blob: 56e3d8ab8528afb4840a6ef1b4c11bfdb160387c [file] [log] [blame]
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001"""Test script for ftplib module."""
2
Antoine Pitrouf988cd02009-11-17 20:21:14 +00003# Modified by Giampaolo Rodola' to test FTP class, IPv6 and TLS
4# environment
Benjamin Petersonbe17a112008-09-27 21:49:47 +00005
Guido van Rossumd8faa362007-04-27 19:54:29 +00006import ftplib
Benjamin Petersonbe17a112008-09-27 21:49:47 +00007import socket
8import io
Antoine Pitrouf988cd02009-11-17 20:21:14 +00009import errno
10import os
Antoine Pitroua6a4dc82017-09-07 18:56:24 +020011import threading
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +000012import time
Serhiy Storchakabedce352021-09-19 22:36:03 +030013import unittest
Antoine Pitrouf988cd02009-11-17 20:21:14 +000014try:
15 import ssl
16except ImportError:
17 ssl = None
Guido van Rossumd8faa362007-04-27 19:54:29 +000018
Serhiy Storchaka43767632013-11-03 21:31:38 +020019from unittest import TestCase, skipUnless
Benjamin Petersonee8712c2008-05-20 21:35:26 +000020from test import support
Hai Shie80697d2020-05-28 06:10:27 +080021from test.support import threading_helper
Serhiy Storchaka16994912020-04-25 10:06:29 +030022from test.support import socket_helper
Hai Shi46605972020-08-04 00:49:18 +080023from test.support import warnings_helper
Serhiy Storchaka16994912020-04-25 10:06:29 +030024from test.support.socket_helper import HOST, HOSTv6
Guido van Rossumd8faa362007-04-27 19:54:29 +000025
Miss Islington (bot)8bec9fb2021-06-24 16:38:01 -070026import warnings
27with warnings.catch_warnings():
28 warnings.simplefilter('ignore', DeprecationWarning)
29 import asyncore
30 import asynchat
31
32
Victor Stinner07871b22019-12-10 20:32:59 +010033TIMEOUT = support.LOOPBACK_TIMEOUT
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020034DEFAULT_ENCODING = 'utf-8'
Benjamin Petersonbe17a112008-09-27 21:49:47 +000035# the dummy data returned by server over the data channel when
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020036# RETR, LIST, NLST, MLSD commands are issued
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020037RETR_DATA = 'abcde12345\r\n' * 1000 + 'non-ascii char \xAE\r\n'
38LIST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
39NLST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020040MLSD_DATA = ("type=cdir;perm=el;unique==keVO1+ZF4; test\r\n"
41 "type=pdir;perm=e;unique==keVO1+d?3; ..\r\n"
42 "type=OS.unix=slink:/foobar;perm=;unique==keVO1+4G4; foobar\r\n"
43 "type=OS.unix=chr-13/29;perm=;unique==keVO1+5G4; device\r\n"
44 "type=OS.unix=blk-11/108;perm=;unique==keVO1+6G4; block\r\n"
45 "type=file;perm=awr;unique==keVO1+8G4; writable\r\n"
46 "type=dir;perm=cpmel;unique==keVO1+7G4; promiscuous\r\n"
47 "type=dir;perm=;unique==keVO1+1t2; no-exec\r\n"
48 "type=file;perm=r;unique==keVO1+EG4; two words\r\n"
49 "type=file;perm=r;unique==keVO1+IH4; leading space\r\n"
50 "type=file;perm=r;unique==keVO1+1G4; file1\r\n"
51 "type=dir;perm=cpmel;unique==keVO1+7G4; incoming\r\n"
52 "type=file;perm=r;unique==keVO1+1G4; file2\r\n"
53 "type=file;perm=r;unique==keVO1+1G4; file3\r\n"
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020054 "type=file;perm=r;unique==keVO1+1G4; file4\r\n"
55 "type=dir;perm=cpmel;unique==SGP1; dir \xAE non-ascii char\r\n"
56 "type=file;perm=r;unique==SGP2; file \xAE non-ascii char\r\n")
Christian Heimes836baa52008-02-26 08:18:30 +000057
Christian Heimes836baa52008-02-26 08:18:30 +000058
Benjamin Petersonbe17a112008-09-27 21:49:47 +000059class DummyDTPHandler(asynchat.async_chat):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +000060 dtp_conn_closed = False
Benjamin Petersonbe17a112008-09-27 21:49:47 +000061
62 def __init__(self, conn, baseclass):
63 asynchat.async_chat.__init__(self, conn)
64 self.baseclass = baseclass
65 self.baseclass.last_received_data = ''
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020066 self.encoding = baseclass.encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +000067
68 def handle_read(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020069 new_data = self.recv(1024).decode(self.encoding, 'replace')
70 self.baseclass.last_received_data += new_data
Benjamin Petersonbe17a112008-09-27 21:49:47 +000071
72 def handle_close(self):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +000073 # XXX: this method can be called many times in a row for a single
74 # connection, including in clear-text (non-TLS) mode.
75 # (behaviour witnessed with test_data_connection)
76 if not self.dtp_conn_closed:
77 self.baseclass.push('226 transfer complete')
78 self.close()
79 self.dtp_conn_closed = True
Benjamin Petersonbe17a112008-09-27 21:49:47 +000080
81 def push(self, what):
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020082 if self.baseclass.next_data is not None:
83 what = self.baseclass.next_data
84 self.baseclass.next_data = None
85 if not what:
86 return self.close_when_done()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020087 super(DummyDTPHandler, self).push(what.encode(self.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +000088
Giampaolo Rodolàd930b632010-05-06 20:21:57 +000089 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +020090 raise Exception
Giampaolo Rodolàd930b632010-05-06 20:21:57 +000091
Benjamin Petersonbe17a112008-09-27 21:49:47 +000092
93class DummyFTPHandler(asynchat.async_chat):
94
Antoine Pitrouf988cd02009-11-17 20:21:14 +000095 dtp_handler = DummyDTPHandler
96
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020097 def __init__(self, conn, encoding=DEFAULT_ENCODING):
Benjamin Petersonbe17a112008-09-27 21:49:47 +000098 asynchat.async_chat.__init__(self, conn)
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +020099 # tells the socket to handle urgent data inline (ABOR command)
100 self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_OOBINLINE, 1)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000101 self.set_terminator(b"\r\n")
102 self.in_buffer = []
103 self.dtp = None
104 self.last_received_cmd = None
105 self.last_received_data = ''
106 self.next_response = ''
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200107 self.next_data = None
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000108 self.rest = None
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300109 self.next_retr_data = RETR_DATA
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000110 self.push('220 welcome')
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200111 self.encoding = encoding
Gregory P. Smith0ab152c2021-03-15 11:39:31 -0700112 # We use this as the string IPv4 address to direct the client
113 # to in response to a PASV command. To test security behavior.
