2009-12-09 22:08:06 -04:00
|
|
|
from test import support
|
|
|
|
|
|
|
|
from contextlib import contextmanager
|
2002-01-05 07:31:49 -04:00
|
|
|
import imaplib
|
2009-12-09 22:08:06 -04:00
|
|
|
import os.path
|
|
|
|
import socketserver
|
2002-07-31 13:42:33 -03:00
|
|
|
import time
|
2011-01-29 15:49:40 -04:00
|
|
|
import calendar
|
2017-09-07 13:56:24 -03:00
|
|
|
import threading
|
2002-01-05 07:31:49 -04:00
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
from test.support import (reap_threads, verbose, transient_internet,
|
2017-06-14 13:48:32 -03:00
|
|
|
run_with_tz, run_with_locale, cpython_only)
|
Merged revisions 61913,61915-61916,61918-61919,61922-61926,61928-61929,61931,61935,61938,61943 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61913 | benjamin.peterson | 2008-03-25 22:14:42 +0100 (Tue, 25 Mar 2008) | 2 lines
Merged the ACKS from py3k
........
r61915 | thomas.heller | 2008-03-25 22:18:39 +0100 (Tue, 25 Mar 2008) | 1 line
Make _ctypes.c PY_SSIZE_T_CLEAN.
........
r61916 | benjamin.peterson | 2008-03-25 22:55:50 +0100 (Tue, 25 Mar 2008) | 3 lines
Opps! I merged the revisions, but forgot to add
the header to ACKS
........
r61918 | andrew.kuchling | 2008-03-26 01:16:50 +0100 (Wed, 26 Mar 2008) | 1 line
Minor docstring typos
........
r61919 | andrew.kuchling | 2008-03-26 01:30:02 +0100 (Wed, 26 Mar 2008) | 1 line
Add various items
........
r61922 | neal.norwitz | 2008-03-26 05:55:51 +0100 (Wed, 26 Mar 2008) | 6 lines
Try to get this test to be less flaky. It was failing sometimes because
the connect would succeed before the timeout occurred. Try using an
address and port that hopefully doesn't exist to ensure we get no response.
If this doesn't work, we can use a public address close to python.org
and hopefully that address never gets taken.
........
r61923 | jerry.seutter | 2008-03-26 06:03:03 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61924 | neal.norwitz | 2008-03-26 06:19:41 +0100 (Wed, 26 Mar 2008) | 5 lines
Ensure that the mailbox is closed to prevent problems on Windows with removing
an open file. This doesn't seem to be a problem in 2.6, but that appears
to be somewhat accidental (specific to reference counting). When this
gets merged to 3.0, it will make the 3.0 code simpler.
........
r61925 | jerry.seutter | 2008-03-26 06:32:51 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61926 | jerry.seutter | 2008-03-26 06:58:14 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61928 | georg.brandl | 2008-03-26 10:04:36 +0100 (Wed, 26 Mar 2008) | 2 lines
Add Josiah.
........
r61929 | georg.brandl | 2008-03-26 10:32:46 +0100 (Wed, 26 Mar 2008) | 2 lines
Add an example for an RFC 822 continuation.
........
r61931 | benjamin.peterson | 2008-03-26 12:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Added help options to PDB
........
r61935 | christian.heimes | 2008-03-26 13:32:49 +0100 (Wed, 26 Mar 2008) | 1 line
Prepare integration of bytearray backport branch
........
r61938 | christian.heimes | 2008-03-26 13:50:43 +0100 (Wed, 26 Mar 2008) | 3 lines
Removed merge tracking for "svnmerge" for
svn+ssh://pythondev@svn.python.org/python/branches/trunk-bytearray
........
r61943 | georg.brandl | 2008-03-26 13:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Fix and simplify error handling, silencing a compiler warning.
........
2008-03-26 10:45:42 -03:00
|
|
|
import unittest
|
2016-12-24 22:32:26 -04:00
|
|
|
from unittest import mock
|
2012-06-22 22:03:39 -03:00
|
|
|
from datetime import datetime, timezone, timedelta
|
2009-12-09 22:08:06 -04:00
|
|
|
try:
|
|
|
|
import ssl
|
|
|
|
except ImportError:
|
|
|
|
ssl = None
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
|
|
|
|
CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2002-01-05 07:31:49 -04:00
|
|
|
|
Merged revisions 61913,61915-61916,61918-61919,61922-61926,61928-61929,61931,61935,61938,61943 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61913 | benjamin.peterson | 2008-03-25 22:14:42 +0100 (Tue, 25 Mar 2008) | 2 lines
Merged the ACKS from py3k
........
r61915 | thomas.heller | 2008-03-25 22:18:39 +0100 (Tue, 25 Mar 2008) | 1 line
Make _ctypes.c PY_SSIZE_T_CLEAN.
........
r61916 | benjamin.peterson | 2008-03-25 22:55:50 +0100 (Tue, 25 Mar 2008) | 3 lines
Opps! I merged the revisions, but forgot to add
the header to ACKS
........
r61918 | andrew.kuchling | 2008-03-26 01:16:50 +0100 (Wed, 26 Mar 2008) | 1 line
Minor docstring typos
........
r61919 | andrew.kuchling | 2008-03-26 01:30:02 +0100 (Wed, 26 Mar 2008) | 1 line
Add various items
........
r61922 | neal.norwitz | 2008-03-26 05:55:51 +0100 (Wed, 26 Mar 2008) | 6 lines
Try to get this test to be less flaky. It was failing sometimes because
the connect would succeed before the timeout occurred. Try using an
address and port that hopefully doesn't exist to ensure we get no response.
If this doesn't work, we can use a public address close to python.org
and hopefully that address never gets taken.
........
r61923 | jerry.seutter | 2008-03-26 06:03:03 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61924 | neal.norwitz | 2008-03-26 06:19:41 +0100 (Wed, 26 Mar 2008) | 5 lines
Ensure that the mailbox is closed to prevent problems on Windows with removing
an open file. This doesn't seem to be a problem in 2.6, but that appears
to be somewhat accidental (specific to reference counting). When this
gets merged to 3.0, it will make the 3.0 code simpler.
........
r61925 | jerry.seutter | 2008-03-26 06:32:51 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61926 | jerry.seutter | 2008-03-26 06:58:14 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61928 | georg.brandl | 2008-03-26 10:04:36 +0100 (Wed, 26 Mar 2008) | 2 lines
Add Josiah.
........
r61929 | georg.brandl | 2008-03-26 10:32:46 +0100 (Wed, 26 Mar 2008) | 2 lines
Add an example for an RFC 822 continuation.
........
r61931 | benjamin.peterson | 2008-03-26 12:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Added help options to PDB
........
r61935 | christian.heimes | 2008-03-26 13:32:49 +0100 (Wed, 26 Mar 2008) | 1 line
Prepare integration of bytearray backport branch
........
r61938 | christian.heimes | 2008-03-26 13:50:43 +0100 (Wed, 26 Mar 2008) | 3 lines
Removed merge tracking for "svnmerge" for
svn+ssh://pythondev@svn.python.org/python/branches/trunk-bytearray
........
r61943 | georg.brandl | 2008-03-26 13:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Fix and simplify error handling, silencing a compiler warning.
