test_ftplib.py 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161
  1. """Test script for ftplib module."""
  2. # Modified by Giampaolo Rodola' to test FTP class, IPv6 and TLS
  3. # environment
  4. import ftplib
  5. import socket
  6. import io
  7. import errno
  8. import os
  9. import threading
  10. import time
  11. import unittest
  12. try:
  13. import ssl
  14. except ImportError:
  15. ssl = None
  16. from unittest import TestCase, skipUnless
  17. from test import support
  18. from test.support import threading_helper
  19. from test.support import socket_helper
  20. from test.support import warnings_helper
  21. from test.support.socket_helper import HOST, HOSTv6
  22. asynchat = warnings_helper.import_deprecated('asynchat')
  23. asyncore = warnings_helper.import_deprecated('asyncore')
  24. support.requires_working_socket(module=True)
  25. TIMEOUT = support.LOOPBACK_TIMEOUT
  26. DEFAULT_ENCODING = 'utf-8'
  27. # the dummy data returned by server over the data channel when
  28. # RETR, LIST, NLST, MLSD commands are issued
  29. RETR_DATA = 'abcde12345\r\n' * 1000 + 'non-ascii char \xAE\r\n'
  30. LIST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
  31. NLST_DATA = 'foo\r\nbar\r\n non-ascii char \xAE\r\n'
  32. MLSD_DATA = ("type=cdir;perm=el;unique==keVO1+ZF4; test\r\n"
  33. "type=pdir;perm=e;unique==keVO1+d?3; ..\r\n"
  34. "type=OS.unix=slink:/foobar;perm=;unique==keVO1+4G4; foobar\r\n"
  35. "type=OS.unix=chr-13/29;perm=;unique==keVO1+5G4; device\r\n"
  36. "type=OS.unix=blk-11/108;perm=;unique==keVO1+6G4; block\r\n"
  37. "type=file;perm=awr;unique==keVO1+8G4; writable\r\n"
  38. "type=dir;perm=cpmel;unique==keVO1+7G4; promiscuous\r\n"
  39. "type=dir;perm=;unique==keVO1+1t2; no-exec\r\n"
  40. "type=file;perm=r;unique==keVO1+EG4; two words\r\n"
  41. "type=file;perm=r;unique==keVO1+IH4; leading space\r\n"
  42. "type=file;perm=r;unique==keVO1+1G4; file1\r\n"
  43. "type=dir;perm=cpmel;unique==keVO1+7G4; incoming\r\n"
  44. "type=file;perm=r;unique==keVO1+1G4; file2\r\n"
  45. "type=file;perm=r;unique==keVO1+1G4; file3\r\n"
  46. "type=file;perm=r;unique==keVO1+1G4; file4\r\n"
  47. "type=dir;perm=cpmel;unique==SGP1; dir \xAE non-ascii char\r\n"
  48. "type=file;perm=r;unique==SGP2; file \xAE non-ascii char\r\n")
  49. def default_error_handler():
  50. # bpo-44359: Silently ignore socket errors. Such errors occur when a client
  51. # socket is closed, in TestFTPClass.tearDown() and makepasv() tests, and
  52. # the server gets an error on its side.
  53. pass
  54. class DummyDTPHandler(asynchat.async_chat):
  55. dtp_conn_closed = False
  56. def __init__(self, conn, baseclass):
  57. asynchat.async_chat.__init__(self, conn)
  58. self.baseclass = baseclass
  59. self.baseclass.last_received_data = ''
  60. self.encoding = baseclass.encoding
  61. def handle_read(self):
  62. new_data = self.recv(1024).decode(self.encoding, 'replace')
  63. self.baseclass.last_received_data += new_data
  64. def handle_close(self):
  65. # XXX: this method can be called many times in a row for a single
  66. # connection, including in clear-text (non-TLS) mode.
  67. # (behaviour witnessed with test_data_connection)
  68. if not self.dtp_conn_closed:
  69. self.baseclass.push('226 transfer complete')
  70. self.close()
  71. self.dtp_conn_closed = True
  72. def push(self, what):
  73. if self.baseclass.next_data is not None:
  74. what = self.baseclass.next_data
  75. self.baseclass.next_data = None
  76. if not what:
  77. return self.close_when_done()
  78. super(DummyDTPHandler, self).push(what.encode(self.encoding))
  79. def handle_error(self):
  80. default_error_handler()
  81. class DummyFTPHandler(asynchat.async_chat):
  82. dtp_handler = DummyDTPHandler
  83. def __init__(self, conn, encoding=DEFAULT_ENCODING):
  84. asynchat.async_chat.__init__(self, conn)
  85. # tells the socket to handle urgent data inline (ABOR command)
  86. self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_OOBINLINE, 1)
  87. self.set_terminator(b"\r\n")
  88. self.in_buffer = []
  89. self.dtp = None
  90. self.last_received_cmd = None
  91. self.last_received_data = ''
  92. self.next_response = ''
  93. self.next_data = None
  94. self.rest = None
  95. self.next_retr_data = RETR_DATA
  96. self.push('220 welcome')
  97. self.encoding = encoding
  98. # We use this as the string IPv4 address to direct the client
  99. # to in response to a PASV command. To test security behavior.
  100. # https://bugs.python.org/issue43285/.
