blob: 91aa77126a28c1d1e499090c0b076f389efbdacf [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
R. David Murraye8dc2582009-12-10 02:08:06 +00002
3from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00004import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00005import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +00006import socketserver
Tim Peters108b7912002-07-31 16:42:33 +00007import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +00008import calendar
Antoine Pitroua6a4dc82017-09-07 18:56:24 +02009import threading
Matěj Cepl3dc67d02019-02-12 19:30:19 +010010import socket
Martin v. Löwisea752fb2002-01-05 11:31:49 +000011
Antoine Pitroucac9e712014-07-31 18:35:45 -040012from test.support import (reap_threads, verbose, transient_internet,
Christian Heimesc64a1a62019-09-25 16:30:20 +020013 run_with_tz, run_with_locale, cpython_only,
14 requires_hashdigest)
Christian Heimesf6cd9672008-03-26 13:45:42 +000015import unittest
R David Murrayb079c072016-12-24 21:32:26 -050016from unittest import mock
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040017from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000018try:
19 import ssl
20except ImportError:
21 ssl = None
22
Antoine Pitroucac9e712014-07-31 18:35:45 -040023CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
24CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000025
Martin v. Löwisea752fb2002-01-05 11:31:49 +000026
Christian Heimesf6cd9672008-03-26 13:45:42 +000027class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000028
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000029 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000030 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000031 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000032 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
33 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000034 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000035 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
36 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000037 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000038 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
39 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000040
Alexander Belopolsky2420d832012-04-29 15:56:49 -040041 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
42 def test_Internaldate2tuple_issue10941(self):
43 self.assertNotEqual(imaplib.Internaldate2tuple(
44 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040045 imaplib.Internaldate2tuple(
46 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040047
48 def timevalues(self):
49 return [2000000000, 2000000000.0, time.localtime(2000000000),
50 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
51 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040052 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040053 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040054 '"18-May-2033 05:33:20 +0200"']
55
56 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
Martin Panter6e0889f2015-11-16 07:21:38 +000057 # DST rules included to work around quirk where the Gnu C library may not
58 # otherwise restore the previous time zone
59 @run_with_tz('STD-1DST,M3.2.0,M11.1.0')
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040060 def test_Time2Internaldate(self):
61 expected = '"18-May-2033 05:33:20 +0200"'
62
63 for t in self.timevalues():
64 internal = imaplib.Time2Internaldate(t)
65 self.assertEqual(internal, expected)
66
67 def test_that_Time2Internaldate_returns_a_result(self):
68 # Without tzset, we can check only that it successfully
69 # produces a result, not the correctness of the result itself,
70 # since the result depends on the timezone the machine is in.
71 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000072 imaplib.Time2Internaldate(t)
73
Berker Peksage4dcbbd2018-08-07 05:12:18 +030074 def test_imap4_host_default_value(self):
Matěj Cepl3dc67d02019-02-12 19:30:19 +010075 # Check whether the IMAP4_PORT is truly unavailable.
76 with socket.socket() as s:
77 try:
78 s.connect(('', imaplib.IMAP4_PORT))
79 self.skipTest(
80 "Cannot run the test with local IMAP server running.")
81 except socket.error:
82 pass
83
Victor Stinner3c7931e2019-04-15 12:34:53 +020084 # This is the exception that should be raised.
85 expected_errnos = support.get_socket_conn_refused_errs()
Berker Peksage4dcbbd2018-08-07 05:12:18 +030086 with self.assertRaises(OSError) as cm:
87 imaplib.IMAP4()
88 self.assertIn(cm.exception.errno, expected_errnos)
89
Christian Heimesf6cd9672008-03-26 13:45:42 +000090
R. David Murraye8dc2582009-12-10 02:08:06 +000091if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000092 class SecureTCPServer(socketserver.TCPServer):
93
94 def get_request(self):
95 newsocket, fromaddr = self.socket.accept()
Christian Heimesd0486372016-09-10 23:23:33 +020096 context = ssl.SSLContext()
97 context.load_cert_chain(CERTFILE)
98 connstream = context.wrap_socket(newsocket, server_side=True)
R. David Murraye8dc2582009-12-10 02:08:06 +000099 return connstream, fromaddr
100
101 IMAP4_SSL = imaplib.IMAP4_SSL
102
103else:
104
105 class SecureTCPServer:
106 pass
107
108 IMAP4_SSL = None
109
110
111class SimpleIMAPHandler(socketserver.StreamRequestHandler):
Victor Stinner07871b22019-12-10 20:32:59 +0100112 timeout = support.LOOPBACK_TIMEOUT
R David Murray774a39f2013-02-19 12:17:31 -0500113 continuation = None
114 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +0000115
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300116 def setup(self):
117 super().setup()
118 self.server.logged = None
119
R. David Murraye8dc2582009-12-10 02:08:06 +0000120 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400121 if verbose:
122 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000123 self.wfile.write(message)
124
R David Murray774a39f2013-02-19 12:17:31 -0500125 def _send_line(self, message):
126 self._send(message + b'\r\n')
127
128 def _send_textline(self, message):
129 self._send_line(message.encode('ASCII'))
130
131 def _send_tagged(self, tag, code, message):
132 self._send_textline(' '.join((tag, code, message)))
133
R. David Murraye8dc2582009-12-10 02:08:06 +0000134 def handle(self):
135 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500136 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000137 while 1:
138 # Gather up input until we receive a line terminator or we timeout.
