mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
Support TLS and hash styles options for Net::FTP.new.
If the :ssl options is specified, the control connection is protected with TLS in the manner described in RFC 4217. Data connections are also protected with TLS unless the :private_data_connection is set to false. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@56834 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
This commit is contained in:
parent
378d0e6aca
commit
eb8c73adbc
3 changed files with 600 additions and 21 deletions
5
NEWS
5
NEWS
|
@ -201,6 +201,11 @@ with all sufficient information, see the ChangeLog file or Redmine
|
||||||
|
|
||||||
* New method: Net::HTTP.post [Feature #12375]
|
* New method: Net::HTTP.post [Feature #12375]
|
||||||
|
|
||||||
|
* Net::FTP
|
||||||
|
|
||||||
|
* Support TLS (RFC 4217).
|
||||||
|
* Support hash style options for Net::FTP.new.
|
||||||
|
|
||||||
* OpenSSL
|
* OpenSSL
|
||||||
|
|
||||||
* OpenSSL is extracted as a gem and the upstream has been migrated to
|
* OpenSSL is extracted as a gem and the upstream has been migrated to
|
||||||
|
|
154
lib/net/ftp.rb
154
lib/net/ftp.rb
|
@ -19,6 +19,10 @@ require "socket"
|
||||||
require "monitor"
|
require "monitor"
|
||||||
require "net/protocol"
|
require "net/protocol"
|
||||||
require "time"
|
require "time"
|
||||||
|
begin
|
||||||
|
require "openssl"
|
||||||
|
rescue LoadError
|
||||||
|
end
|
||||||
|
|
||||||
module Net
|
module Net
|
||||||
|
|
||||||
|
@ -75,6 +79,10 @@ module Net
|
||||||
#
|
#
|
||||||
class FTP
|
class FTP
|
||||||
include MonitorMixin
|
include MonitorMixin
|
||||||
|
if defined?(OpenSSL::SSL)
|
||||||
|
include OpenSSL
|
||||||
|
include SSL
|
||||||
|
end
|
||||||
|
|
||||||
# :stopdoc:
|
# :stopdoc:
|
||||||
FTP_PORT = 21
|
FTP_PORT = 21
|
||||||
|
@ -143,38 +151,108 @@ module Net
|
||||||
# If a block is given, it is passed the +FTP+ object, which will be closed
|
# If a block is given, it is passed the +FTP+ object, which will be closed
|
||||||
# when the block finishes, or when an exception is raised.
|
# when the block finishes, or when an exception is raised.
|
||||||
#
|
#
|
||||||
def FTP.open(host, user = nil, passwd = nil, acct = nil)
|
def FTP.open(host, *args)
|
||||||
if block_given?
|
if block_given?
|
||||||
ftp = new(host, user, passwd, acct)
|
ftp = new(host, *args)
|
||||||
begin
|
begin
|
||||||
yield ftp
|
yield ftp
|
||||||
ensure
|
ensure
|
||||||
ftp.close
|
ftp.close
|
||||||
end
|
end
|
||||||
else
|
else
|
||||||
new(host, user, passwd, acct)
|
new(host, *args)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
# :call-seq:
|
||||||
|
# Net::FTP.new(host = nil, options = {})
|
||||||
#
|
#
|
||||||
# Creates and returns a new +FTP+ object. If a +host+ is given, a connection
|
# Creates and returns a new +FTP+ object. If a +host+ is given, a connection
|
||||||
# is made. Additionally, if the +user+ is given, the given user name,
|
# is made.
|
||||||
# password, and (optionally) account are used to log in. See #login.
|
|
||||||
#
|
#
|
||||||
def initialize(host = nil, user = nil, passwd = nil, acct = nil)
