blob: cf30a3df35f128a94a51e62fc3a445728c36152a [file] [log] [blame]
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001"""Test script for ftplib module."""
2
Antoine Pitrouf988cd02009-11-17 20:21:14 +00003# Modified by Giampaolo Rodola' to test FTP class, IPv6 and TLS
4# environment
Benjamin Petersonbe17a112008-09-27 21:49:47 +00005
Guido van Rossumd8faa362007-04-27 19:54:29 +00006import ftplib
Benjamin Petersonbe17a112008-09-27 21:49:47 +00007import asyncore
8import asynchat
9import socket
10import io
Antoine Pitrouf988cd02009-11-17 20:21:14 +000011import errno
12import os
Antoine Pitroua6a4dc82017-09-07 18:56:24 +020013import threading
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +000014import time
Antoine Pitrouf988cd02009-11-17 20:21:14 +000015try:
16 import ssl
17except ImportError:
18 ssl = None
Guido van Rossumd8faa362007-04-27 19:54:29 +000019
Serhiy Storchaka43767632013-11-03 21:31:38 +020020from unittest import TestCase, skipUnless
Benjamin Petersonee8712c2008-05-20 21:35:26 +000021from test import support
Antoine Pitrouf6fbf562013-08-22 00:39:46 +020022from test.support import HOST, HOSTv6
Guido van Rossumd8faa362007-04-27 19:54:29 +000023
Victor Stinner07871b22019-12-10 20:32:59 +010024TIMEOUT = support.LOOPBACK_TIMEOUT
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020025DEFAULT_ENCODING = 'utf-8'
Benjamin Petersonbe17a112008-09-27 21:49:47 +000026# the dummy data returned by server over the data channel when
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020027# RETR, LIST, NLST, MLSD commands are issued
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020028RETR_DATA = 'abcde12345\r\n' * 1000 + 'non-ascii char \xAE\r\n'
29LIST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
30NLST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020031MLSD_DATA = ("type=cdir;perm=el;unique==keVO1+ZF4; test\r\n"
32 "type=pdir;perm=e;unique==keVO1+d?3; ..\r\n"
33 "type=OS.unix=slink:/foobar;perm=;unique==keVO1+4G4; foobar\r\n"
34 "type=OS.unix=chr-13/29;perm=;unique==keVO1+5G4; device\r\n"
35 "type=OS.unix=blk-11/108;perm=;unique==keVO1+6G4; block\r\n"
36 "type=file;perm=awr;unique==keVO1+8G4; writable\r\n"
37 "type=dir;perm=cpmel;unique==keVO1+7G4; promiscuous\r\n"
38 "type=dir;perm=;unique==keVO1+1t2; no-exec\r\n"
39 "type=file;perm=r;unique==keVO1+EG4; two words\r\n"
40 "type=file;perm=r;unique==keVO1+IH4; leading space\r\n"
41 "type=file;perm=r;unique==keVO1+1G4; file1\r\n"
42 "type=dir;perm=cpmel;unique==keVO1+7G4; incoming\r\n"
43 "type=file;perm=r;unique==keVO1+1G4; file2\r\n"
44 "type=file;perm=r;unique==keVO1+1G4; file3\r\n"
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020045 "type=file;perm=r;unique==keVO1+1G4; file4\r\n"
46 "type=dir;perm=cpmel;unique==SGP1; dir \xAE non-ascii char\r\n"
47 "type=file;perm=r;unique==SGP2; file \xAE non-ascii char\r\n")
Christian Heimes836baa52008-02-26 08:18:30 +000048
Christian Heimes836baa52008-02-26 08:18:30 +000049
Benjamin Petersonbe17a112008-09-27 21:49:47 +000050class DummyDTPHandler(asynchat.async_chat):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +000051 dtp_conn_closed = False
Benjamin Petersonbe17a112008-09-27 21:49:47 +000052
53 def __init__(self, conn, baseclass):
54 asynchat.async_chat.__init__(self, conn)
55 self.baseclass = baseclass
56 self.baseclass.last_received_data = ''
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020057 self.encoding = baseclass.encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +000058
59 def handle_read(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020060 new_data = self.recv(1024).decode(self.encoding, 'replace')
61 self.baseclass.last_received_data += new_data
Benjamin Petersonbe17a112008-09-27 21:49:47 +000062
63 def handle_close(self):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +000064 # XXX: this method can be called many times in a row for a single
65 # connection, including in clear-text (non-TLS) mode.
