blob: 7c9afd9f39fb1a72d173caf0cc5c56176c1e9bdb [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
2# If we end up with a significant number of tests that don't require
3# threading, this test module should be split. Right now we skip
4# them all if we don't have threading.
5threading = support.import_module('threading')
6
7from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00008import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00009import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +000010import socketserver
Tim Peters108b7912002-07-31 16:42:33 +000011import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000012import calendar
Martin v. Löwisea752fb2002-01-05 11:31:49 +000013
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040014from test.support import reap_threads, verbose, transient_internet, run_with_tz, run_with_locale
Christian Heimesf6cd9672008-03-26 13:45:42 +000015import unittest
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040016from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000017try:
18 import ssl
19except ImportError:
20 ssl = None
21
22CERTFILE = None
23
Martin v. Löwisea752fb2002-01-05 11:31:49 +000024
Christian Heimesf6cd9672008-03-26 13:45:42 +000025class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000026
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000027 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000028 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000029 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000030 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
31 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000032 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000033 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
34 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000035 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000036 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
37 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000038
Alexander Belopolsky2420d832012-04-29 15:56:49 -040039 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
40 def test_Internaldate2tuple_issue10941(self):
41 self.assertNotEqual(imaplib.Internaldate2tuple(
42 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
43 imaplib.Internaldate2tuple(
44 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
45
Christian Heimesf6cd9672008-03-26 13:45:42 +000046
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040047
48 def timevalues(self):
49 return [2000000000, 2000000000.0, time.localtime(2000000000),
50 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
51 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040052 datetime.fromtimestamp(2000000000,
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040053 timezone(timedelta(0, 2*60*60))),
54 '"18-May-2033 05:33:20 +0200"']
55
56 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
57 @run_with_tz('STD-1DST')
58 def test_Time2Internaldate(self):
59 expected = '"18-May-2033 05:33:20 +0200"'
60
61 for t in self.timevalues():
62 internal = imaplib.Time2Internaldate(t)
63 self.assertEqual(internal, expected)
64
65 def test_that_Time2Internaldate_returns_a_result(self):
66 # Without tzset, we can check only that it successfully
67 # produces a result, not the correctness of the result itself,
68 # since the result depends on the timezone the machine is in.
69 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000070 imaplib.Time2Internaldate(t)
71
72
R. David Murraye8dc2582009-12-10 02:08:06 +000073if ssl:
74
75 class SecureTCPServer(socketserver.TCPServer):
76
77 def get_request(self):
78 newsocket, fromaddr = self.socket.accept()
79 connstream = ssl.wrap_socket(newsocket,
80 server_side=True,
81 certfile=CERTFILE)
82 return connstream, fromaddr
83
84 IMAP4_SSL = imaplib.IMAP4_SSL
85
86else:
87
88 class SecureTCPServer:
89 pass
90
91 IMAP4_SSL = None
92
93
94class SimpleIMAPHandler(socketserver.StreamRequestHandler):
95
96 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -050097 continuation = None
98 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +000099
100 def _send(self, message):
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +0000101 if verbose: print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000102 self.wfile.write(message)
103
R David Murray774a39f2013-02-19 12:17:31 -0500104 def _send_line(self, message):
105 self._send(message + b'\r\n')
106
107 def _send_textline(self, message):
108 self._send_line(message.encode('ASCII'))
109
110 def _send_tagged(self, tag, code, message):
111 self._send_textline(' '.join((tag, code, message)))
112
R. David Murraye8dc2582009-12-10 02:08:06 +0000113 def handle(self):
114 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500115 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000116 while 1:
117 # Gather up input until we receive a line terminator or we timeout.
118 # Accumulate read(1) because it's simpler to handle the differences
119 # between naked sockets and SSL sockets.
120 line = b''
121 while 1:
122 try:
123 part = self.rfile.read(1)
124 if part == b'':
125 # Naked sockets return empty strings..
