blob: a0b598d0c7840926a4aeba5458b411021ee1b5aa [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
R. David Murraye8dc2582009-12-10 02:08:06 +00002
3from contextlib import contextmanager
Berker Peksage4dcbbd2018-08-07 05:12:18 +03004import errno
Martin v. Löwisea752fb2002-01-05 11:31:49 +00005import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00006import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +00007import socketserver
Tim Peters108b7912002-07-31 16:42:33 +00008import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +00009import calendar
Antoine Pitroua6a4dc82017-09-07 18:56:24 +020010import threading
Martin v. Löwisea752fb2002-01-05 11:31:49 +000011
Antoine Pitroucac9e712014-07-31 18:35:45 -040012from test.support import (reap_threads, verbose, transient_internet,
Victor Stinnerb18563d2017-06-14 18:48:32 +020013 run_with_tz, run_with_locale, cpython_only)
Christian Heimesf6cd9672008-03-26 13:45:42 +000014import unittest
R David Murrayb079c072016-12-24 21:32:26 -050015from unittest import mock
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040016from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000017try:
18 import ssl
19except ImportError:
20 ssl = None
21
Antoine Pitroucac9e712014-07-31 18:35:45 -040022CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
23CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000024
Martin v. Löwisea752fb2002-01-05 11:31:49 +000025
Christian Heimesf6cd9672008-03-26 13:45:42 +000026class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000027
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000028 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000029 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000030 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000031 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
32 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000033 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000034 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
35 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000036 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000037 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
38 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000039
Alexander Belopolsky2420d832012-04-29 15:56:49 -040040 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
41 def test_Internaldate2tuple_issue10941(self):
42 self.assertNotEqual(imaplib.Internaldate2tuple(
43 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040044 imaplib.Internaldate2tuple(
45 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040046
47 def timevalues(self):
48 return [2000000000, 2000000000.0, time.localtime(2000000000),
49 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
50 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040051 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040052 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040053 '"18-May-2033 05:33:20 +0200"']
54
55 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
Martin Panter6e0889f2015-11-16 07:21:38 +000056 # DST rules included to work around quirk where the Gnu C library may not
57 # otherwise restore the previous time zone
58 @run_with_tz('STD-1DST,M3.2.0,M11.1.0')
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040059 def test_Time2Internaldate(self):
60 expected = '"18-May-2033 05:33:20 +0200"'
61
62 for t in self.timevalues():
63 internal = imaplib.Time2Internaldate(t)
64 self.assertEqual(internal, expected)
65
66 def test_that_Time2Internaldate_returns_a_result(self):
67 # Without tzset, we can check only that it successfully
68 # produces a result, not the correctness of the result itself,
69 # since the result depends on the timezone the machine is in.
70 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000071 imaplib.Time2Internaldate(t)
72
Berker Peksage4dcbbd2018-08-07 05:12:18 +030073 def test_imap4_host_default_value(self):
74 expected_errnos = [
75 # This is the exception that should be raised.
76 errno.ECONNREFUSED,
77 ]
78 if hasattr(errno, 'EADDRNOTAVAIL'):
79 # socket.create_connection() fails randomly with
80 # EADDRNOTAVAIL on Travis CI.
81 expected_errnos.append(errno.EADDRNOTAVAIL)
82 with self.assertRaises(OSError) as cm:
83 imaplib.IMAP4()
84 self.assertIn(cm.exception.errno, expected_errnos)
85
Christian Heimesf6cd9672008-03-26 13:45:42 +000086
R. David Murraye8dc2582009-12-10 02:08:06 +000087if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000088 class SecureTCPServer(socketserver.TCPServer):
89
90 def get_request(self):
91 newsocket, fromaddr = self.socket.accept()
Christian Heimesd0486372016-09-10 23:23:33 +020092 context = ssl.SSLContext()
93 context.load_cert_chain(CERTFILE)
94 connstream = context.wrap_socket(newsocket, server_side=True)
R. David Murraye8dc2582009-12-10 02:08:06 +000095 return connstream, fromaddr
96
97 IMAP4_SSL = imaplib.IMAP4_SSL
98
99else:
100
101 class SecureTCPServer:
102 pass
103
104 IMAP4_SSL = None
105
106
107class SimpleIMAPHandler(socketserver.StreamRequestHandler):
R. David Murraye8dc2582009-12-10 02:08:06 +0000108 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -0500109 continuation = None
110 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +0000111
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300112 def setup(self):
113 super().setup()
114 self.server.logged = None
115
R. David Murraye8dc2582009-12-10 02:08:06 +0000116 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400117 if verbose:
118 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000119 self.wfile.write(message)
120
R David Murray774a39f2013-02-19 12:17:31 -0500121 def _send_line(self, message):
122 self._send(message + b'\r\n')
123
124 def _send_textline(self, message):
125 self._send_line(message.encode('ASCII'))
126
127 def _send_tagged(self, tag, code, message):
128 self._send_textline(' '.join((tag, code, message)))
129
R. David Murraye8dc2582009-12-10 02:08:06 +0000130 def handle(self):
131 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500132 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000133 while 1:
134 # Gather up input until we receive a line terminator or we timeout.
