blob: f93efba7949526425e39e31b306f3ecc6eb14ff6 [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
Serhiy Storchaka16994912020-04-25 10:06:29 +03002from test.support import socket_helper
R. David Murraye8dc2582009-12-10 02:08:06 +00003
4from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00005import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00006import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +00007import socketserver
Tim Peters108b7912002-07-31 16:42:33 +00008import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +00009import calendar
Antoine Pitroua6a4dc82017-09-07 18:56:24 +020010import threading
Matěj Cepl3dc67d02019-02-12 19:30:19 +010011import socket
Martin v. Löwisea752fb2002-01-05 11:31:49 +000012
Hai Shie80697d2020-05-28 06:10:27 +080013from test.support import (verbose,
Hai Shi66abe982020-04-29 09:11:29 +080014 run_with_tz, run_with_locale, cpython_only)
15from test.support import hashlib_helper
Hai Shie80697d2020-05-28 06:10:27 +080016from test.support import threading_helper
Christian Heimesf6cd9672008-03-26 13:45:42 +000017import unittest
R David Murrayb079c072016-12-24 21:32:26 -050018from unittest import mock
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040019from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000020try:
21 import ssl
22except ImportError:
23 ssl = None
24
Antoine Pitroucac9e712014-07-31 18:35:45 -040025CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
26CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000027
Martin v. Löwisea752fb2002-01-05 11:31:49 +000028
Christian Heimesf6cd9672008-03-26 13:45:42 +000029class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000030
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000031 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000032 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000033 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000034 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
35 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000036 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000037 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
38 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000039 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000040 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
41 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000042
Alexander Belopolsky2420d832012-04-29 15:56:49 -040043 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
44 def test_Internaldate2tuple_issue10941(self):
45 self.assertNotEqual(imaplib.Internaldate2tuple(
46 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040047 imaplib.Internaldate2tuple(
48 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040049
50 def timevalues(self):
51 return [2000000000, 2000000000.0, time.localtime(2000000000),
52 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
53 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040054 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040055 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040056 '"18-May-2033 05:33:20 +0200"']
57
58 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
Martin Panter6e0889f2015-11-16 07:21:38 +000059 # DST rules included to work around quirk where the Gnu C library may not
60 # otherwise restore the previous time zone
61 @run_with_tz('STD-1DST,M3.2.0,M11.1.0')
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040062 def test_Time2Internaldate(self):
63 expected = '"18-May-2033 05:33:20 +0200"'
64
65 for t in self.timevalues():
66 internal = imaplib.Time2Internaldate(t)
67 self.assertEqual(internal, expected)
68
69 def test_that_Time2Internaldate_returns_a_result(self):
70 # Without tzset, we can check only that it successfully
71 # produces a result, not the correctness of the result itself,
72 # since the result depends on the timezone the machine is in.
73 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000074 imaplib.Time2Internaldate(t)
75
Berker Peksage4dcbbd2018-08-07 05:12:18 +030076 def test_imap4_host_default_value(self):
Matěj Cepl3dc67d02019-02-12 19:30:19 +010077 # Check whether the IMAP4_PORT is truly unavailable.
78 with socket.socket() as s:
79 try:
80 s.connect(('', imaplib.IMAP4_PORT))
81 self.skipTest(
82 "Cannot run the test with local IMAP server running.")
83 except socket.error:
84 pass
85
Victor Stinner3c7931e2019-04-15 12:34:53 +020086 # This is the exception that should be raised.
Serhiy Storchaka16994912020-04-25 10:06:29 +030087 expected_errnos = socket_helper.get_socket_conn_refused_errs()
Berker Peksage4dcbbd2018-08-07 05:12:18 +030088 with self.assertRaises(OSError) as cm:
89 imaplib.IMAP4()
90 self.assertIn(cm.exception.errno, expected_errnos)
91
Christian Heimesf6cd9672008-03-26 13:45:42 +000092
R. David Murraye8dc2582009-12-10 02:08:06 +000093if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000094 class SecureTCPServer(socketserver.TCPServer):
95
96 def get_request(self):
97 newsocket, fromaddr = self.socket.accept()
Christian Heimesd0486372016-09-10 23:23:33 +020098 context = ssl.SSLContext()
99 context.load_cert_chain(CERTFILE)
100 connstream = context.wrap_socket(newsocket, server_side=True)
R. David Murraye8dc2582009-12-10 02:08:06 +0000101 return connstream, fromaddr
102
103 IMAP4_SSL = imaplib.IMAP4_SSL
104
105else:
106
107 class SecureTCPServer:
108 pass
109
110 IMAP4_SSL = None
111
112
113class SimpleIMAPHandler(socketserver.StreamRequestHandler):
Victor Stinner07871b22019-12-10 20:32:59 +0100114 timeout = support.LOOPBACK_TIMEOUT
R David Murray774a39f2013-02-19 12:17:31 -0500115 continuation = None
116 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +0000117
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300118 def setup(self):
119 super().setup()
Dong-hee Nac5c42812020-04-27 23:52:55 +0900120 self.server.is_selected = False
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300121 self.server.logged = None
122
R. David Murraye8dc2582009-12-10 02:08:06 +0000123 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400124 if verbose:
125 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000126 self.wfile.write(message)
127
R David Murray774a39f2013-02-19 12:17:31 -0500128 def _send_line(self, message):
129 self._send(message + b'\r\n')
130
131 def _send_textline(self, message):
132 self._send_line(message.encode('ASCII'))
133
134 def _send_tagged(self, tag, code, message):
135 self._send_textline(' '.join((tag, code, message)))
136
R. David Murraye8dc2582009-12-10 02:08:06 +0000137 def handle(self):
138 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500139 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000140 while 1:
141 # Gather up input until we receive a line terminator or we timeout.