66 # (behaviour witnessed with test_data_connection)
67 if not self.dtp_conn_closed:
68 self.baseclass.push('226 transfer complete')
69 self.close()
70 self.dtp_conn_closed = True
Benjamin Petersonbe17a112008-09-27 21:49:47 +000071
72 def push(self, what):
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020073 if self.baseclass.next_data is not None:
74 what = self.baseclass.next_data
75 self.baseclass.next_data = None
76 if not what:
77 return self.close_when_done()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020078 super(DummyDTPHandler, self).push(what.encode(self.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +000079
Giampaolo Rodolàd930b632010-05-06 20:21:57 +000080 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +020081 raise Exception
Giampaolo Rodolàd930b632010-05-06 20:21:57 +000082
Benjamin Petersonbe17a112008-09-27 21:49:47 +000083
84class DummyFTPHandler(asynchat.async_chat):
85
Antoine Pitrouf988cd02009-11-17 20:21:14 +000086 dtp_handler = DummyDTPHandler
87
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020088 def __init__(self, conn, encoding=DEFAULT_ENCODING):
Benjamin Petersonbe17a112008-09-27 21:49:47 +000089 asynchat.async_chat.__init__(self, conn)
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +020090 # tells the socket to handle urgent data inline (ABOR command)
91 self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_OOBINLINE, 1)
Benjamin Petersonbe17a112008-09-27 21:49:47 +000092 self.set_terminator(b"\r\n")
93 self.in_buffer = []
94 self.dtp = None
95 self.last_received_cmd = None
96 self.last_received_data = ''
97 self.next_response = ''
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020098 self.next_data = None
Antoine Pitrou648bcd72009-11-27 13:23:26 +000099 self.rest = None
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300100 self.next_retr_data = RETR_DATA
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000101 self.push('220 welcome')
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200102 self.encoding = encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000103
104 def collect_incoming_data(self, data):
105 self.in_buffer.append(data)
106
107 def found_terminator(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200108 line = b''.join(self.in_buffer).decode(self.encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000109 self.in_buffer = []
110 if self.next_response:
111 self.push(self.next_response)
112 self.next_response = ''
113 cmd = line.split(' ')[0].lower()
114 self.last_received_cmd = cmd
115 space = line.find(' ')
116 if space != -1:
117 arg = line[space + 1:]
118 else:
119 arg = ""
120 if hasattr(self, 'cmd_' + cmd):
121 method = getattr(self, 'cmd_' + cmd)
122 method(arg)
123 else:
124 self.push('550 command "%s" not understood.' %cmd)
125
126 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200127 raise Exception
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000128
129 def push(self, data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200130 asynchat.async_chat.push(self, data.encode(self.encoding) + b'\r\n')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000131
132 def cmd_port(self, arg):
133 addr = list(map(int, arg.split(',')))
134 ip = '%d.%d.%d.%d' %tuple(addr[:4])
135 port = (addr[4] * 256) + addr[5]
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200136 s = socket.create_connection((ip, port), timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000137 self.dtp = self.dtp_handler(s, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000138 self.push('200 active data connection established')
139
140 def cmd_pasv(self, arg):
Giampaolo Rodolaeb7e29f2019-04-09 00:34:02 +0200141 with socket.create_server((self.socket.getsockname()[0], 0)) as sock:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200142 sock.settimeout(TIMEOUT)
Brett Cannon918e2d42010-10-29 23:26:25 +0000143 ip, port = sock.getsockname()[:2]
144 ip = ip.replace('.', ','); p1 = port / 256; p2 = port % 256
145 self.push('227 entering passive mode (%s,%d,%d)' %(ip, p1, p2))
146 conn, addr = sock.accept()
147 self.dtp = self.dtp_handler(conn, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000148
149 def cmd_eprt(self, arg):
150 af, ip, port = arg.split(arg[0])[1:-1]
151 port = int(port)
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200152 s = socket.create_connection((ip, port), timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000153 self.dtp = self.dtp_handler(s, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000154 self.push('200 active data connection established')
155
156 def cmd_epsv(self, arg):
Giampaolo Rodolaeb7e29f2019-04-09 00:34:02 +0200157 with socket.create_server((self.socket.getsockname()[0], 0),
158 family=socket.AF_INET6) as sock:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200159 sock.settimeout(TIMEOUT)
Brett Cannon918e2d42010-10-29 23:26:25 +0000160 port = sock.getsockname()[1]
161 self.push('229 entering extended passive mode (|||%d|)' %port)
162 conn, addr = sock.accept()
163 self.dtp = self.dtp_handler(conn, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000164
165 def cmd_echo(self, arg):
166 # sends back the received string (used by the test suite)
167 self.push(arg)
168
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000169 def cmd_noop(self, arg):
170 self.push('200 noop ok')
171
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000172 def cmd_user(self, arg):
173 self.push('331 username ok')
174
175 def cmd_pass(self, arg):
176 self.push('230 password ok')
177
178 def cmd_acct(self, arg):
179 self.push('230 acct ok')
180
181 def cmd_rnfr(self, arg):
182 self.push('350 rnfr ok')
183
184 def cmd_rnto(self, arg):
185 self.push('250 rnto ok')
186
187 def cmd_dele(self, arg):
188 self.push('250 dele ok')
189
190 def cmd_cwd(self, arg):
191 self.push('250 cwd ok')
192
193 def cmd_size(self, arg):
194 self.push('250 1000')
195
196 def cmd_mkd(self, arg):
197 self.push('257 "%s"' %arg)
198
199 def cmd_rmd(self, arg):
200 self.push('250 rmd ok')
201
202 def cmd_pwd(self, arg):
203 self.push('257 "pwd ok"')
204
205 def cmd_type(self, arg):
Giampaolo Rodolàf96482e2010-08-04 10:36:18 +0000206 self.push('200 type ok')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000207
208 def cmd_quit(self, arg):
209 self.push('221 quit ok')
210 self.close()
211
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +0200212 def cmd_abor(self, arg):
213 self.push('226 abor ok')
214
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000215 def cmd_stor(self, arg):
216 self.push('125 stor ok')
217
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000218 def cmd_rest(self, arg):
219 self.rest = arg
220 self.push('350 rest ok')
221
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000222 def cmd_retr(self, arg):
223 self.push('125 retr ok')
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000224 if self.rest is not None:
225 offset = int(self.rest)
226 else:
227 offset = 0
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300228 self.dtp.push(self.next_retr_data[offset:])
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000229 self.dtp.close_when_done()
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000230 self.rest = None
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000231
232 def cmd_list(self, arg):
233 self.push('125 list ok')
234 self.dtp.push(LIST_DATA)
235 self.dtp.close_when_done()
236
237 def cmd_nlst(self, arg):
238 self.push('125 nlst ok')
239 self.dtp.push(NLST_DATA)
240 self.dtp.close_when_done()
241
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200242 def cmd_opts(self, arg):
243 self.push('200 opts ok')
244
245 def cmd_mlsd(self, arg):
246 self.push('125 mlsd ok')
247 self.dtp.push(MLSD_DATA)
248 self.dtp.close_when_done()
249
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300250 def cmd_setlongretr(self, arg):
251 # For testing. Next RETR will return long line.
