2009-12-09 22:08:06 -04:00
|
|
|
from test import support
|
2020-04-25 04:06:29 -03:00
|
|
|
from test.support import socket_helper
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
from contextlib import contextmanager
|
2002-01-05 07:31:49 -04:00
|
|
|
import imaplib
|
2009-12-09 22:08:06 -04:00
|
|
|
import os.path
|
|
|
|
import socketserver
|
2002-07-31 13:42:33 -03:00
|
|
|
import time
|
2011-01-29 15:49:40 -04:00
|
|
|
import calendar
|
2017-09-07 13:56:24 -03:00
|
|
|
import threading
|
2024-03-21 16:16:36 -03:00
|
|
|
import re
|
2019-02-12 14:30:19 -04:00
|
|
|
import socket
|
2002-01-05 07:31:49 -04:00
|
|
|
|
2023-09-05 11:56:30 -03:00
|
|
|
from test.support import verbose, run_with_tz, run_with_locale, cpython_only, requires_resource
|
2020-04-28 22:11:29 -03:00
|
|
|
from test.support import hashlib_helper
|
2020-05-27 19:10:27 -03:00
|
|
|
from test.support import threading_helper
|
Merged revisions 61913,61915-61916,61918-61919,61922-61926,61928-61929,61931,61935,61938,61943 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61913 | benjamin.peterson | 2008-03-25 22:14:42 +0100 (Tue, 25 Mar 2008) | 2 lines
Merged the ACKS from py3k
........
r61915 | thomas.heller | 2008-03-25 22:18:39 +0100 (Tue, 25 Mar 2008) | 1 line
Make _ctypes.c PY_SSIZE_T_CLEAN.
........
r61916 | benjamin.peterson | 2008-03-25 22:55:50 +0100 (Tue, 25 Mar 2008) | 3 lines
Opps! I merged the revisions, but forgot to add
the header to ACKS
........
r61918 | andrew.kuchling | 2008-03-26 01:16:50 +0100 (Wed, 26 Mar 2008) | 1 line
Minor docstring typos
........
r61919 | andrew.kuchling | 2008-03-26 01:30:02 +0100 (Wed, 26 Mar 2008) | 1 line
Add various items
........
r61922 | neal.norwitz | 2008-03-26 05:55:51 +0100 (Wed, 26 Mar 2008) | 6 lines
Try to get this test to be less flaky. It was failing sometimes because
the connect would succeed before the timeout occurred. Try using an
address and port that hopefully doesn't exist to ensure we get no response.
If this doesn't work, we can use a public address close to python.org
and hopefully that address never gets taken.
........
r61923 | jerry.seutter | 2008-03-26 06:03:03 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61924 | neal.norwitz | 2008-03-26 06:19:41 +0100 (Wed, 26 Mar 2008) | 5 lines
Ensure that the mailbox is closed to prevent problems on Windows with removing
an open file. This doesn't seem to be a problem in 2.6, but that appears
to be somewhat accidental (specific to reference counting). When this
gets merged to 3.0, it will make the 3.0 code simpler.
........
r61925 | jerry.seutter | 2008-03-26 06:32:51 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61926 | jerry.seutter | 2008-03-26 06:58:14 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61928 | georg.brandl | 2008-03-26 10:04:36 +0100 (Wed, 26 Mar 2008) | 2 lines
Add Josiah.
........
r61929 | georg.brandl | 2008-03-26 10:32:46 +0100 (Wed, 26 Mar 2008) | 2 lines
Add an example for an RFC 822 continuation.
........
r61931 | benjamin.peterson | 2008-03-26 12:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Added help options to PDB
........
r61935 | christian.heimes | 2008-03-26 13:32:49 +0100 (Wed, 26 Mar 2008) | 1 line
Prepare integration of bytearray backport branch
........
r61938 | christian.heimes | 2008-03-26 13:50:43 +0100 (Wed, 26 Mar 2008) | 3 lines
Removed merge tracking for "svnmerge" for
svn+ssh://pythondev@svn.python.org/python/branches/trunk-bytearray
........
r61943 | georg.brandl | 2008-03-26 13:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Fix and simplify error handling, silencing a compiler warning.
........
2008-03-26 10:45:42 -03:00
|
|
|
import unittest
|
2016-12-24 22:32:26 -04:00
|
|
|
from unittest import mock
|
2012-06-22 22:03:39 -03:00
|
|
|
from datetime import datetime, timezone, timedelta
|
2009-12-09 22:08:06 -04:00
|
|
|
try:
|
|
|
|
import ssl
|
|
|
|
except ImportError:
|
|
|
|
ssl = None
|
|
|
|
|
2022-03-22 07:04:36 -03:00
|
|
|
support.requires_working_socket(module=True)
|
|
|
|
|
2023-09-16 13:47:18 -03:00
|
|
|
CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "certdata", "keycert3.pem")
|
|
|
|
CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "certdata", "pycacert.pem")
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2002-01-05 07:31:49 -04:00
|
|
|
|
Merged revisions 61913,61915-61916,61918-61919,61922-61926,61928-61929,61931,61935,61938,61943 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61913 | benjamin.peterson | 2008-03-25 22:14:42 +0100 (Tue, 25 Mar 2008) | 2 lines
Merged the ACKS from py3k
........
r61915 | thomas.heller | 2008-03-25 22:18:39 +0100 (Tue, 25 Mar 2008) | 1 line
Make _ctypes.c PY_SSIZE_T_CLEAN.
........
r61916 | benjamin.peterson | 2008-03-25 22:55:50 +0100 (Tue, 25 Mar 2008) | 3 lines
Opps! I merged the revisions, but forgot to add
the header to ACKS
........
r61918 | andrew.kuchling | 2008-03-26 01:16:50 +0100 (Wed, 26 Mar 2008) | 1 line
Minor docstring typos
........
r61919 | andrew.kuchling | 2008-03-26 01:30:02 +0100 (Wed, 26 Mar 2008) | 1 line
Add various items
........
r61922 | neal.norwitz | 2008-03-26 05:55:51 +0100 (Wed, 26 Mar 2008) | 6 lines
Try to get this test to be less flaky. It was failing sometimes because
the connect would succeed before the timeout occurred. Try using an
address and port that hopefully doesn't exist to ensure we get no response.
If this doesn't work, we can use a public address close to python.org
and hopefully that address never gets taken.
........
r61923 | jerry.seutter | 2008-03-26 06:03:03 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61924 | neal.norwitz | 2008-03-26 06:19:41 +0100 (Wed, 26 Mar 2008) | 5 lines
Ensure that the mailbox is closed to prevent problems on Windows with removing
an open file. This doesn't seem to be a problem in 2.6, but that appears
to be somewhat accidental (specific to reference counting). When this
gets merged to 3.0, it will make the 3.0 code simpler.
........
r61925 | jerry.seutter | 2008-03-26 06:32:51 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61926 | jerry.seutter | 2008-03-26 06:58:14 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61928 | georg.brandl | 2008-03-26 10:04:36 +0100 (Wed, 26 Mar 2008) | 2 lines
Add Josiah.
........
r61929 | georg.brandl | 2008-03-26 10:32:46 +0100 (Wed, 26 Mar 2008) | 2 lines
Add an example for an RFC 822 continuation.
