2016-01-04 21:17:58 +01:00
|
|
|
|
#!/usr/bin/env python3
|
2014-12-08 22:55:14 +01:00
|
|
|
|
|
|
|
|
|
# http://www.drdobbs.com/testing/unit-testing-with-python/240165163
|
|
|
|
|
|
2019-10-23 12:23:37 +02:00
|
|
|
|
import difflib
|
2020-11-17 13:50:28 +01:00
|
|
|
|
import git
|
2018-09-17 23:12:51 +02:00
|
|
|
|
import glob
|
2022-01-14 12:50:44 +01:00
|
|
|
|
import importlib
|
2014-12-08 22:55:14 +01:00
|
|
|
|
import inspect
|
2020-02-18 23:50:52 +01:00
|
|
|
|
import json
|
2017-09-25 16:28:22 +02:00
|
|
|
|
import logging
|
2014-12-08 22:55:14 +01:00
|
|
|
|
import optparse
|
|
|
|
|
import os
|
2015-07-30 22:13:36 +02:00
|
|
|
|
import re
|
2015-08-11 15:33:03 +02:00
|
|
|
|
import shutil
|
2020-02-18 23:50:52 +01:00
|
|
|
|
import subprocess
|
2014-12-08 22:55:14 +01:00
|
|
|
|
import sys
|
2015-08-11 15:33:03 +02:00
|
|
|
|
import tempfile
|
2020-02-18 23:50:52 +01:00
|
|
|
|
import time
|
2014-12-08 22:55:14 +01:00
|
|
|
|
import unittest
|
2017-04-02 12:08:01 +02:00
|
|
|
|
import textwrap
|
2017-09-25 16:34:25 +02:00
|
|
|
|
import yaml
|
2018-06-12 16:18:21 +02:00
|
|
|
|
import gzip
|
2022-06-08 20:00:36 +02:00
|
|
|
|
from distutils.version import LooseVersion
|
2022-01-14 12:50:44 +01:00
|
|
|
|
from zipfile import BadZipFile, ZipFile
|
2018-06-10 23:23:43 +02:00
|
|
|
|
from unittest import mock
|
2021-06-08 12:33:22 +02:00
|
|
|
|
from pathlib import Path
|
2014-12-08 22:55:14 +01:00
|
|
|
|
|
2017-03-29 17:11:40 +02:00
|
|
|
|
|
2015-07-22 08:19:56 +02:00
|
|
|
|
localmodule = os.path.realpath(
|
2021-06-07 11:49:21 +02:00
|
|
|
|
os.path.join(os.path.dirname(inspect.getfile(inspect.currentframe())), '..')
|
|
|
|
|
)
|
2014-12-08 22:55:14 +01:00
|
|
|
|
print('localmodule: ' + localmodule)
|
|
|
|
|
if localmodule not in sys.path:
|
2015-07-22 08:19:56 +02:00
|
|
|
|
sys.path.insert(0, localmodule)
|
2014-12-08 22:55:14 +01:00
|
|
|
|
|
2017-12-07 17:32:14 +01:00
|
|
|
|
import fdroidserver.index
|
2017-04-02 12:08:01 +02:00
|
|
|
|
import fdroidserver.signindex
|
2014-12-08 22:55:14 +01:00
|
|
|
|
import fdroidserver.common
|
2015-07-30 22:13:36 +02:00
|
|
|
|
import fdroidserver.metadata
|
2022-11-22 17:17:45 +01:00
|
|
|
|
from testcommon import TmpCwd, mkdtemp
|
jarsigner: allow weak signatures
openjdk-11 11.0.17 in Debian unstable fails to verify weak signatures:
jarsigner -verbose -strict -verify tests/signindex/guardianproject.jar
131 Fri Dec 02 20:10:00 CET 2016 META-INF/MANIFEST.MF
252 Fri Dec 02 20:10:04 CET 2016 META-INF/1.SF
2299 Fri Dec 02 20:10:04 CET 2016 META-INF/1.RSA
0 Fri Dec 02 20:09:58 CET 2016 META-INF/
m ? 48743 Fri Dec 02 20:09:58 CET 2016 index.xml
s = signature was verified
m = entry is listed in manifest
k = at least one certificate was found in keystore
? = unsigned entry
- Signed by "EMAILADDRESS=root@guardianproject.info, CN=guardianproject.info, O=Guardian Project, OU=FDroid Repo, L=New York, ST=New York, C=US"
Digest algorithm: SHA1 (disabled)
Signature algorithm: SHA1withRSA (disabled), 4096-bit key
WARNING: The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled by the security property:
jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, DSA keySize < 1024, SHA1 denyAfter 2019-01-01, include jdk.disabled.namedCurves
2022-10-29 22:09:07 +02:00
|
|
|
|
from fdroidserver.exception import FDroidException, VCSException,\
|
|
|
|
|
MetaDataException, VerificationException
|
2014-12-08 22:55:14 +01:00
|
|
|
|
|
2015-07-22 08:19:56 +02:00
|
|
|
|
|
2014-12-08 22:55:14 +01:00
|
|
|
|
class CommonTest(unittest.TestCase):
|
|
|
|
|
'''fdroidserver/common.py'''
|
|
|
|
|
|
2017-09-25 16:28:22 +02:00
|
|
|
|
def setUp(self):
|
|
|
|
|
logging.basicConfig(level=logging.DEBUG)
|
2020-11-27 13:36:27 +01:00
|
|
|
|
logger = logging.getLogger('androguard.axml')
|
|
|
|
|
logger.setLevel(logging.INFO) # tame the axml debug messages
|
2017-09-25 16:28:22 +02:00
|
|
|
|
self.basedir = os.path.join(localmodule, 'tests')
|
|
|
|
|
self.tmpdir = os.path.abspath(os.path.join(self.basedir, '..', '.testfiles'))
|
|
|
|
|
if not os.path.exists(self.tmpdir):
|
|
|
|
|
os.makedirs(self.tmpdir)
|
|
|
|
|
os.chdir(self.basedir)
|
2018-09-04 11:03:05 +02:00
|
|
|
|
fdroidserver.common.config = None
|
2022-05-25 10:09:52 +02:00
|
|
|
|
fdroidserver.common.options = mock.Mock()
|
|
|
|
|
fdroidserver.common.options.verbose = False
|
2023-02-20 22:38:30 +01:00
|
|
|
|
fdroidserver.metadata.srclibs = None
|
2022-11-22 17:17:45 +01:00
|
|
|
|
self._td = mkdtemp()
|
|
|
|
|
self.testdir = self._td.name
|
2021-03-18 09:47:19 +01:00
|
|
|
|
|
|
|
|
|
def tearDown(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.basedir)
|
|
|
|
|
self._td.cleanup()
|
|
|
|
|
shutil.rmtree(self.tmpdir)
|
2017-09-25 16:28:22 +02:00
|
|
|
|
|
2020-01-13 11:48:23 +01:00
|
|
|
|
def test_parse_human_readable_size(self):
|
2021-06-07 11:49:21 +02:00
|
|
|
|
for k, v in (
|
|
|
|
|
(9827, 9827),
|
|
|
|
|
(123.456, 123),
|
|
|
|
|
('123b', 123),
|
|
|
|
|
('1.2', 1),
|
|
|
|
|
('10.43 KiB', 10680),
|
|
|
|
|
('11GB', 11000000000),
|
|
|
|
|
('59kb', 59000),
|
|
|
|
|
('343.1 mb', 343100000),
|
|
|
|
|
('99.9GiB', 107266808217),
|
2021-11-27 21:21:09 +01:00
|
|
|
|
('1MB', 1000000),
|
2021-06-07 11:49:21 +02:00
|
|
|
|
):
|
2020-01-13 11:48:23 +01:00
|
|
|
|
self.assertEqual(fdroidserver.common.parse_human_readable_size(k), v)
|
|
|
|
|
for v in ((12, 123), '0xfff', [], None, '12,123', '123GG', '982374bb', self):
|
|
|
|
|
with self.assertRaises(ValueError):
|
|
|
|
|
fdroidserver.common.parse_human_readable_size(v)
|
|
|
|
|
|
2017-10-16 18:11:57 +02:00
|
|
|
|
def test_assert_config_keystore(self):
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
|
|
|
|
with self.assertRaises(FDroidException):
|
|
|
|
|
fdroidserver.common.assert_config_keystore({})
|
|
|
|
|
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
2021-06-07 11:49:21 +02:00
|
|
|
|
c = {
|
|
|
|
|
'repo_keyalias': 'localhost',
|
|
|
|
|
'keystore': 'keystore.jks',
|
|
|
|
|
'keystorepass': '12345',
|
|
|
|
|
'keypass': '12345',
|
|
|
|
|
}
|
2017-10-16 18:11:57 +02:00
|
|
|
|
with open('keystore.jks', 'w'):
|
|
|
|
|
pass
|
|
|
|
|
fdroidserver.common.assert_config_keystore(c)
|
|
|
|
|
|
2014-12-09 14:12:41 +01:00
|
|
|
|
def _set_build_tools(self):
|
2021-06-07 11:49:21 +02:00
|
|
|
|
build_tools = os.path.join(
|
|
|
|
|
fdroidserver.common.config['sdk_path'], 'build-tools'
|
|
|
|
|
)
|
2014-12-09 14:12:41 +01:00
|
|
|
|
if os.path.exists(build_tools):
|
|
|
|
|
for f in sorted(os.listdir(build_tools), reverse=True):
|
|
|
|
|
versioned = os.path.join(build_tools, f)
|
2021-06-07 11:49:21 +02:00
|
|
|
|
if os.path.isdir(versioned) and os.path.isfile(
|
|
|
|
|
os.path.join(versioned, 'apksigner')
|
|
|
|
|
):
|
2014-12-09 14:12:41 +01:00
|
|
|
|
break
|
|
|
|
|
return True
|
|
|
|
|
else:
|
2016-01-04 17:28:55 +01:00
|
|
|
|
print('no build-tools found: ' + build_tools)
|
2014-12-09 14:12:41 +01:00
|
|
|
|
return False
|
|
|
|
|
|
|
|
|
|
def _find_all(self):
|
2023-02-22 14:22:29 +01:00
|
|
|
|
tools = ['aapt', 'adb', 'jarsigner']
|
2017-11-08 13:51:03 +01:00
|
|
|
|
if os.path.exists(os.path.join(os.getenv('ANDROID_HOME'), 'tools', 'android')):
|
|
|
|
|
tools.append('android')
|
|
|
|
|
for cmd in tools:
|
2020-12-05 14:24:50 +01:00
|
|
|
|
try:
|
|
|
|
|
path = fdroidserver.common.find_sdk_tools_cmd(cmd)
|
2014-12-09 14:12:41 +01:00
|
|
|
|
self.assertTrue(os.path.exists(path))
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2020-12-05 14:24:50 +01:00
|
|
|
|
except fdroidserver.exception.FDroidException:
|
|
|
|
|
pass
|
2014-12-09 14:12:41 +01:00
|
|
|
|
|
2023-04-04 22:41:41 +02:00
|
|
|
|
@unittest.skipUnless(os.getenv('ANDROID_HOME'), "Needs ANDROID_HOME env var")
|
2014-12-09 14:12:41 +01:00
|
|
|
|
def test_find_sdk_tools_cmd(self):
|
|
|
|
|
fdroidserver.common.config = dict()
|
|
|
|
|
# TODO add this once everything works without sdk_path set in config
|
2015-07-22 08:19:56 +02:00
|
|
|
|
# self._find_all()
|
2014-12-09 14:12:41 +01:00
|
|
|
|
sdk_path = os.getenv('ANDROID_HOME')
|
|
|
|
|
if os.path.exists(sdk_path):
|
|
|
|
|
fdroidserver.common.config['sdk_path'] = sdk_path
|
|
|
|
|
build_tools = os.path.join(sdk_path, 'build-tools')
|
2017-12-03 15:01:48 +01:00
|
|
|
|
if self._set_build_tools() or os.path.exists('/usr/bin/aapt'):
|
2014-12-09 14:12:41 +01:00
|
|
|
|
self._find_all()
|
|
|
|
|
else:
|
2016-01-04 17:28:55 +01:00
|
|
|
|
print('no build-tools found: ' + build_tools)
|
2014-12-09 14:12:41 +01:00
|
|
|
|
|
2017-10-20 11:35:48 +02:00
|
|
|
|
def test_find_java_root_path(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2017-10-20 11:35:48 +02:00
|
|
|
|
|
|
|
|
|
all_pathlists = [
|
2021-06-07 11:49:21 +02:00
|
|
|
|
(
|
|
|
|
|
[ # Debian
|
|
|
|
|
'/usr/lib/jvm/java-1.5.0-gcj-5-amd64',
|
|
|
|
|
'/usr/lib/jvm/java-8-openjdk-amd64',
|
|
|
|
|
'/usr/lib/jvm/java-1.8.0-openjdk-amd64',
|
|
|
|
|
],
|
2017-10-20 11:35:48 +02:00
|
|
|
|
'/usr/lib/jvm/java-8-openjdk-amd64',
|
2021-06-07 11:49:21 +02:00
|
|
|
|
),
|
|
|
|
|
(
|
|
|
|
|
[ # OSX
|
|
|
|
|
'/Library/Java/JavaVirtualMachines/jdk1.8.0_202.jdk',
|
|
|
|
|
'/Library/Java/JavaVirtualMachines/jdk1.8.0_45.jdk',
|
|
|
|
|
'/System/Library/Java/JavaVirtualMachines/jdk1.7.0_80.jdk',
|
|
|
|
|
],
|
2019-03-30 22:10:21 +01:00
|
|
|
|
'/Library/Java/JavaVirtualMachines/jdk1.8.0_202.jdk',
|
2021-06-07 11:49:21 +02:00
|
|
|
|
),
|
2017-10-20 11:35:48 +02:00
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
for pathlist, choice in all_pathlists:
|
|
|
|
|
# strip leading / to make relative paths to test without root
|
|
|
|
|
pathlist = [p[1:] for p in pathlist]
|
|
|
|
|
|
|
|
|
|
# create test file used in common._add_java_paths_to_config()
|
|
|
|
|
for p in pathlist:
|
|
|
|
|
if p.startswith('/System') or p.startswith('/Library'):
|
|
|
|
|
basedir = os.path.join(p, 'Contents', 'Home', 'bin')
|
|
|
|
|
else:
|
|
|
|
|
basedir = os.path.join(p, 'bin')
|
|
|
|
|
os.makedirs(basedir)
|
|
|
|
|
open(os.path.join(basedir, 'javac'), 'w').close()
|
|
|
|
|
|
|
|
|
|
config = dict()
|
|
|
|
|
config['java_paths'] = dict()
|
|
|
|
|
fdroidserver.common._add_java_paths_to_config(pathlist, config)
|
|
|
|
|
self.assertEqual(config['java_paths']['8'], choice[1:])
|
|
|
|
|
|
2018-09-18 15:59:49 +02:00
|
|
|
|
def test_is_apk_and_debuggable(self):
|
2014-12-08 22:55:14 +01:00
|
|
|
|
config = dict()
|
2015-08-05 14:39:58 +02:00
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
2014-12-09 14:12:41 +01:00
|
|
|
|
fdroidserver.common.config = config
|
2018-08-07 14:51:42 +02:00
|
|
|
|
|
2014-12-08 22:55:14 +01:00
|
|
|
|
# these are set debuggable
|
|
|
|
|
testfiles = []
|
2017-09-25 16:28:22 +02:00
|
|
|
|
testfiles.append(os.path.join(self.basedir, 'urzip.apk'))
|
|
|
|
|
testfiles.append(os.path.join(self.basedir, 'urzip-badsig.apk'))
|
|
|
|
|
testfiles.append(os.path.join(self.basedir, 'urzip-badcert.apk'))
|
2014-12-08 22:55:14 +01:00
|
|
|
|
for apkfile in testfiles:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertTrue(
|
|
|
|
|
fdroidserver.common.is_apk_and_debuggable(apkfile),
|
|
|
|
|
"debuggable APK state was not properly parsed!",
|
|
|
|
|
)
|
2018-09-18 15:59:49 +02:00
|
|
|
|
|
2014-12-08 22:55:14 +01:00
|
|
|
|
# these are set NOT debuggable
|
|
|
|
|
testfiles = []
|
2017-09-25 16:28:22 +02:00
|
|
|
|
testfiles.append(os.path.join(self.basedir, 'urzip-release.apk'))
|
|
|
|
|
testfiles.append(os.path.join(self.basedir, 'urzip-release-unsigned.apk'))
|
2019-01-30 16:48:35 +01:00
|
|
|
|
testfiles.append(os.path.join(self.basedir, 'v2.only.sig_2.apk'))
|
2014-12-08 22:55:14 +01:00
|
|
|
|
for apkfile in testfiles:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertFalse(
|
|
|
|
|
fdroidserver.common.is_apk_and_debuggable(apkfile),
|
|
|
|
|
"debuggable APK state was not properly parsed!",
|
|
|
|
|
)
|
2014-12-08 22:55:14 +01:00
|
|
|
|
|
2018-09-24 16:20:57 +02:00
|
|
|
|
VALID_STRICT_PACKAGE_NAMES = [
|
|
|
|
|
"An.stop",
|
|
|
|
|
"SpeedoMeterApp.main",
|
|
|
|
|
"a2dp.Vol",
|
|
|
|
|
"au.com.darkside.XServer",
|
|
|
|
|
"click.dummer.UartSmartwatch",
|
|
|
|
|
"com.Bisha.TI89EmuDonation",
|
|
|
|
|
"com.MarcosDiez.shareviahttp",
|
|
|
|
|
"com.Pau.ImapNotes2",
|
|
|
|
|
"com.app.Zensuren",
|
|
|
|
|
"com.darshancomputing.BatteryIndicator",
|
|
|
|
|
"com.geecko.QuickLyric",
|
|
|
|
|
"com.genonbeta.TrebleShot",
|
|
|
|
|
"com.gpl.rpg.AndorsTrail",
|
|
|
|
|
"com.hobbyone.HashDroid",
|
|
|
|
|
"com.moez.QKSMS",
|
|
|
|
|
"com.platypus.SAnd",
|
|
|
|
|
"com.prhlt.aemus.Read4SpeechExperiments",
|
|
|
|
|
"de.syss.MifareClassicTool",
|
|
|
|
|
"org.fdroid.fdroid",
|
|
|
|
|
"org.f_droid.fdr0ID",
|
|
|
|
|
]
|
|
|
|
|
|
2018-09-01 12:08:37 +02:00
|
|
|
|
def test_is_valid_package_name(self):
|
2018-09-24 16:20:57 +02:00
|
|
|
|
for name in self.VALID_STRICT_PACKAGE_NAMES + [
|
2021-06-07 11:49:21 +02:00
|
|
|
|
"_SpeedoMeterApp.main",
|
|
|
|
|
"05041684efd9b16c2888b1eddbadd0359f655f311b89bdd1737f560a10d20fb8",
|
|
|
|
|
]:
|
|
|
|
|
self.assertTrue(
|
|
|
|
|
fdroidserver.common.is_valid_package_name(name),
|
|
|
|
|
"{0} should be a valid package name".format(name),
|
|
|
|
|
)
|
|
|
|
|
for name in [
|
|
|
|
|
"0rg.fdroid.fdroid",
|
|
|
|
|
".f_droid.fdr0ID",
|
|
|
|
|
"trailingdot.",
|
|
|
|
|
"org.fdroid/fdroid",
|
|
|
|
|
"/org.fdroid.fdroid",
|
|
|
|
|
]:
|
|
|
|
|
self.assertFalse(
|
|
|
|
|
fdroidserver.common.is_valid_package_name(name),
|
|
|
|
|
"{0} should not be a valid package name".format(name),
|
|
|
|
|
)
|
2014-12-08 22:55:14 +01:00
|
|
|
|
|
2018-09-07 14:17:39 +02:00
|
|
|
|
def test_is_strict_application_id(self):
|
|
|
|
|
"""see also tests/valid-package-names/"""
|
2018-09-24 16:20:57 +02:00
|
|
|
|
for name in self.VALID_STRICT_PACKAGE_NAMES:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertTrue(
|
|
|
|
|
fdroidserver.common.is_strict_application_id(name),
|
|
|
|
|
"{0} should be a strict application id".format(name),
|
|
|
|
|
)
|
|
|
|
|
for name in [
|
|
|
|
|
"0rg.fdroid.fdroid",
|
|
|
|
|
".f_droid.fdr0ID",
|
|
|
|
|
"oneword",
|
|
|
|
|
"trailingdot.",
|
|
|
|
|
"cafebabe",
|
|
|
|
|
"org.fdroid/fdroid",
|
|
|
|
|
"/org.fdroid.fdroid",
|
|
|
|
|
"_SpeedoMeterApp.main",
|
|
|
|
|
"05041684efd9b16c2888b1eddbadd0359f655f311b89bdd1737f560a10d20fb8",
|
|
|
|
|
]:
|
|
|
|
|
self.assertFalse(
|
|
|
|
|
fdroidserver.common.is_strict_application_id(name),
|
|
|
|
|
"{0} should not be a strict application id".format(name),
|
|
|
|
|
)
|
2018-09-01 12:08:37 +02:00
|
|
|
|
|
2015-07-30 22:13:36 +02:00
|
|
|
|
def test_prepare_sources(self):
|
|
|
|
|
testint = 99999999
|
|
|
|
|
teststr = 'FAKE_STR_FOR_TESTING'
|
2015-08-11 15:33:03 +02:00
|
|
|
|
|
2021-06-07 11:49:21 +02:00
|
|
|
|
shutil.copytree(
|
|
|
|
|
os.path.join(self.basedir, 'source-files'),
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.path.join(self.tmpdir, 'source-files'),
|
2021-06-07 11:49:21 +02:00
|
|
|
|
)
|
2015-08-11 15:33:03 +02:00
|
|
|
|
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fdroidclient_testdir = os.path.join(
|
2022-11-22 17:17:45 +01:00
|
|
|
|
self.tmpdir, 'source-files', 'fdroid', 'fdroidclient'
|
2021-06-07 11:49:21 +02:00
|
|
|
|
)
|
2015-07-30 22:13:36 +02:00
|
|
|
|
|
|
|
|
|
config = dict()
|
|
|
|
|
config['sdk_path'] = os.getenv('ANDROID_HOME')
|
2015-11-28 17:55:27 +01:00
|
|
|
|
config['ndk_paths'] = {'r10d': os.getenv('ANDROID_NDK_HOME')}
|
2015-07-30 22:13:36 +02:00
|
|
|
|
fdroidserver.common.config = config
|
2015-11-28 13:09:47 +01:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.id = 'org.fdroid.froid'
|
2015-11-28 17:55:27 +01:00
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.commit = 'master'
|
|
|
|
|
build.forceversion = True
|
|
|
|
|
build.forcevercode = True
|
|
|
|
|
build.gradle = ['yes']
|
|
|
|
|
build.target = 'android-' + str(testint)
|
2016-11-23 17:52:04 +01:00
|
|
|
|
build.versionName = teststr
|
|
|
|
|
build.versionCode = testint
|
2015-07-30 22:13:36 +02:00
|
|
|
|
|
2021-06-07 11:49:21 +02:00
|
|
|
|
class FakeVcs:
|
2015-07-30 22:13:36 +02:00
|
|
|
|
# no need to change to the correct commit here
|
|
|
|
|
def gotorevision(self, rev, refresh=True):
