blob: 824865680fa76213c29c836760a251d41702f70c [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
2# If we end up with a significant number of tests that don't require
3# threading, this test module should be split. Right now we skip
4# them all if we don't have threading.
5threading = support.import_module('threading')
6
7from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00008import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00009import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +000010import socketserver
Tim Peters108b7912002-07-31 16:42:33 +000011import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000012import calendar
Martin v. Löwisea752fb2002-01-05 11:31:49 +000013
Antoine Pitroucac9e712014-07-31 18:35:45 -040014from test.support import (reap_threads, verbose, transient_internet,
15 run_with_tz, run_with_locale)
Christian Heimesf6cd9672008-03-26 13:45:42 +000016import unittest
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040017from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000018try:
19 import ssl
20except ImportError:
21 ssl = None
22
Antoine Pitroucac9e712014-07-31 18:35:45 -040023CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
24CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000025
Martin v. Löwisea752fb2002-01-05 11:31:49 +000026
Christian Heimesf6cd9672008-03-26 13:45:42 +000027class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000028
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000029 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000030 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000031 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000032 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
33 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000034 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000035 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
36 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000037 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000038 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
39 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000040
Alexander Belopolsky2420d832012-04-29 15:56:49 -040041 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
42 def test_Internaldate2tuple_issue10941(self):
43 self.assertNotEqual(imaplib.Internaldate2tuple(
44 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040045 imaplib.Internaldate2tuple(
46 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040047
48 def timevalues(self):
49 return [2000000000, 2000000000.0, time.localtime(2000000000),
50 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
51 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040052 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040053 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040054 '"18-May-2033 05:33:20 +0200"']
55
56 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
57 @run_with_tz('STD-1DST')
58 def test_Time2Internaldate(self):
59 expected = '"18-May-2033 05:33:20 +0200"'
60
61 for t in self.timevalues():
62 internal = imaplib.Time2Internaldate(t)
63 self.assertEqual(internal, expected)
64
65 def test_that_Time2Internaldate_returns_a_result(self):
66 # Without tzset, we can check only that it successfully
67 # produces a result, not the correctness of the result itself,
68 # since the result depends on the timezone the machine is in.
69 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000070 imaplib.Time2Internaldate(t)
71
72
R. David Murraye8dc2582009-12-10 02:08:06 +000073if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000074 class SecureTCPServer(socketserver.TCPServer):
75
76 def get_request(self):
77 newsocket, fromaddr = self.socket.accept()
78 connstream = ssl.wrap_socket(newsocket,
79 server_side=True,
80 certfile=CERTFILE)
81 return connstream, fromaddr
82
83 IMAP4_SSL = imaplib.IMAP4_SSL
84
85else:
86
87 class SecureTCPServer:
88 pass
89
90 IMAP4_SSL = None
91
92
93class SimpleIMAPHandler(socketserver.StreamRequestHandler):
R. David Murraye8dc2582009-12-10 02:08:06 +000094 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -050095 continuation = None
96 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +000097
Serhiy Storchaka38684c32014-09-09 19:07:49 +030098 def setup(self):
99 super().setup()
100 self.server.logged = None
101
R. David Murraye8dc2582009-12-10 02:08:06 +0000102 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400103 if verbose:
104 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000105 self.wfile.write(message)
106
R David Murray774a39f2013-02-19 12:17:31 -0500107 def _send_line(self, message):
108 self._send(message + b'\r\n')
109
110 def _send_textline(self, message):
111 self._send_line(message.encode('ASCII'))
112
113 def _send_tagged(self, tag, code, message):
114 self._send_textline(' '.join((tag, code, message)))
115
R. David Murraye8dc2582009-12-10 02:08:06 +0000116 def handle(self):
117 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500118 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000119 while 1:
120 # Gather up input until we receive a line terminator or we timeout.
121 # Accumulate read(1) because it's simpler to handle the differences
122 # between naked sockets and SSL sockets.
