test_imaplib.py 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089
  1. from test import support
  2. from test.support import socket_helper
  3. from contextlib import contextmanager
  4. import imaplib
  5. import os.path
  6. import socketserver
  7. import time
  8. import calendar
  9. import threading
  10. import socket
  11. from test.support import (verbose,
  12. run_with_tz, run_with_locale, cpython_only,
  13. requires_working_socket)
  14. from test.support import hashlib_helper
  15. from test.support import threading_helper
  16. from test.support import warnings_helper
  17. import unittest
  18. from unittest import mock
  19. from datetime import datetime, timezone, timedelta
  20. try:
  21. import ssl
  22. except ImportError:
  23. ssl = None
  24. support.requires_working_socket(module=True)
  25. CERTFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "keycert3.pem")
  26. CAFILE = os.path.join(os.path.dirname(__file__) or os.curdir, "pycacert.pem")
  27. class TestImaplib(unittest.TestCase):
  28. def test_Internaldate2tuple(self):
  29. t0 = calendar.timegm((2000, 1, 1, 0, 0, 0, -1, -1, -1))
  30. tt = imaplib.Internaldate2tuple(
  31. b'25 (INTERNALDATE "01-Jan-2000 00:00:00 +0000")')
  32. self.assertEqual(time.mktime(tt), t0)
  33. tt = imaplib.Internaldate2tuple(
  34. b'25 (INTERNALDATE "01-Jan-2000 11:30:00 +1130")')
  35. self.assertEqual(time.mktime(tt), t0)
  36. tt = imaplib.Internaldate2tuple(
  37. b'25 (INTERNALDATE "31-Dec-1999 12:30:00 -1130")')
  38. self.assertEqual(time.mktime(tt), t0)
  39. @run_with_tz('MST+07MDT,M4.1.0,M10.5.0')
  40. def test_Internaldate2tuple_issue10941(self):
  41. self.assertNotEqual(imaplib.Internaldate2tuple(
  42. b'25 (INTERNALDATE "02-Apr-2000 02:30:00 +0000")'),
  43. imaplib.Internaldate2tuple(
  44. b'25 (INTERNALDATE "02-Apr-2000 03:30:00 +0000")'))
  45. def timevalues(self):
  46. return [2000000000, 2000000000.0, time.localtime(2000000000),
  47. (2033, 5, 18, 5, 33, 20, -1, -1, -1),
  48. (2033, 5, 18, 5, 33, 20, -1, -1, 1),
  49. datetime.fromtimestamp(2000000000,
  50. timezone(timedelta(0, 2 * 60 * 60))),
  51. '"18-May-2033 05:33:20 +0200"']
  52. @run_with_locale('LC_ALL', 'de_DE', 'fr_FR')
  53. # DST rules included to work around quirk where the Gnu C library may not
  54. # otherwise restore the previous time zone
  55. @run_with_tz('STD-1DST,M3.2.0,M11.1.0')
  56. def test_Time2Internaldate(self):
  57. expected = '"18-May-2033 05:33:20 +0200"'
  58. for t in self.timevalues():
  59. internal = imaplib.Time2Internaldate(t)
  60. self.assertEqual(internal, expected)
  61. def test_that_Time2Internaldate_returns_a_result(self):
  62. # Without tzset, we can check only that it successfully
  63. # produces a result, not the correctness of the result itself,
  64. # since the result depends on the timezone the machine is in.
  65. for t in self.timevalues():
  66. imaplib.Time2Internaldate(t)
  67. def test_imap4_host_default_value(self):
  68. # Check whether the IMAP4_PORT is truly unavailable.
  69. with socket.socket() as s:
  70. try:
  71. s.connect(('', imaplib.IMAP4_PORT))
  72. self.skipTest(
  73. "Cannot run the test with local IMAP server running.")
  74. except socket.error:
  75. pass
  76. # This is the exception that should be raised.
  77. expected_errnos = socket_helper.get_socket_conn_refused_errs()
  78. with self.assertRaises(OSError) as cm:
  79. imaplib.IMAP4()
  80. self.assertIn(cm.exception.errno, expected_errnos)
  81. if ssl:
  82. class SecureTCPServer(socketserver.TCPServer):
  83. def get_request(self):
  84. newsocket, fromaddr = self.socket.accept()
  85. context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
  86. context.load_cert_chain(CERTFILE)
  87. connstream = context.wrap_socket(newsocket, server_side=True)
  88. return connstream, fromaddr
  89. IMAP4_SSL = imaplib.IMAP4_SSL
  90. else:
  91. class SecureTCPServer:
  92. pass
  93. IMAP4_SSL = None
  94. class SimpleIMAPHandler(socketserver.StreamRequestHandler):
  95. timeout = support.LOOPBACK_TIMEOUT
  96. continuation = None
  97. capabilities = ''
  98. def setup(self):
  99. super().setup()
  100. self.server.is_selected = False
  101. self.server.logged = None
  102. def _send(self, message):
  103. if verbose:
  104. print("SENT: %r" % message.strip())
  105. self.wfile.write(message)
  106. def _send_line(self, message):
  107. self._send(message + b'\r\n')
  108. def _send_textline(self, message):
  109. self._send_line(message.encode('ASCII'))
  110. def _send_tagged(self, tag, code, message):
  111. self._send_textline(' '.join((tag, code, message)))
  112. def handle(self):
  113. # Send a welcome message.
  114. self._send_textline('* OK IMAP4rev1')
  115. while 1:
  116. # Gather up input until we receive a line terminator or we timeout.
  117. # Accumulate read(1) because it's simpler to handle the differences
  118. # between naked sockets and SSL sockets.