114 # https://bugs.python.org/issue43285/.
115 self.fake_pasv_server_ip = '252.253.254.255'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000116
117 def collect_incoming_data(self, data):
118 self.in_buffer.append(data)
119
120 def found_terminator(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200121 line = b''.join(self.in_buffer).decode(self.encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000122 self.in_buffer = []
123 if self.next_response:
124 self.push(self.next_response)
125 self.next_response = ''
126 cmd = line.split(' ')[0].lower()
127 self.last_received_cmd = cmd
128 space = line.find(' ')
129 if space != -1:
130 arg = line[space + 1:]
131 else:
132 arg = ""
133 if hasattr(self, 'cmd_' + cmd):
134 method = getattr(self, 'cmd_' + cmd)
135 method(arg)
136 else:
137 self.push('550 command "%s" not understood.' %cmd)
138
139 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200140 raise Exception
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000141
142 def push(self, data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200143 asynchat.async_chat.push(self, data.encode(self.encoding) + b'\r\n')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000144
145 def cmd_port(self, arg):
146 addr = list(map(int, arg.split(',')))
147 ip = '%d.%d.%d.%d' %tuple(addr[:4])
148 port = (addr[4] * 256) + addr[5]
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200149 s = socket.create_connection((ip, port), timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000150 self.dtp = self.dtp_handler(s, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000151 self.push('200 active data connection established')
152
153 def cmd_pasv(self, arg):
Giampaolo Rodolaeb7e29f2019-04-09 00:34:02 +0200154 with socket.create_server((self.socket.getsockname()[0], 0)) as sock:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200155 sock.settimeout(TIMEOUT)
Gregory P. Smith0ab152c2021-03-15 11:39:31 -0700156 port = sock.getsockname()[1]
157 ip = self.fake_pasv_server_ip
Brett Cannon918e2d42010-10-29 23:26:25 +0000158 ip = ip.replace('.', ','); p1 = port / 256; p2 = port % 256
159 self.push('227 entering passive mode (%s,%d,%d)' %(ip, p1, p2))
160 conn, addr = sock.accept()
161 self.dtp = self.dtp_handler(conn, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000162
163 def cmd_eprt(self, arg):
164 af, ip, port = arg.split(arg[0])[1:-1]
165 port = int(port)
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200166 s = socket.create_connection((ip, port), timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000167 self.dtp = self.dtp_handler(s, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000168 self.push('200 active data connection established')
169
170 def cmd_epsv(self, arg):
Giampaolo Rodolaeb7e29f2019-04-09 00:34:02 +0200171 with socket.create_server((self.socket.getsockname()[0], 0),
172 family=socket.AF_INET6) as sock:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200173 sock.settimeout(TIMEOUT)
Brett Cannon918e2d42010-10-29 23:26:25 +0000174 port = sock.getsockname()[1]
175 self.push('229 entering extended passive mode (|||%d|)' %port)
176 conn, addr = sock.accept()
177 self.dtp = self.dtp_handler(conn, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000178
179 def cmd_echo(self, arg):
180 # sends back the received string (used by the test suite)
181 self.push(arg)
182
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000183 def cmd_noop(self, arg):
184 self.push('200 noop ok')
185
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000186 def cmd_user(self, arg):
187 self.push('331 username ok')
188
189 def cmd_pass(self, arg):
190 self.push('230 password ok')
191
192 def cmd_acct(self, arg):
193 self.push('230 acct ok')
194
195 def cmd_rnfr(self, arg):
196 self.push('350 rnfr ok')
197
198 def cmd_rnto(self, arg):
199 self.push('250 rnto ok')
200
201 def cmd_dele(self, arg):
202 self.push('250 dele ok')
203
204 def cmd_cwd(self, arg):
205 self.push('250 cwd ok')
206
207 def cmd_size(self, arg):
208 self.push('250 1000')
209
210 def cmd_mkd(self, arg):
211 self.push('257 "%s"' %arg)
212
213 def cmd_rmd(self, arg):
214 self.push('250 rmd ok')
215
216 def cmd_pwd(self, arg):
217 self.push('257 "pwd ok"')
218
219 def cmd_type(self, arg):
Giampaolo Rodolàf96482e2010-08-04 10:36:18 +0000220 self.push('200 type ok')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000221
222 def cmd_quit(self, arg):
223 self.push('221 quit ok')
224 self.close()
225
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +0200226 def cmd_abor(self, arg):
227 self.push('226 abor ok')
228
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000229 def cmd_stor(self, arg):
230 self.push('125 stor ok')
231
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000232 def cmd_rest(self, arg):
233 self.rest = arg
234 self.push('350 rest ok')
235
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000236 def cmd_retr(self, arg):
237 self.push('125 retr ok')
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000238 if self.rest is not None:
239 offset = int(self.rest)
240 else:
241 offset = 0
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300242 self.dtp.push(self.next_retr_data[offset:])
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000243 self.dtp.close_when_done()
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000244 self.rest = None
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000245
246 def cmd_list(self, arg):
247 self.push('125 list ok')
248 self.dtp.push(LIST_DATA)
249 self.dtp.close_when_done()
250
251 def cmd_nlst(self, arg):
252 self.push('125 nlst ok')
253 self.dtp.push(NLST_DATA)
254 self.dtp.close_when_done()
255
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200256 def cmd_opts(self, arg):
257 self.push('200 opts ok')
258
259 def cmd_mlsd(self, arg):
260 self.push('125 mlsd ok')
261 self.dtp.push(MLSD_DATA)
262 self.dtp.close_when_done()
263
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300264 def cmd_setlongretr(self, arg):
265 # For testing. Next RETR will return long line.
