blob: e424076d7d317c6b40a6a5aaf2d8f4b179a6f859 [file] [log] [blame]
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001"""Test script for ftplib module."""
2
Antoine Pitrouf988cd02009-11-17 20:21:14 +00003# Modified by Giampaolo Rodola' to test FTP class, IPv6 and TLS
4# environment
Benjamin Petersonbe17a112008-09-27 21:49:47 +00005
Guido van Rossumd8faa362007-04-27 19:54:29 +00006import ftplib
Benjamin Petersonbe17a112008-09-27 21:49:47 +00007import asyncore
8import asynchat
9import socket
10import io
Antoine Pitrouf988cd02009-11-17 20:21:14 +000011import errno
12import os
Antoine Pitroua6a4dc82017-09-07 18:56:24 +020013import threading
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +000014import time
Antoine Pitrouf988cd02009-11-17 20:21:14 +000015try:
16 import ssl
17except ImportError:
18 ssl = None
Guido van Rossumd8faa362007-04-27 19:54:29 +000019
Serhiy Storchaka43767632013-11-03 21:31:38 +020020from unittest import TestCase, skipUnless
Benjamin Petersonee8712c2008-05-20 21:35:26 +000021from test import support
Serhiy Storchaka16994912020-04-25 10:06:29 +030022from test.support import socket_helper
23from test.support.socket_helper import HOST, HOSTv6
Guido van Rossumd8faa362007-04-27 19:54:29 +000024
Victor Stinner07871b22019-12-10 20:32:59 +010025TIMEOUT = support.LOOPBACK_TIMEOUT
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020026DEFAULT_ENCODING = 'utf-8'
Benjamin Petersonbe17a112008-09-27 21:49:47 +000027# the dummy data returned by server over the data channel when
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020028# RETR, LIST, NLST, MLSD commands are issued
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020029RETR_DATA = 'abcde12345\r\n' * 1000 + 'non-ascii char \xAE\r\n'
30LIST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
31NLST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020032MLSD_DATA = ("type=cdir;perm=el;unique==keVO1+ZF4; test\r\n"
33 "type=pdir;perm=e;unique==keVO1+d?3; ..\r\n"
34 "type=OS.unix=slink:/foobar;perm=;unique==keVO1+4G4; foobar\r\n"
35 "type=OS.unix=chr-13/29;perm=;unique==keVO1+5G4; device\r\n"
36 "type=OS.unix=blk-11/108;perm=;unique==keVO1+6G4; block\r\n"
37 "type=file;perm=awr;unique==keVO1+8G4; writable\r\n"
38 "type=dir;perm=cpmel;unique==keVO1+7G4; promiscuous\r\n"
39 "type=dir;perm=;unique==keVO1+1t2; no-exec\r\n"
40 "type=file;perm=r;unique==keVO1+EG4; two words\r\n"
41 "type=file;perm=r;unique==keVO1+IH4; leading space\r\n"
42 "type=file;perm=r;unique==keVO1+1G4; file1\r\n"
43 "type=dir;perm=cpmel;unique==keVO1+7G4; incoming\r\n"
44 "type=file;perm=r;unique==keVO1+1G4; file2\r\n"
45 "type=file;perm=r;unique==keVO1+1G4; file3\r\n"
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020046 "type=file;perm=r;unique==keVO1+1G4; file4\r\n"
47 "type=dir;perm=cpmel;unique==SGP1; dir \xAE non-ascii char\r\n"
48 "type=file;perm=r;unique==SGP2; file \xAE non-ascii char\r\n")
Christian Heimes836baa52008-02-26 08:18:30 +000049
Christian Heimes836baa52008-02-26 08:18:30 +000050
Benjamin Petersonbe17a112008-09-27 21:49:47 +000051class DummyDTPHandler(asynchat.async_chat):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +000052 dtp_conn_closed = False
Benjamin Petersonbe17a112008-09-27 21:49:47 +000053
54 def __init__(self, conn, baseclass):
55 asynchat.async_chat.__init__(self, conn)
56 self.baseclass = baseclass
57 self.baseclass.last_received_data = ''
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020058 self.encoding = baseclass.encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +000059
60 def handle_read(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020061 new_data = self.recv(1024).decode(self.encoding, 'replace')
62 self.baseclass.last_received_data += new_data
Benjamin Petersonbe17a112008-09-27 21:49:47 +000063
64 def handle_close(self):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +000065 # XXX: this method can be called many times in a row for a single
66 # connection, including in clear-text (non-TLS) mode.
