2013-10-04 10:48:10 +00:00
|
|
|
/* GStreamer
|
|
|
|
* Copyright (C) 2011 Axis Communications <dev-gstreamer@axis.com>
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Library General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Library General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Library General Public
|
|
|
|
* License along with this library; if not, write to the
|
|
|
|
* Free Software Foundation, Inc., 51 Franklin St, Fifth Floor,
|
|
|
|
* Boston, MA 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* SECTION:element-curlsshsink
|
2017-03-08 18:01:13 +00:00
|
|
|
* @title: curlsshsink
|
2013-10-04 10:48:10 +00:00
|
|
|
* @short_description: sink that uploads data to a server using libcurl
|
|
|
|
* @see_also:
|
|
|
|
*
|
|
|
|
* This is a network sink that uses libcurl.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
2014-07-11 19:15:59 +00:00
|
|
|
#include "gstcurlbasesink.h"
|
|
|
|
#include "gstcurlsshsink.h"
|
|
|
|
|
2013-10-04 10:48:10 +00:00
|
|
|
#include <curl/curl.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
|
2014-07-11 11:25:37 +00:00
|
|
|
#ifdef G_OS_WIN32
|
|
|
|
#include <winsock2.h>
|
2014-07-11 11:21:21 +00:00
|
|
|
#else
|
2013-10-04 10:48:10 +00:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/tcp.h>
|
2014-07-11 11:21:21 +00:00
|
|
|
#endif
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <unistd.h>
|
2013-10-04 10:48:10 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
|
|
|
|
/* Default values */
|
|
|
|
#define GST_CAT_DEFAULT gst_curl_ssh_sink_debug
|
|
|
|
|
|
|
|
/* Plugin specific settings */
|
|
|
|
|
|
|
|
GST_DEBUG_CATEGORY_STATIC (gst_curl_ssh_sink_debug);
|
|
|
|
|
|
|
|
enum
|
|
|
|
{
|
|
|
|
PROP_0,
|
|
|
|
PROP_SSH_AUTH_TYPE,
|
|
|
|
PROP_SSH_PUB_KEYFILE,
|
|
|
|
PROP_SSH_PRIV_KEYFILE,
|
|
|
|
PROP_SSH_KEY_PASSPHRASE,
|
|
|
|
PROP_SSH_KNOWNHOSTS,
|
2014-01-28 13:04:11 +00:00
|
|
|
PROP_SSH_HOST_PUBLIC_KEY_MD5,
|
2013-10-04 10:48:10 +00:00
|
|
|
PROP_SSH_ACCEPT_UNKNOWNHOST
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* curl SSH-key matching callback */
|
|
|
|
static gint curl_ssh_sink_sshkey_cb (CURL * easy_handle,
|
|
|
|
const struct curl_khkey *knownkey, const struct curl_khkey *foundkey,
|
|
|
|
enum curl_khmatch, void *clientp);
|
|
|
|
|
|
|
|
|
|
|
|
/* Object class function declarations */
|
|
|
|
|
|
|
|
static void gst_curl_ssh_sink_set_property (GObject * object, guint prop_id,
|
|
|
|
const GValue * value, GParamSpec * pspec);
|
|
|
|
static void gst_curl_ssh_sink_get_property (GObject * object, guint prop_id,
|
|
|
|
GValue * value, GParamSpec * pspec);
|
|
|
|
static void gst_curl_ssh_sink_finalize (GObject * gobject);
|
|
|
|
static gboolean gst_curl_ssh_sink_set_options_unlocked (GstCurlBaseSink *
|
|
|
|
bcsink);
|
|
|
|
|
|
|
|
|
|
|
|
/* private functions */
|
|
|
|
|
|
|
|
#define gst_curl_ssh_sink_parent_class parent_class
|
|
|
|