........
2008-03-26 10:45:42 -03:00
|
|
|
class TestImaplib(unittest.TestCase):
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2011-01-29 13:19:08 -04:00
|
|
|
def test_Internaldate2tuple(self):
|
2011-01-29 15:49:40 -04:00
|
|
|
t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
|
2011-01-29 13:19:08 -04:00
|
|
|
tt = imaplib.Internaldate2tuple(
|
2011-01-29 15:49:40 -04:00
|
|
|
b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
|
|
|
|
self.assertEqual(time.mktime(tt), t0)
|
2011-01-29 13:19:08 -04:00
|
|
|
tt = imaplib.Internaldate2tuple(
|
2011-01-29 15:49:40 -04:00
|
|
|
b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
|
|
|
|
self.assertEqual(time.mktime(tt), t0)
|
2011-01-29 13:19:08 -04:00
|
|
|
tt = imaplib.Internaldate2tuple(
|
2011-01-29 15:49:40 -04:00
|
|
|
b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
|
|
|
|
self.assertEqual(time.mktime(tt), t0)
|
2011-01-29 13:19:08 -04:00
|
|
|
|
2012-04-29 16:56:49 -03:00
|
|
|
@run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
|
|
|
|
def test_Internaldate2tuple_issue10941(self):
|
|
|
|
self.assertNotEqual(imaplib.Internaldate2tuple(
|
|
|
|
b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
|
2014-07-31 19:35:45 -03:00
|
|
|
imaplib.Internaldate2tuple(
|
|
|
|
b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
|
2012-06-22 22:03:39 -03:00
|
|
|
|
|
|
|
def timevalues(self):
|
|
|
|
return [2000000000, 2000000000.0, time.localtime(2000000000),
|
|
|
|
(2033, 5, 18, 5, 33, 20, -1, -1, -1),
|
|
|
|
(2033, 5, 18, 5, 33, 20, -1, -1, 1),
|
2012-06-22 22:10:50 -03:00
|
|
|
datetime.fromtimestamp(2000000000,
|
2014-07-31 19:35:45 -03:00
|
|
|
timezone(timedelta(0, 2 * 60 * 60))),
|
2012-06-22 22:03:39 -03:00
|
|
|
'"18-May-2033 05:33:20 +0200"']
|
|
|
|
|
|
|
|
@run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
|
2015-11-16 03:21:38 -04:00
|
|
|
# DST rules included to work around quirk where the Gnu C library may not
|
|
|
|
# otherwise restore the previous time zone
|
|
|
|
@run_with_tz('STD-1DST,M3.2.0,M11.1.0')
|
2012-06-22 22:03:39 -03:00
|
|
|
def test_Time2Internaldate(self):
|
|
|
|
expected = '"18-May-2033 05:33:20 +0200"'
|
|
|
|
|
|
|
|
for t in self.timevalues():
|
|
|
|
internal = imaplib.Time2Internaldate(t)
|
|
|
|
self.assertEqual(internal, expected)
|
|
|
|
|
|
|
|
def test_that_Time2Internaldate_returns_a_result(self):
|
|
|
|
# Without tzset, we can check only that it successfully
|
|
|
|
# produces a result, not the correctness of the result itself,
|
|
|
|
# since the result depends on the timezone the machine is in.
|
|
|
|
for t in self.timevalues():
|
Merged revisions 61913,61915-61916,61918-61919,61922-61926,61928-61929,61931,61935,61938,61943 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61913 | benjamin.peterson | 2008-03-25 22:14:42 +0100 (Tue, 25 Mar 2008) | 2 lines
Merged the ACKS from py3k
........
r61915 | thomas.heller | 2008-03-25 22:18:39 +0100 (Tue, 25 Mar 2008) | 1 line
Make _ctypes.c PY_SSIZE_T_CLEAN.
........
r61916 | benjamin.peterson | 2008-03-25 22:55:50 +0100 (Tue, 25 Mar 2008) | 3 lines
Opps! I merged the revisions, but forgot to add
the header to ACKS
........
r61918 | andrew.kuchling | 2008-03-26 01:16:50 +0100 (Wed, 26 Mar 2008) | 1 line
Minor docstring typos
........
r61919 | andrew.kuchling | 2008-03-26 01:30:02 +0100 (Wed, 26 Mar 2008) | 1 line
Add various items
........
r61922 | neal.norwitz | 2008-03-26 05:55:51 +0100 (Wed, 26 Mar 2008) | 6 lines
Try to get this test to be less flaky. It was failing sometimes because
the connect would succeed before the timeout occurred. Try using an
address and port that hopefully doesn't exist to ensure we get no response.
If this doesn't work, we can use a public address close to python.org
and hopefully that address never gets taken.
........
r61923 | jerry.seutter | 2008-03-26 06:03:03 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61924 | neal.norwitz | 2008-03-26 06:19:41 +0100 (Wed, 26 Mar 2008) | 5 lines
Ensure that the mailbox is closed to prevent problems on Windows with removing
an open file. This doesn't seem to be a problem in 2.6, but that appears
to be somewhat accidental (specific to reference counting). When this
gets merged to 3.0, it will make the 3.0 code simpler.
........
r61925 | jerry.seutter | 2008-03-26 06:32:51 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61926 | jerry.seutter | 2008-03-26 06:58:14 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61928 | georg.brandl | 2008-03-26 10:04:36 +0100 (Wed, 26 Mar 2008) | 2 lines
Add Josiah.
........
r61929 | georg.brandl | 2008-03-26 10:32:46 +0100 (Wed, 26 Mar 2008) | 2 lines
Add an example for an RFC 822 continuation.
........
r61931 | benjamin.peterson | 2008-03-26 12:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Added help options to PDB
........
r61935 | christian.heimes | 2008-03-26 13:32:49 +0100 (Wed, 26 Mar 2008) | 1 line
Prepare integration of bytearray backport branch
........
r61938 | christian.heimes | 2008-03-26 13:50:43 +0100 (Wed, 26 Mar 2008) | 3 lines
Removed merge tracking for "svnmerge" for
svn+ssh://pythondev@svn.python.org/python/branches/trunk-bytearray
........
r61943 | georg.brandl | 2008-03-26 13:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Fix and simplify error handling, silencing a compiler warning.
........
