blob: 8ab532af3f0d9c7bc845c5f37c3d7c581654abb5 [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
R. David Murraye8dc2582009-12-10 02:08:06 +00002
3from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00004import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00005import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +00006import socketserver
Tim Peters108b7912002-07-31 16:42:33 +00007import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +00008import calendar
Antoine Pitroua6a4dc82017-09-07 18:56:24 +02009import threading
Matěj Cepl3dc67d02019-02-12 19:30:19 +010010import socket
Martin v. Löwisea752fb2002-01-05 11:31:49 +000011
Antoine Pitroucac9e712014-07-31 18:35:45 -040012from test.support import (reap_threads, verbose, transient_internet,
Victor Stinnerb18563d2017-06-14 18:48:32 +020013 run_with_tz, run_with_locale, cpython_only)
Christian Heimesf6cd9672008-03-26 13:45:42 +000014import unittest
R David Murrayb079c072016-12-24 21:32:26 -050015from unittest import mock
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040016from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000017try:
18 import ssl
19except ImportError:
20 ssl = None
21
Antoine Pitroucac9e712014-07-31 18:35:45 -040022CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
23CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000024
Martin v. Löwisea752fb2002-01-05 11:31:49 +000025
Christian Heimesf6cd9672008-03-26 13:45:42 +000026class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000027
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000028 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000029 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000030 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000031 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
32 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000033 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000034 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
35 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000036 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000037 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
38 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000039
Alexander Belopolsky2420d832012-04-29 15:56:49 -040040 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
41 def test_Internaldate2tuple_issue10941(self):
42 self.assertNotEqual(imaplib.Internaldate2tuple(
43 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040044 imaplib.Internaldate2tuple(
45 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040046
47 def timevalues(self):
48 return [2000000000, 2000000000.0, time.localtime(2000000000),
49 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
50 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040051 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040052 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040053 '"18-May-2033 05:33:20 +0200"']
54
55 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
Martin Panter6e0889f2015-11-16 07:21:38 +000056 # DST rules included to work around quirk where the Gnu C library may not
57 # otherwise restore the previous time zone
58 @run_with_tz('STD-1DST,M3.2.0,M11.1.0')
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040059 def test_Time2Internaldate(self):
60 expected = '"18-May-2033 05:33:20 +0200"'
61
62 for t in self.timevalues():
63 internal = imaplib.Time2Internaldate(t)
64 self.assertEqual(internal, expected)
65
66 def test_that_Time2Internaldate_returns_a_result(self):
67 # Without tzset, we can check only that it successfully
68 # produces a result, not the correctness of the result itself,
69 # since the result depends on the timezone the machine is in.
70 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000071 imaplib.Time2Internaldate(t)
72
Berker Peksage4dcbbd2018-08-07 05:12:18 +030073 def test_imap4_host_default_value(self):
Matěj Cepl3dc67d02019-02-12 19:30:19 +010074 # Check whether the IMAP4_PORT is truly unavailable.
75 with socket.socket() as s:
76 try:
77 s.connect(('', imaplib.IMAP4_PORT))
78 self.skipTest(
79 "Cannot run the test with local IMAP server running.")
80 except socket.error:
81 pass
82
Victor Stinner3c7931e2019-04-15 12:34:53 +020083 # This is the exception that should be raised.
84 expected_errnos = support.get_socket_conn_refused_errs()
Berker Peksage4dcbbd2018-08-07 05:12:18 +030085 with self.assertRaises(OSError) as cm:
86 imaplib.IMAP4()
87 self.assertIn(cm.exception.errno, expected_errnos)
88
Christian Heimesf6cd9672008-03-26 13:45:42 +000089
R. David Murraye8dc2582009-12-10 02:08:06 +000090if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000091 class SecureTCPServer(socketserver.TCPServer):
92
93 def get_request(self):
94 newsocket, fromaddr = self.socket.accept()
Christian Heimesd0486372016-09-10 23:23:33 +020095 context = ssl.SSLContext()
96 context.load_cert_chain(CERTFILE)
97 connstream = context.wrap_socket(newsocket, server_side=True)
R. David Murraye8dc2582009-12-10 02:08:06 +000098 return connstream, fromaddr
99
100 IMAP4_SSL = imaplib.IMAP4_SSL
101
102else:
103
104 class SecureTCPServer:
105 pass
106
107 IMAP4_SSL = None
108
109
110class SimpleIMAPHandler(socketserver.StreamRequestHandler):
R. David Murraye8dc2582009-12-10 02:08:06 +0000111 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -0500112 continuation = None
113 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +0000114
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300115 def setup(self):
116 super().setup()
117 self.server.logged = None
118
R. David Murraye8dc2582009-12-10 02:08:06 +0000119 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400120 if verbose:
121 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000122 self.wfile.write(message)
123
R David Murray774a39f2013-02-19 12:17:31 -0500124 def _send_line(self, message):
125 self._send(message + b'\r\n')
126
127 def _send_textline(self, message):
128 self._send_line(message.encode('ASCII'))
129
130 def _send_tagged(self, tag, code, message):
131 self._send_textline(' '.join((tag, code, message)))
132
R. David Murraye8dc2582009-12-10 02:08:06 +0000133 def handle(self):
134 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500135 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000136 while 1:
137 # Gather up input until we receive a line terminator or we timeout.
