ssh.c 19.1 KB
Newer Older
Brad Morgan committed
1 2 3 4 5 6 7
/*
 * Copyright (C) the libgit2 contributors. All rights reserved.
 *
 * This file is part of libgit2, distributed under the GNU GPL v2 with
 * a Linking Exception. For full terms see the included COPYING file.
 */

8 9 10 11
#ifdef GIT_SSH
#include <libssh2.h>
#endif

Brad Morgan committed
12 13 14
#include "git2.h"
#include "buffer.h"
#include "netops.h"
Brad Morgan committed
15
#include "smart.h"
16
#include "cred.h"
17
#include "socket_stream.h"
18
#include "ssh.h"
Brad Morgan committed
19

20 21
#ifdef GIT_SSH

Brad Morgan committed
22 23
#define OWNING_SUBTRANSPORT(s) ((ssh_subtransport *)(s)->parent.subtransport)

24
static const char *ssh_prefixes[] = { "ssh://", "ssh+git://", "git+ssh://" };
25

Brad Morgan committed
26 27 28 29 30
static const char cmd_uploadpack[] = "git-upload-pack";
static const char cmd_receivepack[] = "git-receive-pack";

typedef struct {
	git_smart_subtransport_stream parent;
31
	git_stream *io;
Brad Morgan committed
32 33
	LIBSSH2_SESSION *session;
	LIBSSH2_CHANNEL *channel;
Brad Morgan committed
34 35 36 37 38 39 40
	const char *cmd;
	char *url;
	unsigned sent_command : 1;
} ssh_stream;

typedef struct {
	git_smart_subtransport parent;
Brad Morgan committed
41
	transport_smart *owner;
Brad Morgan committed
42
	ssh_stream *current_stream;
Brad Morgan committed
43
	git_cred *cred;
44 45
	char *cmd_uploadpack;
	char *cmd_receivepack;
Brad Morgan committed
46 47
} ssh_subtransport;

48
static int list_auth_methods(int *out, LIBSSH2_SESSION *session, const char *username);
49

50 51 52 53 54 55 56 57
static void ssh_error(LIBSSH2_SESSION *session, const char *errmsg)
{
	char *ssherr;
	libssh2_session_last_error(session, &ssherr, NULL, 0);

	giterr_set(GITERR_SSH, "%s: %s", errmsg, ssherr);
}

Brad Morgan committed
58 59 60
/*
 * Create a git protocol request.
 *
Brad Morgan committed
61
 * For example: git-upload-pack '/libgit2/libgit2'
Brad Morgan committed
62
 */
63
static int gen_proto(git_buf *request, const char *cmd, const char *url)
Brad Morgan committed
64
{
65
	char *repo;
66
	int len;
67
	size_t i;
68

69
	for (i = 0; i < ARRAY_SIZE(ssh_prefixes); ++i) {
70 71 72 73 74 75 76 77 78 79
		const char *p = ssh_prefixes[i];

		if (!git__prefixcmp(url, p)) {
			url = url + strlen(p);
			repo = strchr(url, '/');
			if (repo && repo[1] == '~')
				++repo;

			goto done;
		}
80
	}
81 82
	repo = strchr(url, ':');
	if (repo) repo++;
83

84
done:
85
	if (!repo) {
86
		giterr_set(GITERR_NET, "Malformed git protocol URL");
87 88
		return -1;
	}
89

90
	len = strlen(cmd) + 1 /* Space */ + 1 /* Quote */ + strlen(repo) + 1 /* Quote */ + 1;
91

Brad Morgan committed
92
	git_buf_grow(request, len);
Brad Morgan committed
93
	git_buf_printf(request, "%s '%s'", cmd, repo);
Brad Morgan committed
94
	git_buf_putc(request, '\0');
95

Brad Morgan committed
96 97
	if (git_buf_oom(request))
		return -1;
98

Brad Morgan committed
99 100 101
	return 0;
}

Brad Morgan committed
102
static int send_command(ssh_stream *s)
Brad Morgan committed
103 104 105
{
	int error;
	git_buf request = GIT_BUF_INIT;
106

