blob: a48b429ca38027327166407e765bc1bf43642ea0 [file] [log] [blame]
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001"""Test script for ftplib module."""
2
Antoine Pitrouf988cd02009-11-17 20:21:14 +00003# Modified by Giampaolo Rodola' to test FTP class, IPv6 and TLS
4# environment
Benjamin Petersonbe17a112008-09-27 21:49:47 +00005
Guido van Rossumd8faa362007-04-27 19:54:29 +00006import ftplib
Benjamin Petersonbe17a112008-09-27 21:49:47 +00007import asyncore
8import asynchat
9import socket
10import io
Antoine Pitrouf988cd02009-11-17 20:21:14 +000011import errno
12import os
Antoine Pitroua6a4dc82017-09-07 18:56:24 +020013import threading
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +000014import time
Antoine Pitrouf988cd02009-11-17 20:21:14 +000015try:
16 import ssl
17except ImportError:
18 ssl = None
Guido van Rossumd8faa362007-04-27 19:54:29 +000019
Serhiy Storchaka43767632013-11-03 21:31:38 +020020from unittest import TestCase, skipUnless
Benjamin Petersonee8712c2008-05-20 21:35:26 +000021from test import support
Hai Shie80697d2020-05-28 06:10:27 +080022from test.support import threading_helper
Serhiy Storchaka16994912020-04-25 10:06:29 +030023from test.support import socket_helper
Hai Shi46605972020-08-04 00:49:18 +080024from test.support import warnings_helper
Serhiy Storchaka16994912020-04-25 10:06:29 +030025from test.support.socket_helper import HOST, HOSTv6
Guido van Rossumd8faa362007-04-27 19:54:29 +000026
Victor Stinner07871b22019-12-10 20:32:59 +010027TIMEOUT = support.LOOPBACK_TIMEOUT
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020028DEFAULT_ENCODING = 'utf-8'
Benjamin Petersonbe17a112008-09-27 21:49:47 +000029# the dummy data returned by server over the data channel when
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020030# RETR, LIST, NLST, MLSD commands are issued
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020031RETR_DATA = 'abcde12345\r\n' * 1000 + 'non-ascii char \xAE\r\n'
32LIST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
33NLST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020034MLSD_DATA = ("type=cdir;perm=el;unique==keVO1+ZF4; test\r\n"
35 "type=pdir;perm=e;unique==keVO1+d?3; ..\r\n"
36 "type=OS.unix=slink:/foobar;perm=;unique==keVO1+4G4; foobar\r\n"
37 "type=OS.unix=chr-13/29;perm=;unique==keVO1+5G4; device\r\n"
38 "type=OS.unix=blk-11/108;perm=;unique==keVO1+6G4; block\r\n"
39 "type=file;perm=awr;unique==keVO1+8G4; writable\r\n"
40 "type=dir;perm=cpmel;unique==keVO1+7G4; promiscuous\r\n"
41 "type=dir;perm=;unique==keVO1+1t2; no-exec\r\n"
42 "type=file;perm=r;unique==keVO1+EG4; two words\r\n"
43 "type=file;perm=r;unique==keVO1+IH4; leading space\r\n"
44 "type=file;perm=r;unique==keVO1+1G4; file1\r\n"
45 "type=dir;perm=cpmel;unique==keVO1+7G4; incoming\r\n"
46 "type=file;perm=r;unique==keVO1+1G4; file2\r\n"
47 "type=file;perm=r;unique==keVO1+1G4; file3\r\n"
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020048 "type=file;perm=r;unique==keVO1+1G4; file4\r\n"
49 "type=dir;perm=cpmel;unique==SGP1; dir \xAE non-ascii char\r\n"
50 "type=file;perm=r;unique==SGP2; file \xAE non-ascii char\r\n")
Christian Heimes836baa52008-02-26 08:18:30 +000051
Christian Heimes836baa52008-02-26 08:18:30 +000052
Benjamin Petersonbe17a112008-09-27 21:49:47 +000053class DummyDTPHandler(asynchat.async_chat):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +000054 dtp_conn_closed = False
Benjamin Petersonbe17a112008-09-27 21:49:47 +000055
56 def __init__(self, conn, baseclass):
57 asynchat.async_chat.__init__(self, conn)
58 self.baseclass = baseclass
59 self.baseclass.last_received_data = ''
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020060 self.encoding = baseclass.encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +000061
62 def handle_read(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020063 new_data = self.recv(1024).decode(self.encoding, 'replace')
64 self.baseclass.last_received_data += new_data
Benjamin Petersonbe17a112008-09-27 21:49:47 +000065
66 def handle_close(self):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +000067 # XXX: this method can be called many times in a row for a single
68 # connection, including in clear-text (non-TLS) mode.
69 # (behaviour witnessed with test_data_connection)
70 if not self.dtp_conn_closed:
71 self.baseclass.push('226 transfer complete')
72 self.close()
73 self.dtp_conn_closed = True
Benjamin Petersonbe17a112008-09-27 21:49:47 +000074
75 def push(self, what):
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020076 if self.baseclass.next_data is not None:
77 what = self.baseclass.next_data
78 self.baseclass.next_data = None
79 if not what:
80 return self.close_when_done()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020081 super(DummyDTPHandler, self).push(what.encode(self.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +000082
Giampaolo Rodolàd930b632010-05-06 20:21:57 +000083 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +020084 raise Exception
Giampaolo Rodolàd930b632010-05-06 20:21:57 +000085
Benjamin Petersonbe17a112008-09-27 21:49:47 +000086
87class DummyFTPHandler(asynchat.async_chat):
88
Antoine Pitrouf988cd02009-11-17 20:21:14 +000089 dtp_handler = DummyDTPHandler
90
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020091 def __init__(self, conn, encoding=DEFAULT_ENCODING):
Benjamin Petersonbe17a112008-09-27 21:49:47 +000092 asynchat.async_chat.__init__(self, conn)
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +020093 # tells the socket to handle urgent data inline (ABOR command)
94 self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_OOBINLINE, 1)
Benjamin Petersonbe17a112008-09-27 21:49:47 +000095 self.set_terminator(b"\r\n")
96 self.in_buffer = []
97 self.dtp = None
98 self.last_received_cmd = None
99 self.last_received_data = ''
100 self.next_response = ''
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200101 self.next_data = None
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000102 self.rest = None
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300103 self.next_retr_data = RETR_DATA
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000104 self.push('220 welcome')
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200105 self.encoding = encoding
Gregory P. Smith0ab152c2021-03-15 11:39:31 -0700106 # We use this as the string IPv4 address to direct the client
107 # to in response to a PASV command. To test security behavior.