138 # Accumulate read(1) because it's simpler to handle the differences
139 # between naked sockets and SSL sockets.
140 line = b''
141 while 1:
142 try:
143 part = self.rfile.read(1)
144 if part == b'':
145 # Naked sockets return empty strings..
146 return
147 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200148 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200149 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000150 return
151 if line.endswith(b'\r\n'):
152 break
153
Antoine Pitroucac9e712014-07-31 18:35:45 -0400154 if verbose:
155 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500156 if self.continuation:
157 try:
158 self.continuation.send(line)
159 except StopIteration:
160 self.continuation = None
161 continue
162 splitline = line.decode('ASCII').split()
163 tag = splitline[0]
164 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000165 args = splitline[2:]
166
Antoine Pitroucac9e712014-07-31 18:35:45 -0400167 if hasattr(self, 'cmd_' + cmd):
168 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500169 if continuation:
170 self.continuation = continuation
171 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000172 else:
R David Murray774a39f2013-02-19 12:17:31 -0500173 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000174
175 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400176 caps = ('IMAP4rev1 ' + self.capabilities
177 if self.capabilities
178 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500179 self._send_textline('* CAPABILITY ' + caps)
180 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
181
182 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300183 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500184 self._send_textline('* BYE IMAP4ref1 Server logging out')
185 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000186
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300187 def cmd_LOGIN(self, tag, args):
188 self.server.logged = args[0]
189 self._send_tagged(tag, 'OK', 'LOGIN completed')
190
R. David Murraye8dc2582009-12-10 02:08:06 +0000191
R David Murrayb079c072016-12-24 21:32:26 -0500192class NewIMAPTestsMixin():
193 client = None
194
195 def _setup(self, imap_handler, connect=True):
196 """
197 Sets up imap_handler for tests. imap_handler should inherit from either:
198 - SimpleIMAPHandler - for testing IMAP commands,
199 - socketserver.StreamRequestHandler - if raw access to stream is needed.
200 Returns (client, server).
201 """
202 class TestTCPServer(self.server_class):
203 def handle_error(self, request, client_address):
204 """
205 End request and raise the error if one occurs.
206 """
207 self.close_request(request)
208 self.server_close()
209 raise
210
211 self.addCleanup(self._cleanup)
212 self.server = self.server_class((support.HOST, 0), imap_handler)
213 self.thread = threading.Thread(
214 name=self._testMethodName+'-server',
215 target=self.server.serve_forever,
216 # Short poll interval to make the test finish quickly.
217 # Time between requests is short enough that we won't wake
218 # up spuriously too many times.
219 kwargs={'poll_interval': 0.01})
220 self.thread.daemon = True # In case this function raises.
221 self.thread.start()
222
223 if connect:
224 self.client = self.imap_class(*self.server.server_address)
225
226 return self.client, self.server
227
228 def _cleanup(self):
229 """
230 Cleans up the test server. This method should not be called manually,
231 it is added to the cleanup queue in the _setup method already.