2008-03-26 10:45:42 -03:00
|
|
|
imaplib.Time2Internaldate(t)
|
|
|
|
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
if ssl:
|
|
|
|
class SecureTCPServer(socketserver.TCPServer):
|
|
|
|
|
|
|
|
def get_request(self):
|
|
|
|
newsocket, fromaddr = self.socket.accept()
|
2016-09-10 18:23:33 -03:00
|
|
|
context = ssl.SSLContext()
|
|
|
|
context.load_cert_chain(CERTFILE)
|
|
|
|
connstream = context.wrap_socket(newsocket, server_side=True)
|
2009-12-09 22:08:06 -04:00
|
|
|
return connstream, fromaddr
|
|
|
|
|
|
|
|
IMAP4_SSL = imaplib.IMAP4_SSL
|
|
|
|
|
|
|
|
else:
|
|
|
|
|
|
|
|
class SecureTCPServer:
|
|
|
|
pass
|
|
|
|
|
|
|
|
IMAP4_SSL = None
|
|
|
|
|
|
|
|
|
|
|
|
class SimpleIMAPHandler(socketserver.StreamRequestHandler):
|
|
|
|
timeout = 1
|
2013-02-19 13:17:31 -04:00
|
|
|
continuation = None
|
|
|
|
capabilities = ''
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2014-09-09 13:07:49 -03:00
|
|
|
def setup(self):
|
|
|
|
super().setup()
|
|
|
|
self.server.logged = None
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
def _send(self, message):
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("SENT: %r" % message.strip())
|
2009-12-09 22:08:06 -04:00
|
|
|
self.wfile.write(message)
|
|
|
|
|
2013-02-19 13:17:31 -04:00
|
|
|
def _send_line(self, message):
|
|
|
|
self._send(message + b'\r\n')
|
|
|
|
|
|
|
|
def _send_textline(self, message):
|
|
|
|
self._send_line(message.encode('ASCII'))
|
|
|
|
|
|
|
|
def _send_tagged(self, tag, code, message):
|
|
|
|
self._send_textline(' '.join((tag, code, message)))
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
def handle(self):
|
|
|
|
# Send a welcome message.
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_textline('* OK IMAP4rev1')
|
2009-12-09 22:08:06 -04:00
|
|
|
while 1:
|
|
|
|
# Gather up input until we receive a line terminator or we timeout.
|
|
|
|
# Accumulate read(1) because it's simpler to handle the differences
|
|
|
|
# between naked sockets and SSL sockets.
|
|
|
|
line = b''
|
|
|
|
while 1:
|
|
|
|
try:
|
|
|
|
part = self.rfile.read(1)
|
|
|
|
if part == b'':
|
|
|
|
# Naked sockets return empty strings..
|
|
|
|
return
|
|
|
|
line += part
|
2012-12-25 10:47:37 -04:00
|
|
|
except OSError:
|
2012-12-18 15:14:22 -04:00
|
|
|
# ..but SSLSockets raise exceptions.
|
2009-12-09 22:08:06 -04:00
|
|
|
return
|
|
|
|
if line.endswith(b'\r\n'):
|
|
|
|
break
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print('GOT: %r' % line.strip())
|
2013-02-19 13:17:31 -04:00
|
|
|
if self.continuation:
|
|
|
|
try:
|
|
|
|
self.continuation.send(line)
|
|
|
|
except StopIteration:
|
|
|
|
self.continuation = None
|
|
|
|
continue
|
|
|
|
splitline = line.decode('ASCII').split()
|
|
|
|
tag = splitline[0]
|
|
|
|
cmd = splitline[1]
|
2009-12-09 22:08:06 -04:00
|
|
|
args = splitline[2:]
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
if hasattr(self, 'cmd_' + cmd):
|
|
|
|
continuation = getattr(self, 'cmd_' + cmd)(tag, args)
|
2013-02-19 13:17:31 -04:00
|
|
|
if continuation:
|
|
|
|
self.continuation = continuation
|
|
|
|
next(continuation)
|
2009-12-09 22:08:06 -04:00
|
|
|
else:
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_tagged(tag, 'BAD', cmd + ' unknown')
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
def cmd_CAPABILITY(self, tag, args):
|
2014-07-31 19:35:45 -03:00
|
|
|
caps = ('IMAP4rev1 ' + self.capabilities
|
|
|
|
if self.capabilities
|
|
|
|
else 'IMAP4rev1')
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_textline('* CAPABILITY ' + caps)
|
|
|
|
self._send_tagged(tag, 'OK', 'CAPABILITY completed')
|
|
|
|
|
|
|
|
def cmd_LOGOUT(self, tag, args):
|
2014-09-09 13:07:49 -03:00
|
|
|
self.server.logged = None
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_textline('* BYE IMAP4ref1 Server logging out')
|
|
|
|
self._send_tagged(tag, 'OK', 'LOGOUT completed')
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2014-09-09 13:07:49 -03:00
|
|
|
def cmd_LOGIN(self, tag, args):
|
|
|
|
self.server.logged = args[0]
|
|
|
|
self._send_tagged(tag, 'OK', 'LOGIN completed')
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2016-12-24 22:32:26 -04:00
|
|
|
class NewIMAPTestsMixin():
|
|
|
|
client = None
|
|
|
|
|
|
|
|
def _setup(self, imap_handler, connect=True):
|
|
|
|
"""
|
|
|
|
Sets up imap_handler for tests. imap_handler should inherit from either:
|
|
|
|
- SimpleIMAPHandler - for testing IMAP commands,
|
|
|
|
- socketserver.StreamRequestHandler - if raw access to stream is needed.
|
|
|
|
Returns (client, server).
|
|
|
|
"""
|
|
|
|
class TestTCPServer(self.server_class):
|
|
|
|
def handle_error(self, request, client_address):
|
|
|
|
"""
|
|
|
|
End request and raise the error if one occurs.
|
|
|
|
"""
|
|
|
|
self.close_request(request)
|
|
|
|
self.server_close()
|
|
|
|
raise
|
|
|
|
|
|
|
|
self.addCleanup(self._cleanup)
|
|
|
|
self.server = self.server_class((support.HOST, 0), imap_handler)
|
|
|
|
self.thread = threading.Thread(
|
|
|
|
name=self._testMethodName+'-server',
|
|
|
|
target=self.server.serve_forever,
|
|
|
|
# Short poll interval to make the test finish quickly.
|
|
|
|
# Time between requests is short enough that we won't wake
|
|
|
|
# up spuriously too many times.
|
|
|
|
kwargs={'poll_interval': 0.01})
|
|
|
|
self.thread.daemon = True # In case this function raises.
|
|
|
|
self.thread.start()
|
|
|
|
|
|
|
|
if connect:
|
|
|
|
self.client = self.imap_class(*self.server.server_address)
|
|
|
|
|
|
|
|
return self.client, self.server
|
|
|
|
|
|
|
|
def _cleanup(self):
|
|
|
|
"""
|
|
|
|
Cleans up the test server. This method should not be called manually,
|
|
|
|
it is added to the cleanup queue in the _setup method already.
