blob: 764566695170a7b9f41d557bcfeb473ae7e89c62 [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
Serhiy Storchaka16994912020-04-25 10:06:29 +03002from test.support import socket_helper
R. David Murraye8dc2582009-12-10 02:08:06 +00003
4from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00005import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00006import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +00007import socketserver
Tim Peters108b7912002-07-31 16:42:33 +00008import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +00009import calendar
Antoine Pitroua6a4dc82017-09-07 18:56:24 +020010import threading
Matěj Cepl3dc67d02019-02-12 19:30:19 +010011import socket
Martin v. Löwisea752fb2002-01-05 11:31:49 +000012
Antoine Pitroucac9e712014-07-31 18:35:45 -040013from test.support import (reap_threads, verbose, transient_internet,
Christian Heimesc64a1a62019-09-25 16:30:20 +020014 run_with_tz, run_with_locale, cpython_only,
15 requires_hashdigest)
Christian Heimesf6cd9672008-03-26 13:45:42 +000016import unittest
R David Murrayb079c072016-12-24 21:32:26 -050017from unittest import mock
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040018from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000019try:
20 import ssl
21except ImportError:
22 ssl = None
23
Antoine Pitroucac9e712014-07-31 18:35:45 -040024CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
25CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000026
Martin v. Löwisea752fb2002-01-05 11:31:49 +000027
Christian Heimesf6cd9672008-03-26 13:45:42 +000028class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000029
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000030 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000031 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000032 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000033 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
34 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000035 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000036 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
37 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000038 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000039 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
40 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000041
Alexander Belopolsky2420d832012-04-29 15:56:49 -040042 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
43 def test_Internaldate2tuple_issue10941(self):
44 self.assertNotEqual(imaplib.Internaldate2tuple(
45 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040046 imaplib.Internaldate2tuple(
47 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040048
49 def timevalues(self):
50 return [2000000000, 2000000000.0, time.localtime(2000000000),
51 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
52 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040053 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040054 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040055 '"18-May-2033 05:33:20 +0200"']
56
57 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
Martin Panter6e0889f2015-11-16 07:21:38 +000058 # DST rules included to work around quirk where the Gnu C library may not
59 # otherwise restore the previous time zone
60 @run_with_tz('STD-1DST,M3.2.0,M11.1.0')
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040061 def test_Time2Internaldate(self):
62 expected = '"18-May-2033 05:33:20 +0200"'
63
64 for t in self.timevalues():
65 internal = imaplib.Time2Internaldate(t)
66 self.assertEqual(internal, expected)
67
68 def test_that_Time2Internaldate_returns_a_result(self):
69 # Without tzset, we can check only that it successfully
70 # produces a result, not the correctness of the result itself,
71 # since the result depends on the timezone the machine is in.
72 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000073 imaplib.Time2Internaldate(t)
74
Berker Peksage4dcbbd2018-08-07 05:12:18 +030075 def test_imap4_host_default_value(self):
Matěj Cepl3dc67d02019-02-12 19:30:19 +010076 # Check whether the IMAP4_PORT is truly unavailable.
77 with socket.socket() as s:
78 try:
79 s.connect(('', imaplib.IMAP4_PORT))
80 self.skipTest(
81 "Cannot run the test with local IMAP server running.")
82 except socket.error:
83 pass
84
Victor Stinner3c7931e2019-04-15 12:34:53 +020085 # This is the exception that should be raised.
Serhiy Storchaka16994912020-04-25 10:06:29 +030086 expected_errnos = socket_helper.get_socket_conn_refused_errs()
Berker Peksage4dcbbd2018-08-07 05:12:18 +030087 with self.assertRaises(OSError) as cm:
88 imaplib.IMAP4()
89 self.assertIn(cm.exception.errno, expected_errnos)
90
Christian Heimesf6cd9672008-03-26 13:45:42 +000091
R. David Murraye8dc2582009-12-10 02:08:06 +000092if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000093 class SecureTCPServer(socketserver.TCPServer):
94
95 def get_request(self):
96 newsocket, fromaddr = self.socket.accept()
Christian Heimesd0486372016-09-10 23:23:33 +020097 context = ssl.SSLContext()
98 context.load_cert_chain(CERTFILE)
99 connstream = context.wrap_socket(newsocket, server_side=True)
R. David Murraye8dc2582009-12-10 02:08:06 +0000100 return connstream, fromaddr
101
102 IMAP4_SSL = imaplib.IMAP4_SSL
103
104else:
105
106 class SecureTCPServer:
107 pass
108
109 IMAP4_SSL = None
110
111
112class SimpleIMAPHandler(socketserver.StreamRequestHandler):
Victor Stinner07871b22019-12-10 20:32:59 +0100113 timeout = support.LOOPBACK_TIMEOUT
R David Murray774a39f2013-02-19 12:17:31 -0500114 continuation = None
115 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +0000116
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300117 def setup(self):
118 super().setup()
119 self.server.logged = None
120
R. David Murraye8dc2582009-12-10 02:08:06 +0000121 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400122 if verbose:
123 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000124 self.wfile.write(message)
125
R David Murray774a39f2013-02-19 12:17:31 -0500126 def _send_line(self, message):
127 self._send(message + b'\r\n')
128
129 def _send_textline(self, message):
130 self._send_line(message.encode('ASCII'))
131
132 def _send_tagged(self, tag, code, message):
133 self._send_textline(' '.join((tag, code, message)))
134
R. David Murraye8dc2582009-12-10 02:08:06 +0000135 def handle(self):
136 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500137 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000138 while 1:
139 # Gather up input until we receive a line terminator or we timeout.