232 """
233 # if logout was called already we'd raise an exception trying to
234 # shutdown the client once again
235 if self.client is not None and self.client.state != 'LOGOUT':
236 self.client.shutdown()
237 # cleanup the server
238 self.server.shutdown()
239 self.server.server_close()
Victor Stinnerb9b69002017-09-14 14:40:56 -0700240 support.join_thread(self.thread, 3.0)
241 # Explicitly clear the attribute to prevent dangling thread
242 self.thread = None
R David Murrayb079c072016-12-24 21:32:26 -0500243
244 def test_EOF_without_complete_welcome_message(self):
245 # http://bugs.python.org/issue5949
246 class EOFHandler(socketserver.StreamRequestHandler):
247 def handle(self):
248 self.wfile.write(b'* OK')
249 _, server = self._setup(EOFHandler, connect=False)
250 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
251 *server.server_address)
252
253 def test_line_termination(self):
254 class BadNewlineHandler(SimpleIMAPHandler):
255 def cmd_CAPABILITY(self, tag, args):
256 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
257 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
258 _, server = self._setup(BadNewlineHandler, connect=False)
259 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
260 *server.server_address)
261
262 def test_enable_raises_error_if_not_AUTH(self):
263 class EnableHandler(SimpleIMAPHandler):
264 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
265 client, _ = self._setup(EnableHandler)
266 self.assertFalse(client.utf8_enabled)
267 with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
268 client.enable('foo')
269 self.assertFalse(client.utf8_enabled)
270
271 def test_enable_raises_error_if_no_capability(self):
272 client, _ = self._setup(SimpleIMAPHandler)
273 with self.assertRaisesRegex(imaplib.IMAP4.error,
274 'does not support ENABLE'):
275 client.enable('foo')
276
277 def test_enable_UTF8_raises_error_if_not_supported(self):
278 client, _ = self._setup(SimpleIMAPHandler)
279 typ, data = client.login('user', 'pass')
280 self.assertEqual(typ, 'OK')
281 with self.assertRaisesRegex(imaplib.IMAP4.error,
282 'does not support ENABLE'):
283 client.enable('UTF8=ACCEPT')
284
285 def test_enable_UTF8_True_append(self):
286 class UTF8AppendServer(SimpleIMAPHandler):
287 capabilities = 'ENABLE UTF8=ACCEPT'
288 def cmd_ENABLE(self, tag, args):
289 self._send_tagged(tag, 'OK', 'ENABLE successful')
290 def cmd_AUTHENTICATE(self, tag, args):
291 self._send_textline('+')
292 self.server.response = yield
293 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
294 def cmd_APPEND(self, tag, args):
295 self._send_textline('+')
296 self.server.response = yield
297 self._send_tagged(tag, 'OK', 'okay')
298 client, server = self._setup(UTF8AppendServer)
299 self.assertEqual(client._encoding, 'ascii')
300 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
301 self.assertEqual(code, 'OK')
302 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
303 code, _ = client.enable('UTF8=ACCEPT')
304 self.assertEqual(code, 'OK')
305 self.assertEqual(client._encoding, 'utf-8')
306 msg_string = 'Subject: üñí©öðé'
307 typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
308 self.assertEqual(typ, 'OK')
309 self.assertEqual(server.response,
310 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
311
312 def test_search_disallows_charset_in_utf8_mode(self):
313 class UTF8Server(SimpleIMAPHandler):
314 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
315 def cmd_ENABLE(self, tag, args):
316 self._send_tagged(tag, 'OK', 'ENABLE successful')
317 def cmd_AUTHENTICATE(self, tag, args):
318 self._send_textline('+')
319 self.server.response = yield
320 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
321 client, _ = self._setup(UTF8Server)
322 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
323 self.assertEqual(typ, 'OK')
324 typ, _ = client.enable('UTF8=ACCEPT')
325 self.assertEqual(typ, 'OK')
326 self.assertTrue(client.utf8_enabled)
327 with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
328 client.search('foo', 'bar')
329
330 def test_bad_auth_name(self):
331 class MyServer(SimpleIMAPHandler):
332 def cmd_AUTHENTICATE(self, tag, args):
333 self._send_tagged(tag, 'NO',
334 'unrecognized authentication type {}'.format(args[0]))
335 client, _ = self._setup(MyServer)
336 with self.assertRaisesRegex(imaplib.IMAP4.error,
337 'unrecognized authentication type METHOD'):
338 client.authenticate('METHOD', lambda: 1)
339
340 def test_invalid_authentication(self):
341 class MyServer(SimpleIMAPHandler):
342 def cmd_AUTHENTICATE(self, tag, args):
343 self._send_textline('+')
344 self.response = yield
345 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
346 client, _ = self._setup(MyServer)
347 with self.assertRaisesRegex(imaplib.IMAP4.error,
348 r'\[AUTHENTICATIONFAILED\] invalid'):
349 client.authenticate('MYAUTH', lambda x: b'fake')
350
351 def test_valid_authentication_bytes(self):
352 class MyServer(SimpleIMAPHandler):
353 def cmd_AUTHENTICATE(self, tag, args):
354 self._send_textline('+')
