test_ftplib.py 34.4 KB
Newer Older
1 2
"""Test script for ftplib module."""

3 4
# Modified by Giampaolo Rodola' to test FTP class, IPv6 and TLS
# environment
5

6
import ftplib
7 8 9 10
import asyncore
import asynchat
import socket
import io
11 12
import errno
import os
13
import time
14 15 16 17
try:
    import ssl
except ImportError:
    ssl = None
18 19

from unittest import TestCase
20
from test import support
21
from test.support import HOST
22
threading = support.import_module('threading')
23

24
# the dummy data returned by server over the data channel when
25
# RETR, LIST, NLST, MLSD commands are issued
26 27 28
RETR_DATA = 'abcde12345\r\n' * 1000
LIST_DATA = 'foo\r\nbar\r\n'
NLST_DATA = 'foo\r\nbar\r\n'
29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
MLSD_DATA = ("type=cdir;perm=el;unique==keVO1+ZF4; test\r\n"
             "type=pdir;perm=e;unique==keVO1+d?3; ..\r\n"
             "type=OS.unix=slink:/foobar;perm=;unique==keVO1+4G4; foobar\r\n"
             "type=OS.unix=chr-13/29;perm=;unique==keVO1+5G4; device\r\n"
             "type=OS.unix=blk-11/108;perm=;unique==keVO1+6G4; block\r\n"
             "type=file;perm=awr;unique==keVO1+8G4; writable\r\n"
             "type=dir;perm=cpmel;unique==keVO1+7G4; promiscuous\r\n"
             "type=dir;perm=;unique==keVO1+1t2; no-exec\r\n"
             "type=file;perm=r;unique==keVO1+EG4; two words\r\n"
             "type=file;perm=r;unique==keVO1+IH4;  leading space\r\n"
             "type=file;perm=r;unique==keVO1+1G4; file1\r\n"
             "type=dir;perm=cpmel;unique==keVO1+7G4; incoming\r\n"
             "type=file;perm=r;unique==keVO1+1G4; file2\r\n"
             "type=file;perm=r;unique==keVO1+1G4; file3\r\n"
             "type=file;perm=r;unique==keVO1+1G4; file4\r\n")
Christian Heimes's avatar
Christian Heimes committed
44 45


46
class DummyDTPHandler(asynchat.async_chat):
47
    dtp_conn_closed = False
48 49 50 51 52 53 54

    def __init__(self, conn, baseclass):
        asynchat.async_chat.__init__(self, conn)
        self.baseclass = baseclass
        self.baseclass.last_received_data = ''

    def handle_read(self):
55
        self.baseclass.last_received_data += self.recv(1024).decode('ascii')
56 57

    def handle_close(self):
58 59 60 61 62 63 64
        # XXX: this method can be called many times in a row for a single
        # connection, including in clear-text (non-TLS) mode.
        # (behaviour witnessed with test_data_connection)
        if not self.dtp_conn_closed:
            self.baseclass.push('226 transfer complete')
            self.close()
            self.dtp_conn_closed = True
65 66

    def push(self, what):
67 68 69 70 71
        if self.baseclass.next_data is not None:
            what = self.baseclass.next_data
            self.baseclass.next_data = None
        if not what:
            return self.close_when_done()
72
        super(DummyDTPHandler, self).push(what.encode('ascii'))
73

74 75 76
    def handle_error(self):
        raise

77 78 79

class DummyFTPHandler(asynchat.async_chat):

80 81
    dtp_handler = DummyDTPHandler

82 83
    def __init__(self, conn):
        asynchat.async_chat.__init__(self, conn)
84 85
        # tells the socket to handle urgent data inline (ABOR command)
        self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_OOBINLINE, 1)
86 87 88 89 90 91
        self.set_terminator(b"\r\n")
        self.in_buffer = []
        self.dtp = None
        self.last_received_cmd = None
        self.last_received_data = ''
        self.next_response = ''
92
        self.next_data = None
93
        self.rest = None
94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127
        self.push('220 welcome')

    def collect_incoming_data(self, data):
        self.in_buffer.append(data)

    def found_terminator(self):
        line = b''.join(self.in_buffer).decode('ascii')
        self.in_buffer = []
        if self.next_response:
            self.push(self.next_response)
            self.next_response = ''
        cmd = line.split(' ')[0].lower()
        self.last_received_cmd = cmd
        space = line.find(' ')
        if space != -1:
            arg = line[space + 1:]
        else:
            arg = ""
        if hasattr(self, 'cmd_' + cmd):
            method = getattr(self, 'cmd_' + cmd)
            method(arg)
        else:
            self.push('550 command "%s" not understood.' %cmd)

    def handle_error(self):
        raise

    def push(self, data):
        asynchat.async_chat.push(self, data.encode('ascii') + b'\r\n')

