Displaying 20 results from an estimated 400 matches similar to: "[PATCH] add statfs extension to sftp-server"
2006 Aug 19
0
[PATCH] add statfs extension to sftp-server
This is needed to be able to support statfs operation on an SSH
filesystem (http://fuse.sourceforge.net/sshfs.html).
It uses and sends only those fields of struct statfs which are common
with struct statvfs as defined by POSIX, and which are shared among
most UNIX-like systems.
The SSH_FXP_EXTENDED message type is used, so this change is backward
compatible and conforms to the protocol
2006 Aug 19
0
[PATCH] add atomic rename extension to sftp-server
This is needed to be able to support a rename() operation conforming
to POSIX in the SSH filesystem.
With the rename operation defined in the SFTP spec, this is
impossible, since in case the target exists it's not possible to
perform the rename+unlink atomically.
Miklos
Index: ssh/sftp-server.c
===================================================================
--- ssh.orig/sftp-server.c
2006 Aug 17
0
[RFC] proposed extensions for SFTP
I'd like to propose the following extensions to the SFTP protocol.
- statvfs operation
- atomic rename (just plain POSIX rename() without the existence check)
These are the most requested features in SSHFS, which need support in
sftp-server too.
They could be added to the current protocol with the SSH_FXP_EXTENDED
message type.
Here's a patch implementing the statvfs operation. It
2009 Feb 12
2
[patch 1/3] add protocol extension to ATTR message
This patch adds all the missing commonly used UNIX attributes: st_dev,
st_ino, st_nlink, st_rdev, st_blocks, st_blksize, st_ctime. In
addition it extends st_atime and st_mtime to 64bits, and adds
nanosecond resolution to all three timestamps.
This is implemented as an extension to the ATTR message. This patch
alone is sufficient for SSHFS to be able to use these attributes. The
following two
2001 May 24
1
chroot sftp-server [PATCH]
I'm working on setting up a semi-trusted sftp service, and to get it
working, I need chroot capability.
I've taken the /./ wuftpd magic token code from contrib/chroot.diff and
put it into the sftp server. The main problem is that privileges have
been dropped by the time the subsystem is exec'ed, so my patch requires
that sftp-server be setuid root. Not ideal, I know, but I drop all
2009 Feb 12
2
[patch] hard link protocol extension for sftp
Here's a patch that adds support for the creation of hard links over
SFTP.
Hard links are not used very often nowdays, but they do still have
their uses and this is currently the most often requested improvement
for SSHFS.
To detect hard links the st_nlink, st_dev and st_ino attributes are
usually used. I'll also post patches adding extensions for these and
other attributes.
Please
2013 Jun 04
1
[PATCH] add restricted mode to sftp-server
Hello.
These patches add a new mode of operation for the sftp server.
It is located between the ordinary, unrestricted mode and read-only mode.
It allows you to add files to the server, but only if these files do
not exist on the server before.
Changes to existing files - are prohibited.
Please review them, maybe these patches will be useful not only to me.
Thank you.
-------------- next part
2002 Mar 15
4
PATCH: sftp-server logging.
This is another take on logging for sftp-server. Given the number
of private email requests I've received for this patch, I assume
there is signifigant enough interest to request it be reviewed for
inclusion into the release.
The patch is against 3.1p1, and is completely disabled by default.
To enable logging, one must use compile time directives
(-DSFTP_LOGGING). This was done due to prior
2006 Mar 23
8
DRY principle - how to implement?
Hi all!
I have ''send_status'' table which looks something like these:
id code title
1 sent Sent
2 error Sending error
3 success Success
Next I would like to associate some processed records with their
''send_status''. Is it better to use:
1)
record.status_id = SendStatus.find(:one, :condition => "code=''sent''").id
to
2004 Apr 05
9
link(2) to rename files in sftp
Is there an alternative to using link(2) to rename files in sftp-server?
Some users use sftp to upload files to a vfat partition on an sftp-server,
and then renaming doesn't work. This breaks konqueror, for example (from KDE,
which u), which upload files first with a ".part" extension and then renames
them removing this extension.
2004 Oct 25
1
Bug in sftp's chmod
Hi,
I've discovered that on OpenSSH_3.6.1p1 (the latest SSH available on
OSX, but I've also tried a couple of different linux distributions),
when you 'sftp' to it, and try to 'chmod' some file or directory, only
last three octal digits do actually matter.