67 # (behaviour witnessed with test_data_connection)
68 if not self.dtp_conn_closed:
69 self.baseclass.push('226 transfer complete')
70 self.close()
71 self.dtp_conn_closed = True
Benjamin Petersonbe17a112008-09-27 21:49:47 +000072
73 def push(self, what):
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020074 if self.baseclass.next_data is not None:
75 what = self.baseclass.next_data
76 self.baseclass.next_data = None
77 if not what:
78 return self.close_when_done()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020079 super(DummyDTPHandler, self).push(what.encode(self.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +000080
Giampaolo Rodolàd930b632010-05-06 20:21:57 +000081 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +020082 raise Exception
Giampaolo Rodolàd930b632010-05-06 20:21:57 +000083
Benjamin Petersonbe17a112008-09-27 21:49:47 +000084
85class DummyFTPHandler(asynchat.async_chat):
86
Antoine Pitrouf988cd02009-11-17 20:21:14 +000087 dtp_handler = DummyDTPHandler
88
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +020089 def __init__(self, conn, encoding=DEFAULT_ENCODING):
Benjamin Petersonbe17a112008-09-27 21:49:47 +000090 asynchat.async_chat.__init__(self, conn)
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +020091 # tells the socket to handle urgent data inline (ABOR command)
92 self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_OOBINLINE, 1)
Benjamin Petersonbe17a112008-09-27 21:49:47 +000093 self.set_terminator(b"\r\n")
94 self.in_buffer = []
95 self.dtp = None
96 self.last_received_cmd = None
97 self.last_received_data = ''
98 self.next_response = ''
Giampaolo Rodola'd78def92011-05-06 19:49:08 +020099 self.next_data = None
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000100 self.rest = None
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300101 self.next_retr_data = RETR_DATA
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000102 self.push('220 welcome')
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200103 self.encoding = encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000104
105 def collect_incoming_data(self, data):
106 self.in_buffer.append(data)
107
108 def found_terminator(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200109 line = b''.join(self.in_buffer).decode(self.encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000110 self.in_buffer = []
111 if self.next_response:
112 self.push(self.next_response)
113 self.next_response = ''
114 cmd = line.split(' ')[0].lower()
115 self.last_received_cmd = cmd
116 space = line.find(' ')
117 if space != -1:
118 arg = line[space + 1:]
119 else:
120 arg = ""
121 if hasattr(self, 'cmd_' + cmd):
122 method = getattr(self, 'cmd_' + cmd)
123 method(arg)
124 else:
125 self.push('550 command "%s" not understood.' %cmd)
126
127 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200128 raise Exception
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000129
130 def push(self, data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200131 asynchat.async_chat.push(self, data.encode(self.encoding) + b'\r\n')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000132
133 def cmd_port(self, arg):
134 addr = list(map(int, arg.split(',')))
135 ip = '%d.%d.%d.%d' %tuple(addr[:4])
136 port = (addr[4] * 256) + addr[5]
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200137 s = socket.create_connection((ip, port), timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000138 self.dtp = self.dtp_handler(s, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000139 self.push('200 active data connection established')
140
141 def cmd_pasv(self, arg):
Giampaolo Rodolaeb7e29f2019-04-09 00:34:02 +0200142 with socket.create_server((self.socket.getsockname()[0], 0)) as sock:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200143 sock.settimeout(TIMEOUT)
Brett Cannon918e2d42010-10-29 23:26:25 +0000144 ip, port = sock.getsockname()[:2]
145 ip = ip.replace('.', ','); p1 = port / 256; p2 = port % 256
146 self.push('227 entering passive mode (%s,%d,%d)' %(ip, p1, p2))
147 conn, addr = sock.accept()
148 self.dtp = self.dtp_handler(conn, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000149
150 def cmd_eprt(self, arg):
151 af, ip, port = arg.split(arg[0])[1:-1]
152 port = int(port)
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200153 s = socket.create_connection((ip, port), timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000154 self.dtp = self.dtp_handler(s, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000155 self.push('200 active data connection established')
156
157 def cmd_epsv(self, arg):
Giampaolo Rodolaeb7e29f2019-04-09 00:34:02 +0200158 with socket.create_server((self.socket.getsockname()[0], 0),
159 family=socket.AF_INET6) as sock:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200160 sock.settimeout(TIMEOUT)
Brett Cannon918e2d42010-10-29 23:26:25 +0000161 port = sock.getsockname()[1]
162 self.push('229 entering extended passive mode (|||%d|)' %port)
163 conn, addr = sock.accept()
164 self.dtp = self.dtp_handler(conn, baseclass=self)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000165
166 def cmd_echo(self, arg):
167 # sends back the received string (used by the test suite)
168 self.push(arg)
169
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000170 def cmd_noop(self, arg):
171 self.push('200 noop ok')
172
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000173 def cmd_user(self, arg):
174 self.push('331 username ok')
175
176 def cmd_pass(self, arg):
177 self.push('230 password ok')
178
179 def cmd_acct(self, arg):
180 self.push('230 acct ok')
181
182 def cmd_rnfr(self, arg):
183 self.push('350 rnfr ok')
184
185 def cmd_rnto(self, arg):
186 self.push('250 rnto ok')
187
188 def cmd_dele(self, arg):
189 self.push('250 dele ok')
190
191 def cmd_cwd(self, arg):
192 self.push('250 cwd ok')
193
194 def cmd_size(self, arg):
195 self.push('250 1000')
196
197 def cmd_mkd(self, arg):
198 self.push('257 "%s"' %arg)
199
200 def cmd_rmd(self, arg):
201 self.push('250 rmd ok')
202
203 def cmd_pwd(self, arg):
204 self.push('257 "pwd ok"')
205
206 def cmd_type(self, arg):
Giampaolo Rodolàf96482e2010-08-04 10:36:18 +0000207 self.push('200 type ok')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000208
209 def cmd_quit(self, arg):
210 self.push('221 quit ok')
211 self.close()
212
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +0200213 def cmd_abor(self, arg):
214 self.push('226 abor ok')
215
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000216 def cmd_stor(self, arg):
217 self.push('125 stor ok')
218
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000219 def cmd_rest(self, arg):
220 self.rest = arg
221 self.push('350 rest ok')
222
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000223 def cmd_retr(self, arg):
224 self.push('125 retr ok')
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000225 if self.rest is not None:
226 offset = int(self.rest)
227 else:
228 offset = 0
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300229 self.dtp.push(self.next_retr_data[offset:])
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000230 self.dtp.close_when_done()
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000231 self.rest = None
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000232
233 def cmd_list(self, arg):
234 self.push('125 list ok')
235 self.dtp.push(LIST_DATA)
236 self.dtp.close_when_done()
237
238 def cmd_nlst(self, arg):
239 self.push('125 nlst ok')
240 self.dtp.push(NLST_DATA)
241 self.dtp.close_when_done()
242
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200243 def cmd_opts(self, arg):
244 self.push('200 opts ok')
245
246 def cmd_mlsd(self, arg):
247 self.push('125 mlsd ok')
248 self.dtp.push(MLSD_DATA)
249 self.dtp.close_when_done()
250
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300251 def cmd_setlongretr(self, arg):
252 # For testing. Next RETR will return long line.