107
	error = gen_proto(&request, s->cmd, s->url);
Brad Morgan committed
108 109
	if (error < 0)
		goto cleanup;
110

111
	error = libssh2_channel_exec(s->channel, request.ptr);
112 113
	if (error < LIBSSH2_ERROR_NONE) {
		ssh_error(s->session, "SSH could not execute request");
Brad Morgan committed
114
		goto cleanup;
115
	}
116

Brad Morgan committed
117
	s->sent_command = 1;
118

Brad Morgan committed
119 120 121 122 123
cleanup:
	git_buf_free(&request);
	return error;
}

Brad Morgan committed
124 125 126 127 128
static int ssh_stream_read(
	git_smart_subtransport_stream *stream,
	char *buffer,
	size_t buf_size,
	size_t *bytes_read)
Brad Morgan committed
129
{
130
	int rc;
Brad Morgan committed
131
	ssh_stream *s = (ssh_stream *)stream;
132

Brad Morgan committed
133
	*bytes_read = 0;
134

Brad Morgan committed
135 136
	if (!s->sent_command && send_command(s) < 0)
		return -1;
137

138
	if ((rc = libssh2_channel_read(s->channel, buffer, buf_size)) < LIBSSH2_ERROR_NONE) {
139
		ssh_error(s->session, "SSH could not read data");
Brad Morgan committed
140
		return -1;
141
	}
142

143 144 145 146 147
	/*
	 * If we can't get anything out of stdout, it's typically a
	 * not-found error, so read from stderr and signal EOF on
	 * stderr.
	 */
148 149 150 151 152 153 154 155
	if (rc == 0) {
		if ((rc = libssh2_channel_read_stderr(s->channel, buffer, buf_size)) > 0) {
			giterr_set(GITERR_SSH, "%*s", rc, buffer);
			return GIT_EEOF;
		} else if (rc < LIBSSH2_ERROR_NONE) {
			ssh_error(s->session, "SSH could not read stderr");
			return -1;
		}
156 157 158
	}


Brad Morgan committed
159
	*bytes_read = rc;
160

Brad Morgan committed
161 162 163
	return 0;
}

Brad Morgan committed
164 165 166 167
static int ssh_stream_write(
	git_smart_subtransport_stream *stream,
	const char *buffer,
	size_t len)
Brad Morgan committed
168
{
Brad Morgan committed
169
	ssh_stream *s = (ssh_stream *)stream;
170 171
	size_t off = 0;
	ssize_t ret = 0;
172

Brad Morgan committed
173 174
	if (!s->sent_command && send_command(s) < 0)
		return -1;
175

176 177 178 179 180 181 182 183 184 185
	do {
		ret = libssh2_channel_write(s->channel, buffer + off, len - off);
		if (ret < 0)
			break;

		off += ret;

	} while (off < len);

	if (ret < 0) {
186
		ssh_error(s->session, "SSH could not write data");
Brad Morgan committed
187 188
		return -1;
	}
189

190
	return 0;
Brad Morgan committed
191 192
}

Brad Morgan committed
193
static void ssh_stream_free(git_smart_subtransport_stream *stream)
Brad Morgan committed
194
{
Brad Morgan committed
195
	ssh_stream *s = (ssh_stream *)stream;
196
	ssh_subtransport *t;
197

198 199
	if (!stream)
		return;
200

201
	t = OWNING_SUBTRANSPORT(s);
Brad Morgan committed
202
	t->current_stream = NULL;
203

Brad Morgan committed
204 205
	if (s->channel) {
		libssh2_channel_close(s->channel);
206 207
		libssh2_channel_free(s->channel);
		s->channel = NULL;
Brad Morgan committed
208
	}
209

Brad Morgan committed
210
	if (s->session) {
211 212
		libssh2_session_free(s->session);
		s->session = NULL;
Brad Morgan committed
213
	}
214

215 216 217 218
	if (s->io) {
		git_stream_close(s->io);
		git_stream_free(s->io);
		s->io = NULL;
Brad Morgan committed
219
	}
220

