blob: bafd62b63d2f7a5bb86be53adde9ba8b2355d9c1 [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
2# If we end up with a significant number of tests that don't require
3# threading, this test module should be split. Right now we skip
4# them all if we don't have threading.
5threading = support.import_module('threading')
6
7from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00008import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00009import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +000010import socketserver
Tim Peters108b7912002-07-31 16:42:33 +000011import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000012import calendar
Martin v. Löwisea752fb2002-01-05 11:31:49 +000013
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040014from test.support import reap_threads, verbose, transient_internet, run_with_tz, run_with_locale
Christian Heimesf6cd9672008-03-26 13:45:42 +000015import unittest
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040016from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000017try:
18 import ssl
19except ImportError:
20 ssl = None
21
22CERTFILE = None
Christian Heimes48aae572013-12-02 20:01:29 +010023CAFILE = None
R. David Murraye8dc2582009-12-10 02:08:06 +000024
Martin v. Löwisea752fb2002-01-05 11:31:49 +000025
Christian Heimesf6cd9672008-03-26 13:45:42 +000026class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000027
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000028 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000029 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000030 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000031 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
32 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000033 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000034 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
35 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000036 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000037 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
38 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000039
Alexander Belopolsky2420d832012-04-29 15:56:49 -040040 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
41 def test_Internaldate2tuple_issue10941(self):
42 self.assertNotEqual(imaplib.Internaldate2tuple(
43 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
44 imaplib.Internaldate2tuple(
45 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
46
Christian Heimesf6cd9672008-03-26 13:45:42 +000047
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040048
49 def timevalues(self):
50 return [2000000000, 2000000000.0, time.localtime(2000000000),
51 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
52 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040053 datetime.fromtimestamp(2000000000,
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040054 timezone(timedelta(0, 2*60*60))),
55 '"18-May-2033 05:33:20 +0200"']
56
57 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
58 @run_with_tz('STD-1DST')
59 def test_Time2Internaldate(self):
60 expected = '"18-May-2033 05:33:20 +0200"'
61
62 for t in self.timevalues():
63 internal = imaplib.Time2Internaldate(t)
64 self.assertEqual(internal, expected)
65
66 def test_that_Time2Internaldate_returns_a_result(self):
67 # Without tzset, we can check only that it successfully
68 # produces a result, not the correctness of the result itself,
69 # since the result depends on the timezone the machine is in.
70 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000071 imaplib.Time2Internaldate(t)
72
73
R. David Murraye8dc2582009-12-10 02:08:06 +000074if ssl:
75
76 class SecureTCPServer(socketserver.TCPServer):
77
78 def get_request(self):
79 newsocket, fromaddr = self.socket.accept()
80 connstream = ssl.wrap_socket(newsocket,
81 server_side=True,
82 certfile=CERTFILE)
83 return connstream, fromaddr
84
85 IMAP4_SSL = imaplib.IMAP4_SSL
86
87else:
88
89 class SecureTCPServer:
90 pass
91
92 IMAP4_SSL = None
93
94
95class SimpleIMAPHandler(socketserver.StreamRequestHandler):
96
97 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -050098 continuation = None
99 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +0000100
101 def _send(self, message):
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +0000102 if verbose: print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000103 self.wfile.write(message)
104
R David Murray774a39f2013-02-19 12:17:31 -0500105 def _send_line(self, message):
106 self._send(message + b'\r\n')
107
108 def _send_textline(self, message):
109 self._send_line(message.encode('ASCII'))
110
111 def _send_tagged(self, tag, code, message):
112 self._send_textline(' '.join((tag, code, message)))
113
R. David Murraye8dc2582009-12-10 02:08:06 +0000114 def handle(self):
115 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500116 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000117 while 1:
118 # Gather up input until we receive a line terminator or we timeout.
119 # Accumulate read(1) because it's simpler to handle the differences
120 # between naked sockets and SSL sockets.
121 line = b''
122 while 1:
123 try:
124 part = self.rfile.read(1)
125 if part == b'':
126 # Naked sockets return empty strings..