126 return
127 line += part
128 except IOError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200129 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000130 return
131 if line.endswith(b'\r\n'):
132 break
133
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +0000134 if verbose: print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500135 if self.continuation:
136 try:
137 self.continuation.send(line)
138 except StopIteration:
139 self.continuation = None
140 continue
141 splitline = line.decode('ASCII').split()
142 tag = splitline[0]
143 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000144 args = splitline[2:]
145
146 if hasattr(self, 'cmd_'+cmd):
R David Murray774a39f2013-02-19 12:17:31 -0500147 continuation = getattr(self, 'cmd_'+cmd)(tag, args)
148 if continuation:
149 self.continuation = continuation
150 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000151 else:
R David Murray774a39f2013-02-19 12:17:31 -0500152 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000153
154 def cmd_CAPABILITY(self, tag, args):
R David Murray774a39f2013-02-19 12:17:31 -0500155 caps = 'IMAP4rev1 ' + self.capabilities if self.capabilities else 'IMAP4rev1'
156 self._send_textline('* CAPABILITY ' + caps)
157 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
158
159 def cmd_LOGOUT(self, tag, args):
160 self._send_textline('* BYE IMAP4ref1 Server logging out')
161 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000162
163
164class BaseThreadedNetworkedTests(unittest.TestCase):
165
166 def make_server(self, addr, hdlr):
167
168 class MyServer(self.server_class):
169 def handle_error(self, request, client_address):
170 self.close_request(request)
171 self.server_close()
172 raise
173
174 if verbose: print("creating server")
175 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000176 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000177
178 if verbose:
179 print("server created")
180 print("ADDR =", addr)
181 print("CLASS =", self.server_class)
182 print("HDLR =", server.RequestHandlerClass)
183
184 t = threading.Thread(
185 name='%s serving' % self.server_class,
186 target=server.serve_forever,
187 # Short poll interval to make the test finish quickly.
188 # Time between requests is short enough that we won't wake
189 # up spuriously too many times.
190 kwargs={'poll_interval':0.01})
191 t.daemon = True # In case this function raises.
192 t.start()
193 if verbose: print("server running")
194 return server, t
195
196 def reap_server(self, server, thread):
197 if verbose: print("waiting for server")
198 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000199 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000200 thread.join()
201 if verbose: print("done")
202
203 @contextmanager
204 def reaped_server(self, hdlr):
205 server, thread = self.make_server((support.HOST, 0), hdlr)
206 try:
207 yield server
208 finally:
209 self.reap_server(server, thread)
210
R David Murray774a39f2013-02-19 12:17:31 -0500211 @contextmanager
212 def reaped_pair(self, hdlr):
Charles-François Natali6c527cf2013-12-07 20:30:17 +0100213 with self.reaped_server(hdlr) as server:
214 client = self.imap_class(*server.server_address)
215 try:
216 yield server, client
217 finally:
218 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500219
R. David Murraye8dc2582009-12-10 02:08:06 +0000220 @reap_threads
221 def test_connect(self):
222 with self.reaped_server(SimpleIMAPHandler) as server:
223 client = self.imap_class(*server.server_address)
224 client.shutdown()
225
226 @reap_threads
227 def test_issue5949(self):
228
229 class EOFHandler(socketserver.StreamRequestHandler):
230 def handle(self):
231 # EOF without sending a complete welcome message.
