blob: 1f760ed1ce0bf09e7355f54a90393f6c4ee8cf57 [file] [log] [blame]
Olivier Deprezf4ef2d02021-04-20 13:36:24 +02001"""An FTP client class and some helper functions.
2
3Based on RFC 959: File Transfer Protocol (FTP), by J. Postel and J. Reynolds
4
5Example:
6
7>>> from ftplib import FTP
8>>> ftp = FTP('ftp.python.org') # connect to host, default port
9>>> ftp.login() # default, i.e.: user anonymous, passwd anonymous@
10'230 Guest login ok, access restrictions apply.'
11>>> ftp.retrlines('LIST') # list directory contents
12total 9
13drwxr-xr-x 8 root wheel 1024 Jan 3 1994 .
14drwxr-xr-x 8 root wheel 1024 Jan 3 1994 ..
15drwxr-xr-x 2 root wheel 1024 Jan 3 1994 bin
16drwxr-xr-x 2 root wheel 1024 Jan 3 1994 etc
17d-wxrwxr-x 2 ftp wheel 1024 Sep 5 13:43 incoming
18drwxr-xr-x 2 root wheel 1024 Nov 17 1993 lib
19drwxr-xr-x 6 1094 wheel 1024 Sep 13 19:07 pub
20drwxr-xr-x 3 root wheel 1024 Jan 3 1994 usr
21-rw-r--r-- 1 root root 312 Aug 1 1994 welcome.msg
22'226 Transfer complete.'
23>>> ftp.quit()
24'221 Goodbye.'
25>>>
26
27A nice test that reveals some of the network dialogue would be:
28python ftplib.py -d localhost -l -p -l
29"""
30
31#
32# Changes and improvements suggested by Steve Majewski.
33# Modified by Jack to work on the mac.
34# Modified by Siebren to support docstrings and PASV.
35# Modified by Phil Schwartz to add storbinary and storlines callbacks.
36# Modified by Giampaolo Rodola' to add TLS support.
37#
38
39import sys
40import socket
41from socket import _GLOBAL_DEFAULT_TIMEOUT
42
43__all__ = ["FTP", "error_reply", "error_temp", "error_perm", "error_proto",
44 "all_errors"]
45
46# Magic number from <socket.h>
47MSG_OOB = 0x1 # Process data out of band
48
49
50# The standard FTP server control port
51FTP_PORT = 21
52# The sizehint parameter passed to readline() calls
53MAXLINE = 8192
54
55
56# Exception raised when an error or invalid response is received
57class Error(Exception): pass
58class error_reply(Error): pass # unexpected [123]xx reply
59class error_temp(Error): pass # 4xx errors
60class error_perm(Error): pass # 5xx errors
61class error_proto(Error): pass # response does not begin with [1-5]
62
63
64# All exceptions (hopefully) that may be raised here and that aren't
65# (always) programming errors on our side
66all_errors = (Error, OSError, EOFError)
67
68
69# Line terminators (we always output CRLF, but accept any of CRLF, CR, LF)
70CRLF = '\r\n'
71B_CRLF = b'\r\n'
72
73# The class itself
74class FTP:
75 '''An FTP client class.
76
77 To create a connection, call the class using these arguments:
78 host, user, passwd, acct, timeout, source_address, encoding
79
80 The first four arguments are all strings, and have default value ''.
81 The parameter ´timeout´ must be numeric and defaults to None if not
82 passed, meaning that no timeout will be set on any ftp socket(s).
83 If a timeout is passed, then this is now the default timeout for all ftp
84 socket operations for this instance.
85 The last parameter is the encoding of filenames, which defaults to utf-8.
86
87 Then use self.connect() with optional host and port argument.
88
89 To download a file, use ftp.retrlines('RETR ' + filename),
90 or ftp.retrbinary() with slightly different arguments.
91 To upload a file, use ftp.storlines() or ftp.storbinary(),
92 which have an open file as argument (see their definitions
93 below for details).
94 The download/upload functions first issue appropriate TYPE
95 and PORT or PASV commands.
96 '''
97
98 debugging = 0
99 host = ''
100 port = FTP_PORT
101 maxline = MAXLINE
102 sock = None
103 file = None
104 welcome = None
105 passiveserver = 1
106
107 def __init__(self, host='', user='', passwd='', acct='',
108 timeout=_GLOBAL_DEFAULT_TIMEOUT, source_address=None, *,
109 encoding='utf-8'):
110 """Initialization method (called by class instantiation).
