blob: a060143e1f6be4327d342a06bd26ac41f0d559a4 [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
R. David Murraye8dc2582009-12-10 02:08:06 +00002
3from contextlib import contextmanager
Berker Peksage4dcbbd2018-08-07 05:12:18 +03004import errno
Martin v. Löwisea752fb2002-01-05 11:31:49 +00005import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00006import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +00007import socketserver
Tim Peters108b7912002-07-31 16:42:33 +00008import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +00009import calendar
Antoine Pitroua6a4dc82017-09-07 18:56:24 +020010import threading
Matěj Cepl3dc67d02019-02-12 19:30:19 +010011import socket
Martin v. Löwisea752fb2002-01-05 11:31:49 +000012
Antoine Pitroucac9e712014-07-31 18:35:45 -040013from test.support import (reap_threads, verbose, transient_internet,
Victor Stinnerb18563d2017-06-14 18:48:32 +020014 run_with_tz, run_with_locale, cpython_only)
Christian Heimesf6cd9672008-03-26 13:45:42 +000015import unittest
R David Murrayb079c072016-12-24 21:32:26 -050016from unittest import mock
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040017from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000018try:
19 import ssl
20except ImportError:
21 ssl = None
22
Antoine Pitroucac9e712014-07-31 18:35:45 -040023CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
24CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000025
Martin v. Löwisea752fb2002-01-05 11:31:49 +000026
Christian Heimesf6cd9672008-03-26 13:45:42 +000027class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000028
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000029 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000030 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000031 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000032 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
33 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000034 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000035 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
36 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000037 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000038 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
39 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000040
Alexander Belopolsky2420d832012-04-29 15:56:49 -040041 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
42 def test_Internaldate2tuple_issue10941(self):
43 self.assertNotEqual(imaplib.Internaldate2tuple(
44 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040045 imaplib.Internaldate2tuple(
46 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040047
48 def timevalues(self):
49 return [2000000000, 2000000000.0, time.localtime(2000000000),
50 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
51 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040052 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040053 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040054 '"18-May-2033 05:33:20 +0200"']
55
56 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
Martin Panter6e0889f2015-11-16 07:21:38 +000057 # DST rules included to work around quirk where the Gnu C library may not
58 # otherwise restore the previous time zone
59 @run_with_tz('STD-1DST,M3.2.0,M11.1.0')
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040060 def test_Time2Internaldate(self):
61 expected = '"18-May-2033 05:33:20 +0200"'
62
63 for t in self.timevalues():
64 internal = imaplib.Time2Internaldate(t)
65 self.assertEqual(internal, expected)
66
67 def test_that_Time2Internaldate_returns_a_result(self):
68 # Without tzset, we can check only that it successfully
69 # produces a result, not the correctness of the result itself,
70 # since the result depends on the timezone the machine is in.
71 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000072 imaplib.Time2Internaldate(t)
73
Berker Peksage4dcbbd2018-08-07 05:12:18 +030074 def test_imap4_host_default_value(self):
Matěj Cepl3dc67d02019-02-12 19:30:19 +010075 # Check whether the IMAP4_PORT is truly unavailable.
76 with socket.socket() as s:
77 try:
78 s.connect(('', imaplib.IMAP4_PORT))
79 self.skipTest(
80 "Cannot run the test with local IMAP server running.")
81 except socket.error:
82 pass
83
Berker Peksage4dcbbd2018-08-07 05:12:18 +030084 expected_errnos = [
85 # This is the exception that should be raised.
86 errno.ECONNREFUSED,
87 ]
88 if hasattr(errno, 'EADDRNOTAVAIL'):
89 # socket.create_connection() fails randomly with
90 # EADDRNOTAVAIL on Travis CI.