266 self.next_retr_data = 'x' * int(arg)
267 self.push('125 setlongretr ok')
268
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000269
270class DummyFTPServer(asyncore.dispatcher, threading.Thread):
271
272 handler = DummyFTPHandler
273
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200274 def __init__(self, address, af=socket.AF_INET, encoding=DEFAULT_ENCODING):
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000275 threading.Thread.__init__(self)
276 asyncore.dispatcher.__init__(self)
Christian Heimes529525f2018-05-23 22:24:45 +0200277 self.daemon = True
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000278 self.create_socket(af, socket.SOCK_STREAM)
279 self.bind(address)
280 self.listen(5)
281 self.active = False
282 self.active_lock = threading.Lock()
283 self.host, self.port = self.socket.getsockname()[:2]
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000284 self.handler_instance = None
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200285 self.encoding = encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000286
287 def start(self):
288 assert not self.active
289 self.__flag = threading.Event()
290 threading.Thread.start(self)
291 self.__flag.wait()
292
293 def run(self):
294 self.active = True
295 self.__flag.set()
296 while self.active and asyncore.socket_map:
297 self.active_lock.acquire()
298 asyncore.loop(timeout=0.1, count=1)
299 self.active_lock.release()
300 asyncore.close_all(ignore_all=True)
301
302 def stop(self):
303 assert self.active
304 self.active = False
305 self.join()
306
Giampaolo Rodolà977c7072010-10-04 21:08:36 +0000307 def handle_accepted(self, conn, addr):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200308 self.handler_instance = self.handler(conn, encoding=self.encoding)
Benjamin Petersond06e3b02008-09-28 21:00:42 +0000309
310 def handle_connect(self):
311 self.close()
312 handle_read = handle_connect
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000313
314 def writable(self):
315 return 0
316
317 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200318 raise Exception
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000319
320
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000321if ssl is not None:
322
Christian Heimese5b5edf2013-12-02 02:56:02 +0100323 CERTFILE = os.path.join(os.path.dirname(__file__), "keycert3.pem")
324 CAFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000325
326 class SSLConnection(asyncore.dispatcher):
327 """An asyncore.dispatcher subclass supporting TLS/SSL."""
328
329 _ssl_accepting = False
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000330 _ssl_closing = False
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000331
332 def secure_connection(self):
Christian Heimes2875c602021-04-19 07:27:10 +0200333 context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
Christian Heimesd0486372016-09-10 23:23:33 +0200334 context.load_cert_chain(CERTFILE)
335 socket = context.wrap_socket(self.socket,
336 suppress_ragged_eofs=False,
337 server_side=True,
338 do_handshake_on_connect=False)
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200339 self.del_channel()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000340 self.set_socket(socket)
341 self._ssl_accepting = True
342
343 def _do_ssl_handshake(self):
344 try:
345 self.socket.do_handshake()
346 except ssl.SSLError as err:
347 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
348 ssl.SSL_ERROR_WANT_WRITE):
349 return
350 elif err.args[0] == ssl.SSL_ERROR_EOF:
351 return self.handle_close()
Christian Heimes61d478c2018-01-27 15:51:38 +0100352 # TODO: SSLError does not expose alert information
353 elif "SSLV3_ALERT_BAD_CERTIFICATE" in err.args[1]:
354 return self.handle_close()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000355 raise
Andrew Svetlov0832af62012-12-18 23:10:48 +0200356 except OSError as err:
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000357 if err.args[0] == errno.ECONNABORTED:
358 return self.handle_close()
359 else:
360 self._ssl_accepting = False
361
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000362 def _do_ssl_shutdown(self):
363 self._ssl_closing = True
364 try:
365 self.socket = self.socket.unwrap()
366 except ssl.SSLError as err:
367 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
368 ssl.SSL_ERROR_WANT_WRITE):
369 return
Pablo Galindo293dd232019-11-19 21:34:03 +0000370 except OSError:
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000371 # Any "socket error" corresponds to a SSL_ERROR_SYSCALL return
372 # from OpenSSL's SSL_shutdown(), corresponding to a
373 # closed socket condition. See also:
374 # http://www.mail-archive.com/openssl-users@openssl.org/msg60710.html
375 pass
376 self._ssl_closing = False
Benjamin Petersonb29614e2012-10-09 11:16:03 -0400377 if getattr(self, '_ccc', False) is False:
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200378 super(SSLConnection, self).close()
379 else:
380 pass
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000381
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000382 def handle_read_event(self):
383 if self._ssl_accepting:
384 self._do_ssl_handshake()
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000385 elif self._ssl_closing:
386 self._do_ssl_shutdown()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000387 else:
388 super(SSLConnection, self).handle_read_event()
389
390 def handle_write_event(self):
391 if self._ssl_accepting:
392 self._do_ssl_handshake()
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000393 elif self._ssl_closing:
394 self._do_ssl_shutdown()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000395 else:
396 super(SSLConnection, self).handle_write_event()
397
398 def send(self, data):
399 try:
400 return super(SSLConnection, self).send(data)
401 except ssl.SSLError as err:
Antoine Pitrou5733c082010-03-22 14:49:10 +0000402 if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN,
403 ssl.SSL_ERROR_WANT_READ,
404 ssl.SSL_ERROR_WANT_WRITE):
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000405 return 0
406 raise
407
408 def recv(self, buffer_size):
409 try:
410 return super(SSLConnection, self).recv(buffer_size)
411 except ssl.SSLError as err:
Antoine Pitrou5733c082010-03-22 14:49:10 +0000412 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
413 ssl.SSL_ERROR_WANT_WRITE):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000414 return b''
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000415 if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN):
416 self.handle_close()
417 return b''
418 raise
419
420 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200421 raise Exception
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000422
423 def close(self):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000424 if (isinstance(self.socket, ssl.SSLSocket) and
Christian Heimes529525f2018-05-23 22:24:45 +0200425 self.socket._sslobj is not None):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000426 self._do_ssl_shutdown()
Benjamin Peterson1bd93a72010-10-31 19:58:07 +0000427 else:
428 super(SSLConnection, self).close()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000429
430
431 class DummyTLS_DTPHandler(SSLConnection, DummyDTPHandler):
432 """A DummyDTPHandler subclass supporting TLS/SSL."""
433
434 def __init__(self, conn, baseclass):
435 DummyDTPHandler.__init__(self, conn, baseclass)
436 if self.baseclass.secure_data_channel:
437 self.secure_connection()
438
439
440 class DummyTLS_FTPHandler(SSLConnection, DummyFTPHandler):
441 """A DummyFTPHandler subclass supporting TLS/SSL."""