108 # https://bugs.python.org/issue43285/.
109 self.fake_pasv_server_ip = '252.253.254.255'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000110
111 def collect_incoming_data(self, data):
112 self.in_buffer.append(data)
113
114 def found_terminator(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200115 line = b''.join(self.in_buffer).decode(self.encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000116 self.in_buffer = []
117 if self.next_response:
118 self.push(self.next_response)
119 self.next_response = ''
120 cmd = line.split(' ')[0].lower()
121 self.last_received_cmd = cmd
122 space = line.find(' ')
123 if space != -1:
124 arg = line[space + 1:]
125 else:
126 arg = ""
127 if hasattr(self, 'cmd_' + cmd):
128 method = getattr(self, 'cmd_' + cmd)
129 method(arg)
130 else:
131 self.push('550 command "%s" not understood.' %cmd)
132
133 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200134 raise Exception
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000135
136 def push(self, data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200137 asynchat.async_chat.push(self, data.encode(self.encoding) + b'\r\n')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000138
139 def cmd_port(self, arg):
140 addr = list(map(int, arg.split(',')))
141 ip = '%d.%d.%d.%d' %tuple(addr[:4])
142 port = (addr[4] * 256) + addr[5]
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200143 s = socket.create_connection((ip, port), timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000144 self.dtp = self.dtp_handler(s, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000145 self.push('200 active data connection established')
146
147 def cmd_pasv(self, arg):
Giampaolo Rodolaeb7e29f2019-04-09 00:34:02 +0200148 with socket.create_server((self.socket.getsockname()[0], 0)) as sock:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200149 sock.settimeout(TIMEOUT)
Gregory P. Smith0ab152c2021-03-15 11:39:31 -0700150 port = sock.getsockname()[1]
151 ip = self.fake_pasv_server_ip
Brett Cannon918e2d42010-10-29 23:26:25 +0000152 ip = ip.replace('.', ','); p1 = port / 256; p2 = port % 256
153 self.push('227 entering passive mode (%s,%d,%d)' %(ip, p1, p2))
154 conn, addr = sock.accept()
155 self.dtp = self.dtp_handler(conn, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000156
157 def cmd_eprt(self, arg):
158 af, ip, port = arg.split(arg[0])[1:-1]
159 port = int(port)
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200160 s = socket.create_connection((ip, port), timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000161 self.dtp = self.dtp_handler(s, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000162 self.push('200 active data connection established')
163
164 def cmd_epsv(self, arg):
Giampaolo Rodolaeb7e29f2019-04-09 00:34:02 +0200165 with socket.create_server((self.socket.getsockname()[0], 0),
166 family=socket.AF_INET6) as sock:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200167 sock.settimeout(TIMEOUT)
Brett Cannon918e2d42010-10-29 23:26:25 +0000168 port = sock.getsockname()[1]
169 self.push('229 entering extended passive mode (|||%d|)' %port)
170 conn, addr = sock.accept()
171 self.dtp = self.dtp_handler(conn, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000172
173 def cmd_echo(self, arg):
174 # sends back the received string (used by the test suite)
175 self.push(arg)
176
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000177 def cmd_noop(self, arg):
178 self.push('200 noop ok')
179
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000180 def cmd_user(self, arg):
181 self.push('331 username ok')
182
183 def cmd_pass(self, arg):
184 self.push('230 password ok')
185
186 def cmd_acct(self, arg):
187 self.push('230 acct ok')
188
189 def cmd_rnfr(self, arg):
190 self.push('350 rnfr ok')
191
192 def cmd_rnto(self, arg):
193 self.push('250 rnto ok')
194
195 def cmd_dele(self, arg):
196 self.push('250 dele ok')
197
198 def cmd_cwd(self, arg):
199 self.push('250 cwd ok')
200
201 def cmd_size(self, arg):
202 self.push('250 1000')
203
204 def cmd_mkd(self, arg):
205 self.push('257 "%s"' %arg)
206
207 def cmd_rmd(self, arg):
208 self.push('250 rmd ok')
209
210 def cmd_pwd(self, arg):
211 self.push('257 "pwd ok"')
212
213 def cmd_type(self, arg):
Giampaolo Rodolàf96482e2010-08-04 10:36:18 +0000214 self.push('200 type ok')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000215
216 def cmd_quit(self, arg):
217 self.push('221 quit ok')
218 self.close()
219
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +0200220 def cmd_abor(self, arg):
221 self.push('226 abor ok')
222
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000223 def cmd_stor(self, arg):
224 self.push('125 stor ok')
225
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000226 def cmd_rest(self, arg):
227 self.rest = arg
228 self.push('350 rest ok')
229
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000230 def cmd_retr(self, arg):
231 self.push('125 retr ok')
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000232 if self.rest is not None:
233 offset = int(self.rest)
234 else:
235 offset = 0
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300236 self.dtp.push(self.next_retr_data[offset:])
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000237 self.dtp.close_when_done()
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000238 self.rest = None
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000239
240 def cmd_list(self, arg):
241 self.push('125 list ok')
242 self.dtp.push(LIST_DATA)
243 self.dtp.close_when_done()
244
245 def cmd_nlst(self, arg):
246 self.push('125 nlst ok')
247 self.dtp.push(NLST_DATA)
248 self.dtp.close_when_done()
249
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200250 def cmd_opts(self, arg):
251 self.push('200 opts ok')
252
253 def cmd_mlsd(self, arg):
254 self.push('125 mlsd ok')
255 self.dtp.push(MLSD_DATA)
256 self.dtp.close_when_done()
257
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300258 def cmd_setlongretr(self, arg):
259 # For testing. Next RETR will return long line.