|
# +options+ is an option hash, each key of which is a symbol.
|
||||||
|
#
|
||||||
|
# The available options are:
|
||||||
|
#
|
||||||
|
# port:: Port number (default value is 21)
|
||||||
|
# ssl:: If options[:ssl] is true, then an attempt will be made
|
||||||
|
# to use SSL (now TLS) to connect to the server. For this to
|
||||||
|
# work OpenSSL [OSSL] and the Ruby OpenSSL [RSSL] extensions
|
||||||
|
# need to be installed. If options[:ssl] is a hash, it's
|
||||||
|
# passed to OpenSSL::SSL::SSLContext#set_params as parameters.
|
||||||
|
# private_data_connection:: If true, TLS is used for data connections.
|
||||||
|
# Default: +true+ when options[:ssl] is true.
|
||||||
|
# user:: Username for login. If options[:user] is the string
|
||||||
|
# "anonymous" and the options[:password] is +nil+,
|
||||||
|
# "anonymous@" is used as a password. If options[:user] is
|
||||||
|
# +nil+,
|
||||||
|
# passwd:: Password for login.
|
||||||
|
# acct:: Account information for ACCT.
|
||||||
|
# passive:: When +true+, the connection is in passive mode. Default: +true+.
|
||||||
|
# debug_mode:: When +true+, all traffic to and from the server is
|
||||||
|
# written to +$stdout+. Default: +false+.
|
||||||
|
#
|
||||||
|
def initialize(host = nil, user_or_options = {}, passwd = nil, acct = nil)
|
||||||
super()
|
super()
|
||||||
|
begin
|
||||||
|
options = user_or_options.to_hash
|
||||||
|
rescue NoMethodError
|
||||||
|
# for backward compatibility
|
||||||
|
options = {}
|
||||||
|
options[:user] = user_or_options
|
||||||
|
options[:passwd] = passwd
|
||||||
|
options[:acct] = acct
|
||||||
|
end
|
||||||
|
@host = nil
|
||||||
|
if options[:ssl]
|
||||||
|
unless defined?(OpenSSL::SSL)
|
||||||
|
raise "SSL extension not installed"
|
||||||
|
end
|
||||||
|
ssl_params = options[:ssl] == true ? {} : options[:ssl]
|
||||||
|
@ssl_context = SSLContext.new
|
||||||
|
@ssl_context.set_params(ssl_params)
|
||||||
|
if defined?(VerifyCallbackProc)
|
||||||
|
@ssl_context.verify_callback = VerifyCallbackProc
|
||||||
|
end
|
||||||
|
@ssl_session = nil
|
||||||
|
if options[:private_data_connection].nil?
|
||||||
|
@private_data_connection = true
|
||||||
|
else
|
||||||
|
@private_data_connection = options[:private_data_connection]
|
||||||
|
end
|
||||||
|
else
|
||||||
|
@ssl_context = nil
|
||||||
|
if options[:private_data_connection]
|
||||||
|
raise ArgumentError,
|
||||||
|
"private_data_connection can be set to true only when ssl is enabled"
|
||||||
|
end
|
||||||
|
end
|
||||||
@binary = true
|
@binary = true
|
||||||
|
if options[:passive].nil?
|
||||||
@passive = @@default_passive
|
@passive = @@default_passive
|
||||||
|
else
|
||||||
|
@passive = options[:passive]
|
||||||
|
end
|
||||||
|
if options[:debug_mode].nil?
|
||||||
@debug_mode = false
|
@debug_mode = false
|
||||||
|
else
|
||||||
|
@debug_mode = options[:debug_mode]
|
||||||
|
end
|
||||||
@resume = false
|
@resume = false
|
||||||
@sock = NullSocket.new
|
@bare_sock = @sock = NullSocket.new
|
||||||
@logged_in = false
|
@logged_in = false
|
||||||
@open_timeout = nil
|
@open_timeout = nil
|
||||||
@read_timeout = 60
|
@read_timeout = 60
|
||||||
if host
|
if host
|
||||||
|
if options[:port]
|
||||||
|
connect(host, options[:port] || FTP_PORT)
|
||||||
|
else
|
||||||
|
# spec/rubyspec/library/net/ftp/initialize_spec.rb depends on
|
||||||
|
# the number of arguments passed to connect....
|
||||||
connect(host)
|
connect(host)
|
||||||
if user
|
end
|
||||||
login(user, passwd, acct)
|
if options[:user]
|
||||||
|
login(options[:user], options[:passwd], options[:acct])
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
@ -242,11 +320,28 @@ module Net
|
||||||
else
|
else
|
||||||
sock = TCPSocket.open(host, port)
|
sock = TCPSocket.open(host, port)
|
||||||
end
|
end
|
||||||
BufferedSocket.new(sock, read_timeout: @read_timeout)
|
|
||||||
}
|
}
|
||||||
end
|
end
|
||||||
private :open_socket
|
private :open_socket
|
||||||
|
|
||||||
|
def start_tls_session(sock)
|
||||||
|
ssl_sock = SSLSocket.new(sock, @ssl_context)
|
||||||
|
ssl_sock.sync_close = true
|
||||||
|
ssl_sock.hostname = @host if ssl_sock.respond_to? :hostname=
|
||||||
|
if @ssl_session &&
|
||||||
|
Process.clock_gettime(Process::CLOCK_REALTIME) < @ssl_session.time.to_f + @ssl_session.timeout