140 # Accumulate read(1) because it's simpler to handle the differences
141 # between naked sockets and SSL sockets.
142 line = b''
143 while 1:
144 try:
145 part = self.rfile.read(1)
146 if part == b'':
147 # Naked sockets return empty strings..
148 return
149 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200150 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200151 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000152 return
153 if line.endswith(b'\r\n'):
154 break
155
Antoine Pitroucac9e712014-07-31 18:35:45 -0400156 if verbose:
157 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500158 if self.continuation:
159 try:
160 self.continuation.send(line)
161 except StopIteration:
162 self.continuation = None
163 continue
164 splitline = line.decode('ASCII').split()
165 tag = splitline[0]
166 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000167 args = splitline[2:]
168
Antoine Pitroucac9e712014-07-31 18:35:45 -0400169 if hasattr(self, 'cmd_' + cmd):
170 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500171 if continuation:
172 self.continuation = continuation
173 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000174 else:
R David Murray774a39f2013-02-19 12:17:31 -0500175 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000176
177 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400178 caps = ('IMAP4rev1 ' + self.capabilities
179 if self.capabilities
180 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500181 self._send_textline('* CAPABILITY ' + caps)
182 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
183
184 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300185 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500186 self._send_textline('* BYE IMAP4ref1 Server logging out')
187 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000188
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300189 def cmd_LOGIN(self, tag, args):
190 self.server.logged = args[0]
191 self._send_tagged(tag, 'OK', 'LOGIN completed')
192
R. David Murraye8dc2582009-12-10 02:08:06 +0000193
R David Murrayb079c072016-12-24 21:32:26 -0500194class NewIMAPTestsMixin():
195 client = None
196
197 def _setup(self, imap_handler, connect=True):
198 """
199 Sets up imap_handler for tests. imap_handler should inherit from either:
200 - SimpleIMAPHandler - for testing IMAP commands,
201 - socketserver.StreamRequestHandler - if raw access to stream is needed.
202 Returns (client, server).
203 """
204 class TestTCPServer(self.server_class):
205 def handle_error(self, request, client_address):
206 """
207 End request and raise the error if one occurs.
208 """
209 self.close_request(request)
210 self.server_close()
211 raise
212
213 self.addCleanup(self._cleanup)
Serhiy Storchaka16994912020-04-25 10:06:29 +0300214 self.server = self.server_class((socket_helper.HOST, 0), imap_handler)
R David Murrayb079c072016-12-24 21:32:26 -0500215 self.thread = threading.Thread(
216 name=self._testMethodName+'-server',
217 target=self.server.serve_forever,
218 # Short poll interval to make the test finish quickly.
219 # Time between requests is short enough that we won't wake
220 # up spuriously too many times.
221 kwargs={'poll_interval': 0.01})
222 self.thread.daemon = True # In case this function raises.
223 self.thread.start()
224
225 if connect:
226 self.client = self.imap_class(*self.server.server_address)
227
228 return self.client, self.server
229
230 def _cleanup(self):
231 """
232 Cleans up the test server. This method should not be called manually,
233 it is added to the cleanup queue in the _setup method already.