142 # Accumulate read(1) because it's simpler to handle the differences
143 # between naked sockets and SSL sockets.
144 line = b''
145 while 1:
146 try:
147 part = self.rfile.read(1)
148 if part == b'':
149 # Naked sockets return empty strings..
150 return
151 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200152 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200153 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000154 return
155 if line.endswith(b'\r\n'):
156 break
157
Antoine Pitroucac9e712014-07-31 18:35:45 -0400158 if verbose:
159 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500160 if self.continuation:
161 try:
162 self.continuation.send(line)
163 except StopIteration:
164 self.continuation = None
165 continue
166 splitline = line.decode('ASCII').split()
167 tag = splitline[0]
168 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000169 args = splitline[2:]
170
Antoine Pitroucac9e712014-07-31 18:35:45 -0400171 if hasattr(self, 'cmd_' + cmd):
172 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500173 if continuation:
174 self.continuation = continuation
175 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000176 else:
R David Murray774a39f2013-02-19 12:17:31 -0500177 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000178
179 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400180 caps = ('IMAP4rev1 ' + self.capabilities
181 if self.capabilities
182 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500183 self._send_textline('* CAPABILITY ' + caps)
184 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
185
186 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300187 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500188 self._send_textline('* BYE IMAP4ref1 Server logging out')
189 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000190
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300191 def cmd_LOGIN(self, tag, args):
192 self.server.logged = args[0]
193 self._send_tagged(tag, 'OK', 'LOGIN completed')
194
Dong-hee Nac5c42812020-04-27 23:52:55 +0900195 def cmd_SELECT(self, tag, args):
196 self.server.is_selected = True
197 self._send_line(b'* 2 EXISTS')
198 self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
199
200 def cmd_UNSELECT(self, tag, args):
201 if self.server.is_selected:
202 self.server.is_selected = False
203 self._send_tagged(tag, 'OK', 'Returned to authenticated state. (Success)')
204 else:
205 self._send_tagged(tag, 'BAD', 'No mailbox selected')
206
R. David Murraye8dc2582009-12-10 02:08:06 +0000207
R David Murrayb079c072016-12-24 21:32:26 -0500208class NewIMAPTestsMixin():
209 client = None
210
211 def _setup(self, imap_handler, connect=True):
212 """
213 Sets up imap_handler for tests. imap_handler should inherit from either:
214 - SimpleIMAPHandler - for testing IMAP commands,
215 - socketserver.StreamRequestHandler - if raw access to stream is needed.
216 Returns (client, server).
217 """
218 class TestTCPServer(self.server_class):
219 def handle_error(self, request, client_address):
220 """
221 End request and raise the error if one occurs.
222 """
223 self.close_request(request)
224 self.server_close()
225 raise
226
227 self.addCleanup(self._cleanup)
Serhiy Storchaka16994912020-04-25 10:06:29 +0300228 self.server = self.server_class((socket_helper.HOST, 0), imap_handler)
R David Murrayb079c072016-12-24 21:32:26 -0500229 self.thread = threading.Thread(
230 name=self._testMethodName+'-server',
231 target=self.server.serve_forever,
232 # Short poll interval to make the test finish quickly.
233 # Time between requests is short enough that we won't wake
234 # up spuriously too many times.
235 kwargs={'poll_interval': 0.01})
236 self.thread.daemon = True # In case this function raises.
237 self.thread.start()
238
239 if connect:
240 self.client = self.imap_class(*self.server.server_address)
241
242 return self.client, self.server
243
244 def _cleanup(self):
245 """
246 Cleans up the test server. This method should not be called manually,
247 it is added to the cleanup queue in the _setup method already.
