sftp/server.go

606 lines
15 KiB
Go
Raw Normal View History

2015-07-25 16:19:29 +08:00
package sftp
// sftp server counterpart
import (
"encoding"
"fmt"
"io"
"os"
"path/filepath"
2015-07-25 16:19:29 +08:00
"sync"
"syscall"
2015-09-07 17:13:07 +08:00
"time"
2015-07-25 16:19:29 +08:00
)
const (
sftpServerWorkerCount = 8
)
// Server is an SSH File Transfer Protocol (sftp) server.
// This is intended to provide the sftp subsystem to an ssh server daemon.
// This implementation currently supports most of sftp server protocol version 3,
// as specified at http://tools.ietf.org/html/draft-ietf-secsh-filexfer-02
2015-07-25 16:19:29 +08:00
type Server struct {
in io.Reader
out io.WriteCloser
outMutex *sync.Mutex
2015-07-31 14:43:00 +08:00
debugStream io.Writer
debugLevel int
readOnly bool
2015-07-25 16:19:29 +08:00
rootDir string
2016-01-05 05:15:21 +08:00
lastID uint32
pktChan chan rxPacket
openFiles map[string]*os.File
2015-07-26 16:32:19 +08:00
openFilesLock *sync.RWMutex
handleCount int
2015-08-05 12:11:01 +08:00
maxTxPacket uint32
workerCount int
2015-07-26 16:32:19 +08:00
}
func (svr *Server) nextHandle(f *os.File) string {
2015-07-26 16:32:19 +08:00
svr.openFilesLock.Lock()
defer svr.openFilesLock.Unlock()
svr.handleCount++
handle := fmt.Sprintf("%d", svr.handleCount)
svr.openFiles[handle] = f
2015-07-26 16:32:19 +08:00
return handle
}
func (svr *Server) closeHandle(handle string) error {
svr.openFilesLock.Lock()
defer svr.openFilesLock.Unlock()
if f, ok := svr.openFiles[handle]; ok {
delete(svr.openFiles, handle)
return f.Close()
}
return syscall.EBADF
2015-07-25 16:19:29 +08:00
}
func (svr *Server) getHandle(handle string) (*os.File, bool) {
2015-07-30 08:24:24 +08:00
svr.openFilesLock.RLock()
defer svr.openFilesLock.RUnlock()
f, ok := svr.openFiles[handle]
return f, ok
}
2015-07-25 16:19:29 +08:00
type serverRespondablePacket interface {
encoding.BinaryUnmarshaler
respond(svr *Server) error
}
// NewServer creates a new server instance around the provided streams.
// Various debug output will be written to debugStream, with verbosity set by debugLevel
// A subsequent call to Serve() is required.
func NewServer(in io.Reader, out io.WriteCloser, debugStream io.Writer, debugLevel int, readOnly bool, rootDir string) (*Server, error) {
2015-07-25 16:19:29 +08:00
if rootDir == "" {
wd, err := os.Getwd()
if err != nil {
2015-07-25 16:19:29 +08:00
return nil, err
}
rootDir = wd
2015-07-25 16:19:29 +08:00
}
return &Server{
in: in,
out: out,
outMutex: &sync.Mutex{},
2015-07-31 14:43:00 +08:00
debugStream: debugStream,
debugLevel: debugLevel,
readOnly: readOnly,
2015-07-25 16:19:29 +08:00
rootDir: rootDir,
pktChan: make(chan rxPacket, sftpServerWorkerCount),
openFiles: map[string]*os.File{},
2015-07-26 16:32:19 +08:00
openFilesLock: &sync.RWMutex{},
2015-08-05 12:11:01 +08:00
maxTxPacket: 1 << 15,
workerCount: sftpServerWorkerCount,
2015-07-25 16:19:29 +08:00
}, nil
}
type rxPacket struct {
pktType fxp
pktBytes []byte
}
2015-07-25 16:19:29 +08:00
// Unmarshal a single logical packet from the secure channel
func (svr *Server) rxPackets() error {
defer close(svr.pktChan)
for {
pktType, pktBytes, err := recvPacket(svr.in)