135 # Accumulate read(1) because it's simpler to handle the differences
136 # between naked sockets and SSL sockets.
137 line = b''
138 while 1:
139 try:
140 part = self.rfile.read(1)
141 if part == b'':
142 # Naked sockets return empty strings..
143 return
144 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200145 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200146 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000147 return
148 if line.endswith(b'\r\n'):
149 break
150
Antoine Pitroucac9e712014-07-31 18:35:45 -0400151 if verbose:
152 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500153 if self.continuation:
154 try:
155 self.continuation.send(line)
156 except StopIteration:
157 self.continuation = None
158 continue
159 splitline = line.decode('ASCII').split()
160 tag = splitline[0]
161 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000162 args = splitline[2:]
163
Antoine Pitroucac9e712014-07-31 18:35:45 -0400164 if hasattr(self, 'cmd_' + cmd):
165 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500166 if continuation:
167 self.continuation = continuation
168 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000169 else:
R David Murray774a39f2013-02-19 12:17:31 -0500170 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000171
172 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400173 caps = ('IMAP4rev1 ' + self.capabilities
174 if self.capabilities
175 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500176 self._send_textline('* CAPABILITY ' + caps)
177 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
178
179 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300180 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500181 self._send_textline('* BYE IMAP4ref1 Server logging out')
182 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000183
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300184 def cmd_LOGIN(self, tag, args):
185 self.server.logged = args[0]
186 self._send_tagged(tag, 'OK', 'LOGIN completed')
187
R. David Murraye8dc2582009-12-10 02:08:06 +0000188
R David Murrayb079c072016-12-24 21:32:26 -0500189class NewIMAPTestsMixin():
190 client = None
191
192 def _setup(self, imap_handler, connect=True):
193 """
194 Sets up imap_handler for tests. imap_handler should inherit from either:
195 - SimpleIMAPHandler - for testing IMAP commands,
196 - socketserver.StreamRequestHandler - if raw access to stream is needed.
197 Returns (client, server).
198 """
199 class TestTCPServer(self.server_class):
200 def handle_error(self, request, client_address):
201 """
202 End request and raise the error if one occurs.
203 """
204 self.close_request(request)
205 self.server_close()
206 raise
207
208 self.addCleanup(self._cleanup)
209 self.server = self.server_class((support.HOST, 0), imap_handler)
210 self.thread = threading.Thread(
211 name=self._testMethodName+'-server',
212 target=self.server.serve_forever,
213 # Short poll interval to make the test finish quickly.
214 # Time between requests is short enough that we won't wake
215 # up spuriously too many times.
216 kwargs={'poll_interval': 0.01})
217 self.thread.daemon = True # In case this function raises.
218 self.thread.start()
219
220 if connect:
221 self.client = self.imap_class(*self.server.server_address)
222
223 return self.client, self.server
224
225 def _cleanup(self):
226 """
227 Cleans up the test server. This method should not be called manually,
228 it is added to the cleanup queue in the _setup method already.