442
443 dtp_handler = DummyTLS_DTPHandler
444
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200445 def __init__(self, conn, encoding=DEFAULT_ENCODING):
446 DummyFTPHandler.__init__(self, conn, encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000447 self.secure_data_channel = False
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200448 self._ccc = False
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000449
450 def cmd_auth(self, line):
451 """Set up secure control channel."""
452 self.push('234 AUTH TLS successful')
453 self.secure_connection()
454
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200455 def cmd_ccc(self, line):
456 self.push('220 Reverting back to clear-text')
457 self._ccc = True
458 self._do_ssl_shutdown()
459
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000460 def cmd_pbsz(self, line):
461 """Negotiate size of buffer for secure data transfer.
462 For TLS/SSL the only valid value for the parameter is '0'.
463 Any other value is accepted but ignored.
464 """
465 self.push('200 PBSZ=0 successful.')
466
467 def cmd_prot(self, line):
468 """Setup un/secure data channel."""
469 arg = line.upper()
470 if arg == 'C':
471 self.push('200 Protection set to Clear')
472 self.secure_data_channel = False
473 elif arg == 'P':
474 self.push('200 Protection set to Private')
475 self.secure_data_channel = True
476 else:
477 self.push("502 Unrecognized PROT type (use C or P).")
478
479
480 class DummyTLS_FTPServer(DummyFTPServer):
481 handler = DummyTLS_FTPHandler
482
483
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000484class TestFTPClass(TestCase):
485
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200486 def setUp(self, encoding=DEFAULT_ENCODING):
487 self.server = DummyFTPServer((HOST, 0), encoding=encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000488 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200489 self.client = ftplib.FTP(timeout=TIMEOUT, encoding=encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000490 self.client.connect(self.server.host, self.server.port)
491
492 def tearDown(self):
493 self.client.close()
494 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700495 # Explicitly clear the attribute to prevent dangling thread
496 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200497 asyncore.close_all(ignore_all=True)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000498
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100499 def check_data(self, received, expected):
500 self.assertEqual(len(received), len(expected))
501 self.assertEqual(received, expected)
502
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000503 def test_getwelcome(self):
504 self.assertEqual(self.client.getwelcome(), '220 welcome')
505
506 def test_sanitize(self):
507 self.assertEqual(self.client.sanitize('foo'), repr('foo'))
508 self.assertEqual(self.client.sanitize('pass 12345'), repr('pass *****'))
509 self.assertEqual(self.client.sanitize('PASS 12345'), repr('PASS *****'))
510
511 def test_exceptions(self):
Dong-hee Na2b1e6e92017-07-23 02:20:22 +0900512 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r\n0')
513 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\n0')
514 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r0')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000515 self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 400')
516 self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 499')
517 self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 500')
518 self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 599')
519 self.assertRaises(ftplib.error_proto, self.client.sendcmd, 'echo 999')
520
521 def test_all_errors(self):
522 exceptions = (ftplib.error_reply, ftplib.error_temp, ftplib.error_perm,
Dong-hee Na2b1e6e92017-07-23 02:20:22 +0900523 ftplib.error_proto, ftplib.Error, OSError,
524 EOFError)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000525 for x in exceptions:
526 try:
527 raise x('exception not included in all_errors set')
528 except ftplib.all_errors:
529 pass
530
531 def test_set_pasv(self):
532 # passive mode is supposed to be enabled by default
533 self.assertTrue(self.client.passiveserver)
534 self.client.set_pasv(True)
535 self.assertTrue(self.client.passiveserver)
536 self.client.set_pasv(False)
537 self.assertFalse(self.client.passiveserver)
538
539 def test_voidcmd(self):
540 self.client.voidcmd('echo 200')
541 self.client.voidcmd('echo 299')
542 self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 199')
543 self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 300')
544
545 def test_login(self):
546 self.client.login()
547
548 def test_acct(self):
549 self.client.acct('passwd')
550
551 def test_rename(self):
552 self.client.rename('a', 'b')
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000553 self.server.handler_instance.next_response = '200'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000554 self.assertRaises(ftplib.error_reply, self.client.rename, 'a', 'b')
555
556 def test_delete(self):
557 self.client.delete('foo')
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000558 self.server.handler_instance.next_response = '199'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000559 self.assertRaises(ftplib.error_reply, self.client.delete, 'foo')
560
561 def test_size(self):
562 self.client.size('foo')
563
564 def test_mkd(self):
565 dir = self.client.mkd('/foo')
566 self.assertEqual(dir, '/foo')
567
568 def test_rmd(self):
569 self.client.rmd('foo')
570
Senthil Kumaran0d538602013-08-12 22:25:27 -0700571 def test_cwd(self):
572 dir = self.client.cwd('/foo')
573 self.assertEqual(dir, '250 cwd ok')
574
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000575 def test_pwd(self):
576 dir = self.client.pwd()
577 self.assertEqual(dir, 'pwd ok')
578
579 def test_quit(self):
580 self.assertEqual(self.client.quit(), '221 quit ok')
581 # Ensure the connection gets closed; sock attribute should be None
582 self.assertEqual(self.client.sock, None)
583
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +0200584 def test_abort(self):
585 self.client.abort()
586
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000587 def test_retrbinary(self):
588 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200589 received.append(data.decode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000590 received = []
591 self.client.retrbinary('retr', callback)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100592 self.check_data(''.join(received), RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000593
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000594 def test_retrbinary_rest(self):
595 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200596 received.append(data.decode(self.client.encoding))
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000597 for rest in (0, 10, 20):
598 received = []
599 self.client.retrbinary('retr', callback, rest=rest)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100600 self.check_data(''.join(received), RETR_DATA[rest:])
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000601
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000602 def test_retrlines(self):
603 received = []
