blob: a6d83d42f32fd439c2078d1e116c6bd750b2ab7f [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
2# If we end up with a significant number of tests that don't require
3# threading, this test module should be split. Right now we skip
4# them all if we don't have threading.
5threading = support.import_module('threading')
6
7from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00008import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00009import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +000010import socketserver
Tim Peters108b7912002-07-31 16:42:33 +000011import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000012import calendar
Martin v. Löwisea752fb2002-01-05 11:31:49 +000013
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040014from test.support import reap_threads, verbose, transient_internet, run_with_tz, run_with_locale
Christian Heimesf6cd9672008-03-26 13:45:42 +000015import unittest
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040016from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000017try:
18 import ssl
19except ImportError:
20 ssl = None
Christian Heimesaab99fd2013-12-15 19:39:32 +010021 HAS_SNI = False
22else:
23 from ssl import HAS_SNI
R. David Murraye8dc2582009-12-10 02:08:06 +000024
25CERTFILE = None
Christian Heimes48aae572013-12-02 20:01:29 +010026CAFILE = None
R. David Murraye8dc2582009-12-10 02:08:06 +000027
Martin v. Löwisea752fb2002-01-05 11:31:49 +000028
Christian Heimesf6cd9672008-03-26 13:45:42 +000029class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000030
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000031 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000032 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000033 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000034 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
35 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000036 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000037 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
38 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000039 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000040 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
41 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000042
Alexander Belopolsky2420d832012-04-29 15:56:49 -040043 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
44 def test_Internaldate2tuple_issue10941(self):
45 self.assertNotEqual(imaplib.Internaldate2tuple(
46 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
47 imaplib.Internaldate2tuple(
48 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
49
Christian Heimesf6cd9672008-03-26 13:45:42 +000050
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040051
52 def timevalues(self):
53 return [2000000000, 2000000000.0, time.localtime(2000000000),
54 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
55 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040056 datetime.fromtimestamp(2000000000,
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040057 timezone(timedelta(0, 2*60*60))),
58 '"18-May-2033 05:33:20 +0200"']
59
60 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
61 @run_with_tz('STD-1DST')
62 def test_Time2Internaldate(self):
63 expected = '"18-May-2033 05:33:20 +0200"'
64
65 for t in self.timevalues():
66 internal = imaplib.Time2Internaldate(t)
67 self.assertEqual(internal, expected)
68
69 def test_that_Time2Internaldate_returns_a_result(self):
70 # Without tzset, we can check only that it successfully
71 # produces a result, not the correctness of the result itself,
72 # since the result depends on the timezone the machine is in.
73 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000074 imaplib.Time2Internaldate(t)
75
76
R. David Murraye8dc2582009-12-10 02:08:06 +000077if ssl:
78
79 class SecureTCPServer(socketserver.TCPServer):
80
81 def get_request(self):
82 newsocket, fromaddr = self.socket.accept()
83 connstream = ssl.wrap_socket(newsocket,
84 server_side=True,
85 certfile=CERTFILE)
86 return connstream, fromaddr
87
88 IMAP4_SSL = imaplib.IMAP4_SSL
89
90else:
91
92 class SecureTCPServer:
93 pass
94
95 IMAP4_SSL = None
96
97
98class SimpleIMAPHandler(socketserver.StreamRequestHandler):
99
100 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -0500101 continuation = None
102 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +0000103
104 def _send(self, message):
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +0000105 if verbose: print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000106 self.wfile.write(message)
107
R David Murray774a39f2013-02-19 12:17:31 -0500108 def _send_line(self, message):
109 self._send(message + b'\r\n')
110
111 def _send_textline(self, message):
112 self._send_line(message.encode('ASCII'))
113
114 def _send_tagged(self, tag, code, message):
115 self._send_textline(' '.join((tag, code, message)))
116
R. David Murraye8dc2582009-12-10 02:08:06 +0000117 def handle(self):
118 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500119 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000120 while 1:
121 # Gather up input until we receive a line terminator or we timeout.
122 # Accumulate read(1) because it's simpler to handle the differences
123 # between naked sockets and SSL sockets.
124 line = b''
125 while 1:
126 try:
127 part = self.rfile.read(1)
128 if part == b'':
129 # Naked sockets return empty strings..