G_DEFINE_TYPE (GstCurlSshSink, gst_curl_ssh_sink, GST_TYPE_CURL_BASE_SINK);
|
|
|
|
|
|
|
|
/* Register the auth types with the GLib type system */
|
|
|
|
#define GST_TYPE_CURL_SSH_SINK_AUTH_TYPE (gst_curl_ssh_sink_auth_get_type ())
|
|
|
|
static GType
|
|
|
|
gst_curl_ssh_sink_auth_get_type (void)
|
|
|
|
{
|
|
|
|
static GType gtype = 0;
|
|
|
|
|
|
|
|
if (!gtype) {
|
|
|
|
static const GEnumValue auth_types[] = {
|
|
|
|
{GST_CURLSSH_AUTH_NONE, "Not allowed", "none"},
|
|
|
|
{GST_CURLSSH_AUTH_PUBLICKEY, "Public/private key files", "pubkey"},
|
|
|
|
{GST_CURLSSH_AUTH_PASSWORD, "Password authentication", "password"},
|
|
|
|
{0, NULL, NULL}
|
|
|
|
};
|
|
|
|
gtype = g_enum_register_static ("GstCurlSshAuthType", auth_types);
|
|
|
|
}
|
|
|
|
return gtype;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
gst_curl_ssh_sink_class_init (GstCurlSshSinkClass * klass)
|
|
|
|
{
|
|
|
|
GObjectClass *gobject_class = G_OBJECT_CLASS (klass);
|
|
|
|
GstElementClass *element_class = GST_ELEMENT_CLASS (klass);
|
|
|
|
|
|
|
|
GST_DEBUG_CATEGORY_INIT (gst_curl_ssh_sink_debug, "curlsshsink", 0,
|
|
|
|
"curl ssh sink element");
|
|
|
|
|
|
|
|
GST_DEBUG_OBJECT (klass, "class_init");
|
|
|
|
|
|
|
|
gst_element_class_set_static_metadata (element_class,
|
|
|
|
"Curl SSH sink", "Sink/Network",
|
|
|
|
"Upload data over SSH/SFTP using libcurl", "Sorin L. <sorin@axis.com>");
|
|
|
|
|
|
|
|
gobject_class->finalize = GST_DEBUG_FUNCPTR (gst_curl_ssh_sink_finalize);
|
|
|
|
|
|
|
|
gobject_class->set_property = gst_curl_ssh_sink_set_property;
|
|
|
|
gobject_class->get_property = gst_curl_ssh_sink_get_property;
|
|
|
|
|
|
|
|
klass->set_options_unlocked = gst_curl_ssh_sink_set_options_unlocked;
|
|
|
|
|
|
|
|
g_object_class_install_property (gobject_class, PROP_SSH_AUTH_TYPE,
|
|
|
|
g_param_spec_enum ("ssh-auth-type", "SSH authentication type",
|
|
|
|
"SSH authentication method to authenticate on the SSH/SFTP server",
|
|
|
|
GST_TYPE_CURL_SSH_SINK_AUTH_TYPE, GST_CURLSSH_AUTH_NONE,
|
|
|
|
G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS));
|
|
|
|
|
|
|
|
g_object_class_install_property (gobject_class, PROP_SSH_PUB_KEYFILE,
|
|
|
|
g_param_spec_string ("ssh-pub-keyfile",
|
|
|
|
"SSH public key file",
|
|
|
|
"The complete path & filename of the SSH public key file",
|
|
|
|
NULL, G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS));
|
|
|
|
|
|
|
|
g_object_class_install_property (gobject_class, PROP_SSH_PRIV_KEYFILE,
|
|
|
|
g_param_spec_string ("ssh-priv-keyfile",
|
|
|
|
"SSH private key file",
|
|
|
|
"The complete path & filename of the SSH private key file",
|
|
|
|
NULL, G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS));
|
|
|
|
|
|
|
|
g_object_class_install_property (gobject_class, PROP_SSH_KEY_PASSPHRASE,
|
|
|
|
g_param_spec_string ("ssh-key-passphrase", "Passphrase of the priv key",
|
|
|
|
"The passphrase used to protect the SSH private key file",