|
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
# no srclib info needed, but it could be added...
|
|
|
|
|
def getsrclib(self):
|
|
|
|
|
return None
|
|
|
|
|
|
2017-11-30 10:14:38 +01:00
|
|
|
|
fdroidserver.common.prepare_source(FakeVcs(), app, build,
|
|
|
|
|
fdroidclient_testdir, fdroidclient_testdir, fdroidclient_testdir)
|
2015-07-30 22:13:36 +02:00
|
|
|
|
|
2021-06-14 15:38:37 +02:00
|
|
|
|
fdroidclient_testdir = Path(fdroidclient_testdir)
|
|
|
|
|
build_gradle = fdroidclient_testdir / 'build.gradle'
|
|
|
|
|
filedata = build_gradle.read_text(encoding='utf-8')
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertIsNotNone(
|
|
|
|
|
re.search(r"\s+compileSdkVersion %s\s+" % testint, filedata)
|
|
|
|
|
)
|
2015-07-30 22:13:36 +02:00
|
|
|
|
|
2021-06-14 15:38:37 +02:00
|
|
|
|
androidmanifest_xml = fdroidclient_testdir / 'AndroidManifest.xml'
|
|
|
|
|
filedata = androidmanifest_xml.read_text(encoding='utf-8')
|
2015-07-30 22:13:36 +02:00
|
|
|
|
self.assertIsNone(re.search('android:debuggable', filedata))
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertIsNotNone(
|
|
|
|
|
re.search('android:versionName="%s"' % build.versionName, filedata)
|
|
|
|
|
)
|
|
|
|
|
self.assertIsNotNone(
|
|
|
|
|
re.search('android:versionCode="%s"' % build.versionCode, filedata)
|
|
|
|
|
)
|
2015-07-30 22:13:36 +02:00
|
|
|
|
|
2021-06-14 20:53:14 +02:00
|
|
|
|
@unittest.skipIf(os.name == 'nt', "`fdroid build` assumes POSIX scripting")
|
2020-06-24 20:50:21 +02:00
|
|
|
|
def test_prepare_sources_with_prebuild_subdir(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
app_build_dir = os.path.join(self.testdir, 'build', 'com.example')
|
2021-06-07 11:49:21 +02:00
|
|
|
|
shutil.copytree(
|
|
|
|
|
os.path.join(self.basedir, 'source-files', 'fdroid', 'fdroidclient'),
|
|
|
|
|
app_build_dir,
|
|
|
|
|
)
|
2020-06-24 20:50:21 +02:00
|
|
|
|
|
|
|
|
|
subdir = 'baz/bar'
|
2021-06-14 15:38:37 +02:00
|
|
|
|
subdir_path = Path(app_build_dir) / subdir
|
|
|
|
|
subdir_path.mkdir(parents=True, exist_ok=True)
|
|
|
|
|
build_gradle = subdir_path / 'build.gradle'
|
|
|
|
|
build_gradle.write_text('// just a test placeholder', encoding='utf-8')
|
2020-06-24 20:50:21 +02:00
|
|
|
|
|
|
|
|
|
config = dict()
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
|
|
|
|
|
srclibname = 'FakeSrcLib'
|
2022-11-22 17:17:45 +01:00
|
|
|
|
srclib_testdir = os.path.join(self.testdir, 'build', 'srclib')
|
2020-06-24 20:50:21 +02:00
|
|
|
|
os.makedirs(os.path.join(srclib_testdir, srclibname, 'testdirshouldexist'))
|
|
|
|
|
fdroidserver.metadata.srclibs = {
|
|
|
|
|
srclibname: {
|
|
|
|
|
'RepoType': 'git',
|
|
|
|
|
'Repo': 'https://example.com/foo/fakesrclib',
|
|
|
|
|
'Subdir': None,
|
|
|
|
|
'Prepare': None,
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.id = 'app.has.srclibs'
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.commit = 'master'
|
|
|
|
|
build.gradle = ['yes']
|
2022-09-09 12:36:54 +02:00
|
|
|
|
build.prebuild = ['test -d $$FakeSrcLib$$/testdirshouldexist'] # actual test condition
|
2020-06-24 20:50:21 +02:00
|
|
|
|
build.srclibs = [srclibname + '@1.2.3']
|
|
|
|
|
build.subdir = subdir
|
2021-06-07 11:49:21 +02:00
|
|
|
|
build.versionCode = 0xCAFE
|
2020-06-24 20:50:21 +02:00
|
|
|
|
build.versionName = 'vCAFE'
|
|
|
|
|
|
2021-06-07 11:49:21 +02:00
|
|
|
|
class FakeVcs:
|
2020-06-24 20:50:21 +02:00
|
|
|
|
# no need to change to the correct commit here
|
|
|
|
|
def gotorevision(self, rev, refresh=True):
|
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
# no srclib info needed, but it could be added...
|
|
|
|
|
def getsrclib(self):
|
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
|
fdroidserver.common.prepare_source(FakeVcs(), app, build,
|
|
|
|
|
app_build_dir, srclib_testdir, app_build_dir,
|
|
|
|
|
onserver=True, refresh=False) # do not clone in this test
|
|
|
|
|
|
2017-09-25 16:34:25 +02:00
|
|
|
|
def test_prepare_sources_refresh(self):
|
|
|
|
|
packageName = 'org.fdroid.ci.test.app'
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2017-09-25 16:34:25 +02:00
|
|
|
|
os.mkdir('build')
|
|
|
|
|
os.mkdir('metadata')
|
|
|
|
|
|
|
|
|
|
# use a local copy if available to avoid hitting the network
|
|
|
|
|
tmprepo = os.path.join(self.basedir, 'tmp', 'importer')
|
|
|
|
|
if os.path.exists(tmprepo):
|
|
|
|
|
git_url = tmprepo
|
|
|
|
|
else:
|
|
|
|
|
git_url = 'https://gitlab.com/fdroid/ci-test-app.git'
|
|
|
|
|
|
|
|
|
|
metadata = dict()
|
|
|
|
|
metadata['Description'] = 'This is just a test app'
|
|
|
|
|
metadata['RepoType'] = 'git'
|
|
|
|
|
metadata['Repo'] = git_url
|
|
|
|
|
with open(os.path.join('metadata', packageName + '.yml'), 'w') as fp:
|
|
|
|
|
yaml.dump(metadata, fp)
|
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
gitrepo = os.path.join(self.tmpdir, 'build', packageName)
|
2017-09-25 16:34:25 +02:00
|
|
|
|
vcs0 = fdroidserver.common.getvcs('git', git_url, gitrepo)
|
|
|
|
|
vcs0.gotorevision('0.3', refresh=True)
|
|
|
|
|
vcs1 = fdroidserver.common.getvcs('git', git_url, gitrepo)
|
|
|
|
|
vcs1.gotorevision('0.3', refresh=False)
|
|
|
|
|
|
2023-02-20 22:38:30 +01:00
|
|
|
|
def test_setup_vcs_srclib(self):
|
|
|
|
|
app = fdroidserver.metadata.App(
|
|
|
|
|
{
|
|
|
|
|
'RepoType': 'srclib',
|
|
|
|
|
'Repo': 'TransportsRennes',
|
|
|
|
|
}
|
|
|
|
|
)
|
|
|
|
|
srclib = {
|
|
|
|
|
'RepoType': 'git',
|
|
|
|
|
'Repo': 'https://github.com/ybonnel/TransportsRennes',
|
|
|
|
|
}
|
|
|
|
|
fdroidserver.metadata.srclibs = {'TransportsRennes': srclib}
|
|
|
|
|
vcs, build_dir = fdroidserver.common.setup_vcs(app)
|
|
|
|
|
self.assertIsNotNone(vcs)
|
|
|
|
|
self.assertEqual(build_dir, Path('build/srclib/TransportsRennes'))
|
|
|
|
|
|
|
|
|
|
def test_getvcs_srclib(self):
|
|
|
|
|
vcstype = 'srclib'
|
|
|
|
|
remote = 'TransportsRennes'
|
|
|
|
|
local = 'build/srclib/' + remote
|
|
|
|
|
fdroidserver.metadata.srclibs = {
|
|
|
|
|
remote: {
|
|
|
|
|
'RepoType': 'git',
|
|
|
|
|
'Repo': 'https://github.com/ybonnel/TransportsRennes',
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
self.assertIsNotNone(fdroidserver.common.getvcs(vcstype, remote, local))
|
|
|
|
|
self.assertIsNotNone(fdroidserver.common.getvcs(vcstype, Path(remote), local))
|
|
|
|
|
self.assertIsNotNone(fdroidserver.common.getvcs(vcstype, remote, Path(local)))
|
|
|
|
|
self.assertIsNotNone(fdroidserver.common.getvcs(
|
|
|
|
|
vcstype, Path(remote), Path(local)
|
|
|
|
|
))
|
|
|
|
|
with self.assertRaises(VCSException):
|
|
|
|
|
fdroidserver.common.getvcs(vcstype, remote, 'bad')
|
|
|
|
|
with self.assertRaises(VCSException):
|
|
|
|
|
fdroidserver.common.getvcs(vcstype, remote, Path('bad'))
|
|
|
|
|
with self.assertRaises(VCSException):
|
|
|
|
|
fdroidserver.common.getvcs(vcstype, Path(remote), 'bad')
|
|
|
|
|
with self.assertRaises(VCSException):
|
|
|
|
|
fdroidserver.common.getvcs(vcstype, Path(remote), Path('bad'))
|
|
|
|
|
|
2016-02-17 21:45:06 +01:00
|
|
|
|
def test_fdroid_popen_stderr_redirect(self):
|
2017-09-25 16:28:22 +02:00
|
|
|
|
config = dict()
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
|
2016-02-17 21:45:06 +01:00
|
|
|
|
commands = ['sh', '-c', 'echo stdout message && echo stderr message 1>&2']
|
|
|
|
|
|
|
|
|
|
p = fdroidserver.common.FDroidPopen(commands)
|
|
|
|
|
self.assertEqual(p.output, 'stdout message\nstderr message\n')
|
|
|
|
|
|
|
|
|
|
p = fdroidserver.common.FDroidPopen(commands, stderr_to_stdout=False)
|
|
|
|
|
self.assertEqual(p.output, 'stdout message\n')
|
2015-07-30 22:13:36 +02:00
|
|
|
|
|
2017-03-15 21:23:44 +01:00
|
|
|
|
def test_signjar(self):
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
config['jarsigner'] = fdroidserver.common.find_sdk_tools_cmd('jarsigner')
|
|
|
|
|
fdroidserver.common.config = config
|
2017-03-29 17:11:40 +02:00
|
|
|
|
fdroidserver.signindex.config = config
|
2017-03-15 21:23:44 +01:00
|
|
|
|
|
2017-09-25 16:28:22 +02:00
|
|
|
|
sourcedir = os.path.join(self.basedir, 'signindex')
|
2022-11-22 17:17:45 +01:00
|
|
|
|
with tempfile.TemporaryDirectory(
|
2021-06-07 11:49:21 +02:00
|
|
|
|
prefix=inspect.currentframe().f_code.co_name, dir=self.tmpdir
|
2022-11-22 17:17:45 +01:00
|
|
|
|
) as testsdir:
|
|
|
|
|
for f in ('testy.jar', 'guardianproject.jar'):
|
|
|
|
|
sourcefile = os.path.join(sourcedir, f)
|
|
|
|
|
testfile = os.path.join(testsdir, f)
|
|
|
|
|
shutil.copy(sourcefile, testsdir)
|
|
|
|
|
fdroidserver.signindex.sign_jar(testfile, use_old_algs=True)
|
|
|
|
|
# these should be resigned, and therefore different
|
|
|
|
|
self.assertNotEqual(
|
|
|
|
|
open(sourcefile, 'rb').read(), open(testfile, 'rb').read()
|
|
|
|
|
)
|
2017-03-15 21:23:44 +01:00
|
|
|
|
|
2017-01-09 17:35:58 +01:00
|
|
|
|
def test_verify_apk_signature(self):
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
|
2017-12-07 17:32:14 +01:00
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature('bad-unicode-πÇÇ现代通用字-български-عربي1.apk'))
|
2019-07-01 11:43:18 +02:00
|
|
|
|
if 'apksigner' in fdroidserver.common.config: # apksigner considers MD5 signatures valid
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature('org.bitbucket.tickytacky.mirrormirror_1.apk'))
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature('org.bitbucket.tickytacky.mirrormirror_2.apk'))
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature('org.bitbucket.tickytacky.mirrormirror_3.apk'))
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature('org.bitbucket.tickytacky.mirrormirror_4.apk'))
|
|
|
|
|
else:
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature('org.bitbucket.tickytacky.mirrormirror_1.apk'))
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature('org.bitbucket.tickytacky.mirrormirror_2.apk'))
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature('org.bitbucket.tickytacky.mirrormirror_3.apk'))
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature('org.bitbucket.tickytacky.mirrormirror_4.apk'))
|
2017-12-07 17:32:14 +01:00
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature('org.dyndns.fules.ck_20.apk'))
|
2017-01-09 17:35:58 +01:00
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature('urzip.apk'))
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature('urzip-badcert.apk'))
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature('urzip-badsig.apk'))
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature('urzip-release.apk'))
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature('urzip-release-unsigned.apk'))
|
|
|
|
|
|
2017-12-07 17:32:14 +01:00
|
|
|
|
def test_verify_old_apk_signature(self):
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
config['jarsigner'] = fdroidserver.common.find_sdk_tools_cmd('jarsigner')
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
|
jarsigner: allow weak signatures
openjdk-11 11.0.17 in Debian unstable fails to verify weak signatures:
jarsigner -verbose -strict -verify tests/signindex/guardianproject.jar
131 Fri Dec 02 20:10:00 CET 2016 META-INF/MANIFEST.MF
252 Fri Dec 02 20:10:04 CET 2016 META-INF/1.SF
2299 Fri Dec 02 20:10:04 CET 2016 META-INF/1.RSA
0 Fri Dec 02 20:09:58 CET 2016 META-INF/
m ? 48743 Fri Dec 02 20:09:58 CET 2016 index.xml
s = signature was verified
m = entry is listed in manifest
k = at least one certificate was found in keystore
? = unsigned entry
- Signed by "EMAILADDRESS=root@guardianproject.info, CN=guardianproject.info, O=Guardian Project, OU=FDroid Repo, L=New York, ST=New York, C=US"
Digest algorithm: SHA1 (disabled)
Signature algorithm: SHA1withRSA (disabled), 4096-bit key
WARNING: The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled by the security property:
jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, DSA keySize < 1024, SHA1 denyAfter 2019-01-01, include jdk.disabled.namedCurves
2022-10-29 22:09:07 +02:00
|
|
|
|
try:
|
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature('bad-unicode-πÇÇ现代通用字-български-عربي1.apk')
|
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature('org.bitbucket.tickytacky.mirrormirror_1.apk')
|
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature('org.bitbucket.tickytacky.mirrormirror_2.apk')
|
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature('org.bitbucket.tickytacky.mirrormirror_3.apk')
|
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature('org.bitbucket.tickytacky.mirrormirror_4.apk')
|
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature('org.dyndns.fules.ck_20.apk')
|
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature('urzip.apk')
|
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature('urzip-release.apk')
|
|
|
|
|
except VerificationException:
|
|
|
|
|
self.fail("failed to jarsigner failed to verify an old apk")
|
|
|
|
|
self.assertRaises(VerificationException, fdroidserver.common.verify_deprecated_jar_signature, 'urzip-badcert.apk')
|
|
|
|
|
self.assertRaises(VerificationException, fdroidserver.common.verify_deprecated_jar_signature, 'urzip-badsig.apk')
|
|
|
|
|
self.assertRaises(VerificationException, fdroidserver.common.verify_deprecated_jar_signature, 'urzip-release-unsigned.apk')
|
|
|
|
|
|
2023-03-08 11:26:29 +01:00
|
|
|
|
def test_verify_jar_signature(self):
|
|
|
|
|
"""Sign entry.jar and make sure it validates"""
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
config['jarsigner'] = fdroidserver.common.find_sdk_tools_cmd('jarsigner')
|
|
|
|
|
config['keystore'] = os.path.join(self.basedir, 'keystore.jks')
|
|
|
|
|
config['repo_keyalias'] = 'sova'
|
|
|
|
|
config['keystorepass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
config['keypass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.signindex.config = config
|
|
|
|
|
repo_dir = Path(self.testdir) / 'repo'
|
|
|
|
|
repo_dir.mkdir()
|
|
|
|
|
shutil.copy('repo/entry.json', repo_dir)
|
|
|
|
|
shutil.copy('repo/index-v2.json', repo_dir)
|
|
|
|
|
os.chdir(self.testdir)
|
|
|
|
|
fdroidserver.signindex.sign_index('repo', 'entry.json')
|
|
|
|
|
fdroidserver.common.verify_jar_signature('repo/entry.jar')
|
|
|
|
|
|
|
|
|
|
def test_verify_jar_signature_fails(self):
|
|
|
|
|
"""Test verify_jar_signature fails on unsigned and deprecated algorithms"""
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
config['jarsigner'] = fdroidserver.common.find_sdk_tools_cmd('jarsigner')
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
source_dir = os.path.join(self.basedir, 'signindex')
|
|
|
|
|
for f in ('unsigned.jar', 'testy.jar', 'guardianproject.jar', 'guardianproject-v1.jar'):
|
|
|
|
|
testfile = os.path.join(source_dir, f)
|
|
|
|
|
with self.assertRaises(fdroidserver.index.VerificationException):
|
|
|
|
|
fdroidserver.common.verify_jar_signature(testfile)
|
|
|
|
|
|
jarsigner: allow weak signatures
openjdk-11 11.0.17 in Debian unstable fails to verify weak signatures:
jarsigner -verbose -strict -verify tests/signindex/guardianproject.jar
131 Fri Dec 02 20:10:00 CET 2016 META-INF/MANIFEST.MF
252 Fri Dec 02 20:10:04 CET 2016 META-INF/1.SF
2299 Fri Dec 02 20:10:04 CET 2016 META-INF/1.RSA
0 Fri Dec 02 20:09:58 CET 2016 META-INF/
m ? 48743 Fri Dec 02 20:09:58 CET 2016 index.xml
s = signature was verified
m = entry is listed in manifest
k = at least one certificate was found in keystore
? = unsigned entry
- Signed by "EMAILADDRESS=root@guardianproject.info, CN=guardianproject.info, O=Guardian Project, OU=FDroid Repo, L=New York, ST=New York, C=US"
Digest algorithm: SHA1 (disabled)
Signature algorithm: SHA1withRSA (disabled), 4096-bit key
WARNING: The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled by the security property:
jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, DSA keySize < 1024, SHA1 denyAfter 2019-01-01, include jdk.disabled.namedCurves
2022-10-29 22:09:07 +02:00
|
|
|
|
def test_verify_deprecated_jar_signature(self):
|
2017-12-07 17:32:14 +01:00
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
jarsigner: allow weak signatures
openjdk-11 11.0.17 in Debian unstable fails to verify weak signatures:
jarsigner -verbose -strict -verify tests/signindex/guardianproject.jar
131 Fri Dec 02 20:10:00 CET 2016 META-INF/MANIFEST.MF
252 Fri Dec 02 20:10:04 CET 2016 META-INF/1.SF
2299 Fri Dec 02 20:10:04 CET 2016 META-INF/1.RSA
0 Fri Dec 02 20:09:58 CET 2016 META-INF/
m ? 48743 Fri Dec 02 20:09:58 CET 2016 index.xml
s = signature was verified
m = entry is listed in manifest
k = at least one certificate was found in keystore
? = unsigned entry
- Signed by "EMAILADDRESS=root@guardianproject.info, CN=guardianproject.info, O=Guardian Project, OU=FDroid Repo, L=New York, ST=New York, C=US"
Digest algorithm: SHA1 (disabled)
Signature algorithm: SHA1withRSA (disabled), 4096-bit key
WARNING: The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled by the security property:
jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, DSA keySize < 1024, SHA1 denyAfter 2019-01-01, include jdk.disabled.namedCurves
2022-10-29 22:09:07 +02:00
|
|
|
|
config['jarsigner'] = fdroidserver.common.find_sdk_tools_cmd('jarsigner')
|
2017-12-07 17:32:14 +01:00
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
source_dir = os.path.join(self.basedir, 'signindex')
|
|
|
|
|
for f in ('testy.jar', 'guardianproject.jar'):
|
|
|
|
|
testfile = os.path.join(source_dir, f)
|
jarsigner: allow weak signatures
openjdk-11 11.0.17 in Debian unstable fails to verify weak signatures:
jarsigner -verbose -strict -verify tests/signindex/guardianproject.jar
131 Fri Dec 02 20:10:00 CET 2016 META-INF/MANIFEST.MF
252 Fri Dec 02 20:10:04 CET 2016 META-INF/1.SF
2299 Fri Dec 02 20:10:04 CET 2016 META-INF/1.RSA
0 Fri Dec 02 20:09:58 CET 2016 META-INF/
m ? 48743 Fri Dec 02 20:09:58 CET 2016 index.xml
s = signature was verified
m = entry is listed in manifest
k = at least one certificate was found in keystore
? = unsigned entry
- Signed by "EMAILADDRESS=root@guardianproject.info, CN=guardianproject.info, O=Guardian Project, OU=FDroid Repo, L=New York, ST=New York, C=US"
Digest algorithm: SHA1 (disabled)
Signature algorithm: SHA1withRSA (disabled), 4096-bit key
WARNING: The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled by the security property:
jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, DSA keySize < 1024, SHA1 denyAfter 2019-01-01, include jdk.disabled.namedCurves
2022-10-29 22:09:07 +02:00
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature(testfile)
|
2017-12-07 17:32:14 +01:00
|
|
|
|
|
|
|
|
|
testfile = os.path.join(source_dir, 'unsigned.jar')
|
|
|
|
|
with self.assertRaises(fdroidserver.index.VerificationException):
|
jarsigner: allow weak signatures
openjdk-11 11.0.17 in Debian unstable fails to verify weak signatures:
jarsigner -verbose -strict -verify tests/signindex/guardianproject.jar
131 Fri Dec 02 20:10:00 CET 2016 META-INF/MANIFEST.MF
252 Fri Dec 02 20:10:04 CET 2016 META-INF/1.SF
2299 Fri Dec 02 20:10:04 CET 2016 META-INF/1.RSA
0 Fri Dec 02 20:09:58 CET 2016 META-INF/
m ? 48743 Fri Dec 02 20:09:58 CET 2016 index.xml
s = signature was verified
m = entry is listed in manifest
k = at least one certificate was found in keystore
? = unsigned entry
- Signed by "EMAILADDRESS=root@guardianproject.info, CN=guardianproject.info, O=Guardian Project, OU=FDroid Repo, L=New York, ST=New York, C=US"
Digest algorithm: SHA1 (disabled)
Signature algorithm: SHA1withRSA (disabled), 4096-bit key
WARNING: The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled by the security property:
jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, DSA keySize < 1024, SHA1 denyAfter 2019-01-01, include jdk.disabled.namedCurves
2022-10-29 22:09:07 +02:00
|
|
|
|
fdroidserver.common.verify_deprecated_jar_signature(testfile)
|
2017-12-07 17:32:14 +01:00
|
|
|
|
|
2016-12-19 16:54:32 +01:00
|
|
|
|
def test_verify_apks(self):
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
|
2017-09-25 16:28:22 +02:00
|
|
|
|
sourceapk = os.path.join(self.basedir, 'urzip.apk')
|
2016-12-19 16:54:32 +01:00
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
copyapk = os.path.join(self.testdir, 'urzip-copy.apk')
|
2016-12-19 16:54:32 +01:00
|
|
|
|
shutil.copy(sourceapk, copyapk)
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature(copyapk))
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertIsNone(
|
|
|
|
|
fdroidserver.common.verify_apks(sourceapk, copyapk, self.tmpdir)
|
|
|
|
|
)
|
2016-12-19 16:54:32 +01:00
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
unsignedapk = os.path.join(self.testdir, 'urzip-unsigned.apk')
|
2016-12-19 16:54:32 +01:00
|
|
|
|
with ZipFile(sourceapk, 'r') as apk:
|
|
|
|
|
with ZipFile(unsignedapk, 'w') as testapk:
|
|
|
|
|
for info in apk.infolist():
|
|
|
|
|
if not info.filename.startswith('META-INF/'):
|
|
|
|
|
testapk.writestr(info, apk.read(info.filename))
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertIsNone(
|
|
|
|
|
fdroidserver.common.verify_apks(sourceapk, unsignedapk, self.tmpdir)
|
|
|
|
|
)
|
2016-12-19 16:54:32 +01:00
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
twosigapk = os.path.join(self.testdir, 'urzip-twosig.apk')
|
2017-09-25 16:28:22 +02:00
|
|
|
|
otherapk = ZipFile(os.path.join(self.basedir, 'urzip-release.apk'), 'r')
|
2016-12-19 16:54:32 +01:00
|
|
|
|
with ZipFile(sourceapk, 'r') as apk:
|
|
|
|
|
with ZipFile(twosigapk, 'w') as testapk:
|
|
|
|
|
for info in apk.infolist():
|
|
|
|
|
testapk.writestr(info, apk.read(info.filename))
|
|
|
|
|
if info.filename.startswith('META-INF/'):
|
2021-04-14 21:06:20 +02:00
|
|
|
|
testapk.writestr(info.filename, otherapk.read(info.filename))
|
2016-12-19 16:54:32 +01:00
|
|
|
|
otherapk.close()
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature(twosigapk))
|
2017-09-25 16:28:22 +02:00
|
|
|
|
self.assertIsNone(fdroidserver.common.verify_apks(sourceapk, twosigapk, self.tmpdir))
|
2016-12-19 16:54:32 +01:00
|
|
|
|
|
2017-04-02 12:08:01 +02:00
|
|
|
|
def test_write_to_config(self):
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpPath:
|
|
|
|
|
cfgPath = os.path.join(tmpPath, 'config.py')
|
2018-10-19 15:01:34 +02:00
|
|
|
|
with open(cfgPath, 'w') as f:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
f.write(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""\
|
2017-04-02 12:08:01 +02:00
|
|
|
|
# abc
|
|
|
|
|
# test = 'example value'
|
|
|
|
|
default_me= '%%%'
|
|
|
|
|
|
|
|
|
|
# comment
|
|
|
|
|
do_not_touch = "good value"
|
|
|
|
|
default_me="!!!"
