~bzr-pqm/bzr/bzr.dev

1185.16.77 by Martin Pool
- import sftp transport from robey
1
# Copyright (C) 2005 Robey Pointer <robey@lag.net>, Canonical Ltd
2
3
# This program is free software; you can redistribute it and/or modify
4
# it under the terms of the GNU General Public License as published by
5
# the Free Software Foundation; either version 2 of the License, or
6
# (at your option) any later version.
7
8
# This program is distributed in the hope that it will be useful,
9
# but WITHOUT ANY WARRANTY; without even the implied warranty of
10
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
11
# GNU General Public License for more details.
12
13
# You should have received a copy of the GNU General Public License
14
# along with this program; if not, write to the Free Software
15
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
16
1185.16.79 by Martin Pool
Load transports when they're first used.
17
"""Implementation of Transport over SFTP, using paramiko."""
1185.16.77 by Martin Pool
- import sftp transport from robey
18
19
import getpass
20
import os
21
import re
22
import stat
23
import sys
1470 by Robert Collins
merge from Martin, via newformat, and teach sftp about urlescaped paths
24
import urllib
1185.16.77 by Martin Pool
- import sftp transport from robey
25
26
from bzrlib.errors import TransportNotPossible, NoSuchFile, NonRelativePath, TransportError
27
from bzrlib.config import config_dir
28
from bzrlib.trace import mutter, warning, error
29
from bzrlib.transport import Transport, register_transport
30
31
try:
32
    import paramiko
33
except ImportError:
1185.16.79 by Martin Pool
Load transports when they're first used.
34
    error('The SFTP transport requires paramiko.')
1185.16.77 by Martin Pool
- import sftp transport from robey
35
    raise
36
37
38
SYSTEM_HOSTKEYS = {}
39
BZR_HOSTKEYS = {}
40
41
def load_host_keys():
42
    """
43
    Load system host keys (probably doesn't work on windows) and any
44
    "discovered" keys from previous sessions.
45
    """
46
    global SYSTEM_HOSTKEYS, BZR_HOSTKEYS
47
    try:
48
        SYSTEM_HOSTKEYS = paramiko.util.load_host_keys(os.path.expanduser('~/.ssh/known_hosts'))
49
    except Exception, e:
50
        mutter('failed to load system host keys: ' + str(e))
51
    bzr_hostkey_path = os.path.join(config_dir(), 'ssh_host_keys')
52
    try:
53
        BZR_HOSTKEYS = paramiko.util.load_host_keys(bzr_hostkey_path)
54
    except Exception, e:
55
        mutter('failed to load bzr host keys: ' + str(e))
56
        save_host_keys()
57
58
def save_host_keys():
59
    """
60
    Save "discovered" host keys in $(config)/ssh_host_keys/.
61
    """
62
    global SYSTEM_HOSTKEYS, BZR_HOSTKEYS
63
    bzr_hostkey_path = os.path.join(config_dir(), 'ssh_host_keys')
64
    if not os.path.isdir(config_dir()):
65
        os.mkdir(config_dir())
66
    try:
67
        f = open(bzr_hostkey_path, 'w')
68
        f.write('# SSH host keys collected by bzr\n')
69
        for hostname, keys in BZR_HOSTKEYS.iteritems():
70
            for keytype, key in keys.iteritems():
71
                f.write('%s %s %s\n' % (hostname, keytype, key.get_base64()))
72
        f.close()
73
    except IOError, e:
74
        mutter('failed to save bzr host keys: ' + str(e))
75
76
77
78
class SFTPTransportError (TransportError):
79
    pass
80
81
82
class SFTPTransport (Transport):
83
    """
84
    Transport implementation for SFTP access.
85
    """
86
87
    _url_matcher = re.compile(r'^sftp://([^@]*@)?(.*?)(:\d+)?(/.*)?$')
88
    
89
    def __init__(self, base, clone_from=None):
90
        assert base.startswith('sftp://')
91
        super(SFTPTransport, self).__init__(base)
92
        self._parse_url(base)
93
        if clone_from is None:
94
            self._sftp_connect()
95
        else:
96
            # use the same ssh connection, etc
97
            self._sftp = clone_from._sftp
98
        # super saves 'self.base'
99
    