|
|
|
|
NULL, G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS));
|
|
|
|
|
|
|
|
g_object_class_install_property (gobject_class, PROP_SSH_KNOWNHOSTS,
|
|
|
|
g_param_spec_string ("ssh-knownhosts",
|
|
|
|
"SSH known hosts",
|
|
|
|
"The complete path & filename of the SSH 'known_hosts' file",
|
|
|
|
NULL, G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS));
|
|
|
|
|
2014-01-28 13:04:11 +00:00
|
|
|
g_object_class_install_property (gobject_class, PROP_SSH_HOST_PUBLIC_KEY_MD5,
|
|
|
|
g_param_spec_string ("ssh-host-pubkey-md5",
|
|
|
|
"MD5 checksum of the remote host's public key",
|
|
|
|
"MD5 checksum (32 hexadecimal digits, case-insensitive) of the "
|
|
|
|
"remote host's public key",
|
|
|
|
NULL, G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS));
|
|
|
|
|
2013-10-04 10:48:10 +00:00
|
|
|
g_object_class_install_property (gobject_class, PROP_SSH_ACCEPT_UNKNOWNHOST,
|
|
|
|
g_param_spec_boolean ("ssh-accept-unknownhost",
|
|
|
|
"SSH accept unknown host",
|
|
|
|
"Accept an unknown remote public host key",
|
|
|
|
FALSE, G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
gst_curl_ssh_sink_init (GstCurlSshSink * sink)
|
|
|
|
{
|
2014-06-12 14:59:46 +00:00
|
|
|
sink->ssh_auth_type = GST_CURLSSH_AUTH_NONE;
|
2013-10-04 10:48:10 +00:00
|
|
|
sink->ssh_pub_keyfile = NULL;
|
|
|
|
sink->ssh_priv_keyfile = NULL;
|
|
|
|
sink->ssh_key_passphrase = NULL;
|
|
|
|
sink->ssh_knownhosts = NULL;
|
2014-01-28 13:04:11 +00:00
|
|
|
sink->ssh_host_public_key_md5 = NULL;
|
2013-10-04 10:48:10 +00:00
|
|
|
sink->ssh_accept_unknownhost = FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
gst_curl_ssh_sink_finalize (GObject * gobject)
|
|
|
|
{
|
|
|
|
GstCurlSshSink *this = GST_CURL_SSH_SINK (gobject);
|
|
|
|
|
|
|
|
GST_DEBUG ("finalizing curlsshsink");
|
|
|
|
|
|
|
|
g_free (this->ssh_pub_keyfile);
|
|
|
|
g_free (this->ssh_priv_keyfile);
|
|
|
|
g_free (this->ssh_key_passphrase);
|
|
|
|
g_free (this->ssh_knownhosts);
|
2014-01-28 13:04:11 +00:00
|
|
|
g_free (this->ssh_host_public_key_md5);
|
2013-10-04 10:48:10 +00:00
|
|
|
|
|
|
|
G_OBJECT_CLASS (parent_class)->finalize (gobject);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
gst_curl_ssh_sink_set_property (GObject * object, guint prop_id,
|
|
|
|
const GValue * value, GParamSpec * pspec)
|
|
|
|
{
|
|
|
|
GstCurlSshSink *sink;
|
|
|
|
GstState cur_state;
|
|
|
|
|
|
|
|
g_return_if_fail (GST_IS_CURL_SSH_SINK (object));
|
|
|
|
sink = GST_CURL_SSH_SINK (object);
|
|
|
|
|
|
|
|
gst_element_get_state (GST_ELEMENT (sink), &cur_state, NULL, 0);
|
|
|
|
|
|
|
|
if (cur_state == GST_STATE_PLAYING || cur_state == GST_STATE_PAUSED) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
GST_OBJECT_LOCK (sink);
|
|
|
|
switch (prop_id) {
|
|
|
|
case PROP_SSH_AUTH_TYPE:
|
|
|
|
sink->ssh_auth_type = g_value_get_enum (value);
|
|
|
|