232 self.wfile.write(b'* OK')
233
234 with self.reaped_server(EOFHandler) as server:
235 self.assertRaises(imaplib.IMAP4.abort,
236 self.imap_class, *server.server_address)
237
238 @reap_threads
239 def test_line_termination(self):
240
241 class BadNewlineHandler(SimpleIMAPHandler):
242
243 def cmd_CAPABILITY(self, tag, args):
244 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500245 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000246
247 with self.reaped_server(BadNewlineHandler) as server:
248 self.assertRaises(imaplib.IMAP4.abort,
249 self.imap_class, *server.server_address)
250
R David Murray774a39f2013-02-19 12:17:31 -0500251 @reap_threads
252 def test_bad_auth_name(self):
253
254 class MyServer(SimpleIMAPHandler):
255
256 def cmd_AUTHENTICATE(self, tag, args):
257 self._send_tagged(tag, 'NO', 'unrecognized authentication '
258 'type {}'.format(args[0]))
259
260 with self.reaped_pair(MyServer) as (server, client):
261 with self.assertRaises(imaplib.IMAP4.error):
262 client.authenticate('METHOD', lambda: 1)
263
264 @reap_threads
265 def test_invalid_authentication(self):
266
267 class MyServer(SimpleIMAPHandler):
268
269 def cmd_AUTHENTICATE(self, tag, args):
270 self._send_textline('+')
271 self.response = yield
272 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
273
274 with self.reaped_pair(MyServer) as (server, client):
275 with self.assertRaises(imaplib.IMAP4.error):
276 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
277
278 @reap_threads
279 def test_valid_authentication(self):
280
281 class MyServer(SimpleIMAPHandler):
282
283 def cmd_AUTHENTICATE(self, tag, args):
284 self._send_textline('+')
285 self.server.response = yield
286 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
287
288 with self.reaped_pair(MyServer) as (server, client):
289 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
290 self.assertEqual(code, 'OK')
291 self.assertEqual(server.response,
292 b'ZmFrZQ==\r\n') #b64 encoded 'fake'
293
294 with self.reaped_pair(MyServer) as (server, client):
295 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
296 self.assertEqual(code, 'OK')
297 self.assertEqual(server.response,
298 b'ZmFrZQ==\r\n') #b64 encoded 'fake'
299
300 @reap_threads
301 def test_login_cram_md5(self):
302
303 class AuthHandler(SimpleIMAPHandler):
304
305 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
306
307 def cmd_AUTHENTICATE(self, tag, args):
308 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
309 'VzdG9uLm1jaS5uZXQ=')
310 r = yield
311 if r == b'dGltIGYxY2E2YmU0NjRiOWVmYTFjY2E2ZmZkNmNmMmQ5ZjMy\r\n':
312 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
313 else:
314 self._send_tagged(tag, 'NO', 'No access')
315
316 with self.reaped_pair(AuthHandler) as (server, client):
317 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
318 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
319 self.assertEqual(ret, "OK")
320
321 with self.reaped_pair(AuthHandler) as (server, client):
322 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
323 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
324 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000325
326
Georg Brandlca580f42013-10-27 06:52:14 +0100327 def test_linetoolong(self):
328 class TooLongHandler(SimpleIMAPHandler):
329 def handle(self):
330 # Send a very long response line
331 self.wfile.write(b'* OK ' + imaplib._MAXLINE*b'x' + b'\r\n')
332
333 with self.reaped_server(TooLongHandler) as server:
334 self.assertRaises(imaplib.IMAP4.error,
335 self.imap_class, *server.server_address)
336
337
R. David Murraye8dc2582009-12-10 02:08:06 +0000338class ThreadedNetworkedTests(BaseThreadedNetworkedTests):
339
340 server_class = socketserver.TCPServer
341 imap_class = imaplib.IMAP4
342
343
344@unittest.skipUnless(ssl, "SSL not available")
345class ThreadedNetworkedTestsSSL(BaseThreadedNetworkedTests):
346
347 server_class = SecureTCPServer
348 imap_class = IMAP4_SSL
349
350
Antoine Pitroub1436f12010-11-09 22:55:55 +0000351class RemoteIMAPTest(unittest.TestCase):
352 host = 'cyrus.andrew.cmu.edu'
353 port = 143
354 username = 'anonymous'
355 password = 'pass'
356 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000357
Antoine Pitroub1436f12010-11-09 22:55:55 +0000358 def setUp(self):
359 with transient_internet(self.host):
360 self.server = self.imap_class(self.host, self.port)
361
362 def tearDown(self):
363 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100364 with transient_internet(self.host):
365 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000366
