blob: f16bacd0006c8767cbf201495285f8f1400ebeda [file] [log] [blame]
R. David Murraye8dc2582009-12-10 02:08:06 +00001from test import support
R. David Murraye8dc2582009-12-10 02:08:06 +00002
3from contextlib import contextmanager
Martin v. Löwisea752fb2002-01-05 11:31:49 +00004import imaplib
R. David Murraye8dc2582009-12-10 02:08:06 +00005import os.path
R. David Murraye8dc2582009-12-10 02:08:06 +00006import socketserver
Tim Peters108b7912002-07-31 16:42:33 +00007import time
Alexander Belopolsky7dabf162011-01-29 19:49:40 +00008import calendar
Antoine Pitroua6a4dc82017-09-07 18:56:24 +02009import threading
Martin v. Löwisea752fb2002-01-05 11:31:49 +000010
Antoine Pitroucac9e712014-07-31 18:35:45 -040011from test.support import (reap_threads, verbose, transient_internet,
Victor Stinnerb18563d2017-06-14 18:48:32 +020012 run_with_tz, run_with_locale, cpython_only)
Christian Heimesf6cd9672008-03-26 13:45:42 +000013import unittest
R David Murrayb079c072016-12-24 21:32:26 -050014from unittest import mock
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040015from datetime import datetime, timezone, timedelta
R. David Murraye8dc2582009-12-10 02:08:06 +000016try:
17 import ssl
18except ImportError:
19 ssl = None
20
Antoine Pitroucac9e712014-07-31 18:35:45 -040021CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
22CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
R. David Murraye8dc2582009-12-10 02:08:06 +000023
Martin v. Löwisea752fb2002-01-05 11:31:49 +000024
Christian Heimesf6cd9672008-03-26 13:45:42 +000025class TestImaplib(unittest.TestCase):
R. David Murraye8dc2582009-12-10 02:08:06 +000026
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000027 def test_Internaldate2tuple(self):
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000028 t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000029 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000030 b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
31 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000032 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000033 b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
34 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000035 tt = imaplib.Internaldate2tuple(
Alexander Belopolsky7dabf162011-01-29 19:49:40 +000036 b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
37 self.assertEqual(time.mktime(tt), t0)
Alexander Belopolsky19e0a9e2011-01-29 17:19:08 +000038
Alexander Belopolsky2420d832012-04-29 15:56:49 -040039 @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
40 def test_Internaldate2tuple_issue10941(self):
41 self.assertNotEqual(imaplib.Internaldate2tuple(
42 b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
Antoine Pitroucac9e712014-07-31 18:35:45 -040043 imaplib.Internaldate2tuple(
44 b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040045
46 def timevalues(self):
47 return [2000000000, 2000000000.0, time.localtime(2000000000),
48 (2033, 5, 18, 5, 33, 20, -1, -1, -1),
49 (2033, 5, 18, 5, 33, 20, -1, -1, 1),
Alexander Belopolsky64892132012-06-22 21:10:50 -040050 datetime.fromtimestamp(2000000000,
Antoine Pitroucac9e712014-07-31 18:35:45 -040051 timezone(timedelta(0, 2 * 60 * 60))),
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040052 '"18-May-2033 05:33:20 +0200"']
53
54 @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
Martin Panter6e0889f2015-11-16 07:21:38 +000055 # DST rules included to work around quirk where the Gnu C library may not
56 # otherwise restore the previous time zone
57 @run_with_tz('STD-1DST,M3.2.0,M11.1.0')
Alexander Belopolsky8141cc72012-06-22 21:03:39 -040058 def test_Time2Internaldate(self):
59 expected = '"18-May-2033 05:33:20 +0200"'
60
61 for t in self.timevalues():
62 internal = imaplib.Time2Internaldate(t)
63 self.assertEqual(internal, expected)
64
65 def test_that_Time2Internaldate_returns_a_result(self):
66 # Without tzset, we can check only that it successfully
67 # produces a result, not the correctness of the result itself,
68 # since the result depends on the timezone the machine is in.
69 for t in self.timevalues():
Christian Heimesf6cd9672008-03-26 13:45:42 +000070 imaplib.Time2Internaldate(t)
71
72
R. David Murraye8dc2582009-12-10 02:08:06 +000073if ssl:
R. David Murraye8dc2582009-12-10 02:08:06 +000074 class SecureTCPServer(socketserver.TCPServer):
75
76 def get_request(self):
77 newsocket, fromaddr = self.socket.accept()
Christian Heimesd0486372016-09-10 23:23:33 +020078 context = ssl.SSLContext()
79 context.load_cert_chain(CERTFILE)
80 connstream = context.wrap_socket(newsocket, server_side=True)
R. David Murraye8dc2582009-12-10 02:08:06 +000081 return connstream, fromaddr
82
83 IMAP4_SSL = imaplib.IMAP4_SSL
84
85else:
86
87 class SecureTCPServer:
88 pass
89
90 IMAP4_SSL = None
91
92
93class SimpleIMAPHandler(socketserver.StreamRequestHandler):
R. David Murraye8dc2582009-12-10 02:08:06 +000094 timeout = 1
R David Murray774a39f2013-02-19 12:17:31 -050095 continuation = None
96 capabilities = ''
R. David Murraye8dc2582009-12-10 02:08:06 +000097
Serhiy Storchaka38684c32014-09-09 19:07:49 +030098 def setup(self):
99 super().setup()
100 self.server.logged = None
101
R. David Murraye8dc2582009-12-10 02:08:06 +0000102 def _send(self, message):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400103 if verbose:
104 print("SENT: %r" % message.strip())
R. David Murraye8dc2582009-12-10 02:08:06 +0000105 self.wfile.write(message)
106
R David Murray774a39f2013-02-19 12:17:31 -0500107 def _send_line(self, message):
108 self._send(message + b'\r\n')
109
110 def _send_textline(self, message):
111 self._send_line(message.encode('ASCII'))
112
113 def _send_tagged(self, tag, code, message):
114 self._send_textline(' '.join((tag, code, message)))
115
R. David Murraye8dc2582009-12-10 02:08:06 +0000116 def handle(self):
117 # Send a welcome message.