GST_DEBUG_OBJECT (sink, "ssh_auth_type set to %d", sink->ssh_auth_type);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PROP_SSH_PUB_KEYFILE:
|
|
|
|
g_free (sink->ssh_pub_keyfile);
|
|
|
|
sink->ssh_pub_keyfile = g_value_dup_string (value);
|
|
|
|
GST_DEBUG_OBJECT (sink, "ssh_pub_keyfile set to %s",
|
|
|
|
sink->ssh_pub_keyfile);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PROP_SSH_PRIV_KEYFILE:
|
|
|
|
g_free (sink->ssh_priv_keyfile);
|
|
|
|
sink->ssh_priv_keyfile = g_value_dup_string (value);
|
|
|
|
GST_DEBUG_OBJECT (sink, "ssh_priv_keyfile set to %s",
|
|
|
|
sink->ssh_priv_keyfile);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PROP_SSH_KEY_PASSPHRASE:
|
|
|
|
g_free (sink->ssh_key_passphrase);
|
|
|
|
sink->ssh_key_passphrase = g_value_dup_string (value);
|
|
|
|
GST_DEBUG_OBJECT (sink, "ssh_key_passphrase set to %s",
|
|
|
|
sink->ssh_key_passphrase);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PROP_SSH_KNOWNHOSTS:
|
|
|
|
g_free (sink->ssh_knownhosts);
|
|
|
|
sink->ssh_knownhosts = g_value_dup_string (value);
|
|
|
|
GST_DEBUG_OBJECT (sink, "ssh_knownhosts set to %s", sink->ssh_knownhosts);
|
|
|
|
break;
|
|
|
|
|
2014-01-28 13:04:11 +00:00
|
|
|
case PROP_SSH_HOST_PUBLIC_KEY_MD5:
|
|
|
|
g_free (sink->ssh_host_public_key_md5);
|
|
|
|
sink->ssh_host_public_key_md5 = g_value_dup_string (value);
|
|
|
|
GST_DEBUG_OBJECT (sink, "ssh_host_public_key_md5 set to %s",
|
|
|
|
sink->ssh_host_public_key_md5);
|
|
|
|
break;
|
|
|
|
|
2013-10-04 10:48:10 +00:00
|
|
|
case PROP_SSH_ACCEPT_UNKNOWNHOST:
|
|
|
|
sink->ssh_accept_unknownhost = g_value_get_boolean (value);
|
|
|
|
GST_DEBUG_OBJECT (sink, "ssh_accept_unknownhost set to %d",
|
|
|
|
sink->ssh_accept_unknownhost);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
GST_DEBUG_OBJECT (sink, "invalid property id %d", prop_id);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
GST_OBJECT_UNLOCK (sink);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
gst_curl_ssh_sink_get_property (GObject * object, guint prop_id,
|
|
|
|
GValue * value, GParamSpec * pspec)
|
|
|
|
{
|
|
|
|
GstCurlSshSink *sink;
|
|
|
|
|
|
|
|
g_return_if_fail (GST_IS_CURL_SSH_SINK (object));
|
|
|
|
sink = GST_CURL_SSH_SINK (object);
|
|
|
|
|
|
|
|
switch (prop_id) {
|
|
|
|
case PROP_SSH_AUTH_TYPE:
|
|
|
|
g_value_set_enum (value, sink->ssh_auth_type);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PROP_SSH_PUB_KEYFILE:
|
|
|
|
g_value_set_string (value, sink->ssh_pub_keyfile);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PROP_SSH_PRIV_KEYFILE:
|
|
|
|
g_value_set_string (value, sink->ssh_priv_keyfile);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PROP_SSH_KEY_PASSPHRASE:
|
|
|
|
g_value_set_string (value, sink->ssh_key_passphrase);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PROP_SSH_KNOWNHOSTS:
|
|
|
|
g_value_set_string (value, sink->ssh_knownhosts);
|
|
|
|
break;
|
|
|
|
|
2014-01-28 13:04:11 +00:00
|
|
|
case PROP_SSH_HOST_PUBLIC_KEY_MD5:
