blob: 50b2da10df15db7bff34497375a697bb828d204c [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
2# If we end up with a significant number of tests that don't require
3# threading, this test module should be split. Right now we skip
4# them all if we don't have threading.
5threading = support.import_module('threading')
6
7from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00008import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00009import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +000010import socketserver
Tim Peters108b7912002-07-31 16:42:33 +000011import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000012import calendar
Martin v. Löwisea752fb2002-01-05 11:31:49 +000013
Alexander Belopolsky2420d832012-04-29 15:56:49 -040014from test.support import reap_threads, verbose, transient_internet, run_with_tz
Christian Heimesf6cd9672008-03-26 13:45:42 +000015import unittest
Piers Lauderf0a70f62002-06-17 07:06:24 +000016
R. David Murraye8dc2582009-12-10 02:08:06 +000017try:
18 import ssl
19except ImportError:
20 ssl = None
21
22CERTFILE = None
23
Martin v. Löwisea752fb2002-01-05 11:31:49 +000024
Christian Heimesf6cd9672008-03-26 13:45:42 +000025class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000026
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000027 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000028 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000029 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000030 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
31 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000032 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000033 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
34 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000035 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000036 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
37 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000038
Alexander Belopolsky2420d832012-04-29 15:56:49 -040039 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
40 def test_Internaldate2tuple_issue10941(self):
41 self.assertNotEqual(imaplib.Internaldate2tuple(
42 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
43 imaplib.Internaldate2tuple(
44 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
45
Christian Heimesf6cd9672008-03-26 13:45:42 +000046 def test_that_Time2Internaldate_returns_a_result(self):
47 # We can check only that it successfully produces a result,
48 # not the correctness of the result itself, since the result
49 # depends on the timezone the machine is in.
50 timevalues = [2000000000, 2000000000.0, time.localtime(2000000000),
51 '"18-May-2033 05:33:20 +0200"']
52
53 for t in timevalues:
54 imaplib.Time2Internaldate(t)
55
56
R. David Murraye8dc2582009-12-10 02:08:06 +000057if ssl:
58
59 class SecureTCPServer(socketserver.TCPServer):
60
61 def get_request(self):
62 newsocket, fromaddr = self.socket.accept()
63 connstream = ssl.wrap_socket(newsocket,
64 server_side=True,
65 certfile=CERTFILE)
66 return connstream, fromaddr
67
68 IMAP4_SSL = imaplib.IMAP4_SSL
69
70else:
71
72 class SecureTCPServer:
73 pass
74
75 IMAP4_SSL = None
76
77
78class SimpleIMAPHandler(socketserver.StreamRequestHandler):
79
80 timeout = 1
81
82 def _send(self, message):
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +000083 if verbose: print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +000084 self.wfile.write(message)
85
86 def handle(self):
87 # Send a welcome message.
88 self._send(b'* OK IMAP4rev1\r\n')
89 while 1:
90 # Gather up input until we receive a line terminator or we timeout.
91 # Accumulate read(1) because it's simpler to handle the differences
92 # between naked sockets and SSL sockets.
93 line = b''
94 while 1:
95 try:
96 part = self.rfile.read(1)
97 if part == b'':
98 # Naked sockets return empty strings..
99 return
100 line += part
101 except IOError:
102 # ..but SSLSockets throw exceptions.
103 return
104 if line.endswith(b'\r\n'):
105 break
106
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +0000107 if verbose: print('GOT: %r' % line.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000108 splitline = line.split()
109 tag = splitline[0].decode('ASCII')
110 cmd = splitline[1].decode('ASCII')
111 args = splitline[2:]
112
113 if hasattr(self, 'cmd_'+cmd):
114 getattr(self, 'cmd_'+cmd)(tag, args)
115 else:
116 self._send('{} BAD {} unknown\r\n'.format(tag, cmd).encode('ASCII'))
117
118 def cmd_CAPABILITY(self, tag, args):
119 self._send(b'* CAPABILITY IMAP4rev1\r\n')
120 self._send('{} OK CAPABILITY completed\r\n'.format(tag).encode('ASCII'))
121
122
123class BaseThreadedNetworkedTests(unittest.TestCase):
124
125 def make_server(self, addr, hdlr):
126
127 class MyServer(self.server_class):
128 def handle_error(self, request, client_address):
129 self.close_request(request)
130 self.server_close()
131 raise
132
133 if verbose: print("creating server")
134 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000135 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000136
137 if verbose:
138 print("server created")
139 print("ADDR =", addr)
140 print("CLASS =", self.server_class)
141 print("HDLR =", server.RequestHandlerClass)
142
143 t = threading.Thread(
144 name='%s serving' % self.server_class,
145 target=server.serve_forever,
146 # Short poll interval to make the test finish quickly.
147 # Time between requests is short enough that we won't wake
148 # up spuriously too many times.
149 kwargs={'poll_interval':0.01})
150 t.daemon = True # In case this function raises.
151 t.start()
152 if verbose: print("server running")
153 return server, t
154
155 def reap_server(self, server, thread):
156 if verbose: print("waiting for server")
157 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000158 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000159 thread.join()
160 if verbose: print("done")
161
162 @contextmanager
163 def reaped_server(self, hdlr):
164 server, thread = self.make_server((support.HOST, 0), hdlr)
165 try:
166 yield server
167 finally:
168 self.reap_server(server, thread)
169
170 @reap_threads
171 def test_connect(self):
172 with self.reaped_server(SimpleIMAPHandler) as server:
173 client = self.imap_class(*server.server_address)
174 client.shutdown()
175
176 @reap_threads
177 def test_issue5949(self):
178
179 class EOFHandler(socketserver.StreamRequestHandler):
180 def handle(self):
181 # EOF without sending a complete welcome message.