229 """
230 # if logout was called already we'd raise an exception trying to
231 # shutdown the client once again
232 if self.client is not None and self.client.state != 'LOGOUT':
233 self.client.shutdown()
234 # cleanup the server
235 self.server.shutdown()
236 self.server.server_close()
Victor Stinnerb9b69002017-09-14 14:40:56 -0700237 support.join_thread(self.thread, 3.0)
238 # Explicitly clear the attribute to prevent dangling thread
239 self.thread = None
R David Murrayb079c072016-12-24 21:32:26 -0500240
241 def test_EOF_without_complete_welcome_message(self):
242 # http://bugs.python.org/issue5949
243 class EOFHandler(socketserver.StreamRequestHandler):
244 def handle(self):
245 self.wfile.write(b'* OK')
246 _, server = self._setup(EOFHandler, connect=False)
247 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
248 *server.server_address)
249
250 def test_line_termination(self):
251 class BadNewlineHandler(SimpleIMAPHandler):
252 def cmd_CAPABILITY(self, tag, args):
253 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
254 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
255 _, server = self._setup(BadNewlineHandler, connect=False)
256 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
257 *server.server_address)
258
259 def test_enable_raises_error_if_not_AUTH(self):
260 class EnableHandler(SimpleIMAPHandler):
261 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
262 client, _ = self._setup(EnableHandler)
263 self.assertFalse(client.utf8_enabled)
264 with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
265 client.enable('foo')
266 self.assertFalse(client.utf8_enabled)
267
268 def test_enable_raises_error_if_no_capability(self):
269 client, _ = self._setup(SimpleIMAPHandler)
270 with self.assertRaisesRegex(imaplib.IMAP4.error,
271 'does not support ENABLE'):
272 client.enable('foo')
273
274 def test_enable_UTF8_raises_error_if_not_supported(self):
275 client, _ = self._setup(SimpleIMAPHandler)
276 typ, data = client.login('user', 'pass')
277 self.assertEqual(typ, 'OK')
278 with self.assertRaisesRegex(imaplib.IMAP4.error,
279 'does not support ENABLE'):
280 client.enable('UTF8=ACCEPT')
281
282 def test_enable_UTF8_True_append(self):
283 class UTF8AppendServer(SimpleIMAPHandler):
284 capabilities = 'ENABLE UTF8=ACCEPT'
285 def cmd_ENABLE(self, tag, args):
286 self._send_tagged(tag, 'OK', 'ENABLE successful')
287 def cmd_AUTHENTICATE(self, tag, args):
288 self._send_textline('+')
289 self.server.response = yield
290 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
291 def cmd_APPEND(self, tag, args):
292 self._send_textline('+')
293 self.server.response = yield
294 self._send_tagged(tag, 'OK', 'okay')
295 client, server = self._setup(UTF8AppendServer)
296 self.assertEqual(client._encoding, 'ascii')
297 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
298 self.assertEqual(code, 'OK')
299 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
300 code, _ = client.enable('UTF8=ACCEPT')
301 self.assertEqual(code, 'OK')
302 self.assertEqual(client._encoding, 'utf-8')
303 msg_string = 'Subject: üñí©öðé'
304 typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
305 self.assertEqual(typ, 'OK')
306 self.assertEqual(server.response,
307 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
308
309 def test_search_disallows_charset_in_utf8_mode(self):
310 class UTF8Server(SimpleIMAPHandler):
311 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
312 def cmd_ENABLE(self, tag, args):
313 self._send_tagged(tag, 'OK', 'ENABLE successful')
314 def cmd_AUTHENTICATE(self, tag, args):
315 self._send_textline('+')
316 self.server.response = yield
317 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
318 client, _ = self._setup(UTF8Server)
319 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
320 self.assertEqual(typ, 'OK')
321 typ, _ = client.enable('UTF8=ACCEPT')
322 self.assertEqual(typ, 'OK')
323 self.assertTrue(client.utf8_enabled)
324 with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
325 client.search('foo', 'bar')
326
327 def test_bad_auth_name(self):
328 class MyServer(SimpleIMAPHandler):
329 def cmd_AUTHENTICATE(self, tag, args):
330 self._send_tagged(tag, 'NO',
331 'unrecognized authentication type {}'.format(args[0]))
332 client, _ = self._setup(MyServer)
333 with self.assertRaisesRegex(imaplib.IMAP4.error,
334 'unrecognized authentication type METHOD'):
335 client.authenticate('METHOD', lambda: 1)
336
337 def test_invalid_authentication(self):
338 class MyServer(SimpleIMAPHandler):
339 def cmd_AUTHENTICATE(self, tag, args):
340 self._send_textline('+')
341 self.response = yield
342 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
343 client, _ = self._setup(MyServer)
344 with self.assertRaisesRegex(imaplib.IMAP4.error,
345 r'\[AUTHENTICATIONFAILED\] invalid'):
346 client.authenticate('MYAUTH', lambda x: b'fake')
347
348 def test_valid_authentication_bytes(self):
349 class MyServer(SimpleIMAPHandler):
350 def cmd_AUTHENTICATE(self, tag, args):