248 """
249 # if logout was called already we'd raise an exception trying to
250 # shutdown the client once again
251 if self.client is not None and self.client.state != 'LOGOUT':
252 self.client.shutdown()
253 # cleanup the server
254 self.server.shutdown()
255 self.server.server_close()
Hai Shie80697d2020-05-28 06:10:27 +0800256 threading_helper.join_thread(self.thread)
Victor Stinnerb9b69002017-09-14 14:40:56 -0700257 # Explicitly clear the attribute to prevent dangling thread
258 self.thread = None
R David Murrayb079c072016-12-24 21:32:26 -0500259
260 def test_EOF_without_complete_welcome_message(self):
261 # http://bugs.python.org/issue5949
262 class EOFHandler(socketserver.StreamRequestHandler):
263 def handle(self):
264 self.wfile.write(b'* OK')
265 _, server = self._setup(EOFHandler, connect=False)
266 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
267 *server.server_address)
268
269 def test_line_termination(self):
270 class BadNewlineHandler(SimpleIMAPHandler):
271 def cmd_CAPABILITY(self, tag, args):
272 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
273 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
274 _, server = self._setup(BadNewlineHandler, connect=False)
275 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
276 *server.server_address)
277
278 def test_enable_raises_error_if_not_AUTH(self):
279 class EnableHandler(SimpleIMAPHandler):
280 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
281 client, _ = self._setup(EnableHandler)
282 self.assertFalse(client.utf8_enabled)
283 with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
284 client.enable('foo')
285 self.assertFalse(client.utf8_enabled)
286
287 def test_enable_raises_error_if_no_capability(self):
288 client, _ = self._setup(SimpleIMAPHandler)
289 with self.assertRaisesRegex(imaplib.IMAP4.error,
290 'does not support ENABLE'):
291 client.enable('foo')
292
293 def test_enable_UTF8_raises_error_if_not_supported(self):
294 client, _ = self._setup(SimpleIMAPHandler)
295 typ, data = client.login('user', 'pass')
296 self.assertEqual(typ, 'OK')
297 with self.assertRaisesRegex(imaplib.IMAP4.error,
298 'does not support ENABLE'):
299 client.enable('UTF8=ACCEPT')
300
301 def test_enable_UTF8_True_append(self):
302 class UTF8AppendServer(SimpleIMAPHandler):
303 capabilities = 'ENABLE UTF8=ACCEPT'
304 def cmd_ENABLE(self, tag, args):
305 self._send_tagged(tag, 'OK', 'ENABLE successful')
306 def cmd_AUTHENTICATE(self, tag, args):
307 self._send_textline('+')
308 self.server.response = yield
309 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
310 def cmd_APPEND(self, tag, args):
311 self._send_textline('+')
312 self.server.response = yield
313 self._send_tagged(tag, 'OK', 'okay')
314 client, server = self._setup(UTF8AppendServer)
315 self.assertEqual(client._encoding, 'ascii')
316 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
317 self.assertEqual(code, 'OK')
318 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
319 code, _ = client.enable('UTF8=ACCEPT')
320 self.assertEqual(code, 'OK')
321 self.assertEqual(client._encoding, 'utf-8')
322 msg_string = 'Subject: üñí©öðé'
323 typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
324 self.assertEqual(typ, 'OK')
325 self.assertEqual(server.response,
326 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
327
328 def test_search_disallows_charset_in_utf8_mode(self):
329 class UTF8Server(SimpleIMAPHandler):
330 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
331 def cmd_ENABLE(self, tag, args):
332 self._send_tagged(tag, 'OK', 'ENABLE successful')
333 def cmd_AUTHENTICATE(self, tag, args):
334 self._send_textline('+')
335 self.server.response = yield
336 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
337 client, _ = self._setup(UTF8Server)
338 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
339 self.assertEqual(typ, 'OK')
340 typ, _ = client.enable('UTF8=ACCEPT')
341 self.assertEqual(typ, 'OK')
342 self.assertTrue(client.utf8_enabled)
343 with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
344 client.search('foo', 'bar')
345
346 def test_bad_auth_name(self):
347 class MyServer(SimpleIMAPHandler):
348 def cmd_AUTHENTICATE(self, tag, args):
349 self._send_tagged(tag, 'NO',
350 'unrecognized authentication type {}'.format(args[0]))
351 client, _ = self._setup(MyServer)
352 with self.assertRaisesRegex(imaplib.IMAP4.error,
353 'unrecognized authentication type METHOD'):
354 client.authenticate('METHOD', lambda: 1)
355
356 def test_invalid_authentication(self):
357 class MyServer(SimpleIMAPHandler):
358 def cmd_AUTHENTICATE(self, tag, args):
359 self._send_textline('+')
360 self.response = yield
361 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
362 client, _ = self._setup(MyServer)
363 with self.assertRaisesRegex(imaplib.IMAP4.error,
364 r'\[AUTHENTICATIONFAILED\] invalid'):
365 client.authenticate('MYAUTH', lambda x: b'fake')
366
367 def test_valid_authentication_bytes(self):
368 class MyServer(SimpleIMAPHandler):
369 def cmd_AUTHENTICATE(self, tag, args):
370 self._send_textline('+')
371 self.server.response = yield
372 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
373 client, server = self._setup(MyServer)
374 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
375 self.assertEqual(code, 'OK')
376 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
377
378 def test_valid_authentication_plain_text(self):
379 class MyServer(SimpleIMAPHandler):
380 def cmd_AUTHENTICATE(self, tag, args):
381 self._send_textline('+')
382 self.server.response = yield
383 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
384 client, server = self._setup(MyServer)
385 code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
386 self.assertEqual(code, 'OK')
387 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
388
Hai Shi66abe982020-04-29 09:11:29 +0800389 @hashlib_helper.requires_hashdigest('md5')
R David Murrayb079c072016-12-24 21:32:26 -0500390 def test_login_cram_md5_bytes(self):
391 class AuthHandler(SimpleIMAPHandler):