Brad Morgan committed
221 222 223 224
	git__free(s->url);
	git__free(s);
}

Brad Morgan committed
225 226 227 228 229
static int ssh_stream_alloc(
	ssh_subtransport *t,
	const char *url,
	const char *cmd,
	git_smart_subtransport_stream **stream)
Brad Morgan committed
230
{
Brad Morgan committed
231
	ssh_stream *s;
232

233
	assert(stream);
234

Brad Morgan committed
235
	s = git__calloc(sizeof(ssh_stream), 1);
Brad Morgan committed
236
	GITERR_CHECK_ALLOC(s);
237

Brad Morgan committed
238
	s->parent.subtransport = &t->parent;
Brad Morgan committed
239 240 241
	s->parent.read = ssh_stream_read;
	s->parent.write = ssh_stream_write;
	s->parent.free = ssh_stream_free;
242

Brad Morgan committed
243
	s->cmd = cmd;
244

245
	s->url = git__strdup(url);
Brad Morgan committed
246 247 248 249
	if (!s->url) {
		git__free(s);
		return -1;
	}
250

Brad Morgan committed
251 252 253 254
	*stream = &s->parent;
	return 0;
}

255
static int git_ssh_extract_url_parts(
Brad Morgan committed
256 257 258 259 260 261
	char **host,
	char **username,
	const char *url)
{
	char *colon, *at;
	const char *start;
262

263
	colon = strchr(url, ':');
264 265


266
	at = strchr(url, '@');
Brad Morgan committed
267
	if (at) {
Etienne Samson committed
268
		start = at + 1;
Brad Morgan committed
269
		*username = git__substrdup(url, at - url);
270
		GITERR_CHECK_ALLOC(*username);
Brad Morgan committed
271
	} else {
272
		start = url;
273
		*username = NULL;
Brad Morgan committed
274
	}
275

276 277 278 279 280
	if (colon == NULL || (colon < start)) {
		giterr_set(GITERR_NET, "Malformed URL");
		return -1;
	}

Brad Morgan committed
281
	*host = git__substrdup(start, colon - start);
282
	GITERR_CHECK_ALLOC(*host);
283

Brad Morgan committed
284 285 286
	return 0;
}

287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312
static int ssh_agent_auth(LIBSSH2_SESSION *session, git_cred_ssh_key *c) {
	int rc = LIBSSH2_ERROR_NONE;

	struct libssh2_agent_publickey *curr, *prev = NULL;

	LIBSSH2_AGENT *agent = libssh2_agent_init(session);

	if (agent == NULL)
		return -1;

	rc = libssh2_agent_connect(agent);

	if (rc != LIBSSH2_ERROR_NONE)
		goto shutdown;

	rc = libssh2_agent_list_identities(agent);

	if (rc != LIBSSH2_ERROR_NONE)
		goto shutdown;

	while (1) {
		rc = libssh2_agent_get_identity(agent, &curr, prev);

		if (rc < 0)
			goto shutdown;

313 314 315 316 317 318
		/* rc is set to 1 whenever the ssh agent ran out of keys to check.
		 * Set the error code to authentication failure rather than erroring
		 * out with an untranslatable error code.
		 */
		if (rc == 1) {
			rc = LIBSSH2_ERROR_AUTHENTICATION_FAILED;
319
			goto shutdown;
320
		}
321 322 323 324 325 326 327 328 329 330

		rc = libssh2_agent_userauth(agent, c->username, curr);

		if (rc == 0)
			break;

		prev = curr;
	}

shutdown:
331 332 333 334

	if (rc != LIBSSH2_ERROR_NONE)
		ssh_error(session, "error authenticating");

335 336 337 338 339 340
	libssh2_agent_disconnect(agent);
	libssh2_agent_free(agent);

	return rc;
}

341 342
static int _git_ssh_authenticate_session(
	LIBSSH2_SESSION* session,
343
	git_cred* cred)
344 345
{
	int rc;
346