260 self.next_retr_data = 'x' * int(arg)
261 self.push('125 setlongretr ok')
262
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000263
264class DummyFTPServer(asyncore.dispatcher, threading.Thread):
265
266 handler = DummyFTPHandler
267
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200268 def __init__(self, address, af=socket.AF_INET, encoding=DEFAULT_ENCODING):
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000269 threading.Thread.__init__(self)
270 asyncore.dispatcher.__init__(self)
Christian Heimes529525f2018-05-23 22:24:45 +0200271 self.daemon = True
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000272 self.create_socket(af, socket.SOCK_STREAM)
273 self.bind(address)
274 self.listen(5)
275 self.active = False
276 self.active_lock = threading.Lock()
277 self.host, self.port = self.socket.getsockname()[:2]
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000278 self.handler_instance = None
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200279 self.encoding = encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000280
281 def start(self):
282 assert not self.active
283 self.__flag = threading.Event()
284 threading.Thread.start(self)
285 self.__flag.wait()
286
287 def run(self):
288 self.active = True
289 self.__flag.set()
290 while self.active and asyncore.socket_map:
291 self.active_lock.acquire()
292 asyncore.loop(timeout=0.1, count=1)
293 self.active_lock.release()
294 asyncore.close_all(ignore_all=True)
295
296 def stop(self):
297 assert self.active
298 self.active = False
299 self.join()
300
Giampaolo Rodolà977c7072010-10-04 21:08:36 +0000301 def handle_accepted(self, conn, addr):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200302 self.handler_instance = self.handler(conn, encoding=self.encoding)
Benjamin Petersond06e3b02008-09-28 21:00:42 +0000303
304 def handle_connect(self):
305 self.close()
306 handle_read = handle_connect
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000307
308 def writable(self):
309 return 0
310
311 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200312 raise Exception
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000313
314
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000315if ssl is not None:
316
Christian Heimese5b5edf2013-12-02 02:56:02 +0100317 CERTFILE = os.path.join(os.path.dirname(__file__), "keycert3.pem")
318 CAFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000319
320 class SSLConnection(asyncore.dispatcher):
321 """An asyncore.dispatcher subclass supporting TLS/SSL."""
322
323 _ssl_accepting = False
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000324 _ssl_closing = False
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000325
326 def secure_connection(self):
Christian Heimes2875c602021-04-19 07:27:10 +0200327 context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
Christian Heimesd0486372016-09-10 23:23:33 +0200328 context.load_cert_chain(CERTFILE)
329 socket = context.wrap_socket(self.socket,
330 suppress_ragged_eofs=False,
331 server_side=True,
332 do_handshake_on_connect=False)
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200333 self.del_channel()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000334 self.set_socket(socket)
335 self._ssl_accepting = True
336
337 def _do_ssl_handshake(self):
338 try:
339 self.socket.do_handshake()
340 except ssl.SSLError as err:
341 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
342 ssl.SSL_ERROR_WANT_WRITE):
343 return
344 elif err.args[0] == ssl.SSL_ERROR_EOF:
345 return self.handle_close()
Christian Heimes61d478c2018-01-27 15:51:38 +0100346 # TODO: SSLError does not expose alert information
347 elif "SSLV3_ALERT_BAD_CERTIFICATE" in err.args[1]:
348 return self.handle_close()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000349 raise
Andrew Svetlov0832af62012-12-18 23:10:48 +0200350 except OSError as err:
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000351 if err.args[0] == errno.ECONNABORTED:
352 return self.handle_close()
353 else:
354 self._ssl_accepting = False
355
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000356 def _do_ssl_shutdown(self):
357 self._ssl_closing = True
358 try:
359 self.socket = self.socket.unwrap()
360 except ssl.SSLError as err:
361 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
362 ssl.SSL_ERROR_WANT_WRITE):
363 return
Pablo Galindo293dd232019-11-19 21:34:03 +0000364 except OSError:
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000365 # Any "socket error" corresponds to a SSL_ERROR_SYSCALL return
366 # from OpenSSL's SSL_shutdown(), corresponding to a
367 # closed socket condition. See also:
368 # http://www.mail-archive.com/openssl-users@openssl.org/msg60710.html
369 pass
370 self._ssl_closing = False
Benjamin Petersonb29614e2012-10-09 11:16:03 -0400371 if getattr(self, '_ccc', False) is False:
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200372 super(SSLConnection, self).close()
373 else:
374 pass
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000375
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000376 def handle_read_event(self):
377 if self._ssl_accepting:
378 self._do_ssl_handshake()
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000379 elif self._ssl_closing:
380 self._do_ssl_shutdown()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000381 else:
382 super(SSLConnection, self).handle_read_event()
383
384 def handle_write_event(self):
385 if self._ssl_accepting:
386 self._do_ssl_handshake()
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000387 elif self._ssl_closing:
388 self._do_ssl_shutdown()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000389 else:
390 super(SSLConnection, self).handle_write_event()
391
392 def send(self, data):
393 try:
394 return super(SSLConnection, self).send(data)
395 except ssl.SSLError as err:
Antoine Pitrou5733c082010-03-22 14:49:10 +0000396 if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN,
397 ssl.SSL_ERROR_WANT_READ,
398 ssl.SSL_ERROR_WANT_WRITE):
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000399 return 0
400 raise
401
402 def recv(self, buffer_size):
403 try:
404 return super(SSLConnection, self).recv(buffer_size)
405 except ssl.SSLError as err:
Antoine Pitrou5733c082010-03-22 14:49:10 +0000406 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
407 ssl.SSL_ERROR_WANT_WRITE):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000408 return b''
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000409 if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN):
410 self.handle_close()
411 return b''
412 raise
413
414 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200415 raise Exception
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000416
417 def close(self):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000418 if (isinstance(self.socket, ssl.SSLSocket) and
Christian Heimes529525f2018-05-23 22:24:45 +0200419 self.socket._sslobj is not None):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000420 self._do_ssl_shutdown()
Benjamin Peterson1bd93a72010-10-31 19:58:07 +0000421 else:
422 super(SSLConnection, self).close()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000423
424
425 class DummyTLS_DTPHandler(SSLConnection, DummyDTPHandler):
426 """A DummyDTPHandler subclass supporting TLS/SSL."""
427
428 def __init__(self, conn, baseclass):
429 DummyDTPHandler.__init__(self, conn, baseclass)
430 if self.baseclass.secure_data_channel:
431 self.secure_connection()
432
433
434 class DummyTLS_FTPHandler(SSLConnection, DummyFTPHandler):
435 """A DummyFTPHandler subclass supporting TLS/SSL."""
436
437 dtp_handler = DummyTLS_DTPHandler
438
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200439 def __init__(self, conn, encoding=DEFAULT_ENCODING):
440 DummyFTPHandler.__init__(self, conn, encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000441 self.secure_data_channel = False
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200442 self._ccc = False
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000443
444 def cmd_auth(self, line):
445 """Set up secure control channel."""
