func ExampleClient_Listen() { config := &ssh.ClientConfig{ User: "******", Auth: []ssh.AuthMethod{ ssh.Password("password"), }, } // Dial your ssh server. conn, err := ssh.Dial("tcp", "localhost:22", config) if err != nil { log.Fatalf("unable to connect: %s", err) } defer conn.Close() // Request the remote side to open port 8080 on all interfaces. l, err := conn.Listen("tcp", "0.0.0.0:8080") if err != nil { log.Fatalf("unable to register tcp forward: %v", err) } defer l.Close() // Serve HTTP with your SSH server acting as a reverse proxy. http.Serve(l, http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) { fmt.Fprintf(resp, "Hello world!\n") })) }
func ExampleSession_RequestPty() { // Create client config config := &ssh.ClientConfig{ User: "******", Auth: []ssh.AuthMethod{ ssh.Password("password"), }, } // Connect to ssh server conn, err := ssh.Dial("tcp", "localhost:22", config) if err != nil { log.Fatalf("unable to connect: %s", err) } defer conn.Close() // Create a session session, err := conn.NewSession() if err != nil { log.Fatalf("unable to create session: %s", err) } defer session.Close() // Set up terminal modes modes := ssh.TerminalModes{ ssh.ECHO: 0, // disable echoing ssh.TTY_OP_ISPEED: 14400, // input speed = 14.4kbaud ssh.TTY_OP_OSPEED: 14400, // output speed = 14.4kbaud } // Request pseudo terminal if err := session.RequestPty("xterm", 80, 40, modes); err != nil { log.Fatalf("request for pseudo terminal failed: %s", err) } // Start remote shell if err := session.Shell(); err != nil { log.Fatalf("failed to start shell: %s", err) } }
func ExampleDial() { // An SSH client is represented with a ClientConn. Currently only // the "password" authentication method is supported. // // To authenticate with the remote server you must pass at least one // implementation of AuthMethod via the Auth field in ClientConfig. config := &ssh.ClientConfig{ User: "******", Auth: []ssh.AuthMethod{ ssh.Password("yourpassword"), }, } client, err := ssh.Dial("tcp", "yourserver.com:22", config) if err != nil { panic("Failed to dial: " + err.Error()) } // Each ClientConn can support multiple interactive sessions, // represented by a Session. session, err := client.NewSession() if err != nil { panic("Failed to create session: " + err.Error()) } defer session.Close() // Once a Session is created, you can execute a single command on // the remote side using the Run method. var b bytes.Buffer session.Stdout = &b if err := session.Run("/usr/bin/whoami"); err != nil { panic("Failed to run: " + err.Error()) } fmt.Println(b.String()) }
func main() { var auths []ssh.AuthMethod if aconn, err := net.Dial("unix", os.Getenv("SSH_AUTH_SOCK")); err == nil { auths = append(auths, ssh.PublicKeysCallback(agent.NewClient(aconn).Signers)) } if *PASS != "" { auths = append(auths, ssh.Password(*PASS)) } config := ssh.ClientConfig{ User: *USER, Auth: auths, } addr := fmt.Sprintf("%s:%d", *HOST, *PORT) conn, err := ssh.Dial("tcp", addr, &config) if err != nil { log.Fatalf("unable to connect to [%s]: %v", addr, err) } defer conn.Close() c, err := sftp.NewClient(conn) if err != nil { log.Fatalf("unable to start sftp subsytem: %v", err) } defer c.Close() r, err := c.Open("/dev/zero") if err != nil { log.Fatal(err) } defer r.Close() w, err := os.OpenFile("/dev/null", syscall.O_WRONLY, 0600) if err != nil { log.Fatal(err) } defer w.Close() const size int64 = 1e9 log.Printf("reading %v bytes", size) t1 := time.Now() n, err := io.Copy(w, io.LimitReader(r, size)) if err != nil { log.Fatal(err) } if n != size { log.Fatalf("copy: expected %v bytes, got %d", size, n) } log.Printf("read %v bytes in %s", size, time.Since(t1)) }