    def cmd_port(self, arg):
        addr = list(map(int, arg.split(',')))
        ip = '%d.%d.%d.%d' %tuple(addr[:4])
        port = (addr[4] * 256) + addr[5]
128
        s = socket.create_connection((ip, port), timeout=2)
129
        self.dtp = self.dtp_handler(s, baseclass=self)
130 131 132
        self.push('200 active data connection established')

    def cmd_pasv(self, arg):
133 134 135 136 137 138 139 140 141
        with socket.socket() as sock:
            sock.bind((self.socket.getsockname()[0], 0))
            sock.listen(5)
            sock.settimeout(10)
            ip, port = sock.getsockname()[:2]
            ip = ip.replace('.', ','); p1 = port / 256; p2 = port % 256
            self.push('227 entering passive mode (%s,%d,%d)' %(ip, p1, p2))
            conn, addr = sock.accept()
            self.dtp = self.dtp_handler(conn, baseclass=self)
142 143 144 145

    def cmd_eprt(self, arg):
        af, ip, port = arg.split(arg[0])[1:-1]
        port = int(port)
146
        s = socket.create_connection((ip, port), timeout=2)
147
        self.dtp = self.dtp_handler(s, baseclass=self)
148 149 150
        self.push('200 active data connection established')

    def cmd_epsv(self, arg):
151 152 153 154 155 156 157 158
        with socket.socket(socket.AF_INET6) as sock:
            sock.bind((self.socket.getsockname()[0], 0))
            sock.listen(5)
            sock.settimeout(10)
            port = sock.getsockname()[1]
            self.push('229 entering extended passive mode (|||%d|)' %port)
            conn, addr = sock.accept()
            self.dtp = self.dtp_handler(conn, baseclass=self)
159 160 161 162 163

    def cmd_echo(self, arg):
        # sends back the received string (used by the test suite)
        self.push(arg)

164 165 166
    def cmd_noop(self, arg):
        self.push('200 noop ok')

167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200
    def cmd_user(self, arg):
        self.push('331 username ok')

    def cmd_pass(self, arg):
        self.push('230 password ok')

    def cmd_acct(self, arg):
        self.push('230 acct ok')

    def cmd_rnfr(self, arg):
        self.push('350 rnfr ok')

    def cmd_rnto(self, arg):
        self.push('250 rnto ok')

    def cmd_dele(self, arg):
        self.push('250 dele ok')

    def cmd_cwd(self, arg):
        self.push('250 cwd ok')

    def cmd_size(self, arg):
        self.push('250 1000')

    def cmd_mkd(self, arg):
        self.push('257 "%s"' %arg)

    def cmd_rmd(self, arg):
        self.push('250 rmd ok')

    def cmd_pwd(self, arg):
        self.push('257 "pwd ok"')

    def cmd_type(self, arg):
201
        self.push('200 type ok')
202 203 204 205 206

    def cmd_quit(self, arg):
        self.push('221 quit ok')
        self.close()

207 208 209
    def cmd_abor(self, arg):
        self.push('226 abor ok')

210 211 212
    def cmd_stor(self, arg):
        self.push('125 stor ok')

213 214 215 216
    def cmd_rest(self, arg):
        self.rest = arg
        self.push('350 rest ok')

217 218
    def cmd_retr(self, arg):
        self.push('125 retr ok')
219 220 221 222
        if self.rest is not None:
            offset = int(self.rest)
        else:
            offset = 0
223
        self.dtp.push(RETR_DATA[offset:])
224
        self.dtp.close_when_done()
225
        self.rest = None
226 227 228 229 230 231 232 233 234 235 236

    def cmd_list(self, arg):
        self.push('125 list ok')
        self.dtp.push(LIST_DATA)
        self.dtp.close_when_done()

    def cmd_nlst(self, arg):
        self.push('125 nlst ok')
        self.dtp.push(NLST_DATA)
        self.dtp.close_when_done()

237 238 239 240 241 242 243 244
    def cmd_opts(self, arg):
        self.push('200 opts ok')

    def cmd_mlsd(self, arg):
        self.push('125 mlsd ok')
        self.dtp.push(MLSD_DATA)
        self.dtp.close_when_done()

245 246 247 248 249 250 251 252 253 254 255 256 257 258

class DummyFTPServer(asyncore.dispatcher, threading.Thread):

    handler = DummyFTPHandler

    def __init__(self, address, af=socket.AF_INET):
        threading.Thread.__init__(self)
        asyncore.dispatcher.__init__(self)
        self.create_socket(af, socket.SOCK_STREAM)
        self.bind(address)
        self.listen(5)
        self.active = False
        self.active_lock = threading.Lock()
        self.host, self.port = self.socket.getsockname()[:2]
259
        self.handler_instance = None
260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280

    def start(self):
        assert not self.active
        self.__flag = threading.Event()
        threading.Thread.start(self)
        self.__flag.wait()

    def run(self):
        self.active = True
        self.__flag.set()
        while self.active and asyncore.socket_map:
            self.active_lock.acquire()
            asyncore.loop(timeout=0.1, count=1)
            self.active_lock.release()
        asyncore.close_all(ignore_all=True)

    def stop(self):
        assert self.active
        self.active = False
        self.join()