446 self.push('234 AUTH TLS successful')
447 self.secure_connection()
448
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200449 def cmd_ccc(self, line):
450 self.push('220 Reverting back to clear-text')
451 self._ccc = True
452 self._do_ssl_shutdown()
453
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000454 def cmd_pbsz(self, line):
455 """Negotiate size of buffer for secure data transfer.
456 For TLS/SSL the only valid value for the parameter is '0'.
457 Any other value is accepted but ignored.
458 """
459 self.push('200 PBSZ=0 successful.')
460
461 def cmd_prot(self, line):
462 """Setup un/secure data channel."""
463 arg = line.upper()
464 if arg == 'C':
465 self.push('200 Protection set to Clear')
466 self.secure_data_channel = False
467 elif arg == 'P':
468 self.push('200 Protection set to Private')
469 self.secure_data_channel = True
470 else:
471 self.push("502 Unrecognized PROT type (use C or P).")
472
473
474 class DummyTLS_FTPServer(DummyFTPServer):
475 handler = DummyTLS_FTPHandler
476
477
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000478class TestFTPClass(TestCase):
479
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200480 def setUp(self, encoding=DEFAULT_ENCODING):
481 self.server = DummyFTPServer((HOST, 0), encoding=encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000482 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200483 self.client = ftplib.FTP(timeout=TIMEOUT, encoding=encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000484 self.client.connect(self.server.host, self.server.port)
485
486 def tearDown(self):
487 self.client.close()
488 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700489 # Explicitly clear the attribute to prevent dangling thread
490 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200491 asyncore.close_all(ignore_all=True)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000492
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100493 def check_data(self, received, expected):
494 self.assertEqual(len(received), len(expected))
495 self.assertEqual(received, expected)
496
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000497 def test_getwelcome(self):
498 self.assertEqual(self.client.getwelcome(), '220 welcome')
499
500 def test_sanitize(self):
501 self.assertEqual(self.client.sanitize('foo'), repr('foo'))
502 self.assertEqual(self.client.sanitize('pass 12345'), repr('pass *****'))
503 self.assertEqual(self.client.sanitize('PASS 12345'), repr('PASS *****'))
504
505 def test_exceptions(self):
Dong-hee Na2b1e6e92017-07-23 02:20:22 +0900506 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r\n0')
507 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\n0')
508 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r0')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000509 self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 400')
510 self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 499')
511 self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 500')
512 self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 599')
513 self.assertRaises(ftplib.error_proto, self.client.sendcmd, 'echo 999')
514
515 def test_all_errors(self):
516 exceptions = (ftplib.error_reply, ftplib.error_temp, ftplib.error_perm,
Dong-hee Na2b1e6e92017-07-23 02:20:22 +0900517 ftplib.error_proto, ftplib.Error, OSError,
518 EOFError)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000519 for x in exceptions:
520 try:
521 raise x('exception not included in all_errors set')
522 except ftplib.all_errors:
523 pass
524
525 def test_set_pasv(self):
526 # passive mode is supposed to be enabled by default
527 self.assertTrue(self.client.passiveserver)
528 self.client.set_pasv(True)
529 self.assertTrue(self.client.passiveserver)
530 self.client.set_pasv(False)
531 self.assertFalse(self.client.passiveserver)
532
533 def test_voidcmd(self):
534 self.client.voidcmd('echo 200')
535 self.client.voidcmd('echo 299')
536 self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 199')
537 self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 300')
538
539 def test_login(self):
540 self.client.login()
541
542 def test_acct(self):
543 self.client.acct('passwd')
544
545 def test_rename(self):
546 self.client.rename('a', 'b')
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000547 self.server.handler_instance.next_response = '200'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000548 self.assertRaises(ftplib.error_reply, self.client.rename, 'a', 'b')
549
550 def test_delete(self):
551 self.client.delete('foo')
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000552 self.server.handler_instance.next_response = '199'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000553 self.assertRaises(ftplib.error_reply, self.client.delete, 'foo')
554
555 def test_size(self):
556 self.client.size('foo')
557
558 def test_mkd(self):
559 dir = self.client.mkd('/foo')
560 self.assertEqual(dir, '/foo')
561
562 def test_rmd(self):
563 self.client.rmd('foo')
564
Senthil Kumaran0d538602013-08-12 22:25:27 -0700565 def test_cwd(self):
566 dir = self.client.cwd('/foo')
567 self.assertEqual(dir, '250 cwd ok')
568
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000569 def test_pwd(self):
570 dir = self.client.pwd()
571 self.assertEqual(dir, 'pwd ok')
572
573 def test_quit(self):
574 self.assertEqual(self.client.quit(), '221 quit ok')
575 # Ensure the connection gets closed; sock attribute should be None
576 self.assertEqual(self.client.sock, None)
577
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +0200578 def test_abort(self):
579 self.client.abort()
580
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000581 def test_retrbinary(self):
582 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200583 received.append(data.decode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000584 received = []
585 self.client.retrbinary('retr', callback)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100586 self.check_data(''.join(received), RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000587
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000588 def test_retrbinary_rest(self):
589 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200590 received.append(data.decode(self.client.encoding))
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000591 for rest in (0, 10, 20):
592 received = []
593 self.client.retrbinary('retr', callback, rest=rest)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100594 self.check_data(''.join(received), RETR_DATA[rest:])
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000595
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000596 def test_retrlines(self):
597 received = []
598 self.client.retrlines('retr', received.append)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100599 self.check_data(''.join(received), RETR_DATA.replace('\r\n', ''))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000600
