mirror of
https://github.com/curl/curl.git
synced 2025-04-12 16:20:35 +08:00
conn: fix connection reuse when SSL is optional
In curl 8.12 I tried to improve the logic on how we handle connections that "upgrade" to TLS later, e.g. with a STARTTLS. I found the existing code hard to read in this regard. But of course, the "improvements" blew up in my face. We fixed issues with imap, opo3, smtp in 8.12.1, but ftp was no longer reusing existing, upgraded control connections as before. This PR adds checks in our pytest FTP tests that verify reuse is happening as intended. I rewrote the logic in url.c again, so that the new test checks now pass. Reported-by: Zenju on github Fixes #16384 Closes #16392
This commit is contained in:
parent
f78700814d
commit
df5db8afaf
11
lib/imap.c
11
lib/imap.c
@ -473,7 +473,6 @@ static CURLcode imap_perform_upgrade_tls(struct Curl_easy *data,
|
||||
goto out;
|
||||
/* Change the connection handler */
|
||||
conn->handler = &Curl_handler_imaps;
|
||||
conn->bits.tls_upgraded = TRUE;
|
||||
}
|
||||
|
||||
DEBUGASSERT(!imapc->ssldone);
|
||||
@ -1747,14 +1746,8 @@ static CURLcode imap_setup_connection(struct Curl_easy *data,
|
||||
struct connectdata *conn)
|
||||
{
|
||||
/* Initialise the IMAP layer */
|
||||
CURLcode result = imap_init(data);
|
||||
if(result)
|
||||
return result;
|
||||
|
||||
/* Clear the TLS upgraded flag */
|
||||
conn->bits.tls_upgraded = FALSE;
|
||||
|
||||
return CURLE_OK;
|
||||
(void)conn;
|
||||
return imap_init(data);
|
||||
}
|
||||
|
||||
/***********************************************************************
|
||||
|
@ -530,9 +530,6 @@ static CURLcode oldap_connect(struct Curl_easy *data, bool *done)
|
||||
/* Initialize the SASL storage */
|
||||
Curl_sasl_init(&li->sasl, data, &saslldap);
|
||||
|
||||
/* Clear the TLS upgraded flag */
|
||||
conn->bits.tls_upgraded = FALSE;
|
||||
|
||||
result = oldap_parse_login_options(conn);
|
||||
if(result)
|
||||
return result;
|
||||
@ -797,7 +794,6 @@ static CURLcode oldap_connecting(struct Curl_easy *data, bool *done)
|
||||
if(result)
|
||||
result = oldap_map_error(code, CURLE_USE_SSL_FAILED);
|
||||
else if(ssl_installed(conn)) {
|
||||
conn->bits.tls_upgraded = TRUE;
|
||||
if(li->sasl.prefmech != SASL_AUTH_NONE)
|
||||
result = oldap_perform_mechs(data);
|
||||
else if(data->state.aptr.user)
|
||||
|
11
lib/pop3.c
11
lib/pop3.c
@ -419,7 +419,6 @@ static CURLcode pop3_perform_upgrade_tls(struct Curl_easy *data,
|
||||
goto out;
|
||||
/* Change the connection handler */
|
||||
conn->handler = &Curl_handler_pop3s;
|
||||
conn->bits.tls_upgraded = TRUE;
|
||||
}
|
||||
|
||||
DEBUGASSERT(!pop3c->ssldone);
|
||||
@ -1391,14 +1390,8 @@ static CURLcode pop3_setup_connection(struct Curl_easy *data,
|
||||
struct connectdata *conn)
|
||||
{
|
||||
/* Initialise the POP3 layer */
|
||||
CURLcode result = pop3_init(data);
|
||||
if(result)
|
||||
return result;
|
||||
|
||||
/* Clear the TLS upgraded flag */
|
||||
conn->bits.tls_upgraded = FALSE;
|
||||
|
||||
return CURLE_OK;
|
||||
(void)conn;
|
||||
return pop3_init(data);
|
||||
}
|
||||
|
||||
/***********************************************************************
|
||||
|
@ -401,7 +401,6 @@ static CURLcode smtp_perform_upgrade_tls(struct Curl_easy *data)