139 # Accumulate read(1) because it's simpler to handle the differences
140 # between naked sockets and SSL sockets.
141 line = b''
142 while 1:
143 try:
144 part = self.rfile.read(1)
145 if part == b'':
146 # Naked sockets return empty strings..
147 return
148 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200149 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200150 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000151 return
152 if line.endswith(b'\r\n'):
153 break
154
Antoine Pitroucac9e712014-07-31 18:35:45 -0400155 if verbose:
156 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500157 if self.continuation:
158 try:
159 self.continuation.send(line)
160 except StopIteration:
161 self.continuation = None
162 continue
163 splitline = line.decode('ASCII').split()
164 tag = splitline[0]
165 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000166 args = splitline[2:]
167
Antoine Pitroucac9e712014-07-31 18:35:45 -0400168 if hasattr(self, 'cmd_' + cmd):
169 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500170 if continuation:
171 self.continuation = continuation
172 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000173 else:
R David Murray774a39f2013-02-19 12:17:31 -0500174 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000175
176 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400177 caps = ('IMAP4rev1 ' + self.capabilities
178 if self.capabilities
179 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500180 self._send_textline('* CAPABILITY ' + caps)
181 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
182
183 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300184 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500185 self._send_textline('* BYE IMAP4ref1 Server logging out')
186 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000187
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300188 def cmd_LOGIN(self, tag, args):
189 self.server.logged = args[0]
190 self._send_tagged(tag, 'OK', 'LOGIN completed')
191
R. David Murraye8dc2582009-12-10 02:08:06 +0000192
R David Murrayb079c072016-12-24 21:32:26 -0500193class NewIMAPTestsMixin():
194 client = None
195
196 def _setup(self, imap_handler, connect=True):
197 """
198 Sets up imap_handler for tests. imap_handler should inherit from either:
199 - SimpleIMAPHandler - for testing IMAP commands,
200 - socketserver.StreamRequestHandler - if raw access to stream is needed.
201 Returns (client, server).
202 """
203 class TestTCPServer(self.server_class):
204 def handle_error(self, request, client_address):
205 """
206 End request and raise the error if one occurs.
207 """
208 self.close_request(request)
209 self.server_close()
210 raise
211
212 self.addCleanup(self._cleanup)
213 self.server = self.server_class((support.HOST, 0), imap_handler)
214 self.thread = threading.Thread(
215 name=self._testMethodName+'-server',
216 target=self.server.serve_forever,
217 # Short poll interval to make the test finish quickly.
218 # Time between requests is short enough that we won't wake
219 # up spuriously too many times.
220 kwargs={'poll_interval': 0.01})
221 self.thread.daemon = True # In case this function raises.
222 self.thread.start()
223
224 if connect:
225 self.client = self.imap_class(*self.server.server_address)
226
227 return self.client, self.server
228
229 def _cleanup(self):
230 """
231 Cleans up the test server. This method should not be called manually,
232 it is added to the cleanup queue in the _setup method already.