253 self.next_retr_data = 'x' * int(arg)
254 self.push('125 setlongretr ok')
255
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000256
257class DummyFTPServer(asyncore.dispatcher, threading.Thread):
258
259 handler = DummyFTPHandler
260
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200261 def __init__(self, address, af=socket.AF_INET, encoding=DEFAULT_ENCODING):
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000262 threading.Thread.__init__(self)
263 asyncore.dispatcher.__init__(self)
Christian Heimes529525f2018-05-23 22:24:45 +0200264 self.daemon = True
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000265 self.create_socket(af, socket.SOCK_STREAM)
266 self.bind(address)
267 self.listen(5)
268 self.active = False
269 self.active_lock = threading.Lock()
270 self.host, self.port = self.socket.getsockname()[:2]
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000271 self.handler_instance = None
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200272 self.encoding = encoding
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000273
274 def start(self):
275 assert not self.active
276 self.__flag = threading.Event()
277 threading.Thread.start(self)
278 self.__flag.wait()
279
280 def run(self):
281 self.active = True
282 self.__flag.set()
283 while self.active and asyncore.socket_map:
284 self.active_lock.acquire()
285 asyncore.loop(timeout=0.1, count=1)
286 self.active_lock.release()
287 asyncore.close_all(ignore_all=True)
288
289 def stop(self):
290 assert self.active
291 self.active = False
292 self.join()
293
Giampaolo Rodolà977c7072010-10-04 21:08:36 +0000294 def handle_accepted(self, conn, addr):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200295 self.handler_instance = self.handler(conn, encoding=self.encoding)
Benjamin Petersond06e3b02008-09-28 21:00:42 +0000296
297 def handle_connect(self):
298 self.close()
299 handle_read = handle_connect
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000300
301 def writable(self):
302 return 0
303
304 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200305 raise Exception
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000306
307
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000308if ssl is not None:
309
Christian Heimese5b5edf2013-12-02 02:56:02 +0100310 CERTFILE = os.path.join(os.path.dirname(__file__), "keycert3.pem")
311 CAFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000312
313 class SSLConnection(asyncore.dispatcher):
314 """An asyncore.dispatcher subclass supporting TLS/SSL."""
315
316 _ssl_accepting = False
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000317 _ssl_closing = False
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000318
319 def secure_connection(self):
Christian Heimesd0486372016-09-10 23:23:33 +0200320 context = ssl.SSLContext()
321 context.load_cert_chain(CERTFILE)
322 socket = context.wrap_socket(self.socket,
323 suppress_ragged_eofs=False,
324 server_side=True,
325 do_handshake_on_connect=False)
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200326 self.del_channel()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000327 self.set_socket(socket)
328 self._ssl_accepting = True
329
330 def _do_ssl_handshake(self):
331 try:
332 self.socket.do_handshake()
333 except ssl.SSLError as err:
334 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
335 ssl.SSL_ERROR_WANT_WRITE):
336 return
337 elif err.args[0] == ssl.SSL_ERROR_EOF:
338 return self.handle_close()
Christian Heimes61d478c2018-01-27 15:51:38 +0100339 # TODO: SSLError does not expose alert information
340 elif "SSLV3_ALERT_BAD_CERTIFICATE" in err.args[1]:
341 return self.handle_close()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000342 raise
Andrew Svetlov0832af62012-12-18 23:10:48 +0200343 except OSError as err:
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000344 if err.args[0] == errno.ECONNABORTED:
345 return self.handle_close()
346 else:
347 self._ssl_accepting = False
348
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000349 def _do_ssl_shutdown(self):
350 self._ssl_closing = True
351 try:
352 self.socket = self.socket.unwrap()
353 except ssl.SSLError as err:
354 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
355 ssl.SSL_ERROR_WANT_WRITE):
356 return
Pablo Galindo293dd232019-11-19 21:34:03 +0000357 except OSError:
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000358 # Any "socket error" corresponds to a SSL_ERROR_SYSCALL return
359 # from OpenSSL's SSL_shutdown(), corresponding to a
360 # closed socket condition. See also:
361 # http://www.mail-archive.com/openssl-users@openssl.org/msg60710.html
362 pass
363 self._ssl_closing = False
Benjamin Petersonb29614e2012-10-09 11:16:03 -0400364 if getattr(self, '_ccc', False) is False:
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200365 super(SSLConnection, self).close()
366 else:
367 pass
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000368
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000369 def handle_read_event(self):
370 if self._ssl_accepting:
371 self._do_ssl_handshake()
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000372 elif self._ssl_closing:
373 self._do_ssl_shutdown()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000374 else:
375 super(SSLConnection, self).handle_read_event()
376
377 def handle_write_event(self):
378 if self._ssl_accepting:
379 self._do_ssl_handshake()
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000380 elif self._ssl_closing:
381 self._do_ssl_shutdown()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000382 else:
383 super(SSLConnection, self).handle_write_event()
384
385 def send(self, data):
386 try:
387 return super(SSLConnection, self).send(data)
388 except ssl.SSLError as err:
Antoine Pitrou5733c082010-03-22 14:49:10 +0000389 if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN,
390 ssl.SSL_ERROR_WANT_READ,
391 ssl.SSL_ERROR_WANT_WRITE):
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000392 return 0
393 raise
394
395 def recv(self, buffer_size):
396 try:
397 return super(SSLConnection, self).recv(buffer_size)
398 except ssl.SSLError as err:
Antoine Pitrou5733c082010-03-22 14:49:10 +0000399 if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
400 ssl.SSL_ERROR_WANT_WRITE):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000401 return b''
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000402 if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN):
403 self.handle_close()
404 return b''
405 raise
406
407 def handle_error(self):
Berker Peksag8f791d32014-11-01 10:45:57 +0200408 raise Exception
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000409
410 def close(self):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000411 if (isinstance(self.socket, ssl.SSLSocket) and
Christian Heimes529525f2018-05-23 22:24:45 +0200412 self.socket._sslobj is not None):
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000413 self._do_ssl_shutdown()
Benjamin Peterson1bd93a72010-10-31 19:58:07 +0000414 else:
415 super(SSLConnection, self).close()
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000416
417
418 class DummyTLS_DTPHandler(SSLConnection, DummyDTPHandler):
419 """A DummyDTPHandler subclass supporting TLS/SSL."""
420
421 def __init__(self, conn, baseclass):
422 DummyDTPHandler.__init__(self, conn, baseclass)
423 if self.baseclass.secure_data_channel:
424 self.secure_connection()
425
426
427 class DummyTLS_FTPHandler(SSLConnection, DummyFTPHandler):
428 """A DummyFTPHandler subclass supporting TLS/SSL."""
429
430 dtp_handler = DummyTLS_DTPHandler
431
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200432 def __init__(self, conn, encoding=DEFAULT_ENCODING):
433 DummyFTPHandler.__init__(self, conn, encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000434 self.secure_data_channel = False
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200435 self._ccc = False
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000436
437 def cmd_auth(self, line):
438 """Set up secure control channel."""
439 self.push('234 AUTH TLS successful')
440 self.secure_connection()
441
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200442 def cmd_ccc(self, line):
443 self.push('220 Reverting back to clear-text')
444 self._ccc = True
445 self._do_ssl_shutdown()
446
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000447 def cmd_pbsz(self, line):
448 """Negotiate size of buffer for secure data transfer.