111 Initialize host to localhost, port to standard ftp port.
112 Optional arguments are host (for connect()),
113 and user, passwd, acct (for login()).
114 """
115 self.encoding = encoding
116 self.source_address = source_address
117 self.timeout = timeout
118 if host:
119 self.connect(host)
120 if user:
121 self.login(user, passwd, acct)
122
123 def __enter__(self):
124 return self
125
126 # Context management protocol: try to quit() if active
127 def __exit__(self, *args):
128 if self.sock is not None:
129 try:
130 self.quit()
131 except (OSError, EOFError):
132 pass
133 finally:
134 if self.sock is not None:
135 self.close()
136
137 def connect(self, host='', port=0, timeout=-999, source_address=None):
138 '''Connect to host. Arguments are:
139 - host: hostname to connect to (string, default previous host)
140 - port: port to connect to (integer, default previous port)
141 - timeout: the timeout to set against the ftp socket(s)
142 - source_address: a 2-tuple (host, port) for the socket to bind
143 to as its source address before connecting.
144 '''
145 if host != '':
146 self.host = host
147 if port > 0:
148 self.port = port
149 if timeout != -999:
150 self.timeout = timeout
151 if self.timeout is not None and not self.timeout:
152 raise ValueError('Non-blocking socket (timeout=0) is not supported')
153 if source_address is not None:
154 self.source_address = source_address
155 sys.audit("ftplib.connect", self, self.host, self.port)
156 self.sock = socket.create_connection((self.host, self.port), self.timeout,
157 source_address=self.source_address)
158 self.af = self.sock.family
159 self.file = self.sock.makefile('r', encoding=self.encoding)
160 self.welcome = self.getresp()
161 return self.welcome
162
163 def getwelcome(self):
164 '''Get the welcome message from the server.
165 (this is read and squirreled away by connect())'''
166 if self.debugging:
167 print('*welcome*', self.sanitize(self.welcome))
168 return self.welcome
169
170 def set_debuglevel(self, level):
171 '''Set the debugging level.
172 The required argument level means:
173 0: no debugging output (default)
174 1: print commands and responses but not body text etc.
175 2: also print raw lines read and sent before stripping CR/LF'''
176 self.debugging = level
177 debug = set_debuglevel
178
179 def set_pasv(self, val):
180 '''Use passive or active mode for data transfers.
181 With a false argument, use the normal PORT mode,
182 With a true argument, use the PASV command.'''
183 self.passiveserver = val
184
185 # Internal: "sanitize" a string for printing
186 def sanitize(self, s):
187 if s[:5] in {'pass ', 'PASS '}:
188 i = len(s.rstrip('\r\n'))
189 s = s[:5] + '*'*(i-5) + s[i:]
190 return repr(s)
191
192 # Internal: send one line to the server, appending CRLF
193 def putline(self, line):
194 if '\r' in line or '\n' in line:
195 raise ValueError('an illegal newline character should not be contained')
196 sys.audit("ftplib.sendcmd", self, line)
197 line = line + CRLF
198 if self.debugging > 1:
199 print('*put*', self.sanitize(line))
200 self.sock.sendall(line.encode(self.encoding))
201
202 # Internal: send one command to the server (through putline())
203 def putcmd(self, line):
204 if self.debugging: print('*cmd*', self.sanitize(line))
205 self.putline(line)
206
207 # Internal: return one line from the server, stripping CRLF.
208 # Raise EOFError if the connection is closed
209 def getline(self):
210 line = self.file.readline(self.maxline + 1)
211 if len(line) > self.maxline:
212 raise Error("got more than %d bytes" % self.maxline)
213 if self.debugging > 1:
214 print('*get*', self.sanitize(line))
215 if not line:
216 raise EOFError
217 if line[-2:] == CRLF:
218 line = line[:-2]
219 elif line[-1:] in CRLF:
220 line = line[:-1]
221 return line
222
223 # Internal: get a response from the server, which may possibly
224 # consist of multiple lines. Return a single string with no
225 # trailing CRLF. If the response consists of multiple lines,
226 # these are separated by '\n' characters in the string
227 def getmultiline(self):
228 line = self.getline()
229 if line[3:4] == '-':
230 code = line[:3]
231 while 1:
232 nextline = self.getline()
233 line = line + ('\n' + nextline)
234 if nextline[:3] == code and \
235 nextline[3:4] != '-':
236 break
237 return line
238
239 # Internal: get a response from the server.