234 """
235 # if logout was called already we'd raise an exception trying to
236 # shutdown the client once again
237 if self.client is not None and self.client.state != 'LOGOUT':
238 self.client.shutdown()
239 # cleanup the server
240 self.server.shutdown()
241 self.server.server_close()
Victor Stinnerbbc8b792019-12-10 20:41:23 +0100242 support.join_thread(self.thread)
Victor Stinnerb9b69002017-09-14 14:40:56 -0700243 # Explicitly clear the attribute to prevent dangling thread
244 self.thread = None
R David Murrayb079c072016-12-24 21:32:26 -0500245
246 def test_EOF_without_complete_welcome_message(self):
247 # http://bugs.python.org/issue5949
248 class EOFHandler(socketserver.StreamRequestHandler):
249 def handle(self):
250 self.wfile.write(b'* OK')
251 _, server = self._setup(EOFHandler, connect=False)
252 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
253 *server.server_address)
254
255 def test_line_termination(self):
256 class BadNewlineHandler(SimpleIMAPHandler):
257 def cmd_CAPABILITY(self, tag, args):
258 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
259 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
260 _, server = self._setup(BadNewlineHandler, connect=False)
261 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
262 *server.server_address)
263
264 def test_enable_raises_error_if_not_AUTH(self):
265 class EnableHandler(SimpleIMAPHandler):
266 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
267 client, _ = self._setup(EnableHandler)
268 self.assertFalse(client.utf8_enabled)
269 with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
270 client.enable('foo')
271 self.assertFalse(client.utf8_enabled)
272
273 def test_enable_raises_error_if_no_capability(self):
274 client, _ = self._setup(SimpleIMAPHandler)
275 with self.assertRaisesRegex(imaplib.IMAP4.error,
276 'does not support ENABLE'):
277 client.enable('foo')
278
279 def test_enable_UTF8_raises_error_if_not_supported(self):
280 client, _ = self._setup(SimpleIMAPHandler)
281 typ, data = client.login('user', 'pass')
282 self.assertEqual(typ, 'OK')
283 with self.assertRaisesRegex(imaplib.IMAP4.error,
284 'does not support ENABLE'):
285 client.enable('UTF8=ACCEPT')
286
287 def test_enable_UTF8_True_append(self):
288 class UTF8AppendServer(SimpleIMAPHandler):
289 capabilities = 'ENABLE UTF8=ACCEPT'
290 def cmd_ENABLE(self, tag, args):
291 self._send_tagged(tag, 'OK', 'ENABLE successful')
292 def cmd_AUTHENTICATE(self, tag, args):
293 self._send_textline('+')
294 self.server.response = yield
295 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
296 def cmd_APPEND(self, tag, args):
297 self._send_textline('+')
298 self.server.response = yield
299 self._send_tagged(tag, 'OK', 'okay')
300 client, server = self._setup(UTF8AppendServer)
301 self.assertEqual(client._encoding, 'ascii')
302 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
303 self.assertEqual(code, 'OK')
304 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
305 code, _ = client.enable('UTF8=ACCEPT')
306 self.assertEqual(code, 'OK')
307 self.assertEqual(client._encoding, 'utf-8')
308 msg_string = 'Subject: üñí©öðé'
309 typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
310 self.assertEqual(typ, 'OK')
311 self.assertEqual(server.response,
312 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
313
314 def test_search_disallows_charset_in_utf8_mode(self):
315 class UTF8Server(SimpleIMAPHandler):
316 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
317 def cmd_ENABLE(self, tag, args):
318 self._send_tagged(tag, 'OK', 'ENABLE successful')
319 def cmd_AUTHENTICATE(self, tag, args):
320 self._send_textline('+')
321 self.server.response = yield
322 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
323 client, _ = self._setup(UTF8Server)
324 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
325 self.assertEqual(typ, 'OK')
326 typ, _ = client.enable('UTF8=ACCEPT')
327 self.assertEqual(typ, 'OK')
328 self.assertTrue(client.utf8_enabled)
329 with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
330 client.search('foo', 'bar')
331
332 def test_bad_auth_name(self):
333 class MyServer(SimpleIMAPHandler):
334 def cmd_AUTHENTICATE(self, tag, args):
335 self._send_tagged(tag, 'NO',
336 'unrecognized authentication type {}'.format(args[0]))
337 client, _ = self._setup(MyServer)
338 with self.assertRaisesRegex(imaplib.IMAP4.error,
339 'unrecognized authentication type METHOD'):
340 client.authenticate('METHOD', lambda: 1)
341
342 def test_invalid_authentication(self):
343 class MyServer(SimpleIMAPHandler):
344 def cmd_AUTHENTICATE(self, tag, args):
345 self._send_textline('+')
346 self.response = yield
347 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
348 client, _ = self._setup(MyServer)
349 with self.assertRaisesRegex(imaplib.IMAP4.error,
350 r'\[AUTHENTICATIONFAILED\] invalid'):
351 client.authenticate('MYAUTH', lambda x: b'fake')
352
353 def test_valid_authentication_bytes(self):
354 class MyServer(SimpleIMAPHandler):
355 def cmd_AUTHENTICATE(self, tag, args):
356 self._send_textline('+')
357 self.server.response = yield
358 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
359 client, server = self._setup(MyServer)
360 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
361 self.assertEqual(code, 'OK')
362 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
363
364 def test_valid_authentication_plain_text(self):
365 class MyServer(SimpleIMAPHandler):
366 def cmd_AUTHENTICATE(self, tag, args):