351 self._send_textline('+')
352 self.server.response = yield
353 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
354 client, server = self._setup(MyServer)
355 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
356 self.assertEqual(code, 'OK')
357 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
358
359 def test_valid_authentication_plain_text(self):
360 class MyServer(SimpleIMAPHandler):
361 def cmd_AUTHENTICATE(self, tag, args):
362 self._send_textline('+')
363 self.server.response = yield
364 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
365 client, server = self._setup(MyServer)
366 code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
367 self.assertEqual(code, 'OK')
368 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
369
370 def test_login_cram_md5_bytes(self):
371 class AuthHandler(SimpleIMAPHandler):
372 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
373 def cmd_AUTHENTICATE(self, tag, args):
374 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
375 'VzdG9uLm1jaS5uZXQ=')
376 r = yield
377 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
378 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
379 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
380 else:
381 self._send_tagged(tag, 'NO', 'No access')
382 client, _ = self._setup(AuthHandler)
383 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
384 ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
385 self.assertEqual(ret, "OK")
386
387 def test_login_cram_md5_plain_text(self):
388 class AuthHandler(SimpleIMAPHandler):
389 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
390 def cmd_AUTHENTICATE(self, tag, args):
391 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
392 'VzdG9uLm1jaS5uZXQ=')
393 r = yield
394 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
395 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
396 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
397 else:
398 self._send_tagged(tag, 'NO', 'No access')
399 client, _ = self._setup(AuthHandler)
400 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
401 ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
402 self.assertEqual(ret, "OK")
403
404 def test_aborted_authentication(self):
405 class MyServer(SimpleIMAPHandler):
406 def cmd_AUTHENTICATE(self, tag, args):
407 self._send_textline('+')
408 self.response = yield
409 if self.response == b'*\r\n':
410 self._send_tagged(
411 tag,
412 'NO',
413 '[AUTHENTICATIONFAILED] aborted')
414 else:
415 self._send_tagged(tag, 'OK', 'MYAUTH successful')
416 client, _ = self._setup(MyServer)
417 with self.assertRaisesRegex(imaplib.IMAP4.error,
418 r'\[AUTHENTICATIONFAILED\] aborted'):
419 client.authenticate('MYAUTH', lambda x: None)
420
421 @mock.patch('imaplib._MAXLINE', 10)
422 def test_linetoolong(self):
423 class TooLongHandler(SimpleIMAPHandler):
424 def handle(self):
425 # send response line longer than the limit set in the next line
426 self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
427 _, server = self._setup(TooLongHandler, connect=False)
428 with self.assertRaisesRegex(imaplib.IMAP4.error,
429 'got more than 10 bytes'):
430 self.imap_class(*server.server_address)
431
432 def test_simple_with_statement(self):
433 _, server = self._setup(SimpleIMAPHandler, connect=False)
434 with self.imap_class(*server.server_address):
435 pass
436
437 def test_with_statement(self):
438 _, server = self._setup(SimpleIMAPHandler, connect=False)
439 with self.imap_class(*server.server_address) as imap:
440 imap.login('user', 'pass')
441 self.assertEqual(server.logged, 'user')
442 self.assertIsNone(server.logged)
443
444 def test_with_statement_logout(self):
445 # It is legal to log out explicitly inside the with block
446 _, server = self._setup(SimpleIMAPHandler, connect=False)
447 with self.imap_class(*server.server_address) as imap:
448 imap.login('user', 'pass')
449 self.assertEqual(server.logged, 'user')
450 imap.logout()
451 self.assertIsNone(server.logged)
452 self.assertIsNone(server.logged)
453
454 # command tests
455
456 def test_login(self):
457 client, _ = self._setup(SimpleIMAPHandler)
458 typ, data = client.login('user', 'pass')
459 self.assertEqual(typ, 'OK')
460 self.assertEqual(data[0], b'LOGIN completed')
461 self.assertEqual(client.state, 'AUTH')
462
463 def test_logout(self):
464 client, _ = self._setup(SimpleIMAPHandler)
465 typ, data = client.login('user', 'pass')
466 self.assertEqual(typ, 'OK')
467 self.assertEqual(data[0], b'LOGIN completed')
468 typ, data = client.logout()
469 self.assertEqual(typ, 'BYE')
470 self.assertEqual(data[0], b'IMAP4ref1 Server logging out')
471 self.assertEqual(client.state, 'LOGOUT')
472
473 def test_lsub(self):
474 class LsubCmd(SimpleIMAPHandler):
475 def cmd_LSUB(self, tag, args):
476 self._send_textline('* LSUB () "." directoryA')
477 return self._send_tagged(tag, 'OK', 'LSUB completed')
478 client, _ = self._setup(LsubCmd)
479 client.login('user', 'pass')
480 typ, data = client.lsub()