  101. self.fake_pasv_server_ip = '252.253.254.255'
  102. def collect_incoming_data(self, data):
  103. self.in_buffer.append(data)
  104. def found_terminator(self):
  105. line = b''.join(self.in_buffer).decode(self.encoding)
  106. self.in_buffer = []
  107. if self.next_response:
  108. self.push(self.next_response)
  109. self.next_response = ''
  110. cmd = line.split(' ')[0].lower()
  111. self.last_received_cmd = cmd
  112. space = line.find(' ')
  113. if space != -1:
  114. arg = line[space + 1:]
  115. else:
  116. arg = ""
  117. if hasattr(self, 'cmd_' + cmd):
  118. method = getattr(self, 'cmd_' + cmd)
  119. method(arg)
  120. else:
  121. self.push('550 command "%s" not understood.' %cmd)
  122. def handle_error(self):
  123. default_error_handler()
  124. def push(self, data):
  125. asynchat.async_chat.push(self, data.encode(self.encoding) + b'\r\n')
  126. def cmd_port(self, arg):
  127. addr = list(map(int, arg.split(',')))
  128. ip = '%d.%d.%d.%d' %tuple(addr[:4])
  129. port = (addr[4] * 256) + addr[5]
  130. s = socket.create_connection((ip, port), timeout=TIMEOUT)
  131. self.dtp = self.dtp_handler(s, baseclass=self)
  132. self.push('200 active data connection established')
  133. def cmd_pasv(self, arg):
  134. with socket.create_server((self.socket.getsockname()[0], 0)) as sock:
  135. sock.settimeout(TIMEOUT)
  136. port = sock.getsockname()[1]
  137. ip = self.fake_pasv_server_ip
  138. ip = ip.replace('.', ','); p1 = port / 256; p2 = port % 256
  139. self.push('227 entering passive mode (%s,%d,%d)' %(ip, p1, p2))
  140. conn, addr = sock.accept()
  141. self.dtp = self.dtp_handler(conn, baseclass=self)
  142. def cmd_eprt(self, arg):
  143. af, ip, port = arg.split(arg[0])[1:-1]
  144. port = int(port)
  145. s = socket.create_connection((ip, port), timeout=TIMEOUT)
  146. self.dtp = self.dtp_handler(s, baseclass=self)
  147. self.push('200 active data connection established')
  148. def cmd_epsv(self, arg):
  149. with socket.create_server((self.socket.getsockname()[0], 0),
  150. family=socket.AF_INET6) as sock:
  151. sock.settimeout(TIMEOUT)
  152. port = sock.getsockname()[1]
  153. self.push('229 entering extended passive mode (|||%d|)' %port)
  154. conn, addr = sock.accept()
  155. self.dtp = self.dtp_handler(conn, baseclass=self)
  156. def cmd_echo(self, arg):
  157. # sends back the received string (used by the test suite)
  158. self.push(arg)
  159. def cmd_noop(self, arg):
  160. self.push('200 noop ok')
  161. def cmd_user(self, arg):
  162. self.push('331 username ok')
  163. def cmd_pass(self, arg):
  164. self.push('230 password ok')
  165. def cmd_acct(self, arg):
  166. self.push('230 acct ok')
  167. def cmd_rnfr(self, arg):
  168. self.push('350 rnfr ok')
  169. def cmd_rnto(self, arg):
  170. self.push('250 rnto ok')
  171. def cmd_dele(self, arg):
  172. self.push('250 dele ok')
  173. def cmd_cwd(self, arg):
  174. self.push('250 cwd ok')
  175. def cmd_size(self, arg):
  176. self.push('250 1000')
  177. def cmd_mkd(self, arg):
  178. self.push('257 "%s"' %arg)
  179. def cmd_rmd(self, arg):
  180. self.push('250 rmd ok')
  181. def cmd_pwd(self, arg):
  182. self.push('257 "pwd ok"')
  183. def cmd_type(self, arg):
  184. self.push('200 type ok')
  185. def cmd_quit(self, arg):
  186. self.push('221 quit ok')
  187. self.close()
  188. def cmd_abor(self, arg):
  189. self.push('226 abor ok')
  190. def cmd_stor(self, arg):
  191. self.push('125 stor ok')
  192. def cmd_rest(self, arg):
  193. self.rest = arg
  194. self.push('350 rest ok')
  195. def cmd_retr(self, arg):
  196. self.push('125 retr ok')
  197. if self.rest is not None:
  198. offset = int(self.rest)
  199. else:
  200. offset = 0
  201. self.dtp.push(self.next_retr_data[offset:])
  202. self.dtp.close_when_done()
  203. self.rest = None
  204. def cmd_list(self, arg):
  205. self.push('125 list ok')
  206. self.dtp.push(LIST_DATA)
  207. self.dtp.close_when_done()
  208. def cmd_nlst(self, arg):
  209. self.push('125 nlst ok')
  210. self.dtp.push(NLST_DATA)
  211. self.dtp.close_when_done()
  212. def cmd_opts(self, arg):
  213. self.push('200 opts ok')
  214. def cmd_mlsd(self, arg):
  215. self.push('125 mlsd ok')
  216. self.dtp.push(MLSD_DATA)
  217. self.dtp.close_when_done()
  218. def cmd_setlongretr(self, arg):
  219. # For testing. Next RETR will return long line.