|
||||||
|
# ProFTPD returns 425 for data connections if session is not reused.
|
||||||
|
ssl_sock.session = @ssl_session
|
||||||
|
end
|
||||||
|
ssl_sock.connect
|
||||||
|
if @ssl_context.verify_mode != VERIFY_NONE
|
||||||
|
ssl_sock.post_connection_check(@host)
|
||||||
|
end
|
||||||
|
@ssl_session = ssl_sock.session
|
||||||
|
return ssl_sock
|
||||||
|
end
|
||||||
|
private :start_tls_session
|
||||||
|
|
||||||
#
|
#
|
||||||
# Establishes an FTP connection to host, optionally overriding the default
|
# Establishes an FTP connection to host, optionally overriding the default
|
||||||
# port. If the environment variable +SOCKS_SERVER+ is set, sets up the
|
# port. If the environment variable +SOCKS_SERVER+ is set, sets up the
|
||||||
|
@ -258,8 +353,24 @@ module Net
|
||||||
print "connect: ", host, ", ", port, "\n"
|
print "connect: ", host, ", ", port, "\n"
|
||||||
end
|
end
|
||||||
synchronize do
|
synchronize do
|
||||||
@sock = open_socket(host, port)
|
@host = host
|
||||||
|
@bare_sock = open_socket(host, port)
|
||||||
|
@sock = BufferedSocket.new(@bare_sock, read_timeout: @read_timeout)
|
||||||
voidresp
|
voidresp
|
||||||
|
if @ssl_context
|
||||||
|
begin
|
||||||
|
voidcmd("AUTH TLS")
|
||||||
|
ssl_sock = start_tls_session(@bare_sock)
|
||||||
|
@sock = BufferedSocket.new(ssl_sock, read_timeout: @read_timeout)
|
||||||
|
if @private_data_connection
|
||||||
|
voidcmd("PBSZ 0")
|
||||||
|
voidcmd("PROT P")
|
||||||
|
end
|
||||||
|
rescue OpenSSL::SSL::SSLError
|
||||||
|
close
|
||||||
|
raise
|
||||||
|
end
|
||||||
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -381,7 +492,7 @@ module Net
|
||||||
|
|
||||||
# Constructs and send the appropriate PORT (or EPRT) command
|
# Constructs and send the appropriate PORT (or EPRT) command
|
||||||
def sendport(host, port) # :nodoc:
|
def sendport(host, port) # :nodoc:
|
||||||
remote_address = @sock.remote_address
|
remote_address = @bare_sock.remote_address
|
||||||
if remote_address.ipv4?
|
if remote_address.ipv4?
|
||||||
cmd = "PORT " + (host.split(".") + port.divmod(256)).join(",")
|
cmd = "PORT " + (host.split(".") + port.divmod(256)).join(",")
|
||||||
elsif remote_address.ipv6?
|
elsif remote_address.ipv6?
|
||||||
|
@ -395,13 +506,13 @@ module Net
|
||||||
|
|
||||||
# Constructs a TCPServer socket
|
# Constructs a TCPServer socket
|
||||||
def makeport # :nodoc:
|
def makeport # :nodoc:
|
||||||
TCPServer.open(@sock.local_address.ip_address, 0)
|
TCPServer.open(@bare_sock.local_address.ip_address, 0)
|
||||||
end
|
end
|
||||||
private :makeport
|
private :makeport
|
||||||
|
|
||||||
# sends the appropriate command to enable a passive connection
|
# sends the appropriate command to enable a passive connection
|
||||||
def makepasv # :nodoc:
|
def makepasv # :nodoc:
|
||||||
if @sock.remote_address.ipv4?
|
if @bare_sock.remote_address.ipv4?
|
||||||
host, port = parse227(sendcmd("PASV"))
|
host, port = parse227(sendcmd("PASV"))
|
||||||
else
|
else
|
||||||
host, port = parse229(sendcmd("EPSV"))
|
host, port = parse229(sendcmd("EPSV"))
|
||||||
|
@ -445,14 +556,17 @@ module Net
|
||||||
if !resp.start_with?("1")
|
if !resp.start_with?("1")
|
||||||
raise FTPReplyError, resp
|
raise FTPReplyError, resp
|
||||||
end
|
end
|
||||||
conn = BufferedSocket.new(sock.accept, read_timeout: @read_timeout)
|
conn = sock.accept
|
||||||
sock.shutdown(Socket::SHUT_WR) rescue nil
|
sock.shutdown(Socket::SHUT_WR) rescue nil
|
||||||
sock.read rescue nil
|
sock.read rescue nil
|
||||||
ensure
|
ensure
|
||||||
sock.close
|
sock.close
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
return conn
|
if @private_data_connection
|
||||||
|
conn = start_tls_session(conn)
|
||||||
|
end
|
||||||
|
return BufferedSocket.new(conn, read_timeout: @read_timeout)
|
||||||
end
|
end
|
||||||
private :transfercmd
|
private :transfercmd
|
||||||
|
|
||||||
|
@ -1168,7 +1282,7 @@ module Net
|
||||||
def close
|
def close
|
||||||
if @sock and not @sock.closed?