|
||||
goto out;
|
||||
/* Change the connection handler and SMTP state */
|
||||
conn->handler = &Curl_handler_smtps;
|
||||
conn->bits.tls_upgraded = TRUE;
|
||||
}
|
||||
|
||||
DEBUGASSERT(!smtpc->ssldone);
|
||||
@ -1614,10 +1613,8 @@ static CURLcode smtp_setup_connection(struct Curl_easy *data,
|
||||
{
|
||||
CURLcode result;
|
||||
|
||||
/* Clear the TLS upgraded flag */
|
||||
conn->bits.tls_upgraded = FALSE;
|
||||
|
||||
/* Initialise the SMTP layer */
|
||||
(void)conn;
|
||||
result = smtp_init(data);
|
||||
CURL_TRC_SMTP(data, "smtp_setup_connection() -> %d", result);
|
||||
return result;
|
||||
|
48
lib/url.c
48
lib/url.c
@ -950,13 +950,17 @@ static bool url_match_conn(struct connectdata *conn, void *userdata)
|
||||
return FALSE;
|
||||
#endif
|
||||
|
||||
if((!(needle->handler->flags&PROTOPT_SSL) !=
|
||||
!Curl_conn_is_ssl(conn, FIRSTSOCKET)) &&
|
||||
!(get_protocol_family(conn->handler) == needle->handler->protocol &&
|
||||
conn->bits.tls_upgraded))
|
||||
/* Deny `conn` if it is not fit for `needle`'s SSL needs,
|
||||
* UNLESS `conn` is the same protocol family and was upgraded to SSL. */
|
||||
if(needle->handler->flags&PROTOPT_SSL) {
|
||||
/* We are looking for SSL, if `conn` does not do it, not a match. */
|
||||
if(!Curl_conn_is_ssl(conn, FIRSTSOCKET))
|
||||
return FALSE;
|
||||
}
|
||||
else if(Curl_conn_is_ssl(conn, FIRSTSOCKET)) {
|
||||
/* We are not *requiring* SSL, however `conn` has it. If the
|
||||
* protocol *family* is not the same, not a match. */
|
||||
if(get_protocol_family(conn->handler) != needle->handler->protocol)
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
#ifndef CURL_DISABLE_PROXY
|
||||
if(needle->bits.httpproxy != conn->bits.httpproxy ||
|
||||
@ -1084,12 +1088,21 @@ static bool url_match_conn(struct connectdata *conn, void *userdata)
|
||||
|| !needle->bits.httpproxy || needle->bits.tunnel_proxy
|
||||
#endif
|
||||
) {
|
||||
/* Talking the same protocol scheme or a TLS upgraded protocol in the
|
||||
* same protocol family? */
|
||||
if(!strcasecompare(needle->handler->scheme, conn->handler->scheme) &&
|
||||
(get_protocol_family(conn->handler) !=
|
||||
needle->handler->protocol || !conn->bits.tls_upgraded))
|
||||
return FALSE;
|
||||
if(!strcasecompare(needle->handler->scheme, conn->handler->scheme)) {
|
||||
/* `needle` and `conn` do not have the same scheme... */
|
||||
if(get_protocol_family(conn->handler) != needle->handler->protocol) {
|
||||
/* and `conn`s protocol family is not the protocol `needle` wants.
|
||||
* IMAPS would work for IMAP, but no vice versa. */
|
||||
return FALSE;
|
||||
}
|
||||
/* We are in an IMAPS vs IMAP like case. We expect `conn` to have SSL */
|
||||
if(!Curl_conn_is_ssl(conn, FIRSTSOCKET)) {
|
||||
DEBUGF(infof(data,
|
||||
"Connection #%" FMT_OFF_T " has compatible protocol famiy, "
|
||||
"but no SSL, no match", conn->connection_id));
|
||||
return FALSE;
|
||||
}
|
||||
}
|
||||
|
||||
/* If needle has "conn_to_*" set, conn must match this */
|
||||
if((needle->bits.conn_to_host && !strcasecompare(
|
||||
@ -3590,18 +3603,25 @@ static CURLcode create_conn(struct Curl_easy *data,
|
||||
* `existing` and thus we need to cleanup the one we just
|
||||
* allocated before we can move along and use `existing`.