  119. line = b''
  120. while 1:
  121. try:
  122. part = self.rfile.read(1)
  123. if part == b'':
  124. # Naked sockets return empty strings..
  125. return
  126. line += part
  127. except OSError:
  128. # ..but SSLSockets raise exceptions.
  129. return
  130. if line.endswith(b'\r\n'):
  131. break
  132. if verbose:
  133. print('GOT: %r' % line.strip())
  134. if self.continuation:
  135. try:
  136. self.continuation.send(line)
  137. except StopIteration:
  138. self.continuation = None
  139. continue
  140. splitline = line.decode('ASCII').split()
  141. tag = splitline[0]
  142. cmd = splitline[1]
  143. args = splitline[2:]
  144. if hasattr(self, 'cmd_' + cmd):
  145. continuation = getattr(self, 'cmd_' + cmd)(tag, args)
  146. if continuation:
  147. self.continuation = continuation
  148. next(continuation)
  149. else:
  150. self._send_tagged(tag, 'BAD', cmd + ' unknown')
  151. def cmd_CAPABILITY(self, tag, args):
  152. caps = ('IMAP4rev1 ' + self.capabilities
  153. if self.capabilities
  154. else 'IMAP4rev1')
  155. self._send_textline('* CAPABILITY ' + caps)
  156. self._send_tagged(tag, 'OK', 'CAPABILITY completed')
  157. def cmd_LOGOUT(self, tag, args):
  158. self.server.logged = None
  159. self._send_textline('* BYE IMAP4ref1 Server logging out')
  160. self._send_tagged(tag, 'OK', 'LOGOUT completed')
  161. def cmd_LOGIN(self, tag, args):
  162. self.server.logged = args[0]
  163. self._send_tagged(tag, 'OK', 'LOGIN completed')
  164. def cmd_SELECT(self, tag, args):
  165. self.server.is_selected = True
  166. self._send_line(b'* 2 EXISTS')
  167. self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
  168. def cmd_UNSELECT(self, tag, args):
  169. if self.server.is_selected:
  170. self.server.is_selected = False
  171. self._send_tagged(tag, 'OK', 'Returned to authenticated state. (Success)')
  172. else:
  173. self._send_tagged(tag, 'BAD', 'No mailbox selected')
  174. class NewIMAPTestsMixin():
  175. client = None
  176. def _setup(self, imap_handler, connect=True):
  177. """
  178. Sets up imap_handler for tests. imap_handler should inherit from either:
  179. - SimpleIMAPHandler - for testing IMAP commands,
  180. - socketserver.StreamRequestHandler - if raw access to stream is needed.
  181. Returns (client, server).
  182. """
  183. class TestTCPServer(self.server_class):
  184. def handle_error(self, request, client_address):
  185. """
  186. End request and raise the error if one occurs.
  187. """
  188. self.close_request(request)
  189. self.server_close()
  190. raise
  191. self.addCleanup(self._cleanup)
  192. self.server = self.server_class((socket_helper.HOST, 0), imap_handler)
  193. self.thread = threading.Thread(
  194. name=self._testMethodName+'-server',
  195. target=self.server.serve_forever,
  196. # Short poll interval to make the test finish quickly.
  197. # Time between requests is short enough that we won't wake
  198. # up spuriously too many times.
  199. kwargs={'poll_interval': 0.01})
  200. self.thread.daemon = True # In case this function raises.
  201. self.thread.start()
  202. if connect:
  203. self.client = self.imap_class(*self.server.server_address)
  204. return self.client, self.server
  205. def _cleanup(self):
  206. """
  207. Cleans up the test server. This method should not be called manually,
  208. it is added to the cleanup queue in the _setup method already.
  209. """
  210. # if logout was called already we'd raise an exception trying to
  211. # shutdown the client once again
  212. if self.client is not None and self.client.state != 'LOGOUT':
  213. self.client.shutdown()
  214. # cleanup the server
  215. self.server.shutdown()
  216. self.server.server_close()
  217. threading_helper.join_thread(self.thread)
  218. # Explicitly clear the attribute to prevent dangling thread
  219. self.thread = None
  220. def test_EOF_without_complete_welcome_message(self):
  221. # http://bugs.python.org/issue5949
  222. class EOFHandler(socketserver.StreamRequestHandler):
  223. def handle(self):
  224. self.wfile.write(b'* OK')
  225. _, server = self._setup(EOFHandler, connect=False)
  226. self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
  227. *server.server_address)
  228. def test_line_termination(self):
  229. class BadNewlineHandler(SimpleIMAPHandler):
  230. def cmd_CAPABILITY(self, tag, args):
  231. self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
  232. self._send_tagged(tag, 'OK', 'CAPABILITY completed')
  233. _, server = self._setup(BadNewlineHandler, connect=False)
  234. self.assertRaises(imaplib.IMAP4.abort, self.imap_class,
  235. *server.server_address)
  236. def test_enable_raises_error_if_not_AUTH(self):
  237. class EnableHandler(SimpleIMAPHandler):
  238. capabilities = 'AUTH ENABLE UTF8=ACCEPT'
  239. client, _ = self._setup(EnableHandler)
  240. self.assertFalse(client.utf8_enabled)
  241. with self.assertRaisesRegex(imaplib.IMAP4.error, 'ENABLE.*NONAUTH'):
  242. client.enable('foo')
  243. self.assertFalse(client.utf8_enabled)
  244. def test_enable_raises_error_if_no_capability(self):
  245. client, _ = self._setup(SimpleIMAPHandler)
  246. with self.assertRaisesRegex(imaplib.IMAP4.error,