392 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
393 def cmd_AUTHENTICATE(self, tag, args):
394 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
395 'VzdG9uLm1jaS5uZXQ=')
396 r = yield
397 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
398 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
399 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
400 else:
401 self._send_tagged(tag, 'NO', 'No access')
402 client, _ = self._setup(AuthHandler)
403 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
404 ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
405 self.assertEqual(ret, "OK")
406
Hai Shi66abe982020-04-29 09:11:29 +0800407 @hashlib_helper.requires_hashdigest('md5')
R David Murrayb079c072016-12-24 21:32:26 -0500408 def test_login_cram_md5_plain_text(self):
409 class AuthHandler(SimpleIMAPHandler):
410 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
411 def cmd_AUTHENTICATE(self, tag, args):
412 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
413 'VzdG9uLm1jaS5uZXQ=')
414 r = yield
415 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
416 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
417 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
418 else:
419 self._send_tagged(tag, 'NO', 'No access')
420 client, _ = self._setup(AuthHandler)
421 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
422 ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
423 self.assertEqual(ret, "OK")
424
425 def test_aborted_authentication(self):
426 class MyServer(SimpleIMAPHandler):
427 def cmd_AUTHENTICATE(self, tag, args):
428 self._send_textline('+')
429 self.response = yield
430 if self.response == b'*\r\n':
431 self._send_tagged(
432 tag,
433 'NO',
434 '[AUTHENTICATIONFAILED] aborted')
435 else:
436 self._send_tagged(tag, 'OK', 'MYAUTH successful')
437 client, _ = self._setup(MyServer)
438 with self.assertRaisesRegex(imaplib.IMAP4.error,
439 r'\[AUTHENTICATIONFAILED\] aborted'):
440 client.authenticate('MYAUTH', lambda x: None)
441
442 @mock.patch('imaplib._MAXLINE', 10)
443 def test_linetoolong(self):
444 class TooLongHandler(SimpleIMAPHandler):
445 def handle(self):
446 # send response line longer than the limit set in the next line
447 self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
448 _, server = self._setup(TooLongHandler, connect=False)
449 with self.assertRaisesRegex(imaplib.IMAP4.error,
450 'got more than 10 bytes'):
451 self.imap_class(*server.server_address)
452
453 def test_simple_with_statement(self):
454 _, server = self._setup(SimpleIMAPHandler, connect=False)
455 with self.imap_class(*server.server_address):
456 pass
457
Dong-hee Na13a7ee82020-01-08 02:28:10 +0900458 def test_imaplib_timeout_test(self):
459 _, server = self._setup(SimpleIMAPHandler)
460 addr = server.server_address[1]
461 client = self.imap_class("localhost", addr, timeout=None)
462 self.assertEqual(client.sock.timeout, None)
463 client.shutdown()
464 client = self.imap_class("localhost", addr, timeout=support.LOOPBACK_TIMEOUT)
465 self.assertEqual(client.sock.timeout, support.LOOPBACK_TIMEOUT)
466 client.shutdown()
467 with self.assertRaises(ValueError):
468 client = self.imap_class("localhost", addr, timeout=0)
469
470 def test_imaplib_timeout_functionality_test(self):
471 class TimeoutHandler(SimpleIMAPHandler):
472 def handle(self):
473 time.sleep(1)
474 SimpleIMAPHandler.handle(self)
475
476 _, server = self._setup(TimeoutHandler)
477 addr = server.server_address[1]
478 with self.assertRaises(socket.timeout):
479 client = self.imap_class("localhost", addr, timeout=0.001)
480
R David Murrayb079c072016-12-24 21:32:26 -0500481 def test_with_statement(self):
482 _, server = self._setup(SimpleIMAPHandler, connect=False)
483 with self.imap_class(*server.server_address) as imap:
484 imap.login('user', 'pass')
485 self.assertEqual(server.logged, 'user')
486 self.assertIsNone(server.logged)
487
488 def test_with_statement_logout(self):
489 # It is legal to log out explicitly inside the with block
490 _, server = self._setup(SimpleIMAPHandler, connect=False)
491 with self.imap_class(*server.server_address) as imap:
492 imap.login('user', 'pass')
493 self.assertEqual(server.logged, 'user')
494 imap.logout()
495 self.assertIsNone(server.logged)
496 self.assertIsNone(server.logged)
497
498 # command tests
499
500 def test_login(self):
501 client, _ = self._setup(SimpleIMAPHandler)
502 typ, data = client.login('user', 'pass')
503 self.assertEqual(typ, 'OK')
504 self.assertEqual(data[0], b'LOGIN completed')
505 self.assertEqual(client.state, 'AUTH')
506
507 def test_logout(self):
508 client, _ = self._setup(SimpleIMAPHandler)
509 typ, data = client.login('user', 'pass')
510 self.assertEqual(typ, 'OK')
511 self.assertEqual(data[0], b'LOGIN completed')
512 typ, data = client.logout()
Victor Stinner74125a62019-04-15 18:23:20 +0200513 self.assertEqual(typ, 'BYE', (typ, data))
514 self.assertEqual(data[0], b'IMAP4ref1 Server logging out', (typ, data))
R David Murrayb079c072016-12-24 21:32:26 -0500515 self.assertEqual(client.state, 'LOGOUT')
516
517 def test_lsub(self):
518 class LsubCmd(SimpleIMAPHandler):
519 def cmd_LSUB(self, tag, args):
520 self._send_textline('* LSUB () "." directoryA')
521 return self._send_tagged(tag, 'OK', 'LSUB completed')
522 client, _ = self._setup(LsubCmd)
523 client.login('user', 'pass')
524 typ, data = client.lsub()
525 self.assertEqual(typ, 'OK')
526 self.assertEqual(data[0], b'() "." directoryA')
527
Dong-hee Nac5c42812020-04-27 23:52:55 +0900528 def test_unselect(self):
529 client, _ = self._setup(SimpleIMAPHandler)
530 client.login('user', 'pass')
531 typ, data = client.select()
532 self.assertEqual(typ, 'OK')
533 self.assertEqual(data[0], b'2')
534
535 typ, data = client.unselect()
536 self.assertEqual(typ, 'OK')
537 self.assertEqual(data[0], b'Returned to authenticated state. (Success)')
538 self.assertEqual(client.state, 'AUTH')
539
R David Murrayb079c072016-12-24 21:32:26 -0500540
541class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
542 imap_class = imaplib.IMAP4
543 server_class = socketserver.TCPServer