|
||||
*/
|
||||
bool tls_upgraded = (!(conn->given->flags & PROTOPT_SSL) &&
|
||||
Curl_conn_is_ssl(conn, FIRSTSOCKET));
|
||||
|
||||
reuse_conn(data, conn, existing);
|
||||
conn = existing;
|
||||
*in_connect = conn;
|
||||
|
||||
#ifndef CURL_DISABLE_PROXY
|
||||
infof(data, "Re-using existing connection with %s %s",
|
||||
infof(data, "Re-using existing %s: connection%s with %s %s",
|
||||
conn->given->scheme,
|
||||
tls_upgraded ? " (upgraded to SSL)" : "",
|
||||
conn->bits.proxy ? "proxy" : "host",
|
||||
conn->socks_proxy.host.name ? conn->socks_proxy.host.dispname :
|
||||
conn->http_proxy.host.name ? conn->http_proxy.host.dispname :
|
||||
conn->host.dispname);
|
||||
#else
|
||||
infof(data, "Re-using existing connection with host %s",
|
||||
infof(data, "Re-using existing %s: connection%s with host %s",
|
||||
conn->given->scheme,
|
||||
tls_upgraded ? " (upgraded to SSL)" : "",
|
||||
conn->host.dispname);
|
||||
#endif
|
||||
}
|
||||
|
@ -513,7 +513,6 @@ struct ConnectBits {
|
||||
#ifdef USE_UNIX_SOCKETS
|
||||
BIT(abstract_unix_socket);
|
||||
#endif
|
||||
BIT(tls_upgraded);
|
||||
BIT(sock_accepted); /* TRUE if the SECONDARYSOCKET was created with
|
||||
accept() */
|
||||
BIT(parallel_connect); /* set TRUE when a parallel connect attempt has
|
||||
|
@ -65,6 +65,7 @@ test_19_shutdown.py \
|
||||
test_20_websockets.py \
|
||||
test_30_vsftpd.py \
|
||||
test_31_vsftpds.py \
|
||||
test_32_ftps_vsftpd.py \
|
||||
$(TESTENV)
|
||||
|
||||
clean-local:
|
||||
|
@ -103,6 +103,7 @@ class TestVsFTPD:
|
||||
r = curl.ftp_get(urls=[url], with_stats=True)
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_downloads(curl, srcfile, count)
|
||||
assert r.total_connects == count + 1, 'should reuse the control conn'
|
||||
|
||||
@pytest.mark.parametrize("docname", [
|
||||
'data-1k', 'data-1m', 'data-10m'
|
||||
@ -117,6 +118,7 @@ class TestVsFTPD:
|
||||
])
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_downloads(curl, srcfile, count)
|
||||
assert r.total_connects > count + 1, 'should have used several control conns'
|
||||
|
||||
@pytest.mark.parametrize("docname", [
|
||||
'upload-1k', 'upload-100k', 'upload-1m'
|
||||
|
@ -110,6 +110,7 @@ class TestVsFTPD:
|
||||
r = curl.ftp_ssl_get(urls=[url], with_stats=True)
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_downloads(curl, srcfile, count)
|
||||
assert r.total_connects == count + 1, 'should reuse the control conn'
|
||||
|
||||
@pytest.mark.parametrize("docname", [
|
||||
'data-1k', 'data-1m', 'data-10m'
|
||||
@ -124,6 +125,7 @@ class TestVsFTPD:
|
||||
])
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_downloads(curl, srcfile, count)
|
||||
assert r.total_connects > count + 1, 'should have used several control conns'
|
||||
|
||||
@pytest.mark.parametrize("docname", [
|
||||
'upload-1k', 'upload-100k', 'upload-1m'