281
    def handle_accepted(self, conn, addr):
282
        self.handler_instance = self.handler(conn)
283 284 285 286

    def handle_connect(self):
        self.close()
    handle_read = handle_connect
287 288 289 290 291 292 293 294

    def writable(self):
        return 0

    def handle_error(self):
        raise


295 296 297 298 299 300 301 302
if ssl is not None:

    CERTFILE = os.path.join(os.path.dirname(__file__), "keycert.pem")

    class SSLConnection(asyncore.dispatcher):
        """An asyncore.dispatcher subclass supporting TLS/SSL."""

        _ssl_accepting = False
303
        _ssl_closing = False
304 305 306 307 308 309

        def secure_connection(self):
            socket = ssl.wrap_socket(self.socket, suppress_ragged_eofs=False,
                                     certfile=CERTFILE, server_side=True,
                                     do_handshake_on_connect=False,
                                     ssl_version=ssl.PROTOCOL_SSLv23)
310
            self.del_channel()
311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329
            self.set_socket(socket)
            self._ssl_accepting = True

        def _do_ssl_handshake(self):
            try:
                self.socket.do_handshake()
            except ssl.SSLError as err:
                if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
                                   ssl.SSL_ERROR_WANT_WRITE):
                    return
                elif err.args[0] == ssl.SSL_ERROR_EOF:
                    return self.handle_close()
                raise
            except socket.error as err:
                if err.args[0] == errno.ECONNABORTED:
                    return self.handle_close()
            else:
                self._ssl_accepting = False

330 331 332 333 334 335 336 337 338 339 340 341 342 343 344
        def _do_ssl_shutdown(self):
            self._ssl_closing = True
            try:
                self.socket = self.socket.unwrap()
            except ssl.SSLError as err:
                if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
                                   ssl.SSL_ERROR_WANT_WRITE):
                    return
            except socket.error as err:
                # Any "socket error" corresponds to a SSL_ERROR_SYSCALL return
                # from OpenSSL's SSL_shutdown(), corresponding to a
                # closed socket condition. See also:
                # http://www.mail-archive.com/openssl-users@openssl.org/msg60710.html
                pass
            self._ssl_closing = False
345
            if getattr(self, '_ccc', False) is False:
346 347 348
                super(SSLConnection, self).close()
            else:
                pass
349

350 351 352
        def handle_read_event(self):
            if self._ssl_accepting:
                self._do_ssl_handshake()
353 354
            elif self._ssl_closing:
                self._do_ssl_shutdown()
355 356 357 358 359 360
            else:
                super(SSLConnection, self).handle_read_event()

        def handle_write_event(self):
            if self._ssl_accepting:
                self._do_ssl_handshake()
361 362
            elif self._ssl_closing:
                self._do_ssl_shutdown()
363 364 365 366 367 368 369
            else:
                super(SSLConnection, self).handle_write_event()

        def send(self, data):
            try:
                return super(SSLConnection, self).send(data)
            except ssl.SSLError as err:
370 371 372
                if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN,
                                   ssl.SSL_ERROR_WANT_READ,
                                   ssl.SSL_ERROR_WANT_WRITE):
373 374 375 376 377 378 379
                    return 0
                raise

        def recv(self, buffer_size):
            try:
                return super(SSLConnection, self).recv(buffer_size)
            except ssl.SSLError as err:
380 381
                if err.args[0] in (ssl.SSL_ERROR_WANT_READ,
                                   ssl.SSL_ERROR_WANT_WRITE):
382
                    return b''
383 384 385 386 387 388 389 390 391
                if err.args[0] in (ssl.SSL_ERROR_EOF, ssl.SSL_ERROR_ZERO_RETURN):
                    self.handle_close()
                    return b''
                raise

        def handle_error(self):
            raise

        def close(self):
392 393 394
            if (isinstance(self.socket, ssl.SSLSocket) and
                self.socket._sslobj is not None):
                self._do_ssl_shutdown()
395 396
            else:
                super(SSLConnection, self).close()
397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415


    class DummyTLS_DTPHandler(SSLConnection, DummyDTPHandler):
        """A DummyDTPHandler subclass supporting TLS/SSL."""

        def __init__(self, conn, baseclass):
            DummyDTPHandler.__init__(self, conn, baseclass)
            if self.baseclass.secure_data_channel:
                self.secure_connection()


    class DummyTLS_FTPHandler(SSLConnection, DummyFTPHandler):
        """A DummyFTPHandler subclass supporting TLS/SSL."""