|
|
|
|
"""
|
|
|
|
# if logout was called already we'd raise an exception trying to
|
|
|
|
# shutdown the client once again
|
|
|
|
if self.client is not None and self.client.state != 'LOGOUT':
|
|
|
|
self.client.shutdown()
|
|
|
|
# cleanup the server
|
|
|
|
self.server.shutdown()
|
|
|
|
self.server.server_close()
|
2017-09-14 18:40:56 -03:00
|
|
|
support.join_thread(self.thread, 3.0)
|
|
|
|
# Explicitly clear the attribute to prevent dangling thread
|
|
|
|
self.thread = None
|
2016-12-24 22:32:26 -04:00
|
|
|
|
|
|
|
def test_EOF_without_complete_welcome_message(self):
|
|
|
|
# http://bugs.python.org/issue5949
|
|
|
|
class EOFHandler(socketserver.StreamRequestHandler):
|
|
|
|
def handle(self):
|
|
|
|
self.wfile.write(b'* OK')
|
|
|
|
_, server = self._setup(EOFHandler, connect=False)
|
|
|
|
self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
|
|
|
|
*server.server_address)
|
|
|
|
|
|
|
|
def test_line_termination(self):
|
|
|
|
class BadNewlineHandler(SimpleIMAPHandler):
|
|
|
|
def cmd_CAPABILITY(self, tag, args):
|
|
|
|
self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
|
|
|
|
self._send_tagged(tag, 'OK', 'CAPABILITY completed')
|
|
|
|
_, server = self._setup(BadNewlineHandler, connect=False)
|
|
|
|
self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
|
|
|
|
*server.server_address)
|
|
|
|
|
|
|
|
def test_enable_raises_error_if_not_AUTH(self):
|
|
|
|
class EnableHandler(SimpleIMAPHandler):
|
|
|
|
capabilities = 'AUTH ENABLE UTF8=ACCEPT'
|
|
|
|
client, _ = self._setup(EnableHandler)
|
|
|
|
self.assertFalse(client.utf8_enabled)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
|
|
|
|
client.enable('foo')
|
|
|
|
self.assertFalse(client.utf8_enabled)
|
|
|
|
|
|
|
|
def test_enable_raises_error_if_no_capability(self):
|
|
|
|
client, _ = self._setup(SimpleIMAPHandler)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
'does not support ENABLE'):
|
|
|
|
client.enable('foo')
|
|
|
|
|
|
|
|
def test_enable_UTF8_raises_error_if_not_supported(self):
|
|
|
|
client, _ = self._setup(SimpleIMAPHandler)
|
|
|
|
typ, data = client.login('user', 'pass')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
'does not support ENABLE'):
|
|
|
|
client.enable('UTF8=ACCEPT')
|
|
|
|
|
|
|
|
def test_enable_UTF8_True_append(self):
|
|
|
|
class UTF8AppendServer(SimpleIMAPHandler):
|
|
|
|
capabilities = 'ENABLE UTF8=ACCEPT'
|
|
|
|
def cmd_ENABLE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'OK', 'ENABLE successful')
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
def cmd_APPEND(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'okay')
|
|
|
|
client, server = self._setup(UTF8AppendServer)
|
|
|
|
self.assertEqual(client._encoding, 'ascii')
|
|
|
|
code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
|
|
|
code, _ = client.enable('UTF8=ACCEPT')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(client._encoding, 'utf-8')
|
|
|
|
msg_string = 'Subject: üñí©öðé'
|
|
|
|
typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(server.response,
|
|
|
|
('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
|
|
|
|
|
|
|
|
def test_search_disallows_charset_in_utf8_mode(self):
|
|
|
|
class UTF8Server(SimpleIMAPHandler):
|
|
|
|
capabilities = 'AUTH ENABLE UTF8=ACCEPT'
|
|
|
|
def cmd_ENABLE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'OK', 'ENABLE successful')
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
client, _ = self._setup(UTF8Server)
|
|
|
|
typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
typ, _ = client.enable('UTF8=ACCEPT')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertTrue(client.utf8_enabled)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
|
|
|
|
client.search('foo', 'bar')
|
|
|
|
|
|
|
|
def test_bad_auth_name(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'NO',
|
|
|
|
'unrecognized authentication type {}'.format(args[0]))
|
|
|
|
client, _ = self._setup(MyServer)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
'unrecognized authentication type METHOD'):
|
|
|
|
client.authenticate('METHOD', lambda: 1)
|
|
|
|
|
|
|
|
def test_invalid_authentication(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.response = yield
|
|
|
|
self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
|
|
|
|
client, _ = self._setup(MyServer)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
r'\[AUTHENTICATIONFAILED\] invalid'):
|
|
|
|
client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
|
|
|
|
def test_valid_authentication_bytes(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
client, server = self._setup(MyServer)
|
|
|
|
code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
|
|
|
|
|
|
|
def test_valid_authentication_plain_text(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
client, server = self._setup(MyServer)
|
|
|
|
code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
|
|
|
|
|
|
|
def test_login_cram_md5_bytes(self):
|
|
|
|
class AuthHandler(SimpleIMAPHandler):
|
|
|
|
capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
|
|
|
|
'VzdG9uLm1jaS5uZXQ=')
|
|
|
|
r = yield
|
|
|
|
if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
|
|
|
|
b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
|
|
|
|
self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'NO', 'No access')
|
|
|
|
client, _ = self._setup(AuthHandler)
|
|
|
|
self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
|
|
|
|
ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
|
|
|
|
self.assertEqual(ret, "OK")
|
|
|
|
|
|
|
|
def test_login_cram_md5_plain_text(self):
|
|
|
|
class AuthHandler(SimpleIMAPHandler):
|
|
|
|
capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
|
|
|
|
'VzdG9uLm1jaS5uZXQ=')
|
|
|
|
r = yield
|
|
|
|
if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
|
|
|
|
b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
|
|
|
|
self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'NO', 'No access')
|
|
|
|
client, _ = self._setup(AuthHandler)
|
|
|
|
self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
|
|
|
|
ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
|
|
|
|
self.assertEqual(ret, "OK")
|
|
|
|
|
|
|
|
def test_aborted_authentication(self):
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.response = yield
|
|
|
|
if self.response == b'*\r\n':
|
|
|
|
self._send_tagged(
|
|
|
|
tag,
|
|
|
|
'NO',
|
|
|
|
'[AUTHENTICATIONFAILED] aborted')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'OK', 'MYAUTH successful')
|
|
|
|
client, _ = self._setup(MyServer)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
r'\[AUTHENTICATIONFAILED\] aborted'):
|
|
|
|
client.authenticate('MYAUTH', lambda x: None)
|
|
|
|
|
|
|
|
@mock.patch('imaplib._MAXLINE', 10)
|
|
|
|
def test_linetoolong(self):
|
|
|
|
class TooLongHandler(SimpleIMAPHandler):
|
|
|
|
def handle(self):
|
|
|
|
# send response line longer than the limit set in the next line
|
|
|
|
self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
|
|
|
|