355 self.server.response = yield
356 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
357 client, server = self._setup(MyServer)
358 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
359 self.assertEqual(code, 'OK')
360 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
361
362 def test_valid_authentication_plain_text(self):
363 class MyServer(SimpleIMAPHandler):
364 def cmd_AUTHENTICATE(self, tag, args):
365 self._send_textline('+')
366 self.server.response = yield
367 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
368 client, server = self._setup(MyServer)
369 code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
370 self.assertEqual(code, 'OK')
371 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
372
373 def test_login_cram_md5_bytes(self):
374 class AuthHandler(SimpleIMAPHandler):
375 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
376 def cmd_AUTHENTICATE(self, tag, args):
377 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
378 'VzdG9uLm1jaS5uZXQ=')
379 r = yield
380 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
381 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
382 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
383 else:
384 self._send_tagged(tag, 'NO', 'No access')
385 client, _ = self._setup(AuthHandler)
386 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
387 ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
388 self.assertEqual(ret, "OK")
389
390 def test_login_cram_md5_plain_text(self):
391 class AuthHandler(SimpleIMAPHandler):
392 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
393 def cmd_AUTHENTICATE(self, tag, args):
394 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
395 'VzdG9uLm1jaS5uZXQ=')
396 r = yield
397 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
398 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
399 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
400 else:
401 self._send_tagged(tag, 'NO', 'No access')
402 client, _ = self._setup(AuthHandler)
403 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
404 ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
405 self.assertEqual(ret, "OK")
406
407 def test_aborted_authentication(self):
408 class MyServer(SimpleIMAPHandler):
409 def cmd_AUTHENTICATE(self, tag, args):
410 self._send_textline('+')
411 self.response = yield
412 if self.response == b'*\r\n':
413 self._send_tagged(
414 tag,
415 'NO',
416 '[AUTHENTICATIONFAILED] aborted')
417 else:
418 self._send_tagged(tag, 'OK', 'MYAUTH successful')
419 client, _ = self._setup(MyServer)
420 with self.assertRaisesRegex(imaplib.IMAP4.error,
421 r'\[AUTHENTICATIONFAILED\] aborted'):
422 client.authenticate('MYAUTH', lambda x: None)
423
424 @mock.patch('imaplib._MAXLINE', 10)
425 def test_linetoolong(self):
426 class TooLongHandler(SimpleIMAPHandler):
427 def handle(self):
428 # send response line longer than the limit set in the next line
429 self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
430 _, server = self._setup(TooLongHandler, connect=False)
431 with self.assertRaisesRegex(imaplib.IMAP4.error,
432 'got more than 10 bytes'):
433 self.imap_class(*server.server_address)
434
435 def test_simple_with_statement(self):
436 _, server = self._setup(SimpleIMAPHandler, connect=False)
437 with self.imap_class(*server.server_address):
438 pass
439
440 def test_with_statement(self):
441 _, server = self._setup(SimpleIMAPHandler, connect=False)
442 with self.imap_class(*server.server_address) as imap:
443 imap.login('user', 'pass')
444 self.assertEqual(server.logged, 'user')
445 self.assertIsNone(server.logged)
446
447 def test_with_statement_logout(self):
448 # It is legal to log out explicitly inside the with block
449 _, server = self._setup(SimpleIMAPHandler, connect=False)
450 with self.imap_class(*server.server_address) as imap:
451 imap.login('user', 'pass')
452 self.assertEqual(server.logged, 'user')
453 imap.logout()
454 self.assertIsNone(server.logged)
455 self.assertIsNone(server.logged)
456
457 # command tests
458
459 def test_login(self):
460 client, _ = self._setup(SimpleIMAPHandler)
461 typ, data = client.login('user', 'pass')
462 self.assertEqual(typ, 'OK')
463 self.assertEqual(data[0], b'LOGIN completed')
464 self.assertEqual(client.state, 'AUTH')
465
466 def test_logout(self):
467 client, _ = self._setup(SimpleIMAPHandler)
468 typ, data = client.login('user', 'pass')
469 self.assertEqual(typ, 'OK')
470 self.assertEqual(data[0], b'LOGIN completed')
471 typ, data = client.logout()
Victor Stinner74125a62019-04-15 18:23:20 +0200472 self.assertEqual(typ, 'BYE', (typ, data))
473 self.assertEqual(data[0], b'IMAP4ref1 Server logging out', (typ, data))
R David Murrayb079c072016-12-24 21:32:26 -0500474 self.assertEqual(client.state, 'LOGOUT')
475
476 def test_lsub(self):
477 class LsubCmd(SimpleIMAPHandler):
478 def cmd_LSUB(self, tag, args):
479 self._send_textline('* LSUB () "." directoryA')
480 return self._send_tagged(tag, 'OK', 'LSUB completed')
481 client, _ = self._setup(LsubCmd)
482 client.login('user', 'pass')