252 self.next_retr_data = 'x' * int(arg)
253 self.push('125 setlongretr ok')
254
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000255
256class DummyFTPServer(asyncore.dispatcher, threading.Thread):
257
258 handler = DummyFTPHandler
259
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200260 def __init__(self, address, af=socket.AF_INET, encoding=DEFAULT_ENCODING):
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000261 threading.Thread.__init__(self)
262 asyncore.dispatcher.__init__(self)
Christian Heimes529525f2018-05-23 22:24:45 +0200263 self.daemon = True
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000264 self.create_socket(af, socket.SOCK_STREAM)
265 self.bind(address)
266 self.listen(5)
267 self.active = False
268 self.active_lock = threading.Lock()
269 self.host, self.port = self.socket.getsockname()[:2]
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000270 self.handler_instance = None
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200271 self.encoding = encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000272
273 def start(self):
274 assert not self.active
275 self.__flag = threading.Event()
276 threading.Thread.start(self)
277 self.__flag.wait()
278
279 def run(self):
280 self.active = True
281 self.__flag.set()
282 while self.active and asyncore.socket_map:
283 self.active_lock.acquire()
284 asyncore.loop(timeout=0.1, count=1)
285 self.active_lock.release()
286 asyncore.close_all(ignore_all=True)
287
288 def stop(self):
289 assert self.active
290 self.active = False
291 self.join()
292
Giampaolo Rodolà977c7072010-10-04 21:08:36 +0000293 def handle_accepted(self, conn, addr):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200294 self.handler_instance = self.handler(conn, encoding=self.encoding)
Benjamin Petersond06e3b02008-09-28 21:00:42 +0000295
296 def handle_connect(self):
297 self.close()
298 handle_read = handle_connect
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000299
300 def writable(self):
301 return 0
302
303 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200304 raise Exception
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000305
306
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000307if ssl is not None:
308
Christian Heimese5b5edf2013-12-02 02:56:02 +0100309 CERTFILE = os.path.join(os.path.dirname(__file__), "keycert3.pem")
310 CAFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000311
312 class SSLConnection(asyncore.dispatcher):
313 """An asyncore.dispatcher subclass supporting TLS/SSL."""
314
315 _ssl_accepting = False
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000316 _ssl_closing = False
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000317
318 def secure_connection(self):
Christian Heimesd0486372016-09-10 23:23:33 +0200319 context = ssl.SSLContext()
320 context.load_cert_chain(CERTFILE)
321 socket = context.wrap_socket(self.socket,
322 suppress_ragged_eofs=False,
323 server_side=True,
324 do_handshake_on_connect=False)
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200325 self.del_channel()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000326 self.set_socket(socket)
327 self._ssl_accepting = True
328
329 def _do_ssl_handshake(self):
330 try:
331 self.socket.do_handshake()
332 except ssl.SSLError as err:
333 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
334 ssl.SSL_ERROR_WANT_WRITE):
335 return
336 elif err.args[0] == ssl.SSL_ERROR_EOF:
337 return self.handle_close()
Christian Heimes61d478c2018-01-27 15:51:38 +0100338 # TODO: SSLError does not expose alert information
339 elif "SSLV3_ALERT_BAD_CERTIFICATE" in err.args[1]:
340 return self.handle_close()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000341 raise
Andrew Svetlov0832af62012-12-18 23:10:48 +0200342 except OSError as err:
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000343 if err.args[0] == errno.ECONNABORTED:
344 return self.handle_close()
345 else:
346 self._ssl_accepting = False
347
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000348 def _do_ssl_shutdown(self):
349 self._ssl_closing = True
350 try:
351 self.socket = self.socket.unwrap()
352 except ssl.SSLError as err:
353 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
354 ssl.SSL_ERROR_WANT_WRITE):
355 return
Pablo Galindo293dd232019-11-19 21:34:03 +0000356 except OSError:
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000357 # Any "socket error" corresponds to a SSL_ERROR_SYSCALL return
358 # from OpenSSL's SSL_shutdown(), corresponding to a
359 # closed socket condition. See also:
360 # http://www.mail-archive.com/openssl-users@openssl.org/msg60710.html
361 pass
362 self._ssl_closing = False
Benjamin Petersonb29614e2012-10-09 11:16:03 -0400363 if getattr(self, '_ccc', False) is False:
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200364 super(SSLConnection, self).close()
365 else:
366 pass
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000367
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000368 def handle_read_event(self):
369 if self._ssl_accepting:
370 self._do_ssl_handshake()
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000371 elif self._ssl_closing:
372 self._do_ssl_shutdown()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000373 else:
374 super(SSLConnection, self).handle_read_event()
375
376 def handle_write_event(self):
377 if self._ssl_accepting:
378 self._do_ssl_handshake()
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000379 elif self._ssl_closing:
380 self._do_ssl_shutdown()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000381 else:
382 super(SSLConnection, self).handle_write_event()
383
384 def send(self, data):
385 try:
386 return super(SSLConnection, self).send(data)
387 except ssl.SSLError as err:
Antoine Pitrou5733c082010-03-22 14:49:10 +0000388 if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN,
389 ssl.SSL_ERROR_WANT_READ,
390 ssl.SSL_ERROR_WANT_WRITE):
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000391 return 0
392 raise
393
394 def recv(self, buffer_size):
395 try:
396 return super(SSLConnection, self).recv(buffer_size)
397 except ssl.SSLError as err:
Antoine Pitrou5733c082010-03-22 14:49:10 +0000398 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
399 ssl.SSL_ERROR_WANT_WRITE):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000400 return b''
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000401 if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN):
402 self.handle_close()
403 return b''
404 raise
405
406 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200407 raise Exception
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000408
409 def close(self):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000410 if (isinstance(self.socket, ssl.SSLSocket) and
Christian Heimes529525f2018-05-23 22:24:45 +0200411 self.socket._sslobj is not None):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000412 self._do_ssl_shutdown()
Benjamin Peterson1bd93a72010-10-31 19:58:07 +0000413 else:
414 super(SSLConnection, self).close()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000415
416
417 class DummyTLS_DTPHandler(SSLConnection, DummyDTPHandler):
418 """A DummyDTPHandler subclass supporting TLS/SSL."""
419
420 def __init__(self, conn, baseclass):
421 DummyDTPHandler.__init__(self, conn, baseclass)
422 if self.baseclass.secure_data_channel:
423 self.secure_connection()
424
425
426 class DummyTLS_FTPHandler(SSLConnection, DummyFTPHandler):
427 """A DummyFTPHandler subclass supporting TLS/SSL."""