367 self._send_textline('+')
368 self.server.response = yield
369 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
370 client, server = self._setup(MyServer)
371 code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
372 self.assertEqual(code, 'OK')
373 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
374
Christian Heimesc64a1a62019-09-25 16:30:20 +0200375 @requires_hashdigest('md5')
R David Murrayb079c072016-12-24 21:32:26 -0500376 def test_login_cram_md5_bytes(self):
377 class AuthHandler(SimpleIMAPHandler):
378 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
379 def cmd_AUTHENTICATE(self, tag, args):
380 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
381 'VzdG9uLm1jaS5uZXQ=')
382 r = yield
383 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
384 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
385 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
386 else:
387 self._send_tagged(tag, 'NO', 'No access')
388 client, _ = self._setup(AuthHandler)
389 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
390 ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
391 self.assertEqual(ret, "OK")
392
Christian Heimesc64a1a62019-09-25 16:30:20 +0200393 @requires_hashdigest('md5')
R David Murrayb079c072016-12-24 21:32:26 -0500394 def test_login_cram_md5_plain_text(self):
395 class AuthHandler(SimpleIMAPHandler):
396 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
397 def cmd_AUTHENTICATE(self, tag, args):
398 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
399 'VzdG9uLm1jaS5uZXQ=')
400 r = yield
401 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
402 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
403 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
404 else:
405 self._send_tagged(tag, 'NO', 'No access')
406 client, _ = self._setup(AuthHandler)
407 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
408 ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
409 self.assertEqual(ret, "OK")
410
411 def test_aborted_authentication(self):
412 class MyServer(SimpleIMAPHandler):
413 def cmd_AUTHENTICATE(self, tag, args):
414 self._send_textline('+')
415 self.response = yield
416 if self.response == b'*\r\n':
417 self._send_tagged(
418 tag,
419 'NO',
420 '[AUTHENTICATIONFAILED] aborted')
421 else:
422 self._send_tagged(tag, 'OK', 'MYAUTH successful')
423 client, _ = self._setup(MyServer)
424 with self.assertRaisesRegex(imaplib.IMAP4.error,
425 r'\[AUTHENTICATIONFAILED\] aborted'):
426 client.authenticate('MYAUTH', lambda x: None)
427
428 @mock.patch('imaplib._MAXLINE', 10)
429 def test_linetoolong(self):
430 class TooLongHandler(SimpleIMAPHandler):
431 def handle(self):
432 # send response line longer than the limit set in the next line
433 self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
434 _, server = self._setup(TooLongHandler, connect=False)
435 with self.assertRaisesRegex(imaplib.IMAP4.error,
436 'got more than 10 bytes'):
437 self.imap_class(*server.server_address)
438
439 def test_simple_with_statement(self):
440 _, server = self._setup(SimpleIMAPHandler, connect=False)
441 with self.imap_class(*server.server_address):
442 pass
443
Dong-hee Na13a7ee82020-01-08 02:28:10 +0900444 def test_imaplib_timeout_test(self):
445 _, server = self._setup(SimpleIMAPHandler)
446 addr = server.server_address[1]
447 client = self.imap_class("localhost", addr, timeout=None)
448 self.assertEqual(client.sock.timeout, None)
449 client.shutdown()
450 client = self.imap_class("localhost", addr, timeout=support.LOOPBACK_TIMEOUT)
451 self.assertEqual(client.sock.timeout, support.LOOPBACK_TIMEOUT)
452 client.shutdown()
453 with self.assertRaises(ValueError):
454 client = self.imap_class("localhost", addr, timeout=0)
455
456 def test_imaplib_timeout_functionality_test(self):
457 class TimeoutHandler(SimpleIMAPHandler):
458 def handle(self):
459 time.sleep(1)
460 SimpleIMAPHandler.handle(self)
461
462 _, server = self._setup(TimeoutHandler)
463 addr = server.server_address[1]
464 with self.assertRaises(socket.timeout):
465 client = self.imap_class("localhost", addr, timeout=0.001)
466
R David Murrayb079c072016-12-24 21:32:26 -0500467 def test_with_statement(self):
468 _, server = self._setup(SimpleIMAPHandler, connect=False)
469 with self.imap_class(*server.server_address) as imap:
470 imap.login('user', 'pass')
471 self.assertEqual(server.logged, 'user')
472 self.assertIsNone(server.logged)
473
474 def test_with_statement_logout(self):
475 # It is legal to log out explicitly inside the with block
476 _, server = self._setup(SimpleIMAPHandler, connect=False)
477 with self.imap_class(*server.server_address) as imap:
478 imap.login('user', 'pass')
479 self.assertEqual(server.logged, 'user')
480 imap.logout()
481 self.assertIsNone(server.logged)
482 self.assertIsNone(server.logged)
483
484 # command tests
485
486 def test_login(self):
487 client, _ = self._setup(SimpleIMAPHandler)
488 typ, data = client.login('user', 'pass')
489 self.assertEqual(typ, 'OK')
490 self.assertEqual(data[0], b'LOGIN completed')
491 self.assertEqual(client.state, 'AUTH')
492
493 def test_logout(self):
494 client, _ = self._setup(SimpleIMAPHandler)
495 typ, data = client.login('user', 'pass')
496 self.assertEqual(typ, 'OK')
497 self.assertEqual(data[0], b'LOGIN completed')
498 typ, data = client.logout()
Victor Stinner74125a62019-04-15 18:23:20 +0200499 self.assertEqual(typ, 'BYE', (typ, data))
500 self.assertEqual(data[0], b'IMAP4ref1 Server logging out', (typ, data))