_, server = self._setup(TooLongHandler, connect=False)
|
|
|
|
with self.assertRaisesRegex(imaplib.IMAP4.error,
|
|
|
|
'got more than 10 bytes'):
|
|
|
|
self.imap_class(*server.server_address)
|
|
|
|
|
|
|
|
def test_simple_with_statement(self):
|
|
|
|
_, server = self._setup(SimpleIMAPHandler, connect=False)
|
|
|
|
with self.imap_class(*server.server_address):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def test_with_statement(self):
|
|
|
|
_, server = self._setup(SimpleIMAPHandler, connect=False)
|
|
|
|
with self.imap_class(*server.server_address) as imap:
|
|
|
|
imap.login('user', 'pass')
|
|
|
|
self.assertEqual(server.logged, 'user')
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
|
|
|
|
def test_with_statement_logout(self):
|
|
|
|
# It is legal to log out explicitly inside the with block
|
|
|
|
_, server = self._setup(SimpleIMAPHandler, connect=False)
|
|
|
|
with self.imap_class(*server.server_address) as imap:
|
|
|
|
imap.login('user', 'pass')
|
|
|
|
self.assertEqual(server.logged, 'user')
|
|
|
|
imap.logout()
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
|
|
|
|
# command tests
|
|
|
|
|
|
|
|
def test_login(self):
|
|
|
|
client, _ = self._setup(SimpleIMAPHandler)
|
|
|
|
typ, data = client.login('user', 'pass')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(data[0], b'LOGIN completed')
|
|
|
|
self.assertEqual(client.state, 'AUTH')
|
|
|
|
|
|
|
|
def test_logout(self):
|
|
|
|
client, _ = self._setup(SimpleIMAPHandler)
|
|
|
|
typ, data = client.login('user', 'pass')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(data[0], b'LOGIN completed')
|
|
|
|
typ, data = client.logout()
|
|
|
|
self.assertEqual(typ, 'BYE')
|
|
|
|
self.assertEqual(data[0], b'IMAP4ref1 Server logging out')
|
|
|
|
self.assertEqual(client.state, 'LOGOUT')
|
|
|
|
|
|
|
|
def test_lsub(self):
|
|
|
|
class LsubCmd(SimpleIMAPHandler):
|
|
|
|
def cmd_LSUB(self, tag, args):
|
|
|
|
self._send_textline('* LSUB () "." directoryA')
|
|
|
|
return self._send_tagged(tag, 'OK', 'LSUB completed')
|
|
|
|
client, _ = self._setup(LsubCmd)
|
|
|
|
client.login('user', 'pass')
|
|
|
|
typ, data = client.lsub()
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(data[0], b'() "." directoryA')
|
|
|
|
|
|
|
|
|
|
|
|
class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
|
|
|
|
imap_class = imaplib.IMAP4
|
|
|
|
server_class = socketserver.TCPServer
|
|
|
|
|
|
|
|
|
|
|
|
@unittest.skipUnless(ssl, "SSL not available")
|
|
|
|
class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
|
2017-01-12 06:51:31 -04:00
|
|
|
imap_class = IMAP4_SSL
|
2016-12-24 22:32:26 -04:00
|
|
|
server_class = SecureTCPServer
|
|
|
|
|
|
|
|
def test_ssl_raises(self):
|
2017-09-15 15:27:30 -03:00
|
|
|
ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
|
|
|
|
self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
|
|
|
|
self.assertEqual(ssl_context.check_hostname, True)
|
2016-12-24 22:32:26 -04:00
|
|
|
ssl_context.load_verify_locations(CAFILE)
|
|
|
|
|
|
|
|
with self.assertRaisesRegex(ssl.CertificateError,
|
2018-01-27 10:51:38 -04:00
|
|
|
"IP address mismatch, certificate is not valid for "
|
|
|
|
"'127.0.0.1'"):
|
2016-12-24 22:32:26 -04:00
|
|
|
_, server = self._setup(SimpleIMAPHandler)
|
|
|
|
client = self.imap_class(*server.server_address,
|
|
|
|
ssl_context=ssl_context)
|
|
|
|
client.shutdown()
|
|
|
|
|
|
|
|
def test_ssl_verified(self):
|
2017-09-15 15:27:30 -03:00
|
|
|
ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
|
2016-12-24 22:32:26 -04:00
|
|
|
ssl_context.load_verify_locations(CAFILE)
|
|
|
|
|
|
|
|
_, server = self._setup(SimpleIMAPHandler)
|
|
|
|
client = self.imap_class("localhost", server.server_address[1],
|
|
|
|
ssl_context=ssl_context)
|
|
|
|
client.shutdown()
|
|
|
|
|
2017-06-14 13:48:32 -03:00
|
|
|
# Mock the private method _connect(), so mark the test as specific
|
|
|
|
# to CPython stdlib
|
|
|
|
@cpython_only
|
|
|
|
def test_certfile_arg_warn(self):
|
|
|
|
with support.check_warnings(('', DeprecationWarning)):
|
|
|
|
with mock.patch.object(self.imap_class, 'open'):
|
|
|
|
with mock.patch.object(self.imap_class, '_connect'):
|
|
|
|
self.imap_class('localhost', 143, certfile=CERTFILE)
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
class ThreadedNetworkedTests(unittest.TestCase):
|
|
|
|
server_class = socketserver.TCPServer
|
|
|
|
imap_class = imaplib.IMAP4
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
def make_server(self, addr, hdlr):
|
|
|
|
|
|
|
|
class MyServer(self.server_class):
|
|
|
|
def handle_error(self, request, client_address):
|
|
|
|
self.close_request(request)
|
|
|
|
self.server_close()
|
|
|
|
raise
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("creating server")
|
2009-12-09 22:08:06 -04:00
|
|
|
server = MyServer(addr, hdlr)
|
2010-11-20 15:04:17 -04:00
|
|
|
self.assertEqual(server.server_address, server.socket.getsockname())
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
if verbose:
|
|
|
|
print("server created")
|
|
|
|
print("ADDR =", addr)
|
|
|
|
print("CLASS =", self.server_class)
|
|
|
|
print("HDLR =", server.RequestHandlerClass)
|
|
|
|
|
|
|
|
t = threading.Thread(
|
|
|
|
name='%s serving' % self.server_class,
|
|
|
|
target=server.serve_forever,
|
|
|
|
# Short poll interval to make the test finish quickly.
|
|
|
|
# Time between requests is short enough that we won't wake
|
|
|
|
# up spuriously too many times.
|
2014-07-31 19:35:45 -03:00
|
|
|
kwargs={'poll_interval': 0.01})
|
2009-12-09 22:08:06 -04:00
|
|
|
t.daemon = True # In case this function raises.
|
|
|
|
t.start()
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("server running")
|
2009-12-09 22:08:06 -04:00
|
|
|
return server, t
|
|
|
|
|
|
|
|
def reap_server(self, server, thread):
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("waiting for server")
|
2009-12-09 22:08:06 -04:00
|
|
|
server.shutdown()
|
2011-01-05 19:01:38 -04:00
|
|
|
server.server_close()
|
2009-12-09 22:08:06 -04:00
|
|
|
thread.join()
|
2014-07-31 19:35:45 -03:00
|
|
|
if verbose:
|
|
|
|
print("done")
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
@contextmanager
|
|
|
|
def reaped_server(self, hdlr):
|
|
|
|
server, thread = self.make_server((support.HOST, 0), hdlr)
|
|
|
|
try:
|
|
|
|
yield server
|
|
|
|
finally:
|
|
|
|
self.reap_server(server, thread)
|
|
|
|
|
2013-02-19 13:17:31 -04:00
|
|
|
@contextmanager
|
|
|
|
def reaped_pair(self, hdlr):
|
2013-12-07 15:27:41 -04:00
|
|
|
with self.reaped_server(hdlr) as server:
|
|
|
|
client = self.imap_class(*server.server_address)
|
|
|
|
try:
|
|
|
|
yield server, client
|
|
|
|
finally:
|
|
|
|
client.logout()
|
2013-02-19 13:17:31 -04:00
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
@reap_threads
|
|
|
|
def test_connect(self):
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
client = self.imap_class(*server.server_address)
|
|
|
|
client.shutdown()
|
|
|
|
|
2016-01-02 18:18:34 -04:00
|
|
|
@reap_threads
|
|
|
|
def test_bracket_flags(self):