544
545
546@unittest.skipUnless(ssl, "SSL not available")
547class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
Victor Stinnerde383282017-01-12 11:51:31 +0100548 imap_class = IMAP4_SSL
R David Murrayb079c072016-12-24 21:32:26 -0500549 server_class = SecureTCPServer
550
551 def test_ssl_raises(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200552 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
553 self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
554 self.assertEqual(ssl_context.check_hostname, True)
R David Murrayb079c072016-12-24 21:32:26 -0500555 ssl_context.load_verify_locations(CAFILE)
556
557 with self.assertRaisesRegex(ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100558 "IP address mismatch, certificate is not valid for "
559 "'127.0.0.1'"):
R David Murrayb079c072016-12-24 21:32:26 -0500560 _, server = self._setup(SimpleIMAPHandler)
561 client = self.imap_class(*server.server_address,
562 ssl_context=ssl_context)
563 client.shutdown()
564
565 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200566 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
R David Murrayb079c072016-12-24 21:32:26 -0500567 ssl_context.load_verify_locations(CAFILE)
568
569 _, server = self._setup(SimpleIMAPHandler)
570 client = self.imap_class("localhost", server.server_address[1],
571 ssl_context=ssl_context)
572 client.shutdown()
573
Victor Stinnerb18563d2017-06-14 18:48:32 +0200574 # Mock the private method _connect(), so mark the test as specific
575 # to CPython stdlib
576 @cpython_only
577 def test_certfile_arg_warn(self):
578 with support.check_warnings(('', DeprecationWarning)):
579 with mock.patch.object(self.imap_class, 'open'):
580 with mock.patch.object(self.imap_class, '_connect'):
581 self.imap_class('localhost', 143, certfile=CERTFILE)
582
Antoine Pitroucac9e712014-07-31 18:35:45 -0400583class ThreadedNetworkedTests(unittest.TestCase):
584 server_class = socketserver.TCPServer
585 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000586
587 def make_server(self, addr, hdlr):
588
589 class MyServer(self.server_class):
590 def handle_error(self, request, client_address):
591 self.close_request(request)
592 self.server_close()
593 raise
594
Antoine Pitroucac9e712014-07-31 18:35:45 -0400595 if verbose:
596 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000597 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000598 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000599
600 if verbose:
601 print("server created")
602 print("ADDR =", addr)
603 print("CLASS =", self.server_class)
604 print("HDLR =", server.RequestHandlerClass)
605
606 t = threading.Thread(
607 name='%s serving' % self.server_class,
608 target=server.serve_forever,
609 # Short poll interval to make the test finish quickly.
610 # Time between requests is short enough that we won't wake
611 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400612 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000613 t.daemon = True # In case this function raises.
614 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400615 if verbose:
616 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000617 return server, t
618
619 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400620 if verbose:
621 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000622 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000623 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000624 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400625 if verbose:
626 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000627
628 @contextmanager
629 def reaped_server(self, hdlr):
Serhiy Storchaka16994912020-04-25 10:06:29 +0300630 server, thread = self.make_server((socket_helper.HOST, 0), hdlr)
R. David Murraye8dc2582009-12-10 02:08:06 +0000631 try:
632 yield server
633 finally:
634 self.reap_server(server, thread)
635
R David Murray774a39f2013-02-19 12:17:31 -0500636 @contextmanager
637 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100638 with self.reaped_server(hdlr) as server:
639 client = self.imap_class(*server.server_address)
640 try:
641 yield server, client
642 finally:
643 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500644
Hai Shie80697d2020-05-28 06:10:27 +0800645 @threading_helper.reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000646 def test_connect(self):
647 with self.reaped_server(SimpleIMAPHandler) as server:
648 client = self.imap_class(*server.server_address)
649 client.shutdown()
650
Hai Shie80697d2020-05-28 06:10:27 +0800651 @threading_helper.reap_threads
R David Murray317f64f2016-01-02 17:18:34 -0500652 def test_bracket_flags(self):
653
654 # This violates RFC 3501, which disallows ']' characters in tag names,
655 # but imaplib has allowed producing such tags forever, other programs
656 # also produce them (eg: OtherInbox's Organizer app as of 20140716),
657 # and Gmail, for example, accepts them and produces them. So we
658 # support them. See issue #21815.
659
660 class BracketFlagHandler(SimpleIMAPHandler):
661
662 def handle(self):
663 self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
664 super().handle()
665
666 def cmd_AUTHENTICATE(self, tag, args):
667 self._send_textline('+')
668 self.server.response = yield
669 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
670
671 def cmd_SELECT(self, tag, args):
672 flag_msg = ' \\'.join(self.flags)
673 self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
674 self._send_line(b'* 2 EXISTS')
675 self._send_line(b'* 0 RECENT')
676 msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
677 % flag_msg)
678 self._send_line(msg.encode('ascii'))
679 self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
680
681 def cmd_STORE(self, tag, args):
682 new_flags = args[2].strip('(').strip(')').split()
683 self.flags.extend(new_flags)
684 flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
685 msg = '* %s FETCH %s' % (args[0], flags_msg)
686 self._send_line(msg.encode('ascii'))
687 self._send_tagged(tag, 'OK', 'STORE completed.')