R David Murrayb079c072016-12-24 21:32:26 -0500501 self.assertEqual(client.state, 'LOGOUT')
502
503 def test_lsub(self):
504 class LsubCmd(SimpleIMAPHandler):
505 def cmd_LSUB(self, tag, args):
506 self._send_textline('* LSUB () "." directoryA')
507 return self._send_tagged(tag, 'OK', 'LSUB completed')
508 client, _ = self._setup(LsubCmd)
509 client.login('user', 'pass')
510 typ, data = client.lsub()
511 self.assertEqual(typ, 'OK')
512 self.assertEqual(data[0], b'() "." directoryA')
513
514
515class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
516 imap_class = imaplib.IMAP4
517 server_class = socketserver.TCPServer
518
519
520@unittest.skipUnless(ssl, "SSL not available")
521class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
Victor Stinnerde383282017-01-12 11:51:31 +0100522 imap_class = IMAP4_SSL
R David Murrayb079c072016-12-24 21:32:26 -0500523 server_class = SecureTCPServer
524
525 def test_ssl_raises(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200526 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
527 self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
528 self.assertEqual(ssl_context.check_hostname, True)
R David Murrayb079c072016-12-24 21:32:26 -0500529 ssl_context.load_verify_locations(CAFILE)
530
531 with self.assertRaisesRegex(ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100532 "IP address mismatch, certificate is not valid for "
533 "'127.0.0.1'"):
R David Murrayb079c072016-12-24 21:32:26 -0500534 _, server = self._setup(SimpleIMAPHandler)
535 client = self.imap_class(*server.server_address,
536 ssl_context=ssl_context)
537 client.shutdown()
538
539 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200540 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
R David Murrayb079c072016-12-24 21:32:26 -0500541 ssl_context.load_verify_locations(CAFILE)
542
543 _, server = self._setup(SimpleIMAPHandler)
544 client = self.imap_class("localhost", server.server_address[1],
545 ssl_context=ssl_context)
546 client.shutdown()
547
Victor Stinnerb18563d2017-06-14 18:48:32 +0200548 # Mock the private method _connect(), so mark the test as specific
549 # to CPython stdlib
550 @cpython_only
551 def test_certfile_arg_warn(self):
552 with support.check_warnings(('', DeprecationWarning)):
553 with mock.patch.object(self.imap_class, 'open'):
554 with mock.patch.object(self.imap_class, '_connect'):
555 self.imap_class('localhost', 143, certfile=CERTFILE)
556
Antoine Pitroucac9e712014-07-31 18:35:45 -0400557class ThreadedNetworkedTests(unittest.TestCase):
558 server_class = socketserver.TCPServer
559 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000560
561 def make_server(self, addr, hdlr):
562
563 class MyServer(self.server_class):
564 def handle_error(self, request, client_address):
565 self.close_request(request)
566 self.server_close()
567 raise
568
Antoine Pitroucac9e712014-07-31 18:35:45 -0400569 if verbose:
570 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000571 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000572 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000573
574 if verbose:
575 print("server created")
576 print("ADDR =", addr)
577 print("CLASS =", self.server_class)
578 print("HDLR =", server.RequestHandlerClass)
579
580 t = threading.Thread(
581 name='%s serving' % self.server_class,
582 target=server.serve_forever,
583 # Short poll interval to make the test finish quickly.
584 # Time between requests is short enough that we won't wake
585 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400586 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000587 t.daemon = True # In case this function raises.
588 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400589 if verbose:
590 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000591 return server, t
592
593 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400594 if verbose:
595 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000596 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000597 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000598 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400599 if verbose:
600 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000601
602 @contextmanager
603 def reaped_server(self, hdlr):
Serhiy Storchaka16994912020-04-25 10:06:29 +0300604 server, thread = self.make_server((socket_helper.HOST, 0), hdlr)
R. David Murraye8dc2582009-12-10 02:08:06 +0000605 try:
606 yield server
607 finally:
608 self.reap_server(server, thread)
609
R David Murray774a39f2013-02-19 12:17:31 -0500610 @contextmanager
611 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100612 with self.reaped_server(hdlr) as server:
613 client = self.imap_class(*server.server_address)
614 try:
615 yield server, client
616 finally:
617 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500618
R. David Murraye8dc2582009-12-10 02:08:06 +0000619 @reap_threads
620 def test_connect(self):
621 with self.reaped_server(SimpleIMAPHandler) as server:
622 client = self.imap_class(*server.server_address)
623 client.shutdown()
624
625 @reap_threads
R David Murray317f64f2016-01-02 17:18:34 -0500626 def test_bracket_flags(self):
627
628 # This violates RFC 3501, which disallows ']' characters in tag names,
629 # but imaplib has allowed producing such tags forever, other programs
630 # also produce them (eg: OtherInbox's Organizer app as of 20140716),
631 # and Gmail, for example, accepts them and produces them. So we
632 # support them. See issue #21815.
633
634 class BracketFlagHandler(SimpleIMAPHandler):
635
636 def handle(self):
637 self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
638 super().handle()
639
640 def cmd_AUTHENTICATE(self, tag, args):
641 self._send_textline('+')
642 self.server.response = yield
643 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
644
645 def cmd_SELECT(self, tag, args):
646 flag_msg = ' \\'.join(self.flags)
647 self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
648 self._send_line(b'* 2 EXISTS')
649 self._send_line(b'* 0 RECENT')
650 msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
651 % flag_msg)
652 self._send_line(msg.encode('ascii'))
653 self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
654
655 def cmd_STORE(self, tag, args):
656 new_flags = args[2].strip('(').strip(')').split()
657 self.flags.extend(new_flags)
658 flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
659 msg = '* %s FETCH %s' % (args[0], flags_msg)
660 self._send_line(msg.encode('ascii'))
661 self._send_tagged(tag, 'OK', 'STORE completed.')
662
663 with self.reaped_pair(BracketFlagHandler) as (server, client):
664 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
665 self.assertEqual(code, 'OK')
666 self.assertEqual(server.response, b'ZmFrZQ==\r\n')
667 client.select('test')
668 typ, [data] = client.store(b'1', "+FLAGS", "[test]")
669 self.assertIn(b'[test]', data)
670 client.select('test')
671 typ, [data] = client.response('PERMANENTFLAGS')
672 self.assertIn(b'[test]', data)
673
674 @reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000675 def test_issue5949(self):
676
677 class EOFHandler(socketserver.StreamRequestHandler):
678 def handle(self):
679 # EOF without sending a complete welcome message.
680 self.wfile.write(b'* OK')
681
682 with self.reaped_server(EOFHandler) as server:
683 self.assertRaises(imaplib.IMAP4.abort,
684 self.imap_class, *server.server_address)
685
686 @reap_threads
687 def test_line_termination(self):
688
689 class BadNewlineHandler(SimpleIMAPHandler):
690
691 def cmd_CAPABILITY(self, tag, args):
692 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500693 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000694
695 with self.reaped_server(BadNewlineHandler) as server:
696 self.assertRaises(imaplib.IMAP4.abort,
697 self.imap_class, *server.server_address)
698
R David Murraya6429db2015-05-10 19:17:23 -0400699 class UTF8Server(SimpleIMAPHandler):
700 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
701
702 def cmd_ENABLE(self, tag, args):
703 self._send_tagged(tag, 'OK', 'ENABLE successful')
704
705 def cmd_AUTHENTICATE(self, tag, args):
706 self._send_textline('+')
707 self.server.response = yield
708 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
709
710 @reap_threads
711 def test_enable_raises_error_if_not_AUTH(self):
712 with self.reaped_pair(self.UTF8Server) as (server, client):
713 self.assertFalse(client.utf8_enabled)
714 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
715 self.assertFalse(client.utf8_enabled)
716
717 # XXX Also need a test that enable after SELECT raises an error.
718
719 @reap_threads
720 def test_enable_raises_error_if_no_capability(self):
721 class NoEnableServer(self.UTF8Server):
722 capabilities = 'AUTH'
723 with self.reaped_pair(NoEnableServer) as (server, client):
724 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
725
726 @reap_threads
727 def test_enable_UTF8_raises_error_if_not_supported(self):
728 class NonUTF8Server(SimpleIMAPHandler):
729 pass
730 with self.assertRaises(imaplib.IMAP4.error):
731 with self.reaped_pair(NonUTF8Server) as (server, client):
732 typ, data = client.login('user', 'pass')
733 self.assertEqual(typ, 'OK')
734 client.enable('UTF8=ACCEPT')
735 pass
736
737 @reap_threads
738 def test_enable_UTF8_True_append(self):
739
740 class UTF8AppendServer(self.UTF8Server):
741 def cmd_APPEND(self, tag, args):
742 self._send_textline('+')
743 self.server.response = yield
744 self._send_tagged(tag, 'OK', 'okay')
745
746 with self.reaped_pair(UTF8AppendServer) as (server, client):
747 self.assertEqual(client._encoding, 'ascii')
748 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
749 self.assertEqual(code, 'OK')
750 self.assertEqual(server.response,
751 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
752 code, _ = client.enable('UTF8=ACCEPT')
753 self.assertEqual(code, 'OK')
754 self.assertEqual(client._encoding, 'utf-8')
755 msg_string = 'Subject: üñí©öðé'
756 typ, data = client.append(
757 None, None, None, msg_string.encode('utf-8'))
758 self.assertEqual(typ, 'OK')
759 self.assertEqual(
760 server.response,
761 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
762 )
763
764 # XXX also need a test that makes sure that the Literal and Untagged_status
765 # regexes uses unicode in UTF8 mode instead of the default ASCII.