  220. self.next_retr_data = 'x' * int(arg)
  221. self.push('125 setlongretr ok')
  222. class DummyFTPServer(asyncore.dispatcher, threading.Thread):
  223. handler = DummyFTPHandler
  224. def __init__(self, address, af=socket.AF_INET, encoding=DEFAULT_ENCODING):
  225. threading.Thread.__init__(self)
  226. asyncore.dispatcher.__init__(self)
  227. self.daemon = True
  228. self.create_socket(af, socket.SOCK_STREAM)
  229. self.bind(address)
  230. self.listen(5)
  231. self.active = False
  232. self.active_lock = threading.Lock()
  233. self.host, self.port = self.socket.getsockname()[:2]
  234. self.handler_instance = None
  235. self.encoding = encoding
  236. def start(self):
  237. assert not self.active
  238. self.__flag = threading.Event()
  239. threading.Thread.start(self)
  240. self.__flag.wait()
  241. def run(self):
  242. self.active = True
  243. self.__flag.set()
  244. while self.active and asyncore.socket_map:
  245. self.active_lock.acquire()
  246. asyncore.loop(timeout=0.1, count=1)
  247. self.active_lock.release()
  248. asyncore.close_all(ignore_all=True)
  249. def stop(self):
  250. assert self.active
  251. self.active = False
  252. self.join()
  253. def handle_accepted(self, conn, addr):
  254. self.handler_instance = self.handler(conn, encoding=self.encoding)
  255. def handle_connect(self):
  256. self.close()
  257. handle_read = handle_connect
  258. def writable(self):
  259. return 0
  260. def handle_error(self):
  261. default_error_handler()
  262. if ssl is not None:
  263. CERTFILE = os.path.join(os.path.dirname(__file__), "keycert3.pem")
  264. CAFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem")
  265. class SSLConnection(asyncore.dispatcher):
  266. """An asyncore.dispatcher subclass supporting TLS/SSL."""
  267. _ssl_accepting = False
  268. _ssl_closing = False
  269. def secure_connection(self):
  270. context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
  271. context.load_cert_chain(CERTFILE)
  272. socket = context.wrap_socket(self.socket,
  273. suppress_ragged_eofs=False,
  274. server_side=True,
  275. do_handshake_on_connect=False)
  276. self.del_channel()
  277. self.set_socket(socket)
  278. self._ssl_accepting = True
  279. def _do_ssl_handshake(self):
  280. try:
  281. self.socket.do_handshake()
  282. except ssl.SSLError as err:
  283. if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
  284. ssl.SSL_ERROR_WANT_WRITE):
  285. return
  286. elif err.args[0] == ssl.SSL_ERROR_EOF:
  287. return self.handle_close()
  288. # TODO: SSLError does not expose alert information
  289. elif "SSLV3_ALERT_BAD_CERTIFICATE" in err.args[1]:
  290. return self.handle_close()
  291. raise
  292. except OSError as err:
  293. if err.args[0] == errno.ECONNABORTED:
  294. return self.handle_close()
  295. else:
  296. self._ssl_accepting = False
  297. def _do_ssl_shutdown(self):
  298. self._ssl_closing = True
  299. try:
  300. self.socket = self.socket.unwrap()
  301. except ssl.SSLError as err:
  302. if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
  303. ssl.SSL_ERROR_WANT_WRITE):
  304. return
  305. except OSError:
  306. # Any "socket error" corresponds to a SSL_ERROR_SYSCALL return
  307. # from OpenSSL's SSL_shutdown(), corresponding to a
  308. # closed socket condition. See also:
  309. # http://www.mail-archive.com/openssl-users@openssl.org/msg60710.html
  310. pass
  311. self._ssl_closing = False
  312. if getattr(self, '_ccc', False) is False:
  313. super(SSLConnection, self).close()
  314. else:
  315. pass
  316. def handle_read_event(self):
  317. if self._ssl_accepting:
  318. self._do_ssl_handshake()
  319. elif self._ssl_closing:
  320. self._do_ssl_shutdown()
  321. else:
  322. super(SSLConnection, self).handle_read_event()
  323. def handle_write_event(self):
  324. if self._ssl_accepting:
  325. self._do_ssl_handshake()
  326. elif self._ssl_closing:
  327. self._do_ssl_shutdown()
  328. else:
  329. super(SSLConnection, self).handle_write_event()
  330. def send(self, data):
  331. try:
  332. return super(SSLConnection, self).send(data)
  333. except ssl.SSLError as err:
  334. if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN,
  335. ssl.SSL_ERROR_WANT_READ,
  336. ssl.SSL_ERROR_WANT_WRITE):
  337. return 0
  338. raise
  339. def recv(self, buffer_size):
  340. try:
  341. return super(SSLConnection, self).recv(buffer_size)
  342. except ssl.SSLError as err:
  343. if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
  344. ssl.SSL_ERROR_WANT_WRITE):
  345. return b''
  346. if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN):
  347. self.handle_close()
  348. return b''
  349. raise
  350. def handle_error(self):
  351. default_error_handler()
  352. def close(self):
  353. if (isinstance(self.socket, ssl.SSLSocket) and
  354. self.socket._sslobj is not None):
  355. self._do_ssl_shutdown()
  356. else:
  357. super(SSLConnection, self).close()
  358. class DummyTLS_DTPHandler(SSLConnection, DummyDTPHandler):
  359. """A DummyDTPHandler subclass supporting TLS/SSL."""
  360. def __init__(self, conn, baseclass):
  361. DummyDTPHandler.__init__(self, conn, baseclass)
  362. if self.baseclass.secure_data_channel:
  363. self.secure_connection()
  364. class DummyTLS_FTPHandler(SSLConnection, DummyFTPHandler):
  365. """A DummyFTPHandler subclass supporting TLS/SSL."""
  366. dtp_handler = DummyTLS_DTPHandler
  367. def __init__(self, conn, encoding=DEFAULT_ENCODING):
  368. DummyFTPHandler.__init__(self, conn, encoding=encoding)
  369. self.secure_data_channel = False
  370. self._ccc = False
  371. def cmd_auth(self, line):
  372. """Set up secure control channel."""
