| """Test script for ftplib module.""" |
| |
| # Modified by Giampaolo Rodola' to test FTP class, IPv6 and TLS |
| # environment |
| |
| import ftplib |
| import asyncore |
| import asynchat |
| import socket |
| import io |
| import errno |
| import os |
| import time |
| try: |
| import ssl |
| except ImportError: |
| ssl = None |
| |
| from unittest import TestCase |
| from test import support |
| from test.support import HOST, HOSTv6 |
| threading = support.import_module('threading') |
| |
| TIMEOUT = 3 |
| # the dummy data returned by server over the data channel when |
| # RETR, LIST, NLST, MLSD commands are issued |
| RETR_DATA = 'abcde12345\r\n' * 1000 |
| LIST_DATA = 'foo\r\nbar\r\n' |
| NLST_DATA = 'foo\r\nbar\r\n' |
| MLSD_DATA = ("type=cdir;perm=el;unique==keVO1+ZF4; test\r\n" |
| "type=pdir;perm=e;unique==keVO1+d?3; ..\r\n" |
| "type=OS.unix=slink:/foobar;perm=;unique==keVO1+4G4; foobar\r\n" |
| "type=OS.unix=chr-13/29;perm=;unique==keVO1+5G4; device\r\n" |
| "type=OS.unix=blk-11/108;perm=;unique==keVO1+6G4; block\r\n" |
| "type=file;perm=awr;unique==keVO1+8G4; writable\r\n" |
| "type=dir;perm=cpmel;unique==keVO1+7G4; promiscuous\r\n" |
| "type=dir;perm=;unique==keVO1+1t2; no-exec\r\n" |
| "type=file;perm=r;unique==keVO1+EG4; two words\r\n" |
| "type=file;perm=r;unique==keVO1+IH4; leading space\r\n" |
| "type=file;perm=r;unique==keVO1+1G4; file1\r\n" |
| "type=dir;perm=cpmel;unique==keVO1+7G4; incoming\r\n" |
| "type=file;perm=r;unique==keVO1+1G4; file2\r\n" |
| "type=file;perm=r;unique==keVO1+1G4; file3\r\n" |
| "type=file;perm=r;unique==keVO1+1G4; file4\r\n") |
| |
| |
| class DummyDTPHandler(asynchat.async_chat): |
| dtp_conn_closed = False |
| |
| def __init__(self, conn, baseclass): |
| asynchat.async_chat.__init__(self, conn) |
| self.baseclass = baseclass |
| self.baseclass.last_received_data = '' |
| |
| def handle_read(self): |
| self.baseclass.last_received_data += self.recv(1024).decode('ascii') |
| |
| def handle_close(self): |
| # XXX: this method can be called many times in a row for a single |
| # connection, including in clear-text (non-TLS) mode. |
| # (behaviour witnessed with test_data_connection) |
| if not self.dtp_conn_closed: |
| self.baseclass.push('226 transfer complete') |
| self.close() |
| self.dtp_conn_closed = True |
| |
| def push(self, what): |
| if self.baseclass.next_data is not None: |
| what = self.baseclass.next_data |
| self.baseclass.next_data = None |
| if not what: |
| return self.close_when_done() |
| super(DummyDTPHandler, self).push(what.encode('ascii')) |
| |
| def handle_error(self): |
| raise |
| |
| |
| class DummyFTPHandler(asynchat.async_chat): |
| |
| dtp_handler = DummyDTPHandler |
| |
| def __init__(self, conn): |
| asynchat.async_chat.__init__(self, conn) |
| # tells the socket to handle urgent data inline (ABOR command) |
| self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_OOBINLINE, 1) |
| self.set_terminator(b"\r\n") |
| self.in_buffer = [] |
| self.dtp = None |
| self.last_received_cmd = None |
| self.last_received_data = '' |
| self.next_response = '' |
| self.next_data = None |
| self.rest = None |
| self.next_retr_data = RETR_DATA |
| self.push('220 welcome') |
| |
| def collect_incoming_data(self, data): |
| self.in_buffer.append(data) |
| |
| def found_terminator(self): |
| line = b''.join(self.in_buffer).decode('ascii') |
| self.in_buffer = [] |
| if self.next_response: |
| self.push(self.next_response) |
| self.next_response = '' |
| cmd = line.split(' ')[0].lower() |
| self.last_received_cmd = cmd |
| space = line.find(' ') |
| if space != -1: |
| arg = line[space + 1:] |
| else: |
| arg = "" |
| if hasattr(self, 'cmd_' + cmd): |
| method = getattr(self, 'cmd_' + cmd) |
| method(arg) |
| else: |
| self.push('550 command "%s" not understood.' %cmd) |
| |
| def handle_error(self): |
| raise |
| |
| def push(self, data): |
| asynchat.async_chat.push(self, data.encode('ascii') + b'\r\n') |
| |
| def cmd_port(self, arg): |
| addr = list(map(int, arg.split(','))) |
| ip = '%d.%d.%d.%d' %tuple(addr[:4]) |
| port = (addr[4] * 256) + addr[5] |
| s = socket.create_connection((ip, port), timeout=TIMEOUT) |