|
||||
|
278
tests/http/test_32_ftps_vsftpd.py
Normal file
278
tests/http/test_32_ftps_vsftpd.py
Normal file
@ -0,0 +1,278 @@
|
||||
#!/usr/bin/env python3
|
||||
# -*- coding: utf-8 -*-
|
||||
#***************************************************************************
|
||||
# _ _ ____ _
|
||||
# Project ___| | | | _ \| |
|
||||
# / __| | | | |_) | |
|
||||
# | (__| |_| | _ <| |___
|
||||
# \___|\___/|_| \_\_____|
|
||||
#
|
||||
# Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
#
|
||||
# This software is licensed as described in the file COPYING, which
|
||||
# you should have received as part of this distribution. The terms
|
||||
# are also available at https://curl.se/docs/copyright.html.
|
||||
#
|
||||
# You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
||||
# copies of the Software, and permit persons to whom the Software is
|
||||
# furnished to do so, under the terms of the COPYING file.
|
||||
#
|
||||
# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
||||
# KIND, either express or implied.
|
||||
#
|
||||
# SPDX-License-Identifier: curl
|
||||
#
|
||||
###########################################################################
|
||||
#
|
||||
import difflib
|
||||
import filecmp
|
||||
import logging
|
||||
import os
|
||||
import shutil
|
||||
import pytest
|
||||
|
||||
from testenv import Env, CurlClient, VsFTPD
|
||||
|
||||
|
||||
log = logging.getLogger(__name__)
|
||||
|
||||
|
||||
@pytest.mark.skipif(condition=not Env.has_vsftpd(), reason="missing vsftpd")
|
||||
class TestFtpsVsFTPD:
|
||||
|
||||
SUPPORTS_SSL = True
|
||||
|
||||
@pytest.fixture(autouse=True, scope='class')
|
||||
def vsftpds(self, env):
|
||||
if not TestFtpsVsFTPD.SUPPORTS_SSL:
|
||||
pytest.skip('vsftpd does not seem to support SSL')
|
||||
vsftpds = VsFTPD(env=env, with_ssl=True, ssl_implicit=True)
|
||||
if not vsftpds.start():
|
||||
vsftpds.stop()
|
||||
TestFtpsVsFTPD.SUPPORTS_SSL = False
|
||||
pytest.skip('vsftpd does not seem to support SSL')
|
||||
yield vsftpds
|
||||
vsftpds.stop()
|
||||
|
||||
def _make_docs_file(self, docs_dir: str, fname: str, fsize: int):
|
||||
fpath = os.path.join(docs_dir, fname)
|
||||
data1k = 1024*'x'
|
||||
flen = 0
|
||||
with open(fpath, 'w') as fd:
|
||||
while flen < fsize:
|
||||
fd.write(data1k)
|
||||
flen += len(data1k)
|
||||
return flen
|
||||
|
||||
@pytest.fixture(autouse=True, scope='class')
|
||||
def _class_scope(self, env, vsftpds):
|
||||
if os.path.exists(vsftpds.docs_dir):
|
||||
shutil.rmtree(vsftpds.docs_dir)
|
||||
if not os.path.exists(vsftpds.docs_dir):
|
||||
os.makedirs(vsftpds.docs_dir)
|
||||
self._make_docs_file(docs_dir=vsftpds.docs_dir, fname='data-1k', fsize=1024)
|
||||
self._make_docs_file(docs_dir=vsftpds.docs_dir, fname='data-10k', fsize=10*1024)
|
||||
self._make_docs_file(docs_dir=vsftpds.docs_dir, fname='data-1m', fsize=1024*1024)
|
||||
self._make_docs_file(docs_dir=vsftpds.docs_dir, fname='data-10m', fsize=10*1024*1024)
|
||||
env.make_data_file(indir=env.gen_dir, fname="upload-1k", fsize=1024)
|
||||
env.make_data_file(indir=env.gen_dir, fname="upload-100k", fsize=100*1024)
|
||||
env.make_data_file(indir=env.gen_dir, fname="upload-1m", fsize=1024*1024)
|
||||
|
||||
def test_32_01_list_dir(self, env: Env, vsftpds: VsFTPD):
|
||||