449 For TLS/SSL the only valid value for the parameter is '0'.
450 Any other value is accepted but ignored.
451 """
452 self.push('200 PBSZ=0 successful.')
453
454 def cmd_prot(self, line):
455 """Setup un/secure data channel."""
456 arg = line.upper()
457 if arg == 'C':
458 self.push('200 Protection set to Clear')
459 self.secure_data_channel = False
460 elif arg == 'P':
461 self.push('200 Protection set to Private')
462 self.secure_data_channel = True
463 else:
464 self.push("502 Unrecognized PROT type (use C or P).")
465
466
467 class DummyTLS_FTPServer(DummyFTPServer):
468 handler = DummyTLS_FTPHandler
469
470
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000471class TestFTPClass(TestCase):
472
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200473 def setUp(self, encoding=DEFAULT_ENCODING):
474 self.server = DummyFTPServer((HOST, 0), encoding=encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000475 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200476 self.client = ftplib.FTP(timeout=TIMEOUT, encoding=encoding)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000477 self.client.connect(self.server.host, self.server.port)
478
479 def tearDown(self):
480 self.client.close()
481 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700482 # Explicitly clear the attribute to prevent dangling thread
483 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200484 asyncore.close_all(ignore_all=True)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000485
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100486 def check_data(self, received, expected):
487 self.assertEqual(len(received), len(expected))
488 self.assertEqual(received, expected)
489
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000490 def test_getwelcome(self):
491 self.assertEqual(self.client.getwelcome(), '220 welcome')
492
493 def test_sanitize(self):
494 self.assertEqual(self.client.sanitize('foo'), repr('foo'))
495 self.assertEqual(self.client.sanitize('pass 12345'), repr('pass *****'))
496 self.assertEqual(self.client.sanitize('PASS 12345'), repr('PASS *****'))
497
498 def test_exceptions(self):
Dong-hee Na2b1e6e92017-07-23 02:20:22 +0900499 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r\n0')
500 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\n0')
501 self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r0')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000502 self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 400')
503 self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 499')
504 self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 500')
505 self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 599')
506 self.assertRaises(ftplib.error_proto, self.client.sendcmd, 'echo 999')
507
508 def test_all_errors(self):
509 exceptions = (ftplib.error_reply, ftplib.error_temp, ftplib.error_perm,
Dong-hee Na2b1e6e92017-07-23 02:20:22 +0900510 ftplib.error_proto, ftplib.Error, OSError,
511 EOFError)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000512 for x in exceptions:
513 try:
514 raise x('exception not included in all_errors set')
515 except ftplib.all_errors:
516 pass
517
518 def test_set_pasv(self):
519 # passive mode is supposed to be enabled by default
520 self.assertTrue(self.client.passiveserver)
521 self.client.set_pasv(True)
522 self.assertTrue(self.client.passiveserver)
523 self.client.set_pasv(False)
524 self.assertFalse(self.client.passiveserver)
525
526 def test_voidcmd(self):
527 self.client.voidcmd('echo 200')
528 self.client.voidcmd('echo 299')
529 self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 199')
530 self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 300')
531
532 def test_login(self):
533 self.client.login()
534
535 def test_acct(self):
536 self.client.acct('passwd')
537
538 def test_rename(self):
539 self.client.rename('a', 'b')
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000540 self.server.handler_instance.next_response = '200'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000541 self.assertRaises(ftplib.error_reply, self.client.rename, 'a', 'b')
542
543 def test_delete(self):
544 self.client.delete('foo')
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000545 self.server.handler_instance.next_response = '199'
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000546 self.assertRaises(ftplib.error_reply, self.client.delete, 'foo')
547
548 def test_size(self):
549 self.client.size('foo')
550
551 def test_mkd(self):
552 dir = self.client.mkd('/foo')
553 self.assertEqual(dir, '/foo')
554
555 def test_rmd(self):
556 self.client.rmd('foo')
557
Senthil Kumaran0d538602013-08-12 22:25:27 -0700558 def test_cwd(self):
559 dir = self.client.cwd('/foo')
560 self.assertEqual(dir, '250 cwd ok')
561
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000562 def test_pwd(self):
563 dir = self.client.pwd()
564 self.assertEqual(dir, 'pwd ok')
565
566 def test_quit(self):
567 self.assertEqual(self.client.quit(), '221 quit ok')
568 # Ensure the connection gets closed; sock attribute should be None
569 self.assertEqual(self.client.sock, None)
570
Giampaolo Rodola'0b5c21f2011-05-07 19:03:47 +0200571 def test_abort(self):
572 self.client.abort()
573
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000574 def test_retrbinary(self):
575 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200576 received.append(data.decode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000577 received = []
578 self.client.retrbinary('retr', callback)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100579 self.check_data(''.join(received), RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000580
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000581 def test_retrbinary_rest(self):
582 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200583 received.append(data.decode(self.client.encoding))
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000584 for rest in (0, 10, 20):
585 received = []
586 self.client.retrbinary('retr', callback, rest=rest)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100587 self.check_data(''.join(received), RETR_DATA[rest:])
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000588
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000589 def test_retrlines(self):
590 received = []
591 self.client.retrlines('retr', received.append)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100592 self.check_data(''.join(received), RETR_DATA.replace('\r\n', ''))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000593
594 def test_storbinary(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200595 f = io.BytesIO(RETR_DATA.encode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000596 self.client.storbinary('stor', f)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100597 self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000598 # test new callback arg
599 flag = []
600 f.seek(0)
601 self.client.storbinary('stor', f, callback=lambda x: flag.append(None))
602 self.assertTrue(flag)
603
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000604 def test_storbinary_rest(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200605 data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
606 f = io.BytesIO(data)
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000607 for r in (30, '30'):
608 f.seek(0)
609 self.client.storbinary('stor', f, rest=r)
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000610 self.assertEqual(self.server.handler_instance.rest, str(r))
Antoine Pitrou648bcd72009-11-27 13:23:26 +0000611
Giampaolo Rodolàf96482e2010-08-04 10:36:18 +0000612 def test_storlines(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200613 data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
614 f = io.BytesIO(data)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000615 self.client.storlines('stor', f)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100616 self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000617 # test new callback arg
618 flag = []
619 f.seek(0)
620 self.client.storlines('stor foo', f, callback=lambda x: flag.append(None))
621 self.assertTrue(flag)
622
Victor Stinnered3a3032013-04-02 22:13:27 +0200623 f = io.StringIO(RETR_DATA.replace('\r\n', '\n'))
624 # storlines() expects a binary file, not a text file