|
|
|
|
|
|
|
|
# This violates RFC 3501, which disallows ']' characters in tag names,
|
|
|
|
# but imaplib has allowed producing such tags forever, other programs
|
|
|
|
# also produce them (eg: OtherInbox's Organizer app as of 20140716),
|
|
|
|
# and Gmail, for example, accepts them and produces them. So we
|
|
|
|
# support them. See issue #21815.
|
|
|
|
|
|
|
|
class BracketFlagHandler(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def handle(self):
|
|
|
|
self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
|
|
|
|
super().handle()
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
|
|
|
|
def cmd_SELECT(self, tag, args):
|
|
|
|
flag_msg = ' \\'.join(self.flags)
|
|
|
|
self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
|
|
|
|
self._send_line(b'* 2 EXISTS')
|
|
|
|
self._send_line(b'* 0 RECENT')
|
|
|
|
msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
|
|
|
|
% flag_msg)
|
|
|
|
self._send_line(msg.encode('ascii'))
|
|
|
|
self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
|
|
|
|
|
|
|
|
def cmd_STORE(self, tag, args):
|
|
|
|
new_flags = args[2].strip('(').strip(')').split()
|
|
|
|
self.flags.extend(new_flags)
|
|
|
|
flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
|
|
|
|
msg = '* %s FETCH %s' % (args[0], flags_msg)
|
|
|
|
self._send_line(msg.encode('ascii'))
|
|
|
|
self._send_tagged(tag, 'OK', 'STORE completed.')
|
|
|
|
|
|
|
|
with self.reaped_pair(BracketFlagHandler) as (server, client):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response, b'ZmFrZQ==\r\n')
|
|
|
|
client.select('test')
|
|
|
|
typ, [data] = client.store(b'1', "+FLAGS", "[test]")
|
|
|
|
self.assertIn(b'[test]', data)
|
|
|
|
client.select('test')
|
|
|
|
typ, [data] = client.response('PERMANENTFLAGS')
|
|
|
|
self.assertIn(b'[test]', data)
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
@reap_threads
|
|
|
|
def test_issue5949(self):
|
|
|
|
|
|
|
|
class EOFHandler(socketserver.StreamRequestHandler):
|
|
|
|
def handle(self):
|
|
|
|
# EOF without sending a complete welcome message.
|
|
|
|
self.wfile.write(b'* OK')
|
|
|
|
|
|
|
|
with self.reaped_server(EOFHandler) as server:
|
|
|
|
self.assertRaises(imaplib.IMAP4.abort,
|
|
|
|
self.imap_class, *server.server_address)
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_line_termination(self):
|
|
|
|
|
|
|
|
class BadNewlineHandler(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_CAPABILITY(self, tag, args):
|
|
|
|
self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_tagged(tag, 'OK', 'CAPABILITY completed')
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
with self.reaped_server(BadNewlineHandler) as server:
|
|
|
|
self.assertRaises(imaplib.IMAP4.abort,
|
|
|
|
self.imap_class, *server.server_address)
|
|
|
|
|
2015-05-10 20:17:23 -03:00
|
|
|
class UTF8Server(SimpleIMAPHandler):
|
|
|
|
capabilities = 'AUTH ENABLE UTF8=ACCEPT'
|
|
|
|
|
|
|
|
def cmd_ENABLE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'OK', 'ENABLE successful')
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_enable_raises_error_if_not_AUTH(self):
|
|
|
|
with self.reaped_pair(self.UTF8Server) as (server, client):
|
|
|
|
self.assertFalse(client.utf8_enabled)
|
|
|
|
self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
|
|
|
|
self.assertFalse(client.utf8_enabled)
|
|
|
|
|
|
|
|
# XXX Also need a test that enable after SELECT raises an error.
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_enable_raises_error_if_no_capability(self):
|
|
|
|
class NoEnableServer(self.UTF8Server):
|
|
|
|
capabilities = 'AUTH'
|
|
|
|
with self.reaped_pair(NoEnableServer) as (server, client):
|
|
|
|
self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_enable_UTF8_raises_error_if_not_supported(self):
|
|
|
|
class NonUTF8Server(SimpleIMAPHandler):
|
|
|
|
pass
|
|
|
|
with self.assertRaises(imaplib.IMAP4.error):
|
|
|
|
with self.reaped_pair(NonUTF8Server) as (server, client):
|
|
|
|
typ, data = client.login('user', 'pass')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
client.enable('UTF8=ACCEPT')
|
|
|
|
pass
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_enable_UTF8_True_append(self):
|
|
|
|
|
|
|
|
class UTF8AppendServer(self.UTF8Server):
|
|
|
|
def cmd_APPEND(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'okay')
|
|
|
|
|
|
|
|
with self.reaped_pair(UTF8AppendServer) as (server, client):
|
|
|
|
self.assertEqual(client._encoding, 'ascii')
|
|
|
|
code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response,
|
|
|
|
b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
|
|
|
code, _ = client.enable('UTF8=ACCEPT')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(client._encoding, 'utf-8')
|
|
|
|
msg_string = 'Subject: üñí©öðé'
|
|
|
|
typ, data = client.append(
|
|
|
|
None, None, None, msg_string.encode('utf-8'))
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertEqual(
|
|
|
|
server.response,
|
|
|
|
('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
|
|
|
|
)
|
|
|
|
|
|
|
|
# XXX also need a test that makes sure that the Literal and Untagged_status
|
|
|
|
# regexes uses unicode in UTF8 mode instead of the default ASCII.
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_search_disallows_charset_in_utf8_mode(self):
|
|
|
|
with self.reaped_pair(self.UTF8Server) as (server, client):
|
|
|
|
typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
typ, _ = client.enable('UTF8=ACCEPT')
|
|
|
|
self.assertEqual(typ, 'OK')
|
|
|
|
self.assertTrue(client.utf8_enabled)
|
|
|
|
self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
|
|
|
|
|
2013-02-19 13:17:31 -04:00
|
|
|
@reap_threads
|
|
|
|
def test_bad_auth_name(self):
|
|
|
|
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_tagged(tag, 'NO', 'unrecognized authentication '
|
2014-07-31 19:35:45 -03:00
|
|
|
'type {}'.format(args[0]))
|
2013-02-19 13:17:31 -04:00
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
with self.assertRaises(imaplib.IMAP4.error):
|
|
|
|
client.authenticate('METHOD', lambda: 1)
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_invalid_authentication(self):
|
|
|
|
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.response = yield
|
|
|
|
self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
|
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
with self.assertRaises(imaplib.IMAP4.error):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_valid_authentication(self):
|
|
|
|
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.server.response = yield
|
|
|
|
self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
|
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: b'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response,
|
2014-07-31 19:35:45 -03:00
|
|
|
b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
2013-02-19 13:17:31 -04:00
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: 'fake')
|
|
|
|
self.assertEqual(code, 'OK')
|
|
|
|
self.assertEqual(server.response,
|
2014-07-31 19:35:45 -03:00
|
|
|
b'ZmFrZQ==\r\n') # b64 encoded 'fake'
|
2013-02-19 13:17:31 -04:00
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_login_cram_md5(self):
|
|
|
|
|
|
|
|
class AuthHandler(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
|
2014-07-31 19:35:45 -03:00
|
|
|
'VzdG9uLm1jaS5uZXQ=')
|
2013-02-19 13:17:31 -04:00
|
|
|
r = yield
|
2014-07-31 19:35:45 -03:00
|
|
|
if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
|
|
|
|
b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
|
2013-02-19 13:17:31 -04:00
|
|
|
self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'NO', 'No access')
|
|
|
|
|
|
|
|
with self.reaped_pair(AuthHandler) as (server, client):
|
|
|
|
self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
|
|
|
|
ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
|
|
|
|
self.assertEqual(ret, "OK")
|
|
|
|
|
|
|
|
with self.reaped_pair(AuthHandler) as (server, client):
|
|
|
|
self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
|
|
|
|
ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
|
|
|
|
self.assertEqual(ret, "OK")
|
2009-12-09 22:08:06 -04:00
|
|
|
|
|
|
|
|
2015-07-30 17:59:02 -03:00
|
|
|
@reap_threads
|
|
|
|
def test_aborted_authentication(self):
|
|
|
|
|
|
|
|
class MyServer(SimpleIMAPHandler):
|
|
|
|
|
|
|
|
def cmd_AUTHENTICATE(self, tag, args):
|
|
|
|
self._send_textline('+')
|
|
|
|
self.response = yield
|
|
|
|
|
|
|
|
if self.response == b'*\r\n':
|
|
|
|
self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
|
|
|
|
else:
|
|
|
|
self._send_tagged(tag, 'OK', 'MYAUTH successful')
|
|
|
|
|
|
|
|
with self.reaped_pair(MyServer) as (server, client):
|
|
|
|
with self.assertRaises(imaplib.IMAP4.error):
|
|
|
|
code, data = client.authenticate('MYAUTH', lambda x: None)
|
|
|
|
|
2015-07-30 18:01:38 -03:00
|
|
|
|
2013-10-27 02:52:14 -03:00
|
|
|
def test_linetoolong(self):
|
|
|
|
class TooLongHandler(SimpleIMAPHandler):
|
|
|
|
def handle(self):
|
|
|
|
# Send a very long response line
|
2014-07-31 19:35:45 -03:00
|
|
|
self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
|
2013-10-27 02:52:14 -03:00
|
|
|
|
|
|
|
with self.reaped_server(TooLongHandler) as server:
|
|
|
|
self.assertRaises(imaplib.IMAP4.error,
|
|
|
|
self.imap_class, *server.server_address)
|
|
|
|
|
2014-09-09 13:07:49 -03:00
|
|
|
@reap_threads
|
|
|
|
def test_simple_with_statement(self):
|
|
|
|
# simplest call
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
with self.imap_class(*server.server_address):
|
|
|
|
pass
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_with_statement(self):
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
with self.imap_class(*server.server_address) as imap:
|
|
|
|
imap.login('user', 'pass')
|
|
|
|
self.assertEqual(server.logged, 'user')
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
|
|
|
|
@reap_threads
|
|
|
|
def test_with_statement_logout(self):
|
|
|
|
# what happens if already logout in the block?
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
with self.imap_class(*server.server_address) as imap:
|
|
|
|
imap.login('user', 'pass')
|
|
|
|
self.assertEqual(server.logged, 'user')
|
|
|
|
imap.logout()
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
self.assertIsNone(server.logged)
|
|
|
|
|
2013-10-27 02:52:14 -03:00
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
@unittest.skipUnless(ssl, "SSL not available")
|
2014-07-31 19:35:45 -03:00
|
|
|
class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
|
2009-12-09 22:08:06 -04:00
|
|
|
server_class = SecureTCPServer
|
|
|
|
imap_class = IMAP4_SSL
|
|
|
|
|
2013-12-02 15:01:29 -04:00
|
|
|
@reap_threads
|
|
|
|
def test_ssl_verified(self):
|
2017-09-15 15:27:30 -03:00
|
|
|
ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
|
2013-12-02 15:01:29 -04:00
|
|
|
ssl_context.load_verify_locations(CAFILE)
|
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
with self.assertRaisesRegex(
|
|
|
|
ssl.CertificateError,
|
2018-01-27 10:51:38 -04:00
|
|
|
"IP address mismatch, certificate is not valid for "
|
|
|
|
"'127.0.0.1'"):
|
2013-12-02 15:01:29 -04:00
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
client = self.imap_class(*server.server_address,
|
|
|
|
ssl_context=ssl_context)
|
|
|
|
client.shutdown()
|
|
|
|
|
|
|
|
with self.reaped_server(SimpleIMAPHandler) as server:
|
|
|
|
client = self.imap_class("localhost", server.server_address[1],
|
|
|
|
ssl_context=ssl_context)
|
|
|
|
client.shutdown()
|
|
|
|
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2014-07-31 19:35:45 -03:00
|
|
|
@unittest.skipUnless(
|
|
|
|
support.is_resource_enabled('network'), 'network resource disabled')
|
2010-11-09 18:55:55 -04:00
|
|
|
class RemoteIMAPTest(unittest.TestCase):
|
|
|
|
host = 'cyrus.andrew.cmu.edu'
|
|
|
|
port = 143
|
|
|
|
username = 'anonymous'
|
|
|
|
password = 'pass'
|
|
|
|
imap_class = imaplib.IMAP4