688
689 with self.reaped_pair(BracketFlagHandler) as (server, client):
690 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
691 self.assertEqual(code, 'OK')
692 self.assertEqual(server.response, b'ZmFrZQ==\r\n')
693 client.select('test')
694 typ, [data] = client.store(b'1', "+FLAGS", "[test]")
695 self.assertIn(b'[test]', data)
696 client.select('test')
697 typ, [data] = client.response('PERMANENTFLAGS')
698 self.assertIn(b'[test]', data)
699
Hai Shie80697d2020-05-28 06:10:27 +0800700 @threading_helper.reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000701 def test_issue5949(self):
702
703 class EOFHandler(socketserver.StreamRequestHandler):
704 def handle(self):
705 # EOF without sending a complete welcome message.
706 self.wfile.write(b'* OK')
707
708 with self.reaped_server(EOFHandler) as server:
709 self.assertRaises(imaplib.IMAP4.abort,
710 self.imap_class, *server.server_address)
711
Hai Shie80697d2020-05-28 06:10:27 +0800712 @threading_helper.reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000713 def test_line_termination(self):
714
715 class BadNewlineHandler(SimpleIMAPHandler):
716
717 def cmd_CAPABILITY(self, tag, args):
718 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500719 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000720
721 with self.reaped_server(BadNewlineHandler) as server:
722 self.assertRaises(imaplib.IMAP4.abort,
723 self.imap_class, *server.server_address)
724
R David Murraya6429db2015-05-10 19:17:23 -0400725 class UTF8Server(SimpleIMAPHandler):
726 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
727
728 def cmd_ENABLE(self, tag, args):
729 self._send_tagged(tag, 'OK', 'ENABLE successful')
730
731 def cmd_AUTHENTICATE(self, tag, args):
732 self._send_textline('+')
733 self.server.response = yield
734 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
735
Hai Shie80697d2020-05-28 06:10:27 +0800736 @threading_helper.reap_threads
R David Murraya6429db2015-05-10 19:17:23 -0400737 def test_enable_raises_error_if_not_AUTH(self):
738 with self.reaped_pair(self.UTF8Server) as (server, client):
739 self.assertFalse(client.utf8_enabled)
740 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
741 self.assertFalse(client.utf8_enabled)
742
743 # XXX Also need a test that enable after SELECT raises an error.
744
Hai Shie80697d2020-05-28 06:10:27 +0800745 @threading_helper.reap_threads
R David Murraya6429db2015-05-10 19:17:23 -0400746 def test_enable_raises_error_if_no_capability(self):
747 class NoEnableServer(self.UTF8Server):
748 capabilities = 'AUTH'
749 with self.reaped_pair(NoEnableServer) as (server, client):
750 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
751
Hai Shie80697d2020-05-28 06:10:27 +0800752 @threading_helper.reap_threads
R David Murraya6429db2015-05-10 19:17:23 -0400753 def test_enable_UTF8_raises_error_if_not_supported(self):
754 class NonUTF8Server(SimpleIMAPHandler):
755 pass
756 with self.assertRaises(imaplib.IMAP4.error):
757 with self.reaped_pair(NonUTF8Server) as (server, client):
758 typ, data = client.login('user', 'pass')
759 self.assertEqual(typ, 'OK')
760 client.enable('UTF8=ACCEPT')
761 pass
762
Hai Shie80697d2020-05-28 06:10:27 +0800763 @threading_helper.reap_threads
R David Murraya6429db2015-05-10 19:17:23 -0400764 def test_enable_UTF8_True_append(self):
765
766 class UTF8AppendServer(self.UTF8Server):
767 def cmd_APPEND(self, tag, args):
768 self._send_textline('+')
769 self.server.response = yield
770 self._send_tagged(tag, 'OK', 'okay')
771
772 with self.reaped_pair(UTF8AppendServer) as (server, client):
773 self.assertEqual(client._encoding, 'ascii')
774 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
775 self.assertEqual(code, 'OK')
776 self.assertEqual(server.response,
777 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
778 code, _ = client.enable('UTF8=ACCEPT')
779 self.assertEqual(code, 'OK')
780 self.assertEqual(client._encoding, 'utf-8')
781 msg_string = 'Subject: üñí©öðé'
782 typ, data = client.append(
783 None, None, None, msg_string.encode('utf-8'))
784 self.assertEqual(typ, 'OK')
785 self.assertEqual(
786 server.response,
787 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
788 )
789
790 # XXX also need a test that makes sure that the Literal and Untagged_status
791 # regexes uses unicode in UTF8 mode instead of the default ASCII.