483 typ, data = client.lsub()
484 self.assertEqual(typ, 'OK')
485 self.assertEqual(data[0], b'() "." directoryA')
486
487
488class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
489 imap_class = imaplib.IMAP4
490 server_class = socketserver.TCPServer
491
492
493@unittest.skipUnless(ssl, "SSL not available")
494class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
Victor Stinnerde383282017-01-12 11:51:31 +0100495 imap_class = IMAP4_SSL
R David Murrayb079c072016-12-24 21:32:26 -0500496 server_class = SecureTCPServer
497
498 def test_ssl_raises(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200499 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
500 self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
501 self.assertEqual(ssl_context.check_hostname, True)
R David Murrayb079c072016-12-24 21:32:26 -0500502 ssl_context.load_verify_locations(CAFILE)
503
504 with self.assertRaisesRegex(ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100505 "IP address mismatch, certificate is not valid for "
506 "'127.0.0.1'"):
R David Murrayb079c072016-12-24 21:32:26 -0500507 _, server = self._setup(SimpleIMAPHandler)
508 client = self.imap_class(*server.server_address,
509 ssl_context=ssl_context)
510 client.shutdown()
511
512 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200513 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
R David Murrayb079c072016-12-24 21:32:26 -0500514 ssl_context.load_verify_locations(CAFILE)
515
516 _, server = self._setup(SimpleIMAPHandler)
517 client = self.imap_class("localhost", server.server_address[1],
518 ssl_context=ssl_context)
519 client.shutdown()
520
Victor Stinnerb18563d2017-06-14 18:48:32 +0200521 # Mock the private method _connect(), so mark the test as specific
522 # to CPython stdlib
523 @cpython_only
524 def test_certfile_arg_warn(self):
525 with support.check_warnings(('', DeprecationWarning)):
526 with mock.patch.object(self.imap_class, 'open'):
527 with mock.patch.object(self.imap_class, '_connect'):
528 self.imap_class('localhost', 143, certfile=CERTFILE)
529
Antoine Pitroucac9e712014-07-31 18:35:45 -0400530class ThreadedNetworkedTests(unittest.TestCase):
531 server_class = socketserver.TCPServer
532 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000533
534 def make_server(self, addr, hdlr):
535
536 class MyServer(self.server_class):
537 def handle_error(self, request, client_address):
538 self.close_request(request)
539 self.server_close()
540 raise
541
Antoine Pitroucac9e712014-07-31 18:35:45 -0400542 if verbose:
543 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000544 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000545 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000546
547 if verbose:
548 print("server created")
549 print("ADDR =", addr)
550 print("CLASS =", self.server_class)
551 print("HDLR =", server.RequestHandlerClass)
552
553 t = threading.Thread(
554 name='%s serving' % self.server_class,
555 target=server.serve_forever,
556 # Short poll interval to make the test finish quickly.
557 # Time between requests is short enough that we won't wake
558 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400559 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000560 t.daemon = True # In case this function raises.
561 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400562 if verbose:
563 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000564 return server, t
565
566 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400567 if verbose:
568 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000569 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000570 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000571 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400572 if verbose:
573 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000574
575 @contextmanager
576 def reaped_server(self, hdlr):
577 server, thread = self.make_server((support.HOST, 0), hdlr)
578 try:
579 yield server
580 finally:
581 self.reap_server(server, thread)
582
R David Murray774a39f2013-02-19 12:17:31 -0500583 @contextmanager
584 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100585 with self.reaped_server(hdlr) as server:
586 client = self.imap_class(*server.server_address)
587 try:
588 yield server, client
589 finally:
590 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500591
R. David Murraye8dc2582009-12-10 02:08:06 +0000592 @reap_threads
593 def test_connect(self):
594 with self.reaped_server(SimpleIMAPHandler) as server:
595 client = self.imap_class(*server.server_address)
596 client.shutdown()
597
598 @reap_threads
R David Murray317f64f2016-01-02 17:18:34 -0500599 def test_bracket_flags(self):
600
601 # This violates RFC 3501, which disallows ']' characters in tag names,
602 # but imaplib has allowed producing such tags forever, other programs
603 # also produce them (eg: OtherInbox's Organizer app as of 20140716),
604 # and Gmail, for example, accepts them and produces them. So we
605 # support them. See issue #21815.