|
if @sock and not @sock.closed?
|
||||||
begin
|
begin
|
||||||
@sock.shutdown(Socket::SHUT_WR) rescue nil
|
@bare_sock.shutdown(Socket::SHUT_WR) rescue nil
|
||||||
orig, self.read_timeout = self.read_timeout, 3
|
orig, self.read_timeout = self.read_timeout, 3
|
||||||
@sock.read rescue nil
|
@sock.read rescue nil
|
||||||
ensure
|
ensure
|
||||||
|
@ -1284,12 +1398,16 @@ module Net
|
||||||
end
|
end
|
||||||
|
|
||||||
class BufferedSocket < BufferedIO
|
class BufferedSocket < BufferedIO
|
||||||
[:local_address, :remote_address, :addr, :peeraddr, :send, :shutdown].each do |method|
|
[:local_address, :remote_address, :addr, :peeraddr, :send].each do |method|
|
||||||
define_method(method) { |*args|
|
define_method(method) { |*args|
|
||||||
@io.__send__(method, *args)
|
@io.__send__(method, *args)
|
||||||
}
|
}
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def shutdown(*args)
|
||||||
|
@io.to_io.shutdown(*args)
|
||||||
|
end
|
||||||
|
|
||||||
def read(len = nil)
|
def read(len = nil)
|
||||||
if len
|
if len
|
||||||
s = super(len, String.new, true)
|
s = super(len, String.new, true)
|
||||||
|
|
|
@ -8,6 +8,9 @@ require "tempfile"
|
||||||
|
|
||||||
class FTPTest < Test::Unit::TestCase
|
class FTPTest < Test::Unit::TestCase
|
||||||
SERVER_ADDR = "127.0.0.1"
|
SERVER_ADDR = "127.0.0.1"
|
||||||
|
CA_FILE = File.expand_path("../imap/cacert.pem", __dir__)
|
||||||
|
SERVER_KEY = File.expand_path("../imap/server.key", __dir__)
|
||||||
|
SERVER_CERT = File.expand_path("../imap/server.crt", __dir__)
|
||||||
|
|
||||||
def setup
|
def setup
|
||||||
@thread = nil
|
@thread = nil
|
||||||
|
@ -219,6 +222,62 @@ class FTPTest < Test::Unit::TestCase
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def test_implicit_login
|
||||||
|
commands = []
|
||||||
|
server = create_ftp_server { |sock|
|
||||||
|
sock.print("220 (test_ftp).\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("331 Please specify the password.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("332 Need account for login.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("230 Login successful.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 Switching to Binary mode.\r\n")
|
||||||
|
}
|
||||||
|
begin
|
||||||
|
begin
|
||||||
|
ftp = Net::FTP.new(SERVER_ADDR,
|
||||||
|
port: server.port,
|
||||||
|
user: "foo",
|
||||||
|
passwd: "bar",
|
||||||
|
acct: "baz")
|
||||||
|
assert_equal("USER foo\r\n", commands.shift)
|
||||||
|
assert_equal("PASS bar\r\n", commands.shift)
|
||||||
|
assert_equal("ACCT baz\r\n", commands.shift)
|
||||||
|
assert_equal("TYPE I\r\n", commands.shift)
|
||||||
|
assert_equal(nil, commands.shift)
|
||||||
|
ensure
|
||||||
|
ftp.close if ftp
|
||||||
|
end
|
||||||
|
ensure
|
||||||
|
server.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_s_open
|
||||||
|
commands = []
|
||||||
|
server = create_ftp_server { |sock|
|
||||||
|
sock.print("220 (test_ftp).\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("331 Please specify the password.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("230 Login successful.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 Switching to Binary mode.\r\n")
|
||||||
|
}
|
||||||
|
begin
|
||||||
|
Net::FTP.open(SERVER_ADDR, port: server.port, user: "anonymous") do
|
||||||
|
end
|
||||||
|
assert_equal("USER anonymous\r\n", commands.shift)
|
||||||
|
assert_equal("PASS anonymous@\r\n", commands.shift)
|
||||||
|
assert_equal("TYPE I\r\n", commands.shift)
|
||||||
|
assert_equal(nil, commands.shift)