347
	do {
348
		giterr_clear();
349
		switch (cred->credtype) {
350 351
		case GIT_CREDTYPE_USERPASS_PLAINTEXT: {
			git_cred_userpass_plaintext *c = (git_cred_userpass_plaintext *)cred;
352
			rc = libssh2_userauth_password(session, c->username, c->password);
353 354
			break;
		}
355 356
		case GIT_CREDTYPE_SSH_KEY: {
			git_cred_ssh_key *c = (git_cred_ssh_key *)cred;
357 358 359 360 361 362 363 364

			if (c->privatekey)
				rc = libssh2_userauth_publickey_fromfile(
					session, c->username, c->publickey,
					c->privatekey, c->passphrase);
			else
				rc = ssh_agent_auth(session, c);

365 366
			break;
		}
367 368
		case GIT_CREDTYPE_SSH_CUSTOM: {
			git_cred_ssh_custom *c = (git_cred_ssh_custom *)cred;
369

370
			rc = libssh2_userauth_publickey(
371
				session, c->username, (const unsigned char *)c->publickey,
372
				c->publickey_len, c->sign_callback, &c->payload);
373 374
			break;
		}
375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395
		case GIT_CREDTYPE_SSH_INTERACTIVE: {
			void **abstract = libssh2_session_abstract(session);
			git_cred_ssh_interactive *c = (git_cred_ssh_interactive *)cred;

			/* ideally, we should be able to set this by calling
			 * libssh2_session_init_ex() instead of libssh2_session_init().
			 * libssh2's API is inconsistent here i.e. libssh2_userauth_publickey()
			 * allows you to pass the `abstract` as part of the call, whereas
			 * libssh2_userauth_keyboard_interactive() does not!
			 *
			 * The only way to set the `abstract` pointer is by calling
			 * libssh2_session_abstract(), which will replace the existing
			 * pointer as is done below. This is safe for now (at time of writing),
			 * but may not be valid in future.
			 */
			*abstract = c->payload;

			rc = libssh2_userauth_keyboard_interactive(
				session, c->username, c->prompt_callback);
			break;
		}
396 397 398 399
#ifdef GIT_SSH_MEMORY_CREDENTIALS
		case GIT_CREDTYPE_SSH_MEMORY: {
			git_cred_ssh_key *c = (git_cred_ssh_key *)cred;

400 401 402
			assert(c->username);
			assert(c->privatekey);

403 404 405 406 407
			rc = libssh2_userauth_publickey_frommemory(
				session,
				c->username,
				strlen(c->username),
				c->publickey,
408
				c->publickey ? strlen(c->publickey) : 0,
409 410 411 412 413 414
				c->privatekey,
				strlen(c->privatekey),
				c->passphrase);
			break;
		}
#endif
415 416
		default:
			rc = LIBSSH2_ERROR_AUTHENTICATION_FAILED;
417
		}
Etienne Samson committed
418
	} while (LIBSSH2_ERROR_EAGAIN == rc || LIBSSH2_ERROR_TIMEOUT == rc);
419

420 421 422
        if (rc == LIBSSH2_ERROR_PASSWORD_EXPIRED || rc == LIBSSH2_ERROR_AUTHENTICATION_FAILED)
                return GIT_EAUTH;

423
	if (rc != LIBSSH2_ERROR_NONE) {
424 425
		if (!giterr_last())
			ssh_error(session, "Failed to authenticate SSH session");
426 427 428 429
		return -1;
	}

	return 0;
430 431
}

432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457
static int request_creds(git_cred **out, ssh_subtransport *t, const char *user, int auth_methods)
{
	int error, no_callback = 0;
	git_cred *cred = NULL;

	if (!t->owner->cred_acquire_cb) {
		no_callback = 1;
	} else {
		error = t->owner->cred_acquire_cb(&cred, t->owner->url, user, auth_methods,
						  t->owner->cred_acquire_payload);

		if (error == GIT_PASSTHROUGH)
			no_callback = 1;
		else if (error < 0)
			return error;
		else if (!cred) {
			giterr_set(GITERR_SSH, "Callback failed to initialize SSH credentials");
			return -1;
		}
	}

	if (no_callback) {
		giterr_set(GITERR_SSH, "authentication required but no callback set");
		return -1;
	}

458 459 460 461 462 463
	if (!(cred->credtype & auth_methods)) {
		cred->free(cred);
		giterr_set(GITERR_SSH, "callback returned unsupported credentials type");
		return -1;
	}

