blob: 6b29943ebda4bf3a9db40c5913269a3442e02c61 [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
2# If we end up with a significant number of tests that don't require
3# threading, this test module should be split. Right now we skip
4# them all if we don't have threading.
5threading = support.import_module('threading')
6
7from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00008import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00009import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +000010import socketserver
Tim Peters108b7912002-07-31 16:42:33 +000011import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000012import calendar
Martin v. Löwisea752fb2002-01-05 11:31:49 +000013
Alexander Belopolsky2420d832012-04-29 15:56:49 -040014from test.support import reap_threads, verbose, transient_internet, run_with_tz
Christian Heimesf6cd9672008-03-26 13:45:42 +000015import unittest
Piers Lauderf0a70f62002-06-17 07:06:24 +000016
R. David Murraye8dc2582009-12-10 02:08:06 +000017try:
18 import ssl
19except ImportError:
20 ssl = None
21
22CERTFILE = None
23
Martin v. Löwisea752fb2002-01-05 11:31:49 +000024
Christian Heimesf6cd9672008-03-26 13:45:42 +000025class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000026
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000027 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000028 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000029 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000030 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
31 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000032 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000033 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
34 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000035 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000036 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
37 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000038
Alexander Belopolsky2420d832012-04-29 15:56:49 -040039 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
40 def test_Internaldate2tuple_issue10941(self):
41 self.assertNotEqual(imaplib.Internaldate2tuple(
42 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
43 imaplib.Internaldate2tuple(
44 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
45
Christian Heimesf6cd9672008-03-26 13:45:42 +000046 def test_that_Time2Internaldate_returns_a_result(self):
47 # We can check only that it successfully produces a result,
48 # not the correctness of the result itself, since the result
49 # depends on the timezone the machine is in.
50 timevalues = [2000000000, 2000000000.0, time.localtime(2000000000),
51 '"18-May-2033 05:33:20 +0200"']
52
53 for t in timevalues:
54 imaplib.Time2Internaldate(t)
55
56
R. David Murraye8dc2582009-12-10 02:08:06 +000057if ssl:
58
59 class SecureTCPServer(socketserver.TCPServer):
60
61 def get_request(self):
62 newsocket, fromaddr = self.socket.accept()
63 connstream = ssl.wrap_socket(newsocket,
64 server_side=True,
65 certfile=CERTFILE)
66 return connstream, fromaddr
67
68 IMAP4_SSL = imaplib.IMAP4_SSL
69
70else:
71
72 class SecureTCPServer:
73 pass
74
75 IMAP4_SSL = None
76
77
78class SimpleIMAPHandler(socketserver.StreamRequestHandler):
79
80 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -050081 continuation = None
82 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +000083
84 def _send(self, message):
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +000085 if verbose: print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +000086 self.wfile.write(message)
87
R David Murray774a39f2013-02-19 12:17:31 -050088 def _send_line(self, message):
89 self._send(message + b'\r\n')
90
91 def _send_textline(self, message):
92 self._send_line(message.encode('ASCII'))
93
94 def _send_tagged(self, tag, code, message):
95 self._send_textline(' '.join((tag, code, message)))
96
R. David Murraye8dc2582009-12-10 02:08:06 +000097 def handle(self):
98 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -050099 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000100 while 1:
101 # Gather up input until we receive a line terminator or we timeout.
102 # Accumulate read(1) because it's simpler to handle the differences
103 # between naked sockets and SSL sockets.
104 line = b''
105 while 1:
106 try:
107 part = self.rfile.read(1)
108 if part == b'':
109 # Naked sockets return empty strings..