428
429 dtp_handler = DummyTLS_DTPHandler
430
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200431 def __init__(self, conn, encoding=DEFAULT_ENCODING):
432 DummyFTPHandler.__init__(self, conn, encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000433 self.secure_data_channel = False
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200434 self._ccc = False
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000435
436 def cmd_auth(self, line):
437 """Set up secure control channel."""
438 self.push('234 AUTH TLS successful')
439 self.secure_connection()
440
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200441 def cmd_ccc(self, line):
442 self.push('220 Reverting back to clear-text')
443 self._ccc = True
444 self._do_ssl_shutdown()
445
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000446 def cmd_pbsz(self, line):
447 """Negotiate size of buffer for secure data transfer.
448 For TLS/SSL the only valid value for the parameter is '0'.
449 Any other value is accepted but ignored.
450 """
451 self.push('200 PBSZ=0 successful.')
452
453 def cmd_prot(self, line):
454 """Setup un/secure data channel."""
455 arg = line.upper()
456 if arg == 'C':
457 self.push('200 Protection set to Clear')
458 self.secure_data_channel = False
459 elif arg == 'P':
460 self.push('200 Protection set to Private')
461 self.secure_data_channel = True
462 else:
463 self.push("502 Unrecognized PROT type (use C or P).")
464
465
466 class DummyTLS_FTPServer(DummyFTPServer):
467 handler = DummyTLS_FTPHandler
468
469
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000470class TestFTPClass(TestCase):
471
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200472 def setUp(self, encoding=DEFAULT_ENCODING):
473 self.server = DummyFTPServer((HOST, 0), encoding=encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000474 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200475 self.client = ftplib.FTP(timeout=TIMEOUT, encoding=encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000476 self.client.connect(self.server.host, self.server.port)
477
478 def tearDown(self):
479 self.client.close()
480 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700481 # Explicitly clear the attribute to prevent dangling thread
482 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200483 asyncore.close_all(ignore_all=True)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000484
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100485 def check_data(self, received, expected):
486 self.assertEqual(len(received), len(expected))
487 self.assertEqual(received, expected)
488
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000489 def test_getwelcome(self):
490 self.assertEqual(self.client.getwelcome(), '220 welcome')
491
492 def test_sanitize(self):
493 self.assertEqual(self.client.sanitize('foo'), repr('foo'))
494 self.assertEqual(self.client.sanitize('pass 12345'), repr('pass *****'))
495 self.assertEqual(self.client.sanitize('PASS 12345'), repr('PASS *****'))
496
497 def test_exceptions(self):
Dong-hee Na2b1e6e92017-07-23 02:20:22 +0900498 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r\n0')
499 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\n0')
500 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r0')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000501 self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 400')
502 self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 499')
503 self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 500')
504 self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 599')
505 self.assertRaises(ftplib.error_proto, self.client.sendcmd, 'echo 999')
506
507 def test_all_errors(self):
508 exceptions = (ftplib.error_reply, ftplib.error_temp, ftplib.error_perm,
Dong-hee Na2b1e6e92017-07-23 02:20:22 +0900509 ftplib.error_proto, ftplib.Error, OSError,
510 EOFError)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000511 for x in exceptions:
512 try:
513 raise x('exception not included in all_errors set')
514 except ftplib.all_errors:
515 pass
516
517 def test_set_pasv(self):
518 # passive mode is supposed to be enabled by default
519 self.assertTrue(self.client.passiveserver)
520 self.client.set_pasv(True)
521 self.assertTrue(self.client.passiveserver)
522 self.client.set_pasv(False)
523 self.assertFalse(self.client.passiveserver)
524
525 def test_voidcmd(self):
526 self.client.voidcmd('echo 200')
527 self.client.voidcmd('echo 299')
528 self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 199')
529 self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 300')
530
531 def test_login(self):
532 self.client.login()
533
534 def test_acct(self):
535 self.client.acct('passwd')
536
537 def test_rename(self):
538 self.client.rename('a', 'b')
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000539 self.server.handler_instance.next_response = '200'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000540 self.assertRaises(ftplib.error_reply, self.client.rename, 'a', 'b')
541
542 def test_delete(self):
543 self.client.delete('foo')
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000544 self.server.handler_instance.next_response = '199'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000545 self.assertRaises(ftplib.error_reply, self.client.delete, 'foo')
546
547 def test_size(self):
548 self.client.size('foo')
549
550 def test_mkd(self):
551 dir = self.client.mkd('/foo')
552 self.assertEqual(dir, '/foo')
553
554 def test_rmd(self):
555 self.client.rmd('foo')
556
Senthil Kumaran0d538602013-08-12 22:25:27 -0700557 def test_cwd(self):
558 dir = self.client.cwd('/foo')
559 self.assertEqual(dir, '250 cwd ok')
560
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000561 def test_pwd(self):
562 dir = self.client.pwd()
563 self.assertEqual(dir, 'pwd ok')
564
565 def test_quit(self):
566 self.assertEqual(self.client.quit(), '221 quit ok')
567 # Ensure the connection gets closed; sock attribute should be None
568 self.assertEqual(self.client.sock, None)
569
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +0200570 def test_abort(self):
571 self.client.abort()
572
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000573 def test_retrbinary(self):
574 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200575 received.append(data.decode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000576 received = []
577 self.client.retrbinary('retr', callback)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100578 self.check_data(''.join(received), RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000579
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000580 def test_retrbinary_rest(self):
581 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200582 received.append(data.decode(self.client.encoding))
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000583 for rest in (0, 10, 20):
584 received = []
585 self.client.retrbinary('retr', callback, rest=rest)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100586 self.check_data(''.join(received), RETR_DATA[rest:])
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000587