233 """
234 # if logout was called already we'd raise an exception trying to
235 # shutdown the client once again
236 if self.client is not None and self.client.state != 'LOGOUT':
237 self.client.shutdown()
238 # cleanup the server
239 self.server.shutdown()
240 self.server.server_close()
Victor Stinnerbbc8b792019-12-10 20:41:23 +0100241 support.join_thread(self.thread)
Victor Stinnerb9b69002017-09-14 14:40:56 -0700242 # Explicitly clear the attribute to prevent dangling thread
243 self.thread = None
R David Murrayb079c072016-12-24 21:32:26 -0500244
245 def test_EOF_without_complete_welcome_message(self):
246 # http://bugs.python.org/issue5949
247 class EOFHandler(socketserver.StreamRequestHandler):
248 def handle(self):
249 self.wfile.write(b'* OK')
250 _, server = self._setup(EOFHandler, connect=False)
251 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
252 *server.server_address)
253
254 def test_line_termination(self):
255 class BadNewlineHandler(SimpleIMAPHandler):
256 def cmd_CAPABILITY(self, tag, args):
257 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
258 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
259 _, server = self._setup(BadNewlineHandler, connect=False)
260 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
261 *server.server_address)
262
263 def test_enable_raises_error_if_not_AUTH(self):
264 class EnableHandler(SimpleIMAPHandler):
265 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
266 client, _ = self._setup(EnableHandler)
267 self.assertFalse(client.utf8_enabled)
268 with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
269 client.enable('foo')
270 self.assertFalse(client.utf8_enabled)
271
272 def test_enable_raises_error_if_no_capability(self):
273 client, _ = self._setup(SimpleIMAPHandler)
274 with self.assertRaisesRegex(imaplib.IMAP4.error,
275 'does not support ENABLE'):
276 client.enable('foo')
277
278 def test_enable_UTF8_raises_error_if_not_supported(self):
279 client, _ = self._setup(SimpleIMAPHandler)
280 typ, data = client.login('user', 'pass')
281 self.assertEqual(typ, 'OK')
282 with self.assertRaisesRegex(imaplib.IMAP4.error,
283 'does not support ENABLE'):
284 client.enable('UTF8=ACCEPT')
285
286 def test_enable_UTF8_True_append(self):
287 class UTF8AppendServer(SimpleIMAPHandler):
288 capabilities = 'ENABLE UTF8=ACCEPT'
289 def cmd_ENABLE(self, tag, args):
290 self._send_tagged(tag, 'OK', 'ENABLE successful')
291 def cmd_AUTHENTICATE(self, tag, args):
292 self._send_textline('+')
293 self.server.response = yield
294 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
295 def cmd_APPEND(self, tag, args):
296 self._send_textline('+')
297 self.server.response = yield
298 self._send_tagged(tag, 'OK', 'okay')
299 client, server = self._setup(UTF8AppendServer)
300 self.assertEqual(client._encoding, 'ascii')
301 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
302 self.assertEqual(code, 'OK')
303 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
304 code, _ = client.enable('UTF8=ACCEPT')
305 self.assertEqual(code, 'OK')
306 self.assertEqual(client._encoding, 'utf-8')
307 msg_string = 'Subject: üñí©öðé'
308 typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
309 self.assertEqual(typ, 'OK')
310 self.assertEqual(server.response,
311 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
312
313 def test_search_disallows_charset_in_utf8_mode(self):
314 class UTF8Server(SimpleIMAPHandler):
315 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
316 def cmd_ENABLE(self, tag, args):
317 self._send_tagged(tag, 'OK', 'ENABLE successful')
318 def cmd_AUTHENTICATE(self, tag, args):
319 self._send_textline('+')
320 self.server.response = yield
321 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
322 client, _ = self._setup(UTF8Server)
323 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
324 self.assertEqual(typ, 'OK')
325 typ, _ = client.enable('UTF8=ACCEPT')
326 self.assertEqual(typ, 'OK')
327 self.assertTrue(client.utf8_enabled)
328 with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
329 client.search('foo', 'bar')
330
331 def test_bad_auth_name(self):
332 class MyServer(SimpleIMAPHandler):
333 def cmd_AUTHENTICATE(self, tag, args):
334 self._send_tagged(tag, 'NO',
335 'unrecognized authentication type {}'.format(args[0]))
336 client, _ = self._setup(MyServer)
337 with self.assertRaisesRegex(imaplib.IMAP4.error,
338 'unrecognized authentication type METHOD'):
339 client.authenticate('METHOD', lambda: 1)
340
341 def test_invalid_authentication(self):
342 class MyServer(SimpleIMAPHandler):
343 def cmd_AUTHENTICATE(self, tag, args):
344 self._send_textline('+')
345 self.response = yield
346 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
347 client, _ = self._setup(MyServer)
348 with self.assertRaisesRegex(imaplib.IMAP4.error,
349 r'\[AUTHENTICATIONFAILED\] invalid'):
350 client.authenticate('MYAUTH', lambda x: b'fake')
351
352 def test_valid_authentication_bytes(self):
353 class MyServer(SimpleIMAPHandler):
354 def cmd_AUTHENTICATE(self, tag, args):
355 self._send_textline('+')
356 self.server.response = yield
357 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
358 client, server = self._setup(MyServer)
359 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
360 self.assertEqual(code, 'OK')
361 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
362
363 def test_valid_authentication_plain_text(self):
364 class MyServer(SimpleIMAPHandler):