  247. 'does not support ENABLE'):
  248. client.enable('foo')
  249. def test_enable_UTF8_raises_error_if_not_supported(self):
  250. client, _ = self._setup(SimpleIMAPHandler)
  251. typ, data = client.login('user', 'pass')
  252. self.assertEqual(typ, 'OK')
  253. with self.assertRaisesRegex(imaplib.IMAP4.error,
  254. 'does not support ENABLE'):
  255. client.enable('UTF8=ACCEPT')
  256. def test_enable_UTF8_True_append(self):
  257. class UTF8AppendServer(SimpleIMAPHandler):
  258. capabilities = 'ENABLE UTF8=ACCEPT'
  259. def cmd_ENABLE(self, tag, args):
  260. self._send_tagged(tag, 'OK', 'ENABLE successful')
  261. def cmd_AUTHENTICATE(self, tag, args):
  262. self._send_textline('+')
  263. self.server.response = yield
  264. self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
  265. def cmd_APPEND(self, tag, args):
  266. self._send_textline('+')
  267. self.server.response = yield
  268. self._send_tagged(tag, 'OK', 'okay')
  269. client, server = self._setup(UTF8AppendServer)
  270. self.assertEqual(client._encoding, 'ascii')
  271. code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
  272. self.assertEqual(code, 'OK')
  273. self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
  274. code, _ = client.enable('UTF8=ACCEPT')
  275. self.assertEqual(code, 'OK')
  276. self.assertEqual(client._encoding, 'utf-8')
  277. msg_string = 'Subject: üñí©öðé'
  278. typ, data = client.append(None, None, None, msg_string.encode('utf-8'))
  279. self.assertEqual(typ, 'OK')
  280. self.assertEqual(server.response,
  281. ('UTF8 (%s)\r\n' % msg_string).encode('utf-8'))
  282. def test_search_disallows_charset_in_utf8_mode(self):
  283. class UTF8Server(SimpleIMAPHandler):
  284. capabilities = 'AUTH ENABLE UTF8=ACCEPT'
  285. def cmd_ENABLE(self, tag, args):
  286. self._send_tagged(tag, 'OK', 'ENABLE successful')
  287. def cmd_AUTHENTICATE(self, tag, args):
  288. self._send_textline('+')
  289. self.server.response = yield
  290. self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
  291. client, _ = self._setup(UTF8Server)
  292. typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
  293. self.assertEqual(typ, 'OK')
  294. typ, _ = client.enable('UTF8=ACCEPT')
  295. self.assertEqual(typ, 'OK')
  296. self.assertTrue(client.utf8_enabled)
  297. with self.assertRaisesRegex(imaplib.IMAP4.error, 'charset.*UTF8'):
  298. client.search('foo', 'bar')
  299. def test_bad_auth_name(self):
  300. class MyServer(SimpleIMAPHandler):
  301. def cmd_AUTHENTICATE(self, tag, args):
  302. self._send_tagged(tag, 'NO',
  303. 'unrecognized authentication type {}'.format(args[0]))
  304. client, _ = self._setup(MyServer)
  305. with self.assertRaisesRegex(imaplib.IMAP4.error,
  306. 'unrecognized authentication type METHOD'):
  307. client.authenticate('METHOD', lambda: 1)
  308. def test_invalid_authentication(self):
  309. class MyServer(SimpleIMAPHandler):
  310. def cmd_AUTHENTICATE(self, tag, args):
  311. self._send_textline('+')
  312. self.response = yield
  313. self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
  314. client, _ = self._setup(MyServer)
  315. with self.assertRaisesRegex(imaplib.IMAP4.error,
  316. r'\[AUTHENTICATIONFAILED\] invalid'):
  317. client.authenticate('MYAUTH', lambda x: b'fake')
  318. def test_valid_authentication_bytes(self):
  319. class MyServer(SimpleIMAPHandler):
  320. def cmd_AUTHENTICATE(self, tag, args):
  321. self._send_textline('+')
  322. self.server.response = yield
  323. self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
  324. client, server = self._setup(MyServer)
  325. code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
  326. self.assertEqual(code, 'OK')
  327. self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
  328. def test_valid_authentication_plain_text(self):
  329. class MyServer(SimpleIMAPHandler):
  330. def cmd_AUTHENTICATE(self, tag, args):
  331. self._send_textline('+')
  332. self.server.response = yield
  333. self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
  334. client, server = self._setup(MyServer)
  335. code, _ = client.authenticate('MYAUTH', lambda x: 'fake')
  336. self.assertEqual(code, 'OK')
  337. self.assertEqual(server.response, b'ZmFrZQ==\r\n') # b64 encoded 'fake'
  338. @hashlib_helper.requires_hashdigest('md5', openssl=True)
  339. def test_login_cram_md5_bytes(self):
  340. class AuthHandler(SimpleIMAPHandler):
  341. capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
  342. def cmd_AUTHENTICATE(self, tag, args):
  343. self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
  344. 'VzdG9uLm1jaS5uZXQ=')
  345. r = yield
  346. if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
  347. b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
  348. self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
  349. else:
  350. self._send_tagged(tag, 'NO', 'No access')
  351. client, _ = self._setup(AuthHandler)
  352. self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
  353. ret, _ = client.login_cram_md5("tim", b"tanstaaftanstaaf")
  354. self.assertEqual(ret, "OK")
  355. @hashlib_helper.requires_hashdigest('md5', openssl=True)