100
    def should_cache(self):
101
        """
102
        Return True if the data pulled across should be cached locally.
103
        """
104
        return True
105
106
    def clone(self, offset=None):
107
        """
108
        Return a new SFTPTransport with root at self.base + offset.
109
        We share the same SFTP session between such transports, because it's
110
        fairly expensive to set them up.
111
        """
112
        if offset is None:
113
            return SFTPTransport(self.base, self)
114
        else:
115
            return SFTPTransport(self.abspath(offset), self)
116
117
    def abspath(self, relpath):
118
        """
119
        Return the full url to the given relative path.
120
        
121
        @param relpath: the relative path or path components
122
        @type relpath: str or list
123
        """
124
        return self._unparse_url(self._abspath(relpath))
125
    
126
    def _abspath(self, relpath):
127
        """Return the absolute path segment without the SFTP URL."""
128
        # FIXME: share the common code across transports
1470 by Robert Collins
merge from Martin, via newformat, and teach sftp about urlescaped paths
129
        assert isinstance(relpath, basestring)
130
        relpath = [urllib.unquote(relpath)]
1185.16.77 by Martin Pool
- import sftp transport from robey
131
        basepath = self._path.split('/')
132
        if len(basepath) > 0 and basepath[-1] == '':
133
            basepath = basepath[:-1]
134
135
        for p in relpath:
136
            if p == '..':
137
                if len(basepath) == 0:
138
                    # In most filesystems, a request for the parent
139
                    # of root, just returns root.
140
                    continue
141
                basepath.pop()
142
            elif p == '.':
143
                continue # No-op
144
            else:
145
                basepath.append(p)
146
147
        path = '/'.join(basepath)
148
        if path[0] != '/':
149
            path = '/' + path
150
        return path
151
152
    def relpath(self, abspath):
153
        # FIXME: this is identical to HttpTransport -- share it
154
        if not abspath.startswith(self.base):
155
            raise NonRelativePath('path %r is not under base URL %r'
156
                           % (abspath, self.base))
157
        pl = len(self.base)
158
        return abspath[pl:].lstrip('/')
159
160
    def has(self, relpath):
161
        """
162
        Does the target location exist?
163
        """
164
        try:
165
            self._sftp.stat(self._abspath(relpath))
166
            return True
167
        except IOError:
168
            return False
169
170
    def get(self, relpath, decode=False):
171
        """
172
        Get the file at the given relative path.
173
174
        :param relpath: The relative path to the file
175
        """
176
        try:
177
            path = self._abspath(relpath)
178
            return self._sftp.file(path)
179
        except (IOError, paramiko.SSHException), x:
180
            raise NoSuchFile('Error retrieving %s: %s' % (path, str(x)), x)
181
182
    def get_partial(self, relpath, start, length=None):
183
        """
184
        Get just part of a file.
185
186
        :param relpath: Path to the file, relative to base
187
        :param start: The starting position to read from
188
        :param length: The length to read. A length of None indicates
189
                       read to the end of the file.
190
        :return: A file-like object containing at least the specified bytes.
191
                 Some implementations may return objects which can be read
192
                 past this length, but this is not guaranteed.
193
        """
194
        f = self.get(relpath)
195
        f.seek(start)
196
        return f
197
198
    def put(self, relpath, f):
199
        """
200
        Copy the file-like or string object into the location.
201
202
        :param relpath: Location to put the contents, relative to base.
203
        :param f:       File-like or string object.
204
        """
205
        # FIXME: should do something atomic or locking here, this is unsafe
206
        try:
207
            path = self._abspath(relpath)
208
            fout = self._sftp.file(path, 'wb')
209
        except (IOError, paramiko.SSHException), x:
210
            raise SFTPTransportError('Unable to write file %r' % (path,), x)
211
        try:
212
            self._pump(f, fout)
213
        finally:
214
            fout.close()
215
216
    def iter_files_recursive(self):
217
        """Walk the relative paths of all files in this transport."""
218
        queue = list(self.list_dir('.'))
219
        while queue:
220
            relpath = queue.pop(0)
221
            st = self.stat(relpath)
222
            if stat.S_ISDIR(st.st_mode):
223
                for i, basename in enumerate(self.list_dir(relpath)):
224
                    queue.insert(i, relpath+'/'+basename)
225
            else:
226
                yield relpath
227
228
    def mkdir(self, relpath):
229
        """Create a directory at the given path."""
230
        try:
231
            path = self._abspath(relpath)
232
            self._sftp.mkdir(path)
233
        except (IOError, paramiko.SSHException), x:
234
            raise SFTPTransportError('Unable to mkdir %r' % (path,), x)
235
236
    def append(self, relpath, f):
237
        """
238
        Append the text in the file-like object into the final
239
        location.
240
        """
241
        try:
242
            path = self._abspath(relpath)
243
            fout = self._sftp.file(path, 'ab')
244
            self._pump(f, fout)
245
        except (IOError, paramiko.SSHException), x:
246
            raise SFTPTransportError('Unable to append file %r' % (path,), x)
247
248
    def copy(self, rel_from, rel_to):
249
        """Copy the item at rel_from to the location at rel_to"""
250
        path_from = self._abspath(rel_from)
251
        path_to = self._abspath(rel_to)
252
        try:
253
            fin = self._sftp.file(path_from, 'rb')
254
            try:
255
                fout = self._sftp.file(path_to, 'wb')
256
                try:
257
                    fout.set_pipelined(True)
258
                    self._pump(fin, fout)
259
                finally:
260
                    fout.close()
261
            finally:
262
                fin.close()
263
        except (IOError, paramiko.SSHException), x:
264
            raise SFTPTransportError('Unable to copy %r to %r' % (path_from, path_to), x)
265
266
    def move(self, rel_from, rel_to):
267
        """Move the item at rel_from to the location at rel_to"""
268
        path_from = self._abspath(rel_from)
269
        path_to = self._abspath(rel_to)
270
        try:
271
            self._sftp.rename(path_from, path_to)
272
        except (IOError, paramiko.SSHException), x:
273
            raise SFTPTransportError('Unable to move %r to %r' % (path_from, path_to), x)
274
275
    def delete(self, relpath):
276
        """Delete the item at relpath"""
277
        path = self._abspath(relpath)
278
        try:
279
            self._sftp.remove(path)
280
        except (IOError, paramiko.SSHException), x:
281
            raise SFTPTransportError('Unable to delete %r' % (path,), x)
282
            
