bool isBrokenLink = false; long long fileType = QT_STAT_REG; long long size = 0LL; Q_ASSERT(entry.count() == 0); sftp_attributes sb = sftp_lstat(mSftp, path.constData()); if (sb == nullptr) { return false; } entry.fastInsert(KIO::UDSEntry::UDS_NAME, filename); if (sb->type == SSH_FILEXFER_TYPE_SYMLINK) { link = sftp_readlink(mSftp, path.constData()); if (link == nullptr) { sftp_attributes_free(sb); return false; } entry.fastInsert(KIO::UDSEntry::UDS_LINK_DEST, QFile::decodeName(link)); free(link); // A symlink -> follow it only if details > 1 if (details > 1) { sftp_attributes sb2 = sftp_stat(mSftp, path.constData()); if (sb2 == nullptr) { isBrokenLink = true; } else { sftp_attributes_free(sb); sb = sb2; } } } if (isBrokenLink) { // It is a link pointing to nowhere fileType = QT_STAT_MASK - 1; #ifdef Q_OS_WIN access = static_cast(perms::owner_all | perms::group_all | perms::others_all); #else access = S_IRWXU | S_IRWXG | S_IRWXO; #endif size = 0LL; } else { switch (sb->type) { case SSH_FILEXFER_TYPE_REGULAR: fileType = QT_STAT_REG; break; case SSH_FILEXFER_TYPE_DIRECTORY: fileType = QT_STAT_DIR; break; case SSH_FILEXFER_TYPE_SYMLINK: fileType = QT_STAT_LNK; break; case SSH_FILEXFER_TYPE_SPECIAL: case SSH_FILEXFER_TYPE_UNKNOWN: fileType = QT_STAT_MASK - 1; break; } access = sb->permissions & 07777; size = sb->size; } entry.fastInsert(KIO::UDSEntry::UDS_FILE_TYPE, fileType); entry.fastInsert(KIO::UDSEntry::UDS_ACCESS, access); entry.fastInsert(KIO::UDSEntry::UDS_SIZE, size); if (details > 0) { if (sb->owner) { entry.fastInsert(KIO::UDSEntry::UDS_USER, QString::fromUtf8(sb->owner)); } else { entry.fastInsert(KIO::UDSEntry::UDS_USER, QString::number(sb->uid)); } if (sb->group) { entry.fastInsert(KIO::UDSEntry::UDS_GROUP, QString::fromUtf8(sb->group)); } else { entry.fastInsert(KIO::UDSEntry::UDS_GROUP, QString::number(sb->gid)); } entry.fastInsert(KIO::UDSEntry::UDS_ACCESS_TIME, sb->atime); entry.fastInsert(KIO::UDSEntry::UDS_MODIFICATION_TIME, sb->mtime); entry.fastInsert(KIO::UDSEntry::UDS_CREATION_TIME, sb->createtime); } sftp_attributes_free(sb); return true; } QString sftpProtocol::canonicalizePath(const QString &path) { qCDebug(KIO_SFTP_LOG) << "Path to canonicalize: " << path; QString cPath; char *sPath = nullptr; if (path.isEmpty()) { return cPath; } sPath = sftp_canonicalize_path(mSftp, path.toUtf8().constData()); if (sPath == nullptr) { qCDebug(KIO_SFTP_LOG) << "Could not canonicalize path: " << path; return cPath; } cPath = QFile::decodeName(sPath); ssh_string_free_char(sPath); qCDebug(KIO_SFTP_LOG) << "Canonicalized path: " << cPath; return cPath; } sftpProtocol::sftpProtocol(const QByteArray &pool_socket, const QByteArray &app_socket) : SlaveBase("kio_sftp", pool_socket, app_socket), mConnected(false), mPort(-1), mSession(nullptr), mSftp(nullptr), mPublicKeyAuthInfo(nullptr) { #ifndef Q_OS_WIN qCDebug(KIO_SFTP_LOG) << "pid = " << getpid(); qCDebug(KIO_SFTP_LOG) << "debug = " << getenv("KIO_SFTP_LOG_VERBOSITY"); #endif // Members are 'value initialized' to zero because of non-user defined ()! mCallbacks = new struct ssh_callbacks_struct(); if (mCallbacks == nullptr) { error(KIO::ERR_OUT_OF_MEMORY, i18n("Could not allocate callbacks")); return; } mCallbacks->userdata = this; mCallbacks->auth_function = ::auth_callback; ssh_callbacks_init(mCallbacks); bool ok; int level = qEnvironmentVariableIntValue("KIO_SFTP_LOG_VERBOSITY", &ok); if (ok) { int rc = ssh_set_log_level(level); if (rc != SSH_OK) { error(KIO::ERR_INTERNAL, i18n("Could not set log verbosity.")); return; } rc = ssh_set_log_userdata(this); if (rc != SSH_OK) { error(KIO::ERR_INTERNAL, i18n("Could not set log userdata.")); return; } rc = ssh_set_log_callback(::log_callback); if (rc != SSH_OK) { error(KIO::ERR_INTERNAL, i18n("Could not set log callback.")); return; } } } sftpProtocol::~sftpProtocol() { #ifndef Q_OS_WIN qCDebug(KIO_SFTP_LOG) << "pid = " << getpid(); #endif closeConnection(); delete mCallbacks; delete mPublicKeyAuthInfo; // for precaution /* cleanup and shut down cryto stuff */ ssh_finalize(); } void sftpProtocol::setHost(const QString& host, quint16 port, const QString& user, const QString& pass) { qCDebug(KIO_SFTP_LOG) << user << "@" << host << ":" << port; // Close connection if the request is to another server... if (host != mHost || port != mPort || user != mUsername || pass != mPassword) { closeConnection(); } mHost = host; mPort = port; mUsername = user; mPassword = pass; } bool sftpProtocol::sftpOpenConnection (const AuthInfo& info) { mSession = ssh_new(); if (mSession == nullptr) { error(KIO::ERR_OUT_OF_MEMORY, i18n("Could not create a new SSH session.")); return false; } long timeout_sec = 30, timeout_usec = 0; qCDebug(KIO_SFTP_LOG) << "Creating the SSH session and setting options"; // Set timeout int rc = ssh_options_set(mSession, SSH_OPTIONS_TIMEOUT, &timeout_sec); if (rc < 0) { error(KIO::ERR_INTERNAL, i18n("Could not set a timeout.")); return false; } rc = ssh_options_set(mSession, SSH_OPTIONS_TIMEOUT_USEC, &timeout_usec); if (rc < 0) { error(KIO::ERR_INTERNAL, i18n("Could not set a timeout.")); return false; } #if LIBSSH_VERSION_INT >= SSH_VERSION_INT(0, 8, 0) // Disable Nagle's Algorithm (TCP_NODELAY). Usually faster for sftp. bool nodelay = true; rc = ssh_options_set(mSession, SSH_OPTIONS_NODELAY, &nodelay); if (rc < 0) { error(KIO::ERR_INTERNAL, i18n("Could not disable Nagle's Algorithm.")); return false; } #endif // 0.8.0 // Don't use any compression rc = ssh_options_set(mSession, SSH_OPTIONS_COMPRESSION_C_S, "none"); if (rc < 0) { error(KIO::ERR_INTERNAL, i18n("Could not set compression.")); return false; } rc = ssh_options_set(mSession, SSH_OPTIONS_COMPRESSION_S_C, "none"); if (rc < 0) { error(KIO::ERR_INTERNAL, i18n("Could not set compression.")); return false; } // Set host and port rc = ssh_options_set(mSession, SSH_OPTIONS_HOST, mHost.toUtf8().constData()); if (rc < 0) { error(KIO::ERR_INTERNAL, i18n("Could not set host.")); return false; } if (mPort > 0) { rc = ssh_options_set(mSession, SSH_OPTIONS_PORT, &mPort); if (rc < 0) { error(KIO::ERR_INTERNAL, i18n("Could not set port.")); return false; } } // Set the username if (!info.username.isEmpty()) { rc = ssh_options_set(mSession, SSH_OPTIONS_USER, info.username.toUtf8().constData()); if (rc < 0) { error(KIO::ERR_INTERNAL, i18n("Could not set username.")); return false; } } // Read ~/.ssh/config rc = ssh_options_parse_config(mSession, nullptr); if (rc < 0) { error(KIO::ERR_INTERNAL, i18n("Could not parse the config file.")); return false; } ssh_set_callbacks(mSession, mCallbacks); qCDebug(KIO_SFTP_LOG) << "Trying to connect to the SSH server"; unsigned int effectivePort; if (mPort > 0) { effectivePort = mPort; } else { effectivePort = DEFAULT_SFTP_PORT; ssh_options_get_port(mSession, &effectivePort); } qCDebug(KIO_SFTP_LOG) << "username=" << mUsername << ", host=" << mHost << ", port=" << effectivePort; infoMessage(xi18n("Opening SFTP connection to host %1:%2", mHost, QString::number(effectivePort))); /* try to connect */ rc = ssh_connect(mSession); if (rc < 0) { error(KIO::ERR_SLAVE_DEFINED, QString::fromUtf8(ssh_get_error(mSession))); closeConnection(); return false; } return true; } #if LIBSSH_VERSION_INT >= SSH_VERSION_INT(0, 8, 3) void sftpProtocol::openConnection() { if (mConnected) { return; } if (mHost.isEmpty()) { qCDebug(KIO_SFTP_LOG) << "openConnection(): Need hostname..."; error(KIO::ERR_UNKNOWN_HOST, QString()); return; } AuthInfo info; info.url.setScheme("sftp"); info.url.setHost(mHost); if ( mPort > 0 && mPort != DEFAULT_SFTP_PORT ) { info.url.setPort(mPort); } info.url.setUserName(mUsername); info.username = mUsername; // Check for cached authentication info if no password is specified... if (mPassword.isEmpty()) { qCDebug(KIO_SFTP_LOG) << "checking cache: info.username =" << info.username << ", info.url =" << info.url.toDisplayString(); checkCachedAuthentication(info); } else { info.password = mPassword; } // Start the ssh connection. QString msg; // msg for dialog box QString caption; // dialog box caption unsigned char *hash = nullptr; // the server hash size_t hlen; ssh_key srv_pubkey = nullptr; const char *srv_pubkey_type = nullptr; char *fingerprint = nullptr; enum ssh_known_hosts_e state; int rc; // Attempt to start a ssh session and establish a connection with the server. if (!sftpOpenConnection(info)) { return; } qCDebug(KIO_SFTP_LOG) << "Getting the SSH server hash"; /* get the hash */ rc = ssh_get_server_publickey(mSession, &srv_pubkey); if (rc < 0) { error(KIO::ERR_SLAVE_DEFINED, QString::fromUtf8(ssh_get_error(mSession))); closeConnection(); return; } srv_pubkey_type = ssh_key_type_to_char(ssh_key_type(srv_pubkey)); if (srv_pubkey_type == nullptr) { ssh_key_free(srv_pubkey); error(KIO::ERR_SLAVE_DEFINED, i18n("Could not get server public key type name")); closeConnection(); return; } rc = ssh_get_publickey_hash(srv_pubkey, SSH_PUBLICKEY_HASH_SHA256, &hash, &hlen); ssh_key_free(srv_pubkey); if (rc != SSH_OK) { error(KIO::ERR_SLAVE_DEFINED, i18n("Could not create hash from server public key")); closeConnection(); return; } fingerprint = ssh_get_fingerprint_hash(SSH_PUBLICKEY_HASH_SHA256, hash, hlen); ssh_string_free_char((char *)hash); if (fingerprint == nullptr) { error(KIO::ERR_SLAVE_DEFINED, i18n("Could not create fingerprint for server public key")); closeConnection(); return; } qCDebug(KIO_SFTP_LOG) << "Checking if the SSH server is known"; /* check the server public key hash */ state = ssh_session_is_known_server(mSession); switch (state) { case SSH_KNOWN_HOSTS_OTHER: ssh_string_free_char(fingerprint); error(KIO::ERR_SLAVE_DEFINED, i18n("An %1 host key for this server was " "not found, but another type of key exists.\n" "An attacker might change the default server key to confuse your " "client into thinking the key does not exist.\n" "Please contact your system administrator.\n" "%2", QString::fromUtf8(srv_pubkey_type), QString::fromUtf8(ssh_get_error(mSession)))); closeConnection(); return; case SSH_KNOWN_HOSTS_CHANGED: error(KIO::ERR_SLAVE_DEFINED, i18n("The host key for the server %1 has changed.\n" "This could either mean that DNS SPOOFING is happening or the IP " "address for the host and its host key have changed at the same time.\n" "The fingerprint for the %2 key sent by the remote host is:\n" " SHA256:%3\n" "Please contact your system administrator.\n%4", mHost, QString::fromUtf8(srv_pubkey_type), QString::fromUtf8(fingerprint), QString::fromUtf8(ssh_get_error(mSession)))); ssh_string_free_char(fingerprint); closeConnection(); return; case SSH_KNOWN_HOSTS_NOT_FOUND: case SSH_KNOWN_HOSTS_UNKNOWN: caption = i18n("Warning: Cannot verify host's identity."); msg = i18n("The authenticity of host %1 cannot be established.