123 line = b''
124 while 1:
125 try:
126 part = self.rfile.read(1)
127 if part == b'':
128 # Naked sockets return empty strings..
129 return
130 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200131 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200132 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000133 return
134 if line.endswith(b'\r\n'):
135 break
136
Antoine Pitroucac9e712014-07-31 18:35:45 -0400137 if verbose:
138 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500139 if self.continuation:
140 try:
141 self.continuation.send(line)
142 except StopIteration:
143 self.continuation = None
144 continue
145 splitline = line.decode('ASCII').split()
146 tag = splitline[0]
147 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000148 args = splitline[2:]
149
Antoine Pitroucac9e712014-07-31 18:35:45 -0400150 if hasattr(self, 'cmd_' + cmd):
151 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500152 if continuation:
153 self.continuation = continuation
154 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000155 else:
R David Murray774a39f2013-02-19 12:17:31 -0500156 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000157
158 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400159 caps = ('IMAP4rev1 ' + self.capabilities
160 if self.capabilities
161 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500162 self._send_textline('* CAPABILITY ' + caps)
163 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
164
165 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300166 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500167 self._send_textline('* BYE IMAP4ref1 Server logging out')
168 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000169
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300170 def cmd_LOGIN(self, tag, args):
171 self.server.logged = args[0]
172 self._send_tagged(tag, 'OK', 'LOGIN completed')
173
R. David Murraye8dc2582009-12-10 02:08:06 +0000174
Antoine Pitroucac9e712014-07-31 18:35:45 -0400175class ThreadedNetworkedTests(unittest.TestCase):
176 server_class = socketserver.TCPServer
177 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000178
179 def make_server(self, addr, hdlr):
180
181 class MyServer(self.server_class):
182 def handle_error(self, request, client_address):
183 self.close_request(request)
184 self.server_close()
185 raise
186
Antoine Pitroucac9e712014-07-31 18:35:45 -0400187 if verbose:
188 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000189 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000190 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000191
192 if verbose:
193 print("server created")
194 print("ADDR =", addr)
195 print("CLASS =", self.server_class)
196 print("HDLR =", server.RequestHandlerClass)
197
198 t = threading.Thread(
199 name='%s serving' % self.server_class,
200 target=server.serve_forever,
201 # Short poll interval to make the test finish quickly.
202 # Time between requests is short enough that we won't wake
203 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400204 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000205 t.daemon = True # In case this function raises.
206 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400207 if verbose:
208 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000209 return server, t
210
211 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400212 if verbose:
213 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000214 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000215 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000216 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400217 if verbose:
218 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000219
220 @contextmanager
221 def reaped_server(self, hdlr):
222 server, thread = self.make_server((support.HOST, 0), hdlr)
223 try:
224 yield server
225 finally:
226 self.reap_server(server, thread)
227
R David Murray774a39f2013-02-19 12:17:31 -0500228 @contextmanager
229 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100230 with self.reaped_server(hdlr) as server:
231 client = self.imap_class(*server.server_address)
232 try:
233 yield server, client
234 finally:
235 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500236
R. David Murraye8dc2582009-12-10 02:08:06 +0000237 @reap_threads
238 def test_connect(self):
239 with self.reaped_server(SimpleIMAPHandler) as server:
240 client = self.imap_class(*server.server_address)
241 client.shutdown()
242
243 @reap_threads
244 def test_issue5949(self):
245
246 class EOFHandler(socketserver.StreamRequestHandler):
247 def handle(self):
248 # EOF without sending a complete welcome message.