  373. self.push('234 AUTH TLS successful')
  374. self.secure_connection()
  375. def cmd_ccc(self, line):
  376. self.push('220 Reverting back to clear-text')
  377. self._ccc = True
  378. self._do_ssl_shutdown()
  379. def cmd_pbsz(self, line):
  380. """Negotiate size of buffer for secure data transfer.
  381. For TLS/SSL the only valid value for the parameter is '0'.
  382. Any other value is accepted but ignored.
  383. """
  384. self.push('200 PBSZ=0 successful.')
  385. def cmd_prot(self, line):
  386. """Setup un/secure data channel."""
  387. arg = line.upper()
  388. if arg == 'C':
  389. self.push('200 Protection set to Clear')
  390. self.secure_data_channel = False
  391. elif arg == 'P':
  392. self.push('200 Protection set to Private')
  393. self.secure_data_channel = True
  394. else:
  395. self.push("502 Unrecognized PROT type (use C or P).")
  396. class DummyTLS_FTPServer(DummyFTPServer):
  397. handler = DummyTLS_FTPHandler
  398. class TestFTPClass(TestCase):
  399. def setUp(self, encoding=DEFAULT_ENCODING):
  400. self.server = DummyFTPServer((HOST, 0), encoding=encoding)
  401. self.server.start()
  402. self.client = ftplib.FTP(timeout=TIMEOUT, encoding=encoding)
  403. self.client.connect(self.server.host, self.server.port)
  404. def tearDown(self):
  405. self.client.close()
  406. self.server.stop()
  407. # Explicitly clear the attribute to prevent dangling thread
  408. self.server = None
  409. asyncore.close_all(ignore_all=True)
  410. def check_data(self, received, expected):
  411. self.assertEqual(len(received), len(expected))
  412. self.assertEqual(received, expected)
  413. def test_getwelcome(self):
  414. self.assertEqual(self.client.getwelcome(), '220 welcome')
  415. def test_sanitize(self):
  416. self.assertEqual(self.client.sanitize('foo'), repr('foo'))
  417. self.assertEqual(self.client.sanitize('pass 12345'), repr('pass *****'))
  418. self.assertEqual(self.client.sanitize('PASS 12345'), repr('PASS *****'))
  419. def test_exceptions(self):
  420. self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r\n0')
  421. self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\n0')
  422. self.assertRaises(ValueError, self.client.sendcmd, 'echo 40\r0')
  423. self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 400')
  424. self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 499')
  425. self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 500')
  426. self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 599')
  427. self.assertRaises(ftplib.error_proto, self.client.sendcmd, 'echo 999')
  428. def test_all_errors(self):
  429. exceptions = (ftplib.error_reply, ftplib.error_temp, ftplib.error_perm,
  430. ftplib.error_proto, ftplib.Error, OSError,
  431. EOFError)
  432. for x in exceptions:
  433. try:
  434. raise x('exception not included in all_errors set')
  435. except ftplib.all_errors:
  436. pass
  437. def test_set_pasv(self):
  438. # passive mode is supposed to be enabled by default
  439. self.assertTrue(self.client.passiveserver)
  440. self.client.set_pasv(True)
  441. self.assertTrue(self.client.passiveserver)
  442. self.client.set_pasv(False)
  443. self.assertFalse(self.client.passiveserver)
  444. def test_voidcmd(self):
  445. self.client.voidcmd('echo 200')
  446. self.client.voidcmd('echo 299')
  447. self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 199')
  448. self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 300')
  449. def test_login(self):
  450. self.client.login()
  451. def test_acct(self):
  452. self.client.acct('passwd')
  453. def test_rename(self):
  454. self.client.rename('a', 'b')
  455. self.server.handler_instance.next_response = '200'
  456. self.assertRaises(ftplib.error_reply, self.client.rename, 'a', 'b')
  457. def test_delete(self):
  458. self.client.delete('foo')
  459. self.server.handler_instance.next_response = '199'
  460. self.assertRaises(ftplib.error_reply, self.client.delete, 'foo')
  461. def test_size(self):
  462. self.client.size('foo')
  463. def test_mkd(self):
  464. dir = self.client.mkd('/foo')
  465. self.assertEqual(dir, '/foo')
  466. def test_rmd(self):
  467. self.client.rmd('foo')
  468. def test_cwd(self):
  469. dir = self.client.cwd('/foo')
  470. self.assertEqual(dir, '250 cwd ok')
  471. def test_pwd(self):
  472. dir = self.client.pwd()
  473. self.assertEqual(dir, 'pwd ok')
  474. def test_quit(self):
  475. self.assertEqual(self.client.quit(), '221 quit ok')
  476. # Ensure the connection gets closed; sock attribute should be None
  477. self.assertEqual(self.client.sock, None)
  478. def test_abort(self):
  479. self.client.abort()
  480. def test_retrbinary(self):
  481. def callback(data):
  482. received.append(data.decode(self.client.encoding))
  483. received = []
  484. self.client.retrbinary('retr', callback)
  485. self.check_data(''.join(received), RETR_DATA)
  486. def test_retrbinary_rest(self):
  487. def callback(data):
  488. received.append(data.decode(self.client.encoding))
  489. for rest in (0, 10, 20):
  490. received = []
  491. self.client.retrbinary('retr', callback, rest=rest)
  492. self.check_data(''.join(received), RETR_DATA[rest:])
  493. def test_retrlines(self):
  494. received = []