\n" "The %2 key fingerprint is: %3\n" "Are you sure you want to continue connecting?", mHost, QString::fromUtf8(srv_pubkey_type), QString::fromUtf8(fingerprint)); ssh_string_free_char(fingerprint); if (KMessageBox::Yes != messageBox(WarningYesNo, msg, caption)) { closeConnection(); error(KIO::ERR_USER_CANCELED, QString()); return; } /* write the known_hosts file */ qCDebug(KIO_SFTP_LOG) << "Adding server to known_hosts file."; rc = ssh_session_update_known_hosts(mSession); if (rc != SSH_OK) { error(KIO::ERR_USER_CANCELED, QString::fromUtf8(ssh_get_error(mSession))); closeConnection(); return; } break; case SSH_KNOWN_HOSTS_ERROR: ssh_string_free_char(fingerprint); error(KIO::ERR_SLAVE_DEFINED, QString::fromUtf8(ssh_get_error(mSession))); return; case SSH_KNOWN_HOSTS_OK: break; } qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with the server"; // Try to login without authentication rc = ssh_userauth_none(mSession, nullptr); if (rc == SSH_AUTH_ERROR) { closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } // This NEEDS to be called after ssh_userauth_none() !!! int method = ssh_auth_list(mSession); if (rc != SSH_AUTH_SUCCESS && method == 0) { closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed. The server " "didn't send any authentication methods")); return; } // Try to authenticate with public key first if (rc != SSH_AUTH_SUCCESS && (method & SSH_AUTH_METHOD_PUBLICKEY)) { qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with public key"; for(;;) { rc = ssh_userauth_publickey_auto(mSession, nullptr, nullptr); if (rc == SSH_AUTH_ERROR) { qCDebug(KIO_SFTP_LOG) << "Public key authentication failed:" << QString::fromUtf8(ssh_get_error(mSession)); closeConnection(); clearPubKeyAuthInfo(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } else if (rc != SSH_AUTH_DENIED || !mPublicKeyAuthInfo || !mPublicKeyAuthInfo->isModified()) { clearPubKeyAuthInfo(); break; } } } // Try to authenticate with GSSAPI if (rc != SSH_AUTH_SUCCESS && (method & SSH_AUTH_METHOD_GSSAPI_MIC)) { qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with GSSAPI"; rc = ssh_userauth_gssapi(mSession); if (rc == SSH_AUTH_ERROR) { qCDebug(KIO_SFTP_LOG) << "Public key authentication failed:" << QString::fromUtf8(ssh_get_error(mSession)); closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } } // Try to authenticate with keyboard interactive if (rc != SSH_AUTH_SUCCESS && (method & SSH_AUTH_METHOD_INTERACTIVE)) { qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with keyboard interactive"; AuthInfo info2 (info); rc = authenticateKeyboardInteractive(info2); if (rc == SSH_AUTH_SUCCESS) { info = info2; } else if (rc == SSH_AUTH_ERROR) { qCDebug(KIO_SFTP_LOG) << "Keyboard interactive authentication failed:" << QString::fromUtf8(ssh_get_error(mSession)); closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } } // Try to authenticate with password if (rc != SSH_AUTH_SUCCESS && (method & SSH_AUTH_METHOD_PASSWORD)) { qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with password"; info.caption = i18n("SFTP Login"); info.prompt = i18n("Please enter your username and password."); info.comment = info.url.url(); info.commentLabel = i18n("Site:"); bool isFirstLoginAttempt = true; for(;;) { if (!isFirstLoginAttempt || info.password.isEmpty()) { info.keepPassword = true; // make the "keep Password" check box visible to the user. info.setModified(false); QString username (info.username); const QString errMsg(isFirstLoginAttempt ? QString() : i18n("Incorrect username or password")); qCDebug(KIO_SFTP_LOG) << "Username:" << username << "first attempt?" << isFirstLoginAttempt << "error:" << errMsg; // Handle user canceled or dialog failed to open... int errCode = openPasswordDialogV2(info, errMsg); if (errCode != 0) { qCDebug(KIO_SFTP_LOG) << "User canceled password/retry dialog"; closeConnection(); error(errCode, QString()); return; } // If the user name changes, we have to re-establish connection again // since the user name must always be set before calling ssh_connect. if (wasUsernameChanged(username, info)) { qCDebug(KIO_SFTP_LOG) << "Username changed to" << info.username; if (!info.url.userName().isEmpty()) { info.url.setUserName(info.username); } closeConnection(); if (!sftpOpenConnection(info)) { return; } } } rc = ssh_userauth_password(mSession, info.username.toUtf8().constData(), info.password.toUtf8().constData()); if (rc == SSH_AUTH_SUCCESS) { break; } else if (rc == SSH_AUTH_ERROR) { qCDebug(KIO_SFTP_LOG) << "Password authentication failed:" << QString::fromUtf8(ssh_get_error(mSession)); closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } isFirstLoginAttempt = false; // failed attempt to login. info.password.clear(); // clear the password after failed attempts. } } // If we're still not authenticated then we need to leave. if (rc != SSH_AUTH_SUCCESS) { error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } // start sftp session qCDebug(KIO_SFTP_LOG) << "Trying to request the sftp session"; mSftp = sftp_new(mSession); if (mSftp == nullptr) { closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Unable to request the SFTP subsystem. " "Make sure SFTP is enabled on the server.")); return; } qCDebug(KIO_SFTP_LOG) << "Trying to initialize the sftp session"; if (sftp_init(mSftp) < 0) { closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Could not initialize the SFTP session.")); return; } // Login succeeded! infoMessage(i18n("Successfully connected to %1", mHost)); if (info.keepPassword) { qCDebug(KIO_SFTP_LOG) << "Caching info.username = " << info.username << ", info.url = " << info.url.toDisplayString(); cacheAuthentication(info); } // Update the original username in case it was changed! if (!mUsername.isEmpty()) { mUsername = info.username; } setTimeoutSpecialCommand(KIO_SFTP_SPECIAL_TIMEOUT); mConnected = true; connected(); info.password.fill('x'); info.password.clear(); } #else // < 0.8.0 void sftpProtocol::openConnection() { if (mConnected) { return; } if (mHost.isEmpty()) { qCDebug(KIO_SFTP_LOG) << "openConnection(): Need hostname..."; error(KIO::ERR_UNKNOWN_HOST, QString()); return; } AuthInfo info; info.url.setScheme("sftp"); info.url.setHost(mHost); if ( mPort > 0 && mPort != DEFAULT_SFTP_PORT ) { info.url.setPort(mPort); } info.url.setUserName(mUsername); info.username = mUsername; // Check for cached authentication info if no password is specified... if (mPassword.isEmpty()) { qCDebug(KIO_SFTP_LOG) << "checking cache: info.username =" << info.username << ", info.url =" << info.url.toDisplayString(); checkCachedAuthentication(info); } else { info.password = mPassword; } // Start the ssh connection. QString msg; // msg for dialog box QString caption; // dialog box caption unsigned char *hash = nullptr; // the server hash ssh_key srv_pubkey; char *hexa; size_t hlen; int rc, state; // Attempt to start a ssh session and establish a connection with the server. if (!sftpOpenConnection(info)) { return; } qCDebug(KIO_SFTP_LOG) << "Getting the SSH server hash"; /* get the hash */ rc = ssh_get_publickey(mSession, &srv_pubkey); if (rc < 0) { error(KIO::ERR_SLAVE_DEFINED, QString::fromUtf8(ssh_get_error(mSession))); closeConnection(); return; } rc = ssh_get_publickey_hash(srv_pubkey, SSH_PUBLICKEY_HASH_SHA1, &hash, &hlen); ssh_key_free(srv_pubkey); if (rc < 0) { error(KIO::ERR_SLAVE_DEFINED, i18n("Could not create hash from server public key")); closeConnection(); return; } qCDebug(KIO_SFTP_LOG) << "Checking if the SSH server is known"; /* check the server public key hash */ state = ssh_is_server_known(mSession); switch (state) { case SSH_SERVER_KNOWN_OK: break; case SSH_SERVER_FOUND_OTHER: ssh_string_free_char((char *)hash); error(KIO::ERR_SLAVE_DEFINED, i18n("The host key for this server was " "not found, but another type of key exists.\n" "An attacker might change the default server key to confuse your " "client into thinking the key does not exist.\n" "Please contact your system administrator.\n%1", QString::fromUtf8(ssh_get_error(mSession)))); closeConnection(); return; case SSH_SERVER_KNOWN_CHANGED: hexa = ssh_get_hexa(hash, hlen); ssh_string_free_char((char *)hash); /* TODO print known_hosts file, port? */ error(KIO::ERR_SLAVE_DEFINED, i18n("The host key for the server %1 has changed.\n" "This could either mean that DNS SPOOFING is happening or the IP " "address for the host and its host key have changed at the same time.\n" "The fingerprint for the key sent by the remote host is:\n %2\n" "Please contact your system administrator.\n%3", mHost, QString::fromUtf8(hexa), QString::fromUtf8(ssh_get_error(mSession)))); ssh_string_free_char(hexa); closeConnection(); return; case SSH_SERVER_FILE_NOT_FOUND: case SSH_SERVER_NOT_KNOWN: hexa = ssh_get_hexa(hash, hlen); ssh_string_free_char((char *)hash); caption = i18n("Warning: Cannot verify host's identity."); msg = i18n("The authenticity of host %1 cannot be established.\n" "The key fingerprint is: %2\n" "Are you sure you want to continue connecting?", mHost, hexa); ssh_string_free_char(hexa); if (KMessageBox::Yes != messageBox(WarningYesNo, msg, caption)) { closeConnection(); error(KIO::ERR_USER_CANCELED, QString()); return; } /* write the known_hosts file */ qCDebug(KIO_SFTP_LOG) << "Adding server to known_hosts file."; if (ssh_write_knownhost(mSession) < 0) { error(KIO::ERR_USER_CANCELED, QString::fromUtf8(ssh_get_error(mSession))); closeConnection(); return; } break; case SSH_SERVER_ERROR: ssh_string_free_char((char *)hash); error(KIO::ERR_SLAVE_DEFINED, QString::fromUtf8(ssh_get_error(mSession))); return; } qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with the server"; // Try to login without authentication rc = ssh_userauth_none(mSession, nullptr); if (rc == SSH_AUTH_ERROR) { closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } // This NEEDS to be called after ssh_userauth_none() !!! int method = ssh_auth_list(mSession); if (rc != SSH_AUTH_SUCCESS && method == 0) { closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed. The server " "didn't send any authentication methods")); return; } // Try to authenticate with public key first if (rc != SSH_AUTH_SUCCESS && (method & SSH_AUTH_METHOD_PUBLICKEY)) { qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with public key"; for(;;) { rc = ssh_userauth_publickey_auto(mSession, nullptr, nullptr); if (rc == SSH_AUTH_ERROR) { qCDebug(KIO_SFTP_LOG) << "Public key authentication failed:" << QString::fromUtf8(ssh_get_error(mSession)); closeConnection(); clearPubKeyAuthInfo(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } else if (rc != SSH_AUTH_DENIED || !mPublicKeyAuthInfo || !mPublicKeyAuthInfo->isModified()) { clearPubKeyAuthInfo(); break; } } } // Try to authenticate with GSSAPI if (rc != SSH_AUTH_SUCCESS && (method & SSH_AUTH_METHOD_GSSAPI_MIC)) { qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with GSSAPI"; rc = ssh_userauth_gssapi(mSession); if (rc == SSH_AUTH_ERROR) { qCDebug(KIO_SFTP_LOG) << "Public key authentication failed:" << QString::fromUtf8(ssh_get_error(mSession)); closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } } // Try to authenticate with keyboard interactive if (rc != SSH_AUTH_SUCCESS && (method & SSH_AUTH_METHOD_INTERACTIVE)) { qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with keyboard interactive"; AuthInfo info2 (info); rc = authenticateKeyboardInteractive(info2); if (rc == SSH_AUTH_SUCCESS) { info = info2; } else if (rc == SSH_AUTH_ERROR) { qCDebug(KIO_SFTP_LOG) << "Keyboard interactive authentication failed:" << QString::fromUtf8(ssh_get_error(mSession)); closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } } // Try to authenticate with password if (rc != SSH_AUTH_SUCCESS && (method & SSH_AUTH_METHOD_PASSWORD)) { qCDebug(KIO_SFTP_LOG) << "Trying to authenticate with password"; info.caption = i18n("SFTP Login"); info.prompt = i18n("Please enter your username and password."); info.comment = info.url.url(); info.commentLabel = i18n("Site:"); bool isFirstLoginAttempt = true; for(;;) { if (!isFirstLoginAttempt || info.password.isEmpty()) { info.keepPassword = true; // make the "keep Password" check box visible to the user. info.setModified(false); QString username (info.username); const QString errMsg(isFirstLoginAttempt ? QString() : i18n("Incorrect username or password")); qCDebug(KIO_SFTP_LOG) << "Username:" << username << "first attempt?" << isFirstLoginAttempt << "error:" << errMsg; // Handle user canceled or dialog failed to open... int errCode = openPasswordDialogV2(info, errMsg); if (errCode != 0) { qCDebug(KIO_SFTP_LOG) << "User canceled password/retry dialog"; closeConnection(); error(errCode, QString()); return; } // If the user name changes, we have to restablish connection again // since the user name must always be set before calling ssh_connect. if (wasUsernameChanged(username, info)) { qCDebug(KIO_SFTP_LOG) << "Username changed to" << info.username; if (!info.url.userName().isEmpty()) { info.url.setUserName(info.username); } closeConnection(); if (!sftpOpenConnection(info)) { return; } } } rc = ssh_userauth_password(mSession, info.username.toUtf8().constData(), info.password.toUtf8().constData()); if (rc == SSH_AUTH_SUCCESS) { break; } else if (rc == SSH_AUTH_ERROR) { qCDebug(KIO_SFTP_LOG) << "Password authentication failed:" << QString::fromUtf8(ssh_get_error(mSession)); closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } isFirstLoginAttempt = false; // failed attempt to login. info.password.clear(); // clear the password after failed attempts. } } // If we're still not authenticated then we need to leave. if (rc != SSH_AUTH_SUCCESS) { error(KIO::ERR_CANNOT_LOGIN, i18n("Authentication failed.")); return; } // start sftp session qCDebug(KIO_SFTP_LOG) << "Trying to request the sftp session"; mSftp = sftp_new(mSession); if (mSftp == nullptr) { closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Unable to request the SFTP subsystem. " "Make sure SFTP is enabled on the server.")); return; } qCDebug(KIO_SFTP_LOG) << "Trying to initialize the sftp session"; if (sftp_init(mSftp) < 0) { closeConnection(); error(KIO::ERR_CANNOT_LOGIN, i18n("Could not initialize the SFTP session.")); return; } // Login succeeded! infoMessage(i18n("Successfully connected to %1", mHost)); if (info.keepPassword) { qCDebug(KIO_SFTP_LOG) << "Caching info.username = " << info.username << ", info.url = " << info.url.toDisplayString(); cacheAuthentication(info); } // Update the original username in case it was changed! if (!mUsername.isEmpty()) { mUsername = info.username; } setTimeoutSpecialCommand(KIO_SFTP_SPECIAL_TIMEOUT); mConnected = true; connected(); info.password.fill('x'); info.password.clear(); } #endif // 0.8.0 void sftpProtocol::closeConnection() { qCDebug(KIO_SFTP_LOG); if (mSftp) { sftp_free(mSftp); mSftp = nullptr; } if (mSession) { ssh_disconnect(mSession); ssh_free(mSession); mSession = nullptr; } mConnected = false; } void sftpProtocol::special(const QByteArray &) { int rc; qCDebug(KIO_SFTP_LOG) << "special(): polling"; if (!mSftp) { error(KIO::ERR_INTERNAL, i18n("Invalid sftp context")); return; } /* * ssh_channel_poll() returns the number of bytes that may be read on the * channel. It does so by checking the input buffer and eventually the * network socket for data to read. If the input buffer is not empty, it * will not probe the network (and such not read packets nor reply to * keepalives). * * As ssh_channel_poll can act on two specific buffers (a channel has two * different stream: stdio and stderr), polling for data on the stderr * stream has more chance of not being in the problematic case (data left * in the buffer). Checking the return value (for >0) would be a good idea * to debug the problem. */ rc = ssh_channel_poll(mSftp->channel, 0); if (rc > 0) { rc = ssh_channel_poll(mSftp->channel, 1); } if (rc < 0) { qCDebug(KIO_SFTP_LOG) << "ssh_channel_poll failed: " << ssh_get_error(mSession); } setTimeoutSpecialCommand(KIO_SFTP_SPECIAL_TIMEOUT); finished(); } void sftpProtocol::open(const QUrl &url, QIODevice::OpenMode mode) { qCDebug(KIO_SFTP_LOG) << "open: " << url; if (!sftpLogin()) { // sftpLogin finished() return; } const QString path = url.path(); const QByteArray path_c = path.toUtf8(); sftp_attributes sb = sftp_lstat(mSftp, path_c.constData()); if (sb == nullptr) { reportError(url, sftp_get_error(mSftp)); return; } switch (sb->type) { case SSH_FILEXFER_TYPE_DIRECTORY: error(KIO::ERR_IS_DIRECTORY, url.toDisplayString()); sftp_attributes_free(sb); return; case SSH_FILEXFER_TYPE_SPECIAL: case SSH_FILEXFER_TYPE_UNKNOWN: error(KIO::ERR_CANNOT_OPEN_FOR_READING, url.toDisplayString()); sftp_attributes_free(sb); return; case SSH_FILEXFER_TYPE_SYMLINK: case SSH_FILEXFER_TYPE_REGULAR: break; } KIO::filesize_t fileSize = sb->size; sftp_attributes_free(sb); int flags = 0; if (mode & QIODevice::ReadOnly) { if (mode & QIODevice::WriteOnly) { flags = O_RDWR | O_CREAT; } else { flags = O_RDONLY; } } else if (mode & QIODevice::WriteOnly) { flags = O_WRONLY | O_CREAT; } if (mode & QIODevice::Append) { flags |= O_APPEND; } else if (mode & QIODevice::Truncate) { flags |= O_TRUNC; } if (flags & O_CREAT) { mOpenFile = sftp_open(mSftp, path_c.constData(), flags, 0644); } else { mOpenFile = sftp_open(mSftp, path_c.constData(), flags, 0); } if (mOpenFile == nullptr) { error(KIO::ERR_CANNOT_OPEN_FOR_READING, path); return; } // Determine the mimetype of the file to be retrieved, and emit it. // This is mandatory in all slaves (for KRun/BrowserRun to work). // If we're not opening the file ReadOnly or ReadWrite, don't attempt to // read the file and send the mimetype. if (mode & QIODevice::ReadOnly) { size_t bytesRequested = 1024; ssize_t bytesRead = 0; QVarLengthArray buffer(bytesRequested); bytesRead = sftp_read(mOpenFile, buffer.data(), bytesRequested); if (bytesRead < 0) { error(KIO::ERR_CANNOT_READ, mOpenUrl.toDisplayString()); closeWithoutFinish(); return; } else { QByteArray fileData = QByteArray::fromRawData(buffer.data(), bytesRead); QMimeDatabase db; QMimeType mime = db.mimeTypeForFileNameAndData(mOpenUrl.fileName(), fileData); mimeType(mime.name()); // Go back to the beginning of the file. sftp_rewind(mOpenFile); } } mOpenUrl = url; openOffset = 0; totalSize(fileSize); position(0); opened(); } void sftpProtocol::read(KIO::filesize_t bytes) { qCDebug(KIO_SFTP_LOG) << "read, offset = " << openOffset << ", bytes = " << bytes; Q_ASSERT(mOpenFile != nullptr); QVarLengthArray buffer(bytes); ssize_t bytesRead = sftp_read(mOpenFile, buffer.data(), bytes); Q_ASSERT(bytesRead <= static_cast(bytes)); if (bytesRead < 0) { qCDebug(KIO_SFTP_LOG) << "Could not read " << mOpenUrl; error(KIO::ERR_CANNOT_READ, mOpenUrl.toDisplayString()); closeWithoutFinish(); return; } const QByteArray fileData = QByteArray::fromRawData(buffer.data(), bytesRead); data(fileData); } void sftpProtocol::write(const QByteArray &data) { qCDebug(KIO_SFTP_LOG) << "write, offset = " << openOffset << ", bytes = " << data.size(); Q_ASSERT(mOpenFile != nullptr); ssize_t bytesWritten = sftp_write(mOpenFile, data.data(), data.size()); if (bytesWritten < 0) { qCDebug(KIO_SFTP_LOG) << "Could not write to " << mOpenUrl; error(KIO::ERR_CANNOT_WRITE, mOpenUrl.toDisplayString()); closeWithoutFinish(); return; } written(bytesWritten); } void sftpProtocol::seek(KIO::filesize_t offset) { qCDebug(KIO_SFTP_LOG) << "seek, offset = " << offset; Q_ASSERT(mOpenFile != nullptr); if (sftp_seek64(mOpenFile, static_cast(offset)) < 0) { error(KIO::ERR_CANNOT_SEEK, mOpenUrl.path()); closeWithoutFinish(); return; } position(sftp_tell64(mOpenFile)); } +void sftpProtocol::truncate(KIO::filesize_t length) { + qCDebug(KIO_SFTP_LOG) << "truncate, length =" << length; + + Q_ASSERT(mOpenFile); + + int errorCode = 0; + sftp_attributes attr = sftp_fstat(mOpenFile); + if (attr) { + attr->size = length; + if (sftp_setstat(mSftp, mOpenUrl.path().toUtf8().constData(), attr) == 0) { + truncated(length); + } else { + errorCode = toKIOError(sftp_get_error(mSftp)); + } + sftp_attributes_free(attr); + } else { + errorCode = toKIOError(sftp_get_error(mSftp)); + } + + if (errorCode) { + error(errorCode == KIO::ERR_INTERNAL ? KIO::ERR_CANNOT_TRUNCATE : errorCode, mOpenUrl.path()); + closeWithoutFinish(); + } +} void sftpProtocol::close() { closeWithoutFinish(); finished(); } void sftpProtocol::get(const QUrl& url) { qCDebug(KIO_SFTP_LOG) << url; int errorCode = 0; const sftpProtocol::StatusCode cs = sftpGet(url, errorCode); // The call to sftpGet should only return server side errors since the file // descriptor parameter is set to -1. if (cs == sftpProtocol::ServerError && errorCode) { error(errorCode, url.toDisplayString()); return; } finished(); } sftpProtocol::StatusCode sftpProtocol::sftpGet(const QUrl& url, int& errorCode, KIO::fileoffset_t offset, int fd) { qCDebug(KIO_SFTP_LOG) << url; if (!sftpLogin()) { return sftpProtocol::ServerError; } QByteArray path = url.path().toUtf8(); sftp_file file = nullptr; KIO::filesize_t totalbytesread = 0; QByteArray filedata; sftp_attributes sb = sftp_lstat(mSftp, path.constData()); if (sb == nullptr) { errorCode = toKIOError(sftp_get_error(mSftp)); return sftpProtocol::ServerError; } switch (sb->type) { case SSH_FILEXFER_TYPE_DIRECTORY: errorCode = KIO::ERR_IS_DIRECTORY; sftp_attributes_free(sb); return sftpProtocol::ServerError; case SSH_FILEXFER_TYPE_SPECIAL: case SSH_FILEXFER_TYPE_UNKNOWN: errorCode = KIO::ERR_CANNOT_OPEN_FOR_READING; sftp_attributes_free(sb); return sftpProtocol::ServerError; case SSH_FILEXFER_TYPE_SYMLINK: case SSH_FILEXFER_TYPE_REGULAR: break; } // Open file file = sftp_open(mSftp, path.constData(), O_RDONLY, 0); if (file == nullptr) { errorCode = KIO::ERR_CANNOT_OPEN_FOR_READING; sftp_attributes_free(sb); return sftpProtocol::ServerError; } char mimeTypeBuf[1024]; ssize_t bytesread = sftp_read(file, mimeTypeBuf, sizeof(mimeTypeBuf)); if (bytesread < 0) { errorCode = KIO::ERR_CANNOT_READ; return sftpProtocol::ServerError; } else { QMimeDatabase db; QMimeType mime = db.mimeTypeForFileNameAndData(url.fileName(), QByteArray(mimeTypeBuf, bytesread)); if (!mime.isDefault()) { mimeType(mime.name()); } else { mime = db.mimeTypeForUrl(url); mimeType(mime.name()); } sftp_rewind(file); } // Set the total size totalSize(sb->size); // If offset is not specified, check the "resume" meta-data. if (offset < 0) { const QString resumeOffsetStr = metaData(QLatin1String("resume")); if (!resumeOffsetStr.isEmpty()) { bool ok; qlonglong resumeOffset = resumeOffsetStr.toLongLong(&ok); if (ok) { offset = resumeOffset; } } } // If we can resume, offset the buffer properly. if (offset > 0 && ((unsigned long long) offset < sb->size)) { if (sftp_seek64(file, offset) == 0) { canResume(); totalbytesread = offset; qCDebug(KIO_SFTP_LOG) << "Resume offset: " << QString::number(offset); } } bytesread = 0; sftpProtocol::GetRequest request(file, sb); for (;;) { // Enqueue get requests if (!request.enqueueChunks()) { errorCode = KIO::ERR_CANNOT_READ; return sftpProtocol::ServerError; } filedata.clear(); bytesread = request.readChunks(filedata); // Read pending get requests if (bytesread == -1) { errorCode = KIO::ERR_CANNOT_READ; return sftpProtocol::ServerError; } else if (bytesread == 0) { if (file->eof) break; else continue; } if (fd == -1) { data(filedata); } else if ((errorCode = writeToFile(fd, filedata.constData(), filedata.size())) != 0) { return sftpProtocol::ClientError; } // increment total bytes read totalbytesread += filedata.length(); processedSize(totalbytesread); } if (fd == -1) data(QByteArray()); processedSize(static_cast(sb->size)); return sftpProtocol::Success; } void sftpProtocol::put(const QUrl& url, int permissions, KIO::JobFlags flags) { qCDebug(KIO_SFTP_LOG) << url << ", permissions =" << permissions << ", overwrite =" << (flags & KIO::Overwrite) << ", resume =" << (flags & KIO::Resume); qCDebug(KIO_SFTP_LOG) << url; int errorCode = 0; const sftpProtocol::StatusCode cs = sftpPut(url, permissions, flags, errorCode); // The call to sftpPut should only return server side errors since the file // descriptor parameter is set to -1. if (cs == sftpProtocol::ServerError && errorCode) { error(errorCode, url.toDisplayString()); return; } finished(); } sftpProtocol::StatusCode sftpProtocol::sftpPut(const QUrl& url, int permissions, JobFlags flags, int& errorCode, int fd) { qCDebug(KIO_SFTP_LOG) << url << ", permissions =" << permissions << ", overwrite =" << (flags & KIO::Overwrite) << ", resume =" << (flags & KIO::Resume); if (!sftpLogin()) { return sftpProtocol::ServerError; } const QString dest_orig = url.path(); const QByteArray dest_orig_c = dest_orig.toUtf8(); const QString dest_part = dest_orig + ".part"; const QByteArray dest_part_c = dest_part.toUtf8(); uid_t owner = 0; gid_t group = 0; sftp_attributes sb = sftp_lstat(mSftp, dest_orig_c.constData()); const bool bOrigExists = (sb != nullptr); bool bPartExists = false; const bool bMarkPartial = configValue(QStringLiteral("MarkPartial"), true); // Don't change permissions of the original file if (bOrigExists) { permissions = sb->permissions; owner = sb->uid; group = sb->gid; } if (bMarkPartial) { sftp_attributes sbPart = sftp_lstat(mSftp, dest_part_c.constData()); bPartExists = (sbPart != nullptr); if (bPartExists && !(flags & KIO::Resume) && !(flags & KIO::Overwrite) && sbPart->size > 0 && sbPart->type == SSH_FILEXFER_TYPE_REGULAR) { if (fd == -1) { // Maybe we can use this partial file for resuming // Tell about the size we have, and the app will tell us // if it's ok to resume or not. qCDebug(KIO_SFTP_LOG) << "calling canResume with " << sbPart->size; flags |= canResume(sbPart->size) ? KIO::Resume : KIO::DefaultFlags; qCDebug(KIO_SFTP_LOG) << "put got answer " << (flags & KIO::Resume); } else { KIO::filesize_t pos = seekPos(fd, sbPart->size, SEEK_SET); if (pos != sbPart->size) { qCDebug(KIO_SFTP_LOG) << "Failed to seek to" << sbPart->size << "bytes in source file. Reason given" << strerror(errno); sftp_attributes_free(sb); sftp_attributes_free(sbPart); errorCode = ERR_CANNOT_SEEK; return sftpProtocol::ClientError; } flags |= KIO::Resume; } qCDebug(KIO_SFTP_LOG) << "Resuming at" << sbPart->size; sftp_attributes_free(sbPart); } } if (bOrigExists && !(flags & KIO::Overwrite) && !(flags & KIO::Resume)) { errorCode = KSFTP_ISDIR(sb) ? KIO::ERR_DIR_ALREADY_EXIST : KIO::ERR_FILE_ALREADY_EXIST; sftp_attributes_free(sb); return sftpProtocol::ServerError; } QByteArray dest; int result = -1; sftp_file file = nullptr; StatusCode cs = sftpProtocol::Success; KIO::fileoffset_t totalBytesSent = 0; // Loop until we got 0 (end of data) do { QByteArray buffer; if (fd == -1) { dataReq(); // Request for data result = readData(buffer); } else { char buf[MAX_XFER_BUF_SIZE]; // result = ::read(fd, buf, sizeof(buf)); if(result < 0) { errorCode = ERR_CANNOT_READ; cs = sftpProtocol::ClientError; break; } buffer = QByteArray(buf, result); } if (result >= 0) { if (dest.isEmpty()) { if (bMarkPartial) { qCDebug(KIO_SFTP_LOG) << "Appending .part extension to" << dest_orig; dest = dest_part_c; if (bPartExists && !(flags & KIO::Resume)) { qCDebug(KIO_SFTP_LOG) << "Deleting partial file" << dest_part; sftp_unlink(mSftp, dest_part_c.constData()); // Catch errors when we try to open the file. } } else { dest = dest_orig_c; // Will be automatically truncated below... } // bMarkPartial if ((flags & KIO::Resume)) { sftp_attributes fstat; qCDebug(KIO_SFTP_LOG) << "Trying to append: " << dest; file = sftp_open(mSftp, dest.constData(), O_RDWR, 0); // append if resuming if (file) { fstat = sftp_fstat(file); if (fstat) { sftp_seek64(file, fstat->size); // Seek to end TODO totalBytesSent += fstat->size; sftp_attributes_free(fstat); } } } else { mode_t initialMode; if (permissions != -1) { #ifdef Q_OS_WIN initialMode = permissions | static_cast(perms::owner_write | perms::owner_read); #else initialMode = permissions | S_IWUSR | S_IRUSR; #endif } else { initialMode = 0644; } qCDebug(KIO_SFTP_LOG) << "Trying to open:" << QString(dest) << ", mode=" << QString::number(initialMode); file = sftp_open(mSftp, dest.constData(), O_CREAT | O_TRUNC | O_WRONLY, initialMode); } // flags & KIO::Resume if (file == nullptr) { qCDebug(KIO_SFTP_LOG) << "COULD NOT WRITE " << QString(dest) << ", permissions=" << permissions << ", error=" << ssh_get_error(mSession); if (sftp_get_error(mSftp) == SSH_FX_PERMISSION_DENIED) { errorCode = KIO::ERR_WRITE_ACCESS_DENIED; } else { errorCode = KIO::ERR_CANNOT_OPEN_FOR_WRITING; } cs = sftpProtocol::ServerError; result = -1; continue; } // file } // dest.isEmpty ssize_t bytesWritten = sftp_write(file, buffer.data(), buffer.size()); if (bytesWritten < 0) { errorCode = KIO::ERR_CANNOT_WRITE; result = -1; } else { totalBytesSent += bytesWritten; processedSize(totalBytesSent); } } // result } while (result > 0); sftp_attributes_free(sb); // An error occurred deal with it. if (result < 0) { qCDebug(KIO_SFTP_LOG) << "Error during 'put'. Aborting."; if (file != nullptr) { sftp_close(file); sftp_attributes attr = sftp_stat(mSftp, dest.constData()); if (bMarkPartial && attr != nullptr) { size_t size = configValue(QStringLiteral("MinimumKeepSize"), DEFAULT_MINIMUM_KEEP_SIZE); if (attr->size < size) { sftp_unlink(mSftp, dest.constData()); } } sftp_attributes_free(attr); } //::exit(255); return cs; } if (file == nullptr) { // we got nothing to write out, so we never opened the file return sftpProtocol::Success; } if (sftp_close(file) < 0) { qCWarning(KIO_SFTP_LOG) << "Error when closing file descriptor"; error(KIO::ERR_CANNOT_WRITE, dest_orig); return sftpProtocol::ServerError; } // after full download rename the file back to original name if (bMarkPartial) { // If the original URL is a symlink and we were asked to overwrite it, // remove the symlink first. This ensures that we do not overwrite the // current source if the symlink points to it. if ((flags & KIO::Overwrite)) { sftp_unlink(mSftp, dest_orig_c.constData()); } if (sftp_rename(mSftp, dest.constData(), dest_orig_c.constData()) < 0) { qCWarning(KIO_SFTP_LOG) << " Couldn't rename " << dest << " to " << dest_orig; errorCode = KIO::ERR_CANNOT_RENAME_PARTIAL; return sftpProtocol::ServerError; } } // set final permissions if (permissions != -1 && !(flags & KIO::Resume)) { qCDebug(KIO_SFTP_LOG) << "Trying to set final permissions of " << dest_orig << " to " << QString::number(permissions); if (sftp_chmod(mSftp, dest_orig_c.constData(), permissions) < 0) { errorCode = -1; // force copy to call sftpSendWarning... return sftpProtocol::ServerError; } } // set original owner and group if (bOrigExists) { qCDebug(KIO_SFTP_LOG) << "Trying to restore original owner and group of " << dest_orig; if (sftp_chown(mSftp, dest_orig_c.constData(), owner, group) < 0) { qCWarning(KIO_SFTP_LOG) << "Could not change owner and group for" << dest_orig; // warning(i18n( "Could not change owner and group for\n%1", dest_orig)); } } // set modification time const QString mtimeStr = metaData("modified"); if (!mtimeStr.isEmpty()) { QDateTime dt = QDateTime::fromString(mtimeStr, Qt::ISODate); if (dt.isValid()) { struct timeval times[2]; sftp_attributes attr = sftp_lstat(mSftp, dest_orig_c.constData()); if (attr != nullptr) { times[0].tv_sec = attr->atime; //// access time, unchanged times[1].tv_sec = dt.toSecsSinceEpoch(); // modification time times[0].tv_usec = times[1].tv_usec = 0; qCDebug(KIO_SFTP_LOG) << "Trying to restore mtime for " << dest_orig << " to: " << mtimeStr; result = sftp_utimes(mSftp, dest_orig_c.constData(), times); if (result < 0) { qCWarning(KIO_SFTP_LOG) << "Failed to set mtime for" << dest_orig; } sftp_attributes_free(attr); } } } return sftpProtocol::Success; } void sftpProtocol::copy(const QUrl &src, const QUrl &dest, int permissions, KIO::JobFlags flags) { qCDebug(KIO_SFTP_LOG) << src << " -> " << dest << " , permissions = " << QString::number(permissions) << ", overwrite = " << (flags & KIO::Overwrite) << ", resume = " << (flags & KIO::Resume); QString sCopyFile; int errorCode = 0; StatusCode cs = sftpProtocol::ClientError; const bool isSourceLocal = src.isLocalFile(); const bool isDestinationLocal = dest.isLocalFile(); if (!isSourceLocal && isDestinationLocal) { // sftp -> file sCopyFile = dest.toLocalFile(); cs = sftpCopyGet(src, sCopyFile, permissions, flags, errorCode); if (cs == sftpProtocol::ServerError) sCopyFile = src.url(); } else if (isSourceLocal && !isDestinationLocal) { // file -> sftp sCopyFile = src.toLocalFile(); cs = sftpCopyPut(dest, sCopyFile, permissions, flags, errorCode); if (cs == sftpProtocol::ServerError) sCopyFile = dest.url(); } else { errorCode = KIO::ERR_UNSUPPORTED_ACTION; sCopyFile.clear(); } if (cs != sftpProtocol::Success && errorCode > 0) { error(errorCode, sCopyFile); return; } if (errorCode < 0) { sftpSendWarning(errorCode, sCopyFile); } finished(); } sftpProtocol::StatusCode sftpProtocol::sftpCopyGet(const QUrl& url, const QString& sCopyFile, int permissions, KIO::JobFlags flags, int& errorCode) { qCDebug(KIO_SFTP_LOG) << url << "->" << sCopyFile << ", permissions=" << permissions; // check if destination is ok ... QFileInfo copyFile(sCopyFile); const bool bDestExists = copyFile.exists(); if(bDestExists) { if(copyFile.isDir()) { errorCode = ERR_IS_DIRECTORY; return sftpProtocol::ClientError; } if(!(flags & KIO::Overwrite)) { errorCode = ERR_FILE_ALREADY_EXIST; return sftpProtocol::ClientError; } } bool bResume = false; const QString sPart = sCopyFile + QLatin1String(".part"); // do we have a ".part" file? QFileInfo partFile(sPart); const bool bPartExists = partFile.exists(); const bool bMarkPartial = configValue(QStringLiteral("MarkPartial"), true); const QString dest = (bMarkPartial ? sPart : sCopyFile); if (bMarkPartial && bPartExists && copyFile.size() > 0) { if(partFile.isDir()) { errorCode = ERR_DIR_ALREADY_EXIST; return sftpProtocol::ClientError; // client side error } bResume = canResume( copyFile.size() ); } if (bPartExists && !bResume) // get rid of an unwanted ".part" file QFile::remove(sPart); // WABA: Make sure that we keep writing permissions ourselves, // otherwise we can be in for a surprise on NFS. mode_t initialMode; if (permissions != -1) #ifdef Q_OS_WIN initialMode = permissions | static_cast(perms::owner_write); #else initialMode = permissions | S_IWUSR; #endif else initialMode = 0666; // open the output file ... int fd = -1; KIO::fileoffset_t offset = 0; if (bResume) { fd = QT_OPEN( QFile::encodeName(sPart), O_RDWR ); // append if resuming offset = seekPos(fd, 0, SEEK_END); if(offset < 0) { errorCode = ERR_CANNOT_RESUME; ::close(fd); return sftpProtocol::ClientError; // client side error } qCDebug(KIO_SFTP_LOG) << "resuming at" << offset; } else { fd = QT_OPEN(QFile::encodeName(dest), O_CREAT | O_TRUNC | O_WRONLY, initialMode); } if (fd == -1) { qCDebug(KIO_SFTP_LOG) << "could not write to" << sCopyFile; errorCode = (errno == EACCES) ? ERR_WRITE_ACCESS_DENIED : ERR_CANNOT_OPEN_FOR_WRITING; return sftpProtocol::ClientError; } StatusCode result = sftpGet(url, errorCode, offset, fd); if( ::close(fd) && result == sftpProtocol::Success ) { errorCode = ERR_CANNOT_WRITE; result = sftpProtocol::ClientError; } // handle renaming or deletion of a partial file ... if (bMarkPartial) { if (result == sftpProtocol::Success) { // rename ".part" on success if (!QFile::rename(sPart, sCopyFile)) { // If rename fails, try removing the destination first if it exists. if (!bDestExists || !QFile::remove(sCopyFile) || !QFile::rename(sPart, sCopyFile)) { qCDebug(KIO_SFTP_LOG) << "cannot rename " << sPart << " to " << sCopyFile; errorCode = ERR_CANNOT_RENAME_PARTIAL; result = sftpProtocol::ClientError; } } } else{ partFile.refresh(); const int size = configValue(QStringLiteral("MinimumKeepSize"), DEFAULT_MINIMUM_KEEP_SIZE); if (partFile.exists() && partFile.size() < size) { // should a very small ".part" be deleted? QFile::remove(sPart); } } } const QString mtimeStr = metaData("modified"); if (!mtimeStr.isEmpty()) { QDateTime dt = QDateTime::fromString(mtimeStr, Qt::ISODate); if (dt.isValid()) { QFile receivedFile(sCopyFile); if (receivedFile.exists()) { if (!receivedFile.open(QIODevice::ReadWrite | QIODevice::Text)) { QString error_msg = receivedFile.errorString(); qCDebug(KIO_SFTP_LOG) << "Couldn't update modified time : " << error_msg; } else { receivedFile.setFileTime(dt, QFileDevice::FileModificationTime); } } } } return result; } sftpProtocol::StatusCode sftpProtocol::sftpCopyPut(const QUrl& url, const QString& sCopyFile, int permissions, JobFlags flags, int& errorCode) { qCDebug(KIO_SFTP_LOG) << sCopyFile << "->" << url << ", permissions=" << permissions << ", flags" << flags; // check if source is ok ... QFileInfo copyFile(sCopyFile); bool bSrcExists = copyFile.exists(); if (bSrcExists) { if(copyFile.isDir()) { errorCode = ERR_IS_DIRECTORY; return sftpProtocol::ClientError; } } else { errorCode = ERR_DOES_NOT_EXIST; return sftpProtocol::ClientError; } const int fd = QT_OPEN(QFile::encodeName(sCopyFile), O_RDONLY); if(fd == -1) { errorCode = ERR_CANNOT_OPEN_FOR_READING; return sftpProtocol::ClientError; } totalSize(copyFile.size()); // delegate the real work (errorCode gets status) ... StatusCode ret = sftpPut(url, permissions, flags, errorCode, fd); ::close(fd); return ret; } void sftpProtocol::stat(const QUrl& url) { qCDebug(KIO_SFTP_LOG) << url; if (!sftpLogin()) { // sftpLogin finished() return; } if (url.path().isEmpty() || QDir::isRelativePath(url.path()) || url.path().contains("/./") || url.path().contains("/../")) { QString cPath; if (!url.path().isEmpty()) { cPath = canonicalizePath(url.path()); } else { cPath = canonicalizePath(QLatin1String(".")); } if (cPath.isEmpty()) { error(KIO::ERR_MALFORMED_URL, url.toDisplayString()); return; } QUrl redir(url); redir.setPath(cPath); redirection(redir); qCDebug(KIO_SFTP_LOG) << "redirecting to " << redir.url(); finished(); return; } QByteArray path = url.path().toUtf8(); const QString sDetails = metaData(QLatin1String("details")); const int details = sDetails.isEmpty() ? 2 : sDetails.toInt(); UDSEntry entry; entry.clear(); if (!createUDSEntry(url.fileName(), path, entry, details)) { error(KIO::ERR_DOES_NOT_EXIST, url.toDisplayString()); return; } statEntry(entry); finished(); } void sftpProtocol::mimetype(const QUrl& url){ qCDebug(KIO_SFTP_LOG) << url; if (!sftpLogin()) { // sftpLogin finished() return; } // open() feeds the mimetype open(url, QIODevice::ReadOnly); // open() finished(), don't finish in close again. closeWithoutFinish(); } void sftpProtocol::listDir(const QUrl& url) { qCDebug(KIO_SFTP_LOG) << "list directory: " << url; if (!sftpLogin()) { // sftpLogin finished() return; } if (url.path().isEmpty() || QDir::isRelativePath(url.path()) || url.path().contains("/./") || url.path().contains("/../")) { QString cPath; if (!url.path().isEmpty() ) { cPath = canonicalizePath(url.path()); } else { cPath = canonicalizePath(QStringLiteral(".")); } if (cPath.isEmpty()) { error(KIO::ERR_MALFORMED_URL, url.toDisplayString()); return; } QUrl redir(url); redir.setPath(cPath); redirection(redir); qCDebug(KIO_SFTP_LOG) << "redirecting to " << redir.url(); finished(); return; } QByteArray path = url.path().toUtf8(); sftp_dir dp = sftp_opendir(mSftp, path.constData()); if (dp == nullptr) { reportError(url, sftp_get_error(mSftp)); return; } sftp_attributes dirent = nullptr; const QString sDetails = metaData(QLatin1String("details")); const int details = sDetails.isEmpty() ? 2 : sDetails.toInt(); UDSEntry entry; qCDebug(KIO_SFTP_LOG) << "readdir: " << path << ", details: " << QString::number(details); for (;;) { mode_t access; char *link; bool isBrokenLink = false; long long fileType = QT_STAT_REG; long long size = 0LL; dirent = sftp_readdir(mSftp, dp); if (dirent == nullptr) { break; } entry.clear(); entry.fastInsert(KIO::UDSEntry::UDS_NAME, QFile::decodeName(dirent->name)); if (dirent->type == SSH_FILEXFER_TYPE_SYMLINK) { QByteArray file = path + '/' + QFile::decodeName(dirent->name).toUtf8(); link = sftp_readlink(mSftp, file.constData()); if (link == nullptr) { sftp_attributes_free(dirent); error(KIO::ERR_INTERNAL, i18n("Could not read link: %1", QString::fromUtf8(file))); return; } entry.fastInsert(KIO::UDSEntry::UDS_LINK_DEST, QFile::decodeName(link)); free(link); // A symlink -> follow it only if details > 1 if (details > 1) { sftp_attributes sb = sftp_stat(mSftp, file.constData()); if (sb == nullptr) { isBrokenLink = true; } else { sftp_attributes_free(dirent); dirent = sb; } } } if (isBrokenLink) { // It is a link pointing to nowhere fileType = QT_STAT_MASK - 1; #ifdef Q_OS_WIN access = static_cast(perms::owner_all | perms::group_all | perms::others_all); #else access = S_IRWXU | S_IRWXG | S_IRWXO; #endif size = 0LL; } else { switch (dirent->type) { case SSH_FILEXFER_TYPE_REGULAR: fileType = QT_STAT_REG; break; case SSH_FILEXFER_TYPE_DIRECTORY: fileType = QT_STAT_DIR; break; case SSH_FILEXFER_TYPE_SYMLINK: fileType = QT_STAT_LNK; break; case SSH_FILEXFER_TYPE_SPECIAL: case SSH_FILEXFER_TYPE_UNKNOWN: break; } access = dirent->permissions & 07777; size = dirent->size; } entry.fastInsert(KIO::UDSEntry::UDS_FILE_TYPE, fileType); entry.fastInsert(KIO::UDSEntry::UDS_ACCESS, access); entry.fastInsert(KIO::UDSEntry::UDS_SIZE, size); if (details > 0) { if (dirent->owner) { entry.fastInsert(KIO::UDSEntry::UDS_USER, QString::fromUtf8(dirent->owner)); } else { entry.fastInsert(KIO::UDSEntry::UDS_USER, QString::number(dirent->uid)); } if (dirent->group) { entry.fastInsert(KIO::UDSEntry::UDS_GROUP, QString::fromUtf8(dirent->group)); } else { entry.fastInsert(KIO::UDSEntry::UDS_GROUP, QString::number(dirent->gid)); } entry.fastInsert(KIO::UDSEntry::UDS_ACCESS_TIME, dirent->atime); entry.fastInsert(KIO::UDSEntry::UDS_MODIFICATION_TIME, dirent->mtime); entry.fastInsert(KIO::UDSEntry::UDS_CREATION_TIME, dirent->createtime); } sftp_attributes_free(dirent); listEntry(entry); } // for ever sftp_closedir(dp); finished(); } void sftpProtocol::mkdir(const QUrl &url, int permissions) { qCDebug(KIO_SFTP_LOG) << "create directory: " << url; if (!sftpLogin()) { // sftpLogin finished() return; } if (url.path().isEmpty()) { error(KIO::ERR_MALFORMED_URL, url.toDisplayString()); return; } const QString path = url.path(); const QByteArray path_c = path.toUtf8(); // Remove existing file or symlink, if requested. if (metaData(QLatin1String("overwrite")) == QLatin1String("true")) { qCDebug(KIO_SFTP_LOG) << "overwrite set, remove existing file or symlink: " << url; sftp_unlink(mSftp, path_c.constData()); } qCDebug(KIO_SFTP_LOG) << "Trying to create directory: " << path; sftp_attributes sb = sftp_lstat(mSftp, path_c.constData()); if (sb == nullptr) { if (sftp_mkdir(mSftp, path_c.constData(), 0777) < 0) { reportError(url, sftp_get_error(mSftp)); sftp_attributes_free(sb); return; } qCDebug(KIO_SFTP_LOG) << "Successfully created directory: " << url; if (permissions != -1) { // This will report an error or finished. chmod(url, permissions); } else { finished(); } sftp_attributes_free(sb); return; } auto err = KSFTP_ISDIR(sb) ? KIO::ERR_DIR_ALREADY_EXIST : KIO::ERR_FILE_ALREADY_EXIST; sftp_attributes_free(sb); error(err, path); } void sftpProtocol::rename(const QUrl& src, const QUrl& dest, KIO::JobFlags flags) { qCDebug(KIO_SFTP_LOG) << "rename " << src << " to " << dest << flags; if (!sftpLogin()) { // sftpLogin finished() return; } QByteArray qsrc = src.path().toUtf8(); QByteArray qdest = dest.path().toUtf8(); sftp_attributes sb = sftp_lstat(mSftp, qdest.constData()); if (sb != nullptr) { const bool isDir = KSFTP_ISDIR(sb); if (!(flags & KIO::Overwrite)) { error(isDir ? KIO::ERR_DIR_ALREADY_EXIST : KIO::ERR_FILE_ALREADY_EXIST, dest.url()); sftp_attributes_free(sb); return; } // Delete the existing destination file/dir... if (isDir) { if (sftp_rmdir(mSftp, qdest.constData()) < 0) { reportError(dest, sftp_get_error(mSftp)); return; } } else { if (sftp_unlink(mSftp, qdest.constData()) < 0) { reportError(dest, sftp_get_error(mSftp)); return; } } } sftp_attributes_free(sb); if (sftp_rename(mSftp, qsrc.constData(), qdest.constData()) < 0) { reportError(dest, sftp_get_error(mSftp)); return; } finished(); } void sftpProtocol::symlink(const QString &target, const QUrl &dest, KIO::JobFlags flags) { qCDebug(KIO_SFTP_LOG) << "link " << target << "->" << dest << ", overwrite = " << (flags & KIO::Overwrite) << ", resume = " << (flags & KIO::Resume); if (!sftpLogin()) { // sftpLogin finished() return; } QByteArray t = target.toUtf8(); QByteArray d = dest.path().toUtf8(); bool failed = false; if (sftp_symlink(mSftp, t.constData(), d.constData()) < 0) { if (flags == KIO::Overwrite) { sftp_attributes sb = sftp_lstat(mSftp, d.constData()); if (sb == nullptr) { failed = true; } else { if (sftp_unlink(mSftp, d.constData()) < 0) { failed = true; } else { if (sftp_symlink(mSftp, t.constData(), d.constData()) < 0) { failed = true; } } } sftp_attributes_free(sb); } } if (failed) { reportError(dest, sftp_get_error(mSftp)); return; } finished(); } void sftpProtocol::chmod(const QUrl& url, int permissions) { qCDebug(KIO_SFTP_LOG) << "change permission of " << url << " to " << QString::number(permissions); if (!sftpLogin()) { // sftpLogin finished() return; } QByteArray path = url.path().toUtf8(); if (sftp_chmod(mSftp, path.constData(), permissions) < 0) { reportError(url, sftp_get_error(mSftp)); return; } finished(); } void sftpProtocol::del(const QUrl &url, bool isfile){ qCDebug(KIO_SFTP_LOG) << "deleting " << (isfile ? "file: " : "directory: ") << url; if (!sftpLogin()) { // sftpLogin finished() return; } QByteArray path = url.path().toUtf8(); if (isfile) { if (sftp_unlink(mSftp, path.constData()) < 0) { reportError(url, sftp_get_error(mSftp)); return; } } else { if (sftp_rmdir(mSftp, path.constData()) < 0) { reportError(url, sftp_get_error(mSftp)); return; } } finished(); } void sftpProtocol::slave_status() { qCDebug(KIO_SFTP_LOG) << "connected to " << mHost << "?: " << mConnected; slaveStatus((mConnected ? mHost : QString()), mConnected); } sftpProtocol::GetRequest::GetRequest(sftp_file file, sftp_attributes sb, ushort maxPendingRequests) :mFile(file), mSb(sb), mMaxPendingRequests(maxPendingRequests) { } bool sftpProtocol::GetRequest::enqueueChunks() { sftpProtocol::GetRequest::Request request; qCDebug(KIO_SFTP_TRACE_LOG) << "enqueueChunks"; while (pendingRequests.count() < mMaxPendingRequests) { request.expectedLength = MAX_XFER_BUF_SIZE; request.startOffset = mFile->offset; request.id = sftp_async_read_begin(mFile, request.expectedLength); if (request.id < 0) { if (pendingRequests.isEmpty()) { return false; } else { break; } } pendingRequests.enqueue(request); if (mFile->offset >= mSb->size) { // Do not add any more chunks if the offset is larger than the given file size. // However this is done after adding a request as the remote file size may // have changed in the meantime. break; } } qCDebug(KIO_SFTP_TRACE_LOG) << "enqueueChunks done" << QString::number(pendingRequests.size()); return true; } int sftpProtocol::GetRequest::readChunks(QByteArray &data) { int totalRead = 0; ssize_t bytesread = 0; while (!pendingRequests.isEmpty()) { sftpProtocol::GetRequest::Request &request = pendingRequests.head(); int dataSize = data.size() + request.expectedLength; data.resize(dataSize); if (data.size() < dataSize) { // Could not allocate enough memory - skip current chunk data.resize(dataSize - request.expectedLength); break; } bytesread = sftp_async_read(mFile, data.data() + totalRead, request.expectedLength, request.id); // qCDebug(KIO_SFTP_LOG) << "bytesread=" << QString::number(bytesread); if (bytesread == 0 || bytesread == SSH_AGAIN) { // Done reading or timeout data.resize(data.size() - request.expectedLength); if (bytesread == 0) { pendingRequests.dequeue(); // This frees QByteArray &data! } break; } else if (bytesread == SSH_ERROR) { return -1; } totalRead += bytesread; if (bytesread < request.expectedLength) { int rc; // If less data is read than expected - requeue the request data.resize(data.size() - (request.expectedLength - bytesread)); // Modify current request request.expectedLength -= bytesread; request.startOffset += bytesread; rc = sftp_seek64(mFile, request.startOffset); if (rc < 0) { // Failed to continue reading return -1; } request.id = sftp_async_read_begin(mFile, request.expectedLength); if (request.id < 0) { // Failed to dispatch rerequest return -1; } return totalRead; } pendingRequests.dequeue(); } return totalRead; } sftpProtocol::GetRequest::~GetRequest() { sftpProtocol::GetRequest::Request request; char buf[MAX_XFER_BUF_SIZE]; // Remove pending reads to avoid memory leaks while (!pendingRequests.isEmpty()) { request = pendingRequests.dequeue(); sftp_async_read(mFile, buf, request.expectedLength, request.id); } // Close channel & free attributes sftp_close(mFile); sftp_attributes_free(mSb); } void sftpProtocol::requiresUserNameRedirection() { QUrl redirectUrl; redirectUrl.setScheme( QLatin1String("sftp") ); redirectUrl.setUserName( mUsername ); redirectUrl.setPassword( mPassword ); redirectUrl.setHost( mHost ); if (mPort > 0 && mPort != DEFAULT_SFTP_PORT) { redirectUrl.setPort( mPort ); } qCDebug(KIO_SFTP_LOG) << "redirecting to" << redirectUrl; redirection( redirectUrl ); } bool sftpProtocol::sftpLogin() { const QString origUsername = mUsername; openConnection(); qCDebug(KIO_SFTP_LOG) << "connected ?" << mConnected << "username: old=" << origUsername << "new=" << mUsername; if (!origUsername.isEmpty() && origUsername != mUsername) { requiresUserNameRedirection(); finished(); return false; } return mConnected; } void sftpProtocol::sftpSendWarning(int errorCode, const QString& url) { switch (errorCode) { case -1: warning(i18n( "Could not change permissions for\n%1", url)); break; default: break; } } void sftpProtocol::closeWithoutFinish() { sftp_close(mOpenFile); mOpenFile = nullptr; } void sftpProtocol::clearPubKeyAuthInfo() { if (mPublicKeyAuthInfo) { delete mPublicKeyAuthInfo; mPublicKeyAuthInfo = nullptr; } } void sftpProtocol::fileSystemFreeSpace(const QUrl& url) { qCDebug(KIO_SFTP_LOG) << "file system free space of" << url; if (!sftpLogin()) { // sftpLogin finished() return; } if (sftp_extension_supported(mSftp, "statvfs@openssh.com", "2") == 0) { error(ERR_UNSUPPORTED_ACTION, QString()); return; } const QByteArray path = url.path().toUtf8(); sftp_statvfs_t statvfs = sftp_statvfs(mSftp, path.constData()); if (statvfs == nullptr) { reportError(url, sftp_get_error(mSftp)); return; } setMetaData(QString::fromLatin1("total"), QString::number(statvfs->f_frsize * statvfs->f_blocks)); setMetaData(QString::fromLatin1("available"), QString::number(statvfs->f_frsize * statvfs->f_bavail)); sftp_statvfs_free(statvfs); finished(); } diff --git a/sftp/kio_sftp.h b/sftp/kio_sftp.h index 69f06430..59bd684e 100644 --- a/sftp/kio_sftp.h +++ b/sftp/kio_sftp.h @@ -1,219 +1,220 @@ /* * Copyright (c) 2001 Lucas Fisher * Copyright (c) 2009 Andreas Schneider * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Library General Public * License (LGPL) as published by the Free Software Foundation; * either version 2 of the License, or (at your option) any later * version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Library General Public License for more details. * * You should have received a copy of the GNU Library General Public License * along with this library; see the file COPYING.LIB. If not, write to * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, * Boston, MA 02110-1301, USA. */ #ifndef __kio_sftp_h__ #define __kio_sftp_h__ #include #include #include #include #include #include namespace KIO { class AuthInfo; } class sftpProtocol : public KIO::SlaveBase { public: sftpProtocol(const QByteArray &pool_socket, const QByteArray &app_socket); ~sftpProtocol() override; void setHost(const QString &h, quint16 port, const QString& user, const QString& pass) override; void get(const QUrl &url) override; void listDir(const QUrl &url) override ; void mimetype(const QUrl &url) override; void stat(const QUrl &url) override; void copy(const QUrl &src, const QUrl &dest, int permissions, KIO::JobFlags flags) override; void put(const QUrl &url, int permissions, KIO::JobFlags flags) override; void closeConnection() override; void slave_status() override; void del(const QUrl &url, bool isfile) override; void chmod(const QUrl &url, int permissions) override; void symlink(const QString &target, const QUrl &dest, KIO::JobFlags flags) override; void rename(const QUrl &src, const QUrl &dest, KIO::JobFlags flags) override; void mkdir(const QUrl &url, int permissions) override; void openConnection() override; // KIO::FileJob interface void open(const QUrl &url, QIODevice::OpenMode mode) override; void read(KIO::filesize_t size) override; void write(const QByteArray &data) override; void seek(KIO::filesize_t offset) override; + void truncate(KIO::filesize_t length); void close() override; void special(const QByteArray &data) override; // libssh authentication callback (note that this is called by the // global ::auth_callback() call. int auth_callback(const char *prompt, char *buf, size_t len, int echo, int verify, void *userdata); // libssh logging callback (note that this is called by the // global ::log_callback() call. void log_callback(int priority, const char *function, const char *buffer, void *userdata); protected: void virtual_hook(int id, void *data) override; private: // Private variables /** True if ioslave is connected to sftp server. */ bool mConnected; /** Host we are connected to. */ QString mHost; /** Port we are connected to. */ int mPort; /** The ssh session for the connection */ ssh_session mSession; /** The sftp session for the connection */ sftp_session mSftp; /** Username to use when connecting */ QString mUsername; /** User's password */ QString mPassword; /** The open file */ sftp_file mOpenFile; /** The open URL */ QUrl mOpenUrl; ssh_callbacks mCallbacks; /** Version of the sftp protocol we are using. */ int sftpVersion; struct Status { int code; KIO::filesize_t size; QString text; }; // KIO::FileJob interface /** The opened handle */ QByteArray openHandle; QUrl openUrl; KIO::filesize_t openOffset; /** * Holds public key authentication info for proper retry handling. */ KIO::AuthInfo* mPublicKeyAuthInfo; /** * GetRequest encapsulates several SFTP get requests into a single object. * As SFTP messages are limited to MAX_XFER_BUF_SIZE several requests * should be sent simultaneously in order to increase transfer speeds. */ class GetRequest { public: /** * Creates a new GetRequest object. * @param file the sftp_file object which should be transferred. * @param sb the attributes of that sftp_file object. * @param maxPendingRequests the maximum number of parallel requests to start with. * The more are pending the higher the potential memory * foot print, however if the connection allows it * we'll get better throughput. */ GetRequest(sftp_file file, sftp_attributes sb, ushort maxPendingRequests = 128); /** * Removes all pending requests and closes the SFTP channel and attributes * in order to avoid memory leaks. */ ~GetRequest(); /** * Starts up to maxPendingRequests file requests. Reading is performed in the * via the readChunks method. */ bool enqueueChunks(); /** * Attempts to read all pending chunks in the given QByteArray. * @param data the array into which the data should be saved (it should be empty). * @return 0 on EOF or timeout, -1 on error and the number of bytes read otherwise. */ int readChunks(QByteArray &data); private: struct Request { /** Identifier as returned by the sftp_async_read_begin call */ int id; /** The number of bytes expected to be returned */ uint32_t expectedLength; /** The SSH start offset when this request was made */ uint64_t startOffset; }; sftp_file mFile; sftp_attributes mSb; ushort mMaxPendingRequests; QQueue pendingRequests; }; private: // private methods int authenticateKeyboardInteractive(KIO::AuthInfo &info); void reportError(const QUrl &url, const int err); bool createUDSEntry(const QString &filename, const QByteArray &path, KIO::UDSEntry &entry, short int details); QString canonicalizePath(const QString &path); void requiresUserNameRedirection(); void clearPubKeyAuthInfo(); bool sftpLogin(); bool sftpOpenConnection(const KIO::AuthInfo&); void sftpSendWarning(int errorCode, const QString& url); // Close without error() or finish() call (in case of errors for example) void closeWithoutFinish(); /** * Status Code returned from ftpPut() and ftpGet(), used to select * source or destination url for error messages */ typedef enum { Success, ClientError, ServerError } StatusCode; StatusCode sftpGet(const QUrl& url, int& errorCode, KIO::fileoffset_t offset = -1, int fd = -1); StatusCode sftpPut(const QUrl& url, int permissions, KIO::JobFlags flags, int& errorCode, int fd = -1); StatusCode sftpCopyGet(const QUrl& url, const QString& src, int permissions, KIO::JobFlags flags, int& errorCode); StatusCode sftpCopyPut(const QUrl& url, const QString& dest, int permissions, KIO::JobFlags flags, int& errorCode); void fileSystemFreeSpace(const QUrl& url); // KF6 TODO: Once a virtual fileSystemFreeSpace method in SlaveBase exists, override it }; #endif diff --git a/sftp/sftp.protocol b/sftp/sftp.protocol index 4cc16a22..4fe98ae7 100644 --- a/sftp/sftp.protocol +++ b/sftp/sftp.protocol @@ -1,107 +1,108 @@ [Protocol] exec=kf5/kio/sftp protocol=sftp input=none listing=Name,Type,Size,Date,AccessDate,Access,Owner,Group,Link,MimeType output=filesystem reading=true writing=true makedir=true deleting=true moving=true opening=true +truncating=true linking=true copyToFile=true copyFromFile=true Icon=folder-remote maxInstances=20 maxInstancesPerHost=5 Description=A kioslave for sftp Description[af]='n Kioslave vir sftp Description[be]=Kioslave для sftp Description[be@latin]=Słužba „kioslave” dla SFTP Description[bg]=kioslave за sftp Description[bn]=এস.এফ.টি.পি-র জন্য একটি kioslave Description[bn_IN]=sftp-র জন্য kioslave Description[br]=Ur kioslave evit sftp Description[bs]=U/I zahvat za SFTP Description[ca]=Un «kioslave» per a sftp Description[ca@valencia]=Un «kioslave» per a sftp Description[cs]=Protokol KDE pro sftp Description[csb]=Wtëkôcz dlô procedurë òbsłużënkù sftp Description[da]=En kioslave for sftp Description[de]=Ein-/Ausgabemodul für das SFTP-Protokoll Description[el]=Ένας kioslave για sftp Description[en_GB]=A kioslave for sftp Description[eo]=kioslave por sftp Description[es]=Un kioslave para sftp Description[et]=SFTP IO-moodul Description[eu]=SFTPrako kioslave bat Description[fa]=یک kioslave برای sftp Description[fi]=Sftp:n liitin Description[fr]=Un module d'entrées / sorties pour le protocole SFTP Description[fy]=Een kioslave Foar sftp Description[ga]=Sclábhaí KIO le haghaidh sftp Description[gl]=Un kioslave para sftp Description[gu]=sftp માટે kioslave Description[he]=kioslave עבור sftp Description[hi]=एसएफटीपी के लिए केआईओस्लेव Description[hne]=एसएफटीपी बर केआईओस्लेव Description[hr]=Kioslave za SFTP Description[hsb]=kioslave za sftp Description[hu]=KDE-protokoll az sftp-hez Description[ia]=Un kioslave pro sftp Description[id]=Sebuah kioslave untuk sftp Description[is]=kioslave fyrir sftp Description[it]=Un kioslave per sftp Description[ja]=sftp のための kioslave Description[ka]=A kioslave for sftp Description[kk]=sftp-ке арналған енгізу-шығару модулі Description[km]=kioslave សម្រាប់ sftp Description[kn]=sftp ಒಂದು ಕೆಐಓ ಅಧೀನಾನ್ವಯ (ಸ್ಲೇವ್) Description[ko]=SFTP KIO 슬레이브 Description[ku]=Kioslaveyek ji bo sftp Description[lt]=Kio pavaldusis, skirtas sftp Description[lv]=KIO sftp apstrādātājs Description[mai]=एसएफटीपी क' लेल केआईओस्लेव Description[mk]=kio-служител за sftp Description[ml]=എസ്എഫ്‌ടിപിയ്ക്കുള്ള കിയൊസ്ലേവു് Description[mr]=sftp करिता kioslave Description[ms]=Kioslave untuk sftp Description[nb]=En kioslave for sftp Description[nds]=En In-/Utgaavmoduul för sftp Description[ne]=sftp का लागि एउटा किओस्लाभ Description[nl]=Een kioslave voor sftp Description[nn]=Ein KIO-slave for SFTP Description[or]=sftp ପାଇଁ kioslave Description[pa]=sftp ਲਈ kioslave Description[pl]=Wtyczka protokołu sftp Description[pt]=Um 'kioslave' para sftp Description[pt_BR]=Um kioslave para sftp Description[ro]=Un dispozitiv de I/E pentru SFTP Description[ru]=Поддержка SFTP Description[se]=ŠO-šláva sftp-protokolla várás Description[si]=sftp සඳහා kioslave Description[sk]=Kioslave pre sftp Description[sl]=kioslave za sftp Description[sr]=У/И захват за СФТП Description[sr@ijekavian]=У/И захват за СФТП Description[sr@ijekavianlatin]=U/I zahvat za SFTP Description[sr@latin]=U/I zahvat za SFTP Description[sv]=En I/O-slav för SFTP Description[ta]=sftpக்கான ஒரு க்யோஸ்லேவ் Description[te]=ఎస్ ఎఫ్ టి పి కొరకు ఐఒ బానిస Description[tg]=Фармонбари kioslave барои sftp Description[th]=ตัวนำข้อมูลเข้า-ออกสำหรับ sftp Description[tr]=Sftp için kioslave Description[ug]=sftp نىڭ kioslave Description[uk]=Підлеглий засіб введення-виведення для sftp Description[uz]=SFTP uchun KCH-sleyv Description[uz@cyrillic]=SFTP учун КЧ-слейв Description[vi]=A kioslave cho SFTP Description[wa]=On vårlet d' I/R pol protocole sftp Description[x-test]=xxA kioslave for sftpxx Description[zh_CN]=sftp 的 KIO slave Description[zh_TW]=sftp 的 kioslave X-DocPath=kioslave5/sftp/index.html Class=:internet diff --git a/smb/kio_smb.cpp b/smb/kio_smb.cpp index 967f0a8c..4e0bc7d2 100644 --- a/smb/kio_smb.cpp +++ b/smb/kio_smb.cpp @@ -1,118 +1,122 @@ ///////////////////////////////////////////////////////////////////////////// // // Project: SMB kioslave for KDE // // File: Top level implementation file for kio_smb.cpp // // Abstract: member function implementations for SMBSlave // // Author(s): Matthew Peterson // //--------------------------------------------------------------------------- // // Copyright (c) 2000 Caldera Systems, Inc. // // This program is free software; you can redistribute it and/or modify it // under the terms of the GNU General Public License as published by the // Free Software Foundation; either version 2.1 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; see the file COPYING. If not, please obtain // a copy from https://www.gnu.org/copyleft/gpl.html // ///////////////////////////////////////////////////////////////////////////// #include "kio_smb.h" #include "kio_smb_internal.h" #include #include // Pseudo plugin class to embed meta data class KIOPluginForMetaData : public QObject { Q_OBJECT Q_PLUGIN_METADATA(IID "org.kde.kio.slave.smb" FILE "smb.json") }; bool needsEEXISTWorkaround() { /* There is an issue with some libsmbclient versions that return EEXIST * return code from smbc_opendir() instead of EPERM when the user * tries to access a resource that requires login authetification. * We are working around the issue by treating EEXIST as a special case * of "invalid/unavailable credentials" if we detect that we are using * the affected versions of libsmbclient * * Upstream bug report: https://bugzilla.samba.org/show_bug.cgi?id=13050 */ static const QVersionNumber firstBrokenVer{4, 7, 0}; static const QVersionNumber lastBrokenVer{4, 7, 6}; const QVersionNumber currentVer = QVersionNumber::fromString(smbc_version()); qCDebug(KIO_SMB_LOG) << "Using libsmbclient library version" << currentVer; if (currentVer >= firstBrokenVer && currentVer <= lastBrokenVer) { qCDebug(KIO_SMB_LOG) << "Detected broken libsmbclient version" << currentVer; return true; } return false; } //=========================================================================== SMBSlave::SMBSlave(const QByteArray& pool, const QByteArray& app) : SlaveBase( "smb", pool, app ), m_openFd(-1), m_enableEEXISTWorkaround(needsEEXISTWorkaround()) { m_initialized_smbc = false; //read in the default workgroup info... reparseConfiguration(); //initialize the library... auth_initialize_smbc(); } //=========================================================================== SMBSlave::~SMBSlave() { } void SMBSlave::virtual_hook(int id, void *data) { switch(id) { case SlaveBase::GetFileSystemFreeSpace: { QUrl *url = static_cast(data); fileSystemFreeSpace(*url); } break; + case SlaveBase::Truncate: { + auto length = static_cast(data); + truncate(*length); + } break; default: { SlaveBase::virtual_hook(id, data); } break; } } //=========================================================================== int Q_DECL_EXPORT kdemain( int argc, char **argv ) { QCoreApplication app(argc, argv); if( argc != 4 ) { qCDebug(KIO_SMB_LOG) << "Usage: kio_smb protocol domain-socket1 domain-socket2"; return -1; } SMBSlave slave( argv[2], argv[3] ); slave.dispatchLoop(); return 0; } #include "kio_smb.moc" diff --git a/smb/kio_smb.h b/smb/kio_smb.h index b7df9b13..2610c3b2 100644 --- a/smb/kio_smb.h +++ b/smb/kio_smb.h @@ -1,322 +1,323 @@ ///////////////////////////////////////////////////////////////////////////// // // Project: SMB kioslave for KDE // // File: kio_smb.h // // Abstract: The main kio slave class declaration. For convenience, // in concurrent development, the implementation for this class // is separated into several .cpp files -- the file containing // the implementation should be noted in the comments for each // member function. // // Author(s): Matthew Peterson // //--------------------------------------------------------------------------- // // Copyright (c) 2000 Caldera Systems, Inc. // // This program is free software; you can redistribute it and/or modify it // under the terms of the GNU General Public License as published by the // Free Software Foundation; either version 2.1 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; see the file COPYING. If not, please obtain // a copy from https://www.gnu.org/copyleft/gpl.html // ///////////////////////////////////////////////////////////////////////////// #ifndef KIO_SMB_H_INCLUDED #define KIO_SMB_H_INCLUDED #include #include "smb-logsettings.h" //-------------- // KDE includes //-------------- #include #include //----------------------------- // Standard C library includes //----------------------------- #include #include #include #include #include #include #include #include #include #include //----------------------------- // Qt includes //----------------------------- #include #include #include //------------------------------- // Samba client library includes //------------------------------- extern "C" { #include } //--------------------------- // kio_smb internal includes //--------------------------- #include "kio_smb_internal.h" #define MAX_XFER_BUF_SIZE 65534 using namespace KIO; //=========================================================================== class SMBSlave : public QObject, public KIO::SlaveBase { Q_OBJECT private: class SMBError { public: int kioErrorId; QString errorString; }; //--------------------------------------------------------------------- // please make sure your private data does not duplicate existing data //--------------------------------------------------------------------- bool m_initialized_smbc; /** * From Controlcenter */ QString m_default_user; // QString m_default_workgroup; //currently unused, Alex QString m_default_password; QString m_default_encoding; /** * we store the current url, it's needed for * callback authorization method */ SMBUrl m_current_url; /** * From Controlcenter, show SHARE$ or not */ // bool m_showHiddenShares; //currently unused, Alex /** * libsmbclient need global variables to store in, * else it crashes on exit next method after use cache_stat, * looks like gcc (C/C++) failure */ struct stat st; protected: //--------------------------------------------- // Authentication functions (kio_smb_auth.cpp) //--------------------------------------------- // (please prefix functions with auth) /** * Description : Initializes the libsmbclient * Return : true on success false with errno set on error */ bool auth_initialize_smbc(); int checkPassword(SMBUrl &url); //--------------------------------------------- // Cache functions (kio_smb_auth.cpp) //--------------------------------------------- //Stat methods //----------------------------------------- // Browsing functions (kio_smb_browse.cpp) //----------------------------------------- // (please prefix functions with browse) /** * Description : Return a stat of given SMBUrl. Calls cache_stat and * pack it in UDSEntry. UDSEntry will not be cleared * Parameter : SMBUrl the url to stat * Return : cache_stat() return code */ int browse_stat_path(const SMBUrl& url, UDSEntry& udsentry); /** * Description : call smbc_stat and return stats of the url * Parameter : SMBUrl the url to stat * Return : stat* of the url * Note : it has some problems with stat in method, looks like * something leave(or removed) on the stack. If your * method segfault on returning try to change the stat* * variable */ int cache_stat( const SMBUrl& url, struct stat* st ); //--------------------------------------------- // Configuration functions (kio_smb_config.cpp) //--------------------------------------------- // (please prefix functions with config) //--------------------------------------- // Directory functions (kio_smb_dir.cpp) //--------------------------------------- // (please prefix functions with dir) //-------------------------------------- // File IO functions (kio_smb_file.cpp) //-------------------------------------- // (please prefix functions with file) //---------------------------- // Misc functions (this file) //---------------------------- /** * Description : correct a given URL * valid URL's are * * smb://[[domain;]user[:password]@]server[:port][/share[/path[/file]]] * smb:/[[domain;]user[:password]@][group/[server[/share[/path[/file]]]]] * domain = workgroup(domain) of the user * user = username * password = password of useraccount * group = workgroup(domain) of server * server = host to connect * share = a share of the server (host) * path = a path of the share * Parameter : QUrl the url to check * Return : new QUrl if it is corrected. else the same QUrl */ QUrl checkURL(const QUrl& kurl) const; void reportError(const SMBUrl& url, const int errNum); void reportWarning(const SMBUrl& url, const int errNum); public: //----------------------------------------------------------------------- // smbclient authentication callback (note that this is called by the // global ::auth_smbc_get_data() call. void auth_smbc_get_data(const char *server,const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen); //----------------------------------------------------------------------- // Overwritten functions from the base class that define the operation of // this slave. (See the base class headerfile slavebase.h for more // details) //----------------------------------------------------------------------- // Functions overwritten in kio_smb.cpp SMBSlave(const QByteArray& pool, const QByteArray& app); ~SMBSlave() override; // Functions overwritten in kio_smb_browse.cpp void listDir( const QUrl& url ) override; void stat( const QUrl& url ) override; // Functions overwritten in kio_smb_config.cpp void reparseConfiguration() override; // Functions overwritten in kio_smb_dir.cpp void copy( const QUrl& src, const QUrl &dest, int permissions, KIO::JobFlags flags ) override; void del( const QUrl& kurl, bool isfile) override; void mkdir( const QUrl& kurl, int permissions ) override; void rename( const QUrl& src, const QUrl& dest, KIO::JobFlags flags ) override; // Functions overwritten in kio_smb_file.cpp void get( const QUrl& kurl ) override; void put( const QUrl& kurl, int permissions, KIO::JobFlags flags ) override; void open( const QUrl& kurl, QIODevice::OpenMode mode ) override; void read( KIO::filesize_t bytesRequested ) override; void write( const QByteArray &fileData ) override; void seek( KIO::filesize_t offset ) override; + void truncate( KIO::filesize_t length ); void close() override; // Functions not implemented (yet) //virtual void setHost(const QString& host, int port, const QString& user, const QString& pass); //virtual void openConnection(); //virtual void closeConnection(); //virtual void slave_status(); void special( const QByteArray & ) override; protected: void virtual_hook(int id, void *data) override; private: SMBError errnumToKioError(const SMBUrl& url, const int errNum); void smbCopy(const QUrl& src, const QUrl &dest, int permissions, KIO::JobFlags flags); void smbCopyGet(const QUrl& src, const QUrl& dest, int permissions, KIO::JobFlags flags); void smbCopyPut(const QUrl& src, const QUrl& dest, int permissions, KIO::JobFlags flags); bool workaroundEEXIST(const int errNum) const; void listDNSSD(UDSEntry &udsentry, const QUrl &url, const uint direntCount); void fileSystemFreeSpace(const QUrl &url); /** * Used in open(), read(), write(), and close() * FIXME Placing these in the private section above causes m_openUrl = kurl * to fail in SMBSlave::open. Need to find out why this is. */ int m_openFd; SMBUrl m_openUrl; const bool m_enableEEXISTWorkaround; /* Enables a workaround for