|
||||||
|
ensure
|
||||||
|
server.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
# TODO: How can we test open_timeout? sleep before accept cannot delay
|
# TODO: How can we test open_timeout? sleep before accept cannot delay
|
||||||
# connections.
|
# connections.
|
||||||
def _test_open_timeout_exceeded
|
def _test_open_timeout_exceeded
|
||||||
|
@ -1644,6 +1703,362 @@ EOF
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
if defined?(OpenSSL::SSL)
|
||||||
|
def test_tls_unknown_ca
|
||||||
|
assert_raise(OpenSSL::SSL::SSLError) do
|
||||||
|
tls_test do |port|
|
||||||
|
begin
|
||||||
|
Net::FTP.new("localhost",
|
||||||
|
:port => port,
|
||||||
|
:ssl => true)
|
||||||
|
rescue SystemCallError
|
||||||
|
skip $!
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_tls_with_ca_file
|
||||||
|
assert_nothing_raised do
|
||||||
|
tls_test do |port|
|
||||||
|
begin
|
||||||
|
Net::FTP.new("localhost",
|
||||||
|
:port => port,
|
||||||
|
:ssl => { :ca_file => CA_FILE })
|
||||||
|
rescue SystemCallError
|
||||||
|
skip $!
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_tls_verify_none
|
||||||
|
assert_nothing_raised do
|
||||||
|
tls_test do |port|
|
||||||
|
Net::FTP.new(SERVER_ADDR,
|
||||||
|
:port => port,
|
||||||
|
:ssl => { :verify_mode => OpenSSL::SSL::VERIFY_NONE })
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_tls_post_connection_check
|
||||||
|
assert_raise(OpenSSL::SSL::SSLError) do
|
||||||
|
tls_test do |port|
|
||||||
|
# SERVER_ADDR is different from the hostname in the certificate,
|
||||||
|
# so the following code should raise a SSLError.
|
||||||
|
Net::FTP.new(SERVER_ADDR,
|
||||||
|
:port => port,
|
||||||
|
:ssl => { :ca_file => CA_FILE })
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_active_private_data_connection
|
||||||
|
server = TCPServer.new(SERVER_ADDR, 0)
|
||||||
|
port = server.addr[1]
|
||||||
|
commands = []
|
||||||
|
binary_data = (0..0xff).map {|i| i.chr}.join * 4 * 3
|
||||||
|
@thread = Thread.start do
|
||||||
|
sock = server.accept
|
||||||
|
begin
|
||||||
|
sock.print("220 (test_ftp).\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("234 AUTH success.\r\n")
|
||||||
|
ctx = OpenSSL::SSL::SSLContext.new
|
||||||
|
ctx.ca_file = CA_FILE
|
||||||
|
ctx.key = File.open(SERVER_KEY) { |f|
|
||||||
|
OpenSSL::PKey::RSA.new(f)
|
||||||
|
}
|
||||||
|
ctx.cert = File.open(SERVER_CERT) { |f|
|
||||||
|
OpenSSL::X509::Certificate.new(f)
|
||||||
|
}
|
||||||
|
sock = OpenSSL::SSL::SSLSocket.new(sock, ctx)
|
||||||
|
sock.sync_close = true
|
||||||
|
begin
|
||||||
|
sock.accept
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 PSBZ success.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 PROT success.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("331 Please specify the password.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("230 Login successful.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 Switching to Binary mode.\r\n")
|
||||||
|
line = sock.gets
|
||||||
|
commands.push(line)
|
||||||
|
port_args = line.slice(/\APORT (.*)/, 1).split(/,/)
|
||||||
|
host = port_args[0, 4].join(".")