curl = CurlClient(env=env)
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/'
|
||||
r = curl.ftp_get(urls=[url], with_stats=True)
|
||||
r.check_stats(count=1, http_status=226)
|
||||
lines = open(os.path.join(curl.run_dir, 'download_#1.data')).readlines()
|
||||
assert len(lines) == 4, f'list: {lines}'
|
||||
|
||||
# download 1 file, no SSL
|
||||
@pytest.mark.parametrize("docname", [
|
||||
'data-1k', 'data-1m', 'data-10m'
|
||||
])
|
||||
def test_32_02_download_1(self, env: Env, vsftpds: VsFTPD, docname):
|
||||
curl = CurlClient(env=env)
|
||||
srcfile = os.path.join(vsftpds.docs_dir, f'{docname}')
|
||||
count = 1
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/{docname}?[0-{count-1}]'
|
||||
r = curl.ftp_get(urls=[url], with_stats=True)
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_downloads(curl, srcfile, count)
|
||||
|
||||
@pytest.mark.parametrize("docname", [
|
||||
'data-1k', 'data-1m', 'data-10m'
|
||||
])
|
||||
def test_32_03_download_10_serial(self, env: Env, vsftpds: VsFTPD, docname):
|
||||
curl = CurlClient(env=env)
|
||||
srcfile = os.path.join(vsftpds.docs_dir, f'{docname}')
|
||||
count = 10
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/{docname}?[0-{count-1}]'
|
||||
r = curl.ftp_get(urls=[url], with_stats=True)
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_downloads(curl, srcfile, count)
|
||||
assert r.total_connects == count + 1, 'should reuse the control conn'
|
||||
|
||||
# 2 serial transfers, first with 'ftps://' and second with 'ftp://'
|
||||
# we want connection reuse in this case
|
||||
def test_32_03b_ftp_compat_ftps(self, env: Env, vsftpds: VsFTPD):
|
||||
curl = CurlClient(env=env)
|
||||
docname = 'data-1k'
|
||||
count = 2
|
||||
url1= f'ftps://{env.ftp_domain}:{vsftpds.port}/{docname}'
|
||||
url2 = f'ftp://{env.ftp_domain}:{vsftpds.port}/{docname}'
|
||||
r = curl.ftp_get(urls=[url1, url2], with_stats=True)
|
||||
r.check_stats(count=count, http_status=226)
|
||||
assert r.total_connects == count + 1, 'should reuse the control conn'
|
||||
|
||||
@pytest.mark.parametrize("docname", [
|
||||
'data-1k', 'data-1m', 'data-10m'
|
||||
])
|
||||
def test_32_04_download_10_parallel(self, env: Env, vsftpds: VsFTPD, docname):
|
||||
curl = CurlClient(env=env)
|
||||
srcfile = os.path.join(vsftpds.docs_dir, f'{docname}')
|
||||
count = 10
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/{docname}?[0-{count-1}]'
|
||||
r = curl.ftp_get(urls=[url], with_stats=True, extra_args=[
|
||||
'--parallel'
|
||||
])
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_downloads(curl, srcfile, count)
|
||||
assert r.total_connects > count + 1, 'should have used several control conns'
|
||||
|
||||
@pytest.mark.parametrize("docname", [
|
||||
'upload-1k', 'upload-100k', 'upload-1m'
|
||||
])
|
||||
def test_32_05_upload_1(self, env: Env, vsftpds: VsFTPD, docname):
|
||||
curl = CurlClient(env=env)
|
||||
srcfile = os.path.join(env.gen_dir, docname)
|
||||
dstfile = os.path.join(vsftpds.docs_dir, docname)
|
||||
self._rmf(dstfile)
|
||||
count = 1
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/'
|
||||
r = curl.ftp_upload(urls=[url], fupload=f'{srcfile}', with_stats=True)
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_upload(env, vsftpds, docname=docname)