464 465 466 467 468
	*out = cred;

	return 0;
}

Etienne Samson committed
469
static int _git_ssh_session_create(
Brad Morgan committed
470
	LIBSSH2_SESSION** session,
471
	git_stream *io)
Brad Morgan committed
472
{
473 474
	int rc = 0;
	LIBSSH2_SESSION* s;
475
	git_socket_stream *socket = (git_socket_stream *) io;
476

477 478 479 480 481
	assert(session);

	s = libssh2_session_init();
	if (!s) {
		giterr_set(GITERR_NET, "Failed to initialize SSH session");
Etienne Samson committed
482
		return -1;
483
	}
484

Etienne Samson committed
485
	do {
486
		rc = libssh2_session_startup(s, socket->s);
Etienne Samson committed
487
	} while (LIBSSH2_ERROR_EAGAIN == rc || LIBSSH2_ERROR_TIMEOUT == rc);
488

489 490
	if (rc != LIBSSH2_ERROR_NONE) {
		ssh_error(s, "Failed to start SSH session");
491 492
		libssh2_session_free(s);
		return -1;
493
	}
494

Brad Morgan committed
495
	libssh2_session_set_blocking(s, 1);
496

Brad Morgan committed
497
	*session = s;
498

Brad Morgan committed
499 500 501
	return 0;
}

Brad Morgan committed
502
static int _git_ssh_setup_conn(
Brad Morgan committed
503 504
	ssh_subtransport *t,
	const char *url,
Brad Morgan committed
505
	const char *cmd,
506
	git_smart_subtransport_stream **stream)
Brad Morgan committed
507
{
Ben Straub committed
508
	char *host=NULL, *port=NULL, *path=NULL, *user=NULL, *pass=NULL;
Brad Morgan committed
509
	const char *default_port="22";
510
	int auth_methods, error = 0;
511
	size_t i;
Brad Morgan committed
512
	ssh_stream *s;
513
	git_cred *cred = NULL;
Brad Morgan committed
514 515
	LIBSSH2_SESSION* session=NULL;
	LIBSSH2_CHANNEL* channel=NULL;
516

517 518
	t->current_stream = NULL;

Brad Morgan committed
519
	*stream = NULL;
Brad Morgan committed
520
	if (ssh_stream_alloc(t, url, cmd, stream) < 0)
Brad Morgan committed
521
		return -1;
522

Brad Morgan committed
523
	s = (ssh_stream *)*stream;
524 525
	s->session = NULL;
	s->channel = NULL;
526

527
	for (i = 0; i < ARRAY_SIZE(ssh_prefixes); ++i) {
528 529 530 531 532 533 534 535
		const char *p = ssh_prefixes[i];

		if (!git__prefixcmp(url, p)) {
			if ((error = gitno_extract_url_parts(&host, &port, &path, &user, &pass, url, default_port)) < 0)
				goto done;

			goto post_extract;
		}
536
	}
537 538 539 540
	if ((error = git_ssh_extract_url_parts(&host, &user, url)) < 0)
		goto done;
	port = git__strdup(default_port);
	GITERR_CHECK_ALLOC(port);
541

542
post_extract:
543 544
	if ((error = git_socket_stream_new(&s->io, host, port)) < 0 ||
	    (error = git_stream_connect(s->io)) < 0)
545
		goto done;
546

547
	if ((error = _git_ssh_session_create(&session, s->io)) < 0)
548
		goto done;
549 550

	if (t->owner->certificate_check_cb != NULL) {
551
		git_cert_hostkey cert = {{ 0 }}, *cert_ptr;
552 553
		const char *key;

554
		cert.parent.cert_type = GIT_CERT_HOSTKEY_LIBSSH2;
555

556 557
		key = libssh2_hostkey_hash(session, LIBSSH2_HOSTKEY_HASH_SHA1);
		if (key != NULL) {
558 559
			cert.type |= GIT_CERT_SSH_SHA1;
			memcpy(&cert.hash_sha1, key, 20);
560 561
		}