| self.dtp = self.dtp_handler(s, baseclass=self) |
| self.push('200 active data connection established') |
| |
| def cmd_pasv(self, arg): |
| with socket.socket() as sock: |
| sock.bind((self.socket.getsockname()[0], 0)) |
| sock.listen(5) |
| sock.settimeout(TIMEOUT) |
| ip, port = sock.getsockname()[:2] |
| ip = ip.replace('.', ','); p1 = port / 256; p2 = port % 256 |
| self.push('227 entering passive mode (%s,%d,%d)' %(ip, p1, p2)) |
| conn, addr = sock.accept() |
| self.dtp = self.dtp_handler(conn, baseclass=self) |
| |
| def cmd_eprt(self, arg): |
| af, ip, port = arg.split(arg[0])[1:-1] |
| port = int(port) |
| s = socket.create_connection((ip, port), timeout=TIMEOUT) |
| self.dtp = self.dtp_handler(s, baseclass=self) |
| self.push('200 active data connection established') |
| |
| def cmd_epsv(self, arg): |
| with socket.socket(socket.AF_INET6) as sock: |
| sock.bind((self.socket.getsockname()[0], 0)) |
| sock.listen(5) |
| sock.settimeout(TIMEOUT) |
| port = sock.getsockname()[1] |
| self.push('229 entering extended passive mode (|||%d|)' %port) |
| conn, addr = sock.accept() |
| self.dtp = self.dtp_handler(conn, baseclass=self) |
| |
| def cmd_echo(self, arg): |
| # sends back the received string (used by the test suite) |
| self.push(arg) |
| |
| def cmd_noop(self, arg): |
| self.push('200 noop ok') |
| |
| def cmd_user(self, arg): |
| self.push('331 username ok') |
| |
| def cmd_pass(self, arg): |
| self.push('230 password ok') |
| |
| def cmd_acct(self, arg): |
| self.push('230 acct ok') |
| |
| def cmd_rnfr(self, arg): |
| self.push('350 rnfr ok') |
| |
| def cmd_rnto(self, arg): |
| self.push('250 rnto ok') |
| |
| def cmd_dele(self, arg): |
| self.push('250 dele ok') |
| |
| def cmd_cwd(self, arg): |
| self.push('250 cwd ok') |
| |
| def cmd_size(self, arg): |
| self.push('250 1000') |
| |
| def cmd_mkd(self, arg): |
| self.push('257 "%s"' %arg) |
| |
| def cmd_rmd(self, arg): |
| self.push('250 rmd ok') |
| |
| def cmd_pwd(self, arg): |
| self.push('257 "pwd ok"') |
| |
| def cmd_type(self, arg): |
| self.push('200 type ok') |
| |
| def cmd_quit(self, arg): |
| self.push('221 quit ok') |
| self.close() |
| |
| def cmd_abor(self, arg): |
| self.push('226 abor ok') |
| |
| def cmd_stor(self, arg): |
| self.push('125 stor ok') |
| |
| def cmd_rest(self, arg): |
| self.rest = arg |
| self.push('350 rest ok') |
| |
| def cmd_retr(self, arg): |
| self.push('125 retr ok') |
| if self.rest is not None: |
| offset = int(self.rest) |
| else: |
| offset = 0 |
| self.dtp.push(self.next_retr_data[offset:]) |
| self.dtp.close_when_done() |
| self.rest = None |
| |
| def cmd_list(self, arg): |
| self.push('125 list ok') |
| self.dtp.push(LIST_DATA) |
| self.dtp.close_when_done() |
| |
| def cmd_nlst(self, arg): |
| self.push('125 nlst ok') |
| self.dtp.push(NLST_DATA) |
| self.dtp.close_when_done() |
| |
| def cmd_opts(self, arg): |
| self.push('200 opts ok') |
| |
| def cmd_mlsd(self, arg): |
| self.push('125 mlsd ok') |
| self.dtp.push(MLSD_DATA) |
| self.dtp.close_when_done() |
| |
| def cmd_setlongretr(self, arg): |
| # For testing. Next RETR will return long line. |
| self.next_retr_data = 'x' * int(arg) |
| self.push('125 setlongretr ok') |
| |
| |
| class DummyFTPServer(asyncore.dispatcher, threading.Thread): |
| |
| handler = DummyFTPHandler |
| |
| def __init__(self, address, af=socket.AF_INET): |
| threading.Thread.__init__(self) |
| asyncore.dispatcher.__init__(self) |
| self.create_socket(af, socket.SOCK_STREAM) |
| self.bind(address) |
| self.listen(5) |
| self.active = False |
| self.active_lock = threading.Lock() |
| self.host, self.port = self.socket.getsockname()[:2] |
| self.handler_instance = None |
| |
| def start(self): |
| assert not self.active |
| self.__flag = threading.Event() |
| threading.Thread.start(self) |
| self.__flag.wait() |
| |
| def run(self): |
| self.active = True |
| self.__flag.set() |
| while self.active and asyncore.socket_map: |
| self.active_lock.acquire() |
| asyncore.loop(timeout=0.1, count=1) |
| self.active_lock.release() |
| asyncore.close_all(ignore_all=True) |
| |