|
||||
|
||||
def _rmf(self, path):
|
||||
if os.path.exists(path):
|
||||
return os.remove(path)
|
||||
|
||||
# check with `tcpdump` if curl causes any TCP RST packets
|
||||
@pytest.mark.skipif(condition=not Env.tcpdump(), reason="tcpdump not available")
|
||||
def test_32_06_shutdownh_download(self, env: Env, vsftpds: VsFTPD):
|
||||
docname = 'data-1k'
|
||||
curl = CurlClient(env=env)
|
||||
count = 1
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/{docname}?[0-{count-1}]'
|
||||
r = curl.ftp_get(urls=[url], with_stats=True, with_tcpdump=True)
|
||||
r.check_stats(count=count, http_status=226)
|
||||
# vsftp closes control connection without niceties,
|
||||
# disregard RST packets it sent from its port to curl
|
||||
assert len(r.tcpdump.stats_excluding(src_port=env.ftps_port)) == 0, 'Unexpected TCP RSTs packets'
|
||||
|
||||
# check with `tcpdump` if curl causes any TCP RST packets
|
||||
@pytest.mark.skipif(condition=not Env.tcpdump(), reason="tcpdump not available")
|
||||
def test_32_07_shutdownh_upload(self, env: Env, vsftpds: VsFTPD):
|
||||
docname = 'upload-1k'
|
||||
curl = CurlClient(env=env)
|
||||
srcfile = os.path.join(env.gen_dir, docname)
|
||||
dstfile = os.path.join(vsftpds.docs_dir, docname)
|
||||
self._rmf(dstfile)
|
||||
count = 1
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/'
|
||||
r = curl.ftp_upload(urls=[url], fupload=f'{srcfile}', with_stats=True, with_tcpdump=True)
|
||||
r.check_stats(count=count, http_status=226)
|
||||
# vsftp closes control connection without niceties,
|
||||
# disregard RST packets it sent from its port to curl
|
||||
assert len(r.tcpdump.stats_excluding(src_port=env.ftps_port)) == 0, 'Unexpected TCP RSTs packets'
|
||||
|
||||
def test_32_08_upload_ascii(self, env: Env, vsftpds: VsFTPD):
|
||||
docname = 'upload-ascii'
|
||||
line_length = 21
|
||||
srcfile = os.path.join(env.gen_dir, docname)
|
||||
dstfile = os.path.join(vsftpds.docs_dir, docname)
|
||||
env.make_data_file(indir=env.gen_dir, fname=docname, fsize=100*1024,
|
||||
line_length=line_length)
|
||||
srcsize = os.path.getsize(srcfile)
|
||||
self._rmf(dstfile)
|
||||
count = 1
|
||||
curl = CurlClient(env=env)
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/'
|
||||
r = curl.ftp_upload(urls=[url], fupload=f'{srcfile}', with_stats=True,
|
||||
extra_args=['--use-ascii'])
|
||||
r.check_stats(count=count, http_status=226)
|
||||
# expect the uploaded file to be number of converted newlines larger
|
||||
dstsize = os.path.getsize(dstfile)
|
||||
newlines = len(open(srcfile).readlines())
|
||||
assert (srcsize + newlines) == dstsize, \
|
||||
f'expected source with {newlines} lines to be that much larger,'\
|
||||
f'instead srcsize={srcsize}, upload size={dstsize}, diff={dstsize-srcsize}'
|
||||
|
||||
def test_32_08_active_download(self, env: Env, vsftpds: VsFTPD):
|
||||
docname = 'data-10k'
|
||||
curl = CurlClient(env=env)
|
||||
srcfile = os.path.join(vsftpds.docs_dir, f'{docname}')
|
||||
count = 1
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/{docname}?[0-{count-1}]'
|
||||
r = curl.ftp_get(urls=[url], with_stats=True, extra_args=[
|
||||
'--ftp-port', '127.0.0.1'
|
||||
])
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_downloads(curl, srcfile, count)
|
||||