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000588 def test_retrlines(self):
589 received = []
590 self.client.retrlines('retr', received.append)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100591 self.check_data(''.join(received), RETR_DATA.replace('\r\n', ''))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000592
593 def test_storbinary(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200594 f = io.BytesIO(RETR_DATA.encode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000595 self.client.storbinary('stor', f)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100596 self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000597 # test new callback arg
598 flag = []
599 f.seek(0)
600 self.client.storbinary('stor', f, callback=lambda x: flag.append(None))
601 self.assertTrue(flag)
602
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000603 def test_storbinary_rest(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200604 data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
605 f = io.BytesIO(data)
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000606 for r in (30, '30'):
607 f.seek(0)
608 self.client.storbinary('stor', f, rest=r)
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000609 self.assertEqual(self.server.handler_instance.rest, str(r))
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000610
Giampaolo Rodolàf96482e2010-08-04 10:36:18 +0000611 def test_storlines(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200612 data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
613 f = io.BytesIO(data)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000614 self.client.storlines('stor', f)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100615 self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000616 # test new callback arg
617 flag = []
618 f.seek(0)
619 self.client.storlines('stor foo', f, callback=lambda x: flag.append(None))
620 self.assertTrue(flag)
621
Victor Stinnered3a3032013-04-02 22:13:27 +0200622 f = io.StringIO(RETR_DATA.replace('\r\n', '\n'))
623 # storlines() expects a binary file, not a text file
Florent Xicluna5f3fef32013-07-06 15:08:21 +0200624 with support.check_warnings(('', BytesWarning), quiet=True):
625 self.assertRaises(TypeError, self.client.storlines, 'stor foo', f)
Victor Stinnered3a3032013-04-02 22:13:27 +0200626
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000627 def test_nlst(self):
628 self.client.nlst()
629 self.assertEqual(self.client.nlst(), NLST_DATA.split('\r\n')[:-1])
630
631 def test_dir(self):
632 l = []
633 self.client.dir(lambda x: l.append(x))
634 self.assertEqual(''.join(l), LIST_DATA.replace('\r\n', ''))
635
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200636 def test_mlsd(self):
637 list(self.client.mlsd())
638 list(self.client.mlsd(path='/'))
639 list(self.client.mlsd(path='/', facts=['size', 'type']))
640
641 ls = list(self.client.mlsd())
642 for name, facts in ls:
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200643 self.assertIsInstance(name, str)
644 self.assertIsInstance(facts, dict)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200645 self.assertTrue(name)
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200646 self.assertIn('type', facts)
647 self.assertIn('perm', facts)
648 self.assertIn('unique', facts)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200649
650 def set_data(data):
651 self.server.handler_instance.next_data = data
652
653 def test_entry(line, type=None, perm=None, unique=None, name=None):
654 type = 'type' if type is None else type
655 perm = 'perm' if perm is None else perm
656 unique = 'unique' if unique is None else unique
657 name = 'name' if name is None else name
658 set_data(line)
659 _name, facts = next(self.client.mlsd())
660 self.assertEqual(_name, name)
661 self.assertEqual(facts['type'], type)
662 self.assertEqual(facts['perm'], perm)
663 self.assertEqual(facts['unique'], unique)
664
665 # plain
666 test_entry('type=type;perm=perm;unique=unique; name\r\n')
667 # "=" in fact value
668 test_entry('type=ty=pe;perm=perm;unique=unique; name\r\n', type="ty=pe")
669 test_entry('type==type;perm=perm;unique=unique; name\r\n', type="=type")
670 test_entry('type=t=y=pe;perm=perm;unique=unique; name\r\n', type="t=y=pe")
671 test_entry('type=====;perm=perm;unique=unique; name\r\n', type="====")
672 # spaces in name
673 test_entry('type=type;perm=perm;unique=unique; na me\r\n', name="na me")
674 test_entry('type=type;perm=perm;unique=unique; name \r\n', name="name ")
675 test_entry('type=type;perm=perm;unique=unique; name\r\n', name=" name")
676 test_entry('type=type;perm=perm;unique=unique; n am e\r\n', name="n am e")
677 # ";" in name
678 test_entry('type=type;perm=perm;unique=unique; na;me\r\n', name="na;me")
679 test_entry('type=type;perm=perm;unique=unique; ;name\r\n', name=";name")
680 test_entry('type=type;perm=perm;unique=unique; ;name;\r\n', name=";name;")
681 test_entry('type=type;perm=perm;unique=unique; ;;;;\r\n', name=";;;;")
682 # case sensitiveness
683 set_data('Type=type;TyPe=perm;UNIQUE=unique; name\r\n')
684 _name, facts = next(self.client.mlsd())
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200685 for x in facts:
686 self.assertTrue(x.islower())
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200687 # no data (directory empty)
688 set_data('')
689 self.assertRaises(StopIteration, next, self.client.mlsd())
690 set_data('')
691 for x in self.client.mlsd():
Berker Peksag8f791d32014-11-01 10:45:57 +0200692 self.fail("unexpected data %s" % x)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200693
Benjamin Peterson3a53fbb2008-09-27 22:04:16 +0000694 def test_makeport(self):
Brett Cannon918e2d42010-10-29 23:26:25 +0000695 with self.client.makeport():
696 # IPv4 is in use, just make sure send_eprt has not been used
697 self.assertEqual(self.server.handler_instance.last_received_cmd,
698 'port')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000699
700 def test_makepasv(self):
701 host, port = self.client.makepasv()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200702 conn = socket.create_connection((host, port), timeout=TIMEOUT)
Guido van Rossumd8faa362007-04-27 19:54:29 +0000703 conn.close()
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000704 # IPv4 is in use, just make sure send_epsv has not been used
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000705 self.assertEqual(self.server.handler_instance.last_received_cmd, 'pasv')
706
707 def test_with_statement(self):
708 self.client.quit()
709
710 def is_client_connected():
711 if self.client.sock is None:
712 return False
713 try:
714 self.client.sendcmd('noop')
Andrew Svetlov0832af62012-12-18 23:10:48 +0200715 except (OSError, EOFError):
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000716 return False
717 return True
718
719 # base test
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200720 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000721 self.client.connect(self.server.host, self.server.port)
722 self.client.sendcmd('noop')
723 self.assertTrue(is_client_connected())
724 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
725 self.assertFalse(is_client_connected())