|
|
|
|
|
|
2021-06-07 11:49:21 +02:00
|
|
|
|
key="123" # inline"""
|
|
|
|
|
)
|
|
|
|
|
)
|
2017-04-02 12:08:01 +02:00
|
|
|
|
|
|
|
|
|
cfg = {'key': '111', 'default_me_orig': 'orig'}
|
|
|
|
|
fdroidserver.common.write_to_config(cfg, 'key', config_file=cfgPath)
|
|
|
|
|
fdroidserver.common.write_to_config(cfg, 'default_me', config_file=cfgPath)
|
|
|
|
|
fdroidserver.common.write_to_config(cfg, 'test', value='test value', config_file=cfgPath)
|
|
|
|
|
fdroidserver.common.write_to_config(cfg, 'new_key', value='new', config_file=cfgPath)
|
|
|
|
|
|
2018-10-19 15:01:34 +02:00
|
|
|
|
with open(cfgPath, 'r') as f:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertEqual(
|
|
|
|
|
f.read(),
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""\
|
2017-04-02 12:08:01 +02:00
|
|
|
|
# abc
|
|
|
|
|
test = 'test value'
|
|
|
|
|
default_me = 'orig'
|
|
|
|
|
|
|
|
|
|
# comment
|
|
|
|
|
do_not_touch = "good value"
|
|
|
|
|
|
|
|
|
|
key = "111" # inline
|
|
|
|
|
|
|
|
|
|
new_key = "new"
|
2021-06-07 11:49:21 +02:00
|
|
|
|
"""
|
|
|
|
|
),
|
|
|
|
|
)
|
2017-04-02 12:08:01 +02:00
|
|
|
|
|
|
|
|
|
def test_write_to_config_when_empty(self):
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpPath:
|
|
|
|
|
cfgPath = os.path.join(tmpPath, 'config.py')
|
|
|
|
|
with open(cfgPath, 'w') as f:
|
|
|
|
|
pass
|
|
|
|
|
fdroidserver.common.write_to_config({}, 'key', 'val', cfgPath)
|
2018-10-19 15:01:34 +02:00
|
|
|
|
with open(cfgPath, 'r') as f:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
self.assertEqual(
|
|
|
|
|
f.read(),
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""\
|
2017-04-02 12:08:01 +02:00
|
|
|
|
|
|
|
|
|
key = "val"
|
2021-06-07 11:49:21 +02:00
|
|
|
|
"""
|
|
|
|
|
),
|
|
|
|
|
)
|
2017-04-02 12:08:01 +02:00
|
|
|
|
|
2017-05-31 23:02:28 +02:00
|
|
|
|
def test_apk_name_regex(self):
|
|
|
|
|
good = [
|
|
|
|
|
'urzipπÇÇπÇÇ现代汉语通用字българскиعربي1234ö_-123456.apk',
|
|
|
|
|
'urzipπÇÇπÇÇ现代汉语通用字българскиعربي1234ö_123456_abcdef0.apk',
|
|
|
|
|
'urzip_-123456.apk',
|
|
|
|
|
'a0_0.apk',
|
|
|
|
|
'Z0_0.apk',
|
|
|
|
|
'a0_0_abcdef0.apk',
|
|
|
|
|
'a_a_a_a_0_abcdef0.apk',
|
|
|
|
|
'a_____0.apk',
|
|
|
|
|
'a_____123456_abcdef0.apk',
|
|
|
|
|
'org.fdroid.fdroid_123456.apk',
|
|
|
|
|
# valid, but "_99999" is part of packageName rather than versionCode
|
|
|
|
|
'org.fdroid.fdroid_99999_123456.apk',
|
|
|
|
|
# should be valid, but I can't figure out the regex since \w includes digits
|
|
|
|
|
# 'πÇÇπÇÇ现代汉语通用字българскиعربي1234ö_0_123bafd.apk',
|
|
|
|
|
]
|
|
|
|
|
for name in good:
|
|
|
|
|
m = fdroidserver.common.APK_NAME_REGEX.match(name)
|
|
|
|
|
self.assertIsNotNone(m)
|
|
|
|
|
self.assertIn(m.group(2), ('-123456', '0', '123456'))
|
|
|
|
|
self.assertIn(m.group(3), ('abcdef0', None))
|
|
|
|
|
|
|
|
|
|
bad = [
|
|
|
|
|
'urzipπÇÇπÇÇ现代汉语通用字българскиعربي1234ö_123456_abcdefg.apk',
|
|
|
|
|
'urzip-_-198274.apk',
|
|
|
|
|
'urzip-_0_123bafd.apk',
|
|
|
|
|
'no spaces allowed_123.apk',
|
|
|
|
|
'0_0.apk',
|
|
|
|
|
'0_0_abcdef0.apk',
|
|
|
|
|
]
|
|
|
|
|
for name in bad:
|
|
|
|
|
self.assertIsNone(fdroidserver.common.APK_NAME_REGEX.match(name))
|
|
|
|
|
|
|
|
|
|
def test_standard_file_name_regex(self):
|
|
|
|
|
good = [
|
|
|
|
|
'urzipπÇÇπÇÇ现代汉语通用字българскиعربي1234ö_-123456.mp3',
|
|
|
|
|
'urzipπÇÇπÇÇ现代汉语通用字българскиعربي1234ö_123456.mov',
|
|
|
|
|
'Document_-123456.pdf',
|
|
|
|
|
'WTF_0.MOV',
|
|
|
|
|
'Z0_0.ebk',
|
|
|
|
|
'a_a_a_a_0.txt',
|
|
|
|
|
'org.fdroid.fdroid.privileged.ota_123456.zip',
|
|
|
|
|
'πÇÇπÇÇ现代汉语通用字българскиعربي1234ö_0.jpeg',
|
|
|
|
|
'a_____0.PNG',
|
|
|
|
|
# valid, but "_99999" is part of packageName rather than versionCode
|
|
|
|
|
'a_____99999_123456.zip',
|
|
|
|
|
'org.fdroid.fdroid_99999_123456.zip',
|
|
|
|
|
]
|
|
|
|
|
for name in good:
|
|
|
|
|
m = fdroidserver.common.STANDARD_FILE_NAME_REGEX.match(name)
|
|
|
|
|
self.assertIsNotNone(m)
|
|
|
|
|
self.assertIn(m.group(2), ('-123456', '0', '123456'))
|
|
|
|
|
|
|
|
|
|
bad = [
|
|
|
|
|
'urzipπÇÇπÇÇ现代汉语通用字българскиعربي1234ö_abcdefg.JPEG',
|
|
|
|
|
'urzip-_-198274.zip',
|
|
|
|
|
'urzip-_123bafd.pdf',
|
|
|
|
|
'no spaces allowed_123.foobar',
|
|
|
|
|
'a_____0.',
|
|
|
|
|
]
|
|
|
|
|
for name in bad:
|
|
|
|
|
self.assertIsNone(fdroidserver.common.STANDARD_FILE_NAME_REGEX.match(name))
|
|
|
|
|
|
2017-09-23 09:02:50 +02:00
|
|
|
|
def test_apk_signer_fingerprint(self):
|
|
|
|
|
|
|
|
|
|
# fingerprints fetched with: keytool -printcert -file ____.RSA
|
|
|
|
|
testapks = (('repo/obb.main.oldversion_1444412523.apk',
|
|
|
|
|
'818e469465f96b704e27be2fee4c63ab9f83ddf30e7a34c7371a4728d83b0bc1'),
|
|
|
|
|
('repo/obb.main.twoversions_1101613.apk',
|
|
|
|
|
'32a23624c201b949f085996ba5ed53d40f703aca4989476949cae891022e0ed6'),
|
|
|
|
|
('repo/obb.main.twoversions_1101617.apk',
|
|
|
|
|
'32a23624c201b949f085996ba5ed53d40f703aca4989476949cae891022e0ed6'))
|
|
|
|
|
|
|
|
|
|
for apkfile, keytoolcertfingerprint in testapks:
|
|
|
|
|
self.assertEqual(keytoolcertfingerprint,
|
|
|
|
|
fdroidserver.common.apk_signer_fingerprint(apkfile))
|
|
|
|
|
|
2017-09-23 09:36:22 +02:00
|
|
|
|
def test_apk_signer_fingerprint_short(self):
|
|
|
|
|
|
|
|
|
|
# fingerprints fetched with: keytool -printcert -file ____.RSA
|
|
|
|
|
testapks = (('repo/obb.main.oldversion_1444412523.apk', '818e469'),
|
|
|
|
|
('repo/obb.main.twoversions_1101613.apk', '32a2362'),
|
|
|
|
|
('repo/obb.main.twoversions_1101617.apk', '32a2362'))
|
|
|
|
|
|
|
|
|
|
for apkfile, keytoolcertfingerprint in testapks:
|
|
|
|
|
self.assertEqual(keytoolcertfingerprint,
|
|
|
|
|
fdroidserver.common.apk_signer_fingerprint_short(apkfile))
|
|
|
|
|
|
2021-03-18 09:47:19 +01:00
|
|
|
|
def test_find_apksigner_system_package_default_path(self):
|
|
|
|
|
"""apksigner should be automatically used from the PATH"""
|
|
|
|
|
usr_bin_apksigner = '/usr/bin/apksigner'
|
|
|
|
|
if not os.path.isfile(usr_bin_apksigner):
|
|
|
|
|
self.skipTest('SKIPPING since %s is not installed!' % usr_bin_apksigner)
|
2022-11-25 16:12:01 +01:00
|
|
|
|
with mock.patch.dict(os.environ, clear=True):
|
|
|
|
|
os.environ['PATH'] = '/usr/local/bin:/usr/bin:/bin'
|
|
|
|
|
config = {}
|
|
|
|
|
fdroidserver.common.find_apksigner(config)
|
|
|
|
|
self.assertEqual(usr_bin_apksigner, config.get('apksigner'))
|
2021-03-18 09:47:19 +01:00
|
|
|
|
|
|
|
|
|
def test_find_apksigner_config_overrides(self):
|
|
|
|
|
"""apksigner should come from config before any auto-detection"""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
|
|
|
|
android_home = os.path.join(self.tmpdir, 'ANDROID_HOME')
|
2021-03-18 09:47:19 +01:00
|
|
|
|
do_not_use = os.path.join(android_home, 'build-tools', '30.0.3', 'apksigner')
|
|
|
|
|
os.makedirs(os.path.dirname(do_not_use))
|
|
|
|
|
with open(do_not_use, 'w') as fp:
|
|
|
|
|
fp.write('#!/bin/sh\ndate\n')
|
|
|
|
|
os.chmod(do_not_use, 0o0755)
|
2022-11-22 17:17:45 +01:00
|
|
|
|
apksigner = os.path.join(self.tmpdir, 'apksigner')
|
2021-03-18 09:47:19 +01:00
|
|
|
|
config = {'apksigner': apksigner}
|
2022-11-25 16:12:01 +01:00
|
|
|
|
with mock.patch.dict(os.environ, clear=True):
|
|
|
|
|
os.environ['ANDROID_HOME'] = android_home
|
|
|
|
|
os.environ['PATH'] = '%s:/usr/local/bin:/usr/bin:/bin' % android_home
|
|
|
|
|
fdroidserver.common.find_apksigner(config)
|
|
|
|
|
self.assertEqual(apksigner, config.get('apksigner'))
|
2021-03-18 09:47:19 +01:00
|
|
|
|
|
|
|
|
|
def test_find_apksigner_prefer_path(self):
|
|
|
|
|
"""apksigner should come from PATH before ANDROID_HOME"""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
|
|
|
|
apksigner = os.path.join(self.tmpdir, 'apksigner')
|
2021-03-18 09:47:19 +01:00
|
|
|
|
with open(apksigner, 'w') as fp:
|
|
|
|
|
fp.write('#!/bin/sh\ndate\n')
|
|
|
|
|
os.chmod(apksigner, 0o0755)
|
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
android_home = os.path.join(self.tmpdir, 'ANDROID_HOME')
|
2021-03-18 09:47:19 +01:00
|
|
|
|
do_not_use = os.path.join(android_home, 'build-tools', '30.0.3', 'apksigner')
|
|
|
|
|
os.makedirs(os.path.dirname(do_not_use))
|
|
|
|
|
with open(do_not_use, 'w') as fp:
|
|
|
|
|
fp.write('#!/bin/sh\ndate\n')
|
|
|
|
|
os.chmod(do_not_use, 0o0755)
|
|
|
|
|
|
|
|
|
|
config = {'sdk_path': android_home}
|
2022-11-25 16:12:01 +01:00
|
|
|
|
with mock.patch.dict(os.environ, clear=True):
|
|
|
|
|
os.environ['ANDROID_HOME'] = android_home
|
|
|
|
|
os.environ['PATH'] = '%s:/usr/local/bin:/usr/bin:/bin' % os.path.dirname(apksigner)
|
|
|
|
|
fdroidserver.common.find_apksigner(config)
|
|
|
|
|
self.assertEqual(apksigner, config.get('apksigner'))
|
2021-03-18 09:47:19 +01:00
|
|
|
|
|
|
|
|
|
def test_find_apksigner_prefer_newest(self):
|
|
|
|
|
"""apksigner should be the newest available in ANDROID_HOME"""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
|
|
|
|
android_home = os.path.join(self.tmpdir, 'ANDROID_HOME')
|
2021-03-18 09:47:19 +01:00
|
|
|
|
|
|
|
|
|
apksigner = os.path.join(android_home, 'build-tools', '30.0.3', 'apksigner')
|
|
|
|
|
os.makedirs(os.path.dirname(apksigner))
|
|
|
|
|
with open(apksigner, 'w') as fp:
|
|
|
|
|
fp.write('#!/bin/sh\necho 30.0.3\n')
|
|
|
|
|
os.chmod(apksigner, 0o0755)
|
|
|
|
|
|
|
|
|
|
do_not_use = os.path.join(android_home, 'build-tools', '29.0.3', 'apksigner')
|
|
|
|
|
os.makedirs(os.path.dirname(do_not_use))
|
|
|
|
|
with open(do_not_use, 'w') as fp:
|
|
|
|
|
fp.write('#!/bin/sh\necho 29.0.3\n')
|
|
|
|
|
os.chmod(do_not_use, 0o0755)
|
|
|
|
|
|
|
|
|
|
config = {'sdk_path': android_home}
|
2022-11-25 16:12:01 +01:00
|
|
|
|
with mock.patch.dict(os.environ, clear=True):
|
|
|
|
|
os.environ['PATH'] = '/fake/path/to/avoid/conflicts'
|
|
|
|
|
fdroidserver.common.find_apksigner(config)
|
|
|
|
|
self.assertEqual(apksigner, config.get('apksigner'))
|
2021-03-18 09:47:19 +01:00
|
|
|
|
|
|
|
|
|
def test_find_apksigner_system_package_android_home(self):
|
2022-06-08 20:00:36 +02:00
|
|
|
|
"""Test that apksigner v30 or newer is found"""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2021-03-18 09:47:19 +01:00
|
|
|
|
android_home = os.getenv('ANDROID_HOME')
|
|
|
|
|
if not android_home or not os.path.isdir(android_home):
|
|
|
|
|
self.skipTest('SKIPPING since ANDROID_HOME (%s) is not a dir!' % android_home)
|
2022-06-08 20:00:36 +02:00
|
|
|
|
build_tools = glob.glob(os.path.join(android_home, 'build-tools', '*', 'apksigner'))
|
|
|
|
|
if not build_tools:
|
2021-03-23 23:09:51 +01:00
|
|
|
|
self.skipTest('SKIPPING since ANDROID_HOME (%s) build-tools has no apksigner!' % android_home)
|
2022-06-08 20:00:36 +02:00
|
|
|
|
min_version = fdroidserver.common.MINIMUM_APKSIGNER_BUILD_TOOLS_VERSION
|
|
|
|
|
version = '0'
|
|
|
|
|
for bt in sorted(build_tools):
|
|
|
|
|
v = bt.split('/')[-2]
|
|
|
|
|
if v == 'debian':
|
|
|
|
|
continue
|
|
|
|
|
if LooseVersion(version) < LooseVersion(v):
|
|
|
|
|
version = v
|
|
|
|
|
if LooseVersion(version) < LooseVersion(min_version):
|
|
|
|
|
self.skipTest('SKIPPING since build-tools %s or higher is required!' % min_version)
|
2021-03-18 09:47:19 +01:00
|
|
|
|
fdroidserver.common.config = {'sdk_path': android_home}
|
2022-11-25 16:12:01 +01:00
|
|
|
|
with mock.patch.dict(os.environ, clear=True):
|
|
|
|
|
os.environ['PATH'] = '/fake/path/to/avoid/conflicts'
|
|
|
|
|
config = fdroidserver.common.read_config()
|
|
|
|
|
fdroidserver.common.find_apksigner(config)
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
os.path.join(android_home, 'build-tools'),
|
|
|
|
|
os.path.dirname(os.path.dirname(config.get('apksigner'))),
|
|
|
|
|
)
|
2021-03-18 09:47:19 +01:00
|
|
|
|
|
2017-11-30 21:10:41 +01:00
|
|
|
|
def test_sign_apk(self):
|
2020-09-09 12:06:21 +02:00
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
2021-03-22 14:51:59 +01:00
|
|
|
|
if 'apksigner' not in config:
|
|
|
|
|
self.skipTest('SKIPPING test_sign_apk, apksigner not installed!')
|
2018-08-07 14:51:42 +02:00
|
|
|
|
|
2017-11-30 21:10:41 +01:00
|
|
|
|
config['keyalias'] = 'sova'
|
|
|
|
|
config['keystorepass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
config['keypass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
config['keystore'] = os.path.join(self.basedir, 'keystore.jks')
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.signindex.config = config
|
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
unsigned = os.path.join(self.testdir, 'urzip-release-unsigned.apk')
|
|
|
|
|
signed = os.path.join(self.testdir, 'urzip-release.apk')
|
|
|
|
|
shutil.copy(os.path.join(self.basedir, 'urzip-release-unsigned.apk'), self.testdir)
|
2017-11-30 21:10:41 +01:00
|
|
|
|
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature(unsigned))
|
|
|
|
|
|
|
|
|
|
fdroidserver.common.sign_apk(unsigned, signed, config['keyalias'])
|
|
|
|
|
self.assertTrue(os.path.isfile(signed))
|
|
|
|
|
self.assertFalse(os.path.isfile(unsigned))
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature(signed))
|
|
|
|
|
|
2017-12-22 17:49:36 +01:00
|
|
|
|
# now sign an APK with minSdkVersion >= 18
|
2022-11-22 17:17:45 +01:00
|
|
|
|
unsigned = os.path.join(self.testdir, 'duplicate.permisssions_9999999-unsigned.apk')
|
|
|
|
|
signed = os.path.join(self.testdir, 'duplicate.permisssions_9999999.apk')
|
2021-06-07 11:49:21 +02:00
|
|
|
|
shutil.copy(
|
|
|
|
|
os.path.join(self.basedir, 'repo', 'duplicate.permisssions_9999999.apk'),
|
|
|
|
|
os.path.join(unsigned),
|
|
|
|
|
)
|
2020-09-09 12:06:21 +02:00
|
|
|
|
fdroidserver.common.apk_strip_v1_signatures(unsigned, strip_manifest=True)
|
2017-12-22 17:49:36 +01:00
|
|
|
|
fdroidserver.common.sign_apk(unsigned, signed, config['keyalias'])
|
|
|
|
|
self.assertTrue(os.path.isfile(signed))
|
|
|
|
|
self.assertFalse(os.path.isfile(unsigned))
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature(signed))
|
2020-09-09 12:06:21 +02:00
|
|
|
|
self.assertEqual('18', fdroidserver.common._get_androguard_APK(signed).get_min_sdk_version())
|
2017-12-22 17:49:36 +01:00
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
shutil.copy(os.path.join(self.basedir, 'minimal_targetsdk_30_unsigned.apk'), self.testdir)
|
|
|
|
|
unsigned = os.path.join(self.testdir, 'minimal_targetsdk_30_unsigned.apk')
|
|
|
|
|
signed = os.path.join(self.testdir, 'minimal_targetsdk_30.apk')
|
2020-09-09 12:06:21 +02:00
|
|
|
|
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature(unsigned))
|
|
|
|
|
fdroidserver.common.sign_apk(unsigned, signed, config['keyalias'])
|
2017-09-12 18:17:46 +02:00
|
|
|
|
|
2020-09-09 12:06:21 +02:00
|
|
|
|
self.assertTrue(os.path.isfile(signed))
|
|
|
|
|
self.assertFalse(os.path.isfile(unsigned))
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature(signed))
|
|
|
|
|
# verify it has a v2 signature
|
|
|
|
|
self.assertTrue(fdroidserver.common._get_androguard_APK(signed).is_signed_v2())
|
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
shutil.copy(os.path.join(self.basedir, 'no_targetsdk_minsdk30_unsigned.apk'), self.testdir)
|
|
|
|
|
unsigned = os.path.join(self.testdir, 'no_targetsdk_minsdk30_unsigned.apk')
|
|
|
|
|
signed = os.path.join(self.testdir, 'no_targetsdk_minsdk30_signed.apk')
|
2020-09-14 11:05:14 +02:00
|
|
|
|
|
|
|
|
|
fdroidserver.common.sign_apk(unsigned, signed, config['keyalias'])
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature(signed))
|
|
|
|
|
self.assertTrue(fdroidserver.common._get_androguard_APK(signed).is_signed_v2())
|
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
shutil.copy(os.path.join(self.basedir, 'no_targetsdk_minsdk1_unsigned.apk'), self.testdir)
|
|
|
|
|
unsigned = os.path.join(self.testdir, 'no_targetsdk_minsdk1_unsigned.apk')
|
|
|
|
|
signed = os.path.join(self.testdir, 'no_targetsdk_minsdk1_signed.apk')
|
2020-09-14 11:05:14 +02:00
|
|
|
|
|
|
|
|
|
self.assertFalse(fdroidserver.common.verify_apk_signature(unsigned))
|
|
|
|
|
fdroidserver.common.sign_apk(unsigned, signed, config['keyalias'])
|
|
|
|
|
|
|
|
|
|
self.assertTrue(os.path.isfile(signed))
|
|
|
|
|
self.assertFalse(os.path.isfile(unsigned))
|
|
|
|
|
self.assertTrue(fdroidserver.common.verify_apk_signature(signed))
|
|
|
|
|
|
2023-02-17 16:30:16 +01:00
|
|
|
|
@unittest.skipIf(os.getuid() == 0, 'This is meaningless when run as root')
|
|
|
|
|
def test_sign_apk_fail(self):
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
if 'apksigner' not in config:
|
|
|
|
|
self.skipTest('SKIPPING test_sign_apk_fail, apksigner not installed!')