365 def cmd_AUTHENTICATE(self, tag, args):
366 self._send_textline('+')
367 self.server.response = yield
368 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
369 client, server = self._setup(MyServer)
370 code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
371 self.assertEqual(code, 'OK')
372 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
373
Christian Heimesc64a1a62019-09-25 16:30:20 +0200374 @requires_hashdigest('md5')
R David Murrayb079c072016-12-24 21:32:26 -0500375 def test_login_cram_md5_bytes(self):
376 class AuthHandler(SimpleIMAPHandler):
377 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
378 def cmd_AUTHENTICATE(self, tag, args):
379 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
380 'VzdG9uLm1jaS5uZXQ=')
381 r = yield
382 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
383 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
384 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
385 else:
386 self._send_tagged(tag, 'NO', 'No access')
387 client, _ = self._setup(AuthHandler)
388 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
389 ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
390 self.assertEqual(ret, "OK")
391
Christian Heimesc64a1a62019-09-25 16:30:20 +0200392 @requires_hashdigest('md5')
R David Murrayb079c072016-12-24 21:32:26 -0500393 def test_login_cram_md5_plain_text(self):
394 class AuthHandler(SimpleIMAPHandler):
395 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
396 def cmd_AUTHENTICATE(self, tag, args):
397 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
398 'VzdG9uLm1jaS5uZXQ=')
399 r = yield
400 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
401 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
402 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
403 else:
404 self._send_tagged(tag, 'NO', 'No access')
405 client, _ = self._setup(AuthHandler)
406 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
407 ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
408 self.assertEqual(ret, "OK")
409
410 def test_aborted_authentication(self):
411 class MyServer(SimpleIMAPHandler):
412 def cmd_AUTHENTICATE(self, tag, args):
413 self._send_textline('+')
414 self.response = yield
415 if self.response == b'*\r\n':
416 self._send_tagged(
417 tag,
418 'NO',
419 '[AUTHENTICATIONFAILED] aborted')
420 else:
421 self._send_tagged(tag, 'OK', 'MYAUTH successful')
422 client, _ = self._setup(MyServer)
423 with self.assertRaisesRegex(imaplib.IMAP4.error,
424 r'\[AUTHENTICATIONFAILED\] aborted'):
425 client.authenticate('MYAUTH', lambda x: None)
426
427 @mock.patch('imaplib._MAXLINE', 10)
428 def test_linetoolong(self):
429 class TooLongHandler(SimpleIMAPHandler):
430 def handle(self):
431 # send response line longer than the limit set in the next line
432 self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
433 _, server = self._setup(TooLongHandler, connect=False)
434 with self.assertRaisesRegex(imaplib.IMAP4.error,
435 'got more than 10 bytes'):
436 self.imap_class(*server.server_address)
437
438 def test_simple_with_statement(self):
439 _, server = self._setup(SimpleIMAPHandler, connect=False)
440 with self.imap_class(*server.server_address):
441 pass
442
Dong-hee Na13a7ee82020-01-08 02:28:10 +0900443 def test_imaplib_timeout_test(self):
444 _, server = self._setup(SimpleIMAPHandler)
445 addr = server.server_address[1]
446 client = self.imap_class("localhost", addr, timeout=None)
447 self.assertEqual(client.sock.timeout, None)
448 client.shutdown()
449 client = self.imap_class("localhost", addr, timeout=support.LOOPBACK_TIMEOUT)
450 self.assertEqual(client.sock.timeout, support.LOOPBACK_TIMEOUT)
451 client.shutdown()
452 with self.assertRaises(ValueError):
453 client = self.imap_class("localhost", addr, timeout=0)
454
455 def test_imaplib_timeout_functionality_test(self):
456 class TimeoutHandler(SimpleIMAPHandler):
457 def handle(self):
458 time.sleep(1)
459 SimpleIMAPHandler.handle(self)
460
461 _, server = self._setup(TimeoutHandler)
462 addr = server.server_address[1]
463 with self.assertRaises(socket.timeout):
464 client = self.imap_class("localhost", addr, timeout=0.001)
465
R David Murrayb079c072016-12-24 21:32:26 -0500466 def test_with_statement(self):
467 _, server = self._setup(SimpleIMAPHandler, connect=False)
468 with self.imap_class(*server.server_address) as imap:
469 imap.login('user', 'pass')
470 self.assertEqual(server.logged, 'user')
471 self.assertIsNone(server.logged)
472
473 def test_with_statement_logout(self):
474 # It is legal to log out explicitly inside the with block
475 _, server = self._setup(SimpleIMAPHandler, connect=False)
476 with self.imap_class(*server.server_address) as imap:
477 imap.login('user', 'pass')
478 self.assertEqual(server.logged, 'user')
479 imap.logout()
480 self.assertIsNone(server.logged)
481 self.assertIsNone(server.logged)
482
483 # command tests
484
485 def test_login(self):
486 client, _ = self._setup(SimpleIMAPHandler)
487 typ, data = client.login('user', 'pass')
488 self.assertEqual(typ, 'OK')
489 self.assertEqual(data[0], b'LOGIN completed')
490 self.assertEqual(client.state, 'AUTH')
491
492 def test_logout(self):
493 client, _ = self._setup(SimpleIMAPHandler)
494 typ, data = client.login('user', 'pass')
495 self.assertEqual(typ, 'OK')
496 self.assertEqual(data[0], b'LOGIN completed')
497 typ, data = client.logout()
Victor Stinner74125a62019-04-15 18:23:20 +0200498 self.assertEqual(typ, 'BYE', (typ, data))