766
767 @reap_threads
768 def test_search_disallows_charset_in_utf8_mode(self):
769 with self.reaped_pair(self.UTF8Server) as (server, client):
770 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
771 self.assertEqual(typ, 'OK')
772 typ, _ = client.enable('UTF8=ACCEPT')
773 self.assertEqual(typ, 'OK')
774 self.assertTrue(client.utf8_enabled)
775 self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
776
R David Murray774a39f2013-02-19 12:17:31 -0500777 @reap_threads
778 def test_bad_auth_name(self):
779
780 class MyServer(SimpleIMAPHandler):
781
782 def cmd_AUTHENTICATE(self, tag, args):
783 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400784 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500785
786 with self.reaped_pair(MyServer) as (server, client):
787 with self.assertRaises(imaplib.IMAP4.error):
788 client.authenticate('METHOD', lambda: 1)
789
790 @reap_threads
791 def test_invalid_authentication(self):
792
793 class MyServer(SimpleIMAPHandler):
794
795 def cmd_AUTHENTICATE(self, tag, args):
796 self._send_textline('+')
797 self.response = yield
798 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
799
800 with self.reaped_pair(MyServer) as (server, client):
801 with self.assertRaises(imaplib.IMAP4.error):
802 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
803
804 @reap_threads
805 def test_valid_authentication(self):
806
807 class MyServer(SimpleIMAPHandler):
808
809 def cmd_AUTHENTICATE(self, tag, args):
810 self._send_textline('+')
811 self.server.response = yield
812 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
813
814 with self.reaped_pair(MyServer) as (server, client):
815 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
816 self.assertEqual(code, 'OK')
817 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400818 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500819
820 with self.reaped_pair(MyServer) as (server, client):
821 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
822 self.assertEqual(code, 'OK')
823 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400824 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500825
826 @reap_threads
Christian Heimesc64a1a62019-09-25 16:30:20 +0200827 @requires_hashdigest('md5')
R David Murray774a39f2013-02-19 12:17:31 -0500828 def test_login_cram_md5(self):
829
830 class AuthHandler(SimpleIMAPHandler):
831
832 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
833
834 def cmd_AUTHENTICATE(self, tag, args):
835 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400836 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500837 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400838 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
839 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500840 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
841 else:
842 self._send_tagged(tag, 'NO', 'No access')
843
844 with self.reaped_pair(AuthHandler) as (server, client):
845 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
846 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
847 self.assertEqual(ret, "OK")
848
849 with self.reaped_pair(AuthHandler) as (server, client):
850 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
851 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
852 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000853
854
Robert Collins5ccc18f2015-07-31 08:59:02 +1200855 @reap_threads
856 def test_aborted_authentication(self):
857
858 class MyServer(SimpleIMAPHandler):
859
860 def cmd_AUTHENTICATE(self, tag, args):
861 self._send_textline('+')
862 self.response = yield
863
864 if self.response == b'*\r\n':
865 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
866 else:
867 self._send_tagged(tag, 'OK', 'MYAUTH successful')
868
869 with self.reaped_pair(MyServer) as (server, client):
870 with self.assertRaises(imaplib.IMAP4.error):
871 code, data = client.authenticate('MYAUTH', lambda x: None)
872
Robert Collins78378e82015-07-31 09:01:38 +1200873
Georg Brandlca580f42013-10-27 06:52:14 +0100874 def test_linetoolong(self):
875 class TooLongHandler(SimpleIMAPHandler):
876 def handle(self):
877 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400878 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100879
880 with self.reaped_server(TooLongHandler) as server:
881 self.assertRaises(imaplib.IMAP4.error,
882 self.imap_class, *server.server_address)
883
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300884 @reap_threads
885 def test_simple_with_statement(self):
886 # simplest call
887 with self.reaped_server(SimpleIMAPHandler) as server:
888 with self.imap_class(*server.server_address):
889 pass
890
891 @reap_threads
892 def test_with_statement(self):
893 with self.reaped_server(SimpleIMAPHandler) as server:
894 with self.imap_class(*server.server_address) as imap:
895 imap.login('user', 'pass')
896 self.assertEqual(server.logged, 'user')
897 self.assertIsNone(server.logged)
898
899 @reap_threads
900 def test_with_statement_logout(self):
901 # what happens if already logout in the block?