Florent Xicluna5f3fef32013-07-06 15:08:21 +0200625 with support.check_warnings(('', BytesWarning), quiet=True):
626 self.assertRaises(TypeError, self.client.storlines, 'stor foo', f)
Victor Stinnered3a3032013-04-02 22:13:27 +0200627
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000628 def test_nlst(self):
629 self.client.nlst()
630 self.assertEqual(self.client.nlst(), NLST_DATA.split('\r\n')[:-1])
631
632 def test_dir(self):
633 l = []
634 self.client.dir(lambda x: l.append(x))
635 self.assertEqual(''.join(l), LIST_DATA.replace('\r\n', ''))
636
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200637 def test_mlsd(self):
638 list(self.client.mlsd())
639 list(self.client.mlsd(path='/'))
640 list(self.client.mlsd(path='/', facts=['size', 'type']))
641
642 ls = list(self.client.mlsd())
643 for name, facts in ls:
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200644 self.assertIsInstance(name, str)
645 self.assertIsInstance(facts, dict)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200646 self.assertTrue(name)
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200647 self.assertIn('type', facts)
648 self.assertIn('perm', facts)
649 self.assertIn('unique', facts)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200650
651 def set_data(data):
652 self.server.handler_instance.next_data = data
653
654 def test_entry(line, type=None, perm=None, unique=None, name=None):
655 type = 'type' if type is None else type
656 perm = 'perm' if perm is None else perm
657 unique = 'unique' if unique is None else unique
658 name = 'name' if name is None else name
659 set_data(line)
660 _name, facts = next(self.client.mlsd())
661 self.assertEqual(_name, name)
662 self.assertEqual(facts['type'], type)
663 self.assertEqual(facts['perm'], perm)
664 self.assertEqual(facts['unique'], unique)
665
666 # plain
667 test_entry('type=type;perm=perm;unique=unique; name\r\n')
668 # "=" in fact value
669 test_entry('type=ty=pe;perm=perm;unique=unique; name\r\n', type="ty=pe")
670 test_entry('type==type;perm=perm;unique=unique; name\r\n', type="=type")
671 test_entry('type=t=y=pe;perm=perm;unique=unique; name\r\n', type="t=y=pe")
672 test_entry('type=====;perm=perm;unique=unique; name\r\n', type="====")
673 # spaces in name
674 test_entry('type=type;perm=perm;unique=unique; na me\r\n', name="na me")
675 test_entry('type=type;perm=perm;unique=unique; name \r\n', name="name ")
676 test_entry('type=type;perm=perm;unique=unique; name\r\n', name=" name")
677 test_entry('type=type;perm=perm;unique=unique; n am e\r\n', name="n am e")
678 # ";" in name
679 test_entry('type=type;perm=perm;unique=unique; na;me\r\n', name="na;me")
680 test_entry('type=type;perm=perm;unique=unique; ;name\r\n', name=";name")
681 test_entry('type=type;perm=perm;unique=unique; ;name;\r\n', name=";name;")
682 test_entry('type=type;perm=perm;unique=unique; ;;;;\r\n', name=";;;;")
683 # case sensitiveness
684 set_data('Type=type;TyPe=perm;UNIQUE=unique; name\r\n')
685 _name, facts = next(self.client.mlsd())
Giampaolo Rodola'a55efb32011-05-07 16:06:59 +0200686 for x in facts:
687 self.assertTrue(x.islower())
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200688 # no data (directory empty)
689 set_data('')
690 self.assertRaises(StopIteration, next, self.client.mlsd())
691 set_data('')
692 for x in self.client.mlsd():
Berker Peksag8f791d32014-11-01 10:45:57 +0200693 self.fail("unexpected data %s" % x)
Giampaolo Rodola'd78def92011-05-06 19:49:08 +0200694
Benjamin Peterson3a53fbb2008-09-27 22:04:16 +0000695 def test_makeport(self):
Brett Cannon918e2d42010-10-29 23:26:25 +0000696 with self.client.makeport():
697 # IPv4 is in use, just make sure send_eprt has not been used
698 self.assertEqual(self.server.handler_instance.last_received_cmd,
699 'port')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000700
701 def test_makepasv(self):
702 host, port = self.client.makepasv()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200703 conn = socket.create_connection((host, port), timeout=TIMEOUT)
Guido van Rossumd8faa362007-04-27 19:54:29 +0000704 conn.close()
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000705 # IPv4 is in use, just make sure send_epsv has not been used
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000706 self.assertEqual(self.server.handler_instance.last_received_cmd, 'pasv')
707
708 def test_with_statement(self):
709 self.client.quit()
710
711 def is_client_connected():
712 if self.client.sock is None:
713 return False
714 try:
715 self.client.sendcmd('noop')
Andrew Svetlov0832af62012-12-18 23:10:48 +0200716 except (OSError, EOFError):
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000717 return False
718 return True
719
720 # base test
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200721 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000722 self.client.connect(self.server.host, self.server.port)
723 self.client.sendcmd('noop')
724 self.assertTrue(is_client_connected())
725 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
726 self.assertFalse(is_client_connected())
727
728 # QUIT sent inside the with block
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200729 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000730 self.client.connect(self.server.host, self.server.port)
731 self.client.sendcmd('noop')
732 self.client.quit()
733 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
734 self.assertFalse(is_client_connected())
735
736 # force a wrong response code to be sent on QUIT: error_perm
737 # is expected and the connection is supposed to be closed
738 try:
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200739 with ftplib.FTP(timeout=TIMEOUT) as self.client:
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000740 self.client.connect(self.server.host, self.server.port)
741 self.client.sendcmd('noop')
742 self.server.handler_instance.next_response = '550 error on quit'
743 except ftplib.error_perm as err:
744 self.assertEqual(str(err), '550 error on quit')
745 else:
746 self.fail('Exception not raised')
747 # needed to give the threaded server some time to set the attribute
748 # which otherwise would still be == 'noop'
749 time.sleep(0.1)
750 self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
751 self.assertFalse(is_client_connected())
Guido van Rossumd8faa362007-04-27 19:54:29 +0000752
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000753 def test_source_address(self):
754 self.client.quit()
Serhiy Storchaka16994912020-04-25 10:06:29 +0300755 port = socket_helper.find_unused_port()
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200756 try:
757 self.client.connect(self.server.host, self.server.port,
758 source_address=(HOST, port))
759 self.assertEqual(self.client.sock.getsockname()[1], port)
760 self.client.quit()
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200761 except OSError as e:
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200762 if e.errno == errno.EADDRINUSE:
763 self.skipTest("couldn't bind to port %d" % port)
764 raise
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000765
766 def test_source_address_passive_connection(self):
Serhiy Storchaka16994912020-04-25 10:06:29 +0300767 port = socket_helper.find_unused_port()
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000768 self.client.source_address = (HOST, port)
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200769 try:
770 with self.client.transfercmd('list') as sock:
771 self.assertEqual(sock.getsockname()[1], port)
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200772 except OSError as e:
Antoine Pitrou6dca5272011-04-03 18:29:45 +0200773 if e.errno == errno.EADDRINUSE:
774 self.skipTest("couldn't bind to port %d" % port)
775 raise
Giampaolo Rodolà396ff062011-02-28 19:19:51 +0000776
Giampaolo Rodolàbbc47822010-08-23 22:10:32 +0000777 def test_parse257(self):
778 self.assertEqual(ftplib.parse257('257 "/foo/bar"'), '/foo/bar')
779 self.assertEqual(ftplib.parse257('257 "/foo/bar" created'), '/foo/bar')
780 self.assertEqual(ftplib.parse257('257 ""'), '')
781 self.assertEqual(ftplib.parse257('257 "" created'), '')
782 self.assertRaises(ftplib.error_reply, ftplib.parse257, '250 "/foo/bar"')
783 # The 257 response is supposed to include the directory
784 # name and in case it contains embedded double-quotes
785 # they must be doubled (see RFC-959, chapter 7, appendix 2).