| def stop(self): |
| assert self.active |
| self.active = False |
| self.join() |
| |
| def handle_accepted(self, conn, addr): |
| self.handler_instance = self.handler(conn) |
| |
| def handle_connect(self): |
| self.close() |
| handle_read = handle_connect |
| |
| def writable(self): |
| return 0 |
| |
| def handle_error(self): |
| raise |
| |
| |
| if ssl is not None: |
| |
| CERTFILE = os.path.join(os.path.dirname(__file__), "keycert.pem") |
| |
| class SSLConnection(asyncore.dispatcher): |
| """An asyncore.dispatcher subclass supporting TLS/SSL.""" |
| |
| _ssl_accepting = False |
| _ssl_closing = False |
| |
| def secure_connection(self): |
| socket = ssl.wrap_socket(self.socket, suppress_ragged_eofs=False, |
| certfile=CERTFILE, server_side=True, |
| do_handshake_on_connect=False, |
| ssl_version=ssl.PROTOCOL_SSLv23) |
| self.del_channel() |
| self.set_socket(socket) |
| self._ssl_accepting = True |
| |
| def _do_ssl_handshake(self): |
| try: |
| self.socket.do_handshake() |
| except ssl.SSLError as err: |
| if err.args[0] in (ssl.SSL_ERROR_WANT_READ, |
| ssl.SSL_ERROR_WANT_WRITE): |
| return |
| elif err.args[0] == ssl.SSL_ERROR_EOF: |
| return self.handle_close() |
| raise |
| except OSError as err: |
| if err.args[0] == errno.ECONNABORTED: |
| return self.handle_close() |
| else: |
| self._ssl_accepting = False |
| |
| def _do_ssl_shutdown(self): |
| self._ssl_closing = True |
| try: |
| self.socket = self.socket.unwrap() |
| except ssl.SSLError as err: |
| if err.args[0] in (ssl.SSL_ERROR_WANT_READ, |
| ssl.SSL_ERROR_WANT_WRITE): |
| return |
| except OSError as err: |
| # Any "socket error" corresponds to a SSL_ERROR_SYSCALL return |
| # from OpenSSL's SSL_shutdown(), corresponding to a |
| # closed socket condition. See also: |
| # http://www.mail-archive.com/openssl-users@openssl.org/msg60710.html |
| pass |
| self._ssl_closing = False |
| if getattr(self, '_ccc', False) is False: |
| super(SSLConnection, self).close() |
| else: |
| pass |
| |
| def handle_read_event(self): |
| if self._ssl_accepting: |
| self._do_ssl_handshake() |
| elif self._ssl_closing: |
| self._do_ssl_shutdown() |
| else: |
| super(SSLConnection, self).handle_read_event() |
| |
| def handle_write_event(self): |
| if self._ssl_accepting: |
| self._do_ssl_handshake() |
| elif self._ssl_closing: |
| self._do_ssl_shutdown() |
| else: |
| super(SSLConnection, self).handle_write_event() |
| |
| def send(self, data): |
| try: |
| return super(SSLConnection, self).send(data) |
| except ssl.SSLError as err: |
| if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN, |
| ssl.SSL_ERROR_WANT_READ, |
| ssl.SSL_ERROR_WANT_WRITE): |
| return 0 |
| raise |
| |
| def recv(self, buffer_size): |
| try: |
| return super(SSLConnection, self).recv(buffer_size) |
| except ssl.SSLError as err: |
| if err.args[0] in (ssl.SSL_ERROR_WANT_READ, |
| ssl.SSL_ERROR_WANT_WRITE): |
| return b'' |
| if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN): |
| self.handle_close() |
| return b'' |
| raise |
| |
| def handle_error(self): |
| raise |
| |
| def close(self): |
| if (isinstance(self.socket, ssl.SSLSocket) and |
| self.socket._sslobj is not None): |
| self._do_ssl_shutdown() |
| else: |
| super(SSLConnection, self).close() |
| |
| |
| class DummyTLS_DTPHandler(SSLConnection, DummyDTPHandler): |
| """A DummyDTPHandler subclass supporting TLS/SSL.""" |
| |
| def __init__(self, conn, baseclass): |
| DummyDTPHandler.__init__(self, conn, baseclass) |
| if self.baseclass.secure_data_channel: |
| self.secure_connection() |
| |
| |
| class DummyTLS_FTPHandler(SSLConnection, DummyFTPHandler): |
| """A DummyFTPHandler subclass supporting TLS/SSL.""" |
| |
| dtp_handler = DummyTLS_DTPHandler |
| |
| def __init__(self, conn): |
| DummyFTPHandler.__init__(self, conn) |
| self.secure_data_channel = False |
| self._ccc = False |
| |
| def cmd_auth(self, line): |
| """Set up secure control channel.""" |
| self.push('234 AUTH TLS successful') |
| self.secure_connection() |
| |
| def cmd_ccc(self, line): |
| self.push('220 Reverting back to clear-text') |
| self._ccc = True |
| self._do_ssl_shutdown() |
| |