726
727 # QUIT sent inside the with block
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200728 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000729 self.client.connect(self.server.host, self.server.port)
730 self.client.sendcmd('noop')
731 self.client.quit()
732 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
733 self.assertFalse(is_client_connected())
734
735 # force a wrong response code to be sent on QUIT: error_perm
736 # is expected and the connection is supposed to be closed
737 try:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200738 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000739 self.client.connect(self.server.host, self.server.port)
740 self.client.sendcmd('noop')
741 self.server.handler_instance.next_response = '550 error on quit'
742 except ftplib.error_perm as err:
743 self.assertEqual(str(err), '550 error on quit')
744 else:
745 self.fail('Exception not raised')
746 # needed to give the threaded server some time to set the attribute
747 # which otherwise would still be == 'noop'
748 time.sleep(0.1)
749 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
750 self.assertFalse(is_client_connected())
Guido van Rossumd8faa362007-04-27 19:54:29 +0000751
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000752 def test_source_address(self):
753 self.client.quit()
754 port = support.find_unused_port()
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200755 try:
756 self.client.connect(self.server.host, self.server.port,
757 source_address=(HOST, port))
758 self.assertEqual(self.client.sock.getsockname()[1], port)
759 self.client.quit()
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200760 except OSError as e:
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200761 if e.errno == errno.EADDRINUSE:
762 self.skipTest("couldn't bind to port %d" % port)
763 raise
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000764
765 def test_source_address_passive_connection(self):
766 port = support.find_unused_port()
767 self.client.source_address = (HOST, port)
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200768 try:
769 with self.client.transfercmd('list') as sock:
770 self.assertEqual(sock.getsockname()[1], port)
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200771 except OSError as e:
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200772 if e.errno == errno.EADDRINUSE:
773 self.skipTest("couldn't bind to port %d" % port)
774 raise
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000775
Giampaolo Rodolàbbc47822010-08-23 22:10:32 +0000776 def test_parse257(self):
777 self.assertEqual(ftplib.parse257('257 "/foo/bar"'), '/foo/bar')
778 self.assertEqual(ftplib.parse257('257 "/foo/bar" created'), '/foo/bar')
779 self.assertEqual(ftplib.parse257('257 ""'), '')
780 self.assertEqual(ftplib.parse257('257 "" created'), '')
781 self.assertRaises(ftplib.error_reply, ftplib.parse257, '250 "/foo/bar"')
782 # The 257 response is supposed to include the directory
783 # name and in case it contains embedded double-quotes
784 # they must be doubled (see RFC-959, chapter 7, appendix 2).
785 self.assertEqual(ftplib.parse257('257 "/foo/b""ar"'), '/foo/b"ar')
786 self.assertEqual(ftplib.parse257('257 "/foo/b""ar" created'), '/foo/b"ar')
787
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300788 def test_line_too_long(self):
789 self.assertRaises(ftplib.Error, self.client.sendcmd,
790 'x' * self.client.maxline * 2)
791
792 def test_retrlines_too_long(self):
793 self.client.sendcmd('SETLONGRETR %d' % (self.client.maxline * 2))
794 received = []
795 self.assertRaises(ftplib.Error,
796 self.client.retrlines, 'retr', received.append)
797
798 def test_storlines_too_long(self):
799 f = io.BytesIO(b'x' * self.client.maxline * 2)
800 self.assertRaises(ftplib.Error, self.client.storlines, 'stor', f)
801
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200802 def test_encoding_param(self):
803 encodings = ['latin-1', 'utf-8']
804 for encoding in encodings:
805 with self.subTest(encoding=encoding):
806 self.tearDown()
807 self.setUp(encoding=encoding)
808 self.assertEqual(encoding, self.client.encoding)
809 self.test_retrbinary()
810 self.test_storbinary()
811 self.test_retrlines()
812 new_dir = self.client.mkd('/non-ascii dir \xAE')
813 self.check_data(new_dir, '/non-ascii dir \xAE')
814 # Check default encoding
815 client = ftplib.FTP(timeout=TIMEOUT)
816 self.assertEqual(DEFAULT_ENCODING, client.encoding)
817
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000818
Serhiy Storchaka43767632013-11-03 21:31:38 +0200819@skipUnless(support.IPV6_ENABLED, "IPv6 not enabled")
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000820class TestIPv6Environment(TestCase):
821
822 def setUp(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200823 self.server = DummyFTPServer((HOSTv6, 0),
824 af=socket.AF_INET6,
825 encoding=DEFAULT_ENCODING)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000826 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200827 self.client = ftplib.FTP(timeout=TIMEOUT, encoding=DEFAULT_ENCODING)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000828 self.client.connect(self.server.host, self.server.port)
829
830 def tearDown(self):
831 self.client.close()
832 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700833 # Explicitly clear the attribute to prevent dangling thread
834 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200835 asyncore.close_all(ignore_all=True)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000836
837 def test_af(self):
838 self.assertEqual(self.client.af, socket.AF_INET6)
839
840 def test_makeport(self):
Brett Cannon918e2d42010-10-29 23:26:25 +0000841 with self.client.makeport():
842 self.assertEqual(self.server.handler_instance.last_received_cmd,
843 'eprt')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000844
845 def test_makepasv(self):
846 host, port = self.client.makepasv()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200847 conn = socket.create_connection((host, port), timeout=TIMEOUT)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000848 conn.close()
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000849 self.assertEqual(self.server.handler_instance.last_received_cmd, 'epsv')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000850
851 def test_transfer(self):
852 def retr():
853 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200854 received.append(data.decode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000855 received = []
856 self.client.retrbinary('retr', callback)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100857 self.assertEqual(len(''.join(received)), len(RETR_DATA))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000858 self.assertEqual(''.join(received), RETR_DATA)
859 self.client.set_pasv(True)
860 retr()
861 self.client.set_pasv(False)
862 retr()
863
864
Serhiy Storchaka43767632013-11-03 21:31:38 +0200865@skipUnless(ssl, "SSL not available")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000866class TestTLS_FTPClassMixin(TestFTPClass):
867 """Repeat TestFTPClass tests starting the TLS layer for both control
868 and data connections first.