481 self.assertEqual(typ, 'OK')
482 self.assertEqual(data[0], b'() "." directoryA')
483
484
485class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
486 imap_class = imaplib.IMAP4
487 server_class = socketserver.TCPServer
488
489
490@unittest.skipUnless(ssl, "SSL not available")
491class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
Victor Stinnerde383282017-01-12 11:51:31 +0100492 imap_class = IMAP4_SSL
R David Murrayb079c072016-12-24 21:32:26 -0500493 server_class = SecureTCPServer
494
495 def test_ssl_raises(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200496 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
497 self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
498 self.assertEqual(ssl_context.check_hostname, True)
R David Murrayb079c072016-12-24 21:32:26 -0500499 ssl_context.load_verify_locations(CAFILE)
500
501 with self.assertRaisesRegex(ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100502 "IP address mismatch, certificate is not valid for "
503 "'127.0.0.1'"):
R David Murrayb079c072016-12-24 21:32:26 -0500504 _, server = self._setup(SimpleIMAPHandler)
505 client = self.imap_class(*server.server_address,
506 ssl_context=ssl_context)
507 client.shutdown()
508
509 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200510 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
R David Murrayb079c072016-12-24 21:32:26 -0500511 ssl_context.load_verify_locations(CAFILE)
512
513 _, server = self._setup(SimpleIMAPHandler)
514 client = self.imap_class("localhost", server.server_address[1],
515 ssl_context=ssl_context)
516 client.shutdown()
517
Victor Stinnerb18563d2017-06-14 18:48:32 +0200518 # Mock the private method _connect(), so mark the test as specific
519 # to CPython stdlib
520 @cpython_only
521 def test_certfile_arg_warn(self):
522 with support.check_warnings(('', DeprecationWarning)):
523 with mock.patch.object(self.imap_class, 'open'):
524 with mock.patch.object(self.imap_class, '_connect'):
525 self.imap_class('localhost', 143, certfile=CERTFILE)
526
Antoine Pitroucac9e712014-07-31 18:35:45 -0400527class ThreadedNetworkedTests(unittest.TestCase):
528 server_class = socketserver.TCPServer
529 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000530
531 def make_server(self, addr, hdlr):
532
533 class MyServer(self.server_class):
534 def handle_error(self, request, client_address):
535 self.close_request(request)
536 self.server_close()
537 raise
538
Antoine Pitroucac9e712014-07-31 18:35:45 -0400539 if verbose:
540 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000541 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000542 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000543
544 if verbose:
545 print("server created")
546 print("ADDR =", addr)
547 print("CLASS =", self.server_class)
548 print("HDLR =", server.RequestHandlerClass)
549
550 t = threading.Thread(
551 name='%s serving' % self.server_class,
552 target=server.serve_forever,
553 # Short poll interval to make the test finish quickly.
554 # Time between requests is short enough that we won't wake
555 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400556 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000557 t.daemon = True # In case this function raises.
558 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400559 if verbose:
560 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000561 return server, t
562
563 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400564 if verbose:
565 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000566 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000567 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000568 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400569 if verbose:
570 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000571
572 @contextmanager
573 def reaped_server(self, hdlr):
574 server, thread = self.make_server((support.HOST, 0), hdlr)
575 try:
576 yield server
577 finally:
578 self.reap_server(server, thread)
579
R David Murray774a39f2013-02-19 12:17:31 -0500580 @contextmanager
581 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100582 with self.reaped_server(hdlr) as server:
583 client = self.imap_class(*server.server_address)
584 try:
585 yield server, client
586 finally:
587 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500588
R. David Murraye8dc2582009-12-10 02:08:06 +0000589 @reap_threads
590 def test_connect(self):
591 with self.reaped_server(SimpleIMAPHandler) as server:
592 client = self.imap_class(*server.server_address)
593 client.shutdown()
594
595 @reap_threads
R David Murray317f64f2016-01-02 17:18:34 -0500596 def test_bracket_flags(self):
597
598 # This violates RFC 3501, which disallows ']' characters in tag names,
599 # but imaplib has allowed producing such tags forever, other programs
600 # also produce them (eg: OtherInbox's Organizer app as of 20140716),
601 # and Gmail, for example, accepts them and produces them. So we
602 # support them. See issue #21815.