499 self.assertEqual(data[0], b'IMAP4ref1 Server logging out', (typ, data))
R David Murrayb079c072016-12-24 21:32:26 -0500500 self.assertEqual(client.state, 'LOGOUT')
501
502 def test_lsub(self):
503 class LsubCmd(SimpleIMAPHandler):
504 def cmd_LSUB(self, tag, args):
505 self._send_textline('* LSUB () "." directoryA')
506 return self._send_tagged(tag, 'OK', 'LSUB completed')
507 client, _ = self._setup(LsubCmd)
508 client.login('user', 'pass')
509 typ, data = client.lsub()
510 self.assertEqual(typ, 'OK')
511 self.assertEqual(data[0], b'() "." directoryA')
512
513
514class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
515 imap_class = imaplib.IMAP4
516 server_class = socketserver.TCPServer
517
518
519@unittest.skipUnless(ssl, "SSL not available")
520class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
Victor Stinnerde383282017-01-12 11:51:31 +0100521 imap_class = IMAP4_SSL
R David Murrayb079c072016-12-24 21:32:26 -0500522 server_class = SecureTCPServer
523
524 def test_ssl_raises(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200525 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
526 self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
527 self.assertEqual(ssl_context.check_hostname, True)
R David Murrayb079c072016-12-24 21:32:26 -0500528 ssl_context.load_verify_locations(CAFILE)
529
530 with self.assertRaisesRegex(ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100531 "IP address mismatch, certificate is not valid for "
532 "'127.0.0.1'"):
R David Murrayb079c072016-12-24 21:32:26 -0500533 _, server = self._setup(SimpleIMAPHandler)
534 client = self.imap_class(*server.server_address,
535 ssl_context=ssl_context)
536 client.shutdown()
537
538 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200539 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
R David Murrayb079c072016-12-24 21:32:26 -0500540 ssl_context.load_verify_locations(CAFILE)
541
542 _, server = self._setup(SimpleIMAPHandler)
543 client = self.imap_class("localhost", server.server_address[1],
544 ssl_context=ssl_context)
545 client.shutdown()
546
Victor Stinnerb18563d2017-06-14 18:48:32 +0200547 # Mock the private method _connect(), so mark the test as specific
548 # to CPython stdlib
549 @cpython_only
550 def test_certfile_arg_warn(self):
551 with support.check_warnings(('', DeprecationWarning)):
552 with mock.patch.object(self.imap_class, 'open'):
553 with mock.patch.object(self.imap_class, '_connect'):
554 self.imap_class('localhost', 143, certfile=CERTFILE)
555
Antoine Pitroucac9e712014-07-31 18:35:45 -0400556class ThreadedNetworkedTests(unittest.TestCase):
557 server_class = socketserver.TCPServer
558 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000559
560 def make_server(self, addr, hdlr):
561
562 class MyServer(self.server_class):
563 def handle_error(self, request, client_address):
564 self.close_request(request)
565 self.server_close()
566 raise
567
Antoine Pitroucac9e712014-07-31 18:35:45 -0400568 if verbose:
569 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000570 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000571 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000572
573 if verbose:
574 print("server created")
575 print("ADDR =", addr)
576 print("CLASS =", self.server_class)
577 print("HDLR =", server.RequestHandlerClass)
578
579 t = threading.Thread(
580 name='%s serving' % self.server_class,
581 target=server.serve_forever,
582 # Short poll interval to make the test finish quickly.
583 # Time between requests is short enough that we won't wake
584 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400585 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000586 t.daemon = True # In case this function raises.
587 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400588 if verbose:
589 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000590 return server, t
591
592 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400593 if verbose:
594 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000595 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000596 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000597 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400598 if verbose:
599 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000600
601 @contextmanager
602 def reaped_server(self, hdlr):
603 server, thread = self.make_server((support.HOST, 0), hdlr)
604 try:
605 yield server
606 finally:
607 self.reap_server(server, thread)
608
R David Murray774a39f2013-02-19 12:17:31 -0500609 @contextmanager
610 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100611 with self.reaped_server(hdlr) as server:
612 client = self.imap_class(*server.server_address)
613 try:
614 yield server, client
615 finally:
616 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500617
R. David Murraye8dc2582009-12-10 02:08:06 +0000618 @reap_threads
619 def test_connect(self):
620 with self.reaped_server(SimpleIMAPHandler) as server:
621 client = self.imap_class(*server.server_address)
622 client.shutdown()
623
624 @reap_threads
R David Murray317f64f2016-01-02 17:18:34 -0500625 def test_bracket_flags(self):
626
627 # This violates RFC 3501, which disallows ']' characters in tag names,
628 # but imaplib has allowed producing such tags forever, other programs
629 # also produce them (eg: OtherInbox's Organizer app as of 20140716),
630 # and Gmail, for example, accepts them and produces them. So we
631 # support them. See issue #21815.