  495. self.client.retrlines('retr', received.append)
  496. self.check_data(''.join(received), RETR_DATA.replace('\r\n', ''))
  497. def test_storbinary(self):
  498. f = io.BytesIO(RETR_DATA.encode(self.client.encoding))
  499. self.client.storbinary('stor', f)
  500. self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
  501. # test new callback arg
  502. flag = []
  503. f.seek(0)
  504. self.client.storbinary('stor', f, callback=lambda x: flag.append(None))
  505. self.assertTrue(flag)
  506. def test_storbinary_rest(self):
  507. data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
  508. f = io.BytesIO(data)
  509. for r in (30, '30'):
  510. f.seek(0)
  511. self.client.storbinary('stor', f, rest=r)
  512. self.assertEqual(self.server.handler_instance.rest, str(r))
  513. def test_storlines(self):
  514. data = RETR_DATA.replace('\r\n', '\n').encode(self.client.encoding)
  515. f = io.BytesIO(data)
  516. self.client.storlines('stor', f)
  517. self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
  518. # test new callback arg
  519. flag = []
  520. f.seek(0)
  521. self.client.storlines('stor foo', f, callback=lambda x: flag.append(None))
  522. self.assertTrue(flag)
  523. f = io.StringIO(RETR_DATA.replace('\r\n', '\n'))
  524. # storlines() expects a binary file, not a text file
  525. with warnings_helper.check_warnings(('', BytesWarning), quiet=True):
  526. self.assertRaises(TypeError, self.client.storlines, 'stor foo', f)
  527. def test_nlst(self):
  528. self.client.nlst()
  529. self.assertEqual(self.client.nlst(), NLST_DATA.split('\r\n')[:-1])
  530. def test_dir(self):
  531. l = []
  532. self.client.dir(lambda x: l.append(x))
  533. self.assertEqual(''.join(l), LIST_DATA.replace('\r\n', ''))
  534. def test_mlsd(self):
  535. list(self.client.mlsd())
  536. list(self.client.mlsd(path='/'))
  537. list(self.client.mlsd(path='/', facts=['size', 'type']))
  538. ls = list(self.client.mlsd())
  539. for name, facts in ls:
  540. self.assertIsInstance(name, str)
  541. self.assertIsInstance(facts, dict)
  542. self.assertTrue(name)
  543. self.assertIn('type', facts)
  544. self.assertIn('perm', facts)
  545. self.assertIn('unique', facts)
  546. def set_data(data):
  547. self.server.handler_instance.next_data = data
  548. def test_entry(line, type=None, perm=None, unique=None, name=None):
  549. type = 'type' if type is None else type
  550. perm = 'perm' if perm is None else perm
  551. unique = 'unique' if unique is None else unique
  552. name = 'name' if name is None else name
  553. set_data(line)
  554. _name, facts = next(self.client.mlsd())
  555. self.assertEqual(_name, name)
  556. self.assertEqual(facts['type'], type)
  557. self.assertEqual(facts['perm'], perm)
  558. self.assertEqual(facts['unique'], unique)
  559. # plain
  560. test_entry('type=type;perm=perm;unique=unique; name\r\n')
  561. # "=" in fact value
  562. test_entry('type=ty=pe;perm=perm;unique=unique; name\r\n', type="ty=pe")
  563. test_entry('type==type;perm=perm;unique=unique; name\r\n', type="=type")
  564. test_entry('type=t=y=pe;perm=perm;unique=unique; name\r\n', type="t=y=pe")
  565. test_entry('type=====;perm=perm;unique=unique; name\r\n', type="====")
  566. # spaces in name
  567. test_entry('type=type;perm=perm;unique=unique; na me\r\n', name="na me")
  568. test_entry('type=type;perm=perm;unique=unique; name \r\n', name="name ")
  569. test_entry('type=type;perm=perm;unique=unique; name\r\n', name=" name")
  570. test_entry('type=type;perm=perm;unique=unique; n am e\r\n', name="n am e")
  571. # ";" in name
  572. test_entry('type=type;perm=perm;unique=unique; na;me\r\n', name="na;me")
  573. test_entry('type=type;perm=perm;unique=unique; ;name\r\n', name=";name")
  574. test_entry('type=type;perm=perm;unique=unique; ;name;\r\n', name=";name;")
  575. test_entry('type=type;perm=perm;unique=unique; ;;;;\r\n', name=";;;;")
  576. # case sensitiveness
  577. set_data('Type=type;TyPe=perm;UNIQUE=unique; name\r\n')
  578. _name, facts = next(self.client.mlsd())
  579. for x in facts:
  580. self.assertTrue(x.islower())
  581. # no data (directory empty)
  582. set_data('')
  583. self.assertRaises(StopIteration, next, self.client.mlsd())
  584. set_data('')
  585. for x in self.client.mlsd():
  586. self.fail("unexpected data %s" % x)
  587. def test_makeport(self):
  588. with self.client.makeport():
  589. # IPv4 is in use, just make sure send_eprt has not been used
  590. self.assertEqual(self.server.handler_instance.last_received_cmd,
  591. 'port')
  592. def test_makepasv(self):
  593. host, port = self.client.makepasv()
  594. conn = socket.create_connection((host, port), timeout=TIMEOUT)
  595. conn.close()
  596. # IPv4 is in use, just make sure send_epsv has not been used
  597. self.assertEqual(self.server.handler_instance.last_received_cmd, 'pasv')
  598. def test_makepasv_issue43285_security_disabled(self):
  599. """Test the opt-in to the old vulnerable behavior."""
  600. self.client.trust_server_pasv_ipv4_address = True
  601. bad_host, port = self.client.makepasv()
  602. self.assertEqual(
  603. bad_host, self.server.handler_instance.fake_pasv_server_ip)
  604. # Opening and closing a connection keeps the dummy server happy
  605. # instead of timing out on accept.