367 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100368 with transient_internet(self.host):
369 for cap in self.server.capabilities:
370 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000371 self.assertIn('LOGINDISABLED', self.server.capabilities)
372 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100373 rs = self.server.login(self.username, self.password)
374 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000375
376 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100377 with transient_internet(self.host):
378 rs = self.server.logout()
379 self.server = None
380 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000381
382
383@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000384class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
385
386 def setUp(self):
387 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100388 with transient_internet(self.host):
389 rs = self.server.starttls()
390 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000391
392 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000393 for cap in self.server.capabilities:
394 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000395 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000396
397
398@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000399class RemoteIMAP_SSLTest(RemoteIMAPTest):
400 port = 993
401 imap_class = IMAP4_SSL
402
Antoine Pitrou08728162011-05-06 18:49:52 +0200403 def setUp(self):
404 pass
405
406 def tearDown(self):
407 pass
408
409 def create_ssl_context(self):
410 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
411 ssl_context.load_cert_chain(CERTFILE)
412 return ssl_context
413
414 def check_logincapa(self, server):
415 try:
416 for cap in server.capabilities:
417 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000418 self.assertNotIn('LOGINDISABLED', server.capabilities)
419 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200420 rs = server.login(self.username, self.password)
421 self.assertEqual(rs[0], 'OK')
422 finally:
423 server.logout()
424
Antoine Pitroub1436f12010-11-09 22:55:55 +0000425 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200426 with transient_internet(self.host):
427 _server = self.imap_class(self.host, self.port)
428 self.check_logincapa(_server)
429
430 def test_logincapa_with_client_certfile(self):
431 with transient_internet(self.host):
432 _server = self.imap_class(self.host, self.port, certfile=CERTFILE)
433 self.check_logincapa(_server)
434
435 def test_logincapa_with_client_ssl_context(self):
436 with transient_internet(self.host):
437 _server = self.imap_class(self.host, self.port, ssl_context=self.create_ssl_context())
438 self.check_logincapa(_server)
439
440 def test_logout(self):
441 with transient_internet(self.host):
442 _server = self.imap_class(self.host, self.port)
443 rs = _server.logout()
444 self.assertEqual(rs[0], 'BYE')
445
446 def test_ssl_context_certfile_exclusive(self):
447 with transient_internet(self.host):
448 self.assertRaises(ValueError, self.imap_class, self.host, self.port,
449 certfile=CERTFILE, ssl_context=self.create_ssl_context())
450
451 def test_ssl_context_keyfile_exclusive(self):
452 with transient_internet(self.host):
453 self.assertRaises(ValueError, self.imap_class, self.host, self.port,
454 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitroub1436f12010-11-09 22:55:55 +0000455
456
Ezio Melotti02bf7012013-03-02 14:25:56 +0200457def load_tests(*args):
R. David Murraye8dc2582009-12-10 02:08:06 +0000458 tests = [TestImaplib]
459
460 if support.is_resource_enabled('network'):
461 if ssl:
462 global CERTFILE
463 CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir,
464 "keycert.pem")
465 if not os.path.exists(CERTFILE):
466 raise support.TestFailed("Can't read certificate files!")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000467 tests.extend([
468 ThreadedNetworkedTests, ThreadedNetworkedTestsSSL,
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000469 RemoteIMAPTest, RemoteIMAP_SSLTest, RemoteIMAP_STARTTLSTest,
Antoine Pitroub1436f12010-11-09 22:55:55 +0000470 ])
R. David Murraye8dc2582009-12-10 02:08:06 +0000471
Ezio Melotti02bf7012013-03-02 14:25:56 +0200472 return unittest.TestSuite([unittest.makeSuite(test) for test in tests])
Christian Heimesf6cd9672008-03-26 13:45:42 +0000473
474
475if __name__ == "__main__":
R. David Murraye8dc2582009-12-10 02:08:06 +0000476 support.use_resources = ['network']
Ezio Melotti02bf7012013-03-02 14:25:56 +0200477 unittest.main()