........
r61931 | benjamin.peterson | 2008-03-26 12:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Added help options to PDB
........
r61935 | christian.heimes | 2008-03-26 13:32:49 +0100 (Wed, 26 Mar 2008) | 1 line
Prepare integration of bytearray backport branch
........
r61938 | christian.heimes | 2008-03-26 13:50:43 +0100 (Wed, 26 Mar 2008) | 3 lines
Removed merge tracking for "svnmerge" for
svn+ssh://pythondev@svn.python.org/python/branches/trunk-bytearray
........
r61943 | georg.brandl | 2008-03-26 13:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Fix and simplify error handling, silencing a compiler warning.
........
2008-03-26 10:45:42 -03:00
|
|
|
class TestImaplib(unittest.TestCase):
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2011-01-29 13:19:08 -04:00
|
|
|
def test_Internaldate2tuple(self):
|
2011-01-29 15:49:40 -04:00
|
|
|
t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
|
2011-01-29 13:19:08 -04:00
|
|
|
tt = imaplib.Internaldate2tuple(
|
2011-01-29 15:49:40 -04:00
|
|
|
b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
|
|
|
|
self.assertEqual(time.mktime(tt), t0)
|
2011-01-29 13:19:08 -04:00
|
|
|
tt = imaplib.Internaldate2tuple(
|
2011-01-29 15:49:40 -04:00
|
|
|
b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
|
|
|
|
self.assertEqual(time.mktime(tt), t0)
|
2011-01-29 13:19:08 -04:00
|
|
|
tt = imaplib.Internaldate2tuple(
|
2011-01-29 15:49:40 -04:00
|
|
|
b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
|
|
|
|
self.assertEqual(time.mktime(tt), t0)
|
2011-01-29 13:19:08 -04:00
|
|
|
|
2012-04-29 16:56:49 -03:00
|
|
|
@run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
|
|
|
|
def test_Internaldate2tuple_issue10941(self):
|
|
|
|
self.assertNotEqual(imaplib.Internaldate2tuple(
|
|
|
|
b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
|
2014-07-31 19:35:45 -03:00
|
|
|
imaplib.Internaldate2tuple(
|
|
|
|
b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
|
2012-06-22 22:03:39 -03:00
|
|
|
|
|
|
|
def timevalues(self):
|
|
|
|
return [2000000000, 2000000000.0, time.localtime(2000000000),
|
|
|
|
(2033, 5, 18, 5, 33, 20, -1, -1, -1),
|
|
|
|
(2033, 5, 18, 5, 33, 20, -1, -1, 1),
|
2012-06-22 22:10:50 -03:00
|
|
|
datetime.fromtimestamp(2000000000,
|
2014-07-31 19:35:45 -03:00
|
|
|
timezone(timedelta(0, 2 * 60 * 60))),
|
2012-06-22 22:03:39 -03:00
|
|
|
'"18-May-2033 05:33:20 +0200"']
|
|
|
|
|
|
|
|
@run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
|
2015-11-16 03:21:38 -04:00
|
|
|
# DST rules included to work around quirk where the Gnu C library may not
|
|
|
|
# otherwise restore the previous time zone
|
|
|
|
@run_with_tz('STD-1DST,M3.2.0,M11.1.0')
|
2012-06-22 22:03:39 -03:00
|
|
|
def test_Time2Internaldate(self):
|
|
|
|
expected = '"18-May-2033 05:33:20 +0200"'
|
|
|
|
|
|
|
|
for t in self.timevalues():
|
|
|
|
internal = imaplib.Time2Internaldate(t)
|
|
|
|
self.assertEqual(internal, expected)
|
|
|
|
|
|
|
|
def test_that_Time2Internaldate_returns_a_result(self):
|
|
|
|
# Without tzset, we can check only that it successfully
|
|
|
|
# produces a result, not the correctness of the result itself,
|
|
|
|
# since the result depends on the timezone the machine is in.
|
|
|
|
for t in self.timevalues():
|
Merged revisions 61913,61915-61916,61918-61919,61922-61926,61928-61929,61931,61935,61938,61943 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61913 | benjamin.peterson | 2008-03-25 22:14:42 +0100 (Tue, 25 Mar 2008) | 2 lines
Merged the ACKS from py3k
........
r61915 | thomas.heller | 2008-03-25 22:18:39 +0100 (Tue, 25 Mar 2008) | 1 line
Make _ctypes.c PY_SSIZE_T_CLEAN.
........
r61916 | benjamin.peterson | 2008-03-25 22:55:50 +0100 (Tue, 25 Mar 2008) | 3 lines
Opps! I merged the revisions, but forgot to add
the header to ACKS
........
r61918 | andrew.kuchling | 2008-03-26 01:16:50 +0100 (Wed, 26 Mar 2008) | 1 line
Minor docstring typos
........
r61919 | andrew.kuchling | 2008-03-26 01:30:02 +0100 (Wed, 26 Mar 2008) | 1 line
Add various items
........
r61922 | neal.norwitz | 2008-03-26 05:55:51 +0100 (Wed, 26 Mar 2008) | 6 lines
Try to get this test to be less flaky. It was failing sometimes because
the connect would succeed before the timeout occurred. Try using an
address and port that hopefully doesn't exist to ensure we get no response.
If this doesn't work, we can use a public address close to python.org
and hopefully that address never gets taken.
........
r61923 | jerry.seutter | 2008-03-26 06:03:03 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61924 | neal.norwitz | 2008-03-26 06:19:41 +0100 (Wed, 26 Mar 2008) | 5 lines
Ensure that the mailbox is closed to prevent problems on Windows with removing
an open file. This doesn't seem to be a problem in 2.6, but that appears
to be somewhat accidental (specific to reference counting). When this
gets merged to 3.0, it will make the 3.0 code simpler.
........
r61925 | jerry.seutter | 2008-03-26 06:32:51 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61926 | jerry.seutter | 2008-03-26 06:58:14 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61928 | georg.brandl | 2008-03-26 10:04:36 +0100 (Wed, 26 Mar 2008) | 2 lines
Add Josiah.
........
r61929 | georg.brandl | 2008-03-26 10:32:46 +0100 (Wed, 26 Mar 2008) | 2 lines
Add an example for an RFC 822 continuation.
........
r61931 | benjamin.peterson | 2008-03-26 12:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Added help options to PDB
........
r61935 | christian.heimes | 2008-03-26 13:32:49 +0100 (Wed, 26 Mar 2008) | 1 line
Prepare integration of bytearray backport branch
........
r61938 | christian.heimes | 2008-03-26 13:50:43 +0100 (Wed, 26 Mar 2008) | 3 lines
Removed merge tracking for "svnmerge" for
svn+ssh://pythondev@svn.python.org/python/branches/trunk-bytearray
........
r61943 | georg.brandl | 2008-03-26 13:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Fix and simplify error handling, silencing a compiler warning.
........
2008-03-26 10:45:42 -03:00
|
|
|
imaplib.Time2Internaldate(t)
|
|
|
|
|
2023-09-06 20:58:03 -03:00
|
|
|
@socket_helper.skip_if_tcp_blackhole
|
2018-08-06 23:12:18 -03:00
|
|
|
def test_imap4_host_default_value(self):
|
2019-02-12 14:30:19 -04:00
|
|
|
# Check whether the IMAP4_PORT is truly unavailable.
|
|
|
|
with socket.socket() as s:
|
|
|
|
try:
|
|
|
|
s.connect(('', imaplib.IMAP4_PORT))
|
|
|
|
self.skipTest(
|
|
|
|
"Cannot run the test with local IMAP server running.")
|
|
|
|
except socket.error:
|
|
|
|
pass
|
|
|
|
|
2019-04-15 07:34:53 -03:00
|
|
|
# This is the exception that should be raised.
|
2020-04-25 04:06:29 -03:00
|
|
|
expected_errnos = socket_helper.get_socket_conn_refused_errs()
|
2018-08-06 23:12:18 -03:00
|
|
|
with self.assertRaises(OSError) as cm:
|
|
|
|
imaplib.IMAP4()
|
|
|
|
self.assertIn(cm.exception.errno, expected_errnos)
|
|
|
|
|
Merged revisions 61913,61915-61916,61918-61919,61922-61926,61928-61929,61931,61935,61938,61943 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61913 | benjamin.peterson | 2008-03-25 22:14:42 +0100 (Tue, 25 Mar 2008) | 2 lines
Merged the ACKS from py3k
........
r61915 | thomas.heller | 2008-03-25 22:18:39 +0100 (Tue, 25 Mar 2008) | 1 line
Make _ctypes.c PY_SSIZE_T_CLEAN.