        dtp_handler = DummyTLS_DTPHandler

        def __init__(self, conn):
            DummyFTPHandler.__init__(self, conn)
            self.secure_data_channel = False
416
            self._ccc = False
417 418 419 420 421 422

        def cmd_auth(self, line):
            """Set up secure control channel."""
            self.push('234 AUTH TLS successful')
            self.secure_connection()

423 424 425 426 427
        def cmd_ccc(self, line):
            self.push('220 Reverting back to clear-text')
            self._ccc = True
            self._do_ssl_shutdown()

428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451
        def cmd_pbsz(self, line):
            """Negotiate size of buffer for secure data transfer.
            For TLS/SSL the only valid value for the parameter is '0'.
            Any other value is accepted but ignored.
            """
            self.push('200 PBSZ=0 successful.')

        def cmd_prot(self, line):
            """Setup un/secure data channel."""
            arg = line.upper()
            if arg == 'C':
                self.push('200 Protection set to Clear')
                self.secure_data_channel = False
            elif arg == 'P':
                self.push('200 Protection set to Private')
                self.secure_data_channel = True
            else:
                self.push("502 Unrecognized PROT type (use C or P).")


    class DummyTLS_FTPServer(DummyFTPServer):
        handler = DummyTLS_FTPHandler


452 453 454 455 456
class TestFTPClass(TestCase):

    def setUp(self):
        self.server = DummyFTPServer((HOST, 0))
        self.server.start()
457
        self.client = ftplib.FTP(timeout=2)
458 459 460 461 462 463
        self.client.connect(self.server.host, self.server.port)

    def tearDown(self):
        self.client.close()
        self.server.stop()

464 465 466 467
    def check_data(self, received, expected):
        self.assertEqual(len(received), len(expected))
        self.assertEqual(received, expected)

468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513
    def test_getwelcome(self):
        self.assertEqual(self.client.getwelcome(), '220 welcome')

    def test_sanitize(self):
        self.assertEqual(self.client.sanitize('foo'), repr('foo'))
        self.assertEqual(self.client.sanitize('pass 12345'), repr('pass *****'))
        self.assertEqual(self.client.sanitize('PASS 12345'), repr('PASS *****'))

    def test_exceptions(self):
        self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 400')
        self.assertRaises(ftplib.error_temp, self.client.sendcmd, 'echo 499')
        self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 500')
        self.assertRaises(ftplib.error_perm, self.client.sendcmd, 'echo 599')
        self.assertRaises(ftplib.error_proto, self.client.sendcmd, 'echo 999')

    def test_all_errors(self):
        exceptions = (ftplib.error_reply, ftplib.error_temp, ftplib.error_perm,
                      ftplib.error_proto, ftplib.Error, IOError, EOFError)
        for x in exceptions:
            try:
                raise x('exception not included in all_errors set')
            except ftplib.all_errors:
                pass

    def test_set_pasv(self):
        # passive mode is supposed to be enabled by default
        self.assertTrue(self.client.passiveserver)
        self.client.set_pasv(True)
        self.assertTrue(self.client.passiveserver)
        self.client.set_pasv(False)
        self.assertFalse(self.client.passiveserver)

    def test_voidcmd(self):
        self.client.voidcmd('echo 200')
        self.client.voidcmd('echo 299')
        self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 199')
        self.assertRaises(ftplib.error_reply, self.client.voidcmd, 'echo 300')

    def test_login(self):
        self.client.login()

    def test_acct(self):
        self.client.acct('passwd')

    def test_rename(self):
        self.client.rename('a', 'b')
514
        self.server.handler_instance.next_response = '200'
515 516 517 518
        self.assertRaises(ftplib.error_reply, self.client.rename, 'a', 'b')

    def test_delete(self):
        self.client.delete('foo')
519
        self.server.handler_instance.next_response = '199'
520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540
        self.assertRaises(ftplib.error_reply, self.client.delete, 'foo')

    def test_size(self):
        self.client.size('foo')

    def test_mkd(self):
        dir = self.client.mkd('/foo')
        self.assertEqual(dir, '/foo')

    def test_rmd(self):
        self.client.rmd('foo')

    def test_pwd(self):
        dir = self.client.pwd()
        self.assertEqual(dir, 'pwd ok')

    def test_quit(self):
        self.assertEqual(self.client.quit(), '221 quit ok')
        # Ensure the connection gets closed; sock attribute should be None
        self.assertEqual(self.client.sock, None)

541 542 543
    def test_abort(self):
        self.client.abort()

544 545 546 547 548
    def test_retrbinary(self):
        def callback(data):
            received.append(data.decode('ascii'))
        received = []
        self.client.retrbinary('retr', callback)
549
        self.check_data(''.join(received), RETR_DATA)
550