  606. socket.create_connection((self.client.sock.getpeername()[0], port),
  607. timeout=TIMEOUT).close()
  608. def test_makepasv_issue43285_security_enabled_default(self):
  609. self.assertFalse(self.client.trust_server_pasv_ipv4_address)
  610. trusted_host, port = self.client.makepasv()
  611. self.assertNotEqual(
  612. trusted_host, self.server.handler_instance.fake_pasv_server_ip)
  613. # Opening and closing a connection keeps the dummy server happy
  614. # instead of timing out on accept.
  615. socket.create_connection((trusted_host, port), timeout=TIMEOUT).close()
  616. def test_with_statement(self):
  617. self.client.quit()
  618. def is_client_connected():
  619. if self.client.sock is None:
  620. return False
  621. try:
  622. self.client.sendcmd('noop')
  623. except (OSError, EOFError):
  624. return False
  625. return True
  626. # base test
  627. with ftplib.FTP(timeout=TIMEOUT) as self.client:
  628. self.client.connect(self.server.host, self.server.port)
  629. self.client.sendcmd('noop')
  630. self.assertTrue(is_client_connected())
  631. self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
  632. self.assertFalse(is_client_connected())
  633. # QUIT sent inside the with block
  634. with ftplib.FTP(timeout=TIMEOUT) as self.client:
  635. self.client.connect(self.server.host, self.server.port)
  636. self.client.sendcmd('noop')
  637. self.client.quit()
  638. self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
  639. self.assertFalse(is_client_connected())
  640. # force a wrong response code to be sent on QUIT: error_perm
  641. # is expected and the connection is supposed to be closed
  642. try:
  643. with ftplib.FTP(timeout=TIMEOUT) as self.client:
  644. self.client.connect(self.server.host, self.server.port)
  645. self.client.sendcmd('noop')
  646. self.server.handler_instance.next_response = '550 error on quit'
  647. except ftplib.error_perm as err:
  648. self.assertEqual(str(err), '550 error on quit')
  649. else:
  650. self.fail('Exception not raised')
  651. # needed to give the threaded server some time to set the attribute
  652. # which otherwise would still be == 'noop'
  653. time.sleep(0.1)
  654. self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
  655. self.assertFalse(is_client_connected())
  656. def test_source_address(self):
  657. self.client.quit()
  658. port = socket_helper.find_unused_port()
  659. try:
  660. self.client.connect(self.server.host, self.server.port,
  661. source_address=(HOST, port))
  662. self.assertEqual(self.client.sock.getsockname()[1], port)
  663. self.client.quit()
  664. except OSError as e:
  665. if e.errno == errno.EADDRINUSE:
  666. self.skipTest("couldn't bind to port %d" % port)
  667. raise
  668. def test_source_address_passive_connection(self):
  669. port = socket_helper.find_unused_port()
  670. self.client.source_address = (HOST, port)
  671. try:
  672. with self.client.transfercmd('list') as sock:
  673. self.assertEqual(sock.getsockname()[1], port)
  674. except OSError as e:
  675. if e.errno == errno.EADDRINUSE:
  676. self.skipTest("couldn't bind to port %d" % port)
  677. raise
  678. def test_parse257(self):
  679. self.assertEqual(ftplib.parse257('257 "/foo/bar"'), '/foo/bar')
  680. self.assertEqual(ftplib.parse257('257 "/foo/bar" created'), '/foo/bar')
  681. self.assertEqual(ftplib.parse257('257 ""'), '')
  682. self.assertEqual(ftplib.parse257('257 "" created'), '')
  683. self.assertRaises(ftplib.error_reply, ftplib.parse257, '250 "/foo/bar"')
  684. # The 257 response is supposed to include the directory
  685. # name and in case it contains embedded double-quotes
  686. # they must be doubled (see RFC-959, chapter 7, appendix 2).
  687. self.assertEqual(ftplib.parse257('257 "/foo/b""ar"'), '/foo/b"ar')
  688. self.assertEqual(ftplib.parse257('257 "/foo/b""ar" created'), '/foo/b"ar')
  689. def test_line_too_long(self):
  690. self.assertRaises(ftplib.Error, self.client.sendcmd,
  691. 'x' * self.client.maxline * 2)
  692. def test_retrlines_too_long(self):
  693. self.client.sendcmd('SETLONGRETR %d' % (self.client.maxline * 2))
  694. received = []
  695. self.assertRaises(ftplib.Error,
  696. self.client.retrlines, 'retr', received.append)
  697. def test_storlines_too_long(self):
  698. f = io.BytesIO(b'x' * self.client.maxline * 2)
  699. self.assertRaises(ftplib.Error, self.client.storlines, 'stor', f)
  700. def test_encoding_param(self):
  701. encodings = ['latin-1', 'utf-8']
  702. for encoding in encodings:
  703. with self.subTest(encoding=encoding):
  704. self.tearDown()
  705. self.setUp(encoding=encoding)
  706. self.assertEqual(encoding, self.client.encoding)
  707. self.test_retrbinary()
  708. self.test_storbinary()
  709. self.test_retrlines()
  710. new_dir = self.client.mkd('/non-ascii dir \xAE')
  711. self.check_data(new_dir, '/non-ascii dir \xAE')
  712. # Check default encoding
  713. client = ftplib.FTP(timeout=TIMEOUT)
  714. self.assertEqual(DEFAULT_ENCODING, client.encoding)
  715. @skipUnless(socket_helper.IPV6_ENABLED, "IPv6 not enabled")
  716. class TestIPv6Environment(TestCase):
  717. def setUp(self):
  718. self.server = DummyFTPServer((HOSTv6, 0),
  719. af=socket.AF_INET6,
  720. encoding=DEFAULT_ENCODING)
  721. self.server.start()
  722. self.client = ftplib.FTP(timeout=TIMEOUT, encoding=DEFAULT_ENCODING)
  723. self.client.connect(self.server.host, self.server.port)
  724. def tearDown(self):
  725. self.client.close()
  726. self.server.stop()
  727. # Explicitly clear the attribute to prevent dangling thread
  728. self.server = None
  729. asyncore.close_all(ignore_all=True)
  730. def test_af(self):
  731. self.assertEqual(self.client.af, socket.AF_INET6)
  732. def test_makeport(self):
  733. with self.client.makeport():
  734. self.assertEqual(self.server.handler_instance.last_received_cmd,
  735. 'eprt')
  736. def test_makepasv(self):
  737. host, port = self.client.makepasv()
  738. conn = socket.create_connection((host, port), timeout=TIMEOUT)
  739. conn.close()
  740. self.assertEqual(self.server.handler_instance.last_received_cmd, 'epsv')
  741. def test_transfer(self):
  742. def retr():
  743. def callback(data):
  744. received.append(data.decode(self.client.encoding))
  745. received = []
  746. self.client.retrbinary('retr', callback)
  747. self.assertEqual(len(''.join(received)), len(RETR_DATA))
  748. self.assertEqual(''.join(received), RETR_DATA)
  749. self.client.set_pasv(True)
  750. retr()
  751. self.client.set_pasv(False)
  752. retr()
  753. @skipUnless(ssl, "SSL not available")
  754. class TestTLS_FTPClassMixin(TestFTPClass):
  755. """Repeat TestFTPClass tests starting the TLS layer for both control
  756. and data connections first.