604 self.client.retrlines('retr', received.append)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100605 self.check_data(''.join(received), RETR_DATA.replace('\r\n', ''))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000606
607 def test_storbinary(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200608 f = io.BytesIO(RETR_DATA.encode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000609 self.client.storbinary('stor', f)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100610 self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000611 # test new callback arg
612 flag = []
613 f.seek(0)
614 self.client.storbinary('stor', f, callback=lambda x: flag.append(None))
615 self.assertTrue(flag)
616
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000617 def test_storbinary_rest(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200618 data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
619 f = io.BytesIO(data)
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000620 for r in (30, '30'):
621 f.seek(0)
622 self.client.storbinary('stor', f, rest=r)
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000623 self.assertEqual(self.server.handler_instance.rest, str(r))
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000624
Giampaolo Rodolàf96482e2010-08-04 10:36:18 +0000625 def test_storlines(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200626 data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
627 f = io.BytesIO(data)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000628 self.client.storlines('stor', f)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100629 self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000630 # test new callback arg
631 flag = []
632 f.seek(0)
633 self.client.storlines('stor foo', f, callback=lambda x: flag.append(None))
634 self.assertTrue(flag)
635
Victor Stinnered3a3032013-04-02 22:13:27 +0200636 f = io.StringIO(RETR_DATA.replace('\r\n', '\n'))
637 # storlines() expects a binary file, not a text file
Hai Shi46605972020-08-04 00:49:18 +0800638 with warnings_helper.check_warnings(('', BytesWarning), quiet=True):
Florent Xicluna5f3fef32013-07-06 15:08:21 +0200639 self.assertRaises(TypeError, self.client.storlines, 'stor foo', f)
Victor Stinnered3a3032013-04-02 22:13:27 +0200640
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000641 def test_nlst(self):
642 self.client.nlst()
643 self.assertEqual(self.client.nlst(), NLST_DATA.split('\r\n')[:-1])
644
645 def test_dir(self):
646 l = []
647 self.client.dir(lambda x: l.append(x))
648 self.assertEqual(''.join(l), LIST_DATA.replace('\r\n', ''))
649
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200650 def test_mlsd(self):
651 list(self.client.mlsd())
652 list(self.client.mlsd(path='/'))
653 list(self.client.mlsd(path='/', facts=['size', 'type']))
654
655 ls = list(self.client.mlsd())
656 for name, facts in ls:
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200657 self.assertIsInstance(name, str)
658 self.assertIsInstance(facts, dict)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200659 self.assertTrue(name)
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200660 self.assertIn('type', facts)
661 self.assertIn('perm', facts)
662 self.assertIn('unique', facts)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200663
664 def set_data(data):
665 self.server.handler_instance.next_data = data
666
667 def test_entry(line, type=None, perm=None, unique=None, name=None):
668 type = 'type' if type is None else type
669 perm = 'perm' if perm is None else perm
670 unique = 'unique' if unique is None else unique
671 name = 'name' if name is None else name
672 set_data(line)
673 _name, facts = next(self.client.mlsd())
674 self.assertEqual(_name, name)
675 self.assertEqual(facts['type'], type)
676 self.assertEqual(facts['perm'], perm)
677 self.assertEqual(facts['unique'], unique)
678
679 # plain
680 test_entry('type=type;perm=perm;unique=unique; name\r\n')
681 # "=" in fact value
682 test_entry('type=ty=pe;perm=perm;unique=unique; name\r\n', type="ty=pe")
683 test_entry('type==type;perm=perm;unique=unique; name\r\n', type="=type")
684 test_entry('type=t=y=pe;perm=perm;unique=unique; name\r\n', type="t=y=pe")
685 test_entry('type=====;perm=perm;unique=unique; name\r\n', type="====")
686 # spaces in name
687 test_entry('type=type;perm=perm;unique=unique; na me\r\n', name="na me")
688 test_entry('type=type;perm=perm;unique=unique; name \r\n', name="name ")
689 test_entry('type=type;perm=perm;unique=unique; name\r\n', name=" name")
690 test_entry('type=type;perm=perm;unique=unique; n am e\r\n', name="n am e")
691 # ";" in name
692 test_entry('type=type;perm=perm;unique=unique; na;me\r\n', name="na;me")
693 test_entry('type=type;perm=perm;unique=unique; ;name\r\n', name=";name")
694 test_entry('type=type;perm=perm;unique=unique; ;name;\r\n', name=";name;")
695 test_entry('type=type;perm=perm;unique=unique; ;;;;\r\n', name=";;;;")
696 # case sensitiveness
697 set_data('Type=type;TyPe=perm;UNIQUE=unique; name\r\n')
698 _name, facts = next(self.client.mlsd())
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200699 for x in facts:
700 self.assertTrue(x.islower())
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200701 # no data (directory empty)
702 set_data('')
703 self.assertRaises(StopIteration, next, self.client.mlsd())
704 set_data('')
705 for x in self.client.mlsd():
Berker Peksag8f791d32014-11-01 10:45:57 +0200706 self.fail("unexpected data %s" % x)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200707
Benjamin Peterson3a53fbb2008-09-27 22:04:16 +0000708 def test_makeport(self):
Brett Cannon918e2d42010-10-29 23:26:25 +0000709 with self.client.makeport():
710 # IPv4 is in use, just make sure send_eprt has not been used
711 self.assertEqual(self.server.handler_instance.last_received_cmd,
712 'port')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000713
714 def test_makepasv(self):
715 host, port = self.client.makepasv()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200716 conn = socket.create_connection((host, port), timeout=TIMEOUT)
Guido van Rossumd8faa362007-04-27 19:54:29 +0000717 conn.close()
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000718 # IPv4 is in use, just make sure send_epsv has not been used
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000719 self.assertEqual(self.server.handler_instance.last_received_cmd, 'pasv')
720
Gregory P. Smith0ab152c2021-03-15 11:39:31 -0700721 def test_makepasv_issue43285_security_disabled(self):
722 """Test the opt-in to the old vulnerable behavior."""
723 self.client.trust_server_pasv_ipv4_address = True
724 bad_host, port = self.client.makepasv()
725 self.assertEqual(
726 bad_host, self.server.handler_instance.fake_pasv_server_ip)
727 # Opening and closing a connection keeps the dummy server happy
728 # instead of timing out on accept.
729 socket.create_connection((self.client.sock.getpeername()[0], port),
730 timeout=TIMEOUT).close()
731
732 def test_makepasv_issue43285_security_enabled_default(self):
733 self.assertFalse(self.client.trust_server_pasv_ipv4_address)
734 trusted_host, port = self.client.makepasv()
735 self.assertNotEqual(
736 trusted_host, self.server.handler_instance.fake_pasv_server_ip)
737 # Opening and closing a connection keeps the dummy server happy
738 # instead of timing out on accept.