240 # Raise various errors if the response indicates an error
241 def getresp(self):
242 resp = self.getmultiline()
243 if self.debugging:
244 print('*resp*', self.sanitize(resp))
245 self.lastresp = resp[:3]
246 c = resp[:1]
247 if c in {'1', '2', '3'}:
248 return resp
249 if c == '4':
250 raise error_temp(resp)
251 if c == '5':
252 raise error_perm(resp)
253 raise error_proto(resp)
254
255 def voidresp(self):
256 """Expect a response beginning with '2'."""
257 resp = self.getresp()
258 if resp[:1] != '2':
259 raise error_reply(resp)
260 return resp
261
262 def abort(self):
263 '''Abort a file transfer. Uses out-of-band data.
264 This does not follow the procedure from the RFC to send Telnet
265 IP and Synch; that doesn't seem to work with the servers I've
266 tried. Instead, just send the ABOR command as OOB data.'''
267 line = b'ABOR' + B_CRLF
268 if self.debugging > 1:
269 print('*put urgent*', self.sanitize(line))
270 self.sock.sendall(line, MSG_OOB)
271 resp = self.getmultiline()
272 if resp[:3] not in {'426', '225', '226'}:
273 raise error_proto(resp)
274 return resp
275
276 def sendcmd(self, cmd):
277 '''Send a command and return the response.'''
278 self.putcmd(cmd)
279 return self.getresp()
280
281 def voidcmd(self, cmd):
282 """Send a command and expect a response beginning with '2'."""
283 self.putcmd(cmd)
284 return self.voidresp()
285
286 def sendport(self, host, port):
287 '''Send a PORT command with the current host and the given
288 port number.
289 '''
290 hbytes = host.split('.')
291 pbytes = [repr(port//256), repr(port%256)]
292 bytes = hbytes + pbytes
293 cmd = 'PORT ' + ','.join(bytes)
294 return self.voidcmd(cmd)
295
296 def sendeprt(self, host, port):
297 '''Send an EPRT command with the current host and the given port number.'''
298 af = 0
299 if self.af == socket.AF_INET:
300 af = 1
301 if self.af == socket.AF_INET6:
302 af = 2
303 if af == 0:
304 raise error_proto('unsupported address family')
305 fields = ['', repr(af), host, repr(port), '']
306 cmd = 'EPRT ' + '|'.join(fields)
307 return self.voidcmd(cmd)
308
309 def makeport(self):
310 '''Create a new socket and send a PORT command for it.'''
311 sock = socket.create_server(("", 0), family=self.af, backlog=1)
312 port = sock.getsockname()[1] # Get proper port
313 host = self.sock.getsockname()[0] # Get proper host
314 if self.af == socket.AF_INET:
315 resp = self.sendport(host, port)
316 else:
317 resp = self.sendeprt(host, port)
318 if self.timeout is not _GLOBAL_DEFAULT_TIMEOUT:
319 sock.settimeout(self.timeout)
320 return sock
321
322 def makepasv(self):
323 if self.af == socket.AF_INET:
324 host, port = parse227(self.sendcmd('PASV'))
325 else:
326 host, port = parse229(self.sendcmd('EPSV'), self.sock.getpeername())
327 return host, port
328
329 def ntransfercmd(self, cmd, rest=None):
330 """Initiate a transfer over the data connection.
331
332 If the transfer is active, send a port command and the
333 transfer command, and accept the connection. If the server is
334 passive, send a pasv command, connect to it, and start the
335 transfer command. Either way, return the socket for the
336 connection and the expected size of the transfer. The
337 expected size may be None if it could not be determined.
338
339 Optional `rest' argument can be a string that is sent as the
340 argument to a REST command. This is essentially a server
341 marker used to tell the server to skip over any data up to the
342 given marker.
343 """
344 size = None
345 if self.passiveserver:
346 host, port = self.makepasv()
347 conn = socket.create_connection((host, port), self.timeout,
348 source_address=self.source_address)
349 try:
350 if rest is not None:
351 self.sendcmd("REST %s" % rest)
352 resp = self.sendcmd(cmd)
353 # Some servers apparently send a 200 reply to
354 # a LIST or STOR command, before the 150 reply
355 # (and way before the 226 reply). This seems to
356 # be in violation of the protocol (which only allows
357 # 1xx or error messages for LIST), so we just discard
358 # this response.