  757. """
  758. def setUp(self, encoding=DEFAULT_ENCODING):
  759. self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
  760. self.server.start()
  761. self.client = ftplib.FTP_TLS(timeout=TIMEOUT, encoding=encoding)
  762. self.client.connect(self.server.host, self.server.port)
  763. # enable TLS
  764. self.client.auth()
  765. self.client.prot_p()
  766. @skipUnless(ssl, "SSL not available")
  767. class TestTLS_FTPClass(TestCase):
  768. """Specific TLS_FTP class tests."""
  769. def setUp(self, encoding=DEFAULT_ENCODING):
  770. self.server = DummyTLS_FTPServer((HOST, 0), encoding=encoding)
  771. self.server.start()
  772. self.client = ftplib.FTP_TLS(timeout=TIMEOUT)
  773. self.client.connect(self.server.host, self.server.port)
  774. def tearDown(self):
  775. self.client.close()
  776. self.server.stop()
  777. # Explicitly clear the attribute to prevent dangling thread
  778. self.server = None
  779. asyncore.close_all(ignore_all=True)
  780. def test_control_connection(self):
  781. self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
  782. self.client.auth()
  783. self.assertIsInstance(self.client.sock, ssl.SSLSocket)
  784. def test_data_connection(self):
  785. # clear text
  786. with self.client.transfercmd('list') as sock:
  787. self.assertNotIsInstance(sock, ssl.SSLSocket)
  788. self.assertEqual(sock.recv(1024),
  789. LIST_DATA.encode(self.client.encoding))
  790. self.assertEqual(self.client.voidresp(), "226 transfer complete")
  791. # secured, after PROT P
  792. self.client.prot_p()
  793. with self.client.transfercmd('list') as sock:
  794. self.assertIsInstance(sock, ssl.SSLSocket)
  795. # consume from SSL socket to finalize handshake and avoid
  796. # "SSLError [SSL] shutdown while in init"
  797. self.assertEqual(sock.recv(1024),
  798. LIST_DATA.encode(self.client.encoding))
  799. self.assertEqual(self.client.voidresp(), "226 transfer complete")
  800. # PROT C is issued, the connection must be in cleartext again
  801. self.client.prot_c()
  802. with self.client.transfercmd('list') as sock:
  803. self.assertNotIsInstance(sock, ssl.SSLSocket)
  804. self.assertEqual(sock.recv(1024),
  805. LIST_DATA.encode(self.client.encoding))
  806. self.assertEqual(self.client.voidresp(), "226 transfer complete")
  807. def test_login(self):
  808. # login() is supposed to implicitly secure the control connection
  809. self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
  810. self.client.login()
  811. self.assertIsInstance(self.client.sock, ssl.SSLSocket)
  812. # make sure that AUTH TLS doesn't get issued again
  813. self.client.login()
  814. def test_auth_issued_twice(self):
  815. self.client.auth()
  816. self.assertRaises(ValueError, self.client.auth)
  817. def test_context(self):
  818. self.client.quit()
  819. ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  820. ctx.check_hostname = False
  821. ctx.verify_mode = ssl.CERT_NONE
  822. self.assertRaises(ValueError, ftplib.FTP_TLS, keyfile=CERTFILE,
  823. context=ctx)
  824. self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
  825. context=ctx)
  826. self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
  827. keyfile=CERTFILE, context=ctx)
  828. self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
  829. self.client.connect(self.server.host, self.server.port)
  830. self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
  831. self.client.auth()
  832. self.assertIs(self.client.sock.context, ctx)
  833. self.assertIsInstance(self.client.sock, ssl.SSLSocket)
  834. self.client.prot_p()
  835. with self.client.transfercmd('list') as sock:
  836. self.assertIs(sock.context, ctx)
  837. self.assertIsInstance(sock, ssl.SSLSocket)
  838. def test_ccc(self):
  839. self.assertRaises(ValueError, self.client.ccc)
  840. self.client.login(secure=True)
  841. self.assertIsInstance(self.client.sock, ssl.SSLSocket)
  842. self.client.ccc()
  843. self.assertRaises(ValueError, self.client.sock.unwrap)
  844. @skipUnless(False, "FIXME: bpo-32706")
  845. def test_check_hostname(self):
  846. self.client.quit()
  847. ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  848. self.assertEqual(ctx.verify_mode, ssl.CERT_REQUIRED)
  849. self.assertEqual(ctx.check_hostname, True)
  850. ctx.load_verify_locations(CAFILE)