|
|
|
|
|
|
|
|
|
|
config['keyalias'] = 'sova'
|
|
|
|
|
config['keystorepass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
config['keypass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
config['keystore'] = os.path.join(self.basedir, 'keystore.jks')
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.signindex.config = config
|
|
|
|
|
|
|
|
|
|
unsigned = os.path.join(self.testdir, 'urzip-release-unsigned.apk')
|
|
|
|
|
signed = os.path.join(self.testdir, 'urzip-release.apk')
|
|
|
|
|
shutil.copy(os.path.join(self.basedir, 'urzip-release-unsigned.apk'), self.testdir)
|
|
|
|
|
|
|
|
|
|
os.chmod(unsigned, 0o000)
|
|
|
|
|
with self.assertRaises(fdroidserver.exception.BuildException):
|
|
|
|
|
fdroidserver.common.sign_apk(unsigned, signed, config['keyalias'])
|
|
|
|
|
os.chmod(unsigned, 0o777)
|
|
|
|
|
self.assertTrue(os.path.isfile(unsigned))
|
|
|
|
|
self.assertFalse(os.path.isfile(signed))
|
|
|
|
|
|
|
|
|
|
def test_sign_apk_corrupt(self):
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
if 'apksigner' not in config:
|
|
|
|
|
self.skipTest('SKIPPING test_sign_apk_corrupt, apksigner not installed!')
|
|
|
|
|
|
|
|
|
|
config['keyalias'] = 'sova'
|
|
|
|
|
config['keystorepass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
config['keypass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
config['keystore'] = os.path.join(self.basedir, 'keystore.jks')
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.signindex.config = config
|
|
|
|
|
|
|
|
|
|
unsigned = os.path.join(self.testdir, 'urzip-release-unsigned.apk')
|
|
|
|
|
signed = os.path.join(self.testdir, 'urzip-release.apk')
|
|
|
|
|
with open(unsigned, 'w') as fp:
|
|
|
|
|
fp.write('this is a corrupt APK')
|
|
|
|
|
|
|
|
|
|
with self.assertRaises(fdroidserver.exception.BuildException):
|
|
|
|
|
fdroidserver.common.sign_apk(unsigned, signed, config['keyalias'])
|
|
|
|
|
self.assertTrue(os.path.isfile(unsigned))
|
|
|
|
|
self.assertFalse(os.path.isfile(signed))
|
|
|
|
|
|
2022-05-23 23:08:16 +02:00
|
|
|
|
@unittest.skipUnless(
|
|
|
|
|
os.path.exists('tests/SystemWebView-repack.apk'), "file too big for sdist"
|
|
|
|
|
)
|
2022-02-21 22:40:22 +01:00
|
|
|
|
def test_resign_apk(self):
|
|
|
|
|
"""When using apksigner, it should resign signed APKs"""
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
if 'apksigner' not in config:
|
|
|
|
|
self.skipTest('SKIPPING test_resign_apk, apksigner not installed!')
|
|
|
|
|
|
|
|
|
|
config['keyalias'] = 'sova'
|
|
|
|
|
config['keystorepass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
config['keypass'] = 'r9aquRHYoI8+dYz6jKrLntQ5/NJNASFBacJh7Jv2BlI='
|
|
|
|
|
config['keystore'] = os.path.join(self.basedir, 'keystore.jks')
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.signindex.config = config
|
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-02-21 22:40:22 +01:00
|
|
|
|
os.mkdir('unsigned')
|
|
|
|
|
os.mkdir('repo')
|
|
|
|
|
|
|
|
|
|
for apk in (
|
|
|
|
|
'org.bitbucket.tickytacky.mirrormirror_4.apk',
|
|
|
|
|
'v2.only.sig_2.apk',
|
|
|
|
|
'SystemWebView-repack.apk',
|
|
|
|
|
):
|
|
|
|
|
original = os.path.join(self.basedir, apk)
|
|
|
|
|
unsigned = os.path.join('unsigned', apk)
|
|
|
|
|
resign = os.path.join('repo', apk)
|
|
|
|
|
shutil.copy(original, unsigned)
|
|
|
|
|
fdroidserver.common.sign_apk(unsigned, resign, config['keyalias'])
|
|
|
|
|
self.assertTrue(
|
|
|
|
|
fdroidserver.common.verify_apk_signature(resign), apk + " verifies"
|
|
|
|
|
)
|
|
|
|
|
self.assertTrue(os.path.isfile(resign))
|
|
|
|
|
self.assertFalse(os.path.isfile(unsigned))
|
|
|
|
|
self.assertNotEqual(
|
|
|
|
|
fdroidserver.common.get_first_signer_certificate(original),
|
|
|
|
|
fdroidserver.common.get_first_signer_certificate(resign)
|
|
|
|
|
)
|
|
|
|
|
|
2020-09-09 12:06:21 +02:00
|
|
|
|
def test_get_apk_id(self):
|
2017-09-12 18:17:46 +02:00
|
|
|
|
config = dict()
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
self._set_build_tools()
|
2020-11-29 09:26:17 +01:00
|
|
|
|
try:
|
2018-08-07 14:51:42 +02:00
|
|
|
|
config['aapt'] = fdroidserver.common.find_sdk_tools_cmd('aapt')
|
2020-11-29 09:26:17 +01:00
|
|
|
|
except fdroidserver.exception.FDroidException:
|
|
|
|
|
pass # aapt is not required if androguard is present
|
2017-09-12 18:17:46 +02:00
|
|
|
|
|
2018-02-22 14:30:39 +01:00
|
|
|
|
testcases = [
|
2022-09-14 03:45:24 +02:00
|
|
|
|
('repo/obb.main.twoversions_1101613.apk', 'obb.main.twoversions', 1101613, '0.1'),
|
|
|
|
|
('org.bitbucket.tickytacky.mirrormirror_1.apk', 'org.bitbucket.tickytacky.mirrormirror', 1, '1.0'),
|
|
|
|
|
('org.bitbucket.tickytacky.mirrormirror_2.apk', 'org.bitbucket.tickytacky.mirrormirror', 2, '1.0.1'),
|
|
|
|
|
('org.bitbucket.tickytacky.mirrormirror_3.apk', 'org.bitbucket.tickytacky.mirrormirror', 3, '1.0.2'),
|
|
|
|
|
('org.bitbucket.tickytacky.mirrormirror_4.apk', 'org.bitbucket.tickytacky.mirrormirror', 4, '1.0.3'),
|
|
|
|
|
('org.dyndns.fules.ck_20.apk', 'org.dyndns.fules.ck', 20, 'v1.6pre2'),
|
|
|
|
|
('urzip.apk', 'info.guardianproject.urzip', 100, '0.1'),
|
|
|
|
|
('urzip-badcert.apk', 'info.guardianproject.urzip', 100, '0.1'),
|
|
|
|
|
('urzip-badsig.apk', 'info.guardianproject.urzip', 100, '0.1'),
|
|
|
|
|
('urzip-release.apk', 'info.guardianproject.urzip', 100, '0.1'),
|
|
|
|
|
('urzip-release-unsigned.apk', 'info.guardianproject.urzip', 100, '0.1'),
|
|
|
|
|
('repo/com.politedroid_3.apk', 'com.politedroid', 3, '1.2'),
|
|
|
|
|
('repo/com.politedroid_4.apk', 'com.politedroid', 4, '1.3'),
|
|
|
|
|
('repo/com.politedroid_5.apk', 'com.politedroid', 5, '1.4'),
|
|
|
|
|
('repo/com.politedroid_6.apk', 'com.politedroid', 6, '1.5'),
|
|
|
|
|
('repo/duplicate.permisssions_9999999.apk', 'duplicate.permisssions', 9999999, ''),
|
|
|
|
|
('repo/info.zwanenburg.caffeinetile_4.apk', 'info.zwanenburg.caffeinetile', 4, '1.3'),
|
|
|
|
|
('repo/obb.main.oldversion_1444412523.apk', 'obb.main.oldversion', 1444412523, '0.1'),
|
|
|
|
|
('repo/obb.mainpatch.current_1619_another-release-key.apk', 'obb.mainpatch.current', 1619, '0.1'),
|
|
|
|
|
('repo/obb.mainpatch.current_1619.apk', 'obb.mainpatch.current', 1619, '0.1'),
|
|
|
|
|
('repo/obb.main.twoversions_1101613.apk', 'obb.main.twoversions', 1101613, '0.1'),
|
|
|
|
|
('repo/obb.main.twoversions_1101615.apk', 'obb.main.twoversions', 1101615, '0.1'),
|
|
|
|
|
('repo/obb.main.twoversions_1101617.apk', 'obb.main.twoversions', 1101617, '0.1'),
|
|
|
|
|
('repo/urzip-; Рахма́, [rɐxˈmanʲɪnəf] سيرجي_رخمانينوف 谢·.apk', 'info.guardianproject.urzip', 100, '0.1'),
|
2018-02-22 14:30:39 +01:00
|
|
|
|
]
|
|
|
|
|
for apkfilename, appid, versionCode, versionName in testcases:
|
2020-10-21 19:51:32 +02:00
|
|
|
|
a, vc, vn = fdroidserver.common.get_apk_id(apkfilename)
|
|
|
|
|
self.assertEqual(appid, a, 'androguard appid parsing failed for ' + apkfilename)
|
|
|
|
|
self.assertEqual(versionName, vn, 'androguard versionName parsing failed for ' + apkfilename)
|
|
|
|
|
self.assertEqual(versionCode, vc, 'androguard versionCode parsing failed for ' + apkfilename)
|
2018-05-03 13:33:37 +02:00
|
|
|
|
if 'aapt' in config:
|
|
|
|
|
a, vc, vn = fdroidserver.common.get_apk_id_aapt(apkfilename)
|
2018-09-18 15:29:24 +02:00
|
|
|
|
self.assertEqual(appid, a, 'aapt appid parsing failed for ' + apkfilename)
|
|
|
|
|
self.assertEqual(versionCode, vc, 'aapt versionCode parsing failed for ' + apkfilename)
|
|
|
|
|
self.assertEqual(versionName, vn, 'aapt versionName parsing failed for ' + apkfilename)
|
2017-09-12 18:17:46 +02:00
|
|
|
|
|
2022-10-05 16:46:26 +02:00
|
|
|
|
def test_get_apk_id_bad_apk(self):
|
|
|
|
|
"""get_apk_id should never return None on error, only raise exceptions"""
|
|
|
|
|
with self.assertRaises(KeyError):
|
|
|
|
|
fdroidserver.common.get_apk_id('Norway_bouvet_europe_2.obf.zip')
|
|
|
|
|
shutil.copy('Norway_bouvet_europe_2.obf.zip', self.tmpdir)
|
|
|
|
|
os.chdir(self.tmpdir)
|
|
|
|
|
with ZipFile('Norway_bouvet_europe_2.obf.zip', 'a') as zipfp:
|
|
|
|
|
zipfp.writestr('AndroidManifest.xml', 'not a manifest')
|
|
|
|
|
with self.assertRaises(KeyError):
|
|
|
|
|
fdroidserver.common.get_apk_id('Norway_bouvet_europe_2.obf.zip')
|
|
|
|
|
|
2022-04-27 13:18:04 +02:00
|
|
|
|
def test_get_apk_id_bad_path(self):
|
2017-09-12 18:17:46 +02:00
|
|
|
|
with self.assertRaises(FDroidException):
|
2018-05-03 13:33:37 +02:00
|
|
|
|
fdroidserver.common.get_apk_id('nope')
|
2017-09-12 18:17:46 +02:00
|
|
|
|
|
2022-04-27 13:18:04 +02:00
|
|
|
|
def test_get_apk_id_api_call(self):
|
|
|
|
|
self.assertEqual(
|
2022-09-14 03:45:24 +02:00
|
|
|
|
('info.guardianproject.urzip', 100, '0.1'),
|
2022-04-27 13:18:04 +02:00
|
|
|
|
fdroidserver.common.get_apk_id('urzip.apk'),
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
def test_get_apk_id_bad_zip(self):
|
|
|
|
|
os.chdir(self.tmpdir)
|
|
|
|
|
badzip = 'badzip.apk'
|
|
|
|
|
with open(badzip, 'w') as fp:
|
|
|
|
|
fp.write('not a ZIP')
|
|
|
|
|
with self.assertRaises(BadZipFile):
|
|
|
|
|
fdroidserver.common.get_apk_id(badzip)
|
|
|
|
|
|
2018-09-17 23:12:51 +02:00
|
|
|
|
def test_get_apk_id_aapt_regex(self):
|
|
|
|
|
files = glob.glob(os.path.join(self.basedir, 'build-tools', '[1-9]*.*', '*.txt'))
|
|
|
|
|
self.assertNotEqual(0, len(files))
|
|
|
|
|
for f in files:
|
|
|
|
|
appid, versionCode = os.path.splitext(os.path.basename(f))[0][12:].split('_')
|
2021-06-14 15:38:37 +02:00
|
|
|
|
with open(f, encoding='utf-8') as fp:
|
2018-09-17 23:12:51 +02:00
|
|
|
|
m = fdroidserver.common.APK_ID_TRIPLET_REGEX.match(fp.read())
|
|
|
|
|
if m:
|
|
|
|
|
self.assertEqual(appid, m.group(1))
|
|
|
|
|
self.assertEqual(versionCode, m.group(2))
|
|
|
|
|
else:
|
|
|
|
|
self.fail('could not parse aapt output: {}'.format(f))
|
|
|
|
|
|
2018-09-17 22:44:53 +02:00
|
|
|
|
def test_get_native_code(self):
|
|
|
|
|
testcases = [
|
|
|
|
|
('repo/obb.main.twoversions_1101613.apk', []),
|
|
|
|
|
('org.bitbucket.tickytacky.mirrormirror_1.apk', []),
|
|
|
|
|
('org.bitbucket.tickytacky.mirrormirror_2.apk', []),
|
|
|
|
|
('org.bitbucket.tickytacky.mirrormirror_3.apk', []),
|
|
|
|
|
('org.bitbucket.tickytacky.mirrormirror_4.apk', []),
|
|
|
|
|
('org.dyndns.fules.ck_20.apk', ['arm64-v8a', 'armeabi', 'armeabi-v7a', 'mips', 'mips64', 'x86', 'x86_64']),
|
|
|
|
|
('urzip.apk', []),
|
|
|
|
|
('urzip-badcert.apk', []),
|
|
|
|
|
('urzip-badsig.apk', []),
|
|
|
|
|
('urzip-release.apk', []),
|
|
|
|
|
('urzip-release-unsigned.apk', []),
|
|
|
|
|
('repo/com.politedroid_3.apk', []),
|
|
|
|
|
('repo/com.politedroid_4.apk', []),
|
|
|
|
|
('repo/com.politedroid_5.apk', []),
|
|
|
|
|
('repo/com.politedroid_6.apk', []),
|
|
|
|
|
('repo/duplicate.permisssions_9999999.apk', []),
|
|
|
|
|
('repo/info.zwanenburg.caffeinetile_4.apk', []),
|
|
|
|
|
('repo/obb.main.oldversion_1444412523.apk', []),
|
|
|
|
|
('repo/obb.mainpatch.current_1619_another-release-key.apk', []),
|
|
|
|
|
('repo/obb.mainpatch.current_1619.apk', []),
|
|
|
|
|
('repo/obb.main.twoversions_1101613.apk', []),
|
|
|
|
|
('repo/obb.main.twoversions_1101615.apk', []),
|
|
|
|
|
('repo/obb.main.twoversions_1101617.apk', []),
|
|
|
|
|
('repo/urzip-; Рахма́, [rɐxˈmanʲɪnəf] سيرجي_رخمانينوف 谢·.apk', []),
|
|
|
|
|
]
|
|
|
|
|
for apkfilename, native_code in testcases:
|
|
|
|
|
nc = fdroidserver.common.get_native_code(apkfilename)
|
|
|
|
|
self.assertEqual(native_code, nc)
|
|
|
|
|
|
2020-09-09 12:06:21 +02:00
|
|
|
|
def test_get_sdkversions_androguard(self):
|
|
|
|
|
"""This is a sanity test that androguard isn't broken"""
|
2021-06-14 15:38:37 +02:00
|
|
|
|
|
2020-09-09 12:06:21 +02:00
|
|
|
|
def get_minSdkVersion(apkfile):
|
|
|
|
|
apk = fdroidserver.common._get_androguard_APK(apkfile)
|
2020-09-14 11:05:14 +02:00
|
|
|
|
return fdroidserver.common.get_min_sdk_version(apk)
|
2020-09-09 12:06:21 +02:00
|
|
|
|
|
|
|
|
|
def get_targetSdkVersion(apkfile):
|
|
|
|
|
apk = fdroidserver.common._get_androguard_APK(apkfile)
|
2020-09-14 11:05:14 +02:00
|
|
|
|
return apk.get_effective_target_sdk_version()
|
2020-09-09 12:06:21 +02:00
|
|
|
|
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('bad-unicode-πÇÇ现代通用字-български-عربي1.apk'))
|
|
|
|
|
self.assertEqual(14, get_minSdkVersion('org.bitbucket.tickytacky.mirrormirror_1.apk'))
|
|
|
|
|
self.assertEqual(14, get_minSdkVersion('org.bitbucket.tickytacky.mirrormirror_2.apk'))
|
|
|
|
|
self.assertEqual(14, get_minSdkVersion('org.bitbucket.tickytacky.mirrormirror_3.apk'))
|
|
|
|
|
self.assertEqual(14, get_minSdkVersion('org.bitbucket.tickytacky.mirrormirror_4.apk'))
|
|
|
|
|
self.assertEqual(7, get_minSdkVersion('org.dyndns.fules.ck_20.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('urzip.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('urzip-badcert.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('urzip-badsig.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('urzip-release.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('urzip-release-unsigned.apk'))
|
|
|
|
|
self.assertEqual(3, get_minSdkVersion('repo/com.politedroid_3.apk'))
|
|
|
|
|
self.assertEqual(3, get_minSdkVersion('repo/com.politedroid_4.apk'))
|
|
|
|
|
self.assertEqual(3, get_minSdkVersion('repo/com.politedroid_5.apk'))
|
|
|
|
|
self.assertEqual(14, get_minSdkVersion('repo/com.politedroid_6.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('repo/obb.main.oldversion_1444412523.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('repo/obb.mainpatch.current_1619_another-release-key.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('repo/obb.mainpatch.current_1619.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('repo/obb.main.twoversions_1101613.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('repo/obb.main.twoversions_1101615.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('repo/obb.main.twoversions_1101617.apk'))
|
|
|
|
|
self.assertEqual(4, get_minSdkVersion('repo/urzip-; Рахма́, [rɐxˈmanʲɪnəf] سيرجي_رخمانينوف 谢·.apk'))
|
|
|
|
|
|
|
|
|
|
self.assertEqual(30, get_targetSdkVersion('minimal_targetsdk_30_unsigned.apk'))
|
2020-09-14 11:05:14 +02:00
|
|
|
|
self.assertEqual(1, get_targetSdkVersion('no_targetsdk_minsdk1_unsigned.apk'))
|
|
|
|
|
self.assertEqual(30, get_targetSdkVersion('no_targetsdk_minsdk30_unsigned.apk'))
|
2017-11-30 21:10:41 +01:00
|
|
|
|
|
2017-09-23 13:10:52 +02:00
|
|
|
|
def test_apk_release_name(self):
|
|
|
|
|
appid, vercode, sigfp = fdroidserver.common.apk_parse_release_filename('com.serwylo.lexica_905.apk')
|
|
|
|
|
self.assertEqual(appid, 'com.serwylo.lexica')
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(vercode, 905)
|
2017-09-23 13:10:52 +02:00
|
|
|
|
self.assertEqual(sigfp, None)
|
|
|
|
|
|
|
|
|
|
appid, vercode, sigfp = fdroidserver.common.apk_parse_release_filename('com.serwylo.lexica_905_c82e0f6.apk')
|
|
|
|
|
self.assertEqual(appid, 'com.serwylo.lexica')
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(vercode, 905)
|
2017-09-23 13:10:52 +02:00
|
|
|
|
self.assertEqual(sigfp, 'c82e0f6')
|
|
|
|
|
|
|
|
|
|
appid, vercode, sigfp = fdroidserver.common.apk_parse_release_filename('beverly_hills-90210.apk')
|
|
|
|
|
self.assertEqual(appid, None)
|
|
|
|
|
self.assertEqual(vercode, None)
|
|
|
|
|
self.assertEqual(sigfp, None)
|
|
|
|
|
|
2017-07-04 10:53:16 +02:00
|
|
|
|
def test_metadata_find_developer_signature(self):
|
|
|
|
|
sig = fdroidserver.common.metadata_find_developer_signature('org.smssecure.smssecure')
|
|
|
|
|
self.assertEqual('b30bb971af0d134866e158ec748fcd553df97c150f58b0a963190bbafbeb0868', sig)
|
|
|
|
|
|
2018-08-29 17:27:04 +02:00
|
|
|
|
def test_parse_xml(self):
|
2023-02-15 20:25:48 +01:00
|
|
|
|
manifest = Path('source-files/fdroid/fdroidclient/AndroidManifest.xml')
|
2018-08-29 17:27:04 +02:00
|
|
|
|
parsed = fdroidserver.common.parse_xml(manifest)
|
|
|
|
|
self.assertIsNotNone(parsed)
|
|
|
|
|
self.assertEqual(str(type(parsed)), "<class 'xml.etree.ElementTree.Element'>")
|
|
|
|
|
|
2017-12-23 14:36:38 +01:00
|
|
|
|
def test_parse_androidmanifests(self):
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.id = 'org.fdroid.fdroid'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/fdroid/fdroidclient/AndroidManifest.xml'),
|
|
|
|
|
Path('source-files/fdroid/fdroidclient/build.gradle'),
|
2017-12-23 14:36:38 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('0.94-test', 940, 'org.fdroid.fdroid'),
|
2017-12-23 14:36:38 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2020-01-31 23:49:50 +01:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.AutoName = 'android-chat'
|
|
|
|
|
app.RepoType = 'git'
|
|
|
|
|
url = 'https://github.com/wildfirechat/android-chat.git'
|
|
|
|
|
app.SourceCode = url.rstrip('.git')
|
|
|
|
|
app.Repo = url
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/cn.wildfirechat.chat/avenginekit/build.gradle'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/build.gradle'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/client/build.gradle'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/client/src/main/AndroidManifest.xml'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/emojilibrary/build.gradle'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/gradle/build_libraries.gradle'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/imagepicker/build.gradle'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/mars-core-release/build.gradle'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/push/build.gradle'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/settings.gradle'),
|
|
|
|
|
Path('source-files/cn.wildfirechat.chat/chat/build.gradle'),
|
2020-01-31 23:49:50 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('0.6.9', 23, 'cn.wildfirechat.chat'),
|
2020-01-31 23:49:50 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2020-02-03 21:13:26 +01:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.Repo = 'https://github.com/Integreight/1Sheeld-Android-App'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.integreight.onesheeld/pagerIndicator/src/main/AndroidManifest.xml'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/pagerIndicator/build.gradle'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/oneSheeld/src/main/AndroidManifest.xml'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/oneSheeld/build.gradle'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/localeapi/src/main/AndroidManifest.xml'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/localeapi/build.gradle'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/build.gradle'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/settings.gradle'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/quickReturnHeader/src/main/AndroidManifest.xml'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/quickReturnHeader/build.gradle'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/pullToRefreshlibrary/src/main/AndroidManifest.xml'),
|
|
|
|
|
Path('source-files/com.integreight.onesheeld/pullToRefreshlibrary/build.gradle'),
|
2020-02-03 21:13:26 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('1.9.0', 170521, 'com.integreight.onesheeld'),
|
2020-02-03 21:13:26 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2021-03-19 13:14:08 +01:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.id = 'dev.patrickgold.florisboard'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/dev.patrickgold.florisboard/app/build.gradle.kts'),
|
2021-03-19 13:14:08 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('0.3.10', 29, 'dev.patrickgold.florisboard'),
|
2021-03-19 13:14:08 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2022-07-25 08:52:57 +02:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.id = 'com.ubergeek42.WeechatAndroid'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.ubergeek42.WeechatAndroid/app/build.gradle.kts'),
|
|
|
|
|
Path('source-files/com.ubergeek42.WeechatAndroid/app/src/main/res/values/strings.xml'),
|
2022-07-25 08:52:57 +02:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('1.8.1', 10801, None),
|
2022-07-25 08:52:57 +02:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2019-07-23 22:44:45 +02:00
|
|
|
|
def test_parse_androidmanifests_ignore(self):
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.id = 'org.fdroid.fdroid'
|
|
|
|
|
app.UpdateCheckIgnore = '-test'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/fdroid/fdroidclient/AndroidManifest.xml'),
|
|
|
|
|
Path('source-files/fdroid/fdroidclient/build.gradle'),
|
2019-07-23 22:44:45 +02:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
|
|
|
|
self.assertEqual(('Ignore', None, 'org.fdroid.fdroid'),
|
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2017-12-23 14:36:38 +01:00
|
|
|
|
def test_parse_androidmanifests_with_flavor(self):
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['devVersion']
|
eliminate app.builds everywhere, it should be app['Builds']
The .txt format was the last place where the lowercase "builds" was used,
this converts references everywhere to be "Builds". This makes it possible
to load metadata YAML files with any YAML parser, then have it possible to
use fdroidserver methods on that data, like metadata.write_metadata().