632
633 class BracketFlagHandler(SimpleIMAPHandler):
634
635 def handle(self):
636 self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
637 super().handle()
638
639 def cmd_AUTHENTICATE(self, tag, args):
640 self._send_textline('+')
641 self.server.response = yield
642 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
643
644 def cmd_SELECT(self, tag, args):
645 flag_msg = ' \\'.join(self.flags)
646 self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
647 self._send_line(b'* 2 EXISTS')
648 self._send_line(b'* 0 RECENT')
649 msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
650 % flag_msg)
651 self._send_line(msg.encode('ascii'))
652 self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
653
654 def cmd_STORE(self, tag, args):
655 new_flags = args[2].strip('(').strip(')').split()
656 self.flags.extend(new_flags)
657 flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
658 msg = '* %s FETCH %s' % (args[0], flags_msg)
659 self._send_line(msg.encode('ascii'))
660 self._send_tagged(tag, 'OK', 'STORE completed.')
661
662 with self.reaped_pair(BracketFlagHandler) as (server, client):
663 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
664 self.assertEqual(code, 'OK')
665 self.assertEqual(server.response, b'ZmFrZQ==\r\n')
666 client.select('test')
667 typ, [data] = client.store(b'1', "+FLAGS", "[test]")
668 self.assertIn(b'[test]', data)
669 client.select('test')
670 typ, [data] = client.response('PERMANENTFLAGS')
671 self.assertIn(b'[test]', data)
672
673 @reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000674 def test_issue5949(self):
675
676 class EOFHandler(socketserver.StreamRequestHandler):
677 def handle(self):
678 # EOF without sending a complete welcome message.
679 self.wfile.write(b'* OK')
680
681 with self.reaped_server(EOFHandler) as server:
682 self.assertRaises(imaplib.IMAP4.abort,
683 self.imap_class, *server.server_address)
684
685 @reap_threads
686 def test_line_termination(self):
687
688 class BadNewlineHandler(SimpleIMAPHandler):
689
690 def cmd_CAPABILITY(self, tag, args):
691 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500692 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000693
694 with self.reaped_server(BadNewlineHandler) as server:
695 self.assertRaises(imaplib.IMAP4.abort,
696 self.imap_class, *server.server_address)
697
R David Murraya6429db2015-05-10 19:17:23 -0400698 class UTF8Server(SimpleIMAPHandler):
699 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
700
701 def cmd_ENABLE(self, tag, args):
702 self._send_tagged(tag, 'OK', 'ENABLE successful')
703
704 def cmd_AUTHENTICATE(self, tag, args):
705 self._send_textline('+')
706 self.server.response = yield
707 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
708
709 @reap_threads
710 def test_enable_raises_error_if_not_AUTH(self):
711 with self.reaped_pair(self.UTF8Server) as (server, client):
712 self.assertFalse(client.utf8_enabled)
713 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
714 self.assertFalse(client.utf8_enabled)
715
716 # XXX Also need a test that enable after SELECT raises an error.
717
718 @reap_threads
719 def test_enable_raises_error_if_no_capability(self):
720 class NoEnableServer(self.UTF8Server):
721 capabilities = 'AUTH'
722 with self.reaped_pair(NoEnableServer) as (server, client):
723 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
724
725 @reap_threads
726 def test_enable_UTF8_raises_error_if_not_supported(self):
727 class NonUTF8Server(SimpleIMAPHandler):
728 pass
729 with self.assertRaises(imaplib.IMAP4.error):
730 with self.reaped_pair(NonUTF8Server) as (server, client):
731 typ, data = client.login('user', 'pass')
732 self.assertEqual(typ, 'OK')
733 client.enable('UTF8=ACCEPT')
734 pass
735
736 @reap_threads
737 def test_enable_UTF8_True_append(self):
738
739 class UTF8AppendServer(self.UTF8Server):
740 def cmd_APPEND(self, tag, args):
741 self._send_textline('+')
742 self.server.response = yield
743 self._send_tagged(tag, 'OK', 'okay')
744
745 with self.reaped_pair(UTF8AppendServer) as (server, client):
746 self.assertEqual(client._encoding, 'ascii')
747 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
748 self.assertEqual(code, 'OK')
749 self.assertEqual(server.response,
750 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
751 code, _ = client.enable('UTF8=ACCEPT')
752 self.assertEqual(code, 'OK')
753 self.assertEqual(client._encoding, 'utf-8')
754 msg_string = 'Subject: üñí©öðé'
755 typ, data = client.append(
756 None, None, None, msg_string.encode('utf-8'))
757 self.assertEqual(typ, 'OK')
758 self.assertEqual(
759 server.response,
760 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
761 )
762
763 # XXX also need a test that makes sure that the Literal and Untagged_status
764 # regexes uses unicode in UTF8 mode instead of the default ASCII.