  356. def test_login_cram_md5_plain_text(self):
  357. class AuthHandler(SimpleIMAPHandler):
  358. capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
  359. def cmd_AUTHENTICATE(self, tag, args):
  360. self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
  361. 'VzdG9uLm1jaS5uZXQ=')
  362. r = yield
  363. if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
  364. b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
  365. self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
  366. else:
  367. self._send_tagged(tag, 'NO', 'No access')
  368. client, _ = self._setup(AuthHandler)
  369. self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
  370. ret, _ = client.login_cram_md5("tim", "tanstaaftanstaaf")
  371. self.assertEqual(ret, "OK")
  372. def test_aborted_authentication(self):
  373. class MyServer(SimpleIMAPHandler):
  374. def cmd_AUTHENTICATE(self, tag, args):
  375. self._send_textline('+')
  376. self.response = yield
  377. if self.response == b'*\r\n':
  378. self._send_tagged(
  379. tag,
  380. 'NO',
  381. '[AUTHENTICATIONFAILED] aborted')
  382. else:
  383. self._send_tagged(tag, 'OK', 'MYAUTH successful')
  384. client, _ = self._setup(MyServer)
  385. with self.assertRaisesRegex(imaplib.IMAP4.error,
  386. r'\[AUTHENTICATIONFAILED\] aborted'):
  387. client.authenticate('MYAUTH', lambda x: None)
  388. @mock.patch('imaplib._MAXLINE', 10)
  389. def test_linetoolong(self):
  390. class TooLongHandler(SimpleIMAPHandler):
  391. def handle(self):
  392. # send response line longer than the limit set in the next line
  393. self.wfile.write(b'* OK ' + 11 * b'x' + b'\r\n')
  394. _, server = self._setup(TooLongHandler, connect=False)
  395. with self.assertRaisesRegex(imaplib.IMAP4.error,
  396. 'got more than 10 bytes'):
  397. self.imap_class(*server.server_address)
  398. def test_simple_with_statement(self):
  399. _, server = self._setup(SimpleIMAPHandler, connect=False)
  400. with self.imap_class(*server.server_address):
  401. pass
  402. def test_imaplib_timeout_test(self):
  403. _, server = self._setup(SimpleIMAPHandler)
  404. addr = server.server_address[1]
  405. client = self.imap_class("localhost", addr, timeout=None)
  406. self.assertEqual(client.sock.timeout, None)
  407. client.shutdown()
  408. client = self.imap_class("localhost", addr, timeout=support.LOOPBACK_TIMEOUT)
  409. self.assertEqual(client.sock.timeout, support.LOOPBACK_TIMEOUT)
  410. client.shutdown()
  411. with self.assertRaises(ValueError):
  412. client = self.imap_class("localhost", addr, timeout=0)
  413. def test_imaplib_timeout_functionality_test(self):
  414. class TimeoutHandler(SimpleIMAPHandler):
  415. def handle(self):
  416. time.sleep(1)
  417. SimpleIMAPHandler.handle(self)
  418. _, server = self._setup(TimeoutHandler)
  419. addr = server.server_address[1]
  420. with self.assertRaises(TimeoutError):
  421. client = self.imap_class("localhost", addr, timeout=0.001)
  422. def test_with_statement(self):
  423. _, server = self._setup(SimpleIMAPHandler, connect=False)
  424. with self.imap_class(*server.server_address) as imap:
  425. imap.login('user', 'pass')
  426. self.assertEqual(server.logged, 'user')
  427. self.assertIsNone(server.logged)
  428. def test_with_statement_logout(self):
  429. # It is legal to log out explicitly inside the with block
  430. _, server = self._setup(SimpleIMAPHandler, connect=False)
  431. with self.imap_class(*server.server_address) as imap:
  432. imap.login('user', 'pass')
  433. self.assertEqual(server.logged, 'user')
  434. imap.logout()
  435. self.assertIsNone(server.logged)
  436. self.assertIsNone(server.logged)
  437. # command tests
  438. def test_login(self):
  439. client, _ = self._setup(SimpleIMAPHandler)
  440. typ, data = client.login('user', 'pass')
  441. self.assertEqual(typ, 'OK')
  442. self.assertEqual(data[0], b'LOGIN completed')
  443. self.assertEqual(client.state, 'AUTH')
  444. def test_logout(self):
  445. client, _ = self._setup(SimpleIMAPHandler)
  446. typ, data = client.login('user', 'pass')
  447. self.assertEqual(typ, 'OK')
  448. self.assertEqual(data[0], b'LOGIN completed')
  449. typ, data = client.logout()
  450. self.assertEqual(typ, 'BYE', (typ, data))
  451. self.assertEqual(data[0], b'IMAP4ref1 Server logging out', (typ, data))
  452. self.assertEqual(client.state, 'LOGOUT')
  453. def test_lsub(self):
  454. class LsubCmd(SimpleIMAPHandler):
  455. def cmd_LSUB(self, tag, args):
  456. self._send_textline('* LSUB () "." directoryA')
  457. return self._send_tagged(tag, 'OK', 'LSUB completed')
  458. client, _ = self._setup(LsubCmd)
  459. client.login('user', 'pass')
  460. typ, data = client.lsub()
  461. self.assertEqual(typ, 'OK')
  462. self.assertEqual(data[0], b'() "." directoryA')
  463. def test_unselect(self):
  464. client, _ = self._setup(SimpleIMAPHandler)
  465. client.login('user', 'pass')
  466. typ, data = client.select()
  467. self.assertEqual(typ, 'OK')
  468. self.assertEqual(data[0], b'2')
  469. typ, data = client.unselect()
  470. self.assertEqual(typ, 'OK')
  471. self.assertEqual(data[0], b'Returned to authenticated state. (Success)')
  472. self.assertEqual(client.state, 'AUTH')