|
||||||
|
port = port_args[4, 2].map(&:to_i).inject {|x, y| (x << 8) + y}
|
||||||
|
sock.print("200 PORT command successful.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("150 Opening BINARY mode data connection for foo (#{binary_data.size} bytes)\r\n")
|
||||||
|
conn = TCPSocket.new(host, port)
|
||||||
|
conn = OpenSSL::SSL::SSLSocket.new(conn, ctx)
|
||||||
|
conn.sync_close = true
|
||||||
|
conn.accept
|
||||||
|
binary_data.scan(/.{1,1024}/nm) do |s|
|
||||||
|
conn.print(s)
|
||||||
|
end
|
||||||
|
conn.close
|
||||||
|
sock.print("226 Transfer complete.\r\n")
|
||||||
|
rescue OpenSSL::SSL::SSLError
|
||||||
|
end
|
||||||
|
ensure
|
||||||
|
sock.close
|
||||||
|
server.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
ftp = Net::FTP.new("localhost",
|
||||||
|
port: port,
|
||||||
|
ssl: { ca_file: CA_FILE },
|
||||||
|
passive: false)
|
||||||
|
begin
|
||||||
|
assert_equal("AUTH TLS\r\n", commands.shift)
|
||||||
|
assert_equal("PBSZ 0\r\n", commands.shift)
|
||||||
|
assert_equal("PROT P\r\n", commands.shift)
|
||||||
|
ftp.login
|
||||||
|
assert_match(/\AUSER /, commands.shift)
|
||||||
|
assert_match(/\APASS /, commands.shift)
|
||||||
|
assert_equal("TYPE I\r\n", commands.shift)
|
||||||
|
buf = ftp.getbinaryfile("foo", nil)
|
||||||
|
assert_equal(binary_data, buf)
|
||||||
|
assert_equal(Encoding::ASCII_8BIT, buf.encoding)
|
||||||
|
assert_match(/\APORT /, commands.shift)
|
||||||
|
assert_equal("RETR foo\r\n", commands.shift)
|
||||||
|
assert_equal(nil, commands.shift)
|
||||||
|
ensure
|
||||||
|
ftp.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_passive_private_data_connection
|
||||||
|
server = TCPServer.new(SERVER_ADDR, 0)
|
||||||
|
port = server.addr[1]
|
||||||
|
commands = []
|
||||||
|
binary_data = (0..0xff).map {|i| i.chr}.join * 4 * 3
|
||||||
|
@thread = Thread.start do
|
||||||
|
sock = server.accept
|
||||||
|
begin
|
||||||
|
sock.print("220 (test_ftp).\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("234 AUTH success.\r\n")
|
||||||
|
ctx = OpenSSL::SSL::SSLContext.new
|
||||||
|
ctx.ca_file = CA_FILE
|
||||||
|
ctx.key = File.open(SERVER_KEY) { |f|
|
||||||
|
OpenSSL::PKey::RSA.new(f)
|
||||||
|
}
|
||||||
|
ctx.cert = File.open(SERVER_CERT) { |f|
|
||||||
|
OpenSSL::X509::Certificate.new(f)
|
||||||
|
}
|
||||||
|
sock = OpenSSL::SSL::SSLSocket.new(sock, ctx)
|
||||||
|
sock.sync_close = true
|
||||||
|
begin
|
||||||
|
sock.accept
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 PSBZ success.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 PROT success.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("331 Please specify the password.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("230 Login successful.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 Switching to Binary mode.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
data_server = TCPServer.new(SERVER_ADDR, 0)
|
||||||
|
port = data_server.local_address.ip_port
|
||||||
|
sock.printf("227 Entering Passive Mode (127,0,0,1,%s).\r\n",
|
||||||
|
port.divmod(256).join(","))
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("150 Opening BINARY mode data connection for foo (#{binary_data.size} bytes)\r\n")
|
||||||
|
conn = data_server.accept
|
||||||
|
conn = OpenSSL::SSL::SSLSocket.new(conn, ctx)
|
||||||
|
conn.sync_close = true
|
||||||
|
conn.accept
|
||||||
|
binary_data.scan(/.{1,1024}/nm) do |s|
|
||||||
|
conn.print(s)
|
||||||
|
end
|
||||||
|
conn.close
|
||||||
|
data_server.close
|
||||||
|
sock.print("226 Transfer complete.\r\n")
|
||||||
|
rescue OpenSSL::SSL::SSLError
|
||||||
|
end
|
||||||
|
ensure
|
||||||
|
sock.close
|
||||||
|
server.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
ftp = Net::FTP.new("localhost",
|
||||||
|
port: port,
|
||||||
|
ssl: { ca_file: CA_FILE },
|
||||||
|
passive: true)
|
||||||