603
604 class BracketFlagHandler(SimpleIMAPHandler):
605
606 def handle(self):
607 self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
608 super().handle()
609
610 def cmd_AUTHENTICATE(self, tag, args):
611 self._send_textline('+')
612 self.server.response = yield
613 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
614
615 def cmd_SELECT(self, tag, args):
616 flag_msg = ' \\'.join(self.flags)
617 self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
618 self._send_line(b'* 2 EXISTS')
619 self._send_line(b'* 0 RECENT')
620 msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
621 % flag_msg)
622 self._send_line(msg.encode('ascii'))
623 self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
624
625 def cmd_STORE(self, tag, args):
626 new_flags = args[2].strip('(').strip(')').split()
627 self.flags.extend(new_flags)
628 flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
629 msg = '* %s FETCH %s' % (args[0], flags_msg)
630 self._send_line(msg.encode('ascii'))
631 self._send_tagged(tag, 'OK', 'STORE completed.')
632
633 with self.reaped_pair(BracketFlagHandler) as (server, client):
634 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
635 self.assertEqual(code, 'OK')
636 self.assertEqual(server.response, b'ZmFrZQ==\r\n')
637 client.select('test')
638 typ, [data] = client.store(b'1', "+FLAGS", "[test]")
639 self.assertIn(b'[test]', data)
640 client.select('test')
641 typ, [data] = client.response('PERMANENTFLAGS')
642 self.assertIn(b'[test]', data)
643
644 @reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000645 def test_issue5949(self):
646
647 class EOFHandler(socketserver.StreamRequestHandler):
648 def handle(self):
649 # EOF without sending a complete welcome message.
650 self.wfile.write(b'* OK')
651
652 with self.reaped_server(EOFHandler) as server:
653 self.assertRaises(imaplib.IMAP4.abort,
654 self.imap_class, *server.server_address)
655
656 @reap_threads
657 def test_line_termination(self):
658
659 class BadNewlineHandler(SimpleIMAPHandler):
660
661 def cmd_CAPABILITY(self, tag, args):
662 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500663 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000664
665 with self.reaped_server(BadNewlineHandler) as server:
666 self.assertRaises(imaplib.IMAP4.abort,
667 self.imap_class, *server.server_address)
668
R David Murraya6429db2015-05-10 19:17:23 -0400669 class UTF8Server(SimpleIMAPHandler):
670 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
671
672 def cmd_ENABLE(self, tag, args):
673 self._send_tagged(tag, 'OK', 'ENABLE successful')
674
675 def cmd_AUTHENTICATE(self, tag, args):
676 self._send_textline('+')
677 self.server.response = yield
678 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
679
680 @reap_threads
681 def test_enable_raises_error_if_not_AUTH(self):
682 with self.reaped_pair(self.UTF8Server) as (server, client):
683 self.assertFalse(client.utf8_enabled)
684 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
685 self.assertFalse(client.utf8_enabled)
686
687 # XXX Also need a test that enable after SELECT raises an error.
688
689 @reap_threads
690 def test_enable_raises_error_if_no_capability(self):
691 class NoEnableServer(self.UTF8Server):
692 capabilities = 'AUTH'
693 with self.reaped_pair(NoEnableServer) as (server, client):
694 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
695
696 @reap_threads
697 def test_enable_UTF8_raises_error_if_not_supported(self):
698 class NonUTF8Server(SimpleIMAPHandler):
699 pass
700 with self.assertRaises(imaplib.IMAP4.error):
701 with self.reaped_pair(NonUTF8Server) as (server, client):
702 typ, data = client.login('user', 'pass')
703 self.assertEqual(typ, 'OK')
704 client.enable('UTF8=ACCEPT')
705 pass
706
707 @reap_threads
708 def test_enable_UTF8_True_append(self):
709
710 class UTF8AppendServer(self.UTF8Server):
711 def cmd_APPEND(self, tag, args):
712 self._send_textline('+')
713 self.server.response = yield
714 self._send_tagged(tag, 'OK', 'okay')
715
716 with self.reaped_pair(UTF8AppendServer) as (server, client):
717 self.assertEqual(client._encoding, 'ascii')
718 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
719 self.assertEqual(code, 'OK')
720 self.assertEqual(server.response,
721 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
722 code, _ = client.enable('UTF8=ACCEPT')
723 self.assertEqual(code, 'OK')
724 self.assertEqual(client._encoding, 'utf-8')
725 msg_string = 'Subject: üñí©öðé'
726 typ, data = client.append(
727 None, None, None, msg_string.encode('utf-8'))
728 self.assertEqual(typ, 'OK')
729 self.assertEqual(
730 server.response,
731 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
732 )
733
734 # XXX also need a test that makes sure that the Literal and Untagged_status
735 # regexes uses unicode in UTF8 mode instead of the default ASCII.