283
    def listable(self):
284
        """Return True if this store supports listing."""
285
        return True
286
287
    def list_dir(self, relpath):
288
        """
289
        Return a list of all files at the given location.
290
        """
291
        # does anything actually use this?
292
        path = self._abspath(relpath)
293
        try:
294
            return self._sftp.listdir(path)
295
        except (IOError, paramiko.SSHException), x:
296
            raise SFTPTransportError('Unable to list folder %r' % (path,), x)
297
298
    def stat(self, relpath):
299
        """Return the stat information for a file."""
300
        path = self._abspath(relpath)
301
        try:
302
            return self._sftp.stat(path)
303
        except (IOError, paramiko.SSHException), x:
304
            raise SFTPTransportError('Unable to stat %r' % (path,), x)
305
306
    def lock_read(self, relpath):
307
        """
308
        Lock the given file for shared (read) access.
309
        :return: A lock object, which should be passed to Transport.unlock()
310
        """
311
        # FIXME: there should be something clever i can do here...
312
        class BogusLock(object):
313
            def __init__(self, path):
314
                self.path = path
315
            def unlock(self):
316
                pass
317
        return BogusLock(relpath)
318
319
    def lock_write(self, relpath):
320
        """
321
        Lock the given file for exclusive (write) access.
322
        WARNING: many transports do not support this, so trying avoid using it
323
324
        :return: A lock object, which should be passed to Transport.unlock()
325
        """
326
        # FIXME: there should be something clever i can do here...
327
        class BogusLock(object):
328
            def __init__(self, path):
329
                self.path = path
330
            def unlock(self):
331
                pass
332
        return BogusLock(relpath)
333
334
335
    def _unparse_url(self, path=None):
336
        if path is None:
337
            path = self._path
338
        if self._port == 22:
339
            return 'sftp://%s@%s%s' % (self._username, self._host, path)
340
        return 'sftp://%s@%s:%d%s' % (self._username, self._host, self._port, path)
341
342
    def _parse_url(self, url):
343
        assert url[:7] == 'sftp://'
344
        m = self._url_matcher.match(url)
345
        if m is None:
346
            raise SFTPTransportError('Unable to parse SFTP URL %r' % (url,))
347
        self._username, self._host, self._port, self._path = m.groups()
348
        if self._username is None:
349
            self._username = getpass.getuser()
350
        else:
351
            self._username = self._username[:-1]
352
        if self._port is None:
353
            self._port = 22
354
        else:
355
            self._port = int(self._port[1:])
356
        if (self._path is None) or (self._path == ''):
357
            self._path = '/'
358
359
    def _sftp_connect(self):
360
        global SYSTEM_HOSTKEYS, BZR_HOSTKEYS
361
        