  473. class NewIMAPTests(NewIMAPTestsMixin, unittest.TestCase):
  474. imap_class = imaplib.IMAP4
  475. server_class = socketserver.TCPServer
  476. @unittest.skipUnless(ssl, "SSL not available")
  477. class NewIMAPSSLTests(NewIMAPTestsMixin, unittest.TestCase):
  478. imap_class = IMAP4_SSL
  479. server_class = SecureTCPServer
  480. def test_ssl_raises(self):
  481. ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  482. self.assertEqual(ssl_context.verify_mode, ssl.CERT_REQUIRED)
  483. self.assertEqual(ssl_context.check_hostname, True)
  484. ssl_context.load_verify_locations(CAFILE)
  485. with self.assertRaisesRegex(ssl.CertificateError,
  486. "IP address mismatch, certificate is not valid for "
  487. "'127.0.0.1'"):
  488. _, server = self._setup(SimpleIMAPHandler)
  489. client = self.imap_class(*server.server_address,
  490. ssl_context=ssl_context)
  491. client.shutdown()
  492. def test_ssl_verified(self):
  493. ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  494. ssl_context.load_verify_locations(CAFILE)
  495. _, server = self._setup(SimpleIMAPHandler)
  496. client = self.imap_class("localhost", server.server_address[1],
  497. ssl_context=ssl_context)
  498. client.shutdown()
  499. # Mock the private method _connect(), so mark the test as specific
  500. # to CPython stdlib
  501. @cpython_only
  502. def test_certfile_arg_warn(self):
  503. with warnings_helper.check_warnings(('', DeprecationWarning)):
  504. with mock.patch.object(self.imap_class, 'open'):
  505. with mock.patch.object(self.imap_class, '_connect'):
  506. self.imap_class('localhost', 143, certfile=CERTFILE)
  507. class ThreadedNetworkedTests(unittest.TestCase):
  508. server_class = socketserver.TCPServer
  509. imap_class = imaplib.IMAP4
  510. def make_server(self, addr, hdlr):
  511. class MyServer(self.server_class):
  512. def handle_error(self, request, client_address):
  513. self.close_request(request)
  514. self.server_close()
  515. raise
  516. if verbose:
  517. print("creating server")
  518. server = MyServer(addr, hdlr)
  519. self.assertEqual(server.server_address, server.socket.getsockname())
  520. if verbose:
  521. print("server created")
  522. print("ADDR =", addr)
  523. print("CLASS =", self.server_class)
  524. print("HDLR =", server.RequestHandlerClass)
  525. t = threading.Thread(
  526. name='%s serving' % self.server_class,
  527. target=server.serve_forever,
  528. # Short poll interval to make the test finish quickly.
  529. # Time between requests is short enough that we won't wake
  530. # up spuriously too many times.
  531. kwargs={'poll_interval': 0.01})
  532. t.daemon = True # In case this function raises.
  533. t.start()
  534. if verbose:
  535. print("server running")
  536. return server, t
  537. def reap_server(self, server, thread):
  538. if verbose:
  539. print("waiting for server")
  540. server.shutdown()
  541. server.server_close()
  542. thread.join()
  543. if verbose:
  544. print("done")
  545. @contextmanager
  546. def reaped_server(self, hdlr):
  547. server, thread = self.make_server((socket_helper.HOST, 0), hdlr)
  548. try:
  549. yield server
  550. finally:
  551. self.reap_server(server, thread)
  552. @contextmanager
  553. def reaped_pair(self, hdlr):
  554. with self.reaped_server(hdlr) as server:
  555. client = self.imap_class(*server.server_address)
  556. try:
  557. yield server, client
  558. finally:
  559. client.logout()
  560. @threading_helper.reap_threads
  561. def test_connect(self):
  562. with self.reaped_server(SimpleIMAPHandler) as server:
  563. client = self.imap_class(*server.server_address)
  564. client.shutdown()
  565. @threading_helper.reap_threads
  566. def test_bracket_flags(self):
  567. # This violates RFC 3501, which disallows ']' characters in tag names,
  568. # but imaplib has allowed producing such tags forever, other programs
  569. # also produce them (eg: OtherInbox's Organizer app as of 20140716),
  570. # and Gmail, for example, accepts them and produces them. So we
  571. # support them. See issue #21815.
  572. class BracketFlagHandler(SimpleIMAPHandler):
  573. def handle(self):
  574. self.flags = ['Answered', 'Flagged', 'Deleted', 'Seen', 'Draft']
  575. super().handle()
  576. def cmd_AUTHENTICATE(self, tag, args):
  577. self._send_textline('+')
  578. self.server.response = yield
  579. self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
  580. def cmd_SELECT(self, tag, args):
  581. flag_msg = ' \\'.join(self.flags)
  582. self._send_line(('* FLAGS (%s)' % flag_msg).encode('ascii'))
  583. self._send_line(b'* 2 EXISTS')
  584. self._send_line(b'* 0 RECENT')
  585. msg = ('* OK [PERMANENTFLAGS %s \\*)] Flags permitted.'
  586. % flag_msg)
  587. self._send_line(msg.encode('ascii'))
  588. self._send_tagged(tag, 'OK', '[READ-WRITE] SELECT completed.')
  589. def cmd_STORE(self, tag, args):
  590. new_flags = args[2].strip('(').strip(')').split()
  591. self.flags.extend(new_flags)
  592. flags_msg = '(FLAGS (%s))' % ' \\'.join(self.flags)
  593. msg = '* %s FETCH %s' % (args[0], flags_msg)
  594. self._send_line(msg.encode('ascii'))
  595. self._send_tagged(tag, 'OK', 'STORE completed.')