249 self.wfile.write(b'* OK')
250
251 with self.reaped_server(EOFHandler) as server:
252 self.assertRaises(imaplib.IMAP4.abort,
253 self.imap_class, *server.server_address)
254
255 @reap_threads
256 def test_line_termination(self):
257
258 class BadNewlineHandler(SimpleIMAPHandler):
259
260 def cmd_CAPABILITY(self, tag, args):
261 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500262 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000263
264 with self.reaped_server(BadNewlineHandler) as server:
265 self.assertRaises(imaplib.IMAP4.abort,
266 self.imap_class, *server.server_address)
267
R David Murraya6429db2015-05-10 19:17:23 -0400268 class UTF8Server(SimpleIMAPHandler):
269 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
270
271 def cmd_ENABLE(self, tag, args):
272 self._send_tagged(tag, 'OK', 'ENABLE successful')
273
274 def cmd_AUTHENTICATE(self, tag, args):
275 self._send_textline('+')
276 self.server.response = yield
277 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
278
279 @reap_threads
280 def test_enable_raises_error_if_not_AUTH(self):
281 with self.reaped_pair(self.UTF8Server) as (server, client):
282 self.assertFalse(client.utf8_enabled)
283 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
284 self.assertFalse(client.utf8_enabled)
285
286 # XXX Also need a test that enable after SELECT raises an error.
287
288 @reap_threads
289 def test_enable_raises_error_if_no_capability(self):
290 class NoEnableServer(self.UTF8Server):
291 capabilities = 'AUTH'
292 with self.reaped_pair(NoEnableServer) as (server, client):
293 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
294
295 @reap_threads
296 def test_enable_UTF8_raises_error_if_not_supported(self):
297 class NonUTF8Server(SimpleIMAPHandler):
298 pass
299 with self.assertRaises(imaplib.IMAP4.error):
300 with self.reaped_pair(NonUTF8Server) as (server, client):
301 typ, data = client.login('user', 'pass')
302 self.assertEqual(typ, 'OK')
303 client.enable('UTF8=ACCEPT')
304 pass
305
306 @reap_threads
307 def test_enable_UTF8_True_append(self):
308
309 class UTF8AppendServer(self.UTF8Server):
310 def cmd_APPEND(self, tag, args):
311 self._send_textline('+')
312 self.server.response = yield
313 self._send_tagged(tag, 'OK', 'okay')
314
315 with self.reaped_pair(UTF8AppendServer) as (server, client):
316 self.assertEqual(client._encoding, 'ascii')
317 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
318 self.assertEqual(code, 'OK')
319 self.assertEqual(server.response,
320 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
321 code, _ = client.enable('UTF8=ACCEPT')
322 self.assertEqual(code, 'OK')
323 self.assertEqual(client._encoding, 'utf-8')
324 msg_string = 'Subject: üñí©öðé'
325 typ, data = client.append(
326 None, None, None, msg_string.encode('utf-8'))
327 self.assertEqual(typ, 'OK')
328 self.assertEqual(
329 server.response,
330 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
331 )
332
333 # XXX also need a test that makes sure that the Literal and Untagged_status
334 # regexes uses unicode in UTF8 mode instead of the default ASCII.