359 if resp[0] == '2':
360 resp = self.getresp()
361 if resp[0] != '1':
362 raise error_reply(resp)
363 except:
364 conn.close()
365 raise
366 else:
367 with self.makeport() as sock:
368 if rest is not None:
369 self.sendcmd("REST %s" % rest)
370 resp = self.sendcmd(cmd)
371 # See above.
372 if resp[0] == '2':
373 resp = self.getresp()
374 if resp[0] != '1':
375 raise error_reply(resp)
376 conn, sockaddr = sock.accept()
377 if self.timeout is not _GLOBAL_DEFAULT_TIMEOUT:
378 conn.settimeout(self.timeout)
379 if resp[:3] == '150':
380 # this is conditional in case we received a 125
381 size = parse150(resp)
382 return conn, size
383
384 def transfercmd(self, cmd, rest=None):
385 """Like ntransfercmd() but returns only the socket."""
386 return self.ntransfercmd(cmd, rest)[0]
387
388 def login(self, user = '', passwd = '', acct = ''):
389 '''Login, default anonymous.'''
390 if not user:
391 user = 'anonymous'
392 if not passwd:
393 passwd = ''
394 if not acct:
395 acct = ''
396 if user == 'anonymous' and passwd in {'', '-'}:
397 # If there is no anonymous ftp password specified
398 # then we'll just use anonymous@
399 # We don't send any other thing because:
400 # - We want to remain anonymous
401 # - We want to stop SPAM
402 # - We don't want to let ftp sites to discriminate by the user,
403 # host or country.
404 passwd = passwd + 'anonymous@'
405 resp = self.sendcmd('USER ' + user)
406 if resp[0] == '3':
407 resp = self.sendcmd('PASS ' + passwd)
408 if resp[0] == '3':
409 resp = self.sendcmd('ACCT ' + acct)
410 if resp[0] != '2':
411 raise error_reply(resp)
412 return resp
413
414 def retrbinary(self, cmd, callback, blocksize=8192, rest=None):
415 """Retrieve data in binary mode. A new port is created for you.
416
417 Args:
418 cmd: A RETR command.
419 callback: A single parameter callable to be called on each
420 block of data read.
421 blocksize: The maximum number of bytes to read from the
422 socket at one time. [default: 8192]
423 rest: Passed to transfercmd(). [default: None]
424
425 Returns:
426 The response code.
427 """
428 self.voidcmd('TYPE I')
429 with self.transfercmd(cmd, rest) as conn:
430 while 1:
431 data = conn.recv(blocksize)
432 if not data:
433 break
434 callback(data)
435 # shutdown ssl layer
436 if _SSLSocket is not None and isinstance(conn, _SSLSocket):
437 conn.unwrap()
438 return self.voidresp()
439
440 def retrlines(self, cmd, callback = None):
441 """Retrieve data in line mode. A new port is created for you.
442
443 Args:
444 cmd: A RETR, LIST, or NLST command.
445 callback: An optional single parameter callable that is called
446 for each line with the trailing CRLF stripped.
447 [default: print_line()]
448
449 Returns:
450 The response code.
451 """
452 if callback is None:
453 callback = print_line
454 resp = self.sendcmd('TYPE A')
455 with self.transfercmd(cmd) as conn, \
456 conn.makefile('r', encoding=self.encoding) as fp:
457 while 1:
458 line = fp.readline(self.maxline + 1)
459 if len(line) > self.maxline:
460 raise Error("got more than %d bytes" % self.maxline)
461 if self.debugging > 2:
462 print('*retr*', repr(line))
463 if not line:
464 break
465 if line[-2:] == CRLF:
466 line = line[:-2]
467 elif line[-1:] == '\n':
468 line = line[:-1]
469 callback(line)
470 # shutdown ssl layer
471 if _SSLSocket is not None and isinstance(conn, _SSLSocket):
472 conn.unwrap()
473 return self.voidresp()
474
475 def storbinary(self, cmd, fp, blocksize=8192, callback=None, rest=None):
476 """Store a file in binary mode. A new port is created for you.
477
478 Args:
479 cmd: A STOR command.
480 fp: A file-like object with a read(num_bytes) method.