The test files in tests/metadata/dump/*.yaml were manually edited by cutting
the builds: block and putting it the sort order for Builds: so the contents
should be unchanged.
```
sed -i \
-e 's/app\.builds/app.get('Builds', \[\])/g' \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\])/app.get('Builds', \[\])/g" \
-e "s/app\.get('Builds', \[\])\.append/app\['Builds'\].append/g" \
-e "s/app\['builds'\]/app.get('Builds', [])/g" \
*/*.*
```
2020-12-09 16:01:21 +01:00
|
|
|
|
app['Builds'] = [build]
|
2017-12-23 14:36:38 +01:00
|
|
|
|
app.id = 'org.fdroid.fdroid.dev'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/fdroid/fdroidclient/AndroidManifest.xml'),
|
|
|
|
|
Path('source-files/fdroid/fdroidclient/build.gradle'),
|
2017-12-23 14:36:38 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('0.95-dev', 949, 'org.fdroid.fdroid.dev'),
|
2017-12-23 14:36:38 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['free']
|
eliminate app.builds everywhere, it should be app['Builds']
The .txt format was the last place where the lowercase "builds" was used,
this converts references everywhere to be "Builds". This makes it possible
to load metadata YAML files with any YAML parser, then have it possible to
use fdroidserver methods on that data, like metadata.write_metadata().
The test files in tests/metadata/dump/*.yaml were manually edited by cutting
the builds: block and putting it the sort order for Builds: so the contents
should be unchanged.
```
sed -i \
-e 's/app\.builds/app.get('Builds', \[\])/g' \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\])/app.get('Builds', \[\])/g" \
-e "s/app\.get('Builds', \[\])\.append/app\['Builds'\].append/g" \
-e "s/app\['builds'\]/app.get('Builds', [])/g" \
*/*.*
```
2020-12-09 16:01:21 +01:00
|
|
|
|
app['Builds'] = [build]
|
2017-12-23 14:36:38 +01:00
|
|
|
|
app.id = 'eu.siacs.conversations'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/eu.siacs.conversations/build.gradle'),
|
2017-12-23 14:36:38 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('1.23.1', 245, 'eu.siacs.conversations'),
|
2017-12-23 14:36:38 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2017-12-24 11:55:56 +01:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['generic']
|
eliminate app.builds everywhere, it should be app['Builds']
The .txt format was the last place where the lowercase "builds" was used,
this converts references everywhere to be "Builds". This makes it possible
to load metadata YAML files with any YAML parser, then have it possible to
use fdroidserver methods on that data, like metadata.write_metadata().
The test files in tests/metadata/dump/*.yaml were manually edited by cutting
the builds: block and putting it the sort order for Builds: so the contents
should be unchanged.
```
sed -i \
-e 's/app\.builds/app.get('Builds', \[\])/g' \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\])/app.get('Builds', \[\])/g" \
-e "s/app\.get('Builds', \[\])\.append/app\['Builds'\].append/g" \
-e "s/app\['builds'\]/app.get('Builds', [])/g" \
*/*.*
```
2020-12-09 16:01:21 +01:00
|
|
|
|
app['Builds'] = [build]
|
2017-12-24 11:55:56 +01:00
|
|
|
|
app.id = 'com.nextcloud.client'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.nextcloud.client/build.gradle'),
|
2017-12-24 11:55:56 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('2.0.0', 20000099, 'com.nextcloud.client'),
|
2017-12-24 11:55:56 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['versionDev']
|
eliminate app.builds everywhere, it should be app['Builds']
The .txt format was the last place where the lowercase "builds" was used,
this converts references everywhere to be "Builds". This makes it possible
to load metadata YAML files with any YAML parser, then have it possible to
use fdroidserver methods on that data, like metadata.write_metadata().
The test files in tests/metadata/dump/*.yaml were manually edited by cutting
the builds: block and putting it the sort order for Builds: so the contents
should be unchanged.
```
sed -i \
-e 's/app\.builds/app.get('Builds', \[\])/g' \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\])/app.get('Builds', \[\])/g" \
-e "s/app\.get('Builds', \[\])\.append/app\['Builds'\].append/g" \
-e "s/app\['builds'\]/app.get('Builds', [])/g" \
*/*.*
```
2020-12-09 16:01:21 +01:00
|
|
|
|
app['Builds'] = [build]
|
2017-12-24 11:55:56 +01:00
|
|
|
|
app.id = 'com.nextcloud.android.beta'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.nextcloud.client/build.gradle'),
|
2017-12-24 11:55:56 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('20171223', 20171223, 'com.nextcloud.android.beta'),
|
2017-12-24 11:55:56 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['standard']
|
eliminate app.builds everywhere, it should be app['Builds']
The .txt format was the last place where the lowercase "builds" was used,
this converts references everywhere to be "Builds". This makes it possible
to load metadata YAML files with any YAML parser, then have it possible to
use fdroidserver methods on that data, like metadata.write_metadata().
The test files in tests/metadata/dump/*.yaml were manually edited by cutting
the builds: block and putting it the sort order for Builds: so the contents
should be unchanged.
```
sed -i \
-e 's/app\.builds/app.get('Builds', \[\])/g' \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\])/app.get('Builds', \[\])/g" \
-e "s/app\.get('Builds', \[\])\.append/app\['Builds'\].append/g" \
-e "s/app\['builds'\]/app.get('Builds', [])/g" \
*/*.*
```
2020-12-09 16:01:21 +01:00
|
|
|
|
app['Builds'] = [build]
|
2017-12-24 11:55:56 +01:00
|
|
|
|
app.id = 'at.bitfire.davdroid'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/at.bitfire.davdroid/build.gradle'),
|
2017-12-24 11:55:56 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('1.9.8.1-ose', 197, 'at.bitfire.davdroid'),
|
2017-12-24 11:55:56 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2018-03-26 19:45:06 +02:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['libre']
|
eliminate app.builds everywhere, it should be app['Builds']
The .txt format was the last place where the lowercase "builds" was used,
this converts references everywhere to be "Builds". This makes it possible
to load metadata YAML files with any YAML parser, then have it possible to
use fdroidserver methods on that data, like metadata.write_metadata().
The test files in tests/metadata/dump/*.yaml were manually edited by cutting
the builds: block and putting it the sort order for Builds: so the contents
should be unchanged.
```
sed -i \
-e 's/app\.builds/app.get('Builds', \[\])/g' \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\])/app.get('Builds', \[\])/g" \
-e "s/app\.get('Builds', \[\])\.append/app\['Builds'\].append/g" \
-e "s/app\['builds'\]/app.get('Builds', [])/g" \
*/*.*
```
2020-12-09 16:01:21 +01:00
|
|
|
|
app['Builds'] = [build]
|
2018-03-26 19:45:06 +02:00
|
|
|
|
app.id = 'com.kunzisoft.fdroidtest.applicationidsuffix.libre'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.kunzisoft.testcase/build.gradle'),
|
2018-03-26 19:45:06 +02:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('1.0-libre', 1, 'com.kunzisoft.fdroidtest.applicationidsuffix.libre'),
|
2018-03-26 19:45:06 +02:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['pro']
|
eliminate app.builds everywhere, it should be app['Builds']
The .txt format was the last place where the lowercase "builds" was used,
this converts references everywhere to be "Builds". This makes it possible
to load metadata YAML files with any YAML parser, then have it possible to
use fdroidserver methods on that data, like metadata.write_metadata().
The test files in tests/metadata/dump/*.yaml were manually edited by cutting
the builds: block and putting it the sort order for Builds: so the contents
should be unchanged.
```
sed -i \
-e 's/app\.builds/app.get('Builds', \[\])/g' \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\])/app.get('Builds', \[\])/g" \
-e "s/app\.get('Builds', \[\])\.append/app\['Builds'\].append/g" \
-e "s/app\['builds'\]/app.get('Builds', [])/g" \
*/*.*
```
2020-12-09 16:01:21 +01:00
|
|
|
|
app['Builds'] = [build]
|
2018-03-26 19:45:06 +02:00
|
|
|
|
app.id = 'com.kunzisoft.fdroidtest.applicationidsuffix.pro'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.kunzisoft.testcase/build.gradle'),
|
2018-03-26 19:45:06 +02:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('20180430-pro', 20180430, 'com.kunzisoft.fdroidtest.applicationidsuffix.pro'),
|
2018-03-26 19:45:06 +02:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['free']
|
eliminate app.builds everywhere, it should be app['Builds']
The .txt format was the last place where the lowercase "builds" was used,
this converts references everywhere to be "Builds". This makes it possible
to load metadata YAML files with any YAML parser, then have it possible to
use fdroidserver methods on that data, like metadata.write_metadata().
The test files in tests/metadata/dump/*.yaml were manually edited by cutting
the builds: block and putting it the sort order for Builds: so the contents
should be unchanged.
```
sed -i \
-e 's/app\.builds/app.get('Builds', \[\])/g' \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\])/app.get('Builds', \[\])/g" \
-e "s/app\.get('Builds', \[\])\.append/app\['Builds'\].append/g" \
-e "s/app\['builds'\]/app.get('Builds', [])/g" \
*/*.*
```
2020-12-09 16:01:21 +01:00
|
|
|
|
app['Builds'] = [build]
|
2018-03-26 19:45:06 +02:00
|
|
|
|
app.id = 'com.kunzisoft.fdroidtest.applicationidsuffix'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.kunzisoft.testcase/build.gradle'),
|
2018-03-26 19:45:06 +02:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('1.0-free', 1, 'com.kunzisoft.fdroidtest.applicationidsuffix'),
|
2018-03-26 19:45:06 +02:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2020-11-26 17:47:04 +01:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['underscore']
|
eliminate app.builds everywhere, it should be app['Builds']
The .txt format was the last place where the lowercase "builds" was used,
this converts references everywhere to be "Builds". This makes it possible
to load metadata YAML files with any YAML parser, then have it possible to
use fdroidserver methods on that data, like metadata.write_metadata().
The test files in tests/metadata/dump/*.yaml were manually edited by cutting
the builds: block and putting it the sort order for Builds: so the contents
should be unchanged.
```
sed -i \
-e 's/app\.builds/app.get('Builds', \[\])/g' \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\]) =/app\['Builds'] =/g" \
-e "s/app\.get(Builds, \[\])/app.get('Builds', \[\])/g" \
-e "s/app\.get('Builds', \[\])\.append/app\['Builds'\].append/g" \
-e "s/app\['builds'\]/app.get('Builds', [])/g" \
*/*.*
```
2020-12-09 16:01:21 +01:00
|
|
|
|
app['Builds'] = [build]
|
2020-11-26 17:47:04 +01:00
|
|
|
|
app.id = 'com.kunzisoft.fdroidtest.applicationidsuffix.underscore'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.kunzisoft.testcase/build.gradle'),
|
2020-11-26 17:47:04 +01:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('20180430-underscore', 20180430, 'com.kunzisoft.fdroidtest.applicationidsuffix.underscore'),
|
2020-11-26 17:47:04 +01:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2021-06-09 10:34:21 +02:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['underscore_first']
|
|
|
|
|
app['Builds'] = [build]
|
|
|
|
|
app.id = 'com.kunzisoft.fdroidtest.applicationidsuffix.underscore_first'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.kunzisoft.testcase/build.gradle'),
|
2021-06-09 10:34:21 +02:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('1.0', 1, 'com.kunzisoft.fdroidtest.applicationidsuffix.underscore_first'),
|
2021-06-09 10:34:21 +02:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2021-06-12 23:59:18 +02:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['fdroid']
|
|
|
|
|
app['Builds'] = [build]
|
|
|
|
|
app.id = 'com.github.jameshnsears.quoteunquote'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.github.jameshnsears.quoteunquote/build.gradle'),
|
2021-06-12 23:59:18 +02:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('2.5.2-fdroid', 73, 'com.github.jameshnsears.quoteunquote'),
|
2021-06-12 23:59:18 +02:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2021-06-13 00:49:41 +02:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['fdroidFlavor']
|
|
|
|
|
app['Builds'] = [build]
|
|
|
|
|
app.id = 'com.jens.automation2'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/com.jens.automation2/build.gradle'),
|
2021-06-13 00:49:41 +02:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('1.6.34-fdroid', 105, 'com.jens.automation2'),
|
2021-06-13 00:49:41 +02:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2021-07-24 20:28:50 +02:00
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.gradle = ['VAR', 'prod']
|
|
|
|
|
app['Builds'] = [build]
|
|
|
|
|
app.id = 'de.varengold.activeTAN'
|
|
|
|
|
paths = [
|
2023-02-15 20:25:48 +01:00
|
|
|
|
Path('source-files/de.varengold.activeTAN/build.gradle'),
|
2021-07-24 20:28:50 +02:00
|
|
|
|
]
|
|
|
|
|
for path in paths:
|
|
|
|
|
self.assertTrue(os.path.isfile(path))
|
2022-09-14 03:45:24 +02:00
|
|
|
|
self.assertEqual(('2021-06-30', 34, 'de.varengold.activeTAN'),
|
2021-07-24 20:28:50 +02:00
|
|
|
|
fdroidserver.common.parse_androidmanifests(paths, app))
|
|
|
|
|
|
2020-02-26 17:07:12 +01:00
|
|
|
|
def test_get_all_gradle_and_manifests(self):
|
2021-04-07 12:54:20 +02:00
|
|
|
|
"""Test whether the function works with relative and absolute paths"""
|
2021-06-08 12:33:22 +02:00
|
|
|
|
a = fdroidserver.common.get_all_gradle_and_manifests(Path('source-files/cn.wildfirechat.chat'))
|
2020-02-26 17:07:12 +01:00
|
|
|
|
paths = [
|
2021-06-08 12:33:22 +02:00
|
|
|
|
'avenginekit/build.gradle',
|
|
|
|
|
'build.gradle',
|
|
|
|
|
'chat/build.gradle',
|
|
|
|
|
'client/build.gradle',
|
|
|
|
|
'client/src/main/AndroidManifest.xml',
|
|
|
|
|
'emojilibrary/build.gradle',
|
|
|
|
|
'gradle/build_libraries.gradle',
|
|
|
|
|
'imagepicker/build.gradle',
|
|
|
|
|
'mars-core-release/build.gradle',
|
|
|
|
|
'push/build.gradle',
|
|
|
|
|
'settings.gradle',
|
2020-02-26 17:07:12 +01:00
|
|
|
|
]
|
2021-06-08 12:33:22 +02:00
|
|
|
|
paths = [Path('source-files/cn.wildfirechat.chat') / path for path in paths]
|
2020-02-26 17:07:12 +01:00
|
|
|
|
self.assertEqual(sorted(paths), sorted(a))
|
|
|
|
|
|
2021-06-08 12:33:22 +02:00
|
|
|
|
abspath = Path(self.basedir) / 'source-files/realm'
|
2021-04-07 12:54:20 +02:00
|
|
|
|
p = fdroidserver.common.get_all_gradle_and_manifests(abspath)
|
|
|
|
|
self.assertEqual(1, len(p))
|
2023-02-15 20:25:48 +01:00
|
|
|
|
self.assertTrue(p[0].is_relative_to(abspath))
|
2021-04-07 12:54:20 +02:00
|
|
|
|
|
2020-02-26 17:07:12 +01:00
|
|
|
|
def test_get_gradle_subdir(self):
|
|
|
|
|
subdirs = {
|
|
|
|
|
'cn.wildfirechat.chat': 'chat',
|
|
|
|
|
'com.anpmech.launcher': 'app',
|
|
|
|
|
'org.tasks': 'app',
|
|
|
|
|
'ut.ewh.audiometrytest': 'app',
|
2021-11-30 09:28:17 +01:00
|
|
|
|
'org.noise_planet.noisecapture': 'app',
|
2020-02-26 17:07:12 +01:00
|
|
|
|
}
|
2021-06-08 12:33:22 +02:00
|
|
|
|
for k, v in subdirs.items():
|
|
|
|
|
build_dir = Path('source-files') / k
|
2020-02-26 17:07:12 +01:00
|
|
|
|
paths = fdroidserver.common.get_all_gradle_and_manifests(build_dir)
|
|
|
|
|
logging.info(paths)
|
|
|
|
|
subdir = fdroidserver.common.get_gradle_subdir(build_dir, paths)
|
2021-06-08 12:33:22 +02:00
|
|
|
|
self.assertEqual(v, str(subdir))
|
2020-02-26 17:07:12 +01:00
|
|
|
|
|
2020-04-25 17:22:48 +02:00
|
|
|
|
def test_parse_srclib_spec_good(self):
|
|
|
|
|
self.assertEqual(fdroidserver.common.parse_srclib_spec('osmand-external-skia@android/oreo'),
|
|
|
|
|
('osmand-external-skia', 'android/oreo', None, None))
|
|
|
|
|
self.assertEqual(fdroidserver.common.parse_srclib_spec('1:appcompat@v7'),
|
|
|
|
|
('appcompat', 'v7', '1', None))
|
|
|
|
|
self.assertEqual(fdroidserver.common.parse_srclib_spec('1:Support/v7/appcompat@android-4.4_r1.1'),
|
|
|
|
|
('Support', 'android-4.4_r1.1', '1', 'v7/appcompat'))
|
|
|
|
|
|
|
|
|
|
def test_parse_srclib_spec_bad(self):
|
|
|
|
|
with self.assertRaises(MetaDataException):
|
|
|
|
|
self.assertEqual(fdroidserver.common.parse_srclib_spec(None))
|
|
|
|
|
with self.assertRaises(MetaDataException):
|
|
|
|
|
self.assertEqual(fdroidserver.common.parse_srclib_spec('no-ref'))
|
|
|
|
|
with self.assertRaises(MetaDataException):
|
|
|
|
|
self.assertEqual(fdroidserver.common.parse_srclib_spec('@multi@at-signs@'))
|
|
|
|
|
|
2019-10-23 12:23:37 +02:00
|
|
|
|
def test_remove_signing_keys(self):
|
2021-06-07 11:49:21 +02:00
|
|
|
|
shutil.copytree(
|
|
|
|
|
os.path.join(self.basedir, 'source-files'),
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.path.join(self.tmpdir, 'source-files'),
|
2021-06-07 11:49:21 +02:00
|
|
|
|
)
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2019-10-23 12:23:37 +02:00
|
|
|
|
with_signingConfigs = [
|
|
|
|
|
'source-files/com.seafile.seadroid2/app/build.gradle',
|
|
|
|
|
'source-files/eu.siacs.conversations/build.gradle',
|
|
|
|
|
'source-files/info.guardianproject.ripple/build.gradle',
|
|
|
|
|
'source-files/open-keychain/open-keychain/build.gradle',
|
|
|
|
|
'source-files/open-keychain/open-keychain/OpenKeychain/build.gradle',
|
2020-02-13 22:28:39 +01:00
|
|
|
|
'source-files/org.tasks/app/build.gradle.kts',
|
2019-10-23 12:23:37 +02:00
|
|
|
|
'source-files/osmandapp/osmand/build.gradle',
|
|
|
|
|
'source-files/ut.ewh.audiometrytest/app/build.gradle',
|
|
|
|
|
]
|
|
|
|
|
for f in with_signingConfigs:
|
|
|
|
|
build_dir = os.path.join(*f.split(os.sep)[:2])
|
|
|
|
|
if not os.path.isdir(build_dir):
|
|
|
|
|
continue
|
|
|
|
|
fdroidserver.common.remove_signing_keys(build_dir)
|
|
|
|
|
fromfile = os.path.join(self.basedir, f)
|
|
|
|
|
with open(f) as fp:
|
|
|
|
|
content = fp.read()
|
|
|
|
|
if 'signingConfig' in content:
|
|
|
|
|
with open(f) as fp:
|
|
|
|
|
b = fp.readlines()
|
|
|
|
|
with open(fromfile) as fp:
|
|
|
|
|
a = fp.readlines()
|
|
|
|
|
diff = difflib.unified_diff(a, b, fromfile, f)
|
|
|
|
|
sys.stdout.writelines(diff)
|
|
|
|
|
self.assertFalse(True)
|
|
|
|
|
do_not_modify = [
|
|
|
|
|
'source-files/Zillode/syncthing-silk/build.gradle',
|
|
|
|
|
'source-files/at.bitfire.davdroid/build.gradle',
|
|
|
|
|
'source-files/com.kunzisoft.testcase/build.gradle',
|
|
|
|
|
'source-files/com.nextcloud.client/build.gradle',
|
|
|
|
|
'source-files/fdroid/fdroidclient/build.gradle',
|
|
|
|
|
'source-files/firebase-suspect/app/build.gradle',
|
|
|
|
|
'source-files/firebase-suspect/build.gradle',
|
2021-06-17 14:46:51 +02:00
|
|
|
|
'source-files/firebase-allowlisted/app/build.gradle',
|
|
|
|
|
'source-files/firebase-allowlisted/build.gradle',
|
2019-10-23 12:23:37 +02:00
|
|
|
|
'source-files/org.mozilla.rocket/app/build.gradle',
|
|
|
|
|
'source-files/realm/react-native/android/build.gradle',
|
|
|
|
|
'triple-t-2/build/org.piwigo.android/app/build.gradle',
|
|
|
|
|
]
|
|
|
|
|
for f in do_not_modify:
|
|
|
|
|
build_dir = os.path.join(*f.split(os.sep)[:2])
|
|
|
|
|
if not os.path.isdir(build_dir):
|
|
|
|
|
continue
|
|
|
|
|
fdroidserver.common.remove_signing_keys(build_dir)
|
|
|
|
|
fromfile = os.path.join(self.basedir, f)
|
|
|
|
|
with open(fromfile) as fp:
|
|
|
|
|
a = fp.readlines()
|
|
|
|
|
with open(f) as fp:
|
|
|
|
|
b = fp.readlines()
|
|
|
|
|
diff = list(difflib.unified_diff(a, b, fromfile, f))
|
|
|
|
|
self.assertEqual(0, len(diff), 'This file should not have been modified:\n' + ''.join(diff))
|
|
|
|
|
|
2018-05-22 13:24:37 +02:00
|
|
|
|
def test_calculate_math_string(self):
|
2018-08-29 16:07:02 +02:00
|
|
|
|
self.assertEqual(1234,
|
|
|
|
|
fdroidserver.common.calculate_math_string('1234'))
|
|
|
|
|
self.assertEqual((1 + 1) * 2,
|
|
|
|
|
fdroidserver.common.calculate_math_string('(1 + 1) * 2'))
|
|
|
|
|
self.assertEqual((1 - 1) * 2 + 3 * 1 - 1,
|
|
|
|
|
fdroidserver.common.calculate_math_string('(1 - 1) * 2 + 3 * 1 - 1'))
|
|
|
|
|
self.assertEqual(0 - 12345,
|
|
|
|
|
fdroidserver.common.calculate_math_string('0 - 12345'))
|
|
|
|
|
self.assertEqual(0xffff,
|
|
|
|
|
fdroidserver.common.calculate_math_string('0xffff'))
|
|
|
|
|
self.assertEqual(0xcafe * 123,
|
|
|
|
|
fdroidserver.common.calculate_math_string('0xcafe * 123'))
|
|
|
|
|
self.assertEqual(-1,
|
|
|
|
|
fdroidserver.common.calculate_math_string('-1'))
|
2018-05-22 13:24:37 +02:00
|
|
|
|
with self.assertRaises(SyntaxError):
|
|
|
|
|
fdroidserver.common.calculate_math_string('__import__("urllib")')
|
|
|
|
|
with self.assertRaises(SyntaxError):
|
|
|
|
|
fdroidserver.common.calculate_math_string('self')
|
2018-08-29 16:07:02 +02:00
|
|
|
|
with self.assertRaises(SyntaxError):
|
|
|
|
|
fdroidserver.common.calculate_math_string('Ox9()')
|
2018-05-22 13:24:37 +02:00
|
|
|
|
with self.assertRaises(SyntaxError):
|
|
|
|
|
fdroidserver.common.calculate_math_string('1+1; print(1)')
|
|
|
|
|
with self.assertRaises(SyntaxError):
|
|
|
|
|
fdroidserver.common.calculate_math_string('1-1 # no comment')
|
|
|
|
|
|
2022-09-14 08:42:23 +02:00
|
|
|
|
def test_calculate_IPFS_cid_with_no_tool(self):
|
|
|
|
|
fdroidserver.common.config = {'ipfs_cid': None}
|
|
|
|
|
self.assertIsNone(fdroidserver.common.calculate_IPFS_cid('urzip.apk'))
|
|
|
|
|
self.assertIsNone(fdroidserver.common.calculate_IPFS_cid('FileDoesNotExist'))
|
|
|
|
|
|
|
|
|
|
@unittest.skipUnless(shutil.which('ipfs_cid'), 'calculate_IPFS_cid needs ipfs_cid')
|
|
|
|
|
def test_calculate_IPFS_cid(self):
|
2022-10-24 11:43:47 +02:00
|
|
|
|
config = dict()
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
fdroidserver.common.config = config
|
2022-09-14 08:42:23 +02:00
|
|
|
|
self.assertIsNone(fdroidserver.common.calculate_IPFS_cid('FileDoesNotExist'))
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
fdroidserver.common.calculate_IPFS_cid('urzip.apk'),
|
|
|
|
|
"bafybeigmtgrwyvj77jaflje2rf533haeqtpu2wtwsctryjusjnsawacsam",
|
|
|
|
|
)
|
|
|
|
|
|
2018-06-19 15:18:13 +02:00
|
|
|
|
def test_deploy_build_log_with_rsync_with_id_file(self):
|
2018-06-10 23:23:43 +02:00
|
|
|
|
|
2021-06-07 11:49:21 +02:00
|
|
|
|
mocklogcontent = bytes(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""\
|
2018-06-10 23:23:43 +02:00
|
|
|
|
build started
|
|
|
|
|
building...