335
336 @reap_threads
337 def test_search_disallows_charset_in_utf8_mode(self):
338 with self.reaped_pair(self.UTF8Server) as (server, client):
339 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
340 self.assertEqual(typ, 'OK')
341 typ, _ = client.enable('UTF8=ACCEPT')
342 self.assertEqual(typ, 'OK')
343 self.assertTrue(client.utf8_enabled)
344 self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
345
R David Murray774a39f2013-02-19 12:17:31 -0500346 @reap_threads
347 def test_bad_auth_name(self):
348
349 class MyServer(SimpleIMAPHandler):
350
351 def cmd_AUTHENTICATE(self, tag, args):
352 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400353 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500354
355 with self.reaped_pair(MyServer) as (server, client):
356 with self.assertRaises(imaplib.IMAP4.error):
357 client.authenticate('METHOD', lambda: 1)
358
359 @reap_threads
360 def test_invalid_authentication(self):
361
362 class MyServer(SimpleIMAPHandler):
363
364 def cmd_AUTHENTICATE(self, tag, args):
365 self._send_textline('+')
366 self.response = yield
367 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
368
369 with self.reaped_pair(MyServer) as (server, client):
370 with self.assertRaises(imaplib.IMAP4.error):
371 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
372
373 @reap_threads
374 def test_valid_authentication(self):
375
376 class MyServer(SimpleIMAPHandler):
377
378 def cmd_AUTHENTICATE(self, tag, args):
379 self._send_textline('+')
380 self.server.response = yield
381 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
382
383 with self.reaped_pair(MyServer) as (server, client):
384 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
385 self.assertEqual(code, 'OK')
386 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400387 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500388
389 with self.reaped_pair(MyServer) as (server, client):
390 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
391 self.assertEqual(code, 'OK')
392 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400393 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500394
395 @reap_threads
396 def test_login_cram_md5(self):
397
398 class AuthHandler(SimpleIMAPHandler):
399
400 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
401
402 def cmd_AUTHENTICATE(self, tag, args):
403 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400404 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500405 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400406 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
407 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500408 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
409 else:
410 self._send_tagged(tag, 'NO', 'No access')
411
412 with self.reaped_pair(AuthHandler) as (server, client):
413 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
414 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
415 self.assertEqual(ret, "OK")
416
417 with self.reaped_pair(AuthHandler) as (server, client):
418 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
419 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
420 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000421
422
Robert Collins5ccc18f2015-07-31 08:59:02 +1200423 @reap_threads
424 def test_aborted_authentication(self):
425
426 class MyServer(SimpleIMAPHandler):
427
428 def cmd_AUTHENTICATE(self, tag, args):
429 self._send_textline('+')
430 self.response = yield
431
432 if self.response == b'*\r\n':
433 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
434 else:
435 self._send_tagged(tag, 'OK', 'MYAUTH successful')
436
437 with self.reaped_pair(MyServer) as (server, client):
438 with self.assertRaises(imaplib.IMAP4.error):
439 code, data = client.authenticate('MYAUTH', lambda x: None)
440
Robert Collins78378e82015-07-31 09:01:38 +1200441
Georg Brandlca580f42013-10-27 06:52:14 +0100442 def test_linetoolong(self):
443 class TooLongHandler(SimpleIMAPHandler):
444 def handle(self):
445 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400446 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100447
448 with self.reaped_server(TooLongHandler) as server:
449 self.assertRaises(imaplib.IMAP4.error,
450 self.imap_class, *server.server_address)
451
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300452 @reap_threads
453 def test_simple_with_statement(self):
454 # simplest call
455 with self.reaped_server(SimpleIMAPHandler) as server:
456 with self.imap_class(*server.server_address):
457 pass
458
459 @reap_threads
460 def test_with_statement(self):
461 with self.reaped_server(SimpleIMAPHandler) as server:
462 with self.imap_class(*server.server_address) as imap:
463 imap.login('user', 'pass')
464 self.assertEqual(server.logged, 'user')
465 self.assertIsNone(server.logged)
466
467 @reap_threads
468 def test_with_statement_logout(self):
469 # what happens if already logout in the block?