|
|
|
|
g_value_set_string (value, sink->ssh_host_public_key_md5);
|
|
|
|
break;
|
|
|
|
|
2013-10-04 10:48:10 +00:00
|
|
|
case PROP_SSH_ACCEPT_UNKNOWNHOST:
|
|
|
|
g_value_set_boolean (value, sink->ssh_accept_unknownhost);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
GST_DEBUG_OBJECT (sink, "invalid property id");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static gboolean
|
|
|
|
gst_curl_ssh_sink_set_options_unlocked (GstCurlBaseSink * bcsink)
|
|
|
|
{
|
|
|
|
GstCurlSshSink *sink = GST_CURL_SSH_SINK (bcsink);
|
2014-05-20 15:09:43 +00:00
|
|
|
CURLcode curl_err = CURLE_OK;
|
2013-10-04 10:48:10 +00:00
|
|
|
|
|
|
|
/* set SSH specific options here */
|
|
|
|
if (sink->ssh_pub_keyfile) {
|
|
|
|
if ((curl_err = curl_easy_setopt (bcsink->curl, CURLOPT_SSH_PUBLIC_KEYFILE,
|
|
|
|
sink->ssh_pub_keyfile)) != CURLE_OK) {
|
2014-05-20 15:09:43 +00:00
|
|
|
bcsink->error = g_strdup_printf ("failed to set public key file: %s",
|
|
|
|
curl_easy_strerror (curl_err));
|
2013-10-04 10:48:10 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sink->ssh_priv_keyfile) {
|
|
|
|
if ((curl_err = curl_easy_setopt (bcsink->curl, CURLOPT_SSH_PRIVATE_KEYFILE,
|
|
|
|
sink->ssh_priv_keyfile)) != CURLE_OK) {
|
2014-05-20 15:09:43 +00:00
|
|
|
bcsink->error = g_strdup_printf ("failed to set private key file: %s",
|
|
|
|
curl_easy_strerror (curl_err));
|
2013-10-04 10:48:10 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sink->ssh_knownhosts) {
|
|
|
|
if ((curl_err = curl_easy_setopt (bcsink->curl, CURLOPT_SSH_KNOWNHOSTS,
|
|
|
|
sink->ssh_knownhosts)) != CURLE_OK) {
|
2014-05-20 15:09:43 +00:00
|
|
|
bcsink->error = g_strdup_printf ("failed to set known_hosts file: %s",
|
|
|
|
curl_easy_strerror (curl_err));
|
2013-10-04 10:48:10 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-28 13:04:11 +00:00
|
|
|
if (sink->ssh_host_public_key_md5) {
|
|
|
|
/* libcurl is freaking tricky. If the input string is not exactly 32
|
|
|
|
* hexdigits long it silently ignores CURLOPT_SSH_HOST_PUBLIC_KEY_MD5 and
|
|
|
|
* performs the transfer without authenticating the server! */
|
|
|
|
if (strlen (sink->ssh_host_public_key_md5) != 32) {
|
2014-05-20 15:09:43 +00:00
|
|
|
bcsink->error = g_strdup ("MD5-hash string has invalid length, "
|
|
|
|
"must be exactly 32 hexdigits!");
|
2014-01-28 13:04:11 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((curl_err =
|
|
|
|
curl_easy_setopt (bcsink->curl, CURLOPT_SSH_HOST_PUBLIC_KEY_MD5,
|
|
|
|
sink->ssh_host_public_key_md5)) != CURLE_OK) {
|
2014-05-20 15:09:43 +00:00
|
|
|
bcsink->error = g_strdup_printf ("failed to set remote host's public "
|
|
|
|
"key MD5: %s", curl_easy_strerror (curl_err));
|
2014-01-28 13:04:11 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-04 10:48:10 +00:00
|
|
|
/* make sure we only accept PASSWORD or PUBLICKEY auth methods
|
|
|
|
* (can be extended later) */
|