792
Hai Shie80697d2020-05-28 06:10:27 +0800793 @threading_helper.reap_threads
R David Murraya6429db2015-05-10 19:17:23 -0400794 def test_search_disallows_charset_in_utf8_mode(self):
795 with self.reaped_pair(self.UTF8Server) as (server, client):
796 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
797 self.assertEqual(typ, 'OK')
798 typ, _ = client.enable('UTF8=ACCEPT')
799 self.assertEqual(typ, 'OK')
800 self.assertTrue(client.utf8_enabled)
801 self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
802
Hai Shie80697d2020-05-28 06:10:27 +0800803 @threading_helper.reap_threads
R David Murray774a39f2013-02-19 12:17:31 -0500804 def test_bad_auth_name(self):
805
806 class MyServer(SimpleIMAPHandler):
807
808 def cmd_AUTHENTICATE(self, tag, args):
809 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400810 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500811
812 with self.reaped_pair(MyServer) as (server, client):
813 with self.assertRaises(imaplib.IMAP4.error):
814 client.authenticate('METHOD', lambda: 1)
815
Hai Shie80697d2020-05-28 06:10:27 +0800816 @threading_helper.reap_threads
R David Murray774a39f2013-02-19 12:17:31 -0500817 def test_invalid_authentication(self):
818
819 class MyServer(SimpleIMAPHandler):
820
821 def cmd_AUTHENTICATE(self, tag, args):
822 self._send_textline('+')
823 self.response = yield
824 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
825
826 with self.reaped_pair(MyServer) as (server, client):
827 with self.assertRaises(imaplib.IMAP4.error):
828 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
829
Hai Shie80697d2020-05-28 06:10:27 +0800830 @threading_helper.reap_threads
R David Murray774a39f2013-02-19 12:17:31 -0500831 def test_valid_authentication(self):
832
833 class MyServer(SimpleIMAPHandler):
834
835 def cmd_AUTHENTICATE(self, tag, args):
836 self._send_textline('+')
837 self.server.response = yield
838 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
839
840 with self.reaped_pair(MyServer) as (server, client):
841 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
842 self.assertEqual(code, 'OK')
843 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400844 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500845
846 with self.reaped_pair(MyServer) as (server, client):
847 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
848 self.assertEqual(code, 'OK')
849 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400850 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500851
Hai Shie80697d2020-05-28 06:10:27 +0800852 @threading_helper.reap_threads
Hai Shi66abe982020-04-29 09:11:29 +0800853 @hashlib_helper.requires_hashdigest('md5')
R David Murray774a39f2013-02-19 12:17:31 -0500854 def test_login_cram_md5(self):
855
856 class AuthHandler(SimpleIMAPHandler):
857
858 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
859
860 def cmd_AUTHENTICATE(self, tag, args):
861 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400862 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500863 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400864 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
865 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500866 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
867 else:
868 self._send_tagged(tag, 'NO', 'No access')
869
870 with self.reaped_pair(AuthHandler) as (server, client):
871 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
872 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
873 self.assertEqual(ret, "OK")
874
875 with self.reaped_pair(AuthHandler) as (server, client):
876 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
877 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
878 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000879
880
Hai Shie80697d2020-05-28 06:10:27 +0800881 @threading_helper.reap_threads
Robert Collins5ccc18f2015-07-31 08:59:02 +1200882 def test_aborted_authentication(self):
883
884 class MyServer(SimpleIMAPHandler):
885
886 def cmd_AUTHENTICATE(self, tag, args):
887 self._send_textline('+')
888 self.response = yield
889
890 if self.response == b'*\r\n':
891 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
892 else:
893 self._send_tagged(tag, 'OK', 'MYAUTH successful')
894
895 with self.reaped_pair(MyServer) as (server, client):
896 with self.assertRaises(imaplib.IMAP4.error):
897 code, data = client.authenticate('MYAUTH', lambda x: None)
898
Robert Collins78378e82015-07-31 09:01:38 +1200899
Georg Brandlca580f42013-10-27 06:52:14 +0100900 def test_linetoolong(self):
901 class TooLongHandler(SimpleIMAPHandler):
902 def handle(self):
903 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400904 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100905
906 with self.reaped_server(TooLongHandler) as server:
907 self.assertRaises(imaplib.IMAP4.error,
908 self.imap_class, *server.server_address)
909
Hai Shie80697d2020-05-28 06:10:27 +0800910 @threading_helper.reap_threads
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300911 def test_simple_with_statement(self):
912 # simplest call
913 with self.reaped_server(SimpleIMAPHandler) as server:
914 with self.imap_class(*server.server_address):
915 pass
916
Hai Shie80697d2020-05-28 06:10:27 +0800917 @threading_helper.reap_threads
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300918 def test_with_statement(self):
919 with self.reaped_server(SimpleIMAPHandler) as server:
920 with self.imap_class(*server.server_address) as imap:
921 imap.login('user', 'pass')
922 self.assertEqual(server.logged, 'user')
923 self.assertIsNone(server.logged)
924
Hai Shie80697d2020-05-28 06:10:27 +0800925 @threading_helper.reap_threads
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300926 def test_with_statement_logout(self):
927 # what happens if already logout in the block?