606
607 class BracketFlagHandler(SimpleIMAPHandler):
608
609 def handle(self):
610 self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
611 super().handle()
612
613 def cmd_AUTHENTICATE(self, tag, args):
614 self._send_textline('+')
615 self.server.response = yield
616 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
617
618 def cmd_SELECT(self, tag, args):
619 flag_msg = ' \\'.join(self.flags)
620 self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
621 self._send_line(b'* 2 EXISTS')
622 self._send_line(b'* 0 RECENT')
623 msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
624 % flag_msg)
625 self._send_line(msg.encode('ascii'))
626 self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
627
628 def cmd_STORE(self, tag, args):
629 new_flags = args[2].strip('(').strip(')').split()
630 self.flags.extend(new_flags)
631 flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
632 msg = '* %s FETCH %s' % (args[0], flags_msg)
633 self._send_line(msg.encode('ascii'))
634 self._send_tagged(tag, 'OK', 'STORE completed.')
635
636 with self.reaped_pair(BracketFlagHandler) as (server, client):
637 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
638 self.assertEqual(code, 'OK')
639 self.assertEqual(server.response, b'ZmFrZQ==\r\n')
640 client.select('test')
641 typ, [data] = client.store(b'1', "+FLAGS", "[test]")
642 self.assertIn(b'[test]', data)
643 client.select('test')
644 typ, [data] = client.response('PERMANENTFLAGS')
645 self.assertIn(b'[test]', data)
646
647 @reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000648 def test_issue5949(self):
649
650 class EOFHandler(socketserver.StreamRequestHandler):
651 def handle(self):
652 # EOF without sending a complete welcome message.
653 self.wfile.write(b'* OK')
654
655 with self.reaped_server(EOFHandler) as server:
656 self.assertRaises(imaplib.IMAP4.abort,
657 self.imap_class, *server.server_address)
658
659 @reap_threads
660 def test_line_termination(self):
661
662 class BadNewlineHandler(SimpleIMAPHandler):
663
664 def cmd_CAPABILITY(self, tag, args):
665 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500666 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000667
668 with self.reaped_server(BadNewlineHandler) as server:
669 self.assertRaises(imaplib.IMAP4.abort,
670 self.imap_class, *server.server_address)
671
R David Murraya6429db2015-05-10 19:17:23 -0400672 class UTF8Server(SimpleIMAPHandler):
673 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
674
675 def cmd_ENABLE(self, tag, args):
676 self._send_tagged(tag, 'OK', 'ENABLE successful')
677
678 def cmd_AUTHENTICATE(self, tag, args):
679 self._send_textline('+')
680 self.server.response = yield
681 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
682
683 @reap_threads
684 def test_enable_raises_error_if_not_AUTH(self):
685 with self.reaped_pair(self.UTF8Server) as (server, client):
686 self.assertFalse(client.utf8_enabled)
687 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
688 self.assertFalse(client.utf8_enabled)
689
690 # XXX Also need a test that enable after SELECT raises an error.
691
692 @reap_threads
693 def test_enable_raises_error_if_no_capability(self):
694 class NoEnableServer(self.UTF8Server):
695 capabilities = 'AUTH'
696 with self.reaped_pair(NoEnableServer) as (server, client):
697 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
698
699 @reap_threads
700 def test_enable_UTF8_raises_error_if_not_supported(self):
701 class NonUTF8Server(SimpleIMAPHandler):
702 pass
703 with self.assertRaises(imaplib.IMAP4.error):
704 with self.reaped_pair(NonUTF8Server) as (server, client):
705 typ, data = client.login('user', 'pass')
706 self.assertEqual(typ, 'OK')
707 client.enable('UTF8=ACCEPT')
708 pass
709
710 @reap_threads
711 def test_enable_UTF8_True_append(self):
712
713 class UTF8AppendServer(self.UTF8Server):
714 def cmd_APPEND(self, tag, args):
715 self._send_textline('+')
716 self.server.response = yield
717 self._send_tagged(tag, 'OK', 'okay')
718
719 with self.reaped_pair(UTF8AppendServer) as (server, client):
720 self.assertEqual(client._encoding, 'ascii')
721 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
722 self.assertEqual(code, 'OK')
723 self.assertEqual(server.response,
724 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
725 code, _ = client.enable('UTF8=ACCEPT')
726 self.assertEqual(code, 'OK')
727 self.assertEqual(client._encoding, 'utf-8')
728 msg_string = 'Subject: üñí©öðé'
729 typ, data = client.append(
730 None, None, None, msg_string.encode('utf-8'))
731 self.assertEqual(typ, 'OK')
732 self.assertEqual(
733 server.response,
734 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
735 )
736
737 # XXX also need a test that makes sure that the Literal and Untagged_status
738 # regexes uses unicode in UTF8 mode instead of the default ASCII.