601 def test_storbinary(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200602 f = io.BytesIO(RETR_DATA.encode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000603 self.client.storbinary('stor', f)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100604 self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000605 # test new callback arg
606 flag = []
607 f.seek(0)
608 self.client.storbinary('stor', f, callback=lambda x: flag.append(None))
609 self.assertTrue(flag)
610
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000611 def test_storbinary_rest(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200612 data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
613 f = io.BytesIO(data)
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000614 for r in (30, '30'):
615 f.seek(0)
616 self.client.storbinary('stor', f, rest=r)
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000617 self.assertEqual(self.server.handler_instance.rest, str(r))
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000618
Giampaolo Rodolàf96482e2010-08-04 10:36:18 +0000619 def test_storlines(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200620 data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
621 f = io.BytesIO(data)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000622 self.client.storlines('stor', f)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100623 self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000624 # test new callback arg
625 flag = []
626 f.seek(0)
627 self.client.storlines('stor foo', f, callback=lambda x: flag.append(None))
628 self.assertTrue(flag)
629
Victor Stinnered3a3032013-04-02 22:13:27 +0200630 f = io.StringIO(RETR_DATA.replace('\r\n', '\n'))
631 # storlines() expects a binary file, not a text file
Hai Shi46605972020-08-04 00:49:18 +0800632 with warnings_helper.check_warnings(('', BytesWarning), quiet=True):
Florent Xicluna5f3fef32013-07-06 15:08:21 +0200633 self.assertRaises(TypeError, self.client.storlines, 'stor foo', f)
Victor Stinnered3a3032013-04-02 22:13:27 +0200634
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000635 def test_nlst(self):
636 self.client.nlst()
637 self.assertEqual(self.client.nlst(), NLST_DATA.split('\r\n')[:-1])
638
639 def test_dir(self):
640 l = []
641 self.client.dir(lambda x: l.append(x))
642 self.assertEqual(''.join(l), LIST_DATA.replace('\r\n', ''))
643
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200644 def test_mlsd(self):
645 list(self.client.mlsd())
646 list(self.client.mlsd(path='/'))
647 list(self.client.mlsd(path='/', facts=['size', 'type']))
648
649 ls = list(self.client.mlsd())
650 for name, facts in ls:
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200651 self.assertIsInstance(name, str)
652 self.assertIsInstance(facts, dict)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200653 self.assertTrue(name)
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200654 self.assertIn('type', facts)
655 self.assertIn('perm', facts)
656 self.assertIn('unique', facts)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200657
658 def set_data(data):
659 self.server.handler_instance.next_data = data
660
661 def test_entry(line, type=None, perm=None, unique=None, name=None):
662 type = 'type' if type is None else type
663 perm = 'perm' if perm is None else perm
664 unique = 'unique' if unique is None else unique
665 name = 'name' if name is None else name
666 set_data(line)
667 _name, facts = next(self.client.mlsd())
668 self.assertEqual(_name, name)
669 self.assertEqual(facts['type'], type)
670 self.assertEqual(facts['perm'], perm)
671 self.assertEqual(facts['unique'], unique)
672
673 # plain
674 test_entry('type=type;perm=perm;unique=unique; name\r\n')
675 # "=" in fact value
676 test_entry('type=ty=pe;perm=perm;unique=unique; name\r\n', type="ty=pe")
677 test_entry('type==type;perm=perm;unique=unique; name\r\n', type="=type")
678 test_entry('type=t=y=pe;perm=perm;unique=unique; name\r\n', type="t=y=pe")
679 test_entry('type=====;perm=perm;unique=unique; name\r\n', type="====")
680 # spaces in name
681 test_entry('type=type;perm=perm;unique=unique; na me\r\n', name="na me")
682 test_entry('type=type;perm=perm;unique=unique; name \r\n', name="name ")
683 test_entry('type=type;perm=perm;unique=unique; name\r\n', name=" name")
684 test_entry('type=type;perm=perm;unique=unique; n am e\r\n', name="n am e")
685 # ";" in name
686 test_entry('type=type;perm=perm;unique=unique; na;me\r\n', name="na;me")
687 test_entry('type=type;perm=perm;unique=unique; ;name\r\n', name=";name")
688 test_entry('type=type;perm=perm;unique=unique; ;name;\r\n', name=";name;")
689 test_entry('type=type;perm=perm;unique=unique; ;;;;\r\n', name=";;;;")
690 # case sensitiveness
691 set_data('Type=type;TyPe=perm;UNIQUE=unique; name\r\n')
692 _name, facts = next(self.client.mlsd())
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200693 for x in facts:
694 self.assertTrue(x.islower())
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200695 # no data (directory empty)
696 set_data('')
697 self.assertRaises(StopIteration, next, self.client.mlsd())
698 set_data('')
699 for x in self.client.mlsd():
Berker Peksag8f791d32014-11-01 10:45:57 +0200700 self.fail("unexpected data %s" % x)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200701
Benjamin Peterson3a53fbb2008-09-27 22:04:16 +0000702 def test_makeport(self):
Brett Cannon918e2d42010-10-29 23:26:25 +0000703 with self.client.makeport():
704 # IPv4 is in use, just make sure send_eprt has not been used
705 self.assertEqual(self.server.handler_instance.last_received_cmd,
706 'port')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000707
708 def test_makepasv(self):
709 host, port = self.client.makepasv()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200710 conn = socket.create_connection((host, port), timeout=TIMEOUT)
Guido van Rossumd8faa362007-04-27 19:54:29 +0000711 conn.close()
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000712 # IPv4 is in use, just make sure send_epsv has not been used
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000713 self.assertEqual(self.server.handler_instance.last_received_cmd, 'pasv')
714
Gregory P. Smith0ab152c2021-03-15 11:39:31 -0700715 def test_makepasv_issue43285_security_disabled(self):
716 """Test the opt-in to the old vulnerable behavior."""
717 self.client.trust_server_pasv_ipv4_address = True
718 bad_host, port = self.client.makepasv()
719 self.assertEqual(
720 bad_host, self.server.handler_instance.fake_pasv_server_ip)
721 # Opening and closing a connection keeps the dummy server happy
722 # instead of timing out on accept.
723 socket.create_connection((self.client.sock.getpeername()[0], port),
724 timeout=TIMEOUT).close()
725
726 def test_makepasv_issue43285_security_enabled_default(self):
727 self.assertFalse(self.client.trust_server_pasv_ipv4_address)
728 trusted_host, port = self.client.makepasv()
729 self.assertNotEqual(
730 trusted_host, self.server.handler_instance.fake_pasv_server_ip)
731 # Opening and closing a connection keeps the dummy server happy
732 # instead of timing out on accept.