........
r61916 | benjamin.peterson | 2008-03-25 22:55:50 +0100 (Tue, 25 Mar 2008) | 3 lines
Opps! I merged the revisions, but forgot to add
the header to ACKS
........
r61918 | andrew.kuchling | 2008-03-26 01:16:50 +0100 (Wed, 26 Mar 2008) | 1 line
Minor docstring typos
........
r61919 | andrew.kuchling | 2008-03-26 01:30:02 +0100 (Wed, 26 Mar 2008) | 1 line
Add various items
........
r61922 | neal.norwitz | 2008-03-26 05:55:51 +0100 (Wed, 26 Mar 2008) | 6 lines
Try to get this test to be less flaky. It was failing sometimes because
the connect would succeed before the timeout occurred. Try using an
address and port that hopefully doesn't exist to ensure we get no response.
If this doesn't work, we can use a public address close to python.org
and hopefully that address never gets taken.
........
r61923 | jerry.seutter | 2008-03-26 06:03:03 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61924 | neal.norwitz | 2008-03-26 06:19:41 +0100 (Wed, 26 Mar 2008) | 5 lines
Ensure that the mailbox is closed to prevent problems on Windows with removing
an open file. This doesn't seem to be a problem in 2.6, but that appears
to be somewhat accidental (specific to reference counting). When this
gets merged to 3.0, it will make the 3.0 code simpler.
........
r61925 | jerry.seutter | 2008-03-26 06:32:51 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61926 | jerry.seutter | 2008-03-26 06:58:14 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61928 | georg.brandl | 2008-03-26 10:04:36 +0100 (Wed, 26 Mar 2008) | 2 lines
Add Josiah.
........
r61929 | georg.brandl | 2008-03-26 10:32:46 +0100 (Wed, 26 Mar 2008) | 2 lines
Add an example for an RFC 822 continuation.
........
r61931 | benjamin.peterson | 2008-03-26 12:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Added help options to PDB
........
r61935 | christian.heimes | 2008-03-26 13:32:49 +0100 (Wed, 26 Mar 2008) | 1 line
Prepare integration of bytearray backport branch
........
r61938 | christian.heimes | 2008-03-26 13:50:43 +0100 (Wed, 26 Mar 2008) | 3 lines
Removed merge tracking for "svnmerge" for
svn+ssh://pythondev@svn.python.org/python/branches/trunk-bytearray
........
r61943 | georg.brandl | 2008-03-26 13:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Fix and simplify error handling, silencing a compiler warning.
........
2008-03-26 10:45:42 -03:00
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
if ssl:
|
|
|
|
class SecureTCPServer(socketserver.TCPServer):
|
|
|
|
|
|
|
|
def get_request(self):
|
|
|
|
newsocket, fromaddr = self.socket.accept()
|
2021-04-19 02:27:10 -03:00
|
|
|
context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
|
2016-09-10 18:23:33 -03:00
|
|
|
context.load_cert_chain(CERTFILE)
|
|
|
|
connstream = context.wrap_socket(newsocket, server_side=True)
|
2009-12-09 22:08:06 -04:00
|
|
|
return connstream, fromaddr
|
|
|
|
|
|
|
|
IMAP4_SSL = imaplib.IMAP4_SSL
|
|
|
|
|
|
|
|
else:
|
|
|
|
|
|
|
|
class SecureTCPServer:
|
|
|
|
pass
|
|
|
|
|
|
|
|
IMAP4_SSL = None
|
|
|
|
|
|
|
|
|
|
|
|
class SimpleIMAPHandler(socketserver.StreamRequestHandler):
|
2019-12-10 15:32:59 -04:00
|
|
|
timeout = support.LOOPBACK_TIMEOUT
|
2013-02-19 13:17:31 -04:00
|
|
|
continuation = None
|
|
|
|
capabilities = ''
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2014-09-09 13:07:49 -03:00
|
|
|
def setup(self):
|
|
|
|
super().setup()
|
2020-04-27 11:52:55 -03:00
|
|
|
self.server.is_selected = False
|
2014-09-09 13:07:49 -03:00
|
|
|
self.server.logged = None
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
def _send(self, message):
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("SENT: %r" % message.strip())
|
2009-12-09 22:08:06 -04:00
|
|
|
self.wfile.write(message)
|
|
|
|
|
2013-02-19 13:17:31 -04:00
|
|
|
def _send_line(self, message):
|
|
|
|
self._send(message + b'\r\n')
|
|
|
|
|
|
|
|
def _send_textline(self, message):
|
|
|
|
self._send_line(message.encode('ASCII'))
|
|
|
|
|
|
|
|
def _send_tagged(self, tag, code, message):
|
|
|
|
self._send_textline(' '.join((tag, code, message)))
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
def handle(self):
|
|
|
|
# Send a welcome message.
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_textline('* OK IMAP4rev1')
|
2009-12-09 22:08:06 -04:00
|
|
|
while 1:
|
|
|
|
# Gather up input until we receive a line terminator or we timeout.
|
|
|
|
# Accumulate read(1) because it's simpler to handle the differences
|
|
|
|
# between naked sockets and SSL sockets.
|
|
|
|
line = b''
|
|
|
|
while 1:
|
|
|
|
try:
|
|
|
|
part = self.rfile.read(1)
|
|
|
|
if part == b'':
|
|
|
|
# Naked sockets return empty strings..
|
|
|
|
return
|
|
|
|
line += part
|
2012-12-25 10:47:37 -04:00
|
|
|
except OSError:
|
2012-12-18 15:14:22 -04:00
|
|
|
# ..but SSLSockets raise exceptions.
|
2009-12-09 22:08:06 -04:00
|
|
|
return
|
|
|
|
if line.endswith(b'\r\n'):
|
|
|
|
break
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print('GOT: %r' % line.strip())
|
2013-02-19 13:17:31 -04:00
|
|
|
if self.continuation:
|
|
|
|
try:
|
|
|
|
self.continuation.send(line)
|
|
|
|
except StopIteration:
|
|
|
|
self.continuation = None
|
|
|
|
continue
|
|
|
|
splitline = line.decode('ASCII').split()
|
|
|
|
tag = splitline[0]
|
|
|
|
cmd = splitline[1]
|
2009-12-09 22:08:06 -04:00
|
|
|
args = splitline[2:]
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
if hasattr(self, 'cmd_' + cmd):
|
|
|
|
continuation = getattr(self, 'cmd_' + cmd)(tag, args)
|
2013-02-19 13:17:31 -04:00
|
|
|
if continuation:
|
|
|
|
self.continuation = continuation
|
|
|
|
next(continuation)
|
2009-12-09 22:08:06 -04:00
|
|
|
else:
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_tagged(tag, 'BAD', cmd + ' unknown')
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
def cmd_CAPABILITY(self, tag, args):
|
2014-07-31 19:35:45 -03:00
|
|
|
caps = ('IMAP4rev1 ' + self.capabilities
|
|
|
|
if self.capabilities
|
|
|
|
else 'IMAP4rev1')
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_textline('* CAPABILITY ' + caps)
|
|
|
|
self._send_tagged(tag, 'OK', 'CAPABILITY completed')
|
|
|
|
|
|
|
|
def cmd_LOGOUT(self, tag, args):
|
2014-09-09 13:07:49 -03:00
|
|
|
self.server.logged = None
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_textline('* BYE IMAP4ref1 Server logging out')
|
|
|
|
self._send_tagged(tag, 'OK', 'LOGOUT completed')
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2014-09-09 13:07:49 -03:00
|
|
|
def cmd_LOGIN(self, tag, args):
|
|
|
|
self.server.logged = args[0]
|
|
|
|
self._send_tagged(tag, 'OK', 'LOGIN completed')
|
|
|
|
|
2020-04-27 11:52:55 -03:00
|
|
|
def cmd_SELECT(self, tag, args):
|
|
|
|
self.server.is_selected = True
|
|
|
|
self._send_line(b'* 2 EXISTS')
|
|
|
|
self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
|
|
|
|
|
|
|
|
def cmd_UNSELECT(self, tag, args):
|
|
|
|
if self.server.is_selected:
|
|
|
|
self.server.is_selected = False
|
|
|
|
self._send_tagged(tag, 'OK', 'Returned to authenticated state. (Success)')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'BAD', 'No mailbox selected')
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2016-12-24 22:32:26 -04:00
|
|
|
class NewIMAPTestsMixin():
|
|
|
|
client = None
|
|
|
|
|
|
|
|
def _setup(self, imap_handler, connect=True):
|
|
|
|
"""
|
|
|
|
Sets up imap_handler for tests. imap_handler should inherit from either:
|
|
|
|
- SimpleIMAPHandler - for testing IMAP commands,
|
|
|
|
- socketserver.StreamRequestHandler - if raw access to stream is needed.
|
|
|
|
Returns (client, server).
|
|
|
|
"""
|
|
|
|
class TestTCPServer(self.server_class):
|
|
|
|
def handle_error(self, request, client_address):
|
|
|
|
"""
|
|
|
|
End request and raise the error if one occurs.
|
|
|
|
"""
|
|
|
|
self.close_request(request)
|
|
|
|
self.server_close()
|
|
|
|
raise
|
|
|
|
|
|
|
|
self.addCleanup(self._cleanup)
|
2020-04-25 04:06:29 -03:00
|
|
|
self.server = self.server_class((socket_helper.HOST, 0), imap_handler)
|
2016-12-24 22:32:26 -04:00
|
|
|
self.thread = threading.Thread(
|
|
|
|
name=self._testMethodName+'-server',
|
|
|
|
target=self.server.serve_forever,
|
|
|
|
# Short poll interval to make the test finish quickly.
|
|
|
|
# Time between requests is short enough that we won't wake
|
|
|
|
# up spuriously too many times.
|
|
|
|
kwargs={'poll_interval': 0.01})
|
|
|
|
self.thread.daemon = True # In case this function raises.
|
|
|
|
self.thread.start()
|
|
|
|
|
|
|
|
if connect:
|
|
|
|
self.client = self.imap_class(*self.server.server_address)
|
|
|
|
|
|
|
|
return self.client, self.server
|
|
|
|
|
|
|
|
def _cleanup(self):
|
|
|
|
"""
|
|
|
|
Cleans up the test server. This method should not be called manually,
|
|
|
|
it is added to the cleanup queue in the _setup method already.
|
|
|
|
"""
|
|
|
|
# if logout was called already we'd raise an exception trying to
|
|
|
|
# shutdown the client once again
|
|
|
|
if self.client is not None and self.client.state != 'LOGOUT':
|
|
|
|
self.client.shutdown()
|
|
|
|
# cleanup the server
|
|
|
|
self.server.shutdown()
|
|
|
|
self.server.server_close()
|
2020-05-27 19:10:27 -03:00
|
|
|
threading_helper.join_thread(self.thread)
|
2017-09-14 18:40:56 -03:00
|
|
|
# Explicitly clear the attribute to prevent dangling thread
|
|
|
|
self.thread = None
|
2016-12-24 22:32:26 -04:00
|
|
|
|
|
|
|
def test_EOF_without_complete_welcome_message(self):
|
|
|
|
# http://bugs.python.org/issue5949
|
|
|
|
class EOFHandler(socketserver.StreamRequestHandler):
|
|
|
|
def handle(self):
|
|
|
|
self.wfile.write(b'* OK')
|
|
|
|
_, server = self._setup(EOFHandler, connect=False)
|
|
|
|
self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
|
|
|
|
*server.server_address)
|
|
|
|
|
|
|
|
def test_line_termination(self):
|
|
|
|
class BadNewlineHandler(SimpleIMAPHandler):
|
|
|
|
def cmd_CAPABILITY(self, tag, args):
|
|
|
|
self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
|
|
|
|
self._send_tagged(tag, 'OK', 'CAPABILITY completed')
|
|
|
|
_, server = self._setup(BadNewlineHandler, connect=False)
|
|
|
|
self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
|
|
|
|
*server.server_address)
|
|
|
|
|
|
|
|
def test_enable_raises_error_if_not_AUTH(self):
|
|
|
|
class EnableHandler(SimpleIMAPHandler):
|
|
|
|
capabilities = 'AUTH ENABLE UTF8=ACCEPT'
|
|
|
|
client, _ = self._setup(EnableHandler)
|
|
|
|
self.assertFalse(client.utf8_enabled)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
|
|
|
|
client.enable('foo')
|
|
|
|
self.assertFalse(client.utf8_enabled)
|
|
|
|
|
|
|
|
def test_enable_raises_error_if_no_capability(self):
|
|
|
|
client, _ = self._setup(SimpleIMAPHandler)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
'does not support ENABLE'):
|
|
|
|
client.enable('foo')
|
|
|
|
|
|
|
|
def test_enable_UTF8_raises_error_if_not_supported(self):
|
|
|
|
client, _ = self._setup(SimpleIMAPHandler)
|
|
|
|
typ, data = client.login('user', 'pass')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
'does not support ENABLE'):
|
|
|
|
client.enable('UTF8=ACCEPT')
|
|
|
|
|
|
|
|
def test_enable_UTF8_True_append(self):
|
|
|
|
class UTF8AppendServer(SimpleIMAPHandler):
|
|
|
|
capabilities = 'ENABLE UTF8=ACCEPT'
|
|
|
|
def cmd_ENABLE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'OK', 'ENABLE successful')
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
def cmd_APPEND(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'okay')
|
|
|
|
client, server = self._setup(UTF8AppendServer)
|
|
|
|
self.assertEqual(client._encoding, 'ascii')
|
|
|
|
code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
|
|
|
code, _ = client.enable('UTF8=ACCEPT')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(client._encoding, 'utf-8')
|
|
|
|
msg_string = 'Subject: üñí©öðé'
|
|
|
|
typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(server.response,
|
|
|
|