182 self.wfile.write(b'* OK')
183
184 with self.reaped_server(EOFHandler) as server:
185 self.assertRaises(imaplib.IMAP4.abort,
186 self.imap_class, *server.server_address)
187
188 @reap_threads
189 def test_line_termination(self):
190
191 class BadNewlineHandler(SimpleIMAPHandler):
192
193 def cmd_CAPABILITY(self, tag, args):
194 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
195 self._send('{} OK CAPABILITY completed\r\n'.format(tag).encode('ASCII'))
196
197 with self.reaped_server(BadNewlineHandler) as server:
198 self.assertRaises(imaplib.IMAP4.abort,
199 self.imap_class, *server.server_address)
200
201
202
203class ThreadedNetworkedTests(BaseThreadedNetworkedTests):
204
205 server_class = socketserver.TCPServer
206 imap_class = imaplib.IMAP4
207
208
209@unittest.skipUnless(ssl, "SSL not available")
210class ThreadedNetworkedTestsSSL(BaseThreadedNetworkedTests):
211
212 server_class = SecureTCPServer
213 imap_class = IMAP4_SSL
214
215
Antoine Pitroub1436f12010-11-09 22:55:55 +0000216class RemoteIMAPTest(unittest.TestCase):
217 host = 'cyrus.andrew.cmu.edu'
218 port = 143
219 username = 'anonymous'
220 password = 'pass'
221 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000222
Antoine Pitroub1436f12010-11-09 22:55:55 +0000223 def setUp(self):
224 with transient_internet(self.host):
225 self.server = self.imap_class(self.host, self.port)
226
227 def tearDown(self):
228 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100229 with transient_internet(self.host):
230 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000231
232 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100233 with transient_internet(self.host):
234 for cap in self.server.capabilities:
235 self.assertIsInstance(cap, str)
236 self.assertTrue('LOGINDISABLED' in self.server.capabilities)
237 self.assertTrue('AUTH=ANONYMOUS' in self.server.capabilities)
238 rs = self.server.login(self.username, self.password)
239 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000240
241 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100242 with transient_internet(self.host):
243 rs = self.server.logout()
244 self.server = None
245 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000246
247
248@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000249class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
250
251 def setUp(self):
252 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100253 with transient_internet(self.host):
254 rs = self.server.starttls()
255 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000256
257 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000258 for cap in self.server.capabilities:
259 self.assertIsInstance(cap, str)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000260 self.assertFalse('LOGINDISABLED' in self.server.capabilities)
261
262
263@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000264class RemoteIMAP_SSLTest(RemoteIMAPTest):
265 port = 993
266 imap_class = IMAP4_SSL
267
Antoine Pitrou08728162011-05-06 18:49:52 +0200268 def setUp(self):
269 pass
270
271 def tearDown(self):
272 pass
273
274 def create_ssl_context(self):
275 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
276 ssl_context.load_cert_chain(CERTFILE)
277 return ssl_context
278
279 def check_logincapa(self, server):
280 try:
281 for cap in server.capabilities:
282 self.assertIsInstance(cap, str)
283 self.assertFalse('LOGINDISABLED' in server.capabilities)
284 self.assertTrue('AUTH=PLAIN' in server.capabilities)
285 rs = server.login(self.username, self.password)
286 self.assertEqual(rs[0], 'OK')
287 finally:
288 server.logout()
289
Antoine Pitroub1436f12010-11-09 22:55:55 +0000290 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200291 with transient_internet(self.host):
292 _server = self.imap_class(self.host, self.port)
293 self.check_logincapa(_server)
294
295 def test_logincapa_with_client_certfile(self):
296 with transient_internet(self.host):
297 _server = self.imap_class(self.host, self.port, certfile=CERTFILE)
298 self.check_logincapa(_server)
299
300 def test_logincapa_with_client_ssl_context(self):
301 with transient_internet(self.host):
302 _server = self.imap_class(self.host, self.port, ssl_context=self.create_ssl_context())
303 self.check_logincapa(_server)
304
305 def test_logout(self):
306 with transient_internet(self.host):
307 _server = self.imap_class(self.host, self.port)
308 rs = _server.logout()
309 self.assertEqual(rs[0], 'BYE')
310
311 def test_ssl_context_certfile_exclusive(self):
312 with transient_internet(self.host):
313 self.assertRaises(ValueError, self.imap_class, self.host, self.port,
314 certfile=CERTFILE, ssl_context=self.create_ssl_context())
315
316 def test_ssl_context_keyfile_exclusive(self):
317 with transient_internet(self.host):
318 self.assertRaises(ValueError, self.imap_class, self.host, self.port,
319 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitroub1436f12010-11-09 22:55:55 +0000320
321
322def test_main():
R. David Murraye8dc2582009-12-10 02:08:06 +0000323 tests = [TestImaplib]
324
325 if support.is_resource_enabled('network'):
326 if ssl:
327 global CERTFILE
328 CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir,
329 "keycert.pem")
330 if not os.path.exists(CERTFILE):
331 raise support.TestFailed("Can't read certificate files!")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000332 tests.extend([
333 ThreadedNetworkedTests, ThreadedNetworkedTestsSSL,
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000334 RemoteIMAPTest, RemoteIMAP_SSLTest, RemoteIMAP_STARTTLSTest,
Antoine Pitroub1436f12010-11-09 22:55:55 +0000335 ])
R. David Murraye8dc2582009-12-10 02:08:06 +0000336
337 support.run_unittest(*tests)
Christian Heimesf6cd9672008-03-26 13:45:42 +0000338
339
340if __name__ == "__main__":
R. David Murraye8dc2582009-12-10 02:08:06 +0000341 support.use_resources = ['network']
342 test_main()