739 socket.create_connection((trusted_host, port), timeout=TIMEOUT).close()
740
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000741 def test_with_statement(self):
742 self.client.quit()
743
744 def is_client_connected():
745 if self.client.sock is None:
746 return False
747 try:
748 self.client.sendcmd('noop')
Andrew Svetlov0832af62012-12-18 23:10:48 +0200749 except (OSError, EOFError):
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000750 return False
751 return True
752
753 # base test
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200754 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000755 self.client.connect(self.server.host, self.server.port)
756 self.client.sendcmd('noop')
757 self.assertTrue(is_client_connected())
758 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
759 self.assertFalse(is_client_connected())
760
761 # QUIT sent inside the with block
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200762 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000763 self.client.connect(self.server.host, self.server.port)
764 self.client.sendcmd('noop')
765 self.client.quit()
766 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
767 self.assertFalse(is_client_connected())
768
769 # force a wrong response code to be sent on QUIT: error_perm
770 # is expected and the connection is supposed to be closed
771 try:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200772 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000773 self.client.connect(self.server.host, self.server.port)
774 self.client.sendcmd('noop')
775 self.server.handler_instance.next_response = '550 error on quit'
776 except ftplib.error_perm as err:
777 self.assertEqual(str(err), '550 error on quit')
778 else:
779 self.fail('Exception not raised')
780 # needed to give the threaded server some time to set the attribute
781 # which otherwise would still be == 'noop'
782 time.sleep(0.1)
783 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
784 self.assertFalse(is_client_connected())
Guido van Rossumd8faa362007-04-27 19:54:29 +0000785
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000786 def test_source_address(self):
787 self.client.quit()
Serhiy Storchaka16994912020-04-25 10:06:29 +0300788 port = socket_helper.find_unused_port()
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200789 try:
790 self.client.connect(self.server.host, self.server.port,
791 source_address=(HOST, port))
792 self.assertEqual(self.client.sock.getsockname()[1], port)
793 self.client.quit()
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200794 except OSError as e:
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200795 if e.errno == errno.EADDRINUSE:
796 self.skipTest("couldn't bind to port %d" % port)
797 raise
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000798
799 def test_source_address_passive_connection(self):
Serhiy Storchaka16994912020-04-25 10:06:29 +0300800 port = socket_helper.find_unused_port()
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000801 self.client.source_address = (HOST, port)
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200802 try:
803 with self.client.transfercmd('list') as sock:
804 self.assertEqual(sock.getsockname()[1], port)
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200805 except OSError as e:
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200806 if e.errno == errno.EADDRINUSE:
807 self.skipTest("couldn't bind to port %d" % port)
808 raise
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000809
Giampaolo Rodolàbbc47822010-08-23 22:10:32 +0000810 def test_parse257(self):
811 self.assertEqual(ftplib.parse257('257 "/foo/bar"'), '/foo/bar')
812 self.assertEqual(ftplib.parse257('257 "/foo/bar" created'), '/foo/bar')
813 self.assertEqual(ftplib.parse257('257 ""'), '')
814 self.assertEqual(ftplib.parse257('257 "" created'), '')
815 self.assertRaises(ftplib.error_reply, ftplib.parse257, '250 "/foo/bar"')
816 # The 257 response is supposed to include the directory
817 # name and in case it contains embedded double-quotes
818 # they must be doubled (see RFC-959, chapter 7, appendix 2).
819 self.assertEqual(ftplib.parse257('257 "/foo/b""ar"'), '/foo/b"ar')
820 self.assertEqual(ftplib.parse257('257 "/foo/b""ar" created'), '/foo/b"ar')
821
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300822 def test_line_too_long(self):
823 self.assertRaises(ftplib.Error, self.client.sendcmd,
824 'x' * self.client.maxline * 2)
825
826 def test_retrlines_too_long(self):
827 self.client.sendcmd('SETLONGRETR %d' % (self.client.maxline * 2))
828 received = []
829 self.assertRaises(ftplib.Error,
830 self.client.retrlines, 'retr', received.append)
831
832 def test_storlines_too_long(self):
833 f = io.BytesIO(b'x' * self.client.maxline * 2)
834 self.assertRaises(ftplib.Error, self.client.storlines, 'stor', f)
835
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200836 def test_encoding_param(self):
837 encodings = ['latin-1', 'utf-8']
838 for encoding in encodings:
839 with self.subTest(encoding=encoding):
840 self.tearDown()
841 self.setUp(encoding=encoding)
842 self.assertEqual(encoding, self.client.encoding)
843 self.test_retrbinary()
844 self.test_storbinary()
845 self.test_retrlines()
846 new_dir = self.client.mkd('/non-ascii dir \xAE')
847 self.check_data(new_dir, '/non-ascii dir \xAE')
848 # Check default encoding
849 client = ftplib.FTP(timeout=TIMEOUT)
850 self.assertEqual(DEFAULT_ENCODING, client.encoding)
851
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000852
Serhiy Storchaka16994912020-04-25 10:06:29 +0300853@skipUnless(socket_helper.IPV6_ENABLED, "IPv6 not enabled")
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000854class TestIPv6Environment(TestCase):
855
856 def setUp(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200857 self.server = DummyFTPServer((HOSTv6, 0),
858 af=socket.AF_INET6,
859 encoding=DEFAULT_ENCODING)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000860 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200861 self.client = ftplib.FTP(timeout=TIMEOUT, encoding=DEFAULT_ENCODING)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000862 self.client.connect(self.server.host, self.server.port)
863
864 def tearDown(self):
865 self.client.close()
866 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700867 # Explicitly clear the attribute to prevent dangling thread
868 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200869 asyncore.close_all(ignore_all=True)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000870
871 def test_af(self):
872 self.assertEqual(self.client.af, socket.AF_INET6)
873
874 def test_makeport(self):
Brett Cannon918e2d42010-10-29 23:26:25 +0000875 with self.client.makeport():
876 self.assertEqual(self.server.handler_instance.last_received_cmd,
877 'eprt')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000878
879 def test_makepasv(self):
880 host, port = self.client.makepasv()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200881 conn = socket.create_connection((host, port), timeout=TIMEOUT)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000882 conn.close()
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000883 self.assertEqual(self.server.handler_instance.last_received_cmd, 'epsv')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000884
885 def test_transfer(self):
886 def retr():
887 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200888 received.append(data.decode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000889 received = []
890 self.client.retrbinary('retr', callback)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100891 self.assertEqual(len(''.join(received)), len(RETR_DATA))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000892 self.assertEqual(''.join(received), RETR_DATA)
893 self.client.set_pasv(True)
894 retr()
895 self.client.set_pasv(False)
896 retr()
897
898
Serhiy Storchaka43767632013-11-03 21:31:38 +0200899@skipUnless(ssl, "SSL not available")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000900class TestTLS_FTPClassMixin(TestFTPClass):
901 """Repeat TestFTPClass tests starting the TLS layer for both control
902 and data connections first.