765
766 @reap_threads
767 def test_search_disallows_charset_in_utf8_mode(self):
768 with self.reaped_pair(self.UTF8Server) as (server, client):
769 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
770 self.assertEqual(typ, 'OK')
771 typ, _ = client.enable('UTF8=ACCEPT')
772 self.assertEqual(typ, 'OK')
773 self.assertTrue(client.utf8_enabled)
774 self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
775
R David Murray774a39f2013-02-19 12:17:31 -0500776 @reap_threads
777 def test_bad_auth_name(self):
778
779 class MyServer(SimpleIMAPHandler):
780
781 def cmd_AUTHENTICATE(self, tag, args):
782 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400783 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500784
785 with self.reaped_pair(MyServer) as (server, client):
786 with self.assertRaises(imaplib.IMAP4.error):
787 client.authenticate('METHOD', lambda: 1)
788
789 @reap_threads
790 def test_invalid_authentication(self):
791
792 class MyServer(SimpleIMAPHandler):
793
794 def cmd_AUTHENTICATE(self, tag, args):
795 self._send_textline('+')
796 self.response = yield
797 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
798
799 with self.reaped_pair(MyServer) as (server, client):
800 with self.assertRaises(imaplib.IMAP4.error):
801 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
802
803 @reap_threads
804 def test_valid_authentication(self):
805
806 class MyServer(SimpleIMAPHandler):
807
808 def cmd_AUTHENTICATE(self, tag, args):
809 self._send_textline('+')
810 self.server.response = yield
811 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
812
813 with self.reaped_pair(MyServer) as (server, client):
814 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
815 self.assertEqual(code, 'OK')
816 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400817 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500818
819 with self.reaped_pair(MyServer) as (server, client):
820 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
821 self.assertEqual(code, 'OK')
822 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400823 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500824
825 @reap_threads
Christian Heimesc64a1a62019-09-25 16:30:20 +0200826 @requires_hashdigest('md5')
R David Murray774a39f2013-02-19 12:17:31 -0500827 def test_login_cram_md5(self):
828
829 class AuthHandler(SimpleIMAPHandler):
830
831 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
832
833 def cmd_AUTHENTICATE(self, tag, args):
834 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400835 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500836 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400837 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
838 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500839 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
840 else:
841 self._send_tagged(tag, 'NO', 'No access')
842
843 with self.reaped_pair(AuthHandler) as (server, client):
844 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
845 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
846 self.assertEqual(ret, "OK")
847
848 with self.reaped_pair(AuthHandler) as (server, client):
849 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
850 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
851 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000852
853
Robert Collins5ccc18f2015-07-31 08:59:02 +1200854 @reap_threads
855 def test_aborted_authentication(self):
856
857 class MyServer(SimpleIMAPHandler):
858
859 def cmd_AUTHENTICATE(self, tag, args):
860 self._send_textline('+')
861 self.response = yield
862
863 if self.response == b'*\r\n':
864 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
865 else:
866 self._send_tagged(tag, 'OK', 'MYAUTH successful')
867
868 with self.reaped_pair(MyServer) as (server, client):
869 with self.assertRaises(imaplib.IMAP4.error):
870 code, data = client.authenticate('MYAUTH', lambda x: None)
871
Robert Collins78378e82015-07-31 09:01:38 +1200872
Georg Brandlca580f42013-10-27 06:52:14 +0100873 def test_linetoolong(self):
874 class TooLongHandler(SimpleIMAPHandler):
875 def handle(self):
876 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400877 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100878
879 with self.reaped_server(TooLongHandler) as server:
880 self.assertRaises(imaplib.IMAP4.error,
881 self.imap_class, *server.server_address)
882
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300883 @reap_threads
884 def test_simple_with_statement(self):
885 # simplest call
886 with self.reaped_server(SimpleIMAPHandler) as server:
887 with self.imap_class(*server.server_address):
888 pass
889
890 @reap_threads
891 def test_with_statement(self):
892 with self.reaped_server(SimpleIMAPHandler) as server:
893 with self.imap_class(*server.server_address) as imap:
894 imap.login('user', 'pass')
895 self.assertEqual(server.logged, 'user')
896 self.assertIsNone(server.logged)
897
898 @reap_threads
899 def test_with_statement_logout(self):
900 # what happens if already logout in the block?
901 with self.reaped_server(SimpleIMAPHandler) as server:
902 with self.imap_class(*server.server_address) as imap:
903 imap.login('user', 'pass')
904 self.assertEqual(server.logged, 'user')
905 imap.logout()
906 self.assertIsNone(server.logged)
907 self.assertIsNone(server.logged)
908
Georg Brandlca580f42013-10-27 06:52:14 +0100909
R. David Murraye8dc2582009-12-10 02:08:06 +0000910@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400911class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000912 server_class = SecureTCPServer
913 imap_class = IMAP4_SSL
914
Christian Heimes48aae572013-12-02 20:01:29 +0100915 @reap_threads
916 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200917 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
Christian Heimes48aae572013-12-02 20:01:29 +0100918 ssl_context.load_verify_locations(CAFILE)
919
Antoine Pitroucac9e712014-07-31 18:35:45 -0400920 with self.assertRaisesRegex(
921 ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100922 "IP address mismatch, certificate is not valid for "
923 "'127.0.0.1'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100924 with self.reaped_server(SimpleIMAPHandler) as server:
925 client = self.imap_class(*server.server_address,
926 ssl_context=ssl_context)
927 client.shutdown()
928
929 with self.reaped_server(SimpleIMAPHandler) as server:
930 client = self.imap_class("localhost", server.server_address[1],
931 ssl_context=ssl_context)
932 client.shutdown()
933
R. David Murraye8dc2582009-12-10 02:08:06 +0000934
Antoine Pitroucac9e712014-07-31 18:35:45 -0400935@unittest.skipUnless(
936 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000937class RemoteIMAPTest(unittest.TestCase):
938 host = 'cyrus.andrew.cmu.edu'
939 port = 143
940 username = 'anonymous'
941 password = 'pass'
942 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000943
Antoine Pitroub1436f12010-11-09 22:55:55 +0000944 def setUp(self):
945 with transient_internet(self.host):
946 self.server = self.imap_class(self.host, self.port)
947
948 def tearDown(self):
949 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100950 with transient_internet(self.host):
951 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000952
953 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100954 with transient_internet(self.host):
955 for cap in self.server.capabilities:
956 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000957 self.assertIn('LOGINDISABLED', self.server.capabilities)
958 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100959 rs = self.server.login(self.username, self.password)
960 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000961
962 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100963 with transient_internet(self.host):
964 rs = self.server.logout()
965 self.server = None
Victor Stinner74125a62019-04-15 18:23:20 +0200966 self.assertEqual(rs[0], 'BYE', rs)
Antoine Pitroub1436f12010-11-09 22:55:55 +0000967
968
969@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400970@unittest.skipUnless(
971 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000972class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
973
974 def setUp(self):
975 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100976 with transient_internet(self.host):
977 rs = self.server.starttls()
978 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000979
980 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000981 for cap in self.server.capabilities:
982 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000983 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000984
985
986@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000987class RemoteIMAP_SSLTest(RemoteIMAPTest):
988 port = 993
989 imap_class = IMAP4_SSL
990
Antoine Pitrou08728162011-05-06 18:49:52 +0200991 def setUp(self):
992 pass
993
994 def tearDown(self):
995 pass
996
997 def create_ssl_context(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200998 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
999 ssl_context.check_hostname = False
1000 ssl_context.verify_mode = ssl.CERT_NONE
Antoine Pitrou08728162011-05-06 18:49:52 +02001001 ssl_context.load_cert_chain(CERTFILE)
1002 return ssl_context
1003
1004 def check_logincapa(self, server):
1005 try:
1006 for cap in server.capabilities:
1007 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +10001008 self.assertNotIn('LOGINDISABLED', server.capabilities)
1009 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +02001010 rs = server.login(self.username, self.password)
1011 self.assertEqual(rs[0], 'OK')
1012 finally:
1013 server.logout()
1014
Antoine Pitroub1436f12010-11-09 22:55:55 +00001015 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +02001016 with transient_internet(self.host):
1017 _server = self.imap_class(self.host, self.port)
1018 self.check_logincapa(_server)
1019
Antoine Pitrou08728162011-05-06 18:49:52 +02001020 def test_logout(self):
1021 with transient_internet(self.host):
1022 _server = self.imap_class(self.host, self.port)
1023 rs = _server.logout()
Victor Stinner74125a62019-04-15 18:23:20 +02001024 self.assertEqual(rs[0], 'BYE', rs)
Antoine Pitrou08728162011-05-06 18:49:52 +02001025
1026 def test_ssl_context_certfile_exclusive(self):
1027 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001028 self.assertRaises(
1029 ValueError, self.imap_class, self.host, self.port,
1030 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +02001031
1032 def test_ssl_context_keyfile_exclusive(self):
1033 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001034 self.assertRaises(
1035 ValueError, self.imap_class, self.host, self.port,
1036 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +00001037
1038
1039if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +02001040 unittest.main()