R David Murray774a39f2013-02-19 12:17:31 -0500118 self._send_textline('* OK IMAP4rev1')
R. David Murraye8dc2582009-12-10 02:08:06 +0000119 while 1:
120 # Gather up input until we receive a line terminator or we timeout.
121 # Accumulate read(1) because it's simpler to handle the differences
122 # between naked sockets and SSL sockets.
123 line = b''
124 while 1:
125 try:
126 part = self.rfile.read(1)
127 if part == b'':
128 # Naked sockets return empty strings..
129 return
130 line += part
Andrew Svetlovf7a17b42012-12-25 16:47:37 +0200131 except OSError:
Andrew Svetlov737fb892012-12-18 21:14:22 +0200132 # ..but SSLSockets raise exceptions.
R. David Murraye8dc2582009-12-10 02:08:06 +0000133 return
134 if line.endswith(b'\r\n'):
135 break
136
Antoine Pitroucac9e712014-07-31 18:35:45 -0400137 if verbose:
138 print('GOT: %r' % line.strip())
R David Murray774a39f2013-02-19 12:17:31 -0500139 if self.continuation:
140 try:
141 self.continuation.send(line)
142 except StopIteration:
143 self.continuation = None
144 continue
145 splitline = line.decode('ASCII').split()
146 tag = splitline[0]
147 cmd = splitline[1]
R. David Murraye8dc2582009-12-10 02:08:06 +0000148 args = splitline[2:]
149
Antoine Pitroucac9e712014-07-31 18:35:45 -0400150 if hasattr(self, 'cmd_' + cmd):
151 continuation = getattr(self, 'cmd_' + cmd)(tag, args)
R David Murray774a39f2013-02-19 12:17:31 -0500152 if continuation:
153 self.continuation = continuation
154 next(continuation)
R. David Murraye8dc2582009-12-10 02:08:06 +0000155 else:
R David Murray774a39f2013-02-19 12:17:31 -0500156 self._send_tagged(tag, 'BAD', cmd + ' unknown')
R. David Murraye8dc2582009-12-10 02:08:06 +0000157
158 def cmd_CAPABILITY(self, tag, args):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400159 caps = ('IMAP4rev1 ' + self.capabilities
160 if self.capabilities
161 else 'IMAP4rev1')
R David Murray774a39f2013-02-19 12:17:31 -0500162 self._send_textline('* CAPABILITY ' + caps)
163 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
164
165 def cmd_LOGOUT(self, tag, args):
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300166 self.server.logged = None
R David Murray774a39f2013-02-19 12:17:31 -0500167 self._send_textline('* BYE IMAP4ref1 Server logging out')
168 self._send_tagged(tag, 'OK', 'LOGOUT completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000169
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300170 def cmd_LOGIN(self, tag, args):
171 self.server.logged = args[0]
172 self._send_tagged(tag, 'OK', 'LOGIN completed')
173
R. David Murraye8dc2582009-12-10 02:08:06 +0000174
R David Murrayb079c072016-12-24 21:32:26 -0500175class NewIMAPTestsMixin():
176 client = None
177
178 def _setup(self, imap_handler, connect=True):
179 """
180 Sets up imap_handler for tests. imap_handler should inherit from either:
181 - SimpleIMAPHandler - for testing IMAP commands,
182 - socketserver.StreamRequestHandler - if raw access to stream is needed.
183 Returns (client, server).
184 """
185 class TestTCPServer(self.server_class):
186 def handle_error(self, request, client_address):
187 """
188 End request and raise the error if one occurs.
189 """
190 self.close_request(request)
191 self.server_close()
192 raise
193
194 self.addCleanup(self._cleanup)
195 self.server = self.server_class((support.HOST, 0), imap_handler)
196 self.thread = threading.Thread(
197 name=self._testMethodName+'-server',
198 target=self.server.serve_forever,
199 # Short poll interval to make the test finish quickly.
200 # Time between requests is short enough that we won't wake
201 # up spuriously too many times.
202 kwargs={'poll_interval': 0.01})
203 self.thread.daemon = True # In case this function raises.
204 self.thread.start()
205
206 if connect:
207 self.client = self.imap_class(*self.server.server_address)
208
209 return self.client, self.server
210
211 def _cleanup(self):
212 """
213 Cleans up the test server. This method should not be called manually,
214 it is added to the cleanup queue in the _setup method already.