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
with transient_internet(self.host):
|
|
|
|
self.server = self.imap_class(self.host, self.port)
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
if self.server is not None:
|
2011-03-22 23:10:14 -03:00
|
|
|
with transient_internet(self.host):
|
|
|
|
self.server.logout()
|
2010-11-09 18:55:55 -04:00
|
|
|
|
|
|
|
def test_logincapa(self):
|
2011-03-22 23:10:14 -03:00
|
|
|
with transient_internet(self.host):
|
|
|
|
for cap in self.server.capabilities:
|
|
|
|
self.assertIsInstance(cap, str)
|
2012-06-17 08:10:21 -03:00
|
|
|
self.assertIn('LOGINDISABLED', self.server.capabilities)
|
|
|
|
self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
|
2011-03-22 23:10:14 -03:00
|
|
|
rs = self.server.login(self.username, self.password)
|
|
|
|
self.assertEqual(rs[0], 'OK')
|
2010-11-09 18:55:55 -04:00
|
|
|
|
|
|
|
def test_logout(self):
|
2011-03-22 23:10:14 -03:00
|
|
|
with transient_internet(self.host):
|
|
|
|
rs = self.server.logout()
|
|
|
|
self.server = None
|
|
|
|
self.assertEqual(rs[0], 'BYE')
|
2009-12-09 22:08:06 -04:00
|
|
|
|
2010-11-09 18:55:55 -04:00
|
|
|
|
2010-11-12 14:49:16 -04:00
|
|
|
@unittest.skipUnless(ssl, "SSL not available")
|
2014-07-31 19:35:45 -03:00
|
|
|
@unittest.skipUnless(
|
|
|
|
support.is_resource_enabled('network'), 'network resource disabled')
|
2010-11-12 14:49:16 -04:00
|
|
|
class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super().setUp()
|
2011-03-22 23:10:14 -03:00
|
|
|
with transient_internet(self.host):
|
|
|
|
rs = self.server.starttls()
|
|
|
|
self.assertEqual(rs[0], 'OK')
|
2010-11-12 14:49:16 -04:00
|
|
|
|
|
|
|
def test_logincapa(self):
|
2010-11-16 13:55:26 -04:00
|
|
|
for cap in self.server.capabilities:
|
|
|
|
self.assertIsInstance(cap, str)
|
2012-06-17 08:10:21 -03:00
|
|
|
self.assertNotIn('LOGINDISABLED', self.server.capabilities)
|
2010-11-12 14:49:16 -04:00
|
|
|
|
|
|
|
|
2010-11-09 18:55:55 -04:00
|
|
|
@unittest.skipUnless(ssl, "SSL not available")
|
|
|
|
class RemoteIMAP_SSLTest(RemoteIMAPTest):
|
|
|
|
port = 993
|
|
|
|
imap_class = IMAP4_SSL
|
|
|
|
|
2011-05-06 13:49:52 -03:00
|
|
|
def setUp(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def create_ssl_context(self):
|
2017-09-15 15:27:30 -03:00
|
|
|
ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
|
|
|
|
ssl_context.check_hostname = False
|
|
|
|
ssl_context.verify_mode = ssl.CERT_NONE
|
2011-05-06 13:49:52 -03:00
|
|
|
ssl_context.load_cert_chain(CERTFILE)
|
|
|
|
return ssl_context
|
|
|
|
|
|
|
|
def check_logincapa(self, server):
|
|
|
|
try:
|
|
|
|
for cap in server.capabilities:
|
|
|
|
self.assertIsInstance(cap, str)
|
2012-06-17 08:15:45 -03:00
|
|
|
self.assertNotIn('LOGINDISABLED', server.capabilities)
|
|
|
|
self.assertIn('AUTH=PLAIN', server.capabilities)
|
2011-05-06 13:49:52 -03:00
|
|
|
rs = server.login(self.username, self.password)
|
|
|
|
self.assertEqual(rs[0], 'OK')
|
|
|
|
finally:
|
|
|
|
server.logout()
|
|
|
|
|
2010-11-09 18:55:55 -04:00
|
|
|
def test_logincapa(self):
|
2011-05-06 13:49:52 -03:00
|
|
|
with transient_internet(self.host):
|
|
|
|
_server = self.imap_class(self.host, self.port)
|
|
|
|
self.check_logincapa(_server)
|
|
|
|
|
|
|
|
def test_logout(self):
|
|
|
|
with transient_internet(self.host):
|
|
|
|
_server = self.imap_class(self.host, self.port)
|
|
|
|
rs = _server.logout()
|
|
|
|
self.assertEqual(rs[0], 'BYE')
|
|
|
|
|
|
|
|
def test_ssl_context_certfile_exclusive(self):
|
|
|
|
with transient_internet(self.host):
|
2014-07-31 19:35:45 -03:00
|
|
|
self.assertRaises(
|
|
|
|
ValueError, self.imap_class, self.host, self.port,
|
|
|
|
certfile=CERTFILE, ssl_context=self.create_ssl_context())
|
2011-05-06 13:49:52 -03:00
|
|
|
|
|
|
|
def test_ssl_context_keyfile_exclusive(self):
|
|
|
|
with transient_internet(self.host):
|
2014-07-31 19:35:45 -03:00
|
|
|
self.assertRaises(
|
|
|
|
ValueError, self.imap_class, self.host, self.port,
|
|
|
|
keyfile=CERTFILE, ssl_context=self.create_ssl_context())
|
Merged revisions 61913,61915-61916,61918-61919,61922-61926,61928-61929,61931,61935,61938,61943 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r61913 | benjamin.peterson | 2008-03-25 22:14:42 +0100 (Tue, 25 Mar 2008) | 2 lines
Merged the ACKS from py3k
........
r61915 | thomas.heller | 2008-03-25 22:18:39 +0100 (Tue, 25 Mar 2008) | 1 line
Make _ctypes.c PY_SSIZE_T_CLEAN.
........
r61916 | benjamin.peterson | 2008-03-25 22:55:50 +0100 (Tue, 25 Mar 2008) | 3 lines
Opps! I merged the revisions, but forgot to add
the header to ACKS
........
r61918 | andrew.kuchling | 2008-03-26 01:16:50 +0100 (Wed, 26 Mar 2008) | 1 line
Minor docstring typos
........
r61919 | andrew.kuchling | 2008-03-26 01:30:02 +0100 (Wed, 26 Mar 2008) | 1 line
Add various items
........
r61922 | neal.norwitz | 2008-03-26 05:55:51 +0100 (Wed, 26 Mar 2008) | 6 lines
Try to get this test to be less flaky. It was failing sometimes because
the connect would succeed before the timeout occurred. Try using an
address and port that hopefully doesn't exist to ensure we get no response.
If this doesn't work, we can use a public address close to python.org
and hopefully that address never gets taken.
........
r61923 | jerry.seutter | 2008-03-26 06:03:03 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61924 | neal.norwitz | 2008-03-26 06:19:41 +0100 (Wed, 26 Mar 2008) | 5 lines
Ensure that the mailbox is closed to prevent problems on Windows with removing
an open file. This doesn't seem to be a problem in 2.6, but that appears
to be somewhat accidental (specific to reference counting). When this
gets merged to 3.0, it will make the 3.0 code simpler.
........
r61925 | jerry.seutter | 2008-03-26 06:32:51 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61926 | jerry.seutter | 2008-03-26 06:58:14 +0100 (Wed, 26 Mar 2008) | 1 line
Changed test so it no longer runs as a side effect of importing.
........
r61928 | georg.brandl | 2008-03-26 10:04:36 +0100 (Wed, 26 Mar 2008) | 2 lines
Add Josiah.
........
r61929 | georg.brandl | 2008-03-26 10:32:46 +0100 (Wed, 26 Mar 2008) | 2 lines
Add an example for an RFC 822 continuation.
........
r61931 | benjamin.peterson | 2008-03-26 12:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Added help options to PDB
........
r61935 | christian.heimes | 2008-03-26 13:32:49 +0100 (Wed, 26 Mar 2008) | 1 line
Prepare integration of bytearray backport branch
........
r61938 | christian.heimes | 2008-03-26 13:50:43 +0100 (Wed, 26 Mar 2008) | 3 lines
Removed merge tracking for "svnmerge" for
svn+ssh://pythondev@svn.python.org/python/branches/trunk-bytearray
........
r61943 | georg.brandl | 2008-03-26 13:57:47 +0100 (Wed, 26 Mar 2008) | 2 lines
Fix and simplify error handling, silencing a compiler warning.
........
2008-03-26 10:45:42 -03:00
|
|
|
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
2013-03-02 08:25:56 -04:00
|
|
|
unittest.main()
|