110 return
111 line += part
112 except IOError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200113 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000114 return
115 if line.endswith(b'\r\n'):
116 break
117
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +0000118 if verbose: print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500119 if self.continuation:
120 try:
121 self.continuation.send(line)
122 except StopIteration:
123 self.continuation = None
124 continue
125 splitline = line.decode('ASCII').split()
126 tag = splitline[0]
127 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000128 args = splitline[2:]
129
130 if hasattr(self, 'cmd_'+cmd):
R David Murray774a39f2013-02-19 12:17:31 -0500131 continuation = getattr(self, 'cmd_'+cmd)(tag, args)
132 if continuation:
133 self.continuation = continuation
134 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000135 else:
R David Murray774a39f2013-02-19 12:17:31 -0500136 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000137
138 def cmd_CAPABILITY(self, tag, args):
R David Murray774a39f2013-02-19 12:17:31 -0500139 caps = 'IMAP4rev1 ' + self.capabilities if self.capabilities else 'IMAP4rev1'
140 self._send_textline('* CAPABILITY ' + caps)
141 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
142
143 def cmd_LOGOUT(self, tag, args):
144 self._send_textline('* BYE IMAP4ref1 Server logging out')
145 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000146
147
148class BaseThreadedNetworkedTests(unittest.TestCase):
149
150 def make_server(self, addr, hdlr):
151
152 class MyServer(self.server_class):
153 def handle_error(self, request, client_address):
154 self.close_request(request)
155 self.server_close()
156 raise
157
158 if verbose: print("creating server")
159 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000160 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000161
162 if verbose:
163 print("server created")
164 print("ADDR =", addr)
165 print("CLASS =", self.server_class)
166 print("HDLR =", server.RequestHandlerClass)
167
168 t = threading.Thread(
169 name='%s serving' % self.server_class,
170 target=server.serve_forever,
171 # Short poll interval to make the test finish quickly.
172 # Time between requests is short enough that we won't wake
173 # up spuriously too many times.
174 kwargs={'poll_interval':0.01})
175 t.daemon = True # In case this function raises.
176 t.start()
177 if verbose: print("server running")
178 return server, t
179
180 def reap_server(self, server, thread):
181 if verbose: print("waiting for server")
182 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000183 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000184 thread.join()
185 if verbose: print("done")
186
187 @contextmanager
188 def reaped_server(self, hdlr):
189 server, thread = self.make_server((support.HOST, 0), hdlr)
190 try:
191 yield server
192 finally:
193 self.reap_server(server, thread)
194
R David Murray774a39f2013-02-19 12:17:31 -0500195 @contextmanager
196 def reaped_pair(self, hdlr):
197 server, thread = self.make_server((support.HOST, 0), hdlr)
198 client = self.imap_class(*server.server_address)
199 try:
200 yield server, client
201 finally:
202 client.logout()
203 self.reap_server(server, thread)
204
R. David Murraye8dc2582009-12-10 02:08:06 +0000205 @reap_threads
206 def test_connect(self):
207 with self.reaped_server(SimpleIMAPHandler) as server:
208 client = self.imap_class(*server.server_address)
209 client.shutdown()
210
211 @reap_threads
212 def test_issue5949(self):
213
214 class EOFHandler(socketserver.StreamRequestHandler):
215 def handle(self):
216 # EOF without sending a complete welcome message.
217 self.wfile.write(b'* OK')
218
219 with self.reaped_server(EOFHandler) as server:
220 self.assertRaises(imaplib.IMAP4.abort,
221 self.imap_class, *server.server_address)
222
223 @reap_threads
224 def test_line_termination(self):
225
226 class BadNewlineHandler(SimpleIMAPHandler):
227
228 def cmd_CAPABILITY(self, tag, args):
229 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500230 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000231
232 with self.reaped_server(BadNewlineHandler) as server:
233 self.assertRaises(imaplib.IMAP4.abort,
234 self.imap_class, *server.server_address)
235
R David Murray774a39f2013-02-19 12:17:31 -0500236 @reap_threads
237 def test_bad_auth_name(self):
238
239 class MyServer(SimpleIMAPHandler):
240
241 def cmd_AUTHENTICATE(self, tag, args):
242 self._send_tagged(tag, 'NO', 'unrecognized authentication '
243 'type {}'.format(args[0]))
244
245 with self.reaped_pair(MyServer) as (server, client):
246 with self.assertRaises(imaplib.IMAP4.error):
247 client.authenticate('METHOD', lambda: 1)
248
249 @reap_threads
250 def test_invalid_authentication(self):
251
252 class MyServer(SimpleIMAPHandler):
253
254 def cmd_AUTHENTICATE(self, tag, args):
255 self._send_textline('+')
256 self.response = yield
257 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
258
259 with self.reaped_pair(MyServer) as (server, client):
260 with self.assertRaises(imaplib.IMAP4.error):
261 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
262
263 @reap_threads
264 def test_valid_authentication(self):