|
|
|
|
|
build completed
|
2021-06-07 11:49:21 +02:00
|
|
|
|
profit!"""
|
|
|
|
|
),
|
|
|
|
|
'utf-8',
|
|
|
|
|
)
|
2018-06-10 23:23:43 +02:00
|
|
|
|
|
|
|
|
|
fdroidserver.common.options = mock.Mock()
|
|
|
|
|
fdroidserver.common.options.verbose = False
|
|
|
|
|
fdroidserver.common.options.quiet = False
|
|
|
|
|
fdroidserver.common.config = {}
|
|
|
|
|
fdroidserver.common.config['serverwebroot'] = [
|
2019-06-26 17:00:01 +02:00
|
|
|
|
'example.com:/var/www/fdroid/',
|
2021-06-07 11:49:21 +02:00
|
|
|
|
'example.com:/var/www/fbot/',
|
|
|
|
|
]
|
2018-06-19 15:18:13 +02:00
|
|
|
|
fdroidserver.common.config['deploy_process_logs'] = True
|
2018-06-10 23:23:43 +02:00
|
|
|
|
fdroidserver.common.config['identity_file'] = 'ssh/id_rsa'
|
|
|
|
|
|
|
|
|
|
assert_subprocess_call_iteration = 0
|
|
|
|
|
|
|
|
|
|
def assert_subprocess_call(cmd):
|
|
|
|
|
nonlocal assert_subprocess_call_iteration
|
|
|
|
|
logging.debug(cmd)
|
|
|
|
|
if assert_subprocess_call_iteration == 0:
|
|
|
|
|
self.assertListEqual(['rsync',
|
|
|
|
|
'--archive',
|
|
|
|
|
'--delete-after',
|
|
|
|
|
'--safe-links',
|
|
|
|
|
'-e',
|
|
|
|
|
'ssh -oBatchMode=yes -oIdentitiesOnly=yes -i ssh/id_rsa',
|
|
|
|
|
cmd[6],
|
2019-06-26 17:00:01 +02:00
|
|
|
|
'example.com:/var/www/fdroid/repo/'],
|
2018-06-10 23:23:43 +02:00
|
|
|
|
cmd)
|
2019-07-03 16:22:14 +02:00
|
|
|
|
self.assertTrue(cmd[6].endswith('/com.example.app_4711.log.gz'))
|
2018-06-12 16:18:21 +02:00
|
|
|
|
with gzip.open(cmd[6], 'r') as f:
|
|
|
|
|
self.assertTrue(f.read(), mocklogcontent)
|
2018-06-10 23:23:43 +02:00
|
|
|
|
elif assert_subprocess_call_iteration == 1:
|
|
|
|
|
self.assertListEqual(['rsync',
|
|
|
|
|
'--archive',
|
|
|
|
|
'--delete-after',
|
|
|
|
|
'--safe-links',
|
|
|
|
|
'-e',
|
|
|
|
|
'ssh -oBatchMode=yes -oIdentitiesOnly=yes -i ssh/id_rsa',
|
|
|
|
|
cmd[6],
|
2019-06-26 17:00:01 +02:00
|
|
|
|
'example.com:/var/www/fbot/repo/'],
|
2018-06-10 23:23:43 +02:00
|
|
|
|
cmd)
|
2019-07-03 16:22:14 +02:00
|
|
|
|
self.assertTrue(cmd[6].endswith('/com.example.app_4711.log.gz'))
|
2018-06-12 16:18:21 +02:00
|
|
|
|
with gzip.open(cmd[6], 'r') as f:
|
|
|
|
|
self.assertTrue(f.read(), mocklogcontent)
|
2018-06-10 23:23:43 +02:00
|
|
|
|
else:
|
|
|
|
|
self.fail('unexpected subprocess.call invocation ({})'
|
|
|
|
|
.format(assert_subprocess_call_iteration))
|
|
|
|
|
assert_subprocess_call_iteration += 1
|
|
|
|
|
return 0
|
|
|
|
|
|
2018-06-12 16:18:21 +02:00
|
|
|
|
with mock.patch('subprocess.call',
|
|
|
|
|
side_effect=assert_subprocess_call):
|
2019-10-15 15:19:18 +02:00
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
|
|
|
|
fdroidserver.common.deploy_build_log_with_rsync(
|
2022-09-14 03:45:24 +02:00
|
|
|
|
'com.example.app', 4711, mocklogcontent)
|
2019-10-15 15:19:18 +02:00
|
|
|
|
|
|
|
|
|
expected_log_path = os.path.join(tmpdir, 'repo', 'com.example.app_4711.log.gz')
|
|
|
|
|
self.assertTrue(os.path.isfile(expected_log_path))
|
|
|
|
|
with gzip.open(expected_log_path, 'r') as f:
|
|
|
|
|
self.assertEqual(f.read(), mocklogcontent)
|
2018-06-10 23:23:43 +02:00
|
|
|
|
|
2020-02-18 23:50:52 +01:00
|
|
|
|
def test_deploy_status_json(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2020-02-18 23:50:52 +01:00
|
|
|
|
fakesubcommand = 'fakesubcommand'
|
|
|
|
|
fake_timestamp = 1234567890
|
|
|
|
|
fakeserver = 'example.com:/var/www/fbot/'
|
2022-11-22 17:17:45 +01:00
|
|
|
|
expected_dir = os.path.join(self.tmpdir, fakeserver.replace(':', ''), 'repo', 'status')
|
2020-02-18 23:50:52 +01:00
|
|
|
|
|
|
|
|
|
fdroidserver.common.options = mock.Mock()
|
|
|
|
|
fdroidserver.common.config = {}
|
|
|
|
|
fdroidserver.common.config['serverwebroot'] = [fakeserver]
|
|
|
|
|
fdroidserver.common.config['identity_file'] = 'ssh/id_rsa'
|
|
|
|
|
|
|
|
|
|
def assert_subprocess_call(cmd):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
dest_path = os.path.join(self.tmpdir, cmd[-1].replace(':', ''))
|
2020-02-18 23:50:52 +01:00
|
|
|
|
if not os.path.exists(dest_path):
|
|
|
|
|
os.makedirs(dest_path)
|
|
|
|
|
return subprocess.run(cmd[:-1] + [dest_path]).returncode
|
|
|
|
|
|
|
|
|
|
with mock.patch('subprocess.call', side_effect=assert_subprocess_call):
|
|
|
|
|
with mock.patch.object(sys, 'argv', ['fdroid ' + fakesubcommand]):
|
|
|
|
|
output = fdroidserver.common.setup_status_output(time.localtime(fake_timestamp))
|
|
|
|
|
self.assertFalse(os.path.exists(os.path.join(expected_dir, 'running.json')))
|
|
|
|
|
with mock.patch.object(sys, 'argv', ['fdroid ' + fakesubcommand]):
|
|
|
|
|
fdroidserver.common.write_status_json(output)
|
|
|
|
|
self.assertFalse(os.path.exists(os.path.join(expected_dir, fakesubcommand + '.json')))
|
|
|
|
|
|
|
|
|
|
fdroidserver.common.config['deploy_process_logs'] = True
|
|
|
|
|
|
|
|
|
|
output = fdroidserver.common.setup_status_output(time.localtime(fake_timestamp))
|
|
|
|
|
expected_path = os.path.join(expected_dir, 'running.json')
|
|
|
|
|
self.assertTrue(os.path.isfile(expected_path))
|
|
|
|
|
with open(expected_path) as fp:
|
|
|
|
|
data = json.load(fp)
|
|
|
|
|
self.assertEqual(fake_timestamp * 1000, data['startTimestamp'])
|
|
|
|
|
self.assertFalse('endTimestamp' in data)
|
|
|
|
|
|
|
|
|
|
testvalue = 'asdfasd'
|
|
|
|
|
output['testvalue'] = testvalue
|
|
|
|
|
|
|
|
|
|
fdroidserver.common.write_status_json(output)
|
|
|
|
|
expected_path = os.path.join(expected_dir, fakesubcommand + '.json')
|
|
|
|
|
self.assertTrue(os.path.isfile(expected_path))
|
|
|
|
|
with open(expected_path) as fp:
|
|
|
|
|
data = json.load(fp)
|
|
|
|
|
self.assertEqual(fake_timestamp * 1000, data['startTimestamp'])
|
|
|
|
|
self.assertTrue('endTimestamp' in data)
|
|
|
|
|
self.assertEqual(testvalue, output.get('testvalue'))
|
|
|
|
|
|
2019-12-03 21:49:44 +01:00
|
|
|
|
def test_string_is_integer(self):
|
|
|
|
|
self.assertTrue(fdroidserver.common.string_is_integer('0x10'))
|
|
|
|
|
self.assertTrue(fdroidserver.common.string_is_integer('010'))
|
|
|
|
|
self.assertTrue(fdroidserver.common.string_is_integer('123'))
|
|
|
|
|
self.assertFalse(fdroidserver.common.string_is_integer('0xgg'))
|
|
|
|
|
self.assertFalse(fdroidserver.common.string_is_integer('01g'))
|
|
|
|
|
self.assertFalse(fdroidserver.common.string_is_integer('o123'))
|
|
|
|
|
|
2019-12-03 23:51:48 +01:00
|
|
|
|
def test_version_code_string_to_int(self):
|
|
|
|
|
self.assertEqual(16, fdroidserver.common.version_code_string_to_int('0x10'))
|
|
|
|
|
self.assertEqual(198712389, fdroidserver.common.version_code_string_to_int('198712389'))
|
|
|
|
|
self.assertEqual(8, fdroidserver.common.version_code_string_to_int('0o10'))
|
|
|
|
|
self.assertEqual(10, fdroidserver.common.version_code_string_to_int('010'))
|
|
|
|
|
self.assertEqual(123, fdroidserver.common.version_code_string_to_int('0000123'))
|
|
|
|
|
self.assertEqual(-42, fdroidserver.common.version_code_string_to_int('-42'))
|
|
|
|
|
|
2019-12-16 19:17:46 +01:00
|
|
|
|
def test_getsrclibvcs(self):
|
|
|
|
|
fdroidserver.metadata.srclibs = {'somelib': {'RepoType': 'git'},
|
|
|
|
|
'yeslib': {'RepoType': 'hg'},
|
|
|
|
|
'nolib': {'RepoType': 'git-svn'}}
|
|
|
|
|
self.assertEqual(fdroidserver.common.getsrclibvcs('somelib'), 'git')
|
|
|
|
|
self.assertEqual(fdroidserver.common.getsrclibvcs('yeslib'), 'hg')
|
|
|
|
|
self.assertEqual(fdroidserver.common.getsrclibvcs('nolib'), 'git-svn')
|
|
|
|
|
with self.assertRaises(VCSException):
|
|
|
|
|
fdroidserver.common.getsrclibvcs('nonexistentlib')
|
|
|
|
|
|
2019-12-19 22:55:14 +01:00
|
|
|
|
def test_getsrclib_not_found(self):
|
|
|
|
|
fdroidserver.common.config = {'sdk_path': '',
|
|
|
|
|
'java_paths': {}}
|
|
|
|
|
fdroidserver.metadata.srclibs = {}
|
|
|
|
|
|
|
|
|
|
with self.assertRaisesRegex(VCSException, 'srclib SDL not found.'):
|
|
|
|
|
fdroidserver.common.getsrclib('SDL@release-2.0.3', 'srclib')
|
|
|
|
|
|
|
|
|
|
def test_getsrclib_gotorevision_raw(self):
|
|
|
|
|
fdroidserver.common.config = {'sdk_path': '',
|
|
|
|
|
'java_paths': {}}
|
|
|
|
|
fdroidserver.metadata.srclibs = {'SDL': {'RepoType': 'git',
|
|
|
|
|
'Repo': ''}}
|
|
|
|
|
|
|
|
|
|
vcs = mock.Mock()
|
|
|
|
|
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
|
|
|
|
os.makedirs(os.path.join('srclib', 'SDL'))
|
|
|
|
|
with mock.patch('fdroidserver.common.getvcs', return_value=vcs):
|
|
|
|
|
ret = fdroidserver.common.getsrclib('SDL', 'srclib', raw=True)
|
|
|
|
|
self.assertEqual(vcs.srclib, ('SDL', None, 'srclib/SDL'))
|
|
|
|
|
self.assertEqual(ret, vcs)
|
|
|
|
|
|
|
|
|
|
def test_getsrclib_gotorevision_ref(self):
|
|
|
|
|
fdroidserver.common.config = {'sdk_path': '',
|
|
|
|
|
'java_paths': {}}
|
|
|
|
|
fdroidserver.metadata.srclibs = {'ACRA': {'RepoType': 'git',
|
|
|
|
|
'Repo': 'https://github.com/ACRA/acra.git',
|
|
|
|
|
'Subdir': None,
|
|
|
|
|
'Prepare': None}}
|
|
|
|
|
|
|
|
|
|
vcs = mock.Mock()
|
|
|
|
|
skm = mock.Mock()
|
|
|
|
|
dfm = mock.Mock()
|
|
|
|
|
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
|
|
|
|
os.makedirs(os.path.join('srclib', 'ACRA'))
|
|
|
|
|
with mock.patch('fdroidserver.common.getvcs', return_value=vcs):
|
|
|
|
|
with mock.patch('fdroidserver.common.remove_signing_keys', skm):
|
|
|
|
|
with mock.patch('fdroidserver.common.remove_debuggable_flags', dfm):
|
|
|
|
|
ret = fdroidserver.common.getsrclib('ACRA@acra-4.6.2', 'srclib')
|
|
|
|
|
self.assertEqual(vcs.srclib, ('ACRA', None, 'srclib/ACRA'))
|
|
|
|
|
vcs.gotorevision.assert_called_once_with('acra-4.6.2', True)
|
|
|
|
|
skm.assert_called_once_with('srclib/ACRA')
|
|
|
|
|
dfm.assert_called_once_with('srclib/ACRA')
|
|
|
|
|
self.assertEqual(ret, ('ACRA', None, 'srclib/ACRA'))
|
|
|
|
|
|
2020-04-24 15:22:42 +02:00
|
|
|
|
def test_run_yamllint_wellformed(self):
|
2020-05-26 11:13:54 +02:00
|
|
|
|
try:
|
|
|
|
|
import yamllint.config
|
2021-06-07 11:49:21 +02:00
|
|
|
|
|
2020-05-26 11:13:54 +02:00
|
|
|
|
yamllint.config # make pyflakes ignore this
|
|
|
|
|
except ImportError:
|
|
|
|
|
self.skipTest('yamllint not installed')
|
2020-04-24 15:22:42 +02:00
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
|
|
|
|
with open('wellformed.yml', 'w') as f:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
f.write(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
'''\
|
2020-04-24 15:22:42 +02:00
|
|
|
|
yaml:
|
|
|
|
|
file:
|
|
|
|
|
- for
|
|
|
|
|
- test
|
|
|
|
|
purposeses: true
|
2021-06-07 11:49:21 +02:00
|
|
|
|
'''
|
|
|
|
|
)
|
|
|
|
|
)
|
2020-04-24 15:22:42 +02:00
|
|
|
|
result = fdroidserver.common.run_yamllint('wellformed.yml')
|
|
|
|
|
self.assertEqual(result, '')
|
|
|
|
|
|
|
|
|
|
def test_run_yamllint_malformed(self):
|
2020-05-26 11:13:54 +02:00
|
|
|
|
try:
|
|
|
|
|
import yamllint.config
|
2021-06-07 11:49:21 +02:00
|
|
|
|
|
2020-05-26 11:13:54 +02:00
|
|
|
|
yamllint.config # make pyflakes ignore this
|
|
|
|
|
except ImportError:
|
|
|
|
|
self.skipTest('yamllint not installed')
|
2020-04-24 15:22:42 +02:00
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
|
|
|
|
with open('malformed.yml', 'w') as f:
|
2021-06-07 11:49:21 +02:00
|
|
|
|
f.write(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
'''\
|
2020-04-24 15:22:42 +02:00
|
|
|
|
yaml:
|
|
|
|
|
- that
|
|
|
|
|
fails
|
|
|
|
|
- test
|
2021-06-07 11:49:21 +02:00
|
|
|
|
'''
|
|
|
|
|
)
|
|
|
|
|
)
|
2020-04-24 15:22:42 +02:00
|
|
|
|
result = fdroidserver.common.run_yamllint('malformed.yml')
|
|
|
|
|
self.assertIsNotNone(result)
|
|
|
|
|
self.assertNotEqual(result, '')
|
|
|
|
|
|
2018-09-04 11:03:05 +02:00
|
|
|
|
def test_with_no_config(self):
|
|
|
|
|
"""It should set defaults if no config file is found"""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2018-09-04 11:03:05 +02:00
|
|
|
|
self.assertFalse(os.path.exists('config.yml'))
|
|
|
|
|
self.assertFalse(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
2023-02-19 22:23:04 +01:00
|
|
|
|
self.assertFalse(config.get('update_stats'))
|
2018-09-04 11:03:05 +02:00
|
|
|
|
self.assertIsNotNone(config.get('char_limits'))
|
|
|
|
|
|
2021-04-08 12:44:45 +02:00
|
|
|
|
def test_with_zero_size_config(self):
|
|
|
|
|
"""It should set defaults if config file has nothing in it"""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2021-04-08 12:44:45 +02:00
|
|
|
|
open('config.yml', 'w').close()
|
|
|
|
|
self.assertTrue(os.path.exists('config.yml'))
|
|
|
|
|
self.assertFalse(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
2023-02-19 22:23:04 +01:00
|
|
|
|
self.assertFalse(config.get('update_stats'))
|
2021-04-08 12:44:45 +02:00
|
|
|
|
self.assertIsNotNone(config.get('char_limits'))
|
|
|
|
|
|
2018-09-04 11:03:05 +02:00
|
|
|
|
def test_with_config_yml(self):
|
|
|
|
|
"""Make sure it is possible to use config.yml alone."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2018-09-04 11:03:05 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('apksigner: yml')
|
|
|
|
|
self.assertTrue(os.path.exists('config.yml'))
|
|
|
|
|
self.assertFalse(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertEqual('yml', config.get('apksigner'))
|
|
|
|
|
|
2021-06-14 16:00:45 +02:00
|
|
|
|
def test_with_config_yml_utf8(self):
|
|
|
|
|
"""Make sure it is possible to use config.yml in UTF-8 encoding."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2021-06-14 16:00:45 +02:00
|
|
|
|
teststr = '/πÇÇ现代通用字-български-عربي1/ö/yml'
|
|
|
|
|
with open('config.yml', 'w', encoding='utf-8') as fp:
|
|
|
|
|
fp.write('apksigner: ' + teststr)
|
|
|
|
|
self.assertTrue(os.path.exists('config.yml'))
|
|
|
|
|
self.assertFalse(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertEqual(teststr, config.get('apksigner'))
|
|
|
|
|
|
|
|
|
|
def test_with_config_yml_utf8_as_ascii(self):
|
|
|
|
|
"""Make sure it is possible to use config.yml Unicode encoded as ASCII."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2021-06-14 16:00:45 +02:00
|
|
|
|
teststr = '/πÇÇ现代通用字-български-عربي1/ö/yml'
|
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
yaml.dump({'apksigner': teststr}, fp)
|
|
|
|
|
self.assertTrue(os.path.exists('config.yml'))
|
|
|
|
|
self.assertFalse(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertEqual(teststr, config.get('apksigner'))
|
|
|
|
|
|
2020-10-22 19:08:08 +02:00
|
|
|
|
def test_with_config_yml_with_env_var(self):
|
|
|
|
|
"""Make sure it is possible to use config.yml alone."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-11-25 16:12:01 +01:00
|
|
|
|
with mock.patch.dict(os.environ):
|
|
|
|
|
os.environ['SECRET'] = 'mysecretpassword'
|
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write("""keypass: {'env': 'SECRET'}""")
|
|
|
|
|
self.assertTrue(os.path.exists('config.yml'))
|
|
|
|
|
self.assertFalse(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertEqual(os.getenv('SECRET', 'fail'), config.get('keypass'))
|
2020-10-22 19:08:08 +02:00
|
|
|
|
|
2018-09-04 11:03:05 +02:00
|
|
|
|
def test_with_config_py(self):
|
|
|
|
|
"""Make sure it is still possible to use config.py alone."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2018-09-04 11:03:05 +02:00
|
|
|
|
with open('config.py', 'w') as fp:
|
|
|
|
|
fp.write('apksigner = "py"')
|
|
|
|
|
self.assertFalse(os.path.exists('config.yml'))
|
|
|
|
|
self.assertTrue(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertEqual("py", config.get('apksigner'))
|
|
|
|
|
|
|
|
|
|
def test_config_perm_warning(self):
|
|
|
|
|
"""Exercise the code path that issues a warning about unsafe permissions."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2018-09-04 11:03:05 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('keystore: foo.jks')
|
|
|
|
|
self.assertTrue(os.path.exists(fp.name))
|
|
|
|
|
os.chmod(fp.name, 0o666)
|
|
|
|
|
fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
os.remove(fp.name)
|
|
|
|
|
fdroidserver.common.config = None
|
|
|
|
|
|
|
|
|
|
with open('config.py', 'w') as fp:
|
|
|
|
|
fp.write('keystore = "foo.jks"')
|
|
|
|
|
self.assertTrue(os.path.exists(fp.name))
|
|
|
|
|
os.chmod(fp.name, 0o666)
|
|
|
|
|
fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
|
|
|
|
|
def test_with_both_config_yml_py(self):
|
|
|
|
|
"""If config.yml and config.py are present, config.py should be ignored."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2018-09-04 11:03:05 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('apksigner: yml')
|
|
|
|
|
with open('config.py', 'w') as fp:
|
|
|
|
|
fp.write('apksigner = "py"')
|
|
|
|
|
self.assertTrue(os.path.exists('config.yml'))
|
|
|
|
|
self.assertTrue(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertEqual('yml', config.get('apksigner'))
|
|
|
|
|
|
2022-04-21 09:54:30 +02:00
|
|
|
|
def test_config_repo_url(self):
|
|
|
|
|
"""repo_url ends in /repo, archive_url ends in /archive."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-04-21 09:54:30 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('repo_url: https://MyFirstFDroidRepo.org/fdroid/repo\n')
|
|
|
|
|
fp.write('archive_url: https://MyFirstFDroidRepo.org/fdroid/archive')
|
|
|
|
|
config = fdroidserver.common.read_config()
|
|
|
|
|
self.assertEqual('https://MyFirstFDroidRepo.org/fdroid/repo', config.get('repo_url'))
|
|
|
|
|
self.assertEqual('https://MyFirstFDroidRepo.org/fdroid/archive', config.get('archive_url'))
|
|
|
|
|
|
|
|
|
|
def test_config_repo_url_extra_slash(self):
|
|
|
|
|
"""repo_url ends in /repo, archive_url ends in /archive."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-04-21 09:54:30 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('repo_url: https://MyFirstFDroidRepo.org/fdroid/repo/')
|
|
|