362
        load_host_keys()
363
        
364
        try:
365
            t = paramiko.Transport((self._host, self._port))
366
            t.start_client()
367
        except paramiko.SSHException:
368
            raise SFTPTransportError('Unable to reach SSH host %s:%d' % (self._host, self._port))
369
            
370
        server_key = t.get_remote_server_key()
371
        server_key_hex = paramiko.util.hexify(server_key.get_fingerprint())
372
        keytype = server_key.get_name()
373
        if SYSTEM_HOSTKEYS.has_key(self._host) and SYSTEM_HOSTKEYS[self._host].has_key(keytype):
374
            our_server_key = SYSTEM_HOSTKEYS[self._host][keytype]
375
            our_server_key_hex = paramiko.util.hexify(our_server_key.get_fingerprint())
376
        elif BZR_HOSTKEYS.has_key(self._host) and BZR_HOSTKEYS[self._host].has_key(keytype):
377
            our_server_key = BZR_HOSTKEYS[self._host][keytype]
378
            our_server_key_hex = paramiko.util.hexify(our_server_key.get_fingerprint())
379
        else:
380
            warning('Adding %s host key for %s: %s' % (keytype, self._host, server_key_hex))
381
            if not BZR_HOSTKEYS.has_key(self._host):
382
                BZR_HOSTKEYS[self._host] = {}
383
            BZR_HOSTKEYS[self._host][keytype] = server_key
384
            our_server_key = server_key
385
            our_server_key_hex = paramiko.util.hexify(our_server_key.get_fingerprint())
386
            save_host_keys()
387
        if server_key != our_server_key:
388
            filename1 = os.path.expanduser('~/.ssh/known_hosts')
389
            filename2 = os.path.join(config_dir(), 'ssh_host_keys')
390
            raise SFTPTransportError('Host keys for %s do not match!  %s != %s' % \
391
                (self._host, our_server_key_hex, server_key_hex),
392
                ['Try editing %s or %s' % (filename1, filename2)])
393
394
        self._sftp_auth(t, self._username, self._host)
395
        
396
        try:
397
            self._sftp = t.open_sftp_client()
398
        except paramiko.SSHException:
399
            raise BzrError('Unable to find path %s on SFTP server %s' % \
400
                (self._path, self._host))
401
402
    def _sftp_auth(self, transport, username, host):
403
        agent = paramiko.Agent()
404
        for key in agent.get_keys():
405
            mutter('Trying SSH agent key %s' % paramiko.util.hexify(key.get_fingerprint()))
406
            try:
407
                transport.auth_publickey(self._username, key)
408
                return
409
            except paramiko.SSHException, e:
410
                pass
411
        
412
        # okay, try finding id_rsa or id_dss?  (posix only)
413
        if self._try_pkey_auth(transport, paramiko.RSAKey, 'id_rsa'):
414
            return
415
        if self._try_pkey_auth(transport, paramiko.DSSKey, 'id_dsa'):
416
            return
417
418
        # give up and ask for a password
419
        password = getpass.getpass('SSH %s@%s password: ' % (self._username, self._host))
420
        try:
421
            transport.auth_password(self._username, password)
422
        except paramiko.SSHException:
423
            raise SFTPTransportError('Unable to authenticate to SSH host as %s@%s' % \
424
                (self._username, self._host))
425
426
    def _try_pkey_auth(self, transport, pkey_class, filename):
427
        filename = os.path.expanduser('~/.ssh/' + filename)
428
        try:
429
            key = pkey_class.from_private_key_file(filename)
430
            transport.auth_publickey(self._username, key)
431
            return True
432
        except paramiko.PasswordRequiredException:
433
            password = getpass.getpass('SSH %s password: ' % (os.path.basename(filename),))
434
            try:
435
                key = pkey_class.from_private_key_file(filename, password)
436
                transport.auth_publickey(self._username, key)
437
                return True
438
            except paramiko.SSHException:
439
                mutter('SSH authentication via %s key failed.' % (os.path.basename(filename),))
440
        except paramiko.SSHException:
441
            mutter('SSH authentication via %s key failed.' % (os.path.basename(filename),))
442
        except IOError:
443
            pass
444
        return False