265
266 class MyServer(SimpleIMAPHandler):
267
268 def cmd_AUTHENTICATE(self, tag, args):
269 self._send_textline('+')
270 self.server.response = yield
271 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
272
273 with self.reaped_pair(MyServer) as (server, client):
274 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
275 self.assertEqual(code, 'OK')
276 self.assertEqual(server.response,
277 b'ZmFrZQ==\r\n') #b64 encoded 'fake'
278
279 with self.reaped_pair(MyServer) as (server, client):
280 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
281 self.assertEqual(code, 'OK')
282 self.assertEqual(server.response,
283 b'ZmFrZQ==\r\n') #b64 encoded 'fake'
284
285 @reap_threads
286 def test_login_cram_md5(self):
287
288 class AuthHandler(SimpleIMAPHandler):
289
290 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
291
292 def cmd_AUTHENTICATE(self, tag, args):
293 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
294 'VzdG9uLm1jaS5uZXQ=')
295 r = yield
296 if r == b'dGltIGYxY2E2YmU0NjRiOWVmYTFjY2E2ZmZkNmNmMmQ5ZjMy\r\n':
297 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
298 else:
299 self._send_tagged(tag, 'NO', 'No access')
300
301 with self.reaped_pair(AuthHandler) as (server, client):
302 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
303 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
304 self.assertEqual(ret, "OK")
305
306 with self.reaped_pair(AuthHandler) as (server, client):
307 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
308 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
309 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000310
311
312class ThreadedNetworkedTests(BaseThreadedNetworkedTests):
313
314 server_class = socketserver.TCPServer
315 imap_class = imaplib.IMAP4
316
317
318@unittest.skipUnless(ssl, "SSL not available")
319class ThreadedNetworkedTestsSSL(BaseThreadedNetworkedTests):
320
321 server_class = SecureTCPServer
322 imap_class = IMAP4_SSL
323
324
Antoine Pitroub1436f12010-11-09 22:55:55 +0000325class RemoteIMAPTest(unittest.TestCase):
326 host = 'cyrus.andrew.cmu.edu'
327 port = 143
328 username = 'anonymous'
329 password = 'pass'
330 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000331
Antoine Pitroub1436f12010-11-09 22:55:55 +0000332 def setUp(self):
333 with transient_internet(self.host):
334 self.server = self.imap_class(self.host, self.port)
335
336 def tearDown(self):
337 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100338 with transient_internet(self.host):
339 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000340
341 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100342 with transient_internet(self.host):
343 for cap in self.server.capabilities:
344 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000345 self.assertIn('LOGINDISABLED', self.server.capabilities)
346 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100347 rs = self.server.login(self.username, self.password)
348 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000349
350 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100351 with transient_internet(self.host):
352 rs = self.server.logout()
353 self.server = None
354 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000355
356
357@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000358class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
359
360 def setUp(self):
361 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100362 with transient_internet(self.host):
363 rs = self.server.starttls()
364 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000365
366 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000367 for cap in self.server.capabilities:
368 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000369 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000370
371
372@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000373class RemoteIMAP_SSLTest(RemoteIMAPTest):
374 port = 993
375 imap_class = IMAP4_SSL
376
377 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000378 for cap in self.server.capabilities:
379 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000380 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
381 self.assertIn('AUTH=PLAIN', self.server.capabilities)
Antoine Pitroub1436f12010-11-09 22:55:55 +0000382
383
384def test_main():
R. David Murraye8dc2582009-12-10 02:08:06 +0000385 tests = [TestImaplib]
386
387 if support.is_resource_enabled('network'):
388 if ssl:
389 global CERTFILE
390 CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir,
391 "keycert.pem")
392 if not os.path.exists(CERTFILE):
393 raise support.TestFailed("Can't read certificate files!")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000394 tests.extend([
395 ThreadedNetworkedTests, ThreadedNetworkedTestsSSL,
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000396 RemoteIMAPTest, RemoteIMAP_SSLTest, RemoteIMAP_STARTTLSTest,
Antoine Pitroub1436f12010-11-09 22:55:55 +0000397 ])
R. David Murraye8dc2582009-12-10 02:08:06 +0000398
399 support.run_unittest(*tests)
Christian Heimesf6cd9672008-03-26 13:45:42 +0000400
401
402if __name__ == "__main__":
R. David Murraye8dc2582009-12-10 02:08:06 +0000403 support.use_resources = ['network']
404 test_main()