|
||||
def test_32_09_active_upload(self, env: Env, vsftpds: VsFTPD):
|
||||
docname = 'upload-1k'
|
||||
curl = CurlClient(env=env)
|
||||
srcfile = os.path.join(env.gen_dir, docname)
|
||||
dstfile = os.path.join(vsftpds.docs_dir, docname)
|
||||
self._rmf(dstfile)
|
||||
count = 1
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/'
|
||||
r = curl.ftp_upload(urls=[url], fupload=f'{srcfile}', with_stats=True, extra_args=[
|
||||
'--ftp-port', '127.0.0.1'
|
||||
])
|
||||
r.check_stats(count=count, http_status=226)
|
||||
self.check_upload(env, vsftpds, docname=docname)
|
||||
|
||||
@pytest.mark.parametrize("indata", [
|
||||
'1234567890', ''
|
||||
])
|
||||
def test_32_10_upload_stdin(self, env: Env, vsftpds: VsFTPD, indata):
|
||||
curl = CurlClient(env=env)
|
||||
docname = "upload_31_10"
|
||||
dstfile = os.path.join(vsftpds.docs_dir, docname)
|
||||
self._rmf(dstfile)
|
||||
count = 1
|
||||
url = f'ftps://{env.ftp_domain}:{vsftpds.port}/{docname}'
|
||||
r = curl.ftp_upload(urls=[url], updata=indata, with_stats=True)
|
||||
r.check_stats(count=count, http_status=226)
|
||||
assert os.path.exists(dstfile)
|
||||
destdata = open(dstfile).readlines()
|
||||
expdata = [indata] if len(indata) else []
|
||||
assert expdata == destdata, f'exected: {expdata}, got: {destdata}'
|
||||
|
||||
def check_downloads(self, client, srcfile: str, count: int,
|
||||
complete: bool = True):
|
||||
for i in range(count):
|
||||
dfile = client.download_file(i)
|
||||
assert os.path.exists(dfile)
|
||||
if complete and not filecmp.cmp(srcfile, dfile, shallow=False):
|
||||
diff = "".join(difflib.unified_diff(a=open(srcfile).readlines(),
|
||||
b=open(dfile).readlines(),
|
||||
fromfile=srcfile,
|
||||
tofile=dfile,
|
||||
n=1))
|
||||
assert False, f'download {dfile} differs:\n{diff}'
|
||||
|
||||
def check_upload(self, env, vsftpd: VsFTPD, docname):
|
||||
srcfile = os.path.join(env.gen_dir, docname)
|
||||
dstfile = os.path.join(vsftpd.docs_dir, docname)
|
||||
assert os.path.exists(srcfile)
|
||||
assert os.path.exists(dstfile)
|
||||
if not filecmp.cmp(srcfile, dstfile, shallow=False):
|
||||
diff = "".join(difflib.unified_diff(a=open(srcfile).readlines(),
|
||||
b=open(dstfile).readlines(),
|
||||
fromfile=srcfile,
|
||||
tofile=dstfile,
|
||||
n=1))
|
||||
assert False, f'upload {dstfile} differs:\n{diff}'
|
@ -40,11 +40,12 @@ log = logging.getLogger(__name__)
|
||||
|
||||
class VsFTPD:
|
||||
|
||||
def __init__(self, env: Env, with_ssl=False):
|
||||
def __init__(self, env: Env, with_ssl=False, ssl_implicit=False):
|
||||
self.env = env
|
||||
self._cmd = env.vsftpd
|
||||
self._scheme = 'ftp'
|
||||
self._with_ssl = with_ssl
|
||||
self._ssl_implicit = ssl_implicit and with_ssl
|
||||
self._scheme = 'ftps' if self._ssl_implicit else 'ftp'
|
||||
if self._with_ssl:
|
||||
self._port = self.env.ftps_port
|
||||
name = 'vsftpds'
|
||||
@ -192,6 +193,9 @@ class VsFTPD:
|
||||
# require_ssl_reuse=YES means ctrl and data connection need to use the same session
|
||||
'require_ssl_reuse=NO',
|
||||
])
|
||||
|
||||
if self._ssl_implicit:
|
||||
conf.extend([
|
||||
'implicit_ssl=YES',
|
||||
])
|
||||
with open(self._conf_file, 'w') as fd:
|
||||
fd.write("\n".join(conf))
|
||||
|
Loading…
x
Reference in New Issue
Block a user