786 self.assertEqual(ftplib.parse257('257 "/foo/b""ar"'), '/foo/b"ar')
787 self.assertEqual(ftplib.parse257('257 "/foo/b""ar" created'), '/foo/b"ar')
788
Serhiy Storchakac30b1782013-10-20 16:58:27 +0300789 def test_line_too_long(self):
790 self.assertRaises(ftplib.Error, self.client.sendcmd,
791 'x' * self.client.maxline * 2)
792
793 def test_retrlines_too_long(self):
794 self.client.sendcmd('SETLONGRETR %d' % (self.client.maxline * 2))
795 received = []
796 self.assertRaises(ftplib.Error,
797 self.client.retrlines, 'retr', received.append)
798
799 def test_storlines_too_long(self):
800 f = io.BytesIO(b'x' * self.client.maxline * 2)
801 self.assertRaises(ftplib.Error, self.client.storlines, 'stor', f)
802
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200803 def test_encoding_param(self):
804 encodings = ['latin-1', 'utf-8']
805 for encoding in encodings:
806 with self.subTest(encoding=encoding):
807 self.tearDown()
808 self.setUp(encoding=encoding)
809 self.assertEqual(encoding, self.client.encoding)
810 self.test_retrbinary()
811 self.test_storbinary()
812 self.test_retrlines()
813 new_dir = self.client.mkd('/non-ascii dir \xAE')
814 self.check_data(new_dir, '/non-ascii dir \xAE')
815 # Check default encoding
816 client = ftplib.FTP(timeout=TIMEOUT)
817 self.assertEqual(DEFAULT_ENCODING, client.encoding)
818
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000819
Serhiy Storchaka16994912020-04-25 10:06:29 +0300820@skipUnless(socket_helper.IPV6_ENABLED, "IPv6 not enabled")
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000821class TestIPv6Environment(TestCase):
822
823 def setUp(self):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200824 self.server = DummyFTPServer((HOSTv6, 0),
825 af=socket.AF_INET6,
826 encoding=DEFAULT_ENCODING)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000827 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200828 self.client = ftplib.FTP(timeout=TIMEOUT, encoding=DEFAULT_ENCODING)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000829 self.client.connect(self.server.host, self.server.port)
830
831 def tearDown(self):
832 self.client.close()
833 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700834 # Explicitly clear the attribute to prevent dangling thread
835 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200836 asyncore.close_all(ignore_all=True)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000837
838 def test_af(self):
839 self.assertEqual(self.client.af, socket.AF_INET6)
840
841 def test_makeport(self):
Brett Cannon918e2d42010-10-29 23:26:25 +0000842 with self.client.makeport():
843 self.assertEqual(self.server.handler_instance.last_received_cmd,
844 'eprt')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000845
846 def test_makepasv(self):
847 host, port = self.client.makepasv()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200848 conn = socket.create_connection((host, port), timeout=TIMEOUT)
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000849 conn.close()
Giampaolo Rodolàbd576b72010-05-10 14:53:29 +0000850 self.assertEqual(self.server.handler_instance.last_received_cmd, 'epsv')
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000851
852 def test_transfer(self):
853 def retr():
854 def callback(data):
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200855 received.append(data.decode(self.client.encoding))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000856 received = []
857 self.client.retrbinary('retr', callback)
Giampaolo Rodola'8bc85852012-01-09 17:10:10 +0100858 self.assertEqual(len(''.join(received)), len(RETR_DATA))
Benjamin Petersonbe17a112008-09-27 21:49:47 +0000859 self.assertEqual(''.join(received), RETR_DATA)
860 self.client.set_pasv(True)
861 retr()
862 self.client.set_pasv(False)
863 retr()
864
865
Serhiy Storchaka43767632013-11-03 21:31:38 +0200866@skipUnless(ssl, "SSL not available")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000867class TestTLS_FTPClassMixin(TestFTPClass):
868 """Repeat TestFTPClass tests starting the TLS layer for both control
869 and data connections first.
870 """
871
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200872 def setUp(self, encoding=DEFAULT_ENCODING):
873 self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000874 self.server.start()
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200875 self.client = ftplib.FTP_TLS(timeout=TIMEOUT, encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000876 self.client.connect(self.server.host, self.server.port)
877 # enable TLS
878 self.client.auth()
879 self.client.prot_p()
880
881
Serhiy Storchaka43767632013-11-03 21:31:38 +0200882@skipUnless(ssl, "SSL not available")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000883class TestTLS_FTPClass(TestCase):
884 """Specific TLS_FTP class tests."""