869 """
870
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200871 def setUp(self, encoding=DEFAULT_ENCODING):
872 self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000873 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200874 self.client = ftplib.FTP_TLS(timeout=TIMEOUT, encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000875 self.client.connect(self.server.host, self.server.port)
876 # enable TLS
877 self.client.auth()
878 self.client.prot_p()
879
880
Serhiy Storchaka43767632013-11-03 21:31:38 +0200881@skipUnless(ssl, "SSL not available")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000882class TestTLS_FTPClass(TestCase):
883 """Specific TLS_FTP class tests."""
884
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200885 def setUp(self, encoding=DEFAULT_ENCODING):
886 self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000887 self.server.start()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200888 self.client = ftplib.FTP_TLS(timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000889 self.client.connect(self.server.host, self.server.port)
890
891 def tearDown(self):
892 self.client.close()
893 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700894 # Explicitly clear the attribute to prevent dangling thread
895 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200896 asyncore.close_all(ignore_all=True)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000897
898 def test_control_connection(self):
Ezio Melottie9615932010-01-24 19:26:24 +0000899 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000900 self.client.auth()
Ezio Melottie9615932010-01-24 19:26:24 +0000901 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000902
903 def test_data_connection(self):
904 # clear text
Brett Cannon918e2d42010-10-29 23:26:25 +0000905 with self.client.transfercmd('list') as sock:
906 self.assertNotIsInstance(sock, ssl.SSLSocket)
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200907 self.assertEqual(sock.recv(1024),
908 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000909 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000910
911 # secured, after PROT P
912 self.client.prot_p()
Brett Cannon918e2d42010-10-29 23:26:25 +0000913 with self.client.transfercmd('list') as sock:
914 self.assertIsInstance(sock, ssl.SSLSocket)
Christian Heimes1590c392018-08-16 19:43:44 +0200915 # consume from SSL socket to finalize handshake and avoid
916 # "SSLError [SSL] shutdown while in init"
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200917 self.assertEqual(sock.recv(1024),
918 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000919 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000920
921 # PROT C is issued, the connection must be in cleartext again
922 self.client.prot_c()
Brett Cannon918e2d42010-10-29 23:26:25 +0000923 with self.client.transfercmd('list') as sock:
924 self.assertNotIsInstance(sock, ssl.SSLSocket)
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200925 self.assertEqual(sock.recv(1024),
926 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000927 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000928
929 def test_login(self):
930 # login() is supposed to implicitly secure the control connection
Ezio Melottie9615932010-01-24 19:26:24 +0000931 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000932 self.client.login()
Ezio Melottie9615932010-01-24 19:26:24 +0000933 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000934 # make sure that AUTH TLS doesn't get issued again
935 self.client.login()
936
937 def test_auth_issued_twice(self):
938 self.client.auth()
939 self.assertRaises(ValueError, self.client.auth)
940
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000941 def test_context(self):
942 self.client.quit()
Christian Heimesa170fa12017-09-15 20:27:30 +0200943 ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
944 ctx.check_hostname = False
945 ctx.verify_mode = ssl.CERT_NONE
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000946 self.assertRaises(ValueError, ftplib.FTP_TLS, keyfile=CERTFILE,
947 context=ctx)
948 self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
949 context=ctx)
950 self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
951 keyfile=CERTFILE, context=ctx)
952
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200953 self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000954 self.client.connect(self.server.host, self.server.port)
955 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
956 self.client.auth()
957 self.assertIs(self.client.sock.context, ctx)
958 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
959
960 self.client.prot_p()
Brett Cannon918e2d42010-10-29 23:26:25 +0000961 with self.client.transfercmd('list') as sock:
962 self.assertIs(sock.context, ctx)
963 self.assertIsInstance(sock, ssl.SSLSocket)
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000964
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200965 def test_ccc(self):
966 self.assertRaises(ValueError, self.client.ccc)
967 self.client.login(secure=True)
968 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
969 self.client.ccc()
970 self.assertRaises(ValueError, self.client.sock.unwrap)
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200971
Victor Stinner51500f32018-01-29 13:21:34 +0100972 @skipUnless(False, "FIXME: bpo-32706")
Christian Heimese5b5edf2013-12-02 02:56:02 +0100973 def test_check_hostname(self):
974 self.client.quit()
Christian Heimesa170fa12017-09-15 20:27:30 +0200975 ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
976 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED)
977 self.assertEqual(ctx.check_hostname, True)
Christian Heimese5b5edf2013-12-02 02:56:02 +0100978 ctx.load_verify_locations(CAFILE)
979 self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
980
981 # 127.0.0.1 doesn't match SAN
982 self.client.connect(self.server.host, self.server.port)
983 with self.assertRaises(ssl.CertificateError):
984 self.client.auth()
985 # exception quits connection
986
987 self.client.connect(self.server.host, self.server.port)
988 self.client.prot_p()
989 with self.assertRaises(ssl.CertificateError):
990 with self.client.transfercmd("list") as sock:
991 pass
992 self.client.quit()
993
994 self.client.connect("localhost", self.server.port)
995 self.client.auth()
996 self.client.quit()
997
998 self.client.connect("localhost", self.server.port)
999 self.client.prot_p()
1000 with self.client.transfercmd("list") as sock:
1001 pass
1002
Antoine Pitrouf988cd02009-11-17 20:21:14 +00001003
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001004class TestTimeouts(TestCase):
Guido van Rossumd8faa362007-04-27 19:54:29 +00001005
1006 def setUp(self):
Guido van Rossumd8faa362007-04-27 19:54:29 +00001007 self.evt = threading.Event()
Christian Heimes5e696852008-04-09 08:37:03 +00001008 self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
Antoine Pitrou08d02722012-12-19 20:44:02 +01001009 self.sock.settimeout(20)
Benjamin Petersonee8712c2008-05-20 21:35:26 +00001010 self.port = support.bind_port(self.sock)
Antoine Pitrou08d02722012-12-19 20:44:02 +01001011 self.server_thread = threading.Thread(target=self.server)
Christian Heimes529525f2018-05-23 22:24:45 +02001012 self.server_thread.daemon = True
Antoine Pitrou08d02722012-12-19 20:44:02 +01001013 self.server_thread.start()
Christian Heimes836baa52008-02-26 08:18:30 +00001014 # Wait for the server to be ready.