481 blocksize: The maximum data size to read from fp and send over
482 the connection at once. [default: 8192]
483 callback: An optional single parameter callable that is called on
484 each block of data after it is sent. [default: None]
485 rest: Passed to transfercmd(). [default: None]
486
487 Returns:
488 The response code.
489 """
490 self.voidcmd('TYPE I')
491 with self.transfercmd(cmd, rest) as conn:
492 while 1:
493 buf = fp.read(blocksize)
494 if not buf:
495 break
496 conn.sendall(buf)
497 if callback:
498 callback(buf)
499 # shutdown ssl layer
500 if _SSLSocket is not None and isinstance(conn, _SSLSocket):
501 conn.unwrap()
502 return self.voidresp()
503
504 def storlines(self, cmd, fp, callback=None):
505 """Store a file in line mode. A new port is created for you.
506
507 Args:
508 cmd: A STOR command.
509 fp: A file-like object with a readline() method.
510 callback: An optional single parameter callable that is called on
511 each line after it is sent. [default: None]
512
513 Returns:
514 The response code.
515 """
516 self.voidcmd('TYPE A')
517 with self.transfercmd(cmd) as conn:
518 while 1:
519 buf = fp.readline(self.maxline + 1)
520 if len(buf) > self.maxline:
521 raise Error("got more than %d bytes" % self.maxline)
522 if not buf:
523 break
524 if buf[-2:] != B_CRLF:
525 if buf[-1] in B_CRLF: buf = buf[:-1]
526 buf = buf + B_CRLF
527 conn.sendall(buf)
528 if callback:
529 callback(buf)
530 # shutdown ssl layer
531 if _SSLSocket is not None and isinstance(conn, _SSLSocket):
532 conn.unwrap()
533 return self.voidresp()
534
535 def acct(self, password):
536 '''Send new account name.'''
537 cmd = 'ACCT ' + password
538 return self.voidcmd(cmd)
539
540 def nlst(self, *args):
541 '''Return a list of files in a given directory (default the current).'''
542 cmd = 'NLST'
543 for arg in args:
544 cmd = cmd + (' ' + arg)
545 files = []
546 self.retrlines(cmd, files.append)
547 return files
548
549 def dir(self, *args):
550 '''List a directory in long form.
551 By default list current directory to stdout.
552 Optional last argument is callback function; all
553 non-empty arguments before it are concatenated to the
554 LIST command. (This *should* only be used for a pathname.)'''
555 cmd = 'LIST'
556 func = None
557 if args[-1:] and type(args[-1]) != type(''):
558 args, func = args[:-1], args[-1]
559 for arg in args:
560 if arg:
561 cmd = cmd + (' ' + arg)
562 self.retrlines(cmd, func)
563
564 def mlsd(self, path="", facts=[]):
565 '''List a directory in a standardized format by using MLSD
566 command (RFC-3659). If path is omitted the current directory
567 is assumed. "facts" is a list of strings representing the type
568 of information desired (e.g. ["type", "size", "perm"]).
569
570 Return a generator object yielding a tuple of two elements
571 for every file found in path.
572 First element is the file name, the second one is a dictionary
573 including a variable number of "facts" depending on the server
574 and whether "facts" argument has been provided.
575 '''
576 if facts:
577 self.sendcmd("OPTS MLST " + ";".join(facts) + ";")
578 if path:
579 cmd = "MLSD %s" % path
580 else:
581 cmd = "MLSD"
582 lines = []
583 self.retrlines(cmd, lines.append)
584 for line in lines:
585 facts_found, _, name = line.rstrip(CRLF).partition(' ')
586 entry = {}
587 for fact in facts_found[:-1].split(";"):
588 key, _, value = fact.partition("=")
589 entry[key.lower()] = value
590 yield (name, entry)
591
592 def rename(self, fromname, toname):
593 '''Rename a file.'''
594 resp = self.sendcmd('RNFR ' + fromname)
595 if resp[0] != '3':
596 raise error_reply(resp)
597 return self.voidcmd('RNTO ' + toname)
598
599 def delete(self, filename):
600 '''Delete a file.'''
601 resp = self.sendcmd('DELE ' + filename)
602 if resp[:3] in {'250', '200'}:
603 return resp
604 else:
605 raise error_reply(resp)
606
607 def cwd(self, dirname):
608 '''Change to a directory.'''