  596. with self.reaped_pair(BracketFlagHandler) as (server, client):
  597. code, data = client.authenticate('MYAUTH', lambda x: b'fake')
  598. self.assertEqual(code, 'OK')
  599. self.assertEqual(server.response, b'ZmFrZQ==\r\n')
  600. client.select('test')
  601. typ, [data] = client.store(b'1', "+FLAGS", "[test]")
  602. self.assertIn(b'[test]', data)
  603. client.select('test')
  604. typ, [data] = client.response('PERMANENTFLAGS')
  605. self.assertIn(b'[test]', data)
  606. @threading_helper.reap_threads
  607. def test_issue5949(self):
  608. class EOFHandler(socketserver.StreamRequestHandler):
  609. def handle(self):
  610. # EOF without sending a complete welcome message.
  611. self.wfile.write(b'* OK')
  612. with self.reaped_server(EOFHandler) as server:
  613. self.assertRaises(imaplib.IMAP4.abort,
  614. self.imap_class, *server.server_address)
  615. @threading_helper.reap_threads
  616. def test_line_termination(self):
  617. class BadNewlineHandler(SimpleIMAPHandler):
  618. def cmd_CAPABILITY(self, tag, args):
  619. self._send(b'* CAPABILITY IMAP4rev1 AUTH\n')
  620. self._send_tagged(tag, 'OK', 'CAPABILITY completed')
  621. with self.reaped_server(BadNewlineHandler) as server:
  622. self.assertRaises(imaplib.IMAP4.abort,
  623. self.imap_class, *server.server_address)
  624. class UTF8Server(SimpleIMAPHandler):
  625. capabilities = 'AUTH ENABLE UTF8=ACCEPT'
  626. def cmd_ENABLE(self, tag, args):
  627. self._send_tagged(tag, 'OK', 'ENABLE successful')
  628. def cmd_AUTHENTICATE(self, tag, args):
  629. self._send_textline('+')
  630. self.server.response = yield
  631. self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
  632. @threading_helper.reap_threads
  633. def test_enable_raises_error_if_not_AUTH(self):
  634. with self.reaped_pair(self.UTF8Server) as (server, client):
  635. self.assertFalse(client.utf8_enabled)
  636. self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
  637. self.assertFalse(client.utf8_enabled)
  638. # XXX Also need a test that enable after SELECT raises an error.
  639. @threading_helper.reap_threads
  640. def test_enable_raises_error_if_no_capability(self):
  641. class NoEnableServer(self.UTF8Server):
  642. capabilities = 'AUTH'
  643. with self.reaped_pair(NoEnableServer) as (server, client):
  644. self.assertRaises(imaplib.IMAP4.error, client.enable, 'foo')
  645. @threading_helper.reap_threads
  646. def test_enable_UTF8_raises_error_if_not_supported(self):
  647. class NonUTF8Server(SimpleIMAPHandler):
  648. pass
  649. with self.assertRaises(imaplib.IMAP4.error):
  650. with self.reaped_pair(NonUTF8Server) as (server, client):
  651. typ, data = client.login('user', 'pass')
  652. self.assertEqual(typ, 'OK')
  653. client.enable('UTF8=ACCEPT')
  654. pass
  655. @threading_helper.reap_threads
  656. def test_enable_UTF8_True_append(self):
  657. class UTF8AppendServer(self.UTF8Server):
  658. def cmd_APPEND(self, tag, args):
  659. self._send_textline('+')
  660. self.server.response = yield
  661. self._send_tagged(tag, 'OK', 'okay')
  662. with self.reaped_pair(UTF8AppendServer) as (server, client):
  663. self.assertEqual(client._encoding, 'ascii')
  664. code, _ = client.authenticate('MYAUTH', lambda x: b'fake')
  665. self.assertEqual(code, 'OK')
  666. self.assertEqual(server.response,
  667. b'ZmFrZQ==\r\n') # b64 encoded 'fake'
  668. code, _ = client.enable('UTF8=ACCEPT')
  669. self.assertEqual(code, 'OK')
  670. self.assertEqual(client._encoding, 'utf-8')
  671. msg_string = 'Subject: üñí©öðé'
  672. typ, data = client.append(
  673. None, None, None, msg_string.encode('utf-8'))
  674. self.assertEqual(typ, 'OK')
  675. self.assertEqual(
  676. server.response,
  677. ('UTF8 (%s)\r\n' % msg_string).encode('utf-8')
  678. )
  679. # XXX also need a test that makes sure that the Literal and Untagged_status
  680. # regexes uses unicode in UTF8 mode instead of the default ASCII.