  851. self.client = ftplib.FTP_TLS(context=ctx, timeout=TIMEOUT)
  852. # 127.0.0.1 doesn't match SAN
  853. self.client.connect(self.server.host, self.server.port)
  854. with self.assertRaises(ssl.CertificateError):
  855. self.client.auth()
  856. # exception quits connection
  857. self.client.connect(self.server.host, self.server.port)
  858. self.client.prot_p()
  859. with self.assertRaises(ssl.CertificateError):
  860. with self.client.transfercmd("list") as sock:
  861. pass
  862. self.client.quit()
  863. self.client.connect("localhost", self.server.port)
  864. self.client.auth()
  865. self.client.quit()
  866. self.client.connect("localhost", self.server.port)
  867. self.client.prot_p()
  868. with self.client.transfercmd("list") as sock:
  869. pass
  870. class TestTimeouts(TestCase):
  871. def setUp(self):
  872. self.evt = threading.Event()
  873. self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  874. self.sock.settimeout(20)
  875. self.port = socket_helper.bind_port(self.sock)
  876. self.server_thread = threading.Thread(target=self.server)
  877. self.server_thread.daemon = True
  878. self.server_thread.start()
  879. # Wait for the server to be ready.
  880. self.evt.wait()
  881. self.evt.clear()
  882. self.old_port = ftplib.FTP.port
  883. ftplib.FTP.port = self.port
  884. def tearDown(self):
  885. ftplib.FTP.port = self.old_port
  886. self.server_thread.join()
  887. # Explicitly clear the attribute to prevent dangling thread
  888. self.server_thread = None
  889. def server(self):
  890. # This method sets the evt 3 times:
  891. # 1) when the connection is ready to be accepted.
  892. # 2) when it is safe for the caller to close the connection
  893. # 3) when we have closed the socket
  894. self.sock.listen()
  895. # (1) Signal the caller that we are ready to accept the connection.
  896. self.evt.set()
  897. try:
  898. conn, addr = self.sock.accept()
  899. except TimeoutError:
  900. pass
  901. else:
  902. conn.sendall(b"1 Hola mundo\n")
  903. conn.shutdown(socket.SHUT_WR)
  904. # (2) Signal the caller that it is safe to close the socket.
  905. self.evt.set()
  906. conn.close()
  907. finally:
  908. self.sock.close()
  909. def testTimeoutDefault(self):
  910. # default -- use global socket timeout
  911. self.assertIsNone(socket.getdefaulttimeout())
  912. socket.setdefaulttimeout(30)
  913. try:
  914. ftp = ftplib.FTP(HOST)
  915. finally:
  916. socket.setdefaulttimeout(None)
  917. self.assertEqual(ftp.sock.gettimeout(), 30)
  918. self.evt.wait()
  919. ftp.close()
  920. def testTimeoutNone(self):
  921. # no timeout -- do not use global socket timeout
  922. self.assertIsNone(socket.getdefaulttimeout())
  923. socket.setdefaulttimeout(30)
  924. try:
  925. ftp = ftplib.FTP(HOST, timeout=None)
  926. finally:
  927. socket.setdefaulttimeout(None)
  928. self.assertIsNone(ftp.sock.gettimeout())
  929. self.evt.wait()
  930. ftp.close()
  931. def testTimeoutValue(self):
  932. # a value
  933. ftp = ftplib.FTP(HOST, timeout=30)
  934. self.assertEqual(ftp.sock.gettimeout(), 30)
  935. self.evt.wait()
  936. ftp.close()
  937. # bpo-39259
  938. with self.assertRaises(ValueError):
  939. ftplib.FTP(HOST, timeout=0)
  940. def testTimeoutConnect(self):
  941. ftp = ftplib.FTP()
  942. ftp.connect(HOST, timeout=30)
  943. self.assertEqual(ftp.sock.gettimeout(), 30)
  944. self.evt.wait()
  945. ftp.close()
  946. def testTimeoutDifferentOrder(self):
  947. ftp = ftplib.FTP(timeout=30)
  948. ftp.connect(HOST)
  949. self.assertEqual(ftp.sock.gettimeout(), 30)
  950. self.evt.wait()
  951. ftp.close()
  952. def testTimeoutDirectAccess(self):
  953. ftp = ftplib.FTP()
  954. ftp.timeout = 30
  955. ftp.connect(HOST)
  956. self.assertEqual(ftp.sock.gettimeout(), 30)
  957. self.evt.wait()
  958. ftp.close()
  959. class MiscTestCase(TestCase):
  960. def test__all__(self):
  961. not_exported = {
  962. 'MSG_OOB', 'FTP_PORT', 'MAXLINE', 'CRLF', 'B_CRLF', 'Error',
  963. 'parse150', 'parse227', 'parse229', 'parse257', 'print_line',
  964. 'ftpcp', 'test'}
  965. support.check__all__(self, ftplib, not_exported=not_exported)
  966. def setUpModule():
  967. thread_info = threading_helper.threading_setup()
  968. unittest.addModuleCleanup(threading_helper.threading_cleanup, *thread_info)
  969. if __name__ == '__main__':
  970. unittest.main()