|
begin
|
||||||
|
assert_equal("AUTH TLS\r\n", commands.shift)
|
||||||
|
assert_equal("PBSZ 0\r\n", commands.shift)
|
||||||
|
assert_equal("PROT P\r\n", commands.shift)
|
||||||
|
ftp.login
|
||||||
|
assert_match(/\AUSER /, commands.shift)
|
||||||
|
assert_match(/\APASS /, commands.shift)
|
||||||
|
assert_equal("TYPE I\r\n", commands.shift)
|
||||||
|
buf = ftp.getbinaryfile("foo", nil)
|
||||||
|
assert_equal(binary_data, buf)
|
||||||
|
assert_equal(Encoding::ASCII_8BIT, buf.encoding)
|
||||||
|
assert_equal("PASV\r\n", commands.shift)
|
||||||
|
assert_equal("RETR foo\r\n", commands.shift)
|
||||||
|
assert_equal(nil, commands.shift)
|
||||||
|
ensure
|
||||||
|
ftp.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_active_clear_data_connection
|
||||||
|
server = TCPServer.new(SERVER_ADDR, 0)
|
||||||
|
port = server.addr[1]
|
||||||
|
commands = []
|
||||||
|
binary_data = (0..0xff).map {|i| i.chr}.join * 4 * 3
|
||||||
|
@thread = Thread.start do
|
||||||
|
sock = server.accept
|
||||||
|
begin
|
||||||
|
sock.print("220 (test_ftp).\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("234 AUTH success.\r\n")
|
||||||
|
ctx = OpenSSL::SSL::SSLContext.new
|
||||||
|
ctx.ca_file = CA_FILE
|
||||||
|
ctx.key = File.open(SERVER_KEY) { |f|
|
||||||
|
OpenSSL::PKey::RSA.new(f)
|
||||||
|
}
|
||||||
|
ctx.cert = File.open(SERVER_CERT) { |f|
|
||||||
|
OpenSSL::X509::Certificate.new(f)
|
||||||
|
}
|
||||||
|
sock = OpenSSL::SSL::SSLSocket.new(sock, ctx)
|
||||||
|
sock.sync_close = true
|
||||||
|
begin
|
||||||
|
sock.accept
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("331 Please specify the password.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("230 Login successful.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 Switching to Binary mode.\r\n")
|
||||||
|
line = sock.gets
|
||||||
|
commands.push(line)
|
||||||
|
port_args = line.slice(/\APORT (.*)/, 1).split(/,/)
|
||||||
|
host = port_args[0, 4].join(".")
|
||||||
|
port = port_args[4, 2].map(&:to_i).inject {|x, y| (x << 8) + y}
|
||||||
|
sock.print("200 PORT command successful.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("150 Opening BINARY mode data connection for foo (#{binary_data.size} bytes)\r\n")
|
||||||
|
conn = TCPSocket.new(host, port)
|
||||||
|
binary_data.scan(/.{1,1024}/nm) do |s|
|
||||||
|
conn.print(s)
|
||||||
|
end
|
||||||
|
conn.close
|
||||||
|
sock.print("226 Transfer complete.\r\n")
|
||||||
|
rescue OpenSSL::SSL::SSLError
|
||||||
|
end
|
||||||
|
ensure
|
||||||
|
sock.close
|
||||||
|
server.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
ftp = Net::FTP.new("localhost",
|
||||||
|
port: port,
|
||||||
|
ssl: { ca_file: CA_FILE },
|
||||||
|
private_data_connection: false,
|
||||||
|
passive: false)
|
||||||
|
begin
|
||||||
|
assert_equal("AUTH TLS\r\n", commands.shift)
|
||||||
|
ftp.login
|
||||||
|
assert_match(/\AUSER /, commands.shift)
|
||||||
|
assert_match(/\APASS /, commands.shift)
|
||||||
|
assert_equal("TYPE I\r\n", commands.shift)
|
||||||
|
buf = ftp.getbinaryfile("foo", nil)
|
||||||
|
assert_equal(binary_data, buf)
|
||||||
|
assert_equal(Encoding::ASCII_8BIT, buf.encoding)
|
||||||
|
assert_match(/\APORT /, commands.shift)
|
||||||
|
assert_equal("RETR foo\r\n", commands.shift)
|
||||||
|
assert_equal(nil, commands.shift)
|
||||||
|
ensure
|
||||||
|
ftp.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_passive_clear_data_connection
|
||||||
|
server = TCPServer.new(SERVER_ADDR, 0)
|
||||||
|
port = server.addr[1]
|
||||||
|
commands = []
|
||||||
|
binary_data = (0..0xff).map {|i| i.chr}.join * 4 * 3
|
||||||
|
@thread = Thread.start do
|
||||||
|
sock = server.accept
|
||||||
|
begin
|
||||||
|
sock.print("220 (test_ftp).\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("234 AUTH success.\r\n")
|
||||||
|
ctx = OpenSSL::SSL::SSLContext.new