  681. @threading_helper.reap_threads
  682. def test_search_disallows_charset_in_utf8_mode(self):
  683. with self.reaped_pair(self.UTF8Server) as (server, client):
  684. typ, _ = client.authenticate('MYAUTH', lambda x: b'fake')
  685. self.assertEqual(typ, 'OK')
  686. typ, _ = client.enable('UTF8=ACCEPT')
  687. self.assertEqual(typ, 'OK')
  688. self.assertTrue(client.utf8_enabled)
  689. self.assertRaises(imaplib.IMAP4.error, client.search, 'foo', 'bar')
  690. @threading_helper.reap_threads
  691. def test_bad_auth_name(self):
  692. class MyServer(SimpleIMAPHandler):
  693. def cmd_AUTHENTICATE(self, tag, args):
  694. self._send_tagged(tag, 'NO', 'unrecognized authentication '
  695. 'type {}'.format(args[0]))
  696. with self.reaped_pair(MyServer) as (server, client):
  697. with self.assertRaises(imaplib.IMAP4.error):
  698. client.authenticate('METHOD', lambda: 1)
  699. @threading_helper.reap_threads
  700. def test_invalid_authentication(self):
  701. class MyServer(SimpleIMAPHandler):
  702. def cmd_AUTHENTICATE(self, tag, args):
  703. self._send_textline('+')
  704. self.response = yield
  705. self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] invalid')
  706. with self.reaped_pair(MyServer) as (server, client):
  707. with self.assertRaises(imaplib.IMAP4.error):
  708. code, data = client.authenticate('MYAUTH', lambda x: b'fake')
  709. @threading_helper.reap_threads
  710. def test_valid_authentication(self):
  711. class MyServer(SimpleIMAPHandler):
  712. def cmd_AUTHENTICATE(self, tag, args):
  713. self._send_textline('+')
  714. self.server.response = yield
  715. self._send_tagged(tag, 'OK', 'FAKEAUTH successful')
  716. with self.reaped_pair(MyServer) as (server, client):
  717. code, data = client.authenticate('MYAUTH', lambda x: b'fake')
  718. self.assertEqual(code, 'OK')
  719. self.assertEqual(server.response,
  720. b'ZmFrZQ==\r\n') # b64 encoded 'fake'
  721. with self.reaped_pair(MyServer) as (server, client):
  722. code, data = client.authenticate('MYAUTH', lambda x: 'fake')
  723. self.assertEqual(code, 'OK')
  724. self.assertEqual(server.response,
  725. b'ZmFrZQ==\r\n') # b64 encoded 'fake'
  726. @threading_helper.reap_threads
  727. @hashlib_helper.requires_hashdigest('md5', openssl=True)
  728. def test_login_cram_md5(self):
  729. class AuthHandler(SimpleIMAPHandler):
  730. capabilities = 'LOGINDISABLED AUTH=CRAM-MD5'
  731. def cmd_AUTHENTICATE(self, tag, args):
  732. self._send_textline('+ PDE4OTYuNjk3MTcwOTUyQHBvc3RvZmZpY2Uucm'
  733. 'VzdG9uLm1jaS5uZXQ=')
  734. r = yield
  735. if (r == b'dGltIGYxY2E2YmU0NjRiOWVmYT'
  736. b'FjY2E2ZmZkNmNmMmQ5ZjMy\r\n'):
  737. self._send_tagged(tag, 'OK', 'CRAM-MD5 successful')
  738. else:
  739. self._send_tagged(tag, 'NO', 'No access')
  740. with self.reaped_pair(AuthHandler) as (server, client):
  741. self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
  742. ret, data = client.login_cram_md5("tim", "tanstaaftanstaaf")
  743. self.assertEqual(ret, "OK")
  744. with self.reaped_pair(AuthHandler) as (server, client):
  745. self.assertTrue('AUTH=CRAM-MD5' in client.capabilities)
  746. ret, data = client.login_cram_md5("tim", b"tanstaaftanstaaf")
  747. self.assertEqual(ret, "OK")
  748. @threading_helper.reap_threads
  749. def test_aborted_authentication(self):
  750. class MyServer(SimpleIMAPHandler):
  751. def cmd_AUTHENTICATE(self, tag, args):
  752. self._send_textline('+')
  753. self.response = yield
  754. if self.response == b'*\r\n':
  755. self._send_tagged(tag, 'NO', '[AUTHENTICATIONFAILED] aborted')
  756. else:
  757. self._send_tagged(tag, 'OK', 'MYAUTH successful')
  758. with self.reaped_pair(MyServer) as (server, client):
  759. with self.assertRaises(imaplib.IMAP4.error):
  760. code, data = client.authenticate('MYAUTH', lambda x: None)
  761. def test_linetoolong(self):
  762. class TooLongHandler(SimpleIMAPHandler):
  763. def handle(self):
  764. # Send a very long response line
  765. self.wfile.write(b'* OK ' + imaplib._MAXLINE * b'x' + b'\r\n')
  766. with self.reaped_server(TooLongHandler) as server:
  767. self.assertRaises(imaplib.IMAP4.error,
  768. self.imap_class, *server.server_address)
  769. @threading_helper.reap_threads
  770. def test_simple_with_statement(self):
  771. # simplest call
  772. with self.reaped_server(SimpleIMAPHandler) as server:
  773. with self.imap_class(*server.server_address):
  774. pass
  775. @threading_helper.reap_threads
  776. def test_with_statement(self):
  777. with self.reaped_server(SimpleIMAPHandler) as server:
  778. with self.imap_class(*server.server_address) as imap:
  779. imap.login('user', 'pass')
  780. self.assertEqual(server.logged, 'user')
  781. self.assertIsNone(server.logged)
  782. @threading_helper.reap_threads
  783. def test_with_statement_logout(self):
  784. # what happens if already logout in the block?