| def cmd_pbsz(self, line): |
| """Negotiate size of buffer for secure data transfer. |
| For TLS/SSL the only valid value for the parameter is '0'. |
| Any other value is accepted but ignored. |
| """ |
| self.push('200 PBSZ=0 successful.') |
| |
| def cmd_prot(self, line): |
| """Setup un/secure data channel.""" |
| arg = line.upper() |
| if arg == 'C': |
| self.push('200 Protection set to Clear') |
| self.secure_data_channel = False |
| elif arg == 'P': |
| self.push('200 Protection set to Private') |
| self.secure_data_channel = True |
| else: |
| self.push("502 Unrecognized PROT type (use C or P).") |
| |
| |
| class DummyTLS_FTPServer(DummyFTPServer): |
| handler = DummyTLS_FTPHandler |
| |
| |
| class TestFTPClass(TestCase): |
| |
| def setUp(self): |
| self.server = DummyFTPServer((HOST, 0)) |
| self.server.start() |
| self.client = ftplib.FTP(timeout=TIMEOUT) |
| self.client.connect(self.server.host, self.server.port) |
| |
| def tearDown(self): |
| self.client.close() |
| self.server.stop() |
| |
| def check_data(self, received, expected): |
| self.assertEqual(len(received), len(expected)) |
| self.assertEqual(received, expected) |
| |
| def test_getwelcome(self): |
| self.assertEqual(self.client.getwelcome(), '220 welcome') |
| |
| def test_sanitize(self): |
| self.assertEqual(self.client.sanitize('foo'), repr('foo')) |
| self.assertEqual(self.client.sanitize('pass 12345'), repr('pass *****')) |
| self.assertEqual(self.client.sanitize('PASS 12345'), repr('PASS *****')) |
| |
| def test_exceptions(self): |
| self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 400') |
| self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 499') |
| self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 500') |
| self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 599') |
| self.assertRaises(ftplib.error_proto, self.client.sendcmd, 'echo 999') |
| |
| def test_all_errors(self): |
| exceptions = (ftplib.error_reply, ftplib.error_temp, ftplib.error_perm, |
| ftplib.error_proto, ftplib.Error, OSError, EOFError) |
| for x in exceptions: |
| try: |
| raise x('exception not included in all_errors set') |
| except ftplib.all_errors: |
| pass |
| |
| def test_set_pasv(self): |
| # passive mode is supposed to be enabled by default |
| self.assertTrue(self.client.passiveserver) |
| self.client.set_pasv(True) |
| self.assertTrue(self.client.passiveserver) |
| self.client.set_pasv(False) |
| self.assertFalse(self.client.passiveserver) |
| |
| def test_voidcmd(self): |
| self.client.voidcmd('echo 200') |
| self.client.voidcmd('echo 299') |
| self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 199') |
| self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 300') |
| |
| def test_login(self): |
| self.client.login() |
| |
| def test_acct(self): |
| self.client.acct('passwd') |
| |
| def test_rename(self): |
| self.client.rename('a', 'b') |
| self.server.handler_instance.next_response = '200' |
| self.assertRaises(ftplib.error_reply, self.client.rename, 'a', 'b') |
| |
| def test_delete(self): |
| self.client.delete('foo') |
| self.server.handler_instance.next_response = '199' |
| self.assertRaises(ftplib.error_reply, self.client.delete, 'foo') |
| |
| def test_size(self): |
| self.client.size('foo') |
| |
| def test_mkd(self): |
| dir = self.client.mkd('/foo') |
| self.assertEqual(dir, '/foo') |
| |
| def test_rmd(self): |
| self.client.rmd('foo') |
| |
| def test_cwd(self): |
| dir = self.client.cwd('/foo') |
| self.assertEqual(dir, '250 cwd ok') |
| |
| def test_pwd(self): |
| dir = self.client.pwd() |
| self.assertEqual(dir, 'pwd ok') |
| |
| def test_quit(self): |
| self.assertEqual(self.client.quit(), '221 quit ok') |
| # Ensure the connection gets closed; sock attribute should be None |
| self.assertEqual(self.client.sock, None) |
| |
| def test_abort(self): |
| self.client.abort() |
| |
| def test_retrbinary(self): |
| def callback(data): |
| received.append(data.decode('ascii')) |
| received = [] |
| self.client.retrbinary('retr', callback) |
| self.check_data(''.join(received), RETR_DATA) |
| |
| def test_retrbinary_rest(self): |
| def callback(data): |