|
|
with self.assertRaises(FDroidException):
|
|
|
|
|
fdroidserver.common.read_config()
|
|
|
|
|
|
|
|
|
|
def test_config_repo_url_not_repo(self):
|
|
|
|
|
"""repo_url ends in /repo, archive_url ends in /archive."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-04-21 09:54:30 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('repo_url: https://MyFirstFDroidRepo.org/fdroid/foo')
|
|
|
|
|
with self.assertRaises(FDroidException):
|
|
|
|
|
fdroidserver.common.read_config()
|
|
|
|
|
|
|
|
|
|
def test_config_archive_url_extra_slash(self):
|
|
|
|
|
"""repo_url ends in /repo, archive_url ends in /archive."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-04-21 09:54:30 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('archive_url: https://MyFirstFDroidRepo.org/fdroid/archive/')
|
|
|
|
|
with self.assertRaises(FDroidException):
|
|
|
|
|
fdroidserver.common.read_config()
|
|
|
|
|
|
|
|
|
|
def test_config_archive_url_not_repo(self):
|
|
|
|
|
"""repo_url ends in /repo, archive_url ends in /archive."""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-04-21 09:54:30 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('archive_url: https://MyFirstFDroidRepo.org/fdroid/foo')
|
|
|
|
|
with self.assertRaises(FDroidException):
|
|
|
|
|
fdroidserver.common.read_config()
|
|
|
|
|
|
2020-10-22 23:00:58 +02:00
|
|
|
|
def test_write_to_config_yml(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2020-10-22 23:00:58 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('apksigner: yml')
|
|
|
|
|
self.assertTrue(os.path.exists(fp.name))
|
|
|
|
|
self.assertFalse(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertFalse('keypass' in config)
|
|
|
|
|
self.assertEqual('yml', config.get('apksigner'))
|
|
|
|
|
fdroidserver.common.write_to_config(config, 'keypass', 'mysecretpassword')
|
|
|
|
|
with open(fp.name) as fp:
|
|
|
|
|
print(fp.read())
|
|
|
|
|
fdroidserver.common.config = None
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertEqual('mysecretpassword', config['keypass'])
|
|
|
|
|
|
|
|
|
|
def test_write_to_config_py(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2020-10-22 23:00:58 +02:00
|
|
|
|
with open('config.py', 'w') as fp:
|
|
|
|
|
fp.write('apksigner = "py"')
|
|
|
|
|
self.assertTrue(os.path.exists(fp.name))
|
|
|
|
|
self.assertFalse(os.path.exists('config.yml'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertFalse('keypass' in config)
|
|
|
|
|
self.assertEqual('py', config.get('apksigner'))
|
|
|
|
|
fdroidserver.common.write_to_config(config, 'keypass', 'mysecretpassword')
|
|
|
|
|
fdroidserver.common.config = None
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertEqual('mysecretpassword', config['keypass'])
|
2018-09-04 11:03:05 +02:00
|
|
|
|
|
2020-10-22 23:34:47 +02:00
|
|
|
|
def test_config_dict_with_int_keys(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2020-10-22 23:34:47 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write('java_paths:\n 8: /usr/lib/jvm/java-8-openjdk\n')
|
|
|
|
|
self.assertTrue(os.path.exists(fp.name))
|
|
|
|
|
self.assertFalse(os.path.exists('config.py'))
|
|
|
|
|
config = fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
self.assertEqual('/usr/lib/jvm/java-8-openjdk', config.get('java_paths', {}).get('8'))
|
|
|
|
|
|
|
|
|
|
def test_loading_config_buildserver_yml(self):
|
|
|
|
|
"""Smoke check to make sure this file is properly parsed"""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2020-10-22 23:34:47 +02:00
|
|
|
|
shutil.copy(os.path.join(self.basedir, '..', 'buildserver', 'config.buildserver.yml'),
|
|
|
|
|
'config.yml')
|
|
|
|
|
self.assertFalse(os.path.exists('config.py'))
|
|
|
|
|
fdroidserver.common.read_config(fdroidserver.common.options)
|
|
|
|
|
|
2020-11-17 13:50:28 +01:00
|
|
|
|
def test_setup_status_output(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2020-11-17 13:50:28 +01:00
|
|
|
|
start_timestamp = time.gmtime()
|
|
|
|
|
subcommand = 'test'
|
|
|
|
|
|
|
|
|
|
fakecmd = ['fdroid ' + subcommand, '--option']
|
|
|
|
|
sys.argv = fakecmd
|
|
|
|
|
fdroidserver.common.config = dict()
|
|
|
|
|
fdroidserver.common.setup_status_output(start_timestamp)
|
|
|
|
|
with open(os.path.join('repo', 'status', 'running.json')) as fp:
|
|
|
|
|
data = json.load(fp)
|
|
|
|
|
self.assertFalse(os.path.exists('.git'))
|
|
|
|
|
self.assertFalse('fdroiddata' in data)
|
|
|
|
|
self.assertEqual(fakecmd, data['commandLine'])
|
|
|
|
|
self.assertEqual(subcommand, data['subcommand'])
|
|
|
|
|
|
|
|
|
|
def test_setup_status_output_in_git_repo(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2020-11-17 13:50:28 +01:00
|
|
|
|
logging.getLogger('git.cmd').setLevel(logging.INFO)
|
2022-11-22 17:17:45 +01:00
|
|
|
|
git_repo = git.Repo.init(self.tmpdir)
|
2020-11-17 13:50:28 +01:00
|
|
|
|
file_in_git = 'README.md'
|
|
|
|
|
with open(file_in_git, 'w') as fp:
|
|
|
|
|
fp.write('this is just a test')
|
|
|
|
|
git_repo.git.add(all=True)
|
|
|
|
|
git_repo.index.commit("update README")
|
|
|
|
|
|
|
|
|
|
start_timestamp = time.gmtime()
|
|
|
|
|
fakecmd = ['fdroid test2', '--option']
|
|
|
|
|
sys.argv = fakecmd
|
|
|
|
|
fdroidserver.common.config = dict()
|
|
|
|
|
fdroidserver.common.setup_status_output(start_timestamp)
|
|
|
|
|
with open(os.path.join('repo', 'status', 'running.json')) as fp:
|
|
|
|
|
data = json.load(fp)
|
|
|
|
|
self.assertTrue(os.path.exists('.git'))
|
|
|
|
|
self.assertIsNotNone(re.match(r'[0-9a-f]{40}', data['fdroiddata']['commitId']),
|
|
|
|
|
'Must be a valid git SHA1 commit ID!')
|
|
|
|
|
self.assertFalse(data['fdroiddata']['isDirty'])
|
|
|
|
|
self.assertEqual(fakecmd, data['commandLine'])
|
|
|
|
|
|
|
|
|
|
self.assertEqual([],
|
|
|
|
|
data['fdroiddata']['untrackedFiles'])
|
|
|
|
|
dirtyfile = 'dirtyfile'
|
2021-06-14 15:38:37 +02:00
|
|
|
|
with open(dirtyfile, 'w', encoding='utf-8') as fp:
|
2020-11-17 13:50:28 +01:00
|
|
|
|
fp.write('this is just a test')
|
2021-06-14 15:38:37 +02:00
|
|
|
|
with open(file_in_git, 'a', encoding='utf-8') as fp:
|
2020-11-17 13:50:28 +01:00
|
|
|
|
fp.write('\nappend some stuff')
|
|
|
|
|
self.assertEqual([],
|
|
|
|
|
data['fdroiddata']['modifiedFiles'])
|
|
|
|
|
fdroidserver.common.setup_status_output(start_timestamp)
|
|
|
|
|
with open(os.path.join('repo', 'status', 'running.json')) as fp:
|
|
|
|
|
data = json.load(fp)
|
|
|
|
|
self.assertTrue(data['fdroiddata']['isDirty'])
|
|
|
|
|
self.assertEqual([file_in_git],
|
|
|
|
|
data['fdroiddata']['modifiedFiles'])
|
|
|
|
|
self.assertEqual([dirtyfile, 'repo/status/running.json'],
|
|
|
|
|
data['fdroiddata']['untrackedFiles'])
|
|
|
|
|
|
2020-11-17 23:49:04 +01:00
|
|
|
|
def test_get_app_display_name(self):
|
|
|
|
|
testvalue = 'WIN!'
|
|
|
|
|
for app in [
|
|
|
|
|
{'Name': testvalue},
|
|
|
|
|
{'AutoName': testvalue},
|
|
|
|
|
{'id': testvalue},
|
|
|
|
|
{'id': 'a', 'localized': {'de-AT': {'name': testvalue}}},
|
|
|
|
|
{'id': 'a', 'localized': {
|
|
|
|
|
'de-AT': {'name': 'nope'},
|
|
|
|
|
'en-US': {'name': testvalue},
|
|
|
|
|
}},
|
|
|
|
|
{'AutoName': 'ignore me', 'Name': testvalue, 'id': 'nope'},
|
|
|
|
|
{'AutoName': testvalue, 'id': 'nope'}]:
|
|
|
|
|
self.assertEqual(testvalue, fdroidserver.common.get_app_display_name(app))
|
|
|
|
|
|
2022-11-16 10:17:51 +01:00
|
|
|
|
@mock.patch.dict(os.environ, {'PATH': os.getenv('PATH')}, clear=True)
|
2021-03-09 12:01:57 +01:00
|
|
|
|
def test_get_android_tools_versions(self):
|
2022-11-16 10:17:51 +01:00
|
|
|
|
sdk_path = os.path.join(self.basedir, 'get_android_tools_versions/android-sdk')
|
|
|
|
|
config = {
|
|
|
|
|
'ndk_paths': {'r10e': os.path.join(sdk_path, '..', 'android-ndk-r10e')},
|
|
|
|
|
'sdk_path': sdk_path,
|
|
|
|
|
}
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
2021-03-09 12:01:57 +01:00
|
|
|
|
components = fdroidserver.common.get_android_tools_versions()
|
|
|
|
|
expected = (
|
2022-11-16 10:17:51 +01:00
|
|
|
|
('../android-ndk-r10e', 'r10e'),
|
|
|
|
|
('ndk-bundle', '21.4.7075529'),
|
|
|
|
|
('ndk/11.2.2725575', '11.2.2725575'),
|
|
|
|
|
('ndk/17.2.4988734', '17.2.4988734'),
|
|
|
|
|
('ndk/21.3.6528147', '21.3.6528147'),
|
|
|
|
|
('patcher/v4', '1'),
|
|
|
|
|
('platforms/android-30', '3'),
|
|
|
|
|
('skiaparser/1', '6'),
|
|
|
|
|
('tools', '26.1.1'),
|
2021-03-09 12:01:57 +01:00
|
|
|
|
)
|
|
|
|
|
self.assertSequenceEqual(expected, sorted(components))
|
|
|
|
|
|
2022-11-16 10:17:51 +01:00
|
|
|
|
@mock.patch.dict(os.environ, {'PATH': os.getenv('PATH')}, clear=True)
|
|
|
|
|
def test_get_android_tools_versions_no_ndk(self):
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir:
|
|
|
|
|
sdk_path = Path(tmpdir) / 'get_android_tools_versions'
|
|
|
|
|
shutil.copytree(
|
|
|
|
|
os.path.join(self.basedir, 'get_android_tools_versions'), sdk_path
|
|
|
|
|
)
|
|
|
|
|
shutil.rmtree(sdk_path / 'android-ndk-r10e')
|
|
|
|
|
shutil.rmtree(sdk_path / 'android-sdk/ndk')
|
|
|
|
|
shutil.rmtree(sdk_path / 'android-sdk/ndk-bundle')
|
|
|
|
|
fdroidserver.common.config = {'sdk_path': str(sdk_path)}
|
|
|
|
|
components = fdroidserver.common.get_android_tools_versions()
|
|
|
|
|
expected = (
|
|
|
|
|
('android-sdk/patcher/v4', '1'),
|
|
|
|
|
('android-sdk/platforms/android-30', '3'),
|
|
|
|
|
('android-sdk/skiaparser/1', '6'),
|
|
|
|
|
('android-sdk/tools', '26.1.1'),
|
|
|
|
|
)
|
|
|
|
|
self.assertSequenceEqual(expected, sorted(components))
|
|
|
|
|
|
2021-04-12 09:11:58 +02:00
|
|
|
|
def test_read_pkg_args(self):
|
|
|
|
|
allow_vercodes = False
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
{'org.fdroid.fdroid': []},
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fdroidserver.common.read_pkg_args(['org.fdroid.fdroid'], allow_vercodes),
|
2021-04-12 09:11:58 +02:00
|
|
|
|
)
|
|
|
|
|
self.assertNotEqual(
|
2022-09-14 03:45:24 +02:00
|
|
|
|
{'com.example': [123456]},
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fdroidserver.common.read_pkg_args(['com.example:123456'], allow_vercodes),
|
2021-04-12 09:11:58 +02:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
allow_vercodes = True
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
{'org.fdroid.fdroid': []},
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fdroidserver.common.read_pkg_args(['org.fdroid.fdroid'], allow_vercodes),
|
2021-04-12 09:11:58 +02:00
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
2022-09-14 03:45:24 +02:00
|
|
|
|
{'com.example': [123456]},
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fdroidserver.common.read_pkg_args(['com.example:123456'], allow_vercodes),
|
2021-04-12 09:11:58 +02:00
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
2022-09-14 03:45:24 +02:00
|
|
|
|
{'org.debian_kit': [6]},
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fdroidserver.common.read_pkg_args(['org.debian_kit_6.apk'], allow_vercodes),
|
2021-04-12 09:11:58 +02:00
|
|
|
|
)
|
|
|
|
|
appid_versionCode_pairs = (
|
|
|
|
|
'org.fdroid.fdroid:1',
|
|
|
|
|
'com.example:12345',
|
|
|
|
|
'com.example:67890',
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
2022-09-14 03:45:24 +02:00
|
|
|
|
{'com.example': [12345, 67890], 'org.fdroid.fdroid': [1]},
|
2022-01-14 12:50:44 +01:00
|
|
|
|
fdroidserver.common.read_pkg_args(appid_versionCode_pairs, allow_vercodes),
|
2021-04-12 09:11:58 +02:00
|
|
|
|
)
|
|
|
|
|
appid_versionCode_pairs = (
|
|
|
|
|
'com.example:67890',
|
|
|
|
|
'org.c_base.c_beam_29.apk',
|
|
|
|
|
)
|
|
|
|
|
self.assertEqual(
|
2022-09-14 03:45:24 +02:00
|
|
|
|
{'com.example': [67890], 'org.c_base.c_beam': [29]},
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fdroidserver.common.read_pkg_args(appid_versionCode_pairs, allow_vercodes),
|
2021-04-12 09:11:58 +02:00
|
|
|
|
)
|
|
|
|
|
|
2021-04-12 19:30:45 +02:00
|
|
|
|
def test_apk_strip_v1_signatures(self):
|
|
|
|
|
before = os.path.join(self.basedir, 'no_targetsdk_minsdk1_unsigned.apk')
|
2022-11-22 17:17:45 +01:00
|
|
|
|
after = os.path.join(self.testdir, 'after.apk')
|
2021-04-12 19:30:45 +02:00
|
|
|
|
shutil.copy(before, after)
|
|
|
|
|
fdroidserver.common.apk_strip_v1_signatures(after, strip_manifest=False)
|
|
|
|
|
|
2021-03-26 12:00:01 +01:00
|
|
|
|
def test_metadata_find_developer_signing_files(self):
|
|
|
|
|
appid = 'org.smssecure.smssecure'
|
|
|
|
|
|
|
|
|
|
self.assertIsNone(
|
|
|
|
|
fdroidserver.common.metadata_find_developer_signing_files(appid, 133)
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
vc = '135'
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
(
|
|
|
|
|
os.path.join('metadata', appid, 'signatures', vc, '28969C09.RSA'),
|
|
|
|
|
os.path.join('metadata', appid, 'signatures', vc, '28969C09.SF'),
|
|
|
|
|
os.path.join('metadata', appid, 'signatures', vc, 'MANIFEST.MF'),
|
2021-06-07 11:49:21 +02:00
|
|
|
|
None,
|
2021-03-26 12:00:01 +01:00
|
|
|
|
),
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fdroidserver.common.metadata_find_developer_signing_files(appid, vc),
|
2021-03-26 12:00:01 +01:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
vc = '134'
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
(
|
|
|
|
|
os.path.join('metadata', appid, 'signatures', vc, '28969C09.RSA'),
|
|
|
|
|
os.path.join('metadata', appid, 'signatures', vc, '28969C09.SF'),
|
|
|
|
|
os.path.join('metadata', appid, 'signatures', vc, 'MANIFEST.MF'),
|
2021-06-07 11:49:21 +02:00
|
|
|
|
None,
|
2021-03-26 12:00:01 +01:00
|
|
|
|
),
|
2021-06-07 11:49:21 +02:00
|
|
|
|
fdroidserver.common.metadata_find_developer_signing_files(appid, vc),
|
2021-03-26 12:00:01 +01:00
|
|
|
|
)
|
|
|
|
|
|
2022-01-14 12:50:44 +01:00
|
|
|
|
@mock.patch('sdkmanager.build_package_list', lambda use_net: None)
|
2021-05-26 10:58:46 +02:00
|
|
|
|
def test_auto_install_ndk(self):
|
|
|
|
|
"""Test all possible field data types for build.ndk"""
|
2022-01-14 12:50:44 +01:00
|
|
|
|
fdroidserver.common.config = {'sdk_path': self.testdir}
|
|
|
|
|
sdk_path = self.testdir
|
2021-05-26 10:58:46 +02:00
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
|
|
|
|
|
none_entry = mock.Mock()
|
2022-01-14 12:50:44 +01:00
|
|
|
|
with mock.patch('sdkmanager.install', none_entry):
|
2021-05-26 10:58:46 +02:00
|
|
|
|
fdroidserver.common.auto_install_ndk(build)
|
|
|
|
|
none_entry.assert_not_called()
|
|
|
|
|
|
|
|
|
|
empty_list = mock.Mock()
|
|
|
|
|
build.ndk = []
|
2022-01-14 12:50:44 +01:00
|
|
|
|
with mock.patch('sdkmanager.install', empty_list):
|
2021-05-26 10:58:46 +02:00
|
|
|
|
fdroidserver.common.auto_install_ndk(build)
|
|
|
|
|
empty_list.assert_not_called()
|
|
|
|
|
|
|
|
|
|
release_entry = mock.Mock()
|
|
|
|
|
build.ndk = 'r21e'
|
2022-01-14 12:50:44 +01:00
|
|
|
|
with mock.patch('sdkmanager.install', release_entry):
|
2021-05-26 10:58:46 +02:00
|
|
|
|
fdroidserver.common.auto_install_ndk(build)
|
2022-01-14 12:50:44 +01:00
|
|
|
|
release_entry.assert_called_once_with('ndk;r21e', sdk_path)
|
2021-05-26 10:58:46 +02:00
|
|
|
|
|
|
|
|
|
revision_entry = mock.Mock()
|
|
|
|
|
build.ndk = '21.4.7075529'
|
2022-01-14 12:50:44 +01:00
|
|
|
|
with mock.patch('sdkmanager.install', revision_entry):
|
2021-05-26 10:58:46 +02:00
|
|
|
|
fdroidserver.common.auto_install_ndk(build)
|
2022-01-14 12:50:44 +01:00
|
|
|
|
revision_entry.assert_called_once_with('ndk;21.4.7075529', sdk_path)
|
2021-05-26 10:58:46 +02:00
|
|
|
|
|
|
|
|
|
list_entry = mock.Mock()
|
|
|
|
|
calls = []
|
2021-05-26 17:12:28 +02:00
|
|
|
|
build.ndk = ['r10e', '11.0.2655954', 'r12b', 'r21e']
|
2021-05-26 10:58:46 +02:00
|
|
|
|
for n in build.ndk:
|
2022-01-14 12:50:44 +01:00
|
|
|
|
calls.append(mock.call(f'ndk;{n}', sdk_path))
|
|
|
|
|
with mock.patch('sdkmanager.install', list_entry):
|
2021-05-26 10:58:46 +02:00
|
|
|
|
fdroidserver.common.auto_install_ndk(build)
|
|
|
|
|
list_entry.assert_has_calls(calls)
|
|
|
|
|
|
2022-01-14 12:50:44 +01:00
|
|
|
|
@unittest.skipIf(importlib.util.find_spec('sdkmanager') is None, 'needs sdkmanager')
|
|
|
|
|
@mock.patch('sdkmanager.build_package_list', lambda use_net: None)
|
|
|
|
|
@mock.patch('sdkmanager._install_zipball_from_cache', lambda a, b: None)
|
|
|
|
|
@mock.patch('sdkmanager._generate_package_xml', lambda a, b, c: None)
|
|
|
|
|
def test_auto_install_ndk_mock_dl(self):
|
|
|
|
|
"""Test NDK installs by actually calling sdkmanager"""
|
|
|
|
|
import sdkmanager
|
|
|
|
|
import pkg_resources
|
|
|
|
|
|
|
|
|
|
sdkmanager_version = LooseVersion(
|
|
|
|
|
pkg_resources.get_distribution('sdkmanager').version
|
|
|
|
|
)
|
|
|
|
|
if sdkmanager_version < LooseVersion('0.6.4'):
|
|
|
|
|
raise unittest.SkipTest('needs fdroid sdkmanager >= 0.6.4')
|
|
|
|
|
|
|
|
|
|
fdroidserver.common.config = {'sdk_path': 'placeholder'}
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
url = 'https://dl.google.com/android/repository/android-ndk-r24-linux.zip'
|
|
|
|
|
path = sdkmanager.get_cachedir() / os.path.basename(url)
|
|
|
|
|
sdkmanager.packages = {
|
|
|
|
|
('ndk', '24.0.8215888'): url,
|
|
|
|
|
('ndk', 'r24'): url,
|
|
|
|
|
}
|
|
|
|
|
build.ndk = 'r24'
|
|
|
|
|
firstrun = mock.Mock()
|
|
|
|
|
with mock.patch('sdkmanager.download_file', firstrun):
|
|
|
|
|
fdroidserver.common.auto_install_ndk(build)
|
|
|
|
|
firstrun.assert_called_once_with(url, path)
|
|
|
|
|
build.ndk = '24.0.8215888'
|
|
|
|
|
secondrun = mock.Mock()
|
|
|
|
|
with mock.patch('sdkmanager.download_file', secondrun):
|
|
|
|
|
fdroidserver.common.auto_install_ndk(build)
|
|
|
|
|
secondrun.assert_called_once_with(url, path)
|
|
|
|
|
|
2021-05-26 17:12:28 +02:00
|
|
|
|
@unittest.skip("This test downloads and unzips a 1GB file.")