736
737 @reap_threads
738 def test_search_disallows_charset_in_utf8_mode(self):
739 with self.reaped_pair(self.UTF8Server) as (server, client):
740 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
741 self.assertEqual(typ, 'OK')
742 typ, _ = client.enable('UTF8=ACCEPT')
743 self.assertEqual(typ, 'OK')
744 self.assertTrue(client.utf8_enabled)
745 self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
746
R David Murray774a39f2013-02-19 12:17:31 -0500747 @reap_threads
748 def test_bad_auth_name(self):
749
750 class MyServer(SimpleIMAPHandler):
751
752 def cmd_AUTHENTICATE(self, tag, args):
753 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400754 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500755
756 with self.reaped_pair(MyServer) as (server, client):
757 with self.assertRaises(imaplib.IMAP4.error):
758 client.authenticate('METHOD', lambda: 1)
759
760 @reap_threads
761 def test_invalid_authentication(self):
762
763 class MyServer(SimpleIMAPHandler):
764
765 def cmd_AUTHENTICATE(self, tag, args):
766 self._send_textline('+')
767 self.response = yield
768 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
769
770 with self.reaped_pair(MyServer) as (server, client):
771 with self.assertRaises(imaplib.IMAP4.error):
772 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
773
774 @reap_threads
775 def test_valid_authentication(self):
776
777 class MyServer(SimpleIMAPHandler):
778
779 def cmd_AUTHENTICATE(self, tag, args):
780 self._send_textline('+')
781 self.server.response = yield
782 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
783
784 with self.reaped_pair(MyServer) as (server, client):
785 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
786 self.assertEqual(code, 'OK')
787 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400788 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500789
790 with self.reaped_pair(MyServer) as (server, client):
791 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
792 self.assertEqual(code, 'OK')
793 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400794 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500795
796 @reap_threads
797 def test_login_cram_md5(self):
798
799 class AuthHandler(SimpleIMAPHandler):
800
801 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
802
803 def cmd_AUTHENTICATE(self, tag, args):
804 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400805 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500806 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400807 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
808 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500809 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
810 else:
811 self._send_tagged(tag, 'NO', 'No access')
812
813 with self.reaped_pair(AuthHandler) as (server, client):
814 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
815 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
816 self.assertEqual(ret, "OK")
817
818 with self.reaped_pair(AuthHandler) as (server, client):
819 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
820 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
821 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000822
823
Robert Collins5ccc18f2015-07-31 08:59:02 +1200824 @reap_threads
825 def test_aborted_authentication(self):
826
827 class MyServer(SimpleIMAPHandler):
828
829 def cmd_AUTHENTICATE(self, tag, args):
830 self._send_textline('+')
831 self.response = yield
832
833 if self.response == b'*\r\n':
834 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
835 else:
836 self._send_tagged(tag, 'OK', 'MYAUTH successful')
837
838 with self.reaped_pair(MyServer) as (server, client):
839 with self.assertRaises(imaplib.IMAP4.error):
840 code, data = client.authenticate('MYAUTH', lambda x: None)
841
Robert Collins78378e82015-07-31 09:01:38 +1200842
Georg Brandlca580f42013-10-27 06:52:14 +0100843 def test_linetoolong(self):
844 class TooLongHandler(SimpleIMAPHandler):
845 def handle(self):
846 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400847 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100848
849 with self.reaped_server(TooLongHandler) as server:
850 self.assertRaises(imaplib.IMAP4.error,
851 self.imap_class, *server.server_address)
852
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300853 @reap_threads
854 def test_simple_with_statement(self):
855 # simplest call
856 with self.reaped_server(SimpleIMAPHandler) as server:
857 with self.imap_class(*server.server_address):
858 pass
859
860 @reap_threads
861 def test_with_statement(self):
862 with self.reaped_server(SimpleIMAPHandler) as server:
863 with self.imap_class(*server.server_address) as imap:
864 imap.login('user', 'pass')
865 self.assertEqual(server.logged, 'user')
866 self.assertIsNone(server.logged)
867
868 @reap_threads
869 def test_with_statement_logout(self):
870 # what happens if already logout in the block?