| received.append(data.decode('ascii')) |
| for rest in (0, 10, 20): |
| received = [] |
| self.client.retrbinary('retr', callback, rest=rest) |
| self.check_data(''.join(received), RETR_DATA[rest:]) |
| |
| def test_retrlines(self): |
| received = [] |
| self.client.retrlines('retr', received.append) |
| self.check_data(''.join(received), RETR_DATA.replace('\r\n', '')) |
| |
| def test_storbinary(self): |
| f = io.BytesIO(RETR_DATA.encode('ascii')) |
| self.client.storbinary('stor', f) |
| self.check_data(self.server.handler_instance.last_received_data, RETR_DATA) |
| # test new callback arg |
| flag = [] |
| f.seek(0) |
| self.client.storbinary('stor', f, callback=lambda x: flag.append(None)) |
| self.assertTrue(flag) |
| |
| def test_storbinary_rest(self): |
| f = io.BytesIO(RETR_DATA.replace('\r\n', '\n').encode('ascii')) |
| for r in (30, '30'): |
| f.seek(0) |
| self.client.storbinary('stor', f, rest=r) |
| self.assertEqual(self.server.handler_instance.rest, str(r)) |
| |
| def test_storlines(self): |
| f = io.BytesIO(RETR_DATA.replace('\r\n', '\n').encode('ascii')) |
| self.client.storlines('stor', f) |
| self.check_data(self.server.handler_instance.last_received_data, RETR_DATA) |
| # test new callback arg |
| flag = [] |
| f.seek(0) |
| self.client.storlines('stor foo', f, callback=lambda x: flag.append(None)) |
| self.assertTrue(flag) |
| |
| f = io.StringIO(RETR_DATA.replace('\r\n', '\n')) |
| # storlines() expects a binary file, not a text file |
| with support.check_warnings(('', BytesWarning), quiet=True): |
| self.assertRaises(TypeError, self.client.storlines, 'stor foo', f) |
| |
| def test_nlst(self): |
| self.client.nlst() |
| self.assertEqual(self.client.nlst(), NLST_DATA.split('\r\n')[:-1]) |
| |
| def test_dir(self): |
| l = [] |
| self.client.dir(lambda x: l.append(x)) |
| self.assertEqual(''.join(l), LIST_DATA.replace('\r\n', '')) |
| |
| def test_mlsd(self): |
| list(self.client.mlsd()) |
| list(self.client.mlsd(path='/')) |
| list(self.client.mlsd(path='/', facts=['size', 'type'])) |
| |
| ls = list(self.client.mlsd()) |
| for name, facts in ls: |
| self.assertIsInstance(name, str) |
| self.assertIsInstance(facts, dict) |
| self.assertTrue(name) |
| self.assertIn('type', facts) |
| self.assertIn('perm', facts) |
| self.assertIn('unique', facts) |
| |
| def set_data(data): |
| self.server.handler_instance.next_data = data |
| |
| def test_entry(line, type=None, perm=None, unique=None, name=None): |
| type = 'type' if type is None else type |
| perm = 'perm' if perm is None else perm |
| unique = 'unique' if unique is None else unique |
| name = 'name' if name is None else name |
| set_data(line) |
| _name, facts = next(self.client.mlsd()) |
| self.assertEqual(_name, name) |
| self.assertEqual(facts['type'], type) |
| self.assertEqual(facts['perm'], perm) |
| self.assertEqual(facts['unique'], unique) |
| |
| # plain |
| test_entry('type=type;perm=perm;unique=unique; name\r\n') |
| # "=" in fact value |
| test_entry('type=ty=pe;perm=perm;unique=unique; name\r\n', type="ty=pe") |
| test_entry('type==type;perm=perm;unique=unique; name\r\n', type="=type") |
| test_entry('type=t=y=pe;perm=perm;unique=unique; name\r\n', type="t=y=pe") |
| test_entry('type=====;perm=perm;unique=unique; name\r\n', type="====") |
| # spaces in name |
| test_entry('type=type;perm=perm;unique=unique; na me\r\n', name="na me") |
| test_entry('type=type;perm=perm;unique=unique; name \r\n', name="name ") |
| test_entry('type=type;perm=perm;unique=unique; name\r\n', name=" name") |
| test_entry('type=type;perm=perm;unique=unique; n am e\r\n', name="n am e") |
| # ";" in name |
| test_entry('type=type;perm=perm;unique=unique; na;me\r\n', name="na;me") |
| test_entry('type=type;perm=perm;unique=unique; ;name\r\n', name=";name") |
| test_entry('type=type;perm=perm;unique=unique; ;name;\r\n', name=";name;") |
| test_entry('type=type;perm=perm;unique=unique; ;;;;\r\n', name=";;;;") |
| # case sensitiveness |
| set_data('Type=type;TyPe=perm;UNIQUE=unique; name\r\n') |
| _name, facts = next(self.client.mlsd()) |
| for x in facts: |
| self.assertTrue(x.islower()) |