215 """
216 # if logout was called already we'd raise an exception trying to
217 # shutdown the client once again
218 if self.client is not None and self.client.state != 'LOGOUT':
219 self.client.shutdown()
220 # cleanup the server
221 self.server.shutdown()
222 self.server.server_close()
Victor Stinnerb9b69002017-09-14 14:40:56 -0700223 support.join_thread(self.thread, 3.0)
224 # Explicitly clear the attribute to prevent dangling thread
225 self.thread = None
R David Murrayb079c072016-12-24 21:32:26 -0500226
227 def test_EOF_without_complete_welcome_message(self):
228 # http://bugs.python.org/issue5949
229 class EOFHandler(socketserver.StreamRequestHandler):
230 def handle(self):
231 self.wfile.write(b'* OK')
232 _, server = self._setup(EOFHandler, connect=False)
233 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
234 *server.server_address)
235
236 def test_line_termination(self):
237 class BadNewlineHandler(SimpleIMAPHandler):
238 def cmd_CAPABILITY(self, tag, args):
239 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
240 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
241 _, server = self._setup(BadNewlineHandler, connect=False)
242 self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
243 *server.server_address)
244
245 def test_enable_raises_error_if_not_AUTH(self):
246 class EnableHandler(SimpleIMAPHandler):
247 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
248 client, _ = self._setup(EnableHandler)
249 self.assertFalse(client.utf8_enabled)
250 with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
251 client.enable('foo')
252 self.assertFalse(client.utf8_enabled)
253
254 def test_enable_raises_error_if_no_capability(self):
255 client, _ = self._setup(SimpleIMAPHandler)
256 with self.assertRaisesRegex(imaplib.IMAP4.error,
257 'does not support ENABLE'):
258 client.enable('foo')
259
260 def test_enable_UTF8_raises_error_if_not_supported(self):
261 client, _ = self._setup(SimpleIMAPHandler)
262 typ, data = client.login('user', 'pass')
263 self.assertEqual(typ, 'OK')
264 with self.assertRaisesRegex(imaplib.IMAP4.error,
265 'does not support ENABLE'):
266 client.enable('UTF8=ACCEPT')
267
268 def test_enable_UTF8_True_append(self):
269 class UTF8AppendServer(SimpleIMAPHandler):
270 capabilities = 'ENABLE UTF8=ACCEPT'
271 def cmd_ENABLE(self, tag, args):
272 self._send_tagged(tag, 'OK', 'ENABLE successful')
273 def cmd_AUTHENTICATE(self, tag, args):
274 self._send_textline('+')
275 self.server.response = yield
276 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
277 def cmd_APPEND(self, tag, args):
278 self._send_textline('+')
279 self.server.response = yield
280 self._send_tagged(tag, 'OK', 'okay')
281 client, server = self._setup(UTF8AppendServer)
282 self.assertEqual(client._encoding, 'ascii')
283 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
284 self.assertEqual(code, 'OK')
285 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
286 code, _ = client.enable('UTF8=ACCEPT')
287 self.assertEqual(code, 'OK')
288 self.assertEqual(client._encoding, 'utf-8')
289 msg_string = 'Subject: üñí©öðé'
290 typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
291 self.assertEqual(typ, 'OK')
292 self.assertEqual(server.response,
293 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
294
295 def test_search_disallows_charset_in_utf8_mode(self):
296 class UTF8Server(SimpleIMAPHandler):
297 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
298 def cmd_ENABLE(self, tag, args):
299 self._send_tagged(tag, 'OK', 'ENABLE successful')
300 def cmd_AUTHENTICATE(self, tag, args):
301 self._send_textline('+')
302 self.server.response = yield
303 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
304 client, _ = self._setup(UTF8Server)
305 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
306 self.assertEqual(typ, 'OK')
307 typ, _ = client.enable('UTF8=ACCEPT')
308 self.assertEqual(typ, 'OK')
309 self.assertTrue(client.utf8_enabled)
310 with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
311 client.search('foo', 'bar')
312
313 def test_bad_auth_name(self):
314 class MyServer(SimpleIMAPHandler):
315 def cmd_AUTHENTICATE(self, tag, args):
316 self._send_tagged(tag, 'NO',
317 'unrecognized authentication type {}'.format(args[0]))
318 client, _ = self._setup(MyServer)
319 with self.assertRaisesRegex(imaplib.IMAP4.error,
320 'unrecognized authentication type METHOD'):
321 client.authenticate('METHOD', lambda: 1)
322
323 def test_invalid_authentication(self):
324 class MyServer(SimpleIMAPHandler):
325 def cmd_AUTHENTICATE(self, tag, args):
326 self._send_textline('+')
327 self.response = yield
328 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
329 client, _ = self._setup(MyServer)
330 with self.assertRaisesRegex(imaplib.IMAP4.error,
331 r'\[AUTHENTICATIONFAILED\] invalid'):
332 client.authenticate('MYAUTH', lambda x: b'fake')
333
334 def test_valid_authentication_bytes(self):
335 class MyServer(SimpleIMAPHandler):
336 def cmd_AUTHENTICATE(self, tag, args):
337 self._send_textline('+')
338 self.server.response = yield
339 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
340 client, server = self._setup(MyServer)
341 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
342 self.assertEqual(code, 'OK')
343 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
344
345 def test_valid_authentication_plain_text(self):
346 class MyServer(SimpleIMAPHandler):
347 def cmd_AUTHENTICATE(self, tag, args):