928 with self.reaped_server(SimpleIMAPHandler) as server:
929 with self.imap_class(*server.server_address) as imap:
930 imap.login('user', 'pass')
931 self.assertEqual(server.logged, 'user')
932 imap.logout()
933 self.assertIsNone(server.logged)
934 self.assertIsNone(server.logged)
935
Sanyam Khurana8a3d2af2020-06-02 06:47:45 +0530936 @threading_helper.reap_threads
937 @cpython_only
938 def test_dump_ur(self):
939 # See: http://bugs.python.org/issue26543
940 untagged_resp_dict = {'READ-WRITE': [b'']}
941
942 with self.reaped_server(SimpleIMAPHandler) as server:
943 with self.imap_class(*server.server_address) as imap:
944 with mock.patch.object(imap, '_mesg') as mock_mesg:
945 imap._dump_ur(untagged_resp_dict)
946 mock_mesg.assert_called_with(
947 "untagged responses dump:READ-WRITE: [b'']"
948 )
949
Georg Brandlca580f42013-10-27 06:52:14 +0100950
R. David Murraye8dc2582009-12-10 02:08:06 +0000951@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400952class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000953 server_class = SecureTCPServer
954 imap_class = IMAP4_SSL
955
Hai Shie80697d2020-05-28 06:10:27 +0800956 @threading_helper.reap_threads
Christian Heimes48aae572013-12-02 20:01:29 +0100957 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200958 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
Christian Heimes48aae572013-12-02 20:01:29 +0100959 ssl_context.load_verify_locations(CAFILE)
960
Antoine Pitroucac9e712014-07-31 18:35:45 -0400961 with self.assertRaisesRegex(
962 ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100963 "IP address mismatch, certificate is not valid for "
964 "'127.0.0.1'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100965 with self.reaped_server(SimpleIMAPHandler) as server:
966 client = self.imap_class(*server.server_address,
967 ssl_context=ssl_context)
968 client.shutdown()
969
970 with self.reaped_server(SimpleIMAPHandler) as server:
971 client = self.imap_class("localhost", server.server_address[1],
972 ssl_context=ssl_context)
973 client.shutdown()
974
R. David Murraye8dc2582009-12-10 02:08:06 +0000975
Antoine Pitroucac9e712014-07-31 18:35:45 -0400976@unittest.skipUnless(
977 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000978class RemoteIMAPTest(unittest.TestCase):
979 host = 'cyrus.andrew.cmu.edu'
980 port = 143
981 username = 'anonymous'
982 password = 'pass'
983 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000984
Antoine Pitroub1436f12010-11-09 22:55:55 +0000985 def setUp(self):
Serhiy Storchakabfb1cf42020-04-29 10:36:20 +0300986 with socket_helper.transient_internet(self.host):
Antoine Pitroub1436f12010-11-09 22:55:55 +0000987 self.server = self.imap_class(self.host, self.port)
988
989 def tearDown(self):
990 if self.server is not None:
Serhiy Storchakabfb1cf42020-04-29 10:36:20 +0300991 with socket_helper.transient_internet(self.host):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100992 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000993
994 def test_logincapa(self):
Serhiy Storchakabfb1cf42020-04-29 10:36:20 +0300995 with socket_helper.transient_internet(self.host):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100996 for cap in self.server.capabilities:
997 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000998 self.assertIn('LOGINDISABLED', self.server.capabilities)
999 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +01001000 rs = self.server.login(self.username, self.password)
1001 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +00001002
1003 def test_logout(self):
Serhiy Storchakabfb1cf42020-04-29 10:36:20 +03001004 with socket_helper.transient_internet(self.host):
Antoine Pitrou924cbea2011-03-23 03:10:14 +01001005 rs = self.server.logout()
1006 self.server = None
Victor Stinner74125a62019-04-15 18:23:20 +02001007 self.assertEqual(rs[0], 'BYE', rs)
Antoine Pitroub1436f12010-11-09 22:55:55 +00001008
1009
1010@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -04001011@unittest.skipUnless(
1012 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +00001013class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
1014
1015 def setUp(self):
1016 super().setUp()
Serhiy Storchakabfb1cf42020-04-29 10:36:20 +03001017 with socket_helper.transient_internet(self.host):
Antoine Pitrou924cbea2011-03-23 03:10:14 +01001018 rs = self.server.starttls()
1019 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +00001020
1021 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +00001022 for cap in self.server.capabilities:
1023 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +10001024 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +00001025
1026
1027@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +00001028class RemoteIMAP_SSLTest(RemoteIMAPTest):
1029 port = 993
1030 imap_class = IMAP4_SSL
1031
Antoine Pitrou08728162011-05-06 18:49:52 +02001032 def setUp(self):
1033 pass
1034
1035 def tearDown(self):
1036 pass
1037
1038 def create_ssl_context(self):
Christian Heimesa170fa12017-09-15 20:27:30 +02001039 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
1040 ssl_context.check_hostname = False
1041 ssl_context.verify_mode = ssl.CERT_NONE
Antoine Pitrou08728162011-05-06 18:49:52 +02001042 ssl_context.load_cert_chain(CERTFILE)
1043 return ssl_context
1044
1045 def check_logincapa(self, server):
1046 try:
1047 for cap in server.capabilities:
1048 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +10001049 self.assertNotIn('LOGINDISABLED', server.capabilities)
1050 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +02001051 rs = server.login(self.username, self.password)
1052 self.assertEqual(rs[0], 'OK')
1053 finally:
1054 server.logout()
1055
Antoine Pitroub1436f12010-11-09 22:55:55 +00001056 def test_logincapa(self):
Serhiy Storchakabfb1cf42020-04-29 10:36:20 +03001057 with socket_helper.transient_internet(self.host):
Antoine Pitrou08728162011-05-06 18:49:52 +02001058 _server = self.imap_class(self.host, self.port)
1059 self.check_logincapa(_server)
1060
Antoine Pitrou08728162011-05-06 18:49:52 +02001061 def test_logout(self):
Serhiy Storchakabfb1cf42020-04-29 10:36:20 +03001062 with socket_helper.transient_internet(self.host):
Antoine Pitrou08728162011-05-06 18:49:52 +02001063 _server = self.imap_class(self.host, self.port)
1064 rs = _server.logout()
Victor Stinner74125a62019-04-15 18:23:20 +02001065 self.assertEqual(rs[0], 'BYE', rs)
Antoine Pitrou08728162011-05-06 18:49:52 +02001066
1067 def test_ssl_context_certfile_exclusive(self):
Serhiy Storchakabfb1cf42020-04-29 10:36:20 +03001068 with socket_helper.transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001069 self.assertRaises(
1070 ValueError, self.imap_class, self.host, self.port,
1071 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +02001072
1073 def test_ssl_context_keyfile_exclusive(self):
Serhiy Storchakabfb1cf42020-04-29 10:36:20 +03001074 with socket_helper.transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001075 self.assertRaises(
1076 ValueError, self.imap_class, self.host, self.port,
1077 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +00001078
1079
1080if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +02001081 unittest.main()