470 with self.reaped_server(SimpleIMAPHandler) as server:
471 with self.imap_class(*server.server_address) as imap:
472 imap.login('user', 'pass')
473 self.assertEqual(server.logged, 'user')
474 imap.logout()
475 self.assertIsNone(server.logged)
476 self.assertIsNone(server.logged)
477
Georg Brandlca580f42013-10-27 06:52:14 +0100478
R. David Murraye8dc2582009-12-10 02:08:06 +0000479@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400480class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000481 server_class = SecureTCPServer
482 imap_class = IMAP4_SSL
483
Christian Heimes48aae572013-12-02 20:01:29 +0100484 @reap_threads
485 def test_ssl_verified(self):
486 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
487 ssl_context.verify_mode = ssl.CERT_REQUIRED
488 ssl_context.check_hostname = True
489 ssl_context.load_verify_locations(CAFILE)
490
Antoine Pitroucac9e712014-07-31 18:35:45 -0400491 with self.assertRaisesRegex(
492 ssl.CertificateError,
493 "hostname '127.0.0.1' doesn't match 'localhost'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100494 with self.reaped_server(SimpleIMAPHandler) as server:
495 client = self.imap_class(*server.server_address,
496 ssl_context=ssl_context)
497 client.shutdown()
498
499 with self.reaped_server(SimpleIMAPHandler) as server:
500 client = self.imap_class("localhost", server.server_address[1],
501 ssl_context=ssl_context)
502 client.shutdown()
503
R. David Murraye8dc2582009-12-10 02:08:06 +0000504
Antoine Pitroucac9e712014-07-31 18:35:45 -0400505@unittest.skipUnless(
506 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000507class RemoteIMAPTest(unittest.TestCase):
508 host = 'cyrus.andrew.cmu.edu'
509 port = 143
510 username = 'anonymous'
511 password = 'pass'
512 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000513
Antoine Pitroub1436f12010-11-09 22:55:55 +0000514 def setUp(self):
515 with transient_internet(self.host):
516 self.server = self.imap_class(self.host, self.port)
517
518 def tearDown(self):
519 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100520 with transient_internet(self.host):
521 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000522
523 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100524 with transient_internet(self.host):
525 for cap in self.server.capabilities:
526 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000527 self.assertIn('LOGINDISABLED', self.server.capabilities)
528 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100529 rs = self.server.login(self.username, self.password)
530 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000531
532 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100533 with transient_internet(self.host):
534 rs = self.server.logout()
535 self.server = None
536 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000537
538
539@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400540@unittest.skipUnless(
541 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000542class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
543
544 def setUp(self):
545 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100546 with transient_internet(self.host):
547 rs = self.server.starttls()
548 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000549
550 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000551 for cap in self.server.capabilities:
552 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000553 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000554
555
556@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000557class RemoteIMAP_SSLTest(RemoteIMAPTest):
558 port = 993
559 imap_class = IMAP4_SSL
560
Antoine Pitrou08728162011-05-06 18:49:52 +0200561 def setUp(self):
562 pass
563
564 def tearDown(self):
565 pass
566
567 def create_ssl_context(self):
568 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
569 ssl_context.load_cert_chain(CERTFILE)
570 return ssl_context
571
572 def check_logincapa(self, server):
573 try:
574 for cap in server.capabilities:
575 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000576 self.assertNotIn('LOGINDISABLED', server.capabilities)
577 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200578 rs = server.login(self.username, self.password)
579 self.assertEqual(rs[0], 'OK')
580 finally:
581 server.logout()
582
Antoine Pitroub1436f12010-11-09 22:55:55 +0000583 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200584 with transient_internet(self.host):
585 _server = self.imap_class(self.host, self.port)
586 self.check_logincapa(_server)
587
588 def test_logincapa_with_client_certfile(self):
589 with transient_internet(self.host):
590 _server = self.imap_class(self.host, self.port, certfile=CERTFILE)
591 self.check_logincapa(_server)
592
593 def test_logincapa_with_client_ssl_context(self):
594 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400595 _server = self.imap_class(
596 self.host, self.port, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +0200597 self.check_logincapa(_server)
598
599 def test_logout(self):
600 with transient_internet(self.host):
601 _server = self.imap_class(self.host, self.port)
602 rs = _server.logout()
603 self.assertEqual(rs[0], 'BYE')
604
605 def test_ssl_context_certfile_exclusive(self):
606 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400607 self.assertRaises(
608 ValueError, self.imap_class, self.host, self.port,
609 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +0200610
611 def test_ssl_context_keyfile_exclusive(self):
612 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400613 self.assertRaises(
614 ValueError, self.imap_class, self.host, self.port,
615 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +0000616
617
618if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +0200619 unittest.main()