903 """
904
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200905 def setUp(self, encoding=DEFAULT_ENCODING):
906 self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000907 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200908 self.client = ftplib.FTP_TLS(timeout=TIMEOUT, encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000909 self.client.connect(self.server.host, self.server.port)
910 # enable TLS
911 self.client.auth()
912 self.client.prot_p()
913
914
Serhiy Storchaka43767632013-11-03 21:31:38 +0200915@skipUnless(ssl, "SSL not available")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000916class TestTLS_FTPClass(TestCase):
917 """Specific TLS_FTP class tests."""
918
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200919 def setUp(self, encoding=DEFAULT_ENCODING):
920 self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000921 self.server.start()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200922 self.client = ftplib.FTP_TLS(timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000923 self.client.connect(self.server.host, self.server.port)
924
925 def tearDown(self):
926 self.client.close()
927 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700928 # Explicitly clear the attribute to prevent dangling thread
929 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200930 asyncore.close_all(ignore_all=True)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000931
932 def test_control_connection(self):
Ezio Melottie9615932010-01-24 19:26:24 +0000933 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000934 self.client.auth()
Ezio Melottie9615932010-01-24 19:26:24 +0000935 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000936
937 def test_data_connection(self):
938 # clear text
Brett Cannon918e2d42010-10-29 23:26:25 +0000939 with self.client.transfercmd('list') as sock:
940 self.assertNotIsInstance(sock, ssl.SSLSocket)
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200941 self.assertEqual(sock.recv(1024),
942 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000943 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000944
945 # secured, after PROT P
946 self.client.prot_p()
Brett Cannon918e2d42010-10-29 23:26:25 +0000947 with self.client.transfercmd('list') as sock:
948 self.assertIsInstance(sock, ssl.SSLSocket)
Christian Heimes1590c392018-08-16 19:43:44 +0200949 # consume from SSL socket to finalize handshake and avoid
950 # "SSLError [SSL] shutdown while in init"
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200951 self.assertEqual(sock.recv(1024),
952 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000953 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000954
955 # PROT C is issued, the connection must be in cleartext again
956 self.client.prot_c()
Brett Cannon918e2d42010-10-29 23:26:25 +0000957 with self.client.transfercmd('list') as sock:
958 self.assertNotIsInstance(sock, ssl.SSLSocket)
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200959 self.assertEqual(sock.recv(1024),
960 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000961 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000962
963 def test_login(self):
964 # login() is supposed to implicitly secure the control connection
Ezio Melottie9615932010-01-24 19:26:24 +0000965 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000966 self.client.login()
Ezio Melottie9615932010-01-24 19:26:24 +0000967 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000968 # make sure that AUTH TLS doesn't get issued again
969 self.client.login()
970
971 def test_auth_issued_twice(self):
972 self.client.auth()
973 self.assertRaises(ValueError, self.client.auth)
974
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000975 def test_context(self):
976 self.client.quit()
Christian Heimesa170fa12017-09-15 20:27:30 +0200977 ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
978 ctx.check_hostname = False
979 ctx.verify_mode = ssl.CERT_NONE
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000980 self.assertRaises(ValueError, ftplib.FTP_TLS, keyfile=CERTFILE,
981 context=ctx)
982 self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
983 context=ctx)
984 self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
985 keyfile=CERTFILE, context=ctx)
986
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200987 self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000988 self.client.connect(self.server.host, self.server.port)
989 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
990 self.client.auth()
991 self.assertIs(self.client.sock.context, ctx)
992 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
993
994 self.client.prot_p()
Brett Cannon918e2d42010-10-29 23:26:25 +0000995 with self.client.transfercmd('list') as sock:
996 self.assertIs(sock.context, ctx)
997 self.assertIsInstance(sock, ssl.SSLSocket)
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000998
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200999 def test_ccc(self):
1000 self.assertRaises(ValueError, self.client.ccc)
1001 self.client.login(secure=True)
1002 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
1003 self.client.ccc()
1004 self.assertRaises(ValueError, self.client.sock.unwrap)
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +02001005
Victor Stinner51500f32018-01-29 13:21:34 +01001006 @skipUnless(False, "FIXME: bpo-32706")
Christian Heimese5b5edf2013-12-02 02:56:02 +01001007 def test_check_hostname(self):
1008 self.client.quit()
Christian Heimesa170fa12017-09-15 20:27:30 +02001009 ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
1010 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED)
1011 self.assertEqual(ctx.check_hostname, True)
Christian Heimese5b5edf2013-12-02 02:56:02 +01001012 ctx.load_verify_locations(CAFILE)
1013 self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
1014
1015 # 127.0.0.1 doesn't match SAN
1016 self.client.connect(self.server.host, self.server.port)
1017 with self.assertRaises(ssl.CertificateError):
1018 self.client.auth()
1019 # exception quits connection
1020
1021 self.client.connect(self.server.host, self.server.port)
1022 self.client.prot_p()
1023 with self.assertRaises(ssl.CertificateError):
1024 with self.client.transfercmd("list") as sock:
1025 pass
1026 self.client.quit()
1027
1028 self.client.connect("localhost", self.server.port)
1029 self.client.auth()
1030 self.client.quit()
1031
1032 self.client.connect("localhost", self.server.port)
1033 self.client.prot_p()
1034 with self.client.transfercmd("list") as sock:
1035 pass
1036
Antoine Pitrouf988cd02009-11-17 20:21:14 +00001037
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001038class TestTimeouts(TestCase):
Guido van Rossumd8faa362007-04-27 19:54:29 +00001039
1040 def setUp(self):
Guido van Rossumd8faa362007-04-27 19:54:29 +00001041 self.evt = threading.Event()
Christian Heimes5e696852008-04-09 08:37:03 +00001042 self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
Antoine Pitrou08d02722012-12-19 20:44:02 +01001043 self.sock.settimeout(20)
Serhiy Storchaka16994912020-04-25 10:06:29 +03001044 self.port = socket_helper.bind_port(self.sock)
Antoine Pitrou08d02722012-12-19 20:44:02 +01001045 self.server_thread = threading.Thread(target=self.server)
Christian Heimes529525f2018-05-23 22:24:45 +02001046 self.server_thread.daemon = True
Antoine Pitrou08d02722012-12-19 20:44:02 +01001047 self.server_thread.start()
Christian Heimes836baa52008-02-26 08:18:30 +00001048 # Wait for the server to be ready.