562 563 564 565 566 567 568
		key = libssh2_hostkey_hash(session, LIBSSH2_HOSTKEY_HASH_MD5);
		if (key != NULL) {
			cert.type |= GIT_CERT_SSH_MD5;
			memcpy(&cert.hash_md5, key, 16);
		}

		if (cert.type == 0) {
569
			giterr_set(GITERR_SSH, "unable to get the host key");
570 571
			error = -1;
			goto done;
572 573 574
		}

		/* We don't currently trust any hostkeys */
575
		giterr_clear();
576 577 578 579

		cert_ptr = &cert;

		error = t->owner->certificate_check_cb((git_cert *) cert_ptr, 0, host, t->owner->message_cb_payload);
580 581 582 583
		if (error < 0) {
			if (!giterr_last())
				giterr_set(GITERR_NET, "user cancelled hostkey check");

584
			goto done;
585
		}
586
	}
587

588 589 590
	/* we need the username to ask for auth methods */
	if (!user) {
		if ((error = request_creds(&cred, t, NULL, GIT_CREDTYPE_USERNAME)) < 0)
591
			goto done;
592

593 594 595 596
		user = git__strdup(((git_cred_username *) cred)->username);
		cred->free(cred);
		cred = NULL;
		if (!user)
597
			goto done;
598
	} else if (user && pass) {
599
		if ((error = git_cred_userpass_plaintext_new(&cred, user, pass)) < 0)
600
			goto done;
601 602
	}

603
	if ((error = list_auth_methods(&auth_methods, session, user)) < 0)
604
		goto done;
605

606 607
	error = GIT_EAUTH;
	/* if we already have something to try */
608
	if (cred && auth_methods & cred->credtype)
609
		error = _git_ssh_authenticate_session(session, cred);
610

611 612 613 614 615 616 617
	while (error == GIT_EAUTH) {
		if (cred) {
			cred->free(cred);
			cred = NULL;
		}

		if ((error = request_creds(&cred, t, user, auth_methods)) < 0)
618
			goto done;
619

620 621 622
		if (strcmp(user, git_cred__username(cred))) {
			giterr_set(GITERR_SSH, "username does not match previous request");
			error = -1;
623
			goto done;
624 625
		}

626 627
		error = _git_ssh_authenticate_session(session, cred);
	}
628

629
	if (error < 0)
630
		goto done;
631

Brad Morgan committed
632
	channel = libssh2_channel_open_session(session);
633
	if (!channel) {
634
		error = -1;
635
		ssh_error(session, "Failed to open SSH channel");
636
		goto done;
637
	}
638

Brad Morgan committed
639
	libssh2_channel_set_blocking(channel, 1);
640

Brad Morgan committed
641 642
	s->session = session;
	s->channel = channel;
643

Brad Morgan committed
644
	t->current_stream = s;
645

646 647
done:
	if (error < 0) {
648
		ssh_stream_free(*stream);
649

650 651 652
		if (session)
			libssh2_session_free(session);
	}
653

654 655 656
	if (cred)
		cred->free(cred);

Brad Morgan committed
657
	git__free(host);
Brad Morgan committed
658
	git__free(port);
659
	git__free(path);
Brad Morgan committed
660 661 662
	git__free(user);
	git__free(pass);

663
	return error;
Brad Morgan committed
664 665
}

Brad Morgan committed
666
static int ssh_uploadpack_ls(
Brad Morgan committed
667 668 669 670
	ssh_subtransport *t,
	const char *url,
	git_smart_subtransport_stream **stream)
{
671 672
	const char *cmd = t->cmd_uploadpack ? t->cmd_uploadpack : cmd_uploadpack;

673
	return _git_ssh_setup_conn(t, url, cmd, stream);
Brad Morgan committed
674 675
}

Brad Morgan committed
676
static int ssh_uploadpack(
Brad Morgan committed
677 678 679 680 681
	ssh_subtransport *t,
	const char *url,
	git_smart_subtransport_stream **stream)
{
	GIT_UNUSED(url);
682

Brad Morgan committed
683 684 685 686
	if (t->current_stream) {
		*stream = &t->current_stream->parent;
		return 0;
	}
687

