pub struct Session(/* private fields */);
Expand description
Implementations§
source§impl Session
impl Session
sourcepub fn resume_mux(ctl: Box<Path>, master_log: Option<Box<Path>>) -> Self
pub fn resume_mux(ctl: Box<Path>, master_log: Option<Box<Path>>) -> Self
Same as [Session::resume
] except that it connects to
the ssh multiplex master using native mux impl.
sourcepub async fn connect_mux<S: AsRef<str>>(
destination: S,
check: KnownHosts,
) -> Result<Self, Error>
pub async fn connect_mux<S: AsRef<str>>( destination: S, check: KnownHosts, ) -> Result<Self, Error>
Connect to the host at the given host
over SSH using native mux impl, which
will create a new socket connection for each Child
created.
See the crate-level documentation for more details on the difference between native and process-based mux.
The format of destination
is the same as the destination
argument to ssh
. It may be
specified as either [user@]hostname
or a URI of the form ssh://[user@]hostname[:port]
.
If connecting requires interactive authentication based on STDIN
(such as reading a
password), the connection will fail. Consider setting up keypair-based authentication
instead.
For more options, see SessionBuilder
.
sourcepub async fn check(&self) -> Result<(), Error>
pub async fn check(&self) -> Result<(), Error>
Check the status of the underlying SSH connection.
sourcepub fn control_socket(&self) -> &Path
pub fn control_socket(&self) -> &Path
Get the SSH connection’s control socket path.
sourcepub fn command<'a, S: Into<Cow<'a, str>>>(&self, program: S) -> Command<'_>
pub fn command<'a, S: Into<Cow<'a, str>>>(&self, program: S) -> Command<'_>
Constructs a new Command
for launching the program at path program
on the remote
host.
Before it is passed to the remote host, program
is escaped so that special characters
aren’t evaluated by the remote shell. If you do not want this behavior, use
raw_command
.
The returned Command
is a builder, with the following default configuration:
- No arguments to the program
- Empty stdin and dsicard stdout/stderr for
spawn
orstatus
, but create output pipes foroutput
Builder methods are provided to change these defaults and otherwise configure the process.
If program
is not an absolute path, the PATH
will be searched in an OS-defined way on
the host.
sourcepub fn raw_command<S: AsRef<OsStr>>(&self, program: S) -> Command<'_>
pub fn raw_command<S: AsRef<OsStr>>(&self, program: S) -> Command<'_>
Constructs a new Command
for launching the program at path program
on the remote
host.
Unlike command
, this method does not shell-escape program
, so it may be evaluated in
unforeseen ways by the remote shell.
The returned Command
is a builder, with the following default configuration:
- No arguments to the program
- Empty stdin and dsicard stdout/stderr for
spawn
orstatus
, but create output pipes foroutput
Builder methods are provided to change these defaults and otherwise configure the process.
If program
is not an absolute path, the PATH
will be searched in an OS-defined way on
the host.
sourcepub fn subsystem<S: AsRef<OsStr>>(&self, program: S) -> Command<'_>
pub fn subsystem<S: AsRef<OsStr>>(&self, program: S) -> Command<'_>
Constructs a new Command
for launching subsystem program
on the remote
host.
Unlike command
, this method does not shell-escape program
, so it may be evaluated in
unforeseen ways by the remote shell.
The returned Command
is a builder, with the following default configuration:
- No arguments to the program
- Empty stdin and dsicard stdout/stderr for
spawn
orstatus
, but create output pipes foroutput
Builder methods are provided to change these defaults and otherwise configure the process.
§Sftp subsystem
To use the sftp subsystem, you’ll want to use openssh-sftp-client
,
then use the following code to construct a sftp instance:
use openssh::{Session, KnownHosts, Stdio};
use openssh_sftp_client::Sftp;
let session = Session::connect_mux("me@ssh.example.com", KnownHosts::Strict).await?;
let mut child = session
.subsystem("sftp")
.stdin(Stdio::piped())
.stdout(Stdio::piped())
.spawn()
.await?;
Sftp::new(
child.stdin().take().unwrap(),
child.stdout().take().unwrap(),
Default::default(),
)
.await?
.close()
.await?;
sourcepub fn shell<S: AsRef<str>>(&self, command: S) -> Command<'_>
pub fn shell<S: AsRef<str>>(&self, command: S) -> Command<'_>
Constructs a new Command
that runs the provided shell command on the remote host.
The provided command is passed as a single, escaped argument to sh -c
, and from that
point forward the behavior is up to sh
. Since this executes a shell command, keep in mind
that you are subject to the shell’s rules around argument parsing, such as whitespace
splitting, variable expansion, and other funkyness. I highly recommend you read
this article if you observe strange things.
While the returned Command
is a builder, like for command
, you should not add
additional arguments to it, since the arguments are already passed within the shell
command.
§Non-standard Remote Shells
It is worth noting that there are really two shells at work here: the one that sshd
launches for the session, and that launches are command; and the instance of sh
that we
launch in that session. This method tries hard to ensure that the provided command
is
passed exactly as-is to sh
, but this is complicated by the presence of the “outer” shell.
That outer shell may itself perform argument splitting, variable expansion, and the like,
which might produce unintuitive results. For example, the outer shell may try to expand a
variable that is only defined in the inner shell, and simply produce an empty string in the
variable’s place by the time it gets to sh
.
To counter this, this method assumes that the remote shell (the one launched by sshd
) is
POSIX compliant. This is more or less equivalent to “supports bash
syntax” if you don’t
look too closely. It uses shell-escape
to escape command
before sending it to the
remote shell, with the expectation that the remote shell will only end up undoing that one
“level” of escaping, thus producing the original command
as an argument to sh
. This
works most of the time.
With sufficiently complex or weird commands, the escaping of shell-escape
may not fully
match the “un-escaping” of the remote shell. This will manifest as escape characters
appearing in the sh
command that you did not intend to be there. If this happens, try
changing the remote shell if you can, or fall back to command
and do the escaping manually instead.
sourcepub async fn request_port_forward(
&self,
forward_type: impl Into<ForwardType>,
listen_socket: impl Into<Socket<'_>>,
connect_socket: impl Into<Socket<'_>>,
) -> Result<(), Error>
pub async fn request_port_forward( &self, forward_type: impl Into<ForwardType>, listen_socket: impl Into<Socket<'_>>, connect_socket: impl Into<Socket<'_>>, ) -> Result<(), Error>
Request to open a local/remote port forwarding.
The Socket
can be either a unix socket or a tcp socket.
If forward_type
== Local, then listen_socket
on local machine will be
forwarded to connect_socket
on remote machine.
Otherwise, listen_socket
on the remote machine will be forwarded to connect_socket
on the local machine.
Currently, there is no way of stopping a port forwarding due to the fact that openssh multiplex server/master does not support this.