551 552 553 554 555 556
    def test_retrbinary_rest(self):
        def callback(data):
            received.append(data.decode('ascii'))
        for rest in (0, 10, 20):
            received = []
            self.client.retrbinary('retr', callback, rest=rest)
557
            self.check_data(''.join(received), RETR_DATA[rest:])
558

559 560 561
    def test_retrlines(self):
        received = []
        self.client.retrlines('retr', received.append)
562
        self.check_data(''.join(received), RETR_DATA.replace('\r\n', ''))
563 564 565 566

    def test_storbinary(self):
        f = io.BytesIO(RETR_DATA.encode('ascii'))
        self.client.storbinary('stor', f)
567
        self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
568 569 570 571 572 573
        # test new callback arg
        flag = []
        f.seek(0)
        self.client.storbinary('stor', f, callback=lambda x: flag.append(None))
        self.assertTrue(flag)

574 575 576 577 578
    def test_storbinary_rest(self):
        f = io.BytesIO(RETR_DATA.replace('\r\n', '\n').encode('ascii'))
        for r in (30, '30'):
            f.seek(0)
            self.client.storbinary('stor', f, rest=r)
579
            self.assertEqual(self.server.handler_instance.rest, str(r))
580

581
    def test_storlines(self):
582 583
        f = io.BytesIO(RETR_DATA.replace('\r\n', '\n').encode('ascii'))
        self.client.storlines('stor', f)
584
        self.check_data(self.server.handler_instance.last_received_data, RETR_DATA)
585 586 587 588 589 590 591 592 593 594 595 596 597 598 599
        # test new callback arg
        flag = []
        f.seek(0)
        self.client.storlines('stor foo', f, callback=lambda x: flag.append(None))
        self.assertTrue(flag)

    def test_nlst(self):
        self.client.nlst()
        self.assertEqual(self.client.nlst(), NLST_DATA.split('\r\n')[:-1])

    def test_dir(self):
        l = []
        self.client.dir(lambda x: l.append(x))
        self.assertEqual(''.join(l), LIST_DATA.replace('\r\n', ''))

600 601 602 603 604 605 606
    def test_mlsd(self):
        list(self.client.mlsd())
        list(self.client.mlsd(path='/'))
        list(self.client.mlsd(path='/', facts=['size', 'type']))

        ls = list(self.client.mlsd())
        for name, facts in ls:
607 608
            self.assertIsInstance(name, str)
            self.assertIsInstance(facts, dict)
609
            self.assertTrue(name)
610 611 612
            self.assertIn('type', facts)
            self.assertIn('perm', facts)
            self.assertIn('unique', facts)
613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648

        def set_data(data):
            self.server.handler_instance.next_data = data

        def test_entry(line, type=None, perm=None, unique=None, name=None):
            type = 'type' if type is None else type
            perm = 'perm' if perm is None else perm
            unique = 'unique' if unique is None else unique
            name = 'name' if name is None else name
            set_data(line)
            _name, facts = next(self.client.mlsd())
            self.assertEqual(_name, name)
            self.assertEqual(facts['type'], type)
            self.assertEqual(facts['perm'], perm)
            self.assertEqual(facts['unique'], unique)

        # plain
        test_entry('type=type;perm=perm;unique=unique; name\r\n')
        # "=" in fact value
        test_entry('type=ty=pe;perm=perm;unique=unique; name\r\n', type="ty=pe")
        test_entry('type==type;perm=perm;unique=unique; name\r\n', type="=type")
        test_entry('type=t=y=pe;perm=perm;unique=unique; name\r\n', type="t=y=pe")
        test_entry('type=====;perm=perm;unique=unique; name\r\n', type="====")
        # spaces in name
        test_entry('type=type;perm=perm;unique=unique; na me\r\n', name="na me")
        test_entry('type=type;perm=perm;unique=unique; name \r\n', name="name ")
        test_entry('type=type;perm=perm;unique=unique;  name\r\n', name=" name")
        test_entry('type=type;perm=perm;unique=unique; n am  e\r\n', name="n am  e")
        # ";" in name
        test_entry('type=type;perm=perm;unique=unique; na;me\r\n', name="na;me")
        test_entry('type=type;perm=perm;unique=unique; ;name\r\n', name=";name")
        test_entry('type=type;perm=perm;unique=unique; ;name;\r\n', name=";name;")
        test_entry('type=type;perm=perm;unique=unique; ;;;;\r\n', name=";;;;")
        # case sensitiveness
        set_data('Type=type;TyPe=perm;UNIQUE=unique; name\r\n')
        _name, facts = next(self.client.mlsd())
649 650
        for x in facts:
            self.assertTrue(x.islower())
651 652 653 654 655 656 657
        # no data (directory empty)
        set_data('')
        self.assertRaises(StopIteration, next, self.client.mlsd())
        set_data('')
        for x in self.client.mlsd():
            self.fail("unexpected data %s" % data)