2014-06-12 14:59:46 +00:00
|
|
|
if (sink->ssh_auth_type == GST_CURLSSH_AUTH_PASSWORD ||
|
|
|
|
sink->ssh_auth_type == GST_CURLSSH_AUTH_PUBLICKEY) {
|
2013-10-04 10:48:10 +00:00
|
|
|
|
|
|
|
/* set the SSH_AUTH_TYPE */
|
|
|
|
if ((curl_err = curl_easy_setopt (bcsink->curl, CURLOPT_SSH_AUTH_TYPES,
|
|
|
|
sink->ssh_auth_type)) != CURLE_OK) {
|
2014-05-20 15:09:43 +00:00
|
|
|
bcsink->error = g_strdup_printf ("failed to set authentication type: %s",
|
|
|
|
curl_easy_strerror (curl_err));
|
2013-10-04 10:48:10 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* if key authentication -> provide the private key passphrase as well */
|
2014-06-12 14:59:46 +00:00
|
|
|
if (sink->ssh_auth_type == GST_CURLSSH_AUTH_PUBLICKEY) {
|
2013-10-04 10:48:10 +00:00
|
|
|
if (sink->ssh_key_passphrase) {
|
|
|
|
if ((curl_err = curl_easy_setopt (bcsink->curl, CURLOPT_KEYPASSWD,
|
|
|
|
sink->ssh_key_passphrase)) != CURLE_OK) {
|
2014-05-20 15:09:43 +00:00
|
|
|
bcsink->error = g_strdup_printf ("failed to set private key "
|
|
|
|
"passphrase: %s", curl_easy_strerror (curl_err));
|
2013-10-04 10:48:10 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* The user did not provide the passphrase for the private key.
|
|
|
|
* This can still be a valid situation, if (s)he chose not to
|
|
|
|
* protect the private key with a passphrase - but not recommended! */
|
|
|
|
GST_WARNING_OBJECT (sink, "Warning: key authentication chosen but "
|
|
|
|
"'ssh-key-passphrase' not provided!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
2014-05-20 15:09:43 +00:00
|
|
|
bcsink->error = g_strdup_printf ("Error: unsupported authentication type: "
|
|
|
|
"%d.", sink->ssh_auth_type);
|
2013-10-04 10:48:10 +00:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Install the SSH_KEYFUNCTION callback...
|
|
|
|
* IMPORTANT: this callback gets called only if CURLOPT_SSH_KNOWNHOSTS
|
|
|
|
* is also set! */
|
|
|
|
if ((curl_err = curl_easy_setopt (bcsink->curl, CURLOPT_SSH_KEYFUNCTION,
|
|
|
|
curl_ssh_sink_sshkey_cb)) != CURLE_OK) {
|
2014-05-20 15:09:43 +00:00
|
|
|
bcsink->error = g_strdup_printf ("failed to set SSH_KEYFUNCTION callback: "
|
|
|
|
"%s", curl_easy_strerror (curl_err));
|
2013-10-04 10:48:10 +00:00
|
|
|
return FALSE;
|
2015-07-06 14:24:06 +00:00
|
|
|
}
|
|
|
|
/* SSH_KEYFUNCTION callback successfully installed so go on and
|
|
|
|
* set the '*clientp' parameter as well */
|
|
|
|
if ((curl_err =
|
|
|
|
curl_easy_setopt (bcsink->curl, CURLOPT_SSH_KEYDATA,
|
|
|
|
sink)) != CURLE_OK) {
|
|
|
|
bcsink->error = g_strdup_printf ("failed to set CURLOPT_SSH_KEYDATA: %s",
|
|
|
|
curl_easy_strerror (curl_err));
|
|
|
|
return FALSE;
|
2013-10-04 10:48:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* A 'curl_sshkey_cb' callback function. It gets called when the known_host
|
|
|
|
* matching has been done, to allow the application to act and decide for
|
|
|
|
* libcurl how to proceed.