733 socket.create_connection((trusted_host, port), timeout=TIMEOUT).close()
734
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000735 def test_with_statement(self):
736 self.client.quit()
737
738 def is_client_connected():
739 if self.client.sock is None:
740 return False
741 try:
742 self.client.sendcmd('noop')
Andrew Svetlov0832af62012-12-18 23:10:48 +0200743 except (OSError, EOFError):
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000744 return False
745 return True
746
747 # base test
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200748 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000749 self.client.connect(self.server.host, self.server.port)
750 self.client.sendcmd('noop')
751 self.assertTrue(is_client_connected())
752 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
753 self.assertFalse(is_client_connected())
754
755 # QUIT sent inside the with block
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200756 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000757 self.client.connect(self.server.host, self.server.port)
758 self.client.sendcmd('noop')
759 self.client.quit()
760 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
761 self.assertFalse(is_client_connected())
762
763 # force a wrong response code to be sent on QUIT: error_perm
764 # is expected and the connection is supposed to be closed
765 try:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200766 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000767 self.client.connect(self.server.host, self.server.port)
768 self.client.sendcmd('noop')
769 self.server.handler_instance.next_response = '550 error on quit'
770 except ftplib.error_perm as err:
771 self.assertEqual(str(err), '550 error on quit')
772 else:
773 self.fail('Exception not raised')
774 # needed to give the threaded server some time to set the attribute
775 # which otherwise would still be == 'noop'
776 time.sleep(0.1)
777 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
778 self.assertFalse(is_client_connected())
Guido van Rossumd8faa362007-04-27 19:54:29 +0000779
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000780 def test_source_address(self):
781 self.client.quit()
Serhiy Storchaka16994912020-04-25 10:06:29 +0300782 port = socket_helper.find_unused_port()
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200783 try:
784 self.client.connect(self.server.host, self.server.port,
785 source_address=(HOST, port))
786 self.assertEqual(self.client.sock.getsockname()[1], port)
787 self.client.quit()
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200788 except OSError as e:
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200789 if e.errno == errno.EADDRINUSE:
790 self.skipTest("couldn't bind to port %d" % port)
791 raise
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000792
793 def test_source_address_passive_connection(self):
Serhiy Storchaka16994912020-04-25 10:06:29 +0300794 port = socket_helper.find_unused_port()
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000795 self.client.source_address = (HOST, port)
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200796 try:
797 with self.client.transfercmd('list') as sock:
798 self.assertEqual(sock.getsockname()[1], port)
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200799 except OSError as e:
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200800 if e.errno == errno.EADDRINUSE:
801 self.skipTest("couldn't bind to port %d" % port)
802 raise
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000803
Giampaolo Rodolàbbc47822010-08-23 22:10:32 +0000804 def test_parse257(self):
805 self.assertEqual(ftplib.parse257('257 "/foo/bar"'), '/foo/bar')
806 self.assertEqual(ftplib.parse257('257 "/foo/bar" created'), '/foo/bar')
807 self.assertEqual(ftplib.parse257('257 ""'), '')
808 self.assertEqual(ftplib.parse257('257 "" created'), '')
809 self.assertRaises(ftplib.error_reply, ftplib.parse257, '250 "/foo/bar"')
810 # The 257 response is supposed to include the directory
811 # name and in case it contains embedded double-quotes
812 # they must be doubled (see RFC-959, chapter 7, appendix 2).
813 self.assertEqual(ftplib.parse257('257 "/foo/b""ar"'), '/foo/b"ar')
814 self.assertEqual(ftplib.parse257('257 "/foo/b""ar" created'), '/foo/b"ar')
815
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300816 def test_line_too_long(self):
817 self.assertRaises(ftplib.Error, self.client.sendcmd,
818 'x' * self.client.maxline * 2)
819
820 def test_retrlines_too_long(self):
821 self.client.sendcmd('SETLONGRETR %d' % (self.client.maxline * 2))
822 received = []
823 self.assertRaises(ftplib.Error,
824 self.client.retrlines, 'retr', received.append)
825
826 def test_storlines_too_long(self):
827 f = io.BytesIO(b'x' * self.client.maxline * 2)
828 self.assertRaises(ftplib.Error, self.client.storlines, 'stor', f)
829
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200830 def test_encoding_param(self):
831 encodings = ['latin-1', 'utf-8']
832 for encoding in encodings:
833 with self.subTest(encoding=encoding):
834 self.tearDown()
835 self.setUp(encoding=encoding)
836 self.assertEqual(encoding, self.client.encoding)
837 self.test_retrbinary()
838 self.test_storbinary()
839 self.test_retrlines()
840 new_dir = self.client.mkd('/non-ascii dir \xAE')
841 self.check_data(new_dir, '/non-ascii dir \xAE')
842 # Check default encoding
843 client = ftplib.FTP(timeout=TIMEOUT)
844 self.assertEqual(DEFAULT_ENCODING, client.encoding)
845
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000846
Serhiy Storchaka16994912020-04-25 10:06:29 +0300847@skipUnless(socket_helper.IPV6_ENABLED, "IPv6 not enabled")
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000848class TestIPv6Environment(TestCase):
849
850 def setUp(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200851 self.server = DummyFTPServer((HOSTv6, 0),
852 af=socket.AF_INET6,
853 encoding=DEFAULT_ENCODING)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000854 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200855 self.client = ftplib.FTP(timeout=TIMEOUT, encoding=DEFAULT_ENCODING)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000856 self.client.connect(self.server.host, self.server.port)
857
858 def tearDown(self):
859 self.client.close()
860 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700861 # Explicitly clear the attribute to prevent dangling thread
862 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200863 asyncore.close_all(ignore_all=True)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000864
865 def test_af(self):
866 self.assertEqual(self.client.af, socket.AF_INET6)
867
868 def test_makeport(self):
Brett Cannon918e2d42010-10-29 23:26:25 +0000869 with self.client.makeport():
870 self.assertEqual(self.server.handler_instance.last_received_cmd,
871 'eprt')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000872
873 def test_makepasv(self):
874 host, port = self.client.makepasv()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200875 conn = socket.create_connection((host, port), timeout=TIMEOUT)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000876 conn.close()
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000877 self.assertEqual(self.server.handler_instance.last_received_cmd, 'epsv')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000878
879 def test_transfer(self):
880 def retr():
881 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200882 received.append(data.decode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000883 received = []
884 self.client.retrbinary('retr', callback)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100885 self.assertEqual(len(''.join(received)), len(RETR_DATA))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000886 self.assertEqual(''.join(received), RETR_DATA)
887 self.client.set_pasv(True)
888 retr()
889 self.client.set_pasv(False)
890 retr()
891
892
Serhiy Storchaka43767632013-11-03 21:31:38 +0200893@skipUnless(ssl, "SSL not available")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000894class TestTLS_FTPClassMixin(TestFTPClass):
895 """Repeat TestFTPClass tests starting the TLS layer for both control
896 and data connections first.