609 if dirname == '..':
610 try:
611 return self.voidcmd('CDUP')
612 except error_perm as msg:
613 if msg.args[0][:3] != '500':
614 raise
615 elif dirname == '':
616 dirname = '.' # does nothing, but could return error
617 cmd = 'CWD ' + dirname
618 return self.voidcmd(cmd)
619
620 def size(self, filename):
621 '''Retrieve the size of a file.'''
622 # The SIZE command is defined in RFC-3659
623 resp = self.sendcmd('SIZE ' + filename)
624 if resp[:3] == '213':
625 s = resp[3:].strip()
626 return int(s)
627
628 def mkd(self, dirname):
629 '''Make a directory, return its full pathname.'''
630 resp = self.voidcmd('MKD ' + dirname)
631 # fix around non-compliant implementations such as IIS shipped
632 # with Windows server 2003
633 if not resp.startswith('257'):
634 return ''
635 return parse257(resp)
636
637 def rmd(self, dirname):
638 '''Remove a directory.'''
639 return self.voidcmd('RMD ' + dirname)
640
641 def pwd(self):
642 '''Return current working directory.'''
643 resp = self.voidcmd('PWD')
644 # fix around non-compliant implementations such as IIS shipped
645 # with Windows server 2003
646 if not resp.startswith('257'):
647 return ''
648 return parse257(resp)
649
650 def quit(self):
651 '''Quit, and close the connection.'''
652 resp = self.voidcmd('QUIT')
653 self.close()
654 return resp
655
656 def close(self):
657 '''Close the connection without assuming anything about it.'''
658 try:
659 file = self.file
660 self.file = None
661 if file is not None:
662 file.close()
663 finally:
664 sock = self.sock
665 self.sock = None
666 if sock is not None:
667 sock.close()
668
669try:
670 import ssl
671except ImportError:
672 _SSLSocket = None
673else:
674 _SSLSocket = ssl.SSLSocket
675
676 class FTP_TLS(FTP):
677 '''A FTP subclass which adds TLS support to FTP as described
678 in RFC-4217.
679
680 Connect as usual to port 21 implicitly securing the FTP control
681 connection before authenticating.
682
683 Securing the data connection requires user to explicitly ask
684 for it by calling prot_p() method.
685
686 Usage example:
687 >>> from ftplib import FTP_TLS
688 >>> ftps = FTP_TLS('ftp.python.org')
689 >>> ftps.login() # login anonymously previously securing control channel
690 '230 Guest login ok, access restrictions apply.'
691 >>> ftps.prot_p() # switch to secure data connection
692 '200 Protection level set to P'
693 >>> ftps.retrlines('LIST') # list directory content securely
694 total 9
695 drwxr-xr-x 8 root wheel 1024 Jan 3 1994 .
696 drwxr-xr-x 8 root wheel 1024 Jan 3 1994 ..
697 drwxr-xr-x 2 root wheel 1024 Jan 3 1994 bin
698 drwxr-xr-x 2 root wheel 1024 Jan 3 1994 etc
699 d-wxrwxr-x 2 ftp wheel 1024 Sep 5 13:43 incoming
700 drwxr-xr-x 2 root wheel 1024 Nov 17 1993 lib
701 drwxr-xr-x 6 1094 wheel 1024 Sep 13 19:07 pub
702 drwxr-xr-x 3 root wheel 1024 Jan 3 1994 usr
703 -rw-r--r-- 1 root root 312 Aug 1 1994 welcome.msg
704 '226 Transfer complete.'
705 >>> ftps.quit()
706 '221 Goodbye.'
707 >>>
708 '''
709 ssl_version = ssl.PROTOCOL_TLS_CLIENT
710
711 def __init__(self, host='', user='', passwd='', acct='',
712 keyfile=None, certfile=None, context=None,
713 timeout=_GLOBAL_DEFAULT_TIMEOUT, source_address=None, *,
714 encoding='utf-8'):
715 if context is not None and keyfile is not None:
716 raise ValueError("context and keyfile arguments are mutually "
717 "exclusive")
718 if context is not None and certfile is not None:
719 raise ValueError("context and certfile arguments are mutually "
720 "exclusive")
721 if keyfile is not None or certfile is not None:
722 import warnings
723 warnings.warn("keyfile and certfile are deprecated, use a "
724 "custom context instead", DeprecationWarning, 2)
725 self.keyfile = keyfile
726 self.certfile = certfile
727 if context is None:
728 context = ssl._create_stdlib_context(self.ssl_version,
729 certfile=certfile,
730 keyfile=keyfile)
731 self.context = context
732 self._prot_p = False
733 super().__init__(host, user, passwd, acct,
734 timeout, source_address, encoding=encoding)
735
736 def login(self, user='', passwd='', acct='', secure=True):
737 if secure and not isinstance(self.sock, ssl.SSLSocket):
738 self.auth()
739 return super().login(user, passwd, acct)
740
741 def auth(self):
742 '''Set up secure control connection by using TLS/SSL.'''