|
|
|
|
* The callback will only be called if CURLOPT_SSH_KNOWNHOSTS is also set!
|
|
|
|
* NOTE:
|
|
|
|
* * use CURLOPT_SSH_KEYFUNCTION to install the callback func
|
|
|
|
* * use CURLOPT_SSH_KEYDATA to pass in the actual "*clientp"
|
|
|
|
*/
|
|
|
|
static gint
|
|
|
|
curl_ssh_sink_sshkey_cb (CURL * easy_handle, /* easy handle */
|
|
|
|
const struct curl_khkey *knownkey, /* known - key from known_hosts */
|
|
|
|
const struct curl_khkey *foundkey, /* found - key from remote end */
|
|
|
|
enum curl_khmatch match, /* libcurl's view on the keys */
|
|
|
|
void *clientp)
|
|
|
|
{
|
|
|
|
GstCurlSshSink *sink = (GstCurlSshSink *) clientp;
|
|
|
|
|
|
|
|
/* the default action to be taken upon pub key matching */
|
|
|
|
guint res_action = CURLKHSTAT_REJECT;
|
|
|
|
|
|
|
|
switch (match) {
|
|
|
|
case CURLKHMATCH_OK:
|
|
|
|
res_action = CURLKHSTAT_FINE;
|
|
|
|
GST_INFO_OBJECT (sink,
|
|
|
|
"Remote public host key is matching known_hosts, OK to proceed.");
|
|
|
|
break;
|
|
|
|
|
|
|
|
case CURLKHMATCH_MISMATCH:
|
|
|
|
GST_WARNING_OBJECT (sink,
|
|
|
|
"Remote public host key mismatch in known_hosts, aborting "
|
|
|
|
"connection.");
|
|
|
|
/* Reject the connection. The old mismatching key has to be manually
|
|
|
|
* removed from 'known_hosts' before being able to connect again to
|
|
|
|
* the respective host. */
|
|
|
|
break;
|
|
|
|
|
|
|
|
case CURLKHMATCH_MISSING:
|
|
|
|
GST_OBJECT_LOCK (sink);
|
|
|
|
if (sink->ssh_accept_unknownhost == TRUE) {
|
|
|
|
/* the key was not found in known_hosts but the user chose to
|
|
|
|
* accept it */
|
|
|
|
res_action = CURLKHSTAT_FINE_ADD_TO_FILE;
|
|
|
|
GST_INFO_OBJECT (sink, "Accepting and adding new public host key to "
|
|
|
|
"known_hosts.");
|
|
|
|
} else {
|
|
|
|
/* the key was not found in known_hosts and the user chose not
|
|
|
|
* to accept connections to unknown hosts */
|
|
|
|
GST_WARNING_OBJECT (sink,
|
|
|
|
"Remote public host key is unknown, rejecting connection.");
|
|
|
|
}
|
|
|
|
GST_OBJECT_UNLOCK (sink);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
/* something went wrong, we got some bogus key match result */
|
2014-05-20 15:09:43 +00:00
|
|
|
GST_CURL_BASE_SINK (sink)->error =
|
|
|
|
g_strdup ("libcurl internal error during known_host matching");
|
2013-10-04 10:48:10 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return res_action;
|
|
|
|
}
|