885
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200886 def setUp(self, encoding=DEFAULT_ENCODING):
887 self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000888 self.server.start()
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200889 self.client = ftplib.FTP_TLS(timeout=TIMEOUT)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000890 self.client.connect(self.server.host, self.server.port)
891
892 def tearDown(self):
893 self.client.close()
894 self.server.stop()
Victor Stinnerd403a292017-09-13 03:58:25 -0700895 # Explicitly clear the attribute to prevent dangling thread
896 self.server = None
Victor Stinner73528642017-06-30 17:36:57 +0200897 asyncore.close_all(ignore_all=True)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000898
899 def test_control_connection(self):
Ezio Melottie9615932010-01-24 19:26:24 +0000900 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000901 self.client.auth()
Ezio Melottie9615932010-01-24 19:26:24 +0000902 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000903
904 def test_data_connection(self):
905 # clear text
Brett Cannon918e2d42010-10-29 23:26:25 +0000906 with self.client.transfercmd('list') as sock:
907 self.assertNotIsInstance(sock, ssl.SSLSocket)
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200908 self.assertEqual(sock.recv(1024),
909 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000910 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000911
912 # secured, after PROT P
913 self.client.prot_p()
Brett Cannon918e2d42010-10-29 23:26:25 +0000914 with self.client.transfercmd('list') as sock:
915 self.assertIsInstance(sock, ssl.SSLSocket)
Christian Heimes1590c392018-08-16 19:43:44 +0200916 # consume from SSL socket to finalize handshake and avoid
917 # "SSLError [SSL] shutdown while in init"
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200918 self.assertEqual(sock.recv(1024),
919 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000920 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000921
922 # PROT C is issued, the connection must be in cleartext again
923 self.client.prot_c()
Brett Cannon918e2d42010-10-29 23:26:25 +0000924 with self.client.transfercmd('list') as sock:
925 self.assertNotIsInstance(sock, ssl.SSLSocket)
Sebastian Pedersena1a0eb42020-04-14 01:07:56 +0200926 self.assertEqual(sock.recv(1024),
927 LIST_DATA.encode(self.client.encoding))
Antoine Pitrou2c4f98b2010-04-23 00:16:21 +0000928 self.assertEqual(self.client.voidresp(), "226 transfer complete")
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000929
930 def test_login(self):
931 # login() is supposed to implicitly secure the control connection
Ezio Melottie9615932010-01-24 19:26:24 +0000932 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000933 self.client.login()
Ezio Melottie9615932010-01-24 19:26:24 +0000934 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
Antoine Pitrouf988cd02009-11-17 20:21:14 +0000935 # make sure that AUTH TLS doesn't get issued again
936 self.client.login()
937
938 def test_auth_issued_twice(self):
939 self.client.auth()
940 self.assertRaises(ValueError, self.client.auth)
941
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000942 def test_context(self):
943 self.client.quit()
Christian Heimesa170fa12017-09-15 20:27:30 +0200944 ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
945 ctx.check_hostname = False
946 ctx.verify_mode = ssl.CERT_NONE
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000947 self.assertRaises(ValueError, ftplib.FTP_TLS, keyfile=CERTFILE,
948 context=ctx)
949 self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
950 context=ctx)
951 self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
952 keyfile=CERTFILE, context=ctx)
953
Giampaolo Rodola'0d4f08c2013-05-16 15:12:01 +0200954 self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000955 self.client.connect(self.server.host, self.server.port)
956 self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
957 self.client.auth()
958 self.assertIs(self.client.sock.context, ctx)
959 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
960
961 self.client.prot_p()
Brett Cannon918e2d42010-10-29 23:26:25 +0000962 with self.client.transfercmd('list') as sock:
963 self.assertIs(sock.context, ctx)
964 self.assertIsInstance(sock, ssl.SSLSocket)
Giampaolo Rodolàa67299e2010-05-26 18:06:04 +0000965
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200966 def test_ccc(self):
967 self.assertRaises(ValueError, self.client.ccc)
968 self.client.login(secure=True)
969 self.assertIsInstance(self.client.sock, ssl.SSLSocket)
970 self.client.ccc()
971 self.assertRaises(ValueError, self.client.sock.unwrap)
Giampaolo Rodola'096dcb12011-06-27 11:17:51 +0200972
Victor Stinner51500f32018-01-29 13:21:34 +0100973 @skipUnless(False, "FIXME: bpo-32706")
Christian Heimese5b5edf2013-12-02 02:56:02 +0100974 def test_check_hostname(self):
975 self.client.quit()
Christian Heimesa170fa12017-09-15 20:27:30 +0200976 ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
977 self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED)
978 self.assertEqual(ctx.check_hostname, True)
Christian Heimese5b5edf2013-12-02 02:56:02 +0100979 ctx.load_verify_locations(CAFILE)
980 self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
981
982 # 127.0.0.1 doesn't match SAN
983 self.client.connect(self.server.host, self.server.port)
984 with self.assertRaises(ssl.CertificateError):
985 self.client.auth()
986 # exception quits connection
987
988 self.client.connect(self.server.host, self.server.port)
989 self.client.prot_p()
990 with self.assertRaises(ssl.CertificateError):
991 with self.client.transfercmd("list") as sock:
992 pass
993 self.client.quit()
994
995 self.client.connect("localhost", self.server.port)
996 self.client.auth()
997 self.client.quit()
998
999 self.client.connect("localhost", self.server.port)
1000 self.client.prot_p()
1001 with self.client.transfercmd("list") as sock:
1002 pass
1003
Antoine Pitrouf988cd02009-11-17 20:21:14 +00001004
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001005class TestTimeouts(TestCase):
Guido van Rossumd8faa362007-04-27 19:54:29 +00001006
1007 def setUp(self):
Guido van Rossumd8faa362007-04-27 19:54:29 +00001008 self.evt = threading.Event()
Christian Heimes5e696852008-04-09 08:37:03 +00001009 self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
Antoine Pitrou08d02722012-12-19 20:44:02 +01001010 self.sock.settimeout(20)
Serhiy Storchaka16994912020-04-25 10:06:29 +03001011 self.port = socket_helper.bind_port(self.sock)
Antoine Pitrou08d02722012-12-19 20:44:02 +01001012 self.server_thread = threading.Thread(target=self.server)
Christian Heimes529525f2018-05-23 22:24:45 +02001013 self.server_thread.daemon = True
Antoine Pitrou08d02722012-12-19 20:44:02 +01001014 self.server_thread.start()
Christian Heimes836baa52008-02-26 08:18:30 +00001015 # Wait for the server to be ready.