1015 self.evt.wait()
1016 self.evt.clear()
Antoine Pitrou08d02722012-12-19 20:44:02 +01001017 self.old_port = ftplib.FTP.port
Christian Heimes5e696852008-04-09 08:37:03 +00001018 ftplib.FTP.port = self.port
Guido van Rossumd8faa362007-04-27 19:54:29 +00001019
1020 def tearDown(self):
Antoine Pitrou08d02722012-12-19 20:44:02 +01001021 ftplib.FTP.port = self.old_port
1022 self.server_thread.join()
Victor Stinnerb157ce12017-09-13 06:43:58 -07001023 # Explicitly clear the attribute to prevent dangling thread
1024 self.server_thread = None
Guido van Rossumd8faa362007-04-27 19:54:29 +00001025
Antoine Pitrou08d02722012-12-19 20:44:02 +01001026 def server(self):
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001027 # This method sets the evt 3 times:
1028 # 1) when the connection is ready to be accepted.
1029 # 2) when it is safe for the caller to close the connection
1030 # 3) when we have closed the socket
Charles-François Natali6e204602014-07-23 19:28:13 +01001031 self.sock.listen()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001032 # (1) Signal the caller that we are ready to accept the connection.
Antoine Pitrou08d02722012-12-19 20:44:02 +01001033 self.evt.set()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001034 try:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001035 conn, addr = self.sock.accept()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001036 except socket.timeout:
1037 pass
1038 else:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001039 conn.sendall(b"1 Hola mundo\n")
1040 conn.shutdown(socket.SHUT_WR)
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001041 # (2) Signal the caller that it is safe to close the socket.
Antoine Pitrou08d02722012-12-19 20:44:02 +01001042 self.evt.set()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001043 conn.close()
1044 finally:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001045 self.sock.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001046
1047 def testTimeoutDefault(self):
Georg Brandlf78e02b2008-06-10 17:40:04 +00001048 # default -- use global socket timeout
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001049 self.assertIsNone(socket.getdefaulttimeout())
Georg Brandlf78e02b2008-06-10 17:40:04 +00001050 socket.setdefaulttimeout(30)
1051 try:
Antoine Pitrouf6fbf562013-08-22 00:39:46 +02001052 ftp = ftplib.FTP(HOST)
Georg Brandlf78e02b2008-06-10 17:40:04 +00001053 finally:
1054 socket.setdefaulttimeout(None)
1055 self.assertEqual(ftp.sock.gettimeout(), 30)
1056 self.evt.wait()
1057 ftp.close()
1058
1059 def testTimeoutNone(self):
1060 # no timeout -- do not use global socket timeout
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001061 self.assertIsNone(socket.getdefaulttimeout())
Georg Brandlf78e02b2008-06-10 17:40:04 +00001062 socket.setdefaulttimeout(30)
1063 try:
Antoine Pitrouf6fbf562013-08-22 00:39:46 +02001064 ftp = ftplib.FTP(HOST, timeout=None)
Georg Brandlf78e02b2008-06-10 17:40:04 +00001065 finally:
1066 socket.setdefaulttimeout(None)
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001067 self.assertIsNone(ftp.sock.gettimeout())
Christian Heimes836baa52008-02-26 08:18:30 +00001068 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001069 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001070
1071 def testTimeoutValue(self):
1072 # a value
Christian Heimes5e696852008-04-09 08:37:03 +00001073 ftp = ftplib.FTP(HOST, timeout=30)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001074 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001075 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001076 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001077
Dong-hee Naa190e2a2020-01-14 04:34:34 +09001078 # bpo-39259
1079 with self.assertRaises(ValueError):
1080 ftplib.FTP(HOST, timeout=0)
1081
Guido van Rossumd8faa362007-04-27 19:54:29 +00001082 def testTimeoutConnect(self):
1083 ftp = ftplib.FTP()
Christian Heimes5e696852008-04-09 08:37:03 +00001084 ftp.connect(HOST, timeout=30)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001085 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001086 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001087 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001088
1089 def testTimeoutDifferentOrder(self):
1090 ftp = ftplib.FTP(timeout=30)
Christian Heimes5e696852008-04-09 08:37:03 +00001091 ftp.connect(HOST)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001092 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001093 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001094 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001095
1096 def testTimeoutDirectAccess(self):
1097 ftp = ftplib.FTP()
1098 ftp.timeout = 30
Christian Heimes5e696852008-04-09 08:37:03 +00001099 ftp.connect(HOST)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001100 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001101 self.evt.wait()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001102 ftp.close()
1103
1104
Martin Panter19e69c52015-11-14 12:46:42 +00001105class MiscTestCase(TestCase):
1106 def test__all__(self):
1107 blacklist = {'MSG_OOB', 'FTP_PORT', 'MAXLINE', 'CRLF', 'B_CRLF',
1108 'Error', 'parse150', 'parse227', 'parse229', 'parse257',
1109 'print_line', 'ftpcp', 'test'}
1110 support.check__all__(self, ftplib, blacklist=blacklist)
1111
1112
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001113def test_main():
Berker Peksag8f791d32014-11-01 10:45:57 +02001114 tests = [TestFTPClass, TestTimeouts,
Serhiy Storchaka43767632013-11-03 21:31:38 +02001115 TestIPv6Environment,
Martin Panter19e69c52015-11-14 12:46:42 +00001116 TestTLS_FTPClassMixin, TestTLS_FTPClass,
1117 MiscTestCase]
Antoine Pitrouf988cd02009-11-17 20:21:14 +00001118
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001119 thread_info = support.threading_setup()
1120 try:
1121 support.run_unittest(*tests)
1122 finally:
1123 support.threading_cleanup(*thread_info)
1124
Guido van Rossumd8faa362007-04-27 19:54:29 +00001125
1126if __name__ == '__main__':
1127 test_main()