871 with self.reaped_server(SimpleIMAPHandler) as server:
872 with self.imap_class(*server.server_address) as imap:
873 imap.login('user', 'pass')
874 self.assertEqual(server.logged, 'user')
875 imap.logout()
876 self.assertIsNone(server.logged)
877 self.assertIsNone(server.logged)
878
Georg Brandlca580f42013-10-27 06:52:14 +0100879
R. David Murraye8dc2582009-12-10 02:08:06 +0000880@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400881class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000882 server_class = SecureTCPServer
883 imap_class = IMAP4_SSL
884
Christian Heimes48aae572013-12-02 20:01:29 +0100885 @reap_threads
886 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200887 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
Christian Heimes48aae572013-12-02 20:01:29 +0100888 ssl_context.load_verify_locations(CAFILE)
889
Antoine Pitroucac9e712014-07-31 18:35:45 -0400890 with self.assertRaisesRegex(
891 ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100892 "IP address mismatch, certificate is not valid for "
893 "'127.0.0.1'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100894 with self.reaped_server(SimpleIMAPHandler) as server:
895 client = self.imap_class(*server.server_address,
896 ssl_context=ssl_context)
897 client.shutdown()
898
899 with self.reaped_server(SimpleIMAPHandler) as server:
900 client = self.imap_class("localhost", server.server_address[1],
901 ssl_context=ssl_context)
902 client.shutdown()
903
R. David Murraye8dc2582009-12-10 02:08:06 +0000904
Antoine Pitroucac9e712014-07-31 18:35:45 -0400905@unittest.skipUnless(
906 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000907class RemoteIMAPTest(unittest.TestCase):
908 host = 'cyrus.andrew.cmu.edu'
909 port = 143
910 username = 'anonymous'
911 password = 'pass'
912 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000913
Antoine Pitroub1436f12010-11-09 22:55:55 +0000914 def setUp(self):
915 with transient_internet(self.host):
916 self.server = self.imap_class(self.host, self.port)
917
918 def tearDown(self):
919 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100920 with transient_internet(self.host):
921 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000922
923 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100924 with transient_internet(self.host):
925 for cap in self.server.capabilities:
926 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000927 self.assertIn('LOGINDISABLED', self.server.capabilities)
928 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100929 rs = self.server.login(self.username, self.password)
930 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000931
932 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100933 with transient_internet(self.host):
934 rs = self.server.logout()
935 self.server = None
936 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000937
938
939@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400940@unittest.skipUnless(
941 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000942class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
943
944 def setUp(self):
945 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100946 with transient_internet(self.host):
947 rs = self.server.starttls()
948 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000949
950 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000951 for cap in self.server.capabilities:
952 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000953 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000954
955
956@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000957class RemoteIMAP_SSLTest(RemoteIMAPTest):
958 port = 993
959 imap_class = IMAP4_SSL
960
Antoine Pitrou08728162011-05-06 18:49:52 +0200961 def setUp(self):
962 pass
963
964 def tearDown(self):
965 pass
966
967 def create_ssl_context(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200968 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
969 ssl_context.check_hostname = False
970 ssl_context.verify_mode = ssl.CERT_NONE
Antoine Pitrou08728162011-05-06 18:49:52 +0200971 ssl_context.load_cert_chain(CERTFILE)
972 return ssl_context
973
974 def check_logincapa(self, server):
975 try:
976 for cap in server.capabilities:
977 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000978 self.assertNotIn('LOGINDISABLED', server.capabilities)
979 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200980 rs = server.login(self.username, self.password)
981 self.assertEqual(rs[0], 'OK')
982 finally:
983 server.logout()
984
Antoine Pitroub1436f12010-11-09 22:55:55 +0000985 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200986 with transient_internet(self.host):
987 _server = self.imap_class(self.host, self.port)
988 self.check_logincapa(_server)
989
Antoine Pitrou08728162011-05-06 18:49:52 +0200990 def test_logout(self):
991 with transient_internet(self.host):
992 _server = self.imap_class(self.host, self.port)
993 rs = _server.logout()
994 self.assertEqual(rs[0], 'BYE')
995
996 def test_ssl_context_certfile_exclusive(self):
997 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400998 self.assertRaises(
999 ValueError, self.imap_class, self.host, self.port,
1000 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +02001001
1002 def test_ssl_context_keyfile_exclusive(self):
1003 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001004 self.assertRaises(
1005 ValueError, self.imap_class, self.host, self.port,
1006 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +00001007
1008
1009if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +02001010 unittest.main()