// This method creates executor based on ssh, it has concrete ssh reference func NewRemoteExecutor(sshCfg SshConfig) (executor Executer, err error) { clientconfig := &ssh.ClientConfig{ User: sshCfg.Username, Auth: []ssh.AuthMethod{ ssh.Password(sshCfg.Password), }, } client, err := ssh.Dial("tcp", fmt.Sprintf("%s:%d", sshCfg.Host, sshCfg.Port), clientconfig) if err != nil { return } c := NewClientWrapper(client) executor = &DefaultRemoteExecutor{ Client: c, } return }
func (s *remoteOperations) GetRemoteFile() (rfile io.WriteCloser, err error) { var ( sshconn *ssh.Client sftpclient *sftp.Client ) clientconfig := &ssh.ClientConfig{ User: s.sshCfg.Username, Auth: []ssh.AuthMethod{ ssh.Password(s.sshCfg.Password), }, } if sshconn, err = ssh.Dial("tcp", fmt.Sprintf("%s:%d", s.sshCfg.Host, s.sshCfg.Port), clientconfig); err == nil { if sftpclient, err = sftp.NewClient(sshconn); err == nil { rfile, err = SafeCreateSSH(sftpclient, s.remotePath) } } return }
func main() { var auths []ssh.AuthMethod if aconn, err := net.Dial("unix", os.Getenv("SSH_AUTH_SOCK")); err == nil { auths = append(auths, ssh.PublicKeysCallback(agent.NewClient(aconn).Signers)) } if *PASS != "" { auths = append(auths, ssh.Password(*PASS)) } config := ssh.ClientConfig{ User: *USER, Auth: auths, } addr := fmt.Sprintf("%s:%d", *HOST, *PORT) conn, err := ssh.Dial("tcp", addr, &config) if err != nil { log.Fatalf("unable to connect to [%s]: %v", addr, err) } defer conn.Close() client, err := sftp.NewClient(conn) if err != nil { log.Fatalf("unable to start sftp subsytem: %v", err) } defer client.Close() switch cmd := flag.Args()[0]; cmd { case "ls": if len(flag.Args()) < 2 { log.Fatalf("%s %s: remote path required", cmd, os.Args[0]) } walker := client.Walk(flag.Args()[1]) for walker.Step() { if err := walker.Err(); err != nil { log.Println(err) continue } fmt.Println(walker.Path()) } case "fetch": if len(flag.Args()) < 2 { log.Fatalf("%s %s: remote path required", cmd, os.Args[0]) } f, err := client.Open(flag.Args()[1]) if err != nil { log.Fatal(err) } defer f.Close() if _, err := io.Copy(os.Stdout, f); err != nil { log.Fatal(err) } case "put": if len(flag.Args()) < 2 { log.Fatalf("%s %s: remote path required", cmd, os.Args[0]) } f, err := client.Create(flag.Args()[1]) if err != nil { log.Fatal(err) } defer f.Close() if _, err := io.Copy(f, os.Stdin); err != nil { log.Fatal(err) } case "stat": if len(flag.Args()) < 2 { log.Fatalf("%s %s: remote path required", cmd, os.Args[0]) } f, err := client.Open(flag.Args()[1]) if err != nil { log.Fatal(err) } defer f.Close() fi, err := f.Stat() if err != nil { log.Fatalf("unable to stat file: %v", err) } fmt.Printf("%s %d %v\n", fi.Name(), fi.Size(), fi.Mode()) case "rm": if len(flag.Args()) < 2 { log.Fatalf("%s %s: remote path required", cmd, os.Args[0]) } if err := client.Remove(flag.Args()[1]); err != nil { log.Fatalf("unable to remove file: %v", err) } case "mv": if len(flag.Args()) < 3 { log.Fatalf("%s %s: old and new name required", cmd, os.Args[0]) } if err := client.Rename(flag.Args()[1], flag.Args()[2]); err != nil { log.Fatalf("unable to rename file: %v", err) } default: log.Fatalf("unknown subcommand: %v", cmd) } }