Brad Morgan committed
688 689 690 691
	giterr_set(GITERR_NET, "Must call UPLOADPACK_LS before UPLOADPACK");
	return -1;
}

Brad Morgan committed
692
static int ssh_receivepack_ls(
Brad Morgan committed
693 694 695 696
	ssh_subtransport *t,
	const char *url,
	git_smart_subtransport_stream **stream)
{
697 698
	const char *cmd = t->cmd_receivepack ? t->cmd_receivepack : cmd_receivepack;

699

700
	return _git_ssh_setup_conn(t, url, cmd, stream);
Brad Morgan committed
701 702
}

Brad Morgan committed
703
static int ssh_receivepack(
Brad Morgan committed
704 705 706
	ssh_subtransport *t,
	const char *url,
	git_smart_subtransport_stream **stream)
Brad Morgan committed
707 708
{
	GIT_UNUSED(url);
709

Brad Morgan committed
710 711 712 713
	if (t->current_stream) {
		*stream = &t->current_stream->parent;
		return 0;
	}
714

Brad Morgan committed
715 716 717 718
	giterr_set(GITERR_NET, "Must call RECEIVEPACK_LS before RECEIVEPACK");
	return -1;
}

Brad Morgan committed
719
static int _ssh_action(
Brad Morgan committed
720 721 722 723
	git_smart_subtransport_stream **stream,
	git_smart_subtransport *subtransport,
	const char *url,
	git_smart_service_t action)
Brad Morgan committed
724 725
{
	ssh_subtransport *t = (ssh_subtransport *) subtransport;
726

Brad Morgan committed
727 728
	switch (action) {
		case GIT_SERVICE_UPLOADPACK_LS:
Brad Morgan committed
729
			return ssh_uploadpack_ls(t, url, stream);
730

Brad Morgan committed
731
		case GIT_SERVICE_UPLOADPACK:
Brad Morgan committed
732
			return ssh_uploadpack(t, url, stream);
733

Brad Morgan committed
734
		case GIT_SERVICE_RECEIVEPACK_LS:
Brad Morgan committed
735
			return ssh_receivepack_ls(t, url, stream);
736

Brad Morgan committed
737
		case GIT_SERVICE_RECEIVEPACK:
Brad Morgan committed
738
			return ssh_receivepack(t, url, stream);
Brad Morgan committed
739
	}
740

Brad Morgan committed
741 742 743 744
	*stream = NULL;
	return -1;
}

Brad Morgan committed
745
static int _ssh_close(git_smart_subtransport *subtransport)
Brad Morgan committed
746 747
{
	ssh_subtransport *t = (ssh_subtransport *) subtransport;
748

Brad Morgan committed
749
	assert(!t->current_stream);
750

Brad Morgan committed
751
	GIT_UNUSED(t);
752

Brad Morgan committed
753 754 755
	return 0;
}

Brad Morgan committed
756
static void _ssh_free(git_smart_subtransport *subtransport)
Brad Morgan committed
757 758
{
	ssh_subtransport *t = (ssh_subtransport *) subtransport;
759

Brad Morgan committed
760
	assert(!t->current_stream);
761

762 763
	git__free(t->cmd_uploadpack);
	git__free(t->cmd_receivepack);
Brad Morgan committed
764 765
	git__free(t);
}
766 767 768 769 770

#define SSH_AUTH_PUBLICKEY "publickey"
#define SSH_AUTH_PASSWORD "password"
#define SSH_AUTH_KEYBOARD_INTERACTIVE "keyboard-interactive"

771
static int list_auth_methods(int *out, LIBSSH2_SESSION *session, const char *username)
772 773 774 775 776
{
	const char *list, *ptr;

	*out = 0;

777
	list = libssh2_userauth_list(session, username, strlen(username));
778 779

	/* either error, or the remote accepts NONE auth, which is bizarre, let's punt */
780 781
	if (list == NULL && !libssh2_userauth_authenticated(session)) {
		ssh_error(session, "Failed to retrieve list of SSH authentication methods");
782
		return -1;
783
	}
784 785 786 787 788 789 790 791 792

	ptr = list;
	while (ptr) {
		if (*ptr == ',')
			ptr++;

		if (!git__prefixcmp(ptr, SSH_AUTH_PUBLICKEY)) {
			*out |= GIT_CREDTYPE_SSH_KEY;
			*out |= GIT_CREDTYPE_SSH_CUSTOM;
793 794 795
#ifdef GIT_SSH_MEMORY_CREDENTIALS
			*out |= GIT_CREDTYPE_SSH_MEMORY;
#endif
796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817
			ptr += strlen(SSH_AUTH_PUBLICKEY);
			continue;
		}

		if (!git__prefixcmp(ptr, SSH_AUTH_PASSWORD)) {
			*out |= GIT_CREDTYPE_USERPASS_PLAINTEXT;
			ptr += strlen(SSH_AUTH_PASSWORD);
			continue;
		}

		if (!git__prefixcmp(ptr, SSH_AUTH_KEYBOARD_INTERACTIVE)) {
			*out |= GIT_CREDTYPE_SSH_INTERACTIVE;
			ptr += strlen(SSH_AUTH_KEYBOARD_INTERACTIVE);
			continue;
		}

		/* Skipt it if we don't know it */
		ptr = strchr(ptr, ',');
	}

	return 0;
}
818
#endif
Brad Morgan committed
819

820
int git_smart_subtransport_ssh(
821
	git_smart_subtransport **out, git_transport *owner, void *param)
Brad Morgan committed
822
{
823
#ifdef GIT_SSH
Brad Morgan committed
824
	ssh_subtransport *t;
825 826 827

	assert(out);

828 829
	GIT_UNUSED(param);

Brad Morgan committed
830 831
	t = git__calloc(sizeof(ssh_subtransport), 1);
	GITERR_CHECK_ALLOC(t);
832

Brad Morgan committed
833
	t->owner = (transport_smart *)owner;
Brad Morgan committed
834 835 836
	t->parent.action = _ssh_action;
	t->parent.close = _ssh_close;
	t->parent.free = _ssh_free;
837

Brad Morgan committed
838 839
	*out = (git_smart_subtransport *) t;
	return 0;
840 841
#else
	GIT_UNUSED(owner);
842
	GIT_UNUSED(param);
843 844 845

	assert(out);
	*out = NULL;
846

847 848
	giterr_set(GITERR_INVALID, "Cannot create SSH transport. Library was built without SSH support");
	return -1;
849
#endif
850
}
851 852 853 854 855 856 857 858 859 860 861 862

int git_transport_ssh_with_paths(git_transport **out, git_remote *owner, void *payload)
{
#ifdef GIT_SSH
	git_strarray *paths = (git_strarray *) payload;
	git_transport *transport;
	transport_smart *smart;
	ssh_subtransport *t;
	int error;
	git_smart_subtransport_definition ssh_definition = {
		git_smart_subtransport_ssh,
		0, /* no RPC */
863
		NULL,
864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885
	};

	if (paths->count != 2) {
		giterr_set(GITERR_SSH, "invalid ssh paths, must be two strings");
		return GIT_EINVALIDSPEC;
	}

	if ((error = git_transport_smart(&transport, owner, &ssh_definition)) < 0)
		return error;

	smart = (transport_smart *) transport;
	t = (ssh_subtransport *) smart->wrapped;

	t->cmd_uploadpack = git__strdup(paths->strings[0]);
	GITERR_CHECK_ALLOC(t->cmd_uploadpack);
	t->cmd_receivepack = git__strdup(paths->strings[1]);
	GITERR_CHECK_ALLOC(t->cmd_receivepack);

	*out = transport;
	return 0;
#else
	GIT_UNUSED(owner);
Vicent Marti committed
886
	GIT_UNUSED(payload);
887 888 889 890 891 892 893 894

	assert(out);
	*out = NULL;

	giterr_set(GITERR_INVALID, "Cannot create SSH transport. Library was built without SSH support");
	return -1;
#endif
}
895 896 897 898 899 900 901 902 903 904 905 906 907 908 909

int git_transport_ssh_global_init(void)
{
#ifdef GIT_SSH

	libssh2_init(0);
	return 0;

#else

	/* Nothing to initialize */
	return 0;

#endif
}