|
||||||
|
ctx.ca_file = CA_FILE
|
||||||
|
ctx.key = File.open(SERVER_KEY) { |f|
|
||||||
|
OpenSSL::PKey::RSA.new(f)
|
||||||
|
}
|
||||||
|
ctx.cert = File.open(SERVER_CERT) { |f|
|
||||||
|
OpenSSL::X509::Certificate.new(f)
|
||||||
|
}
|
||||||
|
sock = OpenSSL::SSL::SSLSocket.new(sock, ctx)
|
||||||
|
sock.sync_close = true
|
||||||
|
begin
|
||||||
|
sock.accept
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("331 Please specify the password.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("230 Login successful.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 Switching to Binary mode.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
data_server = TCPServer.new(SERVER_ADDR, 0)
|
||||||
|
port = data_server.local_address.ip_port
|
||||||
|
sock.printf("227 Entering Passive Mode (127,0,0,1,%s).\r\n",
|
||||||
|
port.divmod(256).join(","))
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("150 Opening BINARY mode data connection for foo (#{binary_data.size} bytes)\r\n")
|
||||||
|
conn = data_server.accept
|
||||||
|
binary_data.scan(/.{1,1024}/nm) do |s|
|
||||||
|
conn.print(s)
|
||||||
|
end
|
||||||
|
conn.close
|
||||||
|
data_server.close
|
||||||
|
sock.print("226 Transfer complete.\r\n")
|
||||||
|
rescue OpenSSL::SSL::SSLError
|
||||||
|
end
|
||||||
|
ensure
|
||||||
|
sock.close
|
||||||
|
server.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
ftp = Net::FTP.new("localhost",
|
||||||
|
port: port,
|
||||||
|
ssl: { ca_file: CA_FILE },
|
||||||
|
private_data_connection: false,
|
||||||
|
passive: true)
|
||||||
|
begin
|
||||||
|
assert_equal("AUTH TLS\r\n", commands.shift)
|
||||||
|
ftp.login
|
||||||
|
assert_match(/\AUSER /, commands.shift)
|
||||||
|
assert_match(/\APASS /, commands.shift)
|
||||||
|
assert_equal("TYPE I\r\n", commands.shift)
|
||||||
|
buf = ftp.getbinaryfile("foo", nil)
|
||||||
|
assert_equal(binary_data, buf)
|
||||||
|
assert_equal(Encoding::ASCII_8BIT, buf.encoding)
|
||||||
|
assert_equal("PASV\r\n", commands.shift)
|
||||||
|
assert_equal("RETR foo\r\n", commands.shift)
|
||||||
|
assert_equal(nil, commands.shift)
|
||||||
|
ensure
|
||||||
|
ftp.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
private
|
private
|
||||||
|
|
||||||
def create_ftp_server(sleep_time = nil)
|
def create_ftp_server(sleep_time = nil)
|
||||||
|
@ -1667,4 +2082,45 @@ EOF
|
||||||
end
|
end
|
||||||
return server
|
return server
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def tls_test
|
||||||
|
server = TCPServer.new(SERVER_ADDR, 0)
|
||||||
|
port = server.addr[1]
|
||||||
|
commands = []
|
||||||
|
@thread = Thread.start do
|
||||||
|
sock = server.accept
|
||||||
|
begin
|
||||||
|
sock.print("220 (test_ftp).\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("234 AUTH success.\r\n")
|
||||||
|
ctx = OpenSSL::SSL::SSLContext.new
|
||||||
|
ctx.ca_file = CA_FILE
|
||||||
|
ctx.key = File.open(SERVER_KEY) { |f|
|
||||||
|
OpenSSL::PKey::RSA.new(f)
|
||||||
|
}
|
||||||
|
ctx.cert = File.open(SERVER_CERT) { |f|
|
||||||
|
OpenSSL::X509::Certificate.new(f)
|
||||||
|
}
|
||||||
|
sock = OpenSSL::SSL::SSLSocket.new(sock, ctx)
|
||||||
|
sock.sync_close = true
|
||||||
|
begin
|
||||||
|
sock.accept
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 PSBZ success.\r\n")
|
||||||
|
commands.push(sock.gets)
|
||||||
|
sock.print("200 PROT success.\r\n")
|
||||||
|
rescue OpenSSL::SSL::SSLError
|
||||||
|
end
|
||||||
|
ensure
|
||||||
|
sock.close
|
||||||
|
server.close
|
||||||
|
end
|
||||||
|
end
|
||||||
|
ftp = yield(port)
|
||||||
|
ftp.close
|
||||||
|
|
||||||
|
assert_equal("AUTH TLS\r\n", commands.shift)
|
||||||
|
assert_equal("PBSZ 0\r\n", commands.shift)
|
||||||
|
assert_equal("PROT P\r\n", commands.shift)
|
||||||
|
end
|
||||||
end
|
end
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue