blob: b58707359c677164f5a03ba77158e911d8eb463e [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
2# If we end up with a significant number of tests that don't require
3# threading, this test module should be split. Right now we skip
4# them all if we don't have threading.
5threading = support.import_module('threading')
6
7from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00008import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00009import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +000010import socketserver
Tim Peters108b7912002-07-31 16:42:33 +000011import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000012import calendar
Martin v. Löwisea752fb2002-01-05 11:31:49 +000013
Antoine Pitroucac9e712014-07-31 18:35:45 -040014from test.support import (reap_threads, verbose, transient_internet,
15 run_with_tz, run_with_locale)
Christian Heimesf6cd9672008-03-26 13:45:42 +000016import unittest
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040017from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000018try:
19 import ssl
20except ImportError:
21 ssl = None
Christian Heimesaab99fd2013-12-15 19:39:32 +010022 HAS_SNI = False
23else:
24 from ssl import HAS_SNI
R. David Murraye8dc2582009-12-10 02:08:06 +000025
Antoine Pitroucac9e712014-07-31 18:35:45 -040026CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
27CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000028
Martin v. Löwisea752fb2002-01-05 11:31:49 +000029
Christian Heimesf6cd9672008-03-26 13:45:42 +000030class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000031
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000032 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000033 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000034 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000035 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
36 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000037 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000038 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
39 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000040 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000041 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
42 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000043
Alexander Belopolsky2420d832012-04-29 15:56:49 -040044 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
45 def test_Internaldate2tuple_issue10941(self):
46 self.assertNotEqual(imaplib.Internaldate2tuple(
47 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040048 imaplib.Internaldate2tuple(
49 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040050
51 def timevalues(self):
52 return [2000000000, 2000000000.0, time.localtime(2000000000),
53 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
54 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040055 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040056 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040057 '"18-May-2033 05:33:20 +0200"']
58
59 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
60 @run_with_tz('STD-1DST')
61 def test_Time2Internaldate(self):
62 expected = '"18-May-2033 05:33:20 +0200"'
63
64 for t in self.timevalues():
65 internal = imaplib.Time2Internaldate(t)
66 self.assertEqual(internal, expected)
67
68 def test_that_Time2Internaldate_returns_a_result(self):
69 # Without tzset, we can check only that it successfully
70 # produces a result, not the correctness of the result itself,
71 # since the result depends on the timezone the machine is in.
72 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000073 imaplib.Time2Internaldate(t)
74
75
R. David Murraye8dc2582009-12-10 02:08:06 +000076if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000077 class SecureTCPServer(socketserver.TCPServer):
78
79 def get_request(self):
80 newsocket, fromaddr = self.socket.accept()
81 connstream = ssl.wrap_socket(newsocket,
82 server_side=True,
83 certfile=CERTFILE)
84 return connstream, fromaddr
85
86 IMAP4_SSL = imaplib.IMAP4_SSL
87
88else:
89
90 class SecureTCPServer:
91 pass
92
93 IMAP4_SSL = None
94
95
96class SimpleIMAPHandler(socketserver.StreamRequestHandler):
R. David Murraye8dc2582009-12-10 02:08:06 +000097 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -050098 continuation = None
99 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +0000100
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300101 def setup(self):
102 super().setup()
103 self.server.logged = None
104
R. David Murraye8dc2582009-12-10 02:08:06 +0000105 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400106 if verbose:
107 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000108 self.wfile.write(message)
109
R David Murray774a39f2013-02-19 12:17:31 -0500110 def _send_line(self, message):
111 self._send(message + b'\r\n')
112
113 def _send_textline(self, message):
114 self._send_line(message.encode('ASCII'))
115
116 def _send_tagged(self, tag, code, message):
117 self._send_textline(' '.join((tag, code, message)))
118
R. David Murraye8dc2582009-12-10 02:08:06 +0000119 def handle(self):
120 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500121 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000122 while 1:
123 # Gather up input until we receive a line terminator or we timeout.
124 # Accumulate read(1) because it's simpler to handle the differences
125 # between naked sockets and SSL sockets.
126 line = b''
127 while 1:
128 try:
129 part = self.rfile.read(1)
130 if part == b'':
131 # Naked sockets return empty strings..
132 return
133 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200134 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200135 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000136 return
137 if line.endswith(b'\r\n'):
138 break
139
Antoine Pitroucac9e712014-07-31 18:35:45 -0400140 if verbose:
141 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500142 if self.continuation:
143 try:
144 self.continuation.send(line)
145 except StopIteration:
146 self.continuation = None
147 continue
148 splitline = line.decode('ASCII').split()
149 tag = splitline[0]
150 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000151 args = splitline[2:]
152
Antoine Pitroucac9e712014-07-31 18:35:45 -0400153 if hasattr(self, 'cmd_' + cmd):
154 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500155 if continuation:
156 self.continuation = continuation
157 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000158 else:
R David Murray774a39f2013-02-19 12:17:31 -0500159 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000160
161 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400162 caps = ('IMAP4rev1 ' + self.capabilities
163 if self.capabilities
164 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500165 self._send_textline('* CAPABILITY ' + caps)
166 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
167
168 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300169 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500170 self._send_textline('* BYE IMAP4ref1 Server logging out')
171 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000172
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300173 def cmd_LOGIN(self, tag, args):
174 self.server.logged = args[0]
175 self._send_tagged(tag, 'OK', 'LOGIN completed')
176
R. David Murraye8dc2582009-12-10 02:08:06 +0000177
Antoine Pitroucac9e712014-07-31 18:35:45 -0400178class ThreadedNetworkedTests(unittest.TestCase):
179 server_class = socketserver.TCPServer
180 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000181
182 def make_server(self, addr, hdlr):
183
184 class MyServer(self.server_class):
185 def handle_error(self, request, client_address):
186 self.close_request(request)
187 self.server_close()
188 raise
189
Antoine Pitroucac9e712014-07-31 18:35:45 -0400190 if verbose:
191 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000192 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000193 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000194
195 if verbose:
196 print("server created")
197 print("ADDR =", addr)
198 print("CLASS =", self.server_class)
199 print("HDLR =", server.RequestHandlerClass)
200
201 t = threading.Thread(
202 name='%s serving' % self.server_class,
203 target=server.serve_forever,
204 # Short poll interval to make the test finish quickly.
205 # Time between requests is short enough that we won't wake
206 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400207 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000208 t.daemon = True # In case this function raises.
209 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400210 if verbose:
211 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000212 return server, t
213
214 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400215 if verbose:
216 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000217 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000218 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000219 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400220 if verbose:
221 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000222
223 @contextmanager
224 def reaped_server(self, hdlr):
225 server, thread = self.make_server((support.HOST, 0), hdlr)
226 try:
227 yield server
228 finally:
229 self.reap_server(server, thread)
230
R David Murray774a39f2013-02-19 12:17:31 -0500231 @contextmanager
232 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100233 with self.reaped_server(hdlr) as server:
234 client = self.imap_class(*server.server_address)
235 try:
236 yield server, client
237 finally:
238 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500239
R. David Murraye8dc2582009-12-10 02:08:06 +0000240 @reap_threads
241 def test_connect(self):
242 with self.reaped_server(SimpleIMAPHandler) as server:
243 client = self.imap_class(*server.server_address)
244 client.shutdown()
245
246 @reap_threads
247 def test_issue5949(self):
248
249 class EOFHandler(socketserver.StreamRequestHandler):
250 def handle(self):
251 # EOF without sending a complete welcome message.
252 self.wfile.write(b'* OK')
253
254 with self.reaped_server(EOFHandler) as server:
255 self.assertRaises(imaplib.IMAP4.abort,
256 self.imap_class, *server.server_address)
257
258 @reap_threads
259 def test_line_termination(self):
260
261 class BadNewlineHandler(SimpleIMAPHandler):
262
263 def cmd_CAPABILITY(self, tag, args):
264 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500265 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000266
267 with self.reaped_server(BadNewlineHandler) as server:
268 self.assertRaises(imaplib.IMAP4.abort,
269 self.imap_class, *server.server_address)
270
R David Murray774a39f2013-02-19 12:17:31 -0500271 @reap_threads
272 def test_bad_auth_name(self):
273
274 class MyServer(SimpleIMAPHandler):
275
276 def cmd_AUTHENTICATE(self, tag, args):
277 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400278 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500279
280 with self.reaped_pair(MyServer) as (server, client):
281 with self.assertRaises(imaplib.IMAP4.error):
282 client.authenticate('METHOD', lambda: 1)
283
284 @reap_threads
285 def test_invalid_authentication(self):
286
287 class MyServer(SimpleIMAPHandler):
288
289 def cmd_AUTHENTICATE(self, tag, args):
290 self._send_textline('+')
291 self.response = yield
292 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
293
294 with self.reaped_pair(MyServer) as (server, client):
295 with self.assertRaises(imaplib.IMAP4.error):
296 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
297
298 @reap_threads
299 def test_valid_authentication(self):
300
301 class MyServer(SimpleIMAPHandler):
302
303 def cmd_AUTHENTICATE(self, tag, args):
304 self._send_textline('+')
305 self.server.response = yield
306 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
307
308 with self.reaped_pair(MyServer) as (server, client):
309 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
310 self.assertEqual(code, 'OK')
311 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400312 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500313
314 with self.reaped_pair(MyServer) as (server, client):
315 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
316 self.assertEqual(code, 'OK')
317 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400318 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500319
320 @reap_threads
321 def test_login_cram_md5(self):
322
323 class AuthHandler(SimpleIMAPHandler):
324
325 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
326
327 def cmd_AUTHENTICATE(self, tag, args):
328 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400329 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500330 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400331 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
332 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500333 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
334 else:
335 self._send_tagged(tag, 'NO', 'No access')
336
337 with self.reaped_pair(AuthHandler) as (server, client):
338 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
339 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
340 self.assertEqual(ret, "OK")
341
342 with self.reaped_pair(AuthHandler) as (server, client):
343 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
344 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
345 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000346
Georg Brandlca580f42013-10-27 06:52:14 +0100347 def test_linetoolong(self):
348 class TooLongHandler(SimpleIMAPHandler):
349 def handle(self):
350 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400351 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100352
353 with self.reaped_server(TooLongHandler) as server:
354 self.assertRaises(imaplib.IMAP4.error,
355 self.imap_class, *server.server_address)
356
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300357 @reap_threads
358 def test_simple_with_statement(self):
359 # simplest call
360 with self.reaped_server(SimpleIMAPHandler) as server:
361 with self.imap_class(*server.server_address):
362 pass
363
364 @reap_threads
365 def test_with_statement(self):
366 with self.reaped_server(SimpleIMAPHandler) as server:
367 with self.imap_class(*server.server_address) as imap:
368 imap.login('user', 'pass')
369 self.assertEqual(server.logged, 'user')
370 self.assertIsNone(server.logged)
371
372 @reap_threads
373 def test_with_statement_logout(self):
374 # what happens if already logout in the block?
375 with self.reaped_server(SimpleIMAPHandler) as server:
376 with self.imap_class(*server.server_address) as imap:
377 imap.login('user', 'pass')
378 self.assertEqual(server.logged, 'user')
379 imap.logout()
380 self.assertIsNone(server.logged)
381 self.assertIsNone(server.logged)
382
Georg Brandlca580f42013-10-27 06:52:14 +0100383
R. David Murraye8dc2582009-12-10 02:08:06 +0000384@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400385class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000386 server_class = SecureTCPServer
387 imap_class = IMAP4_SSL
388
Christian Heimes48aae572013-12-02 20:01:29 +0100389 @reap_threads
Christian Heimesaab99fd2013-12-15 19:39:32 +0100390 @unittest.skipUnless(HAS_SNI, 'No SNI support in ssl module')
Christian Heimes48aae572013-12-02 20:01:29 +0100391 def test_ssl_verified(self):
392 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
393 ssl_context.verify_mode = ssl.CERT_REQUIRED
394 ssl_context.check_hostname = True
395 ssl_context.load_verify_locations(CAFILE)
396
Antoine Pitroucac9e712014-07-31 18:35:45 -0400397 with self.assertRaisesRegex(
398 ssl.CertificateError,
399 "hostname '127.0.0.1' doesn't match 'localhost'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100400 with self.reaped_server(SimpleIMAPHandler) as server:
401 client = self.imap_class(*server.server_address,
402 ssl_context=ssl_context)
403 client.shutdown()
404
405 with self.reaped_server(SimpleIMAPHandler) as server:
406 client = self.imap_class("localhost", server.server_address[1],
407 ssl_context=ssl_context)
408 client.shutdown()
409
R. David Murraye8dc2582009-12-10 02:08:06 +0000410
Antoine Pitroucac9e712014-07-31 18:35:45 -0400411@unittest.skipUnless(
412 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000413class RemoteIMAPTest(unittest.TestCase):
414 host = 'cyrus.andrew.cmu.edu'
415 port = 143
416 username = 'anonymous'
417 password = 'pass'
418 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000419
Antoine Pitroub1436f12010-11-09 22:55:55 +0000420 def setUp(self):
421 with transient_internet(self.host):
422 self.server = self.imap_class(self.host, self.port)
423
424 def tearDown(self):
425 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100426 with transient_internet(self.host):
427 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000428
429 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100430 with transient_internet(self.host):
431 for cap in self.server.capabilities:
432 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000433 self.assertIn('LOGINDISABLED', self.server.capabilities)
434 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100435 rs = self.server.login(self.username, self.password)
436 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000437
438 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100439 with transient_internet(self.host):
440 rs = self.server.logout()
441 self.server = None
442 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000443
444
445@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400446@unittest.skipUnless(
447 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000448class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
449
450 def setUp(self):
451 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100452 with transient_internet(self.host):
453 rs = self.server.starttls()
454 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000455
456 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000457 for cap in self.server.capabilities:
458 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000459 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000460
461
462@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000463class RemoteIMAP_SSLTest(RemoteIMAPTest):
464 port = 993
465 imap_class = IMAP4_SSL
466
Antoine Pitrou08728162011-05-06 18:49:52 +0200467 def setUp(self):
468 pass
469
470 def tearDown(self):
471 pass
472
473 def create_ssl_context(self):
474 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
475 ssl_context.load_cert_chain(CERTFILE)
476 return ssl_context
477
478 def check_logincapa(self, server):
479 try:
480 for cap in server.capabilities:
481 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000482 self.assertNotIn('LOGINDISABLED', server.capabilities)
483 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200484 rs = server.login(self.username, self.password)
485 self.assertEqual(rs[0], 'OK')
486 finally:
487 server.logout()
488
Antoine Pitroub1436f12010-11-09 22:55:55 +0000489 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200490 with transient_internet(self.host):
491 _server = self.imap_class(self.host, self.port)
492 self.check_logincapa(_server)
493
494 def test_logincapa_with_client_certfile(self):
495 with transient_internet(self.host):
496 _server = self.imap_class(self.host, self.port, certfile=CERTFILE)
497 self.check_logincapa(_server)
498
499 def test_logincapa_with_client_ssl_context(self):
500 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400501 _server = self.imap_class(
502 self.host, self.port, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +0200503 self.check_logincapa(_server)
504
505 def test_logout(self):
506 with transient_internet(self.host):
507 _server = self.imap_class(self.host, self.port)
508 rs = _server.logout()
509 self.assertEqual(rs[0], 'BYE')
510
511 def test_ssl_context_certfile_exclusive(self):
512 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400513 self.assertRaises(
514 ValueError, self.imap_class, self.host, self.port,
515 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +0200516
517 def test_ssl_context_keyfile_exclusive(self):
518 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400519 self.assertRaises(
520 ValueError, self.imap_class, self.host, self.port,
521 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +0000522
523
524if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +0200525 unittest.main()