('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
|
|
|
|
|
|
|
|
def test_search_disallows_charset_in_utf8_mode(self):
|
|
|
|
class UTF8Server(SimpleIMAPHandler):
|
|
|
|
capabilities = 'AUTH ENABLE UTF8=ACCEPT'
|
|
|
|
def cmd_ENABLE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'OK', 'ENABLE successful')
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
client, _ = self._setup(UTF8Server)
|
|
|
|
typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
typ, _ = client.enable('UTF8=ACCEPT')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertTrue(client.utf8_enabled)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
|
|
|
|
client.search('foo', 'bar')
|
|
|
|
|
|
|
|
def test_bad_auth_name(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'NO',
|
|
|
|
'unrecognized authentication type {}'.format(args[0]))
|
|
|
|
client, _ = self._setup(MyServer)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
'unrecognized authentication type METHOD'):
|
|
|
|
client.authenticate('METHOD', lambda: 1)
|
|
|
|
|
|
|
|
def test_invalid_authentication(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.response = yield
|
|
|
|
self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
|
|
|
|
client, _ = self._setup(MyServer)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
r'\[AUTHENTICATIONFAILED\] invalid'):
|
|
|
|
client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
|
|
|
|
def test_valid_authentication_bytes(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
client, server = self._setup(MyServer)
|
|
|
|
code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
|
|
|
|
|
|
|
def test_valid_authentication_plain_text(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
client, server = self._setup(MyServer)
|
|
|
|
code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
|
|
|
|
2022-01-13 04:46:38 -04:00
|
|
|
@hashlib_helper.requires_hashdigest('md5', openssl=True)
|
2016-12-24 22:32:26 -04:00
|
|
|
def test_login_cram_md5_bytes(self):
|
|
|
|
class AuthHandler(SimpleIMAPHandler):
|
|
|
|
capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
|
|
|
|
'VzdG9uLm1jaS5uZXQ=')
|
|
|
|
r = yield
|
|
|
|
if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
|
|
|
|
b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
|
|
|
|
self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'NO', 'No access')
|
|
|
|
client, _ = self._setup(AuthHandler)
|
|
|
|
self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
|
|
|
|
ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
|
|
|
|
self.assertEqual(ret, "OK")
|
|
|
|
|
2022-01-13 04:46:38 -04:00
|
|
|
@hashlib_helper.requires_hashdigest('md5', openssl=True)
|
2016-12-24 22:32:26 -04:00
|
|
|
def test_login_cram_md5_plain_text(self):
|
|
|
|
class AuthHandler(SimpleIMAPHandler):
|
|
|
|
capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
|
|
|
|
'VzdG9uLm1jaS5uZXQ=')
|
|
|
|
r = yield
|
|
|
|
if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
|
|
|
|
b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
|
|
|
|
self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'NO', 'No access')
|
|
|
|
client, _ = self._setup(AuthHandler)
|
|
|
|
self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
|
|
|
|
ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
|
|
|
|
self.assertEqual(ret, "OK")
|
|
|
|
|
|
|
|
def test_aborted_authentication(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.response = yield
|
|
|
|
if self.response == b'*\r\n':
|
|
|
|
self._send_tagged(
|
|
|
|
tag,
|
|
|
|
'NO',
|
|
|
|
'[AUTHENTICATIONFAILED] aborted')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'OK', 'MYAUTH successful')
|
|
|
|
client, _ = self._setup(MyServer)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
r'\[AUTHENTICATIONFAILED\] aborted'):
|
|
|
|
client.authenticate('MYAUTH', lambda x: None)
|
|
|
|
|
|
|
|
@mock.patch('imaplib._MAXLINE', 10)
|
|
|
|
def test_linetoolong(self):
|
|
|
|
class TooLongHandler(SimpleIMAPHandler):
|
|
|
|
def handle(self):
|
|
|
|
# send response line longer than the limit set in the next line
|
|
|
|
self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
|
|
|
|
_, server = self._setup(TooLongHandler, connect=False)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
'got more than 10 bytes'):
|
|
|
|
self.imap_class(*server.server_address)
|
|
|
|
|
|
|
|
def test_simple_with_statement(self):
|
|
|
|
_, server = self._setup(SimpleIMAPHandler, connect=False)
|
|
|
|
with self.imap_class(*server.server_address):
|
|
|
|
pass
|
|
|
|
|
2023-09-05 11:56:30 -03:00
|
|
|
@requires_resource('walltime')
|
2020-01-07 13:28:10 -04:00
|
|
|
def test_imaplib_timeout_test(self):
|
|
|
|
_, server = self._setup(SimpleIMAPHandler)
|
|
|
|
addr = server.server_address[1]
|
|
|
|
client = self.imap_class("localhost", addr, timeout=None)
|
|
|
|
self.assertEqual(client.sock.timeout, None)
|
|
|
|
client.shutdown()
|
|
|
|
client = self.imap_class("localhost", addr, timeout=support.LOOPBACK_TIMEOUT)
|
|
|
|
self.assertEqual(client.sock.timeout, support.LOOPBACK_TIMEOUT)
|
|
|
|
client.shutdown()
|
|
|
|
with self.assertRaises(ValueError):
|
|
|
|
client = self.imap_class("localhost", addr, timeout=0)
|
|
|
|
|
|
|
|
def test_imaplib_timeout_functionality_test(self):
|
|
|
|
class TimeoutHandler(SimpleIMAPHandler):
|
|
|
|
def handle(self):
|
|
|
|
time.sleep(1)
|
|
|
|
SimpleIMAPHandler.handle(self)
|
|
|
|
|
|
|
|
_, server = self._setup(TimeoutHandler)
|
|
|
|
addr = server.server_address[1]
|
2020-11-20 04:26:07 -04:00
|
|
|
with self.assertRaises(TimeoutError):
|
2020-01-07 13:28:10 -04:00
|
|
|
client = self.imap_class("localhost", addr, timeout=0.001)
|
|
|
|
|
2016-12-24 22:32:26 -04:00
|
|
|
def test_with_statement(self):
|
|
|
|
_, server = self._setup(SimpleIMAPHandler, connect=False)
|
|
|
|
with self.imap_class(*server.server_address) as imap:
|
|
|
|
imap.login('user', 'pass')
|
|
|
|
self.assertEqual(server.logged, 'user')
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
|
|
|
|
def test_with_statement_logout(self):
|
|
|
|
# It is legal to log out explicitly inside the with block
|
|
|
|
_, server = self._setup(SimpleIMAPHandler, connect=False)
|
|
|
|
with self.imap_class(*server.server_address) as imap:
|
|
|
|
imap.login('user', 'pass')
|
|
|
|
self.assertEqual(server.logged, 'user')
|
|
|
|
imap.logout()
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
|
|
|
|
# command tests
|
|
|
|
|
|
|
|
def test_login(self):
|
|
|
|
client, _ = self._setup(SimpleIMAPHandler)
|
|
|
|
typ, data = client.login('user', 'pass')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(data[0], b'LOGIN completed')
|
|
|
|
self.assertEqual(client.state, 'AUTH')
|
|
|
|
|
|
|
|
def test_logout(self):
|
|
|
|
client, _ = self._setup(SimpleIMAPHandler)
|
|
|
|
typ, data = client.login('user', 'pass')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(data[0], b'LOGIN completed')
|
|
|
|
typ, data = client.logout()
|
2019-04-15 13:23:20 -03:00
|
|
|
self.assertEqual(typ, 'BYE', (typ, data))
|
|
|
|
self.assertEqual(data[0], b'IMAP4ref1 Server logging out', (typ, data))
|
2016-12-24 22:32:26 -04:00
|
|
|
self.assertEqual(client.state, 'LOGOUT')
|
|
|
|
|
|
|
|
def test_lsub(self):
|
|
|
|
class LsubCmd(SimpleIMAPHandler):
|
|
|
|
def cmd_LSUB(self, tag, args):
|
|
|
|
self._send_textline('* LSUB () "." directoryA')
|
|
|
|
return self._send_tagged(tag, 'OK', 'LSUB completed')
|
|
|
|
client, _ = self._setup(LsubCmd)
|
|
|
|
client.login('user', 'pass')
|
|
|
|
typ, data = client.lsub()
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(data[0], b'() "." directoryA')
|
|
|
|
|
2020-04-27 11:52:55 -03:00
|
|
|
def test_unselect(self):
|
|
|
|
client, _ = self._setup(SimpleIMAPHandler)
|
|
|
|
client.login('user', 'pass')
|
|
|
|
typ, data = client.select()
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(data[0], b'2')
|
|
|
|
|
|
|
|
typ, data = client.unselect()
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(data[0], b'Returned to authenticated state. (Success)')
|
|
|
|
self.assertEqual(client.state, 'AUTH')
|
|
|
|
|
2016-12-24 22:32:26 -04:00
|
|
|
|
|
|
|
class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
|
|
|
|
imap_class = imaplib.IMAP4
|
|
|
|
server_class = socketserver.TCPServer
|
|
|
|
|
|
|
|
|
|
|
|
@unittest.skipUnless(ssl, "SSL not available")
|
|
|
|
class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
|
2017-01-12 06:51:31 -04:00
|
|
|
imap_class = IMAP4_SSL
|
2016-12-24 22:32:26 -04:00
|
|
|
server_class = SecureTCPServer
|
|
|
|
|
2023-09-05 11:56:30 -03:00
|
|
|
@requires_resource('walltime')
|
2016-12-24 22:32:26 -04:00
|
|
|
def test_ssl_raises(self):
|
2017-09-15 15:27:30 -03:00
|
|
|
ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
|
|
|
|
self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
|
|
|
|
self.assertEqual(ssl_context.check_hostname, True)
|
2016-12-24 22:32:26 -04:00
|
|
|
ssl_context.load_verify_locations(CAFILE)
|
|
|
|
|
2024-03-21 16:16:36 -03:00
|
|
|
# Allow for flexible libssl error messages.
|
|
|
|
regex = re.compile(r"""(
|
|
|
|
IP address mismatch, certificate is not valid for '127.0.0.1' # OpenSSL
|
|
|
|
|
|
|
|
|
CERTIFICATE_VERIFY_FAILED # AWS-LC
|
|
|
|
)""", re.X)
|
|
|
|
with self.assertRaisesRegex(ssl.CertificateError, regex):
|
2016-12-24 22:32:26 -04:00
|
|
|
_, server = self._setup(SimpleIMAPHandler)
|
|
|
|
client = self.imap_class(*server.server_address,
|
|
|
|
ssl_context=ssl_context)
|
|
|
|
client.shutdown()
|
|
|
|
|
2023-09-05 11:56:30 -03:00
|
|
|
@requires_resource('walltime')
|
2016-12-24 22:32:26 -04:00
|
|
|
def test_ssl_verified(self):
|
2017-09-15 15:27:30 -03:00
|
|
|
ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
|
2016-12-24 22:32:26 -04:00
|
|
|
ssl_context.load_verify_locations(CAFILE)
|
|
|
|
|
|
|
|
_, server = self._setup(SimpleIMAPHandler)
|
|
|
|
client = self.imap_class("localhost", server.server_address[1],
|
|
|
|
ssl_context=ssl_context)
|
|
|
|
client.shutdown()
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
class ThreadedNetworkedTests(unittest.TestCase):
|
|
|
|
server_class = socketserver.TCPServer
|
|
|
|
imap_class = imaplib.IMAP4
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
def make_server(self, addr, hdlr):
|
|
|
|
|
|
|
|
class MyServer(self.server_class):
|
|
|
|
def handle_error(self, request, client_address):
|
|
|
|
self.close_request(request)
|
|
|
|
self.server_close()
|
|
|
|
raise
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("creating server")
|
2009-12-09 22:08:06 -04:00
|
|
|
server = MyServer(addr, hdlr)
|
2010-11-20 15:04:17 -04:00
|
|
|
self.assertEqual(server.server_address, server.socket.getsockname())
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
if verbose:
|
|
|
|
print("server created")
|
|
|
|
print("ADDR =", addr)
|
|
|
|
print("CLASS =", self.server_class)
|
|
|
|
print("HDLR =", server.RequestHandlerClass)
|
|
|
|
|
|
|
|
t = threading.Thread(
|
|
|
|
name='%s serving' % self.server_class,
|
|
|
|
target=server.serve_forever,
|
|
|
|
# Short poll interval to make the test finish quickly.
|
|
|
|
# Time between requests is short enough that we won't wake
|
|
|
|
# up spuriously too many times.
|
2014-07-31 19:35:45 -03:00
|
|
|
kwargs={'poll_interval': 0.01})
|
2009-12-09 22:08:06 -04:00
|
|
|
t.daemon = True # In case this function raises.
|
|
|
|
t.start()
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("server running")
|
2009-12-09 22:08:06 -04:00
|
|
|
return server, t
|
|
|
|
|
|
|
|
def reap_server(self, server, thread):
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("waiting for server")
|
2009-12-09 22:08:06 -04:00
|
|
|
server.shutdown()
|
2011-01-05 19:01:38 -04:00
|
|
|
server.server_close()
|
2009-12-09 22:08:06 -04:00
|
|
|
thread.join()
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("done")
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
@contextmanager
|
|
|
|
def reaped_server(self, hdlr):
|
2020-04-25 04:06:29 -03:00
|
|
|
server, thread = self.make_server((socket_helper.HOST, 0), hdlr)
|
2009-12-09 22:08:06 -04:00
|
|
|
try:
|
|
|
|
yield server
|
|
|
|
finally:
|
|
|
|
self.reap_server(server, thread)
|
|
|
|
|
2013-02-19 13:17:31 -04:00
|
|
|
@contextmanager
|
|
|
|
def reaped_pair(self, hdlr):
|
2013-12-07 15:27:41 -04:00
|
|
|
with self.reaped_server(hdlr) as server:
|
|
|
|
client = self.imap_class(*server.server_address)
|
|
|
|
try:
|
|
|
|
yield server, client
|
|
|
|
finally:
|
|
|
|
client.logout()
|
2013-02-19 13:17:31 -04:00
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2009-12-09 22:08:06 -04:00
|
|
|
def test_connect(self):
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
client = self.imap_class(*server.server_address)
|
|
|
|
client.shutdown()
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2016-01-02 18:18:34 -04:00
|
|
|
def test_bracket_flags(self):
|
|
|
|
|
|
|
|
# This violates RFC 3501, which disallows ']' characters in tag names,
|
|
|
|
# but imaplib has allowed producing such tags forever, other programs
|
|
|
|
# also produce them (eg: OtherInbox's Organizer app as of 20140716),
|
|
|
|
# and Gmail, for example, accepts them and produces them. So we
|
|
|
|
# support them. See issue #21815.
|
|
|
|
|
|
|
|
class BracketFlagHandler(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def handle(self):
|
|
|
|
self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
|
|
|
|
super().handle()
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
|
|
|
|
def cmd_SELECT(self, tag, args):
|
|
|
|
flag_msg = ' \\'.join(self.flags)
|
|
|
|
self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
|
|
|
|
self._send_line(b'* 2 EXISTS')
|
|
|
|
self._send_line(b'* 0 RECENT')
|
|
|
|
msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
|
|
|
|
% flag_msg)
|
|
|
|
self._send_line(msg.encode('ascii'))
|
|
|
|
self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
|
|
|
|
|
|
|
|
def cmd_STORE(self, tag, args):
|
|
|
|
new_flags = args[2].strip('(').strip(')').split()
|
|
|
|
self.flags.extend(new_flags)
|
|
|
|
flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
|
|
|
|
msg = '* %s FETCH %s' % (args[0], flags_msg)
|
|
|
|
self._send_line(msg.encode('ascii'))
|
|
|
|
self._send_tagged(tag, 'OK', 'STORE completed.')