91 expected_errnos.append(errno.EADDRNOTAVAIL)
92 with self.assertRaises(OSError) as cm:
93 imaplib.IMAP4()
94 self.assertIn(cm.exception.errno, expected_errnos)
95
Christian Heimesf6cd9672008-03-26 13:45:42 +000096
R. David Murraye8dc2582009-12-10 02:08:06 +000097if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000098 class SecureTCPServer(socketserver.TCPServer):
99
100 def get_request(self):
101 newsocket, fromaddr = self.socket.accept()
Christian Heimesd0486372016-09-10 23:23:33 +0200102 context = ssl.SSLContext()
103 context.load_cert_chain(CERTFILE)
104 connstream = context.wrap_socket(newsocket, server_side=True)
R. David Murraye8dc2582009-12-10 02:08:06 +0000105 return connstream, fromaddr
106
107 IMAP4_SSL = imaplib.IMAP4_SSL
108
109else:
110
111 class SecureTCPServer:
112 pass
113
114 IMAP4_SSL = None
115
116
117class SimpleIMAPHandler(socketserver.StreamRequestHandler):
R. David Murraye8dc2582009-12-10 02:08:06 +0000118 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -0500119 continuation = None
120 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +0000121
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300122 def setup(self):
123 super().setup()
124 self.server.logged = None
125
R. David Murraye8dc2582009-12-10 02:08:06 +0000126 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400127 if verbose:
128 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000129 self.wfile.write(message)
130
R David Murray774a39f2013-02-19 12:17:31 -0500131 def _send_line(self, message):
132 self._send(message + b'\r\n')
133
134 def _send_textline(self, message):
135 self._send_line(message.encode('ASCII'))
136
137 def _send_tagged(self, tag, code, message):
138 self._send_textline(' '.join((tag, code, message)))
139
R. David Murraye8dc2582009-12-10 02:08:06 +0000140 def handle(self):
141 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500142 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000143 while 1:
144 # Gather up input until we receive a line terminator or we timeout.
145 # Accumulate read(1) because it's simpler to handle the differences
146 # between naked sockets and SSL sockets.
147 line = b''
148 while 1:
149 try:
150 part = self.rfile.read(1)
151 if part == b'':
152 # Naked sockets return empty strings..
153 return
154 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200155 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200156 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000157 return
158 if line.endswith(b'\r\n'):
159 break
160
Antoine Pitroucac9e712014-07-31 18:35:45 -0400161 if verbose:
162 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500163 if self.continuation:
164 try:
165 self.continuation.send(line)
166 except StopIteration:
167 self.continuation = None
168 continue
169 splitline = line.decode('ASCII').split()
170 tag = splitline[0]
171 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000172 args = splitline[2:]
173
Antoine Pitroucac9e712014-07-31 18:35:45 -0400174 if hasattr(self, 'cmd_' + cmd):
175 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500176 if continuation:
177 self.continuation = continuation
178 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000179 else:
R David Murray774a39f2013-02-19 12:17:31 -0500180 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000181
182 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400183 caps = ('IMAP4rev1 ' + self.capabilities
184 if self.capabilities
185 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500186 self._send_textline('* CAPABILITY ' + caps)
187 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
188
189 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300190 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500191 self._send_textline('* BYE IMAP4ref1 Server logging out')
192 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000193
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300194 def cmd_LOGIN(self, tag, args):
195 self.server.logged = args[0]
196 self._send_tagged(tag, 'OK', 'LOGIN completed')
197
R. David Murraye8dc2582009-12-10 02:08:06 +0000198
R David Murrayb079c072016-12-24 21:32:26 -0500199class NewIMAPTestsMixin():
200 client = None
201
202 def _setup(self, imap_handler, connect=True):
203 """
204 Sets up imap_handler for tests. imap_handler should inherit from either:
205 - SimpleIMAPHandler - for testing IMAP commands,
206 - socketserver.StreamRequestHandler - if raw access to stream is needed.
207 Returns (client, server).
208 """
209 class TestTCPServer(self.server_class):
210 def handle_error(self, request, client_address):
211 """
212 End request and raise the error if one occurs.
213 """
214 self.close_request(request)
215 self.server_close()
216 raise
217
218 self.addCleanup(self._cleanup)
219 self.server = self.server_class((support.HOST, 0), imap_handler)
220 self.thread = threading.Thread(
221 name=self._testMethodName+'-server',
222 target=self.server.serve_forever,
223 # Short poll interval to make the test finish quickly.
224 # Time between requests is short enough that we won't wake
225 # up spuriously too many times.
226 kwargs={'poll_interval': 0.01})
227 self.thread.daemon = True # In case this function raises.
228 self.thread.start()
229
230 if connect:
231 self.client = self.imap_class(*self.server.server_address)
232
233 return self.client, self.server
234
235 def _cleanup(self):
236 """
237 Cleans up the test server. This method should not be called manually,
238 it is added to the cleanup queue in the _setup method already.