130 return
131 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200132 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200133 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000134 return
135 if line.endswith(b'\r\n'):
136 break
137
Antoine Pitrou36c0dbc2010-11-16 17:49:46 +0000138 if verbose: print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500139 if self.continuation:
140 try:
141 self.continuation.send(line)
142 except StopIteration:
143 self.continuation = None
144 continue
145 splitline = line.decode('ASCII').split()
146 tag = splitline[0]
147 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000148 args = splitline[2:]
149
150 if hasattr(self, 'cmd_'+cmd):
R David Murray774a39f2013-02-19 12:17:31 -0500151 continuation = getattr(self, 'cmd_'+cmd)(tag, args)
152 if continuation:
153 self.continuation = continuation
154 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000155 else:
R David Murray774a39f2013-02-19 12:17:31 -0500156 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000157
158 def cmd_CAPABILITY(self, tag, args):
R David Murray774a39f2013-02-19 12:17:31 -0500159 caps = 'IMAP4rev1 ' + self.capabilities if self.capabilities else 'IMAP4rev1'
160 self._send_textline('* CAPABILITY ' + caps)
161 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
162
163 def cmd_LOGOUT(self, tag, args):
164 self._send_textline('* BYE IMAP4ref1 Server logging out')
165 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000166
167
168class BaseThreadedNetworkedTests(unittest.TestCase):
169
170 def make_server(self, addr, hdlr):
171
172 class MyServer(self.server_class):
173 def handle_error(self, request, client_address):
174 self.close_request(request)
175 self.server_close()
176 raise
177
178 if verbose: print("creating server")
179 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000180 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000181
182 if verbose:
183 print("server created")
184 print("ADDR =", addr)
185 print("CLASS =", self.server_class)
186 print("HDLR =", server.RequestHandlerClass)
187
188 t = threading.Thread(
189 name='%s serving' % self.server_class,
190 target=server.serve_forever,
191 # Short poll interval to make the test finish quickly.
192 # Time between requests is short enough that we won't wake
193 # up spuriously too many times.
194 kwargs={'poll_interval':0.01})
195 t.daemon = True # In case this function raises.
196 t.start()
197 if verbose: print("server running")
198 return server, t
199
200 def reap_server(self, server, thread):
201 if verbose: print("waiting for server")
202 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000203 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000204 thread.join()
205 if verbose: print("done")
206
207 @contextmanager
208 def reaped_server(self, hdlr):
209 server, thread = self.make_server((support.HOST, 0), hdlr)
210 try:
211 yield server
212 finally:
213 self.reap_server(server, thread)
214
R David Murray774a39f2013-02-19 12:17:31 -0500215 @contextmanager
216 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100217 with self.reaped_server(hdlr) as server:
218 client = self.imap_class(*server.server_address)
219 try:
220 yield server, client
221 finally:
222 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500223
R. David Murraye8dc2582009-12-10 02:08:06 +0000224 @reap_threads
225 def test_connect(self):
226 with self.reaped_server(SimpleIMAPHandler) as server:
227 client = self.imap_class(*server.server_address)
228 client.shutdown()
229
230 @reap_threads
231 def test_issue5949(self):
232
233 class EOFHandler(socketserver.StreamRequestHandler):
234 def handle(self):
235 # EOF without sending a complete welcome message.