|
|
|
|
|
|
|
|
with self.reaped_pair(BracketFlagHandler) as (server, client):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response, b'ZmFrZQ==\r\n')
|
|
|
|
client.select('test')
|
|
|
|
typ, [data] = client.store(b'1', "+FLAGS", "[test]")
|
|
|
|
self.assertIn(b'[test]', data)
|
|
|
|
client.select('test')
|
|
|
|
typ, [data] = client.response('PERMANENTFLAGS')
|
|
|
|
self.assertIn(b'[test]', data)
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2009-12-09 22:08:06 -04:00
|
|
|
def test_issue5949(self):
|
|
|
|
|
|
|
|
class EOFHandler(socketserver.StreamRequestHandler):
|
|
|
|
def handle(self):
|
|
|
|
# EOF without sending a complete welcome message.
|
|
|
|
self.wfile.write(b'* OK')
|
|
|
|
|
|
|
|
with self.reaped_server(EOFHandler) as server:
|
|
|
|
self.assertRaises(imaplib.IMAP4.abort,
|
|
|
|
self.imap_class, *server.server_address)
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2009-12-09 22:08:06 -04:00
|
|
|
def test_line_termination(self):
|
|
|
|
|
|
|
|
class BadNewlineHandler(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_CAPABILITY(self, tag, args):
|
|
|
|
self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_tagged(tag, 'OK', 'CAPABILITY completed')
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
with self.reaped_server(BadNewlineHandler) as server:
|
|
|
|
self.assertRaises(imaplib.IMAP4.abort,
|
|
|
|
self.imap_class, *server.server_address)
|
|
|
|
|
2015-05-10 20:17:23 -03:00
|
|
|
class UTF8Server(SimpleIMAPHandler):
|
|
|
|
capabilities = 'AUTH ENABLE UTF8=ACCEPT'
|
|
|
|
|
|
|
|
def cmd_ENABLE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'OK', 'ENABLE successful')
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2015-05-10 20:17:23 -03:00
|
|
|
def test_enable_raises_error_if_not_AUTH(self):
|
|
|
|
with self.reaped_pair(self.UTF8Server) as (server, client):
|
|
|
|
self.assertFalse(client.utf8_enabled)
|
|
|
|
self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
|
|
|
|
self.assertFalse(client.utf8_enabled)
|
|
|
|
|
|
|
|
# XXX Also need a test that enable after SELECT raises an error.
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2015-05-10 20:17:23 -03:00
|
|
|
def test_enable_raises_error_if_no_capability(self):
|
|
|
|
class NoEnableServer(self.UTF8Server):
|
|
|
|
capabilities = 'AUTH'
|
|
|
|
with self.reaped_pair(NoEnableServer) as (server, client):
|
|
|
|
self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2015-05-10 20:17:23 -03:00
|
|
|
def test_enable_UTF8_raises_error_if_not_supported(self):
|
|
|
|
class NonUTF8Server(SimpleIMAPHandler):
|
|
|
|
pass
|
|
|
|
with self.assertRaises(imaplib.IMAP4.error):
|
|
|
|
with self.reaped_pair(NonUTF8Server) as (server, client):
|
|
|
|
typ, data = client.login('user', 'pass')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
client.enable('UTF8=ACCEPT')
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2015-05-10 20:17:23 -03:00
|
|
|
def test_enable_UTF8_True_append(self):
|
|
|
|
|
|
|
|
class UTF8AppendServer(self.UTF8Server):
|
|
|
|
def cmd_APPEND(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'okay')
|
|
|
|
|
|
|
|
with self.reaped_pair(UTF8AppendServer) as (server, client):
|
|
|
|
self.assertEqual(client._encoding, 'ascii')
|
|
|
|
code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response,
|
|
|
|
b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
|
|
|
code, _ = client.enable('UTF8=ACCEPT')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(client._encoding, 'utf-8')
|
|
|
|
msg_string = 'Subject: üñí©öðé'
|
|
|
|
typ, data = client.append(
|
|
|
|
None, None, None, msg_string.encode('utf-8'))
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(
|
|
|
|
server.response,
|
|
|
|
('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
|
|
|
|
)
|
|
|
|
|
|
|
|
# XXX also need a test that makes sure that the Literal and Untagged_status
|
|
|
|
# regexes uses unicode in UTF8 mode instead of the default ASCII.
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2015-05-10 20:17:23 -03:00
|
|
|
def test_search_disallows_charset_in_utf8_mode(self):
|
|
|
|
with self.reaped_pair(self.UTF8Server) as (server, client):
|
|
|
|
typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
typ, _ = client.enable('UTF8=ACCEPT')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertTrue(client.utf8_enabled)
|
|
|
|
self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2013-02-19 13:17:31 -04:00
|
|
|
def test_bad_auth_name(self):
|
|
|
|
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'NO', 'unrecognized authentication '
|
2014-07-31 19:35:45 -03:00
|
|
|
'type {}'.format(args[0]))
|
2013-02-19 13:17:31 -04:00
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
with self.assertRaises(imaplib.IMAP4.error):
|
|
|
|
client.authenticate('METHOD', lambda: 1)
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2013-02-19 13:17:31 -04:00
|
|
|
def test_invalid_authentication(self):
|
|
|
|
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.response = yield
|
|
|
|
self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
|
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
with self.assertRaises(imaplib.IMAP4.error):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2013-02-19 13:17:31 -04:00
|
|
|
def test_valid_authentication(self):
|
|
|
|
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response,
|
2014-07-31 19:35:45 -03:00
|
|
|
b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
2013-02-19 13:17:31 -04:00
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: 'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response,
|
2014-07-31 19:35:45 -03:00
|
|
|
b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
2013-02-19 13:17:31 -04:00
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2022-01-13 04:46:38 -04:00
|
|
|
@hashlib_helper.requires_hashdigest('md5', openssl=True)
|
2013-02-19 13:17:31 -04:00
|
|
|
def test_login_cram_md5(self):
|
|
|
|
|
|
|
|
class AuthHandler(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
|
2014-07-31 19:35:45 -03:00
|
|
|
'VzdG9uLm1jaS5uZXQ=')
|
2013-02-19 13:17:31 -04:00
|
|
|
r = yield
|
2014-07-31 19:35:45 -03:00
|
|
|
if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
|
|
|
|
b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'NO', 'No access')
|
|
|
|
|
|
|
|
with self.reaped_pair(AuthHandler) as (server, client):
|
|
|
|
self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
|
|
|
|
ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
|
|
|
|
self.assertEqual(ret, "OK")
|
|
|
|
|
|
|
|
with self.reaped_pair(AuthHandler) as (server, client):
|
|
|
|
self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
|
|
|
|
ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
|
|
|
|
self.assertEqual(ret, "OK")
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2015-07-30 17:59:02 -03:00
|
|
|
def test_aborted_authentication(self):
|
|
|
|
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.response = yield
|
|
|
|
|
|
|
|
if self.response == b'*\r\n':
|
|
|
|
self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'OK', 'MYAUTH successful')
|
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
with self.assertRaises(imaplib.IMAP4.error):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: None)
|
|
|
|
|
2015-07-30 18:01:38 -03:00
|
|
|
|
2013-10-27 02:52:14 -03:00
|
|
|
def test_linetoolong(self):
|
|
|
|
class TooLongHandler(SimpleIMAPHandler):
|
|
|
|
def handle(self):
|
|
|
|
# Send a very long response line
|
2014-07-31 19:35:45 -03:00
|
|
|
self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
|
2013-10-27 02:52:14 -03:00
|
|
|
|
|
|
|
with self.reaped_server(TooLongHandler) as server:
|
|
|
|
self.assertRaises(imaplib.IMAP4.error,
|
|
|
|
self.imap_class, *server.server_address)
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2014-09-09 13:07:49 -03:00
|
|
|
def test_simple_with_statement(self):
|
|
|
|
# simplest call
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
with self.imap_class(*server.server_address):
|
|
|
|
pass
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2014-09-09 13:07:49 -03:00
|
|
|
def test_with_statement(self):
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
with self.imap_class(*server.server_address) as imap:
|
|
|
|
imap.login('user', 'pass')
|
|
|
|
self.assertEqual(server.logged, 'user')
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2014-09-09 13:07:49 -03:00
|
|
|
def test_with_statement_logout(self):