658
    def test_makeport(self):
659 660 661 662
        with self.client.makeport():
            # IPv4 is in use, just make sure send_eprt has not been used
            self.assertEqual(self.server.handler_instance.last_received_cmd,
                                'port')
663 664 665

    def test_makepasv(self):
        host, port = self.client.makepasv()
666
        conn = socket.create_connection((host, port), 10)
667
        conn.close()
668
        # IPv4 is in use, just make sure send_epsv has not been used
669 670 671 672 673 674 675 676 677 678 679 680 681 682 683
        self.assertEqual(self.server.handler_instance.last_received_cmd, 'pasv')

    def test_with_statement(self):
        self.client.quit()

        def is_client_connected():
            if self.client.sock is None:
                return False
            try:
                self.client.sendcmd('noop')
            except (socket.error, EOFError):
                return False
            return True

        # base test
684
        with ftplib.FTP(timeout=2) as self.client:
685 686 687 688 689 690 691
            self.client.connect(self.server.host, self.server.port)
            self.client.sendcmd('noop')
            self.assertTrue(is_client_connected())
        self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
        self.assertFalse(is_client_connected())

        # QUIT sent inside the with block
692
        with ftplib.FTP(timeout=2) as self.client:
693 694 695 696 697 698 699 700 701
            self.client.connect(self.server.host, self.server.port)
            self.client.sendcmd('noop')
            self.client.quit()
        self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
        self.assertFalse(is_client_connected())

        # force a wrong response code to be sent on QUIT: error_perm
        # is expected and the connection is supposed to be closed
        try:
702
            with ftplib.FTP(timeout=2) as self.client:
703 704 705 706 707 708 709 710 711 712 713 714
                self.client.connect(self.server.host, self.server.port)
                self.client.sendcmd('noop')
                self.server.handler_instance.next_response = '550 error on quit'
        except ftplib.error_perm as err:
            self.assertEqual(str(err), '550 error on quit')
        else:
            self.fail('Exception not raised')
        # needed to give the threaded server some time to set the attribute
        # which otherwise would still be == 'noop'
        time.sleep(0.1)
        self.assertEqual(self.server.handler_instance.last_received_cmd, 'quit')
        self.assertFalse(is_client_connected())
715

716 717 718
    def test_source_address(self):
        self.client.quit()
        port = support.find_unused_port()
719 720 721 722 723 724 725 726 727
        try:
            self.client.connect(self.server.host, self.server.port,
                                source_address=(HOST, port))
            self.assertEqual(self.client.sock.getsockname()[1], port)
            self.client.quit()
        except IOError as e:
            if e.errno == errno.EADDRINUSE:
                self.skipTest("couldn't bind to port %d" % port)
            raise
728 729 730 731

    def test_source_address_passive_connection(self):
        port = support.find_unused_port()
        self.client.source_address = (HOST, port)
732 733 734 735 736 737 738
        try:
            with self.client.transfercmd('list') as sock:
                self.assertEqual(sock.getsockname()[1], port)
        except IOError as e:
            if e.errno == errno.EADDRINUSE:
                self.skipTest("couldn't bind to port %d" % port)
            raise
739

740 741 742 743 744 745 746 747 748 749 750 751
    def test_parse257(self):
        self.assertEqual(ftplib.parse257('257 "/foo/bar"'), '/foo/bar')
        self.assertEqual(ftplib.parse257('257 "/foo/bar" created'), '/foo/bar')
        self.assertEqual(ftplib.parse257('257 ""'), '')
        self.assertEqual(ftplib.parse257('257 "" created'), '')
        self.assertRaises(ftplib.error_reply, ftplib.parse257, '250 "/foo/bar"')
        # The 257 response is supposed to include the directory
        # name and in case it contains embedded double-quotes
        # they must be doubled (see RFC-959, chapter 7, appendix 2).
        self.assertEqual(ftplib.parse257('257 "/foo/b""ar"'), '/foo/b"ar')
        self.assertEqual(ftplib.parse257('257 "/foo/b""ar" created'), '/foo/b"ar')