236 self.wfile.write(b'* OK')
237
238 with self.reaped_server(EOFHandler) as server:
239 self.assertRaises(imaplib.IMAP4.abort,
240 self.imap_class, *server.server_address)
241
242 @reap_threads
243 def test_line_termination(self):
244
245 class BadNewlineHandler(SimpleIMAPHandler):
246
247 def cmd_CAPABILITY(self, tag, args):
248 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500249 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000250
251 with self.reaped_server(BadNewlineHandler) as server:
252 self.assertRaises(imaplib.IMAP4.abort,
253 self.imap_class, *server.server_address)
254
R David Murray774a39f2013-02-19 12:17:31 -0500255 @reap_threads
256 def test_bad_auth_name(self):
257
258 class MyServer(SimpleIMAPHandler):
259
260 def cmd_AUTHENTICATE(self, tag, args):
261 self._send_tagged(tag, 'NO', 'unrecognized authentication '
262 'type {}'.format(args[0]))
263
264 with self.reaped_pair(MyServer) as (server, client):
265 with self.assertRaises(imaplib.IMAP4.error):
266 client.authenticate('METHOD', lambda: 1)
267
268 @reap_threads
269 def test_invalid_authentication(self):
270
271 class MyServer(SimpleIMAPHandler):
272
273 def cmd_AUTHENTICATE(self, tag, args):
274 self._send_textline('+')
275 self.response = yield
276 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
277
278 with self.reaped_pair(MyServer) as (server, client):
279 with self.assertRaises(imaplib.IMAP4.error):
280 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
281
282 @reap_threads
283 def test_valid_authentication(self):
284
285 class MyServer(SimpleIMAPHandler):
286
287 def cmd_AUTHENTICATE(self, tag, args):
288 self._send_textline('+')
289 self.server.response = yield
290 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
291
292 with self.reaped_pair(MyServer) as (server, client):
293 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
294 self.assertEqual(code, 'OK')
295 self.assertEqual(server.response,
296 b'ZmFrZQ==\r\n') #b64 encoded 'fake'
297
298 with self.reaped_pair(MyServer) as (server, client):
299 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
300 self.assertEqual(code, 'OK')
301 self.assertEqual(server.response,
302 b'ZmFrZQ==\r\n') #b64 encoded 'fake'
303
304 @reap_threads
305 def test_login_cram_md5(self):
306
307 class AuthHandler(SimpleIMAPHandler):
308
309 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
310
311 def cmd_AUTHENTICATE(self, tag, args):
312 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
313 'VzdG9uLm1jaS5uZXQ=')
314 r = yield
315 if r == b'dGltIGYxY2E2YmU0NjRiOWVmYTFjY2E2ZmZkNmNmMmQ5ZjMy\r\n':
316 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
317 else:
318 self._send_tagged(tag, 'NO', 'No access')
319
320 with self.reaped_pair(AuthHandler) as (server, client):
321 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
322 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
323 self.assertEqual(ret, "OK")
324
325 with self.reaped_pair(AuthHandler) as (server, client):
326 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
327 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
328 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000329
330
Georg Brandlca580f42013-10-27 06:52:14 +0100331 def test_linetoolong(self):
332 class TooLongHandler(SimpleIMAPHandler):
333 def handle(self):
334 # Send a very long response line
335 self.wfile.write(b'* OK ' + imaplib._MAXLINE*b'x' + b'\r\n')
336
337 with self.reaped_server(TooLongHandler) as server:
338 self.assertRaises(imaplib.IMAP4.error,
339 self.imap_class, *server.server_address)
340
341
R. David Murraye8dc2582009-12-10 02:08:06 +0000342class ThreadedNetworkedTests(BaseThreadedNetworkedTests):
343
344 server_class = socketserver.TCPServer
345 imap_class = imaplib.IMAP4
346
347
348@unittest.skipUnless(ssl, "SSL not available")
349class ThreadedNetworkedTestsSSL(BaseThreadedNetworkedTests):
350
351 server_class = SecureTCPServer
352 imap_class = IMAP4_SSL
353
Christian Heimes48aae572013-12-02 20:01:29 +0100354 @reap_threads
Christian Heimesaab99fd2013-12-15 19:39:32 +0100355 @unittest.skipUnless(HAS_SNI, 'No SNI support in ssl module')
Christian Heimes48aae572013-12-02 20:01:29 +0100356 def test_ssl_verified(self):
357 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
358 ssl_context.verify_mode = ssl.CERT_REQUIRED
359 ssl_context.check_hostname = True
360 ssl_context.load_verify_locations(CAFILE)
361
362 with self.assertRaisesRegex(ssl.CertificateError,
363 "hostname '127.0.0.1' doesn't match 'localhost'"):
364 with self.reaped_server(SimpleIMAPHandler) as server:
365 client = self.imap_class(*server.server_address,
366 ssl_context=ssl_context)
367 client.shutdown()
368
369 with self.reaped_server(SimpleIMAPHandler) as server:
370 client = self.imap_class("localhost", server.server_address[1],
371 ssl_context=ssl_context)
372 client.shutdown()
373
R. David Murraye8dc2582009-12-10 02:08:06 +0000374
Antoine Pitroub1436f12010-11-09 22:55:55 +0000375class RemoteIMAPTest(unittest.TestCase):
376 host = 'cyrus.andrew.cmu.edu'
377 port = 143
378 username = 'anonymous'
379 password = 'pass'
380 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000381
