View Javadoc
1   /*
2    * This file is part of Waarp Project (named also Waarp or GG).
3    *
4    *  Copyright (c) 2019, Waarp SAS, and individual contributors by the @author
5    *  tags. See the COPYRIGHT.txt in the distribution for a full listing of
6    * individual contributors.
7    *
8    *  All Waarp Project is free software: you can redistribute it and/or
9    * modify it under the terms of the GNU General Public License as published by
10   * the Free Software Foundation, either version 3 of the License, or (at your
11   * option) any later version.
12   *
13   * Waarp is distributed in the hope that it will be useful, but WITHOUT ANY
14   * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
15   * A PARTICULAR PURPOSE. See the GNU General Public License for more details.
16   *
17   *  You should have received a copy of the GNU General Public License along with
18   * Waarp . If not, see <http://www.gnu.org/licenses/>.
19   */
20  package org.waarp.ftp.core.command.rfc4217;
21  
22  import org.waarp.common.command.ReplyCode;
23  import org.waarp.common.command.exception.CommandAbstractException;
24  import org.waarp.common.command.exception.Reply501Exception;
25  import org.waarp.common.command.exception.Reply503Exception;
26  import org.waarp.common.command.exception.Reply504Exception;
27  import org.waarp.ftp.core.command.AbstractCommand;
28  import org.waarp.ftp.core.command.FtpCommandCode;
29  
30  /**
31   * PROT command accepting only C or P argument
32   */
33  public class PROT extends AbstractCommand {
34  
35    @Override
36    public final void exec() throws CommandAbstractException {
37      if (!getSession().isSslReady()) {
38        // Not in SSL
39        throw new Reply503Exception("Session not using SSL / TLS");
40      }
41      // First Check if any argument
42      if (!hasArg()) {
43        // Error since argument is needed
44        throw new Reply501Exception("Missing Parameter: P or C");
45      }
46      final String[] types = getArgs();
47      if ("P".equalsIgnoreCase(types[0])) {
48        if (getSession().isDataSsl() &&
49            getSession().getConfiguration().getFtpInternalConfiguration()
50                        .isAcceptAuthProt()) {
51          // Already SSL
52          throw new Reply503Exception("Data already using SSL / TLS");
53        }
54        // Data will have SSL
55        getSession().setDataSsl(true);
56        getSession().setReplyCode(ReplyCode.REPLY_200_COMMAND_OKAY, null);
57      } else if ("C".equalsIgnoreCase(types[0]) &&
58                 !getSession().getConfiguration().getFtpInternalConfiguration()
59                              .isAcceptAuthProt()) {
60        if (!getSession().isDataSsl()) {
61          // Not in SSL
62          throw new Reply503Exception("Data already not using SSL / TLS");
63        }
64        getSession().setDataSsl(false);
65        getSession().setReplyCode(ReplyCode.REPLY_200_COMMAND_OKAY, null);
66      } else if (!getSession().getConfiguration().getFtpInternalConfiguration()
67                              .isAcceptAuthProt()) {
68        throw new Reply503Exception(
69            "Data is using SSL / TLS and cannot be removed due to Implicit mode");
70      } else {
71        throw new Reply504Exception("Unknown Parameter: " + types[0]);
72      }
73      if (!getSession().getAuth().isIdentified()) {
74        setExtraNextCommand(FtpCommandCode.AUTH);
75      }
76    }
77  
78  }