switch err {
case nil:
svr.pktChan <- rxPacket{fxp(pktType), pktBytes}
case io.EOF:
2015-07-25 16:19:29 +08:00
return nil
default:
2015-08-06 14:24:33 +08:00
fmt.Fprintf(svr.debugStream, "recvPacket error: %v\n", err)
2015-07-25 16:19:29 +08:00
return err
}
}
}
// Up to N parallel servers
func (svr *Server) sftpServerWorker(doneChan chan error) {
for pkt := range svr.pktChan {
dPkt, err := svr.decodePacket(pkt.pktType, pkt.pktBytes)
if err != nil {
2015-08-06 14:24:33 +08:00
fmt.Fprintf(svr.debugStream, "decodePacket error: %v\n", err)
doneChan <- err
return
2015-07-25 16:19:29 +08:00
}
//fmt.Fprintf(svr.debugStream, "pkt: %T %v\n", pkt, pkt)
dPkt.respond(svr)
2015-07-25 16:19:29 +08:00
}
doneChan <- nil
2015-07-25 16:19:29 +08:00
}
// Serve serves SFTP connections until the streams stop or the SFTP subsystem
// is stopped.
func (svr *Server) Serve() error {
2015-08-06 14:24:33 +08:00
go svr.rxPackets()
doneChan := make(chan error)
for i := 0; i < svr.workerCount; i++ {
go svr.sftpServerWorker(doneChan)
2015-08-06 14:24:33 +08:00
}
for i := 0; i < svr.workerCount; i++ {
if err := <-doneChan; err != nil {
// abort early and shut down the session on un-decodable packets
break
}
}
// close any still-open files
for handle, file := range svr.openFiles {
fmt.Fprintf(svr.debugStream, "sftp server file with handle '%v' left open: %v\n", handle, file.Name())
file.Close()
}
return svr.out.Close()
2015-08-06 14:24:33 +08:00
}
2015-07-25 16:19:29 +08:00
func (svr *Server) decodePacket(pktType fxp, pktBytes []byte) (serverRespondablePacket, error) {
2016-01-05 05:15:21 +08:00
var pkt serverRespondablePacket
2015-07-25 16:19:29 +08:00
switch pktType {
case ssh_FXP_INIT:
pkt = &sshFxInitPacket{}
case ssh_FXP_LSTAT:
pkt = &sshFxpLstatPacket{}
case ssh_FXP_OPEN:
2015-07-26 16:32:19 +08:00
pkt = &sshFxpOpenPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_CLOSE:
2015-07-26 16:32:19 +08:00
pkt = &sshFxpClosePacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_READ:
2015-07-30 08:24:24 +08:00
pkt = &sshFxpReadPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_WRITE:
2015-07-30 08:37:58 +08:00
pkt = &sshFxpWritePacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_FSTAT:
2015-07-31 00:21:59 +08:00
pkt = &sshFxpFstatPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_SETSTAT:
2015-09-07 17:13:07 +08:00
pkt = &sshFxpSetstatPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_FSETSTAT:
2015-09-07 17:13:07 +08:00
pkt = &sshFxpFsetstatPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_OPENDIR:
2015-08-01 06:46:13 +08:00
pkt = &sshFxpOpendirPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_READDIR:
2015-08-01 06:46:13 +08:00
pkt = &sshFxpReaddirPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_REMOVE:
2015-08-01 06:46:13 +08:00
pkt = &sshFxpRemovePacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_MKDIR:
2015-07-26 10:07:33 +08:00
pkt = &sshFxpMkdirPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_RMDIR:
2015-09-07 16:05:16 +08:00
pkt = &sshFxpRmdirPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_REALPATH:
pkt = &sshFxpRealpathPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_STAT:
pkt = &sshFxpStatPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_RENAME:
2015-08-01 06:46:13 +08:00
pkt = &sshFxpRenamePacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_READLINK:
2015-08-01 06:46:13 +08:00
pkt = &sshFxpReadlinkPacket{}
2015-07-25 16:19:29 +08:00
case ssh_FXP_SYMLINK:
2015-09-07 16:05:16 +08:00
pkt = &sshFxpSymlinkPacket{}
2015-07-25 16:19:29 +08:00
default:
return nil, fmt.Errorf("unhandled packet type: %s", pktType)
2015-07-25 16:19:29 +08:00
}
err := pkt.UnmarshalBinary(pktBytes)
return pkt, err
2015-07-25 16:19:29 +08:00
}
func (p sshFxInitPacket) respond(svr *Server) error {
return svr.sendPacket(sshFxVersionPacket{sftpProtocolVersion, nil})
}
2015-08-01 06:46:13 +08:00
type sshFxpStatResponse struct {
2016-01-05 05:15:21 +08:00
ID uint32
2015-07-25 16:19:29 +08:00
info os.FileInfo
}
2015-08-01 06:46:13 +08:00
func (p sshFxpStatResponse) MarshalBinary() ([]byte, error) {
2015-07-25 16:19:29 +08:00
b := []byte{ssh_FXP_ATTRS}
2016-01-05 05:15:21 +08:00
b = marshalUint32(b, p.ID)
2015-07-25 16:19:29 +08:00
b = marshalFileInfo(b, p.info)
return b, nil
}
func (p sshFxpLstatPacket) respond(svr *Server) error {
// stat the requested file
info, err := os.Lstat(p.Path)
if err != nil {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-07-31 00:21:59 +08:00
}
return svr.sendPacket(sshFxpStatResponse{
2016-01-05 05:15:21 +08:00
ID: p.ID,
info: info,
})
2015-07-31 00:21:59 +08:00
}
func (p sshFxpStatPacket) respond(svr *Server) error {
// stat the requested file
info, err := os.Stat(p.Path)
if err != nil {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
}
return svr.sendPacket(sshFxpStatResponse{
2016-01-05 05:15:21 +08:00
ID: p.ID,
info: info,
})
}
2015-07-31 00:21:59 +08:00
func (p sshFxpFstatPacket) respond(svr *Server) error {
f, ok := svr.getHandle(p.Handle)
if !ok {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EBADF))
}
info, err := f.Stat()
if err != nil {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-07-25 16:19:29 +08:00
}
return svr.sendPacket(sshFxpStatResponse{
2016-01-05 05:15:21 +08:00
ID: p.ID,
info: info,
})
2015-07-25 16:19:29 +08:00
}
2015-07-26 10:07:33 +08:00
func (p sshFxpMkdirPacket) respond(svr *Server) error {
2015-08-01 06:46:13 +08:00
if svr.readOnly {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
2015-08-01 06:46:13 +08:00
}
// TODO FIXME: ignore flags field
err := os.Mkdir(p.Path, 0755)
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-08-01 06:46:13 +08:00
}
2015-09-07 16:05:16 +08:00
func (p sshFxpRmdirPacket) respond(svr *Server) error {
if svr.readOnly {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
2015-09-07 16:05:16 +08:00
}
err := os.Remove(p.Path)
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-09-07 16:05:16 +08:00
}
2015-08-01 06:46:13 +08:00
func (p sshFxpRemovePacket) respond(svr *Server) error {
if svr.readOnly {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
2015-08-01 06:46:13 +08:00
}
err := os.Remove(p.Filename)
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-07-26 10:07:33 +08:00
}
2015-08-01 06:46:13 +08:00
func (p sshFxpRenamePacket) respond(svr *Server) error {
if svr.readOnly {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
2015-08-01 06:46:13 +08:00
}
err := os.Rename(p.Oldpath, p.Newpath)
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-08-01 06:46:13 +08:00
}
2015-09-07 16:05:16 +08:00
func (p sshFxpSymlinkPacket) respond(svr *Server) error {
if svr.readOnly {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
2015-09-07 16:05:16 +08:00
}
err := os.Symlink(p.Targetpath, p.Linkpath)
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-09-07 16:05:16 +08:00
}
var emptyFileStat = []interface{}{uint32(0)}
2015-08-01 06:46:13 +08:00
func (p sshFxpReadlinkPacket) respond(svr *Server) error {
f, err := os.Readlink(p.Path)
if err != nil {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
}
return svr.sendPacket(sshFxpNamePacket{
2016-01-05 05:15:21 +08:00
ID: p.ID,
NameAttrs: []sshFxpNameAttr{{
Name: f,
LongName: f,
Attrs: emptyFileStat,
}},
})
}
func (p sshFxpRealpathPacket) respond(svr *Server) error {
f, err := filepath.Abs(p.Path)
if err != nil {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-08-01 06:46:13 +08:00
}
f = filepath.Clean(f)
return svr.sendPacket(sshFxpNamePacket{
2016-01-05 05:15:21 +08:00
ID: p.ID,
NameAttrs: []sshFxpNameAttr{{
Name: f,
LongName: f,
Attrs: emptyFileStat,
}},
})
2015-08-01 06:46:13 +08:00
}
func (p sshFxpOpendirPacket) respond(svr *Server) error {
return sshFxpOpenPacket{
2016-01-05 05:15:21 +08:00
ID: p.ID,
Path: p.Path,
Pflags: ssh_FXF_READ,
}.respond(svr)
2015-08-01 06:46:13 +08:00
}
2015-07-26 16:32:19 +08:00
func (p sshFxpOpenPacket) respond(svr *Server) error {
var osFlags int
2015-07-26 16:32:19 +08:00
if p.Pflags&ssh_FXF_READ != 0 && p.Pflags&ssh_FXF_WRITE != 0 {
2015-07-31 14:43:00 +08:00
if svr.readOnly {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
2015-07-31 14:43:00 +08:00
}
2015-07-26 16:32:19 +08:00
osFlags |= os.O_RDWR
} else if p.Pflags&ssh_FXF_WRITE != 0 {
2015-07-31 14:43:00 +08:00
if svr.readOnly {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
2015-07-31 14:43:00 +08:00
}
2015-07-26 16:32:19 +08:00
osFlags |= os.O_WRONLY
2015-07-31 14:43:00 +08:00
} else if p.Pflags&ssh_FXF_READ != 0 {
osFlags |= os.O_RDONLY
} else {
// how are they opening?
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EINVAL))
2015-07-31 14:43:00 +08:00
2015-07-26 16:32:19 +08:00
}
2015-07-31 14:43:00 +08:00
2015-07-26 16:32:19 +08:00
if p.Pflags&ssh_FXF_APPEND != 0 {
osFlags |= os.O_APPEND
}
if p.Pflags&ssh_FXF_CREAT != 0 {
osFlags |= os.O_CREATE
}
if p.Pflags&ssh_FXF_TRUNC != 0 {
osFlags |= os.O_TRUNC
}
if p.Pflags&ssh_FXF_EXCL != 0 {
osFlags |= os.O_EXCL
}
f, err := os.OpenFile(p.Path, osFlags, 0644)
if err != nil {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-07-26 16:32:19 +08:00
}
handle := svr.nextHandle(f)
2016-01-05 05:15:21 +08:00
return svr.sendPacket(sshFxpHandlePacket{p.ID, handle})
2015-07-25 16:19:29 +08:00
}
2015-07-26 16:32:19 +08:00
func (p sshFxpClosePacket) respond(svr *Server) error {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, svr.closeHandle(p.Handle)))
2015-07-25 16:19:29 +08:00
}
2015-07-30 08:24:24 +08:00
func (p sshFxpReadPacket) respond(svr *Server) error {
f, ok := svr.getHandle(p.Handle)
if !ok {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EBADF))
2015-07-30 08:37:58 +08:00
}
if p.Len > svr.maxTxPacket {
p.Len = svr.maxTxPacket
}
ret := sshFxpDataPacket{
2016-01-05 05:15:21 +08:00
ID: p.ID,
Length: p.Len,
Data: make([]byte, p.Len),
}
n, err := f.ReadAt(ret.Data, int64(p.Offset))
if err != nil && (err != io.EOF || n == 0) {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
}
ret.Length = uint32(n)
return svr.sendPacket(ret)
2015-07-30 08:37:58 +08:00
}
func (p sshFxpWritePacket) respond(svr *Server) error {
2015-08-01 06:46:13 +08:00
if svr.readOnly {
// shouldn't really get here, the open should have failed
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
2015-08-01 06:46:13 +08:00
}
f, ok := svr.getHandle(p.Handle)
if !ok {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EBADF))
2015-07-30 08:24:24 +08:00
}
_, err := f.WriteAt(p.Data, int64(p.Offset))
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-07-30 08:24:24 +08:00
}
2015-08-01 06:46:13 +08:00
func (p sshFxpReaddirPacket) respond(svr *Server) error {
f, ok := svr.getHandle(p.Handle)
if !ok {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EBADF))
}
2015-08-01 06:46:13 +08:00
dirname := f.Name()
dirents, err := f.Readdir(128)
if err != nil {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
}
2015-08-01 06:46:13 +08:00
2016-01-05 05:15:21 +08:00
ret := sshFxpNamePacket{ID: p.ID}
for _, dirent := range dirents {
ret.NameAttrs = append(ret.NameAttrs, sshFxpNameAttr{
Name: dirent.Name(),
LongName: runLs(dirname, dirent),
Attrs: []interface{}{dirent},
})
2015-08-01 06:46:13 +08:00
}
return svr.sendPacket(ret)
2015-08-01 06:46:13 +08:00
}
2015-09-07 17:13:07 +08:00
func (p sshFxpSetstatPacket) respond(svr *Server) error {
if svr.readOnly {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
}
// additional unmarshalling is required for each possibility here
b := p.Attrs.([]byte)
var err error
debug("setstat name \"%s\"", p.Path)
if (p.Flags & ssh_FILEXFER_ATTR_SIZE) != 0 {
var size uint64
if size, b, err = unmarshalUint64Safe(b); err == nil {
err = os.Truncate(p.Path, int64(size))
2015-09-07 17:13:07 +08:00
}
}
if (p.Flags & ssh_FILEXFER_ATTR_PERMISSIONS) != 0 {
var mode uint32
if mode, b, err = unmarshalUint32Safe(b); err == nil {
err = os.Chmod(p.Path, os.FileMode(mode))
2015-09-07 17:13:07 +08:00
}
}
if (p.Flags & ssh_FILEXFER_ATTR_ACMODTIME) != 0 {
var atime uint32
var mtime uint32
if atime, b, err = unmarshalUint32Safe(b); err != nil {
} else if mtime, b, err = unmarshalUint32Safe(b); err != nil {
} else {
atimeT := time.Unix(int64(atime), 0)
mtimeT := time.Unix(int64(mtime), 0)
err = os.Chtimes(p.Path, atimeT, mtimeT)
2015-09-07 17:13:07 +08:00
}
}
if (p.Flags & ssh_FILEXFER_ATTR_UIDGID) != 0 {
var uid uint32
var gid uint32
if uid, b, err = unmarshalUint32Safe(b); err != nil {
} else if gid, b, err = unmarshalUint32Safe(b); err != nil {
} else {
err = os.Chown(p.Path, int(uid), int(gid))
2015-09-07 17:13:07 +08:00
}
}
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-09-07 17:13:07 +08:00
}