902 with self.reaped_server(SimpleIMAPHandler) as server:
903 with self.imap_class(*server.server_address) as imap:
904 imap.login('user', 'pass')
905 self.assertEqual(server.logged, 'user')
906 imap.logout()
907 self.assertIsNone(server.logged)
908 self.assertIsNone(server.logged)
909
Georg Brandlca580f42013-10-27 06:52:14 +0100910
R. David Murraye8dc2582009-12-10 02:08:06 +0000911@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400912class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000913 server_class = SecureTCPServer
914 imap_class = IMAP4_SSL
915
Christian Heimes48aae572013-12-02 20:01:29 +0100916 @reap_threads
917 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200918 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
Christian Heimes48aae572013-12-02 20:01:29 +0100919 ssl_context.load_verify_locations(CAFILE)
920
Antoine Pitroucac9e712014-07-31 18:35:45 -0400921 with self.assertRaisesRegex(
922 ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100923 "IP address mismatch, certificate is not valid for "
924 "'127.0.0.1'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100925 with self.reaped_server(SimpleIMAPHandler) as server:
926 client = self.imap_class(*server.server_address,
927 ssl_context=ssl_context)
928 client.shutdown()
929
930 with self.reaped_server(SimpleIMAPHandler) as server:
931 client = self.imap_class("localhost", server.server_address[1],
932 ssl_context=ssl_context)
933 client.shutdown()
934
R. David Murraye8dc2582009-12-10 02:08:06 +0000935
Antoine Pitroucac9e712014-07-31 18:35:45 -0400936@unittest.skipUnless(
937 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000938class RemoteIMAPTest(unittest.TestCase):
939 host = 'cyrus.andrew.cmu.edu'
940 port = 143
941 username = 'anonymous'
942 password = 'pass'
943 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000944
Antoine Pitroub1436f12010-11-09 22:55:55 +0000945 def setUp(self):
946 with transient_internet(self.host):
947 self.server = self.imap_class(self.host, self.port)
948
949 def tearDown(self):
950 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100951 with transient_internet(self.host):
952 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000953
954 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100955 with transient_internet(self.host):
956 for cap in self.server.capabilities:
957 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000958 self.assertIn('LOGINDISABLED', self.server.capabilities)
959 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100960 rs = self.server.login(self.username, self.password)
961 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000962
963 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100964 with transient_internet(self.host):
965 rs = self.server.logout()
966 self.server = None
Victor Stinner74125a62019-04-15 18:23:20 +0200967 self.assertEqual(rs[0], 'BYE', rs)
Antoine Pitroub1436f12010-11-09 22:55:55 +0000968
969
970@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400971@unittest.skipUnless(
972 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000973class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
974
975 def setUp(self):
976 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100977 with transient_internet(self.host):
978 rs = self.server.starttls()
979 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000980
981 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000982 for cap in self.server.capabilities:
983 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000984 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000985
986
987@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000988class RemoteIMAP_SSLTest(RemoteIMAPTest):
989 port = 993
990 imap_class = IMAP4_SSL
991
Antoine Pitrou08728162011-05-06 18:49:52 +0200992 def setUp(self):
993 pass
994
995 def tearDown(self):
996 pass
997
998 def create_ssl_context(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200999 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
1000 ssl_context.check_hostname = False
1001 ssl_context.verify_mode = ssl.CERT_NONE
Antoine Pitrou08728162011-05-06 18:49:52 +02001002 ssl_context.load_cert_chain(CERTFILE)
1003 return ssl_context
1004
1005 def check_logincapa(self, server):
1006 try:
1007 for cap in server.capabilities:
1008 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +10001009 self.assertNotIn('LOGINDISABLED', server.capabilities)
1010 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +02001011 rs = server.login(self.username, self.password)
1012 self.assertEqual(rs[0], 'OK')
1013 finally:
1014 server.logout()
1015
Antoine Pitroub1436f12010-11-09 22:55:55 +00001016 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +02001017 with transient_internet(self.host):
1018 _server = self.imap_class(self.host, self.port)
1019 self.check_logincapa(_server)
1020
Antoine Pitrou08728162011-05-06 18:49:52 +02001021 def test_logout(self):
1022 with transient_internet(self.host):
1023 _server = self.imap_class(self.host, self.port)
1024 rs = _server.logout()
Victor Stinner74125a62019-04-15 18:23:20 +02001025 self.assertEqual(rs[0], 'BYE', rs)
Antoine Pitrou08728162011-05-06 18:49:52 +02001026
1027 def test_ssl_context_certfile_exclusive(self):
1028 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001029 self.assertRaises(
1030 ValueError, self.imap_class, self.host, self.port,
1031 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +02001032
1033 def test_ssl_context_keyfile_exclusive(self):
1034 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001035 self.assertRaises(
1036 ValueError, self.imap_class, self.host, self.port,
1037 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +00001038
1039
1040if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +02001041 unittest.main()