Antoine Pitroub1436f12010-11-09 22:55:55 +0000382 def setUp(self):
383 with transient_internet(self.host):
384 self.server = self.imap_class(self.host, self.port)
385
386 def tearDown(self):
387 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100388 with transient_internet(self.host):
389 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000390
391 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100392 with transient_internet(self.host):
393 for cap in self.server.capabilities:
394 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000395 self.assertIn('LOGINDISABLED', self.server.capabilities)
396 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100397 rs = self.server.login(self.username, self.password)
398 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000399
400 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100401 with transient_internet(self.host):
402 rs = self.server.logout()
403 self.server = None
404 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000405
406
407@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000408class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
409
410 def setUp(self):
411 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100412 with transient_internet(self.host):
413 rs = self.server.starttls()
414 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000415
416 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000417 for cap in self.server.capabilities:
418 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000419 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000420
421
422@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000423class RemoteIMAP_SSLTest(RemoteIMAPTest):
424 port = 993
425 imap_class = IMAP4_SSL
426
Antoine Pitrou08728162011-05-06 18:49:52 +0200427 def setUp(self):
428 pass
429
430 def tearDown(self):
431 pass
432
433 def create_ssl_context(self):
434 ssl_context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
435 ssl_context.load_cert_chain(CERTFILE)
436 return ssl_context
437
438 def check_logincapa(self, server):
439 try:
440 for cap in server.capabilities:
441 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000442 self.assertNotIn('LOGINDISABLED', server.capabilities)
443 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200444 rs = server.login(self.username, self.password)
445 self.assertEqual(rs[0], 'OK')
446 finally:
447 server.logout()
448
Antoine Pitroub1436f12010-11-09 22:55:55 +0000449 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200450 with transient_internet(self.host):
451 _server = self.imap_class(self.host, self.port)
452 self.check_logincapa(_server)
453
454 def test_logincapa_with_client_certfile(self):
455 with transient_internet(self.host):
456 _server = self.imap_class(self.host, self.port, certfile=CERTFILE)
457 self.check_logincapa(_server)
458
459 def test_logincapa_with_client_ssl_context(self):
460 with transient_internet(self.host):
461 _server = self.imap_class(self.host, self.port, ssl_context=self.create_ssl_context())
462 self.check_logincapa(_server)
463
464 def test_logout(self):
465 with transient_internet(self.host):
466 _server = self.imap_class(self.host, self.port)
467 rs = _server.logout()
468 self.assertEqual(rs[0], 'BYE')
469
470 def test_ssl_context_certfile_exclusive(self):
471 with transient_internet(self.host):
472 self.assertRaises(ValueError, self.imap_class, self.host, self.port,
473 certfile=CERTFILE, ssl_context=self.create_ssl_context())
474
475 def test_ssl_context_keyfile_exclusive(self):
476 with transient_internet(self.host):
477 self.assertRaises(ValueError, self.imap_class, self.host, self.port,
478 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitroub1436f12010-11-09 22:55:55 +0000479
480
Ezio Melotti02bf7012013-03-02 14:25:56 +0200481def load_tests(*args):
R. David Murraye8dc2582009-12-10 02:08:06 +0000482 tests = [TestImaplib]
483
484 if support.is_resource_enabled('network'):
485 if ssl:
Christian Heimes48aae572013-12-02 20:01:29 +0100486 global CERTFILE, CAFILE
R. David Murraye8dc2582009-12-10 02:08:06 +0000487 CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir,
Christian Heimes48aae572013-12-02 20:01:29 +0100488 "keycert3.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +0000489 if not os.path.exists(CERTFILE):
490 raise support.TestFailed("Can't read certificate files!")
Christian Heimes48aae572013-12-02 20:01:29 +0100491 CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir,
492 "pycacert.pem")
493 if not os.path.exists(CAFILE):
494 raise support.TestFailed("Can't read CA file!")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000495 tests.extend([
496 ThreadedNetworkedTests, ThreadedNetworkedTestsSSL,
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000497 RemoteIMAPTest, RemoteIMAP_SSLTest, RemoteIMAP_STARTTLSTest,
Antoine Pitroub1436f12010-11-09 22:55:55 +0000498 ])
R. David Murraye8dc2582009-12-10 02:08:06 +0000499
Ezio Melotti02bf7012013-03-02 14:25:56 +0200500 return unittest.TestSuite([unittest.makeSuite(test) for test in tests])
Christian Heimesf6cd9672008-03-26 13:45:42 +0000501
502
503if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +0200504 unittest.main()