127 return
128 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200129 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200130 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000131 return
132 if line.endswith(b'\r\n'):
133 break
134
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +0000135 if verbose: print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500136 if self.continuation:
137 try:
138 self.continuation.send(line)
139 except StopIteration:
140 self.continuation = None
141 continue
142 splitline = line.decode('ASCII').split()
143 tag = splitline[0]
144 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000145 args = splitline[2:]
146
147 if hasattr(self, 'cmd_'+cmd):
R David Murray774a39f2013-02-19 12:17:31 -0500148 continuation = getattr(self, 'cmd_'+cmd)(tag, args)
149 if continuation:
150 self.continuation = continuation
151 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000152 else:
R David Murray774a39f2013-02-19 12:17:31 -0500153 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000154
155 def cmd_CAPABILITY(self, tag, args):
R David Murray774a39f2013-02-19 12:17:31 -0500156 caps = 'IMAP4rev1 ' + self.capabilities if self.capabilities else 'IMAP4rev1'
157 self._send_textline('* CAPABILITY ' + caps)
158 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
159
160 def cmd_LOGOUT(self, tag, args):
161 self._send_textline('* BYE IMAP4ref1 Server logging out')
162 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000163
164
165class BaseThreadedNetworkedTests(unittest.TestCase):
166
167 def make_server(self, addr, hdlr):
168
169 class MyServer(self.server_class):
170 def handle_error(self, request, client_address):
171 self.close_request(request)
172 self.server_close()
173 raise
174
175 if verbose: print("creating server")
176 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000177 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000178
179 if verbose:
180 print("server created")
181 print("ADDR =", addr)
182 print("CLASS =", self.server_class)
183 print("HDLR =", server.RequestHandlerClass)
184
185 t = threading.Thread(
186 name='%s serving' % self.server_class,
187 target=server.serve_forever,
188 # Short poll interval to make the test finish quickly.
189 # Time between requests is short enough that we won't wake
190 # up spuriously too many times.
191 kwargs={'poll_interval':0.01})
192 t.daemon = True # In case this function raises.
193 t.start()
194 if verbose: print("server running")
195 return server, t
196
197 def reap_server(self, server, thread):
198 if verbose: print("waiting for server")
199 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000200 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000201 thread.join()
202 if verbose: print("done")
203
204 @contextmanager
205 def reaped_server(self, hdlr):
206 server, thread = self.make_server((support.HOST, 0), hdlr)
207 try:
208 yield server
209 finally:
210 self.reap_server(server, thread)
211
R David Murray774a39f2013-02-19 12:17:31 -0500212 @contextmanager
213 def reaped_pair(self, hdlr):
214 server, thread = self.make_server((support.HOST, 0), hdlr)
215 client = self.imap_class(*server.server_address)
216 try:
217 yield server, client
218 finally:
219 client.logout()
220 self.reap_server(server, thread)
221
R. David Murraye8dc2582009-12-10 02:08:06 +0000222 @reap_threads
223 def test_connect(self):
224 with self.reaped_server(SimpleIMAPHandler) as server:
225 client = self.imap_class(*server.server_address)
226 client.shutdown()
227
228 @reap_threads
229 def test_issue5949(self):
230
231 class EOFHandler(socketserver.StreamRequestHandler):
232 def handle(self):
233 # EOF without sending a complete welcome message.