| # no data (directory empty) |
| set_data('') |
| self.assertRaises(StopIteration, next, self.client.mlsd()) |
| set_data('') |
| for x in self.client.mlsd(): |
| self.fail("unexpected data %s" % data) |
| |
| def test_makeport(self): |
| with self.client.makeport(): |
| # IPv4 is in use, just make sure send_eprt has not been used |
| self.assertEqual(self.server.handler_instance.last_received_cmd, |
| 'port') |
| |
| def test_makepasv(self): |
| host, port = self.client.makepasv() |
| conn = socket.create_connection((host, port), timeout=TIMEOUT) |
| conn.close() |
| # IPv4 is in use, just make sure send_epsv has not been used |
| self.assertEqual(self.server.handler_instance.last_received_cmd, 'pasv') |
| |
| def test_with_statement(self): |
| self.client.quit() |
| |
| def is_client_connected(): |
| if self.client.sock is None: |
| return False |
| try: |
| self.client.sendcmd('noop') |
| except (OSError, EOFError): |
| return False |
| return True |
| |
| # base test |
| with ftplib.FTP(timeout=TIMEOUT) as self.client: |
| self.client.connect(self.server.host, self.server.port) |
| self.client.sendcmd('noop') |
| self.assertTrue(is_client_connected()) |
| self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit') |
| self.assertFalse(is_client_connected()) |
| |
| # QUIT sent inside the with block |
| with ftplib.FTP(timeout=TIMEOUT) as self.client: |
| self.client.connect(self.server.host, self.server.port) |
| self.client.sendcmd('noop') |
| self.client.quit() |
| self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit') |
| self.assertFalse(is_client_connected()) |
| |
| # force a wrong response code to be sent on QUIT: error_perm |
| # is expected and the connection is supposed to be closed |
| try: |
| with ftplib.FTP(timeout=TIMEOUT) as self.client: |
| self.client.connect(self.server.host, self.server.port) |
| self.client.sendcmd('noop') |
| self.server.handler_instance.next_response = '550 error on quit' |
| except ftplib.error_perm as err: |
| self.assertEqual(str(err), '550 error on quit') |
| else: |
| self.fail('Exception not raised') |
| # needed to give the threaded server some time to set the attribute |
| # which otherwise would still be == 'noop' |
| time.sleep(0.1) |
| self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit') |
| self.assertFalse(is_client_connected()) |
| |
| def test_source_address(self): |
| self.client.quit() |
| port = support.find_unused_port() |
| try: |
| self.client.connect(self.server.host, self.server.port, |
| source_address=(HOST, port)) |
| self.assertEqual(self.client.sock.getsockname()[1], port) |
| self.client.quit() |
| except OSError as e: |
| if e.errno == errno.EADDRINUSE: |
| self.skipTest("couldn't bind to port %d" % port) |
| raise |
| |
| def test_source_address_passive_connection(self): |
| port = support.find_unused_port() |
| self.client.source_address = (HOST, port) |
| try: |
| with self.client.transfercmd('list') as sock: |
| self.assertEqual(sock.getsockname()[1], port) |
| except OSError as e: |
| if e.errno == errno.EADDRINUSE: |
| self.skipTest("couldn't bind to port %d" % port) |
| raise |
| |
| def test_parse257(self): |
| self.assertEqual(ftplib.parse257('257 "/foo/bar"'), '/foo/bar') |
| self.assertEqual(ftplib.parse257('257 "/foo/bar" created'), '/foo/bar') |
| self.assertEqual(ftplib.parse257('257 ""'), '') |
| self.assertEqual(ftplib.parse257('257 "" created'), '') |
| self.assertRaises(ftplib.error_reply, ftplib.parse257, '250 "/foo/bar"') |
| # The 257 response is supposed to include the directory |
| # name and in case it contains embedded double-quotes |
| # they must be doubled (see RFC-959, chapter 7, appendix 2). |
| self.assertEqual(ftplib.parse257('257 "/foo/b""ar"'), '/foo/b"ar') |
| self.assertEqual(ftplib.parse257('257 "/foo/b""ar" created'), '/foo/b"ar') |
| |
| def test_line_too_long(self): |
| self.assertRaises(ftplib.Error, self.client.sendcmd, |
| 'x' * self.client.maxline * 2) |
| |
| def test_retrlines_too_long(self): |
| self.client.sendcmd('SETLONGRETR %d' % (self.client.maxline * 2)) |
| received = [] |
| self.assertRaises(ftplib.Error, |