1049 self.evt.wait()
1050 self.evt.clear()
Antoine Pitrou08d02722012-12-19 20:44:02 +01001051 self.old_port = ftplib.FTP.port
Christian Heimes5e696852008-04-09 08:37:03 +00001052 ftplib.FTP.port = self.port
Guido van Rossumd8faa362007-04-27 19:54:29 +00001053
1054 def tearDown(self):
Antoine Pitrou08d02722012-12-19 20:44:02 +01001055 ftplib.FTP.port = self.old_port
1056 self.server_thread.join()
Victor Stinnerb157ce12017-09-13 06:43:58 -07001057 # Explicitly clear the attribute to prevent dangling thread
1058 self.server_thread = None
Guido van Rossumd8faa362007-04-27 19:54:29 +00001059
Antoine Pitrou08d02722012-12-19 20:44:02 +01001060 def server(self):
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001061 # This method sets the evt 3 times:
1062 # 1) when the connection is ready to be accepted.
1063 # 2) when it is safe for the caller to close the connection
1064 # 3) when we have closed the socket
Charles-François Natali6e204602014-07-23 19:28:13 +01001065 self.sock.listen()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001066 # (1) Signal the caller that we are ready to accept the connection.
Antoine Pitrou08d02722012-12-19 20:44:02 +01001067 self.evt.set()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001068 try:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001069 conn, addr = self.sock.accept()
Christian Heimes03c8ddd2020-11-20 09:26:07 +01001070 except TimeoutError:
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001071 pass
1072 else:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001073 conn.sendall(b"1 Hola mundo\n")
1074 conn.shutdown(socket.SHUT_WR)
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001075 # (2) Signal the caller that it is safe to close the socket.
Antoine Pitrou08d02722012-12-19 20:44:02 +01001076 self.evt.set()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001077 conn.close()
1078 finally:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001079 self.sock.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001080
1081 def testTimeoutDefault(self):
Georg Brandlf78e02b2008-06-10 17:40:04 +00001082 # default -- use global socket timeout
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001083 self.assertIsNone(socket.getdefaulttimeout())
Georg Brandlf78e02b2008-06-10 17:40:04 +00001084 socket.setdefaulttimeout(30)
1085 try:
Antoine Pitrouf6fbf562013-08-22 00:39:46 +02001086 ftp = ftplib.FTP(HOST)
Georg Brandlf78e02b2008-06-10 17:40:04 +00001087 finally:
1088 socket.setdefaulttimeout(None)
1089 self.assertEqual(ftp.sock.gettimeout(), 30)
1090 self.evt.wait()
1091 ftp.close()
1092
1093 def testTimeoutNone(self):
1094 # no timeout -- do not use global socket timeout
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001095 self.assertIsNone(socket.getdefaulttimeout())
Georg Brandlf78e02b2008-06-10 17:40:04 +00001096 socket.setdefaulttimeout(30)
1097 try:
Antoine Pitrouf6fbf562013-08-22 00:39:46 +02001098 ftp = ftplib.FTP(HOST, timeout=None)
Georg Brandlf78e02b2008-06-10 17:40:04 +00001099 finally:
1100 socket.setdefaulttimeout(None)
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001101 self.assertIsNone(ftp.sock.gettimeout())
Christian Heimes836baa52008-02-26 08:18:30 +00001102 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001103 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001104
1105 def testTimeoutValue(self):
1106 # a value
Christian Heimes5e696852008-04-09 08:37:03 +00001107 ftp = ftplib.FTP(HOST, timeout=30)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001108 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001109 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001110 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001111
Dong-hee Naa190e2a2020-01-14 04:34:34 +09001112 # bpo-39259
1113 with self.assertRaises(ValueError):
1114 ftplib.FTP(HOST, timeout=0)
1115
Guido van Rossumd8faa362007-04-27 19:54:29 +00001116 def testTimeoutConnect(self):
1117 ftp = ftplib.FTP()
Christian Heimes5e696852008-04-09 08:37:03 +00001118 ftp.connect(HOST, timeout=30)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001119 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001120 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001121 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001122
1123 def testTimeoutDifferentOrder(self):
1124 ftp = ftplib.FTP(timeout=30)
Christian Heimes5e696852008-04-09 08:37:03 +00001125 ftp.connect(HOST)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001126 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001127 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001128 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001129
1130 def testTimeoutDirectAccess(self):
1131 ftp = ftplib.FTP()
1132 ftp.timeout = 30
Christian Heimes5e696852008-04-09 08:37:03 +00001133 ftp.connect(HOST)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001134 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001135 self.evt.wait()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001136 ftp.close()
1137
1138
Martin Panter19e69c52015-11-14 12:46:42 +00001139class MiscTestCase(TestCase):
1140 def test__all__(self):
Victor Stinnerfbf43f02020-08-17 07:20:40 +02001141 not_exported = {
1142 'MSG_OOB', 'FTP_PORT', 'MAXLINE', 'CRLF', 'B_CRLF', 'Error',
1143 'parse150', 'parse227', 'parse229', 'parse257', 'print_line',
1144 'ftpcp', 'test'}
1145 support.check__all__(self, ftplib, not_exported=not_exported)
Martin Panter19e69c52015-11-14 12:46:42 +00001146
1147
Serhiy Storchakabedce352021-09-19 22:36:03 +03001148def setUpModule():
Hai Shie80697d2020-05-28 06:10:27 +08001149 thread_info = threading_helper.threading_setup()
Serhiy Storchakabedce352021-09-19 22:36:03 +03001150 unittest.addModuleCleanup(threading_helper.threading_cleanup, *thread_info)
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001151
Guido van Rossumd8faa362007-04-27 19:54:29 +00001152
1153if __name__ == '__main__':
Serhiy Storchakabedce352021-09-19 22:36:03 +03001154 unittest.main()