some broken libsmbclient versions */ // Close without calling finish(). Use this to close after error. void closeWithoutFinish(); }; //========================================================================== // the global libsmbclient authentication callback function extern "C" { void auth_smbc_get_data(SMBCCTX * context, const char *server,const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen); } //=========================================================================== // Main slave entrypoint (see kio_smb.cpp) extern "C" { int kdemain( int argc, char **argv ); } #endif //#endif KIO_SMB_H_INCLUDED diff --git a/smb/kio_smb_file.cpp b/smb/kio_smb_file.cpp index 1019e8ef..f20b15ea 100644 --- a/smb/kio_smb_file.cpp +++ b/smb/kio_smb_file.cpp @@ -1,470 +1,482 @@ //////////////////////////////////////////////////////////////////////////// // // Project: SMB kioslave for KDE2 // // File: kio_smb_file.cpp // // Abstract: member function implementations for SMBSlave that deal with // SMB file access // // Author(s): Matthew Peterson // //--------------------------------------------------------------------------- // // Copyright (c) 2000 Caldera Systems, Inc. // // This program is free software; you can redistribute it and/or modify it // under the terms of the GNU General Public License as published by the // Free Software Foundation; either version 2.1 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; see the file COPYING. If not, please obtain // a copy from https://www.gnu.org/copyleft/gpl.html // ///////////////////////////////////////////////////////////////////////////// #include "kio_smb.h" #include "kio_smb_internal.h" #include #include #include #include //=========================================================================== void SMBSlave::get( const QUrl& kurl ) { char buf[MAX_XFER_BUF_SIZE]; int filefd = 0; int errNum = 0; ssize_t bytesread = 0; // time_t curtime = 0; // time_t lasttime = 0; // Disabled durint port to Qt5/KF5. Seems to be unused. // time_t starttime = 0; // Disabled durint port to Qt5/KF5. Seems to be unused. KIO::filesize_t totalbytesread = 0; QByteArray filedata; SMBUrl url; qCDebug(KIO_SMB_LOG) << kurl; // check (correct) URL QUrl kvurl = checkURL(kurl); // if URL is not valid we have to redirect to correct URL if (kvurl != kurl) { redirection(kvurl); finished(); return; } if(!auth_initialize_smbc()) return; // Stat url = kurl; errNum = cache_stat(url,&st); if( errNum != 0 ) { if ( errNum == EACCES ) error( KIO::ERR_ACCESS_DENIED, url.toDisplayString()); else error( KIO::ERR_DOES_NOT_EXIST, url.toDisplayString()); return; } if ( S_ISDIR( st.st_mode ) ) { error( KIO::ERR_IS_DIRECTORY, url.toDisplayString()); return; } // Set the total size totalSize( st.st_size ); // Open and read the file filefd = smbc_open(url.toSmbcUrl(),O_RDONLY,0); if(filefd >= 0) { bool isFirstPacket = true; // lasttime = starttime = time(NULL); // This seems to be unused.. while(1) { bytesread = smbc_read(filefd, buf, MAX_XFER_BUF_SIZE); if(bytesread == 0) { // All done reading break; } else if(bytesread < 0) { error( KIO::ERR_CANNOT_READ, url.toDisplayString()); return; } filedata = QByteArray::fromRawData(buf,bytesread); if (isFirstPacket) { QMimeDatabase db; QMimeType type = db.mimeTypeForFileNameAndData(url.fileName(), filedata); mimeType(type.name()); isFirstPacket = false; } data( filedata ); filedata.clear(); // increment total bytes read totalbytesread += bytesread; processedSize(totalbytesread); } smbc_close(filefd); data( QByteArray() ); processedSize(static_cast(st.st_size)); } else { error( KIO::ERR_CANNOT_OPEN_FOR_READING, url.toDisplayString()); return; } finished(); } //=========================================================================== void SMBSlave::open( const QUrl& kurl, QIODevice::OpenMode mode) { int errNum = 0; qCDebug(KIO_SMB_LOG) << kurl; // check (correct) URL QUrl kvurl = checkURL(kurl); // if URL is not valid we have to redirect to correct URL if (kvurl != kurl) { redirection(kvurl); finished(); return; } if(!auth_initialize_smbc()) { error( KIO::ERR_ACCESS_DENIED, kurl.toDisplayString()); return; } // Save the URL as a private member // FIXME For some reason m_openUrl has be be declared in bottom private // section of the class SMBSlave declaration instead of the top section // or else this assignment fails m_openUrl = kurl; // Stat errNum = cache_stat(m_openUrl,&st); if( errNum != 0 ) { if ( errNum == EACCES ) error( KIO::ERR_ACCESS_DENIED, m_openUrl.toDisplayString()); else error( KIO::ERR_DOES_NOT_EXIST, m_openUrl.toDisplayString()); return; } if ( S_ISDIR( st.st_mode ) ) { error( KIO::ERR_IS_DIRECTORY, m_openUrl.toDisplayString()); return; } // Set the total size totalSize( st.st_size ); // Convert permissions int flags = 0; if (mode & QIODevice::ReadOnly) { if (mode & QIODevice::WriteOnly) { flags = O_RDWR | O_CREAT; } else { flags = O_RDONLY; } } else if (mode & QIODevice::WriteOnly) { flags = O_WRONLY | O_CREAT; } if (mode & QIODevice::Append) { flags |= O_APPEND; } else if (mode & QIODevice::Truncate) { flags |= O_TRUNC; } // Open the file m_openFd = smbc_open(m_openUrl.toSmbcUrl(), flags, 0); if(m_openFd < 0) { error( KIO::ERR_CANNOT_OPEN_FOR_READING, m_openUrl.toDisplayString()); return; } // Determine the mimetype of the file to be retrieved, and emit it. // This is mandatory in all slaves (for KRun/BrowserRun to work). // If we're not opening the file ReadOnly or ReadWrite, don't attempt to // read the file and send the mimetype. if (mode & QIODevice::ReadOnly){ ssize_t bytesRequested = 1024; ssize_t bytesRead = 0; QVarLengthArray buffer(bytesRequested); bytesRead = smbc_read(m_openFd, buffer.data(), bytesRequested); if(bytesRead < 0) { error( KIO::ERR_CANNOT_READ, m_openUrl.toDisplayString()); closeWithoutFinish(); return; } else { QByteArray fileData = QByteArray::fromRawData(buffer.data(),bytesRead); QMimeDatabase db; QMimeType type = db.mimeTypeForFileNameAndData(m_openUrl.fileName(), fileData); mimeType(type.name()); off_t res = smbc_lseek(m_openFd, 0, SEEK_SET); if (res == (off_t)-1) { error(KIO::ERR_CANNOT_SEEK, m_openUrl.path()); closeWithoutFinish(); return; } } } position( 0 ); emit opened(); } void SMBSlave::read( KIO::filesize_t bytesRequested ) { Q_ASSERT(m_openFd != -1); QVarLengthArray buffer(bytesRequested); ssize_t bytesRead = 0; bytesRead = smbc_read(m_openFd, buffer.data(), bytesRequested); Q_ASSERT(bytesRead <= static_cast(bytesRequested)); if(bytesRead < 0) { qCDebug(KIO_SMB_LOG) << "Could not read " << m_openUrl; error( KIO::ERR_CANNOT_READ, m_openUrl.toDisplayString()); closeWithoutFinish(); return; } QByteArray fileData = QByteArray::fromRawData(buffer.data(), bytesRead); data( fileData ); } void SMBSlave::write(const QByteArray &fileData) { Q_ASSERT(m_openFd != -1); QByteArray buf(fileData); ssize_t size = smbc_write(m_openFd, buf.data(), buf.size()); if (size < 0) { qCDebug(KIO_SMB_LOG) << "Could not write to " << m_openUrl; error( KIO::ERR_CANNOT_WRITE, m_openUrl.toDisplayString()); closeWithoutFinish(); return; } written(size); } void SMBSlave::seek(KIO::filesize_t offset) { off_t res = smbc_lseek(m_openFd, static_cast(offset), SEEK_SET); if (res == (off_t)-1) { error(KIO::ERR_CANNOT_SEEK, m_openUrl.path()); closeWithoutFinish(); } else { qCDebug(KIO_SMB_LOG) << "res" << res; position( res ); } } +void SMBSlave::truncate(KIO::filesize_t length) +{ + off_t res = smbc_ftruncate(m_openFd, static_cast(length)); + if (res < 0) { + error(KIO::ERR_CANNOT_TRUNCATE, m_openUrl.path()); + closeWithoutFinish(); + } else { + qCDebug( KIO_SMB ) << "res" << res; + truncated(length); + } +} + void SMBSlave::closeWithoutFinish() { smbc_close(m_openFd); } void SMBSlave::close() { closeWithoutFinish(); finished(); } //=========================================================================== void SMBSlave::put( const QUrl& kurl, int permissions, KIO::JobFlags flags ) { void *buf; size_t bufsize; m_current_url = kurl; int filefd; bool exists; int errNum = 0; off_t retValLSeek = 0; mode_t mode; QByteArray filedata; qCDebug(KIO_SMB_LOG) << kurl; errNum = cache_stat(m_current_url, &st); exists = (errNum == 0); if ( exists && !(flags & KIO::Overwrite) && !(flags & KIO::Resume)) { if (S_ISDIR(st.st_mode)) { qCDebug(KIO_SMB_LOG) << kurl <<" already isdir !!"; error( KIO::ERR_DIR_ALREADY_EXIST, m_current_url.toDisplayString()); } else { qCDebug(KIO_SMB_LOG) << kurl <<" already exist !!"; error( KIO::ERR_FILE_ALREADY_EXIST, m_current_url.toDisplayString()); } return; } if (exists && !(flags & KIO::Resume) && (flags & KIO::Overwrite)) { qCDebug(KIO_SMB_LOG) << "exists try to remove " << m_current_url.toSmbcUrl(); // remove(m_current_url.url().toLocal8Bit()); } if (flags & KIO::Resume) { // append if resuming qCDebug(KIO_SMB_LOG) << "resume " << m_current_url.toSmbcUrl(); filefd = smbc_open(m_current_url.toSmbcUrl(), O_RDWR, 0 ); if (filefd < 0) { errNum = errno; } else { errNum = 0; } retValLSeek = smbc_lseek(filefd, 0, SEEK_END); if (retValLSeek == (off_t)-1) { errNum = errno; } else { errNum = 0; } } else { if (permissions != -1) { mode = permissions | S_IWUSR | S_IRUSR; } else { mode = 600;//0666; } qCDebug(KIO_SMB_LOG) << "NO resume " << m_current_url.toSmbcUrl(); filefd = smbc_open(m_current_url.toSmbcUrl(), O_CREAT | O_TRUNC | O_WRONLY, mode); if (filefd < 0) { errNum = errno; } else { errNum = 0; } } if ( filefd < 0 ) { if ( errNum == EACCES ) { qCDebug(KIO_SMB_LOG) << "error " << kurl <<" access denied !!"; error( KIO::ERR_WRITE_ACCESS_DENIED, m_current_url.toDisplayString()); } else { qCDebug(KIO_SMB_LOG) << "error " << kurl <<" can not open for writing !!"; error( KIO::ERR_CANNOT_OPEN_FOR_WRITING, m_current_url.toDisplayString()); } return; } // Loop until we got 0 (end of data) while(1) { qCDebug(KIO_SMB_LOG) << "request data "; dataReq(); // Request for data qCDebug(KIO_SMB_LOG) << "write " << m_current_url.toSmbcUrl(); if (readData(filedata) <= 0) { qCDebug(KIO_SMB_LOG) << "readData <= 0"; break; } qCDebug(KIO_SMB_LOG) << "write " << m_current_url.toSmbcUrl(); buf = filedata.data(); bufsize = filedata.size(); ssize_t size = smbc_write(filefd, buf, bufsize); if ( size < 0) { qCDebug(KIO_SMB_LOG) << "error " << kurl << "could not write !!"; error( KIO::ERR_CANNOT_WRITE, m_current_url.toDisplayString()); return; } qCDebug(KIO_SMB_LOG) << "wrote " << size; } qCDebug(KIO_SMB_LOG) << "close " << m_current_url.toSmbcUrl(); if(smbc_close(filefd) < 0) { qCDebug(KIO_SMB_LOG) << kurl << "could not write !!"; error( KIO::ERR_CANNOT_WRITE, m_current_url.toDisplayString()); return; } // set final permissions, if the file was just created if ( permissions != -1 && !exists ) { // TODO: did the smbc_chmod fail? // TODO: put in call to chmod when it is working! // smbc_chmod(url.toSmbcUrl(),permissions); } #ifdef HAVE_UTIME_H // set modification time const QString mtimeStr = metaData( "modified" ); if ( !mtimeStr.isEmpty() ) { QDateTime dt = QDateTime::fromString( mtimeStr, Qt::ISODate ); if ( dt.isValid() ) { if (cache_stat( m_current_url, &st ) == 0) { struct utimbuf utbuf; utbuf.actime = st.st_atime; // access time, unchanged utbuf.modtime = dt.toSecsSinceEpoch(); // modification time smbc_utime( m_current_url.toSmbcUrl(), &utbuf ); } } } #endif // We have done our job => finish finished(); } diff --git a/smb/smb.json b/smb/smb.json index dad0a595..99fc84c2 100644 --- a/smb/smb.json +++ b/smb/smb.json @@ -1,33 +1,34 @@ { "KDE-KIO-Protocols": { "smb": { "Class": ":internet", "Icon": "network-workgroup", "X-DocPath": "kioslave5/smb/index.html", "copyFromFile": true, "copyToFile": true, "deleting": true, "exec": "kf5/kio/smb", "input": "none", "listing": [ "Name", "Type", "Size", "Date", "Access", "Owner", "Group" ], "linking": false, "makedir": true, "maxInstances": 20, "maxInstancesPerHost": 5, "moving": true, "output": "filesystem", "protocol": "smb", "opening": true, + "truncating": true, "reading": true, "writing": true } } }