743 if isinstance(self.sock, ssl.SSLSocket):
744 raise ValueError("Already using TLS")
745 if self.ssl_version >= ssl.PROTOCOL_TLS:
746 resp = self.voidcmd('AUTH TLS')
747 else:
748 resp = self.voidcmd('AUTH SSL')
749 self.sock = self.context.wrap_socket(self.sock, server_hostname=self.host)
750 self.file = self.sock.makefile(mode='r', encoding=self.encoding)
751 return resp
752
753 def ccc(self):
754 '''Switch back to a clear-text control connection.'''
755 if not isinstance(self.sock, ssl.SSLSocket):
756 raise ValueError("not using TLS")
757 resp = self.voidcmd('CCC')
758 self.sock = self.sock.unwrap()
759 return resp
760
761 def prot_p(self):
762 '''Set up secure data connection.'''
763 # PROT defines whether or not the data channel is to be protected.
764 # Though RFC-2228 defines four possible protection levels,
765 # RFC-4217 only recommends two, Clear and Private.
766 # Clear (PROT C) means that no security is to be used on the
767 # data-channel, Private (PROT P) means that the data-channel
768 # should be protected by TLS.
769 # PBSZ command MUST still be issued, but must have a parameter of
770 # '0' to indicate that no buffering is taking place and the data
771 # connection should not be encapsulated.
772 self.voidcmd('PBSZ 0')
773 resp = self.voidcmd('PROT P')
774 self._prot_p = True
775 return resp
776
777 def prot_c(self):
778 '''Set up clear text data connection.'''
779 resp = self.voidcmd('PROT C')
780 self._prot_p = False
781 return resp
782
783 # --- Overridden FTP methods
784
785 def ntransfercmd(self, cmd, rest=None):
786 conn, size = super().ntransfercmd(cmd, rest)
787 if self._prot_p:
788 conn = self.context.wrap_socket(conn,
789 server_hostname=self.host)
790 return conn, size
791
792 def abort(self):
793 # overridden as we can't pass MSG_OOB flag to sendall()
794 line = b'ABOR' + B_CRLF
795 self.sock.sendall(line)
796 resp = self.getmultiline()
797 if resp[:3] not in {'426', '225', '226'}:
798 raise error_proto(resp)
799 return resp
800
801 __all__.append('FTP_TLS')
802 all_errors = (Error, OSError, EOFError, ssl.SSLError)
803
804
805_150_re = None
806
807def parse150(resp):
808 '''Parse the '150' response for a RETR request.
809 Returns the expected transfer size or None; size is not guaranteed to
810 be present in the 150 message.
811 '''
812 if resp[:3] != '150':
813 raise error_reply(resp)
814 global _150_re
815 if _150_re is None:
816 import re
817 _150_re = re.compile(
818 r"150 .* \((\d+) bytes\)", re.IGNORECASE | re.ASCII)
819 m = _150_re.match(resp)
820 if not m:
821 return None
822 return int(m.group(1))
823
824
825_227_re = None
826
827def parse227(resp):
828 '''Parse the '227' response for a PASV request.
829 Raises error_proto if it does not contain '(h1,h2,h3,h4,p1,p2)'
830 Return ('host.addr.as.numbers', port#) tuple.'''
831 if resp[:3] != '227':
832 raise error_reply(resp)
833 global _227_re
834 if _227_re is None:
835 import re
836 _227_re = re.compile(r'(\d+),(\d+),(\d+),(\d+),(\d+),(\d+)', re.ASCII)
837 m = _227_re.search(resp)
838 if not m:
839 raise error_proto(resp)
840 numbers = m.groups()
841 host = '.'.join(numbers[:4])
842 port = (int(numbers[4]) << 8) + int(numbers[5])
843 return host, port
844
845
846def parse229(resp, peer):
847 '''Parse the '229' response for an EPSV request.