752 753 754 755

class TestIPv6Environment(TestCase):

    def setUp(self):
756
        self.server = DummyFTPServer(('::1', 0), af=socket.AF_INET6)
757 758 759 760 761 762 763 764 765 766 767 768
        self.server.start()
        self.client = ftplib.FTP()
        self.client.connect(self.server.host, self.server.port)

    def tearDown(self):
        self.client.close()
        self.server.stop()

    def test_af(self):
        self.assertEqual(self.client.af, socket.AF_INET6)

    def test_makeport(self):
769 770 771
        with self.client.makeport():
            self.assertEqual(self.server.handler_instance.last_received_cmd,
                                'eprt')
772 773 774

    def test_makepasv(self):
        host, port = self.client.makepasv()
775
        conn = socket.create_connection((host, port), 10)
776
        conn.close()
777
        self.assertEqual(self.server.handler_instance.last_received_cmd, 'epsv')
778 779 780 781 782 783 784

    def test_transfer(self):
        def retr():
            def callback(data):
                received.append(data.decode('ascii'))
            received = []
            self.client.retrbinary('retr', callback)
785
            self.assertEqual(len(''.join(received)), len(RETR_DATA))
786 787 788 789 790
            self.assertEqual(''.join(received), RETR_DATA)
        self.client.set_pasv(True)
        retr()
        self.client.set_pasv(False)
        retr()
791

792

793 794 795 796 797 798 799 800
class TestTLS_FTPClassMixin(TestFTPClass):
    """Repeat TestFTPClass tests starting the TLS layer for both control
    and data connections first.
    """

    def setUp(self):
        self.server = DummyTLS_FTPServer((HOST, 0))
        self.server.start()
801
        self.client = ftplib.FTP_TLS(timeout=2)
802 803 804 805 806 807 808 809 810 811 812 813
        self.client.connect(self.server.host, self.server.port)
        # enable TLS
        self.client.auth()
        self.client.prot_p()


class TestTLS_FTPClass(TestCase):
    """Specific TLS_FTP class tests."""

    def setUp(self):
        self.server = DummyTLS_FTPServer((HOST, 0))
        self.server.start()
814
        self.client = ftplib.FTP_TLS(timeout=2)
815 816 817 818 819 820 821
        self.client.connect(self.server.host, self.server.port)

    def tearDown(self):
        self.client.close()
        self.server.stop()

    def test_control_connection(self):
822
        self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
823
        self.client.auth()
824
        self.assertIsInstance(self.client.sock, ssl.SSLSocket)
825 826 827

    def test_data_connection(self):
        # clear text
828 829
        with self.client.transfercmd('list') as sock:
            self.assertNotIsInstance(sock, ssl.SSLSocket)
830
        self.assertEqual(self.client.voidresp(), "226 transfer complete")
831 832 833

        # secured, after PROT P
        self.client.prot_p()
834 835
        with self.client.transfercmd('list') as sock:
            self.assertIsInstance(sock, ssl.SSLSocket)
836
        self.assertEqual(self.client.voidresp(), "226 transfer complete")
837 838 839

        # PROT C is issued, the connection must be in cleartext again
        self.client.prot_c()
840 841
        with self.client.transfercmd('list') as sock:
            self.assertNotIsInstance(sock, ssl.SSLSocket)
842
        self.assertEqual(self.client.voidresp(), "226 transfer complete")
843 844 845

    def test_login(self):
        # login() is supposed to implicitly secure the control connection
846
        self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
847
        self.client.login()
848
        self.assertIsInstance(self.client.sock, ssl.SSLSocket)
849 850 851 852 853 854 855 856 857 858 859 860 861 862 863
        # make sure that AUTH TLS doesn't get issued again
        self.client.login()

    def test_auth_issued_twice(self):
        self.client.auth()
        self.assertRaises(ValueError, self.client.auth)

    def test_auth_ssl(self):
        try:
            self.client.ssl_version = ssl.PROTOCOL_SSLv3
            self.client.auth()
            self.assertRaises(ValueError, self.client.auth)
        finally:
            self.client.ssl_version = ssl.PROTOCOL_TLSv1

864 865 866 867 868 869 870 871 872 873
    def test_context(self):
        self.client.quit()
        ctx = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
        self.assertRaises(ValueError, ftplib.FTP_TLS, keyfile=CERTFILE,
                          context=ctx)
        self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
                          context=ctx)
        self.assertRaises(ValueError, ftplib.FTP_TLS, certfile=CERTFILE,
                          keyfile=CERTFILE, context=ctx)

874
        self.client = ftplib.FTP_TLS(context=ctx, timeout=2)
875 876 877 878 879 880 881
        self.client.connect(self.server.host, self.server.port)
        self.assertNotIsInstance(self.client.sock, ssl.SSLSocket)
        self.client.auth()
        self.assertIs(self.client.sock.context, ctx)
        self.assertIsInstance(self.client.sock, ssl.SSLSocket)

        self.client.prot_p()
882 883 884
        with self.client.transfercmd('list') as sock:
            self.assertIs(sock.context, ctx)
            self.assertIsInstance(sock, ssl.SSLSocket)
885

886 887 888 889 890 891 892
    def test_ccc(self):
        self.assertRaises(ValueError, self.client.ccc)
        self.client.login(secure=True)
        self.assertIsInstance(self.client.sock, ssl.SSLSocket)
        self.client.ccc()
        self.assertRaises(ValueError, self.client.sock.unwrap)