897 """
898
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200899 def setUp(self, encoding=DEFAULT_ENCODING):
900 self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000901 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200902 self.client = ftplib.FTP_TLS(timeout=TIMEOUT, encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000903 self.client.connect(self.server.host, self.server.port)
904 # enable TLS
905 self.client.auth()
906 self.client.prot_p()
907
908
Serhiy Storchaka43767632013-11-03 21:31:38 +0200909@skipUnless(ssl, "SSL not available")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000910class TestTLS_FTPClass(TestCase):
911 """Specific TLS_FTP class tests."""
912
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200913 def setUp(self, encoding=DEFAULT_ENCODING):
914 self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000915 self.server.start()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200916 self.client = ftplib.FTP_TLS(timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000917 self.client.connect(self.server.host, self.server.port)
918
919 def tearDown(self):
920 self.client.close()
921 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700922 # Explicitly clear the attribute to prevent dangling thread
923 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200924 asyncore.close_all(ignore_all=True)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000925
926 def test_control_connection(self):
Ezio Melottie9615932010-01-24 19:26:24 +0000927 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000928 self.client.auth()
Ezio Melottie9615932010-01-24 19:26:24 +0000929 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000930
931 def test_data_connection(self):
932 # clear text
Brett Cannon918e2d42010-10-29 23:26:25 +0000933 with self.client.transfercmd('list') as sock:
934 self.assertNotIsInstance(sock, ssl.SSLSocket)
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200935 self.assertEqual(sock.recv(1024),
936 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000937 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000938
939 # secured, after PROT P
940 self.client.prot_p()
Brett Cannon918e2d42010-10-29 23:26:25 +0000941 with self.client.transfercmd('list') as sock:
942 self.assertIsInstance(sock, ssl.SSLSocket)
Christian Heimes1590c392018-08-16 19:43:44 +0200943 # consume from SSL socket to finalize handshake and avoid
944 # "SSLError [SSL] shutdown while in init"
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200945 self.assertEqual(sock.recv(1024),
946 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000947 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000948
949 # PROT C is issued, the connection must be in cleartext again
950 self.client.prot_c()
Brett Cannon918e2d42010-10-29 23:26:25 +0000951 with self.client.transfercmd('list') as sock:
952 self.assertNotIsInstance(sock, ssl.SSLSocket)
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200953 self.assertEqual(sock.recv(1024),
954 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000955 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000956
957 def test_login(self):
958 # login() is supposed to implicitly secure the control connection
Ezio Melottie9615932010-01-24 19:26:24 +0000959 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000960 self.client.login()
Ezio Melottie9615932010-01-24 19:26:24 +0000961 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000962 # make sure that AUTH TLS doesn't get issued again
963 self.client.login()
964
965 def test_auth_issued_twice(self):
966 self.client.auth()
967 self.assertRaises(ValueError, self.client.auth)
968
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000969 def test_context(self):
970 self.client.quit()
Christian Heimesa170fa12017-09-15 20:27:30 +0200971 ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
972 ctx.check_hostname = False
973 ctx.verify_mode = ssl.CERT_NONE
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000974 self.assertRaises(ValueError, ftplib.FTP_TLS, keyfile=CERTFILE,
975 context=ctx)
976 self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
977 context=ctx)
978 self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
979 keyfile=CERTFILE, context=ctx)
980
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200981 self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000982 self.client.connect(self.server.host, self.server.port)
983 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
984 self.client.auth()
985 self.assertIs(self.client.sock.context, ctx)
986 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
987
988 self.client.prot_p()
Brett Cannon918e2d42010-10-29 23:26:25 +0000989 with self.client.transfercmd('list') as sock:
990 self.assertIs(sock.context, ctx)
991 self.assertIsInstance(sock, ssl.SSLSocket)
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000992
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200993 def test_ccc(self):
994 self.assertRaises(ValueError, self.client.ccc)
995 self.client.login(secure=True)
996 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
997 self.client.ccc()
998 self.assertRaises(ValueError, self.client.sock.unwrap)
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200999
Victor Stinner51500f32018-01-29 13:21:34 +01001000 @skipUnless(False, "FIXME: bpo-32706")
Christian Heimese5b5edf2013-12-02 02:56:02 +01001001 def test_check_hostname(self):
1002 self.client.quit()
Christian Heimesa170fa12017-09-15 20:27:30 +02001003 ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
1004 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED)
1005 self.assertEqual(ctx.check_hostname, True)
Christian Heimese5b5edf2013-12-02 02:56:02 +01001006 ctx.load_verify_locations(CAFILE)
1007 self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
1008
1009 # 127.0.0.1 doesn't match SAN
1010 self.client.connect(self.server.host, self.server.port)
1011 with self.assertRaises(ssl.CertificateError):
1012 self.client.auth()
1013 # exception quits connection
1014
1015 self.client.connect(self.server.host, self.server.port)
1016 self.client.prot_p()
1017 with self.assertRaises(ssl.CertificateError):
1018 with self.client.transfercmd("list") as sock:
1019 pass
1020 self.client.quit()
1021
1022 self.client.connect("localhost", self.server.port)
1023 self.client.auth()
1024 self.client.quit()
1025
1026 self.client.connect("localhost", self.server.port)
1027 self.client.prot_p()
1028 with self.client.transfercmd("list") as sock:
1029 pass
1030
Antoine Pitrouf988cd02009-11-17 20:21:14 +00001031
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001032class TestTimeouts(TestCase):
Guido van Rossumd8faa362007-04-27 19:54:29 +00001033
1034 def setUp(self):
Guido van Rossumd8faa362007-04-27 19:54:29 +00001035 self.evt = threading.Event()
Christian Heimes5e696852008-04-09 08:37:03 +00001036 self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
Antoine Pitrou08d02722012-12-19 20:44:02 +01001037 self.sock.settimeout(20)
Serhiy Storchaka16994912020-04-25 10:06:29 +03001038 self.port = socket_helper.bind_port(self.sock)
Antoine Pitrou08d02722012-12-19 20:44:02 +01001039 self.server_thread = threading.Thread(target=self.server)
Christian Heimes529525f2018-05-23 22:24:45 +02001040 self.server_thread.daemon = True
Antoine Pitrou08d02722012-12-19 20:44:02 +01001041 self.server_thread.start()
Christian Heimes836baa52008-02-26 08:18:30 +00001042 # Wait for the server to be ready.