848 Raises error_proto if it does not contain '(|||port|)'
849 Return ('host.addr.as.numbers', port#) tuple.'''
850 if resp[:3] != '229':
851 raise error_reply(resp)
852 left = resp.find('(')
853 if left < 0: raise error_proto(resp)
854 right = resp.find(')', left + 1)
855 if right < 0:
856 raise error_proto(resp) # should contain '(|||port|)'
857 if resp[left + 1] != resp[right - 1]:
858 raise error_proto(resp)
859 parts = resp[left + 1:right].split(resp[left+1])
860 if len(parts) != 5:
861 raise error_proto(resp)
862 host = peer[0]
863 port = int(parts[3])
864 return host, port
865
866
867def parse257(resp):
868 '''Parse the '257' response for a MKD or PWD request.
869 This is a response to a MKD or PWD request: a directory name.
870 Returns the directoryname in the 257 reply.'''
871 if resp[:3] != '257':
872 raise error_reply(resp)
873 if resp[3:5] != ' "':
874 return '' # Not compliant to RFC 959, but UNIX ftpd does this
875 dirname = ''
876 i = 5
877 n = len(resp)
878 while i < n:
879 c = resp[i]
880 i = i+1
881 if c == '"':
882 if i >= n or resp[i] != '"':
883 break
884 i = i+1
885 dirname = dirname + c
886 return dirname
887
888
889def print_line(line):
890 '''Default retrlines callback to print a line.'''
891 print(line)
892
893
894def ftpcp(source, sourcename, target, targetname = '', type = 'I'):
895 '''Copy file from one FTP-instance to another.'''
896 if not targetname:
897 targetname = sourcename
898 type = 'TYPE ' + type
899 source.voidcmd(type)
900 target.voidcmd(type)
901 sourcehost, sourceport = parse227(source.sendcmd('PASV'))
902 target.sendport(sourcehost, sourceport)
903 # RFC 959: the user must "listen" [...] BEFORE sending the
904 # transfer request.
905 # So: STOR before RETR, because here the target is a "user".
906 treply = target.sendcmd('STOR ' + targetname)
907 if treply[:3] not in {'125', '150'}:
908 raise error_proto # RFC 959
909 sreply = source.sendcmd('RETR ' + sourcename)
910 if sreply[:3] not in {'125', '150'}:
911 raise error_proto # RFC 959
912 source.voidresp()
913 target.voidresp()
914
915
916def test():
917 '''Test program.
918 Usage: ftp [-d] [-r[file]] host [-l[dir]] [-d[dir]] [-p] [file] ...
919
920 -d dir
921 -l list
922 -p password
923 '''
924
925 if len(sys.argv) < 2:
926 print(test.__doc__)
927 sys.exit(0)
928
929 import netrc
930
931 debugging = 0
932 rcfile = None
933 while sys.argv[1] == '-d':
934 debugging = debugging+1
935 del sys.argv[1]
936 if sys.argv[1][:2] == '-r':
937 # get name of alternate ~/.netrc file:
938 rcfile = sys.argv[1][2:]
939 del sys.argv[1]
940 host = sys.argv[1]
941 ftp = FTP(host)
942 ftp.set_debuglevel(debugging)
943 userid = passwd = acct = ''
944 try:
945 netrcobj = netrc.netrc(rcfile)
946 except OSError:
947 if rcfile is not None:
948 sys.stderr.write("Could not open account file"
949 " -- using anonymous login.")
950 else:
951 try:
952 userid, acct, passwd = netrcobj.authenticators(host)
953 except KeyError:
954 # no account for host
955 sys.stderr.write(
956 "No account -- using anonymous login.")
957 ftp.login(userid, passwd, acct)
958 for file in sys.argv[2:]:
959 if file[:2] == '-l':
960 ftp.dir(file[2:])
961 elif file[:2] == '-d':
962 cmd = 'CWD'
963 if file[2:]: cmd = cmd + ' ' + file[2:]
964 resp = ftp.sendcmd(cmd)
965 elif file == '-p':
966 ftp.set_pasv(not ftp.passiveserver)
967 else:
968 ftp.retrbinary('RETR ' + file, \
969 sys.stdout.write, 1024)
970 ftp.quit()
971
972
973if __name__ == '__main__':
974 test()