739
740 @reap_threads
741 def test_search_disallows_charset_in_utf8_mode(self):
742 with self.reaped_pair(self.UTF8Server) as (server, client):
743 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
744 self.assertEqual(typ, 'OK')
745 typ, _ = client.enable('UTF8=ACCEPT')
746 self.assertEqual(typ, 'OK')
747 self.assertTrue(client.utf8_enabled)
748 self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
749
R David Murray774a39f2013-02-19 12:17:31 -0500750 @reap_threads
751 def test_bad_auth_name(self):
752
753 class MyServer(SimpleIMAPHandler):
754
755 def cmd_AUTHENTICATE(self, tag, args):
756 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400757 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500758
759 with self.reaped_pair(MyServer) as (server, client):
760 with self.assertRaises(imaplib.IMAP4.error):
761 client.authenticate('METHOD', lambda: 1)
762
763 @reap_threads
764 def test_invalid_authentication(self):
765
766 class MyServer(SimpleIMAPHandler):
767
768 def cmd_AUTHENTICATE(self, tag, args):
769 self._send_textline('+')
770 self.response = yield
771 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
772
773 with self.reaped_pair(MyServer) as (server, client):
774 with self.assertRaises(imaplib.IMAP4.error):
775 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
776
777 @reap_threads
778 def test_valid_authentication(self):
779
780 class MyServer(SimpleIMAPHandler):
781
782 def cmd_AUTHENTICATE(self, tag, args):
783 self._send_textline('+')
784 self.server.response = yield
785 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
786
787 with self.reaped_pair(MyServer) as (server, client):
788 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
789 self.assertEqual(code, 'OK')
790 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400791 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500792
793 with self.reaped_pair(MyServer) as (server, client):
794 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
795 self.assertEqual(code, 'OK')
796 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400797 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500798
799 @reap_threads
800 def test_login_cram_md5(self):
801
802 class AuthHandler(SimpleIMAPHandler):
803
804 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
805
806 def cmd_AUTHENTICATE(self, tag, args):
807 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400808 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500809 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400810 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
811 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500812 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
813 else:
814 self._send_tagged(tag, 'NO', 'No access')
815
816 with self.reaped_pair(AuthHandler) as (server, client):
817 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
818 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
819 self.assertEqual(ret, "OK")
820
821 with self.reaped_pair(AuthHandler) as (server, client):
822 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
823 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
824 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000825
826
Robert Collins5ccc18f2015-07-31 08:59:02 +1200827 @reap_threads
828 def test_aborted_authentication(self):
829
830 class MyServer(SimpleIMAPHandler):
831
832 def cmd_AUTHENTICATE(self, tag, args):
833 self._send_textline('+')
834 self.response = yield
835
836 if self.response == b'*\r\n':
837 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
838 else:
839 self._send_tagged(tag, 'OK', 'MYAUTH successful')
840
841 with self.reaped_pair(MyServer) as (server, client):
842 with self.assertRaises(imaplib.IMAP4.error):
843 code, data = client.authenticate('MYAUTH', lambda x: None)
844
Robert Collins78378e82015-07-31 09:01:38 +1200845
Georg Brandlca580f42013-10-27 06:52:14 +0100846 def test_linetoolong(self):
847 class TooLongHandler(SimpleIMAPHandler):
848 def handle(self):
849 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400850 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100851
852 with self.reaped_server(TooLongHandler) as server:
853 self.assertRaises(imaplib.IMAP4.error,
854 self.imap_class, *server.server_address)
855
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300856 @reap_threads
857 def test_simple_with_statement(self):
858 # simplest call
859 with self.reaped_server(SimpleIMAPHandler) as server:
860 with self.imap_class(*server.server_address):
861 pass
862
863 @reap_threads
864 def test_with_statement(self):
865 with self.reaped_server(SimpleIMAPHandler) as server:
866 with self.imap_class(*server.server_address) as imap:
867 imap.login('user', 'pass')
868 self.assertEqual(server.logged, 'user')
869 self.assertIsNone(server.logged)
870
871 @reap_threads
872 def test_with_statement_logout(self):
873 # what happens if already logout in the block?