| self.client.retrlines, 'retr', received.append) |
| |
| def test_storlines_too_long(self): |
| f = io.BytesIO(b'x' * self.client.maxline * 2) |
| self.assertRaises(ftplib.Error, self.client.storlines, 'stor', f) |
| |
| |
| class TestIPv6Environment(TestCase): |
| |
| def setUp(self): |
| self.server = DummyFTPServer((HOSTv6, 0), af=socket.AF_INET6) |
| self.server.start() |
| self.client = ftplib.FTP(timeout=TIMEOUT) |
| self.client.connect(self.server.host, self.server.port) |
| |
| def tearDown(self): |
| self.client.close() |
| self.server.stop() |
| |
| def test_af(self): |
| self.assertEqual(self.client.af, socket.AF_INET6) |
| |
| def test_makeport(self): |
| with self.client.makeport(): |
| self.assertEqual(self.server.handler_instance.last_received_cmd, |
| 'eprt') |
| |
| def test_makepasv(self): |
| host, port = self.client.makepasv() |
| conn = socket.create_connection((host, port), timeout=TIMEOUT) |
| conn.close() |
| self.assertEqual(self.server.handler_instance.last_received_cmd, 'epsv') |
| |
| def test_transfer(self): |
| def retr(): |
| def callback(data): |
| received.append(data.decode('ascii')) |
| received = [] |
| self.client.retrbinary('retr', callback) |
| self.assertEqual(len(''.join(received)), len(RETR_DATA)) |
| self.assertEqual(''.join(received), RETR_DATA) |
| self.client.set_pasv(True) |
| retr() |
| self.client.set_pasv(False) |
| retr() |
| |
| |
| class TestTLS_FTPClassMixin(TestFTPClass): |
| """Repeat TestFTPClass tests starting the TLS layer for both control |
| and data connections first. |
| """ |
| |
| def setUp(self): |
| self.server = DummyTLS_FTPServer((HOST, 0)) |
| self.server.start() |
| self.client = ftplib.FTP_TLS(timeout=TIMEOUT) |
| self.client.connect(self.server.host, self.server.port) |
| # enable TLS |
| self.client.auth() |
| self.client.prot_p() |
| |
| |
| class TestTLS_FTPClass(TestCase): |
| """Specific TLS_FTP class tests.""" |
| |
| def setUp(self): |
| self.server = DummyTLS_FTPServer((HOST, 0)) |
| self.server.start() |
| self.client = ftplib.FTP_TLS(timeout=TIMEOUT) |
| self.client.connect(self.server.host, self.server.port) |
| |
| def tearDown(self): |
| self.client.close() |
| self.server.stop() |
| |
| def test_control_connection(self): |
| self.assertNotIsInstance(self.client.sock, ssl.SSLSocket) |
| self.client.auth() |
| self.assertIsInstance(self.client.sock, ssl.SSLSocket) |
| |
| def test_data_connection(self): |
| # clear text |
| with self.client.transfercmd('list') as sock: |
| self.assertNotIsInstance(sock, ssl.SSLSocket) |
| self.assertEqual(self.client.voidresp(), "226 transfer complete") |
| |
| # secured, after PROT P |
| self.client.prot_p() |
| with self.client.transfercmd('list') as sock: |
| self.assertIsInstance(sock, ssl.SSLSocket) |
| self.assertEqual(self.client.voidresp(), "226 transfer complete") |
| |
| # PROT C is issued, the connection must be in cleartext again |
| self.client.prot_c() |
| with self.client.transfercmd('list') as sock: |
| self.assertNotIsInstance(sock, ssl.SSLSocket) |
| self.assertEqual(self.client.voidresp(), "226 transfer complete") |
| |
| def test_login(self): |
| # login() is supposed to implicitly secure the control connection |
| self.assertNotIsInstance(self.client.sock, ssl.SSLSocket) |
| self.client.login() |
| self.assertIsInstance(self.client.sock, ssl.SSLSocket) |
| # make sure that AUTH TLS doesn't get issued again |
| self.client.login() |
| |
| def test_auth_issued_twice(self): |
| self.client.auth() |
| self.assertRaises(ValueError, self.client.auth) |
| |
| def test_auth_ssl(self): |
| try: |
| self.client.ssl_version = ssl.PROTOCOL_SSLv3 |
| self.client.auth() |
| self.assertRaises(ValueError, self.client.auth) |
| finally: |
| self.client.ssl_version = ssl.PROTOCOL_TLSv1 |
| |
| def test_context(self): |
| self.client.quit() |
| ctx = ssl.SSLContext(ssl.PROTOCOL_TLSv1) |
| self.assertRaises(ValueError, ftplib.FTP_TLS, keyfile=CERTFILE, |
| context=ctx) |
| self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE, |
| context=ctx) |
| self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE, |