1016 self.evt.wait()
1017 self.evt.clear()
Antoine Pitrou08d02722012-12-19 20:44:02 +01001018 self.old_port = ftplib.FTP.port
Christian Heimes5e696852008-04-09 08:37:03 +00001019 ftplib.FTP.port = self.port
Guido van Rossumd8faa362007-04-27 19:54:29 +00001020
1021 def tearDown(self):
Antoine Pitrou08d02722012-12-19 20:44:02 +01001022 ftplib.FTP.port = self.old_port
1023 self.server_thread.join()
Victor Stinnerb157ce12017-09-13 06:43:58 -07001024 # Explicitly clear the attribute to prevent dangling thread
1025 self.server_thread = None
Guido van Rossumd8faa362007-04-27 19:54:29 +00001026
Antoine Pitrou08d02722012-12-19 20:44:02 +01001027 def server(self):
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001028 # This method sets the evt 3 times:
1029 # 1) when the connection is ready to be accepted.
1030 # 2) when it is safe for the caller to close the connection
1031 # 3) when we have closed the socket
Charles-François Natali6e204602014-07-23 19:28:13 +01001032 self.sock.listen()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001033 # (1) Signal the caller that we are ready to accept the connection.
Antoine Pitrou08d02722012-12-19 20:44:02 +01001034 self.evt.set()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001035 try:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001036 conn, addr = self.sock.accept()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001037 except socket.timeout:
1038 pass
1039 else:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001040 conn.sendall(b"1 Hola mundo\n")
1041 conn.shutdown(socket.SHUT_WR)
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001042 # (2) Signal the caller that it is safe to close the socket.
Antoine Pitrou08d02722012-12-19 20:44:02 +01001043 self.evt.set()
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001044 conn.close()
1045 finally:
Antoine Pitrou08d02722012-12-19 20:44:02 +01001046 self.sock.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001047
1048 def testTimeoutDefault(self):
Georg Brandlf78e02b2008-06-10 17:40:04 +00001049 # default -- use global socket timeout
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001050 self.assertIsNone(socket.getdefaulttimeout())
Georg Brandlf78e02b2008-06-10 17:40:04 +00001051 socket.setdefaulttimeout(30)
1052 try:
Antoine Pitrouf6fbf562013-08-22 00:39:46 +02001053 ftp = ftplib.FTP(HOST)
Georg Brandlf78e02b2008-06-10 17:40:04 +00001054 finally:
1055 socket.setdefaulttimeout(None)
1056 self.assertEqual(ftp.sock.gettimeout(), 30)
1057 self.evt.wait()
1058 ftp.close()
1059
1060 def testTimeoutNone(self):
1061 # no timeout -- do not use global socket timeout
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001062 self.assertIsNone(socket.getdefaulttimeout())
Georg Brandlf78e02b2008-06-10 17:40:04 +00001063 socket.setdefaulttimeout(30)
1064 try:
Antoine Pitrouf6fbf562013-08-22 00:39:46 +02001065 ftp = ftplib.FTP(HOST, timeout=None)
Georg Brandlf78e02b2008-06-10 17:40:04 +00001066 finally:
1067 socket.setdefaulttimeout(None)
Serhiy Storchaka25d8aea2014-02-08 14:50:08 +02001068 self.assertIsNone(ftp.sock.gettimeout())
Christian Heimes836baa52008-02-26 08:18:30 +00001069 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001070 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001071
1072 def testTimeoutValue(self):
1073 # a value
Christian Heimes5e696852008-04-09 08:37:03 +00001074 ftp = ftplib.FTP(HOST, timeout=30)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001075 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001076 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001077 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001078
Dong-hee Naa190e2a2020-01-14 04:34:34 +09001079 # bpo-39259
1080 with self.assertRaises(ValueError):
1081 ftplib.FTP(HOST, timeout=0)
1082
Guido van Rossumd8faa362007-04-27 19:54:29 +00001083 def testTimeoutConnect(self):
1084 ftp = ftplib.FTP()
Christian Heimes5e696852008-04-09 08:37:03 +00001085 ftp.connect(HOST, timeout=30)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001086 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001087 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001088 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001089
1090 def testTimeoutDifferentOrder(self):
1091 ftp = ftplib.FTP(timeout=30)
Christian Heimes5e696852008-04-09 08:37:03 +00001092 ftp.connect(HOST)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001093 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001094 self.evt.wait()
Georg Brandlf78e02b2008-06-10 17:40:04 +00001095 ftp.close()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001096
1097 def testTimeoutDirectAccess(self):
1098 ftp = ftplib.FTP()
1099 ftp.timeout = 30
Christian Heimes5e696852008-04-09 08:37:03 +00001100 ftp.connect(HOST)
Guido van Rossumd8faa362007-04-27 19:54:29 +00001101 self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes836baa52008-02-26 08:18:30 +00001102 self.evt.wait()
Guido van Rossumd8faa362007-04-27 19:54:29 +00001103 ftp.close()
1104
1105
Martin Panter19e69c52015-11-14 12:46:42 +00001106class MiscTestCase(TestCase):
1107 def test__all__(self):
1108 blacklist = {'MSG_OOB', 'FTP_PORT', 'MAXLINE', 'CRLF', 'B_CRLF',
1109 'Error', 'parse150', 'parse227', 'parse229', 'parse257',
1110 'print_line', 'ftpcp', 'test'}
1111 support.check__all__(self, ftplib, blacklist=blacklist)
1112
1113
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001114def test_main():
Berker Peksag8f791d32014-11-01 10:45:57 +02001115 tests = [TestFTPClass, TestTimeouts,
Serhiy Storchaka43767632013-11-03 21:31:38 +02001116 TestIPv6Environment,
Martin Panter19e69c52015-11-14 12:46:42 +00001117 TestTLS_FTPClassMixin, TestTLS_FTPClass,
1118 MiscTestCase]
Antoine Pitrouf988cd02009-11-17 20:21:14 +00001119
Benjamin Petersonbe17a112008-09-27 21:49:47 +00001120 thread_info = support.threading_setup()
1121 try:
1122 support.run_unittest(*tests)
1123 finally:
1124 support.threading_cleanup(*thread_info)
1125
Guido van Rossumd8faa362007-04-27 19:54:29 +00001126
1127if __name__ == '__main__':
1128 test_main()