  785. with self.reaped_server(SimpleIMAPHandler) as server:
  786. with self.imap_class(*server.server_address) as imap:
  787. imap.login('user', 'pass')
  788. self.assertEqual(server.logged, 'user')
  789. imap.logout()
  790. self.assertIsNone(server.logged)
  791. self.assertIsNone(server.logged)
  792. @threading_helper.reap_threads
  793. @cpython_only
  794. @unittest.skipUnless(__debug__, "Won't work if __debug__ is False")
  795. def test_dump_ur(self):
  796. # See: http://bugs.python.org/issue26543
  797. untagged_resp_dict = {'READ-WRITE': [b'']}
  798. with self.reaped_server(SimpleIMAPHandler) as server:
  799. with self.imap_class(*server.server_address) as imap:
  800. with mock.patch.object(imap, '_mesg') as mock_mesg:
  801. imap._dump_ur(untagged_resp_dict)
  802. mock_mesg.assert_called_with(
  803. "untagged responses dump:READ-WRITE: [b'']"
  804. )
  805. @unittest.skipUnless(ssl, "SSL not available")
  806. class ThreadedNetworkedTestsSSL(ThreadedNetworkedTests):
  807. server_class = SecureTCPServer
  808. imap_class = IMAP4_SSL
  809. @threading_helper.reap_threads
  810. def test_ssl_verified(self):
  811. ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  812. ssl_context.load_verify_locations(CAFILE)
  813. with self.assertRaisesRegex(
  814. ssl.CertificateError,
  815. "IP address mismatch, certificate is not valid for "
  816. "'127.0.0.1'"):
  817. with self.reaped_server(SimpleIMAPHandler) as server:
  818. client = self.imap_class(*server.server_address,
  819. ssl_context=ssl_context)
  820. client.shutdown()
  821. with self.reaped_server(SimpleIMAPHandler) as server:
  822. client = self.imap_class("localhost", server.server_address[1],
  823. ssl_context=ssl_context)
  824. client.shutdown()
  825. @unittest.skipUnless(
  826. support.is_resource_enabled('network'), 'network resource disabled')
  827. @unittest.skip('cyrus.andrew.cmu.edu blocks connections')
  828. class RemoteIMAPTest(unittest.TestCase):
  829. host = 'cyrus.andrew.cmu.edu'
  830. port = 143
  831. username = 'anonymous'
  832. password = 'pass'
  833. imap_class = imaplib.IMAP4
  834. def setUp(self):
  835. with socket_helper.transient_internet(self.host):
  836. self.server = self.imap_class(self.host, self.port)
  837. def tearDown(self):
  838. if self.server is not None:
  839. with socket_helper.transient_internet(self.host):
  840. self.server.logout()
  841. def test_logincapa(self):
  842. with socket_helper.transient_internet(self.host):
  843. for cap in self.server.capabilities:
  844. self.assertIsInstance(cap, str)
  845. self.assertIn('LOGINDISABLED', self.server.capabilities)
  846. self.assertIn('AUTH=ANONYMOUS', self.server.capabilities)
  847. rs = self.server.login(self.username, self.password)
  848. self.assertEqual(rs[0], 'OK')
  849. def test_logout(self):
  850. with socket_helper.transient_internet(self.host):
  851. rs = self.server.logout()
  852. self.server = None
  853. self.assertEqual(rs[0], 'BYE', rs)
  854. @unittest.skipUnless(ssl, "SSL not available")
  855. @unittest.skipUnless(
  856. support.is_resource_enabled('network'), 'network resource disabled')
  857. @unittest.skip('cyrus.andrew.cmu.edu blocks connections')
  858. class RemoteIMAP_STARTTLSTest(RemoteIMAPTest):
  859. def setUp(self):
  860. super().setUp()
  861. with socket_helper.transient_internet(self.host):
  862. rs = self.server.starttls()
  863. self.assertEqual(rs[0], 'OK')
  864. def test_logincapa(self):
  865. for cap in self.server.capabilities:
  866. self.assertIsInstance(cap, str)
  867. self.assertNotIn('LOGINDISABLED', self.server.capabilities)
  868. @unittest.skipUnless(ssl, "SSL not available")
  869. @unittest.skip('cyrus.andrew.cmu.edu blocks connections')
  870. class RemoteIMAP_SSLTest(RemoteIMAPTest):
  871. port = 993
  872. imap_class = IMAP4_SSL
  873. def setUp(self):
  874. pass
  875. def tearDown(self):
  876. pass
  877. def create_ssl_context(self):
  878. ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  879. ssl_context.check_hostname = False
  880. ssl_context.verify_mode = ssl.CERT_NONE
  881. ssl_context.load_cert_chain(CERTFILE)
  882. return ssl_context
  883. def check_logincapa(self, server):
  884. try:
  885. for cap in server.capabilities:
  886. self.assertIsInstance(cap, str)
  887. self.assertNotIn('LOGINDISABLED', server.capabilities)
  888. self.assertIn('AUTH=PLAIN', server.capabilities)
  889. rs = server.login(self.username, self.password)
  890. self.assertEqual(rs[0], 'OK')
  891. finally:
  892. server.logout()
  893. def test_logincapa(self):
  894. with socket_helper.transient_internet(self.host):
  895. _server = self.imap_class(self.host, self.port)
  896. self.check_logincapa(_server)
  897. def test_logout(self):
  898. with socket_helper.transient_internet(self.host):
  899. _server = self.imap_class(self.host, self.port)
  900. rs = _server.logout()
  901. self.assertEqual(rs[0], 'BYE', rs)
  902. def test_ssl_context_certfile_exclusive(self):
  903. with socket_helper.transient_internet(self.host):
  904. self.assertRaises(
  905. ValueError, self.imap_class, self.host, self.port,
  906. certfile=CERTFILE, ssl_context=self.create_ssl_context())
  907. def test_ssl_context_keyfile_exclusive(self):
  908. with socket_helper.transient_internet(self.host):
  909. self.assertRaises(
  910. ValueError, self.imap_class, self.host, self.port,
  911. keyfile=CERTFILE, ssl_context=self.create_ssl_context())
  912. if __name__ == "__main__":
  913. unittest.main()