348 self._send_textline('+')
349 self.server.response = yield
350 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
351 client, server = self._setup(MyServer)
352 code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
353 self.assertEqual(code, 'OK')
354 self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
355
356 def test_login_cram_md5_bytes(self):
357 class AuthHandler(SimpleIMAPHandler):
358 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
359 def cmd_AUTHENTICATE(self, tag, args):
360 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
361 'VzdG9uLm1jaS5uZXQ=')
362 r = yield
363 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
364 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
365 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
366 else:
367 self._send_tagged(tag, 'NO', 'No access')
368 client, _ = self._setup(AuthHandler)
369 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
370 ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
371 self.assertEqual(ret, "OK")
372
373 def test_login_cram_md5_plain_text(self):
374 class AuthHandler(SimpleIMAPHandler):
375 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
376 def cmd_AUTHENTICATE(self, tag, args):
377 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
378 'VzdG9uLm1jaS5uZXQ=')
379 r = yield
380 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
381 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
382 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
383 else:
384 self._send_tagged(tag, 'NO', 'No access')
385 client, _ = self._setup(AuthHandler)
386 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
387 ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
388 self.assertEqual(ret, "OK")
389
390 def test_aborted_authentication(self):
391 class MyServer(SimpleIMAPHandler):
392 def cmd_AUTHENTICATE(self, tag, args):
393 self._send_textline('+')
394 self.response = yield
395 if self.response == b'*\r\n':
396 self._send_tagged(
397 tag,
398 'NO',
399 '[AUTHENTICATIONFAILED] aborted')
400 else:
401 self._send_tagged(tag, 'OK', 'MYAUTH successful')
402 client, _ = self._setup(MyServer)
403 with self.assertRaisesRegex(imaplib.IMAP4.error,
404 r'\[AUTHENTICATIONFAILED\] aborted'):
405 client.authenticate('MYAUTH', lambda x: None)
406
407 @mock.patch('imaplib._MAXLINE', 10)
408 def test_linetoolong(self):
409 class TooLongHandler(SimpleIMAPHandler):
410 def handle(self):
411 # send response line longer than the limit set in the next line
412 self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
413 _, server = self._setup(TooLongHandler, connect=False)
414 with self.assertRaisesRegex(imaplib.IMAP4.error,
415 'got more than 10 bytes'):
416 self.imap_class(*server.server_address)
417
418 def test_simple_with_statement(self):
419 _, server = self._setup(SimpleIMAPHandler, connect=False)
420 with self.imap_class(*server.server_address):
421 pass
422
423 def test_with_statement(self):
424 _, server = self._setup(SimpleIMAPHandler, connect=False)
425 with self.imap_class(*server.server_address) as imap:
426 imap.login('user', 'pass')
427 self.assertEqual(server.logged, 'user')
428 self.assertIsNone(server.logged)
429
430 def test_with_statement_logout(self):
431 # It is legal to log out explicitly inside the with block
432 _, server = self._setup(SimpleIMAPHandler, connect=False)
433 with self.imap_class(*server.server_address) as imap:
434 imap.login('user', 'pass')
435 self.assertEqual(server.logged, 'user')
436 imap.logout()
437 self.assertIsNone(server.logged)
438 self.assertIsNone(server.logged)
439
440 # command tests
441
442 def test_login(self):
443 client, _ = self._setup(SimpleIMAPHandler)
444 typ, data = client.login('user', 'pass')
445 self.assertEqual(typ, 'OK')
446 self.assertEqual(data[0], b'LOGIN completed')
447 self.assertEqual(client.state, 'AUTH')
448
449 def test_logout(self):
450 client, _ = self._setup(SimpleIMAPHandler)
451 typ, data = client.login('user', 'pass')
452 self.assertEqual(typ, 'OK')
453 self.assertEqual(data[0], b'LOGIN completed')
454 typ, data = client.logout()
455 self.assertEqual(typ, 'BYE')
456 self.assertEqual(data[0], b'IMAP4ref1 Server logging out')
457 self.assertEqual(client.state, 'LOGOUT')
458
459 def test_lsub(self):
460 class LsubCmd(SimpleIMAPHandler):
461 def cmd_LSUB(self, tag, args):
462 self._send_textline('* LSUB () "." directoryA')
463 return self._send_tagged(tag, 'OK', 'LSUB completed')
464 client, _ = self._setup(LsubCmd)
465 client.login('user', 'pass')
466 typ, data = client.lsub()
467 self.assertEqual(typ, 'OK')
468 self.assertEqual(data[0], b'() "." directoryA')
469
470
471class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
472 imap_class = imaplib.IMAP4
473 server_class = socketserver.TCPServer
474
475
476@unittest.skipUnless(ssl, "SSL not available")
477class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
Victor Stinnerde383282017-01-12 11:51:31 +0100478 imap_class = IMAP4_SSL
R David Murrayb079c072016-12-24 21:32:26 -0500479 server_class = SecureTCPServer
480
481 def test_ssl_raises(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200482 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
483 self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
484 self.assertEqual(ssl_context.check_hostname, True)
R David Murrayb079c072016-12-24 21:32:26 -0500485 ssl_context.load_verify_locations(CAFILE)
486
487 with self.assertRaisesRegex(ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100488 "IP address mismatch, certificate is not valid for "
489 "'127.0.0.1'"):
R David Murrayb079c072016-12-24 21:32:26 -0500490 _, server = self._setup(SimpleIMAPHandler)
491 client = self.imap_class(*server.server_address,
492 ssl_context=ssl_context)
493 client.shutdown()
494
495 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200496 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
R David Murrayb079c072016-12-24 21:32:26 -0500497 ssl_context.load_verify_locations(CAFILE)
498
499 _, server = self._setup(SimpleIMAPHandler)
500 client = self.imap_class("localhost", server.server_address[1],
501 ssl_context=ssl_context)
502 client.shutdown()
503
Victor Stinnerb18563d2017-06-14 18:48:32 +0200504 # Mock the private method _connect(), so mark the test as specific
505 # to CPython stdlib
506 @cpython_only
507 def test_certfile_arg_warn(self):
508 with support.check_warnings(('', DeprecationWarning)):
509 with mock.patch.object(self.imap_class, 'open'):
510 with mock.patch.object(self.imap_class, '_connect'):
511 self.imap_class('localhost', 143, certfile=CERTFILE)
512
Antoine Pitroucac9e712014-07-31 18:35:45 -0400513class ThreadedNetworkedTests(unittest.TestCase):
514 server_class = socketserver.TCPServer
515 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000516
517 def make_server(self, addr, hdlr):
518
519 class MyServer(self.server_class):
520 def handle_error(self, request, client_address):
521 self.close_request(request)
522 self.server_close()
523 raise
524
Antoine Pitroucac9e712014-07-31 18:35:45 -0400525 if verbose:
526 print("creating server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000527 server = MyServer(addr, hdlr)
Ezio Melottib3aedd42010-11-20 19:04:17 +0000528 self.assertEqual(server.server_address, server.socket.getsockname())
R. David Murraye8dc2582009-12-10 02:08:06 +0000529
530 if verbose:
531 print("server created")
532 print("ADDR =", addr)
533 print("CLASS =", self.server_class)
534 print("HDLR =", server.RequestHandlerClass)
535
536 t = threading.Thread(
537 name='%s serving' % self.server_class,
538 target=server.serve_forever,
539 # Short poll interval to make the test finish quickly.
540 # Time between requests is short enough that we won't wake
541 # up spuriously too many times.
Antoine Pitroucac9e712014-07-31 18:35:45 -0400542 kwargs={'poll_interval': 0.01})
R. David Murraye8dc2582009-12-10 02:08:06 +0000543 t.daemon = True # In case this function raises.
544 t.start()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400545 if verbose:
546 print("server running")
R. David Murraye8dc2582009-12-10 02:08:06 +0000547 return server, t
548
549 def reap_server(self, server, thread):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400550 if verbose:
551 print("waiting for server")
R. David Murraye8dc2582009-12-10 02:08:06 +0000552 server.shutdown()
Victor Stinner73efd622011-01-05 23:01:38 +0000553 server.server_close()
R. David Murraye8dc2582009-12-10 02:08:06 +0000554 thread.join()
Antoine Pitroucac9e712014-07-31 18:35:45 -0400555 if verbose:
556 print("done")
R. David Murraye8dc2582009-12-10 02:08:06 +0000557
558 @contextmanager
559 def reaped_server(self, hdlr):
560 server, thread = self.make_server((support.HOST, 0), hdlr)
561 try:
562 yield server
563 finally:
564 self.reap_server(server, thread)
565
R David Murray774a39f2013-02-19 12:17:31 -0500566 @contextmanager
567 def reaped_pair(self, hdlr):
Charles-François Natali9b116e82013-12-07 20:27:41 +0100568 with self.reaped_server(hdlr) as server:
569 client = self.imap_class(*server.server_address)
570 try:
571 yield server, client
572 finally:
573 client.logout()
R David Murray774a39f2013-02-19 12:17:31 -0500574
R. David Murraye8dc2582009-12-10 02:08:06 +0000575 @reap_threads
576 def test_connect(self):
577 with self.reaped_server(SimpleIMAPHandler) as server:
578 client = self.imap_class(*server.server_address)
579 client.shutdown()
580
581 @reap_threads
R David Murray317f64f2016-01-02 17:18:34 -0500582 def test_bracket_flags(self):
583
584 # This violates RFC 3501, which disallows ']' characters in tag names,
585 # but imaplib has allowed producing such tags forever, other programs
586 # also produce them (eg: OtherInbox's Organizer app as of 20140716),
587 # and Gmail, for example, accepts them and produces them. So we
588 # support them. See issue #21815.
589
590 class BracketFlagHandler(SimpleIMAPHandler):
591
592 def handle(self):
593 self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
594 super().handle()
595
596 def cmd_AUTHENTICATE(self, tag, args):
597 self._send_textline('+')
598 self.server.response = yield
599 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
600
601 def cmd_SELECT(self, tag, args):
602 flag_msg = ' \\'.join(self.flags)
603 self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
604 self._send_line(b'* 2 EXISTS')
605 self._send_line(b'* 0 RECENT')
606 msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
607 % flag_msg)
608 self._send_line(msg.encode('ascii'))
609 self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
610
611 def cmd_STORE(self, tag, args):
612 new_flags = args[2].strip('(').strip(')').split()
613 self.flags.extend(new_flags)
614 flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
615 msg = '* %s FETCH %s' % (args[0], flags_msg)
616 self._send_line(msg.encode('ascii'))
617 self._send_tagged(tag, 'OK', 'STORE completed.')
618
619 with self.reaped_pair(BracketFlagHandler) as (server, client):
620 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
621 self.assertEqual(code, 'OK')
622 self.assertEqual(server.response, b'ZmFrZQ==\r\n')
623 client.select('test')
624 typ, [data] = client.store(b'1', "+FLAGS", "[test]")
625 self.assertIn(b'[test]', data)
626 client.select('test')
627 typ, [data] = client.response('PERMANENTFLAGS')
628 self.assertIn(b'[test]', data)
629
630 @reap_threads
R. David Murraye8dc2582009-12-10 02:08:06 +0000631 def test_issue5949(self):
632
633 class EOFHandler(socketserver.StreamRequestHandler):
634 def handle(self):
635 # EOF without sending a complete welcome message.
636 self.wfile.write(b'* OK')
637
638 with self.reaped_server(EOFHandler) as server:
639 self.assertRaises(imaplib.IMAP4.abort,
640 self.imap_class, *server.server_address)
641
642 @reap_threads
643 def test_line_termination(self):
644
645 class BadNewlineHandler(SimpleIMAPHandler):
646
647 def cmd_CAPABILITY(self, tag, args):
648 self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
R David Murray774a39f2013-02-19 12:17:31 -0500649 self._send_tagged(tag, 'OK', 'CAPABILITY completed')
R. David Murraye8dc2582009-12-10 02:08:06 +0000650
651 with self.reaped_server(BadNewlineHandler) as server:
652 self.assertRaises(imaplib.IMAP4.abort,
653 self.imap_class, *server.server_address)
654
R David Murraya6429db2015-05-10 19:17:23 -0400655 class UTF8Server(SimpleIMAPHandler):
656 capabilities = 'AUTH ENABLE UTF8=ACCEPT'
657
658 def cmd_ENABLE(self, tag, args):
659 self._send_tagged(tag, 'OK', 'ENABLE successful')
660
661 def cmd_AUTHENTICATE(self, tag, args):
662 self._send_textline('+')
663 self.server.response = yield
664 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
665
666 @reap_threads
667 def test_enable_raises_error_if_not_AUTH(self):
668 with self.reaped_pair(self.UTF8Server) as (server, client):
669 self.assertFalse(client.utf8_enabled)
670 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
671 self.assertFalse(client.utf8_enabled)
672
673 # XXX Also need a test that enable after SELECT raises an error.
674
675 @reap_threads
676 def test_enable_raises_error_if_no_capability(self):
677 class NoEnableServer(self.UTF8Server):
678 capabilities = 'AUTH'
679 with self.reaped_pair(NoEnableServer) as (server, client):
680 self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
681
682 @reap_threads
683 def test_enable_UTF8_raises_error_if_not_supported(self):
684 class NonUTF8Server(SimpleIMAPHandler):
685 pass
686 with self.assertRaises(imaplib.IMAP4.error):
687 with self.reaped_pair(NonUTF8Server) as (server, client):
688 typ, data = client.login('user', 'pass')
689 self.assertEqual(typ, 'OK')
690 client.enable('UTF8=ACCEPT')
691 pass
692
693 @reap_threads
694 def test_enable_UTF8_True_append(self):
695
696 class UTF8AppendServer(self.UTF8Server):
697 def cmd_APPEND(self, tag, args):
698 self._send_textline('+')
699 self.server.response = yield
700 self._send_tagged(tag, 'OK', 'okay')
701
702 with self.reaped_pair(UTF8AppendServer) as (server, client):
703 self.assertEqual(client._encoding, 'ascii')
704 code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
705 self.assertEqual(code, 'OK')
706 self.assertEqual(server.response,
707 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
708 code, _ = client.enable('UTF8=ACCEPT')
709 self.assertEqual(code, 'OK')
710 self.assertEqual(client._encoding, 'utf-8')
711 msg_string = 'Subject: üñí©öðé'
712 typ, data = client.append(
713 None, None, None, msg_string.encode('utf-8'))
714 self.assertEqual(typ, 'OK')
715 self.assertEqual(
716 server.response,
717 ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
718 )
719
720 # XXX also need a test that makes sure that the Literal and Untagged_status
721 # regexes uses unicode in UTF8 mode instead of the default ASCII.