| keyfile=CERTFILE, context=ctx) |
| |
| self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT) |
| self.client.connect(self.server.host, self.server.port) |
| self.assertNotIsInstance(self.client.sock, ssl.SSLSocket) |
| self.client.auth() |
| self.assertIs(self.client.sock.context, ctx) |
| self.assertIsInstance(self.client.sock, ssl.SSLSocket) |
| |
| self.client.prot_p() |
| with self.client.transfercmd('list') as sock: |
| self.assertIs(sock.context, ctx) |
| self.assertIsInstance(sock, ssl.SSLSocket) |
| |
| def test_ccc(self): |
| self.assertRaises(ValueError, self.client.ccc) |
| self.client.login(secure=True) |
| self.assertIsInstance(self.client.sock, ssl.SSLSocket) |
| self.client.ccc() |
| self.assertRaises(ValueError, self.client.sock.unwrap) |
| |
| |
| class TestTimeouts(TestCase): |
| |
| def setUp(self): |
| self.evt = threading.Event() |
| self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) |
| self.sock.settimeout(20) |
| self.port = support.bind_port(self.sock) |
| self.server_thread = threading.Thread(target=self.server) |
| self.server_thread.start() |
| # Wait for the server to be ready. |
| self.evt.wait() |
| self.evt.clear() |
| self.old_port = ftplib.FTP.port |
| ftplib.FTP.port = self.port |
| |
| def tearDown(self): |
| ftplib.FTP.port = self.old_port |
| self.server_thread.join() |
| |
| def server(self): |
| # This method sets the evt 3 times: |
| # 1) when the connection is ready to be accepted. |
| # 2) when it is safe for the caller to close the connection |
| # 3) when we have closed the socket |
| self.sock.listen(5) |
| # (1) Signal the caller that we are ready to accept the connection. |
| self.evt.set() |
| try: |
| conn, addr = self.sock.accept() |
| except socket.timeout: |
| pass |
| else: |
| conn.sendall(b"1 Hola mundo\n") |
| conn.shutdown(socket.SHUT_WR) |
| # (2) Signal the caller that it is safe to close the socket. |
| self.evt.set() |
| conn.close() |
| finally: |
| self.sock.close() |
| |
| def testTimeoutDefault(self): |
| # default -- use global socket timeout |
| self.assertTrue(socket.getdefaulttimeout() is None) |
| socket.setdefaulttimeout(30) |
| try: |
| ftp = ftplib.FTP(HOST) |
| finally: |
| socket.setdefaulttimeout(None) |
| self.assertEqual(ftp.sock.gettimeout(), 30) |
| self.evt.wait() |
| ftp.close() |
| |
| def testTimeoutNone(self): |
| # no timeout -- do not use global socket timeout |
| self.assertTrue(socket.getdefaulttimeout() is None) |
| socket.setdefaulttimeout(30) |
| try: |
| ftp = ftplib.FTP(HOST, timeout=None) |
| finally: |
| socket.setdefaulttimeout(None) |
| self.assertTrue(ftp.sock.gettimeout() is None) |
| self.evt.wait() |
| ftp.close() |
| |
| def testTimeoutValue(self): |
| # a value |
| ftp = ftplib.FTP(HOST, timeout=30) |
| self.assertEqual(ftp.sock.gettimeout(), 30) |
| self.evt.wait() |
| ftp.close() |
| |
| def testTimeoutConnect(self): |
| ftp = ftplib.FTP() |
| ftp.connect(HOST, timeout=30) |
| self.assertEqual(ftp.sock.gettimeout(), 30) |
| self.evt.wait() |
| ftp.close() |
| |
| def testTimeoutDifferentOrder(self): |
| ftp = ftplib.FTP(timeout=30) |
| ftp.connect(HOST) |
| self.assertEqual(ftp.sock.gettimeout(), 30) |
| self.evt.wait() |
| ftp.close() |
| |
| def testTimeoutDirectAccess(self): |
| ftp = ftplib.FTP() |
| ftp.timeout = 30 |
| ftp.connect(HOST) |
| self.assertEqual(ftp.sock.gettimeout(), 30) |
| self.evt.wait() |
| ftp.close() |
| |
| |
| class TestNetrcDeprecation(TestCase): |
| |
| def test_deprecation(self): |
| with support.temp_cwd(), support.EnvironmentVarGuard() as env: |
| env['HOME'] = os.getcwd() |
| open('.netrc', 'w').close() |
| with self.assertWarns(DeprecationWarning): |
| ftplib.Netrc() |
| |
| |
| |
| def test_main(): |
| tests = [TestFTPClass, TestTimeouts, TestNetrcDeprecation] |
| if support.IPV6_ENABLED: |
| tests.append(TestIPv6Environment) |
| |
| if ssl is not None: |
| tests.extend([TestTLS_FTPClassMixin, TestTLS_FTPClass]) |
| |
| thread_info = support.threading_setup() |
| try: |
| support.run_unittest(*tests) |
| finally: |
| support.threading_cleanup(*thread_info) |
| |
| |
| if __name__ == '__main__': |
| test_main() |