|
|
|
|
# what happens if already logout in the block?
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
with self.imap_class(*server.server_address) as imap:
|
|
|
|
imap.login('user', 'pass')
|
|
|
|
self.assertEqual(server.logged, 'user')
|
|
|
|
imap.logout()
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
|
2020-06-01 22:17:45 -03:00
|
|
|
@threading_helper.reap_threads
|
|
|
|
@cpython_only
|
2022-06-04 00:15:58 -03:00
|
|
|
@unittest.skipUnless(__debug__, "Won't work if __debug__ is False")
|
2020-06-01 22:17:45 -03:00
|
|
|
def test_dump_ur(self):
|
|
|
|
# See: http://bugs.python.org/issue26543
|
|
|
|
untagged_resp_dict = {'READ-WRITE': [b'']}
|
|
|
|
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
with self.imap_class(*server.server_address) as imap:
|
|
|
|
with mock.patch.object(imap, '_mesg') as mock_mesg:
|
|
|
|
imap._dump_ur(untagged_resp_dict)
|
|
|
|
mock_mesg.assert_called_with(
|
|
|
|
"untagged responses dump:READ-WRITE: [b'']"
|
|
|
|
)
|
|
|
|
|
2013-10-27 02:52:14 -03:00
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
@unittest.skipUnless(ssl, "SSL not available")
|
2014-07-31 19:35:45 -03:00
|
|
|
class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
|
2009-12-09 22:08:06 -04:00
|
|
|
server_class = SecureTCPServer
|
|
|
|
imap_class = IMAP4_SSL
|
|
|
|
|
2020-05-27 19:10:27 -03:00
|
|
|
@threading_helper.reap_threads
|
2013-12-02 15:01:29 -04:00
|
|
|
def test_ssl_verified(self):
|
2017-09-15 15:27:30 -03:00
|
|
|
ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
|
2013-12-02 15:01:29 -04:00
|
|
|
ssl_context.load_verify_locations(CAFILE)
|
|
|
|
|
2024-03-21 16:16:36 -03:00
|
|
|
# Allow for flexible libssl error messages.
|
|
|
|
regex = re.compile(r"""(
|
|
|
|
IP address mismatch, certificate is not valid for '127.0.0.1' # OpenSSL
|
|
|
|
|
|
|
|
|
CERTIFICATE_VERIFY_FAILED # AWS-LC
|
|
|
|
)""", re.X)
|
|
|
|
with self.assertRaisesRegex(ssl.CertificateError, regex):
|
2013-12-02 15:01:29 -04:00
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
client = self.imap_class(*server.server_address,
|
|
|
|
ssl_context=ssl_context)
|
|
|
|
client.shutdown()
|
|
|
|
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
client = self.imap_class("localhost", server.server_address[1],
|
|
|
|
ssl_context=ssl_context)
|
|
|
|
client.shutdown()
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
|
Merged revisions 61913,61915-61916,61918-61919,61922-61926,61928-61929,61931,61935,61938,61943 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61913 | benjamin.peterson | 2008-03-25 22:14:42 +0100 (Tue, 25 Mar 2008) | 2 lines
Merged the ACKS from py3k
........
r61915 | thomas.heller | 2008-03-25 22:18:39 +0100 (Tue, 25 Mar 2008) | 1 line
Make _ctypes.c PY_SSIZE_T_CLEAN.
........
r61916 | benjamin.peterson | 2008-03-25 22:55:50 +0100 (Tue, 25 Mar 2008) | 3 lines
Opps! I merged the revisions, but forgot to add
the header to ACKS
........
r61918 | andrew.kuchling | 2008-03-26 01:16:50 +0100 (Wed, 26 Mar 2008) | 1 line
Minor docstring typos
........
r61919 | andrew.kuchling | 2008-03-26 01:30:02 +0100 (Wed, 26 Mar 2008) | 1 line
Add various items
........
r61922 | neal.norwitz | 2008-03-26 05:55:51 +0100 (Wed, 26 Mar 2008) | 6 lines
Try to get this test to be less flaky. It was failing sometimes because
the connect would succeed before the timeout occurred. Try using an
address and port that hopefully doesn't exist to ensure we get no response.
If this doesn't work, we can use a public address close to python.org
and hopefully that address never gets taken.
........
r61923 | jerry.seutter | 2008-03-26 06:03:03 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61924 | neal.norwitz | 2008-03-26 06:19:41 +0100 (Wed, 26 Mar 2008) | 5 lines
Ensure that the mailbox is closed to prevent problems on Windows with removing
an open file. This doesn't seem to be a problem in 2.6, but that appears
to be somewhat accidental (specific to reference counting). When this
gets merged to 3.0, it will make the 3.0 code simpler.
........
r61925 | jerry.seutter | 2008-03-26 06:32:51 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61926 | jerry.seutter | 2008-03-26 06:58:14 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61928 | georg.brandl | 2008-03-26 10:04:36 +0100 (Wed, 26 Mar 2008) | 2 lines
Add Josiah.
........
r61929 | georg.brandl | 2008-03-26 10:32:46 +0100 (Wed, 26 Mar 2008) | 2 lines
Add an example for an RFC 822 continuation.
........
r61931 | benjamin.peterson | 2008-03-26 12:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Added help options to PDB
........
r61935 | christian.heimes | 2008-03-26 13:32:49 +0100 (Wed, 26 Mar 2008) | 1 line
Prepare integration of bytearray backport branch
........
r61938 | christian.heimes | 2008-03-26 13:50:43 +0100 (Wed, 26 Mar 2008) | 3 lines
Removed merge tracking for "svnmerge" for
svn+ssh://pythondev@svn.python.org/python/branches/trunk-bytearray
........
r61943 | georg.brandl | 2008-03-26 13:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Fix and simplify error handling, silencing a compiler warning.
........
2008-03-26 10:45:42 -03:00
|
|
|
if __name__ == "__main__":
|
2013-03-02 08:25:56 -04:00
|
|
|
unittest.main()
|