722
723 @reap_threads
724 def test_search_disallows_charset_in_utf8_mode(self):
725 with self.reaped_pair(self.UTF8Server) as (server, client):
726 typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
727 self.assertEqual(typ, 'OK')
728 typ, _ = client.enable('UTF8=ACCEPT')
729 self.assertEqual(typ, 'OK')
730 self.assertTrue(client.utf8_enabled)
731 self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
732
R David Murray774a39f2013-02-19 12:17:31 -0500733 @reap_threads
734 def test_bad_auth_name(self):
735
736 class MyServer(SimpleIMAPHandler):
737
738 def cmd_AUTHENTICATE(self, tag, args):
739 self._send_tagged(tag, 'NO', 'unrecognized authentication '
Antoine Pitroucac9e712014-07-31 18:35:45 -0400740 'type {}'.format(args[0]))
R David Murray774a39f2013-02-19 12:17:31 -0500741
742 with self.reaped_pair(MyServer) as (server, client):
743 with self.assertRaises(imaplib.IMAP4.error):
744 client.authenticate('METHOD', lambda: 1)
745
746 @reap_threads
747 def test_invalid_authentication(self):
748
749 class MyServer(SimpleIMAPHandler):
750
751 def cmd_AUTHENTICATE(self, tag, args):
752 self._send_textline('+')
753 self.response = yield
754 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
755
756 with self.reaped_pair(MyServer) as (server, client):
757 with self.assertRaises(imaplib.IMAP4.error):
758 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
759
760 @reap_threads
761 def test_valid_authentication(self):
762
763 class MyServer(SimpleIMAPHandler):
764
765 def cmd_AUTHENTICATE(self, tag, args):
766 self._send_textline('+')
767 self.server.response = yield
768 self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
769
770 with self.reaped_pair(MyServer) as (server, client):
771 code, data = client.authenticate('MYAUTH', lambda x: b'fake')
772 self.assertEqual(code, 'OK')
773 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400774 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500775
776 with self.reaped_pair(MyServer) as (server, client):
777 code, data = client.authenticate('MYAUTH', lambda x: 'fake')
778 self.assertEqual(code, 'OK')
779 self.assertEqual(server.response,
Antoine Pitroucac9e712014-07-31 18:35:45 -0400780 b'ZmFrZQ==\r\n') # b64 encoded 'fake'
R David Murray774a39f2013-02-19 12:17:31 -0500781
782 @reap_threads
783 def test_login_cram_md5(self):
784
785 class AuthHandler(SimpleIMAPHandler):
786
787 capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
788
789 def cmd_AUTHENTICATE(self, tag, args):
790 self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
Antoine Pitroucac9e712014-07-31 18:35:45 -0400791 'VzdG9uLm1jaS5uZXQ=')
R David Murray774a39f2013-02-19 12:17:31 -0500792 r = yield
Antoine Pitroucac9e712014-07-31 18:35:45 -0400793 if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
794 b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
R David Murray774a39f2013-02-19 12:17:31 -0500795 self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
796 else:
797 self._send_tagged(tag, 'NO', 'No access')
798
799 with self.reaped_pair(AuthHandler) as (server, client):
800 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
801 ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
802 self.assertEqual(ret, "OK")
803
804 with self.reaped_pair(AuthHandler) as (server, client):
805 self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
806 ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
807 self.assertEqual(ret, "OK")
R. David Murraye8dc2582009-12-10 02:08:06 +0000808
809
Robert Collins5ccc18f2015-07-31 08:59:02 +1200810 @reap_threads
811 def test_aborted_authentication(self):
812
813 class MyServer(SimpleIMAPHandler):
814
815 def cmd_AUTHENTICATE(self, tag, args):
816 self._send_textline('+')
817 self.response = yield
818
819 if self.response == b'*\r\n':
820 self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
821 else:
822 self._send_tagged(tag, 'OK', 'MYAUTH successful')
823
824 with self.reaped_pair(MyServer) as (server, client):
825 with self.assertRaises(imaplib.IMAP4.error):
826 code, data = client.authenticate('MYAUTH', lambda x: None)
827
Robert Collins78378e82015-07-31 09:01:38 +1200828
Georg Brandlca580f42013-10-27 06:52:14 +0100829 def test_linetoolong(self):
830 class TooLongHandler(SimpleIMAPHandler):
831 def handle(self):
832 # Send a very long response line
Antoine Pitroucac9e712014-07-31 18:35:45 -0400833 self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
Georg Brandlca580f42013-10-27 06:52:14 +0100834
835 with self.reaped_server(TooLongHandler) as server:
836 self.assertRaises(imaplib.IMAP4.error,
837 self.imap_class, *server.server_address)
838
Serhiy Storchaka38684c32014-09-09 19:07:49 +0300839 @reap_threads
840 def test_simple_with_statement(self):
841 # simplest call
842 with self.reaped_server(SimpleIMAPHandler) as server:
843 with self.imap_class(*server.server_address):
844 pass
845
846 @reap_threads
847 def test_with_statement(self):
848 with self.reaped_server(SimpleIMAPHandler) as server:
849 with self.imap_class(*server.server_address) as imap:
850 imap.login('user', 'pass')
851 self.assertEqual(server.logged, 'user')
852 self.assertIsNone(server.logged)
853
854 @reap_threads
855 def test_with_statement_logout(self):
856 # what happens if already logout in the block?
857 with self.reaped_server(SimpleIMAPHandler) as server:
858 with self.imap_class(*server.server_address) as imap:
859 imap.login('user', 'pass')
860 self.assertEqual(server.logged, 'user')
861 imap.logout()
862 self.assertIsNone(server.logged)
863 self.assertIsNone(server.logged)
864
Georg Brandlca580f42013-10-27 06:52:14 +0100865
R. David Murraye8dc2582009-12-10 02:08:06 +0000866@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400867class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
R. David Murraye8dc2582009-12-10 02:08:06 +0000868 server_class = SecureTCPServer
869 imap_class = IMAP4_SSL
870
Christian Heimes48aae572013-12-02 20:01:29 +0100871 @reap_threads
872 def test_ssl_verified(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200873 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
Christian Heimes48aae572013-12-02 20:01:29 +0100874 ssl_context.load_verify_locations(CAFILE)
875
Antoine Pitroucac9e712014-07-31 18:35:45 -0400876 with self.assertRaisesRegex(
877 ssl.CertificateError,
Christian Heimes61d478c2018-01-27 15:51:38 +0100878 "IP address mismatch, certificate is not valid for "
879 "'127.0.0.1'"):
Christian Heimes48aae572013-12-02 20:01:29 +0100880 with self.reaped_server(SimpleIMAPHandler) as server:
881 client = self.imap_class(*server.server_address,
882 ssl_context=ssl_context)
883 client.shutdown()
884
885 with self.reaped_server(SimpleIMAPHandler) as server:
886 client = self.imap_class("localhost", server.server_address[1],
887 ssl_context=ssl_context)
888 client.shutdown()
889
R. David Murraye8dc2582009-12-10 02:08:06 +0000890
Antoine Pitroucac9e712014-07-31 18:35:45 -0400891@unittest.skipUnless(
892 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000893class RemoteIMAPTest(unittest.TestCase):
894 host = 'cyrus.andrew.cmu.edu'
895 port = 143
896 username = 'anonymous'
897 password = 'pass'
898 imap_class = imaplib.IMAP4
R. David Murraye8dc2582009-12-10 02:08:06 +0000899
Antoine Pitroub1436f12010-11-09 22:55:55 +0000900 def setUp(self):
901 with transient_internet(self.host):
902 self.server = self.imap_class(self.host, self.port)
903
904 def tearDown(self):
905 if self.server is not None:
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100906 with transient_internet(self.host):
907 self.server.logout()
Antoine Pitroub1436f12010-11-09 22:55:55 +0000908
909 def test_logincapa(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100910 with transient_internet(self.host):
911 for cap in self.server.capabilities:
912 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000913 self.assertIn('LOGINDISABLED', self.server.capabilities)
914 self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100915 rs = self.server.login(self.username, self.password)
916 self.assertEqual(rs[0], 'OK')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000917
918 def test_logout(self):
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100919 with transient_internet(self.host):
920 rs = self.server.logout()
921 self.server = None
922 self.assertEqual(rs[0], 'BYE')
Antoine Pitroub1436f12010-11-09 22:55:55 +0000923
924
925@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroucac9e712014-07-31 18:35:45 -0400926@unittest.skipUnless(
927 support.is_resource_enabled('network'), 'network resource disabled')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000928class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
929
930 def setUp(self):
931 super().setUp()
Antoine Pitrou924cbea2011-03-23 03:10:14 +0100932 with transient_internet(self.host):
933 rs = self.server.starttls()
934 self.assertEqual(rs[0], 'OK')
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000935
936 def test_logincapa(self):
Antoine Pitroudbe75192010-11-16 17:55:26 +0000937 for cap in self.server.capabilities:
938 self.assertIsInstance(cap, str)
Nick Coghlane6ef4622012-06-17 21:10:21 +1000939 self.assertNotIn('LOGINDISABLED', self.server.capabilities)
Antoine Pitrouf3b001f2010-11-12 18:49:16 +0000940
941
942@unittest.skipUnless(ssl, "SSL not available")
Antoine Pitroub1436f12010-11-09 22:55:55 +0000943class RemoteIMAP_SSLTest(RemoteIMAPTest):
944 port = 993
945 imap_class = IMAP4_SSL
946
Antoine Pitrou08728162011-05-06 18:49:52 +0200947 def setUp(self):
948 pass
949
950 def tearDown(self):
951 pass
952
953 def create_ssl_context(self):
Christian Heimesa170fa12017-09-15 20:27:30 +0200954 ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
955 ssl_context.check_hostname = False
956 ssl_context.verify_mode = ssl.CERT_NONE
Antoine Pitrou08728162011-05-06 18:49:52 +0200957 ssl_context.load_cert_chain(CERTFILE)
958 return ssl_context
959
960 def check_logincapa(self, server):
961 try:
962 for cap in server.capabilities:
963 self.assertIsInstance(cap, str)
Nick Coghlane51e25a2012-06-17 21:15:45 +1000964 self.assertNotIn('LOGINDISABLED', server.capabilities)
965 self.assertIn('AUTH=PLAIN', server.capabilities)
Antoine Pitrou08728162011-05-06 18:49:52 +0200966 rs = server.login(self.username, self.password)
967 self.assertEqual(rs[0], 'OK')
968 finally:
969 server.logout()
970
Antoine Pitroub1436f12010-11-09 22:55:55 +0000971 def test_logincapa(self):
Antoine Pitrou08728162011-05-06 18:49:52 +0200972 with transient_internet(self.host):
973 _server = self.imap_class(self.host, self.port)
974 self.check_logincapa(_server)
975
Antoine Pitrou08728162011-05-06 18:49:52 +0200976 def test_logout(self):
977 with transient_internet(self.host):
978 _server = self.imap_class(self.host, self.port)
979 rs = _server.logout()
980 self.assertEqual(rs[0], 'BYE')
981
982 def test_ssl_context_certfile_exclusive(self):
983 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400984 self.assertRaises(
985 ValueError, self.imap_class, self.host, self.port,
986 certfile=CERTFILE, ssl_context=self.create_ssl_context())
Antoine Pitrou08728162011-05-06 18:49:52 +0200987
988 def test_ssl_context_keyfile_exclusive(self):
989 with transient_internet(self.host):
Antoine Pitroucac9e712014-07-31 18:35:45 -0400990 self.assertRaises(
991 ValueError, self.imap_class, self.host, self.port,
992 keyfile=CERTFILE, ssl_context=self.create_ssl_context())
Christian Heimesf6cd9672008-03-26 13:45:42 +0000993
994
995if __name__ == "__main__":
Ezio Melotti02bf7012013-03-02 14:25:56 +0200996 unittest.main()