874 with self.reaped_server(SimpleIMAPHandler) as server:
875 with self.imap_class(*server.server_address) as imap:
876 imap.login('user', 'pass')
877 self.assertEqual(server.logged, 'user')
878 imap.logout()
879 self.assertIsNone(server.logged)
880 self.assertIsNone(server.logged)
881
Georg Brandlca580f42013-10-27 06:52:14 +0100882
R. David Murraye8dc2582009-12-10 02:08:06 +0000883@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400884class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000885 server_class = SecureTCPServer
886 imap_class = IMAP4_SSL
887
Christian Heimes48aae572013-12-02 20:01:29 +0100888 @reap_threads
889 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200890 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
Christian Heimes48aae572013-12-02 20:01:29 +0100891 ssl_context.load_verify_locations(CAFILE)
892
Antoine Pitroucac9e712014-07-31 18:35:45 -0400893 with self.assertRaisesRegex(
894 ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100895 "IP address mismatch, certificate is not valid for "
896 "'127.0.0.1'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100897 with self.reaped_server(SimpleIMAPHandler) as server:
898 client = self.imap_class(*server.server_address,
899 ssl_context=ssl_context)
900 client.shutdown()
901
902 with self.reaped_server(SimpleIMAPHandler) as server:
903 client = self.imap_class("localhost", server.server_address[1],
904 ssl_context=ssl_context)
905 client.shutdown()
906
R. David Murraye8dc2582009-12-10 02:08:06 +0000907
Antoine Pitroucac9e712014-07-31 18:35:45 -0400908@unittest.skipUnless(
909 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000910class RemoteIMAPTest(unittest.TestCase):
911 host = 'cyrus.andrew.cmu.edu'
912 port = 143
913 username = 'anonymous'
914 password = 'pass'
915 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000916
Antoine Pitroub1436f12010-11-09 22:55:55 +0000917 def setUp(self):
918 with transient_internet(self.host):
919 self.server = self.imap_class(self.host, self.port)
920
921 def tearDown(self):
922 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100923 with transient_internet(self.host):
924 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000925
926 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100927 with transient_internet(self.host):
928 for cap in self.server.capabilities:
929 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000930 self.assertIn('LOGINDISABLED', self.server.capabilities)
931 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100932 rs = self.server.login(self.username, self.password)
933 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000934
935 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100936 with transient_internet(self.host):
937 rs = self.server.logout()
938 self.server = None
Victor Stinner74125a62019-04-15 18:23:20 +0200939 self.assertEqual(rs[0], 'BYE', rs)
Antoine Pitroub1436f12010-11-09 22:55:55 +0000940
941
942@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400943@unittest.skipUnless(
944 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000945class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
946
947 def setUp(self):
948 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100949 with transient_internet(self.host):
950 rs = self.server.starttls()
951 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000952
953 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000954 for cap in self.server.capabilities:
955 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000956 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000957
958
959@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000960class RemoteIMAP_SSLTest(RemoteIMAPTest):
961 port = 993
962 imap_class = IMAP4_SSL
963
Antoine Pitrou08728162011-05-06 18:49:52 +0200964 def setUp(self):
965 pass
966
967 def tearDown(self):
968 pass
969
970 def create_ssl_context(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200971 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
972 ssl_context.check_hostname = False
973 ssl_context.verify_mode = ssl.CERT_NONE
Antoine Pitrou08728162011-05-06 18:49:52 +0200974 ssl_context.load_cert_chain(CERTFILE)
975 return ssl_context
976
977 def check_logincapa(self, server):
978 try:
979 for cap in server.capabilities:
980 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000981 self.assertNotIn('LOGINDISABLED', server.capabilities)
982 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200983 rs = server.login(self.username, self.password)
984 self.assertEqual(rs[0], 'OK')
985 finally:
986 server.logout()
987
Antoine Pitroub1436f12010-11-09 22:55:55 +0000988 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200989 with transient_internet(self.host):
990 _server = self.imap_class(self.host, self.port)
991 self.check_logincapa(_server)
992
Antoine Pitrou08728162011-05-06 18:49:52 +0200993 def test_logout(self):
994 with transient_internet(self.host):
995 _server = self.imap_class(self.host, self.port)
996 rs = _server.logout()
Victor Stinner74125a62019-04-15 18:23:20 +0200997 self.assertEqual(rs[0], 'BYE', rs)
Antoine Pitrou08728162011-05-06 18:49:52 +0200998
999 def test_ssl_context_certfile_exclusive(self):
1000 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001001 self.assertRaises(
1002 ValueError, self.imap_class, self.host, self.port,
1003 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +02001004
1005 def test_ssl_context_keyfile_exclusive(self):
1006 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -04001007 self.assertRaises(
1008 ValueError, self.imap_class, self.host, self.port,
1009 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +00001010
1011
1012if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +02001013 unittest.main()