func (p sshFxpFsetstatPacket) respond(svr *Server) error {
if svr.readOnly {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EPERM))
}
f, ok := svr.getHandle(p.Handle)
if !ok {
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, syscall.EBADF))
}
// additional unmarshalling is required for each possibility here
b := p.Attrs.([]byte)
var err error
debug("fsetstat name \"%s\"", f.Name())
if (p.Flags & ssh_FILEXFER_ATTR_SIZE) != 0 {
var size uint64
if size, b, err = unmarshalUint64Safe(b); err == nil {
err = f.Truncate(int64(size))
2015-09-07 17:13:07 +08:00
}
}
if (p.Flags & ssh_FILEXFER_ATTR_PERMISSIONS) != 0 {
var mode uint32
if mode, b, err = unmarshalUint32Safe(b); err == nil {
err = f.Chmod(os.FileMode(mode))
2015-09-07 17:13:07 +08:00
}
}
if (p.Flags & ssh_FILEXFER_ATTR_ACMODTIME) != 0 {
var atime uint32
var mtime uint32
if atime, b, err = unmarshalUint32Safe(b); err != nil {
} else if mtime, b, err = unmarshalUint32Safe(b); err != nil {
} else {
atimeT := time.Unix(int64(atime), 0)
mtimeT := time.Unix(int64(mtime), 0)
err = os.Chtimes(f.Name(), atimeT, mtimeT)
2015-09-07 17:13:07 +08:00
}
}
if (p.Flags & ssh_FILEXFER_ATTR_UIDGID) != 0 {
var uid uint32
var gid uint32
if uid, b, err = unmarshalUint32Safe(b); err != nil {
} else if gid, b, err = unmarshalUint32Safe(b); err != nil {
} else {
err = f.Chown(int(uid), int(gid))
2015-09-07 17:13:07 +08:00
}
}
2016-01-05 05:15:21 +08:00
return svr.sendPacket(statusFromError(p.ID, err))
2015-09-07 17:13:07 +08:00
}
2016-01-05 05:15:21 +08:00
// translateErrno translates a syscall error number to a SFTP error code.
func translateErrno(errno syscall.Errno) uint32 {
switch errno {
case 0:
2015-07-31 14:43:00 +08:00
return ssh_FX_OK
case syscall.ENOENT:
2015-07-31 14:43:00 +08:00
return ssh_FX_NO_SUCH_FILE
case syscall.EPERM:
2015-07-31 14:43:00 +08:00
return ssh_FX_PERMISSION_DENIED
}
return ssh_FX_FAILURE
2015-07-31 14:43:00 +08:00
}
2015-07-25 16:19:29 +08:00
func statusFromError(id uint32, err error) sshFxpStatusPacket {
ret := sshFxpStatusPacket{
2016-01-05 05:15:21 +08:00
ID: id,
2015-07-25 16:19:29 +08:00
StatusError: StatusError{
// ssh_FX_OK = 0
// ssh_FX_EOF = 1
// ssh_FX_NO_SUCH_FILE = 2 ENOENT
// ssh_FX_PERMISSION_DENIED = 3
// ssh_FX_FAILURE = 4
// ssh_FX_BAD_MESSAGE = 5
// ssh_FX_NO_CONNECTION = 6
// ssh_FX_CONNECTION_LOST = 7
// ssh_FX_OP_UNSUPPORTED = 8
2015-07-26 10:07:33 +08:00
Code: ssh_FX_OK,
2015-07-25 16:19:29 +08:00
},
}
2015-07-26 10:07:33 +08:00
if err != nil {
debug("statusFromError: error is %T %#v", err, err)
ret.StatusError.Code = ssh_FX_FAILURE
ret.StatusError.msg = err.Error()
if err == io.EOF {
ret.StatusError.Code = ssh_FX_EOF
2015-07-31 14:43:00 +08:00
} else if errno, ok := err.(syscall.Errno); ok {
2016-01-05 05:15:21 +08:00
ret.StatusError.Code = translateErrno(errno)
2015-07-31 14:43:00 +08:00
} else if pathError, ok := err.(*os.PathError); ok {
2015-07-26 10:07:33 +08:00
debug("statusFromError: error is %T %#v", pathError.Err, pathError.Err)
if errno, ok := pathError.Err.(syscall.Errno); ok {
2016-01-05 05:15:21 +08:00
ret.StatusError.Code = translateErrno(errno)
2015-07-25 16:19:29 +08:00
}
}
}
return ret
}