1043 self.evt.wait()
1044 self.evt.clear()
Antoine Pitrou08d02722012-12-19 20:44:02 +01001045 self.old_port = ftplib.FTP.port
Christian Heimes5e696852008-04-09 08:37:03 +00001046 ftplib.FTP.port = self.port
Guido van Rossumd8faa362007-04-27 19:54:29 +00001047
1048 def tearDown(self):
Antoine Pitrou08d02722012-12-19 20:44:02 +01001049 ftplib.FTP.port = self.old_port
1050 self.server_thread.join()
Victor Stinnerb157ce12017-09-13 06:43:58 -07001051 # Explicitly clear the attribute to prevent dangling thread
1052 self.server_thread = None
Guido van Rossumd8faa362007-04-27 19:54:29 +00001053
Antoine Pitrou08d02722012-12-19 20:44:02 +01001054 def server(self):
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001055 # This method sets the evt 3 times:
1056 # 1) when the connection is ready to be accepted.
1057 # 2) when it is safe for the caller to close the connection
1058 # 3) when we have closed the socket
Charles-François Natali6e204602014-07-23 19:28:13 +01001059 self.sock.listen()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001060 # (1) Signal the caller that we are ready to accept the connection.
Antoine Pitrou08d02722012-12-19 20:44:02 +01001061 self.evt.set()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001062 try:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001063 conn, addr = self.sock.accept()
Christian Heimes03c8ddd2020-11-20 09:26:07 +01001064 except TimeoutError:
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001065 pass
1066 else:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001067 conn.sendall(b"1 Hola mundo\n")
1068 conn.shutdown(socket.SHUT_WR)
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001069 # (2) Signal the caller that it is safe to close the socket.
Antoine Pitrou08d02722012-12-19 20:44:02 +01001070 self.evt.set()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001071 conn.close()
1072 finally:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001073 self.sock.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001074
1075 def testTimeoutDefault(self):
Georg Brandlf78e02b2008-06-10 17:40:04 +00001076 # default -- use global socket timeout
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001077 self.assertIsNone(socket.getdefaulttimeout())
Georg Brandlf78e02b2008-06-10 17:40:04 +00001078 socket.setdefaulttimeout(30)
1079 try:
Antoine Pitrouf6fbf562013-08-22 00:39:46 +02001080 ftp = ftplib.FTP(HOST)
Georg Brandlf78e02b2008-06-10 17:40:04 +00001081 finally:
1082 socket.setdefaulttimeout(None)
1083 self.assertEqual(ftp.sock.gettimeout(), 30)
1084 self.evt.wait()
1085 ftp.close()
1086
1087 def testTimeoutNone(self):
1088 # no timeout -- do not use global socket timeout
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001089 self.assertIsNone(socket.getdefaulttimeout())
Georg Brandlf78e02b2008-06-10 17:40:04 +00001090 socket.setdefaulttimeout(30)
1091 try:
Antoine Pitrouf6fbf562013-08-22 00:39:46 +02001092 ftp = ftplib.FTP(HOST, timeout=None)
Georg Brandlf78e02b2008-06-10 17:40:04 +00001093 finally:
1094 socket.setdefaulttimeout(None)
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001095 self.assertIsNone(ftp.sock.gettimeout())
Christian Heimes836baa52008-02-26 08:18:30 +00001096 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001097 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001098
1099 def testTimeoutValue(self):
1100 # a value
Christian Heimes5e696852008-04-09 08:37:03 +00001101 ftp = ftplib.FTP(HOST, timeout=30)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001102 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001103 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001104 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001105
Dong-hee Naa190e2a2020-01-14 04:34:34 +09001106 # bpo-39259
1107 with self.assertRaises(ValueError):
1108 ftplib.FTP(HOST, timeout=0)
1109
Guido van Rossumd8faa362007-04-27 19:54:29 +00001110 def testTimeoutConnect(self):
1111 ftp = ftplib.FTP()
Christian Heimes5e696852008-04-09 08:37:03 +00001112 ftp.connect(HOST, timeout=30)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001113 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001114 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001115 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001116
1117 def testTimeoutDifferentOrder(self):
1118 ftp = ftplib.FTP(timeout=30)
Christian Heimes5e696852008-04-09 08:37:03 +00001119 ftp.connect(HOST)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001120 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001121 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001122 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001123
1124 def testTimeoutDirectAccess(self):
1125 ftp = ftplib.FTP()
1126 ftp.timeout = 30
Christian Heimes5e696852008-04-09 08:37:03 +00001127 ftp.connect(HOST)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001128 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001129 self.evt.wait()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001130 ftp.close()
1131
1132
Martin Panter19e69c52015-11-14 12:46:42 +00001133class MiscTestCase(TestCase):
1134 def test__all__(self):
Victor Stinnerfbf43f02020-08-17 07:20:40 +02001135 not_exported = {
1136 'MSG_OOB', 'FTP_PORT', 'MAXLINE', 'CRLF', 'B_CRLF', 'Error',
1137 'parse150', 'parse227', 'parse229', 'parse257', 'print_line',
1138 'ftpcp', 'test'}
1139 support.check__all__(self, ftplib, not_exported=not_exported)
Martin Panter19e69c52015-11-14 12:46:42 +00001140
1141
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001142def test_main():
Berker Peksag8f791d32014-11-01 10:45:57 +02001143 tests = [TestFTPClass, TestTimeouts,
Serhiy Storchaka43767632013-11-03 21:31:38 +02001144 TestIPv6Environment,
Martin Panter19e69c52015-11-14 12:46:42 +00001145 TestTLS_FTPClassMixin, TestTLS_FTPClass,
1146 MiscTestCase]
Antoine Pitrouf988cd02009-11-17 20:21:14 +00001147
Hai Shie80697d2020-05-28 06:10:27 +08001148 thread_info = threading_helper.threading_setup()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001149 try:
1150 support.run_unittest(*tests)
1151 finally:
Hai Shie80697d2020-05-28 06:10:27 +08001152 threading_helper.threading_cleanup(*thread_info)
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001153
Guido van Rossumd8faa362007-04-27 19:54:29 +00001154
1155if __name__ == '__main__':
1156 test_main()