234 self.wfile.write(b'* OK')
235
236 with self.reaped_server(EOFHandler) as server:
237 self.assertRaises(imaplib.IMAP4.abort,
238 self.imap_class, *server.server_address)
239
240 @reap_threads
241 def test_line_termination(self):
242
243 class BadNewlineHandler(SimpleIMAPHandler):
244
245 def cmd_CAPABILITY(self, tag, args):
246 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500247 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000248
249 with self.reaped_server(BadNewlineHandler) as server:
250 self.assertRaises(imaplib.IMAP4.abort,
251 self.imap_class, *server.server_address)
252
R David Murray774a39f2013-02-19 12:17:31 -0500253 @reap_threads
254 def test_bad_auth_name(self):
255
256 class MyServer(SimpleIMAPHandler):
257
258 def cmd_AUTHENTICATE(self, tag, args):
259 self._send_tagged(tag, 'NO', 'unrecognized authentication '
260 'type {}'.format(args[0]))
261
262 with self.reaped_pair(MyServer) as (server, client):
263 with self.assertRaises(imaplib.IMAP4.error):
264 client.authenticate('METHOD', lambda: 1)
265
266 @reap_threads
267 def test_invalid_authentication(self):
268
269 class MyServer(SimpleIMAPHandler):
270
271 def cmd_AUTHENTICATE(self, tag, args):
272 self._send_textline('+')
273 self.response = yield
274 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
275
276 with self.reaped_pair(MyServer) as (server, client):
277 with self.assertRaises(imaplib.IMAP4.error):
278 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
279
280 @reap_threads
281 def test_valid_authentication(self):
282
283 class MyServer(SimpleIMAPHandler):
284
285 def cmd_AUTHENTICATE(self, tag, args):
286 self._send_textline('+')
287 self.server.response = yield
288 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
289
290 with self.reaped_pair(MyServer) as (server, client):
291 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
292 self.assertEqual(code, 'OK')
293 self.assertEqual(server.response,
294 b'ZmFrZQ==\r\n') #b64 encoded 'fake'
295
296 with self.reaped_pair(MyServer) as (server, client):
297 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
298 self.assertEqual(code, 'OK')
299 self.assertEqual(server.response,
300 b'ZmFrZQ==\r\n') #b64 encoded 'fake'
301
302 @reap_threads
303 def test_login_cram_md5(self):
304
305 class AuthHandler(SimpleIMAPHandler):
306
307 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
308
309 def cmd_AUTHENTICATE(self, tag, args):
310 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
311 'VzdG9uLm1jaS5uZXQ=')
312 r = yield
313 if r == b'dGltIGYxY2E2YmU0NjRiOWVmYTFjY2E2ZmZkNmNmMmQ5ZjMy\r\n':
314 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
315 else:
316 self._send_tagged(tag, 'NO', 'No access')
317
318 with self.reaped_pair(AuthHandler) as (server, client):
319 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
320 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
321 self.assertEqual(ret, "OK")
322
323 with self.reaped_pair(AuthHandler) as (server, client):
324 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
325 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
326 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000327
328
Georg Brandlca580f42013-10-27 06:52:14 +0100329 def test_linetoolong(self):
330 class TooLongHandler(SimpleIMAPHandler):
331 def handle(self):
332 # Send a very long response line
333 self.wfile.write(b'* OK ' + imaplib._MAXLINE*b'x' + b'\r\n')
334
335 with self.reaped_server(TooLongHandler) as server:
336 self.assertRaises(imaplib.IMAP4.error,
337 self.imap_class, *server.server_address)
338
339
R. David Murraye8dc2582009-12-10 02:08:06 +0000340class ThreadedNetworkedTests(BaseThreadedNetworkedTests):
341
342 server_class = socketserver.TCPServer
343 imap_class = imaplib.IMAP4
344
345
346@unittest.skipUnless(ssl, "SSL not available")
347class ThreadedNetworkedTestsSSL(BaseThreadedNetworkedTests):
348
349 server_class = SecureTCPServer
350 imap_class = IMAP4_SSL
351
Christian Heimes48aae572013-12-02 20:01:29 +0100352 @reap_threads
353 def test_ssl_verified(self):
354 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
355 ssl_context.verify_mode = ssl.CERT_REQUIRED
356 ssl_context.check_hostname = True
357 ssl_context.load_verify_locations(CAFILE)
358
359 with self.assertRaisesRegex(ssl.CertificateError,
360 "hostname '127.0.0.1' doesn't match 'localhost'"):
361 with self.reaped_server(SimpleIMAPHandler) as server:
362 client = self.imap_class(*server.server_address,
363 ssl_context=ssl_context)
364 client.shutdown()
365
366 with self.reaped_server(SimpleIMAPHandler) as server:
367 client = self.imap_class("localhost", server.server_address[1],
368 ssl_context=ssl_context)
369 client.shutdown()
370
R. David Murraye8dc2582009-12-10 02:08:06 +0000371
Antoine Pitroub1436f12010-11-09 22:55:55 +0000372class RemoteIMAPTest(unittest.TestCase):
373 host = 'cyrus.andrew.cmu.edu'
374 port = 143
375 username = 'anonymous'
376 password = 'pass'
377 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000378
Antoine Pitroub1436f12010-11-09 22:55:55 +0000379 def setUp(self):
380 with transient_internet(self.host):
381 self.server = self.imap_class(self.host, self.port)