893

894
class TestTimeouts(TestCase):
895 896 897

    def setUp(self):
        self.evt = threading.Event()
Christian Heimes's avatar
Christian Heimes committed
898
        self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
899
        self.sock.settimeout(20)
900
        self.port = support.bind_port(self.sock)
901 902
        self.server_thread = threading.Thread(target=self.server)
        self.server_thread.start()
Christian Heimes's avatar
Christian Heimes committed
903 904 905
        # Wait for the server to be ready.
        self.evt.wait()
        self.evt.clear()
906
        self.old_port = ftplib.FTP.port
Christian Heimes's avatar
Christian Heimes committed
907
        ftplib.FTP.port = self.port
908 909

    def tearDown(self):
910 911
        ftplib.FTP.port = self.old_port
        self.server_thread.join()
912

913
    def server(self):
914 915 916 917
        # This method sets the evt 3 times:
        #  1) when the connection is ready to be accepted.
        #  2) when it is safe for the caller to close the connection
        #  3) when we have closed the socket
918
        self.sock.listen(5)
919
        # (1) Signal the caller that we are ready to accept the connection.
920
        self.evt.set()
921
        try:
922
            conn, addr = self.sock.accept()
923 924 925
        except socket.timeout:
            pass
        else:
926 927
            conn.sendall(b"1 Hola mundo\n")
            conn.shutdown(socket.SHUT_WR)
928
            # (2) Signal the caller that it is safe to close the socket.
929
            self.evt.set()
930 931
            conn.close()
        finally:
932
            self.sock.close()
933 934

    def testTimeoutDefault(self):
Georg Brandl's avatar
Georg Brandl committed
935
        # default -- use global socket timeout
936
        self.assertTrue(socket.getdefaulttimeout() is None)
Georg Brandl's avatar
Georg Brandl committed
937 938 939 940 941 942 943 944 945 946 947
        socket.setdefaulttimeout(30)
        try:
            ftp = ftplib.FTP("localhost")
        finally:
            socket.setdefaulttimeout(None)
        self.assertEqual(ftp.sock.gettimeout(), 30)
        self.evt.wait()
        ftp.close()

    def testTimeoutNone(self):
        # no timeout -- do not use global socket timeout
948
        self.assertTrue(socket.getdefaulttimeout() is None)
Georg Brandl's avatar
Georg Brandl committed
949 950 951 952 953
        socket.setdefaulttimeout(30)
        try:
            ftp = ftplib.FTP("localhost", timeout=None)
        finally:
            socket.setdefaulttimeout(None)
954
        self.assertTrue(ftp.sock.gettimeout() is None)
Christian Heimes's avatar
Christian Heimes committed
955
        self.evt.wait()
Georg Brandl's avatar
Georg Brandl committed
956
        ftp.close()
957 958 959

    def testTimeoutValue(self):
        # a value
Christian Heimes's avatar
Christian Heimes committed
960
        ftp = ftplib.FTP(HOST, timeout=30)
961
        self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes's avatar
Christian Heimes committed
962
        self.evt.wait()
Georg Brandl's avatar
Georg Brandl committed
963
        ftp.close()
964 965 966

    def testTimeoutConnect(self):
        ftp = ftplib.FTP()
Christian Heimes's avatar
Christian Heimes committed
967
        ftp.connect(HOST, timeout=30)
968
        self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes's avatar
Christian Heimes committed
969
        self.evt.wait()
Georg Brandl's avatar
Georg Brandl committed
970
        ftp.close()
971 972 973

    def testTimeoutDifferentOrder(self):
        ftp = ftplib.FTP(timeout=30)
Christian Heimes's avatar
Christian Heimes committed
974
        ftp.connect(HOST)
975
        self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes's avatar
Christian Heimes committed
976
        self.evt.wait()
Georg Brandl's avatar
Georg Brandl committed
977
        ftp.close()
978 979 980 981

    def testTimeoutDirectAccess(self):
        ftp = ftplib.FTP()
        ftp.timeout = 30
Christian Heimes's avatar
Christian Heimes committed
982
        ftp.connect(HOST)
983
        self.assertEqual(ftp.sock.gettimeout(), 30)
Christian Heimes's avatar
Christian Heimes committed
984
        self.evt.wait()
985 986 987
        ftp.close()


988 989
def test_main():
    tests = [TestFTPClass, TestTimeouts]
990
    if support.IPV6_ENABLED:
991
        tests.append(TestIPv6Environment)
992 993 994 995

    if ssl is not None:
        tests.extend([TestTLS_FTPClassMixin, TestTLS_FTPClass])

996 997 998 999 1000 1001
    thread_info = support.threading_setup()
    try:
        support.run_unittest(*tests)
    finally:
        support.threading_cleanup(*thread_info)

1002 1003 1004

if __name__ == '__main__':
    test_main()