239 """
240 # if logout was called already we'd raise an exception trying to
241 # shutdown the client once again
242 if self.client is not None and self.client.state != 'LOGOUT':
243 self.client.shutdown()
244 # cleanup the server
245 self.server.shutdown()
246 self.server.server_close()
Victor Stinnerb9b69002017-09-14 14:40:56 -0700247 support.join_thread(self.thread, 3.0)
248 # Explicitly clear the attribute to prevent dangling thread
249 self.thread = None
R David Murrayb079c072016-12-24 21:32:26 -0500250
251 def test_EOF_without_complete_welcome_message(self):
252 # http://bugs.python.org/issue5949
253 class EOFHandler(socketserver.StreamRequestHandler):
254 def handle(self):
255 self.wfile.write(b'* OK')
256 _, server = self._setup(EOFHandler, connect=False)
257 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
258 *server.server_address)
259
260 def test_line_termination(self):
261 class BadNewlineHandler(SimpleIMAPHandler):
262 def cmd_CAPABILITY(self, tag, args):
263 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
264 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
265 _, server = self._setup(BadNewlineHandler, connect=False)
266 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
267 *server.server_address)
268
269 def test_enable_raises_error_if_not_AUTH(self):
270 class EnableHandler(SimpleIMAPHandler):
271 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
272 client, _ = self._setup(EnableHandler)
273 self.assertFalse(client.utf8_enabled)
274 with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
275 client.enable('foo')
276 self.assertFalse(client.utf8_enabled)
277
278 def test_enable_raises_error_if_no_capability(self):
279 client, _ = self._setup(SimpleIMAPHandler)
280 with self.assertRaisesRegex(imaplib.IMAP4.error,
281 'does not support ENABLE'):
282 client.enable('foo')
283
284 def test_enable_UTF8_raises_error_if_not_supported(self):
285 client, _ = self._setup(SimpleIMAPHandler)
286 typ, data = client.login('user', 'pass')
287 self.assertEqual(typ, 'OK')
288 with self.assertRaisesRegex(imaplib.IMAP4.error,
289 'does not support ENABLE'):
290 client.enable('UTF8=ACCEPT')
291
292 def test_enable_UTF8_True_append(self):
293 class UTF8AppendServer(SimpleIMAPHandler):
294 capabilities = 'ENABLE UTF8=ACCEPT'
295 def cmd_ENABLE(self, tag, args):
296 self._send_tagged(tag, 'OK', 'ENABLE successful')
297 def cmd_AUTHENTICATE(self, tag, args):
298 self._send_textline('+')
299 self.server.response = yield
300 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
301 def cmd_APPEND(self, tag, args):
302 self._send_textline('+')
303 self.server.response = yield
304 self._send_tagged(tag, 'OK', 'okay')
305 client, server = self._setup(UTF8AppendServer)
306 self.assertEqual(client._encoding, 'ascii')
307 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
308 self.assertEqual(code, 'OK')
309 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
310 code, _ = client.enable('UTF8=ACCEPT')
311 self.assertEqual(code, 'OK')
312 self.assertEqual(client._encoding, 'utf-8')
313 msg_string = 'Subject: üñí©öðé'
314 typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
315 self.assertEqual(typ, 'OK')
316 self.assertEqual(server.response,
317 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
318
319 def test_search_disallows_charset_in_utf8_mode(self):
320 class UTF8Server(SimpleIMAPHandler):
321 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
322 def cmd_ENABLE(self, tag, args):
323 self._send_tagged(tag, 'OK', 'ENABLE successful')
324 def cmd_AUTHENTICATE(self, tag, args):
325 self._send_textline('+')
326 self.server.response = yield
327 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
328 client, _ = self._setup(UTF8Server)
329 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
330 self.assertEqual(typ, 'OK')
331 typ, _ = client.enable('UTF8=ACCEPT')
332 self.assertEqual(typ, 'OK')
333 self.assertTrue(client.utf8_enabled)
334 with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
335 client.search('foo', 'bar')
336
337 def test_bad_auth_name(self):
338 class MyServer(SimpleIMAPHandler):
339 def cmd_AUTHENTICATE(self, tag, args):
340 self._send_tagged(tag, 'NO',
341 'unrecognized authentication type {}'.format(args[0]))
342 client, _ = self._setup(MyServer)
343 with self.assertRaisesRegex(imaplib.IMAP4.error,
344 'unrecognized authentication type METHOD'):
345 client.authenticate('METHOD', lambda: 1)
346
347 def test_invalid_authentication(self):
348 class MyServer(SimpleIMAPHandler):
349 def cmd_AUTHENTICATE(self, tag, args):
350 self._send_textline('+')
351 self.response = yield
352 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
353 client, _ = self._setup(MyServer)
354 with self.assertRaisesRegex(imaplib.IMAP4.error,
355 r'\[AUTHENTICATIONFAILED\] invalid'):
356 client.authenticate('MYAUTH', lambda x: b'fake')
357
358 def test_valid_authentication_bytes(self):
359 class MyServer(SimpleIMAPHandler):
360 def cmd_AUTHENTICATE(self, tag, args):
361 self._send_textline('+')
362 self.server.response = yield
363 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
364 client, server = self._setup(MyServer)
365 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
366 self.assertEqual(code, 'OK')
367 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
368
369 def test_valid_authentication_plain_text(self):
370 class MyServer(SimpleIMAPHandler):
371 def cmd_AUTHENTICATE(self, tag, args):
372 self._send_textline('+')
373 self.server.response = yield
374 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
375 client, server = self._setup(MyServer)
376 code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
377 self.assertEqual(code, 'OK')
378 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
379
380 def test_login_cram_md5_bytes(self):
381 class AuthHandler(SimpleIMAPHandler):
382 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
383 def cmd_AUTHENTICATE(self, tag, args):
384 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
385 'VzdG9uLm1jaS5uZXQ=')
386 r = yield
387 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
388 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
389 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
390 else:
391 self._send_tagged(tag, 'NO', 'No access')
392 client, _ = self._setup(AuthHandler)
393 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
394 ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
395 self.assertEqual(ret, "OK")
396
397 def test_login_cram_md5_plain_text(self):
398 class AuthHandler(SimpleIMAPHandler):
399 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
400 def cmd_AUTHENTICATE(self, tag, args):
401 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
402 'VzdG9uLm1jaS5uZXQ=')
403 r = yield
404 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
405 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
406 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
407 else:
408 self._send_tagged(tag, 'NO', 'No access')
409 client, _ = self._setup(AuthHandler)
410 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
411 ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
412 self.assertEqual(ret, "OK")
413
414 def test_aborted_authentication(self):
415 class MyServer(SimpleIMAPHandler):
416 def cmd_AUTHENTICATE(self, tag, args):
417 self._send_textline('+')
418 self.response = yield
419 if self.response == b'*\r\n':
420 self._send_tagged(
421 tag,
422 'NO',
423 '[AUTHENTICATIONFAILED] aborted')
424 else:
425 self._send_tagged(tag, 'OK', 'MYAUTH successful')
426 client, _ = self._setup(MyServer)
427 with self.assertRaisesRegex(imaplib.IMAP4.error,
428 r'\[AUTHENTICATIONFAILED\] aborted'):
429 client.authenticate('MYAUTH', lambda x: None)
430
431 @mock.patch('imaplib._MAXLINE', 10)
432 def test_linetoolong(self):
433 class TooLongHandler(SimpleIMAPHandler):
434 def handle(self):
435 # send response line longer than the limit set in the next line
436 self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
437 _, server = self._setup(TooLongHandler, connect=False)
438 with self.assertRaisesRegex(imaplib.IMAP4.error,
439 'got more than 10 bytes'):
440 self.imap_class(*server.server_address)
441
442 def test_simple_with_statement(self):
443 _, server = self._setup(SimpleIMAPHandler, connect=False)
444 with self.imap_class(*server.server_address):
445 pass
446
447 def test_with_statement(self):
448 _, server = self._setup(SimpleIMAPHandler, connect=False)
449 with self.imap_class(*server.server_address) as imap:
450 imap.login('user', 'pass')
451 self.assertEqual(server.logged, 'user')
452 self.assertIsNone(server.logged)
453
454 def test_with_statement_logout(self):
455 # It is legal to log out explicitly inside the with block
456 _, server = self._setup(SimpleIMAPHandler, connect=False)
457 with self.imap_class(*server.server_address) as imap:
458 imap.login('user', 'pass')
459 self.assertEqual(server.logged, 'user')
460 imap.logout()
461 self.assertIsNone(server.logged)
462 self.assertIsNone(server.logged)
463
464 # command tests
465
466 def test_login(self):
467 client, _ = self._setup(SimpleIMAPHandler)
468 typ, data = client.login('user', 'pass')
469 self.assertEqual(typ, 'OK')
470 self.assertEqual(data[0], b'LOGIN completed')
471 self.assertEqual(client.state, 'AUTH')
472
473 def test_logout(self):
474 client, _ = self._setup(SimpleIMAPHandler)
475 typ, data = client.login('user', 'pass')
476 self.assertEqual(typ, 'OK')
477 self.assertEqual(data[0], b'LOGIN completed')
478 typ, data = client.logout()
479 self.assertEqual(typ, 'BYE')
480 self.assertEqual(data[0], b'IMAP4ref1 Server logging out')
481 self.assertEqual(client.state, 'LOGOUT')
482
483 def test_lsub(self):
484 class LsubCmd(SimpleIMAPHandler):
485 def cmd_LSUB(self, tag, args):
486 self._send_textline('* LSUB () "." directoryA')
487 return self._send_tagged(tag, 'OK', 'LSUB completed')
488 client, _ = self._setup(LsubCmd)
489 client.login('user', 'pass')
490 typ, data = client.lsub()
491 self.assertEqual(typ, 'OK')
492 self.assertEqual(data[0], b'() "." directoryA')
493
494
495class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
496 imap_class = imaplib.IMAP4
497 server_class = socketserver.TCPServer
498
499
500@unittest.skipUnless(ssl, "SSL not available")
501class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
Victor Stinnerde383282017-01-12 11:51:31 +0100502 imap_class = IMAP4_SSL
R David Murrayb079c072016-12-24 21:32:26 -0500503 server_class = SecureTCPServer
504
505 def test_ssl_raises(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200506 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
507 self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
508 self.assertEqual(ssl_context.check_hostname, True)
R David Murrayb079c072016-12-24 21:32:26 -0500509 ssl_context.load_verify_locations(CAFILE)
510
511 with self.assertRaisesRegex(ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100512 "IP address mismatch, certificate is not valid for "
513 "'127.0.0.1'"):
R David Murrayb079c072016-12-24 21:32:26 -0500514 _, server = self._setup(SimpleIMAPHandler)
515 client = self.imap_class(*server.server_address,
516 ssl_context=ssl_context)
517 client.shutdown()
518
519 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200520 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
R David Murrayb079c072016-12-24 21:32:26 -0500521 ssl_context.load_verify_locations(CAFILE)
522
523 _, server = self._setup(SimpleIMAPHandler)
524 client = self.imap_class("localhost", server.server_address[1],
525 ssl_context=ssl_context)
526 client.shutdown()
527
Victor Stinnerb18563d2017-06-14 18:48:32 +0200528 # Mock the private method _connect(), so mark the test as specific
529 # to CPython stdlib
530 @cpython_only
531 def test_certfile_arg_warn(self):
532 with support.check_warnings(('', DeprecationWarning)):
533 with mock.patch.object(self.imap_class, 'open'):
534 with mock.patch.object(self.imap_class, '_connect'):
535 self.imap_class('localhost', 143, certfile=CERTFILE)
536
Antoine Pitroucac9e712014-07-31 18:35:45 -0400537class ThreadedNetworkedTests(unittest.TestCase):
538 server_class = socketserver.TCPServer
539 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000540
541 def make_server(self, addr, hdlr):
542
543 class MyServer(self.server_class):
544 def handle_error(self, request, client_address):
545 self.close_request(request)
546 self.server_close()
547 raise
548
Antoine Pitroucac9e712014-07-31 18:35:45 -0400549 if verbose:
550 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000551 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000552 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000553
554 if verbose:
555 print("server created")
556 print("ADDR =", addr)
557 print("CLASS =", self.server_class)
558 print("HDLR =", server.RequestHandlerClass)
559
560 t = threading.Thread(
561 name='%s serving' % self.server_class,
562 target=server.serve_forever,
563 # Short poll interval to make the test finish quickly.
564 # Time between requests is short enough that we won't wake
565 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400566 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000567 t.daemon = True # In case this function raises.
568 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400569 if verbose:
570 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000571 return server, t
572
573 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400574 if verbose:
575 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000576 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000577 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000578 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400579 if verbose:
580 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000581
582 @contextmanager
583 def reaped_server(self, hdlr):
584 server, thread = self.make_server((support.HOST, 0), hdlr)
585 try:
586 yield server
587 finally:
588 self.reap_server(server, thread)
589
R David Murray774a39f2013-02-19 12:17:31 -0500590 @contextmanager
591 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100592 with self.reaped_server(hdlr) as server:
593 client = self.imap_class(*server.server_address)
594 try:
595 yield server, client
596 finally:
597 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500598
R. David Murraye8dc2582009-12-10 02:08:06 +0000599 @reap_threads
600 def test_connect(self):
601 with self.reaped_server(SimpleIMAPHandler) as server:
602 client = self.imap_class(*server.server_address)
603 client.shutdown()
604
605 @reap_threads
R David Murray317f64f2016-01-02 17:18:34 -0500606 def test_bracket_flags(self):
607
608 # This violates RFC 3501, which disallows ']' characters in tag names,
609 # but imaplib has allowed producing such tags forever, other programs
610 # also produce them (eg: OtherInbox's Organizer app as of 20140716),
611 # and Gmail, for example, accepts them and produces them. So we
612 # support them. See issue #21815.
613
614 class BracketFlagHandler(SimpleIMAPHandler):
615
616 def handle(self):
617 self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
618 super().handle()
619
620 def cmd_AUTHENTICATE(self, tag, args):
621 self._send_textline('+')
622 self.server.response = yield
623 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
624
625 def cmd_SELECT(self, tag, args):
626 flag_msg = ' \\'.join(self.flags)
627 self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
628 self._send_line(b'* 2 EXISTS')
629 self._send_line(b'* 0 RECENT')
630 msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
631 % flag_msg)
632 self._send_line(msg.encode('ascii'))
633 self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
634
635 def cmd_STORE(self, tag, args):
636 new_flags = args[2].strip('(').strip(')').split()
637 self.flags.extend(new_flags)
638 flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
639 msg = '* %s FETCH %s' % (args[0], flags_msg)
640 self._send_line(msg.encode('ascii'))
641 self._send_tagged(tag, 'OK', 'STORE completed.')
642
643 with self.reaped_pair(BracketFlagHandler) as (server, client):
644 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
645 self.assertEqual(code, 'OK')
646 self.assertEqual(server.response, b'ZmFrZQ==\r\n')
647 client.select('test')
648 typ, [data] = client.store(b'1', "+FLAGS", "[test]")
649 self.assertIn(b'[test]', data)
650 client.select('test')
651 typ, [data] = client.response('PERMANENTFLAGS')
652 self.assertIn(b'[test]', data)
653
654 @reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000655 def test_issue5949(self):
656
657 class EOFHandler(socketserver.StreamRequestHandler):
658 def handle(self):
659 # EOF without sending a complete welcome message.
660 self.wfile.write(b'* OK')
661
662 with self.reaped_server(EOFHandler) as server:
663 self.assertRaises(imaplib.IMAP4.abort,
664 self.imap_class, *server.server_address)
665
666 @reap_threads
667 def test_line_termination(self):
668
669 class BadNewlineHandler(SimpleIMAPHandler):
670
671 def cmd_CAPABILITY(self, tag, args):
672 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500673 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000674
675 with self.reaped_server(BadNewlineHandler) as server:
676 self.assertRaises(imaplib.IMAP4.abort,
677 self.imap_class, *server.server_address)
678
R David Murraya6429db2015-05-10 19:17:23 -0400679 class UTF8Server(SimpleIMAPHandler):
680 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
681
682 def cmd_ENABLE(self, tag, args):
683 self._send_tagged(tag, 'OK', 'ENABLE successful')
684
685 def cmd_AUTHENTICATE(self, tag, args):
686 self._send_textline('+')
687 self.server.response = yield
688 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
689
690 @reap_threads
691 def test_enable_raises_error_if_not_AUTH(self):
692 with self.reaped_pair(self.UTF8Server) as (server, client):
693 self.assertFalse(client.utf8_enabled)
694 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
695 self.assertFalse(client.utf8_enabled)
696
697 # XXX Also need a test that enable after SELECT raises an error.
698
699 @reap_threads
700 def test_enable_raises_error_if_no_capability(self):
701 class NoEnableServer(self.UTF8Server):
702 capabilities = 'AUTH'
703 with self.reaped_pair(NoEnableServer) as (server, client):
704 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
705
706 @reap_threads
707 def test_enable_UTF8_raises_error_if_not_supported(self):
708 class NonUTF8Server(SimpleIMAPHandler):
709 pass
710 with self.assertRaises(imaplib.IMAP4.error):
711 with self.reaped_pair(NonUTF8Server) as (server, client):
712 typ, data = client.login('user', 'pass')
713 self.assertEqual(typ, 'OK')
714 client.enable('UTF8=ACCEPT')
715 pass
716
717 @reap_threads
718 def test_enable_UTF8_True_append(self):
719
720 class UTF8AppendServer(self.UTF8Server):
721 def cmd_APPEND(self, tag, args):
722 self._send_textline('+')
723 self.server.response = yield
724 self._send_tagged(tag, 'OK', 'okay')
725
726 with self.reaped_pair(UTF8AppendServer) as (server, client):
727 self.assertEqual(client._encoding, 'ascii')
728 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
729 self.assertEqual(code, 'OK')
730 self.assertEqual(server.response,
731 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
732 code, _ = client.enable('UTF8=ACCEPT')
733 self.assertEqual(code, 'OK')
734 self.assertEqual(client._encoding, 'utf-8')
735 msg_string = 'Subject: üñí©öðé'
736 typ, data = client.append(
737 None, None, None, msg_string.encode('utf-8'))
738 self.assertEqual(typ, 'OK')
739 self.assertEqual(
740 server.response,
741 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
742 )
743
744 # XXX also need a test that makes sure that the Literal and Untagged_status
745 # regexes uses unicode in UTF8 mode instead of the default ASCII.
746
747 @reap_threads
748 def test_search_disallows_charset_in_utf8_mode(self):
749 with self.reaped_pair(self.UTF8Server) as (server, client):
750 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
751 self.assertEqual(typ, 'OK')
752 typ, _ = client.enable('UTF8=ACCEPT')
753 self.assertEqual(typ, 'OK')
754 self.assertTrue(client.utf8_enabled)
755 self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
756
R David Murray774a39f2013-02-19 12:17:31 -0500757 @reap_threads
758 def test_bad_auth_name(self):
759
760 class MyServer(SimpleIMAPHandler):
761
762 def cmd_AUTHENTICATE(self, tag, args):
763 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400764 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500765
766 with self.reaped_pair(MyServer) as (server, client):
767 with self.assertRaises(imaplib.IMAP4.error):
768 client.authenticate('METHOD', lambda: 1)
769
770 @reap_threads
771 def test_invalid_authentication(self):
772
773 class MyServer(SimpleIMAPHandler):
774
775 def cmd_AUTHENTICATE(self, tag, args):
776 self._send_textline('+')
777 self.response = yield
778 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
779
780 with self.reaped_pair(MyServer) as (server, client):
781 with self.assertRaises(imaplib.IMAP4.error):
782 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
783
784 @reap_threads
785 def test_valid_authentication(self):
786
787 class MyServer(SimpleIMAPHandler):
788
789 def cmd_AUTHENTICATE(self, tag, args):
790 self._send_textline('+')
791 self.server.response = yield
792 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
793
794 with self.reaped_pair(MyServer) as (server, client):
795 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
796 self.assertEqual(code, 'OK')
797 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400798 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500799
800 with self.reaped_pair(MyServer) as (server, client):
801 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
802 self.assertEqual(code, 'OK')
803 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400804 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500805
806 @reap_threads
807 def test_login_cram_md5(self):
808
809 class AuthHandler(SimpleIMAPHandler):
810
811 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
812
813 def cmd_AUTHENTICATE(self, tag, args):
814 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400815 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500816 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400817 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
818 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500819 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
820 else:
821 self._send_tagged(tag, 'NO', 'No access')
822
823 with self.reaped_pair(AuthHandler) as (server, client):
824 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
825 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
826 self.assertEqual(ret, "OK")
827
828 with self.reaped_pair(AuthHandler) as (server, client):
829 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
830 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
831 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000832
833
Robert Collins5ccc18f2015-07-31 08:59:02 +1200834 @reap_threads
835 def test_aborted_authentication(self):
836
837 class MyServer(SimpleIMAPHandler):
838
839 def cmd_AUTHENTICATE(self, tag, args):
840 self._send_textline('+')
841 self.response = yield
842
843 if self.response == b'*\r\n':
844 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
845 else:
846 self._send_tagged(tag, 'OK', 'MYAUTH successful')
847
848 with self.reaped_pair(MyServer) as (server, client):
849 with self.assertRaises(imaplib.IMAP4.error):
850 code, data = client.authenticate('MYAUTH', lambda x: None)
851
Robert Collins78378e82015-07-31 09:01:38 +1200852
Georg Brandlca580f42013-10-27 06:52:14 +0100853 def test_linetoolong(self):
854 class TooLongHandler(SimpleIMAPHandler):
855 def handle(self):
856 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400857 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100858
859 with self.reaped_server(TooLongHandler) as server:
860 self.assertRaises(imaplib.IMAP4.error,
861 self.imap_class, *server.server_address)
862
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300863 @reap_threads
864 def test_simple_with_statement(self):
865 # simplest call
866 with self.reaped_server(SimpleIMAPHandler) as server:
867 with self.imap_class(*server.server_address):
868 pass
869
870 @reap_threads
871 def test_with_statement(self):
872 with self.reaped_server(SimpleIMAPHandler) as server:
873 with self.imap_class(*server.server_address) as imap:
874 imap.login('user', 'pass')
875 self.assertEqual(server.logged, 'user')
876 self.assertIsNone(server.logged)
877
878 @reap_threads
879 def test_with_statement_logout(self):
880 # what happens if already logout in the block?
881 with self.reaped_server(SimpleIMAPHandler) as server:
882 with self.imap_class(*server.server_address) as imap:
883 imap.login('user', 'pass')
884 self.assertEqual(server.logged, 'user')
885 imap.logout()
886 self.assertIsNone(server.logged)
887 self.assertIsNone(server.logged)
888
Georg Brandlca580f42013-10-27 06:52:14 +0100889
R. David Murraye8dc2582009-12-10 02:08:06 +0000890@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400891class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000892 server_class = SecureTCPServer
893 imap_class = IMAP4_SSL
894
Christian Heimes48aae572013-12-02 20:01:29 +0100895 @reap_threads
896 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200897 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
Christian Heimes48aae572013-12-02 20:01:29 +0100898 ssl_context.load_verify_locations(CAFILE)
899
Antoine Pitroucac9e712014-07-31 18:35:45 -0400900 with self.assertRaisesRegex(
901 ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100902 "IP address mismatch, certificate is not valid for "
903 "'127.0.0.1'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100904 with self.reaped_server(SimpleIMAPHandler) as server:
905 client = self.imap_class(*server.server_address,
906 ssl_context=ssl_context)
907 client.shutdown()
908
909 with self.reaped_server(SimpleIMAPHandler) as server:
910 client = self.imap_class("localhost", server.server_address[1],
911 ssl_context=ssl_context)
912 client.shutdown()
913
R. David Murraye8dc2582009-12-10 02:08:06 +0000914
Antoine Pitroucac9e712014-07-31 18:35:45 -0400915@unittest.skipUnless(
916 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000917class RemoteIMAPTest(unittest.TestCase):
918 host = 'cyrus.andrew.cmu.edu'
919 port = 143
920 username = 'anonymous'
921 password = 'pass'
922 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000923
Antoine Pitroub1436f12010-11-09 22:55:55 +0000924 def setUp(self):
925 with transient_internet(self.host):
926 self.server = self.imap_class(self.host, self.port)
927
928 def tearDown(self):
929 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100930 with transient_internet(self.host):
931 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000932
933 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100934 with transient_internet(self.host):
935 for cap in self.server.capabilities:
936 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000937 self.assertIn('LOGINDISABLED', self.server.capabilities)
938 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100939 rs = self.server.login(self.username, self.password)
940 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000941
942 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100943 with transient_internet(self.host):
944 rs = self.server.logout()
945 self.server = None
946 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000947
948
949@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400950@unittest.skipUnless(
951 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000952class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
953
954 def setUp(self):
955 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100956 with transient_internet(self.host):
957 rs = self.server.starttls()
958 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000959
960 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000961 for cap in self.server.capabilities:
962 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000963 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000964
965
966@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000967class RemoteIMAP_SSLTest(RemoteIMAPTest):
968 port = 993
969 imap_class = IMAP4_SSL
970
Antoine Pitrou08728162011-05-06 18:49:52 +0200971 def setUp(self):
972 pass
973
974 def tearDown(self):
975 pass
976
977 def create_ssl_context(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200978 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
979 ssl_context.check_hostname = False
980 ssl_context.verify_mode = ssl.CERT_NONE
Antoine Pitrou08728162011-05-06 18:49:52 +0200981 ssl_context.load_cert_chain(CERTFILE)
982 return ssl_context
983
984 def check_logincapa(self, server):
985 try:
986 for cap in server.capabilities:
987 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000988 self.assertNotIn('LOGINDISABLED', server.capabilities)
989 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200990 rs = server.login(self.username, self.password)
991 self.assertEqual(rs[0], 'OK')
992 finally:
993 server.logout()
994
Antoine Pitroub1436f12010-11-09 22:55:55 +0000995 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200996 with transient_internet(self.host):
997 _server = self.imap_class(self.host, self.port)
998 self.check_logincapa(_server)
999
Antoine Pitrou08728162011-05-06 18:49:52 +02001000 def test_logout(self):
1001 with transient_internet(self.host):
1002 _server = self.imap_class(self.host, self.port)
1003 rs = _server.logout()
1004 self.assertEqual(rs[0], 'BYE')
1005
1006 def test_ssl_context_certfile_exclusive(self):
1007 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001008 self.assertRaises(
1009 ValueError, self.imap_class, self.host, self.port,
1010 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +02001011
1012 def test_ssl_context_keyfile_exclusive(self):
1013 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001014 self.assertRaises(
1015 ValueError, self.imap_class, self.host, self.port,
1016 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +00001017
1018
1019if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +02001020 unittest.main()