382
383 def tearDown(self):
384 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100385 with transient_internet(self.host):
386 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000387
388 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100389 with transient_internet(self.host):
390 for cap in self.server.capabilities:
391 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000392 self.assertIn('LOGINDISABLED', self.server.capabilities)
393 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100394 rs = self.server.login(self.username, self.password)
395 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000396
397 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100398 with transient_internet(self.host):
399 rs = self.server.logout()
400 self.server = None
401 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000402
403
404@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000405class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
406
407 def setUp(self):
408 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100409 with transient_internet(self.host):
410 rs = self.server.starttls()
411 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000412
413 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000414 for cap in self.server.capabilities:
415 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000416 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000417
418
419@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000420class RemoteIMAP_SSLTest(RemoteIMAPTest):
421 port = 993
422 imap_class = IMAP4_SSL
423
Antoine Pitrou08728162011-05-06 18:49:52 +0200424 def setUp(self):
425 pass
426
427 def tearDown(self):
428 pass
429
430 def create_ssl_context(self):
431 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
432 ssl_context.load_cert_chain(CERTFILE)
433 return ssl_context
434
435 def check_logincapa(self, server):
436 try:
437 for cap in server.capabilities:
438 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000439 self.assertNotIn('LOGINDISABLED', server.capabilities)
440 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200441 rs = server.login(self.username, self.password)
442 self.assertEqual(rs[0], 'OK')
443 finally:
444 server.logout()
445
Antoine Pitroub1436f12010-11-09 22:55:55 +0000446 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200447 with transient_internet(self.host):
448 _server = self.imap_class(self.host, self.port)
449 self.check_logincapa(_server)
450
451 def test_logincapa_with_client_certfile(self):
452 with transient_internet(self.host):
453 _server = self.imap_class(self.host, self.port, certfile=CERTFILE)
454 self.check_logincapa(_server)
455
456 def test_logincapa_with_client_ssl_context(self):
457 with transient_internet(self.host):
458 _server = self.imap_class(self.host, self.port, ssl_context=self.create_ssl_context())
459 self.check_logincapa(_server)
460
461 def test_logout(self):
462 with transient_internet(self.host):
463 _server = self.imap_class(self.host, self.port)
464 rs = _server.logout()
465 self.assertEqual(rs[0], 'BYE')
466
467 def test_ssl_context_certfile_exclusive(self):
468 with transient_internet(self.host):
469 self.assertRaises(ValueError, self.imap_class, self.host, self.port,
470 certfile=CERTFILE, ssl_context=self.create_ssl_context())
471
472 def test_ssl_context_keyfile_exclusive(self):
473 with transient_internet(self.host):
474 self.assertRaises(ValueError, self.imap_class, self.host, self.port,
475 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitroub1436f12010-11-09 22:55:55 +0000476
477
Ezio Melotti02bf7012013-03-02 14:25:56 +0200478def load_tests(*args):
R. David Murraye8dc2582009-12-10 02:08:06 +0000479 tests = [TestImaplib]
480
481 if support.is_resource_enabled('network'):
482 if ssl:
Christian Heimes48aae572013-12-02 20:01:29 +0100483 global CERTFILE, CAFILE
R. David Murraye8dc2582009-12-10 02:08:06 +0000484 CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir,
Christian Heimes48aae572013-12-02 20:01:29 +0100485 "keycert3.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +0000486 if not os.path.exists(CERTFILE):
487 raise support.TestFailed("Can't read certificate files!")
Christian Heimes48aae572013-12-02 20:01:29 +0100488 CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir,
489 "pycacert.pem")
490 if not os.path.exists(CAFILE):
491 raise support.TestFailed("Can't read CA file!")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000492 tests.extend([
493 ThreadedNetworkedTests, ThreadedNetworkedTestsSSL,
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000494 RemoteIMAPTest, RemoteIMAP_SSLTest, RemoteIMAP_STARTTLSTest,
Antoine Pitroub1436f12010-11-09 22:55:55 +0000495 ])
R. David Murraye8dc2582009-12-10 02:08:06 +0000496
Ezio Melotti02bf7012013-03-02 14:25:56 +0200497 return unittest.TestSuite([unittest.makeSuite(test) for test in tests])
Christian Heimesf6cd9672008-03-26 13:45:42 +0000498
499
500if __name__ == "__main__":
R. David Murraye8dc2582009-12-10 02:08:06 +0000501 support.use_resources = ['network']
Ezio Melotti02bf7012013-03-02 14:25:56 +0200502 unittest.main()