Example:
sftp sshtest at localhost
Connecting to localhost...
sshtest at localhost's password:
sftp> ls -l
2001 Jan 23
11
cc & no 64bit int patches
Here are a couple of patches against the CVS (Jan 22 18:41 PST)
Some C++ comments found their way into ssh.h
The no64.patch puts ifdefs around buffer_get_int64()
now in bufaux.[c,h]
--
Tim Rice Multitalents (707) 887-1469
tim at multitalents.net
-------------- next part --------------
--- ssh.h.old Mon Jan 22 18:40:58 2001
+++ ssh.h Mon Jan 22 19:02:02 2001
@@ -25,8 +25,10 @@
# include
2009 May 03
6
[RFC] The reflink(2) system call.
Hi everyone,
I described the reflink operation at the Linux Storage &
Filesystems Workshop last month. Originally implemented as an
ocfs2-specific ioctl, the consensus was that it should be a syscall from
the get-go. Here's some first-cut patches.
For people who have not seen reflink, either at LSF or on the
ocfs2 wiki, the first patch contains
Documentation/filesystems/reflink.txt to
2002 Jan 03
3
[PATCH] Improving sftp client performance
The included patch for openssh 3.0.2p1 implements overlapping read
requests for the sftp client. It should be able to handle weird cases
such as shriking files and reordered responses. This is only the first
shot, and I'd be happy for any comments. I plan to implement something
similar for the write path if this works out well.
The maximum number of outstanding requests is quite high at
2011 Mar 02
1
file.rename(): Guaranteed to be complete or not at all?
Hi,
assume I have an existing file 'pathname' and I want to rename it to
'pathnameN' (which does not exist). I use:
res <- file.rename(pathname, pathnameN);
Is it guaranteed that:
(1) if res == TRUE, the file now have name 'pathnameN' and there is no
file with name 'pathname'?
(2) if res == FALSE, nothing has changed?
or could it theoretically also be the
2003 Sep 22
13
[Bug 697] ending slash is not used
http://bugzilla.mindrot.org/show_bug.cgi?id=697
Summary: ending slash is not used
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sftp-server
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: ramses at
2018 Dec 28
19
[Bug 2948] New: implement "copy-data" sftp extension
https://bugzilla.mindrot.org/show_bug.cgi?id=2948
Bug ID: 2948
Summary: implement "copy-data" sftp extension
Product: Portable OpenSSH
Version: -current
Hardware: All
URL: https://tools.ietf.org/html/draft-ietf-secsh-filexfer-
extensions-00#section-7
OS: All
Status: NEW
2002 Nov 05
0
[PATCH] Add readonly mode to scp, sftp_server
This patch adds a readonly mode to scp and sftp_server. This allows clients
to only read files from the server, but not to write them.
Patch is based on OpenSSH 3.4p1
*** scp.c@@\main\1 Tue Oct 1 17:25:16 2002
--- scp.c Wed Oct 2 06:05:14 2002
***************
*** 122,127 ****
--- 122,130 ----
/* This is set to zero if the progressmeter is not desired. */
int showprogress = 1;
+ /* deny
2002 Nov 05
2
[PATCH] fix sftp to preserve permissions and uid/gid
Sftp fails to correctly preserve permissions when fetching a file. It adds
write permission for the owner (presumably so it can write the file).
Sftp also fails to preserve the uid/gid. Added code so that if is running
as root, uid and gid are preserved.
patch is based on Openssh 3.4p1.
*** sftp-client.c@@\main\1 Tue Oct 1 17:26:20 2002
--- sftp-client.c Tue Nov 5 10:22:52 2002
2007 Nov 11
1
ftp-server patch - restrict user to directory
Hi,
please find a patch against openssh-4.7p1
This patch:
1) Allows for an optional configuration file
2) Allows a user to be restricted to a directory and it's children.
Enjoy
--
Alain Williams
Linux Consultant - Mail systems, Web sites, Networking, Programmer, IT Lecturer.
+44 (0) 787 668 0256 http://www.phcomp.co.uk/
Parliament Hill Computers Ltd. Registration Information: