blob: 63ac810cdd1a7b9286967ef52f78b9236f50d4d0 [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
2# If we end up with a significant number of tests that don't require
3# threading, this test module should be split. Right now we skip
4# them all if we don't have threading.
5threading = support.import_module('threading')
6
7from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00008import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00009import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +000010import socketserver
Tim Peters108b7912002-07-31 16:42:33 +000011import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000012import calendar
Martin v. Löwisea752fb2002-01-05 11:31:49 +000013
Antoine Pitroucac9e712014-07-31 18:35:45 -040014from test.support import (reap_threads, verbose, transient_internet,
15 run_with_tz, run_with_locale)
Christian Heimesf6cd9672008-03-26 13:45:42 +000016import unittest
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040017from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000018try:
19 import ssl
20except ImportError:
21 ssl = None
22
Antoine Pitroucac9e712014-07-31 18:35:45 -040023CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
24CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000025
Martin v. Löwisea752fb2002-01-05 11:31:49 +000026
Christian Heimesf6cd9672008-03-26 13:45:42 +000027class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000028
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000029 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000030 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000031 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000032 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
33 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000034 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000035 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
36 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000037 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000038 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
39 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000040
Alexander Belopolsky2420d832012-04-29 15:56:49 -040041 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
42 def test_Internaldate2tuple_issue10941(self):
43 self.assertNotEqual(imaplib.Internaldate2tuple(
44 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040045 imaplib.Internaldate2tuple(
46 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040047
48 def timevalues(self):
49 return [2000000000, 2000000000.0, time.localtime(2000000000),
50 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
51 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040052 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040053 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040054 '"18-May-2033 05:33:20 +0200"']
55
56 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
Martin Panter6e0889f2015-11-16 07:21:38 +000057 # DST rules included to work around quirk where the Gnu C library may not
58 # otherwise restore the previous time zone
59 @run_with_tz('STD-1DST,M3.2.0,M11.1.0')
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040060 def test_Time2Internaldate(self):
61 expected = '"18-May-2033 05:33:20 +0200"'
62
63 for t in self.timevalues():
64 internal = imaplib.Time2Internaldate(t)
65 self.assertEqual(internal, expected)
66
67 def test_that_Time2Internaldate_returns_a_result(self):
68 # Without tzset, we can check only that it successfully
69 # produces a result, not the correctness of the result itself,
70 # since the result depends on the timezone the machine is in.
71 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000072 imaplib.Time2Internaldate(t)
73
74
R. David Murraye8dc2582009-12-10 02:08:06 +000075if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000076 class SecureTCPServer(socketserver.TCPServer):
77
78 def get_request(self):
79 newsocket, fromaddr = self.socket.accept()
Christian Heimesd0486372016-09-10 23:23:33 +020080 context = ssl.SSLContext()
81 context.load_cert_chain(CERTFILE)
82 connstream = context.wrap_socket(newsocket, server_side=True)
R. David Murraye8dc2582009-12-10 02:08:06 +000083 return connstream, fromaddr
84
85 IMAP4_SSL = imaplib.IMAP4_SSL
86
87else:
88
89 class SecureTCPServer:
90 pass
91
92 IMAP4_SSL = None
93
94
95class SimpleIMAPHandler(socketserver.StreamRequestHandler):
R. David Murraye8dc2582009-12-10 02:08:06 +000096 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -050097 continuation = None
98 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +000099
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300100 def setup(self):
101 super().setup()
102 self.server.logged = None
103
R. David Murraye8dc2582009-12-10 02:08:06 +0000104 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400105 if verbose:
106 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000107 self.wfile.write(message)
108
R David Murray774a39f2013-02-19 12:17:31 -0500109 def _send_line(self, message):
110 self._send(message + b'\r\n')
111
112 def _send_textline(self, message):
113 self._send_line(message.encode('ASCII'))
114
115 def _send_tagged(self, tag, code, message):
116 self._send_textline(' '.join((tag, code, message)))
117
R. David Murraye8dc2582009-12-10 02:08:06 +0000118 def handle(self):
119 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500120 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000121 while 1:
122 # Gather up input until we receive a line terminator or we timeout.
123 # Accumulate read(1) because it's simpler to handle the differences
124 # between naked sockets and SSL sockets.
125 line = b''
126 while 1:
127 try:
128 part = self.rfile.read(1)
129 if part == b'':
130 # Naked sockets return empty strings..
131 return
132 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200133 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200134 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000135 return
136 if line.endswith(b'\r\n'):
137 break
138
Antoine Pitroucac9e712014-07-31 18:35:45 -0400139 if verbose:
140 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500141 if self.continuation:
142 try:
143 self.continuation.send(line)
144 except StopIteration:
145 self.continuation = None
146 continue
147 splitline = line.decode('ASCII').split()
148 tag = splitline[0]
149 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000150 args = splitline[2:]
151
Antoine Pitroucac9e712014-07-31 18:35:45 -0400152 if hasattr(self, 'cmd_' + cmd):
153 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500154 if continuation:
155 self.continuation = continuation
156 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000157 else:
R David Murray774a39f2013-02-19 12:17:31 -0500158 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000159
160 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400161 caps = ('IMAP4rev1 ' + self.capabilities
162 if self.capabilities
163 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500164 self._send_textline('* CAPABILITY ' + caps)
165 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
166
167 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300168 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500169 self._send_textline('* BYE IMAP4ref1 Server logging out')
170 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000171
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300172 def cmd_LOGIN(self, tag, args):
173 self.server.logged = args[0]
174 self._send_tagged(tag, 'OK', 'LOGIN completed')
175
R. David Murraye8dc2582009-12-10 02:08:06 +0000176
Antoine Pitroucac9e712014-07-31 18:35:45 -0400177class ThreadedNetworkedTests(unittest.TestCase):
178 server_class = socketserver.TCPServer
179 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000180
181 def make_server(self, addr, hdlr):
182
183 class MyServer(self.server_class):
184 def handle_error(self, request, client_address):
185 self.close_request(request)
186 self.server_close()
187 raise
188
Antoine Pitroucac9e712014-07-31 18:35:45 -0400189 if verbose:
190 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000191 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000192 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000193
194 if verbose:
195 print("server created")
196 print("ADDR =", addr)
197 print("CLASS =", self.server_class)
198 print("HDLR =", server.RequestHandlerClass)
199
200 t = threading.Thread(
201 name='%s serving' % self.server_class,
202 target=server.serve_forever,
203 # Short poll interval to make the test finish quickly.
204 # Time between requests is short enough that we won't wake
205 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400206 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000207 t.daemon = True # In case this function raises.
208 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400209 if verbose:
210 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000211 return server, t
212
213 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400214 if verbose:
215 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000216 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000217 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000218 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400219 if verbose:
220 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000221
222 @contextmanager
223 def reaped_server(self, hdlr):
224 server, thread = self.make_server((support.HOST, 0), hdlr)
225 try:
226 yield server
227 finally:
228 self.reap_server(server, thread)
229
R David Murray774a39f2013-02-19 12:17:31 -0500230 @contextmanager
231 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100232 with self.reaped_server(hdlr) as server:
233 client = self.imap_class(*server.server_address)
234 try:
235 yield server, client
236 finally:
237 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500238
R. David Murraye8dc2582009-12-10 02:08:06 +0000239 @reap_threads
240 def test_connect(self):
241 with self.reaped_server(SimpleIMAPHandler) as server:
242 client = self.imap_class(*server.server_address)
243 client.shutdown()
244
245 @reap_threads
R David Murray317f64f2016-01-02 17:18:34 -0500246 def test_bracket_flags(self):
247
248 # This violates RFC 3501, which disallows ']' characters in tag names,
249 # but imaplib has allowed producing such tags forever, other programs
250 # also produce them (eg: OtherInbox's Organizer app as of 20140716),
251 # and Gmail, for example, accepts them and produces them. So we
252 # support them. See issue #21815.
253
254 class BracketFlagHandler(SimpleIMAPHandler):
255
256 def handle(self):
257 self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
258 super().handle()
259
260 def cmd_AUTHENTICATE(self, tag, args):
261 self._send_textline('+')
262 self.server.response = yield
263 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
264
265 def cmd_SELECT(self, tag, args):
266 flag_msg = ' \\'.join(self.flags)
267 self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
268 self._send_line(b'* 2 EXISTS')
269 self._send_line(b'* 0 RECENT')
270 msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
271 % flag_msg)
272 self._send_line(msg.encode('ascii'))
273 self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
274
275 def cmd_STORE(self, tag, args):
276 new_flags = args[2].strip('(').strip(')').split()
277 self.flags.extend(new_flags)
278 flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
279 msg = '* %s FETCH %s' % (args[0], flags_msg)
280 self._send_line(msg.encode('ascii'))
281 self._send_tagged(tag, 'OK', 'STORE completed.')
282
283 with self.reaped_pair(BracketFlagHandler) as (server, client):
284 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
285 self.assertEqual(code, 'OK')
286 self.assertEqual(server.response, b'ZmFrZQ==\r\n')
287 client.select('test')
288 typ, [data] = client.store(b'1', "+FLAGS", "[test]")
289 self.assertIn(b'[test]', data)
290 client.select('test')
291 typ, [data] = client.response('PERMANENTFLAGS')
292 self.assertIn(b'[test]', data)
293
294 @reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000295 def test_issue5949(self):
296
297 class EOFHandler(socketserver.StreamRequestHandler):
298 def handle(self):
299 # EOF without sending a complete welcome message.
300 self.wfile.write(b'* OK')
301
302 with self.reaped_server(EOFHandler) as server:
303 self.assertRaises(imaplib.IMAP4.abort,
304 self.imap_class, *server.server_address)
305
306 @reap_threads
307 def test_line_termination(self):
308
309 class BadNewlineHandler(SimpleIMAPHandler):
310
311 def cmd_CAPABILITY(self, tag, args):
312 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500313 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000314
315 with self.reaped_server(BadNewlineHandler) as server:
316 self.assertRaises(imaplib.IMAP4.abort,
317 self.imap_class, *server.server_address)
318
R David Murraya6429db2015-05-10 19:17:23 -0400319 class UTF8Server(SimpleIMAPHandler):
320 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
321
322 def cmd_ENABLE(self, tag, args):
323 self._send_tagged(tag, 'OK', 'ENABLE successful')
324
325 def cmd_AUTHENTICATE(self, tag, args):
326 self._send_textline('+')
327 self.server.response = yield
328 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
329
330 @reap_threads
331 def test_enable_raises_error_if_not_AUTH(self):
332 with self.reaped_pair(self.UTF8Server) as (server, client):
333 self.assertFalse(client.utf8_enabled)
334 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
335 self.assertFalse(client.utf8_enabled)
336
337 # XXX Also need a test that enable after SELECT raises an error.
338
339 @reap_threads
340 def test_enable_raises_error_if_no_capability(self):
341 class NoEnableServer(self.UTF8Server):
342 capabilities = 'AUTH'
343 with self.reaped_pair(NoEnableServer) as (server, client):
344 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
345
346 @reap_threads
347 def test_enable_UTF8_raises_error_if_not_supported(self):
348 class NonUTF8Server(SimpleIMAPHandler):
349 pass
350 with self.assertRaises(imaplib.IMAP4.error):
351 with self.reaped_pair(NonUTF8Server) as (server, client):
352 typ, data = client.login('user', 'pass')
353 self.assertEqual(typ, 'OK')
354 client.enable('UTF8=ACCEPT')
355 pass
356
357 @reap_threads
358 def test_enable_UTF8_True_append(self):
359
360 class UTF8AppendServer(self.UTF8Server):
361 def cmd_APPEND(self, tag, args):
362 self._send_textline('+')
363 self.server.response = yield
364 self._send_tagged(tag, 'OK', 'okay')
365
366 with self.reaped_pair(UTF8AppendServer) as (server, client):
367 self.assertEqual(client._encoding, 'ascii')
368 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
369 self.assertEqual(code, 'OK')
370 self.assertEqual(server.response,
371 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
372 code, _ = client.enable('UTF8=ACCEPT')
373 self.assertEqual(code, 'OK')
374 self.assertEqual(client._encoding, 'utf-8')
375 msg_string = 'Subject: üñí©öðé'
376 typ, data = client.append(
377 None, None, None, msg_string.encode('utf-8'))
378 self.assertEqual(typ, 'OK')
379 self.assertEqual(
380 server.response,
381 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
382 )
383
384 # XXX also need a test that makes sure that the Literal and Untagged_status
385 # regexes uses unicode in UTF8 mode instead of the default ASCII.
386
387 @reap_threads
388 def test_search_disallows_charset_in_utf8_mode(self):
389 with self.reaped_pair(self.UTF8Server) as (server, client):
390 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
391 self.assertEqual(typ, 'OK')
392 typ, _ = client.enable('UTF8=ACCEPT')
393 self.assertEqual(typ, 'OK')
394 self.assertTrue(client.utf8_enabled)
395 self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
396
R David Murray774a39f2013-02-19 12:17:31 -0500397 @reap_threads
398 def test_bad_auth_name(self):
399
400 class MyServer(SimpleIMAPHandler):
401
402 def cmd_AUTHENTICATE(self, tag, args):
403 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400404 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500405
406 with self.reaped_pair(MyServer) as (server, client):
407 with self.assertRaises(imaplib.IMAP4.error):
408 client.authenticate('METHOD', lambda: 1)
409
410 @reap_threads
411 def test_invalid_authentication(self):
412
413 class MyServer(SimpleIMAPHandler):
414
415 def cmd_AUTHENTICATE(self, tag, args):
416 self._send_textline('+')
417 self.response = yield
418 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
419
420 with self.reaped_pair(MyServer) as (server, client):
421 with self.assertRaises(imaplib.IMAP4.error):
422 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
423
424 @reap_threads
425 def test_valid_authentication(self):
426
427 class MyServer(SimpleIMAPHandler):
428
429 def cmd_AUTHENTICATE(self, tag, args):
430 self._send_textline('+')
431 self.server.response = yield
432 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
433
434 with self.reaped_pair(MyServer) as (server, client):
435 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
436 self.assertEqual(code, 'OK')
437 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400438 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500439
440 with self.reaped_pair(MyServer) as (server, client):
441 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
442 self.assertEqual(code, 'OK')
443 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400444 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500445
446 @reap_threads
447 def test_login_cram_md5(self):
448
449 class AuthHandler(SimpleIMAPHandler):
450
451 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
452
453 def cmd_AUTHENTICATE(self, tag, args):
454 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400455 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500456 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400457 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
458 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500459 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
460 else:
461 self._send_tagged(tag, 'NO', 'No access')
462
463 with self.reaped_pair(AuthHandler) as (server, client):
464 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
465 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
466 self.assertEqual(ret, "OK")
467
468 with self.reaped_pair(AuthHandler) as (server, client):
469 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
470 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
471 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000472
473
Robert Collins5ccc18f2015-07-31 08:59:02 +1200474 @reap_threads
475 def test_aborted_authentication(self):
476
477 class MyServer(SimpleIMAPHandler):
478
479 def cmd_AUTHENTICATE(self, tag, args):
480 self._send_textline('+')
481 self.response = yield
482
483 if self.response == b'*\r\n':
484 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
485 else:
486 self._send_tagged(tag, 'OK', 'MYAUTH successful')
487
488 with self.reaped_pair(MyServer) as (server, client):
489 with self.assertRaises(imaplib.IMAP4.error):
490 code, data = client.authenticate('MYAUTH', lambda x: None)
491
Robert Collins78378e82015-07-31 09:01:38 +1200492
Georg Brandlca580f42013-10-27 06:52:14 +0100493 def test_linetoolong(self):
494 class TooLongHandler(SimpleIMAPHandler):
495 def handle(self):
496 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400497 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100498
499 with self.reaped_server(TooLongHandler) as server:
500 self.assertRaises(imaplib.IMAP4.error,
501 self.imap_class, *server.server_address)
502
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300503 @reap_threads
504 def test_simple_with_statement(self):
505 # simplest call
506 with self.reaped_server(SimpleIMAPHandler) as server:
507 with self.imap_class(*server.server_address):
508 pass
509
510 @reap_threads
511 def test_with_statement(self):
512 with self.reaped_server(SimpleIMAPHandler) as server:
513 with self.imap_class(*server.server_address) as imap:
514 imap.login('user', 'pass')
515 self.assertEqual(server.logged, 'user')
516 self.assertIsNone(server.logged)
517
518 @reap_threads
519 def test_with_statement_logout(self):
520 # what happens if already logout in the block?
521 with self.reaped_server(SimpleIMAPHandler) as server:
522 with self.imap_class(*server.server_address) as imap:
523 imap.login('user', 'pass')
524 self.assertEqual(server.logged, 'user')
525 imap.logout()
526 self.assertIsNone(server.logged)
527 self.assertIsNone(server.logged)
528
Georg Brandlca580f42013-10-27 06:52:14 +0100529
R. David Murraye8dc2582009-12-10 02:08:06 +0000530@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400531class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000532 server_class = SecureTCPServer
533 imap_class = IMAP4_SSL
534
Christian Heimes48aae572013-12-02 20:01:29 +0100535 @reap_threads
536 def test_ssl_verified(self):
537 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
538 ssl_context.verify_mode = ssl.CERT_REQUIRED
539 ssl_context.check_hostname = True
540 ssl_context.load_verify_locations(CAFILE)
541
Antoine Pitroucac9e712014-07-31 18:35:45 -0400542 with self.assertRaisesRegex(
543 ssl.CertificateError,
544 "hostname '127.0.0.1' doesn't match 'localhost'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100545 with self.reaped_server(SimpleIMAPHandler) as server:
546 client = self.imap_class(*server.server_address,
547 ssl_context=ssl_context)
548 client.shutdown()
549
550 with self.reaped_server(SimpleIMAPHandler) as server:
551 client = self.imap_class("localhost", server.server_address[1],
552 ssl_context=ssl_context)
553 client.shutdown()
554
R. David Murraye8dc2582009-12-10 02:08:06 +0000555
Antoine Pitroucac9e712014-07-31 18:35:45 -0400556@unittest.skipUnless(
557 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000558class RemoteIMAPTest(unittest.TestCase):
559 host = 'cyrus.andrew.cmu.edu'
560 port = 143
561 username = 'anonymous'
562 password = 'pass'
563 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000564
Antoine Pitroub1436f12010-11-09 22:55:55 +0000565 def setUp(self):
566 with transient_internet(self.host):
567 self.server = self.imap_class(self.host, self.port)
568
569 def tearDown(self):
570 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100571 with transient_internet(self.host):
572 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000573
574 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100575 with transient_internet(self.host):
576 for cap in self.server.capabilities:
577 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000578 self.assertIn('LOGINDISABLED', self.server.capabilities)
579 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100580 rs = self.server.login(self.username, self.password)
581 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000582
583 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100584 with transient_internet(self.host):
585 rs = self.server.logout()
586 self.server = None
587 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000588
589
590@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400591@unittest.skipUnless(
592 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000593class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
594
595 def setUp(self):
596 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100597 with transient_internet(self.host):
598 rs = self.server.starttls()
599 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000600
601 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000602 for cap in self.server.capabilities:
603 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000604 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000605
606
607@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000608class RemoteIMAP_SSLTest(RemoteIMAPTest):
609 port = 993
610 imap_class = IMAP4_SSL
611
Antoine Pitrou08728162011-05-06 18:49:52 +0200612 def setUp(self):
613 pass
614
615 def tearDown(self):
616 pass
617
618 def create_ssl_context(self):
619 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
620 ssl_context.load_cert_chain(CERTFILE)
621 return ssl_context
622
623 def check_logincapa(self, server):
624 try:
625 for cap in server.capabilities:
626 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000627 self.assertNotIn('LOGINDISABLED', server.capabilities)
628 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200629 rs = server.login(self.username, self.password)
630 self.assertEqual(rs[0], 'OK')
631 finally:
632 server.logout()
633
Antoine Pitroub1436f12010-11-09 22:55:55 +0000634 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200635 with transient_internet(self.host):
636 _server = self.imap_class(self.host, self.port)
637 self.check_logincapa(_server)
638
639 def test_logincapa_with_client_certfile(self):
640 with transient_internet(self.host):
Christian Heimes727cc932016-09-11 22:47:02 +0200641 with support.check_warnings(('', DeprecationWarning)):
642 _server = self.imap_class(self.host, self.port,
643 certfile=CERTFILE)
644 self.check_logincapa(_server)
Antoine Pitrou08728162011-05-06 18:49:52 +0200645
646 def test_logincapa_with_client_ssl_context(self):
647 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400648 _server = self.imap_class(
649 self.host, self.port, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +0200650 self.check_logincapa(_server)
651
652 def test_logout(self):
653 with transient_internet(self.host):
654 _server = self.imap_class(self.host, self.port)
655 rs = _server.logout()
656 self.assertEqual(rs[0], 'BYE')
657
658 def test_ssl_context_certfile_exclusive(self):
659 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400660 self.assertRaises(
661 ValueError, self.imap_class, self.host, self.port,
662 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +0200663
664 def test_ssl_context_keyfile_exclusive(self):
665 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400666 self.assertRaises(
667 ValueError, self.imap_class, self.host, self.port,
668 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +0000669
670
671if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +0200672 unittest.main()