|
|
|
|
|
def test_install_ndk(self):
|
|
|
|
|
"""NDK r10e is a special case since its missing source.properties"""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
config = {'sdk_path': self.tmpdir}
|
2021-05-26 17:12:28 +02:00
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
fdroidserver.common._install_ndk('r10e')
|
2022-11-22 17:17:45 +01:00
|
|
|
|
r10e = os.path.join(self.tmpdir, 'ndk', 'r10e')
|
2021-05-26 17:12:28 +02:00
|
|
|
|
self.assertEqual('r10e', fdroidserver.common.get_ndk_version(r10e))
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
self.assertEqual({'r10e': r10e}, config['ndk_paths'])
|
|
|
|
|
|
2021-05-26 12:52:54 +02:00
|
|
|
|
def test_fill_config_defaults(self):
|
|
|
|
|
"""Test the auto-detection of NDKs installed in standard paths"""
|
2022-11-22 17:17:45 +01:00
|
|
|
|
ndk_bundle = os.path.join(self.tmpdir, 'ndk-bundle')
|
2021-05-26 12:52:54 +02:00
|
|
|
|
os.makedirs(ndk_bundle)
|
|
|
|
|
with open(os.path.join(ndk_bundle, 'source.properties'), 'w') as fp:
|
|
|
|
|
fp.write('Pkg.Desc = Android NDK\nPkg.Revision = 17.2.4988734\n')
|
2022-11-22 17:17:45 +01:00
|
|
|
|
config = {'sdk_path': self.tmpdir}
|
2021-05-26 12:52:54 +02:00
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
2022-01-14 12:50:44 +01:00
|
|
|
|
self.assertEqual({'17.2.4988734': ndk_bundle}, config['ndk_paths'])
|
2021-05-26 12:52:54 +02:00
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
r21e = os.path.join(self.tmpdir, 'ndk', '21.4.7075529')
|
2021-05-26 12:52:54 +02:00
|
|
|
|
os.makedirs(r21e)
|
|
|
|
|
with open(os.path.join(r21e, 'source.properties'), 'w') as fp:
|
|
|
|
|
fp.write('Pkg.Desc = Android NDK\nPkg.Revision = 21.4.7075529\n')
|
2022-11-22 17:17:45 +01:00
|
|
|
|
config = {'sdk_path': self.tmpdir}
|
2021-05-26 12:52:54 +02:00
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
2022-01-14 12:50:44 +01:00
|
|
|
|
self.assertEqual(
|
|
|
|
|
{'17.2.4988734': ndk_bundle, '21.4.7075529': r21e},
|
|
|
|
|
config['ndk_paths'],
|
|
|
|
|
)
|
2021-05-26 12:52:54 +02:00
|
|
|
|
|
2022-11-22 17:17:45 +01:00
|
|
|
|
r10e = os.path.join(self.tmpdir, 'ndk', 'r10e')
|
2021-05-26 17:12:28 +02:00
|
|
|
|
os.makedirs(r10e)
|
|
|
|
|
with open(os.path.join(r10e, 'RELEASE.TXT'), 'w') as fp:
|
|
|
|
|
fp.write('r10e-rc4 (64-bit)\n')
|
2022-11-22 17:17:45 +01:00
|
|
|
|
config = {'sdk_path': self.tmpdir}
|
2021-05-26 17:12:28 +02:00
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
self.assertEqual(
|
2022-01-14 12:50:44 +01:00
|
|
|
|
{'r10e': r10e, '17.2.4988734': ndk_bundle, '21.4.7075529': r21e},
|
|
|
|
|
config['ndk_paths'],
|
2021-05-26 17:12:28 +02:00
|
|
|
|
)
|
|
|
|
|
|
2023-02-17 15:02:40 +01:00
|
|
|
|
@unittest.skipIf(not os.path.isdir('/usr/lib/jvm/default-java'), 'uses Debian path')
|
|
|
|
|
def test_fill_config_defaults_java(self):
|
|
|
|
|
"""Test the auto-detection of Java installed in standard paths"""
|
|
|
|
|
config = {'sdk_path': self.tmpdir}
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
java_paths = []
|
|
|
|
|
# use presence of javac to make sure its JDK not just JRE
|
2023-02-21 11:16:56 +01:00
|
|
|
|
for f in glob.glob('/usr/lib/jvm/java-*-openjdk-*/bin/javac'):
|
2023-02-17 15:02:40 +01:00
|
|
|
|
jdk = os.path.dirname(os.path.dirname(f))
|
|
|
|
|
if not os.path.islink(jdk):
|
|
|
|
|
java_paths.append(jdk)
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
len(java_paths),
|
|
|
|
|
len(config['java_paths'])
|
|
|
|
|
)
|
|
|
|
|
for f in config['java_paths'].values():
|
|
|
|
|
self.assertTrue(f in java_paths)
|
2023-03-27 15:54:43 +02:00
|
|
|
|
self.assertTrue(isinstance(f, str)) # paths in config must be str
|
|
|
|
|
|
|
|
|
|
@mock.patch.dict(os.environ, clear=True)
|
|
|
|
|
def test_sdk_path_in_config_must_be_strings(self):
|
|
|
|
|
"""All paths in config must be strings, and never pathlib.Path instances"""
|
|
|
|
|
os.environ['PATH'] = '/usr/bin:/usr/sbin'
|
|
|
|
|
config = {'sdk_path': Path('/opt/android-sdk')}
|
|
|
|
|
fdroidserver.common.fill_config_defaults(config)
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
with self.assertRaises(TypeError):
|
|
|
|
|
fdroidserver.common.set_FDroidPopen_env(build)
|
|
|
|
|
|
|
|
|
|
@mock.patch.dict(os.environ, clear=True)
|
|
|
|
|
def test_ndk_paths_in_config_must_be_strings(self):
|
|
|
|
|
"""All paths in config must be strings, and never pathlib.Path instances"""
|
|
|
|
|
fdroidserver.common.config = {
|
|
|
|
|
'ndk_paths': {'r21d': Path('/opt/android-sdk/ndk/r21d')}
|
|
|
|
|
}
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.ndk = 'r21d'
|
|
|
|
|
os.environ['PATH'] = '/usr/bin:/usr/sbin'
|
|
|
|
|
with self.assertRaises(TypeError):
|
|
|
|
|
fdroidserver.common.set_FDroidPopen_env(build)
|
|
|
|
|
|
|
|
|
|
@mock.patch.dict(os.environ, clear=True)
|
|
|
|
|
def test_FDroidPopen_envs_paths_can_be_pathlib(self):
|
|
|
|
|
os.environ['PATH'] = '/usr/bin:/usr/sbin'
|
|
|
|
|
envs = {'PATHLIB': Path('/pathlib/path'), 'STRING': '/string/path'}
|
|
|
|
|
p = fdroidserver.common.FDroidPopen(['/bin/sh', '-c', 'export'], envs=envs)
|
|
|
|
|
self.assertIn('/string/path', p.output)
|
|
|
|
|
self.assertIn('/pathlib/path', p.output)
|
2023-02-17 15:02:40 +01:00
|
|
|
|
|
2021-06-14 20:56:59 +02:00
|
|
|
|
def test_vcs_git_latesttags(self):
|
2022-08-09 16:37:44 +02:00
|
|
|
|
tags = [
|
|
|
|
|
"1.1.1",
|
|
|
|
|
"2.2.2",
|
|
|
|
|
"v3.0",
|
|
|
|
|
"0.0.4",
|
|
|
|
|
"0.5.0-beta",
|
|
|
|
|
"666(6)",
|
|
|
|
|
"seven",
|
|
|
|
|
]
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
2023-02-15 20:25:48 +01:00
|
|
|
|
repo = git.Repo.init(Path.cwd())
|
2022-08-09 16:37:44 +02:00
|
|
|
|
f = Path("test")
|
2022-01-14 12:50:44 +01:00
|
|
|
|
date = 10 ** 9
|
2022-08-09 16:37:44 +02:00
|
|
|
|
for tag in tags:
|
|
|
|
|
date += 1
|
|
|
|
|
f.write_text(tag)
|
|
|
|
|
repo.index.add([str(f)])
|
|
|
|
|
repo.index.commit(tag, commit_date=str(date) + " +0000")
|
|
|
|
|
repo.create_tag(tag)
|
|
|
|
|
|
|
|
|
|
vcs = fdroidserver.common.vcs_git(None, Path.cwd())
|
|
|
|
|
self.assertEqual(vcs.latesttags(), tags[::-1])
|
2021-06-14 20:56:59 +02:00
|
|
|
|
|
2022-09-15 13:32:11 +02:00
|
|
|
|
def test_vcs_git_getref(self):
|
|
|
|
|
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
2023-02-15 20:25:48 +01:00
|
|
|
|
repo = git.Repo.init(Path.cwd())
|
2022-09-15 13:32:11 +02:00
|
|
|
|
tag = "1.1.1"
|
|
|
|
|
f = Path("test")
|
|
|
|
|
f.write_text(tag)
|
|
|
|
|
repo.index.add([str(f)])
|
|
|
|
|
repo.index.commit("foo")
|
|
|
|
|
repo.create_tag(tag)
|
|
|
|
|
|
|
|
|
|
vcs = fdroidserver.common.vcs_git(None, Path.cwd())
|
|
|
|
|
|
|
|
|
|
self.assertIsNotNone(vcs.getref("1.1.1"))
|
|
|
|
|
self.assertIsNone(vcs.getref("invalid"))
|
|
|
|
|
|
2021-06-19 07:30:56 +02:00
|
|
|
|
def test_get_release_filename(self):
|
|
|
|
|
app = fdroidserver.metadata.App()
|
|
|
|
|
app.id = 'test.app'
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
build.versionCode = 123
|
|
|
|
|
|
|
|
|
|
build.output = 'build/apk/*'
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
fdroidserver.common.get_release_filename(app, build),
|
|
|
|
|
"%s_%s.apk" % (app.id, build.versionCode),
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
build.output = 'build/apk/*.zip'
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
fdroidserver.common.get_release_filename(app, build),
|
|
|
|
|
"%s_%s.zip" % (app.id, build.versionCode),
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
build.output = 'build/apk/*.apk'
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
fdroidserver.common.get_release_filename(app, build),
|
|
|
|
|
"%s_%s.apk" % (app.id, build.versionCode),
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
build.output = 'build/apk/*.apk'
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
fdroidserver.common.get_release_filename(app, build, 'exe'),
|
|
|
|
|
"%s_%s.exe" % (app.id, build.versionCode),
|
|
|
|
|
)
|
|
|
|
|
|
2022-04-24 15:33:33 +02:00
|
|
|
|
def test_no_zero_length_ndk_path_prefixes(self):
|
|
|
|
|
fdroidserver.common.config = {'ndk_paths': {}}
|
|
|
|
|
build = fdroidserver.metadata.Build()
|
|
|
|
|
|
2022-11-25 16:12:01 +01:00
|
|
|
|
with mock.patch.dict(os.environ, clear=True):
|
|
|
|
|
os.environ['PATH'] = '/usr/bin:/usr/sbin'
|
|
|
|
|
fdroidserver.common.set_FDroidPopen_env(build)
|
|
|
|
|
self.assertNotIn('', os.getenv('PATH').split(os.pathsep))
|
2022-04-24 15:33:33 +02:00
|
|
|
|
|
2022-05-23 12:39:17 +02:00
|
|
|
|
def test_is_repo_file(self):
|
|
|
|
|
is_repo_file = fdroidserver.common.is_repo_file
|
|
|
|
|
self.assertFalse(is_repo_file('does-not-exist'))
|
|
|
|
|
|
|
|
|
|
with tempfile.TemporaryDirectory() as tmpdir, TmpCwd(tmpdir):
|
|
|
|
|
Path('repo').mkdir()
|
|
|
|
|
repo_files = [
|
|
|
|
|
'repo/com.example.test.helloworld_1.apk',
|
|
|
|
|
'repo/com.politedroid_6.apk',
|
|
|
|
|
'repo/duplicate.permisssions_9999999.apk',
|
|
|
|
|
'repo/fake.ota.update_1234.zip',
|
|
|
|
|
'repo/info.guardianproject.index-v1.jar_123.apk',
|
|
|
|
|
'repo/info.zwanenburg.caffeinetile_4.apk',
|
|
|
|
|
'repo/main.1101613.obb.main.twoversions.obb',
|
|
|
|
|
]
|
|
|
|
|
index_files = [
|
|
|
|
|
'repo/entry.jar',
|
|
|
|
|
'repo/entry.json',
|
|
|
|
|
'repo/index-v1.jar',
|
|
|
|
|
'repo/index-v1.json',
|
|
|
|
|
'repo/index-v2.json',
|
|
|
|
|
'repo/index.css',
|
|
|
|
|
'repo/index.html',
|
|
|
|
|
'repo/index.jar',
|
|
|
|
|
'repo/index.png',
|
|
|
|
|
'repo/index.xml',
|
|
|
|
|
]
|
|
|
|
|
non_repo_files = ['repo/categories.txt']
|
|
|
|
|
for f in repo_files + index_files + non_repo_files:
|
|
|
|
|
open(f, 'w').close()
|
|
|
|
|
|
|
|
|
|
repo_dirs = [
|
|
|
|
|
'repo/com.politedroid',
|
|
|
|
|
'repo/info.guardianproject.index-v1.jar',
|
|
|
|
|
'repo/status',
|
|
|
|
|
]
|
|
|
|
|
for d in repo_dirs:
|
|
|
|
|
os.mkdir(d)
|
|
|
|
|
|
|
|
|
|
for f in repo_files:
|
|
|
|
|
self.assertTrue(os.path.exists(f), f + ' was created')
|
|
|
|
|
self.assertTrue(is_repo_file(f), f + ' is repo file')
|
|
|
|
|
|
|
|
|
|
for f in index_files:
|
|
|
|
|
self.assertTrue(os.path.exists(f), f + ' was created')
|
|
|
|
|
self.assertFalse(is_repo_file(f), f + ' is repo file')
|
|
|
|
|
gpg_signed = [
|
|
|
|
|
'repo/entry.json',
|
|
|
|
|
'repo/index-v1.json',
|
|
|
|
|
'repo/index-v2.json',
|
|
|
|
|
]
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
(f in gpg_signed or is_repo_file(f, for_gpg_signing=False)),
|
|
|
|
|
is_repo_file(f, for_gpg_signing=True),
|
|
|
|
|
f + ' gpg signable?',
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
for d in repo_dirs:
|
|
|
|
|
self.assertTrue(os.path.exists(d), d + ' was created')
|
|
|
|
|
self.assertFalse(is_repo_file(d), d + ' not repo file')
|
|
|
|
|
|
|
|
|
|
for f in non_repo_files:
|
|
|
|
|
self.assertTrue(os.path.exists(f), f + ' was created')
|
|
|
|
|
self.assertFalse(is_repo_file(f), f + ' not repo file')
|
|
|
|
|
|
2022-05-23 23:08:16 +02:00
|
|
|
|
def test_get_apksigner_smartcardoptions(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-05-23 23:08:16 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
d = {
|
|
|
|
|
'smartcardoptions': '-storetype PKCS11'
|
|
|
|
|
' -providerName SunPKCS11-OpenSC'
|
|
|
|
|
' -providerClass sun.security.pkcs11.SunPKCS11'
|
|
|
|
|
' -providerArg opensc-fdroid.cfg'
|
|
|
|
|
}
|
|
|
|
|
yaml.dump(d, fp)
|
|
|
|
|
config = fdroidserver.common.read_config()
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
self.assertTrue(isinstance(d['smartcardoptions'], str))
|
|
|
|
|
self.assertTrue(isinstance(config['smartcardoptions'], list))
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
[
|
|
|
|
|
'--ks-type',
|
|
|
|
|
'PKCS11',
|
|
|
|
|
'--provider-class',
|
|
|
|
|
'sun.security.pkcs11.SunPKCS11',
|
|
|
|
|
'--provider-arg',
|
|
|
|
|
'opensc-fdroid.cfg',
|
|
|
|
|
],
|
|
|
|
|
fdroidserver.common.get_apksigner_smartcardoptions(
|
|
|
|
|
config['smartcardoptions']
|
|
|
|
|
),
|
|
|
|
|
)
|
|
|
|
|
|
2022-05-25 10:09:52 +02:00
|
|
|
|
def test_get_smartcardoptions_list(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-05-25 10:09:52 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""
|
|
|
|
|
smartcardoptions:
|
|
|
|
|
- -storetype
|
|
|
|
|
- PKCS11
|
|
|
|
|
- -providerName
|
|
|
|
|
- SunPKCS11-OpenSC
|
|
|
|
|
- -providerClass
|
|
|
|
|
- sun.security.pkcs11.SunPKCS11
|
|
|
|
|
- -providerArg
|
|
|
|
|
- opensc-fdroid.cfg
|
|
|
|
|
"""
|
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
config = fdroidserver.common.read_config()
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
self.assertTrue(isinstance(config['smartcardoptions'], list))
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
[
|
|
|
|
|
'-storetype',
|
|
|
|
|
'PKCS11',
|
|
|
|
|
'-providerName',
|
|
|
|
|
'SunPKCS11-OpenSC',
|
|
|
|
|
'-providerClass',
|
|
|
|
|
'sun.security.pkcs11.SunPKCS11',
|
|
|
|
|
'-providerArg',
|
|
|
|
|
'opensc-fdroid.cfg',
|
|
|
|
|
],
|
|
|
|
|
config['smartcardoptions'],
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
def test_get_smartcardoptions_spaces(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-05-25 10:09:52 +02:00
|
|
|
|
with open('config.yml', 'w') as fp:
|
|
|
|
|
fp.write(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""smartcardoptions: |
|
|
|
|
|
-storetype PKCS11
|
|
|
|
|
-providerClass sun.security.pkcs11.SunPKCS11
|
|
|
|
|
-providerArg /etc/pkcs11_java.cfg
|
|
|
|
|
|
|
|
|
|
"""
|
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
config = fdroidserver.common.read_config()
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
self.assertTrue(isinstance(config['smartcardoptions'], list))
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
[
|
|
|
|
|
'-storetype',
|
|
|
|
|
'PKCS11',
|
|
|
|
|
'-providerClass',
|
|
|
|
|
'sun.security.pkcs11.SunPKCS11',
|
|
|
|
|
'-providerArg',
|
|
|
|
|
'/etc/pkcs11_java.cfg',
|
|
|
|
|
],
|
|
|
|
|
config['smartcardoptions'],
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
def test_get_smartcardoptions_config_py(self):
|
2022-11-22 17:17:45 +01:00
|
|
|
|
os.chdir(self.tmpdir)
|
2022-05-25 10:09:52 +02:00
|
|
|
|
with open('config.py', 'w') as fp:
|
|
|
|
|
fp.write(
|
|
|
|
|
textwrap.dedent(
|
|
|
|
|
"""
|
|
|
|
|
smartcardoptions = '''
|
|
|
|
|
\t-storetype\tPKCS11
|
|
|
|
|
\t-providerClass\tsun.security.pkcs11.SunPKCS11
|
|
|
|
|
\t-providerArg\t/etc/pkcs11_java.cfg
|
|
|
|
|
|
|
|
|
|
'''
|
|
|
|
|
"""
|
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
config = fdroidserver.common.read_config()
|
|
|
|
|
fdroidserver.common.config = config
|
|
|
|
|
self.assertEqual(
|
|
|
|
|
[
|
|
|
|
|
'-storetype',
|
|
|
|
|
'PKCS11',
|
|
|
|
|
'-providerClass',
|
|
|
|
|
'sun.security.pkcs11.SunPKCS11',
|
|
|
|
|
'-providerArg',
|
|
|
|
|
'/etc/pkcs11_java.cfg',
|
|
|
|
|
],
|
|
|
|
|
config['smartcardoptions'],
|
|
|
|
|
)
|
|
|
|
|
|
2017-11-30 13:42:37 +01:00
|
|
|
|
|
2014-12-08 22:55:14 +01:00
|
|
|
|
if __name__ == "__main__":
|
2018-06-08 02:56:18 +02:00
|
|
|
|
os.chdir(os.path.dirname(__file__))
|
|
|
|
|
|
2014-12-08 22:55:14 +01:00
|
|
|
|
parser = optparse.OptionParser()
|
2021-06-07 11:49:21 +02:00
|
|
|
|
parser.add_option(
|
|
|
|
|
"-v",
|
|
|
|
|
"--verbose",
|
|
|
|
|
action="store_true",
|
|
|
|
|
default=False,
|
|
|
|
|
help="Spew out even more information than normal",
|
|
|
|
|
)
|
2014-12-08 22:55:14 +01:00
|
|
|
|
(fdroidserver.common.options, args) = parser.parse_args(['--verbose'])
|
|
|
|
|
|
|
|
|
|
newSuite = unittest.TestSuite()
|
|
|
|
|
newSuite.addTest(unittest.makeSuite(CommonTest))
|
2017-11-30 10:14:38 +01:00
|
|
|
|
unittest.main(failfast=False)
|